Wednesday, October 30, 2019

Object data modelling Essay Example | Topics and Well Written Essays - 5000 words

Object data modelling - Essay Example an online, web-based system that could allow their customers to (i) search for the availability and fares for the flight to the desired destination, (ii) make payments securely through a third-party payment system in order to book the tickets for the desired flight, (iii) view the real-time seating arrangement with available seats and select the desired seat in order to self-check-in, and (iv) print out the boarding card. PART I: ANALYSIS REPORT 1. Use-Cases & Use-Case Diagrams Use cases and use-case diagrams are the UML features for gathering and analysis of user-centric requirements. A use case can be defined as a particular purpose that can be achieved by the user (or say, actor) through the system (Chonoles & Schardt, 2003). A use-case diagram depicts a sequence of interactions between the actor and the system (Gomaa, 2011). 1.1. An Overview Use Case Model As shown in Figure 1, following are major use cases of the Ticket Booking and Self-Check-In System: Major Use Case 1: Search the desired flight After logging on to the Happy Tour’s website, the customer can search for the availability and fares for the flights to the desired destination. In order to carry out the search, the customers must provide mandatory information to the system which includes personal details, the departure airport, the destination airport, intended outbound flight date and time. The customer may also provide optional information – the date and time for return trip, to make the search more accurate. Assumption: The search result lists flights with available seats; in other words, if all the seats in the flight are booked then that flight won’t appear in the search result. Major Use Case 2: Book the ticket Once the customer has found the desired flight, she can move on to the booking process where she makes the payment through a third-party secure payment system. If the payment gets successfully processed, an automated confirmation email along with the receipt is sent out by the system to the email address provided by the customer. Major Use Case 3: Self-Check-In The customer can opt to perform self-check-in the booked flight anytime but 24 hours prior to the scheduled flight time. To self-check-in, the customer must search for the flight either through the booked flight number and booking reference number. If the flight is found and the customer’s booking is verified successfully, the system displays the real-time seating arrangement to the customer. The available seats are shown in blue color, while those already reserved are displayed in gray color. The customer can click on any one available seat to choose it, and then proceed to either

Monday, October 28, 2019

Organisation and Management †Assignment One Essay Example for Free

Organisation and Management – Assignment One Essay For the purpose of this assignment I have chosen transport and logistics company Mainfreight Limited. I will be focusing specifically on the outbound night crew. This team is responsible for loading freight from the Wellington region onto trucks to be sent to branches across New Zealand. Inside this team there is one supervisor who works with the loading team on the floor also loading and is responsible for smooth daily operations. The mid level manager is the Operations Manager who is responsible for the supervisor and implementing organisational plans such as reducing damages to freight. The top manager in this case is the Branch Manager who sets goals for the branch and oversees planning for the future. Q1) An economic reason for a truck loading crew operating at night is that it’s cheaper to travel at night due to faster travel times and less fuel consumption for the trucks on empty roads I think this reason applies most strongly to my organisation because it will increase the profit. A social reason for the organisation is that there is less risk of accidents late at night on empty roads. A personal reason to form this organisation could be a love for trucks. Q2) Figurehead: The most well known figurehead of Mainfreight Wellington is the branch manager, an activity could be a speech at the grand opening, skills he would need include public speaking competency and reliability. Entrepreneur: The entrepreneur of the branch initiates innovative solutions and change to the organisation such as the branch manager diversifying from road transport to including rail or sea transportation. Some skills needed for this role are creativity and brevity. Resource allocator: Within my organisation this role is filled by the operations manager, who distributes resources such as equipment like forklifts and workers if needed to fulfill the crews workload. Some skills needed for this role are time management and planning ability. Disseminator: An activity a manager in this role might perform is gathering information from customers and producing estimates of freight quantities for the truck loaders who could then plan how they layout their loads. Skills need ed are the ability to gather and analyze information. Q3) ‘Soldiering’ by Frederick Taylor is when workers purposely limit output by not working to full capacity in order to avoid causing redundancies and to avoid losing incentive pay by exceeding required performance levels. The impacts of workers ‘soldiering’ on my organisation could mean that if there is a large influx of freight and workers don’t load it all that night, the delay could anger the customer who will then take their business elsewhere. If workers are soldiering performance will not be maximized and low productivity could cause a fall in capital investment and the eventual decline of the business. Q4) ‘Time and motion studies’ streamline task processes by reducing inefficient motions and then once the task process has been adjusted through motion studies the time studies then seeks to reflect a standard length of time in which the refined task process should be completed. Time and Motion studies’ are a technique to increase task efficiency by workers to increase the output with no greater physical effort. An impact of TM studies on my organisation is that incoming freight is placed in bays so loaders do not have to go back and forth to the unloading area.

Saturday, October 26, 2019

Antigone and Ismene :: English Literature Essays

Antigone and Ismene Tragic heroes are generally people of high social stature with a tragic flaw that usually manifests itself in the form of poor judgment and arrogance, condemning the hero to a disastrous end and establishing the character’s destiny. Antigone is a tragic heroine deeply conflicted between her virtue and her hubris, personifying courage in her civil disobedience against criminal "leadership." A product of incest, her very existence is shameful, but perhaps this is why Antigone has such a burning desire for righteousness. She has great regard for following tradition, and a compulsion to follow these traditions even at the cost of her own life. Sacrifice is one of her qualities and she is ready to die for what she believes in. She shows disdain for Ismene’s cowardice and tendency to be a fair-weather friend. Her reprisals against traitors are especially fiery. Her concern for family becomes almost an unhealthy obsession, and her selflessness is soon shown to be madness and self-infliction. Being a tragic heroine, she shows excellence of character and bravery, but her fatal flaw is that her will to please the gods is greater than her will to preserve her own life. In the end, uncompromised rigidity is her downfall. She obeys the laws of the gods and is careless about the mortal law’s penalty, her own death. Antigone does not understand the need to act according to humanity’s place in the scheme in things, one’s pleasing of the gods should continue up until the point when it puts ones life in danger. Our heroine shows hubris by breaking the rule of the golden mean, not because she is egotistical, but because her head gets in the clouds when she believes herself to be a high and mighty enforcer of virtue. This is a form of arrogance, which Zeus despises. Her conception of justice is so rigid that she puts herself in harm’s way, which is not at all honorable in the eyes of the Greeks. Her ‘holier than thou’ quest has gone too far, and she is stubborn and irrational, lacking the common sense the Greeks so valued. One example of Antigone’s extremely twisted vision of unbending idealism is when she told Ismene she wouldn’t care if she yelled incriminations about the burial from the rooftops, an unnecessary passion and clear disregard of moderation. The exact opposite of her sister, Ismene is, according to Greek conventional wisdom of the time, functioning ideally in her moderation, aware that it is vital not to overstep her boundaries in the overall scheme of things.

Thursday, October 24, 2019

Information System

1. 4. 4 Information Systems for the Banking & Financial Sector: Audit is one of the major controls for monitoring management activities in the banks and financial institutions. In a computerized environment, IS audit is a very effective and necessary activity. Usually the IT implementation in the banking and financial organizations is done by adopting a mix of different methodologies – internal development and deployment and third party product development and deployment. In case of internally developed and deployed IT systems, IS audit will require to be done by a team of specially trained internal or external auditors.However, it is preferable to have the IS audit conducted with the help of suitable external agencies with the required skills and expertise to ensure independent nature of audit. In case of development and deployment of the IT systems by third parties, the IS audit requires to be conducted by trusted auditor/s with skills and expertise, required for the purpose . IS audit assumes greater significance because a large number of critical and strategic financial operations in the banking and financial sector are wholly or partly being handled by the computerized systems.There is a significant need for determining the role of IS in banks. This would assure the top manage- ment that the IS development is in the right direction. This would also help in exploring the intended and the real role of IS in banks. The knowledge of the real role of IS in banks would help IS managers in managing information systems by judging the business needs of the IS projects, associated risks, importance and ranking of IS managers in organizational hierarchy, need for innovation and flexibility in IS planning approach, etc.The IS practitioners may use the variables used here for self-evaluation and for deciding about the IS development. It has been well recognized that IS plays different roles in different industries. However, there is limited research examining the differences in the role of IS within a single industry. This study empirically explores the differences in the role of IS among public, private, and foreign ban. ks. Results indicate that while, at present, only private and foreign banks have obtained strategic advantages using IT, public sector banks, although late, have also realized the importance of IT.It has been empirically proved that the future impact of IS does not vary significantly with the banking groups. This suggests that IS efforts put in by the public sector banks are in the right direction and can be expected to give them a strategic advantage in future. Foreign and private banks, though in the strategic group today, have to constantly harness IS for strategic advantage to maintain their position. Sustaining competitive advantage is very difficult, because IS managers have to continuously evaluate the bank's applications portfolio with respect to technology and their competitors.Public sector banks have to search f or ways to shift from support group to the strategic group in order to enjoy a strategic advantage from the use of IS. In order to achieve this objective, they may have to formulate a different IS strategy so as to make them competitive enough to survive. Future research could evolve suitable IS strategies for all the three sectors. This paper has tried to locate the banks on the Strategic Grid. However, the level of computerization of various branches of a bank may be different and hence their dependency on IT may be different.Future research may involve locating the various branches and departments of a bank on the Strategic Grid and suggesting a suitable strategy for the branch. This study has the limitation that data are collected only from key IT executives. Perceptions of the bank's business executives may be different from that of the IT executives. Therefore, future research could also attempt obtaining and analysing the opinion of bank's business executives and looking for perceptual differences, if any.Another interesting area of future research could be to unearth the reasons for adopting a particular role of IS and to explore facilitators and inhibitors in using IS for strategic use. Uses of information technology in banking Write your abstract here. Applications of Information Technology in Banks in India While computer by itself is the most cherished invention that man has ever accomplished, its union with communication technology which is at its pinnacle, has brought yet another amazing extension to its already fabulous capabilities.From the period of Marconi to this day , the improvements that have taken place in the television , have literally brought the entire world into an individual’s bedroom. Joining this powerful communication environment , the IT has opened flood gates for global economic activity. The contribution of economic and political changes that have so far taken place to encourage international trade will bear fruit only when banking and the associated services can catch up with the new trends. The modern IT has enough capabilities to enable banks, financial institutions and others to bring about the desired changes.Banking sector reforms introduced a decade ago in 1992-93 , have been based on five fundamentals: 1. Strengthening of prudential norms and market discipline. 2. Appropriate adoption of International benchmarks. 3. Management of organizational change and consolidation. 4. Technological upgradation. 5. Human resource development. The Financial Reforms that were initiated in the early 90s and the globalization and liberalization measures brought in a completely new operating environment to the Banks that were till then operating in a highly protected milieu.Services and products like â€Å"Anywhere Banking† â€Å"Tele-Banking† â€Å"Internet banking† â€Å"Web Banking† , e-banking, e-commerce, e-business etc. have become the buzzwords of the day and the Banks ar e trying to cope with the competition by offering innovative and attractively packaged technology-based services to their customers. Reserve Bank of India constituted a committee under the chairmanship of Dr. C. Rangarajan. The main task of the committee was preparation of a plan for computerization for the period 1990-1994 ( for 5 Years ).For the purpose of computerization , the committee selected the important areas relating to customer service , internal-decision-making process , productivity and profitability. The committee furnished its report on November 9, 1989 with the following recommendations- 1. The branches having daily average level of vouchers at more than 750 should be computerized . 2. Computerization on branch level should be achieved on any of the following basis- (i)Selected branches will have on-line terminals with micro and mini-computers which will be linked with central main-frame computer to provide counter service and other office-services. ii)Personal compu ters will be installed at counters which will be linked with local area network. (iii)For third option , the banks will have to depend on Telecom line. 3. The banks should gradually use developed devices such as- Photocopier , FAX , Duplicator , Microfilm , Signature Storage , Scanners etc. 4. Non-computerized branches can take the services of other local computerized branch / office in case of important task. 5. The customers should have the facility to route their business to any branch of the bank. 6. All-Bank Credit Card should be issued. . Computers should be made bilingual and proper training arrangements should be made to provide training to staff members. 8. The regular customers should be offered On-line facility. 9. Like some European countries , there should be a system of credit clearing. 10. BANKNET should be used for interbank and intra bank applications. 11. All Regional offices and Zonal offices to be computerized in a phased manner. Rangarajan Committee – 198 9: A Statistical Analysis Rangarajan Committee ( 1989 ) has focused its stress on computerization of banks.A statistical analysis was also made in the report of committee. In this analysis ,it was mentioned that following jobs can be rapidly and easily performed at Regional Office/Zonal office level. 1. To ascertain the bad and doubtful debts and to make provision for them. 2. To claim the amount under Credit Guarantee Schemes of DICGC. 3. To communicate , analyze and forecast the data for trade-plan. 4. To make action plan for recovery of advances. 5. Personnel Information System. 6. Credit Information System. 7. Checking of figures of priority sector advances. . Consolidation of statements/figures to be sent to the RBI. Present level of Computerization: Based on the norms worked out by Rangarajan Committee (II), 7827 branches of the Public Sector banks were identified for full branch computerization up to March 2000 of which around 4620 were computerized as on March 99. Meanwhile, the networking of the already-computerized branches also assumed urgency and some of the Banks have started inter-connecting their computerized branches using leased telephone lines or Very Small Aperture Terminals (VSATS).This is meant to provide a more comprehensive service to customers and at the same time give banks better centralized control over the branch operations. As of now, New Private Sector and Foreign Banks have an edge over Public Sector Banks as far as implementation of technological solutions is concerned. However, the latter are in the process of making huge investments in technology. Source:  http://www. shvoong. com/humanities/1748375-applications-information-technology-banks-india/#ixzz2ONAVoUdI

Wednesday, October 23, 2019

Guava Leaves Extract as Main Ingredient

In the next of our series on Far Eastern plant we look at Guava or Psidium guajava. In folk medicine, extracts of roots, bark, and leaves are used to treat gastroenteritis, vomiting, diarrhoea, dysentery, wounds, ulcers, toothache, coughs, sore throat, inflamed gums, and a number of other conditions (Morton 1987). This plant seemed worthy of an in depth review. â€Å"Guava leaves extract as main ingredient in making Herbal Soap for washing wounds† Introduction: WALA HAHA 😀 Background of the Study: Nowadays, people have using different herbal soap that are expensive and less effective.The researcher aims to make an effective and cheaper herbal soap. Like guava leaves , it contains both major antioxidant pigments, carotene and poly phenols giving them high dietary antioxidant value among plant foods. Guava leaves has a benefits in making herbal soap because it has that properties that can make the skin look good and protects the skin. Statement of the problem: The resear cher aims to answer the following questions: 1. ) Is the guava leaves extract effective in making herbal soap? 2. ) Does guava leaves extract effective for washing wounds? Hypothesis: 1. The guava leaves is effective in making herbal soap. 2. ) Guava leaves extract is effective for washing wounds. Significance of the study: The significance of the study is to have a beneficial usage of guava leaves. Specifically on the fresh green leaves. This study also aims to produce an affordable herbal soap by making use of the natural properties of guava leaves extract. This product is more on natural properties that can cure skin infections like skin allergies, rashes and skin itchiness and does not mix with chemicals that may damaged our skin. Scope and Limitations:This study needs furthermore improvement , research and also this study is only limited on the use of caustic soda because we all know that to much of caustic soda may cause skin itchiness. Definition of terms: Guava- is a genus o f about 100 species of tropical shrubs and small trees. Antioxidant- is a molecule capable of slowing or preventing the oxidation of other molecules. Pigments- is a material that changes teh color of light it reflects as a result of selective color absorptions. Carotenoids- a pigment essential for good vision angd precursor to Vit. A. Pol phenols- were one briefly known as vit.P which are a group of a chemical substances found in plants. Review of related Literature: Guava, is a genus of about 100 species of tropical shrubs and small treesin the myrtle family Myrtaceae. It is native in Mexico , as well Central America, Northern America and parts of the Carribeanbut not cultivated throughout the tropics. In Tagalog , name bayabas are probably local renditions of guayaba. Numerous references inmedical research identify guava as Psidium Guajava. Psidium guajava are cultivated in many tropical and subtropical countries for their edible fruit.Psidium Guajafa are often considered superfru its , being rich in vit. A and C and other properties. Its leaves contained antioxidant pigments,carotenoids and Polyphenols that are good components in turning our skin healthy. Since the 1950's , guva , prticularly its leaves , has been a subject for diverse research in chemical identity of its constituents, pharmacological properties and history in folk medicine . For example , from preliminary medicinal research in laboratory models , extract from guava leaves are implicated in therapeutic mechanisms against cancer , bacterial infections , inflammation and pain and skin disorder.Essential oils from gauva leaves have shown strong anti-cancer in vitro. In folk medicine , guava leaves are used as a remedy for diarrhea, and for their supposed antimicrobial properties. Its easy to get the components of guava leaves when it is apply in a form of a soap. Methodology: A. Guava Decoction We have to gather 50g of fresh green guava leaves, 250 mL of water and boil it for about 10 mins. * M aterials one-half cup of oil, 3tbsp. caustic soda, 500mL of water and guava leaves extract   B. Preparation of Soap From the materials gatherd , set aside guava leaves extract.Mix 500mL water and vegetable oil and stir for 30mins. Combine the guava leaves extract to the solution of water and oil, stir for 30mins. add 3 tbsp. caustic soda stir for another 30 mins. Put in a molder and place in a safe area that can't be expose by the sun. C. Soap Cutting: Cut the soap acc. to the size of the molder. D. Testing the soap: After 15 days the soap will be use either preventive or cure. The respondents to this is the people who have skin wounds. It will be apply in the skin when they take a bath. E. Observation: The researcher had observed that the wounds heal faster. * The soap speeds up the regeneration of the wounds. Chapter IV Results and Discussion â€Å"EFFECTIVENESS OF SOAP IN DAYS† Respondents| 1| 2| 3| 4| 5| Linger Abellana| Good| effective| effective| effective| effective| Mario Cabanag| Effective| effective| effective| effective| effective| Neljun Odiaz| good| good| good| good| fair| Clarence Tumanda| good| good| Effective| effective| effective| Ivy Carl geonzon| good| good| good| effective| effective| Jhon Sabellina| fair| fair| good| good| effective|Mary Ramirez| good| good| effective| effective| effective| Noel Cabrera| good| good| good| good| effective| Generalization: The researcher concludes that the guava leaves extract as main ingredient in making herbal soap for washing wounds is effective according to the respondents of the soap. Based on the number of days that they used the product, which is a proof that this herbal soap is effective. Herbal Cough Syrup: How To Make 1. Make a strong, concentrated infusion or decoction of your desired herbs. Use 2 to 3 times the amount of plant matter to water you would normally use for tea. . Strain out the herbs, and pour the liquid back into the pot 3. For each cup of liquid add twice the amount of hon ey. 4. Heat until the mixture is completely combined. Heat over a low flame, or use a double boiler as you do not want to boil the honey as it kills the healthful enzymes 5. Pour into sterilized canning jars and store away from heat and light. Store opened jars in the refrigerator. 6. You can extend the shelf life (between 6 months to a year), by adding a small amount of flavored brandy. How to Make Cough SyrupInstructions * 1 Bring two cups of water to a boil on the stove or in the microwave. You can use a pan as small as 2 quarts to make the cough syrup. * 2 Chop up some elecampane root into small pieces. Elecampane root is a natural cough suppressant and the whole root can be purchased at a health foods store. If you cannot find it, you can substitute ginger root. Add the root pieces to the boiling water. * 3 Boil the root for several minutes until it starts to become soft. Then, squeeze the juice from half a lemon and add it to the mixture.You can add juice from an entire lemon if you can stand the taste. * 4 Add a couple spoonfuls of honey to the cough syrup. The honey not only will soothe the throat, it covers up any unpleasant taste in the cough syrup. You can use anything else you desire to improve the taste such as sugar or peppermint. * 5 Pour in a couple spoonfuls of your favorite whiskey if you desire. The whiskey helps you relax and sleep and is good for a nighttime remedy. * 6 Make the cough syrup fresh every 4 to 6 hours and drink while your symptoms persist.

Tuesday, October 22, 2019

Emotional venting Essay Example

Emotional venting Essay Example Emotional venting Essay Emotional venting Essay Essay Topic: The Healers The first stage in Kuibler-Rosss ( 1969) model is denial, a common reaction to being told that one is dying. During this stage patient rejects reality of his or her impeding death. Denial of death provides patient with time to direct energies toward coping with the now reality. Undoubtedly, denial is an important self-protective mechanism, in that it enables a person to keep from being overwhelmed or rendered helpless by the frightening and depressing events of life and to direct his or her attention to more rewarding experiences. It is certainly advisable for any seriously ill person to question a terminal prognosis and seek additional medical opinions. But denial becomes unrealistic when the patient invests precious time, money, and emotions in medical quacks and faith healers. Denial of death is manifested in many ways. For example, patients who have been told clearly and explicitly that they have a heart disorder, cancer, or some other serious illness may deny having been told anything. Such oversights demonstrate how denial operates in selective attention, perception, and memory. Defensive, unconscious denial also helps a person to minimize the importance of bad news without dogmatically refusing to believe it. Denial of death is, of course, not limited to dying patients. It is also quite common among medical personnel and among the family and friends of dying patients. Anger (Emotion) During this stage, patient resents interruption of personal hopes and plans. Continual deterioration of a terminally ill patients health and sense of well-being makes it more and more difficult to suppress the fact that time is growing short. As the dying process continues, denial gradually fades into partial acceptance of death. However, partial acceptance is accompanied by feelings of anger at the unfairness of having to die without being given a chance to do all that one wants to do, especially when so many less worthy people will continue to live. The feelings of anger experienced by a dying person are frequently nondiscriminating, being directed at family, friends, hospital staff, and even God. The direct target of the patients anger, however, is the unfairness of death rather than other people. It is important for those who have regular contacts with dying people to be prepared for these attacks of anger and to recognize that much of the hostility represents defensive displacement of emotion from the real target to a convenient scapegoat. To facilitate the expression of anger (emotional venting) in a safe atmosphere, Kubler-Ross ( 1969) recommended the use of screaming rooms for both the patients and the medical staff. Usually, expression of anger allows patient to move to next stage. Bargaining In the normal course of events, a dying patients anger fades and is replaced by a desperate attempt to buy time by striking a bargain with fate, God, attending physicians or nurses, family or anyone or anything that offers hope for recovery or at least a postponement of death. Bargaining is a healthier, more controlled reaction than denial or anger, and patients in this stage make many promises. They may promise to take their medicine without fussing, to attend church regularly, to be kinder to others, and so on. Praying for forgiveness, embracing new religious beliefs, and engaging in rituals or magical acts to ward off death are also quite common. During this stage patient gradually comes to understand reality of the situation.

Monday, October 21, 2019

Islam and the West essays

Islam and the West essays One of the most significant ways the world has changed since the terrible crime of September 11 has been a new rise of an ugly strain of Islamophobia throughout the Western world. Amid the terrible agony of the recent terror attack in Bali, it is easy to be tempted, once again, by angry thoughts. The pattern is there: from the horror of 9/11, to the suicide/homicide bombings in Israel, to the flaming frontiers of Albania, Bosnia, Chechnya or Kashmir, all the way down to the recent brutal hostage-taking and killings in a Moscow theater, it is in the name of Islam that innocent people have fallen victim to hideous terrorism and unthinkable cruelty. It is, therefore, well within reason to raise questions as to the very nature of Islam, and almost plausible to see everything in terms of an inevitable clash between "our" world and "theirs." It is plausible, but ultimately wrong. According to Karen Armstrong , the Western world has always had a very unbalanced and negative view of Islam, dating back as early as the twelfth century. At that time Europeans knew very little about Muslims, and began to cultivate a highly distorted portrait of Islam. The reality was very different, in fact Islam began with a very positive message, where respect and freedom were some of the fundamental principles. It was only many years later that the religion was hijacked by old patriarchal attitudes, but the Koran still condemns violence and aggressive warfare, and Muslims are commanded by God to respect everyone, since we all share the same beliefs and the same God. To understand the terrorist attacks we have witnessed recently in many places, we have to bear in mind that what we see is not so much "Islam" mobilized to fight against "the West," but a civilization in severe internal crisis. There are rising movements in Islam, the so-called "fundamentalists, but they do not represent Islam, or even the majority of Muslims. Isl ...

Sunday, October 20, 2019

Definition of Bleeding Kansas

Definition of Bleeding Kansas Bleeding Kansas was a term coined to describe violent conflicts in the US territory of Kansas from 1854 to 1858. The violence was provoked when the residents of Kansas had to decide for themselves whether to become a slave state or a free state.The unrest in Kansas amounted to a civil conflict on a small scale, and was something of a premonition of the full-scale war Civil War that was split the nation less than a decade later. The outbreak of hostilities in Kansas was essentially a proxy war, with pro-slavery and anti-slavery sympathizers in the North and South sending manpower as well as weapons. As events unfolded, elections were decided by outsiders flooding into the territory, and two different territorial legislatures were established. The violence in Kansas became a subject of fascination, with reports often being carred in the newspapers of the day. It was the influential New York City editor, Horace Greeley, who was crediting with coining the term Bleeding Kansas. Some of the violence in Kansas was perpetrated by John Brown, a fanatical abolitionist who traveled, with his sons, to Kansas so they might slaughter pro-slavery settlers. Background of the Violence The atmosphere in the United States in the 1850s was tense, as the crisis over slavery became the most prominent issue of the day. The acquisition of new territories following the Mexican War led to the Compromise of 1850, which seemed to settle the question of which parts of the country would allow slavery. In 1853, when Congress turned its attention to the Kansas-Nebraska territory and how it would be organized into states to come into the Union.  The battle over slavery began again. Nebraska was far enough north that it would clearly be a free state, as required under the Missouri Compromise of 1820. The question was about Kansas: would it come into the Union as a free state or a slave state? An influential Democratic senator from Illinois, Stephen Douglas, proposed a solution he called popular sovereignty. Under his proposal, the residents of a territory would vote to decide if slavery would be legal. The legislation put forth by Douglas, the Kansas-Nebraska Act, would essentially overturn the Missouri Compromise and allow slavery in states where the citizens voted for it. The Kansas-Nebraska Act was immediately controversial. (For instance, in Illinois a lawyer who had given up on politics, Abraham Lincoln, was so offended by it that he resumed his political career.) With the decision in Kansas approaching, anti-slavery activists from northern states began flooding into the territory. Pro-slavery farmers from the South also began to arrive. The new arrivals began to make a difference in voting. In November 1854 an election to choose a territorial delegate to send to the U.S. Congress resulted in many illegal votes. The following spring an election to choose a territorial legislature resulted in Border Ruffians coming across the border from Missouri to ensure a decisive (if disputed) win for pro-slavery candidates. By August 1855 the anti-slavery people who had come into Kansas rejected the new state constitution, created what they called a free-state legislature, and created a free-state constitution known as the Topeka Constitution. In April 1856 the pro-slavery government in Kansas set up in its capital, Lecompton. The federal government, accepting the disputed election, considered the Lecompton legislature as the legitimate government of Kansas. Eruptions of Violence Tensions were high, and then on May 21, 1856, pro-slavery riders entered the free soil town of Lawrence, Kansas, and burned homes and businesses. To retaliate, John Brown and some of his followers dragged five pro-slavery men from their homes at Pottawatomie Creek, Kansas, and murdered them. The violence even reached the halls of Congress. After an abolitionist senator from Massachusetts, Charles Sumner, delivered a blistering speech denouncing slavery and those who supported it in Kansas, he was beaten nearly to death by a South Carolina congressman. A truce was finally worked out by a new territorial governor, though violence continued to flare until finally dying down in 1859. Significance of Bleeding Kansas It was estimated that the skirmishing in Kansas ultimately cost about 200 lives. While it was not a major war, it was important as it showed how the tensions of slavery could lead to violent conflict. And in a sense, Bleeding Kansas was a precursor to the Civil War, which would violently split the nation in 1861.

Saturday, October 19, 2019

Imrerial Russia Essay Example | Topics and Well Written Essays - 1250 words

Imrerial Russia - Essay Example Caucasus was composed of areas such as Bashkirstan, Tartarstan, Central Asia as well as Siberia. A considerable proportion of the population within the Empire belonged to the peasant group which accounted for about 81.6 percent of the total population within the Empire. The other category was composed as follows; Clergy which accounted for 0.9 percent, nobility, accounted for about 1.3 percent, merchants and burghers all of whom accounted for approximately 9.3 percent of the total population within the Empire. The military on the other hand accounted for about 6.1 percent. According to Resnick and Richard (76) it is estimated that more than 88 million individuals were peasants during this time. Of this group, approximately 10,447,149 were males all of whom were formally serfs while the remaining group was the state peasants. Statistics further indicate that this group was about 9,941,891 males and the type of peasants domain accounted for about 842,740 according to the Empire statistics of the year 1858. One of the major changes that the Russian society underwent in the year 1861 was the famous emancipation of the serfs. It is imperative to note that the problem of serfdom was spread throughout the entire Empire. By mid 19th century, it had become apparent for the rulers within this Empire that this problem could not be ignored in the event that Russia wanted to be modernized and reformed as argued by Resnick and Richard (153). In this regard, the issue of the serfs being freed took center stage throughout the entire Empire. Hence, against this backdrop, serfdom was abolished by Tsar Alexander II during this year. Evidence from literature indicates that Czar Alexander actually managed to emancipate about 44 million peasants from the state oppression. Perhaps this can be attributed to the fact that the said Czar knew very well that the only way for Russia to the rest of the world was indeed ready for modernization and was through the abolishment of such a system of oppression. Though the move was noble, it caused several problems within the Empire. This was further aggravated by the fact that majority of the freed peasants were uneducated. One of these problems was that the land provided to this group was actually quite small in comparison to what they had been allocated as plots when they were serfs to the Empire. In a nutshell, each plot averaged about 8 acres which was a far cry of what was being offered to them after their indictment. Other than ensuring that the serfs were emancipated in mainland Russia, Czar Alexander was also concerned with this problem in Georgia. The process of liberating the serf in Georgia called for delicate negotiations to ensure that he did not loose the much earned nobility loyalty and whose leadership power greatly depended on the readily available labor from the serfs . The other challenge which the Czar was faced with was finding a workable solution that would be agreeable to the land-owners within the Empire. However, fr om the evidence provided above, it is justifiable to state that he failed in this issue of land ownership. Although he eventually succeeded in liberating serfs in Georgia as well, his inability to solve the land problem brought more harm than good. Most notably, he brought them under the colonization of their landlords since most of them still had to work for

Friday, October 18, 2019

The Gap (Gap Inc.), an international retailer company Essay

The Gap (Gap Inc.), an international retailer company - Essay Example Local Network with certain recommendations that may help other companies and organizations to achieve better compliance with the following important principles of the Global Compact: Principle 1: Businesses should support and respect the protection of internationally proclaimed human rights (UN Global Compact 2011). Principle 2: undertake initiatives to promote greater environmental responsibility (UN Global Compact 2011). We believe our experience designing and implementing numerous CSR programs can be considered reliable, because Gap Inc. owns more than 3,100 stores worldwide and employs more than 150,000 people from all over the world, all of which are actively engaged in the Gap’s efforts to support human rights and environmental protection (Wright 2007). Having tries many approaches to supporting human rights and protecting the environment, we have come up with several strategies that help us to be a sustainable and responsible company, whose operations benefit all of the stakeholders. Lessons Learnt Gap Inc. has been continuously devoting much time and attention to promoting human rights protection programs. In particular, we are promoting diversity in every sphere of our operations. â€Å"Diversity is the rich variety reflected in our work environment and marketplace – including ethnicity, race, gender, age, sexual orientation, faith, culture and global experiences†.... Human Rights Policy 2010). Nevertheless, we have had some negative experience. Workers of our supplier factory made claims of labor abuses and offensive attitudes from the side of their management (Smith, Ansett, and Erez 2011). For that reason we had to invest millions of dollars into making sure that employees of our supply chain were treated with respect and dignity (Amazeen, Michelle 2011). As for protecting the natural environment of our planet, we are members of Business for Innovative Climate and Energy Policy (BICEP) (Environment 2011). As the members of BICEP we take a great care of design and development policies, strategies and procedures related to protecting our world in terms of working with clean energy and approaching the climate change challenges (Environment – Public Policy 2011) At the same time, we have watched the negative experience of one of our suppliers, the mountain kingdom of Lesotho. In 2009 this company was reported to pour unused and toxic mat erials into local rivers (Smith, Ansett, and Erez 2011). This shows that the organization does not give much care to the environmental constraints facing the global society. Recommendations On the basis of both positive and negative lessons learnt from past experience, Gap Inc. would like to draw the attention of the Local Networks to the outlined below recommendations. We believe the presented here measures will significantly improve positions of companies both financially, though increased customer loyalty, and socially, through improved corporate image and identity. Develop a standardized set of guidelines for business and organizations to follow in order to

Research Portfolio Paper Example | Topics and Well Written Essays - 2000 words

Portfolio - Research Paper Example Specific examples of stereotypes are that obese people are lazy and thus are less productive workers; that they have no self-control when they are eating; and that they over-present a good-natured personality in their social relationships because they are afraid of being socially excluded. Purpose of the Study The purpose of this research is to explore the extent to which the everyday lives of obese persons are mediated by a set of socially constructed meanings and how those meanings are present in their social relationships. Moreover, particular interest is paid to the process of establishing and maintaining different types of social relationships and how those bonds are considered to be both meaningful and satisfying. The relationship between being obese and losing weight to be socially accepted will also explored as another area where meaning is socially constructed. Review of the Literature: Obesity and Stigma The subject of obesity has been studied sociologically since the early 1960's, most commonly within the concentration of deviance and social control. Specifically, much of this work has focused its attention on how obesity is a kind of physical deviance and is stigmatized because of the external cues it possesses. Stigmatization stems from the possession of an "attribute or characteristic that conveys a social identity that is devalued in a particular social context" (Crocker cited in Abrams et al. 2004). More widely accepted stigmas associate obesity with laziness, social and sexual undesirability, and the externality theory of eating, which states that an obese individual, if given the opportunity, will eat large quantities of food regardless of how hungry he or she is (Puhl & Brownell, 2003a; Maykovich, 1978). An example of a more remote stigma can be found historically and, to a lesser extent, currently amongst some traditional religious circles who stigmatize the obese on the belief that they are gluttons who lack a moral self  ­restraint in th eir eating practices that will lead to their religious damnation (Puhl & Brownell, 2003a). In his work on stigma Goffman (1963) briefly noted that the stigmatization of obesity is based on the principle of visibility, which he defines to be "how well or how badly the stigma is adapted to provide means of communicating that the individual possesses it" (p. 48). In terms of that communication there are three conditions which must be addressed in order to determine how visible and prevalent a stigma actually is. The first condition has to do with how much is already known about what causes the stigma for a given individual who possesses it (Goffman, 1963, p.49). To apply this notion, if previous interactions with an obese person were to have revealed that his or her obesity was caused by factors beyond his or her control and that argument was convincing, based on what knowledge was available to justify the presence of obesity, perhaps that obese person would less likely be stigmatized by whoever were included within those interactions. Moreover, because obesity is based on external cues, it may negatively affect an obese person's ability or willingness to include him or herself in situations that require social interaction. This addresses the second condition of the

Thursday, October 17, 2019

Myth as a Mirror of Conflict and Violence Essay

Myth as a Mirror of Conflict and Violence - Essay Example For the first century and a half of our national existence, our relations with the people of the Middle East were largely beneficent and protective, not withstanding our conflict with the Barbary Pirates in North Africa. But Islamic civilization was on a downward trajectory that could not be arrested. Its social and economic structures, its values, its neglect of education, its lack of scientific curiosity, the indolence of its ruling classes and its inability to produce a single modern state that served its people all guaranteed that, as the West's progress accelerated, the Middle East would fall ever farther behind. The Middle East has itself to blame for its problems. Conflict and violence are common concerns to whether it was the story of Cain Killing Abel, the start of World Wars I and II or the Trojan War and The War of the Spartans. As a result of the influence of myth, these cultures have used violence as a means of resolving conflict. For the myth makes war palatable. It giv es war a logic and sanctity it does not possess. It saves us from peering into the darkest recesses of our own hearts. And this is why we like it. It is why we clamor for myth. The myth is enjoyable, and the press, as is true in every nation that goes to war, is only too happy to oblige. One of the first conflicts known to mankind that resulted to a violent demise was that of Biblical times between two Middle Eastern brothers' Cain and Abel. Cain and Abel were brothers who both developed different attitudes. One brother felt acknowledged more than the other. As a result Cain began to "[grow] hot with anger, and his countenance began to fall which eventually led to him developing a bad heart and cold blooded murder" of his brother Abel (Bias (2006), p. 22). ). In myth "creation is an act of violence" so the myth's perception would have perceived that when Cain and Abel were created they were meant to be created with violent tendencies (Wink, 45). Cain's actions were a result of jealousy and because humans are usually confronted with issues that are out in the open, we sometimes don't want to deal with the issue when confronted with our actions. In Cain's case after killing his brother Abel he became unremorseful and heartless when God confronted him and asked "where i s Abel

Equity and Trusts Essay Example | Topics and Well Written Essays - 1000 words - 2

Equity and Trusts - Essay Example The contention of this paper was that the principles of need and partnership were incongruous for cohabitant couples. Most of the instances of such couples with children involve limited assets. Therefore, the court had to assess the extent of the economic requirements of the children and then divide the assets. After taking into account the recommendations of various legal luminaries, eminent jurists, sociologists and other experts a final report will be published in the year 2007. Its recommendations are expected to substantially benefit separating cohabitees2. If a divorce ensues, then the court can issue pension adjustment orders. However, the Law Commission opined that this facility should not be extended to a cohabitation relation that breaks down, because it does not accord the same importance to cohabitation that it does to marriage3. It is an onerous task to consider the legal treatment of cohabitants as it involves important questions of social policy. Its complexity can be attributed to the laws and its social impact. The larger problems posed by this phenomenon have been dealt with in Parliament and the Law Commission has restricted its endeavours to the establishment of technical deficiencies in the law and to recommending the procedure to be adopted in order to ensure that reform takes place4. In October 1999, the Law Society made several proposals to the Courts to pass such orders as would ensure payment of capital and maintenance on separation. The Law Commissioner, Charles Harpum, opined that the law in respect of home sharing was biased, ambiguous and irrational. In addition, the Office for National Statistics had disclosed that the number of cohabiting couples was on the increase. The rights of cohabitants are far fewer in comparison to the rights of married couples. Further, it would be incorrect to maintain that this situation is ideal as only

Wednesday, October 16, 2019

Myth as a Mirror of Conflict and Violence Essay

Myth as a Mirror of Conflict and Violence - Essay Example For the first century and a half of our national existence, our relations with the people of the Middle East were largely beneficent and protective, not withstanding our conflict with the Barbary Pirates in North Africa. But Islamic civilization was on a downward trajectory that could not be arrested. Its social and economic structures, its values, its neglect of education, its lack of scientific curiosity, the indolence of its ruling classes and its inability to produce a single modern state that served its people all guaranteed that, as the West's progress accelerated, the Middle East would fall ever farther behind. The Middle East has itself to blame for its problems. Conflict and violence are common concerns to whether it was the story of Cain Killing Abel, the start of World Wars I and II or the Trojan War and The War of the Spartans. As a result of the influence of myth, these cultures have used violence as a means of resolving conflict. For the myth makes war palatable. It giv es war a logic and sanctity it does not possess. It saves us from peering into the darkest recesses of our own hearts. And this is why we like it. It is why we clamor for myth. The myth is enjoyable, and the press, as is true in every nation that goes to war, is only too happy to oblige. One of the first conflicts known to mankind that resulted to a violent demise was that of Biblical times between two Middle Eastern brothers' Cain and Abel. Cain and Abel were brothers who both developed different attitudes. One brother felt acknowledged more than the other. As a result Cain began to "[grow] hot with anger, and his countenance began to fall which eventually led to him developing a bad heart and cold blooded murder" of his brother Abel (Bias (2006), p. 22). ). In myth "creation is an act of violence" so the myth's perception would have perceived that when Cain and Abel were created they were meant to be created with violent tendencies (Wink, 45). Cain's actions were a result of jealousy and because humans are usually confronted with issues that are out in the open, we sometimes don't want to deal with the issue when confronted with our actions. In Cain's case after killing his brother Abel he became unremorseful and heartless when God confronted him and asked "where i s Abel

Tuesday, October 15, 2019

Five Drivers of Globalization and the International Forces Research Paper

Five Drivers of Globalization and the International Forces - Research Paper Example According to the standard theory, international trade theory leads to the share of resources being consistent with the corporate advantage. This further leads to specialization thereby enhancing the output. The quick progress in the capital market is because of the globalization. Along with the benefits offered by globalization, there are major concerns related to it. The first concern is related to the fact that globalization leads to a more immoral dispersion of income among the countries and within the countries. The second concern is related to loss of national autonomy and the countries are finding it highly complex to pursue independent domestic policies (Rangarajan, 2006). Dell Corporation has been analyzed for the purpose of this study. Since last 26 years, Dell has been capable of authorizing countries, communities, customers as well as people all over the globe to make use of the technology so that they can realize their dreams. The company tends to value its customers and thus aims at delivering the products and the services according to the needs and the wants of the customers (Dell, 2012). The five main kinds of drivers that are forcing international firms to the globalization of operations are political, technological, market, cost, and competition (Indian Institute of Material Management, 2012). Political Forces There is a trend towards the association and socialization of the global community. Both North American Free Trade Agreement (NAFTA) and the European Union present major marketing opportunities for the companies. If the government can reduce barriers to trade as well as foreign investment and can privatize most of the industries in formerly communist nations then globalization can be fostered (Acemoglu & Yared, 2010). Technological Forces With the progress in computers as well as communication technology ideas information can flow across borders. The small companies are capable of competing all over the globe because of the internet as we ll as communication technology. By making use of the internet for the purpose of business exchanges, Business-to-Business (B2B) transaction is providing major savings. Market Forces When the companies tend to globalize, they become global customers. In order to retain their presence in the global markets and expand the consumer base, organizations endeavor to set their trail towards global shores. When the home market saturates, companies seek to operate globally. Cost Forces The management goal is to make use of the economies of scale so that it can reduce unit cost. It is vital for the companies to globalize the product lines so that it can successively attain economies of scale. Production houses can be located in those countries where the cost of production is observed to be less.  

Monday, October 14, 2019

The U.N’s attempt at peace in Bosnia Essay Example for Free

The U.N’s attempt at peace in Bosnia Essay In this essay the question that I am going to answer is â€Å"Was the United Nations effective in its activities in the Bosnian War?† I am going to show that the U.N was not effective in the activities regarding Bosnia Herzegovina by first providing background on the cause of the war. I will then talk about the U.N’s beginning mandate and the formation of UNPROFOR and how they have attempted to aid Bosnia. That will transition into different perspectives on the U. N’s effectiveness in this world. I will end my paper with the resolution for the Bosnian war and finally conclude with a summary of the essay. Yugoslavia was once a country that bordered Austria, Hungary, Romania, Bulgaria, Greece and Albania. In the 1990’s there were a lot of disputes with Yugoslavia from the U.S and Germany. The U.S wanted Yugoslavia to break up because they â€Å"were interested in the more recently established states† (Mahiras) because they controlled key routes through the Balkan Mountains. Germany was interested because as territory of its â€Å"vital interest† Slovenia and Croatia.† In order to obtain this goal the U.S decided to give Yugoslavia and ultimatum that was backed by Germany, and other countries that the U.S â€Å"influenced†, the ultimatum was that â€Å"If Yugoslavia did not announce multi-party elections, it would face economic isolation.† This was the ultimate cause of Yugoslavia’s dismemberment into six different republics which included Serbia, Croatia, and Bosnia-Herzegovina. The individual states turned countries sovereignty would be put to the test in the Bosnian war. In each separate republic of what was formerly known as Yugoslavia they had a majority ethnic group. This, however, was not the case of Bosnia, Bosnia in 1991 â€Å"Muslims comprised 44% of the population, Serbs 31%, and Croats 18% with the remainder mixed.† (GOA pg 1)When Bosnia achieved independence there was a civil conflict between the Bosnian Government and the Bosnian Serbs. In order to try and keep the peace the UNPROFOR was first established (UNPROFOR stood for United Nations Protection Force) and they later created a mandate that was extended to Bosnia. Their original mandate was as follows, â€Å"UNPROFORs mandate was to ensure that the three United Nations Protected Areas (UNPAs) in Croatia were demilitarized and that all persons residing in them were protected from fear of armed attack†. (Department of Public Information) The mandate was then extended â€Å"In June 1992, as the conflict intensified and extended to Bosnia and Herzegovina, UNPROFORs mandate and strength were enlarged in order to ensure the security and functioning of the airport at Sarajevo, and the delivery of humanitarian assistance to that city and its environs.† There were also hidden dilemmas in the U.N. People were beginning to question whether they were keeping the peace, or forcing the peace unto others. Author Ivo Daalder brought up a controversial point when saying, â€Å"U.N. Protection Force in Bosnia confronted a fateful dilemma. UNPROFOR could actively oppose the Bosnian Serb effort and side with the Muslim victims of the war. But this would entail sacrificing the evenhandedness that is the hallmark of U.N. peacekeeping. Alternatively, UNPROFOR could preserve its much-vaunted neutrality and limit its role to protecting humanitarian relief supplies and agencies. But this would effectively leave the Muslims to face the Bosnian Serb assault virtually unprotected.† (Daalder). After the war the U.N is criticized with not having allocated enough time and effort into the Bosnian War. They did not help out enough until the very end and in some regards are held accountable for the Mass Genocide that occurred on their watch. This is what happened with the case in Rwanda. They did not offer aid or assistance until the very end and because of that countless people die. Back on topic, the UNPROFOR was fighting to keep Sarajevo open. They tried to keep Sarajevo open in order to deliver much needed aid however much of the aid did not reach them. It was later recorded that only about 50% of the total aid reached the areas that were most affected. The reasoning behind this was that the continued fighting prohibited the cargo from reaching certain places. In an US Secretary-General Report â€Å"one UNHCR convoy on its way from Zagreb to Sarajevo had to pass some 90 roadblocks, many of them manned by undisciplined and drunken soldiers of no clear political affiliation† (US Secretary General). In addition to the Mandate the U/N also enforced a â€Å"No Fly Zone†. This meant that they banned all military flights in Bosnia and Herzegovina. The U.N also established â€Å"safe areas† around Bosnian and the city of Sarajevo where an airport they were using was located. The public as well as the people in the safe areas expected UNPROFOR troops to protect them, ensure the delivery of humanitarian aid, and, possibly, get them out of these places. However, none of this could be easily delivered. This was because Humanitarian convoys were often halted on the way, usually prior to some military intervention of the Bosnian Serb army. The Bosnian Serbian Army would halt aid because it was going toward the Muslim communities that they were fighting. The UNPROFOR troops did not have sufficient enough numbers or weapons to protect themselves against the Serbian Army. Word was being spread around the world about the war in Bosnia. The media would â€Å"include footage from World War II concentration camps to draw parallels between the past slaughter of Jews and the current slaughter of Muslims by European Christians.† (Hedge). The Serbians were sweeping across Bosnia raiding in destroying predominately Muslim communities. They were better armed, allowing them to slaughter the Muslims who had barely any weaponry. They would leave death and destruction in their wake. When they would go into the villages they would commit as they called it â€Å"Ethnic cleansing† and mass rape. It would later be discovered that most of the people who committed these heinous crimes were mostly from the Bosnian Serbian community. Due to these crimes the United Nations Security Council created Resolution 808 which read an international tribunal shall be established for the prosecution of persons responsible for serious violations of international humanitarian law committed in the territory of the former Yugoslavia since 1991. As of 2011 they had finally caught the last fugitive to be indicted for his war crimes â€Å"The Yugoslav war crimes tribunal crowned 18 years of operations on Wednesday with the capture of the last of 161 suspects from the wars of the 1990s† (Traynor). Culture played a huge card in this war. â€Å"a cultural dimension, marked by the intentional destruction of historical monuments and cultural artifacts — it has been estimated that by the end of 1992 up to 70 percent of the architectural inheritance of Bosnia-Herzegovina had been damaged or destroyed, including over 300 mosques, 150 Orthodox churches, and 50 Catholic churches†.(Vreme) As the Serbians were going through villages they were destroying any religion affiliated with the enemy. They only wanted things left standing that were important to them. â€Å"Many of these atrocities had an explicitly anti-Muslim character, and were justified as acts of historical revenge directed against the Ottoman legacy, â€Å"the continuation in an extreme form of a process of de-Islamization that had begun decades earlier.†(Mazower)† (Nation) Around this same time there was a treaty that would negotiate peace plans in Bosnia. It called for a multiethnic Bosnia. This plan was presented to the Bosnian Serbian Army. They went on to reject the initial plan and the continued fighting. Due to this turn of events NATO was on reserve to initiate and air strike in accordance the U.N. In 1994 Nato began its first air strikes killing 64 people and injuring plenty other. They became more involves with some of their jets were gunned down. Things starting looking bleak and the war continued through most of 1995. After this time the Clinton Administration decided to take action. This is how the war ultimately got decided. The Clinton Administration created a solution with the help of Madeleine Albrigh who went on to say that the UNPROFO hindered rather than help peace agreements in Bosnia. Instead she along with her follow people helped find a new solution, â€Å"The outlines of such a solution, which was based on the Contact Group plan of 1994, included: recognition of Bosnias sovereignty and territorial integrity within its existing borders; division of Bosnia into two entities—a Bosnian Serb entity and a Muslim-Croat federation; entity borders would be drawn in a compact and defensible manner, with the federation territory accounting for at least 51 percent of the total; and acceptance of special parallel relationships between the entities and neighboring states including the possibility of conducting a future referendum on the possibility of secession† (Daalder). The war end ed with the Dayton Peace Agreement signed on 21 November 1995. The final version was signed on 14 December 1995 in Paris. In conclusion, the U.N was ineffective in its efforts to stop the Bosnian War. They tried to send supplied but the cargo did not reach its destination half of the time. The troops were not armed well enough to put up a fight against the Serbians. Countless people died because they refused to take the drastic measures necessary to stop the War before it escalated. The U.S had to intervene and with them came the plan that ultimately ended the war peacefully. After the war the TCPY arrested and charged 161 people with War crimes that violated Resolution 808. I will conclude with saying that the U.N was not effective in its activities in the Bosnian War. Bibliography. Department of Public Information, United Nations. UNPROFOR. Welcome to the United Nations: Its Your World. http://www.un.org/Depts/DPKO/Missions/unprof_p.htm (accessed November 20, 2012). Daalder, Ivo. Decision to Intervene: How the War in Bosnia Ended | Brookings Institution. Brookings Quality. Independence. Impact.. http://www.brookings.edu/research/articles/1998/12/balkans-daalder (accessed November 20, 2012). HEDGES, CHRIS. Muslims From Afar Joining Holy War in Bosnia New York Times. The New York Times Breaking News, World News Multimedia. http://www.nytimes.com/1992/12/05/world/muslims-from-afar-joining-holy-war-in-bosnia.html (accessed November 20, 2012). Mahairas, Evangelos. The Breakup of Yugoslavia . IACenter.org. http://www.iacenter.org/folder02/hidden_em.htm (accessed November 20, 2012). Nation, R.Craig. WAR IN THE BALKANS, 1991-2002. WAR IN THE BALKANS, 1991-2002. www.strategicstudiesinstitute.army.mil/pdffiles/00117.pdf (accessed November 20, 2012). THE SECRETARY-GENERAL PURSUANT TO SECURITY COUNCIL RESOLUTION. Security Council . Security Council . daccess-dds-ny.un.org/doc/UNDOC/GEN/N92/202/18/PDF/N9220218.pdf?OpenElement (accessed November 20, 2012). The Role of UN During and After the War in Bosnia-Herzegovina. The Role of UN During and After the War in Bosnia-Herzegovina. www.google.com/url?sa=trct=jq=esrc=ssource=webcd=1ved=0CDMQFjAAurl=http%3A%2F%2Fwww.ceeisaconf.ut.ee%2Forb.aw%2Fclass%3Dfile%2Faction%3Dpreview%2Fid%3D166445%2Fgoga.docei=zKSrUM6NE_K40AHHvoDQDwusg=AFQjCNHsaKAUo7bXMPbP_Hie99RnTfYLXwsig2=tCOCOkY0Y (accessed November 20, 2012). Traynor, Ian. Goran Hadzic capture a milestone for Yugoslav war crimes tribunal | World news | The Guardian . Latest US news, world news, sport and comment from the Guardian | guardiannews.com | The Guardian . http://www.guardian.co.uk/world/2011/jul/20/goran-hadzic-capture-war-crimes-milestone (accessed November 20, 2012). United States General Accounting Office . Effectiveness of U.N, operations in Bosnia. Humanitarian Intervention. www.gao.gov/assets/80/78825.pdf (accessed November 20, 2012).

Sunday, October 13, 2019

Firewall Effects on Network Performance | Evaluation

Firewall Effects on Network Performance | Evaluation In an age where our society relies so heavily on electronic communication, the need for information security is constantly increasing. Given the value and confidential nature of the information that exists on todays networks, CIOs are finding that an investment in security is extremely beneficial. Without security, a company can suffer from theft or alteration of data, legal ramifications, and other issues that all result in monetary losses. [The Best Damn Firewall Book Period] Corporations are realizing the need to create and enforce an information security policy. As a  result, IT professionals are constantly being challenged to secure their networks by installing firewalls that provide more secure [Cisco Security Specialists Guide to PIX Firewall]. Firewalls are essential components in improving network security. Most firewalls are deployed at the edge of the network to filter legitimate traffic, and can be deployed in the core of the network to further supplement and protect the capability of the network and the application running over the network to deliver required services to the end user. Firewalls have become increasingly complex, evolving from offering traditional firewall capabilities to protect networks, to offering application-aware processing of several Internet protocols. Brief literature review: Firewalls are the first front line defense mechanism against intruders ,a firewall system can operate at five of the seven layers of the OSI reference model. However, most firewall systems operate at only four layers: the data link, network, transport, and, possibly, application layers. Based on the simplicity or complexity of a firewall product or solution, the number of layers covered varies. For example, a standard IP access control list (ACL) on a Cisco router functions at OSI Layer 3, and an extended IP ACL functions at Layers 3 and 4. [cisco press cisco router firewall security] Firewalls work by inspecting different fields in headers of the packet, finding the matching rule and doing the action specified in the rule. Common firewalls (and rules) examine at least IP addresses, next protocol type (TCP or UDP) and in case of TCP or UDP their respective port numbers. That usually gives five different variables (source destination address, protocol, source destination port) to work with. [Optimizing firewall performance]. [Performance analysis of the Linux firewall in a host]. As example ,a firewall that operates at only Layers 3 or 4 can filter only on IP protocol information, IP addresses, and TCP or UDP port numbers; it cannot filter on application information such as user authentication or commands that a user enters. Therefore, the more layers a firewall can process information from, the more granular it can be in its filtering process. [cisco press cisco router firewall security] There are many considerations that organizations should include in their firewall selection and planning processes. Organizations need to determine which network areas need to be protected, and which types of firewall technologies will be most effective for the types of traffic that require protection. [ Guidelines on Firewalls and Firewall Policy]. In addition, Incorporating a firewall into a network structure is likely to increase processing and even create bottlenecks [Evaluation of Firewall Effects on Network Performance] ,whereas Each rule that a firewall has to analyze results in additional processing overhead. This means that the more rules a firewall has, the longer it will take for the firewall to determine whether or not the packet in question may pass through. [Firewalls Overview and Best Practices]. As result Firewalls are one key factor in network performance. If they cant process their rules fast enough then the whole network slows down. [ Optimizing firewall performance] Some studies shows that the firewall is sensitive to the number of rules, the type of filtering, and the transmission rate. The results of our first scenario demonstrate that for each type of filtering, latency increases linearly as the number of rules increase. [Performance analysis of the Linux firewall in a host] Scope and limitation of the study: There are some points may represent the scope and limitation of the study, including: This project focus on evaluating the effect of firewall performance using an OPNET Modeler network simulator and analyzing on different scenarios and to compare the performance impact when firewall applied. This project also focusing on effects of firewall filtering on network performance. In this study we are going to select special type of firewall application firewall The number of workstation is limited which wont exceed 200 nodes. The result will be collected is based on the simulation so may be this result will not be applicable in real hardware. Statement of the research problem: This research reports on the evaluation of using firewall in three different scenarios, which can show the impact of applying the application firewall on the performance of the network. Therefore, the research addresses the following research problem: How can we make trade-off between the security and performance? Essentially I argue that in order to investigate the feasibility of getting the trade-off of using the firewall, its necessary to compare the result when the firewall applied in different scenario, it might be depends on the policy or function nodes. Research questions: To address the research problem identified in the previous section, the following research questions have been designed: What are negative aspects of firewall? What are positive aspects of combined security and performance? What are the effects of firewall in the link utilization? What are the effects of firewall in the Real time application? Research objectives: The main objective of this research is to investigate the impact of firewall policy on the performance of the network. To identify negative aspects of firewall. To determine positive aspects of combined security and performance. To examine the effects of firewall in the link utilization. To identify the impact of firewall in real-time application. To compare the result from different scenario to estimate the effects of policy. Significance of the study: The growing Demand for using firewall by the internet users and companies to provide more protection for them and the influence of apply firewall policy in the network performance gave the impetus for this study. To verify that we propose here three different scenarios, CNTs as the one of the components of MMIC transmission lines to enhance the electrical performance. This material offer some remarkable characteristics for microelectronics applications and their large kinetic inductance (skin effect), long mean free paths, high current carrying capability and high thermal conductivity made them ideal candidates for RF/microwave applications as transmission lines. Research methodology: The research methodology work will go through four stages namely: theoretical stage, data analysis and design stage, lab stage, and evaluation stage. Theoretical stage: The objective of the theoretical stage is to constitute a theoretical frame to enable the success of the lab stage through that frame. Data analysis and design stage: In this stage, all related data obtained in the theoretical stage will be analyzed and then a selection process will be done in order to get the high quality CNT and the right design for CNT-based TLs to be able to accomplish the research questions through synthesis and characterization process. Lab stage: At this stage, firstly, the growth parameters will be optimized by using chemical vapor deposition growth method In order to produce large scale and well-aligned CNTs. Next, the characterization process will be done on the samples. SEM, FESEM, and HRTEM techniques will be used to study the morphology of the samples. XRD and EDEX techniques are used to study the samples crystallographic structures and composition elements in the samples respectively. For electrical characterization, I-V and resistivity measurements using four point probes will be applied for low frequency. Lastly, in the implementation process, the determined high quality CNT will be used to fabricate transmission lines, and then RF characterization will be done using VNA at different frequencies. Evaluation stage: The experimental results are analyzed to evaluate the effectiveness of the new variables in order to get the best CNT for the TLs. Current Stage: For device applications, the orientation of the CNT is particularly important. Therefore currently, the growth parameters are optimized by using chemical vapor deposition growth method and then, scanning electron microscopy (SEM) is used to study the morphology of the samples in order to get large scale and well-aligned CNTs. The fabrication of CNTs on P-type silicon substrates; size 1 cm by 1 cm were done using nickel (Ni) as catalyst. The first process is to remove any impurity and oxidization on the Si substrate surface. The substrate will go through stages of cleaning process, starting with acetone, methanol and then rinsed with deionized water to remove organic contaminants and particles. Then, the Si wafer was cleaned by hydrogen gas to remove natural oxide. Next, a thin Ni film was deposited on a substrate as catalyst using Electron-Beam evaporator and the substrate was placed on alumina boat before placed inside a double-heater TCVD. The first heater was set at 1000 °C to decompose methane, while the second was set at 800 to 1000 °C for pre-treatment of the catalytic film. As A. Awang Teh et. al. proposed [41] a precursor of ammonia and methanol solution at ratios of 5:8 was used to enhance the growth of CNT in methane ambient. The second heater was first switched in flowing Argon at 100 sccm. When the temperature of the second heater reached setting point and stayed stable, first heater was then switched on and methane gas was flown at flow rate of 10-50 sccm. The total growth time of the CNTs varied from 30 to 3 hours. Finally, methane gas was turned off and the furnaces were cooled down to room temperature in flowing Argon at 100 sccm to avoid carbon oxidation. After fabrication is completed, The CNT morphology was examined using SEM. Figures 1- 6 show the growth of CNTs on Si substrate using Ni with different thicknesses and subjected to methane ambient at 850 oC for 2 hours. One of the first things to note is that the catalyst thickness affects the diameter and density of the CNT. The catalyst film thicker, the larger diameter and more density CNT we can get. Also, it can be seen clearly this relationship from the SEM results shown in fig.11 to 14. Furthermore, from the SEM image shown in figure 4 the least nickel or carbon nanoparticles protrude from the nanotubes was observed. These conductive nanoparticles cause electrical shorts between interconnects for device fabrication. For this reason we can consider that the optimum nickel catalyst thickness in our case is 10 nm. A final point to note is that there is no CNT at all in figure 1. It means that the catalyst film thickness is very thin and after recombination the size of catalyst nanoparticles is too small to synthesis CNTs. Another key parameter to affect CNT growth is temperature gradient. As we can see from the SEM results shown in figures 7-20, by controlling the growth temperature we can increase the growth efficiency and purity. At reaction temperature 900 °C, the growth of clean CNTs was observed. However, no CNTs were formed when the growth temperature exceeded 900 °C. Instead, amorphous carbon was observed on the surface of the substrate. Besides catalyst and temperature gradient, carbon source flow rate also plays an important role in the CNT growth. It can be stand out from experimental results shown in figures 21 to 28 that a higher flow rate will increase the decomposition rate, and consequently the growth rate of CNT. However, when the flow rate of Ni was 10 sccm there is not enough reactant to react with the catalyst and just catalyst nanoparticles were observed. The gas flow rate affects not only CNT density but also nanotubes diameter. The higher gas flow rate, the larger diameter of nanotubes will grow. However, after a critical point, increasing the flow will change the carbon product from CNTs to carbon nano-fibers (CNFs), as it was observed from the result. The last growth parameter we have optimized is syntheses time. From experimental results shown in figures 29 to 32 we can find the relationship between the syntheses time and the length on nanotubes. Longer synthesis time with longer catalyst lifetime, longer CNT we can get. More optimization and characterizations must be done on the samples in order to get well-aligned and density MWCNT, before transmission line fabrication. Preview of the thesis: This thesis is organized into five chapters. Chapter One serves as an introduction to this study, providing the theoretical framework, research objectives and significance of the present study. It also offers a brief overview of the methodology that is employed. Definitions and delimitations that map out the boundaries for the present study are also outlined. Chapter Two provides the literature review for this study and serves to develop key issues related to the theoretical framework. The third chapter is on methodology. This study approaches the issues of fabrication, simulation and modulation. The fourth chapter reports the results of the content analysis and discusses the findings. The fifth chapter reviews the research questions and summarizes the thesis. This chapter also provides suggestions for future research. Network Security is one of the most important fields dealing with the Internet. The ability to access and transfer information in a few seconds allows the government, companies, educational institutions, and individuals to accelerate the decision process or simply be informed. However, information can be very valuable and there is a need for better and faster security systems to protect information and networks. Therefore, it is best to limit the number of rules to no more than 30-50. However, for best performance, less than 25 rules are recommended. Also, firewalls process their rule base from the top down. As soon as the firewall finds a rule that applies to a particular packet, the rule is applied and the packet is processed (either allowed to continue or dropped). It is recommended that the most important and most utilized rules should be at the top of the rule list. This prevents the firewall from having to process through a number of rarely used rules to finally get to rules that apply to the majority of the network traffic. Determining the correct order of rules for a particular implementation is an ongoing process. Initially, there is a significant amount of testing and trial-and-error involved in determining the correct order that the rules should be in. Also, the rule base should be reviewed periodically to see if the organizations requirements or network usage has changed that wou ld require the reordering of existing rules as well as adding or removing rules. Finally, one should make sure to keep the number of domain objects in the rule base to a minimum, and also make sure that these objects are kept towards the bottom of the rule base list. Firewalls Overview and Best Practices There are many aspects to firewall management. For example, choosing the type or types of firewalls to deploy and their positions within the network can significantly affect the security policies that the firewalls can enforce. Policy rules may need to be updated as the organizations requirements change, such as when new applications or hosts are implemented within the network. Firewall component performance also needs to be monitored to enable potential resource issues to be identified and addressed before components become overwhelmed. Logs and alerts should also be continuously monitored to identify threats-both successful and unsuccessful. Firewall rulesets and policies should be managed by a formal change management control process because of their potential to impact security and business operations, with ruleset reviews or tests performed periodically to ensure continued compliance with the organizations policies. Firewall software should be patched as vendors provide updates to address vulnerabilities. [ Guidelines on Firewalls and Firewall Policy] The firewall can become a bottleneck. All network traffic that passes between the Internet and the DMZ, the DMZ and the private network, and potentially, the Internet and the private network, must be inspected by the firewall. This can result in the firewall becoming a bottleneck and reducing the performance between the network and the Internet.

Saturday, October 12, 2019

Laertes’ Place in Shakespeares Hamlet :: GCSE English Literature Coursework

Laertes’ Place in Hamlet      Ã‚  Ã‚   A.C. Bradley depicts the Shakespearean characters of Laertes and Fortinbras in Hamlet as ones who throw into relief the character of the protagonist in Shakespearean Tragedy: Lectures on Hamlet, Othello, King Lear and Macbeth:    And secondly, we find among them two, Laertes and Fortinbras, who are evidently designed the throw the character of the hero into relief. Even in the situations there is a curious parallelism; for Fortinbras, like Hamlet, is the son of a king, lately dead, and succeeded by his brother; and Laertes, like Hamlet, has a father slain, and feels bound to avenge him. And with this parallelism in situation there is a strong contrast in character; for both Fortinbras and Laertes possess in abundance the very quality which the hero seems to lack, so that, as we read, we are tempted to exclaim that either of them would have accomplished Hamlet’s task in a day. (94)    The son of Polonius and brother of Ophelia, Laertes must suffer the demise of both father and sister during the course of Hamlet. Helen Gardner, by way of overview, compares Laertes to Hamlet and King Claudius in â€Å"Hamlet and the Tragedy of Revenge†:    Hamlet’s agony of mind and indecision are precisely the things which differentiate him from the smooth, swift plotter Claudius, and from the coarse, unthinking Laertes, ready to â€Å"dare damnation† and cut his enemy’s throat in a churchyard. (222)    Laertes makes his appearance in the drama after Marcellus, Barnardo and Horatio have already seen the Ghost and have trifled with it in an effort to prompt it to communicate with them. Horatio and Marcellus exit the ramparts of Elsinore intending to enlist the aid of Hamlet, who is dejected by the â€Å"o’erhasty marriage† to Hamlet I’s wife less than two month’s after the funeral of Hamlet’s father (Gordon 128). After this scene, Laertes is one of many in attendance at a post-coronation social gathering of the court at Elsinore. Laertes, like Fortinbras a rival of Hamlet (Kermode 1138), comes with his father, Polonius, who manipulates both him and his sister (Boklund 122).G. Wilson Knight says, â€Å"Instinctively the creatures of earth—Laertes, Polonius, Ophelia, Rosencrantz and Guildenstern, league themselves with Claudius: they are of his kind† (N. pag.). Claudius insincerely pays tribute to the memory of his own deceased brother, the former king, and then conducts some items of business, for example dispatching Cornelius and Voltemand to Norway to settle the Fortinbras affair.

Friday, October 11, 2019

America’s cause Essay

But he calmly proceeded to act his part, pretending not the least bothered by the gut-wrenching ride over a swirling sea. The following day he received this message from the Navy Department: â€Å"Dear Mr. Wayne- we are pleased to record this latest addition to naval lore. To the immortal expression, ‘damn the torpedoes, full speed ahead,’ we now add your own memorable words, ‘get me out of this son of a bitch! ’†(Wayne168-169). Wayne spoke the American language well. Once, asked by a reporter about his rumored plan to run for president, Wayne said, â€Å"Bullshit. † When asked to give a definite comment, Wayne told him to use the word. The following day, this news item appeared: â€Å"When Mr. Wayne was questioned about the possibility of running for national office, he replied ‘B—–t! †(Wayne 162). Americans responded to John Wayne in a manner different from other stars of his generation. Other actors simply shed off their screen personae after the lights went off; not so Wayne. Although little was written about his private life (marriage, romantic affairs) until after his death, his public life was an open book that maintained and reinforced the John Wayne mystique. He was a natural treasure who was loved and respected. In 1979 he was awarded the Congressional Gold Medal. In 1998, an Army RAH-66 helicopter was named â€Å"Duke† in his honor. He wore a POW bracelet to show his sympathy with the fighting men in Viet Nam. Speaking extemporaneously before a subcommittee hearing in connection with the bill for the Congressional Gold Medal, Maureen O’Hara Blair, Wayne’s co-star in The Quiet Man, spoke for Wayne: â€Å"He is, believe me, the United States of America. He is a man that has a code of beliefs that he sticks with. He believes in individual responsibility and honor. † Said Reagan of Wayne: I never saw Duke display hatred toward those who scorned him. Oh, he could use some pretty salty language, but he would not tolerate pettiness and hate. He was human all right: he drank enough whiskey to float a PT boat, though he never drank on the job. . . he was virtually always the first to arrive on the set and the last to leave. World War II helped to define what John Wayne stood for. Unable to join the Navy due to an old football injury, his age (34), and being a father of four, Wayne did his part in the war by making movies about America’s fighting men. He appeared minus his horse and six-shooter in memorable films like the Fighting Seabees, Flying Tigers, Reunion in France, They Were Expendable, and Back to Bataan. The 1949 film Sands of Iwo Jima earned Wayne his first Oscar nomination. These films did not have the nauseating gore and graphic violence of present-day war movies, but they exalted the heroism of ordinary men, and people related to them well. Wayne had made it a point not to accept any role that was un-American or tended to denigrate the United States or the American tradition. At a time when he was nearly bankrupt, Wayne bankrolled, starred in, and directed the epic The Alamo, which had been his dream project of many years. In it, playing the role of Davy Crockett, he described the defenders’ role as they waited for the approaching battle with Santa Anna: â€Å"There’s right and there’s wrong. You got to do one or the other. You do the one and you’re living. You do the other and you may be walking around, but you’re as dead as a beaver hat. † As Crockett, he voiced out the timeless yearning of the Texans for independence: â€Å"It means people can live free, talk free, go or come, buy or sell, be drunk or sober, however they choose. † John Wayne did not win on Oscar for The Alamo (except for Best Sound) although it received six nominations, but people came in droves to see the movie. Besides his classic westerns and war pictures, The Alamo is one of his lasting legacies. John Wayne is often equated with conservatism. He was the product of an age when Americans were proud of their heritage, conscious of their country’s new role as a world power and sincerely believed in the righteousness of America’s cause. He was born when Theodore Roosevelt was president, a man who believed in Manifest Destiny and was wont to â€Å"speak softly, but carry a big stick. † Wayne belonged to a generation yet untouched by pangs of national self-doubt, unstricken by remorse over purported wrongs committed by the white man against the natives, the blacks, the Vietnamese, the American youth who were being sent to die in remote battlefields. This was the turbulent 60’s, an age when young Americans were seduced by flower power, discovered new ideologies, adopted a libertarian attitude and opposed any kind of war. In a nation divided by war, John Wayne was seemingly a lonely figure as young Americans felt shame for everything America ever did in the course of her ascent to world dominance. A friend of Senators Barry Goldwater and Joe McCarthy, and former President Ronald Reagan, John Wayne was Republican to the core. Against the weakening of American resolve, John Wayne’s tenacious adherence to the American tradition of duty and honor could only be seen as naivete – sprung from the good guy–bad guy scenarios in his celluloid world. From the 40’s to the 60’s, the Left made inroads in school campuses where teach-ins became common, swaying many of the youth to the new ideology, and threatening to undermine the foundations of the country’s democratic system. Due to its potentials for propaganda, the movie industry was targeted and there were rumors that some Hollywood figures had embraced socialism. In 1944, Wayne helped found the Motion Picture Alliance for the Preservation of American Ideals, in the company of other giants like Clark Gable, Gary Cooper, Walt Disney, and Robert Taylor. He later became president of the association for two terms. He was outspoken against the communist threat. He was mistaken for an archconservative and accused of blackballing movie personalities who refused to cooperate in Congressional hearings, although he never testified, nor did he blackball anybody (Wayne 55). His being perceived as a staunch anti-communist even gave rise to rumors that the late Soviet dictator Joseph Stalin plotted to have him murdered (Soviet Dictator).

Thursday, October 10, 2019

Art Critque †Mona Lisa Overdose Essay

Using the different elements of art, the artist organized the elements to provoke a feeling of puzzlement and surprise to the audience. The Mona Lisa, being a famous painting, was distorted in a way that it projects a different emotion from the original one. Lorenzana presented the distortion of the proportion and scale of the face of the Mona Lisa in order to evoke a feeling of unsettling disbelief with the visuals of the painting. The change of the Mona Lisa’s face caused a contrast to be present in the artwork. It emphasized the subject’s face and the cigarette presented irony from the original knowledge about the base artwork. Combining all these elements, the artist was able to express the idea of the paining, which is how something clean and subtle, can turn into something mischievous or bizarre. The elements provided the audience a sense of bizarre facial elements on the subject, which caused a subtle, dark, and mysterious tone to be emanated from the painting. Interpretation By Paolo Alilam In this artwork Luis Lorenzana painted a very different Mona Lisa. He depicted a very â€Å"overdosed† Mona Lisa with a stick of cigarette, a bottle of Red Horse, and face with clown-like make up. I think he was just trying to add a little bit of today in something very classic. The normal Mona Lisa shows a very pleasant portrait. Luis Lorenzana’s artworks usually show surrealism or bizarreness. This fact explains this rendition of the Mona Lisa. I think he created this just to show creativity and give people a different taste compared to the usual. Who would imagine Mona Lisa like this anyway? When I look at the artwork I feel a bit weirded-out. For me it’s not such a pleasant artwork. It’s somewhat scary even. But, like I said, he made this artwork just to give people a different taste. â€Å"Do I think there are symbols to the artwork?† Maybe. Maybe Luis Lorenzana likes cigarettes, drinks, and other things like that. Well, I don’t really k now the guy. Another possibility is that when he was painting this he was smoking or drinking. We’ll never know unless we ask him. Judgment By JV Valdez The artwork is a very surrealistic painting. It presents the famous Mona Lisa in some sort of parody in which seems like she’s high on drugs and drunk from drinking â€Å"Red Horse beer†. In my opinion the artist presented a really good distortion of the Mona Lisa. In the original painting of the Mona Lisa she was presented as a demure woman, however the artist distorted that and turned her into a non-conservative drunkard. Based on my personal preferences, I would consider this as a good artwork because I have a preference for artworks that look demented and creepy. However, I don’t think it is an important artwork because I have seen a lot of different artworks trying to do the same distortion with the Mona Lisa as well. I also don’t find the artwork unique in anyway because like I said I have seen other distortions of the Mona Lisa and I view this certain artwork as just one of the many different imitations. All in all I really like this artwork because it has that eerie and demented emotion that it is trying to evoke from viewers, which gives me the creeps every time I look at it.

Data Definition Language Essay

Describe the ways in which database technologies could be used by an office stationery supply company to achieve low-cost leadership. Answer: Sales databases could be used to make the supply chain more efficient and minimize warehousing and transportation costs. You can also use sales databases, as well as text mining and sentiment analysis, to determine what supplies are in demand by which customers and whether needs are different in different geographical areas. Business intelligence databases could be used to predict future trends in office supply needs, to help anticipate demand, and to determine the most efficient methods of transportation and delivery. Identify and describe three basic operations used to extract useful sets of data from a relational database. Answer: The select operation creates a subset consisting of all records (rows) in the table that meets stated criteria. The join operation combines relational tables to provide the user with more information than is available in individual tables. The project operation creates a subset consisting of columns in a table, permitting the user to create new tables that contain only the information required. List and describe three main capabilities or tools of a DBMS. Answer: A data definition capability to specify the structure of the content of the database. This capability would be used to create database tables and to define the characteristics of the fields in each table. A data dictionary to store definitions of data elements in the database and their characteristics. In large corporate databases, the data dictionary may capture additional information, such as usage; ownership; authorization; security; and the individuals, business functions, programs, and reports that use each data element. A data manipulation language, such as SQL, that is used to add, change, delete, and retrieve the data in the database. This language contains commands that permit end users and programming specialists to extract data from the database to satisfy information requests and develop applications.

Wednesday, October 9, 2019

Human Resource Management- Cases Study Essay Example | Topics and Well Written Essays - 750 words

Human Resource Management- Cases Study - Essay Example The baby boomers were loyal workers that gave their lives for the companies they work for. The generation Y members have no loyalty for corporations and will work for the highest bidder that provides working environments that they like. The employee retention rate of companies among generation Y workers is much lower than other generations. 3. Generation Y workers will have to make adjustments in the workplace in order to be successful. The workers have to accommodate their styles to the corporate culture of their workplace. If the workplace has a specific dress code the generation Y workers have to act maturely and professional and follow the corporate guidelines. 1. I believe offshoring jobs to developing nations like India in a necessary strategic move that increase labor opportunities in India, while at the same time protecting thousands of jobs in America because the savings achieved in these arrangement are invested to improve the domestic business operations. 2. There are plenty of adjustments an employee needs to make when starting out in a job for an Indian company. There are cross cultural differences that must be studied in order to understand each other. When communicating with colleague one must act with respect and listen well perform making a respond. 1. The direct labor or non-managerial employees of a company represent a labor force whose behavior influences the performance outcome of a corporation. This group must be included in the design process of an incentive compensation plan. 3. The American Woodmark scorecard approach is an analytic tool whose application is more effective in flexible organizations. A company whose organizational structure follows a matrix mechanism can benefit from implementation of the Woodmark method because different team members would be able to receive unbiased feedback from outside workers that are not part of their immediate teams. 1. It is completely unethical to promise employee benefits and then many