Thursday, October 31, 2019

Military Don't Ask, Don't Tell Policy Essay Example | Topics and Well Written Essays - 1250 words

Military Don't Ask, Don't Tell Policy - Essay Example This policy is unfair and unethical because there is no proof that gays cannot serve well in the military. When we think about the issue of Don't Ask, Don't Tell, it becomes clear that this is not just a homosexual issue. Instead, it is an issue about discrimination against people who have served the military well. A Short History of Gays in the Military Gays have been recorded as being part of the military as far back as Plato and the Greeks. They understand the value of having gays in the military. Although Plato's time accepted gays in the military, there were problems as time went on with each war. As far back as the Crusades, gays were persecuted when they were found to have same-sex affairs during the 14th Century. In 1816, during the Napoleonic Wars more gays were persecuted, hanged and whipped if they were found to have same-sex affairs (Webley, 2010). By 1778, George Washington discharged a soldier from his military command and by 1916, the U.S. Military prohibited homosexua lity in the Articles of War. There were many ways to screen out gays from the military throughout the years, and by the Vietnam War, homosexuality was seen by some as a way to get out of military service, especially during this war which was difficult for everyone to understand. However, one man, Perry Watkins, was discharged from the military after 16 years of service because he was a homosexual in 1984; he sued the military and won the case in 1990 (Webley, 2010). This short history shows that gays and lesbians have been serving in the military for probably every war that has ever been fought, and there has always been a concentration on whether they should be open or closeted while they were serving. The Don't Ask, Don't Tell Policy In 1993, the Don't Ask, Don't Tell policy was enacted to stop people who were homosexual from talking about their lifestyle or from practicing homosexuality while in the military. The reason this was enacted was because the military believed that if i t were allowed, it would "create an unacceptable risk to the high standards of morale, good order and discipline, and unit cohesion which are the essence of military capability" (Burrelli, 2010, Summary). This was not a law, but rather a policy that was in place to make sure that service members did not talk about their sexual orientation and that they were not asked about it when they entered the service or as they continued. In other words, homosexual service members were to keep quiet about who they were and how they lived in order to serve next to heterosexual service members. In 2010, the act was repealed as unconstitutional and the military was ordered to stop enforcing it. It is the opinion of this researcher that this was the right thing to do because everyone should have the opportunity to serve in the military regardless of their sexual orientation. When this policy was put into place, thousands of military members had to leave the military based on their sexual orientatio n or live a lie in order to serve as those who were not homosexual served (Obama, 2011). In having this policy in place, it made many men and women have to hid who they were which made them feel isolated and afraid. President Obama acknowledged that this was another sacrifice that these men and women had to do that was not fair to them. The repeal of this policy will not happen quickly because the

Tuesday, October 29, 2019

Epistemology and Metaphysics Schools Paper Essay

Epistemology and Metaphysics Schools Paper - Essay Example On the other hand, empiricism is closely related but not identical as far as academic skepticism is concerned. Through the study, we find that skepticism is comprised of two pragmatic type involving philosophical skepticism and nomothetic science, which is also known as radical empiricism (Greco, 2011). Meanwhile, rationalism is commonly an epistemology discipline that attests knowledge at large. This is a role as well as a source of knowledge that works and articulates justification. However, rationalism is defined as a theory based on the criterion of truth that lacks sensory not but with intellectual deductive. Reality plays a bigger role in refraining rationalism in that it asserts intrinsic and logic structure hence claiming that truth exist and through this intellect can directly grasp these truths at hand. Basing on this fact, as far as the issue of belief is concerned, Rationalism has termed empiricism as one of the greatest rivals in argumentative perspective. It is out researchers understanding of how rationalism feels about the truth that we realize that the perception takes into account that the reason has precedence over other ways of acquiring knowledge and this uniqueness plays a vital role in pre-modern ways of understanding (Robertson, 2010). Moreover, empiricism is well known as a theory of knowledge that originates from sensory experience within the life of a human being. This is one of the philosophical articulations, which highlight experience norm based on the evidence tabled out as far as rationalism, idealism and historicism is concerned. However, empiricism is a philosophical science that works based on the emphasis. In regards to empiricism, knowledge is taken into consideration as a tentative and probabilistic subject that results into revision and falsification theorem (Rorty & Sellar, 1997). In addition, realism which is an extensive terms, plays a bigger role in stressing out the representation of reality

Sunday, October 27, 2019

Business Communication Systems Evaluation

Business Communication Systems Evaluation Oriston Cunningham Managing Communications, Knowledge and Information Jiggs $ Riggs Super Stores Ltd Table of Content (Jump to) Executive Summary Introduction Discuss the Range of Decisions to Taken Examine the Information and Knowledge needed to ensure Effective Decision taking Assess internal and external sources of information and understanding Justify Recommendation for Improvement References Executive Summary Business Profile Sucker Business Consulting Ltd Has over thirty years of experience which head office is based in New Kingston the business hub of Jamaica with functional offices across the Caribbean. We pride ourselves with the successes of our client base of over 2,500 business; micro, small and medium sized businesses that invest in our trusted professional consulting expertise to put them on a growth path, increase operational efficiency and a sustainable, profitability and revenue trajectory. We are a business of diverse professionals expertise with a focus to eliminate the complexity of problems faced by our client business’ and simplify business solution that will enable them to operate in a diversely competitive business environment. Business Profile JIGGS $ RIGGS Super Stores Ltd JIGGS Super Stores Ltd is a family owned business enterprise that has three outlets located in the parishes of Kinston, Manchester and St. James of the island of Jamaica. Great grant father JIGGS as he was passionately called by his family and friends had started a sales business out his garage in Kingston where he sold clothes, shoes and home accessories to the surrounding communities. The business expanded to the extent where he began to drive around with a delivery van and drop off orders to his loyal customers, he later joined partnership with a returning resident passionately called Riggs hence the name JIGGS $ RIGGS Super Stores Ltd. The first location was on Trafalgar road Kingston, The business grew to the extent where they felt the need to care for other customers thus the two other locations in Manchester and St. James. Both men had died and the business passed on their grandchildren Byron and Simeon who are co-managers of JIGGS $ RIGGS Super Stores Ltd. The recent performances of all three stores have declined steadily for past three years. The young partners tried a number of measures to stabilize the business: cut head count, extend operating hours, Increase longer payment terms and even turn off the air conditioning during operation hours but still operating at a loss and fail to breakeven. The co-managers have called a meeting and finally decided to sell and our client Private Partners (a group of small investors). The current financial position of JIGGS $ RIGGS Super Stores Ltd is as follows. Financial situation of Jiggs $ Riggs Super Stores Ltd INDUSTRY STANDARD July 2014 July 2013 July 2012 July 2011 REVENUE $8400000 $2500000 $2600000 $2400000 COST OF SALES 40% ($3200000) ($1500000) ($1600000) ($1500000) GROSS PROFIT 60% $5200000 $1000000 $1000000 $900000 EXPENSES 30% ($2800000) ($2400000) ($2400000) ($2300000) NET PROFIT 30% $2400000 -$1400000 -$1400000 -$1400000 Introduction Research Background The business environment is regulated by laws which guide organizations and their operations. The ever changing business environment demands the growth and development of businesses due to continuous aggressive competition and changes in market trends, (Klein, 2013). The mergers, acquisitions and take-over of businesses increased due to the growth of medium sized companies in their current markets and expanding their reach to new customers adversely, micro business operators are discouraged due to low financial performance and access to the kind of cash injection that will boost their business outlook. Business acquisition may have some draw backs also advantages both for the investors acquiring the firm and also for the previous owner(s). There are several legal matters that must be addressed in order for mergers, acquisition, take-overs and investments to take place. The paper will focus on evaluating the existing communication systems, designing new communication strategies to inv olve all stakeholders to own and drive the new growth changes necessary to put the business on the path to growth. The repot will look at communication terms and how they can be used by all stakeholders in the business. Germaine to the background of the research questions given, the researcher will establish a consultancy firm and present a case study of a small business Jiggs $ Riggs Super Stores Ltd owned by co-managers Byron and Simeon who have obtained new investors. The main impacts of this study is that for future referencing the researcher will have developed the skills necessary for understanding the relevance of communication within the context of business and how to use it to drive change and the overall growth of the business. Aims and Objectives The aims and objectives of the research paper are as follows: Assess how communications, knowledge and information can be improved within the business including making better use of IT systems. Create strategies to increase personal networking to widen involvement in the decision-making processes in the business. You will develop the communication processes, and improve systems relating to information and knowledge. Assess how managers in the business can improve the planning of their communications processes as well as their communication skills and can make the information and knowledge they gain accessible to other parts of the organization Literature Review (Michael E.D. Koeing) Knowledge Management, (KM) is a concept and a term that arose approximately two decades ago, roughly in 1990. This suggests that on the eve of the twenty first century and the advent of communication technology, managing communication knowledge and information or simply put knowledge management was seen to be very critical to join the bridges and make the links for individuals and business. In the early period of the knowledge management discovery Davenport (1994) originate version of definition: â€Å"He sees information management as specialized skill set which is needed by organizations in the promotion and integrated approach to identify, capture, evaluate, retrieve, and disseminate its intellectual assets; such as databases, documents, policies, procedures, and previously un-captured capabilities of the organization. The definitions though similar in nature are showing information as that vehicle that will bring the message of the organization to internal stakeholders and external stakeholders and will in effect create the intended model for success. Knowledge management from an operational was created within consulting community hence the principles of knowledge management went viral by the consulting organizations to other disciplines. Consulting firms since realized the opportunistic use of the Intranet to create the linkage to narrow the geographically gap and provide a greater dispersion of a knowledge-based organizations. (Steve Denning) make the contrast in his article (What is Knowledge) between the east and west, the interchangeable use of information and knowledge and the cultural preference of intuitive knowledge and the rational knowledge. He made the point that knowledge is sticky though information maybe transferable to other persons. In his discussion, the West depicted to lean more to the rational type of knowledge that is more scientific in nature and disregard on a high scale intuitive knowledge, some may argue the intuitive knowledge is not knowledge at all seeing that it is more implicit and tacit thus the movement of knowledge from person to person has deemed to be difficult which bring into focus the greater importance of rational knowledge. Polanyi (1975), and Nonaka and Takeuchi (1995). Further discussion that seeks to strengthens the soundness of knowledge as to that of information Western analysts (Karl Erik Sveiby) seek to put his mark on the subject see â€Å"knowledge† as wholly tacit (i.e. as capacity in action), consenting to other discussion that explicit knowledge is mere information. The East conform to a more traditional purview to celebrate the importance of the intuitive, when compared with the rational. The Upanishads for speak about a higher knowledge and a lower knowledge, they classify lower knowledge to that of the various sciences. Methodology In the acquisition of information both the qualitative and quantitative research methods were employed in the research execution. Qualitative research according Parkinson and Drislane (2011) is defined as a â€Å"research method using methods such as participant observation or case studies which result in narrative or descriptive account of a setting or practice.†(Parkinson and Drislane, 2011). The qualitative methods that will be used include questionnaire and interviews. Qualitative research interprets data and analyses words and ideas. The second research method that will be used is the quantitative method which is defined as an approach that assesses numerical data which can be used to support qualitative research findings. Quantitative method will be achieved using calculations and statistics gathered through questionnaires and surveys that will be administered to the entity selected for this research. Additional data comes from primary research tools that will be utilized by the researcher includes interviews, questionnaires and observations and the secondary tools that will be used are journals, books, newsletters, newspaper and online articles and documents. The methods selected are most appropriate as they will allow the researcher through the combining of the quantitative and qualitative research to provide the readers with a higher degree of accuracy, easier representation of questionnaire and survey answers. The qualitative method is less costly and more flexible considering from a student researcher context. TASK: 1 Discuss the range of decisions to be taken The type and scope of information used in organizations are complex and vast in variation to the size of the organization and the type of market they are operating in. Information and knowledge needs are also specific to the different functional areas of the organization thus it is the fluid of every working communication system that result into the overall success of the whole. Davenport (1995) knowledge management is a process used to harness, transfer and make the effective use of knowledge. Things to take into consideration are how information is harness and used at the different levels of the organization and the knowledge required, the different systems of information, their relevance, efficiency and effectiveness to the organization. The primary and secondary sources of information Examine the information and knowledge needed to ensure effective decision taking Information is knowledge obtained from investigation, study or instruction. e.g. Intelligence, news and facts or raw data (http://www.merriam-webster.com). According to the tripartite theory; knowledge is information that is processed that is believed, justified and is true. For effective decision making in the organization that will form part of its going strategy in a competitive business environment that is ever changing. The knowledge obtained by the sources of the organization internal and external must be in line with the goals of the business and fit with its different levels, strategic, tactical and operational. Strategic information needs- are customer surveys, market research, and statutory accounts, economic and financial information which are used to make long term decisions and shape the business strategy with overall vision. Tactical information needs- market reach, market survey, producers and consumers price indices, business performance indices, budget reports, consumer complaints departmental reports. Operational information needs- product quality matrix, quality management reports, production outputs, workforce performance, machine and equipment management and performance, batch quantity, economic order quantity. Assess internal and external sources of information and understanding Internal sources of information the means of data collection and compilation from systems internal to the organization which are used to enhance the decision making process and fuse the different linkages that enable the organization to achieve its objectives. Internal information in Jiggs $ Riggs Super Stores Ltd. Are Financial information financial information on the three super stores profits and losses, revenues, cost of sales, rates and taxes, staff wages and salaries. The financial manager and use this information to manage the performance of the business and see that it is profitable. Personnel Information this is the compilation of information of personnel by the business that is made available to them when so requested. Information is used to monitor productivity performance, length of work life, remuneration, productivity rate, health reports, information on training and development. Marketing Information marketing team determine value added products and services and their performances, information is obtained from sales and the informal channel used for innovation and to promote product based on the going trends. Purchase Information information used by the purchasing team to procure raw materials, good, services, and other inputs required to run the business. This team also monitors costs and quality to ensure there is value for money. Administration Information makes the linkages with the business’ workforce on business overall performance, annual budgets and projections, structural changes, changes in market conditions, investment and make the link with external partners and build relationships. External sources of information are sources of information generated externally by agencies or individual researcher or consultant Justify recommendations for improvement In order to improve the communication situation at the business the new management will embark on a communication strategy that is geared to harness greater involvement of all employees and improve their empowerment in the decision making process and make them full aware of the business performance on a more frequent basis. Conduct monthly town hall meeting deliberating on business performance, projections and market conditions Train all employees on how to improve and own the systems of communication Provide regular feedback on employees recommendation and reward where necessary References Davenport, Thomas H. (1994), Saving ITs Soul: Human Centered Information Management. Harvard Business Review, March-April, 72 (2) pp. 119-131. Duhon, Bryant (1998), Its All in our Heads. Inform, September, 12 (8). Koenig, M.E.D. (1990) Information Services and Downstream Productivity. In Martha E. Williams (Ed.), Annual Review of Information Science and Technology: Volume 25, (pp. 55-56). New York, NY: Elseview Science Publishers for the American Society for Information Science Ponzi, L., Koenig, M.E.D. (2002). Knowledge Management: Another ManagementFad?, Information Research, 8(1). Retrieved from http://informationr.net/ir/8-1/paper145.html Stephen Denning, The Springboard: How Storytelling Ignites Action in Knowledge-Era Organizations. Boston, London, Butterworth Heinemann, October 2000. Nonaka, Ikujiro and Hirotaka Takeuchi. The Knowledge-Creating Company : How Japanese Companies Create the Dynamics of Innovation. New York : Oxford University Press, 1995. http://www.kmworld.com/Articles/Editorial/What-Is-/What-is-KM-Knowledge-Management-Explained-82405.aspx http://www.merriam-webster.com/dictionary/information http://www.stevedenning.com/Knowledge-Management/what-is-knowledge.aspx http://www.theoryofknowledge.info/what-is-knowledge/the-tripartite-theory-of-knowledge/ http://www.contentedwriter.com/internal-sources-of-information/

Friday, October 25, 2019

crime and media :: essays research papers

Abstract Crime in today’s society is very drastic. Even though crime has drop within the last 30 years, I still believe that there is a large variety of criminals out there waiting to be caught and punished for the crimes committed. On a large part, some of the crimes that are committed daily have a lot to do with the television programs that can be watched every night by every single individual. Some of the most famous or favorite television shows have an impact on our not so good society. In the following paper I will summarize the findings on the types gender, race, age, and types of crime that criminals and victims go through. Crime and the Media 3 Crime and the Media   Ã‚  Ã‚  Ã‚  Ã‚  America’s Most Wanted is one of the most popular show nationwide. The types of individuals that are featured in this shows are among the most wanted by the FBI, depending on the crimes committed. I do want to mention that basically all of the individuals that where featured in this show tonight are African Americans. To be exact about 75% where blacks, and the other 15% where white, and the last 10% where from Hispanic backgrounds. To me that was very surprising because most of these shows have at least a variety of race and or ethnicity involved somehow.   Ã‚  Ã‚  Ã‚  Ã‚  I also noticed that most of these individuals where African American Males. These individuals range between the ages of 18 to about 30 years old. There was a very old male probably around his late 50’s charged with sexual assault on a minor. This was the criminal case that involved an older White male. According to my findings I did see that the young black males where involved in different crimes. These crimes ranged between Theft, Homicide, Sexual Assault.   Ã‚  Ã‚  Ã‚  Ã‚  I can honestly say that for some reason African Americans commit more criminal offenses, according to the show, â€Å" America’s Most Wanted†. This is one of the crimes that really makes me very upset. This black individual stabs a 14-year-old, female to death, while she was on her way to school. At a different time and day, this individual strikes again, attempting to kill another 14 year old, female. â€Å" Americas Most Wanted†, (Television Series, 2005) Fox. Crime and Media 4   Ã‚  Ã‚  Ã‚  Ã‚  As I was trying to realize why all this individuals commit all this horrible crimes, the only reason that I can come up with is that for some reason the childhood these individuals had scared them for life.

Thursday, October 24, 2019

Algorithm: Flowchart and Trailer Record

Student Name Syed Haseeb Hashmi Registration # FA11-BCS-075 Course Title Design and Analysis of Algorithm Assignment # 1 Submitted To Sir Tanveer Ahmed Siddiqui Due Date 19-03-2013 For Odd Role Number Group Q1. How does a flowchart help a programmer in a program development? Ans. Flowcharts provide the visual representation of a concept and make it clear. A flow chart serves as a blueprint of the program. Flowcharts helps a programmer organize his/her thoughts in a logical order and their presentation.Program development without graphics may be less effective. In big projects it gets difficult to keep things together. Flowcharts provide flexibility, so that you can make changes and restructure the project as you move further and, according to requirement. Flowcharts act as a guide during the analysis and program development phase. Moreover they are also helpful in debugging process. Q2. Draw a flowchart of the logical steps needed to produce a printed listing of all students over the age of 20 in a class. The input records contain the name and age of the students.Assume a sentinel value of 99 for the age field of the trailer record. Sol. Q3. The first 20 records in a data set are to be read and printed. Draw a flowchart for the algorithm to do this job. Make sure that the processing stops after the twentieth record. Sol. Q4. For the employees problem of Question 40 ( even group Q3), we want to count and print the number of only male employees in the age group of 25 to 30. Assume that the input records contain SexCode and Age fields to provide this information. Draw a flowchart for the algorithm to perform this job. Sol. Q5.A set of examination papers, which have been graded with scores form 0 to 100 is to be searched to find how many of them are above 90. The total has to be printed. Prepare a flowchart to do this job. Assume a suitable sentinel value for the trailer record. Sol. Q6. A shopkeeper wants to have a general program for his personal computer, which will prepare bills for each customer as and when he sells goods to them. His idea is that as soon as the customer purchases some goods from his shop, he will supply the description, unit price, and the quantity purchased for each item. s input to the computer. He wants that with this information, the computer should print each item along with its unit price, quantity purchased and the total price. Finally the computer should also print the total cost of all the items purchased by the customer. Assuming a sentinel value of zero for the quantity purchased field in the trailer record, draw a flowchart for the logic to do this job. Q7. Each employee pay record includes the hours worked and the pay rate. The gross pay is to be determined as hours worked times pay rate, and is to be printed for each employee.For all hours worked in excess of 40, the overtime rate, which is 1. 5 times the regular rate, is to be paid. Draw a flowchart for the problem logic to do this. Assume a suitable sent inel value for any of the input fields of the trailer record. Q8. The data file of Question 48 (even group Q7) is expanded to include several sets of data, each requiring calculation of its average. Each data set is followed by a trailer record with a value of -1; however the last data is followed by a trailer record with a value of -2.Draw a flowchart for the logic to perform this task. Solution. Q9. Draw a flow chart to add up all the even numbers between 0 and 100. Before ending, print the result of calculation. Solution. Q10. Draw a flowchart for the logic to find out whether a given triangle ABC is a right angled triangle. Assume that the sides are supplied as input and data. Print the answer as yes or no. Solution. Q11. Draw a flowchart for the logic to convert a number from base 10 to new base using division remainder technique. Solution. Question #2 ) Determine which characteristics of an algorithm the following procedures have and which they lack. Procedure 1 double(n:posit ive integer)// The purpose of this procedure is to double a positive integer while n > =0 do n 2n| Procedure 2 choose(a, b: integers)// The purpose of this procedure is to choose a number from two positive numbers x either a or b| Procedure 3 sum(n:positive integer)// The purpose of this procedure is to find the sum of first 9 digits. sum = 0while i < 10 do sum sum + i| 1.Procedure 4 divide(n:positive integer) // The purpose of this procedure is to find the reciprocal of a positive integer n till 1. while n>= 0 do m 1/n n n-1| Solution Procedure| Input| Output| Precision| Finiteness| Definiteness| Correctness| Generality| 1| NO| NO| YES| YES| NO| YES| YES| 2| NO | YES| NO| NO| YES| YES| NO| 3| YES| YES| YES| YES| YES| NO| YES| 4| NO| YES| NO| NO| YES| YES| NO| b) Modify above procedure so that they satisfies all the properties Procedure 1: if n >= 0 n 2n Procedure 2: if a>0 && b>0 either a or b Procedure 3: i 0 sum 0 while i < 10 do sum sum + i i++ Procedure 4: While n > 0 do m 1/n n n – 1 Question # 3 a) Find gcd(31415, 14142) by applying Euclid’s algorithm. Sol. gcd(31415%14142) gcd(14142%3131) gcd(3131%1618) gcd(1618%1513) gcd(1513%105) gcd(105%43) gcd(43%19) gcd(19%5) gcd(5%4) gcd(4%1) gcd(1%0) = 1 Answer. b) Estimate how many times faster it will be to find gcd(31415, 14142) by Euclid’s algorithm compared with the algorithm based on checking consecutive integers from min{m, n} down to gcd(m, n). Ans.The algorithm for finding gcd based on checking consecutive integers will take 14142 steps, whereas the Euclid’s algorithm took just 11 steps. So, 14142/11 we get 1285. We can say that Euclid’s algorithm is 1285 time faster. Question #4 What does Euclid’s algorithm do for a pair of numbers in which the first number is smaller than the second one? What is the largest number of times this can happen during the algorithm’s execution on such an input? Ans. According to Euclid’s algorithm if the first number i s smaller the second one then we have to swap the both values.We will have to swap only once. Question # 5 a) What is the smallest number of divisions made by Euclid’s algorithm among all inputs 1 ? m, n ? 10? b) Ans. For any possible combination of inputs among 1 ? m, n ? 10, the smallest number of division made by Euclid’s algorithm is 1. c) What is the largest number of divisions made by Euclid’s algorithm among all inputs 1 ? m, n ? 10? d) Ans. For any possible combination of inputs among 1 ? m, n ? 10, the largest number of divisions made by Euclid’s algorithm is 5 for (5,8). Question # 6Euclid’s algorithm, as presented in Euclid’s treatise, uses subtractions rather than integer divisions. Write a pseudo code for this version of Euclid’s algorithm. Ans. If a0 X b2-4ac If X < 0 print ‘no real roots exits’ else X1 -b+sqrt(X)/2a X2 -b-sqrt(X)/2a Return X1 and X2.

Wednesday, October 23, 2019

Cell Phone Technology Essay

Technology had become engrained in our society. Everywhere people are using cell phones, including children and teenagers. Cell phone technology and technology in general have change the way we do everything in our society. Technology has dramatically altered our world. They have become a necessary part of everyday life so much so that it is leaking into the education world as a new tool despite the concern of the negative effects of cell phone technology. There is a new wave in some schools around the United States. There are some districts that are embracing the use of cell phones in the classroom. Some administers have come around to the thinking that the use of this technology in the classroom can be of benefit in the learning setting. There are also concerns that the same technology can be too distracting for students. However, the use of cell phones in the educational world is worth looking at despite some of the concerns that many adults share. Texting has become the preferred method of basic communication between teenagers and their friends. Seventy-five percent of 12-17 year olds own cell phones, which is up from forty-five percent in 2004 (Lenhart, 2010). Phones have no doubt become an indispensable tool in communication for teens. Eighty-eight percent of teen cell phone users are text messengers (Lenhart, 2010). More than half (fifty-four percent) are daily texters. Among all teens, the use of texting has overtaken the frequency of every other form of communication. The concern about the overuse of cell phones is that it may have negative consequences in teenager’s education.  ¼ of text messages that teens send are sent during class. A survey conducted by Beneson’s online poll, polled 1,013 teens- eighty-four percent that have cell phones-show that a significant number of stud ents have information stored on their phones or has texted answers to their friends. The same poll also found teens send 440 text messages a week on average, 110 of them sent during class (Toppo, 2009). For this reason cell phone use is prohibited for use during the school say within most public schools in the United States. Most administrations and teachers feel that cell phone usage is a negative distraction and deterrent to learning. Administrators are often concerned about the inappropriate use of cell phones, which is the reason that there are restrictions of cell phone (according to Obringer & Coffey, 2007, St. Gerard, 2006). Cell phones ringing can present unwanted distraction and for some students, sending and receiving text messages that can lead to cheating (according to Gilroy, 2003). There is also the real possibility of students posting improper pictures is a concern (according to Obringer & Coffey, 2007). However, many are choosing to look at cell phones as a new learning tool in the classroom setting. Over the years we have seen on the news about students posting improper photos and language on social networking sites, which causes administrators and teachers to have a real concern. These concerns that many have are valid, and should be addressed. There have been many cases in which the abuse of cell phones has been a huge problem, but administrators want to take a chance on using cell phones in this setting. The important thing to keep in mind that there is down side, yes, but there is a way to monitor the use of this technology too. PPCD teacher Debra Vela, who has 17 years of teaching experience says, â€Å"Sexting, posting of improper photos and cheating may be a legitimate worry, but the benefits outweigh these negative points.† Students today are referred to as â€Å"Digital Natives† (according to Prensky, 2001). They have grown up with technology and multitasking, and in the habit of quickly processing information (Humble-Thaden, 2011). However, as cell phone technology expands with the possibilities of texting, web browsing and gaming have increased over the recent years and administrators are still worried about the distractions of electronic devices. A survey of students and parents by the group Common Sense Media found that almost seventy percent of schools around the country ban cell phone use during the school day (Schachter, 2009). There are some districts and administrators, though that are beginning to realize the potential of cell phones. It is a part an â€Å"anytime, anywhere† learning movement (Schachter, 2009). This leaves laptops and even smaller netbooks behind, in favor for more mobile, affordable and reliable handheld devices like â€Å"smartphones† that can run such programs as Windows Mobile. â€Å"Technology has finally progressed to where mobile devices are cheap and powerful enough to use,† observes Elliot Soloway, a professor at the University of Michigan (Schachter, 2009). A study of twenty-five mobile learning initiatives worldwide by the Joan Ganz Cooney Foundation Center at Sesame Workshop anointed them the wave of the future. â€Å"Just as Sesame Street help transformed television into a revolutionary tool for learning among young children four decades ago, advances in mobile technologies are showing untapped educational potential for today’s generation,† the report author’s wrote (Schachter, 2009). In 1969, the way children learned changed when Sesame Street aired on PBS. The loved Muppets of the educational show captured the hearts and attention of toddlers. The show taught them the basics of 123’s and ABC’s to the importance of friendships. Before the age of four, children had already learned the basics for their future education by watching this television show. The same is happening today with the use of cell phones. It is drastically changing the face of the way children learn and take information in. Fifth graders at Trinity Meadows (Keller, TX) spent most of their days on their HTC 6800 smartphones, using the GoKnow’s platform. Fifty-five students led the way in a pilot program using the new generation of cell phones and their advanced technology for educational ends. For example, students can draw the solar system on their devices and animate them to show them in real obit. Students can also upload assignments the teacher sends to the server and then the teacher can grade them and submit them back to the student electronically (Schachter, 200). At an early age, children are learning the advantages of technolog y, and will carry it into the future. They are learning to use cell phones as a learning tool, and making the best of what this technology has to offer. Children today have a chance to express themselves creatively and learn in a way that they are familiar with. They are at an advantage since they are already so use to using the technology the world has to offer. â€Å"Allowing children to use cell phone technology in the classroom will provide them with the tools for more creativity to create wonderful projects,† Vela says. This pilot program has shown that the use of cell phone technology in the classroom can be of benefit to the students. Not only that the teachers have a new method of reaching students that they otherwise would not have. With the use of cell phone teachers have new ways of teaching lessons, and the interactivity of these lessons are more likely to reach the minds of students. With the use of cell phone technology in the classroom the children that need a more creative outlet this provides them with platform to do so. Children that need this outlet can create and not be tied down to pencil, paper, marker, c rayons and glue. This allows them to be able to express themselves using the medium that they know best. Using cell phones in the classroom settings as a tool enables them to stay focused and interested in the things that they are learning. Technology is such an important part of everyday life, especially in cell phone technologies. And because of the increasing improvement of cell phone technology has allowed the next generation to use them in a whole new way to learn. Although, there is concern about the overuse of cell phones, the benefits may outweigh the negatives. â€Å"I still think students need to learn the ‘old fashion’ way because what happens if technology becomes unavailable to them? Also students need to be able to use their brains for higher learning,† says Vela. Technology is a wonderful tool to use in the classroom for all age groups. They can benefit from the interactivity of the Internet and all the information that the World Wide Web has to offer students as well as teachers. Children in today’s classrooms have an opportunity that past generations did not have. They have the chance to make a big impression on their lives by allowing themselves to use cell phones to their advantage not their disadvantage. The technology of cell phones has taken over almost every aspect of human activity. Adults as well as children have been consumed by the use of them, and now it has leaked over into the world of education. There are many concerns about the overuse of this technology, but many districts are taking the chance to embrace it and try it out in the classrooms. It has been shown that there are benefits for school children. Although, there is some debate about this issue it is important to remember that there is a need for balance. Reference Lenhart, Amanda. (2010). Teens, cell phone and texting. Pew Research Center Publications. Retrieved 3 June 2012 from http://pewresearch.org. Humble-Thaden, Beth. (2011). Student Reflective Perception of High School Educational Cell Phone Technology Usage. Journal of Technology Studies. Retrieved 3 June 2010 from http://web.ebscohost.com. Toppo, Greg. (2009). Survey: Many teens use phones in class to text or cheat. USA Today. Retrieved 3 June 2012 from http://www.usatoday.com. Schachter, Ron. (2009). Mobile Devices in the classroom. District Administration Magazine. Retrieved 4 June 2012 from http://ww.eric.com. Interview: Debra Vela, PPCD Teacher, 17+ years teaching.