Thursday, October 31, 2019
Hca Hospital Corporation of America Essay Example | Topics and Well Written Essays - 1000 words
Hca Hospital Corporation of America - Essay Example Indirect competition from companies that produce cheaper substitutes also encourages the business to grow otherwise it will be pushed out of the market. The desire by organisations to enjoy economies of scale in terms of management, purchases, production, marketing among other forces them to expand which guarantees them saving due to bulk purchase of materials, spreading of overheads, higher bargaining power and expert management (Kazanjian & Drazin, 2009). Increase in demand for the products that a company manufactures also contributes to the motivation of a firm to grow in order to meet the growing demand for its products and services. Prestige and power that comes with managing big firms may also motivate the management to expand their organisations (Kumar, 2010). In addition, government policy in some countries, especially the planned economies requires business to operate under certain rules and regulations. Businesses may grow in order for them to meet these regulations and enj oy the quotas, subsidies and incentives that the government gives to businesses. With the controversies that have surrounded Hospital Corporation of America (HCA), the company need to review its growth strategies to ensure it redeems its image and to put it in a constant path of growth. In coming up with the most effective strategies for growth, the company need to consider and follow the following steps. First, the company should plan about its growth strategies in order to for them to focus on meeting the customersââ¬â¢ needs and showing the corporations ability to meet them. Health care corporation of America manages a number of hospitals and medical centres in unites states and in united kingdom which provide general and specialised medical services to its clients. In planning, the hospital should put into consideration the various specific needs of the clients and employees in the countries and in different departments. The plan should be client focussed clearly detailing th e goals, strategies, and tactics that will be used and a specific timeline within which the goals will be achieved. The timeline should set aside time for training and mentoring employees to the organisational culture and best practises in the field of health care. The plan should also include the methods that the company intend to use in training, coaching and measuring the progress of the employees. Including staff in coming up with a strategy by allowing their input at the appropriate level will enable the management to obtain their commitment and accountability to the organisation. The employees should be engaged in customer-focussed tactics that will ensure the corporation attracts new customers and retains the old ones. Role playing and scripting among employees will also be important, as it will give the employees a chance to test their newly learned skills. The corporation should provide mentorship programs by pairing new employees with old experienced employees. As a way of boosting morale among employees, the corporation should adopt some measuring and rewarding mechanisms in its growth strategy. Compensation and reward programs, staff development and training should be aligned with activities and results of staff involved in improving customer experience in the corporation; this will be to boost the morale of the staff to offer their best to
Tuesday, October 29, 2019
How Schools and Services Support and Protect Children and Families Essay
How Schools and Services Support and Protect Children and Families - Essay Example The epidemic proportions of the incidents of child abuse and neglect are very alarming and call for instant action on the part of government, schools and private institutions. As the rate and the extent of these problems increase, there is also a need for a more unified response on the part of the school, government and other social service providers. The social services along with schools can aid in providing the necessary guidance, support, and direction to the children and their parents. The primary functions of the schools to soundly educate are the best protection a child can get. However, in todayââ¬â¢s world, the social and physical problems of the children have grown so large and complex that it is rather foolish to focus on just the academic needs of the children. The problem of physical violence and crime is becoming a commonplace issue in schools. The U.S. Department of Justice estimates that the number of robbery or violent crime incidents on or near school grounds is 3 million per school year (Hatkoff 1994). The fact that an increasing number of children are fearful and cautious about taking a trip to and from school and tend to avoid particular places at school out of fear of an attack. The issue of violence and assault in schools is extremely complex and the concern over its consequences is increasing as it has long-lasting physical and emotional consequences. The government authorities are realizing this and initiating program and directing funds to local school districts for the purpose of making schools safer. There are many programs which are being initiated at schools to help students recognize that bullying is wrong and a cowardly act by people with low self esteem. Children who are known to be affected by domestic abuse or substance misuse are supported effectively at schools. The value of this service is unparalleled as it manages the childrenââ¬â¢s behavior and supports their development. A study issued by The Department of Education reflects the role of the school in helping the student to build healthy relationships inside and outside the school. The study recommends involving the parents and community to collaborate and aid in building disciplined, safe and healthy relationship of the students with the outside world (U.S. Department of Education, 1993). The teacher having influence and authority over the students can be helpful in creating a safe environment, free of any kind of physical abuse or violence.Teens, Crime and the Community (TCC) is one interactive program that incorporates the students in execution at all the stages of the program. It is launched by the National Crime Prevention Council and it has an aim to educate young people about crime, delinquency and involves them in projects which help them to make their schools and communities safer (National Crime Prevention Council, 1993). This program has been successfully implemented in more than 500 US sch ools in 40 states, involving more than 400,000 youths.
Sunday, October 27, 2019
Assembler Directives of 8086 Microprocessor
Assembler Directives of 8086 Microprocessor INTRODUCTION: Assembly languages are low-level languages for programming computers, microprocessors, microcontrollers, and other IC. They implement a symbolic representation of the numeric machine Codes and other constants needed to program a particular CPU architecture. This representation is usually defined by the hardware manufacturer, and is based on abbreviations that help the programmer to remember individual instructions, registers. An assembler directive is a statement to give direction to the assembler to perform task of the assembly process. It control the organization if the program and provide necessary information to the assembler to understand the assembly language programs to generate necessary machine codes. They indicate how an operand or a section of the program is to be processed by the assembler. An assembler supports directives to define data, to organise segments to control procedure, to define macros. It consists of two types of statements: instructions and directives. The instructions are translated to the machine code by the assembler whereas directives are not translated to the machine codes. Assembler Directives of the 8086 Microprocessor (a) The DB directive (b) The DW directive (c) The DD directive (d) The STRUCT (or STRUC) and ENDS directives (counted as one) (e)The EQU Directive (f)The COMMENT directive (g)ASSUME (h) EXTERN (i) GLOBAL (j) SEGMENT (k)OFFSET (l) PROC (m)GROUP (n) INCLUDE Data declaration directives: 1. DB The DB directive is used to declare a BYTE -2-BYTE variable A BYTE is made up of 8 bits. Declaration examples: Byte1 DB 10h Byte2 DB 255 ; 0FFh, the max. possible for a BYTE CRLF DB 0Dh, 0Ah, 24h ;Carriage Return, terminator BYTE 2. DW The DW directive is used to declare a WORD type variable A WORD occupies 16 bits or (2 BYTE). Declaration examples: Word DW 1234h Word2 DW 65535; 0FFFFh, (the max. possible for a WORD) 3. DD The DD directive is used to declare a DWORD A DWORD double word is made up of 32 bits =2 Words or 4 BYTE. Declaration examples: Dword1 DW 12345678h Dword2 DW 4294967295 ;0FFFFFFFFh. 4. STRUCT and ENDS directives to define a structure template for grouping data items. (1) The STRUCT directive tells the assembler that a user defined uninitialized data structure follows. The uninitialized data structure consists of a combination of the three supported data types. DB, DW, and DD. The labels serve as zero-based offsets into the structure. The first elements offset for any structure is 0. A structure element is referenced with the base + operator before the elements name. A Structure ends by using the ENDS directive meaning END of Structure. Syntax: STRUCT Structure_element_name element_data_type? . . . . . . . . . ENDS (OR) STRUC Structure_element_name element_data_type? . . . . . . . . . ENDS DECLARATION: STRUCT Byte1 DB? Byte2 DB? Word1 DW? Word2 DW? Dword1DW? Dword2 DW? ENDS Use OF STRUCT: The STRUCT directive enables us to change the order of items in the structure when, we reform a file header and shuffle the data. Shuffle the data items in the file header and reformat the sequence of data declaration in the STRUCT and off you go. No change in the code we write that processes the file header is necessary unless you inserted an extra data element. (5) The EQU Directive The EQU directive is used to give name to some value or symbol. Each time the assembler finds the given names in the program, it will replace the name with the value or a symbol. The value can be in the range 0 through 65535 and it can be another Equate declared anywhere above or below. The following operators can also be used to declare an Equate: THIS BYTE THIS WORD THIS DWORD A variable declared with a DB, DW, or DD directive has an address and has space reserved at that address for it in the .COM file. But an Equate does not have an address or space reserved for it in the .COM file. Example: A Byte EQU THIS BYTE DB 10 A_ word EQU THIS WORD DW 1000 A_ dword EQU THIS DWORD DD 4294967295 Buffer Size EQU 1024 Buffer DB 1024 DUP (0) Buffed_ ptr EQU $ ; actually points to the next byte after the; 1024th byte in buffer. (6) Extern: It is used to tell the assembler that the name or label following the directive are I some other assembly module. For example: if you call a procedure which is in program module assembled at a different time from that which contains the CALL instructions ,you must tell the assembler that the procedure is external the assembler will put information in the object code file so that the linker can connect the two module together. Example: PROCEDURE -HERE SEGMENT EXTERN SMART-DIVIDE: FAR ; found in the segment; PROCEDURES-HERE PROCEDURES-HERE ENDS (7) GLOBAL: The GLOBAL directive can be used in place of PUBLIC directive .for a name defined in the current assembly module; the GLOBAL directive is used to make the symbol available to the other modules. Example: GLOBAL DIVISOR: WORD tells the assembler that DIVISOR is a variable of type of word which is in another assembly module or EXTERN. (8) SEGMENT: It is used to indicate the start of a logical segment. It is the name given to the the segment. Example: the code segment is used to indicate to the assembler the start of logical segment. (9) PROC: (PROCEDURE) It is used to identify the start of a procedure. It follows a name we give the procedure. After the procedure the term NEAR and FAR is used to specify the procedure Example: SMART-DIVIDE PROC FAR identifies the start of procedure named SMART-DIVIDE and tells the assembler that the procedure is far. (10) NAME: It is used to give a specific name to each assembly module when program consists of several modules. Example: PC-BOARD used to name an assembly module which contains the instructions for controlling a printed circuit board. (11) INCLUDE: It is used to tell the assembler to insert a block of source code from the named file into the current source module. This shortens the source module. An alternative is use of editor block command to cop the file into the current source module. (12) OFFSET: It is an operator which tells the assembler to determine the offset or displacement of a named data item from the start of the segment which contains it. It is used to load the offset of a variable into a register so that variable can be accessed with one of the addressed modes. Example: when the assembler read MOV BX.OFFSET PRICES, it will determine the offset of the prices. (13) GROUP: It can be used to tell the assembler to group the logical segments named after the directive into one logical group. This allows the contents of all he segments to be accessed from the same group. Example: SMALL-SYSTEM GROUP CODE, DATA, STACK-SEG.
Friday, October 25, 2019
Cultural Messages in Solomon Gursky Was Here Essay -- Solomon Gursky W
Cultural Messages in Solomon Gursky Was Here Solomon Gursky Was Hereà is an epic novel spanning nearly a century and a half, from the mid 1800's to 1980's.à It is the story of the obsession ofà Moses Berger, a Rhodes scholar turned alcoholic, with Solomon Gursky, the charismatic son of a poor immigrant.à Solomon, with his brother Bernard and Morrie, built the massive liquor empire of McTavish industries.à Moses is attempting to write a biography of Solomon, which becomes his life's work.à Through his investigations the complex story of five generations of Gurskys is revealed.à The eldest is Ephraim, Solomon's criminal, perpetually scheming grandfather.à Ephraim, is constantly associated with the raven, he escaped imprisonment in England in the mid 1800's by forging documents, also allowing him to join a crew searching for the Northwest passage, called the Franklin Expedition. The expedition turned into a total disaster, Ephraim, the sole survivor.à à The youngest Gursky appearing in this story is Is aac, Solomon's grandson.à This complex tale unravels, as Moses recalls, all of the events in his life which pertain to it.à Ever present in this Canadian cultural satire is the theme of filial relationships and the exploration of Solomon and his re-incarnation as Sir Hyman Kaplansky, in conjunction with his family and their exploits.à Every character in this novel is in some way corrupt or failure.à Moses is an alcoholic who did not live up to his potential; Bernard is a greedy self-centered bastard; à Solomon is a cheat, when it comes to gambling, women and anything else you can think of.à à Richler, through this exaggeration of corruption a... ...ursky family and their diverse interests, life-styles and undertakings allows Richlers readers to grasp many parts of Canada in many different time frames.à This in turn allows him to satirize the stereotypes of Canada, its people and their culture.à Adding to idea of corruption, which enhances this satire, are the filial relationships occurring in this novel. The fact that all these relationships are unsuccessful and non-cordial, enhances the idea that all Canadians roots are in some way corrupt or failures.à Richler, shows how these traits are passed through generation after generation.à à There can be no doubt that Solomon, one of the most corrupt characters in the book, becomes Sir Hyman after his staged death.à Richler has tied his complex story of Solomon Gursky, his family and their exploits together with his cultural messages
Thursday, October 24, 2019
The Brand Before Revitalization
The brand before revitalization (Part A) Brand: Hui Lau Shan (Local Dessert Chain) History of Hui Lau Shan Hui Lau Shan ( ) is a famous chain of dessert shops based in Hong Kong. It specializes in dessert soups, snacks and desserts. Hui Lau Shan is well known for its use of mango in its products. The first shop opened in Yuen Long, New Territories in the 1960s. It was known for its turtle jelly and herbal teas. However, Hui Lau Shan emphasizes its fruit desserts and snacks. Since the 1990s, the chain has expanded. Moreover, it has focused on the mainland market. LogoHui Lau Shanââ¬â¢s logo is a letterform that is readable. The logo just is the brand`s name, Hui Lau Shan ( ). It is use of Chinese Calligraphy that can show its long history. A majority of herbal tea shops are used to use the same form to design their logo. It is costly to promote its brand because there is a heavy visual competition. On the other, the use of Chinese calligraphy may be too old fashioned for young cust omers. It cannot attract young guy`s attention. However, other desserts shops have realized this truth, such as Honeymoon Dessert ( ). Its logo is more fashionable and seems to be smart.Problems: 1. Use of Chinese calligraphy is old-fashioned design. 2. The logo has never had representative characteristics. Solution: 1. Using a new font style, such as Cooper Black. Cooper Black is commonplace in the food packaging and logo of some food products. It can get up customer`s appetite. 2. Designing a special symbol that is a shape of mango. It is a representation of its mango desserts. Target customers Its target customers are kids and young people who like to eat desserts. When they feel thirsty, they prefer to buy a drink, likes cool mango dessert soup.In the same case, the middle-age people and the elderly will prefer to buy a bottle of water. They don`t like the sweet taste and pay more attention to their health. The brand after revitalization (Part B) Brand: Hui Lau Shan (Local Desse rt Chain) Logo and logotype: First of all, I select the use of combination mark that includes symbol and logo. The left logo (Chinese version) has a shape of mango that can gain the label effect. Everyone would realize that its mango desserts are well-known and delicious. Then, I use the font style likes Cooper Black as it is commonplace in package of food products. Since 1960â⬠shows customers that it was a long history firm. Secondly, the right that is logotype (English version) also is two shapes of mango. It gets the label effect too. The special font style can catch young customerââ¬â¢s attention since it is new and unique. Taglines: The first tagline is ââ¬Å"best mango in townâ⬠that claims that the best mango desserts are totally in Hui Lau Shan. If you want to taste the best, you have to come to Hui Lau Shan. The second is ââ¬Å"sweet is lifeâ⬠that wants to promote the dessert culture. It says that eating desserts become your custom. It may like coffee culture and become a trend. Re-positioning:In order to attract more young guys, I decided to change the old-fashioned style. I prefer to use cartoon characters in some applications, such as business card, cup, paper napkin, etc. It also determined to focus on its mango desserts (main product). The signature color is yellow that is the color of mangos. The typeface is Cooper Black. Application strategy: I am going to use the new logo and logotype in business card, cup, paper napkin and making up the stores. I also designed several mango cartoon characters. They are pretty cute and active. They contribute to a fresh and younger image, and they can attract the attention of kids.Moreover, I would promote the revitalized brand through TV advertisements, promotions. At the first day, I would put a full page advertisement in the newspapers in Hong Kong. After, we will give customers some coupons and ââ¬Å"buy 1 get 1â⬠promotion. Conclusion: Hui Lau Shan will become a new dessert cha in and be more famous in Hong Kong. In the visible future, I can see it will be the best mango desserts store in Hong Kong. It is because it more focuses on its mango and invents many new mango desserts. It has a fresh image and become more pleasing to the eyes. It help young people to accept an old shop in Hong Kong.
Wednesday, October 23, 2019
The Sons Veto
The Sons Veto Thomas Hardy was an English novelist and poet and his story ââ¬ËThe Sons Vetoââ¬â¢ is based on the rigid class system popular in Victorian England. At that time, women were perceived as having a diminutive purpose with little independence. The restrains of society were clearly seen in Sophyââ¬â¢s character. Hardy opens the story with a detailed description on a womanââ¬â¢s hair. He comments on the fashion of that time. Her name was Sophy and she was born in the country village of Gaymead in a remote nook of North Wessex.As a young girl, she worked as a parlour maid in the house of the reverend, Mr. Twycott. Sophy had a young man named Sam Hobson, a gardener in the village. After a few months, Sophy wanted to leave her job and marry Sam but couldnââ¬â¢t do so after Mr. Twycottââ¬â¢s wife died. She decided to stay back and also had a quarrel with Sam regarding her decision. As time progressed, Mr. Twycott realized how dependent he was on Sophy. He became ill and whilst he was ill, Sophy brought his meals to him.One day, she slipped on the stairs while taking the tray down. She twisted her foot in the fall. Mr. Twycottââ¬â¢s health became better although Sophy was no longer able to walk. The parson felt guilty for her and asked her to marry him; she felt as though she was unable to refuse and felt obligated to marry him in order to be socially accepted. She married the vicar out of respect and not love. She was more concerned over her future and knew that any marriage would mean that she would have a home and a good lifestyle in the imminent years.As the story progresses, Mr. Twycott dies and Sophy raises a son all by herself. The author sets up a social detachment between Sophy and her son, Randolph through the language they speak. Sophy could not formulate sentences correctly and her incorrect grammar would blatantly annoy Randolph. Sophy as a woman had her deficiencies. One day while sitting by her window, she found her childh ood friend Sam. They get together after so many years and after a few days he proposes to her.When she talked to her son he was positive about the idea of remarriage but became angry when he found out that the man was a farmer. In a fit of rage, he made her swear on the cross that she would never marry Sam. One may also interpret it to be Sophyââ¬â¢s fault, which wouldnââ¬â¢t be incorrect, however Randolph gains a sort of power over her eventually leading to her death that could have been avoided had he not been so full of pride for himself.
Tuesday, October 22, 2019
The Brutal Facts That Universities Must Face Today Term Paper
The Brutal Facts That Universities Must Face Today Term Paper The Brutal Facts That Universities Must Face Today ââ¬â Term Paper Example The Brutal Facts Universities Must Face Today Whatever it is that universities look like today is far much different from how they used to look like fifty years ago. Similarly, by 2030, the universities will look totally different again. But "how has our universities changed and what has made them change in that manner?" is the main question that should be unraveled. The current condition of our universities presents "brutal facts" that we have to deal with, however, unpleasant they may look. Such facts present university and higher education at large, in America, at crossroads (Ricardo 1).Some of the facts that we have to deal with in our universities are positive while others are negative. One such fact is on the university funding that has since been reduced. Public funding to support education has been greatly reduced leaving the students with huge tuition fees to pay to support their education. This is a fact that leaves the students with huge debts that they owe to the loans in stitutions that fund education through offering loans to students. This has not even taken into consideration other fees that each university charges to its students such as high parking fees at the Valparaiso University. The students have to part with $140 per semester just to secure parking in the school. As a result, university education remains very expensive in todays world, and we have to deal with it. Secondly, universities are also faced with the challenges brought about by the rapid demographic changes. Such have seen an increasing higher number of students seek university education. Universities have limited resources and spaces for students. However, they are required to admit quite a huge number of students. This increases the rate of international students seeking education in other countries with more universities with adequate resources. Such students may also face discrimination in some instance where the host country students, like here in Valparaiso, may not treat them in a friendly manner. The universities are for this reason expected to recognize such facts and deal with them at the management level.Thirdly, the current technological advancement has come to the rescue of our universities by spurring innovation as it makes university education more affordable and obtainable. However, this fact has also been faced with the challenges of the socio-economic inequalities where only wealthy and more sophisticated students can afford such kind of education in a more enriching manner. Technology also renders some teaching methods obsolete and makes the university adjust with the technological changes to remain effective and efficient. In a nutshell, current universities are faced with very brutal facts give the universities a hard time to deal with. Most of these facts tend to be because of the transitions that the universities have to pass through. If this trend continues, future universities will be faced with even more brutal facts, that what we face today, that they will be required to deal with.Work CitedRicardo, Azziz. "American Higher Education Crisis?- A Fact-filled and Thought-Provoking Must Read." The Blog (2015): 1. Web. .
Monday, October 21, 2019
Free sample - Complex Congenital Heart Disease. translation missing
Complex Congenital Heart Disease. Complex Congenital Heart DiseaseComplex Congenital Heart Disease Congenital heart disease is a defectà or malformation in the structure of the heart or vessels that supply it with blood. This defect occurs as the fetus develops in the uterus and is therefore present at birth (Pampel, 2004). This defectà interferes with the normal flow of blood through the heart. Complex congenital heart disease requires immediate medical attention since it can be very fatal. Complex congenital heart disease can be attributed to both genetic and environmental factors. A pregnant woman who suffers rheumatic heart disease produces antibodies which act against the Ro and La auto antigens in the fetus (Pampel, 2004).à The part of the Ro antigen targeted by the antibodies from the mother is called p200 protein. The more the number of antibodies produced against this protein, the more the damage to the heart of the fetus. This antibody - antigen reaction causes the inflammation and subsequent calcification of the cardiac system of the fetus hence damaging the he art structure (Calnan, 1991). Researchers also have it that anti-seizure medication taken by a pregnant woman makes the fetus more vulnerable to congenital heart disease. Pregnant women who take lithium to treat depression, as well as those who have phenylketonuria (PKU) and do not strictly take the special diet prescribed to them predispose the fetus to the attack (Calnan, 1991). Women who contractà the Rubella virus and those who get vaccinated against the same stand higher chances of giving birth to children with CHD. Other studies indicate that this condition has autosomal-dominant inheritance meaning that mothers who have the condition stand about fifty percent chances of passing it to the child (Kaplan, 2002). A number of Chromosome abnormalities can also result to CHD. These include: Down syndrome, trisomy 18 and 13, turnerââ¬â¢s syndrome, cri du chat syndrome, wolf ââ¬â Hirsh horn syndromeà and Digeorge syndrome ( deletion 22q11). Genetic syndromes have also been shown to make one more vulnerable to the condition. These are: Marfan syndrome, Smith-lemli-optiz syndrome, Ellis-van Creveld, Holt- Oram syndrome, Noonan syndrome, and Mucopolysaccharidoses (Kaplan, 2002). Errors at any stage in the embryological development of the heart can result inà congenital heart disease.à This development occurs between the third and the ninth week of the gestation period (American Heart [AH], 2010). The heart is formed when a group of cells join to form sheets of tissue, which then join to form a tube whose growth results in the formation of the atria and ventricles (AH, 2010). The resulting tissue undergoes twists and turns while the atria, ventricles and truncus undergo septation.à The antrioventricular canal and conus align the portions of the heart in a manner that allows smooth blood flow. If any error occurs during this process, then heart complications such as the congenital heart disease result (AH, 2010). Incidences of congenital heart disease are on the rise according to recent studies. Data from researchers in the western industrialized world for instance indicate that the incidence of the condition has increased from about three to five per every one thousand live births to about twelve per every one thousand live births. Some researchers though argue that this increase can be attributed to technological advances which have seen the invention of more sensitive detection methods (AH, 2010). à Left to right shunts is the commonest physiology associated with congenital heart disease. This occurs when oxygenated bloodà goes back to the lungs to get re-oxygenated. This return causes a redundancy in the circulation. This leads to an increased venous return from the lungs through the pulmonary veins to the left atrium as well as the left ventricle. This causes the left ventricle to experience volume overload (Larsen, 1993). In a nutshell, left to right shunt causes a volume overload on the left ventricle, as well as pulmonary circulation and reduced systematic output. Left to right shunt lesionsà cause physiological alterations at the ventricular or great artery level. Congestive heart failure can occur between week two and six as a result of a decrease in pulmonary vascular resistances which is accompanied by an increase in systemic vascular resistances as well as physiological nadir in the hemoglobin (Larsen, 1993). Increased left to right blood shunting ultimately results toà pulmonary vasculature which causes hyperplasia of the vessel walls and subsequent hypertension (Kenneth, 1997). Ventricular septal defect is a defect which also occurs in patients with congenital heart disease. In this case, there is a left to right shunt across the ventricular level. During this shunting, blood from the left ventrical is ejected during systole to the pulmonary circulation. This blood causes a volumeà overloadà to the left atrium as well as the left ventricle (Kenneth, 1997). Patent ductus arteriosusà is characterized by a left to right shunt during systole and diastole from the aorta to the pulmonary artery. Owing to the presenceà ofà higher pressure in the aorta as compared to that in the pulmonary artery, the left to right shunt gets continuous.à This causes a volume overload on the left atrium as well as the left ventricle. A large degree of PDA results in pulmonary vascular disease (Larsen, 1993). Truncus arteriosus occurs whereby, the pulmonary arteries are joined to the aorta. Patients who suffer this condition experience higher occurrences of pulmonary hypertension and vascular disease (Larsen, 1993). à Right to left shunt occurs when the deoxygenated blood that goes to the lungs for oxygenation returns back to the body without reoxygenation. One condition associated with this is tetralogy of fallot. This is a condition occurring as a result of the presence of RV outflow obstruction. It results to a right to left shunt across the VSD (Hoffman, 2005). A person suffering from this condition is cyanotic as a result of paucity of pulmonary blood flow. This blood inadequacy results in a smaller left ventricle than the right one owing to a reduction in the pulmonary venous return (Hoffman, 2005). Congenital heart disease is discovered in some cases when the mother undergoes a ultrasound scan during pregnancy. Other cases are not discovered during this scan and therefore theyà are discovered through symptoms when the baby is born (Hoffman,2005). In other cases still, the new born doesnââ¬â¢tà show symptoms of the condition until later years. Some people grow to adulthood without showing symptoms of the condition. Signs and symptoms of this disease include: recurrent lung infections, shortness of breath which is also rapid, fatigue especially during exercises, lack of appetite, low rate of weight gain, sweating while eating, weak pulse in babies and cyanosis color on the skin around the mouth, lips as well as the tongue (Niessen, 2008). à The diagnosis of congenital heart disease can be done before or after birth. Antenatal diagnosis is done through a fetal echocardiography which is a type of ultrasound scanner designed to create a picture of the sides of the heart chambers. This test is doneà in the course of regular antenatal examinations which come during the 18th and 20th week of pregnancy (Niessen, 2008).à Post natal diagnosis is compulsory if the baby presents with some of the signs of the disease such as blue color around the lips, feeding problems, slow rate of growth, etc. methods usedà during this diagnosis include: Electrocardiogram, a test that measures the heartââ¬â¢s electrical activity (Niessen, 2008). This method involves placing electrodes on the skin above the heart which are then connected to a computer. Electrical signals coming from the heart are then analyzed by the computer (Shanley, 2007). Chest x-ray can also be used to detect the disease. This x-ray basically examines if there is excess amount of blood in the lungs or if the heart size is normal. Excess blood in the lungs and a larger heart are signs of the disease (Shanley, 2007). Pulse oximetry is also a detection method that measures the amount of blood present in the childââ¬â¢s blood. A special sensor is placed in the childââ¬â¢s fingertip, ear or toe which sends out light waves. Absorption of the light waves is checked via a computer since the absorption behavior can indicate the oxygen levels in the blood (Shanley, 2007). Cardiac catheterization as a detection method seeks to find out blood pumping behavior. A catheter is inserted in one of the major blood vessels in the groin. Its then pushed to the heart though the assistance of x-rays or MRI scanners. Bloodà pressure readings at different parts of the heart are then recorded by a small pressure monitor attached to the end of catheter (Larsen, 1993) . Treatment of this condition involves administering medicines which can make the heart beat regular incase its not.à The medicines basically mitigate the symptoms before an operation to fix the problem is administered. These medicines include a prostaglandin inhibitor administered toà a premature baby to assist in closing a patent ductus arteriosus (Niessen, 2008).à Heart catheterizationà discussed under diagnosis can also be used to fix the problem. Surgery if necessary is advisable when the baby is strong enough to withstand it. Open heart surgery is carried out if the problem cannot be fixed using a catheter. This surgery aims at closing holes with the help of stitches or patches, repairing or replacing damaged heart valves, andà repairing complex defects (Niessen, 2008). If the problem is too severe to repair, a transplant is recommended. The heart to be used is normally obtained through a donation byà the family of a diseased child (AH, 2010). Nursing care for young ones with congenital heart disease involves basics such as feeding, giving medicines, watching and recording trouble signs, and encouraging them to get involved in their health care program (AH, 2010). Involving the child in the health care program would help them understand why they have a scar, why they need to take medicine, as well as the positive impact play can have to the general wellness of their heart. The child is also helped to understand the need to take certain nutrients such as boiled fish, Mediterranean diet and others which strengthen the heart (AH, 2010). There are several support groups throughout the world for children with heart diseases. Mended little hearts for instance is a support group that helps families with such children (AH, 2010). The Mary bridge child life department offers pre-operative tours for children as well as families scheduled for treatments such as heart catheterization, and cardiothoracic surgery. We also have care pages which are free, private, as well as personalized WebPages pages which patients can visit to obtain any form of advice and care required (AH, 2010). These pages are available at multicare facilities so patients can always keep in touch for any care needed. A patient can post a question as far as care is concerned which is replied with messages of support (AH, 2010). The following is a list of such websites which one can visit for information regarding childrenââ¬â¢s heart care,à diagnosis, treatment as well as support resources: American Heart Association, Childrenââ¬â¢s Heart Institut e, Childrenââ¬â¢sà Hospital Health System of Wisconsin, Childrenââ¬â¢s mercy Hospitals and Clinics, Congenital Heart Defect Online Handà book, Congenital Heart Defects (Texas Heart Institute), Congenital Heart Defects ( Texas Heart Institute)- in Spanish, Congenital Heart Information Network, Heart Centre Online, and Heart Institute for Children (AH, 2010). Children with congenital Heart disease have a poorer quality lifeà than those who are healthy. Children with more severe complications have aà very bad physical and physiological quality of life. For instance, such children are advised against getting involved in certain type of exercises hence they are not free to interact with their peers in every thing. Suchà children also end up with very poor psychological life as a result of limited social interactions with their peers (AH, 2010). In conclusion, this paper has discussed the etiology of congenital heart disease. Genetic factors causing the disease have included: rheumatic heart disease in the mother, Chromosome abnormalities, such as Down syndrome, trisomy 18 and 13, turnerââ¬â¢s syndrome, cri du chat syndrome, wolf ââ¬â Hirsh horn syndromeà and Digeorge syndrome ( deletion 22q11). Genetic syndromes have also been shown to make one more vulnerable to the condition. These have included : Marfan syndrome, Smith-lemli-optiz syndrome, Ellis-van Creveld, Holt- Oram syndrome, Noonan syndrome, and Mucopolysaccharidoses. Environmental factors leading to the disease have included: in take of substances such as lithium by the mother as well as Rubella virus. Embryology of the disease has also been discussed with errors in heart formation being linked to the disease. Incidences of the disease have been seen to rise with recent research indicatingà about twelve incidences per every one thousand live births. The pathophysiology of the disease has been discussed with effects of both left to right and right to left shunts being analyzed. The effects have included but not limited to : pulmonary vascular disease, pulmonary vasculature which causes hyperplasia of the vessel walls, hypertension andà Congestive heart failure. Diagnosis methods have included both prenatal and post natal. Postnatal methods have included Electrocardiogram, Pulse oximetry, Chest x-ray, and Cardiac catheterization. Both medicinal and surgical procedures for treating the disease have been discussed. Support groups for patients with the disease have included: American Heart Association, Childrenââ¬â¢s Heart Institute, Childrenââ¬â¢sà Hospital Health System of Wisconsin, Childrenââ¬â¢s mercy Hospitals and Clinics, Congenital Heart Defect Online Handà book, Congenital Heart Defects (Texas Heart Institute), Congenital Heart Defects ( Texas Heart Institute)- in Spanish, Congenital Heart Information Netw ork, Heart Centre Online, and Heart Institute for Children.à References Pampel, F. (2004). Progress against Heart Disease. London: Praeger . Calnan, M. (1991). Preventing Coronary Heart Disease: Prospects, Policies and Politics. New York: Routledgeà Kaplan, H. (2002). The incidence of congenital heart disease. London: Oxford University Press Larsen, W. (1993). ââ¬Å"Development of the Heartâ⬠. Human Embryology. London: Churchill Livingstone. Kenneth, J.(1997). Smithââ¬â¢s recognizable patterns of human malformation. 5th ed.à London: Routledge.à Hoffman, J. (2005). Essential Cardiology : Principles and Practice. Totowa: Humana Press Niessen, K. (2008). ââ¬Å" Notch Signaling in Cardiac Developmentâ⬠Circulation Research. London: Oxford University Press Complex Congenital Heart Disease 12 Shanley, T. (2007). Pediatric critical care medicine: basic science and clinical evidence. London: Praeger .
Sunday, October 20, 2019
Synonyms for Because - Proofread My Papers Academic Blog
Synonyms for Because - Proofread My Papers Academic Blog Synonyms for Because The word because is used to join two ideas and express cause and effect: The lemonade fizzed because we shook the bottle. However, if you find yourself overusing the word because, there are alternatives available. Were going to look at some here. Alternatives to Because Instead of because, you could use any of the following terms (although this may depend on the context). Consider using Since/As Used as conjunctions, these are the simplest alternatives to because. They often work as substitutes without having to change the rest of the sentence: The lemonade fizzed, since we shook the bottle. The lemonade fizzed, as we shook the bottle. Due To/On Account Of/As a Result Of These alternatives all require changing the sentence slightly. Here, for example, we need to use the term shaking rather than shook: The lemonade fizzed due to shaking the bottle. The lemonade fizzed on account of shaking the bottle. The lemonade fizzed as a result of shaking the bottle. Which Meant/Which Caused In these phrases, the sentence must be reversed, with the cause coming first: We shook the bottle, which meant that the lemonade fizzed. We shook the bottle, which made the lemonade fizz. In this version, we need to swap fizzed for the infinitive to fizz. We shook the bottle, which caused the lemonade to fizz. Using some of these alternatives will be a great way to show off your vocabulary. They will also vary the rhythm of your text and engage the reader much more, enhancing readability. Why Not to Use the Word Because Using a word repeatedly in a paper can make you seem unimaginative. It could also make your work dull to read. If you need help finding other words to use, or if you are not sure that you have used these words correctly, simply upload your document to be proofread within 24 hours!
Saturday, October 19, 2019
How globalization benefits America's economy Essay
How globalization benefits America's economy - Essay Example The recent advancement in Asian economy is really transforming the world and the notion that globalization only makes the rich richer and the poor poorer is disputable according to Wolf. He supports international economic integration as the reason behind success of many countries. However, Wolf says that different countries success is not attributed to full adoption of the neo liberal policies rather by instituting their own policies intended to enter market economy. He further argues that growth weighting distribution amongst nations by population shows that the most important things is the people but not countries themselves thus making it important only to consider income distribution alone. Inequality changes amongst world individuals are contributed by changes in the relative wealth of countries such that if the performance is low, the decline in inequality also changes. However, it should be noted that most countries have not fully benefited from globalization especially in Afr ica, Asia and Latin America countries (Wolf, 2004). The rapid growth of economies brought about by globalization has immensely reduced the level of poverty especially in east of Asia but went up in Eastern Europe, central Asia and sub-Saharan Africa. There was also general increase of life expectancy in developing countries though the growth was challenged by the AIDS epidemic and malaria. Moreover, globalization has reduced infant mortality and boosted literacy level in developing countries and the world as a whole. There has also been recommendable increase in food production thus lowering undernourishment issues globally. Finally, Wolf has noted that child labor has tremendously reduced because most parents have opted to taking their children to school (Wolf, 2004). Concepts Central to the Argument One of the most important arguments that has dominated the text is that globalization has negatively affected economies of most countries. This is very wrong and I really concur with W olf that globalization has instead boosted the economy of a good number of countries especially in Asia. The author has noted India and China as some of the beneficiaries of globalization. However, their success is attributed to the policies of individual countries towards globalization (Wolf, 2004). Countries have worked hard by adopting policies that can see them succeed in the wider market that has been brought about by globalization. The effect of globalization is therefore very intense and has positively developed most of the world economies especially countries that were once considered poor. Living standards and income per capita has greatly increased in most of the countries that took advantage of globalization. Nevertheless, some countries have not experienced the benefits of globalization because they have not changed their policies to properly fit in the international market (Wolf, 2004). Moreover, criteria used in measuring economic progress by World Bank are clearly uns atisfactory. The method of measuring economic progress and income per capita as used by world ban is not the best. Wolf argued that population of a country does not reflect failure or difficulty in economic progress by highlighting India and China which are the most populated countries yet making positive economic progress. Average incomes of the world cannot be weighted by population and accurate results be found (Wolf, 2004). This is because even amongst the less and densely
Friday, October 18, 2019
Audience Reading Popular Cultural Text Research Paper
Audience Reading Popular Cultural Text - Research Paper Example The team is comprised of two Air Force officers, an archaeologist and an alien that joined them on one of their travels. The US Air Force coordinates their travels, and that of other teams, to make friends with 'people' of other planets, and to procure technology that will aid in the defence of Earth from the threat of the alien race, the Goa'uld, who are a parasitic species who take human bodies as hosts, set themselves up as gods, and enslave the people of the planets they invade. Earth's Stargate was found within Egyptian ruins, and it took the Air Force 50 years to work out how to use it, drawing on the knowledge of our best archaeologists, physicist and engineers. I will investigate an audience reading of this text by using a focus group. The aim of this paper is to present the results of an audience analysis of Stargate SG1. Firstly, I will present my own reading of the text. Secondly, my investigation method will be explained. Thirdly, I will provide the results of the focus group discussion in regards to humour; stereotypes; and the ideology of Stargate SG1. Fourthly, I will apply different theoretical approaches to the text in regards to the key themes. Fourthly, I will highlight the implications of this text. Finally I shall present a conclusion that will synthesise the main points of the paper, and makes recommendations for future audience analysis of the Stargate series. I will now present my own reading of the text. ... especially in the USA and other Western nations, such as defending ourselves, interactions with those who are 'other' than ourselves, and the moral dilemmas involved in intervening or not intervening when another group of 'people' are at war or oppressed on their own planets. The show is very reliant on hard science to provide explanations for how the Stargate works, as well as the workings of extra-terrestrial weaponry, healing devices, and other cultural artefacts. This provides a clear mediation of the text with our present knowledge in quantum physics and human psychology, making the show more believable as I am not disengaged from my viewing through incongruent information. The series also delves into spirituality, particularly Buddhism, to provide an overall meaning to the universe, and a purpose to the lives of all who dwell within it. I find this interesting and of value to myself as a viewer, as Buddhism is a philosophy that provides many answers to me in my life.Especially, the humour within the series is salient. One of the lead actors, and he is also one of the producers, being Richard Dean Anderson from the 1970s series Amcgyver. His flip attitude is particularly amusing, given his character's role as a colonel in the Air Force, I expected the stereotypical behaviour of discipline, restraint, and authoritarianism. I admire that the series attempts to break down stereotypes, as the physicist/engineer on the team is a woman, who spends her leave time working on her motorbike, and is an excellent lock-picker, although she remains feminine.The ideology of the series is 'respect for others, and what's potentially out there'. A primary mission of SG1 is to peacefully seek out other life-forms to establish diplomatic ties. This engages me to
REFLECT THOUGHT Assignment Example | Topics and Well Written Essays - 500 words
REFLECT THOUGHT - Assignment Example The main difference in these regards is the understanding that in these regions, strength is a more valued quality than intelligence, as the majority of work is farm or manual labor. Itââ¬â¢s clear that this difference could lead to relativism as one culture places higher value than another on intellectual forms of intelligence. Even as difference value is placed on these elements, itââ¬â¢s clear that the different values are different because they have specific viability in the culture, leading to support of relativism. 2. Psychological egoism claims that whatever we do, we do out of self-interest. Give an example of an act you think is not done out of self-interest, and explain how the psychological egoist might try to interpret that act as selfish. One of the major acts that are claimed to be done not out of self-interest is charity work. Everyone from celebrities to billionaires to everyday citizens has regularly involved themselves in charitable activity as a means of contributing to world culture and helping disenfranchised individuals. Even as these acts are performed out of charity, a psychological egoist may claim they are done out of self-interest. The egoist could potentially argue that in performing these acts the people are not doing it out of a selfless interest to help others, but actually as a means of making themselves feel better. Similarly, the egoist might argue that these people are participating in these charitable activities to make themselves look better in the eyes of their peers and the general public. The problem of prayer in school is a hot-button issue. In the hypothetical dilemma John wants prayer, while Mary does not. One of the potential compromises that could be reached for this situation is to allow prayer in school for those individuals that choose to pray. Still, prayer must not be an institutionally sponsored activity; for instance, teachers would not be able to institute prayer sessions. This scenario
Thursday, October 17, 2019
Differences and connections between groupware and ordinary databases Essay
Differences and connections between groupware and ordinary databases - Essay Example The significance of Groupware technology spawned by CSWC cannot be underestimated in the modern interactive world. This technology designed to facilitate and allow for ease of work amongst members of a group is nothing but a remarkable achievement. This technology has found usage in communication, cooperation, coordination, negotiation, and even competition amongst members of a defined group. This technology relies on modern computer networks, newsgroups, chatting networks, and even videophone Mills, (2011) In a globalizing world, it is important to find a way of connecting people in diverse areas across the globe. Computer-Supported Cooperative Work (CSCW) is the field of study that has made the adoption, design and usage of groupware possible. But this field is not restricted entirely to work or cooperation in any sense, but can also be used to examine other aspects of social dynamics such as competition and play Mills,(2011). This basically means that unlike ordinary databases whose purpose can only be defined and will only require software designing and engineering, groupware may require the concerted effort of social and organizational behavior experts, business people, computer scientists, communication researchers, organization psychologists, anthropologists, to name just a few specialties. Designing a Groupware involves an in-depth understanding of groups and how people behave while in a groups. This is not a requirement in the design of the Ordinary User Interface. Further, designing a workable Groupware will require a coherent understanding of networking technology and how the various aspect of this system works, whether subtle or complex. It will be ideal to understand how instances of delay in synchronizing will affect the experience of the user. But it is also important to point out that all the other basic issues of traditional user interface remains relevant because
Popular Culture (Paraphrase) Essay Example | Topics and Well Written Essays - 500 words
Popular Culture (Paraphrase) - Essay Example Myths can be generally categorized dualistically: myths of history, which represent the accumulated knowledge and superstition of generations and tend to be from more ancient cultures, and myths of example, which speculate about the future and are usually more recent. The first of these is intended to teach certain behaviors, the second to encourage, reassure, or warn. This essay will analyze the modern oral tradition of the American dream, expressed through drama and pop culture, to discern its status as 'myth' and show some responses to it. The ââ¬ËAmerican dreamââ¬â¢ is the somewhat fanciful idea that in the US (and only in the US) a person can achieve wealth and success through hard work, regardless of their other qualities. It suggests that the US socio-economic system is scrupulously fair and completely devoid of corruption or favoritism, and (more disturbingly) that those who do not succeed are personally to blame for their failures. It comes across as a little dated to the cynics of the twenty-first century, and it is true that the dream was not as solid as it may have seemed to its contemporaries. The playwright Arthur Miller recognized this, and made it the topic of his 1949 play Death of a Salesman. Willy Loman, the protagonist of Death of a Salesman, is one of the victims of the American dream.
Wednesday, October 16, 2019
Personal and Profesional Development Essay Example | Topics and Well Written Essays - 750 words
Personal and Profesional Development - Essay Example On the other hand, professional development is a continuous improvement in a personââ¬â¢s career, not a one-time thing; it aims at assessing and skill improvement to increase oneââ¬â¢s value in an organization. This enhances individualââ¬â¢s future in an organization especially with the ever changing and advanced world of modernity and technological enhancement (Masters, Wallace & Harwood, 2011). Professional development includes several facilitated learning opportunities which range from college degrees or university to formal coursework, seminars, conferences as well as informal learning, Professional development is known to be intensive and collaborative due to its evaluative stages. Therefore, it has to be noted that Professional development comprises several approaches that include the following, reflective supervision, lesson study, consultation, mentorship, coaching and technical assistance. There are several individual who participate in professional development on the daily basis from different fields with an aim of enhancing their demand at the place of work, for instance, health practitioners, lawyers, teachers, military officers and accountants just to mention a few, engage in professional development with an objective of lifelong learning as a way of improving professional competence in order to boost their career, to keep pace with ever-changing technology and practice or sometime to comply with a measure put in place by organizational regulatory body, in some cases individuals may be subjected to meet the professional development courses as a requirement established by human resource department (Wadhwa, 2008). Personal development, on the other hand, may comprise the art of developing other people too. This can be achieved through roles, for instance, mentoring or teaching by the way of personal competence.( for example, a manager who has particular skill, may use it
Popular Culture (Paraphrase) Essay Example | Topics and Well Written Essays - 500 words
Popular Culture (Paraphrase) - Essay Example Myths can be generally categorized dualistically: myths of history, which represent the accumulated knowledge and superstition of generations and tend to be from more ancient cultures, and myths of example, which speculate about the future and are usually more recent. The first of these is intended to teach certain behaviors, the second to encourage, reassure, or warn. This essay will analyze the modern oral tradition of the American dream, expressed through drama and pop culture, to discern its status as 'myth' and show some responses to it. The ââ¬ËAmerican dreamââ¬â¢ is the somewhat fanciful idea that in the US (and only in the US) a person can achieve wealth and success through hard work, regardless of their other qualities. It suggests that the US socio-economic system is scrupulously fair and completely devoid of corruption or favoritism, and (more disturbingly) that those who do not succeed are personally to blame for their failures. It comes across as a little dated to the cynics of the twenty-first century, and it is true that the dream was not as solid as it may have seemed to its contemporaries. The playwright Arthur Miller recognized this, and made it the topic of his 1949 play Death of a Salesman. Willy Loman, the protagonist of Death of a Salesman, is one of the victims of the American dream.
Tuesday, October 15, 2019
An analysis of Information Security Governance in the Universities in Zimbabwe Essay Example for Free
An analysis of Information Security Governance in the Universities in Zimbabwe Essay Abstract The complexity and criticality of information security and its governance demand that it be elevated to the highest organizational levels. Within a university setup, information assets include student and personnel records, health and financial information, research data, teaching and learning materials and all restricted and unrestricted electronic library materials. Security of these information assets is among the highest priorities in terms of risk and liabilities, business continuity, and protection of university reputations. As a critical resource, information must be treated like any other asset essential to the survival and success of the organization. In this paper the writer is going to discuss the need for implementing Information Security Governance within institutions of higher education. Further than that, a discussion on how to best practice Information Security governance within the universities in Zimbabwe followed by an assessment on how far the Zimbabwean universities have implemented Information Security Governance. A combination of questionnaires and interviews is going to be used as a tool to gather data and some recommendations are stated towards the end of the paper. Introduction Governance, as defined by the IT Governance Institute (2003), is the ââ¬Å"set of responsibilities and practices exercised by the board and executive management with the goal of providing strategic direction, ensuring that objectives are achieved, ascertaining that risks are managed appropriately and verifying that the enterpriseââ¬â¢s resources are used responsibly.â⬠Information security governance is the system by which an organization directs and controls information security (adapted from ISO 38500). It specifies the accountability framework and provides oversight to ensure that risks are adequately mitigated as well as ensuring that security strategies are aligned with business and consistent with regulations. To exercise effective enterprise and information security governance, boards and senior executives must have a clear understanding of what to expect from their enterpriseââ¬â¢s information security programme. They need to know how to directà the implementation of an information security programme, how to evaluate their own status with regard to an existing security programme and how to decide the strategy and objectives of an effective security programme (IT Governance Institute, 2006). Stakeholders are becoming more and more concerned about the information security as news of hacking, data theft and other attacks happen more frequently than ever dreamt of. Executive management has been showered with the responsibility of ensuring an organization provides users with secure information systems environment. Information security is not only a technical issue, but a business and governance challenge that involves adequate risk management, reporting and accountability. Effective security requires the active involvement of executives to assess emerging threats and the organizationââ¬â¢s response to them (Corporate Governance Task Force, 2004). Furthermore the organizations need to protect themselves against the risks inherent in the use of information systems while simultaneously recognizing the benefits that can accrue from having secure information systems. Peter Drucker (1993) stated: ââ¬Å"The diffusion of technology and the commodification of information transforms the role of information into a resource equal in importance to the traditionally important resources of land, labor and capital.â⬠Thus as dependence on information system increases, the criticality of information security brings with it the need for effective information security governance. Need for Information Security Governance within universities. A key goal of information security is to reduce adverse impacts on the organization to an acceptable level of risk. Information security protects information assets against the risk of loss, operational discontinuity, misuse, unauthorized disclosure, inaccessibility and damage. It also protects against the ever-increasing potential for civil or legal liability that organizations face as a result of information inaccuracy and loss, or the absence of due care in its protection. Information security covers all information processes, physical and electronic, regardless whether they involve people and technology or relationships with trading partners, customers and third parties. Information security addresses information protection, confidentiality, availability and integrity throughout the life cycle of the information and its use within the organization. John P. Pironti (2006) suggested that among many reasons for information securityà governance, the most important one is the one concerned with the legal liability, protection of the organizationââ¬â¢s reputation and regulatory compliance. With the university setup, all members of the university community are obligated to respect and, in many cases, to protect confidential data. Medical records, student records, certain employment-related records, library use records, attorney-client communications, and certain research and other intellectual property-related records are, subject to limited exceptions, confidential as a matter of law. Many other categories of records, including faculty and other personnel records, and records relating to the universitys business and finances are, as a matter of university policy, treated as confidential. Systems (hardware and software) designed primarily to store confidential records (such as the Financial Information System and Student Information System and all medical records systems) require enhanced security protections and are controlled (strategic) systems to which access is closely monitored. Networks provide connection to records, information, and other networks and also require security protections. The use of university information technology assets in other than a manner and for the purpose of which they were intended represents a misallocation of resources and, possibly, a violation of law. To achieve all this in todayââ¬â¢s complex, interconnected world, information security must be addressed at the highest levels of the organization, not regarded as a technical specialty relegated to the IT department. Information security is a top-down process requiring a comprehensive security strategy that is explicitly linked to the organizationââ¬â¢s business processes and strategy. Security must address entire organizationââ¬â¢s processes, both physical and technical, from end to end. Hence, Information security governance requires senior management commitment, a security-aware culture, promotion of good security practices and compliance with policy. It is easier to buy a solution than to change a culture, but even the most secure system will not achieve a significant degree of security if used by ill-informed, untrained, careless or indifferent personnel (IT Governance Institute, 2006). In an interview the executive director and information security expert on IT Governance and cyber security with the IT Governance and Cyber Security Institute of sub-Saharan Africa, Dr Richard Gwashy Young has this to say ââ¬Å"â⬠¦remember inà Zimbabwe security is regarded as an expense not an investmentâ⬠(Rutsito, 2012). Benefits of Information Security Governance Good information security governance generates significant benefits, including: The Board of directors taking full responsibility for Information security initiatives Increased predictability and reduced uncertainty of business operations by lowering information security-related risks to definable and acceptable levels Protection from the increasing potential for civil or legal liability as a result of information inaccuracy or the absence of due care. The structure and framework to optimize allocation of limited security resources Assurance of effective information security policy and policy compliance A firm foundation for efficient and effective risk management, process improvement, and rapid incident response related to securing information A level of assurance that critical decisions are not based on faulty information Accountability for safeguarding information during critical business activities. Compliances with local and international regulations will be easier Improved resource management, optimizing knowledge, information security and information technology infrastructure The benefits add significant value to the organization by: Improving trust in customer/client relationships Protecting the organizationââ¬â¢s reputation Decreasing likelihood of violations of privacy Providing greater confidence when interacting with trading partners Enabling new and better ways to process electronic transactions like publishing results online and online registration. Reducing operational costs by providing predictable outcomesââ¬âmitigating risk factors that may interrupt the process The benefits of good information security are not just a reduction in risk or a reduction in the impact should something go wrong. Good security can improve reputation, confidence and trust from others with whom business is conducted, and can even improve efficiency by avoiding wasted time and effort recovering from a security incident (IT Governance Institute, 2004). Information Security Governance Outcomes Five basic outcomes can be expected to result from developing an effective governance approach to information security: Strategic alignment of information security with institutional objectives Reduction of risk and potential business impacts to an acceptable level Value delivery through the optimization of security investments with institutional objectives Efficient utilization of security investments supporting organization objectives Performance measurement and monitoring to ensure that objectives are met Best practices The National Association of Corporate Directors (2001), recognizes the importance of information security and recommends four essential practices for boards of directors. The four practices, which are based on the practicalities of how boards operate, are: Place information security on the boardââ¬â¢s agenda. Identify information security leaders, hold them accountable and ensure support for them. Ensure the effectiveness of the corporationââ¬â¢s information security policy through review and approval. Assign information security to a key committee and ensure adequate support for that committee. It is critical that management ensure that adequate resources are allocated to support the overall enterprise information security strategy (IT Governance Institute, 2006). To achieve effective information security governance, management must establish and maintain a framework to guide the development and maintenance of a comprehensive information security programme. According to Horton, et al (2000), an information security governance framework generally consists of: An information security risk management methodology; A comprehensive security strategy explicitly linked with business and IT objectives; An effective security organizational structure; A security strategy that talks about the value of information both protected and delivered; Security policies that address each aspect of strategy, control and regulation; A complete set of security standards for each policy to ensure that procedures and guidelines comply with policy; Institutionalized monitoring processes to ensure compliance and provide feedback on effectiveness and mitigation of risk; A process to ensureà continued evaluation and update of security policies, standards, procedures and risks. This kind of framework, in turn, provides the basis for the development of a cost-effective information security program me that supports an organizationââ¬â¢s goals and provides an acceptable level of predictability for operations by limiting the impacts of adverse events. In his article Kaitano (2010), pointed some characteristics of good corporate governance coupled with good security governance. These include and not limited to: Information security being treated as and organization wide issue and leaders are accountable. Leads to viable Governance, Risk and Compliance(GRC) Milestones It is risk-based and focuses on all aspects of security Proper frameworks and programs have been implemented It is not treated as a cost but a way of doing business Roles, responsibilities and segregation of duties are defined It is addressed and enforced by policy Adequate resources are committed and Staff are aware and trained It is planned, managed, measurable and measured It is reviewed and audited The overall objective of the programme is to provide assurance that information assets are protected in accordance with their value or the risk their compromise poses to an organization. The framework generates a set of activities that supports fulfillment of this objective. Principles for information security within the University In their article titled Information Security Policy: Best Practice Document, Hostland et al (2010) pointed out some guiding principles for information security within a university setup. The following are some of the principles they mentioned: 1. Risk assessment and management The universitys approach to security should be based on risk assessments and should be continuously done and the need for protective measures evaluated. Measures must be evaluated based on the universitys role as an establishment for education and research and with regards to efficiency, cost and practical feasibility. An overall risk assessment of theà information systems should be performed annually. Risk assessments must identify, quantify and prioritize the risks according to relevant criteria for acceptable risks. Risk assessments should be carried out when implementing changes impacting information security. Some recognized methods of assessing risks like ISO/IEC 27005 should be employed. Risk management is to be carried out according to criteria approved by the management at University. Risk assessments must be approved by the management and if a risk assessment reveals unacceptable risks, measures must be implemented to reduce the risk to an acceptable level. 2. Information security policy The Vice Chancellor should ensure that the information security policy, as well as guidelines and standards, are utilized and acted upon. He must also ensure the availability of sufficient training and information material for all users, in order to enable the users to protect the universitys data and information systems. The security policy should be reviewed and updated annually or when necessary, in accordance with principles described in ISO/IEC 27001. However, all important changes to universitys activities, and other external changes related to the threat level, should result in a revision of the policy and the guidelines relevant to the information security. 3. Security organization The Vice Chancellor is responsible for all government contact. The university should appoint CSO (Chief Security Officer). Each department and section should also be responsible for implementing the units information security. The managers of each unit must appoint separate security administrators. The Registrar Academics has the primary responsibility for the information security in connection with the student registry and other student related information. The IT Director has executive responsibility for information security in connection with IT systems and infrastructure. The Operations manager has executive responsibility for information security in connection with structural infrastructure. He also has overall responsibility for quality work, while the operational responsibility is delegated according to the management structure. The Registrar Human Resources also has executive responsibility for information security according to the Personal Data Act and is the controller on a daily basis of the personal information of theà employees. The Registrar Academics and Research Administration have also executive responsibility for research related personal information. Universitys information security should be revised on a regular basis, through internal control and at need, with assistance from an external IT auditor. 4. Information security in connection with users of Universitys services Prior to employment security responsibility and roles for employees and contractors should be described. A background check is should also be carried out of all appointees to positions at the university according to relevant laws and regulations. A confidentiality agreement should be signed by employees, contractors or others who may gain access to sensitive and/or internal information. IT regulations should be accepted for all employment contracts and for system access for third parties. During employment, the IT regulations for the universitys information security requirements should be in place and the users responsibility for complying with these regulations is to be emphasized. The IT regulations should be reviewed regularly with all users and with all new hires. All employees and third party users should receive adequate training and updating regarding the Information security policy and procedures. Breaches of the Information security policy and accompanying guidelines will normally result in sanctions. Universitys information, information systems and other assets should only be utilized for their intended purpose. Necessary private usage is permitted. Private IT equipment in the universitys infrastructure may only be connected where explicitly permitted. All other use must be approved in advance by the IT department. On termination or change of employment, the responsibility for termination or change of employment should be clearly defined in a separate routine with relevant circulation forms. The universitys assets should be handed in at the conclusion of the need for the use of these assets. University should change or terminate access rights at termination or change of employment. A routine should be present for handling alumni relationships. Notification on employment termination or change should be carried out through the procedures defined in the personnel system. 5. Information security regarding physical conditions IT equipment and information that require protection should be placed in secure physical areas. Secure areas should have suitable access control toà ensure that only authorized personnel have access. All of the Universitys buildings should be secured according to their classification by using adequate security systems, including suitable tracking/logging. Security managers for the various areas of responsibility should ensure that work performed by third parties in secure zones is suitably monitored and documented. All external doors and windows must be closed and locked at the end of the work day. On securing equipment, IT equipment which is very essential for daily activities must be protected against environmental threats (fires, flooding, temperature variations). Information classified as sensitive must not be stored on portable computer equipment (e.g. laptops, cell phones, memory sticks). If it is necessary to store this information on portable equipment, the information must be password protected and encrypted in compliance with guidelines from the IT department. During travel, portable computer equipment should be treated as carry-on luggage. Fire drills should also be carried out on a regular basis. 6. IT communications and operations management Purchase and installation of IT equipment and software for IT equipment must be approved by the IT department. The IT department should ensure documentation of the IT systems according to universitys standards. Changes in IT systems should only be implemented if well-founded from a business and security standpoint. The IT department should have emergency procedures in order to minimize the effect of unsuccessful changes to the IT systems. Operational procedures should be documented and the documentation must be updated following all substantial changes. Before a new IT system is put in production, plans and risk assessments should be in place to avoid errors. Additionally, routines for monitoring and managing unforeseen problems should be in place. Duties and responsibilities should be separated in a manner reducing the possibility of unauthorized or unforeseen abuse of the universitys assets. Development, testing and maintenance should be separated from operations in order to reduce the risk of unauthorized access or changes, and in order to reduce the risk of error conditions. On system planning and acceptance, the requirements for information security must be taken into consideration when designing, testing, implementing and upgrading IT systems, as well as during system changes. Routines must be developed forà change management and system development/maintenance. IT systems must be dimensioned according to capacity requirements and the load should be monitored in order to apply upgrades and adjustments in a timely manner as it is especially important for business-critical systems. Written guidelines for access control and passwords based on business and security requirements should be in place. Guidelines should be re-evaluated on a regular basis and should contain password requirements (frequency of change, minimum length, character types which may/must be utilized) and regulate password storage. All users accessing systems must be authenticated according to guidelines and should have unique combinations of usernames and passwords. Users are responsible for any usage of their usernames and passwords. Data Gathering A structured questionnaire adapted and modified from previous questionnaires used by Corporate Governance Task Force, (2004) was used as the main instrument to gather data. Of the total 13 universities in Zimbabwe, 9 managed to participate in this research. The questionnaires were completed by the Executive Dean, IT Director, Operations Manager or Chairperson for the department. Section I: Organizational Reliance on IT The first section was designed to help in determining the institutionââ¬â¢s reliance on information technology for business continuity. Table 1: Characteristics of Organization Questions Scores/Frequency 0 1 2 3 4 Dependence on information technology systems and the Internet to conduct academic, research, and outreach programs and offer support services 9 Value of organizationââ¬â¢s intellectual property stored or transmitted in electronic form 2 7 The sensitivity of stakeholders (including but not limited to students, faculty, staff, alumni, governing boards, legislators, donors, and funding agencies) to privacy 2 3 4 Level of regulation regarding security (international, federal, state, or local regulations) 1 4 3 1 Does your organization have academic or research programs in a sensitive area that may make you a target of violent physical or cyber attack from any groups? 5 1 2 1 Total score 1 9 6 7 22 Scoring: Very Low = 0; Low = 1; Medium = 2; High = 3; Very High = 4 Section II: Risk Management: This section assesses the risk management process as it relates to creating an information security strategy and program. Table 2: Information Security Risk Assessment Questions Scores/Frequency 0 1 2 3 4 Does your organization have a documented information security program? 2 5 2 Has your organization conducted a risk assessment to identify the key objectives that need to be supported by your information security program? 2 4 3 Has your organization identified critical assets and the functions that rely on them? 2 2 5 Have the information security threats and vulnerabilities associated with each of the critical assets and functions been identified? 2 4 2 1 Has a cost been assigned to the loss of each critical asset or function? 1 3 3 2 Do you have a written information security strategy? 2 4 2 1 Does your written information security strategy include plans that seek to cost-effectively reduce the risks to an acceptable level, with minimal disruptions to operations? 4 2 2 1 Is the strategy reviewed and updated at least annually or more frequently when significant changes require it? 2 3 3 1 Do you have a process in place to monitor federal, state, or international legislation or regulations and determine their applicability to your organization? 2 2 3 2 1 Total 10 16 26 14 16 Scoring: Not Implemented = 0; Planning Stages = 1; Partially Implemented = 2; Close to Completion = 3; Fully Implemented = 4 Section III: People This section assesses the organizational aspects of the information security program. Table 3: Information Security Function/Organization Questions Scores/Frequency 0 1 2 3 4 Do you have a person that has information security as his primary duty, with responsibility for maintaining the security program and ensuring compliance? 4 3 1 1 Do the leaders and staff of your information security organization have the necessary experience and qualifications? 5 2 2 Is responsibility clearly assigned for all areas of the information security architecture, compliance, processes and audits? 3 4 1 1 Do you have an ongoing training program in place to build skills and competencies for information security for members of the information security function? 2 2 3 2 Does the information security function report regularly to institutional leaders and the governing board on the compliance of the institution to and the effectiveness of the information security program and policies? 2 3 3 1 Are the senior officers of the institution ultimately responsible and accountable for the information security program, including approval of information security policies? 3 4 2 Total 16 17 14 7 0 Scoring: Not Implemented = 0; Planning Stages = 1; Partially Implemented = 2; Close to Completion = 3; Fully Implemented = 4 Section IV: Processes This section assesses the processes that should be part of an information security program. Table IV: Security Technology Strategy Questions Scores/Frequency 0 1 2 3 4 Have you instituted processes and procedures for involving the security personnel in evaluating and addressing any security impacts before the purchase or introduction of new systems? 2 3 3 1 Do you have a process to appropriately evaluate and classify the information and information assets that support the operations and assets under your control, to indicate the appropriate levels of information security? 1 2 3 2 1 Are written information security policies consistent, easy to understand, and readily available to administrators, faculty, employees, students, contractors, and partners? 2 3 3 1 Are consequences for noncompliance with corporate policies clearly communicated and enforced? 1 3 2 3 1 Do your security policies effectively address the risks identified in your risk analysis/risk assessments? 2 3 4 Are information security issues considered in all important decisions within the organization? 3 2 3 1 Do you constantly monitor in real time your networks, systems and applications for unauthorized access and anomalous behavior such as viruses, malicious code insertion, or break-in attempts? 1 3 3 1 1 Is sensitive data encrypted and associated encryption keys properly protected? 2 3 2 1 1 Do you have an authorization system that enforces time limits and defaults to minimum privileges? 2 2 2 3 Do your systems and applications enforce session/user management practices including automatic timeouts, lock out on login failure, and revocation? 2 3 2 2 Based on your information security risk management strategy, do you have official written information security policies or procedures that address each of the following areas? Individual employee responsibilities for information security practices 4 3 1 1 Acceptable use of computers, e-mail, Internet, and intranet 2 3 2 2 Protection of organizational assets, including intellectual property 2 2 3 2 Access control, authentication, and authorization practices and requirements 1 2 3 1 2 Information sharing, including storing and transmitting institutional data on outside resources (ISPs, external networks, contractorsââ¬â¢ systems) 2 1 3 2 1 Disaster recovery contingency planning (business continuity planning) 1 1 3 4 Change management processes 2 3 2 2 Physical security and personnel clearances or background checks 1 3 3 2 Data backups and secure off-site storage 1 1 3 4 Secure disposal of data, old media, or printed materials that contains sensitive information 2 3 4 For your critical data centers, programming rooms, network operations centers, and other sensitive facilities or locations: 2 3 4 Are multiple physical security measures in place to restrict forced or unauthorized entry? 1 2 3 3 Is there a process for issuing keys, codes, and/or cards that require proper authorization and background checks for access to these sensitive facilities? 2 1 3 3 Is your critical hardware and wiring protected from power loss, tampering, failure, and environmental threats? 1 4 4 Total 17 45 58 50 47 Scoring: Not Implemented = 0; Planning Stages = 1; Partially Implemented = 2; Close to Completion = 3; Fully Implemented = 4 Discussion As shown by the total scores on Table 1, a majority of the university has a very high reliance on the IT in their services. This is depicted by the structure and characteristics of the university. Information risk assessment and management leaves a lot to be desired by the universities. Most the universities have partially implemented such programs. A large number of employees in the IT departments of most universities do no have sufficient skills to implement good information security governance. Most universities lack the leaders who have the rightful know how on the subject. In additionà to that, there is no a representative in the council who will be an IT expert, hence most leaders lack interest and initiatives on information security. Due to lack of full responsibility of information security by the leaders, to implement processes for information security might also be a challenge especially to the IT department as normally is the department given the responsibility. Conclusion There is a need for institutions to start focusing on proper information security governance. For a start organization such as the Government, the Computer Society of Zimbabwe, Zim Law Society, POTRAZ, ICAZ, IIAZ, Zimbabwe Institute of Management and other industry governing bodies should put their heads together and define the appropriate legislations that mandates information security governance either by referring to existing international frameworks (PCI-DSS, SOX, COSO, ITIL, SABSA, Cobit FIPS, NIST, ISO 27002/5, CMM, ITG Governance Framework) or by consulting local information security and business professionals to come up with an information security governance framework. As the Zimbabwean economy is slowly sprouting, the art of information security governance in the universities should also take a leap. The adoption information security governance will ensure that security will become a part of any university and thus customers confidence will be boosted. References Drucker, P. ââ¬ËManagement Challenges for the 21st Centuryââ¬â¢, Harpers Business , 1993. Corporate Governance Task Force, Information Security Governance: Call to Action, USA, 2004. IT Governance Institute, Board Briefing on IT Governance, 2nd Edition, USA, 2003, www.itgi.org. IT Governance Institute, Information Security Governance: Guidance for Boards of Directors and Executive Management, 2nd Edition, USA, 2006. ISO/IEC 38500: Corporate Governance of Information Technology, 2008. IT Governance Institute, COBIT 4.0, USA, 2005, www.itgi.org IT Governance Institute, COBITà ® Security Baseline, USA, 2004, www.itgi.org National Association of Corporate Directors, ââ¬ËInformation Security Oversight: Essential Board Practicesââ¬â¢, USA, 2001 John P. Pironti,à ââ¬Å"Information Security Governance: Motivations, Benefits and Outcomes,â⬠Information Systems Control Journal, vol. 4 (2006): 45ââ¬â8. 21. Rutsito, T. (2005) ââ¬ËIT governance, security define new eraââ¬â¢ The Herald, 07 November. Kaitano, F. (2010) ââ¬ËInformation Security Governance: Missing Link In Corporate Governanceââ¬â¢ TechZim. http://www.techzim.co.zw/2010/05/information-security-governance-missing-link-in-corporate-governance [accessed 02 May 2013]. Horton, T.R., Le Grand, C.H., Murray, W.H., Ozier, W.J. Parker, D.B. (2000). Information Security Management and Assurance: A Call to Action for Corporate Governance. United States of America: The Institute of Internal Auditors. Hostland, K, Enstad, A. P, Eilertsen, O, Boe, G. (2010). Information Security Policy: Best Practice Document. Corporate Governance Task Force, (2004). Information Security Governance: Call to Action, USA
Monday, October 14, 2019
MAXXI National Museum Architecture
MAXXI National Museum Architecture MAXXI MUSEUMà à à à Contemporary Architecture This report will focus on MAXXI National Museum and it will provide a comprehensive review of Contemporary museum architecture (built in Rome in 2009), designed by the Zaha Hadid Architects. As it was said in ââ¬Å"Museums in the 21st Centuryâ⬠, there is no doubt to say that museum architecture seeks itââ¬â¢s development through the periods, divided into pre- and post-Bilbao eras. Bilbaos buildings are a variety of architectural styles, ranging from gothic to contemporary architecture like Guggenheim Museum Bilbao (build in Spain in 1997) which gives the begging of contemporary Bilbao movement. Rome has no obligation to turn itself into a trendy modern city; its glory rests on the achievements of antiquity, the Renaissance, and the Baroque. In mid1990ââ¬â¢s a new policy in Rome for ââ¬â¢the promotion of contemporary architectureââ¬â¢ has tried to change the architectural understatement by its city governments, policy with different aspects, views and cultural activi ties, with willingness for novelty. The foundation of the Maxi Museum was followed by international design competition combining all the new prospects. Hadidââ¬â¢s proposal is an impressive urban sculpture with dynamic and indefinite exhibition space. To construct this essay, and prove that MAXXI museum is an example of Modernism various sources have been researched. Therefore, its consistency includes Architectural concept and urban strategy, space vs object, Institutional Catalyst and Contemporary Spatiality. The essay was conducted in the form of a survey, with data being gathered via books ââ¬Å"Lubetkin Tecton: An architectural studyâ⬠by Yoshio Malcolm Reading Peter Coe (1992) , ââ¬Å"Frank O. Gehry: The complete worksâ⬠by Francesco Dal Co Kurt W. Foster (1998) ,and the following articles ââ¬Å"MAXXI Museum in Rome by Zaha Hadid Architects wins the RIBA Starling Prize 2010â⬠by Levent Ozler, ââ¬Å" Zaha Hadids MAXXI National Museum of XXI Century Art sâ⬠by Zaha Hadid Architects,â⬠Starling Prize 2010 Goes to Zaha Hadidââ¬â¢s MAXXI Museum in Romeâ⬠(unknown author). The early architectural modernism was indeed sudden break with tradition. Raise the banner of artistic simplification and geometrization, advanced substantiate this aesthetic slogan, ethical and political. The technique had become progressive character, and the machine a metaphor.In the history of the foundation of modernism role has Berthold Lubetkin along with Le Coubusier second- generation well-known modernist. In 1932, Lubetkin formed the Tecton partnership including Gofrey Samuel,Sir Herbert ,Michael Dugdale ,Valentine Harding and Anthony Chitty . Main years of work for Tecton partnership were the period from 1932 till the outburst of the Second world war, and their work can be categorized in four departments: Apartments in north London, the work for Finsbury Borough Council, The zoo work and house projects. One of the picturesque projects commissioned to build after earned reputation from the designed Regenââ¬â¢s park (built in London, 1978) and Whipsnade zoo (built in Whi psnade in 1931) was Dudley Zoo. Its location is outside Birmingham, in town called Dudley opened in May 1937.The geometric character of building consisted twelve animal enclosures which despite the different functions of the buildings they formed relationship based on close connection between them which was an early modernist example in England. In another hand on the official page of MAXXI museum Zaha Hadid commented that ââ¬Å"the museum should not be seen as an object, but as a field of buildingsâ⬠. Another way to support the touch of modernism is connected with the concrete walls in Kiosks, smallest buildings in the zoo. Concrete is material typical for this period, and the same construction techniques are used in Maxxi museum. In that way is proven that Maxxi museum was part of the Modern movement (modernism). Another modernist for this period is half American half Canadian architect Frank Gehry. Among the well-known work of him is (built in Spain in 1997). The projected was funded and owned by Basque Country Administration, presenting good access for trade business. The internal organizations of the spaces are distributed in three floors. The central court of the building serves as unit point, with open view to the city. Different art galleries fill the spaces with purpose to expose temporary exhibitions, permanent exhibitions and art from living artist.The material for the exterior curved walls of the building is limestone and for interior is used plaster. Natural light is captured via skylights with the help of shades control during the day. And as Frank Gehry says for the unconsciously made curved walls the randomness of the curves are designed to catch the light. With this citation it is suggested that engineers along with the architect used scientific knowledge, one of the typical c haracteristics for modernism. In Maxxi museum the fluid and sinuous shapes, the variety and interweaving of spaces and the modulated use of natural light is leading to functional framework. By measuring all these important aspect in order to have this result and let the light to come into the building they highlight the function. Therefore MAXXI museum it was also used scientific knowledge. Once it was said by Frank Lloyd Wrights that the perception ââ¬Å"form follows functionâ⬠implies the believes that it is design serve to its function. According to arcspace.com the main design idea of Maxi museum it is conected to the use of the building exhibition space for visual arts. Maxi museum walls crossing area and their interfaces define the interior halls of the museum and exterior.Because of the geometric abstraction in Maxxi museum ââ¬Å"Form follows functionâ⬠, we reach another characteristic of modernism. Modernism introduces the concept of truth to materials which states that the building materials should be exposed rather than hidden and situated in the appropriate place. An example of this is statement is Maxxi museum. With its limited range of materials, such as the walls of exposed concrete or gray flooring using its shortcomings, it is constructed a sequence. On second floor and third, the touch of daylight can be sense over the glass roof supported by steel struts. They possess a mechanism that helps for the exhibition of paintings and sculptures which are not mounted to the floor. In that why Maxxi museum is modernist building. Another architect of the modernism movement was Oscar Niemeyer. After his individual development in architecture and a series of projects in the city Belo Horizonte, he began to feel passion for oval shapes which links with his homeland, rivers and even womanââ¬â¢s body shape and concrete as a material for construction. The same materials are used in Maxxi museum, another good reason to support the evidence of Contemporary architecture. Exposed concrete and glass we can see in Peter Behrens building called AEG. Wassily Kandinsky was a Russian painter, who worked mainly in Germany and France. Kandinsky is expressionist and proclaimed himself for creator of the first abstract painting, despite concerns that it dates back to deliberate with an earlier date. His first works were abstract watercolor. His work in life passes through three stages: impression of external nature, improvisation and works compositions. Wassily works and lived initially in Munich and later in Russia, but because the conditions of Russian Communism the censorship of totalitarian regime was forced to emigrate. First assume teaching at the Bauhaus in Germany, after the closure of the school by the Nazis escaped to Paris. In 1933 by the National Kandinsky taught in Weimar, Dessau and Berlin, where he met with Russian constructivism. At that time, the geometry acquired superiority in his art. Forms which are reminding of microorganisms, but always depicting inner life of the Wassily. He used an unordinary color compositio ns imitating Slavic folklore. And mix sand with dyes to impart roughness colors. Accordingly to theguardian.com it mentions that Maxxi museum has different varieties of colors, such as: grey, black, white and wide range of cream mixtures of the exposed concrete. Our attention is grabbed, from the red abstract elements from the ceiling ,positioned in order to show the contemporary character of the building through color .Respectively of Wissily Kandinsky color theory based on abstract elements and forms ,we have proven our claim. Modernism is period with highly advanced technological development .It categorizes the exposure of the structure, thatââ¬â¢s why it could be called the period of Structural Expressionism. Hi-tech architecture creates new visual ideas, and the admiration for economical building constructions led to poor manufacturing quality. During the eighties it was difficult to differentiate this technological improvement from postââ¬âmodern architecture. This is exemplified in the work undertaken by Richard Rogers and Renzo Piano, Centre Pompidou. As it was mention in archdaily one of the main design concept ideas was the typically structural uncovering for modernism. The building was dived with the help of color coding .Using this system it could be easily recognized the different components or area of the building. For example electrical mechanism was colored in orange and yellow, structures and stairs were painted in grey .In maxi museum we have exposure of staircase too, which led agai n to the thought that Maxi museum is modernist building. Le Corbusier is a French architect and it was born in Switzerland. He formulated his five principles of modern architecture, in which he remains faithful to the end of his life. The first principle is connected with columns it separates the house from the ground through several supporting columns. The second principle is garden he also uses gardens on the roof of buildings. The third principle is a small number of load-bearing walls. The fourth principle is widely glazing and the last fifth principle is free facade exterior walls free from their load-bearing function. And based on those five point principles he adjusted one of his projects: Villa Savoye which has big influence over the modernism. With open plan and sequence of ramps, he dares the residents to go through the spaces constantly. In Maxxi museum the visitor are invited to enter into a series of continuous spaces, rather than the compact volume of an isolated building. So in both cases we have a unified space. Conclusion: To sum up, the main goal of the essay was to determine and explain why Maxxi museum is contemporary building. Based on several perceptions typical for modernism, it was proven accordingly to the concept ââ¬Å"Form follows function, Truth to materials, unhidden structures and scientific knowledge. Maxi is a museum with numerous volumes and extension of lines, without center point, representing the circulation of images and ideas. Building is seen as a second skin of the city, responding to the environment, the building is seen as artistic s stretching drawing over the marvelous landscape.
Subscribe to:
Posts (Atom)