Blog

  • NURS 6052/NURS5052/NRSE6052 Essent of Evidence

    The post NURS 6052/NURS5052/NRSE6052 Essent of Evidence is a property of College Pal
    College Pal writes Plagiarism Free Papers. Visit us at College Pal – Connecting to a pal for your paper

    Week 1 Assignment
    Evidence-Based Practice and the Quadruple Aim
    Healthcare organizations continually seek to optimize healthcare performance. For years, this approach was a three-pronged one known as the Triple Aim, with efforts focused on improved population health, enhanced patient experience, and lower healthcare costs.

    More recently, this approach has evolved to a Quadruple Aim by including a focus on improving the work life of healthcare providers. Each of these measures are impacted by decisions made at the organizational level, and organizations have increasingly turned to EBP to inform and justify these decisions.

    To Prepare:
    Read the articles by Sikka, Morath, & Leape (2015); Crabtree, Brennan, Davis, & Coyle (2016); and Kim et al. (2016) provided in the Resources.

    Reflect on how EBP might impact (or not impact) the Quadruple Aim in healthcare.

    Consider the impact that EBP may have on factors impacting these quadruple aim elements, such as preventable medical errors or healthcare delivery.

    To Complete:
    Write a brief analysis (no longer than 2 pages) of the connection between EBP and the Quadruple Aim.

    Your analysis should address how EBP might (or might not) help reach the Quadruple Aim, including each of the four measures of:

    Patient experience

    Population health

    Costs

    Work life of healthcare providers

    Week 2 & 3 Assignment
    Evidence-Based Project
    Is there a difference between “common practice” and “best practice”?

    When you first went to work for your current organization, experienced colleagues may have shared with you details about processes and procedures. Perhaps you even attended an orientation session to brief you on these matters. As a “rookie” you likely kept the nature of your questions to those with answers that would best help you perform your new role.

    Over time and with experience, perhaps you recognized aspects of these processes and procedures that you wanted to question further. This is the realm of clinical inquiry.

    Clinical inquiry is the practice of asking questions about clinical practice. To continuously improve patient care, all nurses should consistently use clinical inquiry to question why they are doing something the way they are doing it. Do they know why it is done this way, or is it just because we have always done it this way? Is it a common practice or a best practice?

    In this Assignment, you will identify clinical areas of interest and inquiry and practice searching for research in support of maintaining or changing these practices. You will also analyze this research to compare research methodologies employed.

    To Prepare:
    Review the Resources and identify a clinical issue of interest that can form the basis of a clinical inquiry.

    Based on the clinical issue of interest and using keywords related to the clinical issue of interest, search at least four different databases in the Library to identify at least four relevant peer-reviewed articles related to your clinical issue of interest.

    Review the results of your peer-reviewed research and reflect on the process of using an unfiltered database to search for peer-reviewed research.

    Reflect on the types of research methodologies contained in the four relevant peer-reviewed articles you selected.

    Part 1: An Introduction to Clinical Inquiry
    Create a 4- to 5-slide PowerPoint presentation in which you do the following:

    Identify and briefly describe your chosen clinical issue of interest.

    Describe how you used keywords to search on your chosen clinical issue of interest.

    Identify the four research databases that you used to conduct your search for the peer-reviewed articles you selected.

    Provide APA citations of the four peer-reviewed articles you selected.

    Part 2: Identifying Research Methodologies
    After reading each of the four peer-reviewed articles you selected, use the Matrix Worksheet template to analyze the methodologies applied in each of the four peer-reviewed articles. Your analysis should include the following:

    The full citation of each peer-reviewed article in APA format.

    A brief (1-paragraph) statement explaining why you chose this peer-reviewed article and/or how it relates to your clinical issue of interest, including a brief explanation of the ethics of research related to your clinical issue of interest.

    A brief (1-2 paragraph) description of the aims of the research of each peer-reviewed article.

    A brief (1-2 paragraph) description of the research methodology used. Be sure to identify if the methodology used was qualitative, quantitative, or a mixed-methods approach. Be specific.

    A brief (1- to 2-paragraph) description of the strengths of each of the research methodologies used, including reliability and validity of how the methodology was applied in each of the peer-reviewed articles you selected.

    Week 5 Assignment
    Evidence-Based Project, Part 3: Advanced Levels of Clinical Inquiry and Systematic Reviews
    Your quest to purchase a new car begins with an identification of the factors important to you. As you conduct a search of cars that rate high on those factors, you collect evidence and try to understand the extent of that evidence. A report that suggests a certain make and model of automobile has high mileage is encouraging. But who produced that report? How valid is it? How was the data collected, and what was the sample size?

    In this Assignment, you will delve deeper into clinical inquiry by closely examining your PICO(T) question. You also begin to analyze the evidence you have collected.

    To Prepare:
    Review the Resources and identify a clinical issue of interest that can form the basis of a clinical inquiry.

    Develop a PICO(T) question to address the clinical issue of interest for the Assignment.

    Use the key words from the PICO(T) question you developed and search at least four different databases in the Library to identify at least four relevant peer-reviewed articles at the systematic-reviews level related to your research question.

    Reflect on the process of creating a PICO(T) question and searching for peer-reviewed research.

    The Assignment (Evidence-Based Project)

    Part 3: Advanced Levels of Clinical Inquiry and Systematic Reviews
    Create a 6- to 7-slide PowerPoint presentation in which you do the following:

    Identify and briefly describe your chosen clinical issue of interest.

    Describe how you developed a PICO(T) question focused on your chosen clinical issue of interest.

    Identify the four research databases that you used to conduct your search for the peer-reviewed articles you selected.

    Provide APA citations of the four peer-reviewed articles you selected.

    Describe the levels of evidence in each of the four peer-reviewed articles you selected, including an explanation of the strengths of using systematic reviews for clinical research. Be specific and provide examples.

    Week 7 Assignment
    Evidence-Based Project, Part 4: Critical Appraisal of Research
    Realtors rely on detailed property appraisals—conducted using appraisal tools—to assign market values to houses and other properties. These values are then presented to buyers and sellers to set prices and initiate offers.

    Research appraisal is not that different. The critical appraisal process utilizes formal appraisal tools to assess the results of research to determine value to the context at hand. Evidence-based practitioners often present these findings to make the case for specific courses of action.

    In this Assignment, you will use appraisal tools to conduct a critical appraisal of published research. You will then present the results of your efforts.

    To Prepare:
    Review the Resources and consider the importance of critically appraising research evidence.

    Reflect on the four peer-reviewed articles you selected in Module 2 and analyzed in Module 3.

    Review and download the Critical Appraisal Tools document provided in the Resources.

    The Assignment (Evidence-Based Project)

    Part 4A: Critical Appraisal of Research

    Conduct a critical appraisal of the four peer-reviewed articles you selected and analyzed by completing the Critical Appraisal Tools document. Be sure to include:

    An evaluation table

    A levels of evidence table

    An outcomes synthesis table

    Part 4B: Critical Appraisal of Research

    Based on your appraisal, in a 1-2-page critical appraisal, suggest a best practice that emerges from the research you reviewed. Briefly explain the best practice, justifying your proposal with APA citations of the research.

    Week 9 Assignment
    Evidence-Based Project, Part 5: Recommending an Evidence-Based Practice Change
    The collection of evidence is an activity that occurs with an endgame in mind. For example, law enforcement professionals collect evidence to support a decision to charge those accused of criminal activity. Similarly, evidence-based healthcare practitioners collect evidence to support decisions in pursuit of specific healthcare outcomes.

    In this Assignment, you will identify an issue or opportunity for change within your healthcare organization and propose an idea for a change in practice supported by an EBP approach.

    To Prepare:
    Reflect on the four peer-reviewed articles you critically appraised in Module 4.

    Reflect on your current healthcare organization and think about potential opportunities for evidence-based change.

    The Assignment: (Evidence-Based Project)

    Part 5: Recommending an Evidence-Based Practice Change
    Create an 8- to 9-slide PowerPoint presentation in which you do the following:

    Briefly describe your healthcare organization, including its culture and readiness for change. (You may opt to keep various elements of this anonymous, such as your company name.)

    Describe the current problem or opportunity for change. Include in this description the circumstances surrounding the need for change, the scope of the issue, the stakeholders involved, and the risks associated with change implementation in general.

    Propose an evidence-based idea for a change in practice using an EBP approach to decision making. Note that you may find further research needs to be conducted if sufficient evidence is not discovered.

    Describe your plan for knowledge transfer of this change, including knowledge creation, dissemination, and organizational adoption and implementation.

    Describe the measurable outcomes you hope to achieve with the implementation of this evidence-based change.

    Be sure to provide APA citations of the supporting evidence-based peer reviewed articles you selected to support your thinking.

    Add a lessons learned section that includes the following:

    A summary of the critical appraisal of the peer-reviewed articles you previously submitted

    An explanation about what you learned from completing the evaluation table (1 slide)

    An explanation about what you learned from completing the levels of evidence table (1 slide)

    An explanation about what you learned from completing the outcomes synthesis table (1 slide)

    Week 11 Assignment
    Evidence-Based Capstone Project, Part 6: Disseminating Results
    The dissemination of EBP results serves multiple important roles. Sharing results makes the case for your decisions. It also adds to the body of knowledge, which creates opportunities for future practitioners. By presenting results, you also become an advocate for EBP, creating a culture within your organization or beyond that informs, educates, and promotes the effective use of EBP.

    To Prepare:
    Review the final PowerPoint presentation you submitted in Module 5, and make any necessary changes based on the feedback you have received and on lessons you have learned throughout the course.

    Consider the best method of disseminating the results of your presentation to an audience.

    To Complete:
    Create a 5-minute, 5- to 6-slide narrated PowerPoint presentation of your Evidence-Based Project.

    Be sure to incorporate any feedback or changes from your presentation submission in Module 5.

    Explain how you would disseminate the results of your project to an audience. Provide a rationale for why you selected this dissemination strategy.

    The post NURS 6052/NURS5052/NRSE6052 Essent of Evidence appeared first on College Pal. Visit us at College Pal – Connecting to a pal for your paper

  • What did you learn about plagiarism that you didn’t already know?

    The post What did you learn about plagiarism that you didn’t already know? is a property of College Pal
    College Pal writes Plagiarism Free Papers. Visit us at College Pal – Connecting to a pal for your paper

    In this brief journal assignment, you will demonstrate what you have learned about composing thorough paragraphs and citing sources. You will discuss what you have learned about academic integrity, especially as it relates to acknowledging sources, issues with plagiarism, and ethical concerns regarding the use of generative A.I.

    The Assignment

    To complete the exercise, review the module readings on plagiarism, generative A.I., and proper citation. Then, in a brief journal entry, discuss what you have learned. Use the included MLA Citation Guide to create citations for each source you include ( at least two sources must be cited) from the readings below.

    Consider addressing the following prompts:

    1. What did you learn about plagiarism that you didn’t already know?

    2. What did you learn about the ethical issues related to generative A.I.? How does this change how you think about the use of A.I. in your own work?

    3. What did you learn about acknowledging source material and citation?

    4. Do you have any questions about MLA style citations? Include them here so we can work on addressing them.

    Grading Criteria

    The successful assignment will accomplish the following:

    · Address some aspect of all module readings

    · Attempt to fully and completely cite module readings in MLA style according to module resources and readings

    · Include works cited page if you upload a document or list works cited at the bottom of text entry submission.

    · 200 words minimum

    Readings

    · “What Is Plagiarism?”Links to an external site. from UNC (opens in new window): an overview of different types of plagiarism and steps for avoiding plagiarism

    · “Artificial Intelligence: A Tool or a Threat to Art and Writing?”Links to an external site. from The Lance (opens in new window): an editorial exploring ethical concerns relating to generative AI and creative endeavors like art and writing

    · “Citing Sources”Links to an external site. from Sacred Heart University (opens in a new window): an overview of citation to include rationale and execution

    Resources

    · “Thesis Statements”Links to an external site. from UNC (opens in new window): An instructional text that looks at drafting strong thesis statements

    · “The Anatomy of a Paragraph”Links to an external site. by Zachary Schrag (opens in a new window): an overview of the different types of sentences that make up a paragraph

    · “MLA Citation Guide”Links to an external site. from the Online Writing Lab at Purdue University (opens in a new window): Assistance on creating MLA-style citations

    The post What did you learn about plagiarism that you didn’t already know? appeared first on College Pal. Visit us at College Pal – Connecting to a pal for your paper

  • Understanding Special Education Paper Assignment

    The post Understanding Special Education Paper Assignment is a property of College Pal
    College Pal writes Plagiarism Free Papers. Visit us at College Pal – Connecting to a pal for your paper

    Special education provides educational opportunities for students who need additional support to make academic or social progress in school. All educators need to understand the components of special education because effective special education programs include collaboration with a variety of educators, administrators, and school staff.

    Instructions

    For this assignment, you will write a research paper of at least 1,000 words that focuses on the characteristics of students receiving special education, the laws governing special education, and service delivery environments for students eligible for special education services. Your paper should also focus on the roles of general education teachers supporting students receiving special education services, and Biblical principles that support the inclusion of special education services in schools. The paper should contain the following sections:

    1. Introduction: Describe special education and why it is necessary. Include a Scriptural reference to support the necessity of special education in schools. Scripture must be supported by at least one sentence that explains how it relates to your discussion.

    2. Laws: Provide a brief history of the law that established special education in schools (IDEA) and some of the important components of that law (FAPE, LRE). Citations from two scholarly resources are required.

    3. Special Education Services: Describe the characteristics of students who receive special education services. How does a student become eligible for special education services? What kinds of services are provided under special education? Citations from two scholarly resources are required.

    4. Service Delivery Environments: Special education services can be administered in various ways. Describe three special education service delivery environments, from least restrictive to most restrictive. Discuss the type of student who would be best served in each type of environment. Citations from two scholarly resources are required.

    5. General Education Teacher’s Role in Special Education: Explain two roles or responsibilities that the general education teacher has when working with students receiving special education services. Why are these roles important, and how do they help ensure the success of students receiving special education services? Citations from two scholarly resources are required.

    6. Conclusion: Summarize the information shared in the previous sections of the paper. Include any additional information or insight you have gleaned from the process of writing this paper. Include a scriptural reference in the conclusion paragraph. Scripture should be supported by at least one sentence that explains how it applies to your discussion.

    A title page and a reference page are required for this assignment but are not included in the total word count requirement. All elements of your paper are to adhere to current APA formatting guidelines.

    Note: Your assignment will be checked for originality via the Turnitin plagiarism tool.

    The post Understanding Special Education Paper Assignment appeared first on College Pal. Visit us at College Pal – Connecting to a pal for your paper

  • Assume you have been asked by your manager to research and prepare a computer hardware and software recommendation summary and budget

    The post Assume you have been asked by your manager to research and prepare a computer hardware and software recommendation summary and budget is a property of College Pal
    College Pal writes Plagiarism Free Papers. Visit us at College Pal – Connecting to a pal for your paper

    You will perform online research on computer hardware and software using the scenario below and then develop a written proposal document detailing your findings and recommendations.

    You are required to cite all sources used in writing your essay with APA citation formatting.

    1. Assume you have been asked by your manager to research and prepare a computer hardware and software recommendation summary and budget. Using the Internet, determine an appropriate hardware and software recommendation, along with an alternative recommendation (i.e., option 1 and option 2) for each of the following three employee classes described. Search brand hardware provider Web sites, such as Dell(opens in a new tab), Lenovo(opens in a new tab), Hewlett-Packard(opens in a new tab), or others. In a Microsoft Word document, create a section for each class of employee where you list the types of computers you will purchase. Be sure to clearly label each employee class and the Option 1 and Option 2 recommendations in your document. Include hardware information, suggested software, and costs for one employee in each class of employee, along with working links to each of your product recommendations. Explain your rationale for each selection recommendation.

    a. Class A employees use the computer for email, Web browsing, Internet connectivity, and limited document reading and writing.

    b. Class B employees use the computer for all the activities of Class A, plus they need to be able to read and create complicated documents and convert documents into PDF format. They must also be able to create and process large spreadsheets, create and edit small graphics files, and participate in online video conference meetings.

    c. Class C employees are data analysts who perform all the tasks that Class A and Class B employees do. They also analyze data using programs that make extensive computations and need to be able to create and edit complex graphics.

    2. Your manager has also just returned from a regional business meeting where your company is considering moving away from providing employees with hardware/software, and instead moving to a model of employees providing their own mobile systems to perform their work and responsibilities. Your manager would like you to also include a section describing the pros and cons (advantages and disadvantages) of employee use of mobile systems at work, which should be considered.

    The post Assume you have been asked by your manager to research and prepare a computer hardware and software recommendation summary and budget appeared first on College Pal. Visit us at College Pal – Connecting to a pal for your paper

  • Read the case study entitled, “Oracle vs. Google: The Fight Over Java”

    The post Read the case study entitled, “Oracle vs. Google: The Fight Over Java” is a property of College Pal
    College Pal writes Plagiarism Free Papers. Visit us at College Pal – Connecting to a pal for your paper

    Read the case study entitled, “Oracle vs. Google: The Fight Over Java” (pgs. 154-159 in the textbook) and write a 500-word paper that addresses the following questions:

    1. Outline as clearly as possible the main facts of this case and explain the moral issues at stake.

    2. Assume that you are an attorney representing Google or Oracle. Defend the position of your chosen company.

    3. In your paper, explain the reasoning why the Federal Appeals Court believed that the structure, organization, and sequence of APIs were in fact copyrightable. How does this contrast to the First and Sixth federal circuit court’s interpretation that copyright law excludes protection for all methods of operations?

    You will be graded on the completeness of your answers along with your knowledge and application of principles and concepts covered in the lesson.

    Be sure to cite any sources using APA styling.

    Readers’ Rights, Remixing, and Mashups

    A number of prominent legal scholars have recently expressed support for a copyright system in the United States that gives rights not just to authors and creators of content but also to those who read, view, and listen to that content. These limited user rights would go well beyond fair use and typically encompass broad access and distribution rights, including the right to share digital content with others. The idea of a “law of user’s rights” is not new, although there has always been a measure of resistance. Yet this idea has gained considerable traction among intellectual property scholars, especially within the last decade. They see copyright as far too heavily tilted toward enriching owners of content; hence the law must be reconfigured to offer more concrete benefits and opportunities to the consumers of content. Jessica Litman, for example, ardently insists that we must take readers’ interests more seriously and “reclaim copyright for readers.” What specific rights should readers have? While some argue for a modest set of user rights, others propose a thick set of rights including the right to share works with others along with the right to recode or transform a work to give it a different meaning, even if the new product is highly derivative of the original work.

    Among the readers’ rights proposed is the prerogative to engage in remixing or creating mashups without getting permission from the original copyright holders. Specifically, users would be allowed to remix digital content by recombining pieces from different preexisting cultural works, such as music, photos, books, and movies, even if those objects have a copyright. Under this system, filmmakers would be allowed to construct new movies out of substantial clips compiled from digital movies located on computer systems around the world. Such a creative mashup, of course, is currently illegal, unless it falls within the restrictive parameters of fair use. But Larry Lessig and others maintain that the law must be changed, so that ordinary people become “producers” of culture, not just “consumers” of culture. In this way we can return to an “amateur” creative culture that supports the participation of the multitude instead of just an elite few.

    Where might the public stand on this issue? Litman claims that we are on “the verge of reaching a social consensus that mashing up is an important copyright liberty,” that even copyright owners should not want to prevent. She goes on to stipulate that the law should allow for the creation and sharing of mashups as long as this is done noncommercially.

    85

    86

    87

    C o p y r i g h t 2 0 2 0 . J o n e s & B a r t l e t t L e a r n i n g .

    A l l r i g h t s r e s e r v e d . M a y n o t b e r e p r o d u c e d i n a n y f o r m w i t h o u t p e r m i s s i o n f r o m t h e p u b l i s h e r , e x c e p t f a i r u s e s p e r m i t t e d u n d e r U . S . o r a p p l i c a b l e c o p y r i g h t l a w .

    EBSCO Publishing : eBook Collection (EBSCOhost) – printed on 9/13/2024 9:22 PM via RIO SALADO COMMUNITY COLLEGE AN: 2332284 ; Richard A. Spinello.; Cyberethics: Morality and Law in Cyberspace Account: riocomm.main.ehost

    206

    1.

    2.

    Without a change in the law and some recognition of users’ remixing rights, creative remixers like DJ Danger Mouse will continue to be thwarted by the structure of the current copyright system. This particular remixer is known for the Grey Album, a coalescing of the Beatle’s White Album and Jay-Z’s The Black Album. Copyright owners, however, fought vigorously to prevent online distribution of the Grey Album. Many cite this as an example of an oppressive copyright system interfering with the potential of a robust, creative remix culture. Some mashup artists, like the creator of “Girl Talk,” Gregg Gillis (he recombines music snippets from Bruce Springsteen, Jay-Z, and Miley Cyrus), take small samples that appear to be covered by fair use provisions of the copyright law. However, it’s not completely clear that Girl Talk is on the right side of the law, and a case can certainly be made that Gillis’s work is inhibited by the long shadows of copyright law. Changes in that law rebalancing the equation between the rights of creators and consumers will promote greater cultural participation and thereby serve a definite social purpose.

    Some legal scholars, such as Robert Merges, do not believe that the impetus to promote this remix culture should lead to structural changes in copyright law. They argue that it would be unfair to the original creators of mass market content for remixers to “redistribute” their works and thereby interfere with their ability to appropriate the value of their creations. We cannot neglect the efforts of musicians, songwriters, novelists, and filmmakers who make this content. They have a right to control distribution, and, within limits, a right to control the fundamental meaning of those works. According to Merges, “The story of the original content creator should affect how we think about remixing.” The solution is to structure the law so that both content creators and users are treated fairly and justly, but this does not mean diluting the rights original content creators deserve over their creative works.

    Questions Should copyright laws be altered to facilitate remixing and mashups (e.g., by broadening the terms of fair use, which currently permit the use of very small samples of music or movies)? Should remixers be allowed to profit from their efforts?

    Case Studies

    A Parody of PETA

    88

    EBSCOhost – printed on 9/13/2024 9:22 PM via RIO SALADO COMMUNITY COLLEGE. All use subject to https://www.ebsco.com/terms-of-use

    207

    1.

    2.

    People for the Ethical Treatment of Animals (PETA) is a nonprofit organization dedicated to the promotion of animal rights. The group is opposed to eating meat, wearing fur and leather, and conducting research experiments on animals. In this case, the domain name

    was registered by Mr. Doughney to parody PETA and its views on animals.www.peta.org The webpage was entitled “People Eating Tasty Animals,” and it included links to sites where leather goods or meat products were sold. The plaintiff filed suit under the auspices of the Anticyber squatting Protection Act (ACPA), alleging that the domain namepeta.org was identical to or confusingly similar to the distinctive and famous PETA mark. Doughney and his lawyers contended that there was no infringement or dilution, and hence no violation of the ACPA, because his website was a parody.

    A federal district court ruled in favor of PETA, finding Doughney liable for trademark infringement. The case was promptly appealed, but the U.S. Court of Appeals for the Fourth Circuit affirmed the judgment of the district court. It agreed that the PETA mark was distinctive and that Doughney had no intellectual property right in . Moreover,peta.org according to the court, there was no record of any prior use of , and Doughneypeta.org used the mark in a commercial manner. It also agreed that Doughney “clearly intended to confuse, mislead and divert internet users into accessing his website which contained information antithetical and therefore harmful to the goodwill represented by the PETA Mark.” Doughney himself “admitted that it was ‘possible’ that some Internet users would be confused when they activated ‘ ’ and found the ‘People Eating Tasty Animals’peta.org website.” The appeals court concluded that Doughney acted in bad faith; he made statements to the press that PETA should attempt to settle with him and “make him an offer.”

    A key issue triggered by this case is whether a good faith intention to criticize and parody a trademark owner such as PETA should constitute a valid reason for registering a domain name incorporating that trademark owner’s trademark ( ). Or does that domainpeta.org name require some sort of appendage or distinguishing variation such as “ ”petasucks.com so that there will be no confusion?

    Questions Do you agree with the court’s decision in this case? If so, what about Mr. Doughney’s free speech rights? In your view, why did the court reject Doughney’s parody defense?

    Case Studies

    89

    90

    EBSCOhost – printed on 9/13/2024 9:22 PM via RIO SALADO COMMUNITY COLLEGE. All use subject to https://www.ebsco.com/terms-of-use

    Home

    Home

    Home

    Home

    Home

    Home

    http://petasucks.com
    208

    Oracle vs. Google: The Fight over Java

    The high-profile dispute between Oracle and Google has been described as the “most notable case in copyright,” and the “World Series of IP cases.” The protracted

    conflict traces back to Oracle’s acquisition of Sun Microsystems after the demise of Sun’s hardware business. Oracle, founded in 1977, rose to prominence in Silicon Valley thanks to its flagship database business. Unlike Sun, Oracle has followed the path of Apple by favoring proprietary technologies over open source ones.

    Sun had developed the programming language or platform called Java, hoping that it would become the standard language employed by programmers for website development and applications. In 1995, Sun introduced the Java platform, which allows a user to run the same Java application on many different kinds of computers. Java applications can be delivered over the internet to computers running different operating systems (for example, Windows, Macintosh, or Unix). Since its introduction in 1995 Java grew in popularity thanks to this portability or cross-platform functionality. Almost immediately, Netscape adopted Java for its Navigator browser.

    The Java technology has several components that contribute to its superior functionality. It encompasses a programming language; a group of programs written in that language called the “Java class libraries” that expose their own Application Programming Interfaces (APIs); a compiler that translates the code written by a programmer into “bytecode”; and, finally, the Virtual Java Machine (JVM) that translates bytecode into instructions for the operating system. Applications that use the Java APIs will run on any systems with a Java Runtime Environment (JRE), that is, the Java class libraries and a JVM.

    While the Java programming language is essentially free to use under the open source terms of a general public license, the Java platform or Java SE requires a license. Java SE allows the code written in the Java programming language to run on a variety of different operating systems using the Java Virtual Machine (JVM). Java SE also includes the Java APIs. The APIs, which consist of standardized, prewritten “methods” or blocks of code to handle basic programming functions, work as software interfaces. They allow programs, websites, or apps to communicate with one another. For example, the APIs allow an operating system like Android to download a website or open and run a particular app. Java developers would be unable to create new programs for platforms like Android without relying on these software interfaces.

    91

    92

    EBSCOhost – printed on 9/13/2024 9:22 PM via RIO SALADO COMMUNITY COLLEGE. All use subject to https://www.ebsco.com/terms-of-use

    209

    The pivotal question in this case is whether these APIs or software interfaces are copyrightable. According to the U.S. copyright law, copyright protection does not extend to “any idea, procedure, process, system, method of operation, concept, principle, or discovery, regardless of the form in which it is described, explained, illustrated, or embodied in such [original] work.” Do these restrictions apply to software interface or APIs which serve as the means of interoperability for information technologies, and have been often characterized as “methods of operation,” because of their functional purpose? The Supreme Court sought to resolve a closely related question in the case butLotus v. Borland deadlocked in a 4–4 vote. At issue was copyright protection for the menu command hierarchy (e.g., a sequence of commands such as Paste–Cut– Copy). In the absence of a definitive Supreme Court Ruling the First and Sixth federal circuit courts ruled that copyright law excludes protection for all methods of operation, including those embedded into software interfaces. The first person to write a program cannot “lock up” basic or standard programming techniques and methods of operation such as a command hierarchy. The Third Circuit has taken the opposite position, ruling that a method of operation embodied in a software interface is copyrightable so long as it could have been written differently.

    Java and Google’s Android Operating System Google, the search engine giant, developed an open-source platform or operating system for mobile devices. The product was called Android, and it was released to the public in 2007. Many companies such as Samsung, Xiaomi, Nokia, and HTC use the Android operating system for their smartphones. Apple, on the other hand, uses its own proprietary operating system (OS) known as the iMac. Although Google executives did not intend to directly monetize Android, it was designed to become a vehicle for promoting its search functionality and other applications. The company’s goal was to produce and distribute “the world’s first open source handset solution with built-in Google applications.”

    Java was vital to the success of this open source project for a number of reasons. The company had to move fast because competitors were working on their own proprietary systems. Therefore it was not feasible to write all the code from scratch. Also, there was already an “existing pool” of developers and applications. Java therefore, meant “a safe sandbox for third party developers.”

    93

    94

    95

    96

    EBSCOhost – printed on 9/13/2024 9:22 PM via RIO SALADO COMMUNITY COLLEGE. All use subject to https://www.ebsco.com/terms-of-use

    210

    There were extensive negotiations with Sun about the use of Java for Android, but Google found the company’s licensing terms to be too restrictive. Negotiations broke down, but Google’s commitment to Java was undeterred. Using the Java language was not a problem since it was an open source product that Sun had released to the public. Google also planned to develop and code its own virtual machine (called “Davlik”). But copyright issues arose because the Android team wanted to use 37 Java API packages from the Java Standard Edition (SE). Each of the API packages uses two types of source code: declaration code and implementation code. The Android developers used the declaration code of the APIs, analogous to chapter headings and titles, but wrote their own implementation code. These declarations represent the “header line of code” that introduces the “methods” or blocks of code that perform functions such as mathematical calculations or the display of simple graphics. The Java API declarations inform developers how to access these prewritten methods that perform the tasks which are executed by the implementation code. One of the API packages implemented in Android was java.security, which provides the classes and interfaces for the product’s security framework and allows an app’s security commands to function.

    Despite its disapproval, Sun did not challenge Google and it did not file a copyright or patent infringement law suit. But Oracle’s acquisition of Sun in 2010 changed everything. Oracle CEO Larry Ellison regarded Java as “the single most important software asset we have ever acquired.” Moreover, Oracle was prepared to take legal action over Google’s use of these 37 API libraries of coding blocks without a license, since it perceived this action as a blatant infringement of its copyright. The company sued Google for copyright infringement and sought $9 billion in damages. In its lawsuit, Oracle claimed that Google had illegally copied Java source code along with the structure and organization of Java class libraries to develop its Android OS.

    Legal History and Arguments

    97

    98

    99

    EBSCOhost – printed on 9/13/2024 9:22 PM via RIO SALADO COMMUNITY COLLEGE. All use subject to https://www.ebsco.com/terms-of-use

    211

    Specifically, Oracle alleged that Google directly copied 7,000 lines of declaring code and generally replicated without permission the structure, sequence, and organization of 37 Java API packages. Oracle conceded that the implementation code was different and the Davlik virtual machine was not an issue. The central question before the court would be whether these components of the Java platform were entitled to copyright protection. And if they were subject to such protection did Google’s use of this material constitute a form of fair use under current copyright law. According to Oracle, while no single name was copyrightable, “Java’s overall system of organized names – covering 37 packages, with over 600 classes, with over 6,000 methods – is a ‘taxonomy’ and, therefore, copyrightable.” In its defense Google insisted that Sun had freely licensed the Java programming language and encouraged the use of Java APIs by developers. Google also argued that it independently implemented the functions of the 37 API packages at issue and that its use of 7,000 lines of declaring code was a small part of Android’s 15 million lines of source code. For example, a declaration might call for something to be displayed and the associated implementation code would display the output on the screen of a smartphone or other mobile device. The reuse of these Java software interface declarations in Android was necessary so that developers could program Android applications in the open Java language.

    The first trial took place in 2012 in the U.S. District Court for the Northern District of California. The jury was deadlocked on the fair use issue. But Judge Alsop generally rejected Oracle’s arguments. He ruled that Google’s use of the Java APIs constituted fair use because an API is a “method of operation.” He also ruled that the 37 API packages were not subject to copyright protection. The declaring code was not protectable since “names and short phrases cannot be copyrighted.” As a result, the Court entered its final judgment in favor of Google.

    In 2013, Oracle appealed Judge Alsop’s ruling to the U.S. Court of Appeals for the Federal Circuit. The case was now attracting widespread attention with major software companies siding with Oracle, but independent application developers siding with Google. Libertarian groups such as the Electronic Frontier Foundation (EFF) were also aligned with Google. In its legal brief laying out the rationale for its appeal, Oracle’s attorneys employed a literary analogy to help convince the jurists of the validity of their claims:

    100

    101

    102

    103

    EBSCOhost – printed on 9/13/2024 9:22 PM via RIO SALADO COMMUNITY COLLEGE. All use subject to https://www.ebsco.com/terms-of-use

    212

    Ann Droid wants to publish a best seller. So she sits down with an advance copy of Harry – the fifth book – and proceeds to transcribe. ShePotter and the Order of Phoenix

    verbatim copies the chapter titles – from (Dudley Demented) to Chapter 38Chapter 1 (The Second War Begins). She copies verbatim the topic sentences of each paragraph starting from the first (highly descriptive) one and continuing, in order, to the last, simple one (“Harry nodded”). She then paraphrases the rest of each paragraph. She rushes the competing version to press before the original under the title: Ann Droid’s Harry Potter

    . The knockoff flies off the shelves.5.0

    J.K. Rowling sues for copyright infringement. Ann’s defenses: “But I wrote most of the words from scratch. Besides, this was fair use, because I copied only portions necessary to tap into the Harry Potter fan base.”

    Obviously, the defenses would fail.

    Thus, Oracle’s approach was based on a comparison of the creativity in the design and coding of computer software with the copyrightable creativity of a literary work.

    But in their rebuttal Google’s attorneys resorted to familiar arguments about the nature of software. They argued that software interfaces are not like literary or artistic works because they “perform functions that are not entitled to copyright protection.”

    In May 2014, the Federal Appeals Court hearing the case reversed the District Court’s 2012 decision. It ruled that the structure, organization, and sequence of the APIs was copyrightable and remanded the case back to the district court for a retrial on the basis of whether Google’s use of the material constituted fair use. According to the Court, “because Oracle exercised creativity in the selection and arrangement of the method declarations when it created the API packages and wrote the relevant declaring code, they contain protectable expression that is entitled to copyright protection.” In 2016, Judge Alsop conducted the retrial that dwelt on the issue of fair use of the copyrightable declaring code by Google. In closing arguments at the trial Google attorneys emphasized Android’s “transformative purpose,” reminding the Court that Android was not a substitute or direct copy of Java SE but an innovative software platform. Oracle’s attorneys, on the other hand, relied on a simple moral theme: “You don’t take other people’s property without permission and use it for your own benefit,” and you don’t take “shortcuts” at other people’s expense and come up with the “fair use excuse.” The jury seemed unpersuaded by that moral argument. It found that this was a case of fair use and exonerated Google.

    104

    105

    106

    107

    EBSCOhost – printed on 9/13/2024 9:22 PM via RIO SALADO COMMUNITY COLLEGE. All use subject to https://www.ebsco.com/terms-of-use

    213

    1.

    2.

    3.

    However, in March 2018, the Federal Circuit Court of Appeals overturned the verdict and ruled that Google’s use of the APIs wasn’t “fair.” According to the Court of Appeals, “There is nothing fair about taking a copyrighted work verbatim and using it for the same purpose and function as the original in a competing platform.” But, despite this ruling, the extended battle between Google and Oracle has continued. In 2019, Google filed a petition with the U.S. Supreme Court asking its members to review the Circuit Court’s decision.

    Questions Outline as clearly as possible the main facts of this case and explain the moral issues at stake. Assume that you are an attorney representing Google (or Oracle). Prepare a two-page brief defending the position of your client. If you were a Supreme Court Justice and the Court decided to hear this case, would you vote in favor of Oracle or Google? Explain your reasoning in one succinct paragraph.

    108

    EBSCOhost – printed on 9/13/2024 9:22 PM via RIO SALADO COMMUNITY COLLEGE. All use subject to https://www.ebsco.com/terms-of-use

    The post Read the case study entitled, “Oracle vs. Google: The Fight Over Java” appeared first on College Pal. Visit us at College Pal – Connecting to a pal for your paper

  • Identify the (a) psychology domain and (b) topic of interest

    The post Identify the (a) psychology domain and (b) topic of interest is a property of College Pal
    College Pal writes Plagiarism Free Papers. Visit us at College Pal – Connecting to a pal for your paper

    Consider the domain of psychology most relevant to you. Within this domain, choose a topic you want to know more about or that is especially relevant to your personal/career goals. Find two peer-reviewed research articles that add to scientific knowledge on the topic. Be sure to attach the articles to your post.

    In your post:

    1. Identify the (a) psychology domain and (b) topic of interest.

    2. Briefly describe what you did to find the two articles (i.e., what database you used, what your search terms and parameters were).

    3. Summarize (a) the purpose of the articles and (b) what you learned about the topic of interest based on the study results.

    Pro-tip: choose a topic that could be relevant to a future research proposal (i.e., an assignment in Experimental Psychology II).

    Response Parameters
    Initial Responses
    · Responses should integrate research from empirical peer-reviewed journal articles (not review articles, but articles where the author[s] conducted their own study)

    · Use our library databases (e.g., PsycInfo) to search for articles

    The post Identify the (a) psychology domain and (b) topic of interest appeared first on College Pal. Visit us at College Pal – Connecting to a pal for your paper

  • Provide an example of a time when you actively encouraged your patient(s) to be involved in their own care

    The post Provide an example of a time when you actively encouraged your patient(s) to be involved in their own care is a property of College Pal
    College Pal writes Plagiarism Free Papers. Visit us at College Pal – Connecting to a pal for your paper

    Step 1: Provide an example of a time when you actively encouraged your patient(s) to be involved in their own care. Describe how the patient’s action made a difference in their own health. How is patient-centered care supported, or not supported, in your health facility?

    Respond to two of your peers who evaluated different characters from your own. Do you agree with the POC your peer identified? Can you identify any additional challenges or interventions not noted by your peer?

    PLEASE ONLY RESPOND TO THE TWO DISCUSSION RESPONSES BELOW

    Response #1

    My experience with a patient named Mrs. K who has diabetes serves as an example of encouraging patient involvement in their own healthcare. Mrs. K has been having trouble controlling her blood sugar levels and has experienced episodes of both hyperglycemia and hypoglycemia on a regular basis. Having come to understand the importance of actively involving patients, I decided to take a more cooperative approach.

    I began by giving Mrs. K some information about diabetes, its effects, and the need of managing one’s lifestyle. We looked at how blood sugar levels are affected by medication, diet, and activity. Together, we decide on realistic and doable goals for her blood sugar levels, food, and workout regimen. I introduced Mrs. K to self-monitoring tools, such as a glucose monitor and a diabetes management software. I gave her instructions on how to use these devices to track her food intake, exercise, and blood sugar levels. We scheduled regular in-person and virtual meetings to assess her progress, resolve any roadblocks, and adjust her treatment plan as necessary (Kharroubi & Darwish, 2015).

    Mrs. K took full responsibility for managing her own health. She diligently monitored her blood glucose levels, meticulously documented her meals, and increased her physical activity by going on frequent walks. Furthermore, she demonstrated initiative by showing up to her visits prepared with questions and notes about her health. It did not take long for Mrs. K’s blood sugar levels to stabilize. The patient’s HbA1c readings dropped from 9.5% to 7.0%, indicating better long-term control of blood glucose. She lost fifteen pounds, which led to further improvements in her general health and vitality. Mrs. K had fewer hypoglycemic episodes, which lessened the possibility that she might suffer serious repercussions.

    To encourage patient participation, our hospital provides self-monitoring tools, instructional materials, and digital health platforms. In order to deliver patient-centered care, our approach incorporates a cooperative team of primary care physicians, diabetes educators, and nutritionists. Patients can attend frequent seminars and one-on-one consultations to learn practical strategies for managing chronic conditions. We improved Mrs. K’s health outcomes and gave her the confidence to take control of her diabetes by actively including her in his own treatment. This approach aligns with the principles of patient-centered care, which emphasize the importance of acknowledging patients’ needs, preferences, and values. It also guarantees that all clinical decisions are made with the patient’s values as their primary consideration (Sapra & Bhandari, 2023).

    References

    Kharroubi, A. T., & Darwish, H. M. (2015). Diabetes mellitus: The epidemic of the century. World journal of diabetes, 6(6), 850–867. https://doi.org/10.4239/wjd.v6.i6.850

    Sapra, A., & Bhandari P. (2023). Diabetes. StatPearls . StatPearls Publishing; https://www.ncbi.nlm.nih.gov/books/NBK551501/

    Response #2

    I recall a specific case with a patient who was struggling with anxiety and depression. I took the time to sit down with them and explain the importance of self-care practices, such as mindfulness exercises and journaling, in managing their symptoms.

    Encouraging the patient to take an active role in their care empowered them to practice these techniques regularly. Over time, the patient reported feeling more in control of their emotions and noticed a significant decrease in anxiety episodes. They also expressed feeling more confident in coping with stressful situations.

    At my health facility, patient-centered care is a core value that we strive to uphold. We emphasize collaboration between healthcare providers and patients, ensuring that treatment plans are tailored to individual needs and preferences. However, there are challenges in maintaining this approach consistently due to time constraints and resource limitations.

    To support patient-centered care more effectively, we are working on implementing initiatives that enhance patient education and engagement, such as providing more resources for self-management and fostering open communication channels. According to Lyles et al. (2020), to enhance usability, tools have been created that can be added to or combined with the electronic health record to help make medical information easier to understand by providing links to simple explanations and customized educational resources. Shared decision making is a way of managing healthcare that involves patients as active partners in their care that focuses on exchanging information and values to improve the decision-making process (Abrams et al., 2020). By fostering a culture of partnership and shared decision-making, we aim to further empower patients in their mental health journey and improve overall outcomes.

    References

    Abrams, E. M., Shaker, M., Oppenheimer, J., Davis, R. S., Bukstein, D. A., & Greenhawt, M. (2020). The challenges and opportunities for shared decision making highlighted by COVID-19. The Journal of Allergy and Clinical Immunology: In Practice, 8(8), 2474-2480

    Lyles, C. R., Nelson, E. C., Frampton, S., Dykes, P. C., Cemballi, A. G., & Sarkar, U. (2020). Using electronic health record portals to improve patient engagement: research priorities and best practices. Annals of internal medicine, 172(11_Supplement), S123-S129

    The post Provide an example of a time when you actively encouraged your patient(s) to be involved in their own care appeared first on College Pal. Visit us at College Pal – Connecting to a pal for your paper

  • Explain what the independent variable(s) (IV) and dependent variable(s) (DV)

    The post Explain what the independent variable(s) (IV) and dependent variable(s) (DV) is a property of College Pal
    College Pal writes Plagiarism Free Papers. Visit us at College Pal – Connecting to a pal for your paper

    Choose a study in Part II: Analysis of Experiments of the text (starting on p. 139). Be sure to identify the study by name in your post. Then, in your post:

    · Explain what the independent variable(s) (IV) and dependent variable(s) (DV) are in the study you chose

    · For the IV, identify what is was and how it was selected or manipulated by the experimenter

    · For the DV, identify what it was and how it was operationalized for the study

    · Describe how the experimenter(s) prevented or overcame at least one threat to internal validity. Be sure to state the name of the threat that they overcame (see the first lecture in Module 3.1).

    · Is there a potential threat to construct validity specific to experimental designs (see the second lecture in Module 3.1)? Why or why not.

    Response Parameters
    Initial Responses
    · Responses should integrate class material in the assigned readings and/or lectures (include in-text citations and corresponding references in APA format)

    · You may also include credible outside sources (e.g., from peer-reviewed journals) within your responses, but these sources should not come at the expense of integrating class materials

    The book is

    MacLin, M. K. (2020).

    MacLin, M. K. (2020).

    Experimental design in psychology: A case approach

    (9th ed.). Routledge. ISBN-13: 978-0367808280

    The post Explain what the independent variable(s) (IV) and dependent variable(s) (DV) appeared first on College Pal. Visit us at College Pal – Connecting to a pal for your paper

  • Provide a summary of just two of any of the four videos

    The post Provide a summary of just two of any of the four videos is a property of College Pal
    College Pal writes Plagiarism Free Papers. Visit us at College Pal – Connecting to a pal for your paper

    Provide a summary of just two of any of the four videos. You choose which two videos to write about. In addition to a basic summary of the content of your two chosen videos, you are encouraged to include any facts or parts of the videos that stood out to you, or any connections in themes or facts that you noticed. If you like, you may also include your impressions of the LAVC Land Acknowledgement statement (although not required). This response should be 1-3 substantial paragraphs in length.

    The post Provide a summary of just two of any of the four videos appeared first on College Pal. Visit us at College Pal – Connecting to a pal for your paper

  • Group therapy techniques

    The post Group therapy techniques is a property of College Pal
    College Pal writes Plagiarism Free Papers. Visit us at College Pal – Connecting to a pal for your paper

    In a 3- to 4-page paper, identify the video you selected and address the following:

    · What group therapy techniques were demonstrated? How well do you believe these techniques were demonstrated?

    · What evidence from the literature supports the techniques demonstrated?

    · What did you notice that the therapist did well?

    · Explain something that you would have handled differently.

    · What is an insight that you gained from watching the therapist handle the group therapy?

    · Now imagine you are leading your own group session. How would you go about handling a difficult situation with a disruptive group member? How would you elicit participation in your group? What would you anticipate finding in the different phases of group therapy? What do you see as the benefits and challenges of group therapy?

    · Support your reasoning with at least three peer-reviewed, evidence-based sources, and explain why each of your supporting sources is considered scholarly. Attach the PDFs of your sources.

    The post Group therapy techniques appeared first on College Pal. Visit us at College Pal – Connecting to a pal for your paper