Wednesday, December 25, 2019

The Younger Years of Grace Murray Hopper

Computer programming pioneer Grace Murray Hopper was born on December 9, 1906, in New York City. Her childhood and early years contributed to her brilliant career but also showed how she was a typical kid in many ways. She was the oldest of three children. Her sister Mary was three years younger and her brother Roger was five years younger than Grace. She fondly recalled the happy summers playing typical childhood games together at a cottage on Lake Wentworth in Wolfeboro, New Hampshire. Still, she thought that she took the blame too often for mischief the children and their cousins got into on vacation. Once, she lost her swimming privileges for a week for instigating them to climb a tree. Besides playing outdoors, she also learned crafts such as needlepoint and cross-stitch. She enjoyed reading and learned to play the piano. Hopper liked to tinker with gadgets and find out how they worked. At age seven she was curious about how her alarm clocked worked. But when she took it apart, she was unable to put it back together. She continued taking apart seven alarm clocks, to the displeasure of her mother, who limited her to taking apart just one. Math Talent Runs in the Family Her father, Walter Fletcher Murray, and paternal grandfather were insurance brokers, a profession which makes use of statistics. Graces mother, Mary Campbell Van Horne Murray, loved math and went along on surveying trips with her father, John Van Horne, who was a senior civil engineer for the city of New York. While it wasnt proper at that time for a young lady to take an interest in math, she was allowed to study geometry but not algebra or trigonometry. It was acceptable to use math to keep household finances in order, but that was all. Mary learned to understand the familys finances because feared her husband would die from his health problems. He lived to be 75. Father Encourages Education Hopper credited her father for encouraging her to step beyond the usual feminine role, have ambition and get a good education. He wanted his girls to have the same opportunities as his boy. He wanted them to be self-sufficient since he wouldnt be able to leave them much of an inheritance. Grace Murray Hopper attended  private schools in New York City where the curriculum focused on teaching girls to be ladies. However, she was still able to play sports at school, including basketball, field hockey, and water polo. She wanted to enter Vassar College at age 16 but failed the Latin exam, She had to be a boarding student for a year until she was able to enter Vassar at age 17 in 1923. Entering the Navy Hopper was considered too old, at age 34, to join the military after the attack on Pearl Harbor that brought the United States into World War II. But as a mathematics professor, her skills were a critical need for the military. While Navy officials said she should serve as a civilian, she was determined to enlist. She took a leave of absence from her teaching position at Vassar and had to get a waiver because she was underweight for her height. With her determination, she was sworn into the U.S. Navy Reserve in December 1943. She would serve for 43 years. Her younger years shaped her path to the computer programming legacy for which she is famous. Later in life, after her time in the Navy, she invented the Mark I Computer with Howard Aiken. Her early math talent, her education, and her Navy experience all played a role in her eventual career. Source and Further Reading Elizabeth Dickason, Remembering Grace Murray Hopper: A Legend in Her Own Time, The Department of the Navy Information Technology Magazine, 27 June 2011.

Tuesday, December 17, 2019

President Trump Is A Disaster For Transgender People

No one would have ever predicted that Donald Trump would win the 2016 Presidential Election. No one would have ever believed that a person as racist, sexist, homophobic, and transphobic as Donald Trump would ever be allowed to get as near as he did to the White House—but he did. Now, we all find ourselves justifiably concerned for not only our own well being, but also of the well being of other groups that have been targeted time and time again, not only by Donald Trump himself, but also by the entire Republican platform. While it is well known that some of the groups who have fallen victim of endless discrimination include racial and ethnic minorities via the constant threat of deportation and/or policies that allow for racial profiling, other groups include the LBGTQ community. However, according to the article, â€Å"President Trump is a disaster for transgender people† written by Samantha Allen, given the fact that both Trump and his Vice President, Mike Pence, appe ar to favor the Religious Freedom Act, repealing Obama Care, and allowing HIV preventative inaction, I argue, and with great reason, that those who will be severely targeted and affected by their political and religious stances will be the entire transgender and transsexual community—a fear that I once assumed was a thing of the past. Along with building up a wall around the Mexico-US border, Trump is also quite famously known for promising to repeal Obama Care, as he argues that it doesn’t work. While this aloneShow MoreRelatedThe First 100 Days In The White House Are Always A Tell1730 Words   |  7 Pages100 days in the White House are always a tell tale sign of what kind of president the United States would have for the next four years. President Donald Trump’s 100 days in office could be seen as very successful to some and very concerning for others. However, President Trump is made sure in his first 100 days that he owned up to all of the promises he made to Americans all around the country during election tours. While Trump was campaigning during the election he made it very clear that he was noRead MoreMinimum Wage Should Be Legal1427 Words   |  6 Pageslegal fight over Trans rights and bathroom access (July 14, 2016) http://www.huffingtonpost.com/entry/transgender-bathroom_us_57869ceee4b0867123df7887 The debate over the rights of transgender students and bathrooms has reached the Supreme Court. An emergency application was presented by the Gloucester County School Board in Virginia, which was order by a federal judge on behalf of a transgender student who was denied access to a bathroom. The U.S. Court of Appeals ruled that the federal anti-discriminationRead MoreStephen P. Robbins Timothy A. Judge (2011) Organizational Behaviour 15th Edition New Jersey: Prentice Hall393164 Words   |  1573 PagesSociology 14 †¢ Anthropology 14 There Are Few Absolutes in OB 14 Challenges and Opportunities for OB 15 Responding to Economic Pressures 15 †¢ Responding to Globalization 16 †¢ Managing Workforce Diversity 18 †¢ Improving Customer Service 18 †¢ Improving People Skills 19 †¢ Stimulating Innovation and Change 20 †¢ Coping with â€Å"Temporariness† 20 †¢ Working in Networked Organizations 20 †¢ Helping Employees Balance Work–Life Conflicts 21 †¢ Creating a Positive Work Environment 22 †¢ Improving Ethical Behavior 22

Monday, December 9, 2019

Benchmark Scalability Distributed Database -Myassignmenthelp.COm

Question: Discuss About The Benchmark Scalability Distributed Database? Answer: Introduction The process of replication in the database involves copying of the files at variable sources so that availability of the data is maintained at all times. However, either a fragment or a relation can be replicated at one site. The main benefits of this system are that the system can continue to operate for as long as one site involving the data is running (Coronel Morris, 2016). In addition, it can also be used to make the retrieval of the data very easy and makes it very reliable and easy to perform the work concerned. It can also be used to reflect the organizations structure of the concerned company. Lastly, the use of the distributed database can also help the various organizational centers to achieve local or site related autonomy which will be helpful in controlling the data. The first problem related to the replication procedure is that whenever a copy of the file is modified, it becomes difficult to perform similar operations. This reduces the consistency of the file which leads to the reduction in efficiency of the process. The continuous consistency is modified where deviation in the numerical values are observed between the replicas. The next disadvantage is the security of the system (Liu zsu, 2018). The data file that has been replicated needs to be made secure such that the availability of it is confirmed. Lastly, the time taken for replicating the data can be very high which depends on the size of the file to be replicated. Such activities can lead to massive downtime of the system which will ultimately result in reduction of business processes. For deciding the need for fragmentation, there are two different considerations that are always considered. These are the quantitative information and the qualitative information. The quantitative information is those data which denotes the quantity of the records. Similarly, the qualitative information denotes the quality of the data. The frequency related to the number of queries, site of the query, and the selectivity of the queries is termed as quantitative information. In addition, the types of data and the type of operation i.e. read or write operations are termed as the qualitative information (Abadi, Madden Lindner, 2016). This information is necessary for deciding the requirement of fragmentation. Along with this, the partitioning of identifiers also helps on denoting the type of fragmentation to be followed. In case, portioning of relations with tuples are involved, then horizontal fragmentation is required. Similarly, if partitioning of relations with attributes is involv ed, then vertical fragmentation is adopted. The use of allocation designs are mainly utilized for denoting the storage of the fragments on the respective sites needed. There can be two different fragment storage options. These can be centralized or partitioned. In case of the centralized allocation design, the requirements include the allocation of a single database and a database management system at one of the site required (Bailis et al., 2014). The users of the system will be distributed across various sites related to the system. Another allocation design is the partitioned database design. In case of this design system, the database is made to be partitioned to form various disjointed fragments where each one of these fragments will be assigned to one specific site. Lastly, there is some other information that is considered for allocation design of a fragment. These include the database related information, application based information, and site based information and the network information. There are various considerations that are followed while adopting the design considerations of the replicated aspects. The first consideration is the selection of the fragments that will be stored as various copies. There are two different types of replications processes and depending on them, the design considerations are adopted (Cellary, Morzy Gelenbe, 2014). These are the complete replication and the selective replication. For the complete replication process, a whole copy of the system database will be maintained at each of the sites concerned. Similarly, for selective replication process, selective number of fragments will be replicated at each of the sites concerned. Another consideration that is adopted is the numerical value of the probability. If the ratio of the read only query and the updated queries are greater or equal to one, then the process of replication is considered to be beneficial, else it might pose problems in the process. The design strategies of a distributed database involves considering the three aspects of the database, fragmentation, allocation and replication. These three aspects are always related to each other either by following the bottom-up approach or the top-down approach. According to the distributed database design specifications, the fragmentation process is utilized to divide the information and database so that they can be shared on the sites (Widom, 2016). The next is the allocation processes where these fragmented aspects are allocated to the required sites. Lastly, the replication process involves replicating of the requirements such that they can then be copied for future reference. This is the main indications of the processes. In case of the diagram depicted above, the databases are fragmented to form the smaller components which are then allocated and replicated at the necessary sites required. For adopting horizontal fragmentation at the regional offices, various advantages and disadvantages exist. In this scenario, financial data from the regional offices are transferred to the headquarters. In this type of operations, the main advantage of this operation is that the speed of processing is much fast. In addition, in case of horizontal fragmentation, partitioning of relations with tuples is adopted. However, there are various disadvantages to these processes. In cases of this, emergency cases cannot be handled properly. If the server crashes, the lack of replication will make it hard to duplicate the data. As a result, the process of fragmenting will have to be started all over again which will lead to the consumption of resources and time (Foster Godbole, 2016). Although, the process of horizontal fragmentation is considered fast, the failures like server crash or network problems can lead to problems to be associated with data transfer. In this case, horizontal fragmentation at a geographical level is applied. This is followed by replication of the data. The system associated to it is considered to be very efficient. This is because fragmentation and replication is done on the same level. This helps in keeping the system effective and also helps in keeping efficiency in the functionality of the regional offices. The main advantage of this system is that the system can be successfully utilized in a geographical level owing to the increase in the business operations of the company involved. However, the main disadvantage of this system is that the need for a connection is required. In case of this scenario, the replicated data are successfully made so that they can be accessed from the various geographical locations (Kuhlenkamp, Klems Rss, 2014). However, the lack of network connection can make it difficult to sync the data. This will lead to un-controlled and un-coordinated business process and this is the main disadvantage of the system. In case of this scenario, horizontal fragmentations are applied. It can be seen that the horizontal fragmentation involves partitioning of relation with tuples. For this reason, it is faster in processing than the vertical fragmentation process. However, in case of this scenario, the replicated fragments are stored in then regional centers of the office. The main advantage of this type of application is that the requirements for maintaining the data are much less (Jukic, Vrbsky Nestorov, 2016). This is mainly because the connection to the regional offices is not required. As a result, the synchronization among the regional offices will be maintained effectively. However, the main disadvantage is that the headquarter office of the concerned company will not be able to control the normal operations. This is mainly because the data from the regional office will be already used to operate upon without syncing with the headquarters (Coronel Morris, 2016). As such, the normal operation of the headquarters will lag behind the operation of the regional offices which will in turn lead to need for better and faster connection that will cause more acquisition of resources. In case of the vertical fragmentation processes, the partitioning of relations is done by considering the attributes of the database. In this scenario, the financial tables are considered in the headquarters and the other tables are considered in the regional offices. This process is effective and considered to be efficient which an advantage to the process is (Liu zsu, 2018). Another advantage is that the cost of achieving the fragmentation processes is also very low. This also reduces the need for allocating resources for this purpose. The main disadvantage is the need for replication of the data. This will be utilized in storing the data in all of the locations such that efficient operation can be handled and backup of the system is available at all times. Out of the entire discussed scenario, the vertical fragmentation adoption is considered to be effective. This is mainly because the fragmented data is efficient in adopting the business processes. For such global enterprises, this will be considered to be a great solution for business processes. This design for adopting distributed databases is termed to be effective for addressing the requirements of the organization. In this network, vertical fragmentation is applied and in this case, the replication of data is done when network is available. References Abadi, D., Madden, S., Lindner, W. (2016). Sensor Network Integration with Streaming Database Systems. InData Stream Management(pp. 409-428). Springer, Berlin, Heidelberg. Bailis, P., Fekete, A., Franklin, M. J., Ghodsi, A., Hellerstein, J. M., Stoica, I. (2014). Coordination avoidance in database systems.Proceedings of the VLDB Endowment,8(3), 185-196. Cellary, W., Morzy, T., Gelenbe, E. (2014).Concurrency control in distributed database systems(Vol. 3). Elsevier. Connolly, T. M., Begg, C. E. (2005).Database systems: a practical approach to design, implementation, and management. Pearson Education. Coronel, C., Morris, S. (2016).Database systems: design, implementation, management. Cengage Learning. Faerber, F., Kemper, A., Larson, P. ., Levandoski, J., Neumann, T., Pavlo, A. (2017). Main Memory Database Systems.Foundations and Trends in Databases,8(1-2), 1-130. Foster, E. C., Godbole, S. (2016). Distributed database systems. InDatabase Systems(pp. 361-370). Apress, Berkeley, CA. Jukic, N., Vrbsky, S., Nestorov, S. (2016).Database systems: Introduction to databases and data warehouses. Prospect Press. Kuhlenkamp, J., Klems, M., Rss, O. (2014). Benchmarking scalability and elasticity of distributed database systems.Proceedings of the VLDB Endowment,7(12), 1219-1230. Liu, L., zsu, M. T. (2018).Encyclopedia of database systems. Springer. Widom, J. (2016, September). Research in database systems: Challenges, principles, prototypes, and results. InAdvances in ICT for Emerging Regions (ICTer), 2016 Sixteenth International Conference on(pp. 3-3). IEEE.

Monday, December 2, 2019

Pensions and the Modern Welfare State Denmark and Spain free essay sample

A paper which discusses the pension systems of the EUs social-welfare states and the demographics of the 21st century. The paper discusses a looming problem for the European Union and its welfare states Denmark and Spain. He stresses the fact that, on the one hand, people are retiring at younger ages and living longer, and on the other hand there are fewer people to contribute to pension funds due to decreasing populations and the use of technology instead of labor. The paper examines the pension schemes and demographic trends of Denmark and Spain and gives an overview of the welfare state. As Spain moves into the twenty first century, many of its citizens are being forced to give up long-cherished traditional lifestyles to come to terms with new societal demands. Traditionally in Spain, the elderly have lived with their children. But several factors are combining to change that tradition. One of those factors is increasing educational levels for women. We will write a custom essay sample on Pensions and the Modern Welfare State: Denmark and Spain or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page As has been reported in numerous studies, as womens educational levels rise the number of children they have decreases. Todays Spanish women are entering the workforce, leaving them less able to take care of elderly relatives in the home.

Tuesday, November 26, 2019

Hack, Hacker and Hacking

Hack, Hacker and Hacking Hack, Hacker and Hacking Hack, Hacker and Hacking By Maeve Maddox A reader is puzzled by a new permutation of the word hack: The word hack, until recently, meant to break into someones Internet account or system. Now I see it meaning tips or suggestions.   Am I correct? Like this reader, the only meaning that hack held for me in regard to computers was as a verb meaning â€Å"to illegally enter a computer system.† I too was surprised to come across headlines like the following: 100 Life Hacks That Make Life Easier 23 Inventive Hacks That Every Parent Should Know Millennials Are Ditching Delivery for This Dinner Hack Best Travel Hacks 17 Thanksgiving Hacks For The Best Meal Of Your Life How did hack go from â€Å"illegal computer activity† to â€Å"a tip for making things easier to do†? Looking a little further, I find that hack and hacking to connote only malicious unauthorized access to computer files may reflect general usage, but not that of programmers who are proud to be known as â€Å"hackers.† The OED has ten entries for the word hack: five as a noun, four as a verb, and one as a combining form. The verb hack in the sense of â€Å"to cut with heavy blows† has been in the language since the early 13th century, but the use of hack in the context of computer programming dates from the 1970s. Note: Hack in the sense of â€Å"to cope with† dates from 1955: â€Å"I can’t hack all this extra work.† The etymology of the computer term hack is not certain. According to one theory, it derives from the noun hack used as tech slang for â€Å"one who works like a hack at writing and experimenting with software, one who enjoys computer programming for its own sake. (OnlineEtymologyDictionary). The noun hacker does not carry a connotation of illegal activity in the following OED citations from 1976: The compulsive programmer, or hacker as he calls himself, is usually a superb technician. The compulsive programmer spends all the time he can working on one of his big projects. ‘Working’ is not the word he uses; he calls what he does ‘hacking’. The earliest citation that associates the word hacking with illegal activity is dated 1983: Hacking, as the practice of gaining illegal or unauthorized access to other peoples computers is called. Because hack, hacker, and hacking have such varied connotations, writers should consider the intended audience when using them. In the programming community, hacker and hacking are good things, or at least neutral. Using an adjective to describe the bad kind might be useful when writing for programmers, for example, â€Å"malicious hacking† or â€Å"illegal hacking.† As for the noun hack meaning â€Å"tip,† â€Å"suggestion,† or â€Å"work-around,† I expect the usage will become embedded in computer-speak. The trendy use of hack in the context of cooking, parenting, and other non-computer-related fields, however, will probably eventually revert to tip or suggestion. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Vocabulary category, check our popular posts, or choose a related post below:Possessive of Proper Names Ending in Sâ€Å"As Well As† Does Not Mean â€Å"And†The Difference Between e.g. and i.e.?

Saturday, November 23, 2019

Trumpet Fish Facts

Trumpet Fish Facts Trumpet fish are part of class Actinopterygii, which consists of ray-finned fish, and can be found in coral reefs throughout the Atlantic, Indian, and Pacific oceans. There are three species of trumpet fish under the scientific name Aulostomus: the West Atlantic trumpetfish (A. maculatus), the Atlantic trumpetfish (A. strigosus), and the Chinese trumpetfish (A. chinensis). Their name is derived from the Greek words flute (aulos) and mouth (stoma) for their long mouths. Fast Facts Scientific Name: AulostomusCommon Names: Trumpetfish, Caribbean trumpetfish, stickfishOrder: SyngnathiformesBasic Animal Group: FishDistinguishing Characteristics: Long, slender bodies with a small mouth, varied colors.Size: 24-39 inchesWeight: UnknownLife Span: UnknownDiet: Small fish and crustaceansHabitat: Coral reefs and rocky reefs throughout the Atlantic, Indian, and Pacific oceans.Population: UnknownConservation Status: Least ConcernFun Fact: Male trumpet fish carry fertilized eggs with them until they hatch. Description Trumpet fish have elongated bodies and snouts leading into a small jaw. The lower jaw has small teeth, and their chin has a short barbel for defense. They also have a row of spines on their backs that can be raised to ward off predators, and their body is covered with small scales. Trumpet fish can grow anywhere from 24 to 39 inches depending on the species, with A. chinesis reaching up to 36 inches, A. maculatus averaging 24 inches, and A. strigosus reaching up to 30 inches. Their coloration helps them blend in with their environment, and they can even change their colors for stealth and during their mating ritual. Habitat and Distribution Trumpetfish in Chichiriviche de la Costa,Venezuela,Caribbean Sea. Humberto Ramirez/Moment/Getty Images A. maculatus are found in the Caribbean sea and off the northern coasts of South America, A. chinensis are found throughout the Pacific and Indian oceans, and A. strigosus are found in the Atlantic ocean off the coast of Africa and parts of South America. They live in coral reefs and reef flats in the tropical and subtropical waters in these areas. Diet and Behavior A trumpet fish’s diet consists of small fish and crustaceans, as well as occasionally larger fish. For larger prey, trumpet fish swim near large herbivorous fish to hide and ambush their prey. To catch smaller food, they float in a vertical, head-down position among corals to conceal themselves- a technique that also hides them from predators- and wait for their prey to come across their path. They capture them by suddenly expanding their mouth, which generates a suction strong enough to draw in their prey. Additionally, they can also consume fish larger than the diameter of their mouths due to the elasticity of their tissue. Reproduction and Offspring Not much is known about trumpet fish reproduction, but trumpet fish begin courtship via a dancing ritual. Males use their color changing abilities and dance to win over females. This ritual occurs close to the surface. After the ritual, females transfer their eggs to the males to fertilize and care for until they hatch. Like seahorses, the males care for the eggs, carrying them in a special pouch. Species Trumpetfish. Daniela Dirscherl/WaterFrame/Getty Images Plus There are three species of Aulostomus: A. maculatus, A. chinensis, and A. strigosus. The coloration of these fish changes depending on the species. A. maculatus are most commonly reddish-brown but also can be grey-blue and yellow-green with black spots. A. chinensis can be yellow, reddish-brown, or brown with pale bands. The most common colors for A. strigosus are brown or blue, green or orange tones, or intermediate shades. They also have a pattern of pale, vertical/horizontal lines across their body. A. chinensis are seen in shallow reef flats of at least 370 feet. They can be seen swimming close to coral or rocky sea floors or floating motionless under ledges. A. strigosus are a more coastal species and are found over rocky or coral substrates in inshore waters. A. maculatus range in depth from 7-82 feet and are found close to coral reefs. Conservation Status All three species of Aulostomus are currently designated as least concern according to the International Union for Conservation of Nature (IUCN). However, the A. maculatus population has been found to be decreasing, while the populations of A. chinensis and A. strigosus are currently unknown. Sources Aulostomus chinensis. IUCN Red List Of Threatened Species, 2019, https://www.iucnredlist.org/species/ 65134886/82934000.Aulostomus maculatus. IUCN Red List Of Threatened Species, 2019, https://www.iucnredlist.org/species/16421352/16509812.Aulostomus strigosus. IUCN Red List Of Threatened Species, 2019, https://www.iucnredlist.org/species/ 21133172/112656647.Bell, Elanor, and Amanda Vincent. Trumpetfish | Fish. Encyclopedia Britannica, 2019, https://www.britannica.com/ animal/trumpetfish.Bester, Cathleen. Aulostomus Maculatus. Florida Museum, 2019, https://www.floridamuseum.ufl.edu/discover-fish/species-profiles/aulostomus-maculatus/. Eastern Atlantic Trumpetfish (Aulostomus Strigosus). Inaturalist, 2019, https://www.inaturalist.org/taxa/47241-Aulostomus-strigosus. Trumpetfish. Lamar University, 2019, https://www.lamar.edu/arts-sciences/biology/marine-critters/marine-critters-2/trumpetfish.html. Trumpetfish. WaikÄ «kÄ « Aquarium, 2019, https://www.waikikiaquarium.org/experience/anim al-guide/fishes/trumpetfishes/trumpetfish/.

Thursday, November 21, 2019

Carbon Emission Essay Example | Topics and Well Written Essays - 1000 words

Carbon Emission - Essay Example Some of the activities that take place for the carbon dioxide to be emitted cannot be easily avoided for involve daily essential activities that make the life of a human being complete. Among these activities include, burning fuel to provide warmth during winter, cooking, multivehicle combustion and other industrial activities. The earth’s temperature   has solely increased as a result of carbon dioxide was discovered way back in early 90’s after a series of argument between the parties who could propose and opposes but in the late 60’s they came to an agreement and research on how this gas accumulated commenced Martha 26). â€Å"Global warming is indeed a scam, perpetrated by scientists with vested interests, but in need of crash courses in geology, logic and the philosophy of science†. (Robinson 77). Due to this concerned, environmentalists have linked carbon dioxide as a gradually toxic gas capable of being responsible for the complete destruction of the universe in the future if caution is not taken. It is an air-based pollutant currently responsible for several thousand of mortality cases and introduction of other clinical conditions mostly respiratory (Robinson 77). Hudson (19) asserts that naturally before human being started industrial activities beyond natures control, the latter could regulate its own proportionality of carbon gases and the oxygen. Animals could inhale oxygen gases, and through reparation and decomposition, carbon was relapsed. This carbon having being a raw material for the formation of food by plants was taken from the environment. Unfortunately, because of human activities that have been characterized as an addition of more carbon in the environment and reduction of the necessary plants which could absorb these gases through deforestation. This has therefore, served as the major cause of an imbalance of these two gases proportionality â€Å"With all of the hysteria, all of the fear, all of the phony s cience, could it be that man-made global warming is the greatest hoax ever perpetrated on the American people?† (Hudson 19). And goes ahead to explain how the Findings from a research have suggested that, a rough estimate of more than 20,000 deaths in the whole world have been caused by air pollution cases are said to increase as the temperatures in the earth increase by 1 degree Celsius. The study went ahead and proved hoe carbon was correlated by the increment of temperature in the earth and therefore, concluded to be the prime Causer of global warming, and its mortality risk because of the ozone layer development was determined. As compared to the health experts, the environmentalists have blamed the carbon emission for this role played in the negative impacts of the environmental properties and consequently activities with them directly or indirectly involved (Hudson 19). The greatest effect her is abnormal temperature increase, which causes other effects like drying of wa ter bodies and swamps that significantly affects the life of plants and beasts that were initially suited for such weather. On examining and confidently concluding the effect of this environmental threat, governments mostly from the developed countries under different environmental related sectors, have come up with strict regulatory based on controlling the

Tuesday, November 19, 2019

Developing Digital Marketing Strategies for Assignment

Developing Digital Marketing Strategies for - Assignment Example It also focuses on the logo of MLC, the golden egg. Fonterra, however, also posts documentaries, such as â€Å"Food For Thought.† This is a documentary that shows facts and trends on food and lifestyles. The company also provides a four-part documentary on Fonterra. These documentaries provide further information on the nature and extent of Fonterras business. Fonterras Ski Activ can target women and men aged 20 to 50 by showcasing two models in their YouTube ads. One female model eats Ski Activ for fourteen days and has less digestive problems and gets slimmer than the other who does not eat Ski Activ. There should be a separate commercial for male models and one for those in their twenties and another for those in their fifties. This will show the audience that Ski Activ has a broader target market niche. Furthermore, the YouTube ads should have links directing to more information about Ski Activ and what kinds of problems it can resolve. This will entice women to consider testing Ski Activ, especially since it has a money-back guarantee. This money-back guarantee should also be highlighted more in YouTube ads, with emphasis on the idea that consumers have nothing to lose, except extra weight and digestive discomfort. MLC can produce more specified YouTube videos for its target market of 35 and above, males and females, with incomes above $65,000 per year, by focusing on how easy it is to contact MLC financial advisers online or through the phone. The excitement levels for insurance plans that MLC offers can be heightened by using a mix of logical and emotional appeals. Logical appeals will emphasize the importance of insurance to having a more secure future, especially during these economically chaotic times, while the emotional appeals will focus on the happiness and comfort that MLCs wealth management expertise can offer.

Sunday, November 17, 2019

Violence in Sports - an Ethical Perspective Essay Example for Free

Violence in Sports an Ethical Perspective Essay Violence in sport has become far too commonplace. Aggressive sports such as football and hockey involve many aggressive tactics; however far too often do these aggressive tactics become overshadowed by deliberate acts of violence with the intent to cause bodily harm to an opponent. Many professional and non-profession athletes, as well as coaches, have adapted the mentality that winning is the common goal that all who participate in sport strive for and therefore feel that engaging in violent acts while competing should be permitted in achieving this goal. In sport winning is what each athlete strives for and seemingly they will consign in harmful acts of violence to achieve their goal. Former Boston Bruins player David Forbes was quoted â€Å" I just don’t see, no matter how wrong the act is, how anything that happens in an athletic contest be criminal†, (Gillespie). The mentality of being above the law that most professional athletes possess does not only affect the game in which they are playing. Many athletes who execute physical acts of violence while competing are more prone to committing such violent acts in their everyday lives, most commonly domestic violence. Harvard Law Review). Spectator violence and hooliganism are also primarily linked to the violence fans observe during sporting events. (Williams). Also, professional and amateur sport has become an integral part of our culture and society. Sports can be seen or heard, in one form or another, at any time of day or night. Professional athletes are amongst the most publicized people in the world. Thus, the words and actions of these athletes have been commonly mistaken as notions of acceptable conduct. Therefore, people, especially children, who view these acts of excessive and dangerous violence often imitate the aggressive acts they too frequently observe from professional and amateur athletes. The core of these on going problems is the lack of, or far too feeble disciplinary actions assigned to players who commit unlawful acts of violence while competing in sport. League officials must enforce harsh penalties for acts of violence during a sporting event. In more severe cases violence in sport should be treated as a criminal matter, where perpetrators can be tried and convicted in civil court. This paper will discuss the affects that violence in sport has on our society by discussing the sub branches of the Social Conflict Theory of sociology. In understanding the sociological affects of violence in sport it is possible to discuss how violence in sports affects our present day society, which closely follows Socrates’ pattern in achieving an ideal state. In applying Socrates’ pattern in achieving an ideal state along with the psychological aspects of Plato’s cardinal virtues it will be possible to come to an understanding on how to eliminate violence in sport. In conclusion, the paper will discuss why athletes, conscious of their actions or not, commit violent acts while competing by applying Psychologist Immanuel Kant’s Theory of Command Given by Reason. Unpunished acts of violence that occur while competing that goes without punishment ultimately leads to violence acts while not competing. There have been numerous accounts of athletes performing physical assault while not competing. The most prevalent form of violence carried out by athletes off the playing field is domestic violence. Football coach Joe Paterno of Penn State University was quoted â€Å"I’m going to go home†¦.. nd beat up my wife† after a pre-season loss (Harvard Law Review [HLR], 1996 p. 1048). Many people have speculated about why athletes are like likely to commit acts of domestic abuse. One of these speculations is that players such as enforcers â€Å"train to use violence and intimidation on the field and may have difficulty preventing these lessons from carrying over into their personal relationships†, (HLR, 1996 p. 1050). Another, more logical speculation is that â€Å"sport has had a kind of sanctuary atmosphere to it in terms of the legal system and police have kept their distance†, (Lapchick, 2000 p. ). For an athlete to be above the law simply because he or she is an athlete is irrational. However, â€Å"the public has gotten fed up with athletes crossing the violent lines, both on and off the court, and that may contribute to police entering the sanctuary†, (Lapchick, 2000 p. 1). If indeed the police begin to get involved when acts of violence are performed by athletes on and off the court, violence and physical aggression may not be as commonplace in the future as they are today. Irrational as it may be for sport to have its own sanctuary atmosphere in terms of the legal system, we as a society must question why we ultimately allow for this to occur. During the 2003- 2004 National Hockey League season Todd Bertuzzi of the Vancouver Canucks viciously attacked unsuspecting Colorado Avalanche forward Steve Moore. The attack left Moore with a broken neck which ultimately ended his NHL career. Although Bertuzzi was suspended for the remainder of the season and his team was fined $250,000 no criminal charges were laid. One can only wonder how an unprovoked attack on an unsuspecting victim which ultimately ended a career due to a broken neck cannot be treated as a criminal offense. The Bertuzzi incident is an ideal example which illustrates how our society allows professional athletes to advocate themselves above the law. The problem of violence in sport can be discussed using the sub branches of the Social Conflict Theory of sociology. The Social Conflict Theory of sociology deals with the ideology that the problems that society faces are the result of the way that society, as well as the economics of that society are organized. The sub branch of Social Conflict Theory that gives support to the explanation to why we as a society put professional athletes above the law is The Marxist Theory. The Marxist Theory can also be broken down even further into Instrumental Marxism and Structural Marxism theories. The general premises behind the two Marxist theories however are quite similar. Marxist sociologists view crime as an outcome of Capitalism. The upper class, or the Bourgeoises, control all modes of production. It is this system that creates the division between the classes. The upper classes have all they need; they are the wealthy class as well as the most powerful and influential. The lower class, or the Proletariat, on the other hand has virtually nothing. These are the people left with no power no influence and virtually nothing. The general concepts of the Marxist theory are: that the laws are set up to protect the interests as well as maintain their financial standing while nothing is given to the lower classes or the poor. In our society we view our professional athletes as the upper class or the Bourgeoises. Professional athletes are indeed wealthy, powerful and influential. Thus our current laws, according to the Marxist theories, are set up in a way to protect the interest of the upper class (including professional athletes) as well as not to ruin their social status. The Marxist Theories provide an explanation of how professional athletes, such as Todd Bertuzzi, can carry out intentional acts of violence and not be prosecuted while if others who are not part of the upper class (the Proletariat) were to carry out the same act of violence would be prosecuted in a civil court. Therefore, to eliminate violence in sport our society must not allow subcultures, hockey for an example, to follow a different set of laws than the rest of society. Today our society is divided into many different classes. There is the upper class, the upper-middle class, middle class and so forth. Our present day society closely follows Socrates’ pattern in achieving an ideal state. Socrates’ pattern divides society into three classes. The first of the three are the workers, craftsmen, farmers, shopkeepers ect. Another class is the auxiliaries or warriors, and the third class is the guardians or rulers. Each man in the state belongs in one or another of these classes. However to simply divide a society into three classes in an attempt to achieve an ideal state seems somewhat implausible. Plato believed that every man must possess the cardinal virtues to live a good live. These virtues: wisdom, temperance, justice and courage are essential in living a good life and therefore are essential in achieving an ideal state. These virtues however can be applied not only to everyday life, but also to subcultures, such as hockey or football. Plato believes for a state to be ideal it must possess wisdom. The concept of wisdom is understanding ones self and controlling self. If professional or amateur athletes were to possess the virtue of wisdom they ultimately possess self control. To say an athlete committed an act of violence unintentionally or because he or she was â€Å"caught up in the game† is absurd. To commit an act of violence with the intent to cause injury is premeditated. If all athletes were to possess the virtue of wisdom they would have complete control over one self. All athletes should also possess the virtue of courage. Courage can be defined by Plato as â€Å"preserving things which may rightly be feared† (Plato 31). In professional and amateur sport athletes need to respect and obey the rules and regulations. In other words athletes must fear the possible punishments, whether criminal or not, for violence to ultimately be terminated from sport. If athletes begin to feel that they are not above the law or that their subculture must follow the same laws as the remainder of society violence in sport will ultimately decrease. In the republic Plato describes temperance, the third virtue, as: â€Å"†¦ within man himself, in his soul, there is a etter part and a worse; and that he is his own master when the part which is better by nature has the worse under control† (Plato 32). Clearly the virtue of temperance is important to possess for violence to diminish in sport. To master oneself and have the worse under control would definitely decrease the amount of violence in sport. Also, for athletes to have temperance would make for a more exciting game. To have control over one’s self in a team game means putting the team before the individual. Doing so will lead to less violent acts and a more exciting team oriented style of play. The final and most important virtue is justice. Plato believes that if a community were to follow and obey the three previous virtues of wisdom, courage and temperance justice will automatically exist. This can also be applied to the subculture of sport. If all people within the subculture of sport such as the General Managers, league officials and athletes were to possess the three virtues of wisdom, courage and temperance justice would automatically exist and therefore violence in sport would be a criminal matter where perpetrators can be tried and convicted in civil court. In society there are two types of command given by reason; hypothetical and categorical imperatives. Immanuel Kant describes hypothetical imperatives as â€Å"an action that must be done to justify a means or reach a set goal†, (Kant 2). Categorical imperatives are â€Å"actions that are done because of their necessity to morality†, (Kant 2). Hypothetical and categorical imperatives are also present in subcultures. Athletes who commit violent acts while competing follow the hypothetical imperative command. They are driven by hopes of winning and will do whatever it takes to achieve this goal. This is a key factor in giving an explanation to why some athletes find reasoning in committing a violent act while competing in a sporting event. Also this gives explanation to why some athletes fell that no matter how wrong the act is, how anything that happens in an athletic contest be criminal. Following the hypothetical imperative is described as performing an action to justify a means or reach a set goal. If this action is violent many athletes will argue that it should not be considered criminal because it was a justified action executed to reach a set goal; a goal which they are entitled and expected to carry out. However, Kant would argue against this stating that the only ethical principle is universal, and therefore categorical, is â€Å"to treat oneself, always as an end, never as a mean†. For example in hockey a hypothetical imperative could be â€Å"if you don’t obey the rules you go to the penalty box†. A categorical imperative would be â€Å"Obey the rules, it is your duty†. If athlete’s were to take on a categorical imperative way of life sport violence would come to an end, not because it is right or wrong, but because it would be the athletes duty to treat oneself, always as an end, never as a mean. Nonetheless, it is illogical to assume that violence in sport will one day be non existent. It is not illogical to assume that if the subculture of sport and those who are in command adapt the categorical imperative ways that violent acts in sport will be considered a criminal matter. To live a good life it is essential to possess the cardinal virtues. The cardinal virtues are essential in achieving an ideal state. In achieving an ideal state Kant would argue that the only ethical principle is universal and therefore categorical is to treat oneself, always as an end, never as a means. By treating oneself always as an end, never as a means true justice in present day society will prevail and everyone who commits a violent act will be prosecuted in civil court regardless if they belong to a subculture or not.

Thursday, November 14, 2019

A Comparison of Moral Conflict in Antigone and A Dolls House Essay exa

Conflict Between Individual Morals and State Laws in Antigone and A Doll's House  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚        Ã‚  Ã‚  Ã‚   Mother, should I trust the government?   Or should I trust myself?   This dilemma is a common one in a great deal of literature.   In Antigone and A Doll’s House, the main theme is the question of whether one should be true to oneself or true to one’s state or society.   Should Nora (in A Doll’s House) and Antigone (in Antigone) â€Å"follow the rules† and do what the state and society want them to do or should they follow their own consciences?   Both plays address the conflict between individual morals and state laws, obedience and disobedience, and understanding oneself.        Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Antigone shows the contrast between state law and divine law.   Although the two have similarities, they are enforced in very different ways.   The major conflict is this – according to divine law, Antigone’s brother must be buried, but, according to state law, Antigone’s brother is not to be buried due to his political standing.   The divine law is a law that is the same for everyone and does not change, whereas the state... ...hocles. Antigone. Translated by R. C. Jebb. The Internet Classic Archive. no pag.   http://classics.mit.edu/Sophocles/antigone.html    Comments:   The organization of your paper is a bit confusing.   To clarify this confusion you should be consistent in your points.   If you separate your paragraphs by points then be sure that you always begin with Antigone and then in the second half of the paragraph discuss Nora or vice-versa.   If you wanted to separate your paragraphs by character, then you should discuss the different points in the same order.

Tuesday, November 12, 2019

Importance of libraries Essay

The definition of a â€Å"good time† is different for everyone, but for me its reading a good book, fiction, non-fiction, biographies, history, religious books, comics anything . When I came to America in July 2013, I was fascinated to see a lot of different things and one of them were libraries, since I have a passion for reading books, I try to read one whenever I have free time, there were a lot of books ranging from the ones for small kids to those for adults. Sometimes I thought about becoming an author and sometimes a librarian. That’s why for my Senior Project, I will be exploring my passion of reading and libraries by showing the importance of libraries. I did not have any knowledge about the libraries in the US and I was very interested in doing it, I did research, surveys and volunteer work. My first objective was to learn the system of the library. In the 18th century, when the people first realized that there should be a way where people can gain knowledge, acquire information about anything they are interested or simply read because they like it that’s when the first library started operating in America. However, at that time many people donated a lot of money so that the libraries will be build and many donated all of their books so that other people will be able to gain knowledge from them. There was no need for a system back then as there was not much variety of books, but as time passed there were more and more discoveries, inventions and a lot of other knowledge which came, books increased and as the advancement went on and on, people realized there should be books for different age levels and that in order for the library to keep running without any sort of problems like stealing of books, proper organization of books and the supply of books. The need to check and arrange the large varieties of books was fulfilled by a librarian. There are many different systems of classification of books in a library which vary from library to library. Classification serves two main purposes in the library, to arrange books in a logical manner on the library shelves and to group like subjects together, They are classified either by numbering or on the basis of the author’s name alphabetically. The Dewey Decimal Classification System is the most widely used method for classifying books in the library. This system is a general knowledge organization tool  that is continuously revised to keep pace with knowledge. It is named after Melvil Dewey, an American Librarian who developed it in 1876. This system is a numerical scheme for the arrangement of subjects of nonfiction books, and it classifies books by dividing them into 10 main subject groups that are called categories. Each category is represented by figures beginning with 000 and going on to 999. In other words, it is a system of numbers used to mark and arrange mostly non-fiction books. As I started volunteering in Columbia Pike Library, there were different sections for children, teens and adults. Since I mostly work in the children’s section, this is the type of classification I learned about in children’s section. Since children are the ones who are in the process of learning how to read, their books are classified on a deeper level than that of teens and adults. They are classified on the basis of their leve l of reading like J, JE, JP, the â€Å"J† stands for juvenile which are mostly board books. The next are the â€Å"JP† (juvenile picture books) these books which are generally shelved on the basis of the author’s last name then â€Å"JE† (juvenile easy readers) these are for beginning readers, JP (juvenile fiction) these books harry potter, the non-fiction books are the juvenile non-fiction and juvenile biographies. The same goes for CDs and DVDs for children as well, they are also arranged as J/CD/DVD. The adult and teens section is comparatively less categorized and simply classified into fiction and non-fiction. The technological and management skills required for running a library are getting higher that’s why it has become necessary to acquire a master’s degree in Library science. From Ferguson’s careers in focus:- â€Å"Most acquisition librarian positions require a master’s degree in library science (M.L.S) a master’s degree in information service or a master’s degree in science of information.† Ac quisition librarians are responsible for building and maintaining a library’s collection of books and periodicals (e-publications) so they need a master’s degree in science information . I did a survey on the type of books preferred by teens the most, the options were fiction, nonfiction, history and biography. There were 0% votes for both history and biography non fiction had 33.33% vote and fictional books had 66.67% vote. Fiction got the majority votes. My second objective was to research about developing recommendation of books based on different age groups, The reason I did this objective was to develop a sense of recommendation or to be able to give an  opinion to people about any kind of book. My consultant asked me to make lists of books by searching for them in amazon because they have the latest books and they also have a better search engine then the library’s catalog. By doing this objective I learned how to research about books in order to suggest them to someone or to update the library. My consultant asked me to make lists of books for aged 2-3 or any other group by searching from the catalog or sometimes making a list of books for children th at were published after 2009 from amazon, and then give it to her so that it can be used to update the library. The best website to find the ideal book for any age group is amazon, this I learned from experience, after searching the books for hours and not being able to find the desired ones, the easiest method is to use the â€Å"advanced search† by putting in the desired requirements, I was able to easily find the books and then searched for them in the library’s catalog to check whether they were there or not. My consultant gave me several projects about making bookmark bibliographies one of them was about creating bookmark bibliographies for kids and teens about other countries and religions since books give children an idea about the other parts of the world, these books were mostly about their culture, food, religion and daily activities. â€Å"If we wish to create a lasting peace we must begin with the children.†-Mohandas Gandhi I personally liked this project a lot, because kids and teens should explore other parts and regions of the world by reading books like pic ture books, religion, food and culture, because I feel that the media and the internet seem to create a very negative influence on people all around the world, about their neighbouring countries and about all the other countries around the world, children should read and know about other cultures of the world so that their would be more peace in the future. It is better to have an idea about something before believing anything about it which the TV shows. My third objective was reviewing practicality of normal libraries and virtual libraries. Virtual libraries or digital libraries are a great source of information and learning, while many predicted that as digital libraries will begin, that will be the end of the normal libraries and that all the shelves of the public libraries will be sweaped clean, but it did not. While many people who want to save their time and effort prefer digital libraries, there are many people including myself who prefer reading the old fashioned  way. In my survey of virtual libraries vs. normal libraries, 13 people responded to the survey, out of which 8 prefered virtual libraries and 5 preferred normal libraries, there was a 38.46% vote for normal libraries and 61.54% vote for virtual libraries. The results surprised me because I thought people will choose normal libraries, because even though a virtual library sounds good, it is difficult to access virtual library and some require membership too. I researched about the advantages and disadvantages of normal and virtual libraries. My second survey was to find out the biggest advantage and disadvantage of virtual libraries. The advantages included Immediate access to resources, Information updated immediately, No physical boundaries, Support different learning styles, Accessible for the disabled.Information retrieval,Teaching tool for information literacy, Storage of information, Networking capabilities (provides links to other virtual libraries) and Directs students to relevant resources. Out of 12 people, 7 chose Immediate access to information making it 58.33%, 3 people chose information updated immediately which made it 25%, one person chose support different learning styles and one person chose directs students to releva nt sources making each of them 8%. These results were very predictable because no doubt the biggest advantage is immediate access to information. The disadvantages included Restricted by copyright law, the requirement for internet access and that skilled professionals are required to organize,maintain and help students. Out of 12 people 5 chose requires internet access, 4 chose that skilled professionals are required for help and 3 chose restricted by copyright. So in the disadvantages the need for internet access seemed to cause the most problems. So my overall conclusion from my surveys is that even though normal libraries will not end, there are many who prefer digital libraries over normal ones, the biggest advantage is the immediate access to resources as there is no need to go to the library and if it is checked out, there is no need to wait for it the because the virtual libraries gets rid of that long process and the biggest disadvantage is the requirement for internet access, it is no doubt that internet has made the life of people unimaginably easy but not everyone can afford this luxury. My fourth objective was to research about the history of the libraries in the US. It is due to the founding fathers of America like Benjamin Franklin and Thomas Jefferson that the system of  library began the US. The first public library came in the 18th century after some time, lots of people contributed millions of dollars so that education could be given to all for free. In 1731, Benjamin Franklin and his friends operated library company of Philidelphia. Andrew Carnegie gave millions to bring books and information to the people. From Gail Sakura’s Library of Congress â€Å"Thomas Jefferson had retired from the presidency and was living at Monticello, his home in Virginia. He offered to sell his personal book collection to the library of congress as a quick way to quickly replace the library’s losses.† The library of congress was set on fire on August 24, 1814. Some assume that the British had done it. Due to the efforts of our leaders, today the library of congress is the world largest library. It contains 100 million items, including 29 million books and pamplets, 53 million manuscripts and 4 million maps and atlases which are shelved in three buildings in Washington DC. My fifth objective was to volunteer at Columbia Pike Library. I started doing it in October and I will continue to do it after Senior Project .I worked in the children’s section where putting books back on the shelves, finding books for them and displaying them is the most important thing to do I also painted the walls of the library once and I decorated it by paper cutouts of different animals for the children. Sometimes on the weekends there is a story time in which teachers and students or parents and children come to the library, at that event I come earlier then usual and along with the other voluntee rs arrange the cookies and tables for the children and after they are done with it. I help to clean up the mess. My biggest obstacle was finding a job or volunteer work at a library, because since I just came in july and had never done volunteer work before, I was nervous and furustrated. I struggled hard to find a job, sometimes by searching on google and sometimes by going there like I went to Aurora Hills Library since it was close to my house but there was no volunteer work being offered at that time. I was not able to work at the school library, because they had another girl working there whose senior project was also on libraries. I thought about changing my Senior project but finally in October with the help of a friend of mine I was able to contact Barabara Dean the incharge of the Arlington Public Libraries and she asked me to contact Ms.Desiree Fairooz who was the incharge of Columbia Pike Library, she even gave me her e-mail address, and through that I was able to  finally start volunteering. My new skills are that I learned about the history of Library system in the US, I got to k now about virtual libraries and the qualifications required to become a librarian. I learned to make bookmark bibliographies and I learned how to do surveys, which I am sure I will need to do later in college and then in my career. I was thinking about printing out copies and then giving them to people but then my teacher told me about an online survey that was very useful, I just sent the link to my friends and I was able to get the results I needed, I am currently working on learning to make pamplets for the library. This project will help me by giving me volunteer hours which will help me get accepted in my desired college, because they require volunteer hours, The new skills I learned like making surveys, pamphlets and bookmark bibliographies will help me in college and later on in my life too, also the way the project is organized in a step wise manner with its deadlines, has shown me that putting everything till the last minute is not the solution, we should make achieve our targets by setting up a timetable and follow it. Works Cited † Library and Information Science, Second Edition (Ferguson’s Careers in Focus)† Ferguson. 2nd ed. N.p.: n.p., May 1,2011.. Sakurai, Gail. The Library of Congress. New York: Children’s, 1998. Print. Null, Kathleen Christopher., and Barb Lorseyedi. How to Write a Research Report. Huntington Beach, CA: Teacher Created Materials, 1998. Print. Zainebabrar18@yahoo.com. â€Å"E-mail.† Www.yahoo.com. N.p., n.d. Web. 7 Jan. 2014. . http://akaleidoscopicworld.blogspot.com/2008/03/advantages-disadvantages-of-virtual.html http://www.collegeonline.org/library/adult-continued-education/librarians-needed.html http://mypages.iit.edu/~smart/halsey/lesson1.htm

Sunday, November 10, 2019

No Place to call Home

No place to call Home You're on your way home from work or school and you stop at a red light. As you patiently wait for the light to glisten green you notice someone walking in between the rows of cars. It's not the usual person who's always selling water and random fruits; instead it's a person in raggedy clothes holding a sign that reads â€Å"Please help. I'm homeless† written on a cardboard flap. Now the question is what are you going to do? Will you reach into your wallet and give this poor soul a donation or will you retend to look for something in your car and act as though you cant see them?The sad truth is more than half of us would perform the second option without even realizing it. Homelessness has been around for a long time. No one seems to be doing anything about it and it's not because there isn't any way to fix it because there is we Just don't care enough to act on it. We could create more stabilized homeless shelters; improve the homeless organizations we h ave initiated, and expand and/or open up more Job opportunities for people in these types of situations.There's a big controversy with the way people perceive the homeless. A lot of people believe that they are homeless due to their own wrong-doings. Whether it is drugs, alcohol, gambling etc. which can be very true at times but that is not always the case. There are times when a person goes through a rough patch in life. They couldVe gotten fired from their Job, lost their house, or Just recently got a divorce. These things can also lead to homelessness. I suggest we put further effort into the present day homeless shelters.We could create hybrid homeless shelter that is not only a place for them to eat and sleep but doubles as a rehab center for those who have any type of addiction. Society has created organizations for a variety of different social issues. Some have more of an impact than others, regarding those created for the homeless; they have not made a grand impression and definitely need some improving. We need to make it broad and spread the word that everyone should donate.These organizations prevent the money from going directly to the homeless people and nsure that the money will go towards prevention and will not benefit their addictions in any way. The Job condition right now in the U. S is struggling and the employment rate is down. Without Jobs there is no cash flow and people tend to lose their houses, cars, etc. That is what results in so many people living on the streets. If we work to create more Jobs, or expand the Job opportunities we have now-a-days we can help homeless people off the streets due to the fact they will be earning a steady income and can get back on their feet.By adjusting the system of homeless shelters, enhancing the corporations that help collect funds for the homeless, and also developing and/or establishing Job openings we could decrease the percentage of people experiencing how it feels to be homeless. It may take a great deal of time and effort but when the person you once say standing on the street begging for money now has a place to eat, a bed to lie on, a place that they can call home, it is a huge sense of accomplishment. No Place to call Home By natuhleeeex3

Thursday, November 7, 2019

Learn about the Doppler Effect

Learn about the Doppler Effect Astronomers study the light from distant objects in order to understand them. Light moves through space at 299,000 kilometers per second, and its path can be deflected by gravity as well as absorbed and scattered by clouds of material in the universe. Astronomers use many properties of light to study everything from planets and their moons to the most distant objects in the cosmos.   Delving into the Doppler Effect One tool they use is the Doppler effect. This is a shift in the frequency or wavelength of radiation emitted from an object as it moves through space. Its named after Austrian physicist Christian Doppler who first proposed it in 1842.   How does the Doppler Effect work? If the source of radiation, say a star, is moving toward an astronomer on Earth (for example), then the wavelength of its radiation will appear shorter (higher frequency, and therefore higher energy). On the other hand, if the object is moving away from the observer then the wavelength will appear longer (lower frequency, and lower energy). You have probably experienced a version of the effect when you heard a train whistle or a police siren as it moved past you, changing pitch as it passes by you and moves away. The Doppler effect is behind such technologies as police radar, where the radar gun emits light of a known wavelength. Then, that radar light bounces off a moving car and travels back to the instrument. The resulting shift in wavelength is used to calculate the speed of the vehicle. (Note: it is actually a double shift as the moving car first acts as the observer and experiences a shift, then as a moving source sending the light back to the office, thereby shifting the wavelength a second time.) Redshift When an object is receding (i.e. moving away) from an observer, the peaks of the radiation that are emitted will be spaced farther apart than they would be if the source object were stationary. The result is that the resulting wavelength of light appears longer. Astronomers say that it is shifted to the red end of the spectrum. The same effect applies to all bands of the electromagnetic spectrum, such as radio, x-ray or gamma-rays. However, optical measurements are the most common and are the source of the term redshift. The more quickly the source moves away from the observer, the greater the redshift. From an energy standpoint, longer wavelengths correspond to lower energy radiation. Blueshift Conversely, when a source of radiation is approaching an observer the wavelengths of light appear closer together, effectively shortening the wavelength of light. (Again, shorter wavelength means higher frequency and therefore higher energy.) Spectroscopically, the emission lines would appear shifted toward the blue side of the optical spectrum, hence the name blueshift. As with redshift, the effect is applicable to other bands of the electromagnetic spectrum, but the effect is most often times discussed when dealing with optical light, though in some fields of astronomy this is certainly not the case. Expansion of the Universe and the Doppler Shift Use of the Doppler Shift has resulted in some important discoveries in astronomy. In the early 1900s, it was believed that the universe was static. In fact, this led Albert Einstein to add the cosmological constant to his famous field equation in order to cancel out the expansion (or contraction) that was predicted by his calculation. Specifically, it was once believed that the edge of the Milky Way represented the boundary of the static universe. Then, Edwin Hubble found that the so-called spiral nebulae that had plagued astronomy for decades were not nebulae at all. They were actually other galaxies. It was an amazing discovery and told astronomers that the universe  is much larger than they knew. Hubble then proceeded to measure the Doppler shift, specifically finding the redshift of these galaxies. He found that that the farther away a galaxy is, the more quickly it recedes. This led to the now-famous Hubbles Law, which says that an objects distance is proportional to its speed of recession. This revelation led Einstein to write that his addition of the cosmological constant to the field equation was the greatest blunder of his career. Interestingly, however, some researchers are now placing the constant back into general relativity. As it turns out Hubbles Law is only true up to a point since research over the last couple of decades has found that distant galaxies are receding more quickly than predicted. This implies that the expansion of the universe is accelerating. The reason for that is a mystery, and scientists have dubbed the driving force of this acceleration dark energy. They account for it in the Einstein field equation as a cosmological constant  (though it is of a different form than Einsteins formulation). Other Uses in Astronomy Besides measuring the expansion of the universe, the Doppler effect can be used to model the motion of things much closer to home; namely the dynamics of the Milky Way Galaxy. By measuring the distance to stars and their redshift or blueshift, astronomers are able to map the motion of our galaxy and get a picture of what our galaxy may look like to an observer from across the universe. The Doppler Effect  also allows scientists to measure the pulsations of variable stars, as well as motions of particles traveling at incredible velocities inside relativistic jet streams emanating from supermassive black holes. Edited and updated by Carolyn Collins Petersen.

Tuesday, November 5, 2019

Chemistry of BHA and BHT Food Preservatives

Chemistry of BHA and BHT Food Preservatives Butylated hydroxyanisole (BHA) and the related compound butylated hydroxytoluene (BHT) are phenolic compounds that are often added to foods to preserve fats  and oils and keep them from becoming rancid. They are added to food, cosmetics, and packing of products that contain fats to maintain nutrient levels, color, flavor, and odor. BHT is also sold as a dietary supplement for use as an antioxidant. The chemicals are found in an extensive list of products, yet there is concern about their safety. Take a look at the chemical properties of these molecules, how they work, and why their use is controversial. BHA Characteristics BHA is a mixture of the isomers 3-tert-butyl-4-hydroxyanisole and 2-tert-butyl-4-hydroxyanisole. Also known as BOA, tert-butyl-4-hydroxyanisole, (1,1-dimethylethyl)-4-methoxyphenol, tert-butyl-4-methoxyphenol, antioxyne B, and under various trade namesMolecular formula C11H16O2White or yellowish waxy solidFaint characteristic aromatic odor BHT Characteristics Also known as 3,5-di-tert-butyl-4-hydroxytoluene; methyl-di-tert-butyl phenol; 2,6-di-tert-butyl-para-cresolMolecular formula C15H24OWhite powder How Do They Preserve Food? BHA and BHT are antioxidants. Oxygen reacts preferentially with BHA or BHT rather than oxidizing fats or oils, thereby protecting them from spoilage. In addition to being oxidizable, BHA and BHT are fat-soluble. Both molecules are incompatible with ferric salts. In addition to preserving foods, BHA and BHT are also used to preserve fats and oils in cosmetics and pharmaceuticals. What Foods Contain BHA and BHT? BHA is generally used to keep fats from becoming rancid. It is also used as a yeast de-foaming agent. BHA is found in butter, meats, cereals, chewing gum, baked goods, snack foods, dehydrated potatoes, and beer. It is also found in animal feed, food packaging, cosmetics, rubber products, and petroleum products. BHT also prevents oxidative rancidity of fats. It is used to preserve food odor, color, and flavor. Many packaging materials incorporate BHT. It is also added directly to shortening, cereals, and other foods containing fats and oils. Are BHA and BHT Safe? Both BHA and BHT have undergone the additive application and review process required by the US Food and Drug Administration. However, the same chemical properties which make BHA and BHT excellent preservatives may also be implicated in health effects. The research leads to conflicting conclusions. The oxidative characteristics and/or metabolites of BHA and BHT may contribute to carcinogenicity or tumorigenicity; however, the same reactions may combat oxidative stress and help detoxify carcinogens. Some studies indicate low doses of BHA are toxic to cells, while higher doses may be protective, while other studies yield exactly the opposite results. There is evidence that certain persons may have difficulty metabolizing BHA and BHT, resulting in health and behavior changes. Yet, BHA and BHT may have antiviral and antimicrobial activities. Research is underway concerning the use of BHT in the treatment of herpes simplex and AIDS. References and Additional Reading This is a fairly long list of online references. While the chemistry and effectiveness of BHA, BHT, and other additives within food is straightforward, the controversy surrounding health effects is hot, so several points of view are available. Adverse Effects of Some Inactive Ingredients - Summary of health effects reported for dyes and preservatives, including food colors, BHA, BHT, sodium benzoate, nitrates, nitrites, and monosodium glutamate.Chemical Cuisine: CSPIs Guide to Food Additives - This site includes a glossary, explanation of cancer testing, alphabetical listing of additives, and a list of additives that have been banned.Common Food Additives - CNN In-Depth provides this chart listing additives and their chemistry, uses, common products containing the additives, and reported side effects.Fresh Look at Food Preservatives - Judith E. Foulke provides an overview of the preservative use and regulation, she specifically discusses BHA, BHT, and sulfites.Chemical Sensitivity Homepage - This site discusses the inability of damaged nervous tissue to metabolize specific toxins.The Feingold Association of the United States - The Feingold Association provides extensive information about the effects of petroleum-derived ad ditives and salicylates (both natural and synthetic) on the behavior/health of susceptible persons.

Sunday, November 3, 2019

Social Media Companies Essay Example | Topics and Well Written Essays - 1000 words

Social Media Companies - Essay Example Everything is two sided, Facebook is no different. It has its pros as well as its cons. This proposal will comprehensively present how Facebook is negatively impacting the Saudi society. â€Å"Facebook is taking over the world, and that’s no exaggeration. Everyone from eager-to-fit-in tweens to educated business people to intrigued grandparents has joined the phenomenon, and unsurprisingly many teenagers have also caught Facebook fever.† (Facebook Addiction) The people in Saudi Arabia are very hard-working but they have been distracted by Facebook, their valuable time is being squandered browsing through Facebook. This is hampering their growth and this is also hampering the overall growth of the country. The younger generation is completely hooked on to Facebook and they use slang language which is again bad for them. Using slang language is affecting their language skills and making them incompetent. Facebook has had its share of problems; thieves use Facebook to know when certain people are going on vacation so that they can rob their house. Credit card numbers have been stolen using Facebook; a woman in Australia was murdered when she went and met her friend who she had met through Facebook. All these instances show that people in Saudi Arabia are losing their privacy and are openly flirting with danger. â€Å"Facebook and its co-founder Mark Zuckerberg are being sued for more than $1billion over a page that was on the social networking site that called for violence against Jews.† (Facebook Sued) This is just one of many evidences which clearly show that this social networking website can cause religious havoc and this is why the people in Saudi Arabia should never get carried away with what they see on this website. It has already caused political havoc in the middle-east which has led to several economical problems; it has also led to vandalism. The same may happen all over again and it is high time to stop this from happening. Saudi Arabia is a very conservative country; the majority of people residing in the country are Muslims. Islam is openly discussed on the website and people with very little or absolutely no knowledge about Islam have been spreading propaganda which could again lead to damage beyond repair. Facebook is also considered a rich source of news by the Saudi people who use it on a daily basis, there is a possibility that other people may try and spread false news which may impact the nation. To conclude it is very fair to say that Facebook addiction is nothing but a waste of time, money and effort. It is high time to spread this message and to ensure that the productive time of people does not get wasted on Facebook. Companies can certainly profit from these websites but they should stay away from controversy as much as plausible. Works Cited Facebook Addiction. Facebook Addiction Disorder. n.p., Web. Retrieved from: Facebook Sued. Daily Mail. n.p., Web. Retri

Friday, November 1, 2019

Journal Assignment Example | Topics and Well Written Essays - 1000 words

Journal - Assignment Example All that one needs to have are a computer, good internet connectivity and a microphone. The use of podcasts makes possible to share content via the internet to a large number of mp3 players. I have listened to an audio podcast of lady Antebellum album of â€Å"Own The Night† and it is a nice audio album it keeps you really captivated and its very interesting to listen to. Have as well watched Earth breath and it explains how this takes place, and the use of video just fits perfectly for this topic. The difference between podcast for instance broadcast media is that with podcast, there is a variety to listen to and watch, unlike in broadcast radio there is the issues of monotony as the same songs are being repeated over and over again. Another difference is that when one is using podcasts, one does not require waiting till they hear something that they want to here because the user is provided with the option of choosing what exactly to listen to. This is not the case with Broa dcast radio since one listens to what is currently playing and they do not have the option to choose what to listen to, they have to wait till something they are interested in being played. Podcasts are quite easy to create, and most people can create one and use it to share content, music and videos with the world. Podcasts allow for many formats and subjects as the podcasters are not limited by the traditional broadcast formats as well as broadcast regulations. Podcast subjects can range from politics, science, technology, movies, music and many other different subjects. The content in podcasts is very original and new and is created by innovative people who want to share with the world. Podcasts are downloaded automatically into your laptop or computer and synced automatically to your mp3 player. This makes it convenient hence very popular. A podcast aggregator is a software program used when one is subscribing to a podcast and when one wants to receive podcasts. Podcasts keep yo u in control in that you can actually delete a podcast when you want, you can pause it, you can rewind it, you can replay it as much as you like and you can store it wherever you feel like. Once also has the option of listening the podcast on their laptops or personal computers, they can also burn the podcast in compact discs as well as move it to once mp3 player. One can download as many podcasts as they like there is no limitation and it is not limited to specific media players its compatible. Listening to a radio for instance is not interesting as the relevant corporations control what to listen to and at what time. With streaming content, one is tied to their pc, and it has to have good internet connection. The advantage with a podcast is that you can carry it wherever you are going. With the podcasts that I have watched and listened to i have discovered that it is advisable to use videos for giving directions or instructions on how to go about something. The audio podcasts are suited better for communicating important or useful ideas as well as concepts to a persons’ audience. RSS Feeds Ways to add an RSS Feed was that one can type the RSS feed URL in the field provide don their browser then click on the "Add" button. One can also subscribe to the RSS Feed which will enable them to get automatic updates on the information in the sites they are following. RSS refers to

Tuesday, October 29, 2019

Internet Censorship classical arguments Essay Example | Topics and Well Written Essays - 750 words

Internet Censorship classical arguments - Essay Example The problem of censorship of internet can only be solved if it is distributed according to the location. However, most of the people have positive arguments about the censorship of the internet, as it can restrict the exposure if the pornographic material to children. Filtering the web content is an effective way to control the accessed information on the internet. However, it may require the constant control to limit the utilization of the information and a prevention method to deny the access of new pornographic content. Another method is to blacklist such websites that are providing the information that is socially or culturally irrelative. However, as the internet is growing day by day and every day new websites having some kind of restricted material are launched, thus blacklisting is the perfect solution. Many governments like the Islamic and the Asian countries have the certain level of restriction employing both blacklisting and other methods to avoid the exposure of pornogra phic as well as such contents that depicts unfavorable comments about the governments and leaders. Islamic Countries like Saudi Arabia, have adopted a higher level of filtering the content as they have the view that the censorship would not endanger the Islamic rules and regulations. However, it is not possible to fully control the web content. The father or the internet â€Å"Vint Cerf† argue that it is not possible for the government to fully control the internet as it is owned by the private sector (Fonseca, n. pag). However, many people argue that censorship of the internet is only to crush the freedom of the public and everyone has the right to attain the information he would like to attain. Censoring the internet is only to restrict the information that is against the freedom of humanity. If the restriction is only imposed to the pornographic web content, the restriction would be considered as a righteous act. However, it is not only imposed to the web content that is p romoting porn but also imposed to the content that has views against the government or against the culture of certain region like in majority of Iran, youtube.com and facebook.com are also banned due to the reason that the websites are promoting the western culture and are against the Islamic culture (idebate.org, n. pag). In this way, the information on the sites is also restricted in these areas. Annotated Bibliography Bidgoli, Hossein. The Internet Encyclopedia. Volume 2, New Jersey: John Wiley & Sons, , 2004. Print This book helps the students how they can use the internet with the restriction by government. These restrictions are for the betterment of society. In this book classical definition of censorship is also clarified, that how much things are included in censorship which should be restricted from the teenagers. Schultz, David Andrew. â€Å"Encyclopedia of American Law†. New York: Infobase Publishing, 2002. Print. This book describes the American Laws regarding th e censorship of the internet. The common use of the internet and resources has to apply some restrictions on the content to avoid the exposure of the adult content to the children. Fonseca, Pedro. â€Å"Cerf Sees Government Control of Internet Failing†. Reuters.com. Nov 14th, 2007. Web. The site describes the ideas of the father of internet Vint Cerf’

Sunday, October 27, 2019

Motivations of an arsonist

Motivations of an arsonist Arsonist Arsonist is a person who sets anything on fire intentionally. This intentional act is called the arson. Generally a home or another type of structure has been targeted by the Arsonist. Arson is committed for a number of reasons, and the crime is strictly punished throughout the world because arsonist sets property and lives at risk. In certain parts of the globe, if somebody expires in an arson fire, it is deemed to be a murder, instead of neglectful homicide or manslaughter because arsonist is considered such a reprehensible criminal. In all cases, an arsonist holds a prison term. (Holmes Holmes, 2008, pp. 3) In the majority of states, arson has been extended to comprise burning arrangements in addition to dwellings, burning the own assets for unlawful purposes, and destruction caused by an explosion or a fire. Currently if someone arson his/her house to avail the insurance benefits because the amount of insurance is higher than the actual real value of property that would be linked to arsonist (Stewart, 2006, 15-16). Other motives for arsonist would be to bomb or burn a religious place in a hate crime, or burn the property in vengeance for a denial to sell it. If an arsonist burns down his building as a figure of cheap destruction and unintentionally sets half the neighborhood on fire that may or maybe not an arsonist, depending on the legislation of the state. Fire by an arsonist includes the induction of a heat source that can be as unadorned as a match or as compound like dangerous chemicals with very low explosion temperatures. By the rule of legislation a fire is thought to be an arson fire when all other unintended causes have not been met. We can say that reason of a fire was arson and consequently intentional, the detective must have adequate proof the one of the issues in the arson triangle was interfered with. Motives for Arson The motives of that motivate arsonist vary from situation to situation and much research has been established to determine the motives of arsonists, which has allowed the Neighborhood Fire Team, to compile a list of ten broad groups of motives, drawn from current study and from the experience of group members. Such motives contain: Vandalism: This group covers intentional and willful fire setting that is just for the sake of it (Stewart, 2006, 18). It also contains fire setting due to dare and colleague group pressure. Vandalism motivated arson is usually spontaneous and impulsive and engages manifold executors. Schools are often the target of vandalism motivated arson, as are abandoned or empty properties and, in the experience of this project, abandoned vehicles. Unfriendly behavior fires are also often motivated by vandalism. Curiosity/ Fire Play: This group is usually utilized when the fire has been set by young kids who do not realize the hazards of fire and were playing with, for instance, discarded cigarette lighter or matches. The people concerned are generally taken onto the fire setters intersession program. Excitement: This group contains those who set fires for thrills, attention seeking, identification and sexual perversion. It can be seen already that none of these groups are clear-cut and one may lead to another: for instance vandalism may lead to the arsonist setting fires for the thrill of it; and childhood fire play may lead to setting fires intentionally for the amount of concentration it generates from adults. Revenge: This group contains fires set for individual retaliation (against a spouse, partner or other family member); retaliation against regime or other institutions: and fires which are set as retribution against rival gangs or groups or in order to intimidate. In fact, much arson has a component of retaliation (aware or unaware) as part of the motive. Arsons of this category are often much greater planned and carried out than other types, and may be one-off events. Crime-concealment: This is used to explain arson fires which are set in order to hide another offense or vital proof. For instance, a room that a murder had taken place might be fired by the executors in order to destroy the body and destroy the crime scene. Stolen vehicles are often set alight after being abandoned in order to try and destroy any forensic proof. (Schulz, 2007, pp. 55) Profit: This type contains insurance fraud and arson executed against a competitor to try to put them out of business. Extremist: This type contains arson perpetrated by terrorists or other extremists (animal rights activists) and also arson which happens during or as part of disturbances or other civil riot. Racial: This type is fairly self-explanatory and covers all fires which are set for reasons of ethnic tension or intolerance. Psychological illness: Neighborhood Fire Team employees have attended many incidents, both within housing units and in the wider society, where fire setting has been due to psychological illness. Serial Arson: This is where one person working alone sets a series of fires, often over a long period of time. Serial arsonists may have one or more of the other causes also involving to their fire setting behavior. (Pawson, 2006, pp. 91) Although the causes for arson are sometimes difficult, the law is generally crystal clear: anybody who intentionally sets fire to something will be punished for it. In some areas, a fire that is caused by great negligence or disregard will also be classified as arson. The punishment for committing arson depends on the degree of the offense: how much property was damaged the total cost of the damages, and whether or not people were trapped in the fire. The intent also performs a role: whether the fire was set to defraud an insurance agency, cover up an offense, was part of a retaliation offense, or was intended to amuse or entertain the arsonist, for instance. Most parts of the world have arson researchers, who examine the sites of suspicious fires to decide the cause of the fire and whether or not it was arson. This job can sometimes be quite complex, particularly when proof is obscured by the efforts of those attempting to put out or clean up the fire. Arson examiners use a range of methods to inspect the sites of fires containing chemical analysis of proof, the use of sniffer dogs, and simple powers of surveillance. References Holmes, Ronald M. Holmes, Stephen T. (2008). Profiling Violent Crimes: An Investigative Tool. New York: Sage Publications, pp. 1-5. Stewart, Gail. (2006). Crime Scene Investigations Arson. New York: Lucent Books, pp. 15-25. Pawson, Stuart. (2006). Some by Fire. Washington: Allison Busby, 92. Schulz, Karen K. (2007). Crime Scene Detective: Arson. New York: Prufrock Press, Inc, pp. 54-60.

Friday, October 25, 2019

My Big Fat Cultural Wedding Essay -- Culture Society

The wedding ceremony is a celebratory event romanticized by couples nationwide for its ability to unite creativity and tradition in a convenient package. One need only observe the plethora of wedding trends, from outlandishly alternative to stringently orthodox, to understand how important representing individuality remains among contemporary couples. In retrospect, much of the symbolisms attributed to these trends come from centuries of applied social significance; couples see the most value in a marriage celebration which allows them to flaunt their unique qualities as individuals while simultaneously modeling the long-standing customs of preceding weddings. In the 2002 film, My Big Fat Greek Wedding, director Joel Zwick illustrates the colorful combination of culture and marriage, highlighting the prevalence of rituals within a wedding ceremony, the importance of this connection to the respective bride and groom, and the societal consumption of symbolism as a whole. By analyzing the various themes of religion, family, and emotion in My Big Fat Greek Wedding, we will gauge the true prevalence of cultural inclusion as it relates to the marriage ceremony. Wedding celebrations, for all their glitz and glamour, are sentimental occasions filled with submissive connotations. Commercial industries recognize the trendsetting potential of culture, which liberally applies significance to often extraneous but distinctive practices, and are quick to promote it as a commodity of taste requiring very little convincing to popularize. People do indeed gravitate toward more culturally based weddings when the attached customs relate to one’s intimate, inner values. To clarify the reasoning behind this social attitude, Otnes and Pleck claim in... ...l no strangers to the allure of individualism, especially as it relates to wedding ceremonies. The most popular, romanticized form of a wedding encompasses deep symbolism which allows brides and grooms to define themselves in a way they will rarely ever be able to again. Cultural weddings are a phenomenon of our time which may not hold the same meanings they once did, but definitely retain figurative importance to the participants of the ceremony. They are deeply ingrained within our societal desire for tradition as well as vehicles through which we can define ourselves as individuals. Works Cited My Big Fat Greek Wedding. Dir. Joel Zwick. Perf. Nia Vardalos and John Corbett. IFC Films, 2002. Film. Otnes, Cele C., and Elizabeth H. Pleck. Cinderella Dreams: the Allure of the Lavish Wedding. Berkeley: University of California, 2003. Print.

Thursday, October 24, 2019

Jinnah’s Vision of Pakistan and our Success to realize it Essay

There is not much debate or even concern about what was the vision of the founders of Pakistan. What type of state they had in mind when they struggled of an independent country that we call our homeland, Pakistan? In answering this question, we will assess whether or not we have been driven by that vision and how we have shaped our system of governance. The Muslim intellectuals, thinkers and social reformers that contributed to the idea of Muslims being a separate political category in India were essentially modernist, rationalist Muslims. They wanted the Muslims to acquire knowledge of new sciences and empower themselves economically and politically. Their central objective was rights of the Muslims and their share in power under the British colonial system. They understood how the world had changed, and accordingly they thought the best tools for Muslim empowerment were modernity, education, politics of rights and peaceful struggle for accommodation of their interests. Jinnah and many other leaders of the Muslim communities in the subcontinent were products of post-reissuance modern world. Unlike European modernists all varieties of nationalists in the colonial world had more difficult task of building a modern nation in a traditional, Islamic cultural climate. The question then and now for modernists is how to reconcile modernity with religion and social structures. Muslim modernists from Sir Syed Ahmad Khan to Jinnah wanted modem education, science and technology and political forms and institutions without offending religion. Jinnah’s vision of Pakistan in this respect has four salient points. We can judge where does Pakistan stand today in the light of these four ideas. 1: Constitutionalism First and foremost, Jinnah was quintessential a constitutionalist. The term and its underlying philosophy is so foreign to our rulers that they have really disabled themselves intellectually to seek guidance from him. What it really means in modern political theory is that a civilized system of governance must function within the boundaries of laws. There must be limits on the exercise of power which is primarily meant to serve national and public interest. This is one of the central themes of philosophical debates that have defined the system of state and the relations between political authority and the society during the past three hundred years or so. Jinnah had thoroughly and profoundly internalized constitutionalism at a very young age and this defined all his politics in his long career. Actually constitutionalism is what separates the pre-modern and the modern world system. It gives dignity to human beings in rooting the ideas of freedom, civil rights and social capacity to force the government to stay within the limits of laws. 2: Supremacy of law and independence of judiciary. Philosophically as well as in practical politics these are basic norms of good society and good politics. Jinnah’s political orientation and practical life were perfect reflection of these two ideas of the modern world. Let us not forget that Jinnah was one the most distinguished, outstanding and powerful defender of rule of law and independence of judiciary. These two institutions are intertwined. It would be absurd to think of rule of law without the independence of judiciary, Building one of these institutions independently is not possible. They grow together; the development of one strengthens the other. 3: Personal liberties and freedoms These constitute third important flank of Jinnah’s political ideology. His political struggle first at the platform of the Indian National Congress for home rule, independence and rights of minorities, and later on throughout the Pakistan movement was based on universal human instincts of freedoms and civil rights. It would be unconceivable in any situation that the battle for national independence could be fought without the recognizing individuals’ right to make their own choices. This is an important notion that transforms them from subjects of a colonial administration to a citizen of a modern nation state. 4: Representative Democratic Government. The ideas we have briefly mentioned above give rise to the representative government, another facet of Jinnah’s political philosophy. Such a government is in our view a defining characteristic of the modem form of authority. It answers some fundamental questions about how political power in a society like Pakistan is to be organized, and for what purposes to be exercised in modern times. Jinnah couldn’t think of any other system for Pakistan except a constitutional, democratic government. Have we succeeded in realization of Jinnah’s Vision? How do we measure up to some of these basic political principles of Jinnah today? We have mixed record at best on shaping Pakistan according to Jinnah’s ideas. We have elected governments at the moment and we had had them before. But many a times we disrupted growth of democracy. For that reason, the checks and balance system among the institutions of the state remains troubled and respect for constitutionalism weak. We have not sufficiently debated the reasons for repeated deviation from the constitutionalist principles and ‘rule of law’ tradition of our founders. We know they are too many, as no single factor can explain it sufficiently. They are essentially rooted in stubborn feudalistic culture, class character of the ruling classes and an alliance between the electoral elites and the rulers in the past. Contrarily, people at large and the rising middle classes of Pakistan and even a large section of political groups have struggled for democracy, which as a political system is manifestation of the political vision of Jinnah. Against all the problems we have today, they want democracy in substantive terms because the procedural or electoral democracy has turned the system into personalized, autocratic form. It is why it is not fully alive to the problems of the people or responsive enough to the needs of the society. In my view, we face multiple challenges of bad governance, political confrontations and terrorism because we have not shaped our state and political institutions, including the political parties, according to the modernist, liberal vision of Jinnah. In these times of rising despair and despondency, we can set Pakistan on the course of stability and development by embracing ideas and vision of Jinnah, which in nutshell are; liberal democratic state of Pakistan.