Tuesday, December 31, 2019

Space Junk Danger

Earth doesnt orbit the Sun alone. Of course, there are the other planets, moons, asteroids, and comets. But, in near-Earth space, our planet is accompanied by a LOT of space junk left over from launched vehicles. Does it pose a danger? In some cases, it does. In the movie Gravity, a group of astronauts finds out first-hand what it might be like for space  explorers to run into an orbiting bit of space debris. The results are not good, although at least one  astronaut makes it through safely. When it came out, the movie has generated a lot of discussion among space experts  about its accuracy in some places, but the general story highlights a growing problem that we dont often think about here on Earth (and probably should): space junk returning home.   What Goes Up often Comes Down Theres a cloud of space debris around Earth that planners have to deal with as they set schedules for rocket launches and low-Earth missions. Most of the material out there eventually comes back to Earth, such as the object WTF1190F. It was a piece of hardware likely dating back to the Apollo mission days. Its return to Earth on November 13, 2015, told scientists a lot about what happens as material plunges through our atmosphere (and burns up on the way down). Of course, spent satellites are often de-orbited, too, with similar results. The idea is that only little pieces make it back to the planet, and the bigger stuff is destroyed. Knowing about space junk and where it is at any given moment is particularly important for people in the space launch business. This is because there are nearly  20,000 pieces of space debris up there. Most of it  ranges from such small objects as gloves and cameras to  pieces of rockets and artificial  satellites. Theres enough stuff up there to pose a real danger to observatories such as the  Hubble Space Telescope,  weather and communications satellites and the International Space Station. It also poses some risk to those of us on Earth. The good news is, the chances of something hitting us on land are fairly small. Its far more likely that a piece of space debris will fall into the oceans, or at least into an unhabitated part of a continent.   To keep launch vehicles and orbiting satellites from running into these bits of space junk, organizations  such as the North American Aerospace Defense Command (NORAD) observes and maintains a list of known objects orbiting Earth. Before every launch (and as satellites orbit the globe), the positions of all known debris must  be known so that the launches and orbits can proceed without risk. The other good news is that most space debris burns up before it hits the planet. The Atmosphere Can be a Drag (and Thats Good!) Pieces of junk in orbit can and do get caught up in our planets atmosphere, just as meteoroids do. That slows them  down, in a process called atmospheric drag. If were lucky, and a piece of orbital debris is small  enough, it will likely vaporize as it falls to Earth under the tug of our planets gravity. (This is exactly what happens to meteoroids when they encounter our atmosphere and the resulting flare of light we see as they vaporize is called a meteor. Earth regularly encounters streams of meteoroids, and when it does, we often see meteor showers.)  Ã‚  But, larger  pieces of space junk  can pose a threat to folks on Earth as well as get in the way or orbiting stations and  satellites.   Earths atmosphere is not the same size all the time. At some times it stretches out much farther from the surface due to solar activity. So, scientists monitor the density of the atmosphere changes over time in the low-Earth orbit (LEO) zone. Thats an area several hundred miles above the surface of our planet where most orbiting materials (including satellites and the International Space Station) exist.   The Sun Plays a Role in Space Junk Re-entry In addition to heating by the Sun (which helps swell our atmosphere), heat waves propagating from lower in the atmosphere can also have an effect. There are other events that affect our atmosphere and could have the effect of catapulting larger objects toward Earths surface. Occasional solar storms cause the upper atmosphere to expand. These erratic solar storms (caused by coronal mass ejections)   can zip from the Sun toward Earth in less than two days, and they produce rapid changes in air density.   Again, most space junk falling to Earth can and does vaporize on the way down. But, larger pieces can land and pose the potential for damage. Imagine being in the neighborhood if a large piece of a defunct satellite fell on your house! Or, imagine what would happen if a large solar storm resulted in enough atmospheric drag to pull a working satellite (or a  space station) into a lower and more potentially dangerous orbit? It would not be good news for anybody in the path. Predicting Re-Entry The U.S. Air Force (which is involved with NORAD), and the U.S. National Center for Atmospheric Research (NCAR), the University of Colorado at Boulder, and the U.S. National Oceanic and Atmospheric Administration Space Weather Prediction Center work together to forecast space weather events and the effects they have on our atmosphere. Understanding those events will help us all in the long run by understanding the same effects on the orbits of space junk. Ultimately, the junk trackers will be able to forecast more accurate orbits and trajectories of space debris in near-Earth space.   Fast Facts about Space Junk Space junk is made up of objects left over from space flights, such as cameras, rocket pieces, and other small pieces of debris.Occasionally space junk takes the form of a satellite directed to re-enter Earths atmosphere. Its usually directed to impact Earth in the oceans or in uninhabited areas.Agencies monitor thousands of pieces of space junk, charting the orbits of these objects.  Much space junk vaporizes due to friction with Earths atmosphere and never reaches the surface.

Monday, December 23, 2019

William Woolf s The Lighthouse - 1480 Words

Woolf’s ‘To the Lighthouse’ is written in a Modernist style, is very philosophical, does not have a traditional casual plot, and focuses on the exploration of the mind. Woolf uses experimental techniques, such as writing as a stream-of-consciousness in order to present the experience, subconscious minds, and the conscious thoughts of characters. The sense of a clear authorial narrator is missing as Woolf describes the minds of her characters in poetic images and her free-flowing style allows Woolf to flit between different characters’ minds and examine experience through various shifting perspectives. The use of this form allows her to focus on particular moments within the novel, and the plot is created by following the train of thoughts†¦show more content†¦As Julian Hanna wrote, ‘The inward turn or exploration of the psyche often said to characterize modernist literature is difficult to imagine without Freud’. Woolf seems uninterest ed in the external influences that occur during the period of the novel, and passes over significant events such as World War One, and the marriage and deaths of her characters, effectively capturing these within 10 concise chapters. The novel does not progress on a what-happens-next basis, but progresses by following the continual activity of characters’ consciousness and impressions, moving forward by a series of scenes arranged according to a sequence of several particular moments of consciousness. Writing in this style allows Woolf to convey her characters using very little physical description, so we are left to interpret them through the thoughts and opinions of other characters. Therefore it is hard for the reader to interpret because it is unclear whose perspective the opinion is from, and we do not know if they are reliable. Woolf filters all of the different characters thoughts together, and translates their emotions by writing poetically in a stream of consciousness. This allows Woolf to distort time by focusing on individual moments and skimming over others, therefore stretching out certain periods of time and condensing

Saturday, December 14, 2019

Hlten515B Implement and Monitor Care for Older Clients Dementia Free Essays

HLTEN515B implement and monitor care for older clients Written assignment 1 There are many different forms of dementia and each has its own cause. Some of the main type of dementia is Alzheimer’s disease, which is the most common form of dementia affecting 50%-70% of dementia patients (Alzheimer’s australia, 2005). This is a degenerative illness which attacks the brain, this is achieved buy tangles which are in the middle of shrunken brain cells and plaques which eventually cause the brain cells to die meaning information can no longer be recalled or assimilated. We will write a custom essay sample on Hlten515B Implement and Monitor Care for Older Clients: Dementia or any similar topic only for you Order Now There are also other types of dementia which include vascular dementia which is caused by circulation of the blood to the brain, Parkinson’s disease which is a disorder of the nervous system, Lewy-bodies dementia which is caused by the degeneration and death of the nerve cells in the brain and Huntington disease which is an inherited brain disease effecting body and mind. There are many support services out there to aid in dementia, although many people may be unaware of these services. There is also a significant impact on family and others. The early signs of dementia are subtle and vague and may not be obvious. These may include progressive and frequent memory loss, confusion, personality change, apathy and withdrawal, loss of ability to perform ADL’s, not being able to learn new information or follow direction and irrational behaviours (Dementia – diagnosis and early signs). Sometimes people do not recognise symptoms of dementia. They often assume that these indicators or behaviours are a normal part of the ageing process. There are many associated health problems when dealing with patients with dementia these may include constipation, changes in vision, changes in hearing, Infection due to a person’s health which can deteriorate very quickly due to a chest or urinary tract infection (UTI), dental problems, foot problems that are commonly associated with diabetes, elderly people with diabetes don’t always take all measures when dealing with adls, pain and poor nutrition. The uses of communication strategies are extremely important when dealing with a patient with dementia. These strategies may help with relieving distress, agitation and challenging behaviours. Strategies when dealing with dementia patients may include, â€Å"introduce yourself at each encounter, use touch as appropriate, try to determine the cause of the behaviour and then try to reduce or eliminate it. These behaviours may be caused by boredom, which you would try and use activities as a distraction, Pain which we3 will try non-pharmacological treatment first e. g. : heat packs, Anxiety where we will use reassurance and diversion. Often using a soft approach such as smiling, pleasant voice tones while talking calmly in short sentences will help defuse a situation. There are many community services out there to aid dementia patients these may include community nursing, meals on wheels, homecare, home modification, Alzheimer’s Australia, commonwealth centerlink centres, carers association, counselling, ACAT and respite care. Dementia has a huge impact on not only the lives of them self’s but also the family and carer. Watching the person you love degenerate from a fully functioning person to some one that needs to be fully cared for. As a carer, you are likely to experience a range of different feelings. This is particularly difficult because as dementia gradually causes the person’s abilities and personality to change the nature of relationships will also change (better health). The carer and family may have feelings of guilt, as is quite common to feel guilty. Another main feeling a carer or family member may have is anger, which is natural to feel frustrated and angry. You may be angry at having to be the caregiver, angry with others who do not seem to be helping out, angry at the person with dementia for difficult behavior, and angry at support services. Bibliography 8 Health Problems Associated with Dementia. (n. d. ). Retrieved from aged carer : http://www. agedcarer. com. au/topic/aged-care-health-issues/8-health-problems-associated-with-dementia Alzheimer’s australia. (2005). what is dementia. How to cite Hlten515B Implement and Monitor Care for Older Clients: Dementia, Papers

Friday, December 6, 2019

Renaissance Education Essay Example For Students

Renaissance Education Essay The Renaissance was a time of change. It began in Italy during the 14th century, and spread throughout the North. People all over Europe were affected, for the better and for the worse. Some people finally had a chance to control their own fate. Others, like upper class women, lost their social status. The values and purposes of Renaissance education were to improve the society, increase the economy, and restore the religious beliefs. The social lives of people were greatly influenced by advancements in education during the Renaissance. More people then ever before were sent to schools and educated. Schools for girls were built, and they were taught sewing, reading, writing, and dancing. Some of these schools even had teachers for singing and playing instruments. Upper class women were taught language, philosophy, theology and mathematics. But their education only prepared them for social life at home. Women lost political power, access to property and their role in shaping society. People were taught to understand and judge the writings of others. Courtiers, aristocrats and nobles were able to write poetry and text. By being well educated, having good penmanship, knowing how to ride, play, dance, sing, and dress well, men of high status gained respect and reputation. These skills also helped attain preference and support among princes. Nevertheless, the school system did not teach youth how to behave in daily life situations. They spent too much time on Grammar, Rhetoric, and Logic. Those studies that were realistic, enlightened mens minds, and prepared them for life, were reserved for the Universities. Therefore, students had a slight understanding of the meaning and the true use of knowledge. They were only able to write Latin, which no one of judgement would want to read, and when they went to universities, they wasted their friends money and their own time. Afterwards, they would return home again, as unsophisticated and uneducated as they were before. In addition, many individuals thought that having to many schools was a terrible thing. They believed that only a minority of men should study literature, because more farmers were needed than judges, more soldiers than priests, more merchants than philosophers, and more hard working groups than dreamy and thoughtful individuals. Italian humanist Piccolomini, who himself was educated, believed that philosophy and literature, should be taught to every individual, because these studies reveal the truths about the past, the reality of the present, and the prediction of the future. In his book, On the Education of Free Men, written in 1450, he wrote, where there is no literature, there is ignorance! Erasmus, a northern humanist, believed that all the knowledge within human reach lies in the literatures of ancient Greece and Rome. Renaissance education helped increase the economy of different cities in Europe, in which the Renaissance took place. Art, a very important form of self-expression, became very popular during the Renaissance. Wealthy patrons, which were usually educated, supported artists and paid them huge salaries to do works of art. Advances in education, allowed Italians to improve their shipbuilding techniques, thus increasing trade and allowing their ships to sail all year long. Venice traded overseas, while Genoa traded with the Middle East and Northern Europe. Knowledge of languages, penmanship, dancing, singing, and dressing well aided men of high status to great profit and honor. Florence was full of wealthy and educated merchants and bankers, who began to dominate Europes banking. As a result the economy began to grow. With a stronger and larger economy, more schools were built. With more school systems available, more children were able to receive an education, and thus more students were able to attend universities, and later on take part in this growing economy. Renaissance education helped restore religious beliefs. .u22186648812307f690ab9db31fe5da1b , .u22186648812307f690ab9db31fe5da1b .postImageUrl , .u22186648812307f690ab9db31fe5da1b .centered-text-area { min-height: 80px; position: relative; } .u22186648812307f690ab9db31fe5da1b , .u22186648812307f690ab9db31fe5da1b:hover , .u22186648812307f690ab9db31fe5da1b:visited , .u22186648812307f690ab9db31fe5da1b:active { border:0!important; } .u22186648812307f690ab9db31fe5da1b .clearfix:after { content: ""; display: table; clear: both; } .u22186648812307f690ab9db31fe5da1b { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u22186648812307f690ab9db31fe5da1b:active , .u22186648812307f690ab9db31fe5da1b:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u22186648812307f690ab9db31fe5da1b .centered-text-area { width: 100%; position: relative ; } .u22186648812307f690ab9db31fe5da1b .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u22186648812307f690ab9db31fe5da1b .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u22186648812307f690ab9db31fe5da1b .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u22186648812307f690ab9db31fe5da1b:hover .ctaButton { background-color: #34495E!important; } .u22186648812307f690ab9db31fe5da1b .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u22186648812307f690ab9db31fe5da1b .u22186648812307f690ab9db31fe5da1b-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u22186648812307f690ab9db31fe5da1b:after { content: ""; display: block; clear: both; } READ: The Marathon Runner EssayAt least twice a year, every priest was to give a warning to the people attending worship that they best send their children to school. Not only for learning the liberal arts, but also about discipline, virtue, and God. If this was not done, then permanent damage might have resulted to the child. As children grow up without fear and knowledge of God, they learn nothing about what is needed to achieve salvation and nothing about discipline. As a consequence, they learn nothing about what is helpful to them in life. Some men believe that learning is nourishment of the sinful nature of women. When women are taught to read the classics, these books teach them good manners. When they are taught to write, their writings should be serious sentences, which are wise and virtuous, and taken out of Holy Scripture, or are the sayings of philosophers, instead of unimportant songs. The Renaissance was a time of change that began long ago, and has never ended since. It was a rebirth of humanistic culture and an enhancement in education. Even today, Renaissances are occurring everywhere: all over the world, in our families, and within ourselves.

Friday, November 29, 2019

Strategic Management IDP Education Australia

Company Overview IDP education is one of the world’s leading institutions that offer assistance to foreign students wishing to pursue their studies in oversees countries, such as the United States, the United Kingdom, and Australia. The institution engages in student enlightenment regarding various courses offered in universities abroad. The company is based in Australia with branches all over the world.Advertising We will write a custom report sample on Strategic Management: IDP Education Australia specifically for you for only $16.05 $11/page Learn More One of the responsibilities of the organization is to offer English tests to students aspiring to further their studies in foreign countries. In this regard, it owns one of the best language tests referred to as IELTS. With time, the company has been able to form global partnerships in order to compete effectively in the highly unpredictable market1. Currently, the company is the largest student recruitment institution with offices in various parts of the world. The company is considered one of the rapidly growing institutions in the Australian economy given the fact that it operates in various developing economies, such as Brazil, China, India, and Russia. Studies show that the company has grown to be a multinational company since it is entrusted with the role of administering higher education fund and aid in various countries. The management of the company realized that forming partnerships with oversees governments would be the best practice towards realizing educational needs of the soaring number of students hoping to pursue studies abroad2. The mission statement of the organization clearly demonstrates its desire to engage in the best practices that would convene the needs of various students. One of the mission statements of IDP Education Australia is to offer quality international student services through provision of timely advice to clients pertaining to the admis sion requirements in the Australian institutions of higher learning. Moreover, the organization engages in assessment and evaluation of student services, such as provision of portfolio of review and offering essential credential tools, including the English test.Advertising Looking for report on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More The Development of IDP Education The company has gone through a number of developmental challenges to be what it is today. It was established in 1969 as an Australian agency in charge of coordinating higher education activities in the country. The main task of the organization was to offer help to various students in need of higher education in the country, particularly those from South-East Asia. The initial name of the organization was AAUCS (Australian Asian Universities’ Cooperation Scheme), but the name was changed to IDP (International Development Program) in order to re flect its diversity. Since its inception, a number of stakeholders, including the Australian agency in charge of education, various oversees governments, established funding agencies, other international institutions of higher learning, and the corporate sector have been its major developmental partners. With time, the company has formed a constructive working relationship with parents and students, who are considered the company’s major stakeholders. To achieve its goals, the company appreciates the fact that meeting the demands of the market is paramount to success3. In this regard, the management of the organization incorporated a number of values into its managerial agenda, one of the values being leadership. The kind of leadership espoused meets the international standards since it observes the issue of cultural diversity. In the global society, any organization intending to operate at a global level must respect the values and beliefs of other people. Other values, such as customer service, quality assurance, focus, empowerment, risk-taking, reliability, sincerity, ingenuousness, and development of teams are attributed to the growth of the company. Formation of teams is one of the critical tools of strategic management since it enhances goal achievement and attainment of the major objectives. With time, the company grew to be one of the most respected international companies offering professional advice on matters related to education. Its desire to meet the requirements facilitated the achievement of its status as the market leader in issues to do with higher learning education4.Advertising We will write a custom report sample on Strategic Management: IDP Education Australia specifically for you for only $16.05 $11/page Learn More Current Situation Currently, the organization offers a number of free online services, such as admission choices and professional support services at no cost. This gives the company a compe titive advantage in the highly aggressive market that does not favour any player. Apart from offering online support services at no fee, the company provides extensive services on visas through partnerships with relevant agencies in oversees governments. Small-scale companies and individuals who had inadequate capital previously dominated the international educational services market. IDP education has played a critical role in shaping the education sector globally, especially in connecting Australian institutions of higher learning to the global market. Analysts observe that IDP education is the major contributor to exports. It is surprising to note that services offered by the IDP education globally surpass the wool exports, even though wool the most exported product in the country. The proceeds from student travel and fees, including the living expenses, increases significantly each year. Currently, the organization is engaging in various programs to ensure that Australian univer sities establish strong links with foreign institutions and students. The introduction of the English language test service is considered an advantage, as it has helped the company gain popularity even in developed countries5. Many universities around the world appreciate the role of IDP education meaning that its English tests are valid and applicable all over the world. The organization applies a unique business model that has attracted foreign students to the Australian universities. Student recruitment has been shaped globally, with some analysts observing that this has a direct and a significant impact on the mobility of students in various nations. The institution has had a positive influence to the higher education in the country, as well as in other region. Recently, New Zealand has engaged in marketing activities to promote their universities globally. In this regard, it is observed that IDP education is a market leader locally, regionally, and globally. The United Kingdom and Canada are some of the countries that are also engaging in marketing strategies to attract students to their local universities6.Advertising Looking for report on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Based on the current position of the company and its market share, it is observed that the future is bright for IDP education. In 2005, the company had various visitors who were mainly investors inquiring on whether they can pump their capital to help the organization expand. Negotiations are ongoing to make the company one of the Australia’s prime employers. The company is able to withstand any form of competition in case capital is pumped into some of its established projects. Strategic Issue IDP education is an established company that employs various strategic management methods, one of them being cost advantage strategy while the other is differentiation strategy. Cost leadership strategy suggests that products should be offered at an affordable cost to encourage many customers to make purchases. However, the strategy is faced with several problems, among them being operating at a loss. IDP education operates at a large-scale meaning that it is able to offer services at a low cost while at the same time making a profit. Other multinational companies, such as Wal-Mart applied the strategy successfully to compete effectively in with established chain stores. While other institutions charge students in offering support services, IDP does not demand anything from clients whenever they need support services. Additionally, clients are able to access visa services at no cost, even though the organization spends considerable finances on arranging for these services. Studies show that a customer will always use a service based in its price. An expensive service might be of interest to high-end market, but the quality of service should be higher to sustain such a market. IDP education is the most reliable to many clients, as its prices are avoidable and the type of the service offered meets the needs of many clients7. The organization is known to employ differentiation strategy whose main aim is to offer a various products and services to clients. Some of th e services that IDP education offers are out of reach to many competitors8. Based on this, the company is able to outmuscle competitors hence giving it an advantage. Dell is one of the companies operating in the electronics company that launched mass-customizations on computers specifically to convene the needs of customers. Many organizations specializing on differentiation strategy have registered massive sales that have played a role in realizing their aims and objectives. In this case, differentiation strategy has a positive impact on the performance of the organization. Bibliography Clulow, Val, Gerstman, Julie, and Barry, Carol. â€Å"The resource-based view and sustainable competitive advantage: the case of a financial services firm†. Journal of European Industrial Training, 27.5 (2003): 220–232. Erica, Olsen. Strategic Planning Kit for Dummies. John Wiley Sons, 2012. Grant, Robert. Contemporary Strategic Management: An Australasian Perspective. Milton: John Wi ley and Sons Australia, 2011. Hitt, Michael, and Hoskisson, Robert. Strategic Management: Competitiveness Globalization: Cases. Mason: South-Western, Cengage Learning, 2013. Lau, Ronald. â€Å"Competitive factors and their relative importance in the US electronics and computer industries†. International Journal of Operations Production Management, 22.1 (2001): 125–135 Powell, Thomas. â€Å"Competitive advantage: logical and philosophical considerations†. Strategic Management Journal, 22.9 (2001): 875–888. Rijamampianina, Rasoava, and Russell, Yumiko. â€Å"A framework for concentric diversification through sustainable competitive advantage†. Management Decision, 41.4 (2004): 362-372. Warf, Frederick and Stutz, Barney. The world economy : resources, location, trade and development. Upper Saddle River: Pearson, 2007. Footnotes 1Frederick Warf and Barney Stutz, The world economy: resources, location, trade and development (Upper Saddle River: Pearso n, 2007), p. 14. 2Thomas Powell, â€Å"Competitive advantage: logical and philosophical considerations†, Strategic Management Journal, 22.9 (2001), p. 888. 3Val Clulow, Julie Gerstman, and Carol Barry, â€Å"The resource-based view and sustainable competitive advantage: the case of a financial services firm†, Journal of European Industrial Training, 27.5 (2003), p. 12. 4Michael Hitt, and Robert Hoskisson, Strategic Management: Competitiveness Globalization: Cases (Mason: Southwestern, Cengage Learning, 2013), p. 45. 5Ronald Lau, â€Å"Competitive factors and their relative importance in the US electronics and computer industries†, International Journal of Operations Production Management, 22.1 (2003): 125–135 6Olsen Erica, Strategic Planning Kit for Dummies (John Wiley Sons, 2012), p. 23. 7Robert Grant, Contemporary Strategic Management: An Australasian Perspective (Milton: John Wiley and Sons Australia, 2011), p. 19. 8Rasoava Rijamampianina and Yumiko Russell. â€Å"A framework for concentric diversification through sustainable competitive advantage†. Management Decision, 41.4 (2004): 362-372. This report on Strategic Management: IDP Education Australia was written and submitted by user Alexa U. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Monday, November 25, 2019

Medically Assisted Suicide Problem

Medically Assisted Suicide Problem Abstract This study examines the concept of assisted suicide. Precisely, it will look at whether medically assisted suicide is permissible and when an individual can be denied an opportunity to seek medically assisted suicide.Advertising We will write a custom essay sample on Medically Assisted Suicide Problem specifically for you for only $16.05 $11/page Learn More The arguments in this study are drawn from the writings of Susan Wolf on the death of her father. The study, also discussed the extent to which agree and disagree with the ideas of Wolf. Introduction Assisted suicide refers to actions undertaken by one individual to assist another voluntarily end his or her own life. Assistance is offered by providing the person with the means to end life. These means may include drugs, equipment, or other actions that aid in ending life. Assisted suicide differs from euthanasia that is an act of people ending their own lives without assistance from others (Mosse r, 2010). According to Susan Wolf (2008), her father’s death made her rethink her writings against the legalization of euthanasia and physician-assisted suicide. Wolf did a writing entitled’ end-of-life care’ that her father challenged and his views on medically assisted suicide are worthy support. In my opinion, every person has a right to make choices on what should be done with their own lives provided they do not cause any harm to other members of the society. Therefore, seeking assistance to end one’s life is a right of free choice and individuals should not be opposed if they wish to terminate their lives. Most sick persons wish to die dignified deaths but their illnesses may have incapacitated them to such an extent that they lack the strength to kill themselves. When such persons ask for assistance to end their lives, their wishes should be respected since dying is a choice they have made under no one’s influence or coercion (Weir, 1997). H uman beings have a responsibility to relieve the suffering of those who are in pain. There are too many people in hospitals facing painful conditions and terminal illnesses that make them permanently unable to function like other human beings.Advertising Looking for essay on ethics? Let's see if we can help you! Get your first paper with 15% OFF Learn More These people undergo suffering, their lives are degraded and most of them are economically unproductive and a burden to their families and the entire society. Since these sick people were once productive, illnesses make them experience feelings of low esteem and they may opt for death. In situations when these people beg for help that would end their indignity and the pain they are going through, it is recommendable that physicians assist them (Weir, 1997). Human beings have the right to self-determination and they should be allowed to exercise what they view as best for them; people should be permitted to make decisions that affect their own lives. As a result, when people want to commit suicide or to be assisted to die, they should not be interfered with; instead should be facilitated to do so. There are a variety of choices that one can make in life death being one of them, and as such one’s will to die should not be opposed (Mosser, 2010). The capacities of individuals facing medical conditions such as mental illness cannot be easily restored. Such kinds of patients are normally stigmatized by the society, have miserable lives due to neglect by their family members. When such patients approach medical practitioners seeking assistance to end their lives, they should be facilitated to die. Reasons why I agree with Susan Wolf To an extent, I agree with Wolf’s ideas opposing the act of assisted suicide because of the following reasons: The society has an obligation and duty to preserve life and therefore individuals should not be allowed to commit suicide as they wish be cause it is morally wrong to encourage suicide. If laws are passed permitting assisted suicide, relatives of sick individuals may even urge them to seek suicide to end the suffering and pain (Weir, 1997).Advertising We will write a custom essay sample on Medically Assisted Suicide Problem specifically for you for only $16.05 $11/page Learn More Sanctioning suicide is a violation of other people’s rights. If suicide is permitted, doctors and other medical practitioners may even cooperate in the murder of a patient who is not willing to die. It is not just for individuals to go against some convictions as a way of satisfying desires of patients who are willing to die (Wolf, 2008). Reasons for disagreeing with Wolf Medically assisted suicide should be encouraged because it results from the free will of suffering individuals without them being compelled to commit suicide. There is an agreement between the patients and the medical practitioners who facili tate this suicide, therefore assisted suicide should not be viewed as an immoral act for the reason that the sick individuals are not coerced to do so but they confront physicians to assist them. Conclusion The above study has summarized medically assisted suicide pointing out the arguments for and against the practice. Assisted suicide could be beneficial as it relieves the pain of the suffering individual. On the other hand, it is morally incorrect to assist other people end their lives. References Mosser, K. (2010). A Concise Introduction to Philosophy. San Diego: Bridgepoint Education Wolf, S. M. (2008).Confronting Physician-Assisted Suicide and Euthanasia: My Fathers Death. Minnesota: The Hastings Center Report. Weir, R.F. (1997). Physician assisted suicide. Washington: Indiana University press.

Thursday, November 21, 2019

Nursing Clinical Negligence Assignment Example | Topics and Well Written Essays - 250 words

Nursing Clinical Negligence - Assignment Example The issues which are required to be considered in the risk assessment process are the activities in the context of physical and emotional environment and organisational culture. Moreover, considering the potential number of patients who are likely to be affected, and potential consequences of the hazards are few of the major considerations of a clinical risk assessment process (Logan & Johnstone, 2012). During the process of risk assessment, the implementation of a set of effective and simple steps can be practiced by the nursing staff. The steps associated with an effective risk assessment process have been provided hereunder. The study provided rich understanding regarding the risk assessment process in clinical practice. It has been learnt that the steps associated with risk assessment is a set of simple technique that enables the healthcare institutions to avert different types of clinical risks or hazards. In nursing practices clinical negligence is often reported which has a severe impact on the well-being of patients. Correspondingly, the understanding derived from the study regarding the effectiveness of the risk assessment process and associated steps can be applied to reduce any instances of clinical negligence. Allnutt, S. H. & et. al., 2010. Clinical Risk Assessment & Management: A Practical Manual for Mental Health Clinicians. Justice Health. [Online] Available at: http://www.justicehealth.nsw.gov.au/publications/handbook-february-2011.pdf [Accessed November 09, 2014]. Boland, B., 2010. Clinical Risk Assessment and Management for Individual Service Users: Policy and Procedures. NHS Foundation Trust. [Online] Available at: http://www.hpft.nhs.uk/_uploads/documents/the-trust/freedom-of-info/disclosure/clinical-risk-assessment-and-management.pdf [Accessed November 09, 2014]. Department of Health, 2007. Best Practice in Managing Risk. National Mental Health Risk Management Programme. [Online] Available at:

Wednesday, November 20, 2019

Insight in Australian ancient Aboriginal Rock- Art Essay

Insight in Australian ancient Aboriginal Rock- Art - Essay Example The essay "Insight in Australian ancient Aboriginal Rock- Art" discovers what is rock art and analyzes evaluation of its relevance in a broader context of Aboriginal Art. Pictographs are the ones, which are applied on the rock like paintings, drawings, stencils, daubing, and beeswax motifs. The ones, made by engravings, incisings, peckings, etchings etc, are known as petroglyphs. Rock here is a geological surface that is as soft as mud on which painting or engraving is done. Art however is a substitute word for image/picture/marking etc. Put together it would represent the art or visual images on the rock left or made by our pre-historic ancestors. It’s a form of visual, illustrated history of human race. Our pre-historic ancestors have represented themselves and their cultural and individual identities through the most durable medium of stone or rock. The paintings in the Arnhem Land, central north coast of Australia portray the ecological changes. These are seen from the cha nging depiction of flowers and animals. Aboriginals from Arnhem say that the Mimi spirits have done the Rock-Art paintings. Mimis are graceful sticky figures, red ochre in colour and live in the crevices of the rocks, to come alive in the night. They have created self-portraits and are also known as dreaming ancestors who have passed on the traditions of painting, hunting, dancing, and composing music to generations. The birds, which were eaten, the weapons used for hunting are also seen. Paintings on Australia’s northern shore.

Monday, November 18, 2019

Australian law Essay Example | Topics and Well Written Essays - 1000 words

Australian law - Essay Example If a professional adviser is found to knowingly having provided or failed to provide information that exposes the advisee to incur any losses or damages on their part, this considered to be a breach of duty. All professionals are generally held to an established and reasonable standard of basic care and professionalism. Professionals are generally required to have the necessary learning and skill that is seen to be commonly processed by members who happen to be held in good standing within their basic profession.2 However, any lack of the proper degree of training, failure by the professional to attempt to follow up on a client’s progress, failure to remain appropriately conversant with any new emerging discoveries in the field, or failure to refer to a specialist in the event that it proves to be necessary can all be seen to constitute of negligence.3 As exemplified in the line of reasoning followed in the Hedley Byrne ruling, when an adviser communicates information to an ad visee in order that the information might be used for a generally described or particularly specified purpose, and the advisee acts on this advice to his detriment, the adviser is found to fundamentally be guilty of negligence.4 Effects of Donoghue V Stevenson (1932) A decision by the British house of commons in 1932 concerning the alleged presence of a snail inside a ginger beer bottle is commonly perceived to be the best known judgment in the entire common law world. It is widely regarded as the primary foundation law of negligence throughout the entire British Commonwealth.5 Although the ruling of Donoghue V Stevenson (1932), was initially mostly applied to judgments pertaining to manufacturers and the duty of care that they happened to owe the various consumers of their products it was eventually seen to have wider relevance beyond manufacturer liability. In the ruling, Atkins was seen to assert that a duty to exercise case was actually owed to all persons who might be directly affected by one’s actions or omissions that happen to be called in question.6 This is seen to critically affect the liability of all professional advisers as in their event that they provide questionable information that eventually proves to be detrimental to the advisee, they are then effectively held viable for court action. The Effects of Hedley Byrne v. Heller (1963) The Hedley Byrne v. Heller (1963) greatly impacted the overall liability of professional advisers as it was the first decision to recognize the possibility of there being a liability for want can be perceived to be purely economic loss that is not dependent on there being a contractual relationship, for negligent statements. This was seen to affect advisers as any information that they may happen to give while not bound to any contractual agreement can also be seen to create duty of care as it might be relied upon by the advisee in determining whether to enter into a contract.7 Recent Developments in Australi an High Court There have been a number of recent developments in Australia pertaining to the case of professional negligence, in Astley v Austrust Ltd,

Saturday, November 16, 2019

Overview of VPN Evolution of Private Networks

Overview of VPN Evolution of Private Networks Before the emergence and popularity virtual private networks have gained as a secure and cheaper medium for sensitive information to be accessed and transmitted between two or more corporate network over a public network such as the internet, other network technologies have been innovated and used to connect within business sites and across to other sites that are miles away from each other. In the sixties, sites were connected together to enable data transfer through the use of analog phone lines and 2,400-bps modems leased from ATT, businesses had no other faster modems they could choose from because the telephone companies were controlled by the government. It was not until the early eighties that businesses were able to connect to sites at higher speed using 9,600-bps modems because other telephone companies emerged as a result of the changes in government control and policy on telephone. During this period, there were not much mobile workers besides the modem links were static not as dynamic as what is available now. The analog phone lines were permanently wired to the sites and were specially selected lines (called conditional lines) that were specifically built for full time use by companies; these lines are different from regular phone lines. This technology ensured full bandwidth and privacy but this came at a great cost, i.e. payment is expected for the full ba ndwidth even if the line was used or not. Another innovation that was used for connecting sites which came out in the mid 1970s was the Digital Data Service (DDS). This was the first digital service with a connection of 56 Kbps and was used for private line. This service later became a major and useful innovation for wide area networks, which grew into other services that are popularly used today such as the T1 service which consists of 24 separate channels and each can carry up to 64 Kbps of either data or voice traffic. In the late 1970s the idea of VPN was initiated with the introduction of an innovation called the X.25. It is a Virtual Connection (VC) form of WAN packet switching which logically separates data streams. With this function, the service provider is able to send as many point-to-point VCs across a switch network infrastructure, depending each endpoints have a device that facilitates communication in the site. Sometime in the early 1980s, X.25 service providers offered VPN services to customers (i.e. businesses) who used network protocols at the time as well as early adopters of TCP/IP. Over years, in the 1990s other networking technologies were deployed for connecting private networks such as the high speed Frame relay and Asynchronous Transfer Mode (ATM) switching. This networking technologies were provided to give virtual connection to businesses at the speed of up to OC3 (155 Mbps). The components for setting up this kind of technologies involved the use of customer IP routers (customer premise equipment, or CPE) interconnected in a partial or full mesh of frame relay or ATM VCs to other CPE devices, in other words less equipments are needed for its set up. – Metz, C. (2003). Based on some definitions and some researchers like Mangan, T. (2001), the frame relay and ATM technology are referred the standard for VPN technology. These technologies gained so much popularity after the leased line in connecting sites and they were also easy to set up. With the increasing speed at which businesses grow and expand globally, thereby allowing staffs to be mobile and work offsite, the frame relay is not the best technology to use for remote access since it is just an overlay technology. In as much as the leased line is a better technology alternative for connecting business sites, it is excessively expensive to be owned. With the advent of the internet and its wide use in everyday transaction, businesses have adopted the technology for transmitting and accessing data across various sites by implementing a VPN connection, which is relatively cheap, flexible and scalable, between both sites in order to secure the data that are sent across the insecure internet from being tampered by unauthorized persons. VPN definition There are various definitions of a Virtual Private Network (VPN) which are given by various vendors which best describes their products. Several books, journals, whitepapers, conference papers and internet sites have various definitions of what the technology is, and these definitions are usually put in different words and sentence structure but mostly they say the same thing. In order to get a good understand of what the technology is all about, definitions given by several people from different sources will be looked at and a concise definition will be formulated from all definitions that will be used throughout this research work. â€Å"A virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organizations network.† SearchSecurity.com (2008). â€Å"A VPN is a group of two or more computer systems, typically connected to a private network (a network built and maintained by an organization solely for its own use) with limited public-network access that communicates securely over a public network.† (Calsoft labs whitepaper, 2007) Aoyagi, S. et al. (2005) A Virtual Private Network (VPN) enables a private connection to a LAN through a public network such as the Internet. With a VPN, data is sent between two nodes across a public network in a manner that emulates a dial-link. There are two types of VPN systems, one is used for connecting LANs across the Internet, and the other is used to connect a remote node to a LAN across the Internet. â€Å"A VPN tunnel encapsulates data within IP packets to transport information that requires additional security or does not conform to internet addressing standards. The result is that remote users act as virtual nodes on the network into which they have tunnelled.† – Kaeo, M. (2004) p135. â€Å"A VPN is a virtual network connection that uses the internet to establish a connection that is secure.† Holden, G. (2003), p 286. â€Å"A VPN uses a public network, such as the internet, to facilitate communication; however it adds a layer of security by encrypting the data travelling between companies and authenticating users to ensure that only authorized users can access the VPN connection†. Mackey, D. (2003) p157 Randall, K. et al. (2002), p377 likened a Virtual Private Network (VPN) to a Tunnel Mode, as a means of transmitting data between two security gateways, such as two routers, that encrypts the entire IP packet and appends a new IP header entering the receiving gateways address in the destination address. â€Å"VPNs enable companies to connect geographically dispersed offices and remote workers via secure links to the private company network, using the public Internet as a backbone.† Lee, H. et al (2000) Looking at all these definitions closely from various authors, they all stress on security and connectivity. These are the essential features of VPNs because they are able to create a connection between two private networks over a public network by encapsulation and tunnelling protocols in transmitting data and also provide security by encryption and authentication in order to control access to data and resources on the company’s network. In other words a VPN is a network technology that securely connects two or more private networks over an insecure public network such as the internet, so as to enable internal access to files and resources and data transfer. Types of VPN There are three different VPN connectivity models that can be implemented over a public network: Remote-access VPNs: It provides remote access to an enterprise customer’s intranet or extranet over a shared infrastructure. Deploying a remote-access VPN enables corporations to reduce communications expenses by leveraging the local dial up infrastructures of internet service providers. At the same time VPN allows mobile workers, telecommuters, and day extenders to take advantage of broadband connectivity. Access VPNs impose security over analog, dial, ISDN, digital subscriber line (DSL), Mobile IP, and cable technologies that connect mobile users, telecommuters, and branch offices. Intranet VPNs: It links enterprise customer headquarters, remote offices, and branch offices in an internal network over a shared infrastructure. Remote and branch offices can use VPNs over existing Internet connections, thus providing a secure connection for remote offices. This eliminates costly dedicated connections and reduces WAN costs. Intranet VPNs allow access only to enterprise customer’s employees. Extranet VPNs: It links outside customers, partners, or communities of interest to an enterprise customer’s network over a shared infrastructure. Extranet VPNs differ from intranet VPNs in that they allow access to uses outside the enterprise. VPN configurations There are two main types of VPN configurations for deploying the VPN connection over a public network. These are; Site-to-site VPNs: This is sometimes referred to as secure gateway-to-gateway connections over the internet, private or outsourced networks. This configuration secures information sent across multiple LANS and between two or more office networks and this can be done effectively by routing packets across a secure VPN tunnel over the network between two gateway devices or routers. The secure VPN tunnel enables two private networks (sites) to share data through an insecure network without fear that the data will be intercepted by unauthorized persons outside the sites. The site-to-site VPN establishes a one-to-one peer relationship between two networks via the VPN tunnel Kaeo, M. (2004. Also Holden, G. (2003), describes a site-to-site VPN as a link between two or networks. This is mostly used in Intranet VPNs and sometimes in extranet VPNs. Client-to-Site VPNs: This is a configuration that involves a client at an insecure remote location who wants to access an internal data from outside the organization network’s LAN. Holden, G. (2003) explains a client-to-site VPN as a network made accessible to remote users who need dial-in access. While Kaeo, M. (2004) defined a client-to-site VPN as a collection of many tunnels that terminate on a common shared end point on the LAN side. In this configuration, the user needs to establish a connection to the VPN server in order to gain a secure route into the site’s LAN and this can be done by configuring a VPN client which could either be a computer operating system or hardware VPN – such as a router. By so doing, the connection enables the client to access and use internal network resources. This kind of configuration is also referred to as secure client-to-gateway connection. This is usually used in access VPNs and sometimes in extranet VPNs. VPN Topology VPN Components To create a VPN connection between sites or networks, it involves the use of some components. These components however contain some elements that need to be properly set up in order to aid the transmission of data from one network endpoint to another. These elements include: VPN server: This is either a computer system or router configured to accept connections from the client (i.e. a remote computer) who gains access by dialling in or connecting directly through the internet. This serves as one endpoint of the VPN tunnel. VPN client: This can either be a hardware based system; usually a router that serves as the endpoint of a gateway-to-gateway VPN connection, or a software based system; either an inbuilt or downloaded software program on the computer operating system that can be configured to function as an endpoint in a VPN, such as Windows XP, 2000 or vista or checkpoint client software. Tunnel – this is the link between the VPN server and client endpoints through which the data is sent. VPN protocols – These are set of standardised data transmission technologies the software and hardware systems use to create security rules and policies on data sent along the VPN. Types of VPN Systems The VPN components form the endpoints of the VPN connection from one private network to another through the public network. The choice of what components to use is dependent on various factors such as the size of the organization – is it a small, large or growing organization, the cost involved in implementing a VPN either by using new components or existing components and lastly, the choice of which of the components will is best for the connection. There are three components that can be used to set up a VPN connection, also a combination of any of these components can be used to set up a VPN connection. One way to set up a VPN is to use Hardware device. The hardware device is a VPN component that is designed to connect gateways or multiple LANS together over the public network by using secure protocols to ensure network and data security. There are two devices that are commonly used that perform these functions. One typical hardware based VPN device used is a router, which is used to encrypt and decrypt data that goes in and out of the network gateways. Another device is a VPN appliance, its objective is to terminate VPNs connection and join multiple LANs (Holden, G. 2003). This device creates a connection between multiple users or networks. The VPN hardware devices are more cost effective for fast growing organizations since they are built to handle more network traffic. It is a better choice when considering the network throughput and processing overhead. It is also a good choice when the routers used at each network ends are the same and controlled by the same organization. Another way to set up a VPN is to use a Software based component. The software component is a program, otherwise stored on the operating system of the system, which can be used to set up a VPN connection. It is easy to configure and more flexible and cost effective than the hardware VPN. They are suitable in networks that use different routers and firewalls or are best used between different organizations and network administrators – such as partner companies. The software VPNs allow traffic to be tunnelled based on address or protocols unlike hardware-based products, which generally tunnel all traffic that it handles. But software-based systems are generally harder to manage than hardware based systems. They require familiarity with the host operating system, the application itself, and appropriate security mechanisms. And some software VPN packages require changes to routing tables and network addressing schemes (Calsoft labs whitepaper, 2007). The third component, is the Firewall based VPN; it makes use of the firewall’s mechanisms as well as restricting access to the internal network. This kind of component ensures that the VPN traffic passes through the network gateway of the desired destination and non-VPN traffic is filtered according to the organization’s security policy, this is achieved by it performing address translation, making sure that requirements for strong authentication are in order and serving up real-time alarms and extensive logging. These three components can be combined together to set up a VPN in order add layers of security on the network. This can be a combination of hardware and software VPN or a combination of all three in the same device. There are several Hardware based VPN packages that offer software –only clients for remote installation, and incorporate some of the access control features more traditionally managed by firewalls or other perimeter security devices (Calsoft labs whitepaper, 2007). An example of such device is the Cisco 3000 Series VPN concentrator which gives users the option of operating in two modes: client and network extension mode. In the client mode the device acts as a software client enabling a client-to-host VPN connection while in the extension mode it acts as a hardware system enabling a site-to-site VPN connection. Also a combination of all these components by different vendors can be used to set up a VPN connection, but this comes with some challenges. The solution as proposed by Holden, G (2004) is to use a standard security protocol that is widely used and supported by all products. VPN Security Features The main purpose of VPN is to ensure security and connectivity (tunnel) over a public network and this cannot be done without some key activities being performed and policies set up. For VPNs to provide a cost–effective and better way of securing data over an insecure network it applies some security principles/measures. Data sent over the internet using the TCP/IP rule are called packets. A packet consists of the data and an IP header. The first thing that happens to a data being sent across a VPN is that it gets encrypted at the source endpoint and decrypted at the destination endpoint. Encryption is a method of protecting information from unauthorised persons by coding the information that can only be read by the recipient. The method, encryption, is done by using an algorithm which generates a key that allows information to be coded as unreadable by all and only readable to the recipient. The larger the number of data bits used to generate the key, the stronger the encryption and the harder it can be broken by intruders. Data encryption can be done in two ways; it can either be encrypted by transport mode or tunnel mode. These modes are process of transmitting data securely between two private networks. In transport mode, the data part (otherwise known as the payload) of the IP packet is encrypted and decrypted but not the header by both endpoint hosts. While in the tunnel mode both the data part and header of the IP packet are encrypted and decrypted between the gateways of the source computer and the destination computer. Another security measure implemented by VPN on data is IP Encapsulation. The VPN uses the principle of IP encapsulation to protect packets from being intercepted on the network by intruders by enclosing the actual IP packet in another IP packet having the source and destination address of the VPN gateways, therefore hiding the data being sent and the private networks IP address which â€Å"does not conform to internet addressing standards†. The third security measure is Authentication. This is a method of identifying a user by proving that the user is actually authorized to access and use internal files. Authenticating a, host, user or a computer that uses the VPN depends on the tunneling protocol established and also encryption for added security. The tunneling protocols that are widely used for authentication over a network are IPSec, PPTP, LT2P and SSL but the most commonly used is the IPSec. The hosts using VPN establish a Security Association (SA) and authenticate one another by exchanging keys which are generated by an algorithm (mathematical formula). These keys can either be symmetric key which is a private key that are exactly the same and only known by the hosts to verify the identity of one another or asymmetric key where each hosts has a private key that can be used to generate a public key. The sending host uses the other’s public key to encrypt information that can only be decrypted by the receiving host private key. The Point-to-Point Tunneling Protocol uses the Microsoft Challenge/Response Authentication Protocol (MS-CHAP) to authenticate computers using VPN by exchanging authentication packets to one another. Also the users connecting to VPN can be authenticated by what the user knows- a password (shared secret), what the user has – a smart card and what the user is – biometrics e.g. finger prints. VPN Tunnelling Protocols VPNs create secure connections, called tunnels, through public shared communication infrastructures such as the Internet. These tunnels are not physical entities, but logical constructs, created using encryption, security standards, and protocols Clemente, F. et al (2005). The VPN tunnelling protocol are set of standardised rules and policy that are employed on the transmitted data. There are various standard of protocol technologies used to create a VPN tunnel and each of these protocols is specially built with some unique security features. In this research work the protocols explained in this section are the most widely used. Internet Protocol Security (IPSec) The Internet Protocol Security (IPSec) has proposed in Internet Engineering Task Force (IETF) Request for Comment (RFC) database in RFC (2401), provides data packet integrity, confidentiality and authentication over IP networks. The IPSec policy consists of sets of rules that designate the traffic to be protected, the type of protection, such as authentication or confidentiality, and the required protection parameters, such as the encryption algorithm. (Jason, K. 2003, Hamed, H. et al 2005, Shue, C. et al 2005, Berger, T. 2006, Clemente, F. et al 2005, Liu, L. and Gao, W. 2007). The IPSec protocol provides security at the network layer and offers a collection of methods, protocols, algorithms and techniques to establish a secure VPN connection. There are two basic modes of IPSec connections, Transport mode and Tunnel mode. The transport mode, attaches an IPSec header to the IP header of the packet. The Tunnel mode is more flexible compared to the transport mode; it encapsulates the IP packet into another IP packet, also attaching an IPSec header to the outer IP packet. This mode protects the entire IP packet. The IPSec modes, are determined and agreed on by both corporate networks at each end of the VPN connection, are contained in the Security Association(SA) among other things. The SA is a set of policy and keys used to protect information such as the IPSec modes, symmetric ciphers, and keys which are used during secure data transmission. The IPSec uses two main protocols that are usually used with any of the modes, the Authentication Header (AH), and Encapsulating Security Payload (ESP). The authentication header contains a Security Parameter Index(SPI) and provides data authentication and integrity (MD5 or SHA-1 hash) on the whole IP packet but does not guarantee privacy (confidentiality) on the data. ESP guarantees privacy (confidentiality) on the data in addition to all the features AH provides. The ESP header includes an initialization field, which is used by symmetric block ciphers (Berger, T. 2006). Another essential protocol that IPSec uses in establishing the VPN tunnel is the Internet Key Exchange protocol (IKE). This protocol exchanges encryption keys and shares authentication data (RFC 2409) through UDP packets at port 500, and also relies on the Internet security association and key management protocol(ISAKMP) – this protocol allows both endpoints share a public key and authenticate themselves with digital certificates (RFC 2408). To create a VPN tunnel using the IPSec protocol, two things needs to be done. First, both networks need to agree on the SA for the IKE and this is done by using the Diffie – Hellman key exchange method to authenticate one another. After this is done, both network endpoints need to set the parameters for the VPN tunnel including symmetric cipher keys (and key expiry information), security policy, network routes, and other connection-relevant information. Point-to-Point Tunneling Protocol (PPTP) Point-to-Point Tunneling Protocol (PPTP) is a network protocol that enables the secure transfer of data from a remote client to a private enterprise server by creating a virtual private network (VPN) across TCP/IP-based data networks (Microsoft TechNet, 2008). PPTP operates at Layer 2 of the OSI model. PPTP, as specified in the RFC 2637 document, is a protocol that describes a means for carrying Point-to-Point protocol (PPP) – described in RFC 1661 – over an IP based network. It is created by a vendor consortium known as the PPTP industry forum which includes Microsoft Corporation, Ascend Communications, 3Com/Primary Access, ECI Telematics, US Robotics and Copper Mountain Networks. PPTP is the most commonly used protocol for dial-up access to the internet. Microsoft included PPTP support in Windows NT Server (version 4) and released a Dial-up Networking pack in Windows 95 and since then PPTP is supported in any Microsoft Windows version. The PPTP transfers two different types of packets over a VPN connection. The first is the Generic Routing Encapsulation (GRE) (described in RFC 1701 and RFC 1702) packet. It encapsulates PPP frames as tunneled data by attaching a GRE header to the PPP packet or frame. The PPP frame contains the initial PPP payload which is encrypted and encapsulated with PPP while the GRE header contains various control bits, sequence and tunnel numbers. The function of the GRE is to provide a flow- and congestion-control encapsulated datagram service for carrying PPP packets. The total sum up of the packet consists of a Data link header, IP header, GRE Header, PPP Header, Encrypted PPP payload and Data link trailer. The second type of packet is the PPTP control message or packet. The PPTP control packet includes control information such as connection requests and responses, connection parameters, and error messages and it consists of IP header, TCP header, PPTP control message and a data link traile r. In order to create, maintain and terminate the VPN tunnel, the PPTP uses a control connection between the remote client and the server using the TCP port 1723. This two different packets used by PPTP does not ensure privacy on the packet payload, so in order to enhance security on these packets, the PPTP supports encryption and authentication method same as used in PPP connections (Berger, T, 2006 and vpntools.com, 2006). To authenticate packets that pass through the VPN tunnel, PPTP uses any of the following protocols; Extensible Authentication protocol – Transport Layer Security (EAP-TLS), Microsoft Challenge Handshake Authentication Protocol (MS-CHAP), Shiva Password Authentication protocol (SPAP) and Password Authentication Protocol (PAP). For encryption, PPTP uses either the Microsoft Point to Point Encryption (MPPE) to encrypt PPP packets that passes between the remote computer and the remote access server by enhancing the confidentiality of PPP encapsulated packets (as described in RCF 3078) or uses the symmetric RC4 stream cipher to encrypt the GRE payload is encrypted. Layer 2 Tunneling Protocol (L2TP) The L2TP is an IETF standard established as a result of combining the best features of two protocols: Cisco’s Layer 2 Forwarding (L2F) protocol (described in RFC 2341) and Microsoft’s PPTP (Cisco Systems, 2008). L2TP facilitates the tunneling of PPP frames across an intervening network in a way that is as transparent as possible to both end-users and applications (RFC 2661). L2TP encapsulates the PPP packet (whose payload can either be encrypted or compressed or both can be done) into a User Datagram Protocol (UDP) packet at transport layer. The L2TP can be used over the internet as well as over private intranet and also can send PPP packets over X.25, Frame relay or ATM networks. The UDP packet consists of the following in this order: UDP header with source and destination address using port 1701, control bits representing options like version and length of the packet, sequence number and tunnel ID fields which is used to track the packet and identify the tunnel, the l ayer 2 frame which contains the following also: Media Access Code (MAC) addresses and the payload. To ensure security and enhance authenticity of the L2TP packet it is combined with IPSec by attaching an IPSec ESP header, using the IPSec transport mode. After combining IPSec to L2TP, the UDP packet is encrypted and encapsulated with an IPSec ESP header and trailer and ESP authentication trailer. The L2TP packet now consists the following: data link header, IP Header, IPSec ESP Header, UDP header, L2TP frame, IPSec ESP trailer, IPSec ESP Authentication trailer and Data Link trailer, resulting in excessive protocol overhead (Berger, T, 2006 and vpntools.com, 2006). Secure Socket Layer (SSL) Multiprotocol Label Switching Literature Review VPN Protocol Overhead The tunneling protocols also affect the performance of the network by adding processing overhead on the VPN connection. Implementing these secure technologies on any insecure public network like the internet comes with some weaknesses and this can be as a result of either the specific standards are not sophisticated enough to provide secure, stable and fast data links, or interaction with lower levelled protocols causes serious problems (Berger, T., 2006).For example the IPSec technology employs three kinds of protocols namely AH, ESP and IKE; in order to ensure security over the public network, this in turn adds overhead on the packet being sent. The IPSec uses two modes for transferring packets: transport and tunneling mode. The tunneling mode is the widely used because the tunnel can be used to access several resources and it encapsulate and encrypts all part of the IP packet within another IP packet. In a research paper by Shue, C. Et al (2005), an analysis was carried out in ord er to evaluate the performance of the overhead associated with IPSec on VPN servers, and the tunneling mode was used. The tunneling mode uses different technologies to ensure added security on the packet: it uses two different kinds of protocols namely ESP and IKE and various encryption algorithm and cryptographic key sizes, by so doing doubling the size of the packet. It is reported that overheads of the IKE protocol are considerably higher than those incurred by ESP for processing a data packet, also cryptographic operations contribute 32 − 60% of the overheads for IKE and 34 − 55% for ESP, and lastly, digital signature generation and Diffie-Hellman computations are the largest contributor of overheads during the IKE process and only a small amount of the overheads can be attributed to the symmetric key encryption and hashing. Also the layer 2 Tunneling Protocol (L2TP) implemented on the VPN connection originally does not cause any overhead since encryption, authentication and privacy mechanism is not used on the data packet. But when this protocol is combined with IPSec, it adds all the aforementioned mechanism on the packet and makes it very secure but this comes with added problems – protocol overhead, among other things. In this case both the IPSec and L2TP headers are added to the data packet which increases the size of the packet and by so doing, it decreases the VPN performance. (Berger, T., 2006) The Internet, the Problem. There are some articles and journals that clearly argues that VPN does not directly incur processing overhead on the network instead the internet affects the performance. According to an article that was posted on the internet by VPN Consultants in San Francisco Bay Area on FAQ on Security, it was argued that most performance slowdowns will in fact result from inconsistent Internet connections rather than by encryption processing overhead. Also, according to Liu, L. and Gao, W. (2007), explains that IPv4 ( this is an internet protocol that is widely deployed) based networks have inherent deficiencies which have become obstacles to the evolution of networks. They argue that VPNs implemented on the network i.e. the internet automatically inherits some of these problems, such as, big overhead of the net-transport, lack of quality assurance of Service (QoS), NAT traversing problem, and so on. They propose that VPNs implemented on IPv6 (Internet Protocol version 6), which is known as â€Å"the next generation protocol† can solve this problems effectively. Packet Loss A VPN tunnel can sometimes suffer high packet loss and reordering of packets problems. Reordering can cause problems for some bridged protocols, and high pack

Wednesday, November 13, 2019

Finding Meaning in The Turn of The Screw, by Henry James Essay

  Ã‚  Ã‚   At first glance, Bly appears to be a rather lonely place. The vividly bleak backdrop for The Turn of the Screw houses a handful of servants, two orphaned children, and ghosts who fade in and out of view. But there are others present who are less obtrusive yet just as influential as Peter Quint and Miss Jessel. Peering into and out of Bly's windows and mirrors, engaging with the text and the lingering trace of author Henry James, a crowd of real and virtual readers hope to catch a glimpse of a specter or to unravel a clever Freudian slipknot that will tell them something: They may be looking for that which they think James intended as the text's truth - a transcendental center - or maybe they subconsciously wish to see a reflection of themselves, somehow transformed by the reading, smiling back from the gilded, glassy panes. Whatever they are seeking, this crew of interactive observers might be surprised to find out that there is not only one answer to James's literary mystery and that the worth of their readings centers on effect, not meaning. It is futile to seek the "answer" that is supposed to tell because, as Douglas forewarns, "the story won't tell." The langue of Bly is based on deceptions and ambiguities, ways in which "truth" is kept at bay. But many readers are unaware that they are really seeking effect, and thus experience effect only when they think they are searching for meaning. Whatever the motivation, the pack should not be deterred from the quest, for the creation that Wolfgang Iser calls the text's "esthetic pole," --its true value--depends upon a conscientious reader to notice the text's gaps and ambiguities, fill in some of the holes, and to revel in the pleasure, finally, ... ...ist's dream, how reassuring for everyone else that it will never happen.    Works Cited    Felman, Shoshana. "Henry James: Madness and the Risks of Practice." 1977. The Turn of the Screw. Ed. Deborah Esch and Jonathan Warren. 2nd ed. New York: Norton, 1999. 196-228.    Iser, Wolfgang. "The Reading Process." Reader Response Criticism. 1974. Ed. Jane Tompkins. Baltimore: Johns Hopkins UP, 1980. 50-68.    James, Henry. The Turn of the Screw. Ed. Deborah Esch and Jonathan Warren. 2nd ed. New York: Norton, 1999.    Lustig, T.J. "Henry James and the Ghostly." 1994. The Turn of the Screw. Ed. Deborah Esch and Jonathan Warren. 2nd ed. New York: Norton, 1999. 255-60.    Tompkins, Jane. "The Reader in History." Reader Response Criticism. Ed. Jane Tompkins. Baltimore: Johns Hopkins UP, 1980. 201-26.    Finding Meaning in The Turn of The Screw, by Henry James Essay   Ã‚  Ã‚   At first glance, Bly appears to be a rather lonely place. The vividly bleak backdrop for The Turn of the Screw houses a handful of servants, two orphaned children, and ghosts who fade in and out of view. But there are others present who are less obtrusive yet just as influential as Peter Quint and Miss Jessel. Peering into and out of Bly's windows and mirrors, engaging with the text and the lingering trace of author Henry James, a crowd of real and virtual readers hope to catch a glimpse of a specter or to unravel a clever Freudian slipknot that will tell them something: They may be looking for that which they think James intended as the text's truth - a transcendental center - or maybe they subconsciously wish to see a reflection of themselves, somehow transformed by the reading, smiling back from the gilded, glassy panes. Whatever they are seeking, this crew of interactive observers might be surprised to find out that there is not only one answer to James's literary mystery and that the worth of their readings centers on effect, not meaning. It is futile to seek the "answer" that is supposed to tell because, as Douglas forewarns, "the story won't tell." The langue of Bly is based on deceptions and ambiguities, ways in which "truth" is kept at bay. But many readers are unaware that they are really seeking effect, and thus experience effect only when they think they are searching for meaning. Whatever the motivation, the pack should not be deterred from the quest, for the creation that Wolfgang Iser calls the text's "esthetic pole," --its true value--depends upon a conscientious reader to notice the text's gaps and ambiguities, fill in some of the holes, and to revel in the pleasure, finally, ... ...ist's dream, how reassuring for everyone else that it will never happen.    Works Cited    Felman, Shoshana. "Henry James: Madness and the Risks of Practice." 1977. The Turn of the Screw. Ed. Deborah Esch and Jonathan Warren. 2nd ed. New York: Norton, 1999. 196-228.    Iser, Wolfgang. "The Reading Process." Reader Response Criticism. 1974. Ed. Jane Tompkins. Baltimore: Johns Hopkins UP, 1980. 50-68.    James, Henry. The Turn of the Screw. Ed. Deborah Esch and Jonathan Warren. 2nd ed. New York: Norton, 1999.    Lustig, T.J. "Henry James and the Ghostly." 1994. The Turn of the Screw. Ed. Deborah Esch and Jonathan Warren. 2nd ed. New York: Norton, 1999. 255-60.    Tompkins, Jane. "The Reader in History." Reader Response Criticism. Ed. Jane Tompkins. Baltimore: Johns Hopkins UP, 1980. 201-26.   

Monday, November 11, 2019

Armour Garments Company (AGC) Essay

I. Central Problem AGC should find ways on how to revitalize the company from its steady slope into worse conditions. The circumstances of AGC tumbling downhill were already stacked against them; they just weren’t aware that their strategy during good market economy would not work well against harsh conditions, such as the competition boom and the fall of the undergarment market during the Seventies, which occurred simultaneously. Their condition became so bad their equity shriveled up to half of what it used to be. II. Statement of Objectives To earn back their customers from the competitors appeal as well as earn new ones To design ways to improve the earnings of the company To broaden the target market To use state-of-the-art equipment III. Areas of Consideration Competition is stiff Selling only to one merchandiser (Divisoria) Limited target audience Was not ready for market instability Dependent on company goodwill Production was not flexible enough to effectively craft high quality items Products were limited (white undershirts) Prices were not favorable to the company IV. Alternative Courses of Action (ACA’s) 1.) Sell some old equipment of the company and buy useful modern equipment. A. Advantages Greater possibility that the company can invest more flexible equipment for improvement of production in company. B. Disadvantages They will find a hard time disposing the old equipment due to its limited functions and the fact that it’s already old. 2.) The selling of goods should not be limited only to one place. A. Advantages Reach out to potential customers who do not frequent to Divisoria. Expand your target market. B. Disadvantages Will costs more expenses towards shipping, delivery and marketing. 3.) Advertise products in media and print. A. Advantages Create demand for their products. Procure product and brand awareness to the public. Name or brand recall. B. Disadvantages Incur expenses in marketing and advertising. 4.) Introduce products designed for women. A. Advantages Wider audience More customers Greater chance for profit B. Disadvantages Additional expenditures for research and design 5.) Give benefits to middlemen (merchandisers). A. Advantages Increase loyalty from merchandiser. Create a rapport between companies. B. Disadvantages Additional costs 6.) Create products that are trending in the market. A. Advantages More sales Larger target market Variety of products to choose from B. Disadvantages Higher cost in production. Higher risk of putting capital to waste. 7.) Retain â€Å"Blossom† in production. A. Advantages Helps the company to gain back profit. Provide lower class citizens with a selection of products. B. Disadvantages Brands Armour & Marca Troca will be further overshadowed. Less profit (same quality but at a lower price). V. Final Decision The final decision is to replace the old notions and infuse the new, while still retaining the quality of the product. Despite the immense hard work put into the company, changes will continue to occur, so a new life for the company would be better suited than if it were to continue its slow downward pace. VI. Detailed Action Plans The first thing that the business needs to do is replace the machines that manufacture their product. The machines are not only inflexible for making garments other than undershirts, but assuming from context; they are old, considering the company up to the liquidation proposition was twenty years old. Although it will need much capital to purchase these machines, in the long haul, it is an investment and it will help them broaden their product lines. A large chunk in the revision of plans situates in the products. In the past AGC, they only produced white undershirts for men. The next step is the development of their product lines. It may start with research on their current and their aspirant customers and products. Expanding the brands include introducing clothing for women, designing high quality and fashionable clothing, and making them in color. The gamble is high because the company has only ever excelled in manufacturing one consistent product, and expanding the product lines need much capital. Another good call for the company is to revive Blossom. That brand, with its good quality yet cheap prices caters to those of lower income levels, which is a potential market to sell to despite numerous competitors in the price war. And although brands Armour and Marca Troca would be overlapped by the potential success of Blossom, through expanding the brands would they be able cater to a different taste and therefore cater to a different audience. This way, the brands under AGC will not be directly competing for customers to buy them. Through good marketing and well maintained production, AGC can achieve high profits from expanding their line. Further action to broaden their target audience would be to advertise AGC. Its namesake and goodwill may definitely draw in crowds, but commercializing it in media and in prints will reach those who have not heard about the company and its brands. This creates demand for the product, and in turn, high sales. An influx of the new is not always a bad thing; it’s how you respond to change that counts. AGC still has some fight left and with the proper strategy and taking the right opportunities, AGC can still be able to bounce back and regain what was lost. Case Analysis 3-2: Armour Garments Company (AGC) The Armour Garments Corp. (AGC) was established in 1954 in the Philippines as a manufacturer of high quality undershirts. It had two popular brands, namely: â€Å"Armour† and â€Å"Marca Troca†. The company started out by copying popular styles and designs from Hongkong. The first ten years was quite profitable. The company grew from 25 workers in 1954 to about 250 workers in 1967. The company sells all of its products to wholesalers in Divisoria who distribute the product all over the country. The products are manufactured in white color only and are generally of superior quality being twice more durable than other brands in the market. Undershirts are worn as a matter of habit to avoid the direct contact of users polo shirts with the body. Product sales are seasonal. Business usually peaks twice a year: in June, with the opening of classes and in December, with the Christmas rush. In the mid 60’s more and more undershirt factories opened. The company faced serious threats in its operation since the Divisoria middlemen were not loyal to brands. All along, AGC was banking on its institutional pride and goodwill being the pioneer in the industry. While sales of the company did not decrease, it also did not substantially increase with the growth of the population. However, this did not bother management since the cash flow was good. No major investments were made during the period. It was business as usual so to speak. In 1971, the market for the undershirt suddenly took a downturn. It was no longer fashionable to wear undershirts. Moreover, more and more marginal factories sprouted up and were willing to compromise on price and payment terms with the middlemen. For the first time in its history, the company was astounded. It introduced a new brand â€Å"Blossom† which was of exactly the same product quality but priced lower to match competing products. It did not take long before â€Å"Blossom† was withdrawn from the market because AGC sold more of â€Å"Blossom† and less of â€Å"Armour† and â€Å"Marca Troca†. Having failed to improve the marketability of its traditional  product lines, the company finally decided to diversify and venture into ready-to-wear business. It introduced a polo shirt line. The market response was not favorable. In 1973, the company added a couple of lines like jeans and printed shirts, these two lines also failed.

Saturday, November 9, 2019

The Great Gatsby-Concerning Political Issues of 1920 essays

The Great Gatsby-Concerning Political Issues of 1920 essays The Great Gatsby was a great American novel that marks many controversial social and political issues of the early twentieth century in history. The issues at hand are directly targeted to the upper class tier of the American society. Of the many class issues that exist in the novel the ones that stand out the most are socially defined levels of class conflict, disillusionment of the youth because of World War One, and the youths disregard for Victorian morality. Love is a very powerful human emotion that can bring people of different social standings together. In todays society love can bring people of two entirely different social classes together with very little pressure and insult from third parties to keep these people apart. For example a person who is considered lower class by todays standard, could fall in love with a person who is considered to be in the upper class tier. In todays World, it would be reasonably tolerated and respected by each persons piers, a lot more than it would be at the turn of the century. I believe that Tom and Myrtle shared a mutual love. They may have each had ulterior motives for love, for example Myrtle may have loved Tom because she believed he would wisp her away to paradise with his money. However, despite this fact I believe they did share a mutual loving relationship for each other. Myrtle, as indicated above, was very clearly lower class by that times standard. Tom on the other hand, was financially set for life, and was obviously upper class. Tom could never openly love and marry Myrtle, because it would be considered obscene. So Tom had to marry someone of his own class stature, Daisy. Daisy was likewise in the same situation as Tom. Daisy had fallen in love with another man, Gatsby. But she had to marry Tom, because if she had run away with Gatsby, who at the time was very poor, she would have lost all of her class stature and ...

Wednesday, November 6, 2019

Customer Loyalty And Satisfaction Tourism Essay Essays

Customer Loyalty And Satisfaction Tourism Essay Essays Customer Loyalty And Satisfaction Tourism Essay Essay Customer Loyalty And Satisfaction Tourism Essay Essay Customer trueness and satisfaction are of import in any service industry ; nevertheless, they are particularly of import in the hotel industry. When a client is satisfied with their experience at a hotel, so they will so mention that hotel to their friends and household, every bit good as continue to utilize the hotel themselves, in this being therefore staying loyal to the hotel. Customer satisfaction and trueness is are non ever an easy undertakings for hotels and requires extended work and research to accomplish. Customer studies are conducted in order to understand what the client wants and how to implement that into the hotel s preparation plans to seek to guarantee that the clients are satisfied with their hotel experience. Many employee plans implement use the suggestions by employee study and remark cards, every bit good as adept advice on how to fulfill the client. Customer trueness and satisfaction can do or interrupt any concern, and, in peculiar, a hotel. When a client is non unsated, they will non return to the hotel and will distribute portion their bad experience with everyone they know ; but nevertheless, when a client is really satisfied with a hotel, they will be given to be loyal and maintain coming back, every bit good as portion the information with friends and household. Customer trueness is more than go oning to sponsor the hotel ; it can besides include mentioning friends and household, utilizing the hotel for concern maps, and sponsoring back uping the sister hotels that are within the same concatenation. A client becomes loyal by go oning to be satisfied with the hotel concatenation, either by through being listened to by the staff when there is a job, through being treated with regard, or even through something every bit simple as holding fresh towels in the room on a day-to-day footing. Many client studies are conducted to have feedback as to how satisfied a client is with a hotel and what the hotel can make to either maintain the client satisfied or do the client more satisfied. The hotels use this feedback from the clients to implement new preparation plans, every bit good as include adept advice in their employee preparation. The undermentioned literature reappraisal of these characteristics of client trueness and satisfaction in the hotel industry supports the hypothesis that client trueness and satisfaction are imperative to running a successful hotel. Customer Satisfaction We all know that client satisfaction is a cardinal point in holding a successful concern, but what is client satisfaction? ( Too personal and presuming ) Before go oning with the reappraisal, the definition of client satisfaction demands to be explored. Customer satisfaction can be defined in several different ways. Many people believe that client satisfaction is merely that: a satisfied and happy client ; nevertheless, Engel and Blackwell ( as stated by cited in Back, 2001, p. 23 ) define client satisfaction as an rating rendered that the ingestion experience was at least every bit good as it was supposed to be beliefs with regard to alternative. Back defines client satisfaction as the consumer s overall judgement, including service characteristics, the service merchandise, gross revenues forces, or other situational variables, ( 2001, p. 24 ) . While all of these definitions are right, the fact still stands that it is imperative in hotel direction that the client is to the fu ll satisfied in order to retain their concern. Customer satisfaction can be achieved in through a assortment of methods. Some of these methods include run intoing client outlooks in respects to soothe, offering first-class client service through effectual employee preparation methods, and using client studies and remark cards. Meeting Customer Expectations Meeting client outlooks sing comfort can be compiled into five different classs: merchandise, staff, reaching, value, and location. Merchandise comfort can be a assortment of points to the client. Harmonizing to Barsky and Nash ( 2003 ) when depicting comfort merchandises, invitees most frequently commented about their room-in peculiar the room s design, a comfy bed and room, room and hotel cleanliness, and convenient and particular comfortss. Bing comfy with hotel staff members can hold an impact on client satisfaction as good. The staffs cognition, attitude, and helpfulness enhance the clients comfort when remaining in a hotel. Besides In add-on, invitees felt comfy cognizing that they can swear the staff with their safety, properties, messages, and wake-up calls ( Barsky and Nash, 2003 ) . When a invitee arrives at a hotel, they want to experience immediately comfy with their pick in hotel. Upon arrival utilizing gracious words, reiterating the invitee s name, and handling the guest warmly makes the invitees feel comfy, ( Barsky, and Nash, 2003 ) . Value is an of import facet in respects to clients being comfy with their hotel pick. Harmonizing to a survey by Valerie Zeithaml in 1987 ( as stated by Gordon, 1999, p. 18-19 ) value can be categorized into four groups: Value is low monetary value the sensed value is based entirely on paying a low monetary value. Value is acquiring what I want in a merchandise the sensed value is based on the benefits the consumer receives for a merchandise. Value is the quality I get for the monetary value I pay the sensed value is defined as low-cost quality. Value is what I get for what I give the value is defined as the tradeoff between what is received versus what is given up. Some common illustrations could be clip or money. Finally, the invitees will happen comfort in the location of the hotel because of the propinquity of the hotel is to the invitees involvements. Bull indicates ( as stated by cited in Lee, 2003, p. 18 ) the location of a lodging belongings non merely includes the distance from, or entree to one or more specific attractive forces, but it besides consists of qualities such as soundlessness, positions from suites, and the nature of the belongings s milieus. Customer Service Customer service given by hotel employees can be a determinant factor if in whether or non a client stays at a hotel or non. The hotel employees are the face of the hotel, and how the client is treated when remaining at the hotel impacts how the client remembers on their stay. The research group s index [ Market Matrix ] of client satisfaction in the housing concern indicates that a turning figure of invitees are unhappy with the degrees of service they re acquiring, ( Watkins, 2005 ) . Customer service is more than the forepart desk employees or the bellboy ; client service includes the reserve agents through the call-in line every bit good as the web-agents. No count how they contact you walk in, name a reserve agent or see your Web site frequent invitees should see consistent client service from each channel, ( Sparkes, 2004 ) . Kirwin provinces, Common sense tells us that satisfied clients are more likely to return than those who ve had a bad experience, ( 1991 ) . Besides , both Keaveney and Lewis advise ( as stated by cited in Lee, 2003, p. 13 ) that hapless employee public presentation has been linked to increased client ailments and the likeliness of exchanging to a viing service. Customers associate their experience of one hotel with the similar hotels within the same concatenation. For case, if a client has a bad experience with the cleanliness of a room with a Comfort Inn, they will tie in that bad experience with all hotels within the Choice Hotels concatenation. Harmonizing to Crosby, Evans, and Cowles ( as stated by cited in Lee, 2003, p 13 ) , the behaviour and attitudes of contact forces are declarative of the degree and quality of services offered by the service house, and they exert a strong influence on client satisfaction. Adequate preparation will assist to guarantee that employees treat clients with regard and courtesy even through something every bit simple as telephone etiquette. If a hotel does non supply effectual client service through something every bit simple as a phone call, so the client will so take to take their concern elsewhere. Kennedy ( 2010 ) outlines some grounds why a hotel should concentrate on telephone cordial reception: Hotels typically have many of import clients who neer visit their lone personal experience is over the telephone. This includes travel agents, run intoing contrivers and administrative helpers from local corporate histories. Family, friends and co-workers of your in-house invitees who call during their stay will organize first feelings from how their calls were handled. Even invitees who booked online and subsequently name with a inquiry or particular petition signifier first feelings from their telephone experiences. If the feeling is non good, they may really good make up ones mind to call off. A preparation session may be needed for employees to guarantee the best phone client service is given and to repeat that client calls are non the nuisance that some people believe, but that they are the voice of the hotel. The following are ways suggested by Kennedy ( 2010 ) that the employees can be trained on to give first-class telephone service: Answer the know at the door of a pealing phone line with a proper salutation Speak easy and clearly. Pay attending to inflexion Convey energy and enthusiasm Ask for the company s name, if non provided. Ask permission to put the call on clasp, courteously explicating why it is necessary. Thank companies for keeping and apologise for the hold, particularly if the clip was important Use the transportation button judiciously End the call right. Just as a positive first feeling starts the call off on a good note, stoping the call right will go forth a memorable permanent feeling every bit good. No affair how good a hotel is run, there are ever traveling to be mistakes by the staff ; it s merely it is human nature. The issue is non the error per Se ; instead, the issue is how the error is handled by the staff and direction. Many hotels now have employee preparation plans as to how to manage header with disquieted or ireful invitees. Programs aimed at developing employees in managing invitee ailments and supplying value-added service are indispensable to developing an effectual staff, ( Kirwin, 1991 ) . Of class, hotels do non deliberately do mistakes and will seek to repair them in any manner they can possible. No housing concern likes errors or defects, yet occasional service failures are inevitable regardless of how strict criterions and processs are or how much employee preparation is regimented, explained by Hart, Heskett, A ; Sasser, Johnson A ; Fern, and Lovelock ( as stated by cited in Fu, 2003, p. 2 ) . Even though errors are inevitable, they can besides be uti le to a hotel to in placing jobs that need to be addressed. Brown ( as stated by cited in Fu, 2003, p.3 ) advises that service failures help a concern to observe the causes of hapless public presentation and to better its service processs and employee preparation. The client will appreciate the attempt by the hotel when they can accept their error and supply a solution. Bitner, Booms, A ; Tetreault explain ( as stated by cited in Fu, 2003, p.3 ) a survey of consumers in the air hose, hotel, and eating house industries found that most clients who received apologies, attentive aid, and compensation from service employees after meeting service failures really perceived the experience as really favourable. Customer satisfaction can be measured by clients voicing their sentiment on their stay by through talking face-to-face with a client service agent, through client remark cards, or by through studies conducted for the industry. Remark Card games and Surveies Remark cards and studies are really of import indispensable to hotels to understand what clients are believing and experiencing about their hotel and how to better their concern. To place the operational and selling issues that influence satisfaction and trueness, most hotels study their invitees in some manner, ( Schall, 2003 ) . Remark cards and studies can convey both positive and negative client feedback and should non be taken lightly by the hotel. Most hotels have quest satisfaction studies that enable them to construct upon strengths and mark countries for betterment, ( Carlstead, 2004, p.18 ) . Schindlerhof Hotel ( SH ) is an illustration of a hotel that provides remark cards to their invitees and takes the information really earnestly. SH attempts to derive information from the incident to place company structural and procedure failings ( weak musca volitanss ) and to detect new market opportunities, ( Voss, 2005 ) . Remark cards should be placed throughout the hotel t o guarantee that clients have easy entree to them and can return them easy every bit good. In SH, invitees can happen the cards on every tabular array in the eating house, in every room and in the anteroom of the conference suites, ( Voss, 2005 ) . Many hotel studies are done industry broad by companies such as JD Power and Associates, PricewaterhouseCoopers ( PwC ) , and American Demographics and are measured through the Market Matrix Hospitality Index and the American Customer Satisfaction Index ( ACSI ) . These studies are done conducted to garner information from clients on their satisfaction with hotels and what betterments can be made. JD Power and Associates conducted the 2008 North America hotel Guest Satisfaction Index Study and based their findings on responses from more 53,000 invitees over 12 months ( Baker, 2008 ) . Harmonizing to Baker hotels are rated on seven steps: reserves, cheque in and look into out, guest suites, nutrient and drink service, hotel services, hotel installations, and costs and fees, ( 2008 ) . The survey indicates that the overall satisfaction in every class dropped, except for luxury and extended stay, from the old twelvemonth ( Baker, 2008 ) . JD Power and Associates conducted the same sur vey in 2009 and maintained the industry overall has improved in guest satisfaction year-over-year ; Market Matrix showed the first large bead in its quarterly guest satisfaction Numberss since the recession began ; and ACSI offered assorted consequences among trade names, but showed the industry overall was keeping client satisfaction, ( Crowell, 2009 ) . Customer satisfaction is one of the most widely surveyed classs in the hotel industry and is of import when reexamining policies within hotels. Krantz indicates Last twelvemonth [ 2006 ] , hotel client satisfaction measured 75 on the American Customer Service Index ( ACSI ) the highest since 1995 piece at the same clip the figure of employees per occupied room declined more than 10 per centum, PwC s cordial reception pattern reported, ( 2007 ) . Another manner that client satisfaction can be surveyed is by traveling through client letters and remark cards and matching the ailments and regards to assist understand what the clients want. American Demographics sifted through a generous sampling of the about 2,000 letters submitted by consumers last twelvemonth [ 2002 ] to hotels and resorts through Planetfeedback.com, a division of Cincinnati-based market research house Intelliseek, ( Anonymous, 2003 ) . The most effectual manner to make client satisfaction is by holding a friendl y and helpful staff. In fact, the highest per centum of satisfactory letters ( 44 per centum ) fell into the hotel staff public presentation class, ( Anonymous, 2003 ) . The most of import thing to retrieve when reexamining client remark cards and studies is that, without the client, the concern would non last. As stated by Carlstead in general, these are used for the concrete intent of informing patterns that will heighten guest satisfaction and trueness, ( 2004 p. 18 ) . Customer Loyalty A common misconception is that when a client is satisfied with a concern they will be loyal ; nevertheless, this is non ever the instance. A client may be wholly satisfied but may non buy once more because of factors unrelated to satisfaction, ( Gordon, 1999, p. 13 ) . Customers require more than satisfaction with a hotel in order to be loyal. Waller ( as stated by cited in Strauss, 2004 ) provinces: Mere satisfaction does non make trueness. We expect to be satisfied. It takes delight-recognition, experiencing valued, being made to tip particular. If the concern traveller is merely another invitee, and is non recognized, he or she will leap to another hotel on the following trip with no vacillation, no affair how satisfied their stay. Sigauw advises ( as stated by cited in Strauss, 2004 ) , While satisfaction is usually a precursor to return, there needs to be something more. Hotel companies need to set up an emotional connexion. Hampton Inn franchises are one illustration of this connexion. Hampton Inn offers their clients a 100 % satisfaction warrant and has offered it for over 20 old ages. This warrant states if for any ground a invitee is nt wholly satisfied, that invitee is nt expected to pay, ( Anonymous, 2009 ) . This may look like a catch to some people, but for Hampton Inn, it works to assist retain clients and maintain them satisfied. This 20-year promise of satisfaction has kept Hampton among the top acting hotel trade names in client trueness and satisfaction twelvemonth after twelvemonth and will go on to vouch satisfaction when you find yourself remaining with Hampton, ( Anonymous, 2009 ) . Other hotels try to retain clients with trueness plans when which give points or free suites to clien ts for remaining at their hotel who are joined in the loyal plan. Loyalty plans are going more and more popular among concerns and particularly in hotels. The issue is, though, do these trueness plans truly give hotels loyal clients or are they merely catchs? Mattila states as an illustration of hotel trueness plans, Hilton HHonors plan makes it easy to accomplish an elect position, while Hyatt s Gold Passport plan offers a free stay after two corsets charged to a MasterCard, ( 2006 ) . Peoples are non concerned with how many points they have earn at a certain hotel ; they are interested in what the hotel can make for them for being a loyal client. Hotel points average really small, but acknowledgment and in-stay fringe benefits like ascents, expedited check-in, late check-out and so on are extremely valued, advises Waller ( as stated by Strauss, 2004 ) . Hotels create these trueness plans because they know that it is harder to derive new clients than it is to retain current 1s and need to happen ways to guarantee their clients maintain coming back. During hard economic times hotels are reminded of a cardinal lesson: edifice invitee trueness is the lone manner to vie without giving gross, ( Sullivan, 2004 ) . Torres and Kline besides understand the importance of maintaining clients loyal with their observation in the industry that companies are a besides recognizing that fring a client means fring more than a individual sale: it means fring the full watercourse of purchases that the client would hold made over a life-time of purchase, ( 2006 ) . Other than trueness plans, below are some ways that hotels can construct a more loyal client base: Develop a client centric communications scheme. Dainty people as persons. Personalize your communications and speak to invitees on a one to one footing. Do nt over communicate. Remove email blast from your selling vocabulary. Surprise and delectation loyal clients with fringe benefits, wagess, and value-adds. Seriously see utilizing an outside communications house with direct selling specializers on staff who know how to: Segment your database Develop relevant content and compelling offers Raising and intensify the relationship over clip ( Pratt, 2010 ) . The image of a hotel can hold a significant impact on client satisfaction and trueness. Ostrowsky, OBrien, and Gordon indicate ( as stated by Kandampully and Suhartanto, 2000 ) old surveies show that the image of the location, employee attitude, installations, and services of a hotel constitute of import factors in finding client trueness. The manner a client perceives a hotel s image can be a determinant factor of if the client keeps returning or non. Kandampully and Hu explain that those houses who have developed schemes and systems to guarantee that the full house s focal point remains directed on helping and back uping clients non merely derive positive influence on the houses image but will besides derive client trueness, ( 2007 ) . Decision Customer service and trueness are non ever complementary of each other ; nevertheless they are both indispensable to the success of the hotel industry. Hotels realize that fulfilling the client is one of, if non the most, of import factors in maintaining their concern alive. Satisfying clients can be include something every bit small as listening to their job and happening a solution or every bit big as giving a 100 % satisfaction warrant and non bear downing the client for non being satisfied to the full. ( Conducting client studies and offering remark cards are indispensable tools for finding whether or non a hotel is functioning their patronage as needed. By guaranting that clients are satisfied, hotels and other concerns can make client trueness ; after all, satisfied clients frequently portion their experiences with friends and household. A well-trained staff can do or interrupt a hotel s image ; a friendly smiling at the forepart desk, helpful staff members throughout the hot el, and astonishing installations are cardinal factors in deriving and maintaining patronages. Staying aware of the staff s attitude, keeping the hotel s belongings, and carry oning research as to client satisfaction will assist hotel direction to continue all the criterions necessary to retain client trueness. )