Monday, December 30, 2019

Review of the Miracle Ball Method

The Miracle Ball Method is a method of stretching and realigning your spine using a couple of softly inflated, four inch vinyl balls. By laying down on these balls and adjusting their positions you can alleviate stress, improve your alignment, and stretch hard to stretch areas. Why is it Different? By following the method you can aid your bodys healing and recovery through stretching and realignment without the need of a physical therapist or chiropractor. But unlike most of the self-realignment aids on the market, the balls allow you the flexibility to work your entire body from your neck to your feet. Additionally the balls are safe and foolproof. They do not require any difficult postures or erratic movements. You simply lay on them and breath. Does it Deliver? Yes and no. The method is more of a suggestive anecdote. It seems more like it is there to justify spending $15 for a couple of vinyl balls. But on the other hand Im glad I spent $15 for a couple of vinyl balls. The method is not as scientifically rigorous as your might think it should be. But in reality most people would not get that much benefit from it if it was. The book does a good job of communicating the key point, that the location of your pain may not be the location of the problem. In other words your feet might hurt because your hips are out of place. The book also gives you a couple of good ideas of where to start searching for the problem areas. Once youve flipped through the book you can get started with the balls. For the most part you simply place one or two of the balls under you and lay down on them. Then you take some deep breaths until your muscles stretch. Finding the perfect spot might take some time but it will let you get more familiar with your personal body mechanics and that will reap benefits through out the rest of your life. The balls themselves are great. You can not bust them even when stepping on them. And they are the optimal size for safely stretching and realigning your spine and pelvis. Beneficiaries Quite simply everyone can benefit from a set of these Miracle Balls. Daily stretching helps everyone and the Miracle Balls allow you to stretch areas that most people can not stretch on their own. Some groups that will benefit from these tools are: Back Pain SufferersAthletesSlouchersCouch PotatoesJugglers Summary Get a set of these Miracle Balls. That is all there is to it. Stretching on these balls is meditative and therapeutic. They are compact and adaptable for almost any body part. Additionally you will get more in tune with your body and gain a better understanding of your body mechanics by using them. The book, which contains the method, can pretty much be ignored. The balls, though, are worth it. With the Miracle Balls I can quickly release the tension between my shoulder blades (which previously required a trip to the chiropractor), stretch my lower back and unlock my pelvis (which also required a trip to the chiropractor). Not to mention it relaxes me to the point that I could fall asleep right on the floor.

Saturday, December 21, 2019

Hate Crime Essay - 1551 Words

Additionally, hate crimes towards the LGBT community are on the rise. Offenders with negative views of LGBT people are inflicting pain onto those they deem sinful. According to the FBI, sexual orientation motivated nearly 18% of all hate crimes in 2016. Though the number may not seem excessive, sexuality is currently the third leading incentive for hate crimes and rising (FBI). For instance, in 2016, the New York Times reported Omar Mateen, an American who pledged allegiance to ISIS, attacked an LGBT nightclub killing 49 and wounding 53 (Barry et al.). He deemed them undeserving of life because of their sexual orientations. Furthermore, persecuting someone for their decisions normalizes the inadmissibility of personal choice for sexuality.†¦show more content†¦Another area that demands acceptance towards sexual orientation is by parents. The average American has heard about an instance where someone â€Å"came out of the closet.† Although, most people don’t thi nk about what happens after they tell their parents the truth about their sexuality. For millions of teens across America, their situation results in either running away or being kicked out. According to the TrueColorsFund website, homelessness is experienced by over 1.5 million youth a year, and up to 40% are LGBT. Considering the LGBT community is far smaller than 40% of the entire youth population, a problem is obviously occurring. To extend, the leading cause of homelessness is family disputes over the child’s sexuality (Durso and Gates 4). When a child tells their parents, a negative reaction is expected. In many cases, though, the parents overreact and kick them out because they think abandonment will change their mind and the child will come crawling back. Not accepting their child surrenders them to possibly years on the streets, exposing them to drugs, rape, and prostitution. When their parent’s rejection combines with the common mental health issues of LGBT teens, suicide rates skyrocket. According to the Centers for Disease Control and Prevention, â€Å"Nearly one-third (29%) of LGB youth had attempted suicide at least once in the prior year compared to 6% ofShow MoreRelatedHate Crimes Essay936 Words   |  4 PagesEssay #2: What are the roots of the violence/hate crimes today in our contemporary society? What can we do to reduce them? Explain. The world is full of HATE. What is this word? What makes someone HATE someone else enough to kill or harm another human being? Hate crimes are criminal actions intended to harm or intimidate people because of their race, ethnicity, sexual orientation, religion, or other minority group status. They are also referred to as bias crimes. Hate crimes have been goingRead MoreHate Crimes Essay1417 Words   |  6 PagesCrimes I. Intro-What is a hate crime . A hate crime is when a person intentionally selects a victim because of the race, color, religion, national origin, ethnicity, gender or sexual orientation. A person who commits a hate crime can come from any background and be any race. The term hate crime is meant to differentiate criminal behavior that is caused by prejudice from behavior that is motivated by greed jealously, anger, politics and like. Hate groups differ from one another in terms of membershipRead MoreEssay on hate crimes661 Words   |  3 Pages Defining Hate Crimes Hate crimes has become an increasing problem here in the united states ranging from racial hatred to gender discrimination but what are hate crimes? According to Dr. Jack McDevitt, a criminologist at Northeastern University in Boston Hate crimes are message crimes, Hate crimes are defined as crimes that are violent act against people, property, or organizations because of the group to which they belong or identify with. The coined term â€Å"hate crimes† was first used No matterRead More Hate Crimes Essay902 Words   |  4 Pages Hate Crimes I. What are Hate Crimes A. Definitions for Hate Crimes B. Counting Hate Crimes 1. White Power 2. Black Power II. Examples of Hate Crimes A. Hate Crime penalties III. Reasons for Hate Crimes Even though Hate Crimes have been around in the past, and have been most certainly been more violent in the past. Hate Crimes are most certainly still a problem in todays society, but it is not dealt with the same violent manner as previously performed in the past. There are still violent actsRead MoreEssay on Hate Crime Analysis1420 Words   |  6 PagesHate Crime Analysis Kim Hull CJA/540 Criminological Theory October 13, 2011 Facilitator David Mailloux CERTIFICATE OF ORIGINALITY I  certify that  the attached  paper is my original work. I am familiar with, and acknowledge my responsibilities which are part of, the University of Phoenix Student Code of Academic Integrity. I affirm that any section of the paper which has been submitted previously is attributed and cited as such, and that this paper has not been submitted by anyone else.  I haveRead MoreReligion and Hate Crimes Essay2507 Words   |  11 PagesIn 2007, according to the Federal Bureau Investigation of the Nation’s law enforcement agencies â€Å"there were 9,535 victims of hate crimes; of these victims17.1 percent were victimized because of a bias against a religious belief which totaled to be 1,628 victims of an anti-religious hate crime† (1). Almost ten thousand people were victims of hate crimes alone in 2007. That is something to be alarmed about because part of living in the U.S.A as minority is to have freedom to do and be anything youRead MoreReligion and Hate Crimes Essay2520 Words   |  11 PagesIn 2008, the Uniform Crime Reporting program of the U.S. Department of Justice — Federal Bureau of Investigation reported that â€Å"13,690 law enforcement agencies submitted hate crime data to the UCR Program. Of these agencies, 2,145 reported 7,783 hate crime incidents involving 9,168 offenses and of the 7,780 single-bias incidents reported in 2008, 19.5 percent were motivated by religious bias† (1). The statistics of 2008 are alarming to look at because the numbers of hate crimes committed in that yearRead MoreThe Many Forms of Hate Crimes Essay687 Words   |  3 PagesThe Many Forms of Hate Crimes The issue of hate crimes has greatly affected the way in which people interact. A hate crime is defined as any act of violence or verbal slashing of a person based upon race, religious belief, or ones sexuality. There are several other grounds for determining a hate crime depending upon guidelines in written laws. Hate crimes are said to have originally derived from the unjust treatment of Jewish cultures during the Holocaust in World War II. Slavery of AfricanRead MoreEssay about Hate Crime Victimization1642 Words   |  7 Pagesof murders, assaults, and acts of vandalism and desecration were fueled by bigotry† (Karmen, 2013, p. 350). Hate crime victimization is a very prevalent and serious issue that exists amongst our society today that is often used to demonstrate a form of hate towards a particular group of people; primarily minority groups. â€Å"Although each state employs a different definition of hate crime, most statutes include groups singled out on the basi s of race (such as African Americans or Asian Americans)Read MoreEssay on Hate Crime1498 Words   |  6 PagesHate Crime   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Violence motivated by a bias against victims’ characteristics which include race, religion, ethnic background, national origin, gender, or sexual orientation, represents a serious threat to all communities. Experts estimate that a bias-related crime is committed every 14 minutes. Criminal justice officials and state policy makers need to realize that it is key to make or adjust hate crime legislation. This has been a heated debate for centuries

Friday, December 13, 2019

Decision Support for Best Practices Lessons Learned Free Essays

string(153) " analyze results based on practical experience, and package what is learned into an Experience Base for new users of the organization to find and apply\." Decision support for best practices: Lessons learned on bridging the gap between research and applied pratice. Today, everyone is looking at best practices for developing a system or making the right choice in acquiring system components. If the right best practices are applied, they help to avoid common problems and improve quality, cost, or both. We will write a custom essay sample on Decision Support for Best Practices Lessons Learned or any similar topic only for you Order Now However, finding and selecting an appropriate best practice is not always an easy endeavor. In most cases guidance, based on sound experience, is missing; often the best practice is too new, still under study, or the existing experiences do not fit the user’s context. This article reports on a program that tries to bridge the gap between rigorous  empirical research  and practical needs for guiding practitioners in selecting appropriate best practices. ********** Many program managers would agree that using time-tested â€Å"Best Practices† can help to avoid common problems and increase the quality of a system, reduce development cost, or both. For instance, in a short survey at the 2004 Conference on the Acquisition of Software-Intensive Systems, 48 senior systems and software managers supported the use of Best Practices. However, the same survey indicated that it is hard to find such Best Practices. The survey identified the following reasons for this problem: * Best practices often do not exist (i. e. , they have not been publicly documented), * People do not know of a certain best practice, or * Best practices are not easily accessible (i. e. , there is no central place to look for best practices). The last point matches a more general study by the Delphi Group in which more than 65 percent of the interviewees agreed that finding the right nformation to do their job is difficult (Delphi, 2002). Further research conducted by the U. S. Department of Defense (DoD) concluded that barriers for the adoption of best practices included: * the lack of selection criteria among practices within cost-constrained programs, * the lack of confidence in the value of such practices by the program offices, and * the inability to relate practices to the risks and issues programs were facing. In summary, recognizing g ood practices and  disseminating  them to the workforce seems to be a key issue. To address these issues the DoD Acquisition Best Practices Clearinghouse (BPCh) program, sponsored by several offices of the DoD (DS,  ARA, National Information Infrastructure [NII], and Defense Procurement ; Acquisition Policy [DPAP]), was initiated in 2003 (Dangle, Dwinnell, Hickok ; Turner, 2005). The Fraunhofer Center for Experimental Software Engineering, Maryland (FC-MD) was chosen to develop the initial â€Å"proof of concept† for a system to document, evaluate, and  disseminate  Best Practices. In collaboration with other organizations within the DoD and industry (including  Northrop Grumman  IT, the Computer Sciences Corporation [CSC], and the Systems and Software Consortium [SSCI]), a prototype system has been built and piloted. It is currently operated and hosted by the Defense Acquisition University (DAU). THE VISION FOR APPLYING BEST PRACTICES The DoD vision for the BPCh initiative is to provide more than just a list of Best Practices. It is to provide an integrated set of processes, tools, and resources which will enable information seekers to identify emerging or ell-proven practices that have been implemented and proven effective. Practices in the BPCh serve as an information resource to individuals  looking for  ideas on how to improve quality and become more effective in their job. Clearly, the vision of the BPCh is not to create another â€Å"data cemetery,† but to develop an information-sharing network around the BPCh repository which will foster relationships between individuals within DoD and also partnerships between DoD and industry leaders. The following types of questions illustrate usage examples: * â€Å"I just heard about accelerated life testing. Where can I find out if it’s useful or just hype? † * â€Å"They’ve just shortened my testing schedule by 30 percent. Are there any practices that can help me better handle that kind of schedule compression? † * â€Å"I want to add inspections to my quality process. Is it worth the cost and if so, what’s a good first step? Is there someone I can contact in case of any difficulties? * â€Å"I’ve taken over an acquisition program just before Critical Design Review (CDR). What practices should I look for in my contractors? † * â€Å"I’m in charge of defining a training course as part of the  continuing education  program for quality improvements. What are state-of-the-art or emerging practices that should be addressed? † The BPCh has been designed with the understanding that a single practice can never be a à ¢â‚¬Å"silver bullet† for each and every project/program. This is because some practices may only be useful or beneficial in certain contexts while failing to produce the desired results in others. For example, practices that are absolutely necessary for large, mission critical projects may be too heavyweight for  rapid prototyping  or Web application development. Practices that work well when the development team is located in the same room may not always scale well when the team is distributed across the country. Clearly, there exists no one â€Å"best† answer. Practices that are best for one user might not be best for the next. Therefore, the BPCh tool responds to user queries with a list of practices rated by how well they fit the project characteristics of the user making the query. The presented selection is compiled using the experience other users have had implementing the practice in a similar context. High-quality evidence about a practice is collected and reported with any necessary caveats, so that information seekers have a sound basis for making up their own minds given their needs. APPLYING TECHNOLOGY TO DELIVER BEST PRACTICES To develop the BPCh tool, we applied FC-MD’s EMPEROR approach (Experience Management Portal using Empirical Results as Organizational Resources). This approach makes use of all kinds of available  evidential  data from research and industry, analyzes and packages it, and disseminates it through a Web-based Experience Base. The EMPEROR is based on the experience factory approach, developed by Basili, Caldiera, and Rombach (1994), which has been successfully employed to facilitate  organizational learning  at  NASA  (Basili, et al. 1995), DaimlerChrysler (Schneider Schwinn, 2001), and elsewhere in  North America, Europe, and Australia (Koennecker, Jeffery, Low, 2000; Mendonca,  Seaman, Basili, Kim, 2001). An experience factory provides a way to analyze results based on practical experience, and package what is learned into an Experience Base for new users of the organization to find and apply. You read "Decision Support for Best Practices Lessons Learned" in c ategory "Papers" Since the users of the BPCh come from a wide variety of organizations and programs, any Experience Base will have difficulties in addressing all user needs. To mitigate this problem, EMPEROR is required to: (a) provide transparency to users, so that they can understand the analysis process and the sources of experience and make up their own minds; (b) rate the â€Å"trustability† of each of the used sources, so that users can judge the degree of confidence they have in the information provided; and (c) provide a completeness and maturity indicator of the practice information taken as a whole, that is, to perform a self-rating based on how much and what quality evidence can be offered. DATA STRUCTURE OF A BPCH PRACTICE These sections describe how these requirements are implemented in the case of the BPCh. In the BPCh, each practice has one associated Practice Record, containing information about the practice and what is available in the Clearinghouse, and zero to many Evidence Profiles, each of which contains a summary of a single organization’s experience using the practice. A Practice Record consists of: 1. A Practice Detail block, which contains information such as the practice name, a short description, and the completeness and maturity indicator for the experience package. . A Practice Summary block, which synthesizes all available evidence data and describes possible application contexts for the practice based on a set of characterizing attributes. This part of the practice record thereby allows different users (i. e. , organizations) to make use of the practice. An Evidence Profile contains an example or report of some type of program that has used this practice, how they applied it, and what results were obtained. Each Evidence Profile contains the same set of context and result fields as the Practice Summary block, except that the information recorded in each field will describe only what has been observed in the given context of the particular piece of evidence. In addition, the data structure of an Evidence Profile contains a field for documenting its classification of the trustability. TRUSTABILITY OF A SINGLE SOURCE OF EVIDENCE A 20-point scale rates the trustability of each Evidence Profile. A rating of l indicates an  anecdotal  or informal experience; a rating of 20 indicates that the results of applying the practice are rigorously measured and substantiated. Points are based on the following four dimensions: * how the practice was applied, ranging from a single pilot study to use on multiple real projects; * how the results were measured, ranging from an educated guess to a rigorous measurement program; * how the evidence was reported, ranging from an informal  anecdote  to a peerreviewed publication; and who reported the evidence, ranging from a second-hand report to someone directly involved on the team. More information on the rating scale can be found on the BPCh page of the Acquisition Community Connection of DAU (https://acc. dau. mil/bpch). MATURITY OF A PRACTICE RECORD A 4-point scale is used to rate each Practice Record to quickly inform the user of how much, and what type of, information is known about the practice. As required by EMPEROR, this scale focuses on the quality of the overall accumulated information that is available for a practice (i. e. the  synthesized  and packaged information in the Practice Record). Based on the available information we describe the practice maturity as: * No status assigned/Initial entry: A new Practice Record is initially entered into the BPCh when it is nominated by our experts and/or user communities. Typically at this time, only some of the fields in the Practice Detail block are filled in and no Evidence Profiles are available. * Bronze status/Awareness raised: As soon as any evidence becomes available (i. e. , an Evidence Profile has been linked to the Practice Record), the status is set to Bronze Level. For users, the Bronze Level status indicates that the practice has been nominated by our experts and user communities, and received a preliminary check for applicability. * Silver status/Evaluation performed: When a sufficient set of Evidence Profiles is available, the BPCh experts will fill in the Practice Summary block and the status is set to Silver Level. For users, the Silver Level status indicates that the practice has been selected as promising enough to commission experts in the area to summarize key information. Users can see at a glance what they should know. * Gold status/Continuously maintained: When the summary has been further evaluated (i. e. , vetted) by experts from industry, academia, and government, the status is set to Gold Level. For users, the Gold Level status indicates that the practice has been through a rigorous analysis by a committee of experts in the practice itself as well as by user representatives. Information on Gold Level practices contains the best and widest-ranging experiences we can find. CONTENT STATUS OF THE BPCH We have been piloting BPCh processes and tools by seeding initial content. At this point the BPCh contains 51 practices at all levels of maturity. Practices that have progressed to Gold Level are those, like inspection/technical review, which have a long history of published industrial experience. Many practices of interest in the area of systems and software acquisition have few documented sources of evidence or experience. Therefore, we are testing different processes for eliciting information from the workforce. Based on the recommendations of our User Advisory Group, the following types of practices are currently our top-priority areas for additional content: *  Earned Value Management, * Risk Management, * Information Assurance, and * Spiral Development Process. We hope that visitors to the BPCh tool will try out the offered features for providing short stories about their own experience with practices in these (or any other) areas. We encourage you to provide feedback as to whether you agree or  disagree with  the existing experiences that have been entered, or thoughts on our BPCh tool in general. LESSONS LEARNED Based on our experience with the BPCh program and other knowledgemanagement projects, we can formulate some observations which make useful rules of thumb for good practices to build such systems. The BPCh program has been organized along three parallel (but interconnected) tracks, which reflects our first lesson learned. LESSON 1: PROCEED IN MULTIPLE DIRECTIONS SIMULTANEOUSLY Progress in building a knowledge repository needs to proceed in multiple dimensions simultaneously: content collection, tool development, and outreach. Although there is often a temptation to view these as tasks that can be done sequentially (e. g. , first the tool will be built, then  populated, and then it will be advertised to users), we have found this to be an overly  simplistic  view that diminishes the chance of project success. Constructing the tool prior to collecting actual content and getting users’ feedback almost ensures that important user needs will be discovered late and will require much more effort to implement. Populating the content without getting user feedback leads to a high likelihood that the content will not really address user needs. More importantly, content needs to come from the user community, if the repository is to have a long-term life. We have found that for the research team to generate substantial amounts of content is a time-consuming way of recreating what many users already have at their  finger tips. Finally, engaging in outreach and building excitement in the community of potential users runs the risk of all prototyping efforts: When told how anything is possible in the final system, users often come up with many wish list features that are not really linked to their everyday needs. Moreover, users often get  frustrated  with the slow pace of progress when the system actually has to be implemented, and lose interest before the system is fielded. To avoid these problems, we have adopted an  incremental  approach, with content and tool development going on simultaneously and outreach activities to the user community (such as booths at major conferences, or specific User Advisory Group meetings) planned at major milestones. Although this sometimes stretches resources a bit thin, we feel this approach has enabled us to engage periodically with the user community, show them progress since the last  iteration, and get feedback on ever more mature versions of the system, with an initial body of content. LESSON 2: MAINTAIN A CONTINUOUS STREAM OF FUNDING Because of the interconnected nature of all the tasks listed above, having a stable funding stream is crucial. Requiring the team to take a  hiatus  from the project after a release is delivered leads to lost opportunities for user involvement (users find it hard to match their schedule to the development team’s), leads to new content ideas that miss getting followed up on, may result in the loss of expertise if experienced personnel resources are in transition to other projects during the hiatus, increases the personnel learning curve encountered at restarts, and may result in flagging interest in the user community since momentum generated during outreach is lost. LESSON 3: RECOGNIZE THE RELATIVE MERITS OF CONTENT Our most important lesson learned is a direct implication of the BPCh vision: There is no such thing as a â€Å"Best Practice. † Or, to say it more diplomatically: No practice will be â€Å"best† for every project. Practices that are absolutely necessary for large, mission-critical projects may be too heavyweight for rapid prototyping or Web application development. The implications of this lesson are many. Perhaps the most important is related to the tone of the recommendations that users find: Rather than arguing as an expert that readers should be following a given practice, or else they are doing something wrong, practices should be recommended to readers on the basis that projects of certain type(s) have found it useful. That is, rather than presenting a  foregone conclusion  to users, the system should aim at respecting users’ intelligence enough to enable them to draw their own conclusion, providing sufficient evidence as necessary for those decisions to be sound ones. LESSON 4: UNDERSTAND THE LIFE CYCLE OF BEST PRACTICES Practices (and practice information) are not static and have a real life cycle. Major  paradigm shifts  in the software development world can have an impact on which practices are recommended. The practices that seemed to be good fits for most projects, when a  waterfall  life cycle was the most common approach to software development, are not all equally applicable at the current time, when  iterative, spiral, and even agile approaches are probably more representative of the state-of-the-art practice. Our recommendations regarding a structured life cycle for practice information are: 1. A knowledge repository needs to be continually evolving by accepting information on topics of interest and making it available to users as soon as possible. While some quality checking is necessary to make sure that incorrect, misleading, or incomplete information is disseminated outward, it is better to get information to users as it comes in, than to wait and try to create something perfect. Users should be able to see a timestamp on all information so that they can see if the experiences related are fresh and up to date or come from years ago. 2. However, the desire to get information out quickly should not interfere with the need for validation activities that provide higher confidence in the information. These additional levels of maturity should be noted, to give users more confidence in the information they find, but should not be used as aprecondition  for displaying content. 3. Content needs to be retired when appropriate. Practices may have a natural lifespan, since the acquisition and development worlds continue to evolve and change on their own. Practices that were good 10 years ago may not be appropriate given today’s constraints or technologies. To avoid users finding obsolete information in the repository, reports need to be generated periodically of which practices have received no updates or new experiences in the longest time. LESSON 5: APPLY AGILE STRATEGIES AND PROTOTYPING To create the front end of the BPCh tool, which helps users find candidate practices, explore possibilities, and get more information on practices of real interest, we have found that prototyping and agile strategies are extremely valuable for developing knowledge-management systems. Precisely because of the need for parallel activities in different tracks, and the number of  stakeholders  involved (tool developers, content gathering team, end user representatives, sponsor representatives), an agile approach is extremely valuable. The implementation of the prototype BPCh tool was carried on in two-week increments, at the end of which a releasable version was always available. At the end of each two-week period, a demonstration and planning meeting was held with as many of the stakeholders as could be present. This approach was necessary to help us coordinate and  prioritize  the evolving expectations of the users as well as the necessary changes that were suggested by the content development team, based on what they were finding. As part of this meeting we learned the following lesson: LESSON 6: USE APPROPRIATE LANGUAGE Speak to the users in their language. Do not expect them to learn yours. We realized early on that having the greatest possible content in the BPCh repository would not be of much help if the users cannot find it. To address this we needed to provide multiple paths to the information, so that users could select the path that made the most sense to them. Some specific lessons learned here included: 1. Organize around common tasks. The best way to reach users is to organize the contents of the repository  according to  everyday activities that the user performs. This helps users see the repository less as an additional activity that they need to make time for, and more as a value-added to the activities that already consume their time. In the case of BPCh, we added several such perspectives (i. e. , indexes to the content) based around activities of importance to different segments of the user community (e. g. , addressing  CMMI  practice areas, constructing a systems engineering strategy, and referencing back to common guidebooks). 2. Push as well as pull information. Rather than always expecting users to take time to come to browse the BPCh tool, information can be â€Å"pushed† outward to the user on a periodic basis. For example, the user could select some practices of special interest, and when new experiences come in related to these practices a notification is sent via e-mail. 3. Match users to practices based on context similarity. Since no practice will be â€Å"best† for every project, it is important to match users to practices using context characteristics. This provides the users with a pick list of practices that may be useful in their particular situation, in ddition, it may alert the user to practices that they might not have known about previously. For example, if the user selects a few context variables that describe his/her context, then practices can be prioritized and displayed according to whether they have associated evidence provided by users with similar context information. This is a way of indicating that, e ven if the practice does not answer a specific search query, users like the current one have found this practice useful and it may be something the user should know. LESSON 7: DEMONSTRATE PRACTICAL EXAMPLES TO INTENDED USER To engage in effective outreach activities, aimed at building up an interested and active community of users of the BPCh, we find the following lesson of relevance: You can not show initial users an empty  depository. In line with the idea that building a tool like the BPCh needs to proceed on three tracks in parallel (front-end, content, and outreach) is the lesson that populating the content cannot come after the repository is built. Showing users a fancy front-end without an initial set of real content may get their interest for a short time period, but is not an effective way of building an active user community. Users need to see a small but representative set of content which they can respond to and start generating ideas for the next content or tool release. LESSON 8: UPDATE CONTENT AND FUNCTIONALITY CONTINUOUSLY To keep interest engaged, when users do check back to the site they need to see that updates have been made since last time. Content needs to be continuously updated and  refreshed  to stay abreast of trends. If users ever become convinced that the repository does not get updated on a regular basis, this often spells the end of their involvement. Rather, they need to be motivated to come back often enough to find new things and hopefully, as they progress, be motivated to submit responses and ideas of their own showing emerging trends and keeping the content relevant. Thus, user involvement tends to build more user involvement. As users become interested enough to post comments or send  new ideas  to the repository, other users will continue to be interested to show up to see which comments have been added since the last time and possibly find something of interest to their current situation–and more likely to find something applicable. One way we have experimented with–to reinforce this concept–is to list on the front page of the BPCh tool the most recently added practices and highlight ones that have been promoted to various maturity levels (Bronze, Silver, or Gold). Thus, one of the  first things  users see is an indicator of how much progress has occurred since their last visit. CONCLUSIONS This article has presented some of the lessons learned with the BPCh program, which aims to document practices and quickly disseminate them to the users. The BPCh, which is based on the EMPEROR approach, makes use of a two-dimensional rating scale. These scales provide users with a quick overview of the trustability and maturity of the stored practice records. The scales allow users to understand and to draw their own conclusions based on a set of evidence from different contexts, from research studies as well as industrial experiences, and using measures at different levels of  rigor. Practitioners can rely on this information without reading in detail through the different evidence sources, unless they are interested in the very detailed level of information. In addition, ways to collect user feedback and trigger discussions are offered to allow a vivid and growing user community. While initial feedback regarding the BPCh tool has been positive (Turner Shull, 2005), we are continuing to improve the BPCh program and its associated tool through ongoing research, advisory groups, and user community feedback. We are interested in addressing such questions as: â€Å"How much extra effort to  certify  evidence sets and summaries as correct is worthwhile to users? † or â€Å"Are there subsets or types of evidence that users will find especially worthwhile? We invite you to take a look at our BPCh tool, available at http://bpch. dau. mil. We appreciate all feedback, whether it be submitted through the tool or directly to the authors’ e-mail. ACKNOWLEDGMENTS This research was supported with funding from the U. S. Department of Defense (DoD), the  Office of the Secretary of Defense  (OSD), and the Defense Acquisition Univers ity (DAU). We wish to thank the members of the BPCh team, from DAU, FC-MD, CSC, and SSCI, for the many productive discussions that have improved this work. REFERENCES Basili, V. R, Caldiera, G. , Rombach, H. D. (1994). Experience factory. In J. J. Marciniak (Ed. ),  Encyclopedia  of Software Engineering (Vol. 1, pp. 469-476). New York:  John Wiley   Sons, Inc. Basili, V. , Zelkowitz, M. , McGarry, E, Page, J. , Waligora, S. , Pajerski, R. (1995). SEL’s software process improvement program. IEEE Software, 12(6), 83-87. Dangle, K. , Dwinnell, L. , Hickok, J. , ; Turner, R. (2005, May). Introducing the Department of Defense acquisition best practices clearinghouse. CrossTalk, 18(5), 4-5. Defense Acquisition University. Retrieved from http://bpch. dau. mil Delphi White Paper. (2002). Taxonomy  ; Content Classification–Market Milestone Report. Boston, MA: Delphi Group. Koennecker, A. , Jeffery, R. , Low, G. (2000, April). Implementing an experience factory based on existing organizational knowledge. In Proceedings of the 2000  Australian Software Engineering Conference  (pp. 28-29), Canberra, ACT, Australia. Mendonca, M. , Seaman, C. , Basili, V. R. , Kim, Y. M. (2001, June). A prototype experience management system for a software consulting organization. In Proceedings of the 13th  International Conference on Software Engineering  and Knowledge Engineering (SEKE). Ottawa, Canada. Schneider, K. , ; Schwinn, T. (2001, June). Maturing experience base concepts at DaimlerChrysler. Software Process-Improvement and Practice, 6(2), 85-96. Turner, R. , ; Shull, F. (2005, November). An empirical approach to best practice identification and selection: The U. S. Department of Defense acquisition best practices clearinghouse. In Proceedings of the 4th International Symposium on Empirical Software Engineering (ISESE  2005)(pp. 33-140), Noosa Heads, Australia. Mr. Raimund L. Feldmann is the technical lead for Knowledge and Experience Management at the Fraunhofer Center for Experimental Software Engineering, MD (FC-MD). Before he joined FC-MD in 2004, Raimund participated in several technology transfer projects in Germany and was also involved in the development of the Virtual Software Engineering Competence Center (VSEK) portal, funded by the Department of Education and Research (bmb+f) of the German Federal Government, to offer up-to-date Software Engineering knowledge to subject matter experts. E-mail address: rfeldmann@fc-md. umd. edu) Mrs. Michele A. Shaw is a Scientist at the Fraunhofer Center for Experimental Software Engineering. Michele supports clients implementing process improvement, measurement, and experience factory concepts. She has over 25 years of experience in Information Technology including software and service development, project management, quality assurance, client care and  subcontractor  management Ms Shaw holds a BS in Business from  University of Baltimore  and a masters in applied  behavioral science  from  Johns Hopkins University. (E-mail address: mshaw@fc-md-umd. edu) Dr. Forrest Shull is a senior scientist at the Fraunhofer Center for Experimental Software Engineering, MD (FC-MD). He is project manager and member of technical staff for projects with clients that have included Fujitsu, Motorola, NASA, and the U. S. Department of Defense. He has also been lead researcher on grants from the National Science Foundation, Department of Energy, Air Force Research Labs, and NASA’s Office of Safety and Mission Assurance. (E-mail address: fshull@fc-md. umd. edu) How to cite Decision Support for Best Practices Lessons Learned, Papers

Thursday, December 5, 2019

Quality Improvement in Health Care

Question: Discuss about the Quality Improvement in Health Care. Answer: Introduction: The issue of patient safety has been a concern for health care system for a long period of time. In this case, various changes in health care have been done but it has not always been able to achieve the needs of patient safety. The nursing professionals and their leaders have a prime responsibility of providing quality care to the patients. All the leaders in health care such as chief executive officers and members of the board should have proper training in patient safety provision. Leaders in health care need to see patients safety problems through their system protocols (Ring Fairchild, 2013). However, if medical errors arise in the process of offering care to patients, then they act as providers of system improvement. Hence safety of the patient in health care facilities depends on both care providers as well as their leaders. The competency of health care leaders to create positive work environments and manage constant change is essential to the success of teams and organizations. The health care leaders need to be competent enough in order to create a positive environment for patients. There is a positive relationship between leadership and patient outcomes and hence organizations should make efforts to develop relational leadership to improve the outcomes of the patient. Nursing leaders who are effective make sure that there is effective staffing and other resources which enable the provision of safe care to patients. The senior nurses and leaders provide strategic steps to be undertaken by participating in crucial decision making which influence the practice of nursing and eventual patient outcomes (Wong et al., 2013). As a result, the quality of health care is not top down but involves everyone in all directions i.e. top down and down top. References Ring, L., Fairchild, R. M. (2013). Leadership and patient safety: A review of the literature. Journal of Nursing Regulation, 4(1), 52-56. Wong, C. A., Cummings, G. G., Ducharme, L. (2013). The relationship between nursing leadership and patient outcomes: a systematic review update. Journal of nursing management, 21(5), 709-724.

Thursday, November 28, 2019

The Infinity Mirror Essays - Mirror, , Term Papers

The Infinity Mirror "Tularecito" is a myth about truth. Tularicito, just a character of that myth, is the focus for this glossed over fable. Steinbeck draws on this form of genre to present the idea that we are all a part of what happens to others, based upon our nature. The image presented of Tularecito is that of a demon, an idiot savant, a boy with a gift from God, and that gift's cost. He is a freak, a dangerous misfit, an innocent who does not need the constraints of reality. Tularecito is a test. The test is one of moral caliber. It is a test of the souls of the characters who overshadaow Tularecito. Pancho is a man that is both holy and sinful. His purfunctory act of church going becomes true belief as alcohol demons induce him to halucinate a deformed boy into an outcast from hell. He looks into his mirror and sees himself, becomes shaken, reforms. From Pancho's employer, Franklin Gomez, we get a cold hard look into society. We see a mother, knowing her son is to be hated and feared, and perhaps possibly killed, cannot face killing her son with her bare hands. She leaves the killing to exposure to the elements, enying herself a look into Tularecito. Franklin adopts Pancho's demon, and Tularecito transforms into a disadvantaged who has been gifted with talent. Tularecito becomes a man at the age of six, "The boy grew rapidly, but after the fifth year his brain did not grow any more," To Franklin, Tularecito is grace, and graceless. He is talented in all things of any physical strength, and well proficient in the creation of beauty, and an artist in the care for life of nature. The touch of Tularecito brings beauty, and life, and love to the world, until he becomes enraged, (should anyone endanger what came from the touch of his hand). Franklin looked into Tularecito's mirror and saw what Tularecito was. Authority views come from several directions. While one teacher sees Tularecito as a Pavlovian dog, needing to be trained, the other sees him as an idiot savant, needing only to be pushed into harmless fantasy. This leads a third view of Tularecito, one of a simple minded killer that needs to be locked up for his own good. Tularecito is viewed as less than human from the start. His name means "little frog", and his physical disabilities are seen by all, causing fear. Tularecito is a noble savage. Dangerous to look at but hiding the soul of God, hf is intimidating, a creator, and dangerously tempermental. As Steinbeck weaves his tale, it is obviously full of metaphors on the basic belief of our society that everything must be forced into a plausable category, fit for inclusion into the human race. Tularecito should never have gone to school. He would have been happy living at home, simple as he was. In the end society takes Tularecito and makes him a monster. Since monsters are not allowed into human society, Tularecito goes looking for a different society that he does belong to. Unfortunately this society doen not exist. Tularecito has no control over his perceptions of reality and fantasy. He searches for a world of fantasy, and in his efforts, he creates a hole. When this hole is covered up, it confirms Tularecito's belief in fantasy. Tularecito creates another hole, and waits for his fantasy to show. Tularecito has only one flaw. He believes that what he created should not be destroyed. Whenever this happens, should it be school, work, or fantasy, Tularecito defends his creations with the only thing he can understand, violence. It is not like true, calculated violence, but very much like a motor nerve reaction. He reacts with pure emotion and pain, and eventually he kills. Steinbeck tells an interesting story with Tularecito as a mirror. In fact, all the characters in the story are mirrors. As we look at them we see how we measure against them. But Tularecito is a mirror with an infinity of sides. He is a tool for testing human beliefs, one of which is that sometimes, it is better to leave things alone than to

Sunday, November 24, 2019

The Value of Female Friendships

The Value of Female Friendships I met my girlfriend Dana in college, and in the years since then our friendship has grown exponentially. Nine years ago, Dana told me that she had breast cancer. Shes a survivor. In that timeframe, my marathon walking buddy Allison found out she had appendicidal cancer. She too is a survivor. With two very close girlfriends in the same situation- one that was certainly new to all of us- I found myself asking: How as a girlfriend do I handle this? What do I do to support them? Where do I look for answers? This is not an article about cancer. It is an article about the incredible life-force underlining the word girlfriend. Girlfriend Support I remember the moment I heard about Allisons cancer. I didnt want to talk with my husband, even though he is a great man and a caring friend of Allisons as well. I wanted to talk with my female friends. I wanted their advice, their hugs, their sincere listening while I asked ‘why? Seeking advice, sharing concern, providing support and love, I wanted to be around the women who understood how I felt and who, I hoped, would help me be a better friend to my friends going through one of lifes scariest situations. So, why are girlfriends so important? I dug in and studied my own need for female community and what pulled me toward my friendships as a primary support system in a time a great stress. I was especially curious to find out why couldnt I fill this need with my husband or through the wisdom of books, advisors or other communities? Was it just me? Turns out it wasnt. Relationship Research A little research led me to a captivating book that spelled out the answers to me. The Tending Instinct, by Shelley E. Taylor, unlocks some of the mysteries of women, men, and the biology of our relationships. The big ah-ha! I discovered in its pages is that this need for community with other women is biological; it is part of our DNA. Taylors book consolidated a variety of studies covering cultural factors, decades of research, anecdotal references- even the biological ties to the girlfriend concept in the animal kingdom. An unending stream of fascinating facts helped define why we as women are more social, more community focused, collaborative, less competitive and, above all, why we need our girlfriends. Consider these findings: Longevity - Married men live longer than single men, yet women who marry have the same life expectancy as those who dont. However, women with strong female social ties (girlfriends) live longer than those without them.Stress - For decades, stress tests focused solely on male participants, believing that all humans would respond in the same manner. When these same stress tests were finally conducted on females it was discovered that women dont have the same, classic fight or flight response to stress that men do. According to the research presented in The Tending Instinct, women under stress have the need to tend and befriend. We want to tend to our young and be with our friends. Time with our friends actually reduces our stress levels.More Stress - A study conducted by the UCLA School of Medicine found that when were with our girlfriends, our bodies emit the feel good hormone oxytocin, helping us reduce everyday stress. By prioritizing our female friendships and spending time with th ese friends, we take advantage of a very simple, natural way to reduce our stress. Even More Stress - Prairie voles, a monogamous rodent, have a similar response to stress. When a male vole is put in a stressful situation, he runs to his female partner. Female voles, when stressed, immediately run to the females they were raised with.Self-Esteem - A recent study by Dove indicated that 70% of women feel prettier because of their relationships with female friends. Its no surprise that our self-esteem is highly influenced by our girlfriends; this is important to understand for girls as well as women.The Health Factor - Women without strong social ties risk health issues equivalent to being overweight or a smoker- its that serious. Friendships Waning With all Ive discovered that is good about female friendships, I was disappointed to come across a national survey from 2006 that found a sharp decline in friendships. Research co-author Lynn Smith-Lovin, a sociologist at Duke University said, From a social point of view, it means youve got more people isolated. When were isolated, we dont have each other to help us through tough situations like hurricanes or fires, financial struggles or relationship changes, sadness or cancer. Without communities of women, we often miss opportunities to be involved in our cities, to learn from each other, to empathize with other women and to share the benefits of laughter and a heart-felt hug. As women, we sometimes need to be reminded what being a girlfriend means. Too often it takes an illness or loss to hit us with reality, realization, and appreciation of friendship. That reminder can also be as simple as a caring card, a hug or an e-mailed photo. Once in a while we simply need to take the time to think about our friends, stop and live in the moment, and if at all possible, celebrate that moment. Hear some bad news? Call a girlfriend. Have something great to celebrate? Share that celebration with a friend. Want to feel prettier, be less stressed, be healthier and happier? Spend some time with your BFFs. Like the scary, life-changing diagnoses of my dear girlfriends, recognize your own need for friendships and fill that need with time and memories together. Life is better together- with your girlfriends. NOTE: Research for this article primarily attributed to The Tending Instinct by Shelley E. Taylor. Additional information was received form Kappa Delta, NWFD facts, and the Dove Beauty study.

Thursday, November 21, 2019

The research paper on the Vietnam War Example | Topics and Well Written Essays - 2000 words

The on the Vietnam War - Research Paper Example The chief objective of this paper, however, is to analyse this historic war in relation to Martin Luther King’s seminal anti-war sermon â€Å"A Time To Break Silence†. While many tend to view the war as one that was ‘revolutionary’, King sought to critique the very underlying principle of war. At every level, he expressed his solidarity for those members of the clergy and the laity who critiqued the war and were sympathetic to the Vietnamese civilians. Though King’s speech is a clear articulation affirming the value of human life and liberty, my analysis would attempt to both analyse and question his perspective regarding the Vietnam War. King’s views regarding the land reforms that Ho Chi Minh had carried out during his tenure have been contested and attested by various thinkers. This paper shall try to incorporate these views into the body of the work and provide a balanced argument. The paper shall also look at the position of the poor peas ants in Vietnam who bore the brunt of the war. The land reforms in Vietnam, initiated as a means of the communist revolution in the nation was directed at the distribution of land among the peasants of the society and the displacement of the elite of the village that existed before the revolution. Through these, a new class would arise that would enable the birth of a free and noble nation, one that would be egalitarian in its principles. King’s concern for the rise of such a nation is partially a result of the Christian perspective of egalitarianism that he adopts in his speech as David Bromwich argues. He goes on to locate the root of king’s concern as the need for viewing the people of Vietnam as brothers, in an explicitly Christian manner, without the arrogance of the western man that king argues was responsible for the attitude of the people who wanted to recolonize Vietnam, namely the French and the Americans (Bromwich). This causes him to however, take up a stan ce that is heavily in favor of the Ho Chi Minh administration. In an effort to assert the importance of the Christian point of view, King belittles the importance of the forces of nationalism that were instrumental even in the resistance that the Vietnamese peasants offered to the occupying forces. King, in his speech gives a dominant position to religion. Even this position is not free of its own political implications. King imposes his beliefs while talking of a population that is hardly Christian in its beliefs. Even though King refers to a quotation by the Buddhist leaders of Vietnam, the passage that he chooses to include is one that has no religious overtones. Each day the war goes on the hatred increases in the heart of the Vietnamese and in the hearts of those of humanitarian instinct. The Americans are forcing even their friends into becoming their enemies. It is curious that the Americans, who calculate so carefully on the possibilities of military victory, do not realize that in the process they are incurring deep psychological and political defeat. The image of America will never again be the image of revolution, freedom, and democracy, but the image of violence and militarism. (King) This is characteristic even of the earlier proponents of colonization, whose methods and ideologies