Thursday, October 31, 2019
Land study Essay Example | Topics and Well Written Essays - 1500 words
Land study - Essay Example According to Covanta Energy (2011), the Rookery South EfW Generating Station will be able to ââ¬Å"convert approximately 585,000 tonnes of residual waste per year into 65MWe of electricity, of which 55MWe would be exported to the national grid. That's enough electricity equivalent to meet the needs of Bedford and the Marston Vale;â⬠meaning, approximately 82,500 houses (About the Project, para. 2). As far as the size and construction, Covanta Energy did not want to hinder or takeaway from any long-distance views. Therefore, the designers decided on a building made up of boxes that interlock (See Figure 1), to reduce the height of the structure as much as possible; the other option was a 3-stack building. Still, with 9 times the total capacity per annum of the Isle of Man EfW facility, the current design is approximately 2m lower than ââ¬Å"the visible height above ground level of the Isle of Man EfW Facilityâ⬠(Covanta Energy, 2011). ... Assets including designated and undesignated archaeological sites and historic buildings such as parks and gardens, monuments, areas of conservation, and registered battlefields are the focus of the assessment. Since the Rookery South EfW Generating Station will be built in the location of a former clay pit, there is very little, if any potential for negative impact on historical assets. The only potential for disturbance Covanta Energy (2011) has acknowledged is to ââ¬Å"currently unrecorded sub-surface archaeological features during those construction works that take place outside of the pit of minor significanceâ⬠(Cultural Heritage, para. 2). The residents and local decision-makers feel different from Covanta about the impact on the historical area of the proposed development. Residents of the Marston Vale and surrounding areas near the proposed site of the project want to hold on to one of twelve community forests in England (Ampthill, 2011). The resounding message to Cova nta is the pollution generated from the facility combined with the eyesore of a massive processing plant viewable from long distances will ruin the historical beauty of the land (Ampthill, 2011). Although Covanta recognizes the fact that the facility will be visible from long distances, potentially causing negative reactions like those conveyed by the residents in the surrounding communities, they feel they have taken adequate steps to minimize any adverse impact. The steps they refer to include the low-profile design, as opposed to the 3-stack alternative, and the selection of material finishes for the buildings, which they feel are as aesthetically pleasing as a waste processing plant can get; all aspects of the design were developed after consulting with Central Bedfordshire Council,
Tuesday, October 29, 2019
History Museum Visit Essay Example for Free
History Museum Visit Essay Located on the coast of southern California is the city of La Jolla. Now home to almost 40,000 people, this city shares its own historical story from the past one hundred and fifty years through a series of presentations located within three historical structures. These three structures include, The Westeria Cottage, Carriage House and the Current Headquarters. Each structure contributes its portion in putting together the La Jollaââ¬â¢s Historical Society. Currently, the structures are featuring, Home front La Jolla : An American Community during World War 11. The series includes multiple rooms dedicated to different parts in history, along with the different aspects going on during the war. Each room featured many photographs, artifacts and personal stories to exploit the hardship of these times in our history. Many of these items were either donated or loaned by the Veterans Museum in Balboa Park and the Japanese American Historical Society of San Diego. While researching for museums, early in February I came across the main website for these historical sites. It caught my eye because I knew that this exhibit would cast a different kind of perspective than other grand museums. There are a ton of histories on World War II, but there are very few on the home front experience. The La Jolla Historical Society presents a perspective from its society, and shares multiple personal oral stories from its own residents who lived through the war or their surviving relatives, which I found fascinating. It is catered specifically to the effects of World War II on La Jollians. The oral stories provided by this exhibit are not only about what these residents remember about World War II, but also an intake of what life was like beyond that. I viewed this as a much different approach, but was very excited to begin my experience because I knew it would be something new. On April 7th, 2012, I took the opportunity to travel down to La Jolla and visit the museum. The museum is open Thursday-Sunday, Noon to four PM and does not have a fee at all. I was also fortunate to be able to attend on a day where there was a given lecture at five PM, giving me enough time to grab an early dinner before returning again. The lecture, Science Technology on the Home front, was covered by an oceanographer and U.S Army veteran Walter Munk. He discussed the scientific innovations sparked by the needs of the war effort precipitating a boom in the fields of marine sciences and aeronautics. Entering the museum, I was introduced into a grand room that was divided up by glass cylinders, and it also offered entrances to many other rooms. Initially where you begin the journey, the right wall played an introduction role. It began with the year of 1894, displaying numerous photographs creating an idea of how life was like in La Jolla at the time. ââ¬Å"Everyone knew everyoneâ⬠quoted by Maurice Bonny was stated at the top of the wall. Photographs included vacation sports such as the La Jolla Caves, as well as the role of the newly invented Trains and Trolleys played and daily lifestyle activities such as golfing and beachside activities. Continuing along, stood in front of me a large wall with a devastating photograph of the explosives on December 7th, 1941. Underneath was the original copy of the U.S Navy Communication Service from that given day, along with an article written the following day by John MaxConnel. This portion of the exhibit also feautured my first chosen artifact, a scrapbook. The oral history of a World War II veteran, Don Shutte, was done by a La Jolla High School student named Ana Ofresky, especially for this exhibit. Don Schutte donated a scrapbook of artifacts of things throughout his experience. It contained images, personal sketches and official documents, including the telegram the Department of War sent to his parents notifying them of his status as missing in action and a POW identification card he was given by the German Army upon his capture and imprisonment during the Battle of Bulge, on December 16, 1944. The final page of the scrapbook contains a letter he wrote to himself on Dec. 2, 1945, stating: ââ¬Å"Hello there, great to be a civilian, isnââ¬â¢t it?â⬠I found this a significant artifact because it told a story of just one man involved in the war in a very unique way. The documents inside this scrapbook were all original and of items I had never se en before. On the opposite side of the room was a large wall which featured certain camps that La Jolla was hosting at the time. These camps included Camp Callan, Camp Mathews and a military base in Bird Rock. Camp Calvin B. Mathews, also known as Marine Corps. Rifle Range was a military base from 1917 to 1964. It was used as a marksmanship training facility for Marine recruits being trained at Marine Corps Recruit. It was issued a rifle base but not until 1923. The base was then constructed to what is now UCSD. Camp Callen was a United States Army anti-aircraft artillery replacement training center that was operational during the time of war but was shut down right after World War II had ended. Lastly, there was another Naval Anti- Aircraft Training Center at Bird Rock, or Pacific Beach. This was a site where sailors would take a six-day course on anti-aircraft artillery. It was opened from 1942 to 1945 and trained about 300,000 sailors to shoot down aircrafts. In a separate and very small room, was a Japanese American side and point of view during the war. It was set up to look like what s room at the internment camps looked like. ââ¬Å"Most Japanese were interned in 10 camps in remote areas of seven western states. No claim of humane intent could change the reality-these were concentration camps. (pg. 736). The room only included a bed and a suitcase which included bedding, a book and one outfit. On the largest wall was a map that displayed the location of all of the internment camps in the U.S and a copy of a poster of instructions for the Japanese living in these rooms. ââ¬Å"Local newspapers there expressed confidence in the loyalty of Japanese Americans, who in any case were crucial to Hawaiiââ¬â¢s economy(pg.736)â⬠The room also displayed many newspaper articles, including one from the Los Angeles Examiner on March 23, 1942 announcing relocation of Japanese Americans from Los Angeles to internment camps. It was good to see an example of what kind of media was out during the time. Also in the room was the story of Hiomi Nakamura, a La Jollian born Japanese American who was first transported to a permanent relocation internment camp site, and later drafted to play a role in the was at a laboratory. Also, in this room I found my second artifact, small carvings. In all of the internment camps, people began making what they needed with whatever materials they could find. Scrap lumber became furniture, found metal became knives and for fun, scrap wood was carved into small, painted birds. These carvings were scrap wood paint metal which women also used as jewelry. To the right of this room continues on to an even smaller room. This part of the exhibit was the ââ¬Å"blackoutâ⬠room, covered with thick black sheets much like those were used by residents at the time to keep light inside their houses. People were so afraid the Japanese would attack that they had to turn out all of their lights at night. Blackouts were enacted to prevent enemy aircraft from reaching their targets by sight. They also helped prevent ships from being viewed in silhouette against the shore, and vulnerable to attack by enemy submarines. Traffic lights and car lights were covered in a way that would deflect their beams to the ground. This is where another one of my artifacts was inspired, a black sheet. These sheets were a source of protection and I feel it exploits a sense of nationalism as well. The community as a whole worked together in order to make sure all the light in their society was turned off. Nationalism is brought up many times in our textbook startin g with the growth of corporate businesses, to the acts of citizens during all three wars. Finally, came the last and second largest room. In this room I found my two remaining artifacts. This part of the exhibit displayed both men and womenââ¬â¢s role during the war. It included stories from women who were living at home, while their men were at war. It provided the perspective of what it was like to be a women or even young mother in La Jolla in the 1940ââ¬â¢s. Alongside of the roles played living on the home front, it also displayed the new roles women took inside the war itself. ââ¬Å"World War II brought an end to the military as an exclusive male enclave that women entered only as nurses (pg.730).â⬠At first the government discouraged women who wanted to perform some kind of military service. It soon became clear that the war was going to demand more than the government had expected. Women began to do technical jobs normally performed by men. One of the artifacts that I chose from this room was a nurseââ¬â¢s robe from the Red Cross. This robe was not just your typical plain robe but was covered in patches of each army man they had helped. I was barely able to even see any white apart of the original robe. I chose this artifact because it truly portrayed the crucial role women also played in the war. Our textbook gives us a brief overview from the changes of roles women played during the time of war, but the number of patches on this robe opened my eyes to how much more of an important factor these nurses played taking on a great amount of soldiers. The number of men these women helped were astounding, definitely portraying how import a womenââ¬â¢s role was. On the other side of the room was a glassed display of a US Army Air force uniform from 1943-1945. It was considered to be the ââ¬Å"Eisenhower jacket,â⬠based on General Eisenhower. In the display were also a M1903 Springfield Rifle and a M1 Grand Rifle alongside what seemed to be a map. The other artifact that I chose from this room was a silk scar f. Now this long silk scarf had nothing to do with fashion, but proved to be a crucial navigation tool during the war. Allied pilots were issued with these scarves that had detailed maps of enemy territory printed on them. The silk scarves also denoted railroads, canals, roads, frontier, churches and lighthouses. Air Power Shrinks the Globe on page 743 of our textbook discusses the growth of airplanes over the period of time of war. ââ¬Å"The Wellington flew 255 miles an hour and cruised as high as 12,000 feet, with a range of 2,200 miles, whereas the new B-29s could travel more than 350 miles an hour, at altitudes up to 30,000 feet, with a range of up to 5,000 miles. (Pg. 743)â⬠At the time, this was a massive step in the evolution of aircrafts and aircrafts at war, but if we compare this to the type of technology we have in our airplanes it cannot compare. Many of us cannot find our ways around our own city without using our mobile devices to navigate us. These pilots were u sing maps printed on scarves to help direct them around! It is incredible. I believe that the site gave an exceptional insight of how life was like prior, during and after World War 11. Each room explained its story well by the display of artifacts, photographs and touching oral stories it presented. The facility was well outlined timeline which exposed a sequence of events. The exhibit related perfectly to the content of this class with all the information and artifacts it presented. Many of the things presented corresponded with what the book had to say about World War II, along with a lot of new material as well. Overall, I was very pleased to have been able to take a day off and visit the La Jolla Historical Society. I was able to learn a great deal of new material which contributed to a better understanding of what times were like during the war, not only as a nation but to the residents of La Jolla.
Saturday, October 26, 2019
Literary Components Of M Commerce Information Technology Essay
Literary Components Of M Commerce Information Technology Essay The present assignment on Secure Mobile Transactions: m-commerce, aims to present a comprehensive view of all the technological and security aspects that influence and govern monetary transactions done on wireless networks. This paper refers to some basic concepts related to m-commerce and then proceeds to discuss various purely technical issues involved in m-commerce. This work identifies presently available technologies that facilitate m-commerce and gives explanation about each of such technology. Further, the assignment focuses on the security challenges involved in mobile transactions and various aspects of mobile payments. Finally, the paper gives a brief list of m-commerce solutions currently available. Table of Contents 1. Introduction: Mobile commerce or simply m-commerce relates to commercial business operations and transactions carried out on wireless telecommunication networks with the infrastructural assistance of handheld mobile electronic devices. E-commerce is the commercial business processes done on internet and the m-commerce is making all monetary transactions on mobile devices (wireless electronic commerce). The technology of m-commerce offers many services and facilities that make commercial dealings simplified and reduce time consumed in those transactions. But the users and service providers have to be cautious of possible treats of wireless trade operations. Security of information, privacy to personal details and protection to the money involved are the real touch stones of strength of m-commerce. 2. Literary components of m-Commerce: The concept of mobile commerce came into existence in the last decade of the 20th century. What has started as a facility to make payments to a soft drink vending machine, has now effectively subsumed nearly every aspect of electronic commerce. Today, m-commerce has emerged as a viable extension to e-commerce. Now the customers of any service or product can make their payments over mobile phones staying anywhere or even on move. Fundamental difference between e-commerce and m-commerce is that, in electronic commerce business dealings and transactions are made on internet, but the mobile commerce services can be used with the help of simple and inexpensive SMS and IVR systems (Rediff.com, 2010). Statistics inform that, the penetration of personal computers is still limited and the mobile penetration is nearly ten times more than that of PCs. Further, the wide internet access is still a distant dream with the exception of big cities and conurbations. Thus with the presently available u ser share and the further spread in future would certainly point mobile commerce as a viable and popular option to make swift and secure monetary transactions. Further, people with basic literacy can also make use of various services of mobile commerce unlike the electronic commerce, which requires the users to have good command on PC knowledge and its operational procedures. The central point of mobile commerce is making payments on mobile phones. It is a point of sale payment made over a mobile gadget like cell phone, PDA (Personal Digital Assistant) ,a smart phone, gadgets of personal area networks and other newly coming wireless equipment (Krueger, 2001). Here, not only the merchandise transactions made through cell phones but the monetary payments made to utility vending machines, cab services, car wash machines etc also constitute acts of mobile commerce (Paavalainen, 2001). The core idea is the convenience. This convenience should not turn into a nightmare because of lack of security of the data exchanged in these commercial transactions over wireless networks. Important services offered by m-commerce are, Making reservations of tickets of journeys Booking various entertainment show tickets Making payments of civic utility bills Transferring gift vouchers Booking hotel rooms Booking cab services Make money donations to social service foundations Making stock market trading To avail all these facilities, mobile users can make use of SMS, BREW, GPRS and IVR services. Key issues of mobile transactions are the questions of authentication and security. The service providers have to follow robust security standards that are in vogue world wide. Some of the presently accepted standards are PCI DSS (Payment Card Industry Data Security Standard). Advantages of m-commerce are: Reduction of time consumed in serving merchandise orders Reduction in the cost of management of commercial transactions Gives extensively broad reach Helps in effectively coordinating all the business processes involved Gives competitive advantage in matters of product pricing Provides high speed access to modern cellular applications (Answers Corporation, 2010). Disadvantages of mobile transactions: Cost of establishing and managing wireless telecommunication infrastructure Concerns over safety of information and data exchanged over mobile gadgets Mobile devices come with small screens and this limited display can limit the types of data and files that can be exchanged and accessed Advanced mobile technologies are now largely confined to big cities Technical limitations of mobile telecommunication equipments (Answers Corporation, 2010). Given the comparative merits and demerits of mobile commerce, one can be perfectly sure that, the ongoing technological researches would certainly find viable answers to problems of this new paradigm in wireless commerce. 3. How m-commerce differs from e-commerce? The level of wide availability of wireless telecommunication networks to use m-commerce applications practically from any location. The convenience in handling these small and low weighed devices is unique when compared to equipment required for carrying out electronic commerce transactions. Further these mobile devices are purely personal electronic gadgets and this guarantees maximum personalization unlike the PCs with Internet which are needed for e-commerce actions that are often shared among multiple users. Localized positioning of users can be done on all mobile commerce transactions. As the users carry their mobile phones with them, they can utilize their preferred personalized settings with which they can transact. This personalization is not available in electronic commerce transactions and dealings. 4. Technical areas related to secure m-commerce: There are various aspects on the technical front that are closely related to safe money transactions done on wireless telecommunication networks with the help of mobile handheld devices. They are: 4.1. Need for secure m-commerce: According to Yeun (2001), there are more cell phones which are connected to internet than the number of net connected Personal Computers. Though the PC penetration is also gaining pace, the spread of mobile phones and related gadgets has already surpassed all the future projections. The comfort given by mobile merchandise transactions is fueling the further expansion of m-commerce. As more and more people are resorting to the m-commerce utilities, the service providers have to take every care to ensure that all the transactions done, payments made, business deals concluded and the information exchanged over wireless networks is best guarded and strongly protected. Already the electronic commerce has seen any worst cases of security breaches and fraudulent infringements in high value commercial transactions done on electronic media through PCs connected to internet. This shows the dire need to research, design, invent and implement robust security standards for every small monetary tr ansaction done over mobiles. Propensity of threat should be reduced and the vulnerability of supportive wireless networks should be reduced to sub-terrestrial depths to complement the growing demand for m-commerce. 4.2. Security Challenges in m-commerce: As the wireless telecommunication networks are spreading fast and becoming a ubiquitous resource, the user base of m-commerce is fast expanding. But to ensure the continuity of this boom, high security of mobile transactions is in dire need. Important data and transaction security problems that pervade over m-commerce transactions are analyzed by Grosche Knospe (n.d.). As the mobile gadgets are purely personal devices, they are bound to carry some important private and confidential information which needs protection from unauthorized intruder access. To answer this threat these, smart and sensitive gadgets must employ user authentication mechanisms like passwords and PIN. Further, these cell phones must come with good data backup and crash recovery tools pre-installed in them, to cater to any unforeseen data loss and authentication breach. The operating systems used in the wireless gadgets must have tested perfection in defending owners data security needs. While the owner of the mobile phone intends to transmit some data over wireless telecommunication network for any commercial dealing, the wireless interface that guides this information exchange must be strong enough to maintain high levels of confidentiality, content integrity and more particularly user authenticity. Eavesdropping is a big threat which the wireless networks have to confront ser iously. Data security mechanisms vary from one mobile technology to another. The end user access networks need to be strongly protected from data theft within and out side these network loops. And the network operator concerned must ensure that the money transactions made are concluded to the maximum satisfaction of both parties. Money payment actions done on wireless networks should have assured secrecy and protection to the money involved. This task should cover all the stages starting from the payment or committing to make a payment up to the conclusion of the deal and authentication systems have to guard the entire transaction leaving no chance to intruder attack. 4.2. Technologies involved in m-commerce security: With the increasing widening of mobile penetration, and all other similar wireless handheld devices, the services offered by mobile commerce have assured future. The technologies involved in the mobile commerce mainly deal with transferring of data and information over the available wireless telecom networks. Presently, widely used supportive network technologies are 2nd generation (2G), 3rd generation (3G) etc (Grosche Knospe n.d.). 2nd generation wireless telephone technologies include, GSM (TDMA based), CDMA One etc. 2G telecommunication technologies are also known as PCS (Personal Communications Service) in USA. Advanced version of 2G services is 2.5G. This new one offers data transfer at higher speed. These services gave way to 3G services. This 3G technology comes with wireless telecom services like CDMA2000, UMTS, GSM EDGE, WiMAX, DECT etc. These new mobile standards support data transfers up to 14Mbits per second while downloading. The security of data transfers is higher in 3G when compared to earlier 2G technology. 3G services come with user authentication facilities while connecting to any network. This guarantees high security to all the transactions done of that specific telecom network (Grosche Knospe n.d.).. GSM is the most used media for carrying out mobile commerce transactions. The data transfer and sharing services offered on GSM networks are, SMS (Short Messaging Service) for sending short messages having maximum 160 characters on the network media, WAP (Wireless Application Protocol) to access internet APIs designed in WML (Wireless Mark-up Language), HSCSD (High Speed Circuit Switched Data) tool of channel clustering for high data transfer rates and GPRS (General Packet Radio Service) actually, this is an extension of GSM services. Fundamental architecture of GSM network generally contains GPRS, Intelligent Network(IN) and SMS services. UTMS (Universal Mobile Telecommunication System) is a modern telecommunication system offered by 3G services. This is largely an extension of existing GSM. It has WCDMA (Wireband Code Division Multiple Access) radio channel signaling technology (Grosche Knospe n.d.). WLAN (Wireless LAN) works in 2.4 GHz 5 GHz spectrum. Normally WLANs are low in data security. IEEE stipulated WEP (Wired Equivalent Privacy) to provide some security to transactions done on WLANs. 5. Security at various levels of mobile transactions: 5.1. Safety in data transport channels: The technologies like GSM, GPRS, WLAN, UTMS provide considerable security to all deals transacted on wireless networks. But they cannot handle the safety constraints, when the commercial transactions involve multiple access networks. To ensure end to end security in such cases that communicate over Internet Protocol, SSL/TLS is widely used. SSL works with TCP (Transmission Control Protocol). Another transport layer security protocol designed and used for this purpose is WTLS with WAP services (Grosche Knospe n.d.). 5.2. Safety of network services: To make m-commerce transactions more secure, Intelligent Network (IN) concept in GSM networks is introduced. This GSM framework contains IN logic i.e. CAMEL (Cuatomized Application for Mobile Enhanced network Logic). IN handles all the m-commerce conversations. These services can also be used with SMS systems. Other technologies for secure services are, Parlay / OSA (Open Service Access) and USSD (Unstructured Supplementary Service Data) (Grosche Knospe n.d.). 6. Security models presently in use: GSM (Global System for Mobile Communication) is the widely used mobile security standard in European countries. According to Zobol (2001), Europe has the highest mobile penetration and the European Commission is presently implementing 15 new projects that operate mobile telecommunication networks. These projects are using WAP, GPRS, UTMS technologies. For ensuring high security of mobile transactions, they are using NESSIE encryption and E-PASTA environment. Further, 4G an ultra speed broadband is also under implementation. 7. m-Payments: The commercial transactions concluded on mobile wireless networks do involve money payment. The concept of m-payments related to payment of charges for services or the price of goods sold or purchased over mobile wireless telecommunication networks. Significant advantageous aspects of m-payments are, less time consumed, no need to carry physical money and remote operability of accounts safely. There are different variants of m-payment systems like, pre paid payment systems, pay now payment systems and post payment systems. There are various agreed limits of money transactions that can be done on mobile networks. In Europe micro, small and macro payments are in vogue form 1euro to more than 10 euros. In India the monetary transactions up to Rs.50000 can be done (Rediff.com, 2010). The level of safety such mobile transactions need varies based on the money involved and the items that are traded in that transaction. But in each of such case anonymity of customer has to be protected safely. Mandatory and common requirements of mobile transactions are authenticity, reliability, confidentiality, authorization and integrity. Further the response time has to be reduced to minimum. And, conformity to ACID (Atomicity, Consistency, Isolation and Durability) principle for all deals involving monetary payment. Depending on the sources of money from where customers make payment over mobile networks, various m-payment systems presently available are: Software electronic coins, Hardware electronic coins, Background amount (Grosche Knospe n.d.). 8. Examples of m-commerce security solutions: Irrespective of the mode of payments made on mobile phones, there are various standardization bodies that deal with mobile commerce transactions. Some of them are, MoSign, Mobile Payment Forum, mSign etc. Another famous data security standard related to m-commerce is PCI DSS (Payment Card Industry Data Security Standard) (TechTarget, 2010). Visa International has recently developed Mobile 3D. It is a global security specification standard system that makes money transactions made by mobile phones and on internet more secure and safe (CellularOnline, n.d.). Finacle m-commerce solution developed by Infosys has many good security features like, generation of One time Password (OTP), USSD application, strong inclusivity framework and ability to register multiple bank accounts to a single mobile (Infosys, 2010). 9. Conclusion: Security of transactions concluded on mobile telecommunication networks is of fundamental necessity for the very concept of m-commerce. This assignment attempted to through light on every important aspect related to mobile commerce. The technologies discussed in this paper do need further improvement to cope up with the increasing threats to data and money transfer over internet and on wireless networks. Growing fraudulent intrusions on mobile information systems and individual gadgets make up a persistent need to continuously refine existing solutions and design new ones that can better resist attacks on transaction security over wireless media.
Friday, October 25, 2019
presidential elections over the years :: essays research papers
Presidential Elections: Then and Now The presidency is the single most important position in all of American government. Who the presidents were and what they did say a lot about America as a whole. In colonial America, the election of public and church officials could probably date back to the very beginning at Plymouth Rock. In the presidential era of the late 19th century, the job as president was considered just that, a job. The presidents made little effort to reach out to the public unlike today where that is the main audience; they need to make the public happy. The president was seen as merely a type of civil servant. All other parts of the government were more important. For example, Congress, who controlled the federal budget, public issues, and legislation, allowed no type of interference from the president. Today the president is more of a leader, equip with more power than in the past. Today the United States Constitution states that there is a right to hold elections, but the methods and places are left up to the state. It also states that the elections of presidents and vice presidents are to be indirect, which means that they are chosen by electors whom are selected by the people-the Electoral College. There is more emphasis on what the people want and need. This is one result of a changing government and society. With these changes came changes in the way the presidential elections were seen and controlled and also the methods taken to achieve a victory. There are many differences in the presidential elections of the late 19th, early 20th century and with the elections of today, however there are similarities too. The major areas about presidential elections that are easily comparable are the areas of campaigning, debates, and issues. In the early years of the nation, men would be asked to take political office. These men were supposedly well known and their character and experience were expected to speak for themselves. As politics democratized in the 19th century, men began to ââ¬Å"runâ⬠for public office by promoting themselves through campaigning. This was true for all offices except the presidency. The public and press were opposed to presidential campaigning because it was a too dignified position for the candidates to embarrass themselves with personal salesmanship. People felt the president should be above partisanship. This way he would be able to act for the common good. presidential elections over the years :: essays research papers Presidential Elections: Then and Now The presidency is the single most important position in all of American government. Who the presidents were and what they did say a lot about America as a whole. In colonial America, the election of public and church officials could probably date back to the very beginning at Plymouth Rock. In the presidential era of the late 19th century, the job as president was considered just that, a job. The presidents made little effort to reach out to the public unlike today where that is the main audience; they need to make the public happy. The president was seen as merely a type of civil servant. All other parts of the government were more important. For example, Congress, who controlled the federal budget, public issues, and legislation, allowed no type of interference from the president. Today the president is more of a leader, equip with more power than in the past. Today the United States Constitution states that there is a right to hold elections, but the methods and places are left up to the state. It also states that the elections of presidents and vice presidents are to be indirect, which means that they are chosen by electors whom are selected by the people-the Electoral College. There is more emphasis on what the people want and need. This is one result of a changing government and society. With these changes came changes in the way the presidential elections were seen and controlled and also the methods taken to achieve a victory. There are many differences in the presidential elections of the late 19th, early 20th century and with the elections of today, however there are similarities too. The major areas about presidential elections that are easily comparable are the areas of campaigning, debates, and issues. In the early years of the nation, men would be asked to take political office. These men were supposedly well known and their character and experience were expected to speak for themselves. As politics democratized in the 19th century, men began to ââ¬Å"runâ⬠for public office by promoting themselves through campaigning. This was true for all offices except the presidency. The public and press were opposed to presidential campaigning because it was a too dignified position for the candidates to embarrass themselves with personal salesmanship. People felt the president should be above partisanship. This way he would be able to act for the common good.
Wednesday, October 23, 2019
Daughters of Afghanistan
Afghanistan is a country where survival is a fight. Poverty, diseases, poor health care, and starvation is an everyday struggle in daily life. If you are an Afghan woman these issues are compounded by the fact that women are seen as being objects. Women are not worth as much as a man. Women in Afghanistan are seen as inferior. Women can be put to death for the slightest insinuation of an insult to a man. These are just a few of the issues that the women and girls of Afghanistan face every day. The sad fact of the matter is that a lot of the hate and violence comes from male family members. Honor killings are allowed in Afghanistan. A woman does not even have to do anything wrong to be killed. If there is any inclination that the woman has embarrassed her family, she can be killed. Women in Afghanistan are very rarely given medical treatment. There are so many obstacles that Afghan women face that the majority of women here in the United States cannot even imagine. I know I cannot imagine being set aside just because I could not bear a son or children. I do not want to even try to think of the violence that these women face if they show any sign of disrespect. Afghan women are seen as mindless broodmares. Not all men see them this way but the majority of the male population does. Many men say that their religion teaches that women are not as smart as men and those women should be meek and obey what their husbands and fathers tell them to do. In 2004 a Canadian journalist traveled to Afghanistan to learn about Afghan womenââ¬â¢s rights. The trip ended up being the base for her movie, Daughters of Afghanistan. In the movie journalist Sally Armstrong talks too many women. She listens to their stories of their bravery and courage. In September of 1996, the Taliban took over Afghanistan. The Taliban forced women into their homes. The Taliban would not even allow women to have health care or schooling. An Afghan woman could not even think of asking about birth control. Womenââ¬â¢sââ¬â¢ rights activists in Afghanistan look forward to the day that women can walk around outside without consequences. There are some places like in Kabul where this can be done. However, in the rural areas many of the old ways still have hold and women are not allowed to be out of their houses. In the rural areas animals are still seen to be worth more than a woman or girl. In Daughter of Afghanistan, one of the most important women in Afghanistan today are Dr. Sima Samar. Dr. Samar was born on February 4, 1957. After the fall of the Taliban, the Afghan government promised that life would get better for women and girls. Dr. Samar agreed to an arranged marriage so that she could go to college. In 1982, she received her degree from Kabul University. Shortly after Dr. Samar had started practicing, she she had to leave to save her life. She fled back to her home village. She practiced medicine there until 1984. In 1984 her husband and son were arrested. After the arrest Dr. Samar and her family fled to Pakistan. From 1984 until 2002 she lived as a refugee. In 2002 she decided to return to Afghanistan. Dr. Samar has built clinics and shelter for women and children in Afghanistan. She has also opened a school for women. Beside the schools and shelters Dr. Samar has also built clinics so that women and girls can receive medical treatment. After the fall of the Taliban, the government made a lot of empty promises. Dr Samir was made Deputy Prime Minister and Minster of Womenââ¬â¢s Affairs in the first government after the fall of the Taliban. Unfortunately, the Islamic fundamentalists came out. They made sure that she was seen as an enemy to the state, not someone that was trying to help . Because she was brave enough to question practices that had been taking place for many generations soon after the fundamentalists spoke up she started receiving death threats. Doctor Samar is just one of the million women and girls that suffer in Afghanistan each day. Another woman who has face issues is Hamida. Hamida is the principal of one of Dr. Samars high schools. Hamida also faces death threats for being brave enough to teach women how to do tasks like using a computer and how to drive, so that they can get jobs and support themselves. Women are treated like pawns in a game. A good example of this is a woman named Camellah. She is not allowed to say no to her husband when he wants sex. She is pregnant and doesnââ¬â¢t always feel like having sex. This baby will be her ninth baby. Camillah is afraid that she will not survive this childbirth. She is not allowed to even think of using birth control. Birth control in most of the culture is unthinkable. Dr. Samar is one of the women that is trying to change that view. Another girl in the movie is Lima. Lima is not even sure how old she is. She thinks that she is 13. She acts like a mother to her younger siblings. If it is hard for an older woman with children to survive, imagine how old it is for a child to try to raise other children under this type of repression. A fourth woman in the movie is Soghra. She is a widow and pregnant with her seventh child. She was brave enough to walk for nine nights to avoid the Taliban so that she could find shelter in Dr. Samarââ¬â¢s refuge. Her husband did turn out to be alive but they are very poor. Even though the Taliban has fallen, the Islamic fundamentalists have resurfaced in a bad way. If a woman walks on the street even wearing her burqah, she is insulted and given hateful, angry, looks. Some things have changed but a lot has not changed for women. Yes, now some women do go to school and receive medical care, for the majority of women and girls, unfortunately this is not the case. Women and girls are still forced to marry, they still have to obey their husbands, they cannot make their own decisions. They are still seen as less than human in their culture. Yes the Taliban has fallen and thanks to brave women like Dr. Samar some women and girls are getting an education. Unfortunately there are not enough shelters or safe places where women and girls may go in order to be safe. Safe from their own family. That is one of the most horrible things that I think goes on. Women cannot even feel safe with their husbands, fathers, uncles, or sometimes even brothers. The human rights disasters that took place under the Taliban were front page news. Now since the fall of the Taliban, the western world seems to have forgotten about these women and children of Afghanistan. They are the forgotten daughters of Afghanistan. Change may be slow to come to Afghanistan but as long as people like Dr. Samar and other women stand up, there is always hope. When a person has hope there always seems to be a way to make a better tomorrow. Change may be too late for some women but for Afghan daughters and granddaughters, they may be able to have a better life than what their mothers and grandmothers did.
Tuesday, October 22, 2019
Free Essays on Achemdiues
Greek mathematician who flourished in Sicily. He is generally considered to be the greatest mathematician of ancient times. Most of the facts about his life come from a biography about the Roman soldier Marcellus written by the Roman biographer Plutarch. Archimedes performed numerous geometric proofs using the rigid geometric formalism outlined by Euclid, excelling especially at computing areas and volumes using the method of exhaustion. He was especially proud of his discovery for finding the volume of a sphere, showing that it is two thirds the volume of the smallest cylinder that can contain it. At his request, the figure of a sphere and cylinder was engraved on his tombstone. In fact, it is often said that Archimedes would have invented calculus if the Greeks had only possessed a more tractable mathematical notation. By inscribing and circumscribing polygons on a circle, for instance, he was able to constrain the value of (pi ) between 3 10/71 and 3+1/7. Archimedes was also an outstanding engineer, formulating Archimedes' principle of buoyancy and the law of the lever. Legend has it that Archimedes discovered his principle of buoyancy, which states that the buoyancy force is equal to the weight of the liquid displaced, while taking a bath, upon which he is supposed to have run naked through the streets of Syracuse shouting "Eureka!" (I have found it). Archimedes is also purported to have invented the Archimedean screw. Some of Archimedes's geometric proofs were actually motivated by mechanical arguments which led him to the correct answer. During the Roman siege of Syracuse, he is said to have single-handedly defended the city by constructing lenses to focus the Sun's light on Roman ships and huge cranes to turn them upside down. When the Romans finally broke the siege, Archimedes was killed by a Roman soldier after snapping at him "Don't disturb my circles," a reference to a geometric figure he had outlined... Free Essays on Achemdiues Free Essays on Achemdiues Greek mathematician who flourished in Sicily. He is generally considered to be the greatest mathematician of ancient times. Most of the facts about his life come from a biography about the Roman soldier Marcellus written by the Roman biographer Plutarch. Archimedes performed numerous geometric proofs using the rigid geometric formalism outlined by Euclid, excelling especially at computing areas and volumes using the method of exhaustion. He was especially proud of his discovery for finding the volume of a sphere, showing that it is two thirds the volume of the smallest cylinder that can contain it. At his request, the figure of a sphere and cylinder was engraved on his tombstone. In fact, it is often said that Archimedes would have invented calculus if the Greeks had only possessed a more tractable mathematical notation. By inscribing and circumscribing polygons on a circle, for instance, he was able to constrain the value of (pi ) between 3 10/71 and 3+1/7. Archimedes was also an outstanding engineer, formulating Archimedes' principle of buoyancy and the law of the lever. Legend has it that Archimedes discovered his principle of buoyancy, which states that the buoyancy force is equal to the weight of the liquid displaced, while taking a bath, upon which he is supposed to have run naked through the streets of Syracuse shouting "Eureka!" (I have found it). Archimedes is also purported to have invented the Archimedean screw. Some of Archimedes's geometric proofs were actually motivated by mechanical arguments which led him to the correct answer. During the Roman siege of Syracuse, he is said to have single-handedly defended the city by constructing lenses to focus the Sun's light on Roman ships and huge cranes to turn them upside down. When the Romans finally broke the siege, Archimedes was killed by a Roman soldier after snapping at him "Don't disturb my circles," a reference to a geometric figure he had outlined...
Monday, October 21, 2019
7 Steps to Quitting Your Job with Style and Class
7 Steps to Quitting Your Job with Style and Class At some point, youââ¬â¢re going to need to write a resignation letter. Maybe you have to quit because this toxic job is driving you insane, and youââ¬â¢re leaving to teach yoga in Antarctica. Maybe you got a great new job- yay! Or maybe your political scandal is about to hit TMZ, and you need to find a way to say youââ¬â¢re sorry and leaving to spend more time with your family. Whatever the circumstances, a good resignation letter is pretty similar across the board. Here are six basic steps to follow when itââ¬â¢s time to say goodbyeà so you can make sure youââ¬â¢re quiting your job with style and class.1. Be positive that this is what you want.If you have a new gig lined up, thatââ¬â¢s pretty definitive. But if you donââ¬â¢t, make sure youââ¬â¢re not doing this as a passing whim. There are no backsies once you put something in writing. And even if you manage to say ââ¬Å"just kiddingâ⬠and rescind your resignation, thatââ¬â¢s not going to create mu ch trust or goodwill among the powers that be.2. If possible, give your boss a heads up.A quick meeting to let him or her know that youââ¬â¢re leaving is a nice courtesy. It can help ease the cold, hard facts in the email or letter to follow. It can also make your transition out easier, if he or she feels looped in and not blindsided by the news. After all, this person is one of the people most likely to be directly impacted by your leaving.3. Pick your format.Some companies might require a formal paper letter. Others might not have any specific rules- in which case an email to your boss is probably fine. Do a little due diligence with HR before you drop the official note.4. Hit all the necessary paper trail points.Your resignation letter should include a statement of the facts surrounding your departure, but only the ones that pertain directly to your job ending.Iââ¬â¢m leaving the company. (The reason is not necessary to include.)I will be leaving on X date. (Check your comp anyââ¬â¢s policy to see if thereââ¬â¢s minimum notice you need to give.)I will be available to help with the transition until that date.5. Check to make sure the tone is neutral.Donââ¬â¢t talk about how excited you are about your new job, or how much you hated your current job by the end. This letter is not a place for venting, bus-throwing, or grudge-ing. It wouldnââ¬â¢t hurt to show mild regret that youââ¬â¢re leaving, even if that part is ever so slightly disingenuous.6. Proofread it.This is going to be part of your official record with the company, so make sure the information is accurate, especially the end date.7. Thank your boss for the opportunity youââ¬â¢ve had.If youââ¬â¢re unhappy, squash the urge to be snarky. Once upon a time, this job WAS an exciting opportunity, and regardless of why youââ¬â¢re moving on, you did get experience and knowledge along the way.At this point, youââ¬â¢re ready to send it and start your goodbye tour with a clear con science.
Subscribe to:
Comments (Atom)