Sunday, August 18, 2019

War With Iraq is Not Necessary :: United States America Middle East

The debate whether America should have a war to Iraq lasted for about 2 years. As far as I am concerned, however, I agree that America should not have a war to Iraq. The first argument that can be presented to develop my position is that the immediate war to Iraq costs for the U.S. will come to about 200 billion, giving the American people heavy economical burden. A good example may be found in many documents and statistics. So far, Congress appropriated approximately&56 billion in April 2003;another &72 billion in November 2003. The total amounts to 2004 is over &150 billion, but will be higher as the bush administration requestz further spending later this year ( National priorities project 3-5 ).As everybody know, the attack on Iraq was not justified under the United Nations (UN), most countries in the world will not spend much money for the war. As a result of it , America people have to pay them. Under such a circumstance, the war affects everyone, not just those directly involved in the fighting. One of the more quantifiable effects of the war is that the financial burden it places on our tax dollars.Tax will be raised inevitably, damaging the developments of other aspects such as business, education and health care. There is another reason for me to choose this statement. I raq affects the economy of America sirously, making ameica have unbelievable high deficit, and making the exchange rate of USA dollars to other currency drops unhistorically. let us consider the American buget status in recent years. What’s happened is that between 1997 and 1998, the US achieved a balanced budget after almost two and a half decades of deficits. The White House estimates the budget deficit for 2003 will be $307 billion, and drop to $304 billion in 2004.Furthermore, the exchage rate for US dollars is weakening continuesly and the Euro is strengthening greatly because of american so massive

Saturday, August 17, 2019

Avg Antivirus

AVG  Ã¢â‚¬â€œ that’s short for  Anti Virus Guard  Ã¢â‚¬â€œ is a PC security package that provides comprehensive protection against the latest threats on the internet today. It is supported and trusted by millions of users across the globe. The authors of AVG provide free antivirus and antispyware protection for home users because for them, it’s a win-win situation   Ã¢â‚¬â€œ you get the protection you need, and they get to know about any viruses you encounter which helps keep the protection comprehensive. Please feel welcome to take a look at our other articles too, the latest are published in the column to the left- along with the most popular essay writers wanted.How to install AVG Antivirus Step 1. Download AVG You can download AVG FREE by  clicking here. When prompted, click the Run button. Notes: * Downloading AVG could take several minutes even with a broadband connection, so be patient and make yourself a cup of tea while you wait. * You are in no way o bligated to pay GRISOFT / AVG anything, so you won’t need to enter any credit card details or even personal details. But there are other versions of AVG, so if you like it you might consider supporting the company’s efforts by purchasing their commercial product. Step 2. Start the InstallationNow that AVG has downloaded, the installation wizard will start. Your PC might ask you if you’re sure you want to run the file, if it does you’ll need to click Run to confirm. Notes: * You’ll have a short wait while AVG extracts. Step 3. The Installation Phase – â€Å"Welcome to the AVG Free Setup Program† First screen:  You’ve just entered the Wizard, so click Next. Second screen:  For the Acceptance Notice, click Accept. Third screen:  It’s a license agreement, read it if you want to, otherwise just click Accept. Fourth screen:  It’s a waiting game! Let the installer do its job and wait patiently.Fifth screen:  St andard or custom installation? Choose Standard, and click Next. Sixth screen:  Activate your AVG Free License. If the user name isn’t your own name, change it. Click next. Seventh screen:  AVG Security Toolbar You may want to install the toolbar if you visit websites that are questionable, or if others use the PC and you are unable to monitor their usage. The Toolbar will alert you when it thinks a website is a potential threat, the downside is it makes your browser a bit slower. If you don’t want to install it, untick the box. Click Next. Eighth screen:  Setup SummaryNothing of interest here. Just click Finish. Nineth screen:  Don’t worry about this one, leave it to do its job and go make yourself another cuppa! (No picture for this one! ) Tenth screen:  SUCCESS! Installation is complete! Click OK. — NOTE: You may have to restart at this point, so be prepared to do so. — Step 4. AVG First Run Wizard First screen:  The First Run Wizard helps set up AVG to suit your needs. Click Next. Second screen:  Schedule regular scans and updates Adjust the time to a time that is more convenient. Your computer will need to be switched on to perform a scan.It’s also worth noting that you can optionally disable this scan if your computer is generally slow to perform – you can run scans manually whenever you feel the need. Click Next. Third screen:  Help us to identify new online threats AVG offer this service free of charge to you and millions of other users, you can help them improve the service by reporting information about potentially malicious websites. If you don’t mind AVG knowing which websites you visit, then enabling this feature shouldn’t be a problem. Otherwise, you may want to leave it disabled.Click Next. Fourth screen:  Update AVG protection Click Next on this screen, and AVG will perform an update. Fifth screen:  AVG Update Whilst it is updating, go make yourself another cup of tea! Once completed, you can click Next. Sixth screen:  Register AVG Anti-Virus Free. Optionally you can register your copy of AVG – but there is no obligation, so if you want to you can just click Next. Seventh screen:  AVG protection configuration is complete You’re done, your AVG security software is now fully installed and protecting your computer from the evils of the internet.

Friday, August 16, 2019

Critical Analysis of Quantitative Research Essay

The researchers in this experiment aimed to â€Å"Investigate the quantitative differentiation of pulmonary dendritic cells in smoker with or without chronic obstructive pulmonary disorder (COPD) to explore the possible role of dendritic cells in smokers suffering COPD† (Yan-wei, Yong-jiang, & Xian-sheng, 2010). Dendritic cells (DCs) are inflammatory cells that are considered to be the promoter of immune responses; knowing this the researchers hypothesized that DCs may play an important role in the development of the disease. See more: how to write an analysis Subjects were broken into three groups based on an illness gradient: (control group, smokers without airflow obstruction, and COPD group as determined by the Chinese Society of Respiratory Disease). Samples of alveolar tissue were taken from these three groups and studied using immunohistochemical staining and immunofluorescence confocal laser scanning. The results from the experiment are portrayed using a one-way analysis of variance, Pearson’s r coefficient, graphs, and scatter plots. The conclusion of the data showed that â€Å"The quantity of the DCs significantly increased in smokers with COPD compared with non-smokers or smokers without COPD† (Yan-wei et al., 2010). A critical analysis of this article received a 31.5. The article was well put together and provided many up to date references as resources to give a better understanding of the research. The authors explained their methodologies in great detail and the production of their data was concise and easy to read. However, the study lacked when it came to representing a diverse population. The study also lacks in terms of providing evidence of the consent of the subjects and the evidence of the governing body of the experiment. The research that was done in this experiment allowed scientist to develop new hypotheses concerning dendritic cells and their role in chronic diseases such as COPD. The links that were made with this research between dendritic cells, lung capacity, and cigarette smoke could potentially be the forefront of new treatments and earlier diagnoses for COPD victims. References Yan-wei, S., Yong-jian, X., & Xian-sheng, L. (2010). Quantitative differentiation of dendritic cells in lung tissues of smokers with and without chronic obstructive pulmonary disease. Chinese Medical Journal, 123(12). Retreived from http://www.cmj.org/Periodical/PDF/200481469383420.pdf

Racism and video games Essay

Video games are not what most people would go to when they think of racial controversy, but every media medium has had their own form of controversy one that happened most recently was the release of a game called Resident Evil 5 which is centered around a guy named Chris Redfield who is basically in a FBI like group centered around killing zombies. As you may have guest this is not the first in the series of the game the series has been around for about 15 years and has had been set in many different countries and such killed many a different zombies. The creators wanted to set this particular game in Africa when the trailer was released the was a racism claim against the game because Chris is white guy going around killing black zombies it was so bad the game release date was pushed backed and slight changes were made Chris was given a black side kick named Sheva Alomar. The second trailer for the game, released on May 31, 2008, revealed a more racially diverse group of enemies, as well as Sheva, a BSAA agent who assists the protagonist. However, designer Jun Takeuchi denied that complaints about racism had any effect in altering the design of Resident Evil 5. Takeuchi commented that the game’s producers were surprised by the controversy. In an interview with MTV, he explained that Capcom’s staff is racially diverse, and acknowledged that various cultures may have had different opinions on the trailer. In an interview with Computer and Video Games, producer Masachika Kawata also commented on the issue, stating, â€Å"We can’t please everyone. We’re in the entertainment business – we’re not here to state our political opinion or anything like that. It’s unfortunate that some people felt that way. â€Å"Well personally as a person of African American decent while me personally is not offended I can see where some people can be somewhat offended but it’s set in Africa what type of zombies do you think Chris is going kill. There just zombies not salves and he is not going around raping and lynching people. I personally think as far as video game African Americans are more or less symbolically annihilated rather than video games having racist tendencies toward us as a race of people. And what I mean by that is you don’t really see that many black people in video game as main characters. There are a few, Cj from Grand theft Auto 3 San Andreas Is one that comes to mind but his game is full of stereotypes about the â€Å"Hood† And I’m not going to sit here and lie I played this game and enjoyed it back in middle school. As far I know there are only a few truly without a doubt racist games one them being Custer’s Revenge In the game, the player controls the character of General George Armstrong Custer, depicted as a man wearing nothing but a cavalry hat, boots, and a bandana, sporting a visible erection. Custer has to overcome arrow attacks to reach the other side of the screen. His goal is to have sex with a naked, large-breasted Native American woman named Revenge. (And Yes This Game Dose Exist but it was released back on the Atari 2600 in the 80’s here a wikiapiea link http://en. wikipedia. org/wiki/Custer’s_Revenge ) Even with this game it’s was not licensed by Atari and nor did Atari have anything to do with its production. The video game medium has become a very big part of media and I do not think that anyone in their right mind would even think of releasing anything racially offensive to anyone if they want to keep making the multimillions that they continue to make. As I stated earlier I would say that video game would more likely be a candidate for social annihilation more anything else I would like to more black people in video games kicking butt and taking names and so far we have a few but not as much as I would like well I guess it’s just more of a personal preference than anything else.

Thursday, August 15, 2019

Family Conflicts

Family Conflicts There are a lot of things that could cause conflict among a family. Some like jealousy, infidelity, and the way you were raised. Jealousy is the natural counterpart of love; when you commit your love to one person, you want an exclusive commitment in return. Anything that threatens that commitment, whether it is another person, a hobby, a job or a situation, causes jealousy. You want the attention of the person you love; when it is taken by another person, activity or thing, you are jealous for the one you love, and jealous of whatever is claiming that person's attention.It can cause the family to fight often which causes family to drift apart which causes emotional problems between the parents and children. Infidelity affects everyone in a family not just the parents. The children take a large blow from it too. It can cause them to act out. Experts say children who learn about parental infidelity react similarly to children whose parents divorce, except the emotiona l responses to cheating are deeper and can have greater, longer-lasting impacts. Children who see a parent cheat lose trust in them because the parent was always telling them to be good.But in the end they were the ones misbehaving. The difference in between parents being raised can have a large impact on the family and how they raise their own children. If a parent was raised in a strict family they might want to pass that to their teaching styles of their own children. But if theres a strict parent and a free willing parent, they may not see eye to eye. That in turn would cause them to fight about how their children should be raised. Which could end up in a crazy custody battle.

Wednesday, August 14, 2019

Technologies are important and helpful in everyone’s life Essay

Computers help people to do such things or tasks easily and faster. Technology has a systematic and organized way of keeping data records, computing numbers, accomplishing a lot of transactions and reports. A system of a library is made to have a fast process of transactions for searching book titles, borrowing books, returning books, computing penalties and generating an accurate report. Aguilar Catholic School, High school department is located at Poblacion Aguilar, Pangasinan. It is a religious school and the religion of all the students and staffs is Roman Catholic and their library is open for them. It has a collection of books, magazines, journals, dictionaries, encyclopedias and other reading materials. The library is still using a card catalogues in searching books and the librarian is still using manual transaction for borrowing, returning and generating reports. Using a manual process is a hard work and because of it the librarian is having a problem to serve each students and faculties who wish to use the library. Aguilar Catholic School is using a record book to track borrowed books from the library. The librarian will write down the book being borrowed, borrower, book information, date borrowed and the date returned. A penalty is given to the borrower if he/she loses the book; the due date of returning of the book has ended. The penalty for losing a book depends on the amount of the book and if the borrower returned the book after its due date the penalty is 10 pesos. The proponent observed a lot of errors occurring in their manual system. The librarian is having difficulty working in the library and the borrowers are having difficulty in searching the book. General Objective The general objective of this project is to develop and implement a LAN base library system with barcode for Aguilar Catholic School to improve their processes and operations that will make transactions and the generation of reports accurate, fast and easy. Specific Objectives The specific objectives of the project are the following: * To design a prototype that will be easy to navigate interface * To develop a library system that will encourage students to use the library as the main source of information. * To develop a system that will be secured by applying user ID and password so that authorized persons can only access the important tasks. * To develop a system that will make use of barcode scanner, thus remove the filling up of different forms, for more rapidly borrowing and returning transactions. * To develop a system that will make cataloguing simpler. * To develop a system that will make searching of the available books and other reference materials in the library easy for the students. * To make a system that will make inventory of books and other reference materials reduce time consuming. * To develop a system that will produce accurate annual and quarterly statistical reports fast. * To test and evaluate the acceptability of the system in terms of functionality, reliability, usability and so on by gathering feedback from prospective users and technical experts. * Scope of the Project Since Aguilar Catholic School doesn’t have any computerized system, the scope of the project will include the system will make use of the barcode technology so the students and employees will only have to use their IDs when making a transaction, which is more convenient. The project include; the following features: Easy to navigate Interface; capability to search for the available title, author and subject of the book; compute the fine of the book when it is overdue; Inventory of books and other reference materials; and the generation of reports that they are making which are annual and quarterly statistical reports. The project will include student, employee’s alumni ledger, which will list all the reference materials that they borrowed. The report for the list of unreturned books will also be included in the project. For the students to search about the availability of books and other reference materials inside the library the researchers will include a LAN-based Public Access Catalog. All information covered within the system is in accordance with the existing book references within the library of the school. The system will only be implemented in the secondary library of Aguilar Catholic School. The system is LAN-based; it can only be accessed inside the campus. * List of Deliverables * User Manual It contains guide and associated images in how program should look like document intended to give assistance to people using a particular system, the proponents will provide a booklet that can guide them in how the system works. * Training Plan Training Plan is to define the strategies, tasks, and methods that will be used to meet the training requirements, the proponents will train the users and explain to them how the system works. The proponents will also observe and gather data while the users are using the new system. * Deployment Plan. Deployment Plan defines how software will be implemented into the organization that will access deployed applications, the proponents will make sure that the system will work properly and it will satisfy the company before letting them to use it, In the deployment plan the proponents will have to use SQL server for the database, cables for connection, barcode scanner, printer and computers for the LAN-based Public Access Catalog and for the workstations of the librarian. * Maintenance Plan It is plan that defines rate and scope of corrective and preventative maintenance for applications or software. Corrective maintenance is a reactive modification of a software product performed after delivery to correct discovered problems, Maintenance Plans are also sometimes known as Standard Operating Procedures. The procedures the proponents will be doing are Recovery Plan and Backup, Recovery plans contain detailed instructions for returning services to a working state. Backup plan or the process of backing up refers to making copies of data so that these additional copies may be used to bring back the original after a data loss event that may be due to failure or unintentionally deleted or corrupted file. CHAPTER II. ANALYSIS OF EXISTING SYSTEM Review of Existing System 0 Manual Library System Of Aguilar Catholic School Borrower Borrower Borrowers Info Book Borrowed Library card Library card Book Info Returned Book Fine info Librarian Newly acquired Books Librarian Penalty Info Reports Figure 1 Context Diagram of Existing System Figure 1 shows the general flow of the existing system within the Library of Roosevelt College. It includes different entities namely: Borrower and Librarian. An also It includes different inputs and outputs. Input are Borrowers info, library card, book info returned book, newly acquired books. Outputs are borrowed book, library card fine info, penalty info, reports. Figure 2. Diagram 0 of Existing System Figure 2 show the detail data process of existing system. First transaction begins with the borrower. Strengths * Manual system can still function without electricity. * A lesser amount of electrical equipment * Users are more familiar with the manual system Weaknesses * time-consuming transactions * Inaccurate information of students and books * Space occupied by the card catalog cabinet and steel drawers. Opportunities * Increase number of enrollees * Increase number that utilized library. * Make faster and accurate transaction using computerized system Threats * Users are not familiar with the computerized system * Computerized system cannot function without electricity * Increase in expenditures, especially in electricity * Files can be corrupted by malware and viruses REVIEW OF RELATED SYSTEMS The UE Library System is a network of eleven libraries, with the Main Library in the Manila Campus as the biggest. There are separate libraries for the Graduate School, CPA Review School, the Colleges of Law, Dentistry and Engineering, the Laboratory Schools and the Archives, as well as special rooms for audiovisual services. There are two libraries in the Caloocan campus, the main library which is the Benjamin G. Chua Jr. Library and one for the College of Engineering. The Main Library in Manila is the hub of the entire system of libraries in the campus. It is the largest among the libraries in the system. It has sections for Circulation, Reserve, CCSS Library, Acquisitions, Cataloging, Reference, Filipiniana, and Periodicals, which are housed on the second, third and fourth floors of the POD-CIT Building. Bibliographic access to the library collections is through the Online Public Access Catalog (OPAC) terminals available in all the libraries. An Online Public Access Catalog or OPAC is an online database of materials held by a library or group of libraries. Users search a library catalog principally to locate books and other material physically located at a library. Users can search by inputting keywords and filter by subject, title, author and sometimes publisher and ISBN number. Additional filter may be according to the type of material, for example if it is a book, journal, magazine, thesis, newspaper, etc. Another filter is by location, if the library system is composed of several libraries like in University of the East. In the proposed system, the proponents will adopt the features similar to OPAC, but it will just be LAN-based. The student’s employees and alumni may search for the information and availability of the book according to the subject, title author, etc. and may choose to filter it by selecting the type of resource material. They may see if the book is on-shelf or not. Students and other borrowers may also use it for easy reference in making bibliography for their researches. University of San Carlos has a computerized library system. The main function of their library system is to correct information. Fast transaction and process in borrowing library materials, the services responsive to the needs of all university sectors relative curriculum and research. They are using barcode technology and swiping I. D in such an easy way to borrow and return book. Their library system has an easy to navigate feature and provide accurate reports such as user statistical report, inventory of book, list of book borrowed, penalty for the month, year, list of book per section etc. In the proposed system, the proponents will adopt the features similar to barcode technology and easy to navigate interface and can give accurate reports and eliminating human errors. Operational Definition of Terms Access Code * A sequence of letters or numbers that has to be read in to the allowed somebody to access to something such a building or telephone notebook. Accession Number * Usually auto number, it is a number assigned by the chief librarian to individual books they have in the library. Barcode Reader * It is an input device used to capture and read information contained in a bar code. Cataloguing * Is the process of preparing a catalog, or of preparing bibliographic records that will become entries in a catalog. Circulation * It engages transaction related to the circulation of periodical, books etc. and book check in and checks out. Computer Network * It is an interconnection of group of computers. Context Diagram * It illustrates the input and output between the systems. Database * Is an application that manages data and allows past storage and retrieval of data Data flow diagram * A process-modeling tool that depicts the flow of data through a system and the work or processing performed by the specific system. Keyword Searching * Allows you to retrieve information in a database by looking for the word or combination of words. Keywords can be used in general or specific, such as title or$ subject Library Card * It serves as a pass to the use of the library and its resources Librarian * Is a person who assists and helps the users in using the library services and manages all the library resources. Library * place where all books, newspaper and other reading materials were placed and a place where students can effectively study and gather information they need. Library card  * A paper card that contains student’s information together with his/ her picture that serves as their pass to borrow a book in the library. Library System * Is a library that comprises of the interrelated, computerized parts such as catalog and circulates that works together to effectively serve the users. Manual System * Processing used amount of transaction without the use of computers Shelf * It is a piece of furniture used to store books and other material which is using in a research Student Number * It is a unique identification of each student in school. SWOT  * Is a tool for auditing an organization and its environment. It is the first stage of planning and helps marketers to focus on key issues. SWOT stands for strength, weaknesses, opportunities, and threats. Strength and weaknesses are internal factor. Opportunities and threats are external factor. CHAPTER III SOFTWARE DEVELOPMENT METHODOLOGY Requirements specification Software Design & coding Integration Testing Deployment Maintenance Figure Modified Waterfall Model The proponents chose to use the modified waterfall model for the development of the software because it is simple and easy to follow. Another reason is that modified waterfall model is suitable when the specification and requirements are clearly stated and static and the project is smaller in size. Since Library systems have the same requirement s as those of any other library systems, it is the ideal model to use. Modified waterfall model also has advantage to go back to previous stage if there are mistakes done in any phase. Requirements Specification One of the most important tasks in the development of is gathering and defining the requirements for the project. Software requirements specification means that researchers should have a basic understanding of what is going to be developed. The proponents conducted several interviews with the company to understand and identify the problems with their existing system and to specify what features they want the proposed system to have. The researchers also did studies about the related systems in order to know the real transactions and to have an idea on how to design the proposed system. Software design & coding Determines the system’s framework to meet the specified requirements. The design defines the major components and the interaction of those components, but the design does not define the structure of each component. The proponents will do major coding in this phase. The proponents will divide the system into subsystems so that coding will be done by small parts and will later be integrated as a whole system. Integration Is the bringing together of the component subsystems into one system and ensuring that the subsystems function together as a system. It is also the process of linking together different computing systems and software applications physically or functionally. The proponents in this phase will now connect together the subsystems into one system. Testing Determines whether the software meets the specified requirements and finds any errors present in the code before deploying it. The proponents will test wither the system is working properly as one system and to detect errors before presenting it to Aguilar Catholic School. Deployment This is the phase of the project where the developed software will be installed, documentation will be delivered, and client training will occur. In this phase, the proponents will now deploy the equipment and the software in the library. They will have to connect the workstation of librarian and LAN base public access catalogue by the use of cables. Maintenance After the project is deployed, unexpected events can happen. This is why the proponents will continue maintenance and support as part of the software development process. This support will become an evolving process and is essential in making sure that the software continues to perform as expected. Figure 4. System Framework of Proposed System Figure 4 shows the details of the system, all its input and outputs which will be part of the system processes. Figure 5. Context Diagram of Proposed System Figure 6. Diagram 0 of Proposed System Testing and Evaluation Procedure After developing the system, the next step is to test and evaluate its acceptability. This section discusses how testing and evaluation is done. Evaluation Instrument The following were criteria of the evaluation instrument which will serve as the basis of the acceptable level of the system. Numerical Rating| Range| Descriptive Equivalent| 5| 4. 51 – 5. 00| Highly Acceptable| 4| 3. 51 – 4. 50| Acceptable| 3| 2. 51 – 3. 50| Moderately Acceptable| 2| 1. 51 – 2. 50| Slightly Acceptable| 1| 1. 00 – 1. 50| Not Acceptable| Content It will test the accuracy of the proposed prototype as well as its up to date contents. Functionality It includes comprehensively the ease from worries or problems in operation, provision for comfort and convenience and easy to understand by the end – users. Reliability In compliance to desire result, accuracy of performance, the system should be able to give the desired result to the possible end-user of the system. Availability The system will be able to perform operations according to the specifications, provision for security requirements and having all the required by the system. Maintainability It includes the testability of the system, ease of being maintained, provision for diagnostic tools and procedure, and provision enhancement. Statistical Treatment of Data In this section the results gathered from testing and evaluation was being interpreted using appropriate statistical tools. The proponents will set a criterion that specifically address to the end users and technical experts. 1 means Not Acceptable; 2 means Slightly Acceptable; 3 is for Moderately Acceptable; 4 is for Acceptable; and 5 Highly Acceptable. The accomplished testing and evaluation forms will be collected for interpreting its result. To compute the mean, Mean (M) = F (x1 + x2 + xn) / n Where F = Frequency of number of time that the given number(x) was chosen by the respondents as rating for a given criterion x1 , x2 , xn = represent any of the numerical rating 1, 2, 3, 4, 5. To compute the weighted mean, WM = ? F (x1 + x2 + xn) / n Where ? F (x1 + x2 + xn) / n = represents the sum of all means (M) of each criteria. n = is the total number of criteria of evaluation.

Tuesday, August 13, 2019

Managing People 2 Essay Example | Topics and Well Written Essays - 750 words

Managing People 2 - Essay Example In addition, flexible working reduces stress level, which increases the productivity of an employee. Many companies big and small are also increasingly adopting flexible working schedules. This is because research has showed that flexible working increases workers productivity thus revenue. Therefore, since the main aim of a company is to increase productivity of workers so as to generate high profits, none would want to be left behind. In this regard, Regus (2012, p.3) reveals that about 80% of small companies report working more flexibly than before. At the same time, Regus (2012, p.3) found out that 68% of large businesses today provide flexible working to their employees. It was also found out that about 72% of international businesses reported having realized increased productivity as a result of flexible working. However, in all cases, Ragus (2012, p.3) reveals that about 68% of businesses reported that flexible working has increased staff productivity. About 63% of companies s urveyed indicated that flexible working increased their workers energy and motivation level pointing that flexible working is principal talent-retention technique. Research also indicates that about 51% of companies intend to employee more freelancers in the future (Ragus 2012, p.3). At the same time, about 80% of companies interviewed believe that there is a likelihood of an increase in the number of employees willing to work part-time, which points at an increasing demand for an environment that allows for flexible working. There are a number of companies in the U.K. that have embraced flexible working practices. BT (formerly British Telecommunications) is one such company in London that provides flexible working environment. BT is one of the largest Information technology and telecommunication companies in the U.K. Since the U.K. government legislated a law to improve flexible working, BT has embraced the practice in totality. The flexible working of BT is based on a number of pr inciples regarding service delivery, recruitment, and motivation. BT acknowledges the fact that many workers have the responsibility of taking care of others such as the elderly, children, the disabled, and the sick. The company also recognizes the fact that, with UK’s aging population, such demand is likely to increase, which will also increase competition for workers throughout the U.K. As a result, many candidates will likely be looking at what employers offering terms of flexible working in deciding on the company to work for (Eurofound 2009). As a result, BT has introduced a number of flexible working practices, which includes compressed time, job-sharing, accrual hours, annualized hours, flexitime, limited working, time out, teleworking and freedom to work. BT reports having reaped a lot of benefits from such a working practice. In this regard, BT reports that flexibility has increased the motivation level of its employees, which has in turn increased their productivity . As a result, the company has been able to register increased profits than ever before (Eurofound 2009). British American Tobacco (BAT) is also another big company in the U.K. that provides flexibility of work. In this regard, BAT allows for part-time and flexible working hours for its employees. Like, BT, Bat also provide leave for its workers to enable them attend to other