.

Wednesday, January 30, 2019

Business Plan †Tfbg Essay

ProductThe usable crapulence Group, Inc. has knowing and is straightway giveing a line of compound piddle harvestings utilize a micro-targeting strategy. Consumers depart be able to choose from a diverse, yet extremely particular(prenominal) crossway minting raise on their adjuvant feedetic or hydration ineluctably. Each point of intersection ordain be optimized for vitamin contentedness, electrolyte content, caloric content, and might boost. We atomic number 18 circulating(prenominal)ly in the motion of developing three (3) of the targeted conceptualitys.What makes our deepen pissing w ars so unique is that all of these returns impart tone down trains of Vitamin D3. Our major(ip) opponents from Sobe, to Vitamin pissing, to Propel, and the rest do not excite enhance water that dribble Vitamin D3. Beca spend of the amounts of interrogation data available, we whitethorn be able to make health claims concerning our formulations claims that th e an other(a)(prenominal) functional waters cant make. Currently, in that location is no major merchandiseer of a functional water harvest containing Vitamin D3.why Vitamin D3? Over the at drop dead two years, there has been a rash of research emerging concerning the neglect of Vitamin D in our diets. Many physicians agree that the levels of Vitamin D suggested by current U.S. guidelines atomic number 18 light. The lack of Vitamin D in the diet is beginning to give notoriety by obstetricians, gynecologists, oncologists, pediatricians, and orthopedists across the reckonry large bone to what is being labeled as a new(a) epizootic Vitamin D deficiency.Our Technology Vitamin D has chemical properties which ca implements it to be virtually water-insoluble in water. Therefore, a swallow company would need to develop the applied science to dissolve Vitamin D3 into a water crossroad using food clan ingredients while at the same time making a product that is pleasi ng in both taste and appearance. The Research and Development squad of The running(a) beverage Group has veritable the technology to obtain these goals.We atomic number 18 now seeking raise capital in order to patch up our formulation tuition and bring these product formulations to grocery storeplace.Investment OpportunityA $500,000 initial investment (available in units of $10,000 from individually one) provides an equity power in The improvementable Beverage Group, Inc. This funding result allow the FBG to complete initial development of its product line, developinformational web-site, and c e precisewhere the wakeless fees and other costs re new-fashionedd to the culmination of the second round of funding for the development of the run company in operation(p) Foods &type A Beverages, Inc.Exit StrategyOur research has shown that most beverage companies ar in the acquisition and/or partnering mode. Recently, many small beverage makers take in been purchase d by larger entities such as reverse, Pepsi, and Dr. Pepper/Snapple. round of the more(prenominal) new purchases accommodate Coca-Colas purchases of Glaceaus VitaminWater and SmartWater rats ($4.1 billion), Fuze Beverage ($327 million), agua Brisa ($92 million), and Jugos del Valle ($456 million). Of more by-line to The practicable Beverage Group is the juvenile investment of approximately $5 million the Dr. Pepper/Snapple Group do into Hydrive Energy, LLC. The Functional Beverage Group believes that our functional waters containing D3 leave behind be a good fit for any of those organizations and therefore we can passing play an attractive exit plan for our investors.In an otherwise sluggish merger-and-acquisitions food market, lucky beverage firms are still the darlings of Wall Street deal makers. fit to the December 9, 2009 edition of the Wall Street Journal, November was the biggest month in all over a year for deals involving consumer products and food and drink s firms with $12.54 billion in acquisitions. One of those companies for cut-rate sale is Cliffstar Corp., a bleak York based fruit-juice and sports-drink maker. Cliffstar has hired Morgan Stanley to conduct an auction and has entered a second round of bidding, said several batch familiar with the matter. intimately held Cliffstar has annual earnings around $75 million and is seeking septet to eight times earnings, which would put it a gross sales hurt at $500 million to $600 million, according to the article.Budget StatementOur revenue and set down projections are based on exhaustive assiduity research based on the cost to reach and market a new beverage product. In estimating revenues, we look at three products currently on the market 1)Wal-Marts Acai-based Energy Drink, 2) Hy-Drive Energy Drink, and 3) DRANK Relaxation drink. These products are thought to be near of the most innovative products at the time of their introduction. Our revenue projections are conservative. If we can achieve early adoption into the major retailers like Wal-Mart or level, we can far exceed those revenue projections.Our initial investors result fit members of The Functional Beverage Group, Inc an in assureectual property development organization. Beca routine The Functional Beverage Group, Inc will create few expenses and we expect to become profitable by Year 2. Most of these profits will be distributed as dividends to our shareholders. skeletal frame 1. The Functional Beverage Group, Inc 5 Yr Revenue ProjectionspicThe Functional Beverage Group, Inc will maintain an approximate 40% stake in Functional Foods & vitamin A Beverages, Inc (FFBI). FFBI will have the primary responsibility of manufacturing and market products license from The Functional Beverage Group, Inc.Figure 2. Functional Foods & Beverages, Inc 5 Yr Sales Projectionspic2. The Functional Beverage Group, Inc.The Functional Beverage Group, Inc (The FBG), an Illinois Corporation was schematic in 2 009 with a one total purpose to become the superior supplier of functional or enhanced water products. The FBG is developing a line of functional water products based on the diverse needs of the functional water consumer. The consumer will be able to choose from a diverse yet extravagantlyly specific product offering for their appurtenanceal dietary or hydration needs. Each product is optimized for vitamin content,electrolyte content, caloric content, and energy boost. Our trade will focus on grass roots efforts as soundly as forming alliances, partnerships, and promotional agreements with A-List celebrities to produce other unique selling angles. Our concern model will be split into three separate entities 1) The Functional Beverage Group, Inc an intellectual property organization answerable for the development and licensing of proprietorship enhanced water products and other beverages to be produced and marketed by its subsidiary operating company, Functional Foods & Beverages, Inc.2) Functional Foods & Beverages, Inc the operating company responsible for the manufacturing of products developed by The Functional Beverage Group, Inc. Functional Foods & Beverages, Inc will have the exclusive right to manufacture and market products developed by The Functional Beverage Group, Inc. Functional Foods & Beverages will be managed by individuals with food and beverage manufacture recognise. Although this organization will be managed by beverage industry professionals, selected members of the Functional Beverage Group, Inc will act as consultants to the organization.3) Functional Beverage Real nation Holdings, LLC a real nation holding company responsible for acquiring any land and buildings associated with the manufacturing and diffusion of products interchange by Functional Foods & Beverages, Inc. The Functional Real Estate Holdings, LLC will seek to locate facilities in areas where they can take usefulness of incentives such a s TIF financing, property tax concessions, and vacant or novel property incentives.picFigure 3. Proposed Operating Structure3. Management TeamOur core management team consists ofShelby Parchman, President MS Chemistry, Illinois Institute of Technology. Mr. Parchman has worked in new product development in the pharmaceutical and nutrition arenas for both Baxter healthcare Corporation and the Amoco Corporation (Now BP). Mr. Parchman has years of generate working in the manufacture and formulation of analogs of Vitamin D3. In increment, he has a 15-year track record of reinforcement in working with start-up and entrepreneurial organizations. Mr. Parchmans affirmground in product development and nutrition has been instrumental in developing the unique features and formulations of our product mix.Edward A. Williams, Corporate Treasurer JD, DePaul University work of Law, CPA (Licensed in IL & IN). Mr. Williams specializes in sub judice matters in the following practice areas task Law, Tax excogitationning, Tax Litigation, Civil Practice, and Federal Taxation. Mr. Williams has represented several notable clients including the late Bernie Mac.Marvin Rux, blood line Organization and Management Consultant JD North Carolina Central University School of Law, MBA University of Chicago Booth School of Business, Mr. Rux practiced law for more than 20 years, specializing in the following practice areas Real Estate Law and Taxation, Business Law & Development, and Estate Planning. Mr. Rux, no longer actively practicing law, provides consulting work to affair development and real estate investment clients.Christopher McGruder, VP of marketing BA Business Administration, Barrington University. Mr. McGruder has extensive tradeing, Public Relations and Executive Assistance examine via Edelman PR Worldwide, Merck & Company Pharmaceuticals and Morgan Stanley. His clients list includes several Fortune light speed Companies such as Micro-Soft, Sears, Wri gleys, KFC, Unilever, Kobel Champaign, Mikes Hard Lemonade, Cub-Cadet, and Axe proboscis Spray. He was instrumental in the capabilities development and promotions, and execution of product initiatives and home(a) campaigns.Charles Moss, Marketing and Promotions BA Communications, Southern Illinois University, Mr. Moss has years of experience in the diversion andrecording industries. Through his organization, Chuck Moss Presents, he has worked with various recording artists in all aspects of management, marketing and promotions. Because his reach stretched from Los Angeles to New York, he has been able to develop a valuable network of celebrities in both the music and sports industry.Terrence Seaphus, Marketing Consultant MS Marketing/Advertising, Northwestern University Medill School of Journalism. Mr. Seaphus is an individual who can conceptualize a project and follow by means of to completion. His experience at M&M Mars along with his Northwestern University grade School tenure set the foundation that gave him the tools to succeed in marketing, advertising, miscellany training and sales. His understanding of how to take new products through different conduct including distributors, retailers, wholesalers, and finally, the end-consumer requires a 21st Century integrated marketing effort which happens to be his background.Michael Vick, Marketing Consultant Pro Football Player, Virginia Tech (College), Atlanta Falcons, Philadelphia Eagles. In addition to being an outstanding football participant, Mr. Vick has a keen moxie of marketing and salesmanship. In addition to being a partner, Mr. Vick has converseed interest in being our first signed celebrity endorser. In addition, Mr. Vick has a list of contacts who have expressed an interest in investing in our endeavor. Mr. Vick still has numerous fans and followers. His jersey is still a best seller in the NFL a good testament to his marketing potency.Pamela Williams, Manufacturing Consultant MS Chemical Engineering, Washington University. Ms. Williams is a dynamic leader with extensive experience in project management, process and mechanical equipment origination, and manufacturing start-up. Her broad technical expertise and demonstrated ability to learn technology quickly will change us to complete project milestones at a fast pace. Additionally, Ms. Williams has over 12 years of experience working in global manufacturing at Proctor and Gamble.Larry Williford, Project Management MBA, MPM, Keller Graduate School of Business. Mr. Williford has extensive experience in project management. Heis skilled at working with origin units to create sound business strategies, as well as support technology strategies. Mr. Williford worked in the IT departments of the McDonalds Corporation, CNA Financial Services, and the Motorola Corporation before start his own IT Consulting Business Premier Project Management, Inc.4. IntroductionFunctional waterThe stored water industry has e xperienced phenomenal egress over the last ten years. Although low cost fee water is readily available, there is still 71 million bottles of water consumed per day. In 2007, bottled water sales reached $15 billion. Whats fueling the expect for bottled water? Bottled water demand is powered by the health and fitness craze. Consumers are being told that potable bottled water is healthy and they have responded to the call by increasing their spending of bottled water on a year over year basis.As the consumer becomes even more health conscious, there is an increased demand for enhanced and functional waters. These enhanced and functional waters contain added ingredients such as vitamins and minerals that allow the manufacturer to claim health benefits related to these waters. Therefore, functional waters have a greater product distinction. Demographically, these enhanced waters are especially popular with 18-35 year olds. application Trends correspond to beverage industry experts, the beverage industry has been trending towards lighter, lower calorie beverages with an emphasis on taste, refreshment, and function. Functional or enhanced beverages have seen phenomenal growth for the years 2006-2009 where the industry saw sales of enhanced waters and sports drinks up by 36% and 16% respectively for the period. Sales growth has been modest (approximately 3% from Jan 2009 to whitethorn2010) during the current recession. However, according to Coca-Cola and Pepsi, sales of the enhanced waters have kept overall beverage sales in the black.Figure 4. Beverage Industry GrowthpicSource Beverage Spectrum, June 23, 2010Factors for Success of the Product harmonise to Michael Bellas of the lot publication Beverage World (www.beverageworld.com), there are some chance on factors in making a new beverage product successful. These factors are1) Make product enkindle for the younger consumer,2) Let the label tell a good story convince the consumer,3) Create great and exciti ng flavors, and4) Create added value and believability.We took these factors into throwaway as we designed our initial product offerings.5. Product PlanOur initial product line is designed to words three relevant issues concerning vitamin supplements, obesity, and water quality. The three main product qualities are1) Fortified with Vitamin D3,2) Natural, no-calorie natural sweeteners, and3) Certified pharmaceutical cede.1. Fortified With Vitamin D3Over the last two years, there has been a rash of research emerging concerning the lack of Vitamin D in our diets. Many physicians agree that the levels of Vitamin D suggested by current U.S. guidelines are insufficient. The lack of Vitamin D in the diet is beginning to gain notoriety by pediatricians and bone doctors across the country giving rise to a new epidemic Vitamin D deficiency.The Functional Beverage meeting has designed a line of Health Waters that include levels of Vitamin D3. We will design our marketing campaign around t he concerns for the lack of Vitamin D in the diet along with the health benefits of supplementing Vitamin D in the diet. Because there is not a one-size-fits-all recommendation for the amount of Vitamin D that should be supplemented in the diet, we have designed different formulations for targeted groups. This keeps in line with our strategy of micro-targeted waters. Therefore, in addition to optimizing our formulations for taste, other vitamins, sugar content, etc, we will also optimize for the levels of Vitamin D suggested for our targeted groups.2. Stevia The Natural, No-Calorie decoyThe Functional Beverage Group has chosen an extract of the Stevia plant as the primary sweetener in our enhanced water products. A recent article in the Wall Street Journal highlighted Pepsis and Cokes development of products using the Stevia plant (see WSJ, July 31, 2008 Beverage Wars Take on New Flavor). Massimo dAmore, chief executive of PepsiCos beverage business in the Americas states that T his is probably the biggest change in the formulation of beverages since the initial long time of artificial sweeteners.3. Certified Pharmaceutical handsomeAs evidence mounts of contaminants in some public water systems, unease about the water sum is growing. As detection technology improves, utilities are finding more contaminants in water systems. In early 2008, media reports of trace amounts of pharmaceuticals in water across the country drew financial aid from U.S. Senators and environmental groups, who are now push for regulations of these substances in water systems. Health concerns extend to bottled waters according to the interior(a) Defense Research Council. A lot of bottled water is actually tap water. Consequently, there is no assurance that what is orgasm from the bottle is any safer than what is coming from the tap, according to their studies. The Functional Beverage Group will certify each lot of water to be free of all pharmaceutical compounds. These results wi ll be verified and/or tested by independent interrogation laboratories. In order to insure water of the highest purity, we will start with purified forswear water. If necessary, we will process/polish our feed water to a level of high purity utilizing industry standard methods.6. Initial Product designingbeverage marketers may be best served and this is the key point by classifying products according to the new evolving need states that define our consumer. Michael BellasBarringtons School District 202 dairy farm dilemma is an example of a handling playing out across the country, as educators try to posit two concerns childhood obesity and insufficient calcium intake. Even some experts have trouble coming up with a satisfying answer. Chicago Tribune, Nov. 19, 2009FormulationsWe will formulate and bottle our products using purified Wisconsin spring water. Our initially proposed products are1) Infant Water, Certified Pharmaceutical Free (CPF) This product is the same as an y nursery water sold on the store shelves today. However, each bottle will contain a CPF label stating that we have tested the water and certified it to be free of any detectable levels of pharmaceuticals. What concerned mother wouldnt choose our product over one that has not been certified?2) X-Y-Teen (Young G) Formula The target market for this formula will be children in grades K-12. This formula, containing Calcium, Vitamin D3, protein, and natural sweeteners will be marketed directly to school nutritionists/dieticians as a suitable alternate(a) to take out. According to an article in the November 12, 2009 edition of the Chicago Tribune, there is a discussion playing out across the country as educators try to reconcile two concerns childhood obesity and insufficient calcium and Vitamin D intake. According to the article, even some experts have trouble coming up with a satisfying answer. This product is the satisfying answer.3) Womens Formula intentional to supplement nutrit ional requirements of women especially those of childbearing age. Our formulation will contain Calcium, Vitamin D3, and other vitamins and minerals important to womens health. In addition, emerging research suggests the daily consumption of 1,000 IU of Vitamin D3 is associated with the support of breast health. A claim we can make in the marketing of our product.4) General (Active Adult) Formula A formula for the masses that contain low levels of Vitamin D3, Calcium, and other electrolytes. This formula is designed for the consumer to drink multiple bottles per day, whence the lower levels of vitamins and minerals. This formula will compete with the more mainstream vitamin enhanced water products and is targeted to replace the ever decreasing carbonated soft drink market.5) organic Sports Formula This product is designed for professional athletes and amateurs who participate in endurance sports or multiple bouts of violent exercise. The product contains Calcium and Vitamin D3 for stronger bones as well as increased amounts of electrolytes for morecomplete hydration. This formula is designed for the rigors of professional sports and can have variations for other professional sports endorsers. The target market consists of professional athletes and amateurs who participate in endurance sports or multiple bouts of intense exercise. We are designing an MV-7 formulation of the Extreme Sports formula for Michael Vicks return key to the NFL. This formulation is to be sold in markets where Michael Vick has a strong marketing and brand wisdom presence. Additionally, we are in discussions with Pierre Thomas of the New siege of Orleans Saints to come aboard as an endorser.Our future product offerings may include1) Winter Formula This formulation will include higher(prenominal) levels of vitamin D for the winter months to address the lack of sunlight available in winter months.2) Acai Berry Formula Acai berries, found in the Amazon, are believed to have some ve ry healthy qualities. Wal-Mart has recently entered the market for Acai Berry juice and sold approximately $40 million worth of the juice at heart the first 90 days.3) Baby Boomers Formula A formulation designed for active adults who are ages 45 and older. The target demographic has a keen awareness of health related issues and an above bonnie amount of disposable income.4) Other Formulas These can include energy drinks, other enhanced water formulations, natural juices, and alcohol based beverages.Container DesignBecause Vitamin D is sensitive to both light and oxygen (air), the traditional plastic bottle is not suitable for our formulation designs. We look at that being an added subsidy because it forces us to use a newer, up-scale, and more hip package design the atomic number 13 bottle. The use of this packaging further differentiates our beverages from the typical bottledwater and vitamin waters. An added advantage to using the aluminum bottle is the ability to added ex tremely artistic graphics to the outside of the packaging adding even more product distinction without the expense of a separate label. According to CCL Container, manufacturer of an aluminum bottle product, the aluminum bottle offers distinct advantages, including the ability of top-to-bottom shaping, chill-retention, re-sealability and durability.The use of the aluminum bottle has added importation over the plastic bottle as well when it comes to the environment. Because there are more green initiatives implement by both federal and local anesthetic environmental concerns, it is important that product packaging is forward looking in terms of meeting any new environmental regulations. According to the recycle Revolution web site (www.recycling-revolution.com/recycling-facts.html), these facts, among others, are worth bowl overing about the use of aluminum for packaging1. A used aluminum can is recycled and back on the grocery shelf as a new can, in as little as 60 days a proce ss known a closed-loop recycling.2. Because so many of them are recycled, aluminum cans account for less than 1% of the total U.S. waste stream according to EPA estimates.3. Americans use 2,500,000 plastic bottles every hour with most of them being thrown away. after(prenominal) considering product stability, costs, and environmental issues, we have concluded that the aluminum bottle is the sinless packing for our product design.7. Trademarks, Patents, Copyrights, Licenses, RoyaltiesWe will seek trademark protection for all of our product brand names, designs, logos, and relevant phrases. In addition, we may letters patent some of our formulas and processes. However, we feel that keeping our formulations and processes a trade secret will offer better protection that securing a patentfor the these items. We will review each situation on a case-by-case basis, in consultation with our legal team, as we make decisions on whether or not to pursue patent protection for any of our formul ations or processes.8. Government ApprovalsThe United States Food and drug Administration (FDA) regulates bottled water as a food product. The FDA has established specific rules for bottled water, including Standard of Identity Regulations that define different types of bottled water, and Standard of Quality Regulations that establish minimum levels for contaminant (microbial, chemical, and radiological).The FDA has also established Good Manufacturing Practices (cGMP) regulations for the processing and bottling of drinking water. These rules require that bottled water must be safe as well as processed, bottled, held and transported under sanitary conditions. Processing practices addressed in the cGMP regulations include protection of the water source from contamination, sanitation at the bottling facility, quality envision to assure the bacteriological and chemical safety of source water, and sampling and testing of source water and the final product for microbiological, chemical , and radiological contaminants. Our bottling group will be required to maintain source approval and testing records in the event of any government inspection.Our bottling group may be give in to additional inspection by state and local licensing agency, health agencies, and/or environmental agencies. Procedures and protocols will be in place to ensure full compliance with all federal, state, and local rules and ordinances.In addition, all of our ingredients, including Vitamin D3, are on the FDA list of ingredients that are approved as GRAS (Generally Recognized as Safe). Consequently, no approvals are required for adding these ingredients to bottled water. However, there may some restrictions on how a lot can be added to the bottled water product. Our formulations will be well infra those limits.9. Product LiabilityWe will purchase product indebtedness amends and/or an umbrella policy in addition to the product liability redress coverage that is held by any of our suppliers. We are depending on our legal team to give us further guidance on the types and amounts of insurance we should obtain in order to protect the organization from any product liability or other claims.10. ProductionAll end product will be performed by our subsidiary operating company Functional Foods & Beverages, Inc. In addition, we will qualify contract bottlers to ensure a continuum of production in the event our primary production facility is out of service or in the event we would need excess production mental object in order to meet unanticipated product demand.11. Marketing Plan Fortified Beveragesbeverage marketers will open new vistas for growth. Their size and growth opportunities will be different their product positioning will be more specific. Michael Bellas (Beverage World)Three simple goalsAs we market our products and create brand awareness, we have three simple goals we look to accomplish1) permute non-bottled water drinkers to enhanced bottled water drinkers,2 ) Convert bottled water drinkers to enhanced bottled water drinkers, and3) Convert others from competitors products.Our marketing plan is designed to efficiently accomplish these goals.A multi-prong approachWe are devising a multi-prong approach to our marketing efforts. We will develop a sales force to create relationships and alliances with people and organizations of influence in our target markets.Figure 6. Marketing PlanpicTarget Market School Districts Across the NationOne of the first formulations the FBG will design and develop will be the Young G formulation. This formulation which contains Calcium, Vitamin D3, protein, and reduced sugars, is an excellent alternative to draw. Children need about 32 ounces of take out daily just to get the recommended allotment of vitamin D. It is difficult getting children to drink eight ounces of milk, let alone 32 ounces. Our Vitamin D3 fortified Young G formulation is the drink for them. Having no fat and fewer calories than 2% milk a lso makes this an attractive product to highlight in First madam Michelle Obamas new Childhood Obesity Initiative. The size of this market is enormous. If we count only the children receiving subsidized lunches in the school system, we have a market that is 31 million children strong in more than 100,000 schools.Target Market Sports FansWe are very fortunate to have professional football player Michael Vick as a member of our founding group. Mr. Vick immediately saw the potential of our proposed formulations and did not hesitate to come on board. Another formulation in the stages of development is our MV-7 formulation. This formulation will be marketed as the drink developed for his return to the NFL. Having Mr. Vick on board establishes immediate brand recognition and credibility for our products. Currently, he is receiving tons of mediaattention every time he hiccups. This media attention is invaluable. For example, experts estimate that last years giveaway of free opulent Slam eats by Dennys generated roughly $50 million through free advertising. We look forward to cashing in on this media attention as well.Additionally, we are looking to sign additional celebrity endorsers from both the sports and pleasure arenas. We are currently in discussions with Pierre Thomas of the New Orleans Saints to bring him aboard as another celebrity endorser from the sports world.12. contention ProfileThere are numerous competitors in the market for enhanced water products. Even with numerous products on the market, new brands can be highly successful. It is a matter of carving out a position in the market where your product has the perception that it does something the others are not doing. As shown in Figure 6 below, there is no huge product distinction from the major functional water brands. Propel Fitness Water includes calcium for stronger bones, however Vitamin D is required in order for the humane body to absorb calcium.While it may be obvious to consider our maj or competitors to be other vitamin water products, we beg to differ. We feel that our major competitors and target market would be those who drink milk or use some other form of Vitamin D fortified consumer product. These products include cereals, cereal bars, and yogurts. Because of extensive research into Vitamin D deficiency, these products can make specific claims on their labels claims that the vitamin water products cannot make. Because our products are fortified with Vitamin D, we can make these same health claims. As a result, we can make this product stand well above the vitamin water products on the market.In the article Chocolate milk Lovers Have a Cow About Bans, Chicago Tribune, November 12, 2009, it has been noted that children are not drinking white milk and that chocolate and strawberry milk products are too high incalories. The article goes on to express parents concerns that children are not getting enough Calcium because they are not drinking milk. The conclusio n is that there is no suitable alternative to milk in the schools. We conclude then that milk is indeed our main competitor because we have designed the suitable alternative.Table 1. Competitive ComparisonAdvantages Drawbacks draw Well known source of Vitamin D & Calcium milk sugar intolerance in many individuals Source of Protein and essential fats Not very portable needs refrigeration Strong marketing campaign factory farm subsidized in schools Concerns about hormones $0.50 per 8 oz. serving Flavors are high in calories Limited shelf life Vitamin Waters Brand recognition Flavors are weak or medicine-like Large marketing budgets No true up function Moving towards healthier product lines Product choices can be overwhelming Lower calories Some have high sugar content Natural flavors Not directly marketed to younger generation (target 18-35 year olds) $0.60 per 8 oz. serving FunctionalFoods Alternative sources of Vitamin D & Calcium Some products are dai ry ( lactose Contained in mainstream food items Usually breakfast specific Some are portable Some are not portable Brand recognition Perishable Cost per serving varies Aqua-D from the FBG, Inc Designed as a great tasting, low calorie direct reserve for milk No product history Vitamin D and Calcium containing alternative to more popular enhanced Major competition from Coke and Pepsi Products waters e.g. Vitaminwater Limited marketing budget Smaller bottles w/ lower price point (

Monday, January 28, 2019

Outline the Current Legislation and Organisational Requirements

Outline the current legislation and organisational requirements that governs(a) describe, recording and confidentiality(b) health and precaution(c) lay on the line oversight(d)recording/ insurance coverage compliments and complaints(e) dealing with suspicions of disclosure of danger, harm and abuse. (ref. HSC22 q4. HSC21 q 4,5. Reporting, recording and confidentiality The Data shield symbolize 1998 relates to reading held about an individual. This includes medical records or social go files anything which is personal data (facts and opinions about an individual).All information, however it is stored, is subject to the rules laid down(a) in the Act. Anyone processing personal data must comply with the octonary principles of effectual practice. The Data must be 1. Fairly and lawfully touch on 2. Used for limited purposes 3. Not excessive but adequate and pertinent 4. Not kept for longer than necessary 5. Accurate 6. Kept make prisoner 7. processed taking into account the individuals rights 8. Not transferred to an other(a) country that spatenot bind the confidentiality of the information.Individuals are entitled to go for information about themselves, but they hatfulnot see any part of their record which relates to just aboutone else. Individuals are entitled to be told if any personal information is held about them. Health and safety The HSE (Health and precaution Executive) is the UK government body responsible for enforcing health and safety at melt legislation. The HSE also plays a major role in producing advice on health and safety issues, and guidance on relevant legislation. The role of enforcement is split amidst HSE and local authorities depending on the business sector.In addition, HSE conducts research into the effectiveness of regulations and other health and safety issues, consults with employers and employees representatives, and advises legislators and government on health and safety. Health and condom at Work Act 1974 Ofte n referred to as HASAW or HSW, this Act of Parliament is the main piece of UK health and safety legislation. It places a work on all employers to ensure, so far as is reasonably practicable, the health, safety and welfare at work of all their employees. pretend circumspection This Risk prudence Standard is the result of work by a team worn from the major risk management organisations in the UK The Institute of Risk Management (IRM),The Association of Insurance and Risk Managers (AIRMIC) and ALARM The National Forum for Risk Management in the Public Sector. In decision make, theres usually some degree of uncertainty, which inevitably leads to risk. By evaluating the risk involved with various options, you can determine whether the risk is manageable. Risk analysis helps you look at risks objectively.It uses a structured approach for assessing threats, and for evaluating the probability of even offts occurring and what they might cost to manage. An organized and taxonomical d ecision-making process usually leads to better decisions. Without a well-defined process, you risk making decisions that are based on insufficient information and analysis. Many variables locomote the final impact of your decision. However, if you establish strong foundations for decision making, generate good alternatives, evaluate these alternatives rigorously, and then check your decision-making process, you will improve the quality of your decisions.Recording/ enshrouding compliments and complaints My aim is to listen to and act on the views and concerns of Individuals and to encourage backchat and action on issues raised before they develop into problems and formal complaints. My management welcome comments and suggestions from Individuals and their representatives, friends and relatives. Positive comments help to build on successes, but we can also learn from comments which are critical. It is best to look into all comments or complaints as quickly as possible and to provid e a sufficient response.Dealing with suspicions of disclosure of danger, harm and abuse Information about abuse I suspect, or situations I am working with which are high risk, must be recorded after being reported to my supervisory program. My supervisor will be responsible for passing on the information, if necessary. Sometimes my information may need to be included in an individuals plan of care or personal records, particularly if I chip in observe a change in the way he or she is cared for, or if his/her behaviour could be an early warning that the care team need to be especially observant.My workplace may have a special report form for recording causes for concern. If not, i should write my report, making sure I include the following What happened to make me concerned Who I am concerned about Whether this links to anything I have noticed previously What needs to happen next I should discuss my report and my concerns with my supervisor and colleagues. I must report anything unusual that I notice, even if I think it is too small to be important. It is the small lucubrate which make the whole picture. Teamwork and good communication are vitally important.

Tuesday, January 22, 2019

Compare how two television programmes you have studied offer comic representation of gender

In this es tell I call up to use twain sitcoms to answer the question. Gender representation is a study part of many sitcoms and I will be looking into why this is, and how they are represented whimsically. I will be using an result of Absolutely Fabulous and an episode of Keeping Up Appearances to provide me with ex international ampereles to stay my ideas and opinions.* Absolutely Fabulous- Eddie- derisory featuresOver cloaked, flamboyant & eccentric behaviorNo sense of moral or political correctness (buying swap from African villages)Physical behaviour- poor co-ordination of arms and hands- looks comical- lots of movement. (Example- when arrives late in & faces questioning from Saffy)Voice-sounds younger than she is & talks want she is younger- comical because trying to hide from her real ageLanguage- talks like a teenager, talks to daughter like she is her mum (role puff) similarly degrading to daughter, audible and immature behaviour.Not stereo common mum- quite the opposite, stereotypical teenager. (mood swings & behaviour, dress etc)Main interest is men- questions Saffy virtually when she will finally protrude a boyfriend.Generally close to of her features are exaggerated to increase comical value.Saffy- comical featuresVery boring/ sensible dress sense, dull colours & appearance- even though a teenager.Sensible & boring- role reversal with her mum- example- when telling mum off about returning home late. dust language- reserved, sensible, quiet and controlled.Tries to make deals & compromise with her mum- role reversal again. Also with Patsy- T.V show.Well spoken, doesnt use slang, swear or shout.Stereotypical mum, portrayed by a daughter 9role reversal with her mum)Relies heavily on Saffy.Generally most of her features are exaggerated to increase comical value.Patsy- Comical FeaturesShows how women can get wherever they want- slept with her Boss to get a better job.Pretends to be professional.Dresses like shes on a catwalk- completely inappropriate & ridiculous. Uses too some(prenominal) make up & has an overdone hairstyle.Addicted to cigarettes and alcohol.Tries to use and counterfeit Saffy- uses sob story to make her appear on T.V show.Appears to be genuinely shallow with non more of a life & few friends- when she is desperate to go to lunch with Eddie, as has no one else to go with.Generally most of her features are exaggerated to increase comical value. opposite notes Patsy and Eddie- more than best friends, rely on & take each other.Magazine editors- all similar to Patsy. Some appear actually aristocratic. Main editor- genuinely professional, smartly dressed, busy, taking what some would perceive as a male role.Patsy and Eddie try to get as much free stuff as they can from the building- demonstrates that although they be stand like the others, they pharisaism afford to live the lifestyle or dress the same.T.V show- Presenter is typical morning T.V presenter- dress, behaviour and style. Very awkward situation & jester doesnt know what to do or say, and fails to appreciate the situation- national television.Keeping Up Appearances hyacinth- Self obsessed, eccentric & extremist. Overpowering and controlling. She is embarrassed of her family except for her ample sister. Very Snobbish. Tries to show off to visitors and family/ friends. Obsessed with material goods & value as well as appearances. Centre of attention. Speaks freely & says what she thinks about others, unaware of others feelings.Richard- Does as he is told, also finds Hyacinth dominating and overpowering. Puts her out front his job although it should be the other way round, he finds it difficult to say no to her. Highly sarcastic.Elizabeth- She does not like Hyacinth and is very scatterbrained around her- does not want to do or say the slander thing. Discusses Hyacinth with her Husband- make jokes and dislike her, particularly Emmet.Daisy- Poor appearance, obviously no money. Tries to do & say the right thing for Hyacinth, like Elizabeth, very nervous around her.Daisys husband- Very poor appearance, unaware or not bothered. Dislikes Hyacinth. However is not that uncomfortable around her- tries to take biscuits from tin. Again, as with Richard, modify & sarcastic humour.Other Notes more than sexual practice issues- family & hearty as well. Hyacinth is centre of attention for all wrong reasons. Hyacinth and Richard have different values in life (far more material) to Daisy and her husband.Conclusion.I conclude that representation of gender is a major part of these two sitcoms. In absolutely fabulous, gender representation is used to make comical situations of women, but underneath, there is a moral and it is saying this is how women are and have ended up but that not all end up this way. It is showing the viewer how women can be, although this is a highly exaggerated situation, Im received many can relate to, or know somebody who relat es to at least one of the characters in the show. It focus more on gender representation between family and close friends.However, Keeping Up Appearances focuses more on the gender representation and its comical values between relatives and neighbours from different loving classes. Again, as with Ab Fab, it mostly features women and the comical features between them, and men bring a smaller role.

Credentialing System Implementation Essay

The previous two parts of this three-part assignment, the bodys analysis and application architecture and touch design aspect of the credentialing softw ar insure at TPI Health Systems (TPI) was explored. This final paper will explore the implementation stage of the systems victimization emotional narrate cycle (SDLC) as it related to the credentialing project at TPI. There atomic number 18 six major meters to the implementation var. of the SDLC (1) coding, (2) testing, (3) installation, (4) documentation, (5) training and (6) support.The text actually details five steps and breaks- turn out the last step, support, into its own var. (Satzinger, Jackson, & Burd, 2004, p. 626). The first phase, coding, is d atomic number 53 in any of three development styles (1) input, process, output signal, (2) top-down, (3) bottom up. The input, process, output (IPO) rule is defined by first doing the activities that direct external input followed by elements that process the input and reason out by programs that produce output (Zachman, 1987, p. 279). The IPO is effective in developing exploiter porthole first and simplifies testing.It does have a disadvantage of late output modules (Satzinger et al. p. 629). The top-down and bottom up methods produce the needed top or bottom modules, respectively. Top-down coding has the advantage of having a working recital of the program. Poor utilization of programming force out in the beginning of the project is disadvantage of the top-down development method. The bottom-up method puts programming personnel to work immediate, utilizing resources effectively. Unfortunately, this method to a fault requires additional programming to test the modules, as well as an overall delay of testing by waiting for the top modules to be developed.The credentialing project at TPI characterd a languid IPO method of coding. The major attention was placed on converting the selective in tuneation in the existing Visual Fox format t o Microsoft SQL 2000 compatible data. The company, SyMed, do no provision for any user interface changes. The process of how a credentialing application flowed done the TPI credentialing process was observed in the analysis phase of the project and the project team had wanted about user interface changes to suit TPI processes.These changes did non fit into the SyMed project plan, so the TPI process was changed to accommodate the pre-written user interface of the SyMed system. Testing is the contiguous phase of the implementation phase. A comprehensive testing program includes a stepwise process first with unit testing, followed by testing of group components called integration testing and concluded with entire systems test (Satzinger et al. , 2004, p. 640). Individual units or modules ar tested anterior to integration with more advanced modules, using driver modules. Once a set of modules are put in concert, integration testing washstand tamp place.These test include chec king for interface compatibility, run-time exceptions, parameter values and unexpected state interactions (Satzinger et al. , p. 644-645). Jeff Theobald suggests that an effort should be do to concentrate not on unless errors in a single application or module, but as well the system as a whole and between systems (Theobald, 2007). After these tests are completed, the project goes on to system testing. System testing often involves passing(a) build and low-down tests, where the system is set to run and is observed for smoke or errors (McConnell, 1996). The TPI credentialing system was tested in this manner.The project made it through the first two testing phases (unit and integration), but never made it out of systems testing. It smoked and never stopped due to a basic softness of the data store to handle the TPI method of placing octuple doctors in double entities. The SyMed development team called in the architect of the system and a step foul to the analysis phase was mad e. Their entire development team, along with the architect, made a trip from Nashville to Louisville to redo the initial analysis. The team went back to Nashville with the new data and called back to say they could not do the project.The end of the project consumed uncounted person-hours, 7 months on the calendar and some $25,000 dollars. The next part of the implementation phase is installation. This phase is accomplished by several methods. The first is direct installation. This is where the new system is installed and implemented and the mature system is turned off. This is a simple but risky focusing for a new system to be deployed. The next possible method of installation is parallel. This method is demonstrated by keeping both systems button for an extended amount of time.This is a low risk but risque cost implementation scenario. Phased installation is the last method and is characterized by multiple possible pathways to final installation. Phased installation is also l ow risk, but keep become quite complex due to the multiple pathways (Satzinger et al. , 2004). The TPI credentialing system, had it made it to this phase, was to be a parallel installation. Documentation is the next phase of implementation and unremarkably consists of user documentation and systems documentation. User documentation is descriptions to users on how to work together with the system.It is typically how to startup and shutdown the system, the keystrokes requirement to do specific tasks, functions necessary to perform a specific procedure and troubleshooting tips (Satzinger et al. , 2004). System documentation usually consists of information necessary to maintain and re-implement the system in the event of a disaster. System documentation includes maintenance and upgrade procedures, analysis methods and in some cases, the source code and testing data (Satzinger et al. ). The TPI credentialing program had available pre-printed manuals of SyMeds existing user interface and command sequences.The SyMed systems documentation was never provided. The next phase of implementation is training. Training can consist of formalized classes or presentations self paced learning or group training. This training should be active and emphasize actual applications that the system was created to perform. Timing of training is important. Training can be performed too early in the implementation progress, leading to needless training that may need to be un-learned. Training is often seen as a luxury by some companies and is sometime omitted. This can be a costly mistake (Satzinger et al. , 2004).The TPI credentialing system was scheduled to have two days of formalized onsite training. The final phase of the implementation phase is support. As mention earlier, this phase s sometimes broken-out as its own stage. It is also often rolled into the training phase. Support is usually considered some form of help desk for most parcel development, though some companies off er however online documentation and troubleshooting. For this premise to work, the documentation needs to be robust and thorough. The TPI credentialing system never got to this phases and was unable to utilize either system.The failure of the TPI credentialing system software project had many contributors. Poor analysis and implementation of the SDLC was paramount, as well as budgetary issues. To sum it up, the failure was mostly due to TPI not knowing exactly what they wanted and needing more abilities than they had resources for, coupled with SyMeds unfitness to recognize their limitations. The failure outlined above could have been mitigated by the knowledge and utilization of the capability maturity module (CMM). The CMM is a ground substance that defines an organizations maturity of software processes Anderson, 2001).CMM is a process identification whose goal is to use defined and repeatable processes in software development. TPI would have scored a one and SyMed may have sco red a two. come across 1 illustrates the five modules of the CMM. Figure 1. Capability maturity module. This tool can be utilized by both software clients and vendors to identify potential success in a given software project. Additionally, IBM has developed the Rational Unified Process (RUP) for the object-oriented access of software development. RUP is designed to make designed and repeatable processes easier. There are individuals who disagree with contention of repeatability for both CMM and RUP, claiming that like movies, software development success is not always repeatable.

Monday, January 21, 2019

Alumni Portal

ABSTRACT This digest entails developing a sack up establish application for Dau Alumni entry for two of the faculties that is Faculty of Information Technology and the C atomic number 18ers part which both ar facing a problem on how to foreclose in t on the wholey with their graduate student. As for solving this problem, inlet for alumni submit to build as the accusatory is to force a organisation of a pose person entity, allowing alumni members and non-members to communicate in realisticly.This introduction is Internet web-based arrangements that lie in of synergistic web rogue which is accessible exchanging education amidst accustomr allwhere salutary-nigh the globe and web occupy bulge with expose any measure constraint. In addition, make doment is getting updated alumni record and resources by administrators could also be d iodin via internet. This access integrates s everal software packages and programming languages suit adequate to(p) for the org anic ontogeny action. It is hope this portal would greatly eudaemonia to all hoi polloi who consume with it. T adapted of Contents 1.Chapter I. 4 1. 0 Introduction4 1. 1 Background Information4 1. 2 Problem mastery.. 4 1. 3 Rationale (Justification)5 1. 4 Proposed form5 1. 5 brass Objectives6 1. 6 Scope of the System6 1. 7 Limitations6 1. 8 Beneficiaries6 1. Theoretical Framework7 2. Chapter 2 books brush up8 2. 1 Introduction8 2. 2 Global Literature Review8 2. 3 regional Literature Review8 2. 4 Local Literature Review8 2. 5 Summary9 3. Chapter 3 Research Methods10 3. 1 Introduction10 3. 2 vicinity of the Project10 . 3 Population10 3. 4 Research Techniques10 3. 4. 1 Sampling Method10 3. 4. 2 Interviews11 3. 4. 3 Literature Study.. 11 3. 4. 4 Observation11 3. 5 The political program. 11 3. 5. 1 MySQL11 3. 5. 2 PHP.. 11 3. 5. 3 hypertext mark-up language. 12 3. 5. CASE Tools12 4. Chapter 4 System Analysis13 4. 1 Introduction13 4. 1. 1 Technical feasibleness13 4. 1. 2 Econ omic Feasibility13 4. 1. 3 Operational Feasibility.. 13 4. 1. 4 Schedule Feasibility. 14 4. 2 executing Plan14 5. Chapter 5 System Design15 5. 1 Use Case plot15 . 2 Flow chart19 5. 3 Data Flow Diagrams.. 21 6. Chapter 6 cryptography and Testing.. 23 i) Homepage23 ii) Registering of Alumni. 25 iii) Login29 iv) Forum scalawag30 Conclusion31 References32 ? CHAPTER 1 1. 0 INTRODUCTIONTo twenty-four hour period, computers swallow increasingly become part of our lives at work, at home, and even when travelling. The maturement of Internet has brought about revolution to human daily lives. Internet is not unless a big part in research and facts of life these days, only if also plays an important role in the communion engine room. With the Internet, single-valued function is to leave alone easier communication and transfer of reading among the great unwashed well-nigh the world. Nowadays, government, private, university, and entry mostly admit a web page as a primary source of information for people of all ages to access on it. . 1 BACK GROUND INFORMATION Dau University (ANU) is a member of the intercontinental family of Nazarene institutions affiliated with the Church of the Nazarene founded on the same principles the learning of students in a warm spiritual surround. ANU offers a well-rounded, holistic instruction to dish out members establish themselves in three important areas as its precept Character Explore your faith for living. Competence Achieve your goals for your career. lodge beat your place in the world. It is the first Nazarene University established outside of the coupled States.It has been an affiliate of the Council for Christian Colleges &038 Universities since February 2002. It was established in the year 1994l come ind on the Maasai plains across Nairobi National Park, from the city of Nairobi. 1. 2 PROBLEM parameter Each year, hundreds of students graduate from this university. The honey oil problem faced by suscep tibility is how to keep in touch with their graduate students beca apply there is no governance that has been develop to act as a middle person for communication among the faculty and the alumni member.Thus, developing an alumni portal for this faculty forget solve the problem. The spring is that a web portal is a central smear which anyone gage view information and ser wrong-doings towards the community. Virtual communities allow people with common interest to meet, communicate and share desires and information through an online network much(prenominal) as the World Wide weathervane. Through these activities, participants develop bonds with the members of the community. The main whim of this project is to provide a visual communication platform among the alumni and non-alumni (ANU community). 1. 3RATIONALE (JUSTIFICATION) The topical situation faced in careers office in track ANU alumni install that the work flow is not under treatn efficiently, there is in any poss ibility much time and resources wastage, for example most of the time, head of careers department has to physically go out and try to find ANU alumni out there in order to contact them of which its a waste of time considering having an alumni portal where the alumni themselves signup to the portal providing their contacts and work position wherever they are regardless of the infinite or their geographical location.In hurt of, wastage of resources, online system is losing a hardening both financially and opportunity wise, since some of well placed alumni thunder mugnot be tracked or contacted to help in donation or body forth in improvement of infrastructure within the university or in any other difficult situation that the university might be facing and bring external contain. 1. 4 PROPOSED SYSTEM This project was foc victimisation on web-based application, which as a vernal forms of inter bustling media amid the ANU alumni members and non-alumni members (ANU community).I t comprises a collection of information pages, containing both textual and graphic elements and connected with hyperlinks. By develop interactive sites which contain web pages that allow in exchanging information surrounded by the Web site and substance ab make use ofr. Additionally, storing updated record of alumni member also been provided. The scope of user direct for this project is the alumni and non-alumni that consist between the ANU presidentship and student of ANU itself In addition, this portal also open to general public who interested to browse around on certain information provided.It is more than than of a loving net on the job(p) website further one that concentrates or includes only the ANU alumni and ANU community. The system admin allow for be adequate to(p) to start a forum topic of which the registered members volition be able to post their comments in the forum. Also the admin allow for be able to cut un lossed profiles and any kid of unwanted posted hearty by the members. Admin is also in control of creating student and lectures profile. The system also has the energy of members sending personal messages to one another e. g. alumni to alumni, alumni to admin, students to alumni and vice versa.The alumni are necessitate to sign up or register by inputting Username, Password, Name, Graduation year, computer course of study undertaken, Admission No, Phone No, Email reference, character, Current work and current production line status. Through this, they are able to interact with their former classmates and keep in touch after graduating from the prestigious university. This system forget also instigate current students to perform exceptionally so as to be include in the bracket of successful alumni. The careers office and administration ordain wherefore have easy access to Alumni contacts and their whereabouts. . 5 SYSTEM OBJECTIVES The main objective of developing this project is to create a system of a middle person entity, allowing alumni members and non-members to communicate virtually. Developing the portal gives a lot of benefits to alumni members, authorized faculty, students, lecturers and also general public. The benefit to i. Alumni member Facilitate communication between alumni member and non-member. A communication platform for alumni could accompaniment both the information flow among faculty and alumni and among non-alumni.Existing platforms for supporting alumni interaction mainly provide address lists and news for alumni. ii. Administration Faculty volunteer an easy way for tracking the alumni. Therefore, the faculty can get feedback from their graduate students. Furthermore, it improves contact with the alumni so that having takeed selective informationbase of alumni record. iii. Students Enable alumni share positive career and life experiences with other student. also that, the alumni can mentor and advise the students. For example, alumni in certain career matter can o ffer guidance to students who are pursuing the same dramatic art of work. v. Lecturers The lecturer is able to telephone exchange information with the alumni member. Therefore, the lecturer may accredit whether they need to exchange, modify or maintain the contents of the courses. So that they can always deliver the right information for their student to fulfil the environment need from time to time. V. General Publics Allow in browsing around to get information or to find old or new friends among the alumni member where the purpose of it is to allow them to get the addresses of the alumni members. 1. 6 SCOPE OF THE SYSTEM.The proposed system entrust help automate the university operations of getting in touch with the alumni and alumni getting in touch with logger alumni. The system then i) Provide professional networking through the interaction of all faculty graduates. ii) Facilitate communion of information with the alumni. iii) Able to inform faculty happenings and events by inviting alumni to remain active in the Alumni Association and remove in faculty activities. iv) Provide updated records of addresses, employment, and other personal information about alumni. ) Provide stable communication between alumni and non-alumni (ANU community). vi) Help in the building of the Dau fraternity in the expansion of this community. vii) posit alumni as examples/role model/mentors to ongoing students. 1. 7 LIMITATIONS. The proposed system requires increase acquaintance in IT such as network management, database management, html, user support and security, it also require more experiences in this kind of system development. Requires funds for research e. g. internet connection fee etc. 1. 8 BENEFICIARIES Those to benefit most from the new system include ) The careers office the department will be able to get into contact with the alumni since most of their contacts will be in their profile in alumni portal. b) The university administration as a whole, adminis tration will get to know how its own products are doing/performing in the outside world. c) Alumni themselves will benefit by keeping their bond strong and their friendship wont be lost and also maintain close relationship with the university. d) Current students will be able to site role models from the alumni portal and work to their goals and objectives in life. 1. 9 THEORETICAL form WORKThe following theories would help deal/come up with the ANU Alumni Portal i. e. considering the evolution of the World Wide Web from Web 1. 0 to Web 2. 0 is creating subtle but profound changes in the ways people locate and access information, communicate with, and learn from to each one other. The changes in technologies are control changes in human behaviour, interactions, and knowledge acquisition. The paradigms for learning have already evolved beyond traditional classroom models to synchronous and asynchronous, interactive, and collaborative learning, which is further extended by Web 2. hammers and social networking approaches. However, recent developments in Web 2. 0 technologies are far outpacing the development of theoretical frameworks for their utilization in education and training. correspond to Kamel Boulos and Wheeler (2007), the second incarnation of the Web (Web 2. 0) has been called the Social Web because, in contrast to Web 1. 0, its content can be more slowly generated and published by users, and the collective intelligence of users encourages more democratic use (p. 2).This Alumni Portal takes a form of social networking of which its the practice of expanding knowledge by making connections with individuals of similar interests. In Web 2. 0 environments social networking is linked to technological services and software that make it possible for people to communicate with others from anywhere, at any time. Social networking refers to sites such as Facebook, MySpace, and Linkedin, where users set up a profile, create formal connections to people the y know, communicate, and share preferences and interest.To make an ideal knowledge structure (social structure that can assume responsibleness for developing and sharing knowledge) three elements are put unitedly that is Domain, Community and Practice of which this system integrates to construct the Alumni Portal. The purpose of this system is to develop a theoretical framework to understand learning among groups of individuals that utilize social networking applications among the alumni and the university to working towards a common goal i. e. how groups of individuals can occasionally and under special(prenominal) circumstances cast their thinking into a coherent whole.CHAPTER II publications REVIEW 2. 1 INTRODUCTION This chapter discusses dilate descriptions of the alumni portal and similar approaches of virtual communication, comprehensive, and critical discussion of each and other material related to the topic. 2. 2 Global literature review The University of Malaysia cogn ise as USM has an alumni portal where the uniform resource locator is http//www. usm. my/alumni/organisasi_main. asp. In developing the portal it uses Active Server Page (ASP) as emcee side scripting language together with mark-up language which is HTML. Java leger language uses in order display certain images and other things.The way of designing the portal is not so interactive, because it does not provide exchange information service between the web site and the user. The portal is more to quiet type of web site. Alumni web site for Kolej Agama Sultan Zainal Abidin is known as Laman Web Ex KUSZA (http//www. geocities. com/ex_kuzsa) from the website address, the web has been developing by using templates in Yahoo Geocities services. It offers very limited services and more to static web site. This web site does not have database because it does not involve storing data. 2. 3 Regional literature reviewAfter regional research on alumni portal, I came across the University Of Joha nnesburg Alumni Portal of which the developing of the portal uses Active Sever (ASP) as server side scripting language together with HTML. The portal design in home page consist of mixed use of fonts of which down cast the rating of the portal but for its functioning and its categories content is well fitted but it does not involve storing of data creation one of its major lack. 2. 4 Local literature review After local research in several universities, no university within the country has an alumni portal.For example the University of Nairobi contains only description of what its alumni are but no interface or a way of interaction between its alumni and the university or interaction between its fellow alumni. (http//www. uonbi. ac. ke/node/132). It does not include data base what so ever 2. 5 Summary This chapter identified several literature reviews that related to alumni portal. much of the literatures on portal are reporting descriptive personal experiences, not theoretical an alyses. With developing portal that act as a one stop destination where all part of users use starting point to other resources on internet or intranet.Typically, this portal will provide many services such as search engine or directory, news, maps, email, forums and private messaging for university and the graduates students who will use portal to gather together all the information to share with other, furthermore, is keep in touch with each other. ? CHAPTERIII RESEARCH METHODOLOGY 3. 1 INTRODUCTION This chapter is explanation on rule and litigate utilise for research and system requirements needed for the development of the alumni portal for ANU, all of the information used for roll up research methodology. 3. 2 Locality of the ProjectThe project is being carried out at ANU, in CIS department percentage of system development desk. The proposed system will be web-based hence set(p)/posted on the internet in ANU website with its. it will the students to understand material giv en, review sessions, and participate in conversations with lecturers. 3. 3 Population The population being focused on this system includes ANU students, its alumni and the lecturer basically the ANU community of nigh 5,000 people inclusive of all the campuses. Students who can be divided into day scholars and boarders, lecturers who are divided into part time and full time lecturers. . 4 Research techniques 3. 4. 1 Sampling method Sampling is, the process of collecting examples of the actual documents (Systems Analysis and Design, 2010). The sampling method that will be used in this project system is the systematic random sampling of students which will involve selecting every tenth student for review so as to collect feedback concerning the proposed system in order to know what should be include and what should be discarded from the system. Undertaking sampling will also help to improve the effectiveness of information that will be obtained to be more accurate. . 4. 2 Interviews T his will involve interviewing ANU community as whole i. e. current students, lecturers, ANU alumni and individuals that have knowledge on alumni, in order to evaluate their need and preferences so that one can plan the best methods to use in the undertaking of his or her project in order to suit their needs. 3. 4. 3 Literature study This will involve consulting germane(predicate) ANU publications such as books, magazines and web pages that contain information of topic of the project inquiry and the relevant solution to the problem that one or that I will want to tackle.This will enable me to make a project that will reassure that all user needs are meet according to their preferences. 3. 4. 4 Observation This is a fact-finding technique that involves systematically selecting of ANU environment, watching and transcription behavior and characteristics of objects or phenomena found within ANU community, seeing the system in action will give an additional perspective and a check und erstanding on the systems procedure. This will allow the verifying of statements that will be made from interviews and determine whether the systems procedures will really operate as described.Observation will provide the knowledge needed to test or install future tense changes in the proposed system. 3. 5 The Platform The System will be create using a web application and databases. The content in our web application will be connected to a database. So the idea here is getting data into a database so that we can use it in our web application. The focus here will be bridging between the table schemas of a database and running them on web application and vice versa. 3. 5. 1 MySQL This provides a platform to develop the proposed systems database.MySQL is ideal for record repositing from different platforms. It also has the capability of handling large system records. 3. 5. 2 PHP According to Mike McGrath (2002), he defines that PHP can be used to create interactive dynamic websites and is rapidly gaining in popularity because it is flexible, cross platform technology that provides amazingly big businessmanful features. PHP can be used to dynamically generate the HTML canon for a web page. PHP is embedded into the HTML code with the use of special tags, called Deli meters. By using the deli meters, many sections of PHP code are able to add to an HTML document.Embedding PHP code in HTML code makes it possible to enhance existing web pages on a web site. (Paul Whitehead, Joel Desamero, 2000). 3. 5. 3 HTML In computing, Hypertext Markup Language (HTML) is a Markup Language designed for the creation of web pages and other information viewable in a browser. The focus of HTML is on the presentation of information-paragraphs, fonts, italics, tables e. t. c. 3. 5. 4 CASE Tools These are computer aided software engineering tools that enables the developers to guard the system in form of flow charts, graphs and data flow diagrams CHAPTER IV SYSTEM ANALYSIS 4. 1 INTROD UCTION This is a step-bystep process for developing high-quality information systems (Systems Analysis and Design, 2010). In order to carry out system analysis researchers had to perform system analysis which basically is carrying out feasibility studies of the school. These include 4. 1. 1 Technical Feasibility This includes an investigation of the adept resources of the ANU. The university IT department is not well established and it lacks enough man power and resources to support the system.The department has only nine computers, of which all of them are out-of-date thus the need to purchase more IT resources that will be able to withstand the proposed system. 4. 1. 2 Economic Feasibility This investigates the projected benefits of the proposed system outweighing the estimated embody usually considering the total cost of ownership. The proposed automated department system process will require some system maintenance cost. Budget ITEMSPRICE System analyst/IT consultantsKsh. 20, 000 p. m 4 Computers Pentium ivKsh. 120,000 Adobe Flash media streaming server 4. 5Ksh. 30,400 Network interface cardsKsh. 9,000Adobe CS 5packageKsh. 60,000 TotalKsh. 239,400 4. 1. 3 Operational Feasibility This substance that the proposed system will be used effectively after it has been developed. With the support of the IT department and the alumni who are key players in the proposed system will be used effectively. With the alumni portal the image of ANU will improve in terms of being a head in technology field and efficiency. 4. 1. 4 Schedule Feasibility This information system project is to be accurate in 8weeks time. In this time we will be able to have completed the development of the project and tested it. 4. 2 Implementation PlanThe project is expected to take approximately 12 weeks in total. There are a total of 9 tasks that need to be implemented. The tasks have been assort under each of the project objectives. This is as signaln in the table down the stairs TASKSDU TY System planningThis will involve analyzing, defining and coming up with a time schedule of the project which will be done by the developer. Preliminary InvestigationThis will involve determining if the projects system proposal is worth pursing into analysis phase AnalysisAt this stage a detailed study of the current system in use will be undertaken that will lead to specifications of the new system.This will be done by a system analyst. DesignDesign will be based on the user requirements and the detailed analysis of the new system tools such as flowcharts, use case diagrams will be used. ImplementationThis is the conversion of theory to practical analysis. During this stage, all the programs of the system will be loaded on to the users computer also the testing of the system will be undertaken. this will be done by a technician consultant Testing and InstallationThe system will be tested and errors and bugs will be checked in order to create a perfect system.The change of the sys tem will be direct change over-where the current system will be immediately replaced by the new system. PresentationThis is the last stage whereby I will present my project by explaining the processes, development, and approach about my project in detail. CHAPTER V 5. 1 SYSTEM DESIGN 5. 1 Use case diagram According to Shelly Rosenblatt a use case diagram visually represents the interaction between users and an information system. The different actors in the proposed system will be the Administrator, Alumni, Students and Lecturer. ? 5. 2 Flow ChartA flow chart will show the flow of the data from the time the Alumni, Student, Lecturer and Administrator will be registering to the system to the time they finalize their process. 5. 3 Flow Diagrams (DFDs) They will be used in the proposed system to show the flow of the data placid from the time a alumni will register into the system and processed. The main entities will be the alumni, the student and the administrator. There will also be processes and data stores which will process and store data respectively. a) Level 0 Diagram ? a) Level1 diagram CHAPTER VI 6. 1 CODING AND TESTING i) Home page Welcome to Dau University Alumni PortalWelcome to Dau University Alumni Portal ANU Alumni Home Register Login User Info slew Profile Search Alumni Directory Logout Contact Us Forum Welcome to Dau University Alumni Portal Membership to this Portal is only available to ANU alumni. In order to take advantage of all that your community has to offer, you must register to establish a User ID and password. You only need to register for the community once. When you return on future visits, Enter your User ID and password when prompted. Features Find your Friends and mannikiner instill mates on ANU Alumni Portal Join the ANU Alumni nbspSearch the Alumni Directory Change your Address Check out the latest issues Alumni Update ii) Registering of Alumni ANU Alumni Sign Up Form Welcome to Dau University Alumni Portal ANU alumn i Home Register Login User Info geld Profile Search Alumni Directory Logout Contact Us Forum ANU Alumni Sign Up Form ( enchant Fill Form Correctly)Username Password Name Year Please Select Year Program Please Select Program school term Department Admission No Phone no Current Postion employment Status Address E mail iii) Login iv) Forum page ? evidence The ANU Alumni Portal can provide significant benefits to alumni relationship management programme and play a key role in terms of,. An online community portal, such as GradNet, should be a dynamic, ever-changing information tool that constantly adapts according to its target audiences information needs.It is and then pivotal that continuous needs assessments of these alumni system is conducted. The ever-changing ways of how people conduct their lives need to be considered and explored if alumni portal want to come up with innovative ideas and programme that will accommodate and capitalize on these trends. If alumni organizat ions manage to create more value for their customers, the percentage of active participants, as well as the quality of alumni interaction in support of the institution, will improve. ? REFERENCES

Sunday, January 20, 2019

Women Empowerment Through Entrepreneurship

Entrepreneurship is the future of the modern society. They be the driving forces behind Indian economy. Entrepreneurs atomic number 18 people who come pop with an spick-and-span ideas , innovations , do things, which be non gener completelyy done in the ordinary course of a business. Empowerment of women entrepreneur is an new mantra for victimization of economy. The present paper focuses mainly women entrepreneur ,they yet represent a minority of on the whole told entrepreneurs. It is observed that women entrepreneur networks ar major sources of association about womens entrepreneurship and they ar increasingly recognized as a valuable tool for its development and promotion.Of the 1. 3 billion people who spirited in absolute poverty around the globe, 70 sh atomic number 18 be women work two-thirds of the worlds working hours, Women earn only 10 percent of the worlds income. Women own less than 1 percent of the worlds property. An effort has been made in this paper is to account empowerment of womens entrepreneurship in Indian economy Introduction to Entrepreneurship Entrepreneurship was previously considered to be unknown quality of an individual and hence it was believed that entrepreneurs are born and not made.But recent studies mother proved that entrepreneurial activities can be planned and developed in an individual done creation of opportunities, increase Facilities, Allowing Incentives, Developing Competence and group sensitiveness in an individual for all those factors Entrepreneurship is a social phenomenon and it is not inherent within a person, quite a it exists in the interaction between people. It reflects a ray of hope for the idle to earn a living and maintain a dignified heart and also for the economic development of the country. our vision of emerging as a superpower by 2020 depart pivot momentously on Entrepreneurial shoulders. qual opportunity between men and women from the perspective of entrepreneurship is still not a reality.An Entrepreneur is the differentiate cipher in the process of economic growth. He/She is an economic person who tries to maximize his profits by innovation and thusly aggressively contri excepting towards economic development. He is an organizer and speculator who is doing new things or doing things that are already being done in a new means. Women Entrepreneurship Women entrepreneurs play an important intention in the entrepreneurial economy, both in their ability to bring to pass jobs for themselves and to create jobs for others.In Europe (both European Union countries and other European countries), estimates indicate that in that respect exist to a greater extent than 10 zillion self-employed women. In the United States 6. 4 million self-employed women fork up employment for 9. 2 million people and create significant sales. Using the United States ratio between the number of employees and self-employment it may be estimated that employed women in surveyed European countries could employ around 15 million persons. Better qualitative information and quantitative data and statistics are required to profile women entrepreneurs (demographic information, barriers to start-up and growth).This would also assist in promoting awareness of the role of women entrepreneurs in the economy. Entrepreneur is held responsible for scanning the business landscape for unexploited opportunities. The improved way of doing is the innovation that the entrepreneur presents to the market. According to CWBR, on that point are 6. 2 million privately held majority (50% or more) women owned businesses in the U. S. employing 9. 2 million workers and contributing $1. 15 trillion to the economy.Half of all privately Owned business in the U. S. re owned by women, and between 1997 to 2005 women owned business grew at thrice the rate of all businesses. Together, women owned businesses and those owned equally by men and women number 10. 2 million employ more than 18 mi llion workers and generate $2. 32 trillion. According to Women in the economy, a reading conducted by Government of India, in that respect are approximately 10 million homes based Business in India and 55,000 of them generate more than $1 million in revenue distributively year. Self-employment represents one of the most important job opportunities for women especially for women in growing economies.It is also observed that in all countries women still represent a minority of those that start new firms, are self-employed, or are humbled business owner-managers. Technology makes it possible for women to work productively from home and to stick to actively involved in the lives of their children. 27% of women with home based businesses permit children under the age of 18, 25% have children as young as 6 years old and 30% have children less than 6 years old. To a much greater extent than men (56 to 48%), women starts businesses to supplement income and to manage family responsib ilities. Women-owned businesses are no passing fad.They are crucial to a healthy economy. They typically require little or no investment, they can be headquartered in the home, and they give women flexibility in equilibrize their work and family lives. Technology allows the cultivation of clients nationwide and even worldwide and there are lots of resources to help women get started. The greatest advantage of owning a business, According to Ashley Working for yourself makes all the difference because you can do things the way you know are right so that your work speaks your values, beliefs, and ethics at the same snip you are providing a necessary ser valetudinarianism.Indian women are considered as Sakthi, which means source of power. Effectively coordinating the available factors and resources. high-octane execution of decisions imposed on them. Clear vision and ambition on the improvement of family and children. Patience and bearing the sufferings on behalf of others and abil ity to work physically more at any age. Women sector occupies nearly 45% of the Indian population. The literary and educational status of women improved considerably during the past hardly a(prenominal) decades. More and more higher educational and research institutions are transfer knowledge and specialization.At this juncture, effective steps are needed to provide entrepreneurial awareness, orientation and skill development programs to women. According to the experts , there are five levels of the womens empowerment framework, namely- welfare, access, conscientisation, mobilization and control. Welfare means an improvement in socio-economic status, such as improved nutritional status, shelter or income, which is the zippo level of empowerment, where women are the passive recipients of benefits that are given from on high.Access to resources and run stands for the womens empowerment framework, namely- welfare, access, conscientisation, mobilization and control. Conscientisation is defined as the process, by which women collectively weightlift to act to remove one or more of the discriminatory practices that block their access to resources. Here, women form groups to understand the underlying causes of their problems and to identify strategies for action for sexual activity equity. Mobilization is the action level of empowerment by forging associate with the larger womens movement, to learn from the successes of womens similar trategic action elsewhere and to connect with the wider struggle. look into is the level of empowerment when women have taken action so that there is gender equality in decisions making over access to resources, so that women achieve direct control over their access to resources. More precisely, as a muliebrity evolves through the entrepreneurial process she forget smell different obstacles related to the specific stage she is in (opportunity identification, opportunity ontogenesis and resource acquisition for example). Depe nding on the nature of those obstacles, only certain categories of women will enter into business and succeed consequently.In unpolished India, agriculture and ally industrial sectors employ as much as 89. 5% of the measure female labour. In overall farm production, womens average contribution is estimated at 55% to 66% of the total labour. According to a 1991 World intrust report, women accounted for 94% of total employment in dairy production in India. Women constitute 51% of the total employed in forest-based small-scale enterprises. Indias eleventh Five Year Plan (2007-2012) has recognized for the initiatory time that women are not just equal citizens, but are also declare as agents of economic and social growth.Any development strategy will be lop-sided without involving women, who constitute half of the world population. Women entrepreneurship has gained momentum since the early mid-eighties when countries in Asia particularly India and China and elsewhere started li beralizing their economies. The resultant globalization propelled by foreign direct investment, technological innovations, and manufactured exports has brought a wide domain of economic and social opportunities to women entrepreneurs.TiE (The Indus Entrepreneurs), founded in Silicon Valley in 1992 by entrepreneurs and professionals with calms in the Indus region, announced the launch of Indias first womens entrepreneurship platform called TiE Stree Shakti (TSS). is a forum for women entrepreneurs to create trust-based partnerships through active networks. Additionally, the forum founders recognize the immense contribution of women entrepreneurs to self, family and society.A study conducted by Ernst & Young titled Groundbreakers, observes At a time when our global economy is facing its greatest challenge in decades, we have to capitalize on the contributions women can make. Its time to place re-create emphasis on women as a resource to move businesses and economies ahead. A study conducted by TiE revealed that 90% of women at the grass root level need help in Training & study to improve their business skills. 78% of them were keen to re-start their business again but need encouragement and support from family and other manage minded women.A mere 15 per cent of women hold senior management positions in privately-held businesses in India the global average is 24 per cent and Some of the key areas where women want to start a business include garment shops, supply and beauty salons. The biggest challenge that many literate and illiterate women in rural and urban areas faces in entering into small industry as entrepreneurs is out-of-pocket to the lack of knowledge on product, Market and Quality and its to be seen that some committee should be constituted and the recommendations which are placed should be implemented in phases to root out the above problems.Every woman has the potential to be an Entrepreneur and it can be developed through nurturing s kills and ideas. Women in business attain success for their intelligence, efficiency, commitment and Honesty. There is still much poverty, unemployment, illiteracy, and discrimination when it comes to women, but there is a certain member of them that is making a mark in the corporate world, in the media, in literature and for many who are unaware they are making a huge impact in the IT sector.Globalization has provided opportunities for the educated, middle class woman to build her own dreams and excel in fields, which were earlier perceived as complete male domains. Though they are not the majority, Indian women professionals are definitely on the rise and are paving the way for future generations. Indian women are becoming increasingly subgross and successful in the professional and public sphere.Whether it is Barkha Dutt, who has become a idol for several journalists, Arundhati Roy, a Booker Prize Winner and a social activist, or Kiran Mazumdar Shaw, who became the wealthiest I ndian woman after the initial public offering of her company, Biocon , they have all heralded the arrival of Indian women professionals. Women are becoming increasingly visible in the domestic and outside(a) sphere in media, entertainment, business, IT, politics and literature. round one third of employees at Indian software companies today are women. In fact, NASSCOM puts the figure at 38%, which is a higher figure than their western counterparts.Some of the reasons for this attraction to the IT sector include Indias education system. account of women managers and entrepreneurs in the corporate sector. Kiran Mazumdar Shaws Biocon, a biotech firm is worth over $1. 1 billion, with her stake at $449 million. Vidya Mohan Chhabria, chairperson of the $2 billion Jumbo Group, and Naina Lal Kidwai, vice chairperson and managing director of HSBC Securities and Capital markets, are the two Indian women to boast on the list of the 50 most powerful women in international business by Fortun e magazine.There are several others like Sulaijja Firodia Motwani and Mallika Srinivasan who figure prominently in the automotive industry while there are many other women who are successfully managing family run businesses. However, the offspring of India s service sector travel, tourism, hospitality, media, and entertainment as well as business process outsourcing and IT is witnessing an increased role for female employees at the entranceway and middle levels. They will hopefully pave the way for future female professionals.

Does Violence in Cartoons Desensitize Young Children?

Does craze in sketchs Desen mock upize Young Children? A Critical View Donald Duck, Elmer Fud, Wiley Coyote, Tom/Jerry, Fred Flintst single, and Batman are all loveable vignette characters that exist in the vignettes shaverren draw every(prenominal) day. An some other thing these characters view as in common is their general habitual boisterous behaviors. These behaviors devote a subliminal message to small fryren suppressing their moral restraint on basic appall toward to to each matchless one other. Violence in youth has been a rising topic, and stay freshs to amaze with much(prenominal) than studies and research each stratum.Although people may blame legion(predicate) things, I believe the power depicted as humor or the first-rate admirer strength in resumes has a direct relation back to the desensitization of madness in the Ameri potty youth. Research has exposed that lateborn children will imitate aggressive acts they exit on television, and rec reate those acts when compete with their friends. Before age 4, children are unable to distinguish amidst concomitant and fantasy and may view furiousness as an ordinary occurrence. (Berensin) by means of critical analysis I plan to examine the effects of frenzy in cartoons as sanitary as the derivedic perception and the super mavin effect in order to determine if they relate partly or executely too untrained behaviors of young children. Every argument has more(prenominal)(prenominal)(prenominal) than one perception, so I will all overly be examining just about research suggesting that cartoon wildness in occurrence does not hazard developing children. Watch an obsolete Looney Toon, if you have a choice, perceive an episode of Elmer Fud chasing Bugs Bunny.To any viewer you see the humor in it a bunny is jumping all over dodging this slow hunting find, his ineffable aim, and his shotgun that never needs to be reloaded. But the reality is this hunter is fe rociously chasing this bunny literally just trying to kill it. drop the same reality comparison with the Roadrunner cartoons, the coyote is a predator chasing after his dinner and use every possible resource to complete it yea he never catches his prey, but you quarter try and compute the violent episode that would entail if he did.How about all the explosions and incredulous distances the coyote deals with and never seems to die, that doesnt send the make up image. Im not saying they should channelize death but not present it trick give children the idea that these acts wont affect them and that they would also be able to walk away. Violence in cartoons has been around for a lot longer then we think, in fact there is more military group depicted in a cartoon, than in live feat dramas or comedies (Potter and Warren 1998). In a sense, children see more violence during a Saturday morning than a Friday night.Although this is a pretty strong convert argument there is always other perspective. For fashion model, the violence in cartoons yes is more frequent, but it isnt as strong as it is on superlative eon TV. Bam Bam hitting someone on the head with his mallet compared to a short rape scene in Law and order, pretty mammoth difference. Many cartoons show characters dying but the way it is comprehend its considered funny. Prime time television shows murder depicted in a pretty real state with no joke or express emotion afterwards. In 2007, Kremar and Hight embed that preschoolers who watched an action cartoon or super-hero image, as foreign to young children who watched neutral video clips or animated characters, were more credibly to create aggressive story endings(An oppose View). These conclusions brought about the idea that pugnacity may be related to aggressive behavior. How does the outcome television violence unremarkably end in destructive behavior? That brings us to another form of cartoon violence, the super hero effect. By super hero I mean super hero cartoons Batman, Superman, Spiderman, transformers etc.All these cartoons depict violence without the comedic effect but instead with a real intent scenario. Heroes are violent, and, as such, are rewarded for their behavior. They become role models for youth. It is cool to carry an automatic branch and use it to knock off the bad cat-o-nine-tailss. The normal scenario of using violence for a righteous cause may translate in workaday life into a justification for using violence to retaliate against perceived victimizers (Berensin) Everyone sees Batman beating up the Joker and instead of being worried or cin one caserned, theyre cheering.Theyre hoping that the hero will win the fight. Batman is showing how he solves his conflicts with violence rather than reason and debate. The good guys against the villains, and just because its usually the good buy beating up the bad guy, its clam up a form of violence that can be subconsciously affecting them. Kids cou ld be going to school and argue who stepped into line first succeeding(a) thing you know theyre pushing and shoving over it, then throwing punches, imitating their ducky super heroes.In an extreme example a ten year old boy from Everett, Washington died in 2008 imitating a stunt him and their friends saw on a popular cartoon, Naruto. Naruto has this ability to dig himself into sand and breathe through a straw. The children thinking they could execute this like Naruto came to an unexpected and very worrying conclusion. Those children lost a close friend that could have possibly been avoided had they been better on the diversity of animation and reality.This brings us to another problem with super heroes on television, which is the characters, no matter how much damage or violence they receive, continue to remain unharmed and alive. When in reality if any human being being actually received any pain like they are, they plainly would not be alive. Superman surviving a hailstorm of bullets is the best example that comes to mind. Yvette Middleton and Sandra Vanterpool wrote an essay TV Cartoons Do Children Think They Are Real? , regarding whether children can differentiate between what is real and what is fantasy in cartoons, as well as how they respond to them.On page five of their essay they go on to say When our young children watch cartoons with these types of violence, they start to visualize themselves as their favourite(a)(a) cartoon character and decide that if they are that character, they wont be harmed if they get shot of run over by the bad guy Its when the child imitates these characters that they could be seriously scathe or hurt someone else. A parents duty comes into walkover when they sit down with the child and explain what happens scene by scene. Something a child sees on television isnt necessarily bad beholding it once or twice.After those first two a parent could explain what scenes send a bad message. Instead the child watches tim e and time again, each time desensitizing their moral defense, eventually leading to frequent violent behavior. For example every time a child sees a violent act they first see it as bad. As time progresses and they see more and more, the child begins to simply absorb the message as if it were an everyday occurrence. They may come to see violence as a fact of life and, over time, lose their ability to understand the difference between right and wrong. Its at that point that it becomes a problem.Eugene V Beresin, the theatre director of Child and Adolescent Psychiatry at Massachusetts General Hospital, wrote an denomination for the American academy of Child & Adolescent Psychiatry. Today 99% of homes have televisions. In fact, more families have televisions than telephones. Over half of all children have a television set in their bedroomschildren watch or so 28 minute of arcs of television a week, more time than they spend in school. Thats four hours an average day, thats a sixth of their lives. Thats plenty of time for the children to withhold the messages they get from violent cartoons.Children can severalise and recall these events because they laugh afterwards and think of it as a bearable way to respond to someones actions. Televised violence and the inhabitance of televisions in American households have increased steadily over the days. Beresin continues on to say The typical American child will view more than 200,000 acts of violence, including more than 16,000 murders onwards age 18. Television programs display 812 violent acts per hour childrens programming, particularly cartoons, displays up to 20 violent acts hourly. Now hopefully a young child is only watching cartoons and not a police or plague show. But four hours a day with twenty violent acts hourly, thats eighty violent acts scene daily. That can put a monetary value on a developing childs moral psych. With every argument there are two sides. As I mentioned previously there are other perceptions and different cultural views on cartoon violence. I came across an article by Fran Blumberg, Kristen Bierwirth, and Allison Schwartz, titled Does Cartoon Violence Beget Aggressive Behavior in Real spirit?An Opposing View. The ladies explain Despite increased realism in animation over time, most preschoolers still recognize cartoon programs as make-believe, and can differentiate cartoon characters engaged in life-like activities from those engaged in playact activities. Basically what theyre getting at is that children have the ability to put one over that cartoons are not real, know that the violence is only animated, and understand that it is wrong. To fold up anything is wrong people always rely on the science of it.V Mathews was one of the authors who composed the article, Media violence liked to concentration, produce in the Journal of ready reckoner help Tomography. Mathews confirms Neurological evidence of a link between mental picture to violence on television and brain functioning. Speci? cally, non-aggressive children who had been exposed to high levels of media violence showed less activity in the betal cortex, that area of the brain linked to attention and self-control. Non-aggressive children who already had a grip on what was morally right and wrong I would assume were the ones used. So they werent children who were brand new to violence.Also there is a slight hole in the study. It was measured directly after the children watched the violent cartoons, and not over a long end of time, which is what were dealing with. A study taken by Yvette Middleton and Sandra Vanterpool surveyed 23 third stainrs from the Fordham section of the Bronx. We asked them fourteen questions based on the descend of time they spent watching cartoons, the types of cartoons they watch and their opinions on whether cartoons are real or not. (Middleton and Vanterpool) 87% of the students surveyed say they watch cartoons before school, after s chool, and season doing their homework.If that wasnt enough, 86% of the students watch cartoons before bed. With twenty-five to thirty violent acts an hour (Middleton and Vanterpool) that is a lot of negative discipline that child is absorbing. The ladies continue their results 78% of the students express they watch cartoons with a sibling or fiend. 17% of the students give tongue to that they watch cartoons by themselves, but only 4% said that they watch cartoons with a parent (Middleton and Vanterpool) Only four percent of third graders watch cartoons with their parents.Now that is just not high enough. With cartoon violence becoming a rising problem parents need to stop using the television as a babysitter and know what their children are watching. On the subject of the students favorite cartoon, Rugrats was chosen as the top favorite, a quite non-violent Nickelodeon Cartoon. turn was Pokemon, a cartoon involving people using different animals/pets and pitting them against e ach other to settle their differences, definitely violent.The third was Dragon Ball Z, an exceedingly violent anime involving numerous characters always fighting each other for control, also chosen as the most popular action cartoon as well as the top favorite if they were limited to one cartoon a day (Middleton and Vanterpool). When asked about Dragon Ball Z the results told us43% said that they enjoy watching the characters fight, 26% said that they like to see characters shoot other characters and 30% also enjoyed seeing characters being blown up, bloodied, or stabbed (Middleton and Vanterpool).That is discouraging this is a television show that children should not be watching. If these are the thoughts that go through their mind while watching, think about what they think of when they arent watching. When Middleton and Vantepool surveyed the children about the reality of the violence, 56% said that they were real and 43% felt they were not real. That is not a good statistic, over half of the class thought that the characters were real. These are sham people who literally destroy each other and third grade children think they are real. 86% agreed they come back to life to start the action all over again, whereas 13% felt a character remains dead and is never seen again. That is a large amount of children who are uneducated on the subject of death. But from another perspective, they are just children and more than likely cant comprehend death, and they are just going off what they see in the show. Some interest information came up when the children were asked what they think happens to real people die. 47% said the somebody goes to heaven, 47% said the person goes to hell, and 4% said the person goes under the ground and comes back as a flower. (Middleton and Vantepool) So you can see how these are still children and arent mature enough to understand what is really happening in a cartoon. This again just brings up the parenting aspect. In the 2004 Confe rence on interaction and Design and Children, an article was published about preschoolers moral judgments and their distinctions between realistic and cartoon-fantasy transgressions. M. Peters and F. C. Blumberg explained in good accompaniment about a study they conducted using three and four year old children.They examined how the children reacted to pictures of both factual human and animated moral transgressions including hitting, pushing, stealing, and failing to share. (Peters and Blumberg) The children then were asked to indicate the extent to which the transgressions merited punishment and if so, how severe. They also were asked to justify this assessment. We found that preschoolers negatively evaluated all moral transgressions, both realistic and cartoon (Peters and Blumberg). once again the problem arises with the short amount of exposure time.Although since they were three and four years old I would assume that they had been watching cartoons for an already long time. Peters and Blumberg continue to review their findings When perceiving the magnitude of the transgression, children viewed physical harm as more rank than that of psychological harm. Speci? cally, hitting was seen as more harmful to others and as be of greater punishment than failing to share. This meant that children do retain some information pertaining to their morals while theyre progressing as children. They were able to realize what was more ethical and correct.What was really interesting was how the preschoolers judged cartoon infringement as more harmful than the realistic human transgressions. Because cartoons are characterized by exaggerated nervus facialis expressions and body actions, these characteristics may have in? uenced the childrens perceptions of the cartoon transgressions as bad. (Peters and Blumberg) With that information we can think about how much those characteristics actually come into play in the maturing stages of a childs life. The message could be more of a learning experience for them instead of pro violence advice.Children could be using these cartoons as an example for instances in the future. Its short possible that children would use these when faced with a real life issues and fixity the situation without using violence. Writing this paper has been an eye opener for me. At the beginning I was on the side against cartoon violence, agreeing that it does make children more violent in nature. But after all the research I did I am now on the fence with the situation. It can alter the children but also help them to learn what is right and what is wrong.Ultimately the parent comes into the play the most. I wouldnt agree that sitting you child in front of the television is a bad idea, but what programs the children watch should be monitored. Also, using the television as a baby sitter is not a recommended idea. Children love cartoons, I know I still do, and there is no reason they have to stop watching them, but Mom and dad dy should make sure what is happening in these cartoons is put into context for the child. So the child can differentiate and decide for themselves the difference between cartoon animation and reality.Beresin, Eugene V, M. D. The Impact of Media Violence on Children and Adolescents Opportunities for Clinical Interventions. American Academy of Child Adolescent Psychiatry. Web. 11 May 2010. http//www. aacap. org/cs/root/developmentor Blumberg, Fran, Kristen Bierwirth, and Allison Schwartz. Does Cartoon Violence Beget Aggressive Behavior in Real Life? An Opposing View. Early Childhood learning JournalOct. 2008 101+. Education Research Complete. Web. 1 Apr. 2012. Mathews, V. P. , Kronenberger, W. G. , Wang, Y. , Lurito, J. T. , Lowe, M. J. , Dunn, D.W. (2005). Media violence linked to concentration, self-control. Journal of Computer Assisted Tomography, 29, 287292. Middleton, Yvette Vanterpool, Sandra TV Cartoons Do Children Think They Are Real? Reports-Research. Web produce 1999 http//www. eric. ed. gov. ezproxy. lib. uwm. edu/PDFS/ED437207. pdf Peters, K. M. , Blumberg, F. C. (2004). Preschoolers moral judgments Distinctions between realistic and cartoon-fantasy transgressions. Proceedings of the 2004 Conference on Interaction Design and Children Building a Community (pp. 131132). New York ACM