Thursday, November 28, 2019

Parents influence Essays - Childhood, Parenting,

Some people think parents influence their children because they spend much time with the children. But personally, I think some parents have problems to raise the children, and the surroundings around children influence them a lot. Therefore, I believe that parents are not the best teachers. Firstly, parents are not always have a right to raise the children. Some parents violate the children. It is a serious problem. Society has to protect the children from the parents. Sometimes, an official of children protection center visits the parents, and persuade not to violate them. In the worst case, parents and children have to live separately. Parents are not teachers any more in this case. Children also must not imitate such parents as them. Secondly, children do not have enough time to spend time with parents these days. Parents today work a lot. They go back home very late everyday. Many kindergartens open until late time. Some are until seven o?clock, and some are until ten o?clock whatsoever (and so on) . Parents go and bring the children at very late time. The reason kindergartens open late is the change of our society. In the old time, women stayed home. If they have a job, they work inside home. But nowadays, many women work outside. As a result, both parents return home to sleep. When children can make time to learn from the parents? Lastly, children are influenced by their surroundings. They go to school, play with the friends, and get familiar with many people. All of them are teachers for children. For example, children make friends in their school. Children learn how to make friends by themselves. In other words, other children teach it. Parents can not teach how to make friends in their home. Despite children are living with parents, we can not determine that parents are the best teachers. Therefore, I think that parents are not the best teachers. Some parents have very serious problems. Some can not have enough time to communicate with the children. Children are also influenced by other people to whom parents can not change. Altough parents are not the best teachers, they should strive to be the best teachers for their sweet children.

Sunday, November 24, 2019

Free Essays on The Constitution

The Constitution of the United States of America is the base of how our government was formed. It's made up of several amendments, which states the rights of the people of the United States. It was drafted on September 17, 1787 by a group of men who we call today our "Founding Fathers". The Founding Father's opinions greatly influenced the make-up of the constitution. The First Amendment in the constitution, and one of the most important ones, states that congress shall make no law respecting an establishment of religion, freedom of speech, the press or the right of the people to assemble. Our Founding Fathers opinions sometimes conflicted each other which caused tension when writing and signing the constitution. One particular difference several fathers had was the separation of church and state. Thomas Jefferson, a very intelligent and well-respected father, viewed that the separation of church and state was a must in order to have a stable government. In contrast John Dickinson vo ted against the separation of church and state saying that religion in schools was needed. He even refused to sign the Declaration of Independence because of that reason alone. In 1984 the Equal Access Act was put into action, which divided the church and state on a clearer line. It was passed after years of problems with the separation of church and state in public schools. The Equal Access Act says that a religious group must be initiated by students and have a voluntary attendance policy. It also says that a public school and its employees may not sponsor or participate but may pay incidental cost and be assigned solely to maintain discipline. The most controversial court case that has happened related to religious activities in schools occurred in the past year. In Santa Fe, Texas two religious families took the independent school district to court saying that it violated their first amendment after allowing a protestant prayer at a high school footbal... Free Essays on The Constitution Free Essays on The Constitution The Constitution of the United States of America is the base of how our government was formed. It's made up of several amendments, which states the rights of the people of the United States. It was drafted on September 17, 1787 by a group of men who we call today our "Founding Fathers". The Founding Father's opinions greatly influenced the make-up of the constitution. The First Amendment in the constitution, and one of the most important ones, states that congress shall make no law respecting an establishment of religion, freedom of speech, the press or the right of the people to assemble. Our Founding Fathers opinions sometimes conflicted each other which caused tension when writing and signing the constitution. One particular difference several fathers had was the separation of church and state. Thomas Jefferson, a very intelligent and well-respected father, viewed that the separation of church and state was a must in order to have a stable government. In contrast John Dickinson vo ted against the separation of church and state saying that religion in schools was needed. He even refused to sign the Declaration of Independence because of that reason alone. In 1984 the Equal Access Act was put into action, which divided the church and state on a clearer line. It was passed after years of problems with the separation of church and state in public schools. The Equal Access Act says that a religious group must be initiated by students and have a voluntary attendance policy. It also says that a public school and its employees may not sponsor or participate but may pay incidental cost and be assigned solely to maintain discipline. The most controversial court case that has happened related to religious activities in schools occurred in the past year. In Santa Fe, Texas two religious families took the independent school district to court saying that it violated their first amendment after allowing a protestant prayer at a high school footbal...

Thursday, November 21, 2019

Online class is better than in class Essay Example | Topics and Well Written Essays - 750 words

Online class is better than in class - Essay Example One can decide the timing of their sessions and can also have the classes wherever they feel comfortable. With an in class, the timelines are specific, and it is for the learner to fix their schedule to fit the schedule of the school. With an online class, one chooses what is convenient for them. The model also saves on cost especially for the foreign students. Technology has made the world a global village and at the touch of a button, one can access services that would have cost a lot more to acquire. More students are enrolling for classes in the best schools in the world despite them not being in those countries where the schools are located. This is important as it facilitates the dissemination of information and imparting knowledge to a greater number that would otherwise not have afforded it. Studying overseas is expensive in terms of maintenance and transport costs, but with an online course this problem is solved. According to Scott Gibby, in the online class, the students become more knowledgeable (Gibby 174). In the in class, extension of classes is a challenge because most likely one would be interfering with another class. In the online class however, through the agreement of the course instructor and student, the class can be extended for the benefit of the student. The students in an online class take better advantage of the learning tools than students in the in class. In the long run, the students in an online class end up being knowledgeable. In the online class, every student participates actively in class. Critics of this model argue that this mode would affect the performance and esteem of the student. We find that in the in class, there are always students raising their hands to take part in the class discussions. In the online class, every student has to participate in the discussions. Those against the online classes state that forcing a student to take part in a class can be dangerous to their performance. In my opinion, the

Wednesday, November 20, 2019

Pediatric Module Assignment Example | Topics and Well Written Essays - 750 words

Pediatric Module - Assignment Example Proteins are essential for body growth and tissue requirements in infants. There has been much debate over the years on how much proteins the body should take. For infants below 6 months, they should take 1-13gms, 6 momths-1 year- 0.75-14gms, 1-6 years-. 16-24 Gms (Swearingen, 2009). The estimated calories in a pre-term infant is 4.5 -4.9 kcal/g. This has been reached due to the fact that development of new tissues that is, growth and repair needs more energy intake. The estimated protein in pre-term infant is 1per kg per day. Proteins are very important for the normal growth and development. The lean body mass is dependent on the protein intake. Pre-term infants therefore, if given enough protein show levels of enhanced growth. Milk based formula-It contains cow milk as its protein source. It has a fat source which is oil, lactose as the carbohydrate source, a mix of vitamin and minerals. The rationale for use is when the baby shows signs of hunger. Examples is Similac Go and Grow and Entamil. Milk based formula-It contains cow milk as its protein source. It has a fat source which is oil, lactose as the carbohydrate source, a mix of vitamin and minerals. The rationale for use is when the baby shows signs of hunger. Examples are Similac Go and Grow and Entamil. Soy-based infant Formula-It was developed for infants who cannot take formula made form cow’s milk. It contains protein from soybean, oils from vegetables, carbohydrates, vitamins and minerals. The rationale for use is when the infants shows signs of hunger. Examples are; Enfamil R and Similac Go and Grow. Protein hydrolysate formula-This formula contains protein which has been broken down into smaller sizes than the ones found in cow’s milk. It is given to babies that cannot take either milk based formula or soy-based formula. It is used whenever the infants shows signs of hunger. Examples are; Similac and PurAmino. Elementa formula- This

Monday, November 18, 2019

Special Forces Responses to the New Type of Warfare Essay

Special Forces Responses to the New Type of Warfare - Essay Example Despite the fact that the US is affected by the new type of warfare much like other countries, the OCONUS area also presents a challenge for the Special Force in the sense that the UCP stipulation asserts that there is need for the Force to have an effective presence in this region if the new type of warfare is to be handled properly. For many years, the Special Force has had a presence in the OCONUS area but with a focus to protect the US. This has been reflected clearly in the UCP stipulation that limits the ability of the special forces to carry out activities that are created to prevent emerging threats and form strong relationships with foreign militaries that can help combat the new type warfare. This fact clearly shows that the Special Force needs to change tactics in order to operate effectively (Dinter Jr, 2001).The 9/11 attack brought about a change in consideration of terrorism from just a criminal attack to a new type of warfare on a worldwide level. Another issue of conc ern in the 21st century as a form of new warfare is resource characterized as economic-warfare. Such issues require the Special Force to change its tactics to deal with the new type warfare, which encompasses different issues as shown in this paper. For a long time, the Special Force has used a military strategy to infiltrate into hostile land, sea and or air to conduct a variety of operations, many of them classified to them. Most of the operations carried out by the Special Force are determined to tackle terrorism.

Friday, November 15, 2019

Concurrency Control In Distributed Database Systems Information Technology Essay

Concurrency Control In Distributed Database Systems Information Technology Essay Concurrency control is a very important issue in distributed database system design. This is because concurrency allows many transactions to be executing simultaneously such that collection of manipulated data item is left in a consistent state. Database concurrency control permits users to access a database in a multiprogrammed fashion while preserving the illusion that user is executing alone on a dedicated system. Besides, it produces the same effect and has the same output on the database as some serial execution of the same transaction. Concurrency control in distributed system is achieved by a program which is called scheduler. Scheduler help to order the operations of transaction in such a way that the resulting logs is serializable. There have two type of the concurrency control that are locking approach and non-locking approach. In term of locking approach, two-phase lock is widely used and purpose for centralized or distributed database system. Before distributed database systems accessing some part of database, it must adopt a locking mechanism such as each transaction has to obtain a lock. After that part is locked by other transaction, the access request will be block and the transaction who making reauest has to wait. Two-phase locking will cause the deadlock problem. This locking induces high communication cost because of the deadlock problem. Whereas in term of non-locking approach which is divided into two type which are Timestamp ordering (TO) and Serialization Graph Testing (SGT). Timestamp ordering utilizes unique transaction timestamp for determining the serialization order. It divided into three different modes that are basic, conservative and optimistic modes. For Serialization Graph Testing, it has been most attractive log class until 1987 because it is known as the largest known class of serializable logs. There are some limitations that can found in those two approaches. However, there are some solution that can used to solve the problem and will be discuss more detail in the below. 2. Type and the issue of concurrency control 2.1 Two -phase locking Two -phase locking is a widely used concurrency control technique to synchronize accesses to shared item. Each data item has a lock associated with it. The scheduler will first examine the associated lock before a transaction (T1) may access a data item. If there is no transaction holds the lock then the scheduler will obtains the lock on behalf of T1. When another transaction T2 hold the lock, the T1 has to wait until T2 to gives up the lock. The scheduler will give the T1 the lock after the T2 release the lock. Scheduler must ensure that there is only one transaction can hold the lock at a time and only one transaction can access data item at a time. They are two types of locks associate with data item that is read locks and write locks. Figure 1 below show that the transaction T1 and T2 follow the two-phase locking protocol. Figure 1: Transaction T1 and T2 with 2-phase locking protocol However, there is an important and unfortunate property of two-phase locking schedulers is that they are subject to deadlocks. For instances, the classic deadlock situation in which neither of two processes can proceed that is one must release a resource and the other one needs to proceed. Besides that, deadlock also arises when the transaction try to strengthen read locks to write locks. To ensure that there is no transaction is blocked forever, the scheduler needs a strategy for detecting the deadlock. In addition, two-phase locking is suffer from sensible delays due to a node needs to send message to all nodes and must receive acknowledgement from all nodes to discover a deadlock. The messages will exchange between nodes to get decision of transactions commit. The whole system will stop since not discover the deadlock immediately and a natural of distributed system make deadlock treatment very difficult. Moreover, the message that due to commit and deadlock treatment make high traffic on network which is makes need of special kind of networking. Time Figure 2: A spatial schedules of T1 and T2 in state of deadlock T1 wait for T2 to release read lock on y2 T3 wait for T1 to release read lock on x1 T2 wait for T3 to release read lock on z3 Figure 3: A wait-for graph for the spatial schedule of Figure 2 There are two type of graph that show as above which is a spatial schedule of T1 and T2 in the state of deadlock. Another graph show that the wait for graph for the spatial schedule of the figure 2 above. Each node of the graph represent the transaction, the edges represent the waiting for relationship. Furthermore, concurrency control also deals with starvation. The starvation occurs when a particular transaction consistently waits or restarted and never gets a chance to proceed further. In a deadlock resolution it is possible the same transaction may consistently be selected as victim and rolled-back. This type of limitation is inherent in all priority based scheduling mechanism. The wound-wait scheme a younger transaction may always be aborted by a long running older transaction which may create starvation. Besides that, the two phases in locking method also may cause to dirty read and cascading abort. The problem of dirty read is arises when assume T1 and T2 are executed interleave. For this condition, the T1 will get the exclusive locks for record. Supposedly, T1 release locks immediately after doing updates while T2 acquires that locks and does its update. If the T1 fail before it commits due to certain of reason, then it will return value to original value. T2 will continue to its execution with uncommitted data and this will cause an error on the system result. On the other hand, the problem of cascading abort arises when if a transaction aborts. There may have some other transaction already used data from an object that the aborted transaction modified it and unlocked it. If this happen, any such transaction will also have to be aborts. 2.2 Timestamp ordering technique Timestamp is a monotonically increasing variable indicating the age of an operation or a transaction. The larger of the timestamp values indicate that more recent event or operation. Timestamp ordering technique concurrency mechanism were considered suitable for distributed database systems since transaction to be rolled back can be determined locally at each site. It involves a unique transaction timestamps in place of conventional locks. This technique is based on the idea that an operation is allowed to proceed only if all the conflicting operations of older transaction have already been processed. For instance, when a transaction accesses an item the system will check whether the transaction is older than the last one which is accesses the item. If this is the case that transaction proceeds, otherwise ordering is violated and the transaction is aborted. Besides that, the serializability of the transaction is preserved and requires knowledge about which transaction are younger tha n the others. In the implementation of a distributed timing system, each site in the distributed system contains a local clock or a counter. This clock assumed to tick at least once between any two events. This event within the site is totally ordered. If the total ordering of event at different sites, it need to assigned a unique number to each site and the number is concatenated as least significant bits to the current value of local block. Moreover, each message contains the information about the local time of their site of origin at which the message is sent. There are many concurrency control method on timestamp ordering technique. One of the method is basic timestamp ordering (BTO) which is for each data item x, the largest timestamp of any write operation on data item x and the largest timestamp of any read operation on data item x which are denoted by R_TS (x) and W_TS (x) respectively. The basic timestamp ordering technique is easy to distribute and the transaction to be aborted will immediately be recognized when the operation are being scheduled. This type of method will not deal with deadlock problem because the locks are not used and operations are blocked. Hence, an atomic commitment mechanism is necessary to provide the reliability. 3. Improvement of issue concurrency control 3. 1Deadlock resolution The preceding implementation of two-phase locking makes the transaction to wait for unavailable locks. When the waiting is uncontrolled will cause a deadlock. The situation of deadlock can be characterized by wait-for graph, that graph indicates which transaction is waiting for which other transaction. There are three type of general technique are available for deadlock resolution that are deadlock detection, deadlock prevention and timeout strategies. 3.1.1 Deadlock Detection Deadlock detection is a transaction wait for each other in an uncontrolled manner and is only aborted if a deadlock occurs. It can be detected by explicitly constructing a wait-for graph and searching it for cycles. Victim which is one transaction on the cycle will abort when cycle is found and thereby breaking the deadlock. There are a few victim selection criteria will be consider. First is the Current Blocker, this current blocker will pick the transaction that blocked the most recently. Secondly, Random Blocker which is a process of picks a transaction at random from the participants in the deadlock cycle. Third is the Min Locks that is to pick a transaction that is holding the fewest locks. Fourth is the Youngest which is picked the transaction with the most recent initial startup time. Lastly is the Min Work and responsible to pick the transaction that has consumed the least amount of physical resources (CPU + I/O time) since it first began running. In order to minimize the cost of restarting the victim, usually the victim is based on the amount of resource that use by each of transaction on the cycle. Each of the two-phase lockings scheduler can be easily construct the waits-for graph based on the waits-for relationships local to that scheduler. But this is not efficient to characterize all deadlocks in the distributed system. To increase the efficiency, more global wait-for graphs have to combine with local waits-for graph. For the centralized two-phase locking will not have this type of problem since there only consist of one scheduler. In order to construct global waits-for graph, there consist of two techniques which are hierarchical and centralized deadlock detection. For the hierarchical deadlock detection, the database sites are organized into hierarchy with deadlock detector to each node of the hierarchy. Deadlock divided into many sites. Deadlock involve a single site are detected at that. Whereas deadlock involve more than two sites of the same region detected by the regional deadlock detector. On the other hand, one site is designated the deadlock detector in the centralized deadlock detection. Every few minutes, each scheduler has to send its local wait-for graph to the deadlock detector. Then the deadlock detector combines the local graph into a system wide waits-for graph by constructing the union of the local graph. Although both of the technique mention above differ in detail but it involve periodic transmission of local waits-for information to one or more deadlock detector sites. 3.1.2Deadlock Prevention Deadlock prevention is a cautious scheme in which transaction is restarted when the system is afraid that deadlock to be occurring. In the process of deadlock prevention, the scheduler will test the requesting transaction which is name (T1) and the transaction that currently owns by the lock (T2) when a lock request is denied. When T1 and T2 pass the test, T1 is permitted to wait for T2 as usual. Otherwise, one of the two is aborted. There are a few prevention algorithms that are Wound-Wait, Wait-Die, Immediate-Restart and Running Priority. In the Wait-Die prevention algorithm, if a lock request from transaction T1 leads to a conflict with another transaction T2, then T1 started time earlier than T2 and block the T1 otherwise will restarted T1. The deadlock prevention will know as nonpreemptive if T1 is restarted. By this technique deadlock are impossible since there is only one transaction can be blocked by a younger transaction. In the Wound-Wait algorithm, if T1 started running before T2 then restarted T2 otherwise blocked T1. This type of algorithm is known as preemptive which is older transaction run though the system by killing any one that they conflict with and continues waiting onlt for older conflicting transaction. The scheduler must ensure that T1 wait for T2 so that deadlock cannot occur. There is a better approach can be assign priorities to transaction and to test priorities to decide whether T1 can wait for T2. If T1 has the lower priority than T2 then T1 will wait for T2. When they have same priorities, T1 cannot wait for T2 or vice versa. This test will prevents the deadlock to occur since every edge in the waits-for graph T1 has a lower priority than T2. In addition, the Immediate-Restart algorithm also will overcome the deadlock by simply restart T1 since there is no transaction is ever blocked. Besides that, preordering of resources is a type of deadlock avoidance technique that used to avoid restarts altogether. It requires predeclaration of locks which mean that each transaction obtains all its locks before execution. The priority of transaction is the number of the highest number lock on it and the data item are numbered and each transaction request locks one at a time in numeric order. Although this techniques can avoid the deadlock occur but it forces locks to be obtained sequentially which is tends to increase response time. 3.1.3 Timeout strategic In the timeout strategic, a transaction whose lock request cannot be granted is simply placed in the blocked queue. When the wait time exceeds some threshold value then the transaction will restarted. Timeout will restart transaction that involves in deadlocks in the detection strategies whereas in prevention strategic it may also restarted some transaction that are not involved in any cycle. 3.2 Strict 2 Phase Locking (S2 PL) In order to prevent cascading problem and dirty read, Strict 2 Phase Locking mechanism is apply. The executed transaction holds all its lock to the every end until it is committed or aborts. For the dirty read, the executed transaction does not release any of exclusive locks until it commits or aborts. S2PL has important role in the two phase locking problems. In first time transaction it need a lock on a data item, acquires it and all locks of a transaction released together when the transaction terminates and has a few resource wasting. Figure 4 below show the S2PL mechanism. Figure 4: S2PL mechanism 3.3 Ordering by Serialization Number (OSN) method There exists a new method for concurrency control in distributed system which increases the level of concurrent execution of transaction and known as ordering by serialization number (OSN). The deadlock is prevented by this method since it works in the certifier mode and uses time interval technique in conjunction. In order to provide serializability, it combines with time interval technique with short term locks. Scheduler is distributed and the standard transaction execution policy is assumed. The read and write operations are issued continuously during transaction execution. The write operations are performed on the private copies of the data that issue by the transaction. The transaction is certified and its operation will applied to database when a validation test is passed by the transaction at the end of transaction. Otherwise, the transaction will restart if the test validation is not passed. To find the serialization number for a transaction, the largest serialization number of certified transaction will read item x. The largest serialization number of certified transaction which have written item x will record along the data item x which is known as RSN(x) and WSN(x). There consist of four types of short term locks in this OSN method that are R-lock, W-lock, Certified Read lock, Certified Write lock. The R-lock and W-lock normally used when read or write the data item. It responsible to protect the data item forms two conflicting operations of concurrent transaction. Whereas Certified Read lock (CR-lock) and Certified Write lock (CW-lock) are used during the validation test while a transaction is searching for a valid time interval. These lock are held until either the transactions operation are applied to the database or the transaction is aborted. The deadlock of short term locks is prevented by a few steps. Firstly, R-lock or W-lock is obtained at any order. Since transaction do not require any other lock before releasing a particular R-lock or W-lock deadlock does not appear. Secondly, employing the preordering for deadlock avoidance can prevent the deadlock of the CR-lock and CW-lock respectively. Although this method requires the access set of transaction to known in advance but this disadvantage eliminated in the OSN method. This is because CR-lock and CW-lock requires by the time of certification. Besides that, if a transaction requires both CR-lock and CW-lock on data item x the system will grants them both when both of these locks are requires at once. 4. Conclusion In this study, the performance of concurrency control protocol on top of a comprehensively modeled high-speed network is evaluated. It found that there exist of some issue within the concurrency protocol such as deadlock and starvation in the two-phase locking. The weaknesses that occur in another concurrency protocol that is timestamp ordering. By the way, there are also discussing about the effective way to make improvement of the concurrency control by using three types of deadlock resolution to solving the deadlock problem. The deadlock resolution included deadlock detection, deadlock prevention and timeout strategic. Furthermore, a precise definition of deadlock in term of existence interval of an edge is given and these help provide a better understanding of deadlock detection is distributed system. Besides, this paper also discuss the complete specification of a secure version of two phase locking protocol. The interaction between the protocol and the standard failure recovery procedures were discuss and modification to the commit and restart procedures were proposed. 5. Reference Abdou R. Ali and Hany M. Harb, Two Phase Locking Concurrency Control in Distributed Database with N-Tier architecture, 2004. S. M. Wu and D. L. Pan, FUTURE TREND ON CONCURRENCY CONTROL IN DISTRIBUTED DATABASES SYSTEM DESIGN , 1988. Sang H. Son and Rasikan David, Design and Analysis of A Secure Two-Phase Locking Protocol, 1994 Shapour Joudi Begdillo, Fariborz Mahmoudi and Mehdi Asadi, Improving Strict 2 Phase Locking (S2PL) in Transactions Concurrency Control, 2007 PHILIP A. BERNSTEIN AND NATHAN GOODMAN, Concurrency Control in Distributed Database Systems, June 1981 RAKESH AGRAWAL, MICHAEL J. CAREY, MEMBER, IEEE, AND LAWRENCE W. McVOY, The Performance of Alternative Strategies for Dealing with Deadlocks in Database Management Systems, 1987 UGUR HALICI AND ASUMAN DOGAC,MEMBER,IEEE, Concurrency Control in Distributed Databases Through Time Intervals and Short-Term Locks,1989

Wednesday, November 13, 2019

A General Model of Publication :: Publication Process Media SGML Essays

A General Model of Publication Although the medium and the material may differ vastly, essentially the same common process is always involved in publication (Fig. 1). For on-line publications this model makes it possible to automate many of the steps involved (see module on Automated document processing). Figure 1. A model for the publication process. The same general pattern of steps occurs whatever the publication and whatever the type of material involved. This model encompasses all the stages described earlier, but in a somewhat more formalized form. We can summarize the steps as follows: Submission The author submits material to the editor. Acquisition The publisher acquires material. Here we take this to include permissions. Details of the submission are recorded and an acknowledgment is sent to the author. Quality assurance The material is checked. Errors are referred back to the author for correction. Production The material is prepared for publication. This stage includes copy-editing, design, typesetting, printing and binding. Proofs are checked both by the author and editor and any typesetting errors are corrected. For books, an ISBN number is obtained. Distribution The publication is shipped to stores etc for sale. It is publicized so that people know that it is available. The Internet offers advantages for publications of all-kinds. These include:  ¡P  Ã‚  Ã‚  Ã‚  Ã‚  instant world-wide availability;  ¡P  Ã‚  Ã‚  Ã‚  Ã‚  publication features of the World-Wide Web;  ¡P  Ã‚  Ã‚  Ã‚  Ã‚  eliminating distribution costs;  ¡P  Ã‚  Ã‚  Ã‚  Ã‚  reducing production costs - no need to print "hard copy";  ¡P  Ã‚  Ã‚  Ã‚  Ã‚  potential world-wide audience; and  ¡P  Ã‚  Ã‚  Ã‚  Ã‚  "niche"/special interest publishing becomes viable. The World Wide Web expands the traditional notion of a publication in several ways:  ¡P  Ã‚  Ã‚  Ã‚  Ã‚  it is possible to include multimedia elements;  ¡P  Ã‚  Ã‚  Ã‚  Ã‚  it is possible to include hyperlinks to information anywhere;  ¡P  Ã‚  Ã‚  Ã‚  Ã‚  it is possible to draw together information from many different sources;  ¡P  Ã‚  Ã‚  Ã‚  Ã‚  hypermedia books are not limited to the traditional "linear" structure of printed books. They can, for instance, provide several alternative paths through a set of documents, or allow readers to pursue material to whatever depth they wish; and  ¡P  Ã‚  Ã‚  Ã‚  Ã‚  it diminishes the distinction between tradtitional text-oriented publications and other products, such as databases and on-line software. Legal issues Legal issues abound in the publishing business. Although legal issues are not dealt with in detail here the editor should make every effort to keep up to date with issues and changes. Each publication should be carefully checked to ensure that legal risks are minimized. Some of the legal matters involved in publishing include:  ¡P  Ã‚  Ã‚  Ã‚  Ã‚  Contracts Publishers always need to ensure the legal status of material that they publish.