Wednesday, July 31, 2019

Macbeth Act 3 Scene 5 Essay

This scene takes place in a ‘deserted area’ where there is thunder which also parallels with act 1 scene 1 where the witches meet each other with thunder and lightning. The scene establishes the mood of darkness and violence and also creates suspense and eerie atmosphere due to the presence of witches. It begins with Hecate’s monolog where she disapproved the witches for meddling with Macbeth’s future; this passage foreshadows the appearance of the witches to Macbeth along with his downfall. Her anger is shown at the opening of the scene with the use of three rhetorical questions. In the first rhetoric question, Hecate criticizes the witches in a deeming way. In the second rhetoric question the alliteration ‘trade and traffic’ emphasizes her upset tone and in the third rhetoric question she asserts her superiority over the witches â€Å"mistress of your charms, the close contriver of all harms†. Through the metaphor, ‘wayward son’ Hecate gives clues that Macbeth attempted to defy the witches prophecy by trying to destroy Banquo’s line. It also shows his self-centered ambition, and he is called a wayward son because he is not a genuine devotee of witchcraft and only aims to the profit by it. The lines by Hecate give a clear hint that Macbeth’s reliance on the witches is misplaced and that he is doomed. After rebuking the witches for the past errors Hecate commands them to â€Å"make amends† of their folly action. Hecate gives out a feeling of betrayal through the use of her language. She uses rhetorical questions, rhyming couplet, and enjambment which disguises her underline message. Hecate also asks the witches to help her manipulate Macbeth’s emotions and plans to create illusions which will lure Macbeth into a false sense of security. Hecate’s speech is ironical when she says that the witches tempted Macbeth by saying riddles when they actually prophesied to Macbeth. Euphemism is used in the terms glory of art and great business to refer to the witches plan of destroying Macbeth. The great business also refers to the major illusion that they are going to destroy Macbeth. Imagery is used in the scene were a vivid description of the scheme of the witches plan is described â€Å"there hangs a vap’rous drop profound; I’ll catch it ere it come to ground;† Hecate intends to lead Macbeth to his doom and distraction by magic spells which will conjure up powerful apparitions that will be able to lead Macbeth to his ultimate doom. As a result Macbeth will defy fate and death and will ignore all warnings of wisdom and fear of consequences â€Å"security is mortals’ chiefest enemy†, Hecate says that overconfidence is the greatest enemy of man as by depriving of his own wisdom and making him complacent, it sends him to the path of ruin and destruction. These captivating lines encapsulates the fascinating rituals of which craft.

Phase Transformations in Metals

It follows that some of the parent phase volume disappears. * Transformation reaches completion If growth Is allowed to proceed until the equilibrium fraction Is attained. Two types of Nucleation 1 . Homogeneous: nuclei of the new phase form uniformly throughout the parent phase. 2. Heterogeneous: nuclei form preferentially at structural inhomogeneous, such as container surfaces, grain boundaries, insolvable impurities, dislocations, etc. Homogeneous nucleation: solidification of a pure material, assume nuclei of solid phase form In the interior of the liquid phase.There are two contributions to the total free energy change AC that accompany a solidification transformation 1 . The volume free energy Agave – which is the difference in free energy between the solid and liquid phases. Agave will be negative if the temperature is below the equilibrium solidification temperature. The magnitude of its contribution is the product of Agave and the volume of the spherical nucleolus (4/ 3 aorta ) 2. Surface free energy y: energy comes from the formation of the solid-liquid phase boundary during the solidification transformation. Is postlude; the magnitude of this contribution Is the product of y ND the surface area of the nucleus (nor) * the total free energy change GAG Is equal to the sum of these two contributions: GAG=4/3 aorta GAG_v+rattrap y * In a physical sense, this means that as a solid particle begins to form as atoms in the liquid cluster together, its G first increases. If this cluster (embryo) reaches a size equal to the critical radius, r*, then growth will continue with the accompaniment of a decrease In LEG. An embryo with a radius greater than Is called a nucleus.A critical free energy occurs at the maximum of the curve, which corresponds to the activation energy needed for the formation of a stable nucleus. Critical radius of a stable solid particle nucleus: ) Activation free energy required for the formation of a stable nucleus: ) This volume fre e energy change is the driving force for the solidification transformation, its magnitude is a function of temperature. At the equilibrium solidification temperature (or melting temperature) Tm, Agave Is O, and with decreasing temp It becomes Increasingly more negative.Agave temperature decreases meaning, nucleation occurs more readily at temperature below Tm The number of stable nuclei n*(having r>r*) is a function of temperature as well: 1 ) changes in T have a greater effect on than on he denominator. As T is lowered below Tm the exponential term decreases such that the magnitude of n* increases *another important temperature dependent step in nucleation: the clustering of atoms during short range diffusion during the formation of nuclei. The influence of temp on the rate of diffusion: high temp increases diffusion.Diffusion is related to the frequency at which atoms from the liquid attach themselves to the solid nucleolus, VT. Thus, low temp results in a reduction in VT. The nuc leation rate N is the product of n* and VT Heterogeneous nucleation has a lower activation energy than homogeneous because he surface free energy is reduced when nuclei form on the surface of preexisting surfaces. Growth occurs by long range diffusion consequently, the growth rate G is determined by the rate of diffusion, and its temperature dependence is the same as the diffusion coefficient (recall chapter that diffusion increases as temperature increases).Most phase transformations require some finite time to go to completion, and the rate is important in the relationship between heat treatment and the development of macrostructure * for solid systems the rate is so slow that true equilibrium structures are rarely achieved, equilibrium is maintained only if heating and cooling are carried out at SLOW unpractical rates. *for other than equilibrium cooling Superimposing: cooling to below a phase transition temperature without the occurrence of the transformation Superannuating: hea ting to above a phase transition temperature without the occurrence of the transformation

Tuesday, July 30, 2019

According to Maslow’s hierarchy Essay

1. According to Maslow’s hierarchy, which basic needs does the Patagonia culture meet? What would it be like to work at Patagonia? (Hint: Go to Patagonia’s website and find the section on jobs.) What’s your assessment of the company’s work environment? (20 points) Maslow’s hierarchy consists of five basic needs, self-actualization, esteem, social, safety, and physiological. Patagonia culture meets many standards promising that their products are produced under safe, fair, legal, and humane working conditions throughout the supply chain (Patagonia, 2014). Patagonia offers all of the needs of Maslow’s theory, making employees comfortable at their job; This Company cares about their employees offering childcare, organic meals, recreational activities, and more. Working at Patagonia would be a great place, where the company encourages celebrations and activities to boost the employee’s moral. Patagonia is known for having loyal employees b ecause of how the managers treat them having communication deadlines, expectations, and including employees in figuring out the best way to meet needs. I believe that this work environment is successful because of how it is managed and the way the employees are treated. 2. Use the expectancy theory and/or the equity theory of motivation to explain how feeling underpaid might affect the work of a Patagonia associate and what a manager can do to increase the employee’s motivation. (20 points) Expectancy theory states that a person’s behavior is influenced by the expected outcomes. In this case, low pay would lead the person to feel like no matter what they did, their efforts would not be rewarded with expected pay raises or bonuses. The employees that are underpaid often just show up and do what they have to do, nothing more because they feel their efforts are not appreciated or in some cases known. To increase motivation, acknowledging a job well done, special efforts, or anything the employee tries and does should be part of the routine. Also, making pay comparable to work, offering bonuses or rewards would also help motivation. 3. What do you think might be Patagonia’s biggest challenge in keeping employees motivated? If you were managing a team of Patagonia employees in the retail stores, how would you keep them motivated? (20 points) I believe Patagonia’s biggest challenge in keeping employees motivated is the pay. Pay is one of the biggest motiv ations for employees especially a competitive pay. Employees need to be acknowledged and feel like they are a part of a team. If I were managing Patagonia, IÂ  would have quarterly bonuses for employees that exceed expectations, coming to work on time, going above and beyond for the business. I would also do an employee of the month, with rewards that could help motivate my employees. It is important to keep your employees engaged and informed when running a business. I would include my employees on decisions that need to be made, having my employees involved because they are the ones that work with the merchandise and customers. I want to treat my employees fairly making them comfortable working for me. References Working With Factories. (2014, January 1). Retrieved October 12, 2014, from http://www.patagonia.com/us/patagonia.go?assetid=67583

Monday, July 29, 2019

Should the Unemployed be required to do voluntary work Research Paper

Should the Unemployed be required to do voluntary work - Research Paper Example The rise of capitalism has also brought about tremendous hordes of people who are unemployed. For whatever reasons, these people cannot cope or cannot find the jobs they want with the skills they have. The global economy has undergone big changes due to this globalization trend in that the world has become â€Å"flatter† (or more flat), in the words of some economists. The world is now flatter because not only do people compete for jobs with other people within the same country but also vie for jobs with the people of other countries with cheaper cost of labor or some other competitive advantage. This has been shown by the phenomenon of outsourcing whereby jobs are â€Å"exported† to countries in Asia, the Middle East and other parts of the world where it makes more economic and financial sense to do so. The earlier method was contracting, then it became sub-contracting, near-shoring, off-shoring and then finally, outsourcing. Business leaders had welcomed this development but to the detriment of organized labor which had seen its union ranks dwindle with the loss of jobs. People opt to moderate their wage demands in view of this outsourcing threat. A consequence of this phenomenon is that millions are now jobless. Capitalist economic theory posits that unemployment will always be present despite all the best efforts of business leaders and politicians because it is nearly impossible to eradicate. In other words, full employment is a pipe dream (a near impossibility) but the collapse of the U.S. sub-prime mortgage market has greatly contributed to swelling the ranks of the unemployed. It destroyed the American middle class and the American Dream because well-paying jobs that had survived the outsourcing phenomenon were likewise wiped out. A prolonged and severe economic downturn made matters worse for most people. The economists have called this the Great Recession (in contrast

Sunday, July 28, 2019

Masters in Business Administration, Executive Program at Loyola Univer Essay

Masters in Business Administration, Executive Program at Loyola University - Essay Example I have had close to a decade of experiences in this area using my talents as an engineer and administrator and I have had to make decisions that have been crucial to realizing successful business transactions. By obtaining an MBA at Loyola University, will give me ample information gathered by national and international experts and it will give me the opportunity to make decisions based on others ´ experiences that have lead to positive and negative results. In doing so, I will be in a position to apply strategies and methodologies learnt from academia to make successful business transactions. I see myself collaborating with others to make these business transactions a fruitful benefit for all of those involved in the business transactions. I want to be part of the MBA program at Loyola University and become actively involved in working independently and working as part of a team to research cases and brainstorm ideas of why some businesses failed while others succeeded. Having this opportunity will give me a chance to work positively on projects, continue the networking processes with classmates, professors, and future corporations and make contributions that will help them acquire successful business results. At this point in my life, I am interested in advancing to the next level of my career. At the moment I am a Project Engineer. I want to continue managing projects that are related to engineering and administration on a national and international basis. I have strategically planned my life’s goals and objectives and this is one more I wish to accomplish. I plan to pursue projects that are demanding in essence and will make changes in the way they have been operating in the present, using my experiences and the knowledge that I will obtain from the Executive Program. I realize that an MBA from Loyola University will give me the skills I will need to become a successful engineer as an executive. It will give me the necessary tools for communication and the necessary leadership skills to succeed in my life endeavours.  

Saturday, July 27, 2019

Outline and Annotated bibliography Essay Example | Topics and Well Written Essays - 1000 words

Outline and Annotated bibliography - Essay Example (Lovejoy, 2009). Ardipithecus Ramidus had its pelvic region and feet well developed to maintain an upright posture and walk, but with its big toes, and strong hips and thighs, it could easily climb trees and move around like an ape (Lovejoy, 2009). The major aspect to note about this supposed ancestor of humans is that it cannot be considered at all as the â€Å"transitional (link) between African apes and humans† (Gibbons, 2009, p.37). Ardipithecus Ramidus could easily move around on trees but it did not have many abilities that chimpanzees have, like, â€Å"suspension, vertical climbing, or knuckle-walking† (White et al., 2009, p.64). Hence, White et al. (2009) has supported the theory of hominin-ness of Ardipithecus Ramidus and concluded that â€Å"both hominids and extant African apes are each highly specialized, but through very different evolutionary pathways† (p.64). But there have been many contenders to this theory like Harrison (2010) who believed that the â€Å"earliest undoubted hominin† (p.532) is Australopithecus anamensis that trod this earth 4.2 million years back. In view of these contradictory conclusions made by scientists regarding the relationships between Ardipithecus Ramidus, modern humans and chimpanzees, this study proposes to compare the sexual behaviors of Ardipithecus Ramidus, Australopithecus, modern humans and chimpanzees, in order to decide upon the hominin-ness of Ardipithecus Ramidus and it is hypothesized that such a comparison would lead to the conclusion that are earliest known hominids so far. Methodology This study proposes to use qualitative research method by which the data collected from secondary sources on the sexual behaviors of Ardipithecus Ramidus, Australopithecus, modern humans and chimpanzees, will be compiled and compared. For this, two features related to sexual expression, namely, aggressiveness and sexual dimorphism will be studied in each of the above mentioned four categories- Ar dipithecus Ramidus, Australopithecus, modern humans and chimpanzees. Data Collection and Analysis Information on the sexual behavior of Ardipithecus Ramidus, Australopithecus, modern humans and chimpanzees in connection with aggressiveness and sexual dimorphism will be collected from sources like books, and journal articles published within a period of 20 years. At least 30 secondary sources will be identified and used for this purpose. Data analysis will be carried out using coding of data compiled under each of the four categories. Results The results would indicate that in matters of aggressiveness and sexual dimorphism, Ardipithecus Ramidus is closer to humans than chimpanzees. Discussion The link between the common ancestor of humans and chimpanzees on one side and Ardipithecus Ramidus on the other, remains to be proven yet. In many areas, there is a huge leap between the features of an Ardipithecus Ramidus and an Australopithecus. It is by finding these missing links, the theo ry of hominin-ness of Ardipithecus Ramidus could be further substantiated beyond doubt. Conclusion Given the reduced aggressiveness and reduced sexual dimorphism found in Ardipithecus Ramidus, it can be argued that humans have a less competitive and more democratic primitive past. Further

Friday, July 26, 2019

Menu Selection Assignment Example | Topics and Well Written Essays - 1000 words

Menu Selection - Assignment Example Menu driven interfaces refer to interfaces which enable users to make interactions with computers or technological devices through menus, leading in a series of different screens. The various commands provided by the device enable the user to navigate through the devices and perform various desired functions. The aspect of communication remains the most essential element in ensuring an individual’s capacity to operate a computer or device. In enhancing communication, a dialogue must become established between the person and the device. Within a menu-driven interface dialogue with users becomes established through the information contained within the device, which provides options to users, from which to choose from (Ong & Tan, 2000). Upon the pressing of each button the device provides a predetermined response, subsequently displaying the next screen, as desired by the user. The dialogue element provides the user with different options regarding the services being sought. The device offers guidelines towards ensuring the user performs the desired function. The screens are designed in a sequence which leads the user towards achieving the desired purpose. The modern age has seen tremendous improvement in the utilization of menu driven interfaces among many technological devices. The increased utilization of these interfaces could be attributed to the following reasons Simplicity – menu driven interfaces remain relatively easy to utilize as individuals only have to follow prompts provided by the device. This makes it possible for individuals without previous knowledge of the device become able to use these devices (Gudur, Blackler, Popovic, & Mahar, 2013). All an individual requires in knowledge of the language which the interface communicates with, and following the commands. No commands – the users do not have to enter commands into the device to produce certain information. The use of commands requires

Thursday, July 25, 2019

Argumentative Problem - Solution Paper Research

Argumentative Problem - Solution - Research Paper Example Key words: Deforestation, climate change, greenhouse effects and gases, and global warming Introduction The last 100 years have experienced an increase in global temperature by approximately 1 Fahrenheit per year, this rate is twice that observed in the last thousand years. The average energy linked carbon dioxide release according to the Pew Center on Climate Change, have risen by over 130 percent since 1850; from two hundred million to 27 billion tons per year. This is projected to rise by a further 60 percent by 2030 (Afzal, p. 1). The Arctic and Antarctic ice caps are shrinking, the ice on mountain tops is melting, and the permafrost at the arctic is thawing. Scientific uncertainty exists concerning the severity and speed of global warming and climate modifications. Global warming is occurring for sure, and the health impact of this phenomenon will certainly necessitate informed responses by healthcare professions (Gray, p. 6-10). Overview of Climate Change and Global Warming Gre enhouse effects influence global warming. Greenhouse effects describe the rise in earth’s temperature due to the presence of such gases as methane, and carbon dioxide in the earth’s atmosphere. ... Human activity increases greenhouse gases production increasing their effects on earth. Greenhouse gases increase leads to lowered irradiation of infrared rays back to space. As a result, earth’s average temperatures rise, contributing to climate change (Afzal, p. 1). Hypothesis Climate change is a phenomenon that the world is currently experiencing. This is attested by climate changes worldwide. There has also been an increase of health complications related to climate change such as lung complications, skin and heart complications. This paper gives a brief overview of global warming and its effects on public health. Methods Statistical methods were used to analyze the problem. Earth’s temperature data collected from satellites in outer space, balloons and remote sites were compared to proxy temperature. Data from areas hard hit by climate change and global warming was used to study the health effects of the phenomenon on humans (Reiter, p. 5-14). Results Mounting evid ence suggests that global warming affects human health through events such as changes in water and air quality, extreme weather events as well as infectious disease ecology changes. Europe in 2003 experienced the hottest summer in years with average temperatures exceeding the normal temperature by 3.5 degrees Celsius. Close to 22,000 people died due to this heat wave. Chicago residents in 1995 experienced heat waves reaching 106o F, which resulted to the death of hundreds. In 2005, United States experienced the impact of an extreme weather event; Hurricane Katrina, which resulted to the death of 1,464 people. These events demonstrate the challenge of coming up with an effective and efficient public health response (Afzal, p. 1). During most of the flooding

Managing Health, Safety and Risk in Organizations Essay

Managing Health, Safety and Risk in Organizations - Essay Example The safety case must give full details of the arrangements for managing health and safety and show that the company has safety management systems in place, has identified risks and reduced them to as low as reasonably practicable, has introduced management controls, provided a temporary safe refuge on the installation and has made provisions for safe evacuation and rescue. The Offshore Installation and Pipeline Works (Management and Administration) Regulations 1995 - these set out requirements for the safe management of offshore installations such as the appointment of offshore installation managers (OIMs) and the use of permit-to-work systems The Offshore Installations (Prevention of Fire and Explosion, and Emergency Response) Regulations 1995 (PFEER) - these provide for the protection of offshore workers from fire and explosion, and for securing effective emergency response The Offshore Installations and Wells (Design and Construction, etc) Regulations 1996 - these are aimed at ensuring the integrity of installations, the safety of offshore and onshore wells, and the safety of the workplace environment offshore. 3. The Management of Health and Safety at Work Regulations 1992 The Control of Substances Hazardous to Health Regulations updated in1999 The Noise at Work Regulations 1989 The Health and Safety at Work Act (1974) The Provision and Use of Work Equipment Regulations (PUWER) The Lifting Operations and Lifting Equipment Regulations (LOLER) The Dangerous Substances and Explosive Atmosphere Regulations (DSEAR) First-aid, safety representatives and safety committees, personal protective equipment (PPE), display screen equipment, manual handling and safety zones. 3. In the UK, the legislation sets out the objectives that must be achieved, but allows flexibility in the choice of methods or equipment that may be used by companies to meet their statutory obligations. Health and Safety Executive's (HSE) Offshore Safety Division employs a team of inspectors who are responsible for enforcing both the offshore specific regulations and the general safety legislation common to all industries. One of examples of hazards in oil industry are gases and easily vaporizable liquids which require utmost care and precautions (P. Waterhouse and revised by Ray Chalklen). All the time that these are contained within the equipment that is designed to hold them, whether it be pipeline, storage tank, reaction vessel, portable container, cylinder, etc., they do not present a fire risk. It is only when they are released to atmosphere

Wednesday, July 24, 2019

Ecology - sprawl field trip Essay Example | Topics and Well Written Essays - 750 words

Ecology - sprawl field trip - Essay Example Accordingly, this brief essay will consider but a few of these factors with relation to the field trip that was engaged upon by our class outing to the Sprawl site earlier in the semester. The first and most pressing ecological concern is the fundamental way that the Sprawl region and growth of infrastructure and Big Box retailers has fundamental changed the water runoff for the region.1 Although adding parking lots, interchanges, and large multiple thousand square foot warehouses is itself harmful to the ecology and environment of the given region, the particular region in question experiences these negative points in a compound sense due to the overlapping nature of how one big box retailer is practically side by side to another which is side by side to a large highway interchange. This compound effect causes the drainage and water runoff of the region to be fundamentally changed in a highly negative way. Firstly, such a situation means that not only is water flow disrupted from it s normal course but a high number of added pollutants are introduced into the water table as a result of the large number of parking lots that have been added. Although seemingly benign, parking lots serve as collection points for all manner of pollutants and disrupt the flow and absorption of water into the environment in question.2 Due to the fact that cars leave all manner of fluids behind where they have been parked, it is conceivable for everything from trash associated with packaging from the store, to oil, to brake fluid, to transmission fluid, anti-freeze, and a host of other chemicals to collect on the tarmac and find their way into the water table once a healthy rain has washed over the area. Hence, the disruption of the water flow itself is but the first concern; the larger concern is concentric upon the fact that key pollutants are introduced with the presence of a number of parking lots and highway interchanges within the region.3 Of course, the issue is further compoun ded by the topography of the region in question. Whereas a general dilution of these negative environmental aspects would be seen if the topography of the site were more elevated and allowed for a greater diffusion of these pollutants prior to reaching reservoirs of lower lying land, the fact of the matter is that Big Box retailers of course seek the â€Å"perfect site† which will invariably be located in a somewhat flat or low-lying region.4 This is generally the case due to the fact that the Big Box retailers, strip malls, and other such firms want to spend as little money as possible on site improvement and grading. Hence, the ecological impact of this is the fact that the topography of the site and the presence of the pollutants readily find their way directly into the reservoirs and creeks/streams/rivers of the given site. The same can of course be said for the Sprawl site that was visited earlier in the semester. When one considers the map of the site and sees the prese nce of t

Tuesday, July 23, 2019

Creating and Sustaining an Organisational Learning Culture Essay

Creating and Sustaining an Organisational Learning Culture - Essay Example One such company is the centre of this paper. Look Ahead Housing and Care is a charitable housing association that offers specialist housing, care and support. It was first established in 1973 by Mary Jones and a group of concerned individuals. Jones was a retired senior civil servant from the Department of Health and Social Services. Jones and the group envisioned a company that would provide good quality and cheap accommodations for the needy and most vulnerable in the society. From a humble beginning of its first property acquisition in 1974, Look Ahead is now able to support 5000 people across more than 60 projects. The company owns a several properties that provide different types of accommodations. These include hostels for single homeless people, registered care homes, flats and studio-type accommodations for families with support needs. Customers receive support though guidance regarding benefits, budgeting, training, employment, education and general life skills to equip them live their lives fully and become independent contributors to the society. The annual income of the company is in excess of 29.5 million. Currently, Look Ahead employs around 600 staff providing service and care. In 2008, the company was recognised in the prestigious Sunday Times as part of the "100 Best Companies to Work For." It has made the company proud as an employer of choice. It is an achievement that acknowledges the passion and commitment of the company in delivering first-rate service to the society and to employees. Through the dedication, commitment and hard work of management and staff, Look Ahead Housing and Care has developed to become a leading housing and social care provider to vulnerable people in London and the South East. Strategic Objectives Look Ahead's mission is to enable those with particular needs to live ordinary lives within the community. They aim to become enablers of vulnerable people through positive transformation of their lives, and empowerment of individuals in order for them to become active participants in the community. In order to achieve the organisation's goals, Look Ahead has established several strategic objectives in the whole organisation. As a member of the charity-service sector, their first objective is to promote customer involvement, choice and citizenship. This can be achieved through supporting and enabling customers to participate in a wide range of involvement activities; using feedback mechanisms from customer survey to improve services; and implementation of a social inclusion strategy. As part of the community, their second objective is to build and maintain strong partnership. This can be attained by raising and strengthening the company's relationship with purchasers, funders and the local community. Mapping the stakeholders' relationships with the company across all services is made possible by means of local business plans, specialist forum and borough liaison meetings. As an organisation, their third objective is to achieve growth through excellence. The company aims to meet or exceed targets for new business growth and design innovative services. The company also prioritise seeking opportunities for service expansion while delivering efficiency gains. They also commit to deliver ongoing improvements in service quality and performance. As an employer, the fourth objective of Look Ahead is to enable staff to excel in their roles. The

Monday, July 22, 2019

Recruitment Strategy and Job Offer Process Essay Example for Free

Recruitment Strategy and Job Offer Process Essay Organizations such as education, business and engineering all use diverse recruitment techniques as their operations transform and the demand for employees vary, based on the direction in which the organization is headed. This paper will study in detail business establishments and how they use their recruitment strategy to fill job vacancies. In addition, the paper will select and/or suggest which would be the best recruitment strategy to achieve the goal of drawing qualified personnel from within this industry. Finally, this paper will detail the process to be used in offering a job to an applicant. The first phase of recruitment is deciding on the need for personnel to fill current or future job openings. In business establishments, it is essential for a company to recognize whether an open or targeted recruitment strategy is effective, and to understand which one will succeed in meeting the company’s requirements. If there is no urgency in finding suitable candidates for the position, then a better option would be an open recruitment policy (Mesmer, 1999). For instance, if a company has to fill more than 35 vacancies, the only real option for it is to choose an open recruitment policy. The open recruitment policy helps in attracting a number of applicants including an assorted group of people (Heinemann Judge, 2009). In this way, the organization can obtain pools of potential employees with differing standards of knowledge, skills, aptitudes other characteristics (KSAOs) from which they can select to fill vacancies. â€Å"If a business is required to recruit as many people as possible within a limited period, a sizeable applicant pool often supplies a company with a good number of personnel to fill vacancies† (â€Å"Recruiting practices,†1995). Hiring via newspaper, television, job fairs, radio and media channels will attract numerous candidates needed to fill several vacancies in businesses. The possibility of skimming a broad applicant pool reduces the company’s ability to appraise every application, resulting in triggering high future attrition rates (Soberg Bennington, 2009). Employing the open recruitment policy will not initiate a candidate pool with specific skills or experience levels as witnessed with the targeted recruitment policy. However, when organizational requirements demand specific skills, education, or experience levels, a business will adopt a targeted recruitment policy. Positive action also calls for a company to target a particular segment of the labor force like minority groups (Heneman Judge, 2006). After identifying a specific target, a business may take the help of a talent management team equipped to win over a predetermined sort of applicant (â€Å"CTS strengthens†, 2010). For instance, a company in need of a web designer may advertise available job positions online rather than via the radio or other media channels. With technological advances, the Internet is fast becoming a cost-effect means of hiring, with advertising targeted at specific group of candidates. For a company on the lookout for a certain type of applicant, the target recruitment policy is the best method to use. With the evolving of businesses, organizations should use ingenious recruitment strategies to surface from the conventional â€Å"talent pools† which as Kemsley states are approached with caution and suspicion for assistance (2009). Businesses are becoming very choosy in their hiring methods when recruiting in the present economic scenario. They are recruiting based on business requirements; for instance, an accounting firm which is considering future job vacancies, may approach local educational institutions and target college students who are enrolled currently as accounting majors. The accounting firm then can target specific sub-groups within that group by seeking students with a specific GPA grade point average, thus making certain that the company can hire new recruits with the requisite job qualifications. â€Å"In the same way, a business specializing in health care can adopt a recruitment strategy targeting personnel in the healthcare sector, thereby guaranteeing the solicitation of candidates with healthcare experience† (â€Å"Online health,† 2000). For some business establishments, limiting their options to a single recruitment strategy is bad. When a business does not have a recruitment deadline, the organization can gain from a good blend of open targeted recruitment policies. For most businesses, using an open recruitment policy enables the company to fill vacancies which are not key positions like support staff. When organizational needs demand a highly qualified, trained, or experienced person, then it’s advantageous to use t he target recruitment policy. The subsequent phase of recruitment after the interview selection process is the job offer. Developing and extending a job offer can either be a simple task or a risky endeavor. If the business demands that numerous vacancies should be filled without any delay, the employment offer process is quite simple and the company faces no real risks. With a sizeable applicant pool, a company can extend basic job offers with minimal emphasis on bonus payments or incentives. However, where a business needs specialized skills, the business should know what the competition is offering employees with similar skills set. The greater the demands a company places on applicant qualifications, the more specialized are the job qualifications and the greater the risk involved in the employment offer process. When trying to lure a competitor’s employee, the company should be willing to provide what best fits such an employee’s requirements with no promise of long-term gains for the organization. If the receiver is undecided about accepting the employment offer, the company should decide if it’s willing to significantly change the employment offer in such a way that the receiver cannot turn it down. Finalizing the employment offer demands seeing all aspects of incentives/benefits verbally offered are properly documented. Moreover, the business must make certain that the job offer is not in violation of any federal or state laws. In business industries, limiting recruiting options to a single strategy is not beneficial; however, if a business has no recruitment deadlines, it can benefit greatly from using a mix of open targeted recruitment policies. For most organizations, using an open recruitment policy enables them to fill job vacancies which are not key positions like support staff. Where an organization requires candidates with specialized skills or higher education or greater experience, then it’s profitable to use the target recruitment policy. Recognizing the differences in these two strategies enables a business to avail of the optimum recruitment strategy to meet the organizational requirements prevailing at that time. References CTS strengthen recruiting efforts with talent coordination teams. (2010, July 3). Health Wellness Resource Center Alternative Health Module. Kemsley, N. (2009). Employee-centric markets: A different direction. People and Strategy. New York: 2009. Vol. 32(3), p. 14. Heneman, G. H., Judge, A. T. (2006). Staffing Organizations (6th ed.). New York: McGraw-Hill. Messmer, M. (1999, September). Developing a strategic staffing plan. National Public Accountant, 44(7), 20. Online health care recruiting company makes debut. (2000, July 3). The Enterprise, p. 7. Soberg, A., Bennington, A. (2009). Workforce planning: implications for healthcare in Canada and elsewhere. People and Strategy. New York: 2009, 32(3), 26. Recruiting practices changing. (1995, November). Physician Executive, 21(11), 4.

Sunday, July 21, 2019

OLAP Multidimensional Database Concept

OLAP Multidimensional Database Concept CHAPTER 2 LITERATURE REVIEW 2.1 INTRODUCTION This chapter is designed to provide background information and reviewing the characteristics of data warehouse, OLAP multidimensional database Concept, data mining model and the application of data mining. Within this research, the concept, design and implementation approaches in developing a complete data warehouse technology framework for deploying a successful model with the integration of OLAP Multidimensional Database and data mining model. Section 2.2 discussed about the fundamental of data warehouse, data warehouse model and also the Extract, Transform and Loading (ETL) of raw database to data warehouse. It includes research and study on existing data warehouse models authored by William Inmon, Ralph Kimball and various scholars venturing into data warehouse models. Section 2.3 introduces background information of OLAP. It includes the studies and research on various OLAP models, OLAP architecture and concept on processing multidimensional databases, multidimensional database schemas design and implementation in this research. It includes studies and research on schema design and implementation. Section 2.4 introduces fundamental information of data mining. It includes studies and research on the available techniques, method and process for OLAP Data Mining. Section 2.5 discussed the product comparisons for data warehouse, data mining and OLAP by Mitch Kramer. It includes the reason why Microsoft is used to design and implement the new proposed model. In this literature review, introduction to the relationships between data warehouse, OLAP multidimensional database and data mining model for deploying four experimental applications for benchmarking. This research also proves that the â€Å"new proposed model† data warehouse technology framework is ready to transform any type of raw data into useful information. It will also help us to review the new proposed model of each existing data warehouse OLAP Multidimensional database framework. 2.2 DATA WAREHOUSE According to William Inmon (1999), known as the â€Å"Father of Data Warehousing†, data warehouse is a subject-oriented, integrated, time-variant, and non-volatile collection of data in support of the managements decision-making process. Data warehouse is a database containing data that usually represents the business history of an organization. This historical data is used for analysis that supports business decisions at many levels, from strategic planning to performance evaluation of a discrete organizational unit. Data Warehouse is a type of database system aimed at effective integration of operational databases into an environment that enables strategic use of data (G. Zhou et al., 1995). These technologies include relational and multidimensional database management systems, client/server architecture, meta-data modelling and repositories, graphical user interface and much more (J. Hammer et al., 1995; V. Harinarayan et al., 1996). Data warehouse currently are much a subject of researched is not only commonly used in business or finance sector but can be applied appropriately in various sectors. Data warehouse are designed for analyzing or processing of data into useful information using data mining tools for critical decision-making. Data warehouse provides access to difficult environments of an enterprise data In these literature studies, two important authors are identified as the main contributors and co-founder in the area of Data Warehouse, William Inmon (1999; 2005) and Ralph Kimball (1996, 2000). Both author perceptions on data warehouse design and architecture differ from one another. According to Inmon (1996), data warehouse is a dependent data mart structure, whereas Kimball (1999) defined data warehouse as a bus structure which is a combination of data mart populated together as a data warehouse. Table 2.1 discussed the differences in data warehouse ideology between William Inmon and Ralph Kimball. Table 2.1 William Inmon and Ralph Kimball Data Warehouse Differences William Inmon Ralph Kimball Paradigm Inmons Paradigm: An enterprise has one data warehouse, and data marts source their information from the data warehouse. Information is stored in 3rd normal form. Kimballs Paradigm: Data warehouse is the collection of heterogeneous data marts within the enterprise. Information is always stored in the dimensional model. Architecture Architecture: Using TOP-DOWN approach Architecture: Using Bottom-up approach Concept Datas integration from various systems to centralized repository Concept of dimensional modelling (Bridging between Relational and multidimensional DB) Design The design pattern dependent on 3rd normalization form, purpose is for data granularity. Datas marts are connected in a bus structure. Datas marts are the union of data warehouse. This approach is known also as Virtual Data Warehouse. ETL Methods Datas extraction from operational data sources. Data are feed in staging database area. Data are then transformed, integrate, and consolidate and transfer to Operational Data Store database. Data are then load to data mart. Data extracted from legacy system and then consolidated and verified in staging database. Data feed into ODS and more data us added/updated. Operational Data Store contains fresh copy data that is integrated and transformed to the data mart structure. Data mart Data Marts are available as a subset of the data warehouse. Data Marts can be placed at different at different servers or in geographical locations. Based on this Data Warehouse literature, both Inmon (2005) and Kimball (2000) have different philosophies, but they do have similar agreement on a successful design and implementation of data warehouse and data marts are mainly depending on the effective collection of operational data and validation of data mart. Both approaches having the same database staging concepts and ETL process of data from a database source. They also have a common understanding that independent data marts or data warehouses cannot fulfil the requirements of end users on an enterprise level for precise, timed and relevant data. 2.2.1 DATA WAREHOUSE ARCHITECTURE Data warehouse architecture is a wide research area. It has many different sub-areas and it can be treated with different approaches in terms or analysis, design and implementation by different enterprise. In this research studies, the aim is to provide a complete view on data warehouse architecture. Two important scholars Thilini (2005) and Eckerson (2003) from TDWI will discussed in more details on the topic on data warehouse architecture. According to Eckerson (2003), before implementing a successful business intelligence systems where users can use programs like specialized reporting tools, OLAP tools and data mining tools upfront, a data warehouse architecture model mainly concentrate on the database staging process from different integrated OLTP systems is responsible for the ETL to the whole process workable. Thilini (2005) conducted a two phase study survey on investigating which factors may influence the selection of data warehouse architecture. In Thilini literature study, there are five data warehouse architectures that are practice today as shown in Table 2.2. Table 2.2 Data Warehouse Architectures (Adapted from Thilini, 2005) Data Warehouse Architecture Independent Data Marts Independent data marts also known as localized and small sized data warehouses. It is mainly used by departments, divisions or regions of company to provide own operational databases. The data marts are different as the structures are different from different location with inconsistent database design which makes it difficult to analyze across the data marts. Thilini (2005) cited the work of Winsberg (1996) and Hoss (2002) that It is common for organizational units to develop their own data marts. Data marts are best used as a prototype for adhoc data warehouse and as for evaluation before building a real data warehouse. Data Mart Bus Architecture Kimball (1996) pioneered the designed and architecture of data warehouse with unions of data marts which are known as the bus architecture. Bus architecture Data Warehouse is derived from the unions of the data marts which are also known as Virtual Data Warehouse. Bus architecture allows data marts not only located in one server but it can be also being located on different server. This allows the data warehouse to functions more as virtual reality mode and gathered all data marts and process as one data warehouse. Hub-and-spoke architecture Inmon (2005) developed Hub and Spoke architecture. The hub is the central server taking care of information exchange and the spoke handle data transformation for all regional operation data stores. Hub and Spoke mainly focused on building a scalable and maintainable infrastructure for data warehouse. Centralized Data Warehouse Architecture Central data warehouse architecture almost similar to hub-and-spoke architecture without the dependent data marts. This architecture copies and stores heterogeneous operational and external data to a single and consistent data warehouse. This architecture has only one data model which are consistent and complete from all data sources. According to Inmon (1999) and Kimball (2000), central data warehouse should have Database staging or known as Operational Data Store as an intermediate stage for operational processing of data integration before transform into the data warehouse. Federated Architecture According to Hackney (2000), Federated Data Warehouse is a integration of multiple heterogeneous data marts, database staging or Operational data store, combination of analytical application and reporting systems. The concept of federated focus on framework of integration to make data warehouse as greatest as possible. Jindal (2004) conclude that federated data warehouse approach are a practical approach for a data warehouse architecture as it is focus on higher reliability and provide excellent value if it is well defined, documented and integrated business rules. Thilini (2005) conclude that hub and spoke and centralized data warehouse architectures are similar and the survey scores are almost the same. Hub and spoke is faster and easier to implement because no data mart are required. For centralized data warehouse architecture scored higher than hub and spoke as for urgency needs for relatively fast implementation approach. A data warehouse is a read-only data source where end-users are not allow to change the values or data elements. Inmons (1999) data warehouse architecture strategy are different from Kimballs (1996). Inmons data warehouse model splits data marts as a copy and distributed as an interface between data warehouse and end users. Kimballs views data warehouse as a unions of data marts. The data warehouse is the collections of data marts combine into one central repository. Diagram 2.1 illustrates the differences between Inmons and Kimballs data warehouse architecture adapted from Mailvaganam, H. (2007) Diagram 2.1 Inmons and Kimballs Data Warehouse Architecture (adapted from Mailvaganam, 2007) In this work, it is very important to identify which data warehouse architecture that is robust and scalable in terms of building and deploying enterprise wide systems. According to Laney (2000) and Watson, H. (2005), it is important to understand and select the appropriate data warehouse architecture and â€Å"the success of the various architectures† acclaimed by Watson. Analysis of this research proved that the most popular data warehouse architecture is hub-and-spoke proposed by Inmon as it is a centralized data warehouse with dependant data marts and second is the data mart bus architecture with dimensional data marts proposed by Kimball. The selection of the new proposed model will use the combination data warehouse architecture of hub-and-spoke and data mart bus architecture as the new proposed model data warehouse architecture are designed with centralized data warehouse and with data marts that can are used for multidimensional database modelling. 2.2.2 DATA WAREHOUSE EXTRACT, TRANSFORM, LOADING Data warehouse architecture begins with extract, transform, loading (ETL) process to ensure the data passes the quality threshold. According to Evin (2001), it is essential that right data are important and critical for the success on an enterprise. ETL are an important tool in data warehouse environment to ensure data in the data warehouse are cleansed from various systems and locations. ETLs are also responsible for running scheduled tasks that extract data from OLTPs. Typically, a data warehouse is populated with historical information from within a particular organization (Bunger, C. J et al., 2001). The complete process descriptions of ETL are discussed in table 2.3. Table 2.3 Extract, Transform, and Load Process in Data Warehouse architecture Process Descriptions Extract Extract are the first process which involve in moving data from operational databases into database staging area or operational data store before populating into the data warehouse. In this stage, operational databases data need to be examined by extracting into the staging area for handling exceptions and fix all errors before it enters into data warehouse as this will save lots of time when loading into the data warehouse. Transform In completion of data extraction in database staging area, it is then transform to ensure data integrity within the data warehouse. Transformation of data can be done in several methods such as filed mapping and algorithm comparisons. Load After extract and transform of data, it is finally loaded into data warehouse (in Inmons model) or into data marts (in Kimballs model). Data loaded into data warehouse are quality data after the process of extraction where erroneous data are removed and data are transform to ensure integrity of the data. Calvanese, D. et al. (2001) highlight an enterprise data warehouse database tables may be populated with a wide variety of data sources from different locations and often including data providing information concerning a competitor business. Collecting all the different data and storing it in one central location is an extremely challenging task where ETL can make it possible. ETL process as depicts in Diagram 2.2 begins with data extract from operational databases where data cleansing and scrubbing are done, to ensure all datas are validated. Then it is transformed to meet the data warehouse standards before it is loaded into data warehouse. Diagram 2.2Extract, Transport, Load Process G. Zhou et al.(1995) emphasise on data integration in data warehousing stress that ETL can assist in import and export of operational data between heterogeneous data sources using OLE-DB (Object linking and embedding database) based architecture where the data are transform to populate all quality data into data warehouse. This is important to ensure that there are no restrictions on the size of the data warehouse with this approach. In Kimball (2000) data warehouse architecture model depict in Diagram 2.3, the model focus in two important modules, â€Å"the back room† â€Å"presentation server† and â€Å"the front room†. In the back room process, where the data staging services in charge of gathering all source systems operational databases to perform extraction of data from source systems from different file format from different systems and platforms. Second step is to run the transformation process to ensure all inconsistency are removed to ensure data integrity. Finally, it is loaded into data marts. The ETL processes are commonly executed from a job control via scheduling task. The presentation server is the data warehouse where data marts are stored and process here. Data stored in star schema consist of dimension and fact tables. This is where data are then process of in the front room where it is access by query services such as reporting tools, desktop tools, OLAP and data mining to ols. Diagram 2.3 Data Warehouse Architecture (adapted from Kimball, 2000) Nicola, M (2000) explains the process of retrieving data from the warehouse can vary greatly depending on the desired results. There are many form of possible retrieval from a data warehouses and it is flexibility that will drive how this retrieving process can be implemented. There are many tools for retrieving the data warehouse, such as building simple query and reporting through SQL statements. The tools may expand to OLAP and data mining, where the structure includes many more third party tools. There are many inherent problems associated with data, which includes the limited amount of portability, and the often-vast amount of data that must be sifted through for each query. Essentially, ETL are mandatory for data warehouse to ensure data integrity. There are many factors to be considered such as complexity and scalability are among the two major issues that most enterprise faces by integrating information from different sources in order to have a clean and reliable source of data for mission critical business decisions. One way to achieve a scalable, non-complex solution is to adopt a â€Å"hub-and-spoke† architecture for the ETL process. According to Evin (2001), ETL best operates in hub-and-spoke architecture because of its flexibility and efficiency. Because of its centralized data warehouse design, it can influence the maintaining full access control of ETL processes. Also, empowers the usage of analytical and data mining tools by knowledge workers. In this study on ETL for effective data warehouse architecture, it is known that Hub-and-spoke is best for data integration as it has the similarity in Inmon and Kimball architecture. The hub is the data warehouse after processing data from operational database to staging database and the spoke(s) are the data marts for distributing data. Inmon and Kimball also recommend same ETL processes to enable hub-and-spoke architecture. Sherman, R (2005) state that hub-and-spoke approach uses one-to-many interfaces from Data warehouse to many data marts. One-to-many are simpler to implement, cost effective in a long run and ensure consistent dimensions. Compared to many-to-many approach it is more complicated and costly. In this work on the new proposed model, hub-and-spoke architecture are use as â€Å"Central repository service†, as many scholars including Inmon, Kimball, Evin, Sherman and Nicola adopt to this data warehouse architecture. This approach allows locating the hub (data warehouse) and spokes (data marts) centrally and can be distributed across local or wide area network depending on business requirement. In designing the new proposed model, the hub-and-spoke architecture clearly identifies six important data warehouse components that a data warehouse should have, which includes ETL, Staging Database or operational database store, Data marts, multidimensional database, OLAP and data mining end users applications such as Data query, reporting, analysis, statistical tools. However, this process may differ from organization to organization. Depending on the ETL setup, some data warehouse may overwrite old data with new data and in some data warehouse may only maintain history and aud it trial of all changes of the data. Diagram 2.4 depicts the concept of the new proposed model data warehouse architecture. Diagram 2.4 New Proposed Model Data Warehouse Architecture 2.2.3 DATA WAREHOUSE FAILURE AND SUCCESS FACTORS Building a data warehouse is indeed challenging as data warehouse project inheriting a unique characteristic that may impact the overall setup if the analysis, design and implementation phase are not properly done. In this research effort, it discusses the studies on failure and success factors in data warehouse project. Section 2.2.3.1 focuses on the investigation on data warehouse project failure and section 2.2.3.2 discuss and investigate mainly on the success factors by implementing the correct model to support a successful data warehouse project implementation. 2.2.3.1 DATA WAREHOUSE FAILURE FACTORS Hayen, R.L. (2007) studies shows that implementing a data warehouse project is costly and risky as a data warehouse project can cost over $1 million in the first year. It is estimated that one-half ad two-thirds of the effort of setting up the data warehouse projects attempt will fail eventually. Hayen R.L. (2007) citied on the work of Briggs (2002) and noticed three factors for the failure of data warehouse project that is Environment, Project and Technical factors as shown in Diagram 2.5 and table 2.4 discussed the factors in more details. Diagram 2.5 Factors for Data Warehouse Failures (adapted from Briggs, 2002) Table 2.4 Factors for Data Warehouse Failures (adapted from Briggs, 2002) Factors Descriptions Environment This leads to organization changes in business, politics, mergers, takeovers and lack of top management support. Also, including human error, corporate culture, decision making and change management. Technical Technical factors of a data warehouse project complexity and workload are taken too lightly where high expenses involving in hardware/software and people. Problems occurred when assigning a Project manager with lack of knowledge and project experience in data warehouse costing may lead to impediment of quantifying the return on investment (ROI). Also, failure of managing a data warehouse projects also includes:  · Challenge in setting up a competent operational and development team plus not having a data warehouse manager or expert that is politically sound.  · Having an extended timeframe for development and delivery of data warehouse system may due to lack of experience and knowledge for selection of data warehouse products and end-user tools. * Failure to manage the scope of data warehouse project. Project Poor knowledge on the requirements of data definitions and data quality on different organization business departments. Also, Running a data warehouse projects with incompetent and insufficient knowledge in what technology to use may lead into problems later on data integration, data warehouse model and data warehouse applications. Vassiliadis (2004) studies shows that data warehouse project failures are an enormous threat and threatened by factors such as design, technical, procedural and socio-technical as illustrated in Diagram 2.6. These factors of failures are vital in finding any unwanted action for success. Each factor group is described in table 2.5. Diagram 2.6 Factors for Data Warehouse Failures (adapted from Vassiliadis, 2007) Table 2.5 Factors for Data Warehouse Failures (adapted from Vassiliadis, 2007) Factors Descriptions Design Design factors in data warehouse project can put up with No Standard techniques or design methodologies. A data warehouse project when doing the analysis and design phase may accept ideas on metadata techniques or languages and data engineering techniques. Also, a proprietary solutions and also recommendations from vendors or in-house experts may define the design of the data warehouse blueprint landscape. Technical Technical factors associate to the lack of know-how experience in evaluation and choices of hardware setup for data warehouse systems Procedural Procedural factors concerning on the imperfection of data warehouse deployment. This factor focuses on training the end-users extensively on the new technology and the design of data warehouse which are completely different than the conventional IT solutions. users communities plays a vital role and are crucial in this factor. Socio-Technical Socio-technical factors in a data warehouse project may lead into problems on violation of organization modus operandi where the data warehouse systems will lead into restructuring or reorganization on the way organization operates by introducing changes to the user community. According to Vassiliadis (2007) also, another potential factors for the failure of data warehouse projects are the â€Å"data ownership and access†. This is considered vulnerable within the organization and one mustnt share nor acquire someone else data as this is comparable with losing authority on the data ownership and access. Also, restrict any departmental declaration or request to own a total ownership of pure clean and error free data as this might cause potential problem on ownership data rights. Watson (2004) stress that the general factors for the failures in data warehouse project success comprises of â€Å"weak sponsorship† and top management support, inadequate funding and users participation and organizational politic. 2.2.3.2 DATA WAREHOUSE SUCCESS FACTORS Data Warehouse Failures can lead into disastrous implementation if careful factors or measures are not taken into serious considerations as discussed in section 2.2.3.1 based on Briggs (2002) and Vassiliadis (2004) studies that may lead into data warehouse failures. According to Hwang M.I. (2007), data warehouse implementations are an important area of research and industrial practices but only few researches made an assessment in the critical success factors for data warehouse implementations. No doubt there is procedure for data warehouse design and implementation but only certain guidelines are subjected for experimental testing. So, it is best to decide and choose the proper data warehouse model for implementation success. In this study on identifying and filling the gap analysis of the data warehouse success factors, a number of success factors are gathered from data warehouse scholars and professionals (Watson Haley, 1997; Chen et al., 2000; Wixom Watson, 2001; Watson et al., 2001; Hwang Cappel, 2002; Shin, 2003) to validate their experimental work and research strength individually on various characteristics of data warehouse success. This study beneficial in planning and implementing data warehouse projects and direct into the success of designing and implementing the new proposed model in this research. There are several success factors in designing and implementing data warehouse solutions and the most important success factors depend on the data warehouse model selection, as different organization may have different scope and road maps in the development of data warehouse. The results of building a successful data warehouse are then used to quantify the factors that are used and also prioritize those factors that are beneficial for continued research purpose to improve and enhanced the data warehouse model success. According to Hayen, R.L. (2007), data warehouse is a complex system which can complicate business procedures. The complexity of data warehouse prevents companies from changing data or transaction which are necessary. It is important then to analyze on which data warehouse model to be used for such complex systems that are sound critical to an organization. Hwang M.I. (2007) conducted a study on data warehousing model and success factors as a critical area of practice and research but only a few studies have been accomplish to measure the data warehouse projects and success factors. Many scholars had conducted a profound research in the area of data warehouse and may have succeeded or failed due to possible reasons based on each scholars outcomes on the research. It is useful inspect a few case studies on a selected companied data warehouse implementation and to experiment the failure and success factors through survey. (Winter, 2001; Watson et al., 2004) Hwang M. I. (2007) conducted a survey study on six data warehouse scholars (Watson Haley, 1997; Chen et al., 2000; Wixom Watson, 2001; Watson et al., 2001; Hwang Cappel, 2002; Shin, 2003) on the success factors in a data warehouse project. Each scholar has different success factors that are measures in a project. Table 2.6 shows the mentioned six scholars survey study on data warehouse, Watson (1997) measures data warehouse success factors, Chen et al. (2000), Watson et al. (2001) and Shin (2003) measures data warehouse implementation factors and Hwang (2002) measures through development and management practices. Only Wixom (2001) as shown in diagram 2.7 measures both Data warehouse implementation and success factors which can be used as a model for a successful data warehouse implementation. Study shown in all 6 scholars review, without having data warehouse implementation and success factors, the consequences of any factors on a data warehouse success cannot be validated. Table 2.6 Factors for Data Warehouse Success (adapted from Hwang M.I., 2007) Study Data Warehouse Success Factors Data Warehouse Implementation Factors Results Reported Watson Haley (1997) Focus on user involvement and support by having a clear and understandable business needs. Using methodology and modelling methods in data warehouse by targeting on clean data. Thus, support from upper management to contribute on the success. N/A Ordered list of success Chen et al. (2000) N/A Focused on exactness and preciseness of User satisfaction by Support and realization of end users needs. Support for end users affects user satisfaction Wixom Watson (2001) Implementation factors include management support, resources, User participation, team skills, Source systems aand development technology which contribute to the implementatio

Soft Skills And Communication Skills For Engineers

Soft Skills And Communication Skills For Engineers Abstract Engineering education widely recognize an increasing need to equip students with effective study skills early in their university education and basic professional skills prior to graduation. These, however, are traditionally difficult modules to teach successfully to larger groups through traditional lecturing. Observations suggest a poor absorption rate from the students and thus a lack in their ability to benefit from these skills both personally and professionally. Specific techniques described in this paper can be easily integrated into most types of teaching material. Introduction Over the years there has been an increase in emphasis on soft skills and particularly communication skills in the engineering programs. Reflecting both the demands of potential employers and professional bodies, as well as the creativity of course designers, modules such as first year study skills and final year professional skills have become more and more common. The greatest focus has been placed on fundamental topics such as presentation skills, effective report writing, teamwork, and time/project management. Whilst this change is certainly a positive one, these modules seem to be among the more challenging to teach and assess successfully, the criteria for success being that the student can understand the concepts presented, apply them using exercises, and demonstrate the resulting competence through assessment. A modified teaching approach is required that addresses the professional students. The approach needs to add interest and obvious relevance; students need to feel that any guidelines presented can solve a pressing issue or concern that exists in their world. Above all, to be successful the teaching approach must be dynamic, interesting, practical and organized to manage tactically the attention span of the audience. Modifying the approach Keeping a large number of undergraduate students continually engaged is not the easiest of tasks, particularly considering the challenges above. It was decided that a different and more dynamic teaching approach was required to stimulate students in place of traditional lecturing styles based essentially on one-way communication. If students frequently had to respond, discuss, react or participate they would be far less likely to disengage or go to sleep! Allowing them to make mistakes in a supportive environment would also go some way to convincing them that they needed to improve their skills and were doing so by attending the learning sessions. Some might argue that a high level of interaction is only practicable with smaller audiences. Whilst smaller groups are indeed easier to manage this was found not to be the case, although an experienced lecturer is required who is willing to engage in open discussions and deviate from a detailed lecture plan if necessary. Towards a task-based approach Typically, a traditional ELT syllabus lists learning items in terms of structures, functions, notions and vocabulary which are then set in situations and which usually integrate a variety of skills (reading, writing, listening and speaking). This dominant approach has been characterized as product-orientated because it focuses on what is to be learnt or on products. The problem with this approach, as Nunan (1988) has pointed out, is that input cannot be equated with output and that teaching cannot be equated with learning. In short, what the teacher teaches is not what the learner learns. Swan (2005) in his critique of task-based learning laments the polarization of attitudes in relation to recent discussion of language learning. On the one hand traditionalists argue in favor of a linear, atomistic syllabus design. On the other hand, hard-line task-based ideologues seem to exclude any atomistic activity in favor of all-or-nothing holism. Bygates distinction (2003, p. 176) between tasks and exercises helps to situate this debate. He defines exercises as activities which practice parts of a skill, a new sub-skill, a new piece of knowledge. In contrast, he defines tasks as activities which practice the whole integrated skill in some way. Bygates discussion (2001, pp.23-48) lends support to the idea that task-based teaching needs to be situated in a broad curriculum framework, suggesting that isolated tasks are not sufficient in themselves to promote learning. The implication drawn from such research and discussion is that units of learning that involve the strategic use of holistic repeated tasks and supporting atomistic exercises provide one means of avoiding narrow ideological positions. A task-based unitary framework is therefore proposed here that leads to student-led holistic outcomes in the form of written reports, spoken presentations and substantial small-group conversations that lead to decision-making outcomes. However, due consideration is also given to the design of atomistic exercises within the framework. In her model for task-based learning, Willis (1996, pp.52-65) proposes a pre-task component, a task-cycle component (pre-task/task/post-task) and a language focus component. With regard to focus on form, Willis emphasizes the importance of a post-task report phase, which could be a written activity such as writing a polished report or a spoken public-report phase in which students can be encouraged to focus on accuracy and can be prompted to recast inaccurate forms. Other key stages for Willis that improve the linguistic focus of task-based learning are the planning stage during which the teacher can take on a role of language advisor. This 1996 framewor k by Willis has been influential. In his 2006 Asian EFL Journal (AEJ) conference keynote speech, for example, Ellis made extensive reference to it, adopting it as his basic framework. Components of a Task Tasks contain some form of input that may be verbal (a dialogue/role play/reading) or, nonverbal (pictures/a gesture) followed by an activity, which is in some way derived from the input. This activity sets out what learners need to do in relation to the input. Tasks have also goals and roles for both teachers and learners. Components of a Task (Nunan: 1989) From the above diagram, a task can be viewed as a piece of meaning focused work, involving learners in comprehending, producing and/or interacting in the target language. Before taking up the task of converting the textual content into various tasks, the following points were noted and kept in mind by the investigators: -The objective of the task must be stated very clearly -The task must be appropriate for the level of the learners -The task must equip the learners with the ability to apply classroom learning in new situations. -Tasks must be interesting and motivating to the students -The form the input takes, must be clear to the teacher -The roles of teachers and students must be specified clearly -Through the task, learners must be encouraged to negotiate meaning -The language that will be generated by the task must be predicted -There should be variety and flexibility in the tasks The following are eight well documented techniques that can be used flexibly to transform any standard lecture into a more dynamic one. These techniques are summarized below. An emphatic and captivating introduction A successful training session must begin by creating a sense of urgency and somehow capturing the interest of the audience, usually by emphasizing the importance of the topic and its relevance. What rewards can be obtained by applying the content of the session? What pitfalls exist for those who lack the competence? However, it is important that in emphasizing the importance of a topic the presenter is not perceived as finger wagging. For example, when youre in industry youll have to . . . or you wont pass your final year project unless you learn to . . . are unlikely to prove engaging whereas would you like me to help you get more marks for your lab reports without doing any more work is. Use of relevant examples and storytelling Examples, stories and anecdotes turn theories and guidelines into perceived reality by providing a true-to-life basis for their application. They will also capture the full attention of most audiences. Use plenty of these at least one for each principal point covered and, wherever possible, focuses on real examples rather than hypotheses. Let students share their similar experiences. Group exercises Have students perform short exercises in groups to try out the application of concepts presented, followed by debriefing where each group reports its findings, progress and difficulties to the audience. Exercises of this type break up the session, increase engagement and can be easily conducted even in a lecture theatre. They also force the students to admit their errors, even if these errors are not reported to the audience, and this helps to establish for them the fact that they have learnt something. Brainstorming This is another interactive technique to provide stimulation and variation. Provide an open question and have students brainstorm in small groups (usually together with those sitting next to them) before beginning a discussion session. Demonstrations/simulations It is much more effective to demonstrate an idea than to talk about it. Documentation could include some type of physical simulation, a simple game, or even a video clip. Role playing is particularly effective as it involves the students in an active way, provided that a risk-free and supportive environment is provided to those who participate. This in turn is dependent on the lecturers making sure that students are never embarrassed by failure during an activity. Opinion polls This is a quick change and helps students to engage in a new activity or a new aspect of a topic. For example a quick show of hands: How many people think .? The mind break Used to refresh the listeners attention span during more demanding presentation components, for example, take a 2 minute break to chat with your neighbor before we move on . . . Facilitation vs. lecturing Whenever possible, lean towards the process of facilitation rather than lecturing. Prompt the audience with relevant questions, challenges their ideas, and shapes an understanding based upon the responses and active discussions rather than reading a script. It is, however, important to be respectful towards students who give wrong or poor answers. The techniques presented above provide some of the most important ingredients for an engaging lecture. They are well documented and widely used in isolation. Not all are applicable to all situations and types of material, and the next step is, therefore, to devise session plans into which they are woven appropriately. The choice of techniques will depend largely on the topic to be presented and to some extent the lecturers personality and individual style. Conclusion Perfect communication is near impossible in the classroom because it depends on many variables. However, if the teacher is to be successful, the content of his message should be clear in his mind and be put in suitable code and transmitted through appropriate media. There is need for a careful sequencing of ideas and the use of activities that is within the experience and understanding of the students. Whatever learning experience the students are exposed to, they should be allowed to practice it. Learning takes place through the active behavior of the students. It is what the student does that he learns and not what the teacher does. The teacher is only a facilitator of learning. The quality of learning that takes place in any situation, to a very large extent, is dependent on the effectiveness of the teachers plan and communication.

Saturday, July 20, 2019

The Tempests Power :: essays research papers

Lust for Power Any good story starts with an observation: an observation of the silent neighbor, the infamously loud aunt at the family reunion or the mysterious stranger, smiling at nothing. William Shakespeare always wrote of these observations. His characters in each of his plays represent some part of society or desire lying within society. â€Å"The Tempest†, Shakespeare’s farewell to playwriting, contrasts the idea of civilization and raw nature pertaining to the desire for power, and the greed that overwhelms a person to get that power. Does greed and power override the rules and structure of civilization? Is it inescapable? These universal desires bring two seemingly contrasting characters, Prospero and Caliban, closer than any other pair of characters in the play.   Ã‚  Ã‚  Ã‚  Ã‚  Ã¢â‚¬Å"The Tempest† centers on the loss and gain of power. Prospero is stripped of his power in civilization, and thus uses his magical powers in order to return to nature and regain some kind of leadership role. His deliberate involvement in the shipwreck, the overthrowing of Caliban, and the romance between his own daughter Miranda and Ferdinand, shows that he is attempting to regain the status that he had lost.   Ã‚  Ã‚  Ã‚  Ã‚  Prospero, on the outside, seems to be the all-knowing ruler. However, his unique magical gifts give him undefeatable power to wreak vengeance on his enemies. Greed and vengeance as his motives shows that corruption cannot be fled from. It complicates the relationship between Caliban and Prospero for although Prospero claims to own his savage his savage speaks not like one who is owned.   Ã‚  Ã‚  Ã‚  Ã‚  Caliban feels the flip side of the power struggle. He is the defeated. The reader, however, is distracted from this because Caliban is made out to be a villain, and a savage. The reader hears of his attempts to rape Miranda and he is first introduced as a â€Å"tortoise† and often referred to as a beast or monster with a deformed body. But, interestingly, despite Caliban's deformed body and animal like appearance he possesses remarkable eloquence that gives him power.

Friday, July 19, 2019

Lender Liability and the Duty of Good Faith :: essays research papers

Lender Liability and the Duty of Good Faith I.  Ã‚  Ã‚  Ã‚  Ã‚  Introduction From time to time, lenders and their attorneys announce that lender liability is no longer an issue with which the lending community needs to be concerned. What usually prompts this proclamation of the death of lender liability is a recent case in which a court has summarily rejected a borrower’s claim that the lender violated the duty of good faith and fair dealing. Many courts have rejected borrowers’ lawsuits which are based on allegations of the violation of the lender’s duty of good faith. Nevertheless, lender liability should continue to be an area of concern to lenders. Although courts often dismiss cases based on a borrower’s claims of lender bad faith, in other cases courts find that lenders have indeed engaged in conduct that constitutes bad faith. Most courts carefully examine the unique facts of each case, consider the testimony of experts, and listen to the ever-inventive arguments of counsel. A loan agreement, like every other contract governed by the Uniform Commercial Code (the â€Å"U.C.C.†), imposes on both the borrower and the lender â€Å"an obligation of good faith in its performance or enforcement.† This simple good faith performance obligation may appear to be an uncontroversial codification of a basic, minimal standard of human behavior. It is proving, however, to be problematic to commercial lenders. Some courts have been quick to hold that, under certain circumstances, a lender, which believed it was merely exercising its contractual rights, nevertheless may have breached the duty of good faith performance obligation. For example, in 1985 the Sixth Circuit, invoking the good faith performance obligation, affirmed a jury verdict awarding $7,500,000 to a borrower whose lender refused to advance funds under a loan agreement, which specifically and unequivocally permitted the lender to exercise sole and absolute discretion to refuse to advance additional funds. The Alaska Supreme Court, likewise invoking the good faith performance obligation, held that a borrower could recover both actual and punitive damages from a lender who had taken possession of collateral without notice, notwithstanding the unambiguous terms of the loan and security agreement authorizing such repossession. On the other hand, many courts have abandoned the imposition of good faith obligations on the lender beyond what is set forth in certain loan agreements. In 1987, the Bankruptcy Court for the District of Massachusetts held that the holder of a demand note does not need a good faith reason or any reason at all to demand payment.

Thursday, July 18, 2019

Cigarettes are Killing America :: Argumentative Persuasive Arguement

Cigarettes are Killing America This year alone cigarettes will kill over 420,000 Americans, and many more will suffer from cancers, and circulatory and respiratory system diseases1. These horrible illnesses were known to originate from cigarettes for years. Nicotine, the main chemical additive in cigarettes, was declared addictive by the Food and Drug Administration. This explains why smokers continue to use cigarettes even though smokers are aware of the constantly warned about health dangers in cigarettes. Although smokers constitute the majority of people who suffer from cigarettes, they are not the only ones ailing from cigarette smoke. As UC San Francisco scientist and author Stanton Glantz estimates in Shari Roan's article, the amount of second-hand smoke inhaled by the typical nonsmoker is equivalent to one cigarette smoked per day.1 Even that amount of cigarette smoke can damage a person's heart. Some researchers have also concluded that smoking by pregnant women causes the deaths of over 5,000 babies and 115,000 miscarriages.2 The only way to terminate the suffering and loss of life brought upon by cigarettes exists as a complete proscription on them. Opponents to the banning of cigarettes argue that it will create a profound negative impact on the economy. They do not realize that this nation places the health of its citizens above its financial status. Although many people continue to remain convinced that absolving our country of cigarettes does not merit some economical loss, this remains as a necessary step in eradicating our country of these virulent stiflers of life. For years cigarettes have been known to cause cancer, emphysema, and other horrible illnesses. The deaths of over 420,000 of Americans this year will be attributable to cigarettes. With all the other causes of preventable deaths, alcohol, illegal drugs, AIDS, suicide, transportation accidents, fires, and guns, cigarettes still account for more preventable deaths than those do combined, as stated by Lonnie Bristow M.D. of the American Medical Association at her speech to Indiana University.3 We can no longer stand aside and watch fellow Americans die because they smoke cigarettes. Thousands of smokers try to rid themselves of cigarettes but can't because of the physiological dependence they develop, chiefly imputable to its chemical additive nicotine.4 Nicotine was recently declared addictive by the Food and Drug Administration, which explains why many smokers continue to smoke despite the numerous health warnings on cigarette smoking. Although cigarettes do not offer as intense an ef fect as drugs like heroin and cocaine, they rank higher in the level of dependence it creates in the user.

Marvelous Hstory Makings for Women from 1865 Essay

Women have sought out equality and its benefits for the longest of time. Their desire to own themselves and control the world’s perspective of women has been motivation throughout decades. Looking back as far as 1865, Women have always worked hard to care for the family even while they stood behind the man. Women used their skills to manage the home by bringing income in through making and selling clothing. There was a time when it was unacceptable for a woman’s shoulders to be bare in public, and unheard of to be seen with their belly visible. Sex without marriage was obscene as was the option of having sex with preventive methods. And they eventually won the battle of who can and cannot vote. Women struggled against men for and objective females for the right to enlist in the military. Abortion was brought to existence to protect women from birthing unwillingly. The world experienced several acts and rights to ensure women gained equality. Women tackled the world for women related changes drastically since 1865 and do not plan to back down. This paper defines that women have fought for equality in employment, fashion, voting, military choice, and even birth options; they achieved such rights through feminist acts like the women’s liberation movement and they will forever expect rightful equality. â€Å"Women worked hard to create income for their family, such as making clothes from scratch, turning fresh raw game into meals, cleaning homes and baking† (Bowles, M. 2011). Women did just about everything that a man did on top of their own work; they had to be prepared for the unexpected. Women would have to do other things like, tending to the farm animals, and handling the crops. Where democratic freedom is concerned, women fell short along with African Americans for the longest of time. 1842-1932, Anna Elizabeth Dickinson, an orator of the American Civil War period spoke out on women’s rights. She gave her first serious speech in 1860, before the Civil War began, addressing the Pennsylvania Anti-Slavery Society. In 1861, she spoke on the ‘Rights and Wrongs of Women’. She spoke for organizations that focused on adult education programs (Woloch, N. (2013). Education could free women. Women searched for equality in the work place; for real payroll opportunities that were only granted to males. â€Å"There were far less than few professions offered to women if they sought a career for themselves. Other than a teacher, a nurse, or a social worker, women were not given the chance at other forms of employment† (Bowles, M. 2011). Females were given a short break when war began, and were allowed secretary, cook and nurse positions. The women’s rights movement was kicked off in year 1848. Elizabeth Cady Stanton, an American leader in the women’s right movement put together the Declaration of Rights for women. The declaration gained 68 women signatures as well as 32 men signatures. Not only was this declaration of rights after the end of women’s struggle for work equality, but also for educational strengthening, and desired voting rights. â€Å"Stanton, and another strong willed women like Susan B. Anthony, fought through the late 19th century to be victorious, unfortunately as their passing came in 1902 and 1906 they still were not welcome to vote† (Bowles, M. 2011). Women accessed small freedoms along their journey to the great equality. Women strived for dramatic change in their lives. While rights of voting, necessary education and military options were in the works women started making changes that did not require the governments time. Women spiced up their attire. The 19th-century dress reform was a social protest. Dress reformers set their bodies free from the physical and ideological constraints of society’s acceptance of fashion. The reform became a stand for equality. The reform short dress embodied the movement’s ideas by redefining femininity and influence for women. â€Å"In the 19th century America industrialization revolutionized life, pushing cultural, social, political, and even educational change. Opportunities for women extended and contracted simultaneously. Such tremendous social upheaval in such a short time, fifty years created significant tension in the United States† (Torrens, K. M. 1999). Women were on fire. Women cut their hair, began sporting the bob, and experimented with makeup. With the exception of actresses very few women wore lip stick or even powder on their face. To see women decorating their faces for reasons other than entertainment was absurd, yet alluring and exciting. Women were making their mark in America. â€Å"Short skirts, unbuckled boots, and heavy makeup made up the ‘flapper’. Daring teenage girls explored this look and older generations were stunned by the outrageous fashions and attitudes† (Bliven, B. 1925, Sept. 9). â€Å"Women’s skirt lengths crept up through the years; presently we are not awe struck to see a skirt not worthy of being called a skirt, but in 1915 most considered a skirt that ended below the knee to be simply scandalous† (Bowles, M. 2011). In the 1920’s flappers were considered a new breed of young Western women who wore the above mentioned short skirts, bobbed hairstyles, and they also listened to jazz. They would flaunt their rebellious ways in society. Flappers wore excessive makeup, drank, smoked and they were guilty of treating sex more casually than the bond between married people. Not all women were as bold and could reveal as much skin as the flapper girls. â€Å"Many tried to gracefully mix the old with the new in order to protect themselves as well as fit in with the new† (Torrens, K. M. 1999). Women took control of appearance. It took years for women of generations, races, cultures etc†¦ to accept the option to dress how they wish, and even presently there are still cultures that resist the urge to break free and dominate their attire, but for American women fashion is freedom. Fashion is a historical point made that women will be equal, women will stand as tall as men and be seen, heard and respected as man, not just thought of as â€Å"from the rib, which God has taken from man, made him a woman, and gave her to the man† (Robert A. Couric, 2003). I, as a woman, vote yes to that. Voting has been a desire of women for quite a stretch of time. Act after failed act women fought passionately for equality in voting. What sense does it make that a male can choose who runs his country and a female cannot have a say? When the Declaration of Independence was done in 1776, it stated that all men were created equal, but said nothing of women’s rights. â€Å"Several women’s rights leaders found this to be unacceptable and, along with other proud women, Stanton created the term ‘Womanisfesto,’ which was modeled after the Declaration of Independence† (Roberts, 2005). Passed by Congress June 4, 1919, and approved on August 18, 1920, the 19th amendment promised all American women the right to vote. Victory took decades to achieve. Marches, speeches, letters of defiance, and civil disobedience all lead to the radical change of the Constitution. Before that in 1869 the National Woman Suffrage Association was begun, with the goal of securing an amendment to the Federal Constitution for woman suffrage (Woman suffrage). After years with much fight, failure and motivation to enforce women’s rights to vote, the 19th amendment was finally accomplished. The Presidential election of November, 1920, was the first official opportunity for all American women to utilize their right to vote (Woman suffrage). War caused huge vacancies, resulting in great opportunity for women because they were discriminated against in job choice. There was a high demand for assistance in the field, therefore the government called women in to volunteer for service, and why not take that shot at future security. Unfortunately they were not given military privileges or benefits. Women were granted the chance to also serve the military in secretarial jobs and some women drove trucks. Women gained employment during the war, but unfortunately lost them once men returned from Europe. â€Å"The participation of women in the war was serious, not only for the nation, but for their own cause† (Bowles, M. 2011). Women started off serving in the military as contracted or volunteered nurses, cooks and they even disguised themselves as soldiers. During the American Revolution Deborah Samson joined in the Continental Army as Robert Shurtliff, she served as a soldier for almost one whole year, but that opportunity for females was stripped from them when the armed forces decided they were going to ensure that only the healthiest men were in the service, so they started thorough physical examinations (history and collections). The 1960s and 1970s saw an important legislation enacted to address sex discrimination in employment and education. Phyllis Schlafly, a woman opposing the equal rights amendment accused that the amendment would create a â€Å"unisex society† while weakening the family, harming the vision of the homemaker, legalizing homosexuality, and exposing girls to the military draft† (Steinem, G. 1970). Well, women on board with the equal rights amendment were all for it, and would not stop aiming for success even if some of the shared sex were against it. In 1948 Congress passed the Women’s Armed Services Integration Act allowing women status in the military, as well as veteran’s benefits. During the late 1940’s females were allowed permanency as members of the armed forces. They were given all the power men have in military; presently in 2013, the United States Armed Forces flipped a 1994 rule that bans women from serving in certain combat positions, totally cleared the way for women to hold positions in front line units and powerful commando teams. Rights of work choice were on the rise for women. Women were frustrated with their place in society and their progress in their fight to obtain employment and achieve equal rights. In 1960 the amount of women workers doubled in 1940, and just about 40 percent of all females over the age sixteen had employment. The female employee rate increased four times quicker than the rate of men. Wives at work doubled in percentage in between 1940 and 1960† (Purnell, S. E. 1976). The Women’s Liberation Movement was a feminist political movement which developed in the 1960s and 1970s. Year 1961 oral contraceptives or birth control was accessible for women and it was the first step of the women’s liberation movement. In 1961, President Kennedy’s commission to examine the issues involving women discovered that discriminatory actions were indeed being taken against women. In 1963, the Equal Rights Act was in place. It ensured that discrimination between sexes concerning the wages in the work establishment was against the law. In 1964 President Johnson finalized the Civil Rights Act. Signed papers did not mean that realistically women were treated fairly, so a group of women known as NOW, or National Organization for Women took action to bring women’s participation in society up to par, as equal partners to men. The liberation movement made huge steps for women to ensure equality and opened doors for other possibilities for women. The choice to birth a child or not became a concern for women. Several anti-abortion laws had been around since at least 1900. Abortion was prohibited in 30 states and legal only under certain scenarios that could include rape-pregnancies, or incest in the other 20 states. 1925 Margaret Sanger presented the world with her speech, The Children’s Era; the speech addressed the results of overpopulation and a lack of birth control options. Her words: â€Å"Before you can cultivate a garden, you must know something about gardening. You have got to give your seeds a proper soil in which to grow†¦ † (Margaret Sanger, 1925). There is a difference in relation to giving birth unwilling and doing so unprepared. Just about two years after this successful speech, Ms. Sanger spoke at the first World Population Conference in Geneva. Understanding that women would be blamed for their conditions and the repeated pregnancies they faced, Sanger reached out to her audiences in hopes they would help fund her birth control ideas and laws. She used the stories of children to bond her listeners and force support for the services for mothers. She also goes in to great detail about diseases, and a couple other issues concerning life without birth control. It is no secret that there are situations where girls are drugged or raped and result in unwanted or unsafe pregnancies. Where are their escapes? In 1973 the Supreme Court made the decision Roe v. Wade. It invalidated all of the above mentioned laws, and reset guidelines for the abortion. That granted women the right to abort life if they believed it necessary. I, as a young woman and mother, do not shout for joy in this particular right, but I can certainly appreciate the option if ever the horrifying requirement presented itself. Birth control has also become a growing industry that allows women so many different methods of contraception. It is a great thing too, because the open options allow less unaccepted abortions. Women have succeeded in much more than the allowance to choose birth; they have birthed great opportunities for future women. Decades of females fighting for the chance at equality, none of it went in vain for women have gracefully achieved the long awaited desires. Employment is now option and right to women. Women are no longer viewed as the weaker sex and entitled only to house wife, farm girl, or clothing makers. Women dramatically transformed their appearance, giving life to their look. They can realistically and openly express themselves; they have opened a world of opportunity for present and future generations. Military branched out and welcomed women with open arms after quite the fuss, but women are proud Americans as well and have done their fair share in bringing wars to end. The ballot boxes are no longer limited to the male species only, women successfully conquered that battle and have continued to show up to every voting occasion. Women even won the war of being able to choose whether or not to have child. Life is not fair, but women have gained rights to fairness in all that they do in society. There still may be corners of the world with different perspectives on how women rank in society, but watch out for the modern day Elizabeth Stanton and Susan B. Anthony, because there will always be strong women ready to right the wrongs of inequality.