Featured Post

Writing a Reference Letter (With Examples)

Composing a Reference Letter (With Examples) Composing a Reference Letter (With Examples) Composing a Reference Letter (With Examples)...

Tuesday, November 26, 2019

Voyeurism and Hygiene in Degass monotype series The Bathers

Voyeurism and Hygiene in Degass monotype series The Bathers Natalie Samantha MurfinG14M2545"Using the above quotation, discuss Anthea Callan's notions of voyeurism and hygiene is Degas's monotype series The Bathers"AHVC 1Zamansele NseleI declare that this essay is my own wark and that all the sources I have used have been acknowledged by means of complete references._______________25/10/2014Nead states that to depict a body is to deal with "inescapable issues of representation" (Nead 1992). The depiction of nudes in art is considered by many to be a cornerstone of artistic practise - "The female body has become art" (Nead 1992: 19). Nudes are typically historically depicted in an austere and controlled manner, "contained within boundaries, conventions and poses" (Nead 1992: 11) so as to be considered 'appropriate' and without the associations of being "pornographic". Some works, however, break such representational conventions and thus, draw attention to the framework through which one views the nude.This essay aims to examine one of these bo dies of work - namely Degas's monotype series The Bathers - and highlight the notions of hygiene and voyeurism present therein.Degas's series of pastel and monotype drawings, The Bathers, was first exhibited in its entirety in France in 1877 (Callan, 1995: 72). The works were considered so controversial that "they elicited the largest single body of criticism on the artist's work" (Callan, 1995: 71). The works, small in size, depicted nude prostitutes in then-contemporary France over a large number of monotype plates (Callan, 1995: 72). Though prostitutes had typically been used as nude models in painting before this body of work, the nature of Degas's depiction of them challenged most accepted conventions of "nude painting" - the women in the works were "crossing the boundaries [] of cultural convention" (Callan, 1995: 139).Part of the...

Saturday, November 23, 2019

How to Treat Names of Groups and Organizations

How to Treat Names of Groups and Organizations How to Treat Names of Groups and Organizations How to Treat Names of Groups and Organizations By Mark Nichol Proper names create challenges for writers and editors trying to identify an organizational entity in a way that is both accurate and graceful. For example, in general, if you would precede the name of an entity with the article the in speech, do so in writing, and if not, don’t. This rule applies to organizations: â€Å"Your charitable donation to the March of Dimes helps fund our mission,† not â€Å"Your charitable donation to March of Dimes helps fund our mission.† (The organization’s Web site lists the copyright holder as â€Å"March of Dimes Foundation,† with no article, but refers to itself throughout the site as â€Å"the March of Dimes.†) â€Å"Save the Children has instituted rigorous standards in the communities it supports,† not â€Å"The Save the Children has instituted rigorous standards in the communities it supports.† (â€Å"One could write â€Å"the Save the Children philanthropic organization† to provide context, but â€Å"the philanthropic organization Save the Children† is more elegant.) It is also relevant to corporations: â€Å"GlaxoSmithKline PLC is headquartered in London,† not â€Å"The GlaxoSmithKline PLC is headquartered in London.† â€Å"The Dow Chemical Company is headquartered in Midland, Michigan,† not â€Å"Dow Chemical Company is headquartered in Midland, Michigan.† (But a short form of the name would not be preceded by the article: â€Å"Dow is headquartered in Midland, Michigan.† Usage in corporation names complicates matters somewhat, however. Some firms that include company in their name precede the name with the, and others don’t. (Careful writers and editors will check company literature for proper usage, or delegate the task to a fact-checker.) The same problem occurs when corporation is part of the name: For example, Microsoft Corporation omits the in its official corporate name, but many other such entities include it, as in the Corporation for Public Broadcasting. Number agreement of proper nouns and verbs is also a significant issue. For example, in American English, names of music ensembles, whether orchestras or pop groups, are matched with singular or plural verbs depending on the name: â€Å"Led Zeppelin was an English rock band,† not â€Å"Led Zeppelin were an English rock band.† â€Å"The Beatles were an English rock band,† â€Å"Not the Beatles was an English rock band.† (Note, also, that the, when it precedes a band name, is not capitalized, even if band documentation uses a capitalized the.) However, British English employs plural verbs regardless of the form of the band name: â€Å"Led Zeppelin were an English rock band,† and â€Å"The Beatles were an English rock band.† In the United States, names of athletic teams are always treated as plural, regardless of whether the name is a singular or plural term: â€Å"The Magic are headquartered in Orlando, Florida,† not â€Å"The Magic is headquartered in Orlando, Florida.† (Note that the house style of the New York Times is an exception.) â€Å"The Giants are headquartered in San Francisco,† not â€Å"The Giants is headquartered in San Francisco.† (But â€Å"The San Francisco Giants baseball team is in the National League of Major League Baseball,† and â€Å"The team is headquartered in San Francisco.†) In American English usage, metonymic team references, in which a team is referred to by the place name rather than the mascot name, are in singular form: â€Å"Orlando is on its way to the playoffs,† and â€Å"San Francisco is in a slump.† In the United Kingdom and other countries where British English is standard, a distinction is made between the organization and the athletes as a group: In the former case, the singular form is used (â€Å"The Manchester United Football Club is the most successful football club in England†), but the plural form prevails in the latter case (â€Å"Manchester United are ahead by one point†). Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Spelling category, check our popular posts, or choose a related post below:16 Substitutes for â€Å"Because† or â€Å"Because Of†How Long Should a Paragraph Be?5 Examples of Insufficient Hyphenation

Thursday, November 21, 2019

Writing Truly Is Re-Writing Personal Statement Example | Topics and Well Written Essays - 750 words

Writing Truly Is Re-Writing - Personal Statement Example The exercises are particularly interesting because they cater to arousing critical thinking. I have to be more aware of everything that may indicate something in the comprehension of the text. It requires more than just shallow reading or scanning through the words. It is very much like being a detective and looking through the words to find out clues to solve a mystery. Critical thinking was among my favorite task to do because it is particularly interesting as it stimulates the brain. I have learned to be analytical in figuring out what the paper is all about and in trying to make sense of all that I read. The hardest part is trying to put thought into the paper. This, I learned, is an arduous task that requires time and effort. Writing truly is re-writing. The way that I see it, even the best of writers have editors. Being accepting of criticism and taking what you have learned from it to apply it in the future is the true measure of humility. Because it is next to impossible to say that your own piece of writing is perfect. If anything, to say so is either downright arrogant or foolish. Others are born with the talent to write and they only need very little editing as it comes naturally. But I have learned that it is also something that can be acquired. The secret to this is organization. One must first organize his thought as they may not make sense at first glimpse.  

Tuesday, November 19, 2019

Strategic Information Systems ICT Essay Example | Topics and Well Written Essays - 2500 words

Strategic Information Systems ICT - Essay Example In this scenario we are aimed at analyzing the basic issues regarding corporate information and data dealing. This kind of issues can emerge while transferring and dispatching and data and information. In addition, these issues can harm the corporate credibility and performance. In this scenario, the basic intention is to assess all the possible impacts that data security issues can place on the corporate market standing and customer relationship management. This research will compare and contracts the possible influences that a data or information breach can place on business. Here we will try to involve all possible stakeholders who can play role in the whole situation. However, major stakeholders that are involved in this scenario include business staff, outsider business rivals and hackers. These all categories will be inspected to assess their possible interest in business working and operational performance. I will make use of the drill down approach to assess and evaluate the overall working and performance related issues. These issues will be about the security and ethical aspects related. Part 2 Ethical Issues in ICT Assessing and determining the influence of a new technology, like that ICT could be extremely complicated task. In fact, ICT does not simply engage technological scenarios, however as well epistemology as the major part of ICT is information that demonstrates information, data and knowledge. In addition, ICT helps expand the capability of mankind to gather, process, store, recognize, utilize, develop, and distribute information at a speed as well as scale that had never been thought probable previously. Additionally, a number of influences as well as transformations of ICT are noticeable, however lots of are... This research aims to evaluate and present Ready Rural as a large size business corporation. Currently, the business deals with a lot of customers, supplier and involving stakeholders. There is a great chance of the security issues and privacy concerns such as loss of data and security at the corporate arrangement. In fact, the business data is transmitted and sent to a variety of people having major stack in business. In this scenario there is a chance of security breaches and privacy issues. Transactions are transferred and recorded in database of Ready Rural business at main data centers. The contents of e-communications and databases and other private information can be accessed by prohibited individuals and organizations if they are not strongly protected. The huge business setup of Ready Rural Business deals with a lot of business transactions every day. In this scenario there are greater chances of having some error during entry of data feeding level. In addition, the informat ion inserted into business databases is prone to device and human faults and error. Addition, the computer programs that execute different processes can hold thousands of issues and errors. As a result, these issues and errors are able to produce wrong as well as confusing information regarding organizations and individuals. Moreover, the information and programs errors might consequence in financial loss at Ready Rural Business, or even the loss of lives because Ready Rural Corporation has steel processing plant that has a really dangerous working environment.

Sunday, November 17, 2019

The Scarlet Letter Intro Essay Example for Free

The Scarlet Letter Intro Essay In the 16th century, Puritans immigrated to America from Great Britain in order to escape religious persecution, and by the mid 17th century they had erected a well established society based on their theological beliefs. The Puritan religion was one of austerity and geared towards spiritual devotion rather than worldly possessions. Puritans followed rigid laws which rarely changed with time. They also had little tolerance for anyone who broke these laws. Individuals who did violate these laws however, faced punishment on various levels and would have to prove their repentance to themselves and society. The Scarlet Letter, set in mid 17th century Boston, portrays such forms of repentance from two perspectives. The author, Nathaniel Hawthorne, constructs the plot to revolve around the journey of repentance of two characters: Hester Prynne and Rev. Dimmesdale. Both characters have committed the blasphemous sin of adultery together, but only Hester has been punished for it, whereas Dimmesdale has yet to be discovered for his involvement in the misdeed. Hester’s severe punishment is to carry the eternal burden of the scarlet letter A, a symbol that apprises everyone of her status as an adulterer, and outcasts her from the rest of society. Even though she is shunned by society, Hester still manages to perpetrate acts of penance to atone for her sin. However, Hester is not the only character who seeks repentance; Rev. Dimmesdale self-inflicts punishment as a form of penance. Throughout the novel, both characters strive to achieve true repentance, a feeling of remorse which comes from the soul. As committed as they are to atoning for their sin, neither Hester nor Dimmesdale truly ever reach the state of repentance. Their failure to achieve true repentance can be perceived through their similar goals of penitence and their different forms of punishment. Through the course of the novel, Hawthorne constantly evinces parallels and similiarities between the journeys of penance of both Hester and Dimmesdale. Both journeys for repentance end in the same place; failure to feel remorse for their sin. In chapter 17, Hawthorne finally brings Hester and Dimmesdale together in an intimate setting since their committing of adultery. A literal and metaphorical symbol of their parallel journey. The lovers meet up in the forest, a dark place symbolic of evil, to speak privately for the first time in years about their plans for the future. Throughout the novel the reader has been able to track the acts of penance, however, it has never been plainly stated that these acts of penance have been in vain and no true repentance has come from them. Hawthorne decides that in this chapter both characters will blatantly state their failure to repent. In this chapter, Hester states to Dimmesdale, â€Å"What we did had a consecration of its own† (203). Hester has not only failed to repent at this point, but she has also stated that their adultery has had a valid purpose. Due to the fact that Pearl has come out of their fornication, she has not wronged in stating this but, any individual who has truly repented for their action would be too remorseful to justify their misdeed. Literary critic, Samuel Chase Coale, summarizes Hester’s vain journey for repentance by writing that â€Å"her public show of sorrow and repentance†¦ is in reality a hollow rite, not genuine penitence† (Coale 37). In parallel, Dimmesdale admits his lack of regret for his adultery with Hester. Of the two, Dimmesdale journey has been the most rigorous in penance, yet, like Hester, his journey of penance has ended in failure. He openly admits, â€Å"Of penance, I have had enough! Of penitence, there has been none!† (200). Dimmesdale does not feel the least bit sorry for his sin with Hester. Hawthorne parallels their journey for the goal of repentance for 17 chapters, until he finally brings about their ultimate failure. This length of time allowed the reader to view two similar, simultaneous journeys which ultimately ends literally and metaphorically in one place, failure in the forest, a place of evil, sin, and insincere penance. Although both Hester and Dimmesdale have had a similiar goal of true repentance, the details of their journey are entirely different. Hawthorne structures the novel like this for various reason, the most obvious being redundancy. If Hawthorne had made Dimmesdale’s and Hester’s journey exactly alike, the story would seem extremely redundant and would lose the interest of the reader. On the other hand, Hawthorne creates this contrast in their journeys in order to establish some social commentary. He establishes a journey of penance through two different conflicts, person vs. society and person vs. self. Hester penance, of course, is established through person vs. society. â€Å"Spatial relationships, those based on the placement of images within the text, reveal a set of structures and codes that embody the social organization of a community, both in terms of its ideology and its culture. How one is seen and for what reasonsand what is being seensuggest the nature of soc ial powers at work in early Boston. Thus when Hester emerges from the prison to stand fully revealed (52) before the crowd, she is moving from enclosed darkness to open sunshine, from the present enclosure of her crime into the public gaze that has branded her a criminal. Hawthorne has made so much of the prison to begin with, however, that no matter how precious the open air now seems, to step from that prison and mount the scaffold is to move from one enclosed space to another, each underscored by the whole dismal severity of the Puritanic code of law (52) as embodied in the people and the magistrates who fasten their thousand unrelenting eyes (57) upon her. Their eyes become our eyes, for we as readers are as interested in observing the spectacle, in order to understand exactly what is going on, as they are, although unlike us they do so assured of justice in their gaze.† In contrast, Dimmesdale, faces internal conflict in the form of person vs. self. He self inflicts torture as a form of his penance in an att empt to repent. Both protagonist, Hester and Dimmesdale have failed to reach a similar goal of true repentance through very distinct journeys.

Thursday, November 14, 2019

Sat Scores Vs. Acceptance Rates :: essays research papers

SAT Scores vs. Acceptance Rates The experiment must fulfill two goals: (1) to produce a professional report of your experiment, and (2) to show your understanding of the topics related to least squares regression as described in Moore & McCabe, Chapter 2. In this experiment, I will determine whether or not there is a relationship between average SAT scores of incoming freshmen versus the acceptance rate of applicants at top universities in the country. The cases being used are 12 of the very best universities in the country according to US News & World Report. The average SAT scores of incoming freshmen are the explanatory variables. The response variable is the acceptance rate of the universities. I used September 16, 1996 issue of US News & World Report as my source. I started out by choosing the top fourteen "Best National Universities". Next, I graphed the fourteen schools using a scatterplot and decided to cut it down to 12 universities by throwing out odd data. A scatterplot of the 12 universities data is on the following page (page 2) The linear regression equation is: ACCEPTANCE = 212.5 + -.134 * SAT_SCORE R= -.632 R^2=.399 I plugged in the data into my calculator, and did the various regressions. I saw that the power regression had the best correlation of the non-linear transformations. A scatterplot of the transformation can be seen on page 4. The Power Regression Equation is ACCEPTANCE RATE=(2.475x10^23)(SAT SCORE)^-7.002 R= -.683 R^2=.466 The power regression seems to be the better model for the experiment that I have chosen. There is a higher correlation in the power transformation than there is in the linear regression model. The R for the linear model is -.632 and the R in the power transformation is -.683. Based on R^2 which measures the fraction of the variation in the values of y that is explained by the least-squares regression of y on x, the power transformation model has a higher R^2 which is . 466 compared to .399. The residual plot for the linear regression is on page 5 and the residual plot for the power regression is on page 6. The two residuals plots seem very similar to one another and no helpful observations can be seen from them. The outliers in both models was not a factor in choosing the best model. In both models, there was one distinct outlier which appeared in the graphs. The one outlier in both models was University of Chicago. It had an unusually high acceptance rate among the universities in this experiment. This school is a very good school academically which means the average SAT scores of

Tuesday, November 12, 2019

Process control Essay

Process control is a major factor in ensuring that a process is working to its maximum potential. Sometimes process control means that one must conduct research to see how a process improvement can be implemented. Process improvement normally results in adjusting and modifying particular tasks or steps in a process to make them run more efficiently and smoothly. According to Chase, Jacobs, and Aquilliano, it is very important to put metrics in place so that you can determine if improvements are needed for a particular process (Chase, Jacobs, and Aquilliano, 2006). Over the last five weeks, I have observed the task of getting ready for work. After collecting data for analysis, I have enough information to develop a process improvement plan. In this paper, the control limits will be reviewed and any applicable seasonal factors that could impact the historical data will be discussed. Control Limits In an article in the Journal of Science and Technology, a control chart is described as â€Å"a statistical devise used for the study and control of a repetitive process† (Radhakrishnan and Balamurugan, 2010, p 1052). The control chart is a tool used with 6 sigma to look at ways to improve the performance of a particular process. They basically let management know when they should adjust a process or when we should leave it alone. It has upper specification limits (USL) that are used to identify the maximum amount of that could give acceptable performance. Also there is the lower specification limit (LSL), which identifies the lowest amount that could give acceptable performance of the process. The USL and LSL are also known as the control limits that are either 3 deviations above the mean or 3 deviations below it (Chase, Jacobs, and Aquilliano, 2006). In developing a control chart for the process for getting ready for work, one must first look at the sampling plan. For weeks, data has been collected during business days to indicate how long it takes to get ready for work. This data is reviewed to find the mean, median, standard deviation, and mode. The results are as follows: mean is 74. 70588, median is 74, mode is 71, and standard deviation is 3. 981792. This information tells us that the average time it takes to get ready is 74 minutes, whereas the time occurring the most is 71 minutes. The standard deviation in this indicates that we can go either 3. 98 to the right or left of the zero probability distribution. The chapter readings advise that in looking at the control chart, one can assume that the process is working properly when the samples stay within the control limits (Chase, Jacobs, and Aquilliano, 2006). The next indicator to look at is the capability index, which in this case shows us how well we are doing in getting ready for work in a timely manner. The readings indicates that the more off-center the capability index, the higher the chance to of defective products. Because we are not discussing products in this process, it would be the greater the chance to get off schedule (Chase, Jacobs, and Aquilliano, 2006). The data indicates that there is a capability index of -8. 6. According to Landauer, the capability index is interpreted as: â€Å"1) if the capability index is less than one, the process is outside the control limits 2) if it is greater than one; the process is within the control limits. The results from my data at first was a little puzzling because the index of -8. 6 would indicate that the process is outside of the control limit and would need to be adjusted. However, because the process improvement plan is to decrease the time it takes to get ready for work, the negative number is a good factor. In having this information handy, one must also consider how seasonal factors impact the process. Seasonal Factors It is a little difficult to determine seasonal factors that could impact the time it takes to get ready for work. After thinking about this a while I think the biggest impact could be daylight saving time. When an hour of sleep is lost in the Spring, it takes a while to adjust to the change in the daylight saving time. In fact, research indicates that when one transitions into and out of daylight saving time, there could be negative impacts (Lahti, Leppamaki, Lonnqvist, and Partonen, 2008). These impacts could result in a loss of sleep, restlessness, and lack of sleep quality which could result in crankiness and negatively impact a two year old. If my son does not wake with a positive attitude, I know it will be a challenge getting ready for work on time as I would need to devote more time calming him down. During the seasonal periods, it may be better to implement process improvements like adding a resource to assist with the process. In my process this would mean getting my husband to help out more in getting the baby ready for daycare. With the added resource, one can shorten the time that it takes to complete the process and does not run the risk of deviating off course. Applying this same format to a production process could mean adding more employees, equipment, or even outsourcing to ensure that a project or process is completed timely. Conclusion Overall, control charts are visual measures that assist with determining if a process is in control or not. When backed by statistical data like the mean, median, mode, standard deviation, and capability index, one could gather enough data so that a process improvement decisions necessary for keeping the process in control can be made.

Sunday, November 10, 2019

Analysis of the Epic of Gilgamesh Essay

The Epic of Gilgamesh is an extraordinary poem showing the tragedy of mortality. The poem is the earliest primary document discovered in history dating back to 2000 B. C. E. The document tells a story about a King named Gilgamesh who was created by gods as one third man and two thirds god. The epic tells the advetures that Gilgamesh goes on throught his life to determine his meaning. A lot of people in Mesopatamia in this time period felt as though they needed to dicover why they were here and what was going to happen after they died. The culture in which Gilgamesh existed did not believe in an afterlife, and if they had any thoughts that there was anything after death it certainly wasn’t a pleasant thought. Gilgamesh’s journey beings with the creation of the city Uruk. The great king built the magnificent city that his achievements occur. Being that Gilgamesh is two thirds god he has incredible strengths that have never exsisted before. Gilgamesh is young and arrogant and treats the people of Uruk very harshly. Because of the way Gilgamesh mistreats his people it causes them to call out to the sky god and ask for someone as strong and immortal as Gilgamesh. Their hope is that this person will be Gilgamesh’s match and will show him he is not as mighty as he believes. The gods create a wild man who is named Endiku who lives in the intense forest surrounding the land of Gilgamesh. Endiku was made with the strength of no human. He is discovered by a trapper running through the forest naked among wild animals. The trapper is so afraid by this that he goes to tell his father. His father tells his to go to Uruk and find a horlot to take with him back to the forest. When she sees Endiku she is to tempt him with her womanly ways. The trappers father said that if Endiku succumbs to her he will no longer be amazingly strong and wild. The harlot named Shamaht meets Endiku at the watering hole where he comes to drink with the wild animals. She offers herself to him by stripping naked and flaunting her womanly traits. He is upset that this harlot has caused him to lose his strength and rowdiness so the harlot explains to him what he could have if he became more civilized. Shamahat offers to take hi to the city of Uruk where all the delights of civilization show true. She offers to take Endiku to meet Gilgamesh who has similar strengths as him. Meanwhile Gilgamesh has dreams showing him signs of what is to come. In the first dream he is shown a meteorite falling to Earth which is so abundant that he cannot move it. The people come together to celebrate the meteor and Gilgamesh welcomes it as he would a lover or wife but Gilgamesh’s mother wants him to compete with the meteorite. It the second dream Gilgamesh dreams that an axe appears at his door, the axe is so vast that he cannot lift or move it. As in the previous dream the people come to celebrate the axe and Gilgamesh embraces it as he would a lover. Again his mother wants him to compete with the axe. Confused Gilgamesh tells his mother his dreams and asks her what they mean. She tells him that the meteor and axe symbolize a great man with incredible strengths coming to Uruk. Gilgamesh will take in this man as he would a wife and the man will assist Gilgamesh perform many great things. Endiku comes to the city or Uruk during a celebration. Gilgamesh the great king is claiming the right to have sexual intercourse with every new bride first on the day of her wedding. Endiku is disgusted with this and decides that he is going to block the kings way into the marital chamber. This enrages Gilgamesh and the two men fight viciously until Gilgamesh wins. Endiku excepts Gilgamesh’s authority and the two become great friends. The two men become lazy and weak living in the city so Gilgamesh proposes an adventure. He wants to venture to the Cedar Forest and cut down all the cedar trees. In order to do this they must defeat a giant wild beast named Humbaba. The elders of the city, Endiku and Gilgamesh’s mother disagree with the adventure and try to talk him out of proceeding. Gilgamesh decides to go anyways and Endiku follows as a honorable friend should. Should Gilgamesh defeat the monster Humbaba, his name will forever be remembered. After an extremely long journey the two kill Humbaba Right before Gilgamesh cuts the head off of Humbaba the monster shouts out a curse on Endiku that out of the two men Endiku will die before Gilgamesh and never find peace in the world. With the defeat of Humbaba the men cut down the cedar trees and use the wood to build a great gate for the city of Uruk. After the voyage to the Cedar forest Gilgamesh’s fame is spread wide attracting sexual attention of the goddess Ishtar and offers to become his lover. Gilgamesh rejects her with insults due to her ugly past of lovers. Gilgamesh’s encounter with Ishtar shows how risky the relations of humans to gods can be at least for humans. He has the right to reject her but should not have done so as insultingly as he did. He ends up paying a heavy price for bad manners. Ishtar is very offended by Gilgamesh’s response that she goes to her father, the sky-god Anu, and asks for the Bull of Heaven so that she can have vengeance on Gilgamesh and his city. Working together again Endiku and Gilgamesh slay the Bull of Heaven. The gods decide that someone must be punished for killing Humbaba and the Bull of Heaven. So out of the two conquerors the gods decide Endiku should pay the price. Upset with the unjust decision Endiku curses the Cedar Gate, the harlot,Shamhat, and the trapper for introducing him to civilization. He is reminded that he has enjoyed his life and done many things. After twelve days Endiku finally dies. Endiku’s death causes Gilgamesh to realize his fear of mortality and tries to find a way to live forever. On his quest he figures out that the gods will not grant him immortality and he must accept his destiny. A man named Utnapishtim tells Gilgamesh that death is essential because of the will of the gods and that all human effort is only temporary. Utnapishtim is the only man that has been blessed with immortality and tells Gilgamesh the secret as to how he became. The gods had met and decided that the humans were out of control and to destroy mankind with a giant flood. The flood lasted for seven days and seven nights in the city of Shurrupak which stands on the banks of Euphrates. At the end of Utnapishtim’s story he offers Gilgamesh a chance at immortality. If he can stay awake for six days and seven nights he will become immortal but as soon as he sits down he falls asleep so he failed the test. Utnapishtim offers another chance, Gilgamesh must go to the bottom of the ocean and receive a plant of youth. He does this and goes on his way back to Uruk but as he rests on a shore the plant is stolen by a serpant so this test as well is failed. At the end of the poem Gilgamesh lays before the gates to Uruk and admires the city he built and at the base of his cities gates lay a stone of lapis lazuli explain the reason for his notable deeds. In reviewing this story, you are able to determine the ways it has entertained, educated, and enlightened the Mesopotamian culture in ancient times. It shows examples of gender roles, the way you were supposed to live, and idealistic leadership. The epic uggests that ancient Mesopotamian’s perspective of an ideal kingship by illustrating uncivilized behaviors of the Sumerian ruler. The epic reflects on the rulers past explaining Gilgamesh disappoints his gods and the Sumerian city with selfish behaviors like sleeping with many women, spending money, and treating his people like they were nothing. From this, we can determine that Mesopotamians believed a successful leader needs to be able to create responsible relationships with his people and obtain the ability to show respect towards those who do not have as much, if any, political power.

Thursday, November 7, 2019

The Whole Internet Essay Example

The Whole Internet Essay Example The Whole Internet Essay The Whole Internet Essay Type Your College Name Here| Submitted By: Type your name here | Infrastructure Assignment 4| 1. Compare and contrast at least five technologies that are readily available for in-home internet access. You should consider practical as well as technical differences in your comparison. Do not include Frame Relay or ATM as these are primarily larger scale business solutions. 802. 11N| Higher-speed standards up to 300+ Mbps| 802. 11n uses (MIMO) technology and a wider radio frequency channel. It provides a mechanism called frame aggregation to decrease time between transmissions| Channels operating at 40Â  MHz are another feature incorporated into 802. 11n| The transmitter and receiver use pre-coding post-coding techniques to achieve the capacity of a MIMO link| Video Conferencing| A video conference is a set of interactive telecommunication technologies which allow two or more locations to interact via two-way video and audio transmissions simultaneously| ITU H. 320 is known as the st andard for video conferencing over integrated services digital networks| H. 64 SVC is compression standard that enables video conferencing systems to achieve highly error resilient| The components within a Conferencing System layers: User Interface, Conference Control, Control or Signal Plane and Media Plane| The RTP and UDP normally carry information such the payload type which is the type of codec, frame rate, video size and many others| Browser| A browser is an application program that provides a way to look at and interact with all the information on the World Wide Web. Web browser is a client program that uses HTTP to make requests of Web servers throughout the Internet on behalf of the browser user| Web browsers use many other protocols like HTTPS, asp, java script, VB script to display and run script in web page| Browsers include additional components to support e-mail, Usenet news, and Internet Relay Chat (IRC)| There are many web browsers are available like Internet explore r, chrome, Firefox and safari| VoIP| VoIP (Voice over Internet Protocol) is simply the transmission of voice traffic over IP-based networks| VoIP has become popular largely because of the cost advantages to onsumers over traditional telephone networks| In the VoIP world, codec’s are used to encode voice for transmission across IP networks| There are many codec’s are used in VoIP like ITU G. 711 ITU G. 722 ITU G. 723 ITU G. 726 ITU G. 727 G. 728 | There are many Internet telephony applications available. Like CoolTalk and NetMeeting Google voice| Bit Torrent| BitTorrent is a content distribution protocol that enables efficient software distribution and peer-to-peer sharing of very large files| To share a file or group of files, a peer first creates a small file called a torrent This file contains metadata about the files to be shared and about the tracker, the computer that coordinates the file distribution| BitTorrent makes many small data requests over different TCP connections to different machines, while classic downloading is typically made via a single TCP connection to a single machine. distributed nature of BitTorrent leads to a flood like spreading of a file throughout peers. As more peers join the swarm, the likelihood of a successful download increases| The peer creates a hash for each piece, using the SHA-1 hash function, and records it in the torrent file| 2. Explain the similarities and differences between Frame Relay and Asynchronous Transfer Mode. ATM and frame relay are two of the most common used methods for telecommunications between networks today. ATM, which stands for Asynchronous Transfer Mode, is a technology that arose from international standards relating to the transmission of data, voice, and video simultaneously over a network at speeds far faster than has been possible without the standards. ATM is also known for transporting communications at hundreds of megabits per second, which results in speedier service than Ethernet on local area networks. ATM has also ascended into being a standard for fixed-length cell switching. Cells that originate from various sources or from various destinations are asynchronously multiplexed between multiple packet switches. The Virtual Path Identifier (VPI) and Virtual Circuit Identifier (VCI) are the unique integer fields that identify each circuit on each link of the network. Frame Relay implements no error or flow control. The simplified handling of frames leads to reduced latency, and measures taken to avoid frame build-up at intermediate switches help reduce jitter. Frame Relay offers data rates up to 4 Mb/s, with some providers offering even higher rates. Frame Relay VCs are uniquely identified by a DLCI, which ensures bidirectional communication from one DTE device to another. Most Frame Relay connections are PVCs rather than SVCs. Frame Relay provides permanent, shared, medium-bandwidth connectivity that carries both voice and data traffic. Frame Relay is ideal for connecting enterprise LANs. The router on the LAN needs only a single interface, even when multiple VCs are used. The difference, first, frame relay uses variable packet sizes. The packet size varies, depending on the amount of data that is being sent. ATM uses a fixed packet size, which is the 53 byte cell that was depicted earlier. Next, frame relay, while although is useful to connect different local area networks, it cannot actually work within one. ATM cannot only work within a local area network, but they can also work within a wide area network. Third, frame relay is easy and inexpensive to install, and is readily supported in software. For a lot of users, it simply means a software upgrade on existing equipment, which minimizes network investment. ATM more often requires a more complex installation, and is not readily supported in some software. Also, while frame relay does have a varied packet size, it is the variance that can often mean a low overhead within the packet, which makes it a more efficient method for transmitting data. ATM’s fixed packet size, while optimized for handling multimedia traffic at high speeds, can sometimes leave a lot of overhead within the packet, especially in short transactions, where cells are often not full. [1] [2] 3. Technological advances are only one of many factors that play into how technology infrastructure develops. The social decision to break-up ATT had a significant impact on the telephone infrastructure. Describe how the infrastructure changed due to this event. ATTs voluntary breakup marks the end of the bigger-is-better era. For much of the 20th century, business strategy was relatively simple scale up operations and expand market share. The greatest opportunities lay in providing standardized products, with incremental improvements, to a middle-class market. But the simple pursuit of scale and market share lost its effectiveness as the 20th century ended. Another prime example of this is what is happening to Microsoft. Even though they have different legal problems, their days of gobbling up any and all businesses that got in their way is over. Smaller firms particularly those with innovative, customer-centric business designs became the most profitable. This is evident with the popularity of the dot. coms and how well they are doing in the market. Shortly after announcing on October 25th that ATT was going to split into four units, Michael Armstrong, the companys chairman, was asked in an interview if anything good would be lost as a result of the overhaul. He considered the question for at least 10 seconds, and then responded, I cant think of anything. But in fact, AT;T may be losing something that if not necessarily good, has been a powerful force in its favour for more than 100 years: the fear that its size and power has inspired in competitors. This will hopefully weaken the level of competition that AT;T has faced in the past. The AT;T-brand companies that remain after the breakup plan is completed by 2002 will be smaller than the AT;T the communications the world has known. And the competitive landscape will change accordingly. The local phone companies, already formidable in wireless and eager to expand into long distance while continuing to roll out high-speed Internet services, will be countering AT;T region-by-region and business-by-business. On January 30, 2005, AT;T agreed to be sold to an RBOC, Southwestern Bell (which had bought Pacific Bell earlier). This acquisition was finalized in October, 2005. Then SBC assumed the name ATT and introduce a new logo. The new AT;T then absorbed Bellsouth. It is interesting to note the political change since 1997, when Reed Hundt, then the FCC chairman, said South western Bell acquiring AT;T would be unthinkable since it would thwart competition. Since that time, SBC purchased AT;T, Verizon purchased MCI, Sprint purchased Nextel, and the new AT;T purchased Bellsouth. – [3] [4] 4. For the network that you have chosen to characterize, identify the connection to the internet WAN. Identify the media, devices, and service providers involved in establishing this connection. Describe what protocols/services are being implemented over this connection. In addition, describe at least one alternative ISP service available for this network. The home network that is chosen to characterize has DSL internet connection technology, In DSL internet connection it has many flavours and for home use my home network is ADSL internet connection. Asymmetric Digital Subscriber Line (ADSL) is one form of the Digital Subscriber Line technology, a data communications technology that enables faster data transmission over copper telephone lines than a conventional voice band modem can provide. It does this by utilizing frequencies that are not used by a voice telephone call. A splitter, or DSL filter, allows a single telephone connection to be used for both ADSL service and voice calls at the same time. ADSL can generally only be distributed over short distances from the central office, typically less than 4Â  kilometres (2 mi) but has been known to exceed 8Â  kilometres (5 mi) if the originally laid wire gauge allows for farther distribution. At the telephone exchange the line generally terminates at a Digital Subscriber Line Access Multiplexer (DSLAM) where another frequency splitter separates the voice band signal for the conventional phone network. Data carried by the ADSL are typically routed over the telephone companys data network and eventually reach a conventional Internet Protocol network. Currently, most ADSL communication is full-duplex. Full-duplex ADSL communication is usually achieved on a wire pair by either frequency-division duplex (FDD), echo-cancelling duplex (ECD), or time-division duplex (TDD). FDD uses two separate frequency bands, referred to as the upstream and downstream bands. The upstream band is used for communication from the end user to the telephone central office. The downstream band is used for communicating from the central office to the end user. [5] [6] ITU-T Spec| Description| G. 998. 1| ATM-based multi-pair bonding: A method for bonding of multiple DSL lines to transport an ATM payload beyond the rate/reach capability of a single DSL loop. This protocol allows the bonding of 2 to 32 pairs and supports dynamic removal and restoration of pairs without human intervention. | G. 998. 2| Ethernet-ba sed multi-pair bonding: Provides a method for bonding of multiple DSL lines for Ethernet transport. This recommendation builds on the IEEE 802. 3ah-2004 methods and extends Ethernet transport over other xDSL technologies, including ADSL. | G. 98. 3| Multi-pair bonding using time-division inverse multiplexing: Details a method for bonding DSL lines using time-division inverse multiplexing (TDIM). This recommendation uses IEEE 802. 3ah handshake for pair discovery, parameter negotiation, and setup. It also allows the hitless addition and removal of pairs an the fast removal of a pair upon pair failure. | There many other ISP’s in telecommunication industry who provide DSL Internet connections mainly as, [i] Verizon high speed internet http://www22. verizon. com/Residential/HighSpeedInternet#plans [ii] Qwest DSL qwest. om/residential/internet/broadbandlanding/ References: 1. exampleessays. com/viewpaper/93331. html 2. http://itknowledgeexchange. techtarget. com/itanswers/wha t-is-the-difference-between-atm-and-frame-relay-networks/ 3. directessays. com/viewpaper/43194. html 4. http://som. csudh. edu/cis/lpress/471/hout/telecomhistory/ 5. http://webopedia. internet. com/TERM/A/ADSL. html 6. http://en. wikipedia. org/wiki/Asymmetric_Digital_Subscriber_Line 7. http://www22. verizon. com/Residential/HighSpeedInternet#plans 8. qwest. com/residential/internet/broadbandlanding/

Tuesday, November 5, 2019

Black Inventors - Patent Holders List Index R

Black Inventors - Patent Holders List Index R Black history inventors are listed alphabetically: use the A to Z index bar to navigate and select or just browse the many listings. Each listing has the name of the black inventor followed by the patent number(s) which is the unique number assigned to an invention when a patent is issued, the date the patent was issued, and a description of the invention as written by the inventor. If available, links are provided to in-depth articles, biographies, illustrations and photos on each individual inventor or patent. How to submit to the database. Victor Llewellyn Ransom #3,231,866, 1/25/1966, Traffic data processing system#3,866,185, 2/11/1975, Method and apparatus for gathering peak load traffic data Debrilla M Ratchford #4,094,391, 6/13/1978, Suitcase with wheels and transporting hook Ernest P Ray #620,078, 2/21/1899, Chair supporting device Lloyd P Ray #587,607, 8/3/1897, Dust pan Andre Reboucas NA 1895 approx Torpedo Craig C Redmond, Sr. #6,085,356, 7/11/2000, Waist Band Expander Judy W Reed #305,474, 9/23/1884, Dough kneader and roller Humphrey H Reynolds #275,271, 10/7/1890, Window ventilator for railroad cars#437,937, 4/3/1883, Safety gate for bridges Mary Jane Reynolds #1,337,667, 4/20/1920, Hoisting and loading mechanism Robert Randolph Reynolds #624,092, 5/2/1899, Nonrefillable bottle Jerome Bonaparte Rhodes #639,290, 12/19/1899 Water closet Albert C Richardson #255,022, 3/14/1882, Hame fastener#446,470, 2/17/1891, Churn#529,311, 11/13/1894, Casket-lowering device#620,362, 2/28/1899, Insect destroyer#638,811, 12/12/1899, Bottle William H Richardson #343,140, 6/18/1889, Cotton chopper#405,599, 6/18/1889, Childs carriage#405,600, 6/1/1886, Childs carriage Charles V Richey #584,650, 8/3/1897, Car coupling#587,657, 10/26/1897, Railroad switch#592,448, 12/28/1897, Railroad switch#596,427, 12/13/1898, Fire escape bracket#615,907, 6/3/1913, Combined cot, hammock, and stretcher#1,063,599, 7/7/1931, Telephone register and lock-out device#1,812,984, 2/14/1933, Lockout for outgoing calls for telephone systems#1,897,533 6/15/1897, Time control system for telephones Alvin Longo Rickman #598,816, 2/8/1898, Overshoe James Ricks #338,781, 3/30/1886, Horseshoe#626,245, 6/6/1899, Overshoe for horses Norbert Rillieux #3,237, 8/26/1843, Improvement in sugar works#4,879, 12/10/1846, Sugar processing evaporator Cecil Rivers 6,731,483, 2/14/2003, Circuit breaker with single test button mechanism Louis W Roberts #3,072,865, 1/8/1963, Gaseous discharge device#3,257,620, 6/21/1966, Device for gas amplication by stimulated emission and radiation GASAR#3,377,576, 4/9/1968, Gallium-wetted movable electrode switch Elbert R Robinson #505,370, 9/19/1893, Electric railway trolley#594,286, 11/23/1897, Casting composite or other car wheels Hassel D Robinson #D 66,703, 2/24/1925, Design for a traffic signal casing#1,580,218, 4/13/1926, Traffic signal for automobiles Ira C Robinson #3,577,514, 5/4/1971, Sustained release pharmaceutical tablets James H Robinson #621,143, 3/14/1899, Lifesaving guard for locomotives#623,929, 4/25/1899, Lifesaving guard for street cars John Robinson #356,852, 2/1/1887, Dinner pail Neal Moore Robinson #1,422,479 7/11/1922 Vehicle wheel Arnold Romain #402,035 4/23/1889 Passenger register Raymond E Rose #3,618,388 11/9/1971 Control apparatus Archia L Ross #565,301, 8/4/1896, Runner for stoops#605,343, 6/7/1898, Bag closure#638,068, 11/28/1899, Trousers support or stretcher Joseph Ross #632,539, 9/5/1899, Hay press David N Roston #556,166, 3/10/1896, Feather curler Edwin R Russell #2,855,269, 10/7/1958, The separation of plutonium from uranium and fission products#2,992,249, 7/11/1961, Ion exchange absorption process for plutonium separation#3,296,123, 1/3/1967, Removal of cesium from aqueous solution by ion exchange#3,309,323, 3/14/1967, Thorium oxide or thorium-uranium oxide with magnesium oxide Jesse Eugene Russell #5,930,247, 7/27/1999, Broadband data reception system for Worldnet access#6,044,403, 3/28/2000, Network server platform for Internet, Java server and video application server John Russell #6,968,993, 11/17/2003, Mailbox assembly Joseph L Russell #3,995,011, 11/30/1976, Preparation of tungsten hexafluoride from halogen and hydrogen fluoride Lewis A Russell #544,381, 8/13/1895, Guard attachment for beds Earl Ryder #3,129,095, 4/14/1964, High silicon cast iron

Sunday, November 3, 2019

Land Law Essay Example | Topics and Well Written Essays - 2000 words - 3

Land Law - Essay Example One such attempt is the Land Registration Act 2002 which was seen as the successor of the Land Registration Act 1925 (Francis, 2013).1 The land registration Act of 2002 was based on the earlier UK land laws such as the land registration Act of 1925. Although the Land Registration Act 2002 meant to improve on the issues of the Land Registration Act 1925, it still has many issues which would need to be taken care of. Critics see the Land Registration Act 2002 as still based on archaic property ownership principles, making it hard for the Land Registration Act 2002 to be able to solve modern challenges of property ownership. Some of the issues with Land registration Act 2002 are as follows; Under the Land Registration Act 2002, landlords have a header time dealing with registrations issues. This is especially while dealing with tenants who are not represented by a legal professional. To avoid issues, most landlords will have to avoid leasing their land for more than seven years. The Land Registration Act 2002 also requires that land owners and leasers to unregister any leases once they expire. The issue with this is the fact that most small scale owners may not be careful enough to waste their time to go unregistered expired leases. This means that the Land Register will not have data that completely reflects the status of land ownership because expired leases, which have not been unregistered from the land register, will be seen as still active. This is similar with so many other issues in the land registry that fail to give a more accurate situation of the land ownership in the country. The Land Registration Act 2002 introduced a major problem with regard to the way the land is registered. For instance, the act allows for anyone to object to a registration as long as he has a reliable ground. While this is intended to solve some ownership problems, the issue with it is that people of ill will can use it to thwart land ownership by other people. This is