Wednesday, October 30, 2019

Design Research - Article Critique Example | Topics and Well Written Essays - 500 words

Design Research - Critique - Article Example The authors employ purposive sampling to find and select illustrative cases of the firms that had initiated brand-building process. The authors also selected three Swedish firms with strong brand image making their results to be of note. The article also employed personal interviews as their main data collection which offers further credibility to their findings. Pre-testing of the data collection tools also offers strength to the findings and article (Aggarwal 2008, p.123). A weakness in the research article is that its study sample size of three firms appears limited and small. The article’s findings are of use considering the fragmented literature available on brand building from an internal perspective. Further, this article can be of use to managers who are interested in developing strong brands by providing indicators to how a firm can respond to scandals, geographical expansion, and or brand repositioning. The article’s findings are relevant to current practices in corporate branding. It further highlights emergent trends that should provide base for future research in regard to the implementation phase of corporate branding (Glynn & Woodside 2009, p.63). The article has a good structure as it provides an abstract first, then a literature review, followed by methodology, then the results and a conclusion. It makes it easy for the reader to follow and understand its contents. In their article ‘innovation, growth, and getting to where you want to go’, Ryan Jacoby and Diego Rodriguez seek to give advice to their readers on how to thoughtfully structure the innovation process (Jacoby & Rodriguez 2007, p.10). They aim at presenting managers with a model that helps them to assess and direct innovation efforts. The authors provide evolved and refined tools that employ design thinking to assist their clients to shape their innovation efforts. The strength of the article lies in its step by step approach towards design

Monday, October 28, 2019

Data Protection Act Essay Example for Free

Data Protection Act Essay Evaluate ways in which concerns about poor practice can be reported whilst ensuring whistle blowers and those who practice or behaviour being questioned are protected. The whistle blowing policy states that it is committed to openness, probity and accountability. The policy gives a voice to employees and others who have concerns about malpractice or feel that someone is not doing their job in school. In policies provide help and support if a member of staff for others need to speak up and feel that they are been supported. The school will take any concerns seriously and deal with them following procedures. The purpose of the policy is to make people feel that they are someone to talk to voice their concerns. How to raise the concern, you need to speak to a member of the SLT or write to the chair the governors. You will get a response within five working days. You will be asked to attend a meeting to voice your concerns and discuss them, they ask you write the problem down and give the names dates and places. After the meeting within 10 days you will receive a letter of your concern has been received and it outlined the issues and then tell you how they will deal with the matter if needed. If the SLT or chair a governor decides that an investigation is needed they will advise local authority, procedures for safeguarding of children will be followed. The investigation will not be carried out by anyone in your line management. If an investigation is carried out you will be informed of what is happening. The information that will be given to you may not be all the data involved because of the data protection act. If there is an anonymous allegation it can often be difficult to investigate it is better to raise concern in person. Anonymous allegations are investigated if the issue is a serious, the credibility of the allegation, being able to confirm the allegation (enough evidence). How the school trees whistleblowers. If you make an allegations in good faith no action will be taken against you if you make malicious allegations then disciplinary action can be taken against you. Disciplinary action can also be taken against other members of staff who try and stop employees raising concerns. Anybody who raises a concern has the opportunity to give feedback about any problems that you may have received this is so employees who raise a concern in good faith does not suffer.

Saturday, October 26, 2019

Harry Potter and the Prisoner of Azkaban :: Harry Potter and the Prisoner of Azkaban

Harry Potter and the Prisoner of Azkaban - Summary and Evaluation Summary: The book â€Å"Harry Potter and the Prisoner of Azkaban† is the third book in the series about Harry Potter. In this book, Harry is in his third year at Hogwarts School for Witchcraft and Wizardry. The Prisoner of Azkaban in this book is Sirius Black, who everyone believes is responsible for killing 13 muggles (non-wizards). They also believe he told Voldemort where Lilly and James Potter were hiding. Azkaban is a prison where evil wizards are jailed. At the beginning of the book, Sirius escapes from Azkaban. At Hogwarts, there is a worry that Sirius will come after Harry. There are guards posted around the school. The guards are called Dementors, which are not human, and they feed off human souls and energy. The Dementors have a strange effect on Harry, which makes him blank out and hear his mother’s dying words. Professor Lupin helps Harry create a Patroness to help fight off the effects of the Dementors. While all this is happening, Harry is training for the Quiddich cup championship at school. Harry sees Crookshanks, the cat, wandering around with a big black dog during the night. It turns out that Sirius is an animongous, disguised as the big black dog. After many twists and turns in the story, Sirius ends up meeting Harry. Sirius is really not bad and it is Peter Pettigrew (the rat) that did all the bad things. Sirius and Harry become friends but Pettigrew gets away. Dumbledore, the head of the school, decides that Dementors will never be at the school again because they tried to attack two students. Of course, Harry’s team also wins the Quiddich championship! †¦Ã¢â‚¬ ¦ 'The Worst Birthday' ---  Ã‚  Ã‚  Ã‚  Ã‚  Before you start reading the book (and if you've read the previous book!) get the children to make a list of all the important things that happened in the first book that they think the reader will need to know in order to understand and enjoy the second book. Which information is the most important? Which information could the reader manage without? Make a checklist and tick off the information as you read through the second book and as J.K. Rowling mentions it. (GP)   Ã‚  Ã‚  Ã‚  Ã‚  Get the children to write an 'Introduction to Harry Potter' -> the intended audience is a person who hasn't read the first book and wants to understand what all the fuss is about before reading the second book. Harry Potter and the Prisoner of Azkaban :: Harry Potter and the Prisoner of Azkaban Harry Potter and the Prisoner of Azkaban - Summary and Evaluation Summary: The book â€Å"Harry Potter and the Prisoner of Azkaban† is the third book in the series about Harry Potter. In this book, Harry is in his third year at Hogwarts School for Witchcraft and Wizardry. The Prisoner of Azkaban in this book is Sirius Black, who everyone believes is responsible for killing 13 muggles (non-wizards). They also believe he told Voldemort where Lilly and James Potter were hiding. Azkaban is a prison where evil wizards are jailed. At the beginning of the book, Sirius escapes from Azkaban. At Hogwarts, there is a worry that Sirius will come after Harry. There are guards posted around the school. The guards are called Dementors, which are not human, and they feed off human souls and energy. The Dementors have a strange effect on Harry, which makes him blank out and hear his mother’s dying words. Professor Lupin helps Harry create a Patroness to help fight off the effects of the Dementors. While all this is happening, Harry is training for the Quiddich cup championship at school. Harry sees Crookshanks, the cat, wandering around with a big black dog during the night. It turns out that Sirius is an animongous, disguised as the big black dog. After many twists and turns in the story, Sirius ends up meeting Harry. Sirius is really not bad and it is Peter Pettigrew (the rat) that did all the bad things. Sirius and Harry become friends but Pettigrew gets away. Dumbledore, the head of the school, decides that Dementors will never be at the school again because they tried to attack two students. Of course, Harry’s team also wins the Quiddich championship! †¦Ã¢â‚¬ ¦ 'The Worst Birthday' ---  Ã‚  Ã‚  Ã‚  Ã‚  Before you start reading the book (and if you've read the previous book!) get the children to make a list of all the important things that happened in the first book that they think the reader will need to know in order to understand and enjoy the second book. Which information is the most important? Which information could the reader manage without? Make a checklist and tick off the information as you read through the second book and as J.K. Rowling mentions it. (GP)   Ã‚  Ã‚  Ã‚  Ã‚  Get the children to write an 'Introduction to Harry Potter' -> the intended audience is a person who hasn't read the first book and wants to understand what all the fuss is about before reading the second book.

Thursday, October 24, 2019

Interpretation of Shakespeares Romeo and Juliet :: Shakespeare, Romeo and Juliet

Interpretation of Romeo and Juliet What would cause young lovers to mysteriously commit suicide so they can be together? Is it their parents who forbid them to see one another, or is it themselves? William Shakespeare's play, Romeo and Juliet, tells about two young "star-crossed lovers" whose deaths were caused by fate, not their parents or themselves. First of all, Romeo and Juliet were from feuding families: Romeo a Montague, and Juliet a Capulet. Romeo was so depressed about his unrequited love for Rosaline when it just so happens, he goes to a masquerade party. There, he falls for Juliet, the daughter of Lord Capulet, and forgot about Rosaline. When they're finally torn apart, that's when both Romeo and Juliet realize they are from enemy families. Their love, of course, brings down their immediate marriage and Friar Lawrence agrees in hope to stop the feuding families. Unfortunately, Tybalt and Mercutio are killed and Romeo gets banished leaving Juliet without a husband or a cousin. "O, I am a fortune's fool," (Act III, Scene I) explains how Romeo felt at the moment of Tybalt's death. He felt that he fell into one of fate's many cruel games and it was too late to get out. When things are just getting worst, Lord Capulet arranges for Juliet to marry Paris causing Juliet to panic. She then has to hurry and do something to stop the wedding and of course fate would just happen to guide her back to Friar Lawrence. Fate wouldn't just stop there. He just kept on going. He has it arranged that Friar John, the messenger who was suppose to deliver the news of Juliet's fake death, quarantined. Romeo finds out that Juliet is dead from Balthazar and screams out, "Is it e'en so?--Then I defy you, stars!" (Act 5, scene 1, pg. 213). He blames Juliet's death on fate and returns to Verona with poison to join her. He leaves a little before Friar John tells Friar Lawrence about his failure to deliver the message. Still, fate didn't stop there. He then makes Friar Lawrence leave his cell and rush to the Capulet vault . Unfortunately, Friar Lawrence is just a little too late and Romeo gets there before he

Wednesday, October 23, 2019

Quote from Hamlet Essay

â€Å"Thus conscience does make cowards of us all†. These words said by Hamlet are very strong in meaning and really do make a lot of sense. I agree with this quote. I really do believe that a person’s guilty conscience may cause them to have fear of doing what is right or of telling another person the truth or what needs to be said. A person’s conscience is what tells the person what is right and it lets the person know when he or she has committed something that is morally wrong. A conscience does not force the person to do anything, but it does let them know when they are wrong and this guilt can lead the person to act in different ways. A guilty conscience is extremely difficult to deal with because no matter what you do or how you try to block out what you have on your mind, your conscience is always there letting you know that you have done something wrong. It is almost like carrying a 1,000-pound load on your back and trying to walk straight. It is nearly impossible to go on normally through the day with your guilty conscience knocking on your mind and never letting you rest. A conscience can also let a person know that he or she should not do something because it is wrong. In Hamlet’s case, he states that his conscience is letting him know that killing his uncle would be extremely wrong, and this is why he is acting like a coward and putting it off. I can’t really blame Hamlet for being afraid of killing somebody. Murdering somebody is a big deal and it can come with many consequences if you are caught. In a way, your conscience is like an interior parent who is looking out for you and letting you know all the right things to do so that you won’t regret doing anything wrong later. A guilty conscience can help out by scaring the person into doing what is right or into not doing what is wrong. Sometimes a person can want to do something that is wrong so badly, but his or her conscience won’t allow it. One night during the summer a friend of mine was home alone and she wanted me to sneak out of my house and go see her. I was both nervous and excited at the same time, but I knew that if I were to get caught I would be in so much trouble. I planned everything out  and waited for my parents to fall asleep that night before I started doing anything. Once they were asleep I snuck downstairs, grabbed the keys to one of my dad’s trucks, and made my way to the back of my house. I opened the door and my dogs started barking like crazy. That is what scared the hell out of me. I really thought that my parents were going to wake up and bust me. It scared me so much that I completely wussed out and called everything off. I decided that unless I was never going to be able to see the girl again that I shouldn’t risk getting caught and grounded for a really long time. So I just called my friend and told her that I would see her some other time. She understood completely and it turned out that she was just as scared as I was. My conscience made me act like a total coward, but it also saved me from getting a beating from my parents. Consciences are a part of life and they were created by God for a reason. In my opinion they serve a great purpose and can really help to clean up the wrongs of our world little by little. Guilty consciences should not be ignored because they are telling you what the right thing to do is. Of course not everybody will do the right thing, but one right is better than one wrong.

Tuesday, October 22, 2019

MANUFACTURING PROCESS Essays - Health, Pharmacology, Free Essays

MANUFACTURING PROCESS Essays - Health, Pharmacology, Free Essays MANUFACTURING PROCESS LAYOUT What is Manufacturing process? Manufacturing p rocess can be defined as one or more activities involved in the transformation of Inputs (raw material or information) to a tangible or intangible output. Basic steps involved in each type of process: Planning Planning is about how to meet demand with available resources by developing a set of metrics to monitor the supply chain for high quality and value. Sourcing Sourcing is about selection of the suppliers which will deliver raw materials required for production. Keys Tools/Tasks needed to be managed: 1) Pricing . 2) Delivery Process . 3) Payment Process. 4) Relations (both B2B and B2C). 5) Receiving and transferring of Supplies/Payment to Manufacturing Cell/Suppliers. Making Making is about production of goods and services. It requires scheduling of manufacturing process to meet the demand with Speed (less time), Quality, Quantity and Work Productivity. Delivery It refers to the logistic processes i.e. moving product to Warehouse or to Retailers. Key Tools/Metrics: Seven R's - 1) Right Place 2) Right Price 3) Right Cost 4) Right Time 5) Right Product 6) Right Quality 7) Right Quantity. Returning It is about process of receiving worn-out , defective and excess products back from customer, and support for customers who have problem with delivered products. Manufacturing Process of Torrent Pharma Pvt Ltd? All the steps involved in the manufacturing process of Torrent pharma is as following: Planning The company have its presence in more than 40 countries and each country has its own set of rules and requirement when it comes pharmaceuticals industry. Every country has to go through some background check about the quality of the drugs provided by a pharmaceutical company. For example: Product shipping to USA will always be labelled in white colour and product shipping to Vietnam or Malaysia will be labelled in yellow in colour. Moreover, as India has Central Drug Standard Control Organisation (CDSCO) and Food Safety and Drug Administration (FSDA), other countries also have similar bodies which controls the type and quality of the drug which can be sold in the market. Thus, to meet all the country's basic norms about the importing a drug from another country torrent pharma has to procure all the raw materials as well as the packaging materials as per each country's requirement. Sourcing Torrent Pharma requires approximately 202 chemicals and molecules as a raw material to produce its wide range of products. Also, in some countries combination of different molecules of a drug is allowed but in country like USA with generic medicine business they are forced to make drug of single purpose. Thus, torrent plans it sourcing accordingly. Torrent pharma produces its own 15% of raw materials and rest is either imported from china (20-30%) and other raw materials are sourced from Indian companies dealing in pharmaceuticals raw materials. A few of the companies as stated by the supply chain manager of torrent pharma are following (This are not the only companies from which they buy, others are small manufacturers in South India): Avi Pharmachem D eals in pharmaceuticals raw materials like pharmaceutical excipients etc. Business Type: Wholesale Suppliers Address: Shop No.-1, Opp. Hotel City Look, Sai Road, Baddi , Himachal Pradesh India Singhal Corporation D eal in pharmaceutical raw material , active pharmaceutical ingredients etc. Business Type: Wholesale Suppliers Address: 39/1, Shivdutt Nagar,Dapodi Road,Pimple Gurav,Pune 411027, Maharashtra India Benson Inc Wholesale suppliers of pharmaceutical raw materials , chemical, dyes, pigments, etc. Business Type: Exporters / Manufacturer / Wholesale Suppliers Address: 38/b-1, 1r Vasu, 1st Road, Tps -vi, Milan Subway, Santacruz (west), Mumbai, Maharashtra India Ace Chemicals Exporters of Pharmaceutical Drugs, Anti Allergic Drugs, Anti-Cancer Drugs, Anti Diabetes Drugs, etc. Business Type: Manufacturer / Exporters / Wholesale Suppliers Address: No 3/1-2, 1st Floor, Basappa Road, Off K H Road, Shantinagar , Bangalore, Karnataka India Indus Pharmaceuticals D eals in condoms, pharmaceutical chemicals, pharmaceutical raw material , pharmaceutical ingredients, pharmaceutical injection, A loe Vera , tea, skin care creams, woman sanitary napkin, moisturizing lotion, thermal papers, coffee etc. Business Type: Wholesale Suppliers / Exporters / Manufacturer Address: 24 Subramaniam Street, Abiramapuram , Chennai, Tamil Nadu India Making Manufacturing of drugs is a various step process. All the employees involved in the

Monday, October 21, 2019

discrimination among the youth Essays

discrimination among the youth Essays discrimination among the youth Essay discrimination among the youth Essay Essay Topic: 6th Grade Outline Introduction a. Thesis : No matter how innocent the Medias appear to be, whats being communicated is desensitizing and reinforcing discrimination among the youth b. Plan: address arguments as they appear in paragraphs c. Background info: Personal example, questioning, going for a more emotional start. Supporting argument a. How much time people/youth spend watching TV and on the web and how it factors into how they think and form biases. b. What messages the media is telling why its targeting the younger audience. The outcome of those messages are telling ounger crowds its cool to display or act out negative stereotypes which they get discriminated against. c. Children arent born with discriminations, they are taught them or allowed to have them Assessment of objections a. Responsible parents will guide and direct a child, by limiting his or her viewing time and monitoring content. b. Discrimination is a dying idea, and we as a race have moved on so its okay to make light of the stereotypes. It makes for entertaining movies and news. No real harm done. c. Children grow out of things Conclusion a. Reinstate the thesis. b. Bring new meaning to the thesis and provide sum thoughtful solutions c. Close with a poem. The discrimination of youth Lets imaging for a moment that I am a young brave 19 year old fresh out of high school. If I were to be making a choice between going to the movies with one friend rather than another based on uncomfortable feelings, there wouldnt be anything unusual about it. But, lets say I chose that one friend over the other based on how their race makes me feel uncomfortable, now things are starting to push out of bounds. Then, I go a step further and make it a point to tell others that they shouldnt ang out with African American males because they all carry weapons and that makes them all dangerous. I would then be the walking definition ot racial discrimination because IVe singled out a certain group of people with an unfair understanding rather than focusing on the qualities of that one friend. History tells us that somebody somewhere has these views, but to suggest that I was born thinking that African males are all dangerous seems pretty unlikely. This is a stereotype and the ground for which racial discrimination builds on. Children grow up believing what their environment surrounds them with, which means that iscrimination of any kind is a learned notion and not totally self generated. There are many causes for these biases to form in young minds but I believe that the most important cause of today is the saturation of mass media and its influence. Regardless of how innocent the Medias appear to be, whats being communicated is desensitizing and reinforcing discrimination among the youth. Did you know that according to the Nielsen numbers the average American spends about 4 hours a day watching TV, thats almost 30 hours a week and 2 full months a year glued to the tube or popular social media sites. Americans as a single group watch annually 250 billion hours of television (Nielsen 6) and spend about the same amount of time listening to music. Yet interestingly enough when a survey was conducted nearly half of adult Americans admitted that they watch too much television and wish they hadnt. When asked about their children they said the same thing but with a higher number of exceptions and excuses as to why they dont enforce a limit on view time. Excuses such as l need time for myself, my child has ADD and will only sit still while watching TV and its not so bad because they are oung and cartoons are harmless but some shows arent appropriate. So to make sense of this correctly, Americans know that they watch too much television but when it comes to their children theyre more concerned about the content then the time spent idle. Media defenders state that responsible parents set limits because they dont want their children exposed to violence and adult themes, claiming they understand that it would damage teachings about discrimination and morality. True, but the problem is that when I was 10 1 watched anything I wanted because I knew ore about the channel guide than my parents did. In a study done by A. C. Nielsen CO the number of hate-crimes and murders a child sees before finishing elementary school is 8000 and 200,000 before adulthood despite parental guidance. Large amounts of popular music has also added its sway with the use of more and more explicit content. Just on the surface their lyrics include discriminating against women as disposable sexual objects and boastful lies to everyone about the Joys of doing and selling drugs, need I go on? Most messages the media send to children are harmless and entertaining but in o way come from the heart of a nonprofit organization. Movies and shows are planned out and obviously marketed toward a younger audience which is perfectly legal. Skeptics believe that since discrimination of all kinds has lessened over the years its safe enough to Just ignore it. This might be okay for grownups, however as children grow up they begin to role model their peers, parents and older siblings thinking that what they do is important and acceptable. In many sad cases where a child is abused by someone older it often leads to an unhealthy outlet of some sort. Theres a saying that misery loves company and there are whole genres of music and tilms devoted to wallowing in it Children dont completely understand now the world works yet so when certain stereotypes of people are presented on screen in a way that relates to them, it reinforces a notion the child may desire to belong to. For example the term emo has a lot of loose meanings but from what I understand, its an awful stereotype; its a young person who is very emotional, dressed in a darker manner who listens to depressing music and might be afflicting physical injury on themselves. If this preconception is so negative then why do kids every day in high school associate themselves with being emo? I argue because both home life (including social media, magazines and music) and public life (school) influence them so immensely that they tolerate discrimination aimed at themselves. Its estimated that the average youth spends almost 900 hours at school per year and 1 500 hours watching TV or surfing the internet (Nielsen 20, 21). The reality is that adults are busy and cant monitor every moment of their childs life. The final point I want to make is that again no one is born biased. The media has been influential is raising a generation of young people who dont understand themselves and on top of that believe in clich? © unrealistic lifestyles. African American Rappers pump out lyrics and music videos about driving Cadillacs, escaping from the cops, getting with every hot girl and drinking till 4 am in the morning. In my own experience growing up I have known many African Americans peers who idolized these rappers and acted Just like them. A vivid example I remember was in 6th grade when a shy pretty girl in my class asked if she could blow her nose, immediately one f my black friends shouted you a dirty hoe! that followed with a crying girl and 3 day suspension. I still dont blame him though, for acting that way, I blame first his parents and second the garbage I knew he listened to. There was no need for him to shout that but he felt compelled by what he thought was cool or funny to say. I fully understand that people grow out of things and discrimination can change but thats not the issue here. Whats substantial is the amount of evidence piled high against the media. In a cover story about the new 2013 M rated game Grand Theft Auto, a tore clerk spoke out about how many copies he sold to parents who didnt give a dam about how old their child was (Kotaku 1). The gameplay consisted of Joining a gang of murderers, theft and a whole bunch of prostitution. Thats right, parents are openly inviting their child to commit digital hate crimes and laugh at situations they arent old enough to handle. So now IVe seen it all. Singer-songwriter Jack Johnson is a well-known childrens folk artists and he talks about the real root of the problem namely the human condition, singing it was you, it as me, it was every man, we all got the blood on our hands, we only receive what we demand and if we want hell then hells what well have (on and on album) meaning that the media is Just a two way mirror reflecting the things we want to see. He accounts the invention of the television as magic at first, but let everyone down, now this worlds gonna hurt, u better turn that thing down, or turn it around (on and on album). The invention of TV was amazing at first and Ill be the first to say how much I love watching movies but there is definitely too many inappropriate things on elevision these days. I will admit that as responsible adults we must be more aware of the digital age and rate its expanding, every precaution to make it harder for children to witness violent or racial events should be taken seriously. Youth centers are an ettective way to reach children because they instill good morals and reveal the media messages that could potentially cause biases. Responsive steps also include crack downs on rating enforcers to make it harder for children or irresponsible parents to purchase mature material and more protocols for social media sites. I could spend all day coming up with responses to combat the Medias influence but conclusively, as long as critics are bribed into writing false reviews and Hollywood is making money, I fear there will be an ever going cycle of discrimination. Work cited www. kotaku. com. . K0taku, 2309 2013. web. 18 NOV 2013.. Herrman, Norman. Television and Health. 2007 the sourcebook for teaching science. California state university, n. d. Web. 19 Nov 2013.. Discrimination and the media. CHildren and discrimination. children rights information, 01 7 2013. web. 19 NOV 2013.

Sunday, October 20, 2019

Hisarlik, Scientific Excavations at Ancient Troy

Hisarlik, Scientific Excavations at Ancient Troy Hisarlik (occasionally spelled Hissarlik and also known as Ilion, Troy or Ilium Novum) is the modern name for a tell located near the modern city of Tevfikiye in the Dardanelles of northwest Turkey. The tell- a type of archaeological site that is a tall mound hiding a buried city- covers an area of about 200 meters (650 feet) in diameter and stands 15 m (50 ft) high. To the casual tourist, says archaeologist Trevor Bryce (2002), excavated Hisarlik looks like a mess, a confusion of broken pavements, building foundations and superimposed, crisscrossing fragments of walls. The mess known as Hisarlik is widely believed by scholars to be the ancient site of Troy, which inspired the marvelous poetry of the Greek poet Homers masterpiece, The Iliad. The site was occupied for some 3,500 years, beginning in the Late Chalcolithic/Early Bronze Age period about 3000 BC, but it is certainly most famous as the probable location of Homers 8th century BC stories of the Late Bronze Age Trojan War, which took place 500 years earlier. Chronology of Ancient Troy Excavations by Heinrich Schliemann and others have revealed perhaps as many as ten separate occupation levels in the 15-m-thick tell, including Early and Middle Bronze Ages (Troy Levels 1-V), a late Bronze Age occupation presently associated with Homers Troy (Levels VI/VII), a Hellenistic Greek occupation (Level VIII) and, at the top, a Roman period occupation (Level IX). Troy IX, Roman, 85 BC-3rd c ADTroy VIII, Hellenistic Greek, founded in the mid-eighth centuryTroy VII 1275-1100 BC, quickly replaced the destroyed city but itself destroyed between 1100-1000Troy VI 1800-1275 BC, Late Bronze Age, the last sublevel (VIh) is thought to represent Homers TroyTroy V, Middle Bronze Age, ca 2050-1800 BCTroy IV, Early Bronze Age (abbreviated EBA) IIIc, post-AkkadTroy III, EBA IIIb, ca. 2400-2100 BC, comparable to Ur IIITroy II, EBA II, 2500-2300, during the Akkadian empire, Priams Treasure, wheel-made pottery with red-slip potteryTroy I, Late Chalcolithic/EB1, ca 2900-2600 cal BC, hand-made dark burnished hand-built potteryKumtepe, Late Chalcolithic, ca 3000 cal BCHanaytepe, ca 3300 cal BC, comparable to Jemdet NasrBesiktepe, comparable to Uruk IV The earliest version of the city of Troy is called Troy 1, buried beneath 14 m (46 ft) of later deposits. That community included the Aegean megaron, a style of narrow, long-room house which shared lateral walls with its neighbors. By Troy II (at least), such structures were reconfigured for public use- the first public buildings at Hisarlik- and residential dwellings consisted in the form of several rooms surrounding interior courtyards. Much of the Late Bronze Age structures, those dated to the time of Homers Troy and including the entire central area of the Troy VI citadel, were razed by Classical Greek builders to prepare for the construction of the Temple of Athena. The painted reconstructions that you see show a hypothetical central palace and a tier of surrounding structures for which there is no archaeological evidence. The Lower City Many scholars were skeptical about Hisarlik being Troy because it was so small, and Homers poetry seems to suggest a large commercial or trading center. But excavations by Manfred Korfmann discovered that the small central hilltop location supported a much larger population, perhaps as many as 6,000 living in an area estimated to be about 27 hectares (about one-tenth of a square mile) lying adjacent to and stretched out 400 m (1300 ft) from the citadel mound. The Late Bronze Age parts of the lower city, however, were cleaned out by the Romans, although remnants of a defensive system including a possible wall, a palisade, and two ditches were found by Korfmann. Scholars are not united in the size of the lower city, and indeed Korfmanns evidence is based on a fairly small excavation area (1-2% of the lower settlement). Priams Treasure is what Schliemann called a collection of 270 artifacts he claimed to have found in within palace walls at Hisarlik. Scholars think it is more likely that he found some in a stone box (called a cist) among building foundations above the Troy II fortification wall on the western side of the citadel, and those probably represent a  hoard  or a  cist grave. Some of the objects were found elsewhere and Schliemann simply added them to the pile. Frank Calvert, among others, told Schliemann that the artifacts were too old to be from Homers Troy, but Schliemann ignored him and published a photograph of his wife Sophia wearing the diadem and jewels from Priams Treasure. What seems likely to have come from the cist includes a wide range of gold and silver objects. The gold included a sauceboat, bracelets, headdresses (one illustrated on this page), a diadem, basket-earrings with pendant chains, shell-shaped earrings and nearly 9,000 gold beads, sequins and studs. Six silver ingots were included, and bronze objects included vessels, spearheads, daggers, flat axes, chisels, a saw, and several blades. All of these artifacts have since been stylistically dated to the Early Bronze Age, in Late Troy II (2600-2480 BC). Priams treasure created a huge scandal when it was discovered that Schliemann had smuggled the objects out of Turkey to Athens, breaking Turkish law and expressly against his permit to excavate. Schliemann was sued by the Ottoman government, a suit which was settled by Schliemann paying 50,000 French Francs (about 2000 English pounds at the time). The objects ended up in Germany during World War II, where they were claimed by the Nazis. At the end of World War II, Russian allies removed the treasure and took it to Moscow, where it was  revealed in 1994. Troy Wilusa There is a bit of exciting but controversial evidence that Troy and its troubles with Greece might be mentioned in Hittite documents. In Homeric texts, Ilios and Troia were interchangeable names for Troy: in Hittite texts, Wilusiya and Taruisa are nearby states; scholars have surmised recently that they were one and the same. Hisarlik may have been the royal seat of the king of  Wilusa, who was a  vassal to the Great King of the Hittites, and who suffered battles with his neighbors. The status of the site- that is to say the status of Troy- as an important regional capital of western Anatolia during the Late Bronze Age has been a consistent flashpoint of heated debate among scholars for most of its modern history. The Citadel, even though it is heavily damaged, can be seen to be considerably smaller than other Late Bronze Age regional capitals such as  Gordion, Buyukkale, Beycesultan, and  Bogazkoy. Frank Kolb, for example, has argued fairly strenuously that Troy VI was not even much of a city, much less a commercial or trade center and certainly not a capital. Because of Hisarliks connection with Homer, the site has perhaps unfairly been intensively debated. But the settlement was likely a pivotal one for its day, and, based on Korfmanns studies, scholarly opinions and the preponderance of evidence, Hisarlik likely was the site where events occurred that formed the basis of Homers  Iliad. Archaeology at Hisarlik Test excavations were first conducted at Hisarlik by railroad engineer John Brunton in the 1850s and archaeologist/diplomat  Frank Calvert  in the 1860s. Both lacked the connections and money of their much-better-known associate,  Heinrich Schliemann, who excavated at Hisarlik between 1870 and 1890. Schliemann heavily relied on Calvert, but notoriously downplayed Calverts role in his writings. Wilhelm Dorpfeld excavated for Schliemann at Hisarlik between 1893-1894, and  Carl Blegen  of the University of Cincinnati in the 1930s. In the 1980s, a new collaborative team started at the site led by  Manfred Korfmann  of the University of Tà ¼bingen and  C. Brian Rose  of the University of Cincinnati. Sources Archaeologist Berkay Dinà §er has several excellent  photographs of Hisarlik  on his Flickr page. Allen SH. 1995.  Finding the Walls of Troy: Frank Calvert, Excavator.  American Journal of Archaeology  99(3):379-407. Allen SH. 1998.  A Personal Sacrifice in the Interest of Science: Calvert, Schliemann, and the Troy Treasures.  The Classical World  91(5):345-354. Bryce TR. 2002.  The Trojan War: Is There Truth behind the Legend?  Near Eastern Archaeology  65(3):182-195. Easton DF, Hawkins JD, Sherratt AG, and Sherratt ES. 2002.  Troy in recent perspective.  Anatolian Studies  52:75-109. Kolb F. 2004. Troy VI:  A Trading Center and Commercial City?  American Journal of Archaeology  108(4):577-614. Hansen O. 1997. KUB XXIII.  13: A Possible Contemporary Bronze Age Source for the Sack of Troy.  The Annual of the British School at Athens 92:165-167. Ivanova M. 2013.  Domestic architecture in the Early Bronze Age of western Anatolia: the row-houses of Troy I.  Anatolian Studies  63:17-33. Jablonka P, and Rose CB. 2004.  Forum Response: Late Bronze Age Troy: A Response to Frank Kolb.  American Journal of Archaeology  108(4):615-630. Maurer K. 2009.  Archeology as Spectacle: Heinrich Schliemanns Media of Excavation.  German Studies Review  32(2):303-317. Yakar J. 1979.  Troy and Anatolian Early Bronze Age Chronology.  Anatolian Studies  29:51-67.

Saturday, October 19, 2019

Academic Writing Essay Example | Topics and Well Written Essays - 500 words

Academic Writing - Essay Example The writer must also try and avoid the use of alliteration in order to make the essay sound definitive. Every excellent piece of academic writing must contain a break between sentences; longer sentences are tougher to comprehend and thus parenthetical clauses should be avoided as far as possible. The writing should be as precise as possible because making use of various adjectives and adverbs within a single sentence creates the impression of redundancy. As far as possible, the writer should avoid writing with contractions and exclamation marks should not be used. The style of the writing also needs to be consistent in order to maintain a flow of the article and keep the reader hooked. A proper critique and evaluation of the subject must be followed with a summary, conclusion as well as proper references as well. A rhetorical mode is essentially a strategy that helps to present a piece of writing. Various rhetorical modes of academic writing are used in the form of a compare contrast method, cause and effect relationship, argument, classification, exemplification, description and narration. Every paragraph within such a piece of writing should contain at least one of these modes because they assist in making careful analyses of the subject that is being talked about within the paper. Research terminology on the other hand, helps a person to comprehend how one may read and interpret an academic essay in order to apply what one has learnt in an effective manner. They include aspects like an abstract, construct, correlation, statistics, validity etc. Finally, every academic article is also a piece of intellectual property; it must thus have an honest attribution attached to it. Plagiarism is a way of stealing another person’s written work and using it as one’s own. In other words, plagiarism means using accidentally or deliberately, another person’s written material without providing

Friday, October 18, 2019

Splash Corporation Case Study Example | Topics and Well Written Essays - 1500 words

Splash Corporation - Case Study Example Therefore, the Splash personnel needs to develop the product in such a way that attracts the customers of different cultures. By involving the partners in terms of examining the culture, treating the partners as family members and adopting strategic leadership and management style, the Splash has improved in the business. Developing new technology has created an impact on the business. Splash has set up the Splash Research Institute to constantly expand new products that would persuade the fast rising requirements of the customer care market by utilizing cutting-edge technology. Another change was on the development of a management team who has an immense knowledge of the preferences and needs of the customers of the Asian countries. The business believes that by creating a change in the values and difference in the customers, the business can withstand with the international competitors. The tastes of consumers differ from country to country. With the help of an effective marketing strategy they can satisfy the consumers of different countries. Strengthening the Indonesian markets will help the company to compete in the international market. The creation of an international identity will help the firm to build strong relationship with the foreign customers. The firm needs to use an effective branding strategy. Effective use of branding and distribution strategy will help the firm to find a place in the Indonesian market. A new branding strategy will help to adopt a new market segment. The business can concentrate on the men consumers and develop products for men. Strategies of the Splash products are reflected on its advertisement and products strategies. Multinational competitors of the Splash normally carried their products and had attained more mature phase of the product life cycle. So such ads were targeted to appeal to poignant aspect of their particular products.   Their ads featured good-looking and glamorous ladies, whom the men

Ban Advertising that Preys upon Children Essay Example | Topics and Well Written Essays - 2000 words

Ban Advertising that Preys upon Children - Essay Example An expert on marketing to children, Professor James U. McNeal, stated that, "Virtually every consumer-goods industry, from airlines to zinnia-seed sellers, targets kids." Parents and school administrators alike find it improbable to control such influences that bear upon the children. Ironically, some advertisers exploit the children's weaknesses to make them want and eventually buy products. For instance, the President of the Shalek Agency, Nancy Shalek told the Los Angeles Times that "Advertising at its best is making people feel that without their product, you're a loser. Kids are very sensitive to that. If you tell them to buy something, they are resistant. But if you tell them that they'll be a dork if they don't, you've got their attention. You open up emotional vulnerabilities and it's very easy to do with kids because they're the most emotionally vulnerable." (Harris) Oliver James a psychologist stated in The Economic Times that UK is filled with "Affluneza-afflicted consumers [ready] for marketers to play on their [ever-present] desire to constantly compare themselves negatively with others." The "Affluenza" virus is said to be a form of 'sickness' that is greatly caused by materialism. A result of this illness would be depression, anxiety, substance abuse, and personal disorder. Those who are afflicted by this virus watch more television, and are more likely to be dissatisfied with their lives than those who seldom watch. When asked to compare their lives with those they see on the television, they view themselves negatively and inferior compared to these characters. As an example, schoolchildren who compare their own performances in school to the best and brightest pupils they see on television. Without proper adult guidance, these children will develop inferiority that may affect their social skills. Another factor why corporations prey on our children is because of the fact the children can nag, and Cheryl Idell knows a lot about nagging. She has written reports for major companies as read in such articles, "The Art of Fine Nagging" and "Nag Factor". Idell said that nagging can cause frequent buying activities of children's products such as clothing, toys, and video games; or entirely affect the family's diet because of regular trips to fast-food restaurants. She explains further that there are two categories to where nagging falls into. "There is persistent nagging, the fall-on-the-floor kind, and there is important nagging, where a kid can talk about it." (Schoolman) Idell advises numerous corporations that getting kids to whine is better, even better when they can be given "a specific reason to ask for the product." To most ways, it appears as if her task is to make lives miserable since she rates the success of a product to how a child can nag and temptingly ask for it. Some of the most successful companies that belong to the top of this list are McDonald's, Burger King, OshKosh, Disney, and Pizza Hut. (Western Initiative Media World Wide Web) There has been a huge shift in the way

Thursday, October 17, 2019

Davis v. The Board of County Commissioners of Doa Ana County Essay

Davis v. The Board of County Commissioners of Doa Ana County - Essay Example This made Herrera resign from his work in order to evade the disciplinary action. After a few days, the supervisor wrote a letter on behalf of Herrera to the MVH revealing that Herrera was an excellent worker arguing that he was confident that other prospective employees will notice (Walsh (2010, p. 148). Another supervisor of the Detention Centre made some verbal references that praised Herrera as a good worker who will contribute to effective organization performance. This made the plaintiff, the third party in this case to sue the Detention County for negligent misinterpretations of providing misleading information. This misinformation was provided by Mochen and Steele, employees at the Detention Center, which enabled Herrera to be employed again at the MVH. This legal issue was seen as a threat to employee; thus the plaintiff to be assaulted; hence sorted to accuse the board of county commissioners of Dona Ana County. The court concludes that Dona Ana Country deserves to be accountable for negligent referral (misinterpretation) due to positive references. When Herrera got a position as mental health technician, he was allegedly accused of sex assault by the plaintiff and physically abused female patients. In case an organization provides misleading references that can contribute to harm of employees in the new job, the jurisdictions have the right to sue that organization for negligent referral. According to Kohn, Kohn and Colapinto (2004), the court of appeal has the right to judge Steele and Mochen for not taking into considerations the harm caused to the third party and the risk that may be encountered in the end. The government has laws that protect all employees and the third parties in an organization from any harm imposed upon them. The US departments of Labor and its divisions have varied laws, which can shield third parties or employees in the workplace. Cases of negligent or a misinterp retation of any information provided

Hannibal and the Second Punic War Essay Example | Topics and Well Written Essays - 1750 words

Hannibal and the Second Punic War - Essay Example This history of the Punic Wars is grim and intricate. The reason behind the Second Punic war is simple: the defeat of the Carthaginians in the First Punic War. It became necessary for the losing power to develop and maintain a sentiment of hatred and anger against those who had led them to defeat. The best way to regain Carthage's lost prestige was to conquer and replace large tracts of land to their empire. For the Carthaginians, Spain became an area of ample interest. This idea was further encouraged by Hamilcar Barca. As the premier Phoenician General he had been greatly dishonored and incensed over the defeat and the peace terms set out by Rome. This was coupled with the capture of Sardinia during Carthage's own mercenary war. Spain was then seen as the launching point for future action against Rome: a battle that would help resume the reputation that had been lost by Carthage. The events that befell Cartage before the Second Punic War are important because it was Barca's son who continued with his invasion plans: turning the Second Punic War into a battle which would be remembered for years to come. It began with Barca's designs to construct a strategy that would allow Carthage to retake, establish and maintain its identity. According to the treaty signed between the two countries, Barca had the freedom to expand his conquests in all directions that were meant to be west of the River lberus. This river would flow southeast into the Mediterranean Sea. Its name, Iberus, was later changed, to Ebro. Following the treaty with the Romans meant that the Carthaginians were not to cross the lberus (Arnold 1886). This was coupled with another important aspect to the treaty. The Carthaginians were also bound by the treaty not to interfere with the people of Saguntum. This was a crucial city because it laid between the lberus and the Carthaginian dominions. The Romans knew of its immense significance. They chose this area especially in an effort to control the ever growing Carthaginian forces. They saw the danger of leaving Saguntum to itself and thus enforced another clause in their treat y with Carthage. It was thus that because of Sagnutum's role in alliance with the Romans it was also placed under their protection. Hannibal was Barca's son and developed the same anger and loss of pride that ran deep in his father's veins. He soon transformed into an ardent General: one whose tactics and style would be revered for generations. It was during Barca's time that Carthage had begun to assume a control over Spain. Rome was concerned by these moves of the Carthaginian army and sought a treaty with Carthage which forbade limited them to expand South of the town of Ebro. It was then that an alliance with Saguntum was signed by Rome. This decision was responsible for giving the Romans a small but significant stronghold in the heart of Carthaginian lands. Thus, the Second Punic War was created by the dispute over the hegemony of Saguntum. When Hannibal came into power the Romans and Carthaginians were not at a state of war. Both rested in the comforts of the peace deals that had

Wednesday, October 16, 2019

Davis v. The Board of County Commissioners of Doa Ana County Essay

Davis v. The Board of County Commissioners of Doa Ana County - Essay Example This made Herrera resign from his work in order to evade the disciplinary action. After a few days, the supervisor wrote a letter on behalf of Herrera to the MVH revealing that Herrera was an excellent worker arguing that he was confident that other prospective employees will notice (Walsh (2010, p. 148). Another supervisor of the Detention Centre made some verbal references that praised Herrera as a good worker who will contribute to effective organization performance. This made the plaintiff, the third party in this case to sue the Detention County for negligent misinterpretations of providing misleading information. This misinformation was provided by Mochen and Steele, employees at the Detention Center, which enabled Herrera to be employed again at the MVH. This legal issue was seen as a threat to employee; thus the plaintiff to be assaulted; hence sorted to accuse the board of county commissioners of Dona Ana County. The court concludes that Dona Ana Country deserves to be accountable for negligent referral (misinterpretation) due to positive references. When Herrera got a position as mental health technician, he was allegedly accused of sex assault by the plaintiff and physically abused female patients. In case an organization provides misleading references that can contribute to harm of employees in the new job, the jurisdictions have the right to sue that organization for negligent referral. According to Kohn, Kohn and Colapinto (2004), the court of appeal has the right to judge Steele and Mochen for not taking into considerations the harm caused to the third party and the risk that may be encountered in the end. The government has laws that protect all employees and the third parties in an organization from any harm imposed upon them. The US departments of Labor and its divisions have varied laws, which can shield third parties or employees in the workplace. Cases of negligent or a misinterp retation of any information provided

Tuesday, October 15, 2019

Recruitment selaction process of officers Essay Example | Topics and Well Written Essays - 500 words

Recruitment selaction process of officers - Essay Example Most police departments for instance require a certain level of education attainments to qualify for the recruitment process. More than four of every five police departments in the US, demand for a high school diploma, with at least 15 per cent of others requiring a minimum level of college training, and preferably a two year course work, with only about 1% requires that the participants have at least a four year college degree (National Institute of Justice & United States, 2005). Physical traits that include height and weight which have previously been quite crucial trait required for the selection process have been dropped or relaxed in favor of women who would have the urge to join the force. The levels of education it is assumed is essential for the next level of the recruitment process which involves a written examination. The examination is basically set to gauge the some degree of skills necessary for the making of a competent officer. Some of these skills include: map reading, decision making skills, reading abilities, report writing and written communications skills and skills that tests ones intelligence quotient (I.Q). The background of the person to be recruited is also important to shield individuals with questionable characters from gaining access to join the police force; a polygraph may be used to ascertain the truthfulness of the answers provided for most of the questions asked. A physical ability test that gauges the endurance levels of those who wish to join is also important as the police are subjected to intense conditions in the day to day work life. A polygraph may also be required to further ascertain or gauge the level of truthfulness in the answers provided by the respective candidates. A psychological and medical examinations is also important to rule out the possibility of recruiting individuals who are sick and thus unfavorable and enabling the recruitment of individuals with sound minds. Each and every state in

Operation Management - Honda Atlas Motors Essay Example for Free

Operation Management Honda Atlas Motors Essay COMPANY Profile Atlas Honda Limited (AHL) is a joint venture of two companies the Atlas Group and Honda Motor Co. Ltd., Japan. This company was created in 1988. The company is currently manufacturing motorcycles and auto parts. Honda motorcycles are the largest selling motorcycles in the country with matchless reputation for impressive quality, reliability and its customer service. Atlas has the country’s largest in-house manufacturing capability at its Karachi and Sheikhupura plants. AHL management is striving to modernize company operations by adapting applicable aspects of research and theory and more specifically, Honda’s unique philosophy of hard/soft technologies to the realities of Pakistani conditions. Company management structure, systems and processes are changed according to the demands of the customer, growth and new technology. Efforts are being made to develop participation at all levels of personnel in decision-making and a substantial and effective delegation has been established at levels where applicable. Various participation programs such as ‘Ala Mayar’ Quality Circles movement, launched in 1985, are strongly encouraged to allow constructive self-expression and teamwork. Atlas Honda is playing a pioneering role in creating conditions for easy and confident use of motorcycles all over the country. A vast and growing network of over 1600 motorcycles sales service and spare parts dealers has been established. In order to back up this system, Atlas has set up Technical Training Centers in Karachi and Lahore, which provide several courses of varying duration and complexity for motorcycle mechanics and users each year. Mobile training facilities take the latest know-how, technology and maintenance of motorcycles to major rural and urban centers around the country. STRATEGIC GOALS Customers * Our customers are the reason and the source of our business. It is our joint aim with our dealers to ensure that our customers enjoy the highest level of satisfaction from use of Honda Motorcycles . Quality * To ensure that our products and services meet the set standards of excellence. Local Manufacturing * To be the industry leader in indigenization of motorcycles parts. Technology * To develop and maintain distinct business advantages through continuous induction of improved hard and soft technologies. Shareholders * To ensure health and viability of business and thus safeguarding shareholders interest by maximizing profit. Payments of regular satisfactory dividends and adding value to the shares. Employees * To enhance and continuously up-date each members capabilities and education and to provide an environment which encourages practical expression of the individuals potential in goal directed team efforts and compensate them attractively according to their abilities and performance. Corporate Citizens * To comply with all government laws and regulation, to maintain high standard of ethics in all operations and to act as a responsible members of the community. BUSINESS ISSUES IMPACT High Price of Products Difficult to maintain high quality production at high market demand Complexity in coordination and communication among facilities, vendors and two geographical locations i.e. Karachi and Sheikhupura plants Slow response or long lead-time from the vendors

Monday, October 14, 2019

Digital Intellectual Property Law Essay: Big Data Patents

Digital Intellectual Property Law Essay: Big Data Patents By Sandro Sandri   1- BIG DATA Big data is a term for data sets that are so large or complex that traditional data  processing applications are inadequate to deal with them. Challenges include analysis, capture, data curation, search, sharing, storage, transfer, visualization, querying, updating  and information privacy. The term big data often refers simply to the use of predictive  analytics, user behaviour analytics, or certain other advanced data analytics methods that  extract value from data, and seldom to a particular size of data set.1 There is little doubt  that the quantities of data now available are indeed large, but thats not the most relevant  characteristic of this new data ecosystem. In another way Big Data is an evolving term that describes any voluminous amount  structured, semistructured and unstructured data that has the potential to be mined for  information. It is often characterized by 3Vs: the extreme Volume of data, the wide Variety  of data types and the Velocity at which the data must be processed. Although big data  doesnt equate to any specific volume of data, the term is often used to  describe terabytes, petabytes and even exabytes of data captured over time.  The need for big data velocity imposes unique demands on the underlying compute  infrastructure. The computing power required to quickly process huge volumes and  varieties of data can overwhelm a single server or server cluster. Organizations must apply  adequate compute power to big data tasks to achieve the desired velocity. This can  potentially demand hundreds or thousands of servers that can distribute the work and  operate collaboratively. Achieving such velocity in a cost-effective manner is also a  headache. Many enterprise leaders are reticent to invest in an extensive server and storage  infrastructure that might only be used occasionally to complete big data tasks. As a  result, public cloud computing has emerged as a primary vehicle for hosting big data  analytics projects. A public cloud provider can store petabytes of data and scale up  thousands of servers just long enough to accomplish the big data project. The business  only pays for the storage and compute time actually used, and the cloud instances can be  turned off until theyre needed again. To improve service levels even further, some public  cloud providers offer big data capabilities, such as highly distributed Hadoop compute  instances, data warehouses, databases and other related cloud services. Amazon Web  Services Elastic MapReduce is one example of big data services in a public cloud. Ultimately, the value and effectiveness of big data depends on the human operators  tasked with understanding the data and formulating the proper queries to direct big data  projects. Some big data tools meet specialized niches and allow less technical users to make  various predictions from everyday business data. Still, other tools are appearing, such as  Hadoop appliances, to help businesses implement a suitable compute infrastructure to  tackle big data projects, while minimizing the need for hardware and distributed compute  software know-how. a) BIG DATA AND THE GDPR The General Data Protection Regulation, which is due to come into force in May  2018, establishes a few areas that have been either drafted with a view to encompass Big  Data-related issues or carry additional weight in the context of Big Data, lets analyse just  two aspects. Data processing impact assessment According to the GDPR, where a type of processing in particular using new  technologies, and taking into account the nature, scope, context and purposes of the  processing, is likely to result in a high risk to the rights and freedoms of natural persons, the  controller shall, prior to the processing, carry out an assessment of the impact of the  envisaged processing operations on the protection of personal data. This criterion is most  likely going to be met in cases of Big Data analytics, IoT or Cloud operations, where the  processing carries high privacy risks due to the properties of either technology or datasets  employed. For example, linking geolocation data to the persons name, surname, photo and  transactions and making it available to an unspecified circle of data users can expose the  individual to a higher than usual personal safety risk. Involving data from connected IoT  home appliances or using a Cloud service to store and process such data is likel y to contribute  to this risk. Pseudonymisation According to the GDPR, pseudonymisation means the processing of personal data  in such a manner that the personal data can no longer be attributed to a specific data subject  without the use of additional information, provided that such additional information is kept  separately and is subject to technical and organisational measures to ensure that the personal  data are not attributed to an identified or identifiable natural person. At least two aspects link  pseudonymisation to Big Data. First, if implemented properly, it may be a way to avoid the  need to obtain individual consent for Big Data operations not foreseen at the time of data  collection. Second, paradoxically, Big Data operations combining potentially unlimited  number of datasets also makes pseudonymisation more difficult to be an effective tool to  safeguard privacy. b) BIG DATA APPLICATIONS Big data has increased the demand of information management specialists so much  so that Software AG, Oracle Corporation, IBM, Microsoft, SAP, EMC, HP and Dell have  spent more than $15 billion on software firms specializing in data management and  analytics. In 2010, this industry was worth more than $100 billion and was growing at  almost 10 percent a year: about twice as fast as the software business as a whole. Developed economies increasingly use data-intensive technologies. There are  4.6 billion mobile-phone subscriptions worldwide, and between 1 billion and 2 billion  people accessing the internet. Between 1990 and 2005, more than 1 billion people  worldwide entered the middle class, which means more people became more literate, which  in turn lead to information growth. The worlds effective capacity to exchange information  through telecommunication networks was 281 petabytes in 1986, 471 petabytes in 1993, 2.2  exabytes in 2000, 65 exabytes in 20073 and predictions put the amount of internet traffic at  667 exabytes annually by 2014. According to one estimate, one third of the globally stored  information is in the form of alphanumeric text and still image data, which is the format  most useful for most big data applications. This also shows the potential of yet unused data  (i.e. in the form of video and audio content). 2 Data, data everywhere. The Economist. 25 February 2010. Retrieved 9 December 2012.   3 Hilbert, Martin; Là ³pez, Priscila (2011). The Worlds Technological Capacity to Store, Communicate, and  Compute Information. Science. 332 (6025): 60-65. doi:10.1126/science.1200970. PMID 21310967.   While many vendors offer off-the-shelf solutions for big data, experts recommend  the development of in-house solutions custom-tailored to solve the companys problem at  hand if the company has sufficient technical capabilities. 2- PATENTS A patent is a set of exclusive rights granted by a sovereign state to an inventor or  assignee for a limited period of time in exchange for detailed public disclosure of  an invention. An invention is a solution to a specific technological problem and is a  product or a process. Being so, Patents are a form of intellectual property. A patent does not give a right to make or use or sell an invention.5 Rather, a patent  provides, from a legal standpoint, the right to exclude others from making, using, selling,  offering for sale, or importing the patented invention for the term of the patent, which is  usually 20 years from the filing date6 subject to the payment of maintenance fees. From an  economic and practical standpoint however, a patent is better and perhaps more precisely  regarded as conferring upon its proprietor a right to try to exclude by asserting the patent  in court, for many granted patents turn out to be invalid once their proprietors attempt to  assert them in court.7 A patent is a limited property right the government gives inventors in  exchange for their agreement to share details of their inventions with the public. Like any  other property right, it may be sold, licensed, mortgaged, assigned or transferred, given  away, or simply abandoned. The procedure for granting patents, requirements placed on the patentee, and the  extent of the exclusive rights vary widely between countries according to national laws and  international agreements. Typically, however, a granted patent application must include one  or more claims that define the invention. A patent may include many claims, each of which  defines a specific property right. 4 WIPO Intellectual Property Handbook: Policy, Law and Use. Chapter 2: Fields of Intellectual Property  Protection WIPO 2008 A patent is not the grant of a right to make or use or sell. It does not, directly or indirectly, imply any such  right. It grants only the right to exclude others. The supposition that a right to make is created by the patent  grant is obviously inconsistent with the established distinctions between generic and specific patents, and with  the well-known fact that a very considerable portion of the patents granted are in a field covered by a former  relatively generic or basic patent, are tributary to such earlier patent, and cannot be practiced unless by license   thereunder. Herman v. Youngstown Car Mfg. Co., 191 F. 579, 584-85, 112 CCA 185 (6th Cir. 1911)   6 Article 33 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS).   7 Lemley, Mark A.; Shapiro, Carl (2005). Probabilistic Patents. Journal of Economic Perspectives, Stanford Law and   Economics Olin Working Paper No. 288. 19: 75. relevant patentability requirements, such as novelty, usefulness, and non-obviousness. The  exclusive right granted to a patentee in most countries is the right to prevent others, or at  least to try to prevent others, from commercially making, using, selling, importing, or  distributing a patented invention without permission. Under the World Trade Organizations (WTO) Agreement on Trade-Related  Aspects of Intellectual Property Rights, patents should be available in WTO member states  for any invention, in all fields of technology,9 and the term of protection available should  be a minimum of twenty years.10 Nevertheless, there are variations on what is patentable  subject matter from country to country.   a) EUROPEAN PATENT LAW   European patent law covers a wide range of legislations including national patent  laws, the Strasbourg Convention of 1963, the European Patent Convention of 1973, and a  number of European Union directives and regulations in countries which are party to the  European Patent Convention. For certain states in Eastern Europe, the Eurasian Patent  Convention applies.   Patents having effect in most European states may be obtained either nationally, via  national patent offices, or via a centralised patent prosecution process at the European  Patent Office (EPO). The EPO is a public international organisation established by the  European Patent Convention. The EPO is not a European Union or a Council of  Europe institution.[1] A patent granted by the EPO does not lead to a single European  patent enforceable before one single court, but rather to a bundle of essentially  independent national European patents enforceable before national courts according to  different national legislations and procedures.[2] Similarly, Eurasian patents are granted by  the Eurasian Patent Office and become after grant independent national Eurasian patents  enforceable before national courts. 8 Lemley, Mark A.; Shapiro, Carl (2005). Probabilistic Patents. Journal of Economic Perspectives, Stanford Law and  Economics Olin Working Paper No. 288. 19: 75. doi:10.2139/ssrn.567883. 9 Article 27.1. of the TRIPs Agreement. 10 Article 33 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS). European patent law is also shaped by international agreements such as the World  Trade Organizations Agreement on Trade-Related Aspects of Intellectual Property  Rights (TRIPs Agreement), the Patent Law Treaty (PLT) and the London Agreement.   3- BIG DATA PATENTS 11 Patent Analytics Solutions That Help Inventors Invent, Outsell Inc, June 3 2016   Patent data is uniquely suited for big data tools and techniques, because of the high  volume, high variety (including related information) and high velocity of changes. In fact,  patents are leading the way with big data and analytics in many ways. The patent space  offers a fascinating insight into the potential of big data analytics, rich visualization tools,  predictive and prescriptive analytics, and artificial intelligence.11 Especially recently, big  data tools and technologies are being used in several ways in the patent world to transform  and improve patent analysis. Patents and Intellectual Property are gradually gaining significance around the  world. This is leading to a bottleneck-large databases and ever growing information. A new  way around the innovation problem is to acquire patents. With examples such as Nokia,  Motorola, Twitter, the patent purchases seem rather straightforward. Nokia sold a large  chunk of its company to Microsoft, but held on to the crucial patents by signing a licensing  deal. They can now earn a revenue using patents licensed to Microsoft. Google bought  Motorola and its patents and later sold the company to Lenovo while holding on to the  patents. There are ample such examples in the industry.   Transactions of Intellectual Property (IP) are rather complex. Per example, a basic  component to be verified before a patent is granted, is novelty. In other words, if a priorart  describing the invention is found, the application stands to be rejected. A prior-art  could be in the form of a publication, a blog post, a lecture, a video, or a book. With a  massive amount of information generated, that doubles every 18 months, it is extremely  difficult to found prior-art. One way, some organizations follow, is crowdsourcing the  prior art search. Details about the patent are published on a website asking IP professionals  from around the world to find a prior-art. The emergence of Big Data analytics, on the other hand, has provided a clear solution. In addition, the outcomes through this method  get better and precise with each operation. Since Big Data analytics is still not commonly used by most government authorities,  prior-art gets overlooked and many false patents are granted. This comes out when-in  litigation-the opposing parties put all their efforts in looking for a prior-art to invalidate  each others patents. More often than not, a prior-art is found or there is an out of court  settlement. Hence, a concept called patent wall has gained traction. It is very common for  companies to file as well as acquire a number of patents around the technology they are  working on. This serves as a defence against litigators and allows the companies to market  and sell their products/services without any fear of litigation. The core value of patents is that the invention must be publicly disclosed in  exchange for a time-limited monopoly on the invention. Patents are not only a legal asset  that can block competitors, they are potentially a business and financial asset. For market  participants, patents can provide direct insight into where competitors are headed  strategically. Big Data is the key to unlocking this inherent value. Patent information is  comprised of vast data sets of textual data structures involving terabytes of information.  When unlocked through Big Data techniques and analysis, the insights are compelling,  revealing the direction a technology is headed and even uncovering the roadmap for a  specific companys product plans. But, deriving these insights from the proliferation of  information requires truly sophisticated Big Data analysis.   While Big Data is quickly growing as a trend, whats delivering more value these  days are Big Data services that optimize specific data sets and create specialized analysis  tools for that data. Technology teams that are dedicated to certain data sets will curate and  improve the data, learn the specifics of that data and how best to analyze it, and create selfservice  tools that are far more useful than generic Big Data technologies.   A key part of the Big Data service is a specialized analysis engine tailored to  particular data. For example, a patent analysis engine must understand the dozens of  metadata items on each patent in order to group patents correctly and traverse the  references. To be most effective, Big Data services need to automatically keep up with the  data updates, as patents are living documents that change over time. Even after the patent  Big Data Patents  is finalized and issued, it can be reclassified, assigned to a new owner, reexamined and  updated, attached to a patent family or abandoned. Most importantly, Big Data services are only as good as the insights they deliver a  Big Data service should provide a specialized user interface that allows real-time, userdriven  analysis with search, correlations and groupings, visualizations, drill down and  zooms. The patent data analysis must be presented in a manner that is compelling and  consistent. There are more than 22,000 published patent applications between 2004 and 2013  relating to big data and efficient computing technologies, resulting in almost 10,000 patent  families. Patenting activity in this field has grown steadily over the last decade and has seen  its highest increases in annual patenting over the last two years (2011-2012 and 2012-2013)  of the present data set. The growth has continually been above the general worldwide  increase in patenting, showing a small increase of 0.4% over worldwide patenting for the  2005-2006 period and showing a maximum increase of 39% for 2012-13.~ Using a patent effectively means suing a competitor to have them blocked access  to market, or charge them a license for allowing them to sell. When a patent holder wishes  to enforce a patent, the defendant often can invoke that the patent should not have been  granted, because there was prior art at the time the patent was granted. And, while patent  offices do not seem to have a clear incentive to take into account actual reality, including  the exponentially available information created by Big Data, when reviewing the  application, the situation is very different for a defendant in a patent lawsuit. They will have  every incentive to establish that the patent should never have been granted, because there  was pre-existing prior art, and the information in the patent was not new at the time of  application. And one important consequence of Big Data will be that the information  available to defendants in this respect, will also grow exponentially. This means t hat, the  probability of being able to defend against a patent claim on the basis of prior art, will grow  significantly. Because of the lag of time between patent applications and their use in court,  the effect of the recent explosion of information as a result of Big Data is not very visible  in the patent courts yet. A patent is, of itself, an algorithm. It describes the process of a technical invention   how it works (at least, thats what a patent is theoretically supposed to be doing). It is  therefore quite possible that a lot of algorithms around analysis of Big Data will become  patented themselves. It could be argued that this will act as a counterweight against the  declining value and potential of patents. Many of these algorithms are, in fact, not technical inventions. They are theoretical  structures or methods, and could therefore easily fall into the area of non-patentable  matter. Algorithmic patents are particularly vulnerable to the ability by others to innovate  around them. It is quite unlikely that a data analysis algorithm would be unique, or even  necessary from a technical point of view. Most data analysis algorithms are a particular way  of doing similar things, such as search, clever search, and pattern recognition. There is, in actual fact, a commoditization process going on in respect of search and analytical  algorithms. Patents are frozen algorithms. The elements of the algorithm described in a  patent are fixed. In order to have a new version of the algorithm also protected, the patent  will either have to be written very vague (which seriously increases the risk of rejection or  invalidity) or will have to be followed up by a new patent, every tim e the algorithm is  adapted. And the key observation around Big Data algorithms is that, in order to have  continued business value, they must be adapted continuously. This is because the data,  their volume, sources and behaviour, change continuously. The consequence is that, even if a business manages to successfully patent Big Data  analytical algorithms, such patent will lose its value very quickly. The reason is simple: the  actual algorithms used in the product or service will quickly evolve away from the ones  described in the patent. Again, the only potential answer to this is writing very broad, vague  claims an approach that does not work very well at all.   80% of all big data and efficient computing patent families (inventions) are filed by  US and Chinese applicants, with UK applicants accounting for just 1.2% of the dataset and  filing slightly fewer big data and efficient computing patents than expected given the  overall level of patenting activity from UK applicants across all areas of technology.   Against this, however, it should be borne in mind that many of the potential improvements  in data processing, particularly with regard to pure business methods and computer  software routines, are not necessarily protectable by patents and therefore will not be  captured by this report. UK patenting activity in big data and efficient computing has, on the whole, increased over recent years and the year-on-year changes are comparable to the  growth seen in Germany, France and Japan.12 12 Intellectual Property Office, Eight Great Technologies Big Data A patent overview   BIBLIOGRAPHY à ¯Ã¢â‚¬Å¡Ã‚ · Herman v. Youngstown Car Mfg. Co., 191 F. 579, 112 CCA 185 (6th Cir. 1911) à ¯Ã¢â‚¬Å¡Ã‚ · Hilbert, Martin; Là ³pez, Priscila (2011). The Worlds Technological Capacity to Store, Communicate, and Compute Information. Science. (6025). à ¯Ã¢â‚¬Å¡Ã‚ · Lemley, Mark A.; Shapiro, Carl (2005). Probabilistic Patents. Journal of Economic Perspectives, Stanford Law and Economics Olin Working Paper No. 288. à ¯Ã¢â‚¬Å¡Ã‚ · Springer, New Horizons for a Data-Driven Economy à ¯Ã¢â‚¬Å¡Ã‚ · Data, data everywhere. The Economist. 25 February 2010. Retrieved 9 December 2012. à ¯Ã¢â‚¬Å¡Ã‚ · Eight Great Technologies Big Data A patent overview, Intellectual Property Office, à ¯Ã¢â‚¬Å¡Ã‚ · Patent Analytics Solutions That Help Inventors Invent, Outsell Inc, June 3 2016 à ¯Ã¢â‚¬Å¡Ã‚ · Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS). à ¯Ã¢â‚¬Å¡Ã‚ · Article 33 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS). à ¯Ã¢â‚¬Å¡Ã‚ · 75. doi:10.2139/ssrn.567883. à ¯Ã¢â‚¬Å¡Ã‚ · TRIPs Agreement. à ¯Ã¢â‚¬Å¡Ã‚ · WIPO Intellectual Property Handbook: Policy, Law and Use. Chapter 2: Fields of Intellectual Property Protection WIPO 2008 Google Chrome: A Freeware Web Browser Google Chrome: A Freeware Web Browser Google Chrome is a freeware web browser developed by Google that uses the WebKit layout engine. It was released as a beta version for Microsoft Windows on September 2, 2008, and as a stable public release on December 11, 2008. As of September 2012, according to StatCounter, Google Chrome had 34% worldwide usage share of web browsers making it the most widely used web browser. (wikipedia) An Internet browser developed by Google, that combines a minimal design with sophisticated technology to make the Web faster, safer and easier. The Google Chrome browser offers features including access to favourite pages instantly with thumbnails, desktop shortcuts to launch Web applications, and independently run tabs within the browser to prevent browser crashing. Chrome is known for is simplicity and speed, and people use it because it gets the job down, fast. But it doesnt end there, while being simple it is also very customizable allowing users to make it their own, some people get rather sceptical due to that, as they think, if its highly customizable, how can it be simple? Chromes UI is flawless; its simple yet effective that your mind just knows where to go without having to think. This is one of the main goals for any browser, to achieve this, the design and icons that the browser uses have to be recognisable straight away, for instance, the button to get back to chromes homepage is shaped as a house, this way our brain quickly realises it. Pros. 1. It wont crash. Perhaps Chromes largest feature is its multiprocess design, which helps the user a lot, protects you from having a bad Web page or application take your browser down. Every tab, window, and plug-in runs in its own environment, so one faulty/broken site wont affect anything else that you have opened. This approach also adds another layer of security by isolating each site and application within a limited environment. 2. Its really fast. Again because of the multiprocess design, one slow site wont drag down the rest of your browsing. Instead, you can effortlessly click to another tab or window. With plug-ins, the arrangement works similarly: If you open a site that has a slow-loading Java ad, for example, the Java itself will be isolated and the rest of the page wont be affected. The program itself opens within seconds of when you click the icon, tooa distinct advantage over some slower-loading alternatives. This gives users great control over their browsers and also developers of websites, as they can isolate problems quicker and easier. 3. You barely notice its there. Calling the design of Chromes interface efficient is an understatement. The program barely looks like a program, and the vast majority of your screen space is devoted to the site youre visitingwith no buttons or logos hogging space. Chromes designers say that they wanted people to forget they were even using a browser, and it comes pretty close to achieving that goal. 4. It makes searching simpler. One of Chromes signature features is its Omnibox, an integrated all-purpose bar at the top of the browser. You can type in a URL or a search termor bothand Chrome takes you to the right place without asking any questions. Omnibox can learn what you like, tooa talent that goes beyond the obvious automatic completion function. Say that you want to use the PCWorld.com search function, for example. Once youve visited the site once, Chrome will remember that PCWorld.com has its own search box and will give you the option of using it right from Omnibox. The function thus automates keyword searches. 5. It gives you more control over tabs. Chrome gives the idea of tabbed browsing new power. You can grab a tab and drag it out into its own individual window. Or you can drag and drop tabs into existing windows to combine them. Chrome also gives you the option of starting up in any tab configuration you wantwhether a custom setup or the set of tabs you had open in your previous session. Other browsers require third-party add-ons to provide this capability. 6. It opens new doors on your home page. Chrome comes with a default dynamic home page. As you use it, the program remembers the sites that you visit most often. The top nine of those appear in snapshots on your home page, along with your most commonly used search engines and bookmarks. Theres no force-feeding here, though: You can override the dynamic home page with any home page you want, just as you can set the default search engine to any service you prefer. 7. It lets you stay incognito. Like  Internet Explorer 8s recent beta release, Chrome offers a private browsing optionone it calls Incognito. You can open a special type of new window and rest easy knowing nothing you do in it will be logged or saved on your computer. And unlike Internet Explorers, Chromes Incognito window is isolated from the rest of your browsing experience, so you can have your private window open alongside your regular windows, and each will operate independently. http://www.neowin.net/forum/uploads/monthly_12_2010/post-261952-12913175021568.png RockMelt RockMelt is a proprietary social media web browser developed by Tim Howes and Eric Vishria. The project is backed by Netscape founder Marc Andreessen. RockMelt integrates a technique for surfing the web that focuses on Google Search and social media, in particular Facebook and Twitter. (wikipedia) RockMelt is Very Similar to Chrome, it uses an older engine than what chrome uses but otherwise the same, the only thing that is different is the UI, RockMelts UI is built for the people who use online social sites a lot, like Facebook and Twitter. The Left and Right sides of the browser are where the main social features are, it displays your friends that are online on the right (Facebook) and links displaying how many messages you have on Facebook, Twitter etc. on the left. Other social features can be found in the title bar and the menu dropdown. Pros The Facebook chat integration. The pop-out instant messaging windows enable you chat without needing to keep Facebook open. Plus, by adding friends the favourites list, you can easily see if the people you chat with the most are online. Another feature is the drag and drop ability. If you are on a website that I want to share with friends, simply grab the link and drag it over their photo on the left side bar. Then you have the option to share it with them via Facebook Chat, Facebook Message, or by posting it on their Facebook Wall. Additionally, you can easily share it with all of my Facebook friends or Twitter followers by dragging to the Share button next to the address bar. Cons There are a lot of Distractions! With everything from Facebook to the favourite blog feeds integrated right into the browser, theres almost too much going on. This is definitely not a browser to be used in the office. While its a really useful tool for social media integration, it definitely lowers peoples productivity Social Entrepreneurs: Traits And Limitations Social Entrepreneurs: Traits And Limitations This article is oriented to through a light and argues that social entrepreneurs do not give adequate consideration to gender and emphasise that there was a lack of research on womens contribution as social entrepreneurs; this article suggests other possible areas of study to advance this field of research. It brings out the extensive literature on social entrepreneurs and female entrepreneurs, while also drawing on the gender/diversity literature. This article creates interest to researchers who wish to examine aspects related to women as social entrepreneurs. It is also relevant to government agencies and social enterprise organisations those are looking to gain a more understanding of social entrepreneurs, their characteristics and the issues they face. It provides key avenues of further work to better understand the way in which sex and gender interact with the practices of social entrepreneurs. Though there is a tremendous increase in research on social entrepreneurs in recent years, a little consideration has been given to the womens contribution make as social entrepreneurs. Some work in academic research has started to profile social entrepreneurs, describe why they choose to become social entrepreneurs, the hurdles they face and the strategies they adopt. Although the research on the topic of social entrepreneurs is increasing, it is still largely based on an idealised vision of which the social entrepreneur is, often restricting the concept to a narrow pool of individuals and not taking into account the actual diversity within this category. Teasdale et al., 2011 says one such category which has been largely ignored in the literature consists of the contribution that women make as social entrepreneur. For the purpose of this paper, we will discuss the concept of social entrepreneurs independently of social entrepreneurship. This will avoid difficulties linked to the fact that not all social enterprises may be entrepreneurial or that not all social entrepreneurship comprises social enterprises. The premise of this paper is that much of the literature on social entrepreneurs is heavily influenced by mainstream literature on management and entrepreneurship, and as such the work on female social entrepreneurs may follow the same trend. Much of the work in the field of sex/gender and management/entrepreneurship has changed focus over the past two to three decades, moving from a largely descriptive field of research to a much more analytical one. One of the key characteristics has been the progressive move from sex to gender, going from looking at if sex makes a difference, to how gender makes a difference (see Carter and Shaw, 2006 for a fuller account). The literature on women entrepr eneurs has adopted an increasingly critical stance, denouncing the implicit maleness of the entrepreneur as a construct. One of its main criticisms is the androcentricity inherent in much of the entrepreneurship literature, which often relies on very gendered and stereotypical assumptions as to the role of men and women. The mainstream literature has given much attention to the topic of traits, looking for the actual social or psychological attributes possessed by successful entrepreneurs. However, the gendered nature of these very traits has been heavily criticised by scholars in the field of gender and entrepreneurs (Ahl, 2006; Marlow et al., 2009). In opposition to trait theory, which relies on a social-psychological approach, a more sociological approach has been proposed to look at identity construction rather than traits. This gives a voice to alternative groups (e.g. women), for example in the male-dominated Science, Engineering and Technology (SET) incubators (McAdam and Marlow, 2010) or among ethnic female entrepreneurs (Essers and Benschop, 2007; Humbert and Essers, 2012). This paper builds upon this body of work to provide a critical view of existing work on (female) social entrepreneurs and to shape a future research agenda. In particular, it aims to provide a brief account of current res earch on social entrepreneurs, followed by some of the findings directly related to the contribution of women. Because of the limited amount of material on women as social entrepreneurs, the paper also draws on literature on women within the social entrepreneurship, with applications to the case of social entrepreneurs where feasible. This review is informed by a focus group organised in June 2009 in London that brought together key informants such as policy makers, female social entrepreneurs and academics. Finally, the paper aims to provide a reflective gendered account of how these bodies of literature can be combined to inform further research on women as social entrepreneurs, before suggesting some possible avenues for research on the topic in the future. Social entrepreneurs: traits and limitations Some of the traits attached to social entrepreneurs are starting to be well documented. Some studies like Prabhu, 1999 suggest that social entrepreneurs are younger, possibly due to a higher risk propensity related to lower levels of family responsibilities. Ramsay and Danton, 2010 found that evidence from the UK suggests however those very young individuals are not very well represented among social entrepreneurs. It is important to consider the effect of age as there may also be potential links with the type of social enterprise being set up: younger social entrepreneurs may work on transformational actions while older social entrepreneurs may tend to focus more on charitable organisations. It might also be alternative forms of organisations that are adopted by younger social entrepreneurs. Leadbeater, 1997 focused on the development of social capital which is seen as important in the creation and subsequent development of social enterprises. Research into the potential importance of social capital among social entrepreneurs shows some evidence that personal/family history of (social) entrepreneurship may have a positive influence on the creation of social ventures but overall remains inconclusive. In the entrepreneurship literature, women are portrayed as being particularly influenced by this personal/family history (Marlow et al., 2009). This raises the question of to what extent this is also a factor among women social entrepreneurs. Shaw and Carter, 2007 stated that social entrepreneurs are able to show drive, determination, ambition, charisma, leadership, the ability to communicate vision and inspire others and their maximum use of resources. In order to do so, as Alvord et al. (2004) suggest, a characteristic associated with successful social entrepreneurs is that of a bridging capacity. This capacity is shaped by a social entrepreneurs background and experience which in turn is shaped by gender relations. Some authors have focused on developing a universal definition of social entrepreneurs, one which is heavily linked to, and directly derived from, the definition of an entrepreneur. One of the definitions adopted by Nicholls (2006:224) draws on Dees (2001) and bears some similarities with Chell (2008). It is worded in the following terms: Social entrepreneurs play the role of change agents in the social sector, by: à ¯Ã¢â‚¬Å¡Ã‚ · adopting a mission to create and sustain social value (not just private value); à ¯Ã¢â‚¬Å¡Ã‚ · recognising and relentlessly pursuing new opportunities to serve that mission; à ¯Ã¢â‚¬Å¡Ã‚ · engaging in a process of continuous innovation, adaptation and learning; à ¯Ã¢â‚¬Å¡Ã‚ · acting boldly without being limited by resources currently in hand; à ¯Ã¢â‚¬Å¡Ã‚ · exhibiting a heightened sense of accountability to the constituencies served and for the outcomes created. This definition assumes that there are fundamental differences between mainstream entrepreneurs and social entrepreneurs. Chell (2007:18) has worked on reconciling the two definitions and concludes that the differences can be eliminated by adopting the following: (social) entrepreneurship is the process of recognizing and pursuing opportunities with regard to the alienable and inalienable resources currently controlled with a view to value creation. This definition, while providing a platform for renegotiating theoretical differences between entrepreneurs and social entrepreneurs is still proving to be a very polarised stringent definition. This problem is in part resolved by adopting an alternative viewpoint where the ideal social entrepreneur should not necessarily fulfil all criteria in the above definition fully, but that there are different degrees of fulfilment for each and that a social entrepreneur does not necessarily need to meet all of them (Dees, 2001). If there are many commonalities between mainstream and social entrepreneurs, academic discourse bestows social entrepreneurs with extra, special, traits which underline the importance of their commitment and dedication to social aims. Not only are social entrepreneurs largely described as different in the literature, they are also often described as extraordinary individuals. Dees (2001:2) for instance describes entrepreneurs in the following terms: their reach exceeds their grasp. Entrepreneurs mobilize the resources of others to achieve their entrepreneurial objectives. Chell (2007:5) portrays a similar vision of the entrepreneur as a household name with a personality that is larger than life'. These quotes present a view of the entrepreneur as both metaphorically and literally uncontainable. Further research needs to explore how this discourse relates differently to men and women. It is also important to examine the role of women in the governance of social enterprises, The Social Enterprise Coalitions State of Social Enterprise Survey (Social Enterprise Coalition, 2009) show that the social enterprise sector provides a more egalitarian environment for women, as can be seen in terms of presence on boards; 41% of social enterprise board members in the SEC Survey 2009 are women (Humbert, 2011). However, this differs considerably between sectors. There is a strong need to recognise diversity among social entrepreneurs. Indeed mainstream entrepreneurship studies have often been criticised for failing to address heterogeneity (Ahl, 2006; Essers and Benschop, 2007) and it appears that these issues are at least as pronounced with regards to social entrepreneurship. An emphasis on entrepreneurial traits can therefore be criticised as being overly reductionist in that it discursively creates a hegemonic model of the social entrepreneur as s/he ought to be. Furthermore, it embeds the characteristics of social entrepreneurs into individualistic and economic settings, while disregarding the impact of the socially interactive and emotional settings (Goss, 2005). Social entrepreneurs: motivations, obstacles and strategies In addition to work focusing on who social entrepreneurs are, other studies analysed why they choose to become social entrepreneurs, the obstacles they face in doing so, as well as some of the strategies they employ to overcome these. This approach departs from attempting to describe successful social entrepreneurs in that it does not solely rely on natural characteristics but also recognises the importance of the environment, for instance through cultural or social influences. As such, social entrepreneurial awakening can be seen as a multiplicity of trigger factors in individual, personal, familial and professional backgrounds. Becoming a social entrepreneur can be seen as the end result of a more or less long maturing journey, characterised by a range of positive and negative inputs which are interpreted in a time-dependent cultural, societal and personal context. Amin (2009) talks about two main routes that lead to becoming a social entrepreneur. One is about being nurtured with the social economy and using the skills and resources acquired within that setting. The other is to come from the public or private sector and apply skills gathered there in the context of the social entrepreneurship. Motivations for social entrepreneurs are extremely complex, with evidence that rational choice theories are inappropriate due to the complexity and range of different inputs and their interpretations (Spear, 2006). Most studies find that there are usually many similarities between the motivations of mainstream and social entrepreneurs. Social entrepreneurs may not rate independence and income security highly, but give a lot of importance to their social objectives (Shaw and Carter, 2007). These social objectives are often portrayed as additional factors (Prabhu, 1999; Spear, 2006; Hudson, 2009) and include factors such as altruism, ethical/social concerns or ideological aims. While there is a significant degree of overlap among these categories, all of these extra motivations rely heavily on an individualistic identity construction, without considering the collective identitys role. Furthermore, social entrepreneurs motivations remain conceptualised using the entrepreneurs model, albeit with some added elements. This approach of adding extra elements is replicated when looking at the obstacles faced by social entrepreneurs. These are presented as being quite similar to those faced by mainstream entrepreneurs (Thompson, 2002). Future research will need to consider how some factors such as ethnicity and gender affect the magnitude of the obstacles encountered. Very little work has looked at issues of diversity among social entrepreneurs. The UK Government Equalities Office (2008) examined the motivations and obstacles associated with women social entrepreneurs within BAME (Black, Asian and Minority Ethnic) communities. This work identifies a tendency to get involved with ones community as a motivating factor while at the same time experiencing multi-disadvantage and discrimination. Multiple, and interacting, layers of identity can therefore be seen both positively and negatively. Generally social entrepreneurs report experiencing difficulties in accessing finance, as do mainstream entrepreneurs. Alternate sources of funding are used with little reliance on the three Fs (family, friends and fools), but instead finance is sought from charitable trusts or the public sector (regional, national, and European) (Shaw and Carter, 2007). This differs from the situation among mainstream entrepreneurs, who are more likely to rely on bootstrapping methods of financing their business (relying on internal funds rather than raising money externally). Women entrepreneurs are themselves more likely to rely on bootstrapping, raising the question of whether this is also the case among women social entrepreneurs. Another characteristic of social entrepreneurs is that they tend to operate in locations and sectors where they have experience (Shaw and Carter, 2007). Although this could be presented as caused by lack of experience, it could also be explained by the fact that they use available resources in a way that maximises their experiential capital. Alternatively, it could also be a strategy to minimise risk. As Shaw and Carter (2007) stress, in the context of social entrepreneurship, social and personal risk are more prevalent as opposed to financial risk. No discussion of the concept and experience of risk among women social entrepreneurs exist in the literature to the authors knowledge. Women in the Social Entrepreneurship To understand the area of female social entrepreneurs, and given the paucity of material available, this paper will therefore take a broader view by examining research on gender more broadly defined before discussing how the findings in those fields may apply to social entrepreneurs. Labour can be subdivided into at least three categories: self-employed, domestic and community work. While the experiences of women in both self-employment and domestic work have been well documented, less work has been undertaken on their community work and volunteering. This section aims to present some of the key findings in the literature on womens paid and voluntary labour. Mailloux et al., 2012 says women have had a positive impact on society through their involvement in the social entrepreneurship, by putting some topics such as children, family, womens health, violence and discrimination towards certain groups of population on the social agenda. Research also suggests that women may use the voluntary sector to counteract negative attributes such as re-entry to the labour force or building up skills. Generally, the involvement of marginalised groups is they women, ethnic-minority groups, are associated with greater levels of change. This can be seen through the involvement of women in supporting womens issues, sometimes within particular communities which may otherwise not benefit from the services or products provided. Caputo (1997) for example finds a link in the US between black women volunteering and changing social conditions. Research on women in the social entrepreneurship, whether in paid work or volunteering, attempts to generate a profile of these women and what they do. The proportion of women involved in the social entrepreneurship is greater than other parts of the labour market, as shown by example by Mailloux et al. (2002) and Teasdale et al. (2011) in Canada and the UK respectively. Their activities are contrasted to that of men and studies show that there are differences apparent in the type of work performed by women, the type of organisations they are involved with, as well as the nature of their involvement within these organisations. Women perform extra volunteer work on a regular basis (e.g. care work) without recognising it as such in the formal voluntary sector (Mailloux et al., 2002). In addition, the link between lower earnings and women seems to also apply in the social entrepreneurship, with lower salaries and benefits than in the private sector in a Canadian context (Mailloux et al., 2002). The popular misconception that involvement in volunteering is a way of occupying free or leisure time, particularly among privileged groups, needs to be challenged given that, in fact, much (less formalised) volunteer work is being undertaken by members of marginalised groups in order to counteract negative circumstances (Neysmith and Reitsma-Street, 2000). The motivations of women in the social entrepreneurship do not appear to be specific to women. They can consist of wanting to make a difference, to act, to help; belong to a group; build links with the community (Mailloux et al., 2002), thereby suggesting that there is a strong community embeddedness in the voluntary sector. Neysmith and Reitsma-Street (2000:336) emphasise that what they call the participatory component should not be underplayed and that volunteers attach importance to being part of something that [à ¢Ã¢â€š ¬Ã‚ ¦] is ours, not mine or theirs'. The motivations for volunteering are therefore seen as wanting to build relationships with others, developing life and work skills, getting ownership of the fruit of ones labour and combating negative social stereotypes. However, volunteer work is devalued in contrast to paid work. One aspect of this devaluation is through the invisibility of volunteer work. Volunteering has been theorized as an extension of womens family work, reinforcing separate spheres of ideology where mens work is defined and rewarded, as a public contribution but womens work, even though done in the community, is defined essentially as an extension of their private responsibilities to family (Neysmith and Reitsma-Street, 2000: 342). Further research should examine the extent to which expectations of such gendered roles are present in the social entrepreneurship. In terms of paid work, Gibelmans (2000) research suggests that the glass ceiling is still prevalent in the US nonprofit sector, along with evidence of a gender pay gap. An analysis of HR policies revealed a set of anti-discrimination affirmations with usually no plans for implementation. Furthermore, policies related to facilitating access to management for women (i.e. flexitime or help with caring arrangements) were seldom addressed. The study however fails to examine the role these policies play in (dis)advantaging (wo)men. Indeed, Moore and Whitts (2000) findings indicate that men are disproportionately more present on voluntary organisations boards, more likely to occupy multiple seats and to be involved in a various number of sectors compared with their female counterparts. As they state, nonprofit boards in the United States remain bastions of white, male privilege (2000: 324). Overall, the authors conclude that attention needs to be given to the lack of access to boards to pro mote greater gender equality rather than on how individuals fare within the boards once they get in. The notion of conflict for women between traditional and modern gender roles is an important one to draw upon. Very little work has been done on this topic, but some US and Canadian evidence suggests that even though women hold a desire to break away from traditional gender roles, there are advantages in using these along with punishment for moving to a more modern structure (Mailloux et al., 2002). However, this move to more modern gender roles may have a detrimental effect, particularly on volunteering, with lower participation from women (Caputo, 1997). The extent to which these patterns of inequality are found amongst social entrepreneurs is largely under-researched. In addition, since many of the sources quoted above are based in North America, the degree to which these findings could be extrapolated to Europe, or the rest of the world, remains a serious concern. Current European studies (e.g. Teasdale et al., 2011; Humbert, 2011) infer that there are many similarities, but their number and scope remains limited. In their study, Teasdale et al. (2011), support many of the findings highlighted in this section, and are not able to examine social entrepreneurs operating in either the public or private sector. While there is a dearth of research into gender effects in the social entrepreneurship, patterns of inequities present in the private sector may be largely replicated in the social entrepreneurship, albeit on a smaller scale. The extent to which these patterns are similar, or different, remain critically under-researched. Furthermore, none of this work to date has been applied to social entrepreneurs. In the next section, a gendered reflection on these areas of research is provided, along with some possible topics of research into this field. Conclusion Research on social entrepreneurs remains largely dependent on the assumption that a common set of characteristics inherent to social entrepreneurs exists. In effect, this has led to attempts to produce a universal definition of the social entrepreneur. This approach, which replicates the development of research on entrepreneurs, is problematic in the context of female social entrepreneurs since it relies on individual characteristics and may ignore the collective nature of entrepreneurship and may not address the real diversity of social entrepreneurs. This tendency towards the reification of the social entrepreneur requires further research particularly in terms of how it affects men and women differently and whether it excludes particular groups. This tension replicates the long-running argument in mainstream entrepreneurship as to the degree of inclusiveness that should be bestowed to the definition of an entrepreneur. Indeed, this area of research remains highly centred on previous research on entrepreneurs, and merely adds in extra elements, such as the social or the female, often ignoring the contribution of the intersection of these two concepts. It is the lack of attention given to the interaction between these two concepts, coupled with a lack of questioning of their stereotypical underpinning, that constitute one of the major drawbacks of this field of research. The stereotypical position is often evident through studies undertaken on women in the social entrepreneurship. Women are portrayed as doing different types of jobs, in different types of organisations, at a lower level and for less money. The rhetoric of difference (with men?) prevails. Moreover, women are portrayed as not motivated by pecuniary reasons but more by a desire to act as what can only be described as mothers of the community: women are there to help, to build, for others but never for themselves, and are seldom valued or rewarded for their work. Research undertaken on social entrepreneurs has often consisted of examining them in contrast with mainstream entrepreneurs (Nicholls, 2006). There is a lurking danger in any comparative stance in that it can easily position one party as the deviant other, often implying an inferior position. This is certainly the case with female entrepreneurs (Ogbor, 2000; Bruni et al., 2004; Hytti, 2005; Ahl, 2006). Indeed, previous research has shown that in the case of female entrepreneurs, it might be inadequate to use theories derived from an essentially male experience to describe women entrepreneurs (Stevenson, 1990; Greene et al., 2003). This argument has much deeper implications in that it shows that existing models of entrepreneurs based on the so-called mainstream entrepreneur are models based on what Ogbor (2000) terms the white male hero. These models assume that the entrepreneur does not have caring and/or domestic responsibilities (Ahl, 2006). The challenge resides in creating new models or adapting these to the area of the social and the female simultaneously. Adapting models in entrepreneurship research such as the family embeddedness perspective advocated by Aldrich and Cliff (2003) or the socio-economic context presented by Brush et al (2009) would be beneficial. The difficulty in conducting research on women as social entrepreneurs lies in paying attention to the discourses briefly outlined in this paper. It is important to depart from these discourses, as discourse and perspectives about, and for, the nature of entrepreneurialism are fundamental to both theory (how we think about, conceptualize and define terms) and practice (what capabilities and behaviours we believe apply to people whom we refer to as entrepreneurs) and moreover, to how the terms are used in a wider socio-political arena to serve particular ends (Chell, 2007:7).