Featured Post

Compare shopping online with traditional shopping Essay

Contrast shopping on the web and conventional shopping - Essay Example s to more extensive scope of clients, accommodation and pace in th...

Saturday, October 5, 2019

Business functions Essay Example | Topics and Well Written Essays - 1500 words - 1

Business functions - Essay Example They become partners for running the business efficiently. For starting a partnership business all the partners needs to sign different legal agreements. By this the partners contributes money, divides profit and design different business operation or activities which will be under their control. Partnership business can be of medium size or big. The owners of this business are not personally liable for any business losses or credit. Private limited company or business is a voluntary organization. This type of business can have more than one owner but not more than fifty. This business has proper legal existences. For starting a private limited company the owners have to undergo through different legal formalities. The business has to be registered under company act. Shareholders of these companies are its owners. For performing its business activities private limited company has to follow different legal rules and regulation of the country where it is operating its business. The company whose shares are sold and purchased in stock market is known as public limited company. Any people can purchase and sell share of public limited company. This type of company strictly follows legal rules and regulations of business. The company needs to disclose its financial position to its investors for determining the value of its shares. Public limited company can or cannot be listed in stock exchange. Many people are the owners of this type of company. In unlimited liability business, the owner of company has unlimited liability of all debts and credits of business. Another name of unlimited liability company is private unlimited company. It is hybrid type of business which can be run with or without share capital. The shareholders of unlimited liability company have too many non limited obligations for meeting business requirements. The partners or shareholders of this company accept all these unlimited liabilities to avoid double taxation

Friday, October 4, 2019

Peer reviewded Essay Example | Topics and Well Written Essays - 1000 words

Peer reviewded - Essay Example The compromise may be in the form of disruption in the performance of duties or personal relationships, or at times may lead to the change of personality of a person. Compassion fatigue exhibits itself in a number of ways through evident signs and symptoms. The most visible sign that a person is suffering from compassion fatigue is the fact that the person is tense and preoccupied with the individual in need of care and his/her disease. Signs that a person is suffering from compassion fatigue may include avoiding or the numbing of the feelings of the caregiver or avoiding certain thoughts or situations of the patient. The caregiver may suffer lapses of memories and may also show a consistent character of being tired despite sleeping for adequate number of hours or, conversely, suffer from insomnia. The caregiver may also start to absent him/herself from work, and other signs may include emotional depletion due to too much caring for the sick and loss of interest in activities that we re enjoyed previously. The caregiver also loses self-esteem, is susceptible to anger, depression and irritability and may find it difficult to find happiness or hope. There is also evident decreased productivity at both the workplace and home. A caregiver should try to avoid the complications that may make him/her suffer from the effects of compassion fatigue. There are many ways of avoiding compassion fatigue, and these are majorly the individual becoming more withdrawn due to the problem or the caregiver choosing to leave the job altogether. The physical, emotional and spiritual needs of the caregiver should be met in order that the person does not suffer from the effects of compassion fatigue. Understanding one’s needs as a caregiver helps one to accept what is happening and may assist in avoiding compassion fatigue. Therefore, being in control of physical needs as a caregiver is important for better healthcare and wellbeing. The caregiver should look after his own health through better nutrition, regular exercise and enough sleep to keep compassion fatigue at bay. Taking care of his/her emotional needs like avoiding instances or events that may lead one to depression should be considered. This can be achieved through referring to previous instances in which the caregiver has endured and coped emotionally. Accepting how one feels and express the feelings, for example, one may reflect on her/his sadness and happiness while at the same time maintaining a sense of humor. Spiritual needs like one’s faith are important for the caregiver and through their consideration, one is able to avoid falling into the trap of compassion fatigue (Ekedahl and Wengstro?m, 2008). This can be relieved by understanding that death is inevitable and occurs at some point in the lifetime of a person. Spiritual needs can be provided by the family, faith or the nature, and the caregiver must be in a position to comprehend the possibility of losing the patient they are tak ing care of. Strategies for Coping with Compassion Fatigue Taking care of oneself as a caregiver increases his/her ability to provide for the person in need of the palliative care. This is because one will be able to handle the increased physical and emotional pressures that the work of care

Thursday, October 3, 2019

The Little Mermaid Essay Example for Free

The Little Mermaid Essay The first reason that I like this story is it is different from many other stories that always provide happy ending. Children are impossible to be innocent; we need to know we will face some difficulties in our daily life. If life looks so perfect, that is not life. And we usually can learn more by sad stories, because sadness or tragedy can uplift people’s greatness. After I read this story, I started to discover people live around me, and there are surely someone cries in the invisible corner. It seems that many adults think a child should not see too much sadness in their childhood, they think child’s life should be filled by happiness, however, no matter in which ages, people do have some upset feelings sometimes, so I think there is not a big problem to give kids read sad tales. To realize more, we can have a good start to grow up, because we have already prepared our mental statement. The second reason that I like this story is this fairy tale concludes a concept about gain and giving up. We are making choice in every moment when we are live in earth, we choose to give up something and to gain something, and the purpose is we try to make our gain more than our lost. In this story, the little mermaid uses her sweet voice to change a magic medicine that can give her human’s legs back from the evil witch. Although she thinks she can catch the prince’s heart, she is wrong and only has a chance to live a short happy time with prince for memory. In our student’s life, we also sacrifice our free time to do some we need to complete first. There is a proverb said that â€Å"One cannot make an omelet without breaking eggs. † There is no possibility that will be a present coming to you for no reason from God; we have to make decisions by ourselves, learn to make better decisions, and give ourselves present by our own. Many fairy tales are talking about the prince saves the princess, but â€Å"The Little Mermaid† is not. The little mermaid saves the prince from getting drown, and she choose to lose her life without killing the prince. We can find out that women are also strong as men, not to her powerful strength, but to her firm mind. When people face difficulties, they usually feel scared, and want to escape for sacrificing. But many examples that show women’s determination, such as some women choose to give up her life to born her baby. So we can realize that women will behave strong, when they have to protect their beloved as men. This kind of concept can give us courage and confidence to do things that we think we cannot do at first, although it is just a story, it encourages kids much. Some adults are worried that give children to read sad fairy tales will make kids feel unhappy, but I think this problem is not so serious. By reading those sad stories, we can have more impressive feeling, and start to think what reasons cause these sad endings. I like â€Å"The Little Mermaid†, it let me learn lessons, such as realizing the life is not perfect, making better choices and believing myself to accomplish my own goals. Maybe we cannot fulfill every wish in our short life, but we have tried to live a better life, like a pretty bubble exists. To this aspect, we will not have regrets.

The importance of enterprise wide computing

The importance of enterprise wide computing â€Å"The Importance of Enterprise-wide Computing And The Difficulties of Information Sharing Within The Growth of Personal Computers and Database in Current Environment† Introduction Current breakthroughs in information technology have enabled the worldwide usage of distributed computing systems, leading to decentralize management of information. This has been supported by and has become inflamed great competition in business through faster and more precise data storage and retrieval and information processing. A number of organizations have accomplished high efficiency, comprising ease of use and lesser costs in operations by adopting a client/server computing structure. Furthermore, system integration and interoperability issues are being intensified as institutions and organizations are moving from mainframe based processes towards an open, distributed computing environment, and this situation is pressing corporations into an accelerated construction of extensive distributed systems for operational use. Technological transformations are at this point is happening and accelerating very fast that it may increase the computational power just same as the creation of desktop and personal computers did. Soon a lot of demanding computer applications will no longer be executed mainly on supercomputers and singular workstations relying on local data sources. Alternatively enterprise-wide systems, and eventually nationwide systems, will be used that include of workstations, vector supercomputers, and parallel supercomputers linked by a local and wide-area network. With this technology, users will be displayed with the illusion of a singular and highly powerful computer, rather than a collection of moderate machines. The system will program the application components on processors, administer data transfer, and moreover, it provides communication and synchronization to dramatically enhance application performance. Furthermore, barriers between computers will be concealed, similarly accompanied by the location of data as well as the drawback of processors. To demonstrate the theory of an enterprise-wide system, first think about the workstation or p ersonal computer on a table. It can run the applications by a ratio that is generally a function of its expense, manipulate local data kept on a local disk, and perform printouts on local printers. Sharing of resources among another user is minimal and also hard. If the workstation is joined to a local area network, not only the resources of the workstation are available, but so with the network file and printers is actuality made available to be used and shared. This enables expensive equipment such as hard disks and printers to be shared, and permits data to be shared between users on the Local area network. With these types of system structure, processing resources can be divided and shared in a method by remote login to another machine. To understand an enterprise-wide system, a lot of systems in under a bigger organization, such as a company, or academic institutions are connected, so it will become additionally powerful resources such as parallel machines and vector supercompu ters. Still, connection solely does not construct an enterprise-wide system. To transform a collection of devices with machines into an enterprise-wide system it requires software that can perform sharing resources such as processor cycles and databases similarly as easy as sharing files and printers on a Local area network. Background Of Enterprise-Wide Computing The enterprise-wide computing environment is a distinct environment as of conventional host-centric information technology environments that support traditional types of information systems. In a host centric computer surrounding and environment, for an example a mainframe, each information system and application deals with its corresponding technical responsibilities independent of the other groups. The groups productions are worked together. However, there is an intense level of independence as well as separation among the groups. In the host centric environment, the operating system along with application software work by process system resource applications between the software layers in a hierarchical method. This allows the applications group to construct programs and transport the source program to the production environment for collection, while not corrupting different application software products. In the situation of an interruption, the program is backed out of the produc tion surroundings and the clients carry on their regular roles using an earlier version of the program. Application computer programmers exist in a somewhat isolated world and system management is not an interest. This is a usual support approach to an organization which used these traditional system and software approach. Host centric computing environments developed for the time when hierarchical organizations were the pattern. As an outcome the information technology fields of this period were hierarchically structured. Furthermore, at that time information technology was designed and deployed to support hierarchical organization structures. Meanwhile, in the enterprise-wide computing environment, enterprise-wide client/server information systems were developed to fit various different organizational structures for example, flat and matrix, differ from the traditional where it only fixed with the hierarchical organization structure. Client/server application provides the versatility and diversity required to support these various organizational structures. Client/server technologies allow software systems to converse with each other through a network. The systems connect clients and servers through a network that supports distributed computing, diagnosis, and presentation, given a common approach for distributing computer authorization within organizations. A client is a program that attaches to a system to request resources, and a server is a program that runs on a device listening on a designated part of the network wait for different programs to connect to it. Client/server information systems can operate separately i n standalone networks or moreover, regularly as the portion of an enterprise-wide network. In this scenario, a client/server computing structure provides for the network connection of any computer or server to any other computer, allowing desktops to connect to a network and access various servers or other system resources easily. In comparison, host-centric traditional information systems run in a standalone environment. Client/server technology divided the information system in three layers. The first layer, the presentation layer, is the portion of the information systems that the customer views. For example, a web site downloaded from www.dell.com present text, pictures, video, etc. By this level, the customer inserts buying information to the dell server. The second layer is the operation layer where the algorithms execute and also the general data manipulation takes place. At dell server, the customers data is processed. For example, credit card confirmation and a total are de cided derived from the number of items bought. In the third layer, the data layer, information is kept and fetched from the dell databases. The three layers exist in host-centric traditional information, however, execute on a particular computer. The Importance Of Enterprise-Wide Computing The arrangement of business strategies for an organizations information technology is a repetitive subject in an information system scope, and has appeared obviously in the latest surveys of critical concerns for information system management. Present day corporate downsizing patterns have had the effect of flattening organization structures. A conversion of information systems has gone along with this organizational flattening. Various different architectures have advanced during the transition from the monolithic centralized systems of the previous to the decentralized, distributed, client/server, and network-based computing architectures of the present day. In spite of their diversities, many of these architectures share an important attribute allocation of processing jobs or data through various computing platforms. In simple occasions this might require saving data or applications on a local area network server and retrieving it using a personal computer. In further complicated situations, is when encountering partitioning of databases and application programs, data migration, multiphase database updates, and many more. The common thread in these scenarios is the use of enterprise-wide computing to accomplish a single task. The speedy enterprise-wide computing growth during the 1990s has transformed the information system roles and its management in many institutions as well as organizations. The attributes of this transformation frequently comprise a downsizing of systems apart from mainframe environments to smaller platforms, paired with network-based accesses to information management. In different situations, it has been an increase in the dimension and sophistication of end-user developed systems, or the up scaling of departmental or local area network based computing, alongside local area network have become the repositories for mission-critical corporate information. Computing difficulties that once were allocated to mainframe computers are now regu larly allocated to desktop computing platforms. Cost performance ratios keep on improving dramatically over reasonably short periods of time. The arrival of the Internet and the Web offer exceptional chances as well as demanding management problems. In the middle of an expanding set of technology alternatives, information system managers must however encounter basic inquiries with regard to the character of underlying technology infrastructures and the application of rapidly changing technologies to business decision making. The term â€Å"enterprise-wide computing architecture† is being used to define the set of computing platforms in addition to the data networking facilities to support an organizations information needs. Once upon a time fairly well-balanced in nature, architectures are at this point is a subject to frequent alteration as organizations attempt to achieve the best fit technology to their organizations. Given the expanding set of technological alternatives, this has got turn out to be no longer an easy task to achieve. It has become an important concern for information system managers since dependence on information technology increases. Regardless of this issue, efficient strategies for specifying an enterprise-wide computing architecture are however lacking. Architectures are the appearance of an organizations overall information system approach. Technological integration is growing viewed as a way to support the overall strategic goals of a business. Appropriate architectures of enterprise-wide computing enable organizations to meet current information needs, and to successfully adopt brand new information processing paradigms in a cost-effective method. The advantages of coordinated architectures comprise: minimization of unacceptable redundancy of system components, appropriate measurement of information processing roles to platforms, significant allocation of computing resources to organization locations, as well as the capabilit y to share information resources among organizational bodies at a manageable expense. The idea behind the enterprise-wide computing includes the capability to centrally control and moreover manage numerous software distributions across a huge number of clients workstations. Administering over one hundred applications across more than one thousand desktops in the enterprise-wide environment can turn out to be an ominous assignment and a nightmare. But, finding and making use of the proper tools for this task can be the single most important goal to be obtained. While IT organizations resume to grow, so does the need for simplified management tools that can contribute to greater functionality. When the total of workstations and software applications taken care of in the desktop environments carry on to grow from day to day, the organization must sequentially analyze the tools with which these environments are administered. Issues and difficulties of information sharing for databases in context of enterprise-wide computing The swift advancements in hardware, software, and networks technology have caused the management of enterprise wide computing network systems has become gradually a more challenging job. Due to the tight connecting among hardware, software, and data of computer peripherals, each hundreds or thousands of personal computers that are linked and connected in an enterprise level environment has got to be administered efficiently. The range and character of nowadays computing environments are incrementally changing from traditional, one-on-one client/server fundamental interaction to the brand new cooperative paradigm. It subsequently turns out to be of primary importance to provide the method of protecting the secrecy of the data and information, while promising its accessibility and availability to authorized clients. Executing on-line querying services securely on open networks is remarkably difficult. For that reason, a lot of enterprises outsource their data center operations to other application service providers. A promising management towards prevention of unauthorized access to outsourced information and data is being applied by encryption. In the majority organizations, databases contain a critical assembly of sensitive information and data. Protecting with a suitable level of protection to database content is hence, a necessary section of any comprehensive security program. Database encryption is a proven technique that establishes an additional layer to traditional network and application-level security solutions, hindering exposure of sensitive data and information, even if the database server is compromised. Database encryption avoids unauthorized users, including intruders breaking inside an organization network, from obtaining and seeing the sensitive information and data in the databases. Likewise, it permits database administrators to carry out their jobs without enabling them to access sensitive information and data in plaintext. Whats more, encryption protects data integrity; like probably data tampering can be identified as well as data correctness can be restored. While frequently research has been done on the interchangeable impact of data and transmission security on organizational comprehensive security strategy, the impact of service outsourcing on data security has been fewer investigated. Traditional approaches to database encryption ha ve the unique objective of protecting the data in the repository and also assume trust in the server, which decrypts data for query execution. This hypothesis is slighter justified in the modern cooperative paradigm, where various Web services cooperate and trade information in order to approach a variety of applications. Efficient cooperation among Web services along with data owners often needed critical information to be prepared continuously available for on-line querying by another services or end users. For example, telemedicine programs involve network transferring of medical data, location established services need availability of users cartographical coordinations, whereas electronic business decision support systems regularly have to to access sensitive information such as credit statuses. Clients, partners, regulatory agencies and even suppliers nowadays usually need access to information initially intended to be kept deep within organizations information systems. executing on-line querying services securely on exposed networks is excessively difficult; for this rationality, many organizations choose to outsource their data center exercises to external application source providers rather than permitting direct access to their databases from potentially ill-disposed networks like the Internet. Additionally, outsourcing relational databases to external providers promises higher accessibility and availability with more effective disaster protection than in-house developments. For example, remote storage technologies, storage area networks are being used to place sensitive and even important organization information at a providers site, on systems whose architecture is particularly designed for database publishing and access is managed by the provider itself. As an outcom e of this trend toward outsourcing, extremely sensitive data are now kept on systems operates in locations that are not under the data owners control, such as chartered space and untrusted partners locations. Consequently, data confidentiality and even integrity can be set at risk by outsourcing data storage and its management. Adoption of security best practices in outsourced spots, such as the utilitization of firewalls and intrusion detection devices, is not under the data owners jurisdiction. In inclusion, data owners may not completely trust provider discretion; in the contrast, preventing a provider from looking over the data stored on its own devise and machines are extremely hard. For this nature of services to run successfully it is therefore, of its main importance to provide the way of protecting the confidentiality of the information remotely kept, while assuring its acceccibility and availability to authorized clients. The demand that the database component remains confidential to the database server itself introduces a couple of new fascinating challenges. Traditional encrypted DBMSs assume trust in the DBMS itself, which can subsequently decrypt data for query execution. In an outsourced environment outline, such hypothesis is not applicable anymore as the party to which the service is actuality outsourced cannot be granted full access to the plaintext data. Since confidentiality claims that data decryption must be possible solely by the client site, methods that can be used to countermeasure these inconveniences are needed for allowing untrusted servers to execute queries on encrypted data. Bibliography APA style refer to book Cases on Database Technologies and Applications for sample or articles on APA citation.

Wednesday, October 2, 2019

The Theme of Girl Power in Joy Luck Club and Taste of Honey :: Joy Luck Club Taste of Honey Amy Tan Essays

The Theme of Girl Power in Joy Luck Club and Taste of Honey Joy Luck Club and Taste of Honey Women’s rights is an issue of serious interest in much of today’s literature. As more women take the pen in hand more and more female characters take center stage in the stories they write. The newest term for this focus on the powerful heroine is called â€Å"Girl Power† and this strength of persona can be seen in two pieces of literature in particular. The Joy Luck Club, by Amy Tan, and A Taste of Honey, by Shelagh Delaney. In the Joy Luck Club Amy Tan write about the lives of four mother’s from China who pass their lives’ wisdom down to their daughters who are growing up on the foreign shores of California, USA. Each of these women have a story to tell about growing up in the patriarchal society of china, how they overcame the stifling environment they grew up in and how they survived and escaped to the â€Å"new world† as it were. The story of An Mei, Waverly Jong’s mother, is an excellent example of how women can take control of the situations that are forced upon them and make their lives better. In the novel An Mei is sold into a marriage at the age of four. At fifteen, on her wedding day she discovers she has been married to 13 year old boy, who no more wants to be a husband than he does a father. An Mei is forced to sleep on the floor and treated to the derisive comments and punishments of her mother in law when she fails to produce a child. However, over hearing a house servant who found herself pregnant, she devises a plan to escape her ill-fated life and out-trick her lying child-groom. She uses the superstitions of the traditional Chinese and her clever wit to win a ticket out of the loveless marriage and back to Shanghai with her family. This tale, re-told by An Mei, shows how woman, even in dire situations, can take charge of their lives and make the most of what they have. Rose Hsu Jordan is another one of Tan’s Characters that really takes charge of her life just when it seems she would be swallowed whole by a man’s world. In this present day tale, a young woman find herself married to man whose opinions she has grown to value above her own. She has forgotten how to value herself and fallen prey to the pitfall of pleasing her husband before taking care of her own needs.

Tuesday, October 1, 2019

Michael Ondaatjes The Collected Works of Billy the Kid Essay -- Colle

The Perception of Violence in Michael Ondaatje's The Collected Works of Billy the Kid A question that arises in almost any medium of art, be it music, film or literature, is whether or not the depiction of violence is merely gratuitous or whether it is a legitimate artistic expression. There can be no doubt that Michael Ondaatje's long poem The Collected Works of Billy the Kid is a violent work, but certain factors should be kept in mind before passing it off as an attempt to shock and titillate; certainly, the poem does both of these, but they are not the primary purpose of the work. For one thing, social context needs to be considered; Billy lived in the "Wild West", a time associated with range wars, shoot-outs and great train robberies. The entire legend of Billy the Kid has been built around his criminal activities and notorious reputation; indeed, the more popular this myth becomes, the more people he is accused of having murdered. If anything, it was a cultural fascination with violence that "created" the legend, perhaps even more so than anything the "real" Bi lly ever did. Michael Ondaatje comments on this phenomenon and actually offers an alternative vision of who Billy the Kid was; perhaps he was not just a blood-thirsty killer but a man who, due to circumstance and human nature, was continually being pushed over the edge. Ondaatje is more concerned with the motivations behind the acts of violence than the acts of violence themselves: "A motive? some reasoning we can give to explain all this violence. Was there a source for all this? yup -" (54). If they shock, it is to shock the readers out of complicity and encourage them to think about the nature of violence and their own capacity for it. Though it is more ... ...nstitutes a "fit" subject for poetry. If love is deemed suitable, should the expression of violence be any less so? Both are part of the human experience; indeed, it is hard to imagine one existing without the other. As Billy says, "I am here with the range for everything" (72), a range which includes "hands that need the rub of metal/ those senses that/ that want to crash things with an axe" (72). Michael Ondaatje gives us this range and then leaves it up to us to define our own "edge"; what are we capable of?.... What is our potential? Works Cited and Consulted Mundwiler, Leslie. Michael Ondaatje: Word, Image, Imagination. Vancouver: Talonbooks, 1984. Ondaatje, Michael. The Collected Works of Billy the Kid. Toronto: Anansi, 1970. Solecki, Sam. "Introduction." Spider Blues: Essays on Michael Ondaatje. Ed. Sam Solecki. Montrà ©al: Và ©hicule, 1985. 7-11.

Discuss the value requirements" needed to gain the Diploma of Social Work

In my essay I will discuss the â€Å"value requirements† needed to gain the Diploma of Social Work and give 6 examples from my own work experience that I think are relevant from a legal perspective. Within the essay I shall begin by defining the term ‘values'. Values are based on the belief that something is good and desirable, the acceptable standard of a person, group or society within. It defines what is important, worthwhile and worth striving for. Values are very much influenced by the views that people have about how society should be organised and how social relationships should be regulated. Values are distinguished from knowledge. Traditionally Social Work values for examples are user or client self-determination, acceptance, non-judgemental attitudes and confidentiality these can also be a guide of conduct and actions of social workers. Ref. : Dictionary of Social Work I'm working in a direct access hostel that accommodates homeless men. These men are suffering from either alcohol or drug addiction and also from mental health problems. One of my values is not to drink alcohol or at least only in a considered amount. Also using drugs is something, which I for myself consider is against my value-belief. The implication towards one part of my client group, those men who are dependent on alcohol, could be that I preach them you should not drink so much and to do this and that . I could treat them in a disadvantage way because I disagree with their lifestyle. Putting them down and may make them feel there are â€Å"low† or even worse, not worth my time. They might be all alcoholics, drug-addicts etc. but I still have to treat everyone as an individual and according to his or her needs. They may have all different reasons while they depend on alcohol and drugs (i. e. loss of partner, marriage breakdown, repossession of house or flat, bankruptcy). I look at one persons life and look what happen in their life, the problems they had and if there are pattern and solutions to help that particular person to do one thing or another. I can put my own life experience into account if it is relevant and may help. Each individual is also unique in their way. Every human being is different like a fingerprint is, so is every ones values and diversity's (i. . sexual orientation, religion, culture, nationality, skin colour, class and age). Every one likes to be respected but this in turn should be a value for each one to respect anyone else. To recognise all the differences in each individual in each different case and use these differences and to help to help themselves and that promotes the people's right to choose. People who are dependent on alcohol and drugs can not be treated all in the same way. They are all individuals and unique and got to be treated as such. I have to use their backgrounds or beliefs and can not apply the same remedy for everybody to cure them. In the hostel we also have Muslim residents, who do not eat pork because of their religious beliefs. We have to advise the canteen staff accordingly to this to prepare different meals for them that do not came in conflict with their religion. Also to share a room with somebody who keeps an animal is out of question for a Muslim, because in their religion it is seen as â€Å"dirty†, not clean. So I have to make sure to put him with somebody else or in a single room to respect and value his needs. A client or resident comes to have a word with me in private. But he wants that what is said in private does not to go any further than between the two of us. I have to tell him that in my position I can not guarantee this. Than I have to take what he says to me on board and consider if this kind of information can really be kept away form other members of staff. In my working environment I have the duty to share â€Å"information† with my other colleges, team-leader, counsellor and management. If for example he tells me that while he is drinking heavily he also becomes aggressive and might sometimes â€Å"blow his fuse† if anybody annoys him, but does not anybody to know because people may start to treat him differently. This is a matter where I have to pass this information on. Even if he has a right to privacy but in these kind of circumstances the staff and other residents are put in danger. Information has to be revealed to staff only and some sort of precocious measures have to be taken. But if there is only minor disclosures than it will be kept confidential. If one of the residents has HIV/Aids this is a matter of strict confidentiality and will not disclosed to anyone else within or outside the organisation, or recorded in the resident's file, without the person's permission. The only exception in that case is if life-threatening injury or illness occurs. Disclosure to medical personnel is essential to treatment. Also if major blood loss takes place and there is a risk of transmission to other residents or staff. The way we assist people to improve there lives simply starts with befriending, providing material and recreational resources. Also activities like scrabble, pool, table-tennis, chess groups, darts and competitions, video and bingo nights, photography, football, craft. Registering with GP's and also at occasions go for day trips to the seaside and visiting theatres. Organising IT courses and helping with finding a job and resettlement. Health care and counselling is also provided. I speak to residents about any kind of problems or help they may want and advise them about referrals to other hostels, benefits and personnel matters. I come a lot of times in contact with people addicted to drugs and assist them in the counselling process to try to get them of drugs By trying them to get off drugs it helps them to take control of their life and their life takes a different direction. I have to speak to a resident on a one to one basis that if he is taking drugs on the premises he will lose his right to stay at the hostel and as a consequence be evicted. This will hopefully protect himself from using drugs and also protect other drug dependent residents who want to become clean with their addiction, to falling back into old habits. We also help in a way that we give medical advice and medicaments to residents in collusion with medical staff. One incident happen not a long time ago where a white resident went into the lift and just as the lift doors were closing another four black residents jumped in. He then got out of the lift and soon as the lift went up he complained to me that he could not go with â€Å"these† residents in the same lift. I asked why, and he responded â€Å"you know what these black are alike†. I said no and asked him the same question but he refused to explain to me â€Å"why†. It was in my view a certain racist behaviour. But he was not racist verbally (he has not spoken out what he really meant by this), so there was nothing I could do except speak to him and let him know that the black residents may see this as racist act and it might be hurting them. Another incident involved myself with one of the residents making Nazi-salutes at one day and on the next giving head butting signs. At this occasion an incident report was made and the resident being giving immediately notice to leave within 24 hours. When I encounter any racism, discrimination or disadvantage I pull the resident by side or take him to the interview room and have a word with him. Depending how severe the incident was I have to write an incident report and this goes than to the team-leader or manager who than decides what action are be taken. Our hostel policy states no person will be treated less favourably than any other person because of their race, colour, ethnic or national origin, appearance, gender, sexuality, marital status, physical disability, health status, age, religious, spiritual or political beliefs or offending history (Ref. Bridge Housing Association, Equal Opportunities Policy). A lot of people say HIV/Aids is a homosexual disease. If I have a homosexual resident at the hostel and can not stigmatise them by saying all homosexuals must have aids and treat him in a totally different manner then anyone else. Also a lot of people assume that alcoholics talk a lot of rubbish, is not very coherent, falls all over the place and looks shabby. If I deal now with an alcoholic who have these appearance I could automatically assume there is no point for me really to try to deal with this person because he do not know what I'm talking about anyway. The drink has got to him and because of the problems I may associate with alcoholism I could treat them all in the same way. With this attitude and thinking he is not worth my time because he would not remember anyway what I'm talking about I would just do enough (paperwork) without giving him the help he might really need. When a resident is totally drunk I give a cup of coffee or support him to his bedroom where he can sleep for a while to get sober. When he is in a state where I can talk to him I will do so he in private with no other residents present. Just because the person does have an alcohol dependency I do not treat him as that. I treat him as a normal individual and treat him in a way that if I would be an alcoholic, the way I would like to be treated. To have values is a good thing because at enables you to set goals for yourself and to achieve objectives. But there is also a down side where other people values can come into conflict with my own.