Thursday, November 28, 2019

Cloud Computing

Abstract Over the recent times, Cloud computing has been a growing concept not just for IT (Information Technology) specialists, but also for scholars and researchers in other genres like business (Muglia, 2009, p. 2-4). Amrhein and Quint (2009) state that this is majorly based on the increased relevance of cloud computing in a wide range of organizations.Advertising We will write a custom research paper sample on Cloud Computing specifically for you for only $16.05 $11/page Learn More According to Kontio (2009), big companies like IBM, Microsoft and Amazon are amongst the pioneers that front-line the list of people and companies and individuals who embrace the importance of cloud computing in accentuating their endeavors. In spite of this pronounced success and ever growing dominance in the world of technologies; Otey (2010) points out that there has also been some slowly—but surely—upcoming group of skeptics who have strongly voiced out t heir negative concerns in regard to cloud computing. The legibility of their concerns are still to be scholarly confirmed since cloud computing is a technological advancement that was established recently. Nonetheless, if an ultimate progress is to be enhanced for the many organizations and people who currently utilize this technology, as well as for the prospected users; it is paramount for viable statutes, fitting policies, suitable regulations and feasibility strategies to be relevantly put in place by the concerned parties (Boss et al., 2007, p. 1-3). In essence, it is based on the above issues that this research paper is going to expansively highlight the concept of cloud computing while detailing the progress that has been made by various organizations to this regard. A brief way of how this will be done is in the introductory summary below. Introduction Principally, this research paper specifically focuses on broadly highlighting the intricacies of cloud computing. Moreover, general reference to other vital concepts which are related to cloud computing is concurrently done. Having said that; it is inherent to state that this paper will be orderly presented as follows.Advertising Looking for research paper on it? Let's see if we can help you! Get your first paper with 15% OFF Learn More To start us off, the paper will give an inclusive and representative introduction into cloud computing. After that, we will delve into the characteristics of cloud computing which will then be closely followed by cloud computing services, how to manage a cloud, cloud organization standard, the benefits of cloud computing as well as it limitations/ challenges. Finally, a conclusion will be given starting by offering an insight into the future of cloud computing and how individuals—and organizations alike—can smoothly transition to it. The conclusion will then be finalized by giving a brief—but concise—evaluation of how we can choos e the right cloud computing service provider will also be done. As a crucial note; the authoritative opinions, verifiable facts, logical arguments, scholarly notions and intellectual suggestions in this paper are fundamentally backed up by reliable articles and books written by technology bigwigs. These scholarly resources are primarily used in order to facilitate and ensure conciseness, factualness and objectivity throughout the paper. Overview of Cloud Computing Several definitions have been advanced by variant scholars in giving the befitting meaning of cloud computer. As a matter of fact, a majority of these definitions have been focused on numerous issues since cloud computing is a broad technological area. Most of the definitions put forward by these scholars are right—in their own respect. Documenting all of these definitions is impossible so only a few representative definitions are outlined below. Preliminarily; Otey (2010) states that cloud computing is a general te rm used to refer to an internet-based service which seeks to provide some form of essential computer-related service to an individual or organization.Advertising We will write a custom research paper sample on Cloud Computing specifically for you for only $16.05 $11/page Learn More To further his definition, Otey asserts that the specific types of services in cloud computing vary widely from one user to the other. This is the reason there are many cloud computing services which are currently in place with other expected in the future (Chaganti, 2008). Moreover, IBM (n.d.) defines cloud computing as an important set of computing solutions which allow its users to use technology in accessing or sharing information in virtual or physical in form. In doing so, the access or sharing of information is usually occurs via LAN Local area Network, WAN (Wide Area Network) or direct connection to a particular server (Anderson et al., 2010). The above definition is supported by other scholars who also believe that cloud computing is concerned with anything the delivery of hosted services using the internet. Lastly, Lovell (n.d., p. 4) articulates that cloud computing simply describes â€Å"highly scalable computing resources† which are basically provided as external services (through the internet) on a â€Å"pay-as-you-go basis.† According to Lovell, the term â€Å"cloud† is normally used metaphorically by technologists to refer to the internet—which, fundamentally, provides a viable forum for networking and exchange of vital computer resources (p. 4-5). The following diagram gives a brief representation of the anatomy of the cloud. A more detailed architectural diagram of the vital aspects of cloud computing can be found in Appendix I. Anatomy of the CloudAdvertising Looking for research paper on it? Let's see if we can help you! Get your first paper with 15% OFF Learn More Amrhein, D., Quint, S. (2009). Cloud computing for the enterprise: part 1: capturing the cloud. Retrieved from http://www.ibm.com/developerworks/websphere/techjournal/0904_amrhein/0904_amrhein.html History of Cloud Computing According to Strickland (n.d.), the name cloud computing was historically inspired by the cloud-like symbol used to represent the concept in diagrams as well as flowcharts. Despite the fact that cloud computing has become extensively pronounced in the Information and technology world that we currently live in; Kontio (2009) reports that cloud computing is a recent technological inception. This is, in fact, the major reason a majority of the components and constituents of cloud computing heavily rely on current technologies and can barely function in their absence (IBM, n.d.). However, it is remarkable to state that cloud computing heavily borrows from traditional methods of computing and, more often than not, works interdependently with them. Probably, this mi ght be the reason some people tend to confuse it with related technologies like grid computing, utility computing and autonomic computing among many others (Miller, 2008; and Anderson et al., 2010). So what, really, are the differences between cloud computing and related technologies? According to Myerson (2009), grid computing differs from cloud computing, in that; it deals with loose virtually networked computers so as to perform large tasks. This is in opposition to cloud computing which operates with a compactly networked system and is limited when performing large tasks (Miller, 2008; Otey, 2010). As for Utility computing, the focus tends to be metered computing of resources—which is based on the concept and technology used in traditional public utilities like electricity (Brynjolfsson et al., 2010, p. 32-34; and Anderson et al., 2010). As was partly aforementioned, Cloud computing relies on modern technologies like the integration of hardware and software to create a vi able platform for it to perform its functions. In spite of this difference, utility computing is normally considered a key tenet in cloud computing. This is based on the fact that some of the concepts in utility computing are used by technologists in cloud computing (Otey, 2010). Other technologies that are reportedly interdependent with cloud computing include Client-server model, Peer-to-peer sharing and Service-oriented computing among many others (Anderson et al., 2010). As a key note; several examples exist to illustrate other similarities as well as differences between cloud computing and other technologies. That, however, is just a side-issue since many organizations today have found ways of incorporating cloud computing and other technologies. According to Anderson et al. (2010), focus should therefore be on finding ways of improving this interdependency rather than merely outlining the similarities and differences. Traditional Computing and Cloud Computing According to Armb rust et al. (2010, p. 54-57.) traditional business applications have always been quite complex, time-wasting, monetarily costly and somewhat inefficient in the technologically advanced world that we currently. Many other technological experts have been able to voice out similar sentiments against traditional computing with the additional complaints including being difficult to install, configure, assess, run, update and ensure their security. Durkee (2010, p. 62-66) states that it is based on the above challenges that cloud computing was established; not only to overcome the challenges, but also to provide better prospects for organizations that rely on computing for their survival. Even though cloud computing has been around for a few years, it has—to a great extent—overcome the challenges of traditional computing and has even provided a better environment for IT users. In essence, this is the reason, like a bonfire, its heat is increasingly spreading to many organiza tions (Anderson et al., 2010). Of course there are a number of challenges for cloud computing as well as some positive aspects of traditional computing (as will be exemplified later); but as a widely-acknowledged fact, cloud computing is relatively advantageous for organizations when compared to the traditional methods of computing. These advantages are majorly based on its characteristics which are outlined hereafter in brief. Characteristic of cloud computing The process of cloud computing is normally done differently by different people. It is for this reason, according to Chaganti (2008), that cloud computing has many varying characteristics. Fundamentally, all the characteristics of cloud computing usually revolve around this concept of unspecified cloud-like shapes and either function to enhance this concept or supplement it. These characteristics, according to Otey (2010), Kontio (2009), Strickland (n.d.); Cloud Computing (n.d.) Anderson et al., (2010), Wittow and Buller (201 0, p. 2-6) include: Customers only pay for what they use and ignore the servers that are not benefit to them. Since some data centers run are huge and are shared by many people at the same time; the cost of infrastructure passed on to customers become lower. Customers are not obliged to buy (or even know) the ultimate capacity required during peak times. In other words, cloud computing automatically allows for scaling of available resources of the application being used. Cloud computing allows for automatic allocation (as well as de-allocation) of things like CPU, Storage and network bandwidth among many other important resources. Customers do not own physical infrastructure instead they get it through renting from third-party service providers. Servers are rarely left idle based on the concept of sharing computing power amongst various tenants. This also improves utilization rates. A good number of cloud computing services ascribe to the concept of utility computing. Many cloud co mputing services tend to function best with small and medium organizations since they rarely have the capacity to withstand the huge costs and expenditure of large organizations. Types of Cloud Computing Public Cloud In other instances, public cloud is normally referred to as external cloud. In essence, it refers to the conventionally accepted meaning of cloud computing, which is: an ever-changing—yet scalable—method whereby virtual resources are provided over the internet by a third-party provider. Eventually, this improves the distribution of resources and also helps in reducing the costs of getting certain important utilities. Popular public cloud providers include Amazon and EC2 (Anderson et al., 2010) Private Cloud A private cloud (also commonly referred to as Corporate Cloud or Internal Cloud) refers to a proprietary computing architecture where hosting services are done on networks privately. More often than not, the costs of private clouds tend to be relativel y expensive when compared to other like public cloud. It is for this reason that private clouding is mostly done by large companies or individuals who are financially well-off. Some critics have been able to come out strongly to oppose this type of cloud computing since some organizations surrender their networks to be managed by these private firms. In effect, this not only opens a door for many dangerous possibilities for the organization, but it also encourages laziness in terms of organizations or individuals not being able to manage their own clouds—as is recommended by technology experts. Hybrid Cloud Just from the name, hybrid cloud essentially refers to the type of cloud computing where organizations or individuals incorporate the usage both public (external) and private (internal) cloud. According to most researchers; this type of cloud computing is predicted to become the most dominant way of computing based on its current skyrocketing usage. Of course there is the challenge of balancing the two types of cloud computing, but its many benefits make its usage worth every penny spent on it. Cloud Computing Services According to Maitland (2010), different organizations look for different things when selecting a cloud computing service that will help in furthering organizational goals as well as improving their networking avenues. This is the reason behind the availability of variant cloud computing services. Some of the major services here include: Software as a Service (SaaS) This refers to a software distribution model whereby software applications are orderly made available to customers via the internet. Some of its advantages include: easy accessibility form anywhere, instant scalability, good security during deployment over the internet. Its major criticism is that it can cause harm, just like proprietary software, since it limits user control as it does not allow users to modify the software. Infrastructure as a Service (IaaS) IaaS is a provision model whereby an organization outsources equipment that can be used to help support operations like networking, storage and good hardware functionality. Its advantages and disadvantages are more-or-less similar to SaaS with the main difference being that, focus here is on infrastructure while in SaaS, the focus in on software Maitland (2010). Platform as a Service (PaaS) PaaS involves the virtual-server renting of OS (Operating Systems), hardware, storage capacities and even network capacities over the internet. Chiefly, PaaS is an outgrowth of SaaS. Its advantages include: OS features can be changed thus gives control to users, easy for variant users of different regions to work collectively and services can be easily obtained from diverse sources. PaaS is normally criticized for the fact that sometimes; the flexibility of offerings is not able to meet the ever-changing needs of various users (Maitland 2010). Computer as a Service (CaaS) CaaS is not a common service, but its relevance has made it increasingly talked about over the recent times. It generally refers to a dynamic management service which enables users to make real-time changes. The advantages here include ease in control, heightened reliability and increased security for users. Its disadvantages are more-or-less similar to those of Paas and SaaS. Storage as a Service (DaaS) This is the least outspoken service amongst the ones already mentioned. DaaS performs its operations by abstracting data storage behind certain service interfaces and then delivering it when demanded. It has similar advantages to CaaS and PaaS with its major limitation being its inability to operate over some interfaces (Maitland, 2010; and Anderson et al., 2010). Managing the Cloud The following ways can be used to manage a cloud. Primarily, most clouds tend to be complex thus being very involving to users (Myerson, 2010). In order to avoid this, we should find ways of simplifying them—especially on th e layers and interfaces (Jones 2008). Moreover, in order to improve networking; we can initiate the concept of cloud peering where networks are peered in the same way it is done over the internet. This will greatly improve the sharing of resources (Metzler, 2009; and Anderson et al., 2010). Again, system managers should establish ways in which data can be adequately monitored, changed and shared amongst users (Owens, 2010, p. 47-50). This will solve the common problems that are normally caused by poor data management. Finally, good and secure storage facilities (servers) should be put in place by organizations in order to limit security breaches (Cloud Computing in the Midmarket, 2010; Boss et al., p. 2-3). Cloud Organization Standard According to Otey (2010), there is no universally accepted way of standardizing cloud organization. The best way of having an effective and good standard therefore is by simply tailoring ways of having fitting services while observing cloud management strategies (IBM, n.d.; and Armbrust et al., 2010, p. 51-54). Benefits of Cloud Computing A good number of the benefits of cloud computing have been highlighted in the writings above. However, in summary, cloud computing, according to Anderson et al., (2010), Jones (2008), Lovell (n.d., p. 7-9), Kontio (2009), Cloud Computing (n.d.) offers the following advantages: It reduces costs on capital expenditure since customers can avoid spending large amounts of money by installing their infrastructure using the cloud model. It greatly cuts on administrative costs since management of the organization is streamlined and there is a balance between centralization and decentralization of duties. It encourages positive competition amongst individuals and organizations. Quality service is hugely guaranteed within a timely framework There is ease in the access of applications from anywhere at any given time. It provides for a disaster management system through backup and recovery tools. There is sufficient technical support for most users throughout the day. It is highly scalable and flexible thus offering many advantages to its customers. Users are entitled to getting reduction in costs based on the economies of scale. In other words, the more the users, the lesser the costs for each individual/organization. It provides for fitting management of data and resources through efficient data entry, manipulation and data storage facilities. Issues and Challenges/ Limitations of implementing cloud computing Just like the benefits, most of the challenges of cloud computing have been highlighted in the above writings. Nevertheless, these issues, according to Anderson et al., 2010), Otey (2010), Zhen (2008), Maitland (2010) and Durkee (2010, p. 63-67) can be briefly represented as follows: In spite of the huge reliability of the internet; there are numerous occasions that it becomes problematic thus limiting any form of communication, networking or even trade. This issue of occasi onal unavailability of the internet is also a major issue with websites and servers which tend to have occasional downtimes and most cloud computing applications cannot work well with low-speed connections. The storage and security capacity of vendors vary from one place to another. This makes it difficult for one to be assured of a good computing and also in choosing vendors. In close relations to this, storing confidential information or data of one company in servers owned by other companies can sometimes be risky if security breaches occur in the companies storing the information or data. The reportedly rising figures of cybercrimes pose a threat to internet users. Essentially, most cloud computing users and managers rely heavily on the internet. Issues such as cybercrimes are, therefore, of great concern to such users and managers. Shared infrastructures—which are the basis of cloud—tend to slow down activities. When sharing resources, such as infrastructures, wit h other customers, the performance may be reduced, especially at peak times Despite being cost-effective in the long run, cloud computing is quite costly based on the need to buy new technologies and equipment. Also, since it is still a new technology, several changes and modifications are still being made on clouds computing applications and these changes come with extra-costs. Integrating cloud computing—especially on organizations that still have the old computing systems is quite costly, hectic and difficult for many users. The issue of interoperability—where organizations can easily move their data from one cloud computing company to another, like in situations when they have found a better vendor—has been reported to be challenging, in spite of the immense progress that have been made by some companies. This problem with interoperability is also witnessed in terms of companies that would love to use different clouds platforms to manage different applicatio ns Some complains have also been reported in regard to manageability of infrastructure. To this regard, it is said that despite the existence of great IaaS/PaaS in today’s technology market, there are some raw platforms and infrastructure that have limited management capabilities thus not serving the users as intended. An example of such challenges is in Amazon EC2 who claim to be elastic and have auto-scaling capabilities when reports on the ground indicate the exact opposite Monitoring of performance and availability of things like transactions and disk IO’s. For some cloud computing companies, monitoring such issues are greatly challenging. Nonetheless, a good number of companies have been reported to improve in this area with provisions being made for the monitoring of virtual machines by the concerned management. The newness of cloud computing means that it is yet to be modified to a point whereby it is fully flexible as it should. For this reason, traditional app lications which have been in place for quite a while tend to have an upper hand in flexibility in some aspects when compared to the new (and still developing) cloud computing applications. Conclusion According to Otey (2010), determining the future of cloud computing cannot be done in a definite pattern based on the ever-changing arena of technology. Nonetheless, most of the studies done, in regard to cloud computing, tend to offer positive prospects. A good example here is a report by Bechtolsheim (2008, p. 4) which prospects the size of cloud computing to shoot up from $16 billion documented in 2008 to $42 billion in 2012. Many other researchers also foresee a better future for cloud computing. Anderson et al. (2010) also reports that an internet survey conducted recently indicates that by the year 2020, cloud computing will have greatly helped in improving the access of information via remote servers, instead of housed tools like personal computers. In addition, this report by A nderson et al. says that the access of software and other related applications will also be hugely improved by cloud computing. A good example of such cloud computing services is the proliferated use of social networks like Facebook and twitter in sharing information while also being able to effectively communicate and network with one another. In addition, there is an increased use of laptops, desktop computers and Smartphones to connect to remote servers and access or retrieve crucial information. However, if the above fore-sights are to be ultimately actualized, then there are some necessary changes that need to be put in place—especially in regard to the challenging issues. For example, Anderson et al. (2010) says that the reliance on remote servers—which is most likely to occur due to the expected dominance of cloud computing—calls for expert and dependable personnel to gate-keep the information getting in and out of the remote servers. Also, the devices co ntrolling these clouds must be hugely effective to avoid problems in the access and sharing of data or information. To this regard, people have to well-trained and acclimatized to the intricacies of cloud computing while relevant devices are put in place. It is only by considering such measures that we can be ultimately be assured of a good future in cloud computing. Commendably, many IT experts are currently working around the clock to enhance this change. An example here is the shift from internal and external types of computing to the more effective hybrid cloud type (Lovell, n.d., p. 5). More effort is required from all of us if this change is to take place. Transitioning to cloud computing is already taking with several organizations already having integrated it into their computing systems (Kontio, 2009). As for the skeptics who did not know of which way to follow; this research provides you with the information to push you forward. Personally, I would encourage you to use thi s valuable method of computing. But then again, you are still entitled to make your own independent decision. Remarkably, it is crucial to note that the primary step in ensuring that you have a fitting cloud computing model is by choosing the right service provider. As was earlier mentioned, the technology market is flooded with rogue vendors and you should therefore do a thorough research and a lot of cross-checking before choosing a service provider. Only after that should you make your decisions. According to (Lovell, n.d., p. 5) examples of some well-acknowledge vendors include: Amazon, Salesforce.com, ThinkGrid, and Flexiscale. This list is, however, incomplete and more research to find other cloud computing vendors needs to be done since there are thousands of them in existence across the globe. A summary of the key aspects and examples of cloud computing is given below. Aspect of Cloud Computing Example Applications / SaaS Google Documents, Salesforce, LinkedIn, Facebook Platform Service Providers Google App Engine, Google Base, Ms Azure, SpringCM, Etelos, Box.net, Apprenda SaaSGrid, Force.com, Oracle SaaS Platform, Amazon SimpleDB, Amazon S3, TrackVia, Bungee Labs Connect. Infrastructure IBM Blue Cloud, Amazon EC2, Joyent, SunGrid, Integration Amazon SQS, Mule OnDemand, Microsoft Biztalk Services, OpSource Connect, Orchestration Intensil, ProcessMaker, Skemma, Appian Anywhere, OpenID, VMWare, Ping Identity, Elastra Cloud Server List of References Amrhein, D., Quint, S. (2009). Cloud computing for the enterprise: part 1: capturing the cloud. Retrieved from http://www.ibm.com/developerworks/websphere/techjournal/0904_amrhein/0904_amrhein.html Armbrust, M., Fox, A., Griffith, R., Joseph, A., Katz, R., Konwinski, A., et al. (2010). A view of cloud computing. Communications of the ACM, 53(4), 50-58. Anderson, J. Q., Elon University., Rainie, L. (2010). The future of cloud computing. Retrieved from http://pewresearch.org/pubs/1623/future-clo ud-computing-technology-experts Bechtolsheim, A. (2008). Cloud computing. Retrieved from http://netseminar.stanford.edu/seminars/Cloud.pdf Boss, G., Malladi, P., Quan D., Legregni, L., Hall, H. (2007). High performance on demand solutions (HiPODS). Retrieved from download.boulder.ibm.com/ibmdl/†¦/Cloud_computing_wp_final_8Oct.pdf Brynjolfsson, E., Hofmann, P., Jordan, J. (2010). Cloud computing and electricity: beyond the utility model. Communications of the ACM, 53(5), 32-34. Chaganti, P. (2008). Cloud computing with Amazon web services, part 1: introduction. Retrieved from http://www.ibm.com/developerworks/library/ar-cloudaws1/ Cloud Computing. (n.d.). In encyclopedia Wikinvest. Retrieved from http://www.wikinvest.com/concept/Cloud_Computing Durkee, D. (2010). Why Cloud Computing Will Never Be Free. Communications of the ACM, 53(5), 62-69. IBM. (n.d.). New to cloud computing? Retrieved from http://www.ibm.com/developerworks/cloud/newto.html Jones, T, M. (2008). Cloud comput ing with Linux. Retrieved from http://www.ibm.com/developerworks/linux/library/l-cloud-computing/ Kontio, M. (2009). Architectural manifesto: An introduction to the possibilities (and risks) of cloud computing. Retrieved from http://www.ibm.com/developerworks/library/ar-archman10/ Lovell, R. (n.d.). Think grid: introduction to cloud computing. Retrieved from http://www.thinkgrid.com/docs/computing-whitepaper.pdf Maitland, J. (2010). Cloud computing concerns slowing widespread adoption. Retrieved from http://searchcloudcomputing.techtarget.com/generic/0,295582,sid201_gci1378175,00.html Metzler, J. (2009). A Guide for understanding cloud computing. Retrieved from www.bluecoat.com/doc/12437 Miller, R. (2008). What’s in a name? Utility vs. cloud vs grid. Retrieved from http://www.datacenterknowledge.com/archives/2008/03/25/whats-in-a-name-utility-vs-cloud-vs-grid/ Muglia, B. (n.d.). An industry shift toward cloud computing. Retrieved from www.ict.com.qa/pdf/CloudComputing.pdf Mye rson, J. (2009). Cloud computing versus grid computing. Retrieved from http://www.ibm.com/developerworks/web/library/wa-cloudgrid/ Otey, M. (2010).The rise of cloud computing. Retrieved from http://www.windowsitpro.com/article/cloud-computing2/The-Rise-of-Cloud-Computing.aspx Owens, D. (2010). Securing elasticity in the cloud. Communications of the ACM, 53(6), 46-51. Ryan, W., Loeffler, C. (2010). Insights into cloud computing. Intellectual Property Technology Law Journal, 22(11), 22-28. Strickland, J. (n.d.). How cloud computing works. Retrieved from www.communication.howstuffworks.com/cloud-computing.htm Waxe, C. (2008). The essential guide to cloud computing. Retrieved from http://www.webhostingunleashed.com/features/essential-guide-cloud-computing/ Wittow, M., Buller, D. (2010). Cloud computing: emerging legal issues for access to data, anywhere, anytime. Journal of Internet Law, 14(1), 1-10. Zhen, J. (2008). Five key challenges of enterprise cloud computing. Retrieved from h ttp://cloudcomputing.sys-con.com/node/659288 Appendix Logical Architectural Diagrams of Cloud Computing Diagram 1: How the Cloud Works Webgranth. (n.d.). A complete reference to cloud computing. Retrieved from http://www.webgranth.com/a-complete-reference-to-cloud-computing Diagram 2: Relationship between the Elements of Cloud Computing Decker, K. (2010). What Joni Mitchell might say about cloud computing. Retrieved from http://decker.com/blog/2010/05/what-joni-mitchell-might-say-about-cloud-computing/ This research paper on Cloud Computing was written and submitted by user Bowen P. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here. Cloud Computing

Sunday, November 24, 2019

Impact of plastics on the environment

Impact of plastics on the environment Many people are exposed to dangers associated with plastic production every day. Wastes resulting from plastics products find their way into water bodies where they act as transport means for microorganisms which end up in marine habitats such as seas causing infections to organisms living in water.Advertising We will write a custom essay sample on Impact of plastics on the environment specifically for you for only $16.05 $11/page Learn More When plastic degrades, it produces plastic dust which causes pollution to aquatic animals. In addition, this dust causes contamination of human consumer goods especially food products posing a great threat to human health. Aquatic animals that feed on fish may mistake plastics for jellyfish and consume them and this may lead to death of such animals. In other cases, plastics that have been disposed in landfills may cause leaching of chemicals which end up in water bodies causing contamination (Uciha, 2010, p. 1). Imprope r disposal of plastics may have physical impacts on birds where they entangle them to death. The entangled birds may as well be deposited in water bodies alongside the plastics during which they may chock the fish. Impact of mercury on the environment Mercury is one of the most important life threatening chemicals to humans. Mercury exists in many products especially scientific ones. When released through degradation, it is referred to as methylmercury and finds its way into water bodies from where it is ingested by man (Uciha, 2010, p. 1). It has adverse effects such as reducing the capability of the human immune system and affecting the normal functioning of human enzymes, genes and the nervous system. Animals that feed on fish are also affected in a similar manner. However, mercury resulting from broken thermometers is not as much toxic although it may cause gingivitis to those who inhale it. Impact of natural gas and oil production on the environment Extraction of oil produces t oxic substances that may be lethal to aquatic life. Humans may also suffer cardiovascular problems due to such toxic substances. Pathways of photosynthesis may as well be blocked especially where dynamite is being used for extraction, leading to low production of food (Uciha, 2010, p. 1). Reference List Uciha, A. (2010). Environmental impact. Web.Advertising Looking for essay on environmental studies? Let's see if we can help you! Get your first paper with 15% OFF Learn More

Thursday, November 21, 2019

Pathophysiology and Structural Influence Assignment

Pathophysiology and Structural Influence - Assignment Example From regions with low concentration to high, require sodium ion gradient, utilizes energy and involve a movement of polar molecules like glucose and amino acids (Vander et al., 2001). Primary active transport - movement from regions with low concentration to high, requires ATP to function, involves the movement of ions like hydrogen, calcium, sodium, and potassium (Vander et al., 2001). c) Ca-ATPase – this system pumps the calcium ions to the extracellular fluid from the cytoplasm. Besides, in the organelles, it involves pumping of calcium to the lumen of the organelles from the cytoplasm. It utilizes ATP as a source of energy d) Na-K-ATPase – this system pumps two molecules of potassium in the cell while removing three molecules of sodium from the cell through the hydrolysis of energy. This makes the intracellular negative relative to the extracellular environment of the cell (Vander et al., 2001). The difference in charge between the inside and the outside of the cell affects the movement of cations and ions across the membrane. When there is a net charge difference the cations and anions will move in the direction with a low concentration of the molecules until both sides of the cells attain an equilibrium during which the cell would be referred to be in a resting membrane potential (Vander et al., 2001). Monogenetic inheritance is called so because it involves a single genetic disease. The changes in DNA sequence happens at a single genetic code. The modes include X-linked (sex-linked, and sex-limited), autosomal recessive, autosomal dominant, abnormal mitochondrial gene (Vander et al., 2001). Hormonal hyperplasia is a type of abnormal medical condition that involves proliferation of tissues involved in the production of hormones. The proliferation leads to increase in the production of the chemical substances called hormones. In the hormonal hyperplasia, the general structure of the cell or the tissue remains the same even after the proliferation.  

Wednesday, November 20, 2019

Communication and Counselling Skills Essay Example | Topics and Well Written Essays - 2000 words

Communication and Counselling Skills - Essay Example ry vital to the society at large since they take care of people’s health and try their best to save patients from losing lives due to diseases, stress, accidents and injuries(Robert & James, 2005). Health and care social organisations offer a variety of services to clients and therefore should have the appropriate technology and workforce to satisfy needs of their services users exceptionally well (Peter & Rose, 2007). The workforce employed or volunteering to work in these organisations must have the necessary skills and knowledge that match the duties and responsibilities that they will be allocated. Counseling services is one the many services provided for health and social care institutions. People employed or volunteering to execute these services in these institutions must have the necessary counseling and communication skills needed for them to execute their duties and responsibilities in an exceptional manner. In this essay, a range of counseling perspectives used in c ounseling interaction, current ethical codes and boundaries related to professional practice in counseling and the significance of communication and counseling skills within health and social care will be critically analyzed and evaluated. Counseling perspectives used in counseling interactions simply mean the counseling attitudes that are applied in interactions between counselors and their clients (Stacy & Remy, 2007). The main three theories that explain these counseling perspectives are psychodynamic theory, theory of cognitive behavioral therapy and the theory of person centered therapy. In this essay only two theories will be covered and they are theory of person centered therapy and that one of cognitive behavioral therapy. Person centered therapy is also known as client centered therapy and was formulated by a humanist psychologist by the name of Carl Rogers in the year 1945 (Athman, 2006, p.15). It is a talk therapy which is non-directive in nature and among the widely used

Sunday, November 17, 2019

The Place of Female Vocalist in Jazz Band Essay

The Place of Female Vocalist in Jazz Band - Essay Example The essay "The Place of Female Vocalist in Jazz Band" discusses the relationship between jazz music and the Black people that have been strong over the years and several standards agreeable to comprising the Jazz genre of music. The paper also discusses if female vocalists have a role in the jazz bands.Most women have not familiarized themselves with the jazz culture hence they cannot bring out what is needed in a performance. Jazz is an area that has long standing culture. It relies on inspiration from the muses and not necessarily practice. Some years back, the position of a woman in society was to revolve around the kitchen and her career. The females were not exposed to jazz music so as to be in a position to learn the unwritten rules of the genre. The strong women, who try their take at jazz, do so by practice. The result of practicing for a jazz performance will not be as compelling as that performance by one who has intrinsically learned the rules of the game through experienc e. Inspiration is the primary key in staging a great jazz concert. The other social factor that spelled out women from jazz bands was the fact that many men had tried to master the culture of jazz without success. The failure arises from the lack of understanding that jazz music is an uncultured form passed from one person to the other through inspiration. Women of today cannot secure places in jazz bands since they copy other people’s material. The women who performed in jazz bands and succeeded were original in their compositions.

Friday, November 15, 2019

A Strategy Proposal for Obstetric Emergencies

A Strategy Proposal for Obstetric Emergencies REPORT: A STRATEGY PROPOSAL FOR MANDATORY SKILLS AND DRILLS SESSIONS FOR OBSTETRIC EMERGENCIES 1  Executive Summary 1.1 This proposal was carried out following the need for drills as identified and recommended by the CEMACH report. 1.2 The situation was reviewed in the light of current directives regarding inter-professional collaboration. This report will express the necessity to involve all obstetric and neonatal staff, ensuring competency and continuous professional development. The report has identified mechanisms suggested for the introduction of obstetric drills in such a way that they are viewed by the potential participants as a non-threatening mechanism that is highlighting good areas of practice and areas for improvement. The process will stand jointly with a programme of targeted education to address areas of weakness. The process of drills and their feedback will be monitored and refinements made. This system of risk management will feed into the process areas of concern suitable for drill evaluation. 2.  Rationale for Choice of Topic Maternity care has been identified as an area for improvement (Department of Health 2000 An Organisation with a Memory). This topic of drills was chosen because there are clear calls for its use by a number of bodies (these include CEMACH, 1999, the Royal College of Obstetricians and Gynaecologists’ â€Å"Towards Safer Childbirth† document and CNST) and it well illustrates the importance of multidisciplinary team working. These drills are a requirement of CNST level 2 which confers a 20% reduction in insurance premiums on trusts. Drills have been of proven benefit in improving performance in eclampsia simulations (Thompson, 2004). It is likely that drills in other areas of obstetrics will also lead to improved performance (Thompson, 2004). The midwifery statutory body, the Midwifery Committee of the Nursing and Midwifery Council, and formerly the UKCC are concerned with the regular updating of skills requiring at least five days of training every three years. Humanistic approach The very nature of improving patient care for its own sake should be sufficient impetus to create an environment receptive to this change. The proposal is; The introduction of mandatory skills and drills sessions for obstetric emergencies: WHY: To involve all staff and ensure competency and continuous professional development. To identify staff who need more training e.g. study days. WHO: Midwives and other clinical staff, to encourage professional development and capability to deal with emergency situations. WHAT: Shoulder dystocia Antepartum and post partum haemorrhage Eclampsia Undiagnosed breech presentation Neonatal and Maternal resuscitation Placental abruption CNST actually recommends the following drills annually; Cord Prolapse Vaginal Breech delivery Shoulder Dystocia Antepartum Haemorrhage / Severe postpartum Haemorrhage HOW: Monthly skills and drills Change skill monthly Each drill twice a year Each midwife to attend a minimum of one of each skill per year 3.  Critical Discussion Background: The drills will be a part of evidence-based training through practical skills, on emergency situations occurring in the antepartum, intrapartum and postpartum period to prevent maternal and neonatal mortality and morbidity (CEMACH). The latest report of the Confidential Enquiry into Maternal Deaths sates that â€Å"emergency drills for maternal resuscitation should be regularly practised in clinical areas in all maternity units.† The Clinical Negligence Scheme for Trusts (CEMACH) has Maternity Clinical Risk Management Standards. CNST (level 2, April, 2005) Criterion 5.2.1 states; â€Å"There is a system in place to ensure that all relevant staff participate in  an annual skills drill.† The CNST documentation advises that; â€Å"Collaborative, multidisciplinary practice sessions or â€Å"drills†, for dealing with emergency situations, allow for all members of staff, especially new and junior staff, to know and understand their specific roles and  responsibilities in an emergency.† The CNST also states; â€Å"Critical incident analysis is an effective educational and management  tool, and its use should be incorporated into the philosophy and daily  management of Labour Wards.† For CNST satisfaction in this criterion there must be verification records of all those who attend each drill. The rills should be linked to a training programme. There should be at least 75% attendance and ideally 100% attendance. Critical incidents in obstetrics are uncommon. Whilst the risk management already in place may highlight weaknesses in provision of care and remedial measures may subsequently be taken such as further training it is advantageous to simulate these uncommon but acutely life-threatening situations in order to feed the results into the risk management process. Inter-Professional Team: It is especially important that the drills involve the multidisciplinary team. The following members will be regularly involved; Midwives Maternity assistants Obstetricians of all grades Anaesthetists Operating department assistants Porters Neonatal paediatricians and nurses Students It is important that all the people involved in an actual emergency are considered when setting up a drill. In some scenarios the haematology team may be involved following consultation beforehand. The more realistic the drill the more valuable it will prove. Strategy The proposal consists of a number of aspects (Roberts, 1998) such as assembling a project team, planning the drills, implementation, evaluation, modification then further implementation of the drills, further evaluation and so on. With regard to strategy introducing drills does not fit so well into there being an agreed process in advance with the likely participants in the drill. This will make the drill less realistic and, especially if the subject matter is known in advance, it will enable participants to prepare. A fine balance will be sought between gaining the support of the individuals affected via effective interpersonal sills and leadership to enable an atmosphere of trust. This approach is of proven benefit (Kassean, 2005). This will involve informing the clinicians that drills will take place and the reasons why and that they should enable improvement in practice and team working with emphasis on this being in a non-threatening manner. During initial drills the performance will depend on the abilities, clinical and team working of all the clinicians attending and will also depend on the drill itself. There are two things to evaluate; staff performance and the drill itself. The drill can be modified. The weak areas in the performance of staff can be evaluated and training issues made good. On repetition of the drills subsequent staff performance will reflect and can be used as a measure of the success or otherwise of the implementation of the drills. Discussion: It will be important to pay particular attention to discussion and accurate planning of the drills. Meetings will be set up involving management and including the Professional Development Officer, Risk Management Officer, Head of Midwifery and Clinical Liaison Officer. Although it is proposed to cover the above lists the needs and timing and degree of repetition of specific drills will be determined by incident reports. The risk management process will feed into the drill planning. The teaching elements will be modified in timing, content and repetition according to specific performance in the drills. Individual training can then be addressed where needed and appropriate and more general sessions also provided with the relevant attendance facilitated. The objective, which will be made transparent, is to maximise the combined motivation and effort of all those likely to be involved in the change. Resources needed: There are some resource implications although these are fairly minimal compared to the likely gains. Staff time is involved in setting up the drills. Rooms need to be available. However clinical rooms will be used for instance (but not confined to) the delivery suite when it is quiet. Standard equipment will be used and this will incur costs. It may be necessary to purchase models or these may already be available on the unit. Some handouts may be necessary and documentation will need to be kept of attendance registers and the progress and evaluation of the drills. Management of change There are many change theories. Particularly illustrative of the inertia to change is a major component of Lewin’s (1951) theory of change. Here people are â€Å"frozen† in a particular manner of doing things. There are many reasons for this rigid position. Whilst some of the reasons relate to external factors the crucial resistance to change is at the level of the individual. In order for the individual to change, their way of thinking about the factor needs to be addressed. Too much pressure however can make an individual more resistant to change (Broome, 1998). Too many stressors will decrease the level of performance (Broome, 1998). An example of a successful change implementation emphasised the importance of communication at this stage in the change process (Kassean, 2005). Once the individual accepts the reasons for the change rather than just that change is necessary they can make the change, then further freezing in the new position effects the change. Ethical and legal considerations Midwives must be accountable for the actions and they have a duty of care to be up to date with their training. There are fitness to practice issues inherent here. Dimond (2006) describes the outcomes of some recent legal cases concerning interdisciplinary communication and management of obstetric emergencies. Evidence of team working and adherence to appropriate guidelines will help in the defence of such problems. The process of drills and further training and repeat drills will help to create a learning culture (Garcarz, 2003). Burke (2003) compares their own study of the effectiveness and the subsequent changes in practice following drills to large awards where delivery was less timely than in their drills. Evaluation Feedback will be obtained in a variety of formats including questionnaires and in reflective practice interviews. This will enable qualitative data to be obtained and analysed. Quantitative data will be obtained and statistically analysed. This evidence will be used to evaluate just how effective the drills and the associated training are in improving clinical practice and team working in the simulation environment. Informal feedback will be acquired from discussion in team meetings of those involved in the drills as trainers and trainees. Such feedback will be helpful in assessing problems not identified elsewhere and will also be illustrative of the real barriers to change and how these might be addressed. 4.  Conclusion The introduction of obstetric drills is mandatory for CNST level 2 and is also recommended practice from a number of other bodies. There is evidence in the literature that such drills can be introduced in a manner which is accepted by participants and which is effective in the subsequent improvement of performance criteria. 5.  References Broome A 1998 Managing Change 2nd Edition. Basingstoke, Macmillan Burke C 2003 Scenario training: how we do it and the lessons we have learned. Clinical risk 9 103-6 CEMACH [WWW] http://www.cemach.org.uk/publications/WMD2000_2002/wmd-intro.htm accessed 23 April 2006-04-23 Clinical Negligence Scheme for Trusts Maternity Clinical Risk Management Standards April 2005 http://www.nhsla.com/NR/rdonlyres/EE1F7C66-A172-4F0C-8A36-7FCCD31A52A0/0/CNSTMaternityStandardsApril2005final.pdf accessed on 23 April 2006 Clinical Negligence Scheme for Trusts CNST [WWW] Confidential Enquiry into Maternal Deaths in the United Kingdom 1999 Why mothers die. London: Royal College of Obstetricians and Gynaecologists Department of Health 2000 An organisation with a memory. Report of an expert group on learning from adverse events in the NHS, chaired by the Chief Medical Officer. London: Stationery Office Dimond B 2006 Legal Aspects of Midwifery, 3rd edition. Butterworth-Heinneman, UK Garcarz W Chambers R Ellis S 2003 Make your healthcare organisation a learning organisation. Radcliffe. Oxford Kassean HK Jagoo ZB 2005 Managing change in the nursing handover from traditional to bedside handover – a case study from Mauritius BMC Nursing 2005, 4:1 1472-6955 Lewin K 1951 Field Theory in Social Science. New York: Harper and Row Roberts K Ludvigsen C Project management for health care professionals Butterworth Heineman Oxford Royal College of Obstetricians and Gynaecologists 1999 Towards safer childbirth. London; RCOG Thompson S Neal S Clark V 2004 Clinical risk management in obstetrics: eclampsia drills BMJ328:269-271

Tuesday, November 12, 2019

Essay --

Children In The Civil War For my project on the Civil War, I researched the children that were around to see it. I think it’s important to know how this war impacted children, or even the involvement of children, because of what kids are like today. Today kids sit around and play video games about shooting people, back then, sometimes kids had to. When the Civil War broke out in 1861, kids from both the Union and the Confederacy said goodbye to some of their family members or even joined the military themselves. In fact, roughly twenty percent of Civil War soldiers were younger than eighteen. For the Union, this was the minimum recruitment age. However in times of war, laws were easily overlooked. The Confederacy, however, had no set age limit. Most youngsters weren’t exactly the fighters, but rather musicians. Technically, their job description didn’t include fighting, but if need be, it wasn’t uncommon for one to arm themselves and defend their lives. (http://www.pbs.org/wgbh/americanexperience/features/general-article/grant-kids/) I find it interesting to think that teenagers today’s biggest concerns compared to those during the war. Today you’ll find teenagers whose biggest problems in life are getting a five page essay on the Civil War in on time, acne, or those shoes they saw at the mall being ten dollars over the spending limit that their mom gave them. Back then teenagers were running through a hailstorm of bullets, watching as their friends and brothers fell inches away from them. They were thirsty for clean water, hungry for food, yearning for their mothers, or sometimes, even just wishing to be dead so it would end. Some assisted surgeons and sawed off damaged arms and legs. They endured the terrors that were associate... ...ive. (http://www.ducksters.com/history/civil_war/life_during_the_civil_war.php) Slave children were also impacted by this war, however slightly more positively. For many, this war meant freedom. Before the war had quite started, enslaved children had escaped to the North, either with their families or individually. When the war started, many of these families and children would slip into Union territory. Once Lincoln issues the Emancipation Proclamation, floods of these families came over. Homes for freed slaves was often no more than a wooden packing crate. Food was treasure, and disease was everywhere. Hope was not lost though. Northerners established schools that would teach blacks of all ages how to read and write. Soon, young African Americans â€Å"pulled a white teenager† and joined the army. They fought for the Union cause and thus experienced the terrors of war.

Sunday, November 10, 2019

Religious Parallels Lord of the Flies

William Golding's Lord of the Flies is an allegorical novel from numerous perspectives. It draws societal parallels to a post-war world, political parallels to different methods of government, and even psychoanalytical parallels to the psychological models of Freud. One of the most prominent allegories contained in the story is its parallel to the Bible. William Golding creates these parallels in many different ways, through both settings, and the actions of characters. Interestingly, every religious allegory in Lord of the Flies is incomplete; they are similar to events in the Bible, but none of them are completely synonymous.Golding's creates a unique stance on Christianity by his flawed allegories to the Garden of Eden and Jesus’ teachings and death; he shows that he favors some Christian values and some of the Bible’s messages, but is opposed to others. The first connection between Lord of the Flies and the Bible is located at the very beginning of both books: the s etting of the island reminds one of the Garden of Eden. Golding describes the island: â€Å"Beyond the platform there was more enchantment. Some act of God [†¦] had banked sand inside the lagoon so that there was a long, deep pool in the beach with a high ledge of pink granite at the further end† (10).He also notes that the â€Å"shore was fledged with palm trees. These stood or leaned or reclined against the light [†¦]† (9). This is eerily similar to the Garden of Eden, which â€Å"the Lord God planted [†¦] and he placed there the man whom he had formed. Out of the ground the Lord God made various trees grow that were delightful to look at and good for food, with the tree of life in the middle of the garden [†¦]† (The New American Bible, Gen. 2:8-9). If â€Å"the man† in the Bible is taken to be Ralph and the other boys, then another comparison can be drawn.When Ralph strips down and swims in the lagoon, it reminds one of Adam naked i n the garden. The water could be seen as a connection to baptism, which is the recognition of a new birth or creation. This is one of the few connections in the novel which is entirely parallel with that of Bible, suggesting that Golding probably supported the creation theory. Yet another connection the Garden of Eden appears in the â€Å"beastie† that the boys are afraid of; it is often connected to the serpent in the garden that tempts Eve and causes original sin.These connections, however, are far from ideal. The island is indeed close to utopian, but there is the â€Å"long scar† (7) from the airplane crash. Golding probably rejected the idea that anything, even if created by God, could be perfect. Also, the serpent in the bible is always thought of as an external force, such as the devil, whereas Simon will eventually learn that the beast is not an external but an internal fear. This could be interpreted to mean the Golding did not believe that original sin came f rom an outside force; rather, it is an inherent part of human nature.Golding’s characterization of Simon creates a strong link between his actions on the island and the life of Jesus in the gospels. The first major example of this is when Simon is walking through the woods and is followed by the littluns: [The littluns] talked, cried out unintelligibly [†¦]. Then, amid the roar of bees in the afternoon sunlight, Simon found for them the fruit they could not reach, pulled off the choicest from up in the foliage, passed them back down to the endless, outstretched hands. When he had satisfied them he paused and looked round. † (56)

Friday, November 8, 2019

Analysis Of Drowning Sorrows Social Work Essay Essay Example

Analysis Of Drowning Sorrows Social Work Essay Essay Example Analysis Of Drowning Sorrows Social Work Essay Essay Analysis Of Drowning Sorrows Social Work Essay Essay 2009 ) . This makes Howard a danger to himself and/or others. Until these other issues are addressed, Howard can non turn his full attending to bereavement guidance. Contextual Analysis Macro Violence. In a recent visit, Howard was intoxicated and unsuitably touched Karla. When a societal worker visits a client in their place, and the client has been imbibing, the societal worker is placed in danger. Harmonizing to the National Association of Social Workers, ( NASW ) , work related force against societal workers is an unpleasant fact ( Safety Policy, 2010 ) . Work related force against societal workers is permeant and must be addressed by every school of societal work, bureau, and single worker. The National Association of Social Workers has identified that there is a upseting tendency of force against societal workers and other human service professionals. This force includes physical assault, verbal assault, torment, and the menace of assault ( Department of Labor, 1996 ) . Many happenings of force can be anticipated and their impact lessened ; some may be prevented wholly. Alcohol Abuse. Harmonizing to recent alcohol addiction dependence research, it has been found that about 53 per centum of the grownups in the United States have stated that one or more of their close relations has a imbibing problemthat requires professional alcohol addiction aid ( Kent, 2010 ) . Data indicated that about 15 per centum of people in the United States are job drinkers, and approximately five to ten per centum of male drinkers and three to five per centum of female drinkers could be diagnosed as intoxicant dependant ( Kent, 2010 ) . Alcoholism is a major societal, economic, and public wellness job. Alcohol is involved in more than half of all inadvertent deceases and about half of all traffic deceases ( Schuckit A ; Smith, 2006 ) . A high per centum of self-destructions involve the usage of intoxicant along with other substances ( Schuckit A ; Smith, 2006 ) . Peoples who abuse or are dependent on intoxicant are more likely to be unemployed, involved in domestic force, and have jobs with the jurisprudence ( such as imbibing and drive ) . Additionally, there is an extended literature associating impulsivity to alcohol usage and intoxicant jobs in human surveies ( Dick, et al. , 2009 ) . It is besides good known that heavy intoxicant usage can trip unprompted behaviour ( Dick, et al. , 2009 ) . This would bespeak that Howard stating that he will hit himself should be taken earnestly and reported to governments. Suicide Suicide is a major public wellness job ( Suicide, 2010 ) . Not merely is suicide riotous to the quality of life of subsisters and friends it is dearly-won. Suicides that are attempted and completed consequence in tremendous societal, economic, and medical costs ( Suicide, 2010 ) . It is estimated that self-destruction efforts cost about $ 33,000 annually in the United States ( Suicide, 2010 ) . Suicide occurs most frequently in response to a crisis such as a decease or loss of a relationship or occupation. Almost all persons that kill themselves suffer from depression or substance maltreatment issues ( Suicide, 2010 ) . Mezzo-soprano A survey released in March 2006 by the National Association of Social Workers found that 55 % of 5,000 accredited societal workers surveyed said they faced safety issues on the occupation. Sixty-eight per centum said their employers had non adequately addressed their concerns. On a mezzo degree, Karla s bureau does non look to hold any safety processs or policies in topographic point. When Karla speaks to Shannon about her concerns, while suggestions are made, Shannon does non take a proactive stance and acquire involved. Karla has stated that she does non experience safe in Howard s place. She has explained to her supervisor that Howard lives in a distant country where aid might non be available to her and her bureau has non stepped frontward with a program to ease her frights. NASW postulates that if bureaus have good conceived safety policies and processs in topographic point, client and worker safety will be maximized and the bureau s liability can minimise. Micro On the micro degree, while Howard has been referred to Karla for mourning guidance, Karla understands and has explained to Howard that if he is imbibing, mourning guidance will non be of much usage. Karla besides believes that Howard is a suicide hazard. The NASW Code of Ethics says that Social Workers respect and promote the right of clients to self-government and assist clients in their attempts to place and clear up their ends. Social workers may restrict clients right to self-government when, in the societal workers professional judgement, clients actions or possible actions pose a serious, foreseeable, and at hand hazard to themselves or others. Howard has stated to Karla that he knows how to stop his ain life and has identified a program ; he will hit himself. Although this menace may non be subjective at this clip, he has identified how he will stop his ain life, and this could be considered a foreseeable event. In add-on, maltreatment of intoxicant has been shown to increase unprompted behaviour ( Dick, et al. , 2010 ) . Alternate Schemes Strategy One Howard has identified a self-destruction program, and hence, is a danger to himself. Kara should name the constabulary and study that he has indicated to her that he has developed a program for self-destruction. Therefore, he should be brought to a Community Mental Health Center, where he could be seen by a Accredited Mental Health Professional and undergo detoxification, if he meets Emergency Detention, ( ED ) standard. An Emergency Detention is when a individual is believed to be a danger to themselves or others, the individual may be detained, involuntarily through a legal procedure ( Schwartz, 2007 ) . The phrase, a danger to self agencies that there is grounds or significant chance that an single intends to harm themselves ( Schwartz, 2007 ) . This normally involves a recent effort or menace made by the person ( Schwartz, 2007 ) . Strategy Two Karla would explicate to Howard that because he has continued to imbibe, even after they have talked about non imbibing, she could non help him with his mourning. Furthermore, because he is go oning to imbibe he is making a unsafe state of affairs for both of them. Karla would explicate that if Howard wants her aid with the mourning issues he has been covering with, he would hold to semen to her office. Strategy Three Karla would mention Howard to a drug and intoxicant rehabilitation centre, and explicate to him that until he deals with this issue, bereavement guidance will non make any good. She would explicate that because intoxicant is a sedative, his imbibing, increases the depression that he is covering with ( Bigsby, Ratcliffe, Rexrode, 1996 ) . She would obtain informed consent and name his Grandson. Howard becomes animated when talking about his Great Grandchild and this might be the inducement he needs to prosecute rehabilitation. Karla will besides hold to turn to the bureaus safety policies as they pertain to in place visits that pose safety issues. Karla would run into with her supervisor and explicate that with the current patterns of their bureau they need to see making policies and/or processs that address insecure in-home visits. Recommendation Karla will name Howard and explicate that she can non do their scheduled assignment because he has been imbibing. She will explicate that she would truly wish to help him but she can non when he is inebriated. Kara will propose that he should see rehabilitation and that she will assist him with resources in this affair. Karla will explicate that intoxicant is a sedative and this will add to his unhappiness about his married woman ( Bigsby, et al. , 1996 ) . She will offer to get off some educational stuffs to Howard about intoxicant, its effects, long-run wellness effects, and rehabilitation. Karla will keep a unagitated temperament so that feelings of anxiousness, fright, and anger do non interfere with her ability to pass on efficaciously. She will do her statements in a clear, simple, and direct mode. She will be self-asserting with Howard so her engagement in his state of affairs is seen by Howard as professional and non personal. She will repeat that until he is sober bereavement guidance will non be of much usage to him. She will explicate that she would wish to help him and should be sensitive to his demands. While she must non put herself in danger, she should assist Howard understand that she is available to assist him, merely non at his place if he is under the influence of intoxicant. Karla will seek to obtain informed consent, speak to Howard s Grandson about Howard s issues, and explain that Howard needs their support, love, and aid. Karla will explicate that she believes Howard is a danger to himself, and hence, she must reach the governments and he will be brought to a Community Mental Health Center and if he meets standards for admittance, he will hold to remain. Karla will talk to her supervisor about the absence of safety issues with her supervisor and will propose that they must set policies and processs in topographic point to protect the consumers and workers. Mentions Bigsby, Chris, Ratcliffe, Erin, Rexrode, Letetia ( 1996 ) . The Affects of Alcohol on You. Retrieved February 27, 2010 from hypertext transfer protocol: // www.mnet.edu/~kcastleb/affect.html Dick, Danielle M. , Smith, Gregory, Olausson, Peter, Mitchell, Suzanne H. , Leeman, Robert F. , OMalley, Stephanie S. , A ; Sher, Kenneth. ( 2010 ) . Understanding the Concept of Impulsivity and it s Relationship to Alcohol Use Disorders. Addiction Biology, 15, 217-226. Retrieved February 26, 2010 from hypertext transfer protocol: //www3.interscience.wiley.com.ezproxy.lib.ou.edu/cgi -bin/fulltext/123278047/PDFSTART Downs, Martin. ( 2010 ) . Challenging Old Assumptions About Alcoholism. The New York Times. Retrieved February 25, 2010 from hypertext transfer protocol: //health.nytimes.com/health/ guides/disease/alcoholism/overview.html? inline=nyt-classifier Jeffries, Robin. A ; Frankish, James C. ( 2010 ) . Suicide. Retrieved February 26, 2010 from hypertext transfer protocol: //www.healthline.com/galecontent/suicide Gusukuma, Isaac V. ( 2002 ) Social Work Safety. School of Social Work. Baylor University. Retrieved February 25, 2010 from hypertext transfer protocol: //www3.baylor.edu/Social_Work/pdf/socialworkersafety.pdf Kent, Jack. ( 2010 ) . Alcoholism Research and the Genetic Equation. University of Texas at Austin. Retrieved February 27, 2010 from hypertext transfer protocol: //txtell.lib.utexas.edu/stories/a0001-full.html NASW Code of Ethics. ( 2009 ) . Retrieved February 26, 2010 from hypertext transfer protocol: //www.socialwork.msu.edu/ethics/nasweth.html Safety Policy and Procedures Guidelines for Social Wortkers. ( 2010 ) . National Association of Social Workers. Massachusetts Chapter. Retrieved February 26, 2010 from hypertext transfer protocol: //www.naswma.org/displaycommon.cfm? an=1 A ; subarticlenbr=289 Schuckit, Marc A. A ; Smith, Tom L. ( 2006 ) . An Evaluation of the Level of Response to Alcohol, Externalizing Symptoms, and Depressive Symptoms as Predictors of Alcoholism. Journal of Studies on Alcohol, ( 67 ) , 2. Retrieved February 27, 2010 from hypertext transfer protocol: //www.jsad.com.ezproxy.lib.ou.edu/jsad/downloadarticle/ An_Evaluation_of_the_Level_of_Response_to_Alcohol_Externalizing_Symptoms_/ 1014.pdf Schwarz, Allen N. , LCSW. ( 2007 ) . What to make in a Mental Health Emergency. Retrieved February 26, 2010 from hypertext transfer protocol: //www.mentalhelp.net/poc/view_doc.php? type=doc A ; id=28670 A ; w=5 A ; cn=9 United States Department of Labor. ( 1996 ) . Occupational Safety and Health Administration. Guidelines for Preventing Workplace Violence for Health Care and Social Service Workers. Retrieved February 27, 2010 from hypertext transfer protocol: //www.dangerousbehaviour.com/Disturbing_News/ Guidelines % 20for % 20PreventingViolence % 20HSS.htm

Wednesday, November 6, 2019

Commentaire darret TGI Lille 5 juin 2002 Essays - Free Essays

Commentaire d'arret TGI Lille 5 juin 2002 Essays - Free Essays Commentaire d'arret TGI Lille 5 juin 2002 Le 5 juin 2002, le tribunal de grande instance de Lille a rendu une decision tres critiquee relative a l'infidelite au sein des couples pacses. Dans ce jugement il s'agit d'un homme pacse qui reproche a son partenaire d'entretenir des relations adulteres avec un autre. Le probleme c'est qu'il a des difficultes a recueillir des temoignages de la part du voisinage et demande pour cela la commission d'un huissier afin qu'il vienne constater l'infidelite. Il fait donc une demande au tribunal de grande instance de Lille afin que sa requete soit prise en compte. On peut se demander dans qu'elle mesure le PACS donne-t-il naissance a un devoir de fidelite? Le president du tribunal de grande instance statuant sur les visas de l'article 145 du nouveau code de procedure civil, et sur l'article 515-1 et 1134 du code civil valide la demande du requerant et commet un huissier de justice afin de constater l'infidelite de son partenaire. Il considere en effet que de l'article 515-1 du code civil decoule une obligation de vie commune entre partenaires d'un Pacte civil de solidarite, qui doit etre executee loyalement. Que l'obligation de devoir executer loyalement le devoir de communaute de vie commande de sanctionner toute forme d'infidelite entre partenaires. Que le manquement a l'obligation de vie commune justifie une procedure en resiliation de PACS aux torts du partenaire fautif. I) Le PACSet ses effets A. Le PACS, un contrat au dela des relations patrimoniales. Le pacte civil de solidarite est un contrat entre deux personnes majeures, de sexe different ou de meme sexe, pour organiser leur vie commune. Il a ete promulgue par la loi du 15 novembre 1999. Le PACS etablit des droits et des obligations entre les deux contractants, en terme de soutien materiel, de logement, de patrimoine, d'impots et de droits sociaux. Il peut etre dissous par la volonte de l'un ou des deux contractants, qui adresse une declaration au tribunal d'instance ou au notaire. Dans le cas de notre arret, le requerant invoque la faute de son partenaire dans la mesure ou ce dernier aurait eu des relations extra-conjugales. Alors que dans le mariage l'adultere est considere comme une faute, la loi sur le PACS ne mentionne pas ce principe. Toute fois, le code civil est assez vague quant aux effets du PACS concernant la dimension extrapatrimoniale. En effet, l'article 515-1 du Code civil prevoit que ce contrat a pour finalite d'organiser la vie commune de ses contractants. Ain si en vu de cette definition il semble legitime de se demander si de la notion de vie commune decoule plus qu'une simple collocation. Dans ce cas le PACS n'est plus un simple contrat visant a organiser les relations patrimoniales entre les contractants mais s'ouvre aux relations prevues par le droit des personnes. B. Vie commune et devoir de fidelite entre les partenaires L'ancien article 515-4 du code civil prevoyait que les partenaires lies par un pacte civil de solidarite s'apportent une aide mutuelle et materielle, ce dernier article a ete modifie par la loi du 23 juin 2006 qui declare que les partenaires lies par un pacte civil de solidarite s'engagent a une vie commune ainsi qu'a une aide materielle et une assistance reciproque. On comprend aisement la volonte du legislateur de renforcer le PACS dans une dimension qui depasse celle du seul patrimoine. Le PACS deviens alors un contrat qui organise la vie commune. Le Conseil constitutionnel a precise dans une decision du 9 novembre 1999 que la "vie commune suppose outre la cohabitation, une vie de couple" qui ne se limite pas a "une communaute d'interets". Il existe entre partenaires pacses sinon une obligation de fidelite, au moins une obligation de loyaute derivant du droit commun des obligations contractuelles. Il semble alors legitime de se demander si la solution retenue par le tribunal de gr ande instance du 5 juin 2002 est justifiee ou non. Cette ordonnance ne remet pas en cause la liberte de defaire un PACS, mais rappelle qu'il est possible de rompre unilateralement un PACS et d'exiger des dommages-interets pour les motifs qui ont conduit a prendre une telle decision. Il ressort de la decision du Conseil constitutionnel que le PACS est un contrat et comme

Sunday, November 3, 2019

What is Psychosocial Studies How can this type of approach help us to Essay

What is Psychosocial Studies How can this type of approach help us to a better understanding of the self and society - Essay Example Sociology, in the above context, is a discipline studying the impacts of society on individuals. As for psychology, this can has been described as ‘the science of the soul’ (Goelenius in Banerjee, 1994, 225) and as ‘the science of consciousness’ (Banerjee, 1994, 225); at this point the content of consciousness should be described. Banerjee (1994) refers to the Locke’s definition of consciousness; Locke supported that ‘consciousness is the perception of what passes in man’s own mind’ (Banerjee, 1994, 225). The relationship between psychology and consciousness reveals the point of differentiation between sociology and psychology: the former addresses the social groups while the latter focuses on the individual – as the subject of consciousness, in the context of the definitions mentioned above. In other words, sociology and psychology are two disciplines, which are basically developed independently having different priorities and serving different needs. On the other hand, the points of interaction between sociology and psychology are also revealed: both disciplines are related at the point that all individuals are members of the society – as set by Aristotle. On the other hand, the responses of individuals to their environment may be differentiated under the influence of a series of factors; usually, the personal experiences and views have a crucial role in the development of specific human behaviour. However, certain times, the reactions to events of the personal or the social life are not aligned with the personal characteristics and attitudes but they are rather formulated in accordance with the rules and the ethics held in the society. It is clear that the framework in which the person can act independently has to be clearly defined – setting the borders of personal acting. Moreover, concepts like the

Friday, November 1, 2019

Supply chain Management Essay Example | Topics and Well Written Essays - 750 words

Supply chain Management - Essay Example For instance, a pharmaceutical or biotechnological company normally handles perishable goods that must be kept under favorable environmental conditions. In effect, these conditions must be strictly adhered to while transporting and storing the products in a warehouse. However, a company might lack these important facilities during transportation and warehouse and may effectively consider contracting another company best fitted to handle such commodities during logistics. In this regard, the company contracted would maintain quality of the goods. c) Develop a strategy, and then employ specific suppliers to carry out well-defined portions of the strategy. A manager may employ this strategy in case of situations in which there are constraints in terms of resources available in the company. For instance, a company with internal logistics expertise and working hard to expand its operation in the market may experience financial constrictions. In this regard, such a company can use its inte rnal logistics expertise to develop a strategy internally within its operations. ... However, the manager in such a company may consider outsourcing its transportation and warehousing needs of its raw materials to a company best suited to handle this. In addition, the company may also contract another company to handle the distribution of its finished products. Question #2 a) Quick Response: In this partnership, the retailer normally establishes the amount of order they have made and the durations in restocking up. On the other hand, the supplier makes an analysis of the data from the retailer’s Point of Sale (POS) in order to develop their estimation and production schedules. Thus, the retailer is absolutely in charge of their inventory and helps their supplier in improving their functions by making available POS data for the supplier’s analysis. In this case, this type of system is crucial in instances that the retailer-supplier relationship is in its initial stages, or has just been established and is thus new. In effect, there is little trust betwee n the two parties making it the more suitable when compared to the two other partnerships. In addition, this type of partnership is crucial in instances where there is unavailability of efficient and sufficient personnel and facial resources. Therefore, this partnership is more appropriate than the others since financial and personnel resources inhibit the development of a more incorporated relationship while compared to VMI. b) Continuous replenishment: In this type of partnership, there is mutual trust between the retailer and the supplier making it the best type of partnership in comparison to a quick response partnership. In this case, the supplier receives Point of Sale data from the retailer and makes shipments at intervals based on a prior agreement. In