Monday, December 23, 2019

The Law Enforcement Model And Moral Imperatives - 1602 Words

Bell argues that civil rights laws such as Brown have been ineffective in this era of race-neutrality because they are based on a law enforcement model and moral imperatives. He proposes that we â€Å"get real about race† and accept the â€Å"permanence of racism† due to white racial consciousness, white nepotism, and white racial bonding. Similarly Roediger discusses aspects of the permanence of racism in his Wages of Whiteness. First define these four concepts: white racial consciousness, white nepotism, white racial bonding, and wages of whiteness. Then use them to engage the following: Is racism permanent? How does Bell legitimize his arguments? Why have the law enforcement model and moral imperative been ineffective? Finally, use the chapters†¦show more content†¦Furthermore, the researchers divide white racial consciousness into two: achieved and unachieved. A person who has achieved white racial consciousness has explored and developed some sort of bel ief system when it comes to racial issues. Conversely, those with unachieved white racial consciousness have not grasped their own racial identity and its link to other minority groups, which may stem from either intentionally avoiding dialogue surrounding race or depending on family members to form an ideology. In his book Faces at the Bottom of the Well, Bell argues that this relatively loose grasp of white racial identity creates an environment that serves a significant detriment to advancing racial progress in the country, as â€Å"few white people are able to identify with blacks as a group –the essential prerequisite for feeling empathy with, rather than aversion from, blacks’ self-inflicted suffering† (Bell, 4). Another obstacle in eliminating racism, according to sociologist Nancy DiTomaso’s research, is white nepotism, which is the idea that favoritism –not meritocracy—might be why whites are most successful in the employment arena, as they are able to use an expansive network of friends and family to find their jobs and build careers. This contradicts the widely held belief that white people have prospered because they are the most hard working of the racial

Sunday, December 15, 2019

The Secret Circle The Captive Chapter Sixteen Free Essays

Cassie’s grandmother shook her head. â€Å"To talk! If they’d come to us, to the older women, we might have warned them. Me and Laurel’s grandma, and Adam’s grandma, and Melanie’s great-aunt Constance-we could have told them a few things, maybe saved them. We will write a custom essay sample on The Secret Circle: The Captive Chapter Sixteen or any similar topic only for you Order Now But they went alone, without telling anyone. On Imbolc, February first, more than half the group that he had put together went to challenge him. And out of that group, not one came back.† Tears were running slowly down the seamed old cheeks. â€Å"So you see, it was the brave ones, the strong ones that went and died. The ones that are left are the ones too scared or too stupid to see the danger-I’m sorry, Deborah, but it’s true.† Cassie remembered that both Deborah’s parents were alive. â€Å"All the best of Crowhaven Road went to fight Black John that Imbolc Night,† her grandmother said. â€Å"But howl† Cassie whispered. She was thinking of that row of gravestones in the cemetery. â€Å"How did they die, Grandma?† â€Å"I don’t know. I doubt if anyone alive knows, unless it’s†¦Ã¢â‚¬  Her grandmother broke off and shook her head, muttering. â€Å"There was fire in the sky, and then a storm. A hurricane from the sea. The older women got together the babies that had been left with them, and the young parents that hadn’t gone with the group, and we managed to save them. But the next day the house at Number Thirteen was burned to the ground, and all the ones who’d gone to challenge Black John were dead. â€Å"We never found most of the bodies. They were washed out to sea, I suppose. But one thing we did find was the burned corpse at Number Thirteen. We knew it was him by the ring he wore, a shiny black stone we used to call lodestone. I forget the modern name. We took him out to the old burying ground and put him in the bunker. Charles Meade, Diana’s father, dropped that chunk of concrete in front of it. We figured that if he’d come back once, he might try again someday, and we meant to stop him if we could. And after that the parents that had survived hid their Books of Shadows and did their best to keep their children away from magic. And it’s strange, but most of them forgot what they could. I guess because they couldn’t remember and stay sane. Still, it’s funny, now, how much they’ve forgotten.† The cracked voice had been growing weaker and weaker, but now Cassie’s grandmother grasped Cassie’s wrist hard. â€Å"Now, listen to me, child. This is important. Some of us didn’t forget, because we couldn’t. I’d named my daughter for a prophetess, and she did the same for her daughter, because we’ve always had the second sight. Your mother couldn’t bear what her gift showed her, and so she ran away from New Salem; she ran all the way to the other coast. But I stayed, and I’ve watched all my premonitions come true, one by one. The babies that were born on Crowhaven Road in that single month grew up different, despite everything their parents could do. They were drawn to the Powers and the old ways from the beginning. They all grew up strong-and some of them grew up bad. â€Å"I’ve watched it happen, and in my mind I’ve heard Black John laughing. They burned his body, but they couldn’t burn his spirit, and it’s always been here, waiting, hanging around the old burying ground and the vacant lot at Number Thirteen. He was waiting for his coven, the one he’d planned, the one he’d gotten born. He was waiting for them to come of age. He was waiting for them to bring him back. â€Å"I knew it would happen-and I knew only one thing could stand against him when it did. And that’s you, Cassie. You have the strength of our family, and the sight, and the Power. I begged your mother to come home, because I knew that without you the children of Crowhaven Road would be lost. They’d turn to him, the way their parents did, and he’d be their leader and their master. You are the only one who can stop him from taking them now.† â€Å"So that’s what you and Mom fought about,† Cassie said in wonder. â€Å"About me.† â€Å"We fought about courage. She wanted to protect you, and I knew that by protecting you we’d lose all the others. You had a destiny even before you were born. And the worst was that we couldn’t tell you about it-that was what the prophecies said. You had to come here all unknowing and find your own way, like some innocent sacrifice. And you did. You’ve done everything we could have wanted. And the time was coming when we could have explained it all to you†¦ but she fooled us, that Faye. By the way, how’d she do it?† â€Å"I†¦Ã¢â‚¬  Cassie didn’t know what to say. â€Å"I helped her, Grandma,† she said finally. â€Å"We found the crystal skull that belonged to Black John, and it was full of dark energy. Every time we used it, somebody died. And then-† Cassie took a deep, ragged breath. â€Å"Then, tonight, Faye told us to bring the skull to the cemetery. And when she uncovered it there-I don’t know-all this darkness came out†¦Ã¢â‚¬  Cassie’s grandmother was nodding. â€Å"He was master of dark things. Just like the real Man in Black, the lord of death. But, Cassie, do you really understand?† With a supreme effort, the old woman tried to sit up to look in Cassie’s face. â€Å"When you took the skull to his burying place and let that energy out, it was enough to bring him back. He’s here now; he’s come back again. Not a ghost or a spirit, but a man. A walking, breathing man. He’ll look different the next time you see him; once he’s had a chance to pretty himself up. And he’ll try to fool you.† She sank back wearily. â€Å"But, oh, Grandma I helped let him loose. I’m sorry. I’m so sorry†¦Ã¢â‚¬  Tears swam in Cassie’s eyes. â€Å"You didn’t know. I forgive you, child, and what’s done is done. But you have to be ready for him†¦Ã¢â‚¬  Cassie’s grandmother’s eyes drifted shut, and her breath had a frightening sound. â€Å"Grandma!† Cassie said, shaking her in panic. The old eyes opened again, slowly. â€Å"Poor Cassie. It’s a lot to face. But you have strength, if you look for it. And now you have this.† Feebly, she pressed the Book of Shadows again into Cassie’s hands. â€Å"The wisdom of our family, and the prophecies. Read it. Learn it. It’ll answer some of the questions I don’t have time for. You’ll find your way†¦Ã¢â‚¬  â€Å"Grandma! Grandma, please†¦Ã¢â‚¬  Her grandmother’s eyes were still open, but they were changing, filming over, as if they didn’t see her anymore. â€Å"I don’t mind going now that I’ve told the story†¦ but there’s something else. Something you need to know†¦Ã¢â‚¬  â€Å"Cassie!† The voice came from the doorway, and it startled Cassie so much that she jerked and looked up. Laurel was standing there, her elfin face white with concern. â€Å"Cassie, what’s happening in here? Are you okay? Do you want a doctor?† She was staring at Cassie’s grandmother on the floor. â€Å"Laurel, not now!† Cassie gasped. She was crying, but she held on harder to her grandmother’s knotted old hands. â€Å"Grandma, please don’t go. I’m frightened, Grandmother. I need you!† Her grandmother’s lips were moving, but only the faintest of sounds came out. â€Å". . . never be afraid, Cassie. There’s nothing frightening in the dark if you just face it†¦Ã¢â‚¬  â€Å"Please, Grandma, please. Oh, no†¦Ã¢â‚¬  Cassie’s head dropped down to her grandmother’s chest and she sobbed. The knotted hands weren’t holding hers anymore. â€Å"You said you had something else to tell me,† she wept. â€Å"You can’t go†¦Ã¢â‚¬  An almost inaudible breath came from her grandmother’s chest. Cassie thought it was the word â€Å"John.† And then, â€Å". . . nothing dies forever, Cassie†¦Ã¢â‚¬  The chest against Cassie’s forehead heaved once and was still. Outside, a yellowing moon hung low in the sky. â€Å"The Mourning Moon,† Laurel said quietly. ‘That’s what this one is called.† It was appropriate, Cassie thought, although her eyes were dry now. There were more tears inside her, building up, but they would have to wait. There was something that had to be done before she could rest and cry. Even after her grandmother’s story, she had so many questions, so much to figure out-but first, she had to do this one thing. There were a bunch of cars parked near the street. The rest of the coven was there-no, not all of them. Cassie saw Suzan and Sean and the Hendersons, and Adam and Diana. But she didn’t see the person she was looking for. â€Å"Melanie and Nick took your mom to Melanie’s aunt Constance,† Laurel said hesitantly. â€Å"They thought it was the best place for her, tonight. She was still kind of spacey-but I know she’ll be okay.† Cassie swallowed and nodded. She wasn’t sure; she wasn’t sure of anything. She only knew what she had to do right now. Never be afraid, Cassie. There’s nothing frightening in the dark if you just face it. Just face it. Face it and stand up to it. Then Cassie saw who she was looking for. Faye was in the shadows beyond the headlights of the cars. Her black shift and her hair blended in with the gloom, but the pallor of her face and the silver ornaments she wore stood out. Cassie walked up to her without hesitation. At that moment, she could have hit Faye, strangled her, killed her. But all she said was, â€Å"It’s over.† â€Å"What?† Faye’s eyes gleamed a little, yellow as the moonlight. She looked sick and unsettled-and dangerous. Like a pile of dynamite ready to go off. â€Å"It’s over, Faye,† Cassie repeated. â€Å"The blackmail, the threats†¦ it’s all over. I’m not your prisoner anymore. Faye’s nostrils flared. â€Å"I’m warning you, Cassie, this isn’t the time to push me. I’m still leader of the coven. The vote was fair. You can’t do anything to change it †¦Ã¢â‚¬  â€Å"I’m not trying to change it-now. Right now I’m just saying that you don’t have a hold over me anymore. It’s finished.† â€Å"It’s finished when I say it’s finished!† Faye snarled. Cassie realized then how close Faye was to snapping, how dangerous Faye’s mood really was. But it didn’t matter. Maybe it was even better this way, to get it all over with at once. â€Å"I’m not joking, Cassie,† Faye was going on heatedly. â€Å"If you can turn on me, I can do the same to you †¦Ã¢â‚¬  Cassie took a deep breath and then said, â€Å"Go ahead.† There’s nothing frightening in the dark if you just face it. â€Å"Fine,† Faye said between her teeth. â€Å"I will.† She turned around and strode to the place where Diana and Adam were standing, arms around each other. Adam was practically supporting Diana, Cassie saw, and for a moment her heart failed her. But it had to be done. Despite the oath, despite Diana’s pain, it had to be done. Faye turned back once to look at Cassie. A look that said, clearly, you’ll be sorry. Cassie wondered in sudden panic if it was true. Would she be sorry? Was she doing the wrong thing after all, defying Faye at the wrong time? Wouldn’t it be better to wait, to think about this†¦ But Faye was turning back to Diana, malicious triumph written all over her face. The coven wasn’t happy with Faye tonight, but Faye was still the leader and nothing could change that fact. Now Faye was going to start her reign by getting revenge on the people she hated most. â€Å"Diana,† she said, â€Å"I have a little surprise for you.† [The End] How to cite The Secret Circle: The Captive Chapter Sixteen, Essay examples

Saturday, December 7, 2019

Service Delivery Models of Cloud Computing †MyAssignmenthelp.com

Question: Discuss about the Service Delivery Models of Cloud Computing. Answer: Introduction: In the process of evaluating the implementation of the project on the migration of critical IT apps and sources of data to an external cloud in Aztec, the comparison will be made between different service providers and through negotiating, issues relating the law will be resolved. The standard regular act of cloud computing is to choose service provider available in the market by the offers they are given. IT does not support the negotiating philosophy. This contract will be open to cloud computing system prospective customers. Cloud computing has a nature that that opens a way for additional reviewing to ensure standard contract which is unique from the conventional internet service system (Martson et.al, 2011). The customers present in the contract direct particular attention to their legal duties and rights in the presence of any breach in the service system (George Kumar, 2015). The cloud is a powerful media to facilitate the outsourcing of the infrastructure that is vital too. Interruption to the infrastructure can result in broad-ranging effects which is the reason why allocations of the liability should be taken in light of standard limitations for the stakeholders with responsibility. The service providers and the customers should go through the contract terms regarding the security risks till any issue happens about particular security related to the cloud system (Gangwar Date, 2016). Aztec is a re-known established financial service organization which deals with millions of dollar transactions and thus is therefore exposed to numerous risks that are common to conservative groups. The organization takes great care of the protection of the integrity and integration as well ensuring availability of its information data (Kousalya, Balakrishnan Raj, 2017). The organization (Aztek) has an intention to migrate its critical IT operations and data sources to an external cloud hosting solutions. Since it is an enterprise, cost saving is seen as a highly important driving factor behind the idea of the Aztek movement of its critical operations to the cloud. But migrating the project requires being evaluated critically for risks and vulnerabilities associated with the cloud computing in the line of legal, market picture and complying frameworks of Australia. The data handled by Aztec is highly sensitive and confidential since the company is a financial services firm. There s hould be an extensive thought process undertaken in each stage a decision is made by the management of Aztec specifically if the decision is focusing an IT project that can involve working or exposing sensitive information. This type of decisions can expose the company to high risks and vulnerabilities. A single mistake in the data security can cost Aztec huge problems regarding money, reputation, compliance and can impend penalties from the government regulators (Kshetri, Fredriksson Torres, 2017). Despite the Australian government encouraging the movement of the IT assets of corporate or non-corporate companies to cloud specifically for purposes of cost saving, the case study (Aztec) need to conduct a review on the migration of cloud computing project thoroughly via the following lines: In the basis of the Commonwealth procurement rules, would the suggested cloud shifting be of value for the organization's money? Will the project be in line with the rules as they are in the protective security frameworks? Do all the apps need to be shifted to the cloud? Through means of cloud computing, companies are enabled to access convenient access to a network that presents a range of computing assets like networks, services, storage services and many others which can fast be provision are availed once required. The key features of the cloud-based infrastructure include: Self-provision of services according to customers' demands. Use of services is monitored based on pay per use model and is transparent to the client. The services offered are available on the internet and can be accessed from across many places. Cloud computing based resources can be concentrated in one area and shared to many users The cloud services are provided through three types of service models which are PaaS, SaaS, and Iaas. Aztek will be provided with the possibility to use software applications from the external hosting party, which is executed based on the infrastructure of the cloud, for instance, a web-based e-mail (El-Gazzar, Hustad Olsen, 2016). The external provider manages the infrastructure and Aztek will be charged according to the usage of the services. Current IT practices at Aztek Corporation At present, Aztek maintains all of its IT applications and on its own internally, which openly shows its security posture as being within a closed perimeter. To access information on the organization resources is a must that one should have a connection to the company's network which is managed and run by Aztek IT specialists internally (Mann Shah, 2017). Also for the organization's staff who work remotely, or for customers who want to access resources from the company, authentication mechanisms are highly employed to ensure that the people who access the information and company's resources are legalized. The process gives Aztek a huge boost in ensuring its resources are more secure since the security framework will be run through the company's own will (Khajeh-Hosseini, Greenwood Sommerville, 2010). However, this type of safety posture has some dangers but presents the organization with surety that their data will be secure in their own hands rather than other parties. Aztek being a financial service provider to a large number of customers should tread carefully about the safety of the information that they hold and if it would be reasonable migrating their IT applications to an outside provider (Adamatzky, 2017). In case Aztek opts to migrate its IT information assets like apps and database, the type of threshold that the cloud migration will experience on the company's security posture will highly rely on the kind of service model and the model deployment that Aztek will decide to embrace in its operations (Buzin, Fournier Arcushin, 2013). Going to a public cloud model and community cloud model implementation will expound on the security perimeter of the company to the cloud infrastructure provider because they will be overseeing the infrastructure and thus the organization will also incorporate the resources of the service provider in its operations. Migrating critical IT applications and resources at Aztek will increase the company's obligations and thus should take all this into account before the adoption of the project. The duties will involve, reporting, SLAs, arrangements, networking security among many others which will be communicated to Aztek during the period of contract of cloud migrating project (Subashini Kavitha, 2011). The company will now involve more parties in its operations when deciding on issues and this can drag the process of decision-making within the organization (Sturm, Pollard Craig, 2017). By taking the critical information technology applications to an external provider, the organization will be laying practical customers information to a third party which breaches it and pose threats to confidential data. The responsibilities to maintain security in this project should be deliberated and shared between the hosting party (provider) and the customer who is Aztek Corporation. Hosting critical information such as payroll data of staff or clients' account details and personal information on the external cloud can put the organization in great danger of data theft and attacks. The security responsibility sharing agreement between the organization and the provider becomes vital on this occasion so that each party can act at maximum security in its area of delegation. The public can be the likely choice if Aztek wants to move information which should be availed for public use and bears lower risks. Public cloud infrastructures are well equipped with adequate security measures compared to others, and this information in it has small risks. Therefore, this project may improve the security measures related to infrastructure when compared to the current security posture of the organization (Ramgo vind, Eloff Smith, 2010). A community-based cloud can have chances for applications that have a medium level of risks since it has features similar to those of a public cloud while upgrading the security requisitions. Systems that handle high-risk information for instance customer account information cannot be safe in the hands of a public or a community cloud because it can easily result in loss of control over the organization information security and infrastructure (Ward et.al, 2010). Thus, the anticipated migration of cloud computing and other critical IT applications at Aztek can be at high risk to company's management because the underlying security risks which can lead to loss of customers' data and tarnish the organization's picture. A private cloud remains the best option for the company because the level of sensitivity of the information dealt with aids reduces the security risks and challenges at the same time opposing the effects of the existing security posture. Benefits of cloud computing in security terms When taken to a larger scale, all types of security measures starting from the minimum size to the larger one become less expensive and therefore, similar investments result to an improved quality of security level. Preventive measures such as management of patch, tightening of virtual machines and hypervisors, as well as filtering, are put into consideration too with some locations, edge networks that make the content to be processed of conveyed to the final point nearer to it and within less time which is all scale benefits. A standardized and opened interface is of benefit to managed security service. This interface is provided by a high number of external and private providers of cloud computing systems (Jamshidi, Ahmad Pahl, 2013). It plays a key role in the creation of a more open market in the perspective of secure services availability. Reallocation ability for resources used in authentication, shaping, traffic, filtering, and encrypting dynamically specifically for issues such as DDoS attack is surely a merit for the resilience of the moving cloud computing applications (Williams, 2010). A devoted, pay per use representations of a virtual machine can be availed by the cloud computing service provider which also adopts the virtualization philosophy is done through a taking a forensic analysis of the infrastructure online. The cloud computing system comes with a low-cost method of logging with no compromises to the level of quality of the service offered by the cloud. Threats, vulnerabilities and consequences Risk assessment is evaluating the possibility of disaster phenomenon which is measured against the adverse effect (Mather, Kumaraswamy Latif, 2009). The adverse effect is also estimated. The threshold of every incidence and its impact on an organization can be given by skilled human resources in that field and is important for an organization or cloud provider designing a given cloud model. The assessment of the risks likely to be faced by Aztek in the anticipated project is given on a scale of 0 to 8. The scale implies; In a cloud system, the clients always make an effort of gaining control from the CP or the hosting party regarding some problems that can adversely impact the cloud computing security system (Mohapatra Lokhande, 2014). However, the SLAs at other times are unable to avail the same for the provider. This is where a change in security breaching of defense system occurs. The probability of the risk occurring is very high as well as the risk. Security posture impact Very high in SaaS Low in SaaS Effect Very high Vulnerabilities v Insufficient standards of solutions and technologies v Poor role of divisions and adoption v Difficulties in measuring up to the set or promised obligations externally to cloud computing v Numerous data centers in many places hence low transparency v Ownership of resources become hard to decide. Consequences v Loss of customer trust v Bad picture of Aztek in the market due to loss of customer data v Possible loss of staff personal information v Low service delivery Risk High Failure as a result of migration of resources Cloud computing systems are identified through their ability to share as well as the ability to hold many parties together. The risk associated with this is highly linked with failure occurring in the cache, separation system, routing, storage and relation between many tenants which is also referred to as guest hopping attack (Gatewood, 2009). The risk is high. Probability of risk occurring Low in a private cloud Medium in a public cloud Impact Very high Vulnerabilities v VMs hypervisor vulnerabilities v An organization cannot change its reputational isolation v Possible attacks on cloud networks due to hacking posed by the high number of people within the network Consequences v Loss of customer trust v Bad picture of Aztek in the market due to loss of customer data v Possible loss of staff personal information v Low service delivery Risk High Agreement of management interface The implementation of the project brings a compromise on the customer interfaces and management within a cloud which open and has broad access to resources via the internet. Here, the risk is accumulated if dangers of remote access and web browser are merged (Aceto et.al, 2013). The risk under this is medium. Probability of risk occurring Medium Impact Very high Vulnerabilities v Giving management console remote access v Poor management of system patches and problems with the migrated cloud applications Consequences v Possible loss of staff personal information v Low service delivery v Loss of customer trust v Bad picture of Aztek in the market due to loss of customer data Risk Medium Possible malicious nature within the cloud It is among the top threats for cloud computing, and thus the providers or cloud designers should take the role of designing the cloud in a manner that system administration and security management service is well functioning. It is possible for clients to shift the risks involved here to the cloud provider. The risk possibility is high in this threat. Probability of risk occurring Medium Impact Very High Vulnerabilities v Lack of proper implementation and definition of roles v No appropriate processes for handling physical and information security v Data processing is not encrypted v Main security officers have no separate application to monitor the cloud system Consequences v Low service delivery v Loss of customer trust v Possible loss of staff personal information v Bad picture of Aztek in the market due to loss of customer data Risk High Risky and partial deletion of data The risk here occurs when a request to delete data from the cloud is made because the deletion made through the cloud does not truly delete the data from the system (Sripanidkulchai et.al, 2010). Fast data deletion is unachievable and undesirable for a customer because the time needed for the action through the cloud cannot be accessible and thus there may be difficulties in freeing up space. This risk is medium in cloud computing. Probability of risk occurring Medium Impact Very high Vulnerabilities v Cloud system is not able to conduct a sensitive cleaning of media and devices. Consequences v Possible loss of personal critical information Risk Medium Difficult in protection of data Both the customer (Aztek) and the external cloud provider faces numerous risks for data protection. The problem becomes bigger if an organization or customer is also a data controller in checking and providing a means of handling the data legally. The risks are most prevalent when data is routed by several transfer methods such as clouds (Carroll, Van Der Merwe Kotze, 2011). To reduce this, some cloud providers give their policies and procedure to be followed when handling data. The risk involved here is high, and so is the impact they cause. Probability of risk occurring High Impact High Vulnerabilities v Lack of transparency in data center sited in some jurisdictions in their information Consequences v Loss of customer trust v Bad picture of Aztek in the market due to loss of customer data v Possible loss of staff personal information v Low service delivery Risk High Data security From the view of the risks assessed in the preceding part above, it can be suggested that with the knowledge of the possible risks related to data security, migration of critical IT services and applications at Aztek should be outsourced to three differing cloud service providers. Each of the providers should avail a unique model of service and host some different type of apps (Boampong Wahsheh, 2012). It will help reduce concentrating data in a sole provider and therefore the risk of losing data will be significantly reduced. When this is implemented, services can be joined through a way of federated management identity solution. This type of model is referred to as the federated cloud. Through this model, the cloud provider will give the cloud infrastructure as SaaS model which will be used for apps like email systems, desktop applications, and message. The centers of the data will be located in different areas across the globe to enable access to data from a wide range to the organization's customers. The other provider will be providing services like availing PaaS model that will involve housing the development and launching of custom apps. These apps will be used by the organization to improve on the means of providing services in the financial sector with the long-term goal being the increasing quality of services and productivity (Mohapatra Lokhande, 2014). The last service provider will provide cloud infrastructure for supporting apps and source of data like human resource CRM, finance, accounting among others through IaaS model. At the start, the company would be liable for controlling the devices of danger recovery, and continuity of an enterprise for the apps moved to PaaS and IaaS models through the means of current infrastructure. For the apps moved by use of SaaS model, the external provider will be answerable for continuity of the company and support of data and services for a specified period. The medium and long-term disaster is recovering, and backup services can be purchased for the cloud providers in each model. Conclusion Aztec is likely to witness an efficient, scalable and reliable management solution in its operations if it migrates its critical IT applications and services to the three service providers. The organization has a high chance to achieving its objectives and expounding its services to more marginalize locations. For management purposes, and the internal direct solution may not be a good choice for the organization since it will add on to the responsibilities within it. The company should go a solution that would provide one sign on or off a unison of all directory services, which only one app and interface of any kind that the management requires. The application should help establish a safe managing of encrypted signs and keys and push for the right access to control policies. A solution that presents users of cloud computing systems including the customers, employees, etc. and be in line with requisitions and security policies of Aztek would be needed in future. References Aceto, G., Botta, A., De Donato, W., Pescap, A. (2013). Cloud monitoring: A survey.Computer Networks,57(9), 2093-2115. Adamatzky, A., Akl, S., Burgin, M., Calude, C. S., Costa, J. F., Dehshibi, M. M.. Margenstern, M. (2017). East-West paths to unconventional computing.Progress in Biophysics and Molecular Biology. Boampong, P. A., Wahsheh, L. A. (2012, March). Different facets of security in the cloud. InProceedings of the 15th Communications and Networking Simulation Symposium(p. 5). Society for Computer Simulation International. Buzin, M. S., Fournier, F., Arcushin, S. (2013). FIspace Design and Release Plan. Carroll, M., Van Der Merwe, A., Kotze, P. (2011, August). Secure cloud computing: Benefits, risks and controls. InInformation Security South Africa (ISSA), 2011(pp. 1-9). IEEE. El-Gazzar, R., Hustad, E., Olsen, D. H. (2016). Understanding cloud computing adoption issues: A Delphi study approach.Journal of Systems and Software,118, 64-84. Gangwar, H., Date, H. (2016). Critical Factors of Cloud Computing Adoption in Organizations: An Empirical Study.Global Business Review,17(4), 886-904. Gatewood, B. (2009). Clouds on the information horizon: how to avoid the storm: cloud-based solutions, such as web-based e-mail, have many advantages. But organizations must be aware of the compliance issues related to storing their information outside of their own control.Information Management Journal,43(4), 32-37. George, J., Kumar, V., Kumar, S. (2015). Data Warehouse Design Considerations for a Healthcare Business Intelligence System. InWorld Congress on Engineering. Jamshidi, P., Ahmad, A., Pahl, C. (2013). Cloud migration research: a systematic review.IEEE Transactions on Cloud Computing,1(2), 142-157. Khajeh-Hosseini, A., Greenwood, D., Sommerville, I. (2010, July). Cloud migration: A case study of migrating an enterprise it system to iaas. InCloud Computing (CLOUD), 2010 IEEE 3rd International Conference on(pp. 450-457). IEEE. Kousalya, G., Balakrishnan, P., Raj, C. P. (2017). The Hybrid IT, the Characteristics and Capabilities. InAutomated Workflow Scheduling in Self-Adaptive Clouds(pp. 199-221). Springer International Publishing. Kshetri, N., Fredriksson, T., Torres, D. C. R. (2017).Big Data and Cloud Computing for Development: Lessons from Key Industries and Economies in the Global South. Taylor Francis. Mann, A., Shah, P. J. (2017). Framework for Analyzing Security Issues in Business Intelligence and Analytics in Cloud. Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., Ghalsasi, A. (2011). Cloud computingThe business perspective.Decision support systems,51(1), 176-189. Mather, T., Kumaraswamy, S., Latif, S. (2009).Cloud security and privacy: an enterprise perspective on risks and compliance. " O' Reilly Media, Inc.". Mohapatra, S., Lokhande, L. (2014). Cloud Computing and Social Commerce. InCloud Computing and ROI(pp. 41-65). Springer International Publishing. Ramgovind, S., Eloff, M. M., Smith, E. (2010, August). The management of security in cloud computing. InInformation Security for South Africa (ISSA), 2010(pp. 1-7). IEEE. Sripanidkulchai, K., Sahu, S., Ruan, Y., Shaikh, A., Dorai, C. (2010). Are clouds ready for large distributed applications?ACM SIGOPS Operating Systems Review,44(2), 18-23. Sturm, R., Pollard, C., Craig, J. (2017).Application Performance Management (APM) in the Digital Enterprise: Managing Applications for Cloud, Mobile, IoT and eBusiness. Morgan Kaufmann. Subashini, S., Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing.Journal of network and computer applications,34(1), 1-11. Ward, C., Aravamudan, N., Bhattacharya, K., Cheng, K., Filepp, R., Kearney, R.... Young, C. C. (2010, July). Workload migration into clouds challenges, experiences, opportunities. InCloud Computing (CLOUD), 2010 IEEE 3rd International Conference on(pp. 164-171). IEEE. Williams, M. I. (2010).A quick start guide to cloud computing: moving your business into the cloud. Kogan Page Publishers.

Saturday, November 30, 2019

Supply Chain at Coffee Shop free essay sample

Then arrives to their many outlets, out bringing best of aromatic coffee and fresh goods to their satisfied customers. 2. In my opinion, technology is the corner stone to globalization. Supply chains and transportations that brought globalization were known many years back, but only in the recent years they advanced to the level that made it convenient to users, lower in costs, and faster than ever. For instance, companies that specialize in e-commerce, transportation, and business services have rose in numbers, many example includes FedEx, Aramex, and DHL. Not too long, sending packages was a long and complicated process, involving a lot of paperwork and high fees. Now, with these companies, it’s as simple as a click of a button! You can arrange everything through their website, they even have tracking systems to track your shipment until it arrives to your doorstep. 3. The process of supply chains have 4 flows; materials, information, cash, and return. We will write a custom essay sample on Supply Chain at Coffee Shop or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Materials flow in on way; from suppliers to producers then to the end users. Can you imagine a coffee house that is out of coffee? This is how critical the arrival of materials is! Information, if not accurate, can actually break the supply chain! One mistake that can happen is providing wrong dates to the suppliers, so instead of having your bakery fresh out of the oven, you get them 1 day old. Think about the serious loss you just caused to all of that cuisines you’re selling! The flow of cash depends on your earnings. If this coffee shop has no customers, how will it continue doing business?

Tuesday, November 26, 2019

Free Essays on Brown V Board Of Education

Racial segregation in southern public schools dates to the 1860’s before, and after the American Civil War. More than 95 percent of blacks lived in the southern states throughout the 19th century. So segregation affected the majority of the black population. In the influential case of Plessy v. Ferguson (1876) the Supreme Court ruled in favor of the practice of segregation as long as the separate facilities were â€Å"equal†. By 1900, the south was completely segregated. In 1909 the National Association for the Advancement of Color People or the NAACP was formed. The organization’s sole purpose was to fight for racial equality and to end segregation. From 1939 to 1950 the organization won various cases leading to the integrations universities in Mississippi, Maryland, Oklahoma, and Texas. The NAACP also had some success in forcing states to equalize public school funding, and to pay black teachers the same rate as white teachers. The Legal Background Brown v. Board of Education developed from a series of court cases involving school segregation. For an example, Briggs v. Elliott (1950), this case took place in Clarendon County, South Carolina. In the 1949-1950 school year the average annual funds per white students in Clarendon County totaled $179, but for black students it was only $43. The 6,531 black students attended school in 61 buildings. Many of the black schools lacked indoor plumbing and heating. These buildings were valued at $194,575. However the county’s 2,375 white students in the county attended school in 12 buildings worth $673,850. These building were the top of the line facilities. Teachers in these black schools were paid one third less than white teachers. And on top of that the county only provided free buses for whites, and not for black students. These conditions made blacks in Clarendon County to sue to create equal schools. In 1950 the United State district court in South Carolina ordered equal fun ding of... Free Essays on Brown V Board Of Education Free Essays on Brown V Board Of Education Racial segregation in southern public schools dates to the 1860’s before, and after the American Civil War. More than 95 percent of blacks lived in the southern states throughout the 19th century. So segregation affected the majority of the black population. In the influential case of Plessy v. Ferguson (1876) the Supreme Court ruled in favor of the practice of segregation as long as the separate facilities were â€Å"equal†. By 1900, the south was completely segregated. In 1909 the National Association for the Advancement of Color People or the NAACP was formed. The organization’s sole purpose was to fight for racial equality and to end segregation. From 1939 to 1950 the organization won various cases leading to the integrations universities in Mississippi, Maryland, Oklahoma, and Texas. The NAACP also had some success in forcing states to equalize public school funding, and to pay black teachers the same rate as white teachers. The Legal Background Brown v. Board of Education developed from a series of court cases involving school segregation. For an example, Briggs v. Elliott (1950), this case took place in Clarendon County, South Carolina. In the 1949-1950 school year the average annual funds per white students in Clarendon County totaled $179, but for black students it was only $43. The 6,531 black students attended school in 61 buildings. Many of the black schools lacked indoor plumbing and heating. These buildings were valued at $194,575. However the county’s 2,375 white students in the county attended school in 12 buildings worth $673,850. These building were the top of the line facilities. Teachers in these black schools were paid one third less than white teachers. And on top of that the county only provided free buses for whites, and not for black students. These conditions made blacks in Clarendon County to sue to create equal schools. In 1950 the United State district court in South Carolina ordered equal fun ding of...

Friday, November 22, 2019

AP U.S. History Application

Osama Bin Laden attacked the United States’ on September 11, 2001 and ever since the attacks that killed nearly 3,000 people, this event has been known as the nine-eleven. The nine-eleven was a series of four suicide attacks that were committed in the areas of New York City, Washington D. C. , Virginia, and Pennsylvania. After the nine-eleven, he has been the major target of the Federal Bureau of Investigation (FBI). After the death of Osama Bin Laden, I realized a few key points that have changed my view of the way human beings think. Osama Bin Laden did not influence me to have a grudge against the United States, or any of the sorts, but he helped me view the world in a different way. For instance, many people in the United States celebrated his death after he was found and shot on May 2, 2011. I disapprove of this reaction from the citizens of the United States. He did wrongs to thousands of people and caused the United States to pay billions of dollars to fix the damage. But regardless of what he did, it is wrong for us to celebrate his misfortune. To take joy out of someone’s tragedy proves human beings to be immorally unjust. If human beings celebrate the death of someone who is equal to them, they are not being compassionate. Though Osama Bin Laden’s decision to bomb the United States and its people was heartless, the act of rejoicing the death of a human also proves us to be inhumane. People forget to be compassionate towards the others who make the terrible decisions, because they believe that they are only meant to do harm, but that’s not always the case. If we do not discriminate and if we treat each other equally, less suicide attacks will occur. The big reason why terrorists decide to act the way they do is because of all the unjust and discrimination they have to face in their daily lives. The way human beings react to the death of others is important because it teaches others how inhumane our world has become. The main reason why wars start is because of power and money; and the after-results of the war often does no good. It only forces the people of the country to live a controlled life of poverty. The government restricts us from practicing our true freedom by forcing propaganda upon us, and Osama Bin Laden is one of them. The citizens of the United States understand that he made wrong decisions and that he needs to pay for what he’s done, but we should respect everyone; because all human beings were created equal. In conclusion, Osama Bin Laden has influenced the way I think towards the human behavior and thoughts through America’s response to his death. American citizens took joy out of his misfortune, without thinking about the amount of respect they are giving to Osama Bin Laden, because I believe we should all be treated and respected equally. Rejoicing for someone’s death will do no good for the present or the future, because of the immoral actions. It’s imperative for each person to remember that everybody is created equal and human beings are human beings; we think similarly. Osama Bin Laden has inspired me see the world with a different perspective: to think and treat others with respect, no matter what kind of background they have or what kind of sins they have committed. AP U.S. History Application Osama Bin Laden attacked the United States’ on September 11, 2001 and ever since the attacks that killed nearly 3,000 people, this event has been known as the nine-eleven. The nine-eleven was a series of four suicide attacks that were committed in the areas of New York City, Washington D. C. , Virginia, and Pennsylvania. After the nine-eleven, he has been the major target of the Federal Bureau of Investigation (FBI). After the death of Osama Bin Laden, I realized a few key points that have changed my view of the way human beings think. Osama Bin Laden did not influence me to have a grudge against the United States, or any of the sorts, but he helped me view the world in a different way. For instance, many people in the United States celebrated his death after he was found and shot on May 2, 2011. I disapprove of this reaction from the citizens of the United States. He did wrongs to thousands of people and caused the United States to pay billions of dollars to fix the damage. But regardless of what he did, it is wrong for us to celebrate his misfortune. To take joy out of someone’s tragedy proves human beings to be immorally unjust. If human beings celebrate the death of someone who is equal to them, they are not being compassionate. Though Osama Bin Laden’s decision to bomb the United States and its people was heartless, the act of rejoicing the death of a human also proves us to be inhumane. People forget to be compassionate towards the others who make the terrible decisions, because they believe that they are only meant to do harm, but that’s not always the case. If we do not discriminate and if we treat each other equally, less suicide attacks will occur. The big reason why terrorists decide to act the way they do is because of all the unjust and discrimination they have to face in their daily lives. The way human beings react to the death of others is important because it teaches others how inhumane our world has become. The main reason why wars start is because of power and money; and the after-results of the war often does no good. It only forces the people of the country to live a controlled life of poverty. The government restricts us from practicing our true freedom by forcing propaganda upon us, and Osama Bin Laden is one of them. The citizens of the United States understand that he made wrong decisions and that he needs to pay for what he’s done, but we should respect everyone; because all human beings were created equal. In conclusion, Osama Bin Laden has influenced the way I think towards the human behavior and thoughts through America’s response to his death. American citizens took joy out of his misfortune, without thinking about the amount of respect they are giving to Osama Bin Laden, because I believe we should all be treated and respected equally. Rejoicing for someone’s death will do no good for the present or the future, because of the immoral actions. It’s imperative for each person to remember that everybody is created equal and human beings are human beings; we think similarly. Osama Bin Laden has inspired me see the world with a different perspective: to think and treat others with respect, no matter what kind of background they have or what kind of sins they have committed.

Wednesday, November 20, 2019

Steelco Research Paper Example | Topics and Well Written Essays - 1500 words

Steelco - Research Paper Example Thus theirs is a typical business-to-business product, and the direct buyers rely more on the standardized specifications in the industry rather than going by any other criteria or mandate. So far the brand of Steelco is concerned, it is already a known brand within the industry and the key players down the line who act as the direct customers of the products sold by Steelco are aware about the products as well as buy them. Thus it is clear that brand awareness is not required by Steelco. However, given that the new products have not been taken well by the direct customers of Steelco, the branding strategy needs a thorough relook so that both the existing products as well as the new products may be branded in such a way that demands for both these product lines may be augmented. In this regard, in order to take a relook at the branding strategy deployed by Steelco, the first step could be to analyse the existing branding strategy as well as activities of the firm. To this end, the concept of POP and POD comes into play. Kotler (2007) has noted that points of parity or (POP) refers to those associations that are not essentially unique to the brand, however these points may overlap with other brands. He has further noted that the concept of competitive points of parity holds that the associations that are designed in order to negate the points of difference of the competitors. On the other hand, Keller, Jacob and Parameshwaran (2011) have been of the opinion that points o difference are attributes or benefits that consumers strongly associate with a particular brand and are even of the belief that the particular point cannot be found to the same extent with any other brand available. In this context, Steelco has already gone by the typical routes of business to business marketing as well as brand building activities. Their awareness about the new product program has included informing about the latest development at their end to their customers through

Tuesday, November 19, 2019

Application of constructivism theory in French Mali intervention Essay

Application of constructivism theory in French Mali intervention - Essay Example Mali faced some civil conflict since January 2012. Northern region of the country, Azawad, majorly occupied by the Islamic believers have been fighting for independence from the Malian government. The rebellious troops, dubbed The National Movement for the Liberation of the Azawad (MNLA) fought the government to liberate Azawad and make it for Tuereg people, and three months later, the troop had taken over the region. The conflict sparked the coup of President Amadou Toure, and another troop dubbed CNRDR took over the nation before suspending the national constitution. Mali became unstable and the rebels took charge of major Malian cities. MNLA was supported by several Islamic militias, and after the MNLA conquer; Islamic laws were introduced in the Northern region of Mali. Later the Islamic and MLNA developed some conflicts. The government sought help from foreign nations to resolve the insecurity and instability in the country, and by January 2013, French military launched some ope rations against the Islamic militias. The operation was successful, since the Malian military took over from the Islamic militia a month later. History indicate that The French military took active role in the fight against the Islamic troops but trained the Malian military on advanced and effective war and defensive tactics, until they took over. The French Military applied the constructivism theory, also called learning theory to train the Malian military. This work is about the application of the constructivism theory in training the Malian troops by the French facilitators and boosting Malian national security. Mali’s national security was compromised when some Islamic rebellious troops launched several attacks in the Northern Mali in 2012 (Cole-Turner, 2001). The French being the former colonial master of Mali were the first to rescue the situation since the country would have turned into a hostile war zone. The first mission was to train the Malian national defensive te am on the application of modern military technologies to fight the religious militia. Constructivism Theory The theory implies that humans apply newly learned knowledge together with prior experience to undertake any duty or make effective decisions. It comes from the word ‘constructs’ which means a special kind of filters in the human body system which carry certain knowledge and tend to change human reality from a certain state of confusion to some kind of order. The constructivism theory has some ties with cognitive as well as biological human systems. The theory is applied in several fields of learning. For instance, it helps pass or grasp some knowledge in experiments, discovery learning, as well as project and task based trainings. This work is about the application of the constructivism theory in training the Malian troops by the French facilitators and boosting Malian national security. Mali’s national security was compromised when some Islamic rebellious troops launched several attacks in the Northern Mali in 2012 (Cole-Turner, 2001). The French being the former colonial master of Mali were the first to rescue the situation since the country would have turned into a hostile war zone. The first mission was to train the Malian national defensive team on the application of modern military technologies to fight the religious militia. The Constructivism theory was first applied in the early 20th century with some neuroscientists who believed that the main role of education is to increase societal knowledge. Experimental learning was encouraged since it tends to provide a practical platform to enable the learner add such knowledge to those learnt in theoretical class (Schein, 2011). The theory was to boost three basic elements of education namely thinking, reflection, as well explorations. The neurosurgeons lament that the theory was developed in certain sequences until it could be proved and applied in the society (Witte, 2007). Some

Saturday, November 16, 2019

Interview of a Presbyterian Church Member Essay Example for Free

Interview of a Presbyterian Church Member Essay The Presbyterian Church was founded during the 16th century during the Protest Reformation. Much of the teachings and philosophies began with John Calvin (1509-1564). Currently, the Presbyterian Church (USA), is based in Louisville, Kentucky and has about 2. 4 million members belonging to 11,100 congregations. The church also has about 14,000 ordained and active ministers. The Presbyterian Church belongs to the Presbyterian family of Churches which also includes the Reformed churches synonymous with the Calvinist tradition. In the U. S. A. , the first church was organized in 1706 and the first general assembly in 1789. The church as it stands today was the result of the reunification of the two main branches of the Presbyterian Church separated since the Civil War. The church has membership in all fifty states and Puerto Rico. 1) What sacraments do you celebrate? What rituals do you perform? Our church primarily believes in two sacraments – the sacrament of baptism and the sacrament of communion. These are the only sacraments mentioned in the Bible. The only rituals performed are baptism for newborns and for those who newly converted to the Presbyterian Church’ faith. We have no rituals, other than attending a Sunday service performed by a minister in the church structure by congregation. We celebrate our faith through singing oftentimes accompanied by the choir and a sermon delivered by the minister. 2) What are some of your most common traditions? The Presbyterian Church still practices what was started and rooted in the Bible’s teachings. We do have a general assembly that outlines our mission and goals for specific activities that the church members will undertake for a specified period of time. We abide by the decisions passed during the general assembly. We do missions inside and outside the country, more specifically in East Asia, Africa and other continents – wherever our mandates take us. We basically do preaching, teaching and healing – following Christ when he advocated for the poor, the hungry and the oppressed. 3) What beliefs distinguish your denomination from others? The Presbyterian Church (U. S. A. ) is distinctly a confessional and a connectional church, distinguished by the representation of elders-laymen and laywomen-in its government. Our church is also distinct in adhering to a separate religious thought known as Reformed Theology and a more â€Å"democratic† and representational church leadership that is now known as the General Assembly. 4) How was your church founded? Approximately twenty years after martin Luther King posted his list of 95 grievances on a Roman Catholic Church door in Wittenberg, Germany in 1517, a French/Swiss theologian name John Calvin refined the reformers’ manner and way of thinking about God and humankind’s relationship with God. This refined way of thinking became the basis for the foundation of the Presbyterian Church. 5) Who is the head of your church? The General Assembly meets and outlines the specific activities and guidelines for all its congregations to follow. The General Assembly consists of elders chosen by the people. The word Presbyterian means â€Å"elder† in Greek. The chosen elders exercise leadership, government, discipline and have responsibilities for the duration of the congregation. The body of elders elected to govern a particular congregation is called a session. According to the Book of Order G-6. 0302: â€Å"When elected commissioners to higher governing bodies, elders participate and vote with the same authority as ministers of the Word and Sacrament, and they are eligible for any office†¦The session is the smallest, most local governing body. The other governing bodies are presbyteries, which are composed of several churches; synods, which are composed of several presbyteries; and the General Assembly, which represents the entire denomination. Elders and ministers who serve on these governing bodies are also called presbyters. † 6) What is the role of women in your church? The Presbyterian Church adheres to the equal sharing of servitude as well as leadership to women. Women can serve as elders, deacons and head of committees. The first ordination women elders occurred in 1962 and the first ordained women ministers began as early as 1965. 7) Have you been a life-long member of your church? If you converted, can you tell me why? I was born to conservative Catholic parents. I was baptized as a Catholic but while in College, I joined a social service organization that provides services to the marginalized people in the rural areas. That was when I met a friend who introduced me to the Presbyterian way of â€Å"reformed thinking†. From then on, I closely read the Bible and everything that was taught to me since I was born, like John Calvin, I began to question. More discussions with my friend made me a convert. 8) What happens during a typical worship service? There are similarities and differences between a Catholic service and the Presbyterian worship service. The Catholic Church has prescribed a set of ceremony that begins when a priest would enter the church with his assistants or what we call altar boys. There is a set book of sermon that the priest goes over. There is also a time for communion. But in the Presbyterian Church worship service; there is more open discussion of the scriptures. The minister can provide insights and there is a more joyful environment to worship God and his teachings. The ambience is so much different. Presbyterian Church members sing their praise to God. There is no â€Å"nagging† ceremony and no confessional to attend to before partaking of the â€Å"Body of Christ†. A Sunday worship is determined by the pastor, and the session, the church’s governing body. It usually includes a combination of prayer, music, Bible reading and a sermon based upon scripture. There is also a personal response and offering and community concerns are shared as part of the worship process. 9) Do you believe those from other faiths can have salvation, or go to heaven? Yes, it is possible. John Calvin believed in predestination. We chose God because he chose us first. Hence, we cannot judge who among us will be saved or who will go to heaven because that is a judgment reserved for God only. He alone knows who will be saved. 10) What are your views of the afterlife? I believe that there is life after death but only by the grace of God and through faith. 11) How does your faith interpret the Bible? For Presbyterians, the Bible is the means by which we, as Christians can come to understand the presence of God since the beginning of time. By understanding and learning the scriptures, we can then know of God’s love, eternal goodness and constant forgiveness of our sins. 12) How often does the church call upon you to pray? How often do you pray each day? The church exhorts church members and believers to pray as much as we can – either by praying aloud, in community with others or as much as we need to. It basically depends how much an individual’s needs. 13) What does the Presbyterian seal mean or symbolize? The church seal is the symbol of the church heritage, identity and its mission. The symbols embedded in the seal are the cross, Scripture, dove and the flames. The more prominent symbol in the seal is the cross. It represents the love of God through Jesus Christ, through his sacrifice and resurrection. 14) What are your views on abortion, alcohol, and capital punishment? The 217th General Assembly of the church clarified the position on problem pregnancies and abortion. The position paper basically states that the matter of abortion is ultimately the woman’s decision. The church though appeals to all members of the church to surround problematic women contemplating decision on a problematic pregnancy with love and support. The church clarified further that on matters of health concerns that is complicated by pregnancy; they encourage the safe delivery of both the mother and the child (during late term pregnancies). With regards alcohol consumption, the general assembly of the church â€Å"does not advocate the prohibition of alcohol, a policy which would appear to attribute the entire problem to alcohol itself. Responsible and non-problematic uses of alcohol have been part of human experience and the Judeo-Christian heritage since the beginning of recorded history†¦Ã¢â‚¬ ; however, the church advocates voluntary abstinence from alcohol consumption. With regards the issue of capital punishment, the most recent statement in 1985 reaffirmed the church’s position on its continuing opposition to capital punishment. 15) What are your views on sin and do you believe that God punishes humans for sins they commit? Humans are born to err and sin. But the God that I know is not vengeful. God is a forgiving God that bestows forgiveness even to those who err in their ways. The repercussions of our actions or sins on earth are enough punishment for us humans. As a conclusion give a paragraph reflection of the denomination as well as a contrast/ comparison between this denomination and Catholicism. In conclusion, the Presbyterian Church as â€Å"refined† by the studies of John Calvin deviated and differed from the Catholic Church in a lot of ways. These are as follows: 1. Presbyterians do not have a single head of Church. We do not have a pope. We have a congregation or assembly of elders whom our communities of members have chosen. 2. We do confessions by ourselves and believe that through the grace of God, and through submission of our confessions to God, we are forgiven. The Catholic Church requires confession of an individual to a priest. 3. Women are treated as equals and can be equally ordained as ministers and chosen as an elder. 4. The interpretation of the Bible is not â€Å"mystically† interpreted but through careful analysis and through scholarly studies. 5. Prayer and worship is done either individually or in community with other Presbyterian Church members – in joyful celebration of the grace and love of God. Works Cited: [1] Presbyterian Church website (USA) http://www.pcusa.org/

Thursday, November 14, 2019

Scarlet Letter :: essays research papers fc

Scarlet Letter In Hawthorne’s, The Scarlet Letter, life evolves around a rigid and harsh Puritan view. In this society people are not free to express themselves as well as they are today. This is very sad because it is a necessity for humans to be able to express their deepest thoughts and desires. Unfortunately the Puritan society did not permit this so people had to find other ways to satisfy their needs. For two of these characters the satisfying of their urges condemn their fate in life. Hester and Dimmesdale, a reverend, have an affair, which costs Hester life, as she knew it. The only place where these two people were free was in the confinements of the forest. As much as freedom and confinement is a paradox it makes perfect sense. You will gain the freedom of expression in the confinement of that expression. The forest was the only place this could be accomplished. The forest was Hester and Dimmesdale’s sanctuary throughout the novel because they could freely com municate their love, their sin, and their future plans. Being able to confess to someone a sin you have committed is one of the finest feelings. The forest provided that ability to Hester and Dimmesdale. At one point Hester comes right out and brings up the committed sin. â€Å"What we did had a consecration of its own. We felt it so!† (pg. 179) When Dimmesdale first hears this bold statement he is somewhat distraught and tells Hester to â€Å"Hush!† and then he realizes the freedom they have. â€Å" May God forgive us both! We are not†¦the worst sinners in the world.† (pg. 179) There is no way that Dimmesdale would have become this bold if he were in spectacle of the Puritan society. Once again a warm blanket that the forest lay upon Hester and Dimmesdale. It is apparent that there is a mutual love between Hester and Dimmesdale. Although there are very few quotes which will directly state this fact there are many that will allude to this obvious fact. At o ne point Hester begs for Dimmesdale’s forgiveness and he grants it to her. I don’t think he grants it to her because of his religious beliefs but because he loves Hester. I also don’t believe that Hester would be so worried about Dimmesdale’s forgiveness if she did not love him. â€Å" ‘Though shalt forgive me! Though shalt forgive†¦ Will though yet forgive me?

Monday, November 11, 2019

Practicing the Democracy in the Philippines

How does People Power became a bad habit? How does Edsa 3 fail? Where does President Marcos fall short when there are many people tell that he was a good leader in terms of economic development? Was he corrupt? Why Benigno Aquino focuses on â€Å"assassination† on his interviews? Why was Benigno Aquino be the first to get off to the airplane? Why there was no bodyguard to take care of him? Did Ninoy know that he will soon die? Was it sacrifice? Why does he need to do that so? When people don’t like the operation of the government, they just go out to the office and shout. Rebellion against the government is what will happen. This is what we call People Power. When thousands and even millions of people grouped together to commit one common goal – a big changes can happen, Changes in the government, administration, community and also â€Å"position†. All can change but not the attitude of every Filipino. Honestly, For me, We Filipino are lazy, We only think is ourselves. We don’t know how to cooperate with the leaders. We don’t give our trust. Instead, We are â€Å"Juan Tamad† waiting for the guava fell from the hand of our leader. We don’t know how to work for ourselves. We always want help from the government and that is what the government is offering to us but we don’t give any help in return. Why do we always put our anger to the president? The president could not monitor each one of us that is why we have a respected leader in our respected place. We can be a leader in ourselves. All we need is discipline and the word of God to govern us. While I was walking in gastambide Street last night, I saw some student throwing garbage in the street. I felt madness. Our leader will not go there to pick it up and put it to the garbage can for them. Laziness. I heard the one said, â€Å"sus! May magwawalis naman jan. † I got angry, but I can’t speak. Don’t they have discipline? Don’t they have an ethics class? Do they know about ethics? Yes, they have freedom to throw it there but they must not forget that there is a rule. Democracy was granted to us with the help of the Aquinos but we must not forget our responsibility. A â€Å"lack of help† turns to anger, making people march out to Edsa. Laziness. Let us differentiate Filipino from Chinese. The answer is already there. Poor become more poorer and richer become more richer. We Filipino give so much dependence to the government where in fact, we can do it alone and share it with others. All because of laziness. This attitude makes People Power a bad habit. It’s like saying, â€Å"Ang gusto ko ibigay mo, kung hindi paalisin ka namin dyan sa pwesto mo. † It is saddening to note that it is a wrong practice of democracy. People Power is not Rebellion and not even rally. Nowadays, It is used to commit power and it is so sad. While doing this report, a news in a television got my attention. It was about the killing of the journalists. They were asking, where is democracy? I look for the meaning in my dictionary, it says,†Democracy is a form of government by the people through elected representatives. † A certain site from the Internet says â€Å"Democracy is a political government either carried out by the people (direct democracy), or the power to govern is granted to elected representatives†. Simply for me, it means freedom, the power is for people. Now, I understand. Former President Ferdinand Marcos took his responsibility carefully. He was an intelligent man. He knows how to speak to the different kinds of people in the society from elite to the poor. He had many plan to put this country to the top. But this plan turned him to a greedy one. But what was the problem? FM forgot about democracy. He forgot to appreciate the capabilities of others to lead and instead he depended on his own knowledge and skills. He forgot the rights of the people and instead he became a dictator. That was a big problem for a country that practices democracy. Even the right to vote – the simplest form to practice democracy in this country was taken. Because of that, A brave man named â€Å"Ninoy Aquino† decided to make change. This man sacrifices his self to open the eyes of every Filipino to fight for their rights. He said that â€Å"Filipino is worth dying for†. A dramatic quote which make me feel proud of being a Filipino. Why wonder I typed â€Å"I am proud of being a Filipino† in my friendster, facebook and multiply account. Every Filipino knows what â€Å"L† signs mean, Yellow Ribbon, Ninoy eyeglasses, yellow shirt. I hope that these are not only a trend to Filipino Fashion but rather I hope that every Filipino will use it to hold and to preserve the good things that Ninoy and Cory did. I am not forcing everyone to vote for Noynoy but I am hoping that if Noynoy wins, Nonoy will do the same to promote democracy for I believe Like father, like son. He grew up to the family who fights for democracy and I am hoping he will do the same. Looking back to the Edsa People Power days, I was really amazed to see millions of people fight for freedom. I am wishing that millions of people will work also for the benefit of our country and I hope our leaders will cooperate. It is so dramatic to watch the part where people and the soldier joined together. I Thanked God for having Cory and Ninoy for our country. If only I was born back then, I will also march up to Edsa to fight for democracy. There is a feeling of patriotism in me while watching that documentary. I really appreciate what Ninoy, Cory and the rest did. God granted democracy to us with the help of these people. We have to use it wisely. We must practice it rightly and we must not forget our duty and responsibility. We must not forget the people behind this movement. From Rizal to Ninoy to Cory and to the future hero. Let us not forget what democracy means hoping to preserve these people and Edsa not only to a page in history books but also within our hearts and warriors will lead that.

Saturday, November 9, 2019

Assignment: Economics Essay

1. Economists in Funlandia, a closed economy, have collected the following information about the economy for a particular year: Economists also estimate that the investment function is:  where r is the country’s real interest rate, expressed as a percentage. Calculate private saving, public saving, national saving, investment, and the equilibrium interest rate. Please note: national savings is not related to the interest rate, which means that the supply curve for loanable funds is vertical. (15 points) Private Savings= Y-T-C 10000-1500-6000= 2500 Public Saving= T-G 1500-1700= -200 National Saving= S=(Y-T-C)+(T-G)=(10000-1500-6000)+(1500-1700)= 2300 Investing= I=Y-C-G 10000-6000-1700= 2300 Real interest rate I = 3,300-100r , 100r = 3,300-I 100r = 3,300-2300 ( I=2300) 100r = 1000 100r/100 = 1000/100 (dividing it by 100) r = 10 2. In the summer of 2010, Congress passed a far-reaching financial reform to prevent another financial crisis like the one experienced in 2008-2009. Consider the following possibilities: a. Suppose that, by requiring firms to comply with strict regulations, the bill increases the costs of investment. On a well-labeled graph, show the consequences of the bill on the market for loanable funds. Be sure to specify changes in the equilibrium interest rate and the level of saving and investment. What are the effects of the bill on long-run economic growth (recall: higher investment would increase capital and capital per worker)? (7 points) i. The demand loanable would decline along with the equilibrium. The saving and investments will decline as well hence giving the economy a lower rate for the future. ii. b. Suppose, on the other hand, that by effectively regulating the financial system, the bill increases savers’ confidence in the financial system. Show the consequences of the policy in this situation on a new graph, again noting changes in the equilibrium interest rate and the level of saving and investment. Again evaluate the effects on long run growth. (7 points) i. The supply of loanable funds would increase. The interest rate will decrease while the savings and investments will increase. Which will let the economy growth for the future, ii. Problems for Chapter 14 3. According to an old myth, Native Americans sold the island of Manhattan 400 years ago for $24. If they had access to a financial investment that yielded an interest rate of 7% per year, how much would they have today? (8 points) a. (1.07)^400 x 24= $13.6 Trillion 4. For each of the following kinds of insurance, give an example of a behavior that can be called moral hazard and another example of behavior that can be called adverse selection: a. Medical insurance (6 points) i. A sick person is more likely to apply to medical insurance compared to a healthy person. Meaning it’s an adverse selection. A healthy person may get health insurance too but now he may less likely to take care of himself, this would be a moral hazard. b. Car insurance (6 points) i. A risky driver is more likely to apply for car insurance, this would be an adverse selection. Or once a driver has insurance, they may be driving more reckless, this would be a moral hazrd. 5. For each of the following pairs of bonds, which bond would you expect to pay a higher interest rate? Explain. (5 points each) a. A bond of the US government or a bond of an Eastern European government i. Eastern European because non-US bonds will include risk premiums and also have higher interest rates b. A bond that repays the principal in 2015 or a bond that  repays the principal in 2040 i. 2040 because higher maturity requires higher interest rate. c. A bond from Coca-Cola or a bond from a software company that run in your garage i. The software company due to not being well known so it would be a higher interest rate. d. A bond issued by the federal government or a bond issued by the state of New York i. Definitely federal government because they are not tax-exempted compared to municipal bonds 6. When company executives buy and sell stock based on private information they obtain as part of their jobs, they are engaged in insider trading. a. Give an example of inside information that might be useful for buying or selling stock. (6 points) i. Information on new products or any government involvement that may affect the firm b. Those who trade stocks based on inside information usually earn very high rates of return. Does this fact violate the efficient markets hypothesis? (6 points) i. Who does trade with inside information is not violating the efficient market hypothesis. The hypothesis includes all available information about the future of the firm. Inside information is not available to the public meaning the price of the stock doesn’t reflect this. c. Insider trading is illegal. Why do you suppose that is? (5 points) i. It’s illegal for sure due to the fact that it gives others an unfair advantage over everyone else who doesn’t have access to this. 7. Jamal has a utility function , where W is his wealth in millions of dollars and U is the utility that he obtains. a. Graph Jamal’s utility function. Is he risk averse? Explain. (7 points) i. 1. He is risk averse because of his chances of getting more money for more risk. b. In the final stage of a game show, the host offers Jamal a choice between: i. $4 million for sure ii. A gamble that pays $1 million with 60% probability and $9 million with 40% probability Should Jamal pick choice i or choice ii? Hint: evaluate the utility that Jamal would expect to receive in choice i and choice ii. Jamal would expect to receive utility in the amount of the weighted average of the possible outcomes, where the probabilities are the weights. (7 points) E(Utility) = 0.6*U(1000000) + 0.4*U(9000000) = 0.6*0 + 0.4*1 = 0.4 Jamel should pick option one because he has a only 40% in order to get the 9 million but it might not worth it because he could end up back at 1 million.

Thursday, November 7, 2019

Zombie Land Essays - Masculinity, Social Constructionism

Zombie Land Essays - Masculinity, Social Constructionism Zombie Land Dexter Smith English 011 17- April-2013 Zombie Land From the article Modern Masculinities, The author Cooper Thompson explains that men in society are expected to be physically strong, tough, independent, and have self-control over their emotions. He also believes that boys must learn to accept their vulnerability of asking for help and support in appropriate situations. Modern Masculinities relates to the movie Zombieland because it deals with masculinity in relation to zombies and staying alive. This movie challenges the stereotypes of masculinity in American culture by showing young viewers that they should not be defined by masculinity but instead define it. In the movie Zombieland, Columbus and Tallahassee have different ways of showing masculinity. One way Tallahassee shows his masculinity is through toughness. For example, in one scene, Tallahassee punches Columbus at the Native American store after Columbus considers spraying perfume at him. The way Tallahassee looks with his brown cowboy hat, black tight jacket, his blue loose pants, and a mean face shows that Tallahassee does not put up with shenanigans. Tallahassees masculinity ties with Modern Masculinities because he is more aggressive and outgoing. Cooper Thompson challenges modern masculinities with this topic. The way Columbus shows his masculinity is more cautiously. For example, from the beginning of the movie to the end, Columbus creates himself 33 rules to follow to survive in Zombieland. The way Columbus looks with his purple jacket, brown corduroy pants, and a face that looks scared shows that he is a nerdy boy. Columbus does fit with this article because he is more sen sitive when he deals with other people. Also, Columbus thinks before he takes action, and he is always asking for help when he needs it once he comes to a conflict. Cooper Thompson was challenging the stereotype of a man in the article suggesting that by instead of taking action, start asking for help and support. These two characters show different masculinities that Cooper Thompson discusses in the article. Next, the zombies change Tallahassee and Columbuss masculinity when they are being attacked by them. In the beginning of the movie, Tallahassee is an angry, violent guy with no emotion. He hides his emotions from Columbus because he does not want to show them. Towards the end, he starts to show his emotion about his son right after Columbus kills Tallahassees favorite movie star, Bill Murray. On the other hand, with Columbus, he changes from being a softy to a bad ass. For example, in the beginning of the movie, he starts to run away from the zombies because he is too scared to kill. Also, he uses his own rules to protect himself. Later on in the movie, Columbus meets a girl named Wichita. He falls in love with her, but she is very destructive. Columbus starts to turn into a bad ass when he faces his fear and goes through the haunted house at the amusement park with all the zombies running behind him. He starts shooting them and ends up risking his life to kill a husky zombie clown. At the end of the movie, Wichita and her sister Little Rock go on the drop ride at the park, and they get attacked by zombies. After Columbus recues Wichita and Little Rock, he gets a kiss from Wichita for a reward. The movie Zombieland sends a message to young men that they should not be defined by masculinity but instead defines it for himself. The characters in the movie shows their masculinity when the zombies trying to attack them. Columbuss starts himself of being a loner and provide. Later on in the movie he became more masculine when he meets Wichita the girl he likes. Tallahassee starts himself as being a tough, angry guy with no emotions. He always kept bad things to himself. Towards the end of the movie he starts to open his emotion to Columbus about his son and changes his attitude. To sum up, men should learn how to be vulnerable and have self- control. Also, men should talk with someone about their problems instead of holding their issues in and becoming disruptive. The movie Zombieland shows viewers that they do not always have to be the masculine man. They

Monday, November 4, 2019

U06d2 Market Competition Essay Example | Topics and Well Written Essays - 500 words

U06d2 Market Competition - Essay Example Considering the health care industry, it is clear that the level of competition and the type of competition is very different when compared to that in other industries. The health care industry revolves around the services that it provides to the customers and the industry as a whole is very customer centric. The competition in this industry is more impacted by the external environment that it operates within and the healthcare environment as a whole (Teisberg & Porter, 2006). There is a direct impact on the healthcare industry from all the industries and also from the external environment as a whole. The competition in this industry is based more on the type of changes that the organizations are able to make to themselves and how the organizations are able to adapt to the needs of the people. Unlike the other industries, here in this sector, if an organization is unable to change and adapt to the changes in the markets, then the organization will be faced with instant downfall and the resistance will lead to loss of customers and clients in the market. Also considering the healthcare industry where the use of technology is so high that each day new and improved products are introduced to the markets. The competition in this market can be good to some extent. However concentrating on people who come from a relatively lower financial background and cannot afford to pay for expensive treatment, this can be a deal breaker (Swayne, Duncan, & Ginter, 2009). However, if the industry is looked at without concentrating on the different strata of people, then it is best and most effective that the industry is flooded with high levels of competition and development. Competition in any field is very effective as it allows everyone to realize their strengths and weaknesses and work on improving their weaknesses to strengths. This improvement will not only

Saturday, November 2, 2019

Managing Aircraft Maintenance Projects Successfully Research Proposal

Managing Aircraft Maintenance Projects Successfully - Research Proposal Example Regulations and common sense both mandate that each aircraft be the subject of a fully documented maintenance protocol towards ensuring the airworthiness and serviceability of the aircraft. Routine preventive maintenance, although well within the purview of common sense, is not a required part of the maintenance protocol. Within the aircraft maintenance protocol, each aircraft and the work required for its service is regarded as an individual project. The reality of aircraft maintenance project management (AMPM) is that several overlapping projects must be managed simultaneously. This presents major obstacles and difficulties for the aircraft maintenance organization in terms of resource management and utilization, budgetary constraints, priority conflicts and lead-time fulfillment. These considerations are compounded by several factors. Greater demands are being placed on aircraft as the number of passenger miles being flown trends upward over time. The number of aircraft being flown also trends upward but at a disproportionate rate. More importantly for the proposed research, the number of aviation maintenance technicians in the industry trends upward at a much lower rate, suggesting that the workload placed on maintenance technicians per capita is becoming ever greater. Air Transport Association o f America statistics for the 12-year period from 1983 to 1995 gives these increases as 187%, 70% and 27% respectively, supporting the ‘work overload’ factor of AMPM. Baron (2009) discusses at some length untoward events that can be attributed directly to the effects of fatigue experienced by aircraft maintenance personnel, and so to the project management practices of their working environments. It is important to note the finding recounted by Baron from a study conducted by Johnson et al in 2002. Based on quantitative and qualitative data, those authors discerned that in general, AMTs and AMEs working in aircraft maintenance services were