Thursday, October 31, 2019

Chronic Obstructive Pulmonary Disease Essay Example | Topics and Well Written Essays - 2000 words

Chronic Obstructive Pulmonary Disease - Essay Example It is quite unfortunate that over the past three decades the research has not shown much progress, it has focused only on the pathogenic roles of cigarette smoke, inflammation, protease and antiprotease balance. Research has also established an association of COPD with cigarette smoking; and patients with emphysema are known to suffer from a gene deficiency in an inhibitor of a neutrophils protease (Stang et al, 2000). The theory of cigarette-inflammation-protease has done a lot in the field of COPD epidemiology and pathology but is not able to reduce the pervasiveness and morbidity caused by COPD. It is therefore imperative to impose an urgent necessity for research in this area. The research is directed to sustain novel concepts and innovative experimental approaches and techniques pertinently suitable to COPD research. The research is also directed to explicate the cellular pathways involved in COPD pathogenesis. This is a step helpful in clinical trials of potential therapeutics. Explanation of these pathways is the step to develop a capability of pharmaceutical industry to design the mechanism specific drugs. (http://www.nhlbi.nih.gov/meetings/workshops/copd_wksp.htm) The anonymity of COPD pathogenesis: COPD encompasses emphysema and chronic obstructive bronchitis, both these conditions relentlessly limits airflow that is not significantly reversed by bronchodilators. COPD progressively turn down the pulmonary functions with a rapid pace as compared to that in normal aging. Stimulating factors known to induce changes in animal lungs are cigarette smoke, pancreatic elastase, bacterial lipopolysaccharides, cadmium, chloramine-T, oxidants, silica, and rigorous malnourishment (Shapiro, 2000). It is established that many apparently dissimilar pathways are capable of causing emphysema or bronchitis,

Tuesday, October 29, 2019

Business Ethics in today's America Essay Example | Topics and Well Written Essays - 500 words

Business Ethics in today's America - Essay Example To familiarize more Americans, and especially the professionals with ethics, American business ethics was taught in American institutions of higher learning as a course, starting the period before 1970s. This led to America becoming a society that highly relied and employed business as well as social ethics in its different operations at the state and community level. In 1976, the Social Issues in Management Division of the Academy of Management was founded, out of the need and awareness of the aspect of business ethics. Similarly, in 1980, the Society for Business Ethics was founded, and the period after this has been marked with great awareness of business ethics among the American population. This business ethics consciousness molded a culture of ethics that has revolutionized to become the contemporary American business ethical environment (Petrick, Cragg & SanËÅ"udo, 2012). Since the American business ethics greatly borrows from social ethics, it is therefore, largely involved in social issues as well. However, greater reinforcement in business ethics falls on the actions and activities of the players in the business environment. These include companies, both small and big, as well as the employees of companies, as these act as representatives of the companies they work for. The overall actions and operations of companies are guided by the laid down standards of ethics, to which, most companies subscribe to more than one of them. In addition, American business ethics involves the theoretical parts, which companies must also adhere to. One of these areas is concerned with environmental protection. Each company must prove that it is responsible for the environment. This is through participation in activities that promote environmental safety. The companies must as well engage in practices that will not contribute to environmental degradation. This includ es tree-planting activities,

Sunday, October 27, 2019

Analysis of Phosphate Solubilizing Bacteria in Soil

Analysis of Phosphate Solubilizing Bacteria in Soil 1. INTRODUCTION Cereals are the world’s major source of food for human nutrition and rice (Oryza sativa L.) is one of the predominant cereal crop and represent staple diet for more than two fifth of the world population. To feed the ever increasing human population, the world’s yearly rice manufacturing to be bound by an obligation act out of 560 million tonnes to 760 million tonnes by 2020. The future increase in rice production has to come from the same or even reduced land area and the productivity yield (per ha) must be greatly enhanced by providing additional nutrient input and through effective control of phytopathogens. Blast disease of rice caused by Pyricularia oryzae is one of the most destructive fungal diseases of rice causing loss up to 90% and has a ubiquitous occurrence in almost all the rice growing countries (Mehrothra, 1980). Phosphorus has been called â€Å"the key of life† because it is directly involved in most of the life processes. Next to nitrogen it is invariably classified as one of the macronutrients and it is a key element in frequency of use as fertilizer. It serves as a primary energy source for microbial oxidation. It is a constituent substance in life processes. Soil cannot give high yields if it is deficient in phosphate. Different mechanisms have been suggested for the solubilization of inorganic phosphorus by phosphate solubilize. It is usually accepted that the important mechanism of mineral phosphate solubilization is the movement of organic acids the combination of various thing into one whole by soil microorganisms (Halder et al., 1990). Manufacturing of organic acids results in acidification of the microbial cell and its lying on the outskrits. Resultant, inorganic phosphate may be released from a mineral phosphate by proton addition for Calcium ion (Goldstein, 1994). The production of organic acids by PSB has been deep notifified. Among them, gluconic acid seems to be the most repeated occurance agent of mineral phosphate solubilization. Being an in specified microorganism is known to be involved in the solubilization of insoluble phosphates (Alexander, 1977). These phosphate-solubilizing microorganisms render insoluble phosphate into soluble group formed completely the series of acidification and chelation of some reactions. This process not only compensates for higher cost of manufacturing fertilizers in industry but also mobilizes the fertilizers added to soil (Rodriguez and Reynaldo, 1999). Therefore, many researchers have tried to increase the plant-available phosphate fraction by means of Phosphate solubilizing microorganisms (PSMs) such as Achromobacter sp, Agrobacterium sp, Alcaligens sp, Bacillus cereus, B. polymyxa, B. megaterium, B. subtilis, Pseudomonas striata and Xanthomonas sp and Fungi like Aspergillus niger, A. flavus, A. fumigatus, Penicillium sp. and Rhizopus sp. Several mechanisms of plant microbe interaction may participate in the association and affect plant growth, including IAA, Siderophore production and biocontrol against Pyricularia oryzae. Thus, the Plant Growth Promoting Rhizobacteria (PGPR) affect the plant growth through direct promotion by producing plant growth promoting substances and through indirect promotion by acting against plant pathogenic microorganisms (Kloepper et al., 1989). Plant growth promoting rhizobacteria (PGPR) are free living, soil borne bacteria, which enhance the growth of the plant either directly or indirectly (Kloepper et al., 1980; Glick and Ibid, 1995). The direct mechanisms involve nitrogen fixation, phosphorus solubilization, HCN production, manufacturing of phytohormones such as auxins, cytokinins and gibberellins, and lowering of ethylene concentration (Glick and Ibid, 1995; Glick et al., 1999). Bacteria belonging to the genera Azospirillum, Pseudomonas, Xanthomonas, and Rhizobium as well as Alcaligenes faecalis, Enterobacter cloacae, Acetobacter diazotrophicus and Bradyrhizobium japonicum have been shown to that which is produced auxins which help in inducing plant growth increase (Patten and Glick, 2002). There are many reports on plant growth pro ­motion and yield enhancement by plant growth promoting rhizobacteria (PGPR) (Lugtenberg et al., 2001). The mechanisms of plant growth increase the pro ­motion by PGPR include: the ability to produce phytohormones, N2 fixation, antagonism against phytopathogens and solubilization of insoluble phosphates (Lugtenberg and Kamilova, 2009). It was also suggested that the PGPR can also prevent the deleterious effects of stresses from the environ ­ment (Paul and Nair, 2008). Composting is a biotechnological process by which different microbial communities convert organic wastes into a stabilized form. During the process, temperatures arise because of the heat released due to biological activity. These temperatures are responsible for pathogen inactivation. Composting is an aerobic process that requires O2, optimal moisture and enough free air space and C:N ratio within certain limits. The treatment by composting leads to the development of microbial populations, which causes numerous physicochemical changes within mixture. These changes could influence the metal distribution through release of heavy metals during organic matter mineralization or the metal solubilization by the decrease of pH, metal biosorption by the microbial biomass or metal complexation with the newly formed humic substances or other factors (Rahul Kumar et al., 2010). One of the most effective means of recycling any organic wastes for agricultural use is by means of composting, an accepted practice in India and elsewhere. In many cases in India, it is valuable to add nutrients to compost to increase its fertilizer value. Although, sugar industry wastes are relatively high in nitrogen, calcium, magnesium and potassium, they are generally deficient in phosphorus, iron and zinc when compared to fertilizers commonly used in India. Further, the possibility of enriching organic wastes with micronutrients like Fe and Zn, which have become critical in crop production, have been studied and their effectiveness is increased appreciably through combined application of organics with FeSO4 and ZnSO4 in addition to N, P, K fertilizers (Deepa Devi, 1992; Sennimalai, 1994). Therefore, it is appropriate to develop composting systems that are capable of converting these agroindustrial wastes into valuable organic fertilizers. Among the microbes, bacteria are the most important one for decomposing waste. Bacteria use press mud for their metabolism and finally they produce some simple and useful compounds from them which are important for soil health, plant growth and over all to keep well balance of natural ecosystem (Zaved et al., 2008). Moreover, efficien ­cy of bacterial in bioconversion or organic compounds is well documented (Petre et al., 1999; Suhaimi et al., 2012). Unfortunately, knowledge on physico-chemical and mi ­crobial diversity of bacteria on bioconversion of sugarcane press mud is limited. Therefore, this study was conducted to monitor the chemical and biological changes during composting of sugarcane press mud with cattle manure in order to get high quality stabilized product within the goal of shortening the stabilization time. The pressmud biocompost contains appreciable amount of plant nutrients viz., organic carbon, nitrogen, phosphorus, potassium, calcium and magnesium along with traces of micronutrients viz., Zn, Fe, Cu and Mn (Banulekha, 2007). The beneficial effect of the organic matter for enhancing the soil fertility and thereby improving the crop productivity is well established (Laird et al., 2001). Objectives of the present study To collect the soil samples from ten different locations in Cuddalore district, Tamil Nadu, India. To isolate and identify the Phosphate solubilizing bacteria (Bacillus subtilis, Bacillus megaterium, Enterobacter asburiae) from collected soil samples. To screen the efficient Phosphate solubilizing bacterial isolates based on production of plant growth promoting substances. Composting of sugar mill waste (pressmud) by Phosphobacterial isolates and analysis of nutrient status of compost mixtures. To study the combined effect of efficient phosphobacterial isolates and compost mixture for the growth and yield of Paddy BPT-5804(Oryza sativa L.) Cellulose, hemicellulose and lignin become or make less indicate in the present study during the bacterial consortium based composting process. Singh and Sharma (2002) reported rapid decomposition of wheat straw with a mixture of cellulolytic fungi, Pleurotus sajor-caju, Trichoderma reesei, Aspergillus niger along with nitrogen fixing bacteria Azotobacter chroococcum. The simulated activity of bacterial consortium present in the waste substrate ability to do have characterised by intensity cellulolysis and lignolysis as advised done by Loquet et al. (1984). Hemicellulosic residue of pressmud contains a large quantity of xylans. Xylanase are enzymes that are capable of degrading xylan units yielding large quantities of monomeric xylose units. The xylanases activities during composting. The xylanase activity in all the treatments was found to be on the 30th day and thereafter a sharp decline was noticed. During 90th days maximum xylanase activity recorded in CM – 8 (Pressmud + Bacillus subtilis + Bacillus megaterium + Enterobacter asburiae) (5.91 U ml-1 of protein) followed by CM -5 (4.93 U ml-1 of protein), CM – 6 (3.91 U ml-1 of protein), CM – 3 (3.89 U ml-1 of protein), CM – 2 (3.00 U ml-1 of protein), CM – 4 (2.92 U ml-1 of protein) and CM – 6 (2.00 U ml-1 of protein). The minimum amount of xylanase activity recorded in CM – 1 (pressmud alone) (1.82 U ml-1 of protein). The survival and microbial activity during the entire composting process was studied by estimating dehydrogenase activity. During 90th day, maximum dehydrogenase activity recorded in CM – 8 (Pressmud + Bacillus subtilis + Bacillus megaterium + Enterobacter asburiae) (3.09 mg formazon formed h-1 g-1) followed by CM – 7 (2.95 mg formazon formed h-1 g-1), CM 6 (2.39 mg formazon formed h-1 g-1), CM – 5 (2.30 mg formazon formed h-1 g-1), CM – 4 (1.71 mg formazon formed h-1 g-1), CM – 3 (1.70 mg formazon formed h-1 g-1) and CM – 2 (1.68 mg formazon formed h-1 g-1). Lower amount of dehydrogenase activity recorded in CM – 1 (Pressmud alone) (1.00 mg formazon formed h-1 g-1). In general, percentage cellulose reduction increased thereafter decrease in the period of decomposition in press mud up to end of 90days. The initial cellulose content of pressmud was 15.75 % explained. During 90th day, maximum cellulose reduction recorded in CM – 8 (Pressmud + Bacillus subtilis + Bacillus megaterium + Enterobacter asburiae) (3.81%) followed by CM – 5 (3.88%), CM – 6 (3.99%), CM – 7 (4.09%), CM – 3 (4.2%), CM – 2 (4.62%) and CM – 4 (4.65%). The minimum cellulose reduction recorded in CM – 1 (pressmud alone) (5.62%). Changes in reduction of hemicellulose content during composting of pressmud are studied. From the results, it was noticed that the reduction of hemicellulose content increased thereafter decreased in all treatments. During 90th day, reduction in hemicellulose content recorded in CM – 8 (Pressmud + Bacillus subtilis +Bacillus megaterium + Enterobacter asburiae) (7.76%) followed by CM – 6 (7.85%), CM – 5 (7.90%), CM – 7 (7.92%), CM – 3 (7.95%), CM – 2 (9.22%) and CM – 4 (9.37%). Least amount of reduction in hemicellulose content recorded in CM – 1 (Pressmud alone) (13.00%). Inoculation levels were found to have significant ef ­fect on reduction in lignin content. During 90th day, reduction of lignin content in triple inoculants compost mixture recorded in CM – 8 (Pressmud + Bacillus subtilis +Bacillus megaterium + Enterobacter asburiae) (6.10%), followed by CM – 5 (6.31), CM – 6 (6.64%), CM – 7 (6.69%), CM – 2 (6.81%), CM – 2 (7.60%) and CM – 4 (7.70%). The lowest reduction in lignin content recorded in CM – 1 (Pressmud alone) (8.24%). Faryal et al. (2006) have suggested the effects of inoculation with three thermophilic species of Bacillus on the composting activity of drainage water that passes through sewers sludge amended with black combustible mineral fly the grey soft remains as the causer or source. The bacteria population present in the compost mixtures were estimated quantitatively during the 90th day. In all the treatments the bacterial population was more in CM – 8 (29.32 Ãâ€" 106 cfu g-1) and less in CM-1 (15.00 Ãâ€" 106 cfu g-1). The effect of Compost mixture (Pressmud + Bacillus subtilis + Bacillus megaterium + Enterobacter asburiae) and Phosphate solubilizing bacteria on plant height of paddy var BPT – 5804 (Oryza sativa L.) was measured. Among the various treatments tested, the highest plant height was recorded in the treatment T8 (75% NPK + Compost Mixture 8 + BS + BM + EA) (121 .98 cm). The least plant height was recorded in T9 (Control) (89.30 cm). The effect of Compost mixture (Pressmud + Bacillus subtilis + Bacillus megaterium + Enterobacter asburiae) and Phosphate solubilizing bacteria on Dry matter production of paddy var BPT 5804 (Oryza sativa L.) was investigated. Among the nine treatments tested, the dry matter production was maximum in treatment T8 (75% NPK + CM+BS+BM+EA) (8.12 t ha-1). The lowest chlorophyll content was recorded in T9 (Control) (4.00 t ha-1). The effect of Compost mixture (Pressmud + Bacillus subtilis + Bacillus megaterium + Enterobacter asburiae) and Phosphate solubilizing bacteria on Leaf area index at flowering of paddy var BPT 5804 (Oryza sativa L.) was investigated. Among the nine treatments tested, the Leaf area index at flowering was maximum in treatment T8 (75% NPK + CM+BS+BM+EA) (6.42 cm). The lowest grain yield was recorded in T9 (Control) (3.98cm). The Compost mixture (Pressmud + Bacillus subtilis + Bacillus megaterium + Enterobacter asburiae) and Phosphate solubilizing bacteria on chlorophyll content of paddy var BPT 5804 (Oryza sativa L.) was investigated. Among the nine treatments tested, the chlorophyll content was maximum in the treatment T8 (75% NPK + CM+BS+BM+EA) (3.09 mg/g of leaf). The lowest chlorophyll content was recorded in T9 (Control) (3.00 mg/g of leaf). The effect of Compost mixture (Pressmud + Bacillus subtilis + Bacillus megaterium + Enterobacter asburiae) and Phosphate solubilizing bacteria on number of tillers plant1 of paddy var BPT 5804 (Oryza sativa L.) was investigated. Among the nine treatments tested, the number of tillers plant -1 was maximum in treatment T8 (75% NPK + CM+BS+BM+EA) (18.86). The treatment T1 (100% NPK) (18.52) was on par with the treatment T8. The lowest tillers plant1 was recorded in T9 (Control) (10.56). The effect of Compost mixture (Pressmud + Bacillus subtilis + Bacillus megaterium + Enterobacter asburiae) and Phosphate solubilizing bacteria on Number of tillers panicles hill -1 of paddy var BPT 5804 (Oryza sativa L.) was investigated. Among the nine treatments tested, the Number of tillers panicles hill -1 was maximum in treatment T8 (75% NPK + CM+BS+BM+EA) (6.37). The treatment T1 (100% NPK) (6.01) was on par with the treatment T8. The minimum tillers panicles hill -1 was recorded in T9 (Control) (3.00). The effect of Compost mixture (Pressmud + Bacillus subtilis + Bacillus megaterium + Enterobacter asburiae) and Phosphate solubilizing bacteria on Number of filled grains panicles -1 of paddy var BPT 5804 (Oryza sativa L.) was investigated. Among the nine treatments tested, the Number of filled grains panicles-1 was maximum in treatment T8 (75% NPK + CM+BS+BM+EA) (73.03). The treatment T1 (100% NPK) (72.78) was on par with the treatment T8. The lowest filled grains panicles-1 was recorded in T9 (Control) (57.24). The effect of Compost mixture (Pressmud + Bacillus subtilis + Bacillus megaterium + Enterobacter asburiae) and Phosphate solubilizing bacteria on Number of thousand grain weight of paddy var BPT 5804 (Oryza sativa L.) was investigated. Among the nine treatments tested, the No of thousand grain weight was maximum in treatment T8 (75% NPK + CM + BS + BM + EA) (21.56). The treatment T1 (100% NPK) (21.01) was on par with T8. The minimum grain weight was recorded in T9 (Control) (14.23). The effect of Compost mixture (Pressmud + Bacillus subtilis + Bacillus megaterium + Enterobacter asburiae) and Phosphate solubilizing bacteria on grain yield and straw yield of paddy var BPT 5804 (Oryza sativa L.) was investigated. Among the nine treatments tested, the grain yield and straw yield content was maximum in treatment T8 (75% NPK + CM + BS + BM + EA) (47.36), (63.76) and the treatment T1 (100% NPK) (46.88), (63.24) was on par with the treatment T8. The lowest grain yield was recorded in T9 (Control) (25.23), (49.76). The effect of Compost mixture and Phosphate solubilizing bacteria on nutrients uptake (N, P K) was determined. Among the treatments tested, maximum NPK uptake was recorded in the treatment T8 (75% NPK + BS + BM + EA) (121.56 kg ha-1), (22.86 kg ha-1), (118.73 kg ha-1). The treatment T1 (100% NPK) (121.02 kg ha-1), (22.41 kg ha-1) and (118.31 kg ha-1) was on par with the treatment T8. The lowest NPK was recorded in T9 (Control) (92.85 kg ha-1), (11.77 kg ha-1) and (89.82 kg ha-1). The effect of Compost mixture and Phosphate solubilizing bacteria on nutrients uptake (N, P K) was determined. Among the treatments tested, maximum NPK uptake was recorded in the treatment T8 (75% NPK + BS + BM + EA) (72.85 kg ha-1) (18.73 kg ha-1) and (81.67 kg ha-1). The treatment T1 (100% NPK) (72.43 kg ha-1), (18.51 kg ha-1) and (81.47 kg ha-1) was on par with T8. The minimum NPK was recorded in T9 (Control) (46.21 kg ha-1), (08.05 kg ha-1) and (56.12 kg ha-1) The effect of Compost mixture and Phosphate solubilizing bacteria on bacterial population was studied. Highest bacterial population was recorded in the treatment T8 (Bacteria – 36.66 Ãâ€" 106 cfu g-1 and the lowest bacterial population (19.27 Ãâ€" 106 cfu g-1).

Friday, October 25, 2019

The Dysfunctional Family of Shakespeares King Lear Essay -- King Lear

The Dysfunctional Family of King Lear      Ã‚  Ã‚  Ã‚   One of the reasons why Shakespeare is so thoroughly read today is because of his ability to portray human nature so accurately through his characters.   Shakespeare's play, King Lear shows us that humans are treacherous and selfish.   We can also relate to the play because of the family issues that Shakespeare incorporates throughout the work.   Lear's family is definitely a dysfunctional one.   However, the disrupted family unit is the basis for the play's tragedy.   The Contemporary Guide to Literary Terms defines tragedy as "a piece of writing that inspires fear or pity, through which the audience/reader experiences catharsis" (a purging of emotions).   Tragic plots should have a clear beginning, middle and end that all involve the protagonist in some way.   It is essential in this play for King Lear to have serious family problems in order for him to become a tragic hero.   The whole premise of the plot is based on his conniving daugh ters (with help from Lear's ego).   These family problems turn Lear into a tragic hero.   Much the same could be said about Gloucester, which will also be examined in this paper.      It is universally agreed that the primary source for the story of King Lear and his daughters was the anonymous earlier play known as The True Chronicle History of King Leir (usually abbreviated to King Leir or just Leir), which was not published until 1605 but was probably performed in 1594 or earlier (Thompson, 13).   Shakespeare's King Lear is a detailed description of the consequences of one's man actions, and the behavior of his family.   Lear is the king of England in this play, who decides to distribute his kingdom amongst his three daughters... ...otagonist in the work who suffers great emotional and physical pain, which the reader/audience can identify and sympathize with.   This hero must also suffer and/or die, which is unacceptable but inevitable.   King Lear is such a hero, the result of both egocentrism and family problems.   Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚   Works Cited Frey, C.   Experiencing Shakespeare.   Columbia: University of Missouri Press, 1988. Granville-Barker, H.   Prefaces to Shakespeare.   London: B.T. Batsford INC, 1984. Halio, J.   The Tragedy of King Lear.   Cambridge: Cambridge University Press, 1992. Kimbrough, R.   Shakespeare and the Art of Human Kindness.   NJ: Humanities Press   Ã‚  Ã‚   International, 1990. Thompson, A.   King Lear Criticism.   NJ: Humanities Press International, 1988. Vickers, B.   Appropriating Shakespeare.   New Haven: Yale University Press, 1993.   

Thursday, October 24, 2019

Motivate or influence behavior Essay

Communication is defined by the text as the process by which information is exchanged and understood by two or more people, usually with the intent to motivate or influence behavior. ____ is necessary for communication to be considered two-way. Feedback Which of the following, in the communication process, has the responsibility to decode the symbols and interpret the meaning of the message? Receiver ____ and ____ are potential sources for communication errors, because knowledge, attitudes, and background act as filters. Decoding, encoding Channel richness refers to the amount of information that can be transmitted during a communication episode. Which communication channel would be most successful to inform managers of impending company-wide layoff? Face-to-face contact When an electronic mail system is installed as part of the communication system, what element of the communication process is changed? Channel ____ does not focus on a single receiver, uses limited information cues, and does not permit feedback. Bulletins Compared to men, women tend to use their unique conversational style to show involvement. Which of the following is the most familiar and obvious flow of formal communication? Downward communication ____ refers to messages designed to motivate employees to adopt the company’s mission and cultural values and to participate in special ceremonies. Indoctrination Many organizations use suggestion boxes, open door policies, and surveys to facilitate centralized Which of the following links employees in all directions, ranging from the president through middle management, support staff, and line employees? The grapevine What percent of the details passed through a grapevine is accurate? 70 to 90 percent According to the text, all of the following are ways managers can improve their writing skills EXCEPT: Write lengthy explanations One of the most important things that a manager can do for the organization, according to the text, is to create a climate of trust and openness. Managers’ communication is _______-directed, in that it directs everyone’s attention toward the vision, values, and desired goals of the team or organization and influences people to act in a way to achieve the goals. purpose Which of the following is the best advice for written communication that is highly important? Get a second opinion To be effective communicators, managers should: Encourage the use of multiple channels of communication

Wednesday, October 23, 2019

Human Resources Management Essay

The present state of recession in the IT Industry – as a Human Resource Manager how are you going to undertake Human Resource Planning at Macro Level to tide over this crisis? Human capital formation is acknowledged as one of the most potent sources in contributing directly and significantly to economic growth. As a result even the objectives of economic planning and priorities thereof, began to be shifted away from purely growth oriented development strategies to those that recognize and partly remedy the past neglect of such social sectors like population, planning, health, education, housing, social security and other social services. The objectives of HRP at macro level are to ensure that the organisation: a) Obtains and retains the quality and quantity of human resources it needs at the right time and place; and b) Makes optimal utilisation of these resources. Human resource planning is the formal process of linking organizational strategy with human resource practices. It is about perceiving organizational practices as a whole and not piecemeal. In a competitive climate, organizations need to use models and approaches that secure ‘uniqueness’ of operations along with enhancing ‘organizational capability’. Today, the world is going through, a global economic turmoil. This recession affects almost all the fields especially IT field. To overcome the adverse effect of the economic slowdown, we should plan an effective human resource policy at macro level. Human resource plan is designed to pay attention to shaping the priorities of the H R function than on supporting activities relating to the organization’s functioning as a whole. The economic crisis of 2008/2009 has touched every industry and profession,  radically altering the hiring landscape. Major layoffs, rising unemployment, and lowered profits have reshaped the way workers are hired and fired, and dramatically highlighted the need to rethink workforce planning. Now, the question lingering over the heads of business leaders everywhere is: What will the successful post-recession business look like? Here, we wanted to find out how what steps they are taking in response to the crisis, how their priorities and practices have changed, and what they predict the HR landscape will look like as the economy recovers. This study is focus on the following objectives: 1.How HR Processes got affected by Recession? 2. What was the Reactions of Recession? 3. What HR steps Companies are taking to prepare for Recovery from Recession? 4. What are the Envision on post-recovery staffing model? 5. What are the Roles of Temporary Workforce? 6. What are Managed Serviced Program & its Benefit? First let us brief about Recession. A recession is a contraction phase of the business cycle where significant decline in economic activity lasts more than a few months, which is normally visible in real GDP real income, employment, industrial production, and wholesale-retail sales. The current economic recession has hardly spared any country on earth. Rich countries like USA, UK, Germany, Australia, Japan, and Canada almost all the rich countries have got badly hurt from the recession. So, there is no reason to be surprised to know that Indian economy is also getting hurt from the global economic recession. As a Human resource manager planning is one of the most important sources in contributing the economic growth. To overcome from the recession in IT industry I would like to retain and obtain pure quality of human resources all ways at the right time and at the right place. I ensure that all the resources are utilized properly .I as a human resource manager responsible  for corporate plan along with organizations purpose as the top most priority. The KRA at macro level are: 1- Determine the requirement level in the organization keeping recession in mind. 2- To get the best from the resources available within the organization. 3- Assist productivity bargaining. 4- Evaluate cost of man power in any upcoming new projects coming. 5- Analyze the cost of all the overhead and value associated with it with the function 6- Need to decide whether certain activities need to be sub contracted. 7- Need to provide best training in order to retain talent. 8- Anticipate redundancies. 9- Need to forecast future requirement. 10- Serve as a basis of management development programme The human resource planning is one of the most crucial, complex and continuing managerial function. It is a multi step function with various issues. The issue which needed to cater first are 1- Deciding objective and goal.2- Estimating future organizational structure ,3- Auditing human resources,4-Planning job requirement and job description.5- development of human resource plan. In the recession time in the IT industry it is very important to relate future human resources to future enterprise need so that the return on investment on human gets maximized. The company’s human resources mamager is as much an advocate for the organization as it is for the employees. The responsibility to serve the interests and needs of both can be challenging, especially during a recession when it could difficult to sustain both the company and its workforce. The HR issues during a recession demand an even greater commitment to achieving stability for the company and assuring employees that they won’t endure the harsh effects of a recession. Strategy Strategic direction is an ongoing discussion between HR and company’s  leadership. During a recession, HR Manager’s involvement in developing the company’s strategy should be a priority. Workforce planning, compensation structure and employee satisfaction aren’t just HR goals — they’re organizational goals because the workforce is company’s most valuable resource. Sustaining company’s operations and its profitability largely depends on employee productivity. The communication between HR Manager and the company’s leadership should be candid, frequent and must include communication with employees about the company’s direction. Company Status If the company is recession-proof, meaning it provides necessary products or services, the role of HR manager is to remind employees that the company is forging ahead despite an economic meltdown. As the saying goes, the only sure things in life are death and taxes; therefore, the most recession-proof businesses are likely mortuaries and accounting firms. On the other hand, if the company will be affected by a recession, HR manager’s role is to assist company leaders in describing the business strategy for staying afloat and keeping employees apprised of the company’s status and direction. Employee Communication The employee turnover during a recession could be minimal simply because companies that aren’t recession-proof are closing, which means there are fewer job market opportunities. Leaving a job with a company that is surviving the recession for another one that might not survive could be a bad decision. Therefore, HR’s primary job includes communicating with employees about the company’s status, what it’s doing to be profitable and what it needs the employees to do to ensure the company’s survival. This conveys two important messages. It says you care enough about your workforce to keep them informed and you value their contributions in helping the company make it through the recession. Job Security If I am in a position where I need to hire additional staff, ensure that I am not making any cuts to current employees’ wages. That is likely to make employees wonder if their livelihood is a priority or if the company places more value on input from outsiders. Provide training for employees to take on new responsibilities instead of recruiting an external candidate to do the job. Effective crisis management doesn’t mean eliminating training for employees, according to The Boston Consulting Group 2009 survey of HR measures. In fact, the joint survey conducted with the European Association for People Management revealed that more than 30 percent of the companies that scaled back training — individual and special training — was less effective and demonstrated lower commitment levels during a crisis, such as a recession. Training also conveys the important message that you’re investing in your existing staff, training them to work cross-functionally an d thereby preparing them for continued employment in case their current jobs are eliminated because of the recession. Layoffs If HR must lay off workers, establish a communication strategy that gives employees plenty of notice before the actual layoff. Consult the U.S. Department of Labor Worker Adjustment and Retraining Notification Act, WARN, to determine if you meet the criteria for complying with WARN regulations. Ease the blow of unemployment by scheduling the layoff so it doesn’t coincide untimely with periods such as the year-end holiday season. HR should offer outplacement services to employees who are forced to seek employment elsewhere. Outplacement services can range from career counseling sessions with experts to resume-writing services or time off from work for interviews. Compensation and Benefits HR might not be able to guarantee that employees will get year-end bonuses or even a wage increase, but HR can help employees figure out ways to increase their take-home pay. When employees have questions about their wages, tax withholding and liability or the cost of benefits, such as health insurance premiums and retirement savings ensure the company can provide answers. An HR benefits specialist can guide employees through the decision-making process by advising them to cut back on, say, charitable contributions that are being deducted from their net pay. The benefits specialist also can  refer employees to resources for managing their finances, such as an employee-assistance program. Summary HR managers reported opting for a wide range of practices to respond to the severe pressures presented by the recession. These practices range from changes to pay and pensions, staffing and HR systems, to changes in working time arrangements. While pay freezes for some or all employees were common, pay cuts too operated in a substantial number of firms. Other pay-related measures adopted include lower pay or salary scales for new entrants, bonus cuts and changes in pension arrangements. In terms of headcount and staffing arrangements, changes were also pronounced in that most firms in the survey experienced redundancy (compulsory and voluntary) for some employees. Freezes on recruitment were also commonly instituted. The effects of the recession on a wide range of business and the subsequent pressures experienced by HR managers, was examined next in chapter four. The HR managers present at the focus groups outlined in detail the ways in which they were required to cut and control employee costs in response to deep and acute commercial pressures. Where participants had been taken up for much of the previous boom years with recruiting and retaining staff, the main hub of activity now for most of the participants was on finding ways to control and reduce pay and headcount. Relative to the difficulties of doing this, other areas of HR practice received less attention, although some firms reported continued recruitment efforts for specific positions or new skills sets. Some firms also took measures such as selective pay rises or promotions to retain valued staff. Others operated formal talent management programmes, though these generally predated the recession. Staff redeployment was presented as a routine measure in responding to the recession in non-union firms, but appeared to be more problematic in unionized firms, where it sometimes cut acros s agreements with unions or lines of demarcation between different jobs.

Tuesday, October 22, 2019

Hagia Sophia Essays

Hagia Sophia Essays Hagia Sophia Essay Hagia Sophia Essay Hagia Sophia one of the most admirable buildings ever created, designed by Anthemios of Tralles and Isidore of Miletus, and built under the Emperor Justinian I from 532–537. The building has an Unbelievable way of allowing light into the building, instead of a few large arched windows Hagia Sophia distributes the weight and allows for numerous windows allowing sunlight to pour into the building. Just in the great hallway alone about ten large arched windows allow the beautifully painted mosaics ceiling, marble coverings, and pillars, to come alive. This fantastic design that the main dome is surrounded on four sides by half semi circles which increases the size of Hagia Sophia immensely when standing below the dome. The Dome in a sense is pulled by the four smaller circular ceiling pieces enlarging the space to make colossal room with a ceiling reaching 180 feet. Each room has a flowing design allowing the space of the entire structure to connect so perfectly. The space is spread out in a centripetal way of organization with the hierarchy space being the large area beneath the dome, which sits above 40 arched windows. This dome is said to have â€Å"changed the face of architecture during the Byzantine empire. † ? These windows also prevent rain and other elements form entering through the roof, however sunlight pours in through these windows. When standing beneath the dome it has an illusionistic design that looks like the dome is actually floating above you. Predominantly the great room surrounded by a lesser hierarchy important rooms which ultimately together interlock to form such a beautiful and unique architectural design. : Every part of the building is so large and extremely detailed; each room is an architectural masterpiece. Space and light are the most prevalent features of Hagia Sophia. Once standing underneath the dome you become amazed at how large of a space you are actually underneath while colossal pillars hold up the ceiling where light flows in. Everywhere you look in Hagia Sophia there are intricate pillars made of breathtaking marble. Hagia Sophia is positioned right in the middle of Constantinople, â€Å"Hagia Sophia became the ceremonial centerpiece of city, the last monument of Roman architectural inventiveness carried out to an ethereal vision on a grand scale. † Several large simple geometric shapes penetrate one another to form the building in such a unique and interesting way. â€Å"Hagia Sophia history is shaded with ownerships by many religions. Beginning in 360 to 1453 it served as the cathedral of Constantinople (also known as Istanbul). For a brief period, it began the Roman Catholic cathedral of the area. † ? Hagia Sophia has been rebuilt several times â€Å"The dome was rebuilt after an earthquake caused its collapse in 557; rebuilt by Isidoros the Younger; there were also partial collapses in the 10th and 14th centuries. The church was converted to a mosque in 1453. † Currently it serves as a Museum. Hagia Sophia changed architecture forever and will always be known as one of the greatest pieces of architecture ever designed.

Monday, October 21, 2019

A Clean Well-Lighted Place essays

A Clean Well-Lighted Place essays A Clean, Well-Lighted Place, written by Ernest Hemingway, is about an old waiter and a young waiter working in a caf. Also there is a deaf old man who is getting drunk in the bar. The younger waiter is aggravated that the old man will not leave the caf so. The young waiter wants to get home before 3:00a.m. The old waiter would leave the caf open for the old man because he reminds him of himself, who is lonely. The old waiter says, I am of those who like to stay late at the caf. With all those who do not want to go to bed. With all those who need a light for the night (447). The story takes place in Spain around the time of World War II. The day before the old man tried to kill himself because he was in despair (445). The old waiter wanted to know what the old man was in despair about because he to was in despair the young waiter told him nothing(445) The old waiter then asked How do you know it was nothing and the young waiter said, he has plenty of money(445). The old wai ter feels that just because you have money doesnt mean that your life is complete money doesnt buy everything. He feels that you cant buy love or just because you have money doesnt mean that you cant be in despair or depressed. The young waiter wants to go home to his wife and he is mad because he never gets to go home early, I wish he would go home. I never get to bed before three oclock(446). The old man asked for another brandy and the young waiter said, Finished. (447) The old man pays for his drinks and leaves the caf. You cant tell that he is drunk because he doesnt stagger and he holds himself up well, a very old man walking unsteadily but with dignity (447). The old waiter doesnt understand why the young waiter wouldnt serve the old man ano...

Sunday, October 20, 2019

A Doll’s House Analysis of Nora

A Dolls House Analysis of Nora â€Å"I must stand on my own two feet if I am to find out the truth about myself and about life,† To what extent is Nora a tragic heroine? -1497 words (excluding title) A Doll’s House by Henrik Ibsen is a modern tragedy that is centred around the life of a typical Norwegian household in the Victorian era, focusing on the trials and tribulations that face Nora Helmer in this patriarchal society. A Doll’s House explores not only the status of women, but how they are victims of social forces to the extent that they are left with the role of a â€Å"dollwife†. During the course of this essay, I intend to study the character of Nora and to what extent she qualifies as a tragic heroine. As the curtain opens to the first act, we are introduced to Nora as an â€Å"extravagant little person†, a â€Å"sweet little spendthrift†; giving the audience the impression that she will be yet another undeveloped female character as seen in previous tradition al tragedies. Ibsen uses patronizing language to portray Torvald’s view of his wife, how to him she was just a â€Å"sweet little skylark†, the word â€Å"little† emphasizing Torvald’s misogynistic ego, and how he uses typically ‘loving’ terms but makes them seem condescending and demeaning. Aristotle’s description of a tragic hero as outlined in his book Poetics , is where he discusses the aspects of one’s character which qualify one to be a tragic hero, ideas which have been accepted and expanded for several centuries, and often used as a ‘mould’ for tragic heroes. In order to reach my conclusion and decide to what degree Nora is a tragic heroine, I will compare Nora’s character to some of the ideas Aristotle discussed in his book. According to Aristotle, ‘the tragic hero is a man who is a mixture of good characteristics and bad characteristics’. Regardless of the ‘requirement’ of being male, Nora fits this aspect of his definition perfectly as she can be seen as both the epitome of good and evil within the play, depending on one’s perspective. Ibsen establishes Nora’s character as not purely vapid (as we perhaps thought based on our first impression of her) but a woman who gave up the â€Å"necess[ities] of life† and went to extreme lengths to â€Å"save [her] husband’s life†, even though it was considered â€Å"imprudent† in Victorian society, where a woman was â€Å"transferred† from being, firstly a good daughter, secondly a good wife and finally a good mother. Consequently, Nora’s character can also be seen as having ‘bad characteristics’ (one of Aristotle’s prerequisites of being a tragic hero) as she undoubtedly â€Å"commit[ted] a fraud† and as Krogstad says, â€Å"the law cares nothing about motives†, even if Nora â€Å"did it for love’s sake†. Ib sen stated that ‘a woman cannot be herself in modern society. It is an exclusively male society, with laws made by men’ with no regard to female emotions. Torvald â€Å" shakes his finger† at Nora and says that â€Å"a songbird must have a clean beak to chirp with†. Ibsen’s use of stage direction clearly shows Torvald’s condescending behaviour towards his wife. It also shows that even after eight years of marriage, Torvald Helmer underestimates his wife’s character or capabilities to the extent that it is questionable whether he knows her at all. Ibsen suggests that even though the plot unfolds in a male dominated society, those same men could be easily deceived by their wives, as shown by Torvald and Nora’s relationship. Even though Ibsen has followed Aristotle’s idea, he has left it open to interpretation as Nora’s actions can be interpreted as ‘good’ or ‘bad’.

Friday, October 18, 2019

Research Paper Example | Topics and Well Written Essays - 2000 words - 7

Research Paper Example Health care reform is considered to be an important responsibility of any government. In simple terms, health care reform refers to the reform in the health care system and/or in some parts of this system. This paper is developed to serve the purpose of providing a clear review of the literatures that are available with respect to the Health Care Reform in U.S. In the process of doing so, the paper includes a brief history of health care system and reforms in the context of US. Furthermore, it also contains the present situation of health care reform in the country. It is important to review the literature regarding US health care system before reviewing the literature regarding US health care reform. Significant volume of literature can be found related to US health care system. Steven Jonas, Karen Goldsteen and Raymond Goldsteen in their â€Å"An introduction to US Health Care System† have opined that the health care system in US is very similar to the systems of the other nations where ‘allopathic medical model’ is mainly followed (Jonas, Goldsteen & Goldsteen, 2007). However, it has several features that are unique in nature when compared to the health care systems of other countries. While providing a brief overview of the Unites States health care system, Jonas and Goldsteens have said that an important aspect of the US health care system is that it is significantly fragmented and decentralized (Jonas, Goldsteen & Goldsteen, 2007). Its main function and role are significantly focused on the production of outcomes. It r emarkably emphasizes on the profits and power of the service providers. In US, health care is provided but it does not come at a low cost. High end education and researches that are related to health care are provided and funded. Surely there are loci of control and power. In the US as such there is no central Ministry of Health. The system allows

The Quest For Wisdom Essay Example | Topics and Well Written Essays - 500 words

The Quest For Wisdom - Essay Example For Pieper, the manner of Liesure contemplation is escorted and saturated by an unforced consciousness for religion, the thoughtful dream of the intellectus, which is not lively but inert, or somewhat amenable, the commotion of the spirit in which it envisages that which it sees freedom. Both the ancients considered intellectus as being previously beyond the globe selected to man. And however it belonged to man, although in one intellect superhuman; the simply human by itself could not satisfy man's powers of understanding, for man, of his very temperament, reaches out beyond the globe of the human. For Plato the finest in him is, even though the understanding which is mainly attribute of the human spirit happens in the form of fraction, never the less there is in it a type of contribution in the uncomplicated knowledge which is appropriate to superior beings, of whom it is consequently said that they hold the sense of religious visualization. But for Pieper, the aptitude to detain t he religious conscience in the similar way that our eye captures illumination or our ear sound. And is the noblest form of human existence. But awareness in philosophy is focussed upon the entire of being and begins with a scholarly instinct of being, as such rooted in the wisdom of touch; this is what is identical on both the authors. Plat

Different Christian Views Surrounding Euthanasia Essay

Different Christian Views Surrounding Euthanasia - Essay Example Non-voluntary euthanasia occurs when it is performed without the patient’s consent or when someone else gives the consent. Involuntary euthanasia is to put patients to death and involves infants born with defects or the elderly people. The principle behind this sort of death is that ‘they have a life not worthy of life’, which was devised during the Nazi Regime in Germany when the state authorized the killing of the aged, mentally ill, and the handicapped. The definitions of euthanasia vary and this itself leads to controversy. Hemel (2005) quotes the Webster defining euthanasia as "the act or practice of killing or permitting the death of hopelessly sick or injured individuals (as persons or domestic animals) in a relatively painless way for reasons of mercy." The American Heritage College Dictionary, plainly states that euthanasia is "the act culture practice of ending the life of an individual suffering from a terminal illness or an incurable condition." There is no mention of mercy here at all. The definitions of euthanasia has inherent problems. Some religious ethicists believe that passive euthanasia should not be included under the umbrella at all because according to Catholic moral teachings, "unless the actual intent to end a persons life is present, euthanasia has not occurred†. Some other religious groups are of the opinion that the definition of euthanasia should be governed not by the underlying intent but by the en d result of the action. The Christian response to euthanasia is to oppose it. Simply put, it amounts to killing. In legal terms, it is ‘the intentional killing of a patient as part of his or her medical treatment.’ (Cornwall-Kelly). Mercy killing has been debated over by many religious heads and has to be addressed seriously because it is a matter of life and death. Fr. Frank A. Pavone (Priests for Life) is of the firm conviction that suffering

Thursday, October 17, 2019

The future direction of e-health. What are the strenghts and weakness Research Paper

The future direction of e-health. What are the strenghts and weakness of utilizing the internet to manage and dissminate health information - Research Paper Example As such, allowing patients to self-monitor their health data using the internet has various advantages and disadvantages. This paper will address e-health in relation to these contradicting effects. In addition, the paper will discuss the responsibility of the United States on e-health and medical technology from a Christian point of view. E-health information involves the conversion of medical records to electronic records, online medical information for healthcare providers, online medical information for the public, online evaluation and accreditation of public health care websites, online clinical computing systems, and online privacy issues (Natesan, 2005). Although all patients’ information should enjoy confidentiality, it is quite challenging to maintain the confidentiality of this information when it is accessible online. As such, e-health negates the privacy of any patient. Hackers can even access this information and use it against the patients and their family. Investigators can equally access patients and their family’s information without their authority. This information can work against them in a court of law. Moreover, e-health leads to a more competitive environment, thus reducing profits to health care providers, and this leads to health care inflation and puts the going concern of heal th care organizations at risk (Harrison & Lee, 2006). Nevertheless, e-health has numerous benefits. Actually, it avails relevant information to researchers who subsequently use it to understand and develop new treatments methods. The access to this information improves the quality of healthcare for patients and equally accelerates the process of receiving quality healthcare. In addition, it revolutionizes the delivery of medicine and healthcare to patients. Financially, e-health reduces treatment costs and reduces administrative costs, as everything is computerized. Furthermore, e-health will enhance

Negotiations Essay Example | Topics and Well Written Essays - 1000 words

Negotiations - Essay Example The requirement to move the opponents from their preferred solution could motivate individuals involved to go against contemporary ethical standards; they could employ inappropriate influence tactics so as to gain compliance from the other. Guasco and Robinson put the ethical argument in context noting that â€Å"what is one negotiator’s appropriate tactic is another’s unethical trick† (2007, p. 135). Approaches to ethical reasoning In business negotiation, various standards have been used to evaluate tactics, as identified by Lewicki, Barry and Saunders (2007). The end result tactic would be applied where the negotiator chooses to adopt an action based on the expected results. Duty ethics would cause the negotiator to choose a course of action based on such person’s duty to uphold suitable rules and principles. The third standard referred to the fact social contract would cause one to choose a specific course of action based on the strategy, values and no rms of an organization or community they exist in. Finally, personality ethics would cause one to choose to follow a specific course of action based on personal convictions. ... Here, the negotiator aims at distorting the settlement point. For example, a buyer willing to spend up to $10,000 on machinery could indicate to the buyer the willingness not to spend more than $8,000. This tactic has been noted to be necessary in creating a rationale that would make the opponent make concessions. According to Lewicki, Barry and Saunders (2007), negotiators who make extreme demands and have the opponents give in achieve favorable settlements. In bluffing negotiation tactic, the negotiator would falsely state the intention to perform an act. These have been described by Lewicki, Barry and Saunders (2007) as false threats and acts. For example, a negotiator could threaten to undertake a specific course of action should the opponent fail to perform a specific task. But this would be said without any intention to live up to the stated consequences. Guasco and Robinson (2007) argue about the unethical form of bluffing such as the one where a seller lies to a buyer of a pr ospect who has bid a higher price for a car, yet in real sense no one else has participated in negotiations. Therefore, the scholars liken bluffing in negotiation to poker. With falsification, erroneous or incorrect information would be introduced as if it were true (Lewicki, Barry & Saunders, 2007). Some examples include erroneous financial information, false guarantees and warranties. Falsification could be printed or spoken and would be aimed at using erroneous information to distort actual facts, thus changing the position of the opponent. The fourth negotiation tactic, as identified by Lewicki, Barry and Saunders (2007), is known as deception. Here, the tactic would attempt to manipulate the logical and inferential processes of the opponent so as to cause incorrect deduction or

Wednesday, October 16, 2019

Knowledge Management - Tools Essay Example | Topics and Well Written Essays - 1250 words

Knowledge Management - Tools - Essay Example The holistic management of the knowledge and information that an organisation comprises defines the crux of the working of the concept of knowledge management. The focus of this approach is on integrated approach which deals with identification, capturing, evaluating and sharing knowledge for gaining maximum result (Wallace 2007). The major components of the knowledge management includes the data and information of an organisation which is made available to all it employees through the use of electronic and traditional mediums. The exact definition of the concept is not easy to define because it constitutes of the concept of knowledge which is very wide and difficult to define Knowledge management is that discipline which aims at making the individuals and teams enable for collectively creating, sharing and applying Knowledge. This plays an implant role in helping the organisation in achieving the organisational goals and objectives. Â  With the aid and sue of knowledge management t he organisation aims at creating intellectual base and knowledge based assets which play an essential role in increasing the returns and profits of the company. The major focus is on sharing of knowledge amongst the employees in order to devise the best working strategies. There are two major activities which play an important role in the arena of knowledge management which involves, capturing and documentation of both types of knowledge which includes tacit and explicit and disseminating the collecting information in the organisation for generating desirable results. The concept of knowledge management indicates that there exist a strong relation between the goals of the organisation and its strategy. The management of the intellectual knowledge of the organisation for some meaningful purpose so that it creates value and meaning for the business is the major focus of knowledge management (Civi 2000). Thus, the concept of knowledge management can be defined as the systematic and wel l planned management of knowledge assets which an organization has that play an important role in creation of value and meets the strategic requirements of the company. The following diagram explains the concept and major constituents of knowledge management: (Source: Civi 2000) Various tools and techniques have been used for the selection of knowledge management initiatives in small and medium sized organisations. The tools of knowledge management are divided into two parts that include information technology tools and web based tools (Debowski 2007). The purpose of knowledge management is to improve the performance of the organisation by providing certain tools, processes and systems for creation, and sharing of knowledge. These tools of knowledge management are effective for decision making processes of the organisation. An effective knowledge management tool ensures ease of use by the people. Knowledge management tool provides specialised knowledge for the management of organisa tion in an effective manner. These tools also ensure management of technical issues in an effective manner. These tools provide adequate access to the right knowledge at the right time (Awad 2004). Brainstorming is one of the tools of knowledge management, which is used by people for generating new ideas for a particular project or event. It is considered as an appropriate tool that is resilient in nature and provides a wide range of options to people. The process of brainstorming starts with taking the initiatives from

Negotiations Essay Example | Topics and Well Written Essays - 1000 words

Negotiations - Essay Example The requirement to move the opponents from their preferred solution could motivate individuals involved to go against contemporary ethical standards; they could employ inappropriate influence tactics so as to gain compliance from the other. Guasco and Robinson put the ethical argument in context noting that â€Å"what is one negotiator’s appropriate tactic is another’s unethical trick† (2007, p. 135). Approaches to ethical reasoning In business negotiation, various standards have been used to evaluate tactics, as identified by Lewicki, Barry and Saunders (2007). The end result tactic would be applied where the negotiator chooses to adopt an action based on the expected results. Duty ethics would cause the negotiator to choose a course of action based on such person’s duty to uphold suitable rules and principles. The third standard referred to the fact social contract would cause one to choose a specific course of action based on the strategy, values and no rms of an organization or community they exist in. Finally, personality ethics would cause one to choose to follow a specific course of action based on personal convictions. ... Here, the negotiator aims at distorting the settlement point. For example, a buyer willing to spend up to $10,000 on machinery could indicate to the buyer the willingness not to spend more than $8,000. This tactic has been noted to be necessary in creating a rationale that would make the opponent make concessions. According to Lewicki, Barry and Saunders (2007), negotiators who make extreme demands and have the opponents give in achieve favorable settlements. In bluffing negotiation tactic, the negotiator would falsely state the intention to perform an act. These have been described by Lewicki, Barry and Saunders (2007) as false threats and acts. For example, a negotiator could threaten to undertake a specific course of action should the opponent fail to perform a specific task. But this would be said without any intention to live up to the stated consequences. Guasco and Robinson (2007) argue about the unethical form of bluffing such as the one where a seller lies to a buyer of a pr ospect who has bid a higher price for a car, yet in real sense no one else has participated in negotiations. Therefore, the scholars liken bluffing in negotiation to poker. With falsification, erroneous or incorrect information would be introduced as if it were true (Lewicki, Barry & Saunders, 2007). Some examples include erroneous financial information, false guarantees and warranties. Falsification could be printed or spoken and would be aimed at using erroneous information to distort actual facts, thus changing the position of the opponent. The fourth negotiation tactic, as identified by Lewicki, Barry and Saunders (2007), is known as deception. Here, the tactic would attempt to manipulate the logical and inferential processes of the opponent so as to cause incorrect deduction or

Tuesday, October 15, 2019

Deer Hunt Essay Example for Free

Deer Hunt Essay It is 5:30 am on opening morning of deer hunting season and my alarm explodes into a racket that would wake an army. I roll out of bed and rub the sleep from my eyes. I only slept six hours last night because my family and I were preparing for the hunt, getting the guns ready and laying out our orange clothes. As I begin to get dressed, the smell of fresh pancakes wakes me up. It is at this time I realize the season is upon us. Since January I have been waiting for this day to come. Today begins the annual nine day season that brings our family together each November. After stumbling down upstairs I go to the computer and turn on Da Yoopers’ â€Å"Da Turdy Point Buck†, the song our family must listen to before we head out the door and into the woods. With the song blaring through the house, I walk into my brother’s room, turn the lights on, rip the covers from his bed, and narrowly escape a swift kick from his leg. After a breakfast of pancakes my brother and I jump into his truck and head for the hills. We own 120 acres three miles from the house, so we must drive to our destination. Any other morning there would be no vehicles on the road, but this particular morning we pass about ten other trucks all taking their passengers to their particular hunting spots. Three inches of fresh snow fell last night, creating a blanket of freshness that reflects the last rays of moonlight. As we drive into our property we see fresh deer tracks and my heart starts pumping, I have been away from Minnesota for a few months and this morning is the first time I entered these woods since September. A few hundred yards into the woods we see three dear walking the road. They bound off into the darkness in flashes of brown silhouetted by snow. We park the truck and before we shut the engine off Jimmy tells me we will sit until 9:00, then I will walk to where he is sitting, and we will go home. We shut the engine off and do not speak again, for any human noise made will be heard by deer within a quarter mile. Trying to make as little noise as possible I walk to where I will sit. Along the way, I creep over a hill and see four deer. Immediately upon seeing me they streak through the trees; I stop and listen to their feet pounding into the earth, and realize there are many deer in the area and my chances of seeing a deer while sitting will be very good. After 15 minutes of sneaking through the oak and maple trees I find the tree I will sit in. My father set the stand in the tree a few weeks before my arrival. I crawl up and as I sit down it is just getting light in the east. I sit and wait. As it gets lighter and lighter I wait for the first gun-shots of the season, and sure enough, POW. The season has begun. I watch the morning pass by, an occasional raven flies by calling to its family, and all of a sudden something catches my eye. I look to the south and over the top of the hill comes a deer, my first deer of the season. I watch and realize it is a fawn; it is this year’s baby and is bounding over fallen trees and around trees. Right behind is it’s mother, they are running, probably frightened by some other hunter. I sit and watch these two deer trot right by my stand. Then for some unknown reason they stop thirty yards from where I am sitting totally unaware of my presence. They stand there totally alert, occasionally looking from where they came, their coats full of warm brown hair that will protect them from the harsh winter that awaits them. I watch them and I am part of the woods, I have become part of the tree for that moment. After a few moments the doe and fawn bounce away, into the unknown. I spend the next hour watching the woods for movement, looking for the slightest movement that will indicate the presence of some animal, maybe a deer walking through the woods feeding, or maybe a squirrel on its never-ending hunt for food. At 8:45 I get up and walk to my brother, the cold weather has found its way into my body through my many layers of clothes. I walk ever so silently hoping to find a deer over the hill, grazing in the field. I see nothing but when I get to my brother he tells me I drove five deer past his stand. We walk back to the truck and head for home, we didn’t shoot anything this morning but the hunt was a success, we both saw many deer and we were in the woods during the most beautiful part of the day. As we drove through the woods towards home I am totally content, there is nothing more I could have right now, the experience of being in the woods, and my family.

Monday, October 14, 2019

The Antivirus Technology Definition Computer Science Essay

The Antivirus Technology Definition Computer Science Essay Antivirus is defending software designed for guarding your computers system smart cell phones against Virus, Trojans Hijackers etc. These all Viruses, Trojans Win32 etc. are called Malicious Software in computer world. All Antivirus software run in the background at all times to protect defense your computers system smart cell phones some antivirus are automatically updated through internet some antivirus are needs manual updated through internet to protect your systems against Malicious software. Introduction: Antivirus software provides a many critical layer to protect from Virus, win32, Trojans worm etc. The first document removal of the computer viruses was written by Bernd Fix. There are two types antivirus application in the computer world so that the time of the Atari ST platform designed in 1987 the first one was G Data second was UVK 2000 made by Bernd Fix in 1987.The word Antivirus is come from the word Antibiotic which means implies combat with an invading force of the programs. Fred Cohen designed the strategies relative to an Antivirus software program in 1988 to solve the virus problems. The old previews years Antivirus software are not so good because those software only detected the Virus Spyware etc. remove it from your computers system damage your some operating system files inside your computers now AntiVirus software much better than old ones because it detected the virus remove it without deleting your operating system files inside your computers it also fight against new malicious software which come from internet network. Well in the preview years Antivirus software are not completely free downloadable on the internet means you could only find some antivirus software with trial version now Antivirus software are completely free download without trial version . New Antivirus also checked the incoming outgoing mail, email attachments etc. It also has internet security for internet threats. Advantages and Disadvantages: Antivirus software is very useful in the preventing, controlling, virus many more viruses program, which can damage the computers components from inside operating system files to. Antivirus software are used the methods for searching killing Viruses some of the well knows patterns of computer data programs. Antivirus programs are very effective against the viruses program, whose is the biggest threat for your computer systems. Antivirus program has some limitations drawbacks on the other hand, which effect on the computer system performance. In the computer world, inexperienced users can have many problems with the antivirus programs or software such as inabilities to understand, threats of the software success of the antivirus programs software are dependent on the ability of the user to understand Or knowing the right kind of balance between the positives negatives things in the computer world. Antivirus software or programs can cause problems during the installation window in the computer system or upgrade the Windows Service packs in the computer system. Antivirus software can be hampered some few software programs because it used its own firewall to block application to store in the computer system. E.g. True Crypt. Some Antivirus program will not knowing by the policy assessment before make its own policy when it install in the computer system. There are three major types of detection which is used to identify the potential threats in the computer system such as: Signature based, Heuristic based File emulation method. Signature based detection: In this method, you can identify the viruses malware virus software. Antivirus software can also compare the content files of the computer system to dictionary files of virus signatures because viruses are embed into themselves in the files shape or in pieces shape to infect the computers. Heuristic based detection: In this method, you can only detect malicious activity relative to viruses identify unknown viruses in the computer system. File emulation: In this method, it has using the heuristic type approach which it executing the program in a virtual environment which effect the action of the program performs it also carries out the disinfection actions relative to the programs which run in the computer. What is a Virus? Viruses are the category of malicious program code software, viruses are used for attempted to breach security value break them damage data of the computer system display unwanted messages on the display screen when the antivirus program for gabbing user passwords on a networks are called LOGIN.exe. These real LOGIN.exe programs which have intruder or infect the user programs are called Trojan Horses when viruses program fall into the Trojans category than these viruses program have the ability to reproduce themselves again again until users computer systems slow down performance processing to any application it infected the your operating system. . Why Do Viruses Exist? Now-a-days every computer virus programs are written by someone who wanted it to infect damage other peoples computer systems smart cell phones our world. So these Viruses program coding pass from computer to other computers system these viruses may be not have direct effect on the some computers but it effects on the other resources like(Disk space Memory) thats why these viruses are harmful it coding are very complex it also contain some serious bugs which damages the computer system pretty badly. How do we will know if we have a virus want to protect our computer systems? If the someone computer systems are very running slower, freezing it displaying error messages again again than you should have the viruses in yours computers or operating system than u must install Antivirus software scan your computer system with latest internet updated of the Antivirus programs security to clear your computer with viruses. How do we get these viruses on our computer system or operating system? Computer systems can be infected by viruses because: User using the Internet without having the latest updates of the Antivirus programs security installed into your operating system. User using the Internet without having a working firewall on the operating system or Antivirus software. User who opening the email attachments without knowing that whos will send him or her. User visiting unreliable website pages than viruses automatically stored into your computer because these website pages contains the infected viruses programs. How do we get rid of the viruses? To get rid of the Viruses you should use latest Antivirus software or latest Antivirus program security updates now-a-days many new Antivirus software are able on the Internet free cost with one years updates free e.g. Norton Antivirus, McAfee Antivirus Kaspersky Antivirus etc. What are types of Virus in the computer world? There are several types of viruses in the world which your computers your operating systems for examples: Worms, Trojan horses, Logic bombs, Mutated viruses, Polymorphic viruses, Bounty hunters, Boot sector viruses Macro viruses etc. Worms: Worms Viruses are used to spread over a network of the internet hacks the computer system or operating system which connects with internet networks. Trojan horses: Trojans viruses are used to create a security hole in the computer programs or operating system infected the system files inside. Logic bombs: Logic bombs viruses are used to trigger the specific event means computer systems date programs of remote activation etc. Mutated viruses: Mutated viruses are used to rewritten by hacker users to change the behavior or signature of the programs made the multiple versions of the same viruses that infected the computer programs or operating system. So these viruses are also called variants. Polymorphic viruses: Viruses which are used to automatically change according their appearance, like as a chameleon by giving the viruss signature of the programs in encrypt-decrypt function so virus can only be recognize its own signature of the program. This kind of virus is called Polymorphic viruses. Bounty hunters: Bounty hunters viruses are used to modify signature program stored by Antivirus program in the order to render them an inoperable in the operating system. Boot sector viruses: A boot sector viruses are used to infecting the boot sector of a hard drive of the computer system. (Just like MBR Master boot record) it also has infected the speed of the processer. Macro viruses: Viruses which came from email, email attachments etc. to damage the operating system or hack the computer system BackDoor.exe Viruses: These viruses are highly dangerous because it can give the complete shell of the victims computers to the attacker. These exe are made by many encryption techniques, so anti-virus hardly detects these types of viruses. What is Firewall Spyware? Firewall: Firewall is software or program which have security tool to help limit internet network traffic with hackers or viruses to getting in your computer system. Firewall helped protects your computer from future hackers new incoming viruses. Spyware: Spyware are used to a multitude of malicious software programs which access your computer system. When Spyware viruses infect your computer system or operating system than it will slow down your operating system speed performance your computer system going to hang again again. Issues relative with the Antivirus software: Unexpected renewal costs: Some of the commercial antivirus software which includes end-user license agreements which effect on the subscription automatically renewed it, cost so much which you not expected. False positives: Antivirus software can used to identify non-malicious files which having the viruses so that it will be cause serious problems for the computer system because false positive make operating system files very unstable because of the viruses. System interoperability related issues: When the multiple antivirus programs running on the computer or operating system than it will degrade the performance of the operating system create conflicts in every programs running on the operating system. So this concept is called Multiscanning If the functionality of the few software programs can be hampered by the active antivirus software on the operating system. Effectiveness: The effectiveness of antivirus programs have been decreased in the previews year because of new good Antivirus software launch on the markets computer threat going dropped from 40-50% to 20-30% in this preview year. Rootkits: Rootkits are major challenge for antivirus programs on the operating system it had admin area access to the system to control, invisible hidden the EXE from the running processes of the task manager on the computer system. What is Cloud antivirus method? Cloud antivirus method is a technology that used the lightweight agent software to protect the computer system or operating system it also used for analysis the data with providers infrastructure. To implement this Cloud antivirus method we used the multiple antivirus engines which scanning suspicious files from the operating system this concept is called Cloud AV. Cloud AV was designed to send programs on the internet network where detection programs are used to improve the detection rates with multiple antivirus behavioral on the internet network. Online Scanning: Some of the Antivirus provides maintain of websites with free online scanning on the internet with the entire computer such as like local disks, critical area files relative to the computer systems. Well as you know that internet becomes the vehicle for communication in this world people using digital communication on the internet with very fast speed scope so that new kinds of viruses are increasing spread all over the world of the internet network. If someone will not want to install antivirus on his or her computer than he or she can easily scan his or her computer online this is quickly possible solution. What do u means by the birth rate death rate of the viruses? The Birth rate of the viruses: The birth rate of the viruses depends upon the one infected computer system or operating system which can spread this infection to other computer system or operating system. The Death rate of the viruses: The death rates of the viruses depend upon the infection found on the computer system or operating system destroy that computer system. Antivirus products: There many products of antiviruses. Some of them are discuss below: Avast Free AntiVirus: Avast is an antivirus computer program made by AVAST Software a.s. Avast is the freeware version of the Avast company. Avast can be installed on Microsoft Windows, Macintosh Operating System X and Linux. It also has command line scanner system and different dangerous script blocker. It has many new features e.g. file system shield, Real time protection form worms and threats. Mail shield protect from dangerous mails and attachments In it. Web shield protects form malicious URL or virus containing sites. Network shield protect from attacking ports and known network worms. Boot time scan, scans the infections that are loading during windows startup and remove them. If any virus is found, antivirus displays the notification to the user, and asks for action to take. AVG AntiVirus: AVG is another antivirus program made by AVG Technologies. It can be installed on multiple platforms and FreeBSD computing platforms. It also has a free version of antivirus. There are many components in avg antivirus. Anti-Spyware protects you from different spyware which are in your computers. Link Scanner scans the web links, whether they are affected or not. Web Shield protects you from viruses which come into your computer through internet. It has own firewall system to protect the system. It also has servers version to protect the web/file servers, mail servers and dns severs. Avira AntiVirus: Avira is considered as the 6th largest antivirus software worldwide. And it has 100 million customers. It can be installed on Android and other operating systems. It runs as a background process which checks every file opened or downloads form the internet. It has different components in the antivirus. Email scanning which supports POP3 and SMTP protocols. Web Guard to block the access of malicious sites. It has personal firewall and anti-spam system. Backup module to protect and secure the important data. Keep an eye on different Botnets, and prevent them. It offers tools including a Rescue System utility used to write a bootable CD and DVD. Some main features of Avira windows versions are: Anti-Phishing Mail Guard Game Mode AnitBot Parental Controls Bitdefender Antivirus: The Bitdefender products include antivirus and antispyware, personal firewall, privacy control, user control, backup for company and home users. PC Tuneup and Performance Optimizer. It can be used in Symbian Operating System, Windows Mobile, and Solaris. A free basic online scan is offered by the Bitdefender via the bit defender website. Bitdefender introduces the new technology B-HAVE. Through which it can detect the unknown threats. ESET NOD32 Antivirus: ESET first ever product was NOD, an antivirus program for computers running MS-DOS. Then after some time period it introduces the NOD32 for Windows XP. In September 2010 ESET released NOD32 antivirus for Macintosh OS. It also supports BSD, Linux, Novell NetWare and Sun Solaris. ESET NOD32 includes an enhanced media control that automatically scans all USB, CD/DVD and external hard drives. F-Secure Antivirus: F-secure is first antivirus to establish an existence on the World Wide Web. F-secure first introduced the anti-rootkit technology. It can be installed on Mobile security; it has also the facility of online Backup and anti-theft for Mobile. Also available for Linux, servers, Policy Manager, protect the message security gateway. F-secure developed the new technology through which new or unknown malware, which causes the changes in windows files and windows registry. F-secure teach the one semester course in university about new viruses and other technology. F-secure antivirus can also detect the backdoor.exe virus. F-secure also helping the authorities to catch the mafia or terrorist organization through their antivirus. K7 Antivirus: K7 is the first antivirus to build their own NST (Nano Secure Technology), has ability to protect the system at multiple layers. Which can detect and remove the existing threats and as well as future threats. It provides support browsing against attacks by the attackers, to steal the passwords or even your money. It also produces the various applications and antivirus for DOS. The basic feature are firewall, Anti-spam, Anti-Spyware tools, K7 mail security, security tools to detect the key loggers, Tracking Cookie detection, usb scanning, safe cloud base scanning. Kaspersky Antivirus: Kaspersky product designed to protect the users from malicious malware and other threats. It runs on different platforms and Linux version available only for business users. Its features include real-time protection, removal and detection of viruses, Trojans, worms, spyware, key loggers, backdoors, sql injection and many others. It also has the online helping facility to help and guide the user about their new products. Rescue disk facility is also available in Kaspersky. This scans the computer at boot time. The features which are not implemented in the antivirus program are personal firewall, AntiSpam and parental controls. Kaspersky uses the highly graphics to display the interface, so their system requirements are high. At early stages of Kaspersky, it has very crucial flaws in it, through which attackers can attack and run the piece of code to compromise the users pc. McAfee Antivirus: McAfee Antivirus is very powerful antivirus it is light weight. This Antivirus is the leading antivirus software in the security industry markets. This Antivirus have two features one is ScriptStopper second is WormStopper it automatically updater it virus definitions updates on the regular basis from internet network. Panda Antivirus: Panda Antivirus have Ultrafast new feature scanning engine as compared to other antivirus applications. This Antivirus have the Anti-Phishing filter Anti-Banking Trojans engines in the Identity protection area it have advanced heuristic scanning with personal firewall. ZoneAlarm Antivirus: ZoneAlarm Antivirus have very strong removal ability to destroy the dangerous viruses also having multilayered security. This Antivirus used less processer power of performance it used very low computer system resources. TrendMicro Antivirus: TrendMicro Antivirus is very popular antivirus, which mostly used for Spyware protection Adware protection from viruses. This Antivirus has some new features like Remote file locking sharing registry files. Sophos Antivirus: Sophos Antivirus includes the network access control, Anti-spyware etc this types of Antivirus are used for watching on the data supplying through monitoring tracking software means like upload videos. Rising Antivirus: Rising Antivirus is the Chinese Antivirus software it is used for UTM, spam-blocking firewall etc. This Antivirus basic function is BIOS rootkit checks. Vba32 Antivirus: Vba32 Antivirus programs are used in the personal systems it neutralizes viruses which infected or attack the computer systems on the real time. Linux Shield: Linux Shield is the Antivirus product used in the Linux operating systems to clean the viruses from Linux operating system Technology Highlights: There are many technology highlights such as : First Generation (Antivirus): The first generation of Antivirus software are based on the signature detection polymorphic engines. Second Generation (Antimalware): In the preview few years, new types of malware software are emerge file-less network worm etc are on the spotlight of the massive damage viruses are on the internet network. These problems can be solving by personal firewalls clear the signatures packet from viruses used smart clean Browser which will not infect the operating system with the spyware Trojans viruses. Third Generation (Proactive Technology): TruPrevent: This behavioral technology is used for research development of the technologies. It has two main function technologies: Behavioral of analysis blocking known computer system. (i). Behavioral Analysis: This Act as last line of defenses against new viruses which executing in the computer system it give real time results used behavioral category alone. (ii). Behavioral Blocking: This is the Second main component of the TruPrevent. It knew hacker viruses behavioral to attack system application by injecting with program codes into the computer system. Genetic Heuristic Engine: These technologies are inspired by the biology work as an organisms which individually identified by the other organisms. It based on the digital genes. This carries out new viruses harm things which going to infect or damage the computer system or operating system. Collective Intelligence (The Next Generation): Collective Intelligence used the approach which collect the objective of this technology in which after clean the computer system or operating system it automatically generated full report cleaning viruses report it much faster lightweight in the future. It protected your computer system 95% up to 98% it also give your infecting computer system percentage according to the report. It is also collect the data from the communities which can tell us about the behavioral patterns of the any programs files. It also have the information about higher visibility threats against viruses or active on the internet network it can be automatically do data processing on the computer system analyzes thousands of new samples which received every day from internet network it will not expired the data which infect by the new malware viruses. It automatically saved the data files from new old malware it also release the knowledge extracted from delivering to user on the web services updates i t. In this platform we can do collective intelligence technology or platform for online services designed to perform of the machines against malware viruses solve the security solution. It also gives corporate requirements information performance of the malware thats why we created a specific managed service called Malware Radar. Proof Point Virus Protection key capabilities: Viruses Protection key depend up on the efficient message analysis, Continuous business enterprise virus-detection updates, Integrated Administration reporting flexible policy management message disposition. Viruses protection key have the enterprise antivirus engine which gives good efficiently of the scanning messages attachments for new malicious codes which give fully proof point platform find new viruses definition which created the cloud-based Dynamic system which secure channel guarantees with proof point protection is already up to date than it will gives business enterprise with maximum detection against all viruses for IT administrators gives very importance to all antivirus enterprise of the proof point of the protection. It also used dynamic update service make for organizations.

Sunday, October 13, 2019

Eve’s Apology Essay -- Literary Analysis, Aemilia Lanyer

Is this an apology or blame? In the beginning, God tells Adam not to eat the forbidden fruit. Adam disobeys God by doing so, but most people put the blame on Eve. In the poem, â€Å"Eve’s Apology,† Eve expresses her feelings toward the entire situation and shows how she is not to blame. She blames Adam for the pain we endure today. Eve eats from the forbidden tree out of curiosity. She wants to share it with Adam, so he can feel like she feels. Eve gives the fruit to Adam out of love, but she does not force him to eat it. Adam has control of his mind, so he disobeys God on his own. â€Å"Do not the thing that goes against thy heart† (Lanyer 424). Aemilia Lanyer, the author of the poem, â€Å"Eve’s Apology,† lived in the mid 1500’s and 1600’s. Living in this time period, had much influence on her writing. She published her landmark book, Salve Deus Rex Judaeorum, the same year that the King James Bible and three of Shakespeare’s plays were published (Wilhelm 424). Lanyer brings out the life of this poem with the poetic devices, irony, and unusual language. To begin, the poem, â€Å"Eve’s Apology,† uses many different poetic devices such as alliteration, assonance, rhyme scheme, and simile. The author uses a great number of alliteration, which is the repetition of constant sounds generally at the beginnings of words. Alliteration can be seen in the words â€Å"what† and â€Å"weakness† in line 3. Some more examples of alliteration throughout the poem are â€Å"subtle serpent’s† (23), â€Å"he had him† (24), and â€Å"with words which† (30). Assonance, the repetition of the same or similar vowel sounds in stressed syllables that end with different consonant sounds, is another poetic device that the author uses greatly. Some examples of assonance are found in lines 10 â€Å" The ‘p... ...g this poem, the author reveals older examples of words and phrases that we do not know or use today. Throughout "Eve's Apology," Layner confidently makes her point of female inequality and female injustice by using poetic devices, while continuing to keep an ironic tone and bring out unusual language. She is clearly trying to prove that woman and men are equal. She suggests that because Adam is a man, thus "stronger" than Eve, he should be held responsible for eating the forbidden fruit rather than the "weaker" Eve. Layner believes that men should not look down upon women as lesser and weaker than themselves; she successfully proves that women deserve an equal status with men. Throughout the poem, Layner makes the point that the reason men have always been condescending to woman is dishonest because men are actually more at fault for the pain we endure today.

Saturday, October 12, 2019

The Great Depression Essay -- essays research papers

The Great Depression was a time of sadness and poverty for many. It became an unforgettable historical time in American history. The author of the book The Great Depression, Pierre Berton gives a clear view of what happened from 1929-1941. He basically outlines the Depression event by event, explaining what happened where and who was involved. Although many books can tell stories of the depression, I think the author of this book did a good job getting all the facts and letting the reader know exactly what happened.   Ã‚  Ã‚  Ã‚  Ã‚  It is easily shown that the author, Pierre Berton, didn’t show much opinion in this book. He mainly focused on just the facts. He would however give some personal views of reasons for certain things or explanations. He probably got most of his information from a textbook or actual documents. He did a good job compiling these facts into a time line of events. He explains who each important person is that was involved in the times of the depression and all important laws passed.   Ã‚  Ã‚  Ã‚  Ã‚  He began talking about the crash of the market, dubbed Black Thursday. The crash spelled disaster for the national economy. Corporations with heavy investments faced a sudden shock to their assets. This was the beginning of the depression. The national income slipped lower each year from 1929-1932, and it did not return until World War II. Unemployment became the most important problem of the depression to the people living in the US. Another major problem was that the agricultural prices were cut almost in half, and many farms foreclosed because of it. The author goes on to say that there are many different theories as to why the stock market crashed that day. One was that the attempts of the US government and the Federal Reserve Board to stop speculation caused an overreaction in the market, leading to the selling panic.   Ã‚  Ã‚  Ã‚  Ã‚  The next big event in the book was the effects the stock market crash had on America. The author did a great job by including interesting statistics and facts. In 1930, farm income had fallen to the lowest it has been since 1921. A result of this was that farmers didn’t have enough money. According to Berton 5 percent of farmers lost their land. Nowhere was it worse than in the dust bowl, a farming area in the Midwest. Many farmers were forced to move west because o... ...ever got off subject at any time. The reviewer also compliments Berton on his writing style. The way he would write was a way that he always made sense and made it interesting. I can’t disagree with that either, I found the book very interesting, it was hard to put down.   Ã‚  Ã‚  Ã‚  Ã‚  The Great Depression was full of facts and interesting information, and I learned a lot from it. Pierre Berton didn’t present his information with any kind of bias, he just stated what was true. Occasionally he would add in some personal views, but they never strayed far from the truth. The book basically told the story of exactly what happened to the economy during the depression, and Berton did a great job explaining each part of it. He never tried to put in his opinions and state that they were fact. He never had an argument, he was just telling a story of the depression. Therefore there was no side he could’ve taken one way or the other. He wrote his words so that it was understandable for all. He made sure to add in some interesting facts and tell stories in order to keep the reader interested. I think Berton did a great job in summing up the cause and effects of the depression.