Wednesday, July 31, 2019

Oral Feeding Readiness Preterm Infants Health And Social Care Essay

What is meant by â€Å" unwritten eating preparedness in preterm babies? † This peculiar construct is frequently elusive, contextual, subjective and really complex when used with the preterm population of babies. It has besides been a subject of involvement for many old ages within the scene of the neonatal intensive attention unit ( NICU ) . The ability of a preterm baby to entirely unwritten provender is non merely a mark of competent unwritten eating accomplishments but is a necessary criterion for discharge preparedness from the NICU ( McGrath & A ; Braescu, 2004 ) . For nurses in the NICU the ability to orally feed a preterm baby is a many-sided undertaking necessitating successful attainment of a battalion of accomplishments: the proficiently to measure preterm baby eating accomplishments, clinical proficiency at preterm baby eating and proficiency in finding unwritten eating preparedness. On the other manus, the ability to orally feed is a complex undertaking for the preterm baby in the NICU every bit good. Questions often arise in the clinical sphere related to unwritten feeding preparedness of the preterm baby including those of physiologic adulthood, motor and province stableness, and the baby ‘s capableness of interactions with the environment and health professionals. All of these factors contribute to the underlying conceptual inquiry: should oral eatings be attempted? In embarking to reply this inquiry, a figure of instruments have been developed over the old ages to mensurate unwritten feeding preparedness of preterm babies in the NICU scene. Most of these instruments refer to the conceptual facet of unwritten feeding preparedness without specific usage of any theory as a footing for formal instrumentality. However, each of these tools was designed to help in supplying a clearer apprehension of the indispensable elements of unwritten feeding preparedness in the preterm baby as they apply to daily eating patterns. By integrating unwritten eating preparedness into NICU nursing pattern, intercessions that are grounds based can back up day-to-day nursing intercessions and will finally ensue in results that support infant good being and preparedness for discharge to place. Description of Instruments The unwritten eating preparedness tools being described were identified by seeking the PubMed, Ovid Medline and CINHAL databases for articles written in English and published between 1980 and 2011. The keywords used for the hunt were unwritten eating, preparedness, preterm, preterm eating measuring, feeding assessment tool and feeding instrument. The footings were used separately and in combinations. Electronic hunts produced three eating tools for preterm newborns related to bottle eating as the primary method of unwritten eating: the Early Feeding Skills Assessment ( EFS ) ( Thoyre, Shaker & A ; Pridham, 2005 ) , the Neonatal Oral-Motor Assessment Scale ( NOMAS ) ( Braun & A ; Palmer, 1986 ) , and the Oral Feeding Skills in Preterm Infants ( OFS ) ( Lau & A ; Smith, 2011 ) .The Early Feeding Skills Assessment for Preterm InfantsTheoretical Underpinnings The Early Feeding Skills Assessment ( EFS ) for preterm babies is a checklist for profiling a preterm baby ‘s developmental phase sing specific feeding accomplishments. It has been described as an â€Å" evidence-referenced tool † ( Sheppard & A ; Fletcher, 2007, p. 206 ) for detecting unwritten eatings by chest or bottle. Items on the checklist refer to theoretical facets of unwritten feeding preparedness: unwritten eating preparedness, ability to stay occupied in feeding, ability to organize swallowing and external respiration, ability to form unwritten motor operation, ability to keep physiologic stableness and unwritten eating recovery ( Sheppard & A ; Fletcher, 2007 ) . There is no published information sing a connexion between a peculiar theory and the beginning or design of the EFS. Instrument Data Collection The EFS is a thirty-six point experimental measuring tool that can be used from the â€Å" induction of unwritten feeding through ripening of unwritten eating accomplishment † ( Thoyre et al. , 2005, p. 8 ) . It is divided into three subdivisions: unwritten eating preparedness, unwritten eating accomplishment, and unwritten eating recovery. The EFS is scored based on observation of an full eating with each point holding scaled picks of yes-no, never-occasionally-often, or all-most-some-none. The first subdivision is the unwritten eating preparedness subdivision. This subdivision consists of five points and assesses whether the baby has province and motor control to back up orally feeding. If all replies to the five points are yes, the baby is fed orally. If the replies are non all yes, intercessions to fix for unwritten eating can be recommended and accordingly provided. The following subdivision is the unwritten eating accomplishment subdivision. This subdivision assesses four countries felt to be critical for successful eating: the ability to stay occupied during feeding ( three points ) , the ability to form oral-motor operation ( seven points ) , the ability to organize suck-swallow-breathing ( six points ) , and the ability to keep physiologic stableness ( 11 points ) . The unwritten eating recovery subdivision is three points that are completed five proceedingss after the eating session has ended and evaluates the impact of the eating on the baby ‘s province, motor and physiologic control. The EFS besides provides an country at the terminal of the signifier for feeding forms ( e.g. , type mammilla, length and volume of feeding ) and caregiver feeding schemes ( e.g. , chin support, cheek support ) . The method of hiting is non available in any of the published articles depicting the tool, nevertheless a preparation class for usage of the EFS is offered nationally by the instrument developers. Dependability and Validity Thoyre et Al. ( 2005 ) study that content cogency of the EFS â€Å" has been established with adept neonatal nurses and unwritten eating research workers † ( p. 8 ) and that â€Å" intra- and interrater dependability have been found to be stable and acceptable † ( p. 8 ) . The instrument ‘s developers besides report that prognostic, coincident and concept cogency are presently being tested. To day of the month, no informations sing any of these facets of the EFS has been published. Related Surveies Although this instrument has been available for usage since 2005, no surveies using or measuring the unity of this instrument were located in an electronic hunt of PubMed, Ovid Medline and CINHAL databases.Neonatal Oral Motor Assessment ScaleTheoretical Underpinnings The NOMAS was designed to place and quantify neonatal non-nutritive and alimentary oral-motor sucking forms by professionals that are specifically trained to utilize this instrument as a method of quantifying an baby ‘s oral-motor accomplishments. The theoretical underpinnings are those related to infant sucking accomplishments: most feeding troubles in preterm babies are caused by immature or unequal suck-swallow-breathe coordination and direct appraisal of suction and sup can be described by agencies of assorted non-invasive, experimental steps of physiologic parametric quantities. These theoretical underpinnings are the footing for the undermentioned three premises sing instrument result measurings of the NOMAS: ( 1 ) normal suction forms are displayed by babies who display coordinated suction, sup and breathe mechanisms during alimentary and non-nutritive suction, ( 2 ) a disorganised suction form may be displayed in the presence of an baby ‘s inability to organize su ction, sup and breathe mechanisms, and ( 3 ) a dysfunctional suction form may be displayed by baby ‘s exhibiting unnatural jaw and lingua motions, as is the instance with babies diagnosed with neurologic upsets ( Costa & A ; Schans, 2007 ) . Instrument Data Collection The current NOMAS instrument consists of a 28 point checklist placing features of jaw motion and features of lingua motion which organizes a newborn ‘s oral-motor forms during alimentary sucking into one of three classs: normal, disorganized or dysfunctional. The baby ‘s suction accomplishment is assessed by a trained NOMAS perceiver for two proceedingss during non-nutritive sucking anterior to feeding and during the first five proceedingss of regular eating. The trained NOMAS perceiver does non touch the baby, but simply observes the figure of sucking motions during one sucking explosion and the continuance of intermissions between turns of sucking. Jaw and lingua motions are besides analyzed as a constituent of the checklist. Observed oral-motor forms are marked on the listed behaviours and babies are classified into normal, disorganized or dysfunctional harmonizing to the behaviours that are marked. The hiting method has been revised several times since it was foremost reported by Braun & A ; Palmer in 1985 and badness evaluations for the disorganised and dysfunctional classs were included in the revised version, nevertheless, no numerical marking method is used to day of the month ( Howe, Lin, Fu, Su & A ; Hsieh, 2008 ) . Dependability and Validity In several dependability surveies, inter-rater dependability utilizing Cronbach ‘s i was found to be 0.93-0.97 ( Case-Smith et al. , 1988 & A ; Palmer et al. , 1993 ) . Test-retest dependability was determined by Case-Smith ( 1988 ) to be 0.67 – 0.82 when used in a survey of 26 babies with feeding jobs. Construct and prognostic cogency has been supported by multiple surveies for all classs of the NOMAS ( Braun & A ; Palmer, 1985 ; Case-Smith et al. , 1989 ; Howe et al. , 2007, & A ; Palmer & A ; Heyman, 1999 ) . Related Surveies There are several documented surveies that utilize the NOMAS instrument. The three that will be described here are current surveies that have been published within the past five old ages and are relevant to the usage of NOMAS with the preterm population of babies. In the 2007 survey by Howe, Sheu, Hinojosa, Lin & A ; Holzman, the NOMAS was used to mensurate unwritten motor accomplishments in order to find factors related to bottle-feeding public presentation in preterm babies. A sum of 116 preterm babies were included in the survey and research workers found that babies who need more unwritten support during eatings and those who have disorganized oral-motor accomplishments tend to take lower volumes of eatings orally. In contrast, babies with more feeding experiences are able to take higher unwritten volumes. These findings are of import in the designation of feeding experience and feeding techniques as being built-in constituents of a preterm baby ‘s unwritten eating public presentation. In Howe, Sheu, Hsieh & A ; Hseih ‘s 2007 survey sing the psychometric features of the NOMAS in healthy preterm babies, the writers examined the dependability, cogency and reactivity of the NOMAS in healthy preterm babies as the intents of the survey. The survey consisted of 147 medically stable preterm babies. Feeding public presentations were assessed and documented by an occupational healer trained in the disposal of the NOMAS. The writers concluded that the NOMAS demonstrated acceptable degrees of cogency and reactivity in preterm babies from 32 to 35 hebdomads postmenstrual age ( PMA ) but hapless cogency for babies 36 hebdomads PMA in the normal and disorganised classs. The writers suggested farther proof research in response to the findings of this survey. In Bingham, Ashikaga & A ; Abbasi ‘s survey ( 2010 ) using the NOMAS, 51 preterm babies were evaluated for correlativity of non-nutritive sucking accomplishments with subsequent feeding public presentation. The NOMAS marking was performed by NOMAS-certified healers and NICU nurses within 72 hours of successful induction of unwritten eatings. Findingss were implicative that NOMAS hiting at the induction of unwritten eatings was non significantly associated with the accomplishment of feeding milepost results being measured in the survey including clip from induction of unwritten eatings to clip of sole unwritten eatings.Oral Feeding Skills in Preterm BabiesTheoretical Underpinnings The developers of the OFS tool identify two basic theoretical underpinnings of unwritten eating that health professionals are faced with when turn toing the determination of unwritten feeding preparedness: the ability of the baby to finish the eating safely and the appropriate rate of promotion to sole unwritten eating. They propose that the OFS tool offers an nonsubjective index of an baby ‘s ability to orally feed by combing proficiency of unwritten feeding with minimum weariness and rate of milk transportation as a contemplation of feeding accomplishment ( Lau & A ; Smith, 2011, p. 64 ) . They do non depict a peculiar theory in connexion to the beginning or design of the OFS tool. Instrument Data Collection Data aggregation for the OFS is comparatively simple and no specialised preparation is needed. Caregivers document the prescribed volume of a eating in millilitres, the volume of feeding taken orally at 5 proceedingss into the eating, the full unwritten volume that is taken and the clip in proceedingss that it takes an baby to orally feed in that peculiar eating session. Proficiency ( PRO ) is calculated as the per centum entire volume taken in the first 5 proceedingss divided by the entire prescribed volume. The rate of milk transportation ( RT ) is calculated as the volume in millilitres ( milliliter ) that is taken orally divided by the figure of proceedingss to take this volume. PRO is so used to index existent eating ability when weariness is minimum ( within the first five proceedingss of unwritten eating ) and RT is used as an index of endurance ( being affected by weariness ) . The OFS tool is divided into four degrees runing from degree one to level four. Level one is low pr oficiency and low endurance, degree two is low proficiency and high endurance, degree three is high proficiency and low endurance and degree four is high proficiency and high endurance. A PRO greater than 30 per centum is defined as high proficiency while a PRO less than 30 per centum is defined as low proficiency. An RT greater than one and a half milliliter per minute is defined as a high endurance while an RT less than one and a half milliliter per minute is defined as low endurance. Potential intercessions are recommended for unwritten eating therapy at each accomplishment degree with the end of heightening existent eating accomplishment. Dependability and Validity To day of the month, no information sing dependability or cogency of the OFS has been published. The 2011 survey by the developers did show that OFS degrees had a important positive correlativity with an baby ‘s feeding public presentation and gestational age strata ( p & lt ; 0.001 ) and had a important opposite association with yearss from the start of unwritten eatings until independent unwritten eatings ( P & lt ; 0.002 ) ( Lau & A ; Smith, 2007, p. 68 ) . Related Surveies This instrument was ab initio described in 1997, nevertheless, the prospective survey published by the developers in January 2011 was designed for the intent of utilizing the EFS as an nonsubjective tool for the appraisal of a preterm baby ‘s unwritten eating accomplishments. No other surveies using or measuring the unity of this instrument beyond the initial development were located in an electronic hunt of PubMed, Ovid Medline, and CINHAL databases. DecisionRelevance to Future StudiesEach of the instruments antecedently described has advantages and disadvantages as an instrument for measuring unwritten eating preparedness. Both the EFS and the NOMAS necessitate specialised preparation in order to be able to utilize them as a valid instrument of unwritten eating ability, whereas the OFS is a simple tool that is designed for usage by any caretaker of preterm babies having unwritten eatings. Neither the EFS nor the OFS has been used in any published clinical survey nor do they hold published dependability or cogency grounds. The NOMAS, on the other manus, has been examined more thoroughly and has multiple internal consistence, dependability and cogency surveies to back up its usage. Another concern of all three instruments is that they differ in both the designation of measureable factors that contribute to readiness for unwritten eatings and in factors lending to success at unwritten eatings, doing comparings between these instrum ents hard. One common happening when measuring each of these tools, nevertheless, is the fact that unwritten eating preparedness is a complex construct affecting a battalion of factors for consideration. Instruments to help with the measuring of this construct demand to be consistent with their theoretical underpinnings and construct analyses in order to be able to supply consistent, valid and dependable results that can be farther utilized for future research and farther construct elucidation. Well-designed surveies are needed to measure the cogency and dependability of both the EFS and the OFS as instruments of mensurating unwritten eating ability. Research workers should besides see utilizing one of these instruments in future surveies to prove the feasibleness and effectivity of intercessions that are designed to back up unwritten eating preparedness. Awareness and understanding of indispensable elements of the construct of unwritten feeding preparedness in preterm babies is necessary and w ill supply for farther elucidation of unwritten eating preparedness. It will besides take to greater consistence in the proviso of evidence-based nursing attention during feeding times for preterm babies hospitalized in the NICU.Greatest LearningThis activity was much more complex and involved than I originally thought it would be. I was cognizant of the fact that there were several instruments to mensurate unwritten eating preparedness in preterm babies, but was non cognizant of the changing theoretical underpinnings and by differences between these instruments in really mensurating unwritten eating preparedness and differences in general construct elucidation. I was besides non cognizant of the preparation involved for the usage of some of these instruments, either. The necessary preparation is non merely an added disbursal, but it adds to the trouble in being able to implement their usage in a big NICU scene such as the one I presently work in. We have a staff of 127 staff nurses who routinely orally feed babes as a constituent of clinical nursing attention. It would be really hard, every bit good as dearly-won, to develop every nurse in a sensible sum of clip without even sing turnover rates and the demand to develop new staff every bit good. A simpler instrument such as the OFS would be of greater benefit to nursing staff given current staffing tendencies and nurse to patient ratios at feeding times. I besides now realize that in order for an instrument to be able to sufficiently mensurate a construct, the construct must hold been sufficiently analyzed and the instrument must be valid and dependable as a measuring of the construct at manus every bit good as being simplistic to utilize. If this does non go on, consequences have a much higher chance of being erroneous and so the construct that is being measured merely becomes more ill-defined.

Tuesday, July 30, 2019

Economic Impacts Essay

The Attack on the World Trade Centre in Manhattan had happened on September 11, 2001. The attack had led to the destruction of numerous buildings and lost of lives. This had greatly affected not only the citizens of the United States. The incident had also affected the economy of the country. According to the report of Mr. George Kahn (2001) , the vice-president   and economist of Federal Reserve Bank of Kansas, US economic growth had already slowed dramatically. Based on the experiences in the year 1996 to 1999, a growth in the GDP has been experienced. It is only logical to think that GDP will continue to rise in the next few years. However, Real GDP has slowed to a 2.8% rate of growth last year. Unemployment had moved down from 3.9% in th year 2000 to 4.9% in August. The slowdown in the economy had led to unexpected increase in energy prices and re-evaluation of the prospects for corporate earnings. Prices in the stock market have been affected, and consumer spending began to slow down. In early September, prices on energy began to stabilize and consumer spending had hold-up. Although manufacturing activity continued to decline but in a slower rate as compared to what happened in the early part of the year. However, this has all changed after the attack in September 11. 2001. Looney (2002) has used categories to differentiate the different economic impacts of the attack in the United States. His categories were based on two types. First is the nature of the impact and second is the length of time the economy has affected the country. In this paper, the author would use the length of time the impact has on the economy. These effects would be divided into three parts: The short-term impact, the medium-term impact and the long-term impact. Short-term impacts of the economy can be further categorized into two. These are the immediate short-term direct impact and the immediate short-term indirect impact. Looney (2002) had enumerated several short-term impacts after the September 11, 2001 attack. For the immediate short-term direct impact, it was stated that Lower Manhattan of New York had lost an approximate of 30% of its office space because of the attack. Reports stated that an estimate of 200,000 were destroyed or relocated out of New York City. Estimated cost of destruction of physical assets in businesses amounts to $ 14Billion for private business, $ 1.7Billion for the local and state assets and $ 0.8Billion for federal enterprises. Rescue, cleanup operations and other cost related to these two is approximately $11 Billion. Total direct costs as computed by Looney (2002) in the article, is estimated to be at around $27.2 Billion. However, Mr. Alan Hevesi, had considered other factors that was not included in the article of Robert Looney. Hevesi (2001) considered the lost of human capital which is estimated to be at $11 billion. These are the lives of the workers who had been killed during the attack. This figure is based on the expected earnings during the personâ€⠄¢s remaining work life. Indirect short term impacts of the attack are the following: Consensus forecast for the GDP growth of the US economy is lowered by 0.5 percentage points in the year 2001 and 1.2 percentage points in the year 2002. Implied projected cumulative lost from the attack up to the year 2003 is estimated to be half a trillion dollars. Private sector investments went down the same with their inventory levels. The attack had shown the government that an additional investment is needed for the security of the country. It is estimated that an increase of 9.25% in defense spending was used by the government. Firms such as security and information technology had increase in demand. Federal Reserve had lowered the price of credit and and temporarily liquidated their assets to safeguard the integrity of the financial system and save businesses from bankruptcy. Aside from the impacts stated above by Looney (2002), Hevesi included factors such as disabilities and trauma to be at $3Billion, business interruption, training and liability losses to be at $21 Billion, Net Lost Rents of $ 1.05 Billion from both the damaged and destroyed buildings and Lost wages which amounts to $9.6 Billion In the medium term, Looney had defined several sectors that had been affected by the attacks. Five areas were highlighted on his report and these are the Insurance, Airlines, Tourism and other service industries, Shipping, and Defense. Losses of the Insurance industry are estimated to be at $30 to $58 Billion. These losses are the highest record in the history of the country. Primary insurers have increased their premiums and dropped their coverages for terrorism related risk, this in turn had affected other key industries. Strongest impacts of the insurance were seen in the aviation, tourism, transportation, construction and energy generation sectors. Commercial property and liability insurance rates have been raised by 30% on the average. The terrorist had used airplanes in order to trigger the attack on the World Trade Center and the Pentagon. This had lead in putting the aviation industry in a weak position. An estimate of 20% decrease on the service orders had been ecperienced by airlines. Government support and airline passenger traffic was below normal and an estimate of 100,000 layoffs has been announced. Employment opportunities which were normally up in October and November fell by 80,000 or an estimate of 8% from the expected. Another sector that has been greatly affected is the tourism and service sector. These include hotels, tours, automobile rentals, travel agencies, and civilian aircraft manufacturers. As stated by Looney (2002), hotels have reported higher vacancy rates and employment in the sector as a whole fell by 58,000 in October and November. Relative Equity Values declined by 15%. Preliminary report of Fiscal Policy Institute in New York (2001) included attendance of people in the Broadway theatres had also decreased.. The Shipping sector was in a way affected by the attack, Maritime shipping rates had increased from 5 to 10 percent on average in the two weeks after the attack. Relative stability of freight rates ,despite the decrease in fuel costs and under-utilized capacity of the ships implied that transportation cost had increased because of the attacks Defense sector had experienced a significant increase on security-related programs in the budget for the year 2003. An additional budget of $48Billion was proposed for national defense. Homeland security budget was also increased from $20 Billion in 2001 to $38 Billion in 2002. An enhancement on the training of first responders which are the fireman, police and rescue workers were done, total preparation amounted to $8 Billion for domestic defense spending. The Fiscal Policy Institute or FPI (2001) included in their report losses on advertising because after the attacks commercial runs on television networks were cut down. FPI (2001) had estimated that there would be a 1,000 reduction in advertising employment and a 3% drop of revenues would be experienced by the advertising sector. Looney (2002), enumerated five effects in the   economy. These effects are higher operating costs, higher level of inventories, higher risk premium, Shift of resources t the military defense, and the shift away from globalization. As stated above, several increase in spending for defense had been experienced by the country, and higher insurance premiums were also done in the industry.   The attacks and also led to longer wait for time activities because several sectors and consumers are already cautious. These three reasons had led economist to say that higher operating costs maybe experienced by the industries in the country. Since businesses had been interrupted because of the attacks, several companies were not able to resume immediately. Businesses may be required to hold larger inventories at scale for fear that their suppliers may not be able to give the materials that they needed on time. An evidence on these was shown in the article of Looney wherein the auto industry production was interrupted because availability   of components were not immediately shipped out because of the delays in the crossing of the US-Canada Borders. The attack may have lead investors to avoid risking their money in businesses. As a result, higher risk premiums may be passed on to businesses in the form of higher interest rates, and lower equity prices. This could also lead to lower equity prices, business investment lowering and smaller capital stocks. The attack had been a terrorism activity. In response to this issue, the government would most likely divert their attention in strengthening the country’s defense through the military. Many resources may be diverted to military use. Research and Development Resources can be also shifted to concentrate on the development of new devices to thwart terrorism activities. Since there had been interruption in the cross-borders of the country, investors may think twice in investing abroad and concentrate on domestic investments. During this time, the â€Å"anthrax† scare is already being shown in the media. Several investors and the government may have taken this into consideration as such higher cost could be experienced because the businesses and the government would closely inspect items going in and out of the country. In the Chicago GSB magazine, the authors have included economic recovery for the country. According to Kevin Murphy, part of the debate team, expected recovery of the economy may occur within 15 months after the attack. Measured loss in the economy is estimated to be at 0.6% of the total asset of the country. Judging from the percentage of economic loss, the percentage shows a very minimal figure. Gary S. Becker, another part of the team had also stated that the country had retained basically all the human capital prior to the attack and because of this, the US economy would recover fully. It has been 6 years since the attack of the terrorist in the United States. Prior to the attack the economy of the country is already in the decline stage and this had been accelerated by the attack in the World Trade Center. Although the attack had greatly affected the economy, it is necessary to think on the before situation of the country because that situation had also affected the impact of the attack. The economy of the United States had already recovered since then, however, same security measures are still being by the country to address the issue of terrorism.

Dawn Riley Essay

CEO of America True, Dawn Riley, faces several issues of various criticalities that require careful decision making. The preeminent decision that Dawn Riley faces is whether or not to spend limited funds and resources on upgrading Tag, their training boat. Concurrent with that decision, Dawn is facing several other issues and challenges that need to be addressed. In order to address each of the challenges, a standard issues matrix used below highlights the severity of an issue and the likelihood of it requiring immediate or drastic action. Red: Critical and require immediate management action or decisions Yellow: Lesser critical nature, requiring monitoring of controls to ensure that controls stay in place and does not lead to a more critical ranking. Orange: Lesser critical nature, requiring monitoring of controls and process improvement. Maroon: Issue of a least critical nature – more related to Operational Housekeeping then control concerns. Issue Analysis The issues are divided into two primary areas, leadership and technical. The technical issues include design changes and costs, determining the A-Team, how to manage constructability reviews between the sailing team and the design team, and funding challenges. Each of these issues has a technical solution that can be managed through a process or controls change. The former area, leadership, deals with Dawn Riley’s role in the team and how she shepherds the America True team through these challenges and are solved through adjusting leadership styles. Technical Issues: Funding: Part of Dawn Riley’s role is to prioritize the available budget and to seek new sources of funding. This is a constant source of strain as re-design efforts take additional funding as â€Å"there was a common perception that syndicates with unlimited resources could â€Å"outgrunt† other syndicates by making limitless adjustments. This issue is critical and requires constant management oversight and controls. The action here would be making â€Å"judicious decisions† on how to spend the funds. Tag Upgrade: America True was a smaller syndicate than normal, and their designer Kaiko could not be performing two tasks at once, designing a new part for Tag, or designing a new raceboat keel. This issue would also have implications on funding. This was a critical issue and required executive action to solve. Constructability Reviews: Fostering communication between the designers and the sailors was listed as a potential problem area given that â€Å"sailors ca n get the feeling that designers are too far removed from the problem.† However, in the same token, the sailors also felt that they could contribute more than previous experiences. This is an important issue that probably requires more monitoring than corrective action. A-Team members & Sexism: There was a limited amount of tension between A team and B team members compared to other syndicates. However, â€Å"some of the men who were afraid there would be a â€Å"quota† of women on the raceboat.† For this reason Picking A-Team members and Sexism were identified as a joint issue. Dawn faced the challenge of picking a team that was best qualified and not perceived to have favoritism or quota’s determining who would be on the boat. This is a delicate issue as lack of confidence in your team members and the selection process could lead to a breakdown of trust, one of the first symptoms of Dysfunction in a team. This is a particularly sensitive issue given that the entire issue rests entirely on personality dynamics which take leadership to successfully navigate. Leadership Issues Consensus Style of leadership: Since the outset of the project, Dawn Riley and her management team â€Å"had grown accustomed to making consensus-based decisions.† There are different times when Consensus style of leadership work well and there are times when it does not. The flaws inherent in it are obvious: time consuming, people can be hurt if their choice is not selected, etc. Tag Upgrade: This issue shows up also in the Leadership side of our issues ledger. Dawn is approaching this upgrade as though it is a singular event, however in reality it is a process that has been unfolding over time. â€Å"An â€Å"event† leader would mull in solitude, ask for advice, read reports, mull some more, then say yea or nay and send the organization off to make it happen.† In reality this decision is a process that has been unfolding over the 18 months that Dawn has been leading the team, and would have implications towards group dynamics, and affect the personal and professional relationships within the group. Riley’s leadership role in the pit: As the only Syndicate head who sailed with the crew, there is a certain amount of tension regarding her role on the boat. Even though Dawn recognized that her subordinate Cutler might have a certain amount of discomfort with Dawn in that position since she might step in to take over at any given time she chose to disregard that. Dawn’s role in the pit was to function as the â€Å"integrator† and was at a central position within the boat to react and direct as required. This suggests that Dawn likes to have a strong role on the boat similar to her role off the boat, in the middle of everything and in the know. Muddled Organizational Structure: Throughout the text, there are indications that the organizational structure is unclear or not scrupulously followed. There is no hierarchy to the organizational chart and while Dawn may make it believe it is clear on what her roles and responsibilities are, it appears that she muddles the roles herself given that there was a perception that people were â€Å"working for two masters.† Recommendations and Resolutions Were this in an earlier stage, then there would be a recommendation to solicit additional funding, however given the criticalities of the schedule and the need for the management team to focus on resolving other technical and management issues, it would be recommended that the Dawn and Chris Coffin make the decision to stay within their existing financial plan structure and field the best team they can. It is likely, given Dawn’s many responsibilities, that she could successfully attract additional sponsors unless she gave away other responsibilities regarding the team, which is unlikely to occur.

Monday, July 29, 2019

Charlotte Beers at Ogilvy & Mather Worldwide Research Paper - 1

Charlotte Beers at Ogilvy & Mather Worldwide - Research Paper Example Moreover, the analysis will seek to analyze the means by which Beers and her team members engaged in a creative process for developing division which will be elaborated upon. Finally, the analysis will consider whether or not Beers and her team effectively communicated the buy-in for all respective compliments of the question. Through such analysis, it is the hope of this author that the reader will gain a higher level of inference with respect to some of the best practices for business leadership and management as well as some of the key pitfalls that might exist with regards to a new CEO/leader seeking to affect key changes within an existing firm/organization. With respect to what Beers was attending to accomplish as CEO of the firm in question, it can definitively be stated that she sought to reengage a level of success and profitability that had been experienced in years past. As the case study defined, Ogilvy & Mather was once a market leader and exhibited best practices that served to promote its vision and name throughout the market (Starr, 2011). However, in the recent past, this level of profitability had diminished and the firm was no longer a market leader with respect to the specialty upon which it was founded. Crafting a new vision for an existing firm is oftentimes dangerous process. This is due to the fact that even though the current vision might not be effective, it is oftentimes not the fault of the vision itself; rather, it is the fault of the level of implementation that patient is experiencing. This was very much the case with regards to Beers and the way in which her team sought to extrapolate and redefine the existing vision of Olgilvy and Mather Worldwide. Similarly, as a function of crafting this particular approach, the years and her team went through a series of steps through which they assess the current vision and sought to approach whether or not it could continue to be relevant within the current environment. This was a highly

Sunday, July 28, 2019

Fashion writing - Oscar Fingal O'Flahertie Essay

Fashion writing - Oscar Fingal O'Flahertie - Essay Example The essay "Fashion writing - Oscar Fingal O'Flahertie" examines fashion writing of the Oscar Fingal O'Flahertie. The position thus presented him with an effective opportunity to influence the history of design and fashion through literatures, which had become the fastest growing medium. As an editor, Wilde understood his practice as a writer and therefore understood every word used analytically. Through this view, his first major activity at the news outlet was to vouch for the change of the name of the magazine. The magazine was prior to his employment called The Lady’s world, however with Wilde’s entry into the company, he argued that the word â€Å"lady† restricted the audience to a particular segment of the female audience. By changing the name from The Lady’s world to The woman’s world, Wilde arguably widened the audience f the magazine by targeting limitless female members of the society. For the two years that Wilde served as the editor of th e magazine, his contribution to the history of fashion and design was immense as he reached and influenced thousands of the magazine’s female readers. Wilde’s influence to fashion and design was through literature. He used his magazine to bring together top designers and their target audience thus proving the society with a seamless flow and changes in fashion. Prior to his assumption of office as the editor of the highly celebrated magazine, the term fashion befitted a specific caliber of women in the society. the society had few designers. who equally targeted the high society. fashion, design and trendy attires thus belonged to the society’s wealthy. Additionally, the absence of an effective means of communication complicated the development of fashion since both the designers and their markets lacked a medium of interaction through which they could share ideas thus shape the future of the profession. This made it difficult for fashion and design to spread to other societies. The rich had personal designers. Additionally, they maintained their interactions to the echelons of the society. This way, the rich domesticated fashion and design the expense of the middle class who as Wilde proved consisted of the majority and was therefore capable of changing the industry (Hollander, 1993). Wilde interacted with top designers and shared ideas with them. Even though he lacked fashion and design technical knowhow, he revolutionized the industry by providing the link between the designers and their markets through the media. Additionally, the lack of an effective media limited the interaction among designers. It was therefore difficult for the designers to consult and compare their designs among themselves. Through the magazine, Wilde interviewed and published hundreds of works by various designers. Through the magazine and the heightened interaction among the different tenets in the society, fashion and design became an interactive profession wit h more upcoming designers having a platform to socialize and share ideas with the established designers. The magazine demystified some of the misconceptions about the practice and the selective approach that most designers had adopted. The magazine widened the readership to the middle class female members of the society and in so doing drew the attention of the previously marginalized community as designers began targeting the class. Besides his role as the editor of the magazine, Wilde was also a playwright and managed a theatre. These provided the editor with an effective opportunity to infuse the two and use theatre to expand the

Saturday, July 27, 2019

Religion, Literature Essay Example | Topics and Well Written Essays - 1000 words

Religion, Literature - Essay Example However, after Nietzsche had developed an independent mind, their difference grew, as they perceived humanity and life through different perspectives. This paper delves into Nietzsche’s disappointment with Wagner and how his religious views diverged from Nietzsche’s views. Nietzsche describes Wagner as a musician who is the master than anyone he knows in the discovery of tones that are peculiar to tormented, oppressed, and suffering souls (Darby 56). Wagner could even give a speech to dumb misery. He could be master of everything that was small, but he refused to be this according to Nietzsche. Several other factors made Nietzsche disappointed in Wagner. The work begins by showing that he and Wagner were opposites (Darby 60). He goes on to state that the book was for psychologists and that all Germans were excluded from those he intended to read his books. This was most likely in reference to Wagner and his roots. Nietzsche then goes on to express his admiration for Wagner and his ability to express both his misery and suffering in his creations of short music. After this, he goes on to take a critical stand on Wagner’s attempt at large work production (Nikos 65). Nietzsche was also critically disappointed at the physical aspect of Wagner’s music (Nikos 65). He even went on to try to expose Wagner as more of an actor than of a composer. According to him, Wagner’s feet, lungs, heart, throat and intestines were affected uncomfortably. Nietzsche also says he was disappointed to discover that in Wagner’s music existed no pleasing melody or rhythm. Rather, Nietzsche contends, Wagner’s music was merely a way of enhancing gesturing and posing theatrically. Nietzsche also reveals that he wanted and desired profound, wanton, cheerful, roguish, graceful, and tender music. He reserves praise for Chopin, Peter Gast, Liszt and Rossini, and all Venetian music. He, in fact, ends the Intermezzo with his poem, Venice. He found the discussed qualities

Friday, July 26, 2019

Implement concepts from Piagets theory of cognitive development when Essay

Implement concepts from Piagets theory of cognitive development when teaching second or third graders the skill of regrouping when solving subtraction problems - Essay Example For example, if the task at hand is to teach the children to subtract eight from 21, the instructor should group ten of the blocks together, perhaps in a tower formation, and then grouping the additional 11 blocks together in a group that is laying flat on the desk or working surface. At this stage, if the child fully understands how to count far beyond ten, they will recognize and be able to express that the tower consists of ten different blocks. The instructor would then praise this accomplishment to reinforce motivation and cooperation and then ask the child to express the amount of blocks laying on the surface. They should correctly identify that there are eleven blocks by counting them out loud one by one. At this point, the instructor reinforces that the task is to subtract eight of these blocks from the different formations and then regroup the blocks into a different series. The instructor might remove only two blocks from the tower and then six more from those on the table to provide example. The child will recognize that the tower now contains only eight blocks and should be able to regroup the surface blocks to account for the additional six blocks needed to complete the equation of 21 – 8 = 13. When the child is given free rein to perform another subtraction task through regrouping, they should accurately recognize, as part of mastery of pre-operational and concrete operational understanding, how to regroup the different blocks to achieve a positive math outcome. The teacher, for students in this phase, will not be dealing with egocentric behaviors marked by those found in children who are in the pre-operational stage and should expect full cooperation to the regrouping tasks. By allowing the children to choose their own ordered sets of blocks, based on the specific math task, they will begin to develop the ability to perform these calculations in their

Thursday, July 25, 2019

Jewish History Questions Assignment Example | Topics and Well Written Essays - 1000 words

Jewish History Questions - Assignment Example The second wave occurred during the pre-civil war through the nineteenth century, and it included the Jews who came from the central European the Ashkenazim. Ashkenazim is the ancient name in Hebrew that means Germany. Thirdly, it occurred between 1880 and early 1920s this migration was from Russia and some parts of Eastern Europe, the Jewish community increased in population, in America. Between the period of 1880 and 1900, at least 1.4 million had arrived, compared with those that were there in the period of 1800 to 1880. It is during this period that the Jewish and Judaism culture were established in America. The wave of migration ended in 1920 due to the legislation that restricted migration (Jerome 10). Question # 2 The Jews had the challenge of opportunity cost, which was much higher in America than in Europe. It was very costly to make every hour attendance in the synagogue and observation of home religion. People reduced their synagogue attendance time and activities on relig ious rituals. The American Jews had a reduced intensity of time in observing their religion, and many of them stopped to observe kashrut. It is good to find that the Hebrew Congregation of America Union, the America United Synagogue Union and the Union of the Orthodox were made in the late 19th century (Jerome 13). The unions continue to dominate the religious life of the Jews up to this day. Question # 3 The population of the Jews in America is concentrated to the northeast with 44 percent of them living in the region of Mid-Atlantic and England. The Jews from America tend to be much older than the general population. About 14 percent of the Jews are foreign-born, but in 1970, it was higher with 23 percent.  Jews from America worry much about intermarriage and their identification as Jews. It is believed that, in 1990, the rate of intermarriage increased by 50 percent. In the year 2000 to the year 2001, the percentage recorded for intermarriage was 47 percent (Jerome 18). This re cord shows that the rate of intermarriage is increasing at a great rate.  

Wednesday, July 24, 2019

Leadership Essay Example | Topics and Well Written Essays - 750 words - 25

Leadership - Essay Example There must be procedures and policies that are vital in managing a program and therefore failure to successfully communicate these may interfere with success of the project. Workers need to understand basic information required in doing their jobs and therefore effective communication is really weighty in getting the job done. According to West (2012), there are always limited resources and time constraints that ought to be completed. Failure to accomplish project on time may indicate overall project failure and therefore all the resources both human and materials should be allocated in the most efficient way. Improper utilization of resources may break the smooth running of the project and eventually lead to terrible program failure. Also, resources and time play a major role in the estimation of the project. These two elements are very expensive and are the reason behind program budgeting and estimations. Failure to control resources and time may heighten the cost of the project. Indeed, resources and time are very important aspects of any project and are vital in determining long term health of the project. Managers are required to manage their conflicts democratically with a clear distinction between substantive and personal issues. In managing interpersonal conflicts, leaders need to be prepared with information that is more detailed and multiple alternatives to enhance the quality of their debate. Availability of more data, which are objective based, compel managers to focus on issues rather than personal matters or useless arguments rooted in ignorance. Inadequate information makes management rely mostly on guesses and baseless assumptions that do not help the program (West, 2012). Reliance on facts reduces involvement on personal issues and eventually interpersonal conflicts. In addition, administrators need to use humor and share a common goal in debates while maintaining a balanced power structure. Furthermore,

Houston Club tour report Assignment Example | Topics and Well Written Essays - 500 words

Houston Club tour report - Assignment Example Houston Club understands the importance of having a high number of members in order to keep it operational. In this case, the company has implemented an efficient membership marketing structure that has ensured that the club’s membership segment of golf club approximate 400 members, the country club has about 600 members, and there are about 1,000 members in the club’s dining, sporting, and business segment. In effect, the club appears to be doing well in an environment where some of the clubs were closing down in Florida. However, the club’s main advantage was that there were fewer clubs within its area of operations. For Houston Club, exclusivity is one of the marketing strategies that the company has utilized in order to gain more members than other clubs. In this case, the club has packaged itself as an exclusive Gentlemen’s Club, which is an important strategy of the club in differentiating itself from its competitors. Exclusivity is evident in the club’s facilities ranging from their rooms and other important features such as wine lockers stocked with some of the most expensive wines. The exclusivity makes more members want to join the club and become part of the elite. After identifying the importance of this strategy in gaining more members, the club consequently introduced three segments of membership with these three being golf club membership, country club membership, and the other segment drawing membership from people interested in dining, sporting, and business. In this way, the club has a capacity to market its membership across members with varying interests. Other than membership marketing strategy focusing on the club’s exclusivity, the PR team packaged offers from the club, sent invitations to the city’s law firms, and then focused on the oil, gas, and financial industries by sending invitations to members who were attracted to the packages offered by

Tuesday, July 23, 2019

Functional Shortterm Objectives Essay Example | Topics and Well Written Essays - 500 words

Functional Shortterm Objectives - Essay Example Upon, Amber's arrival to her day care center, she would be not provided with her favourite toy Jack-in-the-boxes. Instead she would be guided to the toys rack to choose and point out the toy she wants to play with. She would later on be shown the way to her play area. She would be instructed by her caregiver to move freely back and forth between her play area and toys rack as to alter her toy if she wants. Brandy's parents should set an example for Brandy to follow while requesting different objects. They should use words of requests in front of her. They should also instruct Brandy to use similar words to request her needs and wants. Brandy should be instructed on the different locations of her clothes inside her closet. She would also be taught the different types of clothes and possible usage for each type. She would be taught of the type of clothing that fits different destinations and activities.

Monday, July 22, 2019

Improved and reliable car technology Essay Example for Free

Improved and reliable car technology Essay This means it is much more appealing to travel, maybe to further places on the motorway network as it is so easy. This has an impact on travel and tourism as more people are willing to travel. Air Travel.   Dr. Hans von Ohain and Sir Frank Whittle are both recognized as being the co-inventors of the jet engine. Each worked separately and knew nothing of the others work. Hans von Ohain is considered the designer of the first operational turbojet engine. Frank Whittle was the first to register a patent for the turbojet engine in 1930. Hans von Ohain was granted a patent for his turbojet engine in 1936. However, Hans von Ohains jet was the first to fly in 1939. Frank Whittles jet first flew in 1941.   The development of pressurised cabins meant that there was a supply of air which then they could fly higher and get out of the troposphere where all the weather conditions affected the flight. As without the pressurised cabin, flights couldnt go above in to the stratosphere, into the thin air as there would be no air supply. This meant flights are more enjoyable and quicker, therefore more appealing to the public. Aircrafts can now reach heights of 30,000- 40,000 ft, whereas they could only reach heights of 15,000 ft. The Boeing 747, also popularly known as the jumbo jet, is the second largest passenger airliner after Airbus A380, but it remains the largest aircraft in commercial service. The 747 was born out of the explosion of the popularity of air travel in the 1960s. The enormous popularity of the Boeing 707 had revolutionised long distance travel in the world, and had began the concept of the global travel made possible by the jet revolution. The original design was a full length double decker. However, following issues with proposed evacuation routes, this idea was scrapped in favour of a wide-body design. Concorde 001 took off for the first test flight from Toulouse on March 2nd 1969 and the first supersonic flight followed on October 1st. As the flight program of the first development aircraft progressed as planned, 001 started off on a sales and demonstration tour beginning on September 4th 1971. Not until June 2nd 1972 did Concorde 002 follow suit with a sales tour of the Middle and Far East. Concorde 002 made the first visit to the United States in 1973, landing at the new Dallas/Fort Worth International Airport to commemorate its opening. Technological features. Many technological features common in the early 21st century airliners were first used in Concorde For speed optimization, Concorde featured:   Double-delta shaped wings   Thrust-by-wire engines, ancestor of todays FADEC controlled engines.   Droop nose section for good landing visibility For weight-saving and enhanced performance, Concorde featured:   Fully electrically controlled analogue fly-by-wire flight controls systems. I got this picture from: http://www. nationmaster. com/encyclopedia/Concorde * Computerised checking-in and baggage handling also makes going on holiday so much easier and more appealing for people to go on holiday. This therefore has an impact on travel and tourism as people are more willing and confident to go on holiday as everything is so much quicker and easier.   Sophisticated air traffic control makes going on a plane even safer as technological developments have vastly improved. This therefore gives people more confidence in flying and therefore more people do. I got this table from: http://www. air-quality-management. co. uk   This table shows how the quantity of people using air travel has increased since 1970. It has predicted the amount of passengers from 2010 to 2030. It also shows an increase. This is because it is becoming more popular to fly and as it is more comfortable, entertainment on the flight and its much quicker which makes it so much more appealing to fly. * The growth of regional airports has also increased due to the amount of people wanting to travel abroad. Airports have many facilities which make it easier for the public. There are monorails and coaches to the airport from the car parks that make it so much more accessible to get the airport. This is why the travel and tourism industry is increasing as everything including the facilities and ability to travel is much more efficient and easier. Conclusion. The impact air travel has had on the travel and tourism industry is significant. This is because since the 2nd world war planes have become bigger as so they can hold more people making flights cheaper. This means more people can afford to go on holiday to far destinations and also have the better quality journey. Therefore air travel has affected travel and tourism greatly. Sea Travel. * Sea travel has changed since the 2nd world war from the main form of global passenger transport to shorter-journey car ferries and cruises. This is because people use to go on a ferry to America because flying was very uncomfortable as technology was only developing. But when the jet engine and pressurised cabin were developed the need to go on the ferry was decreased as people could fly over instead, taking less time. This meant the ferry was not needed and so it became a cruise instead of like a `bus service`. * Ferries have become more popular due to the capacity of people they can get on them. This means that prices are reduced so it is more affordable for more people. Also as car ownership has increased the need for ferries which can hold cars is more important. The ferries such as the sea France Rodin and the Brittany ferries are good examples in which can take vehicles and loads to destinations. Each route has been specifically designed to save drivers large amounts of time and mileage, making us the logical choice of the professional. I got this picture and map from: http://www. brittanyferriesfreight. co. uk/ These are the offers Brittany Ferries include: Direct and cost-effective routes   More mileage-saving departure ports and destinations   A personal service offering individually tailored solutions. From abnormal loads to small vans Top quality food and on-board facilities This map shows where the ferry travels to. The wide choice of sailings enables people to choose the port most convenient for them, keeping driving to a minimum. The arrival ports also offer easy access to the major road networks in France and Spain, making driving on the continent easier. Ro-Ro ferries are the idea in which you take your vehicle onto the ferry and then when you get to the destination you can just `roll off`. This made it much easier and convenient as its a simple concept to use. Sir Christopher Cockerell was the inventor of the hovercraft in 1956. The hovercraft could carry twice as many passengers and vehicles, but this meant it was slower. The hover craft was replaced by the invention of the sea-cats. The sea cat would as it gets faster lift making the journey quicker. Compared to conventional ferries, the sea cat fleet of smaller, faster vessels results in fast loading and unloading coupled with the fact that all of the cross-Channel services are run from dedicated ports, makes travelling on the sea cat fast and hassle free experience. I got this picture from Google search on images under `sea cats`.   An issue which meant Health and Safety issues were considered was the landmark disaster of the Herald of free Enterprise. It capsized in the approaches to the Belgian port of Zeebrugge en route to Dover in England at 7. 05pm local time on March 6, 1987. At least 150 passengers and 38 members of the crew lost their lives, most inside the ship, from hypothermia, in the frigid water. The bow doors had been left open after departure and water flooded the car decks. The tragedy led to new safety regulations in the British ferry Industry. Conclusion. Sea travel has dramatically improved over the years since the 2nd world war where both the journey and safety wasnt good enough. Now ferries are very much more appealing to the public and offer a wide range of services. This means the public can Computerised Booking Systems. Before there was a computerised booking system, travel agents used to work with wall charts. On these charts they had lists of available different resorts and airlines. People had to write out tickets which werent very efficient. Today travel agents have a 1/4 of a million pounds worth of computer systems which they can use the website to gather useful information, quickly and efficiently. The technology also means travel agents such as Sunvil can make databases of their customers history in holidays. Another recent technology that has helped to increase the efficiency of booking a holiday is a global distribution system. This consists of a speedy dedicated-line access, a huge database of details including accommodation, travel, hotels and car hire. It is also global. This means the sales process is easier and more efficient. Global distribution Systems include: Worldspan. Worldspan provides worldwide electronic distribution of travel information, Internet products and connectivity, and e-commerce capabilities for travel agencies, travel service providers, and corporations.   Worldspan system provides approximately 16,000 travel agencies with travel data and booking capabilities for hundreds of the worlds leading travel service suppliers. Worldspan employ 2,500 people which show that the market is massive. It proves how big travel and tourism has become and how it is increasing. Amadeus. Amadeus offers a service in which the public can suit their holidays to themselves. This means information comes from all over the world to give the costumers the best chance of getting the holiday they want. The electronic information on Amadeus contains flight details, accommodation and dates in which are available. There are many online travel agents, these include: Expedia. Expedia is a virtual online travel agent which means you can book everything from you flight to hotel. Their aim is to replace high street travel agents.   Expedia also works with a GDS to get the results they want for their costumers. This has a booming impact on travel and tourism as it is so much easier to book a holiday as everything can be catered for, for your own personal needs. Sunvil Holidays.   Sunvil online offers a different service to Expedia as you cant book online whereas they offer a variety of holidays around the world. You can either book by phone or request to order a brochure. Sunvil have been operating holidays since 1970. They also offer unique tailor made travel options. This is what makes it ideal and appealing to potential costumers. Another technological development is e-ticketing. Here is the booth in which you enter your details into when you come to the airport. This means you dont need a paper ticket which gives you less things to worry about and loose. Once you have booked with the airline, you can check yourself in. this saves on time and is much more efficient. This relates to the ever growing industry of travel and tourism as everything is becoming easier and quicker to do. Making going away much more appealing to the public. (I got this picture form Google search on images. ) Conclusion. Computerised booking systems make it much easier for tourists going on holiday as it creates less hassle. This makes it much more engaging for the public. The technological development therefore relates to the increase of travel and tourism as going on holiday is so much more efficient to the technology. 3. Product Development and Innovation. Holiday camps. In the 1950`s Butlins was very popular and was the main idea for a family holiday. I got this leaflet from:http://www. butlinsmemories. com/6/id77. htm This is the leaflet from the 1950`s which states that this was the `real ` holiday that everyone wanted. This was the case then, when the concept of holidays was restricted to only the UK. Nine UK camps were built. They can be divided into three distinct eras: The pre-war camps of Skegness (1936) Clacton (1938), the wartime camps of Filey, Pwllheli and Ayr and the post-war camps of Mosney (1948), Bognor (1960), Minehead (1962) and Barry (1966). There were already quite a few holiday camps in existence but Billy Butiln took the concept to a whole new level by making them far bigger and by offering a previously unheard of range of entertainment and activities. The Butlin camps were really in a league of their own and were far larger than anything seen before or since. In the drab post-war years of mainland Britain the camps promised and delivered a world far removed from anything most people had experienced before. The brightly coloured buildings with exotic names, the seemingly endless list of entertainment and activities, the wonderful flower gardens, and all available for the equivalent of a weeks pay. Now Butlins has now become less popular as more people want to go abroad on long haul holidays as flights and accommodation is so cheap. Although, Butlins is trying to re-launch itself. It offers a range of cheap holiday with savings that will hopefully bring people back to enjoy the Butlin experience. As you can see from the screen print, the prices are low and are appealing to families to single adults looking for a good night entertainment also. I got this screen picture from: http://www. butlinsonline. co. uk/   Whereas Butlins was aimed at the working class, the new genre of holiday camps are aimed at the middle class. These camps include Centre Parcs and Oasis.   These camps offers accommodation suitable to the size of your family. The chalets are set into woodland making it very private. The main centre building offers everything from restaurants and bars to swimming pools all under one roof. Everything is very much more sophisticated than Butlins and is suited to families rather than single people. The family is a main target for travel and tourism and so centre parcs is making the most of the money that families have by accommodating for them. I got this screen print from: http://www. centerparcs. co. uk/   This screen print gives information on the resort and sells their concept well. Package holidays. * Package holidays developed in the 1960`s when jet travel was in force and people had more holiday time due to the holiday pay act by the government.

Sunday, July 21, 2019

A Remote Desktop Application For Android

A Remote Desktop Application For Android The aim of this project is to develop a simple-to-use remote desktop application which enables users to remote view contents of their desktop and view, create, edit and delete files and folders remotely. The application runs on a portable device (such as a cell-phone or tablet) which fully supports the Android mobile platform and is equipped with features like WiFi, touchscreen, document editor etc. An important goal of this endeavour is to keep the application user-friendly and easy-to-use. The application uses the same protocol as Microsoft Windows for file sharing. Thus, implementing and using the application in a domain environment where each user has access to specific files and folders makes sense. This also enables true mobility and control over the user-account in a university or office setting. In conclusion, the application works perfectly when the target remote machine is in the same network as the mobile device. For accessing a domain share, the device needs to be connected to the domain via VPN (Virtual Private Network). The application is expected to work in the same fashion with a VPN like it does over an actual network. Chapter 1 Introduction 1.1 Motivation In computing, the term remote desktop refers to software or an operating system characteristic which allows applications, often including graphical applications, to be run remotely on a server while being displayed locally (1). In practise, the term remote desktop has a very broad meaning which could pertain to any of the specific uses of this feature. Also, each implementation of programs that enable remote access is different as the services provided by each of them vary. Applications of remote desktop are numerous and depend on the setting in which it is used. An important use is in the domain environment where a central server machine (or group of servers) controls all the other clients that are connected to it. In such a situation, certain programs which need a lot of resources are run on the server and are accessed by the client computers via remote sharing. This approach eliminates the need for multiple licenses or expensive client machines. Network administrators can also use remote desktop to maintain and when required, troubleshoot a remote client machine. This reduces the need for a large number of technical support staff (2). Remote desktop also serves as a handy utility for the end-user. It allows an employee to work from home by making available the same set of software and settings which are provided at office. A student can access all their important files and documents stored at the university computer without being physically present anywhere near the campus. A novice user can get help with installation of particular software remotely from an expert (3). To use remote desktop, one needs specialised software. Though there are a plethora of remote desktop clients available for the desktop on all major operating systems, the options for mobile platforms are quite scarce. This is majorly due to a variety of operating systems in use and restricted resources available in mobile devices. In addition to it, the few usable solutions are either quite expensive or are no longer supported. This prompted me to take up the challenge of developing a practical, easy-to-use remote desktop application for the ultra-portable platform which needs no technical know-how to setup and run. Chapter 2 Literature Survey 2.1 The Android Platform Today, there exist a number of operating platforms for mobile devices. A majority of them are proprietary and are adopted by a handful of device manufacturers. Thus, developing for such platforms would provide little in way of commercial value to the application. Also, it will be available to only a small section of smartphone users. Porting the app to other mobile platforms is also not an alternative as this would require drastic changes in its code which would require additional man hours. An exception to the above mentioned problem is the Android platform for mobile devices. Android is a software stack for mobile devices that includes an operating system, middleware  [1]  and key applications (4). Android was originated by a group of companies known as the Open Handset Alliance, led by Google. Today, many more companies which involve cellular service providers, OEMs and developers have invested in Android and have adopted it for their products (5). As can be seen from the following figure, the architecture of the platform is no different from traditional PC architectures. Figure 1: The Android Architecture (Source: Wikimedia Commons) The lowest layer of the architecture consists of the Linux kernel which has all the drivers needed to communicate with the hardware. This layer is also called the Hardware abstraction layer. The layer above it has android core libraries written in C/C++. It also has the Dalvik virtual Machine which provides inter-process abstraction. On top of the libraries is the API  [2]  layer which enables component re-use and better application design. The topmost layer has all core applications which ship with the OS. An important attribute of the Android platform is that it is open-source. Thus, its source code is freely available which enables developers to use readily available APIs for developing robust applications quickly. Also, as the system requirements of Android are quite less, it is suitable for mid-range to ultra-high-end devices. As a result, Android can be seen in mobile phones, e-readers, PDAs and even netbooks (6). There is also an active developers community for Android which provides support via e-mail and web forums. Thus, it is not hard to see why Android provides an ideal platform for application development. Figure 2: A typical home-screen for Android devices (Source: developers.android.com) The screenshot above shows a home screen of an android device. This device is a mobile phone and thus has applications such as contacts, phone and messaging on the home screen. A variety of tablet computers, electronic book readers and netbook computers also use android and have icons relevant apps on the home screen. The white bar on the top is the notification bar which works the same way as the notification area in Microsoft windows. It displays battery level, signal strength, time and current network connection. 2.2 Android Application basics Applications for the android platform are written in the JAVA programming language. For deploying an application to a device, the java code is first compiled and then bundled into an android package which is in the .apk format. The latter operation is done by the Android Asset Packaging Tool or aapt. In Android, every application runs in its own Linux process. Android starts the process when any of the applications code needs to be executed, and shuts down the process when its no longer needed and system resources are required by other applications. Each process has its own virtual machine (VM), so application code runs in isolation from the code of all other applications. No other application is aware about the existence of the other. By default, each application is assigned a unique Linux user ID. Permissions are set so that the applications files are visible only to that user and only to the application itself. 2.3 Application components A unique feature of the android platform is that each application can use a feature provided by some other application without having to actually implement it. This encourages code-reuse and saves precious man hours spent in development. Unlike applications on most other systems, Android applications dont have a single entry point for everything in the application (no main() function, for example). Rather, they have essential components that the system can instantiate and run as needed. There are four types of components: 2.3.1 Activities An activity is a visual representation for any task that application intends to fulfil. For example, an activity could be a list of images in a gallery, a menu with settings for the user or a phonebook with contacts. An activity can spawn another activity whenever an event occurs. In the phonebook activity, when a user clicks on a contact, another activity is created which allows the user to either call or send a text message to that contact. Each activity has a view associated with it. This view provides visual elements such as text fields, buttons, checkboxes etc. These elements might have some listeners associated with them which trigger an action when interacted with. 2.3.2 Services A service might not be visible to a user but it runs indefinitely in the background and could be used by an activity. For example, a service might play background music as the user attends to other matters, or it might fetch data over the network or calculate something and provide the result to activities that need it. A prime example is a media player playing songs from a play list. The player application would probably have one or more activities that allow the user to choose songs and start playing them. However, the music playback itself would not be handled by an activity because users will expect the music to keep playing even after they leave the player and begin something different. To keep the music going, the media player activity could start a service to run in the background. The system would then keep the music playback service running even after the activity that started it leaves the screen. Like activities and the other components, services run in the main thread of the application process. So that they wont block other components or the user interface, they often spawn another thread for time-consuming tasks (like music playback). 2.3.4 Broadcast receivers A broadcast receiver is a component that does nothing but receives and reacts to broadcast announcements. These announcements can be anything that are meant to inform user about occurrence of an event such as email arrival, low battery indication, change of track in the music player and so on. Applications can also initiate broadcasts for example, to let other applications know that some data has been downloaded to the device and is available for them to use. An application can have any number of broadcast receivers to respond to any announcements it considers important. Broadcast receivers do not display a user interface. However, they may start an activity in response to the information they receive, or they may use the Notification Manager to alert the user. Notifications can get the users attention in various ways flashing the backlight, vibrating the device, playing a sound, and so on. They typically place a persistent icon in the status bar, which users can open to get the message. 2.3.5 Content providers A content provider makes a specific set of the applications data available to other applications. They basically provide for interprocess communication. The content provider extends the ContentProvider base class to implement a standard set of methods that enable other applications to retrieve and store data of the type it controls. However, applications do not call these methods directly. Rather they use a ContentResolver object and call its methods instead. A ContentResolver can talk to any content provider to manage communication with processes. Whenever theres a request that should be handled by a particular component, Android makes sure that the application process of the component is running, starting it if necessary, and that an appropriate instance of the component is available, creating the instance if it is necessary. 2.4 A typical Android project directory structure Figure 1 shows the directory structure of an android project named filegetter. Here, the first folder src holds the java source files for the project. These files contain actual java code which is written by the developers. In this case, the source files are held in a package named hardik.test.browse. The package helps to keep the source files together allowing easy access to data and variable within the project. Figure 3: Directory structure of an Android project The next folder is gen which consists of auto generated java files. These files are generated when the project is build/compiled. Information about variables, strings and layouts are stored in these files. Android 1.6 is the build of the android platform against which the application is being created. This is important as each build has some special classes which may not be present in an earlier one. Referenced Libraries consists of list of all third party or external libraries used for our project. In our case, it will consist of the JCIFS library (explained later). The assests folder in generally unused and it may hold required files if needed. The res folder has drawable, layout and values subfolders. Drawable consists of icons and other graphical elements of the application and is divided into three subfolders according to resolution of target device. The layout folder holds .xml layout files which decide elements like button, text box, list etc. for the application. The values folder is used for providing id for different components of the application. The AndroidManifest.xml is an important element of an android project. In this file, all the activities and services of the application are described. Other elements such as application permissions for the application are also described. Finally, the default.properties file has an entry for the build of target devices for which the application is being developed. 2.5 Android in the Market According to a May report by market research group NDP, the Android operating system performed quite well in the first quarter (Q1) of 2010, moving past Apple to take the number-two position among smartphone operating systems. NPDs wireless market research reveals that based on unit sales to consumers last quarter the Android operating system moved into second position at 28% behind Research In Motions Blackberry OS (36%) and ahead of Apples OS (21%) (7). These figures indicate a rise in popularity in the android platform. Also a large range of available handsets means that consumers will be able to choose according to their needs and budgets. This increase in market share also means that more developers will be willing to develop for Android making it a competitive, mainstream product. 2.6 Remote Desktop Implementation Currently, there exist a variety of applications for PC which use either proprietary or generic/open-source protocols for remote desktop implementation. All of these applications are based on the server-client model where the server side of the software operates on the target machine and the client application is run on the remote host. Either of the machines may function as client or server provided both of them are equipped with required software. Figure 4: Implementation of a traditional client-server model (Source: acm.org) Various protocols can be used for remote access. Each of these provides a specific set of functionalities that may be common to another protocol or unique to that particular protocol. Listed below are some of the protocols used for remote access and file sharing. These are widely used in several desktop clients in the market today. 2.6.1 RDP (Remote Desktop Protocol) It is a proprietary protocol developed by Microsoft which provides remote display and input capabilities over network connections for windows-based applications running on a server (8). The RDP is encapsulated within the TCP layer and uses separate virtual channels for carrying data, licensing information, encrypted information and so on. All versions of windows after windows XP support Remote Desktop via RDP. But only the professional and ultimate versions come with the Remote Desktop Server program which enables a user to share their screen (9). 2.6.2 RFB (Remote Framebuffer) Protocol RFB is a simple protocol for remote access to graphical user interfaces. Because it works at the framebuffer level it is applicable to all windowing systems and applications, including Linux, Windows and Macintosh. It is primarily used by the VNC (Virtual Network Computing) software and its derivatives. By default, it uses TCP port 5900 for the client and port 5500 for the server (10). 2.6.3 SMB (Server Message Block) The Server Message Block (SMB) Protocol is a network file sharing protocol which allows a client application in a network to read and write files on and request services from the server on the same network. The SMB protocol requires a secure and encrypted authentication method and is thus more secure than other file sharing methods. Microsoft provides an SMB client and server with its Windows operating system. For Linux based systems, a utility called Samba is freely available for using the protocol (11). Chapter 3 Design One of the major hurdles faced in designing a remote access client is to decide upon the protocol to be used. Out of the available ones mentioned before, the RDP and SMB protocols allow screen-capturing of the remote machine onto the client device. This allows the user to interact with the desktop in real-time. Both these protocols have been implemented successfully in a variety of programs for all three popular (Windows, Mac OS and Linux) desktop platforms. Upon deciding the project, the intent was to use one of these protocols for the application. But the following difficulties were experienced during the development phase. 3.1 RDP and RFB Implementation issues 3.1.1 Absence of library classes While implementing either RDP or RFB, one can use the Robot class present in Java which can mimic the mouse, simulate keyboard interactions and capture the screen of a remote host over the network (12). This class is unfortunately absent in android and thus cannot be used. This makes it difficult to perform the above mentioned functions in android as no alternative classes exist. Current RFB and RDP implementations on Android have made use of similar projects on the desktop environment by forking  [3]  the source code from these projects. These existing projects use external libraries without proper documentation and at times are written in a non-java programming language. Thus, comprehending the original code and then forking it would take a lot more time than the projects duration. 3.1.2 Need for server side installation Both the protocols (RFB and RDP) required a server side program running on the target machine. This program is bundled with server editions of most operating systems but require purchase on all other editions. Also, there may be compatibility issues if the server is running a RDP implementation and the device has a client using the RFB protocol. This will result into failed communication between the server and the client. Due to the aforementioned issues, remote access will be implemented by using the SMB protocol. 3.2 Benefits of the SMB protocol An enhanced version of the SMB called CIFS  [4]  (Common Internet File Sharing) has been in place since Windows 2000 and it provides a host of features when compared to other such protocols (13). 3.2.1 Greater accessibility The SMB protocol for resource sharing has been used by Microsoft for their operating systems since Windows 95. In a domain environment, SMB is used to provide access to relevant resources to every user. In Linux too, a free utility called Samba which uses the SMB protocol, comes with most distributions. Thus, out-of-box functionality can be provided to any client requiring remote access. 3.2.2 Added security CIFS provides flexibility to allow anonymous transfers as well as secure, authenticated access to resources. Policies can also be easily managed and changed whenever required 3.2.3 Support for slow connection Access to shared resources and transfer of resources is also supported on slower connections. Thus, using a 3G or EDGE connection from a device will not be an issue while accessing remote files. 3.2.4 Performance and scalability CIFS servers are highly integrated with the operating system. Thus they function as part of the OS and not third party programs. This guarantees maximum system performance at all times (13). 3.3 SMB Authentication Method Authentication over SMB occurs mainly through the NTLM (NT Lan Manager) that works on systems using windows and on Linux/Unix distributions via the Samba server (14). NTLM is a challenge-response authentication protocol which uses three messages to authenticate a client in a connection oriented environment, and a fourth additional message if integrity is desired (15). The following figure shows exchange of messages between the client and server during authentication. Figure 5: Message sequence to authenticate an SMB session As seen in the above figure, the client negotiates protocol-specific options using the SMB_COM_NEGOTIATE request and the server replies with similar response messages as shown by (1) and (2) respectively. The client then sends an SMB_COM_SESSION_SETUP_ANDX request message. In cases where NTLM authentication is negotiated, within this message an NTLMNEGOTIATE_MESSAGE is embedded. The server responds with an SMB_COM_SESSION_SETUP_ANDX response message within which an NTLM CHALLENGE_MESSAGE is embedded. The message includes an 8-byte random number, called a challenge that the server generates and sends in the ServerChallenge field of the message. The client then extracts the ServerChallenge field from the NTLM CHALLENGE_MESSAGE and sends an NTLM AUTHENTICATE_MESSAGE to the server (embedded in an SMB_COM_SESSION_SETUP_ANDX request message). If the challenge and the response prove that the client knows the users password, the authentication succeeds and the clients security context is now established on the server. To acknowledge this, the server sends a success message embedded in an SMB_COM_SESSION_SETUP_ANDX response message. 3.4 SMB Packet Exchange The following lists an example of a packet exchange between a client and a server via the SMB protocol (16). The client and the server establish a NetBIOS  [5]  connection. The client and server negotiate the Microsoft SMB Protocol dialect. The client logs on to the server. The client connects to a share on the server. The client opens a file on the share. The client reads from the file The connection being full-duplex, file transfer can occur from both ends. Chapter 4 Implementation 4.1 Flowchart In any application, the flow diagram is an important figure that helps one visualize the interactions a user might have with the application and the possible outcomes of these interactions. Figure 6: Flowchart 4.2 UML Use Case diagram Use cases are used to identify and partition system functionality. They separate the system into actors and use cases. Actors represent roles that can are played by users of the system. Those users can be humans, other computers, pieces of hardware, or even other software systems. The only criterion is that they must be external to the part of the system being partitioned into use cases. These actors can interact with the system in a variety of ways which create various outputs. The outputs may be for the users or for other components of the system. Figure 7: Use cases The figure above shows a users interaction with the application. The user can access the Remote resources provided they are logged in to the remote share. Similarly, they can download a file to the local resources only if the file is present in the remote share. Chapter 5 Results 5.1 Experimental Setup For evaluating the results, the application was used on an android handset with Android platform version 2.2. The remote server was a laptop running windows 7. Files and folders were shared using the SMB protocol with mandatory authentication to all shared resources. The target machine and the mobile device were both connected to the same wireless network. 5.2 Application Screenshots Figure 8: On Start-up As seen above, the user is presented with a tabbed view with local file system selected. Different icons are used for various datatypes. Figure 9: Local Photo folder Seen above is the photo folder located on the memory card of the device. The two green arrows on the top represent up and back buttons which are used for navigation. Figure 10: Login screen Login screen on clicking the Remote tab. Figure 11: Unsuccessful login (pop-up appears) Figure 12: Remote download Downloading remote file to memory card on click. Figure 13: Operations on remote file Bibliography 1. Remote Desktop Software. Wikipedia. [Online] [Cited: 25 June 2010.] http://en.wikipedia.org/wiki/Remote_desktop_software. 2. Remote desktop. TopBits Tech Community. [Online] [Cited: 25 June 2010.] http://www.topbits.com/remote-desktop.html. 3. 5 Best Remote Desktop and administration application. TechieZone. [Online] [Cited: 25 June 2010.] http://techiezone.in/reviews/5-best-remote-desktop-and-administration-application/. 4. About the Android Open Source Project. Android. [Online] [Cited: 26 June 2010.] http://source.android.com/about/index.html. 5. Philosophy and Goals. Android. [Online] [Cited: 26 June 2010.] http://source.android.com/about/philosophy.html. 6. List of Android Devices. Wikipedia. [Online] [Cited: 26 July 2010.] http://en.wikipedia.org/wiki/List_of_Android_devices. 7. Android shakes up U.S. smartphone market. NDP. [Online] [Cited: 7 July 2010.] http://www.npd.com/press/releases/press_100510.html. 8. MSDN Remote Desktop Protocol. MSDN. [Online] [Cited: 4 July 2010.] http://msdn.microsoft.com/en-us/library/aa383015.aspx. 9. Understanding the Remote Desktop Protocol (RDP). Microsoft Support. [Online] [Cited: 5 July 2010.] http://support.microsoft.com/default.aspx?scid=kb;EN-US;q186607. 10. Richardson, Tristan. The RFB Protocol Version 3.8 (2009-11-24). RealVNC. [Online] [Cited: 10 July 2010.] http://www.realvnc.com/docs/rfbproto.pdf. 11. Server Message Block Protocol. Search Networking. [Online] [Cited: 25 July 2010.] http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci214214,00.html. 12. Java Remote Desktop Administration. The Code Project. [Online] [Cited: 21 July 2010.] http://www.codeproject.com/KB/IP/RemoteAdminJava.aspx. 13. CIFS. Protocol Base. [Online] [Cited: 20 July 2010.] http://www.protocolbase.net/protocols/protocol_CIFS.php. 14. Integrating additional services. Samba.org. [Online] [Cited: 2 August 2010.] http://www.samba.org/samba/docs/man/Samba-Guide/DomApps.html. 15. Microsoft NTLM. MSDN (Microsoft Developers Network). [Online] [Cited: 5 August 2010.] http://msdn.microsoft.com/en-us/library/aa378749(VS.85).aspx. 16. Microsoft SMB protocol packet exchange scenario. Microsoft Developers Network (MSDN). [Online] [Cited: 10 August 2010.] http://msdn.microsoft.com/en-us/library/aa365236(v=VS.85).aspx.

Industrial Pollution And Environmental Sustainability Environmental Sciences Essay

Industrial Pollution And Environmental Sustainability Environmental Sciences Essay Industrial pollution is one of the main causes of pollution worldwide. Apart from health hazards, water pollution due to discharge of contaminated water and global warming are some of the harmful effects of industrial pollution. Industry accounts for more than half the volume of all water pollution and for the most deadly pollutants. Some 370,000 manufacturing facilities in the United States of America alone use huge quantities of freshwater to carry away wastes of many kinds. The waste-bearing water, or effluent, is discharged into streams, lakes, or oceans, which in turn disperse the polluting substances. In its  National Water Quality Inventory,  reported to Congress in 1996, the U.S. Environmental Protection Agency concluded that approximately 40% of the nations surveyed lakes, rivers, and estuaries were too polluted for such basic uses as drinking supply, fishing, and swimming. The pollutants include grit,  asbestos, phosphates  and  nitrates,  mercury,  lead, caus tic soda and other sodium compounds,  sulfur  and  sulfuric acid, oils and  petrochemicals.(Sell, 1992) In addition, numerous manufacturing plants pour off undiluted corrosives, poisons, and other noxious byproducts. The construction industry discharges slurries of gypsum, cement, abrasives, metals, and poisonous solvents. Another pervasive group of contaminants entering food chains is the  polychlorinated biphenyl  (PCB) compounds, components of lubricants, plastic wrappers, and adhesives. In yet another instance of pollution, hot water discharged by factories and power plants cause thermal pollution by increasing water temperatures. This increase changes the level of oxygen dissolved in a body of water, thereby disrupting the waters ecological balance, killing off some plant and animal species while encouraging the overgrowth of others. Global warming is one of the most common and serious consequences of industrial pollution. The emission of various  greenhouse  gases such as CO2, methane (CH4), among others from various industries, increases the overall temperature of the earth, resulting in global warming. Global warming has various serious hazards, both on the environment as well as on human health. It results in melting of glaciers and snow-capped mountains, causing an increase of the water levels in seas and rivers, thereby increasing the chances of flood. Apart from this, global warming also has numerous health risks on humans, such as increase of diseases such as malaria and dengue, cholera, Lyme disease and plague, among others.(Freeman, 1995) Industrial pollution, as stated above, is one of the major causes of air pollution. With the increase in the number of industries and factories due to the industrial revolution; air pollution also has increased significantly. The emissions from various industries contain large amounts of gases such as carbon dioxide, sulphur and nitrogen, among others. These gases, when present in elevated levels in the atmosphere, often result in various environmental and health hazards such as acid rain, and various skin disorders in individuals.(Freeman, 1995) Pollution emitted from the industries is also one of the major factors contributing towards water pollution. Dumping of various industrial waste products into water sources, and improper contamination of industrial wastes, often result in polluting the water. Such water pollution disturbs the balance of the ecosystem inside, resulting in the death of various animal and plant species present in the water.(Freeman, 1995) Soil pollution is defined as a phenomenon is which the soil loses its structure and fertility due to various natural and artificial reasons. Dumping of industrial wastes is one of the prime factors contributing towards soil pollution. Industrial wastes contain large amounts of various chemicals which get accumulated on the top layer of the soil, resulting in loss of fertility of the soil. Such loss of fertility ultimately results in changes in the ecological balances of the environment due to reduction in plant growth.(Freeman, 1995) Other Common Effects Certain other common effects of industrial pollution include damaging  building sand structures, increasing the risk of various occupational hazards such as asbestosis, pneumoconiosis, among others.(Freeman, 1995) Pollution of Love Canal The infamous case of the pollution of Love Canal, on Lake Erie in New York, brought environmental pollution to the public attention in the 1970s. From 1942 to 1953, several chemical companies dumped 20,000 metric tons of chemical waste at this site. In 1953 the land was sold to the local board of education, and the 99th Street School was constructed on the land. The school attracted families to the neighborhood, which grew to contain 800 single-family homes and 240 apartment units by 1978. Unfortunately, eighty different chemicals, including dioxins and polychlorinated biphenyls (PCBs), started to leach through the soil, and residents began complaining of odd smells in their houses and experiencing many unexplainable health problems. The school was closed in August 1978, and the federal government contributed $10 million for the relocation of 200 families nearest the site. In 1980 President Carter sent additional funds, for the relocation of 700 more families.(Shen, 1999) Conclusion: Strict Legislation is required to control Industrial Pollution. In England and Wales, pollution from industrial installations has been controlled to some extent for over 150 years. The Pollution Prevention and Control (England and Wales) Regulations 2000 (the PPC Regulations) were introduced under the Pollution Prevention and Control Act 1999 and built on existing systems. The PPC Regulations replaced the pollution control regimes called Integrated Pollution Control (IPC) and Local Air Pollution Control which had been set up under Part I of the Environmental Protection Act 1990 (EPA 1990). The PPC Regulations also transposed the Integrated Pollution and Prevention and Control Directive (now Directive 2008/1/EC) the IPPC Directive. The primary aim of the IPPC Directive is to ensure a high level of environmental protection and to prevent and where that is not practicable, to reduce emissions to acceptable levels. Separate legislative provisions are in place to transpose the IPPC Direc tive in Scotland, Northern Ireland and the offshore oil and gas industries. In America, federal laws stipulate that generators of hazardous waste are responsible for the proper storage and disposal chemicals from the cradle to the grave.(Department of Environment, 2009) Using environmentally-friendly products like Oil Gone Easy S-200 and supporting environmental conservation organizations are some steps that can be taken to curb industrial pollution.