Friday, September 6, 2019

Time by Allen Curnow and Amends Essay Example for Free

Time by Allen Curnow and Amends Essay Explore the ways in which metaphysical ideas are presented in two poems that you have studied. ‘Time’ by Allen Curnow and ‘Amends by Adrienne Rich have an important link in which they both explore the metaphysical idea between the connection of human and nature. However, the poets use different concepts to address their points. Allen Curnow uses time with concrete and abstract images of the real world. On the other hand, Adrienne Rich uses descriptions on the moon. Language indicates the distinctiveness of how words are used by the poets. In these two poems, both of the poets use a variety of language techniques to present their ideas on the notion. They both have chosen repetition and diction for their pieces of poetry. In ‘Time’, the world ‘I am’ (refers to time) is repeated throughout the poem for many times. This gives the effects of highlighting how powerful time is. Curnow wants to indicates that time is everything in our lives, everything from sound, sight, smell to feelings. We can therefore feel a deep connection between humanity and the natural world. Also, diction with word choice like ‘dust’, ‘distance’ creates an atmosphere of old-fashioned and that a long period of time has passed. ‘Repetition’ is used in ‘Amends’ with the phrase ‘as it’. It emphasizes the constant movements of the moon and its progression. We can link this to ‘Time’ as it also shows a sense of power. Also, it seems to be highlighting the fact that the moon is controlling every single existence on Earth. From this, the idea of how nature has an important impact on human’s lives is being implied. Furthermore, the use of diction is present with the verbs on motions of the moon, for example: ‘picks’, ‘licks’, and ‘flicks’. This makes the imagery more realistic and fascinating to the readers. The number of images in both the two poems is immense. Allen Curnow and Adrienne Rich also use a lot of techniques in order to indicate the vividness of the images. Two of the techniques that they have in common are personification and metaphor. In ‘Time’, Allen Curnow personifies time with pronoun ‘I’. It is effective as time is brought closer to lives with our everyday ordinary objects. The images that time was personified to be are everything in life: ‘pines’, ’mileage’, ‘morning’, ‘park’, ‘magpie’ etc. These can be usable objects or beautiful flowers and birds. ‘I, Time, call down, condense and confer. ’ once again gives a sense of power. Metaphor is used in the last stanza: ‘Am island, am sea, am father, farm, and friend’. The images that time is compared to are categorized as nature (island, sea) and human (father, friend). Consequently, it also suggests the relationship between human and nature. Personification in the poem ‘Amends’ is present through the descriptions on movements of the moon. Words like: ‘picks’, ‘licks’, ‘flicks’, ‘pours’, ‘leans’ etc. implies the gentleness of the actions. This poem is about the progress of a moving moon, traveling, looking down from the sky to care for every little thing on Earth. Therefore, the verbs personify the actions of the moon, make it seems like a kind and cautious person. Metaphor is also emphasized in the last stanza of this poem. The imagery of how the moon ‘dwells upon the eyelids of the sleepers’ suggests how the moon looks after the sleepers – reference to human beings. The connotation of ‘dwells’ is to live; ‘eyelids’ are the vulnerable and very thin skin that covers our eyes. The metaphor meaning of this phrase is to suggest that the moon will always be with us, to protect us especially when things turn hard and we become weak. This has a special link to the metaphysical idea as the moon can be a symbol of nature and here we have a special connection with humanity as the fact that mother nature will always look out for us is present using imagery in this poem. Finally, the two poets creatively succeeded in forming/structuring their poems in many unique ways. However, they have one similarity in doing that, which is the use of enjambment. In ‘Time’, enjambment is widely used in the first 4 stanzas. After each sentence, there is no punctuation, therefore the reason for this can be suggested as the poet wants the readers to keep on reading. This is a smart way to indicate how time passes. Time does not wait for anyone or anything, it keep on moving unstoppable. That might be the reason why Allen Curnow has chosen to use enjambment in this poem. Dissimilar to that, in ‘Amends’, enjambment is used throughout the whole poem. The purpose of this is also different. In this poem, Adrienne Rich uses this technique of structuring to reflect movements of the moon. She wants that as the readers read on, they also follow a cycle that the moon is moving and step by step starting to see the whole world. It is shown that we all are under the moon’s protection. In conclusion, the poets are trying to demonstrate a metaphysical idea on the connection between humanity and nature. They both have individual impact on each other. Both the poems have captivating concepts to lead us to that belief. They help us to realize that nature is closer to humans than we think it is. Nature provides us with necessity, care and protection without us perceiving to acknowledge it. Each poem has different ways of delivering that message to us. In my opinion, the metaphysical idea is much more easier to identified with the poem ‘Amends’ because the image of nature is already present by the moon and all the techniques are used by the poets appropriately. ‘Time’ is obviously a relevant choice for poems on the connection between human and nature. However its concept is much more complicated than the concept of the moon.

Thursday, September 5, 2019

Biometric Passport With Rfid Information Technology Essay

Biometric Passport With Rfid Information Technology Essay Radio-frequency identification is the use of an object typically referred to as an RFID tag applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. Some tags can be read from several meters away and beyond the line of sight of the reader. Radio-frequency identification comprises interrogators (also known as readers), and tags (also known as labels). The RFID device serves the same purpose as a bar code or a magnetic strip on the back of a credit card or ATM card; it provides a unique identifier for that object. And, just as a bar code or magnetic strip must be scanned to get the information, the RFID device must be scanned to retrieve the identifying information. RFID Works Better Than Barcodes: A significant advantage of RFID devices over the others mentioned above is that the RFID device does not need to be positioned precisely relative to the scanner. Were all familiar with the difficulty that store checkout clerks sometimes have in making sure that a barcode can be read. And obviously, credit cards and ATM cards must be swiped through a special reader. In contrast, RFID devices will work within a few feet (up to 20 feet for high-frequency devices) of the scanner. For example, you could just put all of your groceries or purchases in a bag, and set the bag on the scanner. It would be able to query all of the RFID devices and total your purchase immediately. RFID technology has been available for more than fifty years. It has only been recently that the ability to manufacture the RFID devices has fallen to the point where they can be used as a throwaway inventory or control device. Alien Technologies recently sold 500 million RFID tags to Gillette at a cost of about ten cents per tag. One reason that it has taken so long for RFID to come into common use is the lack of standards in the industry. Most companies invested in RFID technology only use the tags to track items within their control; many of the benefits of RFID come when items are tracked from company to company or from country to country. Figure 2: Types of RFID tags Figure 3: RFID scanners History and technology background: Mario Cardullos U.S. Patent 3,713,148 in 1973 was the first true ancestor of modern RFID; a passive radio transponder with memory. The initial device was passive, powered by the interrogating signal, and was demonstrated in 1971 to the New York Port Authority and other potential users and consisted of a transponder with 16 bit memory for use as a toll device. The basic Cardullo patent covers the use of RF, sound and light as transmission media. The original business plan presented to investors in 1969 showed uses in transportation (automotive vehicle identification, automatic toll system, electronic license plate, electronic manifest, vehicle routing, vehicle performance monitoring), banking (electronic check book, electronic credit card), security (personnel identification, automatic gates, surveillance) and medical (identification, patient history). An early demonstration of reflected power (modulated backscatter) RFID tags, both passive and semi-passive, was performed by Steven Depp, Alfred Koelle, and Robert Freyman at the Los Alamos National Laboratory in 1973. The portable system operated at 915Â  MHz and used 12-bit tags. This technique is used by the majority of todays UHFID and microwave RFID tags. The first patent to be associated with the abbreviation RFID was granted to Charles Walton in 1983. Miniaturization: RFIDs are easy to conceal or incorporate in other items. For example, in 2009 researchers at Bristol University successfully glued RFID micro transponders to live ants in order to study their behavior. This trend towards increasingly miniaturized RFIDs is likely to continue as technology advances. However, the ability to read at distance is limited by the inverse-square law. Hitachi holds the record for the smallest RFID chip, at 0.05mm x 0.05mm. The Mu chip tags are 64 times smaller than the new RFID tags. Manufacture is enabled by using the Silicon-on-Insulator (SOI) process. These dust sized chips can store 38-digit numbers using 128-bit Read Only Memory (ROM). A major challenge is the attachment of the antennas, thus limiting read range to only millimeters. Potential alternatives to the radio frequencies (0.125-0.1342, 0.140-0.1485, 13.56, and 840-960Â  MHz) used are seen in optical RFID (or OPID) at 333 THz (900Â  nm), 380 THz (788Â  nm), 750 THz (400Â  nm). The awkward antennas of RFID can be replaced with photovoltaic components and IR-LEDs on the ICs. Figure 4: Miniature RFID tag Modular Decomposition Our system requirements are very clearly and not expect to change frequently. So, we will use in our system Waterfall model. And because the requirements are well understood. Project Activities Task# Duration (week) Description T1 2 -Feasibility study of the system T2 2 -Requirement analysis -Requirement specification T3 6 -System design -Code programming -Interface design T4 2 -System testing -Feedback on system testing -validation of system Risks Management Risk type Possible risks Technology Not all system familiar with RFID hardwares and softwares. People -Key staff is ill and unavailable at critical times (Only one employee work in this system). Requirements -Customers fail to understand the impact of Requirements changes. Estimation -The time required to develop the software is underestimated. -The rate of defect repair is underestimated. -The size of the software is underestimated. Risks Analysis Risk Probability Effects Technology Low Serious People Low Catastrophic Requirements High Serious Estimation Moderate Serious Risk Management Strategies Risk type Strategy Technology Will choose the software hardware Carefully. People -Gave every task over-days, and some days will Have overtime of work. Requirements -After every task there is a feedback, The costumer will see it. -Investigate buying-in components. Estimation -Replace potentially defective components With bought-in components of known reliability. RFID Tools: Most RFID tags contain at least two parts. One is an integrated circuit for storing and processing information, modulating and demodulating a radio-frequency (RF) signal, and other specialized functions. The second is an antenna for receiving and transmitting the signal. There are generally two types of RFID tags: 1. Active RFID tags An RFID tag is an active tag when it is equipped with a battery that can be used as a partial or complete source of power for the tags circuitry and antenna. Some active tags contain replaceable batteries for years of use; others are sealed units. (Note that it is also possible to connect the tag to an external power source.) Advantages of an active rfid tag: 1- It can be read at distances of one hundred feet or more, greatly improving the utility of the device 2- It may have other sensors that can use electricity for power. 3- Longest communication range of any tag. 4- The capability to perform independent monitoring and control 5- The capability of initiating communications 6- The capability of performing diagnostics 7- The highest data bandwidth 8- Active rfid tags may even be equipped with autonomous networking; the tags autonomously determine the best communication path. Disadvantages of an active RFID tag: 1- The tag cannot function without battery power, which limits the lifetime of the tag. 2- The tag is typically more expensive, often costing $20 or more each. 3- The tag is physically larger, which may limit applications. 4- The long-term maintenance costs for an active RFID tag can be greater than those of a passive tag if the batteries are replaced. 5- Battery outages in an active tag can result in expensive misreads. 2. Passive RFID tags: A passive tag is an RFID tag that does not contain a battery; the power is supplied by the reader. When radio waves from the reader are encountered by a passive RFID tag, the coiled antenna within the tag forms a magnetic field. The tag draws power from it, energizing the circuits in the tag. The tag then sends the information encoded in the tags memory. Advantages of a passive tag: 1- The tag functions without a battery; these tags have a useful life of twenty years or more. 2- The tag is typically much less expensive to manufacture. 3- The tag is much smaller (some tags are the size of a grain of rice). These tags have almost unlimited applications in consumer goods and other areas. Disadvantages of a passive rfid tag: 1- The tag can be read only at very short distances, typically a few feet at most. This greatly limits the device for certain applications. 2- It may not be possible to include sensors that can use electricity for power. 3- The tag remains readable for a very long time, even after the product to which the tag is attached has been sold and is no longer being. Figure 5: Active and Passive RFID tag Current uses of RFID: 1- Biometric passport: A biometric passport, also known as an e-passport or ePassport, is a combined paper and electronic passport (hence the e-, as in e-mail) that contains biometric information that can be used to authenticate the identity of travelers. It uses contactless smart card technology, including a microprocessor chip (computer chip) and antenna (for both power to the chip and communication) embedded in the front or back cover, or center page, of the passport. Document and chip characteristics are documented in the International Civil Aviation Organisations (ICAO) Doc 9303. The passports critical information is both printed on the data page of the passport and stored in the chip. Public Key Infrastructure (PKI) is used to authenticate the data stored electronically in the passport chip making it virtually impossible to forge when all security mechanisms are fully and correctly implemented. Note that the USA Passport card is not a biometric passport. The passport card does not follow the ICAOs Doc 9303, can only be used in a limited number of countries and uses a simple RFID chip instead of the contactless smart card technology that is used for biometric passports. Contactless smart card technology includes a microprocessor, data access control, communications security and other functionality as programmed. 2- Microchip implant (human): A human microchip implant is an integrated circuit device or RFID transponder encased in silicate glass and implanted into a humans body. A subdermal implant typically contains a unique ID number that can be linked to information contained in an external database, such as personal identification, medical history, medications, allergies, and contact information. Hobbyists: The first reported experiment with an RFID implant was carried out in 1998 by the British scientist Kevin Warwick. As a test, his implant was used to open doors, switch on lights, and cause verbal output within a building. The implant has since been held in the Science Museum (London). Since that time, at least two additional hobbyists have placed RFID microchips implants into their hands or had them placed there by others. Amal Graafstra, author of the book RFID Toys, asked doctors to place implants in his hands. A cosmetic surgeon used a scalpel to place a microchip in his left hand, and his family doctor injected a chip into his right hand using a veterinary Avid injector kit. Graafstra uses the implants to open his home and car doors and to log on to his computer. Neither implant was the VeriChip brand. Medical records use: The PositiveID Corporation (previously known as The VeriChip Corporation; Applied Digital Solutions, Inc.; and The Digital Angel Corporation) distribute the implantable chip known as the VeriChip. The company suggests that the implant could be used to retrieve medical information in the event of an emergency, as follows: Each VeriChip implant contains a 16-digit ID number. This number is transmitted when a hand-held VeriChip scanner is passed within a few inches of the implant. Participating hospitals and emergency workers can enter this number into a secure page on the VeriChip Corporations website to access medical information that the patient has previously stored on file with the company. Building access and security: The VeriChip Corporation has also suggested that the implant could be used to restrict access to secure facilities such as power plants. Microchip scanners could be installed at entrances so locks would only work for persons with appropriately programmed chips. The downside is the relative ease with which the 16-digit ID number contained in a chip implant can be obtained and cloned using a hand-held device, a problem that has been demonstrated publicly by security researcher Jonathan Westhues and documented in the May 2006 issue of Wired magazine, among other places. A nightclub in Barcelona offered a chip implant for identifying VIP guests. Figure 6: Biometric passport with RFID tag Figure 7: Microchip human implant Technical problems with RFID: Problems with RFID Standards: RFID has been implemented in different ways by different manufacturers; global standards are still being worked on. It should be noted that some RFID devices are never meant to leave their network (as in the case of RFID tags used for inventory control within a company). This can cause problems for companies. Consumers may also have problems with RFID standards. For example, ExxonMobils SpeedPass system is a proprietary RFID system; if another company wanted to use the convenient SpeedPass (say, at the drive-in window of your favorite fast food restaurant) they would have to pay to access it an unlikely scenario. On the other hand, if every company had their own SpeedPass system, a consumer would need to carry many different devices with them. RFID systems can be easily disrupted: Since RFID systems make use of the electromagnetic spectrum (like WiFi networks or cellphones), they are relatively easy to jam using energy at the right frequency. Although this would only be an inconvenience for consumers in stores (longer waits at the checkout), it could be disastrous in other environments where RFID is increasingly used, like hospitals or in the military in the field. Also, active RFID tags (those that use a battery to increase the range of the system) can be repeatedly interrogated to wear the battery down, disrupting the system. RFID Reader Collision: Reader collision occurs when the signals from two or more readers overlap. The tag is unable to respond to simultaneous queries. Systems must be carefully set up to avoid this problem; many systems use an anti-collision protocol (also called a singulation protocol. Anti-collision protocols enable the tags to take turns in transmitting to a reader. RFID Tag Collision: Tag collision occurs when many tags are present in a small area; but since the read time is very fast, it is easier for vendors to develop systems that ensure that tags respond one at a time. Security, privacy and ethics problems with RFID: The following problems with RFID tags and readers have been reported: The contents of an RFID tag can be read after the item leaves the supply chain: An RFID tag cannot tell the difference between one reader and another. RFID scanners are very portable; RFID tags can be read from a distance, from a few inches to a few yards. This allows anyone to see the contents of your purse or pocket as you walk down the street. Some tags can be turned off when the item has left the supply chain. Zombie RFID Tags: One of the main concerns with RFID tags is that their contents can be read by anyone with an appropriately equipped scanner even after you take it out of the store. One technology that has been suggested is a zombie RFID tag, a tag that can be temporarily deactivated when it leaves the store. The process would work like this: you bring your purchase up to the register, the RFID scanner reads the item, you pay for it and as you leave the store, you pass a special device that sends a signal to the RFID tag to die. That is, it is no longer readable. The zombie element comes in when you bring an item back to the store. A special device especially made for that kind of tag re-animates the RFID tag, allowing the item to reenter the supply chain. RFID tags are difficult to remove: RFID tags are difficult to for consumers to remove; some are very small (less than a half-millimeter square and as thin as a sheet of paper) others may be hidden or embedded inside a product where consumers cannot see them. New technologies allow RFID tags to be printed right on a product and may not be removable at all. RFID tags can be read without your knowledge: Since the tags can be read without being swiped or obviously scanned (as is the case with magnetic strips or barcodes), anyone with an RFID tag reader can read the tags embedded in your clothes and other consumer products without your knowledge. For example, you could be scanned before you enter the store, just to see what you are carrying. You might then be approached by a clerk who knows what you have in your backpack or purse, and can suggest accessories or other items. RFID tags can be read at greater distances with a high-gain antenna: For various reasons, RFID reader/tag systems are designed so that distance between the tag and the reader is kept to a minimum. However, a high-gain antenna can be used to read the tags from much further away, leading to privacy problems. RFID tags with unique serial numbers could be linked to an individual credit card number: At present, the Universal Product Code (UPC) implemented with barcodes allows each product sold in a store to have a unique number that identifies that product. Work is proceeding on a global system of product identification that would allow each individual item to have its own number. When the item is scanned for purchase and is paid for, the RFID tag number for a particular item can be associated with a credit card number. Goals of the project: Many students skip more than 20% of their lectures, and using an embed RFID tags in their student card will help to keep track of attendance. It can be a reference to the doctor in keeping records of attendance. It can also be used to provide any extra information to the doctor or the department without the need to type in the student number. It can be upgraded to include money amounts to be used around the university campus. Provides better management for the doctor in his lecture. Reduce the use of paper to keep track of the students. User Requirements: Any user can use the system. Students are able to see their attendance online and almost in real time. Ordinary student cards can be implanted with an RFID tag. DATA Flow Diagram: Figure 8 Scenario Diagram : The first step , the user scans his card The user opens the website. { For example Just website } The user chooses if he will log-in like member or visitor. Figure 9 If he clicks sign in Button, the system asks him to insert his ID and the Password, and then the system checks the validity of the inserted information and then asks him to rescan his card to match it with that ID. Figure 10 If the password valid and is a match with the card, the system redirect him to the member page. Figure 11 If a doctor has logged in , the system ask him if he would like to open the attendance list of his lectures , or opens the student list of a certain lecture to have the students check for attendance . If a student has logged in, the students will be able to view a list of his lecture absence or check for a certain lecture attendance By rescanning the card, the member signs out of the system. If he clicks the Visitor button, He can view a guide on how to obtain an RFID tagged card. Figure 12 Information sources: RFID tags are a new technology and few companies support it, one of these companies that provide support to RFID tags is TOUCHATAG. So we tried to collect as many information from the touchatag website about it and about the RFID hardware before we start using it and these resources are: 1- Touchatag webpage: we entered Touchatag webpage to read about how to use touchatag device, tags. 2- Taking the website tour: we took a tour about touchatag DIY. 3- Reading books and tutorials: we read many tutorials and online books about RFID tags and hardware. Software Requirements: To do this project we needed some hardware to help us in the building: 1- Touchatag RFID scanner: we must have touchatag rfid scanner to do this project, so we obtained it. 2- RFID tags from Touchatag Company: these tags are used with the scanner to have a working RFID environment. 3- A programming software: Programming software is required to implement the project, then uploading it to the touchatag website and attach it with the account associated with the RFID scanner. System Requirements: As Touchatag application is a software attached to the touchatag server, client must satisfy these requirements to run the application, here we are using this application under Windows (requirements vary depend on OS machine): Windows Minimum requirement Recommended Internet Connection: Cable or DSL Cable or DSL Operating System: 2000, XP, or Vista XP or Vista Computer Processor: 800 MHz Pentium III or Athlon, or better 1.5 GHz (XP), 2-GHz (Vista) 32-bit (x86) or better Screen Resolution: 1024768 pixels 1024768 pixels or higher Graphics Card for XP/2000 NVIDIA GeForce 2, GeForce 4 MX or better NVIDIA Graphics cards GeForce Go Series: 7600, 7800, 7900 ATI Graphics Cards X2600, X2900 X3650, X3850 Graphics Card for Vista (requires latest drivers) NVIDIA GeForce 6600 or better OR ATI Radeon 9500 or better OR Intel 945 chipset NVIDIA Graphics cards GeForce Go Series: 7600, 7800, 7900 ATI Graphics Cards X2600, X2900 X3650, X3850 Implementation: For the implementation part, and due to the lack of possibility to develop my application directly on the Touchatag device, I took the approach of developing two things and link them together, first Ive created the website and the data base using ASP.net and C#, stored the data and performed the operation that Ill explain later on, and the second part was creating a visual basic script, that is attached to each tag and performs the task needed when it is called by the tag. ASP.net : Ive started the project with programming on ASP.net using C#, to accomplish the following tasks: Create a Doctor ID for login. Create a Doctor Password for login. Save the Doctor ID and Password in the database. Login as a Doctor and open the Student attendance system page. Check lectures where this function do the following : Upon clicking the button the system checks the time on the system and then scan the database for any lectures that is in this time and then return the tables ID which matches the time of the system and then store it in a hidden label, then the program checks the hidden label for the ID of the lecture and goes to the database to retrieve the students who are attached with that ID, along with two fields for the Time in and Time out. Upon clicking one of the four buttons which are labeled {Open Sign in, Close Sign in. Open Sign out, Close Sign Out} the values of a hidden label are changed to specific values. When the student types in his Student ID and Student Password , then press the login button , the system checks the student ID and the password if they are stored in the data base , once he found the data it checks which button of the four was clicked by the doctor first by checking a hidden label that stored the values of the button that was clicked , then based on that value it stores the time when the Login button was clicked, and by doing so it also updates the Database at the same Time. Visual Basic Script : The visual basic script is what links the ASP.net website to the Touchatag card; it is implemented through statements that do the following: Each Tag is assigned to a script of its own. The Tag when scanned activates the script that is assigned to it. The script is constructed with few simple statements that opens the web page, writes the user ID and Password in the cross ponding field, and the press the login button. Touchatag reader and Tags : The Touchatag reader is connected to the Touchatag server which does the specific task you have assigned it already on the Touchatag Server, and by scanning each tag the specific Tag ID goes to the Server and retrieves the function that is assigned to that specific Tag. Screen Shots: Asp.net Doctor Login Page : Figure 13: ASP.net Student Login Page , with Check Lectures and other Prompts: Figure 14: ASP.net Visual Basic Script: Figure 15: Visual Basic Touchatag: Figure 16: Touchatag Figure 17 Figure 18 : Touchatag Figure 19: Touchatag Testing Security: Rfid ID tags provided by touchatag have several security measures which include: 1- Accounts password: Every user has a password to access his account in the webpage and the server. This password is created when the user signs up. 2- IPs: touchatag server changes its IP from time to time to avoid hacking. 3- Report Abuse: This feature allows any user to report any object or person if they abused them. 4- Unique tags ID: each tag has a unique tag provided by the tag itself. Copyrights: The touchatag RFID tags are copyright protected and cant be used without a reference from touchatag. Performance Testing: Each tag is scanned effortlessly without any problems, the website might crash sometimes but it is restored without any problems. Unit Testing: Ive tested the tags, they work fine even after being placed in a wallet for more than 6 months and the wear and tear process is slow, and the tags are durable. Conclusion This project is the first step towards building Jordan University of Science Technology fully automated attendance system; JUST administration can take this step further, build on it to reach a better-enhanced project and can add more features and services to staff, officers, and students. Furthermore, the administration can also use this new technology to improve students attendance services and activities. I faced many problems during this project. The first problem is when I have to work in this system alone. Really, this problem gave me a big challenge to complete the project, but with the help of Dr. Qutaiba Al Thebyan, Dr. Qusai Abu Ein, Mrs. Alaa Mestarihi and the department, I could complete it. Finally, RFID tags is the future and every day services now a day require more interaction , but with those tags , many services and jobs can be done effortlessly without the ever getting your hand out of your pocket.

Wednesday, September 4, 2019

Pricing Websites For Sale :: Sell Websites Buy Websites

Pricing Websites For Sale Reprinted with permission of VotanWeb.com As a market leader in existing website sales, VontanWeb receives many questions about valuing websites. It always amazes me how some website owners come up with the value of a website being sold. No wonder many websites never sell. In many instances no consideration is given to the total picture. Will the available cash flow of the website be able to pay the debt of a loan to purchase the website? Will the website as priced be attractive to financing sources? I have seen many â€Å"professional website valuations† where the price just doesn’t make sense – and sellers wonder why buyers are not standing in line to purchase their website. Market Approach There is a solution that is grounded in the fundamentals of economics, and time tested in the marketplace, where the influences of supply and demand ultimately determine where a website belongs on the price scale. One economist explains this market approach by comparing a business to a machine which has the purpose of making money: The more money it makes, the more it is worth. This is why there is greater demand for very small and profitable websites with few hard assets, than there is for large, popular and high maintenance websites that generate a huge cash flow, but can’t make a living for its owner. Adjusted Net Income The first category of information needed is called adjusted net income, and is the total amount of cash produced by the â€Å"money machine.† Of course, this figure includes the website profits and the owner’s salary. It’s important to remember that the adjusted net income should also include all of the many cash-related benefits which are enjoyed by the website owners. Those benefits may include the use of a car owned by the website, the website-paid premiums for health, life and auto insurance, website paid memberships to country clubs and spas, travel and entertainment expenses that are actually vacation and taking the wife out to eat expenses. Don’t forget expenses for high speed internet and cable TV that are needed for the website but also provide entertainment for the whole family. There are many, many other hidden personal expenditures in any typical website business, subscriptions to magazines, gifts for your wife and girlfriend and similar †Å"business expense† categories. Interest expense should also be added to adjusted net income, along with accounting entries—such as depreciation and amortization—that can divert money to the owner’s pocket so that it never appears on the bottom line of the P & L.

Tuesday, September 3, 2019

Sense and Sensibility and Pride and Prejudice Essay -- Jane Austen Sen

Sense and Sensibility and Pride and Prejudice Jane Austen's characters always undergo an event that morally changes their being. In Sense and Sensibility this moral change is obvious in Elinor and Marianne. The development of these adolescents into mature, reasonable adults is a gradual transformation seen in Sense and Sensibility. Elizabeth Bennet and Mr. Darcy begin Pride and Prejudice as arrogant and biased adults and end the story as liberal minded individuals.   Ã‚  Ã‚  Ã‚      In Sense and Sensibility the family has been forced to move from the plush lap of luxury into a more modest setting. Mr. Dashwood has just passed away. Since this was a patrilineal society, the eldest son, John Dashwood, inherits all of Mr. Dashwood's estate. John planned to live at Norland with his wife, Fanny Dashwood. Mrs. Dashwood and her three daughters needed to relocate. This is a significant adjustment for everyone involved. In addition to the move to Barton Cottage, the family is also experiencing a decline in their income and thus must live a more middle class existence.   Ã‚  Ã‚  Ã‚  Ã‚  Marianne was Mrs. Dashwood's middle daughter. She was sensible and clever, but eager in everything; her sorrows, her joys, could have no moderation. She was generous, amiable, interesting: she was everything but prudent.'; (Austen, pg5). Marianne was only seventeen and behaved as such. She was unable to hold back her feelings even in a social setting with friends. Mrs. Dashwood's disposition was similar to Marianne's. They were similar in the expression of emotions. After Henry Dashwood died Marianne and Mrs. Dashwood, 'encouraged each other now in the violence of their affliction.'; (Austen, pg 5). The phrase misery loves company comes to mind to explain how they would commiserate with each other.   Ã‚  Ã‚  Ã‚  Ã‚  Marianne was full of emotions and thoughts that she would not conceal. Her personality was the extreme opposite of Elinor's The moral development in Marianne has its roots in Willoughby, a young gentleman that rescues her from a fall on a mountainside near their new home. It was a very romantic scene when Willoughby, 'took her up in his arms without further delay, and carried her down the hill'; (Austen, p21). Marianne was excited at the whole situation especially since ;his manly beauty and more than common gracefulness were instantly the theme of general admiration'; (Austen, p21). Willoughby wa... ... the highest kind'; (Austen, p296). Mr. Darcy has completely forgiven Elizabeth and is attempting to prove her opinion wrong. Elizabeth has broken her prejudice and realizes her fault. Darcy comes to Longbourn and Elizabeth's mother comments on him, 'but else I must say that I hate the very sight of him'; (Austen, 333). Elizabeth has overcome her bad opinion of Darcy, but the rest of the family has not. After Elizabeth tells her mother of Darcy's proposal she says, 'We all know him to be a proud, unpleasant sort of man; but this would be nothing, if you really like him'; (Austen, p354). Her family is willing to allow the marriage to proceed, mostly for financial reasons. These books show a maturation of character through the trials and tribulations that life grants. In each of these stories there are parallel worlds, one of upper class and one of the middle to lower class. They show that even though two people come from different worlds and have different financial positions, love will conquer all. Works Cited: Austen, Jane. Pride and Prejudice. London: Penguin Books, 1996. Austen, Jane. Sense and Sensibility. Ed. Margaret Anne Doody. Oxford: Oxford UP, 1990.

Monday, September 2, 2019

Campus in the Sky :: Personal Narrative Education College Essays

Campus in the Sky When I was 18 I moved out of my parent's house into what most would consider a small two bedroom apartment with a friend. To me it was a kingly palace because it was mine. A dishwasher that didn't work, a room so small that my bed barely fit, and bathroom I had trouble turning around in without running into a wall. Still, it was my own, and that was all that mattered. I worked a 9-5 job, scraping every penny to get by. It took two years for me to realize that there had to be something better. I wanted a better life, a better education, and a job that would not just pay my bills, but give me mental satisfaction as well. It was then, at the age of 20 that I decided to pack my bags and get an education. I considered it a new start to my life and enrolled at Fort Lewis College in Durango, Colorado. I had never lived outside of the Denver Metro area and I wasn't sure what to expect. I read all the materials from the college, all the pamphlets, and did as much research about the town as I could. The college was nicknamed, â€Å"The Campus in the Sky,† and the pictures showed a sprawling campus set atop a golden mountain with forests all around. So, with a bit of fear and a great deal of excitement, I packed my bags, loaded my truck and set off for a small mountain town where my life would be reborn. I started heading south and two hours after leaving home I began to wonder what I had gotten myself into. It was a bright Saturday morning in August and the heat of the summer absorbing into the dark interior of my truck left me sweltering. Trying to save money, I dared not turn on the air conditioning. The remnants of my former life were packed into boxes that filled every open space of my oven on wheels. After passing Colorado Springs, I was met with open land on either side as far as I could see. There was nothing but flat prairie on either side with an occasional road aptly named â€Å"Boondocks,† or â€Å"Dead End Road,† veering off east or west. Seeing those names nearly made me turn back. â€Å"Where am I going, and why?† I thought to myself. Campus in the Sky :: Personal Narrative Education College Essays Campus in the Sky When I was 18 I moved out of my parent's house into what most would consider a small two bedroom apartment with a friend. To me it was a kingly palace because it was mine. A dishwasher that didn't work, a room so small that my bed barely fit, and bathroom I had trouble turning around in without running into a wall. Still, it was my own, and that was all that mattered. I worked a 9-5 job, scraping every penny to get by. It took two years for me to realize that there had to be something better. I wanted a better life, a better education, and a job that would not just pay my bills, but give me mental satisfaction as well. It was then, at the age of 20 that I decided to pack my bags and get an education. I considered it a new start to my life and enrolled at Fort Lewis College in Durango, Colorado. I had never lived outside of the Denver Metro area and I wasn't sure what to expect. I read all the materials from the college, all the pamphlets, and did as much research about the town as I could. The college was nicknamed, â€Å"The Campus in the Sky,† and the pictures showed a sprawling campus set atop a golden mountain with forests all around. So, with a bit of fear and a great deal of excitement, I packed my bags, loaded my truck and set off for a small mountain town where my life would be reborn. I started heading south and two hours after leaving home I began to wonder what I had gotten myself into. It was a bright Saturday morning in August and the heat of the summer absorbing into the dark interior of my truck left me sweltering. Trying to save money, I dared not turn on the air conditioning. The remnants of my former life were packed into boxes that filled every open space of my oven on wheels. After passing Colorado Springs, I was met with open land on either side as far as I could see. There was nothing but flat prairie on either side with an occasional road aptly named â€Å"Boondocks,† or â€Å"Dead End Road,† veering off east or west. Seeing those names nearly made me turn back. â€Å"Where am I going, and why?† I thought to myself.

Sunday, September 1, 2019

Mixed Member Proportional Government for Canada

Canada's government system was drafted at the Quebec conference by the so-called â€Å"Fathers of Confederation.† In this system, the Queen of Great Britain has the formal executive power. This in effect made the Canadian government system loosely based on the system being used by the United Kingdom (One Stop Canada, n.d.). Up to now, the Queen is still the head of the state, but just like any other parliamentary democracy, her powers are extremely limited. It is still the Parliament that drafts and approves the country's laws, and then the Queen would give the final approval, so to speak, known as the â€Å"Royal Assent.† Whenever the Queen is not in Canada, the Governor General acts as her representative and performs all her ceremonial and administrative duties. The Governor General is always chosen by the Queen by virtue of the Prime Minister's recommendation. The Governor General normally stays in office for 5 years (One Stop Canada, n.d.). The seat of power lies in the House of Parliament, but specifically, in the House of Commons. It is them who make laws for â€Å"make laws for the peace, order and good government of Canada†, and this includes defence, international policies, criminal law, immigration, border control and customs. They are being elected every 5 years. The present system in the Canada is the single member representation, commonly known also as first past the post or plurality system, wherein the whole country is divided into constituencies (total of 308) and during elections, whoever gets the most number of votes in any particular constituency represents the constituency, and take a single seat in the Parliament (One Stop Canada, n.d.). This system is now being challenged by many because of the presumed â€Å"lack of real representation† of this system. Challenges on the current system and call for a change Statistics from last year's election show that in British Columbia, the Liberal Party gained 77 of the 79 seats for that province with only 58% of the votes, compared to the former ruling Democratic Party who only gained 2 seats despite getting 22% of the vote. (The Democratic Party held 52 seats during the elections before last year, with only 39.5% of the vote.) The Green Party, although they have won 12.5% of the total votes, got no seats at all. This recent election has proven to many that there is a need for a change in their electoral system. Adriane Carr, the British Columbia Green Party leader, leads the initiative to change the existing first-past-the-post system of Canada. Carr launched this initiative to encourage the government to consider her drafted legislation on the mixed member proportional government (Caron, 1999; Green Party of Aotearoa New Zealand, 2002). In this proposed system, the benefits both electoral schemes will be combined. A voter will choose a candidate that he or she likes, and at the same time, vote for a party also. In this way, all constituencies will be represented, and at the same time, a proportionate number of seats will also be given to parties receiving a certain percentage of votes, thus, ensuring the representation on the interest or cause that it represents. It was also argued that this new system will maximize voter turnout as all votes will be taken into consideration, unlike the case of a first-past-the-post system where only the winning votes, so to speak, are represented in the parliament. This means that in this system, it would not only mean that the leading party would have seats in the Parliament, but also the minority party or parties, depending on the percentage of votes that they have won (Caron, 1999). This scheme is also said to increase the representation of women in the Parliament. In many countries in the Europe, proportional representation increased women representation by more than 10% (Caron, 1999). Such condition is something being advocated by parties like the Democratic Party in Canada. If proportional representation will be adopted by the Canadian political system, it is forecasted to increase the voter turnout from all levels of election, and at the same time, also increase the representation of other interests in the Parliament. Theoretically, this scheme will make all votes count. The ultimate question: Will this work in Canada? Many advocates of first-past-the-post system believe that if the system is not broken, then, do not fix it. But it appears that while it is not broken, there is a better way of doing it. Even cynics do not disagree with having a need for electoral reform. The current system of electoral process in Canada is based on a winner-take-all principle, which means that the only representation happening is the winning vote, i.e., the popular partisan viewpoint. This also means that the other vote, the losing view, lose their right to political representation. This system has produced a government with a winning party winning majority of seats, without really wining majority of the votes (Gordon, 2003). Canadians have only enjoyed true majority governments, elected by a majority of voters, four times since World War I (Gordon, 2003). The recent election show how â€Å"unrepresented† the voters are. And with the idea that they really have not attained a true majority government yet, still, they are using the first-past-the-post system despite the theoretically good outcome of a proportional representation system, or at least, the mixed member proportion. In all aspects of the theory, from the idea of being truly representative, to the idea of increasing voters' turnout, we know that this mixed member proportion will work. Since World War 1, only four times have the Canadian people attained a true representative majority, which means for only four times have the people been truly represented. This new system will in almost all certainty, reduce the control of the reigning party in the parliament. The system has worked or is still showing potential benefits in all countries which have tried this. Canada will not be an exemption. So, more than just asking if this system will work in Canada, the ultimate question is: Will the existing government give this a chance to work? Works cited: Caron, Jean-Franà §ois. â€Å"The end of the first-past-the post electoral system?† Canadian Parliamentary Review, 22.3 (Autumn 1999): 19-22. Green Party of Aotearoa New Zealand, 2002. Rod Donald exports MMP to Canada. Press release (28th March 2002). Gordon, Larry. â€Å"It’s time for fair voting in Canada.† Economics at About.com (15 October 2003). One Stop Canada, n.d. Canadian Political System. http://www.onestopimmigration-canada.com/canadian_political_system.html

Transforming anglian water

Introduction It is believed that survival of an organization in contemporary era of globalization & liberalization is directly correlated to the extent to which it utilizes advanced information technology tools and practices Total Quality Management. The concept of â€Å"Learning Organization† was introduced by Chris Argyris and further researched and explained by Sange (1990). Sange defined Learning Organization as the organization â€Å"in which you cannot not learn because learning is so insinuated into the fabric of life.† He further defines Learning Organization as â€Å"a group of people continually enhancing their capacity to create what they want to create.† The purpose of this assignment is to study Anglian Water in the light of Learning Organization and: 1.  Ã‚  Ã‚  Ã‚  Ã‚   Investigate the extent to which the organization could actually claim to be a Learning Organization. 2.  Ã‚  Ã‚  Ã‚  Ã‚   Identify those factors that may undermine the concept of â€Å"Learning Organization† in   Anglian Water and call into question the investments made. 3.  Ã‚  Ã‚  Ã‚  Ã‚   Explain if Anglian Water can sustain the ideals and practices of a Learning Organization. While exploring the definitions and characteristics of Learning Organizations, the case study of Anglian waters will be investigated and comparisons will be drawn. Chris Argyris differentiates between first order or single loop learning versus second order or double loop learning.   Learning is further explained as detection and correction of errors. Single loop learning detects the errors and then functions within the construct of organization’s governing variable to achieve the desired result. Double loop learning challenges the governing variable itself and aims at producing drastic cultural changes within the organization. Argyris further divides organizations into Model I and Model II. Model I represents the traditional bricks and mortar culture, a few characteristics of which are: Achieve the purpose as the actor defines it, Win, do not lose, Suppress Negative Feelings, Advocating courses of actions which discourage inquiry, Defensive relationships, low freedom of choice. Model II represents a learning organization, the characteristics of which are: Valid Information, Free and Informed choice, Internal Commitment, Sharing control, Surfacing conflicting view, Minimally defensive relationships, High freedom of choice, Increased likelihood of double loop learning. Considering the above view point, Anglian water clearly falls in the Model II category of double loop learning. In the 1990’s it diversified into new markets, conducted employee satisfaction surveys and acted on the results of it. The Management clearly had a vision to introduce and sustain drastic cultural changes and move towards becoming a learning organization. This was achieved to a great extent through employee empowerment & implementation of ‘transformation journey’ which enabled incumbents at all levels to develop attitudinal and behavioral change to be able to cope up with turbulent and uncertain environment. Argyris further introduces us to the concept of triple loop learning (Learning how to learn) which is in continuation to single loop (What to do); Double Loop (Learning what to do). Triple Loop Learning questions the structures and strategies of learning; and how our mental map affects the way we behave. It is considered as the highest level of organizational learning and restructuring. Triple loop learning leads to restructuring of current systems and processes. Dialogues are initiated with in the organization in the form of â€Å"collective mindfulness† to understand the basis of existence of hierarchies; policies, procedures etc and RESTRUCTURING within the organization takes place. A Learning Infrastructure is created where existing structure is studied, dialogue is initiated and new and more effective structures are proposed. Focus then is on developing competencies and skills of individuals – teams – organization and hence emerges a Learning Organization. Anglian Water as an organization seems to have all the characteristics that the Triple Loop learning mentions as that of a Learning Organization. At Anglian water, face to face communication is given utmost importance amongst employees; university of Water was established to integrate , support and accredit all forms of learning; develop skills and competencies that was required to move Anglian water to the 21st century and place it as a global player. Peter Senge (1990) remarks â€Å"The rate at which organizations learn may become the only sustainable source of competitive advantage†. He differentiates between adaptive and generative learning. Adaptive Learning is the initiation of a company into the community of Learning Organization. Generative learning utilizes the power of creativity and innovation to reconstruct those systems and processes that govern consequences. Senge, in his much acclaimed book The fifth discipline explains the five disciplines which according to him are cucial in building a learning organization. The first discipline Personal Mastery concentrates on learning of each and every individual in the organization resulting in Learning organization as a whole. Individual goals and tools to measure the proximity to these goals are developed. Significant evidence of Personal Mastery can be found at Anglian water through the introduction of the concept of travelers whose four guiding principles were a willingness to get to know myself, a desire to develop myself, a desire to develop my full potential with and through others, an ability to link my personal development to the development of Anglian water. The second discipline of Mental Model is the framework of cognitive processes of our mind which determines our thought and action process. Argyris concept of theories of action is similar to the Mental Model concept and govern actual behavior. Espoused theory is what we would like others to believe as our actual action theory. Anglian Water does not seem to have incorporate the Mental Model theory in its learning curve. The third principle of systems thinking or the ability to see interrelationships / circular causations (where a variable is both the cause and effect of another)is prevalent in the practice of Transformation Journey , Total Quality Management , Change Agent Networks. The Fourth principal of shared vision (build on individual vision of it’s members) is not well supported at Anglian Water. While the vision and value statements were rolled out in the 1990s it is unclear if these were created through the interaction between leaders and employees of the organization. It seems more likely that the vision and values were communicated from top to bottom. The fifth discipline of team learning or â€Å"genuine thinking together† was highly encouraged by the leadership at Anglian water and is corroborated with the team and group formations through the methodology of Transformational Journey. Victoria Marsick states that learning organizations involve deep change in the mind sets of people as well as the culture of the organization and socities. Gephart , Marsic & Van Buren 1997 emphasize on Continuous Learning at the system level which at Anglian Water was initiated in the form of Transformational Journey and University of Water. Knowledge generation and sharing was made possible through the introduction of University of Water which aimed at acknowledging, integrating, supporting and accrediting all forms of learning in the company. The concept was further given a boost with the establishment of an intranet for information exchange and communication. Systematic Thinking capacity which enables employees to identify linkages and feedback loops. The presence of the concept of systematic thinking can be illustrated by the feedback statements of employees on the Journey being a good learning experience OR the findings of the employee satisfaction survey that clearly demanded a cultural change in Anglian Water. Greater Participation and accountability by a larger percentage of employees is promoted by Anglian Waters through various methods such as ‘employee satisfaction survey’ , ‘employee empowerment’ , ‘transformational journey’ that saw the participation of more than 3000 employees, new ‘HR Performance Management Policies’. Culture and structure of rapid communication and learning was introduced with the advent of the 2 year long traveler role and Aqua University. Rapid communication was facilitated through the installment of Intranet. Pedler, another major pioneer, in his work ‘Blue prints of a learning company’ characterizes such organizes through the usage of five themes. ‘Strategy’ is explained through: i.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Learning approach to strategy was seen in the efforts to promote team working and cooperation through transformational journey which would have a direct bearing on the operational effectiveness and business performance. ii.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Participative Policy making is missing in Anglian Water’s organizational learning. ‘Looking in’ encompasses: i.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Informating or use of information technology to inform and empower employees by giving them access to information was being practiced at Anglein Water through installation of Hawk – their intranet system. ii.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Internal Exchange was facilitated through the introduction of Total Quality Management i.e. Each department treated the other as Internal Customer iii.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Formative Accounting and control and iv.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   reward flexibility are missing from the grounds of Anglian Water. ‘Enabling structures’ are flexible organizations which revisit & reformat structures, goals, objectives to align with the interest of employees, shareholders and suppliers. Post privatization, Anglian Water reorganized it’s business, restructured to a flatter organization, encouraged cross functional and individual participation to facilitate positive change. Transformational Journey empowered employees to arrange for their own support and skill development. ‘Looking out’ encompasses i. ‘Boundary workers as environmental scanners’, which refers to the collection of information from the external stakeholders of an organisation in order to establish their needs is evident through the introduction of TQM a key element of which is to be: ‘sensitive to customer requirements and to respond rapidly to them†¦to achieve customer satisfaction†¦Ã¢â‚¬â„¢ (Stark, 1998) ii.‘Inter-company learning’ which entails joining with customers and suppliers in training experiences, research and development and job exchanges is conspicuous by its absence in Anglian Water. Learning Opportunities talks of i.    Learning Climate encourages employees to seek continuous improvement, learn from their experiences and make time to question practices and try out new ones. Establishment of university of water by Anglian Water for the sole purpose of learning and development of employees attests the presence of Learning Climate in the company. ii. Self Development opportunities for all was encouraged at Anglian Water through the introduction of Transformational journey which was a holistic strategy designed to prepare and equip employees for the technical and emotional challenges of operating in a turbulent and uncertain environment. To Summarize, whether Anglian Water can claim to be a learning organization, I would like to include a few ideas organized by Art Kleiner states as Why Bother? i.   Because we want superior performance and competitive advantage ii.    For customer relations iii. To avoid decline iv.    To improve quality v.    To understand risks and diversity more deeply vi.    For innovation vii.   For our personal and spiritual well being viii.    To increase our ability to manage change ix.       For energized committed work force x.   To expand boundaries Above mentioned ten points are positive results of a successful learning organization. Anglian Water when viewed in the light of the above mentioned results comes out as a winner in the field of learning organizations  The next step is to identify factors that may undermine the concept of Learning Organization in Anglian Water. Senge states that the role of a leader is to build a shared vision. Though the vision and value statement that were released at Anglien Water were designed to inculcate new attitudes and behaviors, no evidence of participation of employees in shared vision building exercise is found. Shell (1997) also talks of Creative tension as a characteristic of Learning Organization. This enables innovation and visioning the future and further working towards a commonly agreed goal. However, this capacity to vision the future seems to be lacking in the employees of Anglian Water. This was more than evident when in 1990 Ofwat recommended a price reduction of at least 17.5%. and this decision hit the company hard. It suffered tremendous losses and had to initiate a major cost reduction strategy. If the government decision had been predicted by the visionaries of the company, they would have had time to prepare ground for the turbulence that they faced as a result of this Change. Davenport and Prusak (1998) are concerned with the magnitude of importance that has been given to Information technology centric Knowldege Management in Learning Organizations. They state that it is more important to build a culture conducive to knowledge and learning rather that emphasizing on information storage, retrieval and transfer. Clarke and Cooper state that in their goal to be a learning organization, Anglian Water rolled out a complete Knowledge Management Policy. However, their Intranet, despite of being called HAWK – Harnessing Anglian Water’s Knowledge appears to play only a secondary role. One of the major characteristics of Learning Organization is Experiential Learning. Polanyi (1967) characterizes experiential learning as tacit or not highly conscious. Lave and Wenger term the process as ‘legitimate peripheral participation’ which further dilutes   lessons learnt. Employees undergoing experiential learning might not be capable of fully understanding the reasons for success or failure. Thought Processes that are different from that of the value systems of a learning organization might be considered null and void. Marsick points out that when an organization is undergoing change and simultaneously assessing feedbacks, a confused and chaotic situation is bound to emerge. Multiple feedbacks emerge resulting in reception to various signals at the same time. Envisioning the environmental factors that would affect the well being of the company in future and predicting the types of challenges that the company should be ready for becomes very difficult. A tiny random fluctuation, often called Noise ‘can induce the path of choice’ (Capra 1996). It is hence expected of a learning organization to analyze well the various feedbacks and signals and prepare for the future challenges. It appears that the visionaries ay Anglian Water missed the point and hence future environmental challenges could not be well predicted. A few other vital characteristics of a Learning organization, mentioned by Pedler, seem to be missing at Anglian Water are â€Å"Formative Accounting and Control†, â€Å"Feedback loops being built in policy making process†. Formative Accounting and control insists on accounting , budgeting and reporting systems that are designed to help people understand the operations of organizational finance. However, It is important to add here â€Å"scholars often caution against one size fits all approach to creating the learning organization† (Marsick). Hence, it should not be a mandatory criteria for companies to absorb all characteristics defined by all scholars in the field of learning organizations. The third step is to analyze if Anglian Water can sustain the ideals and practices of a Learning Organization. If we refer to that portion of case study which is called â€Å"The future†, what immediately comes to our mind is that Anglian Water can not sustain the ideals and principles of a learning organization. When Anglian Water adopts a major cost reduction strategyin 1998 – 99; it seems to be moving away from the concept of Learning Organization. 10% of the employees (400 in number) were seen losing their jobs. While Learning Organizations are all about Investment in social, human and intellectual capital; Cost reduction strategies include downsizing, ‘low levels of risk taking, ‘short term focus’ ‘minimal levels of employee training and development,’ and ‘narrowly defined career paths’ (Schuler and Jackson, 2006:168) These practices are in stark contrast to senior managements bid to change Anglian Water’s approach to doing business to ‘entrepreneurial, innovative and outward looking’ (Jenkins, 2008:1) Cost Reduction would further mean minimizing overheads and it is assumed that the worse affected areas would be Human Resources & logistics. Under Human Resources, most of the benefits such as training programs, employee engagement activities would have been scrutinized and the logical conclusion would be to cut the costs related to them. In this scenario, existence of a corporate university might come under investigation with respect to the total costs being incurred on it. Huczynski and Buchanan (2001:135) describe LO practices as: ‘A complex difficult set of practices, difficult to implement systematically.’ This criticism is relevant toAnglian Waterin numerous ways. Firstly, with regards to the University of Water, in the long run, those employees involved may struggle with coping with learning and their ‘day job’ at Anglian Water and also the need to encourage employee attrition and encourage ‘new blood’ at Anglian Water. Secondly after the initiation of the cost-reduction strategy the practices of a Learning Organization would be even harder to implement for reasons which were discussed previously. It is imperative to mention here that a lot of scholars in the field of Learning Organizations consider downsizing as a part of the Learning and restructuring process. Labbas 1999, states that employment downsizing has been regarded as the preferred route to improving organizational performance. Success or failure of a downsized organization depends on the workforce remaining after the downsizing (Best Practices in Downsizing: 1997). The Organizational trends in late 1990’s and then at the advent of 21st century was moving towards downsizing , restructuring and outsourcing. Managers continue to use downsizing – and other forms of restructuring – to improve productivity ( Ellis, 1998 ).   Downsizing has been termed as a reorganization strategy by Mckinley, Sanchez and Schick. Few other companies which downsized in 1998 and are still going strong are Kodak, Levis and Citicorp. Freeman and Cameron mention downsizing as an intentional reduction in personnel intended to improve the efficiency of the firm. Last but not the least, the chaos theory related to learning organization deserves to be given its due importance while discussing the probability of success of Anglian Water after downsizing. This theory talks about a situation when an organizational equilibrium becomes structurally unstable at critical bifurcation points†¦.in the system’s evolution where a fork suddenly appears and the system branches off in a new direction (Capra 1996). As a result of occurrence of chaos, a new form of organization would evolve. Since it is important for an organization to always be in the learning category to be able to survive environmental changes, downsizing at Anglian water could be looked as a phase in the learning process. It can be assumed that Anglian Water emerges successful after the process of downsizing and continues in its process of learning through as innovative techniques as â€Å"Transformational Journey†; â€Å"Traveller† and â€Å"University of Water†. Bibliography Peter Sange, Fifth Discipline Chris Argyris On Organizational Learning Watkins and Marsick Sculpting the Learning Organization Beardwell, J and Claydon, T (2007) Human Resource Management A contemporary approach Fifth Edition Pearson Education Ltd Organizational Behavior Tata Mcgraw Hill Burnes, B (2004) Managing Change Pearson Education Ltd Easterby-Smith, M, Burgoyne, J and Araujo, L (2006) Organizational Learning and The Learning Organisation Sage Publications Huczynski, A and Buchanan D (2001) Organisational Behaviour (4th Edition ) FT/Prentice Hall Paton, R, Peters, G, Storey, J and Taylor, S (2005) Handbook of Corporate University Development Gower Publishing Pedlar, M., Boydell, T. and Burgoyne, J. Learning Company Project: A Report on work (see mullins p205) Mabey, C and Salaman, G (1999) Human Resource Management a Strategic Introduction Blackwell Publishers Ltd Schuler, R and Jackson, S Strategic Human Resource Management (2006) Blackwell Publishing Torrington, D and Hall, L(1995)   Human Resource Management Prentice Hall Perter Clarke & Maggie cooper, Knowledge Management & Collaboration    Â