Tuesday, December 24, 2019

Imtiaz Super Market - 2448 Words

IMTIAZ SUPER MARKET, a renowned super market, was formed in the 1955s as a small grocers outlet in Bahadurabad by Mr.Hakim Khan Abbasi, father of Mr. Imtiaz Hussain Abbasi .Imtiaz II came into being in 2003 located in Main Shahrah-e-Faisal. The outlet trusted for providing its customers with â€Å"Safe, Healthy and Qualitative product and services† has been functioning for approximately 55 years and during these 55 years given it’s widely applauded efforts to uphold quality, quantity and content it has rapidly introduced new product items. Their devotion, determination, dedication and diligence made it possible to win the hearts and minds of people who would visit their super market in its early days. Their elders set a new standard in†¦show more content†¦* All use News papers, internet, pamphlets and booklets because it contains detailed introduction about the business and its products. * Metro, Ary and Makro are in a wholesale business whereas Naheed and Agha are retailers. * They all have teams for customer service * Hire logistics for transportation * Focus on proper shelf placement of product SUPPLIERS Increase in raw material prices will have a knock on affect on the marketing mix strategy of an organization. Prices may be forced up as a result. A closer supplier relationship is one way of ensuring competitive and quality products for an organization. At Imtiaz they deal with their suppliers with integrity and fairness and treat them as partners in their operations. 1. Imtiaz has the basic strength of low prices with high quality. 2. Serving the customers with the wide variety of products 3. Having the strong retailing business background. 4. Best location for such kind of big store and also covering many areas. 5. Efficiently using the place and excellent layout 6. Friendly and co-operative staff 7. Computerized data base system which helps both customer and Imtiaz 1. Although the location for a big store is suitable but it is not suitable for all customers living in other areas 2. No parking facilities for the customers 3. Only deals in retailing 4. Absence of some products 1. Expansion in major cities and areas 2. Online shopping isShow MoreRelatedStrategic Planning on Imtiaz Supermarket2912 Words   |  12 PagesImtiaz Superstore Strategic Deficiency | Human Resource Management | Marketing / Brand Management | Supply Chain Management | IT/E-Commerce | * High Employee Turnover * Continuous Recruiting * Lack of Training * Stressful Environment | * Improper Marketing Campaign * Instable Pricing | * Warehousing * Improper Merchandising * Poor Fixtures amp; Density * Lack of Space | * Official Website * Lack of electronic cash counters * Lack of Retail and Inventory managementRead MoreQuality of the Sunrise Bread Products1192 Words   |  5 Pagescite area Karachi. The SUNRISE BREAD Company was established in 1996. It is one of the prominent bread manufactures in Pakistan. They took 30 to 35% of the market of all bread products in KARACHI. After the beginning stage of their operations they gradually resilient their base and struggle to categorical arrive into the international market. SUNRISE OBJECTIVES: They have a mission to provide admirable and superior quality by following all the principles of their institute that support to accomplishRead MoreDeveloping a Marketing Plan to Introduce a New Product or Service for Tausif Iternational3170 Words   |  13 Pages TAUSIF ITERNATIONAL. GROUP NAME: THE XPLORER MKT 201 Section 3 Autumn 2008 Submitted to Nawshad Naqueeb Submitted by Tanvir Hasan. ID: 0720005 Tahsin Tasnim. ID: 0720034 Tazina Afrin Nisha. ID: 0720061 Ahmad Imtiaz Sobhan. (Group coordinator) ID: 0720078 A.K.M. Ehsanul Hossain. ID:0720248 Progga Parmita Anika. ID: 0630014 Date of Submission November 24, 2008 [pic] School of Business INDEPENDENT UN I V E R S I T Y, BANGLADESH Read MorePage: Meat and Beef Products8094 Words   |  33 PagesEconomic Factors: 2 Social Factors: 3 Technological Factors: 3 PORTER’S FIVE FORCES MODEL 4 SWOT ANALYSIS OF K amp; N’S 4 Strengths: 4 Weaknesses: 5 Opportunities: 5 Threats: 6 TARGET MARKET AND SEGMENTATION 6 POSITONING 7 Perceptual Maps 7 Brand personality 8 COMPETITOR ANALYSIS 8 METRO: 8 CITY SUPER MART: 9 LOCAL BUTCHER SHOPS: 10 PRICING 15 PLACEMENT 18 PROMOTION 18 STORY BOARD OF OUR ADVERTIZEMENT: 20 Use of Red color in our Ad 23 Jingle 23 Analysis of Jingle: 24 ConclusionRead MorePromotion Mix of Pepsi16533 Words   |  67 PagesAnnual Report 2010 Askari Income Fund Invest with AIM A Wholly Owned Subsidary of Title Inside vision The leading quality investment advisor providing excellent returns in a dynamic market place, based on the superior expertise of a committed team of professionals who value “service to the customer” Askari Investment Management Limited Good people. Sound advice. Great returns. contents FundÂ’s Information 01 DirectorsÂ’ Report 03 Fund Managers Read MoreShaheen Air International14539 Words   |  59 PagesNETWORK OF CHANNELS TO REACH END CONSUMER 5 DOMESTIC ROUTES 6 INTERNATIONAL ROUTES 7 PRODUCT LINE 7 PRODUCT LIFE CYCLE (PLC) 11 SERVICE FACILITIES 11 INDUSTRY ANALYSIS 12 MAJOR COMPETITORS 15 MARKET SIZE AND MARKET GROWTH 18 PAKISTAN/SOUTHWEST ASIA TRAVEL GROWTH FORECAST 20 PAKISTAN DOMESTIC MARKET CAPACITY, TRAFFIC YIELD 20 AIRLINE OPERATING COSTS 21 REASONS FOR FAILURE 22 CURRENT ISSUES IN THE COMPANY 23 ANALYSIS OF EXTERNAL ENVIRONMENT 24 ECONOMIC FACTORS 24 GDP 24 WORLD OIL PRICESRead MoreEntrepreneurship in Pakistan20067 Words   |  81 Pagesopportunities for entrepreneurship. In Pakistan innovation and risk taking is severely inhibited by the intrusive role of government in the marketplace. From the early days of planning when protection and subsidy polic ies determined winners in the market place, entrepreneurship has been diverted to seeking government favours. Government economic policy also seeks to promote growth through a basically ‘mercantilist’ approach where domestic commerce through seriously neglect is heavily regulated

Monday, December 16, 2019

If You Read Nothing Else Today, Read This Report on Ielts Essay Samples of Band 5

If You Read Nothing Else Today, Read This Report on Ielts Essay Samples of Band 5 A number of authentic reading texts cover the scope of text types found in the true exam. Another great supply of reference is the band 8 onwards essays that you're able to find easily on the web. The topics are somewhat more specific and the academic level is greater. Improving your grammatical accuracy is most likely likely to be a slow and gradual practice. What's Truly Going on with Ielts Essay Samples of Band 5 After the structure is correct, using the language is slightly more advanced, and the thought procedure is thorough, obtaining a Band 8 or higher for an essay should not be an issue. There's a lesson here that explains the significance of identifying the task to be sure you fully answer all regions of the question. To take a very simple example, if you're writing about the pros and cons of something, you might wish to have one paragraph about each. For numerous reasons, some folks believe that music is crucial, and the next essay will explain them in details. Whether you've got to create a paper of one-of-a-kind flawlessness, just purchase an essay here and our writers will provide help. Even if today you think you're a lousy writer, you can learn how to deal with your essay and make it far more efficient. Meditate on it using a commentary. The academic writing isn't like your usual essay writing where you are able to think while writing. You are going to be surrounded by writing professionals throughout the plan of order placement, and the moment you opt to purchase essay and pick an allocated writer, things will get even more exciting. This lessons supplies you with grammar ideas to answer these questions. If you've got a writing teacher obviously this will help since they can examine your work. Facts, Fiction and Ielts Essay Samples of Band 5 You should understand the 4 marking criteria employed by the examiner to fulfil the prerequisites of the score you desire. Due to your essay approaches which helped me to get the wanted score. If you're a professional hoping to acquire the proper IELTS score to land that dream job, you're in the most suitable spot. When you're graded, you will be provided a score for every one of these, and this will then be averaged. You need to show you can use a wide selection of s entence structures and have a high amount of accuracy. Hopefully it's also going to contain some fantastic ideas (i.e. vocabulary). Using tons of new words you don't understand how to use properly could make your writing worse, so be mindful! Only use words you learn how to use properly. The Pain of Ielts Essay Samples of Band 5 There's no longer enough organic resources to sustain current levels of financial growth. It is better to safeguard the environment but it needs to be done after providing the necessities to the people. Around the planet, children often utilize computers from an extremely young age. For instance, some children utilize the web to find information on distinct subjects. To conclude, reading is indeed a superb habit for IELTS candidates. Both versions are written by a seasoned IELTS trainer. To summarize, too little exercise and having an unhealthy diet are the principal reasons for folks to put on weight. Thosein favour of prohibiting people from getting involved in dangerous sports have a tendency to center on the risk element. Therefore, concerns over the security of extreme athletes are very irrelevant. In addition to that, individuals should quit taking the ready meals containing chemical ingredients, particularly, saccharin. The Upside to Ielts Essay Samples of Band 5 Furthermore, there are a couple more scenarios in which music is imperative. Beside pop music, the youthful generation nowadays expose to a variety of different sorts of music. Since my parents are music-lovers and in addition, they have very fantastic tastes, I was exposed to the previous kinds of music at a rather young age. The Hidden Gem of Ielts Essay Samples of Band 5 To conclude, it is obvious that computers are now part of our routine life. From a personal perspective, computers can help young individuals to learn more regarding the world.

Sunday, December 8, 2019

Security Vulnerability of Health Care Industry

Question: Discuss about the Security Vulnerability of Health Care Industry. Answer: Introduction: The second largest telecom company of Poland, Netia suffered a cyber-attack, where security to the companys network has been breached and personal information carrying some major confidential data of its clients and users has been leaked online (Waqas 2016). The incident took place on July 7th, 2016, following the incident; website of the company was down for the entire day and night. It has been stated that the attack has been carried out by a Ukrainian hacker. The hacker has gained access to 14 GB of clients and users personal data. Impact of Attack The main victims of the attack are the clients and users of the company Netia. Some of their very confidential information has been leaked such as information related to their bank accounts (Adamowski 2016). The hacker posted multiple SQL files on the net that contains important database files which includes records such as IP Trade Doubler, IP Block Lead, device and product offers and Blue Media Transactions. The attacker also posted a file that contains an SQL file with around 342k lines containing information like home addresses, first and last name of clients and users, their email addresses, phone numbers, IP addresses and other similar data. All the data on the network was last updated in the year 2014 that means data stolen contains valid data almost about 95-98 percent (Adamowski 2016). Researchers of the breach incident also stated that they have even found a long 9GB file which has been stolen and contains users details regarding their browser, agent type, session IDs and operating system on their respective systems. Altogether, a total of 14GB data has been stolen which was followed by dumping around 615,627 unique email addresses which includes, 118,989 of Gmail addresses, 150,440 of Polands 6th largest web portal Wirtualna and around 64000 of O2 users. Fig: List of Top Ten Email Domains Compromised Although investigators could not find any file related to passwords of these emails but it was possible for them to detect the database of logger which holds session IDs of clients, which simply means that Identify theft is very simple in this case as the malicious user could use this sensitive data to authenticate himself as original user. How was the attack carried out? Although no exact reports have been stated by now upon the flaw that caused the attackers to intrude into the company website, still there are many speculations which are been interpreted and could be the cause of attack. One of them is SQL injection which is an established attack to which websites are vulnerable. The hacker publically announces that he warned the company of the attack before but they didnt seem to care. He stated that I somehow warned them about a bug bounty program which they should use but they did not (Russon 2016). Preventive Measures to stop further Attacks The damages done could not be undone but there are always possible solutions to it, which could prevent something like that in future. After the attack on Netias company website, Tony Pepper, CEO of Egress Software Technologies stated that web forms which are provided to users for getting information from them must be encrypted too along with other data as these forms are normally submitted in plain text and in unencrypted form which even sometimes contains the most confidential information about a client and could result in a hack. This type of forms even contains bank details of the user which need to be kept very secured, hence the idea of encrypting forms (Russon 2016). The other measures to prevent cyber-attacks are: Stay Updated: Companys must know about the types of cyber threats which are in news. If even a basic knowledge of threat is known, it could be prevented. Restricted Access: This includes login credentials to every other confidential information that resides on the network. Access rights must be provided only to those who actually need it and are safe. Public key and Private Key procedure could be used in order to maintain data integrity. Tighten Network Security: Session timings should be very short and if the user is idle for more than 10 minutes it should automatically log-out. Validate password to make them Strong and a need to change them frequently. Using SSL: The SSL Protocol used to transfer clients confidential data amid website and companys database must go through an encryption technology. Anthem medical data breach case 2015 Problem Statement An American health insurance company WellPoint Inc. which is known as Anthem Inc. since 2014, faced a serious cyber-attack in early months of 2015. Anthem disclosed the information on security breach on 4th of February, 2015 (Riley 2015). They informed that the criminals had stolen approximately 38 million of personal identifiable information records though hacking companys system and servers. On 24th Feb, 2015 they revised the number of records been hacked and the toll rose to 78.8 million. Department thinks that, this was planned over the course of several weeks and must have started around December 2014 (Mathews 2015). Impact of attack The former and current members, who are or were associated with any health plans affiliated by Anthem since 2004, have been impacted by the cyber-attack. Also, few of the members of Blue shield Plans and Blue cross, who takes health services in any area which is served by Anthem might have been impacted (Riley 2015). In few of the cases non-Blue Plan members along with non-Anthem members might have been impacted too in case they have been offered options related to non-Anthem or Anthem plans by their employer. Attackers explored database system of Anthem and stolen information such as their names, birthdates, social security numbers, employment information, email address, home address and health care ID numbers including income data and the individuals who data hacked stole could bear problems related to identity theft for the rest of their life (Mathews 2015). Anthem believes that neither information related to banks or credit card has not been stolen nor any evidence has been colle cted against medical information for example diagnostic codes, test results or claims, was obtained or targeted (Mathews and Yadron 2015). How was the attack carried out? In the month of January last year, one of the administrators at Anthem Health Insurance Company observed that their system network is running through an unknown complex query which they initially thought has been run by one of their employee, but in minutes it was known that it is coming from external environment and company has been targeted for cyber-attack (Mathews and Yadron 2015). Investigators stated that hackers might have tricked the employees of Anthem, to click on a phishing mail which they must have presented as an internal message or something. After that mail was clicked hackers were able to gain access to the Anthems database using Administrators credentials along with five other employees credentials. According to a news channel Bloomberg, the hacker belongs to the country China and carried out the data breach from there itself. It was not clear whether the employee who raised the alarm was one of these five employees whose credentials were used. Attackers might have made use of Adobe vulnerabilities, Windows or Java to get the credentials. What could have been done to prevent the attack? There are two ways security breach must have taken place. Either it could be an inside attack where an employee of the company might have used its own credentials of the account to stole the information or some external hacker might have phished the employees to get their credentials. Whatever is the case, intruders were already inside the walls and any type of firewalls or other security measures could have no effect in preventing it (Terry 2015). Anthem was also in debate about its data encryption techniques. It was stated that Anthems database was not encrypted in storage and on the wire. It is very crucial when a hacker attacks the security on some network and stoles the information from the database. If the data on the system is encrypted using high techniques, it could prevent the hackers from accessing the data. In case, the data is attacked by an insider, this could not be a useful technique as employees need to view data in unencrypted form and they have rights to view data to perform their job activities, hence encrypting data is also not the solution to the problem. There are two measures which could have been taken to diminish the damage or it could have even prevented any loss at all. These measures are: Context-aware access control: In this prevention measure, system checks for every authentication session that where it is coming from, what platform is being used, what is the date and time and similar other things. This would help preventing an outsider to login into companys network even if the intruder is using valid credentials which he might have received through some phishing techniques (Whitney 2015). Behavioural Analysis: Keeping a track of employees activity on the network and comparing it to their previous history records and with the network activities of other employees on the same role or position. This could be achieved using automated systemised analysis as part of Real Time Security Intelligence, which when observe any doubtful activity will either raise a flag or will close down the access of the employee temporarily (Abelson and Creswellfeb 2015). Awareness also has a major role in preventing these kinds of frauds. It has been recommended that employees must be aware of the cyber threats; they must remain attentive for incidents which are related to cyber frauds (Weise 2015). They should also be aware of the scam email campaigns which are mainly targeting individuals at their personal mail-ids. This type of scam mails are designed to detect private information of an employee and are designed in a manner appearing as they are from the company itself which includes links like Click here to monitor credentials. Employee should not reply or click on any such type of mails and not even try to reach out the sender. In case, a link has been clicked, do not supply any information on that link and never open any attachments that must have come with any such email (Abelson and Goldstein 2015). They must also ensure all their members that they will not be calling to get their personal information such as information related to credit card or similar. References Riley, C. (2015). Insurance giant Anthem hit by massive data breach, Retrieved 23rd August 2015 from https://money.cnn.com/2015/02/04/technology/anthem-insurance-hack-data-security. Mathews, A. (2015). "Anthem: Hacked Database Included 78.8 Million People", Retrieved 24th August 2015 from https://www.latimes.com/business/la-fi-mh-anthem-is-warning-consumers-20150306-column.html. Abelson, R. and Goldstein, M. (2015). "Anthem Hacking Points to Security Vulnerability of Health Care Industry", The New York Times. Weise, E. (2015). "Massive breach at health care company Anthem Inc.". USA Today. McLean, VA: Gannett. ISSN 0734-7456. Whitney, L. (2015). "Anthem's stolen customer data not encrypted - CNET", Retrieved 23rd August 2015 from https://krebsonsecurity.com/2015/02/data-breach-at-health-insurer-anthem-could-impact-millions/. Mathews, A. and Yadron, D. (2015). "Health Insurer Anthem Hit by Hackers - WSJ", Retrieved 23rd August 2015 from https://www.usatoday.com/story/tech/2015/02/04/health-care-anthem-hacked/22900925/. Abelson, R. and Creswellfeb, J. (2015). "Data Breach at Anthem May Forecast a Trend - NYTimes.com". The New York Times. New York: NYTC. ISSN 0362-4331. Terry, N. (2015). "Time for a Healthcare Data Breach Review Bill of Health", Retrieved 23rd August 2015 from Center for Health Law Policy at Harvard Law School. Waqas, H. (2016). Ukrainian Hacker Hacks Polish Telecom Giant Netia; Leaks Massive Data, Retrieved 23rd August, 2016 from https://www.hackread.com/ukranian-hacker-hacks-polish-telecom-netia/. Adamowski, J. (2016). Polish telecom suffers major data breach following hack, Posted in SC Magazine, Retrieved 23rd August, 2016 from https://www.scmagazineuk.com/polish-telecom-suffers-major-data-breach-following-hack/article/510290/. Russon, M. (2016). Polish telco operator Netia suffers massive data breach, exposing 300,000 customer credentials, International Business Times, Retrieved 23rd August, 2016 from https://www.ibtimes.co.uk/netia-data-leak-polish-telco-operator-hacked-14gb-customer-credentials-posted-online-1570051. Muncaster, P. (2016). Polish Telco Netia Suffers Major Breach, published on info security, retrieved 23rd August, 2016 from https://www.infosecurity-magazine.com/news/polish-telco-netia-suffers-major/.

Sunday, December 1, 2019

Phosphate Dehydrogenase Deficiency Disease Essay Sample free essay sample

Abstraction:Glucose-6-phospate dehydrogenase lack ( G6PD ) . an X-linked familial disease. is due to the deficiency of glucose-6-phosphate dehydrogenase. This enzyme is present in ruddy blood cells and its lack can take to haemolytic anaemia. Red blood cells carry O and G6PD protects these cells from natural O chemicals that may construct up when you have a febrility or take certain medicines. If there are excessively many of these oxidative chemicals. they can destruct the ruddy blood cells. doing haemolytic anaemia. The G6PD enzyme catalyzes the oxidization of glucose-6-phosphate to 6-phosphogluconate piece besides cut downing NADP+ to NADPH. which is a needed cofactor in many biosynthetic reactions. NADPH maintains glutathione in its decreased signifier that serves as a forager for risky oxidative metabolites in cells. With the aid of the enzyme glutathione peroxidase. reduced glutathione besides converts unsafe H peroxide to H20. Red blood cells depend on G6PD activity since it i s their lone beginning of NADPH. We will write a custom essay sample on Phosphate Dehydrogenase Deficiency Disease Essay Sample or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Consequently. people missing G6PD can non take oxidative drugs or usage certain chemicals because their ruddy blood cells undergo rapid haemolysis under this emphasis ( Carter ) . Introduction:Glucose-6-phosphate dehydrogenase ( G6PD ) is an enzyme in the pentose phosphate tract. a metabolic tract that supplies cut downing energy to cells. chiefly RBCs. It does this by keeping the degree of the co-enzyme nicotinamide A dinucleotide phosphate ( NADPH ) . NADPH in bend maintains the degree of glutathione in these cells that helps protect the ruddy blood cells against oxidative harm. Glucose-6-phosphatase dehydrogenase ( G-6-PD ) lack is the most common disease-producing enzymopathy in worlds. which affects 400 million people worldwide with more than 300 reported discrepancies ( Carter ) . It besides presents with protection against malaria. which most likely histories for its high cistron frequence. Some research has even shown that G6PD seems to diminish the susceptibleness to malignant neoplastic disease. cardiovascular disease. and stroke. G6PD lack is an X-linked recessive inherited disease that preponderantly affects work forces. While it affects all races. there appears to be a higher incidence in people of African. Asiatic. or Mediterranean heritage. The high frequence of type 2 diabetes and high blood pressure in Afro/Caribbeans in the West can besides be straight related to a G6PD lack ( Gaskin ) . The lack is a mutant in the G6PD cistron venue at Xq28. The cistron is 18 kilobases long with 13 coding DNAs. which makes up an enzyme of 515 aminic acids. Most of the mutants are single-base alterations that result in an amino acid permutation. Female bearers can hold a mild signifier of G6PD. which is dependent on the grade of inactivation of the unaffected X chromosome. In the rare instance of homozygous females. there is co-incidence of a rare immune upset called chronic granulomatous disease. G6PD deficient RBCs have a instead reduced life span and at hazard to lyse when faced with oxidative emphasis. Patients with G6PD lack are at hazard of haemolytic anaemia in provinces of oxidative emphasis. This can be in terrible infection. medicine and certain nutrients. Some drugs that can convey on symptoms include: antimalarial agents. acetylsalicylic acid. Macrodantin. quinine. Quinidex. sulfa drugs. and many others. Broad beans contain high degrees of vicine. divicine. convicine and isouramil — all are oxidizers. Recent research has besides shown chemicals like henna. used in dyes for hair and tegument. has besides shown to convey on strong reactions. In provinces of oxidative emphasis. all staying glutathione is consumed. Enzymes and other proteins are later damaged by the oxidizers. taking to electrolyte instability. membrane cross-bonding and phagocytosis and splenetic segregation of ruddy blood cells. The haemoglobin is metabolized to bilirubin. increasing the hazard of icterus. or excreted straight by the kidney. which is known to do acute nephritic failure. Nerve pathway: Discussion:Preservation of the unity of the RBC’s membrane relies chiefly on its ability to bring forth ATP and NADH from glycolysis. NADPH is produced by the pentose phosphate tract and utilised for the decrease of oxidised glutathione to cut down glutathione. Glutathione is indispensable for the remotion of H2O2 and lipid peroxides generated by reactive O species. In normal ruddy blood cells. the uninterrupted coevals of superoxide ion from the nonenzymatic oxidization of haemoglobin provides a beginning of reactive O species. Under normal fortunes. the RBC removes superoxide with superoxide dismutase. which converts superoxide to hydrogen peroxide. Glutathione peroxidase reduces the H peroxide to H2O which oxidizes glutathione to the disulfide signifier. Glucose-6-phosphate dehydrogenase converts glucose-6-phosphate into 6-phosphoglucono-?-lactone and is the rate-limiting enzyme of the pentose phosphate tract. In a individual with lacking G6PD. oxidizers react with glutathione doing the cellular degrees of reduced glutathione to fall to such an extent that critical sulfhydryl groups in some cardinal proteins can non be maintained in decreased signifier. In bend. a sufficient sum of NADPH. which is besides required for formation of azotic oxide. is non produced. As a consequence. the tract promotes Heinz organic structure formation. and haemolysis can happen. Heinz organic structures are fundamentally denaturized haemoglobin formed by harm to the haemoglobin constituent molecules and go cross-linked by disulfide bonds. Lack of G6PD in the alternate tract causes the buildup of glucose and therefore there is an addition of advanced glycation terminal merchandises. In decision it is clear to see patients with glucose 6-phosphate dehydrogenase lack must be highly careful in their usage of merchandises that could perchance do oxidative emphasis. However. it seems that is an highly difficult undertaking since there are so many merchandises on the market and unless more research is done it would be impossible to cognize what is safe and what is non. Another hazard lies non merely on the custodies of the patients. but besides on the doctor. Recent research in Iran. where G6PD lack is highly common. was done to prove blood bags used for transfusions or exchange. Samples were taken from 261 blood bags and examined by topographic point fluorescence for G6PD lack. In add-on. patients having blood were examined for haemoglobin. haematocrit. and hematoidin before and after transfusion. They were besides examined for haemoglobinuria. factors involved in haemolysis due to G6PD lack. and oxidizers. The consequences were amazing and showed that 37 of the bloo d bags had the G6PD lack and about 81 % of the transfusion receivers had at least one hazard factor for haemolysis. This merely goes to demo the earnestness involved in monitoring such a status. Plants Cited: Carter SM. Gross SJ. Glucose-6-Phospate Dehydrogenase Deficiency.hypertext transfer protocol: //www. emedicine. com/med/topic900. htm ; 29 Aug 2005.Gaskin RS. Estwick D. Peddi R. G6PD lack: its function in the high prevalence of high blood pressureand diabetes mellitus. Ethn Dis 2001 ; 11:749-54. PMID 11763298. Nabavizadeh SH. Anushiravani A. The prevalence of G6PD lack in blood transfusionreceivers. Hematology 2007 ; Vol. 12 Issue 1. p85-88.