Thursday, December 26, 2019

The Changing Definition of African-American History

Since the origins of the field in the late 19th century, scholars have devised more than one definition of what constitutes African-American history. Some intellectuals have viewed the field as an extension or corollary to American history. Some have stressed the influence of Africa on African-American history, and others have viewed African-American history as vital to black liberation and power. Late 19th Century Definition An Ohio lawyer and minister, George Washington Williams, published the first serious work of African-American history in 1882. His work, History of the Negro Race in America from 1619 to 1880, began with the arrival of the first slaves in the North American colonies and concentrated on the major events in American history that involved or affected African-Americans. Washington, in his Note to volume two of his opus, said that he intended to lift the Negro race to its pedestal in American history as well as to instruct the present, inform the future. During this period of history, most African Americans, like Frederick Douglass, stressed their identities as Americans and did not look to Africa as a source of history and culture, according to historian Nell Irvin Painter. This was true of historians like Washington as well, but during the early decades of the 20th century and especially during the Harlem Renaissance, African-Americans, including historians, began to celebrate Africas history as their own. The Harlem Renaissance, or The New Negro Movement W.E.B. Du Bois was the foremost African-American historian during this period. In works like The Souls of Black Folk, he stressed African-American history as the confluence of three different cultures: African, American and African-American. Du Bois historical works, such as The Negro (1915), framed the history of black Americans as starting in Africa. One of Du Boiss contemporaries, historian Carter G. Woodson, created the forerunner of todays Black History Month--Negro History Week--in 1926. While Woodson felt that Negro History Week should emphasize the influence black Americans had on U.S. history, he too in his historical works looked back to Africa. William Leo Hansberry, a  professor at Howard University from 1922 to 1959, developed this trend even further by describing African-American history as the experience of the African diaspora. During the Harlem Renaissance, artists, poets, novelists, and musicians also looked toward Africa as a source of history and culture. Artist Aaron Douglas, for instance,  regularly used African themes in his paintings and murals. Black Liberation and African-American History In the 1960s and 1970s, activists and intellectuals, like Malcolm X, saw African-American history as an essential component of black liberation and power. In a 1962 speech, Malcolm explained: The thing that has made the so-called Negro in America fail, more than any other thing, is your, my, lack of knowledge concerning history. We know less about history than anything else. As Pero Dagbovie argues in African American History Reconsidered, many black intellectuals and scholars, such as Harold Cruse, Sterling Stuckey, and Vincent Harding, agreed with Malcolm that African-Americans needed to understand their past in order to seize the future. Contemporary Era White academia finally accepted African-American history as a legitimate field in the 1960s. During that decade, many universities and colleges began to offer classes and programs in African-American studies and history. The field exploded, and American history textbooks began to incorporate African-American history (as well as womens and Native American history) into their standard narratives. As a sign of the increasing visibility and importance of the field of African-American history, President Gerald Ford declared February to be Black History Month in 1974. Since then, both black and white historians have built on the work of earlier African-American historians, exploring the influence of Africa on the lives of African-Americans, creating the field of black womens history and revealing the myriad ways in which the story of the United States is the story of race relations. History has expanded to include the working class, women, Native Americans and Hispanic Americans in addition to the experiences of African-Americans. Black  history, as practiced today, is interconnected with all of these other sub-fields in U.S. history. Many of todays historians would probably agree with Du Bois inclusive definition of African-American history as the interaction among African, American and African-American peoples and cultures. Sources Dagbovie, Pero. African American History Reconsidered. Urbana-Champaign: University of Illinois Press, 2010.Painter, Nell Irvin. Creating Black Americans: African-American History and its Meanings, 1619 to the Present. New York: Oxford University Press, 2006.Williams, George Washington. History of the Negro Race in America from 1619 to 1880. New York: G.P. Putnams Sons, 1883.  X, Malcolm. Black Mans History. 1962 speech.

Wednesday, December 18, 2019

A Short Note On Oklahoma Race Riots And The Black Wall Street

Tu Tulsa Race Riots On May 31-June 1, 1921, a series of actions occurred in Greenwood, a small district in the northern parts of Tulsa, Oklahoma, which are now called the Tulsa race Riots. Being a segregated city like the rest of Oklahoma, many of Tulsa’s African American citizens resided in Greenwood- an area composed of predominately African American communities and business locations. The discovery of oil is the number one reason why Tulsa’s economy flourished. There was an abundance of wealthy African Americans due to of this discovery. Because of the affluence and success within the African American community going on in this one particular area, it became known as the Black Wall Street. The whole chain of events began on May 30, 1921 when Dick Rowland, a young black man, allegedly assaulted a white elevator operator. Rowland was arrested the next day. However, outside the courthouse a group of raging whites gathered to attempt to lynch Rowland while a group of African Americans were protecting him to prevent the hanging. With the signal of one unintentional gunshot, many others rang out leaving some from both groups dead. With word getting around town of the riot, many angered whites stormed into the Greenwood District. Residencies were set on fire and many businesses were looted and burned to the ground. Planes also flew by dropping bombs in the area. With law enforcement on the whites’ side, the officers were also a part of the riot. The National Guard wasShow MoreRelatedLangston Hughes Research Paper25309 Words   |  102 PagesMexico to avoid segregation and racial injustice in the United States. As the manager of an electric company and owner of a ranch and mines, Jim expressed contempt for black Americans who continued to submit to segregation and live in poverty. Langston Hughes, 1933 (Library of Congress) Langston was not ashamed of being a black American. He had already written poems celebrating his heritage. He felt connected to the oppressed brown people of the world and hated his father for mistreating hisRead MoreModern History.Hsc.2012 Essay25799 Words   |  104 Pagestwo – conflict in the pacific Topic three – Douglas MacArthur Topic Four – World War I TOPIC ONE – USA 1919-1941 USA 1920’S * the radio age * felt like istory had turned a corner and never going back * stock market * black Thursday November 24 1929 * the jazz age * a speakeasyyyyyyy How significant were the Republican policies in causing the great depression? The significance of the republic policies were great, they brought a lot of growth in the 20’s allowingRead MoreStephen P. Robbins Timothy A. Judge (2011) Organizational Behaviour 15th Edition New Jersey: Prentice Hall393164 Words   |  1573 Pagestransmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. To obtain permission(s) to use material from this work, please submit a written request to Pearson Education, Inc., Permissions Department, One Lake Street, Upper Saddle River, New Jersey 07458, or you may fax your request to 201-236-3290. Many of the designations by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the

Monday, December 9, 2019

Unified Communications Workplace Redesign -Myassignmenthelp.Com

Question: Discuss About The Unified Communications Workplace Redesign? Answer: Introduction With the advancement of science, internet has made its presence in the workplace. Since its advent in the workplace, internet has created wonders by systematizing the business activities. One of the most common usage of internet in workplace is the creation of website, for enhancing the brand image for the customers. Along with this, the companies and organizations have launched mobile services for the convenience of the customers (Chung, Lee and Choi 2015). This is in terms of increasing the trafficking of the audience towards the brand image. Scope of the research Merely introducing apps for the customers does not generate high revenue. The personnel also need to assess the extent to which the customers can access the mobile services for carrying out online shopping. This research provides an insight into the impact of mobile technology on the business dynamics of Al Meera Hypermarket and Supermarket in Qatar. Here, emphasis would be given on achieving large-scale customer satisfaction. The data collection from various and wide-ranging sources enlivens the importance of the mobile technology in the workplace and customer satisfaction. Background of the Company Al Meera Hypermarket and supermarket has achieved accolades and glory through commitment and strategic approach towards marketing. These approaches have resulted in the enhancement of the brand image. Adoption of the social media has increased the number of customers. Moreover, it has expanded the scope and arena of the business. This is through the online investment offers made to the stakeholders and shareholders (Almeera.com.qa 2018). As a matter of specification, the supermarket has 41 branches in and around Qatar. The personnel felt the urge of achieving wider customer satisfaction, therefore, they introduced many other branches in Muraikh, Azizia, Muaither, Thakira, Jeryan Njeima, Al Wakra 2, Al Wajba, Al Thumama, Rawdat Ekdeem. Along with this, the supermarket also opened an outlet in a property in Gulf M Mall. One of the other factors, which has enhanced the widespread presence of the supermarket is the construction of 14 malls. The innovative design of the malls would attrac t the customers (Almeera.com.qa 2018). 2016 was the era when Al Meera supermarket encountered unprecedented growth. The gross profit increased from 427.2 million QAR to 441.7 million QAR. Along with this, the rental income from the shops also witnessed remarkable growth of 37.6%, mounting the value up to 69.3 million QAR. Apart from this, the sales revenue achieved an escalation of 6.3% taking the amount to 2604.4 million QAR by 31st December 2016. Moreover, the operational income encountered a 6.6% growth from the sales of the last year. In numerical projection, the income last year was QAR 498.6 million, which mounted up to 531.6 million QAR currently (Almeera.com.qa 2018). Problem statement Recently, the supermarket has launched mobile services for the customers, so that they can shop at ease while relaxing at home. As a matter of specification, the retail hypermarket and supermarket has introduced the reward system on shopping a stipulated amount. However, it has not benefitted the personnel to conduct the business efficiently and effectively. This issue has deprived the customers from availing the benefits of points (Almeera.com.qa 2018). The major drive behind this is the internal failures in the mobile app, which helps the customers to redeem information regarding the points that they have gained in the account. The retail hypermarket and supermarket personnel have received complaints from the 50 customers regarding the inappropriate setting of rewards with the shopping amounts, which have deprived the customers from exercising their purchasing power. This deprivation has adversely affected the customer service, adding a negative connotation to the aspect of custome r satisfaction. As a matter of specification, the complaints from 50 customers have stalled the productivity of all the functional departments of the supermarket. This proposal would shed light on how mobile technology can be utilized judiciously for upgrading the standards and quality of the retail services. Aims and objectives The aim of this proposal would be to assess the impact of mobile technology on the workplace operations of Al Meera Hypermarket and Supermarket. Based on this aim, the following objectives can be developed: To identify the technologies used by Al Meera hypermarket for achieving customer satisfaction To excavate the accessibility options provided to the customers in case of the online shopping To discover the level to which the customers are comfortable in accessing option of online shopping in Al Meera Hypermarket and Supermarket To suggest recommendations for improving the mobile technology in Al Meera Hypermarket and Supermarket for reaching to a large number of customers Significance of the project Today, mobile technology has found its enlarged presence within the workplace. Mobile technology is used for many purposes, of which communication has gained popularity. Using latest and modern technology for communicating with the clients has benefitted the personnel in enhancing their brand image as smart (Pimmer and Pachler 2014). However, lack of efficient and effective technology broadens the gap between the personnel and the customers. This detachment compels the customers to lag behind from the latest trends adopted by the supermarket, which results in loss in sales revenue. This project, through the example of Al Meera Hypermarket, would attempt to enliven the process through which mobile technology has upgraded the standard and quality of workplace communication. The collected data from the samples enhances the validity and reliability of the propositions and assumptions. Literature review The aspect of scientific knowledge gets advancement through technology. According to academics, technology enriches the knowledge of the individuals regarding application of science in diverse fields. The etymological origin of technology dates back to the mechanical age (between 1450 and 1840). This was the era, when the first analog computer was discovered. Its function was multiplication and division (Pimme and Pachler 2014). During this age, the people also encountered the invention of mechanical computer through the hands of Blaise Pascal. However, Charles Babbage made the most mesmerizing invention of a unique kind of engine possessing flexibility to calculate polynomial equations through the methods of finite differences. Electromechanical age (1940) was the era when digital computer made its presence in the threshold of United States through the mastermind of Mark 1 in the Harvard University. The size of the computer was huge (8 ft high; 50 ft long; 2ft wide and 5 tons in weight). The operation of these computers depended on punch cards. In the process of operation, the people became aware of the separate parts of the computer (Colbert, Yee and George 2016). This enrichment of knowledge generated within the people the idea of using the computers in their homes as well as in the workplace. The electronic age was the time when ENIAC was developed. This was the period between 1940 till the present, when the people were made acquainted with the computers possessing flexibility to solve wide ranging computer problems with high speed. The length of these computers was 680 feet long and weighed 30 tons. The calculations were done through the vacuum tubes. This stage also saw the creation of high programming languages such as FORTRAN and COBOL (Bertschek and Niebel 2016). The age following this encountered the additions of integrated circuits, magnetic tapes throughout the parts of the computers. The development of programming language, BASIC, completed an operating system. In the following age, CPU was added, which was a chip consisting of memory, logic and circuits. Here, the basic functions were storing the files, transferring the files from one location to the other. The addition of internet transformed computers as a whole. It connected the humans with every part of the world. Within the different aspects of technology, Bring Your Own Device (BYOD) is a concept, which allows the employees in the workplace to bring the device of their choice. These include smartphones, laptops, and tablets among others. However, the security of these devices is solely the responsibility of the employees (Pimmer and Pachler 2014). In the recent past, this concept has been implemented as a policy in the workplace. According to the policy, the support is sought by the personnel for the employees device through the proper application of corporate governance. The allowance for support varies from organization to organization. In some of the organizations, allowance is refused for Pc and Laptops. This refusal is compensated by provision of monetary assistance in terms of buying the technological equipments of their choice. Yet in some other organizations, support is given only for mobile devices (Hung et al. 2015). The rules and regulations of the BYOD policy varies according to the duties and responsibilities allocated to the employee. The employees can make use of this policy for mitigating the risks related to the security of their personal technological devices. Technology in workplace Technology plays an important part in the workplace. As a matter of specification, technology helps the personnel to perform the tasks automatically, which saves a lot of time. Along with this, technology assists the personnel to produce innovative goods and products. Based on these functions, it can be said that technology enhances the productivity of the companies and organizations (Colbert, Yee and George 2016). With the advancement in technology, the aspects of video conferencing, whatsapp have been installed in the mobile devices. Through these, the employees can establish contact with the boss even from their homes or anywhere else. These functions have enhanced the portability of the technological devices used in the workplace. Provision of access to the mobile apps helps the users to surf the various services provided by the organization. This access has enabled the personnel to increase the trafficking of the audience towards the brand image (Pauleen et al. 2015). Typical example in this direction is the official website and social networking sites. Proper accessibility in this regards is the introduction of online shopping, which increases the revenue of the organization. Technology also helps the managers to review the performance of the employees. This is to ensure the smooth functioning of the business activities in all the departmental units. The example in this case is CCTV cameras. Apart from this, latest and modern software help the finance admins to develop the budget automatically. Technology also proves beneficial for the line managers in terms of checking the quality of the produced goods before sending them for packaging (Williams and LaBrie 2015). Rewards One of the recent concepts in the retail sector is the rewards. This is provided to the customers if they reach the stipulated shopping amount. This is done by transferring the reward points to the customers account. For this, efficient technologies are needed, which is missing in the workplace of the retail sector. This is in terms of keeping track of the ways and means through which the customers can redeem the points. Recently, the retail supermarket has introduced mobile services, where the customers can redeem points by shipping through the apps (Palvalin 2017). These rewards add happiness into the lives of the customers, as they get extra monetary benefits along with the branded products. Customer satisfaction Customers are the assets for the companies and organizations. They are the important stakeholders, who escalate the sales revenue. On the other hand, it is the responsibility of the brand personnel to provide quality products and services for satisfying the specific needs, demands and requirements of the customers. Like the other sectors, retail sector personnel indulge in partnership with the agency partners for introducing lucrative deals, trades and transactions for the customers. Typical example in this direction is rewards on shopping for a stipulated amount. Mere setting of the rewards does not enable the personnel to achieve customer satisfaction (Williams and LaBrie 2015). The personnel need to assess whether the customers are able to access the reward points. Social cognitive theory Social cognitive theory has four dimensions- self regulated behavior; learning through observation; outcome expectancies and self-efficacy. In the case of self-regulation of the behavior, the theories of planned action and reasoned behavior can be brought in. Controlling the computer by using it according to the needs, is a reasoned and planned behavior in case of the employees. The aspect of outcome expectancy is related with the managers in terms of estimating the capability of the employees to make practical application of the learnt skills on executing the workplace operations (Palvalin 2017). Emerging successful in performing the allocated duties diligently enhances the social status of the employees. As a matter of specification, technological learning expands the knowledge horizon of the employees. This expansion enhances the self-esteem of the employees as individuals. Viewing it from the perspective of the workplace issues, technology plays an important role in bestowing efficient and effective solutions on the employees. Regular practice in this direction increases the competence of the employees in terms of solving the issues within the duties and responsibilities. Observing other employees excelling in the technological operations generates an urge within the employees to perform better. Herein lays the true essence of the word cognitive (Chung, Lee and Choi 2015). Indulging in partnership with the internet service providers is the planned behavior of the personnel in terms of enhancing the standards and quality of the services. Taking the feedback of the customers, regarding the effectiveness, appropriateness and feasibility of the provided services, is the reasoned action of the personnel in terms of valuing their purchasing behavior and power. Delving deep into the aspect, deals, trades and contracts with the associate partners is an attempt of the personnel to alter the business scenario. Catering to the passion of the customers regarding the possession of latest technologies is the vision of the retail sector personnel towards enhancing the parameter of corporate social responsibility Introduction to research and research methodology Methodology enhances the clarity of the readers regarding the data collection process. Along with this, the readers are acquainted with the philosophy, which prompted the researcher to adopt a certain approach to the research. Along with this, samples occupy an important position in the data collection process. Their responses acts as an agent for the researcher regarding validating and enhancing the propositions and assumptions. Collection of data from the employees of Al Meera supermarket would enhance the clarity of the researcher regarding the contribution of mobile technology in the workplace and customer satisfaction. Research Philosophy There are mainly three kinds of philosophies, which are applied to research- positivism, post-positivism and interpretivism. Positivism philosophy helps the researcher to develop scientific facts and knowledge about the subject matter of the research. Post positivism philosophy helps the researcher to research the consequences of developing scientific facts and knowledge. Interpretivism needs the researcher to interpret new facts from the established facts (Mackey and Gass 2015). In this research, the researcher would select positivism philosophy for emphasizing on the scientific and real facts related to the impact of mobile technology on workplace. This selection would prove fruitful in terms of relating the assumptions with the scientific, real and objective facts of technological influence in workplace and on the achievement of customer satisfaction. Methodological choice Exploratory, explanatory and descriptive are the main approaches, which are applied in the research. Exploratory research approach assists the researcher to explore new facts based on the gathered and the available facts. Explanatory approach needs the researcher to explain the proposed points in details (Silverman 2016). In terms of the functionality, descriptive approach can be placed in the same alignment with the explanatory approach. This is in terms of delving deep into the proposed facts for describing them. In this research, the researcher would choose exploratory approach for excavating the factors, which establishes relationship between technology and workplace operations. This exploratory approach would enable the researcher to deduce relevant conclusions and suggest recommendations regarding the improvement of mobile technology for improving the workplace productivity the achievement of large-scale customer satisfaction. Moreover, exploratory approach would make the resea rcher aware of the transformations, which have taken place in the workplace of Al Meera hypermarket. Along with this, exploratory approach would enhance the knowledge of the researcher regarding the steps undertaken by the brand personnel for achieving loyalty, trust and dependence from the customers. Research strategy Research strategy is the step by step expression of the actions of the researcher for efficient execution of the research. In terms of its functionality, research strategy can be aligned with the action plan, which depicts the researchers every course of action. In this research, the researcher, at the initial stage, would attempt to enrich his preconceived knowledge regarding the subject matter (Mackey and Gass 2015). As a sequential step, the researcher would develop aims, objectives and questions followed by literature review. After this, the researcher would collect relevant data from the samples and analyze them for deducing conclusion and suggesting recommendations regarding the adopting of latest and modern software for adding the points into the account of the customers. Studying the previous data regarding the customer satisfaction, prior to the initiation of data collection, would be fruitful in terms of posing appropriate questions to the samples and analyzing them in prop er manner. Data collection and analysis For the research purpose, data is collected mainly through primary and secondary methods. Within this, there are subdivisions- quantitative and qualitative methods. In the primary quantitative, surveys are conducted to collect data from the samples (Taylor, Bogdan and DeVault 2015). On the other hand, in the qualitative data, case studies, journal articles and books are referred for completion of the data collection process. In this research, the researcher would select quantitative data collection method. As a matter of specification, survey would be conducted on the selected samples. The questions of the survey would be related to the extent to which the employees are comfortable with the technologies used in the workplace of Al Meera hypermarket and supermarket. These questions would be directed towards the business rather than the personal sentiments of the employees. The survey questions for the customers would consist of their satisfaction regarding the services provided. Attem pts would be made to protect their individual sentiments. The collected data is analyzed through primary and secondary methods. In the primary quantitative methods, questionnaires are prepared for analyzing the responses provided by the samples. On the other hand, in the secondary method, themes relevant to the subject matter of the research are developed for analyzing the collected data. In this research, the researcher would prepare questionnaires for analyzing the responses of the samples (Panneerselvam 2014). This would be done through the means of charts, tables and graphs. These tables, charts and graphs would depict the transformations, which the Al Meera hypermarket has undergone since the previous years. Along with this, the charts, tables and graphs would reveal the comparisons in the number of customers in the previous times and the present. One of the other aspects here would be the alterations in the service provided. Sampling technique The whole population is the sample of the research. This is in terms of the subject matter, which revolves around the society and the inhabitants. However, owing to the availability of less time and financial resources, the researcher needs to select a sample size for the collection of data in an efficient and effective manner. The researcher selects the samples mainly through three techniques- probability, random and simple. Probability sampling techniques reflects the selection of the samples, who have expertise on the subject matter of the researcher. Random selection indicates the selection of samples without any calculations or thoughts (Bryman and Bell 2014). Simple sample selection is the method, in which the researcher simply picks out the samples. In this research, the researcher would select 5 employees from Al Meera Hypermarket and Supermarket, who are tech savvy. The survey questions would focus on their accessibility towards the mobile technologies in the workplace. Along with this, 3 customers would be randomly selected for gaining insight into their satisfaction levels regarding the use of mobile apps for the shopping and redeeming points. Ethical considerations For executing a research, a researcher needs to abide by the research ethics. This adherence constitutes the personality of the researcher in terms of interplaying with the already established facts. One of examples of ethical considerations is Data Protection Act (1998). Complying with the standards and protocols of this act would help the researcher to enhance the safety, security and privacy of the personal data exposed by the samples (Panneerselvam 2014). Apart from this, following the Data Protection Act would help the researcher to preserve the privacy, security and safety of the personal details exposed by the samples. This adherence is also assistance in terms of adopting a liberal approach towards the samples. Typical example of this is the provision of liberty to withdraw the survey process upon feeling uncomfortable. Consciousness towards these aspects directly aligns with the true essence of customer satisfaction. Along with this, the researcher is expected to access only those sites, which do not need subscription (Flick, 2015). This adherence would help the researcher to avert the instances of plagiarism and collusion. Action plan The following is a sample of action plan, which enhances the clarity of the readers regarding the time when the research related activities would be undertaken: Activities Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Selection of the topic Development of aims and objectives Literature review Data collection Data analysis Deducing conclusion Suggesting recommendations Evaluation Making the necessary changes Table 1: Gantt chart for the proposal References Almeera.com.qa (2018). About us. Available at: https://www.almeera.com.qa/our-stores/al-meera-supermarkets-and-hypermarkets [Accessed on 8th February 2018] Bertschek, I. and Niebel, T., 2016. Mobile and more productive? Firm-level evidence on the productivity effects of mobile internet use.Telecommunications Policy,40(9), pp.888-898. Bryman, A., and Bell, E. (2014).Research methodology: Business and management contexts. Oxford University Press Southern Africa. Chung, S., Lee, K.Y. and Choi, J., 2015. Exploring digital creativity in the workspace: The role of enterprise mobile applications on perceived job performance and creativity.Computers in Human Behavior,42, pp.93-109. Colbert, A., Yee, N. and George, G., 2016. The digital workforce and the workplace of the future.Academy of Management Journal,59(3), pp.731-739. Flick, U. (2015).Introducing research methodology: A beginner's guide to doing a research project. Sage. Hung, W.H., Chen, K. and Lin, C.P., 2015. Does the proactive personality mitigate the adverse effect of technostress on productivity in the mobile environment?.Telematics and Informatics,32(1), pp.143-157. Mackey, A and Gass, S. M. (2015).Second language research: Methodology and design. Routledge. Matthews, B., Ross, L. (2014).Research methods. Pearson Higher Ed. McCusker, K., Gunaydin, S. (2015). Research using qualitative, quantitative or mixed methods and choice based on the research.Perfusion,30(7), 537-542. Palvalin, M., 2017. How to measure impacts of work environment changes on knowledge work productivityvalidation and improvement of the SmartWoW tool.Measuring Business Excellence,21(2), pp.175-190. Panneerselvam, R. (2014).Research methodology. PHI Learning Pvt. Ltd.. Pauleen, D., Campbell, J., Harmer, B. and Intezari, A., 2015. Making sense of mobile technology: The integration of work and private life.Sage Open,5(2), p.2158244015583859. Pimmer, C. and Pachler, N., 2014. Mobile learning in the workplace: Unlocking the value of mobile technology for work-based education.Increasing access through mobile learning, pp.193-203. Silverman, D. (Ed.). (2016).Qualitative research. Sage. Taylor, S. J., Bogdan, R., and DeVault, M. (2015).Introduction to qualitative research methods: A guidebook and resource. John Wiley Sons. Williams, J. and LaBrie, R.C., 2015. Unified communications as an enabler of workplace redesign.Measuring Business Excellence,19(1), pp.81-91.

Monday, December 2, 2019

Network Security and Its Importance in Computer Networks

Introduction Network security is an intricate topic traditionally handled only by professionally trained and experienced persons. Yet, as more and more individuals become connected through computer networks, a rising number of people need to comprehend the fundamentals of security in a networked environment.Advertising We will write a custom report sample on Network Security and Its Importance in Computer Networks specifically for you for only $16.05 $11/page Learn More In the domain of networking, network security comprises of provisions and guidelines established by the network administrator to curb and monitor illegal or unauthorized access, misuse, alteration, or denial of the computer network and other network-based resources (Stallings 2010). Network security comprises of a range of computer networks, both private and public, that are employed in day-to-day tasks such as carrying out business transactions and communication among firms, public and p rivate institutions, enterprises, and persons. Network security does just as its name goes, protects the network and manages all processes being done on the network. Objective The objective of the paper is to expound on network security and its importance in computer networks. Background information on computer networks will also be provided as well as risk management, network threats, firewalls, and hardware and software devices that can be used to improve the security of a computer network. Introduction to Computer Networks An elementary comprehension of computer networks is essential in order to understand the codes of network security. A network is any set of interconnected lines, basing this definition on the current topic, a computer network is basically a set of linked computers. Networks enable users to share resources and information, and are classified base on a variety of protocols (Network Security Threats 2011). For instance, a classification based on the connection man ner focuses on the hardware and software systems used to link the individual computer units, such as optical fiber, wireless connection, or coaxial cable communication. Networks can also be categorized on scale, this gives Local Area Network (LAN), wide area Network, virtual Private Network (VPN), among others (Stallings 2010). Networks are made up of ‘nodes’, which are the individual computers in the network, and at least one server and/or ‘host’ computers. The nodes are linked together by communication systems, which may be private, such as that within an institution, or can be accessed by the public, such as the internet. Several private networks also use the internet.Advertising Looking for report on computer science? Let's see if we can help you! Get your first paper with 15% OFF Learn More The moment a computer network is instituted, it immediately becomes vulnerable to network security threats such as viruses and bugs that may affect th e normal functioning of a computer. Besides, the personal information such as usernames, passwords, credit card numbers and other critical information may be at risk if the computer does not have adequate security measures. There are very many threats in a network, some of which are so severe and can bring down a large network consisting of thousands of computers. Virus In the domain of computer networks, a virus refers to a computer program that can replicate itself, similar to the biological virus. A computer virus spreads from one computer to another through an executable program that attaches itself on programs, files and folders. It can spread through various means, for example, if one computer in a network becomes ‘infected’ with a virus, the rest of the computers in the network may become infected too if the security features are inadequate. It can also be spread through USB devices, CD, DVD, or portable had drives. A computer virus may also spread by mailing a w eb address link to all addresses so that when a person clicks on the message to go the website, the virus enters this new computer. Certain viruses are less harmful, however, some are very harmful and can infect a computer in the network through various ways (Simmonds 2004). A virus can corrupt the files or software in a computer. Others may attack the computer hardware and bring the whole computer down. Yet, some viruses may allow a person to have partial control of a computer, this allows for unauthorized access to files and critical information stored in the computer’s hard drive. Although the Windows platform is by far the most vulnerable, other operating systems can also be attacked by viruses. Network threats arising from viruses can be managed through various ways, however, the most common technique is to install an antivirus software. UNIX-based systems such as Mac OS and Linux are far more secure than Windows. Some anti-virus programs can scan file contents and even zipped folders while some can also scan sent and received mails, a practice known as ‘on-access scanning’ (Simmonds 2004).Advertising We will write a custom report sample on Network Security and Its Importance in Computer Networks specifically for you for only $16.05 $11/page Learn More Vulnerability to viruses can also be reduced by carrying out data backups regularly on storage media that are not connected to the network or computer. Security patches availed by software manufacturers can also assist in reducing attacks by viruses. Secondary storage media must be scanned before opening in the host computer. Malware Malware, short form of malicious software, is a program created to interrupt normal computer operations or deny a user network or computer resources, gain partial control of the computer, access files stored in the computer, gather network-based information such as passwords, and other cruel or dishonest behavior (Curtin 1997). Malware consists of a large number of malicious programs that includes viruses, Trojans horses, worms, spyware, false adware, rootkits and other malicious programs. In 2009, malware was listed as the second most dangerous threat to computer networks. Today, millions of malware are created daily to exploit networks with weak security features. Threats arising from malware can be removed using antivirus programs. Most antivirus have an added feature of removing various malwares from the network of individual PCs. Besides, anti-spyware software can be used to prevent spyware threats. Denial-of-Service Attacks A Denial-of-Service (DoS) attack is a practice aimed at making network resources unavailable to some users. This vice entails the resolute efforts of a person or group of persons to prevent an internet site or service functioning normally or bringing it down altogether. This network threat is commonly committed against websites or services hosted on high profile internet servers s uch as financial institutions and credit card payment services (Stallings 2010). One mode of attack involves flooding a web server with requests in such a way that it cannot respond to legitimate communication requests, or responds in a sluggish manner that virtually renders it unusable. In general, DoS attacks are executed by either compelling the targeted systems to reset, or using up its resources so that it is unable to offer the intended services. DoS attacks are perhaps the most malicious and hardest to prevent or manage. They are the most malicious due to the ease with which they can be launched and the difficulty of tracing their origins, and it is difficult to deny the requests of the attacker without also blocking out genuine requests for service.Advertising Looking for report on computer science? Let's see if we can help you! Get your first paper with 15% OFF Learn More DoS attacks can be prevented through various ways. The first technique is to use firewalls. Firewalls have simple instructions of blocking or allowing certain IP addresses, or ports, however, firewall are not very effective in some DoS attacks as they cannot distinguish legitimate traffic from DoS traffic. Switches and routers can also be used to prevent these attacks (Kizza 2006). Intrusion-prevention systems (IPS) have been successfully used to halt DoS attacks that have signatures attached to them. Unauthorized Access This is a very wide terminology as it can refer to various types of attacks, however, the objective of these attacks is to access some information that the computer or server is not supposed to reveal. Unauthorized access to a computer or server can be achieved by using viruses, malware and other malicious programs. This form of threat can be waded off by using antivirus programs and security patches. Another strategy used by intruders to access a computer on a netw ork is a technique known as packet sniffers. Packet sniffers can be used on a vulnerable network and they just ‘listen’ on the server for words such as password or login in the packet stream, then sends the information thereafter to the perpetrator. This way, an intruder is able to obtain usernames, passwords, credit card information and other critical information from unsuspecting users (Bragg et al 2010). This type of threat can be prevented by using clear-text passwords, besides, data encryption can help divert such attacks. When using a wireless network, it is advisable that one should use a long or complicated password, also, it is advisable that the strongest security supported by the wireless connection hardware should be used, such as encryption tools. Passwords can also be changed regularly. General Methods for Preventing Network Attacks and Reducing Vulnerability on Networks The most commonly used technique for reducing network threats is the installation of a ntivirus programs. These programs must be regularly updated and security patches and updates installed. Improving the security of the network infrastructure can also involve switching on features that enhance network security on switches, routers, and other hardware (Fadia 2006). These security features ensure a secure connection, enhance perimeter security, prevents intrusion, protects identity services, and general security management. Fixing intrusion detection systems and firewalls offers protection for most areas of the network and allows for a safe connection. Working on a virtual private network (VPN) can also enhance security. VPNs provide network access control and encryption services. Network security can also be improved by undertaking regular network security audits. A network security audit simply means that an expert comes and examines the security of the network, he also checks for loopholes that may be used attack the system and fixes them. The audit can go beyond an inspection of the computers in the network and may comprise a site assessment of the physical security of the organization. A network security audit fixes an organization security flaws in the network and makes it difficult for perpetrators to attack the network (Network Security Threats 2011). Since network threats come in a variety of forms and cannot be totally eliminated, it is advisable that secure updated data backups should be kept on systems that are detached from the network. None of these strategies will singly eliminate the threats arising from a network connection, but when they are used together, they can be exceedingly effectual at keeping a network safe. Besides, well –thought-out organizational policies can be effective at preventing unauthorized access to critical and parts of the network. References Bragg, R., Rhodes-Ousley, M., Strassberg, K. (2004). Network security: the complete reference. New Jersey: John Wiley Sons, Inc. Curtin, M. (1997). Introductio n to Network Security. Available from  http://www.interhack.net/pubs/network-security/ Fadia, A. (2006). Network security: a hacker’s perspective. TX: Thompson Course Technology. Kizza, J. M. (2006). Computer network security and cyber ethics. Kizza, J. M. (2006). New York: McGraw-Hill. Network Security Threats. (2011). What Is A Network Security Audit? Web. Simmonds, A., Sandilands, P., van Ekert, L. (2004). An Ontology for Network Security Attacks. Lecture Notes in Computer Science, 3285: 317–323. Stallings, W. (2010). Cryptography and network security: principles and practice. NY: Prentice Hall. Stallings, W. (2010). Network security essentials: applications and standards. NY: Prentice Hall. This report on Network Security and Its Importance in Computer Networks was written and submitted by user Lamar Hanson to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Wednesday, November 27, 2019

The Biography of Irene Parlby

The Biography of Irene Parlby Born in England to a well-off family, Irene Parlby never planned to be a politician. She immigrated to Alberta and with her husband became a homesteader. Her efforts to help improve the lives of rural Alberta women and children led her into the United Farm Women of Alberta, where she became president. From there she was elected to the Legislative Assembly of Alberta and became the first woman cabinet minister in Alberta. Irene Parlby was also one of the Famous Five Alberta women who fought and won the political and legal battle in the Persons Case to have women recognized as persons under the BNA Act. Birth: January 9, 1868, in London, EnglandDeath: July 12, 1965, in Red Deer, AlbertaProfessions: Womens rights activist, Alberta MLA, and cabinet ministerPolitical Affiliation: United Farmers of AlbertaRiding (Electoral District): Lacombe Causes of Irene Parlby For most of her career, Irene Parlby worked to improve the rights and welfare of rural women and children, including improving their health and education. The Career of Irene Parlby Irene Parlby was president of the United Farm Women of Alberta from 1916 to 1919.She was a member of the Board of Governors of the University of Alberta and helped form policies for the faculty of extension, which provided educational materials for rural communities.Irene Parlby was first elected to the Legislative Assembly of Alberta in 1921.In 1921 Irene Parlby was appointed Minister without portfolio, the first woman to become a cabinet minister in Alberta. She was the second woman to become a provincial cabinet minister in Canada.As a cabinet minister, Irene Parlby established traveling medical clinics and was a proponent of distance education.Irene Parlby introduced the Minimum Wage for Women Act in 1925.Irene Parlby was one of the Famous Five in the Persons Case which established the status of women as persons under the BNA Act in 1929.She was Canadian delegate to the League of Nations in 1930.Irene Parlby retired from the Legislative Assembly of Alberta in 1935.In 1935 Irene P arlby became the first woman to be awarded an honorary doctorate of law from the University of Alberta.

Saturday, November 23, 2019

Free sample - Attracting Students to NOVA Southeastern University. translation missing

Attracting Students to NOVA Southeastern University. Attracting Students to NOVA Southeastern UniversityTertiary institutions such as colleges and universities need a constant supply of students in order to meet their financial needs in not only their daily running costs but also to meet costs incurred in research. Nova Southeastern University, a private, non-profit making university, is no exception. It has endeavored to create a sustainable environment for learning which is further supported by a vibrant on-campus life which is vital to students in choosing the institution of higher learning in which to study in. This essay therefore, explores ways in which Nova Southeastern University can attract more students in order to facilitate smoother running in its activities. The overall need for Nova Southeastern University is to encourage students to study the various courses offered in the instituition and make a career out of it. There is hence a need for the institution to communicate its discovery of the various fields and the deep level of satisfaction enjoyed in pursuance of these courses. The institution needs to phrase from a point of view as to: What attracted this particular student to that specific course? What other fields did the student consider, and why did the student not any choose them? These disciplines need to be presented individually on a basis of their worthwhile, attractive, diverse, challenging and readily on hand career opportunities which is the vital endpoint that students are mainly interested in. The motivation criteria should not be based on academic self-interest but rather on their personal and professional fulfillment. The students need to envision themselves as successful in their careers after graduating. This will gr eatly compliment all enthusiastic efforts at encouraging the students to enroll at the university. In addition, the efforts put in place should also be persistent, patient and realistic. This is since it takes a considerable amount of time to build a critical student mass that shall enroll in the diverse courses offered in the university. It is important to encourage students to join Nova Southeastern University as early as in high school and pre-college. Generally, the university’s employees should act as ambassadors wherever they are. Quick, informative and well-thought out responses in answer to any impromptu questions should be formulated before-hand since the employee may be talking to a potential student. Mainly, careers in Mathematics and Statistics are neglected by students under the perception that they are difficult. Most students are not aware of courses such as Applied Statistics and Physics as a career option. Therefore, presentations should be made to high school students during promotion campaigns. During those visits, those responsible for the awareness program should arrange to meet with guidance counselors or better, invite them to the sessions. Further, support should be accorded to the admissions offices by meeting, calling or writing to prospective students and their parents. Ongoing studen ts can also make presentations at each department’s office preview or open house days. By doing so, they are viewed as diplomats or ambassadors advocating these courses. In addition, the ongoing students can offer campus tour guides for those students who envision joining the university. The university’s alumni can come in handy in displaying Nova Southeastern university as a prestigious institution of which they are proud to be associated with. Various workshops can be very vital in ensuring presentations communicate the intended purpose such as a Quantitative Literacy workshop. The other vital focal point is during the Welcome Week. Most students either change courses or permanently leave the university during this week. Therefore, several changes need to be implemented in order to reverse this trend. Lecturers should be careful when issuing their preliminary promotional remarks so as not to either scare students away or impart an impression that they are in for a rough time and under pressure. In the welcome week, the facilitator should avoid all stereotypical examples that make fun of the discipline and create the impression of drudgery. Each department should have a well written overview of the course. During orientation week, an introduction seminar should be held whereby the essence of studying each particular course is insisted upon. A real-life research project can be presented so as to demonstrate the applicability of that particular field of study in a real case scenario. However, caution must be taken as to the depth of the details since they enta il a complex methodology which might end up building a lasting negative impression. During the second year, students should be encouraged to take up introductory courses rather than in the first year in order to avoid confusion and a feeling of being overloaded. All introductory courses should be taught by the experts in that particular faculty rather than outsourcing from other departments in related and common courses. Preferably, the lecturers should have ample consulting experience gained either as faculty member or full-time consultant in the required field. This is since practitioners not only bring more relevance in the field of study but also express more enthusiasm in teaching. The university should also ensure various departments inter-collaborate so as to look for opportunities both inside and outside the institution. Emphasis should be placed on multidiscipline interaction coupled with strong interpersonal and communication skills. During the registration advisement period, personal contact should be made with the students who had performed best and encourage them to take up the course and additional courses in the semester. The departmental head should solicit support from fellow colleagues in the preparation of information sheets that indicate on the course prerequisites, the semester sequencing and current offerings in the field. Continuous encouragement and support for students till graduation should be availed so as not to end up with a situation whereby the number of those enrolling is higher but with a minimal corresponding number of grandaunts. There are various other vital points in not only enrolling but maintaining a stable number of students in the university. Chief among this is mentorship. An initiative should be taken to contact students regularly so as to offer encouragement and advice as they continue to work towards graduating in these courses. The mentor should be available and approachable informally so as to boost self-confidence and the belief in oneself. Further, the mentor can involve the students in his or her personal research and consultancy. Secondly, it is vital to conduct surveys through interviews on grandaunts. Establish why they chose that career path and ask for their view on what would attract more students into that career path. This can be extended to a similar survey conducted in students already practicing in that field. Have them analyze the measures that have been put into place and let them point out the strengths and weaknesses of the same. Thirdly, publish success story of the successful alumni in each field and avail them in the student’s library and departmental websites. Finally, it is important to incorporate technology. The university should embrace e-learning which ensures students can study at the comfort of their homes and which shall also further its distance education program. If Nova Southeastern University shall continue to thrive and expand its student base in the face of stiff competition, there as a need to implement the aforementioned changes as rapidly as possible. Although most of these changes will take time, in the long-run, the benefits acquired will far outmatch the physical and financial effort put in the implementation of these strategies.

Thursday, November 21, 2019

HPV in adolescens, a health project Research Paper

HPV in adolescens, a health project - Research Paper Example As a clinician, one is tasked with general advocacy and involvement in educating the public on health practices, from parents down to the children. This requires thorough campaigns in schools, communities and general public learning institutes. Issues of adolescent patients’ sexuality, risk behaviors, and other psychosocial risk factors should be a priority within the working procedures of all physicians. Adolescence is one of the most vulnerable life passages for the acquisition of human papillomavirus (HPV) (Anonymous, 2010, p19-20). Nurses and other health practitioners have a unique role to play in the fight against HPV amongst adolescents. This is effective by early health screening, effective communication and good care to the adolescent patients (Nancho, n.d, p30). The process is long and involves participation of many stakeholders and hence necessitates good organization and management of the whole process. Therefore, this process requires competitive and skilled leade rship from the responsible health care managers (Cherie and Gebrekidan, 2005, p4-5). From an early age in my upbringing, I knew very well what I wanted do when I grow up. I loved helping patients and attending to the less fortunate in the society with medical attention. However, amongst the many health practitioners categories, nursing interested me most. ... Amongst the participants present in the meeting were other invited global players whose role was monitoring the programs and evaluating the progress of the professional group. The health organization is a national, not-for-profit, independent, voluntary association. It represents public health in the country and is globally linked to the international public health community. The organization believes in universal, equitable and accessible basic life conditions, which necessitate the acquisition of health services to all in the country. The organization’s mission is to constitute a nationwide resource that has the main role as to advocate for the improvement and maintenance of health among individual citizens and the community at large as according to the public policy. The meeting was organized and convened by the interim chair of the organization and the board and directors to deliberate on the mechanisms and ways to address the rampant cases of spread of HPV amongst adolesc ents in the country and the globe at large. The main agenda was the role of nursing profession in the treatment and control of the condition in the overall health practitioners’ fraternity. The meeting resolved unanimously that the youthful stage of adolescence is the main target in the fight against Human papilla virus, which easily transcends through risky sexual behaviors amongst adolescents. The nursing fraternity proposed effective mechanisms to be employed to ensure effective and successful fight against the threat posed by the viral condition. However, one of the greatest challenges outlined was the leadership program that would facilitate the success of the campaign. The leadership skills important in

Tuesday, November 19, 2019

Human Resources Essay Example | Topics and Well Written Essays - 250 words

Human Resources - Essay Example If this would not suffice, it is time to consider some disciplinary actions suitable for the offense. 2.) Upon receiving the cease and desist letter, the company needs not to respond immediately; instead it should take more time to analyze the situation and formulate a planned response. It is necessary that the concern will be discussed to the legal counsel who is expert in the field of infringement claim (Landy, 2008, p. 131). Likewise, the company should establish a new version of policy that will strongly regulate the usage of internet. The company should also be stricter in monitoring the usage of office supplies by conducting an accurate inventory. 3.) I would consider the idea of terminating Karen at the end of her probationary period. This is not because other employees had told me to do so but this is based on the monitoring and review of criteria. The criterion that makes her not suitable is the ‘timely and regular attendance at work’ which will definitely affect her productivity (Smithson, n.d.). The case of Jackie is different from Karen in terms of their employment status. Although the offense is more or less the same, Jackie’s situation needs to have a form of just cause otherwise damages will be

Sunday, November 17, 2019

Others vs. leaders Essay Example for Free

Others vs. leaders Essay To further test why there was a difference in the above results, t-test was further conducted between the two groups to identify the items where there are possible differences between the two groups under study. B. 1. Leadership, Item 1: There was no significant difference between the Leadership mean scores of the Others Group and the Leaders Group. This means that as far as the Leadership indicators were concerned the two groups could be considered as belonging to the same population, Table 4. Table 4. T-Test Results of Leadership Mean Scores of the Others Group and the Leaders Group Variables Others Leaders t-test Significance. Leadership 3. 805 4. 186 -1. 68 p=0. 10n. s. n. s. = not significant (accept hypothesis: mean scores of others = leaders) * significant at 1% level (reject null hypothesis) This implied that although the respondents belonged to different echelons in the organization studied, as far as the Leadership, Item 1, measures are concerned; the Junior Officers and the Senior Officers perform at the same level. B. 2. Strategic Planning, Item 2: The t-test showed there was no significant difference between mean scores of the two groups suggesting uniformity in perception as far as the indicators of strategic planning were concerned, Table 5. Table 5. T-Test Results of Strategic Planning Mean Scores of the Others Group and the Leaders Group Variables Others Leaders t-test Significance Strategic Planning 3. 852 4. 19 -1. 13 p=0. 265n. s. n. s. = not significant (accept hypothesis: mean scores of others = leaders) * significant at 1% level (reject null hypothesis) B. 3. Customer and Market Focus, Item 3: The t-test on comparing the mean scores of the Others Group and the Leaders Group showed a significant difference between the two groups with the Leaders Group considerably had higher mean score, Table 6. Table 6. T-Test Results of Customer and Market Focus Mean Scores of the Others Group and the Leaders Group Variables Others Leaders t-test Significance Customer and Market Focus 2. 708 3. 143 -2. 09 p=0. 043 * n. s. = not significant (accept hypothesis: mean scores of others = leaders) * significant at 1% level (reject null hypothesis) B. 4. Measurement, Analyses and Knowledge Management, Item 4: There is no significant difference between the Measurement, Analyses, and Knowledge Management mean scores of the Others Group and the Leaders Group, Table 7. Table 7. T-Test Results of Measurement, Analyses, and Knowledge Management Mean Scores of the Others Group and the Leaders Group Variables Others Leaders t-test Significance Measurement, Analyses, and Knowledge Management 3. 795 3. 531 0. 64 p=0. 527n. s. n. s. = not significant (accept hypothesis: mean scores of others = leaders) * significant at 1% level (reject null hypothesis) B. 5. Human Resource Focus, Item 5: There is no significant difference between the Human Resource Focus mean scores of the Others Group and the Leaders Group, Table 8. Table 8. T-Test Results of Human Resource Focus Mean Scores of the Others Group and the Leaders Group Variables Others Leaders t-test Significance Human Resource Focus 3. 217 3. 35 -0. 55 p=0. 587n. s. n. s. = not significant (accept hypothesis: mean scores of others = leaders) * significant at 1% level (reject null hypothesis) B. 6. Process Management, Item 6: There is no significant difference between the Process Management mean scores of the Others Group and the Leaders Group. Table 9. T-Test Results of Process Management Mean Scores of the Others Group and the Leaders Group Variables Others Leaders t-test Significance. Process Management 3. 772 3. 819 -0. 24 p=0. 813n. s. n. s. = not significant (accept hypothesis: mean scores of others = leaders) * significant at 1% level (reject null hypothesis) B. 7. Business Results, Item 7: There is significant difference between the Business Results mean scores of the Others Group and the Leaders Group. The Others and the Leaders Group differed in their responses for Business Results. The Leaders Group had higher responses for these types of questions, Table 10. Table 10. T-Test Results of Business Results Mean Scores of the Others Group and the Leaders Group. Variables Others Leaders t-test Significance Business Results 2. 245 2. 926 -2. 23 p=0. 031* n. s. = not significant (accept hypothesis: mean scores of others = leaders) * significant at 1% level (reject null hypothesis) B. 8. Implications of the t-test Results The t-test conducted revealed significant difference between the two groups on two items, namely Customer and Market Focus, Item 3 and Business Results, Item 7. According to the Baldrige Criteria, the Customer and Market Focus Category, Item 3, â€Å"examines how the organization determines requirements, needs, expectations, and preferences of customers and markets. Also examined is how the organization builds relationships with customers and determines the Key Factors that lead to customer acquisition and satisfaction, loyalty and retention, and to business expansion and sustainability. † We take note that this concern is a concern essentially external to the organization but defines the rationale or importance of the organization to the bigger society through which the organization was dedicated in serving. In the military service, the â€Å"customer and market† are presumably not only the men and women in the service but the public at large and all its agencies. It could be expected that the top echelon of the military leadership surveyed in the study were concerned not only with how the organization works but whether the expectations of its function to serve the public at large were being met. Another item which showed significant difference with the Leaders Group scoring higher than the Others Groups is Business Results, Item 7. Based from the Baldrige indicators, this item is customer-oriented and measures performance geared at satisfying the â€Å"customer† as well as performance in the â€Å"marketplace†. In other words, this item is concerned with results which would accomplish the mandate or mission of the organization. Again, we take note that this item is external to the organization which leads us to a possible explanation for such a result. The differences between the two groups suggested that there was a sort of a transformation in perception of officers as they go up in the hierarchy. This support the earlier observation that positions in the organization may have its own requirements given its functions which shape the perception or point of view of those occupying such positions. C. Excerpt from the Correlation Matrix for the Leaders Group To further probe into the nature of the difference of point of views or priorities between the two groups, cross-correlation between the items were conducted on the Leader Group. The results revealed a negative or inverse correlation between Strategic Planning, Item 2, and Customer Market Focus, Item 3; whereas, a positive correlation between Strategic Planning, Item 2 and Process Management, Item 6, Table 11. Table 11. Excerpt from the Correlation Matrix for Leaders Strategic Planning Item 2. Customer and Market Focus, Item 3 -0. 811 0. 027 Process Management, Item 6 0. 955 0. 001 Cell Contents: Pearson correlation p-Value These results further showed us some trends which were not shown in the cross correlation test conducted for the Others Group. That is, for leaders in key positions, the concern is satisfying the goals and achieving the results and the details like strategy become a lesser concern. Arguably, the top echelon of the military leadership has the whole organization working under its wings which would deliver and perform. Specifics, then have to be largely delegated to the Junior Officers. The positive correlation between strategy and process management suggested that top leadership in the case of the respondents surveyed in this study, likewise did not bother much with the details of certain processes possibly as in the case of strategy relegating the meticulous tasks to Junior Officers. Again, this supported the previous trend of position based perspectives suggesting opposing point views may be due to position occupied.

Thursday, November 14, 2019

Identifying and Planning Resources Needed to Meet Management Goals Essa

Resources are an integral component of any successful organisation and a method of informing demand could be classified using a push or pull system. A push system would create a demand for its resource where as a pull system would create resources as a result of a demand, an example of a push system may be a car manufacturer creating a number of cars to a waiting list, where sales would influence the demand the product and resource needed as opposed to a pull system that would see sales driven by the amount of cars produced. The resource that can be identified in the organisation of this researcher, which is notably a further education learning establishment, can be described as a pull system where the curriculum offer is developed according to the number of learners interested and the demand of the local community. (Bailey P. et al, Procurement Principles and Management) Resources are integral to the performance of the organisation and although can be said to differ from other business areas such a manufacturing company; however the resources can be deemed equally essential. The objectives can be identified as providing a high level of education and service to the surrounding community and stakeholders; this can be achieved by utilising resources to their optimum potential. The resources of an FE college can be identified in the following categories of physical resources, labour resources and facilities. Physical resources are usually classed as materials, certainly in a manufacturing and would be categorised as raw, work in progress (WIP) or finished, however in a learning environment such as a college, physical resources would be classed as the materials needed dependant on the nature of course qualifications, this could inclu... ...the organisation would seek to identify potential disruption to supply, define a possible alternative solution and assess any further costs involved in seeking an alternative. In an organisation such as a college, a ‘Boston grid’ which is a method of determining a risk may be used to compare risk scores when seeking a new supplier or even used when looking to define new curriculum areas. A Boston grid is an analytical tool that can be used to define growth areas, curriculum development and project management. Works Cited Bailey P. et al, Procurement Principles and Management, 2008 Carter RJ. and Kirby SK. Practical Procurement, Cambridge Academic, 2006 Drucker. P. 2003. The Practice of Mangement, Oxford. Evans, D. 1995. Supervisory Management, Cassell, London. Gennard. J. & Judge. G. 2005, Chartered Institute and Development, London

Tuesday, November 12, 2019

Environmental Revolution

The Next Step Broad Social Change Through Personal Commitment Introduction In the last thirty years, America has witnessed an environmental revolution. New laws like the 1963 Clean Air Act and the 1974 Safe Drinking Water Act forged new ground in political environmentalism. Social phenomena like Earth Day, organized by Dennis Hayes in 1970, and the beginning of large-scale recycling, marked by Oregon's 1972 Bottle Bill, have help change the way Americans think about the environment. As we approach the third millennium, however, we must reconsider our place on the planet and reflect on our efforts and progress towards a sustainable society. As global warming becomes a scientific reality, natural disasters make monthly appearances in the headlines, and communities continue to find their ground-water contaminated by industrial and nuclear waste, we must ask ourselves: are we doing enough? The environmental movement in the past has largely been a social and political phenomenon. While many of us recycle (yet still only 35 percent of us) and take dead batteries to our town's Hazardous Waste Day, most Americans have not made the environment a personal issue. Very few of us have taken the kind of personal life-changing steps that are necessary to create an environmentally sustainable society. It is simply naive to believe that America's present rates of consumption, waste production, and environmental contamination are sustainable. The kind of social change required can only happen when we as individuals embrace the effort in our everyday lives. Only then will corporate America and the government realize that they too must change to maintain their customer base and public support. This kind of personal commitment to change would also create a new social ethic based on the environment under which people and companies who do not care for the earth would be held socially and financially responsible. In six parts, this article will re-examine our place in the environmental movement and investigate exactly what changes we can make in our personal lives to bring about positive change. These areas are transportation, energy, recycling and waste management, toxins and pollution, food, and water. Some of the changes discussed will require sacrifice. But, more important, these changes will often simplify our lives, bring our families and communities closer together, and help us to better understand, revere, and coexist with the world upon which each of us is directly dependent. Transportation The invention of the automobile is one of history's greatest environmental disasters. The automobile decentralized our society. People with cars moved out of the city and drove to work from their suburban homes. Before the automobile, agriculture was local. Food was grown by farmers living in what was soon to be the suburbs, and delivered fresh to markets in the cities. Because of the short distance food had to travel, farmers didn't need to add preservatives or other additives to maintain freshness. Clearly, the automobile, like other harmful inventions, makes our lives easier in many ways, but how often do we consider the environment when weighing these benefits? Fossil fuels account for the automobile's most significant effect on the environment. Not only are the emissions from cars and trucks toxic to every air-breathing organism, but every step of the fossil fuel process, from extraction to disposal, is bad for the environment. According to the U. S. Environmental Protection Agency (EPA), millions of gallons of untreated water contaminated by the drilling processes are dumped into waterways and oceans annually. Once extracted, fossil fuels are frequently refined on site, burying 179 million tons of toxic waste annually. During transport, an average of 1 million gallons of oil is spilled into the ocean each month. Upon arrival, fossil fuels are usually burned in automobiles or power plants. The average coal-burning power plant burns about 10,000 tons of coal in a single day. With even a low estimate of five per cent waste, that leaves 500 tons of toxic waste produced each day by a single power plant. If used in cars, oil must be refined further, wasting more energy and creating more toxic waste before drivers purchase it. The combustion engines used in cars and trucks emit toxic gases that contribute to the greenhouse effect and acid rain, deplete the ozone layer, and create more than 50% of the smog producing toxins that city-dwellers breathe every day. Even if we disregard the environmental damage caused by fossil fuels, we should recognize that, as a non-renewable energy source, the earth's reserves will eventually run out. Hundreds of millions of years of organic decomposition will be wiped out in a single century. Conservative estimates say we have 30 to 50 years left of oil use. With more and more developing nations rapidly increasing their use of fossil fuels, and the continuing growth rate of fossil fuel use at four times the population growth, our time with fossil fuels could be significantly less. Just imagine the economic and political upheaval a major oil shortage would cause. Simply put, the country that depends on fossil fuels the least will be the most likely to survive the economic strife and wars resulting from global depletion. Fossil fuel consumption is deeply entrenched in the American mode of life. We rely on automobiles for almost all of our transportation needs, enjoy motor boats and jet skis on our vacations, and use gas-burning engines in most of the tools we use in the yard. (Although electricity is another major consumer source of fossil fuel consumption, that will be discussed in the Energy section. Yet we can make numerous changes in our lifestyle that will significantly decrease our personal consumption of fossil fuels. Let's return to America's biggest weakness: the automobile. Simply not driving is the best and most obvious solution to the problem of automobiles. Americans have gotten used to their cars and seldom walk or bicycle even short distances. Gym class became a federal requirement in the 1930s because students were being driven or riding busses to school instead of walking. Americans have also become significantly more overweight since we started driving. Consider your Saturday errands around town. Most errands we make are to destinations less than a few miles away and frequently involve dropping off or picking up something small. These kinds of errands can just as easily be accomplished by walking or bicycling. Your body will thank you, and so will the environment. Public transport, if available, is also a great way to stay out of the car. Consider an area's public transportation system in choosing a place to live, as some cities have significantly better systems than others. When your destination is too far to walk or bicycle, there are still numerous ways to minimize the use of automobiles. If you drive to work, find other people at your company or other companies near you that live in your town and start a carpool. Even carpooling once in a while makes a difference, so don't get discouraged by occasional scheduling conflicts or other obstacles. When running errands, plan ahead to consolidate them into one trip and consider the most efficient route. If possible, park in a central location and walk to multiple destinations. Ask a neighbor or friend if they need to go out (everybody has to go to the grocery store, for example), and share a ride. For every ride you share, the fuel consumption and emissions for that trip are cut in half. There are also many ways that your driving habits effect the fuel efficiency of your car. Try to avoid fast accelerations, for instance. They use significantly more fuel than gradual accelerations. Likewise, avoid driving at excessive speeds. Every car engine has an RPM (revolutions per minute) at which optimal fuel economy is achieved; you'll find it in your car's manual. Check your tachometer and try to maintain that RPM while driving. Minimizing the work-load on your car is another way to increase fuel economy. Remove any unnecessary heavy objects from the car, and avoid using the air conditioner when possible. Finally, turn off your engine if you expect to be idle for even a short while. Starting a modern fuel-injected car uses less gas than idling for 30 seconds. Did you know that warming up your car by letting it idle in the driveway in cold weather actually causes engine damage? This is also when your car's emissions are at their worst. The best and fastest way to heat up a car is by driving it. When it's time to buy a new car, there are many ecological alternatives to the gas guzzling beasts typically driven by Americans. Many compact cars on the market today achieve stunning fuel economy. The four-wheel-drive trucks so popular in today's market get comparatively bad gas mileage and usually carry one person over a paved road. Buy the smallest car you can, and don't buy a larger car for infrequent needs-consider buying a used trailer for infrequent cargo hauls. If you've been putting off the purchase of a motorcycle as whimsical, think again. Many motorcycles (and scooters in particular) achieve significantly better fuel economy compared to even the most fuel-efficient cars, resulting in less over-all consumption and emissions. Maintenance is the final step in minimizing the environmental impact of automobiles. Modern cars have very sophisticated emissions systems and engines that must be finely tuned to achieve maximum efficiency. Regular check-ups for your car will protect your investment and ensure the car is in its best possible working order. The longer you keep your car, the more value from it you receive and the less waste is created and energy spent in the production of a new car. If you have to commute to work every day, consider an electric car. Electric cars have come a long way in price, distance and efficiency, and will soon be available from large manufacturers like Ford and Toyota. Several small companies around the country convert small gas powered cars and trucks to electric, zero-emissions vehicles and sell them for slightly more than a gas-powered car. As electric cars become more common and are manufactured on a large scale, their prices will drop significantly. Many hobbyists, with no prior automotive or electrical expertise, have created their own electric cars from their used gas-powered vehicles. Check your local library for one of the many conversion guides available. Today's electric cars take about four hours to charge, plugged into a standard outlet, and can go anywhere from 50 to 200 miles on a single charge. While you wouldn't want to take an electric car across the country (though this has been done), their distance per charge is plenty for a typical commuter to get to work and back. Most electric car owners keep a gas-powered car around for longer trips. Owners of electric cars generally find the increase in their electric bill minimal compared to the amount they save in gasoline. While electric cars create no emissions themselves, and create almost no waste (even the batteries are recyclable), the electric company is still burning fossil fuels to create the electricity needed to charge the car. Nevertheless, electric companies are capable of converting fossil fuels to energy much more efficiently and with fewer emissions than a gas-powered car. Electric cars also leave room for improvement in any method of large-scale energy production, such as biomass, hydro, and solar (see the Energy section). This section has focused primarily on cars, but Americans also use many other gas-powered engines. The small engines in motor boats and lawn equipment do not have to meet the emissions standards of cars, and thus, emit far more toxins into the air. Consider using a quiet, powerless mulching mower on your lawn if you have one, and an electric weed whacker rather than one that is gas powered. If you enjoy the water, consider learning to sail rather than motoring. Motorized water vehicles not only emit air pollution, they also pollute the water, contribute to sound pollution, and injure fish and other animals in the water. Energy in the Home Automobiles are not the only consumers of fossil fuels or sources of air pollution stemming from our personal lives. According to the EPA, furnaces, hot water heaters, and other fossil fuel burning appliances in American homes produce 20% of all U. S. carbon dioxide, 26% of sulfur dioxide, and 15% of nitrogen oxide emissions, the leading causes of acid rain and global warming. Note that these figures do not take into consideration the power our homes draw from fossil fuel-burning power plants. By making our homes as energy-efficient as possible and minimizing our personal use of electricity, we can significantly reduce our personal impact on the environment. The main sources of power consumption in our homes are the heating, ventilation, and air conditioning (HVAC) systems. Maintaining, repairing, or upgrading these systems will not only save us money, but also reduce the amount of energy needed to run our homes on a day-to-day basis. The EPA's Energy Star Homes program brings environmentally aware developers and manufacturers together to build homes that are better insulated and utilize 90% efficiency or better HVAC systems. If you are looking to build a new home, call their toll-free hotline, (888) STAR-YES, for literature, or save paper and visit their Internet site at www. epa. gov for more information. Unfortunately, building new homes is not an environmentally sound thing to do. New homes require previously undeveloped land or disposal of the property's old construction. Further, new wood and materials must be used unless costly measures are taken to restore materials from an old construction. Beyond environmentally unsound, new construction is many times more expensive and time-consuming than renovation and repair of most existing houses. Even if your house is too costly to upgrade, consider buying an already renovated house or one easily renovated before building new construction. A furnace using heating oil, natural gas, or electricity heats most American homes. Still others use a wood or pellet stove. Of these, electricity is by far the least efficient. One truth of energy conservation is that electricity should not be used to produce heat, whether in a stove, water heater, or central heating. The exception to this is the microwave, which is the most efficient way to heat small amounts of food. Edward Harland's book, ECO~RENOVATION: the ecological home improvement guide, an excellent resource for anyone interested in environmental renovations, provides this revealing chart: Fuel Kg of CO2 Emitted per Useful Kilowatt Delivered (approx. ) Gas 0. 7 Oil 0. 5 Coal 0. 40 Electricity 0. 83 As you can see, electricity is more than twice as polluting as a coal burning furnace. Electricity is even worse if you take into consideration the amount of energy created by nuclear power, which creates nuclear waste instead of carbon dioxide (CO2). There is also a significant amount of energy wasted in cooling power plants and lost in the power grid, which further degrades electricity's viability as an environmentally sound energy source. As the chart shows, natural gas, or methane, is the cleanest burning fuel. While most of the natural gas used in America is drawn from non-renewable reserves, it can be produced renewably through biomass production, a method currently used by China. Methane is produced in massive quantities by decaying waste and agricultural operations, so much that methane is one of the most serious greenhouse gasses. If methane could be captured from these sources, we would be slowing the greenhouse effect and using clean-burning renewable fuel at the same time. For these reasons, if you have an aging or inefficient oil burning furnace, consider converting to an efficient natural gas furnace. Wood or pellet stoves still fuel many homes in America. Wood, if used wisely, is a renewable and relatively clean-burning fuel. While burning wood does produce CO and CO2, new technology allows wood stoves to reuse unspent output by re-burning it before emission. Pellet stoves, quickly replacing log-burning stoves, use pressed recycled paper and wood pulp that look like rabbit pellets. Pellets, while more expensive, are more efficient to burn and take up less space during storage. Before investing in a wood stove, however, be sure to investigate which brands are most efficient and emit the least gases and particulate. Also, wood stoves must be used carefully and maintained properly to avoid inefficient operation, excessive emissions, and leakage of carbon monoxide into the home. The best way to minimize the amount of fuel-produced heat your home requires is to insulate it properly. Insulation is the most important factor in the amount of energy required to heat your home. Consider a hypothetical home with 100% perfect insulation. This home would need to be heated only once, and never again. This puts into perspective the idea that we only need to heat our homes as much as heat escapes to the outside. Most houses in America are poorly insulated at best; only one in four houses have insulated walls. Consider the fuel savings if you increased your home's insulation quality by even 20%, which in many cases is a realistic goal. Initially, insulation costs time and money, but it pays for itself quickly in reduced fuel costs and a warmer, more comfortable home. Unfortunately, the finer points of insulating a home are beyond the scope of this article. An excellent resource on maximizing your home's insulation is Home Insulation by Harry Yost. Your local library should have, if not this book, several books on insulation that will at least get you started. Beyond updating your furnace and insulating your home, consider your personal use of heat in the home. The average American household's temperature during the winter is slowly rising because of increasingly sedentary lifestyles and lighter dress. The healthier we eat and the more exercise we get, the more internal heat our bodies will produce. The more above the outside temperature a home is heated, the less efficient its heating system becomes. If we simply wear more clothes, we will need substantially less heat. Wearing sweaters and slippers, eating nutritious food, and getting plenty of exercise are simple but frequently overlooked ways we can reduce our heating energy needs. Next to furnaces and stoves, the air conditioner is the second most energy-hungry appliance in American homes. Unfortunately, air conditioners rely on lots of electricity, the most polluting form of energy available. The use of air conditioners should be avoided at all costs. If you live in a climate with extreme heat, consider your air conditioner and its placement carefully. The EPA has outlined efficiency standards for most household appliances, air conditioners included. Make sure, if you buy an air conditioner, that it has the EPA's Energy Star mark of approval. This does not mean that the air conditioner is good for the environment, but that it uses its electricity efficiently instead of wasting it as many older models do. If you must have an air conditioner, purchase a small, efficient model and place it in a small, closed-off room where you spend most of your time. Make sure this room does not contain any heat-producing appliances like a washing machine or clothes dryer, and that sunlight does not enter through windows. Under these conditions, air conditioning can be relatively efficient and economical. Central air conditioning, on the other hand, is extremely inefficient and usually goes largely unused. Outside of heating and air conditioning, almost all of the energy used in our homes is electricity. Many Americans take electricity for granted, leaving unused lights and appliances on without thinking. A simple awareness in turning things off can greatly reduce our electric bills. Further, choices can be made in the kinds of lights and appliances we use, and whether they need to be used at all. As for lights, there are several high-efficiency bulbs on the market that, for slightly more money than a typical light bulb, can get by on a fraction of the electricity. Fluorescent lights, for instance, are five times more efficient than incandescent (typical) lights. Standard incandescent light bulbs use electricity to heat a filament that glows to create light, whereas fluorescent lights send very rapid and brief charges of electricity through a filament. The days of flickering long tube fluorescent lights are over. According to Edward Harland, new Compact Fluorescent Lights (CFLs) flicker at more than 20,000 cycles per second (compared to 60 in tube lights), are 30% more energy efficient than tube lights, and come on almost instantly. These lights, while more expensive, will significantly reduce your electricity bill and last five to ten times longer than standard light bulbs. Before even turning on the lights, make the best possible use of natural light in your home. Place your reading chair by a sunny window instead of in a corner facing out a window. Consider adding skylights to your home. These can create a surprising amount of natural light during the day, and contribute to your house's heat during the winter. Mirrors strategically placed on walls can also make better use of light and heat from the sun coming in through the windows. Use only what electric lighting is necessary: low-wattage task lights for individual applications instead of high power lights to illuminate a large area. If you must use outdoor lights, consider purchasing a motion detector that will turn the light on and off only when it senses movement. When purchasing appliances, check to see that they are EPA Energy Star approved. These appliances use energy more efficiently than others. Most refrigerators, for instance, have compressors at their base which produce significant heat and cause the refrigerator to work against itself. During fair weather, consider drying clothes on a line outside instead of using a dryer, which inefficiently uses electricity to heat cold wet clothes. Your clothes will last longer, and you'll see the difference in your electric bill. When undressing at night, ask yourself whether your pants can be worn again before washing. Americans, in particular, tend to balk at this sort of a suggestion. Allowing ourselves to think logically beyond social qualms and customs will allow each of our personal environmental movements to transcend many of our unsustainable habits. If you work in an office or at home, chances are your clothes aren't that dirty at the end of the day. You'll be surprised at the decrease in your weekly laundry load. The last big source of energy consumption in our homes is our favorite appliance of all. The average American household television is on 7 hours and 20 minutes per day, and 98% of all households have at least one television. At 170 watts per hour, that comes to 452,965 watt hours (or 453 kilowatt hours) of television use per year in an average household using one 25†³ television. Look at the breakdown of your electricity bill to put this number into perspective. You'll see that America could save a lot of electricity and money by simply turning off the television. Instead, we can read a book, go for a walk or hike, work in a garden, or talk or play a game with our families. Quite simply, the less television we watch, the richer our lives will be, the less we will spend on electricity, and the more we will be doing for the environment. All of the information in this section has focussed on minimizing the use of energy in the home. Imagine if you could use electricity in your home without burning any fossil fuels and without any monthly electric bills. This is not only possible, but a reality for thousands of Americans. With one initial investment in a photovoltaic system (silicon cells that convert the sun's light into electricity), you can end your dependence on polluting power companies and begin a new life of clean energy self-sufficiency. You can get started with a simple photovoltaic setup for a single zone of your home for less than one thousand dollars, or go all out with a top-of-the-line fully self-sufficient photovoltaic power center for about $13,000. If these prices sound high, consider the savings. If your monthly electric bill is $100, a top-of-the-line system that requires only a moderate degree of energy efficiency would be paid for in less than eleven years. And there is a whole spectrum of cheaper systems that can easily power a typical home. For less than four thousand dollars (paying for itself in about 3 years) the Real Goods Trading Corporation sells a system â€Å"designed to handle all the lighting, entertainment, and small kitchen appliances for a modest, energy-conserving household of one to four people in a full-time home. † This description is taken from the Real Goods Solar Living Source Book, 9th Edition. This seven hundred page tome covers everything from taking care of the land to water conservation and every alternative form of energy from solar to hydro to wind. It is a must-have for anyone who wants to live lightly on the earth, and is available at most major book stores and libraries. Recycling and Waste Management There is no environmentally sound method of dealing with the 200 million tons of municipal solid waste produced in America each year. There are many things we can do, however, to minimize, if not eliminate, our personal 4 1/2lb-a-day contribution to that figure. The now ubiquitous threesome, Reduce, Reuse, and Recycle, still defines what we all must do to bring our personal trash production down to a sustainable level. With the media and certain high-positioned nay-sayers claiming that recycling is worse for the environment than it is good for it, and laws making recycling just another stupid rule rather than a social imperative, perhaps a redux of America's trash situation is called for. Households and other residences produce 100 of the 200 million tons of annually produced garbage in the United States. Most of that goes to land-fills, where it is covered up (if not purposefully sealed to prevent leakage) and starved of the oxygen needed for biodegradation. Here is just a taste of some garbage statistics from Geoffrey C. Saign's well-researched book, Green Essentials: More than 1/2 of U. S. landfills have closed in the past 10 years, and nearly 1/2 of the remaining 5,800 landfills do not meet federal or state standards for human health and environmental protection. More landfills are being closed as they fail to meet 1993 and 1994 guidelines and as communities resist allowing new landfills in their area; 22 states will run out of landfill capacity within 10 years or less. The nation's 10 largest cities use a land area for their garbage that is larger than the state of Indiana. And this is just landfills. Incineration is quickly becoming the chosen method of dealing with garbage. Incineration actually concentrates the toxicity of garbage by mixing volatile chemicals at high temperatures and reducing its harmless biomass content. Approximately 1/4 of the ashes produced in a typical incinerator escape into the atmosphere, where they combine with the toxic gases emitted to cause acid rain, smog, and global warming. The remaining ashes are highly toxic and dumped in landfills or stored in toxic waste facilities. A few states mix this ash with pavement, where it will slowly decompose and leach into the ground. The simple fact is that most of this waste could be recycled or composted instead of burned or buried. Green Essentials offers this breakdown of garbage ingredients by weight: Ingredient % by weight Alternative disposal methods available Paper and paperboard 34% Recyclable Yard trimmings 20% Compostable Plastic 9% Recyclable Food waste 9% Compostable Metals 8% Recyclable Glass 7% Recyclable Wood 4% Compostable, can be used as fuel Rubber and leather 3% Recyclable (tires) Textiles 2% Donate Other 4% As this chart displays, 58% (not counting the 3% for rubber and leather) of our garbage is recyclable; 33% of the remainder could be composted. That means that 91% of all the garbage produced in this country (that's about 182 million tons annually) could be kept out of incinerators and landfills. Even a fraction of this ideal estimate would have a profound impact on the environment. Despite the amazing potential for waste reduction that recycling makes possible, The New York Times joined the media's misinformed recycling myth extravaganza in their June 30th, 1996 article, â€Å"Recycling is Garbage. From the beginning, pessimists and special-interest industries have spread incorrect â€Å"myths† about recycling. These claims frequently charge (among other things) that landfill space is abundant and cheap; there is no market for recycled goods; and recycling doesn't pay for itself. Consider the facts on these three points: Landfill space has become a precious commodity in the U. S. , with many states paying to export trash to other states or countries. Recall Geoffrey Saign's statement that â€Å"22 states will run out of landfill capacity within 10 years or less. The market for recycled goods, while fluctuating like any burgeoning market, has increased with the amount of recycled goods available to create a powerful new industry. According to the Environmental Defense Fund, â€Å"U. S. pulp paper manufacturers have voluntarily built or expanded more than 45 recycled paper mills in the 1990's, and are projected to spend more than $10 billion on such facilities by the end of the decade. † To argue that recycling doesn't pay for itself is like arguing that landfills and incinerators don't pay for themselves-of course they don't. Recycling plants, even in the industry's infancy, cost about as much to operate as conventional disposal methods, but are considerably more environmentally sound (costing less when environmental damage and cleanup costs are considered) and reduce pollution from manufacturing and mining for new production. Recycling is an easy thing to do, and good habit to get into as many towns and cities are requiring their citizens to recycle by law or charging by the pound for non-recycled garbage. First, find out what your town recycles by calling your local waste management facility. If your town or city doesn't recycle or recycles only a few materials, consider getting a â€Å"recycling-only† dump permit for a near-by pro-recycling town or city. Next, reorganize your home's main trash area to include receptacles for all the different materials you will recycle. Food containers like tin cans and bottles should be rinsed to keep your recycling receptacles from smelling. You'll be amazed at the decrease in waste the next time you take out the trash. If we make a commitment to recycle our garbage, we must support the effort on the other end by buying recycled goods. Many products' packaging claims â€Å"100% recyclable. † This is good, but keep in mind that it doesn't mean the material is recycled. Look for the percentage of â€Å"post-consumer waste† to tell you if it is and how much of is recycled. Recycled products like paper and cardboard have come a long way in quality and price. Seventh Generation, a producer of a full line of 100% recycled and earth-friendly household products, posts a convincing advertisement on the side of their bathroom tissue packages: If every household in the U. S. eplaced just one 4-pack of 430 sheet virgin fiber bathroom tissues with 100% recycled ones, we could save 1 million trees, 4. 1 million cubic feet of landfill space (equal to 4,618 full garbage trucks), and 427 million gallons of water (a years supply for 12,300 families of four). About 33% of the garbage we produce, like food scraps and yard trimmings, can be composted. Composting is nature's answer to garbage control, converting organic waste back into the soil it came from. While many people compost to create nutrient-rich soil for their garden, you don't have to be a gardener to compost your organic waste. You should cover your compost pile, but not suffocate it. The organic waste needs plenty of oxygen to feed the microbes that decompose the matter. You can build a box for your compost, or buy one pre-made at your local garden shop. Look for an organic gardening book at your library for instructions on building a