Saturday, August 31, 2019

Bendix Case Study

The Bended Corporation is a parts supplier for five separate business units: automotive, the Frame Corporation (filters), aerospace, industrial and energy, and international. In 1951, the Bended Corporation is credited with the invention of electronic fuel injection (EFFIE) and was in sole possession of the accompanying patent until 1978. The company had not utilized this innovation to its fullest potential due to the lack of interest in automotive manufacturers in the United States.In 1976, Douglas Crane, president of Bended Corporation's automotive division, was mulling ever the idea of embarking on the construction of a $10 million injector manufacturing plant, the main component involved EFFIE. Major Problems and Issues There are many problems facing Bender's customers in 1976, the first and most predominant being government regulations. The government has been tightening and tightening the control over pollution levels in automotive emissions as well as minimum gas mileage requi rements for each manufacturers' fleets.The major car manufacturers were unable to meet these requirements with their current fuel delivery system technology. These demands put added pressure on Bended to revived a solution in order to provide future success and to create a competitive advantage. Another major problem facing Bended was competition from a Busch, a company that Bended earlier had made an agreement with to use Bender's EFFIE technology to manufacture for the European market. Busch was planning on creating a manufacturing plant in the United States, threatening to take away some of the market share away from Bended.Another issue facing the implementation of EFFIE into the American automotive market is the phenomena that affect innovation in a large corporation. The phenomenon is that with larger economies of scale, the less the many is willing implementing a radically different solution to an old and well- known problem. The company is more willing to improve processes w ith their innovations, and then to create a whole new product line. The implementations of product innovations are more common in startups than in well-established firms such as Bended.This phenomenon can explain why EFFIE was put on the back burner and never utilized fully. [1] Possible Solutions There are three possible scenarios for the Bended Corporation when it comes to the new injector manufacturing plant. The first is Bended could build a new state of the art facility. The contract between Busch and Bended allowed them full disclosure, and each company shared their technologies and processes. Bended had a man spend several months studying the methods Busch was using in their production of injectors.The lessons that were learned during this time can be used to make a plant using new technology Second, Bended could restructure an existing facility to produce injectors. This remodel would take less time and cost less than building a brand new facility. Bended tried this strategy when they started producing their own electronic control units (CEO) by adding production to their radio manufacturing facility. This initial failure was remedied when Crane took control over the SEC production and got the right team together in order to meet a contract with Cadillac.Lastly, Bended could cancel the new facility and supply the injectors from an outside firm. This strategy that Bended used early in its EFFIE production. Although it does not contain the capital costs of tooling and/or building a facility. This solution has the issue that the current suppliers cannot meet the numbers Bended is looking to supply when/if EFFIE becomes the standard. Recommended Actions The issues that are facing the automotive industry are a factor that will change the environment for these companies causing them to have to make fundamental changes in fuel delivery systems.These changes will become an opportunity for Bended to pursue EFFIE as the solution for the future regulations and pe rformance standards expected by the American customers. For Bended to become a leader in EFFIE, they will need to have a competitive, and they will not be able to when they are supplying injectors from their competitors. Bended will have to become more vertically integrated by producing their own injectors and using the knowledge they have from their time observing Busch, they can produce them more efficiently and tit less waste. The action I would recommend for Crane to pursue is creating their own brand new injector facility.The facility will be able supply the future needs for EFFIE due to regulations. Bended will be able to compete and beat Busch in the market due to superior processes. To get past the phenomena such as stated earlier their needs to be a strong leader championing this endeavor and Crane has already proven himself with the SEC project. [2] Conclusion In conclusion, there are a plethora of factors outside of the control of the market such as government regulation and management phenomena inside a large corporation. A company can come up with a solution that may not useful at the time such as in this case.There was no need at the time for EFFIE at its invention because of the less stringent pollution and mileage standards but as time progresses EFFIE became a more and more plausible solution. Whatever choice Bended made, EFFIE is now standard on all cars and carburetors are a thing of the past. Bibliography [1] Abernathy, W. , & Turtleback, J. (2014). Pattern of Industrial Innovation. Innovation Management (1-9). Romania, NY: Lines Learning. [2] Schumacher, T. (2014, May 22). Gunfire at Sea. Youth. Retrieved June 16, 2014, from HTTPS://www. Youth. Com/

Friday, August 30, 2019

Mexican Drug War: Drug Trafficking and its Effects on Mexico

According to the National Survey on Drug Use and Health, and annual survey conducted by the Substance Abuse and Mental Health Services, estimated that were 19. 1 million people in the United States 12 years or older who were currently users of illicit drugs. There are about 14. 6 million marijuana users, 2. 0 million cocaine users, and about 166,000 heroin users in the United States. These statistics show that there is obviously a very high demand for illicit drugs in the United States despite its illegal status. The question that most people do not tend to ask is how is this demand being met?Who is supplying it and how? American users are supplied most of their drugs from Mexico, which is very conveniently directly south of the border of the United States. Mexico is a major supplier in heroin, marijuana, methamphetamine and cocaine. It is estimated that roughly 40 to 67 percent of all marijuana and about 95 percent of cocaine in the United States comes from Mexico. In order for all these drugs to be produced, organized, and transported to the United States there has been a creation of cartels and gangs in Mexico, which in turn has created what is referred to as the Mexican Drug War.Throughout the paper I will discuss the development of the organized drug game in Mexico, different drug cartels, government action and the effects that all of this has caused in Mexico. For a very long time, throughout the 1980s and early 1990s, the Colombians were the ones that controlled cocaine trafficking. Starting in 1975, Pablo Emilio Escobar Gaviria began developing his cocaine operation. Soon he became known as the king of cocaine and at his height of power he was fifteen tons of cocaine a day, worth more than half a billion dollars, in the United States.After enforcement increased in both South Florida and the Caribbean, the Colombian organized crime began to form partnerships with Mexico-based to transport cocaine through Mexico and into the United States. Mexican transpo rters were able to meet this need of reliable cocaine transporters because they already had infrastructure set up from their sourcing out of marijuana and heroin. Mexican transporters were given anywhere from 35 to 50 percent of each cocaine shipment. This allowed Mexican transporter to become involved in distribution as well, moving them  up to become full on traffickers.They soon became quite adept to trafficking globally, which allowed their organizations to flourish, most notably the Sinaloa Cartel and the Gulf cartel. Soon enough, Mexican traffickers took almost full control of trade, leaving Colombian organizations behind. The popular Mexican phrase, â€Å"Mas vale vivir cinco anos como rey, que 50 como buey,† which translates to â€Å"It’s better to live five years as a king than 50 years as an ox,† encapsulates the way many young marginalized people think in regards to drug trafficking in Mexico.Many believe that while they’re in poverty in marg inalized neighborhoods they would have more opportunities becoming a drug trafficker than their long-term outcome if they didn’t join. According to the short 8-minute video, The Roots of Mexico’s Drug Violence, drug cartels look to these marginalized or in poverty to recruit for this very reason. One of the major drug cartels in Mexico is the Sinaloa Cartel, based in the city of Culiacan, Sinaloa with operations in Baja California, Durango, Sonora, and Chihuahua.According to United States Intelligence, the Sinaloa Cartel is â€Å"the most powerful drug trafficking organization in the world. † The Sinaloa Cartel is estimated to smuggle several tons of cocaine shipments from Colombia through Mexico and into the United States. They also produce, smuggle, and distribute marijuana, methamphetamine, and heroin. The cartel is led by Joaquin â€Å"El Chapo† Guuzman and is estimated to have a net worth of about one billion dollars and is considered as the biggest drug lord of all time even surpassing Pablo Escobar.In 1993, Joaquin Guzman was sentenced to 20 years in prison in Mexico after being caught in Guatemala but was able to escape in 2001 by bribing prison guards. After escaping, Guzman had his eyes set on the city of Juarez, which was under the Juarez Cartel. Despite having an alliance with the Juarez Cartel, Guzman decided that he wanted to take out the leader, Rodolfo Carrillo Fuentes in order to gain control of routes around and throughout the city of Juarez. He succeeded in this by hiring Los Negros, assassins for the Sinaloa Cartel, whom killed both Rodolfo and his wife.By this, the area was no longer under the Fuentes family’s control. Unfortunately, this led to a countrywide drug war, which resulted in 5,000-12,000 deaths in drug related violence. At this point, Guzman had angered the other cartels since he had broken the nonaggression â€Å"pact† between all the major cartels, bringing upon the fighting between c artels for drug routes. By 2006, it was estimated that about 50,000 people lost their lives in drug related violence. Another prominent drug cartel in Mexico is Los Zetas, which partnered with the Gulf Cartel in Matamoros, Tamaulipas.In the late 1990s, The Gulf Cartel hired a group of 31 corrupt former elite military soldiers to work with them. It is believed that many of them had received training in commando and urban warfare from Israeli’s Special Forces and American Special forces units. With this training they learned skills such as ambushes, fast deployment, marksmanship, intimidation, and counter surveillance. Throughout the early 2000s, the Zetas were incredibly important in the Gulf Cartel’s domination of the drug trade. It is uncertain whether the Gulf Cartel or Los Zetas began the disagreement that eventually led to their end of partnership.What did solidify the Zetas’ ability to strike out on their own was being able to arrest and extradition the Gul f Cartel leader, Osiel Cardenas Guillen. It had become clear that the Zetas beat out the Gulf Cartel in revenue, membership, and influence. The Zetas began to work in other areas of organized crime on top of drug trafficking, including, extortion, kidnapping, homicide, and theft. By early 2010, it was made known to the public that the Zetas and the Gulf Cartel were no longer working together and instigated a bloody drug war amongst each other for the Northeast Mexican drug trade routes.Eventually, because of cartel alliance, the Sinaloa Cartel was forced to fight the Zetas in 2010 and 2011. One of the cartel’s most notorious acts was the 2010 San Fernando massacre. Most Spanish speakers in the United States had heard about this act since it was widely reported on by Spanish media. The Zetas had a mass murder of 72 undocumented immigrants in San Fernando, Tamaulipas. 58 men and 14 women, from South and Central America were shot in the back of the head and then piled on top of each other.There were only three survivors- one of which was shot in the neck and face, faked his death and then eventually made it out and tried to seek military help. Once they were informed, the Mexican Military confronted members of the drug cartel and found them inside of a ranch. According to the article, â€Å"Migrants Killed for Refusing to be Assassins, Teen Says,† the Zetas gunmen â€Å"intercepted the migrants as they moved towards the border, then took them blindfolded to the ranch where they were told to hand over cash. † The immigrants were unable to pay the amount demanded by the Zetas and also refused the deal to work with the Zetas.Once they refused to do either, the Zetas opened fired killing everyone but three lucky survivors. Inter cartel violence had always occurred before the Mexican drug war but the government had a very passive approach to dealing with it through most of the 1990s and 2000s. It wasn’t until December of 2006, as the new Pr esident Felipe Calderon undertook Operation Michoacan and sent about 6,500 military troops into the state. This was seen as the first huge undertake to fight organized crime in Mexico since the drug trade began and is regarded as the beginning of the â€Å"war† between the Mexican government and the powerful drug cartels.President Felipe Calderon is quoted saying that the cartels are seeking ‘to replace the government’ and ‘are trying to impose a monopoly by force of arms, and are even trying to impose their own laws’. The war against organized crime continued as another 45,000 troops were sent in the following months. According to the Secretary of National Defense, the Mexican military captured 11,544 people in 2011 who were thought to be involved with drug related crime. Despite Calderon’s intentions to decrease violence throughout Mexico, the opposite has seemed to happen. Violent warfare between rival cartel leaders has actually worsened.C alderon’s methods of confronting the drug cartels directly, has resulted in a lot of public killings and torture from the cartels and also government forces. Also, as a drug cartel leader is removed from power, there is more intense, violent competition for that leadership role. It is also believed that cartels have corrupted and subverted military at high levels. All of this has created more anxiety and fear within the Mexican population due to this increased violence and the possibility that their own lives may be in danger. Other areas such as journalism and media were also being threatened.At the beginning of the 21st century, Mexico was considered the most dangerous country in the world for journalism. Many journalists have been murdered and tortured for giving out information or reporting on certain things. So the question is, how can these issues be fixed? Many believe that the violence will not end entirely but instead seek for the country to regain normalcy and not b e entrenched in this idea of violence as something normal. Another idea is demand- the reason there is such a need for supply and transport of these drugs is due to the high demand in drugs.Research And Development also known as RAND Corporation, a nonprofit global policy think tank, found that using drug user treatment to reduce drug consumption in the United States could be up to seven times more cost effective than law enforcement. This could also potentially cute the drug demand by a third. I, myself as a Mexican have known people that have gotten kidnapped and never returned and it’s believed to be because of drug cartel violence. It is an urgent matter for those that live in marginalized or poverty for the fear and violence to be taken control of in Mexico.

Thursday, August 29, 2019

Swisher Mower and Machine Company (Smc)

RECOMMENDATION: Swisher Mower and Machine Company should reject the offer to produce the Private-Label brand. RATIONALE: †¢Standard Riding Mower contribution per unit would drop from $97 to $33. 98, which is $63. 02 per mower. (Appendix 4) †¢Contribution Margin would drop from 14. 92% to 5. 5%, which is 9. 42%. (Appendix 4) †¢Swisher Mower would only profit $62,819 from producing the 8,200 units in the Private-Label in the first full year of production. (Appendix 5) oProfit per mower is only $7. 66 per unit. Cannibalization of SMC current mower is ($29,000) loss from the private-label brand. Plus, the loss of additional smaller independent dealer in the future since there will be an overlap in trade areas. (Appendix 3) †¢SMC will incur additional labor cost on 2,450 units because the factory is already at full capacity. oThis results in additional $63,700 overtime labor cost, which is $7. 77 per unit. (Appendix 1) †¢With the increase in labor, materials, over head, and property tax, the additional variable cost is $30. 52 per unit. Appendix 1) oThis brings the total variable cost to $583. 52. (Appendix 4) †¢SMC will only be making $7. 66 per mower, and the company wants them to pay $22 per hour for any maintenance on a mower under warranty. Therefore SMC would have to sell 3 additional mowers to cover each hour work done to a mower under warranty. †¢The accounts receivable and inventory carrying cost for the private-label brand is $175,789. 97, $59,386. 73 and $116,412. 24 respectively. (Appendix 2) †¢The image of company would be altered since SMC would double their sales with one private-label product. Since the company has a reputation of being small and personal introducing the private-label could be detrimental to their current business. †¢Remain status quo and on average increase profit by 10% and continue to widen the breathe of the product lines, Trim-Max. APPENDICES APPENDIX 1 Incremental Cost for Private Label Direct Labor Cost $650 x 4% = $26 Additional Labor for 2,450 units = 2,450 x $26 = $63,700 / 8,200 units = $7. 77 per Unit Direct Materials Cost $650 x 1% = $6. 50 Additional Overhead $650 x 1% = $6. 50 Additional Property Tax $650 x 1. % = $9. 75 Total Additional Var. Cost = $7. 77 + $6. 50 + $6. 50 + $9. 75 = $30. 52 APPENDIX 2 Carrying Cost for Private Label Accounts Receivable A/R Turnover Rate = 365 / 45 = 8. 1 8,200 units x $617. 50 = $5,063,500 / 8. 1 = 625,123. 46 x 9. 5% = $59,386. 73 Inventory Inv. Turnover Rate = 5. 8 Average Inv. = 2,100 units Unit Cost = $583. 52 2,100 units x $583. 52 = $1,225,392 x 9. 5% = $116,412. 24 Total Carrying Cost = A/R + I nv. = $175,798. 97 APPENDIX 3 Cannibalization SMC mower = $650 – $553 = $97 Contribution Per Unit Units Lost = 300 $97 x 300 = ($29,100)

Politics and Justice in the US Research Paper Example | Topics and Well Written Essays - 1250 words

Politics and Justice in the US - Research Paper Example The United States of America has long faced the challenge of electing leaders who in a free and democratic manner. The US has one of the highest numbers of elected people in office with over 500,000 people being elected into different electoral roles. As a result, a lot of elections are conducted almost every now and then in the United States. The process of electioneering and its effect relation to democracy is that it does not assist in opening up democratic space in the United States. This is because the American democratic system is dogged by challenges such as parochialism, incumbency and fragmentation of decisions. The sheer number of electoral positions in the United States means that its citizens are constantly involved in elections which are not healthy for democracy (Dye, 2011). Moreover, the elected officials in the United States stay long in office and thus this provides a challenge brought about by incumbency. Incumbency does little in reforming the ideas and policies pr actised in the United States of America (Herbst, 2011). Incumbency does not reflect the wishes and the changing dynamics of the US population. Incumbency helps in stifling democracy in many areas of the United States of America and this is witnessed by Senators or Governors who occupy their offices for long periods of time. Democracy requires the proper functioning of organs of the government and this requires good decision making. ... Democracy requires the proper functioning of organs of the government and this requires good decision making. The Senate is one of the important organs of government since it is involved in making laws. However, due to constant wrangling and taking of different positions by law makers. We have a situation whereby ideals and policies are sacrificed since every party or group in the house of Senate take different positions (Dye, 2011). This is because Incumbency might in some situations lead to lack of party identity and formation of caucuses that differ from their own party. The high rate of incumbency has dealt a great deal of damage to democracy since people find to difficult to identify with their representatives. As a result, these elected leaders will take advantage of this situation to serve self interests. The fragmentation of decisions is detrimental to the process of law making (Reynolds, 2007). Since Senate house committees run the house and the process of law making. These committees take on issues on a local basis which is outside their mandate. As a result, the Senate has been reduced to a body that serves the interests of few individuals. For example, some senators might have been influenced by certain lobby groups to pass or rejects some bills beneficial to certain individuals or companies (Sinha, 2007). However, this is not the greatest hurdle facing American democracy since the biggest problem facing Americans is representation. Leaders elected in America have participated in democratic election albeit with difficult challenges. These challenges have undermined democracy since they are fundamental in the creation of equal opportunities for everybody as democracy

Wednesday, August 28, 2019

Security Issues Within Virtualization Coursework

Security Issues Within Virtualization - Coursework Example Citrix Systems, Inc. (2008, October). Citrix xenserver V5.0 and netapp storage best practices. Retrieved from CITRIX Web site: http://www.citrix.com/site/resources/dynamic/partnerDocs/CitrixXSNetAppStorageBestPracticesGuidefinal.pdf This article shows the best way to use NetApp storage systems and Citrix XenServer. It also speaks about the future of these methods in the furthering of virtualization. Although pushing their product, this article has good information. The great IT cost is reduced by the virtual desktop. The need to download extra software and patches are thing of the past according to this article. Since it was written in 2005, the author is full of promise for the virtual desktop, with no concern. This is important to show the attitude when the virtual desktop was new. This web site provides access to technology white papers and can provide me with an excellent source of information on the subject of virtualization. Most of the technology is being developed by well know vendors, having easy access to their technology white papers will help provide a reliable source for information. Ghodke, N. (2004). Virtualization techniques to enable transparent access to Peripheral devices across networks (Masters Thesis, University Of Florida, 2004). Retrieved from http://etd.fcla.edu/UF/UFE0005684/ghodke_n.pdf Many individuals get excited about virtualization without taking into account the security measures necessary to run virtualization without being hacked or interfered with by outside sources. This article informs about security measures needed. This article also speaks about security for virtualized environments. The authors did an empirical study into the security exposure to hosts of hostile virtualized environments. Their findings were very interesting and vital to my research. This article speaks about the unknown factors of virtualization. Mike Rothman believes that there are a number of potential

Tuesday, August 27, 2019

The Concept of Knowledge Management Research Paper

The Concept of Knowledge Management - Research Paper Example This research will begin with the statement that knowledge management refers to the process that organizations often use to capture, develop, share, and utilize the employees’ knowledge capital at all levels of the organization effectively. Organizational learning through knowledge management is a significant source of an organizational competitive advantage since multinational corporates must compete within complex and constantly shift business environments. Organizations can leverage knowledge management in their strategic operations, to make more informed decisions concerning how to organize their value chain operations to maximize customer satisfaction. Knowledge management enables organizations to improve their processes in terms of effectiveness, efficiency, as well as innovativeness, in the creation of value in form of quality products and services for customers. Avoiding wastage, sharing relevant best practices, and conducting corporate learning programs are ways throu gh which the firm can apply knowledge management systems in the sales, marketing, manufacturing, and production processes. Key challenges in the establishment of knowledge management systems within the organizations’ operational structure include the problem of acquiring, modeling, and retrieving, reusing, and publishing, as well as maintaining knowledge. Organizations today are continuously faced with a rapidly shifting global business environment, partly due to globalization and the fast-changing technological advancements, which prompts the need for leadership to respond fast to the increasing complexity and uncertainty. Enhancing the effectiveness and efficiency of organizational operations is positively correlated to the overall performance of the firm, and ultimately to the establishment of sustainable profitability and sustainability in the end. Organizations are increasingly adopting a knowledge-learning stance as their strategic approach to alleviating the numerous c hallenges in their operation chains, to achieve their objectives effectively and efficiently.

Monday, August 26, 2019

Succession planning Essay Example | Topics and Well Written Essays - 750 words

Succession planning - Essay Example This is because the company was prompted by the varying statistics of the workforce. However, in 1995, the company realized that most women who were successful to attain the vice president level were the white women. Out of these results, the company’s Chairman and CEO who was heading the company at that time used the leaders who were reporting directly to him to develop women of different races in order to be represented in the vice-presidents position. The leaders had big roles to play to develop and monitor workers from the minority groups, especially women from other races apart from the whites. The company ensured that women of other races benefited from all the succession planning process within the company. The structure of succession planning used by the company involved the following: First, it involves making a commitment. Individuals in the top management should be committed to succession planning. They should be prepared mentally to handle abrupt loss in the organization resulting from death, disability, resignation and retirement. Secondly, it involves assessing the current work requirement and competence of individuals. Those involved in decision making in the company should ensure the work to be done and the output requirement is clarified. Thirdly, individual performance should be appraised. A company should eliminate any existing barriers to individual performance and encourage them to do their best. This can be achieved through establishment of performance management systems. Fourthly, it involves assessing future requirements output among individuals. Those involved in the decision making should come up with necessary competences which will enable the organization to be suc cessful. The fifth step involves assessing individual potential. An organization should come up with ways of assessing what individuals are capable of in present and future

Sunday, August 25, 2019

Religion and Civil Rights Research Paper Example | Topics and Well Written Essays - 2000 words

Religion and Civil Rights - Research Paper Example â€Å"Jains believe that the universe and everything in it is eternal. Nothing that exists now was ever created, nor will it be destroyed† . On the other hand, Confucianism gives more importance to ethical practices in human life even though it keeps silence about life after death or God. â€Å"Each day I examine myself on three counts: whether or not I am loyal to those in whose behalf I act; whether or not I am trustworthy in my dealings with friends; whether or not I practice what is imparted† . Different religions have different beliefs, customs, rituals and Gods. Based on this diverse belief system, religions control the civil rights of people. The rights of one religion need not be the rights of other religion. Same way the wrongs of one religion need not be the wrongs of another religion. This paper analyses the civil rights based on the belief system in different religions. Hindu Religion and civil rights â€Å"According to historians, the origin of Hinduism da tes back to 5,000 or more years. The word "Hindu" is derived from the name of River Indus, which flows through northern India†3 â€Å"The foundations of this oldest surviving religion were laid by ancient rishis (sages), who taught their disciples the eternal principles of life they had discovered through their meditations†4. Hindu religion is often referred as the religion of Vedas and Dharma. (Dharma is the code of conduct of life principles). Anyone who practices Dharma can be considered as a Hindu. Different class system is prevailing in Hindu religion like Brahman, Kshathriya, Vaisya and Shudra etc. Brahman people got the rights to do the rituals in the temple whereas Kshathriya got the right to rule the country. Vaisya and Shudra belong to the working class. In short, civil rights of people in Hindu religion were not even earlier even though at present such classifications are meaningless. The greatest strength of Hindu religion is its respect to other religions. It believes in the doctrine of, â€Å"Sanatana Dharma† or Universal Truth. India is a secular democratic country even though of majority of the people in India is Hindus, because of the above Hindu doctrine. No religion is prohibited in India and people have the right to believe and spread their own religion. Buddhism and civil rights â€Å"The religion of Buddha began in 563 B.C. Buddhists believe in karma and rebirth. Karma determines in which form a person is reborn and rebirth is a second birth†5. The beliefs of Buddhism are slightly different from that of other religions. Most of the other religions believe in single God or multi God theory whereas Buddhists are more interested in karma and rebirth. According to their belief, human life consists of so many rebirths which will be ended once a person attains Nirvana. Karma or the activities of a person in his present life will determine the nature of his rebirth. Buddhists do not have belief in soul. For them, soul will be changing from one form to another based on the rebirths. â€Å"They called soul as "self† which is just a bunch of changing characteristics†6 . The belief of Buddhism is based on the four noble truths; â€Å"Life means suffering, the origin of suffering is attachment, the cessation of suffering is attainable and the path to the cessation of suffering†7. According to Buddhism, â€Å"If there were a creator of the world, he would be regarded as responsible for the suffering8. In other words, Buddhists see no chances of happiness in earthly life. All the human activities in this material world will ultimately end up in sufferings. Even if a person did nothing wrong in his present life, his activities in previous life may affect him in his present

Saturday, August 24, 2019

Genetically Modified Food Essay Example | Topics and Well Written Essays - 500 words - 1

Genetically Modified Food - Essay Example   This means the losses incurred by farmers and other people who are involved in the same can easily be averted. Research also goes to show that genetically modified food is also resistant to herbicides which natural food can never be. These are some of its advantages but there are disadvantages too which must be considered to make its case even.   Last year a laboratory study was published which showed that pollen from B.t. corn caused high mortality rates in monarch butterfly caterpillars. Monarch caterpillars consume milkweed plants, not corn, but the fear is that if pollen from B.t. corn is blown by the wind onto milkweed plants in neighboring fields, the caterpillars could eat the pollen and perish. Although the Nature study was not conducted under natural field conditions, the results seemed to support this viewpoint. Unfortunately, B.t. toxins kill many species of insect larvae indiscriminately; it is not possible to design a B.t. the toxin that would only kill crop-damagi ng pests and remain harmless to all other insects.   There are several unknown effects of consuming genetically modified foods; more research is being conducted in this field. Research thus far has found both pros and cons of consuming genetically modified foods.   Countless children succumb to hunger each day in Africa; the problem of malnutrition can easily be solved should human beings start using genetically modified foods. Malnutrition can be slowly but steadily eliminated should genetically modified foods be used on a daily basis.

Friday, August 23, 2019

International Market Comparison Assignment Example | Topics and Well Written Essays - 250 words

International Market Comparison - Assignment Example Nestle’ is one of the biggest consumer packed products firm in the planet that concentrates on augmenting the nutrition food value that, is consumed whereas raising the taste. The firm is categorized as health, nutrition, and wellness firm. Unilever and Nestle’ both concentrate on wellness and health, however, in place of concentrating on the precise wants of the end users like Unilever. Nestle’ concentrates on their corporate unit of wellness to bring full life and suitable food to all of their end users. This is to say that, they commit more effort and time into constituents of their products then the actual end user. The corporate unit of wellness is an international network that is internationally set to aid in endorsing nutrition value. Their policy is to ensure firms provide enhanced products that are suitable to the consumer. Unilever and Nestle’ vary in marketing since Unilever is glued to its profile as well as eliminated commodities, on the other hand, Nestle’ is generating and improving numerous of Nestle’ goods. The packaging employed by Nestle’ plays an immense function in their marketing. Every package encompasses a Nestle’ Nutrition Compass to demonstrate to buyers what they will gain if they buy the product. The philosophy of Nestle ’is that information on nutrition is not adequate. The compass contains three elements: Good to know; Good to remember; and Good to talk. Similar to Unilever, the marketing strategy of Nestle’ is focused on the future of their commodities. They are developing goods that will be focused on gestational matters, obesity, Alzheimer’s, diabetes and additional items that will be of benefit to wellness and health of the

Thursday, August 22, 2019

How unemployment is individual and social problem Essay Example for Free

How unemployment is individual and social problem Essay In this essay I will discuss how unemployment is an individual and a social problem and how Max Weber distinguished power, authority and coercion and how the functionalist, conflict theorist and symbolic interaction theory view the economy and by the mid century how they have evolved and the role of these theories to explain social and economic phenomenon. How unemployment is individual and social problem Unemployment is caused by many factors in a modern market economy. It can be caused by rapid technological change, business cycle or recessions, seasonal factors in some industries particularly such as changes in tastes and climatic conditions which affects demand for certain products and services, individual perceptions and willingness to work and search for jobs, their values and attitudes towards some jobs and about employers, accessibility for retraining and acquisition of work skills, willingness and perception of unemployed of the benefits of training and the possibility for them to get a job after the training even though they have a chance to get a job, discrimination in the workplace based on race, color. religion, ethnicity, age and class. It can be seen from the above causes unemployment in a particular period can be a combination of caused by social factors and how the economy as a whole works and also due to the subjective individual factors. In a sociological point of view according to functionalist and conflict theorists the unemployment is caused primarily by the social factors than by the individual factors. However according to Max Weber and symbolic interaction theories individuals construct their own social constructs and perception and they can be subjective in their behavior and there fore can become unemployed even though the actual condition they can get a job in the job market. In summary applying the sociological and the primary causes of unemployment unemployment is individual as well as a social problem in a market economy. As discussed above it is caused by the society as well as by individuals. Even the economy or societal factors are not present unemployment can be caused by individual perception and their own subjective behavior. . Max Weber’s distinction among power, authority and coercion Power can be defined as one person’s ability to influence others does what ever they want even though they don’t like to do what is demanded and they resist doing what is demanded. For example a professor can influence the students to assign work and demand them to do to satisfy some criteria. As well a dictator like Hitler can control all aspects of life because of this ability to impose his will on majority of people. In other words a person or group on other person or other groups can use power legitimately or illegitimately. That is power need not come from proper authority or legitimate authority. That is power and authority can be different in this respect. According to Max Weber authority can arise from tradition, charisma of certain powerful people or from legal-rational. That is authority need not come from any logical reason but likely to come from respect for the past. For example a monarchy in Western Europe can get authority because they ruled the populace over a long period of time. Even the traditional authority can exist in modern democracies because the people respect the monarchy or authority of monarchy at least in a limited symbolic head of states in Western Europe. Authority also can arise from charisma of some powerful people. They have authority because of their charisma. This arises because they have the ability to lead a vast number of people for a particular cause using their powerful charm and influence over ordinary people. For example Martin Luther King, Gandhi. Nelson Mandela is the modern examples of charismatic authority they had because of their ability to charm and influence a vast majority of people for a particular cause. Authority also can arise from legal-rational. That is in society authority is given to individuals and organization based on rationally enacted laws and regulations. This authority is impersonal and differs from charismatic authority because the legal-rational authority is impersonal and the charismatic authority is personal and admired by the people who accept that authority. In modern societies the authority is derived from the legal-rational compared to charismatic and traditional in varying degrees in industrialized societies in particular. Coercion is the extreme manifestation of power in a way threatens the person to complete obedience because it threatens the person coerced physically, financially and socially. This results in persons following the authority of another because of fear rather than will. Coercion is mostly linked with abuse and conflict. Coercion exists in many dictatorships in the past as well as in the present world in many parts of the world where citizens are forced to follow the regime of dictatorship. The view of the economy in the perspectives of functionalist, conflict theorists and symbolic interaction theory Functionalist perspective of the economy In the perspective of functionalist sociological theorist social systems including economy works like a biological organism where every part of the system work in a united manner so that smooth functioning is maintained and so that society builds consensus between different parts of the system.. In this change is evolutionary and the changes take place to minimize dysfunction and to enhance the stability and its survival in the future. In this respect Capitalism will not collapse and will endure in the future as the functions of the system will adjust and evolve so that it maintains the social order and stability without any radical overhaul of the economic system. In addition the social, legal, political, religious systems will not be in conflict with the economic system and work in unison with the economic system so the whole social organism survive and social order is maintained and their functions and their purpose even though different work as a unified system. As discussed above this is the functionalist view of the economy. Conflict theorist view of the economy In contrast conflict theorist believe society do not work as a unified system. Conflict and struggle take place as different groups work to maximize their benefit in the same time other groups loose. Functionalist view conflict in a negative manner. However the conflict theorist see the conflict to some extent is beneficial as it forces the parties to come to a common ground and make the economic system or the social system to change for the better and minimize the losers and maximizing the benefits for a greater number of groups as well make the power system in check so that abuse of power is minimized. In this context the economic system and social order changes continually and changes take place and shaped by different interest groups in varying degrees in a market economy. However Marxism as a conflict theory predicts radical change to the economic system to move towards a socialist system it has not eventuated. However Max Weber as a conflict theory predicts the viability of the market economy with some reform to minimize the negative aspects of capitalism like alienation and the negative impact of bureaucracy in capitalist economies and more democracy in society and continuous reform of the economic system to make it work efficiently but also effectively by legal, social and political reform appropriate to a countries historical, cultural, political and social context.

Wednesday, August 21, 2019

Peter Skyrznecki Essay Example for Free

Peter Skyrznecki Essay Our idea of belonging is a result of the choices that we make. We feel a sense of acceptance wherever we choose to belong. This is explored in Peter Skrzyneckis poem Feliks Skrzynecki and St Patricks showed the ides of alienation and belonging. They are shown through various techniques such as an allusion, direct speech and many more poetic techniques. Feliks Skrzynecki is a poem that shows a tribute to Peter Skrzyneckis father. Through the use of powerful and vivid imagery, the poet successfully conveys Feliks as a man who is comfortable, content and secure in his own identity. In this poem, concepts of belonging and not belonging occur within place, family, community and culture. The first stanza emphasizes the idea of belonging. Feliks sets standards of his own minds making. He is comfortable in belonging to his own world, his garden, family and cultural heritage. This is further emphasized through the use of the simile loved his garden like an only child which demonstrates the love he possessed for his garden. The garden can also be interpreted as Feliks constructed world: a place he escapes to in order to feel a sense of belonging. The garden is also the reward for his hard work. Skrzynecki’s poem ‘St. Patricks College’ displays how a sense of belonging is influenced by external forces. For someone to belong to something they must make their own decisions in life, understand their surroundings and build relationships with those around them. These qualities are lacked by Skrzynecki in ‘St. Patrick’s College’ which resulted in him not belonging. Skrzynecki was sent to this school because his mother was ‘only wanting, â€Å"what was best†Ã¢â‚¬â„¢. The direct speech is a cliche as every parent wants what is best for their child. The irony of the situation was that ‘for eight years’ sending Skrzynecki to St. Patrick’s College ‘Wasn’t â€Å"for the best†. He did not understand the ways of the school which led to his lack of belonging. The repetition of the phrase ‘for eight years’ reinforces how long the alienation and detachment lasted for, the feeling of not belonging did not change for eight years. The use of the personal pronoun ‘I’ throughout the poem gives a dreary, detached tone which emphasises his loneliness. No relationships with students, teachers or anyone else at the school were formed over his time there. The time at the school was useless as highlighted by ‘I could say the lord’s prayer in Latin, all in one breath. ’ He claims that as what he received from eight years at the school, a useless skill. Skrzynecki found it so hard to belong to St. Patrick’s College because the decision to go to the school was not his own, he did not understand his surroundings and he did not build any relationships with those around him. In Conclusion the ability to belong can be affected by understanding, choices, culture, relationships and experience. In the poem â€Å"Feliks Skrzynecki† showed the sense of belonging in the respective place, like his garden. In contrast, the poem â€Å"St Patricks College† showed that Skrzynecki lacked in building any relationship with those around him. Peter Skrzynecki used various to show the alienation and belonging in the poems â€Å"Feliks Skrzynecki† and St Patricks College†.

Advantages and Disadvantages of Ethernet

Advantages and Disadvantages of Ethernet A 10Base2, or thin Ethernet, network uses thin 3/16-inch coaxial cable (with 50-ohm) impedance for the network backbone. Thin coaxial cable is much easier to prepare and install than thick Ethernet cable which means transfer rate of 10 Megabits per second that uses baseband signaling, with a contiguous cable segment length of 100 meters and a maximum of 2 segments. 10Base5: 10Base5 uses thick coaxial cable. This version is the original Ethernet. It can operate at up to 10 Mbps and support cable segments of up to 500 meters which uses baseband signaling, with 5 continuous segments not exceeding 100 meters per segment. It is also known as thick Ethernet or ThickNet. 10Base-T: 10BaseT is a baseband 802.3-based Ethernet network that uses unshielded twisted-pair (UTP) cable and a star topology. This version can operate at up to 10 Mbps which uses baseband signaling and twisted pair cabling. It is also known as twisted-pair Ethernet or UTP Ethernet. Features: 10BASE-T uses Manchester-encoding over two unshielded twisted-pair cables. The early implementations of 10BASE-T used Cat3 cabling. However, Cat5 or later cabling is typically used today. 10 Mbps Ethernet is considered to be classic Ethernet and uses a physical star topology. Ethernet 10BASE-T links could be up to 100 meters in length before requiring a hub or repeater. 10BASE-T uses two pairs of a four-pair cable and is terminated at each end with an 8-pin RJ-45 connector. The pair connected to pins 1 and 2 are used for transmitting and the pair connected to pins 3 and 6 are used for receiving. The figure shows the RJ45 pin out used with 10BASE-T Ethernet. 10BASE-T is generally not chosen for new LAN installations. However, there are still many 10BASE-T Ethernet networks in existence today. The replacement of hubs with switches in 10BASE-T networks has greatly increased the throughput available to these networks and has given Legacy Ethernet greater longevity. The 10BASE-T links connected to a switch can support either half-duplex or full-duplex operation. Advantages: Since each node on a 10 Base-T network has its own cable connecting it to a central hub, it is far less likely that any node can cause the entire network to fail. The hub also has a partitioning function built into it which allows it to detect a problem on any of its ports. If a problem is found, the node is disconnected from the rest of the network. This isolates the problem until the node can be troubleshot and repaired. Because of the partitioning function built in to the hubs and the star-wired topology, it is generally easy to troubleshoot a 10 Base-T network. In a worst-case scenario, one can be troubleshot by simply disconnecting nodes from the hub one at a time until the network recovers. Usually, the hub will give an indication as to which node is causing a problem, allowing the technician to troubleshoot that node as opposed to spending many hours finding where the problem is. Disadvantages: 10 Base-T only allows distances from the hub to the node of 100 meters. In some installations, this can be a major problem if nodes need to be located farther away. The nature of UTP cable makes it considerably more sensitive to electrical noise than coaxial cable. Generally, this rules 10 Base-T out as an option for installations on factory floor environments or other locations with a high ambient noise level. What are the different types of networking / internetworking devices? Explain the basic features of these devices. Following are the networking / internetworking devices with their basic features. Network Router: A network device, typically connected to a range of LAN and WAN interfaces, that forwards packets based on their destination IP address. Routers receives an incoming frame, discards the data-link header and trailer, makes a forwarding decision based on the destination IP address, adds a new data-link header and trailer based on the outgoing interface, and forwards the new frame out the outgoing interface. Network Repeater: A repeater is a physical layer device. It receives, amplifies (regenerates) and retransmits signals in both directions. As far as the software is concerned, a series of cable segments connected by repeaters is not different from a single cable (except by some delay introduced by repeaters). A system may contain multiple cable segments and multiple repeaters. But no two transceivers may be more than 2.5 km apart and no path between any two transceivers may be traverse more than four repeaters. Bridge: A bridge is a data link layer device which is used to connect multiple LANs. It examines the data link layer addresses to do routing. Since they are not supposed to examine the payload field of the frames they route, they can transport IPV4, IPV6, Apple Talk, ATM, OSI or any other kinds of packets. Gateway: A gateway can translate information between different network data formats or network architectures. Suppose a computer using the connection-oriented TCP/IP protocol needs to talk to a computer using the connection-oriented ATM transport protocol. The gateway can copy the packets from one connection to the other, reformatting them as need be. Switches: Switches are similar to bridges in that both route on frame addresses. In fact, many people use the terms interchangeably. The main difference is that a switch is most often used to connect individual computers. As a consequence, when a computer wants to send a frame to another the bridge gets the frame but just discards it. But the switch must actively forward the frame to other because there is no other way for the frame to get there. What is the range of addresses in the classes of internet addresses? Evaluate each class of logical addresses. There are five IP address classes, following table show each class and the range of addresses. Class Beginning Address Ending Address A 0.0.0.0 127.255.255.255 B 128.0.0.0 191.255.255.255 C 192.0.0.0 223.255.255.255 D 224.0.0.0 239.255.255.255 E 240.0.0.0 255.255.255.255 In Class A through Class E. each is used with a different type of network. The address classes reflect the size of the network, and whether the packet is unicast or multicast. In the unicast method of transmission, one copy of each packet is sent to each target destination. If there are eight workstations designated to receive a packet, such as a portion of a video clip, then it is transmitted eight times. In the multicast method, the recipients are placed in a group, such a group of all eight workstations. Only one packet is sent to the group, via a router or switch, which then packet to each group members. Class A is used for the largest networks composed of up to 16,777,216 nodes. Class A networks are identified by a value between 1 and 126 in the first position of the dotted decimal address. The network ID is the first 8 bits and the host ID is the last 24 bits. Class B is for medium-sized network composed of up to 65,536 nodes and it is identified by the first octet of bits ranging from decimal 128 to 191. The first two octets are the network ID, and the last two are the host ID. Class C addresses are used for network communication on small networks of 256 nodes or less. The first octet translates to a decimal value in the range of 192 to 223 and the network ID is contained in first 24 bits, while the host ID is contained in the last 8 bits. Class D addresses do not reflect the network size, only that the communication is a multicast. Unlike Classes A through C, the four octets are used to specify a group of nodes to receive the multicast, which consists of those nodes that are multicast subscription members. Class E is used for experimentation and address range from 240 to 239.255.255.255 in the first octet. Task 2 What is Bandwidth? Explain the other factors for network communications. Network bandwidth is the measure of the data carrying capacity of the network. When simultaneous communications are attempted across the network, the demand for network bandwidth can exceed its availability. The obvious fix for this situation is to increase the amount of available bandwidth. But, because of the previously stated constraints, this is not always possible. In most cases, when the volume of packets is greater than what can be transported across the network, devices queue the packets in memory until resources become available to transmit them. Queuing packets causes delay. If the number of packets to be queued continues to increase, the memory queues fill up and packets are dropped. The characteristics of the information being communicated also affect its management. For example, the delivery of a movie uses a relatively large amount of network resources when it is delivered continuously without interruption. Other types of service e-mail, for example are not nearly as demanding on the network. In one company, an administrator might decide to allocate the greatest share of the network resources to the movie, believing that this is the priority for his customers. This administrator may decide that the impact will be minimal if e-mail users have to wait a few additional seconds for their e-mail to arrive. In another company, the quality of a video stream is not as important as critical process control information that operates the manufacturing machinery. What is Physical address and what is the difference between Physical address and Logical address? Explain it in detail. The Physical address is specific on the local network and it represents the address of the end device on the physical media. In an Ethernet using LAN, this address is also called as Media Access Control address. On the local Ethernet network, when two end devices communicate, the frames that are exchanged between them contain the destination and source Media Access Control (MAC) addresses. It is in hexadecimal notation assigned by manufacturer. This address is much like postal address because it enables communication to be sent to specific destination. Physical address is 48-bit address burned into the ROM of the NIC card which is a Layer 1 device of the OSI model. This is divided into 24-bit vendor code and 24-bit serial address. This is unique for each system and cannot be changed. While the logical address is a 32- bit address assigned to each system in a network. This works in Layer3 of OSI Model which is generally called IP address. What is the difference between Layer 1, Layer 2 and Layer 3 devices? Describe it according to the Layers features. OSI model have 7 layers which perform many different functions. Every layer has its own unique features and function and a device which help the layers to work properly. Layer 1 is called Physical layer which consists of hardware, developed by engineers, in the form of electronic circuitry, media, and connectors. Therefore, it is appropriate that the standards governing this hardware are defined by the relevant electrical and communications engineering organizations. By comparison, the protocols and operations of the upper OSI layers are performed by software and are designed by software engineers and computer scientists. As we saw in a previous chapter, the services and protocols in the TCP/IP suite are defined by the Internet Engineering Task Force (IETF) in RFCs. Hardware components such as network adapters (NICs), interfaces and connectors, cable materials, and cable designs are all specified in standards associated with the Physical layer. Layer 2 is called Data Link layer and its services and specifications are defined by multiple standards based on a variety of technologies and media to which the protocols are applied. Some of these standards integrate both Layer 2 and Layer 1 services. A hub is an example of a layer 2 device. Switches are generally considered layer 2 devices, but many are capable of operating at layers 3, 4 or higher. Router is the Layer 3 device. The role of the router is to select paths for and direct packets toward their destination. This process is known as routing. During the routing through an internetwork, the packet may traverse many intermediary devices. Each route that a packet takes to reach the next device is called a hop. As the packet is forwarded, its contents (the Transport layer PDU), remain intact until the destination host is reached. Task 3 Explain 7 OSI layers briefly and define Router, Switch, and Bridge. Explain about encryption decryption. OSI Layers: The Open Systems Interconnection (OSI) model was initially designed by the International Organization for Standardization (ISO) that provides a framework on which to build a suite of open systems protocols. The objective was that this set of protocols would be used to develop an independent international network that would not be dependent on proprietary systems. Unfortunately, due to the rate at which it expanded, and the speed at which the TCP/IP based Internet was adopted, the OSI Protocol Suite development and acceptance lagged behind. Although few of the protocols, which are in widespread use today, are developed by using the OSI specifications, the major contribution has been made by the seven-layer OSI model in the development of other products and protocols for all types of new networks. The OSI model provides an extensive list of functions and services as a reference model that can occur at each layer. It also depicts the interaction of each layer with the directly above and below layers. No. Layer Name Description 7 Application Performs services for the applications used by the end users. 6 Presentation Perform data format information to the application. For example, the presentation layer tells the application layer whether there is encryption or whether it is s .jgp picture. 5 Session Manages sessions between users. For example, the session layer will synchronize multiple web sessions and voice and video data in web conferences. 4 Transport Defines data segments and numbers them at the source, transfers the data and reasonable the data at the destination. 3 Network Creates and addresses packets for end-to-end delivery through intermediary devices in other networks. 2 Data Link Creates and addresses frames for host-to-host delivery on the local LANs and between WAN devices. 1 Physical Transmits binary data over media between devices. Physical layer protocols define media specifications. Router: A network device, connected to a range of WAN and LAN interfaces that sends packets according to their destination IP address. Routers acquires an incoming frame, puts away the data-link header and trailer, makes a forwarding decision based on the destination IP address, adds a new data-link header and trailer based on the outgoing interface, and forwards the new frame out the outgoing interface. Switch: Switches are similar to bridges in that both route on frame addresses. In fact, many people use the terms interchangeably. The main dissimilarity is that a switch is commonly used to connect one-on-one computers. As a consequence, when a computer wants to send a frame to another the bridge gets the frame but just discards it. But the switch must actively forward the frame to other because there is no other way for the frame to get there. Bridge: A bridge is a data link layer device which is used to connect multiple LANs. It examines the data link layer addresses to do routing. Since they are not supposed to examine the payload field of the frames they route, they can transport IPV4, IPV6, Apple Talk, ATM, OSI or any other kinds of packets. Encryption: The process of obscuring information to make to unreadable without special knowledge, sometimes referred to as scrambling. The process takes the data to be encrypted and applies a mathematical formula to it along with a secret number (called an encryption key). The resulting value, which is called an encryption packet, is sent through a network. Decryption: It is the process of decoding data the back to its original form by giving that encryption key.

Tuesday, August 20, 2019

The Solution is More Discipline, Not Vouchers or School Choice Essay

The Solution is Discipline, Not School Choice Charlie is a problem child by any definition of the word.   He hasn't done anything horrific, like shooting another student or attacking a teacher. It's the annoying games he plays that drive everyone crazy. His favorite game is throwing scissors at the chalkboard when the teacher's back is turned.   He likes the screeching noise he can make if he throws the scissors at just the right angle.   And when he gets caught, he loves cursing at the teacher.   His biggest thrill is telling her to "mind her own f---ing business" while his classmates giggle or snicker. Charlie's teacher, Mrs. Anderson, spends her class time frustrated and powerless to stop Charlie's constant disruptive behavior.   At first, she looks him in the eye and asks him to stop.   Finally, she points her index finger toward the door and says, "Get out!" Charlie's classmates breathe a sigh of relief.   Mrs. Anderson does not.   She knows that tomorrow Charlie's father and mother will storm the principal's office demanding that she be fired or reprimanded.   Mom and Dad think that Charlie's personal rights have been violated; that he has a right to learn and not be disciplined by anyone, except by his own parents.   Due to this precedent, Charlie grows up with little educational discipline or accountability.  Ã‚   As Charlie's parents watch him grow into adulthood, they are forced to admit that their son is actually poorly educated, disrespectful and far from perfect. This story is all too familiar in America's public schools today.   Children in need of discipline have suddenly become the victims and their teachers, the oppressors.   As a result, America's school children are sorely under-educated and undiscipline... ...wer than 25 in a year. Implementing this change throughout America, especially suburbia, will not be easy.   This is where every American must recognize that in order to educate all our public school children we must deny a part of our own "self interest".  Ã‚   In order to make the change, America's parents and politicians must recognize that this "greater cause" can be public education.  Ã‚   Charlie's parents, along with many other parents, need to be encouraged to recognize that sometimes a little tough love is in their child's best interest. The next time Charlie's parents seek to confront school officials on behalf of their disruptive child, they need to be met with the empowerment of authority.   More importantly, Mrs. Anderson should be able to provide a healthy learning environment for all the children, if possible with Charlie, but if necessary, without him.

Monday, August 19, 2019

Dandelion Information :: essays research papers fc

Scientific name -Kingdom-Plantea, Phylum- Tracheophyta, Class- Angiospermae, Order- Asterales, Family- Asteraceca, Genus- Taraxacum, Species- officialeDescription - The Taraxacum officiale is a perennial herb that grows from two to eighteen inches tall they are a stem less plant and all parts of the plant contain a milky juice. The leaves are an olive or a dull yellowish color, and smooth with ridged edges where it got its common name, dandelion from the French words "dent de lion" which means lions tooth. The stalks are simple smooth, brittle and hollow. The flowers are one and a half-inch wide and a golden yellow color. The flower blooms from April to August, from 6am to 8pm. They have taproots that can grow up to three feet long in soft soil. There are about 150 to 200 flowerets that are strap shaped that make up the flower.Habitat - Their habitat is in the Northern Temperate Zones located in Europe and Asia. Then the colonists from Europe brought in to America. The pla nt usually grows lawns.Life cycle - The life cycle of the dandelion is when the adult is mature enough the flowerets turn into seeds with a fluff on it. This fluff enables the seed to be picked up the wind to carry it away from the parent plant.Importance - The dandelion has many little known uses to people. Like the roots are bitter, but they can be boiled put into salads when they are young, or they can be used as potherbs. The roots can be roasted and used as a substitute for coffee. The milky juice is used in some tonics for disorders in the digestive system and the liver. The flower stalks can be yields some rubber in the form of threads.

Sunday, August 18, 2019

Spiritualism Essay -- Parapsychology Essays, 2015

â€Å"Don't you remember anything?! There is no 'devil.' There is no 'hell.' There is only Unrest. There is no down, only sideways; the transparent beside the opaque, and a thin wall to separate them.† ― Leanna Renee Hieber, The Strangely Beautiful Tale of Miss Percy According to Merriam-webster.com, Spiritualism is a â€Å"belief that spirits of the dead communicate with the living, usually through a medium†. However, Spiritualism is more than a belief. Ever since the Spiritualist movement began and spread in the 1800’s, Spiritualism has evolved into a religion that continues to be practiced today. Contacting the dead is not a pleasant subject for most people however, although Spiritualism used to be casually practiced everyday in the homes of the Victorians in the 1800s. How did something that once used to be a method of being able to re-unite with your beloved, dead, grandparents warp into something that incites fear? Spiritualism was founded by the Fox sisters back in 1848 when Margaretta and Kate Fox claimed to have heard mysterious rappings in their little home in Hydesville, New York. Apparently, their house was reputed to be haunted before the Fox family moved in and there were claims of unexplainable sounds and furniture moving on their own. Margaretta and Fox started speaking to the spirit who was allegedly haunting their home and they eventually developed a system for communicating with it. The Fox sisters would ask the spirit a question and they would get answers in return through the form of rappings. For example, they would interpret one rap for â€Å"yes† or two for â€Å"no† or they would interpret the number of rapping’s given for a letter in an alphabet. It wasn’t long before the neighbors heard about the Fox sisters’ new found abilities and gathered at their house to witness the spirit rappings for themselves. Soon, they were giving performances in major towns, and that was when the rapping phenomena began to spread. The Fox sisters gained fame through their public sà ©ances and it wasn’t long before other people started claiming that they were also able to speak with spirits and other forms of communicating with the dead were created such as table tipping and slate writing. The Victorian era was marked by â€Å"romanticism  and mysticism with regard to religion, social values, and the arts† (http://www.studyblue.com/notes/note/n/dr-rescher-english-... ... each other. The information that I have learned regarding this topic has helped me a lot in developing my plot for a comic book that I am working on for Senior Show titled â€Å"Post-Mortem†. My story is set in the Victorian era where two brothers lament the loss of their loved ones. The older brother especially has a hard time coping with the loss of his fiancà ©, and the little brother tries to contact her and bring her back. However, instead of drawing back in the beautiful and kind fiancà © he ends up bringing back one that is hungry for revenge. Even though my story is based in the Victorian era where contacting the dead had nothing to do with evil spirits, I wanted to make my story more modern by adding a macabre touch. Works Cited McClenon, James. "The Scientific Investigation of Wondrous Events."  Wondrous Events: Foundation of Religious Belief, University of Pennsylvania Press(1994): 185-207. Print. Simpkins, Sarah. "Dr. Rescher   English 204."  STUDYBLUE. STUDY BLUE, 28 Mar. 2012. Web. 29 Apr. 2015. . Roach, Mary.  Spook: Science Tackles the Afterlife. New York: W.W. Norton, 2005. Print.

Saturday, August 17, 2019

Action and Communication Plan final for Choice Point

Security of data Data accuracy – to prevent information getting into the wrong hands Install security cameras – to mitigate data error Thorough lay verify new customer applications all, website, background, bank account and reference, and visit Shift focus of data gathering strategies to accuracy rather than number of entries. Randomly check the data and if it is incorrect set penalty to data providers Document the incidents as evidence Appoint liaison to lamentation Refuse to sell â€Å"sensitive† information (USN, Drivers license number, etc. To small business and Pl. And to big business that has no proven cause to use such information. Privacy – to prevent intrusion of privacy Policy of immediate notification to consumer when personal information was compromised Set up legal team specifically working with gal authorities to keep the company in the loop and so the company knows early what is coming and plan to handle.Corporate Action Plan – to mit igate future possibility of incidents Set up a crisis/risk management team to assess possible crises and key indicators, set guidelines and handbooks, crisis plan, training (on a regular basis and with everyone involved), simulations, and design suspicion report and incident report Re-assess the rules of business conduct (as above) and announce so that every stakeholder can follow increase employee awareness & alarm system Establish complaints division – to review inaccuracies, correctSet up center to handle internal communication and standards Provide public with accurate information about the leak/breach of data & ensuring all Issue a corporation wide memo via email creating awareness about the situation tools/resources associated with it are locked down from further use Allow individuals affected to request change or corrections of data via website or calling complaints department Provide mandatory training & scenario planning regularly.

Friday, August 16, 2019

Epitaph on Me Essay

Epitaphs are clear reflections of the life that individuals went through. The experiences mentioned may either be good or bad. However, these experiences greatly affected the way I perceived life, and how I would react towards the numerous things that happen around me. Thinking about how I lived my life made me ponder on how people would remember me even if I have left this earth. I have decided that my epitaph would sound something like this: â€Å"I swam across the sea Paddling for victory, Massive shark on the way Started an entirely different story. † Writing epitaphs is an important part of any individual’s life. I wanted my epitaph to be simple, yet amusing and could showcase the life that I lived. For starters, I was born in St. Louis Missouri in STATE YEAR and was raised in a poor neighborhood. I grew up in an environment where I had to learn the realities of life at such a young age. I was a product of a broken family, with my mother single-handedly raising me and my other siblings. I lived with poverty for seventeen years, before I was given the opportunity to join the United States Navy. Being in the service allowed me to become appreciative of the numerous blessings I receive every day. Poverty never came as a hindrance for me to become someone in society, for I was given the rare opportunity to serve my country and my countrymen. All of the experiences mentioned above played an important role in writing my epitaph. The first line which states, â€Å"I swam across the sea† is both literal and metaphorical in meaning. Swimming across the sea is not as easy as it may seem, and this may be compared to the difficulty I experienced as I grew up. As mentioned earlier, I came from a poor family, with my mother being the only one sufficing for our needs. Like swimming the sea, it was not easy to go through life-much hard work and dedication were needed in order to succeed. The second line which states â€Å"Paddling for victory† shows the degree of determination and hard work I was willing to give in order to become successful with my life. I grew up not having much, and being accepted at the United States Navy was my chance to rise up from poverty. Such led me to choose the word â€Å"paddling† to represent the difficulties and challenges that my family and I went through in life. Paddling was normally done in the sea, and was not an easy task for anyone, especially when done in the middle of the sea. The sea was vast and wide –some would give up trying to get to the other side of the â€Å"paddled† boat, trying to fight the hard current. Furthermore, I also attributed my experiences in life as the â€Å"sea†, which was vast and unpredictable. Although I was not financially secured as the others, I was given the equal treatment of making it big in the United States through my acceptance in the United States Navy. â€Å"Paddling for victory† was not a one shot deal – it entailed much from the paddler in order to be successful in life. Like my personal life, I wanted to make sure that I would be able to accomplish much, and become the best individual that I can be. Furthermore, â€Å"paddling† may also be used as the term that best describes my life in the US Navy. Every time I was deployed, I was putting my life on the line; and similar to my epitaph, I was â€Å"paddling for victory. † Such line was applicable to the life I had in the navy, for I had to make sure that I was able to fulfill my duties, while caring for my own life.

About the Philippines Essay

The Philippines is located in the southeastern portion of Asia. Her neighbor on the north is the Republic of China (Taiwan or Formosa), while on the west is Communist Vietnam. Further west is Thailand. Immediately to the south of the Philippines is Indonesia and to the southwest are Malaysia and Singapore. The Philippines is separated from her nearby Asian neighbors by several bodies of water. They are the Pacific Ocean on the east, the South China Sea on the north and west, and the Celebes Sea and the coastal waters of Borneo on the south. I. LAND AND ITS PEOPLE The Philippines is an archipelago of 7,107 islands and islets. The biggest islands are Luzon, with a land area of 40,530 square miles (105,000 square kilometers); Mindanao, 36,670 square miles (95,000 square kilometers); Palawan, 5,749.86 square miles (14, 896 square kilometers); Negros, 5,278.55 square miles (13,675 square kilometers); and Samar, 5,183.59 square miles (13,429 square kilometers). She has a rugged land mass and, similarly, she has an irregular coastline, which is twice as long as that of the continental U.S.A. This irregularity has resulted in numerous fine harbors and landlocked straights that can accommodate large ships. They can also be a refuge of ships in distress during stormy weather. The land surface is 115,800 square miles (300,000 square kilometers). Land forms include hills, plains, valleys, and mountains. Her mountain ranges, which are volcanic in origin, are drained by small river systems. There are seven major mountain ranges. The largest and longest is Sierra Madre, which faces the Pacific Ocean on the eastern coast of Luzon. See more: Experiment on polytropic process Essay The highest peak is Mt. Apo, a volcano in Davao del Sur Province. It has an elevation of 9,691.60 feet (2,954 meters). Three Major Islands. The three major geographical groups in the country are Luzon, Visayas, and Mindanao. Luzon comprises the northern portion of the archipelago. The Visayan region has about 6,000 islands including Leyte, Cebu, Samar, and Bohol. Mindanao is the second largest land and encompasses about 400 small islands. These islands are divided into provinces, which are run like states in the United States. Each province is ruled by a governor, a vice governor, and members of the provincial board. Each province is composed of cities, towns, and barrios. Several â€Å"Pinatubos.† There are several volcanos in the Philippines. These have been one of the natural causes of destruction to life and property for centuries. At least 10 are considered active. The most famous are Iraya on Batanes Island; Taal in Batangas; Banahaw in Quezon; Mayon in Albay; and Hibok- Hibok on the Camiguin Islands; Makaturing in Lanao; Apo in Davao, and Mt. Pinatubo in Zambales. Mt. Pinatubo has gained notoriety as being the most destructive volcano in the world. It lay dormant before it erupted in June 1991. It directly and indirectly caused damage to public and private property in the provinces of Zambales, Bataan, and Pampanga, including the Clark Air Force Base in Angeles City, Pampanga Province. Its ashes spread all over the world, causing global warming, damage to the ozone layer, and adverse effects on communications. After six years of eruption, the lahar deposits along the volcano still cascade down the slopes after heavy rains. They continue to take lives, destroy bridges and roads, and defy billion-peso dikes built to contain lahar flows. These lahar flows are expected to last for five or more years, according to volcanologists. The Philippines lies within the Pacific seimic belt, which is why she experiences severer earthquakes. Christian Groups. The people of the Philippines number about 73,265,584 (July 1995 estimate). There are several ethnic groups and more than 65 so-called cultural minorities in the Philippines, which speak their own dialects or languages. Among these ethnic groups are the Tagalog, the Ilocano, the Pangasinanian, the Pampangue?o, the Bicolano, the Cebuano, the Ilongo, and the Waray-Waray. They comprise more than 90 percent of all Filipinos and are the Christians. About 84 percent of Filipinos are Roman Catholics. The Tagalogs live in Manila and in central and southern Luzon. Although they speak Tagalog, they have intonations of their own, as do the Batangue?os from Batangas Province. The Tagalogs mostly live in such provinces as Nueva Ecija (the Ilocanos also live in some towns in the northern part of the province), Bulacan, Rizal, Batangas, Quezon, Laguna, and Mindoro (Oriental and Occidental). The Tagalogs dominate the people in Manila. There are, however, many people in the city who have come from different parts of the country, including Luzon, to live in the big city. Many also have come from the Bicol region and the Visayan islands. The Ilocanos live in the Ilocos region in northern Luzon, particularly Ilocos Sur and Ilocos Norte, but many of them have migrated in large numbers to central Luzon, and, of course, to the United States. Most of the oldtimers in the United States in the late 1920s and early 1930s came from the Ilocos region. The Ilongos live in western Negros, in southern Mindoro, and on the island of Panay. The Cebuanos predominate in Cebu, western Leyte, Bohol, eastern Negros, and in some coastal areas of Mindanao. The Bicolanos are in the southeastern Luzon and nearby islands, including the provinces of Albay, Camarines Norte, etc. The Pampangue?os or Kapampangans live in central Luzon, particularly in Pampanga Province. The Pangasinanians live in the Lingayen Gulf region of Luzon, including Pangasinan Province; however, many Pangasinanians have migrated into other towns in central Luzon. The Waray-Warays are in the provinces of Samar and eastern Leyte. Other Groups. Chinese and other groups also live in the Philippines. The Chinese comprise 1.5 percent of the population, and are active in business. Cultural Minorities. There are more than 65 cultural minorities, similar to the Indian tribes in th e United States, who live in reservations and in the mountains. They include the Muslim groups, which are comprised of the Maranao, the Samal, the Maguindanao, the Tausug, etc. They live in the Sulu Archipelago and southern Mindanao. There are also the so-called upland tribal groups who live in the mountain regions of the country, such as in the Mountain Province of Luzon. In northern Luzon, the other ethnic groups include the Bontoc, the Kalinga, the Ifugao, the Kankanay, the Ibaloi, the Isneg, the Ilongot, the Tinguian, and the Gadang. The Mangyan group lives in Mindanao and the Batak and the Tagbanua live in Palawan. In Mindanao there are groups known as the Tiruray, the T’Boli, the Bagobo, the Mandaya, the Bukidnon, the Subanun, and the Manobo. The Negritoes, popularly known as the Agta or the Aeta live in the mountainous areas of Luzon, Negros, Panay, and Mindanao. â€Å"I love You! Iniibig Kita!† Yes, â€Å"I love you† is said in about 87 dialects or languages in the Philippines. These include Tagalog, Kapampangan, Iloc ano, Cebuano, Pangasinanian, Bicolano, Hiligaynon, Chabacano, and the different dialects spoken by other ethnic groups such as Muslims and cultural minorities. The Filipino dialects belong to the so-called Malayo-Polynesian language family, which is said to be the largest language family throughout the world. Pilipino (not Filipino), which is based on Tagalog, is the national language in the Philippines, but both English and Pilipino, are the official languages in schools, in government, and in private institutions, especially in urban places. English serves as the official language used in communications and in business meetings, especially by Rotarians, Jaycees, and other organizations. That is, English and Pilipino both serve as the media of communications among the people who also speak their own dialects. It is common that when a Filipino in the Philippines and a Filipino in America write to each other, they communicate in English. But in daily conversation, English and Pilipino are combined, which is called Taglish (meaning Tagalog (Pilipino) and English. For instance, one may say, â€Å"Pupunta ako sa Maynila, to enroll at the University of the Philippines, (I’ll go to Manila to enroll at the†¦.) or â€Å"Okeng, okey ka, you’re so sweet!† (You’re o kay and you’re so sweet!†) So whenever you meet Filipinos in the United States, they may be speaking their own dialects when not speaking in English. However, these groups know Pilipino. So if you want to know a Filipino language, it should be Tagalog or Pilipino so that you’ll have more people whom you can converse with. Government.The Philippines has a democratic form of government, like that of the United States. The government is divided into executive, legislative, and judicial branches. Have Pesos and Enjoy! If you have the dollar, you can have it changed to the Philippine peso. The dollar when this book was about to go to press was equivalent to forty pesos (P40.00). The Philippine currency consists of the peso (P) and the centavo. One hundred centavos equal P1. Coin denominations are 1, 5, 10, 25, and 50 centavos, and P1, P2, and P5. Bill denominations consist of 5, 10, 20, 50, 100, 500, and 1,000 pesos. Foreign currency may be exchanged in banks, hotels, and most large department stores, which have authorized money-changing shops. Charge It! Charge It! Most large hotels, stores, restaurants, and resort areas accept major credit cards, including Visa, Mastercard, and American Express. At hotels and other large stores, traveler’s checks are accepted, preferably American Express. How’s the Weather? The weather in the Philippines is tropical, the country having only two seasons, the dry and rainy seasons. It’s usually hot from April to July. The dry season is between November and June and the rainy season is between July and October. Filipinos consider December, January, and February as the cool months. But they may not be considered as winter without snow as in the United States; maybe it’s milder or like spring or fall. II. FLASHBACK: THE EARLY FILIPINOS The Philippines, scientists believe, once was a part of Mainland China. According to the scientists, during the Ice Age, the waters surrounding the Philippines dropped to about 156 feet below the present levels, exposing large bodies of land. These became land bridges connecting the Philippines to the Asian mainland. The Philippines, Out from the Bottom of the Sea? In February 1976, Dr. Fritjof Voss, a German scientist who studied the geology of the Philippines, questioned the validity of this theory of land bridges. He maintained that the Philippines was never part of mainland Asia. He claimed that it arose from the bottom of the sea and, as the thin Pacific crust moved below it, continued to rise. It continues to rise today. The country lies along great Earth faults that extend to deep undersea trenches. The resulting violent earthquakes caused what is now the land masses forming the Philippines to rise to the surface of the sea. Dr. Voss also pointed out that when scientific studies were done on the earth’s crust from 1964 to 1967, it was discovered that the 35-kilometer-thick crust underneath China does not reach the Philippines. Thus, the latter could not have been a land bridge to the Asian mainland. When They Came, How They Came. The traditional teaching of Philippine history in Filipino schools today has early Philippine habitants coming in waves. In 1962, it was concluded that about 250,000 years ago, primitive men came to the Philippines from the Asian mainland. Then about 25,000 years ago came the pygmies, the small, black-skinned, squat-nosed, thick-lipped, and kinky-haired people from the south over the still remaining land bridges. (They are considered the ancestors of the Negritoes, who are, in turn, regarded as the aborigines of the Philippines.) Around 12,000 to 15,000 years ago, another Negrito (or Aeta) migration occurred. They reached Luzon from Borneo over land bridges in Palawan and Mindoro. The submergence of the land bridges when the ice melted with the passing of time did not prevent other people from inhabiting the Philippines. 5,000 to 6,000 Years Ago? The first Indonesians arrived by boat from Southeast Asia some 5,000 to 6,000 years ago. Much later, around 1500 B.C., a second wave of Indonesians arrived. Then came the Malays in two successive waves, the first between 800 and 500 B.C. and the second, between 300 and 200 B.C. From Borneo, they traveled by sailboats and settled in the three major islands of the Philippines: Luzon, Visayas, and Mindanao. Subsequent peoples who came from the start of Christianity until the present time include the Indians (Hindus), the Arabs, the Chinese, other Eastern Asians, the Europeans, and the Americans. Who Came First? The matter of who the first settlers were has not been really resolved. This is being disputed by anthropologists, as well as the theory of Professor H. Otley Beyer that the first inhabitants of the Philippines ca me from the Malay Peninsula. The Malays now constitute the largest portion of the populace and what Filipinos now have is a Malayan culture. Anthropologist F. Landa Jocano of the University of the Philippines contends that what fossil evidence of ancient men show is that they not only migrated to the Philippines, but also to New Guinea, Borneo, and Australia. He says that there is no way of determining if they were Negritoes at all. However, what is sure is that there is evidence the Philippines was inhabited as early as 21,000 or 22,000 years ago. In 1962, a skull cap and a portion of a jaw, presumed to be those of a human being, were found in a Tabon cave in Palawan Province. The discovery proved that man came earlier to the Philippines than to the Malay Peninsula; therefore, the first inhabitants of the former did not come from the latter. Jocano further believes that present Filipinos are products of the long process of evolutions and movements of people. This not only holds true for Filipinos, but for the Indonesians and the Malays of Malaysia, as well. No group among the three is culturally or racially dominant. Hence, Jocano says that it is not correct to attribute the Filipino culture as being Malay in orientation. According to Jocano’s findings, the peoples of the prehistoric islands of Southeast Asia were of the same population as the combination of human evolution that occurred in the islands of Southeast Asia about 1.9 million years ago. The proofs of this are fossil materials found in different parts of the region and the movements of other peoples from the Asian mainland during historic times. He states that these ancient men cannot be categorized under any of the historically identified ethnic groups (Malays, Indonesians, Filipinos) of today. Some Filipino ethnic groups were pagans while others were Muslims. The pagans were converted to Christianity by the Spaniards. The Americans later arrived and introduced further cultural changes, which made the Filipinos more and more different from the peoples of other Southeast Asian countries.

Thursday, August 15, 2019

Wives as Deputy Husbands

â€Å"Wives as Deputy Husbands† by Laurel Thatcher Ulrich Article Review â€Å"Wives as Deputy Husbands† by Laurel Thatcher Ulrich was written to give the author’s opinion on the roles of women in the 17th and 18th century. Some historians thought women were merely there to do housework and take care of the children. They thought they were helpless. On the contrary other’s thought they were very involved in various affairs such as: blacksmiths, silversmiths, tinworkers, shoeworkers, tanners, etc. They thought they may have been very independent.However, this article is used to understand how households were run and how women fit into both female and male roles. The author’s thesis of this article is to inform the reader that women had more roles in colonial times than people rarely consider. Ulrich’s contention is that â€Å"the husband was in control of the external affairs and of the family, a husband’s decision would incorporate hi s wife’s opinion, and should fate or circumstance prevent the husband from fulfilling his role the wife could stand in his place† (Paragraph 4. ).Women didn’t only depend on their husband. She was not helpless. Her commitment to her husband did allow him to be able to trust her with difficult tasks that a servant couldn’t be trusted with. A wife specialized in housekeeping skills but it also included the responsibilities of being a deputy husband. Ulrich says â€Å"Economic opportunities were limited for women; however, female responsibility was a very broad topic† (Paragraph 8. ). A woman could do any task as long as it furthered the good of her family and her husband deemed it acceptable.Wives could double as their husbands and became respected companions and shared the spouse’s authority. There was no sharp division between home and work in the colonial time period. Many people worked on a farm which also doubled as their home. This was al so true for male and females, their spaces overlapped. While the husband was around her responsibility was limited. When he was absent her responsibility was more weighted. If a woman became a widow, and she had no sons, and chose not to remarry she could inherit the deceased spouse’s estate.Many of the male’s responsibilities were less desirable to a woman than doing housework was. This work may prepare her to function competently in a male’s world, though. This article is specific to female roles. The textbook and class discussions/lectures mainly taught about the people of colonial America as a whole. We learned a lot more about men’s roles and female responsibility wasn’t mentioned very often. The article taught me that women were very important to not only the household but the entire family.In her husband’s absence she would take on his responsibilities as well as the household one’s and not only be able to survive but thrive. I think it was important to read this article because both women and men were present in this time period. Without women there would be no men (literally), so why would we study the important of one? To understand he time period I think all genders and races need to be studied to a certain extent. The strengths of this article were that Ulrich added many examples to help understand how not all women were shrew and servile but rather very independent.A weakness was that she also presented arguments from the opposing sides which in some cases were slightly confusing. Yes, it does fit into the prevailing interpretation because men weren’t present in every situation and when they weren’t women were to maintain the household and affairs. This information is indeed different that what I previously learned about gender roles; women stayed at home to cook, clean, and take care of children while men worked. Overall, this article was very informative and helped me understand how families worked together to be successful in the colonial time period.

Wednesday, August 14, 2019

Celia, a Slave Book Review Essay

Celia, A Slave is a story that takes many different historical facts from the era that the book was placed in, and uses a slave named Celia’s story to tie them all in and show how these events that didn’t directly affect her, would indirectly affect her, and the other slaves in this time as well. The author, Melton A. McLaurin, not only wrote the story of Celia in his book, but he also focused on other historical events taking place at the time to support his thesis that Celia’s case demonstrated what was happening on a global scale. He used facts such as the slave revolts in Haiti and the Dred Scott decision to make a case on why things were so hard for slaves at the time in the United States, and how they affected Celia, and her case. McLaurin also used different people and organizations like the Border Ruffians and the Massachusetts Emigrant Aid company to show the culture and society of the time and place of Celia’s story. The slave revolts in Haiti would indirectly affect Celia. Because the slaves revolted in Haiti, and actually won, it came as a wakeup call to the southerners. They knew that the slave population outnumbered their own, and if they revolted against them, they weren’t sure if they would be able to stop them. This made the Southerners even stricter when it came to slavery, and less lenient when it came to any types of escapes, or breaking of laws. This made it impossible for the jury in Celia’s murder case to believe that it she truly killed him in self-defense. The Dred Scott decision would directly affect her, because of the fact that the decision was still valid, and she, along with all the other slaves, weren’t protected by the U.S. Constitution, and were not considered U.S. citizens. This ruled out any argument that John Jameson, and the rest of her defense, would come up with arguing her constitutional rights. Instead, they brought up things like, how it would’ve been possible for her to kill a man of his size, and how it was possible that the body would’ve been completely disseminated in a fire in a matter of hours. Thomas Shoatman also tried to testify that after she striked Newsom the first time â€Å"he threw his hand up to catch her†, but the judge sustained prosecution objections to the defendants testimonies, because a majority of the jury and the judge himself were all slave owners. This even came as a problem for John Jameson at first, because he was defending a slave when he had some himself. The t hing that really allowed him to relate to Celia though, was the fact that he had a daughter, and he wouldn’t have wanted the same injustice fall on her if the roles were reversed. The Border Ruffians showed the culture and society of the time in Missouri. The border ruffians would cross over into Kansas and vote for all things pro slavery related, and would beat Kansas citizens into voting for pro slavery as well. This was an example of the people that resided in Missouri, and how intent they were on making slavery legal in as many states as possible. The Massachusetts Emigrant Aid Company also showed the culture of the time, but from the aspect of people who didn’t want slavery. The company took advantage of the Kansas Nebraska Act to try and get anti-slavery supporters to settle in the Kansas territory, to try and make it a slave free state. The company was crucial in settling Kansas, and making it a free slave state. The book was a good read, though a bit repetitive at times, and educated the reader about different issues at the time of Celia’s case that would affect her, and also affected slaves lives in at the time. It also would educate the reader to what it was like to live in the time of Celia’s case, and get an insight on what it was like for her, and others.