Thursday, December 26, 2019

The, The And, And Artist, Georgia O Keefee, By Edgar...

It is common to perceive artists of any kind as more eccentric than the general population. An artist must be able to see the world in ways most would not be able to. However, this attribute has been connected socially and scientifically with â€Å"madness†. The idea of the â€Å"tortured artist† dates back to 4th century B.C., prompting Plato, the ancient Greek philosopher, to write â€Å"Madness, provided it comes as the gift of heaven, is the channel by which we receive the greatest blessings†¦. madness comes from God, whereas sober sense is merely human† ( Plato’s Phaedrus). This association between madness and greatness quickly became popular, with many famous â€Å"mad geniuses† fueling the assertion. The list of afflicted artists is staggering, and†¦show more content†¦1292). However, this study, being the first of it’s kind, came with its limitations. Andreason had started out looking for a connection between schizophren ia and creativity. She believed since schizophrenia often led to unusual perceptions, this would increase creativity. Her findings in this area went against her hypothesis. She examined that most schizophrenics she studied did not exhibit enough mental stability to produce original ideas, rather purely bizarre ones. In fact, she believed that mental impairments associated with schizophrenia inhibited one’s creative abilities. While I see her point in this, I know that schizophrenia affects individuals on a spectrum. Therefor, in certain cases, I believe more research can be done on this aspect. Andreason also only studied writers, which can not hardly account for the wide span of creative fields. But, she did make headway with the assertion of a true biological connection between creativity and a mental disorder. This got the ball rolling in the scientific community, prompting more researchers to explore the link. Dr. Alice Flaherty of Harvard Medical School wrote a paper in 2005 expounding upon the link between creativity and mental illness. I found his paper intriguing, due to his delving into the mind of a schizophrenics as well as those with

Wednesday, December 18, 2019

The, Freaks, And The Non Elites Essay - 1416 Words

Geeks, Freaks, and the Rest of the Non-Elites Who are the geeks, freaks, and the non-elites? In every high school there is social stratification and social cliques. Social stratification is the division of society according to rank, class, or caste [See Figure 1.]. Orientation toward peers and immersion in friendships are defining features of adolescence . â€Å"Through friendships, adolescents learn about what others are doing, anticipate accepted and expected behaviors, figure out how to present themselves, and find partners for trying out new behaviors† (Ennett). The friendship patterns that are evident in adolescents’ social networks have an important influence on behavior, including subordination, substance abuse, and sexual behavior. â€Å"Friendship patterns directly influence the nature and extent of adolescent social interactions and hence the accessibility and flow of information about behavioral standards from one adolescent to another, then clique members, liaisons, and social isolates are likely to differ in their drug use norms and behaviors† ( Ennett) A teenagers status in the eyes of their peers is moderately important to them. Because their status is the only thing they have control of, social stratification has more of an effect or impact on the self-esteem and success of a student. Figure 1 Everyone that has attended a primary school knows about the jocks and jockettes, the populars, and the bullies, but what about the geeks and freaks? The geeksShow MoreRelatedGi Jane Essay1135 Words   |  5 Pageswho has ambitions of moving beyond her military desk job, to become a member of the Navy Seal. Thanks to the political maneuvering of a female senator, O Neal becomes the first female candidate for the Navy Seals. The Seals are the militarys elite Special Forces team. O Neal becomes the guinea pig of senator Lillian DeHaven in this film. DeHaven bullies the Navy into taking ONeal as a Seal recruit in order to become the first female member of the Navy Seal. ONeal is put through a seriesRead More Gi Jane Essay1107 Words   |  5 Pagesofficer who has ambitions of moving beyond her military desk job, to become a member of the Navy Seal. Thanks to the political maneuvering of a female senator, O’ Neal becomes the first female candidate for the Navy Seals. The Se al’s are the military’s elite Special Forces team. O’ Neal becomes the guinea pig of senator Lillian DeHaven in this film. DeHaven bullies the Navy into taking O’Neal as a Seal recruit in order to become the first female member of the Navy Seal. O’Neal is put through a series ofRead MoreThe Violence Of The Sports Essay1324 Words   |  6 Pagesmale sports would be celebrated as, â€Å"a breakthrough for gender equity† by liberals but would be seen as an â€Å"obscenity† by everyone else (McDonagh Pappano, page 237). The opposite reaction could create a boom in attendance and support, but I fear a freak-show style of interest. While some fans would genuinely support the female athlete and the team’s progressive attitude, I fear a number of fans would only attend to witness the oddity. Sadly, in the current world, a woman playing professional sportsRead MoreMen And Women s Basketball Essay1448 Words   |  6 Pagesmale sports would celebrate, â€Å"a breakthrough for gender equity† by liberals, but be seen as an â€Å"obscenity† by everyone else (McDonagh Pappano, p. 237). The opposite reaction could create a boom in attendance and support, but with a potential for freak-show style of interest. While some fans would genuinely support the female athlete and the team’s progressive attitude, a number of fans might only attend to witness the oddity. Sadly, in the current world, a woman playing professional sports in aRead More The Connection between A Bug’s Life and The Chosen People Essay2015 Words   |  9 Pagessuffering from an identity crisis. According to Ewen’s theory, â€Å"the notion of personal distinction [in America] is leading to an identity crisis† of the non-upper class. (185) The source of this identity crisis is mass consumerism. As a result of the Industrial Revolution and mass production, products became cheaper and therefore more available to th e non-elite classes. â€Å"Mass production was investing individuals with tools of identity, marks of personhood.† (Ewen 187) Through advertising, junk mail andRead MoreThe View on Overpopulation: Looking Deeper into the Hardinian Taboo2017 Words   |  9 Pagesreason, as mentioned above, is because in this specific example this anonymous Republican staffer â€Å"†¦thinks hed get fired† because, he put it this way, â€Å"if people in our district knew I believed in climate change, and Im his energy advisor, they would freak out. Id be a liability. If that got out, the smart thing for my boss to do would be to fire me.† (33’43’’ CPM) This quote demonstrates that politicians are personally attacked if they go against what their supporters believe, so they feel the needRead MoreMaximilien de Robespierre, a Unconventional Hero.2207 Words   |  9 Pageswould be lost. Robespierre decided to create a forceful rule to fight the war and prot ect the security of the state. When all is resolved and peace has returned he said he’d re-establish a constitutional regime in France. Thirty-five to forty thousand non-supporters of the revolution were killed in the protection of liberty. Large groups of people became uncomfortable with his rule and felt this was a â€Å"reign of terror†, people felt that it should be done democratically and without brutal force, thatRead MoreE La America Needs Its Nerds T MC4826 Words   |  27 Pagesaccording to Webster’s New World Dictionary, is a street performer who shocks the public by biting off heads of live chickens. It is a telling fact about our language and our culture that someone dedicated to pursuit of knowledge is compared to a freak biting the head off a live chicken. Even at a prestigious academic institution like Harvard, anti-intellectualism is rampant: Many students are ashamed to admit, even to their friends, how much they study. Although most students try to keep up theirRead MoreFactors That Should Be Determined When Planning A Meal2387 Words   |  10 Pagesto run smooth. Ninety-three chefs follow a strict 15-day menu cycle, and produce nearly 18 thousand meals a day. The kitchen is open from 6am-12 midnight, 7 days a week. The nutritional value of their menu can range from the casual to the elite health freaks. You can be a vegetarian, a bodybuilder, a power-lifter, or just an average Joe, and enjoy a meal from the kitchen any time of the day. The kitchen spends between 45-65 thousand dollars a day on food, and receives fresh supplies at sea onceRead MoreThe Stereotypical Black Woman Essay1985 Words   |  8 Pagestelevision. For example, even though BET was founded by Robert Johnson, a black man, BET is now predominantly owned by white people. â€Å"Day after day, in all forms of media -- print, radio, and television -- we see, hear, and read the perspectives of non-Black women and women of color who are not actively involved in the struggles of Black women -- especially on so-called womens issues.†(Women’s Health Weekly, 546) Large television networks must choose to show things that will not only keep ratings

Monday, December 9, 2019

Navigate Growing Tide Of Ransom ware Attack â€Myassignmenthelp.Com

Question: Discuss About The Navigate Growing Tide Of Ransom Ware Attack? Answer: Introduction Ransomware can be considered as one of the malware that have the main intension of restricting the user from accounting their system. This is mainly achieved either by locking the systems screen or locking the users file unless a ransom is paid on behalf of it. Modernized ransomware families which can be collectively be termed as crypto ransomware, encrypt certain types of files on the system which is infected and forces the user to pay a certain sum of money through the use of certain online payment methods in order to get the decrypt key (Kruse et al., 2017). The ransom price very much vary which depends on the ransomware variant and the price or the rate of exchange of the digital currency. This report puts direct emphasis on the terminology and states its risk and security concerns and the strategies that can be used to address them. Background The ransomware can be considered as one of the most promising threats which can be related to enterprises, individuals and SMBs since the mid-2000. In fact, it can be stated that there are more than 7600 ransom attacks reported to the internet crime complaint centre (IC3) between the tenure of 2005 march till date and which is still counting. Risk and security concerns of Ransomware In the ransomware attack the hackers mainly exploit the flaws which are there in the operating system which is mainly the in the windows oriented framework. The affect is mainly concerned with those people who do not update the features by the use of patches which are available through the vendor itself. As of now the concerned event have generated a lot of claims. the risk associated with the attack can be stated as below: Extortion cover: There are mainly two types of key which are used in common programming language first is the encryption key which is mainly used to hid the messages and on the other hand is the decryption key which helps in retrieving the original content of the file (Simms, 2016). extortion cover is mainly expected from the cost which is related to the decrypted key which is used to regain the original message from the encryption format. The key is generally provided from the hackers side. Business interruption cover: The main goal of the hacker is pointing towards running business orientation in order to gain the overall access of the data. It can be stated here that the data which is hacked by the hackers are sometimes so much vital from the organisations point of view that it would tend to a huge loss if the data are lost or could not be received. Data restoration covers: the data in many situations can include information which are related to customer which are of high importance to them for example credit card number, bank details etc. If these details ones reach the hand of the hackers it could lead to 2 types of problem. One of the problem is that the hacker can take the information and use it for their own benefit One the other hand they can ask from ransom in order to receive the information. (Smith, M. (2016). The security factors that can be involved in the ransomware attack are as follows: Scolding doesnt help The information and the operation are very much aware of the core fundamentals and the security aspect which are involved with it. For example, disaster recovery, patch, management, regular backup and business continuity, this factors are very much important in order to protect the network and the user from the damage which can be made by the hackers (Shukla Mondal Lodha, 2016). The Act of that the concerned people are irresponsible or incompetent for being behind the patching which are available for ensure security and ignoring the challenges that they could face if the attack is initiated are one of the security issue that can be involved in the ransomware attack. It can be stated that in most of the cases the undisputed reality is that the systems are vulnerable and mainly running on softwares that is out dated or just unpatched (Brewer, 2016). Understanding of the challenges The information technology does not always have the access to the systems which are on the overall area of the networks. When patching system can avoid the warranty or the term of the license then staying on the top of the updates is not merely an option (Valach, 2016). Or when relating to a manufacturing plant where the computers are plugged into a machine in order for the proper working may be considered as a part of the machinery and not fall under the infrastructure of the information technology. The issue is among the most widespread aspect among different organisations which can be considered as an aspect which is below the security line. This issue can be considered as avital security issue which makes the system very much vulnerable to the attack (Mohurle Patil, 2017). Organisational constraints This can be considered as one of the most vital security issue which can be directly related to the attack. The main security concerns in such an aspect is that the legislative rules and the spending cuts design rein the government from spending money on the information technology infrastructure (Lee et al., 2016) Strategies for Addressing them it was seen that after several hours after an attack was initiated while initiating the amount of attack and the harm it has produced a researcher by the name of MalwareTech discovered the amount of kill switch which was injected in the system. The main strategy which could be implemented according to him was that a domain name should be registered in accordance to the DNS sinkhole (Chinthapalli, 2017). This resulted in the spreading of the worm which mainly created the attack. This was taken into account due to the fact that the ransoms main aim was to encrypt the computer files if and only if it could not connect to the domain. The lead to a widespread of the attack because most of the systems website were not registered and it was open towards the attack. Taking into concern about the system which were already infected by the infection, it helped in slowing down the initial infection and overall expanded the time which was needed to deploy a protective measure towards it (Simmonds , 2017). It was mainly noticed that the window encrypted APIs which were mainly used by the wannaCry may not even completely clear the prime number used in order to generate the payloads private key from within the memory. This potentially made it possible to retrieve the key if they were not cleared or overwritten from the resident memory. This behaviour of the system was used by a French researcher who developed a tool which was known as wannakey (Pope, 2016). The key role of the wannakey was to automate the process on the windows XP systems. (the windows XP system is highline because of the factor that the infection on the window XP system where the maximum) (Pathak Nanded, 2016). After this approach a second tool was build which was named as wanakiwi which was mainly tested on the window 7 and the server 2008 R2 as well. The scale of the attack was so huge that it intended windows to launch a new security update which was designed for older versions of the windows. In this contact the cy ber defines operational of the Microsoft stated that the factor of elevated risk for the cyber-attacks which is termed destructive at the present time, the company had taken many actions in order to provide the customers full protection from the event and so that no harm can be done on any system (Russell, 2016). Conclusion The report can be concluded on the fact that the ransomware attacks have the ability to gain a huge point of interest in the near future. The main point of emphasis is that small security measures can be incorporate into the information technology framework which can be directly beneficial in stopping the attacks privilege on a system. Ransomware would become just another tool in the hackers belt The attack is already changing its basic framework and continuing its process in evolving. Ransomware would eventually sit in the arsenal with regards to the attackers on a wide range of options. On the other hand, the advanced hacking groups need money and the concept of the attack can be proven a very much easy way to gain the money in the future. Designing of more attacks The impact of news which many dwelled when an attack it made it made the interest of the small hackers more towards this sort of attack. So it can have estimated that in the near future there can be many more such types of attack which can be termed as copycat attacks. The system which can be targeted in the future attacks are: Bank ATMs System which are related to self-checkout at the grocery store Billboards which are computerized. Ransomware using no executable as a mere mean of evading detection This can be directly being related something which is already done with Ransom32 which was entirely build on JavaScript and power ware (developed in PowerShell) and this trend can be followed in the near future. This type of ransomware attack mainly uses a combination of language which are mainly scripting languages and Microsoft API which is used to encrypt the files on the machine of the victim. Within the executable file the encryption, the note which is related to the ransom and the call out of the command and the control server are completed. Target the security of the providers of webmails The spam campaigns right now are losing the battle against the consumer webmail providers for example yahoo!, google and Microsoft. This services have mainly bugged up in detecting the mails which are related to the attack and remedy of which have been set by sending the mails to the spam. This have resulted in the increase of the activity along the year 2016. The spam detection system in many organisations are very much less effective or non-existing than those which are involved in the webmail providers. This is one of the main reason why the attackers behind the attack have mainly focused their main area of concern towards the corporate agencies. No ransomware activity on IoT The Iot devices always sinks with the cloud server and it can be very much easy to wipe and replace them, so there is no such compiling reason behind which the attacks can be initiated within such framework. On the other hand, when initiated on LINUX, UNIX that actually play a vital role in the day to day life it can be somewhat obstructive. But the target which are discussed here are not in the to do list of the hackers as they are indeed very much complicate in bypassing and creating an aspect of the attack. Even if the user accidentally installs the infection on the system it would not produce any sort of harm to the system. The attackers have to be very much professional in order to do so, they need to have a victim who is already logged in which can be considered as the root of the attacker to the package an escalation with the ransomware which is a set of a whole new problem set). In the near future the target of the hackers can be in these sort of machines due to the factor th at rest of the machines would be having enough of security measure sin order to stop the attack and the attack would be eventually being a loss from the point of view of the hackers. References Brewer, R. (2016). Ransomware attacks: detection, prevention and cure. Network Security, 2016(9), 5-9. Chinthapalli, K. (2017). The hackers holding hospitals to ransom. BMJ, 357, j2214. Hayes, J. (2017). Pay up-or else [ransomware attacks on industrial infrastructure]. Engineering Technology, 12(4), 48-51. Kruse, C. S., Frederick, B., Jacobson, T., Monticone, D. K. (2017). Cybersecurity in healthcare: A systematic review of modern threats and trends. Technology and Health Care, 25(1), 1-10. Lee, J. K., Moon, S. Y., Park, J. H. (2017). CloudRPS: a cloud analysis based enhanced ransomware prevention system. The Journal of Supercomputing, 73(7), 3065-3084. Martin, G., Kinross, J., Hankin, C. (2017). Effective cybersecurity is fundamental to patient safety. Mohurle, S., Patil, M. (2017). A brief study of Wannacry Threat: Ransomware Attack 2017. International Journal, 8(5). Pathak, D. P., Nanded, Y. M. (2016). A dangerous trend of cybercrime: ransomware growing challenge. International Journal of Advanced Research in Computer Engineering Technology (IJARCET) Volume, 5. Pope, J. (2016). Ransomware: Minimizing the Risks. Innovations in clinical neuroscience, 13(11-12), 37. Richardson, R., North, M. (2017). Ransomware: Evolution, Mitigation and Prevention. International Management Review, 13(1), 10. Russell, R. (2016). A layered approach: integrating email security with document management processes. Computer Fraud Security, 2016(12), 14-18. Shukla, M., Mondal, S., Lodha, S. (2016, October). POSTER: Locally Virtualized Environment for Mitigating Ransomware Threat. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (pp. 1784-1786). ACM. Simmonds, M. (2017). How businesses can navigate the growing tide of ransomware attacks. Computer Fraud Security, 2017(3), 9-12. Simms, C. (2016). A Matter of Survival. ITNOW, 58(4), 30-31. Smith, M. (2016). Ransomware attack forces Michigan utility to shut dow n systems, phone lines, email. Network World. Valach, A. P. (2016). What to Do After a Ransomware Attack. Risk Managem

Monday, December 2, 2019

infectious diseases Essays - Tropical Diseases, Epidemiology, RTT

Running Head Mosquitoes on the Go (Your Name (Your School (Your Instructor (Your Course )Abstract The number of illness in the world continues to increase while it has been very hard to find cure for each one more new diseases came to further weaken the whole humanity . The reason of having this paper is to further understand and share information regarding four diseases which dates back in the past years and already affected several people and killed some of the human population . Malaria , Yellow Fever , West Nile and Filariasis are only four among the several diseases in the world which could lead to a person ?s death and shattered life . Upon reading this paper , a better understanding and new learning regarding these diseases will be earned . Also , the paper has several precautions to prevent ourselves from contracting these diseases .Mosquitoes on the Go People are very vulnerable to diseases which remind us that we are human and one of these days we will come to our end . Sci entists and medical doctors are trying their best to further find cures for the different illness that the humanity experiences in our everyday life but , sometimes , it is really not a lucky day . More than a million people dies each year due to several diseases such as infections and virus contractions and sometimes , it makes the people wonder where these illnesses came from and once they found out the root ,they immediately launched a study to deepen the research and to know the reasons and the ways to prevent their attack . One of the common carriers of virus is none other than the mosquitoes .They can easily transmit these deadly viruses by biting humans or others which belongs to the animal kingdom . Aside from this fact , mosquitoes live everywhere whether it ?s warm or cold and because of these , they have much more contact to their victims . Although not all diseases came from mosquitoes , these four infections that we are about to tackle are commonly transmitted through m osquitoes thus , the idea of mosquitoes as killers of human beings and humanity would not go away even if some are contracted through other means . What Filariasis , Malaria , Yellow Fever and West Nile have in common is the main idea that they are all commonly transmitted through mosquitoes and are all infectious . They could kill people and most of all they unknowingly attack those who belong in rural areas and are hard to reach places which make the cure of the disease impossible or hard .Filariasis Even in the past , Filariasis already existed and it was really endemic in Alexandria and it was during the encounter of Greek physicians with the Arabs when they found out about this disease but since they don ?t really have direct contact with the disease , they thought that it was leprosy . The real encounter of the westerners with Filariasis began in the 18th to 19th century when the physicians in Europe become exposed with the different infections that they saw?

Wednesday, November 27, 2019

Foreign Policy of the U.S. Government

Foreign Policy of the U.S. Government A nation’s foreign policy is a set of strategies for dealing effectively with issues arising with other nations. Typically developed and pursued by the nation’s central government, foreign policy is ideally crafted to help achieve national goals and objectives, including peace and economic stability. Foreign policy is considered the opposite of domestic policy, the ways in which nations deal with issues within their own borders. Foreign Policy Key Takeaways The term â€Å"foreign policy† refers to a national government’s combined strategies for effectively managing its relationships with other nations. Foreign policy is the functional opposite of â€Å"domestic policy,† the ways in which a nation manages matters occurring within its own borders.The long-term goals of the United States’ foreign are peace and economic stability. In the United States, the Department of State, with the consultation and approval of the President of the United States and Congress, plays the lead role in the development and implementation of U.S. foreign policy.   Basic U.S. Foreign Policy As a key issue in the nation’s past, present, and future, United States foreign policy is truly a cooperative effort of both the executive and legislative branches of the federal government. The Department of State leads the overall development and supervision of U.S. foreign policy. Along with its many U.S. embassies and missions in countries worldwide, the Department of State works to apply its Foreign Policy Agenda â€Å"to build and sustain a more democratic, secure, and prosperous world for the benefit of the American people and the international community.† Especially since the end of World War II, other executive branch departments and agencies have started working along with the Department of State to address specific foreign policy issues such as counterterrorism, cybersecurity, climate and environment, human trafficking, and women’s issues. Foreign Policy Concern In addition, the House of Representatives’ Committee on Foreign Affairs lists the following areas of foreign policy concern: â€Å"export controls, including nonproliferation of nuclear technology and nuclear hardware; measures to foster commercial interaction with foreign nations and to safeguard American business abroad; international commodity agreements; international education; and protection of American citizens abroad and expatriation.† While the worldwide influence of the United States remains strong, it is declining in the area of economic output as the wealth and prosperity of nations like China, India, Russia, Brazil, and consolidated nations of the European Union has increased. Many foreign policy analysts suggest that the most pressing problems facing U.S. foreign policy today include issues such as terrorism, climate change, and the growth in the number of nations possessing nuclear weapons. What About U.S. Foreign Aid? U.S. aid to foreign countries, often the source of criticism and praise, is administered by the United States Agency for International Development (USAID). Responding to the importance of developing and maintaining stable, sustainable democratic societies worldwide, USAID peruses a primary goal of ending extreme poverty in countries with average daily individual personal incomes of $1.90 or less. While foreign aid represents less than 1% of the annual U.S. federal budget, the expenditure of about $23 billion a year is often criticized by policymakers who argue the money would be better spent on U.S. domestic needs. However, when he argued for passage of the Foreign Assistance Act of 1961, President John F. Kennedy summed up the importance of foreign aid as follows: â€Å"There is no escaping our obligations- our moral obligations as a wise leader and good neighbor in the interdependent community of free nations- our economic obligations as the wealthiest people in a world of largely poor people, as a nation no longer dependent upon the loans from abroad that once helped us develop our own economy and our political obligations as the single largest counter to the adversaries of freedom.† Other Players in U.S. Foreign Policy While the Department of State is mainly responsible for implementing it, a great deal of U.S. foreign policy is developed by the ​President of the United States along with presidential advisers and Cabinet members. The President of the United States, as the Commander in Chief, exercises broad powers over the deployment and activities of all U.S. armed forces in foreign nations. While only Congress can declare war, presidents empowered by legislation such as the War Powers Resolution of 1973 and the Authorization for Use of Military Force Against Terrorists Act of 2001, have often sent U.S. troops into combat on foreign soil without a congressional declaration of war. Clearly, the ever-changing threat of simultaneous terrorist attacks by multiple poorly defined enemies on multiple fronts has necessitated a more rapid military response that allowed by the legislative process. The Role of Congress in Foreign Policy Congress also plays an important role in U.S foreign policy. The Senate consults on the creation of most treaties and trade agreements and must approve all treaties and cancellation of treaties by a two-thirds supermajority vote. In addition, two important congressional committees, the Senate Committee on Foreign Relations and the House Committee on Foreign Affairs, must approve and may append all legislation dealing with foreign affairs. Other congressional committees may also deal with foreign relations matters and Congress has established numerous temporary committees and sub-committees to study special issues and matters relating to U.S. foreign affairs. Congress also has significant power to regulate U.S. commerce and trade with foreign nations. The United States Secretary of State serves as the foreign minister of the United States and is in charge of conducting nation-to-nation diplomacy. The Secretary of State also has wide responsibility for the operations and security of the nearly 300 U.S. embassies, consulates, and diplomatic missions around the world. Both the Secretary of State and all U.S. ambassadors are appointed by the president and must be approved by the Senate.   Sources and Further Reference â€Å"Foreign Relations of the United States.† U.S. Department of State Archives.â€Å"Milestones in the History of U.S. Foreign Relations.† U.S. Department of State Office of the Historian.US Foreign Aid by Country - Foreign Aid Explorer. United States Agency for International Development.â€Å"Efforts to Improve Management of U.S. Foreign Aid.† U.S. Government Accountability Office. (March 29, 1979).

Saturday, November 23, 2019

Aardvark Fast Facts

Aardvark Fast Facts Aardvarks (Orycteropus afer) are known by several common names including antbears and anteaters; they are native to sub-Saharan Africa. The name aardvark is Afrikaans  (a daughter language of Dutch) for earth pig. Despite these common names, aardvarks are not closely related to bears, pigs, or anteaters. Instead, they occupy their own distinct order: Tubulidentata. Fast Facts: Aardvark Scientific Name: Orycteropus aferCommon Names: Aardvark, antbear, anteater, Cape anteaters, earth pigBasic Animal Group: MammalSize: Up to 6.5 feet long, 2 feet at shoulder heightWeight: 110–175 poundsLifespan: 10 yearsDiet:  CarnivoreHabitat: Sub-saharan AfricaPopulation: Not quantifiedConservation Status: Least Concern Description Aardvarks are medium-sized mammals (weighing 110–175 pounds and up to 6.5 feet long) with a bulky body, arched back, medium-length legs, long ears (resembling those of a donkey), a long snout, and a thick tail. They have a sparse coat of coarse grayish brown fur covering their body. Aardvarks have four toes on their front feet and five toes on their rear feet. Each toe has a flat, sturdy nail that they use for digging burrows and tearing into insect nests in search of food. Aardvarks have very thick skin which provides them protection from insect bites and even the bites of predators. Their teeth lack enamel and, as a result, wear down and must regrow continuously- the teeth are tubular and hexagonal in cross-section. Aardvarks have small eyes and their retina only contains rods (this means they are color-blind). Like many nocturnal animals, aardvarks have a keen sense of smell and very good hearing. Their front claws are especially robust, enabling them to dig burrows and break open termite nests with ease. Their long, serpentine tongue (10–12 inches) is sticky and can gather up ants and termites with great efficiency. The classification of the aardvark was controversial at one time. Aardvarks were formerly classified in the same group as  armadillos, sloths, and anteaters. Today, genetic studies have shown that the aardvark is classified in the order called the Tubulidentata (tube-toothed), and the family Orycteropodidae: They are the only animal in either order or family. Shongololo90/Getty Images   Habitat and Range Aardvarks inhabit a variety of habitats including savannas, shrublands, grasslands, and woodlands. Although they once lived in Europe and Asia, today their range extends throughout most of sub-Saharan Africa, every ecosystem except marshes, deserts, and very rock terrains. Bridgena_Barnard/Getty Images   Diet and Behavior Aardvarks forage at night, covering extensive distances (as much as 6 miles per night) in search of food. To find food, they swing their noses from side to side over the ground, trying to detect their prey by scent. They feed almost exclusively on termites and ants and can consume up to 50,000 insects in a single night. They occasionally supplement their diet by feeding on other insects, plant material or the occasional small mammal. Solitary, nocturnal mammals, aardvarks spend the daylight hours safely tucked away inside their borrows and emerge to feed during the late afternoon or early evening. Aardvarks are extraordinarily fast diggers and can excavate a hole 2 feet deep in less than 30 seconds. The main predators of aardvarks include lions, leopards, and pythons. Aardvarks dig three types of burrows in their ranges: relatively shallow foraging burrows, larger temporary shelters to hide from predators and more complex burrows for permanent residence. They share their permanent residences with other creatures but not other aardvarks. Investigation of the residential burrows has shown that compared to the surrounding soil, soil inside the burrow is cooler (between 4 and 18 degrees F cooler depending on the time of day), and moister. The differences remained the same no matter how old the burrow was, leading researchers to name the aardvark an ecological engineer. Reproduction and Offspring Aardvarks reproduce sexually and form pairs only for a short time during the breeding season. Females give birth to one or rarely two cubs after a gestation period of 7–8 months. In northern Africa, Aardvarks give birth from October to November; in the south, from May and July. The young are born with their eyes open. The mother nurses the young until they are 3 months old when they start eating insects. They become independent of their mothers at six months and venture off to find their own territory. Aardvarks become sexually mature at two to three years of age and have lifespans in the wild of about 18 years. Evolutionary History Aardvarks are considered to be living fossils due to their ancient, highly conserved genetic make-up. Scientists believe that todays aardvarks represent one of the most ancient lineages among the placental mammals (Eutheria). Aardvarks are considered to be a primitive form of hoofed mammal, not because of any obvious similarities but instead due to subtle characteristics of their brain, teeth, and musculature. The closest living relatives to the aardvarks include  elephants, hyraxes,  dugongs, manatees, elephant shrews, golden moles, and tenrecs. Together, these mammals form a group known as the Afrotheria. Conservation Status Aardvarks once existed in Europe and Asia but are now only found in sub-Saharan Africa. Their populations are unknown but they are classified as Least Concern by the International Union for Conservation of Nature (IUCN) and not listed as threatened at all by the ECOS Environmental Conservation Online System. Major identified threats to the aardvark are habitat loss through agriculture, and human and trapping for bush meat. The skin, claws, and teeth are used to make bracelets, charms and curious and some medicinal purposes.  Ã‚   Sources Buss, Peter E., and Leith C. R. Meyer. Chapter 52: Tubulidentata (Aardvark). Fowlers Zoo and Wild Animal Medicine, Volume 8. Eds. Miller, R. Eric and Murray E. Fowler. St. Louis: W.B. Saunders, 2015. 514–16. Print.Gozdziewska-Harlajczuk, Karolina, Joanna Kleckowska-Nawrot, and Karolina Barszcz. Macroscopic and Microscopic Study of the Tongue of the Aardvark (Orycteropus Afer, Orycteropodidae). Tissue and Cell 54 (2018): 127–38. Print.Haussmann, Natalie S., et al. Ecosystem Engineering through Aardvark (Orycteropus Afer) Burrowing: Mechanisms and Effects. Ecological Engineering 118 (2018): 66–72. Print.Ratzloff, Elizabeth. Orycteropus afer (aardvark). Animal Diversity Web, 2011.  Taylor, W. A., P. A. Lindsey, and J. D. Skinner. The Feeding Ecology of the Aardvark Orycteropus Afer. Journal of Arid Environments 50.1 (2002): 135–52. Print.Taylor, A. and T. Lehmann. Orycteropus afer. The IUCN Red List of Threatened Species: e.T41504A21286437, 2015.

Thursday, November 21, 2019

Contribute to the complex nursing of clients Case Study

Contribute to the complex nursing of clients - Case Study Example She was admitted into the ward by wheel chair for investigation of increased abdominal girth and jaundice. She has been taking corticosteroids for her asthma for 6 months and has been receiving insulin SC, BD which her husband has been administering at home. This paper shall discuss the clinical manifestations of Mrs. Carr’s diagnosis. It shall outline the appropriate nursing interventions for Mrs. Carr, taking into consideration her physical, emotional, and psychosocial needs. A rationale for these interventions shall also be discussed. Mrs. Carr’s medical management shall also be discussed along with an outline of their mode of action and what reactions may be observed from these medications. This paper shall also discuss the observations I would perform on Mrs. Carr, and the rationale for such observations. Finally, this paper shall discuss how I, as an enrolled nurse, can maintain the client’s dignity and rights within legal and ethical guidelines. There are numerous manifestations of Mrs. Carr’s disease. Since, she has multiple diseases, various signs and symptoms will be seen. Mrs. Carr’s Alzheimer’s disease manifests with her loss of memory, disorientation, mood changes, and difficulties in performing her activities of daily living. These symptoms are consistent with the symptoms of Alzheimer’s as enumerated by Vishnu (â€Å"Conditions and Diseases†). Mrs. Carr’s osteoarthritis manifests with symptoms which include pain and stiffness in her joints, loss of flexibility in her joints, and very often swelling and tenderness in the vicinity of her joints. These symptoms are consistent with the symptoms of the disease as enumerated by the Mayo Clinic (â€Å"Disease and Conditions†). Her Type I diabetes manifests with excessive thirst and fatigue, weight loss, blurred vision, and frequent urination. Such symptoms, according to

Tuesday, November 19, 2019

Math portfolio Essay Example | Topics and Well Written Essays - 1750 words

Math portfolio - Essay Example In addition, it will be also checked that what happen if no further doses is given to malaria patient over a week period after an initial dose of 10 ÃŽ ¼g. From The graph of the given data, it is obvious that the amount of drug in the bloodstream decreases as the time passes. From investigation, it is found that it is similar to the graph of an exponential decay function (for example radioactive decay graph). The general equation of such an exponential decay function is: From the above function, the different values of can be determined for the given data that is summarized in table 2. Since, there are different values of for every data points, therefore, for our model function taking average value (mean value) of from the calculated values of ,. Figure 2 shows the Graph of model function and data given. From figure 2 , it can be seen that the graph of model function and data given are similar and approximately follows the same path. Some minor deviations may be because of the error in colleting the data for the amount of drug in the bloodstream over a period. The model functionis suitable for the modeling of amount of the drug in the bloodstream. The suitability of the model function is also derived from the comparison of the graph of model function and data given and both are similar. From given graph of amount of drug in the bloodstream for 10-hour period following an initial dose of 10 ÃŽ ¼g, it can be seen that amount of drug remained in the bloodstream after six-hour period is equal to 3.7 ÃŽ ¼g. Therefore, in six-hour period the amount of drug decay is 6.3 ÃŽ ¼g. Assuming this decay-rate is constant for further period, when a patient is instructed to take 10 ÃŽ ¼g of this drug every six hours. Then, the amount of drug at start and at end of each period will be as given in table 3. The maximum amount of drug 21.1 ÃŽ ¼g in the bloodstream will be at start of fourth period (i.e. 18-24 hour period) and the minimum amount of drug 3.7 ÃŽ ¼g in

Sunday, November 17, 2019

Poetry changed alongside wider society Essay Example for Free

Poetry changed alongside wider society Essay We learn that Arnold can no longer draw comfort from the sea of faith or religion which encompassed him and like the folds of a bright girdle furled. Instead, the coast and sea is an analogy for religious trend. Christianity is ebbing away because of scientific dispatch. This results is the naked shingles of the world; a place that is unprotected and fragile with no supreme power to guide man. This confusion is emphasized the informality of its structure. The lack of a coherent rhythm and rhyme scheme creates the illusion of tide, But now I only hear, Its melancholy, long, withdrawing roar, Retreating to the breath, which swashes and washes along the coast just like the different line lengths. As we can see, Arnold is hesitant of change and acceptance for him results in apprehension. This is unusual in the sense that, conventionally, acceptance results in peace of mind. Ironically, in gods Grandeur, when Hopkins refutes absolute science, he is more buoyant and cheerful towards which is not the usual characteristics of denial. In the poem, despite the fall of contemporary Victorian society, nature is never spent and permeates the world with the dearest of freshness. Hopkins conveys an image of god being a regenerative force who is able to bring morning following the last lights of the black west. He is defiant of the theory of evolution and instead believes in the holy ghost. Gods Grandeur ends with: World broods with warm breast and with ah! Bright wings. This imagery is inspired with hope and resembles the techniques by Romantic poets where an animal would be used as the vehicle to escape misery; for example the skylark in Keats poem. On the other hand, Dover Beech is not optimistic but instead shares the pessimism associated with poems in the 1900. Arnold depicts the world as a stagnant site with neither joy, nor love nor light. In the last stanza, he talks personally to his wife: Ah, love, let us be true In a place of no faith, Arnold wishes to pin their faith on each other- the language becomes poetic with a series of semantically related adjectives: So various, so beautiful, so new The Victorians lived through a time of change however change in the near future results in neither certitude, nor peace, nor help for pain. This apprehension is felt by Arnold who is swept with confused alarms; the complete antithesis of Hopkins.

Thursday, November 14, 2019

What inspires you? :: essays research papers

What inspires you?   Ã‚  Ã‚  Ã‚  Ã‚  I have two things that inspire me in my life. One of them is my parents especially my mother, the other is the accident of my dad ¡Ã‚ ¯s company occurred in recent.   Ã‚  Ã‚  Ã‚  Ã‚  I will talk about the accident happened in March of this year. I live in States but my parents live in Korea. Only way we contact is using phone, or I visit them for every summer and winter vacation. If they don ¡Ã‚ ¯t tell me what is going on in our family there is no way to figure out that when I am in States. When I got home for this summer vacation, my dad asked me to come home early one day and he said that there is a serious thing that he wanted to talk to me. I had no clue what was going on. He said that there was a fire broken out in his factory. He owns huge furniture factory and he is C.E.O of this company. The biggest storage of his plant was gone because of the fire. It was about 1.8 million dollars worth, and it ¡Ã‚ ¯s gone now. People said that it was on the TV and newspaper for 3 days as a big tragedy. I visited there and I saw people working there to build new one again. The first problem he got was the loss of his assets and the second one was that he was getting too much of stress from that. I always got my personal expenses from my dad during vacation, but I just decided to work and make money. I know it is hard since I am taking 10 credits of summer courses during whole summer vacation. I strongly felt that I need to do something for my dad. So I applied one of the biggest accounting corporation in Korea, I got accepted as intern. It ¡Ã‚ ¯s been a little bit more than a month I ¡Ã‚ ¯ve been working, but the problem is that I only get 3hours sleep except the weekend. After I get home from work I eat dinner and start my homework and quizzes for my summer courses then I can go to sleep at around 3 or 4 o ¡Ã‚ ¯clock in the morning. I get really tired physically and mentally but when I think about what my dad was suffering from the accident it is nothing. I started thinking in positive way that this is good opportunity to overcome the suffer in my life. What inspires you? :: essays research papers What inspires you?   Ã‚  Ã‚  Ã‚  Ã‚  I have two things that inspire me in my life. One of them is my parents especially my mother, the other is the accident of my dad ¡Ã‚ ¯s company occurred in recent.   Ã‚  Ã‚  Ã‚  Ã‚  I will talk about the accident happened in March of this year. I live in States but my parents live in Korea. Only way we contact is using phone, or I visit them for every summer and winter vacation. If they don ¡Ã‚ ¯t tell me what is going on in our family there is no way to figure out that when I am in States. When I got home for this summer vacation, my dad asked me to come home early one day and he said that there is a serious thing that he wanted to talk to me. I had no clue what was going on. He said that there was a fire broken out in his factory. He owns huge furniture factory and he is C.E.O of this company. The biggest storage of his plant was gone because of the fire. It was about 1.8 million dollars worth, and it ¡Ã‚ ¯s gone now. People said that it was on the TV and newspaper for 3 days as a big tragedy. I visited there and I saw people working there to build new one again. The first problem he got was the loss of his assets and the second one was that he was getting too much of stress from that. I always got my personal expenses from my dad during vacation, but I just decided to work and make money. I know it is hard since I am taking 10 credits of summer courses during whole summer vacation. I strongly felt that I need to do something for my dad. So I applied one of the biggest accounting corporation in Korea, I got accepted as intern. It ¡Ã‚ ¯s been a little bit more than a month I ¡Ã‚ ¯ve been working, but the problem is that I only get 3hours sleep except the weekend. After I get home from work I eat dinner and start my homework and quizzes for my summer courses then I can go to sleep at around 3 or 4 o ¡Ã‚ ¯clock in the morning. I get really tired physically and mentally but when I think about what my dad was suffering from the accident it is nothing. I started thinking in positive way that this is good opportunity to overcome the suffer in my life.

Tuesday, November 12, 2019

How does an organization create customer value Essay

Marketing experts Don Peppers and Martha Rogers said: â€Å"Without customers, you don’t have a business.† It is such a simple, nevertheless, a scary thought. We live in a world of consumerism, in which the customer’s wants and desires greatly exceed their basic needs. Even though many see this concept as a threat to modern world society, it has created the extremely competitive marketplace for businesses. The companies are competing everyday to win over as many customers as possible by offering products that create irreplaceable value and benefit to those customers. Many companies will succeed in getting the customers to buy into their value and benefit however, the true success of a business is not linked only to getting new customers. It is considerably linked with keeping those customers around and winning over the customers from their competition. Companies work hard to develop creative marketing schemes for their products so that the company is recognized a nd perceived as valuable and beneficial to the customer. However, I believe that all strong companies start from the same point: listening to the customer. The extraordinary merits of information technology, such as the internet, cell phones, social media, television, radio, etc. have made the world we live in a global village. Thanks to the information technology, distance has never been less of an obstacle to communication amongst people. Technology has made information essentially accessible to everyone, everywhere, at any time making consumers, â€Å"more educated and informed than ever. They have the tools to verify companies’ claims and seek out superior alternatives† (Kotler & Keller, 2009, p.121). Consumerism and technology have made it possible for the customer to be heard. They can share interests, as well as positive and negative reviews for others to see. Companies follow and act upon those interests and reviews. They analyze all the information and seek to create a product that will satisfy the consumer’s interests and minimize the negative reviews. The creation of a quality product or a service that satisfies a great number of the customer’s needs and wants will create competitive advantage in the marketplace for the company and will make the product or service valuable to the customer. Ultimately, it will create an valuable experience. Positive experiences create loyalty towards that product and, â€Å"deeply held commitment to rebuy or repatronize a preferred product or service in the future despite  situational influences and marketing efforts having the potential to cause switching behavior† ( Kotler & Keller, 2009, p.123). Negative experiences on the other hand can cause dissatisfaction with the product and cause a customer to defect and go to the competitor. When defection happens companies seek other ways to retain current customers, gain new ones, or even stop dissatisfied customers from defecting. Som e of the other ways companies make themselves valuable to the customer are: speed of service, discounts and rebates, warranties, loyalty programs, gifts, etc. Sale!Sale!Sale! 20-70% off entire store! 2 for 1! All these marketing schemes, discounts, and rebates are used to promote value in the eyes of the customer. Customers like to use phrases like: †I want more for my money†, or, â€Å"getting more for less†. One of the best ways that companies show they are valuable to customers is lowering the price of their products. The value created for the customer is satisfaction and a feeling of success. Meeting customer needs with a product is great, but the real measure of success cannot be measured by the product made, but by the feeling that the customer gets after purchasing it. That feeling of satisfaction or dissatisfaction after purchasing the product will affect the customer retention base, customer loyalty, company’s image, and ultimately the bottom line. Many companies today compete on price and try to create value for the customer by giving them more for less. No matter how good the product or service is, mistakes will happen and the customers will complain. Many people don’t like to hear complaints, but when there is money involved there will be complaining. The first step in making the company valuable to the customer is by making complaints easier and more accessible. By doing this the company makes it personable, consequently creating the value of importance for the customer instead of making them just a number. Benjamin Franklin said, â€Å"Well done is better than well said†. Companies might say they will make it personal and resolve the issue, but then you are put on hold for thirty minutes when you call in for a complaint, or your car might have to stay in the shop two days longer than anticipated. When inconveniencing the customer in moments like these, any effort to help the customer resolve the issue thereafter may be futile. That may very well be the last time the company will deal with that particular customer. The second step in creating value for the customer is the speed at which the issue will be resolved. It  might sound clichà ©, but time is money, and an attorney that has to be on hold for thirty minutes might have lost the opportunity to earn two hundred dollars. He might take it personal and go to your competitor. Acc ording to Kotler & Keller (2009), â€Å"Of the customers who register a complaint, between 54% and 70% will do business with the organization again if their complaint is resolved. The figure goes up to a staggering 95% if the customer feels the complaint was resolved quickly† (p.129). Therefore, it is not just resolving the issue that makes the customer value your company, it is the speed at which that issue or complaint is resolved. The desire of each marketing person and each company, per se, is building a strong and loyal customer base. Quality products and services create satisfied customers, and that satisfaction creates a relationship between the customer and a brand. If the customer is repeatedly content with the benefits from the particular product or service, it starts building loyalty. Once loyalty is established companies continue creating value for the customer thru development of loyalty programs that provide customers with extra rewards and benefits, making them feel more valuable since they are not getting those benefits anywhere else. The company has created ultimate value for both customer and themselves when their customers become their clients. According to Kotler & Keller (2009), â€Å"Customers may be nameless to the institution; clients cann ot be nameless. Customers are served as part of the mass or as part of the large segments; clients are served on an individual basis. Customers are served by anyone who happens to be available; clients are served by the professional assigned to them† (p.140). Companies create competitive advantage in the market by putting the customer’s wants and needs ahead of everything, understanding that without their customers they would not exist. In today’s world of consumerism and information, every company is capable of creating a valuable experience for their customers. However, the difference between the leaders in the market and others is that the leaders are constantly making their customer’s feel valued. Leading companies listen to their customers, they resolve their customer’s complaints and concerns in a fast and effective manner. They make customers feel valuable by building personal relationships thru numerous loyalty programs, and ultimately deepe n that relationship by making their customers into clients.

Sunday, November 10, 2019

Microsoft Opens the Gates: Patent, Piracy, and Political Challenges in China Essay

Microsoft faced many macro risks when operating in China. Many of these risks included software piracy, Chinese government pressure to transfer technology, host government promotion of competitor products, discriminatory procurement practices by sub-national authorities in China, and the strong encouragement for Microsoft to enter joint ventures with local firms. One main micro risk that Microsoft faced was when the Beijing Municipal government avoided Microsoft by awarding operating system software contracts for 2,000 PCs to Red Flag Linux. I see these risk increasing due to the fact that the Chinese Central Bank has put new restrictions to foreign exchange transactions in attempt to control the flow of convertible currency out of the country. This restriction set in place by the Chinese Central Bank was described as a â€Å"crackdown† on illegal transactions. This change will effectively make it more difficult for both domestic and international companies to move capital in and out of China. In result, only increasing the risks for MNCs to do business in China. Another main reason why I see the risks increasing is that the Chinese government has not made an effort to control the piracy/counterfeiting issues. Counterfeiters are China’s largest state owned factories. These risk are also found in other developing countries such as India where piracy and counterfeiting is a big issue. After the U. S. – China accord on intellectual property rights in 1992, it encouraged Microsoft to explore further opportunities in China. In order to manage political risk in China, initially, Microsoft signed various agreements with Chinese PC producers to pre-load its software on their computers. Other approaches to manage political risk included opening Microsoft Research China (Microsoft’s second international research lab and the first one in Asia) and signed agreements with China’s top four computer makers to preinstall Windows XP on their machines. One of the most notable approaches was when Microsoft signed an accord with the Shanghai Municipal government whereby agreed to help develop Shanghai’s software sector, expand its Shanghai regional support center into a global support center, and train thousands of software architects. Ultimately, Microsoft continued to manage political risks throughout the years by continuing to build agreements with Chinese PC manufacturers, develop new partnerships and better its relations with the Chinese government. I favor the strong ties that Microsoft built over the past two decades with the Chinese government and feel that all the techniques they used to manage political risk were needed in order to conduct profitable business in such a scrutinized country and economy. Going forward, Microsoft should continue to try and enforce IPR and keep healthy relationships with the Chinese for obvious reasons. They should keep developing partnerships and build a Microsoft oriented software sector in China through training/certification to strengthen the company’s forecast. By having to deal with lower levels of government, it created an initial challenge to â€Å"win† over the lower level of government in order to strengthen Microsoft’s overall relationship with China. Specific challenges included when the they signed agreements with China’s State Development & Planning Commission to invest in education/training, signed a large investment and cooperation deal with the Beijing Commission on Science & Technology and struck partnership deals with various Chinese companies such as Petro China. Although Microsoft kept making strong efforts to strengthen the relationship with China, they still faced many challenges to overcome China’s discrimination towards the company by requiring all ministries to purchase Linux based software. These challenges created new opportunities for Microsoft to create new initiatives to benefit the Chinese economy which in result helped them build a strong footprint in China. Yes other firms do have the same risk management options as Microsoft did. Other firms did have the same risk management options because all MNCs faced the same macro/micro issues that Microsoft faced when entering the China markets which included pressure to transfer technology, host government promotion of competitor products, discriminatory procurement practices by sub-national authorities in China, and the strong encouragement to enter joint ventures with local firms. Microsoft is creating serious risks by supporting, financing, and transferring technology to local Chinese software firms but had to do so in rder to have success in China. By them giving back to the Chinese economy, in return a large percentage of software users are using Microsoft product legally and illegally. In result, the end user is most likely using a Microsoft product and creates brand awareness. Microsoft used the appropriabiltiy theory to manage their risks by only sharing information with their partners that is only appropriate in order to make the partnership work.

Thursday, November 7, 2019

Womens Economic Role In WWII essays

Women's Economic Role In WWII essays Coming only 21 years after the war to end all wars, World War II plunged the United States into yet another worldwide conflict. This brought significant changes to everyone's lives, especially those of American women. Until the 1940's, women usually got married at a young age. They did housework and took care of their children while their husbands went to work to support the family. In fact, during the depression, the federal government joined with local government, school boards, and private business to exclude married women from the work force (Woloch 301). All of this changed forever with the onset of World War II, which opened numerous opportunities for women. During the Depression years of the 1930's, many changes took place. Men were losing their jobs, and family life was severely stressed. "Middle class families had a sudden decline in status. In such families, wives often moved in to fill a power vacuum" (Woloch 285). "Contradictory pressures" were brought to bear upon women wage earners (Woloch 287). "Public attitudes urged them not to work, but economic circumstances both spurred wage labor and in some instances made jobs available" (Woloch 287). While there was significant job loss suffered by both men and women during these years, due to the "segregated occupational patterns" of women's jobs and the fact that "men did not seek 'women's work,'" women were "protected to an extent" by a division of labor within the work force (Woloch 287). While many women maintained jobs, employment in some cases was very difficult. Wages were low and working conditions were unpredictable with "layoffs or speed-ups" (Woloch 288). While "Fra nces Perkins sat as Secretary of Labor in Franklin Roosevelt's cabinet, massive male unemployment brought forth demands that married women be dismissed from jobs in order to spread the work" (Janeway x). At about this same time, the National Recovery Administration permitted lower minimum w...

Tuesday, November 5, 2019

Grammatical Error Definition and Examples

Grammatical Error Definition and Examples Grammatical error is a term used in prescriptive grammar  to describe an instance of faulty, unconventional, or controversial usage, such as a ​misplaced modifier  or an inappropriate verb tense. Also called a usage error. Compare grammatical error with correctness. Grammatical errors are usually distinguished from (though sometimes confused with) factual errors, logical fallacies,  misspellings, typographical errors, and faulty punctuation. Interestingly, many people  tend to view usage errors primarily as gaffes or potential sources of embarrassment, not as impediments to effective communication. According to an ad for an amazing book on usage, Mistakes in English can cause you embarrassment, hold you back socially and on the job. It can make you look awkward and hide your true intellect. (Note that in the second sentence the singular pronoun it has no clear referent. Many English teachers would regard this as a grammatical error- specifically, a case of faulty pronoun reference.)   Examples and Observations The expression grammatical error sounds, and is, in a sense, paradoxical, for the reason that a form cannot be grammatical and erroneous at the same time. One would not say musical discord. . . . Because of the apparent contradiction of terms, the form grammatical error should be avoided and error in construction, or error in English, etc., be used in its stead. Of course one should never say, good grammar or bad grammar.(J. T. Baker, Correct English, Mar. 1, 1901)â€Å"We believe, as do most linguists, that native speakers do not make mistakes.†(Peter Trudgill and Lars-Gunnar Andersson, 1990, quoted by Carl James in Errors in Language Learning and Use. Addison Wesley Longman, 1998) Garner on Grammatical Errors If descriptivists believe that any linguistic evidence validates usage, then we must not be descriptivists. Hardly anyone wants to be a nonjudgmental collector of evidence. It’s far more interesting and valuable to assemble the evidence and then to draw conclusions from it. Judgments. Rulings. To the extent that the masses want such reasoningas one could only wishit’s because they want to use language effectively. (Bryan A. Garner, Which Language Rules to Flout. Or Flaunt? The New York Times, September 27, 2012)Because grammatical may mean either (1) relating to grammar [grammatical subject] or (2) consistent with grammar [a grammatical sentence], there is nothing wrong with the age-old phrase grammatical error (sense 1). Its as acceptable as the phrases criminal lawyer and logical fallacy. (Bryan A. Garner, Garners Modern American Usage. Oxford University Press, 2009) Grammar and Usage Usage is a concept that embraces many aspects of and attitudes toward language. Grammar is certainly only a small part of what goes to make up usage, though some people use one term for the other, as when they label what is really a controversial point of usage a grammatical error. (Merriam-Websters Collegiate Dictionary, 11th ed., 2003) Error Analysis Error analysis, as a descriptive rather than a prescriptive approach to error, provides a methodology for determining why a student makes a particular grammatical error and has been a potentially valuable borrowing from this field [research in second-language acquisition], one that could have altered the prescriptive drilling of standard forms which still comprises much of basic writing texts. Unfortunately, however, error analysis in the composition classroom has generally served to simply keep the focus on error. (Eleanor Kutz, Between Students Language and Academic Discourse: Interlanguage as Middle Ground. Negotiating Academic Literacies, ed. by Vivian Zamel and Ruth Spack. Lawrence Erlbaum, 1998) The Lighter Side of Grammatical Error First mobster: Hey. Theys throwin robots.Linguo: They are throwing robots.Second mobster: Its disrespecting us. Shut up ayou face.Linguo: Shut up your face.Second mobster: Whatsa matta you?First mobster: You aint so big.Second mobster: Me an him are gonna whack you in the labonza.Linguo: Mmmm . . . Aah! Bad grammar overload. Error. Error.[Linguo explodes](Trilogy of Error, The Simpsons, 2001) Also Known As: error, usage error, grammar error or mistake, bad grammar

Sunday, November 3, 2019

Baumans Self Preservation and Moral Duty and William C. Levins Assignment

Baumans Self Preservation and Moral Duty and William C. Levins Ideology - Assignment Example It is evidently clear from the discussion that ownership is a social affair, the owner can deny access to property while a non-owner has to ask for permission. Ownership allows the owner to become independent of another’s power, hence it is perceived as an enabling faculty. â€Å"It extends one’s autonomy, freedom, action, and choice† (Bauman, 2006, p. 128). Connecting this with ownership and self-preservation, Bauman says that man’s ultimate goal is to eliminate the competition and to gain control of goods. Because such interaction is a zero-sum game, the winners get to dictate the rules of the game while the losers suffer. In this view, the poor are viewed as â€Å"lazy, slovenly and negligent†¦[they are] lacking in character, shirking hard labor, and inclined to delinquency and law-breaking† (Bauman, 2006, p.130). In this view, there is no room for moral duty which â€Å"finds its expression in the consideration of the needs of others† (Bauman, 2006, p. 131). If man were to fulfill his moral duty, then he will have to exercise self-restraint or voluntarily renounce his personal gain. The bureaucracy which was supposed to ensure that resources are allocated wisely are neutral, according to Bauman, hence, it acts based on rationality. It seems that â€Å"every person had ‘a job to do’, a problem to be solved† (Bauman, 2006, p.133). When a man does not do his job, then he will suffer because of it. Because of this view, the bureaucracy is â€Å"made to service inhuman purposes†¦[it has the] ability to silence moral motivations and†¦[appeal] to the motive of self-preservation† (Bauman, 2006, p. 134). By acting rationally, a man can make correct choices that directly addresses his need for self-preservation and self-enhancement. Levin’s discussion of ideology directly relates to this need for self-preservation. According to him, â€Å"ideologies suit to change the times, a nd people can change the ideologies to which they subscribe† (Levin, 2001, pp. 241-242), depending on a person’s best interest. The changing ideologies are used to justify the actions of a group of people who are actually working to achieve their goals which based on the values that they have.

Friday, November 1, 2019

Comprehension strategies Essay Example | Topics and Well Written Essays - 500 words

Comprehension strategies - Essay Example Helping students to comprehend narrative, expository and poetic texts is a challenge that faces all teachers. Regardless of subject or grade level, all teachers are teachers of reading. Many comprehension strategies have been developed over the past three decades.While all can be applied to any of these three types of texts, some seem to naturally go with one more than another.Choosing â€Å"the best† for each one is not really possible, because teacher personality, state standards and concerns such as class size and student grouping all have bearing on which comprehension strategy should be used. The three strategies in this essay have all been used to good effect by myself or one of my former teachers. A good comprehension strategy for helping students to maximize their understanding of a c narrative text is an activity called â€Å"What is it?† This is an activity where students work individually and in cooperative groups to recall the most important elements of sett ing, character and plot. Students retell portions of the narrative text to one another while listening student record important points relating to setting, character and plot. This activity utilizes graphic organizers and is facilitated by the instructor. Retelling portions of the text allows the student speaking the opportunity to give voice to their impressions and remembrances of the narrative. Students listening use the graphic organizer to write points mentioned by the speaker. Each student in the group takes a turn adding to the growing list of setting, character and plot elements

Wednesday, October 30, 2019

Susan Griffin and her Our Secret Essay Example | Topics and Well Written Essays - 750 words

Susan Griffin and her Our Secret - Essay Example Susan Griffin and her "Our Secret" In the process of writing Our Secret Susan Griffin mixes two different styles. Thus, she resorts to the use of academic and personal writing. All her personal writing is combined with the insertions of scientific information. In fact, the beginning of Our Secret puzzles the readers with unexpected data about the nucleus of the cell: â€Å"The nucleus of the cell derives its name from the Latin nux, meaning nut. Like the stone in a cherry, it is found in the center of the cell, and like this stone, keeps its precious kernel in a shell† (Griffin 335). This information in the beginning of the writing seems to have no sense at first sight; it seems to have no connection with secrets. However, it is not so. The author just uses this phrase to start her research. She does not refer to the writers who give only perfunctory information. Susan Griffin is eager to find out the root of all secrets in her story. That is why she needs to conduct a research and think over the things that ha ve never been considered by other authors. Sometimes it may seem that Susan Griffin uses scientific information in order to compare it to the fates of her characters. That is why she assembles fragments juxtaposes seemingly unrelated material in surprising and suggestive relationships. Each page of Our Secret is broken into italicized inter-sections. In fact, Susan griffin’s prose is applied in order to create a ‘field’ for the bodies set in it. This author seems to create the story under consideration in order to investigate the issues that have interested her. Thus, Griffin’s writing is something like the result of hard intellectual work. It is impossible to conduct a research without the use of certain research methods. What research methods were applied by Susan Griffin, then? Of course, it is observation, comparison and data analysis. In the process of writing the author watches the fates of several characters of Our Secret. They are the following ones: Heinrich, Leo and Laura. All these three characters are unhappy. After observation the author makes an attempt to find out the reason for their misfortune. That is why she looks for facts that may help her by means of science. Sometimes the readers may come across rather odd comparisons. For instance, Griffin tries to find connections between humans to rockets and nucleus cells. The analysis of the data received by Susan Griffin gives her an opportunity to draw certain conclusions; she gets the findings of her thorough research. It turns out that human fate is closely connected with the seed sowed into it. One’s feature is frequently defined by his/her childhood. It is necessary to stress that the characters introduced to the reader had unhappy childhood that influenced their life greatly. Leo and Heinrich’s upbringing are the brightest examples to support this argument. Thus, it is known that Heinrich was deprived of his own childhood too early. This boy became an adult when he was only ten. Then period of c hildish joy was substituted by responsibility and seriousness. He could not enjoy his youth and carelessness just like all other boys did. The only thing he should have done was to obey his father and snitch on all his classmates. This was a

Sunday, October 27, 2019

Abortion: An Ethical Issue

Abortion: An Ethical Issue Abortion means terminating pregnancy. Abortion is widespread now days all over the world. Abortion is the most controversial subject when it comes to ethical issue. Ethical issues in abortion involve a constant battle between freedom and life. As per the article given in website www.bbc.co.uk/ethics/abortion, there are two groups of people: Pro-choice and Pro-life. Pro-choice people are for freedom. They consider it unethical to take away a womans right to decide over their own body. While pro-life people are for life. They consider it unethical to kill a growing life. Lets discuss in detail of both views. Prochoice people regard right to control ones own body as a key moral right. If women are not allowed to abort unwanted feotus they are deprived of this right.The foetus exists inside a womans body. A woman has the right to decide whether the foetus remains in her body, therefore a pregnant woman has the right to abort the foetus Pro-life advocates say that the right to life should always outweigh the right of an individual to equality or to control their own body. They raise arguments that abortion does not liberate women, but allows society not to cater to womens needs. They say that what women need for equality is not free access to abortion but to be given what they need to survive financially and socially as mothers. Further they hold that foetus is not a part of womans body like liver, kidney, lungs. It is a saperate Person inside the womb.Abortion means killing a human being or murder. Here they raise question that why woman or couple did not take precaution instead ? Why an innocent life is killed for someone elses mistake ? This also justifies the anti-abortion argument. Apart from Pro-life advocates there are other view against abortion like it is against feminist principle of justice, non-violence and non-discrimination. Another group objects abortion as they see it as a men plot. They argue that men see the risk of pregnancy as something that stops men having sex when they want it. If men are to achieve full sexual freedom it is essential that abortion be freely available to backup contraception. Summary: The issue of abortion is the most controversial issue. The advocates of Pro-life and Pro-choice have their own justifications. Pro-choice advocates hold that it is their right to have control over their own body. Pro-life advocates hold that from the very conception life start in the womb of a woman. It is actually a Person inside the womb. So, the question remains, Pro-life or pro-choice ? Critical analysis and evaluation of argument The fight between pro-life and pro-choice is an everlasting battle and the ethical dilemma. Lets analyze the arguments in context of two major philosophical theories: Teleological Theory and Deontological Theory, taken from the source: website: www.socyberty.com/Issues/Abortion-An-Ethical-Analyses First take a look at abortion from a Teleological point of view, it depends solely on consequences. Teleological theory is basically a Utilitarianism formulated by Jeremy and John Stuart Mill. This approach to morality and ethics hold that there is no universal basis for determining what is right. Main idea behind it is the principle of Utility. The principle focuses on the consequence of action, intentions are irrelevant, therefore breaking promise, lying, causing pain or killing someone may under certain circumstances be the right action and in other circumstances, wrong action. Applying this theory into the topic of abortion, question arises: Do I really need a child ? Am I ready for a baby ? Do I really want to give up all of my time to raise a baby ? or What if I am unhappy with a child. This theory seems to focus on a very selfish viewpoint of the situation. Utalitarian theory does not mean that a woman is selfish on her decision of abortion. Lets say a woman decides to have an abortion because she is not propared to have a child, she has no support: financial or emotional and she is still in school. The woman decides that it would be in her best interest to have abortion at this point. This woman can remain in school and not have to worry about bringing unplanned child, but just because this decision worked out well for her, was it the right decision ? Although this might seemed like a good decision, it still brings concerns and ethical dilemmas to our attention. Could she not have had child , found employment and stayed in school (as most people do)? Could she not have ultimately ended up being the happiest she has ever been because of this child coming into her life ? It might seem easy to determine ones own self interest, but do we sometimes take advantage of the choices we are given ? This question brings the case in the light of Deontological Theory. This theory is based on something other then the consequences of a persons actions. This theory has two approaches: Divine command Thoery and System of duties. Thomas Aquinas (1274-1275) was the proponent of Divine command theory. According to him the world is created by God. Whatever happens, happens with the will of God. Life is given and taken by him only. Human being doesnt have any right to take anyones life. A woman who followed the Divine Command theory might have done things differently in the same situation. She might not have based her decision on self interest, nor on consequences, but rather on something higher like God. God has given her this child to birth and care for. This also face criticism like how can we base a life altering decision on the belief that there is a higher power, God ? Immaneul Kant (1725-1805) is the leading proponent of Deontological Approach in decision making.. He formulated a System of Duties: Perfect duties and Imperfect duties. Perfect duties are to be followed in all circusmstances. In Perfect duties he mentions Not to kill an innocent person. Taking the pregnant womans case in this context, There is a Person inside her womb. From the time of conception in the womb, the child is, not just another part of the mothers tissue, but a saparate person. Abortion means killing of that Person. This faces critism that at the time of conceiving there is a just formation of cell having few tissues. Cells are created and destroyed continuously in our body. Both of these situations determine very different viewpoints, but how do we know which theory can be considered ethically moral ? There are many possible reasons a woman might choose to have an abortion, for example: to avoid interruption of life goals, the pregnancy is a result of rape, or to prevent birth of abnormal or diseased child, just to name a few. It is also obvious why some may consider abortion to be morally problematic, whether the reasons are based on religion, and the values of life. The truth is that each one of us is forced to decide how we feel about abortion, as we are with any ethical issue. So, the question remains, Pro-life or Pro-choice ? Personal Position: I personally feel that a woman should have the right to choose when it comes to abortion, but I will contradict myself under certain circumstances. In certain scenarios, the choice of abortion can be justified , but what about those who are just pure careless ? What about those who act carelessly because they know in the back of their minds that they have another alternative if something go unplanned ? For example: there are many teens that become pregnant because of carelessness in practicing safe sex. If these young girls knew that if they became pregnant, they had no option but to keep the child, would they be more careful ? Or would the number of teens who become pregnant remain the same ? I believe it would decrease.. Utilitarian approach of Teleological theory allows us to consider the Utility of child, it allows us to have second chance (abortion) should we make mistake or put health of ourselves at risk and kill unborn child. Divine Command theory does the exact opposite, it opens our eyes to new life, it leads us to believe that morality is based on God and the child was given to us by God. It also allows us to believe if our child had a deformity or disease, that it was meant to be and it is what makes our child special. It perceive us to believe that abortion would be wrong because the child was sent to us for a reason. So can abortion be ethical ? In my opinion, yes it can. It can be ethical when the choice is not being taken for granted. In conclusion, my research lead me to believe that while we have different theorys to agree or disagree with, abortion is a choice. I feel that when it comes to a decision of this kind, the ethicality of the situation is left only to that individual. As long as the women is presented with all options and alternatives, and she has the right to choose what she feels is best, regardless of our own personal feelings or religious beliefs towards abortion.

Friday, October 25, 2019

Essay example --

A libertarian would most likely be against this mandate on the grounds that a person should rightfully be compensated if they are to donate an organ and that should not be controlled by the government. A social democrat would most likely be in favor of such a mandate on the grounds that the government would not have to compensate organ donors thus essentially saving money for other practical healthcare matters. The organic view would be in favor of such a mandate on the grounds that the act of donating organs should be of voluntary nature anyways because such selfless acts would help promote the wellness of the community. I would expect a libertarian to be against such a mandate on the grounds that every person should be able to make their own personal choice as to whether they decide to wear a helmet or not. A social democrat would probably be in favor of such a mandate because it overall supports the safety of human life. The organic view towards this mandate would most likely be a favorable one because as more people use their helmets there is a higher likelihood of less casualties or serious injuries thus reducing potential healthcare costs. I would expect a libertarian to be against such a mandate on the grounds that every one person should be able to decide if their children should use safety seats and not it be forced upon them from the government. A social democrat would most likely take the stand in favor of the mandate as it promotes the safety of children’s lives. The organic view would most likely be in favor of the mandate on the grounds that these safety procedures would reduce possible healthcare costs and ultimately lead to fewer fatalities on the road. Libertarians would probably be against the prohibiting o... ... the 10 percent. At 0 percent interest rate, this project would reach a surplus revenue of 1 billion and at 5 percent it would reach a surplus revenue of 316.5 million. This is a vast discrepancy in such a small difference in interest rates. Now, if the interest rate were to be as high as 10 percent then there would be a deficit of 156.6 million. So the politician is incorrect in his statement and the interest is a huge factor in whether the government should consider funding for this project. These types of spending are most likely to occur in the federal budgeting process than individually because they are easier to hide if done so. If we are to expose the â€Å"pork† then we are more likely to see its minimal national benefit and also more likely to shoot it down. Therefore, such exposure may upset special interest groups or lobbyist who may be in favor of the â€Å"pork†.

Thursday, October 24, 2019

Executive summary about wal-mart CSR Policy

Wal-Mart is a large company that deals with almost all areas of shopping and there are situated in United States and other parts of the world. Wal-Mart is known to have about 100 million customers alone in the United States and earns billions in profits. In   a situation like this there are meant to reach out to those customers in one way or the other to prove to them that they are appreciated thereby nurturing and maintaining the relationship with customers and other people of the world,   these are the reasons why Wal-Mart rolled out their CSR policy to this effect.As a consumer, going through this policy would encourage them and keep their heart to the store. Whenever they think of shopping, they think of Wal-Mart. There are many superstores around and the once a customer decides to go to, is based on choice. This choice is motivated by the attitude of the store to a particular customer. So this policy should be encouraged so as keep the customer coming back , because this is the only way to kept the business going and growing.In addition, as an associate supplier, I would encourage this CSR policy in other to increase my sales and put money in my pocket and increase the gross income of Wal-Mart.I am very much in support of their CSR policy going by the areas, which there go into to affect, change and better the life of people.CSR PROJECTS OF WALMARTEnvironment: Wal-Mart is a company that manufactures thousands of junks everyday, and in their quest for a safe environment, for all, I think would go a long way in bringing the heart of people to them.Community projects: It is also a wonderful idea for Wal-Mart to work with voluntary organizations like Red Cross, Unicef, United Way, Special Olympics. A good collaboration with this organization would be a speedy way to reaching millions of life all over the world and I know thee action is boosting their image worldwide.People: For a quest to provide better service to customers worldwide, I believe their effor ts on staffs and associates to make them effective would help a lot. Offering assistance such as training, scholarships, and many other programs to make them happy and comfortable.Disaster Relief: Assisting disaster victims like that of flood, earthquake, fire, and disease would is also a good way of exhibiting a kind gesture.THE MOST SIGNIFICANT COPERATE POLICY.However, the most significant of all policy carried out by Wal-Mart is their policy on environment. I give kudos to that. Based on the speech made by their executive on their policy on cooperate policy on environment, I am made to understand that they are to begin the manufacturing of 100% recyclable goods and packs. There is also an attempt to reduce their packaging by 5%. This would go a long way in reducing millions of junks in the environment and would be encouraging a healthier one for that matter.MY OPINION ON WALMART CSR POLICY AS A CUSTOMERAs a consumer who shops constantly with Wal-Mart, the CSR policy is a very lov ely one. It makes me feel like I am not shopping in vain. I just have it in mind that any time I shop in Wal-Mart, I am indirectly rendering a help to someone else and it makes me feel good that I am touching the life of someone out there.But sometimes I seem to wonder how this becomes so possible, after selling at a very cheap price, they still stretch out to lend a help hand, to me, this is heavenly and I will like Wal-Mart to keep up the good work. I also strongly believe that many other consumers out there are feeling the same way. Even as their aid is made public, it makes those that do not know about them to be informed.Reaching out to customer and letting them know that their patronage is appreciated would make them come back always and working on all means to deliver a quality service just gives the customer the mind set that every thing about Wal-Mart has quality.In summary, reaching out to customers in every means possible and making them feel and know that their money is worth it, keeps bringing them back.SURVEY CARRIED OUT ON OTHER CUSTOMERS (BOTH REAL AND POTENTIAL)Number of surveys carried out  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   50Percentage supporters of CSR policy  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   85%Percentage non-supporters or CSR policy  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   10%Percentage of undecided  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   5%Percentage effect per-customer shopping rate  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   20% (increase)Percentage (potential) increase in customer rate  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   45%DERSCRIPTION OF TABLEThe table shows that they is a positive effect of the CSR policy on both in the rate of shopping and has a very good potential of increasing customers. This is because everyone would like to shop where he/she would get their money’s worth and would also be appreciated.MY OPINION ON WALMART CSR POLICY AS A SUPPLIERI, as a supplier to Wal-Mart is supporting their CSR policy. Based on popular demand, I have seen that Wal-Mart is a brand on the heart of millions of people all over the world. In addition, as a successful business venture, there are taking upon themselves some responsibility of the government, putting in lots of money to better the lives of people. I believe this is making them a responsible citizen. With this form of responsibility is supposed to be commended because they are giving back to the people what was given to them. Whatever way used by Wal-Mart to improve their excellence and service to customers would favor me as a supplier. Therefore, I believe that engaging in charity works, eradication of poverty, and assisting disaster victim is a well-directed effort.SURVEY CARRIED OUT ON OTHER ASSUMED ASSOCIATE SUPPLIERSNumber of surveys carried out  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  50Percentage supporters of CSR policy  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   78%Percentage Non-supporters of CSR policy  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   22%Percentage positive effects on marketing strategy  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  64%Percentage effect on sales  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   35%DESCRIPTION OF TABLEWith this table above, it is seen that with a personal surveys and questionnaires carried out on assumed suppliers, it is discovered that there would be a very positive effect on the total business outfit if the policy were enforced.The views of about 39 supporters was based on better marketing strategy and the CSR policy would be the best so as to increase the income, reach out to 65% of customers worldwide, increase the aw areness of Wal-Mart by 64% and the gross earning could be increased to between 20% to 35%; this I believe would increase dividend per share.MY DECISION, EFFORTS, AND IDEAS.As a supplier who is in support of the efforts taken by Wal-Mart, I would seek possible way to improve in the products I supply to them. I would support them also by seeking a better packaging to reduce environment hazard thereby aiding the environmental section of the CSR policy. I would also seek out possible ways to join in the voluntary section. To put in my energy where seems necessary.Other ideas I would like to put in are by suggesting that Wal-Mart should also get involved with grass root talents. These can be done in the areas of entertainments and sports. Helping upcoming talents in the streets would also be one of the best and fastest way to reach the heart of the ordinary man. This idea is a very important one because in know that entertainment is a way of winning peoples heart.Programs to this effects could be organizing talent hunt shows, reality TV programs and any other forms of entertainment that you can lay your hands on and you know people loves so much, for examples music, soccer, football, basketball and all the rest of them.With additional efforts as these, we would be exercising a powerful marketing strategy.IN SUMMARY: I believe that all these actions being taken by both Wal-Mart and me a as a supplier is all part of the effort to market the company and an increase in come on both their side and mine. This is because I feel that if they grow, I grow, if they lose, I lose, so it is all about teamwork and service to humanity.EFFECT OF WALMART PRIVATE LABEL ON MY PRODCUT AS A SUPPLIERI have come to understand that the uses of Walmart private label on my products are very okay and do not harm them at all. It a phenomenon that the Wal-Mart private label is seen as a brand of quality, affordable and certified by customers. Therefore, since I have noticed that according to s tudy and experience that Wal-Mart label is always on the mind of customers, I allowed it and it goes a long way to increase sale.Therefore, having the private label of Wal-Mart would put more money in the pocket of the supplier.REFERENCES(1)   Biesada, Alex. (2006, October 13). Hoover's.   Ã¢â‚¬Å"Wal-Mart Stores, Inc.† Retrieved.(2)   Frank, T.A. (2006). â€Å"A Brief History of Wal-Mart.† The Washington Monthly, Retrieved, July 24, 2006.(3)   Staff Writer. (, 2006, April 17) â€Å"Fortune 500.† CNN/Fortune.. Retrieved on July 15, 2007.(4)   Staff Writer. (2007, April 16) â€Å"Fortune 500.† CNN/Fortune. Retrieved on July 15, 2007.(5)   Staff Writer. (2005, October 25) â€Å"Is Wal-Mart Going Green?† MSNBC, Retrieved on November 8, 2007.(6)   Koenig, David. (2006, March 22) â€Å"Wal-Mart Targeting Upscale Shoppers.† ABC News.(7)   Reyes, Sonia. (2006, August 23)†Study: Wal-Mart Private Brands Are Catching On.† Bra ndweek. August 21, 2006. Retrieved on August 30, 2006.(8)   Ortiz, John. (2005, October 26) â€Å"Can Kroger Slow Wal-Mart?† Deseret Morning News. Retrieved on July 25, 2006.(9)   The Rise of Wal-Mart. Frontline: Is Wal-Mart Good for America? (2004-11-16). Retrieved on 2007-09-19.(10)  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   †¢Ã¢â‚¬ Neighborhood Markets.† Wal-Mart (http://walmartstores.com/GlobalWMStoresWeb/navigate.do?catg=504;contId=47). Retrieved on April 19, 2007.