Thursday, October 31, 2019

Stress and health in novice and experienced nursing students Essay

Stress and health in novice and experienced nursing students - Essay Example tate them all.) If there are not research questions and/or a hypothesis, indicate that is the case and provide your interpretation of what the research question and hypotheses are. The research questions that became used in the experiment included, What degrees of stress and types of stressful events perceived by students in their clinical practice, what the common biopsychosocial responses were during clinical practice periods, what the differences in reports of health and stress between experienced and novice groups of nursing students were. In accordance to the research paper, stress and coping tend to affect health in social, physical and psychological aspects. Since the medical team is highly dependent on the nurses, plus the nursing students need to learn, the research became aimed at knowing the outcomes of stress to their learning. The research used nursing students from the University for Higher School for Nursing positioned in Andalusia. The research became conducted for 3 years. The research involved all the 503 nursing students. The sample became representative of the whole nursing population. The size was appropriate as it involved all the nursing students. Such a sample was excellent though data collection from each of the students might have brought some issues. In data collection, two types of tools became used the Perceived Stress Scale and the Biopsychosocial Response Scale. The two became designed by Sheu. Reliability of the two tools became mentioned in the research, for instance, the Perceived Stress Scale got reasonable reliability indexes. Biopsychosocial Response Scale became reliable too in the process of data collection. In the research, the writer utilizes the use of tables. Tables offer a summary of the data collected in a simplified form. One can be able to understand the data displayed in the table since they are simplifies and direct to the point. In the table of the stress perceived by the use of Perceived Stress Scale, a

Tuesday, October 29, 2019

Cybersecurity Coursework Example | Topics and Well Written Essays - 500 words

Cybersecurity - Coursework Example Compare this to now, where a semi-automatic machine gun can spray out hundreds of bullets per minute and rarely needs to be reloaded. The example used of a bank robbery is perfect because it is low risk and low reward. The robber is only going to be able to do it once, and he will only make a small return for doing so. If a hacker gains access to a computer system, he can steal multiple times and also take large amounts of cash each time. These two instances of crime are different in nature and different in reward. I also agree that those who commit cyber crimes should be punished more severely than those who commit traditional crimes. The level of skill involved almost removes the defense argument that the accused did not know what they were doing. 2. Although terrorists may seem irrational by their actions, they are actually clever and calculated when it comes to doing damage to those who they oppose. Risk and return is a huge part of any terrorist operation because there is no point in doing something only to be caught for doing so. Terrorists are always trying to do the most damage and gain the most value without being apprehended for what they do. Cyber terrorists, however, do not seem to act rationally when it comes to doing an illegal act. This is quite ironic because â€Å"computer geeks† are always thought to be smart and calculated. I agree that the objective may not always be to gain something, but to simply disrupt services already provided and diminish the public’s confidence in those services. The incentive for cyber terrorists is huge because they have the chance to disturb society from its normal state and become infamous at the same time. Owners of important government infrastructure need to ensur e that defenses against cyber terrorists remain strong, because if even one succeeds, it may spur other like-minded individuals on to doing

Sunday, October 27, 2019

Microsofts Structure And Culture

Microsofts Structure And Culture The assignment is about six outcomes of Organizations and Behavior subject. The scenario company is Microsoft, founded in 1975, which is the worldwide leader in software, services and solutions that help people and businesses realize their full potential (Microsoft, n.d.).The other company to compare with Microsoft is Federal Express Corporation (FedEx Express), the largest company in providing a portfolio of transportation, e-commerce and business services under the FedEx brand. FedEx Express is an express transportation company, offering time-certain delivery within one to three business days and serving markets. FedEx Ground Package System, Inc. (FedEx Ground) is a provider of small-package ground delivery service. FedEx Freight Inc (FedEx Freight) is a provider of less-than-truckload (LTL) freight services. FedEx Corporate Services, Inc. (FedEx Services) provides the Companys other companies with sales, marketing, information technology, communications and back-office support (Fe dEx, n.d.). This assignment is going to explain and compare the organizational structures, cultures, leadership styles and performance of these two companies to find out about the organizational theories that underpin the practice of management. 1.1 Compare and contrast different organizational structures and culture 1.1.1 Microsofts structure and culture Microsofts Organizational Chart (The Official Board, 2012) According to the chart above, Microsoft has a flat structure. We can see that Microsoft has five product groups are Windows Live Windows Group, Server Software, Online Services, Microsoft Business and Entertainment and Devices. Each product group, which focuses on a specific line of goods and services, has one executive reports directly to the CEO. Each group has its own RD, sales, and customer service staff (Daft, 2009). This structure allows larger spans of control. Microsoft also has a matrix structure which works alongside the flat structure. The matrix structure is a structure where project teams are made up of workers with various specialisms from different functions of a business (BPP, 2004). The legal structure of Microsoft is Limited Liability Company because the company went public on March 13, 1986 (Time, n.d.). Microsoft has a task culture because it is a huge company with 94,420 employees around the world, just 56,934 in USA only (Microsoft, n.d.). It is impossible to manage a firm of that huge amount of workers with a person culture or a power culture. A two-time award-winning journalist Kurt Eichenwald described Microsofts work culture as the cannibalistic culture; a management system known as stack-ranking a program that forces every unit to declare a certain percentage of employees as top performers, good performers, average, and poor effectively crippled Microsofts ability to innovate, leading employees to compete with each other rather than competing with other companies (Vanity Fair, 2012). 1.1.2 FedExs structure and culture FedExs Organizational Chart (The Official Board, 2012) FedEx Corporation FedEx, introduced express delivery to the world in 1973, and is the worlds top express delivery service. The organizational structure of FedEx is flat. According to Organizational Behavior A Strategic Approach, FedEx Corporation should change their structure, because it adopted a multi-divisional structure (Hitt, Miller Colella, 2005). The corporation gives significant authorities to the subsidiaries. Operating independently, each subsidiary manages its own specialized network of services. FedEx employed over 280,000 employees worldwide (FedEx, n.d.), so obviously they have a task culture. The culture of FedEx is also market driven culture. All they care about is the customers; their culture center on the customer. They possess a strong customer-service organizational culture (McNeal, 2011). In short, both Microsoft and FedEx Corp. have a new style of management which is flat structure and task culture. However, FedEx is flatter than Microsoft in organizational structure. To look deeper, we can see differences in their culture as one cares about money, the other one cares about the customer. 1.2 Explain how the relationship between an organizations structure and culture can impact on the performance of the business 1.2.1 Microsoft Microsoft has a flat organizational structure and a task culture which is consider the new method of management. It is believed to be the right way to manage a company. This seems to works well when Microsofts 2011 revenue reached $69 billion (Microsoft, 2011). They make a very huge amount of money. The flat structure creates a lower hierarchy of power in Microsoft. It also allows CEOs direct involvement to make decision process quicker and less time consuming. Microsoft was topped ranking of the worlds 25 best multinational workplaces released by The Great Place to Work Institute (Industry Week, 2011). It is noticeable that employees satisfy their working environment in Microsoft. However, the stack ranking program can kill Microsofts creativity. The destructive management technique can be seen the key problem in Microsoft its management system (Frederick Allen, 2012). It can lead to risk of losing big amount of money. 1.2.2 FedEx FedEx increased revenue 12% in the February-to-May quarter and 13% in the fiscal year that ended May 31, reporting total annual revenue of $39.3 billion (William Cassidy, 2011). It is a large amount of money. The culture of FedEx influences its employees to work more effectively. It encourages them not only work hard but also work smart. FedExs managers also make right decisions, catching up with market trends and changing business needs. 1.3 Discuss the factors which influence individual behaviour at work The factors which influence individual behavior at work are: personality, perception, attitude, ability and aptitude, conflict, stress, and change. For the people of Microsoft, their personality is highly competitive. As discussed above, it is obviously that Microsoft has the culture of competition so the people who are working in a competitive culture will become competitive. If they are not yet competitive, the culture will itself make them competitive. Because they are competitive, they know how to get the money from customers and they will do it so well. Microsoft had always been characterized by a culture that was extremely competitive. When the company introduced new products then rocketing sales, the people responsible for the products did not meet to celebrate. Instead, they found what could have been done better instantly. Therefore, the company had always been a leading competitor, and Gates often sent out memos to remind employees about the competitive threats ahead. Gates truly drove a culture of innovation and vision (Microsoft People Problems, 2003). Thus, people were promoted to strive for the highest standards. However, when Gates left, Steve Ballmer has been a new CEO. Steve has been driving a culture of production rather than innovation (Kurt Eichenwald, 2012). For example, two ex-employees reviewd on Glassdor (Glassdoor is a website that collects information about workplaces and companies) that stack ranking made Microsoft be a less desirable place to work and higher stress workplace (Julie Bort, 2012). One more thing is that, Microsoft has discrimination between black and white workers of the corporation. In 2001, a group of current and former employees accused Microsoft of racism. The seven African American people required $5 billion in compensation, claiming they were paid less than their fellow employees and repeatedly passed over for promotions given to less-qualified white workers. The workers also claimed to have been subjected to racial harassment and retaliation when they complained. According to Willie Gary, who is a lawyer, pointed to 1999, government statistics that showed only 2.6% of Microsofts 21,429 employees, and only 1.6% of the companys 5,155 managers, were black (BBC, 2001). 2.1 Compare the effectiveness of different leadership style in different organizations 2.1.1 Microsoft Bill Gatess leadership styles are participative style and authoritative style. The reason is that, Gates involved his subordinates in decision making so they were good at delegating. He is a flexible person and he recognized his role was to be visionary of the company. Whenever needed, he brought professional managers for managing. Gates is a strong and energizing person. His enthusiasm, hard working nature and judgment skills reflect his personality. His motivating power and involving his friends to working with him became the success of Microsoft (Dip Kumar Dey,n.d.). Besides, Gates paid special attention to recruit and retain the best talent. He believed that the recruitment of talented software engineers was one of the most critical elements in the software industry. Gates looked for recruits who included the capacity to grasp new knowledge quickly and deep familiarity with programming structures. Despite a great number of potential recruits applied for jobs at Microsoft, Gates a ssumed that the best talent would never apply directly. Consequently, Microsofts HR managers had to hunt for the best talent and offer them a job. Giving autonomy to his managers, Gates delegated authorities to managers to run their independent departments. Gates involved a little in autocratic style, because control is basic to his nature and his management practice. He had an obsession with detail and with checking up. He tried to monopolize the World Wide Web software market and had legal problems with the department of justice. Also he did not like complaints (Dhananjay Kumar, n.d.). Microsoft used these styles of leadership very well as the company has great performance with net income of $14.569 billion (2009). 2.1.2 FedEx FedEx has a complex leadership style. The leadership style is combined between affiliative style, participative style and democratic style. Because FedEx has a flat structure; the managers give their subordinates authorities so they are good at delegating. Also, to be able to give subordinates authorities, they must trust their workers. Workers at FedEx are smart people so they do not want to be told what and how to do things. FedEx Corp. under the guidance of CEO Fred Smith has been named the Top Corporation of the Decade by Fortune magazine (Dumain, 2004). Smith was determined to make employees an integral part of the decision-making process, due to his belief that when people are placed first they will provide the highest possible service and profits will follow (FedEx, n.d.). Microsoft and FedEx have different leadership styles so they apply it differently to create different working environment for their workers. However, they both earn a huge amount of profit and manage their company so well. FedEx seems to have the right way to apply its leadership style on its employees than Microsoft. 2.2 Explain how organisational theory underpins the practice of management 2.2.1 Theory X and Y It can be easily seen that Microsoft and FedEx use the Y theory. Because both companies care about how their employees feel. Furthermore, workers at Microsoft and FedEx are smart people so they do not want to be told things. Workers at Microsoft and FedEx are very ambitious, passionate and committed to their work. Because the work load at Microsoft is very pressure but there are still many people wish to work at Microsoft. Because the salary they pay is high, $87,965 for normal employees and much higher for managers, engineers or directors. They all have a regular salary over $100,000 each person (Salary List, 2011). Theory Y is about trust. Both Microsoft and FedEx have flat structure; authorities are given through the chain. Therefore, they must trust the workers. It creates not only the trust of managers in workers, but also the trust of workers in managers. This theory helps to build a strong relationship among workers and managers and then it leads to a strong organization. It i s obviously that Microsoft and FedEx are both strong in structure, culture and financial. 2.2.2 Scientific management FedEx doesnt apply this theory in its management. Because based on the theory, the application of this approach was to break each job down into its smallest and simplest component parts or motions (BPP, 2004). Although the theory improves productivity, it creates de-humanity in the organization. Moreover, everyone at FedEx is smart and talented. Therefore, it is wastes to hire smart people to tell them just do the same job day by day. Scientific management doesnt work in an organization that needs innovation and ideas like FedEx. 2.2.3 Bureaucracy Under the dominated decade of CEO Steve Ballmer, Microsoft applied this theory in its management. For this reason, Microsoft was complained that toxic environment and bad managers for anyone who want to join the corporation. Current and former employees in Microsoft were affected seriously by bureaucracy and management of the company for years (Matt Rosoff, 2011). According an article, employees in Microsoft were more concerned with impressing bosses than creating things (Rebecca Greenfield, 2012). They have no incentive to innovate. Nothing has changed at all since the departure of former CEO Bill Gates. It seems to be Steve Ballmer applied an inefficient management system. All things have not worked out. 2.3 Evaluate the different approaches to management used by different organisations 2.3.1 Human relation approach Both Microsoft and FedEx use this management approach to manage their organization. As analyzed above, Microsoft cares about its employees in a wrong way. Steve Ballmer applied a management system which damage peoples creativity, making them to be bored with their work. Now the dominant tech company belongs to Apple. For FedEx, they care about their employees in a different way. They give employees passion and convenient facilities that allows workers to be more develop. Both Microsoft and FedEx know that how workers feel affects how well they work. However, this method is about what workers think, doesnt matter how the leader thinks about the workers. It is matter that the leader can create an image in the workers mind that they are what the leader wants them to believe they are. 2.3.2 The contingency approach It all depends is what we can define this theory. Managers of both Microsoft and FedEx have find out what is the suitable way to manage, not to find out what is the one right way to manage. This is considered the new management way. Microsoft and FedEx are the new organizations: everything is international, everything is new, everything is faster and everything is turbulent (BPP, 2004). This managing method fits these two organizations because organizations change all the time. This method worked very well for FedEx as the leader of FedEx lead the company through the economic crisis in 2008 to survive (The New York Times, 2012) In total, contingency approach is the correct choice for their management. CONCLUSION How an organization achieves its goals and become successful is the managers and leaders concern. Therefore, leaders and managers should build good relationship with their subordinates as well as good organizational structure, culture and good leadership style.

Friday, October 25, 2019

Soft Money in Economics :: essays papers

Soft Money in Economics With each election cycle rolling around every 4 years, the various political parties, especially the Republican and Democratic parties, are setting new records for campaign contributions and raising higher and higher amounts of money toward their goals. It seems elected officials spend more and more time on fundraising and less time on working for the people they are sworn to serve! Now what is wrong with that picture? Does the phrase "We have the best government money can buy," mean what it says? If it did, our nation would be in serious trouble. Only  ¼ of 1% of the people give 80% of all campaign contributions. These special interest groups and wealthy individuals are controlling the people's government. Whether the issues are concerned over the military, education, Medicare, or Middle East issues, individuals like you and me have little or no say in what should be done to correct the situation. Soft money and the whole campaign finance reform issue is a very big concern to our economy. Yes it does have a more political stance then an economic stance but it will affect the regular hard working families of our nation. Have you ever taken the time to actually read the U.S. tax codes? If not, you are very lucky. It's a huge mess and hardly readable, but there is a reason why you can't read it. Former Sen. Wyche Fowler (D-Georgia) once said, " [E]very single interest that comes to you has got a special private interest where they are seeking to get subsidized, through the tax code†¦" Tax bills are a good place to hide those special legislative favors congressmen and women receive when they are elected. With the money donated from insurance industries, health professionals, and law firms and a huge amount of special interest groups, the resulting factor ends up being a tax system skewed toward big-money interests. How will this affect your standard of living? Well†¦lets look at the something everyone has problems with and that is oil and gas prices. The gas industry is a very generous industry for politicians and in turn very prosperous in reaping the benefits. In the '98 election cycle, ga s companies gave over $22 million in soft money contributions. This huge contribution gave gas companies a long list of tax breaks created by a Congress that is supposed to be the best money can buy.

Thursday, October 24, 2019

Amiri Baraka and the Black Arts Movement

The Postwar 1920s was decade of the â€Å"New Negro† and the Jazz Age â€Å"Harlem Renaissance,† or first Black Renaissance of literary, visual and performing arts. In the 1960s and 70s Vietnam War and Civil Right era, a new breed of black artists and intellectuals led what they called the Black Arts Movement. The Black Arts Movement came into being even as the rift between the black and white society in America widened in the 1960's, in the wake of Civil Rights movement, shaking the country's political and social stability. In fact, the history of African American poetry in the twentieth century can be divided not into two but three generations: the Harlem Renaissance of the 1920s and early 1930s, the post-Renaissance poetry of the 1940s and 1950s, and the Black Arts movement of the 1960s and 1970s. The Harlem Renaissance was the first major flowering of creative activity by African American writers, artists, and musicians in the twentieth century. In the 1940s and 1950s, there was   a revival of African American verse, led by Melvin Tolson, Gwendolyn Brooks, and Robert Heyden. Finally, a third wave of African American poetry emerged in the late 1960s with the Black Arts movement or Black Aesthetic. It was motivated by the newly emerging racial and political consciousness (Neal 236). Poets such as Amiri Baraka, June Jordan, Nikki Giovanni, Sonia Sanchez, Audre Lorde, Ishmael Reed , and Michael S. Harper produced poetry that was rawer in its language form and also often carried sharp, militant messages. While the Harlem Renaissance was the literary avant-garde movement, the Black Arts Movement was the poetic avant-garde of the 1960's. The Black Arts movement — also known as the New Black Consciousness, and the New Black Renaissance — began in the mid-1960s and lasted until the mid-1970s, though it lingered on for a while thereafter, even spreading into the 80s. The poetry, prose fiction, drama, and criticism written by African Americans during this period expressed a boldly militant attitude toward white American culture and its racist practices and ideologies. Slogans such as â€Å"Black Power,† â€Å"Black Pride† and â€Å"Black is Beautiful† represented a sense of political, social, and cultural freedom for African Americans, who had gained not only a heightened sense of their own oppression but also a greater feeling of solidarity with other parts of the black world: African and the Caribbean. The young artists of the Black Artists Movement were fighting for a cultural revolution (Woodard â€Å"Amiri Baraka† 60). The new spirit of militancy and cultural separatism that characterized the racial politics of the late 1960s had profound effects on the way African American poetry was written. There was pressure on African American poets, more than ever before, to produce work that was explicitly political in nature and that addressed issues of race and racial oppression. The Black Arts movement was strongly associated with the Black Power movement and its brand of radical and revolutionary politics. The emergence of Black Power as a mass slogan signaled a fundamental turning point in the modern Afro-American liberation struggle, carrying it to the threshold of a new phase. – Harry Haywood, Black Bolshevik (Quoted in Woodard â€Å"A Nation Within† 69) The Black Arts and the Black Power movement was further galvanized into action by the 1968 assassination of Martin Luther King , Jr. and by the angry riots and the burning of inner cities that ensued. (Wynter 109). The writers and artists of the Black Arts Movement had gone much further than Harlem Renaissance in asserting the larger political and spiritual identity of the Black people. Above all, Blacks tended to refuse to be judged by the dominant white standards of beauty, value and intelligence anymore (Leon 28). In the poems and critical statements of Amiri Baraka, Larry Neal and others, there was a new level of racial consciousness, and clearer process of self-definition. Their voice did not limit itself to   negative protest, but positively sought to provide a new vision of freedom. The young black poets of the Movement turned away from the formal or modernist styles of earlier black poets and promoted a poetic form that reflected the rawness of the streets. Most prominent among these poets were Amiri Baraka, Audre Lorde, Nikki Giovaani, Don L. Lee (Haki Madhubuti), Etheridge Knight, David Henderson, June Jordan, Ishmael Reed, Michael S. Harper, Clarence Major, Sonia Sanchez, Kayne Cortex, and Lucille Clifton. The dominant theme in African American poetry, has always been that of liberation, whether from slavery, from segregation, or even from a wish for integration into the mainstream white middle-class society. Another important theme in African American poetry has been the concern with a spiritual or mystical dimension, whether in religion, African mythology, or musical forms like hymns, blues, and jazz. Because the ‘mystical' presented a greater sense of freedom, in contrast to the oppression of the ‘political' and the ‘social'. The black avant-garde of the 60’s was rooted in the contemporary popular African American spiritual practices. James Stewart, in his essay â€Å"The Development of the Black Revolutionary Artist† in the anthology of Afro-American writing Black Fire, stresses on the nature and significance of the spirit: That spirit is black That spirit is non-white. That spirit is patois. That spirit is Samba. Voodoo. The black Baptist church in the South. (quoted in Smethurst 65) Moving from spirit, when it comes to the word the twentieth century black poetry involved references to both colloquial black speech, in terms of style and structure,. The young black poets of the 1960s focused much more heavily on the colloquial aspects of speech than their predecessors. They stressed   on the contemporary idiom of urban blacks, on references to specifically black culture and cultural practices, and on a realistic depiction of life in inner cities. These poems embodied a form of language and a depth of experience that was unfamiliar to most white readers. It is also clear that often the intent of the poem involved, at least in part, shocking the readers. During the epoch of slavery, white Americans regarded speech differences as an indication of black inferiority. Black people were stereotypically presented as speaking gibberish, and when they did make attempts at standard English, the results was scoffed at. Many nineteenth-century African American writers concentrated on demonstrating their command of standard English as a political defense against equating black speech with intellectual inferiority.   But others such as Paul Laurence Dunbar and Charles Chesnutt used dialect to express the authenticity of expressive black vernacular. During the 1920s Harlem Renaissance, and subsequently in a more intensified manner in the 1960s Black Arts Movement, African American writers became more intent on celebrating and capturing the nuances of black speech. Arguably, the most influential of the new black poets was Amiri Baraka. Born Leroi Jones in Newark, New Jersey, in 1934, Baraka published under that name until 1968. After graduating from Howard University, Baraka served in the Air Force until the age of twenty-four, when he moved to Greenwich Village in New York City and became part of the avant-garde literary scene, making friends with poets such as Allen Ginsberg, Charles Olson, and Frank O'Hara. During this period, Baraka was more drawn to the poetry and ideas of the Beats and other white avant-garde movements than to the politics of black separatism; he married a white woman; he wrote poems, essay, plays, and a novel within the context of the Beat counterculture; and he edited two magazines. However, Baraka's interest in racial issues was clear even in the early 1960s, as evidenced in his historical study Blues People: Negro Music in White America (1963) and in plays such Dutchman (1964) and The Slave (1964). In the mid-1960's, Baraka was deeply affected by the death of Malcom X, and subsequently changed the focus of his life. He divorced and moved to Harlem, he converted to the Muslim faith and took a new name (Charters 469). He then founded the Black Arts Repertory Theater/School in New York City and Spirit House in Newark. He became the leading spokesman for the Black Arts movement. He was nearly beaten to death in the Newark race riots of 1967. In 1968, Baraka co-edited Black Fire: An Anthology of Afro-American Writing, which included social essays, drama, and fiction as well as poetry. In 1969, he published his poetry collection Black Magic Poetry: 1961 – 1967. Baraka's poetry changed radically during the 1960s, as he turned from a vague sense of social alienation to a revolutionary vision which reflected deep affinity to black culture. Baraka's most famous poem is â€Å"Black Art† (1966) and has been called the signature poem of the Black Arts Movement, though critics tend to be strongly divided on it. Fuck poems and they are useful, wd they shoot come at you, love what you are, breathe like wrestlers, or shudder strangely after pissing. We want live words of the hip world live flesh & coursing blood. Hearts Brains Souls splintering fire. We want poems like fists beating niggers out of Jocks or dagger poems in the slimy bellies of the owner-jews. Black poems to smear on girdlemamma mulatto bitches whose brains are red jelly stuck between ‘lizabeth taylor's toes. Stinking Whores! We want â€Å"poems that kill.† Assassin poems, Poems that shoot guns. Poems that wrestle cops into alleys and take their weapons leaving them dead with tongues pulled out and sent to Ireland. Knockoff poems for dope selling wops or slick halfwhite politicians Airplane poems, rrrrrrrrrrrrrrr rrrrrrrrrrrrrrr †¦ tuhtuhtuhtuhtuhtuhtuhtuhtuh †¦ rrrrrrrrrrrrrrrr †¦ Setting fire and death to whities ass. Look at the Liberal Spokesman for the jews clutch his throat & puke himself into eternity †¦ rrrrrrrr – â€Å"The Black Art† (in part) (Quoted in Brennan 2) Normal boundaries of poetic language no longer are able to convey Baraka's rage, and therefore he resorts to the use of obscenities and raw sounds – rrrr†¦. tuhtuhtuh† — thereby turning language into the verbal guns of â€Å"poems that kill.† For Baraka, poetry is a weapon; it is not simply meant to create an aesthetic effect, it is meant to push some social and political cause. Poetry is not just meant to touch hearts and move people emotionally, but stir their souls and move them into action. Poetry is meant to raise consciousness of the masses and bring change into the world. Poetry is not a means of entertainment, it is a way to enlightenment, and beyond that, a path to empowerment. Baraka’s poems are raw, and often they mean war. Along with Baraka, perhaps the most significant poet to emerge from the Black Arts Movement was Audre Lorde. In addition to several volumes of poetry, beginning with The First Cities (1968), Lorde wrote essay (collected in her book Sister Outsider), an autobiographical account of her battle with cancer (The Cancer Journals), and a fictionalized â€Å"biomythography† (Zami: A New Spelling of My Name) (Wilson 95). Lorde's poems deal with her personal experience as an African American woman (she called herself, â€Å"a black feminist lesbian mother poet†), as well as with the contemporary experience of blacks both in the United States and throughout the world. Lorde is known for her evocative and very powerful use of imagery. In the poem â€Å"Coal† (1968), she says, â€Å"I am Black because I came from the earth's inside/ now take my word for jewel in the open light.† Lorde's poems are her â€Å"jewels† that allow her to reflect words outward into the world. Baraka's poem â€Å"SOS† (1966), begins with the words â€Å"Calling black people/ calling all black people, man woman child/ wherever you are† (Quoted in Collins, Crawford 29). The Black Arts Movement was above all a call to the black people to arouse themselves to action. It was an ideological platform.   It concentrated on the black experience, the oppression and injustice suffered by African Americans. In a critical essay on Baraka's â€Å"Black Art,† Brennan (4) says that art operates, that is to say, can operate, as a revolution. It has the power to destroy the status quo so that   a new reality is created. It was to this end — to create a new reality — that the poets of the Black Art movement struggled, albeit with very limited success. The movement did not last for long, but had a considerable impact on changing the perceptions of Americans toward the function and meaning of literature. Works Cited: Brennan, Sherry. â€Å"On the sound of water: Amiri Baraka's â€Å"Black Art† – Critical Essay† African American Review,   Summer-Fall, 2003. May 22, 2007, from Charters, Ann. The Portable Sixties Reader. New York  : Penguin Books, 2003 Collins, Lisa Gail and Margo Natalie Crawford. New Thoughts on the Black Arts Movement. New York : Rutgers State University, 2005 Leon, David De. Leaders from the 1960s: A Biographical Sourcebook of American Activism. Westport, CT : Greenwood Press, 1994 Neal, Larry. â€Å"The Black Arts Movement.† A Turbulent Voyage: Readings in African-American Studies. Ed. Floyd Windom Hayes. Lanham, Maryland : Rowman & Littlefield Publishers, 2000. 236-267. Smethurst, James Edward. The Black Arts Movement: Literary Nationalism in the 1960s and 1970s (The John Hope Franklin Series in African American History and Culture). University of North Carolina Press, 2005. Woodard, Komozi. A Nation Within a Nation: Amiri Baraka (LeRoi Jones) and Black Power Politics. The University of North Carolina Press, 1999 ——–.   â€Å"Amiri Baraka, the Congress of African People.† Black Power Movement: Rethinking the Civil Rights-Black Power Era. Ed. Peniel E.Joseph. Routledge, New York, 2006. 55-78. Wilson, Anna. Persuasive Fictions: Feminist Narrative and Critical Myth.   Cranbury, NJ : Associated University Presses, 2001 Wynter Sylvia. â€Å"On How We Mistook The Map for the Territory.† A Companion to African-American Studies. Ed. Jane Anna. Oxford : Blackwell Publishing, 2006. 107 – 118

Wednesday, October 23, 2019

Target Audience

Define your target audience. What are some characteristics associated with your target audience? One of the main drivers of Anheuser-Busch’s success over the past 150 years has been its ingenuity and innovation in advertising and marketing. As times changed, Anheuser-Busch always has created new ways to connect beer drinkers with its products (Marketing and Advertising, 2011). With the merge between Anheuser-Busch and Grupo Modelo we want to appeal to a broader range of people. Combined we hope to be the number one beer company in the world.Our goal is to appeal to the energetic young crowd and the business savvy older crowd. In the U. S. , beer is generally marketed to adult males. It is also closely associated with sporting events in which men represent over 80% of total US beer sales. Here at Anheuser-Busch and Grupo Modelo we do not want to alienate our broader consumer base. We will be sure to capitalize on the consumers that each company can bring individually but put ou r main focus on obtaining new consumers. Right now our target audience would consist of men and women between the ages 21 to 44 that are all over America and Spanish countries.Although our range is quite large there are separate target audiences with different characteristics for different beers. We are glad that we can target different ages and types of people through different beers. We feel it is important that we have a different types of beers for any palette. Our consumers are the ones that keep us alive and we make sure we conduct all our market research to give them what they want. The characteristics of our audience are very different for each beer. Budweiser is a very popular beer amongst males between the ages 21-34.Young adult males that are die hard sports fans are the largest population of beer drinkers. Budweiser serves their needs by providing them with top quality beer they enjoy as well as providing products such as apparel that intertwines with their sports team / person they enjoy (Quincy, S. , 2010). Corona is a very popular beer amongst males ages 21-35, and more now then ever before, females are becoming avid beer drinkers with the likings of Corona Lime. They are confident, fun people who don’t take life too seriously. They are past needing their buddies’ approval of the beer they drink.They believe that the mainstream beers everyone else is drinking don’t match the person they are–or the person they want to be. They’re open to change. They want a beer that reflects their personality. And they appreciate what Corona offers: an escape from the ordinary (Corona Extra: Miles Away From Ordinary. , 2006). Stella Artois is another popular beer, but it is popular amongst the older crowd. The consumer age range for this beer is 25-44. Beer drinkers age 25-34 are eighty-one percent more likely to drink Stella than other consumers in the projected population.Those between the ages 35-44 were eighteen percent mor e likely than the projected population to drink Stella Artois. Education seems to be a large factor in the Stella consumer. Data shows that the higher education a person has, the more likely they are to drink Stella. The typical Stella consumer is most often well educated with at least a college degree, if not a Masters Degree or higher. This audience consists of professionals such as doctors, lawyers, bankers, etc. (Ali, A. , & Smith, K. (2011). Appealing to so many different types of people is one aspect that we feel will make us successful in the long run.References Marketing and Advertising. (2011). Retrieved July 15, 2012, from http://anheuser-busch. com/s/ index. php/our-heritage/history/marketing-and-advertising/ Quincy, S. (2010). Budweiser: A Marketing Analysis. Retrieved from http://www. rantrave. com/Rave/ Budweiser-A-Marketing-Analysis. aspx Corona Extra: Miles Away From Ordinary. (2006). Retrieved 2012, from http://s3. amazonaws. com/ effie_assets/2006/367/2006_367_pdf_ 1. pdf Ali, A. , & Smith, K. (2011). Stella Artois Campaign [Powerpoint slides]. Retrieved July 15, 2012, from http://www. slideshare. net/KDSdesign/stella-campaign

Tuesday, October 22, 2019

Out Now The PrepScholar Guide to ACT Science Book!

Out Now The PrepScholar Guide to ACT Science Book! SAT / ACT Prep Online Guides and Tips Do you struggle with ACT Science? You’re not alone! Science is often the ACT section students feel least comfortable with because it’s so different from the science exams you take in school. Despite this,there are very few books specifically dedicated to ACT Science. At PrepScholar, we decided to use our expert ACT knowledge to fix that.The PrepScholar Guide to ACT Science is the book for students wanting to understand and ace ACT Science. It gives an in-depth analysis of the Science section and explains why students find it so tricky. It also analyzes every single type of passage and question you’ll see on ACT Science so that nothing will be a surprise on test day. By the end of the book, you’ll know all the tricks exam makers use to try to make students select the wrong answer, and you’ll be able to see through every one of them.This book will also walk you through the fastest and most effective way to study for the Science section. Instead of try ing to cram all the science information you learned in school, we give you a short list of every science fact you could be tested on in ACT Science. They contain the only science facts you need to know, so you can put your textbooks down and focus on studying smarter, not harder. We also explain multiple ways to read and attack Science passages so you can choose the strategy that gets you your highest score. Finally, all of these insights include high-quality sample problems and explanations throughout the book so you can understand how to use these skills on real ACT Science questions. You can buy the book on Amazon in either ebook or paper form. If you find it helpful consider leaving a review or sharing it with a friend!

Monday, October 21, 2019

Free Essays on Be Your Self

"if it floats his boat then let him row."... Free Essays on Be Your Self Free Essays on Be Your Self I don't see what the problem with people excepting the fact that people have the right of freedom of choice although they may not like what the person is choosing. Although it's not ethical for alot of people it is widely spreading across the world. People from all ethnicities becoming more open about their sexuality. Gays now as suppose to the early days are given more equality within the workplace and in society. Being a homosexual should not limit your way of life due to partiality of sexuality or moral belief. Like a lot of people I was a skeptical about homosexuality to it hit home and I got the full understanding why they chose that way of life. I asked my uncle what made him choose homosexuality and the only thing that he told me was " I didn't choose to be gay it chose me" I didn't get it but in his words he explained that he fells comfortable in the presence of male and that the love all people look for he desired in a man although confusing I would say in my own words " if it floats his boat then let him row."...

Sunday, October 20, 2019

Definition and Observations of Phonetics

Definition and Observations of Phonetics Phonetics is the branch of linguistics that deals with the sounds of speech and their production, combination, description, and representation by written symbols. Adjective: phonetic.  Pronounced [fah-NET-iks].  From the Greek, sound, voice A linguist who specializes in phonetics is known as a phonetician. As discussed below, the boundaries between the disciplines of phonetics and phonology arent always sharply defined. Examples and Observations of Phonetics Linguistics contributes to phonetics its phonological understanding of the distinctive patterns that make up the coded, conventional aspects of speech which differentiate individual words and other units of spoken language. Phonetics contributes to linguistics its phonetic understanding of the production and perception of the detailed artefacts of speech that embody those significant phonological patterns. Each contribution is complemented by the other. The Study of Phonemes In any language we can identify a small number of regularly used sounds (vowels and consonants) that we call phonemes; for example, the vowels in the words pin and pen are different phonemes, and so are the consonants at the beginning of the words pet and bet. Because of the notoriously confusing nature of English spelling, it is particularly important to learn to think of English pronunciation in terms of phonemes rather than letters of the alphabet; one must be aware, for example, that the word enough begins with the same vowel phoneme as that at the beginning of inept and ends with the same consonant as stuff. Phonetics and the Brain Until recently, we knew little about what is going on in the brain when people are speaking, and this is why the science of phonetics has concentrated on the three central components of the speech chain, where observation of what is going on is fairly straightforward. However, our understanding of how the brain works in speech communications has grown enormously in recent years. One of the most significant advances in recent research has been the development of safe and accurate brain-scanning techniques that can show us the activities of different parts of the brain when someone is speaking or listening to speech... Experimental Phonetics Phonetics is the study of speech. Traditionally, phoneticians have relied on their ears and eyes, and their awareness of their own vocal organs, to study pronunciation. Increasingly, however, they have been using instruments of various types to supplement the information they derive from their own sensations. Experimental phonetics, as the term is commonly used, includes any investigation of speech by means of instruments. It is understood here that the instruments are used to visualize some aspect of the speech event, and possibly also to provide a basis for measurements. For example, a tape recording for the purpose of repeated listening does not fall within the scope of experimental phonetics, but if the tape recording is fed into a computer and used to produce an acoustic analysis, the activity would be described as an experimental investigation. The Phonetics-Phonology Interface Phonetics interfaces with phonology in three ways. First, phonetics defines distinctive features. Second, phonetics explains many phonological patterns. These two interfaces constitute what has come to be called the substantive grounding of phonology. Sources John Laver, Linguistic Phonetics.  The Handbook of Linguistics, ed.  by Mark Aronoff and Janie Rees-Miller. Blackwell, 2001Peter Roach,  English Phonetics and Phonology: A Practical Course, 4th ed. Cambridge University Press, 2009(Peter Roach,  Phonetics. Oxford University Press, 2001)Katrina Hayward,  Experimental Phonetics: An Introduction. Routledge, 2014

Saturday, October 19, 2019

Consumer behaviour Essay Example | Topics and Well Written Essays - 1750 words - 2

Consumer behaviour - Essay Example Consumers generally do not have access to information for distinguishing a company like Primark whether it is ethical or unethical. The limitations of this research paper are that the findings derived from this research paper contradict the previous researches that are conducted on consumer behaviour. It is required to determine the demographical features for identifying the ethical buying behaviour of the consumers. The main analysis of this research is focussed on the concept of ethical consumerism. The research is focused towards understanding of consumer ethics and the purchasing behaviour or intention of the consumers that is associated with it. The author Brinkman, in his study has referred that the consumers are considering the ethical factor while purchasing of the product. The author has also explained that ethics influences the purchasing intention or buying behaviour of the consumers. The suppliers of the Primark are also aware of the intention of the consumers. Therefore they are committed towards their responsibility of providing quality products to its consumers. The increase in the consumer awareness towards the ethical issues and also the increase in the disposable income of the consumers have provided an opportunity to the consumers in exercising their ethical conscience. The author has also focused on the ethical shopping of the consumers which explains that the ethical shopping plays an important role in the modern era. The experience and the buying behaviour of the consumers are focused towards ethics. Ethical consumerism is attempting towards widening the moral dimension of the consumer preference by emphasi zing a relation between the production and consumption (Brinkmann, 2004). Contradicting the view of the author Brinkmann, the researcher Fisher has emphasized on the fact that the distinction

Friday, October 18, 2019

Debating Rococo's Role in the French Revolution Essay

Debating Rococo's Role in the French Revolution - Essay Example The lower classes were tired of the bourgeoisie taking advantage of them by taxing them mercilessly while people were struggling to survive in brutally horrible socioeconomic conditions. â€Å"But the poor, who paid for the†¦[wealthy aristocrats’ party] (because they were the only taxed segment of French society), the whole period had a let-them-eat-cake feel and helped ignite the French Revolution of 1789. The celebration started [with the death of King Louis XIV, when] French aristocrats felt liberated.†1 In fact, after Marie Antoinette said, â€Å"Let them eat cake,† that phrase was coined to mean that one had insensitivity to the plight of the less fortunate, and especially with regard to being poor. It was thought that the French aristocracy had no idea how much their own constituents were suffering in abject poverty while they attended lavish parties and lounged in luxury. III. The Precursor to the Revolution Many French did not take kindly to the noti on that the people and scenes being depicted in Rococo art was indeed true-to-life. They were angry that they were languishing in poverty while their aristocrat counterparts luxuriated in posh surroundings.

Intro to the Humanities Essay Example | Topics and Well Written Essays - 500 words

Intro to the Humanities - Essay Example The music of this era was very expressive, and melody became the central feature. Composers even used melody to display nationalism. This became a motivating force in the late Romantic period, as composers used rudiments of folk music to express their cultural identity. The romantic generation saw Beethoven as their ideal of a heroic artiste, a man who first devoted the Eroica Symphony to Consul Bonaparte as a champion of freedom and then dared Emperor Napoleon by striking him out from the dedication of the Symphony In the Romantic period, the virtuoso performances gained great popularity. Extraordinarily gifted performers - pianists, violinists, and singers all became extremely popular. Franz Liszt personified all of the great ambitions of the Romantic era, and several of its contradictions. In his early career, he was an extravagant virtuoso, an architect of new and adventurous music. Later, he became a priest, wrote sacred music, and championed the music of a new generation. As a virtuoso pianist, he filled his piano music with unbelievable technical demands, and represents the ultimate in nineteenth century virtuosity. George Gordon, Lord Byron was an Anglo-Scottish bard and a leading figure in Romanticism. Among Lord Byrons best-known works are the narrative poems Childe Harolds Pilgrimage and Don Juan. He was considered as one of the greatest European poets and remains widely read even today. Lord Byrons fame was due not only on his works but also on his life, which was marked by extravagant living, plentiful love affairs, debts, separation, and charges of incest and sodomy.The Byronic hero first created in Childe Harolds Pilgrimage is an idealized, but flawed, character exemplified in the life and writings of Lord Byron .Thomas B. Macauley defined the Byronic hero as, â€Å"proud moody, cynical with defiance on his brow, and misery in his heart implacable in revenge yet capable of deep and

A short literature review of the level of awareness amongst general Research Paper

A short literature review of the level of awareness amongst general dental practitioners regarding implant maintenance - Research Paper Example They carried out a survey among 100 (64 males & 34 females) general dental practitioners through a questionnaire, which was aimed to get the feedback and opinions from both general practitioners (GPs) and dental specialists with regard to periodontal care. Multivariate Logistic Regression was used to find out the key variable impacting the survey responses. They quoted that â€Å"In a study of a similar pattern, Zemanovich et al, have evaluated the demographic variables affecting patient referrals from general dental clinic to a periodontist. They concluded that various factors such as gender of the dentist and the proximity to a periodontist affected the number of referrals by a general dentist.† The results showed that 98% of the GPs conducted the initial surgical therapy by self without having any recommendation to do so and performed scaling whilst advising certain mouth washes and brushing techniques. However, the results revealed that over 67% of the dentists never performed splinting. The survey further revealed that the role of a periodontist was found limited to a surgical therapy and most of the dentists did not carry out a Root planning. Another key finding indicated that the dentists have a greater level of awareness with regard to methods demonstrating maintenance of oral hygiene. Despite having a sign of periodontal disease, we found that only 33% of the dentists referred patients to a periodontist. Further, many GPs do not believe that implant is a core of curing periodontal disease thus there is a difference in opinion among general dentists with regard to reliability of periodontal treatment. â€Å"Such studies should be performed in future to get an overall perception of the general dentists toward periodontal treatment in India. Such studies performed at different intervals of time in the same cities can also provide an idea about the changing trends

Thursday, October 17, 2019

Trade Unions Should Care About Equality, Ecological Sustainability, Coursework

Trade Unions Should Care About Equality, Ecological Sustainability, and Democracy and Collaborate with Unions in Other Countries - Coursework Example In order to move progressively forward in improving global economic, ecological, and social conditions, a decrease in disuniting nationalism between trade unions is necessary. In capitalist economies, businesses gain profit from exploiting the time of the workers. Because capitalist systems exist in a dynamic balancing act of dividing profit based on time between workers and their employers, wherein business strive to maximize their profit often resulting in poor wages and benefits for the individual, trade unions are a natural response to the pressures of this type of economic system (Yates, 2003, p. 203). Trade unions help to maintain high levels of employment and real income for skilled workers within a nation, though traditionally little international cooperation has existed. In the post-Second World War period economic boom, many trade unions were repressed by political forces. In the United States, these entities attempted to generate employer loyalty during the Cold War, resulting in the creation of labor-leader-statesmen that were unprepared for the struggles the working class would undergo after the economic boom (Yates, 2003, p.230-231). In developing nations, such as India, labor unions remain ineffective often because of the large portions of those unemployed, those marginally employed, and those employed in extremely poor conditions (Yates, 2003, p. 231). Some progress has been made by organizations such as the International Confederation of Free Trade Union in uniting multinational trade unions (Camdessus, 1996). Globalization is a force that cannot be fought, and trade unions must learn to function across national boundaries in the new global economy. Equality within an economy and between different nations is an important issue for trade unions.  

Research paper Example | Topics and Well Written Essays - 500 words - 8

Research Paper Example According to the JCAHO, the tracer methodology is a process of evaluating the patient status, whereby surveyors select patients and use their records in order to assess the organizations compliance to the set standards (Joint Commission retrieved from http://www.jointcommission.org/about/JointCommissionFaqs.aspx). The surveyors are able to trace the kind of the care process that the patient received by interviewing the staff in areas whereby the patient was attended. The surveyor then follows up the treatment process and determines whether the health institution has complied with the Joint commission standards. The major intent of the follow-up is to ensure that all health organizations are delivering high quality and safe healthcare. The process serves the purpose of monitoring the patient attendance and assessing the services of the health care organization Apart from gauging the health care center, the surveyors also identify points of potential weaknesses in terms of the organizations performance. After identifying the areas of weakness, the surveyors may educate the staff in the organization and share with them the strategies used by similar healthcare organization who have achieved better standards. Tracer activities help in identifying compliance issues that are crucial in determining the organizations compliance to the joint commission. On average, a three-day hospital survey is expected to complete 11 tracers using three surveyors (Joint Commission retrieved from http://www.jointcommission.org/about/JointCommissionFaqs.aspx). The system requires that the patients selected as tracers are those who have undergone multiple and complex services so that most aspects of the healthcare are evaluated. It is mandatory that the surveyor request the permission of the patient before starting the process. Upon completion

Wednesday, October 16, 2019

Trade Unions Should Care About Equality, Ecological Sustainability, Coursework

Trade Unions Should Care About Equality, Ecological Sustainability, and Democracy and Collaborate with Unions in Other Countries - Coursework Example In order to move progressively forward in improving global economic, ecological, and social conditions, a decrease in disuniting nationalism between trade unions is necessary. In capitalist economies, businesses gain profit from exploiting the time of the workers. Because capitalist systems exist in a dynamic balancing act of dividing profit based on time between workers and their employers, wherein business strive to maximize their profit often resulting in poor wages and benefits for the individual, trade unions are a natural response to the pressures of this type of economic system (Yates, 2003, p. 203). Trade unions help to maintain high levels of employment and real income for skilled workers within a nation, though traditionally little international cooperation has existed. In the post-Second World War period economic boom, many trade unions were repressed by political forces. In the United States, these entities attempted to generate employer loyalty during the Cold War, resulting in the creation of labor-leader-statesmen that were unprepared for the struggles the working class would undergo after the economic boom (Yates, 2003, p.230-231). In developing nations, such as India, labor unions remain ineffective often because of the large portions of those unemployed, those marginally employed, and those employed in extremely poor conditions (Yates, 2003, p. 231). Some progress has been made by organizations such as the International Confederation of Free Trade Union in uniting multinational trade unions (Camdessus, 1996). Globalization is a force that cannot be fought, and trade unions must learn to function across national boundaries in the new global economy. Equality within an economy and between different nations is an important issue for trade unions.  

Tuesday, October 15, 2019

Abraham Lincoln and Primary Documents Quiz Essay Example for Free

Abraham Lincoln and Primary Documents Quiz Essay 1. One writer maintains that slaves in the South are the â€Å"happiest† and â€Å"freest† people in the world and workers in the North are not. How this is so? 2. For O’Sullivan, how would California benefit once separated from Mexico? 3. According to Angelina Grimke, what could women do to contribute to the abolition of slavery? Women played a vital role in the campaign to abolish slavery, although they themselves lacked even the right to vote. Their campaign techniques were employed to great effect in the struggle for suffrage. In the early years, women influenced the campaign to abolish slavery, but they were not direct activists. This accorded with the prevalent view of women as a moral not a political force. As the campaign gained popularity, they could publish anti-slavery poems and stories. 4. Why does Lincoln in the â€Å"House Divided† speech believe the pro-slavery side was winning regarding the expansion of slavery in the territories? Why does Calhoun in opposing the Compromise of 1850 think the South was at a disadvantage? Because starting the new year of 1854 found slavery excluded from more than half the States by State Constitutions, and from most of the National territory by Congressional prohibition. Four days later, commenced the struggle which ended in repealing that Congressional prohibition. This opened all the National territory to slavery, and was the first point gained†¦Ã¢â‚¬ ¦ Although each side received benefits, the north seemed to gain the most. The North had absolute control over the government. The South 5. Garrison and Fitzhugh refer to Declaration of Independence in their excerpts. How do they use the Declaration? Garrison uses Jefferson’s declaration as a foundation that to prove his thought and to convince the society. his â€Å"Declaration of Sentiments of the American Anti-Slavery Convention† is strongly convincing. He confirms â€Å"that all persons of color, ought to be admitted forthwith to the enjoyment f the same privileges, and the exercise of the same prerogatives, as others; and that the paths of preferment, of wealth, and of intelligence, should be opened as widely to them as to persons of a white complexion.† No matter what are your skin color, and what gender you are in, all people should have the way to be educated, rich and happy. What he advocates is quite similar with Jefferson’s claim that all man have the right to â€Å"pursuit their happiness†. George Fitzhugh’s ideas are totally against Garrison. He is a representative of thought that men are not born equal. Whites are strong, healthy, smart, and blacks are weak, sickly, and foolish. He stated that â€Å"Their natural inequalities beget inequalities of rights.† African American is stupid so they deserve to have no right. Furthermore, African Americans are lower than whites; they cannot survive in society without being â€Å"modified† so they need the white man for survival. However, I disagree with Fitzhugh. I think the reason why black people is â€Å"foolish†, and cannot competitive with white people is they are not allowed to get access to knowledge. White people control their lives and brainwash their minds; therefore, they only have a narrow view that they deserve to be slaves, and they ought to do free labor work for whites. They are â€Å"foolish† because they are uneducated, and because how whites treat them. If African Americans were educated, then they would be a threat to white people. They are kept â€Å"foolish† so it is easy to control them. 6. What were the strategies of Garrison and Douglass in opposing slavery? 7. Compare Lincoln’s First and Second Inaugural addresses. What do you think was his purpose in each? Lincolns main purpose in his First Inaugural Address was to allay the anxieties of the southern states that their property, peace, and personal security were endangered because a Republican administration was taking office. The purpose of Lincolns second inaugural address was to state that slavery was the key component that led to the civil war and he stated that it was possible that slavery had offended God and he retaliated by causing conflict which started the war. He said that since there was now peace, they should take advantage of that and begin a time of reconciliation where there was malice towards no one and charity for everyone†¦Ã¢â‚¬ ¦..Lincoln contradicts himself, giving false hope to southerners hoping to hold onto slavery. He says in his first Inaugural address that he has no plans to interfere (directly or indirectly) with the institution of slavery, also saying he had no right to do so. He still holds onto the idea of secession and how we are a perpetual union and by no means should we be divided. Lincoln leaves the idea of taking actions towards slavery in his first address mainly to win some supporters in the middle states, paying off with West Virginias loyalty to the union. Towards the end of the Civil War, Lincoln make a transformation as he turns bolder (evident in his second inaugural address), disowning slavery and all of its practices, issuing the Emancipation Proclamation. This new view of Lincoln sent a loathsome spirit throughout the South, especially for Lincoln.

Monday, October 14, 2019

The Smartphone Security Awareness Information Technology Essay

The Smartphone Security Awareness Information Technology Essay Over the past decade mobile phones have become pervasive and have evolved significantly from feature phones to smartphones to fit the increasing needs of the competitive market and to meet consumers wants and needs. The purpose of this research paper is to provide insight and raise security awareness into the risks posed by unsecured smart mobile devices. Smartphones are ubiquitous devices and are comparative to the personal computer in terms of computational power, choice of operating systems, software with the same extended features and the ability to support 3rd party software. Smartphones have enabled businesses and their workforce the freedom to collaborate and access organizational data 24 hours a day, 365 days a year. What has been done to protect individuals and businesses from the ever increasing threat of mobile orientated attacks? Pervasive computing (also called ubiquitous computing) Endpoint security antivirus/malware enterprise information infrastructure mobile information security perspective security awareness training technical topics are outside the scope of this research Introduction The purpose of this document is to expose a business problem from a technological viewpoint. The subject of the business problem I have selected is on smartphone security awareness. This subject will be analysed and critically evaluated, then expanded upon further to reflect the range of possible solutions and create a comprehensive guide for the benefit of the reader. 1.1 Motivation The motivation for this project was mostly due to my vocational role as an IT consultant. During the course of my employment over the past decade within the IT industry, I have noticed a substantial gap within businesses for the need of greater smartphone security and awareness. It was obvious to me that along with the evolution and improved capabilities of cellular devices, established a greater risk for organisations. This thesis is the result of work I have personally carried out in various roles throughout my technological career between October 2004 and December 2010. 1.2 Aims and objectives The following are my aims and objectives for this project Aims Create an authoritative document with recommendations to raise awareness and inform businesses for the need of greater mobile security within the business environment. Use insight to establish a research gap. Main objectives Assess smart mobile devices currently used. Analyse security advantages and disadvantages of smart mobile devices. Establish what risks smart mobile devices are exposed to. Evaluate impact of risk exposed by unsecure mobile devices to businesses. Examine mobile security currently available. Investigate responsibility Evaluate current business policies and procedures for mobile devices and how these are enforced. Construct smartphone security guide with recommendations for businesses. 1.3 Problem Statement The problem is information and financial loss due to information theft or inaccessibility from malicious software (malware), and the detrimental impact this has upon the business. There are many types of information that can be stored on smartphones for example, personally identifiable information in the form of contact details (phone, address), email, GPS coordinatesà ¢Ã¢â€š ¬Ã‚ ¦ Information security has gained significant value within the business domain over the past decade however this value remains subjective. Users have been made aware of the risks posed by malicious software whilst using their personal computer on the internet, now assistive technology like smart mobile devices are becoming increasingly more powerful, functional and ubiquitous. Where personal computers have at least some security software in place as standard, smartphones commonly have no security software installed and are susceptible to the same threats as personal computers. Businesses, professionals and personal users now have a greater awareness for the need of personal computer security. This has been provided by media coverage, enterprise training or through personal experience. When using a personal computer or laptop for example, it is common to find a firewall and antivirus software installed showing that internet safety has now become a social normalcy. Example http://www.bloobble.com/broadband-presentations/presentations?itemid=3397 Data loss or inaccessibility due to a virus, data theft due to Smartphones are high specification mobile personal computers, and are subject to the same risks personal computers are open to. There are four to five billion mobile phones and we are approaching a billion smart phones. But remember that these devices are more powerful than supercomputers were a few years ago, and we are putting them in the hands of people whove never had anything like it before. Google CEO Eric Schmidt Businesses need IT to function, IT adds value and to compete in todays economic climate. ITs purpose is to save time, time is money. Todays organisations rely heavily upon information technology in order to allow their business to function (Khosrowpour, 2001). This is fundamentally due to how intricate information technology systems are embedded into organisations. Enterprise architecture (EA) is a communication tool between IT and business (Zachman, 2004). EA is multifaceted (Wagter et al, 2005) and for the scope of the project I will be examining how the Security Architecture (SA) facet can benefit organisations to secure the Information Technology within the business against the increasing threat that unsecured mobile devices pose. There are many different mobile operating systems for smart mobile devices requiring different security applications. I will analyse these systems and the risks associated. My intentions are to investigate what impacts smart mobile devices can have on businesses, why these problems affect the organisation, and how they are overcome. Finally I will gather insight and make recommendations that businesses can use to foresee and prevent future unnecessary costs and risk. 2 Literature review 2.1 Background The subject I have proposed to use for this project is a very real-world business and information technology problem. Because smartphone security is still in its infancy, it is currently quite a challenge to source accurate and relevant information from authoritative sources such as Emerald without resorting to web based research. However, the more this project advances smartphone security in the media is becoming omnipresent. The first documented computer virus was designed over 25years ago by two brothers named name 1 and name 2 in Pakistan, the virus was called the brain virusà ¢Ã¢â€š ¬Ã‚ ¦ Timeline evolution of the mobile telephone (Malware) Analogue Cellular Mobile History / Uses 2.2 Current status/Development of theories Information is all that needs to be secured. Malware is changing, smartphones are changing and businesses are changing. How far up the technological ladder are mobiles/feature phones/smartphones 2.3 How this project fits in with the literature review I had chosen the subject then chosen the literature review method, thus tailoring the literature review to fit the requirements of the project. 3 Research methods 3.1 Introduction: hypothesis Throughout my employment, I recognised a gap and need for smartphone security within 3.2 Epistemology http://www.learnhigher.ac.uk/analysethis/main/quantitative1.html One of the methods of analysis I will to use is the conceptual method, this has been described by Beaney as a way of breaking down or analysing concepts into their constituent parts in order to gain knowledge. Conceptual analysis consists primarily in breaking down or analysing concepts into their constituent parts in order to gain knowledge or a better understanding of a particular philosophical issue in which the concept is involved (Beaney 2003). I have interpreted this to mean the compartmentalisation and analysis of data. The proposed project will be delivered using an analytical in-depth research structure. I have chosen this project structure as it will primarily be research based on the current business problem as previously stated. I intend to analyse this problem, propose possible solutions, test and implement a well-documented solution with recommendations. Critical and creative thinking skills such as Edward.De Bono six thinking hats will be used to examine the problem domain. A review will be given on how the systems work and compare them to how they should work. I will then analyse the solution domain by examining which options are available to improve the system security along with an optimal recommendation and the benefits it would provide. 3.3 Methodology Figure research methodFor my project I will implement a triangulated, positivistic methodological approach, I have chosen this particular technique as it will provide me a balanced view of the subject area. I will incorporate both quantitative and qualitative primary research methods as recommended by Bryman (BRYMAN, 2006). However for the scope of this project I will be mostly using Quantitative based research as indicted in Fig 1 below. . Bryman advises that quantitative data can be gathered by way of a survey and qualitative research collected from journals and interviews. Initially I will undertake primary research in the form of a survey questionnaire, and furthermore I will interview professionals in the field of smartphones and security such as police personnel, security advisors and mobile phone shop staff. The survey will be available to respondents in paper form and electronically hosted so any user with internet access may access it. I will design the survey to be concise and simple to maximise the amount of respondents and gain quality information. My target survey participants are business managers, IT professionals and general smartphone users. I have chosen to target these particular users as I am trying to ascertain not only the perception of smartphone security but also what policies and procedures are put in place and how aware users are of these. I have proposed to target these users by using a popular internet based technological social news website named Reddit. Reddit has a daily turnover of over 850.000 unique users (Alexa, 2010). According to Alexa the average Redditor is male, between the age of 18 to 44, does not have children, is well educated and browses Reddit either from work or home, suggesting that the majority of Redditors are working professionals and due to being a technological social news website the average user is technologically aware (Alexa, 2010). This confirms my premise and establishes that Reddit would suit my proposed target survey participant. There are many options available for online survey software, each option has its benefits and weaknesses, I have carefully analysed these options personally and have chosen to utilise the cloud based option Survey Monkey to host my survey. The default limitations of Survey Monkey are the survey itself has been designed to be logical with closed questioning and Qualitative data has been sourced from reliable and authoritative resources. I have chosen journals from Emerald Primary research methods used Interviewing mobile phone shop staff, police, business owners I will critically analyse the results of my survey by comparing the answers given to a risk register. 4 Results 4.1 Presentation and description of results Who took part? A survey was conducted to establish the awareness for the need of smartphone security. Users were openly invited from technological backgrounds to partake in the survey and assured of anonymity. A total of 758 people responded to the online survey from a possible 854,998 potential participants. The survey itself was open for one month during February and March 2011. The results indicated that majority share with 82% of survey responders being male as opposed to the 18% that were female both averaging at 26 years of age, this confirms part of my original hypothesis as an average smartphone user. When asked, 53% of respondents reported that they had used their smartphone solely for personal use as opposed to the 45% of partakers that reported they used their smartphone for both business and personal use, with just 2% reporting to use a smartphone solely for business use only as shown in Fig 2 combining a total of 47%.C:UsersLeeDesktopUniUniversity 2010_11MikeDissertationDocumentsDissertationSurveySurvey monkey charts8 FeaturesSM_Features_Line.png Figure Smartphone use 25% of respondents had only been using smartphones for the past six months, 17% were aware they had been using them for at least a year and a majority percentage of 59% had been using smartphones for more than one year. Only 12% of respondents opted to use the pay as you go payment facilities as opposed to the greater majority of 88% that have contracts. SMARTPHONE 34% of respondents used an Apple IPhone, 58% reported to use Android smartphones, 13% used Blackberries and 6% (46) of respondents had Nokia smartphones. (GRAPHIC) 87% of respondents had used calendar functions, 94% of respondents used email, 86% of used games, 87% of respondents used GPS features, 74% of respondents used instant messaging, 52 % of respondents used internet banking facilities, 66% of respondents used multimedia messaging service (MMS), 94% of respondents used the short messaging service (SMS) feature and 78% of respondents admitted to using social networking sites on their smartphone. A total of 756 participants responded and 2 participators chose not to answer the question. From a total of 758 respondents, 63% (476) valued the physical smartphone above the 37% (282) whom valued the information more. Applications 93% of survey partakers used 3G for mobile data communication, 59% of respondents used Bluetooth technology, only 4% of had used infrared line of sight technology, 75% of respondents admitted to connecting via universal serial bus (USB), 94% of participators had used wireless for mobile data communication. Total of 757 participators answered this question and 1 partaker chose to skip the question. Security Survey respondents considered smartphone security as beneficial but not essential as the majority answer with 64% (485), 21% (159) didnt not consider there to be a need currently for smartphone security software as opposed to 15% (114) whom considered smartphone security software as absolutely essential. A total of 758 of 758 responded to this question. 87% Of participants stated that they do not use any smartphone security software. 87% of participants reported that they did not use any form of smartphone security software such as antivirus as opposed to 13% that did. A majority of 92% (699) had not been advised of any security methods to protect them or their information from fraud, theft or malicious software. 8% (59) respondents agreed they had received adequate security advice. Everyone answered this. Malware 95% (694) of respondents were aware of Adware, 27% had known about Badware, 25% (181) of respondents were aware of Crimeware, 69% (504) had previous knowledge of Rootkits, Trojans'(95%, 696), Spyware (95%, 697), and Worm (90%, 656)were the most commonly aware terms of malware from the malicious software list, the majority being Virus (711) with 97% of respondents being aware of this type of malware. 731 respondents answered this question. 62% of survey participants reported that they did not pay attention to licence agreements and permissions when installing applications on their smartphones 34% reported they did read the licence agreements and permissions. 4% of respondents believed that this question was not applicable to them for their smartphone use. Personal Computer 81% of responders were aware for the need of security software for personal computers and 19% were not aware. All survey partakers responded to this question. 94% (713) participants have connected their smartphone to a personal computer (PC), 6% (46) stated they had not ever connected to a PC. All 758 respondents answered this question. 96% (728) respondents stated that they owned the smartphone, only 4% (30) of respondents had employer owned smartphones. All partakers responded to this question. Responsibility Out of the 758 respondents, 15% (115) were aware of policies within their place of business, with the majority of respondents 41% (309) unaware of any workplace policies or procedures particularly orientated toward smartphones. 44% (334) responded that the question was not applicable to them. All participants answered this question. 4.2 Discussion and interpretation of the results Awareness and concern Compare phones and age to security awareness Bb were the most security aware group Internet banking is true by smartphone antivirus is false and user is aware of computer antivirus need. Harris Interactive: Tablet users more likely to transfer sensitive data than smartphone users Serendipity, sagacity 5 Smartphones A mobile phone is a portable electronic device used to make and receive telephone calls. The mobile phone was first revealed by Dr Martin Cooper from the company Motorola in 1973, it was not until ten years after Dr Coopers demonstration that Motorola released its flagship mobile phone the DynaTAC, this was the worlds first commercially viable mobile phone (Motorola, 2009). Originally these devices were commercially targeted at businesses and upper class individuals as the cost of the device was very high and the actual usage was severely restricted, due to the technology limitations at this time battery weight was 2kg (Motorola, 2009) and the battery duration would last a maximum of 30 minutes thus making the device impractical and available only to businesses and professional consumers. According to Moores Law, the number of transistors on a chip roughly doubles every two years. (Intel, 2005) As Moore stated over thirty five years ago, due to the advancement of processors, battery technologies and overall reduced power consumption, mobile phones have become lighter, smaller, more powerful and longer lasting. Due to these fundamental technological advancements mobile phones have been able to incorporate additional existing technologies such as camera units, sensors, speakers and often take advantage of JAVA based applications and features, thus coining the term Feature phone. Feature phones are more advanced technologically than mobile phones. Smartphone The term smartphone is ambiguous and many experts fail to agree on a suitable definition. Most smartphone features are not exclusive to a particular category, this project does not intend to make that definition, however for the scope of this project I have listed combined definitions and compared current smartphone features as listed in Figure 3 below. Most vendorsà ¢Ã¢â€š ¬Ã‚ ¦ type more Gartner, a world leading authority in information technology research define smartphones as A large-screen, voice-centric handheld device designed to offer complete phone functions while simultaneously functioning as a personal digital assistant.'(Gartner, 2010) Feature phones can have several of the characteristics as listed below in figure 3, however smartphones have the capability of providing all the capabilities. As a result, any mobile device meeting all conditions of each function in figure 3 can be considered a smartphone under this definition. Figure Smartphone characteristics Function Characteristic Phone size Device is compact and easily transported. Operating System Operating system that allows third party applications. Connectivity Device provides multiple methods (wired and wireless) of connecting to both the internet and other devices and networks. Input The device contains keyboard, or touchscreen keyboard. Storage capacity The device has a large and expandable storage facility. Office functionality The device provides the ability to perform basic office tasks such as email, take notes and word processing. Calendar The device includes a digital organiser and calendar. Synchronisation The device supports synchronisation of information with fixed desktop or laptop devices, or online web services. Phone Features The mobile device executes voice, text and multimedia message functions. Sensors Acceloratormeter, light, sound and movement sensors. A model to measure the maturity of smartphone security at softwareà ¢Ã¢â€š ¬Ã‚ ¦ Under this definition of smartphones or Smart Mobile Device (SMD) the following mobile platforms were included: Apple iOS Blackberry Google Android Symbian Windows Mobile These mobile platforms were reported to be the top 5 mobile platforms used in 2010 Figure (?) Storage expansion cards Smartphones currently reside in the top tier of mobile communication technology. Third party operating system As previously stated there are many smartphone platforms available, each platform and brand bringing different benefits and functionality. These platforms or operating systems create opportunities for both businesses and personal users. For businesses this increased functionality provides the facility for added employee productivity. These opportunities exist not just for business and personal users as the opportunity extends to the bad guys too, I will continue to explain further in the document. Smartphone Definition A smartphone is defined as A cellular telephone with built-in applications and Internet access (PCMAG, 2010) describes a smartphone as a à ¢Ã¢â€š ¬Ã‚ ¦ andà ¢Ã¢â€š ¬Ã‚ ¦ describes it asà ¢Ã¢â€š ¬Ã‚ ¦I have interpreted these descriptions and define smartphones as not feature phones basically. All smartphones have generalised functionality, such as input devices (keys, touchscreen) I will go into greater detail regarding the operating features Botha, et al (2009) point out that early generations of cell phones and PDAs had relatively little storage capability. Johnson (2009) indicates that todays generation of devices can be quickly and easily upgraded by adding additional storage cards. http://mobileopportunity.blogspot.com/2007/01/shape-of-smartphone-and-mobile-data.html 5.1 Apple The Apple Iphone was the original smartphone (), first released in June 2007. Popular, perceived security (apple store, scans for malware?) Simplistic design Limitations: NO support for flash 5.2 Android Open source, will be biggest 5.3 Blackberry (RIM) Security architecture built upon military specification, perceived most secure as email encryption (tunnelled) through Canada Banned in UAE 5.4 Symbian Owned by Finnish giant Nokia open sourcing the software opens up the availability of the Source Code to programmers, who can then develop, modify and distribute as they see fit meaning a richer and hopefully what becomes a considerably improved OS very quickly thanks to developer input. http://blog.mobiles.co.uk/mobile-news/symbian-os-goes-open-source/ http://blog.mobiles.co.uk/wp-content/uploads/2010/02/symbian.jpg Most popular globally, acquired by Microsoft? 5.5 Windows mobile Newest player, least perceived secure device 6 Smartphone role within business environment 6.1 Email 7 Malware defined Continuously evolving, changing creative Virology Malware encompasses Define Malware (Family) Malware, short for  malicious software http://en.wikipedia.org/wiki/Malware Grimes (2001) defines malware as any software program designed to move from computer to computer and network to network to intentionally modify computer systems without the consent of the owner or operator. Etsebeth, V. (2007) Sensory malware soundminer, a stealthly Trojan with innocuous permissions that can sense the context of its audible surroundings to target and extract a very small amount of HIGH-VALUE DATA. Give example 7.1 Badware Give example 7.2 Crimeware Collecting company secrets for profit Crimeware is malicious software that is covertly installed on computers. Most crimeware progams are in fact Trojans. There are many types of Trojans designed to do different things. For example, some are used to log every key you type (keyloggers), some capture screenshots when you are using banking websites, some download other malicious code, and others let a remote hacker access your system. What they each have in common is the ability to steal your confidential information such as passwords and PINs and send it back to the criminal. Armed with this information, the cybercriminal is then able to steal your money. http://www.kaspersky.com/crimeware Give example 7.3 Greyware Adware spyware Give example 7.4 Riskware Give example 7.5 Rootkits iPad and smartphone rootkits demod by boffins http://www.theregister.co.uk/2010/02/23/smartphone_rootkits_demoed/ Give example 7.4 Scareware Give example 7.5 Trojan Give example 7.6 Virus Give example 8 Define Risk to business or individual Mobile banking 8.1 Define Legal implications http://www.oucs.ox.ac.uk/its3/seminar-notes/2005-05-18-DataSecurityLaw.pdf Computer related crime Dishonestly obtaining electronic communication service Section 125 of the Communications Act 2003 creates an offence in relation to dishonestly obtaining use of an electronic communication service with intent to avoid payment of the charge applicable to that service. This offence reflects the continual advancement of technology, thus covering all the diverse types of services available Theft of information Oxford v Moss (1979) Unauthorised use of a computer: theft of services Theft Act 1968, s. 13 dishonestly uses without due authority, or dishonestly causes to be wasted or diverted, any electricityà ¢Ã¢â€š ¬Ã‚ ¦ Criminal damage à ¢Ã¢â€š ¬Ã‚ ¢ Intangible (Computer Misuse Act 1990, s.3) unauthorised modification: to impair the operation, prevent or hinder access or reliability denial of service: The Caffrey problem à ¢Ã¢â€š ¬Ã‚ ¢ Case law insiders à ¢Ã¢â€š ¬Ã‚ ¢ Whitaker (1993) à ¢Ã¢â€š ¬Ã‚ ¢ Lindesay (2000) virus writers à ¢Ã¢â€š ¬Ã‚ ¢ e.g. Pile (1995), Vallor (2003) 8.2 Responsibility Examine who is responsible Define Solutions Effects and results of infected device on company with each malware type 9 Security Security doesnt exist in products and verbiage alone; it requires a process, people, policies, education, and technologies working together. http://www.informationweek.com/news/showArticle.jhtml?articleID=6502997 9.1 ISO27002 9.2 COBIT 5 Schedule to release in 2011, COBIT 5 will consolidate and integrate the  COBIT 4.1, Val IT 2.0 and Risk IT frameworks and also draw significantly from the Business Model for Information Security (BMIS) and ITAF. http://www.isaca.org/Knowledge-Center/COBIT/Pages/Overview.aspx Security updates? 9.3 Smartphone security solutions http://www.networkworld.com/news/2011/020911-ibm-juniper-mobile-security.html 10 Conclusions Moores Law http://venturebeat.com/2010/08/13/moore%E2%80%99s-law-hits-a-wall-trouble-for-mobile-growth/#disqus_thread 10.1 Summary 10.2 Future work Mobile wallets customers will be able to transfer funds from their bank account/paypal using their phones via text message (http://www.cs.virginia.edu/~robins/Malware_Goes_Mobile.pdf) http://en.wikipedia.org/wiki/NirvanaPhone future smartphone symbiant acquisitioned by Microsoft (biggest os for pcs) newest player to smartphone market. As Sensor-rich smartphones become more ubiquitous, sensory malware has the potential to breach the privacy of individuals at mass scales. https://www.cs.indiana.edu/~kapadia/papers/soundminer-ndss11.pdf 11 Glossary PC Personal computer PDA Personal digital assistant Prosumer Professional + consumer = advanced consumer (Cisco, 2008) http://www.cisco.com/web/about/ac79/docs/wp/Prosumer_VS2_POV_0404_FINAL.pdf

Sunday, October 13, 2019

The 18th Amendment :: Alcohol

To drink or no? Ever since the first people stumbled across alcohol (and then each other) this has been a question commonly asked. Statistics show that a majority of domestic violence, automobile accidents, and rape, all involve (many times) alcohol. Whether one thinks consumption is "right" or not has been asked by people for people from time to time. This would be the case of the 18th Amendment of 1919. The Act passed by those concerned with the above-mentioned problems, prohibited the vending, transportation of, and consumption of alcohol. The law was intended to be enforced nation-wide. Police raided and trashed many vendors to stop their trade. Sometimes however, the police took their share of the whiskey they were supposed to break, and paid reporters to look the other way. On the whole, prohibition was effective in smaller town/cities, but worked a bit less in the larger cities. It is said that for every market that is destroyed, a new underground market is created. This was exactly the case with prohibition. Though domestic violence did decrease, much crime increased. Bootlegers (people who made/sold their own whiskey) popped up everywhere. Speakeasies, which were underground bars, were frequented by virtually everyone. Seceret drinking was considered a glamorous thing-even in Washington parties. Bootlegging gangs began to increase, thus an increase in street crime occured. One of the most famous of these gangsters was Al Capone. Capone's bootlegging ring earned him approximately 60,000,000 dollars a year. One example of gang related crime was the St. Valentines Day Massacre, in which Capones's gang gunned down and killed seven members of "Bugs" Morgans' gang.

Saturday, October 12, 2019

What is love? Essay -- Literary Analysis, Shakespeare

The word Love may mean many things to different people. For some it can be dangerous and complex, whereas for others it can be simple, yet fulfilling. Many have also attempted to prove the meaning of love, some successful, others not. In the poems A Valediction: Forbidding Mourning by John Donne and Sonnet 147 by William Shakespeare, both authors view love from opposite spectrums. They both attempt to argue what the meaning of love really is. They do this, by using imagery and symbols, and by writing in extended metaphors. In both A Valediction: Forbidding Mourning and Sonnet 147, Donne and Shakespeare’s use of imagery and symbolism are well used to describe the meaning of love according to them. Death is a recurrent image in both poems. In Sonnet 147, Shakespeare compares the love he has for a woman to a disease. Oftentimes disease is associated with death. He uses this imagery, first when he states â€Å"Desire is death† (8); meaning the desire or love he has for this woman, is indeed deadly; a disease which is figuratively leading to his death. Shortly after this, Shakespeare refers to this woman as â€Å"Black as hell, as dark as night† (14) although this may not seem like death right away, one must remember that the colour black and night often signify the idea of death. The line before this states â€Å"I have sworn thee fair, and thought thee bright† (13) Therefore the idea he had of this woman, used to be bright and loving, however he now finds her in a way, evil a nd associates the metaphorical death of his heart to her. Despite using death imagery, Shakespeare also uses medical imagery in the poem. Ultimately disease is associated with medicine. There are a slew of words in the poem which symbolize medical imagery; the words Shak... ...(31-34) In this metaphor, his wife is the fix’d foot which â€Å"in the centre sit†, as she always remains in the same spot, waiting for her husband, the other foot, to return home. Donne writes this, not so much as a love poem, but more as a plea for his wife not to worry about his absence, that their love will only grow stronger, and for her not to be scared that he wont return as (the compass) â€Å"makes me end where I begun.† (38) Despite not being classified a metaphysical poet, Shakespeare like Donne, was very famous for his wordplay and metaphors. Although both authors take different stands on the meaning of love, Donne a positive one and Shakespeare a more negative view; both authors attempt to prove this using imagery and symbols and extended metaphors. The use of metaphors in both Donne and Shakespeare’s poems are intricately intertwined with genius wordplay.

Friday, October 11, 2019

Autobiography: Family and Blake Austin Summers

My name is Blake Austin Summers. I am 14 years old and in the 9th grade and go to Wayne School of Engineering. I have brown eyes with short hair. I am white and half Asian. I have a family of four, mom, dad, brother, sister, and also have two pets. My birthday is on Septet 5, 1998. I was born and raised in North Carolina in a town named Goldberg. I used to live on Seymour Johnson Air force Base. https://donemyessay.com/italian-facial-features/When my dad retired we had to move. I currently live in a two story house, and have been there since 2005. I have been to many places in the United States before. I have a lot of relatives from both sides of my parent's. They all live in different states. My favorite color is blue and my favorite type of food is Italian. I have two best friends named Vive and Katie. The things I like to do on my free time is listen to music, hang with my friends, go outside to walk, and get on my computer.I am currently in karate as a black belt in two styles. I am really good with computers and most technology. The school I'm going to offers better academics and I plan on achieving my goals there. Those goals are to graduate with a high diploma and associated degree, which will help me and have me a step forward. When I become older I want to be a psychologist because I love to help people with their problems.