Modern Computer Architecture – Memory and I/O Systems

Modern Computer Architecture – Memory and I/O Systems

Modern Computer Architecture – Memory and I/O Systems

See attached document and rewrite the whole document.

APA Format and add aditional information based in the attached document. The full attached document must be rewrite and different.

Must maintain the same number of words or add more, but not less.Must elaborate on the topics within the paper.

Introduction
In this assignment, IP, we will execute the implementation of Direct Memory Access (DMA) module. Direct Memory Access allows the peripheral devices to move information from or to memory without having the processor handling each byte. Thus, DMA enables more efficient use of interrupts, increases data throughput, and potentially reduces hardware costs by eliminating the need for peripheral-specific FIFO buffers. This makes DMA an important module for any System-on-a-Chip as it can increase performance by a large factor. In this project, we will implement a DMA controller and interface it with the ARM processor. We will then evaluate the gain in performance of our complete SOC system with the DMA. We will do this by running a very data intensive test program which has a high frequency of memory accesses.
GENERAL DESCRIPTION OF A DMA
Direct Memory Access (DMA) is a well know technique, whereby an I/O device gets
access to memory directly without having the microprocessor in between. By this direct
path, a word input through a device, can be stored in memory, or a word from memory
can be output through a device, on the device’s request. It is possible for a word in
memory to be moved to another place in memory using direct memory access.
DMA is one of the fastest ways to input data to a buffer. This technique requires
considerably more hardware and is considerably faster than if it were done through
software. A DMA channel is the additional logic needed to move data to or from an I/O
device.
FUNCTIONAL SPECIFICATIONS
The following is a description of how our DMA controller works [2]:
1) The CPU initiates the transfer by supplying the following data to the DMA controller: the memory address of the source and destination of the data to be transferred, and the number of bytes to transfer. The CPU does so by writing this data to the DMA internal registers (shown later).
2) The DMA controller starts the operation on the device and requests the bus. Once the bus is granted to DMA, it then waits on the Source Device to provide data. When the data is available, it transfers the data to the destination. The DMA controller supplies the memory address for reads and writes. If the request requires more than one transfer on the bus, the DMA unit generates the next memory address and initiates the next transfer.
3) Once the transfer is complete, the DMA controller interrupts the processor and notifies it if there were any failures during the transfer. Note that the processor has to wait for the DMA to finish the transfer before it can supply it with the next transfer. Therefore, the processor has to keep track of transfer requests and transfer acknowledgments. This is accomplished using a dedicated control port connecting the DMA to the AMBA Bus and thus to the processor.
IMPLEMENTATION
Hardware
In this project, we used the tools we learned in this class to complete this project. First, we
used The Platform Creator from Coware to draw a system level diagram (Figure 2). We
developed the following two hardware modules in SystemC.
1. A DMA controller (block level diagram shown later as Figure 3)
2. A disk

ARM Core Software
Another important task in this project was to develop a program that can be used as a test
program. We wanted this program to be a realistic application of the DMA. We provide a
description of this program in the next section.
Interface
We used the AMBA API to interface the modules with the existing system. There were
two master ports and one slave port that we added to the AMBA bus as a part of the
DMA controller. Similarly, a Slave port was also added to the AMBA bus for the disk.
The interfacing was done using memory-mapped I/O. The following table shows the
memory map table of the system. The DMA port shown here is a slave that is used by the
processor as the control port to program the DMA controller for transfers.

Another important portion of the interfacing involved the arbitration of the bus between
the 4 AHB initiators. (two from processor and two from the DMA). We used a fixed
priority arbiter from the AMBA library to handle this issue. The fixed priorities were
assigned by us as the program specifications. The following table shows the priorities
assigned to each AMBA initiator in the system.

PERFORMANCE EVALUATION
To evaluate the performance gains of the DMA module we developed a data intensive
test program with a high frequency of memory accesses. The test program is basically a
small Kernel that computes the dot product of two vectors A and B. Both vectors are
stored in the disk and the processor first has to retrieve them and put hem into the RAM
before it can start performing the computation. Since both vectors are very large, the
processor brings them into the RAM one part at a time. Each part is referred to as a page.
This is basically to mimic the working of a complete operating system with the Virtual
memory translation enabled. The pages are brought into the RAM on-demand. This
demand driven process allows the processor to work in the foreground while the DMA
can transfer the page in the background.
We first run this program without the DMA and count the total number of cycles the
program takes to execute. We then repeat the experiment with the DMA. In this version
the processor instructs the DMA to load the subsequent pages of the vectors while it
works on the current page. The processor keeps track of which pages have been moved
into memory using a score boarding technique to ensure that it only computes valid data.
That is, it makes sure the page has been transferred before it tries to use its’ values. Each
time the DMA interrupts the processor signaling that a transfer has been complete; the
processor requests it to fetch the following page. This way the processor works on the
data that has already been transferred into the memory while the DMA fetches the rest of
the data.
We performed this experiment several times while varying the disk latency. We wanted
to see how the disk latency affects the performance boost of the DMA. Finally, we
measured the number of cycles the processor sits in an idle state waiting for the data. This
analysis was done for a latency of zero cycles.
CONCLUSION
In conclusion, we successfully implemented a DMA module in SystemC. We successfully
demonstrated the gains in both processor utilization and total number cycles with the use
of a DMA controller. It is important to note that these gains can only be realized if the
application is data intensive and has very high frequency of memory accesses. An
important result that we found was that the DMA’s effectiveness diminishes as the Disk
Latency increases.
REFERANCES
http://www.embedded.com/showarticle.jhtml?articleid=15300200, April 2005.
John L. Hennessy and David A. Patterson. Computer organization and design (2nd ed.): the
hardware/software interface. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 1998.
G. Jack Lipovski, Embedded Microcontroller Interfacing for M. CORE Systems. Academic Press, 2000
AMBA Bus manual provided at coware1.ece.utexas.edu:/usr/local/packages/coware/convergencesc/documentation/AMBA_BL
ARM926EJS manual provided with the coware documentation at: coware1.ece.utexas.edu:/usr/local/packages/coware/convergencesc/documentation/ARM926EJS_AHB_PSP.pdf
ARM DMA specifications provided in the ARM Coware library documentation

Retirement Plan Selection

Retirement Plan Selection

Retirement Plan Selection
A new employee joins your company at age 24 making $40,000 per year. Currently, banks are paying 5% interest on saving accounts, and the rate of return on the company stock is 4% per year. During benefits enrollment, the employee stated that she would like to retire at age 60 with 3 million dollars in her retirement account.
Compare the following retirement options for this particular employee in 1,050 to 1,400 words:
403B
401K
Pension
Annuities
IRA
Estate planning
Determine which retirement option(s) you would choose if you were this employee.
Assess the factors that this employee should consider when selecting a retirement plan.
Format your paper consistent with APA guidelines.

how the ways that we communicate through social media, texting, blogging (both locally and globally) influence the ways that we perceive the world.

how the ways that we communicate through social media, texting, blogging (both locally and globally) influence the ways that we perceive the world.

Sociology
“The message of any medium or technology is the change of scale or pace or pattern that it introduces into human affairs. The railway did not introduce movement or transpotatio or wheel or road into human society, but it accelerated and enlarged the scale of previous han functions, creating totally new kinds of cities and new kinds of work and leisure.” (McLuhan, 1964, p. 8)

McLuhan’s insight suggests that we need to look beyond the simple message to the social influence of the medium. As your textbook states, “…the manner in which people communicate shapes not only the society in which they live but how they interact within it (p. 461). Discuss how the ways that we communicate through social media, texting, blogging (both locally and globally) influence the ways that we perceive the world. Find a video (some interesting ones on TED.com) or a news article that provides support for your discussion.

Your submission should be approximately 500 words and include sociological concepts from your text as well as some of your own ideas as well as information from your selected video or article. (please include the link to your article or video.)

marketing plan of colgate

marketing plan of colgate

marketing plan of colgate

MARKETING PLAN PART 1: Industry Analysis Paper
The first segment will include the industry analysis and historical perspective of the company you are assigned. This section will include the external environmental (uncontrollable factors) of consumer & social factors, economic factors, technological factors, competitive factors, legal and regulatory factors.
The outline below is the table of contents (and point rubric) for your industry analysis paper. The outline below must be incorporated as your table of contents for your industry analysis paper. The items are also to be repeated in the document, so I can find each section in the document, failure to do so will result in significant point deductions. Document length should be between 8 and 12 pages.
MKT 291 Industry Analysis Outline
The Brand we choose is Colgate!!
1. Table of Contents (include page numbers)

2. Executive Overview (10 points) (Grant)

3. Situation Analysis (60 points)
a. Brief history of your brand and your brand’s parent company – (Fengkai)
b. Market Summary (Mina)
a. Trends, growth, market share winners & losers
b. Segmentation & target market(s)
c. Environmental Scan
a. Social/Cultural Factors and Trends (as they relate to consumer behavior in your market)- (Xiaohan)
b. Economic Factors (what impact does the current economy have on the purchase patterns of your type of product) – (me)
c. Technological Factors (how does technology impact your product line – if it does) – (Xiaohan)
d. Competition (who are your key competitors and who are your competitors in terms of substitutable products) – (Fengkai)
e. Other factors (legal issues or regulatory issues ONLY if pertinent to your product). – (me)

4. SWOT Analysis – key factors discovered (15 points) – (David)

5. Citations – use MLA style (5 points)

6. Appearance and mechanics including Table of Contents with page numbers (10 points)

Psychology of Combat

Psychology of Combat

Psychology of Combat (PSYC432)-4 PAGES APA**NO

4 pages contemplating and discussing the effects of collective trauma upon future generations among American military personnel who have served in combat situations. Use the required reading assignments and other resources to share comparisons and beliefs about the trauma and future effects. Share your thoughts about these men and women, particularly how they and their communities are impacted by this trauma. Do they consider the trauma to be their own, or perhaps, shared?

Minimum Length: 4 pages not including the cover and reference list pages.
Formatting Syle: APA

ows Matrix and Portfolio analysis

ows Matrix and Portfolio analysis

ows Matrix and Portfolio analysis
Incorporate the use of new methodologies from the knowledge-economy management approach that might be appropriate for this organization. Skilled Nursing and Rehap facility
Correlate recent research findings regarding strategy management into your approach.
Synthesize operational and financial components in your strategic planning process.
Incorporate your findings from your current environment analysis.
Preface your newly revised strategic plan with the core assumptions regarding environmental opportunities and threats, organizational strengths and weaknesses, and organizational behavior dynamics that are foundational to the strategy.
Determine the organizational structure that best facilitates the strategy—functional, divisional, or matrix.
Include a brief description of the proposed strategy that reflects the choices made regarding:
Product domain.
Market domain.
Level of investment in the respective product and market domains.
Positioning approach for achieving competitive advantage.
Maneuvers that will be used to implement the positioning approach.
Distinctive competencies or assets that will be relied on to gain and sustain competitive advantage.
Submit your TOWS Matrix, with the revised components of your course project, as an attachment to this assignment.

Transactional Model of Communication

Transactional Model of Communication

Transactional Model of Communication
Om300 week 1 discussions 2017
Topic 1 – Transactional Model of Communication
To begin this conversation, please first explore these.doi.org.ezproxy.umuc.edu/10.4135/9781412959384.n108″>definitions of communicationon pages 295-299 in the Encyclopedia of Communication Theory.Then, reviewthis history and description of.doi.org.ezproxy.umuc.edu/10.4135/9781412959384.n69″>communication modelson pages 175-179in the Encyclopedia of Communication Theory, taking particular note of its information about the transactional model:

This model holds that we send and receive messages simultaneously. A communicator encodes (e.g., puts thoughts into words and gestures), then transmits the message via a channel (e.g., speaking, email, text message) to another communicator(s) who then decodes the message (e.g., takes the words, gestures, etc. and applies meaning to them). The message may encounter noise (e.g., any physical, psychological, or physiological distraction or interference), which could prevent it from being received or fully understood as the sender intended:

Just think, do you really stop “communicating” when someone is talking to you? No, you are making nonverbal responses, like head shakes, or arm folds, or “hm-hm” comments to give the speaker continuous feedback. You also are processing the communication that you are receiving by trying to understand it, placing it in its proper context, and imagining what will be the best responses.

Let’s unpack this. Imagine that you and another person are each holding a ball and simultaneously throwing the balls back and forth to each other. This is how the transactional model of communication works. You can even imagine the channels of communication not being as strong by having the two people toss the balls with their eyes closed (a telephone conversation?). Or the channels can be weaker if you have a wall up between you, or you both play and catch with only one hand. The BEST communication likely occurs in a quiet room where two people are really paying attention to each other.

As for noise, that could be anyone else walking along who throws another ball at you while you are playing with another person. Or, noise can be the wall over which you must throw your message. Another form of noise could be throwing balls that are unfamiliar to you (a new language or jargon used only at a particular job).

Types of Noise

.jpg” alt=”https://learn.umuc.edu/content/enforced/197537-001819-01-2172-OL4-7982/New%20LEO%20Model%20Classroom/New%20LEO%20Model%20Classroom%20GIFs/Types%20of%20Noise.JPG?_&d2lSessionVal=ltGRGM9oZR5y7RQ9s6GgyKQ04″>

Imagine if your instructor brought a bunch of whiffle balls into class to show the various aspects of the transactional model. Pretty soon, the pairs begin to make rules about when they will throw the balls.

When the ball-throwing groups are made larger, the groups quickly figure out that there better be a fairly strictly governed order by which the group members throw their balls, so that “messages” aren’t lost under chairs! Indeed, as soon as communication gets into larger groups, the group needs to decide upon rules of communication so that everyone is heard and that messages aren’t lost. You no doubt have found the same need for stricter “rules” when groups try to communicate together – more formalized turn-taking and the assignment of a group leader so that the communication happens relatively easily.

Some questions for you:

Please select and address at least one of the following activities in a carefully crafted response to this topic. But before you tackle these activities, please make sure you have read the materials at all of the links in this discussion question.

Activity #1

How does the transactional model differ from the earlier Shannon and Weaver:

and Schramm modelsof communication?

What are their strengths and weaknesses vs. the transactional model? What made the linear approach to modeling communication so attractive initially and why is the transactional model more appealing now?

Then, please relate what you learned to a typical staff meeting at your place of work (or recent job or volunteer group meeting).

Participants
Coding/Decoding (who is creating messages/who is receiving them?)
Feedback (who gives/receives it?)
Noise (note different kinds)
Channel(s) How are messages being sent
Context – Where people are sending and receiving messages.
Activity #2

Review this classic Abbott and Costello clip, “Who’s On First,” then try to identify and explain what went wrong by using the transactional model of communication:

Topic 2 – Seven Traditions of Communication Research & Theory
Communication is both a very old field and a very contemporary one. In many ancient cultures — Greek, Roman, Indian, Chinese, for example — scholars wrote out strategies for effective communication. Some of these ancient scholars included Aristotle (Greek), Cicero and Quintilian (Roman); all were interested in understanding how a person (a male) could make his way through the world using language in the most influential, graceful, and authoritative ways possible. Much of what was considered “education” of the young in ancient Rome was teaching about communicating effectively, a tradition that faded in time. Today, few of us have the tools in our communications tool bag for understanding what makes effective messages and how people can be persuaded or dissuaded from certain beliefs or actions.

The earlier communication scholars organized different kinds of strategies for persuading people in different situations. If we read Aristotle’s .org/details/rhetoric_ge_librivox”>Rhetoric, we see a comprehensive book on human psychology — how people can be moved, persuaded, reasoned with. Cicero’s work, such as .org/details/cicerodeoratore01ciceuoft”>On the Orator, covered how to be persuasive in ancient Rome’s courts of law. .org/stream/institutioorator00quin/institutioorator00quin_djvu.txt”>Quintillian tried to instruct young people on how to think by following certain forms of writing and by observing the world in his twelve books, called “The Institutio Oratoria.” The study of “rhetoric” changed in the next two thousand years, especially in Europe, but almost nearly faded from the educational system by the early 20th century when it was seen as old-fashioned or unimportant. However, modern rhetorical scholars have revived many of its principles and are trying to include them in academia and public schools.

At the end of the 19th century, sociologists also began to look more closely at the way social groups operate. Anthropologists, a few decades later, began to examine the influence of culture upon communication. Political scientists and social scientists of the 1930s wondered at the power of radio and movies to send out propaganda messages to control entire nations. In turn, economists, psychologists, philosophers, and educational experts of all stripes have looked to the role of “communication” within their fields.

Communication as a separate field of study is relatively new, propelled in part by the advancement of electronic means of communicating as the twentieth century proceeded through the film, radio, television, satellite, cable, and digital ages. Even so, the “fields” of communication are vast and varied, and have come to be divided into seven traditions that you can learn about in .com/juy3i36vfb1a/seven-traditions-in-the-field-of-communication-theory/”>this presentation.

.jpg” alt=”Seven traditions”>

These fields of study address the various ways humans communicate with each other across time, space, and contexts. The study of these contexts might be best understood as focusing on specific communication processes and effects. The .com/25464594/7-contexts-of-communication-flash-cards/”>seven contexts of communication study examine particular combinations of people in specific communication situations. The Encyclopedia of Communication Theorytells us these can be sorted into theories of:

.sagepub.com.ezproxy.umuc.edu/view/communicationtheory/n212.xml”>intrapersonal communication, which address our understanding and use of symbols;
.sagepub.com.ezproxy.umuc.edu/view/communicationtheory/n205.xml”>interpersonal communication, which address the communication between dyads (two people);
.sagepub.com.ezproxy.umuc.edu/view/communicationtheory/n168.xml”>group communication, which deal with small groups;
.sagepub.com.ezproxy.umuc.edu/view/communicationtheory/n266.xml”>organizational communication, which address communication in organizations;
.sagepub.com.ezproxy.umuc.edu/view/communicationtheory/n328.xml”>public/rhetorical communication, which examine f2f communication to a large group of listeners;
.sagepub.com.ezproxy.umuc.edu/view/communicationtheory/n231.xml”>mass/media communication, which encompass messages produced for mass audiences; and
.sagepub.com.ezproxy.umuc.edu/view/communicationtheory/n202.xml”>intercultural communication, which look at communication among people of different cultures.
Contemporary researchers also study .sagepub.com.ezproxy.umuc.edu/view/communicationtheory/n161.xml”>gender, which focuses on communication issues of women and between the sexes, health, and computer-mediated communication contexts.

Communication context boundaries are fluid. We can find interpersonal and group communication in organizations. Gender communication occurs whenever people of different sexes communicate. And we can have mass communications to individuals, group, and organizations. As a result, their are many communication theories of which .umuc.edu/d2l/common/dialogs/quickLink/quickLink.d2l?ou=197537&type=coursefile&fileId=New+LEO+Model+Classroom%2fCommunication+Theories.htm”>theseare the major ones.

Activity:

Before you tackle this exercise, please make sure you have read the materials at all of the links in this discussion question.

Consider the role communication plays in your personal and professional lives. Which of the traditions, which also are known as the rhetorical, .umuc.edu/login?url=http://knowledge.sagepub.com/view/communicationtheory/n336.xml”>semiotic, .umuc.edu/login?url=http://knowledge.sagepub.com/view/communicationtheory/n282.xml”>phenomenistic, .umuc.edu/login?url=http://knowledge.sagepub.com/view/communicationtheory/n104.xml”>cybernetic, .sagepub.com.ezproxy.umuc.edu/view/communicationtheory/n19.xml”>sociopsychological or sociocultural, and critical traditions– intrigues you the most?

Consider, too, the contexts of communication study — which would you like to know more about? How do you plan to use your greater understanding of communication in the future? What is most “useful” to you as a person, employee, parent, spouse, team-mate, citizen, etc.?

Please respond with a cogent, coherent reply and support your comments with documented research. Don’t forget to comment on your classmates’ posts!

To further understand the seven traditions of communication research, you may want to review pages 132-149 in this classic 1999 article by Robert Craig, “.umuc.edu/d2l/common/dialogs/quickLink/quickLink.d2l?ou=197537&type=coursefile&fileId=New+LEO+Model+Classroom%2fNew+LEO+Model+Classroom+Course+Content%2fOverview%2fCommunication+Theory+as+a+Field+by+Robert+Craig.pdf”>Communication Theory as a Field.”

Topic 3 – Five Facets of Communication
Most scholars agree there are five facets or elements to communication that come together to define communication as roughly a social process in which individuals employ symbols to establish and interpret meaning in their environment. Let’s see if we can enhance our understanding of a couple of those terms!

Activity

Before you tackle this discussion, please make sure you have reviewed the .doi.org.ezproxy.umuc.edu/10.4135/9781412959384.n108″>definitions of communicationon pages 295-299 in the Encyclopedia of Communication Theory, .edu/instruct/theory/contexts.html#mass”>these divisions or contexts of communication, and the other assigned readings in this week’s .umuc.edu/d2l/customization/equellaQuicklink/6606/View?url=https%3a%2f%2fumuc.equella.ecollege.com%2finteg%2fgen%2f2e68c1a4-b926-44c5-beac-20c5c634bfb4%2f1%2fWeek+1+Learning+Resources.html”>learning resources.

1. Communication is “social” in that it involves people and interactions, whether face-to-face or mediated. Can you think of a few more categories for the social patterns of human communication?

2. Communication uses symbols, arbitrary labels or representations of phenomena that are sometimes concrete in that they represent an actual object, and sometimes abstract because they can represent ideas and thoughts. Explain a time when you did not understand a “symbol” — what was it, and how did you realize you did not understand what was being communicated?

3. Communication is a process that is an ongoing, dynamic, and unending occurrence. It also is complex and continually changing. Much can happen in the process; if communication were not dynamic, then compromise and resolution were not possible. Communication is irretrievable, irreversible, and unrepeatable; as such, every communication episode is unique. Describe a type of communication interaction that exemplifies how people can end up in a very different place once a discussion gets underway.

4. Meaning is what people extract from what researchers might call a communication episode. What are some examples of situations in which communication may succeed even without shared meaning?

5. The term “environment” is used by communication scholars to describe the situation or context in which communications occurs, and can include time, place, method (that is, whether the communication is mediated by technology), historical period, relationship, and the participants’ ages, genders, education, and cultural backgrounds. All of these elements influence our perspectivesand perceptions.For Bob Dylan, for example, the context was the Civil Rights movement in the 1960s. What are some major contemporary media messages for which the context has changed in recent years?

As you can see, communication is both vast and highly particular; ambiguous and exact. What are some of the challenges in studying “communication”? Please use the questions above to help you formulate your response.

What are consumer’s protections

What are consumer’s protections

What are consumer’s protections
You are required to write a research essay addressing all of following points:
• What are consumer’s protections? Why are consumers protected? Give a short
account of the historical development of consumer law in Australia.
• Currently how do consumer’s protection laws operate in Australia? Please
explain current consumer law protection at both state and federal level.
• If a consumers is dissatisfied with a good or a service provided explain how he
or she can get relief through the court system and outside the court system.
• Must be original work.
Please cite relevant case law and statues in your answers and provide proper
references.
Length 2,000 words

LAW 500 – Assignment 4 Legal and Ethical Considerations

Legal and Ethical Considerations

LAW 500 – Assignment 4 Legal and Ethical Considerations

Assignment 4: Legal and Ethical Considerations in Marketing, Product Safety, and Intellectual Property
You are a new associate at the law firm of Dewey, Chetum, and Howe. John, a former researcher
at PharmaCARE, comes to your office. He has concerns about PharmaCARE’s use of AD23, one of the
company’s top-selling diabetes drugs. Two (2) years ago, after PharmaCARE’s research indicated that
AD23 might also slow the progression of Alzheimer’s disease, John and his team of pharmacists began
reformulating the drug to maximize that effect. In order to avoid the Food and Drug Administration’s
(FDA) scrutiny, PharmaCARE established a wholly-owned subsidiary, CompCARE, to operate as a
compounding pharmacy to sell the new formulation to individuals on a prescription basis. CompCARE
established itself in a suburban office park near its parent’s headquarters. To conserve money and time,
CompCARE did a quick, low-cost renovation.

CompCARE benefited from PharmaCARE’s reputation, databases, networks, and sales and
marketing expertise, and within six (6) months had the medical community buzzing about AD23.
Demand soared, particularly among Medicare, Medicaid, and Veterans Affairs patients. Seeing the
opportunity to realize even more profit, CompCARE began advertising AD23 directly to consumers and
marketing the drug directly to hospitals, clinics, and physician offices, even though compounding
pharmacies are not permitted to sell drugs in bulk for general use. To circumvent this technicality,
CompCARE encouraged doctors to fax lists of fictitious patient names to CompCARE. PharmaCARE sold
CompCARE to WellCo, a large drugstore chain, just weeks before AD23 was publicly linked to over 200
cardiac deaths.

As CompCARE and its new parent company enjoyed record profits and PharmaCARE’s stock price
approached $300 per share, reports started surfacing that people who received AD23 seemed to be
suffering heart attacks at an alarming rate. The company ignored this data and continued filling large
orders and paying huge bonuses to all the executives and managers, including John, whose wife recently
died from a heart attack after using AD23.
John has come to you with an internal company memo describing the potential problems with
AD23, and information describing the company’s willingness “roll the dice” and continue to market the
drug.

In preparation for this assignment, use the Internet or Strayer Library to research examples of
intellectual property theft that occurred within the past three (3) years. Write a six to eight (6-8) page paper in which you:
1. Research three to five (3-5) ethical issues in the scenario relating to marketing and advertising,
intellectual property, and regulation of product safety and examine the extent to which PharmaCARE
violated these issues. Be sure to identify the law and then the extent of the violations.
2 Argue for or against Direct-to-Consumer (DTC) marketing by drug companies. Provide support for your
response. 3. Analyze the manner in which PharmaCARE used U.S. law to protect its own intellectual property and if
John has any claim to being the true “inventor” of AD23. Suggest at least three (3) ways the company
could compensate John for the use of his intellectual property.
4. Summarize at least one (1) current example (within the past three (3) years) of intellectual property
theft, and examine the effect on that company’s brand.
5. Analyze the potential product liability issues surrounding the death of John’s wife and other potential
litigants against PharmaCARE as a result of AD23.
6. Specify the major arguments that John can make to claim that he is a whistleblower and the type of
protections that he should be afforded. Justify your response.
7. Use at least three (3) quality resources in this assignment. Note: Wikipedia is not an acceptable
reference and proprietary Websites do not qualify as academic resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Include a cover page containing the title of the assignment, the student’s name, the
professor’s name, the course title, and the date. The cover page and the reference page
are not included in the required assignment page length.

Describe the diagnosis intervention and program management

Describe the diagnosis intervention and program management

You mentioned 3 issues in your current workplace. Describe the diagnosis, intervention and program management for one of the issues at your work. Remember to only pick one issue.

This is the post to reply to…

Kevin

To begin, it was hard to choose just one topic to write about because all the issues I had written about in discussion one were all very important. With that being said, after some time thinking about it, I decided that the topic I am going to use for discussion 3 is going to be about the lack of communication. I feel that it is most important because it allows for individuals to learn about each other, respect each other and work better together as a team.

Diagnosis: Since the day I began working at my current job, I’ve noticed a lack of comunication amongst coworkers and even the supervisors. Things that should be an easy task seemed to make people struggle. The key commponent was that people would’t communicate that they needed help. One thing that truly bothered me was that the supervisors wouldn’t check up on their staff, they would just expect the work to be done.

Action: So I came up with a plan. I documented the amount of work being done compared to the amount of interaction being done by the supervisors and their employees. After one month I went to the head of department and gave him a suggestion. My suggestion was simplly, we could continue to work like this and have a small rate of production or we can get everyone involved, including the supervisors, and I guarntee you’ll see a rise in production. People are scared to ask questions or to admit they need help.

Program management: The head of the department took my advise and had a meeting with the supervisors. Then he had a meeting with the entire department explaining how we are a family and we need to work together. I got a small promotion and was told to be incharge of productivity. It’s been two months sicne that meeting and productivity has gone up a lot since the day I started. I certianly see room for more improvement but it’s still a good start. People are begining to respect each other more and it is turning into a more comfortable work environment.