Tuesday, April 28, 2020
Use of Devices in Londons To Build A Fire London Essay Example For Students
Use of Devices in Londons To Build A Fire London Essay To Build a Fire Essays Use of Devices in Londons To Build A Fire Jack London uses the devices of plot, setting, and We will write a custom essay on Use of Devices in Londons To Build A Fire London specifically for you for only $16.38 $13.9/page Order now characterization in this short story To Build A Fire to convey his message that humans need to be social. London sets an average, middle-aged logger in a deserted Yukon trail during a wintry season. The temperature is seventy-five degrees below zero and the logger and his husky are traveling towards Henderson Creek, about ten miles away, where the loggers companions are located. London places the man in this Yukon environment to symbolize that in this cold, cruel world, we need to learn how to benefit from each other. Prior to embarking on his journey, the logger is given advice from an old-timer at Sulfur Creek that no man must travel alone in the Klondike after fifty below. The logger thinks this is rather womanish and believes he can survive by himself. Along his journey, the man encounters death as he falls into a spring, where At a place where there were no signs, where the soft, unbroken snow seemed to advertise solidity beneath, the man broke through. It was not deep. He wet himself halfway up the knees before he floundered out to the firm crust. Then the man builds a fire beneath a tree and snow falls over it putting it out. London creates these natural events in the plot to prove they are not the cause of the mans death. Using characterization, London is able to display on account of who is alive at the end how one benefits from being social. The old-timer at Sulfur Creek is alive because he is experienced and wise enough to benefit from others experiences that it is not wise to travel alone in the Yukon. The boys at camp are also alive because they are together and can benefit from each other. The loggers husky is alive because it is well-suited for the Yukon environment, while the logger is not. Unlike the other characters, London has the man die at the end of the story to display that he dies because of his arrogance in his ability to travel alone. If the man travels with a companion, he can benefit from him and possibly return safely to camp. Londons point is achieved through these three devices to prove that the cause of the loggers death is his rugged individualism which concludes to not having anyone to benefit from. Londons message is that all of us need to learn how to be social and learn how to benefit from each other in order to survive. .
Thursday, March 19, 2020
Feasible Globalizations essays
Feasible Globalizations essays In the times we are living, there seems to be three main political, social and economic models that affect the idea of achieving a real global economy. These are nation-state systems, democratic political systems and a full economic integration. However, according to Mr. Rodrik the coexistence of these three models results impossible, or better said utopian. He argues that we could have at the most a combination of two of them, but never all three of them together for their coexistence would only create instability and a confrontation of interests. He solidly supports this argument analyzing past and current events that have taken place and expose the failure of promoting a fully integrated global economy. We will shortly summarize these examples and comment on them. Finally we will review the alternative proposed by Mr. Rodrik, the preservation of some limits on integration along with some ruling system that would orderly look for the achievement of an attainable integration, which we have considered to be somehow ambitious. One of the pillars of this papers argument exposes that markets need to be defined by a range of non-market institutions in contradiction to the mainstream idea that markets should be let to run freely with a minimum amount of intervention. Some functions that are to be performed by these institutions consist of creating, regulating, stabilizing and legitimating markets. Without theses institutions, he argues, markets would hardly strive, for they are not self-regulating, self-stabilizing or self-legitimating. They do a bad job, if any, at regulating anti-trust, providing transparent information, setting prudential limits or even raising awareness toward health, safety and the environment. However, people must understand that one model of an institutionalized economy is no better than the other as far as they all can assure market participants that they can retain the fruits of their investments. One exam...
Tuesday, March 3, 2020
Free sample - Enforcing internet security in organizations. translation missing
Enforcing internet security in organizations. Enforcing internet security in organizationsThe position of organizational internet security in the current growth of computing is gaining the presence of many companies as internet is expanding globe. Software companies are coming up with new security measures which can be implemented to counter the current needs of secure information and data transfer. Commoditized security measures have been around for long and therefore the need for enhanced internet security measures which offer high levels of security cannot be overlooked. Internet security technologies that offer competitive advantage to organizations are considered sometimes hard to implement. However critics emphasize that they are made to separate organizations from others in terms of accessibility, the major focus should be to retain secure information transfer. As new technologies emerge in the market, their adoption has been slow, but they offer an upper hand. Both physical and logical access remains vulnerable to hackers. This should prompt the need to redefine security technologies which will ensure secure operation and reduce the level of vulnerability to organizations data. à Organizations security is an area that is conceivably the most elementary and nevertheless the most critical of all the technologies and disciplines for the business or organizations sensation. An organization without concrete enterprise security processes and rules exposes it to considerable threats. This should therefore open up their minds that network security is an arms race and therefore attacks and prevention measures should be put in place that are not one sided. Evans (2003) stated that ââ¬Å"while hackers try to exploit vulnerabilities, software companies and enterprise security specialists continue to close the gaps and find new solutions and approaches to secure enterprise operations and dataâ⬠(p. 31). The role of internet security in the current growth of computing has been gaining the presence of many stakeholders including organizations and learning institutions around the globe. While governments have made it possible to use the internet for commercial and personal purposes its record in the realm of privacy and security is not unblemished. Internet security can be enforced through various ways to ensure a considerable level of security in organizations. Information security program for the organization should consist of various policies and procedures, security education, security management and a range of internet security mechanisms (Chen, 2005). The organizations internet security policy document should be of great and critical importance to the organizations internet security program. The internet security policy should be a sub policy of the whole organizations information security policy and therefore it should be determined during the requirements definition phase (Chen, 2005). Organizations should consider many diverse factors identified as influential for internet security policy. Chen (2005) says that ââ¬Å"human issues dominate internet security enforcement which include freedom of internet use, privacy, trust, monitoring, surveillance, censorship, right to be kept informed, accountability, sanctions, ownership and ethicsâ⬠(17). This implies that human issues should take center stage during the process which all other factors were viewed while establishing various sub policies of the internet security policy in the organization. The term internet security should imply that the organization has taken all the necessary measures of security have been ensured or adopted. Vacca on the other hand says that internet security should be about the information security and integrity of both private and organizational end userââ¬â¢s systems, networks and other terminal devices accessing the internet through the publicly available service providers (2007). Enforcing internet security should bring to our understanding that the organization has enforced the following types of internet security which include: system architecture level, virtual private networks, use of trusted links, and use of multiple firewalls, intrusion detection mechanisms, and encryption. Vacca says that the organization should use encryption as a primary means for providing confidentiality services for information sent over the internet (2007). Encryption should therefore be used to protect any electronic traffic such as mail messages or the contents of a file being downloaded (Vacca, 2007). Another measure that should be taken by the organization in connecting to the internet is to involve a number of system architectural decisions that will impact overall system security of the organization (Vacca, 2007). System level architecture uses virtual private network and trusted links so as to control access from unauthorized people. Trusted links in the organization are used to connect geographically separate networks. The publication by Science and Technology Committee (2007) noted that internet security in institution should not involve installation of the appropriate technology alone but also further sensitize the members of the organization on internet security. This should be in line with changing attitudes and behavior towards the internet through education and training. The organization should also ensure that security remains up to date (Science and Technology Committee, 2007). Besides the above measures which imply that the institution has fully enforced internet security there should also be the use of strong passwords and antivirus softwareââ¬â¢s. Strong passwords ensure that after computers boot only authorized users can access the internet to avoid security breaches. They should thus be used to prevent an unauthorized person form hacking to the computers while still online. Well configured firewalls and strong password should be used to enforce accepted level of internet security. The organization should use antivirus programs which prevent malicious malware or virus from interfering with data stored in these computers. The antivirus programs will protect other attacks from hackers who may want to gain access to data stored in computers in the organization. Cheswick, Bellovin and Rubin say that there should be careful control of network access and the files obtained from foreign sources greatly reduces the risk of infection (2003). Antivirus programs prevent human propagated viruses where people forward messages to other individuals promoting them to give their login details. On the other hand Maiwald (2003) says that the implementation of internet security in the organization should include mechanisms such as firewalls and virtual private networks coupled with changes to network architectures within the institution. The organization should place an access control device between the internet and the organizations internal network. This means that without such protection all internal systems will exposed to unlimited attacks (Maiwald, 2003). Internet security enforcement should ensure that the organizationââ¬â¢s staffs will be well trained on matters concerning internet security. Maiwald continue to say that internet security enforcement should come with the implementation of security mechanisms and ensure that they observe responsibility for the security of the organization (2003. As part of enforcing internet security the organization should actively raise security awareness as an important part of any good security program (Maiwald, 2003). Some of the steps toward attaining internet security will include determining the key information that must be communicated to the employees of the organization (Maiwald, 2003). In this context Maiwald says that employees should pay particular attention to password requirement, badges, use policies and anything else that directly affects your employees will work (2003). Internet security enforced should imply that the institution has provided its employees with detailed knowledge about protecting organizations information resources. Maiwald thus says that both the students and employees should be aware why the organization needs to protect its information resources (2003). This also indicates that the organizationââ¬â¢s security department should have plans to conduct audits of policy compliance. Maiwald (2003) established that ââ¬Å"such audits should focus on system configurations, backup policy compliance or on the protection of information in physical formâ⬠(198). In order to enforce the required level of internet security, there should be a need for well resourced formal organizational internet security infrastructure, featuring an internet security management program (Chen, 2005). The institution should adopt a multifaceted approach to controlling the employee contribution to internet security concerns including the development for very secure internet connectivity to institution. The institution should pay a close attention to the important human issues associated with internet security and usage (Chen, 2005). Besides this the organization should make its employees accountable for their actions through appropriate policies, awareness activities, monitoring and sanctions (Chen, 2005). Internet security should thus start with the use of appropriate security technologies. Organizations should look forward to truly secure critical business operations today and therefore companies need to adopt competitive security technologies. This means that security professionals should understand, implement, and operate effectively enhanced security technologies to ensure business continuity in these organizations. The level of vulnerability to organizations increases as the world advances in technology adoption. In this context it is important to ascertain that the need for competitive security technologies is at hand in many organizations. In conclusion, it is important to note that with the looming threat of internet security in the global environment, the challenge now should be to develop internet security solutions which will afford corporations the high level to protection needed to withstand prolonged and diverse attacks (Chen, 2005). Therefore only solutions based on strong comprehensive, holistic internet security management and policy should be implemented in organizations (Chen, 2005).à These measures should ensure that the institutionââ¬â¢s information and data is secure despite its internet connectivity. As new technologies continue to evolve in computing the level of threat also increases and therefore this means that the organization should stay updated on its internet security approach.à à References Connolly, K. (2003). Law of internet security and privacy 3rd ed.à Los Angeles, CA: Aspen Publishers Online. Chen, W. (2005). Statistical methods in computer security. Boca Raton, FL: CRC Press.Cheswick, W, Bellovin, S Rubin, A (2003). Firewalls and Internet security: repelling the wily hacker. Upper Saddle River, NJ: Addison-Wesley. Evans, N. D (2003). Business innovation and disruptive technology: harnessing the power of breakthrough technology for competitive advantage Boston, MA: FT Press. Great Britain: Parliament: House of Lords: Science and Technology Committee (2007). Personal internet security: 5th report of session 2006-07, Vol. 2: Evidence. Glen Burnie, MD: The Stationery Office. Maiwald, E (2003). Network security: a beginner's guide 2nd ed. New York, NY: McGraw-Hill Professional.Vacca, J (2007). Practical Internet security. Chicago, IL: Springer.
Sunday, February 16, 2020
Porter's five forces analysis for UK's venture capital industry Essay
Porter's five forces analysis for UK's venture capital industry - Essay Example This industry emerged in 1945 following the adoption of the Macmillan committee report, the industry was founded by three banks and they include private bank of England, London clearing bank and the Scottish clearing bank. It was formed due to capital raising problems faced by small companies that were emerging. The following is a discussion of the industry using the Porterââ¬â¢s five force model. Porter identified five forces that influence and shape an industry and they include rivalry, barriers to entry, buyer power, supplier power and substitution threat, the following is a discussion of the five forces and the characteristics of the UK venture capital industry. This refers to the degree of competition. The degree of competition in markets is determined by the concentration ratio which is a measure of market share, as many firms enter an industry the profits of the firm decline. (Porter, 22) A firm will choose a number of strategies in order to increase its market share, a firm will reduce prices to increase market share, vertical integration which include integration with suppliers and buyers and differentiation of its products. Rivalry intensifies when many firms enter the industry, existence of substitutes, existence of exit barrier and when product differentiation of products is limited. (Porter, 22) Degree of competition in the venture capital market is high given that there are over 1,300 firms in the industry. Venture capital industry products also have close substitutes which include loans and equity, therefore the industry firmââ¬â¢s degree of rivalry is considerably high. Rivalry has intensified over the years with the entry of many firms into the industry, initially there were only 3 firms in the industry and over the years many firms have entered the market. (Lerner, 41) The existence of substitute products produced in an industry constrains a firm in the industry to increase prices.
Sunday, February 2, 2020
Search on Mechatronic Essay Example | Topics and Well Written Essays - 3000 words
Search on Mechatronic - Essay Example Mechatronics may also be referred to as "electromechanical systems" or less often as "control and automation engineering" (Wikipedia, 2007). Mechatronics meant a mechanism that is electrified until the early 1980s. Where as in the mid-1980s, mechatronics came to mean engineering that is the boundary between mechanics and electronics. In this 21st century, the term mechatronics encompasses a large array of technologies. However, each technology still has the basic element of the merging of mechanics and electronics but now it also may involve software and information technology (IEEE/ASME, 1998). For instance, many early robots resulted from mechatronics development. As robot systems became smarter, software development, in addition to the mechanical and electrical systems, became the main focus of mechatronics. To give some of the common examples where mechatronics systems are used include: the design of robots, washing machines, cameras, microwave, motor vehicles, DVD, etc. and other machines where an integrated engineering design is being adopted. Integration involves subjects such as mechanical, electrical, electronics and control engineering. In other words, mechatronics combines together areas of technology that involve sensors and measurement systems, drive and actuation systems, analysis of the behaviour of systems, control systems and microprocessor systems. In general a mechatronic system consists of the following basic items. The product or production process involves a mechanical structure containing actuators (generally it may be a motor to make things move), a microprocessor to control the overall operation of the system, sensors to allow the microprocessor to monitor the state of the system and electronics to connect the other parts together (fig 1). Mechatronics in the 1970s, was concerned by and large with servo technology used in
Saturday, January 25, 2020
Computational Design and Management in Pharmaceuticals
Computational Design and Management in Pharmaceuticals Computational design and management in pharmaceuticals Liu Sui Abstract: Throughout the years since the computer was first developed, the computer has become required and indispensable in modern society. Significant scientific usage of computers has spread throughout all the sciences, including pharmaceutical science. In pharmaceuticals, usage has become an essential tool for the whole drug development process, from initiation of lead searching to finding the best fit, to finding toxicity. This paper will give an overview on how computers are used in the field of computational drug design. The development of computers is a short but exciting history. Looking back at this short history, it perfectly illustrates the intelligence and grittiness of mankind. Since the invention of electronic intelligence, this industry has been growing at an amazing pace. From the technical point of view, computers have changed a huge amount since ENIAC in 1946 to the modern day Intel and ARM architectures permeating our life (Bellis). Computers have changed their role from supercomputer being used for big companies and organizations to the personal computer that exists in just about every household, in one way or another. IT companies have also changed from marketing huge computers to marketing tiny computers to be used in the household, that synchronize with the fast speeds of the modern internet. In 1946, ENIAC was co-operated by the U.S. government and the University of Pennsylvania department of computer science (Goldstine). Features of this first generation of computers were that oper ating instructions were prepared for a specific task, and each machine had its own different mechanical languages. This generation of computers had very limited functionality and slow processing speed. Nonetheless, in less than 60 years, computers have become tools that are used by many different fields of study to enhance their overall value. The rapid development of computer technology has led to a massive expansion of computer-related applications in the pharmaceutical industry. From the local computer system-based assistance, to the inevitable development of network-based assistance, usage of computer networks has become an inevitable trend. Both the computer industry and the pharmaceutical industry influence each other, and the combination of penetration, has and will continue to impact the operating mode of pharmacy. Management and technical decisions made à ¢Ã¢â ¬Ã¢â¬ ¹Ã ¢Ã¢â ¬Ã¢â¬ ¹today within the pharmaceutical industry can be combined with the development of computer technology. All pharmacy workers should be aware of this and any future developments. In recent decades, due to the application of computers in pharmaceutical technology, many important achievements have been achieved. Since antiquity, humans have built many tools to physically extend their physical capabilities such as the wheel, the pulley, and the vehicle. On comparison, creating devices to extending mental capability, such as the abacus, calculator, and computer, has also been a great human achievement. Computers are unlike any other tools in which they can replace human labor under pre-programed condition for an indefinite duration. An item only becomes useful for society depending on its function, where computers have many unique features to make them ideal for society: â⬠¢ Computers have incredible calculation ability. â⬠¢ Computers have a huge memory, in order to go through large data sets The CPU and GPU of a computer have the ability to perform billions of complicated math operations per second. In terms of the pharmaceutical technology industry, this huge processing speed is vital for the complex mathematical operations required of this emerging discipline, such as calculating pharmacy finances, calculation and maintaining of pharmaceutical inventory, all the way to calculating drug and other protein formulas, determining the computational drug metabolism and its related pharmacokinetics computing, and pharmaceutical pattern recognition. Many computer-based programs have been developed and continue being improved to fill the huge needs of this industry. In the developmental stage of drug design, to search for drugs that possess the lowest energy in chemical structure can take a very long time, and is hard to do. Many people may question why do we need to calculate the lost energy possibility structure, and this question cannot be answered in one simple sentence. In chemistry, each element is giving a symbol. Molecular formulas use these elemental symbols to show substantive (whether itââ¬â¢s an element or a molecular compound) composition of molecules and their relative molecular weight. Chemical formulas are widely used to present chemicals and chemical reaction. In nature, many drugs have different chemical formula, but at the same time, some compounds that have the exact same molecular formula may not be the same compounds; these compounds are called isomers. Isomers have same chemical formula but different atomic arrangement, and the cause of isomers is the change of order between atoms or groups. One type of isomers is called constitutional isomer. For example, ethanol and methoxymethane both have the chemical formula of C2H6O, but ethanol has an alcohol group, and methoxymethane has an ether function group (figure 1) Figure 1: chemical formula of ethanol and methoxymethane. This is where the software, Gaussian, becomes an invaluabl e part of pharmaceutical chemistry. Gaussian and its related software, Gaussview, are used to search for conformation amongst molecules. Stereoisomers have the molecular atom and group connected to each other in the same order but have different spatial arrangements. Many people may ask why we should care about the spatial arrangements. To answer this question, we need to think about molecules in terms of Classical Physics versus Quantum Physics. In chemistry, each chemical bond contains potential energy. The higher energy level the compounds bonds at, the less stable the compounds becomes. To make a more stable compound is a goal for many chemists because stable compounds have less of a chance to be decomposed, and in nature, many natural products being produced are those in their lowest energy states. The Classical Mechanics approach is mainly used for study of macroscopic objects in slow to stationary motion. Through studying the measureable movements through experiments, chemica lsââ¬â¢ optimal nuclear positions can be found, and the lowest energy state can be found through graphing. However, in chemistry, all chemical bonds are in constant vibration and the ability to study the energy state of electron distribution is more useful for finding the lowest possible energy state. The optimal distribution of electron can be done by quantum mechanics. To think of energy as waves in the ocean, the lowest possible position is actually quite hard to find. It is possible to find some bumps, but these might not be the lowest points. To find the lowest energy points, huge amounts of calculation are needed. At this point, computers become essential. By inputting atomic coordinates, model chemistry and basis set into the software, Gaussian, the software will do the rest of the calculations and provide correct output including atomic coordinates, energy, and a wave function. The wave function can be further interpreted into molecular orbitals, partial charges, electros tatic potential surface, chemical shifts, bond orders, and spin densities. In order to find all these information, a high degree of accuracy is required. However, computers only have a certain amount of accuracy: they can only simulate continuous functions and numbers up to a finite point, leading to an accuracy problem. In general, most chemistry calculations have a certain degree of error that is allowed as long as the relative error in within the sufficient acceptable error range. Theoretically, the precision of calculation by computer is unlimited, but in practicality, most only go as far as a certain amount. Beyond building a drug at its lowest energy state, or find a drugââ¬â¢s real conformation with incredible speed and accuracy, the huge data storage and memory capacity allow for huge amounts of library research. There are huge online drug repositories (both public and private) for researchers and scientists to search for their targeted drug. During the drug development phase, the first part of any research is to screen for lead compounds and modify these lead compounds to make them work on human biology. Because there are literally millions of compounds available to start from, how should one most efficiently find the compound desired? The answer is through computational lead compound search. Computers will input parameters given and search for lead compounds that fit the requirements and list them out with more information. Information retrieval of drug related data is an essential tool in the pharmacistââ¬â¢s tool belt. One example of a great computational research tool used for computational design of drugs is the OpenEye OMEGA software suite. OMEGA is the name of a software product belonging to the OpenEye scientific software suite. OMEGA is a powerful tool for screening toxic chemical groups and providing validation of Lipinskiââ¬â¢s rule of 5. OMEGA and vRocs have large libraries that can provide much help throughout the usage of computer-aided drug design. The OpenEye product claims that it ââ¬Å"performs rapid conformational expansion of drug-like molecules, yielding a throughput of tens of thousands of compounds per day per processor (open eye website)â⬠. This is a huge search, and without the modern memory, data storage, and speed of modern computers, this task would be impossible. At the beginning of any computational research, researchers have to get into a specific mindset. First, what disease does this researcher want to work on? Based on the disease selected, what drugs are cur rently on the market? Third, are there any other drugs can be any possible new drug candidates? At this point, researchers can start putting their desired pharmacophora into a computer, and let the computer search the library to suggest any possible candidates for further research. Automated drug screening is a good example of this type of raw processing speed and breadth of data to go through. Extensive automatic pharmacological screening for compounds is the traditional and effective method to find new drugs. The sources of compounds are available for screening on a wide range of values including synthetic compounds, natural extracts, microbial fermentation, and compounds obtained by combinatorial chemistry techniques. There are a large number of these compounds possible, so in order to avoid leakage of data across screenings, screening needs to go through a few dozen general pharmacological screening models. To have the best possible outcomes, usually the combination of computer and robates for a netter system can run a screen quickly, efficiently, and on a large scale of samples. Currently, 10à ¼g of a typical compound is a sufficient amount to go through dozens of pharmacological screenings, and as tens of thousands of compounds can be screened per day, t his provides valuable research and development of lead compounds. Within the past few years, even the regular computer is able to store a staggering amount of information. In order to perform the screening methods mentioned above, computers need to have large libraries. However, having a large library is not enough for computer to perform computational research; a certain amount of AI logic is also required. This AI logic ability as implemented through judgment causality analysis is the ability to analyze the proposition being established in order to make the appropriate countermeasures. This logic, or pattern recognition, is nowadays easily implemented by computers. OMEGA is one program can be used for pattern recognition. Drugs are used to cure diseases, but for many drugs, they can be toxic to human at the same time as they are helping us control and cure some diseases. Pattern recognition uses the computer using mathematical methods to study automatic processing techniques and interpretation models. We consider the environment and objects within as a model. With the development of computer technology, it is possible to model extremely complex human information processing. An important form of this type of modeling is the identification process on the environment and the living body object. OMEGA can take as input information on the compounds generated by Gaussian and run through GaussView to filter out toxic compounds. This filter can recognize extremely complex pattern. In this filter, many structures are programed in as toxic groups. Any compounds possessing properties of any of these toxic groups will not pass this filter. Other than toxic groups, this program can also recognize number of hydroge n bond donors (HBD) and hydrogen bond acceptors (HBA). HBD and HBA counts are important for drugs because they are important indication for if a drug candidate can be a production drug or not. Dr. Lipinski is the scientist who first comes up with a so-called ââ¬Å"rule of five.â⬠Linpinskiââ¬â¢s rule of five was created in 1997 after Christopher A. Lipinski studied 2245 drugs appear on the World Drug Index that have passed phase II clinical trials. By study these drugsââ¬â¢ structural features he came up with four rules: The molecule weight of these compounds less than 500. The number of HBD is less than 5. The number of HBA is less than 10. Log P is less than 5 (Lipinski) (Lipinski et al) Because of Lipinskiââ¬â¢s study, the number of HBA and HBD become one critical point when dealing with finding new drug candidates. The variable ââ¬Å"Pâ⬠is the lipo-hydro partition coefficient, and Log (P) is used to measure the solubility comparison of a compoundââ¬â¢s solubility of octane to water. In order to pass through the body, drugs need to be polar in order to dissolve in the bloodstream. However, a drug should not be too polar, because it needs lipophilicity to pass through cell membrane. OMEGA is able to filter all these individual factors, and provide the end user a spreadsheet with all the information contained. After initial candidates search, it is time to test if the drug has a good binding to the target protein. In the human body, drugs need to bind to target protein thereby either inhibit or excite a series of biological reactions. How well a drug can bind to its target directly affect this drugââ¬â¢s efficiency. This structure-activity relationship is related to a drugââ¬â¢s pharmacokinetics and pharmacodynamics. The chemical structure affects a drugââ¬â¢s properties, and these structures will decide which protein this drug will interact with. A drug should not be too tightly bound to the protein because in this case the drug will be very hard to be metabolized and eliminated through the body, and can cause accumulation in the body, and be toxic. To measure how well a drug can bind to its target, the software VIDA is the best choice. VIDA is a program which can visualize docking results of the drug with the protein in a 3D view. Beyond this entire skillset of detailed programs within pharmaceutical chemistry, it is also nice to have a computer that is easy to use, able to perform automatic work, and bind all these programs together. As more and more modern drug analysis use computer instruments for analysis, so many different analytical instruments and computer connection and so many different instrumentation and automation for online use are not only for the determination of electrochemical, spectroscopic, kinetic equilibrium constant, but they are also used for data processing, statistical analysis and results. This all will allow for drug analysis continue to move forward in a sensitive, accurate and rapid direction. Over the years, computer has been developing rapidly, and at the point, people are not only working on making computer faster. Instead, people trying to put this powerful Programs are designed for people, and by people, reflecting the peoples way of thinking and behavior of action, remember to replace part of the program and will be able to simulate human thinking and activities. Reference Bellis, Mary. The History of the ENIAC Computer. About.com Inventors. About.com, 16 May 2014. Web. 03 June 2014. GOLDSTINE, HERMAN H. Computers at the University of Pennsylvanias Moore School, 1943-1946. Computers at the University of Pennsylvanias Moore School, 1943-1946. PROCEEDINGS OF THE AMERICAN PHILOSOPHICAL SOCIETY, 1992. Web. 04 June 2014. Lipinski, Christopher A. Lead- and Drug-like Compounds: The Rule-of-five Revolution. Lead- and Drug-like Compounds: The Rule-of-five Revolution. Elsevier B.V., Dec. 2004. Web. 04 June 2014. Lipinski, Christopher A., FRANCO Lambardo, Beryl W. Dominy, and Paul J. Feeney. Experimental and Computational Approaches to Estimate Solubility and Permeability in Drug Discovery and Development Settings. Experimental and Computational Approaches to Estimate Solubility and Permeability in Drug Discovery and Development Settings. Elsevier B.V., Mar. 2001. Web. 04 June 2014. 1
Friday, January 17, 2020
Power-Influence Approach
The power-influence approach in studying leadership examines the influences leaders exert over others, whether these individuals are subordinates, colleagues, or even the leaderââ¬â¢s manager. Yuki (2010) writes, ââ¬Å"This research seeks to explain leadership effectiveness in terms of the amount and type of power possessed by a leader and how power is exercisedâ⬠(p. 14). Power-influence leadership assumes the cause and effect relationship between leaders and followers only flows from management to subordinate (Yuki, 2010, p. 14).For example, a manager instructs his employee to pay an invoice, and the employee does as told, or employees attend an ethics seminar because the executives mandate it. Exercising power-influence can ensure adherence to internal policies like safety, dress codes, and hours of employment. It can also ensure adherence to federal laws like the provisions in the Sarbanes-Oxley Act. The power-influence leadership approach enables a leader to influence t he behaviors and attitudes of followers (Yuki, 2010, p. 14). It is effective in managing and accomplishing tasks as a leader gives instructions that other follow.Power-influence can sway peopleââ¬â¢s thoughts and opinions, which can be beneficial in terms of innovative ideas and more efficient methods of operations. It is especially effective for those who resist change even if it will lead to progress. The power-influence method of leadership has its drawbacks as well. Some individuals use force and intimidation to accomplish certain objectives. They may use their title or position to pressure others to comply, and even though employees may obey at first, such coercion eventually leads to resistance and the undermining of authority (Alyn, 2009).For example, a manager may tell a direct report that if he does not complete a given stack of work, his quarterly review will reflect it. This is a drastic example of the negative effect of power-influence, but it does well to demonstrate how a manager can use coercion as a source of ââ¬Å"motivation. â⬠Using power to accomplish activities in an organization is a common practice among managers and executives. In fact, prior to 2011, management at Jack in the Box, Inc. depended on the power-influence approach to complete objectives.The organization believed employees required specific instruction, so management influenced subordinates and coworkers through the use of power. It is important to note that few individuals abused this power, but as the nature of the business changed, so did its leadership approach.In 2011, the executives of Jack in the Box worked to change the companyââ¬â¢s culture from one of power to one that focused on individual roles, achievements, and support. Management encouraged employees to share ideas, to question and challenge methods of operation, and to take initiative and responsibility for oneââ¬â¢s work.The ââ¬Å"you do what I sayâ⬠mentality was not the attitude the ex ecutives wanted management to express or employees to feel. Instead, the company wanted to nurture leaders to make the organization stronger and more cohesive.Power and one-directional instruction from management to subordinates prevented innovative opportunities and fresher ways of thinking, which ultimately inhibited the companyââ¬â¢s possibilities. The new culture placed management and direct reports on more level ground, and the open communication instilled trust and a sense of unity among employees of all levels.The power-influence approach in studying leadership examines the role that power plays in influencing othersââ¬â¢ actions, attitudes, and beliefs. Its use can have both positive and negative effects in the workplace, depending on the leaderââ¬â¢s intentions.ââ¬Å"Power is viewed as important not only for influencing subordinates, but also for influencing peers, superiors, and people outside the organization, such as clients and suppliersâ⬠(Yuki, 2010, p. 14). It is important for leaders to remember that others look to them for instruction, inspiration, and direction. With such power come certain responsibilities and expectations not to abuse it.
Subscribe to:
Posts (Atom)