Saturday, August 31, 2019

Android Os

CELLPHONE OPERATING SYSTEM 2010 CP 303 – Operating Systems 5/14/2010 Android is a complete set of software for mobile devices. It consists of: * An operating system * Middleware * Mobile applications Android was built from the ground-up to enable developers to create compelling mobile applications that take full advantage of all a handset has to offer. An application can call upon any of the phone's core functionality such as making calls, sending text messages, or using the camera, allowing developers to create richer and more cohesive experiences for users. Android is built on the open Linux Kernel. Furthermore, it utilizes a custom virtual machine that was designed to optimize memory and hardware resources in a mobile environment. It is open source and can be liberally extended to incorporate new cutting edge technologies as they emerge. Android does not differentiate between the phone's core applications and third-party applications. They can all be built to have equal access to a phone's capabilities providing users with a broad spectrum of applications and services. With devices built on the Android Platform, users are able to fully tailor the phone to their interests. A developer can combine information from the web with data on an individual's mobile phone, also, he/she can build an application that enables users to view the location of their friends and be alerted when they are in the vicinity giving them a chance to connect. ANDROID FEATURES Contacts/ Accounts: * Multiple accounts can be added to a device for email and contact synchronization, including Exchange accounts. * Developers can create sync adapters that provide synchronization with additional data sources. * Quick Contact for Android provides instant access to a contact's information and communication modes. A user can tap a contact photo and select to call, SMS, or email the person. Other applications such as Email, Messaging, and Calendar can also reveal the Quick Contact widget when you touch a contact photo or status icon. Email: * Combined inbox to browse email from multiple accounts in one page. * Exchange support. Messaging: * Search functionality for all saved SMS and MMS messages. * Auto deletes the oldest messages in a conversation when a defined limit is reached. Camera: * Built-in flash support * Digital zoom * Scene mode * White balance * Color effect * Macro focus Virtual Keyboard: Refreshed UI with actionable browser URL bar enables users to directly tap the address bar for instant searches and navigation. * Bookmarks with web page thumbnails. * Support for double-tap zooms. * Support for HTML5 * Database API support, for client-side databases using SQL. * Application cache support, for offline applications. * Geo-location API support to provide location information about the device. ANDROID SUPPORTED DEVICES Smartphones: * Acer Liquid A1 * Bluelans Communication Sciphone N19 * Bluelans Communication SciPhone N21 * Dell Mini3i * Geeks'Phone One * General Mobile DSTL1 Imaginary * HKC HKC Pearl * HKC Imobile v413 HTC Desire * HTC Dream * HTC Hero * Droid Incredible * HTC Legend * HTC Magic * HTC Tattoo * Google Nexus One * T-Mobile Pulse * Lenovo OPhone * GW620 Eve * Motorola CLIQ XT * Motorola Droid * Motorola MB300 * Motorola Devour * MOTO MT710 * MOTO XT800 * Motorola CLIQ * Sirius Sky * Qiji I6 Tablet PCs: * Archos 5 Internet Tablet * Camangi WebStation * Eken M001 (TP701) * Enso zenPad * Smart Devices SmartQ-V5 * Smart Devices SmartQ-V7 * Hardkernel ODROID-T E-Readers: * Barnes & Noble nook * enTourage eDGe * Spring Design Alex Other: * Acer Aspire One D250 REFERENCES www. developer. android. com www. android. com www. wikipedia. com

Friday, August 30, 2019

Grocery, Inc. Essay

Grocery, Inc. is a retail grocery store chain based in Any State; U.S.A. Grocery has stores throughout the United States. Grocery has written contracts with many different vendors to purchase the products they sell in their stores. Vendors range from individuals to international corporations. Tom works as the produce manager for the store in My Town, U.S.A. Jeff, 17 years old, is spending his summer vacation working for Tom in the produce department. A.) Does Article 2 of the Uniform Commercial Code (UCC) apply to the contracts between Grocery and its vendors? Do common law contracts apply? Explain, in detail, why or why not. Your answer should compare and contrast common law contracts and UCC Article 2 contracts. Yes Article 2 of the UCC does apply to the contracts between Grocery and their vendors. Article 2 applies to all contracts for the sale of goods (2-102). The code contains a somewhat complicated definition of goods (2-105); the most important thing to understand is that the term goods means tangible personal property. Article 2 does not apply to contracts for the sale of real estate or stocks and bonds and other intangibles. The drafters of the code also tried to promote fair dealing and higher standards of behavior in the marketplace. They attempted to do this in several ways in Article 2. The Code imposes a duty on everyone making agreements under the Code to act in good faith (1-203). The Code also imposes certain standards of quality on sellers of goods as a matter of law. Common law contracts would also apply to the Grocery and their vendors, due to the mixture of goods and services. Common law would apply to the service element that is predominant in the contract with regards to the delivery of the goods. (Barnes, J). The difference between Article 2 and common law is that if the contract is for the sale of goods then Article 2 would apply, if it is not then the principles of common law under contracts would apply. Article 2 reflects an attitude about contracts that is fundamentally  different from that of the common law. The Code is more concerned with rewarding people’s legitimate expectations than with technical rules, so it is generally more flexible than traditional contract law. A court that applies the Code is more likely to find the parties had a contract than a court that applies contract law (2-204). In some cases, the Code gives less weight to technical requirements such as consideration than is the case in contract law. (Barnes, J). B.) Grocery contracted with Masterpiece Construction to renovate the store on Main Street in My Town. Masterpiece, unable to complete the renovation within the six month time limit due to a sudden increase in jobs, sub-contracted the entire job to build them to fall. Grocery was unaware of the sub-contract. When Grocery realized (due to poor quality of work) that Build, not Masterpiece, was handling the renovation, Grocery petitioned the court for an injunction and then sued Masterpiece for breech of contract and specific performance. Masterpiece argued that it had a right to delegate the duties of the contract, or in the alternative, to discharge the contract due to commercial impracticability. Who wins? Explain your answer. Based on the information provided by Grocery would win the case based on breech of contract and specific performance. Under breech of contract, promissory must perform their contractual duties in the manner they have promised to perform them. Since Masterpiece did not perform the duties in the manner in which they promised they are liable for breech of contract. The courts recognize that there are three basic degrees of performance: complete or satisfactory performance, substantial performance, and material breech of contract. (Barnes, J). A contract consists of both rights and duties. A contracting party has the duty to perform his or her own promise and the right to receive the other party’s promised performance. These rights and duties can usually be transferred to third persons. When rights under a contract are transferred, this is called assignment. The transfer of duties is called a delegation. Not all contracts are assignable  over the objection of the promissory. The promissory who delegates duties is still liable to the promise if the party to whom the duties were delegated fails to satisfactorily perform them. This would make Masterpiece liable for the quality of work that Build them to fall produced for Grocery. The only exception to this rule would have been if the parties had entered into a novation which is a new, separate agreement by the promisee to release the original promissory from liability in exchange for a third party’s agreement to assume the promisor’s duties. As for Masterpieces claim that they had a right to delegate the duties to Build them to Fall under commercial impracticability they would have to show that unforeseen conditions would have caused a delay or inability to make delivery of the goods (make performance impracticable), then they would have been able to claim commercial impracticability. In the absence of compelling circumstances, the courts do not readily excuse parties from their contractual obligations, particularly where it is clear that the parties anticipated a problem and sought to provide for it in the contract. Since Masterpiece had contracted to perform the work for Grocery and then had a sudden increase in jobs this would not be considered compelling circumstances for sub-contracting the job to a company that would perform a poor quality of work. C.) At the end of the summer, Jeff had earned enough money to put a down payment on a car. He decided to continue working part time during school to earn money for the car payments. Jeff purchased a car from Steve at the local used car lot. Steve did not ask Jeff how old he was; but assumed he had reached the age of majority. Jeff paid the down payment and signed the contract stating that he would make payments of $200 each month. Six months later Jeff lost his job and could no longer make the payments. Jeff took the car back to Steve and said he wanted to cancel the contract and that he wanted his money back. What are the possible outcomes? Explain your answers. Jeff was a minor at the time of the contract. Therefore, Jeff is considered not to have the capacity to enter into contracts. Steve made the deal in â€Å"good faith† that Jeff was old enough to enter into the contract.  Unfortunately, the contract is voidable. Jeff was correct that he could disaffirm the contract. And upon the disaffirmance, Jeff had to return the vehicle to Steve. Even though the right to disaffirm a contract was meant to protect minors, some states have rejected that idea because that view creates a hardship on the adult involved. Under the case of Dodson v. Shrader, 824 W.2d 545 Tenn. Sup. Ct. 1992), Steve would be allowed to recover the depreciation of the vehicle from the monies that Jeff has paid. Especially considering the fact that Jeff has had the vehicle for six months or more. The states defer on the idea that the minor needs to be reimburse the â€Å"innocent adult† for dealing with the minor. However, many times minors can pass as adults at approximately 14 years of age and up. Minors also get fake IDs to get things like buying beer. Therefore, by allowing the minor to get away with not paying the debt he or she willing entered or lied to the adult to sign a contract, is not in the best interest of society to allow the minor not to suffer the consequences. Therefore, holding the minor responsible for his or her actions is one way for the minor to learn responsibility. D.) Grocery has a written contract with Cereal, Inc. to purchase 20 cases of cereal per month at $22 per case. The contract does not state the types of cereal or how the 20 cases will be divided up between Grocery’s 20 stores in Any State. After a flood, Cereal suffers severe water damage in its warehouse. With the exception of Soggy Flakes, Cereal does not have enough undamaged cereal to comply with its Grocery contract. On the day delivery was due, Grocery receives 10 cases of Soggy Flakes at the three stores located in My Town and two stores in Your Town. Twelve days before delivery was due, Grocery had requested, by facsimile, that 15 cases containing a variety of cereals be delivered to the five stores listed above with the remaining five cases going to Grocery’s warehouse in Corp Town. Grocery wants to reject the shipments of Soggy Flakes and cancel its contract with Cereal. Discuss Grocery’s rights under contract law. Cereal argues that based on the gap-filling rule, it had the right to modify the terms of the  contract. Analyze the gap filling provisions of UCC Article 2 as they pertain to the terms of this contract. What rights and/or defenses, if any, does Cereal have under contract law? Analyze the remedies available to Grocery and/or Cereal. Explain all answers in detail. Grocery has the right to reject the shipment. Grocery has to notify Cereal that the shipment was not adequate and is being rejected pursuant to Article 2-602. The notice must be accomplished â€Å"within a reasonable time† and preferably in writing [Article 2-602]. Grocery has the right to reject the shipment and cancel the contract.. However, Cereal must notify Grocery that due to unforeseeable circumstances, the shipment will consist of Soggy Flakes and only ten cases of cereal will be delivered. Cereal must notify Grocery that Cereal intends to replace the shipment within a reasonable time (gap-filling rule). However, under the circumstances, Cereal may not know how long Cereal may be without the correct product. Furthermore, Cereal needs to decide what it wants Grocery to do with the product (whether to sell the product, destroy the product, or store the product for later pick-up). Grocery does not have to pay for return shipment. If Grocery feels that Cereal cannot meet the obligations incurred, Grocery can demand an assurance that the contract will be performed. If the assurance is not forthcoming within 30 days, then Grocery can repudiate the contract [Section 2-609]. If Grocery later decides the Cereal can meet the terms of the contract, Grocery can decide to continue wit the contract if Cereal can show that Cereal intends to meet the obligations of the contract. E.) Tom spent his time away from work on his hobby, model trains. His train set was very large and consisted of rare and one-of-a-kind trains. One day, while visiting with a fellow train hobbyist Harry, Tom said, â€Å"When I retire in two years from Grocery, I’m going to sell my trains and spend the rest of my years traveling on real trains.† Tom then told Harry that he was the only person he planned to offer his trains to because he knew Harry would take good care of them. Harry said he looked forward to the day when he could buy the trains. Harry then spent the next two years and most of his savings  building a new 2,000 sq. ft. room onto his house to make room for the trains. When Harry told Tom that he was building the new room, Tom just smiled. Tom also heard that Harry had borrowed money from his aunt to buy the trains. When Tom retired, he sold his trains to David. Harry sued Tom claiming breach of contract, or in the alternative, for promissory estoppels. Who wins? Explain your answer. Although Tom and Harry did not have a written contract about the purchase of the trains, they did have a verbal contract. Breach of contract is described as any failure to perform that is not excused (Mallor, Barnes, Bowers, Langvardt, 2004). When Tom told Harry that Tom would sell his trains to Harry, Harry had the reasonable expectation that Harry would receive the trains. Harry then spent a large amount of money building an addition to his house in order to have room for the trains. Harry also had borrowed the money to purchase the trains from his aunt. â€Å"Promissory estoppel is an equitable doctrine that protects those who foreseeably and reasonably rely on the promises of others by enforcing such promises when enforcement is necessary to avoid injustice, even though one or more of the elements normally required for an enforceable agreement is absent† (Mallor, et al, 2004, glossary). In this case an injustice to Harry did exist because of the money he spent in building onto his house and expectation he had of receiving the trains. Harry wins the case based on the recognition of promissory estoppels in section 90 in the first Restatement of Contracts in 1932 (Mallor, et al, 2004, 338). The court would see the injustice to Harry by Tom failing to fulfill his promise to sell his trains to Harry. F.) Jason shipped a truckload of peaches from his orchard to Grocery using an independent trucker. In route, the truck broke down and the shipment was delayed three days. The peaches were spoiled when they arrived. The terms of the contract were F.O.B. Who bears the risk? Explain your answer. F.O.B. (Free on Board) means the seller is responsible to deliver the goods  free of expense and at his own risk to the designated place of delivery. In this case Jacob was responsible for the shipment until it reached Grocery. Grocery would be able to file a suit against Jason for damages. Jason would, however, be able to file a suit against the independent trucker for the damages to the peaches. This case is similar to the case in the textbook Windows, Inc. v. Jordan Panel Systems Corp. In this case, however, the term FOB is not used. The windows were to be properly packed and shipped, but were damaged due to load shift during transport. The buyer, Jordan, expected to receive the windows in good condition, ready to install. When the windows were delivered in bad condition, Jordon filed against the trucking company and did not pay Windows for the order. Jordan then ordered a duplicate order to be shipped that Jordan received with no problem. The error in this case was that Jordan did not pay Windows for either order and Windows had to file suit against Jordan in order to be paid for the shipments. Judgment was affirmed in favor of Windows. G.) Discuss the different warranties that apply to Grocery’s business. Explain your answer in detail. Grocery’s business operates under the implied warranty of merchantability. This warranty is one that the legal community has created, not one that is operating under a written or accepted contract. The warranty operates under UCC section 2-314(l) . Section UCC 20314(l) reads: â€Å"[A] warranty that the goods shall be merchantable is implied in a contract for their sale if the seller is a merchant with respect to goods of that kind. (Mallor, Barnes, Bowers and Langvardt, 2007). Under this warranty, Grocery’s implied warranty is that the products sold will be useable for the purpose intended. Grocery would be held responsible for products like canned goods, meats, bakery items, and the like because Grocery is in the business of selling these goods. Section 2-314 states the products must meet the following criteria. (1)In the trade, the product must pass inspection without objection. (2)The product must be fit for the purpose for which the product wasintended;(3)The product must be of even kind, quantity (same size unit), and kind (like boxed cereal). (4)The product must be adequately packaged and labeled (must list things like the calories per serving). (5)The product must conform to the packaging and labeling regarding any promises or statements that may be stated (the cereal must be Rice Krispies and not Cheerios if the box is marked Rice Krispies). (6)If a product is perishable, the product must be of fair quality. If goods do not conform to the above standards, a consumer may pursue legal remedies. Goods that do not function as intended are not merchandisable and would not meet the above standards. Furthermore, Grocery would be responsible for the goods sold at the store, not for computer products since the normal business of Grocery would be for canned goods, bakery items, meats, and the like. H.) Supplier Inc., a large wholesaler, had a contract with Grocery. Supplier sued Grocery for breach of contract when Grocery failed to place an order for goods by a specific date as specified in the contract. Each order was worth at least $550. Grocery contended that the contract Bill Green signed was a standard preprinted supply contract without specifics regarding time of order and quantity. Green had authority to sign a standard supply contract, but could not authorize specific terms. This was unknown to Supplier. Supplier argued that terms were â€Å"boilerplate† and therefore could be modified by acceptance. Supplier offered oral testimony at trial to prove that Green agreed to the modifications. Is there a contract? If so, what are the terms? Explain your answer. 1. Yes, there is a contract. The contract that Green claims to be a standard  preprinted supply contract and Suppliers claim can be modified by acceptance. 2. The terms are that Grocery was supposed to purchase goods by a specific date. 3. Each order is worth at least $550. a.) Also, discuss the use of Suppliers oral testimony at trial. 1. The use of Suppliers oral testimony can go either way. Oral testimony can be very effective if Supplier can prove that what Supplier is saying is true. Oral testimony can also be detrimental to Supplier’s case if it is proven that Supplier is lying. 2. Presenting to the courts and the jury that the copy of the actual contract is always a good idea. It will be up to the courts to decide if the original contract stands or if it is void. References Edition e-text] Prentice-Hall Publishing. Retrieved August 25, 2005, from University of Phoenix, Resource BUS/415-Business Law Web Site:https://ecampus.phoenix.edu/content/eBookLibrary/content/eReader. Mallor, J.P., Barnes, A.J., Bowers, T., & Langvardt, A.W. (2007). Business law: The ethical, global and e-commerce environment, 13e. The McGraw-Hill CompaniesUniversity of Phoenix. (Ed) (2005). Business Law [University of Phoenix Custom]

Thursday, August 29, 2019

How does Carter portray power throughout the novel Wise Children? Essay

The novel Wise Children, written by Angela Carter, is the memoirs of two song and dance girls, Nora and Dora Chance, following both their trials and tribulations, but also parts of their families. Carter wrote Wise Children once she had discovered she was dying of cancer and suddenly the power to control her life had been taken out of her hands. Throughout the novel, Carter displays the use of power to change the readers perspective on certain things in life, such as when Nora loses her virginity. It is in a back alley with a married man and so could appear seedy and inappropriate, however, Nora chooses this situation, having made clear decisions about how and who with she wants to lose her virginity to, ‘she would have him. ’ Nora has the power in this situation, and it is exactly what she wants. This makes it more acceptable, ‘He was the one she wanted, warts and all. ’ Nora is not taken advantage of or made to do anything she doesn’t want to, and because she has the power and control at the time, what she is doing does not seem as unacceptable as it would if Nora did not seem to entirely understand what she was doing. Dora wants to be in charge of her own identity and her own opinions, and in control of her own life. Irish, who Dora meets in Hollywood, wants to change Dora to what he thinks is right, ‘he kept on insisting on forgiving me when there was nothing to forgive. ’ Dora, in her eyes, was doing nothing wrong, but simply being herself. This was not enough for Irish, he wanted her to be educated to his standards. Irish however controls what Dora learns so he is in charge or what she says and does as much as possible, ‘What he wanted for himself was an infinitely renewable virgin. ’ Irish wants a girl who will listen to what he teaches her and not question him. Dora knows she cannot stay with Irish as he was the control in their relationship, but she does not want him to be in charge of who she is. Dora takes the power, and she chooses to end the relationship. Gengis Khan knows women come to him for fame. Gengis is a very powerful man in Hollywood and he uses this to manipulate and take advantage of people, ‘he was the master/madam of a very peculiar brothel, where all the girls for sale were shadows. ’ The girls Gengis ‘sells’ are on a quest for fame and he uses his great power to use them and sell them with empty promises, ‘Why actresses go down on their knees to me! ’ Gengis uses women for sex to show them who is in control. Gengis keeps a photo of his wife ‘Daisy Duck’ or Delia Delaney in his office, in on display so that anyone that goes into it will see the image. Delia is one of the most famous women in Hollywood, and her fame is because of Gengis. The image is on display so that the women that come to Gengis for fame can see what he could possibly make them if they do what he requests when and how he wants. This is clearly a sordid abuse of his power, however, he knows girls that are desperate for fame will do almost anything if they think it will make them famous. Dora does not let Gengis manipulate her. Gengis wants her to sleep with him however she will not, ‘I’d feel ever so more comfortable if you put your shirt back on Mr Khan. ’ There is a power shift here, as suddenly Dora is taking the power over Gengis, rather than how it ususally is, where Gengis is able to abuse his power over women in Hollywood. Another shift in dominance and power is when Tiffany takes control over her relationship with Tristam. ‘I love you†¦ Forgive me. ’ Here Tiffany takes control, ‘Fat chance. ’ She now has the power in the relationship, knowing she’ll be better off without Tristam. Tiffany does not want to spend her life with Tristam, ‘I wouldn’t marry you if you were the last man in the world. ’ She won’t let herself be controlled by Tristam any longer, as she knows he is not going to be a good Father or partner, ‘You’ve not got what it takes to be a father. There’s more to fathering than fucking you know. ’ Tristam does in fact seem very self-centred, he cares mostly about himself and his money and appears to believe that his status gives him power over Tiffany as he has given her a job and he is wealthy. This however is not true as soon Tiffany realises in fact she will be better off without Tristam and knows she can cope alone as it is obvious Tristam only proposed to her as she is having his child and he was desperate to try and appear like he was dealing with the situation correctly, showing a slight feminist edge that appears during the novel. Power is displayed in many ways throughout the novel. Carter often allows the women to take control over the men, although the men in many situations try to take over and change the women, such as Dora and Irish. Irish tries to educate Dora, because he does not think she is intelligent and often thinks the sings she says are wrong, whereas she disagrees. She leaves him because she does not feel she is right for him. She is too strong willed. We could reflect the power struggle to Carter herself as she is losing control over her life and so perhaps this is why she displays power in such ways throughout the novel. Power is often taken away from the men and given to the women throughout the novel as they stand up for themselves and their lives, such as Tiffany and Tristam, when Tiffany will not marry him simply because she is having his child. Carter shows the men in the novel to be flawed throughout the novel, as their grasps on power fail as she dispels the idea of male superiority throughout Wise Children.

Taking a lm of your choice, explore in detail the manner in which lm Essay

Taking a lm of your choice, explore in detail the manner in which lm language is used to create meaning - Essay Example The major focus of the films of the era was on violence with the depiction of the society as the major casualty in the process (Brathwaite, 1984, p. 45). The development of the films was a way of confronting the traditional moral values with the hope of elaborating or discrediting them. The major role of the films in the era was to establish new values in the society. The vital value depicted by the films was the need for peace and coexistence. The use of cinematic scenes has been used lately in Sci-fiction movies (Wierzbicki, 2008, p. 56). The movie pan labyrinth is a science fiction movie that contains various language uses that can be used to distinguish the roles of the characters. The movie Pan’s Labyrinth is directed by Guillermo Del Toro and released in 2006. The film is based on a Spanish forest at a time of awakening of the rest of Europe. The story combines the political fable with a guise of a fairy tale. The focus of the story is on ethical issues affecting the soc iety. The storyline is written by Guillermo Del Toro but borrows from several fairy tales. The geographical location of the movie is Spain, and it focuses on an 11-year old girl whose is life is at a crossroads after her father’s death, she lives with the stepfather (Toro, 2006). The young lady is called Ophelia and is cast is Ivana Baquero. Other casts in the movie include Sergi Lopez as Captain Vidal, an officer in the Franco army while the Ofelia’s mother is Ariadna Gil. The story line of the movie is uncluttered with the focus being on the magic and two worlds the real and the unreal world. Movie analysis The techniques employed in the movie include lighting, dialogue and symbolism. The director uses dialogue and lighting to develop the story line of the movie. The director uses steely-blue lighting illustrates the gloomy atmosphere used especially when bringing the village settings. Blue tones are set every time the scene moves to the village. Symbols used in the movies are beneficial because they bring out the fascinating features of the movie (Elsaesser and Buckland, 2002, p. 12). Clocks are used in the movie, to illustrate orders and time lapse. The blue lights events in reality and illustrates the cold and unjust society. The clocks are used to illustrate that the time is running out and everything lead to a big event. The state of the uniform worn by Vidal is indicative of the events of the movie. Lighting is a serious issue in the film because it brings out the necessary image of life in the film setup. The director of the film has a reputation of using different stylistic device especially lighting and symbolism to influence the interest and participation of the audience during the screenplay of the movie. This movie uses light as the main focus of the movie is with the focus of the whole lighting process being to distinguish the reality and the fairy part of the movie (Hornberger and Mckay, 2010, p. 45). Lighting in the movie helps t he audience to know the different scene setting of the movie. Language use in the movies is a device employed in depicting the behavior of Captain Vidal. Vidal communicates with the staff by use of monosyllabic answers. In addition, he uses foul language even to the helpful doctor. The film relates to the audience both in political, social and economic perspective. The major focus of the movi

Wednesday, August 28, 2019

Module 01 and module 02 Essay Example | Topics and Well Written Essays - 250 words

Module 01 and module 02 - Essay Example From the exercise, I learned that success in online environments in related directly with structured approached towards time management in which one can give proper time to each course. In my typical day, school fits at the place of most important value. The fact that I have learned about my future career within school is that students need positive attention from teachers. If they do not receive it, their focus can shift away from studies forever. Teachers need to handle each student individually during early childhood education to make the students feel valued and gain confidence. I chose multimedia technology because of my interest in this field. Studying multimedia will not only help me get a deep understanding of different technologies and the way they work but also it will help me gain success in online environment because use of multimedia technologies is the backbone of online mode of study. Everyone wants to do something exceptional in life. I have planned to use my multimedia education in research and teaching areas. I have focused my attention not only towards creating new multimedia technologies to assist students and teachers communicate and study in online environments but also towards using such technologies as my professional teaching

Tuesday, August 27, 2019

Selecting Variables into a Regression Equation Assignment

Selecting Variables into a Regression Equation - Assignment Example and $100,000p.a., Above $100,000), density of population in neighborhood (low, medium, or high). The data comprises of 31 observations for each variable. Using step wise approach to predicting the relationship between the dependent variable and independent variables, the correlations between these variables are determined as follows: From the above table, the significant relationships are indicated between number of injuries and parenting status and density of population. There is a positive relationship between number of injuries and parenting status and there is a negative relationship between number of injuries and density of population. Using MS Excel the following regression output is achieved. The regression model is only able to explain 5.8% of the total variations observed in 31 data entries (Kedem & Fokianos, 2002). The above table indicates coefficients of correlation between dependent variable and independent variables. The following regression equation is achieved: From the regression equation, it could be predicted that there is a negative relationship but not significant (p

Monday, August 26, 2019

Revising the thesis Essay Example | Topics and Well Written Essays - 2500 words

Revising the thesis - Essay Example Selecting the Best Type of International Collaboration 18 2.3.2. Disadvantages of International Collaboration 19 2.4 International Joint Ventures 20 2.5 International Business in Saudi Arabia 22 2.5.1 Forces Influencing the Attractiveness of Saudi Arabia for International Business 22 2.5.2 Incentives for international organisations to do business in Saudi Arabia 25 2.5.3. International Joint Ventures in Saudi Arabia 27 2.5.4 Examples of International Joint Ventures operating in Saudi Arabia 30 2.6 Conclusion 31 3. ... Employee Work Commitment 57 4.1 Introduction 57 4.2 Organisational Commitment 58 4.2.1 Theoretical Background of Organisational Commitment 58 4.2.2 Definitions of Organisational Commitment 60 4.2.3 Meyer and Allen’s Model of Organisational Commitment 61 4.2.3.1. Affective Commitment 61 4.2.3.2 Continuance Commitment 62 4.2.3.3 Normative Commitment 63 4.2.4 Effects of Organisational Commitment 64 4.3 Professional Commitment 66 4.3.1 Theoretical Background of Professional Commitment 66 4.3.2 Definitions of Professional Commitment 68 4.3.3 Effects of Professional Commitment 69 4.4 Theoretical Integration of the Concepts of National Culture and Employee Work Commitment 69 4.5 Conclusion 72 5. Conceptual Framework and Research Methodology 73 5.1 Introduction 73 5.2 Theoretical Framework and Research Hypotheses 73 5.3 Study Variables 81 5.3.1 National Culture 81 5.3.2 Collectivism / Individualism 82 5.3.3 Organisational Commitment 82 5.3.4 Professional Commitment 82 5.4 Operationali zing the Study Variables 83 5.5 Study Methodology 84 5.5.1 Alternative Research Options 84 5.5.2 Research Methods 86 5.5.3 Population and Sample 87 5.5.3.1 Population 87 5.5.3.2 Sample 88 5.5.3.3 Types of sampling 89 5.5.3.4 Sampling Frame 90 5.5.3.5 Sample size 90 5.5.3.6 Study sample 91 5.5.3.7 Selection criteria 91 5.5.4 Data Collection 92 5.5.4.1 Accessing respondents 93 5.5.4.2 Ethical considerations 94 5.5.5. Research Measures 94 5.5.5.1 Organisational commitment measure 94 5.5.5.2 Professional commitment measure 96 5.5.5.3 Research instrument 97 5.5.6 Data Analysis 97 5.5.6.1 Two-sample two test (t-tests) 99 5.5.6.2 Correlation analyses 100 5.5.6.3 Skewness and Kurtosis Test 101 5.5.7 Pilot

Sunday, August 25, 2019

Nano Assignment Example | Topics and Well Written Essays - 750 words

Nano - Assignment Example Tompkins has been titled the CEO because his background closely fits the position. He is likely to be doing more work than the other founders. Since he is doing more work he deserves a different salary and equity level. The other founders are fair with the equity but not fair about the salary that Tompkins receives. The decisions made regarding split equity and compensation is unfair and leaves no room to share equity amongst other employees. Without being able to share equity amongst other employees, the new employees may not be as driven to get the company where it needs to be. The founders are the creators of the company and share in ownership. All though they may share in ownership it does not mean that they should share equity and compensation if there job duties are not the same. A change is equity and compensation needs to be made to create a real fairness and ability to offer equity to other employees. The size of the founding team is five men that are all from the same company. Don Rupert is the head of AMSL. He is a co founder of NanoGene. Will Tompkins is a bio chemist and founder along with three other scientist and biologist. Mark Masterson and Ravi Rhoota were former AMSL scientist and an important asset to NanoGene. Gary Garfield who was also important to NanoGene is a doctor in biology. Each founder is vital to NanoGene in a way that the type of development for NanoGene requires each founder to make it work. Having five founders starting up a company can cause problems early as well as later on in the company life. Having five founders requires the need to receive acceptance from each of the five founders each time an issue arises. It is unlikely that all five founders will agree on each issue. When issues come up of importance it is likely that a vote will need to take place. Being a founder of a company is an important role. Founders are the

Saturday, August 24, 2019

East Asia paper 2 Essay Example | Topics and Well Written Essays - 750 words

East Asia paper 2 - Essay Example With such economic disparity, China’s development continued to fall as Western culture continued to take its peak. Aside from these, its centralized government began to crumble as rampant corruption erupted. Decentralization in power, warfare, rebellions, overpopulation, as well as the continuing economic downscale continued to pour over China’s arms. Rebellions continued its sprout, starting with the White Lotus Sect that placed an end to the golden age of the Qing dynasty and lasted for almost nine years. Named after the White lotus Buddhist sectarianism, White lotus revolution sparked the Chinese movement to overthrow the Qing dynasty. Starting as tax protesters, this sect was able to gain support from ordinary people against serious concerns in the government. By 1840, the Opium War, armed invasion of France and Britain against China, also broke out. This war was rooted from the dispute against opium trade, as the Chinese Emperor banned opium for its harmful effects in its citizens and derogatory impact on Chinese culture. Such conflict of premise contrasted Britain’s view on opium as a profitable commodity for commercial trade. The Opium War and the series of â€Å"unequal treaties† (or unreasonable treaties which demanded China to give up territories, pay indemnities, and open trading ports) beneficial to Britain further contributed to the downfall of China. The sudden turn of events converted China into a semi-feudal and semi-colonized country. Aside from the aforementioned wars, China also suffered from the Boxer Rebellion, a rebellion of the Chinese patriots (who used acts of violence such as murder, robbery, vandalism, and arson) as a means in opposing the forces of foreign traders and troops.

Friday, August 23, 2019

Organizational Behavior Profiles Research Paper

Organizational Behavior Profiles - Research Paper Example All of this showed his love for computers. Later when he was enrolled at Harvard, he continued bunking classes for his love of computer. There he met, Steve Balmer, who was to be his future business partner and co-found of the famous â€Å"Microsoft Corporation†. After incorporating Microsoft, Bill never returned to Harvard to complete his education. This is another example that showed that Bill Gates was a rebel against the going norms and showed that personal interest is dearer to Bill Gates than anything. Bill’s refusal to rejoin his college would have implied that he wouldn’t have been able to give much time to his organization, but since Bill was a baby boomer, he wanted to work himself and grow his brainchild â€Å"Microsoft Corporation† into a giant. Although if he had completed his education, the society would have benefited as education is a Merit good, but instead all he cared about was himself, and he was willing to deprive the society of a merit good, in order to devote time to himself and to benefit himself rather than the society. Bill’s behavior back at Microsoft Corporation wasn’t too pleasing at all. As a tender organization, back in the days, it needed charismatic leadership to grow and to become successful. Microsoft had a leader in Bill Gates. His success showed that in fact they had the best leader there is, and in time Bill Gates was to become the richest man in the world. Back in the Microsoft Corporation, Bill was an aggressive leader. He and Steve Balmer abhorred laziness and faulty work. It is also heard that Steve and Bill used to shout at their co-worker, if they think that their work was faulty or was just average. They aspired to be the best, and they believed that average work will not take them anywhere. They needed their employees to present them something that is better than competition, or otherwise, Bill and Steve would

Thursday, August 22, 2019

Subway Smoothie Essay Example | Topics and Well Written Essays - 750 words

Subway Smoothie - Essay Example Our company will use four elements of promotional mix, which include advertising, sales promotion, personal selling and public relation. Advertising refers to the presentation of a standard message regarding the strengths, price and availability of goods or services by the marketer in an impersonal way (Weinreich, 2010). In this strategy, our main aim will be building the pull effect since our adverts will deliver a message that will make the product appealing to customers to buy it. Since fast foods have become a major concern, relaying a message on the importance of smoothie foods will pull more customers to buy the foods. We would also rely on sales promotion, which is the short-term use of incentives or other promotional activities that will stimulate the customer to buy our product (Urban, Sultan, & Qualls, 2012). This particular element helps bring short and immediate effect on sale as well as faster stock clearance. The technique will also help in the induction of customers and distribution channels; and will help us win over fast food competitors. As a business, we will apply such sales promotion skills as rebate, discounts, premiums, and usable benefits, e.g. buy two get one free. The general benefit will be attracting people’s attention as well as inducing them since our new product will be available at a lower price. We will also rely on personal selling, which will enable our sales team have face-to-face interactions with the customers. Since it is a face-to-face interaction, our sales team will be able to explain the merits of our products directly, thus increasing the sale of the product. It is also a flexible element, meaning the seller may change the offer according to various situations. It also induces customers to buy given goods in order to satisfy their needs. Public relations is the last element of marketing mix that we will apply, which

The role of Intelligence in the formulation of government policies Essay Example for Free

The role of Intelligence in the formulation of government policies Essay Introduction Espionage is the secret collection of information, or intelligence, that the source of such information wishes to protect from disclosure. Intelligence refers to evaluated and processed information needed to make decisions. The term can be used with reference to business, military, economic, or political decisions, but it most commonly relates to governmental foreign and defense policy. Intelligence generally has a national security connotation and therefore exists in an aura of secrecy.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Espionage, or spying, is illegal according to national laws. Spying proceeds against the attempts of counter-espionage (or counter-intelligence) agencies to protect the secrecy of the information desired.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   International espionage methods and operations have few boundaries. They have been romanticized in popular fiction and the mass media, but in reality, espionage exists in a secret world of deception, fraud, and sometimes violence. Espionage involves the recruiting of agents in foreign nations; efforts to encourage the disloyalty of those possessing significant information; and audio surveillance as well as the use of a full range of modern photographic, sensing, and detection devices and other techniques of eliciting secret information (see C. S. Trahair, Richard. Encyclopedia of Cold War Espionage, Spies and Secret Operations, 2004).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The intents of this paper are to: (1) trace how espionage started; (2) know the justification and international sanction of intelligence; (3) know the recruitment agents; (4) be aware how espionages are gathered; (5) be acquainted espionage agencies and networks; (6) be informed how espionage during the 19th century and early 20th century; (7) know the role of espionage during World War II and Modern Era; (8) realized how is espionage in politics and industry; (9) learn about the   Espionage Act of 1917; (10) know about Central Intelligence Agency (CIA) as one of the agencies of intelligence and; (11)   know about its implications of modern technology. Background How espionage started?   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Intelligence was early recognized as a vital tool of statecraft—of diplomacy or war. Writing almost 2,500 years ago, the Chinese military theorist Sunzi stressed the importance of intelligence. His book The Art of War (c. 500 BC) gave detailed instructions for organizing an espionage system that would include double agents and defectors. Intelligence, however, was haphazardly organized by rulers and military chiefs until the rise of nationalism in the 18th century and the growth of standing armies and diplomacy (see T. Richelson, Jeffrey. A Century of Spies: Intelligence in the Twentieth Century. 1999). III. Discussion Justification and International Sanction of Intelligence   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In order to adopt and implement foreign policy, plan military strategy and organize armed forces, conduct diplomacy, negotiate arms control agreements, or participate in international organization activities, nations have vast information requirements. Not surprisingly, many governments maintain some kind of intelligence capability as a matter of survival in a world where dangers and uncertainties still exist. The cold war may have ended, but hostilities continue in parts of Eastern Europe, the former Soviet Union, the Middle East, and elsewhere. Indeed, the collapse of old political blocs in the late 1980s has even increased international uncertainty and consequent need for information (see Carney, Ralph M. Citizen Espionage: Studies in Trust and Betrayal. 2001).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   All nations have laws against espionage, but most sponsor spies in other lands. Because of the clandestine nature of espionage, no reliable count exists of how many intelligence officers—only a small percentage of whom are actually spies—there are in the world. A common estimate is that the United States today still employs some 200,000 intelligence personnel. The number that was generally ascribed to the Soviet intelligence establishment in the 1980s was 400,000, a figure that included border guards and internal security police (see T. Richelson, Jeffrey. A Century of Spies: Intelligence in the Twentieth Century. 1999). The recruitment agents   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Today, scores of developed nations have efficient intelligence organizations with systematic programmes for recruiting new agents. Agents come from three main sources: the university world, where students are sought and trained for intelligence careers; the armed services and police forces, where some degree of intelligence proficiency may already have been attained; and the underground world of espionage, which produces an assortment of people, including criminal informers, with relevant experience (see Bungert, Heike Et Al. Secret Intelligence in the Twentieth Century. 2003).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Those who do the actual spying, which may involve stealing information or performing disloyal acts of disclosure, are led to this work by various motivations. Greed or financial need is a leading incentive in many cases, but other motivations, such as ambition, political ideology, or nationalistic idealism, can figure importantly: Oleg Vladimirovich Penkovsky, a highly placed Soviet officer, provided valuable information to Western intelligence services in the belief that the West must be warned of danger. H. A. R. (â€Å"Kim†) Philby, the notorious English spy, worked for the Soviet Union on ideological grounds.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Some spies must be carefully recruited and enticed into cooperation; others volunteer. The latter must be handled with extreme caution, as it is common for double agents to be among the volunteers. Double agents are spies who pretend to be defecting, but in reality maintain their original loyalty. Counter-intelligence staffs are always sceptical of volunteers or defectors and restrict their use for positive espionage purposes. In some cases, the most valuable spy of all is the â€Å"agent-in-place†, the person who remains in a position of trust with access to highly secret information, but who has been recruited by a foreign intelligence service; such a spy is known as a â€Å"mole† (see Herrington, Stuart A. Traitors among Us: Inside the Spy Catchers World, 1999).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   A high-priority espionage target is the penetration of the various international terrorist organizations. If the leadership of such units can be infiltrated by spies, advance knowledge can be obtained of the location and identity of intended victims, the nature of the disguises being used by the hit team, and the secret sources of weapons. Such information could be used to foil terrorist operations. International drug trafficking, it has been asserted, can similarly be thwarted by effective espionage, but the problem is complex, and only limited success has been achieved. How espionages are gathered?   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Intelligence work, including spying, proceeds in a five-step process. Initially, what the decision makers need to know is considered, and requirements are set. The second step is collecting the desired information, which requires knowing where the information is located and who can best obtain it. The information may be available in a foreign newspaper, radio broadcast, or other open source; or it may be obtained only by the most sophisticated electronic means, or by planting an agent within the decision-making system of the target area. The third step is intelligence production, in which the collected raw data are assembled, evaluated, and collated into the best possible answer to the question initially asked. The fourth step is communicating the processed information to the decision maker. To be useful, information must be presented in a timely, accurate, and understandable form. The fifth and crucial step is the use of intelligence. The decision maker may choose to ignore the information conveyed, thus possibly courting disaster; on the other hand, a judgment may be made on the basis of information that proves inaccurate (see Hulnick, Arthur S. and Valcourt, Richard R. Fixing the Spy Machine: Preparing American Intelligence for the Twenty-First Century, 1999).The point is that the decision maker must make the final crucial judgment about whether, or how, to use the information supplied. The intelligence process can fail at each or any of these five basic steps. Espionage Agencies and Networks   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The worlds intelligence, espionage, counter-intelligence, and covert action programmes may be said to follow three distinct organizational patterns: the American, the totalitarian (exemplified by the Communist regimes), and the British (parliamentary) systems. Similarities exist among them, yet distinctions are sharp.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In the United States the Central Intelligence Agency continues to sit at the corner of an elaborate complex of some dozen separate intelligence organizations. Each has a specific role and a carefully guarded area of operations. The director of central intelligence is both head of the CIA and the presidents principal intelligence adviser. In the latter job the director theoretically coordinates all the separate intelligence units, setting their requirements, budgets, and operational assignments. In reality, many of the major units in the system—such as the Defense Intelligence Agency and the huge National Security Agency/Central Security Service, both part of the Department of Defense—operate in quasi-independence. The National Security Agency, which engages in code making and code breaking, the science of cryptography, is much larger in staff size and budget than the CIA (see Marchetti, Victor and Marks, John D. The CIA and the Cult of Intelligence, 2001). The military also maintains a major tactical intelligence capability to assist field commanders in making on-the-spot decisions. Other major units in the US intelligence system include the State Departments Bureau of Intelligence and Research, the Department of the Treasury, the Federal Bureau of Investigation, and the Drug Enforcement Administration of the Department of Justice. The US model influenced the intelligence structures of those countries where the United States was dominant at the end of World War II, such as West Germany (now part of the united Federal Republic of Germany), Japan, South Korea, and Taiwan.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In contrast to the federated American intelligence structure, the typical totalitarian setup is highly centralized. In the Soviet Union, the power of the KGB pervaded every aspect of national life. Its director was generally a powerful member of the Politburo (the governing political committee of the USSR). The KGB had two chief directorates. The most important was the First Directorate, which was responsible for foreign intelligence gathering. The Second Directorates principal responsibilities involved providing counter-espionage protection to the regime and recruiting foreign agents within the Soviet Union. Its targets included diplomats and journalists stationed in the USSR, foreign students, business people, tourists, and visiting delegations (see Macpherson, Nelson. American Intelligence in War-Time London: The Story of the Oss, 2003).Most Eastern European governments followed the KGB model in their intelligence operations. China, Cuba, and other Communist nations still do.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The third model of intelligence systems is the British, a confederation of agencies coordinated by a Cabinet subcommittee and accountable to the Cabinet and prime minister. The two principal units are the Secret Intelligence Service (often called MI6, signifying â€Å"military intelligence†) and the Security Service (popularly called MI5). These labels reflect the military origins of these services, which are now in the civilian sector. MI6 is similar to the CIA and the KGB in that it carries out espionage, counter-espionage, and covert action overseas. MI5 is charged with domestic counter-intelligence and internal security. Scotland Yard maintains a â€Å"special branch†, which operates as the overt arm of the security service; it makes arrests and offers evidence in espionage cases while MI5 agents remain in the background. A number of specialized units also operate within the British intelligence community. These include the Government Communications Centre (for code making and breaking), the Ministry of Defense intelligence sections, and various Foreign Office intelligence groups. With some national variations, the intelligence services of France, Italy, Israel, and the Commonwealth of Nations countries follow the general British pattern of organization (see Macpherson, Nelson. American Intelligence in War-Time London: The Story of the Oss, 2003). During the 19th century   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Political espionage is thought to have first been used systematically by Joseph Fouchà ©, duc dOtrante, minister of police during the French Revolution and the reign of Napoleon. Under Fouchà ©s direction, a network of police agents and professional spies uncovered conspiracies to seize power organized by the Jacobins and by Bourbon Royalist à ©migrà ©s. The Austrian statesman Prince von Metternich also established an efficient organization of political and military spies early in the 19th century. Better known than either of these organizations was the dreaded Okhrana (Department for Defence of Public Security and Order) of the Russian tsars, created in 1825 to uncover opposition to the regime.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   During the mid-19th century the secret police of Prussia was reorganized and invested with the duty of safeguarding the external as well as the internal security of the country. The Prussian espionage system played an important part in preparations to unify the German states in the German Empire. It also covered France with a network of about 30,000 agents whose work contributed to the German victory in the Franco-Prussian War of 1870-1871. Not until the latter part of the 19th century, however, were permanent intelligence bureaux created by modern states (see T. Richelson, Jeffrey. A Century of Spies: Intelligence in the Twentieth Century. 1999). Early 20th century   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Systematic espionage aided the Japanese in defeating the Russians in the Russo-Japanese War of 1904-1905. In preparing for World War I the Germans again flooded France with a host of agents, some of whom were disguised as trade representatives, teachers, agricultural labourers, or domestics. The most famous of these agents was Mata Hari, who posed as an Indian dancer in Paris. German agents also engaged in attempts to sabotage American national defense both before and after the US entry into World War I.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Most nations, however, entered World War I with inadequate espionage staffs, and the war was frequently fought on the basis of poor intelligence. The lessons of that war, along with rapid advances in technology, especially in communications and aviation, spurred a major growth in intelligence agencies. This was further stimulated by the advent of Fascist governments in Europe and a military dictatorship in Japan, all of which had expansionist foreign policies and the creation of counter-espionage agencies such as the Gestapo in Nazi Germany. These developments led other, democratic countries to establish counter-espionage systems as well (see Hulnick, Arthur S. and Valcourt, Richard R. Fixing the Spy Machine: Preparing American Intelligence for the Twenty-First Century. 1999). Espionage during World War II   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   World War II was the great stimulus to intelligence services worldwide. Modern military and communications technology put a premium on accurate and quick information, as well as on efforts to protect the security of sensitive information. Some of the great battles of World War II were actually intelligence and counter-intelligence battles. Only in recent years have some of the exploits, and failures, in this secret war been disclosed. Notable is Operation Double Cross, in which the British captured practically all the German spies in Great Britain during the war and turned them into double agents who sent false information back to Germany. Also, the British and their allies were able to break the German secret code, providing access to many of the enemys secret transmissions (see Sexton Jr., Donal J. Signals Intelligence in World War II: A Research Guide. 1999).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The surprise attack by Japan on the American naval base at Pearl Harbor on December 7, 1941, was a great intelligence success for the Japanese and an intelligence failure for the Americans. That failure stimulated the post-war growth of a massive intelligence apparatus in the United States. Before World War II the United States had virtually no intelligence system; after the war the CIA became world famous for its pervasive international surveillance, joining the MI6, the KGB, the Service de Documentation Extà ©rieure et de Contre-Espionage of France, Israels foreign intelligence agency Mossad, Chinas Social Affairs Department, and numerous other intelligence agencies in a massive network of espionage and counter-espionage efforts (see Sexton Jr., Donal J. Signals Intelligence in World War II: A Research Guide. 1999). Modern Era   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In the mid-1970s, as a result of disillusionment with the Vietnam War, the Watergate scandal, and the policies of dà ©tente, many Americans began to question the role of the CIA. Mass-media disclosures of intelligence agency abuses and failures were followed by investigations by presidential commissions and congressional committees, which resulted in new guidelines for secret operations and a new structure for executive and legislative supervision. Controversy over the CIAs role and control remains, however. One result is an ever-increasing amount of public information about intelligence services around the world (see â€Å"Espionage†. Grolier Encyclopedia of Knowledge, pp. 342-347, vol. 5). In Britain, MI5 remained unrecognized by statute until 1989, and MI6 until 1994. Espionage in Politics and Industry   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Intelligence and espionage are terms most commonly associated with national foreign policies, yet secret information is needed to make decisions in politics, commerce, and industry. Political parties have always been interested in the strategic plans of their opponents or in any information that might discredit them.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Most large corporate enterprises today have divisions for strategic planning that require intelligence reports. Competitive enterprises are undeniably interested in the plans of their competitors; despite laws against such practices, industrial espionage is difficult to detect and control and is known to be an active tool for gaining such foreknowledge. Many of the tools of government intelligence work are used, including electronic surveillance and aerial photographic reconnaissance, and attempts are even made to recruit defectors (see â€Å"Espionage†. Grolier Encyclopedia of Knowledge, pp. 342-347, vol. 5). Espionage Act of 1917   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Espionage Act of 1917 is a principal United States legislation prohibiting espionage for a foreign country and providing heavy penalties for such activity. As amended in 1940 and 1970, it is still in force.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The 1917 law provided steep fines and imprisonment for collecting and transmitting to foreign power information related to US national defense and for interfering with the recruitment or loyalty of the armed forces. Use of the US mail for material urging treason or resistance to US laws was prohibited; sabotage, especially of trading ships, was subjected to severe penalties; the movement of neutral ships in US waters was regulated (in order to stop such vessels from shipping arms or supplies to an enemy country); and the fraudulent use of passports as well as the unauthorized representation of a foreign government were prohibited. An important amendment to the law, usually called the Sedition Act, was passed in 1918 but repealed in 1921; it forbade spoken or printed attacks on the US government, Constitution, or flag (see â€Å"Intelligence†. New Standard Encyclopedia, pp. 431-437, vol. 7).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   During the outbreak of public hysteria following the US entry into World War I, the 1917 and 1918 laws permitted about 1,500 trials and prison sentences; freedom of the press was curtailed. In 1919 this led US Supreme Court justices Oliver Wendell Holmes, Jr., and Louis Brandeis to state the principle, later much cited, that unpatriotic speech and publications were illegal only if they constituted a â€Å"clear and present danger† to national security.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The 1940 revision of the Espionage Act increased its penalties. The application of the law to propaganda was limited by a Supreme Court decision in 1944. During World War II about 160 people were convicted under the Espionage Act. Also under this act, the American Communists Julius Rosenberg and Ethel Rosenberg were convicted of spying and executed in 1953 (see â€Å"Intelligence†. New Standard Encyclopedia, pp. 431-437, vol. 7). Central Intelligence Agency   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Central Intelligence Agency (CIA), agency of the Executive Office of the President of the United States, created in 1947, together with the National Security Council. The CIA is Americas first permanent peacetime intelligence agency responsible for keeping the government informed of foreign actions affecting the nations interests. It was established by the National Security Act of 1947 and is charged with coordinating all US intelligence activities, as well as such functions and duties related to intelligence as directed by the National Security Council (see Darling, Arthur B. The Central Intelligence Agency: An Instrument of Government, to 1950. 2002). A director and deputy director of the agency are appointed by the president with the consent of the Senate (see Hulnick, Arthur S. and Valcourt, Richard R. Fixing the Spy Machine: Preparing American Intelligence for the Twenty-First Century, 1999). History   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The CIAs original mission was primarily intelligence gathering, but after Communist takeovers in Eastern Europe and mainland China, the National Security Council directed that the agency engage in political, covert psychological, paramilitary, and economic operations. United States participation in the Korean War (1950-1953) placed additional requirements on the CIA to support the combat forces.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In the period from 1953 to 1961 the CIA was at the height of its cold war activities, carrying out continuous foreign intelligence, counter-intelligence, political action, and propaganda operations. In late 1961 the CIA was reorganized to put more emphasis on science, technology, and internal management. The agency was heavily committed in the war in South East Asia. In 1963 an Office of National Intelligence Programs Evaluation was established to coordinate community activities; this was replaced in 1972 by an Intelligence Community Staff (see Lowenthal, Mark M. U.S. Intelligence: Evolution and Anatomy, 1999). Activities   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The US Central Intelligence Agency (CIA) is divided into four main directorates, or branches. The Directorate of Operations conducts covert activities around the world. The Directorate of Science and Technology interprets data gathered from electronic transmissions, spy satellites, and other sources. The Directorate of Intelligence produces analyses for policy makers by synthesizing information from the CIA and other federal agencies. The Directorate of Administration oversees the agencys finances and personnel and monitors internal security.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The activities of the CIA are many and varied. Clandestine collection of vital information that cannot be obtained by any overt means requires recruiting agents who can obtain the needed intelligence without detection. Intelligence reports from all sources are reviewed by analysts who produce studies ranging from basic surveys to estimates of future developments. Current intelligence of major importance is detailed in daily, weekly, or monthly bulletins. Periodic projections concerning key nations are presented as national intelligence estimates (see Lowenthal, Mark M. U.S. Intelligence: Evolution and Anatomy, 1999).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The CIA is also responsible for counter-espionage activities. Its mission is to prevent the placement of foreign agents in sensitive US agencies; domestically this work is coordinated with the Federal Bureau of Investigation (FBI).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Covert political operations have ranged from subsidizing friendly foreign politicians, parties, or pressure groups to providing assistance in combating subversion. Paramilitary operations support certain exile forces with training and equipment; one example was the CIAs support of Cuban exiles before and during the Bay of Pigs invasion of Cuba.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Modern technology has increased the capabilities of intelligence collection. In the 1960s high-altitude aircraft introduced a new era of aerial photography; this was quickly followed by transmissions from space satellites. Similarly, underseas intelligence work was advanced by vessels capable of raising a submarine from great depths (see Lowenthal, Mark M. U.S. Intelligence: Evolution and Anatomy, 1999). Controversy and investigations   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   All clandestine activities are considered abhorrent by some people. Many, however, recognize secret intelligence collection necessary to protect national security. Generally, people support covert political activities in times of crisis.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The role of the CIA director as the principal US intelligence officer and coordinator of activities of the other agencies has often been in dispute. Over the years frequent proposals have been made to divest the head of the CIA of the coordinating role and assign that function to a member of the White House staff.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The CIA has been investigated a number of times by various task force groups, one of which in 1949 recommended major reorganization of CIA operations. Following the Bay of Pigs invasion in 1961, President John F. Kennedy appointed a group to analyze the failure.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In 1975 the CIA came under extensive Congressional and White House examination. It was found that the agency had been engaged in â€Å"unlawful† domestic spying activities and had been implicated in assassination attempts abroad. As a result of these investigations, permanent Congressional committees were established to oversee CIA operations. By 1980 these committees had exclusive jurisdiction over review of CIA activities (see Marchetti, Victor and Marks, John D. The CIA and the Cult of Intelligence, 2001).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   By 1986, however, the agency was involved in a new controversy concerning the secret sale of arms to Iran and the disbursement of monies from the sale to the rebels (known as the Contras) fighting the government of Nicaragua. The late CIA director William J. Casey, among others, was suspected of being implicated in the arms scandal. As the 1990s began, the collapse of the Soviet bloc and the dissolution of the USSR led the CIA to revise its mission and organization to meet changing world conditions.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The United States government released the first of three batches of classified documents expected to shed light on relations between Chile and the United States during the 1970s in June 1999. These documents included reports by the Central Intelligence Agency referring to covert operations intended to promote a military coup and overturn the government of President Allende.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   There was further criticism for the CIA after the terrorist attacks on the United States of September 11, 2001, when it was accused of not having done enough to warn of, and possibly prevent, the impending disaster. Over the following months the organization was subsequently given extra powers and resources to conduct increased covert operations as part of the war on terrorism; it also began to develop closer ties with the FBI (see T. Richelson, Jeffrey. A Century of Spies: Intelligence in the Twentieth Century. 1999). Conclusion Implications of Modern Technology   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   All forms and techniques of intelligence are now aided by an accelerating technology of communications and a variety of computing and measuring devices. Miniaturized cameras and microfilm have made it easier for people engaged in all forms of espionage to photograph secret documents and conceal the films. Artificial satellites also have an espionage function—that of aerial photography for such purposes as detecting secret military installations. Information held or programmes running on computers are vulnerable to penetration by hackers, whether acting independently or for other bodies. The vanguard of these developments is highly secret, but it is known that telephones can be tapped without wires, rooms can be bugged (planted with electronic listening and recording devices) without entry, and photographs can be made in the dark. Of course this same technology is used in countermeasures, and the competition escalates between those seeking secret information and those trying to protect it.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In foreign embassies in sensitive areas, confidential discussions routinely take place in plastic bubbles encasing secure rooms, to protect the confidentiality of information. Intelligence agencies have long been known to be staffed with expert lip readers. Privacy of communications remains under constant assault by technological developments that offer threats to, but perhaps also promises for, human progress. References C. S. Trahair, Richard. Encyclopedia of Cold War Espionage, Spies and Secret Operations, 2004. Greenwood Press, Westport, CT. T. Richelson, Jeffrey. A Century of Spies: Intelligence in the Twentieth Century. 1999. Oxford University Press, New York. Carney, Ralph M. Citizen Espionage: Studies in Trust and Betrayal. 2001. Praeger Publishers, Westport, CT. Bungert, Heike Et Al. Secret Intelligence in the Twentieth Century. 2003. Frank Cass. London. Herrington, Stuart A. Traitors among Us: Inside the Spy Catchers World, 1999. Presidio Press, Novato, CA. Marchetti, Victor and Marks, John D. The CIA and the Cult of Intelligence, 2001. Dell, New York. Hulnick, Arthur S. and Valcourt, Richard R. Fixing the Spy Machine: Preparing American Intelligence for the Twenty-First Century, 1999. Praeger, Westport, CT. Sexton Jr., Donal J. Signals Intelligence in World War II: A Research Guide. 1999. Greenwood Press, Westport, CT. Darling, Arthur B. The Central Intelligence Agency: An Instrument of Government, to 1950. 2002. Pennsylvania State University Press, University Park, PA. Macpherson, Nelson. American Intelligence in War-Time London: The Story of the Oss, 2003. Frank Cass, London. Hulnick, Arthur S. and Valcourt, Richard R. Fixing the Spy Machine: Preparing American Intelligence for the Twenty-First Century, 1999. Praeger, Westport, CT. â€Å"Espionage†. Grolier Encyclopedia of Knowledge, pp. 342-347, vol. 5. â€Å"Intelligence†. New Standard Encyclopedia, pp. 431-437, vol. 7. Lowenthal, Mark M. U.S. Intelligence: Evolution and Anatomy, 1999. Praeger, Westport, CT.

Wednesday, August 21, 2019

Bromination of (E)-Stilbene

Bromination of (E)-Stilbene Kaisha Butz Abstract: The purpose of this experiment was to synthesize the second intermediate (meso-stilbene dibromide) in the E-Stilbene reaction by Bromination. It was hypothesized that if the reaction was heated at 120 °C for five minutes the reaction between E-stilbene and the pyridium bromide perbromide would occur, and meso-stilbene would be created. After the reaction occurred the results were analyzed by IR and by an ignition test. The hypothesis was supported by the employed methods. Introduction: This experiment was performed to show how bromination of alkenes reacts, and to be able to successfully synthesize meso-stilbene dibromide. The reaction of bromine with alkenes is an addition reaction where the nucleophilic double bond attacks the electrophilic bromine (Mayo, et. al, 2013). Bromine only becomes electrophilic because of induction due to its ability to be polarizable (Mayo, et. al, 2013). Induction occurs when there is a transmission of charge (Bruice, 2014). Bromine as it approaches the (E)-stilbene’s double bond becomes polarized and takes on a slightly positive charge (Mayo, et. al, 2013). This allows it to form a cyclic bond (cyclic bromonium ion) with both sp2, now sp3, carbons. The cyclic bromonium ion takes on a positive charge and by anti-addition the second bromine (negatively charged) attacks from the back of the cyclic compound and bonds to either carbon on the opposite side of the other bromine. This creates a meso-stilbene which is 100% formed. Ther e are no stereoisomers formed (Mayo, et. al, 2013). It was hypothesized that (E)-stilbene, in a solution of glacial acetic acid reacted with pyridium bromide perbromide heated to 120 °C and cooled in an ice bath, would result in the formation of meso-stilbene. It was expected that only meso-stilbene dibromide would be formed, and that its formation could be tested by using IR. The Bromination reaction was also tested by an ignition test. Structures/Mechanisms: Material and Methods: Please refer to pgs. 444-449 of Microscale Organic Laboratory with Multistep and Multiscale Synthesis by Mayo, Pike, and Forbes. Deviations: Procedure was done in microscale: 230mg of (E)-stilbene was used instead of 600mg. 2.2ml of glacial acetic acid was used instead of 6ml. A 10ml round-bottom flask was used instead of a 50ml flask. The magnetic spin bar was a baby magnetic spin bar. 450mg of pyridium bromide perbromide was used instead of 1.2g. 2ml of glacial acetic acid was used to wash down the perbromide instead of 6ml. 4.5 ml of distilled water was used instead of 12ml. Acetone and distilled water were added drop-wise to the crystals instead of three 2ml of distilled water and two 2ml of acetone. Results: IR spectroscopy (E)-Stilbene attached to back IR spectroscopy meso-stilbene attached to back Table 1: Table 2: Table 3: Table 4: Calculations: Crystals: .2451g .1045g = .1406g Limiting Reagent: (E)-Stilbene .230g (E)-Stilbene * (1 mole / 180.25g MW) = 0.0013 moles .450g Pyridium Bromide Perbromide * (1 mole / 319.83g MW) = 0.0014 moles Theoretical Yield: 0.0013 moles * 340.05g MW = .4421g Percent Yield: (.1406g/.4421g) * 100 = 31.8% Discussion: It was found that after bromination of (E)-stilbene into meso-stilbene dibromide that the IR spectroscopy of both were relatively similar in the fingerprint region (à Ã¢â‚¬Å¡ 500-1000cm-1). This should be the case. The only difference in the spectroscopy was the lack of the carbon-carbon double bond in the meso-stilbene dibromide. The IR spectroscopy in the lab does not have the ability to measure the wavelength of carbon-bromine bonds because it is not within the range of the machine. Therefore, the two IR spectroscopies of the two substances were very similar because they both contained aromatic rings with similar wave numbers (cm-1) (Table 1, Table 2). It was expected that (E)-stilbene after undergoing bromination in a solution of acetic acid would produce crystals of meso-stilbene. That was the case! Success! Although the percent yield was low the experiment did produce meso-stilbene dibromide. This was supported by an ignition test. A part of the product was burned, and the flames were green. Green flames were indicative of bromide. Because carbon-bromide bonds were not seen in the IR spectroscopy, the flame test was necessary to show that the (E)-stilbene had, in fact, reacted with the pyridium bromide dibromide and created meso-stilbene dibromide. The percent yield could have been better. One mistake was that the (E)-stilbene was heated and dissolved at 85 ºC instead of 120 ºC. The experiment continued regardless, and the pyridium bromide dibromide was also heated and dissolved at 85 ºC. Once the temperature was noted to be too low the solution was placed back into the heat until the temperature reached 120 ºC. The improper temperatures were most likely the main cause for the low percent yield. The temperature was too low for the reaction to occur completely and effectively. According to Table 1 the primary peaks were all in the fingerprinting zone and were as follows: at wave number 961.39cm-1 (indicated a C=C bond), 762.29cm-1 and 690.00cm-1 (indicated aromatic ring structures). According to Table 2 the primary peaks were also all in the fingerprinting region and were as follows: 761.88cm-1, 688.59cm-1, and 626.87cm-1 (all of which indicated aromatic ring structures). The hypothesis was proven because meso-stilbene was synthesized even with the incorrect temperature at first. The (E)-stilbene reacted with the pyridium bromide dibromide to create meso-stilbene. Conclusion: It was found that (E)-stilbene could be brominated in order to synthesize the second intermediate in a line of reactions so that meso-stilbene could be obtained. The percent yield was poor yet present. The experiment could have gone more smoothly if the temperature had been monitored better, and the mixture not placed on the heat until it was sufficiently hot. That would have allowed for a higher percent yield then previously achieved. Bibliography Bruice, Paula. Organic Chemistry. 7th ed. Pearson, 2014. 1337. Print. Mayo, Dana, Ranold Pike, and David Forbes. Microscale Organic Laboratory with Multistep and Multiscale Synthesis. 5th ed. John Wiley and Sons, 2011. 751. Print.

Tuesday, August 20, 2019

Essay --

At the beginning of this century the German nation was, in all respects, one of the more civilized worlds. However, under the rule of Hitler, he came to use all their skill and strength to split support and extend a tyranny that mocked all the values of the civilization. The followers of Hitler, the Nazis, despised freedom tolerance, reasoned dialogue and simple human decency; they made use of the lie, mass hysteria and terror; they tortured, enslaved and wiped out millions of innocent people. If Hitler had won it is possible that it would have ended with the civilization in Europe and, although he died defeated, the atrocities that took place between 1933 and 1945, under Nazi rule, have been copied, too often, by others. National Socialism (or Nazism) had many points in common with fascism. However, its roots were typically German: authoritarianism and expand military of Prussian Heritage; the German romantic tradition opposed to rationalism, liberalism and democracy; various racist doctrines that Nordic peoples - the pure Aryan called - were not only physically superior to other races, but they were also their culture and morals; as well as certain philosophical doctrines, especially those of Friedrich Nietzsche, who idolized the State or uplifting worship superior individuals, which is exempted from abide by the conventional limitations. Among the theorists and planners of National Socialism was General Karl Ernst Haushofer, who exerted a great influence on the Germany foreign policy. Alfred Rosenberg, editor and leader of the Nazi party, formulated the racial theories based on the work of the writer Houston Stewart Chamberlain. The financial Hjalmar Schacht was responsible for develop and put int o practice much of the economi... ... socialist doctrine, containing in addition, propaganda techniques, and plans for the conquest of Germany and, later, Europe. Mein Kampf became the ideological foundation of National Socialism a few years later. This book, which would later give it to all German couples on their wedding day, as if was an outside of the Bible, consists of a series of rhetorical speech on a few issues such as nationalism, racism and the anti-democratic theories, together with a series of projects of future actions. This last part describes his intention to manipulate the masses by means of propaganda, always emphasizing that to achieve power, is worth everything, predicting a great global battle by the superiority of the race with a cynical frankness. Germany had to get rid of the restrictions of the Treaty of Versailles; it had to attack Russia to destroy communism. The truth is that

Monday, August 19, 2019

Godfather II :: essays papers

Godfather II The real importance of any movie can't be adequately appraised solely by box office success or critical response. 'The Godfather Part II† is an example of how a carefully crafted sequel to a great film can become both a box office and critical success when attention is paid to its artistic quality. The movie continues the tale of the Corleone family, and presents to the viewers a world filled with greed and betrayal, family union and loyalty. A companion piece in the truest sense of the term, â€Å"The Godfather Part II† earned as much praise as its predecessor, if not more. Earning twelve Academy Award nominations, the second installment has been rightfully hailed as the best sequel of all time. While "The Godfather, Part II" did not exceed the box office gross of the original, the movie can still be considered a blockbuster, and not at all a flop. â€Å"The Godfather† earned instant success when it was first released in 1972. Earning both praise from critics and box office success, making about $135 million, the movie became an instant classic. One of the reasons for the high status of â€Å"The Godfather Part II† lies in the fact that the movie was authored by the same author with the same intent in mind. While other sequels usually serve as nothing more than easy way for unimaginative producers to cash on previous successes, â€Å"The Godfather Part II† was a nice opportunity for â€Å"Coppola to experiment, correct some possible flaws or even answer to critics of his previous work.† (Dragan Antulov, IMDB) The biggest and most serious objection to â€Å"The Godfather† was Coppola's allegedly apologetic portrayal the Mafia. Coppola was accused of showing organized crime as being more noble and less violent than it actually was. His Mafiosi are shown as dedicated family men, opposed to narcot ics and any unnecessary violence, and in some way even better alternative to legitimate government. In the second movie, Coppola intended to use the story of the first part to paint more realistic and, consequently, much darker picture. Instant financial success did not follow â€Å"The Godfather Part Two† as it did the first movie. The reason was created due to the fact that the second movie represented one of the examples of the now generally despised practice in modern Hollywood, making sequels out of the successful, great movies. Godfather II :: essays papers Godfather II The real importance of any movie can't be adequately appraised solely by box office success or critical response. 'The Godfather Part II† is an example of how a carefully crafted sequel to a great film can become both a box office and critical success when attention is paid to its artistic quality. The movie continues the tale of the Corleone family, and presents to the viewers a world filled with greed and betrayal, family union and loyalty. A companion piece in the truest sense of the term, â€Å"The Godfather Part II† earned as much praise as its predecessor, if not more. Earning twelve Academy Award nominations, the second installment has been rightfully hailed as the best sequel of all time. While "The Godfather, Part II" did not exceed the box office gross of the original, the movie can still be considered a blockbuster, and not at all a flop. â€Å"The Godfather† earned instant success when it was first released in 1972. Earning both praise from critics and box office success, making about $135 million, the movie became an instant classic. One of the reasons for the high status of â€Å"The Godfather Part II† lies in the fact that the movie was authored by the same author with the same intent in mind. While other sequels usually serve as nothing more than easy way for unimaginative producers to cash on previous successes, â€Å"The Godfather Part II† was a nice opportunity for â€Å"Coppola to experiment, correct some possible flaws or even answer to critics of his previous work.† (Dragan Antulov, IMDB) The biggest and most serious objection to â€Å"The Godfather† was Coppola's allegedly apologetic portrayal the Mafia. Coppola was accused of showing organized crime as being more noble and less violent than it actually was. His Mafiosi are shown as dedicated family men, opposed to narcot ics and any unnecessary violence, and in some way even better alternative to legitimate government. In the second movie, Coppola intended to use the story of the first part to paint more realistic and, consequently, much darker picture. Instant financial success did not follow â€Å"The Godfather Part Two† as it did the first movie. The reason was created due to the fact that the second movie represented one of the examples of the now generally despised practice in modern Hollywood, making sequels out of the successful, great movies.

Sunday, August 18, 2019

Galapagos Essay -- essays research papers

Kurt Vonnegut's Galapagos was written one million years ahead of the year 1986 AD. In this book, Vonnegut argues that the ultimate effect of humanity's sociological problems with technology is that man's intelligence will be the downfall and destruction of the human race. The essential point made by Vonnegut in this work is that the "great big brains" of humanity drives people to go further into technology and create new weapons that will lead to the demolition of man kind; Vonnegut disagreed against virtually every technological development (made by â€Å"big brains†). It was the humans’ â€Å"big brains† that always gave them foolish or reckless ideas that almost always had negative results. Though it may tell the rest of your body to do the things that make you eat, breathe and sleep, it will occasionally tell you to something that might endanger or kill you. For example, Mary Hepburn’s big brain was telling her she had nothing to live for, and gave her the urge to grab the plastic wrap from her red gown to suffocate herself and commit suicide (page 26). Kurt Vonnegut journeyed into the minds of each of the characters, the readers are be able to know what the character was thinking, which played a good part in the story; particularly because the author made mention to how the great big brains of one million years ago (1986 A.D.) gave people all of these thoughts and ideas that people â€Å"today† can’t do with their smaller brains. The characters begins with a ghost of a deca...

Saturday, August 17, 2019

Different Change Models

Change is vital in any organizations bid to achieve its objectives. It is thus important for any organization to manage the change process carefully. Different change models such as Lewin’s, Mckinsey’s 7- s and Kotter’s eight step change models can be used to effectively handle the change resulting from the purchase of EEST by Quest Culture. Lewin’s model. A basic notion about this model is that change is a journey rather than a simple step. Kurt Lewin identified three stages of change; unfreezing, transition and refreezing.Unfreezing. According to this model, people in the face of a change will feel uncomfortable and hence various significant efforts will be necessary to get them moving (Janis I. L & Mann, 1977)). This entails the use of push principle and pull methods to keep them going. Transition. For change to occur, time is required. Various levels of misunderstandings may also be witnessed during this stage. Training, counseling and any other psycho logical support will be necessary. Refreezing.This is the final stage according to the model which involves putting the change process into action. In most organizations, this stage can have positive or negative impacts. Positive in that it makes the next stage of unfreezing easier and negative in that it might reduce the employees efficiency and effectiveness as a result of the change process Lewin’s model is very helpful in explaining human behavior. Every form of learning starts with a state of discomfort or frustration.Motivation and change mechanisms are thus necessary. Combination and elimination of excess positions as a result of the acquisition might result to discomfort hence Lewin’s model would be most effective in such situations. The advantages of this model include; Innovation. Solutions to problems or new ways to achieve the organizational objectives are established. Provides ways for evaluating progress towards the change hence making the change process easy. It helps in allowing the change process to be easily understood.It is done in steps which prove it to be an efficient model still applicable today. The main disadvantage of Lewin’s model is that it is timely for any change to take place. The other disadvantage is that during the refreezing stage, the employees might be worried of another change resulting to a change shock which might result in their inefficiency or ineffectiveness in discharging their duties. Mckinsey 7-s model This was developed by Tom Peters and Robert Waterman while working for Mckinsey & Co.and in 1978 by Richard Pascate and Anthony Athos (Janis I. L & Mann, 1977). The model considers a company as a whole by taking into consideration seven different factors: strategy, staff, skills, systems, styles (organizational culture and management styles), structure and shared values such as mission and vision statement. This model would be most effective in situations where change is to be effected in the who le organization as opposed to a single department, product or process.The advantages of this model include: It provides a better way to study and understand an organization; it is a guide to organizational change as it combines both coherent and emotional parts and since all the parts are interrelated, they must be attended to and addressed. The major disadvantage of this model is that since all parts are interrelated, a change in one causes the whole system to change. The other disadvantage is that the model ignores differences. Kotter’s eight step change model.Kotter identified eight steps for a successful change (Chapman, A. 2006). These include; Problem definition. This refers to what is causing the change. Identification of a change agent. The agent must have clear knowledge of the situation and experience of the change process. Constructing the vision. This is where the organization wants to be after the change process. Communication. For change to occur, communication (both upwards and downwards is necessary). Empowerment. Everybody involved in the change process needs to be empowered.Creation of short term goals. Rewards are very important at this step. Persistence. This is necessary even after meeting the short term goals. Implementation. This is by putting the change into the company’s culture and practices. Kotter’s eight step model can be most effective in various diverse situations as opposed to the other models. Organizations despite their size, public or private status can use the model. However the model may lack or override nuances or realties that could be specific to a certain type of organization.The principles may also apply equally to all organizations but how the principles will be implemented might be different from one situation to another. Advantages of this model include; Step by step model. Just like Lewin’s model, Kotter’s model is a step by step model easy to follow and understand. Enhances chang e in that instead on concentrating on the change alone, other factors such as acceptance and preparedness for change are also well thought-out.The major disadvantage of this model is that since each step is necessary, one step cannot be skipped otherwise the whole system will fail. The other disadvantage is that the model is time consuming since the steps involved are numerous. In my view the best model for the acquisition of EEST by Quest corporation is the Kotter’s eight step model as it prepares the employees fully before even the mission is created hence enhancing the transition process.

Friday, August 16, 2019

Alcohol withdrawal syndrome Essay

Should the drinking age be lowered? This question is one that has hounded us for decades. At age eighteen we are legal adults, we can join the military, vote, and anything else that any adult could legally do. So then why can we not drink till age 21? In my opinion we should not lower the drinking age. If we keep the drinking age to 21 we can save lives, save people from becoming addicted to alcohol, and lastly our brains are not fully developed till at least age 21. We know through history that keeping the drinking age at 21 can save lives. In 1971, we adopted the 26th amendment and this not only lowered the voting age but also began lowering the drinking age around our country. End result leading to 29 states lowering the drinking age. Immediately we began to see a steep increase to teen death in relation to alcohol. Shortly after 24 states rose the drinking age again and by 1984 there were only 3 states left with the drinking age of 18. According to the NHTSA (National Highway Traffic Safety Administration), â€Å"increasing the minimum drinking age to 21 is credited with having saved 18,220 lives on the nation’s highways between 1975 and 1998.† Alcohol addiction is very serious. We say addiction runs in families and based on this I feel like most families have at least one relative addicted to alcohol. Alcoholism is a medical and social problem in our country. â€Å"At least 75-80% of defendants involved in felony crimes or serious misdemeanors were either under the influence of alcohol or drugs when they committed their crime or committed their crime to obtain money to obtain alcohol or drugs or to survive because they have lost their financial resources due to their addiction,† Said by criminal justice experts. Alcohol addiction can lead to high divorce, suicide and dropping out of school rates. We also know that teenagers can become addicted to alcohol quicker (6-18 months) while adults can come addicted to as late as 5 years, this studied was conducted by Karen Burger. The longer we can postpone alcohol use, the better the chance that a person will never have an addiction or problem with alcohol. Lastly and most importantly alcohol can affect your brain growth immensely if you are a heavy drinking or even drink at all before age 21. This is because the brain has not fully developed until you are AT LEAST 21. Alcohol affects the area of the brain that control judgment which is why people tend to do more immature things while intoxicated rather then when they have a good head on their shoulders. Drinking at younger ages makes you less appreciate the consequences for the risky actions that you are taking with drinking underage. It also slows perceptual and motor skills. Drinking in these formative years and cause irreversible damage and the only person you would be hurting would be yourself. In conclusion, I believe the drinking age should not be lowered based on these very serious reasons. We need to help our country stay in tact and create less crimes and deaths and more people who want to help our country prosper. All and all drinking at any age is bad for you until you learn how to handle it, only you can decide when that is. If you plan your life out intellectually you can all the time in the world to figure it out.