Wednesday, November 27, 2019

Porphyrias Lover, My Last Duchess and To His Coy Mistress Essay Example

Porphyrias Lover, My Last Duchess and To His Coy Mistress Paper I have chosen two poems by Robert Browning, Porphyrias Lover and My Last Duchess, and one by the earlier poet Andrew Marvell, To His Coy Mistress. In this essay I plan to compare the contrasting approaches to love in these three poems, and how the poets achieve their aims through language. This can be done using poetic devices such as enjambment, rhyme scheme and meter and language including diction, metaphors and similes. My last Duchess is a dramatic monologue. This means that only one person is talking and therefore only his point of view is shown. This point of view shows his personality and how he feels towards his wife. The poem begins, Thats my last Duchess painted on the wall, Looking as if she were alive. I call. That piece a wonder, now: Fra Pandolfs hands Worked busily a day, and there she stands. This gives the reader the impression that the man does not care about his wife, but more about the value of the painting and how a famous painter spent lots of time painting it. Straight away the reader can see that this man is cold and not passionate towards his deceased wife. We will write a custom essay sample on Porphyrias Lover, My Last Duchess and To His Coy Mistress specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Porphyrias Lover, My Last Duchess and To His Coy Mistress specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Porphyrias Lover, My Last Duchess and To His Coy Mistress specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Two easily impressed: she liked whateer She looked on, and her looks went everywhere. Here the man believes that his wife was too easily impressed and affectionate towards others and other things. He wants his wife to adore him and no other, and therefore is a selfish man. This also includes enjambment which makes the dramatic monologue seem more like a speech which he is dictating and shows him as very egotistical and self absorbed. The speech becomes very disturbing when he says: Then all smiles stopped together. Here he is morbid and cold hearted as he is saying that because she did not completely adore him, he killed her, or at least that is the impression the reader gets. His selfish personality has become disgustingly evil as he is willing to kill his own wife just because he did not have her complete admiration. How horrid and mean must a man be to do that? Together down, sir, Notice Neptune, though Taming a sea horse, thought a rarity, Which Claus of Innsbruck cast in bronze for me! Here he has moved on from showing his guest the painting to another one of his prized objects, and that is what he sees her as, an object. Just like an object she was disposed of just as easily as she was obtained. The reader by the end of the poem understands that the man has no passion towards his previous wife, only the disgust of how his wife was too easily impressed, which to most people would be seen as a good quality. This is in great contrast to Porphyrias Lover as this shows no passion at all, and Porphyrias Lover is all about passion and emotion. The rain set early in to-night, The sullen wind was soon awake. The rain and hard wind show the mans mood, and this is an unhappy and loveless one. This mood however is completely reversed, When glided in Porphyria; straight She shut out the cold and the storm. Now the cold and storm have gone, showing his previously discontented mood has been rid of , and he is now full of love and happiness due to a beautiful damsel fleeing from the storm and seeking shelter. This poem is inclusive of the weather and another character unlike My Last Duchess which includes only one character, the rich man. This poem may be less egotistical but still just as sinister, unpleasant and inclusive of death. He falls deeply in love with Porphyria and wishing that time would stand still he took her hair in one long string, and wound it Three times her little throat around, And strangled her. Unlike seeing her as an object, he sees her as a wonderful woman, on a higher level, but the twist is whilst they are in such deep love with each other he kills her. This may be seen as selfish as in the last poem but she loved him too so in his twisted mind it was fine to keep this moment where they love each other forever, and to do this he kills her. He still is in just as much praise of her as before and believes she is such a brilliant woman. Like the last poem this is sinister, but is very passionate. To His Coy Mistress is also very passionate, but is not cold like the others. It is more for comic purposes as the way in which the man talks to the mistress to get her in bed with him is comic. My vegetable love should grow Vaster than empires, and more slow; An hundred years should go to praise. He rudely and comically uses vegetable love as a metaphor for his penis erecting and then says how he wants to praise her. The first stanza therefore is all about the lustful man saying that if there was time enough he would spend it praising her. This is all very comic and would seem so to the coy lady. I believe it would make her laugh and blush and the man to her would seem witty and appealing. However, unlike in the last poem where the woman is seen as a wonderful woman who is on a higher level, here he is trying to reduce her and bring her down to his level and in to his bed, literally. It retains however the passion. This passion is in the form of lust and Porphyrias Lover is more passion in the form of love, however disturbing it may be. In conclusion love in these poems is portrayed in a number of different ways. My Last Duchess is very cold poem where the woman is objectified and there is a distorted view of love. There is also little passion shown. Porphyrias lover is quite a passionate poem, which portrays the woman as respectable and brilliant. However the love becomes sinister as in My last Duchess. To his Coy Mistress is much more light hearted than the others and is comic. The poem is quite passionate, but lust is the form of passion and that is not true love, but a love that like in My Last Duchess objectifies the woman. Also the women in the two poems are seen as less important as in Porphyrias Lover which represents the woman as the most important thing in the world. Therefore Browning poems are more sinister and different to Marvell which is more like Donne as their poems are more co mic and lustful.

Sunday, November 24, 2019

Running Essays - RTT, Diverticulosis, Physical Fitness, Free Essays

Running Essays - RTT, Diverticulosis, Physical Fitness, Free Essays Running In this study, I investigate the affects that running has on reducing the risk of some health problems. I am doing this because I run about 40 to 60 miles per week, and my family has a history of health problems. For instance, my grandfather suffered a heart attack, and he also had cancer when he was about the age of 50. Furthermore, my grandfather, on my dads side of the family, has also had triple bi-pass heart surgery from a heart attack he has had recently. Here, I present information from some sources that talk about the affects that running has on reducing health risks. My sources agree that running, and some other aerobic exercises, reduce the risk of: Diabetes, diverticular disease, heart decease, several types of cancer, and even common sicknesses like a cold. One source agrees that running reduces the risk of diabetes. Jim Harmon writes, in Sports Illustrated, about Bruce Leonard, a marathoner with a masters degree in public health. Bruce Leonard went to study the Zuni Indian tribe. This tribe has had a bad history of diabetes until they started to run. Leonard said, After the Zuni tribe started running, many Zuni were able to reduce or eliminate their diabetes medication.(5) My research also reveled that diverticular disease can be reduced in men that run. For instance, Marty Munson and Teresa Yeykal writes in the article Outrun trouble which says, guys who racked up the most ours doing vigorous exercise reduced their risks of diverticular decease by a third.(38) They also say its good advice to make your lifestyle to consume high fiber.(38) I found that running can also reduce the risk of heart disease. The article Run for your life talks about Mitchell H. Whaley, the director of adult physical fitness program at Ball State University. He analyzed data collected from a group of men, which included runners. Mitchell Whaley found that individuals with low aerobic capacity have a higher risk of developing premature coronary artery decease that those who were more fit.(47) The article also talks about Martha L. Slattery, Ph.D., from the University of Utah Medical School. Maria Slattery also found that running is a good preventive measure for heart disease. She says, The greatest increase in protection was between those men who were sedentary and those who had some activity.(48) Another source I found says that running can help prevent many types of cancer. In the article Running for your life, Doctor Leonard Cohen talks about how running helps reduce colon, breast, cervical, uterine, and ovarian cancer. Cohen says A growing body of evidence suggest that physical activity reduces the risk of cancer, particularly colon and breast cancer.(23) Overall, my sources state that even though running isnt a cure, it is definitely a preventive measure for many health problems. They all agree that running can do no harm, and there are many positive aspects. After doing this research, I am going to continue running or at least some king of aerobic exercise, hoping that it will prevent me from following in my grandparents footsteps.

Thursday, November 21, 2019

Terrorism, Urban Guerrillas, The Case of Greece, Interaction of the Essay

Terrorism, Urban Guerrillas, The Case of Greece, Interaction of the phenomenon with the city - Essay Example Coming to violence, there has been an evolution of the means and methods used in the past and those of the modern twenty first century. The barbarity of the old form of violence cannot be expected to come back in modern sophisticated times. However as Baudrillard observes, the violence of the old â€Å"was more enthusiastic and more sacrificial than ours† (Baudrillard, 1993, p. 75). In contrast, the violence of modern times is more of â€Å"terror† struck by the changing ideologies of hypermodernity. Hoffman calls this a â€Å"simulacrum of violence†. This change in the form and objectives of the terrorists over the years can be explained with the psychoanalysis of Baudrillard and Lacan and the interplay of the symbolic and the imaginary. It is also important to note here the role of the unconscious, its connection to the Real and the way it is related to terrorists’ activities (without any definite objective). Terrorists function with the bigger goal of s timulating the psyche of the masses across the word and creating a strong global impact, thus acting within a symbolic order and trying to create meaning. A simulacrum is the representation of the reality according to Borges fable where the map represented the changing territories of the Empire. Simulation can no more be anything substantial; it is rather something, which originates from nothing or a ‘void’, ideally referred as the ‘hyperreal’ - â€Å"truth that hides the fact that there is none† (Baudrillard, 1994, p.1). The act of simulation refers to the pretention of having something which one does not possess. However this simulation might challenge or threaten the gap between what is true and false or the real and the imaginary. For instance, a person who pretends to be sick needs to produce some of the symptoms of the illness to make it look like the truth. Now if illnesses can be produced then medicine does not hold its significance. Psychoan alysis explains this as the transfer of the â€Å"symptom of the organic order to the unconscious order: the latter is new and taken for â€Å"real† more real than the other.† (Baudrillard, 1994, p.3) Baudrillard in his work The Transparency of Evil refers to such simulation of terrorism the result of a ‘plunge into the void’ by the society (Baudrillard, 1993, p.76). Normally, the military law would punish the simulator after he is unmasked, following the identification norm. Military psychology avoids Cartesian certainties and believes that if one is good at producing the symptoms then one actually is that good. The unconscious is therefore the real to Baudrillard (Baudrillard, 1994, p.4). The relation is no more similar to the map and the territory. The relation can be more easily explained by the mention of the screen, which evokes the passion for the action. It is all about the violence in form of image. Baudrillard stresses on the presence of media wh en he observes this – â€Å"it is advisable not to be in a public place where television is operating, considering the high probability that its very presence will precipitate a violent event† (Baudrillard, 1993, p. 75). The media therefore provides a modern dimension to the incidence of violence. The causes when analyzed do not refer to the typical political, sociological or psychological reasons, which can explain such events. It is rather about publicity, which creates the mass appeal required. The same thing happened where hijackers

Wednesday, November 20, 2019

Disposal of Industrial Wastewater and Alternatives Essay

Disposal of Industrial Wastewater and Alternatives - Essay Example It is not surprising to meet industrial sewer water spilling on the surface. Notably, no one seems to see the impact that the industrial sewer water has to the society. Water serves the society in almost all aspects. Arguably, industrial functions, domestic functions, and environmental functions require water. This certainly means that all process in both environmental setup and industrial set up require water. It is right, therefore, to argue that water is the source of human livelihood. That well said, environmentalists argue in favor of processes or activities that preserve sources of water. Constant awareness creation has acted in the recent past as a tool that used by the environmentalists to enlighten the society about the consciousness in preserving nature. On the other hand, development conscious think tanks work proposals that aim at creating more opportunity that would lead to development.   Industrialization and activities relating to it have often featured in their-ever-changing- development agenda. Industrialists site a number of reasons that support their course in the society. First, industrialization creates opportunities for the society such as employment. These opportunities promote the well-being of the society. Second, promoting industrialization ideology creates an opportunity for trade among countries or states. Trade brings products to the proximity of the consumers. What would happen when there is no trade? Would people be able to get products they need in the society? Holding social fabrics together entails a number of factors, which must promote the existence of people. Do we argue that environment has limited opportunities to offer to humankind? Probably not, but exhausting the opportunities in the environment would create a detrimental outcome to the society.

Sunday, November 17, 2019

Summary and opinion Research Paper Example | Topics and Well Written Essays - 1500 words

Summary and opinion - Research Paper Example Bankers state that pricing an offering for the company to register quick gains once the trading begins is the best approach. This is because the strategy enables the company to improve its relationship with the big investors while at the same improving the reputation of the company in the market. However, too much of hype is detrimental to the success of the company in the market. This is because the investors who buy the shares during the first week are likely to sell them very quickly in order to make high returns. In order to avoid a runaway stock, the company should control the number of shares it offers in the market. This is to reduce the demand which might increase the prices. In addition, the company should control the information being released in the market to avoid creating unrealistic expectations among the investors (Raice, 2012). Some companies might prefer to raise as much money as possible once they introduce the shares in the market. This approach can work with investors who are likely to be patient. However, there is a high risk that the prices of the shares might decline in the first weeks of trading. Therefore, creating a strong investor relationship is very important in securing the future of the company. Therefore, the company should communicate effectively, observe the ethical standards, comply with the set rules, and audit its operations in order to identify the need to make changes (Raice, 2012). With the entry of the internet in the market, it is becoming very hard for the companies to control the pop associated with entering in the stock market. However, companies need to audit their books in order to know their worth before releasing the information to the market. This is to ensure that they have a strong base to support their operations in case the shares fail to raise the expected amount of money. This has seen many companies fail to reach the target as many of the initial

Friday, November 15, 2019

Importance of Smartphone Security in Business Environment

Importance of Smartphone Security in Business Environment 1.0 Introduction The purpose of this document is to expose a business problem from a technological viewpoint. The subject of the business problem I have selected is smartphone security. This subject will be analysed and critically evaluated, then expanded upon further to reflect the range of possible solutions and raise awareness of the risk and need of smartphone security. 1.1 Aims and objectives Aims Create an authoritative document with recommendations to raise awareness and inform businesses for the need of greater mobile security within the business environment. Use insight to establish a research gap. Main objectives Assess smart mobile devices currently used. Analyse security advantages and disadvantages of smart mobile devices. Establish what risks smart mobile devices are exposed to. Evaluate impact of risk exposed by unsecure mobile devices to businesses. Examine mobile security currently available. Investigate responsibility Evaluate current business policies and procedures for mobile devices and how these can be enforced. Construct smartphone security guide with recommendations for businesses. 1.2 Problem statement The problem is information and financial loss due to information theft or inaccessibility from malicious software, and the detrimental impact this has upon the business. A recent report from Gartner (reference report) indicates that sales of smartphones have grown exponentially and businesses are reaping the benefits gained from smartphones, however their use also creates security risks and opportunities for cybercriminals. There are many types of information that can be stored on smartphones for example, personally identifiable information in the form of identity credentials, email, SMS and MMS messages, GPS coordinates, passwords, company documents and connectivity access information to company servers as just some of the examples. Information security has gained significant value within the business domain over the past decade however this value remains subjective (why subjective? And value pertaining to what?). Users have been made aware of the risks posed by malicious software whilst using their personal computer on the internet, now assistive technology like smart mobile devices are becoming increasingly more powerful, functional and ubiquitous. Where personal computers have at least some security software in place as standard, smartphones commonly have no security software installed as a standard and are susceptible to (Malware, Viruses, trojans,etc-examples please ;)) the exact same threats as to personal computers. Businesses, professionals and personal users now have a greater awareness for the need of personal computer security. This has been provided by media coverage, enterprise training or through personal experience. When using a personal computer or laptop for example, it is common to find a firewall and antivirus software installed showing that internet safety has now become a social normalcy. â€Å"†¦Smartphones are more powerful than supercomputers were a few years ago, and we are putting them in the hands of people whove never had anything like it before. Google CEO Eric Schmidt As Schmidt states smartphones are pervasive devices, workers typically need training on these devices as they are multifunctional and unless people are aware of the threats these devices pose the consequences can be detrimental on the business. Todays organisations rely heavily upon information technology in order to allow their business to function (Khosrowpour, 2001). This is fundamentally due to how intricate information technology systems are embedded into organisations. Smartphones provide businesses with many new opportunities (sweeping statement-what opportunities and is this your opinion/referencing?) however these opportunities provided by smartphones exist not just for business and personal users as the opportunity extends to cybercriminals too. Malware is one of the most common sources of security failures within businesses currently (sweeping statement-most common according to who?), they have the same capabilities as personal computers and are used within business environments in the same manner, however they are typically unsecure and rely solely upon the standard out-of-the-box security features with no antivirus or firewall present. There are many different mobile operating systems for smart mobile devices requiring different security applications. The operating systems and the risks associated will be carefully analysed. The intentions of this paper are to investigate what impacts smart mobile devices can have on businesses, why these problems affect the organisation, and how they are overcome. Finally, insight will be gathered and recommendations made so that businesses can use to foresee and prevent future unnecessary costs and risk. 2.0 Literature review The focus of the subject proposed for this project is a very real-world business and information technology problem. Smartphone security is a recognisable potential problem for both individuals and businesses as most smartphone users including businesses and educational establishments do not have any specific policies in place to safeguard from smartphone security related issues. Because smartphone security is still in its infancy, it will be a challenge to source accurate and relevant information from authoritative sources such as ‘Emerald without resorting to web based research. However, the more this project advances smartphone security in the media is becoming omnipresent. For the project a survey will be proposed in order to gain knowledge for understanding how aware users are for the need of smartphone security. This survey will target as many participants as possible in order to gather appropriate primary evidence. Interviews will be conducted with professionals in the field of smartphones and security such as police personnel, security advisors and mobile phone shop staff to ascertain levels of security training, public security literature and knowledge. Authoritative information sources will be used to gain technical information directly from manufactures, websites and retail outlets such as Apple, Android, Research In Motion, Nokia and Microsoft for documentation on smartphones and smartphone platforms. Only technical information will be used from these sources as it is in manufacturers interests to sell their products Analysis of the survey will be done using statistical analysis tools including IBMs ‘SPSS, ‘SPSS Text Analysis software and more modern statistical analysis web-based techniques such as MarketSight. MarketSight is a hosted research data reporting environment accessible by the internet and only available through the internet browser Microsoft explorer whereas SPSS is software directly installed onto a computer. ‘Malware: the new legal risk the paper written by Verine Etsebeth in 2007 has invaluable source material for this project. Acquired from Emerald Insight, it is very suitable to this project as it highlights the threat of malware and risks posed to businesses. It is well written and authoritative however Emerald specified it was unique as no such document has been published previously. The majority of sources used by Etsebeth are from Harley, D; Slade, R and Gattiker, U. Etsebeth references Viruses Revealed (McGraw-Hill, New York, NY 2001) This source is recognised and trusted within the industry as a whole and is considered to be authoritative and well-documented on its own merit. This paper focuses on the legal and professional implications of malware on companies in South Africa Etsebeths home town. This paper is very suitable for this project as it is a very well written and authoritative document, the majority of sources used by Etsebeth are from Harley, D., Slade, R. and Gattiker, U. (2001) Viruses Revealed, McGraw-Hill, New York, NY. The source used by Etsebeth ‘Viruses Revealed as a well-documented authoritative document published by McGraw-Hill, a recognized trusted source. Etsebeth is a senior lecturer in the Faculty of law specialising in the areas of law and information security. Although Etsebeths paper ‘Malware: the new legal risk is highly suitable in terms of qualitative information, it lacks suitable geographic law for the scope of my project. I will use the information provided by Etsebeth for Malware, as this information is not geographically bound, and analyse the legal implications after comparing them to UK law. Etsebth highlights that companies are reluctant to report cybercrimes as it has negative implications on the companys reputation this correlates to my hypothesis. ‘Understanding the spreading patterns of mobile phone viruses by Pu Wang, Marta Gonzalez, Cesar Hidalgo and Albert-laszlo Barabasi is a technical journal based on mobile phone virus modelling and the understanding of spreading patterns. The journal was published in 2009 and investigates various mobile platforms relating to my assignment however the document is a highly technical report based on the mathematics of virus spreading patterns, I find this report to be highly enlightening however due to the technical awareness of the target reader of my assignment I believe this report to be too technical and out of scope. Authoritative information directly from manufactures websites and retail outlets will be used including Apple, Android, Research In Motion, Nokia and Microsoft for documentation on smartphones and smartphone platforms as this will allow me to access accurate and current reliable information directly. Secondary information sources will be avoided where possible such as blogs and review websites for direct smartphone technical information as these types of resources may facilitate in providing inaccurate facts. Local mobile phone retail outlets such as Orange, Vodaphone, Phones4u, The Carphone Warehouse, O2 and T-Mobile will provide me with valuable information on device security awareness. I will enquire on staff security training and in-house company security literature currently available to public and business consumers as this will affect the average smartphone users security awareness. After investigation smartphone security I established that some research in this area had been done already by Goode Intelligence a UK company based in London. ‘Goode Intelligence is a company that provide strategic research and analysis that specialises in information security. Founded in 2007, Goode Intelligence has provided clients globally with statistical information from evidence accumulated from surveys in the field of information security. Goode Intelligence is viewed as an authoritative market leader of information security consumer information. 2.3 How this project fits in with the literature review I had chosen the subject then chosen the literature review method, thus tailoring the literature review to fit the requirements of the project. The Survey will allow me access information on how smartphone users actually use their device, how important they view the information stored on the device and users perception of the need for security 3.0 Research methods 3.1 Hypothesis ‘Businesses are not aware that they are at risk of information and financial loss or theft due to malware infections on smartphone devices. Information Technology consultants have recognised the gap in security for mobile devices, however it was soon realised that the physical security of the device was not the real issue, as the need for smartphone security awareness within businesses was a far greater concern. Experience establishes that the best form of security is the awareness for the need of security and why by the individuals who use the technology. Smartphone malware is not seen as of great importance to IT professionals, business managers or general consumers. A majority of smartphone users use their devices for both business and personal use and a large share of smartphone users will be using their personal smartphone for work related activities. The assumption is based that most individuals would know what information they deemed as confidential, more specifically, what information would they not like others to access to include such things as calendar, contacts, photos, emails and files. IT professionals should be the most aware group of smartphone malware risk, as their experience and technological awareness should allow them to be more technologically security aware. Antivirus used on personal computers is well known to hinder system performance and conflict with some applications and other software, The hypothesis is that antivirus products will consume more system resources then current smartphones can afford to offer and require more power from the device ultimately reducing the battery life and impacting negatively on overall system performance, rendering the device unusable by the average user. The perception of products such as the iPhone are viewed as secure out-of-the-box along with Blackberry smartphones as they are mostly touted by mobile phone shop staff as business orientated secure devices. 3.2 Methodology The project will be implemented using a triangulated, positivistic methodological approach. The particular technique chosen this will provide a balanced view of the subject area. It will incorporate both quantitative and qualitative primary research methods as reffered to by Bryman as multi-strategy research (Bryman, 2006). The scope of this project will mostly be Quantitative based research as indicted in Fig 1 below. Bryman advises that quantitative data can be gathered by way of a survey and qualitative research collected from journals and interviews. The Initial research will be conducted using primary research in the form of a cross-sectional survey questionnaire with closed questioning, interviews with professionals in the field of smartphone related security such as police personnel, security advisors and mobile phone shop staff will also be conducted to gain knowledge of their awareness of smartphone security and what advice they provide. The survey will be available to respondents in paper form where needed however the survey respondents targeted will mostly be from the internet so it is required that the survey be electronically hosted. The web-based survey distribution method selected is ‘Survey Monkey. The main motivations for selecting ‘Survey Monkey are reputation, administration features, ease of access and user layout familiarity. The survey will be designed to be concise and simple to maximise the amount of respondents in order to gain quality information. The target survey population will represent business managers, IT professionals as well as individuals who use their smartphone for personal use to establish users who admit to using their smartphone for both business and personal as opposed to personal use only. This is suggested by Baxter as an important step in defining who should be included and excluded from participating in the survey (Baxter, L. Babbie, E, 2004). The users have been targeted as the project will establish not only the perception of smartphone security but also what smartphone policies and procedures are currently in place and how aware users are of these. Research indicates that an ideal resource for the proposed target users is through a popular internet based technological social news website named ‘Reddit. ‘Reddit has a daily turnover of over 850.000 unique users (Alexa, 2010). According to Alexa the average ‘Redditors are male between the age of 18 to 44, are well educated and browses ‘Reddit either from work or home, suggesting that the majority of ‘Redditors are working professionals in the technology field.This suggest that the average ‘Reddit user is technologically aware (Alexa, 2010), suggesting that ‘Reddit would suit the proposed target survey participant. The proposed project will be delivered using an analytical in-depth research structure. This project structure has been selected as it will primarily be research based on the current business problem as previously stated. The intentions are to analyse the problem, understand how aware people are of the issue and propose possible solutions, One method of analysis proposed is the conceptual method, as described by Beaney as a way of breaking down or analysing concepts into their constituent parts in order to gain knowledge (Beaney 2003). I have interpreted this to mean the compartmentalisation and analysis of data. Critical and creative thinking skills such as Edward.De Bono six thinking hats will be used to examine the problem domain. A review will be given on how the systems work and compare them to how they should work. I will then analyse the solution domain by examining which options are available to improve the system security along with optimal recommendation and the benefits this would provide. ‘SPSS is a well-established statistical analysis application first released in 1968. Randomised questions, Marketsight. Survey design 4.0 Results 4.1 Presentation and description of results Who took part? The survey was conducted to establish the awareness of information security and the need for smartphone security. Users were openly invited from technological backgrounds to partake in the survey and assured of anonymity. A total of 758 people responded to the online survey from a possible 854,998 potential participants (Fig. 2). The survey itself was open for one month during February and March 2011. The results indicated in Figure 2 that a majority share of survey participants, with 82 per cent being male and 18 per cent female confirms my survey target gender. When asked, both genders averaged at age 26 (Fig. 3) as denoted in Figure 3, again confirming my target survey demographic groups. When asked 53 per cent of respondents reported they had used their smartphone solely for personal use, opposed to 45 per cent of partakers that reported they used their smartphone for both business and personal use, with 2 per cent reporting to use a smartphone solely for business use only as shown in Fig. 4 combining a total of 47 per cent. 25 per cent of respondents had only been using smartphones for the past six months, 17 per cent were aware they had been using them for at least a year and a majority percentage of 59 per cent had been using smartphones for more than one year seen in Figure 5. Only 12 per cent of respondents opted to use the ‘pay as you go payment facilities as opposed to the greater majority of 88 per cent that have contracts shown in Figure 6 below. 87 per cent of participants reported that they did not use any form of smartphone security software such as antivirus as opposed to 13 per cent that did as highlighted in Figure 7. SMARTPHONE In answer to the question â€Å"What type of smartphone do you currently use?† 34 per cent of respondents said they used an Apple IPhone, 58 per cent reported to use Android smartphones, 13 per cent used Blackberries and 6 per cent of respondents had Symbian smartphones (Fig. 8). 87 per cent of respondents had used calendar functions, 94 per cent of respondents used email, 86 per cent of used games, 87 per cent of respondents used GPS features, 74 per cent of respondents used instant messaging, 52 per cent of respondents used internet banking facilities, 66 per cent of respondents used multimedia messaging service (MMS), 94 per cent of respondents used the short messaging service (SMS) feature and 78 per cent (Fig. 9) of respondents admitted to using social networking sites on their smartphone. 93 per cent of survey partakers used 3G for mobile data communication, 59 per cent of respondents used ‘Bluetooth technology, only 4 per cent of had used infrared line of sight technology, however 75 per cent of respondents admitted to connecting via universal serial bus (USB) and 94 per cent of participators had used wireless for mobile data communication shown in Figure 10. Total of 757 participators answered this question and 1 partaker chose to skip the question. From a total of 758 respondents, 63 per cent (476) valued the physical smartphone above the 37 per cent (282) whom valued the information more. Figure 12 shows 62 per cent of survey participants reported that they did not pay attention to licence agreements and permissions when installing applications on their smartphones 34 per cent reported they did read the licence agreements and permissions. 4 per cent of respondents believed that this question was not applicable to them for their smartphone use. The awareness for the need of personal computer security is apparent as 81 per cent of responders were aware for the need of security software for personal computers as opposed to the 19 per cent who were not aware. 94 per cent participants have connected their smartphone to a personal computer (PC), 6 per cent stated they had not ever connected to a PC. All 758 respondents answered this question. Figure (XXX) shows that survey respondents considered smartphone security as ‘beneficial but not essential as the majority answer with 64 per cent , 21 per cent (159) didnt not consider there to be a need currently for smartphone security software as opposed to 15 per cent (114) whom considered smartphone security software as absolutely essential. 95 per cent of respondents were aware of ‘Adware, 27 per cent had known about ‘Badware, 25 per cent of respondents were aware of ‘Crimeware, 69 per cent had previous knowledge of ‘Rootkits, ‘Trojans 95 per cent,, ‘Spyware 95 per cent, ‘and ‘Worm 90 per cent were the most commonly aware terms of malware from the malicious software list, the majority being ‘Virus with 97 per cent of respondents being aware of this type of malware. 731 respondents answered this question. 96 per cent of respondents stated that they owned the smartphone, only 4 per cent of respondents had employer owned smartphones. All partakers responded to this question. Out of the 758 respondents, 15 per cent were aware of policies within their place of business, with the majority of respondents 41 per cent unaware of any workplace policies or procedures particularly orientated toward smartphones. 44 per cent responded that the question was not applicable to them. All participants answered this question. It is interesting to find that only 15 per cent stated they were aware of specific workplace policies and procedures specifically for mobile phones and 40 per cent were aware there were no mobile phone policies and procedures. A majority of 92 per cent (699) had not been advised of any security methods to protect them or their information from fraud, theft or malicious software. 8 per cent (59) respondents agreed they had received adequate security advice. 4.2 Discussion and interpretation of survey results Analysing the results of the survey shows the majority of smartphone users to be Android users peaking in the 20 to 24 age bracket, this would indicate that an IT professionals choice of smartphone is Android as indicated in Figure 3 below. Smartphone survey contributors within the 20 to 24 age group were then further examined to indicate what purpose is intended when using the devices, examining the results shows clearly that a majority of survey respondents reported they viewed their smartphone use as personal use, however disturbingly over half the users in the same age group admitted to using their smartphone for both personal use and business use as shown in Figure 4. Female respondents preferred the features provided by iPhones however also as opposed to male smartphone users who clearly preferred the Android platform over all others as seen in Figure (XXX). Examining users perception for the need of smartphone security against those users whom did or did not have antivirus shows that the awareness for the need of security correlates to users whom did indeed have smartphone security measures in place with nearly half of users who responded ‘Absolutely essential to the question ‘How necessary do you see the need for smartphone security software as shown in Figure (XXX). However the overall amount of smartphone users with antivirus or other security is disturbingly low given the malware threats currently available. The results also show us that a large majority of IT professionals do view smartphone security as beneficial however not essential. Android users are the most security aware demographic as demonstrated in Figure (XXX) above. This indicates that users are not aware of the threats posed by malware and view the need for smartphone system performance greater than the need for security. Business users have been defined as respondents who confirmed they used their smartphone for business only and users who reported they used their smartphone devices for both business and personal use. Smartphones have many features of value to employees as shown in Figure (XXX) Below, Email, Calendar, GPS and SMS features were shown to be the most used features all of which are viewed to aid employee productivity. However features such as games and social networking which negatively affect employee productivity were also shown to be frequently used, suggesting that smartphones can have negative effects on employee productivity. Figure (XXX) also shows us that over half of business users reported to use internet banking facilities from their smartphones. After finding out what smartphone features business users were most interested in I studied how aware business users were of security permissions and licence agreements prompts when installing new applications on their smartphones. The pie chart below is a representation of business user survey respondents awareness of how essential smartphone application installation security prompts are in regards to new application installations. Figure (XXX) shows us that 60 per cent of all business users admitted that they did not pay attention to licence agreements and permission prompts when installing new applications. The distinction between smartphones and personal computers is becoming increasingly marginal. Personal computers for example do not have built in billing systems and unless connected to the internet are static devices accessible via a local area network or through direct contact. Smartphones have an integral billing system are completely mobile and have multiple connectivity methods. When business user survey partakers were asked if they used any security applications such as antivirus, an overwhelming majority responded that they did not use any security products. This confirms part of my hypothesis that business users do not perceive smartphone security as a real threat. Discovering that the majority of business users used internet banking facilities for either personal banking or business banking and 9 out of 10 business smartphones had no security products installed it was elementary to understand if business users were aware of smartphone malware threats. The line graph in Figure (XXX) indicates that over 90 per cent of business users are aware of malware threats such as Adware, Spyware, Trojans, Viruss and Worms however business users were all least aware of malware threats such as Crimeware as indicated in Figure (XXX) Survey respondents who reported they used their smartphone for personal use only were excluded from the following analysis.7 out of 10 business users confirmed they were not aware of any specific smartphone security policies at work (Figure (XXX) The awareness of security for iPhone smartphones is low as users perception of Apple and Mac OS is that it is impervious to malware infection. Research shows that iPhone users have the least amount of antivirus installed on devices. As discussed earlier, users are completely reliant on Apple to vet all applications for malicious code, whereas Android and Symbian applications are open source so users may inspect the contents for malware. secure smartphone model, least security aware group Android users are the most security aware demographic group as the typical android user is conscious that malicious software exists and the android community are able to vet applications themselves. Android users were also the highest security aware group with the highest percentage of antivirus products per smartphone. Virtual environments, least secure smartphone perception Blackberry smartphones were the most secure devices in regards to email, network connectivity however it was found that application signatures can be purchased by anyone for a small fee thus rendering the security of the device minimal. Very secure aspects, not as secure overall Symbian smartphones are found to be the most current common target for malware developers. Low security Windows phone 7 is the newest platform on the smartphone market and only time will tell how secure the device is. Awareness and concern 5.0 Smartphones Private and confidential data from lost or stolen mobile devices such as laptops, USB pen drives and computer storage drives has gained negative exposure within the media recently however one of the largest growing threats to corporate information comes from unsecure smartphones. To understand this statement it is important to appreciate the history of the smartphone to recognise why smartphones pose such a threat in todays business environment. A mobile phone is a portable electronic device used to make and receive telephone calls. The mobile phone was first revealed by Dr Martin Cooper from the company Motorola in 1973, it was not until ten years after Dr Coopers demonstration that Motorola released its flagship mobile phone the ‘DynaTAC, this was the worlds first commercially viable mobile phone (Motorola, 2009). Originally these devices were commercially targeted at businesses and upper class individuals as the cost of the device was very high and the actual usage was severely restricted, due to the technology limitations at this time of battery weight (Motorola, 2009) and because the battery duration was limited to last a maximum of 30 minutes thus making the device impractical and available only to businesses and professional consumers. ‘According to Moores Law, the number of transistors on a chip roughly doubles every two years. (Intel, 2005) As Moore stated over thirty five years ago, due to the advancement of processors, battery technologies and overall reduced power consumption, mobile phones have become lighter, smaller, more powerful and longer lasting (Intel, 2005). Due to these fundamental technological advancements mobile phones have been able to incorporate additional existing technologies such as camera units, sensors, speakers and often take advantage of JAVA based applications and features, thus coining the term ‘Feature phone. Feature phones are more advanced technologically than mobile phones however now Smartphones currently reside in the top tier of mobile communication technology. The term ‘smartphone is ambiguous and many experts fail to agree on a suitable definition. Most smartphone features are not exclusive to a particular category, this project does not intend to make that definition, however for the scope of this project I have listed combined definitions and compared current smartphone f

Tuesday, November 12, 2019

Math History Essay -- essays research papers

Mathematics starts with counting. It is not reasonable, however, to suggest that early counting was mathematics. Only when some record of the counting was kept and, therefore, some representation of numbers occurred can mathematics be said to have started. In Babylonia mathematics developed from 2000 BC. Earlier a place value notation number system had evolved over a lengthy period with a number base of 60. It allowed arbitrarily large numbers and fractions to be represented and so proved to be the foundation of more high powered mathematical development. Number problems such as that of the Pythagorean triples (a,b,c) with a2+b2 = c2 were studied from at least 1700 BC. Systems of linear equations were studied in the context of solving number problems. Quadratic equations were also studied and these examples led to a type of numerical algebra. Geometric problems relating to similar figures, area and volume were also studied and values obtained for p.The Babylonian basis of mathematic s was inherited by the Greeks and independent development by the Greeks began from around 450 BC. Zeno of Elea's paradoxes led to the atomic theory of Democritus. A more precise formulation of concepts led to the realisation that the rational numbers did not suffice to measure all lengths. A geometric formulation of irrational numbers arose. Studies of area led to a form of integration. The theory of conic sections show a high point in pure mathematical study by Apollonius. Further mathematical discoveries were driven by the astronomy, for example the study of trigonometry. The major Greek progress in mathematics was from 300 BC to 200 AD. After this time progress continued in Islamic countries. Mathematics flourished in particular in Iran, Syria and India. This work did not match the progress made by the Greeks but in addition to the Islamic progress, it did preserve Greek mathematics. From about the 11th Century Adelard of Bath, then later Fibonacci, brought this Islamic mathemati cs and its knowledge of Greek mathematics back into Europe. Major progress in mathematics in Europe began again at the beginning of the 16th Century with Pacioli, then Cardan, Tartaglia and Ferrari with the algebraic solution of cubic and quartic equations. Copernicus and Galileo revolutionised the applications of mathematics to the study of the universe. The progress in algebra had a major psychologic... ...ever have taken place without logs. Then the world changed. The pocket calculator appeared. The logarithm remains an important mathematical function but its use in calculating has gone for ever. Here is the challenge. What will replace the calculator? You might say that this is an unfair question. However let me remind you that Napier invented the basic concepts of a mechanical computer at the same time as logs. The basic ideas that will lead to the replacement of the pocket calculator are almost certainly around us. We can think of faster calculators, smaller calculators, better calculators but I'm asking for something as different from the calculator as the calculator itself is from log tables. I have an answer to my own question but it would spoil the point of my challenge to say what it is. Think about it and realise how difficult it was to invent non-euclidean geometries, groups, general relativity, set theory, and everything else to do with MATH! Einstein and his Theory What do you think when some one says Einstein, is it Relativity, or E=MC2? What do you think E=MC2 means, well it means Energy=Mass x Speed of Light Squared. He was way ahead of his own time, he was a genius!

Sunday, November 10, 2019

The slutty double standard

SSH e felt ashamed and degraded. I wanted to cry with her. I can't think Of a more humiliating ins alt. First of all I am going to address a problem in our culture called â€Å"slut shaming† the cone opt women being shamed and euthanized. Slut shaming is a double standard that is highly n touchable in our society. I see it in the words that come out of my contemporaries, acquaint cues or even my friend's mouths. I see this double standard in an overwhelming amount in our tabloids, blob posts.It is also found in most TV shows, Movies and even song lyrics. One of the earliest definitions Of slut is an untidy woman. It has changed and become a sexual slur targeted towards females. This aspect that there are few words as hurtful as insinuating female promiscuity says a lot about our society. (Definition of slut shaming) Slut shaming also known as slashing, is the idea of shaming and/ or attacking a woman or a girl for being sexual, having one or more sexual partners, acknowledging sex al feelings, and/ or acting on sexual feelings. (From an article in psychology today) Furthermore, it's about the implication that if a woman has sex in which trade action society disapproves of, she should feel guilty and inferior. It is damaging not only to t he girls and women targeted, but to women in general and society as a whole. Terms that imply female romanticist include: tramp, where, sank, hoe, and many more that are not a appropriate for this forum. Terms that imply male promiscuity: leadsman, gigolo, stud, sugar daddy, womanlier, playboy, and player.One thing we should be conscious of is Term ms that imply female promiscuity consist in a negative matter rather than the male terms the at instead embodies notions of power and conquest. Feel as though a big cause of this problem is how In most media females are defined by their sexual desirability but are expected to stay sexually inexperienced, while whew n men are promiscuous it is considered clever and fortunate. T his perpetuates the Dobb el standard. In the movie Pretty Woman, Richard Greer is received as a sophisticated wealthy gentleman who just happens to be with a prostitute.Julia Roberts, the prostitute is a low class hooker who is so lucky Richard Greer actually takes an interest in her. A earldom girl attending a homeless prom and wearing appropriate cloth Eng per prom guidelines got kicked out of prom because middleware homeless dads cool d not stop staring at her. Creepy grown men should stay to supervise because they are s o responsible and obviously she was the problem. At the at the Vim's (Video Music Awards) hen Mile Cyrus performed â€Å"we can't stop† I can't believe how much the media slut shah med her for towering .

Friday, November 8, 2019

Difference Between Analytical and Synthetic Cubism

Difference Between Analytical and Synthetic Cubism Introduction In the early 20th century, the art culture in France took a dynamic turn from conventional art to adopt a contemporary form of art known as cubism. Initially, cubism was not widely accepted but pioneer cubists such as Pablo Picasso and George Braque played a pivotal role in perpetuating the new form of art to the mainstream. There are two distinct types of cubism; analytical and synthetic, the main difference between them being in the composition.Advertising We will write a custom essay sample on Difference Between Analytical and Synthetic Cubism specifically for you for only $16.05 $11/page Learn More The basic principle of cubism is the degeneration of an image, which is then re-assembled into an abstract image to articulate several viewpoints. The aim of cubism is to use a single image to depict different ideas hence allowing one single image to portray different perceptions. Cubism heavily relies on randomness thus the artwork generally lack s depth but is greatly enriched in expression. A significant influence to early cubism is Paul CÃ ©zanne (1839-1906); CÃ ©zanne was the first artist to paint with hints of cubism after he abandoned the application of depth in all of his paintings. He was of the view that paintings should embrace a two dimensions scope in order to show the difference between art and real objects (Becker 1). In line with this ideology, CÃ ©zanne abandoned the conventional three dimension perspective approach and removed special features and perspective elements from his work. In order to accentuate his paintings and still underscore his two dimension approach, CÃ ©zanne opted for abstract work and the tonal variation of color. This approach is prominent in most cubist paintings. Comparison between analytical and synthetic cubism Analytical cubism focuses more on breaking down an image into its many forms and viewpoints in order to analyze the image in all the possible angles and context, to the il lusion of a three dimension appearance (Honour Fleming 121). Synthetic cubism on the other hand focuses more on the imitation of an image usually using bright colors or collage hence the artwork is more often two dimension. A typical Cubist painting depicts real or natural objects from variable viewpoints, showing many parts of the subject at the same time (Becker 1). Such paintings can be viewed from different angles and this is achieved by reconstructing an image into a composition of geometric shapes planes and colors. The end result is the illusion of reconfiguration of space, where all sides of an object can be viewed on a two dimension plane (Hunter et al 19). History and composition Analytical cubism was the first form of cubism to be developed in the early 20th century and that was between 1905 and 1912. Analytical cubism aimed to reduce natural forms into geometric subjects with altered viewpoints and spatial cues. This form of cubism did not rely much on color and usually dark colors like grey and blue were used (Honour Fleming 122). Rather than color, analytical cubism tried to portray natural forms in geometric shapes like spheres, cubes and cylinders.Advertising Looking for essay on art and design? Let's see if we can help you! Get your first paper with 15% OFF Learn More Synthetic cubism was the latter of the two types of cubism and was developed between 1912 and 1920(Hunter et al 66). In comparison with analytical cubism, synthetic cubism was more detail oriented and focused more on texture and color (Becker 1). In addition, synthetic cubism also ushered in collage elements as an integral part of subject matter. Subjects and content Subjects such as ‘The Mandolin’, 1910, ‘Landscape with bridge’, 1909, ‘The Portuguese’, 1911, ‘violin and Jug’, 1910, ‘Ma Jolie’, 1911, and ‘Ambrose Voilard’, 1910 oil on canvas paintings, were analytical cubism pa intings. As can be observed, these forms of art were more focused on pensiveness than portrayal, only giving subtle clues to the real forms involved. Analytical cubism was meant to portray the deep ideology the artist possessed in reference to the real world (Honour Fleming 119). Modifications to analytical cubism led cubist to introduce a more vibrant and colorful variety of cubism that was expressed in art works such as ‘Still Life with Chair Cane’, 1912, and ‘Guitar, Sheet Music and Glass’, 1912 (Becker 2). The introduction of collage elements can be seen for example in Picasso’s ‘Still Life with Chair Cane’, which incorporates oil cloth that was printed to look like chair caning pasted onto an oval canvas and the use of rope to frame the painting. Synthetic cubism was used mainly to show the creativity and imagination of an artist and the artist’s effort to imitate a given form (Hunter et al 72). Cubism as a modern movement T he introduction of cubism came at a time when there was an exponential growth in progress through out the globe. It was during this period that several inventions had emerged and were still emerging in regard to technological development. However, the most significant invention to the artists was the introduction of photography. It was evident that the technological revolution was ushering in a new era of modernization (Becker 1). Cubism was an effort by artists to deviate from the tried and tested traditions of Western art which were being challenged, for they were viewed as old fashioned and rigid. Conventional forms of representation were questioned as artists demanded to be in tune with the growing modernization with the introduction of a new form of artistic expression. In addition, photography was taking over most of the artistic fields that involved real images like portraits and so artists needed to conceptualize a new form of art that would uphold the appreciation for artis tic expressions.Advertising We will write a custom essay sample on Difference Between Analytical and Synthetic Cubism specifically for you for only $16.05 $11/page Learn More Artists needed a form of art to challenge photography, and they did this by exploiting the perspective of photography (Hunter et al 49). Conventional pictures and photographs were limited in terms of perspective for they could only give one viewpoint which artists viewed as deficient in composition. Another challenge artist faced was on how to express modern trends using the conventional forms of art which they felt had no correlation. Consequently, the challenges were overcome by Picasso and Braque in 1905, when they introduced cubism as a form of art. Cubism can therefore be viewed as a modern movement because it was founded amidst the need to deviate from conventional western forms of art (Honour Fleming 122). Moreover, cubism was essentially intended to express modern images such as the emerging technology at the time. Conclusion Though both forms of cubism are popular, it is dependant on an observer to decide which form of cubism they have preference over. Analytical cubism tends to have less use of color and places more focus on shape, giving the paintings a more intricate appearance. Synthetic cubism on the other hand is heavily dependant on color rather than shape and thus such paintings are usually bright and simpler when compared to analytical cubism. The force behind the emergence of this work of art was the need for a newer form of art since conventional forms were being phased out with the emergence of new technology. Picasso and Braque can generally be attributed to have founded this form of art; however, it is evident that there was extensive influence from CÃ ©zanne’s work that led to the emergence of cubism. Becker, Robert. Art Movements in Art History: Analytical and Synthetic Cubism. Art World, Apr 2002.Retrieved from: https://www.the -art-world.com/history/cubism5.htm Honour, Hugh. A world history of art (6th Edition). New York: Laurence King Publishing, 2002. Print.Advertising Looking for essay on art and design? Let's see if we can help you! Get your first paper with 15% OFF Learn More Hunter, Sam, Wheeler, Daniel Jacobus, John. Modern Art. (3rd Edition). New York: Prentice Hall, 2004. Print.

Wednesday, November 6, 2019

An Overview of Cultural Conservatives

An Overview of Cultural Conservatives There are no solid dates for when cultural conservatism arrived on the American political scene, but it was certainly after 1987, which lead some people to believe the movement was started by writer and philosopher Allan Bloom, who in 1987, wrote Closing of the American Mind, an immediate and unexpected national best seller. While the book is mostly a condemnation of the failure of the liberal American university system, its criticism of social movements in the US has strong cultural conservative overtones. For this reason, most people look to Bloom as the movements founder. Ideology Often confused with social conservatism - which is more concerned with pushing social issues such as abortion and traditional marriage to the front of the debate - modern cultural conservatism has strayed from the simple anti-liberalization of society Bloom espoused. Cultural conservatives of today hold fast to traditional ways of thinking even in the face of monumental change. They believe strongly in traditional values, traditional politics and often have an urgent sense of nationalism. It is in the area of traditional values where cultural conservatives most overlap with social conservatives (and other types of conservatives, for that matter). While cultural conservatives do tend to be religious, it is only because religion plays such a large role in US culture. Cultural conservatives, however, can be affiliated with any American sub-culture, but whether they are of the Christian culture, anglo-saxon Protestant culture or African American culture, they tend to align themselves tightly with their own. Cultural conservatives are often accused of racism, even though their flaws (if they surface) may be more xenophobic than racist. To a much larger degree than traditional values, nationalism and traditional politics are primarily what concern cultural conservatives. The two are often strongly intertwined, and show up in national political debates under the auspices of immigration reform and protecting the family. Cultural conservatives believe in buying American and oppose introducing foreign languages such as Spanish or Chinese on interstate signs or ATM machines. Criticisms A cultural conservative may not always be a conservative in all other matters, and this is where critics most often assault the movement. Because cultural conservatism isnt easily defined in the first place, critics of cultural conservatives tend to point to inconsistencies that dont really exist. For example, cultural conservatives are largely silent (as Bloom was) on the issue of gay rights (their main concern is the movements disruption with American traditions, not the gay lifestyle itself), critics therefore point to this as being contradictory to the conservative movement as a whole which it isnt, since conservatism in general has a such a broad meaning. Political Relevance Cultural conservatism in common American thought has increasingly replaced the term religious right, even though they arent really the same things. In fact, social conservatives have more in common with the religious right than cultural conservatives. Nevertheless, cultural conservatives have enjoyed considerable success at the national level, especially in the 2008 presidential election, where immigration became a focus of the national debate. Cultural conservatives are often grouped politically with other kinds of conservatives, simply because the movement doesnt tightly address wedge issues like abortion, religion, and as noted above, gay rights. Cultural conservatism often serves as a launching pad for newcomers to the conservative movement who want to call themselves conservative while they determine where they stand on the wedge issues. Once they are able to define their beliefs and attitudes, they often move away from cultural conservatism and into another, more tightly focused movement.

Sunday, November 3, 2019

Technology Influence Assignment Example | Topics and Well Written Essays - 500 words

Technology Influence - Assignment Example However, EM has over the years struggled with communication networks that are often jammed or destroyed in the event of adverse natural disasters. In the case of Hurricane Katrina, for example, many of the wireless base stations were grounded and telecommunication cables were destroyed (Coombs & Holladay, 2012). Jamming of the networks is occasioned by overloading of call centers such as the boosters installed exceed their capacity to complete incoming or outgoing calls. This is a serious challenge that not only impacts the direct victims of the disasters but also the emergency teams working to rescue lives and properties. Evidently, therefore, the conventional forms of communication, which mostly comprise of cable and wireless networks, are prone to jamming and distraction of pre-requisite infrastructure. The problem has further been aggravated by government reduction of budget allocated to FEMA which could have, otherwise, benefitted their efforts to reinforce telecommunication inf rastructure within the agencies involved in emergency management. Despite the above challenges occasioned by over-reliance in conventional communication systems, advancements in information and technology appear to offer solution to this same communication challenge. Undoubtedly, the advent of social media platforms of communication have tremendously resolved the barriers of jammed networks and destruction of infrastructure. As it stands at the moment, Facebook and Twitter are the two online social platforms with the highest number of subscribers. In the event of a disaster, the victims can easily update their statuses and, therefore, friends and family members can easily established the location of each other. Similarly, through the hash-tag feature that permits a trending topic to be easily accessed by millions across the globe, the various rescue agencies working in collaboration with FEMA can easily establish the location and the needs of the victims.

Friday, November 1, 2019

Reflective Report Essay Example | Topics and Well Written Essays - 1000 words

Reflective Report - Essay Example The presentation was prepared by our group consisting of 5 people. The presentation consists of total 15 slides for which the information and data was collected and organized by all of the group members. In order to organize the work, we divided the work equally among all the members. The selection of the centre was done after visiting the centre and a detailed discussion between the group members. After deciding the centre we discussed the length and parts of the presentation and it was decided that the presentation would be around 14-16 slides and the main parts would be introduction, body, finance structure of the centre and their consultation and other services. The group members are assigned different parts of the presentation and I decided to complete the introduction part. In order to collect the information for the assigned parts, we visited the centre several time and spent time with the staff, at their library and around the centre. The staffs of the centre was very coopera tive and willing to share information with us due to which there was no major problem faced in gathering data and information. After collecting the information and data all of the group members finalize their part and then we sit together to connect all of these parts and make the final presentation. This task was also done finely and eventually we came up with the complete presentation within the given time. This preparation of the presentation was a great opportunity for me to learn about the dynamics of group work. I learnt a lot about the problems and services of the centre selected for the presentation but more worthwhile are the experiences and lessons that I learnt during the time span of making this presentation. The group also encountered some little communication and coordination problems but fortunately none of these problems lasts for long enough to affect our final work. The members of our group were from different backgrounds and problems. Two of us were part time work ers at a local enterprise and due to their bust schedule the group frequently faces problems in deciding the meeting time and place. Most of the time, we decided to meet on the weekends and the place was decided keeping in view the convenience of all the members. We also have little differences while deciding the layout of the presentation because all of the group members had different ideas in their minds and it was really difficult to incorporate the ideas and wishes of all the four students in a single presentation. We tried to cope up with this problem by compromising at several stages and giving respect to the ideas and desires of each other but it was certainly not an easy task. Our first visit to the centre was an exciting experience for us. We had already decided what sort of information is required for each of the part and this everyone was looking for the information to complete the section assigned to him. While I was looking for history and general structure of the centr e, my fellows were seeking for their financial data. I faced no problem in acquiring information about the centre due to the cooperation of the staff but a little problem was raised when the staff of the centre informed that they will not financial information and data because they keep it confidential from the general public. At first, we were disappointed because