Saturday, March 14, 2020

PERVASIVE AND MOBILE COMPUTING The WritePass Journal

PERVASIVE AND MOBILE COMPUTING OVERVIEW PERVASIVE AND MOBILE COMPUTING OVERVIEWFigure 1.1. The computing evolution2. Home systems2.1. Information access devices2.2.   Intelligent appliances2.3.   Smart controls2.4. Entertainment systems3. Electronic Healthcare System3.1. Patient Monitoring3.2. Location based services3.3.  Access to medical data3.4. Health care mobile devices  4. Sensors Networks4.1.   Application of a Wireless sensor network4.1.1. Military applications4.1.2. Environmental application 4.1.3. Medical applications4.1.4. Urban applications 5. Ongoing research6. Conclusion7. Reference  8. AppendixRelated OVERVIEW From the invention of Steam Engine to the invention of dynamo by James Watt and Werner Von Siemens respectively, and also remarkably taking the first power station into operation by Thomas A Edison [1], a massive change took place in the 19th century which brought about the generation, production and distribution of energy. The machines and engines were decentralized making the distribution of energy everywhere a possibility. This discovery led to several others like motor-cars, light bulbs and the rest of them. Although the technology behind these is irrelevant to most users, but then it brings about convenience and make life a lot easier which benefits the economy immensely. After the industrialization transformation, another major transformation occurred which was Computers. â€Å"While industrialization enhanced the manpower with the help of machines, computer multiplied the mental capabilities of man†. Its application then varied from processing large information, creation and organisation of phone bills, payroll, and invoices.   It was also used though with the help of mechanical machines to lift heavy amount of item e.g. steel Figure 1.1. The computing evolution From that point onwards, the computing industry began to grow, and its applications also widened to being used for air traffic control, in administration, and was also used for management systems in the process of â€Å"ensuring a static environment for employees†. Presently information technology has gone so broad that it surpassed the years of using the mainframe system where you have many users to a computer machine, and has since then gone even further to find its way into being an integral part of the telecommunication, entertainment, commerce and finally the finance industry in which nowadays, most organisation run their business online which is also called E-business. This type of computing is known as persuasive computing. Pervasive computing which is also known as ubiquitous computing is an exciting and intriguing field of research that brings in exceptional changes for the computational models in the 21st century. It basically integrates the concept of computation into our daily lives as opposed to having computers standing on its own. The goal of pervasive computing varies from creating an invincible technology to integrating the physical and virtual world together [3]. â€Å"Tremendous development of wireless communications and networking, mobile computing and handheld devises, embedded systems, wearable computers, sensors, FRID tags, smart spaces, middleware, software agents, and the like, have let to the evolution of pervasive computing platforms as natural successor of mobile computing systems†[4]. The internet has ended up being the worlds largest medium of communication. It connects different people all over the world in their billions, share information, data, and application electronically. As discussed above, internet and e-business has now been the order of the day in the business community. â€Å"The rising number of internet accounts proves that within the next years will have the largest internet community†. The internet has contributed greatly to making the world a global market where you find customers comparing prices and purchasing items, employee can get access to business information from distant. Due to the growing trend in computer technology and micro-controller getting smaller allowing them to be included into more and more devices, computer got smaller; the use of laptops became quite common and popular, the use of mobile phones with computing abilities became quite popular as well, examples are the apple iphone, android of google and it likes. The mobile phone with computing abilities is one of the recent developments in computer technology, its uses its wireless access to the internet to browse through information based system from basically anywhere in the world, which works just like a desktop or a laptop computer. Although not all application comes with the mobile phone sometimes, it is usually downloadable which therefore compliments for a poor computational capability, that’s why it doesn’t come as a surprise when there are mobile phone that can be wirelessly connected to the internet, edit photos and videos and print them. 2. Home systems These are basically home appliances that are built around computer networks. As the decentralization of computing continues, computers has now become ubiquitous or omnipresent, it has the ability to be everywhere. Nowadays we have networked home which make use of a web server usually small in size but carries out several tasks. For example, an air conditional can be connected to a web server which manages its operations. Other examples are lights, washing machines e.t.c Pervasive computing in homes can be subdivided into four sections which are Information access devices Intelligent Appliances Smart controls Entertainment systems [5]. 2.1. Information access devices An example of an information based device is the PDA â€Å"A personal digital assistant (PDA) also known as a palmtop computer or personal data assistant is a mobile device usually pocketable that functions as a personal information manager.†[6]. It has an electronic display which enables it have a web browser, and can connect to any network. They function as â€Å"Personal Information Management (PIM)† that include and has got applications such as calendar, address book and can also send and return mails. Although the main function of PDA is to make and record appointments and carry phone numbers, it has now undergone rapid development in wireless communication and its now being used in medical facilities to provide mobile access to a patient’s data. Such is the influence of pervasive and mobile computing in our world today. â€Å"In 1996, Nokia introduced the first mobile phone with full PDA functionality, the 9000 Communicator, which grew to become the worlds best-selling PDA† [7]. It brought about a new class of mobile phones: the PDA phone, now called Smartphone. Today, almost all PDAs are also known as smartphones 2.2.   Intelligent appliances As we continue exploration into the world of pervasive computing, its ubiquity can be seen even more. Intelligent appliances are another section under pervasive and mobile computing that has integrated into home appliances. Washing machine is a major example of such. It goes as far as being able to be connected to the internet, download new updates or request maintenance service. Another example is the fire alarm system. As soon as it senses fire, sends out a distress signal to the fire co-operation in which further action can be taken. Another example is the security alarm systems which gets activated as soon as unauthorised entry is detected, sends out a distress signal as well to the police department, in which further action is also taken as well. 2.3.   Smart controls Smart control is another section under pervasive and mobile computing in homes. Some make use of wireless remote controls for stoves, gas pump e.t.c. and are usually all connected to a network. We also have cases where using a java application, can set a recording time for a video cassette recorder which will automatically start recording when its time. Another example of smart control is the heating system in a house. Usually its has an alarm clock imbedded in it that automatically set in on when its the right time, and heats the room or water as the case may be. 2.4. Entertainment systems â€Å"New kinds of entertainment systems will change the world of traditional broadcasting†. Set up boxes is the technology behind the growth and development of pervasive and mobile computing in home appliances. Interactive digital TV’s, video on demand, improvement in the quality of videos and audios are just one of the few examples of how entertainment is making use of pervasive and mobile technology. Another example is the fire alarm system. As soon as it senses fire, sends out a distress signal to the fire co-operation in which further action can be taken. Another example is the security alarm systems which gets activated as soon as unauthorised entry is detected, sends out a distress signal as well to the police department, in which further action is also taken as well. 3. Electronic Healthcare System The area of healthcare in the field of pervasive computing is a very exciting and promising section, â€Å"it encompasses a broad range of topics such as advanced hospital information and logistics systems, mobile health monitoring, assisted living for the elderly and the handicapped, and lifestyle and wellness related personal systems†. â€Å"Pervasive health care system refer mostly to patient telemonitoring† (Hall et al,2003; Stanford, 2002). Telemonitoring is basically the way in which a patient’s psychological and physical features are being sensed and measured and recorded which provides information through wireless connection to the medical practitioner in real time or/and is transmitted to another location e.g. a medical center or a medical laboratory where other medical experts can work on it [8]. Moreso, with a sensor, a patient’s blood pressure, heart beat rate, blood level, respiration and temperature levels, e.t.c. can be measured. The growth of Pervasive and mobile computing in the health sector is a very promising, the value it adds both socially and economically is enormous in the sense that it creates business opportunities for insurance organizations, telecommunication companies, e.t.c. Moreso, it brings about the hope of a quality medical services while being efficient and ubiquitous and at the same time cost effective. The following are few applications of pervasive and mobile computing in the health-care environment. 3.1. Patient Monitoring With the help of wireless network and private area network, patients who are recovering from an ailment but subject to other complications can be easily monitored anywhere and in case a relapse occur, the nearest hospitals, emergency services are notified automatically. This improves the performance of nurses and doctors, as the time they take to make rounds monitoring patients can be done with the help of pervasive and mobile computing. 3.2. Location based services With the use of network sensors and radio-frequency ID badges, patients with mental challenged patients can easily be tracked if by any chance they leave a designated safe zone. With the help of location based services, people with matching blood types or want to donate an organ can easily be found. Voice-activated systems also act as an aid to blind people. 3.3.  Access to medical data With the help of pervasive computing, patients and medical personnel’s can have access to clinical records. This method is very easy as it reduce the stress of doing paper work, less time consuming and the chance of entering an incorrect data is reduced. 3.4. Health care mobile devices These are mobile electronic device that can be used be used to detect certain medical conditions for example, blood pressure, heart rate, alcohol level, e.t.c. In future, such a device can have a wireless capability to contain the individual medical history and if he/she has adeficiency or suffering from a device, the device should be able to send out a signal or message to his/her G.P or a hospital as the case may be [9].   4. Sensors Networks These are tiny, low cost, low power devices that sense some property e.g. motion, heat sound, light, pressure, e.t.c. and communicate with each other using wireless communication [10]. The wireless sensor is a very major aspect of pervasive computing because it allows computing to be part of the physical environment. It is called a wireless sensors network because many sensors can be spread across different places and can be networked in applications that require no attention producing what is known as a wireless sensor network (WSN). They function in a peer to peer manner in the sense that they do not directly communicate the base station. Usually, â€Å"data collected by individual nodes is routed between the thousands of tiny sensors in a multihop manner until they reach the base station†. A base station is computing device that collects data from multiple sensors node and process them [11]. 4.1.   Application of a Wireless sensor network The application of a WSN is countless; it varies from sensing properties like light, temperature, blood pressure, to being used in the military. Below are typical examples of WSN 4.1.1. Military applications In the military, sensor nodes can be spread across the war zone so as to detect the presence of an enemy and also locate them. It can also be used to detect weapons e.g. chemical weapons, biological weapons and so on. Other applications under the military are target field imaging, security and tactical surveillance, intrusion detection. 4.1.2. Environmental application A sensor node can be spread out in the air to monitor the temperature and from its result weather predictions can be made, climate monitoring, pollution tracking amongst many other. 4.1.3. Medical applications The application can be mostly found in this section. The glucose machine to monitor diabetic patient makes use of a sensor, heart monitors. Basically, most medical equipment for monitoring patients makes use of a sensor system. 4.1.4. Urban applications The application of WSN in our society is very clear and obvious, it can ne see in transportation  Ã‚   and traffic system, automatic identification of drivers licence, street lights, home security, door alarm to mention a few 5. Ongoing research â€Å"A number of leading technological organizations are exploring pervasive computing. Xeroxs Palo Alto Research Center (PARC), for example, has been working on pervasive computing applications since the 1980s. Although new technologies are emerging, the most crucial objective is not, necessarily, to develop new technologies. IBMs project Planet Blue, for example, is largely focused on finding ways to integrate existing technologies with a wireless infrastructure. Carnegie Mellon Universitys Human Computer Interaction Institute (HCII) is working on similar research in their Project Aura, whose stated goal is to provide each user with an invisible halo of computing and information services that persists regardless of location. The Massachusetts Institute of Technology (MIT) has a project called Oxygen. MIT named their project after that substance because they envision a future of ubiquitous computing devices as freely available and easily accessible as oxygen is today.† Today the uses of Internet are limited as its users look for read-mostly information. As we move to a world where the Internet is used as an infrastructure for embedded computing, all this will change. We can hypothesize that the individual utility of mobile communication, wireless appliances and the respective mobile services pervasive technologies in general will be exploited through a digital environment that is – aware of their presence sensitive, adaptive and responsive to their needs, habits and emotions and ubiquitously accessible via natural interaction. Increasingly, many of the chips around us will sense their environment in rudimentary but effective ways. For Example  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Cell phones will ask the landline phone what its telephone number is and will forward our calls to it.  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Remote computers will monitor our health statistics and will determine when one is in trouble and will take appropriate action for rescue.  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Amplifiers will be implanted and used in the inner ear.  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   New machines that scan, probe, penetrate and enhance our bodies will be used.  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Refrigerators will be connected to the Internet so one could find out, via cell phone or PDA, what is in it while one is at the store. A refrigerator may even sense when it is low on milk and order more directly from the supplier or rather than this, the connection will enable the manufacturer to monitor the appliance directly to ensure that it is working correctly and inform the owner when it is not.  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Stoves will conspire with the refrigerators to decide what recipe makes the best use of the available ingredients, then guide us through preparation of the recipe with the aid of a network-connected food processor and blender. Or they will communicate to optimize the energy usage in our households.  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Cars will use the Internet to find an open parking space or the nearest vegetarian restaurant for their owners or to allow the manufacturer to diagnose problems before they happen, and either inform the owner of the needed service or automatically install the necessary (software) repair.  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Wrist watches will monitor our sugar.  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Digi-tickers or implanted heart monitors in heart patients will talk wirelessly to computers, which will be trained to keep an eye open for abnormalities. In a nutshell, our personal network will travel around with us like a surrounding bubble, connecting to the environment through which we move and allowing our mobile tools to provide us with more functionality than they ever could alone.† [13]    6. Conclusion Pervasive computing provides a very interesting vision for the future. Information would be basically handy through the help of the wireless technology, so instead of sitting on a PC to get information, we would have instant access through the use of our smart phones, our PDAs, e.t.c. As the growth in technology keeps increasing in the 21st century, it has basically influenced our daily lives, the way we communicate, shop, basically every aspect of it and enough evidence has it we are translating into the world of â€Å"pervasive computing† at a fast speed, and in few years time, the world would be living like a scene in the movie â€Å"Star Trek†.    7. Reference   8. Appendix youtube.com/watch?v=Q2DY6jWT2a4 youtube.com/watch?v=bS6XqjBO99Q youtube.com/watch?v=KsKne-fw-X0 youtube.com/watch?v=2I3T_kLCBAwfeature=related

Thursday, February 27, 2020

Observe a special needs childs activity (autistic child) when the Essay

Observe a special needs childs activity (autistic child) when the child tries to learn some information. Create a learning environment for this child - Essay Example One of the most common conditions in the category of developmental disorders is called autism. Autism is characterized by different kinds of improvement in the verbal and non-verbal communication mastery, social interaction, self help and playing skills as well as academic (intellectual) and cognitive skills. Other observable traits include limited repetitive and extreme patterns of behavior (Boyd, R.D. & Corley, M.J. 2001, 19). It is therefore imperative that the curriculum as well as other aspects of learning the designed in such a manner as to wholly meet the needs of these children. This section examines the learning needs of an autistic child and the theories that form the basis of select learning environments with the view of creating a most apt learning environment for specific special needs of a child. There are several groups of children with special learning interaction and communication needs. These conditions may include inherent conditions such as Autism, Aspergers syndrome, Down syndrome (Autism Spectrum disorders) and various physical impairments that include, hearing disorders, blindness and dumbness. Children who are born with or who develop these conditions are faced with a myriad of challenges in relationships as well interpreting, understanding the world around them. They lack the ability to communicate effectively. Autistic children seem to be in a world of their own and are not able to make out meanings of verbal and non-verbal communications such as gestures, facial expressions, physical contacts and even words spoken by people. (Anderson et al 1987, 352-366). Their semantic skills are disoriented and they seem to be indifferent about what is going on around them and even the people who are trying to interact with them. Their behavior does not match their feelings and interacting or relating with other people becomes very difficult

Monday, February 10, 2020

Taxation Principles and Concepts (Taxation) Coursework

Taxation Principles and Concepts (Taxation) - Coursework Example A capital allowance refers to the amounts in cash that a business operating in the United Kingdom can deduct from the overall income tax on its profits or the corporate tax. The sources of these sums of money come from certain purchases as well as investments as outlined in the Capital Allowances Act of 2001 (Channer & Rogers 2007, p.xiv). A business or corporate organization can claim capital allowances on the costs of cars, vans and machines purchased for business use, or other assets in the business such as scaffolding, equipment, ladders, furniture, computers, and tools. In addition, a business can also claim capital allowances on the expenditures incurred on plant and machinery, as well as, on facilities and equipment used for research and development, and items that a business operator uses privately before using them commercially. Another capital deduction occurs on the premises used for the company to run its business, such as improving a property, and converting a space abov e a building for rental purposes. As for your case Tobby, you can claim capital allowances on the following items: computers, car, premises and rent for Tamara. The capital allowance on computers is ? 200, car as ? 2,700, premises at ? 12, 5000 and Tamara’s rent at ? 4,000. As such, the total capital allowance that Tobby can claim from the tax authority is ? 19,400 (Dunn & Rogers 2008, p.664). The taxable profits of Lewis include all the expenses as well as the revenues generated by the company. The taxable profits include a deduction of all the expenses that are incurred in the business. These include the rates at 1,500, telephone charges for business calls only at 1,000, light and heat for the whole property at 3,000, NIC contribution for himself at 1,000, wage expenses for lily at 20,000 and for himself at 25,000. The other expenses also included in the expenditure of the company are car-running costs at 6000, depreciation expense on the cars at 4,000, loan repayment costs at 3,500, interests on loans at 5,000, insurance charges at 1,800, advertisement expenses at 1,500. The other additional expenses recorded in the business include parking fines at 1,000, gift aid donations at 1000, membership at a sports club for 900, and donations for lewisham hospital at 1000. He further needs to add an additional expense of wages, which he pays to Tamara at 20000 for the part time job she performs at his corporation. This totals all the business expense to ? 77,200 (Gabay, et al. 2007, p.180). This total expenditure by the business of ? 77,200 shows that the business in incurring a lot of expenses which in turn reduce its level of profitability. In order to calculate the profitability of the firm, this includes a deduction of the expenses from the revenues or incomes made or generated by the firm. The general income made by the business from its business processes and activities is ? 90,102, and a subtraction of the two provides the business profits at ? 12,102. This is the general profit, which is subjected to taxation as the income made by the business during the fiscal year under operation. As such, the profitability of the company for the year ended 31 July 2013 was ? 12,102. The projected assessable profits for the business in the fiscal year ending 2013/2014 were ? 12,102 plus the deductible allowances for the business (Gupta 2003, p.67). The best way to set an accounting year is to position it in line with the financial year of her majesty’

Friday, January 31, 2020

Company law Essay Example for Free

Company law Essay Applying this doctrine to the case study, Alicia can be regarded as one of the promoters of Batco Ltd, since she had involved in the formation of the company and ranked as one of the three directors after the registration. It’s also noticeable that the other two directors, Adam and Robin, were former employees of Alicia. Thus, even though Alicia didn’t play an active role in the formation of the company, the connection between her and Batco before and after the registration was solid. According to Aequilas v AEFC (2011) 19T ACLC 1006, the legal consequence of a person being identified as a promoter is that such person owes stringent fiduciary duties to the company and its shareholders. They are required to act in good faith and place the company’s benefits over their own (Harris, Hargovan and Adams 2011). More specifically, in Erlanger v New Sombero Phosphate Co (1878) 3 CA 1218, the House of Lords held that promoters have the duty of fully disclosure to a board of independent directors of the material facts when they enter into contract relations with the company; Or, as stated in the in Aequilas v AEFC (2011) 19T ACLC 1006, the court also accepts an explicit disclosure made to shareholders. Taking these judgments into account, Alicia, as a director of Batco Ltd, as well as a promoter, breached her fiduciary duties. Because Alicia, as a party to the contract with Batco, didn’t make known the notification she received from a government clerk to the company before they entered into the contract. Although without official announcement, the rezoning of the area was only a speculation, the unveiling of this information could prevent Batco from buying the site at that price, as the reassigned area could have a change in value. What more, a secret profit was obtained by Alicia in the selling of property. Despite that she made a disclosure of the actual profit she earned to Adam and Robin, these two directors could not fall into the group of independent directors. Additionally, even after Alicia had informed them about her real gain, in the prospectus Batco Ltd made to its shareholders, the profit number was falsely presented. Thus, Alicia also contravened the promoter’s duty of disclosure to the company’s shareholders. Once the breach of fiduciaries is established, Batco Ltd and its shareholders can sue Alicia, Adam and Robin for remedies. Under s 729(1) in Corporation Act 2011(Cth), the damaged party has right to recover the amount of the loss or damage resulting from contravention of duty of disclosure. And under s 729(3), the time for taking a legal action under s 729(1) is limited to in 6 years after the happening of the breach of disclosure duty. In Erlanger v New Sombeoro Phosphate Co (1878) 3 CA 1218, the judgment rescinded the initial contract and the damaged party was allowed to recover the purchase price. Similarly, in Glukstein v Barnes (1900) AC 240, a promoter was required to account to the company on the secret profit he realized from the breach of fiduciary duties without voiding the contract. Therefore, one likely outcome in this case study is Batco and its shareholders suing Alicia to rescind the purchase contract within 6 years after the happening of the breach of disclosure duty. As a result, Batco can recover the purchase price and return the site to the vendor, Alicia. Another possibility is Batco suing Alicia for breach of fiduciary duties and only require her account to the company for the secret gain. However, considering the unpredictable effect of rezoning on the purchased site, the former one would be a better option for Batco. According to Frino and Segara (2012), there are two elements of transaction costs, being the explicit and implied costs. Explicit costs include brokerage fees, exchange fees and government taxes which will not be discussed in this report as the trading exercise was performed without incurring such costs. Implied costs emerge when share prices become unfavourable due to effect of the share trades. These unfavourable expenses are difficult to estimate and deduce as they usually happen in a random manner (Frino and Segara, 2012). There are three types of implied costs which will be discussed below. Firstly, every trader will be exposed to bid-ask spreads (Frino and Segara, 2012). Bid-ask spreads are the gaps between the highest purchase price and the lowest selling price at which the dealers are keen to trade upon. Thus, the median of the bid-ask spread is deemed as the reasonable price. According to Frino and Segara (2012), when a dealer needs to complete a particular transaction urgently, the deemed reasonable price mentioned above will be forgone as the dealer will require immediate liquidity by purchasing or selling the shares at the stated bid or ask price. There are many ways and choices for a company of fundraising their commercial scheme and activities. One of the choices is through corporate fundraising to offer securities to attract public and outside investors. The statutory provisions in related to the process is located under Ch 6D. Under the Corporate Law Economic Reform Program Act 1999, the required standard full-disclosure document while public companies undertaking fundraising is as prospectus (zuozhe 267). In the case, Jaan Company wants to expand its market and decides raising funds through offering securities and has two options to choose: the first one is raising 10 million and keeps domestic; another one is raising 20 million and expand international. They decide to use offer securities to raise fund which means they will need to face a standard required prospectus to the public. According to Section 709, there are four types of disclosure documents. First is prospectus, which is the most common form of disclosure document and under Ch 6D s709 (1), it must generally be prepared for an offer of securities. However, if the raising capital fund is not exceeding 10 million, the prospectus is not compulsory to be prepared. The second type is short form prospectus. This type is permitted to reduce the length and complication of prospectus that are distributed to potential investors. The third type is an offer information statement. Under an offer information statement, the amount to be raised from the issue of securities is 10 million or less. The last one is profile statements. This type is prepared as an addition to a prospectus and a reform to simplify policy objective and reduce the volume of disclosure objects. Under the circumstance, for the option 1, an offer information statement is appropriate. The offer information statement is comparative simplified and according to the Corporations Acts, it is intended to facilitate more efficient capital raising, especially for start-up and small and medium sized enterprises(zuozhe, 268). The disclosure requirements are lower level than for a prospectus. Under offer information statements, the company is required to state the information about the company (including xplain the company’s business and the nature of securities, the financial audited statements within the previous 6 months), explain why the company needs to fundraising, disclose details about risks involved and all amount payable. In addition, it also must state to investors that it’s different and lower level compare with prospectus, remind the investors should acquire professional advice. Furthermore, the copy has been lodged with ASIC who takes no responsibility for its contents is required. For option 2, a detailed, full-disclosure prospectus is required. The obligations are concluded as following (zuozhe, 266): firstly, all the information, which is also guaranteed reliable and available at the same time, need to be provided in a prospectus to all investors that they might realistically need to know in order to make a decision about the company’s investment proposal; secondly, the documents must enclose all the risks associated with the concerned industry in which the company operates; thirdly, it is necessary that the disclosure of material information is in an effective way for fundraiser to undertake inquiries as well as disclose details which can enable investors to make a more accurate assessments about securities in a cost-effective way. I will recommend option 1in this case. Jaan is a small manufacturing business and not a mature company; it has not enough experience and comparative low capital base as well less able to meet the costs of raising capital. Compare with mature company, Jaan is less able to meet the risks to challenge the market changes and adapt quickly. Offer information is particularly suitable for the small and mid-sized enterprises; it has lower requirements than prospectus and also more flexible for the company. Part 2 According to S 728, if a disclosure document has following characteristics, then it would contravene: misleading or deceptive conduct; omission form; a circumstance that is required to disclose in the document but the company has not and the circumstance is raised as a problem. In this case, Jaan has a very positive forecast in the sales and profit in the following years; however, it has not happened. The company said the market needs of snowboarding are huge and the company has confidence to forecast that they have made a right choice. Unfortunately, the company is circulated these forecast without reasonable basis and inadequate marketing research. Furthermore, in order to attract investors, the company is using New Zealand’s snowboarding popularity diagram rather than global or Australia. Under this circumstance, the company has misled the investors and make them have a wrong perception of the company’s vision. In addition, the company also comes out a new circumstance: abnormal weather patterns caused by global warming will make the company to face a huge loss. This is unexpected but this circumstance should have been disclosed in the document. Under the Ch 6D, the company should disclose all the relevant risks to enable the investors to make a cautious decision. Nevertheless, the company only focus on the bright side of the future and miss to present the potential external factors that may influence the sales of the company. All these would be the facts that the company’s disclose document has contravened and will face a remedy for the investors. Similar case for Jaan’s investors can look at is Cadence Asset Management Pty Ltd v Concept Sports Ltd (2005): the defendant were misleading the investors about the company’s outlook, the court decision is disagree the defendant’s defence and upheld the plaintiff to recover the loss suffered. Defendants may avoid their liability if they can satisfy the defences set out in ss 731-733. In this case, according to section 731, Jaan may avoid liability if they can provide evidence that their sales forecast is based on reasonable grounds, there is no misleading for the investors. And in order to defend successfully, the company also needs to show that they undertake that they can confirm their information is based on reasonable basis and the accuracy is creditable in the prospectus (zuozhe, 288). Furthermore, Jaan should also to prove that they were unaware of the changing weather to make the company to bear the loss. These can be potential defences for the company. However, the case Cadence Asset Management Pty Ltd v Concept Sports Ltd (2005) has shown that if the company has a behaviour of misleading the investors in breach of s 728 (zuozhe, 287), Jaan may not be succeed in the defences based on the following facts: they use the wrong popularity diagram to forecast the sales (besides, the company also know this fact), this is misleading to the investors; in addition, the changing weather should be a relevant risk which must be disclosed to the investors. Investors have rights to know the risks associated with the operation. Base on those facts, the company may fail to defence.

Wednesday, January 22, 2020

Comparing Truth in Death Of A Salesman and The Glass Menagerie Essay

Seeking Truth in Death Of A Salesman and The Glass Menagerie      Ã‚  Ã‚  Ã‚   Often society seeks to thwart the desire of certain people to find and/or face the truth. Examples of this are found throughut literature. Two excellent example of this are Biff Loman from 'The Death Of A Salesman' and Tom Wingfield from 'The Glass Menagerie'. At some point, they both have to face and understand the truth about their lives. Biff is faced with the lies and   morals of society obsessed with the corrupt version of American Dream, especially his father, and his inability to pursue his own goals and dreams. Tom is faced with the sad reality of life in his family and the desire to escape it.    Biff Loman grew up in a family of a salesman. He had a reasonably happy childhood, and a great school career. He was good at American Football and won a football scholarship. His father, Willy Loman, was always very proud of his son and always praised him and put him above others. Unfortunately, Willy's life philosophy was ruined by the corrupted version of the American Dream. He believed that the key to happiness is money and success and the a person does not necessarily has to work hard to attain it. Biff grew up with those ideas and they influenced him a lot. But when he caught his father with another woman, the realization of the lie and corruption turned his life around. He no longer believes in his father or the dream, and lives a... ...Bloom, Harold. Introduction. Tennessee Williams. Ed. Harold Bloom. New York: Chelsea House, 1987. 1-8. Downer, Alan S. American Drama and Its Critics. Chicago, University of Chicago Press [1965]. pp. 218-239. Hayashi, Tetsumaro.   Arthur Miller Criticism.   Metuchen, NJ: Scarecrow Press, 1969. Levy, Eric P. "'Through Soundproof Glass': The Prison of Self Consciousness in The Glass Menagerie." Modern Drama, 36. December 1993. 529-537. Miller, Arthur.   Death of a Salesman.   New York: Viking, 1965. Williams, Tennessee. The Glass Menagerie. In Literature: An Introduction to Reading and Writing, 4th ed. Ed. Edgar V. Roberts and Henry E. Jacobs. Englewood Cliffs, NJ: Prentice Hall, 1995. 1519-1568. Comparing Truth in Death Of A Salesman and The Glass Menagerie Essay Seeking Truth in Death Of A Salesman and The Glass Menagerie      Ã‚  Ã‚  Ã‚   Often society seeks to thwart the desire of certain people to find and/or face the truth. Examples of this are found throughut literature. Two excellent example of this are Biff Loman from 'The Death Of A Salesman' and Tom Wingfield from 'The Glass Menagerie'. At some point, they both have to face and understand the truth about their lives. Biff is faced with the lies and   morals of society obsessed with the corrupt version of American Dream, especially his father, and his inability to pursue his own goals and dreams. Tom is faced with the sad reality of life in his family and the desire to escape it.    Biff Loman grew up in a family of a salesman. He had a reasonably happy childhood, and a great school career. He was good at American Football and won a football scholarship. His father, Willy Loman, was always very proud of his son and always praised him and put him above others. Unfortunately, Willy's life philosophy was ruined by the corrupted version of the American Dream. He believed that the key to happiness is money and success and the a person does not necessarily has to work hard to attain it. Biff grew up with those ideas and they influenced him a lot. But when he caught his father with another woman, the realization of the lie and corruption turned his life around. He no longer believes in his father or the dream, and lives a... ...Bloom, Harold. Introduction. Tennessee Williams. Ed. Harold Bloom. New York: Chelsea House, 1987. 1-8. Downer, Alan S. American Drama and Its Critics. Chicago, University of Chicago Press [1965]. pp. 218-239. Hayashi, Tetsumaro.   Arthur Miller Criticism.   Metuchen, NJ: Scarecrow Press, 1969. Levy, Eric P. "'Through Soundproof Glass': The Prison of Self Consciousness in The Glass Menagerie." Modern Drama, 36. December 1993. 529-537. Miller, Arthur.   Death of a Salesman.   New York: Viking, 1965. Williams, Tennessee. The Glass Menagerie. In Literature: An Introduction to Reading and Writing, 4th ed. Ed. Edgar V. Roberts and Henry E. Jacobs. Englewood Cliffs, NJ: Prentice Hall, 1995. 1519-1568.

Tuesday, January 14, 2020

Marketing Survey Dettol Liquid Handwash Essay

Following is the questionnaire followed to take up the survey: Neha: Who makes the decision to buy this product? Kamal: I make the decision to buy the product. Neha: Who else plays a role in this decision making? Is there anyone else whose opinion you take into consideration while choosing this product?Kamal: Mostly, I decide as to which product to buy, but my kids and husband also voice their opinion sometimes. Neha: Why did you buy this product and what are the attributes you look for? Kamal: I have been using this product for quite a long time. The main attributes are quality assurance and cost factors. Its re-fill pack is also a good attribute, as once you buy the pump pack; you can get the re-fill at much lower cost. It is reasonably priced and also the dettol is a well known brand. Neha: Have you used any other brand of liquid handwash? If yes, then what motivated you to try the other brand? Also, what made you come back to dettol? Kamal: Yes, I have also used Lifebuoy hand wash. I have tried lifebuoy once or twice, mainly because of the non availability of the dettol hand wash in the local store from which I get the monthly ration. So, when dettol is available, I go for that only. Neha: Why didn’t you choose to wait for the new stock of dettol liquid hand wash to arrive? Kamal: Hand wash is a product of daily use, so availability is necessary. Also, Lifebuoy, dettol and a couple of other brands are almost similar in pricing and quality. Thus, there is no incentive in waiting for new stock. Neha: Have you been using this product for long? Where did you get information about this product? Kamal: Yes, I have been this product for quite some time. I got to know about this product from advertisements in television. Also the displays in the store from which I buy most of my daily needs products , also helps me make an informed decision as I can compare the prices of different brands and also the various discounts and schemes offered. Neha: Which store do you go to? Any specific reason to choose that particular store? Kamal: I go to the local departmental store in the market near to my house. I choose this store as it is nearby and I can get everything from kitchen products to sanitary products to everything. It has wide variety of products available which makes my job easier. Summary: From the above survey, following are the conclusions that can be drawn about the consumer preference and the demand of a daily mundane product of less than Rs. 75/-. Stock Availability: One of the most crucial factors for low price daily products is the availability. As they form the daily needs of the consumers, non availability of the product is not an option. Consumer will quickly switch to a new brand. Competitive Pricing: For daily products like hand wash, face wash etc. pricing plays an important role in consumer opting for a particular product. As lots of options offering almost comparable quality and price are available, pricing is very important to attract the consumers. Consumer Loyalty: Consumer loyalty also plays a significant role in the sales of the product in question. A common answer as to why they continue to buy a given product is, that they have been using the product for very long time and never faced a problem. Hence, as long as the product is consistent in quality and pricing, consumers tend to be loyal to one brand as they get used to it. Promotion: Advertisements in television/print and display in the retailer store is the main source of information for the consumers. Attractive advertisements may prompt the consumer to try out a different product and thus effective promotion campaign is needed to sustain consumer interest. As the consumer is mainly the budget conscious house wives, discounts and schemes are another effective means to maintain consumer base and also attract new consumers.

Monday, January 6, 2020

Genealogy of the Titans and Gods in Greek Mythology

The genealogy of the Greek gods is complicated. There was not one uniform story all the ancient Greeks and Romans believed. One poet could directly contradict another. Parts of stories dont make sense, seemingly happening in reverse order or contradicting something else that was just said. You shouldnt throw up your hands in despair, though. Familiarity with the genealogy doesnt mean your branches always go in one direction or that your tree looks like the one your neighbor prunes. However, since the ancient Greeks traced their ancestry and that of their heroes to the deities, you should have at least a passing acquaintance with the lineages. Further back in mythological time than even the gods and goddesses are their ancestors, the primordial powers. Other pages in this series look at some of the genealogical relationships among the primordial powers and their other descendants (Chaos and Its Descendants, Titans Descendants, and Descendants of the Sea). This page shows the generations referred to in the mythological genealogies. Generation 0 - Chaos, Gaia, Eros, and Tartaros In the beginning were primordial forces. Accounts differ as to how many there were, but Chaos was probably the first. The Ginnungagap of Norse mythology is similar to Chaos, a sort of nothingness, black hole, or chaotic, swirling disordered state of conflict. Gaia, the Earth, came next. Eros and Tartaros may also have sprung into existence at about the same time. This is not a numbered generation because these forces were not generated, born, created, or otherwise produced. Either they were always there or they materialized, but the idea of generation involves some sort of creation, so the forces of Chaos, the earth (Gaia), love (Eros), and Tartaros come  before the first generation. Generation 1 The earth (Gaia/Gaea) was the great mother, a creator. Gaia created and then mated with the heavens (Ouranos) and the sea (Pontos). She also produced  but did not mate with the mountains. Generation 2 From Gaias union with the heavens (Ouranos/Uranus [Caelus]) came the Hecatonchires (hundred-handers; by name, Kottos, Briareos, and Gyes), the three cyclops/cyclopes (Brontes, Sterope, and Arges), and the Titans who numbered as follows: Kronos (Cronus)Rheia (Rhea)Kreios (Crius)Koios (Coeus)Phoibe (Phoebe],Okeanos (Oceanus],TethysHyperionTheia (Thea)Iapetos (Iapetus)MnemosyneThemis Generation 3 From the Titan pair Kronos and his sister, Rhea, came the first Olympian gods (Zeus, Hera, Poseidon, Hades, Demeter, and Hestia). Other Titans like Prometheus are also of this generation  and cousins of these early Olympians. Generation 4 From the mating of Zeus and Hera came: AresHebe the cup-bearerHephaestusEileithuia the goddess of childbirth There are other, conflicting genealogies. For instance, Eros is also called the son of Iris, instead of the more conventional Aphrodite, or the primeval and uncreated force Eros; Hephaestus may have been born to Hera without aid of a male. In case it is not completely clear where brothers marry sisters, Kronos (Cronos), Rheia (Rhea), Kreios, Koios, Phoibe (Phoebe), Okeanos (Oceanos), Tethys, Hyperion, Theia, Iapetos, Mnemosyne, and Themis are all offspring of Ouranos and Gaia. Likewise, Zeus, Hera, Poseidon, Hades, Demeter, and Hestia are all offspring of Kronos and Rheia. Sources Timothy Gantz: Early Greek MythHesiod Theogony, translated by Norman O. Brown