Wednesday, November 27, 2019

Chapter 5 Essay

Chapter 5 Essay Chapter 5 Essay Priciples of Marketing by Philip Kotler and Gary Armstrong Chapter 5 Managing Marketing Information to Gain Customer Insights PEARSON Objective Outline Model of Consumer Behavior 1 Define the consumer market and construct a simple model of consumer buyer behavior. Characteristics Affecting Consumer Behavior 2 Name the four major factors that influence consumer buyer behavior. Objective Outline 3 Types of Buying Decision Behavior The Buyer Decision Process List and define the major types of buying decision behavior and the stages in the buyer decision process. The buyer decision Process for New Products 4 Describe the adoption and diffusion process for new products. Model of Consumer Behavior Consumer Buyer Behavior Consumer buyer behavior refers to the buying behavior of final consumers ─ individuals and households that buy goods and services for personal consumption. All of these final consumers combine to make up the consumer market. Model of Consumer Behavior We can measure the whats, wheres, and whens of consumer buying behavior. But it’s very difficult to â€Å"see† inside the consumer’s head and figure out the whys of buying behavior (that’s why we call black box). Marketers spend a lot of time and dollars trying to figure out what makes customers tick. Characteristics Affecting Consumer Behavi or Cultural Factors Culture Factors Culture Subculture Social Class Culture ï  ¬ ï  ¬ Culture is the of basic perceptions, wants, ï  ¬Every group orset society hasvalues, a culture, and cultural Marketers are always trying to spot cultural shifts so and behaviors learned by a member of society from influences on buying behavior maymight vary greatly as to discover new products that be wanted. family andcountry other important from both to countyinstitutions. and country to country. ïÆ'Ëœ Many marketers now embrace cross-cultural Subculture ïÆ'Ëœ They tend to be deeply family oriented and make shipping a family marketing ─ the practice of including ethnic affair ─ children have a bigand saycross-cultural in what brands they buy. within themes perspectives ïÆ'Ëœ Hispanic Asian Americans aretend the secondïÆ'Ëœ Each Older,ïÆ'Ëœ first-generation consumers to be very brand ï  ¬ culture contains smaller subcultures, or gro mainstream marketing. Although their morefastest-growing price conscious than other subsegment afterinterest in loyal andsegments, to favor brands and sellers who show special ïÆ'Ëœ Cross-cultural marketing appeals to consumer blacks are also strongly motivated ups of people with shared value systems based on Hispanic Americans. them. by qualitysimilarities across subcultures rather than and selection. ïÆ'Ëœ Asian consumers shop frequently and common life experiences andshown situations. ïÆ'Ëœ Younger Hispanics, however, have increasing price differences. ïÆ'Ëœ Brands are important. areand the amost brand conscious of all the sensitivity recent years willingness to switch to store ïÆ'Ëœ Many marketers are finding that insights ïÆ'Ëœ Inin recent years,ethnic manygroups. companies have brands. developedgleaned from ethnic consumers can influence special products, appeals, and ïÆ'Ëœ They there can beexist fiercely brand loyal. ïÆ'Ëœ Within the Hispanictheir market, many distinct subsegments broader markets. marketing programs for them. based on nationality, age, income, and other factors. Hispanic American Consumers African American Consumers Asian American Consumers Cross Cultural Marketing Social Class ï  ¬Social classes are society’s relatively permanent and ordered divisions whose members share simil ar values, interests, and behaviors. Social Factors Social Factors Groups and Social Networks ï  ¬ A group is two or more people who interact to accomplis h individual or mutual goals. ï  ¬ Reference groups serve as direct or indirect points of com parison or reference in forming a person’s attitudes or beh avior. ï  ¬ Reference groups expose a person to new behaviors and l ifestyles, influence the person’s attitudes and self-concept , and create pressures to

Saturday, November 23, 2019

Bad Effects of Vitamin Excessive Intake Essays

Bad Effects of Vitamin Excessive Intake Essays Bad Effects of Vitamin Excessive Intake Essay Bad Effects of Vitamin Excessive Intake Essay Too much of a good thing is an adage that can apply to vitamins. The body needs vitamins to function properly, but high doses of certain vitamins can be toxic, especially fat soluble vitamins that the body stores for long periods of time. Water Soluble Vitamins Water-soluble vitamin toxicity is rare because the body does not store water-soluble vitamins and excess amounts are usually excreted in urine. Side effects associated with water-soluble vitamins occur due to intake of extremely high doses.Peripheral neuropathy, a nerve disorder that can cause numbness and pain in the extremities, is a possible side effect of too much vitamin B6, according to Merck. Medline Plus says more than 2,000mg of vitamin C a day is not recommended because it can upset the stomach and cause diarrhea. Vitamin A Vitamin A is a fat-soluble vitamin that supports vision, immunity, genes, growth, development and production of red blood cells. Vitamin A from food sources is not harmful in large amounts but may cause skin discolorations.However, supplemental vitamin A can be toxic. According to the Linus Pauling Institute at Oregon State University, acute vitamin A toxicity is rare but can cause nausea, headache, fatigue, loss of appetite, dizziness, dry skin and swelling of the brain. Side effects of chronic vitamin A toxicity include dry and itchy skin, loss of appetite, headache, swelling of the brain and bone and joint pain. Vitamin D Vitamin D is a fat soluble vitamin that the body needs for bone formation, calcium absorption and immune function.Too much vitamin D can lead to hypervitaminosis D, according to the Mayo Clinic. Side effects of hypervitaminosis D include calcium buildup, loss of appetite, renal failure, bone calcifications, weakness, nausea, vomiting, kidney stones, confusion and abnormal heart rhythms. Side effects of too much vitamin D are treated by discontinuing supplementation, restricting calcium intake and, in severe cases, hospitalization. Vitamin E Vitamin E is a fat-soluble vitamin and antioxidant that fights free radicals, harmful substances that damage the body.According to the Merck Manual, too much vitamin E can cause bleeding. Medline Plus also mentions that the American Heart Association made a statement in 2004 that more than 400 IU of vitamin E a day may increase the risk of death. Multivitamins Multivitamins are made up of a variety of water-soluble and fat-soluble vitamins and are often prescribed for people who need extra nutrients or are unable to get enough vitamins through diet alone. According to Medline Plus, various ingredients in a multivitamin can be toxic in high doses.Side effects of too much multivitamin include cloudy or frequent urination, dry and cracked lips, eye irritation, sensitivity to light, abnormal heartbeat, pain or weakness in joints, muscles and bones, cognitive and mood changes, itchiness, rash and hair loss. Intestinal side effects of too much multivitamin are constipation, dia rrhea, nausea, vomiting and stomach pain. Effects include(VA ) * Angular cheilitis * Birth defects * Coarse bone growths * Excessive skin dryness/peeling (desquamation) * Hair loss Intracranial hypertension (see  Idiopathic intracranial hypertension[1]) * Liver  problems * Premature  epiphyseal  closure[2][3][4][5][6] * Reduced  bone mineral density  that may result in  osteoporosis * Skin discoloration Symptoms of vitamin D toxicity include: * Dehydration * Vomiting * Decreased  appetite * Irritability * Constipation * Fatigue * Muscle weakness * Metastatic calcification  of the soft tissues[2] An excess of vitamin D causes abnormally high  blood  concentrations of  calcium  (hypercalcemia), which can cause overcalcification of the  bones,  soft tissues,  heart  and  kidneys.It can also damage the kidney and produce  kidney stones[citation needed]. In addition,hypertension  can result. [3]  Ongoing research indicates antagonism with oil sol uble  menatetrenone, MK-4, an internally transported natural form of  vitamin K2, which is associated with bone formation and calcium retention in the bones. [citation needed] Hypervitaminosis D symptoms appear several months after excessive doses of vitamin D are administered.In almost every case, a low calcium diet combined with  corticosteroid  drugs will allow for a full recovery within a month. - Symptoms and presentation[edit] * Blotchy skin * Increased bleeding * Increased  triglycerides * Decreased production of thyroid hormones * Decreased activity of  vitamin K * Increased hemorrhaging from aspirin or anti-coagulant medications * 29. Hypervitaminosis K Causes excess clotting of the blood leading to thrombosis and potential sudden death should clots form in brain or heart

Thursday, November 21, 2019

Improving Construction Safety in Saudi Arabia Dissertation - 1

Improving Construction Safety in Saudi Arabia - Dissertation Example However, based on a premise of sustained and continuous improvement, it is desirable to find ways and means for improving construction health and safety in the Kingdom of Saudi Arabia, a nation that presents certain constraints. A laxity in implementation of commercial and contractual laws and a traditional approach to solving problems related to labour shortage by recruitment of fixed-term contract labour as cheaply as possible from underdeveloped nations rather than efforts aimed at creating a permanent pool of labour through permanent immigration characterise most GCC countries. This study concludes that it is possible to improve construction health and safety in the Kingdom of Saudi Arabia by effective enforcement of existing health and safety laws, enacting legislation for off-site health and safety for migrant workers, maintaining a fund for social security and improving regulation of commercial and contractual transactions. ... 3.1 Research Approach for the Dissertation Project 46 3.3 Design and Administration of the Survey 49 3.4 Sample Selection and Sample Size 52 3.5 Analysis of the Survey Data 53 4 Results 58 5 Analysis and Interpretation 78 6 Conclusions and Recommendations 86 Appendix A – Survey Questionnaire 88 Appendix B – Consent Form 105 Bibliography / References 107 List of Figures Figure 1: Quantitative vs. Qualitative Research 42 Figure 2: Suggested Research Process for Construction Management Research 43 Figure 3: The Research Process for Construction Research 45 (This page intentionally left blank) 1 Introduction It is rather unfortunate, but true, that the construction industry around the world had developed a reputation for being the industrial sector that presents higher statistics for industrial accidents, fatalities and deaths than any other (Coble, 2000, Pp. vii - viii). United States Department of Labour for the year 2006 indicated that construction fatalities represented about 21% of the total work force fatalities (Lambeck, 2009, Pp. 72 – 74). However, efforts directed towards continuous improvement in construction safety in many countries, including Japan, South Korea, China, etc. demonstrate that it is possible to reduce the incidence of occupational injury, serious accidents or deaths (Poon, 2008, Chapter 1). Statistics for construction industry accident frequency rates per million of men hour worked for Singapore suggest that with an accident frequency rate per million man hours of 3.5 for the construction sector in comparison to 1.9 for all other industries help to illustrate the notoriety of the construction sector (Poon, 2008, Chapter 1). However, results for Japan, Korea and Hong Kong demonstrate improvement with effort. Reports about the construction

Wednesday, November 20, 2019

Google in China Analysis 2 Vo Essay Example | Topics and Well Written Essays - 500 words

Google in China Analysis 2 Vo - Essay Example een identified among the Chinese internet users as they prefer localized search engines over foreign ones, here Google encountered a positioning enigma as well. As for the usage patterns are concerned then Chinese market is substantially different in more than one ways. They do more blogging, a more thorough browsing and more localized way of searching the internet. Apart from these, censorship and repressive strategy over internet browsing are some more barriers that are placed to Google’s progress in the Chinese market. However with a population of more than 1 billion people and one of the fastest internet penetration rates, Chinese market cannot be ignored by a player like Google (Lawrence, 2009). The Chinese Internet market comprised of 103 million internet users in 2005 and this number grew exponentially to 316 million till April 2009. In 2005, entertainment was the main reason for internet usage in China with around 38% of the users identifying it as their sole purpose of browsing; however till 2009 the trend has shifted to more sophisticated browsing habits such as news 79%, Blog 54%, Search 68% and Email 57%. In 2005, 69% of users had internet access at home while 38% at work, in 2009 the scenario has changed and internet cafes and schools have also emerged as centers with internet access (Lawrence, 2009). In 2009 dimensions of entertainment have also developed and gaming and social networking have also become integral components of the category. Internet penetration rate in China is 25% and this makes China a great market for players like Google to capitalize up on. In 2005 one in seven users was above 30 years of age but in 2009 the average age group is 25 years, indicating youth dominance among internet users. In all in all Chinese internet market shows sustainability and signs of growth and further development. In US average internet user age is 42 with annual penetration rate of 3% suggesting that it has reached the saturation level and newer

Sunday, November 17, 2019

The Savage World Essay Example for Free

The Savage World Essay Thorstein B. Veblen viewed society anthropologically and utilized psychology than relying on the laws of economics.   He believes that the human nature predominantly is like a beast or he lives in a savage world meaning that in order to survive one must get use into a predatory life cycle that life is the struggle of the fittest.   That savagery is a death to the weakest.   To support his claim that the society where man lives is a savage world, he concluded that the human nature itself is beast as he wrote in his book the Theory of the Leisure Class when he elaborated on â€Å"conspicuous consumption† (Heilbroner).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   He made mentioned about the relations between the balance of expense, salary, and the return of investments with regards to hedonistic concept or the materialistic points of view of man equated in his own instinct to survive.   Man adaptation to use the means for an end in his own term which he has coined evolutionary which mean that the economic life history of a person is to habitually seek realization by doing something which includes invention and use of modern technologies like for instances that businessmen are replaced by engineers.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The goods of this earth are for man’s usage but not in any circumstance should the ends will justify the means.   Man can be a savage by nature but he is still a free individual who could think rationally: that the means are only to serve the end or purpose or material things are only needed by man to survive but it can never be his only reason for existence.   Money makes the world go round and indeed it helps but if the means are prioritized over man and dignity of labor put aside then human existence will become a beastlike existence.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   However, Veblen observes the reality of a consumerist world but again concluded that putting the material over the good of the human person depletes man’s existence to survive and perhaps jeopardize his own dignity. He believes strongly that a person do not only work to accumulate money but also to invigorate his pride.   In him work has a greater dimension unseen by the barbaric man whose only pleasure is money.   In his writings he identifies the leisure class as the savage of work and the consumerist class. These are the capitalists who retard and distorted the industry, whereas the middle class work for perfection and for the support of their children whom he referred to as nobler.   He further mentioned that the leisure class is like parasites living by the innovativeness of other men.   The aloof skeptic called them robber barons for which dishonesty became a virtue and dug further to why by nature man is selfish. He acknowledges further that it is the contemporary savage who had accumulated too much wealth and is not really proud of his work but only in the public display of his wealth.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Veblen’s pessimistic but realistic view of the world he lives in made him one of the best worldly philosophers of the twentieth century.   He’s works are still read today because it warns the future from permanent depression that if man continues to tolerate inequality of labor, inequitable partitions of wealth and the tolerance of not withholding the entrepreneurs in the accumulation of too much profit then we will be doomed to live a place in which Veblen calls the savage world.   Veblen a genius and nonconformist in character made him isolate himself from a drastic world of the greedy and preferred to die a simple death at his cabin.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Economic prosperity or world progress is still within the bounds of the hands that work together for a common good but not for those who seek ones own personal gratification. Works Cited Heilbroner, Robert Louis. The Worldly Philosophers.   (2007). 05 December 2007 http://www.cliffsnotes.com/WileyCDA/LitNote/The-Worldly-Philosophers.id-163,pageNum-3.

Friday, November 15, 2019

Skin Deep :: Self Image Beauty Essays

Skin Deep We drove all the way down to New Jersey. We usually reserve NY/NJ trips for Korean grocery shopping and long weekends. It was a perfectly nice March day out—brisk, but sunny, with just enough warmth for a light jacket. This was my dad’s idea. I was pretty against the whole thing, but I decided to give it a try; it wouldn’t hurt to try, would it? Ever since I was young I have had scars on my face from a severe case of chicken pox. The doctors worried that my face would be scarred much worse than it is. They gave my parents two options—sand my skin down to create smooth skin which could potentially cause worse scars and redness in cold temperatures, or do nothing and hope that the scars would disappear over time. My parents, hoping for the best, went with the latter choice. And some 18 years later, my father questioned this decision. Dr. Grace Kim got her bachelor of science in biology from MIT in 1995. My father found her office advertisement in the Korean community newspaper. She shared her office in Inglewood, NJ with two other doctors whose degrees from prestigious universities hung like graffiti on the walls. The office was softly lit and had a sort of Zen themed feel to it with bamboo shoots, rocks, stone tables, all classily done. The magazines spread across the rock table tops were plastered with skinny young Korean girls with perfect chins and tiny frames. I could sound out the words on the cover: â€Å"ooh-manz sen-suh† or â€Å"Women’s Sense.† The door opened and my name was called. My scars never really bothered me. I can remember the few instances when someone had noticed them and asked about them. But having someone specifically appointed to sit, stare, examine, and evaluate what â€Å"your biggest problem areas are† is not the highest rung on the self-esteem ladder. There are some days I don’t even notice my scars; then again, there are days they seem to pop off my face eclipsing my otherwise clear complexion. Dr. Kim’s remedy for my scars was to cut the â€Å"more noticeable ones† using a very precise eyelet cut, stitch, then after healed, use laser technology to smooth the scarring from the stitches. Each eyelet cut would cost $200 and â€Å"with my condition† could cost over $2000. But before any services could be rendered, her exclusive line of skin emulsifying products must be used 6 weeks prior to surgery.

Tuesday, November 12, 2019

Data Analysis – Viscosity

Data Analysis – Viscosity Introduction: My aim it to find out the different types of liquids are more or less viscous than each other and why. Some liquids flow more easily than others do. For example, honey is very â€Å"thick† and flows very slowly. Water is thin and flows very quickly. So honey is more viscous than water. Liquids that are made up of small molecules have a low viscosity and liquids with long chain molecules (such as plastics) have a much higher viscosity. The viscosity of materials generally decreases with increasing temperature. (EXAMPLE) A definition of viscosity; â€Å"Viscosity is a measure of a fluid's resistance to flow.It describes the internal friction of a moving fluid. A fluid with large viscosity resists motion because its molecular makeup gives it a lot of internal friction. A fluid with low viscosity flows easily because its molecular makeup results in very little friction when it is in motion. Gases also have viscosity, although it is a little harder to notice it in ordinary circumstances. † (1) As temperature increases, the average speed of the molecules in a liquid increases and the amount of time they spend â€Å"in  contact† with their nearest neighbours decreases. Thus, as temperature increases, the average intermolecular forces decrease.The exact manner in which the two quantities vary is nonlinear and changes abruptly when the liquid changes phase. (2) I am going to use the following alcohols: Ethanol Propanol Butanol Pentanol Hexanol Heptanol Octanol Decanol As there are many of them I am not going to use all of them, only a couple, because it would take time doing all of them, also we don’t have a lot of time in our lesson. Aim: My aim is to find out why some liquids flow more freely than others I am also going to investigate the different alcohols. Hypothesis: I predict that the more carbon molecules it has the less viscous it is.So it would take longer to flow. It is because of the types of alcohol. For instance Propanol is less viscous than Octanol. Preliminary experiment: I carried out a preliminary experiment with different alcohol for each experiment. We did this experiment only once just to get an idea of which experiment seemed the best for us to do. The results are shown in the table way below. Aim: The aim of this was to find out which experiment we wanted to do and which seemed the best to us also which one was fairer and would be easier for us to do and explain why we chose the experiment we did.Prediction: Once I saw our teacher show us the experiment I thought the Tilt Test would actually be ‘cool’ to do but I didn’t want to make my mind up just yet so I tried all of them out. I predict that once you go down to the alcohols with the more carbon lengths are more viscous. Apparatus used: * Alcohols; * Ethanol (2), * Propanol (3), * Butanol (4), * Pentanol (5), * Hexanol (6), * Heptanol (7), * Octanol (8), * Dectanol (10)) For Til t Test: * White tile * Clamp Stand * Pipette * Gloves * Stopwatch * China graph Pencil For Glass Tubing: * Clamp Stand * Blue Tack Air Bubble * Stopwatch * Gloves * Clamp Stand For Ball Bearing: * Ball * Test Tube * Bung * Test Tube Rack * Stopwatch * Gloves Method: Ball bearing: 1. Hold the bung with your thumb and turn it. 2. Quickly time the time taken for the ball to move up. 3. Write down the time taken. Tile Test: 1. Mark the tile from the top horizontally same for the bottom. 2. Get the alcohol and put a drop at the top before the black line so you can measure it easily. 3. Time the time taken for the liquid to flow down at your finish line. 4. Then write down the time taken. . Wipe off the liquid and start again from No. 2. Glass Tubing: 1. Turn the tube upright by holding the clamp not the tube. 2. Time the time taken for the bubble to move up 3. Write down the time taken. Fair test and Safety: Results: Tilt Test: Chemical| Time Taken (1)(Seconds)| Time Taken (2)(Seconds)| Time Taken (3)(Seconds)| Mean(Seconds)| Ethanol (2)| 20. 16| 20. 28| 20. 16| 20. 20| Propanol 2-ol (3)| 30. 00| 12. 52| 28. 79| 23. 77| Butanol (4)| 10. 5| 19. 42| 15. 94| 15. 30| Heptanol (7)| 18. 52| 15. 72| 20. 12| 18. 12| Octanol (8)| 31. 03| 12. 9| 19. 52| 21. 08| Glass Tubing: Chemical:| Time Taken (Seconds):| Ethanol (2)| 20 seconds| Butanol (4)| 28 seconds| Hexanol (6)| 48 seconds| Pentanol (5)| 39 seconds| Octanol (8)| 54 seconds| Ball Bearing: For ball bearing it was really hard to time the amount of time it took to fall as it was really fast. So we could write down our results quick enough. Conclusion: We chose to do ball bearing as it was really fast and we hardly had any time to time it also because thought it was an unfair test as we couldn’t time it probably and we could get it wrong.We chose not to do glass tubing because it was hard turning the clamp stand around plus it was really slow and took long to time. We chose to do tilt test as it seemed the fairest test out of the 3. Also we could change a few things so it would be fairer, like mark a point on the pipette so we get the same amount of alcohol on the tile etc. and wipe of the liquid later. Plus it would be good for a group of 3 as there are 3 jobs that we could do like putting the alcohol on the tile, timing the time taken for it to go pass the finish line also to note down the time taken and draw the table.Real Experiment: Aim: Prediction: Apparatus used and Justification: * Alcohols; * Ethanol (2), * Propanol (3), * Butanol (4), * Pentanol (5), * Hexanol (6), * Heptanol (7), * Octanol (8), * Dectanol (10) * White tile – We used this as it would be clearer to see than a black tile. * Clamp Stand – To keep the tile in the same position to keep it a fair test. * Pipette – to keep the measurements of the alcohol on the tile. * Gloves – To not get any of the liquid on our hands and also because of the safety. Stopwatch – To time the length of the time taken for the liquid to travel down the tile and it seems fair as we aren’t doing it in our heads because we could count slowly or faster than an actual second. * China graph Pencil – It is easier to see and to stop the pencil from dissolving as the marks did this. Method: 1. Mark the tile from the top horizontally same for the bottom. 2. Get the alcohol and put a drop at the top before the black line so you can measure it easily. 3. Time the time taken for the liquid to flow down at your finish line. 4.Then write down the time taken. 5. Wipe off the liquid and start again from No. 2. Fair test and Safety: Results: Conclusion: We marked the pipette so we got the same amount of solution each time to keep it a fair test. We kept the tile at the same height; we changed the types of alcohols. We thought it wouldn’t be fair if we left the alcohol on the tile so we wiped it off after every alcohol we used even if we had to use the same alcohol we still wiped it a s it would be unfair because that alcohol would’ve had more liquid so it could make it faster or even slower.We also kept the maker at the same starting and ending point. We had 3 people in our group, so we did the experiment 3 times so it was fair as we would be changing around what everyone did for instance, putting the liquid on the tile, timing th length it take =s for the alcohol to come down and also writing the time taken down. It was goo as if someone did it wrong we wouldn’t done it again but with a different person doing something different. Evaluation: We were all safe as we used gloves so the alcohol didn’t touch our fingers. We tied our hair back so it wasn’t flying around everywhere.We put our chairs under the table so no one got hurt and we had more room. We made sure the clamp stand was in the middle of the table so it doesn’t fall on anyone’s foot. We also made sure that the tile wasn’t loose so it wouldn’t fal l. I’d say we were 99. 9% safe! The tile wouldn’t stay on so it was at different length but one of us held it steady as one of the sides were up and the other was on the table. We measured it every time we used a different alcohol so it was at the same height each time. Next time we could just put it steady on one angle then measure it instead of doing it the other way.I guess my results are about right as my range bars ion my graph are quite close together, some more than others. So they are quite accurate. I think there are two outliers which are Propan 2-ol (2nd Try) and Octanol (1st Try). It was probably a silly mistake that we did, or it could’ve been the temperature of the room. We all did try the experiment and we did different things such as timing the amount taken for the alcohol to go down, getting the liquid in the pipette and putting it down on the tile and also noting down the time taken.One of us could’ve timed it before or after the alcohol was put on the tile, either that or the amount was too much or too less. Also some of them did evaporate when it nearly got to the end. I think from a scale from 1-10 my results would be a 6 with 10 being the most accurate and 1 being inaccurate. Next time I could measure the temperature and go into a room with no windows and nothing that’s going to affect the temperature so it’s always the same temperature. I could use the same pipette each time. References: 1. http://www. rinceton. edu/~gasdyn/Research/T-C_Research_Folder/Viscosity_def. html (date accessed 20th March 2013 – 15:25) 2. http://physics. info/viscosity/ (date accessed 20th March 2013 – 15:33) 3. http://chem4652011. webs. com/chem465-2. gif (date accessed 20th March 2013 – 15:44) 4. http://upload. wikimedia. org/wikipedia/commons/thumb/b/b8/Propanol_flat_structure. png/640px-Propanol_flat_structure. png (date accessed 20th March 2013 – 15:41) 5. http://upload. wikimedia. org/wi kipedia/commons/4/4b/Butanol_flat_structure. png

Sunday, November 10, 2019

Payment Methods in Ecommerce

With the rapid advancement in technology and the expansion of business, more and more companies are venturing into E-commerce in a race to grow not just regionally but also internationally. E-commerce adaption necessitates the change of the business model companies have been following traditionally and with it comes the change in the modes to make the payments.With the popularity of the internet for common use in business since 1990, E-commerce has been growing and touching the new horizons in every category of business , there are organizations today that depends heavily upon the E-commerce and there are examples amongst the fortune 500 giants which have seen tremendous growth in the era of E-commerce conducting the business online .(â€Å"Microsoft†,n. d) When the companies conduct business online the modes of financial payments become different from that of the traditional business payment ways like cash , checks, debit cards etc.Since while buying online, there is generall y no physical presence involved and customers could order the products sitting anywhere using their computers. B2B ( Business to Business)E-commerce today accounts for more than the 95 percent of total E-commerce and the B2B E-commerce means both the buying companies and the selling companies are the organizations and which consequently refer to larger amount of payment flow which is linked with buying or selling the products online , so electronic payment systems that are in place have to be very advanced when it comes to preciseness, security, privacy and the speed of processing the amount. â€Å"Turban et al† , 2004) There are always risk associated with the information that could be revealed over the internet while making a transaction and could lead to something unexpected like misuse of the instruments like credit cards and E-checks used to make the payment online. In an effort to make electronic payments more robust and error free, there are various protocols that are being utilized to encrypt the information being sent over the internet and these protocols differ in the encryption techniques. (â€Å"Electronic Commerce,† n. ) E-commerce is based on an ever advancing technology that gives birth to high end safety measures that could be applied while making the financial payments over the internet however internet Frauds, thefts still take place and need to be addressed since E-commerce is growing and would keep on growing at a fast pace as companies look to expand and make technology their platform for success in the retail market particularly. Introduction E -commerce is not limited only to buying and selling it also is an effective way of facilitating the inter and intra organizational flow of information and providing the customer service.There could be more than one way to define the E-commerce depending upon the prospective of the business and application of the technology, from a business prospective E-commerce is application of tech nology to make business more automated when it comes to day to day transactions and work flow, similarly if applied to the service industry E-commerce would mean a tool to address the service costs at the same time increasing the quality and speed of the service.The essay touches the various modes of electronic payment systems that are being used today as part of E-commerce today however it particularly concentrates upon online credit card payment systems, the terms related to the credit cards, their transactional process over the network, protocols that make credit card transaction secure over the internet . Some evolving electronic payment methods are simply electronic version of existing payment systems such as paper checks and credit cards and some other are based on the digital currency technology.Essay also focus upon the various protocols which exist to encrypt the information that is being sent over the internet to make the transaction exact and secure, the encryption techno logy that is being used along with the algorithms implanted in the cryptography techniques, the advantages and disadvantages of the various mode of payments that could make a difference when customers are concerned about the privacy and the security while making a transaction online keeping in view the amount of transactions that would take place in day to day business have been discussed since with increase in number of transactions number of thefts, frauds will also increase.Concept and Size of Electronic Payment Since payment systems use the electronic and computer networks, the nature of these payments is more complex than payment systems used in the conventional commerce so companies dealing in E-commerce should constitute frequent practice in banking. Most common form of the payments in E-commerce are payments made in Business to Business since they make more than 95 percent of total E-commerce payments today and these are executed through a proper network of electronic commun ication that would include digital telephony , IP telephony and use of internet to complete the transaction. (Turban et al, 2004 ) The amount of payment made in the electronic payment system varies from one type to another of the E-commerce; the payments that are made in the Business to Business E-commerce are quite higher than what are made in Business to Consumer or Consumer to Business types of the E-commerce.There are transactions that may range from $1 to $ 10 which generally take place in Business to Consumer form only and by their nature are known as the micro payments. Payments up to $ 500 are still mostly done under Business to Consumer form of E- commerce however are not considered micro payments, example of this could be buying a customized laptop from the Dell website which could cost around $500. (Danial, 2002) Payments higher than $1000 would generally fall under Business to Business E-commerce since individual customers who have to make a purchase bigger than this amo unt would preferably like to buy the products physically. â€Å"B2B transactions account about 95% of e-commerce transactions, while others account about 5%†. Turban et al, 2004 ) Modes of Payment in Electronic Payment system in E- commerce. There have been dozens of modes of payment in electronic payment system some of them are widely accepted and common however some of them are not. Some of them are just the electronic versions of the conventional methods that are there in regular form of commerce. Following are some common forms that are used in daily forms of E-commerce. 1. Electronic Fund Transfer. 2. Credit Cards. 3 E –cash. 4. Smart cards. 5. E –checks. 6. Electronic Debit Cards. Online Credit Card Payment System. â€Å"It seeks to extend the functionality of existing credit cards for use as online shopping payment tools.This payment system has been widely accepted by consumers and merchants throughout the world, and by far the most popular methods of pa yments especially in the retail markets†. (Laudon and Traver, 2002) A credit card is generally issued by the banks or other financial institution. It comes with a fixed amount of spending limit depending upon the type of the credit card and payment is to be made to the issuing institution within a stipulated time period it could be 30-40 days after which customer has to pay interest on the amount due. Following are the few terms that are related to the use of credit cards. 1. Card holder: – a card holder is the authorized person who is entitled to do purchases online using the card. 2.Card issuer: – Card issuer could be financial institution or a bank that has issued the credit card to card holder after a certain amount of verification about the card holder. 3. The merchant:- Merchant is the one who accepts payment via credit card used online in exchange of goods or services offered by him. 4. The acquirer: – a financial institution that establishes an acc ount for merchants and acquires the vouchers of authorized sales slips. 5. Card brand/card type :- there are types of credit cards that are accepted worldwide and different institution take care of different types of credit cards such as Visa and Master Card. (Turban ,Lee, King, chung , n. d)Process of using Credit Card While making a purchase online using a credit card, the transaction goes through a series of steps and following are few terms that need to be understood before understanding the transactional process, all these terms are kind of processes that could take place while processing a transaction. * Sale: A sale is when the card holder purchases a product or service from a merchant and the money is transferred to the merchant's account. *   Preauth: A preauth is not a sale transaction however it is a transaction to make sure that the credit card is valid and it typically charge around $1. 00(Techrepublic ,n. d)  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   * Postauth: â€Å"A p ostauth involves purchasing something before it is shipped. The customer can preorder something, and the amount is deducted from the customer's credit limit. No money is transferred, but the card hold is maintained on the customer's card.When the merchant fulfills (typically, ships the product), the merchant can perform a postauth to transfer the money and remove the card hold from the customer's card†. (Techrepublic, n. d) * Credit: This transaction is used while returning the good according to the procedure under the agreement and merchant puts the money back into the account. * Chargeback: A chargeback transaction is used in case of dispute settlement. In case of a dispute customer files a case and the financial institution involved temproraly withdraws money from the merchant`s account and transfers it to customer`s account. Each party have a certain number of days to prove the right billing and depending upon that amount goes in the account of right party. (â€Å"Techrep ublic† ,n. ) Steps involved in the online transaction While making a transaction customer fills in the credit card information on the HTML page and the information is sent over the server. 1. Server receives the information and sends it to the code that validates the information added by the user and if found valid this information is formatted into data that gateway could understand and is sent to gateway. (â€Å"Techrepublic† ,n. d) 2. â€Å"The gateway receives the formatted data from the HostRAD code, validates the card, and checks to see whether the amount for the transaction is available in the user's account†. (â€Å" Techrepublic† n. ) Upon validation if the card is found invalid or if there is not enough amount on the card a disapproval goes to the code and gateway charges the merchant money at this point of transaction even if it goes bad and if everything is found right the transaction is approved and an approval message is sent to the code. 3. Depending upon the type of the type of the card(Visa, Master card) gateway is batched upto the appropriate clearing house transactions arrive at the gateway, they're batched through to the appropriate clearinghouse. The clearinghouse that is used is determined by the credit card type and the bank that issued the card. As the clearinghouses receive transactions from all the gateways, the clearinghouses batch the transactions for all the banks involved, transferring monies from bank to bank.For providing this service, the clearinghouse takes between two percent and five percent of the total sale. (â€Å"Techrepublic†, n. d) 4. As the clearinghouses batch the transactions they receive, they transfer money from the customer's bank to the merchant's bank. 5. The merchant's bank receives the transactions from a clearinghouse and then transfers the appropriate amount of money for the customer transaction (started in box 1) into the Merchant's Card Not Present merchant account (†Å"Techrepublic†,n. d) Credit Card Transaction Security â€Å"More than 100 million personally-identifiable customer records have been breached in the US over the past two years. Many of these breaches involved credit card information. Continued credit card use requires confidence by consumers that their transaction and credit card information are secure†. (â€Å"Texas department of information resource† ,2009)The Payment Card Industry (PCI) Security Standards Council is the authoritarian agency that issues the standards and policies that help reduce the internet crimes in use of credit cards and all vendors that accept credit cards in their transactions have to abide by these laws . PCI council includes all the major Card brands like American Express, Discover Financial Services, JCB International, MasterCard , and Visa International. â€Å"Texas department of information resource† ,2009) â€Å"The Council created an industry-wide, global framework that d etails how companies handle credit card data – specifically, banks, merchants and payment processors. The result is the PCI Data Security Standard (DSS) – a set of best practice requirements for protecting credit card data throughout the information lifecycle†. (â€Å"Texas department of information resource† ,2009) â€Å"The PCI compliance security standards outline technical and operational requirements created to help organizations prevent credit card fraud, hacking, and various other security vulnerabilities and threats. The PCI DSS requirements are applicable if a credit card number is stored, processed, or transmitted.The major credit card companies require compliance with PCI DSS rules via contracts with merchants and their vendors that accept and process credit cards. Banks, merchants, and payment processors must approach PCI DSS compliance as an ongoing effort. Compliance must be validated annually, and companies must be prepared to address new a spects of the standard as it evolves based on emerging technologies and threats†. (â€Å"Texas department of information resource† ,2009) Following are some terms related to online Credit card frauds â€Å"Phishing – This technique refers to randomly distributed emails that attempt to trick recipients into disclosing account passwords, banking information or credit card information. This one scam has played a major factor in the crisis we face today.Since phishing emails typically appear to be legitimate, this type of crime has become very effective. Well designed, readily available software utilities make it nearly impossible to trace those guilty of phishing. Phishtank, an anti-phishing organization, recently revealed that nearly 75,000 attempts of this nature are made each month† Pharming – This new technique is one of the most dangerous of them all. Pharming involves a malicious perpetrator tampering with the domain name resolution process on th e internet. By corrupting a DNS, (Domain Name System), a user can type in the URL for a legitimate financial institution and then be redirected to a compromised site without knowledge of the changes.Unaware of the background predators, the consumer types in their bank account details or credit card number, making them the latest victim of fraud. Skimming – refers to a process in which a special device is used to copy encoding data from the magnetic strip of a credit or debit card. This device is usually secretly mounted to an ATM machine as a card reader. Dumpster Diving – this act refers to a process in which an individual vigorously shift's through someone else's trash in search of personal and financial information. With a mere credit card approval that contains a name and address, a criminal can easily open up a credit card in your name and accumulate substantial debt in no time.Security measures in online credit card payment systems. Four necessary and important m easures that must to be followed for safe electronic system are as following. 1. Authentication Authentication is a method to verify buyer`s identity before payment is authorized. 2. Encryption Encryption is a process to making data that has to be sent over the internet indecipherable so that it could not be read by unauthorized persons and read only by the persons in authority to do so. 3. Integrity It has to be made sure that information that is sent over the internet is not modified, altered in an intentional or unintentional way. 4. Nonrepudiation This is the quality of a secure system that prevents anyone from denying that they have sent certain data. Here the communication system should be fault tolerant. Server where the transaction has been sent should keep a record log of every transaction and the user can't deny that he or she has not accessed the server. Security Schemes Key security schemes that make sure that information sent over the network while engaging in a transac tion is secure include encryption, digital signature, certificates and certifying authorities. Encryption:-Encryption is a technology that deciphers any kind of information before being sent over the network so that it could not be retrieved and misused by an unauthorized person.Two common encryption technologies that are used to encrypt and decrypt the data are Secret key and public key encryption as explained below. Secret Key encryption In this cryptography technique one key that is known as secret key is used to both encrypt and decrypt the data at sender`s as well as receiver end . Secret key encryption is easy to implement when number of users are less. The algorithm that is used for secret key cryptography is Data Encryption standard (DES) (Schneier ,n. d). The only problem with this encryption method is that the key has to be sent over to the counterpart. (â€Å"Dret†, n. d) Public key cryptography/Assymetric encryption.In this kind of encryption there are two keys th at form the part of encryption technology they are the public key and the privaret key . the public key is known to allthe users however the private key is only known to one user the owner. there are two methods the kep pair could be used eithet the data could be encrypted by the receiver`s public key and it will be decrypted by his private key but there is a problem with this method since the encrypting key is public key no body will know who sent the message the other way is encrypting the data with receiver`s private key and decrypting it by public key however this method also has an issue every public key holder will be able to decrypt the message so it has to be combination of keys.The data is encrypted using the receiver`s public key and reencrypted using the receiver`s private key the reciver has to use combination of keys to decrypt the data fully which means that the first the reciver`s private key and then the sender`s public key. The algorithm that is used in this techniq ue is RSA. (â€Å"turban, 2004) (â€Å"Dret†, n. d) Electronic Protocols. SET (Secure Electronic Transaction) protocol is an e-commerce protocol designed by Visa and MasterCard. Customers can purchase online and their personal information would be protected and also their buying habits would be recorded along with the information they provided. â€Å"SET developed by Visa and MasterCard is an open standard for encryption and security specification for credit card transactions on the Internet.The SET is a set of security protocols and formats that main section are application protocol and payment protocol†. (â€Å"Itig† , n. d) SET has many merits: SET has provided merchant protective method, cost-cutting and enough security for the electronic payment. It helps making the online E-commerce free from online fraud to quite an extent. SET keeps more secrets for the consumer to improve the satisfaction of their on-line shopping experience. SET helps the bank and the credit card company to expand the service to more broad space –Internet. And it lowers the probability of credit card on-line fraud. Therefore SET seems more competitive than other online payment method.SET has defined interface for all quarters of online transaction so that a system can be built on the products made by the different manufacturers. SET protocol based E-commerce model Although SET has been widely used in the electronic payment area and has gained more attention from the electronic commerce promoter, the SET transaction mode model only. Even for B2C model, its application is also limited. (â€Å"Itig†, n. d) DES algorithm and the RSA algorithm are used in SET protocol to carry on the encryption and the decryption process. SET protocol use DES as symmetrical encryption algorithm. However, DES was no longer a safe algorithm right now. Therefore, DES should be replaced by more intensive and safer algorithm.Moreover, along with the development of processing speed and storage efficiency enhancement of the computer, the algorithm will be cracked successively. It is necessary to improve the extendibility of encryption service. SET protocol is huge and complex in the application process. In a typical SET transaction process, the digital certificates need to be confirmed 9 times, transmitted 7 times; the digital signature need be confirmed 6 times, and 5 times signature, 4 symmetrical encryptions and 4 asymmetrical encryptions are carried out. (â€Å"cs. ucf†,n. d) SET protocol involves many entities such as customers, merchants and banks. All of them need to modify their systems to embed interoperability.As the SET requests installment software in the network of bank, on the business server and PC of the customer and it also need to provide certificates to all quarters, so running cost of the SET is rather high. The protocol cannot prove transactions which are done by the user who signs the certificate. The protocol is unable to pr otect cardholder and business since the signature received finally in the protocol is not to confirm the content of the transaction but an authentication code. If cardholders and trade companies have the dispute, they cannot provide alone the evidence to prove its transaction between themselves and the banks. Although there are some drawbacks in the SET protocol, it is still the most standard and the safest in the present electronic commerce security protocol and the international standard of the security electron payment.In order to overcome the defect that SET protocol only supports credit payment style, PIN(Personal Identify Number) digital items are modified in this paper; with regard to the other deficiencies such as complexity, slow speed, poor safety and adaptation of SET protocol, this paper also makes a model of architecture security control mechanism, introduces electron transaction authentication center and strengthens the security of transaction process of SET protocol. (â€Å"cs. ucf†,n. d) Transmission control Protocol (TCP) which is the main protocol used to send data over internet was not designed back then keeping in view the security issues that could arise in today`s World where E commerce plays an important role. The data transmitted through TCP could be read, intercepted and altered.Security breach still happens while an email is being sent or files are being transferred over the internet. Customer is always concerned over security when processing a transaction and sending information over the internet. Credit card information like name, number and date of expiration. Presently most of the companies use SSL (Secure Socket Layer) protocol to provide security and privacy this protocol encrypts the order at PC before sending it over the network however this protocol may not provide all the security needed. There is another more secure protocol Secure Electronic transaction (SET) however SET is is a slow protocol and may take long time to respond and also it requires that the digital wallet is installed on the customer pc.Electronic Fund Transfer â€Å"Electronic funds transfer† means any transfer of funds, other than a transaction originated by check, draft, or similar paper instrument, that is initiated through an electronic terminal, telephonic instrument, or computer or magnetic tape, so as to order, instruct, or authorize a financial institution to debit or credit an account. Electronic funds transfers shall be accomplished by an automated clearinghouse debit, an automated clearinghouse credit, or by Federal Reserve Wire Transfer†. † (Turban ,Lee, King;amp; chung ,n. d) Electronic Checks. E check is the electronic version of the traditional paper based checks , Paper check has been one of the most important way of payments that has been in use for a long time keeping in view the same concept E check has been designed to serve the same purpose. E-check contains the same information like acco unt number, issuing bank, address of the issuing bank and the amount of check.To validate the authenticity of the person, instead of signatures it has a digital code which is generated while filling in a check and is cross verified with the database while encashing it. Electronic Check offers many advantages over the traditional paper check since all the information is filled in electronically over the computer and it is not revealed as it passes through very few people who are in authority. E checks are cheaper by many folds because of ease of processing, also E-checks are lot faster in procession since the data is sent electronically and the chances of getting a check bounced are almost negligible. Electronic Wallets Electronic wallets or the e wallets also referred to digital wallets.An e wallet is a software program that contains user`s payment information in encrypted form to ensure its security, for example an individual`s e wallet could contain credit card number , bank accou nt number ,contact information and shipping location . This information can then be automatically and securely transferred to an online order form. †. (Turban ,Lee, King;amp; chung ,n. d) Virtual Credit Cards â€Å"Closely allied to e wallets is concept of virtual credit card. A virtual credit card is an image of a credit card placed on the computer desktop. With one click of the credit card image the card holder access the account information and pays for the online purchases.Customer can even drag and drop the virtual card from desktop onto an online checkout page . The credit card number and contact information is automatically entered into the checkout form and the customer just needs a pin to enter or other form of identification to authorize the transaction†. (Turban ,Lee, King;amp; chung ,n. d) Concluding Remarks Although there are many online payment systems available to choose from while making a purchase under E-commerce however the credit card is still the do minant and the most popular way not only because of the convenience it has but also because of its worldwide acceptability.Despite of the several security measures in place, credit card frauds do take place and protection of the information provided over the internet while making a purchase is of utmost importance. Encryption using the DES and RSA algorithms make the data indecipherable while being transmitted over the network and these encryption technologies are hard to break into however there are other ways credit card information could be disclosed. Phishing and Pharming as mentioned above in the essay are recent threats that are becoming common and are needed to be addressed as soon as possible since the users who are not really aware of these threats could unintentionally disclose information they are not supposed to.Credit card has wider acceptability because of its long established network thanks to the credit card brands like the Master card, Visa international and America n express and because of its friendly characteristics like ease of carriage, fast processing, 24 hour purchasing facility and the convenience of making purchase sitting anywhere. With the advancement of technology new protective measures like thumb imprint, retina scan are gaining popularity however it will take time for them to become common and implemented everywhere while making an online transaction since there are the cost and awareness issues related to these high end technology gadgets.

Friday, November 8, 2019

COUPLES RIGHTS essays

COUPLES RIGHTS essays Currently, there is much debate on homosexuals couples rights to legalize their right to marriage. There is much information presented, both for and against. There are many reasons for, but not too many reasons against legalizing same sex marriage. By showing that prejudice, lack of freedom of choice, and unconstitutional issues abound, this paper proves that homosexuals should have the right to legally marry. Homosexuals should be allowed to marry because the disallowance of it violates homosexuals constitutional rights. Marriage is an institution long recognized by our government under the right to pursue happiness, and denying that right to any couple, regardless of gender, is unconstitutional. Though this argument is not disputed, it is not finished. In fact, none of the arguments raised in opposition to the allowance of homosexual marriages takes into account the constitutional rights afforded to all humans. The arguments are only in relation to what is stated in the bible that homosexuality is wrong. Today, some people do not live by what the bible states as truth because some of those truths can not be proven. Citizens want the government to remove the UNDER GOD in the pledge of allegiance. Our nation was built on the original principles of freedom expressed in the Declaration of Independence and through our Constitution. The opponents of homosexual marriage need to remember what freedom means to America, and understand the significance of setting an example that denies that freedom. Marriage is a basic human right and should not be denied to any individual. At various times in U.S. history, minorities have been prevented from marrying: African Americans, for example. White and black marriage was also legally prohibited in various states, until the Supreme Court ruled such bans unconstitutional in 1967. At this time, however, marriage is only granted to heterose...

Tuesday, November 5, 2019

Singing Spoon Dry Ice Project

Singing Spoon Dry Ice Project The singing spoon or screaming spoon is the name of a dry ice project in which you cause a spoon to make a singing or screaming sound. Heres how to perform the singing spoon project and an explanation for how it works. You may also watch my video of the singing or screaming spoon. Singing Spoon Materials metal spoondry ice Make the Spoon Sing Dip a spoon in hot water.Remove the spoon from the water and press the warm spoon against the cold dry ice. The spoon will cause the dry ice to sublimate into carbon dioxide vapor. Youll hear the spoon emit a sharp vibrating sound sort of like it is singing or screaming. How the Singing Spoon Works When you press the warm spoon against the dry ice, the sublimation speeds up. The carbon dioxide gas that is released presses against the spoon at the same time you are applying pressure to push the spoon into the dry ice. The oscillations in pressure occur very rapidly, producing sound waves. Although youll usually see this demonstration done using a spoon, it works with any metal object. Metal works best because of its high thermal conductivity, but feel free to experiment with other materials.

Sunday, November 3, 2019

Are Solar Panels Cost Effective in Massachusetts Research Paper

Are Solar Panels Cost Effective in Massachusetts - Research Paper Example These incentives include tax credits, improvements in household asset valuation, cost reductions stemming from higher demand and supply capabilities by licensed installers, and even rebates that provide instant cost recovery on solar photovoltaic system installation. Because of Massachusetts’ total basket of potential incentives, solar panels are not only cost effective, but can provide long-term financial benefits for consumers and businesses that can relatively quickly recoup the initial costs of installation. Why Solar Panels are Cost Effective in Massachusetts Solar photovoltaic cells are installed either on the rooftops of homes and businesses or as ground-level panels depending on the wattage required by the user and their available square footage or acreage. Most consumers install five kilowatt-capable solar panels which will require 500 square feet of available space in order to install this efficient system (Boston Solar, 2011). Typically, this type of solar energy sy stem will completely remove dependency on standard electric utilities which allows the consumer to be 100% self-reliant in electric energy production. Such a system ranges, in general, between $20,000 and $27,500 before considering any incentive enhancements. There are, however, less efficient solar packages that produce significantly less energy output and will force the consumer to be partially reliant on power production from their local utility companies to supplement solar-produced output. Despite this initial high cost of installation, it is estimated that a five kilowatt solar photovoltaic system will generate enough electricity to power the entire home and be equivalent to $2,200 in savings on annual electricity costs (Local Solar Panels, 2009). Thus, in one year, a $20,000 system provides a return on investment, before considering incentives, at 11 percent. Now, many consumers are turned away from installing a solar panel system due to the initial expenditure required. Not many consumers can readily afford such a high price for solar panel installation and will be forced to procure financing options (e.g. second mortgage or home mortgage refinancing) in order to have the system installed. Despite this, there are significant long-run advantages for having their own solar energy production system that are provided by the Federal government and Massachusetts government that enhance the initial 11 percent return on investment. The state of Massachusetts has created a Commonwealth State Rebate that provides consumers with up to $8,500 in repayments when installing a solar system with higher output levels. This rebate system was established in 2010 in order to entice consumers to consider installation. In fact, demand for the program was so very high that the program ran out of its initial funding capabilities, requiring Massachusetts government to provide an additional $222 million in funding over the initial budget of just $108 million (Boston Solar, 2011 ). With potential rebates of up to $8,500, the Commonwealth Rebate System now maintains the capability to increase return on investment from 11 percent to 53.5 percent, thus recapturing over half of the initial installation costs for the system. In 2008, the Federal gover

Friday, November 1, 2019

INTERNATIONAL LITIGATION law 2010 Essay Example | Topics and Well Written Essays - 1500 words

INTERNATIONAL LITIGATION law 2010 - Essay Example regulation since the parties are from different states and the dispute related to commercial matters as we can see in the article 1 which mentions the scope of this regulation. Article 2 of the Brussels Regulation gave a general provision that gives a claimant the right to sue in a country where he is domiciled whatever his nationality is. Section 2 of Article 2 says that the rules of jurisdiction applicable to nationals of that state will be applied in such cases. Article 60 mentions that for the purpose of the Brussels Regulation, a company’s nationality will be deemed to be the state where it has its statutory seat, or central administration, or principal place of business. According to section 2 of this article means of statutory seat in England and Ireland which is the registered office or, the place of incorporation or the place under the law of which the formation took place. This article add extra jurisdiction for the member state. In the case of sale of goods, a claimant can sue in the different state in some case one of them which mention in section 1 (b) in this article which gave jurisdiction to the place where the goods are delivered or should be delivered. Article 23 in Brussels Regulation left its optional for the parties domiciled in member state. They have a choice as to which court or courts have jurisdiction to try and decide any dispute that may arise between the parties in connection with a particular legal relationship. But this choice is subject to certain condition. One of the conditions is that there must be an agreement to this effect between the parties. Further, according to the provisions of the regulation, this agreement must be in writing or evidenced in writing. Applying article 23 of the Brussels regulation on the fact of this case it can be said that only the German courts have jurisdiction that is the right to settle the dispute. This is so because of two reasons 3) Despite the above jurisdiction clause, Black horse