Monday, September 30, 2019

Literary Analysis of Night

The Holocaust changed the lives of many people and survivors and had many adverse effects. Some began to question their faith in their beliefs and even questioned their god. They pondered upon the thought of how God could sit idly by and allow the atrocious actions committed within their own homeland be unjustified. Those that survived have many terrifying stories to tell. Many survivors are too frightened to tell their story because their experiences are too lurid to express in words or even comprehend. One of Wiesel's main objectives in writing Night is to remind readers that the Holocaust occurred, and hopes that it will never happen again. Night themes include the inhumanity of humans toward others and how death can cause potent harm to one’s psyche. In Night, Elie Wiesel uses many literary devices such as Tone, Imagery, and Repetition to portray the acts of death and inhumanity as well as their traumatizing effects. Elie Wiesel uses repetition to clearly state and emphasize what he has endured and shall never falter or be forgotten but shall always linger within the confines of his forever scarred conscience. Never shall I forget that night, the first night in camp, which has turned my life into one long night, seven times cursed and seven times sealed. Never shall I forget that smoke. Never shall I forget the little faces of the children, whose bodies I saw turned into wreaths of Ingles 2 Smoke beneath a silent blue sky. Never shall I forget those flames which consumed m y faith forever. Never shall I forget that nocturnal silence which deprived me, for all eternity, of the desire to live. Never shall I forget those moments which murdered my God and my soul and turned my dreams to dust. Never shall I forget these things, even if I am condemned to live as long as God Himself. Never. † (Pg. 32) This quote displays not only the horrifying acts that were committed but the effects it had on the author’s conscience. Also, notice that Eliezer states that his God was murdered. â€Å"For the first time, I felt revolt rise up in me. Why should I bless His name? The Eternal, Lord of the Universe, the All-Powerful and Terrible, was silent. †(Pg. 31) But in the final line Eliezer acknowledges him as God. Despite saying his God was murdered, it is clear that Eliezer is actually struggling with his faith and his God. Just as he is never able to forget the horror of that night, he is never able to reject completely disdain his religion. Elie Wiesel uses imagery to depict explicitly what happened within the concentration camps. The imagery used in Night also gave the readers a sense of what Eliezer endured and the many horrors he encountered during his time spent within the camps. â€Å"Babies were thrown into the air and the machine gunners used them as targets† (Pg. 4)

Sunday, September 29, 2019

Fermentaion

Dilution is achieved by controlling the flow of process water from the dilution tank TUB 1201 into the mixer GAL. 1230. Process water flow rate is controlled to achieve the desired density of the mixed solution. The now diluted C-molasses solution flows into the vapor condensate EAI 1204, where it is preheated by the condensing hot water vapor from the flash tank TUB 1203. The solution is preheated to about 75 to ICC. The preheated solution flows into the hydrothermal GAL. 1231 where the temperature s increased to between 85 to ICC, using the 7 – lobar saturated steam as a heating medium.The then heated solution enters the cyclone IF 210. The cyclone is responsible for removing solid purities that may be present in the concentrated C- molasses. The discharge valve on the cyclone will open periodically to dislodge the cyclone. The diluted, heated and now ‘cleaned' C-molasses then flows into the intermediate/ Buffer Tank TUB 1202. The tank is equipped with a level indicato r control that controls the flow out of this tank maintaining a desired level set point. The stream is then pumped out into the second hydro heater GLOBAL where the temperature is increased to between 121 to ICC, using the 7 – lobar saturated steam.The hydro heater GAL. 1232 is equipped with highly delicate temperature indicator controller; this temperature control is a Critical Control Point. When the temperature drops below ICC, the sterilizer will go into recirculation and will stop feeding forward to the sterile tanks. This is designed to prevent Coli and C. Botulism to enter the sterile tanks. These are harmful micro-organisms that are not suitable to fermentation and human consumption. The heated solution then flows through the retention coils and into flash tank TUB 1203. The flow through the retention coils is controlled at a backslappers of kappa.The coils are interchangeable since there are two coils, one online and the other on standby. The flash tank is kept under vacuum – 35 to -kappa by using the vacuum system. The flash tank TUB 1203 is protected from over-pressuring by pressure relief valve installed into the vacuum system. The vapor leaving the flash tank is condensed by incoming diluted C-molasses in EAI 1240 and forming condensate that flows to the inch separator vessel. This separator easel separates liquid from vapor and also forms a barometric seal into the seal pot. L.DEVELOP DIAGNOSTIC TOOL FOR THE EFFICIENT OPERATION OF THE PLANT/ SECTION OF PLANT UNDER CONSIDERATION. The diagnostic tool for the efficient operation is a system developed for better and safe way of operating a system. These processes include daily maintenance to ensure that a system is performing at its best. There a programs that is designed for each operation of the plant to maintain stability and safety operation through monitoring. There are alarms installed in the plant to alarm operators of deviation from normal operation of the plant.Deviations can b e of process out of specification and danger alarms of hazards in the plant. At Anchor Yeast Durban the company has a dedicated and well developed system of monitoring deviation throughout the plant operation for the efficient operation. There are DOCS and software such as Aurora. Aurora is used for daily operation maintenance and keeping records of the plant operation. Without these systems the plant will be a danger to employees and the surrounding environment. These tools assist in managing and implementing efficient ways of operation of the plant.With the tools it is possible to determine and strategies the optimal peak operation for the plant in the next hour of operation and for the 24 hour of operation. They provide demand response strategy for emergency situations, such as extreme unwanted condition of the plant operation. With these the company always adheres to maintains high standard of delivery to its customers, through meeting schedule timing for the production and safe ty and cost efficient way of saving energy. Fault Tree Analysis is a broadly used deductive method for the efficient operation of the plant in designs and daily operations to minimize costF. HAZARD AND OPERABILITY STUDY (HAZARD) OF THE PROCESS OR PART OF THE PROCESS UNDER CONSIDERATION. Hazard and Operability study is the method in which a multi – discipline team performs a systematic study of a process to identify hazard and problems which prevents efficient operation. The technique is applied to new plant development and existing Operations for better and safe Operation. The method is also applied to continuous and batch process. The study provides opportunities to engineers to let their imaginations go free and think of all possible ways in which a hazard or operating problems might arise.Engineers have to ask themselves the following questions when performing HAZED study: What can go wrong? This is the first and most important stage in any hazard study, is to identify the most important things that can go wrong and produce accidents or operating problems. What will be the consequences? Engineers need to know the consequences to employees, members of the public (community), plant and profits, now and in the long term. How can it be prevented? – Safeguard Engineers need to administer controls that will prevent accidents from occurring, or make them less probable and protect people from the consequences.What should be done? – Solution At this stage engineers weigh their options to resolving the accidents, by comparing the risk (that is, the probability times the consequences) with generally accepted codes and standards or with other risk around them. Is it worth the cost? Engineers should compare the cost of prevention with the cost of the accident to see if the remedy (solution) is reasonably practical or they should look for a cheaper but efficient solution. Prevention At this point engineers have come up with a solution but before comm encing to put the solution in motion they should assess their solution, I. Perhaps their method of prevention has disadvantages and better methods of prevention should be suggested. Figure 1: Hazed Procedure [Figure 2. 1, Peg. 9: Hazed and Hazard Identifying and Assessing Process Industry Hazards, Tremor Klutz 3rd Edition] P. PROBLEM SOLUTION TO A CUSTOMER REQUEST (TECHNICAL REPORT) Unhappy customers are bad news for the company and the business. It takes one unhappy customer to steer away prospective customers away from the company. Unhappy customers have their reasons. Some customers have unrealistic expectations and some they Just don't feel well with the business.We must be hones some customers complaint are legitimate and realistic and we as the suppliers we must attend to their complainants with honesty and integrity to build on good customer relationship. Whatever the cause, unhappy customers are our hope for future business and we want them happy again for the business. Cust omer may not always be right but he or she will always be the customer we want and need. So we need to take care of our customer and take control of their complaints and them to our own advantage. There are seven (7) steps in resolving customer complaint which eave proven to work well. . Listen Intently: Listen to customer and do not interrupt while telling you a complaint. They need to tell their story and feel that they have been heard. 2. Thank Them: Thank the customer for bring the problem to your attention. You cannot resolve a problem that you do not have full details about or solve it on assumptions. 3. Apologies: Sincerely convey to your customer and apology. This is not the time to make Justification and making excuses. You apologies, that's it. 4. Seek the Best Solution: Determine what the customer is seeking as a solution, Ask the customer. Reach Agreement: Seek to agree to the solution that will resolve the problem to their satisfaction. 6. Take Quick Action: Act on the problem with a sense of urgency. Customer will respond positively to your focus on helping them immediately. 7. Follow Up: Follow up to make sure that the customer is completely satisfied. TYPICAL CUSTOMER REQUEST AND SOLUTION At anchor yeast we have customers all over the country and across the border. Customer happiness is very valuable to the company and any complaint is attended with urgency and caution.As one of largest yeast making company in South African, e are always under pressure to deliver on time and meet our customer wants and needs, and still performing to our utmost in producing high quality yeast. There are trucks coming in the plant to collect cream yeast and deliver to customers. One of the company that we always work with very closely is Anchor Yeast Johannesburg were most of the cream yeast produced at Anchor Yeast Durban is transported to, for further applications. There are Unitarians coming on daily basis to collect the product.Delays are very stressing the r elationship between the two companies. The Unitarians ruckus come from Johannesburg Debug) with molasses to Durban Anchor Yeast. The molasses is a raw material that is used to make yeast. When the trucks come on site they first have to go to the company's weighbridge before being offloaded. After being weighed the truck is offloaded either Tank offloading point or at the HTML offloading point. Offloading of the truck takes three (3) hours maximum then truck goes back to be weighed. After the truck has been weighed, it goes to the CHIP (Clean In Place) point to be Caped.Coping is a process where the truck is being clean using chlorinated water and Caustic. This process takes one hour (1 her). After the CHIP the truck is ready to be loaded with cream yeast. The loading process takes one hour (1 her). Then after that the truck is ready to go back to Judder with the product. Customer Complaint: Unitarians tankers are taking to long at Anchor Yeast Durban to turn around back to Anchor Ju dder. Possible causes of delays: At Anchor Yeast Durban there are three companies that come on site to deliver molasses.The Subs Hertz Borders Trucks (GHB) and Gridiron Terminal Trucks and local delivery trucks that that transports cream yeast to Durban based customers ND other customers across the country. When the Unitarians trucks from Judder comes onsite to deliver molasses there are always trucks waiting, loading or offloading molasses. There are only two offloading points at the company. Unitarians have to wait for other trucks which came before to finish offloading and loading. The trucks can sometimes wait for over three hours depending on the number of trucks offloading. Sometimes production of cream yeast is very slow.That means every time the trucks arrives onsite to collect cream yeast, they wait because not enough cream yeast has been produced. The company having to aware of the complaint from the Anchor Yeast Johannesburg, the company came with solutions to the complai nt. There was a spreadsheet that was made to record the times the Unitarians come onsite and time finished to offload the truck. The spreadsheet included also the time it took to load a truck. With regard to running low on cream yeast there was a production time table set for everyday that how much needs to be produced and how much will be transported to Judder on daily basis.The number of other truck companies bring molasses was reduced to avoid Unitarians trucks to wait for other trucks to finish. It was also suggested that Unitarians trucks given first priority when comes to offloading. This meant when Unitarians is onsite and there is a truck waiting to be offloaded, the Unitarians truck will offload before the truck to avoid delays. The plant efficiency was increased and more of product was produced and made available for the Unitarians to transport. The implement solution has been running fro couple months now and been evaluated. The solution has been found to be working well and keeping the customer happy.Thought at the beginning the other companies were not happy with Unitarians having o bypass their trucks, but after some negotiations the other companies have come to accept the terms.

Friday, September 27, 2019

Drug Trafficing Essay Example | Topics and Well Written Essays - 500 words

Drug Trafficing - Essay Example es a Violent Street Gang/Drug Enterprise as a criminal enterprise having an organizational structure, acting as a continuing criminal conspiracy, which employs violence and any other criminal activity to sustain the enterprise (Wiley, 1997). There are at least 21,500 gangs and more than 731,000 active gang members in the United States alone. These gangs are known to conduct criminal activity in all states and U.S. territories. Earlier, it was believed that the problem of gangs and drug trafficking was mainly concentrated in major urban areas, however recent data show that gangs also are proliferating in rural and suburban areas. Increasing law enforcement pressure in urban areas of the country forced the gang members to flee or seek more lucrative drug markets is one of the reasons. This proliferation in non-urban areas increasingly is accompanied by violence and is threatening society in general (NDIC, 2005). Questions such as why has youth gang involvement in drug trafficking increased in the past decade has still not being answered completely. The popular image of youth gangs ties them directly to drugs and violent crime (Klein, 1995). Research conducted in the 1980’s and 1990’s has documented extensive youth and adult gang member involvement in drug use and generally higher levels of use compared with non-gang members. According to Fagan (19–54) there are basically two reasons: (1) the dramatic expansion of cocaine markets in the 1980’s, accompanied by sharp price reductions, and (2) socioeconomic changes in American society that disrupted traditional social controls (Curry and Spergel, 381–405). Drug use, drug trafficking, and violence overlap considerably in gangs (Howell and Decker, in press). Moreover, gang involvement appears to increase individual involvement in drug use, drug trafficking, gun carrying, and violence and, perhaps, to prolong involvement in drug sales (Youth Gangs and Violence, 1998). There is no doubt that with the increase

Environment Ptotection Assignment Example | Topics and Well Written Essays - 3000 words

Environment Ptotection - Assignment Example (Pamela.R.Cummings, 2001) With increasing awareness among the people regarding issues like Global Warming, Water and food conservation, hotels have once again come to spotlight on how well they comply with the international standards. There have been serious allegations that hotels always tend to neglect the environmental issues and have only profit maximization on their priority list and this has clearly added onto the concerns of the consumers towards the Hospitality industry. The attitude of the major players in the hospitality industry has only added on to the apprehensions of the consumers. This dissertation will mainly focus on ways to improve the present environmental scenario in the hotels and the strategies and ways implemented by them in combating the ill effects of environmental contamination caused directly, or indirectly by them. It will also analyze as to how various hotels have been focusing on issues like minimization and management of wastage, energy conservation, and sustainable food, staff training. It will also try and come up with practical environmental initiatives for the hotels. (Conrad Lushly, 2004) As rightly pointed out in the first dissertation, the hotels, barring a few prominent and well known ones, do not configure or install any kind of energy-saving systems which clearly conflicts their statements generally about their concerns towards environment. Of course, they may be expensive to install, but the fact that the energy sources save a lot of energy clearly should send a message across that they help in reducing the overall operating costs of the hotel, if not in the short run, but definitely in the long run. Hence, in this dissertation, I also come up with a few measures for the hotels for the installation of specific devices and then will also list out the advantages of implementing the same. In the wake of globalization followed by rapid growth of various industrial sectors and the mounting concerns towards the ill effects caused by the industrial growth, this is clearly an area worth researching. Though this deals with the research of only the lodging and hospitality in UK, I can say that this will clearly indicate the amount commitment hotels give towards environment.(Tyya.N.Turner, 2001) This dissertation aims at coming up with alternatives to the existing proposals for the installation of devices and discusses the benefits for the same. It also elucidates the fact that installation of energy-saving devices will surely ensure in customer retention and moreover, will reduce the operating costs in the long run. Moreover, installation of such devices will make the hotel maintain eco-friendly and clean atmosphere which will clearly go a long way in enhancing the reputation of the Hotel and will definitely set an example for others to follow. Literature review This section deals with much more concrete measures that have to be taken up by the hospitality industry and the hotels concerning specific aspects of the environment practices being followed and how they can improve on them. Waste Reduction/Management. At a time when the natural ecologies are in the state of crises and when the rapid depletion of natural resources, it is indeed a matter of concern to the healthy nations and economies who boast if exponential growth. It is indeed a massive

Thursday, September 26, 2019

Doctorate of business administration in international business (DBA) Personal Statement

Doctorate of business administration in international business (DBA) - Personal Statement Example In fact, I had never heard of these terms, and did not think it was necessary to carry out such activities. Consequently, as you can imagine, I lost all my money from that experience. Fortunately, my parents were still financially supporting me, and I wasn’t responsible for a wife and children, car payments, or rent, etc. I was grateful that I still had a roof over my head, but I felt like a complete fool. I vowed then and there not to let that happen to me again. I learned some very important lessons from the above-mentioned debacle, especially about greed. Slow, steady earnings that keep pace with your life are just fine. Investments that yield higher profits more quickly are nice but they are also inherently risky. Using the Madoff scandal as a model of what not to do as an investor, I know now that diversification of assets is essential. Putting all your eggs in one basket so to say is never a wise practice in the world of investment. There are just too many uncontrollable and uncertain variables that could take down any one company or industry. I learned from my failures in investing. With a long career ahead of me, I can afford to take some risks, but should also focus on building a stable, long-term portfolio. On a much larger scale, this is the best time to be studying the failures of our economic systems and how we can build stronger, more secure ones for the future. It is clear that having a comprehensive knowledge of the law is as important as studying business alone. It is also important to do business with trustworthy institutions, and to do extensive preliminary research, such as through examining the company’s own as well as independent reports. In the past, we could rely on reputable brokerage firms, stockbrokers, and the advice of successful friends, but this is no longer an option, and calls for greater international regulatory and enforcement agencies have been

Wednesday, September 25, 2019

Coursework Example | Topics and Well Written Essays - 1000 words - 1

Coursework Example More water is needed to break bonds as hydrate contains hydrogen bonds between the water molecules. Anhydrous has faster dissolution rate forming a supersaturated solution within a shorter period of time (British pharmacopein, 2012). Theophylline is often manufactured in a modified – release formulations because of its characteristic of having a narrow therapeutic range. It is, thus, given at right doses. Modified release formulation would provide need to be provided at every 12 hours of enough plasma concentration. Peak serum-theophylline concentration occurs 4 hours after ingestion, which means formulation can release the drug at the right time. An overdose may be toxic. This imply that the formulation can provide constant release of the drug. (British Pharmacopein, 2012). Talc acts as a dissolution retardant and as a lubricant, Povidine (k25) acts as binder, Hydroxyethylcellulose acts as a binder, with Nuelin SA, acting as a plasticizer and as a surfactant (Raymond & Paul, 2012). Basing on the results in the spreadsheet, it is certain that Uniphyllin 300 mg had the slowest rate of release in different media (both HCL and phosphate dissolution buffer media). It was found out that Nueclin SA contained higher rate of release than Uniphyllin 300 in both phosphate and HCL buffer media. The percent release Uniphyllin 300mg in 0.1 HCL was 33.10% at 180 min, whereas percentage release of Neulin SA 250 mg in 0.1 HCL was 60.12 percent at 180 min of Uniphyllin 300mg in phosphate buffer was 34.85% at 180min, while percentage release of Nuelin SA 250 in phosphate buffer was 67.12% at 180min (Raymond & Paul, 2012). From the results obtained, it is quite clear that Nuelin SA 250 displayed PH-dependant drug release rate. The PH dependent gradient release is due to cellulose acetate phthalate. Cellulose acetate phthalate is used as an enteric coating on capsules or the tablets so that they do not dissolve until they are within the stomach acidic juicesof

Tuesday, September 24, 2019

Argument sketching Essay Example | Topics and Well Written Essays - 500 words

Argument sketching - Essay Example r; the ontological argument argues for the existence of a perfect being; an argument that is for a creator with a keen interest in humanity is the argument from design; lastly the moral argument refers to an argument that is pro moral authority (Harris 56). This argument aims at proving God’s existence mainly through the laws of logic. This can be traced back to St Anselm who was a philosopher-theologian as well as the archbishop of Canterbury in the eleventh century (Harris 62). This argues that we will be able to see God’s non-existence as being impossible once we mentally accept and internalize the concept of God. It aims at demonstrating the existence of a perfect supreme being. This can be viewed as the second proof of God’s existence. It also referred to as the cosmological argument. This looks to prove God’s existence from the fact that there is the existence of the universe. It states that the universe as it is came into existence at a certain point in the distant past (Harris 59). It also argues that nothing can logically come into existence without something or someone else brings it into existence. This is derived from the philosophical theory that nothing comes from nothing. This means that there must be another being or force outside of the universe that brought it into existence. This therefore alludes to the fact that there must be a creator of the universe who can only be God. This is also referred to as the teleological argument. This argument also has the universe at the centre of all this. It aims at proving God’s existence from the fact that our universe is well ordered. This is because that it could have been quite different from the state in which it is now in very many different ways. The laws of physics could have been very different with a completely different arrangement of stars and planets (Harris 74). This points at the existence of God since all these other versions of the universe would not have possibly allowed for

Monday, September 23, 2019

Defining Reason and Morality in Kant Essay Example | Topics and Well Written Essays - 2000 words

Defining Reason and Morality in Kant - Essay Example Investigating the validity of this point then moves into reliance on both the morality which Kant sees as true as well as how other circumstances would change the decisions made by an individual. Kant’s Theory of Rational Morality The main principle which Kant has created is based on the ideology that each individual should be treated with equal respect. The ethical consideration is based on a sense of reason that each individual should have. Kant states that reason is what requires one to act in a humanitarian way, specifically which requires looking at circumstances instead of the end means in a given situation. The ideology is to use morality with the understanding that humanity is the most important aspect of practicing morals, whereas, the individual beliefs and life of an individual is not as important as the whole. More important, Kant’s belief sates that when one is able to create equal respect toward individuals, then there is the ability of building a formula which stops the disrespect and other forms of unethical values which are often created (Hill, 1980: p. 84). The idea of respect is one that is then further defined with the concept of morality, value and what the end result will be if these ideologies are withheld in any given situation. The theory behind this is based on altering the foundational principles for justice and humanitarian acts toward others in society. The concept which Kant creates is one which he leaves as a basis of being logical in terms of creating responses within the way in which an individual treats another. The requirement which Kant states is one based on three approaches which are linked to the logic of this discussion. The first is based on the preservation of rational will, which states that each individual should have the capacity to decide and rationalize how to treat another individual. The second principle is respect for human dignity and integrity. Even if there is a situation in which one is unable to justify the end result, the ability to keep integrity and dignity as a main association becomes more important. The third which Kant states is based on the end which eventually takes place. When applying reason to a given situation, it is known that each individual has the capacity to overcome the situation. If justice and forms of overcoming a specific situation remain intact, then the means eventually justify the ends with the right end decisions being made (Green, 2001: p. 247). From several perspectives, the ideologies of Kant are able to show logical solutions to given circumstances and environmental needs. For instance, in the ethics of business, there is the ability to apply this specific concept to change the circumstances of a situation. When a manager or leader is able to use reason and actions based on humanitarian ideologies then it helps to offer better advancement within the company. This attribute is often referred to as a form of transformational leadership. When the right and reasonable decision is made with the manager, than others will begin to transform and follow the same approach and perspective. This creates a sense of attraction to doing the right action in any given circumstance while building a sense of moral principles that are followed by others within a given environment

Sunday, September 22, 2019

Smile Now, Cry Later Essay Example for Free

Smile Now, Cry Later Essay Gangs are becoming a growing problem within American society. â€Å"In 2002 more than 877,700 young people between the age of 10 to 24 were injured from violent acts, and 79% of homicide victims ages 10 to 24 were killed with firearms† (Youth Violence: Fact Sheet 3). Young people are turning to gangs as a way to solve problems in their lives, problems such as: poverty, home violence, peer pressure, forced them to seek for power, money, respect, protection or simply love on the streets. the majority of gang members have been exposed or have suffered violence in their homes. When youths join gangs, social activities with friends, and school. Gang members tend to fall behind their classmates in school and do not try to stick around. They lost their motivation, interests and see school like a part of the problem and not like a solution. The majority of gang members are illiterate because they drop out of school at a very young age. Most of them have or are related with drugs, which destroy their lives and their chances for a good education and better life. Teenagers are joining gangs every day, becoming a problem in ghettos, urban areas and neighborhoods. They can be found in about every city in the United States. One thing that all the gangs have in common is that According to Luis J. Rodriguez’s book, Always Running ‘’La Vida Loca or The Crazy Life†, â€Å"the barrio gang experience, originated with the Mexican Pachuco gangs of the 1930s and 1940s and was later recreated with the cholos† (5). The cholos, one of the most prominent and violent gangs in southern California region, still attract more and more teenagers. Teens usually join gangs in an attempt to correct both the social and emotional problems in their lives. There are many complex reasons kids join gangs: the majority grew up in broken families without a father or a mother to look up to when everything went chaotic and family conflicts present. These kids have a very low-self esteem due to the poor family function. They join in order to find love and acceptance. They see gangs as a surrogate, or substitute family, and they find in the streets what they don’t have at home. They also join gangs to gain power, money and respect eventually by getting into fights and killing each other. They often join gangs because they want to feel that they fit in somewhere, feeling rejected in more common situations due to their cultural heritage, religious believes, sex, or race. They join gangs as a way to protect themselves from discrimination, racism, prejudice, and to find acceptance among other members of the gang. Gangs are one of the results of urban deterioration that’s why we see some communities more affected than others. Gangs are a violent reality that people have to deal with today because gangs are a direct result of human beings personal wants and peer pressure. These issues can be identify by looking at the way humans are influenced in society, because I truly believe there is good evidence to point the blame at several institutions including the power that the media has in our society, the government, drugs and our economic system.

Saturday, September 21, 2019

Physiological life-long process Essay Example for Free

Physiological life-long process Essay Aging primarily is a physiological life-long process, starting at conception and ending with death (Kart, 1994). Persons grow old whether they like it or not. These changes, both positive and negative, place demands on the aging person’s abilities to cope with and adapt to new life situations. It is a challenge for any given society to assist their aged in coping with the new life situations they are facing. Unfortunately, the rapid social changes taking place in society do not always lend themselves toward helping the elderly meet the demands of their life situations. For one, the attitude toward this population is not helping them cope with it as well. According to historian Fischer, 1977 in Doress-Worters Seigel, 1994), the old is regarded as useless, unattractive, and unwanted especially in the west. Acknowledging these realities of aging, the current research has been undertaken to study the experience of subjective well-being of senior citizens of Gladys Spellan. This shall be from the point of view of their administrators, particularly on their views on well being and the factors that influence it. Objectives / Outcomes This study therefore, will strive to achieve the following objectives: 1) Understand the experiences of the senior citizens of Gladys Spellman in the home for the aged from the perspective of their administrators: a) Their understanding or idea of well-being b) And the components of well being and factors that influence it. I personally chose this topic because I believe that as more and more elderly are placed under institutionalized care in contemporary society, a study such as this is needed to explore this phenomenon. It would shed light into the subjective lives experiences of the aged from an administrators’ view point. This would also contribute to the literature in this area and serve as groundwork for further studies in this area. This study will explore the subjective well-being (SWB) of the elderly in Gladys Spellmen who opted to live in an institutionalized set up or in a home for the aged by choice. The following framework will be used as a guide in the study: Method The first step in the research was the gathering of secondary data that are pertinent to the current topic, collating literature on the concept of well-being, indicators of the cognitive and affective components, and the factors which contribute towards it. A case study will be used in the current study, focusing on Gladys Spellmen Specialty Center. A semi- structured interview guide has been used in gathering primary data from the administrators of the institution. Interviewing. All the interview sessions with administrators will be one-on-one or individual interviews, for which the researcher has jotted down notes. A session with the participants lasted about 45 to 90 minutes,sometimes with a break in between or without it. The personal information sheet will be completed before or after the interview session with them. The researcher will take down notes while interviewing which shall be thematically analyzed. References Kart, C. S. (1994). The realities of aging: An introduction to gerontology (4th ed. ). Boston: Allyn Bacon. Doress-Worters P. B. , Seigel, D. L. (1994). The new ourselves growing older. Women aging with a knowledge and power. New York: Simon Schuster.

Friday, September 20, 2019

Comparision Of Ssadm And Ethics Using Nimsad

Comparision Of Ssadm And Ethics Using Nimsad In this chapter, we going to describe and compare two interesting methodologies named ETHICS Effective Technical and Human Implementation of Computer-based Systems. and SSADM (Structured System Analysis and Design Methodologies). ETHICS is a methodology used to solving problem in various field in ethical approach and SSADM is a methodology used to solve problem in Information System. Here there is a comparison between these two methodologies to understand what are the process undertake in those methodologies. There is also discussion about some limitations as well as benefits of two methodologies. For comparing those two methodologies NIMSAD method is used. NIMSAD (Normative Information Model-based Systems Analysis and Design) is a framework which is mainly used for evaluating methodologies. NIMSAD methodology will use four elements to evaluate those methodologies. These methodologies have several advantages as well as several disadvantages, so here there is a discussion about that i n details. Here there is also having description about how the development process is going on in both the methodologies. When evaluating these methodologies we discuss about the problem situation, who is the problem solvers and Problem solving process. ETHICS: ETHICS is an acronym that has an ethical approach to solving problem. ETHICS is introduced by Enid Mumford (Manchester Business School) in the year 1969. Since then, ETHICS was used intensively in both industry and health service (Mumford, 2003). ETHICS is mainly support human Participation (Avison Fitzgerald, 1995) and also it has Socio-Technical Character. During the development process, Ethics helps to the users to find it easier to accept the new system and also help them to get involve into the new system. Due to this, Job efficiency will increase and also leads to higher job satisfaction. The past traditional systems are considered only about economic and technical factor, so it leads to get failure. This led to the appearance of a socio-technical approach, according to which, a system to be successful and effective it has to fit close with the social and organizational factors (Mumford, 1983). The objectives of ETHICS are to create effective, efficient and acceptable Systems. ETHICS also ensure that the design task achieves good organizational design and technical design. ETHICS ask the development people to communicate and share their ideas with team membes.This will brings efficient output at the end. ETHICS methodology is mainly looking for job satisfaction and both short and long term efficiency. It mainly helps to find problems of existing systems and setting efficiency and social objectives for new system. Finally design the new system and implement it. To perform these process, ETHICS group consist of managers, users and technical experts. Ethics Methodologies consist of some stages to create a new system efficiently and effectively. Those stages are explained below step by step: Step 1: Why Change? The design group is finding the drawbacks in current systems and discusses to get answer for the question why do we need to change? (Mumford, 1993). This gives answer to the design group that why they going for new system. Step 2: System Boundaries This step mainly used to identify the boundaries and how boundaries are connected with other systems and also how it interacts with other systems. Step 3: Description of Existing System In this step, design group members all should understand how the existing system works. Before starting to develop new system, they should have knowledge about existing system to start new one perfectly. Step 4: Definition of Key Objectives: The main aim of this stage is to identify the main objectives for the design group to develop new system. Depend on this objective only they will start to do work. Step 5: Definition of Key Tasks In this step, they will identify the main task which they have to follow. These tasks will be helpful to achieve the above planned objectives. Step 6: Key Information Needs This step mainly used to identify the information needed to carry out the tasks. Step 7: Diagnosis of Efficiency Needs Here the design groups identify the weak links in old system and have to prepare document for that weak link. Weak links are in the existing system which prone to error. These drawbacks are eliminated when developing the new system. People who all are outside the team can also find efficiency needs and they will involve in the development process. Step 8: Diagnosis of Job Satisfaction Needs ETHICS mainly aims to achieve high job satisfication and also it identify the user needs and search the ways to satisfy the user needs. This step will give oppertunity to other people to involved in the development process. Step 9: Future Analysis When developing the new system, development people should not concentrate only to overcome the existing problem. They also have to concentrate about future need that should useful be useful for different environment in future. . Step 10: Specifying and Weighting Efficiency and Job Satisfaction Needs and Objectives This step says that everyone in the organization should involve for development process to fulfill the objectives. Mumford finds that this step is very important in this methodology. Step 11: Organizational Design of the New System This step will helpful to satisfy the objectives and to achieve job efficiency. This step is said as logical and conceptual design for the new system. Step 12: Technical Options The physical design of the new system is used in this stage. After investigating and evaluating technical options, finally some options are most suitable to fulfill the project objectives. Step 13 Preparation of Detailed Design Work Here the new is designed in detail and they will prepare perfect documentation from previous steps. The task and responsibilities are allocated to the several groups. All developing people will have effective relationship when they doing the process. Step 14 Implementation This is the most important stage. After developing the successful project, developing team should implement the new project. Step 15 Evaluation After implementation, the system will evaluate to ensure the new system satisfy the objectives. The system should be efficient and effective. SSADM: SSADM is a water fall method that flows a structured approach to the analysis and design of information systems. SSADM is mostly concerned with describing data and processes through data flow diagram. In the year 1981, SSADM is used as mandatory method in UK for their project development. Later other countries and most private organization start to use SSADM (Ashworth et al, 1990). It is an efficient method to explain description in dataflow model. SSADM helps the project development team to understand the following questions: 1) What is to be done? 2) When is to be done? 3) How is to be done? 4) Where the resultant informs is to be documented? (Bentley et al, 1995) The basic assumption that systems have an underlying, generic, data structure which changes very little over time (Ashworth et al, 1990). This is called as data-driven method. There are several SSADM techniques available all grouped together and form framework of sequent stages. These stages will have many inputs and it will get corresponding outputs (Aktas, 1987; Ashworth et al, 1990; and others). The framework has some component like Structures, Techniques and Documentation. Structures will define all the stages in development process. Techniques shows how development team implemented there product. And the documentation will contain details of the development process. It will be used for references in future (Ashworth et al, 1990; Bentley et al, 1995). The users should need experience and help from developers to use this application. SSADM approach consists of two phases. They are: 1) System Analysis phase 2) System Design phase In System Analysis phase, there are three modules. Those modules are used to study the proposed system and finding requirement by analysing current system. Then they will set possible solutions for the system requirement. Until getting technical options, they have to analysis the requirement. In system design phase, after getting technical solutions developers will look for logical design. After finding logical design it transformed to systems physical design and to get physical design they will use different methods and techniques (Ashworth et al, 1990). The SSADM methodology consists of seven stages. Every stage is followed by reviewing to assure that the goals were achieved. Now we can see detail view about those stages. Stage 0: Feasibility Study In this stage, development team analysis and determine about the project is possible by the technologies and they determine whether project is financially justified or not. Here they will define the problem statement. The project should accepted by all people not only users and development team. They will set boundaries and analyses the problem and the boundaries are set by using data flow diagram. Stage 1: Investigation of Current Environment This stage is to analysis the requirement. In this stage, analysts understand system requirements and interviews employees and users about how to fulfill the requirements. They will also studies previous documentation for the reference. If there is no feasibility, they will investigate feasibility here. Stage 2: Business System Option Business system option is one of the requirement analysis stages. This stage will define boundaries of the solution and also define input and output. The transformation of the data all processed inside the system. Business system option will be founded in the previous stage and it may be the solution for system requirements. Analyst will collect some business system options and show to the client. Client will select any one from that. During this Stage 3: Requirements Definition This is requirement specification stage and it will be used to combine outcomes from first stage with selected business system option. It will lead to develop specification of the system. The specification will say that what the system going to do. Stage 4: Technical System Option Technical system option will be same like business system option but here they will have number of implementation options. In those implementation options developers will select most suitable solution. This option is evaluated by system performance, financial and time needed to implement the system, etc. This is logical system specification and it will be last stage of the analysis phase. Stage 5: Logical Design Last stage have been analysis about the logical deign but stage 4 only concentrate on technical implementation. This stage will have details about human factor. The designers will decide how the system has to interact with user. Output will be in commands, User interfaces and menus. Stage 6 Physical Design This is the final stage of SSADM methodology, In which implementation process will take place. Here developers will connect all outcomes of previous stages and give final output of the system. So finally developing team will pass the project to implementation. NIMSAD: Before comparing above methodologies we can see details about NIMSAD methodology and its elements. NIMSAD is a Meta framework that is used to evaluate the methodologies, structures, etc. This is special methodology for Information system development methodologies. But it will used in wide area. Methodology is defined as an explicit way of structuring (rationalizing) thinking and action, involving both critical and creative thinking (Jayaratna, 1994, p. xi). NIMSAD framework uses four elements to evaluate methodologies. The four elements are: 1) Problem Situation 2) Intended problem solver 3) Problem solving process 4) Evaluation In evaluation, it will evaluate all other three elements. Evaluation consist of two parts, they are internal evaluation and external evaluation. Internal evaluation means that it evaluates the methodology which is planned itself. External evaluation will consider about feedback, industrial reference, etc. Problem Situation: Here Organization will act as a framework for the information systems. It will found efficiency of Information systems. During the development process they will have interaction between the development members as shown in figure. Here they will investigate or examine about the present problems situation. FIGURE: 1 Intended problem solver: Intended problem solver also called as methodology user. The success of the project is mainly depending on problem solver. Even though methodology is more efficient, the successful implementation is depending on problem solver. The problem solver is not only from the organisation, they may be from outside the organisation. The problem solver may be designer, implementer, consultant or, etc. Problem solver will think in different view of methodology to make it efficient. FIGURE: 2 Problem solving process: Problem solving process is mainly used in all the methodologies. Without this element we cant perform any operation. In this process, they will consider about analysing and evaluating about existing system and finding problems in the existing system. Here they will maintain all process through either in diagrams or by documentation. After finding problems then they will analyse about requirement of the project and then after getting system requirement they will start to design the project. Then finally have to implement the new sytem to the environment. It should accept by society and it should be efficient to all people who all are can use the project. In problem solving process, there are three phases and these phases have divided into some sub stages as given below: 1) Problem formulation Stage 1 Understanding the situation of concern Stage 2- Performing the diagnosis Stage 3 Defining the prognosis outline Stage 4 Defining problems Stage 5 Deriving notional systems 2) Solution Design Stage 6 Performing conceptual/logical design Stage 7 Performing physical design 3) Design implementation Stage 8 Implementing the designs These three phases are mainly used for analysis, design and implementation of the project. Problem formulation: In first phase, Development team will find the boundary and analysis about the project. They will analysis about what are the problem will occur and finds solutions for that problem. In Problem formulation they will understand the concept of new system. Without having knowledge of new system they will not start to do work. Solution Design: In Solution design phase, logical design and physical design are take place. Here they will design as they planned in the previous phase with logical and physical design technique. Without completing first phase they wont come for second phase. Design implementation: In this phase, the designed project is implemented. Comparison of ETHICS SSADM: As said earlier, this section will have compare of both ETHICS and SSADM methodologies by using NIMSAD method. Problem Situation: To get an efficient output at the end, problem situation is one of the very important elements in ETHICS methodology. Here the developers in organisation all are communicate and share their thoughts each other and they will analyse about why they going for the new system. They will also find what the drawbacks are in present system. Here they will identify the boundaries, which are interacts with other systems. In SSADM methodology, analysts investigate about the problems with client. The analysts will be the technical person. By investigating the problem they will determine whether it is possible by technology or not. They will have all problem descriptions in data flow diagram, which is used to identify problem easily. During this stage, will have interview with both users and employees to analyse about the problem. When comparing with ETHICS, here they will analyse about client problem that means they will interact with client about their problems. Where in ETHICS, team analyse about existing systems drawbacks to overcome present situation. In SSADM, they only use dataflow diagram for reference but in ETHICS they will maintain detail description drawback of existing system. Intended problem solver: In ETHICS, each and every member in the project development as well as outside the project management team is all problem solvers. Here to improve the efficiency of the project, members from outside the project management team also involved in development process. They will identify the weak links in old system and inform to the development team. Everyone in the team as well as people from outside the team identifies the user needs and they will search the ways to fulfil the user requirement. So that outcome will be very efficient and it will satisfy the user needs. The developers and project managers are the problem solvers in SSADM methodologies. SSADM methodology mainly depends on technical aspects. So only developers only can think about situation and can analyse about problems. Here new users cant understand anything perfectly, so new users should need help from some experienced technical people. These problem solvers also need social skills to make project very efficient. When comparing SSADM with ETHICS, Other people (outside the team) cant involve into the process. In SSADM, only technical members in a team only can interact but in ETICHS members from outside the team are also the problem solver. Problem solving process: Stage 1 Understanding the situation of concern In ETHICS, team members and managers should understand what problem is present in the present system. Without understanding problems, they cant set objectives and they cant start to develop the new system. As discussed earlier, here project team find the answer for the question why do we need to change?(Mumford, 1993). Here the users, managers and technical peoples are all identify and originate the problem (Jayaratna, 1994). They will refer the old documentation and analyse the existing system for understanding about the drawbacks. In SSADM, They will construct the boundaries for understanding the problems. Dataflow diagrams are very helpful to construct the boundaries. Its very difficult to understand everything using DFD diagram, so this process are establishes the hidden boundaries. In this stage, ETHICS also construct the boundaries and they will connect boundaries with other system to communicate or share the boundaries. So both methodologies are constructing boundaries to get clear idea about project Stage 2- Performing the diagnosis In ETHICS, two dynamic processes are interacts with each other. First process is situation of concern; here they will understand the problem in existing system and second process is problem solvers idea. Here problem solvers will also identify weak links and inform to development team, they will prepare document for the weak link. Here they will give problem situation in diagrammatic view that helps to problem solver to identify the problems. They will also refer the existing systems document to understand about the problem solution. Dataflow diagram is mainly used in SSADM methodology. This diagram is very useful give clear idea about how formal data are flow. These dataflow diagrams will say how data is processed and also have details about logical data model and logical data flow model. In this stage they will indicate only regularly or frequently used pattern. So in ETHICS there will be clear idea about situation because they will maintain full document perfectly and clearly. But in SSADM only dataflow model representation so it is not efficient when comparing to that methodology. Stage 3 Defining the prognosis outline Prognosis is a process used to understand reasoning for change. It is not full description of new project. So in ETHICS, developers, managers and users should understand why they going for new system. Without reason or drawback they will not going for new system (as discussed earlier). Here developing team should analysis about drawback of existing system. This step is key step for newly proposed system. If there is no reason for developing new project then they will stop planning to develop the new one. Where in SSADM, prognosis is not necessary because new system will develop depend on client requirement. So client only know what they want. But here client will choose different Business Systems Options depend upon their needs. So in this step SSADM will be deferring from ETHICS methodology. Stage 4 Defining problems Defining problems is a stage used to identify gap between current state and wanted new state. Here developing team will examine what the things are missing in current state. So that they can rectify problem in desired state and this stage is depend on both diagnosis and prognosis. In ETHICS, developing team will analyses about how existing system works and what are the drawbacks available. Then they will find why they going for new project. Depend on problem definition only team members can set key objectives for the new systems. In SSADM, very early they will define the problem in feasibility study. Even they are defining the problem they are not clear because they dont have prognosis. Depend upon user requirement only they going to develop the new system. But in ETHICS they should define the problem before start to develop the new system. Here they dont have clear idea about why they going for change in current system because client only know about all details. Stage 5 Deriving notional systems: Deriving notional systems is a process used to identify requirement of a system. If system requirement is identified then it is more possible to conversion of current state to desired state. In ETHICS, they first investigate what are the drawbacks to overcome and then they will analyse about whether system requirement want to change or dont want to change. Here they will also analyse about technical options like hardware, software, etc. If they have enough requirements already they will start to do work. The requirements are gathering from the client in SSADM methodology. So this will be heavy advantage in this stage. After collecting requirement from client, developers will start to investigate about requirements and weather it is possible to complete the task or impossible. If they have all system requirements and other requirement then they will start to develop the new system. When developing new system, each and every time they will shows to client to check feedback from them. It is easier way to understand what the client wants. Stage 6 Performing conceptual/logical design: Most of the methodologies are using dataflow diagram, Logical data diagram, ER diagram for explain the process and define roles for individuals. The DFD is mainly used to say the information is passing and logical data diagram used to show what information is stored and how it is interacting. This diagram is mainly used in SSADM because that methodology mainly depend on diagrammatic view when comparing to ETHICS. This stage is much similar to conceptual/ logical analysis. In order to increase efficiency and to achieving objectives this stage will be useful. But in ETHICS, they will prepare documentation to have details about developing project. They mostly will not use diagrammatic representation like DFD and ER diagram but have all details in documentation. This stage will used to achieve job efficiency and it will satisfy the objectives. This stage will be more helpful to SSADM methodology because this methodology will mostly use DFDs to describe the process. SSADM is also useful for structured dialogues. The logical diagnosis diagram is modified to get this design and the diagnosis diagram is modified depend upon users requirement. In ETHICS this stage mostly not useful but in SSADM methodology this stage will be very helpful. Stage 7 Performing physical design: This stage is mainly used to understand about what are the things require for developing new project. Here in ETHICS they will investigate and evaluate the available technical option like Hardware, Software and User Interfaces, etc. This stage will be very useful the achieve the objectives. In SSADM methodology, here developers will use all the stages to get final design. This stage is mainly depending on technical side. End of these stage programmers will start to develop the project and implementation process also will start. But ETHICS methodology used to in all field where as SSADM is mainly focussing on technical side. So it is very big drawback in SSADM. Stage 8 Implementing the designs: This stage is final to give successful project to the environment. After implementing they have to train the users to say how to use the system and then integrate the new system into the environment. In ETHICS, depend upon the requirement they will use several tools and they will implement the project. We cant say specific stages to implement the project because requirement will be defer from each and every project. In SSADM, depend on user requirement they will develop the project and implement it. Evaluation: After implementing the project, finally have to evaluate that because simple execution of methodology is not efficient. It should be more helpful and it should be efficient in environment. Evaluation is mainly used to find what are the things have to change in new system and why they have to change the system. Problem situation, problem solvers, problem solving process these are the elements going to evaluate here. After developing the project it will evaluate how the methodology helps to develop that particular project. When evaluating these elements if they not satisfy with any process means they will start to do from first stage. At initial stage they will evaluate everything and plan to do project and also there is a chance to evaluate during the developing stage. As discussed earlier, in ETHICS after finishing implementation they will start to evaluate because they have to know whether new system is effective or not. And also they will evaluate whether it satisfy the objectives or not. If something is missing from objectives means they will start to rework the project and then re-evaluation will take place until they satisfy with their development. Where in SSADM there is no evaluation is take place because there is no objective to the developers. Here the developers are show the output of each stage to client and get feedback from them. So it wills satisfy the client in that way. Developing team no need to evaluate those things here. Conclusion: This above report is compared very important and interesting methodology named SSADM and ETHICS. Both methodologies are very useful in different fields. But ETHICS is mostly used in wide area but SSADM is for Information Systems. These two methodologies will have several benefits and also have several drawbacks. In both methodologies, people who are in developing team should need experience to develop the project. Without experience if they started to do develop then it will leads to failure. In this section, there is a comparison between two methodologies in several ways. In ETHICS mostly developing people will maintain document for having detail about developing process and for describing drawbacks, etc. but in SSADM they will use dataflow diagram for maintaining details and for showing operation flow. But these DFDs are not useful for different type of problem like web application, decision support, etc. In SSADM structured approach are used for designing and modelling but ETHICS is fully uses organisational framework. SSADM will have feasibility, analysis, logical design and physical design and Ethics will give job satisfaction as well as it will improve efficiency. SSADM will use waterfall model(Software Development Life Cycle model) in designing stage. So that at the end of development process they will prepare document for reference. In ETHICS, according to Objectives they will start to do work and also they will follow fifteen stages. According to that fifteen stages developers will develop the new system. SSADM is very costly for larger project and also have to write several docmentation for maintaining. But the documentation is not worthfull because they will have mostly diagramatic representation. ETHICS will also maintain the document but it will have full details clearly. In ETHICS they will develop project according to organisation objectives, so they itself analyse about present situation and going for new one. For example, In real time world microsoft introducing MS-Word in different version. Each and every version will overcome the drawback of existing version. In SSADM, client will give requirement so they have to analyse about that according to that developers have to start to develop. In ETHICS, outside the team members also act as a problem solver due to this the output will be very efficient. In SSADM only developers are the problem solver because they only will have knowledge about technical side. When comparing ETHICS with SSADM, ETHICS will look like very efficient methodology because that methodology widly used for different field. Even it having several advantage some disadvantage also available in this. people should communicate with each other and have to share idea in every stage. In SSADM drawbacks are high cost as well as need communication with experience person to gain knowledge. It not suitable for all kind of systems.

Thursday, September 19, 2019

Karl Marxs Communist Manifesto and the Industrial Proletariat Essay

Karl Marx's Communist Manifesto and the Industrial Proletariat Karl Marx's Communist Manifesto was most appealing to and revolutionary for the industrial workers of 1848 (and those to come after that time). The call for unification of the proletariat and abolishment of the Bourgeoisie was an urgent one during a time of rapid progress in all aspects of industrial life. This urgency of The Communist Manifesto and the desire for change of political ideologies (to match the exponential rate of progress of wealth and industry) created not only a spate of revolutions, but a long lasting change in political ideas for industrialized European nations. The Communist Manifesto created a sense of unity and class awareness throughout the proletariat, thus they were able to recognize their power politically, socially and economically. Naturally, with the sudden rise of industry (particularly in England) other sectors of the European economy were affected. Cottage industries were put out of business by competition from manufactured goods and agricultural workers migrated to the cities. Not only did the farming economy change drastically, but the urban setting where migrants came for employment expanded rapidly. These changes in labor practices and the economic landscape as a whole were most unsettling and unfair for the industrial workers of the 184 0's. Conditions were often poor and a very distinct line was drawn between rich and poor, factor owner and factory laborer. "Industrial workers, increasingly tied to the pace of machinery, found it more and more difficult to control their work processes; they had to work ten or twelve (or more) hours nearly every day on schedules fixed by factory owners."(1) The oppressed industrial... ... utopian vision for a classless, productive, industrial society that was beneficial to all, the mere recognition of strength in numbers and class solidarity were fundamentally effective and paved the way not only for future governments but for future laborers. Works Cited Blackford, Mansel G. Labor in the Industrial Revolution {Introduction} derived from Exploring the European Past Thompson Learning Custom Publishing, 2002 Engels, Fredrick Conditions of the Working Class in England, ed. Eric Hobsbawin (London 1969), 39-40, 41-42 Hunt, Lyn The Making of the West: Peoples and Cultures, Volume II, Bedford/ St. Martin's 2001 Marx, Karl The Communist Manifesto translated by Samuel Moore, 1888 Saddler Committee Report exerpted from Parliamenary Papers: Reports from Committees, Vol 15, Labor of Children in Factories (London: House of Commons, 1832)

Wednesday, September 18, 2019

Justice in Ancient and Modern Literature :: essays research papers

  Ã‚  Ã‚  Ã‚  Ã‚  The first blow of the machete landed on the boy. â€Å"My father, they have killed me!† he cried as he ran towards him. The father then drew his own machete and â€Å"cut him down.† In Achebe’s novel, Things Fall Apart, this was justice. The boy was from another tribe, a payment for a misdeed, and his life was theirs to do with as they pleased. Justice is something that all of us have a notion of. However we differ in our implementation of it, we all know when it’s been violated. Many of the seeds of our modern idea of justice have existed for millennia. Those seeds comprise two basic forms based on Socratic, Platonic and Aristotelian thought – Should justice be rooted on a higher ideal or is justice primarily something established by us in the here and now? For one justice my involve taking the life of another as just recompense for previous crimes while another my feel that standing for what is just would be something worth gi ving one’s own life for. And sadly one may put off embracing justice to the detriment of his own life and the lives of those around him.   Ã‚  Ã‚  Ã‚  Ã‚  Plato, one of the great philosophers of the ancient world, approached the subject of justice by believing that an ideal form of it exists. He might say that it is something outside of ourselves that we strive to attain. He shows how Socrates (his teacher) would choose not to bow to popular opinion just because it was the majority view. â€Å"In questions of justice and injustice, and of the base and the honorable, and of good and evil†¦ought we to follow the opinion of the many?† (Plato: Crito) He mentions how others feel that they do not hold to a higher ideal but that â€Å"political decisions [are] supreme.† And he shows the Athenian view of the inequality of different groups of people.  Ã‚  Ã‚  Ã‚  Ã‚  Ã¢â‚¬Å"Can you deny that you are our child and our slave†¦? And if this be so do you think that your rights are on a level with ours?†   Ã‚  Ã‚  Ã‚  Ã‚  Plato and Socrates both felt that a truth that one holds should be defended and upheld regardless of the personal cost in doing so. In the end Socrates concluded that it was better to die for the truth he believed in than to run from its consequences and be labeled hypocritical. He might use the phrase: Do what’s right, regardless of the price.

Tuesday, September 17, 2019

Let’s be Lefties for a Day Essay

During the â€Å"Let’s be lefties† experiment, I found it very difficult to complete my everyday morning tasks without using my right hand. Some of the things I did that day were laundry, dishes, (which took double the time) and writing with my left hand as well. According to the Huffington post, left handed people make up about only ten percent of the population, but researchers have found that in populations with certain mental disorders, rates increases. According to a recent study published in the Journal of Economic Perspectives, lefties make about 10 to 12 percent less annually than righties. The paper, written by Joshua Goodman, an economist at Harvard’s Kennedy School, is the first study to document the income gap between right-handed and left-handed people. It may have something to do with how left-handedness correlates with other attributes. Goodman found that left-handed people have more emotional and behavioral problems, have more learning disabilitie s such as dyslexia, complete less schooling, and work in occupations requiring less cognitive skill. In his research, Goodman analyzed five data sets from the U.S. and the U.K. that all look at how being left handed affects cognitive skill and income over a set amount of time. Goodman found that about 11 to 13 percent of the population is left-handed, a finding that prior research supports. Now that we’ve discussed the experiment along with some theories and facts about being left handed, we will now look at the importance of understanding cultural, ethnic, and gender differences by managers and professionals in a business setting. Diversity basically refers to the ways people differ from one another. People differ from each other in many ways such as culturally, ethnically and by gender. It can be difficult at times working as a team  with individuals from different backgrounds. Managers must understand the advantages and disadvantages brought on by different cultures. Cultural and ethnic differences are a fact of life in the workplace. People tend to stereotype individuals from other cultures or races. This can be challenging but must improve. To be effective and provide a better working environment, managers and employees need to recognize, respect, and capitalize on their differences. This will and can reduce stress and make a better workplace. Women in the workplace are still at a disadvantage. Women are regarded as inferior to men at the workplace in relation to job level and salary. In order to understand diversity in a professional workplace, it requires organization to develop policies and procedures that employees need to follow. According to the Health and Humans Services organization, cultural and linguistic competence are a set of behaviors, attitudes, and policies that enables effective work in cross-cultural situations and conveys information that is easily understood by diverse audiences. According to Huffington post, there is still a lot of work to be done with educating people in the acceptance of the diverse cultures and ethnic groups. In conclusion, we can offer videos, literature, activity and role playing as ways to educate individuals to better adjust to the diverse cultures that are around us. Acceptance and respect are the biggest issues. As a manager, we must first accept and acknowledge the culture and learn to grow.

Monday, September 16, 2019

American Dream in Great Gatsby

The American Dream was an important theme in the book, The Great Gatsby. Every single character was somewhat involved or motivated by the American Dream vision. In the Great Gatsby, American Dream symbolized the â€Å"freedom and opportunity to better yourself and your situation. Characters had different ideas of going through the American Dream. Gatsby loved money, reinvention, and the American Dream.He planned to reinvent himself for a woman that was put on such a igh pedestal, that when brought down, his world had become something of an illusion. Daisy became a sort of goal, a symbol for wealth, that he basically makes her lose her humanity in his eyes. A sort of paradigm in which she was an object, when he won her it meant he was what he always wanted to be. By the end, the real shocker that brought him back to earth, that made him realize Daisy was an actual human, was seeing Patricia, Daisy's daughter. Another character that symbolized the American Dream was Myrtle.Her only go al was to better her situation, such as being very materialistic and greedy. She decided to have an affair with one of the most unavailable and wealthiest men in the city. She was in the â€Å"relationship† not because of love or lust, but because of money. Someone that symbolized the American Dream in a positive way was Nick. He was from a family of old money yet he was willing to give up his family money and work hard. Nick wanted to build up his old name. Money was never very important to him as it was for the others.He actually understands how the American Dream corrupts the minds of all trying to achieve it. Nick was disillusioned with the American Dream by seeing how it immorally unethical it was. Yellow (such as silver and gold) that means corruption wealth and dishonest and white that means fapde and pure are colors that represent an egg which is a major symbol in the Great Gatsby. A theme of Self-Discovery and Intolerance was directly directed to Nick. He knew he wan ted to find himself and create his name not live off of what his family has.The theme of the green light represented Gatsbys hope, renewal and rebirth of this new relationship with Daisy. Gatsbys motivation to move forward and better his situation Just to be with Daisy starts with that green light. It basically Just means plain wealth to him. Red was a symbol connected to Nick because he is the only one that does not think corruptly. Red symbolizes death in which Nick has seen people's true self die out because of the American Dream.

Sunday, September 15, 2019

Cinderella Man Film Essay

Cinderella Man is a film about The Great Depression. How is this period in history depicted in the film? The film Cinderella Man is based on a true story about a boxer James J Braddock, during the Great Depression in the 1930’s. Braddock, his wife Mae and his three kids were very well off, due to the fact that Braddock was doing very well with his boxing and winning lots of fights, which resulted in lots of money. This all changed very suddenly when Braddock’s career was turned upside down when the Great Depression hit. The first scene in the film which shows that times were starting to get tough is when there is a transition scene from 1928-1932, where there is a slow left pan fade starting from their dresser with lots of accessories such as jewellery, a photo in a nice frame, a watch and a stack of money which Braddock earned from winning a fight that night, and the pan ends with a shot of their dresser during the great depression which is clearly much less accessorised with very little jewellery, a razor, a false tooth and the same photo but without the frame. As Braddock and his family were very well off before the great depression this scene really illustrated how tough the times were and there were many people much worse off than Braddock’s family. Another scene in the film that portrayed the period of the Great Depression was the scene when Braddock went to the Docks to work. Each day unemployed men would wait at the gate and hope to get picked to work on the docks that day. This scene gives you as a viewer a sense of truth about the movie and when the men are stretching out their arms through the bars it demonstrates how desperate people are getting. After it shows the men begging to get picked to work it switches to a close up shot of a newspaper getting dropped on the ground with the title â€Å"unemployed hits record 15 million†. The close up shot of the newspaper really emphasises that the film is during the great depression, and nearly everyone is unemployed; and this shot works perfectly in depicting this point in time. The next scene which indicates the film is during the great depression I personally think is the most effective. Jim and Mae are so low on money that they can’t afford to keep their three c hildren, one who is sick at home and Mae sends them off without telling Jim and this leads to them fighting. After this is changes to a high angle close up on the EMERGENCY RELIEF ADMINISTRATION OF NEW JERSEY and hundreds of people filling out welfare application forms. The camera then pans to Braddock when it is his turn and the woman at the counter says to Braddock- â€Å"I never thought I’d see you here Jim†. When the woman at the counter says this to Braddock it makes me as a viewer think that if Braddock is associated with wealth and he has lost everything, then what does the average person have left? As many other scenes in the film, this one really proves that the film is during the great depression and thousands and thousands of people are hardly surviving. The last scene I am going to talk about which represents the time of the great depression is probably the most effective in getting the message across that the film is during the great depression, and this scene is in Hooverville which is a place where lots of little shanty’s were built by homeless people dur ing the great depression. This scene in the film is very loud and gruesome, with sounds such as police sirens, breaking glass, people yelling and people vomiting. The camera shows lots of people running around, bodies on the ground and small fires everywhere. This scene uses a hand held camera to emphasise the franticness of the people, and shows the occasional close up of individual’s faces to show that they are scared. Immediately after it shows a close up of Mike’s face when he says ‘tell Sarah I’ll be late.’ it flashes straight to a close up of a coffin with a number on it and then another close up on Mae’s grief stricken face. Because mikes coffin only has a number on it, it shows that NO one could afford a personalised coffin and all these people to the government were simply just numbers. At a glance this film is just about boxing, but as you watch it you learn that there is a deeper meaning to the film, and shows the story of one man, who went from having everything to nothing, and then struggled his way through the great depression, and in Braddock’s words he ‘was fighting for milk.’

Saturday, September 14, 2019

Is411 Study Guide

Study Guide IS 411 Security Policies and Implementation Issues A perfect policy will not prevent all threats. Key to determining if a business will implement any policy is cost. Policies support the risk assessment to reduce the cost by providing controls and procedures to manage the risk. A good policy includes support for incident handling. Pg 15 Policy may add complexity to a job but that is not important. Unmanageable complexity refers to how complex and realistic the project is. The ability of the organization to support the security policies will be an important topic.Pg 105 Who should review changes to a business process? Policy change control board, minimally you should include people from information security, compliance, audit, HR, leadership from other business units, and Project Managers (PMs). Pg 172 ————————————————- Policy – a document that states how the organization is to perform and conduct business functions and transactions with a desired outcome. Policy is based on a business requirement (such as legal or organizational) ————————————————- ———————————————— Standard – an established and proven norm or method, which can be a procedural standard or a technical standard implemented organization-wide ————————————————- ————————————————- Procedure – a written statement describing the steps required to implement a process. Procedures are technical steps taken to achieve policy go als (how-to document) ————————————————- ————————————————-Guideline – a parameter within which a policy, standard, or procedure is suggested but optionalpg 11-13 Resiliency is a term used in IT to indicate how quickly the IT infrastructure can recover. Pg 279. The Recovery Time Objective (RTO) is the measurement of how quickly individual business processes can be recovered. Recovery Point Objectives (RPOs) is the maximum acceptable level of data loss from the point of the disaster. The RTO and RPO may not be the same value. Pg 287 Policies are the key to repeatable behavior.To achieve repeatable behavior you just measure both consistency and quality. Oversight phases to operational consistency: * Monitor * Measure * Review * Track * Improve pg 40 Find ways to mitigate risk through reward. Reward refers to how management reinforces the value of following policies. An organization should put in place both disciplinary actions for not following policies and recognition for adhering to policies. This could be as simple as noting the level of compliance to policies in the employee’s annual review. Pg 78 Domain | Key policies and controls|User | Acceptable Use Policy (AUP)E-mail policyPrivacy policy – covers physical securitySystem access policy – IDs & passwordsAuthorization – Role Base Access Control (RBAC)Authentication – most important| Workstation| Microsoft system center configuration manager: * Inventory – tracks LAN connections * Discovery – detects software and info installed for compliance * Patch – current patches installed * Help desk – remote access to diagnose, reconfigure, reset IDs * Log – extracts logs to central repository * Security – ensures use rs have limited rights, alerts added administer accounts| LAN| Hub – connects multiple devicesSwitch – can filter trafficRouter – connects LANs or LAN-WANFirewall – filters traffic in and out of LAN, commonly used to filter traffic from public internet WAN to private LANFlat network – has little or no control to limit network trafficSegmented – limits what and how computers are able to talk to each other by using switches, routers, firewalls, etc. | LAN-WAN| Generally, routers and firewalls are used to connect LAN-WAN. Demilitarized Zone (DMZ) provide a public-facing access to the organization, such as public websites. DMZ sits between two layers of firewalls to limit traffic between LAN-WAN| WAN| Unsecure public Internet. Virtual Private Network (VPN) secure and private encrypted tunnel. Firewalls have capability to create and maintain a VPN tunnel.Lower cost, save time for small to medium companies with VPN instead of leased line| Remote A ccess| Enhanced user domainRemote authentication – two factor * Something you know (id/password) * Something you have (secure token) * Something you are (biometric)VPN client communicates with VPN hardware for tunneling, client-to-site VPN:Maintains authentication, confidentiality, integrity and nonrepudiation. | System/Application| Application software is the heart of all business applications. Application transmits the transaction to server. Data Loss Protection (DLP) or Data Leakage Protection (DLP) refers to a program that reduces the likelihood of accidental or malicious loss of data. DLP involves inventory, perimeter (protected at endpoints) and encryption of mobile devices. Pg 67|Motivation – pride (work is important), self-interest (repeat behavior rewarded, most important pg 326), and success (winning, ethical, soft skills). Pg 91 Executive management support is critical in overcoming hindrances. A lack of support makes implementing security policies impossibl e. Listen to executive needs and address in policy. Pg 341 Security policies let your organization set rules to reduce risk to information assets. Pg 22. Three most common security controls are: * Physical – prevent access to device * Administrative – procedural control such as security awareness training * Technical – software such as antivirus, firewalls, and hardware pg 27Information System Security (ISS) is the act of protecting information and the systems that store and process it. Information Assurance (IA) focuses on protecting information during process and use. Security tenets known as the five pillars of the IA model: * Confidentiality * Integrity * Availability * Authentication * Nonrepudiation Policy must be clearly written. Unclear purpose refers to the clarity of value a project brings. In the case of security policies, it’s important to demonstrate how these policies will reduce risk. It’s equally important to demonstrate how the pol icies were derived in a way that keep the business cost and impact low. Pg 104 ———————————————— Head of information management is the single point of contact responsible for data quality within the enterprise. ————————————————- ————————————————- Data stewards are individuals responsible for data quality with a business unit. ————————————————- ————————————————- Data administrators execute policies and procedures such as backup, versio ning, up/down loading, and database administration. ————————————————- ————————————————-Data security administrators grant access rights and assess threats in IA programs. Pg 188 ————————————————- ————————————————- Information security officer identifies, develops and implements security policies. ————————————————- ———————————————à ¢â‚¬â€- Data owners approves access rights to information. ————————————————- ————————————————- Data manager responsible for procedures how data should be handled and classified. ————————————————- ————————————————-Data custodian individual responsible for day-to-day maintenance, grant access based on data owner, backups, and recover, maintain data center and applications. ————————————————- —————â₠¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€- Data user end user of an application. ————————————————- ————————————————- Auditor are inter or external individual who assess the design and effectiveness of security policies. Pg 115 Separation of duty principle – responsibilities and privileges should be divided to prevent a person or a small group of collaborating people from inappropriately controlling multiple key aspects of a process and causing harm or loss. Pg 156Internal control principle – information security forms the core of an organization’s information internal control systems. Regulations mandate that internal control systems be in place and operating correctly. Organizations rely on technolo gy to maintain business records. It’s essential that such technology include internal control mechanisms. These maintain the integrity of the information and represent a true picture of the organization’s activities. Pg 155 Lines of defense in the service sector: 1. Business Unit (BU) deals with controlling risk daily, mitigate risk when possible. Develops long and short-term strategies, directly accountable. 2. Enterprise Risk Management (ERM) program, team owns the risk process.Provides guidance to BU, aligns policies with company goals, oversight of risk committees and risk initiatives. 3. Independent auditor assures board and executive management the risk function is designed and working well. Pg 192 Health Insurance Portability and Accountability Act (HIPAA) protects a person’s privacy. HIPAA defines someone’s health record as protected health information (PHI). HIPAA establishes how PHI can be collected, processed and disclosed and provides penaltie s for violations. Health care clearinghouses process and facilitate billing. Pg 50 Executive management is ultimately responsible for ensuring that data is protected.Information systems security organization enforces security policies at a program level. The team is accountable for identifying violations of policies. The front-line manager/supervisor enforces security policies at an employee level. Employees are responsible for understanding their roles and the security policies. They are accountable for following those policies. Employees can still be held liable for violations of the law. Employees can be prosecuted for illegal acts. Sampling of key roles to enforce security policies: * General counsel- enforces legal binding agreements * Executive management- implements enterprise risk management * Human resources- enforces disciplinary actions Information systems security organization- enforces polices at program level * Front-line manager/supervisor- enforces policies at employ ee level pg 366 A Privileged-level Access Agreement (PAA) is designed to heighten the awareness and accountability of those users who have administrative rights. Security Awareness Policy (SAP) laws can outline the frequency and target audience. Acceptable Use Policy (AUP) defines the intended uses of computer and networks. A good AUP should accompany security awareness training. Pg 220 Auditors are feared Contractors comply with the same security policies as any other employee (such as an AUP). There may be additional policy requirements on a contractor such as special non-disclosure agreement and deeper background checks. Pg 215Data Class| Class Description| Recovery Period| Examples| Critical| Data must be recovered immediately| 30 minutes| Website, customer records| Urgent| Data can be recovered later| 48 hrs| e-mail backups| Non-vital| Not vital for daily operations| 30 days| Historical records, archives pg 263| U. S. military classification – nation security information document EO 12356. * Top secret – grave damage to national security * Secret – serious damage to NS * Confidential – cause damage to NS * Sensitive but classified – confidential data under freedom of information act * Unclassified – available to the public A Business Continuity Plan (BCP) policy creates a plan to continue business after a disaster. Elements include key assumptions, accountabilities, frequency of testing and part includes BIA.Business Impact Analysis (BIA) purpose is to determine the impact to an organization in the event that key processes and technology are not available. Assets include critical resources, systems, facilities, personnel, and records. Pg 278 Desired results of the BIA include: * A list of critical processes and dependencies * A work flow of processes that include human req to recover key assets * Analysis of legal and regulatory requirements * A list of critical vendors and support agreements * An estimate of the maximum allowable downtime pg 286 Disaster Recovery Plan (DRP) is the policies and documentation needed for an organization to recover its IT assets after a disaster (part of BCP). Pg 288Governance – requires a strong governance structure in place. This includes formal reporting to the board of directors. Most boards receive formal GLBA reporting through the audit committee. The head of information security usually writes this report each quarter. Pg 51 An Incident Response Team (IRT) is specialized group of people whose purpose is to respond to major incidents. The IRT is typically a cross-functional (different skills) team. Pg 297. Common IRT members include: * Information technology SMEs * Information security representative * HR * Legal * PR * Business continuity representative * Data owner * Management * Emergency services (normally outside agency i. e. olice) pg 302 Visa requires its merchants to report security incidents involving cardholder data. Visa classifies incid ents into the following categories: * Malicious code attacks * Denial of service (DOS) * Unauthorized access/theft * Network reconnaissance probe pg 299 Declare an incident, develop a response/procedure to control the incident. Before a response can be formulated, a discussion needs to be made. This involves whether to immediately pursue the attacker or protect the organization. Having a protocol in advance with management can establish priorities and expedite a decision. It is important to have a set of responses prepared in advance.Allowing the attacker to continue provides evidence on the attack. The most common response is to stop the attack as quickly as possible. Pg 309 How do you collect data? A trained specialist collects the information. A chain of custody is established and documented. Digital evidence, take a bit image of machines and calculate a hash value. The hash value is essentially a fingerprint of the image. IRT coordinator maintains evidence log and only copies ar e logged out for review. Pg 311 Why do policies fail? Without cohesive support from all levels of the organization, acceptance and enforcement will fail. Pg 19 Which law allows companies to monitor employees?The Electronic Communication Privacy Act (ECPA) gives employers the right to monitor employees in the ordinary course of business. Pg 356 Policy enforcement can be accomplished through automation or manual controls. Automated controls are cost efficient for large volumes of work that need to be performed consistently. A short list of several common automated controls: * Authentication methods * Authorization methods * Data encryption * Logging events * Data segmentation * Network segmentation pg 361 Microsoft Baseline Security Analyzer (MBSA) is a free download that can query systems for common vulnerabilities. It starts by downloading an up to date XML file. This file includes known vulnerabilities and release patches. Pg 378Business Continuity Plan (BCP) sustain business durin g disaster Continuity of Operations Plan (COOP) support strategic functions during disaster Disaster Recovery Plan (DRP) plan to recover facility at alternate site during disaster Business Recovery Plan (BRP) recover operation immediately following disaster Occupant Emergency Plan (OEP) plan to minimize loss of life or injury and protect property from physical threat pg 292 Extra notes: There are two types of SAS 70 audits: * Type 1 – is basically a design review of controls. * Type II – includes type 1 and the controls are tested to see if they work. Pg 61 Governance, Risk management, and Compliance (GRC) and Enterprise Risk Management (ERM) both to control risk. ERM takes a broad look at risk, while GRC is technology focused.GRC top three best frameworks are ISO 27000 series, COBIT, COSO. Pg 197 Incident severity classification: * Severity 4 – small number of system probes or scans detected. An isolated instance of a virus. Event handled by automated controls. No unauthorized activity detected. * Severity 3 – significant probes or scans. Widespread virus activity. Event requires manual intervention. No unauthorized activity detected. * Severity 2 – DOS detected with limited impact. automated controls failed to prevent event. No unauthorized activity detected. * Severity 1 – successful penetration or DOS attack with significant disruption. Or unauthorized activity detected.Pg 308 To measure the effectiveness include IRT charter goals and analytics. Metrics are: * Number of incidents * Number of repeat incidents (signifies lack of training) * Time to contain per incident (every incident is diff, least important) * Financial impact to the organization (most important to management) Glossary terms Bolt-on refers to adding information security as a distinct layer of control after the fact. Business Impact Analysis (BIA) a formal analysis to determine the impact in the event key processes and technology are not available. Committee of Sponsoring Organizations (COSO) focuses on financial and risk management.Control Objectives for Information and related Technology (COBIT) framework that brings together business and control requirements with technical issues. Detective control is a manual control that identifies a behavior after it has happened. Federal Desktop Core Configuration (FDCC) a standard image mandated in any federal agency. Image locks down the operating system with specific security settings. Firecall-ID a process granting elevated rights temporarily to resolve a problem. Flat network has little or no controls to limit network traffic. Information Technology and Infrastructure Library a framework that contains comprehensive list of concepts, practices and processes for managing IT services. IRT coordinator documents all activities during an incident, official scribe.IRT manager makes all the final calls on how to respond, interface with management. Non-disclosure Agreement (NDA) also known as a confidentiality agreement. Octave is an acronym for Operationally Critical Threat, Asset, and Vulnerability Evaluation. ISS framework consisting of tools, techniques, and methods. Pretexting is when a hacker outlines a story in which the employee is asked to reveal information that weakens the security. Security Content Automation Protocol (SCAP) NIST spec for how security software products measure, evaluate and report compliance. Supervisory Control and Data Acquisition (SCADA) system hardware and software that collects critical data to keep a facility operating.