Wednesday, December 25, 2019

The Glass Menagerie By Tennessee Williams - 1228 Words

â€Å"The Glass Menagerie† is a play by Tennessee Williams. There are only four characters in the drama with a fifth character referenced so much that his character is a big part of the story line. The play is about a southern woman named Amanda and her two grown children. Tom is the son who has the responsibility of taking care of his sister and their mother. Laura has a disability that limits her capabilities and her confidence; consequently, her mother does not seem to understand how these limitations have made her life events extremely different from her mother’s early years. The fourth character, Jim, is an acquaintance of Tom and is a gentleman caller who ends up doing more harm than good for Laura. Amanda’s husband, who abandoned the family long ago, is not in the play, but is referenced throughout the story line; the set even has a big portrait of him hanging in the living room. Williams portrayed the personalities as he typically has in other plays with â€Å"characters who prefer dwelling in a fantasy world† (Wang). The characters have such a fascination of past events that they are not able to focus on the best choices for the present. Williams was able to portray tradition in different ways in the play. The most obvious theme of tradition is how Amanda is obsessed with the gentleman caller custom. She lives in her fantasy world of when she was young, beautiful, and popular. She enjoys reliving the times when she had numerous gentleman callers wooing her and boosting herShow MoreRelatedThe Glass Menagerie By Tennessee Williams985 Words   |  4 Pageshardly catch it going. ¨ This quote by the author of The Glass Menagerie, Tennessee Williams, describes both The Glass Menagerie, a memory play, and the life of Tennessee Williams himself, for whom memories played a large role in his life. Within the play, many parallels can be drawn between the life of Williams and the life of Tom, the main character, such as a disdain for factory work. In addition, several characters in The Glass Menagerie have a difficult time fitting into the roles that theirRead MoreThe Glass Menagerie By Tennessee Williams Essay940 Words   |   4 PagesTennessee Williams was a renowned Pulitzer Prize-winning playwriter for his numerous plays throughout his career. One of such plays is The Glass Menagerie. After perfecting his play for many years, The Glass Menagerie was first introduced to Broadway on March 31, 1945. As a young writer, Williams lived vicariously through his plays. Throughout this play in particular, there are several allegories that pertain to Williams life. Although Williams had a relatively happy childhood, his life changedRead MoreThe Glass Menagerie By Tennessee Williams986 Words   |  4 PagesTennessee Williams’s The Glass Menagerie, is a classic drama about a young man who is tired of his dull and boring existence. Tom, the main character, struggles to deal with his family, who is apparently holding him back in life. With the use of powerful writing techniques, Williams is able to captivate his audience and create a play that has stood the test of time. An excellent writing technique employed by Williams that contributes to The Glass Menagerie’s success is his use of plot. ThroughoutRead MoreThe Glass Menagerie By Tennessee Williams932 Words   |  4 Pages THE GLASS MENAGERIE Name Instructor Institution Course Date The Glass Menagerie Tennessee Williams, the author in the play †The Glass Menagerie† that is based on his life that presents characters that, as caught animals in an cage, live in woeful states and just wish to unravel themselves from this state (Fisher, 2010). The primary clash in the story emerges through their longing to encounter a different world, but their condition opens them to life s unforgiving realities. LifeRead MoreThe Glass Menagerie By Tennessee Williams1249 Words   |  5 Pagesthe outside world The Glass Menagerie is very interesting because William s play relates to alot of people and their situations, people can learn alot from it alot whether they connect to Amanda and her past or to Laura and her lack of confidence and being in a world of her own or to Tom and his internal conflict about abandoning his family or staying with them. Laura s life is all about her glass menageries what happens when her glass unicorn breaks? What happens when a gentlemanRead MoreThe Glass Menagerie By Tennessee Williams1619 Words   |  7 PagesIsolation is prevalent in â€Å"The Glass Menagerie† by Tennessee Williams. This is presented in symbols such as blue roses and the glass unicorn, for they are imagined objects and only existent in another fantasy world. Williams incorporates such arcane symbols to draw out his characters, Amanda, Laura, and Tom, and how they cope with confinement. Most importantly, the symbols of the play represent how isolation debilita tes them psychologically in an attempt to connect with reality. The jonquils representRead MoreThe Glass Menagerie By Tennessee William1014 Words   |  5 PagesIn the play â€Å"The Glass Menagerie† of Tennessee William, he wrote a drama play to emphasize readers about the life is at a standstill the Wingfield family. Through of the Wingfield family, he uses many symbols which represent many things, but the important main symbolization is fire escape that shows three main characters; Tom Wingfield, his fire escape is the way out of Amanda and Laura. Amanda Wingfield, hope gentlemen callers to enter their lives, and Laura Wingfield, who wants in her own worldRead MoreThe Glass Menagerie By Tennessee Williams1534 Words   |  7 PagesThe Glass Menagerie by Tennessee Williams Tennessee Williams, born Thomas Lanier Williams, wrote The Glass Menagerie, a play which premiered in Chicago in 1944. This award winning play, autobiographical in nature, represented a time in which Williams felt the obligation of his responsibilities in regards to the care of his family. Robert DiYanni, Adjunct Professor of Humanities at New York University, rated it as, â€Å"One of his best-loved plays...a portrayal of loneliness among characters who confuseRead MoreThe Glass Menagerie By Tennessee Williams Essay876 Words   |  4 PagesIn Tennessee Williams’ The Glass Menagerie, there is a collection of glass animal figurines that belong to Laura. Laura uses those figurines to escape her reality. The â€Å"glass menagerie† is also a metaphor because all of the characters have a metaphorical glass menagerie that they use to escape their reality. Tom escapes his reality by going to the movies, drinking, and writing poetry. Tom says, â€Å"I go to the movies because – I like adventure†¦ something I don’t have much of at work† (Williams 33)Read MoreThe Glass Menagerie By Tennessee Williams867 Words   |  4 Pagesdraw the line between getting what you want and doing what you are obligated to do? In The Glass Menagerie by Tennessee Williams, the main characters are torn between fulfilling their desires and aligning with their role in society. On the surface, Amanda Wingfield plays the role of a caring mother that would do anything in her children’s best interest. However, according to the play, â€Å"The Glass Menagerie†, you should never be fooled by the â€Å"Illusion of the truth.† She indeed values her children’s

Tuesday, December 17, 2019

The Effects Of Alcohol On Social Influences Within Health...

Introduction: Harmful use of alcohol contributes 3.3 million deaths every year according to WHO (2015), which is representative of 5.9% of all deaths across the globe. Despite governmental law of putting the drinking age to be 18 and over (UK and Ireland), Many studies reported that within the last ten years that have examined the drinking habits of young people, results show that UK teenagers are characterized by high levels of intoxication and binge drinking. (Binge drinking is defined by the NHS and NOS as drinking than double the lower risk guidelines for alcohol in one session), when put beside their European equivalents (Hibell et al, 2001). This assignment will explore how alcohol use is influenced by psychological and social influences within health and well-being. Psychological Influences: To aid to the understanding of the psychological influences of alcohol use, I choose the Theory of Planned Behaviour Model. The Theory of Planned Behaviour was created by Ajzen and Fishbein in 1974. Ajzen (1985) first defined intention as an attempt to perform a certain behaviour rather than with regard to the actual performance. Although alcohol may be beneficial to your health, however this is only if it is consumed in very small amounts. Those who are aged 18-35 are categorised with higher prevalence of alcohol use. The Theory of Planned Behaviour is based around three central factors for the intention to form. These include: Attitudes towards the certain behaviour, perceivedShow MoreRelatedUnderage Alcohol And Alcohol Abuse1597 Words   |  7 Pagestoday’s society, there is a lot of issues concerning drug and alcohol abuse in schools whether its at the high school or college level. Not only does drug and alcohol consumption effect your overall health, it can effect your academic performance as well. In this paper I am going to be talking about the problems with drug and alcohol abuse, preventions, risks, costs and much more. We are going to dissect the problems with drug alcohol consumption amongst young adults, from high school to collegeRead MoreAlcohol Consumption By Underage Drinkers1645 Words   |  7 Pagessocietal acceptance from peers. The media, and influence from family and peers can make alcohol seem attractive, relaxing, and fun when in reality the negative consequences th at entail are much deeper than what’s displayed on the surface. This paper will discuss in depth the issue of alcohol and the impact it has on adolescents. Alcohol consumption by underage drinkers has and will continue to be a problem within our society. Adolescents view alcohol as a way of risk taking deviant behavior in orderRead MoreYouth binge drinking1621 Words   |  7 Pagescrimes and anti-social behaviour linked to youths binge drinking. Binge drinking can be defined as an excessive consumption of alcohol within a short period of time to get drunk. This essay will focus on how youth violence, crime and anti-social behaviour is linked to youths binge drinking. It is widely known that the youths in United Kingdom start drinking at an early stage of their lives. Talbot and Crabbe (n.d.) state that â€Å"government statistics suggest that†¦ the amount of alcohol consumed by youngerRead MoreHealth Promotion Of Nz Women s Health Essay1206 Words   |  5 Pages DIPLOMA IN HEALTH SERVICES MANAGEMENT DHSM 301: Health Promotion in NZ Women’s health focus Assessment 1 (Individual Report) Submitted by: Kristabel Graizel C. Martinez CIB00003C2 Submitted to: Kaylene Tribe Introduction The Health Promotion Agency’s (HPA) â€Å"Don’t know? Don’t drink† movement aims to stop women from drinking anytime during pregnancy to reduce the potential harm that it can give to the unborn child (AlcoholNZ, 2015). New Zealand’s society has become more tolerant to regularRead MoreHealth And Social Care Provision1743 Words   |  7 PagesPhysical wellbeing is a high priority in recent health and social care provision. The significance of endorsing health and wellbeing is due to the dramatically rising trend of morbidity and mortality from health problem, illness and chronic disease. According to the World Health Organisation (WHO) â€Å"health is a state of complete physical, mental, and social wellbeing and not merely the absence of disease and infirmity.† (WHO, 1948). This explains that, health programs should not alone diagnose and treatRead MoreThe Effects Of Long Term Alcohol Use On The Brain1482 Words   |  6 Pages Alcohol is the result of the chemical process known as fermentation, which is essentially the putrefaction of yeast and sugar into a consumable intoxicant. The earliest examples of alcohol consumption were evidenced by beer recipes from Mesopotamia, written in Cuneiform on clay tablets. These tablets are considered one of the earliest forms of written language. Alcohol has long been considered an integral part of society, but its effects on physical and mental health, and social standing continueRead MoreThe Role Of Peer Pressure On College Students1235 Words   |  5 Pagesarticle, â€Å"Peer Associations for Substance Use and Exercise in a College Student Social Network,† test out this common theory of peer pressure being the reason for the damaging actions of college students, such as alcohol and substance use. In addition to testing out this theory of peer pressure on unhealthy behaviors, the authors of this article also were interested in if peer pressure on college students has an effect implementing healthy behaviors, such as exercising. Past studies have shown thatRead MoreRaising Taxes on Tobacco and Alcohol1637 Words   |  6 Pagestobacco and alcohol The harmful effect of tobacco and alcohol are well profound and experienced in the daily lives of people across the world. It has been mentioned and medically proven that some of the deadliest conditions like liver cirrhosis and cancers are associated with the consumption of these two substances. The rate of the abuse apparently is increasing with the heightened networking of the globe and the use of these two substances has fast moved to the abuse levels rather than being a mereRead MoreThe Effects Of Alcohol Poisoning On Australia1635 Words   |  7 Pagesoutlining the effects of alcohol poisoning. Describing what it is, why the report is required and a specific high risk group – young Australians ages 18-24. The benefit of this report will outline the main dangers of alcohol poisoning and why it’s a big problem in Australia. Alcohol poisoning in Western Australia alcohol caused 2.85% of total health problems for Australia, Costing the medical industry in Western Australia $379,689,476.83. This includes all the problems associated with alcohol and alcoholRead MoreThe Problem Of Drinking And Driving1648 Words   |  7 Pagesthat a fellow friend or family member had their life taken from them because someone made the choice to drive after drinking! What if your child’s life was abruptly ended because their friend decided it was cool to drive after having a few beers. Well the fact of the matter is drinking and Driving is one of the biggest killers of many young Americans these days. What drives many people to drink and drive? Do they do because of the peer pressure or maybe because they think it makes them look

Monday, December 9, 2019

Managment of Information Technology Services

Question: Write areport about the HBZS and OKD business alignment. Answer: Introduction OKD HBZS A.s is a leading hard coal production company in Czech Republic. The OKD is a parent company to HBZS and HBZS IT business partner of OKD which deals with all the rescue works. The service is open 24 X 7 to help the workers who are working underground in a dangerous workspace. They are available every time for the rescues of OKD. OKD and HBZS are Joint Venture Company and the job of HBZS is to provide the rescue support to the workers and the materials. They have total of 26 permanent workers and they have an immediate reaction team who can reach the headquarters within one hour of time. Moreover the technical team of HBZS is used for various commercial purposes such as working at heights or at underwater and protections of underground buildings and prevention from fire. However the company does provide the training to their new team of rescuers for mine and external based (www.okd.cz 2016). HBZS chose the framework of ITIL in order to help managing the increasing demands of the IT department. It helps to structure the activities of the company in proper manners that help to work in less reactive manner. The adoption of the ITIL enables the company to survive in the coal crisis of 2013-2014 when there was a sharp fall of coal causes difficulties for their parent organization. The report presented here describe about the ITIL and ITSM adoption of the company. The company does face some serious challenges after the implementation of ITIL and here in this report a detail analysis has been done on how they can overcome to challenges in future and can adopt some new process and refining the other six processes they have already adopted. The author has been hired as and IT consultant by the IT manager Mr. Gurny and he wants that the author do provide some serious tips that will help the company to move forward with their ITIL processes implementation to improve their service and product quality to serve their parent company in a better way and to sustain their partnership in a log run. Here the author has discussed some of the process that were adopted by the HBZS Company and some of the processes are been recommended by the IT consultant (author). The best practices for ITIL and ITSM are also been recommended by the IT consultant. Because of reception of the b est ITIL forms, the association can meet with the client's necessities and in addition guarantee that the cloud administration supplier meets with prerequisites before conveying of the administration. Apart from this, better training system, ongoing monitoring of customer service, need of service improvement plan and proper security of data are also recommended to the IT Manager. The IT Manager should need to implement a service improvement plan so that they can smoothly run their mining rescue services. Firstly, it reflects on the ongoing ITSM within HBZS. Secondly, the IT manager, Mr. Gurny aware that the service transition phases causes operational issues in another firm. It reflects on the processes of service transition in HBZS and inter-relates the ITIL as well as HBSZ processes. Thirdly, it discusses the benefits as well as limitations of outsourcing the service desk at the time of maintaining other functions of the internal IT department. It helps the company to identify the future challenges within their business operations. The company faces a challenge that HBZS outsources their It department. Fourthly, it discusses about the continual service improvement process with an extension in the future. Finally, the recommendations are given to the IT manager to overcome with the identified issues in this particular report. Ongoing ITSM at HBZS IT Service Management (ITSM) is a procedure driven methodology that empowers associations to plan, construct, coordinate, oversee, and advance quality IT administrations to accomplish business goals. Further, holding fast to directions and measures, for example, ITIL, CoBIT, SOX, ISO/IEC 20000 and so on., require industriousness, and better base administration by associations (Action 2013). While associations concentrate on the general population, procedure, and innovation measurements of Service conveyance, they require an authority accomplice who can help them in enhancing Service Quality and Reduce Cycle time. Banding together with a pro supplier of IT Service Management can help business enhance efficiency and positively affect administration quality. Meeting client desires in Service Delivery, and overseeing perpetually changing task extension is a test for generally associations. SLA ruptures in the administration conveyance and low FTR (First Time Resolution) rate contrarily affects the client steadfastness. There is a solid need to enhance deftness and cross over any barrier amongst Business and IT, while upgrading IT costs. HBZS can outline a one of a kind way to deal with location the torment regions in IT Service conveyance. HBZS gets to customer's IT surroundings from People, Process, and Technology angle. HBZS has a broad involvement in outlining dynamic frameworks, and driving end-to-end ITSM procedures and ITSM device change programs. HBZS can utilize an outsider organization for introduction in conveying IT Service Management arrangements range crosswise over commercial enterprises, for example, BNFS, Manufacturing, Logistics and Retail. The organization giving best-in-class way to deal with drive changes, empowering clients to remain operationally viable and deliberately engaged ought to be picked by HBZS (Goetsch and Davis 2014). The procedure change quickening agents, empowering agents, and techniques could help the organization to convey amazing administrations to boost IT commitment to business. IT Service Management capacities improve the expense of assets, and continuous operations with us age of demonstrated best practices (Hassan et al. 2015). Some devices can be utilized for better administration promotion administration like - iOptima for Process Assessment of Client's 'as is' procedure development on CMMI scale and distinguish the guide for ITSM change which will guarantee administration conveyance fabulousness. The answer for ITSM Transformation comprise of demonstrated strategy, best in class stage for evaluation and space based experience to apply the privilege ITSM practices to client's administration zones. Successful administration of IT administration support basic business works that should be reasonable, usable, dependable, secure and versatile. On the off chance that IT administrations fall flat or respond rapidly enough to changes in the business, the effect can be critical (Katz 2012). Very much oversaw IT administrations result in change to business execution and production of quality. Powerful administration of IT administration requires administration to concentrate on key errands to bolster a level of association of business clients to characterize necessities and settling on key administration related choices. CobiT and ITIL give complete direction covering an expansive extent of good practices for administration (Davenport 2016). Clients of these practices may think that its hard to explore and recognize direction that is applicable to administration. It is hard to apply CobiT and ITIL together, senior business and IT administration have a gratefulness and comprehension of administration. Senior administration sponsorship empowers higher IT administration and administration development levels to expand quality to the venture and decreases the danger. It likewise obliges customizing to meet the particular prerequisite, in view of good practices and the handy experience of industry acknowledged best practices. Ventures are reliant on IT to fulfill the corporate points, meet their business needs and convey quality to the clients. A managable, responsible and repeatable path is for business to guarantee that IT administrations depend on business needs and client prerequisites. CobiT is an IT administration and control structure that spotlights on way to guarantee great administration of all IT related procedures, including administration forms. It incorporates a structure and an instrument for accomplishing craved leves of cnformance and performaace of IT procedures required to fulfill business needs.Leaveraging CobiT direction, an undertaking can guarantee that its administration exertion is alligned with its general business, gobernance and interior control of necessities (Berrahal and Marghoubi 2016). ITIL gives best works on portraying the arrangement, plan and actualize successful administration abilities. CobiT and ITIL can be utilized together for the advancement of the organization. It gives through and through way to deal with IT administration and administration. CobiT guides administration needs and destinations with an all encompassing, complete way to deal with all IT exercises and spotlights on the partner on coordinated and basic methodology (Baphna et al. 2016). ITIL bolsters CobiT best practices for administration and when they are utilized together their energy is consolidated for better administration backing and heading. It is more financially savvy technique for the utilization of the usage asset. Together CobiT and ITIL gives a compelling approach to comprehend the business priorities, requirements and utilize this to concentrate on IT administration. They additionally give a successful approach to comprehend business needs and necessities, it concentrates on IT benefits so administration can be better comprehend the centrality of IT administrations and how they bolster the business (Vasantha et al. 2016). It likewise helps the operational IT directors to better comprehend the effect administrations have on business forms. The business case for the administration changes, acquiring the backing of the partner and the acknowledgment and observing of the normal advantages is improved. We have to comprehend the present circumstance of the organization and concur upon the requirements for the fundamental changes and to distinguish any obstructions and issues that may should be overcome. Concentrate on business needs and set extension, the ebb and flow critical business and administration drivers and consider the effect they may have on the procedure change (Galliers and Leidner 2014). Create an execution activity arrangement, guaranteeing activity things adjust IT anticipates to business necessities and are in need request considering cost, hazard and effect. Syntel gives ITSM suite of offerings that helps customer methodically outline, record execute and deal with the procedures, evaluate current procedure and innovation holes, characterize ideal guide as indicated by industry best practices and systems, give essential preparing and encourage process/innovation arrangement through effective change administration strategies (Manhart and Thalmann 2013). Syntel takes after Industry standard structure and best practices to guarantee taking after advantages: Significant diminishment in ticket excess Improved item and procedure security Standardized procedures crosswise over association and accomplices Improved accessibility of business basic administrations Informed and opportune basic leadership Early identification and control of dangers Enhanced efficiency through arrangement conveyance process change Reduced expenses through enhanced procedure productivity and item conveyance Better administration control over arrangement conveyance forms Enhanced procedure centricity and business-IT arrangement Implementation of ITIL forms at HBZS In light of advancing the business and also innovation environment, it helps the colleagues to decide on starting conveyance of six key ITIL procedures to abnormal state. The current six ITIL procedures are occasion and episode administration, administration resource, information administration, demand satisfaction, setup administration and in addition change administration. It helps the organization to characterize the future arrangement to execute the extra ITIL forms (AXELOS 2015). The appropriations of other proposed ITIL procedures are IT administration, Service portfolio administration, budgetary administration of the It administrations, request administration and in addition business relationship administration. The capacity of the Information Technology Service Management (ITSM) is to direct an IT situation on HBZS. It incorporates the union of the server farms and in addition take off of new desktop environment (Melendez, Davila and Pessoa 2015). The ITIL procedures ought to be composed and additionally worked in one locale prompts globalization of the procedure. The joint supplier workshops verify that full duty from the gatherings of ITIL based procedures way to deal with operations of IT (Shrestha et al. 2016). Indeed, even instruction and additionally preparing is likewise required for the laborers to roll out conceivable IT improvements. Service Transition The ITIL administration move of HBZS guarantees that new changes in the IT administrations ought to meet with necessities of the client and in addition business desires of salvage administrations (Bhm et al. 2016). The principle point of the administration move forms set up at HBZS are to arrange and in addition deal with the progressions with time controlling dangers and convey of learning for basic leadership support. This procedure means to actualize, test and in addition pass on the potential keeping in mind the end goal to offer administrations by the administration outline that finish with the prerequisites of the partners and additionally convey planned answer for the salvage administrations (AXELOS 2016). This administration operation process identifies the occasion and gives a section point to execute the administration operations forms and also exercises (Rice 2013). It is the part of the administration requires controlling and robotizing. It screens and in addition classif ies the occasions to take conceivable activities. It has the objective to give back the IT administrations to the clients as quickly as time permits (Kowalkowski et al. 2015). Change Management To make a change in the organization without interrupting the IT administrators is termed as the change management. Change administration is a term that all the time falls into debates. Now and then it's a casualty, if the outcome is not exactly focused on the activity of the ground staff and concentrates enough for the change in administration (Flexer et al. 2012). Not to overlook on occasion it assembles eyeballs for undertaking exercises that may somehow or another get neglected: "Everything was conceivable in light of the fact that we actualized the new procedure; how about we not disregard the change administration." (Hayes 2014) Change administration is a procedure which guarantees that the progressions which are occurring in the association are checked stage by stage in order to avoid administrative mistakes. It is an extremely composed way to deal with guarantee that progressions are actualized successfully and proficiently (Brockwell and Davis 2012). There is an extension of change from a straightforward procedure change to technique change or a change in the approach. Thus change administration is a vital in term of process in Service Transition. Change Evaluation To survey significant Changes, similar to the presentation of another administration or a generous change to a current administration, before those Changes are permitted to continue to the following stage in their lifecycle (Lahou et al. 2015). ITIL change assessment examines Changes before they move to the following stage in their lifecycle. The lifecycle of a change incorporates a few focuses at which a go/no-go choice should be made: Approval to construct and test Approval to register programming with the conclusive media library (DML) Approval to send We ought to assess all progressions. Be that as it may, for huge changes a formal assessment procedure ought to be summoned (Park et al. 2015). Every association must characterize for itself what "noteworthy change" is. The assessment ought to include Assessing the planned impacts of the change beyond what many would consider possible, reckoning any unintended impacts of the change, distinguishing dangers that displaying a proposal to change administration on whether to continue to the following stage and the change administration procedure can make the go/no-go choice on continuing to the following stage (Willcocks 2013). Venture Management (Planning and Support) To arrange and facilitate the assets to convey a noteworthy release inside the anticipated time, quality appraisals and cost. Whenever, there will be a few undertakings going through the administration move period of the lifecycle (Conger and Probst 2014). It is the obligation of move arranging and backing to organize administration move exercises for all these ventures. In particular, the obligations of move arranging and backing include: Work with limit administration to guarantee that sufficient assets are accessible Where there is conflict for assets, build up a calendar that meets the necessities of the partners Guarantee that all gatherings utilize a standard, reusable procedure structure. Screen and enhance the execution of the Service Transition lifecycle stage. Application Development To make accessible applications and frameworks which give the obliged usefulness to IT administrations (Fang 2015). This procedure incorporates the improvement and upkeep of custom applications and also the customization of items from programming sellers. Discharge and Deployment Management The general procedure of discharge and organization is interlinked with, Service Validation and Testing, Change Management and Service Evaluation. The last discharge needs a green sign from the Change Advisory Board (CAB) to go into creation; this endorsement supports that amid all phases of discharge and organization item was checked, so it's good to go for large scale manufacturing (Alidoosti et al. 2016). Discharge and Deployment Management additionally ensures that clients have the right stuff and information to utilize the support of its maximum capacity and that the bolster staff and operations are very much educated about the administration levels and the guarantees of the item (Diao 2013). The Release and Deployment Management office is likewise considered as the soul of the Service Transition process. Discharge and Deployment Management is an arrangement of different methodologies, key focuses, and systems including: building and testing the discharge, arranging a discharge, arranging the organization, arranging pilots, conveying the discharge, testing the sending, speaking with change administration and advise the change administration that discharge has been sent Administration Validation and Testing To guarantee that conveyed Releases and the subsequent administrations meet client desires, and to confirm that IT operations can bolster the new administration. Testing can happen anytime in the administration lifecycle at the same time, it for the most part happens amid Service Transition (Crasso et al. 2014). The administration approval and testing process arranges, directs and gives an account of tests of new or changed administrations. The aftereffects of testing go to the change assessment procedure to bolster a choice on whether to continue. The administration plan bundle (SDP) plots the tests to perform. Working with change assessment, administration approval and testing will: Work with move arranging and backing to arrange the assets required for testing Plan and outline tests Plan tests Set up the test environment Play out the tests Assess exit criteria and report Tidy up and close tests Administration approval and test will perform distinctive sorts of tests, as called for in the administration outline bundle. Sorts of tests include (Roztocki and Weistroffer 2015): Utility testing: Does the administration convey the required usefulness? Guarantee testing: Will the administration convey required levels of accessibility, limit, security, and congruity? Ease of use testing: Will the administration be usable by every potential client, incorporating those with limited capacities? Contract and direction testing: Will the administration fit in with appropriate administrative and contract necessities? Operational preparation testing: Are the bolster capacities, including the administration work area, staffed and prepared to bolster the new or changed administration? Administration Asset and Configuration Management To keep up data about Configuration Items required to convey an IT administration, including their connections. Effective administration conveyance requires an expansive number of advantages of various sorts, for example, PCs, system hardware and so on (By et al. 2012). What's more, different antiques made amid administration, for example, approaches, administration level understandings, and the administration index, are required for effective organization and conveyance of administrations. ITIL alludes to such resources as arrangement things (CI's). Administration resource and arrangement administration makes one or more setup administration databases (CMDBs) to keep up precise data about CIs, including: Current state Possession Associations with different CIs Review track To keep up the cash and exactness of a CMDB, administration resource and setup administration depends on change administration to guarantee that lone approved changes happen and that the consequences of progress are precisely recorded (Waple et al. 2016). Administration resource and design administration keeps up the arrangement administration framework (CMS). The CMS contains the accompanying: Information layer: CMDBs and related databases, for example, the issue database, change database, demand database and so on. Incorporation layer: Instruments to incorporate the things in the information layer with the goal that they can be dealt with as one legitimate database. Information handling layer: Apparatuses to examine, model, and give an account of the substance of the incorporated database. Presentation layer: Devices to give altered perspectives of the database for the distinctive client groups. All parts of administration have a need to see the substance of the database, yet each has its own particular needs. Information Management To accumulate, break down, store and share learning and data inside an association. The main role of Knowledge Management is to enhance proficiency by decreasing the need to rediscover information. Information administration is in charge of keeping up the administration learning administration framework (SKMS), which speaks to the aggregate group of information inside the administration association. So as to convey benefit effectively, it is vital that learning be caught, sorted out, and made accessible to all with a need to know. The SKMS contains the greater part of the other information stores utilized by administration, including: Administration portfolio CMS Supplier and contract administration data framework (SCMIS) Accessibility, limit, and security administration data frameworks (CMIS, AMIS, and ISMIS) CSI register Learning can be arranged by information data information shrewdness (DIKW) structure as takes after: Information (frequently called "crude information") speaks to discrete realities or numbers. Without anyone else, information things have small importance. The obligation of learning administration as for information is to catch information, distinguish pertinent information, keep up its trustworthiness, and file or cleanse information when it is no more required (Sarkar et al. 2015). Data is produced when information is seen in setting. This regularly includes the utilization of measurements, for example, midpoints or crest and least values. The obligation of learning administration concerning data is to oversee content in a way that permits clients to question and examine it. Learning consolidates data with experience. Information can be utilized as a premise for basic leadership or making a move. The obligation of information administration as for learning is to bolster the apparatuses that permit clients to spot inclines, or establish that an edge has been surpassed. Insight can be made by exploiting all the information accessible, for example, perceiving that a late disintegration of administration execution corresponded with the reception of another strategy. The obligation of information administration as for astuteness is to make accessible the apparatuses expected to recognize these affiliations Administration resource and arrangement administration (SACM) is a theme which can't be left unexplained. The motivation behind the SACM procedure is to ensure that the benefits required to convey administrations are appropriately controlled, and ensure that solid and precise data about these advantages is accessible wherever and at whatever point it is required. This data likewise constitutes of subtle elements like the connections amongst resources and how the advantages have been designed. Service Operation The present difficulties that HBZS appearances is that the organization will thoroughly outsource their IT offices. In the given contextual analysis, a portion of the ITIL administration operational procedures and additionally benefit work area capacities are talked about. HBZS outsources their administration work area by contracting with the outside merchants to do some IT capacities, for example, operations of the server farm, debacle recuperation, system administration and additionally information section (Rivard and Aubert 2015). Administration work area outsourcing for the client administration is the best choice for HBZS as they have constrained staffs to give the administration and in addition bolster 24 hours a day. Because of set number of representatives, it is troublesome for the association to address with issues and in addition desires of clients (Ikediashi et al. 2012). For the mining salvage administration, administration work area outsourcing ought to be a lifeline. T he ITIL administration operation guarantees that the IT administrations for HBZS ought to be conveyed viably. It comprises of satisfying the solicitations of the clients, resolve the administration disappointment issues, conveying operational errands and in addition altering the issues (Alidoosti et al. 2016). The accompanying are the procedures of the administration operations: Event Management To ensure CIs and administrations are always observed, and to channel and arrange Events keeping in mind the end goal to settle on fitting activities. Occasions are created by working frameworks, database administration frameworks, middleware, applications, and checking apparatuses. Most occasions create amid typical operations and need no reaction other than logging. However a little rate of occasions express a genuine or potential disappointment of a CI. This will require the opening of an occurrence. This administration operation process identifies the occasion and gives a passage point to execute the administration operations forms and also exercises. It is the part of the administration requires controlling and computerizing (Baphna, Kothari and Kakarlapudi 2016). The goal of the occasion administration is to screen and in addition arrange the occasions to take conceivable activities. Incorporated administration programming suites can give worked in abilities to imparting occasions to the occasion administration device. Most occasion creating programming can convey occasions through "traps". These are characterized in the straightforward system administration convention (SNMP). The occasion administration instrument can be arranged to parse the data in the traps. Episode Management To deal with the lifecycle of all Incidents. The essential target of Incident Management is to give back the IT administration to clients as fast as could be expected under the circumstances. Occurrence Management as per ITIL V3 recognizes Incidents (Service Interruptions) and Service Requests (standard solicitations from clients, e.g. secret word resets). Administration Requests are no more satisfied by Incident Management; rather there is another procedure called Request Fulfillment. There is a devoted procedure in ITIL V3 for managing crises ("Handling of Major Incidents"). Moreover a procedure interface was included between Event Management and Incident Management. Huge Events are setting off the production of an Incident. Demand Fulfillment To satisfy Service Requests, which as a rule are minor (standard) Changes (e.g. solicitations to change a secret word) or demands for data. The administration work area's point is to be the single purpose of contact for all correspondences amongst clients and IT administration (Herrera 2015). As noted over, this incorporates the reporting of occurrences by clients. However, there are different explanations behind clients to get in touch with IT administration. These include: Password resets Requests for data or use help Standard changes as portrayed under change administration We know these sorts of solicitations as administration solicitations. The solicitation satisfaction process handles logging, sorting, organizing, planning, and fulfilling administration demands. Demand satisfaction is not required to fulfill demands that are infeasible or lacking appropriate support. Regularly, benefit demands don't influence arrangement things (CIs). An exemption is a standard change. This is an okay, routine change that is pre-endorsed by change administration. Some other solicitation that influences one or more CIs we allude to change administration. It is fitting to archive continuous happening demands in a solicitation model. This will guarantee steady taking care of and documentation. We ought to record standard administrations, especially those for which there is a charge, in the administration inventory. A developing pattern in solicitation satisfaction is the expanding utilization of self improvement instruments. These permit clients to make demands, for example, secret word resets or downloads of affirmed programming. Access Management It gives the approved clients to utilize the administration and keeps the unapproved access of the information. It executes the arrangements of the data security administration (Waple et al. 2016). Client access solicitations is utilized to include, repudiate and additionally change the entrance rights and guarantee that lone the approved individual can just concede the privilege to utilize the administration of the association. Access administration works intimately with data security administration to guarantee that the entrance procurements of the data security arrangement are upheld. Demands for access might be started as administration demands and be taken care of by the administration work area, or might be directed to a security bunch for satisfaction. A noteworthy piece of data security administration is controlling access to applications or information. Access administration is in charge of managing solicitations from clients for access. This procedure includes username and secret key control, additionally incorporates the formation of gatherings or parts with characterized access benefits, and after that controlling access by characterizing bunch participation. Notwithstanding allowing rights, access administration denies rights when a client's status changes through exchange, acquiescence, or end. Likewise, get to administration ought to occasionally survey the parts or gatherings used to control access to guarantee that lone vital rights are being allowed and that there are no rights clashes among the parts or gatherings. Access administration is otherwise called personality administration or rights administration. Its part is to ensure that the people in an association can utilize the frameworks that help them carry out their employment, however just has as much access to them as they truly require. This procedure keeps running on the data security standard of "minimum benefit" (or "slightest power"), which expresses that every client should just have the capacity to get to the data or assets important to their employment. While it might appear like a weight to need to deny access to those clients who need it, it's essential for everybody to take after the procedure. Access administration empowers the association to keep up a safe domain that counteracts unapproved use, as well as turns away information ruptures that can disintegrate client trust and acquire monetary punishments. Issue Management This ITIL administration operation process keeps the episodes from happening, minimizing the effect of the occurrences that are not averted (Perera 2016). Keeping in mind the end goal to recognize the huge issues, the issue administration group dissects the records of occurrence and utilizations information gathered by the IT staffs. Issue administration is one part of ITIL execution that gives numerous associations migraines. The trouble lies in the closeness between occurrence administration and issue administration (Sousa and Oz 2014). The two procedures are so firmly adjusted that separating the exercises can get to be troublesome for ITIL tenderfoots. When does one transform into the other? In a few associations, the two procedures aret so firmly related they are consolidated inside and out. The distinctions are critical, be that as it may, since they are not the same and have diverse targets. The expression "issue" alludes to the obscure reason for one or more episodes. A valuable representation for comprehension the relationship amongst issues and occurrences is to think about the relationship between an infection and its indications. In this representation, the illness is the issue and the side effects are the episodes. Pretty much as a specialist uses the side effects to analyze the sickness, so issue administration utilizes the occurrences to analyze the issue. After the known blunder has been distinguished, the following stride is to decide how to settle it. This will normally include a change to one or more CIs, so the yield of the issue administration procedure would be a solicitation for change, which would then be assessed by the change administration handle, or incorporated into the CSI register. Issue administration is considered as a receptive procedure in that it is summoned after episodes have happened, yet it is really proactive, since its will probably guarantee that occurrences don't repeat later on, or on the off chance that they do, to minimize their effect. IT Operations Control To screen and control the IT administrations and their basic foundation. The procedure IT Operations Control executes everyday schedule assignments identified with the operation of framework parts and applications. This incorporates work booking, reinforcement and reestablishes exercises, print and yield administration, and routine support. IT Operations Manager - Process Owner An IT Operations Manager will be expected to assume general liability for various Service Operation exercises. Case in point, this part will guarantee that throughout the everyday operational exercises are completed in an auspicious and solid way. IT Operator IT Operators are the staffs who play out the everyday operational exercises. Ordinary obligations include: Performing reinforcements, guaranteeing that planned employments are performed, introducing standard hardware in the server farm. Offices Management To deal with the physical environment where the IT base is found. Offices Management incorporates all parts of dealing with the physical environment, for instance power and cooling, building access administration, and ecological checking. Offices Manager - Process Owner The Facilities Manager is in charge of dealing with the physical environment where the IT base is found. This incorporates all parts of dealing with the physical environment, for instance power and cooling, building access administration, and ecological observing. Application Management Application Management is in charge of overseeing applications all through their lifecycle. Application Management is dealt with in ITIL as a "capacity". It assumes a vital part in the administration of uses and frameworks. Numerous Application Management exercises are installed in different ITIL forms - yet not all Application Management exercises. Hence, at IT Process Maps we chose to present an Application Management process as a major aspect of the ITIL Process Map which contains the Application Management exercises not secured in some other ITIL process (De Klerk et al. 2013). Application Management exercises inserted in different procedures are appeared there, with obligation appointed to the Applications Analyst part. Specialized Management Specialized Management gives specialized ability and backing to the administration of the IT base. Numerous Technical Management exercises are inserted in different ITIL forms - yet not all technical management exercises. Consequently, at IT Process Maps we chose to present a technical management process as a feature of the ITIL Process Map which contains the technical management exercises not secured in some other ITIL process. Specialized Management exercises implanted in different procedures are appeared there, with obligation appointed to the Technical Analyst part. The Technical Analyst is a Technical Management part which gives specialized aptitude and backing to the administration of the IT base. There is normally one Technical Analyst or group of investigators for each key innovation territory (Crasso et al. 2014). This pretends a critical part in the specialized parts of outlining, testing, working and enhancing IT administrations. It is likewise in charge of building up the aptitudes required to work the IT base. CSI and Business IT alignment The manager of HBZS continually improves the effectiveness and efficiency of services and processes. In this manner, the IT Manager cravings to build up a Continual Service Improvement (CSI) process (Action 2013). HBZS utilizes the IT business arrangement as a part of request to accomplish the whole business targets (Chakraborty and Chaki 2016). It has the capacity to show a positive relationship between the IT and additionally the clients of IT in the business bunches. With the expanding dependence on the IT and in addition need of the IT benefits, the IT business arrangement is required for effectively actualize for the mining salvage administrations (Brehm and Schmidt 2016). In any case, the business IT arrangement is a fundamental test for the associations. It is being used by HBZS keeping in mind the end goal to make and additionally enhance the efficiencies, decreases the expenses and also makes a creative worth to the business (Long 2012). For the arrangement of the work, the way of life of the association holds onto the IT and it is a fundamental part of the long haul accomplishment inside the association (Sarkar, Chaudhuri, and Moon 2015). CSI inside the ITIL means to adjust and realign the administrations of the IT with a specific end goal to change the business needs by executing the upgrades to the IT administrations so as to backing the salvage administrations of the business (Song, Baker and Davis 2015). It additionally enhances the adequacy of the procedure, its proficiency and also cost viability of the procedures of IT through the whole lifecycle. Because of the business IT association, the association can ready to develop their business and raise their salvage administrations among the clients (Gercek, Saleem and Steel 2016). Because of the organization, HBZS can ready to handle their IT business all the more proficiently and successfully. Service report of HBZS The present administration reporting of HBZS gives data to the IT and also business to decide (Vetrakova, Potkany and Hitka 2013). The administration reporting comprises of data assembled from different sources, distributed data utilizing devices, for example, email, web. The administration of the association is glad that standard report is sent to the upper level administration and CEO of the association. In any case, the main issue is that the procedure of administration reporting takes more opportunity to redesign the data (Borghoff and Pareschi 2013). The IT Manager suggests executing another administration reporting process in their business such that the administration reporting process reports result into accomplishing operationally and also deliberately. Inside the ITIL, administration reporting is recognized as a standout amongst the most critical interfaces for both IT and additionally HBZS (Rivard and Aubert 2015). Amid the administration reporting, IT gets a chance to sho w the parts of the administration to the clients. The reporting exercises empowers the IT and also business to convey the correspondence to another level with a specific end goal to address the issues. A reporting structure strategy is required to be recorded such that each diverse office requires seeing the arrangement of reports from different offices. It is required to audit the administration reporting process on customary premise as reports may change as far as information and in addition timings (Picard, Renault and Barafort 2015). HBZS distinguishes that its reporting procedure takes additional time, consequently the IT Manager explain this issue before it influences the business operations of the organization. The administration reporting is to be kept up by the administration work area director. Subsequently, the IT Manager takes the choice to outsource their administration work area (Melendez, Davila and Pessoa 2015). It helps them t control and additionally deal with the administration reports to manage the business (Reijers, Vanderfeesten and van der Aalst 2016). It decreases the time and in addition exertion of the people to deal with the reports. Business IT partnership HBZS requires business mastery and specialized learning to do the IT business operations, however it is troublesome for them to fabricate an IT business organizations (Nomani, and Cater-Steel 2014). Because of progress in the innovation and additionally appropriation of new ITIL forms put weight on the IT Manager to construct a relationship between IT and in addition different business accomplices (Meyr, Wagner and Rohde 2015). They can make to enhance the execution of the business at the interface of innovation and business. The IT Manager understands that the association needs business accomplices to express their business procedure and in addition join them with the interest of IT (Qin and Chen 2016). Along these lines, the director can empower both ability and additionally responsibility among the business accomplices. A genuine IT-business association for all levels of HBZS is required to construct an elite association by giving the best mining salvage administrations to the cli ents. It changes the many-sided quality nature of the IT as it prompts enhance the business IT relations by concentrating on necessities of the clients (Goetsch and Davis 2014). In this manner, HBZS makes a business IT organization with OKD. From the arrangement, the IT and in addition business are coordinated and also conveyed the ideal arrangement towards the execution of the business. Indeed, even straightforwardness is required to build up a trusting relationship between IT and also business (Vetrakova, Potkany and Hitka 2013). The IT Manager ought to build the level of comprehension of the hierarchical business methodology. Subsequently, legitimate correspondence is required to overcome with the issues raised between the IT and additionally business. HBZS ought to enhance their correspondence mode to make an organization with OKD. This association will help the association to build their salvage administrations they gave. HBZS ought to take after the ideas of ITIL with the goal that they can keep up a decent execution (Ikediashi et al. 2012). Aside from this, this organization helps them to build up a preparation framework where the staffs are inspiring preparing to handle the IT assets. It likewise helps them to ra ise their abilities and in addition information in the field of IT. Indeed, even with a specific end goal to accomplish an effective business accomplice, trust is most vital from both the sides. HBZS requires an everyday business and IT association that can reflect by the nimble strategies. This technique is helpful as it plans the instruments, breaks down and afterward client acknowledgment testing is done to show signs of improvement IT particulars (Roztocki and Weistroffer 2015). The business accomplices verbalize the requests of IT with the abilities of business design. Recommendations to Mr. Gurny IT manager There are some recommendations that needs has been made by the IT consultant for the HBZS Company for providing and improving their service quality. The following recommendations or suggestions are listed below. The processes that have been suggested in the earlier phase needs to be strictly implemented in the HBZS Company for the betterment of the future. The recommended processes will help the company to increase the efficiency of their service quality. The CSI (Continual Service Improvement) process is critical and it needs to be implemented correctly to ensure future ITIL enhancements. The best practices of ITSM and ITIL needs to be developed in the HBZS Company by providing some training related ITIL and ITSM. The Service Desk needs to be outsourced to enhance the in-house performance of the IT staff so that they can help company with other IT strategies. Hiring professional to the company so that they can add value to processes. The company needs to adopt the ISO 20000 certification so that their company can be trust with the services and products and it will be easy to gain customer satisfaction. The Service improvement plan needs to be adopted to ensure that the sub-processes of ITIL are working nicely. The upper management of HBZS needs frequently endorsed the ITIL initiative to achieve the success. The recommendations above are critical and need to be addressed by the company IT manager Mr. Gurny to meet the customer satisfaction level. The company has to be careful while implementing the new ITIL processes. The recommendations mentioned are suggested by reviewing the provided case study of HBZS Company. We have to make appropriate changes in the recommendation if required based on other ITIL future requirements of the company. Conclusion The report presented here explains about the HBZS and OKD business alignment. The report describes how the company is been doing performance wise after the implementation of six selective process of ITIL. The future suggestions have been explained in this report while considering the ITIL processes. A detailed analysis report is been provide by the IT consultant (author) who has been selected for preparing this report. The IT consultant has reviewed the case study in detail and provide a depth research analysis report which includes the what new processes needs to be adopted by the company and what are their working principles or their roles in any organization and how are they helpful to the present HBZS Company. Future steps of IT service management system is been suggested to the company. The report includes the explanation of the new process and why it is been required to be implemented in the HBZS organization. The overview of Service Transition is been explained in this report and the respective processes that were adopted by the company is also been explained. The advice has been given to the IT manager Mr. Gurny regarding the critical processes which are interrelated with other HBZS and ITIL processes. The Service Operation process reviews have been made in the report and its impact on the present company has been discussed in detail. The overview of Service Desk and its outsourcing option has been critically reviewed and a detailed explanation has been provided in this document. Different benefits due to Outsourcing the Service Desk to the company performance is been mentioned in this report and the disadvantages has been mentioned as well. The major benefits of ITIL with service operation is been explained in this report and the role of service desk operation i s been described as well. The Continual service improvement process has been analyzed and been explained in the report along with the service reporting and its importance in the HBZS company. A detailed analysis has been made as far as service reporting is concern. The extension of Service reporting is been explained in this report and how it can be a future asset for HBZS company is been described. The Business IT alignment overview has been given for both the company OKD and HBZS. Finally some recommendations have been given to the IT manager Mr. Gurny so as to implement those recommendations in the company to increase the company efficiency and effectiveness. References Action C S I, 2013. Promoting Effective Dialogue Between Business and Education Around the Need for Deeper Learning. Alidoosti, R, Moaven, S, Habibi, J Khalili, MM 2016, Towards a Dynamic Model for Requirements Handling in Software Architecture Configuration ManagementLecture Notes on Software Engineering,vol. 4, no. 2, p.147. AXELOS, 2015.HBZS Mining Rescue Services: ITIL In a Small to Medium-Sized Business. Berrahal, W Marghoubi, R 2016, March, Lean continuous improvement to information technology service management implementation: Projection of ITIL framwork, In2016 International Conference on Information Technology for Organizations Development (IT4OD)(pp. 1-6). IEEE. Borghoff, UM Pareschi, R. eds 2013,Information technology for knowledge management. Springer Science Business Media. Brehm, L Schmidt, R 2016, Potential Benefits of Using Social Software in ERP-Based Business Process Management InMultidimensional Views on Enterprise Information Systems(pp. 71-83). Springer International Publishing. By, RT, Burnes, B Oswick, C 2012, Change management: Leadership, values and ethics, Journal of Change Management,vol. 12, no. 1, pp.1-5. Chakraborty, M Chaki, N 2016, A New Framework for Configuration Management and Compliance Checking for Component-Based Software Development, InAdvanced Computing and Systems for Security(pp. 173-188). Springer India. Chen, M 2013, Service Management. Chow, DYM 2014,Modelling and simulation for logistic service company: case study on customer service operation(Doctoral dissertation, UTeM). Crasso, M, Mateos, C, Zunino, A Campo, M 2014, EasySOC: Making web service outsourcing easier,Information Sciences,vol. 259, pp.452-473. Bhm, E, Eggert, A Thiesbrummel, C, 2016. Service transition: A viable option for manufacturing companies with deteriorating financial performance?.Industrial Marketing Management. Brockwell, PJ Davis, RA, 2012.ITSM: an interactive time series modelling package Chemboli, S, 2013. An epistemological basis for alignment in Enterprise Architecture views. Conger, S Probst, J, 2014. Knowledge Management in ITSM: Applying the DIKW Model. InEngineering and Management of IT-based Service Systems (pp. 1-18). Springer Berlin Heidelberg. Crasso, M, Mateos, C, Zunino, A Campo, M, 2014. EasySOC: Making web service outsourcing easier.Information Sciences,259, pp.452-473 Dalkir, K, 2013.Knowledge management in theory and practice. Routledge. Davenport, TH, 2013Process innovation: reengineering work through information technology. Harvard Business Press. de Barros, MD, Salles, CAL., Gomes, CFS, da Silva, R.A. Costa, HG, 2015. Mapping of the Scientific Production on the ITIL Application Published in the National and International Literature.Procedia Computer Science,55, pp.102-111. De Klerk, A, Cohen, M., Fukaya, S, Zakharchenko, S, Turpen, R Alagarsamy, T, FrontRange Solutions USA Inc., 2013.Business application development and execution environment. U.S. Patent 8,478,616. Diao, Y, Jan, E, Li, Y, Rosu, D Sailer, A, 2016. Service analytics for IT service management.IBM Journal of Research and Development,VOL60 (2-3), pp.13-1. Ding, K., Jiang, PY Liu, JJ 2016, Inter-Enterprise Service Interaction Modeling Method for Outsourcing Production Environment, InProceedings of the 22nd International Conference on Industrial Engineering and Engineering Management 2015(pp. 251-260). Atlantis Press. dos Santos, JC da Silva, MM 2016, Measuring and Evaluating Efficiency on IT Outsourcing operations through Data Envelopment Analysis, International Journal of Enterprise Information Systems (IJEIS), vol.12, no. 1, pp.1-20. El Mekawy, M, AlSabbagh, B Kowalski, S, 2014. The Impact of Business-IT Alignment on Information Security Process. InHCI in Business (pp. 25-36). Springer International Publishing. Fang, D, Liu, X., Romdhani, I Pahl, C, 2015. An approach to unified cloud service access, manipulation and dynamic orchestration via semantic cloud service operation specification framework.Journal of Cloud Computing,VOL4 no.1, pp.1-20. Flexer, RW, Baer, RM, Luft, PJ Simmons, TJ, 2012. Transition planning for secondary students with disabilities. Galliers, RD Leidner, DE, 2014.Strategic information management: challenges and strategies in managing information systems. Routledge. Gercek, G, Saleem, N. Steel, D, 2016. Networked Services Outsourcing for Small Businesses: A Lifecycle Approach.Journal of Global Business and Technology,vol.12 no.1, p.23. Goetsch, DL Davis, SB, 2014.Quality management for organizational excellence. pearson. Hayes, J, 2014.The theory and practice of change management. Palgrave Macmillan. Herrera, MEB, 2015. Creating competitive advantage by institutionalizing corporate social innovation.Journal of Business Research,vol. 68 no.7, pp.1468-1474. Katz, R, 2012.Information management for engineering design. Springer Science Business Media. Kowalkowski, C, Windahl, C, Kindstrm, D Gebauer, H, 2015. What service transition? Rethinking established assumptions about manufacturers' service-led growth strategies.Industrial Marketing Management,45, pp.59-69. Lahou, E, Jacxsens, L, Verbunt, E Uyttendaele, M, 2015. Evaluation of the food safety management system in a hospital food service operation toward Listeria monocytogenes.Food Control,49, pp.75-84. Li J, Tao, F, Cheng, Y Zhao, L., 2015. Big data in product lifecycle management.The International Journal of Advanced Manufacturing Technology,vol. 81 no. 1-4, pp.667-684. Long, JO, 2012. Continual Service Improvement. InITIL 2011 At a Glance(pp. 91-95). Springer New York. Recommendations to Mr. Gurny IT manager

Sunday, December 1, 2019

Is global warming happening and are humans to blam Essays

Is global warming happening and are humans to blame? These questions are being asked more and more frequently by people who believe Earth's temperature is climbing at an alarming rate. Our planet's ever changing climate has captured the attention of those who would agree that without a change in our behaviour, we will ultimately destroy the world we live in. In the following essay, I will describe the causes, effects and ways we could possibly slow down the effects of global warming. There are many causes of global warming. Some of the carbon emissions are just natural, like a volcano but most of the carbon emissions are man-made. The most important cause of global warming are the greenhouse gasses, most of which are generated by us humans. Some of the many greenhouse gasses include methane, chlorofluorocarbons, sulphur dioxide, water vapour and most importantly, carbon dioxide. Greenhouse gasses has been rapidly increasing after the 20th Century because of population growth, advances in technology and a bigger economy. One of the manmade causes behind global warming is ozone depletion. The ozone layer in the atmosphere is a layer of gas which blocks out harmful UV rays from the sun. Day by day the ozone is declining because of the use of chlorofluorocarbons. This gas is used in many places which include aerosols, refrigerators, and cleaning fluids which gradually release this gas. Without a shield to block the UV rays, the greenhouse gasses absorb it, wh ich ultimately increase global warming. According to research, it has been estimated to be an ozone hole which is twice the size of Antarctica. The effects of global warming are becoming more clear in the recent years, as there are more sources for greenhouse gas emissions. According to the US geological survey, bout 150 glaciers in Montana Glacier National Park have been affected in the last 100 years. Because of rapid climate change, this figure is now at 20 glaciers. The Earth is also getting warmer. This might sound like a good thing, but thousands of animal species will die out because of to hotter temperatures. It has been recorded that the year 2012 was the hottest year since 1895 and the year 2013 was the hottest since 1880. This means there will be longer summers and shorter winters which can disturb animal migration cycles. With warmer weather, there will also be a rise in sea level because there will be more ice melting, especially in the north and south poles. This rise in sea levels can cause many low-lying and inhabited islands to submerge underwater. Huge levels of climate change and globa l warming are making unpredictable weather and hurricanes more dangerous and powerful. An increase in global temperature can also have an effect on the atmosphere such as changes in air circulation in the atmosphere, heavy storms, declining ozone layer, occurrence of more hurricanes, floods, droughts and so much more. There are many programs and awareness campaigns wanting to reduce the amount of greenhouse gasses which are run by governments, NGOs (non-government organisations), business leaders and private sectors. Some damage caused by of global warming cannot be reversed such as melting ice caps. We should try to reduce our carbon emissions now .. To reduce greenhouse gasses overdrive electric or solar powered cars. Instead of burning coal and other fossil fuels for energy, we can turn to renewable sources such as solar power, hydroelectric power and wind power. If every country adapted to these, we can slow down or even stop global warming. In conclusion, there is very little doubt that global warming will change our climate in the next century. So what are the solutions to global warming? First, there must be an international political solution for fewer carbon emissions. Second, funding for developing cheap and clean energy production must be increased, as all economic development is based on increasing energy usage. We must not pin all our hopes in global politics and clean energy technology, so we must prepare for the worst and adapt.

Tuesday, November 26, 2019

Present Simple Worksheets for ESL Students

Present Simple Worksheets for ESL Students The present simple takes the following forms: Present Simple Positive Form Review Subject present simple form of verb objects Examples: Alison often watches TV after dinner.They play golf on Saturdays. Present Simple Negative Form Subject do/does not verb objects Examples: Jack doesnt spend much time on reading.They dont eat meat on Fridays. Present Simple Question Form (Question Word) do/does subject verb? Examples: What do you do after work?How often do you eat out? Important Notes The verb to be does not take the auxiliary verb do in the question or negative form. Examples: She is a teacher.I am from Seattle.Are you married? Time Expressions With Present Simple Adverbs of Frequency The following adverbs of frequency are often used with the present simple to express how often someone does something habitually. Remember that present simple is used to express daily routines and habits. These adverbs of frequency are listed from most frequent to least frequent. Adverbs of frequency are placed directly before the main verb. alwaysusuallyoftensometimesoccasionallyrarelynever Days of the Week and Times of the Day Days of the week are often used with s to indicate that someone does something regularly on a specific day of the week. Times of the day are used to express when someone usually does something. Notice that at is used with night, but in with other periods during the day. Finally, at is used with specific times during the day. Examples: I play golf on Saturdays.She gets up early in the morning.Tom catches the bus at 7.30 a.m. Present Simple Worksheet 1 Conjugate the verb in parentheses  using the form  indicated. In the case of questions, use the indicated subject as well. I usually _____ (get up) at six oclock.How often _____ (she go) to the gym to workout?They _____ (be) from Holland.Jack _____ (not work) in the city.Where _____ (he live)?Alison _____ (visit) her friends on Saturdays.They _____ (not eat) meat on Fridays._____ (you play) tennis?Susan often _____ (drive) to the beach when the weather is nice.Eric _____ (not read) in Japanese.When _____ (she have) dinner?I _____ (take) a shower before I leave for work.How _____ (you start) this machine?He _____ (not work) on Sundays.Sharon rarely _____ (watch) TV.We occasionally _____ (take) the train to Seattle.Peter _____ (not like) buying food in supermarkets.Why _____ (they leave) work so late on Fridays?You sometimes _____ (do) housework._____ (she speak) Russian? Present Simple Worksheet 2 Choose the correct time expression used with the  present simple tense. I sleep in late on (Saturday / Saturdays).How (much / often) do you visit your friends in Chicago?Jennifer doesnt catch the bus (in/at) 8 in the morning.Henry enjoys playing golf (in/at) the afternoon.Do they eat fish (in/on) Fridays?I usually have my meetings (on/at) 10 am.Susan doesnt like going out (at/on) Fridays.Our class (usually/usual) takes tests on Tuesdays.The teacher gives us notes (after/while) class.Sharon doesnt go to be before 11 pm (in/at) night.Where do they usually hold meetings (at/in) the morning?Tom (rare/rarely) gets up early on Sundays.We dont enjoy eating breakfast before six (at/in) the morning.Our parents (occasion/occasionally) catch a train to the city.She doesnt use a computer (at/in) night.Alexander has lunch (on/at) noon.David doesnt work (at/on) Tuesdays.They listen to classical music (in/at) the afternoon.Mary answers her e-mail on (Friday/Fridays).How often do you travel (in/on) Tuesdays? Answer Keys Present Simple Worksheet 1 I usually  get up  at six oclock.How often  does she go  to the gym to workout?They  are  from Holland.Jack  doesnt work  in the city.Where  does he live?Alison  visits  her friends on Saturdays.They  dont eat  meat on Fridays.Do you play  tennis?Susan often  drives  to the beach when the weather is nice.Eric  doesnt read  in Japanese.When  does she have  dinner?I  take  a shower before I leave for work.How  do you start  this machine?He  doesnt work  on Sundays.Sharon rarely  watches  TV.We occasionally  take  the train to Seattle.Peter  doesnt like  buying food in supermarkets.Why  do they leave  work so late on Fridays?You sometimes  do  housework.Does she speak  Russian? Present Simple Worksheet 2 I sleep in late on  Saturdays.How  often  do you visit your friends in Chicago?Jennifer doesnt catch the bus  at  8 in the morning.Henry enjoys playing golf  in  the afternoon.Do they eat fish  on  Fridays?I usually have my meetings  at  10 am.Susan doesnt like going out  on  Fridays.Our class  usually  takes tests on Tuesdays.The teacher gives us notes  after  class.Sharon doesnt go to be before 11 pm  at  night.Where do they usually hold meetings  in  the morning?Tom  rarely  gets up early on Sundays.We dont enjoy eating breakfast before six  in  the morning.Our parents  occasionally  catch a train to the city.She doesnt use a computer  at  night.Alexander has lunch  at  noon.David doesnt work  on  Tuesdays.They listen to classical music  in  the afternoon.Mary answers her e-mail on  Fridays.How often do you travel  on  Tuesdays?

Saturday, November 23, 2019

Land a Full-Time Trucking Job After Graduation

Land a Full-Time Trucking Job After Graduation You’re about to finish truck driving school- or you’re trying to figure out if school is a smart investment- and you want to know if a solid job with benefits is in your future. Great question! Here’s the good news: While there are no guarantees in life, most people who finish an accredited CDL training program find jobs- some even line up jobs before they graduate.Some industry insiders feel that there are plenty of full-time jobs with benefits available for qualified truckers right now- from OTR drivers and local/regional drivers to management and support positions and more- so the timing might be perfect if you’re just about to graduate or are considering starting a CDL program.What can you expect when you land your first job?Plenty! Along with great travel opportunities and an average salary of around $40,000, you can expect some solid benefits depending on where you work- including comprehensive insurance, paid vacation, a 401(k), and more.So†¦ho w can you make this reality happen for you?Obviously, choosing a great training program with a proven track record is essential, so do your homework when choosing one. Some are affiliated with major carriers and offer placement help. Others are company sponsored, which means you may be able to lock down guaranteed employment in exchange for tuition assistance!Already in a program?Start thinking about your life after you graduate- have a killer resume that plays up your experience and strengths, network with other drivers and industry insiders whenever possible, and make informed, well-researched decisions at every turn!It’s never a bad time to think about your future- if being a trucker might seem like the right career path for you, don’t ask your magic 8-ball to figure out what lies ahead for you. Devise a well-researched plan, work hard, and get rolling!Graduating Truck Driving School: Will I Really Get A Full-Time Job With Benefits?Read More at www.roadmaster.com

Thursday, November 21, 2019

Emergency Disaster Legal Issues after Hurricane Sandy within New Research Paper

Emergency Disaster Legal Issues after Hurricane Sandy within New Jersey - Research Paper Example Legal offices have been open in the region to provide people with access to benefits, acquire safe inexpensive housing, and manage other legal problems to assist families and the public pull through Hurricane Sandy. In order to prevent communities from the devastating effects of any other emergency, several policies have been implemented accordingly. Reflecting on this context, this paper critically examines emergency disaster legal issues after Hurricane Sandy within New Jersey from a broad point of view. In order to successfully scrutinize the subject, the paper also provides the central research question and the purpose of the research, research methodology, and appropriate recommendations accordingly. The Central Research Question and the Purpose of the Research The occurrence of disaster in any given society leads to mass killings and destruction of property in the long run. The happening of Hurricane Sandy in New Jersey has become an important issue of discussion in recent time s. The debate over the disaster has been aimed towards finding out the most valuable measures, which should be implemented in the region to help people (National Disaster Legal Aid, 2012). Whenever a disaster hits any given region, there are several legal issues which arise among the victims. Several measures must be adopted appropriately in order to solve such legal issues within the shortest time possible. With the intention of addressing the legal issue in the affected region, legal assistance is always considered of great importance (Perry, 2012). Legal assistance provided in New Jersey takes account of the following. The first legal assistance is returning legal documents lost and damaged during the incidence. The second legal assistance is providing medication and property insurance claims to the victims whilst the other legal assistance is to give counseling on issues related to tenant and landlord. Building on this perspective, it is worth noting that the central research qu estion of this paper revolves around preparing a report in support of the legal issues of the disaster. This implies that the central question of the research forms a point of reference from where the purpose of the research is understood clearly. It is worth noting that, all the way through the state, revival efforts are well in progress (Summar, 2012). The revival efforts are aimed towards saving the lives of all people affected by the disaster. In that sense, the purpose of the research is to explore the negative impacts of a disaster, examine the necessary policies that are put into practice towards addressing the emerging issues, and define how victims of the catastrophe can be helped to recover sooner or later. Research Methodology After evaluation of the disaster, the Hazard and Vulnerability Analysis prepared by the legal offices at New Jersey announced that the people were equally at risk of different types of disasters. It is appropriate for a community to have well organi zed emergency operations against any emergency. After an analysis has been done and the community has been found vulnerable to different types of disasters, there is the need to come up with emergency plans to address the situation (Perry, 2012). For the community, there are two ways to go about this: we can have a Disaster Specific Plan for the different disasters or have a General Emergency Management Plan for addressing any of the four disasters whenever

Tuesday, November 19, 2019

Gun Control Essay Example | Topics and Well Written Essays - 750 words - 1

Gun Control - Essay Example The opponents of gun control argue that guns are necessary for self-protection. Furthermore, they would ensure self defense when police fail to provide protection to general public. The proponents of this view believe that a burglar will always be armed and it gives him a higher advantage than the common man. If the general public also is given guns it may counter balance the situation. However, evidently gun is not devised to threaten or injure someone but to kill; hence the free use of guns must be banned on the following grounds. In the first place, nobody takes serious care of guns that it has become a common utensil like knife or pen. Guns are very often misused by everyone especially school children. When they get emotionally upset, instead of seeking some counseling measures, they pick parent’s gun and shoot at their peers and teachers. As reported in the New York Times, in the 90s, the number of children carrying guns to the school was more than one lakh in the US. It is also reported that â€Å"both gun carrying and gun violence are phenomena almost entirely confined to world outside schools† (Cleck, cited in Texas Plan for guns in school may not comply with state law, Aug 19, 2008). The statistics clearly shows the incidents like shooting in a college of Alabama killing one woman wounding three on April 7th 2011. The killing of 12 elementary school students by a gun man in Rio De Jeniro, Brazil on April 8th stands on the top of all such incidents (School shootings, May 2, 2011). The practice of allowing children to get access to and use guns is not digestible for common sense. The argument that guns are necessary for self protection in the US can be severed by pointing that guns can’t be carried to all the places. The exponents of such an argument must answer how they would secure their lives in such a place. But no law prevents a person from carrying his body to anywhere. So, those who are worried about their lives may master som e martial arts so that they can well protect themselves from a person coming to assault them. Some others argue that since criminals have guns, the public also must be given them to counter balance the situation. There are people who have the license to use guns. But still there are incidents like bank robbery and house breaking. If the license to use guns would well tackle the situation there would have been much decline in bank robbery, house breaking and so on. But unfortunately that does not happen. Recently, in Florida the auto dealership Nation’s Truck offered an imprudent promise of giving an AK-47 rifle for those who buy a truck. The idiotic offer of the company must be condemned on the ground that it is easy such a mass destructive weapons to reach the hands of the terrorists. This would add an extra asset to the stock piling of the evil doers as increase in the number of weapons also increase violence and the killing of innocent people. This shows the narrow concept of the companies to increase their profit without giving any consideration to social responsibility. Only licensed companies and government must be given the privilege to deal in arms and ammunition. Further, licenses given in case of inevitable circumstances must be limited to handguns and not to mass destructive weapons. In brief, I affirm that guns or any weapons are the means of destruction and killing, not of construction and creation. They are even

Sunday, November 17, 2019

Effective communication within my time at BP Essay Example for Free

Effective communication within my time at BP Essay While on my internship I wanted to show effective communication. This involved me communicating with my team, working well within my team and giving many presentations to them. At the end of my internship I got feedback from my manager who explained how I was able to show effective communication within my time at BP. Goal To improve my communication. 1. Introduce and talk to people who I don’t know. 2. Share ideas with colleagues. 3. Ask for help when needed. Feedback Being able to communicate effectively was an important part of her’ role, as she was dealing with numerous personnel for whom English was not their first language. In her first week she was tasked with composing an email to send to all the regionally based team members. She proved straight away that her written communications skills were good, although she was naturally looking for reassurance of her emails were as required. By the end of the internship, both her written and verbal communication could only be described as â€Å"excellent†. Goal To improve my ability to ask questions 1. List down any questions that come to mind during work or home. 2. Do some research on the questions before hand and find an answer. 3. If I cannot find an answer I will ask a college or supervisor. Feedback When she did have any questions she was happy to ask, and did so in a polite and concise manner. If she needed help on tasks or wanted extra elaboration on certain topics she was able to do so. Goal To improve team working with new people 1. Introduce myself to the new people in my team. 2. Think of questions and ideas to contribute to the team. 3. Contribute my ideas to them and ask questions. 4. Use the information gained and adapt it to my work. Feedback She fitted into the team from day one, she is reliable, punctual and always polite and courteous. Her attitude to work was excellent, she was always willing to give something ago, with minimal instruction. Goal – To improve my presentation skills 1. Plan a presentation and practice it. 2. Ask for feedback from colleagues. 3. Take the feedback into consideration and improve the presentation. 4. Invite colleagues, managers to listen to the presentation. The first time I met her, she highlighted that she wanted to improve her presentation skills during her time with us. So, on her first day I asked her to help me present the safety moment in our team meeting; and she did a great job! Over the next few weeks she had other opportunities to both help compile presentation material, and also present to others on her own. By the end on the internship when it was time to present to a room full of peers, parents and work colleagues, she was a professional! In conclusion, it’s always very important to show effective communication skills in the workplace as they are vital for teamwork and overall success. These skills were skills that I wanted to improve greatly as I know they will be beneficial in the future. The majority of the feedback from my line manager was very positive and I will take into account the comments for improvement.

Thursday, November 14, 2019

America in the 50s and 70s Essay examples -- US History Politics

The American society in the 1950’s saw tremendous increases in population and affluence. This addition, termed the Baby Boom, expanded the middle class and introduced new ideas of prosperity to the United States. With new conventions, such as bank loans and credit lines, the spirit of American commercialism thrived. The following decade, however, brought about many changes in the nation’s social, political, economic and philosophical way of life. With the push for social programs and greater equality for the disenfranchised, the progressive movement in America thrived. Many groups of Americans were not pleased with the new progressive direction of the country, however. These groups began to seize upon the instances of social unrest and violent demonstrations to assert their reasoning for a pendulum shift back toward conservative ideals. Armed with a new radical approach, these conservatives committed themselves to reversing the tide of impending liberalism. Therefore, during the 1970’s many Americans spoke out against the social movements of the 1960’s and radically advocated for a return to the conservative values of the 1950’s. Social morals of the 1950s leaned towards the conservative end of the spectrum. Women had their place in the home, minorities were economically and socially segregated from the ruling class, and homosexuals were rarely mentioned in society. The extreme liberal and progressive advance of the 1960’s, however, radically changed these American fundamentals and drastically altered the direction of the country. To counter the wave of the â€Å"New Left† movement, many segments of the American citizenry pushed to restore the nation to a more â€Å"traditional† state. Conservative women were one such segment... ...wed to dictate our lives. These conservative figures advocated a return to the traditions of the 1950s, and in so doing, ushered in a new age of conservatism in America. This new movement reverberated throughout 1970s and would come into full bloom in the following decades. Works Cited Agnew, Spiro T. "Speech at a Pennsylvania Republican Dinner." The Dangers of Constant Carnival. Harrisburg, October 30, 1969. Goldwater, Barry. The Conscience of a Conservative. 1960. Nixon, Richard. "Acceptance Speech, Delivered before the Republican National Convention." Miami, Florida, August 8, 1968. Schlafly, Phyllis. "Understanding the Difference." In The Power of the Positive Woman, by Phyllis Schlafly. 1977. Time. "Gay Rights Showdown in Miami." Time, June 13, 1977. Wallace, George. "Speech at Madison Square Garden." New York City, October 24, 1968.

Tuesday, November 12, 2019

Emile Durkheim’s Theory of Crime and Crime Causation Essay

Abstract The concept of â€Å"crime† has over the ages been subject to various definitions as the society tries to address it. Criminology is thus the study of crime and crime causation. It concerns itself with understanding the deep essence of crime as an act or omission, and all the reasons behind its occurrence. In this pursuit, criminology draws on various other fields such as sociology, biology, psychology, etc. This field of study is often argued to be a subdivision of sociology which the larger field since its main focus is grounded in social realities. Hence, during the twentieth century, the sociological approach to crime was the most influential, thus scholars such Emile DURKHEIM bought about considerable impact to the common perception of crime. He was a French sociologist who, viewing the whole society as a reality, perceived crime as a mere element of the society; a completely natural phenomenon and which serves certain significant functions. This work is therefore intended to, throughout a concise discussion, explicate and analyze the theory of crime and its causation as perceived by Emile Durkheim, mainly considering its natural and functional characteristics. †Emile DURKHEIM (1858-1971) viewed inequality as a natural and inevitable human condition that is not associated with social maladies such as crime unless there is also a breakdown of social norms or rules† Explain and Assess Durkheim’s theory on crime and crime causation. Introduction Criminology is understood to be the study of crime and crime causation as social phenomena; it thus concerns itself with the study of the causes of crime and the treatment of the offenders.1 In this pursuit, criminology, as a subdivision of sociology2, draws on many fields inter alia psychology, biology, anthropology, etc. In the twentieth century, the sociological approach to criminology became the most influential approach; this is basically the study of social behavior, systems, and structures. 3 Emile DURKHEIM, a French sociologist, is amongst the scholars who exerted great influence on criminology during that period. He, unlike other scholars, both in and outside the field of sociology, perceived criminal behaviors as normal part of all societies. No society, he argued, can ever have complete uniformity of moral consciousness4, and thus, there has always been some deviant characters from the commonly accepted moral values. This write-up is therefore intended to briefly explicate and analyze the theory on crime and its causation as observed by E. Durkheim. Scholars in almost all the fields (related to criminology in particular) before and after Durkheim have endeavored to find the cause for crimes. In this regard, they have attempted to find the causation of criminal behavior in different factors, including external factors such as in natural and supernatural forces,5 climate, economic conditions, density of population or  certain ecological areas.6 In contrast to all the above factors, Durkheim maintained that the only explanation in relation to crime causation is to be found in essentially looking into ‘the very nature of the society’.7 In this respect, he was convinced that the individual is rather ‘a product’ than an ‘author’ of the society; he is, otherwise, a small image of the world in which he lives, hence, the causation of his behaviors, be they criminal or not, could be found only by understanding the society in which he lives. For E. Durkheim, crime is therefore immanent in society an d results from social interaction. Simply put, criminality proceeds from nothing but the very nature of humanity itself and, far from being transcendent, it is immanent.8 In his writings, Durkheim emphasizes on the immanence of crime; its causation as solely based upon the material world. Rejecting all definitions of crimes, as per the commonsense of any society, as acts that are harmful to society, Durkheim observes that all crimes, as a common characteristic, consist in acts universally disapproved of by members of each society; they shock sentiments, which, for a given society, are found in all healthy consciences. 9 Put simply, a crime is a deviant behavior only because it goes against social norms. From this perspective, arguably, the French sociologist seems to In reference to the pre-classical school of criminology whereby crime causation was understood as based upon supernatural forces, i.e. forces beyond the natural or human capacities. Adopt the legal definition of crime, as any act that the law makes punishable.10 However, unlike the proponents of that legal definition, he hold the view that the said act punishable by the law serves a significant social function which is to support and reassure the same social norms or  laws of a society. From the above elements, one would deduce that according to this theory, a crime is, arguably, a paradoxical phenomenon. Durkheim, the theorist, suggests that a crime is normally caused by or results from social interactions, and it is not deviant per se unless so declared by the laws or social norms. This is arguably Durkheim’s eminence in the field of criminology which rests upon his broad approach to anti-social behavior.11 However, it will be worth remembering that Durkheim, after identifying the essence of crime and causation, he went further to attribute to this phenomenon a certain function. This is what makes him different from all the scholars in the field of criminology. He observed that, not only is crime something normal in societies, it also plays some significant function. The Normality and Functionality of Crime Unlike other social scientists before and after him, Durkheim maintains that criminality is Normal factor rather than a Pathological one.12 Especially in current societies, this might seem really strange. According to Durkheim, crime is normal because a society the society cannot get rid of it; it is utterly impossible for a society to exempt from criminality. He argues that it is a phenomenon, not due to any imperfection of human nature or society, but from the   normal course of affairs in that given society. Hence, it is the fundamental conditions of the social organization that logically imply it. Crime is hence all a part of the totality of a society. The criminal behavior is a behavior completely normal like any other and thus its complete eradication is quite impossible. Durkheim articulates; â€Å"A society exempt  from it (crime) would necessitate a standardization of the moral concepts of all individuals which is neither possible nor desirable.†14 From this contention, one would concur with Durkheim on the fact that a society cannot get ride with or completely eradicate criminality. The criminal justice system is well-set, not to completely eradicate criminality, but to try as much as they can to reduce its level. Furthermore, Durkheim was of the view that crime serves a non-negligible role within the society. The social function he attributes to crime is inextricably linked with the society’s legal system, in that it supports or reassures the social norms of the society by the fact that it is considered as going against the said norms.15 One of the main justifications for his belief is that the fact that crime is found in all society simply suggests that it must be performing some necessary functions; otherwise it would have degrading over the ages and by the end of the day, abolished in an advanced society. 16 One of the most effective and necessary functions, he argued, crime plays is ‘social change’.17 Crime could be considered as one of the effective sources of change in a society. This could be exemplified by, in line with his definition of crime, the events that happened in the United States with the Anti-miscegenation Laws that promoted racial segregation.18 These laws began being violated as the American society progressed, it reached a point where, in violation those laws (social norms), many people started having inter-racial relationships. To some extent, the violation of those social norms, which could be regarded as crime, brought about social change in the US. Durkheim further argues that without crime, there could be no evolution in law.19 For instance, every individual’s right to express himself should be guaranteed for any society to progress. Hence, the opportunity for a genius or an artist to carry out his work affords the criminal his originality at a lower level.20 Thus, there has to be a certain evolution of the laws in order to face such situation from time to time. He further drew some analogy to the trial of Socrates; â€Å"According to the Athenian Law, Socrates was a criminal, and his condemnation was more than just. However, his crime, namely, the independence of his thought, rendered a service both to his country and the humanity.†21 In terms of evolution of the laws, this trial that occurred in the ancient ages is significant. From the above contentions, one would thus say, that crime should no longer be conceived as an evil that cannot be repressed. It should be considered, instead, as a normal phenomenon which can be faced for purposes of reducing its rate in the society. Conclusion Crime, according to Durkheim, is a normal phenomenon in the society that at the same time serves certain social functions. This paper emphasized on the fact that, unlike other scholars in the field of criminology, Durkheim perceived crime in, arguably, a kind of paradoxical manner in the sense that he started by defining crime as being caused by social interactions. For him, it is an act caused by social interaction, which (act) is not a crime per se, but it one becomes after being so declared by the social norms. He however recognized the negative part of crime, anyway, by conceding that crime is an act that shocks sentiments, which, for a given society, are found in all healthy consciences. He finally suggests that, without condoning crime or presenting apology for it, crime must no longer be conceived as an evil that the society could be exempted from, but rather a reality that exists as part of the society to members of the society can react through punishment.22 Therefore, in stating that crime could be perceived as merely a normal and natural element, he conceived the whole society as reality which is meant to move and evolve. BIBLIOGRAPHY Black’s Law Dictionary; (8th Ed. 2004). West’s Encyclopedia of American Law, edition 2. S.v. â€Å"Criminology.† Retrieved July 27 2014 from http://legal-dictionary.thefreedictionary.com/Criminology Durkheim, E. The Rules of Sociological Method, Edited by G. E. Gatlin, 1938. http://kpulawandsociety.wordpress.com/2012/10/18/durkheim-crime-serves-asocial-function/; Retrieved on July 27, 2014. Hamlin, J. The Normality of Crime. Durkheim and Erikson, Department of Sociology and Anthropology. UMD (2009). Walter A. Lunden; Pioneers in Criminology XVI–Emile Durkheim (1858-1917); Journal of Criminal Law and Criminology. Vol. 49|Issue 1, Article II (1958). Prins, A., Criminalite et Repression, Bruxelles, 1886. http://www.s-cool.co.uk/a-level/sociology/introduction-to-deviance/reviseit/deviance-durkheims-contribution. Retrieved on July 27, 2014.