Friday, December 27, 2019

Common Psychology Words Based on Greek or Latin Roots

The following words are or have been used in the modern science of psychology: habit, hypnotism, hysteria, extraversion, dyslexia, acrophobic, anorexia, delude, moron, imbecile, schizophrenia, and frustration. They come from either Greek or Latin, but not both, since I have tried to avoid words that combine Greek and Latin, a formation that some refer to as a hybrid classical compound.   Twelve Words With Latin Roots 1. Habit comes from the second conjugation Latin verb habeÃ… , habÄ“re, habuÄ «, habitum to hold, possess, have, handle. 2. Hypnotism comes from the Greek noun á ½â€˜Ãâ‚¬ÃŽ ½ÃŽ ¿Ãâ€š sleep. Hypnos was also the god of sleep. In The Odyssey Book XIV Hera promises Hypnos one of the Graces as a wife in exchange for putting her husband, Zeus, to sleep. People who are hypnotized seem to be in a trance resembling sleep walking. 3. Hysteria comes from the Greek noun á ½â€˜ÃÆ'Ï„Î ­Ã ÃŽ ± womb. The idea from the Hippocratic corpus was that hysteria was caused by the wandering of the womb. Needless to say, hysteria was associated with women. 4. Extraversion comes from the Latin for outside extra- plus a Latin third conjugation verb meaning to turn, vertÃ… , vertere, vertÄ «, versum. Extraversion is defined as the act of directing ones interest outside oneself. It is the opposite of Introversion where interest is focused within. Intro- means inside, in Latin. 5. Dyslexia comes from two Greek words, one for ill or bad, ÃŽ ´Ãâ€¦ÃÆ'- and one for word, ÃŽ »ÃŽ ­ÃŽ ¾ÃŽ ¹Ãâ€š. Dyslexia is a learning disability. 6. Acrophobia is built from two Greek words. The first part is ÃŽ ¬ÃŽ ºÃ ÃŽ ¿Ãâ€š, the Greek for top, and the second part is from the Greek φÏÅ'ÃŽ ²ÃŽ ¿Ãâ€š, fear. Acrophobia is a fear of heights. 7. Anorexia, as in anorexia nervosa, is used to describe someone who doesnt eat, but can simply refer to someone with a decreased appetite, as the Greek word would indicate. Anorexia comes from the Greek for longing or appetite, ÏÅ'Ï ÃŽ µÃŽ ¾ÃŽ ·. The beginning of the word an- is an alpha privative that simply serves to negate, so instead of longing, there is a lack of longing. Alpha refers to the letter a, not an. The -n- separates the two vowels. Had the word for appetite begun with a consonant, the alpha privative would have been a-. 8. Delude comes from the Latin de- meaning down or away from, plus the verb lÃ… «dÃ… , lÃ… «dere, lÃ… «sÄ «, lÃ… «sum, meaning play or mimic. Delude means to deceive. A delusion is a firmly held false belief. 9. Moron used to be a psychological term for someone who was mentally retarded. It comes from the Greek ÃŽ ¼Ãâ€°Ã ÃÅ'Ï‚ meaning foolish or dull. 10. Imbecile comes from the Latin imbecillus, meaning weak and referring to physical weakness. In psychological terms, imbecile refers to someone who is mentally weak or retarded. 11. Schizophrenia comes from two Greek words. The first part of the English term comes from the Greek verb ÏÆ'χÎ ¯ÃŽ ¶ÃŽ µÃŽ ¹ÃŽ ½, to split, and the second from φÏ ÃŽ ®ÃŽ ½, mind. It, therefore, means splitting of the mind  but is a complicated mental disorder that is not the same as a split personality. Personality comes from the Latin word for mask, persona, indicating the character behind the dramatic mask: in other words, person. 12. Frustration is the final word on this list. It comes from a Latin adverb meaning in vain: frustra. It refers to the emotion one may have when thwarted.

Thursday, December 19, 2019

The Case Of Nike Review Analysis - 1334 Words

Case of Nike: Review Analysis 3 Over the decades, globalization, where economic integration across border allow businesses to expand beyond their domestic boundaries. (Malamud, V. Rotenberg, Y. (2010)); has become a phenomenon that is seen across the globe. Businesses large and both small are able to compete, produce, and sell their products without limits to either demographic or geographic factors. This allows company s to enlarge their base, their workforce, their consumers, and therefore their profits. Of course, as we learned, globalization isn t without it s risk that can be apparent in today s world. As globalization does have negative impacts in disregarding needs for developing individuals in those countries, and it may†¦show more content†¦Nevertheless, as we further learned, globalization also has it s risks and occasional threats that can come in conflict with outsourcing for businesses and the like. Nike, Inc., for instance, came under scrutiny and serious allegations including Human Rights: in several of those countries such as Indonesia, because of poor conditions of workplaces, poor wages, forced overtime work, and even child labor in come instances. These allegations have become an example to the World of what globalization, if taken without certain security and countability measures; may effect the individuals heavily and to the point that it turns into a situation of diminishing returns. Criticism went out, where stories of these mistreatments were put out on news publications. Nike, Inc., at the time these situations and concerns were brought up, didn’t put much effort on the patter, stating that these factories were independently owned and they had no idea of that or of manufacturing. However, as time passed, they did come out and instruct the subcontractors to put an end to applying for exemptions, for workers under the legal age. And they later decided to raise the pay higher than the minimum wage that was increased. Similar situations like this, happened in Pakistan and Vietnam as well. Such as child labor, and safety health problems. Likewise, Nike Inc., at first denied and refused to have anything to doShow MoreRelatedNike Markeing1333 Words   |  6 PagesLO3: Identify and analyse the individual elements of the extended marketing mix LO4: Apply the extended marketing mix to different marketing segments and contexts Context The purpose of this report is to apply your knowledge of marketing to Nike (a well known sports retailer). Your report should explain the concepts of marketing and illustrate segmentation, targeting and positioning using one of their products. Finally, you will analyse their marketing and devise a marketing mix for oneRead MoreNike1217 Words   |  5 Pages13/3/2013 Nike, Inc. Cost of Capital 1 Discussion Questions †¢ What is the WACC and why is it important to estimate a firm’s cost of capital? What does it represent? Is the WACC set by investors or by managers? †¢ Do you agree with Joanna Cohen’s WACC calculation? Why or why not? If you do not agree with Cohen’s analysis, calculate your own WACC for Nike and be prepared to justify your assumptions. What mistakes did Joanna Cohen make in her analysis? Which method is best for calculatingRead MoreSwot Analysis : Nike s Shoes1339 Words   |  6 PagesSWOT Analysis: The altered shoes have different qualities, shortcomings, opportunities, and dangers available. One of its qualities is embedded in Nike s piece of the pie. Questionably, Nike is the main games attire and Footwear Company and the main brand over the globe. Hence, it can effectively advertise the tennis shoes in its current business sector. Nike too has a set up worldwide conveyance channel (chain), solid business sector methodology, a pioneer in innovation and configuration and itRead MoreNike CSR Analysis1581 Words   |  7 Pagesï » ¿ CSR Analysis and Impact on Operations Nike has a Code of Business Conduct and Ethics that includes its commitment to the environment and is a signatory of the UN Global Compact. Nike has created a team of sustainability managers led by an independent director. Its environmental goals include producing eco-friendly products and minimizing its environmental impact through the reduction of greenhouse gases, organic solvents and PVCs. Nike acknowledges the difficulty of tracking environmentalRead MoreOutsourcing Practices of Adidas, Converse, Nike, and Reebok1079 Words   |  4 PagesOutsourcing Practices of Adidas, Converse, Nike and Reebok Introduction Apparel and shoe manufacturers continued to offload the more costly yet easily replicated part so their business models to concentrate on brand building, marketing, sales and attaining greater distribution channels globally. These are the pressures all apparel and shoe manufacturers face, and it is particularly challenging in the athletic show industry (Kynge, 2009). Adidas, Converse, Nike and Reebok have been outsourcing productionRead MoreEssay Nike- Ethical Issues1454 Words   |  6 PagesEthical Case Analysis: Nike Introduction Nike was established in 1972 by Bill Bowerman and Phil Knight. These two men were visionaries. The goal for Nike was to carry on Bowerman’s legacy of innovative thinking by helping every athlete reach their goal or by creating lucrative business opportunities that would set the company apart from any competition. This included providing quality work environments for all who wereRead MoreFive Forces Model of Competition Essay915 Words   |  4 PagesCase #3 Analysis Competition in the Golf Equipment Industry in 2009 Raquel Brickerson MGT 495 CRN 22164538 Table of Contents The Five Forces Model of Competition†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..pg.1 Driving Forces†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..pg.2 Marketplace changes†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦pg.3 Strategic Map†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦....pg.3 Attractive or Unattractive†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.pg.3-4 Strategic Map Model†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦pg.5 Read MoreMarketing Analysis : International Marketing1546 Words   |  7 Pagesper their local country’s needs unless they have a deep and though analysis of launching a product as per global needs and considering a global marketing strategy. Companies can manufacture or design certain product which can sustain globally and can be sold internationally, however to launch and market those products internationally is a challenge. Marketing or sale a product globally, would need a research and thorough analysis. Many companies have their own international marketing CEO’s and separateRead MoreValue Chain and Competitive Forces Essay1247 Words   |  5 PagesValue Chain and Competitive Forces: Effects of Information Technology Module 2 Case John Dow ITM524: Fundamentals of Information Technology Management Dr. Somebody Somebody February 4, 2012 Introduction Businesses are established with the sole reason to provide a product or service to a customer with the intend to make a profit. The amount of time, effort, and resources spend should generate a profit. Then, the profit dependsRead MoreNike Swot Analysis1382 Words   |  6 PagesSWOT Analysis Nike Strengths. Very good Leadership is one of Nike’s strengths. Nike is a very competitive organization. Founder and Owner, Phil Knight is often quoted as saying that â€Å"Business is war without bullets.† Nike has a healthy dislike of its competitors such as Reebok and Addidas. This competition in the market results in the company to strive to have to best products and on the market. Nike sponsors the top athletes and gains valuable coverage through the media. Nike has no factories

Wednesday, December 11, 2019

Radio Frequency Identification for RFID Technology-myassignmenthelp

Question: Discuss about theRadio Frequency Identification for RFID Technology. Answer: Introduction RFID or radio frequency identification is an advanced technology that incorporates electrostatic or electromagnetic coupling in radio frequency portion belonging to the electromagnetic spectrum for unique identification of objects, animals or people. Organizations are adopting this technology in place of barcodes (Rajaraman, 2017). This report discusses about the working mechanism of RFID. It points out the various categories of RFID tags. It talks about the business as well as technical issues that are solved by using RFID technology. This report describes the implementation of RFID in one organization and it also presents the use of RFID in various market places. Working of RFID Technology RFID technology utilizes radio frequency for the purpose of identifying objects, collecting information about the objects and entering the details in the system by an automated process. The three main components of RFID technology are the RFID tag, RID reader and antenna. An RFID tag consists of an antenna as well as an integrated circuit (Hutter Schmidt, 2013). These are used for the purpose of transmitting data to RFID reader. The RFID reader converts radio waves into usable data. The RFID tags can be activated by radio signals. The data that is collected from the RFID tag is then transferred to a host system by using a communication interface. The data is stored in the database of the system for further analysis. The role of RFID tag is to carry data and it contains an antenna along with micro chip. The reader can also be referred as interrogator. Types of RFID Passive RFID: This type of tag does not contain battery. Here the energy is transferred from reader via radio frequency. The power of the tag is available only within the field of the reader. It range of communication is short in this type of tag (Rajaraman, 2017). It has a limited range because the radio wave is reflected from tag to the reader. It is able to read as well as transfer sensor value when the tag is powered by the reader. Semi-passive RFID: This RFID tag incorporates the main features of the active tag. It consists of a power source like battery to power the chip. This energy that is captured can be used for the purpose of backscattering. The communication or read range is more than that of passive tags. Active RFID: This tag consists of battery or power source. Tag power is available on a continuous basis. It has got high signal strength from the RFID tag to the reader. The range of communication is 100 meter or more. Active tags are mostly used in large objects. Its data bandwidth is higher than the bandwidth of passive tags. Business and Technical Problems solved by using RFID Technology RFID technology has played a significant role in solving the issue of object, human and animal tracking. Assets that are present in warehouses can be tracked in a simplified manner. The process of inventory management has improved by attaching RFID tags to the goods that are present in the factory (Fan et al., 2014). This technology has helped in solving the problem of over stocking as well as under stocking of goods. It has helped in providing security to the stocks and controlling the stock quality. RFID tags can be used for automating the process of toll tax payments by attaching the tags to the vehicles (Kalantri et al., 2014). Effective animal monitoring is made possible by utilizing RFID tags. It acts as a significant tool for tracking the movements of the animals and determining their characteristics. RFID technology has improved farm management in an effective manner. Missing goods and products can be tracked by using RFID technology (Shin Eksioglu, 2014). RFID technology is responsible for producing accurate results as it does not involve human interventions. RFID tags have been able to improve organizational efficiency. Barcode and RFID BARCODE RFID Barcode has a set of data that can be scanned and converted to numeric codes. It requires line of sight. It does not require line of sight. RFID tag utilizes radio waves for tracking as well as identifying goods. The read range varies from inches to feet. Passive RFID can read up to 30 feet and active RFID can read up to 100 feet. Barcodes can identify one kind of item. It has the capability to identify every item. Optical laser technology is used. Radio frequency technology is used. Human intervention is required for scanning barcodes. Scanners are fixed and it does not require human labor. It cannot be updated. New data can be updated. Damaged tags will not work. Hence it is less reliable. It has high reliability. Table 1: Comparison between Barcode and RFID (Source: Lotlikar et al., 2013, p. 821) RFID and QR code QR Code RFID This technology requires line of sight. Line of site is not required. Read range is from inches to feet. The read range is much more than the read range of QR code. Human intervention is required. No human intervention is needed. Data cannot be updated. It can only be read. Data can be updated. 30 % data can be recovered from damaged tags. It is less reliable than RFID. It has high reliability. Table 2: Comparison between QR code and RFID (Source: Lotlikar et al., 2013, p. 821) RFID Limitations Security: RFID tags are susceptible to security threats and attacks. Attackers can gain unauthorized access to and modify the information on the RFID tags. There can be other attacks like virus and side channel attacks. Strong security measures like encryption of the data in the tags can overcome this limitation. Collision: Signal collision can take place while scanning several RFID tags at the same time. Use of anti-collision algorithms will prevent this issue. Cost: The cost of RFID technology is much more than that of QR codes and barcodes (Lehpamer, 2012). Organizations incur huge cost in setting up this technology. Passive tags are less expensive than active and semi active tags. Complex design: The installation procedure of RFID technology is unique. RFID technology has reader and tag. It has a complex design and working mechanism. Implementation of RFID in Walmart Walmart has implemented RFID technology in the year 2003 for improving its supply chain operations. Initially it had used RFID for tracking pallets of the merchandise present in its supply chain and warehouses. Walmart is able to track the movement of its products in an accurate manner by deploying RFID technology. It makes use of RF tags for keeping an account of the shelved stocks. RFID tags are able to provide real time information about the store shelves. RFID technology has been able to reduce the inventor cost of Walmart (Shin Eksioglu, 2015). Implementation of RFID has improved the supply chain efficiency of Walmart. Walmart was able to reduce its out of stock level by 16 per cent and reduce excess inventory. Walmart was also able to achieve operational improvements and WIP data management. Use of RFID in Market Places Retail RFID tags can be attached to the products in the retail store. It will help the store to prevent any shoplifters to take away any product without payment and enhance the security level of the stores. It will enable the employees to locate the products and record the quantity (De Marco et al, 2012). RFID tags are implemented in retail industry for automating the inventory tracking process and enhancing the operational efficiency of the retail stores. Banking Banking sector has achieved high level of data accuracy by implementing RFID technology. It has improved the level of customer service and simplified the payment procedure. RFID tags will help the banks to keep track of laptops and other assets (Zhu, Mukhopadhyay Kurata, 2012). Data security of the banks can be improved by implementing RFID technology. Healthcare Industry The Healthcare industry is able to keep a track of prescription drugs on the basis of expiry date and many other important details like lot number (Manzoor, 2016). Patient safety can be enhanced by using RFID technology. RFID bands can be scanned for getting accurate details about the patient. SCM RFID technology has been able to improve the accuracy as well as timeliness of the inventory data. It has reduced the inventory cost of the organizations (Fosso Wamba, 2012). RFID tags have enhanced the efficiency of supply chain management by accurate monitoring of the movements of goods and products throughout the supply chain. It has simplified the procedure of asset tracking by using radio frequency. Conclusion It can be concluded from this report that RFID technology can be implemented in various industries like healthcare, banking and retail for enhancing operational efficiency and security standards. This report said that RFID is more reliable than barcode and QR code. It also discussed about certain limitations like security issues and high cost of RFID tags. This report explained how the RFID works. It also explained few business and technical issues like asset tracking problem that can be solved by RFID technology. References De Marco, A., Cagliano, A. C., Nervo, M. L., Rafele, C. (2012). Using System Dynamics to assess the impact of RFID technology on retail operations.International journal of production economics,135(1), 333-344. Fan, T. J., Chang, X. Y., Gu, C. H., Yi, J. J., Deng, S. (2014). Benefits of RFID technology for reducing inventory shrinkage.International Journal of Production Economics,147, 659-665. Fosso Wamba, S. (2012). Achieving supply chain integration using RFID technology: the case of emerging intelligent B-to-B e-commerce processes in a living laboratory.Business Process Management Journal,18(1), 58-81. Hutter, M., Schmidt, J. (2013). Radio Frequency Identification. Kalantri, R., Parekar, A., Mohite, A., Kankapurkar, R. (2014). RFID based toll collection system.International Journal of Computer Science and Information Technologies,5(2), 2582-5. Lehpamer, H. (2012).RFID design principles. Artech House. Lotlikar, T., Kankapurkar, R., Parekar, A., Mohite, A. (2013). Comparative study of Barcode, QR-code and RFID System.International Journal of Computer Technology and Applications,4(5), 817. Manzoor, A. (2016). RFID-Enabled Healthcare.International Journal of Information Communication Technologies and Human Development (IJICTHD),8(2), 26-46. Rajaraman, V. (2017). Radio Frequency Identification.RESONANCE, 549. Shin, S., Eksioglu, B. (2014). Effects of RFID technology on efficiency and profitability in retail supply chains.Journal of Applied Business Research,30(3), 633. Shin, S., Eksioglu, B. (2015). An empirical study of RFID productivity in the US retail supply chain.International Journal of Production Economics,163, 89-96. Zhu, X., Mukhopadhyay, S. K., Kurata, H. (2012). A review of RFID technology and its managerial applications in different industries.Journal of Engineering and Technology Management,29(1), 152-167.

Tuesday, December 3, 2019

Rita Hayworth and Shawshank Redemption Essay Example

Rita Hayworth and Shawshank Redemption Paper The story of Rita Hayworth and Shawshank Redemption starts in 1947 when Andy Dufresne arrives at Shawshank prison. Unlikely the other convicts Andy is not a hardened criminal. He is a soft-spoken banker convicted of killing his wife and her lover. Andy claims he is innocent. Soon after he arrives at the prison The Sisters, a gang of prison rapists led by Bogs Diamond, turn their attentions to Andy. The story is narrated by Red. He is the guy who can get stuff. Red his well known for being able to get almost anything into Shawshank prison, and this is the reason that Andy approaches him. Andy has kept himself to himself, but one day approaches Red in the exercise yard. Andy used to enjoy rock-carving, and wishes to continue to do so inside the prison, now that he has plenty of time on his hands. He asks Red to get him a rock hammer. Red is a little suspicious at first, thinking this may be a lethal object (which it is). However he understands Andys request a little more when the hammer arrives. Andy used the hammer to shape himself rocks he finds in the exercise yard. He is aiming to complete an entire chess set. Andy and Red develop a very respectful friendship. We will write a custom essay sample on Rita Hayworth and Shawshank Redemption specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Rita Hayworth and Shawshank Redemption specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Rita Hayworth and Shawshank Redemption specifically for you FOR ONLY $16.38 $13.9/page Hire Writer After some time Andy comes into the movie theatre and asks Red to get him a poster of Rita Hayworth, who appears on the movie screen that Red is watching (This is the only reference to Rita Hayworth in the story). Red notices that Andy is uncharacteristically nervous and excited when asking for the poster. The prison agrees to provide prisons to tar the roof of a building. Obviously prisoners are keen to leave the prison even if it means hard labor. Red, being the influential man he is, discretely arranges for the guards to ensure that Red and his pals get the work detail. Whilst on the roof Hadley, the chief of the guard, is telling the other guards how he has been left an inheritance by his wealthy brother. The other guards are enthusiastic for him, however Hadley complains about the tax he will have to pay on the inheritance. Andy approachs Hadley, who nearly throws him off the roof. Buy Andy continues and explains that there is a loophole which allows Hadley to keep his entire inheritance, without paying tax. Andy offers to complete the paperwork in exchange for some beers for himself and his fellow work detail prisoners. This is a major event in the story as Andy become well regarded with his inmate friends and the guards. As with his life outside, Andy becomes a successful financial advisor inside the prison. The prison employees use Andy to complete their tax returns, loan applications and other similar financial tasks. In return the guards get Andy protection from Bogs and the other Sisters. Andy is also able to occupy his cell on his own, unlike most other inmates. In the book Andy does share his cell briefly with an Indian called Normaden. He soon leaves though, mentioning a bad draft in the cell whilst he was there. Normaden does not appear in the movie. In the movie all prisoners have their own cell. When Brooks the librarian is paroled, Andy takes over the librarian role. Andy sends weekly letters to the state senate asking for funds for books. The other inmates and guards think he is wasting his time. The state only spends prison money on bars, not books. Andy receives no response to his letters, until one day he does receive money (books in the movie). Andy then starts to write twice weekly. Andys persistent work grows the library greatly. Andy helps several other inmates to get their high school diplomas and degrees. One of the many wardens in the novel (there is only one Warden, Norton, in the movie) starts a program called Inside-Out, in which inmates work outside the prison for very low wages. Other companies cannot compete with this low-cost labor, and often bribe warden Norton not to bid on contracts. This cash has to be laundered, and Andy does this for free, for continued protection in the prison, and the sake of the library. A new prisoner called Tommy comes to Shawshank prison. Tommy tells another prisoner, who tells Andy, that Tommy had had a cellmate at a different prison who bragged about killing a rich golfer and some hot-shot bankers wife, and the banker getting jailed for it. This is clearly the real killer of Andys wife. Andy sees the possibility of a new trial since this evidence would prove his innocence. Warden Norton dismisses the story, telling Andy to ignore this made up story. When Andy argues with him warden Norton sends Andy to solitary confinement, to remind Andy of his place in the prison hierarchy. Norton interviews Tommy about the information he has. Norton is concerned about loosing Andy, and makes a deal with Tommy. Tommy will not talk of the information he has, and he gets transferred to a minimum security prison. In the movie Tommy is shot by guard Hadley. When Andy returns from solitary confinement he finds Tommy gone, along with any chance of Andys freedom. In Andys disappointed state he talks at length with Red. Andy tells Red of his dream of moving to Mexico, and settling in the small town of Zihuatanejo on the Pacific coastline. Red starts to worry about Andy, stating that he is talking funny. Andy tells Red of a town in Buxton in Maine, that was a special place for him and his wife. Andy tells Red that when he gets out of Shawshank, to locate a specific tree in a specific field in this town. Several weeks pass, and on one morning Andy is discovered missing at roll call. An initial search does not find Andy. The warden is looking in Andys cell when he discovers a poster covering the wall, now Raquel Welch. The warden removes the poster and finds a man-sized tunnel cut through the walls of the prison. Andy had been spending his evenings, since getting his rock hammer, slowly digging through the prison walls. On the night of his escape, once through the prison walls, Andy broke into a sewage pipe and crawled 500 yards through it, and finally came out into a ditch beyond the grounds of Shawshank prison. Andy was free. A while after Red gets a blank postcard from a small town in Texas (McNary), near the U. S. -Meixco border. Red knows this is Andy letting him know all is well, and he is heading to Mexico. Red is paroled and begins to make a life for himself outside of the prison. Red hick-hikes to Buxton, and finds the field and tree Andy has told him about. Red finds a buried tin, with a note from Andy, and a sum of money. Red violates his parole and catches a bus to Mexico, hoping to find his friend Andy. The novella ends here, but the movie has a final shot where we see Red waking across a sun drenched beach in Mexico, towards Andy who is working on his boat.