Friday, November 29, 2019

The Civil War Effects All Americans In Different W Essay Example For Students

The Civil War Effects All Americans In Different W Essay aysThe Civil War had a major effect on the American civilization in the 1860s. The novel Red Badge of Courage and the poem Kentucky Belle are prime examples of this. These two pieces of literature show an inside look at the Civil War, getting past the fighting and the battles. Red Badge of Courage is about a young Union soldier, Henry, dealing with the war and its psychological effects. Kentucky Belle is a poem about a woman going through a difficult time, but still gives up her horse to help a young man trying to make it home. The Civil War had very many battles, but none of them compare to the feelings of the people during these battles. We will write a custom essay on The Civil War Effects All Americans In Different W specifically for you for only $16.38 $13.9/page Order now In the novel Red Badge of Courage by Stephen Crane, the protagonist, Henry, is a Union soldier who is afraid of what will happen to him or any of his comrades in his regiment while at war. Henry also sees his enemies as real and humane people. Henrys feeling towards his enemy shows that he is unclear about the wars purpose. The feelings of Henry are probably the same in most Americans during this time. Stephen Crane, the author, does a great job of bringing the sense of fear alive in Henry during this fictional story. The feeling of Henry symbolize the feelings of many family and friends of soldiers at war. The feeling of fear and uncertainty in Henry are similar to the thoughts and feelings of many Americans in the 1860s. In the poem Kentucky Belle, the author shows a sense of realism. The poem is about a woman and her baby going through a very difficult time during the Civil War. The part of the story that shows the most compassionate part of the story is when the womans family gives away their favorite horse Kentucky Belle. They gave it away to a soldier who desperately needed to get home. Giving was something many Americans did during the Civil War, and this poem is a prime example of this. The Civil War in some way touched the lives of almost every single American. This was a tough time for the country, and the country started to change. Women took larger responsibilities in the workplace because so many men were absent in the armies. This a big change temporarily because women were used to taking back seats to mean during this time, and now, theyre doing men jobs. Children were also effected by the war. Their older brothers and fathers were often soldiers at war. The nation was effected. The Civil War had very many battles, but none of them compare to the feelings of the people during these battles. The two pieces of literature mentioned in the above paragraphs are illustrious examples of the thesis statement. Many American were fearful during the war, this can be related to Henry from Red Badge of Courage. Many Americans were very giving and caring during the war; the family from Kentucky Belle is an example of this. In conclusion, the Civil War had great effect on the soldiers involved, but the war also had a great impact on human life.

Monday, November 25, 2019

Pluto and its features. How it was discovered, its measurements compared to Earth, its surface, and its atmosphere

Pluto and its features. How it was discovered, its measurements compared to Earth, its surface, and its atmosphere Pluto....A Controversial Planet!Pluto is a very controversial planet. The reason for this is because it's a dark and distant planet and it's hard to study it clearly enough to be satisfied. Pluto was discovered in 1930 by an astronomer by the name of Clyde Tombaugh. Then James Christy and Robert Harrington discovered Pluto had a satellite, they named it Charon. Pluto and Charon are referred to as double planets. Some of the facts, or measurements, that we know about Pluto are from discovery efforts such as new inventions and long studies. There was supposed to be a scheduled mission in 2001 called the "Pluto Express Mission," and was expected to arrive at Pluto around 2006-2008, but there's no source that could tell if that went ahead as planned or if it was cancelled.From these discovery efforts we learned some data on Pluto. Specifically the measurements compared to the earth.Charon's discovery as a time-varying bulge on the ...So, the distance of Pluto from the sun is 5,913,520 x 103 kilometers, and Earth's is 149,600 x 10 3 kilometers. This should give an idea of how far away Pluto is in comparison. Another comparison between Pluto and Earth would be the radius of Pluto compared to the radius of the Earth. Pluto's radius is 1160 and Pluto's moon, Charon, diameter is 1,172 kilometers (728 miles), just over half the size of Pluto. The Earth's radius is roughly 6378 kilometers, nearly 6 times the size of Pluto! Next, will be the density of each Pluto and the Earth in comparison. Pluto's density is 2.05 g/cm3 and the Earth's density is 5.52 g/cm3. This means Pluto may be smaller but it still has a lot of density to it. The Orbital Period of Pluto is a lot longer than the Earth's because of obvious reasons. Those would...

Friday, November 22, 2019

Islamic State in Iraq and Syria (ISIS) Essay Example | Topics and Well Written Essays - 3250 words

Islamic State in Iraq and Syria (ISIS) - Essay Example The group activities declined in 2006 and 2007 after various measures to counter terrorism. However, after the withdrawal of the US forces in 2011 the group has since increased its attacks targeting the Shiites in an attempt to reignite conflict in Iraq between the Shiite dominated government and the minority Sunnis. According to the report of United Nations, in 2013 alone, there was bloodshed on thousands of the population. In 2012, ISIS was adopted as the formal name of the group and replaced AQI. This is an expression of its broadest ambition because its fighters are challenging the Assad regime in neighboring Syria. In June 2014, attacked military installations in Mosul and took control of the entire city. ISIS or the Islamic state is an extremist movement that makes even Al-Qaeda squeamish. It attracts militants who are eager to build the new caliphate from all over the world. The ISIS army is a mixture of extremists from different parts of the universe including Chechen snipers, Saudi Arabia’s car bombers and western misfits like Douglas McAuthur McCain who has signed to fight among them. The group has kidnapped and murdered American journalists, butchered over seven hundred Sheets in Syria, and threaten the existence of Iraq’s Yazidi community. They employ the vicious Hudud punishments in enforcing sharia laws in the areas they control in Iraq and Syria. The Jihadist group is also known as the â€Å"Islamic State of Iraq and the Levant† (ISIL) and controls an unrecognized sate and caliphate in the Middle East. ISIS originated from the almost fallen Al-Qaeda. The Al-Qaeda who embarked on the arbitrary and brutal treatment of civilians tried to ignite a sectarian war to the majority Shia community in 2006 under Abu Musab al-Zarqawi.  

Wednesday, November 20, 2019

Seeking Proposals of Cummins International Case Study - 16

Seeking Proposals of Cummins International - Case Study Example I am looking for hardware equipment, fasteners specifically. The equipment should include; screws, bolts, washers amongst other fasteners. The detailed list is attached alongside this document. Provide a quotation of the fasteners you can supply, the price per piece, the overall price and the rate of price. The company requires that the supplier provides a documentation of the state of their products, indicating that they meet standards of operation. Â  Any bidding supplier is expected to have equipment that meets the ASTM International fasteners standards. The products are also expected to be within the ISO standards for industrial fasteners. The ASTM standards outline that equipment should go through its own testing environment, evaluation of the use of the material in its manufacture, dimensional aspects and certain properties of industrial fasteners in various uses. In the ISO standards, suppliers should meet the requirements outlined in the ISO Standards Handbook. Â  Every bidder will be expected to fill out answers to the following questions, accurately and correctly to ensure they get high consideration for the issuance of the project. The questions are meant to help us understand the suppliers’ background, their professionalism, and experience amongst other necessary details. The questions and answer will also work in great favor for the suppliers in helping them understand the requirements much more clearly. Â  As you bid, please remember to include your managerial team as your point of references for your work. Additionally, provide contact information for previous clients whom you have worked with in the past, or you are continuing to work with, and have been satisfied with your work. Â  Financial records are taken seriously to ensure that the winning bidding suppliers do not face any blocking circumstances.

Monday, November 18, 2019

Analyze a news paper Essay Example | Topics and Well Written Essays - 750 words

Analyze a news paper - Essay Example t consider the nature of the audience by asking who the articles are targeted for, what type of information are they offering based on the types of language being used. By examining an issue of a newspaper such as The Chronicle for evidence of the process, the motive and the audience, one can get a better idea of the newspaper’s quality. The process of a newspaper refers to the types of information the issue contains and what this reveals about the paper’s persuasion. A look through the titles of the articles suggests the paper carries a pro-institution persuasion as the main thrust of the issue explores the concept of for-profit college systems as the new wave for the future. Information offered in the most current issue of the newspaper includes titles such as â€Å"For-Profit Colleges Change Higher Education’s Landscape†, â€Å"Private Giving to Colleges Dropped Sharply in 2009†, â€Å"In a Booming California Suburb, Fertile Ground for For-Profit Colleges† and â€Å"In Cutting Programs, Universities Try to Swing the Ax Gently.† In these titles, there is enthusiasm for the for-profit concept and discouraging news for the non-profit sector. The Chronicle of Higher Education makes no attempt to disguise its affiliation with the institutions, however, so this persuasion is no t surprising. In the case of the article about cutting programs, for example, a great deal of information is provided regarding the extreme difficulties college boards are having in trying to tighten the budget while retaining as many programs as possible. This begins to introduce the question of the motive. Why would a newspaper have such a persuasion in their reporting? What are they hoping to achieve in reporting on these issues? Because the newspaper is strongly affiliated with the higher education institutions, it stands to reason that they would take a stance strongly supportive of the institutional viewpoint. Sympathetic to the difficulties being experienced by universities

Saturday, November 16, 2019

Advantages And Disadvantages Of Using Networks Computer Science Essay

Advantages And Disadvantages Of Using Networks Computer Science Essay Introduction to network Computer network or network is collection of computers, printers and other devices connected with each other through a connection medium and other suitable peripherals. The purpose of the connection is mainly transfer or share data, share of resources such as printers, applications etc. The connected computers and devices may be in the same building or can be Located in different part of the city, country or world. Appropriate connection medium, peripherals, software enable computers to transfer, and receive data such as text, pictures, video, sound through email, file transfer (ftp-file transfer protocol), web pages(http -hyper text transfer protocol) etc from one computer to another computer in the network securely. History of networking The first idea of computer networking was developed by J.C.R Licklider, a computer scientist in 1962. He was later appointed by U.S. Department of Defence at their research project called ARPA (Advanced Research projects agency). ARPA was funding research for developing computer network to MIT. In 1966 first ARPAnet plan for packet switched network unveiled and in 1969 first official computer network was built between University of California Lon Angels (UCLA), Stanford Research Institute (SRA), University of California Santa Barbara (UCSB) and University of Utah. The first message was sent from UCLA to SRI. In 1973 Arpanet goes global; University College London and few other European organizations joined the network. In 1982 standardized Internet technology protocols TCP/IP (transmission control protocol and Internet protocol) were developed which enable internetworking among single sets of networks efficiently and commercial Internet services started to evolve. In 1991 World Wide W eb was developed and Internet became popular and expanded rapidly including dramatic rise of email users, text based discussion forum etc. Advantages and Disadvantages of using networks Advantages Disadvantages Share of Expensive Resources: Printer, fax machines, modem and other connected resources can be shared. File and application sharing: Major advantage of network. User can access any file remotely from his computer to another computer with appropriate security measures. Applications also can be used without having installed in every computers of the network. Cost saving: Sharing application by installing its network version saves cost of many copies of individual application. Sharing devices such as printer, fax etc saves cost. Secured: Files and application are password protected in network, which means only authorised person can access it. It is more secured than traditional file system. Speed: Message, Data, file can be transferred almost instantly to any part of the world. Easy management: Software can be installed in server, also managing and troubleshooting can be performed in server. This eliminates the need of installing and managing software in hundreds of computers in an organization. System failure: Servers or connection faults stop accessing files or data. This can lead to loss of data and resources. Security issue: data and file can be theft by hacker. This is the main drawback of computer networking. Computer viruses, spyware attack can lead to system failure, data and resources loss. Expensive Equipment: Networking equipments are expensive compare to traditional file system and communication method. Answer of criterion P1 (b) Remote Access Remote access means accessing and using any file or application from a computer to another computer connected in the network. Both computers may located in same building or thousands miles away. Generally files or applications are accessed over Internet, intranet or LAN with an authentication process which determine the level of access of the user. For example, a sales staff of Barclays bank accessing loan authorisation database from his home through Internet. Intranets Intranet is a private computer network between an organization using Internet protocol and tools such and HTTP, file transfer application to share information or application within the organizations. Typically, authorised users of an organization gain access files or applications in Intranet through a web page with their user name and password. Staffs of the organizations also maintain internal communication in Intranet via email. Email is accessed via an email client such as Microsoft outlook, Eudora etc. this email clients use POP3 (post office protocol) and SMTP (simple mail transfer protocol) for receiving and sending mail. When an email is sent, the email client connect to the server after providing valid user name and password and verify the address of the recipient, if the address is correct it leaves the email on the server. When recipient checks his email, his email client connects to the POP3 server. POP3 server also requires a user name and password. After logging in email client bring the copy of email message to users computer and generally delete the message from the server. User than read or search email message in his computer. Internet Internet is the largest network in the world. It interconnects world wide networks of organisations, billions of computer users in one single network using Internet protocol (TCP/IP). Internet is a global data communication system with the largest resources of information and services such as World Wide Web, Email, file transfer protocol etc. Email in Internet works using SMTP, POP3, and IMAP. Users use email software or web page email program such as yahoo, hotmail etc for sending and receiving mail. This program connect user to the server for sending and receiving email similarly discussed in Intranet section. In Internet SMTP server has communication between other SMTP servers in Internet. When an email sent SMTP server check the address and send the mail to recipient email server. Similarly when recipient checks the email using POP3 it does the same as discussed earlier. IMAP (Internet mail access protocol) is more advanced protocol which provides better features than POP3. In IMAP email is kept in the server. User can organise email in different folders and they stays in the server. It enables users accessing mail from any computer any time as email resides in the server. LANs (Local Area Networks) Network in a limited geographical area such a home, office, school in same building or in different building within short distance. Each connected computer or devices are called node. Currently most wired LAN connects using Ethernet technology. Fig: LAN WAN (Wide Area Network) WAN connects networks over a large geographical area such city, state or over countries. It uses routers and combination of communication channels such as public communication link, air waves, etc. Fig: WAN MANs (Metropolitan area network) MANs connect two or more LAN within a same city or town. It normally connects two or more branch of an organisation within the same city using routers, switch, and hub. It often connects through public communication link. Fig: MANs Networked application An application software which can be shared on a network from connected computer by an authorise user. Networked application is normally installed on server of a network, and authorise users of that network (LAN/WAN) can access and work with that application from their workstation. This application utilizes Internet or other network hardware infrastructure to perform useful functions. Answer of Criterion P2 Description of Devices/ Hardware/ software Number of unit and unit price Price Performance Security Utility Workstation: COMPAQ Presario CQ5305UK-m Desktop PC with Monitor CPU- Intel Core2 Duo 2.1 GHz OS; Windows 7.0 15  £359  £5385 20 work station is connected using netgear switch provides a full duplex very high 100 mbps data transmission speed over a 100baseTX connection with UTP CAT6 cable. Dell powerEdge server with Windows server 2008 R2 standard edition gives efficient and secured file sharing and print server functions, remote access, application sharing. Windows server 2008 R2 edition has an increased efficiency and service with windows 7.0 clients operating system. Microsoft Windows 2008 server R2 edition network OS have enhanced security features to prevent server form hackers, and gives a solid dependable environment for networking. Kaspersky Business space security software provides real time protection to the server and work stations against harmful virus, spyware, and other harmful internet treats. its constantly monitor and scan all open or modified files and application. It isolate any infected workstation on the network to prevent the server from being infected and clean the workstation. This LAN will enable the users of this organization share file and information whenever they needed from their work station. They are able to print any document from their printer using network printer. Sharing printers and applications saves companys cost and increased productivity. Server: DELLâ„ ¢ PowerEdgeâ„ ¢ T110   CPU: Intel Core i3 2.93 GHz Net OS: Windows Server 2008 R2 standard edition + 20 CALs (client access license) 1  £1359 Switch: NETGEAR JGS524 Gigabit Switch -24 ports 1  £237 Cables: 200 m UTP ( CAT 6 )    £42 Connector: Network connector RJ-45 2 pack ( 25 in a pack)  £4 each  £8 UPS: (UPS provides uninterrupted power supply to the server and prevent server failure due to an event of power cut). APC Smart-UPS 2200VA 1  £588 Security Software: Kaspersky Business Space Security for 20 workstation and 1 windows 2008 server. 1 year subscribtion  £587 Answer of Criterion P3 Overview of network Operating system A network operation system is a set of software that control and manages computers, printers and other devices connected in a network. it allows computers to share file and devices connected in the network. It is installed on a computer called server which centrally maintain the network. There are many Net OS from different vendors in the market. Among them most popular are Windows NT, Windows Server from Microsoft, Unix Novel Netware from Novel Inc. Apple Share from Apple Regardless of vendors all Net OS works by providing following functions and services to the client and server File and print sharing Accounts administrations for users Security Some basic features of a network operating system are- Add , remove and modify users, workstations, devices in the network Add, Remove and configure application software to be used and shared by the users on the network Control and manage users and their access Allow and control users to share data, application and devices such as printer, fax etc. Allows users to transfer data from one computer to another computer in the network Mange security and privilege. Security Implications of network use The computer connected in a network is vulnerable to intruder such as hackers and intrusion programs. Also virus, malware, spyware, worms on the network attack the system. Those attacks may results valuable information theft, system failure and data loss or even irrecoverable damages to the system. Intruder gain access and control of the system by using some methods as described below- Back door and remote administered program Spam email Email virus Trojan Horse program Hidden files To keep the system secure there are some security measure should be taken. System needs to be password protected, password should be changed regularly and shouldnt be disclosed to anyone System should have latest software update. Antivirus, firewall, anti spyware should be installed and should be updated regularly. Suspicious email shouldnt be opened. File or program shouldnt be opened from unknown sources Disable hidden file extension Disconnect from network when pc is not in use. Software Licensing Issues Software licensing is an agreement between user and software manufacturer. software using conditions and distribution limitations. Software is intellectual property and protected by copyright laws. When a software is obtained from any sources users enters into some legal bindings set out by the manufacturer or distributor on how this software may be used. These includes but not limited to numbers of users, distribution rights and limitation, resale rights and limitations, reproduction and modification limitations etc. Most of the commercial software comes with license when purchased off the selves. Some software license is bundled with specific hardware or new system, call OEM License. There are different categories of software license- Propitiatory: Software own by a company or individuals and not free or open sourced. Redistribution or reproduction is generally not allowed or limited Freeware and Open source software: Generally free and permits user to modify, reproduce and distribute according to their own preference Shareware, Trial ware: is propitiatory software but provided free to user to use for a limited period of time for testing. Reproduction is not permitted but distribution may be permitted with certain conditions Constrains on Capacity and performance Every Network has limited capacity of transferring and receiving data. this capacity (bandwidth) depends on the several factors such as device and medium used, price etc. each users of a network share the bandwidth and everyone is effecting the performance of the network. For example, if user sends a very large video or animation file to another computer in the network which most likely to use most of the capacity of the network, which will make the network very slow to other users. Thus performance is affected, in some cases packet or data losses may occur due to overloading of network. When a packet is lost, retransmission of packets attempted and this cause delay of receiving and sending data. Answer of Criterion P5 Relationship of Various Protocols, devices of network with OSI-7 layered model Application (Layer 7) Http-Hyper text Transfer Protocol Telnet FTP- File transfer protocol Presentation (Layer 6 Jpeg, Gif, avi, mov, mpeg etc Session (Layer 5) NetBios Names, RPC, AppleTalk, Winsock Transport (Layer 4) TCP, UDP,SPX Network (Layer 3) IP, IPX, AppleTalk DDP Router Data link (Layer 2) Frame Relay, HDLC, ATM, IEEE 802.3/802.2/802.5 Ethernet Switch, Bridge Physical layer (Layer 1) Ethernet, 802.3, 802.5, Token ring Repeater, Hub Ethernet: Most commonly used protocol for LAN. Ethernet fits into the Data link layer and Physical layer of OSI model and deal with the hardware of the network. it define about the type of media, connectors, characteristics, use of wires, shape of connectors etc. HDLC: High-level Data link Control used for point-to-point WAN link. TCP/IP: Transmission Control Protocol/ Internet protocol. These pair of protocol allows one network to communicate with another by creating logical address, segmentation of large data into small packets, data encapsulation, error recovery etc. UDP: User datagram Protocol. Transmit data from one host to another without establishing a prior connection. It simply transmits data without knowing if the data is transmitted correctly thus unreliable. ICMP: Internet Control Message Protocol carry error recovery data, control data such as destination unreachable, echo request, etc between two host Http: Hyper text transfer protocol, FTP: File transfer protocol SMTP: Simple mail transfer protocol

Wednesday, November 13, 2019

Struggle Between Good and Evil in William Goldings Lord of the Flies E

The Struggle Between Good and Evil in William Golding's Lord of the Flies   Ã‚  Ã‚   Evil is not an external force controlled by the devil, but rather the potential for evil resides within each person. Man has the potential to exhibit great kindness or to rape and pillage. In the novel Lord of the Flies, William Golding deals with this evil that exists in the heart of man. With his mastery of such literary tool as structure, syntax, diction, point of view and presentation of character, Golding allows the reader to easily identify with each character and explore the novel's main theme, the constant internal struggle between the forces of good and evil.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Golding's novel has a "remarkably complete and solid structure"(Kinkead-Weekes 15). With the exception of Ralf's dream, Golding' novel follows chronological order. It begins with the boys' arrival on the island. Through the chapters one to four, the tension rises between Jack and Ralf, the two leaders. The crisis is reached in chapter five, "Beast from Water", when Simon comes face to face with the personification of evil, the Lord of the Flies. The tension mounts continually as the story unfolds for "the structure and technique of Lord of the Flies is one of revelation" (Kinkead-Weekes 22). The climax is reached shortly after the shattering of the conch and Piggy's death, when the boys attempt to kill Ralf. After this the story quickly comes to an end with the arrival of the naval officer. Thus the story follows the relatively common path of exposition, rising action, crisis, climax and falling action.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Golding's skilful use of syntax is also quite common. He uses long periodic sentences when describing of the peaceful coral island, shadowed wit... ...at "a clearly focused and coherent body of meaning [is] crystallizing out of every episode" (Kinkead-Weekes and Gregor 15). Lord of the Flies enables the reader to comprehend that the "devil rises, not out of pirates and cannibals and such alien creatures, but out of the darkness of man's heart" (Hynes 16). Works Cited. Baker, James R. "Why It's No Go." Critical Essays on William Golding. Ed. James R. Baker. Boston: G.K. Hall & Co., 1988. Golding, William. Lord of the Flies. London: Faber and Faber, 1958. Hynes, Samuel. "William Golding's Lord of the Flies." Critical Essays on William Golding. Ed. James R. Baker. Boston: G.K. Hall & Co., 1988. Kinkead-Weekes, Mark, and Ian Gregor. William Golding: a critical study. London: Faber and Faber, 1967. Moody, Philippa. Golding: Lord of the Flies, a critical commentary. London: Macmillan, 1964.

Monday, November 11, 2019

Hate Crime Analysis

Hate Crime Analysis Terryann Lemonius AJS/542 January 21st 2013 When thinking about hate crime the first thing that would come to mind is crimes against an individual based on the color of their skin. Most often this will be between Blacks and Whites. However there are many other factors that can subject to being a victim of hate crime. This essay will aim to highlight some of these for a specific group citing specific examples of a hate crime, restorative justice models that can be applied to the group.It will also further go on to explain the benefits and challenges with the use of that particular restorative model, along with a contemporary research method that could be used to measure the victimization of this particular group. Finally an attempt will be made to link the victimization of this group with the criminological theories currently being studied. A group of people who often face hate crimes are Muslims. Although not as popular as some other forms of hate crime that frequ ent newspapers or news stations.It is also one that in some ways has become a taboo subject when it is brought up around some politicians, community leaders, and private citizens. One of the main factors that have put the Muslim community in the firing line for hate crime is the events of September 11 2001. The leaders and perpetrators behind the attacks were Muslims and as such the religion has taken a brunt of the fallout for the attacks. Statistic by the FBI in 2011 shows that 12. 5% of hate crime of a religious cont want aimed at Muslims (U. S. Department of Justice-Federal Bureau of Investigation, 2012).One example of such crime is that of Mark Stroman in 2001. Stroman on September 21st 2001 walks into a gas station and opened fire on individuals he believed were muslins and Arabs (Somanader, 2011). Stroman killed two people and seriously injured another. However, only two of Stromans victims were actually Muslims (Somanader, 2011). Stroman, after admitting his crime has since been sentenced to death by a Texas court. Another example of hate crimes against Muslims was the attack on Bashir Ahmad, who was the victim of a stabbing by an unknown assailant in November 2012.A devout Muslim, basher was attacked outside a Mosque in Queens, New York by the assailant. Bashir suffered multiple stab wounds in the attack as well as verbal abuse from the perpetrator (Chinese, 2012). Both these offense are just a few of the hate crimes against Muslims that actually get reported. There are many more examples such as these that go unreported and as such do not reflect in any statistics that exist on hate crimes against Muslims. One common thing between the two attacks is that both victims do not hold and sort of ill feeling towards their attackers.They both accept that their religion has been placed in the firing line by the action of some of the more radical believers in the religion, which is not a true depiction or representation of what the religion is about. And both have stayed steadfast and true to their religion despite the attacks. Thinking about restorative justice models that could be applied to this group one would have to lean towards education. The aim of restorative justice is to give the victims a voice and hope to stop future acts from being committed. To address the issue of hate crimes, the source of the problem must be identified.Such as what makes the group/individual a target and them work toward setting in place the necessary elements that could counteract hate crimes against them. Some of the elements include the following: * Education: By educating specific individuals and populations that ere underserved to recognize and report hate crime. As well as the educating those who commit hate crime about the religion/group they are targeting. * Assist Victims: Helping victims to identify and access services that are available to them as victims of a hate crime.These resources could be cultural or linguistic. * Advocate for communi ty: In order to reduce hate crime in the community there must be programs that advocate for the victims and the community. * Recognition: The depth of the problem must be recognized by leaders within the community and addressed accordingly through funding increase programs in the community. These are just a few ways that the Los Angeles County Commission has put forward for restoration justice for hate crimes (â€Å"The Hate Crime Victim Assistance and Advocacy Initiative†, n. ). Partnering with local police departments would also be a way to incorporate restorative justice. As with any other justice models there will be benefits and challenges. The benefits of the suggested elements above are, many will benefit from the extended knowledge provided through education. There will be an increase in understanding on the part of the victim and the offender that will hopefully reduce the hate and increase tolerance. Challenges that may arise would be how to get the two groups to si t and talk amicably.It would also be a challenge to figure out what would break the ice between the two groups that would make understanding each other much easier. In order to measure the victimization of Muslims a suggest research instrument that would be recommend is the use of qualitative and quantitative research. These could be in the form of surveys that uses both figures and in-depth question that would allow the researcher to have an idea of what percentage of the community is affected.The in depth question would further allow the researcher to determine the reasons behind the attack and the effect the attack had in the victim (Kraska & Neuman, 2008). One of the most applicable theories that could be applied to explain the victimization of this particular group is the conflict theory. Emerging from the labeling theory the conflict theory would best explain why this particular group would fit in theory. This theory aims to give minority groups a voice through the movements s uch as the civil rights movement and other movement that fought for equality (Williams & McShane, 2010).Even though this is an argument about religion, some inequality exists in the way the Muslims are treated throughout the United States. To conclude, like many other groups Muslims have the right to express and practice their religion without experiencing any repercussions. However because of the acts of a few individuals the entire Muslim community suffers. Despite the challenges that arises from attempts to find restorative justice for the victims of hate crime the courage and understanding shown to the attackers by the two victims mentioned earlier should be admired.It is also an example of how knowledge, time and education can change the minds and hearts of the most hardened offender in hate crimes as with the case of Mark Stroman, who changed his prospective on Muslims after the surviving victim from his attack fought to save him from execution (Somanader, 2011). References. W illiams, F. P. , III, & McShane, M. D. (2010). Criminological theory (5th ed. ). Upper Saddle River, NJ: Pearson/Prentice Hall. Kraska, P. B. , & Neumann, W. L. (2008). Criminal justice and criminology: Research methods. Boston, MA: Pearson/Allyn and Bacon. Somanader, T. 2011). With one day left, Muslim ate crime victim tries to save his shooter from execution. Retrieved from http://www. thinkprogress. org/justice The hate Crime Victim Assistance ans Advocacy Initiative. (n. d). Retrieved from http://lahumanrelations. org/programs/hcva/hcva. htm U. S. Department of Justice-Federal Bureau of Investigation. (2012). Hate Crime Statistics, 2011. Retrieved from http://www. FBI. gov Chinese, Vera. (2012). Muslim hate crime victim who was stabbed six times in the back says he harbors no ill will against attacker. Retrieved from http://www. nydailynews. com

Saturday, November 9, 2019

Jerry Maguire-Case Study

LED 605 Negotiations*, Bargaining and Conflict Resolution*: Jerry Maguire Case Study by Hana Jurcovicova For our case study assignment we watched a short part from Jerry Maguire movie. In this movie Jerry Maguire is a sport agent. This kind of job was always his dream. But he is not happy in his job. He hates himself and what he became. He hates the company that was all about money. He learned when he first started, that the job of a sports agent is mostly about personal relationship, caring for people doing business with and meeting their needs. He writes a new mission statement for his company, for the future of it. He wants to make it a company he would like to work for. He thinks that the most important thing is to have fewer clients, which they can take better care of. Fewer clients mean less money for the company which is oriented mostly in making a lot of money. He writes a little book about this mission statement about what we think but never say loud and put it in every mailbox of every employee. The next day when everybody reads it or is still reading, people are clapping to Jerry Maguire even though they know almost for sure he was going to be fired for that. Jerry Maguire is fired later on in the movie. He is fired for sharing his personal opinion and writing about it. It looks like he wants to set people against the company and the way it operates right now. Moreover he did not discuss this mission statement change with any of the members of the board or CEO. Nobody gave him the permission to release his new mission statement to public.

Wednesday, November 6, 2019

Researching the Civil War Soldiers in Your Family Tree

Researching the Civil War Soldiers in Your Family Tree The American Civil War, fought from 1861-1865, affected nearly every man, woman, and child living in the United States. Almost 3.5 million soldiers are believed to have been involved, with around 360,000 Union soldiers and 260,000 Confederate soldiers losing their lives as a direct result of the war. Given the dramatic impact of this conflict, if your ancestors lived in the United States during this time, it is likely that youll find at least one Civil War soldier in your family tree. Locating a Civil War ancestor, whether it is a direct ancestor or a collateral relative, can provide another source of information on your family tree. Civil War pension files, for example, contain statements of family relationships, dates and places of marriage, and lists of various places the soldier lived after the war. Muster-in rolls often contain places of birth, as do descriptive rolls. Before You Begin the soldiers namewhether he served for the Union or Confederate armythe state from which the soldier served In Which Unit Did Your Soldier Serve? Once youve determined the state from which your Civil War ancestor likely served, the next helpful step is to learn which company and regiment to which he was assigned. If your ancestor was a Union soldier, he may have been part of the U.S. Regulars, a unit of the United States Army. More likely he was a member of a volunteer regiment raised by his home state, such as the 11th Virginia Volunteers or the 4th Maine Volunteer Infantry. If your Civil War ancestor was an artilleryman, you may find him in a battery unit such as Battery B, 1st Pennsylvania Light Artillery or Battery A, 1st North Carolina Artillery, also called Manlys Battery. African-American soldiers served in regiments ending with U.S.C.T. which stands for United States Colored Troops. These regiments also had Caucasian officers. While infantry regiments were the most common type of service unit of the Civil War, there were many other branches of service on both sides - Union and Confederate. Your Civil War ancestor may have been in a heavy artillery regiment, cavalry, engineers or even the navy. There are many ways to learn the regiment in which your ancestor served. Begin at home, by asking your parents, grandparents and other relatives. Check photo albums and other old family records as well. If you know where the solider is buried, his tombstone may list his state and unit number. If you know the county where the soldier lived when he enlisted, then county histories or other county resources should provide details of the units formed in the area. Neighbors and family members often enlisted together, which may provide further clues. Even if you only know the state in which your Civil War ancestor served, most states compiled and published a list of the soldiers in each unit from that state. These can often be found at a libraries with a local history or genealogical collection. Some lists have also been partially published online. There are also two country-wide published series that list the soldiers who served in the Union or Confederate armies during the war, along with their regiments: The Roster of Union Soldiers, 1861-1865 (Wilmington, NC: Broadfoot Publishing) - A 33-volume set that lists all of the men who served in the Union armies by state, regiment and company.The Roster of Confederate Soldiers, 1861-1865 - A 16-volume set that lists all of the individuals who served in the southern armies during the war, by state and organization. Civil War Soldiers Sailors System (CWSS) sponsored by the National Park Service. The system features an on-line database of names of soldiers, sailors, and United States Colored Troops who served in the Civil War based on records at the National Archives. The subscription-based U.S. Civil War Soldier Records and Profiles collection at Ancestry.com and the American Civil War Research Database are other excellent resources for online Civil War research. They will cost you, but both generally offer further details than the CWSS database. If your ancestor has a common name, however, it may be difficult to distinguish him in these lists until you have identified his location and regiment. are other excellent resources for online Civil War research. They will cost you, but both generally offer further details than the CWSS database. If your ancestor has a common name, however, it may be difficult to distinguish him in these lists until you have identified his location and regiment. Once youve determined your Civil War soldiers name, state and regiment, its time to turn to service records and pension records, the meat of Civil War research. Compiled Military Service Records (CMSR) Whether fighting for the Union or the Confederacy, each volunteer soldier who served in the Civil War will have a Compiled Military Service Record for each regiment in which he served. The majority of Civil War soldiers served in volunteer regiments, distinguishing them from individuals serving in the regular U.S. Army. The CMSR contains basic information about the soldiers military career, when and where he enlisted, when he was present or absent from camp, amount of bounty paid, how long he served, and when and where he was discharged, or died. Additional detail, when pertinent, may also be included, including information on hospitalization for injury or illness, capture as a prisoner of war, courts martial, etc. The CMSR is an envelope (called a jacket) containing one or more cards. Each card contains information compiled several years after the Civil War from original muster rolls and other records that survived the war. This includes Confederate records captured by the Union armies. How to Obtain Copies of Compiled Military Service Records Online from Fold3.com – Fold3.com, in collaboration with the National Archives, has digitized CMSRs from most states, both Confederate and Union, and put them online where they can be viewed and downloaded for a fee. CMSRs are currently available for most, but not all states at Fold3.com.Order Online from the National Archives – You can order Civil War Service records from the National Archives online or by mail for a fee. To use this service, you will need the soldiers name, regiment, state and allegiance. If you prefer to order a copy by mail, you will need to download and use NATF Form 86. Civil War Pension Records Most Union Civil War soldiers, or their widows or other dependents, applied for a pension from the U.S. federal government. The biggest exception were unmarried soldiers who died during or soon after the war. Confederate pensions, on the other hand, were generally only available for disabled or indigent soldiers, and sometimes their dependents. Union Civil War Pension Records are available from the National Archives. Indexes to these Union pension records are available online by subscription at Fold3.com and Ancestry.com (subscription links). Copies of the full Union Pension File (often containing dozens of pages) and be ordered online or by mail from the National Archives. Confederate Civil War Pension Records can generally be found in the appropriate State Archives or equivalent agency. Some states have also put indexes to or even digitized copies of their Confederate pension records online.Confederate Pension Records – A State by State Guide

Monday, November 4, 2019

Globalization - Good or Bad Essay Example | Topics and Well Written Essays - 1000 words - 1

Globalization - Good or Bad - Essay Example In terms of International Trade, the author has described globalization as the platform that sets a level playground for both rich and poor countries. The author has also affirmed the less developed country can only improve their situation through the assistance of World Bank and the International Monetary Fund. I agree to a greater extent the assertions of the author except at some few issues which I total disagree. The World Bank and the International Monetary Fund have been described by the author as the pillars of global governance systems. The author overlooked the power of sovereignty of states, democracy, and the international justice system. The claim that developing countries can only improve their situation through these two global financial institutions is not accurate. Wallerstein (2004) pointed out that the World Bank and the International Monetary Fund is ‘training’ poor countries to depend on them. Developing countries have difficulties servicing the loans they receive from these organizations. They find themselves overburdened by the huge interest rates and end up borrowing again from other sources including internal sources. This creates a scenario similar to the one of digging a hole to bury another hole. The problem still remains. In this regard, I view the two institutions as contributing to the slow growth of developing economies and not as the sole path to their economic prosperity. Multinational companies in developing countries have been highlighted as better paying compared to the local firms and that foreign firms are not really oppressing their workers. Hurst (2008) claim that multinational companies are one of the social oppressions in less developed and poor countries. They offer jobs to locals at a higher wage than local firms, but this should not justify the poor, working conditions, job insecurity, or the prolonged hours of work often witnessed especially in the manufacturing industry. The author claims that if the w orkers were not happy with these companies then they would leave. Hurst (2008) explains that is huge labor force in developing countries and very few job opportunities which leaves many workers to ‘persevere’ where they are. The reason, therefore, why these workers continue working for the foreign firms is not because they are happy but rather because they have nowhere else to look for a livelihood. On the issue of foreign companies being nothing compared to the government, and not being able to raise an army or taxes, the author failed to put into perspective that, at times, some senior government officials usually have personal interests in these companies. Revesz (1997) stated that when it comes to crisis where multinational firms are being accused of various reasons, ‘the states cannot be trusted’ in the way the matter is handled. He observed that despite huge negative publicity and accusations from both the media and the public, the government remains silent and waits for the ‘tide to settle’. The international trading system has been implied by the author as unbiased against developing countries. This may be true as far as international trade laws and regulations are concerned. But, on the other hand, according to Wallerstein (2004), there is a more serious issue of trade imbalance whereby developed countries have an upper hand due to their economic strength advantage, superior

Saturday, November 2, 2019

Male circumcision as an hiv control stategies and not a natural condom Essay

Male circumcision as an hiv control stategies and not a natural condom - Essay Example Reproductive Health Matters, the safest way to prevent HIV infections is still to use a condom rather than relying on assumptions which are yet to be proven sufficiently (Bonner, 2001). Bonner is of the opinion that unless certain facts are not proven practically, it is unwise to adopt and follow such assumptions. The facts to be proven encompass umpteenth number of issues such as the reason and the way how circumcision is risk-free, the exact relationship between circumcision status and the remaining STIs (Sexually Transmitted Infections). Also, Bonner is still waiting for an answer backed by sufficient evidence that whether or not positive result found in high-risk populations will reap equal results in case of other general groups. However, according to Updegrove, various conclusions insist that uncircumcised males tend to suffer from higher rates of sexually transmitted diseases (Updegrove, 2001). The same has been coherently acknowledged by Ronald Gray and his team with similar mindset (Gray, Kigozi & Serwadda, et al, 2007). Other think-tanks, Bailey, Plummer and Moses, all consider circumcision as an anti-HIV measure (Bailey, Plummer & Moses, 2001). Newell and Barnighausen have gone on to confirm that male circumcision cuts down HIV risk even in the general population (Newell & Barnighausen, 2007). Nevertheless, it should be noted that all the above think-tanks do reveal a certain level of uncertainty in expressing their perspectives. Hence, the two completely distinct recommendations; whether or not to replace condoms with circumcision appear to be a highly perplexing issue. Bonner highlights an investigation according to which circumcised men reveal higher occurrence of genital discharge (Bonner, 2001). He puts forward a French report which reveals that both circumcised as well as uncircumcised men exhibit almost same state of HPV incidence which plays a vital role in cervical cancer (Bonner, 2001). By referencing an American case, Bonner diligently