Friday, November 29, 2019

Cold War Essays (1323 words) - Eastern Bloc, Anti-Revisionists

Cold War The Cold War With the aim of preventing East Germans from seeking asylum in the West, the East German government in 1961 began constructing a system of concrete and barbed-wire barriers between East and West Berlin. This Berlin Wall endured for nearly thirty years, a symbol not only of the division of Germany but of the larger conflict between the Communist and non-Communist worlds. The Wall ceased to be a barrier when East Germany ended restrictions on emigration in November 1989. The Wall was largely dismantled in the year preceding the reunification of Germany. The victorious Allies agreed to give most of Eastern Germany to Poland and the USSR, and then divide the rest into four zones of occupation. However, they could not agree of whether or how to reunite the four zones. As Cold War tensions grew, stimulated in part by the German situation itself, the temporary dividing line between the Soviet zone in the East and the British, French, and U.S. zones in the West hardened into a permanent boundary. In 1949, shortly after the Western powers permitted their zones to unite and restore parliamentary democracy in the Federal Republic of Germany, the Russians installed a puppet regime of German Communists in the East, creating the German Democratic Re-public.(Niewyk, 1995) According to Galante (1965, p.vii) a city is the people who live in it. Berlin is 3,350,000 people in twenty boroughs. A rich city of factories, an airy city of farms and parks and woods and lakes?On Sunday, August 13, 1961 Herr Walter Ulbricht stopped that. He built the Wall. One reason for the building of the Wall was due to the more than fifty-two thousand East Berliners who crossed the border everyday to work in West Berlin. These people were referred to as the grenzgaenger or border crossers. East Berliners said the grenzgaenger were parasite who should stay and work on the East side of the boundary, for the benefit of Communism and the prosperity of the German Democratic Republic.(Galante, p.3) Gelb (1986, p.3) states, Berlin was where the Cold War began with a Soviet blockade, where Soviet and American tanks faced each other virtually snout-to-snout for the first time, and where the grisly game of nuclear brinkmanship was introduced. The Wall was constructed of concrete and steel and barbed wire. It was 28 miles long, if straightened it would measure 103 miles long, dividing on of the greatest cities in the world. On side was painted white and one side was covered with graffiti. But there is more to the Wall than just this wall. Behind it, one hundred yards deeper into Communist territory, is another concrete barrier almost as formidable. The leveled area between the two is a desolate, dangerous no-man's-land, patrolled by kalashnikov-toting guards, dotted with free-fire machine-gun emplacements, and sown in places with landmines. It is punctuated with 285 elevated watchtowers, more suited to prison camps than city centers, and by a series of dog runs where ferocious, long leashed Alsatians effectively run free. It is not a safe place to be.(Gelb, p.4) Approximately 5000 people managed to escape to the West, 80 died trying. There is no known record of anyone trying to escape in the other direction. The poor quali ty and construction is a result both of the speed with which the first sections were erected and the fact that no foundation was prepared.(Galante, p.8) On August 13, 1961, East German troops began stretching coils of barbed wire across the border checkpoints between East and West Berlin, inhibiting free transit between the two sectors as guaranteed under the Four-Power Pact that governed the city. Within days the wire was replaced by 28 miles of compressed rubble, and now the historic Berlin Wall became a hideous symbol of the economic and political schism in Germany.(Cate, preface) For 28 years the Berlin Wall kept people in, and kept people out. It separated friend and family. It divided a nation, a continent, a world. The story of seventeen-year-old Ursula Heinemann who still had not recovered from the shock of being separated from her mother. Although she was certain that she had done the right thing in escaping to the West, she was nagged by a

Monday, November 25, 2019

buy custom Bioinformatics and Biomedicine Workshops essay

buy custom Bioinformatics and Biomedicine Workshops essay This is a technique that is used in the conducting of very highly sensitive experiments that are biological in nature such as in detection of DNA, or in micro array experiments. The micro array technique is a very sensitive analytical procedure that can be used to analyze multiple illnesses. The only problems with this experimental techniques is that they are expensive, involve a very large number of samples which are complex and very difficult to analyze. These genes are the ones that are referred to as the biomarkers. These genes are identified in studies through the micro array technique. The procedure that leads to the identification of these genes is by a process of continuous characterization of cells especially in the presence of cancer. This has been used in the enhancement of the disease diagnosis and prognosis potential. The micro array technique has the following shortcomings, the number of the genes is highly dimensional and they indicate and show a scarce number of replicates. This study is highly variable across the replicates, the data that is found in micro array technique is never homogeneous and therefore requires normalizing and most of the data is normally non -linearly. This makes it very hard to study using the micro array technique. In order for this to be overcome, the data will have to following strategy: First; the microarray experiment will have to be done at two levels, in a healthy individual and in a patient with characteristic of cancer. Secondly, each gene is to be represented with multiple performance measures where the genes are represented with a value usually a value (P). Thirdly, a statistical data envelopment strategy is used. This finds the complex envelop of particular data set consistently. This eliminates the need for the manual manipulation of information. This is an application of linear programming where linearity is an important application. Next, the genes are selected in a series of frontiers, in this techniques, several layer of genes are selected containing a variable number of genes. This is found through the variation of the p-value. The candidates selected in this mode are named as efficient genes. The other step will involve the generation of an experimentation design that will var y the efficient genes, this is used to dictate the value of interest between the values zero (0) and (1). At every step, the performance value is determined is determined with a linear discriminant analysis which sets the classification performance. This is then fitted in a first order linear regression model; this expresses the direct relation between the performance values to the efficient genes which is set as an independent variable. Finally, the integer linear regression programming is applied to help make a choice of the potential biomarker that will be able to maximize the classification performance for the diagnosis of the specified disease condition. This is the process that is referred the as the consistent detection of potential biomarkers with linear models. Buy custom Bioinformatics and Biomedicine Workshops essay

Thursday, November 21, 2019

The correlation between organisational culture and security Essay

The correlation between organisational culture and security - Essay Example The extent to which organisational culture determines nature and perceptions of the security environment is both of practical relevance and theoretical interest. A highly typical scenario exists when choices about security have to be made by the management as an opportunity cost principle (Fennelly, 2003, p.364). The primacy and immediacy of such choices lie in the fleeting background of real and perceived threat perceptions by the organisation. Thus organisational culture converges on the logical premise that hidden threats to its own existence could be physical and real or/and perceived and unreal. The extent to which these conceptualisations will determine the response of the organisation depends on the organisational culture. When organisational culture is based on "a set of shared values and beliefs among a community or people", then perceptions about security and threats become more formidable because such perceptions acquire a larger dimension in the organisational context, including a costs versus benefits evaluation (MacCrie, 2007, p.230). Above all organisational culture is a theoretical construct with implications for the security of the organisation beyond the definable limits.Organisational culture presupposes a pattern of behavioural tendencies on the part of both internal and external stakeholders (Driskill and Brenton, 2005, p.12). Mutually beneficial behaviours and a system of corresponding rights and obligations presume that the organisation progresses through a complex network of sub-cultures that seamlessly integrate into a value-centric system. Internal and external relationships that exist at each level and layer, are presumably influenced by the quality and quantum of communications. This in turn has an impact on the organisation's security perceptions. An analogous situation exists in group relations where groups of individuals bound by their own internal rules, rights and obligations will still seek to establish contacts with others. At the individual organisational level this behaviour is subject to a renewed concern for security and an ever increasing awareness of threats. As Schein puts it, "Culture is an abstraction, yet the forces that are created in social and organisational situations that derive from culture are powerful" (Schein, 2004, p.3). Mullins, on the other hand, states that an organisation pursues its goals based on an underlying ideology or philosophy, based on beliefs, values and attitudes. Within the organisation, culture is a pervasive influence over people's behaviour and actions, and reflects in the performance of work - what is not acceptable and what behaviours and actions are encouraged and discouraged. It can also include traditions, values, beliefs and attitudes (Mullins, 2007, p.531). Mullins places emphasis on the objectivity of culture influence and also attributes some ideological characteristics to it. Finally organisational goals,

Wednesday, November 20, 2019

How do Robinson Crusoe's reactions to various characters or groups Essay

How do Robinson Crusoe's reactions to various characters or groups throughout the novel explain European attitudes - Essay Example The venturing personality of Robinson Crusoe depicts Europeans’ great desire in to adventure the globe and thus bring the corresponding expansion which is not easy to achieve in civilized society like America. Thus as a result Crusoe turns out to be violent and engaged in attacks in order to achieve his desires. This illustrates the Europeans colonization of the Americans so that they can enforce their policies on them despite their civilization. Moreover, Crusoe slowly learns to assert himself to people in a land where he does not belong and becomes more assertive to an extent of attacking traders. This shows the Europeans colonization when they would assert their policies in other countries and remain authoritative than the natives. In the novel Defoe presents Crusoe at first as a violent person which boosts his exploration as well as development. This character portrays the violent attitude of the Europeans towards their colonies in the native America and in Africa. Crusoe goes against his parents’ advice of not going to the sea hence this shows how violent and determined he is just like the Europeans in the colonies. Crusoe’s inhuman and violent character towards African slaves shows how the Europeans were pessimistic of African people and how they were contempt about them. He engages in slave trade which shows how Europeans are inhuman towards Africans. The immoral nature of Robinson is also of concern in this novel as suggested by Defoe and Chalmers . For instance he and his friend Friday they attack the feasting cannibals. This in particular depicts the Europeans as immoral people who do not value the well being of other people especially the Africans. The fact that Crusoe sold Xury, one of hi s best friends, portrays him as a betrayer. This is a reflection of how Europe treated other countries by inventing them and takes control of everything. For instance in Africa, the Europeans would take away their land and use the land owners as their own slaves. Crusoe’s belief in his personal superiority over the slaves and this illustrates the Europeans superiority over their colonies. The European countries considered themselves as superior than any other country in the native America, America and in Africa hence the colonization. Robinson Crusoe’s strong belief in Christianity is portrayed by his ability to remain a protestant despite living a state dominated by catholic. This is reflective of the Europeans’ spread of Christianity in most parts of the world including African and American states. The Europeans viewed people from these countries as far from God and that they engaged in unchristian life and that is why they were suffering. This is further illu strated by Robinson’s action of converting Friday to Christianity. Thus the novel portrays the rules of claims of the aspect of the relation between Christianity and England. Robinson’s hardworking trait is portrayed in this novel in various ways which also reflect the attitude of Europeans towards other countries. For instance Robinson never gave a second thought to any business venture. This is reflecti

Monday, November 18, 2019

Secon Hand Smoking Research Paper Example | Topics and Well Written Essays - 1250 words

Secon Hand Smoking - Research Paper Example 1). Due to the dangers of being exposed to secondhand smoke, one agrues that secondhand smoke should be banned in all public places through ordinances and stricter governmental policies. Statistics Some of the most alarming information gathered on SHS, as revealed by the World Health Organization (WHO) are as follows: that (1) â€Å"SHS causes 600 000 premature deaths per year. There are more than 4000 chemicals in tobacco smoke, of which at least 250 are known to be harmful and more than 50 are known to cause cancer† (WHO: Fact 3, n.d., p. 1); (2) â€Å"more than 94% of people are unprotected by smoke-free laws. However, in 2008 the number of people protected from second-hand smoke by such laws increased by 74% to 362 million from 208 million in 2007. Of the 100 most populous cities, 22 are smoke-free† (WHO: Fact 9, n.d., p. 1). These figures prove that government health agencies have acknowledged the detrimental effects to health of SHS and are designing and implement ing various monitoring measures to validate, confirm, and address the dilemma. The segment of the population who were identified to be most at risk are children who were noted to eventually develop different health dilemmas, ranging from pneumonia, bronchitis, asthma, and even ear infections (CDC, 2012). For adults who were persistently exposed to SHS, studies have revealed preponderance to lung cancer and heart ailments (CDC, 2012). The study published by the CDC, entitled â€Å"Vital Signs: Nonsmokers' Exposure to Secondhand Smoke --- United States, 1999—2008† confirmed the followign statistics related to SHS, to wit: â€Å"An estimated 88 million nonsmokers in the United States were exposed to secondhand smoke in 2007–2008. Children are at particular risk for exposure to secondhand smoke: 53.6% of young children (aged 3–11 years) were exposed to secondhand smoke in 2007–2008. While only 5.4% of adult nonsmokers in the United States lived with s omeone who smoked inside their home, 18.2% of children (aged 3–11 years) lived with someone who smoked inside their home in 2007–2008† (CDC, 2010, p. 1). These varied statistical information affirm that SHS is clearly linked to illnesses, both for children and adults, alike. Likewise, since the figures and trends continue to alarm health authorities, there seems to be a crucial need to re-assess current health ordinances to at least minimize the risks of contracting the identified illnesses. Effects of SHS The effects of SHS on health of children and adults, alike, have been confirmed from various studies for being exposed in SHS (CDC, 2012). The most pronounced health dilemma of SHS is the increased risks to contract various forms of cancer, such as lung cancer, and â€Å"childhood leukemia and cancers of the larynx (voice box), pharynx (throat), brain, bladder, rectum, stomach, and breast† (ACS: Why is SHS a problem, 2013, par. 3), making SHS a health co ncern of government health agencies. The exacerbating factor is that since children and adults who were exposed to SHS could not control the source of the problem, preventing and minimizing its debiliating impact proved to be extremely challenging. More pronounced focus and strategical efforts exerted by government health agencies to address SHS means more time, money and resources being expended

Saturday, November 16, 2019

Building Management System Bms Server Software Computer Science Essay

Building Management System Bms Server Software Computer Science Essay As we known BMS are created to controlled central computer method which has 3 basis functions, which is controlling, monitoring and also optimizing. However, there is a BMS server software to facilitate the works of facilities management which to functioning within the building and also to fulfill the building operation and maintenance. General Requirement The BMS server system is composed of 3 sets of reducant computers, which communicate with several kinds of input or output devices, subordinate computer system and higher order computer systems. The sections described the software required to achieve the desired functionality of the BMS. The software design is based upon real time data acquisitions and control capability. Data including point values, parameters, messages, instructions, databases access statements, master clock synchronization and other forms of computers data exchange may originates from or be destined for other sub-system and computers and database which may form pat of TAMS. It is responsibility of the BMS Sub-System Contractor to develop, test, document and debug software interface routines and supporting hardware to accomplish the interface requirement of BMS to TAMS and any other system or sub-system with which the BMS is required to communicate. The BMS Sub-System Contractor will provide software for the BMS Sub-System, which is proven in actual field installation of a similar size and scope. The BMS Sub-System Contractor will provide complete information and responses with tenders including reference sites, name, and telephone number of reference site contracts. Software Licensing KLIAB respects the propriety nature of certain software. Commercially available software purchased from a third party such as Microsoft Windows, UNIX, OS/2 and similar software packages are provided. Licenses are bound with the operation and maintenance manuals for BMS system. BMS manufacturers proprietary software is provided fully licensed. All BMS manufacturers proprietary software will have complete sources codes, programs listings and supporting information deposited in an escrow account at the BMS Sub-System Contractors expense. BMS Server Software Operating System The BMS server computers will utilize a multi-user, multi tasking operating system designed for client server operations. The operating system will support all the required software functions and application described in the BMS specifications. Standard services supported by Operating System on serves will include the following: Multi- tasking Multi- user support POSIX 1003, 1 compliance TCP/IP, SLIP Network Support Network File System (NFS) C language complier The BMS Sub-System Contractor will provide to the SMC one complete set of operating system user manuals and programmers references manuals bound as part of each BMS Operation and Maintenance Manual. BMS Software Executive The BMS Sub-System Contractor shall provide a complete BMS software executive module which provides at minimum: Workstation communication sport Printer quering and tasking I/O Channel support for up to 99 communication channel Disk optimization routines On-line database backup and restoration Memory management functions Software watchdog functions Networking functions Housekeeping functions Diagnostic routines Server Redundancy Software The BMS Sub-System Contractor will provide six complete server computers arranged as three sets of redundant hot standby server system. Each server computer are equipped with all hardware and software with complete capability to support the designated BMS tasks. Each server will coexist on the BMS network and are able to automatically assume full operation of BMS without any loss of data, alarm, or status information. The redundancy software provides full databases charges made to the primary server are propagated to the backup server without any operator intervention. Changeovers from primary to backup server are accomplished within 10seconds, whether manually initialed or automatically initialed. Detection of any server software execution failure will cause the automatic transfer of all server functions to the backup server and will initiate a primary server failure alarm. These alarm are distributed a BMS Alarm Handling Software specifications. These sewer failure alarms are classified at the highest priority level. The BMS Sub-System Contractor will provide a hardware or software switch to allow the user selection of which server computer is the primary server, and which is the backup server. Such selections are made freely and at any time during the normal operations of the BMS Server System. It is possible at any time to completely remove one of the server computers for repair, maintenance or other need without disrupting normal BMS operations. BMS workstations will automatically switch the user interface and TCP/IP address to the server in control of the BMS, without operator intervention. Alarm Handling Software Complete Alarm Handling Software modules are provided in the BMS server software package. The alarm handling software will provide comprehensive alarm detection and management facilities to allow fast and accurate notification to the BMS of abnormal point values or conditions. Alarm Attribute Table Each and every BMS point capable of alarm will have alarm attribute assigned in an alarm attribute table. The alarm attribute table will govern the way and means by which the point alarm is reported by the BMS. The alarm attribute table are on-line definable and changeable by an authorized BMS user. Each point defined in the Alarm Attribute Table will, upon change of state, read the table and be acted upon accordingly. For each point the following attribute are definable: Print alarm/ inhibit printing Printers assigned to print point alarm Print alarm only Print all point events Workstation assigned to display alarm Alarm class 1-4 (normal, urgent, low, journal) Alarm priority 1-9 (9 priorities within each class) Unanswered Alarm Software If dedicated BMS workstation is been assigned to receive an alarm, each incoming alarm will start a software timer who starts upon alarm generations and ends upon alarm acknowledgement. If an alarm is not acknowledge within a user defined number of seconds, an unanswered alarm are automatically generates and displayed at the EOC monitoring room BMS workstations, whether or not the EOC monitoring room workstation were assigned to receive the original acknowledge alarm. The unanswered alarm events are recorded as a transaction in the historical transaction database file. Conclusion These software were helped the facilities management functioning within the building by utilizing Building Management System to fulfill the building operation and maintenance. It is also helped to ease of information availability problem diagnostics and helped computerized maintenance scheduling. However, this software was maintained effective use of maintenance staff and it is give more satisfied an occupants.

Wednesday, November 13, 2019

Shramik Bharti Essay --

Sharmik Bharti is a nonprofit organization registered on the 15th of Oct. 1986, under Societies Registration Act of 1860. It is situated in Vikas Nagar of Lakhanpur, Kanpur and works for both urban and rural communities. It believes in building a true democratic society. Eradication of poverty, empowerment of women, welfare of children and community’s capacity building are its main goals. The organization now has more than 90 full time professionals and 150 community based volunteers striving hard for the betterment of 125 slums and 11 blocks of Kanpur and Dehat districts of Kanpur. The early years of its inception were very genuinely spent in identifying the problems of the community and their root causes. Right from 1986, the organization was working along with the people and for the people to better understand their priorities and the needs of the community. Based on these findings, there emerged Self Help Groups for the empowerment of people. These groups became one of the core strengths of Shramik Bharti and worked for the slums of both rural and urban areas of Kanpur. Importance was given to the creation of sanitation infrastructure and the introduction of health care facilities in these areas. From then onwards, there is no look back for Shramik Bharati. It had taken up many useful activities for the betterment of the people and the community. To cite a few, reclamation of waste land for generation of livelihood, establishing partnerships with support organizations to cater to the needs of the society, respecting people’s choices and assisting them to improve upon those areas etc. To achieve their objectives and goals Shramik Bharti focuses on three core areas... ... This program of the Shramik Bharti is the charity based and is supported by Helpage. Under this project, till now more than 51 senior citizens who don’t have proper livelihood and shelter are taken care of. Shramik Bharti appointed a five member committee to support such people and fulfill their basic day today needs. Grassroot Democracy: Our country is still facing certain socio economic challenges. To overcome these, community based organizations need to go hand in hand with the public organizations both at rural and urban levels. Shramik Bharti strongly believes in this principle and working hard to attend the challenges at grass root level. Thus, Shramik Bharti as a nonprofit, nongovernmental organization is striving hard to build a strong community where there are no traces of poverty and women are empowered to handle their own lives with immense confidence.

Monday, November 11, 2019

Jackie Brown: One Worth Betting on

Isaac Rexford ENG 1102M Spenser Simrill Jackie Brown: One Worth Betting On The film Jackie Brown begins with a predominant focus on Jackie herself, one of the film's main characters by a panning shot following Jackie in the first scene. Jackie's initial focus is very much related to the film's plot. As the plot develops, Jackie finds herself in the center of a situation where a guns sells man (Ordell) refuses to let Jackie run her mouth to the authorities, while the authorities already know all about Ordell's business and simply want a name from Jackie due to the fact they have been unable to arrest Ordell due to his unknown identity.But getting just a name is not that simple; and, Jackie's no fool. She hatches an intricate plot of her own not only to protect herself from the authorities and prevent future incarceration, but in order to steal Ordell's $500 thousand fortune. In a surprising turn of events, Jackie's ability to negotiate and get what is in her favor really demonstrates the power Jackie has invested in herself to get what she wants. Jackie's Trouble From The Start From the start the audience is made aware that Jackie had it in with Ordell the first time she is confronted by two detectives, Nicolet and Dargus.They take her in for questioning like normal, already having some knowledge of Ordell, but all they want from Jackie is a name. The camera itself emphasizes the scene with an array of close-ups of Jackie and the two detectives as they carry on this conversation in this first scene. The two parties, Jackie and the detectives, are battling back and forth; Jackie resisting their every attempt to seize information from her. This unfortunate meeting leads Jackie to meet a fellow named Max, who assists her in her real goal: getting Ordell's fortune.But for now she is happy to get the detectives off her back and on to her next problem: Ordell. The time finally arrives and one evening after a meeting with Max Jackie comes into a confrontation with Orde ll. Like stated earlier, Jackie is no fool and picked up a pistol from Max, if my suspicion’s correct, in case the conversation between her and Ordell became a little heated. In the confrontation the lights are off and the audience is not able to see a single thing; but the conversation between the two continues loud and clear. Jackie's Power Jackie's first show of power is shown in the scene where Ordell comes to â€Å"visit. Jackie had caught on that Ordell was the one who murdered Beaumont so she steals a pistol from Max. Above, a closeup is shown of Max just realizing his pistol had been taken. It is confirmed he knew it was Jackie at the time as he shows up knocking on her door the next day. This screen shot shows the true power of Jackie, that she is willing to do anything to get what she wants. In the split image, Jackie is seen in the darkness with Ordell's hand around her throat. At that moment she presses a gun steadily against Ordell's penis, as he says â€Å"It feels like a gun pressed against my dick. Later in the scene Jackie essentially interrogates Ordell, with a gun pointed to his face the entire time. The image above displays the transition of power between Jackie and Ordell, in this case Jackie stripping Ordell of his. Jackie continues to keep the gun pointed to Ordell as she, by change of plan, questions him instead. As it plays out, Ordell is now the one with a gun pointed to his dome and his hands up high in defense. Jackie astonishingly creates a turn of events from this scene alone; she essentially takes the authority from Ordell and places it in her own hands to aid in her own plot: getting Ordell's money.Jackie's methods of achieving this, however were the most cunning and sneaky among the best. Jackie really lures Ordell into a trap and uses the element of surprise to sneak the gun on him; at the time speaking with a soft voice, alleviating Ordell of all his suspicion so that he would come close to Jackie thinking she wasn't a threat; as it is shown he was terribly mistaken! As shown in the image above, Jackie sits with her feet facing away from Ordell and closed, with the gun in her hand, resting on her knees and the gun pointed straight ahead at Ordell.In conclusion, Jackie's persona is demonstrated very well in the character. Jackie really does serve as an example of a hard working black woman who's just trying to live comfortably in society. Furthermore, the film itself really helps the audience notice these facts, with its use of closeups and panning during eventful scenes in the film. Regarding this one select scene as the most important, the movie itself shows a transition of power and authority from the main characters who first held the authority like Ordell and Lewis for example, to characters like Jackie who hold the power up towards the end.

Saturday, November 9, 2019

The Lingual Theory A Hybrid of Semiotics and Stand Point Theories of Analyzing Films

The Lingual Theory A Hybrid of Semiotics and Stand Point Theories of Analyzing Films The media is an avenue through which occurrences taking place in a society are communicated to the audience. Such communication is usually guided by specific frameworks meant to deliver information in a certain manner. Colombo (2004) points out that film and other forms of mass communication ascribe to particular theoretical frameworks to deliver their message to the target audience.Advertising We will write a custom research paper sample on The Lingual Theory: A Hybrid of Semiotics and Stand Point Theories of Analyzing Films specifically for you for only $16.05 $11/page Learn More However, some of the theories used in this field have been overtaken by events, rendering them irrelevant in contemporary society. As such, it is incumbent upon the stakeholders to come up with new theoretical frameworks that respond to the evolving needs in these changing times. In the current paper, the author seeks to develop a new theory of communication with regards to film. Colombo (2004) points out that generation of new theories is made possible by building upon existing models. To this end, the author of this paper relies on the semiotics and standpoint theories to come up with a new structure of communication. The utilization of these two theories in the field of film generation and distribution is critically examined in this essay. Such assessment helps the author to come up with a hybrid theory whose concepts build on the weaknesses of the other two. The applicability of the new theoretical model, dubbed the lingual theory, will be tested against a real life scenario in contemporary media. The Semiotics Theory of Communication The theoretical structure is developed from the study of signs and their related processes and applications in communication. According to Friedman and Thellefsen (2011), the theory is closely related to the linguistic model of analyzing the structure of a particular language. The model helps to determine the meaning of the various languages used in communication. Friedman and Thellefsen (2011) add that the theory of semiotics builds on linguistic studies. To this effect, it makes use of sign systems that are not themselves linguistic in nature. In a bid to illustrate the components of the semiotics model of communication, Friedman and Thellefsen (2011) point out that signs form the backbone of the theory. Friedman and Thellefsen argue that the theoretical framework is applied in a wide array of platforms in the communication and media arena. For example, Friedman and Thellefsen (2011) are of the opinion that the theory is used in the fashion and the science fiction movie industries. The developers of this framework suggest that human beings are naturally animals. Friedman and Thellefsen (2011) add that, due to their animalistic nature, humans have the ability to develop and interpret signs. It is this development and interpretation of symbols that forms the basis of the semiotics theory.Advertising Looking for research paper on communications media? Let's see if we can help you! Get your first paper with 15% OFF Learn More In analyzing this theory, Li (2011) posits that there are three main branches that give it its meanings. The first is the branch that focuses on the semantics of the language. Here, the meaning of the signs used in communication is deciphered. In addition, the theory looks at the structural relations between the given signs. It is these relations that Li (2011) refers to as the semantics. Finally, the model has a pragmatic component to it. The element helps to determine the relationship between the sign using agents and the signs developed. In other words, it identifies the language in relation to the user. The theory is widely used in communication given that language and linguistics are major components of this phenomenon. In such cases, the signs are developed to form some kind of code. Such codes represent a particular element of the society (Alsina Jimenez, 2010). An example of its application is found in the imagery used to depict a specific phenomenon in the society through the media. Alsina and Jimenez (2010) hold that advertisements and films make use of sexual allure to pass across their message to the target audience. In this case, the symbol of a woman is mostly used. The need to develop this theory stems from the two of the assumptions that are made. Friedman and Thellefsen (2011) point out that the model assumes that cultures are formed through language. Consequently, the use of a language that appears to be private creates an atmosphere of unfairness. Another supposition is made with regards to speech in the society. The theory presupposes that all individuals have the ability to communicate in more than one ‘speech community’ (Colombo, 2004, p. 44). The two assumptions are evidently in conflict with each other. As a result, a need arises to generate a blend between the two (Friedman Thellefsen, 2011). The model insists that everybody can participate in the various speech communities. As a result, the theory implies that all cultures have a similar signage in their languages (Friedman Thellefsen, 2011).Advertising We will write a custom research paper sample on The Lingual Theory: A Hybrid of Semiotics and Stand Point Theories of Analyzing Films specifically for you for only $16.05 $11/page Learn More Such an assumption is not entirely true. An example of the erroneous nature of such a supposition can be seen in the generational gap between people. For instance, there was a time when certain depictions that are not in use today were accepted in the media. Alsina and Jimenez (2010) make a case for feminism and how its acceptance varies depending on one’s age group. The generation that lived in the fifties accepted the image of a submissive woman in the media. The same is unacceptable in today’s society (Friedman Thellef sen, 2011). To the female watching a 50s film today, an image of a woman working out in the kitchen appears like a foreign language. Such are the reasons why the theory needs to be changed since imagery is viewed as a private language to people of different speech communities. Standpoint Theory of Communication In modern society, there exist various forms of communication which are inter-subjective in nature. The standpoint theory is a framework developed to analyze discourses of this form (Anderson Baym, 2004, p. 589). The theoretical model is of the view that people’s opinions are formed by their knowledge. As a result, the opinions vary depending on the levels of knowledge among different individuals. The perspectives of the audience in relation to a particular subject matter are based or informed by their past experiences. Anderson and Baym (2004) provide a working definition of the standpoint concept to illustrate this model. Anderson and Baym (2004) conceptualize the c oncept as a specific location from where an individual looks at their society. The standpoint model of communication focuses on a number of issues. The elements addressed include gender, race, and social class (Anderson Baym, 2004). An example of the use of this theory is evident in the way one perceives a person from the African American community. The media depictions of the said racial group’s association with crime support the biased nature of such individual perceptions. A similar situation is seen among the Hispanic community. However, a change in their social class may lead to variations in the perceptions accorded the individuals. The theory is synonymous with feminism in mass communication (Anderson Baym, 2004). Like any other social science model, the standpoint theory makes a number of assumptions. In their research, Buzzanell (2003) affirms that the standpoint model of communication is feminist in nature. The same stems from the assumption that social relations are understood on the basis of societal classes (Buzzanell, 2003). In addition, the theory postulates that the elite members of a society lord their opinions on their inferiors. The upper classes suppress the opinions and welfare of persons in the lower echelons of the social ladder. The view further assumes that the ‘standpoints’ of the social elite rank higher than those of persons from the lower cadres.Advertising Looking for research paper on communications media? Let's see if we can help you! Get your first paper with 15% OFF Learn More The assumptions made by the standpoint theory fuel the sentiments of those opposed to it. The critics argue that it focuses on the marginalized groups in the society, leaving out the others. According to Intemann (2010), the conceptual framework is applied in instances where there is a need to illustrate marginalization in the community. The most common example of the application of this theory is in the analysis of the issue of slavery. At the time of the slave trade, the Africans sold to slavery were believed to be from an inferior school of thought. Consequently, films created in this field tend to depict persons of African origins as inferior to the Caucasians (Intemann, 2010). In the modern times, feminism appears to be the most common channel through which the standpoint theory conveys information to the general public (Buzzanell, 2003). An example of this application is made apparent in the African context where radio is used by women to highlight their sufferings in the soci ety. Such is a biased perspective given the fact that it is discriminatory to use the radio to address the issues related to women along. Buzzanell (2003) points out that mass media exhibit feminism by depicting women as inferior to men. Intemann (2010) points out that the internet age has made information accessible to many people. As a result, the class and gender biases associated with this theory are increasingly becoming irrelevant, necessitating a new framework. The standpoint model attempts to build on previous theories by insisting that experience is not necessary in formulating perceptions about a group of people. However, by creating class and gender biases, the theory appears to erect hurdles with regards to information access. As a result, it is important to develop a better framework to reduce this bias. The Need for a New Theory of Communication Anderson and Boym (2004) posit that communication should be beneficial to the audience targeted. The said benefit can be real ized through elimination of biases. Effective communication makes use of coded language in a bid to discriminate against or pour contempt on another group of people. The two theories discussed above fail to meet the high threshold of fairness. Based on this, the need to develop an effective communication framework requires the advancement of a new theory. The shortcomings of the two theories above are grounds enough for the formulation of a new theoretical framework. The author of this essay responds to this need by developing a hybrid theoretical concept. According to Anderson and Boym (2004), communication philosophy should evolve with time. Hybridization of existing theories is a way through which this evolution is realized. The New Lingual Theory of Communication Termed the lingual theory, the new framework borrows various concepts from the two theories discussed above. According to Mejias (2001), communication is a dynamic social behavior. It follows that the frameworks through which information is communicated to the masses must respond to these dynamics. In line with this, the lingual theory attempts to introduce dynamism to the semiotics and standpoint theories. In essence, the new model brings together the two ‘antique’ frameworks and builds on their weaknesses. The underlying principle of this new framework is the language factor. Wright (2001) argues that communication should develop in tandem with the changes taking place in the language sector. The changes are usually in the semantics and the demographic perceptions associated with particular languages. In such cases, the semiotics theory addresses the issue through the signage concept. On its part, the standpoint theory donates its concepts on knowledge. By fusing the two dimensions, the lingual theory seeks to reduce the biases and prejudices attributed to the earlier conceptualizations of communication. Theories are usually formulated by making several assumptions (Wright, 2001). T he lingual theory presupposes that communication is a phenomenon characteristic to all living organisms. For the purposes of this discourse, the phenomenon is assumed to be present in all human beings. The second conjecture of this theory is that people from all walks of life are free to access information. Consequently, communication will phase out signs and analogies that lock out some groups in the society. Mejias (2001) illustrates that in today’s cyber age, access to information is not restricted. On the basis of this reality, the lingual theory makes the assumption that information should be made available to all people. The theory proposes the elimination of coded language that creates some form of secrecy. The objective is to ensure that information is communicated without a tinge of prejudice whatsoever. The propositions made in the lingual theory are aimed at reducing the identified biases. The model promotes innovativeness in communication. According to Anderson an d Boym (2004), the dynamic nature of language implies that certain semantics do not make sense to some clusters of people in the society. The theory homes in on such circumstances and proposes innovativeness in the semantics and symbols used in language. For instance, instead of using sexual allure as a symbol for advertising female related products, media outlets should introduce some form of euphemism. In this sense, innovativeness is likely to increase the number of target audience The theory provides that communication should not discriminate against some groups in the society. Lack of discrimination will increase access to information. The suggestion rides on the assumption that information should be open to everyone in the society. Anderson and Boym (2004) make a similar suggestion by arguing that communication is expected to be a universally uniting form of art. To this end, the element should reduce racial, gender, and class discrimination, which characterize most forms of v isual art. Mejias (2001) affirms that theoretical frameworks are developed from various paradigms. The paradigms are schools of thought that tend to explain the perceptions of the various elements in the community. The lingual theory relies on a positivist paradigm given its focus on reality as defined by a person’s senses. The need to eliminate biases and prejudices informs the use of this paradigm. The theory seeks to be objective and realistic. The selected paradigm makes it possible to communicate by expressing concrete aspects of a society, including events and situations. The theory borrows heavily from the Shannon and Weaver traditions of communication models. Mejias (2001) points out that the model comprises of a sender, a medium, and a receiver. The lingual theory is based on the fact that modern communication relies on different media for transmission, upholding this tradition in the long term. The tradition adopted also stems from the fact that the new model addres ses the issue of parties involved in communication. Application of the Lingual Theory The theory can be used in different situations in a societal setting. As already indicated, it seeks to eliminate biases and prejudices in communication. It can be utilized to address complaints touching on feminism. According to Cuklanz and Sujata (2006), the depiction of women in the media is a major concern to many people. There are groups of people who feel offended by the feminist approach in highlighting women in films and other communication platforms. The lingual theory comes as a relief to women and other anti-feminist groups. Feminism can be used to understand the injustices meted out on women due to their gender (Cuklanz Sujata, 2006). Some media personalities find it important to use women to pass across information. However, such depictions are associated with various prejudices and biases. An assumption is made to the effect that women belong to a certain category. Such depictions of women as housewives were prominent in the 1950s. However, with changing times, women are increasingly embracing new professions. As a result, a portrayal of women as inferior beings goes against the ethics of communication. The most common element of feminism in communication is evident in the illustration of women as sexual objects. Cuklanz and Sujata (2006) argue that most films and advertisement campaigns seek to attract the attention of their clients by creating sexual images of women. In most cases such forms of communication are targeted at the male audience. In a way, the sexual highlight is prejudicial since women can be much more than objects of primal satisfaction. Communication of such nature is driven by the two theories discussed earlier. The lingual theory seeks to respond to anti-feminism, especially in mass media. An example is made of a fashion advertisement targeting women who are in the working class category. Bearing in mind that the lingual theory focuses on th e content, the creator, and the recipient of messages, innovativeness is expected to minimize bias. In line with this, the theory comes up with signs and semantics that sit well with the professional woman of modern times. For instance, rather than advertise a dress that has sexual connotations, the emitter can go for a comfortable, yet appealing, professional look. Figures 1 and 2 below illustrate this: Figure 1: Sexy dress Source: Women sexy dress lady party mini dresses backless clubwear evening (2013) Figure 2: Professional look Source: Ladies’ sweater ol fashion large size knitted coat women’s modern outer wholse, ladies’ autumn outerwear fall clothing (2014) Figure 1 creates an evident sexual appeal illustrated through the dress worn by the model. Such an impression is common in advertisements. However, the model in figure 2 helps to bring in some sense of self-worth to suggest that a woman can be comfortable and happy without the need to appeal to the s exual emotions. Symbols and signs inform most communication processes (Alsina Jimenez, 2010). However, according to the lingual theory, the symbol used in figure 2 lacks bias and prejudice. Semantics are key components of communication processes (Anderson Baym, 2004). By borrowing from the semiotics theory, the lingual framework incorporates semantics in the new equation. The textual language used to pass information should be non-prejudicial. In such instances, the emitter of a given piece of information is expected to make use of euphemism. An example can be made in the film industry. An example can be given of a film featuring women. Intemann (2010) argues that derogatory language may be used to refer to female characters. Such language is offensive to the women folk. The lingual theory restricts individuals from making use of such offensive language in a bid to accommodate everyone. Conclusion The author of this paper argues that the standpoint and semiotics theory limit the e ffectiveness of communication. Anderson and Boym (2004) hold the opinion that effective communication should not discriminate against some parties in the society. The shortcomings of the two theories necessitate the creation of an alternative model. However, it is important to note that the new lingual theory has its own shortcomings. By assuming that information is universally accessible, the theory goes against the need for privacy under sensitive circumstances. Nonetheless, the lingual theory provides an alternative framework of communication. References Alsina, R., Jimenez, L. (2010). Communication theory and research in Spain: A paradigmatic case of a socio-humanistic discipline. European Journal of Communication, 35(3), 273-286. Anderson, A., Baym, G. (2004). Philosophies and philosophic issues in communication. Journal of Communication, 54(4), 589-615. Buzzanell, P. (2003). A feminist standpoint analysis of maternity and maternity leave for women with disabilities.  Women and Language,  26(2), 53-65. Colombo, M. (2004). Theoretical perspectives in media-communication research: From linear to discursive models. Forum: Qualitative Social Research,  5(2), 26-28. Cuklanz, M., Sujata, M. (2006). Televisions â€Å"new† feminism: Prime-time representations of women and victimization. Critical Studies in Media Communication, 23(4), 302-321. Friedman, A., Thellefsen, M. (2011). Concept theory and semiotics in knowledge organization. Journal of Documentation, 67(4), 644-674. Intemann, K. (2010). 25 years of feminist empiricism and standpoint theory: Where are we now?. Hypatia, 25(4), 228-796. Ladies’ sweater ol fashion large size knitted coat women’s modern outer wholse, ladies’ autumn outerwear fall clothing [Image]. (2014). Web. Li, Y. (2011). Nonwestern semiotics and its possible impact on the composition of semiotics theory in the future. Semiotica, 2011(187), 229-237. Mejias, U. (2001). Sustainable communicational realit ies in the age of virtuality. Critical Studies in Media Communication, 18, 211-228. Women sexy dress lady party mini dresses backless clubwear evening [Image]. (2013). Web. Wright, M. (2001). Gestalt psychological theory’s value in rhetorical criticism. Quarterly Journal of Speech, 87, 208-215.

Wednesday, November 6, 2019

Top 8 jobs to look out for in 2018

Top 8 jobs to look out for in 2018 As the new year changes and you start thinking about the ways you want to change or upgrade your life over the next 12 months, â€Å"new job† or â€Å"career switch† are pretty popular options. After all, your job plays a major part in your days)7. Tax preparerYou know the old saying by Benjamin Franklin: â€Å"In this world nothing can be said to be certain, except death and taxes.† To our founding father’s wise statement, I’d add that taxes are also certain to become more and more complicated. As more people need help putting their taxes together in a way that is accurate and audit-avoiding, that’s where tax preparers come in. They’re most visible between January and tax day in April, but these jobs are increasingly opening up year-round.What you’ll need: A high school diploma, but a bachelor’s degree in accounting or a related financial field is beneficial. You’ll need strong math skills, as well as customer ser vice skills.How much they make: According PayScale, tax preparers make a median annual salary of $39,477, or $12.31 per hour.8. Registered nurseNursing is one of those fields where there is a perpetual need for (and, unfortunately, often a shortage of) qualified professionals. Nurses provide care for patients in hospitals, doctor’s offices, agencies, home healthcare services, schools, nursing homes, and other medical facilities. They are often primary care providers, and typically work very closely with patients.What you’ll need: A bachelor’s degree in nursing, plus licensing. All states require registered nurses to be licensed, so be sure to understand what your own state’s requirements are.How much they make: According to the BLS, registered nurses make a median annual salary of $68,450, or $32.91 per hour.For more on how to snag registered nursing jobs:Create A Winning Registered Nurse Resume!A day in the life of a nurseHow Long Does It Take to Become a Nurse?So if you’re looking for a professional bump or a new career scene altogether, these fast-growing fields are worth a second look. All of these jobs are expected to grow faster than average over the next year, so if you’re seeking something that’s a good bet as well as a good fit for your skills or experience, then these can be great options to explore in 2018.

Monday, November 4, 2019

Chick-fil-As Article Example | Topics and Well Written Essays - 500 words

Chick-fil-As - Article Example Following the CEO’s remarks against LGBT rights, a customer yelled at a drive through employee telling her that he could not understand how she could manage to work at such a place. The customer seemed very angry and used abusive and threatening language. The customer was caught on video by a security camera and the matter was taken to the police. The issue of making statements like these can be a very emotional one, and can cause a lot of problems both to the person who gives such comments and to the public. The Chick-Fil-A case is a classic example of how random remarks on such groups can cause trouble. For instance, the CEO’s remarks on LGBT rights led to a lot of problems for the CEO as well as the Chick-Fil-A restaurants especially, considering that some municipalities threatened to deny operation licenses for Chic-Fil-A restaurant franchises. On the other hand, the artist act of vandalism in response to these remarks and the act of the man yelling at the drive through employee are also classic examples of how such comments can lead to dire repercussions. Not only that but their actions did not help in improving the image of LGBT groups, and many LBGT groups have come to condemn the actions of the two. Although the artist was charged in court for his acts of vandalism, he was to pay a bill of $700 to paint the wal l in order to remove the offensive graffiti on the wall. Facebook has been on the lime light with regards to how they the firm manages the privacy of users’ data. While the firm has improved the privacy mechanisms and privacy policies of the data it has about individuals, it is apparent that users’ ignorance on how to use these controls has been a major issue. Refraining from putting personal data on Facebook can be very useful, because it is probably the only way to guarantee that the users will not lose their personal information to other people. This is especially important considering that

Saturday, November 2, 2019

Cross Cultural Management Essay Example | Topics and Well Written Essays - 750 words

Cross Cultural Management - Essay Example (David, 2002, ch2 p29) Just a hundred years back, Britain was a country on which the sun never set. The English language, British customs, traditions and food habits have now become an integral part of life in all her former colonies-all these being integrated into, and modified by local customs. The British character and customs at home, have also been, in their turn, influenced by this close interaction with other cultures. Officially, Britain is a Protestant state, i.e the British monarch is Protestant. The origin of this dates to the 16th century, when King Henry VIII divorced his queen, Catherine of Aragon. As the Pope in Rome did not recognise divorce, Henry declared the English Church free from the control of the Pope. Thus the Reformation of the Church in England was mainly based on the whim of a monarch. Henry then married Anne Boleyn (the second of a succession of six wives that he eventually managed to have!) Queen Elizabeth II, the present monarch is a direct descendant of Henry and Anne. This fact makes it a political necessity for the monarchy in England to officially be Protestant, as otherwise (if it reverted to being Catholic) the current monarch would become the descendant of an illegitimate child (the illustrious Queen Elizabeth I) of Henry's! While the 'official' religion in Britain is Protestant-Christian, the country is a multi-cultural one. "About 8% of the population of Britain (4 .6 million) today are people from other cultures and ethnicities"(Biddle). This includes religions other than Christianity and peoples other than Whites. A living example of the integration of other cultures into British life is the Notting Hill Carnival, which is Caribbean in origin. (Biddle) Coming to some common superstitious beliefs of the British: black cats are considered lucky, and greeting cards often have pictures of them; likewise, a four-leaf clover is considered a lucky find. A horseshoe over the door attracts favourable luck. But it has to be kept facing upwards, to prevent the luck from being drained out from below. Similarly there are actions that attract bad luck-walking under a ladder, spilling salt (you must throw some of the spilt salt over your shoulder to avert bad luck, breaking a mirror (an action that dooms you to seven years of bad luck, no less!) or passing someone on the stairs. (Biddle) The number thirteen is also considered unlucky (many buildings/ hotels do not have a thirteenth floor-the fourteenth floor comes after the twelfth!), and the thirteenth of a month, if it comes on a Friday, is considered an unlucky day. Coming to some social niceties-it must be remembered that the British are rather formal in their interactions. If you are invited to someone's home for dinner, it is considered 'polite' to arrive around fifteen minutes late, unless your invitation says 'sharp' (e.g. "seven sharp") (Biddle) You may receive an invitation to "drop in anytime." You are not expected to take that literally. You must call up a person before visiting. If you receive an invitation that says RSVP, you must reply stating whether you plan to attend or not. If you go to someone's home for a meal, a small gift of flowers or chocolates is considered polite though not mandatory; a thank you note or phone call afterwards is expected. (Biddle) British people can be a bit reserved unless you have been introduced to them. Striking up conversations in public transport (trains) is unusual. If you