Intellectual Property (IP) refers to a unique type of creation of the mind for which a number of exclusive rights is recognis

Technology Management

Name

Professor

Institution

Course

Date

Technology Management

Question 1

Intellectual Property (IP) refers to a unique type of creation of the mind for which a number of exclusive rights is recognised under a number of corresponding laws. Within the intellectual property law, the owners’ posses exclusive rights to many kinds of intangible assets which may include artistic works, discoveries, inventions, symbols, and designs. In many jurisdictions, the common types of intellectual property rights are copyrights, industrial design rights, patents, and trade secrets (Haynes, 1995).

Gomulkiewicz, (2010) argues that intellectual property disputes may involve intellectual property like copyrights, patents, and technical innovations that many businesses need to adequately protect. Such disputes may include securing software licenses; negotiation, enforcement, and defence of confidentiality and non complete agreements; and drafting and the negotiation of software development and marketing contracts.

This particular case involving Tonica Car Manufacturing and Systems Inc is an intellectual property dispute concerning royalty claim in negotiation of software development, non complete agreements, and marketing contracts (Torrance, &, Tomlinson, 2011).

Question 2

According to Gomulkiewicz, (2010) valuation of technology is often subjective, though it may reflect its historical cost as adjusted by depreciation, and the value directly related to its expected profitability. Since technology is an intangible asset, the valuation criteria should establish parameters within the financial arrangement could be negotiated, not including only amounts, but also how the payments are to be made. The income approach is most appropriate in determining the respective shares the parties should each have of the benefits then find a royalty formula, as a rule of the thumb; the 25% rule should be applied. Assuming the income accrued by Tonica will be $6 million annually, and then the royalties that System Inc will receive is $1.5 million yearly.

Question 3

If Tonica loses the case,

The alternatives available for them may arise from the fact that the agreement was done through a verbal approval (lack of formal contract) and not a legitimate Intellectual Property Licensing. These illustrations show all the components of licensing agreements that were not all taken care of by System Inc.

Figure SEQ Figure * ARABIC 1: conceptual framework

The alternatives available to Tonica are: Auditing Licensing Agreements does not give Tonica all the terms of compliance with the royalty claims for current or future business plans. Royalty or other costs associated with the non existing license were not communicated to Tonica in advance. Estimated legal duration and period of technological usefulness of the system is very ambiguous, and therefore, Tonica has no legal obligation to be tied to these royalty claims. Therefore they can seek legal redress, acquire the system from another company, or just continue with System Inc.

They should not continue with System Inc, because System Inc. Do not seem sincere in their business dealings. In the initial verbal agreement, the clause on the royalties was not part of the costs, but later fixed by System Inc.

The fixed cost contract would be most appropriate to Tonica, considering the cost of the system, future business performance, and the ever changing technological advancements. These royalty payments will continue eating into their profits and add operation cost in their business. Tonica should severe their relationship with System Inc, and look for another system supplier who is in cognisant with their business goals and objectives.

Question 4

If the matter goes to court, Tonica should win the case, System Inc could not safeguard their intellectual property right by entering into a verbal contract. It is the responsibility of organisations to ensure that the software they build and sell is is done within a responsible policy framework for the use of their software and protection of their intellectual property. Withdrawal from negotiation is not the same as failure (Gomulkiewicz, 2010).

References

Gomulkiewicz R, (2010). Enforcement of Open Source Software Licenses: The MDY Trio’s Inconvenient Complications. Yale J. Law & Tech. 106

Torrance, W. &, Tomlinson, (2011). Property Rules, Liability Rules, and Patents: One Experimental View of the Cathedral. Yale J. Law & Tech. 138

Jack M. Haynes (1995). Computer Software: Intellectual Property Protection in the United States and Japan. Byline: Issue: VOL. XIII. NO. 2

50 minute lesson plan to teach modal verbs

50 minute lesson plan to teach modal verbs

Lesson Plan

Date: 4th January, 2014 Level: Intermediate

Activity: Teaching of Model verb: The students will practice the use of modals through singing and games.

Skills: Speaking, Listening and writing.

Outcome expected: throughout the entire learning lessons, the students ought to identify diverse modal verbs and the meaning that each of the verb convey: such as ability, suggestion, obligation and necessity. The students are also expected to also construct grammatically correct sentences that contain modals in the correct context. While the lesson still continues, the teacher will also expect the students to rehearse the use of the modal verbs through singing a song mashed up with modals verbs (Skocik & Weston, 2002 p. 67). The modals verbs will entail in the construction of the lyrical part of the song hence making it possible for the students to practice and convey the meaning of the verbs. Eventually, the teacher will also require the students to play some of the ESL games that will further promote the understanding of the modals verbs.

Resources needed for the lesson: The dictionary, board, marker, computers, data show, worksheets and speakers.

Introduction :

Greetings.

Intro-Warm up

“Using Modal verbs: an interactive presentation”

While-Stage:

“The modal verb song”

Post Stage:

“Review on Modals Verbs” Time

10Mins

15Mins

15Mins

10Mins Comments:

In the introduction, the teacher will greet students, call out the roll call and inform the students that the lessons will entail of modal verbs.

The teacher will give examples of related modal verbs: Can, Can’t, Should, Shouldn’t, Might, Have to and Must (Gerngross, Puchta & Thornbury, 2007 p. 81)

The teacher will then offer a brief description of the three stages of the lesson.

The introduction:

In the introduction, the teacher will present a power point that will reveal modal verbs to the students.

While stage: The teacher will expect the students to sing along the modal verbs songs.

Post stage: The teacher will present the ESL games on modals verbs and expect students to take part in the games.

The teacher will present power point slides containing modal verbs. In the presentation, the explanation of the usage of the modal such as; Must Can Cannot, Must not, May not and May (Skocik & Weston, 2002 p. 78). The power point will also contain a brief description of the modal verbs. The meaning of each of the modal verbs will also entail of the main parts of the slides. Through the use of the L2 audio samples, the teacher will also give the correct pronunciation and usage of the modal verbs. (The teacher will require the students to pay attention to the audio samples).

After the presentation and necessary explanations, for purpose of ensuring that students have understood, the teacher will require the students to complete 5 fill in exercises Must (Gerngross, Puchta & Thornbury, 2007 p. 81).

After completing the first activity, the teacher will ask the students to attentively watch a musical video. The music video will entail of musical video where diverse songs will be mashed up and lyrics contains of modal verbs (Capel & Sharp, 2013 p.44). An example of such a song entails; http://www.youtube.com/watch?v=3KcSEnVnQ98

The teacher will later explain the usage concerning most of the modal verbs and how they work in sentences. For instance: May, May it be?, might, can, can’t, mustn’t and should Must (Gerngross, Puchta & Thornbury, 2007 p. 112).

In order to ensure that all the students understand, the teacher needs to play the video twice or thrice hence ensuring that all students comprehensively understand. The teacher also needs to show videos that contain written L2 inputs hence make it possible for the students to relate the modal verbs in the lyrics with the written information (Skocik & Weston, 2002 p. 95). At this level, the teacher becomes capable of asking and clarifying doubts concerning vocabulary and idiomatic expressions that the students might face difficult in understanding.

(In all the situation, the teacher needs to notice to mood of the students; audience in the classroom environment. One of the greatest drawbacks of applying games and songs for purposes of teaching is the fact that the songs occasionally saturate the minds of the students (Capel & Sharp, 2013 p.71). In this case, it becomes easily for the students to get distracted from the actual class hence pay less attention).

In an effort to ensure that the students understand the modal verbs appropriately, the teacher will introduce the third stage that involves asking the students to play three online games obtained from

http://www.kidssesigames.com/

During the playing of the games, the students ought to rehearse the use of the modal verbs taught during the classroom lesson such as: Can, Can’t, Must, Must not, May and might (Capel & Sharp, 2013 p.148). The teacher ought to provide enough information concerning the way students needs to play the games. The teacher also needs to engage in playing the games hence ensuring that the students learn to obtain the correct vocabulary and checking of the scores.

BibliographyCapel, A., & Sharp, W. (2013). Objective proficiency. Cambridge, Cambridge University Press.

Gerngross, G., Puchta, H., & Thornbury, S. (2007). Teaching grammar creatively. Cambridge, Cambridge University Press.

Skocik, C., & J. Weston Walch (2002). English lesson plans for substitute teachers. Portland, Me: J.W. Walch.

597 Reflection Week 10-12

Week 10

I agree that issues revolving around data, including analysis, collection, interpretation, and their functions in decision making have evolved significantly over the last few years. For example, Bayer and Tailard (2013) found that the concept of story-driven data analysis is changing how organizations today are not just collecting information but also how they disseminate the same to the target markets. In this week, I found that there is need to consider the purpose of an analysis and the audience because these factors will determine the approaches used and their interpretation. Stories also enable the proper construction of hypothesis by using available data and analyses. Even in the description of the different data types, it is important to retain the quality of information that will facilitate story telling.

References

Bayer, J., & Taillard, M. (2013). Story-driven data analysis. Harvard Business Review. Available at: www.sas.com/content/dam/SAS/en_us/doc/whitepaper2/hbr-from-data-to-action-107218.pdf

Week 11

In this week, I got the perception that a majority of writers dismiss descriptive analytics as an unreliable approach and tend to favor the more quantitative strategies in the analysis of data. I do not agree with the presentation of descriptive analytics as a weak form of data analysis. In fact, I find it as one of the most important approaches to help in improving decision-making. For example, descriptive data are used where qualitative formats are necessary to gather insightful information. Descriptive analytics answers the question of what happened (Bekker, 2019). This means that it is actually a superior form of analyzing data and ensuring that it meets the criteria required. Organizations are still focusing on understanding the basics of what has already happened before they can fully venture into implementing change.

References

Bekker, A. (May 14, 2019). 4 Types of Data Analytics to Improve Decision-Making. ScienceSoft. Available at https://www.scnsoft.com/blog/4-types-of-data-analytics

Week 12

I concur with the idea that in a data driven world, it is important to have the skill and tools to know where a narrative is not adding up. Here, factfulness emerges as an important element. For example, organizations today must have the tools, skills, and capability to not only collect large amunts of data but also interpret it and discern for what is quality and trustworthy before using it as a basis for decisions. Anscombe (1973) recommends the use of graphs as essential statistical analysis tools. Graphs allow exact calculations that is important for creating and testing hypothesis. Overall, such data are then used to facilitate decision making.

References

Anscombe, F. J. (1973). Graphs in statistical analysis. The american statistician, 27(1), 17-21.

Intellectual Property Rights- When an Employee Leaves

Intellectual Property Rights- When an Employee Leaves

Insert Name

CCJS 321

Insert Date

 

 

 

 

 

 

 

1.Can you (or Mr. Yourprop’s supervisor) search Yourprop’s personal vehicle currently parked in the Company parking lot for digital evidence? Support your answer.

In the world today, all efforts are being driven towards the upholding of intellectual property rights. The fact that the current world is driven by cut-throat competitiveness, it is only logical that companies would do all in their powers to protect and uphold their secrets. Merges (2010), in the article journal, “Contracting into Liability rules: Intellectual property rights and collective rights organizations,” asserts that, precisely, competitive advantages can be gained if the competing company employees a former employee from the different company. Upholding and maintaining trade secrets are essential in today’s business world; therefore, it is regarded as a very prudent tool in the fight for intellectual property rights (Merges, 2010). For example, it is through the upholding of such vital trade secrets that the Coca-Cola Company still enjoys success in the economic market for its formula used in the manufacture is a well-guarded secret.

In light of this, Mr. Yourprop has departed from the company. Evidently, it was the duty of Mr. Yourprop to uphold loyalty while employed. Therefore, in the absence of a non-competitive agreement, Mr. Yourprop is free to go into competition with the former employer based on his skills and competences. Mr. Yourprop being an American citizen means that he too is covered by the constitution. Clearly, searching Mr. Yourprop’s vehicle would be a violation of his rights and freedoms according to the Fourth Amendment. According to the Fourth Amendment, the right to privacy is to be maintained to the latter. Mr. Yourprop’s vehicle is his property, and he is afforded the right to privacy. Any act to search Mr. Yourprop’s car without a proper legal notice is a crime. Any valuable information that may be gained from the illegal car search would never be admissible in a Court of Law in the Supreme Land.2. If evidence of this theft of intellectual property can be found, Makestuff Company may seek to pursue criminal prosecution. Can Mr. Yourprop’s supervisor direct local police investigators to search his personal vehicle that is parked on the Company parking lot? Support your answer

The USA is a nation that was founded by our forefathers through the rule of law and order. All and sundry respected the law and upheld the law. Individuals know and understand their roles and duties. In as much as Mr. Yourprop is deemed and suspected to have been involved in the theft of intellectual property rights, it would be incorrect for Mr. Yourprop’s supervisor to instruct an arrest. It would be the wrong cause of action for Mr. Yourprop has not been convicted or found guilty by the court of Law. The Court of Law in the Freeland has the mandate of giving judgments based on the evidence provided. Evidence needs to be gathered in a legal, systematic manner that obeys all legal proceedings. If need be, the court of law is then to issue an arrest or search warrant for the accused persons. The right step would be simply during the exit interview; Mr. Yourprop should have been reminded of the legal obligations and policies of the company in the case that they signed any company policies (Danzig, 2012). If there is any perceived thought that Mr. Yourprop has indeed engaged in theft of the source code, it would be right to preserve the computer forensically and only retrieve it through the legal means and processes. Therefore, it would be wrong and irrational for Mr. Yourprop’s supervisor to instruct the police to search his vehicle for it is only a court of law through a judge that can issue a search warrant.

3. Can (or Mr. Yourprop’s supervisor) search Yourprop’s assigned locker in the Company’s on-site gym for digital evidence? Support your answer.

According to Beazley and Boenisch (2011) in their book, “Continuity Management: Preserving corporate knowledge and productivity when employees leave,” evidence collection in any legal proceeding needs to be lawful and observes all legal channels having being adhered. Collection of information or evidence using underhand methods such as “sneak-and-peek” would never be allowed in a court of law (Beazley & Boenisch, 2011). The credibility of the evidence collected through such methods such as searching Mr. Yourprop’s locker is wrong under the Fourth Amendment Act that protects properties of American citizens from unauthorized searches. All seizures and searches ought to have a search warrant and should be with a probable cause that the victim may be guilty of the crime. Therefore, searching Mr. Yourprop’s locker would be unlawful and illegal.

4. Can (or Mr. Yourprop’s supervisor) use a master key to search Yourprop’s locked desk after he has left the premises for digital evidence? Support your answer.

Amar (2012) in the journal “Fourth Amendment First Principles,” alludes to the fact that using a master key to open Mr. Yourprop’s locked desk is an infringement of the rights and freedoms enshrined in the American Constitution. In fact, such actions amount to a crime and Mr. Yourprop can sue or report such an infringement on the right to privacy to a court of law and the supervisor can be charged. Even if significant and crucial evidence is obtained from the illegal desk opening act, such evidence does not hold water in court since it was collected unlawfully (Amar, 2012). The constitution law ought not to be broken so as to give justice to a different crime. Thus, it would be a punishable action against the law if the supervisor does open the locker with a master key.5. There is a page in the Company’s “Employee Handbook” that states that anything brought onto the Company’s property, including the employees themselves, is subject to random search for items belonging to the Company. There is a space for the employee to acknowledge receipt of this notice. Mr. Yourprop has a copy of the handbook but never signed the page. Does that matter? Explain.

The law seems to encourage a policy of competition among corporate organizations. Hence, no formal legal restrictions have been placed on employees in the case that they leave the company. However, it is up to the company to formulate policies and strategies to protect themselves and their intellectual properties. The “Employee Handbook” was such a move by the company to protect against the undue competition so as to uphold their trade secrets (Danzig, 2012). The fact that Mr. Yourprop did not sign that part of the Company’s “Employee Handbook” means that he is free from any searches. The action of signing the “Employee Handbook” means that the employees commit themselves and agree to their right to privacy to be infringed. However, Mr. Yourprop did not commit or agree to this infringement of the right to privacy for he did not sign the agreement. Therefore, it is a matter that should be looked at with deep concern. Any acts of random searches and seizures on Mr. Yourprop’s property can result in legal implications for the company for Mr. Yourprop6. Makestuff Company uses a security checkpoint at the entrance to the building. A sign adjacent to the checkpoint states that the purpose of the inspection is for security staff to check for weapons or other materials that may be detrimental to the working environment or employee safety. Screening is casual and usually consists of verification of an employee’s Company ID card. Can security staff at this checkpoint be directed to open Mr. Yourprop’s briefcase and seize any potential digital evidence? Support your answer.

The Security checkpoint should not be for the purposes of obtaining any digital evidence. Any attempts by the security checker to seize Mr. Yourprop’s briefcase would be unconstitutional and a violation of the fourth amendment. The fourth amendment offered protection against any illegal seizures of property without any probable cause. The fact that Mr. Yourprop will be forced to open his briefcase while the security check is a casual one means that Mr. Yourprop is being discriminated (Merges, 2010). This would be a violation of the rights and freedoms as per the Fourth Amendment. Therefore, the security scanner should not be used as an excuse to open Mr. Yourprop’s briefcase for such attempts would be illegal. Any potential of digital evidence should be collected in a constitutional manner so that it may be admissible in a court of law (Amar, 2012).

 

 

References

Amar, A. R. (2012, April 1). Fourth Amendment First Principles. Harvard Law Review, pp. 757-819.

Beazley, H., & Boenisch, J. (2011). Continuity management: preserving corporate knowledge and productivity when employees leave (3rd ed.). New Jersey: John Wiley & Sons.

Danzig, M. (2012, June 14). Protecting your Business- When Company employees leave and Compete. Retrieved April 1, 2015, from Corporate Compliance Insights: http://www.corporatecomplianceinsights.com/protecting-your-business-when-company-employees-leave-and-compete/

Merges, R. (2010). Contracting into liability rules: Intellectual property rights and collective rights organizations. California Law Review, 14(4), 1293-1393.

Intercultural Communication

Intercultural Communication

Name

Institution

Intercultural Communication

This paper is a critical response on the article about intercultural communication. According to the article, it is paramount for individuals to learn how to communicate with people from diverse racial, cultural, ethnic, regional, gender, age and social backgrounds. At the same time, it is important to understand oneself and use one’s identities when interacting with others, particularly in a new environment. In doing this, they should learn, understand and appreciate their differences. As a result, they will fit, adapt and establish good interpersonal communications despite their differences.

I agree with the assertion that the best way to develop a perfect interpersonal communication in diverse cultures is through the correct use of language. It is one of the ways of showing people’s identities. Hence, in order to fit and adapt, it is essential to learn the correct use of language (Gudykunst & Kim, 2003). In other words, one must know the correct use of that language’s pragmatics, grammar and non verbal signs. Then, he will apply them appropriately without offending anyone. For instance, the incorrect use of gestures can offend others. Therefore, the basic aspects of spacing, proximity and touch must be clearly understood.

Besides, I strongly support this article for emphasizing the role of dynamism in intercultural communication. The understanding of the fact that humans are naturally diverse creatures can help to develop a good rapport in the society. For example, if people relocate to a new place, they should not use their culture and language as a tool of criticism. Instead, they need to use them as a baseline of conformity (Gudykunst & Kim, 2003).

In conclusion, I would like to emphasize that the role of communication in the society is greatly significant. The only way through which we can stay together is by tolerance. We must accept and appreciate differences by showing respect to all the people. This will help us to fit in any society.

Reference

Gudykunst, W. & Kim, Y. Y. (2003). Communicating with strangers: An approach to

intercultural communication, 4th ed. New York: McGraw Hill.

700-900 words in APA Style. This time, given the very quick turnaround time for grading, 900 words will be a hard deadline

700-900 words in APA Style. This time, given the very quick turnaround time for grading, 900 words will be a hard deadline.

Please remember to:

Come up with a catchy and original 2-part title*Do not call it simply “Final Paper”*

Proofread and read aloud for typos and grammatical errors. 

* Format the essay professionally with a standard 12 pt. font (Times New Roman preferred), double spacing, and page numbers.

* You do not need to use readings from the class, but you are welcome to.

* Use at least a few section headings/subtitles to break up the flow, and avoid super-long paragraphs

* Use APA style.

* Submit as a .doc or .docx file.

* Do not plagiarize. Anything taken from outside sources must be properly cited and credited.

Prompts

Whatever you choose, be sure to include at least 3 solid quotations, and to write short, clear, and complete sentences that refer to your chosen works specifically and in detail. Also, note which number you chose at the top of the paper.

Humor and Horror. These effects seem like opposites but are connected in many ways. What is the connection between them? How are they similar or different? Choose at least one work (story, book, film, TV show, etc), from inside or outside the class, and analyze what makes it funny or scary, or both.

Be specific—how are humor and fear developed, and how are they resolved? Why are they important feelings to experience while reading and/or watching? What do these responses tell us about ourselves?

If you want to focus purely on horror or purely on humor, that is fine as well.

Mythology and Fairy Tales. Choose at least one myth, legend, parable, or fairy tale from any time, period and any culture or religion and analyze its meaning and effect. Why is it a classic story? What drives, hopes, fears, or other aspects of human life does it play on? What images or behaviors does it show, and why are these important? How has it evolved over time? You could look at several versions, or a written version and a film adaptation, to aid your discussion.

Art vs. Entertainment. What do each of these terms mean to you, and how are they similar and/or different? What makes something entertaining and what makes it a work of art? Can the same story be both at once? Why or why not? Choose at least one work to discuss these ideas or choose two and argue that one provides entertainment and the other artistic value, and why.

Childhood. The poet Charles Baudelaire once said, “Genius is no more than childhood recaptured at will.” Think about this idea and its meaning to you by revisiting a storybook, movie, or show—that you loved as a child. Consider why you loved it as a child, and what it means to you now, as an adult. What feelings did it give you before you knew much about the world, and what feeling does it give you now that you know more? What makes this story effective for children and how does that differ from stories meant for adults?

You could also consider memory: why did this story stick in your memory, and how has it changed over time?

Dreams vs. Reality. In the late 90s, as the Millennium was approaching and the internet was becoming mainstream, a number of movies came out that dealt with Plato’s Allegory of the Cave in terms of technology and virtual reality. The most famous is The Matrix, but the list also includes Dark City, eXistenZ, The Thirteenth Floor, The Truman Show, The Cell, and Being John Malkovich. Pick one (or more) of these movies (ideally, not just The Matrix) and examine any aspect of it that interests you. How does it hold up today, more than twenty years later? How has our relationship to reality and dreams, via technology, changed or stayed the same? What can we learn from these stories now? Do you agree or disagree with their understanding of reality?

OR: pick any story that deals with fantasy, dreams, or alternate realities, and consider how it works. What is “reality” in this work, and how does that change or develop over the course of the story? Is reality subjective or objective? This could be something we read in class, something from your own reading/viewing, or both.

1815 Battle of New Orleans

1815 Battle of New Orleans

Name

Institution

Course

Date

According to Ridler 2011, the battle of new war that took place on 8th January 1815 is among the unique war that took place in 1812. This war occurred after the end of 1812 war. According to Pickles 1993, the 1812 war was about any of the oft-trumpeted causes: Free trade and sailor’s rights’, or ‘the second war for American Independence. It was America that declared the 1812 war and it commenced after England had defeated Napoleon. After Napoleon had been defeated in Europe, Britain stopped fighting against revolutionary France and America. England then started consolidating its forces in North America to deliver critical blo3ws from both sea and land to the American forces later in 1814.

Huber 1971 states that the battle of New Orleans and the American history had a profound effect upon the American history. It not only saved New Orleans from conquest by the British, and the Mississippi an American river, but it opened the way for westward expansion. Huber 1971 further explains that the war increased American’s prestige in the world, gave the young United States confidence in its military powers, and increased the national feeling of unity. The battle of New Orleans was the last major battle of the War of 1812. This war, according Huber 1971 which had been going on for nearly a year and a half without any decisive military action, suddenly became alive when the British, after defeating Napoleon in April, 1814. New Orleans was a strange place. The style of its buildings was a curious blend of French and Spanish influences with French predominating.

American Defenses at New Orleans

England had the intention of capturing New Orleans, Louisiana who had had great cotton and sugar stores, did not allow American to use Mississippi river to transport soldier and other products. According to Angle 1958, American mission was not clear. The New Orleans War broke early January 1815 when American soldiers confronted another military force few Miles from New Orleans. At the time America was entering the war, its economy was worsening and the communal support for war was declining. Although the war between the two nations, England and American had started off in early 1812, the war intensified after Napoleon that England unleashed its military’s full force to capture New Orleans. The main aim of capturing New Orleans by England as explained by Paul 1958 was to enable them control Mississippi river and other rivers essential as commercial routes to the Gulf of Mexico and other regions.

In 1814 England started accreting its invasion force. Alerted, American state sent a message to Andrew Jackson to at once go to New Orleans and devise a defense of city. According to Paul 1958, the war commenced in the dawn of 8th January 1815. Andrew Jackson had poor leadership, was confused in the field, the Swampy terrain and United States formed forces to create debacle for the England forces. The war ended after one hour when England forces surrendered. The war resulted to killing of 300 England forces with 1,200 wounded while United States had 13 killed and 52 wounded.

Andrew Jackson

On the day of the War (1815), Andrew Jackson led a small group of army to a decisive American victory against 800 army members of England. The American force waiting to receive the attack was formidable indeed. It consisted of about 6,700 men, of who 4,000 manned the defense works of Line Jackson, which then had eight batteries (Pickles, 1993). More importantly, the guns were served by expert artillerymen, many from the navy, and of course the pirates, who affected a rudimentary uniform by wearing red shirts.

Pickles 1993 explains that the morning of 8th January was cold, with heavy mist that the sun had yet to burn off, when the American line saw the British signal rocket are skyward and burst, and heard the drums strike upon. The American artillery immediately answered by pending up all along the line. For a while nothing could be seen through the mist except the muzzle flashes of the supporting British artillery. Gradually, as the columns drew closer and the mist lifted slightly, a skirmish line of riflemen could be seen, and then two columns one marching down (Pickles, 1993).

The conflict that broke out in 1812 seemed born of an almost subconscious desire for a war complete the separation of America from England begun by the War of Independence. Pickles 1993 opine that the war when it came was bloody and hard fought. In one last attempt to break the deadlock the British sent major-General Sir Edward Pakenham to capture New Orleans. According to the author, Pickles 1993, the troops he commanded were elite, veteran regiments. Andrew Jackson leading the defenders commanded a mixed force including militia, free Negro battalions, Indians ad a group of local pirates. This title describes how this mixed force decisively defeated the British veterans in battle that has become part of American legend.

The battle brought out in Chalmette Plantation, south of Orleans. As a result of the war, Jan Lambert who was by the British General was murdered, directed the troop he was leading to withdraw form the war and from Louisiana. The British troops were preparing to take new fresh attempts at Ala but they finally withdrew after they were informed that the war had ended.

Even though the New Orleans War had little military importance, since the war took place after concluding the treaty, it served to boost the confidence of America. Since its occurrence to date, the Southern American continues to celebrate their victory over this war.

Reference

Author: Jason Ridler. http://www.eighteentwelve.ca/?q=eng/Topic/59

Pickles T., 1993. New Orleans 1815: Andrew Jackson Crushes the British. Publisher Osprey military campaign.

Huber L., 1971. New Orleans: A Pictorial History. Publisher Pelican Publishing.

Angle, Paul, M. 1958. “The Battle of New Orleans, 1815,” EyeWitness to History, eyewitnesstohistory.com (2006).

GLASS A., 2014. Battle of New Orleans is fought, Jan. 8, 1815. U.S. Library Of Congress.

Pickles T., 1993. New Orleans 1815: Andrew Jackson Crushes the British. Volume 28 of Campaign (Osprey Publishing). Publisher Osprey Publishing

Intercultural communications

Intercultural communications:

Abstract:

This paper explains, describes and rectifies a situation which illustrates an intercultural communication issue within the work environment. A complete description of the issue related to communication will be covered, along with the outcome of the situation. A diagnosis of the communication issue and cultural norms involved will also be discussed. Several recommendations that would have prevented the communication issue will also be discussed.

Intercultural Communications:

Today the world has an increasing number of contacts that result in communication between people with various linguistic and cultural backgrounds. The communication requires being as constructive as people, without breakdowns and misunderstandings. Like many other areas Sweden is changing into a multicultural society. In Sweden the health care industry has been one of the most ethically and segregated work places based on gender compared to the rest of the industry. It is starting to change rapidly that has created some communication issues.

Communication issue description:

Context:

“The chance of hearing Swedish with an accent in hospitals and other health care institutions is fairly high” (Allwood, et.al.). There is such a shortage of health care personnel that they are doing job abroad because they can work less hours, get lower taxes and get higher salaries outside of Sweden. Sweden has been recruiting health care personnel from other countries to cover the open positions to the number of individuals working abroad. Physicians who are working foreign countries experience cultural differences and language usage.

The non-Swedish physicians are generally belonging to EU/EES countries. Many Hungarian, German, Polish and Spanish physicians are working in different areas of Swedish. Hungarian and Iranian physicians are occupied major part in the study.

Outcome:

It creates the need for giving training programs to help the physicians understand the local culture of their patients and help to reduce negative impact of cultural variations. There are number of alternative solutions to alleviate the communication gaps. These solutions will be explained in further detail within in this document.

Diagnosis of Communication issue:

The first step to fix a problem is to understand what the problem is. To diagnose the problem we need to get more information. The best method is to get the information is to develop quantitative and qualitative methods.  “The quantitative method is a survey consisting of three questionnaires, i.e. one to non-Swedish physicians, one to Swedish health care personnel and one to Swedish patients” (Allwood, et. al.). The surveys have three different sections, with total 30 questions. The sections are background information, views on patent communication and communications with colleagues. The open questions and multiple choices each allowed some space for comments if the participant felt they preferred to make comments.

The qualitative method is done through video recordings use that is related to interviews and work related activities.

The findings of the study specify that there are definitely communication issues between Swedish health care personnel and non-Swedish physicians. Especially it is true for male nurses. 100% of the male nurses agreed on these issues in the survey. The majority of health care personnel of Swedish believe poor language competence can be mistaken for low professional competence. Only 18% of non-Swedish physicians believe that language problems have a negative effect on the medical competence of physician.

Cultural norms:

Swedish have their own set of cultural norms like the rest of us. The “Swedes tend to be consensus-oriented and less open to risk” than other cultures, such as the Dutch (Stuurman, 2005). “The Swedish decision-making is much more closed” than the Dutch (Stuurman, 2005). The Swedish people tend to lead by agreements rather than by control. The people are willing to sacrifice to develop consensus.

The Swedish natural passive nature may have affected the communication transactions if they are not interested to discuss touchy situations. They may select to overlook a situation rather than address the issues for fear of causing conflicts.

Germans do not prefer personal relationships or long standing relationships with other employees. These people are not ready to share their innermost thoughts. Iranians are very traditional and cannot easily fit into other cultures.

Strategies for dealing with the issue:

The skills of cross-cultural cannot be taken for granted; they are skills that need to be improved. The surveys analysis shows that every individual is relatively satisfied with their communications. They understand that misunderstandings can occur, but for the most part they can effectively communicate. To help reduce the misunderstandings, educational programs must be established for certain groups of people in the work area with language and cultural barriers in mind. Cultivating cross-cultural skills to improve the understanding of other cultures, through the study of its values, its history that identify and differentiate it from other cultures are important.

Another method may be to have coffee breaks together with colleagues in lunch rooms and minimizing conflicts for integration in a Swedish work place. It may sound silly, but Swedish are famous for their coffee drinking tradition, which is certainly why they believe it will help to create a more convenient work place. “It is important for Swedes not to have conflicts, and they will go to extreme lengths to avoid it, if possible” (Stuurman, 2005).

Some other strategies that are noted by the Diplomacy.edu web site are;

Be other oriented. In the Wizard of Oz, Dorothy said, we are not in Kansas anymore. No one can no longer depend on own cultural heritage assumptions. This is not to tear down the own culture value but it is to make that one can aware of richness that is available to that person in other view points. Also it does not mean to try to be something that one is not. It means allowing the others to be whoever she or he is rather than who one can think that person should be.

Ask questions. Be ready to share information about yourself and also be sensitive in the way you ask (you do not want to be perceived as prying). But open communications help in minimizing the uncertainty in any relation.

Develop mindfulness. This is one way of saying “be aware”. Acknowledge that there are is a relation between deeds and thoughts, and become aware of your own thoughts and assumptions. Be active, be conscious, not reactive. Also be aware of your own self task.

Tolerate ambiguity. Communicate with a person who is from other culture produces uncertainty that is uncomfortable. Learn to tolerate the discomfort until come out on the other side.

Avoid negative judgments. Avoid thinking that your culture has all the answers. It has its cultures, so do other cultures.

Summary:

The work environment creates challenges with cultural differences. These cultural differences affect all aspects of lives from work to home. It is necessary to understand that we should not adopt other cultural styles or abandon our own cultural characteristics. We should aim to minimize the difference between the two cultures and learn from the experience.

The study has found out various central themes that emerge from the survey participants. If these themes can be addressed, then it may helpful to develop successful intercultural communications in the health care industry of Swedish.

Reference:

http://www.immi.se/intercultural/

http://www.diplomacy.edu/language/intercultural-communication

http://www.global-excellence.com/articles/02dutch.html

Internal Building Security

Internal Building Security

Security protects any individual from threats of loss and criminal activity. Security should be given more and more importance in residential places and office areas. Safety, reliability and continuity are three important concepts associated with the concept of security. In corporate world IT security, physical security and fraud prevention are given due importance.

Some of the threats and risks a building is prone to are trespassing, insider threats, explosive threats and information security threats. Optimal design of a structure can be obtained by co ordination of the protective designer and the structural engineer. To protect the residents of the building from intruder’s, video or CCTV surveillance, alarms and detection services should be installed at proper places. Personal identification systems like access control, finger prints, ID cards, primary and secondary credential systems should be implemented for the internal security of the building. One of the serious threats may be posed from the people who have gained access into the building. In order to mitigate this kind of internal threat personnel reliability programs, internal verification checks should be done regularly. Due care should be taken for integrating security and sustainability and the designing for the fire protection systems within the building. Development and training on occupant emergency plans is an important step towards providing security in buildings. The emergency plan should contain clear guidelines of the individual responsibilities and the modes of communications. In case of housing securities, successful and balanced designs should be done by the co-ordination of the project or design workers. Secure fire safe designs should be used on every floors of the multi-storied buildings. CCTV, fire and burglar alarm system should also be present. Seismic and blast resistant designs are crucially important as it takes care of the functionality, occupancy and the designs of the buildings. Protection of information and data are extremely crucial in case of office properties and they are done by acoustic shielding, computer screen shields and also securing access to equipments, networks and also satellites and different information systems.

Nowadays finger scanning technology is used to identify people within the office premises. These types of finger scanners are usually implemented near the reception in order to limit access to unidentified visitors. More recently finger scanning technology is installed in computers so that any body can not use the private data loaded onto computers.

Biometrics security system have gained popularity at an alarming rate in offices as it can indentify its user by their finger prints, tone of voice, retina of the eye and other biological characteristic features. The appropriate biometric security systems should be chosen carefully and based on its application also. Signature biometric checks the signature of the user and also it measures the speed and pressure used by the person. Voice based biometric system notes the voice of the user and it is stored for further references. The finger prints of every user are loaded into the system and the person can gain access only after his fingerprints have been matched by the machine. Digital cameras are sometimes used to develop the images of the individuals and iris based technology usually identifies its user on the presence of color based tissue surrounding the pupil.

Access control is the modern security system used in offices by which authorized people can use their installations. Mixed systems are more preferred in which machines can quickly check the identity of the person but a human is also present in case of machine failures or emergencies.

Identification, authentication and auditing are the three major steps used in access control security system. The entire processes deal with the recognition of the original user and processing the information stored in computers to check for the mistakes. Finger key is the most commonly used biometric control system and it is used in case of high or very low flow of traffic. Due to the rapid advancement of technology id scanners are now used in office premises. With the help of these scanners the security personnel can quickly identify a fake id from an original one. The id scanners can easily determine if the bar codes, hidden holograms, series of letters or numbers that are present in those cards are wrong or tampered. It quickly sends out alerts to the security personnel thus providing security to the office.

Video surveillance system is the most appropriate device to prevent crime. This security system easily records the criminal activities or any thefts taking place in banks or business houses. The valuable components of video surveillance system are video cameras, internet monitoring device and monitors. Office personnel can easily view the recording and the timings to monitor the activities taking place in the offices and thus it provides an important identification method. But due respect should be maintained about the employees privacy while using the video recordings system. Night vision security systems are used sometimes to prevent any wrong doing or criminal activities during the night.

In times of technological progress, door alarm systems should be used at entry points in home and offices to prevent trespassing of intruders. It has a magnetic field and it emits a loud sound when any one crosses that point. Metal detectors are the most effective device to spy upon concealed metal objects in the premises. They quickly detect any metals that may pose a threat. The other kinds of detectors that are also used are glass break detector, counterfeit money detectors, and phone bug detectors. Access security systems include electromagnetic lock, door access control system and multiple door access controllers. Multi-doors controller has usually 9999 cards with a mere 5000 capacity of storing records whereas in case of multiple door access control reader it has many alarm controlling features like expiry dates for clubs, automatic activation, interlock between zones and activity reports. It is also helpful to generate activity reports when the controllers are transferred to the computers. Each controller of the machine has its own individual databases systems and they work without each other interference. Single door access control systems are easy to use in homes or offices and can are ready to open the door without password. Fire alarm systems include wireless fire alarm systems, smoke detectors, wireless smoke detector and manual call points. It easily detects any fire in the atmosphere. They are used for indoor or outdoor purposes. Building automation system comprises of wire and wireless alarm panel, monitoring camera unit, hand held metal detector, and door frame type. Smoke detectors can easily detect any fire hazards and they are easy to install. Manual call points become activated when the keys are pressed or the handle is pulled down. Hooters are present in a multiple of dimensions and their pitch can also be adjusted according to the needs. Conventional control panel consist of fire alarm systems and they are placed in loops inside the office or building premises.

Businesses depend on valuable storage on data so it is more vulnerable to information and cyber security threats. Qualified security and blast professional should be appointed in buildings or offices. Plans for suicide bombers should be made.

However private sector organizations and government agencies have developed security design criteria to be followed by big stories buildings and housing properties. The Interagency Security Committee (ISC) provides guidelines for a risk based approach and it consists of multiple documents. Based on different factors like the facilities and the occupancies, the Facility Security Level (FSL) consists of the procedures for attaining that security level. The physical security criteria level contains the entire description of the threat and the risk assessment level. The committee is mainly responsible for addressing the issues related to facility related security issues and the different methods in order to combat them successfully. Physical security explores different issues like prevention of collapse, rescue and recovery systems. The Department of Defense (DoD) is responsible for minimizing terrorists attacks. The American Society of Civil Engineers has taken up the task of setting up minimum planning, construction of the buildings, imposing threat parameters and different test procedures. It also includes introduction of threat parameters, loadings and test methods in order to protect the buildings from the explosions or any other natural calamities. It is usually recommended that in spite of the correct design plan, appropriate countermeasures should be implemented in order to delay, detect and deny the different attacks that it is exposed to. “Onion Philosophy” is the concept on which the countermeasure policies are based on. It states that the level of security should be increased from the outer areas towards the inner site.

In conclusion, security related problems should be given importance in buildings and offices and proper measures should be implemented in order to fight against the threats beforehand rather than facing it.

References: HYPERLINK “http://www.officearmor.com/” t “_blank” http://www.officearmor.com/

HYPERLINK “http://www.securitysystemspune.com/” t “_blank” http://www.securitysystemspune.com/

1898 marked a major turning point in America

1898 marked a major “turning point” in AmericaStudent’s Name

Course

Date

1898 marked a major “turning point” in the history of the United States and its position in the world. What factors caused this change in American’s attitudes toward American power (Berger, 1995). The gradual changes resulted in the change of the way of life in America and the political leadership in America. The period is characterized by several militaries explores and later led to a break of the first world war in America (Berger, 1995). At the end of the nineteenth century, the American foreign policy followed the guidelines set by George Washington to improve commercial relations with foreign nations and have very minimal political interactions.

Several factors caused this change in American’s attitudes toward American power that include political factors. Many countries wanted to become superior to others through patriotism and developing imperial power. Becoming superior is associated with national pride, security, and prestige. Empires prepared easy ways of accessing the navy and the armies globally. The other factor that led to a change in the attitude toward American power was economic factors (Berger, 1995). The imperial government wanted to expand economically and it was possible through maximizing the profits, availability of cheap labor, and access to power and control of markets in the world. After industrial colonies established industries and provided them with raw materials for the products they required in the markets. They also developed the transport infrastructure over the important ports and markets. They competed against each about the best quality products and the market for the products (Berger, 1995). Exploratory is another factor that made people change their attitude towards American power. America wanted its citizens to explore the world and new territories. Although some people had a sense of adventure, medical and scientific reaches were the most common reason for exploring new territories in America. America also wanted to show the world that their culture is more superior to others (Berger, 1995). They wanted to change the cultures of the inferior people and introduce their culture for them to adapt to the new culture. They also believed that their race is superior to others and they should civilize them using their culture.

`There are specific changes that occurred to affect the changes during the fight for American power. There was a geographical division of New York City into five boroughs. America also engaged in war Spanish people and they signed treaties to end the war (Berger, 1995). The United States blocked the Cuban ports and declared war on them. The random wars caused many deaths of men. The USS Maine explodes in Havana harbor caused the death of 266 men.

REFERENCES

Berger, M. T. (1995). Under northern eyes: Latin American studies and US hegemony in the Americas, 1898-1990. Indiana University Press