Wednesday, July 31, 2019

Peoplesoft Messaging Server

Contents PeopleSoft Messaging Server Settings Guide1 Contents2 Introduction Introducing the PeopleSoft Messaging Server3 Messaging Server Processes4 Configuring Messaging Servers in PSADMIN4 Understanding Dispatcher Parameters5 Understanding Handler Parameters7 Understanding Integration Broker Parameters8 Minimum and Recommended Values. 9 Edit History10 Introduction Introducing the PeopleSoft Messaging Server PeopleSoft Messaging Services exist on the application server and are the heart of the Integration Broker.Before using Integration Broker, you must configure and start the Messaging Server, aka PUB/SUB. Although the server processes devoted to your messaging system are all part of the larger application server domain, they comprise a distinct set of processes that aren’t involved with the ordinary transactions associated with PIA connections. Six processes of two different types, dispatchers and handlers, are combined in pairs to produce the messaging servers needed for t ransmitting messages throughout your messaging system. Each messaging server is a different type.A set of three — a publication broker, a publication contractor, and a subscription contractor — constitute the messaging server set required by Integration Broker. Following is a listing of the generic names for the processes: Messaging ServerDispatcher NameHandler Name Publication Broker (BRK)PSBRKDSPPSBRKHND Publication Contractor (PUB)PSPUBDSPPSPUBHND Subscription Contractor (SUB)PSSUBDSPPSSUBHND PeopleSoft delivers default PUB/SUB services with _dflt added to the above naming convention. For example PSBRKDSP_dflt. It is recommended that you use these services unless you have a specific need for dedicated handlers.To boot PUB/SUB use PSADMIN to configure your domain and simply answer Y to the following question at the end of the configuration process: Command to execute (1-7, q) : 4 Do you want the Publish/Subscribe servers configured (y/n)? [y]:y For typical implementa tions, there is no need to configure custom or additional dedicated messaging servers as the default messaging services will handle all basic messages. Please see the last section of this guide for recommended values More information about managing the application server can be found in the PeopleSoft Server Tools Administration Peoplebook.Additional Information available in Peoplebooks under: Home > PeopleBooks Library > PeopleSoft Integration Broker > Configuring the Messaging Messaging Server Processes There are a variety of server processes devoted to application messaging. If you are not implementing the application messaging technology then you may skip through the delivered, default server processes. The delivered server processes are: †¢PSBRKDSP †¢PSBRKHND †¢PSPUBDSP †¢PSPUBHND †¢PSSUBDSP †¢PSSUBHND These server processes act as brokers, dispatchers, and handlers of the messages in your messaging system.For the purposes of this paper we will div ide these into two categories: Dipatchers and Handlers. Configuring Messaging Servers in PSADMIN This section provides overviews of messaging server configuration, dispatcher parameters, and handler parameters. Understanding Messaging Server Configuration Once you create dedicated messaging servers, you must configure their dispatcher and handler processes so they boot when you start the application server. You configure these processes using PSADMIN just as you do any other server process that runs on the application server.Before you attempt to configure additional messaging server processes, you should be familiar with the other server processes that run on the application server. For more information, please see Peoplebooks Working With PSADMIN Menus. As stated earlier, two types of server processes comprise each messaging server: a dispatcher and a handler. Each process type requires you to set a different set of parameters. Most of the parameters are similar to other server pr ocesses, such as PSSAPPSRV, but some parameters are specific to messaging servers. Note.The following sections also apply to the _dflt messaging server processes. Only one parameter is different between a dedicated messaging server process and its _dflt counterpart: the Channels parameter, which enables you to add message channels to the channel list. The _dflt server processes can’t be associated with any specific message channel. Understanding Dispatcher Parameters There are three generic process types that are the basis for all dispatcher processes: †¢PSBRKDSP — the publication broker dispatcher. †¢PSPUBDSP — the publication contractor dispatcher. PSSUBDSP — the subscription contractor dispatcher. The following parameters apply to all three process types. Recycle Count Specifies the number of times each dispatcher process will be executed before being terminated (intentionally) by the system and then immediately restarted. Servers must be int ermittently recycled to clear buffer areas. The time required to recycle a server is negligible—occurring in milliseconds. Recycle Count does not translate into a native Tuxedo parameter in the PSAPPSRV. UBB file. Instead the value is stored in memory and is managed by the system.Allowed Consec Service Failures This option allows for dynamic server process restarts in the event of service failures. To enable this option, enter a number greater than zero, and to disable this option enter 0. The default value for this parameter is 2. The value you enter is the number of consecutive service failures that will cause a recycle of the server process. This is a catchall error handling routine that allows a dispatcher to terminate itself if it receives multiple, consecutive, fatal error messages from service routines.Such errors should not occur consecutively, but if they do it indicates that the server process needs to be recycled or cleansed. A â€Å"Retry† message appears w hen the number of service failures you specified occurs. Handler Status CheckcountHandler check count is used to determine how often the dispatcher should look to get the number of associated handlers. The value of Handler Status Checkcount is the number of cycles that the dispatcher will perform before reading the MIB and getting the number of associated handlers. This comes into play when the number of handlers change (add more, some crash etc. by having the proper count , the dispatcher can queue up messages to the handler more efficiently. Also if there are no handlers, then the dispatcher will not queue up any publications causing the application server log to fill up. For 8. 4 it is simply used to determine if there are any handlers, and if not don't send the message to the handler. This is to eliminate any the informational messages in the appserv. log if the handlers are down. For 8. 42 it is used to merely look at see if any associated handler is booted. Going forward 8. 3 it will be used as one of the determinate of how much work should the dispatcher send out at one time. Scan IntervalSpecifies the number of seconds between scans of the work queue when idle. The scan interval is necessary to detect messages published from two-tier connections, because when a message is in the queue the broker server doesn’t receive a notice of the publication. A scan interval is required to make sure that two-tier messages get processed in a timely manner. The scan interval is analogous to the Process Scheduler polling the Process Request table.In addition, the scan interval detects messages that have been resubmitted after an error, for example. Decreasing the scan interval will decrease latency for two-tier publishes and error recovery Ping RateUsed for PSPUBDSP only. After this many seconds of inactivity, the server will scan the database queues and restart any stalled/crashed items. The scan rate and Ping rate (as percentage) will determine the actual int erval for pinging any unavailable remote nodes (algorithm used: Attempts * Ping Rate * Scan Inteval).Maximum Ping IntervalThe maximum Ping Interval (in Hours) is the maximum interval between subsequent attempted pings of any unavailable remote nodes. Memory Queue Refresh Rate PeopleSoft Integration Broker maintains current asynchronous messaging queues in system memory for quick access. On rare occasions these cached queues can become corrupted, at which point they must be refreshed from the Integration Broker data tables. The likelihood and frequency of cache corruption depends on a combination of factors specific to your messaging system.If you need to periodically refresh the in-memory queues, you can use this parameter to tailor the frequency of the refresh to fit your situation. Each dispatcher on your system has its own queue. For each queue you set the rate equal to the number of dispatch attempts that must occur before the queue is refreshed. The refresh occurs only when the specified number of dispatch attempts is reached for a given message channel. For example, with a memory queue refresh rate of 8, multiple channels could have up to seven dispatch attempts each without triggering any refresh.The following settings are also significant: †¢A setting of 0 disables the refresh altogether. This is the default value. A setting of 1 triggers a refresh immediately after every dispatch attempt, effectively disabling memory caching. Restart Period Specifies the number of seconds between restart attempts on Started items in the work queue. An item which stays in Started state for more than a few seconds might be stalled — for example, the service request might have been lost, or the handler might have crashed. Decreasing the restart period will reduce the latency for recovering stalled items with a status of Started.However, under high load, items might stay in the Started state longer than normal for valid reasons — all the handlers might be busy, and the handler service request for the item might be queued at the Tuxedo level. Setting the restart period too low will result in redundant restarts — the dispatcher will dispatch the item again, even though the original request is still in the Tuxedo queue. A small number of extra restarts is benign, but at higher volumes, the unnecessary restarts can fill up the queue and block real requests.The formula for a reasonable value for the Restart Period is: ((incoming requests per second) / (# of handlers)) * (average processing time per request) For example, if you have an incoming rate of twenty per second, and you have four handlers, each handler will be busy processing one item and will have four others waiting in the queue. A new item will have to wait for the currently processing item, plus the four enqueued items, before it will be processed. If each item takes 10 seconds to process, the new item will stay in â€Å"started† status for approximately 50 se conds before the handler works on it.If it stays in â€Å"started† status longer, it's likely that the request to the handler has been lost, and the item should be restarted. Understanding Handler Parameters There are three generic process types that are the basis for all handler processes: †¢PSBRKHND — the publication broker handler. †¢PSPUBHND — the publication contractor handler. †¢PSSUBHND — the subscription contractor handler. The following parameters apply to all three process types. Min Instances Specifies the number of handler server processes started at boot time. Max Instances Specifies the maximum number of handler server processes that can be started or spawned.Service Timeout Specifies the number of seconds a handlers waits for a service request before timing out. Service Timeouts are recorded in the TUXLOG and APPSRV. LOG. In the event of a timeout, the handler terminate itself and Tuxedo automatically restarts the process. Re cycle Count Specifies the number of times the system executes each server before PeopleSoft intentionally terminates the process. Server processes must be intermittently recycled to clear buffer areas. The time required to recycle a server is negligible—occurring in milliseconds. Recycle Count does not translate into a native Tuxedo parameter in the PSAPPSRV.UBB file. Instead the value is stored in memory and is managed by PeopleSoft. Allowed Consec Service Failures This option allows for dynamic server process restarts in the event of service failures. To enable this option, enter a number greater than zero, and to disable this option enter 0. The default for this parameter is 2. The numerical value you enter is the number of consecutive service failures that will cause a recycle of the server process. This is a catchall error handling routine that allows a handler to terminate itself if it receives multiple, consecutive, fatal error messages from service routines.Such error s should not occur consecutively, but if they do it indicates that the server process needs to be recycled or cleansed. A â€Å"Retry† message appears when the number of service failures you specified occurs. Max Retries Specifies the maximum number of times the server should attempt to restart a failed action. This parameter prevents a bad item from continuously crashing a handler process — its counter is incremented when the handler sets the status to â€Å"working,† but before it actually starts processing the item. Understanding Integration Broker Parameters The following parameters applies to the Integration Broker technology.Min Message Size for Compression The Min Message Size for Compression parameter enables you to configure the threshold of message before the system compresses the message. Local Compression The integration engine compresses and base64 encodes messages destined for the PeopleSoft listening connector on its local integration gateway, bas ed on a setting for the application server domain in the PSAPPSRV. CFG file, which you can configure using the PSADMIN utility. The setting is a threshold message size, above which messages will be compressed. PSADMIN presents the setting as follows: Values for config section – Integration BrokerMin Message Size For Compression=10000 Do you want to change any values (y/n)? [n]: The value is the message size in bytes; the default value is 10000 (10 KB). You can specify a setting of 0 to compress all messages. See Understanding Application Server Domain Parameters. Note. This setting has no effect on the compression of messages that the integration gateway sends using its target connectors. Information Set Profiling information for both Sync and Async processing External Configuration Set External Configuration =Y if you run the Pub/Sub processes on a different domain then where the appserver processes are run for PIA/ PORTAL.This will enhance the Integration Broker performance for Asynchronous processing Minimum and Recommended Values. Specific application server tuning needs vary by customer site based on volume and server capacity. Requests for tuning issues and assistance should be addressed to Peoplesoft Consulting. However, some specific information is available below: PSAPPSRV should have a minimum of 3 instances booted when starting Pub/Sub. PSBRKDSP/HND settings should be sized up. A minumum of 3 instances should be used for all application messaging scenarios. For one particular customer I recommend increasing the PSBRKHND settings to 10/10.Same with the PUB and SUB handler settings: set min/max of 10/10. Other customers have used as many as 20 instances for PSSUBHND. This is generally a tuning issue, and settings vary greatly from site to site. Recycle count: For dispatchers this should always be 0. For Handlers this can be 0, or reduced based on need. A single handler is restarting itself after this number services (this is not the number mess ages, but the number of calls from the tuxedo service). Setting this too low can create performance problems. When a service recycles itelf, all requests must wait for the handler to come back up and re-submit.It is generally recommended using 0 for this value. Otherwise a high number like 100,000 is recommended unless memory problems are encountered in which case this value can be lowered. Restart Period. Since restart period controls how long before a started item will be resubmitted, dispatcher requests may be resubmitting themselves over and over again resulting in a higher queue number. This can be adjusted by changing Restart Period=5 to a higher number. Customers will need to play with this and monitor results, but setting this to 120 would be better than the delivered 5 second interval, especially when using a lower value recycle count.

Tuesday, July 30, 2019

Holistic Nursing

Holistic assessments in nursing provide a unique quality of care to the individual patient. Holism in the provision of care includes assessments obtaining data about the physiological, psychological, sociological, spiritual, developmental, cultural and environmental aspects. It is imperative that the nurse conducting these assessments adopts methods in the nursing process that reflects the standards outlined in Australian Nursing and Midwifery Council National Competency Standards for the Registered Nurse to ensure the health and wellbeing of the patient is maximized and maintained throughout the time health care is received.Nursing processes are directed at restoring overall harmony for the patient therefore an understanding of the individual as a whole person must be assessed. During the nursing process, the nurse will perform the assessment, diagnose, plan, implement and evaluate the patient in an ongoing process. This essay will outline the importance of a holistic approach in nu rsing assessment and the importance assessment in the nursing process. ultural, spiritual and psychological aspects of the holistic assessment and the relevance of these components in the provision of care will be discussed and how AMNC standards apply to care in nursing. A holistic approach in nursing assessment establishes the patients’ physiological, psychological, sociological, spiritual, developmental, cultural and environmental aspects in their life. Obtaining data holistically is vital in assisting a patients’ ability to manage their symptoms and emotional status maximizing quality of life during the stages of illness or health changes (Margereson & Trenoweth 2009: 104).The aim of the holistic approach in nursing assessment is to establish the type of support and care required for the individual, developing a quality of care that assists their wellbeing as a whole person (Margereson & Trenoweth 2009: 104). When assessing the patient it is important that the nurs e â€Å"collects data that relates to physiological, psychological, spiritual, socio-economic and cultural variables on an ongoing basis† as outlined in ANMC competency 5. 1 (ANMC 2006, p. ). The ANMC competency is supported by, Margereson & Trenoweth (2009:104), who describes the assessment process as ongoing and is determined by the changing needs of the patient, their family and their carer’s. Margereson & Trenoweth (2009: 104) further describes that the holistic approach supports the patient to build psychological resilience and wellbeing, to maintain independence as well as developing care and support networks that is best suited to the individual.The holistic approach in nursing assessment provides the patient assistance in decision making, achieving goals, addressing needs and desires and can build on strengths (Margereson & Trenoweth 2009: 104). Therefore, it is crucial to obtain data holistically in assessment to support and maximise the patients’ healt h and wellbeing. Assessment in the nursing process is an important aspect, as the information gathered enables a comprehensive response to the patients’ health status.It is important for the nurse to adopt an approach following the guidelines outlined in the ANMC, Domain 5, â€Å"Provision and coordination of care† (ANMC 2006, p. 8) to ensure preferences are met an accuracy is maintained when carrying out assessment. The nursing process is a cyclic method that involves assessing, diagnosing, planning, implementing and evaluating (Kozier & Erb 2012: 213). Kozier & Erb (2012: p. 212-213) describes the nursing process as an overlapping lapping sequence that focuses on establishing the patients social, cultural, emotional, spiritual as well as physical needs.Assessment will establish this data as well as a patients’ health history, concerns, health status and their ability to manage their own health care needs (Kozier & Erb: 213). Kozier & Erb (2012: 212) also maint ain that data collected in the assessment phase enables the patients’ lifestyle and routines to be incorporated into the care plan. Assessment is about collecting as much information as possible enabling problem solving throughout the nursing process.Assessment in the nursing process will establish the patients' ongoing needs and provide a quality of care best suited to the individual, to achieve a desirable health outcome. Cultural aspects of holistic assessment is relevant in the provision of nursing care as it provides the care team with an overview of cultural needs of the patient as well as providing information in which the patients’ health problems have arisen. Culture is defined as values, beliefs, artifacts, behaviors, attitudes and customs influencing and regulating interactions between members of a social group (Stein-Parbury 2010: 91; Johnstone 2006: 67).It is the nurses responsibility to adhere to the ANMC, competency 2. 3, ‘accepts individuals/group s to whom care is provided regardless of race, culture, religion, age, gender, sexual preference, physical or mental state’ (ANMC 2006, p. 4). Kozier & Erb (2012: 360) discuss that cultural sensitivity, appropriateness, competency and safety are all factors that are required to be taken into consideration so that the patient can be provided with the best possible health care.Kozier & Erb (2012: 360) also explain that conflicts in health care have been apparent due to cultural misunderstandings. An example of a cultural misunderstanding is the level of pain. In some cultures, it is normal to dramatically express ones level of pain whereas in other cultures people do not complain when in pain (Stein-Parbury 2010: 94). Culture is also an important aspect as it can explain nutrition, environmental and home status and level of education ( Kozier & Erb: 360) which all relate to the provision of care to be given.The holistic assessment of a patients cultural aspects enable the best suitable approach in the provision of care, upholding the patients’ rights, addressing their needs and minimizing misunderstandings. Spiritual needs are often emphasized in times of ill health or other health related crisis therefore it is imperative that spirituality of the patient is understood in order to maximize provision of care. Kozier & Erb (2012: 1154) define spirituality as a way in which a person lives their life, bound in beliefs and values and how their own meaning or perception is viewed.A holistic assessment will determine the spiritual needs of the patient to enable the nurse to respond appropriately to the patient whilst adhering to ANMC, competency 9. 5, ‘Facilitates a physical, psychosocial, cultural and spiritual environment that promotes individual/group safety and security’ (ANMC 2006, p. 12). Narayanasamy (2009:886-890), describes spirituality as a fundamental aspect in holistic assessment as it can promote the patients mind, body and spiri t as well as determining there state of mind in relation to spiritual distress such as loss of hope.Spirituality is an important part of the healing process as it can provide comfort, reduce suffering and assist in the physical and mental healing of the patient (Kozier & Erb 2012: 1154). Kozier & Erb (2012: 1155) state that the nurse who attends to their own spiritual needs is able to assist others and have a better understanding of the patients spiritual needs. Therefore, the provision of care will be heightened and the spiritual needs of the patient can be addressed in a holistic assessment.Psychological aspects of mind-body interactions are of great importance in the holistic assessment process in order to provide provision of care. The nurse is obligated to follow ANMC, competency 5. 1 ‘Uses a relevant evidence-based assessment framework to collect data and the physical socio-cultural and mental health of the individual/group’ (ANMC 2006, p. 8). Kozier & Erb (2012:3 45), explain that mind-body interactions can have a good or ill effect on the body for example, stress can lead to an altered body function such as an increased urinary frequency.Assessment of psychological status is imperative to establish the correct provision of care to be provided. Kozier & Erb (2012: 345) maintain that the minds ability to influence health status is receiving more attention and treatments such as relaxation techniques are being more commonly used to combat symptoms of stress. Illnesses have the ability to create emotional responses as well such as fear and depression, therefore the nurse must take into consideration these variables when conducting an holistic assessment to provide quality care to the patient.Holism in the provision of care is imperative to maintain in the nursing process. Holistic assessments carried out are unique and individual for each patient. This can be obtained in the nursing process by gathering data holistically by assessing the physio logical, psychological, sociological, spiritual, developmental, cultural and environmental aspects of the patient. A better understanding of the patients’ needs and requirements for care can be developed to provide health restoration in the best possible manner suited to the individual.The Australian Nursing and Midwifery Council National Competency Standards for the Registered Nurse outlines the requirements for nurses to follow to ensure health care is delivered at the highest standard. References Australian Nursing & Midwifery Council 2006, National Competency Standards For The Registered Nurse, 4th edn, viewed 2 September 2012, . Berman, A et al. , 2012, Kozier and Erb’s fundamentals of nursing, Australian adaptation, 2nd edn, Pearson, Sydney.Ellis, HK & Narayanasamy, A 2009, ‘An Investigation into the Role of Spirituality in Nursing', British Journal of Nursing, Vol. 18, No. 14, pp. 886-890. Johnstone, M 2006, Bioethics: a nursing perspective, Elsevier Austr alia, Marrickville, NSW. Margereson, C & Trenoweth, S 2009, Developing Holistic Care for Long-term Conditions, Routledge, New York. Stein-Parbury, J 2009, Patient and Person: Interpersonal Skills in Nursing, 4th edn, Elsevier, Marrickville.

Albert Einstine’s theory of relativity

If my theory of relativity is proven correct, Germany will claim me as a German and France will declare that I am a citizen of the world. Should my theory prove untrue, France will say that I am a German and Germany will declare that I am a Jew. – Albert Einstein – Address at the Sorbonne, Paris, possibly early December in 1929, in New York Times 16th February 1930. In the aforementioned quote pronounced by Albert Einstein it is visible that there is an existing correlation between his words and the current world. It also logically signifies some of the social issues which prevailed in the society during Einstein's days, such as the status he held in the world due to his genius intellect. His quote being discussed was said to have been spoken in the time of the Holocaust (World War II). Albert Einstein of all the physicists' to emerge from nineteenth and twentieth centuries, is one of the very few names known by almost everyone in the world. The German born theoretical physicist is also the originator of the great theory of relativity and many more which will be mentioned later on. Albert Einstein a Jew, born on 14th March 1879 in Ulm, Germany1 was one of the greatest minds in world history. He is known as a brilliant physicist who contributed more to the scientific world than any other person. His theories on relativity paved the way to how science currently views time, space, energy and gravity. Einstein was so advanced in his thinking that his studies and work set the standards for the control of scientific energy and space explorations currently being studied in the astrophysics. Einstein's many contributions to physics include his special theory of relativity, which reconciled mechanics with electromagnetism, and his general theory of relativity which extended the principle of relativity to non uniform motion, creating a new theory of gravitation1. His other contributions include relativistic cosmology, capillary action, classical problems of statistical mechanics and their application to quantum theory, an explanation of Brownian movement of molecules and many more. Works by Einstein include more than fifty scientific papers and also non scientific books. As a result of his service in theoretical physics, and especially for his discovery of the law of the photoelectric effect in 1921 he was awarded the Nobel Prize in Physics. Moreover in 1999 he was named Time magazine's â€Å"person of the century†. The above mentioned quote conveys the idea of how the society views people with stunning success. He clearly highlights the words, â€Å"If my theory of relativity is proven correct, Germany will claim me as a German and France will declare that I am a citizen of the world† (Albert Einstein, 1929). This illustrates how he is accepted throughout the world for his genius intellect; especially with regard to the theory of relativity. In addition these words also demonstrate how people understood the value of his theory. Einstein is known to have worked at many universities including, University of Zurich, Charles University of Prague, University of Berlin, Princeton University (New Jersey)1. It is said that even the geniuses accepted him as on of the greatest minds to ever set foot on this earth. By the time of World War II he was so well known in America that he would be stopped on the side on the street by strangers wanting him to explain â€Å"that theory†. He finally figured out a way to handle the incessant inquiries, by telling them, â€Å"Pardon me, so sorry, I am always mistaken for Professor Einstein.†2 This clearly points out how people in the society valued and accepted Einstein. Among the current issues in the world, social issues can be stated as one that causes the most damage to human life style. These issues can be classified under many sub categories; such as racial, political, religious, tribal, mythical issues, and also not forgetting colour bar. All these issues have one common reason which is, the virtual groups that humans have formed within their mind. As a result there were various consequences such as wars, exploitation, alienation, humiliation. The historical foundation for the quote in question is the mass execution of Jews during World War II. His quote unmistakably points out that if his theory proves untrue, how France will say that he is a German and Germany will declare that he is Jew. This also indicates how he would be discriminated against and he would not be accepted in the society that he was born in if he was an ordinary person as appose to a world renowned scholar. During this time people were physically and psychologically affected by the war. In an era like such Einstein spoke the word above mentioned twice, once in France and the other in the United States, which shows how bad the situation was at that time. Even today great researches, theorists, inventors exist. Some instances they are from developing or third world countries. They might be even from a particular minority from, a so called virtual group, where they suppressed, due to the status they are born in to or given to by the modern society. From the quote under consideration we could see how well such people are recognised by the world; and this quote sounds more or less a message to such people existing in the world to come up and present their ideas to the world so that the human kind would benefit from their ideas. Although this is the surface message there is also a deeper implication which is really important; and in the quote it is signified in a sarcastic tone. That is in reality people have themselves divided into groups and of which they should get rid off right now in order for the world to grow and prosper. In conclusion, even though Albert Einstein is not physically alive in the world today his inventions, theories and his words would live on forever. At a time of such turmoil in the world he discovered a way to enhance and bring more creativity to the world. As he sarcastically mentioned in this quote people need to diminish the sense of status in society and start accepting people by what they can offer to better the world. Unfortunately such actions take a lot of will power and unity in the world, factors that are currently not present in the world, thus, his quote holds importance today as much as it did in the past.

Monday, July 29, 2019

Sources of Finance Essay Example | Topics and Well Written Essays - 750 words

Sources of Finance - Essay Example The equity market (also known as the stock market) is the market for trading equity instruments (Federal Reserve Bank of San Francisco, 2005). Shares are the securities issued to the general public and its ownership implies business ownership.There are two different types of shares: Equity shares and Preference shares (Finance.mapsofworld.com, 2013). One of the examples of the equity instrument is common stock shares, publicly traded on national and global Stock exchanges (Federal Reserve Bank of San Francisco, 2005). Debts are the financial instruments traded for a long period of time. Example of debt instruments are mortgages and bonds (either corporate or government) (Federal Reserve Bank of San Francisco, 2005). Loans are granted by Banks, insurance companies or financial institutions in order to provide working capital or finance capital equipment (Term loan, 2006). Various banks including commercial banks, industrial development banks, and cooperative banks give medium-term loans for a period of 3-5 years (Finance.mapsofworld.com, 2013). Financial institutions established by State and Central governments give long term loans (Finance.mapsofworld.com, 2013). In order to get long term loan the company is required to limit dividends, to meet minimum working capital and debt to net, etc. (Term loan, 2006). If the company is granted the loan, it is amortized over a fixed period of time (Term loan, 2006). Loans as a source of long-term financing have some obvious benefits to the borrowers, as the principal and interest are the figures that can be calculated and planned in budget. Also, the duration of the business relationship is defined in the contract and normally ends when the debt is paid out (National Federation of Independent Business, 2009). Equity financing allows a business entity to acquire funds without generating debt obligations. When the company issues shares usually there is no debt burden on the company

Sunday, July 28, 2019

Enterprise Project 3 Research Paper Example | Topics and Well Written Essays - 1000 words

Enterprise Project 3 - Research Paper Example Quality improvement that is undertaken continuously throughout the organization remains a prioritized or key aspect within the organization. The Quality improvement processes herein involve systematic analysis of the processes utilized by the organization in delivering products that meet the customers’ requirements. The TLG’s quality control structure is defined by the organization’s structure. Different individuals within different departments are usually assigned different responsibilities in concerns to the TLG’s quality management. In other words, the quality control teams at TLG are formed by staff members from different TLG’s departments. These teams are responsible for the quality management and control to all production and service delivery aspects in the organization (Bell et al. 77). i. Check sheet – these are forms utilized in collecting data through assessment of the product specifications according to customer requirements. The information collected becomes essential in assuring quality of products before dispatching these products to the market. They are commonly utilized by the quality assurance teams. ii. Control chart – these are utilized by the management and departmental heads to establish the control of the processes and they utilize the statistical analysis. These charts are essential in identification of instances which might require adjustments to ensure better performance of the organizations. These charts provide essential information to enable the management to establishing quality assessment team for various operations, both ad hoc and standing teams. iii. Cause-effect diagrams – these are utilized by the standing cross-functional teams in assessing the cause-effect relationship of various processes. This analysis enables the teams to make informed improvement decisions on the processes Cost of quality

Saturday, July 27, 2019

Sensory Perceptions Essay Example | Topics and Well Written Essays - 750 words

Sensory Perceptions - Essay Example Humans, by relying solely on these senses, face numerous limitations and challenges. Our ability to survive in the world this far amidst harsh conditions could be a result of our ability to maneuver safely within it by the use of our senses. However, the mounting threats, global warming, nuclei arms race, and incurable diseases such as AIDS, could be an indication of the unreliability of the senses to foresee looming human extinction. Humans have intellect and should not always rely on inaccurate information generated by the senses in making decisions. There are many reasons to justify the inaccuracy of sensory information. According to Descartes, our human background knowledge is the principal contributor to the inaccuracy of the senses (2002). He says, â€Å"Others are in error respecting matters of which they believe themselves to possess a perfect knowledge† (51). By questioning the certainty of two plus three being five, Descartes argues that as much as adding the values represent simple and general objects, our responses could be a result of the background knowledge we have on arithmetic. With no such information, even dealing with absolute objects that their existence is absolute becomes complicated. Additionally, the accuracy of the senses depends on the reliability of observed facts. ... 22). Sense data can be accurate and precise. However, this is subject to many factors. Primarily, the sources of data and the cognitive ability of an individual must be accurate. Our senses rely heavily on the data they receive to make a judgment. If our ability to smell, see, hear, or feel is impaired, it is highly possible that senses will make erroneous decisions. However, humans have highly developed organs that ensure accurate reception, analysis, and interpretation of received data. The human ears, for example, have sensitive receptors, which can detect over 400,000 types of sounds and act as amplifiers. The availability of these sensitive receptors ensures that the data sent to the brain is perceived accurately. Therefore, this rules out the possibility of any deception. Secondly, the human brain has the cognitive ability to analyze any form of sensory data received. Once data are received by the five senses, smell, touch, sight, taste, and hearing, it is then transmitted to t he brain through the spinal code for analysis. The human brain, being the most sophisticated organ known to man, has the capabilities of giving accurate analysis of the data received. Senses also rely on experiences to interpret data, and since such experiences are past realities, the senses can never be too wrong. The debate on the role of heredity and environment in child development has remained controversial over the last decades. Psychologists agree on the importance of nurture and nature in child development, but disagree over which plays a more significant role in the development process (Arkinson, 1993). Nurture dictates that environment influences a child’s development.

Friday, July 26, 2019

Mobile investigation Essay Example | Topics and Well Written Essays - 1000 words

Mobile investigation - Essay Example In modern age this process is in used across the globe in almost every country without acceptable regard for legitimate defenses, legal oversight, or accountability. In this paper the main focus is on to find out the answer regarding the investigation carried out by the police against Donald Dodger. The investigation was carried out against his alleged involvement in the stalking activities of a student from Granglian Busking University (ACLU, n.d.). Who is available of the SIMM card or phone memory as Mobile Contacts? From the investigation carried out by the police department of his mobile location as well as the call details, there is a clear indication about the people with whom he is in touch on a regular basis. According to the data available from the analysis of his mobile records, the contacts he has are as follows: Angila Ruskin, Adriana Weeks, Jenny Jones, Stella-Foster Artois. The entire detail is available on the detail call list to which number he has made calls or sends sms. Who has been called from this phone in the past three months multiple times? From the analysis of call record it is very clear that the maximum call in last three months was made to one single number of Adriana Weeks. The number is 07826654040. The call details also suggest that total number of calls made to this number is 10 out of11 calls along with 17 sms. For investigating purpose call history is very important once the mobile phone is not available for detail investigation. By analyzing all his sms it is very clear that the guy is talking with Adriana Weeks as he wanted to meet her, date with her. All his 17 sms to Adriana was about where she was, why she is avoiding him, will she meet him or not etc. Can social media applications be accessed and if so by whom and who has been posted to? At present, it is very easy to access the social networking site from the high end mobile phones. But from the available data it is hard to find what are the social sites he accessed from his mobile is. The detail of the sites or whatever he has posted in that social site is not accessible from the available bill details. Can the phone give any indication where the user might have physically been? Mobile phone tracking generally means to get the information about the current location of the mobile phone as well as the user of the phone. This locating process can be done with the help of multilateration of radio signals between the towers of the mobile network and mobile phone or with the help of GPS. To locate the mobile phone it is not necessary to make any call from the mobile, the only thing required is the mobile to catch any signal of the nearest tower. GSM or Global System for Mobile or is based on the strength of the signal of nearby antenna. Mobile positioning includes location based service which is used by the mobile phone companies to locate the position of the mobile phone and the user of the same. (BBC UK, 2005). According to the report published in BBC News (2005), if someone change the mobile number still the location can be traced. The tracking is generally done by two ways when any number is dialed from one mobile. The SIM card of the mobile sends its own unique IMSI number (International Mobile Subscriber Identity) which starts with the code number of the country from where user is belongs, then the network code and

Thursday, July 25, 2019

Impact of Democratic Principles and Policies Application on War Essay

Impact of Democratic Principles and Policies Application on War Incidence - Essay Example This essay provides a comprehensive analysis in order to establish the specific impact of democracy, as well as economic integration and international institutions, on the prevention of wars. It also aims to establish, how the application of these democratic concepts affects the actual occurrence of war and of any other violent encounters within and among states. Human history has been riddled with various incidents of violence and wars. Wars have had causes, including poverty, social stratification, ethnic differences, as well as political differences. Wars have been seen within states, but mostly, it has involved one or more countries. Liberals argue that various instruments – democracy, economic integration, and international institutions – make wars less likely. They argue that where people have more freedom, they are less likely to take arms against the government or other countries; where they are more economically coordinated with each other, they are also less likely to declare wars against each other; and where international institutions are in place, the incidence of wars can be reduced or even eliminated. Others are however not convinced of these possible preventive measures for wars. Democratic pacifism seems to be the main basis of the contention that democracy makes wars less likely. Its ideas are based on the following premises: democracies rarely if ever go to war against each other; democracies tend to be more peaceful than dictatorships; democracies tend to have less internal violence.

Wednesday, July 24, 2019

Presentation Critique Essay Example | Topics and Well Written Essays - 250 words

Presentation Critique - Essay Example The introduction did, however, set up the presentation well and give some general themes that would be explored better further in the presentation, though one thing I would have liked to see would be some explanation of context (a power outage that affects a huge area vs a small area, or home vs office etc.) The content was good, though some parts of it were more disjointed than was necessary. The introduction gave some topics that would be discussed, but some of these were either missing in the presentation (such as how to stop equipment damage) or else not clearly correlated with those introductory ideas. However, all content presented was on topic, appropriate and effective. This was one of the weaker areas of the presentation. Some of the visuals were good (the lightning one, for instance) while others seemed very out of place: the â€Å"Key to success† visual was both off topic (equating success to money, which was not really what success is in terms of power outages), while also being low resolution and overly

Marketing issue Essay Example | Topics and Well Written Essays - 750 words

Marketing issue - Essay Example http://news.yahoo.com/s/nm/20060505/us_nm/nevada_drugs_dc;_ylt=AreuRXBOHf5yVltO1LMj6HWyBhIF;_ylu=X3oDMTA5aHJvMDdwBHNlYwN5bmNhdA- It's no longer just the hardworking women who make money at strip clubs. These late-night hangouts, with their booming sound systems and gender-mixed crowds, have become big business for the record industry, particularly for hip-hop labels. "Strip clubs have become the main breaking place for records, especially in the South," says Jermaine Dupri, president of urban music for Virgin Records. The music industry increasingly has embraced the strip club out of necessity and convenience. At strip joints, DJs are able to play full tracks and can take a chance on underground and unproven material. Just about the right place to launch one's career in music. But will these hip-hop labels truly help turn out good music for all ages There are so many performers today who are good enough to break the jinx and make it count. Unfortunately there are not too many takers. Will the entry of Virgin Records bring more music companies into strip clubs Could this be turning point of the recording indus try in the United States It's just a matter of time. U.S. Geological Survey. The aquatic invasion is widespread. Half of all streams in the West are home to non-native fish. Few habitat types are immune, and humans are largely to blame. One of the most surprising conclusions in the new study: In streams that are among the most pristine, there are generally more non-native fish than native. With global warming changing the ecosystem, there has been many natural calamities witnessed the world over. It is time that mankind takes a closer look at what he been doing to unsettle the eco-system. Industrialization at the expense of a greener Earth is taking a step closer to extinction. Could these fishes have come as a blessing in disguise for Green Peace activists Only time will tell. http://news.yahoo.com/s/space/20060507/sc_space/nonnativefishinvadewesternstreams;_ylt=Aq4yaqyNiuaoS3a242Z6bYUPLBIF;_ylu=X3oDMTA5aHJvMDdwBHNlYwN5bmNhdA-- 4. Rather than reach for the television remote control when she wants to be entertained, Karalyn Valente goes online to play "EverQuest," "Ultima Online" and other video games - a gaming habit shared by millions in the United States. According to a new AP-AOL Games poll, 40 percent of American adults play games on a computer or a console. Men, younger adults and minorities were most likely to play those games. The trend to move from the 'idiot box' is a cause of concern for the media managers. There is this serious concern that if nothing is done quickly to bring people back to television viewing; the industry is in for a major transformation that could take away thousands of jobs. Video games attract people for the simple reason that they get associated with the characters that transforms into a strong bond.

Tuesday, July 23, 2019

No topic Assignment Example | Topics and Well Written Essays - 1000 words

No topic - Assignment Example However, very often these expectations were not lived up as it not very easy for the new government to rule the country. These difficulties created new problems for newly independent state, especially if these were African states, which became independent after the long years of colonial regime. Colonizers ruled the country in their own way and it was not very easy for the new government to cope with all the problems that a newly independent country may have faced. There can be the following four main issues of the post-colonial period defined: Sovereignity and safety. The government of the newly independent states should have taken care of sovereignty and safety. This was important because the countries were created and ruled by colonizers and in the new conditions they could easily disintegrate; Propaganda of unity. The colonies created by Europeans had different culture and different languages, thus it was essential to provide national unity. People with different culture and reli gions belief had to realize that they are citizens of one country called Africa. Otherwise, the country would not be able to exist; Ethic conflicts prevention. The main principle of colonial policy was â€Å"divide and rule†. This created very difficult relations between the ethnic groups. Many of them were aggressive in their attitudes towards the other. Thus, it was important for the government to prevent further conflicts; Human services provision. Colonial regime did not prescribe satisfying basic human needs of the citizens of colonies. Colonists needed only their work and did not think about what they need. Thus, it was important for the new government to satisfy basic needs of the citizens of newly independent Africa. 2. The role of women in African nationalism creation was very interesting and it predefined their position in post-colonial society. Some scientists even argue that African nationalism managed to reach its goals at the expense of women and their subordina te position. It means that the nationalists defended women’s interests in order to attract as many people as possible to their movement. It was determined that the struggle for women’s rights was held alongside the struggle for freedom of Africa. Certainly, we can’t omit the fact that the common interests of the struggle usually overshadowed the interests of women as women were initially directed on the struggle for the interests of nationalists. Notwithstanding that nationalists defended women’s interests and talked about â€Å"motherland† instead of â€Å"fatherland†, when they talked about the â€Å"fathers† of the revolution, they still talked about men. This was primarily because most of women who took part in the revolution were uneducated. However, they managed to find the connection between maternity and the fight and turned the ability to give birth into their force. This helped them to move into politics as â€Å"birth give rs for all these men†. 3. State politics can be considered through the concepts of engagement and disengagement. There are four forms of political relations defined: state elite is engaged in regulation; state elite is disengaged due to the obstacles on the way to authority met by elite or elite retrenchment; ordinary citizens are engaged in political regulations; ordinary citizens are disengaged due to bad access to power. The disengagement from the state threatens the hegemony of the state. People do not trust their state and want to

Monday, July 22, 2019

Poetry and Ozymandias Heart Essay Example for Free

Poetry and Ozymandias Heart Essay How life goes on: the analyzing of diction and imagery in â€Å" Ozymandias† The poem â€Å"Ozymandias† by Percy Bysshe Shelley is about a traveler telling the speaker about a statue in the desert. This statue is half sunk in the sand and the traveler explains that the â€Å"sneer of cold command† on the statue’s face shows that the sculptor understood the passions of the statue’s subject. This man sneered at the people who were not as powerful as him, but he fed his people because of something in his heart. The Traveler goes on and says that on the pedestal of the statue, it is written, â€Å"My name is Ozymandias’, king of kings: / Look on my works, ye Mighty, and despair!† But when you look all around the statue for the â€Å"works† there is nothing but sand and a bare desert. In this poem, Percy Bysshe Shelley creates the image of destroyed sculptures to show that nature destroys all and his choice of diction is quite interesting. The diction in this poem creates a strong sense of imagery. The notable diction is combined with alliteration to create even more powerful imagery, such as the â€Å"Sneer of col command†. Ozymandias’-â€Å"ozy† meaning air and â€Å"mandias† meaning King/God, is a sonnet, a fourteen lined poem metered in iambic pentameter. Percy Bysshe Shelley uses words such as, Trunk-less- torso is gone, visage- another name for face, and colossal- which is an allusion of the colossus of roads. He uses this choice of diction to interest the reader furthermore by being more descriptive and letting the readers imagination go wild. The poem Ozymandias has two voices. The first is the speaker, who tells the entire poem. The other is the traveler, who tells the main speaker about the poem. The speaker tells us the traveler is from an antique land,† which is a metaphor for the old age of his country. Antiques are valued mainly for their age and are almost always not modern. The traveler is described as well-traveled, knowledgeab le, and wise. The Traveler’s whole speech is about a statue that he once saw in the middle of a desert. He tells us that the â€Å"trunk† of the statue is gone; The head of the statue lies in the sand at the feet of the legs and the expression on the face is still visible. There is a lot of death in this poem. The figure represented in the statue is dead, along with the civilization to which it once belonged. The Traveler says that the lip is â€Å"wrinkled†, but he says this is not because of old age but it is the â€Å"sneer of cold command†. This leaves the reader with an impression that Ozymandias’ was a cold ruler and had no trouble giving orders. In this  octave though it is suggests that the stone is â€Å"lifeless†, but on it is some â€Å"passions†. The reader, most likely imagines that these passions are greed, conceit, and other passions that are appropriate to a harsh, power-loving ruler. These same passions are said by the traveler to â€Å"survive† the â€Å"hand that mocked them,† which would be the sculptor, and the â€Å"heart that fed† them, which is Ozymandias’.The poem is consistent to a single metaphor: the shattered, ruined statue in the desert wasteland, but another metaphor is â€Å"the heart that fed†. Ozymandias’ heart â€Å"fed† these passions. The heart seemed to be compared to a powerful figure and the passions seemed more like an animal the master throws some food to, but I think the sense is more that Ozymandias’ heart fed on the passions. When you look at it like this, Ozymandias’ heart becomes a killer and the passions his prey. It seems obvious then that the passions kept the heart alive and beating, the passions are sustenance to the heart. The passions don’t seem to be suggested to be bad, but Ozymandias’ feeding on these passions of greed and conceit resulted in evil, the same evil we see on the statue’s face. His image of the broken sculpture shows how things change over time and that human beings and materialistic values are seasonal and are bound to end. They are all prone to be affected by the laws of time.

Sunday, July 21, 2019

Challenges And Prospects: Bangladeshi Foreign Policy

Challenges And Prospects: Bangladeshi Foreign Policy Globalization has at present become a pervasive phenomenon of international relations, and in the process, is compelling developing countries like Bangladesh to assess its impact on its security and foreign policy. The traditional way of dealing with the security (which is basically state-centric and emphasizes military security), appears to have become inadequate for the task of formulating a policy that would be capable of effectively tackling the prospects and challenges of the dynamic and technology-dominated milieu. The question is how much of traditional security concerns remains relevant to policy-making, how and what to discard from the past to enable foreign policy successfully meet the opportunities and challenges of globalization. While globalization has, to some extent, eroded the power of the nation-state, the latter has not been rendered absolutely impotent. Bangladeshs security concerns will need to be addressed through correct policies, taking into account the fact that it is multifaceted and comprehensive. In general, Bangladesh could expect to face problems in the following areas: military, political, economic, environmental and societal. Before embarking on the actual analysis of Bangladeshs security and foreign policy, a brief review of the concept and process of globalization and security will be provided. Its impact on Bangladesh will be studied, focusing on both positive and negative aspects. Finally implications for policy will be discussed. Globalization The term globalization has become a buzzword in the present-day world. Although the term has attained extraordinary popularity in recent years, it was in evidence even a hundred years ago. In the last 25 years or so, the concept of global has transformed itself from a mere reference to mean total to an emphasis on the globe as a unit of analysis in its own right. Without claiming the world to have become a single society or that it is bound to become one, globalization refers to a process or trend.  [1]  Simply, the term globalization describes the increased mobility of goods, services, labor, technology and capital throughout the world. (http://canadianeconomy.gc.ca/english/economy/globalization.html). Or it can be described as, identity related to globalization processes seem unrelated to traditional boundaries of social groups, transcending territorial, religious and other boundaries.  [2]   It was actually in the 1980s and 1990s that the world witnessed the revolutionary impact of the process of globalization. It was primarily due to unprecedented technological innovation in the fields of communication and transportation that international relations became radically transformed, especially in the realm of trade and investment, and diffusion of information. Despite fact that there is a growing concern about dealing with the complexities and changes generated by the phenomenon of globalization, the term itself is still imprecise, and means different things to different people. To simplify matters, globalization essentially refers to the process of worldwide spread of six kinds of objects and activities: i) goods and services; ii) people; iii) ideas and information; iv) money; v) normative orientation; and vi) behavioral patterns and practices.  [3]  Of these, the flow of goods and services has had the most tangible impact: it has been instrumental in raising the level of material prosperity unprecedented in human history. Besides, the free flow of information and ideas is making it possible for the full flowering of human potentials. Proponents of globalization are optimistic that increase in global prosperity would usher in a stable and peaceful world. Critics of globalization however, are not so convinced that it is an unmixed blessing. They dispute the argument that as a result of the process of globalization, the nation-state is losing it significance due to the erosion of its functions which are increasingly being performed by non-state actors like multinational cooperations, and non-governmental organizations (NGOs). And it is the poor countries who faces the challenges of globalization more as, globalisation is not seen as transcending the role of the state, but rather as a consequence of the powerful role of rich countries poor countries find it difficult to devise policies to deal with the crisis, especially since none of them boasts strong multinational companies that may function as influential global players.  [4]  The focus of their criticism is that the process of globalization seeks to promote the economic at the cost of the social and political. They are concerned about the deleterious effect of unbridled market operations, which could destroy communal and social unity. Although globalization is very much a fact of life, it cannot be denied that the territorially organized nation-state continues to remain significant and capable of providing the necessary (perhaps not all) services to it s citizens. Again the resistance of globalization may assume the form of ultra-nationalism and racism. It is asserted that ethnic nationalism is much more deep-rooted and less time-bound (than modernists prefer to believe), therefore, better equipped to overcome the challenge of both globalization as well as regionalization.  [5]  Critics however, point out that, globalization contains the threat of a new form of hegemony, which would thus create social conditions conducive to new doctrines of civilizational superiority.  [6]  Thus, globalization tends to strengthen nation-states in some respects and weaken in others. Security- from individual to diverse and comprehensive approach Security itself is now regarded to have become comprehensive as far as its meaning and definitions are concerned, as a result of which there is a tendency to over expand and widen the security agenda. Traditionally, a public issue is deemed to have been securitized when it is presented as an existential threat, requiring emergency measures and justifying actions outside the normal bounds of political procedure.  [7]  But the non-traditional approach to security tends to make it all inclusive and comprehensive, thereby, making it analytically unwieldy. Park defines comprehensive security in terms of policies designed to protecting the peoples life not only from traditional forms for military threat, but also from various other forms of threats such as hunger, poverty, environmental disaster, scarcity of energy, etc.  [8]  Or it can be viewed as Security measures that starts from the assumption that dialogues at the level of the state and elsewhere contribute to the formulation of mutually acceptable definitions of common threats. The threats do not necessarily emanate from rival states, but also comprise threats to internal stability in the area of economics, social unrest, ethnic divisions, or serious environmental damage.  [9]   Transnational economic and financial forces at work possesses the capacity to wreak havoc with national economies- something that cannot be tackled by military means, but only with appropriate policies adopted primarily at the national level, but would also include international and regional cooperation. Hansen viewed it Now approaches towards security can only succeed with the cooperation of the main actors on the global stage which includes not only governments, but companies, banks and, at the political level, national political parties as well.  [10]  So, in this era of globalization, to deal security measures, the most pressing need for any country like Bangladesh is to take cognizance of the magnitude and complexity of the changes now sweeping the world. Bowman describes, New technologies are making the world much more interdependent. These technologies are accelerating the movements of goods, services, ideas, and capital across national boundaries. They are displacing trad itional security threats with nontraditional worries like international terrorism, organized crime, drug trafficking, and environmental degradation while strengthening the capacities of non-governmental organizations (NGOs) to influence policy.  [11]   Foreign Policy of Bangladesh The basic objectives of Bangladeshs foreign policy are to promote its security, protect its territorial integrity, achieve socio-economic development, uphold its ideology and maintain its cultural identity and national dignity (http://www.bssnews.net/about_foreign_policy.php) -goals that are challenged in various forms by the process of globalization. The security interests of Bangladesh are said to lie in the consolidation of its hard-earned independence by accelerating the process of economic development and modernization. It is argued that the basic goal of its foreign policy should be the ensuring of diplomatic and economic cooperation and assistance from external sources. Bangladeshs foreign policy has been deeply informed by the dire need to achieve socio-economic progress through the optimum use of its abundant human and other resources, which, in turn, could be instrumental in maintaining national cohesion, as well as international prestige and influence.  [12]   Again the main constraints of Bangladeshs foreign policy are its geographical location, underdevelopment and overpopulation. In the era of globalization, Bangladesh, like other developing countries, is confronted with threats emanating from both external and internal sources: terrorism, drug trafficking, circulation of light weapons, poverty, political instability, environmental degradation, etc. The Security Agenda of Bangladesh External The geographical location of Bangladesh makes it obvious that India and Myanmar are the two immediate neighbors who are the potential threats to its territorial security. However, chances are that India (aware of political costs involved in such a move) would prefer not to threaten Bangladesh militarily, if its major strategic and economic interests are served without such efforts. Myanmar, too could pose such a threat to Bangladesh, but so far it has been limited to the influx of Rohingya refugees  [13]  in the 1990s in the South-Eastern part of Bangladesh, Coxs bazar, that caused considerable security problem and socio-economic burden for the country. Although these two neighbors are potential threats to the territorial security of Bangladesh, the problematic question is how could minimize its vulnerabilities in this regard. Some analysts make suggestions, that Bangladesh does indeed possess strategic value, which it can and should exploit  [14]  but reality does not seem to support such an assessment. In this era of globalization, it appears unlikely that either or both China and the United States would seriously court Bangladesh as ally against India, since both are now more interested in improving relations with India rather than antagonizing it. So, Bangladesh does have a big concern as far as the external sources of threats to its security are concerned, but they can be best dealt with and neutralized through astute diplomacy rather than the use of force, for which it is ill equipped. Bangladesh may resent the predominance of India, but there seems to be very limited options available to it deal with it in a truly effecti ve manner. No matter how disadvantaged Bangladesh may be vis-à  -vis its immediate neighbors, it must nonetheless be in a position to oppose policies on their part that could increase tension, create instability, or otherwise run against broad interests of Bangladesh. Prospects for the proliferation of the weapons of mass destruction (WMD) in South Asia are another security concern of Bangladesh. With the testing of nuclear devices by India and Pakistan in 1998, possibilities of nuclear war occurring in the region has become a possibility. So, Bangladeshs security has been adversely affected by the development of nuclear devices and their delivery systems in South Asia. Bangladesh should, therefore, strive to play an active role in regional forums since the development of WMD transcends the barrier of distance and could affect Bangladesh too. Internal Military Military force, although being marginalized in the era of economic globalization, has not been rendered obsolete. Military forces continue to retain their coercive and deterrent power, functions that economic instruments are still unable to perform with as much as effectiveness  [15]  . Military power, it must be born in mind, is fungible, that is, can be used for purposes other than dealing with only internal and external threats. In the Bangladesh context, apart from deterring external military aggression and tackling internal political threats, Bangladesh armed forces are of considerable help for reconstruction and rehabilitation in the aftermath of natural disasters which the country faces frequently. Economic Economic security is a term that is fraught with controversy, since in an interdependent global economic system it is difficult to achieve absolute security. In this era of globalization economic security is an inseparable element of comprehensive security, and the impact of both private sector economic activities and governmental economic diplomacy are treated as two sides of the same coin.  [16]  As a least developed country (LDC) Bangladesh has certain in-built problems, (the most glaring being wide-spread poverty), that severely constrain the effective and independent conduct of its foreign policy. At present, the country is further disadvantaged by the stiff competition that it has to face in the outside world especially with India. As has just been discussed, the globalization process offers both opportunities and poses challenges for the world, particularly for the developing countries. But Bangladesh, although poor in most respects, is not entirely without resources: it h as manpower (cheap labor), water resources, and mineral resources (coal, oil and gas). If mobilized effectively, its vast but homogeneous and resilient population could take advantage of the information technology. The liberal international trade has led to an increase in the level of employment creating about 1.5 million jobs in the export sector. Therefore, there is an urgent need for Bangladesh to conduct its economic diplomacy, with vigor and vision. Among the challenges being faced by Bangladesh are how to promote its economic prosperity in the dynamic, complex and highly competitive world, and domestically to provide the foundation for the satisfactory performance of its economy. And how to attain this goal in an environment where major decisions affecting national life are often determined by the international market. For instance, interest rates are determined more by global trends than by national ones. Another salient feature of the globalization phenomenon involves migration. So, it becomes imperative that Bangladesh make diplomatic efforts to make it possible for Bangladeshi people to work in other countries where there are better opportunities. In this era of competition, Bangladesh will not necessarily get what it deserves, but only what it can negotiate. Bangladesh needs to take the advantage of the opportunities that globalization offers through the free flow of information and the use of English as an international language. This would help produce a better trained workforce capable of competing at the international level. It also has to negotiate preferential access to the markets of the Western countries, as well as those of India and China. In the case of India, asymmetry in the bilateral trade relations has to be redressed. It would, to some extent, depend on the negotiating skills of Bangladesh officials, as, to what extent they can ensure market access. (c)Environment In the environment sector Bangladesh faces a number of challenges concerning the control of the flow of the Ganges waters by India, desertification, deforestation, global warming, etc. Most of these problems originate or are caused by factors that are external to Bangladesh. Global warming, for instance, is a truly globalized phenomenon. It is estimated that a sea-level rise of 1 meter could lead to the submergence of as much as one-third of the coastal areas of Bangladesh, and in the process, may give rise to what is called the problem of environmental refugees, and threaten the territorial integrity of Bangladesh. Although the above-mentioned problems do not appear to pose any immediate threat to security of Bangladesh, these may do in the long run. After all, it must be borne in mind that, The environment, modified by human interference, sets the conditions for socio-political-economic life: when these conditions are poor, life is poor.  [17]   (d) Socio-Political A major focus of the new thinking in security studies is the socio-political conditions of the nation. Societal security is basically about identity of a group or community, and the political security is more about institutions and organizational security of the state. There can be a number of ways in which societal security could be threatened, for example, through migration and horizontal competition.  [18]  In the case of Bangladesh, its cultural identity could be diluted through the powerful cultural influence from foreign sources, especially from closest neighbor India. Bangladesh faces a dilemma in this regard, since modernization involves adopting ideas and practices from more developed societies, while at the same time protecting its own cultural values and identity. Political threats like terrorism, which is becoming increasingly lethal, for instance, could pose a serious challenge to the viability of a nascent democracy like Bangladesh, which is already assailed by a host of other problems.  [19]  This is a particularly negative aspect of globalization that is having a damaging impact on the security of Bangladesh, which may be subjected to what is termed as cultural militarization- that is, to the transformation of culture in ways that rather render violent responses to social problems normal and unexceptional. Cultural militarization marginalizes non-violent strategies for conflict resolution, ultimately leading to the brutalization of society and the weakening of human security institutions.  [20]   Bangladesh is also moving in that direction. Terrorism and the proliferation of light weapons are a dangerous combination, the incidence of which is increasing in Bangladesh due to the free flow of goods and porous borders. Poverty is another source of insecurity for Bangladesh. But whether globalization as such would alleviate poverty is debatable. In the final analysis, it depends on the capacity of the government to mobilize resources in an optimum way. That is something that can be achieved is there is political stability inside the country. Inability to achieve political stability would not only result in Bangladesh failure to take advantage of the positive aspects of globalization, but its foreign and economic policy agenda would be set outside the country. Discussion: Globalization- Prospects and Challenges? It is amply clear that Bangladesh has vulnerabilities in practically all areas: territorial, economic, environmental, and socio-Political. Bangladesh appears to be constrained as far dealing with its immediate neighbors are concerned, which means that it will need to cooperate with them despite the fact that its internal security and stability could be adversely affected by them. However this is not to deny the value of military power, which can always act as a deterrent. No matter how remote the possibility of aggression from the outside, Bangladesh should formulate a sound defense policy. While there are both external and internal sources of threats, on balance the latter are perceived to be posing more serious challenges for the security, stability and prosperity of the country. The main objectives of Bangladeshs foreign policy, viz., upholding its sovereignty, cultural identity, ideology are challenged by the forces of globalization. At the same time, while these factors do pose threats, it is difficult to determine exactly when and how they will evolve into threats to national security. The most pressing task before Bangladesh is to achieve political stability; otherwise, it will not be possible for its diplomats to project a positive image of the country. Foreign policy is, after all, is an extension of its domestic policy; therefore, as long as Bangladesh is domestically not in order, it would not be realistic to expect it to have a credible and effective foreign policy. Despite the challenges confronting the security and foreign policy of Bangladesh, it is yet possible to hope for a prosperous future. The tragedy would be that, if it cannot compete and negotiate with the outside world from a position of strength, if cannot take advantage of the positive aspects of globalization, and if it fail to peacefully resolve its own domestic social and political problems, the process of development would be retard- taking perhaps several more costly decades, instead of one. Bangladesh needs to deal with challenges like transnational economic and financial forces, cross-border terrorism, arms and drug trafficking, climate change and environmental degradation through cooperation and coordinated efforts at both regional and international levels. The main purpose of Bangladeshs foreign policy in the present era should be minimizing the degree of vulnerabilities and reducing threats to its security, as well as possessing the ability to shape its security environment through an effective and realistic assessment of its national interests, and the production thereof through pragmatic and active diplomacy. Conclusion It can therefore be argued that despite globalization, the real sources of Bangladeshs insecurity would continue to remain mainly domestic (which could be exacerbated and exploited by external sources), that demand attention from within the state. The basic challenge facing Bangladesh is to comprehend the nature of changes taking place in the international economy and to deal with them through creating conditions and institutions necessary for coping with a dynamic environment. Only the constructive efforts of a dynamic and modern state could achieve success in eliminating the main sources of insecurity. Otherwise, chances are that, widespread and endemic social and political conflict would reduce it to the status of a failed state, with people becoming more concerned with personal security than with national security. MAP OF BANGLADESH

Saturday, July 20, 2019

Post Surgery Care for Laparoscopic Cholecystectomy

Post Surgery Care for Laparoscopic Cholecystectomy Bianca Robinson CLINICAL SCENARIO: PERSON CENTRED CARE Introduction Patients who are undergoing operative procedures are required the delivery of ongoing care to optimize their recovery and prevent complications. This delivery of care will enable early identification of circumstances surrounding surgery that may put patients at risk of harm (Williams Hopper, 2011). Mr Timoti Whakaana is a 36 year old Polynesian male who has just returned to the ward after having a laparoscopic cholecystectomy; the surgical removal of the gall bladder in a process also known as keyhole surgery (Graham, 2008, p. 41). The aim of this report is to identify and prioritise the problems associated with in the first four hours of Mr Whakaana’s return back to the ward. This report presents the four highest problems, including nursing interventions and person centred care that may occur with Mr Whakaana on return to the ward from surgery. ABCDE ASSESSMENT Although different surgical procedures require specific and specialist nursing care, the principles of post-operative care remain the same. It is essential for a structured assessment of Mr Whakaana to be carried out such as that described by Thim, Krarup, Grove, Rohde Lofgren (2011) where Airway, Breathing, Circulation, Disability and Environment are examined. This is known as a primary assessment, and is used to identify any signs of airway obstruction, respiratory failure, circulatory failure or neurological dysfunction (Thim, Krarup, Grove, Rohde Lofgren, 2011, p. 117). The nurse must pay particular attention to Mr Whakaana’s airway due to his previous administration of morphine, as morphine is symptomatic of respiratory depression and should be monitored closely to prevent bradypnoea, a respiratory rate less than 12 breathes per minute (Tiziani, 2010, p. 645). Mr Whakaana’s conscious state should also be monitored especially as he is currently scored as 1 on the Glasgow Coma Scale, the nurse must pay particular attention to this to ensure that Mr Whakaana does not go into shock (Elliott, Aitken Chaboyer, 2007, p. 354). It is also helpful to include the patency of drainage systems and vascular devices into your primary assessment of Mr Whakaana, and note if any allergies are known (Elliott, Aitken Chaboyer, 2007, p. 354). Nursing Problem:Risk for aspiration related to reduced level of consciousness, depressed cough and gag reflex, impaired swallowing. Prior to surgical procedure, general anaesthesia is induced. This will relax the muscles of the body and depresses any sensation of pain, as a result the gag and swallowing reflex is temporarily suppressed and may lead to aspiration (Wright, 2011, p. 992). Person Centred Goal: After 1 hour of nursing interventions, Mr Whakaana will maintain safety and maintain homeostasis, and after 4 hours Mr Whakaana will demonstrate return of reflexes (Gulanick Myers,2014, p. 20). Invention Rationale:The nurse will monitor and record vital signs for baseline data. The nurse will also assess Mr Whakaana’s condition to note any abnormalities, and noting the duration of anaesthetic medications will help assess the presence of the gag reflex (Gulanick Myers,2014, p. 20). Maintaining a patent airway by suctioning may be necessary as airway obstruction will block ventilation (Gulanick Myers,2014, p. 20). Evaluation: After 1 hour of nursing interventions, Mr Whakaana will maintain safety and maintain homeostasis, and after 4 hours Mr Whakaana will demonstrate return of reflexes (Gulanick Myers,2014, p. 20). VITAL SIGNS / PAIN Vital signs should be assessed as often as possible (every half hour) during the few hours of Mr Whakaana’s return to the ward to determine any signs of deterioration (Crisp Taylor, 2008 p. 586). Vital sign measurements include blood pressure, respirations, pulse, temperature and oxygen saturation levels. Changes in Mr Whakaana’s blood pressure can be used to monitor changes in his cardiac output; pulse assessment can determine Mr Whakaana’s heart rate and rhythm, and can estimate the volume of blood being pumped by his heart (Crisp Taylor, 2008 p. 576). Core body temperature differences can occur in illnesses and an abnormal reading can be an indication of infection; Mr Whakaana’s temperature is 36.5C at present, which is within normal range (Crisp Taylor, 2008 p. 547). Pulse oximeters give a non-invasive estimate of the arterial haemoglobin oxygen saturation, and measurement should always be above 95% (Crisp Taylor, 2008, p. 573). When measuring the oxygen saturation, the nurse should be aware that Mr Whakaana is currently on 3L per minute of oxygen via nasal prongs, as this could give a false sense of security when recording/documenting Mr Whakaana’s oxygen saturation level (Elliott, Aitken Chaboyer, 2007 p.590). Mr Whakaana’s pain and discomfort are also important factors in the postoperative period as good pain control is required for an optimal recovery (Scott, 2008, p. 59). Mr Whakaana has reported his pain as 3/10 on movement. Self-reporting of pain can be influenced by numerous factors including mood affect, sleep disturbances and any medications that may result in a patient not reporting pain accurately (Scott, 2008, p. 59). For example, Mr Whakaana may not report his pain because of the effects of sedation or lethargy and reduced motivation as a consequence of the surgery therefore, assessment of Mr Whakaana must be undertaken at appropriately frequent intervals (Scott, 2008, p. 59). The nurse should administer analgesicà ¢Ã¢â€š ¬Ã‚ ©therapy as ordered, evaluatingà ¢Ã¢â€š ¬Ã‚ ©thenà ¢Ã¢â€š ¬Ã‚ ©modifyingà ¢Ã¢â€š ¬Ã‚ ©thatà ¢Ã¢â€š ¬Ã‚ ©therapy according toà ¢Ã¢â€š ¬Ã‚ ©Mr Whakaana’sà ¢Ã¢â€š ¬Ã‚ ©response (Macintyre, Scott, Schug, Visser, Walker, 2010, p. 34). Mr Whakaana’s pain assessment must lead to changes in management and re-evaluation to ensure improvements in his quality of care. Nursing Problem:Risk of ineffective breathing pattern related to pain. Mr Whakaana’s respirations may increase as a result of pain or as an initial compensatory mechanism. However, increased work of breathing may indicate increasing oxygen and energy consumption or a reduced respiratory reserve (Scott, 2008, p.60). Person Centred Goal:After 4 hours of nursing intervention Mr Whakaana will establish an effective breathing pattern. Invention Rationale:The nurse will administer oxygen via nasal prongs as ordered, as this will maximize the available oxygen, especially while ventilation is reduced because of pain (Scott, 2008, p. 60). The nurse will also administer pain medications as ordered, to treat Mr Whakaana’s underlying cause of the respiratory problem. The nurse will monitor vital signs especially Mr Whakaana’s respiratory rate for baseline data, and encourage and assist with deep breathing and coughing exercises as appropriate to promote maximal ventilation and oxygen (Graham, 2008, p. 47). Monitoring for restlessness and changes in mental status is also needed, as this may indicate hypoxia (Scott, 2008, p.60). Evaluation:After 1 hour of nursing interventions, Mr Whakaana shall have demonstrated an improved breathing pattern after 4 hours of nursing interventions, Mr Whakaana shall have established an effective breathing pattern (Gulanick Myers,2014, p. 241) FLUID BALANCE Post-operative patients are vulnerable to fluid and electrolyte imbalances due to many influences including blood loss, fasting and exposure during surgery (Williams Hopper,2011, p. 71). Therefore an accurate measurement of Mr Whakaana’s fluid balance is essential to evaluate his condition, this includes strict readings of his output of urine and any vomit, and the measurement of fluid intake orally or intravenously (Gulanick Myers,2014, p. 387). The nurse should assess Mr Whakaana’s surgical wounds at regular intervals for excessive blood loss, as this may indicate haemorrhage (Williams Hopper,2011, p. 72). Other factors that should be taken into account include diarrhoea or sweating. Nursing Problem:Altered fluid and electrolyte imbalance – risk of fluid volume deficit related to restricted oral fluid intake before, during, and after surgery. Fluid volume deficit, or hypovolemia, occurs from a loss of body fluid or the shift of fluids into the third space, or from a reduced/restricted fluid intake (Williams Hopper,2011, p. 73). Person Centred Goal: Mr Whakaana will not experience fluid volume deficit, hypokalaemia or metabolic alkalosis as evidenced by normal skin turgor, moist mucous membranes, stable weight, blood pressure and pulse within normal range, capillary refill time less than 3 seconds, return of peristalsis within expected time, and a balanced intake and output within 48 hours after surgery (Gulanick Myers,2014, p. 387). Invention Rationale:The nurse will assess for and report signs and symptoms of deficient fluid volume, hypokalaemia and metabolic alkalosis such as decreased skin turgor, dry mucous membranes, and weight loss of 2% or greater over a short period (Williams Hopper,2011, p. 73). The nurse must also monitor input/output measurements and administer fluid replacements as ordered to provide a baseline for fluid volume replacement as early recognition of signs and symptoms of fluid volume deficit and electrolyte imbalance allow for prompt intervention (Gulanick Myers,2014, p. 387). Evaluation:Mr Whakaana will not experience fluid volume deficit as evidenced by normal skin turgor, capillary refill time less than 3 seconds, moist mucous membranes, and a stable weight (Gulanick Myers,2014, p. 387). INFECTION /SEPSIS The skin is a natural barrier against infection, so any surgery that causes a break in the skin can lead to a postoperative infection (Brown Edwards, 2011, p. 275). Microorganisms can infect a surgical wound through various forms of contact, such as from the touch of a contaminated caregiver or surgical instrument, through microorganisms in the air, or through microorganisms that are already on or in your body and then spread into the wound (Brown Edwards, 2011, p. 513) Chronic diseases and other patient characteristics influence susceptibility to infection, such as diabetes, smoking, or prolonged preoperative hospital stays can increase Mr Whakaana’s risk of infection. Nursing Problem:Risk for infection, related to impaired primary defence. Mr Whakaana is at risk of acquiring infection due to the break in the continuity of the first line defence which is the skin; if there is a breakage in the skin, the pathogens will easily invade the body’s system thus increasing risk for infection (Gulanick Myers,2014, p. 107). Person Centred Goal:After 4 hours of nursing interventions, Mr Whakaana will achieve timely wound healing, free of infection, and be afebrile (Gulanick Myers,2014, p. 108). Invention Rationale:The nurse will monitor vital signs and assess Mr Whakaana’s condition to gather baseline data. The nurse will also stress proper hand washing techniques, as this is a first line defence against infection or cross contamination (Gulanick Myers,2014, p. 108). The nurse will have a strict compliance to hospital control, sterilisation, and aseptic policies to prevent occurrence of infection. Evaluation:After 4 hours of nursing interventions, Mr Whakaana shall have achieved timely wound healing, be free of infection, and be afebrile (Gulanick Myers,2014, p. 108). OTHER CONSIDERATIONS Mr Whakaana has a past medical history of type 2 diabetes, and therefore he is associated with an increased risk for surgical procedures and increased postoperative morbidity (Diabetes Australia, 2010). Major surgical operations require a period of fasting during which oral anti-diabetic medications cannot be used, and the stress of surgery itself results in metabolic concerns that alter glucose homeostasis (Diabetes Australia, 2010).Persistent hyperglycaemia is a risk factor for postoperative sepsis andimpaired wound healing, so the management goal during Mr Whakaana’s post-operative period is to optimize metabolic control through close monitoring, adequate fluid and caloric repletion, and cautious use of insulin (Diabetes Australia, 2010). Conclusion Although postoperative care is a daily occurrence in nursing care, it is clear that the theories behind nursing actions are often forgotten in daily practice and these actions may not be prioritised as they should be (Crisp Taylor,2008, p. 1449). It is hoped that this report has enabled the reader to revisit the principles behind postoperative care. Such care must be viewed as a priority, and although there are local policies in place to guide nursing staff, the responsibility for understanding the reasons for actions lies with each individual practitioner (Crisp Taylor,2008, p. 1449). REFERENCES Brown,D., Edwards,H. (2011).Lewiss medical-surgical nursing: Assessment and management of clinical problems. Chatswood, N.S.W: Elsevier Australia. Crisp,J., Taylor,C. (2008).Potter Perrys fundamentals of nursing. Chatswood, N.S.W: Elsevier Australia. Diabetes Australia (2010).Hospital Stay / Surgery Procedures Diabetes Australia. Retrieved from http://www.diabetesaustralia.com.au/NDSS-Content/Diabetes-Information-Sheets/Hospital-and-Surgery/ Elliott,D., Aitken,L.M., Chaboyer,W. (2007). Australian College of Critical Care Nurses ACCCNs critical care nursing. Sydney: Mosby Elsevier. Graham, L. (2008). Care of patients undergoing laparoscopic cholecystectomy.Nursing Standard,23(7), 41-8; quiz 50. Retrieved from http://0-search.proquest.com.alpha2.latrobe.edu.au/docview/219887551?accountid=12001 Gulanick,M., Myers,J.L. (2014).Nursing care plans: Diagnoses, interventions, and outcomes(8thed.). St. Louis, PA: Elsevier/Mosby. Macintyre,P.E., Scott,D.A., Schug,S.A., Visser,E.J., Walker,S.M. (2010).Acute Pain Management: Scientific Evidence. Canberra, ACT: National Health and Medical Research Council. Scott, L. (2008). Post-operative pain.Nursing Standard,22(31), 59-60. Retrieved from http://0search.proquest.com.alpha2.latrobe.edu.au/docview/219834220?accountid=12001 Thim, T., Krarup, N., Grove, E., Rohde, C., Lofgren, B. (2011). Initial assessment and treatment with the Airway, Breathing, Circulation, Disability, Exposure (ABCDE) approach.International Journal Of General Medicine,5, 117121. Tiziani, A. (2010). Havards nursing guide to drugs. Sydney, New South Wales: Mosby/Elsevier Australia. Williams,L.S., Hopper,P.D. (2011).Understanding medical surgical nursing. Philadelphia, PA: F.A. Davis. Wright, K. D. (2011). Cholecystectomy. In L. J. Fundukian (Ed.), The Gale Encyclopedia of Medicine (4th ed., Vol. 2, pp. 991-992). Detroit: Gale. Retrieved from http://go.galegroup.com/ps/i.do?id=GALE%7CCX1919600390v=2.1u=latrobeit=rp=GVRLsw=wasid=e5af97b40081994971c49abc50c8cb56 Page 1 of 10

Hong Kong :: essays research papers fc

Hong Kong It’s March of 1997, and a political cartoonist who goes by the pen name â€Å"Zunzi†, sketches in a cafe in Hong Kong. Many Americans take this right for granted. Zunzi, however, is thankful that his newspaper is among the few that have avoided self-censoring as the Chinese take-over approaches, bringing with it harsh censorship laws. He draws a picture of a smiling man outfitted in the lower half of a dog costume, preparing to put on it’s head. The man symbolizes wealthy businessmen in Hong Kong, and the costume symbolizes their willingness to obey Beijing by assuming positions of power, such as the Preparatory Committee and the Provisional Legislature. They change their costume and identity in whichever group they are in while remaining loyal to China by acting as China’s â€Å"puppets†. This way, China has a strong grip on political affairs in Hong Kong. Zunzi is aware his days in Hong Kong are limited (Sesser 21). As China takes over many l aws that restrict Hong Kong’s free speech are being put into effect, causing uneasiness among citizens. Despite China’s attempt to control, Hong Kong citizens struggle to maintain the democratic lifestyle to which they are accustomed. The Chinese government’s restriction of free speech has oppressed many citizens of Hong Kong. Before the hand-over on July 1, 1997, a vigil was held in Hong Kong’s Victoria Park for the victims of the June 4, 1989 massacre at Tianemen Square. Fifty-thousand people attended the vigil, which remembered those who died while rallying for democracy. Said pro-democracy campaigner Szeto Wah, â€Å"Tonight. we are again using sparks of candlelight, solidified drops of ‘tears,’ to remember you and mourn you." However, demonstrations like this are not looked on by approval by the new government that will come with the hand-over. The soon-to-be executive chief Tung Chee-hwa expressed his disapproval of the vigil by saying that it is â€Å"...time to set aside the burden of June 4†. New laws proposed by the Provisional Legislative Council required demonstrations and societies to register with the government. Those considered dangerous to national security will be banned (Baird 30). These new lawsthreaten to make demonstrations like the one held in Victoria Park impossible. The disapproval and Tung Chee-hwa and the emergence of restrictive laws pose a threat to citizens who value their right to free speech. Hong Kong citizens fear expressing themselves through art because of China’s control.

Friday, July 19, 2019

Child Case Study :: Psychology Psychological children Essays

Child Case Study Who?  Ã‚  Ã‚  Ã‚  Ã‚  5-year old boy (Friends Nephew) Name? â€Å"JD† Where? In the Family Room and the Kitchen How many family members are present? Brother(3) Aunt (20) Grandma (60) (PEER SETTING) 30-minute observation Friday 2/25/05 4:00PM  Ã‚  Ã‚  Ã‚  Ã‚  Child sitting on floor in front of TV getting ready to watch Ed, Edd, and Eddy. 4:02PM  Ã‚  Ã‚  Ã‚  Ã‚  Lying down on pillow. 4:04PM  Ã‚  Ã‚  Ã‚  Ã‚  Asks aunt for banana. 4:06PM  Ã‚  Ã‚  Ã‚  Ã‚  Eats banana in kitchen 4:08PM  Ã‚  Ã‚  Ã‚  Ã‚  Eating and watching from kitchen. 4:10PM  Ã‚  Ã‚  Ã‚  Ã‚  Finishes banana and sits in family room watching cartoon. 4:12PM  Ã‚  Ã‚  Ã‚  Ã‚  Sitting and watching TV with little brother. 4:14PM  Ã‚  Ã‚  Ã‚  Ã‚  Commercial and brother and him reenacting cartoon. 4:16PM  Ã‚  Ã‚  Ã‚  Ã‚  Cartoon is back on and both are still playing rough. 4:18PM  Ã‚  Ã‚  Ã‚  Ã‚  Aunt tells them to stop and they don’t. They are still playing rough. 4:20PM  Ã‚  Ã‚  Ã‚  Ã‚  Child stops playing rough with younger brother and sit down watching TV. 4:22PM  Ã‚  Ã‚  Ã‚  Ã‚  Watching Ed, Edd, and Eddy. 4:24PM  Ã‚  Ã‚  Ã‚  Ã‚  Watching Ed, Edd, and Eddy. 4:26PM  Ã‚  Ã‚  Ã‚  Ã‚  Laughing and still watching Ed, Edd, and Eddy. 4:28PM  Ã‚  Ã‚  Ã‚  Ã‚  Show is over child begins to play with Aunt’s Boxer Dog. 4:30PM  Ã‚  Ã‚  Ã‚  Ã‚  Child continues to play with dog (brother joins in later). Who?  Ã‚  Ã‚  Ã‚  Ã‚  5-year old boy (Friends Nephew) Name? â€Å"JD† Where? In the Kitchen How many family members are present? Brother(3) Aunt (20) Grandma (60) Sister (6) (FAMILY INTERACTION) 30-minute observation Monday 3/1/05 2:00PM  Ã‚  Ã‚  Ã‚  Ã‚  Kids come over. 2:02PM  Ã‚  Ã‚  Ã‚  Ã‚  Child pulled homework out right away and Aunt sits to help. 2:04PM  Ã‚  Ã‚  Ã‚  Ã‚  Aunt helps child with reading for reading log. 2:06PM  Ã‚  Ã‚  Ã‚  Ã‚  Child practicing reading skills with his reading book. 2:08PM  Ã‚  Ã‚  Ã‚  Ã‚  Child finished reading book 2:10PM  Ã‚  Ã‚  Ã‚  Ã‚  Child worked on his writing skills. JD writes two sentences every three days. 2:12PM  Ã‚  Ã‚  Ã‚  Ã‚  Child is still working on his writing skills. 2:14PM  Ã‚  Ã‚  Ã‚  Ã‚  Child is still working on his writing skills, he is almost finished. 2:16PM  Ã‚  Ã‚  Ã‚  Ã‚  Child finishes his sentence writing and works on his math homework. 2:18PM  Ã‚  Ã‚  Ã‚  Ã‚  Child works on math problems. 2:20PM  Ã‚  Ã‚  Ã‚  Ã‚  Child is counting with his fingers. 2:22PM  Ã‚  Ã‚  Ã‚  Ã‚  Child is still counting with his fingers on another problem. 2:24PM  Ã‚  Ã‚  Ã‚  Ã‚  Child finishes his homework. JD sits on couch and watches Jimmy Neutron. 2:26PM  Ã‚  Ã‚  Ã‚  Ã‚  Child watches TV still. 2:28PM  Ã‚  Ã‚  Ã‚  Ã‚  TV Show ends and child tries to read his dinosaur book. 2:30PM  Ã‚  Ã‚  Ã‚  Ã‚  Child gives up on reading and goes back to watching the next episode on Nicktoons.