Friday, December 27, 2019

French Dialogue Practice Greetings and Introductions

The best way to learn a language is by speaking it. Try practicing this dialogue with a friend, and consider recording yourselves and listening in order to improve your accent. Tip: Note the way the adjective ending differ depending on whether a man or a woman is speaking.   Discussion entre Dominique et Pat Conversation between Dominique and Pat Dominique Bonjour. Hello. Pat Bonjour. Hello. Dominique Comment à §a va ? How's it going? Pat Ça va trà ¨s bien, merci. Et vous ? It's going very well, thank you. And you? Dominique Ça va, merci. Comment vous appelez-vous ? Yes, it's going ok, thank you. What's your name? Pat Je m'appelle Pat, et vous ? Comment vous appelez-vous ? My name is Pat, and you? What is your name? Dominique Je m'appelle Dominique. My name is Dominique. Pat Enchantà ©(e), Dominique. Nice to meet you, Dominique. Dominique Enchantà ©(e), Pat. Nice to meet you, Pat. Pat Et vous venez d'oà ¹, Dominique? And where are you from, Dominique? Dominique Je viens de France. Je suis franà §ais(e). I am from France. I am French. Pat Ah, vous à ªtes franà §ais(e). Je viens des États-Unis. Je suis amà ©ricain(e). Oh, you're French. I am from the United States. I am American. Dominique Ah, vous à ªtes amà ©ricain(e). Vous venez d'oà ¹ exactement ? Oh, you're American. Where are you from exactly? Pat Je viens de Boston. Je suis à ©tudiant(e). I'm from Boston. I am a student. Dominique Ah, vous à ªtes à ©tudiant(e). Moi, je suis professeur, professeur d'anglais. Oh, you're a student. Me, I'm a teacher, an English teacher. Pat Ah, vous à ªtes professeur d'anglais ? Vous parlez anglais ? Oh, you're an English teacher? You speak English? Dominique Oui. Et vous parlez franà §ais ? Yes. And you speak French? Pat Oui. Un petit peu. Yes. a little bit. Dominique OK. Je vais chez moi maintenant. OK. I am going home now. Pat OK. Moi aussi. Au revoir. Bonne journà ©e. OK. Me too. Good-bye. Have a nice day. Dominique Au revoir. Bonne journà ©e. Good-bye. Have a nice day. Dialogue authors: Allen Kalik and Camille ChevalierUsed with permission of Camille Chevalier KarfisAudiobook podcast author at French Today

Thursday, December 19, 2019

Postmodern Art in Andy Warhol´s Silvier Liz as Cleopatra

The earliest forms of art had made it’s mark in history for being an influential and unique representation of various cultures and religions as well as playing a fundamental role in society. However, with the new era of postmodernism, art slowly deviated away from both the religious context it was originally created in, and apart from serving as a ritual function. Walter Benjamin, a German literary critic and philosopher during the 1900’s, strongly believed that the mass production of pieces has freed art from the boundaries of tradition, â€Å"For the first time in world history, mechanical reproduction emancipates the work of art from its parasitical dependance on ritual† (Benjamin 1992). This particular excerpt has a direct correlation with†¦show more content†¦America’s infatuation with labels was a relatively new trend in postmodern society. Andy Warhol’s â€Å"Silver Liz as Cleopatra† as well as his other pieces impacted socie tal views on modern art in relationship to value. Warhol had a strong belief that the loss of something in replicating an image was over powered by something of new value being created. Andy Warhol was specifically intrigued by Elizabeth Taylor which was made obvious due to the fact she had made more than one appearance as the subject for his art pieces. In â€Å"Silver Liz as Cleopatra† the same image of Elizabeth Taylor is presented in monochromatic tones of black and white fifteen times. Warhol has illustrated the actress as dressed in traditional ancient Egyptian costume with her alluring gaze guided away from the audience. Her trademark jet black hair is painted, and her makeup is applied in a dramatic fashion. The overall art piece portrays the actress in snapshots from her movie where she is the lead role thus stressing her fame on the silver screen. Through mass production, Andy Warhol has made Elizabeth Taylor and her role as C leopatra a permanent and important component of art history. â€Å"Silver Liz as Cleopatra† is a fundamental example of merging fine and commercial art. Andy Warhol’s obsession with 1960‘s pop culture allowed him the means to appeal to

Wednesday, December 11, 2019

Remote Control Software Essay Example For Students

Remote Control Software Essay Remote Control Software Used in a Local Area NetworkA Project Submitted to Fulfill the Requirements of CIS 5376 LAN IAt Tarleton State University System Center Central TexasRemote control software packages consist of tools for network administrators, helpdesk support personnel and end users. These packages let one PC (guest) connect to and remotely control another PC (host). Remote control software installs on both guest and host PCs. Guests can remotely control a hosts desktop, run programs, transfer files and redirect printing. For helpdesk staffers, we evaluated the robustness of the remote control features and the ability to chat with end users. For network administrators, who use remote control software to connect with NT servers and to troubleshoot problems without visiting the server room, we paid particularly close attention to security features. We compared CrossTec Corp.s NetOp Remote Control, Funk Softwares Proxy 3.02, LapLink.coms LapLink 2000, Stac Softwares ReachOut Ent erprise 8.42, Symantec Corp.s pcAnywhere and Netopias Timbuktu Pro 32. Our choice for the best remote control software went to NetOp for its ease of installation and full-featured configuration tools. Although the other products were also easy to install and configure, NetOps configuration wizards facilitated communication links, provided minimum levels of security, and established full-featured remote control sessions with a double click of the mouse. In addition, NetOp provided the most control over hosts and guests in a networked environment. pcAnywhere with LapLink provided the highest number of communication links between two PCs ranging from direct ports to Internet. LapLink 2000 won top honors in file transfer and NetOp edged out the competition in transferring screen displays and keyboard/ mouse controls. Funks Proxy had the best network installation routine. Cross Tec Corps NetOp for Windows version 6.58Funk Softwares Proxy version 3.0212Stac Softwares ReachOut Enterprise v ersion 8.4218Symantecs PcAnywhere version 1021Remote Control Software Used in a Local Area NetworkRemote control software can solve many of the problems that an administrator or user can encounter on a local area network. Using a remote-control program, one can access a PC remotely to exchange files between systems, run applications, take control of a client PC or server in order to troubleshoot a problem, and much more. Remote-control software is an application that you install on two PCs that permits one system (the guest) to connect with and control another (the host). Once youre connected, you can do just about anything as if you were sitting at the host PC. In addition, remote-control software lets you transfer files between PCs faster and more efficiently. The latest remote-control programs support a myriad of connection types including Internet connections, which are becoming increasingly important. The key advantage to Internet connections is that they let mobile users connect to a PC or server anywhere on the globe via an inexpensive local telephone call. So no matter where you are, you can always stay in touch. This paper is an effort to shed some light on six of the remote control software programs that are on the market today. We do not intend to be an expert source of information on remote control software. The goal is to present the information in a useful manner. Furthermore, it will attempt to address questions inherent to the capabilities of the software. For with the capabilities that this software possess comes a myriad of ethical and professional dilemmas. Our problem was to find six of the leading remote control software brands and discover as much as we could about their capabilities and limitations. We intended to compare the software and indicate which one we believed to be the best. A specific area of interest was with the problems that might arise from the capability to monitor workers activities and any features that the software may have to discourage clandestine activities. Find six of the leading remote control software packagesResearch the literature to find and present as much as possible about each software packages limitations and strengths. Compare the software packages and make an arbitrary decision as to which is the most capable. Identify and present the problems that may arise from having the capability to monitor workstation activities anywhere on the net. Most users associate remote-control software with telecommuting or day extending. Telecommuters typically use remote-control software to connect to an office PC over an analog phone line to exchange files and access productivity applications. However, there are many other uses for remote-control technology. For example, in a corporate setting, a help desk administrator can take over a client PC and show a worker how to accomplish a task or fix a problem. Network administrators use remote-control software to connect with a server or a workstation and troubleshoot a problem without making the long trek to the server room or the workstations location. . Furthermore, many major computer vendors put remote-control software on their PCs so that they can provide customer support remotely. The projects intent was to take all of these applications into account. In fact, during the research conducted, the authors determined that there are four basic roles of remote-control software. The Four Roles of Remote-Control SoftwareRemote-control software lets help-desk administrators troubleshoot problems without having to run throughout the building. Help-desk administrators look for strong remote-control performanceplus features such as tools for pushing the host software down to client PCs for easy installation, and the ability to launch the host module remotely. By using remote-control software, system administrators no longer need to be chained to their desks. A system administrator can monitor servers and correct problems at any time of the day from any location. One of the key features is the ability to monitor multiple hosts. Connecting over the Internet or dialing in to a company network, a telecommuter can take over a host system (usually, a desktop PC), as though sitting at a desk. Key features for these users include easy modem configuration, fast file transfers, wizards for scheduling unattended synchronization routines, and printer redirection. Many PC vendors such as Compaq and IBM bundle remote-control software with their products. If a customer encounters a problem, a support technician can take over the system and resolve the problem without having to ship the PC back and forth. Key features for these users include voice chat over data. All of the methods utilized in this research were arbitrary in nature. Furthermore, the authors tested none of the software. In a few cases, we made comparisons between software capabilities using the conclusions of third party research findings. The authors site any cases where comparisons come from outside sources. Selection of the vendor for evaluation was an arbitrary decision. We made the decision based on the authors knowledge of the vendor or the availability of information about the software. The six vendors that we chose to compare were:1.Cross Tec Corps NetOp for Windows version 6.5 2.Funk Softwares Proxy version 3.024.Stac Softwares ReachOutEnterprise version 8.425.Symantecs PcAnywhere version 10Three of the characteristics included in our comparisons, Platforms and Protocols Supported, Use as a Diagnostic Tool, and Security came from the requirements of the project. We selected the rest based on the authors perceptions of what the important areas for this type of software should be. 1.Platforms and Protocols Supported Network systems and protocols that the software supports. 2.Installation and Resources Required The installation of the program has to be simple and do most of the work for the installer. When similar operating systems are involved (Windows 9x, Windows NT), having the same installation procedure is a plus. We included the disk space and RAM space needed by the software in this characteristic. 3 Fatal familial insomnia EssayThe connection icon editor lets you create and edit ReachOut connection icons without running ReachOut itself. This is useful if you want to create icons to distribute with the ReachOut Setup program. A phone book conversion utility lets you update phone books (or connection icons) from earlier versions of ReachOut to the new connection icon format. You can convert from ReachOut from NT, ReachOut for 95, ReachOut for Windows DOS. The ReachOut FTP tools are standard FTP utilities that let you transfer files over the Internet. These programs are not part of a regular ReachOut installation but are included as separate item s on the CD-ROM. You can use them to copy files to or from any Internet site, even if ReachOut is not installed at the other end. ReachOut Enterprise 8.42 costs about $169. http://support.stac.com/technote/ROE/default.asp pcAnywheres installation wizard takes you through an effortless install that provides both guest and host functions in one package. The wizard recognized and utilized all Windows components. We were pleasantly surprised to find a live update utility at the end of the installation that offered to obtain the latest changes to pcAnywhere. The utility found our underlying network connection, accessed pcAnywheres FTP site, and refreshed our installation with updated files. However, it did not inform us of changes to our base installation taking up more than 30.8 MB. Administrators wont be cringing when it comes time to roll out this product on the network either. pcAnywhere has a custom-configuration utility for network installations. You simply pop in the corporate CD, which gives you a graphical utility to select and manage host and guest options for installationseven silent installations. This utility eliminates the need to master a script file for automatic installations. Both NetOp and ReachOut Enterprise require script files for automatic installations. With pcAnywhere, installing multiple users almost as easy as installing one user. o133MHz Pentium or higher processoro30 MB of available hard disk spaceWindows Millennium Edition and Windows NT4/98/95oPentium or higher processor150MHz (Pentium or higher processor for ME)o30 MB of available hard disk spaceConnect to a remote host PC and its desktop appears in a window on your remote PC. From there, you can launch applications and open files on the host PC just as if you were sitting in front of the computer itself. One of its best features its crisp, clutter free interface. Its four large toolbar icons let you designate your office PC as the host, so you can connect to it remotely or connect with and control another computer. These icons also let you set access options and (for Windows NT/2000 users only) build installation packages that add PcAnywhere to other systems. Although the default connection items allow for remote control sessions and add a minimum level of security, pcAnywhere really shines in the array of configuration tasks available from the Tools menu. A user-defined computer name can replace the default Windows computer name. The default video mode can be adjusted, color scale can be set from two to 16,797,216 colors, and cache file size can be manipulated. In addition, one can allow connections to multiple hosts and optimize the desktop for remote control using discreet selections. You solve user problems directly by remotely controlling their systems. OLE, automation allows VARs to integrate PcAnywhere functionality into custom solutions. Both IT groups and VARs will benefit from the new PcAnywhere Packager utility, which lets you produce customized installation sets to decrease installation size and enforce corporate security and access policies. One pcAnywhere has is that no longer has the integrated virus checking such as for instance, DOS and Windows 3.1. Therefore, if those operating systems are used, one should use the previous version, 9.2. Once pcAnywhere installs, a graphical utility an administrator can enforce network policies, distribute, and maintain applications. Note that the host administrator requires Microsoft Internet Explorer 4.01 or later. Windows integration is a good thing, but it should not be a constraint. Symantec should add other browsers to support host administration in the enterprise. You can link host and remote PCs within your organization over whatever connection you wish, including LAN, VPN, and dial-up, through a special code that prevents hackers from using other copies PcAnywhere to gain access. pcAnywhere also provides a mechanism for hosts to search LDAP directories for connection information. This functionality utilizes a Netscape Directory Server 4.0 or Novell NetWare 5x LDAP modules. PcAnywheres greatest downfall is that it still does not let you password-protect individual folders or files. You can limit access only by drivean all-or-nothing deal. Other than this minor glitch, the software gets rave reviews for security performance. It offers more security features than any other remote control application, outdoing itself in previous versions. Mandatory passwords stop unauthorized users from accessing a PcAnywhere host, and authentication options now consist of FTP, HTTP, HTTPS, generic LDAP, ADS, NDS, Novell Bindery, and NT domains. You can use these new authentication options to verify the identity of the remote caller via Windows 2000s Active Directory, HTTPS, and Novell Directory Services. By doing that, it allows companies the option of choosing what method best suits its network setup. In addition, for additional protection, PcAnywhere creates a log of every file accessed, every application launched, and all of its own activities. PcAnywhere 10.0 includes an optimization wizard to help you accelerate user sessions. It suggests various ways that performance can be improved, such as reducing the number of colors on the hosts screen or removing active desktops, screen savers, and wallpaper. Surprisingly simple changes such as these can dramatically increase the speed of your remote control sessions. If fast downloading is of primary importance, this software finds, downloads, and uploads the files rapidly. The Goto, Tag, and directory history features let you quickly navigate directories on both machines. SpeedSend technology expedites file transfers by only sending the sections that have changed since the last time someone transferred the file. In addition, improved AutoTransfer technology makes it a breeze to transfer and synchronize files automatically. Its easier to move multiple files with PcAnywheres file-transfer utility than with the Windows Explorer because it provides a history of recently accessed directories in a small, drop-down menu under the toolbar. One click on any of the folders in the list immediately brings up that directory in the file-transfer window so that you can easily move files to another directory from your remote desktop to the remote PC. Through Netopias patented technologies, Timbuktu Pro is the only remote control software that supports inter-connectivity between Windows NT 4.0,Windows 9x,Windows 2000,and Mac OS. High Speed Communication: Timbuktu Pro 2000 works over Internet, LAN, WAN, dial up, DSL or RAS connections. Incorporating new remote control advancements Timbuktu Pro 2000 is supposed to be faster than ever. Timbuktu has an automated network installation that can be complicated by using scripts to refine installed features. Timbuktu requires:o20 MB hard disk space available for Win 9xo50 MB hard disk space available for Win NT/2000Computer support personnel who currently must run all over the building to correct problems can sit in one location, and either observe the end-user demonstrating the problem or take control of the end-users computer, correcting the problem remotely. You can add or delete missing or extraneous files from other computers without FTP, AppleShare, or File Sharing. Simultaneous multiple networking protocols are supported, so Macs on LocalTalk, NT servers on TCP/IP, and Windows 95 stations on Novell networks can all connect, observe, or control each other. With Timbuktu Pro 2000, you can now take advantage of new communication features such as voice over IP and a new chat feature, which will allow for high-speed text based communication for those of us without sound cards and speakers on our workstations. Unlike many of the other RC applications available for Windows only, Timbuktu Pro allows you to control an office PC from your home Mac or PC, and allows you to control a remote NT server as well. Through Netopias patented V-wedge and IntelliScreen technology, Timbuktu Pro is the only remote control software that supports inter-connectivity between Windows NT 4.0 3.51, Windows 2000, Windows 9x and 3.x, and Mac OS. Timbuktu Pros remote control technology is device independent and does not replace video drivers or load TSRs. This results in a higher performing, more stable, and less intrusive remote control solution. Timbuktu Pro now integrates directly with Windows NT security allowing administrators to leverage the security already deployed within their environment. Timbuktu Pro also provides separate user defined and administrator defined options to virtually guarantee the integrity of the enterprise Intranet. Timbuktu Pros ironclad security provides state-of the-art secure screen blanking, password encryption, user level defined privileges, password ageing, event logging, master password protection, and more. The attended access feature prompts users to ask for permission before attempting to control your computer or admission as a temporary guest. Timbuktu Pro 2000 integrates with NT Security lists to help ease password management and administration. NT 3.51 and NT 4.0 systems can employ secure screen blanking. This feature freezes the screen on the host system with the display of a Workstation Locked or Begin Login dialog box. No one can look at the screen of your server or workstation while you are away. In addition, if your dial-up connection to the server is severed, Timbuktu Pro automatically locks the NT system to prevent unauthorized access. With Timbuktu Pro 2000 you can access the hard drive of any remote machine and transfer to or from it. If you cannot find the file, let Timbuktu Pro 2000 find it for you with its file find feature built right into Timbuktu Pros exchange. Webmasters can directly control their Macintosh or NT web server from their office or home computer. Edit web pages on your computer at home or work and use Timbuktu Pros file transferring to put the new or edited pages in place. Checking the web server logs from home is simple, and setting up new users and other server maintenance chores can be performed from your home, office, or while youre on the road at a web conference. People who use desktop AFS and web authoring software on their PCs can extend this functionality to their home computer (i.e., by writing the web pages on the home machine and using Timbuktu Pros file transfer software to place the pages on your AFS-based network drive on the office computer.)Road warriors can connect to their office desktop systems for file retrieval, presentation creation, and working with colleagues on collaborative projects. Checking client/server databases from the road or checking LAN-based or protected e-mail is quick and easy from your l aptop. Timbuktu facilitates printing reports on the office laser printer from the road. FlashNotes pop-up messages can get your notes on your colleagues screens immediately, when waiting for them to check their e-mail will not do. You can send files to users without tying up the e-mail server at the office. http://www.netopia.com/software/products/tb2/enterprise/ NetOp scored well in this area. It supports all platforms except Macintosh or Windows Me. Funks Proxy software was deficient in the protocols and platforms supported. It would not operate on Macintosh, DOS or OS2 platform. As with NetOp, Laplink would not work on Macintosh platform but unlike NetOp it did work with Windows Me. ReachOut does not support OS2 or Macintosh platforms. PcAnywhere does not support the OS2 or Macintosh platforms. Timbuktu Pro is the only remote control software that supports inter-connectivity between Windows NT 4.0,Windows 9x,Windows 2000,Windows Me, OS2, and Mac OS. NetOp had one of the highest grades in this area for its capabilities to start operations without rebooting and the read me file that showed all installed files. In addition, you can install NetOp programs on targeted remote computers. Laplink is the only product that does not have an automated network installation. ReachOut conducts an automated network installation and there is a small memory footprint. PcAnywhere installation is quiet simple. It has an automated network install. The Only problem is that it uses too much memory space. Timbuktu has a automated network installation that can be complicated by using scripts to refine installed features. NetOps Help Desk feature, the ability to conduct audio and video chats, scripting utility and the file transfer interface, make NetOp the best in this area. Proxy seemed to have a good array of diagnostic tools but file transfer was slow and problems in deletion of files caused low score. Although Laplink is, slow in transferring screen displays and keyboard and mouse controls the software has very useful diagnostic capabilities. One of these is the ability to log all transactions. ReachOut offers a host of tools to make diagnostic activities easier and more effective. These include: simultaneous chat with remote operator, the zero admin host service, and remote control through a web browser to name a few. If there were not problems with the file transfer capabilities, it would have rated tops in this area. PcAnywhere really shines in the array of configuration tasks available and OLE, automation allows VARs to integrate PcAnywhere functionality into custom solutions. These factors and others combine to put pcAnywhere in a tie with NetOp for first in this area. Timbuktu has features similar to NetOp. By itself, NetOp has very good capabilities for interoperability. However, the Gateway module interacts with NetOp to provide an extremely high level of network interoperability. The only trouble is that it is a different program. In this category Proxy did not do well. It has no capabilities for working out of the windows environment. On top of this, the software has no enterprise wide user administration capabilities. Laplinks Link to Net and Internet Directory options help the interoperability scores. But the inability to perform NT network integration detracts from the score. ReachOut does well in this category but we think it fails to completely live up to its name Enterprise. With automated network installation, remote control through web browsers, NT network integration it is still a formidable tool. Use pcAnywhere in a variety of network and enterprise situations. It integrates well with NT and Timbuktu does extremely well in this area also. High speed connect ability, and the ability to deal with every type platform makes it the choice for this area. NetOp has some very good features. The ability to allow guests to have a default set of privileges or users receive individual privileges. Its only major drawback include the inability to centralize security and authentication administrationSecurity for Proxy seems to be adequate. We saw problems with the host having the capabilities to deny permission for the guest to take over the host. Laplinks security is adequate but not as extensive as the NetOp features. ReachOut has some of the same security features that pcAnywhere has but does not quite match its level of security. PcAnywheres greatest downfall is that it still does not let you password-protect individual folders or files. Even considering this it still outshines the competition in this area. NetOp has a full array of services that makes it one of the leading competitors in this area. We especially like the guest tool bar and the marker function. Proxy services are adequate but still do not compare with the other software. Laplink has a good amount of services but does not compare to NetOp. ReachOut had an impressive amount of services and came in second in this category. PcAnywheres has a full menu of services. It ties for second place in this area. Timbuktu has an impressive list of services also, but they seem to be geared to a remote user having access to the home offices services. In the area of costs the software packages ranged from $130 to $175 dollars with Laplink being the cheapest. When you take into account the price per seat costs, you get quite a different story. Table 1Costs of Software and LicensesOverall, our testing of remote control software revealed a field of well-matched players. The order in which they finished was:2.ReachOut and Timbuktu tied for 2d place with 60 points each 3.pcAnywhere came in 3d with 60 points5.Laplink brought up the rear with a total of 53 points. When we have the capabilities to monitor the activities of anyone on a network, the first problem that most American people think of is invasion of privacy. Morris, John. 1998. Remote control software: You cant get there from here. PC Magazine, 1 September, 58-70. Doherty, Sean. 2000. Remote Control Saves Steps. Network Computing PC Magazine Labs Report. Teleworking ReachOut Enterprise 8. http://www.zdnet.co.uk/pcmag/supp/2000/teleworking/49.htmlReachout Enterprise. Users Guide Supplement Version 8.42. http://www.zdnet.com/pcmag/features/remotecontrol/rev7.html Kawamoto, Wayne. New! Software.Stac ReachOut 7 vs. MicrocomCarbon Copy 32. http://www.zdnet.com/pccomp/sneakpeeks/snpk0697/remote.htmlBibliography:BibliographyMorris, John. 1998. Remote control software: You cant get there from here. PC Magazine, 1 September, 58-70. Doherty, Sean. 2000. Remote Control Saves Steps. Network Computing Magazine, 7 February, 35-48PC Magazine Labs Report. Teleworking ReachOut Enterprise 8. http://www.zdnet.co.uk/pcmag/supp/2000/teleworking/49.htmlReachout Enterprise. Users Guide Supplement Version 8.42. http://www.zdnet.com/pcmag/features/remotecontrol/rev7.html Kawamoto, Wayne. New! Software.Stac ReachOut 7 vs. MicrocomCarbon Copy 32. http://www.zdnet.com/pccomp/sneakpeeks/snpk0697/remote.html

Tuesday, December 3, 2019

The Lady Of The Lake By Sir Walter Scott (1771 - 1832) Essays

The Lady of the Lake by Sir Walter Scott (1771 - 1832) The Lady of the Lake by Sir Walter Scott (1771 - 1832) Type of Work: Romantic metrical poem Setting Sixteenth-century Scotland Principal Characters James Douglas, outlawed uncle of the Earl of Angus Ellen Douglas, his daughter (The Lady of the Lake) Roderick Dhu, a rebel Highland chief of Clan Alpine, and protector of the Douglas's Allan-bane, the Douglas' minstrel and devoted servant James Fitz-James, a Saxon Lowlander Knight Malcolm Graeme, Ellen's young love Story Overveiw James Fitz-James, a Saxon knight from Stirling Castle, became lost as he hunted in the Highlands. Sounding his horn, he was rescued - not by his comrades, but by Ellen Douglas, who, with her father, lived at Loch Katerine under the protection of her Highlander cousin, Roderick Dhu. Although the men were away, Fitz-James was taken in and extended Highland hospitality. It disturbed Fitz-James that this girl bore such a resemblance to members of the hunted Douglas clan. Nevertheless, he was smitten by Ellen's beauty and kindness and dreamed of her as he slept. On the next morning Fitz-James left the island with a guide. Later, Roderick and Douglas returned home from their separate journeys, Douglas accompanied bv young Malcolm Graeme. Roderick, a fierce, plundering, middle-aged warrior, hoped to i-narry Ellen, both because he loved her and because their marriage would unite Clan Douglas with Clan Alpine to create a powerful political force. Although Ellen appreciated Roderick's protection, she was frightened by his manner and had set her heart on Malcolm Graeme, her first suitor, whom Roderick despised. When Roderick extended his marriage proposal to her in the company of all, Malcolm detected Ellen's deep disquiet, but before he could speak, her father interceded, explaining tactfully that such a union would be a political misalliance; Roderick was a sworn enemy of the King, while he, Douglas, in spite of his outlawed status, still loved his monarch. The great chieftain hated the King and could not understand Douglas' loyalty. Now his disappointment at losing Ellen rose to intensify Roderick's anger. He sent out a terrible signal - a fiery cross summoning his Clan Alpine to war. As the cross was carried over the rocky highlands, all the clansmen rallied to support their chieftain. Roderick now petitioned Brian the Hermit to use his magic to give him an augury for the forthcoming battle. The oracle read: "Which spills the foremost foeman's life that party conquers in the strife." Roderick was reassured, for Clan Alpine had never fought but they were the first to kill a foe. Meanwhile, before setting out for Stirling Castle to give himself up in hopes of averting war, Douglas had conducted his daughter, with the minstrel Allan-bane as her escort, to the safety of a wilderness cave. Ellen knew her father's intentions: , He goes to do what I had done,/ had Douglas' daughter been his son!" There the refugees were found by James Fitz-James, returning to see if he could persuade Ellen to accompany him to Stirling Castle. Ellen was dismayed. Hadn't Fitz-James seen the preparations for war, the hills alive with Roderick's men? No, the Saxon replied. The countryside had appeared quite serene. But this was the surest sign of danger, said Ellen; the wily Roderick's troops must already have him surrounded. She promised to help him escape, though she confessed that her heart belonged to Malcolm Graeme. The knight remained determined to help her save her father, however. He presented her with a ring from the Saxon royalty, saying that it would help her in her journey through Lowland territory and gain her an audience with King James. Fitz-James departed, still following his guide, Red Murdoch. Soon they came upon Blanche, a poor, crazed woman living in the wilds. Long ago, on her wedding day, Clan Alpine had captured her and killed her bridegroom. From his green hunting attire, Blanche recognized Fitz-James as a fellow Lowlander. In a cryptic song she warned him to beware of Murdoch. The knight, acknowledging this warning, drew his sword just as the guide discharged an arrow from his bow. But the shaft missed its true target and felled the poor old woman. After chasing down and slaying the treachtrous Murdoch, Fitz-James returned to dying Blanche, who gave him a broach made of a lock of her dead sweetheart's hair, with the charge to seek out Clan Alpine's Roderick Dhu and avenge her pitiful life. The Saxon set out, stealthily picking his way through the undergrowth. Many hours later he stumbled upon a lone knight from Clan Alpine, bound by the same code of honor as he. The enemies shared food and a campfire,

Wednesday, November 27, 2019

Analysis of Enriques Journey Book

Analysis of Enriques Journey Book Enriques Journey experience brings into view the kind of problems one undergoes in the process of attaining their goals in life (Border Film Project 6). This shows that age is not a factor in achieving ones dreams and therefore determination wins it all. Life can be filled with several obstacles such as being an immigrant but the need to overcome such problems and excel defines the life and experience of Enrique who has to travel as an immigrant to meet his mother, have a relationship with Maria Isabela (Nazario 230).Advertising We will write a custom essay sample on Analysis of â€Å"Enrique’s Journey† Book specifically for you for only $16.05 $11/page Learn More After, Enriques mother Lourdes leaves for the US to look for money so that she can support her child gain education shows the â€Å"hardships† that mothers go through to raise their children (Border Film Project 10). Overcoming obstacles in life is the most traumatic aspects of the story of Enriques Journey. Enriques mother chooses to do low paying jobs that are often ignored by the citizens of America to make a living that would enable her child get an education. Through these low paying jobs, they improve the countrys economy since the kind of jobs the immigrants do cannot be accepted by the Americans. I chose this aspect because Enrique had to overcome several challenges and problems on his way to America so that he can reunite with his mother, the life in America itself is not that promising as many would have thought. Therefore the life of an immigrant remains to be seen as one full of struggles. He had to be beaten and faced many robberies on the way. However, he is thriving to succeed in his journey to reach her mother is the motivational factor in his success to reach the US. Being determined presents some of the themes in this text and, moreover a reflection of the obstacles Enrique undergoes before reuniting with her mother. Nazario states that, â€Å"she had to work long hours to earn the money† (235). The writer here refers to the time Lourdes would work that demonstrates the hard work of an immigrant and their determination. In addition, the importance of having hope is the key factor in Enriques continued desire to reach the US. Clearly, the contribution of the immigrants such as the likes of Enrique and his mother is great for the economy of the country.Advertising Looking for essay on american literature? Let's see if we can help you! Get your first paper with 15% OFF Learn More Many immigrants have to survive in all means whatever it takes for them to do so. The method of survival reflects their determination to succeed in life through doing the small jobs and in the end improve the economy of the country. Lack of finance by Lourdes is a show that she cannot be able to take care of her children and clearly that they are living in poverty. Nazario states that â€Å"Lourdes cannot affor d to feed and educate her children, so she leaves for El Norte† (139), this show that the immigrants can be able to do any jobs, work extra hard which is beneficial to a country in terms of economy improvement. â€Å"Enriques Journey† story make people change how they look at the immigrants and need to offer a helping hand because they too are important to the country (Border Film Story). They can help to offload the â€Å"burden† of hard labour which most of the citizens do not want. The determination of Lourdes to make her life better shows the immigrants have a lot of problems and can risk their lives to make ends meet (Nazario 200). The discussion question: Do the immigrants help to improve a countrys economy? Border Film Project. Border Film Project. 2011. Web. borderfilmproject.com/en/ Nazario, Sonia. Enrique’s Journey, New York: Random House, 2007. Print

Saturday, November 23, 2019

Analization of There are no Children Here essays

Analization of There are no Children Here essays You do not fully know a man until you have walked around in his shoes Social isolation due to economical disadvantages is the criteria of which Alex Kotlowitz novel There Are No Children Here is based upon. It is a true story in which free lance journalist, Kotlowitz followed the lives of two children, there mother and the rest of their siblings growing up in government project home in Chicagos west side ghetto. The main characters of the story are Lafeyette and Pharoah Rivers and their mother La Joe and how they survive the hardship and struggles of an impoverished life and non existence to the rest of the world. The first thing that La Joe mentions to Kotlowitz when she agrees to let him follow and live in their footsteps is the following comment, "But you know, there are no children here," she told him. "They've seen too much to be children.", and it is here that we receive the title of this sentimental and heart felt novel. The predicament that the people of this socially separated, violence reigning, horrendous poverty stricken urban community saw on a daily basis gave them no hope for the future. The people learned to become accustomed to and accept that there was little they could do to change the views of the upper class citizens to help them in their dilemma of living out there daily lives. The children are always caught in the grasps of gangs exchanging gun fire and letting out there anger and may not even live to see a new day as a result of it. A way to ignore a problem that exist is to not acknowledge that there is one or try and understand it. Early off in the beginning of the novel Lafeyette and Pharoah along with a couple of the other neighborhood children go to the railroad tracks in the attempt to discover a snake. Upon hearing the people on the train arriving the children flee for cover because of rumors they have heard of the passengers carrying weapons for their safety. The passe ngers...

Thursday, November 21, 2019

ECE440 Week4Discussion Essay Example | Topics and Well Written Essays - 250 words

ECE440 Week4Discussion - Essay Example Working with children requires an understanding of the best methods of attaining their attention. The idea is to get the most essential attributes that will precisely provide children with a higher chance of remembering what they are taught. Essentially, the demands of these children are pegged on the ability to reach out to the structures intended to remind them of what they read, and have a view of what they are learning (Shores, & Grace, 2005). This is a great way of ensuring the students do understand what they learn, and capitalize on their ability to memorize the pictures. It also reduces the processing demands of semantic information, reducing the complexity of the information attained. It also improves the children’s ability to learn strategically, with an emphasis placed on their communication skills, reading and writing capabilities, as well as analytical creative and critical thinking skills (Atkins-Burnett, & Meisels, 2005). The constructions of such patterns in th eir minds provide a greater understanding of the thinking constructs that define the results

Wednesday, November 20, 2019

Philosophy - Kant Treatment of animals, Utilitarianism Vegetarianism Essay

Philosophy - Kant Treatment of animals, Utilitarianism Vegetarianism - Essay Example For instance, Immanuel Kant is opposed and condemned on the basis of his notion that only humans serve as the object of honor. The critics argue that Kant does not present anything in favor of displaying kindness towards animals, nor does he condemns exercising butcheries on the creature that is unable to speak or deliver a single word even. Kant does not give animals the status equal to man but is of the view that since the animals are unable to describe their pains and sufferings, they should be treated with kindness in the same manner as it is displayed towards the person. Hence, if Kantian philosophy is considered in its true prospect, it becomes crystal clear that the renowned philosopher lays stress upon the same moral values adopted by an overwhelming majority of the individuals belonging to various cultures and societies of the world. Moral values maintain the direct relationship with religious beliefs, social norms, and cultural values. All existing religions and culture preach kindness towards animals, and the same is emphasized upon by the philosophers. Neither religion, nor society allows harsh treatment of animals, but the life of the animals cannot be stated as honorable, precious and prestigious and that of the persons (i.e. humans) In his work under the title the Metaphysic of Morals, Kant declares that man is bound to pay his duties and obligations to himself and his fellow beings i.e. persons and nature of duties towards animals is surely different from those which are towards human beings.

Sunday, November 17, 2019

Accounts Sba Essay Example for Free

Accounts Sba Essay The aim of my project is for me to arrive at a comprehensive understanding of the financial sector of the business world. To draw up the financial records for the year 2009 for Jen’s Supermarket and to comment on the entity’s performance using appropriate tools of Analysis Description and Overview Jen’s Supermarket is a developed and simulated entity owned by Jenevonne Kirton, who is the sole proprietor. Jen’s Supermarket is a developed supermarket which sells a variety of food items and miscellaneous goods, serving most of the island in its convenient location. The supermarket employ fifteen staff along with Ms. The capital at beginning was 202800 while at end it was 208165 which showed an increase by 5365 at the end of the month. Suggestions/Recommendations Current Ratio It is recommended that Jen’s Supermarket 1. Uses the excess money to expand the business by opening another supermarket. 2. Introduce new product to the business and purchase new equipment. Gross Profit It is suggested that Jen’s Supermarket should 1. Source cheaper suppliers to facilitate the demand of goods so profitability would be greater at the end of the month. 2. Offer new promotions every week and offer the customers raffles at a chance to win prizes at the end of the year. These are given to help Jen’s Supermarket increase gross profit and sales. Conclusion It is clear that Jen’s Supermarket keeps adequate records for the business to demonstrate the profitability over the financial period for the month. It could however, increase the current ratio and gross profit by incorporating the suggestions/recommendations outlined. Nevertheless Jen’s Supermarket made a good net profit for the month of December in 2009. Overall based on the performance of the business Jen’s Supermarket was able to make a profit of 6365 despite the low sales of 104 850.

Friday, November 15, 2019

Estimation of Salbutamol Sulphate and Guaiphenesin

Estimation of Salbutamol Sulphate and Guaiphenesin SIMULTANEOUS ESTIMATION OF SALBUTAMOL SULPHATE AND GUAIPHENESIN IN THEIR COMBINED LIQUID DOSAGE FORM BY HPTLC METHOD Kruti D. Bhalara, Ishwarsingh S. Rathod, Sindhu B. Ezhava, Dolarrai D. Bhalara, ABSTRACT A simple, specific, sensitive and validated high-performance thin layer chromatographic (HPTLC) method was developed for the simultaneous analysis of Salbutamol sulphate and Guaiphenesin. Spectro-densitometric scanning-integration was performed at an absorbance wavelength 280 nm. A TLC aluminium sheet pre coated with silica gel 60 F254 was used as the stationary phase. The mobile phase system containing Ethyl acetate: Methanol: Ammonia (25% w/v) (75: 15: 10 v/v) gave a good resolution of Salbutamol sulphate and Guaiphenesin with Rf values of 0.47 and 0.65, respectively. The calibration plot of Salbutamol sulphate exhibited good linear regression relationship (r = 0.9987) over a concentration range of 200-1000 ng/spot. The calibration plot of Guaiphenesin exhibited good polynomial regression relationship (r = 0.9997) over a concentration range of 10-50 ÃŽ ¼g/spot. Detection and quantitation limit was found to be 70 ng and 100 ng respectively, for Salbutamol sulphate and 30 ng and 50 n g, for Guaiphenesin. The proposed method was used for determination of both drugs in Ventorlin and Asthalin Syrup containing Salbutamol sulphate and Guaiphenesin with satisfactory precision (Intraday) [2.67-4.46% for Salbutamol sulphate and 2.39-4.42% for Guaiphenesin] and accuracy [100.97 ± 0.50% and 100.45  ± 0.58% RSD, for Salbutamol sulphate and Guaiphenesin respectively] INTRODUCTION Salbutamol sulpahte (SAL) is the selective prototypic ÃŽ ²2-adrenoceptor agonist. It is used as an anti-asthmatic in the treatment of bronchial asthma, bronchospasm, in the patients with reversible obstructive airway and in prevention of exercise induced bronchospasm(1-3). It may be used in uncomplicated premature labour. SAL is chemically (RS)-1-(4-hydroxy-3-hydroxy- methyl phenyl)-2-(tert-butyl amino) ethanol sulphate(2, 3). Guaiphenesin (GUA) is used as an expectorant in the symptomatic management of coughs associated with the common cold, bronchitis, pharyngitis, influenza, measles etc(1-3). It is chemically (RS)-3-(2-methoxyphenoxy)-1,2- propanediol(2, 3). SAL and GUA combinations are available in the market for the respiratory disorders where bronchospasm and excessive secretion of tenacious mucus are complicating factors, for example bronchial asthma, chronic bronchitis emphysema. Chemical structures of GUA and SAL are shown in Figure 1. SAL (API) is official in the Indian Pharmacopoeia(2), British Pharmacopoeia(4), and US Pharmacopoeia(5), and SAL syrup and tablets are official in British Pharmacopoeia(4). GUA (API) is official in the Indian Pharmacopoeia(2), British Pharmacopoeia(4), and US Pharmacopoeia(5), and GUA tablets, capsules and injection are also official in US Pharmacopoeia(5). However, the combination of SAL and GUA is not official in any pharmacopoeia. Several methods have been reported in literature for individual estimation of the drugs but very few methods have been reported for simultaneous estimation of SAL and GUA in combined dosage form, which includes chemo metrics-assisted spectrophotometry(6), Electro kinetic chromatography and Gas chromatography-Mass spectrometry(7) and Micellar electrokinetic chromatography(8). HPLC, though accurate and precise method, is time consuming, costly and requires skilled operator. Therefore the aim of this study was to develop and validate simple, specific, inexp ensive, rapid, accurate and precise High Performance Thin Layer Chromatography (HPTLC) method for simultaneous estimation of SAL and GUA in their combined dosage form. The proposed method was successfully applied to two marketed cough syrups Ventorlin ® and Asthalin ® and the contents were determined without any interference of excipients. MATERIALS Reagents and Materials (a) Solvents: Analytical reagent grade Ethyl acetate (Finar Chemicals, India) and methanol (RFCL Limited, India) and ammonia (25% w/v) (s. d. Fine Chem Limited, India); Iso propyl alcohol (s. d. Fine Chem Limited, India); Sodium bicarbonate (s. d. Fine Chem Limited, India) (b) Standards: SAL and GUA were a gift sample from Preet Pharma, Gujarat, India. (c) Ventorlin ® syrup (GSK Pharmaceutical Ltd, India) – Batch 02053, labeled 2 mg SAL and 100 mg GUA in each 5 ml of syrup, were purchased commercially. (d) Asthalin ® syrup (Cipla Pharmaceuticals, Mumbai, India) – Batch 060305, labeled 2 mg SAL and 100 mg GUA in each 5 ml of syrup, were purchased commercially. Apparatus (a) HPTLC Plate: 20Ãâ€"20cm, percolated with silica gel 60 F254, 0.2 mm layer thickness ( E.Merck, Germany) (b) Spotting device: Linomat IV Semiautomatic sample applicator (Camag, Switzerland) (c) Chamber: Twin trough chamber for 20 Ãâ€" 10 cm (Camag) (d) Densitometer: TLC Scanner-3 linked to win CATS software (Camag). Scanner mode- absorbance-reflectance; Scanning Wavelength: 280 nm; lamp: Deuterium; measurement type: remission; measurement mode: absorption; detection mode: automatic. Scanner setting- Slit dimension: 3.00 Ãâ€" 0.1 mm (e) Syringe: 100  µl (Hamilton, Switzerland) (f) Analytical balance: Shimandzu Libror AEG – 220 balances METHODS Preparation of SAL and GUA standard solutions Stock solution of SAL (equivalent to 2 mg/ml) was prepared by dissolving 20 mg SAL pure substance in 10 ml methanol. Working stock solution of SAL (equivalent to 0.2 mg/ml) was prepared by transferring 1.0 ml of above stock solution in 10.0 ml methanol. Stock solution (10 mg/ml) of GUA was prepared by dissolving 100 mg GUA pure substance in 10.0 ml methanol, separately. These solutions were stored under refrigeration at 40C. A mixture of the drugs was prepared by transferring 1.0 ml of stock solutions of each compound to 10 ml volumetric flask and diluting to volume with methanol. (Final concentrations of SAL, 0.02 mg/ml and GUA, 1 mg/ml) Preparation of calibration curve 10-50 micro liters of standard solutions of combined standard solution of SAL (0.2, 0.4, 0.6, 0.8 and 1.0  µg/spot) and GUA (10, 20, 30, 40, and 50  µg/spot) and 2 sample solutions (20  µl; corresponding to 0.4  µg SAL and 20  µg GUA/spot) were applied onto a pre coated HPTLC plate using the semiautomatic sample spotter (bandwidth: 3 mm, distance between the tracks: 5 mm). The plate was developed to a distance of 45 mm in a HPTLC chamber containing the mobile phase, i.e., Ethyl acetate-methanol-ammonia (7.5+1.5+1.0 v/v/v), at 25  ± 2 0C. The plate was dried at room temperature. The substances on the silica gel layer were identified densitometrically at 280 nm. The chromatograms were scanned at 280 nm with slit dimensions of 0.1 mm Ãâ€" 3 mm; 400 nm was used as the reference wavelength for all measurements. Concentrations of the compounds chromatographed were determined from changes in the intensity of diffusely reflected light. Evaluation was via peak area with linear re gression for SAL and polynomial regression for GUA. Preparation of sample solutions A 5 ml aliquot of the Commercial syrup (Ventorlin ® or Asthalin ®) was transferred into 10 ml volumetric flask. The volume was adjusted with methanol. From this solution, 2 ml was pipetted and transferred into another 10 ml volumetric flask. The volume was adjusted to the mark with methanol. The methanolic solution was used for chromatographic analysis. (SAL 20 ÃŽ ¼g/ml and GUA 1 mg/ml) Method validation The method was validated in compliance with International Conference on Harmonization guidelines(9). (a) Specificity._ The specificity of the method was established by comparing the chromatograms and measuring the peak purities of SAL and GUA from standard and sample solutions of liquid dosage forms. The peak purity of SAL and GUA were assessed by comparing spectra obtained at the peak start (S), peak middle (M) and peak end (E) of a spot. Correlation between SAL and GUA spectra from standard and sample was also obtained. (b) Accuracy._ The accuracy of the method was determined by standard addition method and calculating the recoveries of SAL and GUA . Prequantified sample stock solution of SAL and GUA ( 1 mL equivalent to 200 µG/ml of SAL and 10mg/ml of GUA) was transferred into a series of 10 mL volumetric flasks. Known amounts of standard stock solution of SAL(0, 1,2 and 3 mL equivalent to 200, 400, 600 ng/spot ) and GUA ( 0, 1, 2 and 3 mL equivalent to 0, 10,20 and 30  µg/spot) were added to this prequantified working sample solutions and diluted up to the mark with methanol. Each solution (10  µL) was applied on plates in triplicate. The plates were developed and scanned as described above, and the recovery was calculated by measuring the peak areas and fitting these values into the regression equation of the calibration curves. (c) Precision._ The intraday and interday precision of the proposed method was determined by estimating the corresponding responses five times on the same day and on five different days over a period of one week for three different concentrations of SAL (200, 400, 600 ng/spot) and GUA (10, 20, 30  µg/spot). The repeatability of sample application was checked by repeatedly measuring the area of seven spots having same concentration of SAL (400ng/spot) and GUA (20  µg/spot) applied on the same plate, while the repeatability of measurement of peak area was checked by repeatedly measuring the area of one spot of SAL (400ng/spot) and GUA (20  µg/spot) for seven times. The results were reported in terms of RSD. (d) LOD and LOQ._ The LOD and LOQ of SAL and GUA were calculated by preparing a series of solutions containing decreasing concentrations of SAL from 0.02 to 0.004 mg/ml and GUA from 1 to 0.001 mg/ml by appropriate dilution of the stock solutions of these drugs (SAL 0.02 mg/ml and GUA 1 mg/ml). (e) Robustness._ The robustness of the method was studied by changing the composition of the mobile phase by  ± 0.2 mL of organic solvent, development distance by  ±1 cm, and temperature by  ± 2ËÅ ¡C. Determination of SAL and GUA in Liquid Dosage Form The responses of sample solutions were measured at 280 nm for quantification of SAL and GUA by the proposed method. The amount of SAL and GUA present in the sample solutions were determined by fitting the responses into the regression equation of the calibration curve for SAL and GUA, respectively. RESULT AND DISCUSSION Since both SAL and GUA have nearly same wavelength maxima, interference becomes prominent in UV-Visible spectrophotometry. Also the estimation of any component at its null point is not that much reliable as the estimation at maximum wavelength. Consecutively for highly specific methods like HPLC and HPTLC, physical separation of those substances is usually necessary before quantitative determination of those substances. So, attempt has been made to develop a validated separation technique for the separation of SAL and GUA in the mixture by HPTLC. The chromatographic conditions were adjusted in order to obtain an efficient and simple routine method. Different mobile phases were tried for the separation of the above substances. The optimized solvent system was Ethyl acetate: methanol: ammonia (25 %w/v) (7.5:1.5:1;v/v/v). The Rf values were found to be 0.47 for SAL and 0.65 for GUA. (Figure 2) The maximum wavelength of SAL was found to be 279nm-280nm and the maximum wavelength of GUA was 274nm-275nm. As both compounds have nearly same ÃŽ » max, 280 nm was selected for simultaneous scanning of SAL and GUA. In this way, SAL can be detected at low concentrations in the presence of GUA at high concentrations. Preparation of calibration curve As the concentration range of SAL is from 200 to 1000 ng, direct proportionality (linearity) of the concentration with its absorbance was obtained. Linear regression analysis is applied to analyze calibration curve of SAL. The equation is y = 3.659x + 409.8 (Figure 2) With the objective to allow simultaneous analysis by developing method in wider concentration range, non-linear regression analysis mode was utilized for estimation of GUA. Polynomial regression mode is applicable if wide concentration ranges (1:50 to 1:100) are worked out and with high amount of substance measured in non-linear detector range. The equation for calculation is y = -4.207x2 + 578.12x + 9343.48 (Figure 3) Method Validation Specificity._ The excipients present in the liquid dosage form did not interfere with the chromatographic responses of SAL and GUA as the peak purities r(S, M) = 0.997 and r (M, E) = 0.9996 for SAL and r(S, M) = 0.997 and r(M,E) = 0.9996 for GUA. Also, good correlation (r= 0.9999 for SAL and 0.9998 for GUA) were obtained between standard and sample spectra. Accuracy._ The mean recoveries obtained for SAL and GUA were 100.07 ± 0.49% and 100.04  ± 0.63% RSD , respectively. The accuracy results are shown in Table 2 Precision._ The values of RSD for intraday and interday variations were found to be in the range of 2.56-4.57% and 2.67-4.46% for SAL and 1.95-4.20% and 2.39-4.42% for GUA. RSD for repeatability of sample application were found to be 1.86 and 1.48 for SAL and GUA respectively, while the repeatability of peak area measurement was 0.47 and 0.18% for SAL and GUA respectively. LOD and LOQ._ The LOD and LOQ were 70 and 100 ng for SAL and 30 and 50 ng for GUA. Robustness._ The method was found to be robust, as the results were not significantly affected by deliberate but slight variation in the method parameters. Determination of SAL and GUA in Liquid Dosage Form The proposed HPTLC method was applied successfully for the determination of SAL and GUA in liquid dosage form. The results obtained for SAL and GUA were comparable with the corresponding labeled claim values. (Table 4) CONCLUSIONS Due to the absence of an official method for this binary mixture, the high-performance thin layer chromatographic method proposed in this article could represent an alternative to chemo metrics-assisted spectrophotometry, Electro kinetic chromatography and Gas chromatography-Mass spectrometry previously published. This method has been validated for linearity, precision, accuracy, and specificity, and has proved to be convenient and effective for the quality control of SAL and GUA in marketed syrups, with out any interference of excipients. ACKNOWLEDGEMENTS: We are thankful to the principal, L.M. College of Pharmacy for providing us the facility for successful completion of our project. REFERENCES 1.Klaus Flory, H. G. B. in Analytical Profiles of Drug Sunstances and Excipients, Vol. 25, pp. 121, Acedemic Press, Inc. 2.(1996) The Indian Pharmacopoeia, The Manager of Publication, Delhi. 3.Parfitt, K. (Ed.) (1999) Martindale The Complete Drug Reference, The Pharmaceutical Press, UK, The Pharmaceutical Press, UK. 4.(2007) The British Pharmacopoiea, Department of Health on behalf of the Health Ministers, London. 5.(2007) The United States Pharmacopoiea-30 NF-25. 6.El-Gindy, A., Emara, S., and Shaaban, H. (2007) J. Pharm. Biomed. Anal. 43, 973-82. 7.Pomponio, R., Gotti, R., and Hudaib, M. J. Sep. Sci. 24, 258 264. 8.D., N. L., Quiming, N. S., and Saito, Y. (2009) J. Liq. Chromatogr. Related Technol. 32, 1407 1422 9.International Conference on Harmonization (2005) Validation of Analytical Procedure Methodology (Q2R1), Technical Requirements for Registration of Pharmaceuticals for Human Use, Geneva, Switzerland Table 1. Data indicating various validation parameters of the developed method Table 2. Results of precision study for SAL and GUA determination by the proposed HPTLC method a Repeatability of sample application. b Repeatability of measurement of peak area. Table 3. Data for the recovery study of SAL and GUA Table 4. Analysis results for SAL and GUA liquid dosage forms by the proposed HPTLC methods (n=5) Figure 1. Chemical Structures of (a) SAL and (b) GUA Figure 2. Calibration curve of SAL Figure 3. Calibration curve of GUA Figure 4. (a) HPTLC chromatogram showing separation of SAL and GUA in their combined standard solution at 280 nm , with Rf 0.47 and 0.65, respectively. (b) Chromatogram showing the separation of SAL and GUA in Ventorlin Syrup. Figure 5. (a) HPTLC chromatogram showing separation of SAL and GUA in their combined standard solution at 280 nm , with Rf 0.47 and 0.65, respectively. (b) Chromatogram showing the separation of SAL and GUA in Asthalin Syrup.

Tuesday, November 12, 2019

The Effects of Slavery on African-Americans

Slavery obviously had no small affect on the lives of millions of African-Americans in America. Both the North and South had strict rules on how the race was placed in society, rules that placed them far beneath any social class in America. It could be said that even free slaves, could never actually be â€Å"free† due to a complete lack of social equality granted by the American Government. Blacks were treated as something less than a human being, something like a product; this product was sold and traded around the country, and was the basis of the entire country's economy.Working in the fields from dusk to dawn not only hindered African-American's physically, but also exhausted them in the social and mental aspects of life. Slavery affected the lives of African-Americans in the South and the North by hindering them socially, mentally, and physically. Socially, African-American's were at the complete bottom of the list. Even the backwoods, workless â€Å"hillbillies† who lived nearly as harsh of lives as the African-Americans did were well above the slaves in social aspects.African-Americans in the South were completely deprived of any sort of education, including the simple knowledge of reading and writing. Black schools in the North were much despised, in one case, a school dedicated to the teaching of African-Americans was drug into a pond by a group of local whites. Blacks, horribly mistreated had virtually no legal rights, and could not even testify against a white person in court. This meant that no matter how brutally a slave was beaten, he could not do a thing about it.The â€Å"free† blacks had little freedom also, and were treated as a kind of â€Å"third race† in society. These people were essentially slaves still, only without a master. Secondly, African-Americans were hindered very much in the mental aspect. Blacks had no hope of social mobility in their country and recognized this. This, to many blacks became a degrad ing truth. They also felt deprived of their dignity and responsibility in the world. Knowing all of these depressing truths, many blacks esentially gave up and stopped putting so much effort into their role in society.Thus began the stereotype of the â€Å"lazy† African-American, who did just enough to get by, or purposely destroyed machinery in hopes of dodging work. Treatment of blacks within the family varied, some blacks in the upper South were treated as family while blacks in the deep South were whipped and branded on a regular basis. Lastly, the most apparent type of abuse that the African-Americans had to deal with was the physical abuse. Blacks toiled in the fields of cotton from dusk to dawn during their long work days.Masters were allowed to punish their slaves as they pleased, allowing them to whip their slaves if they weren't pleased with their effort. The Government offered no real type of protection to slaves due to the law that forbidded any African-American t o testify against a white in court. Even African-Americans that were finally free had to fear that they may be recaptured at any moment, and they could do nothnig about it. In the North, blacks were definitely a rare race. The blacks that were seen were discriminated against significantly, some blacks weren't even allowed entrance to certain states!In conclusion, African-Americans were placed at the pit of society throughout the 19th century. They had virtually no rights, and were worked tirelessly for a lifetime. African-Americans were not only exhausted by physical work, but they were also beaten in the mental and social aspects. Blacks almost always kept hope, and used the idea of being a free black as motivation, though this third race didn't have such a well-off life either. Slavery affected the lives of African-Americans in the South and the North by hindering them socially, mentally, and physically.

Sunday, November 10, 2019

Adoption And Foster Care In California

With the advent of societal changes the numbers of children in foster care has risen, as have the complexity of their problems. In Califoronia, approximately 100,000 children are in out-of-home placement with parental substance abuse the most common reason for entry (California Department of Social Services, 7).A study by Lewis and associates (1995) reported the number of drug exposed infants entering foster care increased 3000% from 1981 to 1993 in Los Angeles County. Takayama and colleagues (1998) reported that nearly 80% of the children entering foster care in San Francisco Country had a substance abusing parent and over 90% of infants entering foster care were prenatally drug exposed.  Foster explains that perniciously addictive crack cocaine and acquired immunodeficiency syndrome have largely been responsible for dramatic increases of children with health related problems being placed in foster care (Foster, 11).   â€Å"Children whose parents abuse alcohol and drugs are al most three times more likely to be abused and more than four times more likely to be neglected† (Foster, 14).Another factor increasing foster care population is the reductions in welfare benefits, which have shown a relationship to increases in child abuse and neglect referrals (Children's Defense Fund, as cited in Freundlich, 2000).According to the Children's Defense Fund (as cited in Freundlich, 2000), child abuse and neglect referrals went up 12% when the families' welfare benefits were reduced 2.7%.   These same Los Angeles County figures showed an increase the following year of 20% referrals when benefits were reduced by 5.8%.Many children are placed in child protective custody because of neglect (Foster, 29) with the second most common reason being physical abuse, but in a number of cases children enter foster care because of reasons related to poverty.   Finally, the welfare mandatory work requirements for benefits with scarce provisions for child care exacerbates t he tensions that a single parent faces.With the 5-year lifetime welfare cap and a 20% reduction in the Food Stamp Program many families will not be able to sustain a safe and stable home.   In response to these reductions and pressures, more children may enter into the protective care and stay longer.In addition to reduced income, some families with disabled children stand to lose their Supplemental Security Income, due to tighter eligibility requirements (Freundlich, 35).   In all, there are twice as many children entering the child welfare system as there were 20 years ago (Foster, 35).Adoption in some form has been used to help families since recorded history.   A common form of informal adop tion utilized in colonial America was to indenture child ­ren to a family for the purpose of learning a trade (Hacsi, 164).Later, orphan asylums were operated to feed and house â€Å"poor and parentless children† (Foster, 41). Extreme poverty led some families to â€Å"place- out† their own children until they became economic ­ally viable family again (Hasci, 165). These informal adoption measures were gradually replaced as a new professionalism in child welfare began.The growing involvement of state and federal govern ­ment in child welfare and the establishment of the juvenile court system in 1900 altered and â€Å"greatly increased the numbers of state wards† (Hasci, 172).California led the way in 1915, by regulating and licensing placement home agencies and in 1920, started making payments for out of home care for those declared needy by the juvenile court (Hasci, 172).California state government encouraged adoption rather than boarding-out because it saved money and cut ties to biological parents who were thought of as being â€Å"morally delinquent† (Hasci, 173).Depression era funding created Aid to Dependent Children (ADC) with the goal of keeping children in the home by supporting impoverished families (Hasci, 173).   Th e role of government continues to dictate child welfare policies based on prevailing societal attitudes and current research.During the 1960s, federal foster care funding and the discovery of the â€Å"battered child syndrome† combined to further change the dynamics of child welfare.   Child pro ­tection against abuse became a nationwide concern and there was money in the coffers to fund a foster care system (Foster, 47).Money, awareness, and mandatory reporting laws increased foster care rolls from 300,000 in 1962, to 500,000 in 1977 (Foster, 49).   Numerous laws have been passed to organize and encourage adoption rates.   Originally the Adoption Assistance and Child Welfare Act of 1980 was enacted to offset an unintended conse ­quence of foster care.Moving from one foster home to another repeatedly exacerbated the adjustment and developmental problems of children already exposed to unstable and unsafe home environments.   It was hoped that this law would expedit e reunification efforts while slowing down foster drift by encouraging preventative strategies.Currently, adoption policy guided through President Clinton's 1997, Adoption and Safe Families Act (ASFA) focuses on a parallel approach which emphasizes reuni ­fication and permanency options simultaneously.   Parents who are unable or unwilling to aggressively pursue reuni ­fication dictates will lose parental rights; however, much less time is wasted because of the joint approach and, therefore, children gain permanent homes sooner (Foster, 55).Although it seems logical now to encourage foster parents to adopt their foster children, affectionate ties were discouraged and sanctioned by many court cases (Stephens, 1992).   Prior to 1974 two-thirds of the states, including California, discouraged adoption by foster parents (Meezan, & Shireman, 14).Information had been postulated too regarding the deleterious effects of a lack of permanence in children's formative years.   As earl y as 1952, researchers Bowlby and Robertson discovered and described the three phases of protest, despair, and detachment that an infant or toddler will display when separated from their affectionate care giver and by 1969, Bowlby had published the first of three volumes about the importance of early and consistent attachment.However, the dissemination of this important finding was not significantly applied to practice until Congress passed the Adoption Assistance and Child Welfare Act of 1980, thereby recognizing the importance of permanency placement (Katz, 220).In December 1996, President Clinton directed the US Department of Heals and Human Services (DHHS) to develop strategies to achieve permanency more quickly for children in the foster care system and double the number of adoptions to 54,000 by fiscal year 2002.Data available at the current moment showed that while the number of children in foster care increased from 242,000 in 1983 to almost 500,000 in 1995, the number of ad options of children in out of home care stayed between 17,000 to 20,000 during this same period (Maza, 445).Clinton’s directive, disseminated by DHHS as Adoption 2002: A Response to the Presidential Executive Memorandum on Adoption made two important recommendations: (1) States were to develop plans to double their adoptions and set annual targets for the adoptions to be finalized through 2002 and upcoming years; (2)States would be rewarded with an annual financial bonus for each adoption finalized over the baseline number of adoptions (Maza, 449). Subsequently, the Adoption and Safe Families Act was passed and disbursements to child welfare agencies were authorized to increase the number of children adopted.It qualified a state to receive $4,000 for each adoption over the baseline of previous years and an additional $2,000 for each adoption finalized with a Title IV-E Adoption Assistance agreement (an additional payment for children with special needs) (Maza, 450).Medical, b ehavioral, developmental and educational (if appropriate) assessments are necessary to finalize an adoption. These assessments are confidential and are kept in the child’s record to document appropriate and mandated care. In San Francisco County and Los Angeles County, HIV screening is also a routine part of medical assessment for at-risk children in foster care.In 1996, the California state Department of Social Services formed the Adoption Policy Advisory Council to review adoption policies in California. The council created the Concurrent Planning Workgroup to develop and implement a model of concurrent planning as part of this effort (Williams, 18).This group assisted in developing Assembly Bill 1544, which became state law effective January 1, 1998, as Chapter 793, Statutes of 1997. Chapter 793 requires that a concurrent plan be developed for every child entering out-of-home care. Concurrent planning is a well-known approach to facilitating timely permanency for children in foster care.The concurrent plan names the child's permanency alternative to reunification – adoption, guardianship, or emancipation – and describes the services necessary to achieve this if reunification fails.Chapter 793 also explicitly clarified that certain concurrent planning activities -placement in a fost-adopt home, detailing services necessary to achieve legal permanence for child if reunification fails in the case plan, or providing such services concurrently with reunification efforts – could not, in and of themselves, be evidence of a failure to provide reasonable efforts.The law did not require that the permanent plan be pursued concurrently with the reunification plan. When reunification appears likely, â€Å"concurrent planning services† may consist of reassessing the family's situation in 90 days (Williams, 19). Chapter 793 also added a section to the Welfare and Institutions code requiring the court to query the birth mother at an early hearing regarding any presumed or alleged fathers.The court is subsequently responsible to provide hearing notice to all alleged fathers, with a paternity determination required of all men who respond. The hope is to avoid delays due to birth fathers' surfacing at termination of parental rights hearings and requesting parental rights and services, or objecting to termination of parental rights (Williams, 21). The California law also requires that the case plan describe whether the parent was advised of the option of relinquishment.WORKS CITEDFreundlich, M. Adoption and ethics:   The market forces in adoption.   Washington, DC:   ChildWelfare League of America, 2000California Department of Social Services, Data Analysis and Publications Branch, 2000Foster, L. K. Foster care fundamentals:   An overview of California's foster care system.California Research Bureau, California State Library, 2001Hacsi, T. From indenture to family foster care: A brief history of child placing.   ChildWelfare, 74, 162-181, 1995Meezan, W., & Shireman, J. Care & commitment. Albany, New York:   State University ofNew York Press, 1985Katz, L. Effective permanency planning for children in foster care.   National Association ofSocial Workers, 220-226, 1990, MayMaza, P.L. Using administrative date to reward agency performance: The case of the federalAdoption Incentive Program. Child Welfare, 79(5): 444-456Williams, L. Concurrent planning implementation guide. Sacramento, CA:CaliforniaDepartment of Social Services, 2001

Friday, November 8, 2019

Free Essays on Incidents in the Life of a Slave Girl’

. The author, Harriet Jacobs, throughout her narrative describes the cruelties of slavery vividly. In slavery, a person is completely shut out from things normally given to humans. When Linda Brent retreats into the hole constructed by her uncle, she describes her experience as â€Å"stifling; the darkness total† (438). Many slaves were completely shut out from the world. In one story, Jacobs relates of a slave who had been beaten, â€Å"The back of his shirt was one clot of blood†¦the master said he deserved a hundred more lashes† (378). Slave masters did not allow most slaves to learn how to read or write. Others limited the actions of the slaves. One man who tried to run away was, â€Å"put into the cotton gin, which was screwed down, only allowing him room to turn on his side when he could not lie on his back† (379). Rats ate him. In these conditions, slaves were continuously kept in bondage, a form of darkness bec... Free Essays on Incidents in the Life of a Slave Girl’ Free Essays on Incidents in the Life of a Slave Girl’ Slavery Imagery in the Retreat in Harriet Jacobs ‘Incidents in the Life of a Slave Girl’ By Darcy Gaugler Harriet Jacobs (alias Linda Brent) is deemed one of the writers of a classic slave narrative depicting one of the most dehumanizing institutions in American history: slavery. Throughout her discourse, she uses metaphors and language filled with poignant words such as â€Å"darkness† and â€Å"stifling† to illuminate slavery in all of its evil masks and faces. She explains the effects of slavery on a people by using fierce prose in describing her own personal experiences so one can better see the crippling effects of slavery as a whole. At one particularly eerie point in her life, readers witness her as debilitated and shut away from air and light for a total of seven years in an effort to escape the slavery. It is in this incident where the reader can draw parallels between the seven-year retreat and the stifling institution of slavery because in descri bing both she uses similar metaphors, images, and descriptive words. The author, Harriet Jacobs, throughout her narrative describes the cruelties of slavery vividly. In slavery, a person is completely shut out from things normally given to humans. When Linda Brent retreats into the hole constructed by her uncle, she describes her experience as â€Å"stifling; the darkness total† (438). Many slaves were completely shut out from the world. In one story, Jacobs relates of a slave who had been beaten, â€Å"The back of his shirt was one clot of blood†¦the master said he deserved a hundred more lashes† (378). Slave masters did not allow most slaves to learn how to read or write. Others limited the actions of the slaves. One man who tried to run away was, â€Å"put into the cotton gin, which was screwed down, only allowing him room to turn on his side when he could not lie on his back† (379). Rats ate him. In these conditions, slaves were continuously kept in bon dage, a form of darkness bec...

Wednesday, November 6, 2019

Were the Nazis Successful in Controlling the Lives of Women essays

Were the Nazis Successful in Controlling the Lives of Women essays During the 1930s, the Nazis were in power. They seemed to be in total control of the population, but was this actually the case? This essay will show you that although there seemed to be no chinks in the Nazi armour, there were actually a few loopholes that escaped Hitlers grasp, such as rebel teenage groups, unhappy women and children who ignored Hitlers autobiography, even though it was compulsory reading. It will also show how the Nazis dealt with these rebel teenage groups, and women who did not conform to the Nazi ideals of an Aryan child bearer and housewife. It will also include quotes from people at the time, providing more evidence that the Nazis were not as powerful as everyone seemed to think. So where did the Nazis succeed in controlling the lives of women and young people? First, this essay will look at how the lives of women changed during this time. Before 1933, many women had successful careers in the world of work. Some, however, did choose to stay at home and have children. It was mainly working women that Hitler saw as a problem. Although the Nazis said they believed in equality between the sexes, it was more obvious that they saw women as child bearers and men as the workers and soldiers. Women were encouraged to leave work and become mothers and housewives with interest-free loans and extra benefits. For example, loans were given to newly wed couples completely interest-free if both parties agreed that the woman would not go back to work. Many women agreed with this policy and readily agreed to give up their jobs in order to embrace a life in the home. However, some women were forced to give up their jobs against their will as careers in education, politics and the law systems were banned to German women. Women who did stay in work were forced to take low-paid jobs. Awards were also given to women who bore many children for the Fhrer. On 12th August every...

Sunday, November 3, 2019

Zoot suit riots Essay Example | Topics and Well Written Essays - 1250 words

Zoot suit riots - Essay Example Zoot suit riots This was due to the fact that the Mexican immigrants were perceived as a direct threat to the lives of Americans, since they were often implicated in matters concerning crime and gang violence. Despite the wrongfulness of the American stereotype of the local Hispanic population, the fact that they were present in the United States and that they had made a life for themselves in their adopted country against all odds that were set against them put local public opinion in opposition to them. The fact that members of the American navy, many of whom had never set foot in Los Angeles, chose to attack members of the Hispanic population in the city, with wide public support is among some of the worst racist incidents to happen in the United States. It is possible that the feeling of losing control had become almost unbearable for the white population because of the growing confidence of Mexican Americans in their new environment. The Mexican Americans had come to the United States with barely anything to their names but by the 1940s, they were becoming an increasingly prosperous people, since they took advantage of almost every opportunity that came their way to make it in their adopted country. For quite a large number of them, their coming to America and starting their lives anew, away from the poverty prevalent in their home country was indeed the achievement of the American dream. The growing prosperity and presence of Mexican Americans in Los Angeles, as well as in other parts of the United States may have been behind the motivation of the American servicemen to attack these people in what became known as the zoot suit riots.

Friday, November 1, 2019

Discuss Question Coursework Example | Topics and Well Written Essays - 750 words

Discuss Question - Coursework Example (n.p.). Offshoring is considered to be an advantage to most of the businessmen but it became a problem when impact to the economy was observed during the increasing rates of offshoring. The increasing awareness on the impact of offshoring to the United States’ economy had raised the fears among American workforce and global economy, particularly to the white collar jobs. The U.S. economy is still in recovery and yet, unknown threats of offshoring proliferates the American workforce. Instead of allotting job opportunities for millions of Americans who are unemployed, slots were given to the developing countries. I know that offshoring is one of the ways to be cost-effective in terms of business but the nation should also consider how to stabilize the American workforce and win the global economy. Aside from shortlisting of jobs in U.S., the Center for American Progress (2011) identified impacts of offshoring to the global economy of U.S; among of which are the following: slow c reation of jobs, pain and suffering due to loss of jobs, lack of specific policy proposals, and uncompetitive health care and education system (n.p.). Government must address these issues in order to continue to compete in the global economy. How large might be the impact of offshoring to the U.S. ... Yes, I think that there should be a global internet privacy policy. Many of the web services, particularly companies and businesses, collect information from the user. However, issues regarding establishment of a global internet privacy policy prevails because most of the web services online lack consistency in the applicability and content of privacy laws across jurisdictions (Fleischer, 2010, n.p.). In order to determine the applicability of a global internet privacy policy, it is essential to analyze the different jurisdictional approaches of privacy and data protection laws around the world. These includes location of the organization using the data, location of the people whose data is being used, place where the actual processing happens, multinational operations, use of equipment, cloud computing in terms of location of processing and equipment, international privacy standards, treaty dealing with conflicts of law, country of origin and accountability principle, and voluntary submission to one regime (Fleischer, 2010, n.p.). A perfect example of the need to implement a global internet privacy policy is demonstrated on the benefits derived from the Federal Children’s Online Privacy Protection Act (COPPA) and the data breach notification laws. Majority of the individual states of America implemented these approaches to operators of websites directed at children within the U.S. and notified responsible person for serious data breach (Fleischer, 2010, n.p.). With global internet privacy policy, it is not only privacy of information that is being protected but the welfare of the children and the intellectual property rights as well. How do analytics support business experimentation? Give an example of how a company might use business

Wednesday, October 30, 2019

Resource Directory Coursework Example | Topics and Well Written Essays - 250 words

Resource Directory - Coursework Example Sonya Stanton is the university student academic advisor who provides students with academic advices. He can be contacted through sstanton@argosy.edu. Solutions within this regard are found in 214.459.2203. Karen Wilkerson is the Student Finance Associate Director of Student Finance, and he provides advices regarding disbursement of loans among other financial issues. He can be contacted via kwilkerson@argosy.edu. Solutions within this regard are found in 214.459.2215 (Class Template, 01). The university administration also helps students in changing their personal information or contact. These changes also engulf changes in marital status. Brigit Mattix is the Director of Student Services who helps in ironing students’ personal information issues, and he can be contacted through bmattix@argosy.edu. Solutions within this regard are found in 214.459.2244 (Class Template, 01). Dallas University is an academic institution; thus, students may sometimes need to access library personnel or some academic materials. Jennifer Hostutler is the Learner Support Specialist, and she handles Library and Academic Resource Center; therefore, students with literacy information needs can contact her through jhostutler@argosy.edu. Solutions in the information literacy are found in 214.459.2215. Finally, most of the information in the university is in technology form; thus, students with problems of accessing online information including class site and email should contact the Tech nology support team through campus_support@argosy.edu. Technology problems’ solutions are found in 1.866.848.0776 (Class Template,

Monday, October 28, 2019

Strategy Analysis of Toyota Essay Example for Free

Strategy Analysis of Toyota Essay Toyota Motor Corporation is a famous Japanese multinational corporation, and is considered the world’s second largest automaker of automobiles, trucks, buses, robots, and providing financial services ( 2007). Its founder is Kiichiro Toyoda, born in 1894, and the son of Sakichi Toyoda, who became popular as the inventor of the automatic loom. Kiichiro inherited the spirit of research and creation from his father, and devoted his entire life to the manufacture of cars. After many years of hard work, Kiichiro finally succeeded in his completion of the A1 prototype vehicle in 1935, which marked the beginning of the history of the Toyota Motor Corporation ( 2007). The first Type A Engine produced in 1934 was used in the first Model A1 passenger car in May 1935 and the G1 truck in August 1935, and led to the production of the Model AA passenger car in 1936. In addition to being famous with its cars, it still participates in the textile business and makes automatic looms that are now fully computerised, and electric sewing machines that are available in different parts of the world. It has several factories around the world, which serve to manufacture and assemble vehicles for local markets. The corporation’s factories are located in countries such as the United States, Australia, Canada, Poland, France, Czech Republic, United Kingdom, Turkey, South Africa, Brazil, Argentina, Venezuela, Mexico, Japan, Indonesia, Pakistan, India, Mexico, Malaysia, Thailand, China, Vietnam, and the Philippines. Despite the many locations of its factories, its headquarters is located in Toyota, Aichi, Japan (2007). It invests a great deal of time and effort in its research into cleaner-burning vehicles, such as promoting a Hybrid Synergy Drive and running a Hydrogen fuel cell in its vehicles (2007). It has significant market shares in developed countries, such as the United States, Europe, Africa and Australia, and has significant markets in South East Asian countries. Its brands include the Scion, its division in the United States, Guam and Puerto Rico, and the Lexus, which is Toyota’s luxury vehicle brand ( 2007). Aside from producing cars and other types of automobiles, such as SUVs and coasters, Toyota also, participate in rallying or racing. The company’s presence in Motorsport can be traced to the early 1970s, when Ove  Andersson, a Swedish driver, drove for Toyota during the RAC Rally in Great Britain, and in succeeding years, Toyota Team Europe was formed ( 2007). Up to the present, Toyota cars are still being used in a variety of racing events in different countries around the world. These events include the CART in Vancouver, the Le Mans, the Indy Racing League, the NASCAR, and the Toyota F1 Series (2007). As the leader in the industry of automobile manufacture and production, the company adopts a philosophy in terms of its production system, which is named The Toyota Way. The company’s philosophy in production involves a list of fourteen principles that are implemented in the company, and serve as guides to the operation of the company. This includes the following principles: * Base the company’s management decisions on a long-term philosophy, even at the expense of short-term goals; * Foster a continuous process flow to sight problems; * Utilise â€Å"pull† systems to prevent over-production; * Level out the workload of the workforce; * Build a culture that stops to fix problems, in order to get quality perfect at the first try; * Standardised tasks are the company’s foundation for its continuous improvement and the development of the employees; * Use visual control to let problems surface; * Use reliable and tested technology, which serves both the people and the company’s processes; * Train leaders who understand the company’s work, live its philosophies, and share it to others; * Train and develop a workforce who follow the company’s philosophy; * Respect the work and responsibilities of partners and suppliers by challenging them and helping them improve; * Actually immersing one’s self to understand the situation; * Slow but sure decision-making through consensus, through considering a variety of options, and to implement decisions effectively and efficiently; and, * Becoming a learning business organisation through expression and continuous improvement ( 2007) With these principles, the company is guided in terms of its operations and production. Through these principles and philosophies, it can become efficient and effective in manufacturing its products, keeping in mind the  welfare of its employees, the image and brand of the company, and the satisfaction of its employees. 2. MACRO ENVIRONTMENT ANALYSIS Suggested model PESTEL model (showed how the environment affect the industry we chosen) reference: http://en.wikipedia.org/wiki/PEST_analysis Currently, Toyota faces a need for accelerated investment, in order to deploy the new technologies, for pressing geo-political, economic, environmental and societal reasons. 3.1. Political Observers will see a continuing progression in the ruinous steps which have forced the industry into a socio-politico-economic corner. Whether this is related to flat demand or to the company’s creation of an ever-wider range of vehicles that many buyers seem to care little about, there is a problem. The company is likewise linked closely to the policies of governments, the earnings of banks. Little wonder then that so many emerging countries are keen to develop an auto sector or that there is such a political pressure to protect it in the developed countries. Toyota Company is currently dominated by little more than a handful of firms, each wielding colossal financial, emotional and political power. The company’s approach to dealing with political institutions has not always been brilliant. It tends to be good on technical issues, although it has not always fully presented the longer-term options, in order to make the choices and their implications clear. 3.2. Economic al For much of the developed world, and increasingly for the developing world, Toyota Company is a pillar company in auto mobile business, a flag of economic progress. Without Toyota Company in automotive industry, it is impossible to develop an efficient steel business, a plastic industry or a glass sector – other central foundations of economic progress. The Toyota Company has been a core company, a unique economic phenomenon, which has dominated the twentieth century (2007). However, the automobile industry including the Toyota Company now suffers from a series of structural schisms and has become riddled with contradictions and economic discontinuities. For the capital markets and the finance sector, it has lost a lot of its significance, as a result of ever declining profits and stagnant sales. The  proliferation of products means that it has become hopelessly wasteful of economic resources. While all these and more sound like a very gloomy assessment of such a vast economic phenomenon, the industry is not in the end despondent. A different future is possible for the industry, a highly desirable one. 3.3. Social As part of the development in automotive industry, the Toyota Company actually affects the society as a whole. It employs millions of people directly, tens of millions indirectly. Its products have transformed society, bringing undreamed-of levels of mobility, changing the ways people live and work (2007). The social value of the additional mobility that this industry brings involves the value of the people being able to commute over longer distances easily, among many others. For most of its existence the Toyota Company has been a model of social discipline and control and it is not just that the auto sector offers a ‘pillar’ of something else. There are, on the other hand, particular social issues to address in many developing countries, often those that are the result of an undertone of religious faith. Toyota company has the role to play in helping develop the mobility of such countries and it can be achieved at an acceptable social cost of the country is prepared to learn the necessary lessons from those who have traveled this route before it, and to make the necessary investments. 3.4. Technological The Toyota Company works on a scale so awesome and has an influence so vast that it is often difficult to see. The level and diversity of technologies that it must deploy are increasing, which imposes both new investment burdens and new uncertainties and risks (2007). Roughly a million new cars and trucks are built around the world each week – they are easily the most complex products of their kind to be mass-produced in such volumes. The industry uses manufacturing technology that is the cutting edge of science. But still, the potential for developing coordination skills, intellectual capabilities and emotional sensitivities through electronic technologies remain far from fully exploited. There are numerous additional near-term technological opportunities to adapt the company to changing energy availability. The possibilities suggest that automotive technology is  unexpectedly robust and provides a powerful defence against energy starvation even if the real price of oil climbs steadily during the next couple of decades. 3.5. Environmental Other than the vehicles themselves, and the roads and fuel needed to run them; the business is intricately tied to the manufacture of a wide range of components and the extraction of precious raw materials. Indirectly, it brings people road congestion, too many fatalities and a wave of other environmental troubles. The effect to the Toyota Company is that they needed to establish RD centres to take advantage of research infrastructure and human capital, so that they can develop vehicle products locally to satisfy the requirements of the environmental and safety regulations more effectively.