Featured Post

The Typical Detective Genre Portrayed in Sherlock Holmes Literature Es

The Typical Detective Genre Portrayed in Sherlock Holmes' Literature The late Sir Arthur Conan Doyle was an amazingly fruitful essayi...

Wednesday, December 25, 2019

Assess Functionalsu and New Right View of the Family

Assess functionalist and the New Right views on the family Functionalists believe that the family have specific or traditional functions within the family. One function of the family would be reproduction or having children as this is imperative for the world as they will be the future workforce. For example family businesses will need to pass down the factories/shops to the next generation in the family for the continuing of the ancestors business. Other functions include economic maintenance this is where the family provides necessities for all the family members for example shelter, food and clothing. Another is that the family helps teach children how to socialise with others and also educate them with the correct norms. An†¦show more content†¦Halsey and Dennis who agrees with what Murray argues saying that single parenthood and absent fathers is one of the key issues with the decrease in nuclear family lives. Due to the lack of jobs and rise in unemployment men are starting to struggle to maintain their title of bread winners and the industries are changing from heavy workloads so women are more likely to find a job in modern times. As a result men may be reject by the women as they can’t financially depend on them so would rather be given benefits than struggle to keep a roof over them and their children’s heads. Halsey debates that being in a one parent family with the factors of unemployment and poverty being high could inevitably lead to crime and vandalism by the younger members of the family. Against a nuclear family with a stable income and stable household would again lead to any crimes and vandalism by the offspring in the family. Abbott and Wallace’s critically judge the new right about how women are being exploited in the families and how a lot of frustration and unhappiness is able to be experienced by living in this environment. The new right also disagrees to acknowledge the violence that can be cause in a nuclear family life and the abuse a family can actually suffer from being forced to stay and live with them as it isn’t socially acceptable to be a one parent family. Some of the ideas that Abbott and Wallace criticised are that the new right are opposed to

Monday, December 16, 2019

Culture, no doubt one of the most complex words of the...

Culture, no doubt one of the most complex words of the English language, for years, scholars debated its definition. Clarifying what culture means in this essay or what culture means in an Intercultural respect would be to start by defining what it is not. Culture does not refer to products of the intellectual and artistic elites, or â€Å"high-culture†, nor does it refer Lady Gaga’s dress sense or Miley Cyrus’s Twerking or otherwise known as â€Å"pop-culture† both examples of such culture are merely aesthetics , for all intents and purposes of this essay, culture will be operationally defined as an ambiguous set of values, assumptions, beliefs about directions to life, procedural and behavioral norms that influence individuals with held†¦show more content†¦Following that, this paper would bring about some context specific examples to contest the universality of face, most notably the Collectivistic cultures such as Japan. Examining other author s’ categorizations of positive and negative politeness in an attempt to identify the confounding factor as well as looking into the context Brown and Levinson may have used in the formulation of their Politeness theory which produced conflicting dichotomies that might have been because of some untenable assumptions of that age. If the linguistic community were to then accept the assumption as criteria for politeness, what then should be done to clarify the dichotomies? An intercultural interaction usually consists of three components, namely the Person which consists of gender, age, socio-economic status etc., Culture which encompasses the values, beliefs, communication styles, the Situation which comprises of the setting of the exchange, location, formality, and privacy. The three components does not mean that intercultural communications can be so easily broken down into distinct categories, but used for identifying the contributors and players in communication, when people meet, it is never justShow MoreRelatedMatthew Arnold as a Poet and Critic1500 Words   |  6 PagesAmal Mohaya AlRekabi Course : Poetry Matthew Arnold as a Poet and Critic The word criticism is derived from a Greek word that means judgment. So, criticism is basically the exercise of judgment, and literary criticism is, therefore, the exercise of judgment on works of literature. From this, it is clear that the nature of literary criticism is to examine a work of literature, and its function is to identify its points of excellence and its inadequacies, and finally to evaluate itsRead MoreHenry David Hwang ( M. Butterfly )1558 Words   |  7 Pagesit. Continuing in the following way shows that she knew everybody would accept that â€Å"It’s the only one I’ve written to be liked, and I did it partly to show off†. Yet, carrying on that â€Å"there is very little life in Possession. It is all art†. These and other comments, nevertheless, Byatt offers about her work should be stood by means of the common proverb grain of salt-there is without a doubt a decent deal of art in Possession, and every so often the life becomes confined within the art, onRead MoreDalit Feministic Quest in Bamas Sangati2762 Words   |  12 Pages  Ã‚  Ã‚  Ã‚  Ã‚   RAJA SEKAR.R    PH.D RESEARCH SCHOLAR,  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   PH.D RESEARCH SCHOLAR,    DEPARTMENT OF ENGLISH,  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   DEPARTMENT OF   Ã‚  ENGLISH,    ANNAMALAI UNIVERSITY,  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  ANNAMALAI UNIVERSITY,    CHIDAMBARAM  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚   CHIDAMBARAM    Mail Id: englitphd@gmail.com rajasekarmtm@gmail.com      Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Dalit Feministic quest in Bama’s Sangati English is the global language which mainly contributes in the societyRead MoreFilm and Translation Studies2787 Words   |  11 Pagespurposes of dubbing is one of the most peculiar disciplines within the field of translation; yet, the studies are mainly focus on script translation, i.e. dubbing and subtitling. Although plot is the most important issue in film, we should not ignore an essential element – casting. Characters play a vital role in film as they are the soul of the story. In addition, it is possible to make the plot more attractive through giving an appropriate name to the characters in the target language. Character namesRead MoreThe Rise Of Islamophobia Has Affected The Lives Of Many Muslims Living Of Western Countries1708 Words   |  7 Pagesthe last two years, the rise of Islamophobia has affected the lives of many Muslims living in Western countries. Islamophobia by nature is racist, it makes general assumptions of a large group of people who share a common belief system. Making any generalization of the followers of Islam or of Islam itself, will oversimplify what is a diverse and complex global religious tradition. Yet western converts to Islam are often met with incomprehension, a white Muslim does not fit in with most people’s associationRead MoreThe Fall Of The Byzantine Empire2336 Words   |  10 Pages Herberstein went to Moscow as a representative of the reverent Roman Emperor on two occasions. His first visit was in the years 1516 and 1517, and his second visit materialised in 1525 and 1526. The visits were organised under a special reason to arbitrate a conflict between the countries of Russia and Poland. For this very important reason, Herberstein is often referred to and attributed as the ‘Discoverer of Russia’. (Poe, 2014) A great deal to this reference also comes from the fact that heRead MoreLanguage Planning and Language Development4062 Words   |  17 PagesLANGUAGE PLANNING AND LANGUAGE DEVELOPMENT Language is a typically human phenomenon. In moving from the natural being of animal existence to the cultural being of human existence, language plays the decisive role. Language gives a sense of identity to an individual as well as a social group and, in the process, creates multiple identities. The maintenance, merger, clash and change in identities based on and reflected in the language change has prompted linguists, philosophers, psychologistsRead MoreHistory of Philippine Trnslation in the Philippines6599 Words   |  27 PagesHISTORY OF TRANSLATION IN THE PHILIPPINES ------------------------------------------------- Languages and Translations A. Spanish Language In The Philippines Spanish was the original official language of the country for more than three centuries. It became the  lingua franca  of the Philippines in the 19th and early 20th centuries. Spanish  began to be introduced in the  archipelago  after 1565 when Spanish  Conquistador  Miguel Là ³pez de Legazpi  set sail from Mexico  andRead More The Ebonics Controversy Essay examples5572 Words   |  23 Pagesquestion are mixed, jaded and sometimes very opinionated. The term Ebonics is the most recently coined name for a speech pattern that has been around for several hundred years. Synonyms for Ebonics include, but are not limited to, Black English, Black Vernacular, African American Vernacular English (AAVE),Jive, Rappin, even the derogatory term of Nigger Talk(Shabaz). The words language anddialect are ambiguous and often interchanged when they should not be, because of theRead MoreWritten Sources13656 Words   |  55 PagesUniversity December, 2012 Abstract Historians have used different kinds of sources to reconstruct the narratives of the past or to create a complete and accurate picture of what happened in the past on such aspects as politics, economy, society, culture, religion and art. Their task is not easy and obviously, studying early Indian history also follows this principle. In fact, sources of ancient Indian history are complicated, especially in the case of the written sources, so they need to be examined

Sunday, December 8, 2019

Bottled water Essay Example For Students

Bottled water Essay Bottled WaterBottled water is the new wave of the future. Millions of Americans are buying it. Here are some facts you should know about bottled water before you buy. Of course, when people go to the store to buy water, they think they are getting the freshest most pure water on the earth. Well, even though almost all of the water is safe, the question is where does it come from. When the consumer picks up the bottle from the store, they see mountains. Most bottles contain some comment about clean glacial water, taken from high in the mountains. Most bottled water doesnt even come from the mountains. It comes from places like Nebraska, out of 12-inch pipes. One major brand also gets their water in Los Angeles, right next to the freeway.(freep.com, Sept. 28) Even though the water is taken from these places it goes through many cleansing processes. There are a couple of different types of bottled water. One is the 5-gallon returnable jug. These are mainly used in offices and large businesses. The 5-gallon jugs are usually lower in minerals and therefore are good for making coffee, tea, etc. There are also 2 and 1 gallon bottles used mainly for supermarket distribution. There are also bottles ranging from 6 ounces to 1 liter. These are usually the premium waters like Poland Springs and Avian. These waters are usually an alternative to a soft drink or an alcoholi c beverage. (waterweb.com, Sept. 28). Bottled water is extremely safe. It is regulated on the federal and state level. The Federal Trade Commission and the Food and Drug Administration also regulate it. According to the Centers for Disease Control, bottled water has never been responsible for a water born illness (water.org, Sept. 28). One reason it is safe is because bottled water must come from protected sources such as aquifers and springs. Tap water comes from rivers and lakes. So why do people drink bottled water? It is seen as Americas most affordable status symbol. On the average, bottled water drinkers in the U.S. are richer than tap water drinkers. (freep.com, Sept. 28). They are seen as being well enough off to pay for something they dont need. The only logical reason for someone to drink bottled water, other than taste, is people in chemotherapy and people with AIDS etc., which are sensitive to sodium, chlorides, and sulfates. 1.(freep.com) www.freep.com/news/health/qwater19.htm, Sept. 282.(waterweb.com) www.bottledwaterweb.com, Sept. 283.(water.org) www.bottledwater.org, Sept. 284.www.clo2icom/reading/waternews/bottle.html

Sunday, December 1, 2019

On Violence by Hannah Arendt

The book On Violence by Hannah Arendt is an investigation on the nature, reasons, and significance of violence from the 1950s to date. The author also gives an analysis of the association that exists between war, politics, violence, and power. The book is incisive, thought provoking and well written, and this makes it to give the best representation of the violence that takes place in the modern period.Advertising We will write a custom essay sample on On Violence by Hannah Arendt specifically for you for only $16.05 $11/page Learn More In the book, Hannah put forth a number of arguments in analyzing the issue of violence in the second part of the twentieth century. Her writings were addressing two audiences: the authorities who were searching for remedial actions to restore calm in campuses in America and the students who were creating turbulence all over the country. She argued that the authorities had the ability to resist violence if they used the po wer vested in them appropriately. The consequence of her arguments was to illustrate the unreasonableness of the New Left’s grip of violence as an end in itself or even as a way of realizing transformation in the power structure. Hannah condemned the failure of the New Left activism to comprehend Marxism and demonstrated further that they are basing their ideas on turbulence on unsupportable reasons. Hannah’s main argument was that the theories that were equating violence with power were wrong. The book explains that the ancient perception of violence, reinforced by the Judeo-Christian custom of an angry God, was illogical as violence mainly enforces compliance through physical coercion. Hannah supported her position by positing that violence is most of the time vital for the service of power and as such, it can never be the foundation of governance. On the contrary, she argued that power is the capacity of a social entity to act in concert and it enables individuals t o work together; thus, it is the essence and end of all governance. On Violence is concerned about the current historical context in which acts of violence occur on a daily basis. In writing the book, Hannah wanted to examine the acts of student violence that were causing havoc in various institutions of learning in the U.S. and around the world in the late 1960s.Advertising Looking for essay on american literature? Let's see if we can help you! Get your first paper with 15% OFF Learn More Though the book was written during that time, it is a true representation of the acts of violence that are still common in our contemporary society. On the social setting, the author argues that those who lack adequate power most of the time try to control or exert influence over others using violence. Thus, violence assists individuals to manage or temporary exert their will on others. On the economic setting, the author is concerned about the use of violence to reinstate economic p ower. A state may want to increase the sphere of its economic influence using violent means if it feels that its strength is slipping away. The book is very relevant to contemporary issues. The current society is full of violence, as many people have falsely believed that it is the most appropriate way of solving problems. However, it has proved to be useless, as it has continued to create havoc all over the world. More so, in our current society, â€Å"every decrease in power is an open invitation to violence–if only because those who hold power and feel it slipping from their hands†¦have always found it difficult to resist the temptation to substitute violence for it† (Arendt, 87). Thus, violence is usually used in our contemporary society as a means of sustaining power. The current youthful society has turned to violence in order to address their grievances with the society. The public has been astonished by the rebellion that is being manifested by the youths in an outrageous way. Violence seems to be the order of the order; thus, Hannah’s wit and piercing logic is still a force to be reckoned with in understanding violence in our current society. The book is relevant to peace and conflict resolution. It gives an understanding of the idea of violence; thus, eases the process of conflict resolution in case violence takes place. The text provides an examination of violent behaviors with the intention of understanding the mechanisms that can result in the betterment of the human condition. In the book, she says, â€Å"Violence can always destroy power; out of the barrel of a gun grows the most effective command, resulting in the most instant and perfect obedience. What never can grow out of it is power† (Arendt, 53). Therefore, in the process of peace and conflict resolution, understanding the difference between power and violence is of importance in averting further conflicts.Advertising We will write a custom essay samp le on On Violence by Hannah Arendt specifically for you for only $16.05 $11/page Learn More Further, the book advocates for conflict resolution through peaceful means as it will ensure the satisfaction of all the contending parties, and this is an essential element in peace studies. In addition, it is important to note that the book is not trying to refrain individuals from taking action, but it gives a warning that the use of violence to resolve conflicts is not beneficial in the end. Works Cited Arendt, Hannah. On Violence. New York: Harcourt, Brace World, 1970. Print. This essay on On Violence by Hannah Arendt was written and submitted by user Terrell Huber to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Tuesday, November 26, 2019

The Unusual History of Microsoft Windows

The Unusual History of Microsoft Windows On November 10, 1983, at the Plaza Hotel in New York City, Microsoft Corporation formally announced Microsoft Windows, a next-generation operating system that would provide a graphical user interface (GUI) and a multitasking environment for IBM computers. Introducing Interface Manager Microsoft promised that the new product would be on the shelf by April 1984. Windows might have been released under the original name of Interface Manager if marketing whiz, Rowland Hanson had not convinced Microsofts founder Bill Gates that Windows was the far better name. Did Windows Get Top View? That same November in 1983, Bill Gates showed a beta version of Windows to IBMs head honchos. Their response was lackluster probably because they were working on their own operating system called Top View. IBM did not give Microsoft the same encouragement for Windows that they gave the other operating system that Microsoft brokered to IBM. In 1981, MS-DOS became the highly successful operating system that came bundled with an IBM computer. Top View was released in February of 1985 as a DOS-based multitasking program manager without any GUI features. IBM promised that future versions of Top View would have a GUI. That promise was never kept, and the program was discontinued barely two years later. A Byte Out of Apple No doubt, Bill Gates realized how profitable a successful GUI for IBM computers would be. He had seen Apples Lisa computer and later the more successful Macintosh or Mac computer. Both Apple computers came with a stunning graphical user interface. Wimps Side Note: Early MS-DOS diehards liked to refer to MacOS (Macintosh operating system)as WIMP, an acronym for the Windows, Icons, Mice and Pointers interface. Competition As a new product, Microsoft Windows faced potential competition from IBMs own Top View, and others. VisiCorps short-lived VisiOn, released in October 1983, was the official first PC-based GUI. The second was GEM (Graphics Environment Manager), released by Digital Research in early 1985. Both GEM and VisiOn lacked support from the all-important third-party developers. Since, if nobody wanted to write software programs for an operating system, there would be no programs to use, and nobody would want to buy it. Microsoft finally shipped Windows 1.0 on November 20, 1985, almost two years past the initially promised release date.    Microsoft become the top software vendor in 1988 and never looked back - Microsoft Corporation    Apple Bytes Back Microsoft Windows version 1.0 was considered buggy, crude, and slow. This rough start was made worse by a threatened lawsuit from  Apple Computers. In September 1985, Apple lawyers warned  Bill Gates  that Windows 1.0 infringed on Apple  copyrights  and  patents, and that his corporation stoled Apples trade secrets. Microsoft Windows had similar drop-down menus, tiled windows and mouse support. Deal of the Century Bill Gates and his head counsel Bill Neukom, decided to make an offer to license features of Apples operating system. Apple agreed and a contract was drawn up. Heres the clincher: Microsoft wrote the  licensing  agreement to include use of Apple features in Microsoft Windows version 1.0 and all future Microsoft software programs. As it turned out, this move by  Bill Gates  was as brilliant as his decision to buy QDOS from Seattle Computer Products and his convincing IBM to let Microsoft keep the licensing rights to MS-DOS. (You can read all about those smooth moves in our feature on  MS-DOS.) Windows 1.0 floundered on the market until January 1987, when a Windows-compatible program called Aldus PageMaker 1.0 was released. PageMaker was the first WYSIWYG desktop-publishing program for the PC. Later that year, Microsoft released a Windows-compatible spreadsheet called Excel. Other popular and useful software like Microsoft Word and Corel Draw helped promote Windows, however, Microsoft realized that Windows needed further development. Microsoft Windows Version 2.0 On December 9, 1987, Microsoft released a much-improved Windows version 2.0 that made Windows based computers look more like a  Mac. Windows 2.0 had icons to represent programs and files, improved support for expanded-memory hardware and windows that could overlap. Apple Computer saw a resemblance and filed a 1988 lawsuit against Microsoft, alleging that they had broken the 1985 licensing agreement. Copy This Will You In their defense, Microsoft claimed that the licensing agreement actually gave them the rights to use Apple features. After a four-year court case, Microsoft won. Apple claimed that Microsoft had infringed on 170 of their copyrights. The courts said that the licensing agreement gave Microsoft the rights to use all but nine of the copyrights, and Microsoft later convinced the courts that the remaining copyrights should not be covered by copyright law. Bill Gates claimed that Apple had taken ideas from the graphical user interface developed by Xerox for Xeroxs Alto and Star computers. On June 1, 1993, Judge Vaughn R. Walker of the U.S. District Court of Northern California ruled in Microsofts favor in the Apple vs. Microsoft Hewlett-Packard copyright suit. The judge granted Microsofts and Hewlett-Packards motions to dismiss the last remaining copyright infringement claims against Microsoft Windows versions 2.03 and 3.0, as well as HP NewWave. What would have happened if Microsoft had lost the lawsuit? Microsoft Windows might never have become the dominant operating system that it is today. On May 22, 1990, the critically accepted Windows 3.0 was released. Windows 3.0 had an improved program manager and icon system, a new file manager, support for sixteen colors, and improved speed and reliability. Most important, Windows 3.0 gained widespread third-party support. Programmers started writing Windows-compatible software, giving end users a reason to buy Windows 3.0. Three million copies were sold the first year, and Windows finally came of age. On April 6, 1992, Windows 3.1 was released. Three million copies were sold in the first two months. TrueType scalable font support was added, along with multimedia capability, object linking and embedding (OLE), application reboot capability, and more. Windows 3.x became the number one operating system installed in PCs until 1997, when Windows 95 took over. Windows 95 On August 24, 1995, Windows 95 was released in a buying fever so great that even consumers without home computers bought copies of the program. Code-named Chicago, Windows 95 was considered very user-friendly. It included an integrated TCP/IP stack, dial-up networking, and long filename support. It was also the first version of Windows that did not require  MS-DOS  to be installed beforehand. Windows 98 On June 25, 1998, Microsoft released Windows 98. It was the last version of Windows based on the MS-DOS kernel. Windows 98 has Microsofts Internet browser Internet Explorer 4 built in and supported new input devices like USB. Windows 2000 Windows 2000 (released in 2000) was based on Microsofts NT technology. Microsoft now offered automatic software updates over the Internet for Windows starting with Windows 2000. Windows XP According to Microsoft, the XP in Windows XP stands for experience, symbolizing the innovative experiences that Windows can offer to personal computer users. Windows XP was released in October 2001 and offered better multi-media support and increased performance. Windows Vista Codenamed Longhorn in its development phase, Windows Vista is the latest edition of Windows.

Friday, November 22, 2019

Alien Registration Records

Alien Registration Records Alien registration records are an excellent source of family history information on U.S. immigrants who were not naturalized citizens. Record Type: Immigration/Citizenship Location: United States Time Period: 1917-1918 and 1940-1944 What are Alien Registration Records?: Aliens (non-citizen residents) living in the United States were asked during two different historical periods to register with the U.S. Government. World War I Alien Registration RecordsFollowing the beginning of United States involvement in World War I, all resident aliens who had not been naturalized, were required, as a security measure, to register with the U.S. Marshal nearest their place of residence. A failure to register risked interment or possible deportation. This registration occurred between November 1917 and April 1918. WWII Alien Registration Records, 1940-1944The Alien Registration Act of 1940 (also known as the Smith Act) required the fingerprinting and registration of any alien age 14 and older living within or entering the United States. These records were completed from August 1, 1940 to March 31, 1944 and document over 5 million non-citizen residents of the United States during this period. What Can I Learn From Alien Registration Records?: 1917-1918: The following information was generally collected: Full name (including maiden name for females)Current residence and length of residencePlace of birthSpouse’s name and residenceChildren’s names, sex, and years of birthParents’ names (including maiden name for mother), birthdates, and birthplacesNames, dates of birth, and current residence of siblingsWhether any male relatives serving in the military for/against USWhether registered for selective draftPrevious military or government serviceDate of immigration, name of vessel and port of arrivalWhether naturalized in another country Whether reported/registered with a consul since 1 June 1914Whether applied for naturalization or took out first papers; if yes, when and whereWhether ever taken an oath of allegiance other than to the United StatesWhether ever arrested or detained on any chargeWhether held a permit to enter a forbidden areaSignaturePhotographDescription of registrantFull set of fingerprints 1940-1944: The two-page Alien Registration Form (AR-2) asked for the following information: NameName at time of entry to the USOther names usedAddressDate and place of birthCitizenship/NationalityGenderMarital statusRace Height WeightHair Eye ColorDate, port, vessel and class of admission of last arrival in USDate of first arrival in USNumber of years in the USUsual occupationPresent occupationName, address and business of present employerMembership in clubs, organizations or societiesDates and nature of military or naval serviceWhether citizenship papers were filed and if so the date, place, and courtNumber of relatives living in the USArrest record, including date, place and dispositionWhether or not affiliated with a foreign governmentSignatureFingerprintNot all registrants provided all information. Where Can I Get Alien Registration Records?: WWI Alien Registration files are scattered, and the majority are no longer extant. Existing files can often be found in state archives and similar repositories. Existing WWI alien registration records for Kansas; Phoenix, Arizona (partial); and St. Paul, Minnesota can be searched online. Other alien registration records are available in offline repositories, such as the 1918 Minnesota Alien Registration records at the Iron Range Research Center in Chisholm, MN. Check with your local or state genealogial society to learn what WWI alien registration records might be available for your area of interest. WWII Alien Registration (AR-2) files are available on microfilm from U.S. Citizenship and Immigration Services (USCIS) and can be obtained through a Genealogy Immigration Records Request. Unless you have the actual alien registration number from an alien registration card in your familys possession, or from a passenger list or naturalization document, you will want to begin by requesting a Genealogy Index Search. Important: Alien Registration Forms AR-2 are only available for A-numbers 1 million to 5 980 116, A6 100 000 to 6 132 126, A7 000 000 to 7 043 999, and A7 500 000 to 7 759 142. If the subject of your request was born less than 100 years before the date of your request, you are generally required to provide documentary proof of death with your request. This might include a death certificate, a printed obituary, a photograph of the tombstone, or other document demonstrating that the subject of your request is deceased. Please submit copies of these documents, not originals, as they will not be returned. Cost: Alien registration records (AR-2 forms) requested from USCIS cost $20.00, including shipping and photocopies. A genealogy index search is an additional $20.00. Please check the USCIS Genealogy Program for the most current pricing information. What to Expect: No two Alien Registration Records are alike, nor are specific answers or documents guaranteed to be in each case file. Not all aliens answered every question. Turn-around time to receive these records averages about three to five months, so prepare to be patient.

Thursday, November 21, 2019

Accounting theory in Australia Essay Example | Topics and Well Written Essays - 1750 words

Accounting theory in Australia - Essay Example One such standard that has been much debated is the fair value accounting measure. Fair value accounting has gained popularity in the recent years as the standard for measuring assets and liabilities by firms. Although, fair value accounting has been accepted and adopted by firms across the world, it is still considered to be inefficient in its utility. Perhaps it is because of the discrepancy in the financial systems and conceptual frameworks which have given rise to the chaos that is evident in todays corporate environment. In the following discussion the researcher shall discuss the impact of fair value accounting and disclosures based on current accounting standards, conceptual frameworks and theoretical assumptions with the view to enumerate on its viability, utility and efficiency. International accounting standards are broadly divided into the United States’ independent regulators’ approach and the European public ownership approach. The European approach had been based on the theoretical framework that since corporations are usually serve their own profit interest, it is up to the government to curb private monopolies and monitor their activities. On the other hand the US independent commissions for monitoring and enforcing regulation had been developed with the view to give the market economic independency on the premise of laissez faire. Ironically, as Gaffikin (2005) points out, both the systems fail to achieve its objective of regulation as a result of market inefficiency and economic regulation consideration. This led to the development of a regulation system based on interest theory - that is serving both the private and public interests (Gaffikin 2005). Today, accounting standards across the world is based on the US Financial Accounting Standard Board and the International Accounting Standard Board. Australia follows similar measurement

Tuesday, November 19, 2019

Multidimensional Chromatography Essay Example | Topics and Well Written Essays - 2000 words

Multidimensional Chromatography - Essay Example Hence, essentially speaking, one dimensional chromatographic separation is definitely not the last word for isolation and characterization of biomolecules, chiefly proteins. The limitation is due to its low resolving power in presenting a homogenous protein sample from a complex mixture of several other unwanted proteins, associated matrix components and metabolites that can otherwise be segregated in a much more efficient way by various types of matrix loaded multiple columns utilizing their differential properties and affinities. Moreover, combination of two or more analytical separation steps involve perfectly standardized pre-treatment processes that are to be coordinated in an automated way for a complete segregation of the test samples. (Mondello, P. 251) Multidimensional separation techniques were first devised with the implementation of two dimensional separation beds, in which two different parameters for migration corresponding to two distribution coefficients help to identify the separated components on the bed with more certainty and a high peak capacity than that achieved by one dimensional separation procedures. (Cortes, P. 14 - 15) A high value of peak density is an important requisite for effective separation process and it can easily be achieved by combining two or more chromatographic separation techniques. The greater the number of peaks that can be resolved effectively in a given multidimensional separation procedure within a fixed time frame greater is the overall efficiency of the process. Likewise with effective resolution of a higher number of peaks more and more complex samples can be duly segregated, characterized and analyzed for further investigation. In a simple two dimensional chromatographic process that is c arried out by a combination of two different columns, the maximum peak capacity will be the product of the peak capacities of the individual columns, thereby generating a higher capacity of resolution for the overall analytical process. As for example, the peak capacities for each separation process being 100 and 200, the combined value of the maximum peak capacity of the two dimensional separation procedure becomes a product of the two, that is, 20000, thereby ensuring high resolution and larger separation between the collected fractions. (Chromatography Online.com, 1998 - 2008) Multidimensional chromatography, therefore, finds a maximum usage in biomedical research and especially in proteomics, where investigation of biological samples of protein mixtures requires prior separation and characterization in order to tag the target protein. In protein analysis research several novel methods of multidimensional chromatographic separations are being currently used in complementation with the 2-D polyacrylamide gel electrophoretic separation (2D-PAGE), for a much better resolution and greater separation space between analyzable eluents. Multidimensional approach involving multidimensional liquid chromatography (MDCL) used in unison with bio-mass

Sunday, November 17, 2019

Technological Environment Essay Example for Free

Technological Environment Essay When a relatively primitive technology is used in the production process, the technology is usually referred to as labor-intensive. A highly advanced technology, on the other hand, is generally termed capital-intensive. Business Perspective: The way that businesses function both in and out of the office has changed drastically. Thanks to advances in computer, information and communication technology. Companies now use a variety of mobile devices, software and various applications that employees can use for marketing and networking, as well as research and development, for their goods and services. Internet- the Internet, perhaps more than any other factor, has changed the way that companies do business. Most companies have websites, which allow them to reach a larger audience and attract customers and employees from all over the world. In addition, businesses are now utilizing social-networking websites such as Facebook, LinkedIn and Twitter, enabling them to communicate directly with customers with news and updates. These websites are interactive, which means that companies can also receive immediate feedback on new products from customers, speeding the process of research and development. Email, video conferencing and online chat rooms have also made it easier for businesses to become more globalized, communicating quickly and easily with clients and co-workers regardless of their location. * Mobile Devices- The Internet resources listed above are not just available on an office computer. Many companies provide their employees with other mobile devices such as laptops, tablet computers, PDAs and smart phones. These devices are portable and enable workers to stay constantly connected and updated with their work. They also make it more possible for employees to have a mobile office, working from any location and allowing them to travel or live in an area other than where the business is actually located. Most mobile devices also have an enormous number of applications available such as productivity tools, locators that utilize GPS functions and other organizational applications that help employees download, type, share and even print documents remotely from their device. * Software- Depending on the type of business, the software used by companies will vary. However, many companies can benefit from several types of software and applications.

Thursday, November 14, 2019

when plague strikes :: essays research papers

Overview of: ‘When Plague Strikes’ by James Giblin This book is separated into three main parts the Black Death, smallpox, and aids. This book gives facts of occurring diseases and the diseases from the past. This books content mainly took place in Europe and Asia when it gave facts dates and examples. It explains the nature and symptoms of diseases from long ago. The bubonic Plague mainly affects rodents, but fleas can transmit the disease to people. Once people are infected, they infect others very rapidly the disease struck and killed people with terrible speed. They called it "The Black Death" because of the black spots it produced on the skin. A terrible killer was loose across Europe, and medieval medicine had nothing to go against it. In five years twenty five million people were dead because of the Black Death. So many people had died that there were serious labor shortages all over Europe. The Black Death came in three forms, the bubonic, pneumonic, and septicemia. Each different form of plague killed people in a nasty way. All forms were caused by a bacterium called Yersinia pestis. The symptoms were enlarged and inflamed lymph nodes (around arm pits, neck and groin). The term 'bubonic' refers to the characteristic bubo or enlarged lymphatic gland. â€Å"Victims were subject to headaches, nausea, aching joints, fever of 10 1-105 degrees, vomiting, and a general feeling of illness. Symptoms took from 1-7 days to appear. Bubonic plague is just the medical term for the Black Death† (Giblin 11). Smallpox is a serious, contagious, and sometimes fatal infectious disease. There is no specific treatment for smallpox disease, and the only prevention is vaccination. The name smallpox is derived from the Latin word for â€Å"spotted† and refers to the raised bumps that appear on the face and body of an infected person. Smallpox outbreaks have occurred from time to time for thousands of years, but the disease is now eradicated after a successful worldwide vaccination program. The last case of smallpox in the United States was in 1949. The last naturally occurring case in the world was in Somalia in 1977. Generally, direct and fairly prolonged face-to-face contact is required to spread smallpox from one person to another. Smallpox also can be spread through direct contact with infected bodily fluids or contaminated objects such as bedding or clothing. â€Å"The first symptoms of smallpox include fever, malaise, head and body aches, and sometimes vomiting.

Tuesday, November 12, 2019

Lenin’s death in 1924 Essay

12 marker: Explain why; at the time of Lenin’s death in 1924 there was no obvious successor to lead The USSR. Lenin’s death came as a great shock to many Russians in 1924; he led the October Revolution in 1917 he was seen as father like role to Russians. He had built up a new government and allowed many of his fellow Bolsheviks roles positions in his new Soviet State, and these figures all thought that they have the power and influence to lead Russia. Lenin knew that he was ill and that he would not be able to keep on making key decisions and attending committee and politburo meetings. He felt that the people in his government saw this as an opportunity to try and assert their power and then after his death have a good chance of becoming the leader of The USSR. He wrote a testament, damning five of the people that held high authority in his new government: Trotsky, Stalin, Bukharin, Zinoviev and Kamenev. If this were to be circulated in the party it would mean that people lower down in the party would be questioning these people too, they might feel that these individuals had too much power. However, these were the leading communists and there did not seem to be any other Bolsheviks that were capable or ready to become a leader. Lenin called Trotsky ‘excessively self-assured’ Lenin thought that Trotsky focused too much on himself and not enough on the Russian people. Lenin also called Stalin the other main contender for the role of leader ‘too rude’ and stated that he has been placed with too much power within the part as Secretary-General; this has made him quite arrogant. Lenin calls for Russians to remember that although Zinoviev and Kamenev are quite underestimated, that they were not loyal to the October Revolution and therefore not the most trustworthy or loyal. Lenin feels that Bukharin is very intelligent, and would be good at the administration aspect of leadership but not a good enough orator to be seen as a strong leader by the masses. This really set the cat among the pigeons; it showed that Lenin did not have confidence in one single successor, showing negative aspects of all of the possible candidates. Although this was suppressed by Kamenev and Zinoviev from being read at the 23rd party conference, Stalin had the most to lose if this had been read, being very critical of his personality and power. Ultimately, it showed that there was going to be a power struggle, and that there was no obvious successor. Lenin’s Testament highlighted some major concerns of his, that there were five possible successors but none of them seemed obvious to go straight to the leadership position. Trotsky was seen as an alternative main candidate, he had a lot of support from the working class in the two main cities, Moscow and Petrograd. He was educated and a brilliant orator, moving crowds of people that came to visit him speak. However, he had many personal weaknesses, he was not liked by a lot of the main decision makers under Lenin, and he needed their support for a leadership position. He did not understand that Russia was an agricultural country and he had to think of the country’s agriculture as much as its industry. Stalin had many important roles within the communist party, commissar for nationalities, worker’s and peasant’s inspectorate and more. Although he had a vast amount of power within the party he was not seen as being consistent, something a leader should be. Also, he had a tough relationship with Lenin before his death. Bukharin was seen as very clever, but not being Marxist enough, he had been appalled by the bloodshed of the civil war and supported the NEP that had allowed an emergence of a middle class, something the Revolution was against. Also Bukharin did not take any side in arguments within the party, showing Lenin that he maybe was not a committed communist. Zinoviev and Kamenev had not been loyal to the October Revolution in 1917; showing that they would not be the leader that Lenin wanted. Lenin thought that they buckled under pressure and for these two reasons did not allow them on the Russian bureau of Central Committee. These factors reinforce the uncertainty for the role of leader, there were candidates that seemed to be strong like Stalin or Trotsky but they had large weaknesses too. Although, there was a lot of room for possible criticism and backstabbing due to the contenders having weaknesses of their own, in 1921 the ban on factionalism introduced by Lenin stopped the formation of groups within his party and stopped criticism of decisions made within the party. It was a way of trying to make the party seem loyal and was basically a ban on free-speech: Meaning that the candidates would not be able to run for leader by highlighting weaknesses to the party or masses. The five candidates would not be able to campaign. Also, because Lenin’s Testament was not published it did not allow the party to make a decision on the leadership, alongside the ban on factions meant that a candidate would just have to seem like a strong runner individually or resort to backstabbing. In conclusion, I believe that by not publishing Lenin’s testament, this meant that his personal opinions were not voiced to the party, at the party conference, where hundreds of the most influential communists would have seen that all of the main five candidates had weaknesses and there was not one that Lenin felt was singly good enough to rule the party. He was possibly hinting to a collective government with a coalition between all five, mixing their positive aspects to make a great USSR. Although the ban on factions was important, the Testament would have voiced the weaknesses of the five people in the running for leadership coming straight from Lenin his conclusion would have gained influence from the party that was loyal to him. Therefore, I believe that by not publishing Lenin’s testament meant that there was great uncertainty over the role of leader.

Saturday, November 9, 2019

The Door You Willing to Shut

Stephen King provides us with his own vocabulary as well as methods for isolating one’s mind and unlocking it to its utmost potential. His blueprint for writing involves isolation from mundane life, from thinking too rationally or dogmatically in order to get in touch with our creative side. Using the terms â€Å"the room†, â€Å"the door† and â€Å"the determination to shut the door† he maps out an environment, which helps him concentrate on his writing.Stephen points out that usually we need to find a comfortable place to write (in his case-his home). The next step is to get rid of all distractions (the shutting of the door) and then to set a certain goal, as well as to make sure that it is quite attainable. King believes, based on his own experience that the hardest part about writing is just to begin the task, writing â€Å"one word at a time†; once it starts its not overly difficult to maintain the flow of ideas and their transfer on paper.Pers onally I find the environment of a small cozy cafe preferable to that of my home in terms of shutting the door to various distractions that King talks about. The room and the determination to shut the door are more important to me when I write, then the door itself. When I write in a cafe, I do not control the environment—the door — that is, I cannot shut it entirely, but I can control my focus on my work, in King’s own words it’s called the determination to shut the door.I’m not sure if I would be able to write to Metallica or AC/DC as King apparently can, but music in general if it is soothing, would not distract me. Just like King, I find the hardest thing is to begin, once I get going I do not feel distracted by my surrounding environment, I can focus and be completely absorbed by the writing task, creating a piece â€Å"one word at a time†.

Thursday, November 7, 2019

Saipo The Project Identity

Saipo The Project Identity Mission The mission of Saipo Company is to provide people in developing regions with the products of the soap recycling process because of the observed lack of inexpensive hygiene products in many countries globally. Thus, the practical goal of the company’s work is to cooperate with soap producers round the world to recycle the leftover or expired soap materials to distribute the products in developing countries.Advertising We will write a custom essay sample on Saipo The Project Identity specifically for you for only $16.05 $11/page Learn More Brand Value Saipo Company focuses on providing the unique products and services which are interesting not only for the potential customers as the product’s target audience but also for the company’s partners and shareholders because of expanding the possibilities for combining the elements of profitable and charitable activities. Combining the efforts of giant producers of soap and contributing t o the increase of shareholders’ gains, Saipo is the potentially most recognizable producer of soap in developing countries because of the products’ availability and social mission. The customers’ perception of the brand depends on the actual provision of inexpensive soap products in developing regions to determine the market and target audience of Saipo products. Saipo explores the new market segment with the help of effective strategies. The brand recognition as well as brand value can be discussed as depending significantly on orienting to innovation and creativity along with following the people-oriented culture and strategy. The demand for hygiene products globally affects the unique mission of Saipo Company which is the contribution to improvement of living conditions in developing regions while affecting availability of soap products. The Impact of Readings To work out the effective name for a new company, it is necessary to focus on the creative approach. The role of creativity in the project identity and product development is emphasized in the research by Brattstrom, Lofsten, and Richtner. Thus, the research’s results influenced the process of developing the name and the further focus on the effective mission statement because the authors presented the detailed description of the product development process (Brattstrom, Lofsten, and Richtner 744).Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Nevertheless, the development of a mission statement requires the concentration on the specific goals, functions, activities, and strategies followed and performed by the company. Paying attention to the research conducted by Cheung, Wong, and Lam, it is important to note that goal clarity and the focus on innovation along with creativity are the important factors to influence the brand’s success (Cheung, Wong, and Lam 690). That is why, these aspects should be taken into consideration while developing the effective mission statement. To develop the points associated with brand value, it is necessary to refer to the elements of the company’s organizational structure, culture, and performance in order to distinguish the aspects which contribute to the company’s uniqueness. The article by Cheung, Wong, and Lam and the research by Rauniar and Rawski are important to answer the questions about the Saipo Company’s mission, goal, and particular features of the enterprise’s performance with orienting to the profitable and charitable activities (Cheung, Wong, and Lam 690-691; Rauniar and Rawski 939). The readings on the aspects of the project development and specific organizational structures of companies to succeed within the market and industry are useful to decide what details should be accentuated in the mission and brand value statements to attract the target audience and poten tial investors. Brattstrom, Anna, Hans Lofsten, and Anders Richtner. â€Å"Creativity, Trust and Systematic Processes in Product Development†. Research Policy 41.1 (2012): 743-755. Print. Cheung, Sai On, Peter Wong, and Anna Lam. â€Å"An Investigation of the Relationship between Organizational Culture and the Performance of Construction Organizations†. Journal of Business Economics and Management 13.4 (2012): 688-704. Print.Advertising We will write a custom essay sample on Saipo The Project Identity specifically for you for only $16.05 $11/page Learn More Rauniar, Rupak and Greg Rawski. â€Å"Organizational Structuring and Project Team Structuring in Integrated Product Development Project†. International Journal of Production Economics 135.1 (2012): 939-952. Print.

Tuesday, November 5, 2019

The Historic Fight over the Mountain of Light

The Historic Fight over the Mountain of Light Its only a hard lump of carbon, after all, yet the Koh-i-Noor diamond exerts a magnetic pull on those who behold it. Once the largest diamond in the world, it has passed from one famous ruling family to another as the tides of war and fortune have turned one way and another over the past 800 or more years. Today, it is held by the British, a spoil of their colonial wars, but the descendant states of all its previous owners claim this controversial stone as their own. Origins of the Koh i Noor Indian legend holds that the Koh-i-Noors history stretches back an incredible 5,000 years, and that the gem has been part of royal hoards since around the year 3,000 BCE.   It seems more likely, however, that these legends conflate various royal gems from different millennia, and that the Koh-i-Noor itself was probably discovered in the 1200s CE. Most scholars believe that the Koh-i-Noor was discovered during the reign of the Kakatiya Dynasty in the Deccan Plateau of southern India (1163 - 1323).   A precursor to the Vijayanagara Empire, Kakatiya ruled over much of present-day Andhra Pradesh, site of the Kollur Mine.   It was from this mine that the Koh-i-Noor, or Mountain of Light, likely came.    In 1310, the Khilji Dynasty of the Delhi Sultanate invaded the Kakatiya kingdom, and demanded various items as tribute payments.   Kakatiyas doomed ruler Prataparudra was forced to send tribute north, including 100 elephants, 20,000 horses - and the Koh-i-Noor diamond.   Thus, the Kakatiya lost their most stunning jewel after less than 100 years of ownership, in all likelihood, and their entire kingdom would fall just 13 years later. The Khilji family did not enjoy this particular spoil of war for long, however.   In 1320, they were overthrown by the Tughluq clan, the third of five families that would rule the Delhi Sultanate. Each of the succeeding Delhi Sultanate clans would possess the Koh-i-Noor, but none of them held power for long. This account of the stones origins and early history is the most widely accepted today, but there are other theories as well. The Mughal emperor Babur, for one, states in his memoir, the  Baburnama,  that during the 13th century the stone was the property of the Raja of Gwalior, who ruled a district of Madhya Pradesh in central India.   To this day, we are not entirely certain if the stone came from Andhra Pradesh, from Madhya Pradesh, or from Andhra Pradesh via Madhya Pradesh. The Diamond of Babur A prince from a Turco-Mongol family in what is now Uzbekistan, Babur defeated the Delhi Sultanate and conquered northern India in 1526.   He founded the great Mughal Dynasty, which ruled northern India until 1857.   Along with the Delhi Sultanates lands, the magnificent diamond passed to him, and he modestly named it the Diamond of Babur.   His family would keep the gem for just over two hundred rather tumultuous years. The fifth Mughal emperor was Shah Jahan, justly famous for ordering the construction of the Taj Mahal.   Shah Jahan also had an elaborate jeweled gold throne built, called the Peacock Throne. Crusted with countless diamonds, rubies, emeralds, and pearls, the throne contained a significant portion of the Mughal Empires fabulous wealth.   Two golden peacocks adorned the throne; one peacocks eye was the Koh-i-Noor or Diamond of Babur; the other was the Akbar Shah Diamond. Shah Jahans son and successor, Aurangzeb (reigned 1661-1707), was persuaded during his reign to allow a Venetian carver called Hortenso Borgia to cut the Diamond of Babur.   Borgia made a complete hash of the job, reducing what had been the worlds largest diamond from 793 carats to 186 carats. The finished product was quite irregular in shape and did not shine to anything like its full potential.   Furious, Aurangzeb fined the Venetian 10,000 rupees for spoiling the stone. Aurangzeb was the last of the Great Mughals; his successors were lesser men, and Mughal power began its slow fade. One weak emperor after another sit on the Peacock Throne for a month or a year before being assassinated or deposed. Mughal India and all of its wealth were vulnerable, including the Diamond of Babur, a tempting target for neighboring nations. Persia Takes the Diamond In 1739, the Shah of Persia, Nader Shah, invaded India and won a great victory over Mughal forces at the Battle of Karnal. He and his army then sacked Delhi, raiding the treasury and stealing the Peacock Throne.   Its not entirely clear where the Diamond of Babur was at the time, but it may have been in the Badshahi Mosque, where Aurangzeb had deposited it after Borgia cut it. When the Shah saw the Diamond of Babur, he is supposed to have cried out, Koh-i-Noor! or Mountain of Light!, giving the stone its current name.   In all, the Persians seized plunder estimated at the equivalent of 18.4 billions dollars US in todays money from India.   Of all the loot, Nader Shah seems to have loved the Koh-i-Noor the most. Afghanistan Gets the Diamond Like others before him, though, the Shah did not get to enjoy his diamond for long.   He was assassinated in 1747, and the Koh-i-Noor passed to one of his generals, Ahmad Shah Durrani.   The general would go on to conquer Afghanistan later that same year, founding the Durrani Dynasty and ruling as its first emir. Zaman Shah Durrani, the third Durrani king, was overthrown and imprisoned in 1801 by his younger brother, Shah Shuja.   Shah Shuja was infuriated when he inspected his brothers treasury, and realized that the Durranis most prized possession, the Koh-i-Noor, was missing.   Zaman had taken the stone to prison with him, and hollowed out a hiding place for it in the wall of his cell.   Shah Shuja offered him his freedom in return for the stone, and Zaman Shah took the deal. This magnificent stone first came to British attention in 1808, when Mountstuart Elphinstone visited the court of Shah Shujah Durrani in Peshawar.   The British were in Afghanistan to negotiate an alliance against Russia, as part of the Great Game.   Shah Shujah wore the Koh-i-Noor embedded in a bracelet during the negotiations, and Sir Herbert Edwardes noted that, It seemed as if the Koh-i-noor carried with it the sovereignty of Hindostan, because whichever family that possessed it so often prevailed in battle. I would argue that in fact, causation flowed in the opposite direction - whoever was winning the most battles usually nabbed the diamond.   It would not be long before yet another ruler would take the Koh-i-Noor for his own. The Sikhs Grab the Diamond In 1809, Shah Shujah Durrani got overthrown in turn by another brother, Mahmud Shah Durrani.   Shah Shujah had to flee into exile in India, but he managed to escape with the Koh-i-Noor.   He ended up a prisoner of the Sikh ruler Maharaja Ranjit Singh, known as the Lion of the Punjab.   Singh ruled from the city of Lahore, in what is now Pakistan. Ranjit Singh soon learned that his royal prisoner had the diamond. Shah Shujah was stubborn, and did not want to relinquish his treasure.   However, by 1814, he felt that the time was ripe for him to escape from the Sikh kingdom, raise an army, and try to retake the Afghan throne.   He agreed to give Ranjit Singh the Koh-i-Noor in return for his freedom. Britain Seizes the Mountain of Light After Ranjit Singhs death in 1839, the Koh-i-Noor was passed from one person to another in his family for about a decade. It ended up as the property of the child king Maharaja Dulip Singh.   In 1849, the British East India Company prevailed in the Second Angol-Sikh War and seized control of the Punjab from the young king, handing all political power to the British Resident.    In the Last Treaty of Lahore (1849), it specifies that the Koh-i-Noor Diamond is to be presented to Queen Victoria, not as a gift from the East India Company, but as a spoil of war.   The British also took 13-year-old Dulip Singh to Britain, where he was raised as a ward of Queen Victoria.   He reportedly once asked to have the diamond returned, but received no answer from the Queen. The Koh-i-Noor was a star attraction of Londons Great Exhibition in 1851.   Despite the fact that its display case prevented any light from striking its facets, so it essentially looked like a lump of dull glass, thousands of people waited patiently for a chance to gaze at the diamond each day.   The stone received such poor reviews that Prince Albert, Queen Victorias husband, decided to have it recut in 1852.    The British government appointed Dutch master diamond-cutter, Levie Benjamin Voorzanger, to recut the famous stone.   Once again, the cutter drastically reduced the size of the stone, this time from 186 carats to 105.6 carats.   Voorzanger had not planned to cut away so much of the diamond, but discovered flaws that needed to be excised in order to achieve maximum sparkle.    Prior to Victorias death, the diamond was her personal property; after her lifetime, it became part of the Crown Jewels.   Victoria wore it in a brooch, but later queens wore it as the front piece of their crowns.   The British superstitiously believed that the Koh-i-Noor brought bad fortune to any male who possessed it (given its history), so only female royals have worn it.   It was set into the coronation crown of Queen Alexandra in 1902, then was moved into Queen Marys crown in 1911.   In 1937, it was added to the coronation crown of Elizabeth, the mother of the current monarch, Queen Elizabeth II.   It remains in the Queen Mothers crown to this day, and was on display during her funeral in 2002. Modern-Day Ownership Dispute Today, the Koh-i-Noor diamond is still a spoil of Britains colonial wars.   It rests in the Tower of London along with the other Crown Jewels.    As soon as India gained its independence in 1947, the new government made its first request for the return of the Koh-i-Noor. It renewed its request in 1953, when Queen Elizabeth II was crowned. Indias parliament once again asked for the gem in 2000. Britain has refused to consider Indias claims. In 1976, Pakistani Prime Minister Zulfikar Ali Bhutto asked that Britain return the diamond to Pakistan, since it had been taken from the Maharaja of Lahore.   This prompted Iran to assert its own claim.   In 2000, Afghanistans Taliban regime noted that the gem had come from Afghanistan to British India, and asked to have it returned to them instead of Iran, India, or Pakistan. Britain responds that because so many other nations have claimed the Koh-i-Noor, none of them have a better claim to it than Britains.   However, it seems pretty clear to me that the stone originated in India, spent most of its history in India, and really should belong to that nation.

Sunday, November 3, 2019

The Status of German Women under Nazism Essay Example | Topics and Well Written Essays - 2000 words

The Status of German Women under Nazism - Essay Example The end of World War I harkened the birth of several political groups in Germany possessing extreme views, such as those professing ultra-nationalistic and anti-democratic ideas. Adolph Hitler joined one of these groups known as the German Workers' Party. In the years following 1920, he became the leader of the party, later reorganizing and reorienting it to reflect his personality. He also renamed the party to the Nationalsozialistische Deutsche Arbeiterpartei (NSDAP) or, as translated into English, the National Socialist German Workers' Party. Nazism was the term by which the party's ideology, its doctrines, and its policies came to be known. (Columbia Encyclopaedia 2004) The ideology of Nazism was based on an amalgam of doctrines of racism, nationalism, and what was known as the "hero-cult" espoused by various writers and interpreted by Hitler and others in works such as Hitler's Mein Kampf. Instead of a set of well-described principles, Nazism was a vague ideology glorifying myth, prejudice, and nihilist views. Control was paramount and democracy was viewed as a corrupt form of government that served to protect the mediocre and weak elements of society. Under Hitler, Nazism became national law in Germany. (Columbia Encyclopaedia 2004) Nazism was a reaction to the emancipation of society, which occurred as monarchies throughout Europe fell and as Marxist ideology grew in popularity. Nazism, contrasted to the Marxist emphasis on the desire for equality in property ownership, focused on issues of social equality, primarily the issues of racial superiority and inferiority. (Harvey 1999: 77+) The anti-feminist spirit of Nazism was related in a significant manner to the movement's racist ideology, according to Stibbe (1993: 35+), who writes that "[l]ike the Jew, the modern 'emancipated' woman was seen as an agent of degeneracy and national decline, bringing in her wake the 'destructive' forces of Bolshevism, democracy, and parliamentarianism." A hint of Hitler's perspectives on the role of women became apparent shortly after his assumption of power in January of 1933. In his government's handbook for Nazi leaders and their organisations and members, entitled and translated as The ABCs of National Socialism, the following translated entry, which was directed at Jewish women, appeared: "[T]he Jewish housewife, herself, is no picture of cleanliness, but idly sits around, painted up and powdered and adorned in silk and baubles" (Rosen 1933, cited in Guenther 2004: 92). But Hitler's views of women in German society were not restricted to Jews alone. Women, in general, were cri ticised for purchasing cosmetics, perfumes, and other luxury items rather than saving the money or spending it on household items. Hitler, both through the ideology he promoted and the policies he enacted, insisted that German women must "return to their pre-emancipation roles" (Guenther 2004: 93). The ABCs of National Socialism, as translated, stated (Rosen 1933, cite

Thursday, October 31, 2019

Identify and analyse the aims, impact and outcomes of increasingly Essay

Identify and analyse the aims, impact and outcomes of increasingly integrated ways of working in childrens services on children and their families - Essay Example The need of the hour that could be truly beneficial to the child and the family is a consorted attempt coming from all the agencies involved in it to work together. In this paper I would like to analyse the process and objectives, impact and outcome of an integrated working style. A survey of the children and families in need of help is enough to be disillusioned about their pathetic condition. They want a little relief but on the contrary have to face more trouble. In some cases the constant intervention of numerous agencies and practitioners literally make it impossible to have some real breather as both the child and the family pass through repetitive processes, questions and tests. ‘There are times that having all different people in my life is too much. I spend a lot of my time up the hospitals. I wish there were less appointments and less doctors to see.’ (Child quoted in Turner, p.21) There are such instances where the family of the child is at a loss of whom to go to. And this has been detrimental to the mental and physical well-being of the child. Therefore it calls for an increasing demand of a coordinated way of working between the different agencies. (Stone & Rixon, ch3, p.88-89) It is important for the agencies to come together and decide upon the ruling ideology and the common goal towards which they would conjointly work. In this particular issue it is needless to say that the goal is the betterment of the child in all respects. Whatever mode of cooperation and coordination they might adopt all should be child-centric in approach. (Stone & Rixon, ch3, p.90) The practitioners or agency workers should first and foremost prepare themselves to enter into the life of a child needing help and partake of the child’s problems with the sole aim of finding a resolve to alleviate it. The agency representatives must make it a point to listen to their problems, demands and needs.

Tuesday, October 29, 2019

Relationship between Mind and Body Essay Example | Topics and Well Written Essays - 750 words

Relationship between Mind and Body - Essay Example Similarly, the paper discusses whether one is more significant than the other is in a human life. Descartes talks about a possible existence of material outside God and the Self. Accordingly, the author holds that the existence of such objects is only possible because God creates them. Therefore, the author postulates that the materials exist because they relate to pure mathematics. It because Descartes believes that God makes what he thinks in the way it is. Similarly, nothing is impossible for God to create unless someone does not understand a thing (Descartes, Meditation VI: about the existence of Material things from the Body). Consequently, after discovering the possibility of the existence of the objects, the author then turns to the presence of mental pictures as evidence. Therefore, he distinguishes perception and imagination. Accordingly, he asserts that creativity refers to the capacity of knowledge to the body that is immediately present to it, without conception or intellection (Descartes, Meditations, 6), which prevails as a mental image. Understanding is not automatically a picture. He applies an example, that when he has a mental image of a triangle, he does not just perceive it to be a figure with three lines; he says he looks at the lines as if they were present to the mental eye. Therefore, that is what Descartes calls a mental picture. Descartes gives priority to the mind than the body. It is because the mind controls the body. In other words, the body only responds to whatever the mind perceives, conceives, and accepts as reality.  

Sunday, October 27, 2019

Risk Management in Investment Banking and Software

Risk Management in Investment Banking and Software Introduction With the current scene in the business world it is very challenging to explore the risks involved in the business economy. The topic of Risk Management interests with the varied challenges as it has become the foundation for many organisations to effectively manage their investments or projects. The risks involved in any type of organisations are constantly increasing with the rise in competition across the globe. The recent credit crunch was also an alarming sign to manage the risk efficiently. Development of technology also has had great impact on the performance of any technological projects. Thus the topic of risk management is gaining lot of scope across various sectors in diversified businesses in todays world. So being the case, Indian economy is no exception to the above mentioned threats for the organisations to successfully achieve their goals and objectives. Conceptual Underpinnings My research is based on whether the Risk Management is used as a tool for checking quality, accessing security level, as a measuring unit as controlling tool. To check whether theories on Risk Management, really help in understanding and analysing the risks involved in todays business scenario. Also to check the practical and technical difficulties in introducing risk management as a control tool in all possible arrays of business and development. While risk management offers accountable benefits it also involves costs, the cost of implementation of Risk Measures into the organisation structure, the process and also to make it a part of the organisational planning process in order to achieve objectives at minimal risk levels. Hence it is necessary and vital to have a comprehensive Risk Management Strategy for every organisation. In order to accomplish each and every organisation needs to have a dedicated team depending on the nature of their business, organisational structure, and al so possible risks to be involved. 2.1) Literature Review The Indian Economy has been impacted with the downturn of the recession. As the effect of recession there is tremendous amount of change in the outlook of the business world. Today Management of Risk is a critical issue for organisations to minimise the level of risk they would be witnessing while involving in the business practices. Risk is always associated with uncertainty, even in our everyday activities. But we over comes these risk with our knowledge and experience by taking effectives measures to protect ourselves from these find of risks. Similarly, organisations have to consider the risks and uncertainty more strategically as they will be involving in huge business associations which might have an impact on large number of organisations and individuals. At most importance should be given to in order to avoid the disturbances from these risks or effects of these risks. Determination of these risks is critical and essential to implement Risk Management in any organisation. Smi th (1995) states that risk management is an essential part of any project or business and constitutes to be an indispensable part of organisational planning. 2.2) Risk Management as an effective tool for organisations success During the early 70s risk management had very little scope and its effects on projects and business were ignored because they were not recognised as serious threats for organisations (Merna and Al-Thani, 2008). Organisations were ignorant about the risk involved in any business process or project and hence risk management had less scope to be implemented. Later on with the development of Project risk management, in early 80s risk management was acknowledged as a specific topic in the project management literature (Artto, 1997 cited by Merna and Al-Thani, 2008). The awareness towards risks gave room for risk management to emerge as an effective tool for organisations success. Since then Risk management continues to evolve in many ways in many fields. It has emerged as a crucial aspect for business today. It has been developing steadily and obtaining great importance in the business world. Today the use of risk management concepts by the corporate managers have increased to a great extent and most of the organisations will have some kind of risk control measures and risk management policies this clearly shows that risk management is undoubtedly beneficial to the organisations. (Tufano, 1998) Successful organisations All over the world would have well coordinated risk management programme, they also recognise and identify the risks and admit that risks occur and it must be addressed. (Hiles 2007) 2.3) Risk and Uncertainty Risk is always associated with uncertainty. As identified by Bussey (1978), any decision which has a variety of outcomes is said to be subjected to risk and when probabilities can be linked to the outcome. In other words risk is the possibility of something undesirable happening. Many people think risk in terms of three main components; bad happening, the chances of it happening and the consequences if it does happen. (Merna and Al-Thani, 2008). According to Merrett and Sykes (1983) uncertainties come into picture when the there are more than one options for any course of action. However some authors feel that risk and uncertainty can be used interchangeably. Risks and uncertainties are common for all organisations irrespective of the organisations structure and their area of expertise; however, these risks are product or service specific. The nature of risk and the extent of damage or success and the result may change over time but risk itself cannot change. (Gordan 1992) In other words the effect of such risks and uncertainties differ from industry to industry and from organisation to organisation. Even with in a corporate organisation we may observe various sources of risks in different levels of the organisation. Some of such identified sources are – political, financial and legal risks at the corporate level, Economic and market risk at strategic business level and risks at project level may be precise to that particular project like Technical risks of a project. (Merna and smith 1996, cited by Merna and Al-Thani, 2008) Different organisations employ different approaches for identification of these risks and uncertainties. In order to identify these risks different methods of risk management are implemented to minimise these risks. After analysing the threat to the organisations from such risks they identify Organisations are extensively implementing the concept of Risk Management into their organisational culture. Though this process is time consuming it is onetime investment. It also involves considerable amount of capital investment. Investment banking is an industry which is known to have the maximum risks involved. Banking by itself is risk oriented business. The nature of investment banking business is volatile and they have to implement a comprehensive risk management strategy as it deals in the instruments which are highly volatile in the market. These risks have to be effectively managed for the smooth running of the organisation. So is the case with the Information or software industry. Software industry is no exception to risks though the nature of the business is not volatile they also involve lot of risks. These risks also have to be managed and addressed efficiently, to make sure it does not hamper the organisational growth. There will be a lot of system related risks and risk of manipulation, duplication and theft of the software, copyright and patents risks, technological risks and few others. The risks involved in these two industries are important, and have to managed to minimise their risks and maximise the opportunities for the organisations growth. My research is to know whether the risks involved in the above two industries are indifferent or similar. And also to identify whether risk management is being implemented in these industries as an effective tool. If it has been implemented what is the role of risk management in these industries. Aims and Objectives The research intends to concentrate on these two industries i.e. Investment banking and software industry to find if the amount of risks involved in these two industries. The research would also look on the risk control measures taken by these industries, their perspective of looking on to the risks their risk assessment and management methods and techniques. The researcher will be targeting two specific companies from both the industries and identify their risk management tools in their business. Whether it has helped them overcome these risks and to what extent they were successful in their attempts. What would be the scope for improvement for risk management in these industries? And Conduct research on these organisations to analyse if risk management has to be made mandatory for such organisations. The companies that would consider in the research are Australia and New Zealand Banking Group Limited (ANZ) which is one of the top players in investment banking sector, and Sonata Software Limited for software industry. 3.1) Research Topics Implementation of risk management as a control tool Is Risk management Organisation or industry specific? Comparative analysis of Risk and risk management in these sectors, Impact of risk and its management on business 3.2) Scope of Study This research will be investigative in nature which will be carried out on two companies Australian and New Zealand Banking Group Limited ANZ and Sonata software Ltd in a case study format, the information collected will be specific to these two companies and of sample size. A minimum of four managers in risk management will be contacted and they will be a part of this research. This research would be restricted to only two industries (Investment banking and Software industries) as the objective of the research is to compare the risk involved in these two industries. Research Strategy Research can be defined as a process undertaken to find out things collect data and interpret it systematically thereby increasing their knowledge. The research has to be based on logical findings and logical relationships and not just assumptions, and the methods used to collect such date should be meaningful (Saunders et al 2009). In layman terms research means searching for desired information from a reliable source and analyse that information to draw a conclusion for a research question. For this research techniques like qualitative data collection, desk study and interviews would be conducted. 4.1) Qualitative Research The research would be based on qualitative method of collecting data, qualitative research is an approach to study a social observable fact and it is realistic interpretive and grounded in the lived experiences of people their individual opinions and feelings. (Marshall and Rossman 2006) the data collected with this approach is non numeric data and is expressed through words. The data collected through qualitative research cannot be used directly, it has to be analysed before using it in the research. An effective qualitative research must be interactive and interpretive. It should use various methods to get the information and should be related to the context. 4.2) Case study Case study is a descriptive research which refers to gathering of thorough information of a corporate it refers to collecting all the detailed information of a particular firm and focus on the characteristics and factors of that corporate leading to its success or failure. The research intends to look at a case study of one corporate in both Investment Banking sector and software industry. The research concentrates on Australia and New Zealand Banking Group Limited (ANZ) and Sonata Software Limited and analyse the various risk involved in both the companies and how they are effectively managed. 4.3) Sampling Top managers, senior risk managers and people involved in the risk management process of the above mentioned companies will be targeted for this research and interviews would be conducted as a part of sampling technique to get the desired data. In the process of research a minimum of two persons responsible and working in risk management process of both the companies would be done. The interviews would be conducted based on the persons availability and accessibility. Data collection 5.1) Primary Data Various semi-structured interviews would be conducted to collect primary data, the interviews would be recorded. These interviews would be conducted with risk managers and employees responsible for the assessment and management of risk. Permissions and authorisations will be taken from the people interviewed and from the management before conducting the interviews. The interviews will be done personally or through internet also telephonic interviews if necessary. The questions asked in the interview will be clear and spontaneous to get clear answers to questions. 5.2) Secondary Data The data which is already available and published which can be used as useful information to our research is called as secondary data these are the data which is already researched by other researchers and is easily accessible. Risk involved in business and risk management has a vast literature and evolution of risk and its management is was there from many decades and hence a lot of information is readily available in various sources, this information will also be taken in to consideration in this research and there is no need to start the research on risk management from the scratch. The secondary data will be collected from various books, journals on risk management other online data base like EBSCO, JSTOR and other trusted sources, also the company websites would be used to get company specific information. This information would be extensively used in discussing the literature on the topic chosen. 5.3) Data Analysis The data collected from the interviews will be transcribed and assessed, analysed and interpreted in order to use it in the research, pie charts and graphs would be used if necessary to understand the risks involved and the methods and techniques used to manage the risks. The data collected through secondary data sources would be thoroughly examined and only relevant and reliable date will be included in the research. Data analysis would be done in an effective way to draw proper information and to arrive at a effective conclusion. 5.4) Reliability and Validity Reliability and validity is one of the important aspect of any research study, the data obtained must be valid and reliable. In this research there are a certain issues relating to reliability and validity like the information obtained may not be in detail as the risk management procedures of an organisation is very confidential and may not be disclosed to everyone, to overcome this the researcher may promise the organisation that the information obtained will not be disclosed to any one and will only be used to this research only. The data collected through interviews will be subjective. The reliability and validity of data will also be influenced by factors like time and place, and the conclusions drawn from the research would be the interpretations made by the researcher. 5.5) Access To start any research one important factor to be remembered by the researcher is getting access to the information required. As there is already a lot of literature on risk in business and risk management there will not be much hindrance in getting the secondary data however the researcher has to get access to obtain the primary data. The research concentrates on two organisations and the researcher has gained access in Sonata software limited and Australia and New Zealand Banking Group Limited (ANZ) to do case study on their organisation and to interview people responsible for identifying and managing the risks. However there is a risk involved in this as they may deny providing the required information as it may be confidential and to overcome this risk, as a back up the researcher can also try and get access to do a case study on Deutsche Bank as well. Possible chapters: Introduction Review of the Literature: Risk involved in todays business world And the steps and techniques used to manage those risks Introduction to companies chosen for the case study and their risks and management Comparison of risk involved in both the companies Assessment of the research Conclusion Gantt chart TARGET DATE TASKS TO BE ACHEIVED March Submission of Proposal April Collecting Data and conduct research June Conduct Interviews and Collect Data + Write up of Literature Review July Analysis of Data + Submission of First Draft August Submission of Dissertation

Friday, October 25, 2019

Alternative Medicine and the Christian Responsibility Essay -- Medical

Alternative Medicine and the Christian Responsibility Acupuncture, ayurveda, chiropractice, homeopathy, meditation, osteopathy, and yoga are just a few of the many types of medicine practiced all over the world. According to the western establishment, all these forms of medicine are called alternative medicines. However, some of the aforementioned techniques have been in continuous use for over six thousand years, predating western medicine by over four thousand years. Yet, still many M.D.'s reject alternative forms of medicine. One of the buzzwords in medicine in recent years has been "holistic medicine". Physicians are becoming more aware of the need to treat the whole patient rather than just certain symptoms. Due to this realization, a small percentage of doctors are turning to ancient forms of medicine as a guide to alternative treatments. As alternative forms of medicine emerge in the western world, Christian scientists need to determine the moral, religious, and scientific validity of such techniques in order to gain a more holis tic approach to medicine. Moral Issues According to the Hippocratic Oath, which every physician must take, each physician is expected to deliver the form of care which she considers most beneficial to a patient's health. There are a few minor stipulations guiding treatment by a physician, but for the most part, doctors have much liberty in choosing a regimen for a particular patient. If we look only at the Hippocratic Oath as the governing body of a physician's actions, then we must admit that no doctor is obligated to broaden his views and seed treatments with which he is not already familiar. However, every year doctors are required to fulfill certain requirements in continuing educatio... ...at an open mind about many of the forms of alternative medicine may reveal new forms of beneficial treatment that can save money and even lives. Each Christian scientist has the responsibility to seek morally, religiously, and scientifically sound forms of alternative medicine as a supplement to the western medicine in our society today. Works Cited Collinge, William. 1996. The American holistic health association complete guide to alternative medicine. New York: Warner Books. Inglis, Brian and Ruth West. 1983. The alternative health guide. New York: Dorling Kindersley Limited. Maciocia, Giovanni. 1989. The foundations of Chinese medicine. New York: Churchill Livingstone. Marti, James E. 1995. Alternative health medicine encyclopedia. Detroit: Visible Ink Press. Plotkin, Mark J. 1993. Tales of a shaman's apprentice. New York: Penguin Books Ltd.

Thursday, October 24, 2019

Adolescent Development Essay

There are mutual influences between an individual and their social environment. There are also at-risk factors involved in the life of a developing adolescent that interconnects with a series of reciprocal systems. I can recall as a developing adolescent quickly maturing into adulthood, the many social, economic, external and internal influences that contributed to certain at-risk behaviors. These type of influences impacted me directly and indirectly. I was influenced by the several environments I was in, and I also contributed to influencing the environment around me. Attempting to exert control over uncontrollable circumstances only lead to desperate situations and weighty consequences. However, learning to accept my present circumstances, and how to appropriately respond to the hardship and temptations in life developed positive life changes. Individual human development occurs within interconnected and embedded ecological systems (McWhirter et al, 2013). The ecological systems include the individual, the microsystem, the mesosystem, the exosystem, and macrosystem (McWhirter et al, 2013). The individual consists of genetic and biological factors, and personality characteristics (McWhirter et al, 2013). The microsystem consists of the people that the individual comes into direct contact with and who the individual interacts with (McWhirter et al, 2013). The mesosystem is the embedded interconnections between different microsystems and the impact of the interactions that take place (McWhirter et al, 2013). The exosystem consists of the interconnections between one or more settings that indirectly involve the individual (McWhirter et al, 2013). The macrosystem represents the social blueprint of cultural values, societal structure, gender-role socializations, race relations, belief systems, and national and international resources (McWhirter et al, 2013). The chronosystem is the interconnection and interaction of the individual within different environments, and is the transitions that occur during the course of the individual’s lifetime (McWhirter et al, 2013). These interconnecting systems are referred to as the ecological model, and assumes that the individual is continually interacting with his or her environment hat produces constant change due to mutual influences (McWhirter et al, 2013). Part A – The Ecological Model The core of who I really am involves the combinations of my genetic predispositions, evolutionary and biological components, personality characteristics, and the ongoing process of behavioral, cognitive, and affective experiences (McWhirter et al, 2013). Who I am has a lot to do with my expe riences in life, my responses to life events, and the social and environmental influences and interactions involved. The ecological model provides a greater understanding of how I influence my environment and my environment influences me. This is important because it is through the interactions of the ecological systems that help me better understand myself and others. The Individual. I entered the world with an umbilical cord wrapped around my neck, struggling to live due to insufficient oxygen intake. As a child I was very susceptible to illness. As an adult I discovered that I was living with an autoimmune disorder. I have very vivid fragmented memories as a child of several doctor office visits. At the personal level, I was a very fearful, anxious, angry, socially withdrawn child who experienced an unstable, insecure, neglectful, abusive, and dysfunctional home environment. The structure of personality develops in childhood and continues to develop in adulthood (Caspi, Roberts & Shiner, 2005). I developed a combination of extraversion and introversion traits. These traits show themselves depending on how safe I determine the environment around me to be. As a child I experienced positive and negative emotionality. I at times struggle with viewing the world as a safe place and occasionally viewed it as threatening. I experienced anxious distress with a tendency toward anxiety, sadness, insecurity, and guilt. As a teenager I experienced darker emotions such as anger, frustration, and irritation. I developed agreeable personality characteristics as a child. In adulthood I sometimes struggle with the fear of rejection, self-acceptance, people pleasing tendencies, self-awareness, and feeling comfortable in my surrounding environment and own skin. I also developed a strong motivation to achieve academically, and have a strong sense of independence. As a child and through my teenage years I was not allowed to have an opinion or express individuality, which resulted in the inability or challenge to think on my own, questioning who I am through life stages, fearful of making decisions on my own and especially decisions I need to make on behalf of others, and codependency issues. The Microsystem. I grew up in a traditional family household for a time being that consisted of my mother, father, and sister. Although, it was considered a traditional two parent household, my father was rarely home, and when he was home he was unavailable. My mother was emotionally unavailable and suffered from manic depression. My mother stayed at home and my father was either out working or pursuing one of his addictions. My family was homeless until I was the age of 5. We had lived and slept in my father’s suburban, randomly stayed with strangers, and at times lived in a recreational vehicle. I assumed responsibility and care of my younger sibling, my mother, myself, and household chores. I entered the stages of maturity alone and without parental support. The lack of positive parenting during my adolescent years made me vulnerable to at-risk risk behaviors such as premarital sex, tobacco use, substance abuse, gang involvement and mental and social disorders (Clinton & Clark, 2010). At the age of ten I was removed from my parent’s custody and placed in foster care where my sibling and I were separated and placed in different homes. In the foster system I was only allowed to socialize at school, and attended church depending on whether or not my foster parents at the time deemed it necessary. My sister and I went through several foster home placements which resulted in the loss of security, the loss of our personal possessions, and sense of belonging. Being bounced from home to home, it was difficult maintaining a close friendships with others. I developed an internal mechanism of being friendly with everyone, but not allowing myself to develop a close friendship with others. As I gained independence and freedom in my later teen years and early adulthood, I became more involved in church. The Mesosystem. I grew up in a rural community with a lack of parental involvement. There were no real established mesosystem relationships. The environment was inconsistently positive and very negative at times. Since school was my outlet, I strived for academic excellence and successfully achieved it. School seemed to be the only sense of stability. The Exosystem. Outside agencies that developed policies and created public resources were an indirect benefit to me as an adolescent and young adult. During childhood, I was able to eat lunch at school, and enjoy extracurricular activities such as Campfire Girls, cheerleading, and Key Club. I was given accessibility to the basic needs that my parents could not afford such as cloths, food, and shelter. As an adult, several community resources helped my daughter and escape and terminate a domestically violent relationship. The Macrosystem. During adolescence I was exposed to abuse, neglect, and violence first hand and via the television. My father grew up in the south and was very racist toward certain nationalities and races of people. The cultural context consisted of low socioeconomic status (SES), poverty, and experiencing our Native American ethnic background and being exposed to several conflicting belief systems. I grew up on a culture where corporate punishment was an acceptable practice. The culture valued individuality, independence, and self-reliance. I grew up in poverty with a prevailing crime rate not as noticeable as it is today. Social norms included the overuse of antibiotics (McDonnell Norms Group, 2008), and the use of drugs and alcohol were socially acceptable. Chronosystem. A pattern of environmental events, transitions, and sociohistorical circumstances contributed to my development over my lifespan. Both of my parents lived disloyal and adulterous life styles. Overtime, there unhealthy and dysfunctional patterns of relating to each other resulted in a separation. My father died when I was 17 years old. My parent’s marriage legally dissolved at the time of my father’s death. My mother remarried multiple times. My sister and I were exposed to their dysfunctional lifestyle, which tremendously impacted our lives. I personally, transitioned through many of life events by experiencing two divorces, being a single-mother of four children for quit sometime, remarrying and adjusting to a blended family, the loss of my oldest daughter, and facing the social political arena at work. Part B – At-Risk Tree Metaphor The At-risk tree is an analogy that allows people to understand the range of issues involving at-risk adolescence (McWhirter et al, 2013). The soil of the tree represents the individual’s societal environment (McWhirter et al, 2013). The roots refer to family, school, and peer groups that connect the tree to the soil (McWhirter et al, 2013). The trunk represents the developing attitudes and behaviors of each child (McWhirter et al, 2013). The branches of the tree represent the attitudes and behaviors that lead to specific risk categories (McWhirter et al, 2013). The soil of my family growing up consisted of poverty, low socioeconomic status (SES), judgmental and racist attitudes, abusive and neglectful home environment, and conflicting belief systems. The three primary roots are family, school, and peer groups (McWhirter et al, 2013). My parent’s inability to raise my sister and me in a loving, secure, stable, and nurturing environment, and expose us to family conflict, abuse, neglect, lack of parenting, being emotionally unavailable, and an unstructured home environment contributed to my dysfunction and the at-risk behaviors in my life. The school system was unaware of our life circumstances and did not any support. My sister ended up dropping out and getting involved with drugs. I became sexually involved with my boyfriend at the age of 15 and became pregnant at the age of 16. My daughter gave me the drive to continue my education and succeed academically in order to provide her with a better life. I was withdrawn during my adolescence and teenage years. Although, I made intent to get along with everyone, I did not associate with everyone. The peer group I involved myself in strived for academic excellence and engaged in positive extracurricular activities. The trunk of the at-risk tree representing my life consisted of low self-esteem, and depression. The branches of at-risk categories in my life were high-school dropout, substance abuse, risky sexual behaviors, and suicide. I was at risk for teen pregnancy and became pregnant at the age of sixteen. I succumbed to sexual activity with one partner in high school that resulted in teen pregnancy. I was very fortunate that at risk behaviors did not escalate. My tree was broken and bruised and produced damaged fruit. Instead of running to quick gratification I learned to run to God. I found my value and security in Christ. My branches although bruised eventually healed and produced good, healthy fruit. It took a lot of effort, drive, motivation, will, and trusting God in the midst of temptation and hardship. I was fortunate to have a variety of Gardeners in my life from Christian counselors, law enforcement, human service workers, youth group leaders, Sunday school teachers, and church mentors who helped me redirect my lifestyle. I learned how to be academically successful, a loving, supportive, caring mother to my children, a hard worker of integrity, and to do the right thing when the wrong thing seems easier at the time being.