Monday, September 30, 2019

Five Ethical Principles for Research Essay

There are five general principles in the 2002 APA ethics code designed to â€Å"guide and inspire psychologists toward the very highest ethical ideals of the profession.† These principles include beneficence and nonmaleficence (i.e., benefit people and do no harm); fidelity and responsibility; and integrity, justice, and respect for people’s rights and dignity. The Belmont Report identified three basic ethical principles when conducting research: respect for persons, justice, and beneficence. The following are five basic ethical principles presented in the order of the general principles in the APA code that apply specifically to conducting biomedical and behavioral research with human participants. Principle 1: Beneficence and NonmaleficenceRepresenting the utilitarian tradition, this principle requires that researchers, using considerations such as those described above, strive to maximize potential benefits while minimizing risks of their research. Although the cost-benefit mandate seems straightforward, it is rarely unambiguous in practice because costs to participants and benefits to the profession and to society are difficult to accurately estimate in advance and no universally agreed-upon method or criteria exist for optimally balancing the two. Where questions arise related to the degree of risk, researchers are responsible for seeking ethical advice and implementing safeguards to protect participants. Risks that are identified in advance must be communicated to prospective research participants or their legal equivalent, and informed consent must be obtained (except in special cases approved by the IRB, such as research involving a placebo control, in which fully informed consent compromises a scientifically required research design). Sometimes research presents risks to groups of people or social institutions. No consensus exists for whether a representative can provide consent on behalf of a collective entity, but full compliance to Principle 1 requires sensitivity to this issue. Principle 2: Fidelity, Responsibility, and TrustThis principle requires researchers to establish and maintain a relationship of trust with research participants. For example, before individuals agree to participate in research, investigators must be clear and explicit in describing to prospective participants what they will experience and what consequences may  result from participation. Researchers also are obligated to honor all promises and commitments that are made as part of the agreement to participate. When full disclosure is not made prior to obtaining informed consent (e.g., information germane to the purpose of the study would compromise its validity), safeguards must be implemented to protect the welfare and dignity of participants. In general, procedures that involve concealment or deception in a research design can be implemented only after rigorous criteria for the necessity of such procedures are met and the study is approved by the IRB. (Such instances also require a thorough debriefing of participants at the conclusion of their participation.) When children or adults with limited understanding serve as participants, researchers must implement special protective safeguards. When unintended negative consequences of research participation occur, researchers are obligated to detect, remove, and/or correct these consequences and ensure that they do not persist over time. Understandably, past ethical breaches have resulted in what some describe as widespread mistrust of biomedical and behavioral research in contemporary society. Principle 2 requires researchers to make every effort to foster trust and avoid causing further public mistrust. Principle 3: IntegrityThis principle requires researchers to â€Å"do good science,† to truthfully report their results, to take reasonable steps to correct errors that are discovered, to present work that is their own (or to otherwise make appropriate citations), to take responsibility and credit only for work that is their own, to avoid â€Å"piecemeal publication† (i.e., submitting redundant analyses of a single data set for multiple publications), to share data on which results are published with other qualified professionals provided they seek only to verify substantive claims and do not use the data for other any other purpose, and to respect the proprietary rights of others engaged in the scientific enterprise. Principle 4: JusticeIn following this principle, researchers strive for two forms of justice. The first, distributive justice, requires psychologists to entitle all persons equal access to the benefits of research, as well as to ensure that the risks for harm from research are not disproportionately greater for a particular group or category of persons within society. The  second, procedural justice, refers to the adequacy of research procedures to ensure fairness, such as when easily accessible mechanisms are made available to participants to address any concerns they may have related to their participation in research. Researchers also are promoting Principle 3 when they attend to the special concerns of underrepresented groups in developing programs of research, so as to avoid continued underinclusion and lack of representation in the knowledge base. Principle 5: Respect for the Dignity and Autonomy of PersonsRepresenting the deontological tradition, this principle asserts that researchers respect research participants as human beings with intrinsic worth, whose participation is a result of their autonomous choices. The implications of this principle are far-reaching and relate to matters of obtaining informed consent, avoiding coercive and deceptive practices, upholding confidentiality and privacy, and preserving the selfdetermination of participants. In abiding by this principle, psychologists are also aware of and respect individual differences, including those influenced by gender, age, culture, role, race, ethnicity, sexual orientation, religious identity, disability, linguistic background, economic status, or any other characteristic related to group membership. Ethical Conflicts and Decision MakingThe potential for ethical conflict is ubiquitous in biomedical and behavioral research. When making ethical decisions about research, it may be prudent to develop a systematic approach to reviewing all relevant sources of ethical responsibility, including one’s own moral principles and personal values; cultural factors; professional ethics codes, such as the APA code; agency or employer policies; federal and state rules and regulations; and even case law or legal precedent. A process-oriented approach to ethical decision making may involve some variation of the following: (1) writing a description of the ethically relevant parameters of the situation; (2) defining the apparent dilemma; (3) progressing through the relevant sources of ethical responsibility; (4) generating alternative courses of action; (5) enumerating potential benefits  and consequences of each alternative; (6) consulting with the IRB, relevant colleagues, and/or legal professionals; (7) documenting the previous six steps in the process; and (8) evaluating and taking responsibility for the results of the course of action selected. As previously mentioned, all research studies must be approved by the relevant IRB. However, approval of a research proposal by an IRB does not remove the mandate of ethical responsibility from the researcher. In making ethical decisions, researchers should consider the likelihood of self-serving bias that can lead to overestimation of the scientific value o f a proposed study and underestimation of its risks. ConclusionScientific research with human participants is an inherently ethical enterprise, and ethical conflicts in research are virtually inevitable. Researchers who exercise the privilege to conduct research with human participants bear the responsibility of being familiar with and abiding by the ethical principles and relevant rules and regulations established by their professional organizations and by federal and state governments. However, rigid application of rules is not a substitute for well-reasoned, responsible ethical decision making. bibliography American Psychological Association. Ethical principles of psychologists and code of conduct. American Psychologist vol. 57 pp. 1060-1073 (2002). Bersoff, D. N. (Ed.). (2003). Ethical conflicts in psychology (3rd ed.). Washington, DC: American Psychological Association. Miller, C. (2003). Ethical guidelines in research. In J. C. Thomas, ed. & M. Herson (Eds.), Understanding research in clinical and counseling psychology (pp. 271-293). Mahwah, NJ: Erlbaum. Office for Protection from Research Risks, Protection of Human Subjects. National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research. (1979). The Belmont Report: Ethical principles and guidelines for the protection of human subjects of research (GPO 887-809). Washington, DC: U. S. Government Printing Office. Sales, B. D., ed. , & Folkman, S. (Eds.). (2000). Ethics in research with human participants. Washington, DC: American Psychological Association. Sieber, J. E. Empirical research on research ethics. Ethics and Behavior vol. 14 pp. 397-412 (2004).

Sunday, September 29, 2019

Joshua

In the novel, The Great Gatsby, Nicks use of diction and imagery in his language shows that the attendees of the party are not ordinary commoners but extravagant and luxurious people from the upper classes. Nick's uses of diction shows the high class of the people at the party. For example, when Nick first sees Myrtle's sister, Catherine, he describes that she is a â€Å"slender, worldly girl†. He thinks that, unlike other average women, Catherine is special and unique.By saying she is â€Å"worldly,† he implies that she is above other women. In addition, when Nick begins to describe Mr.. McKee, Nick says that he is, â€Å"most respectful in his greeting to everyone In the room. † Nick believes that Mr.. Emcee's manners are similar to that of a person from high society. People from the upper classes tend to be more respectful and mannerly compared to those from the lower classes. Another example is when Mr.. McKee was explaining to Nick that he was In the,  "artistic game,† and that he, â€Å"photographed [Mrs..McKee] a hundred and twenty- even times since they had been married. † This leads Nick to believe that Mr.. And Mrs.. McKee were most likely from the upper classes rather than the lower or common classes. Not many people In those times had the time and luxury to take many photographs of their wives since they all had to work many hours. By using diction, Nick shows the luxury and extravagance of the people attending the party. Nick does not only use diction In his language, but also Imagery to support his belief that the people at the party were not from a common class, but from an upper class.For example, when Catherine moves around the room, Nick begins to realize, â€Å"an Incessant clicking as Innumerable pottery bracelets Jingled up and down upon her arm. † Catherine was wealthy enough to afford lots of Jewelry, meaning that she must be from a high class since people from the lower classes were not able to afford such Jewelry. Nick used Imagery to describe the extra things Catherine had In order to show her wealth and luxury. In Dalton, when Mrs.. McKee compliments Mrs.. Wilson of her dress, she rejects the compliment and says that she, â€Å"SLP[s] It on moieties when [she doesn't] care what [she] look[s] like. Even when she Is not trying to look fancy and luxurious, Mrs.. Willow's clothing Is respectable and beautiful. She has at least some wealth since people were able to acknowledge her luxury even when she was not trying to show It. Imagery Is used In Nick's language to describe the wealth of the attendees and to prove that they are not from the lower classes. Nick supports his observations and beliefs by using Dalton and Imagery In his language. By showing their luxury and polite manner, he describes them as economically stable and wealthy and extravagant.Joshua By schoolhouses Nicks uses of diction shows the high class of the people at the party. For example, respectful in his greeting to everyone in the room. † Nick believes that Mr.. Emcee's classes. Another example is when Mr.. McKee was explaining to Nick that he was in common classes. Not many people in those times had the time and luxury to take Nick does not only use diction in his language, but also imagery to support his â€Å"an incessant clicking as innumerable pottery bracelets Jingled up and down upon such Jewelry.Nick used imagery to describe the extra things Catherine had in order to show her wealth and luxury. In addition, when Mrs.. McKee compliments Mrs.. Wilson of her dress, she rejects the compliment and says that she, â€Å"slip[s] it on sometimes when [she doesn't] care what [she] look[s] like. † Even when she is not trying to look fancy and luxurious, Mrs.. Willow's clothing is respectable and beautiful. When she was not trying to show it. Imagery is used in Nicks language to describe Nick supports his observations and beliefs by using diction and imagery in his

Saturday, September 28, 2019

IT Essay Example | Topics and Well Written Essays - 500 words - 4

IT - Essay Example have be used to allow for branching out in different geographical locations, tapping into new markets, reaching out to more customers and to moving outside the country of origin. However, with the increased importance of the data resources some big data issues, which may have negative impact on enterprises, have also emerged. Top in the list is the privacy challenge. Since most businesses are pursuing big data projects, privacy and security of the information is becoming a big concerns especially due to the increased cyber threats. Storage is also a big data challenge. Organizations have huge volumes of information that need to be used and storing the data can also be a challenge. The other major issue is the analysis of the data. The analysis may require highly paid scientists and experts as well as appropriate graphical interfaces and tools and this may increase the operating costs. Cloud computing refers the use of software solutions that are not hosted externally by another datacenter or hosting service provider. The organization will simply access the interface through the appropriate software while leaving the administrative task of managing the content to the hosting company that ensures that the information stored is safe and secure. One area in which the technology can be used is in the storage of big data. When an organization gives the responsibility of storing and hosting data to a second datacenter or a service provider, it is able to reduce the costs associated with putting up storage infrastructure for its IT needs. Moreover, using the cloud computing technology allows the business to have access to the information from any point since it is not specifically stored in the office. For an enterprise to benefit from its IT infrastructure, it needs to strategically align its IT functions with the business goals. This will, however, be influenced by several factors. For such an alignment to take place, there is a need to address the corporate cultural

Friday, September 27, 2019

Virginia Tech Tragedy Case Study Example | Topics and Well Written Essays - 750 words

Virginia Tech Tragedy - Case Study Example Cho Seung-Hui had been previously investigated for hostile behavior, but any action was private and was not disclosed due to confidentiality issues ("Killer's Manifesto"). The University was faulted for a slow and inadequate response and the state was criticized for failing to deal with the shooter's mental health problems. Politicians, educators and editorialists lost no time in commenting on the tragedy, but they arrived at radically different conclusions when it came to addressing many of the basic questions arising from an act of this nature. Among them were the following: Why did University officials allow the killing to continue without evacuating the campus Why did the state not take action and force Cho Seung-Hui to seek treatment for his mental disorders How did the suspect obtain high-powered weapons with a history of mental health issues In this review of the initial reactions to the shootings at Virginia Tech, I intend to examine how those three questions were answered, while at the same time indicating my own critical response to the conclusions that they were based on. The killings could have been prevented by a quicker University response, mandatory mental health treatment, and stricter gun control. The formal investigation into the shootings criticized the University for failing to act in a prompt and proper manner. Timothy Kaine, the governor of Virginia, commented, "It was very clear in the immediate aftermath [of the first shootings] that the community should have been notified that the perpetrator or perpetrators were still at large" (qtd. in Tran). The initial students were killed shortly after 7:00 AM, but a lockdown did not occur and students were not warned of the potential danger until 9:26 AM (Tran). The deadlier second wave of killings took place approximately 20 minutes later. The two and a half hour delay in warning students was unacceptable and the e-mail notification should have occurred immediately. An early warning and word of mouth may have been able to identify and prevent the additional killings at 9:45 AM. Locking down the campus may have stopped the killer from entering the classrooms and dormitories. The report into the killings said, "During Cho's junior year at Virginia Tech, numerous incidents occurred that were clear warnings of mental instability" (Tran). Administrators and students are culturally conditioned to respect privacy and students are reluctant to "turn in bad actors to adult authority" (Henninger). In the wake of the shootings there has been a call for reforming the mental health laws. University officials are considering forced removal of hostile students and lawmakers are considering the suspension of students' privacy rights (Bower). With his extensive history of trouble, Cho only received sporadic counseling and infrequent medication to treat his disorder. It is a sensitive issue to force a person to seek mental health treatment when there is only the potential for violence. Our cultural tradition values freedom and privacy. These values will sometimes limit the action that a state or educational institution can take against someone they suspect may be of danger to themselves or others. According to a report on CNN, "Virginia law disqualifies a person from buying firearms only if they have

Thursday, September 26, 2019

Sustainable Operations Paper Essay Example | Topics and Well Written Essays - 2000 words

Sustainable Operations Paper - Essay Example Soon companies started realizing that profits and profitability are not the only factors of long term development but future of the people and the planet are also key elements for sustainable operations. Hence, these new objectives were classified as the triple bottom line (3BL) which included the three P’s of people, profit and planet. After all the recent developments and expansions, people have started to ask for more than mere salaries and profits. They now emphasize on factors like improved performance on environmental, health and safety issues. So now Wal-Mart has to make the decision of investing in such activities of environmental and health concerns and how do follow them in the most efficient and cost effective method. Wal-Mart, 2009. Media OnSugar [http://media.onsugar.com/files/ons4/2009/12/53/307/3075777/e343f2c5ac55a097_350px-Sustainable_development.svg.xlarge.jpg] â€Å"At Wal-Mart, we know that being an efficient and profitable business and being a good stewar d of the environment are goals that can work together. Our broad environmental goals at Wal-Mart are simple and straightforward: To be supplied 100 percent by renewable energy; To create zero waste; To sell products that sustains people and the environment. Our efforts have been recognized through  numerous awards, which would not be possible without the support of our customers, associates and communities around the world.† (Wal-mart, 2012) Wal-Mart launched a global business strategy of sustainability to lessen the business’s burden on the global environment and hence become one of the leading supply-chain companies in the world. They aimed to be named as the most competitive and innovative company in the world. The emphasis was then on the fact that objective of profitability was going to be taken along with the implementation of development of the environment. (Wal-Mart, 2012) The management at Wal-Mart knew that they had to carry the program of improvement of env ironment along with business profitability to gain sustainable operations and growth in longer term. Wal-Mart hired a popular firm, Blu Skye for an overall analysis of the environmental impact and for consultation on issues related to sustainability in the globalized world. Wal-Mart collaborated with other companies as well which included; Conservation International (CI) and Environmental Defense (ED). ( Farfan, 2011) The team of Wal-Mart executives had identified 3 primary areas of environmental goals which mainly included; energy, waste and products. All these are divided into two sections; direct goals and indirect goals. Direct goals include increasing energy efficiency, transitioning to renewable energy and reducing waste in retail operations. All these were in immediate control of Wal-Mart and can be classified as primary factors. Indirect goals included basic operations and relationship with the suppliers. They focused more on sustainable operations and entire value chain of Wal-Mart. (Herrera, 2010) All the sustainable operations drive led by the management of Wal-Mart was highly confused as being more of philanthropist nature. After serious concerns and meeting, the idea was brought into the mind of many who were confused to clear all the misconceptions about the business handling being carried out. They stated that all the business activity carried out by Wal-Mart was not

Wednesday, September 25, 2019

PROGRAMMING AND CULTURE CLASS IN ARCHITECTURE Assignment

PROGRAMMING AND CULTURE CLASS IN ARCHITECTURE - Assignment Example There is also the sound of moving vehicles coming from the waiting lounge. Observing with the sense of hearing has the advantage getting a deeper feeling of things around through sounds. The next site is a public square which is located in the same city. There are people around and the sound of scavenge birds. There is scent of perfume from nearby and the noise of vehicles from a highway that is just next to the public square. There is also smell of exhaust fumes that is presumably from the vehicles passing nearby. Through the sense of smell and hearing, it was possible to feel the contents in the atmosphere and distinguish them from each other. The third site is at a public park. There are sound of birds and insects on the air. Beneath the feet is cold grass. The atmosphere is cool and relatively quiet. Then a piece of rock is collected and it is cold and with a very rugged texture. The piece of rock is hard and heavy. Through the senses of touch and sight one is able to have a clearer feeling of things around. The sense of sight and touch adds a better feeling to the sense of sound. The next site is at the top of a public building. The far off horizon is clearing visible and there is cold air blowing. Buildings around the city and their different shapes and designs can be seen clearly from this point. The sense of sight here is able to give a clearer feel by adding details such as

Tuesday, September 24, 2019

Virtual Private Network Architecture Essay Example | Topics and Well Written Essays - 750 words

Virtual Private Network Architecture - Essay Example Basically, the cloud computing platforms (virtual clouds), both private and public, offer an excellent framework for both all the organizations (small, medium and large) to host their applications (e.g. enterprise resource planning systems) by hiring resources on rent, on-demand and paying charging depending on actual usage. In this scenario, an organization’s IT services can be distributed all through the corporation’s data centers and systematically assigned resources in cloud data centers (Wood, Shenoy, Ramakrishnan, & Merwe, 2011; Tchifilionova, 2011). Cloud computing allows enterprises to obtain as much computation and storage resources as they require, while only paying for the precise amount that they use. In this scenario, a VPN (virtual private network) is established by creating a secure communications link between two nodes by following the characteristics of a point-to-point private link. Additionally, a VPN can be employed by the organizations to smooth the process of secure remote access in the cloud, establish and maintain a secure data channel within a network or securely connect two networks together (Researcher's Blog, 2011; Wood, Shenoy, Gerber, Ramakrishnan, & Merwe, 2009; Rittinghouse & Ransome, 2009). ... advantageous that cloud resources be flawlessly incorporated or combined with an organization’s existing architecture without the need to deal with management, handle substantial configuration, or security concerns. On the other hand, present cloud service providers provide virtual cloud servers as remote units with their own IP address space that is beyond the reach and control of the customer. In addition, this isolation of enterprise resources and clouds augments software and configuration challenges and complexity while putting into practice the services that must communicate with an enterprise’s private network. There emerge various problems when moving an organization’s information system such as enterprise resource planning systems to a virtual cloud. In this scenario, poor communication and lack of coordination between virtual cloud and network resources make the customer once more accountable for autonomously managing for bandwidth guarantees and traffic separation with a separate network service provider. Thus, in order to deal with these challenges, there is a need to improve the cloud computing architecture to flawlessly put together virtual private networks (VPNs) (Wood, Shenoy, Gerber, Ramakrishnan, & Merwe, 2009; Rittinghouse & Ransome, 2009). In addition, the majority of business organizations are adopting incremental approach for the migration of their enterprise resource planning systems to virtual cloud. However, organizations that are planning to move their resources to virtual clouds must keep in mind that any migration, no matter it is associated with the cloud or not, engages one-time expenditures and a lot of opposition to migration for instance some of the staff members can be against the migration. In addition, there can be some cultural

Monday, September 23, 2019

Community Solutions Research Paper Example | Topics and Well Written Essays - 1750 words

Community Solutions - Research Paper Example According to European standards, the categories of people who have been considered as poor have been â€Å"1. the long term unemployed and the young unemployed, 2. the elderly, 3, single parent families, 4. second generation migrants, 5. refugees and returning minors, 6. marginal groups- e.g. gypsies, travellers, homeless, 7. underpriveleged urban districts, 8. impoverished rural areas† (Cullen, 5). The American definition for 2011 is that â€Å"for a family of four including two adults and two children, total yearly income has to be below $22,350, to be called poor as is given in the US Department of Health and Human Services website. While addressing the issues that the poor people face, as members of the subculture of poverty, one major concern has always been the physical eradication of poverty and its negative manifestations which lives of the poor people miserable. Community development is universally accepted as the most effective method to address poverty and its prob lems. The community development program of 1980s in Ireland was a landmark in the history of the fight against poverty (Cullen, 11). Cullen, in his study on nine poverty elimination projects implemented in Ireland, has revisited the methods and strategies followed by various organizations and agencies who participated in these projects and has concluded that â€Å"community development is a process that deliberately activates, encourages and supports groups of people to participate in collective action in pursuit of common interests, and which contributes to social justice and equity† (Cullen, 11). During the John-Nixon era, in the US, â€Å"community action programs† were abundant and quite popular (Joseph, 49). Though they set the stage for the emergence of a welfare state, they were also criticized as capable of only peripherally addressing the issues of poverty (Patterson, 146). Notwithstanding these opposing viewpoints regarding community solutions to the subcultu re of poverty, the global intellectual discourses have always seen community solutions as the most viable way out (Cullen, Joseph, FAO and Gaiha). The best available community solution to the subculture of poverty will be to set up community level revolving funds partially sponsored by the government and partially by the industrial houses of the country. To raise the funds, the government will have to introduce a special tax of 0.1% of the profit, on the corporate companies, which have a profit margin above a fixed ceiling. These funds along with a government contribution will then be transferred to the local authorities to be utilized for ensuring a minimum of 200 days’ work for all those able-bodied persons who have been listed as poor. The form of work has to be fixed at local level, by the local administration in consultation with the community leaders, and according to the local resources available and prevailing local conditions and necessities. For example, if in a pla ce having water scarcity, the work has to be provided in water conservation activities, which can contribute to the local economy in a productive way. And the newly generated water could be given back into the community at a reasonable cost. Similarly, in an area where the major vocation is agriculture, work can be provided in community-level agro-processing industries. This solution will have to involve â€Å"massive commitments of Federal funds†

Sunday, September 22, 2019

Blue Ocean Strategy Essay Example for Free

Blue Ocean Strategy Essay Competing in overcrowded industries is no way to sustain high performance. The real opportunity is to create blue oceans of uncontested market space. Blue Ocean Strategy by W. Chan Kim and Renee Mauborgne Included with this full-text Harvard Business Review article: 70 Article Summary The Idea in Brief—the core idea The Idea in Practice—putting the idea to work 71 Blue Ocean Strategy 80 Further Reading A list of related materials, with annotations to guide further exploration of the article’s ideas and applications Reprint R0410D Blue Ocean Strategy The Idea in Brief The best way to drive profitable growth? Stop competing in overcrowded industries. In those red oceans, companies try to outperform rivals to grab bigger slices of existing demand. As the space gets increasingly crowded, profit and growth prospects shrink. Products become commoditized. Ever-more-intense competition turns the water bloody. How to avoid the fray? Kim and Mauborgne recommend creating blue oceans— uncontested market spaces where the competition is irrelevant. In blue oceans, you invent and capture new demand, and you offer customers a leap in value while also streamlining your costs. Results? We chose to show American industries because they represented the largest and leastregulated market during our study period. The pattern of blue ocean creations exempli? ed by these three industries is consistent with what we observed in the other industries in our study. harvard business review †¢ october 2004 page 73 Blue Ocean Strategy Key blue ocean creations Was the blue ocean created by a new Was it driven by entrant or an technology pioneering incumbent? or value pioneering? New entrant Value pioneering* (mostly existing technologies) Value pioneering (some new technologies) Value pioneering (some new technologies) At the time of the blue ocean creation, was the industry attractive or unattractive? Unattractive Automobiles Ford Model T Unveiled in 1908, the Model T was the ? rst mass-produced car, priced so that many Americans could afford it. GM’s â€Å"car for every purse and purpose† GM created a blue ocean in 1924 by injecting fun and fashion into the car. Incumbent Attractive Japanese fuel-ef? cient autos Japanese automakers created a blue ocean in the mid-1970s with small, reliable lines of cars. Incumbent Unattractive Chrysler minivan With its 1984 minivan, Chrysler created a new class of automobile that was as easy to use as a car but had the passenger space of a van. Incumbent Value pioneering (mostly existing technologies) Unattractive Computers CTR’s tabulating machine In 1914, CTR created the business machine industry by simplifying, modularizing, and leasing tabulating machines. CTR later changed its name to IBM. Incumbent Value pioneering (some new technologies) Unattractive IBM 650 electronic computer and System/360 In 1952, IBM created the business computer industry by simplifying and reducing the power and price of existing technology.

Saturday, September 21, 2019

Blood Pressure & Pulse during exercise Essay Example for Free

Blood Pressure Pulse during exercise Essay Introduction: The blood pressure of a person is the force exerted by the blood on the walls of the arteries per unit area. The blood pressure unit is mmHg. The blood pressure of an individual is expressed in two ways, the systolic (due to the contraction of the ventricle) and diastolic, (due to the relaxation of the ventricle). The normal blood pressure of an individual is 120/80 (systolic / diastolic). Various factors can alter a persons blood pressure; this includes exercise, smoking, stress, diseases and age. Materials and Methods: Stepping stool, timer, blood pressure measurement kit (Sphygmomanometer and a stethoscope) and students in-groups of four. In each group one student acted as a patient, while the other acted as a physician or nurse. Another acted as the timekeeper. The fourth student acted as the data recorder. The base-line pulse rate and blood pressure of the patient (student) were obtained. The patient was asked to perform stepping up and down the stool 30 X within 5 minutes. After the stepping stool exercise, the patients blood pressure and pulse rate were immediately obtained again. After resting for 2 minutes, the measurements were repeated and also after 5 minutes. In order to obtain more data each student in the group acted as a patient and the measurements were repeated.