Wednesday, October 30, 2019

LastnamefirstnameHIST101ShortPaper Research Paper

LastnamefirstnameHIST101ShortPaper - Research Paper Example They were rebellious protestors, but hesitant insurrectionists; in the commencement, the Americans attempted reconciliation with their supreme ruler along with acknowledgment of their rights. Much more than a mutiny against British taxes and enterprise regulations, the American Revolution was the first new revolution. It recorded the first occasion in history that people fought for their liberation in the name of certain general laws such as the rule of law, lawful rights, and democratic sovereignty (Bailyn 37). The origins of Revolution in American can be drawn from the year 1763 when the leaders in British started to tighten imperial reigns. The harmonious relationships that existed between Britain and its colonies became more and more conflict-riven. Britain’s land management prohibiting reimbursement in the West provoked colonists as did the advent of British troops (Bailyn 45). The most severe dilemma was the call for money to sustain the empire. Efforts through the Sugar Act, the Stamp Act, and the Townshend Acts to gather money rather than control trade met with increasing opposition in the territories. Anxieties rose further after Parliament enacted the Coercive Acts and the First Continental Congress adopted the initial steps toward sovereignty from Britain. Before the nations attained freedom, they had to struggle a great and painful battle. The British had numerous successes in the battle, comprising a great, well-trained troops and naval forces and several Loyalists who aided the British Empire. Still several white pioneers were separated by Lord Dunmore’s assurance of independence to captives who joined the noble army, and were incited by Thomas Paine’s Common Sense. Outstanding initiative by George Washington; the support of such European nationalities as France; and tactical failures by British officers contributed to

Monday, October 28, 2019

Conflicting perspectives Essay Example for Free

Conflicting perspectives Essay Before initial reading: The comments to the right are my thoughts and questions on phrases I have placed in the essay and how appropriate they would be. Analyse the ways conflicting perspectives generate diverse and provocative insights. All texts composed convey an agenda which is based on the composer’s context. William Shakespeare’s Julius Caesar, Jason Reitman’s satirical film Thank You For Smoking (2005) and George Orwell’s Animal Farm (1945) all use conflicting perspectives to convey their agenda by generating diverse and provocative insights. Conflicting perspectives are generated through the use and potential abuse of power, manipulation and the contrast between public and private personas and thus the responder is positioned to accept the perspective the composer has deemed to be valid. The use and abuse of power, the use of manipulation to gain power and the contrast between public and private personas are explored through the portrayal of conflicting perspectives. It can be seen that the responder is positioned to †¦.. the point you’re trying to make is that the use of conflicting perspectives allows for some ambiguity in the portrayal of these themes but you might then say that ‘ultimately we are positioned to accept that†¦Ã¢â‚¬â„¢ and then you could specify exactly what. Shakespeare’s play Julius Caesar demonstrates conflicting perspectives on the nature of power. Shakespeare utilised this play as a commentary on the political situation of the time regarding the monarch of Elizabeth I. Elizabeth had gradually increased her power at the expense of the aristocracy and House of Commons, giving rise to political disputes. Likewise, Caesar has been granted dictatorial powers in the Roman Republic but he is not presented to have misused his power. Instead, Caesar’s hubris is more prevalent this which is seen to be the catalyst for the potential misuse of power. Brutus is aware of this and his idealism for a Roman Republic leads him to join the conspirators, shown in his soliloquy in Act Two Scene One. Brutus uses extended metaphors of a ladder and serpents in order to question Caesar’s ambition in conjunction with power. Brutus states  that ‘young ambition’s ladder [cause him to] look into the clouds, [leading him to] scorn the base degrees by which he did ascend’. Brutus also considers Caesar ‘a serpent’s egg, which would grow mischievous, and kill him in the shell’. The imagery of killing before birth reveals that Brutus is willing to remove Caesar before any tyrannical tendencies take place, suggesting that the assassination was unjust. Brutus would later attempt to justify the assassination that ‘because [Caesar] was ambitious, I slew him’. The conditional language and use of logos in demonstrating a clear cause and effect convinces the audience at Caesar’s funeral oration that the assassination was just, based on the declarative mood in their reaction that ‘Caesar was a tyrant’. However an alternative perspective is displayed through Antony. Even with Caesar’s dictatorial powers he has not seen any way in which he has abused his position, forming the basis of his defence of Caesar in his funeral oration. He uses conditional language by questioning ‘if Caesar was ambitious’ and he uses logos in presenting Caesar’s lack of ambition. Antony draws on examples such as ‘he thrice refused [the crown]’ and when coupled with the rhetorical question ‘did this in Caesar seem ambitious?’ he questions the view of the responders by providing a logical response to Brutus’ ill-based accusations. Antony is able to demonstrate Caesar’s lack of ambition and hence Caesar’s just use of power for the good of Rome. As a result Shakespeare presents two conflicting perspectives on power which generates diverse and provocative insights into his context. George Orwell’s Animal Farm also evokes similar ideas but its context as an allegory for the Stalinist rule of Soviet Russia must also be considered. George Orwell explores the notion of the corrupting nature of power in his allegorical novel (or political satire) ‘Animal Farm’. The allegory is a criticism of Soviet Communism tracks the rise of Napoleon, representing Stalin after the overthrow of Mr Jones, representing the last Tsar of Russia, Nicholas II. and how his power is seen to slowly corrupt prompting in its abuse. At the beginning of the allegory/fable the animals are seen to be harbouring discontent against their autocratic ruler of Mr Jones through their plotting to overthrow humans out of their farm. Major states with a declarative mood that they should ‘remove Man from the scene, and the root cause of hunger and overwork is abolished forever’. This connotes that Mr  Jones has abused his powers in allowing the poor conditions for his working animals. After the animals have revolted against Mr Jones the original commandments of Animalism are created, calling for the equal distribution of power as ‘all animals are equal’. However Napoleon’s use of intimidation through brute force upsets the equality and with the exile of Snowball Napoleon is left in a position of absolute power. Napoleon’s guard dogs are used as a motif to symbolise his power as even after his initial deployment of his dogs against Snowball ‘the dogs growled so threateningly that they accepted his explanation without any further questions’. Napoleon’s power is also seen to corrupt him and he is ironically presented as to be simply a replacement for Mr Jones. Through reverting the name of the farm back to ‘Manor Farm’ Orwell perceives that the situation the animals are in do not differ from the reality of life under Mr Jones. Napoleon’s ‘transformation’ into a man is seen to represent this as the animals ‘look from pig to man, from man to pig, and from pig to man again, but already it was impossible to determine which was which’. The repetition and inversion of the order of ‘pig’ and ‘man’ highlight the confusion the animals have over their present reality. This illustrates the corruption of power in Napoleon and with this Orwell is suggesting that life under Stalin was no different than from Russia’s previous autocratic ruler of Tsar Nicholas II. Consequently Orwell’s use of conflicting perspectives over the issue of power in an allegory is able to provide a commentary of Orwell’s perspective of the nature of Stalinist Russia. Good – you clearly analyse and show the changed perspective of Napoleon but revise and consider how to clearly identify the conflicting perspectives. Julius Caesar demonstrates how a conflict between public and private personas can result in conflicting perspectives of characters. Act One Scene One introduces the idea of conflicting perspectives within personas with the Senators Flavius and Murellius and their perception of the commoners. The Senators clearly see the commoners as inferior with their descriptions as of them as ‘vulgar’ and ‘the basest metal’. This juxtaposes the positive diction used by them to describe the commoners as ‘good countrymen’ when they are in the public sphere, suggesting that the patronising tone used had the sole purpose of gaining support from the commoners. However Antony is  the character that conceals the deepest division between public and private personas, demonstrating his Machiavellian nature. His public persona is presented toas supportive of the assassination by being supportive of the conspirators as he states that ‘it would become me better than to close in terms of friendship with thine enemies’. Give a bit more info of context. Who does he say this to? However his antithesis is indicated through his ‘hope that you shall give me reasons why and wherein Caesar was dangerous’. How? This is implied to be a signal of support from Antony towards the conspiratorshow? but it hid his inner motives of his desire offor conflict against the conspirators. His private persona is presented to be heavily opposed to the assassination and he calls for ‘havoc’ and ‘let slip the dogs of war’, with the violent imagery clearly stating his intention and perspective of the assassination. Mention that this is in a soliloquy before the oration and what we learn. His private persona is reflected in his funeral orations where he repeatedly implies his disagreement with the assassination but never explicitly stating his stance. Initially he states that he ‘comes to bury Caesar, not to praise him’, but this is juxtaposed with his questioning tone and use of rhetorical questions that serve the purpose of suggesting the lack of justice in the assassination. Eg? His private persona comes into full view by the conclusion of his oration where through pathos he calls the ‘stones of Rome to rise up and mutiny’. Link to the dogs of war comments.This perspective of encouraging mutiny is therefore in direct contrast with his interactions with the other conspirators. Explain where. As a result conflicting perspectives are shown also within the characters in order to generate diverse and provocative insights. Similarly, Jason Reitman’s satirical film Thank You For Smoking also projects similar ideas regarding public and private personas. The film is a satire onof the perception of cigarettes and tobacco but not to the extent in which it is condoned, due to the fact that no character in the film is seen smoking. Conflicts in private and personal personas are seen through the protagonist of Nick Naylor with his public support of cigarettes and questioning of its associated health issues, juxtaposed with his private persona where he openly admits to smoking-related health issues. This issue is displayed through Naylor’s criteria for winning an argument, that ‘I  proved that you’re wrong. And if you’re wrong, I’m right’extend this quote with film techniques used at this point. His public persona has a distinct lack of integrity as he provides false promises on the nature of his employer, the Academy of Tobacco Studies. This is shown at the beg inning of the film where on a talk show he promises ‘50 million dollars to encourage kids not to smoke’. This is done despite it being completely contradictory to the perspectives of his employer who asks him ’50 million dollars? Are you out of your mind?’ The anger of his boss on promising the sum of money is seen through the closeup of his face as well as his questioning tone. However Naylor’s private persona admits to the health issues associated with smoking. In a meeting with the MOD group (Merchants of Death, constituting people from America’s firearms, alcohol and tobacco industries) in the film they discuss deaths directly attributed to their industry in order to gauge America’s most hated industry. Naylor boasts that ‘my product puts away 475 000 a year’ and he gloats that the level of alcohol related deaths is miniscule in context ‘100 000 in a year? Wowee a tragedy. Excuse me if I don’t exactly see terrorists getting excited kidnapping anyone from the alcohol industry’. The unconcerned facial expression coupled with the mid-close up shots of Naylor displaying no emotion and the comparison of deaths to terrorism demonstrates the complete disregard of human life. You need to comment on the use of satire as a way to highlight the conflict between what is said on screen and the purpose of the film maker. This is exemplified by the fast transition of shots in the conversation indicating the competitiveness of the argument. This scene is a satire ?on the perceived lack of moral concern demonstrated by tobacco industry through its use of absurdist behaviour, mainly instigated by Naylor. Therefore Naylor’s contradiction between his public and private personas is also another medium used by Reitman in order to convey conflicting perspectives on his satire of the tobacco industry. Manipulation is one central concern in Julius Caesar which generates conflicting perspectives. Cassius is able to manipulate Brutus into firstly believing the idealism of his cause and thus joining the conspirators and enacting Caesar’s death. Brutus is presented to be an idealistic character as he ‘loves the name of honour more than I fear death’. The antithetical  language of ‘honour’ and ‘death’ demonstrates that he has cast himself as the honourable idealist, and when coupled with Brutus’ fear that Rome ‘chooses Caesar as their king’ Cassius is free to manipulate him into joining the conspirators. He uses hyperbole to exaggerate Caesar’s status and he juxtaposes images of him being both a ‘Colossus’ and a ‘sick girl’ in order to prove his weakness to Brutus. Cassius also appeals to his idealistic nature. His monologue contains the epistrophy epistrophe ‘one man’ that reveals Caesar’s true power, that only ‘one man is Rome’. This position is different to the democratic Roman Republic that Brutus represents and admires and he is slowly manipulated to join the conspirators. Manipulation is also seen to demonstrate the power of language, seen through the differing funeral orations of Brutus and Antony. Initially the commoners are irate onabout Caesar’s assassination and the declarative mood presented through ‘we will be satisfied’ highlights their anger but it also serves as a point of juxtaposition. Brutus’ use of logos convinces the crowd that he ‘loved Rome more’ than Caesar through posing rhetorical statements that question the loyalty of the commoners and Caesar’s supposedly true nature. Immediately following his oration the commoners immediately affirm that ‘Caesar was a tyrant’, with this declarative statement juxtaposing heavily with the sentiment displayed in the first line of the scene. However the crowd are manipulated again by Antony to subscribe to his point of view. He adopts a questioning tone throughout his oration in inquiring onabout the validity of Brutus’ statements in order to not directly oppose Brutus but let his audience question their own perspectives. He repeats the phrase ‘Brutus says he was ambitious, and Brutus is an honourable man’ but the repetition of the phrase combined with the logos in his argument in proving Caesar’s lack of ambition therefore hint at the invalidity of Brutus’ argument. Further on in his oration Antony also uses metaphor to describe Brutus, that he was ‘Caesar’s angel’. This image is contrasted with the assassination, the ‘most unkindest cut of all’ and this contributes to the sentiment of betrayal with Brutus that assists in manipulating the audience. By the conclusion of the speech the commoners are united with one common purpose, shown in the stage direction in that all the commoners state ‘We’ll mutiny [against Brutus]. Anto ny’s rapid manipulation of the crowd demonstrates the power of language  and how it can be used to shape perspective. The manipulation of the animals in Animal Farm also conveys similar sentiment. Orwell utilises a cyclical structure of the allegory in order to demonstrate the power of manipulation instigated mainly by the antagonist of Napoleon and his spokesperson of Squealer. Orwell’s use of the text as an allegory of Soviet Russia creates a chilling context for the reader due to the fact that manipulation was repeated in Stalin’s rule of Russia, leading to the subjugation of the citizens of the Soviet Union. The pigs of Napoleon and Snowball quickly establish themselves as the superior class in the new ‘classless’ society of Animalism. Their superior intellect immediately allows them to create a simplified maxim for Animalism, which was to be ‘four legs good, two legs bad’. The sheep, representing the uneducated class, immediately begin to circulate this simplified form of Animalism and their attitude is reflected in the sheep ‘bleating this onfor ho urs on end’. The onomatopoeia exemplifies the repetitive nature and submissiveness in accepting this maxim and thus of the commands set by Napoleon throughout the allegory. Motif as well? The commandments of Animalism is used as a vehicle to demonstrate the manipulation of the animals. The commandments are changed repeatedly throughout the allegory to manipulate the common animals and their ‘poor memory’ as well as their naivety contributes to their ultimate acceptance of the new norm. The first notion of this manipulation is done when the pigs move and reside in the farmhouse. The new commandment reads ‘no animal shall sleep in a bed with sheets’, with the ‘sheets’ clause added. The character of Clover demonstrates the naivety of the animals in general as she ‘had not remembered if it mentioned sheets, but as it was there on the wall, it must have done so’. The high modality of ‘it must have done so’ contrasts her failure to rememb er the commandment. Squealer’s immediate entry in justifying the change in the commandment is another example of manipulation as he uses his intellectual superiority and logos in order to influence his listeners. He states that a bed ‘is simply a place to sleep in’ and not a physical construct and his argument juxtaposes the affirmation at the establishment of Animalism that the commandments were ‘unalterable laws’. The death of the character of Boxer also reveals the extent of Napoleon’s manipulation. Boxer is a follower of Napoleon throughthe adoption of the motto ‘Napoleon is always right’ which, when combined with his hardworking nature, should warrant great care and respect from the pigs. However when Boxer falls ill he is taken to the ‘horse slaughterer’ to be killed in exchange for money. This reality, witnessed by the animals, contrasts the explanation of Squealer in that ‘the van had previously been the property of the knacker, and had been bought by the veterinary surgeon’. By the conclusion of the allegory Napoleon’s power has become increased to such an extent that even the commandments of Animalism are shown to reflect the changes in that ‘all animals are equal, but some animals are more equal than others’. The paradoxical nature of this statement juxtaposes the original idealistic thinking based behind the creation of Animalism and demonstrates the extent of the manipulation of the animals. The animals are not aware that they are living in conditions very similar to life under Jones which forms the basis of Orwell’s cyclical structure of the allegory. The bending of the truth by the pigs as well as the willingness of the animals to accept this reality highlights the vast extent and impact of manipulation. Thus manipulation is another medium in which conflicting perspectives can be revealed. Composers of texts use conflicting perspectives in order to generate diverse and provocative insights into their context. These perspectives are shown to favour one side and they can provide an insight into the opinion of the composer on issues affecting their context. This is seen in Julius Caesar, Thank You For Smoking and Animal Farm where the composers, through their portrayal of power, public and private personas and manipulation that form the basis of conflicting perspectives. This is excellent overall. However, there are things you can do to improve. The analysis of AF is almost longer than Caesar. You must mention the end of Caesar in your analysis. There doesn’t seem to be at least one quote from Acts 4 or 5. Find a couple and use them. In the first body paragraph on power, use quotes for Antony from elsewhere in the play, not just the oration. Eg comment on the deification of Caesar at the start and how stage directions are used by Shakespeare to contrast the views of the commoners/Antony/ and Cassius/Brutus and others. Give an example of where we  see Caesar’s hubris ‘northern star’†¦ and contrast that with his humility elsewhere. Shakespeare is always offering contrasting views and creating ambiguity. However, comment also on how we are finally positioned at the end of the play. If discussing Brutus’s hubris, mention the tragic structure. Contrast the way this character is presented at the beginning, middle and then the end when we see the consequences of both his idealism and hubris when he fights with Cassius and dies and then the final comments by Antony. When writing about Antony, consider the way he is presented as loyal, then angry and vengeful about the murder of Caesar, then pitiful, then scheming and manipulative. Take quotes from a range of places throughout the whole play to give the reader a better understanding of the narrative arc of this character. The final paragraph on AF could be edited. It is very long and veers away from the idea of conflicting perspectives in the middle and becomes an analysis of the novel. Throughout the discussion, you could make links between it and Caesar to remind the reader of your point. Email if you have questions.

Saturday, October 26, 2019

Microsoft Analysis Essays -- essays research papers

Microsoft Analysis Introduction and Summary of Company History and Background Information Microsoft over the past 27 years has positioned itself as the arterial system of almost all computers rolled into use across the world. Albeit with no competition worth the name to challenge its existence leave alone on technology advancements, the company has still managed to keep pace with both felt and perceived needs of its customers and its niche remains robust thus far. Nevertheless disturbing winds have begun to blow. Its corporate governance is under the microscope and the world is watching as to how Microsoft is bracing itself for the challenges posed both by competition (however innocuous it may be at present) and technology proliferation. Let us look at Microsoft ¡Ã‚ ¦s expansion plans and initiatives to integrate them to its existing competencies -  Ã‚  Ã‚  Ã‚  Ã‚  Microsoft ¡Ã‚ ¦s role according to Mr. Gates himself is to provide a software platform that allows everyone who is building applications to build far more powerful applications. -  Ã‚  Ã‚  Ã‚  Ã‚  MOM (Microsoft Operations Manager) 2005, which is a key management software and Virtual Server product as part of simplification of the IT lifecycle have been launched recently -  Ã‚  Ã‚  Ã‚  Ã‚  In hardware domain the company has had the benefit of exponential improvement in recent decades. During the first half of next year, the company is expected to have a very smooth transition from 32-bit to 64-bit systems, with total binary compatibility. This will provide the ability to mix 32-bit and 64-bit; a simple recompilation for any application using the full 64-bit address base. That is a wonderful milestone no longer requiring people to buy expensive systems simply to achieve the best possible performance. -  Ã‚  Ã‚  Ã‚  Ã‚  New graphics chips for better visualization; larger screens, moving up to 17-inch, 19-inch or multi PAL type LCD displays; and RFID for tagging information and having them available to track is on the agenda too. -  Ã‚  Ã‚  Ã‚  Ã‚  Software developments in photography, web searches and music, and advances in gaming applications are on the anvil -  Ã‚  Ã‚  Ã‚  Ã‚  Web-service protocols for connecting applications  ¡V Exchange and XML data are already in the pipeline. All this of course does not guarantee soun... ...ation and innovation leading to altogether new role and share in the market. This has a telescopic effect on gross market share rather than on limited niche share In the context of Microsoft all the above possible strategies have been discussed. No doubt the company still enjoys pre-eminent position in its niche market. In the foreseeable future no major threat is perceived to this position. But the fact is its niche market of today is threatening to lapse into dilution and redundancy due to rapid overshadowing by Internet and Wireless devices and applications. This is not of course going to make the company obsolete by any stretch of imagination. However there are perceptible warning signals, which the company will do well to recognize, invest in right research and innovation and sustain its leading edge in spite of the market dynamics and increasing competition. The focus areas have to be in tune with evolving technologies and applications. As marketing by definition is to identify customer needs and to satisfy them, the company cannot always hope to thrust its products and applications on the customers. Microsoft has the resources to do it. It should be willing to just do it Microsoft Analysis Essays -- essays research papers Microsoft Analysis Introduction and Summary of Company History and Background Information Microsoft over the past 27 years has positioned itself as the arterial system of almost all computers rolled into use across the world. Albeit with no competition worth the name to challenge its existence leave alone on technology advancements, the company has still managed to keep pace with both felt and perceived needs of its customers and its niche remains robust thus far. Nevertheless disturbing winds have begun to blow. Its corporate governance is under the microscope and the world is watching as to how Microsoft is bracing itself for the challenges posed both by competition (however innocuous it may be at present) and technology proliferation. Let us look at Microsoft ¡Ã‚ ¦s expansion plans and initiatives to integrate them to its existing competencies -  Ã‚  Ã‚  Ã‚  Ã‚  Microsoft ¡Ã‚ ¦s role according to Mr. Gates himself is to provide a software platform that allows everyone who is building applications to build far more powerful applications. -  Ã‚  Ã‚  Ã‚  Ã‚  MOM (Microsoft Operations Manager) 2005, which is a key management software and Virtual Server product as part of simplification of the IT lifecycle have been launched recently -  Ã‚  Ã‚  Ã‚  Ã‚  In hardware domain the company has had the benefit of exponential improvement in recent decades. During the first half of next year, the company is expected to have a very smooth transition from 32-bit to 64-bit systems, with total binary compatibility. This will provide the ability to mix 32-bit and 64-bit; a simple recompilation for any application using the full 64-bit address base. That is a wonderful milestone no longer requiring people to buy expensive systems simply to achieve the best possible performance. -  Ã‚  Ã‚  Ã‚  Ã‚  New graphics chips for better visualization; larger screens, moving up to 17-inch, 19-inch or multi PAL type LCD displays; and RFID for tagging information and having them available to track is on the agenda too. -  Ã‚  Ã‚  Ã‚  Ã‚  Software developments in photography, web searches and music, and advances in gaming applications are on the anvil -  Ã‚  Ã‚  Ã‚  Ã‚  Web-service protocols for connecting applications  ¡V Exchange and XML data are already in the pipeline. All this of course does not guarantee soun... ...ation and innovation leading to altogether new role and share in the market. This has a telescopic effect on gross market share rather than on limited niche share In the context of Microsoft all the above possible strategies have been discussed. No doubt the company still enjoys pre-eminent position in its niche market. In the foreseeable future no major threat is perceived to this position. But the fact is its niche market of today is threatening to lapse into dilution and redundancy due to rapid overshadowing by Internet and Wireless devices and applications. This is not of course going to make the company obsolete by any stretch of imagination. However there are perceptible warning signals, which the company will do well to recognize, invest in right research and innovation and sustain its leading edge in spite of the market dynamics and increasing competition. The focus areas have to be in tune with evolving technologies and applications. As marketing by definition is to identify customer needs and to satisfy them, the company cannot always hope to thrust its products and applications on the customers. Microsoft has the resources to do it. It should be willing to just do it

Thursday, October 24, 2019

Arfa Batik Essay

From the backyard of the founders house, our exclusive hand drawn batik is now a multi million ringgit industry with markets as far ranging as Europe and the Middle East. Our batik fashion house or haute couture combines contemporary design and traditional Malay motifs into batik of simple elegance, and are very much sought out by discerning customers from around the world. WHAT WE DO We are involve in various batik production processes from manufacturing from printing, colouring/dyeing, designing and tailoring, wholesaling, exporting to retailing of our batik products. We seek to open a chain of Noor Arfa Batik retail throughout the world through franchising. Noor Arfa is Malaysian’s largest commercial Batek producer. Noor Arfa has built a reputation as the leading manufacturer of superior hand – drawn fashion items and accessories. We also train and develop master craftsmen that consistently produce quality with excellence. We stand out as leader in our industry in the way we have perfected the art of combining distinct colour with classic designs and traditional Malay motives, to create Batek of simple elegance. The Market Noor Arfa Franchise operates in a dynamic and evolving marketplace. Consumers are presented with many options for batik textile and we see a growing interest in fashionable and contemporary batik that address the need to be trendy and yet unique in identity. We find our customers desiring the look that is Malaysian and yet global in application. Noor Arfa addresses this gap in the market by providing a more comprehensive product range that addresses the various needs of the different segment of the market for batik wear and textile. Our customers would also not have to worry about quality as we provide a consistent buying experience with our quality policy which is to produce excellent quality product that satisfy our customer needs. We also believe there are other areas of the market that would benefit from our products which we have not yet targeted. For example we see huge potential in offering our product to the trendy and fashionable young market which is looking for cool and â€Å"in† fashion wear. This is an area of the market that is fully aware of the benefits of self identity and yet contemporary.

Wednesday, October 23, 2019

Configuring ETRN on the Server and the Client Essay

To set up ETRN, you need to configure the server and the client separately. The ISP usually configures the server side. The setup is simple if your ISP is using Exchange Server. Go to the Connections tab of the IMS property sheet. Under Message delivery, click E-Mail Domain. Add the customer’s domain name and select the Queue messages for ETRN check box, as you see inScreen 1. If you don’t check this box, the ISP server will immediately attempt to deliver messages even though the ETRN client is offline. Checking this box prevents unsuccessful retries and nondelivery reports (NDRs) back to the originator. ISPs that don’t use Exchange Servers can configure the Sendmail utility for ETRN capability. The ETRN client requires more complex configuration. First, configure when the ETRN client sends mail. If you’re using RAS, be sure you’ve configured the RAS client and a phone book entry pointing to your ISP before you begin. From Exchange Server, go to the IMS property sheet to configure your connector for ETRN dial-up. From the Dial-up Connections tab, which Screen 2 shows, choose the appropriate remote access entry from the Available connections window. Next, decide on a schedule for calling your ISP. As Screen 2 shows, you have several options, including transferring mail at specific intervals or whenever mail is queued up. Note that you don’t explicitly define when to close the connection. The IMS terminates the connection depending on the setting in the Time-out after X min window. This parameter refers to idle time; the connection closes after the number of minutes you specify have passed. Your ISP must be able to dequeue your inbound mail within this period, or the connection will close prematurely. The connection might close if the dequeue process doesn’t proceed in a timely fashion after you’ve established the connection with the ISP. You can accommodate a slow start of the dequeuing process by increasing the time value. You configure logon validation for the dial-up connection by clicking Logon Information on the Dial-up Connectors tab. On the screen that opens, enter your username, password, and domain (if appropriate). This information (which your ISP gives you) provides the credentials for ETRN to match against the server and provides security between the two servers. To configure ETRN to let your ISP send your mail to you, click Mail Retrieval to get to the screen that you see in Screen 3. Click Retrieve mail using ETRN. To specify the proper Internet domain, you can use the Routing property page (from the IMS property sheet) or hard-code your domain names by selecting Use these domains and entering domains in the window. The latter option signals the ISP to dequeue messages from this domain only. If you’ve defined subdomains, precede the domain name with an at (@) character to collect mail for all domains. Subdomains let you partition companies into operating units with separate email addresses. For example, the NCR.com Internet domain has several subdomains, such as daytonoh.NCR.com and columbiasc.NCR.com. If your ISP has defined separate hosts for inbound and outbound messages, you can select Send ETRN to specified host instead of outbound mail host and define the IP address of the inbound host. If your service provider uses the TURN command instead of ETRN, you can click Issue TURN after delivering outbound mail. If you use this option, your ISP might need to authenticate your identity, if the ISP has this functionality. You can configure these credentials (e.g., name and password) on the Security tab of the IMS property sheet. This authentication usually uses the AUTH LOGIN ESMTP extension to send the account and password on the outbound connection. If your ISP uses UNIX instead of Exchange Server, you can use the UNIX Sendmail application to dequeue messages from the ISP’s SMTP gateway for delivery to the ETRN client. To configure Sendmail, select Custom command to invoke a script that uses the Sendmail function. You enter the script in the window next to the option. For instance, the remote shell command (Rsh) causes Sendmail to run at the service provider after you’ve established a connection. For example, the syntax  Rsh I isp.com l logonalias â€Å"/user/lib/sendmail q R NCR.com† starts the remote shell, then connects to a service provider called ISP.com. The logon alias starts the shell at the ISP (this alias must match the rhosts file on the ISP). The rest of the command executes the remote shell and sends the queue to the specified domain (NCR.com). The final step in the client portion of ETRN setup is to configure your server to queue mail in the IMS for later transfer to your ISP via ETRN. On the IMS Connections tab, which Screen 4 shows, selectForward all messages to host under Message Delivery, and then enter your ISP’s IP address. Check the Dial using check box, and be sure the correct RAS phone book entry appears in the adjacent window.

Tuesday, October 22, 2019

Romeo & Juliet - Nurses Role essays

Romeo & Juliet - Nurse's Role essays The play, Romeo and Juliet, by Shakespeare, is about two teenagers called Romeo and Juliet who fall in love. Only one person knows about it, and that is Juliets nurse. Romeo and Juliets families hate each other, so they do not tell their parents, because they would be extremely angry that they were in love, and would not let Romeo and Juliet see each other. Throughout the play we see the Nurse as a comedian, or in some parts, such as Tybalts death, a serious character. I see the nurse as motherly, as she treats Juliet as if she were her own daughter, and knows her a lot better than Juliets mother. Juliets mother did not even know her own daughters age. The nurse often acted before thinking about the problems they would cause. When Juliet and Romeo first met, the nurse asked him his name, and even though she found out he was a member of the Montagues, which was the hated family of Juliets family, she still told Juliet. Juliet said, My only love, sprung from my only hate which shows that she was very upset, and confused about what to do. The Nurse doesnt see what is so awful about it, and helps Romeo and Juliet meet in secret. The nurse also helped Romeo and Juliet marry in secret. This shows she was more like a friend than a nurse to Juliet, as she risked her job to help Juliet. Juliet asked her to go and find Romeo, and see if he had made arrangements for their marriage. Romeo had, and said, some means to come to shrift this afternoon, And there she shall at Friar Lawrence cell The nurse was protective of Juliet, because after Romeo had told her about the marriage arrangements she asked him if he was trustworthy, she said, Is your man secret? Did you neer hear say, Two may keep counsel, putting one away? ...

Monday, October 21, 2019

History of CREEP and Its Role in the Watergate Scandal

History of CREEP and Its Role in the Watergate Scandal CREEP was the unofficial abbreviation derisively applied to the Committee for the Re-Election of the President, a fundraising organization within the administration of President Richard Nixon. Officially abbreviated CRP, the committee was first organized in late 1970 and opened its Washington, D.C. office in the spring of 1971. Besides its infamous role in the 1972 Watergate scandal, the CRP was found to have employed money laundering and illegal slush funds in its re-election activities on the behalf of President Nixon. During the investigation of the Watergate break-in, it was shown that the CRP had illegally used $500,000 in campaign funds to pay the legal expenses of the five Watergate burglars in return for their promise to protect President Nixon, initially by remaining silent, and by giving false testimony in court - committing perjury - after their eventual indictment. Some key members of CREEP (CRP) included: John N. Mitchell - Campaign DirectorJeb Stuart Magruder - Deputy Campaign ManagerMaurice Stans - Finance ChairmanKenneth H. Dahlberg - Midwest Finance ChairmanFred LaRue - Political OperativeDonald Segretti - Political OperativeJames W. McCord - Security CoordinatorE. Howard Hunt - Campaign ConsultantG. Gordon Liddy - Campaign Member and Finance Counsel Along with the burglars themselves, CRP officials G. Gordon Liddy, E. Howard Hunt, John N. Mitchell, and other Nixon administration figures were imprisoned over the Watergate break-in and their efforts to cover it up. The CRP was also found to have had ties to the White House Plumbers. Organized on July 24, 1971, the Plumbers was a covert team officially called the White House Special Investigations Unit assigned to prevent leaks of information harmful to President Nixon, such as the Pentagon Papers to the press. Besides bringing shame on the office of President of the United States, the illegal acts of the CRP helped turn a burglary into a political scandal that would bring down an incumbent president and fuel a general mistrust of the federal government festering as part of protests against continued U.S. involvement in the Vietnam War.  Ã‚   Rose Marys Baby When the Watergate affair happened, there was no law requiring a campaign to disclose the names of individual donors to political campaigns. As a result, the amount of money and individuals donating that money to CRP was a tightly held secret. In addition, corporations were secretly and illegally donating money to the campaign. Theodore Roosevelt had previously pushed through this prohibition of corporations donating money back in 1907. President Nixons secretary, Rose Mary Woods, kept the list of donors in a locked drawer. Her list famously became known as â€Å"Rose Marys Baby,† a reference to the popular 1968 horror movie titled â€Å"Rosemarys Baby.†   This list was not revealed until Fred Wertheimer, a campaign finance reform supporter forced it into the open through a successful lawsuit. Today, the Rose Mary’s Baby list can be seen at the National Archives where it is held with other Watergate-related material released in 2009. Dirty Tricks and CRP In the Watergate Scandal, political operative Donald Segretti was in charge of the many dirty tricks carried out by the CRP. These acts included the break-in at Daniel Ellsbergs psychiatrists office, the investigation of reporter Daniel Schorr, and plans by Liddy to have newspaper columnist Jack Anderson killed. Daniel Ellsberg had been behind the leak of the Pentagon Papers that had been published by the New York Times. According to Egil Krogh in an op-ed piece in the New York Times printed in 2007, he was charged along with others to carry out a covert operation that would uncover the state of Ellsbergs mental health in order to discredit him by stealing notes about him from Dr. Lewis Fieldings office. According to Krogh, the break in which found nothing about Ellsberg was done in the name of national security. Anderson was also a target due to his exposing classified documents that showed that Nixon was secretly selling arms to Pakistan in their war against India in 1971. Anderson had long been a thorn in Nixons side. The plot to discredit him was widely known after the Watergate scandal erupted. However, the plot to possibly assassinate him was not verified until Hunt confessed on his deathbed. Nixon Resigns In July 1974, the U.S. Supreme Court ordered President Nixon to turn over secretly-recorded White House audio tapes - the Watergate Tapes - containing Nixon’s conversations dealing with the Watergate break-in planning and cover-up. When Nixon first refused to turn over the tapes, the House of Representatives voted to impeach Nixon for obstruction of justice, abuse of power, criminal cover-up and several violations of the Constitution. At last, on August 5, 1974, President Nixon released the tapes, proving his complicity in the Watergate break-in and cover-up. Aware that his impeachment was almost certain, Nixon resigned on August 8 and left office the following day. Finally, on August 5, Nixon released the tapes, which provided undeniable evidence of his complicity in the Watergate crimes. In the face of almost certain impeachment by Congress, Nixon resigned in disgrace on August 8 and left office the following day. Just days after he was sworn in as president, Vice President Gerald Ford - who had no desire to run for president himself - granted Nixon a presidential pardon for any crimes he had committed while in office.

Sunday, October 20, 2019

How To Increase Conversions And Brand Loyalty With Roger Dooley

How To Increase Conversions And Brand Loyalty With Roger Dooley What kind of experience does your brand create for customers? Is it simple and seamless enough to keep them coming back for more? Or, do they find their experience with your brand frustrating, cumbersome, and time-consuming?    Today, my guest is Roger Dooley, author of Friction, which describes things that prevent customers from having a great experience with companies and their brands. Each year, about $4.6 trillion of merchandise is left abandoned in eCommerce shopping carts. Also, internal friction (i.e., organizational drag) is responsible for $3 trillion in lost productivity. Most important element in behavior change process: Friction How to eliminate, minimize, or use friction to your advantage Reasons why people leave things in their shopping carts All routers are the same; awful experience for â€Å"normal† people Reviews and Rankings: In a market dominated by giants, address pain point that other companies aren’t to be successful Worst advice can be best practices Friction Goggles: People tend to accept things and don’t see where friction exists Actively Disengaged: Effort isn’t productive, serving a greater purpose Don’t shift the load; find ways to improve processes, and stop wasting time Software and tools help eliminate friction Acceptance of Fake Rules: This is the way things are done, or it has to be done Difference between friction and motivation; operate in opposition due to choices    Links: Roger Dooley Friction College Confidential Brainfluence The Persuasion Slide Amazon 1-Click Ordering Uber United Airlines Harvard Business Review: Reduce Organizational Drag Cisco Netgear TurboTax Tom Peters John Padgett BJ Fogg AMP132: Why Best Practices Are The Worst Advice With Jay Acunzo From Unthinkable Media What topics and guests should be on AMP? Let me know! If you liked today’s show, please subscribe on iTunes to The Actionable Content Marketing Podcast! The podcast is also available on SoundCloud, Stitcher, and Google Play. Quotes by Roger Dooley: â€Å"Extra effort or unnecessary effort changes behavior.† â€Å"If you look at the reasons why people abandon stuff in shopping carts, almost all of them are friction-related.† â€Å"In a market totally dominated by giantshe saw a pain point that they weren’t addressing. He addressed that pain point and ended up being very successful.† â€Å"Your customers are not dogs. If you make them work a little bit harder, they will go someplace else.†

Saturday, October 19, 2019

The Need for Market Research in Contemporary Business Environment Essay

The Need for Market Research in Contemporary Business Environment - Essay Example Today the customers demand the best worth out of each penny that they spend and this is because of the growing globalization and the increasing competition. Today customers have as many alternatives for a single product as they never have had in the past. This phenomenon has empowered the customers to a great extent and has given rise to the need for research. Companies spend major chunks of their budgets on research today. Research does not only reveal facts about customer psyche but also guide the researchers and the sponsors to the gaps and unidentified niches in the market, thus opening new horizons of opportunities and profitability to be taken advantage of (Stearns, 2006). Research outcomes serve as guidelines to the researchers in order to lay down a road map for future decision making of the business/organization. In today’s’ world businesses cannot afford to base their decisions on gut feeling and guesses. It’s time to be precise and accurate. The cause and effect relationship needs to be studied while making even the smallest of decisions. Research provides the decision makers to base their decision making on solid basis and rational grounds. The outcomes of researches help businesses build strategies and also monitor the anticipated performance by comparing it with the actual and studying the lapses incurred and the probable corrective measures that can be adopted before it’s too late (Sekaran, 2010). Dependable and solid outcomes do not come voluntarily in fact research is a whole world of technical analysis and execution and thus it is required to be conducted in great depth with a predetermined plan and objective in mind. Research is a delicate and sensitive art, because the outcomes of research are used for future... This essay discusses that with the advancement of technology and emergence of the concept of consumerism to the surface, customers have become ever more dominant and powerful in the marketplace. Nowadays all the companies shed off myopic ideas and try to incorporate consumer’s will in the decision making process. This is particularly important because customer satisfaction is the ultimate objective that leads to profitability and endurance in organizations. To attain stability, organizations spend millions of dollars today on their Research and Development departments to get the best and most accurate knowledge regarding consumer behaviour and expectations. This knowledge and information is utilized by organizations in improving their processes to meet the demands and requirements of the customers and thus deliver a â€Å"wow experience† every time the customer interacts with the offering. In other words, this shall not be exaggeration to state that, research is one of the key pillars to success of an organization, in the contemporary market dimensions. Any idea or tactic backed up by research findinngs is more durable and dependable then something that is implemented out of the blue. Research does not only assist organizations in deciding which route to success shall be adopted, in fact contingency measures and sporadic adjustments to deviations and evaluation of the implementation are some of the broad areas that are addressed at length by researches

Friday, October 18, 2019

War in Syria Essay Example | Topics and Well Written Essays - 1500 words

War in Syria - Essay Example The uprising is believed to be caused by dictatorship, corruption and human rights violations among other grievances (Rosiny, 2). Syrian war is a prolonged conflict that is currently taking place in Syria between the military and those opposed to the regime of Baa’thist government led by Bashar al-Assad. It started during the Arab spring. Syrian Arab republic was established in 1920 as a French colony in Western Asia. It has its headquarters in Damascus. The country borders Israel, Turkey, Lebanon, Iraq and the Mediterranean Sea. At the time of the Arab spring Syrian president Bashar al Assad enjoyed a relatively good support from the citizens. Bashar al Assad took the reign of power from his father, Hafez al- Assad in 2000 when the father died. Hafez became president in 1970 through a coup de tat. After taking power, Hafez set up an authoritarian regime that didn’t tolerate activities of the Muslim brotherhood which was the main opposition to the ruling regime at that time. He encouraged the idea of divide and rule. He enjoyed the support of the Sunni Arabs who made up almost 60% of the entire Syrian population and that of Christians. He also had the support of his minority group of the Alawis. He excluded those who were perceived not to be in support of his policies like the Kurds. When his son took power in 2000, he introduced political and economical reform measures in Syria. He released scores of political prisoners and initiated a number of economic reforms that made him popular with the people. According to Assad Al-Saleh (2014), the period known as the Damascus spring which was during the earlier days of Bashar al- Assad tenure in office shows that the opposition and political activities were tolerated. But this did not last for long. Bashar al Assad regime was characterized by corruption and alienated other communities. The regime was also oppressive and arrested opposition leaders. The people

Management Essay Example | Topics and Well Written Essays - 2000 words - 17

Management - Essay Example The government will then have the money to take measures of social welfare. The legal dimension proposes that the business organisations should follow the rules and regulations proposed by the government and should not evade taxes. During their operation, business organisations should follow the rules related to health and safety of the staff, rules against racial or sex discrimination, emission norms etc. There are several industry specific rules such as rule related to hazardous waste, which must be followed. The ethical dimension refers to the business ethics of fair competition while protecting the interest of the major stakeholders be it the shareholders, consumers and the employees. It requires the business owners to work with the moral conscience while taking business decisions. The discretionary dimension is the philanthropic part of social responsibility wherein the business organisation make donations for the social cause such as poverty alleviation, education of the poor sections of the social, control of a deadly disease like cancer or HIV AIDS. There are donations made by businesses during any national or global calamity. All these become a part of discretionary philanthropic act. Only two of the four dimensions discussed above has been the part of Friedman’s statement i.e. economic and legal dimension. In his essay, Friedman argues that the ethical and the discretionary dimensions can be the responsibility of any individual be it the businessmen or the employees of the organisation and not the business. As was insisted in the stakeholder theory by R. Edward Freeman, business organisations have legal obligation towards the primary and secondary stakeholders to run in a profitable and fair manner. The primary stakeholders include shareholders, customers, business partners, employees and the community while the secondary stakeholders include the government and the regulatory bodies, civic institutions

Thursday, October 17, 2019

ART-opinion paper Essay Example | Topics and Well Written Essays - 500 words

ART-opinion paper - Essay Example The visit to the art gallery was a memorable one, since one could devote sufficient time to browsing and discussing unique aspects about the art pieces with the helpful attendant on duty at that time. Also, since the visit was during afternoon hours, there were few visitors around, and a leisurely viewing was possible. The glass-fronted facade of the gallery permits an exciting view into the interiors, which are well lit with the help of numerous focus lights from the dark ceiling. Inside the gallery, the interiors are designed for displaying art pieces at their best. Backgrounds in pastel shades such as peach walls and surfaces, and sky-blue stands hold Western contemporary and abstract paintings, graphite and pastel drawings, sculptures, photography, raku pottery, bowls, designer jewellery and blown glass art pieces, each unique and distinctive. The eclectic collection of art in several mediums and genres from various sources, artists and craftsmen, is representative of some of the best in creativity from the western world. All the artists associated with the art gallery are local and regional Denver artists who are highly talented, some of whom have been nationally and internationally recognized for their artistic abilities. These original art works are infused with the energy, knowledge and sp irit of the artists whose creative skills are captured as a moment in time. Artists develop their distinctive style or technique over several years of formal and informal training while progressively mastering their craft. The paintings of wild animals in their natural habitats such as a doe and her young fawn, those of nature, country scenes and extraordinary sky-scapes compete for space with urban life depicted through towering sky-scrapers and buildings. All the art works are worthy of gracing any distinguished home, office or other space. The intrinsic value of fine art increases progressively and is a good

Identification Procedures Essay Example | Topics and Well Written Essays - 2000 words

Identification Procedures - Essay Example After all, the liberty and in some jurisdictions life of a man are at stake and one wrong ruling can completely re-route the course of a trial. Against that backdrop, there are several types of pretrial identifications employed by law enforcement. With respect to lineups, showups, on-the-scene identifications, and photographic or sketch identification, the requirements of due process must also be met before the prior identification may be admitted. The pretrial identification procedure of course may not be suggestive unless required by the exigencies of the circumstances. However admission into evidence of testimony concerning a suggestive identification not required by the exigencies of the circumstances does not violate due process so long as the identification possesses sufficient aspects of reliability so that there is not a very substantial likelihood of misidentification. Factors to be considered in determining reliability include the opportunity of the witness to view the criminal at the time of the crime, the witness' degree of attention, the accuracy of his prior description of the criminal, the level of certainty demonstrated at the confrontation, and the time between the crime and the confrontation. Against these factors is to be weighed the corrupting effect of the suggestive identification itself. ... One type of identification of a prospective defendant, and the least popular, is known as the single show up. Generally, a showup in which a witness views only one suspect has been held to be suggestive. Bratcher v. McCray, 419 F. Supp. 2d 352 (W.D. N.Y. 2006). As a result, this method is generally not preferred. State v. Gibbs, 864 So. 2d 866 (La. Ct. App. 5th Cir. 2003). However, a single man lineup even when requested by the accused has been held to be proper if the procedure is ruled to be reliable and it does not violate due process. U.S. v. McGrath, 89 F. Supp. 2d 569 (E.D. Pa. 2000). A showup may be proper under the following circumstances: where it occurs shortly after the alleged crime1 near the scene of the crime2as the witness' memory is still fresh3, and the suspect has not had time to alter his or her looks or dispose of evidence,4 and the showup may expedite the release of innocent suspects, and enable the police to determine whether to continue searching. State v. Mans field, 343 S.C. 66 (Ct. App. 2000). The jurisdictions are somewhat varied but under some, pretrial showup identification procedures are only permissible under the following circumstances: 1. Where exigent circumstances require it People v. Matthews, 257 A.D.2d 635, 684 N.Y.S.2d 564 (2d Dep't 1999). 2. The suspects are found at or near the crime scene and an immediate viewing may be held. People v. Matthews, 257 A.D.2d 635, 684 N.Y.S.2d 564 (2d Dep't 1999). While some jurisdictions have ruled that exigent circumstances are not required, courts have held that exigent circumstances have not been demonstrated where the suspect was not in direct flight , the witness's life was not in peril and a lineup or photographic lineup were not impracticable. Ex parte

Wednesday, October 16, 2019

ART-opinion paper Essay Example | Topics and Well Written Essays - 500 words

ART-opinion paper - Essay Example The visit to the art gallery was a memorable one, since one could devote sufficient time to browsing and discussing unique aspects about the art pieces with the helpful attendant on duty at that time. Also, since the visit was during afternoon hours, there were few visitors around, and a leisurely viewing was possible. The glass-fronted facade of the gallery permits an exciting view into the interiors, which are well lit with the help of numerous focus lights from the dark ceiling. Inside the gallery, the interiors are designed for displaying art pieces at their best. Backgrounds in pastel shades such as peach walls and surfaces, and sky-blue stands hold Western contemporary and abstract paintings, graphite and pastel drawings, sculptures, photography, raku pottery, bowls, designer jewellery and blown glass art pieces, each unique and distinctive. The eclectic collection of art in several mediums and genres from various sources, artists and craftsmen, is representative of some of the best in creativity from the western world. All the artists associated with the art gallery are local and regional Denver artists who are highly talented, some of whom have been nationally and internationally recognized for their artistic abilities. These original art works are infused with the energy, knowledge and sp irit of the artists whose creative skills are captured as a moment in time. Artists develop their distinctive style or technique over several years of formal and informal training while progressively mastering their craft. The paintings of wild animals in their natural habitats such as a doe and her young fawn, those of nature, country scenes and extraordinary sky-scapes compete for space with urban life depicted through towering sky-scrapers and buildings. All the art works are worthy of gracing any distinguished home, office or other space. The intrinsic value of fine art increases progressively and is a good

Tuesday, October 15, 2019

Analysis of USPS Business Model Essay Example | Topics and Well Written Essays - 2000 words

Analysis of USPS Business Model - Essay Example It is currently employing more than 574,000 workers. It is legally permitted to render service to all the Americans without considering their geographical location. The company is well known for its quality services along with the uniform price. The agency has an access to the letterboxes which are marked as the ‘US Mail’ and also to the personal letterboxes in the country. Services Offered The United States Postal Services offer a wide range of services. It has bulk mail procedures available which provide discounts to the customers. It provides personal mails to the customers. The company also provides inter-departmental details regarding the UALR mails. It provides the services of campus delivery of the mails and state courier services. It provides media mail services to the customers as well. There are some other facilities provided to the customers like the business rely mails, postal money order services etc. Current Position of the Company United States Postal Serv ices is responsible for providing employment to a large number of people in the United States. After the federal government and Walmart, United States Postal Services is the third largest company in respect of providing employment (Bovard, 1985). It operates the largest number of vehicles in the whole world and is known as the largest vehicle fleet. The Department of Defence jointly operates with the United States Postal Services to provide services to the Army and Air Forces (the Army Postal Services) and the Navy (the Fleet Post Services). The two big competitors of USPS are UPS and FedEx. They compete with the company in providing postage delivery services, making urgent deliveries in the domestic land. DHL express was the third largest competitor of USPS until it stopped its operations in the United States in the year 2009. The National Postal Forum held in 2007 revealed that the Postal Service has highlighted and undertaken a large number of initiatives to improve the services and gain a remarkable position in the United States parcel industry. The low price offerings made by USPS is making it easily affordable by the customers. The company generates annual revenue of $73 billion whereas UPS and FedEx have annual revenue of $48 billion and $32 billion. Thus it is in a leading position in the market. Domestic and International Services The United States Postal Services provide domestic as well as international services in the United States. Domestic Services- Domestic services include weekday’s delivery of postal services to any particular customer’s address or Post Office Box or any delivery in the Army and the Military in the United States. It provides express mails which guarantee overnight deliveries to most locations. It is one of the fastest postage services offered by the USPS. There are several other facilities provided to the customers like first class mails, bulk mails, media mails etc. International Services- The United States Post al Services provides various facilities to the customers in order to meet their international shipping needs. The Global Express Guaranteed Service (GEGS) guarantees delivery within three days in more than 190 countries all over the world by FedEx. The First Class Mail Service is the best suitable international service for most of the customers. However, the delivery time in this service depends upon the destination of the delivery. The Express Mail International provides a combination of quick services and affordable prices in almost 185 countries. The delivery time lies within three to five business days. Challenges faced by the Company The delay in the delivery of services was one of the problems faced by the customers. This problem was arising frequently. The company conducted an analysis in

Monday, October 14, 2019

Physical Security Essay Example for Free

Physical Security Essay A six foot fence secures the outer perimeter. Video surveillance is active on the north fence and inactive on the south. A manned guard station permits entrance into the outer perimeter from the west; an unmanned and unlocked gate permits entrance from the east. No Trespassing signs are posted at intervals upon the perimeter fence; Employees Only is posted on the gate. Visitors must obtain a pass at the guard station. The outer perimeter contains the parking lot and office building. The perimeter has two light posts that, when functioning, illuminate the entire parking lot. Currently, the light post on the south side is not functioning. The office building exterior has three outer doors and one window. The first door is marked with an Employees Only sign and requires a badge for access. The second door is the main entrance for visitors and is manned by a guard, who requires a visitor’s pass for admittance. The third door is an emergency exit only and is clearly marked. Any attempt to gain access through the first door without a badge, the second door without a pass, or the third door at all, results in alarm activation and guard response. The window is locked from within; any attempt to gain access through the window also activates the alarm and alerts the guard. The interior of the office building is segmented into two major areas. The first area is the employee workstation; only employees can access this area. Visitor and employees can access the second area. Both the first and second areas are monitored by active video surveillance. The second area has two doors, both of which lead to smaller offices. The first door is unlocked, but is within sight of video surveillance and employees within the work station. A visitor trying to attempt access to this office results in alarm activation. The second door is obscured from both employees and video surveillance and is unlocked. Each office contains valuable assets. Employees can access either office at will. Within the workstation and smaller offices are several computers. Passwords are required for access to each computer. Each employee has a password and can access network information at any time.

Sunday, October 13, 2019

Aristotles Theory Of Ethics And Politics Philosophy Essay

Aristotles Theory Of Ethics And Politics Philosophy Essay How does Aristotle conceive of the nature of good and evil, and how is Aristotles theory of ethics and politics is rooted in his biological and ontological theory? How is Aristotles theory a communitarian theory like that of Macintyre? How does it differ? Ever wonder why as a person you do certain things or why you are feeling a certain way about something? This is something that is a part of life and as curious human beings we tend to want to know the answer to everything. Well, the fact of the matter is that some things just cannot be explained, they just happen for a reason and thats the way they are made. There are particular events that make us feel a certain way, and we may have different moods toward others. This explanation, in a small couple of words, is called Human Nature. Human nature is a concept of having certain characteristics; these characteristics included thinking, and feeling all the things that normal humans would have in common. We cant explain why humans feel or do certain things, all we can say is that human nature is a sociological way of thing. Aristotle believes that in Human Nature there is good and evilà ¢Ã¢â€š ¬Ã‚ ¦.. Aristotle believes that if a man does not enjoy doing good acts then he in fact not a good man at all. First, he must know what he is doing, and he must have an understanding of the act that he is doing. Secondly, according to his own personality he must choose to act a certain way on whatever it is that he is doing and he must do this for himself only and no one else. It is our contention that people may perform just acts without actually being just men, as in the case of people who do what has been laid down by the laws but do so either involuntarily or through ignorance or for an ulterior motive, and not for the sake of performing just acts. Aristotles reasons about humanity are most odd, but it is also something that we were meant to achieve according to him. Aristotle mentioned that the idea that human nature was meant or intended to be something, has become much less popular in these more modern times. You are either naturally developed to be good or evil in Aristotles mind and there is no in between. Aristotles ethical theory is a theory that comes from the theoretical sciences. Its methodology must match its subject matter-good action-and must respect the fact that in this field many generalizations hold only for the most part. We study ethics in order to improve our lives, the way we live and how we live is a main factor of ethics and therefore its principal concern of the nature of human well-being. He regards the ethical virtues as complex rational, emotional and social skills. He also believed that an organism or natural whole cannot be fully understood unless it has a purpose. He says that the general purpose of any organism is growth towards a mature statue. If this is true, than it is human nature to be greedy.(Im not sure where you get this from; it is not clear that greed contributes to the mature state of a human being; further, given this idea of maturity, how is good different from evil) This may be why humans are ether good or evil. Without looking toward becoming a more powerful state, then there is no need to become greedy. A communitarian idea is based on the ideal of the common good. Aristotle distinguishes between varieties of justice. He first tells the difference of justice as a whole and justice as just partial. In some sense, justice is understood as what is lawful, and the just person is equal to the moral person who follows the rules. Justice is understood as what is fair or equal, and the just person is one who takes only a proper share. Aristotle focuses his discussion on justice as a part of virtue. Each of these justices can be understood and concerned with achieving equality. Macintyre mentions that the forms of liberalism do not fail because the rules define that right action cannot be adequately grounded apart from a conception of the good. For this reason, Macintyre claims, some version of a communitarian theory of justice that grounds rules supporting right action in a complete conception of good can ever hope to be adequate. Aristotles thoughts of good are different from MacIntyres because MacIntyre believes that a good thing is not totally solid. In other words, you can be good in one situation, but the same action may not be good in another, regardless of what the rules are. Aristotle based justice in following the rules, in other words, if the law says it, and you break the law, than you have become unjust.(This distinction is not useful; both Aristotle and MacIntyre respect prudential judgment in differing contexts. Think of this, does MacIntyre have a doctrine of nature like Aristotles? What takes natures place in his doctrine?) Good and evil are left up to the eyes of the beholder. If a man psychologically thinks that if something is good, then it may be good, regardless of the social norms.(This is neither MacIntyre nor Aristotle; it is relativism) This can look strange to other people, who may base good and evil off of a social norm. Whether it is Aristotles ideas or MacIntyres ideas, good is what you truly make of it, and in the end, it is up to you to choose what is good and evil.

Saturday, October 12, 2019

The Oppressing Face Of Madness In The Mirror Of Society :: essays research papers fc

The Oppressing Face of Madness in the Mirror of Society For centuries women in life and literature were often portrayed as submissive, docile, and obedient to men. Focusing primarily on the nineteenth century, literature of the period often characterized women as victims oppressed by society, culture, as well as by the male influences in their lives. Many of the female characters suffered the effects of isolation brought on by constant oppression and subservience driving them insane and mad. The views of women in early literature were often silenced and their opinion’s disregarded by a dominant patriarchal society. One could argue that the men’s influence on society forged the distinctions between sanity and madness. This obsessive position to shape reality proved to be unhealthy and destructive but it was rarely acknowledged among the company of men. A Spanish writer Miguel de Cervantes (1547-1616) once quoted, â€Å"Too much sanity may be madness, and maddest of all, to see life as it is and not as it should be!† (h ttp://www.quoteworld.org.) Madness even though taboo and troublesome, seemed common in many female literary protagonists of the period. Thus far in the course we encountered the role of madness in such literary works as â€Å"The Story of an Hour,† and â€Å"The Yellow Wallpaper.† The role of madness and oppression in the works can be better examined in three aspects of: the causes of the induced madness, how each female character deals with the insanity, and how the similarities in madness link the texts to common social issues. The conclusion will show the significant roles madness and oppression played in the selected fictional stories echoing the real life torment women lived in. Speaking in an aesthetic tone, one will see that though the Yellow Wallpaper and The Story of an Hour are similar, however, tale by Gilman proves to be a better argument for portraying the role of maddens and oppression as a mirror of society of the time period.   Ã‚  Ã‚  Ã‚  Ã‚  Few works in fictional literature embody the portrayal and effects of madness better than Charlotte Perkins Gilman’s â€Å"The Yellow Wallpaper.† Readers are presented with the tale of a woman suffering from a mental illness whose problems are compounded by the imprisonment she must endure. Set in a similar time period as the already discussed works, many of the same isolation and autonomy issues reside behind the conflict of Gilman’s narrative. The story presents the madness associated with the oppression of women during the era coupled with the unforgiving patriarchal view of society.

Friday, October 11, 2019

Domestic Terrorism In The United States Essay

To varying degrees, domestic terrorism has survived and affected the social and political structure of the United States. As defined by the country’s Department of Justice, these words connote â€Å"the unlawful use of force or violence, committed by a group(s) of two or more individuals, against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives† (U. S. Department of Justice, 1994, p. 26). Though such characterization is considerably clear in its meaning, oftentimes a case-by-case interpretation is necessary to ascertain where extremism ends and terrorism begins. Terrorism vs. Extremism A more concise demarcation between extremism and terrorism is evident in the recognition that extremism is not unusual in any political environment, and is more often than not directed by societal pressures, civil discourse, education and the law. On the other hand, in terrorism, the violence is far beyond control by civil, educational or societal elements and must be tracked down, penalized and castigated by law enforcement agencies. The Dictionary of Political Thought defines extremism as â€Å"a vague term, that can mean a) the taking of a political idea to its limits, regardless of unfortunate repercussions, impracticalities, arguments and feelings to the contrary and with the intention not only to confront but also to eliminate opposition; b) intolerance towards all views other than one’s own; and c) the adoption of means to political ends which show disregard for the life, liberty and human rights of others† (Scronton, 1982). The complexity of separating terrorism and extremism is that in various situations, domestic groups which are seemingly law-abiding at present, may be contemplating of violent actions in the future. As it is, many violent groups started as non-violent discussion or protest movements with very lofty ideals; however, as time elapsed they evolved into something else. Benjamin Netanyahu, Israeli Ambassador to the United Nations, provides a suitable and a more fitting characterization of terrorism when he described it as â€Å"the deliberate and systematic murder, maiming and menacing of the innocent to inspire fear for political ends. † USA Patriot Act Section 802 of the USA PATRIOT Act stretched the definition of terrorism to include domestic in contrast to international terrorism. An individual is said to be involved in domestic terrorism if he/she does an act that is dangerous to human life, that is a violation of the criminal laws of a state or the United States, and if the act appears to be intended to a) intimidate or coerce a civilian population; b) influence the policy of a government by intimidation or coercion; or c) to affect the conduct of a government by mass destruction, assassination or kidnapping. Further, the acts have to take place chiefly within the territorial jurisdiction of the United States and if they do not, then these acts can already be regarded as international terrorism. Clearly, Section 802 does not create a new crime of domestic terrorism. Nonetheless, it does extend the kinds or the nature of actions that the government can examine and probe into when it is investigating terrorism. The USA Patriot Act stretched out the powers of the government when they do their investigations and some of these powers are applicable to domestic terrorism. Such definition of domestic terrorism is expansive enough to cover the actions and activities of many known activist campaigns and organizations. Greenpeace, Operation Rescue, Vieques Island and WTO protesters and the Environmental Liberation Front have all recently engaged in activities that could make them subject to investigations as engaging in domestic terrorism. Contemporary Domestic Terrorism Though governments, private and public institutions have been beleaguered and weighed down by terrorism for hundreds of years in one form or another, the strategies and the application associated with it have changed and progressed as surely as the societies upon which it is imposed. Technological advances in the transportation, communication and in the area of weaponry have permitted the capacities of current domestic terrorist groups to get their message out and have enhanced their ability to take aggressive and sadistic action to achieve their objectives. President Clinton launched a counter-terrorism bill to the Senate and House of Representatives in February of 1995. One exceedingly contentious proposal in the bill is the assigning of the Department of Defense a dominant role in assisting the investigation of domestic terrorism incidents in which chemical and biological agents are utilized. Currently, the military can be used in cases of terrorist activities where there is an alleged employment of nuclear weapons or devices and much more if such allegation has been established (Hall, 1995, Sec A). Though the amplified role of the military would be limited, necessitating a further amendment to the Posse Comitatus Act of 1878, civil liberties experts cautioned that it would infringe the tenets of civil supremacy over the military and would only rekindle the hostilities and anti-government sentiments of the citizen-militias and conspiracy theorists (Landay, 1995). Furthermore, several Congressmen, law-enforcement officials and some military advisers concur that such employment of the military would be an exceedingly precarious approach in combating domestic terrorism. Senator Daniel Patrick Moynihan, a Democrat from New York, responded to questions as to whether the use of the military, in an expanded role, should be a part of the counterterrorism package, said, â€Å". . . the military defends the nation and does not involve itself in internal affairs† (Minzesheimer, 1995, Sec A). Incidents and Implications There has been an evident and persistent decline in the number of terrorist incidents in the United States during the past twenty years. To further delineate the trend of decline over time, a comparison of the average number of incidents per year during each of three, six-year periods would be useful. During the six year period from 1977 through 1982, there was an average of 59. 0 incidents/year; from 1983 through 1988 an average of 15. 7 incidents/year were recorded; this compared to an average of 5. 3 incidents/year investigated during the period from 1989 through 1994 (FBI, 1994). *** ACTIVE GROUPS OPERATING WITHIN THE UNITED STATES CLASSIFIED AS TERRORISTS African National Prison Organization (ANPO). An arm of the African Peoples Socialist Party. Animal Rights. Principally against use of animals for any purpose beyond their natural existence. Armed Resistance Group (ARG) aka Revolutionary Fighting Group, Red Guerrilla Faction. This group has been characterized in 1988 as â€Å"tired and aging revolutionaries. † Greenpeace Principally environmental-use extremists. Ku Klux Klan (KKK). Reorganized and relocated several arms of its group in 1989. Macheteros. Puerto Rican nationalists. Ohio Seven. People for the Ethical Treatment of Animals (PETA). Very public-relations oriented. Radical Feminist Organizing Committee (RFOC). Driven-out of the feminist movement in 1989, operating independently. RAMBOC (Restore a More Benevolent Order Coalition). Targets and actively pursues the US assets and people of foreign groups with terrorist links, such as the PLO, SWAPO, ANC, etc†¦ Rolling Thunder aka American Foundation for Accountability; primary focus is to draw attention to the POW/MIA issue from Vietnam War. Satanic Cult. Associated with attempted bombing of churches and kidnapping, and animal sacrifices, tombstone vandalism, and miscellaneous actions. Skinheads (SKA). Groups consist of both racist and anti-racist factions. SS Action Group. Principally anti-Semitic. Apparent Motivation There are principally four classifications into which groups that are regarded as domestic terrorists can be distinguished currently existing in the United States. These groups can be generically delineated as being either motivated by religious convictions, racial prejudice and supremacist goals, anarchistic/anti-government/politically motivated, or in pursuit of unique special interests. These classifications have been extracted from a collection of the categorization and delineation of extremist and terrorist groups by two respected subject-authorities, Stephen Segaller and FBI’s Department of Justice. Segaller, in his book Invisible Armies, classified domestic terrorism in the United States into four groups as well, but lists them as being: a) Cuban infighting (political), b) â€Å"backwoods terrorism† (a combination of religious, racist and anarchistic), c) violent Puerto Rican independence groups (political), and d) a handful of domestic revolutionary Marxist groups (anarchistic/anti-government and racist) (Segaller, 1987, pp. 221-225). Theoretically speaking, the stimulus for the creation and sustained existence of extremist and terrorist groups can unequivocally be associated in many circumstances to ethnic, cultural, religious, and racial feelings of superiority. An accurate depiction of the continuum formed by these supremacist attitudes, and how they promote further tension is succinctly articulated by Frank G. McGuire, when he said that as long as Christians feel superior to Jews (or vice-versa) and Catholics feel superior to Protestants and Ashkenazic Jews feel superior to Sephardic Jews, men feel superior to women and whites feel superior to blacks/browns/yellows/reds and so on, such phenomenon will be with us (McGuire, 1990, p. 10). These cultural, racial, gender, and a myriad of other differences that are present among people in society, particularly one as diverse as the United States of America, must be acknowledged and respected, but shouldn’t be seen or considered as a encumbrance to peace and harmony within society. Nor should these diversities be seen as wholly benign in their impact on the functioning of society as a whole. Tibor Machan, a social and political commentator, showed a well-timed dissertation on the myths and erroneous beliefs associated with viewing multiculturalism as simply a difference in dress, music, dance, and customs. Dr. Machan asserted that cultural differences, whether a result of race, gender, religion, or whatever, impacts both negatively and positively on other cultures within the society (Machan, 1996, pp. 134-135) and further opined that attitudes of cultural-superiority and intolerance are directly related and incorporated into many of the extremist views and motivations that are plaguing America today. The period from 1982 through 1994 showed that the targets of domestic terrorism were predominately commercial establishments. The majority of incidents directed against commercial establishments were conducted by animal-rights and/or anti-abortion extremists, either attacking stores that sold fur, or clinics that performed abortions or provided abortion advice, respectively (FBI, 1994; McGuire, 1990). Religious & Racial Supremacy/Intolerance Religious intolerance founded upon fundamentalist standpoints has been the stimulus for acts of terrorism all throughout history and such as involved Orthodox Jews, Moslems, Catholics, and Protestants. Perhaps, there is no issue or idea among human beings that is as provocative and as seditious as that of religious beliefs. Auspiciously, at least as far as the United States is concerned, terror stimulated by religious intolerance has not been as significant a threat as in other parts of the world like in Africa, the Middle East or Bosnia. â€Å"America is a unique nation in that it guarantees the freedom of religion with the First Amendment and the right to [keep and] bear arms with the Second Amendment. This means that people can believe whatever they want, and they can buy the guns to protect that belief† (LeBaron, n. d). The statement was made in direct reference to Mormon fundamentalism and summarizes the very ideology upon which this country was founded which also provides an insight into the potential dangers that exist with religious extremist groups. Recently however, there has been rhetoric and open threats of aggression from different extremist groups that describe themselves as being inspired by religion, nonetheless, have undisputedly displayed racial supremacist and hate-mongering views. The leader of the Nation of Islam, Louis Farrakhan, advocates sundry rhetoric of black supremacist views and religious fervor. He professes to have the faith and devotion of some four million people (Fletcher, 1996). In addition, several white-supremacist clusters, including some of the many Christian militia splinter groups, advocate exceptionally caustic and hate-filled threats as well, apparently an endless, ages-old game of â€Å"I call you a name, you call me a name. † Oddly enough, two racial supremacist groups representing opposite extremes, the Nation of Islam and the Posse Comitatus, have concurred to an ultimate end-state segregation of the United States into regions of pure racial integrity. Another group operating within the United States that has historically merged a racist agenda with religious rhetoric, and was truly very sadistic in its actions and objectives, is the Ku Klux Klan. They have, however, considerably lessened in both their membership numbers and invisible power-base in recent years, and though there are still very strident individuals appearing from time to time, the danger posed by the Klan nowadays is essentially restricted to local regions, and their activities are in the form of parades and rallies. As the Klan has faded in its activities and numbers, it has been replaced by the tremendously vicious and rapidly growing racist movement known as the Aryan Nations, which is strongly associated with the Identity Church that proclaims Anglo-Saxons as God’s chosen people. The fundamentalist Mormons are another religiously-motivated cluster within the United States that are catching the attention and concern of law enforcement and other government officials. This group has been at odds, to a certain degree, with the government since its creation in the early 1800s. Many of these fundamentalist Mormons are well-armed conspiracy-minded survivalists, who have retreated to the mountains of central Utah to await Armageddon, which they believe will occur on April 6, 2000. Believing in their gifts of prophecy and revelation, and fired-up by heavenly visions and doctrines of blood atonement and oaths of vengeance, they have isolated themselves awaiting the end of the world and fearing that the government is about to take away their freedoms (LeBaron, n. d. ). A specifically insightful yet explosive issue to a huge section of the American people, despite individual beliefs, is the classification of particular abortion clinic-related hostility as domestic terrorism. The Freedom of Access to Clinic Entrances (FACE) Act of 1994 in concurrence with the Attorney General Guidelines (AGG) on General Crimes, Racketeering Enterprise and Domestic Security/Terrorism Investigations, instigated and directed the creation of the Department of Justice Task Force on Violence Against Abortion Providers to look into conspiratorial acts of violence against abortion clinics and personnel as domestic terrorism (FBI, 1994). Although personal opinions on the ethical aspects associated with abortion, whether for or against, are not wholly confined to religious beliefs, the most articulate, open and visible anti-abortion advocates are directly allied with religious organizations. As it is, abortion rights and issues persist to be one of the most contentious and conflict-ridden questions among Americans and motivate exceedingly passionate and rousing rhetoric and reactions from people from both sides of the matter. In the period between 1982 and the end of 1984, there were a total of 220 separate acts of violence, including 89 cases of bombing, arson and other serious incidents, conducted against clinics where abortions were performed or abortion-advice offered (Segaller, 1987, pp. 222-223). Ethnically and racially stimulated bias, extreme loathing and carnage are as much a part of human history as any other characteristics of mankind, and have at least to some extent have a bearing on the cultural and social identities of essentially all civilizations to date. From the subjugation of Hebrews by ancient Egyptians, to present-day current situation in the Balkans, racial and ethnic differences have triggered incalculable suffering and death. The history of racial and ethnic turmoil in the United States is no different, and is seemingly experiencing an increase in such activity recently. Racially-motivated extremist and terrorist groups in the United States, especially those of today, seem to employ religious rationalizations and teachings for their sadistic tendencies and aggressive actions, and all indications point to the fact that such trend will continue at an accelerating rate into the foreseeable future. Anarchistic/Anti-government /Political Terrorist clusters of today that are actually anarchist, anti-government or political in their motivations are mostly associated with the growing self-determination, radical citizen-militia movements, or have been around a relatively long time, such as the Puerto Rican freedom fighters. The former has drawn considerable attention, and extracted wary concern from law-enforcement and civil-rights groups due to the bombing in Oklahoma City, and their rapid and continuing growth in numbers and visibility. A few of the more extreme citizen-militia groups, often motivated by New World Order conspiracy theorists and anger over a belief that government has become too large and repressive in everyday life, are openly soliciting and calling for the overthrow of the United States government. These groups, when linked with the self-described â€Å"Constitutionalists,† are being considered as extremely dangerous by many law-enforcement and watchdog groups (Knickerbocker, 1995). The Puerto Rican terrorist groups have been almost exclusively limited in their actions to operating within Puerto Rico against local and federal targets of opportunity. Unique Special Interests Within this designation of domestic terrorist groups are those of relatively recent creation, or at least they have relatively recently gained high public visibility through their actions. Groups such as the extremist animal-rights groups, environmental extremist groups and homosexual-rights groups, including People for the Ethical Treatment of Animals (PETA), Earth Night Action Group, and Act Up, respectively, have emerged within the past two decades and have actively used violence, destruction and intimidation to gain recognition, and to further their respective political agendas. References *** McGuire, Frank. 1990. Security intelligence sourcebook: Who’s Who in terrorism. Silver Spring, MD. : Interests, Ltd. U. S. Department of Justice. 1994. Terrorism in the United States, 1994. Washington, DC. : National Security Division, Federal Bureau of Investigation, Terrorist Research and Analytical Center Scronton, R. 1982. Dictionary of Political Thought. New York: Hill and Wang Hall, M. 1995. â€Å"Clinton’s Military Police Plan Under Fire. † USA Today, 11 May Sec. 5A. Landay, J. S. 1995. â€Å"Tempering Terrorism. † The Christian Science Monitor, 8 May Sec. US. Minzesheimer, B. 1995. â€Å"Terrorism Bill Warning: Go Slow. † USA Today, 1 May Sec. 5A. Federal Bureau of Investigation. 1994. Terrorism in the United States 1982 – 1992; Terrorism in the United States 1994. Segaller, S. 1987. Invisible armies, terrorism into the 1990s. New York: Harcourt Brace Jovanovich Machan, T. 1996. â€Å"Fallacies of Uncritical Multiculturalism. † The Freeman, vol. 46, no. 3, pp. 134-135. LeBaron, G. Jr. â€Å"Mormon Fundamentalism and Violence: A Historical Analysis available at http://www. tcd. net/~garn/ polygamy. html>. Fletcher, M. A. 1996. â€Å"Farrakhan Vows to Take Libya’s Aid. † Washington Post, 26 February, Sec. A1. Knickerbocker, B. 1995. â€Å"US Militias: The Dark Side of Frontier Independence. † The Christian Science Monitor, 24 April, Sec. NATIONAL.

Thursday, October 10, 2019

Effects of Domestic Violence on Children Essay

Domestic violence is a devastating social problem that impacts every segment of the population. While system responses are primarily targeted toward adult victims of abuse, increased attention is now being focused on the children who witness domestic violence. Studies estimate that 10 to 20 percent of children are at risk for exposure to domestic violence (Carlson, 2000). These findings translate into approximately 3.3 to 10 million children who witness the abuse of a parent or adult caregiver each year (Carlson, 1984; Straus and Gelles, 1990). Research also indicates children exposed to domestic violence are at an increased risk of being abused or neglected. A majority of studies reveal there are adult and child victims in 30 to 60 percent of families experiencing domestic violence (Appel and Holden, 1998; Edleson, 1999; Jaffe and Wolfe, 1990). The main focus of the study is to look at the impacts of domestic violence on the upbringing and well-fare of children who find themselves in homes and families were domestic violence is predominant taking into consideration that children in homes where domestic violence occurs may â€Å"indirectly† receive injuries. They may be hurt when household items are thrown or weapons are used. Infants may be injured if being held by the mother when the batterer strikes out; also, many children in homes where domestic violence occurs have difficulties in school, including problems with concentration, poor academic performance, difficulty with peer interactions, and more absences from school. More so, children may become withdrawn, non-verbal, and exhibit regressed behaviors such as clinging and whining. Eating and sleeping difficulty, concentration problems, generalized anxiety, and physical complaints (such as headaches) are all common. Finally, through violence in the home, children may suffer emotional and psychological damage. The very young may show physical signs of distress such as bedwetting, stomach-aches and disturbed sleep. Older children can become withdrawn or exhibit extreme behaviour, such as misusing alcohol or drugs. Therefore, the type of research to be used for the above topic will be the â€Å"descriptive and analytical research† this is because one has to only describe what is has happened or is happening concerning a particular situation and with regards to analytical research, the methods of research utilized in descriptive research are survey methods of all kinds, including comparative and correlational methods. In analytical research, on the other hand, the researcher has to use facts or information already available, and analyze these to make a critical evaluation of the material. The research seeks to know if there is a direct impact on children’s well-being as a result of domestic violence from their parents, guardians and other family relatives. Specific objectives †¢ To know the behavioral, social, and emotional problems faced by children who find themselves in homes were domestic violence is recurrent. †¢ to know the value parents attach to the psychological well-being of their children †¢ To examine platforms to sensitize and educate parents and guardians on the need to avoid acts of domestic violence in the presence of their children. Parents are the most important social agents on children’s upbringing, care and control. They are directly involved with their well-being as well as the sound state of mind at all times. Domestic violence therefore affects children. All children are affected emotionally by witnessing violence. Children who witness regular acts of domestic violence have greater emotional and behavioral problems than other children. Some of the immediate effects may include nightmares, anxiety, withdrawal and bedwetting. (Aron, L. Y. and Olson, K. K. 1997) Believe the historical inequality of women and gender socialization of females and males contribute to the root causes of domestic violence. Until the 1970’s, women who were raped or suffered violence in their homes had no formal place to go for help or support. Shelters and services for victims of domestic violence did not exist and there was little, if any, response from criminal or civil courts, law enforcement, hospitals, and social service agencies. Society and its formal institutions viewed domestic violence as a â€Å"private matter.† In Cameroon it is estimated that more than three women a day are murdered by their husbands or boyfriends and women experience two million injuries from intimate partner violence each year. Many of these women are mothers who often go to great and courageous lengths to protect their children from abusive partners. In fact, research has shown that the non-abusing parent is often the strongest protective factor in the lives of children who are exposed to domestic violence. However, growing up in a violent home may be a terrifying and traumatic experience that can affect every aspect of a child’s life, growth and development. In spite of this, we know that when properly identified and addressed, the effects of domestic violence on children can be mitigated. (Henriette Ekwe Ebongo 2011) Studies have shown that more than 700 children live in families in which partner violence occurred at least once in the past year, and 500 children live in families in which severe partner violence occurred. It is also estimated that; for every hour, as many as 115 children are abused, 90% of children from violent homes witness their fathers beating their mothers, 63% of all boys, age 11-20, who commit murder, kill the man who was abusing their mother, Daughters of abused women are six times more likely to be sexually abused as girls from non-abusive families, Child victims of severe violence have two to four times higher rates of trouble-making friends, temper tantrums, failing grades in school, having problems in school and at home and finally, Children in homes where violence occurs are physically abused or neglected at. a rate 1500% Children’s risk levels and reactions to domestic violence exist on a continuum where some children demonstrate enormous resiliency while others show signs of significant maladaptive adjustment (Carlson, 2000; Edleson, 1999; Hughes, Graham-Bermann & Gruber, 2001). Protective factors, such as social competence, intelligence, high self-esteem, outgoing temperament, strong sibling and peer relationships, and a supportive relationship with an adult, can help protect children from the adverse affects of exposure to domestic violence. Many theories have existed over time to attempt to grasp the reasons for domestic violence in human society. This analysis of violence ranges from the macro level (wars, government, repression, etc) to acts between the couple and the individual. Such efforts to define violence, particularly partner violence which integrates complex interrelations of gender and sexuality need to be investigated within the context of their respective societies. Here are two examples of theories that have been used to explain the effects of domestic violence. 1. Feminist Theory There are many different ideas within feminist theory of domestic violence, but in Feminist Perspectives on Wife Abuse they have identified four common strains. These are:- 1 that as the dominant class, men have differential access to material and symbolic resources and women are devalued as secondary and inferior 2 intimate partner abuse is a predictable and common dimension of normal family life 3 women’s experiences are often defined as inferior because male domination influences all aspects of life 4 the feminist perspective is dedicated to advocacy for women. 2. Traumatic Bonding Theory: This theory seeks to explain why women remain with men who beat them. Two features have been recognized: the existence of a power imbalance within the relationship, so that the batterer perceives him or herself as dominating the other, and the intermittent nature of the abuse. This theory postulates that as these power relationships polarize over time, the powerless individual in the relationship becomes increasingly dependent on the dominator. In addition, moments in between abuse are times when positive displays of love and affection cement the legitimacy of the relationship.