Tuesday, December 31, 2019

Obama Speaks At The Dnc American Family And The Need Of...

Obama speaks at the DNC: American Family and the Need of Clinton It is that time of the year again where American politicians stand under the spotlight and appeal to the world’s attention. The Democrats gathered in Philadelphia together this night to support their party. Presidential candidate Hilary Clinton and her better half. Those who are on the Capitol Hill and surely, our standing President and the First Lady, Barack and Michelle Obama. It is of no surprise that the President speaks for his party during election season; Obama is well-known for his unpretentious and engaging speech. It is one of his last speeches before the end of his tenure and, by dissecting his speech, we learn how he managed to entertain the Democrats for almost fifty minutes. With the ultimate goal of bringing the Clintons to the limelight. Obama appears in the sea of clamors and cheers on the stage. Pay Specific attention to a man’s tie, as it conveys essential nonverbal communication message (Dorrance 4). He has a necktie of a shade of blue that is slightly lighter than his wife’s dress. It is extremely hard to convince the public to vote for a candidate who had been covered with tabloid news, national safety concern and debates with â€Å"test qualities that have virtually nothing to do with governing† (Drew 1). According to the BBC, blue, is an all-purpose hue and seen as an international power color. It is also, according to the National Post, the second-safest color for politicians. NotShow MoreRelatedGeorge Washington And The President Of The United States2323 Words   |  10 PagesSince the start of the United States, there have been politics. Starting with those in charge of the new colonies, leaders of battles for land all the way to the leaders of the revolution, politics have played a r ole in American life. Once the revolution occurred and it was determined that George Washington would be the nation’s first president, a new track for politics was formed. It was from this line of presidents and official democratic government that political parties, ways of voting, and the

Monday, December 23, 2019

Tuberculosis As A Infectious Disease - 1339 Words

Tuberculosis (TB) is a highly infectious disease that can harm any organ of the body, especially the lungs. Every year about over a million people die due to tuberculosis and even more are infected. A person in contact with an infected individual can easily put themselves at risks of getting TB. Due to the emergence of human immunodeficiency virus (HIV), tuberculosis infections commenced to increment more rapidly. A person with HIV has an impotent immune system which is not able to fight infections such as tuberculosis. There are many ways to diagnose, prevent and treat the further spread of this disease. There are many ways to identify and diagnose the presence and severity of tuberculosis. One of the most prevalent ways to test for TB is†¦show more content†¦Sputum tests may be required for testing if the chest x-ray reveals signs of TB. Tuberculosis can spread by contagious airborne droplets that are passed on easily through close contact with a person who has active or untreated TB. As a person coughs, sneezes, or interacts, it can relinquish infectious droplets into the air. Once a person inhales the infectious droplet (bacillus), it settles in the upper airways. â€Å"Bacteria in droplets that bypass the mucociliary system and reach the alveoli are expeditiously circumvented and engulfed by alveolar macrophages, the most abundant immune effector cells present in alveolar spaces† (Knechel, 2009). These macrophages are a component of the immune system that fights to destroy the mycobacteria to obviate infection. â€Å"The outcome is essentially determined by the quality of the host bulwarks and the balance that occurs between host bulwarks and the invading mycobacteria† (Knechel, 2009). If the alveolar macrophage fails to overcome the inhaled mycobacteria, the bacteria will replicate until the macroph age lysis. As the monocytes are magnetized to the infection site, it then separates into macrophages and consumes the free bacilli. The mycobacteria then multiply within the macrophages causing it to become infected. The infected macrophages may then be transported to the lymph nodes where it can easily reach the blood stream. After two to three weeks of infection, the helper T cells are

Sunday, December 15, 2019

The Holocaust †Why was this happening to me Free Essays

I could hardly breathe or move in the cramped animal wagon. The stench of filth and disease surrounded me and I longed for fresh air. My name is David Cohen and I cannot believe how my life was torn apart in such a short space of time, nor do I understand why it happened even after all these years later. We will write a custom essay sample on The Holocaust – Why was this happening to me? or any similar topic only for you Order Now I will never forget that warm April afternoon when I rushed home from helping in my Father’s jeweler’s store. I was surprised that the front door was open, but nevertheless ran in shouting for my Mother. I heard thuds and screeching as if the heavy furniture from upstairs was being moved. What’s the matter, Mother? † I yelled. Two burly soldiers dragged her out of the living room. â€Å"GO! † she screamed, through heavy sobbing. I just stood there, in the doorway, speechless with shock. I hesitated, but I turned and started to run in the direction of the door, but a third lofty soldier appeared as if from nowhere dived after me and just lifted me up as if I weighed nothing. We were rigorously marched down to the depressingly grey train station, which was in total and utter chaos. There was a massively indistinct mixture of hundreds of people sobbing, crying and arguing. â€Å"Where are we going? â€Å"What’s happening? † â€Å"I’ve lost my Mummy! † a child snivelled. â€Å"Where is she? † but nobody answered. The thickset soldiers shoved us brutally into a waiting cattle truck. There must have been fifty or more people already in this ‘carriage’. Daniel Leigh 11Saul Holocaust Coursework On the way to this man-made hell, I could smell the fear from all the people around me. In addition, there was the stench of remains of old bodies which had most likely died on the most treacherous journey from one place to another (I didn’t want to think about it then, but I figured that out after the war). As well as this, there was the reek of infection as the train was juddering past the sunny countryside. When we got out of the ‘train’, my eyes throbbed as I had to strain, a product of the very little amount of light in the ‘carriage’. It seemed to be a pleasant day. We were shoved into several ‘sorting fields’ where the men were separated from the women, the thin from the broad, and the weak from the strong. Also, there was a sorting field where people were made to say if they had an occupation. I said that I was a jeweler (I only had the experience from my Father’s shop, but I did not tell them). After the painful separation, the SS men ordered the teen-aged to the middle-aged and strong men and women into what they called ‘drill’ and instructed us into ‘rank’. Everybody was then divided into groups of two or three and told to proceed to a wooden hut. We were marched there. It must have been over a mile long. In the wooden hut there were the same machines that my Father used in his shop. I was deployed with a boy named Eric Drench, who was my age, which was then fifteen. The first night I was there was a terrible howling wind. I did not sleep at all, as I sensed that the future is not a particularly bright one. I asked Eric where he was from and where his family came about. He started to tell me his story: â€Å"Well my family lived in Poland, but the Nazi SS men came to take us away. My mother hid my brother, sister and me into our wine cellar and locked us up for a few days and told us not to worry. On the third day that we were in there, we heard thuds and screeching as if the heavy furniture from upstairs was being moved we stay put but Daniel Leigh 11Saul Holocaust Coursework we had the impulse to shout out: â€Å"What’s the matter, mother? † but we couldn’t. My eighteen year old rother David tried to open the hatch for the door of the wine cellar but it wouldn’t come open so somebody must have been standing on it. David tried again after about half an hour. He managed to open it. I said to be careful and open it slowly. He opened it very slowly and cautiously and he saw our parents being taken away as if they had committed a crime. David fell backwards in shock, he fainted. As my sister tried to comfort him, I looked outside the hatch, and to my utter astonishment, three burly soldiers were dragging my mother and shoving my father out of the door. I then had the most uncontrollable rge just to try and rescue my parents but I knew in my heart I couldn’t. Then, we waited and waited for the houses and the street to go quiet. After a while, we came out of the wine-cellar and I don’t know how I knew but I had knew that I would never see my parents again. We managed to collect as much food and water as possible and we went. We traveled the country for a couple of months, but inevitably we knew that we could not go on living like this so we found refuge in a church. They knew that we were Jews, but they didn’t hesitate to help. They employed, fed and clothed us for about a onth and then sent us on our way. This way, we had money, food, water and we did not look so Jewish- which I thought was a bad thing to give in to, but we had no choice. Eventually, in the freezing winter of last year, 1940, my sister Eva had died due to pneumonia, but my brother and I were still alive. We had stopped at an empty farm- only to discover that when we rested we found it incredibly hard to go on. Having sat down to rest, I suddenly realized how hungry we were. We carried on after a couple hours or so and then we were captured by four lofty Nazi soldiers and were sent here. By the Eric time had finished telling me about his experience, it was morning. I felt it first. I felt the cold air float over me, around me, and through me, like a spirit filling the room with nothing but the knowledge of its presence. We were dragged out of the cabin and were expected to sprint to another field. Daniel Leigh 11Saul Holocaust Coursework At the time when we had to queue to receive our lunch, it was completely out of control. When Eric finally got to the front of the ‘line’ there were two soldiers, one holding a whip. Eric said â€Å"Please may I have food, Sir? â€Å". They did not give him any food. The soldier holding the whip shouted for everyone to go back, but no-one did. He repeated it again, but this time he said: â€Å"GO BACK OR ELSE THE BOY ACQUIRES 30 LASHES!!! † Still, everyone kept pushing forward. As a result of this, the SS men canceled lunch and Eric got the 30 lashes. After this, he found it hard to breathe, let alone move or even work These sort of events continued for two more terrible years. After this period of time, Eric and I had formed a secret legion of the Jews which had survived through the loss of their families, the loss of some of the Jews which had tried to escape, but either died on the way (mines) or they were shot by the SS men. In this legion, we could practice our Jewish laws including praying and lighting the holy Shabbat candles (if we could scavenge them). One Friday night, we could not get hold of any candles so we prayed and sang through the night. The next day, Eric, whom I had become very friendly with gathered a few men together and we discussed our immediate future, and how that if we do not receive any help from people who have knowledge about the SS men, how they operate and what were their weaknesses. The next day, Shabbat, there was a battalion of Russian soldiers brought in to the concentration camp for ‘war crimes’, some of them were Jewish others were not but supported the Jewish way of life. One week after they arrived, the squadron leader approached our small but cosy gathering and started to mix with us. We hesitated at first but we adapted. After a while, they trained us as soldiers and we eventually escaped from the ultimate hell (for us) and Eric and myself lived on to fight in the American army and to the end of the war. Of the events of which I witnessed and live through, a nightmare invaded reality. How to cite The Holocaust – Why was this happening to me?, Papers

Saturday, December 7, 2019

Cost Economics and Supply Chain Management †MyAssignmenthelp.com

Question: Discuss about the Cost Economics and Supply Chain Management. Answer: Introduction Outsourcing is a very common activity in businesses. It is an agreement between companies where a company contracts out one or more of its activities to another company. Outsourcing may involve domestic contracting or foreign contracting. In domestic contracting, a company contracts its activities to another company in the same country while foreign contracting involves contracting of activities between companies in different countries (Tomiura, 2009, pp. 219-226). Some of the companies which have engaged in outsourcing in a great way are the IT companies and different manufacturing companies (Goo, Kishore, and Nam, 2009, pp.119-145). We have many other businesses and companies which have engaged in outsourcing in the modern world to enjoy the many advantages of outsourcing. This research will cover outsourcing in details and give some its major advantages, and some disadvantages of outsourcing in businesses. The main objective of our research is to research on the main advantages of outsourcing in businesses. In our research, we shall also consider some of the disadvantages which businesses have experienced from engaging in outsourcing activities. Comparison of the advantages and the disadvantages of outsourcing will help us to conclude if businesses should engage in outsourcing or not. This project will cover the advantages of outsourcing in businesses in details. It will help us to understand some of the major benefits which have resulted from outsourcing in businesses. It will also highlight some of the challenges and disadvantages facing the businesses which engage in outsourcing. The research will also compare the advantages and disadvantages of outsourcing in businesses, and this will help us to make a conclusive statement about outsourcing in businesses. In the modern world, most businesses have adopted the use of outsourcing to enjoy the numerous benefits associated with outsourcing. As we discussed earlier, outsourcing involves contracting of activities between companies or businesses in the same country or between companies in different countries (Ellram, Tate, and Billington, 2008, pp.148-163). Outsourcing has very many benefits to the companies involved, and these benefits have attracted many companies to the outsourcing activities. Some of the major advantages which result from outsourcing include the following: Outsourcing helps to increase the profits of the businesses. One of the major reasons why most businesses outsource their activities is to increase their profits. Outsourcing helps to improve the profits of the businesses in various ways, for instance, outsourcing helps to improve the quality of the services offered by the businesses, and this helps to attract more customers to the business, and this increases the profits of the business (Varadarajan, 2009, pp. 1165-1172). Reducing the overall cost of production. Outsourcing helps to reduce the overall cost of production in companies. The companies always outsource the activities or services from the companies which have specialized in providing the outsourced activities or services, and therefore, charge amount which is less compared to the amount which could have been used by the parent companies to do those activities on their own. This will help the companies to reduce the overall cost of production (Gorg, Hanley, and Strobl, 2008, pp.670-688). High-quality of the outsourced services. The companies will outsource the activities or services from some other companies which have specialized in delivering the outsourced services (Willcocks and Leslie, 2008). Therefore, they offer high-quality services which could have not been met easily by the outsourcing company. Outsourcing helps the businesses to concentrate on their core activities. In most cases, the businesses outsource some secondary activities which are not in line with their primary or core activities. This will give the businesses an ample time to concentrate on their core activities rather than the secondary activities. Outsourcing helps in sharing of risks between the two contracting companies. In outsourcing, when some risks appear the two contracting companies are responsible for the risks and share the risks accordingly. It is also good to note that companies outsource their activities from experts who have handled such activities before, and therefore, they have better ways to mitigate some risks which can appear in those activities (Tsai, Lai, and Lloyd, 2012, pp.178-189). Outsourcing helps in improving the customers satisfaction. The outsourced activities or services are done by highl-skilled experts who provide high-quality services to the parent company. The customers of the parent company will benefit from the high-quality outsourced activities or services, and this will help to improve the satisfaction of the customers. Outsourcing also helps to improve the competitiveness of businesses. The businesses which outsource their activities or services get high-quality services which improve the satisfaction of their customers (Hill, 2008). This will improve the popularity of the business as compared to the competitors and will automatically earn more customers to the business. This will help the business to become more successful as compared to those who dont outsource activities. Outsourcing has many other benefits to the companies involved. However, it also comes with some challenges and disadvantages to the companies. It is good for the companies to try and address the challenges which can be avoided (Lacity, Willcocks, and Rottman, 2008, pp.13-34). Some of the major disadvantages of outsourcing include: The risks associated with sharing of some confidential information between the contracting companies. The transacting companies share much of their information which may include some confidential information which increases the vulnerability of the companies to security attacks. Another disadvantage associated with outsourcing is some hidden charges which may incurred by the outsourcing company. When the companies are contracting, they sign various documents concerning payment of the contract, but later some other hidden charges such as legal procedures charges or expenses on online documents verification may emerge which makes the parent company incur some unexpected extra charges(Williamson, 2008). We may also have some administrative limitations especially when outsourcing involves companies in different countries. We have some countries which have very strict rules about businesses, and this makes the outsourcing process to be very difficult. As we have discussed, outsourcing has very many advantages which outweigh the disadvantages, therefore all the businesses should adopt outsourcing in their operations. Problems and challenges faced by businesses which engage in outsourcing. They also seek to make a conclusive statement of whether businesses should engage in outsourcing or not. Qualitative research is a research design which involves collection and analysis of non-numerical data (Liamputtong, 2013). In this research design, the data is normally collected in some forms like texts, photos, videos, sound recordings or many other non-numerical forms. The main steps followed in qualitative research are: Decide on the research topic and formulate the research questions and objectives. This is usually the first step in qualitative research. In our case, our main topic of research is advantages and disadvantages of outsourcing in businesses. Conducting a literature review. This is where the researcher caries an extensive analysis on the available systems. The knowledge of the available systems is very vital in any research as it will always be used as references. We have already carried the literature review of our research in the section of literature review. Sampling and sample size. This step involves choosing the best sampling technique and sample size of the research. In our research, well take a sample size of a hundred different businesses selected randomly which engage in outsourcing to do our research. The data collection method. This is the step which involves the collection of data needed for the research to be completed. We have various methods which can be used in collecting the required data. In our research, we shall use questionnaire method to collect the data of advantages and disadvantages of outsourcing in the selected businesses. To increase the chances of getting more reliable and more valid data, we should make sure we prepare good questionnaires which will be favorable to the respondents. (A questionnaire form which can be used in data collection is shown on the appendix section) Variable specifications and data analysis. After collecting the data, we should specify all the variables accordingly before we start analyzing the data. After variable specifications, we should carry out an extensive data analysis which will help us to get the solution to our research questions. After doing the data analysis, we can now draw the conclusions of our research. Preparation of the final research project. This is the last step in qualitative research and involves preparing a detailed report which summarizes all the findings of the research (Bowen, 2009, pp.27-40). In quantitative research, data is collected and analyzed in numerical form. The analysis of simple data is normally done manually, but in cases where the data is very complex, some mathematical devices or software such as Excel or SPSS are employed in the data analysis process (Muijs, 2011). The main steps used in quantitative research are: Definition of the main problem or topic of research. Like in qualitative research, the first step used in quantitative research involves defining the main topic of research and stating all the research questions and objectives. Doing a literature review. This involves analyzing the available systems which is very necessary in any research. Sampling and sample size. This step is undertaken to determine the best sampling technique and the best sample size which will help us to get the best results out of our research. Preparation of the research instruments. The research instruments are some tools which are used in research. Such tools include the questionnaire forms used in data collection and the computers used in data analysis (Hardre, Crowson, and Xie, 2010). Data collection. After preparing the research instruments, the researchers go to the field to collect the required data. The researchers should use all the posssible means to make sure they get valid and reliable data. Data analysis. After collecting the required data, we should specify all the variables accordingly and do a detailed analysis of the collected data. The analysis will help us to answer our research questions and make the conclusion. Preparation of the final report. Like in qualitative analysis, the final step of quantitative analysis is preparing a detailed report which summarizes the whole research process. Our research has some limitations. Some of the major limitations facing our research include: The accuracy or correctness of the data collected. Sometimes, some respondents may give wrong data either knowingly or unknowingly. This leads to the analysis of the wrong data which leads to wrong results. Unwillingness of some respondents to give information. Some respondents just take the questionnaire forms but refuse to fill the forms, and this will automatically affect our research negatively. The cost of research is also a limitation to our research. For us to obtain very accurate results, we should carry our research in very many businesses, but this is limited by the capital available for the research. The results obtained from the research are not 100% accurate but are just a good approximation of the real-life situations based on the sample size used (Neuman, 2014). Time Schedule (Research plan) Research Activity Proposed Start Date Proposed Duration (weeks) Proposed End Date Deciding on the topic of research 18TH September 2017 1 24TH September 2017 Doing a literature review 25TH September 2017 1 1ST October 2017 Preparation of the initial business research proposal 2ND October 2017 2 16TH October 2017 Preparation of the research instruments 17TH October 2017 1 23RD October 2017 Collection and analysis of the data 24TH October 2017 3 15TH November 2017 Preparation of the final business report 16TH November 2017 2 30TH November 2018 Conclusion In our research, we have discussed outsourcing in details. We have seen the numerous advantages associated with outsourcing in businesses. Outsourcing also comes with some problems and challenges, and its the responsibilities of the businesses to addresses these challenges for them to enjoy the numerous benefits of outsourcing maximumly. As we have seen in our research, the advantages of outsourcing overweigh the disadvantages, and therefore, many businesses should embrace outsourcing for them to enjoy the many benefits. References Bowen, G. A. (2009). Document Analysis as a Qualitative Research Method. Qualitative Research Journal, 9(2), 27-40. Hill, C. (2008). International Business: Competing in the Global Market Place. Strategic Direction, 24(9). Holger Gorg, A. H. (2008, March 31). Productivity effects of international outsourcing: evidence from plant-level data. Canadian Journal of Economics, 2, 670688. Jahyun Goo, R. K. (2009). The Role of Service Level Agreements in Relational Management of Information Technology Outsourcing: An Empirical Study. MIS Quarterly, 33(1), 119-145. Liamputtong, P. (2013). Qualitative Research Methods . South Melbourne: Oxford University Press. Lisa M. Ellram, W. L. (2008). Offshore outsourcing of professional services: A transaction cost economics perspective. Journal of Operations Management, 26(2), 148-163. Mary C. Lacity, L. P. (2008). Global outsourcing of back office services: lessons, trends, and enduring challenges. Strategic Outsourcing: An International Journal, 1(1), 13-34. Ming-Chih Tsai, K.-h. L. (2012, January). The dark side of logistics outsourcing Unraveling the potential risks leading to failed relationships. Transportation Research Part E: Logistics and Transportation Review, 48(1), 178-189. Muijs, D. (2011). Doing Quantitative Research in Education with SPSS (2nd ed.). London, UK: Sage Publications. Neuman, L. (2014). Basics of Social Research. New York: Pearson. Patricia Hardre, M. C. (2010). Differential Effects of Web-Based and Paper-Based Administration of Questionnaire Research Instruments in Authentic Contexts-of-Use. Journal of Educational Computing Research, 42(1). Tomiura, E. (2009). Foreign versus domestic outsourcing: Firm-level evidence on the role of technology. International Review of Economics Finance, 18(2), 219-226. Varadarajan, R. (2009). Outsourcing: Think more expansively. Journal of Business Research, 62(11), 1165-1172. Willcocks, L. L. (2008). Information systems and outsourcing: studies in theory and practice. Springer. Williamson, O. (2008). Outsourcing: Transaction Cost Economics and Supply Chain Management. Journal of Supply Chain Management, 44(2), 5-16.

Friday, November 29, 2019

Performing for the World free essay sample

The stale smell of old tile floors and piano keys stung my nose. It was that old dusty smell that usually conjures up memories of Grandpa’s seasoned button down sweater, or the unkempt attic stored with keepsakes and memories from Christmas past. The large barred windows with paint chipping encased the beauty that is a Manhattan street from 10 stories high. Early morning beams of light cast upon the only things surrounding me; an over-enthusiastic conductor, music barely learned, and 500 other singers. It was our last rehearsal and our concert at Carnegie Hall was that night. I was on a trip with the Los Robles Children’s Choir; we were performing in a classical concert titled â€Å"Mozart’s Solemn Vespers and Treble Chorus Works†. Though I had the comfort and security of familiar faces from the choir, I felt as overwhelmed and lost as I ever have. The rehearsal continued as I artfully dodged potential paper cuts from music passing in and out of my hands a s we tried in earnest to get through the repertoire for the night. We will write a custom essay sample on Performing for the World or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page The rehearsal ended with the sound of scuffling shoes down the stairs as I left the stale smell of the Civic Center room for the last time. Passing doors, my journey down the 10 flights of stairs was filled with the faint tinkling of ballet music and laughter. We had two hours of free time before we had to start getting ready for our concert. I walked down the street experiencing a sensory overload. The tall buildings made the streets dark; the odd smell from the blend of car exhaust and food carts teased my nostrils; the loud honks coming from the long lines of bright yellow taxis. The dissonant cords from Gershwin’s â€Å"Rhapsody in Blue† played through my head as I scanned the melting pot that was â€Å"The Big Apple†. I had reached my destination. I decided that with my free time I would visit Carnegie hall and look around inside too see what this place is all about. Opening the door I was invited with a friendly gust of air conditioning; a nice alternative to the humid summer air. The empty lobby and the faint whir of a vacuum contributed to the free and adventurous feeling I possessed when I wore my artist’s badge. This feeling took hold of me as I explored the hallways of Carnegie hall and came upon that familiar stale smell from hours before. I found the Carnegie hall visitors museum and decided that I would explore its contents before the big night ensued. Between old conductor batons and the original floor plans by Andrew Carnegie, I came upon â€Å"The List†. The list consists of everyone performance and performer who had the honor the grace the Stern Auditorium/Perelman stage. My eyes scanned the list to see that my name may soon grace the company of Judy Garland, Tchaikovsky, and Louis Armstrong. I soon became fascinated with that long people of paper in cased on the wall. It was humbling and inspiring looking at that list. My own accomplishments seemed irrelevant when compared to their own. Though at the same t ime I saw that my potential was nothing less than theirs at that point in my life and to the best of my capacity, I would leave my own mark on the world, as did they. This moment fostered the ambition and passion that has driven every activity that I now pursue. I walked hurriedly through the colorful streets of Manhattan to get back to 55th and 7th to get into my concert attire, and make my way towards the artist’s entrance. With binder in my upstage hand as made my way to the edge of the stage door, I realized that though anxiety and nervousness churned my stomach, I needed to get past that feeling and step out onto the stage. As my old right tattered character shoe stepped out onto the floor, making its debut to the audience that filled the seats, the left met up with it, ready to make its debut to the audience that would soon be the pallet that holds my experience, ambitions, and life.

Monday, November 25, 2019

The eNotes Blog 5 Creative Ways to Teach Story Elements to MiddleSchoolers

5 Creative Ways to Teach Story Elements to MiddleSchoolers Every time I tell my middle schoolers that we are going to analyze the elements of a story, I get a big groan from about half the room. Somehow, it’s gotten into their heads that writing stories is fun, while breaking down other people’s stories is the most boring thing in the world. To combat this pre-teen ennui, I’ve changed my approach to teaching story elements. I start with a creative writing piece and get them to experiment with different story elements. Then, we move into looking at someone else’s work. In this way, I trick them into learning all the parts of a story and even having a little fun. Here are some creative ways Ive managed to teach story elements to my students successfully- and without the groan. 1. The Story Arc and a Music Video All my students love music and yet say they don’t understand poetry. Little do they know, it’s pretty much the same thing without drums. I put students into groups of 4-6 depending on class size. Each group picks one popular song that the group likes. Their task is to create a music video for that song. The video must be as long as the song, and it must tell the story of the song, which is completely up to the group. They can take it directly from the story of the lyrics; they can invent characters, situations, and a setting that reflects the idea behind the lyrics; they can create a story that the song perfectly soundtracks but has nothing to do with the lyrics. Even though they have total control over the story, they must tell a well-structured story. Their video must meet these objectives: Introduce a character or characters (Exposition) Set up a conflict (Conflict) Show the character(s) trying to solve the conflict (Rising Action) Bring the conflict to a climax (Climax) Show how the character(s) reacted to the climax (Falling Action) After they create their videos and we watch them, I have them reflect on how the steps they took to create their video match the parts of a story. In this way, theyve learned the parts of a story because they had to create them. And, it gives me something to reference when we begin talking about a novel. 2. Point of View and the Villain The point of view is incredibly important to how a story unfolds and the moral that story communicates. Students often underestimate the power of perspective! So, in this activity, we use point of view to retell popular stories. For instance, I use the Three Little Pigs fairy tale as an example: First, we read the story of the three little pigs and determine the main message. Then, we read The True Story of the 3 Little Pigs! by Jon Scieszka and have a discussion about how the narrator changed the plot and the moral of the story. (There are some great readings of this story on YouTube!) Finally, students choose their favorite picture book, movie, or fairy tale from their early childhood. Their job is to assume the perspective of the villain and rewrite the story. This can take the form of a picture book, a letter, or a speech- depending on what you’d like to do with your class. This activity helps show students the importance of narrative point of view! 3. Settings Around the Universe The setting of a story helps shape how the narrative can unfold. This is pretty obvious when you are looking at a sci fi book or a fairy tale. But the importance of setting can be overlooked when it’s not central to the story. For this activity, I create 8 different â€Å"setting stations† around the classroom. These stations generally consist of a picture of the setting and a description plaque that describes the setting’s characteristics. Some settings that I have used in the past include Mars in the year 3056, Warsaw in 1944, an undersea villains lair, a New York City classroom in 1976, and a Pontiac stuck in traffic on the 405 freeway in Los Angeles. I then prepare 8-15 simple story prompts that consist of a character and a conflict. These conflicts and characters are very basic. For the activity, all students get a story prompt. I ask them to read the prompt and brainstorm how they think the story would end. Then, they are instructed to go to at least four stations. At each station, they write how the setting might affect the way their stories play out. 4. Tone and a Poem I have found that tone is one of the hardest concepts to explain to students. I like to tell my students that tone is attitude. It is the feeling you get when you read, watch, or hear something. To help illustrate this, I choose one or two of the following abstract poems, which don’t have a story so much as they communicate a feeling. â€Å"A Hagging Match† by Seamus Heaney â€Å"In the Station at the Metro† by Ezra Pound â€Å"The Red Wheelbarrow† by William Carlos Williams â€Å"Those Winter Sundays† by Robert Hayden â€Å"When Somebody Telephones† by Elizabeth Bishop We read the poem together, and then the students write for one minute about all the things they felt while hearing the poem and all of the images that popped into their heads while listening. Then, they write a brief 1-2 page story that mimics the tone of the poem. For example, if the poem made them sad, they will write a melancholic story. If the poem made them laugh, they will write an upbeat comedy. Finally, when students share their stories, I pair them with another student who highlights all of the words in the story that communicate its feeling. The partner gets to guess which tone the storywriter was going for. 5. Character Traits and Thing Theory Characters can be determined by their dialogue, physical description, word choice, and behavior. One way to look at all the ways authors create characters is looking at the things associated with the character. **For this one, you will either need props or a slide deck with pictures of the items.** I project 5 images of objects and ask students to describe the person who owns each object. The list of items can be random or follow a theme, such as things found in a wallet/purse, things found in a closet, things found in a refrigerator. For each set of items, students must create a name for the person, determine where they live, give five adjectives that describe them, and describe how they talk (informal, formal, slang, accented, etc). Some of my item lists include: Living Room: A rotary telephone, a record player, a smart phone, a yellow raincoat, an old fortune cookie on the carpet Desk: A stack of loose papers, an old macbook, a pair of wire-rimmed glasses, a copy of The Odyssey, a sweater with a hole in the collar Refrigerator: Expired milk, takeout boxes, an uncovered half of avocado, half and half, Sriracha sauce I have found all of these activities very useful in my classroom! My students love tapping into their creativity while they learn. And, I find it helps them remember the concepts better as well. I hope you try these too!

Friday, November 22, 2019

Building Community in Organizations Essay Example | Topics and Well Written Essays - 250 words

Building Community in Organizations - Essay Example The essay "Building Community in Organizations" talks about the approaches to organizational design such as the functional approach, divisional approach, network approach, team approach and the matrix approach. Organizational design is a guided and formal procedure for integrating individuals, information, and technology of a company. The divisional approach is where managers in large firms organize for specialized departments to be formed because they always have difficulties monitoring all the company activities and products. The departments formed are split according to their outputs in the organization. They include departments for distinguishing among production, geographical categories, and customer service. With these, managers can focus their resources and outcomes, and easily monitor performance. The Matrix approach combines functional specifications with the aim of achieving a divisional structure. It uses lasting cross-functional groups to incorporate functional experts with a divisional objective. Employees here associate themselves with at least two formal teams at the same time. The functional approach may be more applicable to human service organizations because it enhances good communication and responsibility affiliations that are essential in human services. It also makes employees feel comfortable while at the same time simplifying their training. This is a good approach when dealing with people in an organization because they will feel recognized and thus motivated.

Wednesday, November 20, 2019

The Risk of Using the Internet Essay Example | Topics and Well Written Essays - 1000 words

The Risk of Using the Internet - Essay Example Following this, the safety of one's self is also given great importance. With the internet, there are no such physiological needs that need to be fulfilled and it follows that the next concern would be security (Lester & Resnick, 2003). Often, people question the safety of the internet in various aspects. Is the internet truly safe Before tackling this issue, it is necessary to have a background on the internet. The internet is not simply about browsing through sites in the World Wide Web. It is a global network of computers and electronic devices which provides an avenue for these devices to exchange information. In fact, any such device connected to the outside world through a network may be considered part of the internet. There is no doubt that most companies and even individuals use the internet in one way or another. Unfortunately, the widespread use of the internet also makes it suitable as an accessory for crime. Computers and the internet may make one's life more convenient but they may also put one's privacy in danger. Most people are unaware that their computers may be under attack from simply surfing the internet. Computer users are inclined to think that they are anonymous and their identities are completely secure. However, this is not always the case. As a matter of fact, each computer is actually assigned with a unique address referred to as an internet protocol (IP) address. It is similar to a home address in the sense that it may be used to locate a computer within the internet. In fact, a computer may be likened to a house which typically has a front and back door. While the occupants of the house almost always ensure the security of the front door, the other door may be neglected. Similarly, a hacker only needs to locate an open backdoor to break into a system. Computer users will not even notice that a hacker has established a connection to their system. A well-equipped hacker can do anything without the need to be in close proximity to his target (Branigan, 2005). Moreover, hackers can collect information from a computer within a short span of time. Personal information including passwords to secure accounts may be acquired, effectively compromising the privacy of the user. Even with the presence of a firewall to protect the system, there are several more ways to infiltrate a computer. These include the use of viruses and the exploitation of bugs present in some web browsers. Any downloaded content involves the risk of getting one's computer infected (Branigan, 2005). Programs which are acquired through the internet may be viruses or may contain viruses which then attack a computer. At the very least, these viruses may simply be annoying. However, in more complex attacks, these viruses can be used to collect private information from a computer which can then be used in malicious ways. Anti-virus software provides both preventive and active protection against such risks. However, as Branigan stated, the virus scanning software is only as effective as its virus definitions. It is therefore important to update the said software frequently. Unfortunately, despite attempts at improving the performance of such software, virus makers are able to produce more r esilient code. One of the most popular crimes over the internet is online fraud. Electronic mail is a fast way to communicate with other people and is quickly

Monday, November 18, 2019

International Real Estate Investments Essay Example | Topics and Well Written Essays - 7500 words

International Real Estate Investments - Essay Example The city would have to buy this land from the private investor, for which it would pay a premium, and then build homes on this land and sell or rent them for less than market value. This would not be a smart business practice for a city and it would lead to an outcry from citizens when taxpayers’ money was spent on something that most taxpayers were not even benefiting from. Also, other social programs would have to suffer because of this practice, which would also hurt city planners and the city in general. There are bigger needs in many cities than affordable housing since people will find a way to pay for housing before they will do other things. In addition, most major cities have run out of room within the city and the residents have now begun retreating to the suburbs. The problem with this is that low-income housing units are not welcome in these regions. The people that have moved out of the city have moved there to get rid of the stereotypical problems that occur with low-income inhabitants and, therefore, affordable housing units would not be welcomed in this region. An example of this is James Vacca â€Å"making sure that developers do not evade the new restrictions. He said he recently noticed someone building a three-family house, something not allowed under the new rules. He complained to the buildings department about it, and about subsequent adjustments until the builder agreed to construct a one family house with two parking spaces instead†1 Gotham Gazette. 21 October 2005. The amount of private property ownership, combined with the escalating price of real estate, has made it very difficult to provide affordable housing for the population in or around any major city. London, in particular, is having a major affordable housing crisis because of its booming economy and drastic population growth so it needs to look at the examples that are provided by other cities.

Saturday, November 16, 2019

Evaluation of Suicide Research in the Elderly

Evaluation of Suicide Research in the Elderly A CRITICAL COMPARISON OF TWO RESEARCH APPROACHES TO SUICIDALITY IN THE ELDERLY: the qualitative and quantitative paradigms Introduction: Suicide may be considered a common and devastating emergency in the general practice of mental health. It is a phenomenon that is generally complex and inherently difficult to predict. Suicidality, which is the spectrum of psychological activities that culminates in the eventual death of the individual, may be especially complicated in the elderly. This is because people of that age group are known to traverse the continuum of suicidal behaviour with extraordinary secrecy, determination and lethality. Thus, there may be up to three new cases of elderly suicide for every one below the age of 25 years in many countries (Diego et al., 2004, Mello-Santos et al., 2005). Giving the intricate nature of the phenomenon in the elderly, understanding the immediate and remote factors that may be suggestive of imminent death by suicide may be an important step to setting up targeted interventions before it is too late. In the context of suicide research, immediate pointers to an impending suicide may, on the one hand, include a subjective ‘experience’ with suicidal ideas or the wish to die. This very personal experience may sometimes be expressed in signs and symptoms such as talking or writing about the end. A phenomenon sometimes referred to as suicidal warnings (Rudd et al., 2006). In this regards, immediate factors for imminent suicide may also extend to the ‘meanings’ attached to such notices by their recipients. The understanding of peoples experiences and meanings is strengthen by the qualitative research paradigm (Fossey et al., 2002). The more remote pointers to an imminent suicide may include correlates of suicidality within the larger population, as against the individual. The investigation of such independent risk factors within the population, or a systematically generated sample from it, is underpinned by the quantitative research model (Godwin et al., 2003). To provide a clear understanding of the qualitative and quantitative frameworks, this discourse aims to critically compare two studies using contrasting approaches in elucidating the factors related to suicide in the elderly. The context and comparison This first study, hereafter referred to as Kjiolseth and Ekeberg (Kjolseth and Ekeberg, 2012), was an investigation of the experiences and reactions of people to warnings they have received about the suicidal intention of their elderly wards. The authors relied on the technique of psychological autopsy (Beskow et al., 1990). Wherein, they re-created the circumstances of the suicide through interviews of 63 formal and informal carers of 23 individuals who had died in that manner aged 65 years or over. The second study, hereafter referred to as Ojagbemi et al (Ojagbemi et al., 2013), examined the predictive relationship between several health related variables and three behaviours occurring on a continuum leading to eventual death by suicide. The authors relied on a multi-stage probability sample of 2149 participants aged 65 years or over, and spread across a geographical area equivalent to a quarter of the national population. The main research question explored by Kjiolseth and Ekeberg was; how did people perceive and react to suicidal warnings communicated to them by the elderly around them? Perception in this context may be broadly understood as the individual’s cognizance of the events external to them. Such perception may also feedback on how the individual will react. In the view of empiricists such as Locke (Baird et al., 2008) the awareness of externally occurring events may only be possible if they are mentally represented. In this regards, the reality is created in the mind of the recipient. Further, Bekerley (Atherton, 1987) contends that this reality is inherently modifiable according to previous experience. Therefore, since the previous experiences of different individuals may be inherently different, and dynamic, the proposition of a single or unitary reality may be less likely. In other words, the research question of Kjiolseth and Ekerberg may be best answered if the perception and r eaction of a variety of carefully selected individuals who may have received the suicidal warnings are considered. Qualitative interviews may afford the opportunity for the researchers in this instance to generate more nuanced accounts from a wide selection of individuals who may be knowledgeable about the phenomenon of interest. In contrast to Kjiolseth and Ekerberg, Ojagbemi et al wanted to find out if there are indices of health and wellbeing in the general population that may demonstrate predictive associations with suicidality among the elderly living in sub-Saharan African communities. This research question may suggest as follows; firstly, by indices, the authors appear interested in numerical or value indicators of health and wellbeing. Secondly, by predictive associations, they may also be interested in relationships. Thirdly, Ojagbemi et al appear interested in the general population, rather than individuals. The interest of the authors in the examination of predicted relationships between numerical and/ or non-numerical (i.e, categorical) indicators, with a focus on the general population may support a non-experimental quantitative approach (Martens, 1998). In line with the quantitative framework, Ojagbemi et al specifically investigated the predictive relationship between a wide range of demographic and health related variables and three categories of behaviour occurring on a continuum leading to eventual suicide in people who have attained the age of 65 years or over at the start of the study. They additionally sort to investigate the transition between one behaviour and another. These categories of behaviour were namely; suicidal ideation, suicidal plans, and suicidal attempts. They hypothesized that several of the health and wellbeing indicators will predict the presence of these suicidal behaviours. The study was a community based cross-sectional survey of the elderly living in a geographical area equivalent to a quarter of the national population. Giving the research question of Ojagbemi et al about predictive associations, the exploration of several demographic and health related variables should allow the investigators to examin e the independent effect of individual variables on the suicidal behaviours while holding the others constant. Furthermore, giving the interest of the authors on sub-Saharan African communities, the focus on communities spread over a wide geographical area, should allow for a wider generalisation of the findings to several sub-Saharan African communities. Conversely, the community based design may inherently exclude the elderly in care and nursing homes, as well as hospitals. Therefore, the findings may not be generalizable, after all, to the entire sub-Saharan African elderly population. Also, the cross-sectional design makes the picture of whether the elderly have had these behaviours long before they attained the age of 65 years unclear. As such it may be doubtful if the result represents the true depiction of affairs in the elderly population. On the other hand, the study by Kjiolseth and Ekerberg studied people’s experiences and reactions to the ‘warnings’ they have received about the suicidal intentions or plans of the elderly around them. They have relied on psychological autopsy, based on several interviews with people the authors thought should have the knowledge and experience about the phenomenon they planned to investigate. Giving the research questions of the authors about how people perceived notices of suicide communicated to them, a re-enactment of the situation surrounding the eventual suicidal act, through information from key informants, may help shed light on people’s experiences and the processes involved in the reaction of individuals. The individual meaning is also referred to as phenomenology in the context of qualitative research (Thompson et al., 1989). However, with individual meanings it may be difficult to demonstrate ‘probabilistic’ generalisability to the w ider group of formal or informal carers of the elderly who have died by suicide. On the other hand, it might be possible to generalise findings with strong ‘internal validity’ to similar contexts (Pawson and Tilley, 1997 ). Furthermore, They were also interested in the general population of the elderly living a wide geographical area. In this regard, it is the ideal for the authors to access very elderly person living in the location of interest. However, it may be a near impossibility to attempt to interview every elderly person living in an area equivalent to a quarter of the country. As such, the authors resorted to a systematic method of taking a representative sample of the population of the elderly in the location of interest. In this way, they relied on a multi-stage area probability sample of the elderly living in households spread over the study location. They interviewed one elderly person per household, and eventually arrived at a sample size of 2149 participants REFERENCES ATHERTON, M. 1987. Berkeleys Anti-Abstractionism. In: SOSA, E. (ed.) Essays on the Philosophy of George Berkeley. Dordrecht: D. Reidel. BAIRD, E, F., KAUFMANN WALTER 2008. From Plato to Derrida, Upper Saddle River, NJ, Pearson Prentice Hall. BESKOW, J., RUNESON, B. ASGARD, U. 1990. Psychological autopsies: methods and ethics. Suicide Life Threat Behav, 20, 307-23. DIEGO, D. L., SHELLEY, B., M, B. J., KERKHOF, D. J. F. A. BILLE-BRAHEUNNI 2004. Definitions of Suicidal Behaviour. In: LEO, D. D., BILLE-BRAHE, U., KERKHOF, A. J. F. M. SCHMIDTKE, A. (eds.) Suicidal behaviour. Cambridge: Hogrefe Huber. FOSSEY, E., HARVEY, C., MCDERMOTT, F. DAVIDSON, L. 2002. Understanding and evaluating qualitative research. Aust N Z J Psychiatry, 36, 717-32. GODWIN, M., RUHLAND, L., CASSON, I., MACDONALD, S., DELVA, D., BIRTWHISTLE, R., LAM, M. SEGUIN, R. 2003. Pragmatic controlled clinical trials in primary care: the struggle between external and internal validity. BMC Med Res Methodol, 3, 28. KJOLSETH, I. EKEBERG, O. 2012. When elderly people give warning of suicide. Int Psychogeriatr, 24, 1393-401. MARTENS, D. 1998. Research methods in education and psychology : integrating diversity with quantitative qualitative approaches, Thousand Oaks, Sage. MELLO-SANTOS, C., BERTOLOTE, J. M. WANG, Y. P. 2005. Epidemiology of suicide in Brazil (1980-2000): characterization of age and gender rates of suicide. Rev Bras Psiquiatr, 27, 131-4. OJAGBEMI, A., OLADEJI, B., ABIONA, T. GUREJE, O. 2013. Suicidal behaviour in old age results from the Ibadan Study of Ageing. BMC Psychiatry, 13, 80. PAWSON, R. TILLEY, N. 1997 Realistic Evaluation, London, Sage. RUDD, M. D., BERMAN, A. L., JOINER, T. E., JR., NOCK, M. K., SILVERMAN, M. M., MANDRUSIAK, M., VAN ORDEN, K. WITTE, T. 2006. Warning signs for suicide: theory, research, and clinical applications. Suicide Life Threat Behav, 36, 255-62. THOMPSON, C. J., LOCANDER, W. B. POLLIO, H. R. 1989. Putting Consumer Experience Back into Consumer Research: The Philosophy and Method of Existential-Phenomenology. Journal of Consumer Research, 16, 133-146.

Wednesday, November 13, 2019

Essay --

Innocence gained at birth, yet lost in seconds. The story of the lovers whose innocence was stolen away is a fierce one in The Things They Carried. Mary Ann Bell and Mark Fossie, a fairy tale come to life. Mary Ann started stealing the soldiers lives in Vietnam, Mark Fossie became uncomfortable, yet proud of her eagerness and fearless quest for knowledge. To Rat Kiley, â€Å"...Mary Ann made you think of all those girls back home, how clean and innocent they all are, how they’ll never understand any of this...† (O'Brien 113). To the men she was: dreams, youth, an escape, the future all in one pink trimmed girl. Mainly, however, to her boyfriend, Mark Fossie, she was his future, his connection life after the war. Rat Kiley describes Mark Fossie as â€Å"proud, yes, but also amazed. A different person, it seemed, and he wasn’t sure what to make of it.† (O'Brien 98). When Mary Ann changed, and ultimately vanished, it is as if the war stole every piec e of Mark Fossie. Using this sophisticated complex love story enhances the sense of lost innocence. In the beginning Mary Ann and Mark contemplated what they would look like in the future, yet as the days went by her mindset changed. She became more interested on her new surroundings and less focused on her future as his wife. It was then that Mark Fossie began to mention her going home. He had been holding on to their future for his sanity, much to Rat Kiley's dismay "man, you must be deaf. She’s already gone" (O'Brien 107). However, she refused to leave. She claimed to be happier than ever in her life. Soon, the detachment grew between them. Mary Ann was immersing herself in Vietnam. Then one night she vanished with the Greenies. She was gone for weeks, one night Rat Kiley sa... ...bol of their innocence, and just as she became "dangerous and was ready for the kill"(O'Brien 111), the soldiers changed to become mysterious and cynical because of the war. A piece of the love story that vanished; the dreams and futures of the soldiers. They became tainted forever with terrifying images burning through their minds. â€Å"‘What happened to her, Rat said, was what happened to all of them. You come over clean and you get dirty and then afterward it’s never the same† (O'Brien 109). The things they saw; the things they lived, they couldn't retell, for no one would believe it. Mary Ann Bell and Mark Fossie represented the relationships lost due to the war, the loved ones that had forgotten or who would never understand the changes. They represented the dreams that had changed and been lost. They were the innocence and naivety turned to disparagement.

Monday, November 11, 2019

Frankenstein – the role of Safie in the novel

Written in 1816, when the writer M.Shelley was just nineteen her novel â€Å"Frankenstein†, a Sui Generis dramatized the potential of life begotten upon a laboratory table. M.Shelley merges many forms of writing- the memoir, the journal, the letter novel, the picaresque to produce themes as romantic myth making, the gothic project, contemprory history and politics and the discourse of gender. In the novel, one also witnesses two families working on opposite set of ideologies. On the one hand, where Frankenstein's family represents vision pattern of political inequality and injustice, the De Lacey family represents vision of a social group based on justice, equality and mutual affection. The structure of De lacey's family constitutes M.Shelley's ideal, an ideal derived from her mother's â€Å"A Vindication of the Rights of Woman†. Infact, it is the character of Safie, the beloved of Felix De Lacey which best exemplifies to it which shall be discussed in the following paragraphs. Safie, the daughter of the Turkish merchant is appalled by her father's betrayal of Felix and by the Islamic oppression of women he endorses. Therefore, she decides to escape from the clutches of her father and flees from Turkey to Switzerland, seeking Felix. This incidence gives a sense of M.shelley's oblique reference of looking at Turkey within the dimensions of the â€Å"east†. Moreover, when the readers are first introduced to Safie ,the description of her as a â€Å"lady dressed in a dark suit covered with a thick black veil† makes one aware of a culture very different from the west. It is for this that critic Kornisaruk goes to the extent of calling Safie as being â€Å"oriental†. Hence, echoing Edward Said's theory of the orientalism as now one witness's construction of Safie as the â€Å"Other†. M.shelley at the same time is quick to shift her stance of Turkey-the east, established in reader's mind as a place which culturally occupies a lower place in hierarchy. This is because she now portrays the product of east-Safie in a positive light. This is evidenced by frequent parallels of Safie with Eve of Paradise Lost who is chaste,pure. Also, the author consciously decides to choose the name Safie meaning â€Å"wisdom† which is symbolic in itself. Safie's desire to acquaint herself with the language which becomes a mean to break the cultural barrier justifies to her attribute of wisdom. It also reveals her as a person who is class conscience as she wishes to be merged within the upper strata of the society. Moreover, Safie emerges as the only independent well educated, self supported, wisdom imbibed woman in the novel. By doing so, the author not only questions the position of women in the 19th century but also brings into focus her rejection of east as a supposedly hierarchically inferior place as discussed earlier. It is because of her alternative role model identity that well renouned critic Rubinstein decides to call her â€Å"subtly androgynous† combining the standard feminine â€Å"angelic beauty† with a masculine energy. Yet, the author decides the disappearance of Safie and De Lacey's family giving them little involvement in the plot. Thus, establishing that such characters had no or little place in the harsh world of 19th century Europe experienced by M.Shelley. Therefore, justifying the novel as a realistic fiction. Finally, one can conclude, it is from her own mother that Safie learns â€Å"to aspire to higher powers of intellect and an independence of spirit†.So, flouting her father's â€Å"tyrannical mandate† against marrying Felix.Indeed, it's for this that critic A.K. Mellor notes Safie as â€Å"the incarnation of M.Wollstonecraft in the novel†.

Saturday, November 9, 2019

Employment

In legal terms, during the later portion of the nineteenth century, â€Å"at will† termination, whether initiated by employer or employee, came into focus in the United States. Simply because a person desires to disassociate oneself with the business, whatever it is, for whatever reason, whenever one chooses, is fine and acceptable. This doctrine exists because it is presumed to exhibit and respect freedom from contract. It applies to the all of â€Å"U. S† except the state of Montana primarily because of the belief that employee and employer prefers employment relationship to be â€Å"At Will† instead of Job security (NCSC, 2014).In the following pages I offer nothing more than simple facts, plain arguments and common sense; and have no other preliminaries to settle with the reader, other than that he will divest himself of prejudice and prepossession, and suffer his reason and his feelings to determine for themselves; that he will put on, or rather that he will not put off, the true character of a man, and generously enlarge his views beyond the present day-? Thomas Paine, Common Sense† (Paine, 1779), (Grotto, 1995).In other words we can debate claims and notions that employment-at-will is all about exacting a contract of redeem and respect, but, wholeheartedly agree, truthfully, that the optimistic picture of equality and freedom is tainted by the continuing subordination and discrimination imposed primarily by employers. Summarization: Employment – At – Will Doctrine The employment-at-will doctrine avows that, when an employee does not have a written employment contract and the term of employment is of indefinite duration, the employer can terminate the employee for good cause, bad cause, or no cause at all (Mull, 2001).The genesis of this ill-fated relationship began to taking shape when employees started to unionize work efforts and initiatives, albeit for a good cause; employees were at the mercy of employer discr etion. The sass gave employees a voice to dispel wrongful actions perpetrated against them, whether it was wrongful discharge based on race, religion, sex, age, and national origin, certain Federal legislative protections, and Title VII of the 1964 Civil Rights Act was available to defend. (Mull, 2001). Allowable Exceptions to Legally Fire. The recognition of employment as being central to a person's livelihood and well-being, coupled with the fear of being unable to rotate a person's livelihood from unjust termination, led to the development of common-law, or Judicial, exceptions to the employment-at-will doctrine beginning in the late sass. † (Mull, 2001) Much of what was contained in the original employment-at-will doctrine developed exceptions that did not fully materialize until the sass. However, have since become subject to erosive statutory and common-law protections all levied against wrongful discharge actions taken by an employer.In certain instances, the â€Å"at- will† dismissal of an employee by his or her employer is halted. There are three established exceptions widely upheld. The first of these is public- policy exception, under which, wrongful discharge is factual if an employee is terminated because he or she files a workers' compensation claim following a Job related injury, or say the employee is expected to break the law based on an employer's request. These acts infringe upon adopted public policy of the particular state.The first case was held in 1959, in California, involving the International Brotherhood of Teamsters and an employee fired because he refused to perjure testimony under oath, as requested. Courts struggled then and continue so, with the meaning of public policy. Some courts in various states found the term â€Å"public policy' vague. The definition differs; limits may include exclusion to clearly defined statements in the constitution or statues, or â€Å"public policy is defined to allow Judges rights to d etermine it a state's public policy locally or beyond.Secondly, when terms agreeable to an employer and an employee exchange verbal or written in some form to express terms of security or other procedures, it constitutes an implied contract exception. The employer through conversation and planning implied that if certain actions are carried out then you will remain here or etc. A common occurrence in the recent past was courts finding that the contents and representations made in employee handbooks could create an implied contract, absent a clear and express waiver that the guidelines and policies in such did not create contract rights. Mull, 2001) â€Å"The third exception is titled covenant-of-good- and-fair-dealing exception. Rather than narrowly prohibiting terminations based on public policy or an implied contract, this exception-?at its broadest-?reads a event of good faith and fair dealing into every employment relationship. â€Å"(Mull, 2001). A termination may become subj ect to interpretations. An employer's decisions motivated by malice are not permissible; done so in bad faith, and thus subject to answering a charge to show â€Å"Just cause†.By 2001, this exception was only recognized by eleven states. Decision and Reasoning to Limit Liability and Impact Operations. Granted when an employee is â€Å"off duty', on his own time, the doctrine offers protection that disallows termination, for what is perceived as unlawful engagement into activities. But, there is an exception to this ruling as well. It states that an employer can basically dictate what activity lawful is and what is not, when it is reasonable related to employment and responsibilities (NCSC, 2014).Therefore, both John and Ellen committed acts worthy of termination when they violated the statue as defined, John, by posting a rant against an important company customer, and Ellen, when she began a blob that protested the Coo's bonus. Retaliation provides that employees may engage in proper, legal, necessary, or desirable activity without being fired in retaliation by their employer (NCSC, 2014). Neither Jim in his email soliciting support of others to protest a situation involving a perceived injustice, nor the accounting department secretaries physical stance in protest against a perceived injustice have legal grounding for terminations.In defense of the employer, Employment-At-Will Doctrine holds no exception that can prevent the company employing Bill from effecting his termination. Joe, having threatened the company with suit for invasion of his privacy is not protected against wrongful discharge under the common law exception of public-policy. The exception allows effusing to break the law at the request of the employer, Joe instead was disciplined for use of company property, to discredit a customer, albeit from his personal account, he also used company time.Joe received the lesser of what could have resulted in Justifiable termination. On the other hand, the department supervisor is covered under this common law exception of public-policy. To terminate this person the company is poised for legal liability actions. Anna did not choose to participate on a Jury team, she was appointed to do so by the courts. The common law exception f public policy offers Anna protection against termination from employment during her absence for Jury duty; her boss has no choice in the matter except to comply.Position Recommendation; Pros and Cons of Whistle Blower Policy â€Å"Whistle blowing is the terminology that defines the actions of organization employees to bring attention to the wrongdoings happening in the organization. A whistle blowing policy by an organization is a step by the higher level management to keep account of all the happenings in its organization which can possibly cause harm to the organizations. It has become extremely important for large-scale organization to have a whistle blowing policy because it is almost impossibl e for them to be aware of the complete happening at all levels of their organization. (Dolomite, 2012) In any organization it is imperative to have in place a mechanism by which all know negative matters can and will be resolved. The basic mechanics are already established; the organization is Just fine tuning it for ownership. It should be simple, easy to follow, and ably proven highly effective. Ethical Theory supports willingness to get involved or the greater good of the largest population (Halberd & Inguinal, 2012).Based on that greater good recommendation is that: the Chief Executive Officer (CEO) form a roundtable steering group comprised of level one, two, and three management and leadership staff to draft a whistle blower policy that, is concise with clear written instructions easily understood, and ensures not a lengthy process (Halberd & Inguinal, 2012) will develop a training program; help employees accept the process and understand it is not about tattling, but more so, building an organizational inundation where each is holding the other accountable (Halberd & Inguinal, 2012) defines the procedures through which an individual will report; develop strict response times for investigation and resolution (Halberd & Inguinal, 2012) The CEO has the burden to set an environment that invites a high level of integrity, accountability, and transparency. When the drafts have gone through legal for lawful compliance review, the CEO and the steering group should hold information sitting for all employees to introduce the new Whistle Blower Policy as a fresh start for all toward ethical, relational, and success values. Further recommend considerations to create a position that oversees training, compliance, reporting, and resolution.Finally, recommend the CEO become visible and canvas the different areas, inquire to come to know the people, to invite genuine feedback, find out what is going on, where are issues of concerns. The CEO will do well to focus attent ion to follow-through on any issues shared while out among workers, and to stay abreast of actions pursued by the steering group; make certain they are addressed as the policy is developed. Fundamentals and Rationale of a Whistle Blower Policy. There are critical elements that ensure proper follow-through of any claim from a whistler's. Integrity is the key of what is disclosed, to who disclosed, and the method that address the issue presented. This policy is instituted to assist those who choose to question what does not appear correct and in accordance with known practice.The first of three fundamental elements critical to assurance of a Whistle Blower Policy effectiveness provides that, where an individual discloses in good faith, not for malicious or for personal gain, some indiscretion of public interest, they are retorted from factorization, harassment or disciplinary action. Secondly, the issue disclosed will be thoroughly investigated to include interviews of all persons inv olved. Third, every effort is made to protect the identity of the individual making the disclosure. Employment In legal terms, during the later portion of the nineteenth century, â€Å"at will† termination, whether initiated by employer or employee, came into focus in the United States. Simply because a person desires to disassociate oneself with the business, whatever it is, for whatever reason, whenever one chooses, is fine and acceptable. This doctrine exists because it is presumed to exhibit and respect freedom from contract. It applies to the all of â€Å"U. S† except the state of Montana primarily because of the belief that employee and employer prefers employment relationship to be â€Å"At Will† instead of Job security (NCSC, 2014).In the following pages I offer nothing more than simple facts, plain arguments and common sense; and have no other preliminaries to settle with the reader, other than that he will divest himself of prejudice and prepossession, and suffer his reason and his feelings to determine for themselves; that he will put on, or rather that he will not put off, the true character of a man, and generously enlarge his views beyond the present day-? Thomas Paine, Common Sense† (Paine, 1779), (Grotto, 1995).In other words we can debate claims and notions that employment-at-will is all about exacting a contract of redeem and respect, but, wholeheartedly agree, truthfully, that the optimistic picture of equality and freedom is tainted by the continuing subordination and discrimination imposed primarily by employers. Summarization: Employment – At – Will Doctrine The employment-at-will doctrine avows that, when an employee does not have a written employment contract and the term of employment is of indefinite duration, the employer can terminate the employee for good cause, bad cause, or no cause at all (Mull, 2001).The genesis of this ill-fated relationship began to taking shape when employees started to unionize work efforts and initiatives, albeit for a good cause; employees were at the mercy of employer discr etion. The sass gave employees a voice to dispel wrongful actions perpetrated against them, whether it was wrongful discharge based on race, religion, sex, age, and national origin, certain Federal legislative protections, and Title VII of the 1964 Civil Rights Act was available to defend. (Mull, 2001). Allowable Exceptions to Legally Fire. The recognition of employment as being central to a person's livelihood and well-being, coupled with the fear of being unable to rotate a person's livelihood from unjust termination, led to the development of common-law, or Judicial, exceptions to the employment-at-will doctrine beginning in the late sass. † (Mull, 2001) Much of what was contained in the original employment-at-will doctrine developed exceptions that did not fully materialize until the sass. However, have since become subject to erosive statutory and common-law protections all levied against wrongful discharge actions taken by an employer.In certain instances, the â€Å"at- will† dismissal of an employee by his or her employer is halted. There are three established exceptions widely upheld. The first of these is public- policy exception, under which, wrongful discharge is factual if an employee is terminated because he or she files a workers' compensation claim following a Job related injury, or say the employee is expected to break the law based on an employer's request. These acts infringe upon adopted public policy of the particular state.The first case was held in 1959, in California, involving the International Brotherhood of Teamsters and an employee fired because he refused to perjure testimony under oath, as requested. Courts struggled then and continue so, with the meaning of public policy. Some courts in various states found the term â€Å"public policy' vague. The definition differs; limits may include exclusion to clearly defined statements in the constitution or statues, or â€Å"public policy is defined to allow Judges rights to d etermine it a state's public policy locally or beyond.Secondly, when terms agreeable to an employer and an employee exchange verbal or written in some form to express terms of security or other procedures, it constitutes an implied contract exception. The employer through conversation and planning implied that if certain actions are carried out then you will remain here or etc. A common occurrence in the recent past was courts finding that the contents and representations made in employee handbooks could create an implied contract, absent a clear and express waiver that the guidelines and policies in such did not create contract rights. Mull, 2001) â€Å"The third exception is titled covenant-of-good- and-fair-dealing exception. Rather than narrowly prohibiting terminations based on public policy or an implied contract, this exception-?at its broadest-?reads a event of good faith and fair dealing into every employment relationship. â€Å"(Mull, 2001). A termination may become subj ect to interpretations. An employer's decisions motivated by malice are not permissible; done so in bad faith, and thus subject to answering a charge to show â€Å"Just cause†.By 2001, this exception was only recognized by eleven states. Decision and Reasoning to Limit Liability and Impact Operations. Granted when an employee is â€Å"off duty', on his own time, the doctrine offers protection that disallows termination, for what is perceived as unlawful engagement into activities. But, there is an exception to this ruling as well. It states that an employer can basically dictate what activity lawful is and what is not, when it is reasonable related to employment and responsibilities (NCSC, 2014).Therefore, both John and Ellen committed acts worthy of termination when they violated the statue as defined, John, by posting a rant against an important company customer, and Ellen, when she began a blob that protested the Coo's bonus. Retaliation provides that employees may engage in proper, legal, necessary, or desirable activity without being fired in retaliation by their employer (NCSC, 2014). Neither Jim in his email soliciting support of others to protest a situation involving a perceived injustice, nor the accounting department secretaries physical stance in protest against a perceived injustice have legal grounding for terminations.In defense of the employer, Employment-At-Will Doctrine holds no exception that can prevent the company employing Bill from effecting his termination. Joe, having threatened the company with suit for invasion of his privacy is not protected against wrongful discharge under the common law exception of public-policy. The exception allows effusing to break the law at the request of the employer, Joe instead was disciplined for use of company property, to discredit a customer, albeit from his personal account, he also used company time.Joe received the lesser of what could have resulted in Justifiable termination. On the other hand, the department supervisor is covered under this common law exception of public-policy. To terminate this person the company is poised for legal liability actions. Anna did not choose to participate on a Jury team, she was appointed to do so by the courts. The common law exception f public policy offers Anna protection against termination from employment during her absence for Jury duty; her boss has no choice in the matter except to comply.Position Recommendation; Pros and Cons of Whistle Blower Policy â€Å"Whistle blowing is the terminology that defines the actions of organization employees to bring attention to the wrongdoings happening in the organization. A whistle blowing policy by an organization is a step by the higher level management to keep account of all the happenings in its organization which can possibly cause harm to the organizations. It has become extremely important for large-scale organization to have a whistle blowing policy because it is almost impossibl e for them to be aware of the complete happening at all levels of their organization. (Dolomite, 2012) In any organization it is imperative to have in place a mechanism by which all know negative matters can and will be resolved. The basic mechanics are already established; the organization is Just fine tuning it for ownership. It should be simple, easy to follow, and ably proven highly effective. Ethical Theory supports willingness to get involved or the greater good of the largest population (Halberd & Inguinal, 2012).Based on that greater good recommendation is that: the Chief Executive Officer (CEO) form a roundtable steering group comprised of level one, two, and three management and leadership staff to draft a whistle blower policy that, is concise with clear written instructions easily understood, and ensures not a lengthy process (Halberd & Inguinal, 2012) will develop a training program; help employees accept the process and understand it is not about tattling, but more so, building an organizational inundation where each is holding the other accountable (Halberd & Inguinal, 2012) defines the procedures through which an individual will report; develop strict response times for investigation and resolution (Halberd & Inguinal, 2012) The CEO has the burden to set an environment that invites a high level of integrity, accountability, and transparency. When the drafts have gone through legal for lawful compliance review, the CEO and the steering group should hold information sitting for all employees to introduce the new Whistle Blower Policy as a fresh start for all toward ethical, relational, and success values. Further recommend considerations to create a position that oversees training, compliance, reporting, and resolution.Finally, recommend the CEO become visible and canvas the different areas, inquire to come to know the people, to invite genuine feedback, find out what is going on, where are issues of concerns. The CEO will do well to focus attent ion to follow-through on any issues shared while out among workers, and to stay abreast of actions pursued by the steering group; make certain they are addressed as the policy is developed. Fundamentals and Rationale of a Whistle Blower Policy. There are critical elements that ensure proper follow-through of any claim from a whistler's. Integrity is the key of what is disclosed, to who disclosed, and the method that address the issue presented. This policy is instituted to assist those who choose to question what does not appear correct and in accordance with known practice.The first of three fundamental elements critical to assurance of a Whistle Blower Policy effectiveness provides that, where an individual discloses in good faith, not for malicious or for personal gain, some indiscretion of public interest, they are retorted from factorization, harassment or disciplinary action. Secondly, the issue disclosed will be thoroughly investigated to include interviews of all persons inv olved. Third, every effort is made to protect the identity of the individual making the disclosure.

Thursday, November 7, 2019

How to Write a Computer Science Research Paper

How to Write a Computer Science Research Paper When asked to write a computer science research paper, or any research paper, one should always keep in mind that a good research paper is one that clearly spells out the problem it is addressing and the results achieved from carrying out the research. The research paper should also elaborate on what has already been done in an attempt to resolve the problem and identifying new developments aimed at solving the problem more efficiently. For instance, if one is writing a research paper on describing novel technical results, one may decide to explore the four available types of technical results – (1) namely the algorithm, (2) the system construct, (3) the performance evaluation, and (4) a collection of theories. Such a paper would focus on sufficiently describing the detailed results with the aim of establishing and demonstrating the validity of those results. The paper would also identify novel perspectives of the results or point out things that are not so obvious about the situation or problem. The paper would also identify the importance of the results of the research being written about with the aim of indicating how these results improve or impact on the problem. A typical research paper, such as one on computer science, should begin with an abstract which is typically a paragraph of about 150 words. After the abstract is the introduction which, just like the abstract, should be brief and serve to introduce the problem, outline the solution, and give a clear statement pointing out the importance of the problem and possible solutions to the problem. After summarizing the problem, the next thing would be interpreting any related work. This is the place where the writer points out any other works that are similar to those used in the research paper. Once the introduction of the research paper is complete, the writer should now embark on writing the body of the paper and this should entail writing about the problem being covered by the research paper, the approach the research paper takes in attempting to find a solution to the problem, and the results of the experiment conducted while trying to understand the problem and seek viable solutions to it. Finally, the body of the paper is the main part of the Computer science research paper and it contains the most details about the essay. It should contain sufficient motivation and should also have some examples that illustrate the issue being discussed with the aim of enabling the readers to understand the issue better. The essay should then end with a conclusion.

Monday, November 4, 2019

Suggestions for President Obama's Strategy of Declaring Essay

Suggestions for President Obama's Strategy of Declaring - Essay Example United States is one of the countries considered with the best constitutions globally. However, there are several functional departments that citizens are crying foul of their effectiveness in the country, for instance, the congress. Basically, I agree with Obama’s suggestion that he cannot wait for a â€Å"dysfunctional† congress due to the constitutional system adopted by the United States. This paper focuses on difficulties imposed on policy making by the United States’ constitutional system. It also discuses why founders opted for a system based on separation of power, checks and balances. Moreover, it evaluates its effectiveness in the present situation of the United States. Finally, it offers personal suggestions on Obama’s strategy on declaration that he cannot wait for a â€Å"dysfunctional† congress and suggests several policies. United States is considered the world super power with strong and operational constitutional system. However, th e policies system and structure were only effective in the past years. This is because in the past years United States had really advanced both economically and politically. In the recent few years, the constitutional system adopted by United States has proved ineffective and unreliable (Child 48). This is due to non-responsive nature of the system to the problems facing the country over the past few years. In the past years that is twentieth century, united states have been faced with series of problems that have greatly compromised its position globally and exposed certain weaknesses of the constitutional system on policy making and implementation (Congress 37). United states have been faced with series of problems most of which can be controlled by the country, but the policy making procedure adopted in the constitution does not allow for quick response to such issues due to the legal procedures. For instance, unemployment rate have greatly increased in the United States over the past years (Schwartz 90). Basically, this has been caused by trade with china. China offers cheap products in the country which cannot be adequately and effectively competed against by the country’s locally produced commodities. This has led to closure of several companies’ especially local company. This is because they cannot adequately compete against Chinese products due to their market prices. This has led to exportation of unemployment from china to the United States (Leebrick 79). United States is the largest importer of Chinese products. Low cost of Chinese products is due to their currency value and regulation by the government on value regulation of the currency. Though this has caused United States its economic strength and china emerging as a potential contender as a global power house, United States have done little on addressing the issue (Schwartz 43). The country through its legislation could have suspended trade with china so as to address the problems in the economy due to the trade. However, this has taken long and the country has been frequently faced with similar problems arising from trade between the country and china. The issue has not been addressed due to the policy making procedure in the country and separation of power, checks and balances that take long. According to the constitution of the country, there are several departments and legal investigation and considerations that have to be taken before sanctioning trade with china. This shows the weak

Saturday, November 2, 2019

Electoral geography and how the 2010 U.S. Census impacts the political Essay

Electoral geography and how the 2010 U.S. Census impacts the political geography of a region or state - Essay Example According to Berg-Andersson (2011), there are numbers of states which won electoral votes due to population increase—which include Arizona (+1), Georgia (+1), Florida (+2), Nevada (+1), South Carolina (+1), Texas (+4), Utah (+1), and Washington (+1) (pp. 1). Although Al Gore won the popular vote, he did not win the electoral vote. Thusly, George Bush, Jr. was declared President of the United States due to a federal judge’s ruling in Florida. Bugh (2010) states, â€Å"The chaos of the 2000 result made the messiness of vote counting suddenly obvious to nonexperts†¦Ã¢â‚¬  (pp. 118). This result was inadvertently based on population, because even though Al Gore could have won several votes extra than George W. Bush—Bush could still have won the electoral votes based on the fact that a large segment of the population could be accounted for having only a very few amount of people in a particular county. Ultimately, it was then upheld by the Supreme Court that, i ndeed, Florida’s federal judge had ruled correctly. There were appeals made, but they were not successful. In any case, some states, like Arizona and Texas, continue to grow due to the influx of immigrants from Mexico. Moreover, the Latino population in this states are going to explode, as cities all over the nation are seeing increases in the Latino population. In Chicago alone, by 2020, it was estimated by one senior official that one out of every four citizens will be of Latino descent. According to Berg-Andersson (2011), there are also a number of states which lost electoral votes due to population decrease—which include Illinois (-1), Iowa (-1), Louisiana (-1), Massachusetts (-1), Michigan (-1), Missouri (-1), New Jersey (-1), New York (-2), Ohio (-2), and Pennsylvania (-1). Many people are moving out of the Midwest due to the fact that unions are no longer going to be given collective bargaining rights. Also, according to Goudreau (2010), New York, Illinois, and Ohio (in that order) are the top three states where it is no longer economically feasible to live, and people are leaving in droves (pp. 1). Reapportionment is possible according to what happened in the 2010 census, thus leaving some constituents with less of a say in Presidential elections. According to Bennett (2006), â€Å"[One] proposal would have the size of the House revert to 435 after the 2010 census, but that would include one representative from the District and hence would also leave the electoral college with an odd number of members thereafter...† (pp. 92). Presidential elections, obviously, should not be left to the hand of fate. It is widely-argued, and supported by most Americans, that the electoral college system is outdated and must go. According to Schmidt, Shelley, and Bardes (2009), â€Å"The most obvious proposal is to eliminate the electoral college system completely†¦Ã¢â‚¬  (pp. 339). There is a high possibility that Presidential elections could be determined by the population of one’s state rather than the popular vote, which makes absolutely no sense. If one gets the votes, then ideally one should also win the election. After all, the electoral college may indeed vote against the will of the people for its designated area, based upon a preference for political party—