Wednesday, December 25, 2019

Malcolm X An Emotional Breakdown - 851 Words

Malcolm X was born Malcolm Little. He was born May 19, 1925 in Omaha, Nebraska. His parents were Louis Norton Little and Earl Little. His parents had eight children. His mother was a homemaker and his father was an outspoken Baptist leader. His father’s civil rights activism got him sent death threats from the Black Legion. This made his family relocate twice before his fourth birthday. In 1929, his home in Lansing, Michigan was burned. In 1931, when Malcolm was only six years old, his father’s body was found lying across the town’s train tracks. Several years after, Malcolm’s mother had an emotional breakdown. She was sent to a mental institution, making the children be split up into foster homes and orphanages. In 1946, he and his friend Malcolm Jarvis got arrested and charged for burglary charges. He was sentenced ten years in prison, but he was let out on parole after seven years. Later, he was in a period of self-enlightenment. His brother, Reginald, often visited him. When he visited, they would talk about Muslim religion. His brother belonged to the Nation of Islam. Malcolm had begun to study the teachings of the leader, Elijah Muhammad. By the time he was paroled, he was a devoted follower of the NOI. He changed his last name to â€Å"X’, because â€Å"Little† was a slave name, and â€Å"X† would represent his lost tribal name. X was made a minister and national spokesman for the NOI. He was also charged with establishing new mosques in Detroit and Harlem. He used paper columns,Show MoreRelatedQuitting Was Not An Option For Malcolm X918 Words   |  4 Pages Quitting was not an option for Malcolm X. Throughout his problematic life, Malcolm had to deal with so many obstacles in his way of success. He faced orphanage at an early age due to his father’s death and mother’s insanity, got caught up in criminal activity and even went to prison because of his actions. When he believed he found his calling in the religious group, the Nation of Islam, he was eventually betrayed by it’s leader, Elijah Muhammad, and was absolutely broken. Anyone in hisRead MoreMalcolm Xs Life and Accomplishments628 Words   |  3 PagesMalcolm X, Born name Malcolm Little, was born in Omaha, Nebraska on May 19, 1925. His mother was Louise Norton, which had eight children including Malcolm. His fatherâ€⠄¢s name was Earl Little, who was a Baptist preacher and strong supporter of the Black Nationalist leader Marcus Garvey. Before Malcolm’s fourth birthday, the family was forced twice to relocate due to death threats from the white supremacist organization, Black Legion. Despite their efforts to get away from them in 1929, the Legion burnedRead MoreEssay on The Civil Rights Movement: Malcolm X1135 Words   |  5 Pagesdifferent than King’s protests, he did his part and help with equality. This man was Malcolm Little, more famously known as Malcolm X. After a rough upbringing, Malcolm X led protests that differed which ended with his assassination. His protesting didn’t start when the Civil Rights Movement started; it started with his rough childhood. He was born on May 19, 1925 in Omaha, Nebraska. He was born with the name Malcolm Little. His mother was Louise Norton Little. She was a homemaker occupied with theRead MoreMalcolm X : A Man Who Changed American History1453 Words   |  6 Pages Malcolm X The Autobiography of Malcolm X as told by Alex Haley is the story about a man who greatly impacted American history. Malcolm Little, or Malcolm X as he is more widely known, taught what he believed in regards to segregation, racism, and discrimination. Growing up in a large family with a father Earl Little, a Baptist minister, and his mother Louis Little who was a homemaker, Malcolm’s life at the time seemed very promising. His father’s involvement in support of the BlackRead MoreThe Autobiography Of Malcolm X As Told By Alex Haley1442 Words   |  6 PagesThe Autobiography of Malcolm X as told by Alex Haley is the story about a man who greatly impacted American history. Malcolm Little, or Malcolm X as he is more widely known, taught what he believed in regards to segregation, racism, and discrimination. Growing up in a large family with a father Earl Little, a Baptist minister, and his mother Louis Little, who was a homemaker, Malcolm’s life at the time seemed very promising. His father’s involvement in support of the Black National gained him manyRead MoreMalcolm X : All These Things1073 Words   |  5 PagesHicken B8 Malcolm X Minister, political activist, author, ex-convict, self-made man. . . Malcolm X was all these things. Although his ideology was often divisive, no one could deny that he was a central figure of the African-American civil rights movement of the 1960s. From his troubled youth to his religious conversions to his assassination at the age of 39, Malcolm X’s story was often dramatic and always compelling. He was a complex and charismatic figure, and his influence lives on. Malcolm X wasRead MoreDr. Ben Carson As A Leader Of A Nation1638 Words   |  7 Pagesthe United States’ presidential election in 2016. Despite this, some question his ability to lead a nation, considering his lack of political background. Indeed, Carson currently faces issues similar to past leaders in the black community, such as Malcolm X, whose leadership was questioned as they lacked traditional experience. A large part of Carson’s public image is best summed up in his announcement, â€Å"I am not a politician. I don t want to be a politician† (bio). He proclaims, â€Å"Politicians do whatRead MoreThe Beliefs of Martin Luther King Jr. versus Malcolm X Essay1208 Words   |  5 PagesLuther King Jr. versus Malcolm X â€Å"I have a dream, that one day little black boys and black girls will join hands with little white boys and white girls and walk together as sister and brother.† (de Kay 75)†¦Martin Luther King Jr. During the past century, the United States of America has wresled with the problem of inequality between black and white people. Two influential people who helped to combat racism and the inequality of man were Martin Luther King Jr. and Malcolm X. Martin Luther KingRead MoreEssay on Malcolm X1967 Words   |  8 PagesMalcolm X In the course of human history there will always be change. In order to bring about that change there must be something that is so controversial that it can break people away from the normal routine they have been accustomed to. Few people can raise the amount of attention needed to fuel that controversy. Malcolm X was one of those few that would die trying to achieve that attention. Earl Little was a black Baptist minister and an avid civil rights activist. On May 19, 1925 in OmahaRead MoreMalcolm X And The Civil Rights Era1852 Words   |  8 PagesDuring a very significant time period of American History, many leaders, particularly Malcolm X, rose to prominence during the Civil Rights era. The mid 1900’s was a time of racial segregation, and discrimination leading to a worldwide issue between the black and white races. â€Å"By any means necessary†, a famous quote breeds from this time of racial discrimination which brought together thousands of people to get what th ey as humans deserved. 100 years after the Emancipation Proclamation, African Americans

Tuesday, December 17, 2019

Entrepreneurial Marketing at Shields Environmental Plc Coursework

Essays on Entrepreneurial Marketing at Shields Environmental Plc Coursework The paper "Entrepreneurial Marketing at Shields Environmental Plc" is a brilliant example of coursework on marketing. Starting and running an entrepreneurship requires acute business management skills. Form being able to notice an opportunity and assembling all the requirements needed to start a business. In most cases, individuals other than existing enterprises have been responsible for handling most entrepreneurial. Gordon Shields, founder of Shields Environmental has steered the company from humble beginnings to glory in a short period. The company has been listed as one of the best performing and creative entrepreneurs and has received monumental recognition in environmental conservation. In fact, it was awarded a platinum level for environmental excellence in 2008. Again the company’s Environmental Management System is certified to ISO 14001 (in 1995) and registered with the European eco-management and audit scheme (EMAS).Entrepreneurial marketingThe company was started by the current chairman, Gordon Shields in 1979. The company is involved in helping other companies in the telecommunication industry to recycle and reuse with maximum financial and environmental efficiency. The company prides itself on selling end to end products and services for enhanced environmental management. The company has a number of services that they offer chief among them financial and environmental reporting, buying of assets, import and export handling, deinstallation and logistics, inventory evaluation, etc. At the moment, the company has its head offices at Kerry Avenue, South Ockendon in the UK with others in the US, France and the Czech Republic. The company’s growth is spurred by the increased need to utilize resources efficiently and conserve the environment. The company’s vice president, Toni Gibbs says that the company’s growth is based on its ability to provide more than one service/product and also laying emphasis on quality other than pr ice. She says that the old adage of â€Å"the best price takes it† no longer applies in the modern business environment. She says that end users are more aware of the quality and depth of service involved. In this light, the company has been progressing at a time when the global economy is hurting and having the same effect on small and big businesses.Shields Environmental qualifies as an entrepreneurial going by the definition given by various authors on the criteria of entrepreneurial and small businesses. In general, a business qualifies as an entrepreneurial if the initial financing of the business is supplied by one individual, operations of the business are geographically limited to a small area and that comparison with existing businesses shows that the business is small. However, it should be noted that businesses are usually set up for growth and expansion. As such, the definition of entrepreneurship that applies to a single business or firm may tend to vary.

Monday, December 9, 2019

Security and Privacy Issues Related to VoIP and Skype

Question: Describe the Report for Security and Privacy Issues Related to VoIP and Skype. Answer: Introduction The VoIP is a technology that helps users to make a voice call over the public internet instead of using the PSTN (Public Switched telephone network). Day by day the use of VoIP is getting increased due to its low cost and flexibility. Today it is observed that MNC companies are conducting their hiring process (interview) over the Skype video conferencing. For privacy and security reasons people often ask for anonymity of their conversation. That is no other person than two people who are involved in the conversation, will have knowledge about the conversation (Habiba, Islam Amin, 2014). On the other hand different law enforcement agencies need to track these conversations in order to fight the crime and terrorism. This paper comprises discussion about the different security and privacy issues related to VoIP, different challenges and its impact on the real life. The technology used in the VoIP and impact of these technologies in real life is also discussed in this report. Challenges, problems, and relevant technologies In case of VoIP, this technology encrypts the voice or multimedia messages into data packets to transmit through private or public IP network (Matousek, Kmet Basel, 2014). This emerging technology is popular due to its flexibility and cost effectiveness than the traditional telephony. With all the benefits this deployment of VoIP technology faces several challenges that are acting like an obstacle in its user acceptance. According to Lazzez (2013), this challenge includes interoperability, complex architecture and security issues, etc. Since the computer IPs are mainly designed to transmit data, therefore it does not provide smooth flow of voice signal transmitted using Skype application. Interoperability: The compatibility between the different VoIP equipment manufactured by different vendors is a critical issue that affects the connectivity between the users at both the end. Complex architecture: In VoIP services, the complexity of the network and its architecture causes for extra overhead to the network administrator and service providers. Security issues: As the VoIP technology is still in its initial stages, therefore different security loop holes and vulnerabilities that are exploited by the intruders and hackers. There are two types of vulnerabilities which can be used by the hackers to exploit the security and privacy of the users. These two vulnerabilities can be categorized in to inherited vulnerability and users own vulnerability. Inherited vulnerability: These kinds of vulnerabilities are originated from the infrastructure of the network (Matousek, Kmet Basel, 2014). Like, network architecture, used operating system, etc. Like the use of the VoIP services within a wireless network can cause additional security concerns for the users. Users own vulnerability: These kind vulnerabilities include the security risks that are caused due to the use of chosen protocol, network devices (such as switches and routers). The attacks on VoIP applications include attack on the availability, confidentiality, and integrity of the services (Matousek, Kmet Basel, 2014). The attack against availability of service is about making interruption in the service, malicious messages, call hijacking, etc. several researches showed that there are some security flaws in Skype that are helpful for the hackers to steal the data of users chat and calling history. On the other hand attack on the confidentiality is targeted to capture users data, call pattern tracking, Eavesdropping media, credentials and other media by unauthorized means. For the attacks against integrity of the services is about intercepting the data or signaling other users data after intercepting it (Krawitz Howard, 2015) using the flaws of Skype and other VoIP applications. The attack on the integrity is carried out by the hackers to exploit and alter the intercepted data. This alteration includes injecting, deleting and replacing a certain amount of data in the intercepted data. The examples of attack on the integrity of data can be given by media injection, call black holing and VoIP call rerouting (Matousek, Kmet Basel, 2014). In the end, attack on the social context is about manipulating the social context of both the parties who are involved in the communication. In this type of attacks, the attacker misinterprets themselves as a trusted entity to the other party to convey wrong information on a specific issue. The VoIP services use the P2P (Peer to Peer) model rather than client server model to provide the services to the users (Matousek, Kmet Basel, 2014). The Skype application too uses the P2P architecture to provide better user experience. Even though the client server architecture model is popular model to implement an application that is based on distributed computing concept but in case of VoIP services the P2P model is suggested to maintain the quality of the services. 2. Application of different supportive technologies Basically, for VoIP services, two main technologies are required. These are internet and signaling protocols (Krawitz Howard, 2015). The signaling protocols that are used in VoIP services are H.23 and SIP (Session initiation protocol). The above mentioned protocols are mainly responsible for setting up a communication route between the senders and receivers IP address. In addition to this, a piece of software named "CODEC" is also used to convert the analog audio sound into digital signals in Skype (Habiba, Islam Amin, 2014). Once the voice (analog data) is converted into digital data, then it becomes relatively easy to convert them into data packets which are to be transmitted through the internet In order to send data over the internet, VoIP uses RTP (real time protocol). It is the same protocol that is used by the computers to receive streaming media at real time. Diagram 1: The process of establishing connection between two peers using Skype (Source: Matousek, Kmet Basel, 2014, pp-65) Vague areas in the Research paper In the selected articles, only the possible vulnerabilities and the solutions are discussed in using the client server network model. There are several issues that are not addressed by the authors adequately. One of them is use of client model instead of P2P model. Use of Client server model instead of P2P model: Whereas the according to the different criticisms the P2P (Peer to peer) architecture is best for the VoIP technologies (Yang, Dantu Wijesekera, 2012). It is the best choice due to the resistance against the single point failure (Habiba, Islam Amin, 2014). This is possible as this model treats each and every component as single and equal component. Therefore it can be said that, in the article, there is no justification for the selection of the client server architecture for the implementation of the VoIP services (Krawitz Howard, 2015). In addition to this, the process of converting the analog voice signal to the digital signal is also not described in detail for the reader. Research Questions Q1. What are the important uses of VoIP and Skype? Q2.What are the challenges faced by the users regarding privacy and security issues with the use of VoIP and Skype? Q3. What are the different measures that can be used by the users to minimize the security and privacy issues? Q4. What are the possible adverse effects of the privacy and security risks if they are not addressed properly? Accuracy of the information in the considered research paper The information given in the article is accurate and sufficient about the VoIP technology using the client server architecture. As an example, it described the VoIP architecture in the client server network model (Abdulhamid et al., 2014). The article clearly describes the way of in which the VoIP services (like Skype) relies on the set of connected central servers usually known as gatekeepers. The article also clearly describes the use of the media transport protocol, RTP (Real time Transport Protocol) and SRTP (Secure real time transport protocol) for the data packet transmission Furthermore, the selected paper also described different attacks on the VoIP services, like attack on the availability of the services to its users (Krawitz Howard, 2015). This kind of attacks is carried in the form of DoS (denial of services). General tools that are used by the attackers to affect the users privacy and security of users credentials are malformed messages, call flooding, spoofed messages, impersonating servers in the architecture, etc. The eavesdropping, call pattern tracking and data mining processes are described. For Eaves dropping, one of the network devices is compromised by the hacker or attacker to reroute the target media to the attackers device who are using Skype application. Call pattern tracking is used by the hackers to find a potential target device inside a targeted network (Habiba, Islam Amin, 2014). Issues not addressed adequately in the research paper While analyzing the research papers, it is observed that the papers have not addressed some issue related to the service of the VoIP and Skype. Some of them are discussed below. Reliability issues: The selected report had not addressed the reliability of VoIP services. The quality and confidentiality of the communication are dependent on the different security measures that are adopted by the service providers. Security and stability related issues: On the other hand, the stability of the VoIP calls is dependent on the availability of the internet connection (Abdulhamid et al., 2014). In addition to this, the security related to the VoIP calls is also important which is not addressed in proper manner. As an example it can be said, the VoIP services and other features are provided by Skype voice services, but it stores the call transcripts into a massive database which can be exposed in public domain if any hacker, third party, and government get access to this database. QoS related issues: Moreover, the latency in the data transmission is also not discussed in the report. The latency in the data transmission can be a reason behind the low quality service. This latency can result from three reasons, Propagation delay. Queuing delay. Handling delays in the network. Diagram 2: Latency in the VoIP services (Source: Krawitz Howard, 2015, pp-25) Importance and impact of the detected issues in real world The issues that are not addressed in the paper like latency in the data packet transmission, or the issue of reliability have a huge impact on the quality of the services as well as on the security and confidentiality of user data (Habiba, Islam Amin, 2014). Effect of QoS related issues: The latency in the transmission of data packets gives much more time to the hackers or intruders in the network to intercept the data packets reroute the connection to the hackers device. If a user is communicating with someone through Skype then, this latency in the data packet transmission causes echo of senders voice at the receivers end. Effect of stability related issues: In addition to this stability of the connection also has a huge impact on the VoIP services quality. For VoIP application like Skype it is observed that, with weak internet connections the stability and quality of the voice calls are degraded. Lessons learned from the discussions By analyzing the different advantages and drawbacks of the VoIP services it can be stated that, quality of the service. In order to maintain a better quality of the services, it is important to use servers (like "ASTERISK") which are capable of handling the complex dial plans, voice, video and text codecs. Use of these servers can be helpful in reducing the time which is required for a data packet to cross a network connection and the time a data packet or frame is held by network device before forwarding to the next node (Abdulhamid et al., 2014). Using this server the quality of the service that is degraded due to the packet delay, echo in the data transmission, data packet loss, distortion of the data packets can be avoided. Conclusion In the above sections of the report, we discussed about the different factors that are important to mitigate the different risks and privacy issues involved in the VoIP services. As this technology is still in its initial stages, hence there is scope to improve the quality of the services and privacy of the users who are using the Skype like applications for VoIP services. The assurance of the low latency, high-security measures, high availability and reliability of the service will attract the users to use these services. It is important since, the latency in the transmission of data packets gives much more time to the hackers or intruders in the network to intercept the data packets reroute the connection to the hacker's device. In addition to this, it is the responsibility of the different service providers to monitor the users that, they are not using these services for unethical means and criminal intentions which can affect and breach the privacy of any other user. References Abdulhamid, S. M., Ahmad, S., Waziri, V. O., Jibril, F. N. (2014). Privacy and national security issues in social networks: The challenges.arXiv preprint arXiv:1402.3301. Good, D. W., Lui, D. F., Leonard, M., Morris, S., McElwain, J. P. (2012). Skype: a tool for functional assessment in orthopaedic research.Journal of telemedicine and telecare,18(2), 94-98. Greenwald, G., MacAskill, E., Poitras, L., Ackerman, S., Rushe, D. (2013). Microsoft handed the NSA access to encrypted messages.The Guardian,12. Habiba, U., Islam, M. I., Amin, M. R. (2014). Performance Evaluation of the VoIP Services of the Cognitive Radio System, Based on DTMC.JIPS,10(1), 119-131. Hiew, Y. L. L., Tan, B. H. (2015). Comparing asynchronous and synchronous interaction using online technology.Pertanika Journal of Scholarly Research Reviews,1(1), 40-49. Karthikeyan, S., Manikandan, G., Nishanth, T., Abraar, S. (2015). A New Distributed Application and Network Layer Protocol for VoIP in Mobile Ad Hoc Networks. Krawitz, M., Howard, J. (2015). Should Australian courts give more witnesses the right to Skype?.Journal of Judicial Administration,25. Lazzez, A. (2013). VoIP Technology: Security Issues Analysis.arXiv preprint arXiv:1312.2225. Leu, J. S., Lin, W. H., Hsieh, W. B., Lo, C. C. (2014). Design and implementation of a VoIP broadcasting service over embedded systems in a heterogeneous network environment.The Scientific World Journal,2014. Matousek, P., Kmet, M., Basel, M. (2014). On-line monitoring of VoIP quality using IPFIX.Advances in Electrical and Electronic Engineering,12(4), 325. Miraz, M. H., Ganie, M. A., Ali, M., Molvi, S. A., Hussein, A. H. (2015). Performance evaluation of VoIP QoS parameters using WiFi-UMTS networks. InTransactions on engineering technologies(pp. 547-561). Springer Netherlands. Mosier, J., Joseph, B., Sakles, J. C. (2013). Telebation: Next-generation telemedicine in remote airway management using current wireless technologies.TELEMEDICINE and e-HEALTH,19(2), 95-98. Patinge, S. A., Soni, P. D. (2013). Metamorphosis in VOIP Cloud Computing services used in VOIP.International Journal of Application or Innovation in Engineering and Management,3(2), 236-239. Rehman, U. U., Abbasi, A. G. (2014, December). Security analysis of VoIP architecture for identifying SIP vulnerabilities. InEmerging Technologies (ICET), 2014 International Conference on(pp. 87-93). IEEE. Sadiwala, R., Saxena, M. (2015). Performance Evaluation of Next Generation Networks using OPNET Simulator.Performance Evaluation,2(4). Yang, X., Dantu, R., Wijesekera, D. (2012). Security Issues in VoIP Telecommunication Networks.Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, 763-789.

Sunday, December 1, 2019

The Pardoner And The Brothers Essays - The Canterbury Tales

The Pardoner and The "Brothers" Throughout literature, relationships can often be found between the author of a story and the story that he writes. In Geoffrey Chaucer's frame story, Canterbury Tales, many of the characters make this idea evident with the tales that they tell. A distinct relationship can be made between the character of the Pardoner and the tale that he tells. Through the Prologue to the Pardoner's tale, the character of the Pardoner is revealed. Although the Pardoner displays many important traits, the most prevalent is his greed. Throughout the prologue, the Pardoner displays his greed and even admits that the only thing he cares about is money: "I preach nothing except for gain" ("Pardoner's Tale", Line 105). This avarice is seen strongly in the Pardoner's tale as well. In the Pardoner's tale, three friends begin a journey in order to murder Death. On their journey, though, an old man leads them to a great deal of treasure. At this point, all three of the friends in the tale display a greed similar to the Pardoner's. The three friends decide that someone should bring bread and wine for a celebration. As the youngest of the friends leaves to go buy wine, the other two greedily plot to kill him so they can split the treasure only two ways. Even the youngest decides to "put it in his mind to buy poison / With which he might kill his two companions" (383, 384). The greed, which is evident in the character of the Pardoner, is also clearly seen in the tale. Another trait that is displayed by the Pardoner and a character in his tale is hypocrisy. Although the Pardoner is extremely greedy, he continues to try and teach that "Avarice is the root of all evil" (6). The characters in his tale display great hypocrisy as well. As the tale begins, the friends all act very trustworthy and faithful towards all of their friends. They nobly make a decision to risk their lives while trying to slay their friend's murderer. As they talk about their challenge, they pledge "to live and die each of them for the other, / As if he were his own blood brother" (241-242). At the end of the tale, the "brothers" begin to reveal their true nature. They all turn on each other in an attempt to steal the treasure for themselves. All of the loyalty, which they had pledged, was simply a lie and no faithfulness remained. While the two older "brother" plotted to kill the younger, the younger "brother" plotted "to kill them both and never to repent" (388). Thus, these so-called faithful "brothers" display their true ruthlessness and reveal their hypocrisy in relation to the Pardoner's character. The characters in the "Pardoner's Tale" match the unctuous nature of the Pardoner in a great deal of ways. All of these traits and ideas that are seen in both the Pardoner and the tale that he tells show a strong relationship in the two. Chaucer used this technique in all of the tales that are recorded in Canterbury Tales. This technique gives a greater insight into the mind of the teller. By analyzing the tales, it is possible to learn much about the teller of the tale. Using this method, Chaucer focuses on the characteristics of each of the people involved in Canterbury Tales, but also keeps the poem interesting.

Tuesday, November 26, 2019

Profile of John E. DuPont

Profile of John E. DuPont John E. du Pont was a sports wannabe who inherited millions and bought status into the sporting world that his own physical capabilities could have never achieved. Olympic champion David Schultz, in need of financial sponsoring, lived at du Ponts wrestling camp, a decision that ultimately cost him his life. DuPonts Fortune John E. du Pont, great-grandson of E.I. du Pont, is the heir to the du Pont fortune that was worth over $200 million. After the death of his mother in August 1988, he turned his 800-acre estate in Delaware County, Pennsylvania into a wrestling camp for professional wrestlers. du Pont was also the main benefactor of amateur wrestling in the United States during that time. Paranoid Visions People who spent time around du Pont described his behavior as bizarre. Throughout the years he changed from being odd to increasingly unstable. du Pont was hallucinating that the trees on his property were moving around. He also razor wired his attic because he thought people were going to break in and kill him. His ex-wife complained that during their short marriage from 1982 to 1985, du Pont accused her of being a spy and pointed guns to her head. David Schultz David Schultz was an Olympic champion wrestler who was living on the du Pont property. On January 6, 1996, John du Pont shot several bullets into Schultz, killing him. Reasons for his actions are still unknown. The Stand Off After du Pont killed Schultz he barricaded himself inside his massive mansion. Police negotiated with the 56-year-old du Pont for two days. On the second day, the temperature was extremely cold so the police disabled the homes heating. du Pont exited his home to investigate what was wrong with his heater and the police were able to overcome him and take him into custody, charging him with murder. DuPonts Trial During du Ponts trial, it was determined that he was mentally ill. He was found guilty of third-degree murder and sentenced to up to 30 years in prison or a mental institution; whichever best fits his mental state until he completes his sentence. He was also required to reimburse Delaware $742,107 for trial costs. Personal Information: Born - 1938Birthplace - FranceGender - MaleReligion - UnknownEthnicity - White Criminal Record: 1988 - Sexual Harassment - Lawsuit filed by Andre Metzger.Feb. 26, 1997 - Assault - Pointing his gun at a security consultant.Feb. 26, 1997 - Murder - Shot and killed Olympic wrestler David Schultz.

Saturday, November 23, 2019

The History Behind the Ballad of Mary Hamilton

The History Behind the Ballad of Mary Hamilton A folk ballad, possibly no older than the 18th century, tells a story about a servant or lady-in-waiting, Mary Hamilton, at the court of a Queen Mary, who had an affair with the king and was sent to the gallows for drowning her illegitimate child. The song refers to four Maries or four Marys: Mary Seaton, Mary Beaton,  and Mary Carmichael, plus Mary Hamilton. The Usual Interpretation The usual interpretation is that Mary Hamilton was a lady-in-waiting at the Scottish court of Mary, Queen of Scots (1542-1587) and that the affair was with the Queens second husband, Lord Darnley. Accusations of infidelity are consistent with stories of their troubled marriage. There were four Maries sent to France with the young Mary, Queen of Scots, by her mother, Mary of Guise, when the Scottish queen (whose father died when she was an infant) went to be raised there to marry the French Dauphin. But the names of two in the song are not quite accurate. The four Maries serving Mary, Queen of Scots, were Mary Beaton, Mary Seton, Mary Fleming, and Mary Livingston. And there was no story of an affair, drowning and hanging historically connected with the real four Maries. There was the 18th-century story of a Mary Hamilton, from Scotland, who had an affair with Peter the Great, and who killed her child by Peter and her two other illegitimate children. She was executed by decapitation on March 14, 1719. In a variation of that story, Peters mistress had two abortions before she drowned her third child. It is possible that an older folk song about the Stewart court was conflated with this story. Other Possibilities There are other possibilities that have been offered as roots of the story in the ballad: John Knox, in his History of the Reformation, mentions an incident of infanticide by a lady-in-waiting from France, after an affair with the apothecary of Mary, Queen of Scots. The couple was reported to have been hanged in 1563.Some have speculated that the old Queen referred to in the song was the Queen of Scots Mary of Guelders, who lived from about 1434 to 1463, and who was married to Scotlands King James II. She was regent for her son, James III, from her husbands death when a cannon exploded in 1460 to her own death in 1463. A daughter of James II and Mary of Guelders, Mary Stewart (1453 to 1488), married James Hamilton. Among her descendants was Lord Darnley, husband of Mary, Queen of Scots.More recently, Englands George IV, while still the Prince of Wales, is rumored to have had an affair with a governess of one of his sisters. The governess name? Mary Hamilton. But no story of a child, much less infanticide. Other Connections The story in the song is about unwanted pregnancy; could it be that the British birth control activist, Marie Stopes, took her pseudonym, Marie Carmichael, from this song? In Virginia Woolfs feminist text, A Room of Ones Own, she includes characters named Mary Beton, Mary Seton and Mary Carmichael. The History of the Song The Child Ballads were first published between 1882 and 1898 as The English and Scottish Popular Ballads. Francis James Child collected 28 versions of the song, which he classified as Child Ballad #173. Many refer to a Queen Marie and four other Maries, often with the names Mary Beaton, Mary Seaton, Mary Carmichael (or Michel) and the narrator, Mary Hamilton or Mary Mild, though there are some variations in the names. In various versions, she is the daughter of a knight or of the Duke of York or Argyll, or of a lord in the North or in the South or in the West. In some, only her proud mother is mentioned. Select Stanzas The first five and the last four stanzas from version 1 of Child Ballad #173: 1. Words gane to the kitchen,And words gane to the ha,That Marie Hamilton gangs wi bairnTo the hichest Stewart of a.2. Hes courted her in the kitchen,Hes courted her in the ha,Hes courted her in the laigh cellar,And that was warst of a.3. Shes tyed it in her apronAnd shes thrown it in the sea;Says, Sink ye, swim ye, bonny wee babe!Youl neer get mair o me.4. Down them cam the auld queen,Goud tassels tying her hair:O marie, wheres the bonny wee babeThat I heard greet sae sair? 5. There never was a babe intill my room,As little designs to be;It was but a touch o my sair side,Come oer my fair bodie.15. Oh little did my mother think,The day she cradled me,What lands I was to travel through,What death I was to dee.16. Oh little did my father think,The day he held up me,What lands I was to travel through,What death I was to dee.17. Last night I washd the queens feet,And gently laid her down;And a the thanks Ive gotten the nichtTo be hangd in Edinbro town!18. Last nicht there was four Maries,The nicht therel be but three;There was Marie Seton, and Marie Beton,And Marie Carmichael, and me.

Thursday, November 21, 2019

Space Cowboys Film and Genre Essay Example | Topics and Well Written Essays - 1500 words

Space Cowboys Film and Genre - Essay Example This film has been penned by Ken Kaufman and Howard Klausner of which Clint Eastwood has given superb direction. This is a pretty entertaining and one of the more rambunctious films that have been directed by Eastwood whereby they have clearly explored the idea with vitality and a sense of dynamism. The movie has put a very unique kind of spin on the formula that the longer one lives; the lesser is his worth with the passage of time. The story is set from the scene of 1958 in which pilots Frank Corvin played by Clint Eastwood himself and Hawk Hawkins, by Tommy Lee Jones are members of Team Daedalus, which is an elite Air Force group that is bent upon testing the high-altitude planes as well as dreaming of becoming the first American astronauts to do so. It is unfortunate to mention here that when this very dream does not see the light of the day, Frank starts blaming Bob Gerson, played by James Cromwell who is his commander for betraying him in the middle of the accomplishment of the dream mentioned above. After duration of four decades now, this same individual has become a NASA big shot who has got a huge problem up his sleeves. A huge Soviet satellite, which is named Ikon, has become dysfunctional and is threatening to fall out of orbit and then crash into the region of the earth. Indeed, it is true that similar in notion to the confusion surrounding the US space agency and its affiliates, this guidance system for the satellite is in more ways than one quite similar to that with one of Skylab that was initially put in place by Frank Corvin.

Tuesday, November 19, 2019

Management of Hazardous Materials in a Dental Office Assignment

Management of Hazardous Materials in a Dental Office - Assignment Example Employers should provide for their employees in a dental office the necessary equipment to protect them from bloodborne pathogens. Such devices include syringes whose needle is shielded with a sheath after use and needles that can be drawn back into a syringe immediately after use to avoid pricking or exposure of extracted blood. Taps with constant running water should also be availed for use in cleaning eyes in case of exposure. Gloves are also a necessity as it is hazardous to handle blood with bare hands. An employee should also get a means to flush any secretions, saliva or mucous membranes in the case of exposure. Safe disposal of sharp objects is vital in preventing exposure to bloodborne pathogens among dental care workers. This safe disposal involves the use of sharp containers which are puncture-resistant. Such should be labeled correctly and placed out of reach of children and other patients. They should also be waterproof to prevent the flow of infected blood from them. The sharp containers should have an opening wide enough to allow easy placement of disposable sharp objects and should never be over-filled. Once full, it should be safely sealed and disposed of. MSDS is a document outline the safety and emergency procedure for workers in terms of handling a substance, its physical data, and storage requirements, how to dispose of it and how to act in case it spills. Such information safeguards workers against poor handling of hazardous substances and identifies the dangers of contact and contamination. MSDS can vary by country and supplier. A color code, combined with a 0 to 4 number rating, was developed to assist in compliance with OSHA communication standards in terms of identifying hazards.  

Sunday, November 17, 2019

Unification of Germany Essay Example for Free

Unification of Germany Essay Economic success, political failure, and diplomatic tension marked the idea of a unified Germany in the period after the Napoleonic Wars. It was not clear around which power, Austria or Prussia, Germany could achieve national unification (Merriman 2010). Prussian merchants, with the support of the Prussian crown, established the customs and trade union known as the Zollverein in 1834 (AP Central German Unification 2013). The Zollverein freed trade between most of the German states, with the exception of Austria. The upper class were wary of any change that might threaten the status quo and feared the strong nationalist feeling unleashed by the revolution, the expansion of which might lead to, they reasoned, the proclamation of the equality of all citizens (Merriman 2010). Industrialists and merchants thus brought liberal politics into German nationalism. During the Revolution of 1848, liberals met in the Frankfurt Assembly and drafted a constitution modeled on the ideals of the French Revolution of 1789 (AP Central German Unification 2013). The assembly offered to share power under a constitutional monarchy and offered the crown of a unified Germany to Frederick William IV of Prussia. The Revolution of 1848 brought some liberal reforms to Prussia, such as the ability of the parliament to obstruct certain forms of taxation. However, the Prussian leadership, which was thoroughly conservative, rejected the Frankfurt constitution, preferring reform and unification directed from above. Austrias resistance of attempts to unify Germany under Prussian leadership further obstructed unification. One of the major questions concerning German unification centered on this Prussian-Austrian rivalry, which was both diplomatic and cultural. Supporters of Greater Germany insisted that Prussians and Austrians, with a common language naturally, should be part of one nation. However, proponents of Lesser Germany argued that Austria should be excluded from unification due to dynastic rivalry between the Hohenzollerns and the Hapsburgs and the cultural differences between a mostly Protestant Prussia and Catholic Austria (AP Central German Unification 2013). Figure 1 : Kaiser Wilhem I German Emperor (18 January 1871 – 9 March 1888) The Wars of German Unification The path to unification for Germany came through diplomacy and war. The French defeat at the Battle of Sedan and annexation of Alsace-Lorraine brought Bavaria into the German Confederation, and William I became the first monarch of the German Empire (AP Central German Unification 2013). In 1862, Wilhelm I of Prussia appointed Otto von Bismarck prime minister. Bismarck’s name became closely identified with the term Realpolitik, or â€Å"the politics of realism† (Muntone 2011). Bismarck was a very able man, both pragmatic and determined. Bismarck’s focus was on a united Germany with a strong monarch. Bismarck’s belief in a strong monarchy made him a political conservative and in the 1860’s he was faced with a hostile liberal majority in Parliament (Muntone 2011). Therefore, Bismarck directed the nation’s attention to foreign affairs. This would allow him to maintain control of the domestic policy, since civilian populations always accepted special government controls and restrictions during wartime. In 1864 Bismarck trumped up charges against the Danish government for their treatment of Germans living in the Danish province of Schleswig-Holstein. Prussias defeat of Denmark and annexation of Schleswig-Holstein set Prussia on a collision course with Austria for dominance of central Europe. Following the defeat of the Austrian Empire in 1866, the German states allied with Prussia, with the notable exception of Catholic Bavaria, forming the North German Confederation. In his first two wars, Bismarck balanced Russian and French concerns over the growing power of Prussia. In the former, Bismarck manipulated long-standing Russian mistrust of Austria to form an alliance. With France, Bismarck benefited from Emperor Napoleon IIIs failed campaign in Mexico, which distracted the French from European affairs. This was only temporary and the Franco-Prussian War began in 1870. Figure 2: Otto Von Bismarck Prime Minister of unified Germany The opportunity for the final step in German unification arrived in 1870. Bismarck decided to go to war with France, believing that the other German states would come to Prussia’s aid. He changed the wording of a press release so that it gave the appearance of a deliberate insult from the Prussian king to the French emperor (Muntone 2011). On reading the statement, Napoleon III immediately declared war on Prussia. As Bismarck had calculated, the southern German states allied themselves with Prussia against their common enemy, France (Muntone 2011). The war can accurately be describe as â€Å"Franco-German† rather than â€Å"Franco- Prussian† because many German states besides Prussia played a major role in defeating the French(Muntone 2011). The efficiency and superior strategy of the German military brought the French to a speedy surrender. The peace treaty gave Germany control of Alsace and Lorraine, and provided for a compensatory payment to Prussia of 5 billion francs. Although Prussia had provoked the war, France had technically been the aggressor, and at any rate was on the losing side (Muntone 2011). Figure 3: German Empire of 1871 Conclusion On January 18, 1871, Wilhelm I of Prussia was officially crowned emperor of Germany. Below is a copy of the imperial proclamation on January 18, 1871 that unified Germany as a nation: The Imperial Proclamation, January 18, 1871 Whereas the German princes and the free cities have unanimously called upon us to renew and to assume, with the restoration of the German Empire, the German imperial office, which has been empty for more than sixty years; and Whereas adequate arrangements have been provided for this in the constitution of the German Confederation;We, Wilhelm, by the grace of God King of Prussia, do herewith declare that we have considered it a duty to ur common fatherland to answer the summons of the united German princes and cities and to accept the German imperial title. In consequence, we and our successors on the throne of Prussia will henceforth bear the imperial title in all our relations and in all the business of the German Empire, and we hope to God that the German nation will be granted the ability to fashion a propitious future for the fatherland un der the symbol of its ancient glory. We assume the imperial title, conscious of the duty of protecting, with German loyalty, the rights of the Empire and of its members, of keeping the peace, and of protecting the independence of Germany, which depends in its turn upon the united strength of the people. We assume the title in the hope that the German people will be granted the ability to enjoy the reward of its ardent and self-sacrificing wars in lasting peace, within boundaries which afford the fatherland a security against renewed French aggression which has been lost for centuries. And may God grant that We and our successors on the imperial throne may at all times increase the wealth of the German Empire, not by military conquests, but by the blessings and the gifts of peace, in the realm of national prosperity, liberty, and morality. Wilhelm I, Kaiser und Konig (Halsall 1998). In a final insult to the French, the Germans held the ceremony in the Hall of Mirrors at Versailles. Nationalism was a major force in the creation of the German Empire. Both the nobles and the common people supported unification. In contrast to the treatment given to Austria in 1866, the conditions imposed on France in 1870 and 1871 were very harsh (World History at KMLA 2008). For the following decades, the recovery of Alsace-Lorraine was a political goal of French diplomacy, and one of the roots for World War I (World History at KMLA 2008). Unification was accomplished with the approval of most, but not of all Germans. Especially in Hannover, annexed in 1866, the aversion of Prussia remained strong and Hannovers representatives in Germanys Reichstag, the Welfen, were in constant opposition (World History at KMLA 2008). The Catholic Bavarians remained skeptical of the new Empire. The army had been the most visible instrument by which unification had been achieved. In the German Empire, the defense forces were revered. The state failed to establish a mechanism ensuring state control over the army. When World War I began, military reasoning (crossing Belgium to get into France, the Schlieffen-Plan) won out over political reasoning (World History at KMLA 2008). The breach of Belgiums neutrality was the main reason for charging Germany with sole responsibility for World War I.

Thursday, November 14, 2019

Meiosis :: essays research papers

Meiosis is a specialized form of nuclear division in which there two successive nuclear divisions (meiosis I and II) without any chromosome replication between them. Each division can be divided into 4 phases similar to those of mitosis (pro-, meta-, ana- and telophase). Meiosis occurs during the formation of gametes in animals. Meiosis is a special type of cell division that occurs during formation of sperm and egg cells and gives them the correct number of chromosomes. Since a sperm and egg unite during fertilization, each must have only half the number of chromosomes other body cells have. Otherwise, the fertilized cell would have too many. Inside the cells that produce sperm and eggs, chromosomes become paired. While they are pressed together, the chromosomes may break, and each may swap a portion of its genetic material for the matching portion from its mate. This form of recombination is called crossing-over. When the chromosomes glue themselves back together and separate, each has picked up new genetic material from the other. The constellation of physical characteristics it determines is now different than before crossing-over. In Meiosis 1, chromosomes in a diploid cell resegregate, producing four haploid daughter cells. It is this step in Meiosis that generates genetic diversity.Meiosis 2 is similar to mitosis. However, there is no "S" phase. The chromatids of each chromosome are no longer identical because of recombination. Meiosis II separates the chromatids producing two daughter cells each with 23 chromosomes (haploid), and each chromosome has only one chromatid. During prophase I, homologous chromosomes pair and form snynapses. The paired chromosomes are called bivalents, and the formation of chiasmata caused by genetic recombination becomes apparent. The bivalent has two chromosomes and four chromatids, with one chromosome coming from each parent. In prometaphase I, the nuclear membrane disappears. One kinetochore forms per chromosome , and the chromosomes attached to spindle fibers begin to move. In metaphase I, bivalents, each composed of two chromosomes, align at the metaphase plate. The orientation is random, with either parental homologue on a side. This means that there is a 50-50 chance for the daughter cells to get either the mother's or father's homologue for each chromosome. In anaphase I, chiasmata separate.

Tuesday, November 12, 2019

Taboos: Cultures

In the world we live in there are multiple taboos. Depending on your culture, religion and beliefs many strange and bizarre things are completely normal to some people and even animals throughout the world. Taboos are what people find to be strange and unusual practices or what unique things people may do or eat in different parts of the world. Different cultures would consider strange things to eat as a delicacy in some areas or cultures and wouldn’t even dream of being eaten in other cultures. Sometimes they could even be forbidden or illegal by certain beliefs. Some religious taboos even reach to the extreme of whether or not to wear clothing. Cultures in different parts of the world believe in living in a non urban life style and not wearing any clothing, which is considered a nudist colony. Different taboos are accepted in parts of the world for traditional reasons, cultural beliefs and a variety of religion beliefs. In some parts of the world, people or cultures enjoy very different foods and consider these delicacies. In some cultures they hunt for their food. These cultures never waste any part of the animal’s body. All of the animal’s body parts are edible to them. They will even eat all the organs of the animal. These cultures actually believe that certain organs are aphrodisiacs. These delicacies are very rare and hard to locate. This is the reason why they are considered a delicacy and are so expensive. Some different examples, I found interesting in cultures throughout the world: They would include people eating insects anyway you can imagine. However, you would never find these in an American restaurant. Another is in some areas rats are like field animals and people eat them like they are a squirrel or rabbit. American on the other hand thinks that rats are dirty and disgusting animals. This is because they live in filth in city sewage and garbage dumps. Also, rats carry multiple diseases. In other countries the rats live in fields, eat grass and seeds. The rats are raised in a very different environment in other countries. The rats are sold at local village markets. Manifest functions and dysfunctions are conscious and deliberate, the latent ones the unconscious and unintended and unrecognizable. I realize that these cultures taboos are to survive and this is why they don’t waste anything. In some cultures and countries this is always the case because look at America. In our country people take advantage of just having money and being able to go buy whatever they want. Many people in our country waste things including foods. They wouldn’t even dream of eating organs or insects. They buy their food and when finished most people throw the leftovers in the garbage. Without even thinking twice about it and in other countries people and children don’t even get one meal a day let alone 3 or 4 snacks whenever they want them. Manifest functions are the consequences that people observe or expect and the latent functions are those that are neither recognized nor intended. A latent function of a behavior is not explicitly stated, recognized, or intended by the people involved. So many of these cultures are actually latent because these taboos are very important to them for the fact of survival not as a delicacy as some rich people looking for these types of foods. They hunt because they have to in order to survive. Along with eating every part of the animal because wasting any part on the animal will be less food for them to eat, especially since they may not find more food for a day or maybe a few. In my opinion, I feel that to these cultures or religions taboos are very positive to them. Because they use their surroundings and the earth to survive and they don’t waste anything because they appreciate that they actually do have whatever food they caught for that day or week. Some cultures even use the rest of the animal such as fur and bones to make things.

Sunday, November 10, 2019

Journal on “Beneath the Shadows of the Freeway”

The main point of the author in the poem, Beneath the Shadows of the Freeway, is that a woman, even if she’s married to a man, should still be able to support herself and not be solely dependent on her husband. In addition, the author pointed out in the poem that as a woman grows old she should learn basic skills in life that would allow her to survive. To illustrate her points in the poem, the author used two characters, grandma, who is an independent woman, and her granddaughter, who is a woman still learning how to become independent.In other words, the grandmother represents the past as she is experienced and does not rely on anyone else to survive while her granddaughter represents the future as she is still learning to be self-supporting. In the poem, the author portrayed how grandma lived her life after she left her husband who almost tried to kill her. The grandmother was depicted as a woman with various skills such as planting geranium and, as stated in the poem, bein g able to â€Å"trust what she builds with her own hands.† In addition, the author also showed the granddaughter’s admiration for her grandmother and her survival skills. This was shown in the last lines of the poem wherein the granddaughter said that someday she too will be able to learn how to plant geraniums and build things with her own hands. In short, the granddaughter believed that she must acquire the skills of her grandmother so that she won’t be solely dependent on her man and would learn to stand up on her own two feet.The author was very convincing in emphasizing her points throughout the poem as she used situations that are happening in the real world. She used the grandmother as a symbol of an independent woman who young girls should emulate, which is shown in the granddaughter’s desire to become like her grandma when she grows old. I basically agree with the author that a woman should learn how to be independent even if she is married as th is will greatly help her in situations wherein her husband is not present.

Thursday, November 7, 2019

Best Book Blogs for Avid Readers

Best Book Blogs for Avid Readers For those of us lost in the world of fiction, the question will always be, What should I read next? To that end, we search the depths of second-hand bookstores. We scour our local libraries, or the Amazon best-seller list and recommended purchases. We do this not simply to find a book that we will enjoy, but almost always to find a novel which strikes the same spark in our heart as the last masterpiece (the one which has now been read so often and so thoroughly that the pages have come loose in their binding).To that end, Silent Book Club, Bookanista and Book Smugglers are here to help. These three websites scratch the itch of the endlessly-reading reader; and they provide more than just a blog – they provide a cozy community of fellow readers.Silent Book ClubSilent Book Club is a website for readers like us (often introverted, sometimes too introverted) to come together and discuss their current favorite novels, and to find the next piece of fiction that really blows us away. The website boasts more than thirty active chapters, from London, England to Nagoya, Japan, which come together (usually monthly) to discuss their latest read. Silent Book Club has an active Facebook group, and they post regularly on Instagram and Twitter.For those of us with our fingers on the pulse of the book world, Silent Book Clubs use of social media is indispensable. It keeps its readers up to date on events, meetups and attractions in the world of reading and publishing. Still, the book club is growing, and though it has already stretched worldwide, the presence of a chapter in your hometown might be lacking. No matter! Silent Book Club will help you set up your own official chapter, and help you create a new tradition (your own personal meetup) in your neighborhood.This all seems too good to be true, and of course, cynical minds immediately begin whirring: we ask questions about where the site finds its profits, or what supports this community. The answer is that they run a small merchandise shop, and those proceeds go toward supporting volunteers, which keep the whole community running smoothly. Its a cute little e-shop with a selection of kitschy bookmarks, postcards and handbags (and, of course, the occasional book).Other than these optional purchases to support the community, all the services offered by the silent book club are free of charge. In fact, without even submitting an e-mail address, you can browse their calendar of meetups and find the one nearest you. This great community provides the opportunity, without commitment, for us to crawl out of our favorite arm-chair (the one we sunk into years ago and have now fortified with a particular side-table for our tea, an arm upon which the cat perches, and a bag at the side filled with knitting projects).On top of this call to action, to bring us out to the meetups, the silent book club boasts a warm blog: a welcome resource for readers. Each article is written by volunteers from the various si lent book club chapters, and if you start your own chapter, then you can contribute to the blog yourself. Though often insightful, because of the volunteer nature of the contributions, updates are sporadic – sometimes they come too fast to keep up with, and other times lag to only a single update each month. Still, when the articles are posted, they offer unique insight into the author of the post, and that writers book club.One recent article, written by the organizer of the Portland, Maine chapter, gives a wonderful overview of influential poets throughout the years. It was written for poetry month and includes excerpts by which to judge each of the poets, and gauge ones interest before delving more deeply into their works.Most articles discuss comfortable topics like what to read next and offer insightful critiques written on new works of fiction. Others delve into matters of political interest, in the reading and writing world. For example, a short series of posts called Read the World, gives details about historical publishing in nations and geographic areas, and suggests where one might begin if they want to explore the fiction of a certain area. Further still, other posts discuss the rise of audiobooks, and their place in the silent book club; they give details on how to host your own silent book club, and what makes the meetups successful. Other articles address the We Will Not Be Silent campaign, which offers a toolbox to activists, as well as hard-hitting subjects such as the effect of literature on children and on developing minds.Finally, I have personally found Silent Book Clubs presence on Facebook to be incredibly beneficial. The core Facebook group @silentbookclub is one resource: it offers updates on all the events which the silent book club promotes, and it helps us introverts look ahead to getting out of the house (and plan out our busy week so we can make time for the meetups); it brings book news like releases and author interviews conveniently into our Facebook feed; and it gives the opportunity (without being pushy) to participate in demonstrations or political activism.Beyond this core group, however, are a network of smaller silent book club groups, one for each chapter. These are usually beyond amazing. Just by making a quick search in Facebook, I stumbled on three silent book club chapters, all with very active Facebook groups. One was in my home city, and each of the other two were within quick driving distance. These sub-communities are the result of the natural branching and expanding of a good idea. Like a good book, readers know that a good idea should be shared.BookanistaThe writers at Bookanista.com refer to their site as a web magazine (as opposed to a blog). This professional demeanour isnt simply a pretentious grab for new readers: their posts are closer to scholarly journal entries than the topical discussions of many bloggers, and they take a deep dive into each discussion.That being said, it s less likely that youll find a new read in a quick skim of Bookanista. The themes and discussions on the site are often much wider, addressing issues of mental illness and gender in novels, and delving into ideas such as ambiguity in writing, and the pitfalls of considering everyone who writes a poem, a poet. With an archive stretching back to 2015, and an extensive collection of short stories and extracts, Bookanista has content to spare. There is bound to be something on the site which snags any readaholics imagination, and because of their reputation, Bookanista is often one of the first sites to get review copies and exclusive excerpts from new authors.Similarly, if you are the kind of reader who devours all the works of an author before moving on, but youve run out of your favorite writers works, then Bookanista might be able to find you a new literary love. Their author interviews are a source of insight into the latest trends in publishing and up-coming novels. They often ob scure the work itself in favor of addressing the authors method, or their stylistic choices. Rather than attempt to describe the works of each author, they let the novels and short stories speak for themselves, publishing short pieces of fiction alongside interviews and articles. Everything on Bookanista is free, and well worth a look.The Book SmugglersTheBookSmugglers.com describe themselves as, A book review blog specializing in speculative fiction and popgeekery for all ages since 2008; A digital-first publisher of speculative fiction and nonfiction since 2014; the 2017 Hugo Nominee for best Semiprozine; and a duo of awesomely badass book nerds. Their blog posts focus on new works, but especially science fiction and fantasy. For those looking for their next great read, their current headlining article is a piece called X Marks the Story, which seeks to pair the reader with excellent short fiction, to hopefully bridge the gap between great novels.On top of their blog, the book smu gglers are a publishing house with a focus on digital press. They offer book reviews for newly published novels, and support authors by showing off full and partial works on their site, in addition to longer works published by the book smuggler online imprint.Like Bookanista, the book smugglers host a collection of short fiction on their site in a section called Gods and Monsters. This section is worth a quick look, and if you are a fantasy or science fiction buff, it warrants a much longer look. The short stories included in Gods and Monsters are each written by different authors, but always play with similar themes. From religion, to humanity, to serial killers or werewolves, each story is focussed on gods and monsters, either literally or figuratively (or both). Just a quick glance at this portion of the site will find you in the company of dozens of well-polished, professionally edited shorter fictions.The wider communityThe blogs discussed here are not where these communities e nd. Silent book club, Bookanista and The Book Smugglers have a network of readers which place an emphasis on doing. Each of these sites is concerned with getting out of your chair and making change alongside like-minded individuals – or just on getting out of the house and swapping books with new friends. To this end, Silent Book Club is anything but silent within the Twitterverse. They have cultivated a massive network of friendships, bringing together dozens of sites, each with a similar attitude towards reading. Each of these three excellent blogs boast very active Twitter handles. Silent Book Club at @readwinerepeat, @bookanista, and @booksmugglers bring together a wealth of related content and inspiring images. Browsing through their combined Twitter profiles is a sure method to link a reader to a community in their geographic area, or a cause which interests them and brings them out of their shell. We all have something which gets us fired up and out of the house, and t hese communities provide valuable links to those places and people which help to establish communities of readers.In short, reading can be isolating, but it can also be the bridge of shared experience that brings like-minded individuals together in service of a cause, or to discuss the matters which are important to us. Getting out of our arm chair may be a bit uncomfortable, but so long as it means a quiet read, with those who had to struggle out of their own comfy armchair; and as long as it means a glass of good wine, and the presence of good companions; as long as the silent book club, Bookanista and the book smugglers are asking these things of us, I think we can find some time to meet in the real world (or at the very least on twitter), even if it is only to discuss the fictional worlds we love.

Tuesday, November 5, 2019

Could The Essay Expert be out of a Job LinkedIn Introduces Profile Makeovers

Could The Essay Expert be out of a Job LinkedIn Introduces Profile Makeovers I need your help. LinkedIn announced on August 9, 2011 that they have rolled out yet another new feature on their site:   the â€Å"Improve Your Profile Tool.†Ã‚   According to the LinkedIn blog, this tool â€Å"analyzes your profile and offers you personalized profile recommendations to help you put your best foot forward.† Clichà ©s aside, this tool could be extremely useful to you if your profile is not 100% complete, or if you have failed to include key information. Here’s my problem:   I ran the Profile Makeover on my own profile, and all it told me was that I didn’t advertise my date of graduation from high school (I left it out by choice, as some of you might as well); I didn’t list the degree I got from high school (pretty obvious isn’t it?); and I didn’t specify the concentration of my J.D. (there wasn’t one – a J.D. is a J.D.). Where I’m left, as a LinkedIn profile writer and editor, is that I have no idea what other types of suggestions LinkedIn might make to its users who have not optimized their profiles. That’s where you come in. I would love for you to put your profile through the Improve Your Profile process and report back on this blog what the tool tells you is missing or incorrect in your profile. I will then know what advice I should be giving to people about LinkedIn, and what information LinkedIn will take care of.   I don’t want to be duplicating things unnecessarily!   The data you provide will greatly inform the content I choose to convey in my e-book and LinkedIn webinars. To use the tool, start at LinkedIn’s article, LinkedIn Profile Makeovers just got easier, and then click in â€Å"Improve your LinkedIn Profile today!† Are you game?   I look forward to learning from the community what improvements LinkedIn thinks you should make to your profile. I promise to make good use of your comments.   And I don’t really think I am out of a job†¦Ã‚   I just won’t be doing the things a computer can do quite well on its own.   Just in case, though, maybe I should make sure my LinkedIn profile is updated. Any ideas on how I can do that? Category:Archived ArticlesBy Brenda BernsteinAugust 15, 2011 22 Comments Elaine Carr says: August 16, 2011 at 3:25 am Well I tried it as well the only things I got back were it wanted my attendance dates at university (left out on purpose) wanted to know if there were any other schools I attended. Nothing else, so not much help. Log in to Reply The Essay Expert says: August 16, 2011 at 8:54 am Thanks Elaine. I suppose theres only so much feedback a computer can provide. Log in to Reply Mark Dripchak says: August 16, 2011 at 5:30 am I received feedback similar to yours (dates of attendance for both undergrad and graduate studies) and one asking for more details for a very short-term consultancy, the title of which was very comprehensive: Proposal and Report Preparation. I was surprised/disappointed that there was nothing concerning keywords. You may not be out of a job after all! Log in to Reply The Essay Expert says: August 16, 2011 at 8:54 am Im surprised and disappointed too Mark, though of course pleased that I still have work to do 🙂 Log in to Reply Steve Kunzer says: August 16, 2011 at 7:42 am Ran the improver on my profile (previously rated as complete) and it suggested: 1. fill in current position (havent updated my latest (temping) position) 2. add another school (deliberately left off schools) 3. add more skills That was all an extremely simple you havent filled in this field, therefore you need to fill in this field. Hardly a detailed algorithm, and not particularly helpful. Log in to Reply The Essay Expert says: August 16, 2011 at 8:52 am Thanks Steve. Pretty basic! Im feeling pretty confident there is still work for me to do! Log in to Reply The Essay Expert says: August 16, 2011 at 8:48 am Well it seems we have a definite pattern here, and that I can keep my day job. Thank you Michelle! Its true that its a good idea to add the Skills section to your profile. You can just enter your specialties there in addition to putting them in the Specialties section. Do what you can to fill them in they are searchable as their own section and some recruiters and other power LinkedIn users will be looking there! Log in to Reply The Essay Expert says: August 16, 2011 at 8:51 am Thanks Larry. I am particularly interested in your response since you have a public profile URL that still has extra symbols at the end (https://www.linkedin.com/pub/larry-sochrin/0/351/7b2). Im surprised LinkedIn didnt catch that and prompt you to create a vanity URL! BTW, I would recommend adding skills like Business School Admissions, MBA Admissions Consulting, etc. Log in to Reply The Essay Expert says: August 16, 2011 at 8:53 am The false sense of security could be a problem. I hope the rest of the LinkedIn community realizes there is so much more that can be done with a LinkedIn profile! Youre very welcome for bringing the Makeover to your attention! Log in to Reply The Essay Expert says: August 16, 2011 at 9:10 am Thank you everyone. This is the most comments Ive gotten on a blog article EVER! Ill have to ask for your help more often 🙂 Log in to Reply The Essay Expert says: August 16, 2011 at 12:25 pm Guiding light I like it! I think I might use that in my marketing materials 🙂 Log in to Reply The Essay Expert says: August 16, 2011 at 2:59 pm Thank you Kevin for the report. Who is Elaine? Did you mean Brenda? Log in to Reply The Essay Expert says: August 16, 2011 at 2:59 pm LOL thanks Jan. I can sleep easy now! Log in to Reply The Essay Expert says: August 17, 2011 at 6:54 am Strange the one thing I expect from computer programs is consistency! Log in to Reply The Essay Expert says: August 17, 2011 at 1:14 pm So it looks like maybe my own webinars are putting me out of a job 🙂 Log in to Reply Judi Hays says: August 17, 2011 at 11:03 pm Not true. Theres always going people new to LI that will need the knowledge your webinars have to offer. Log in to Reply The Essay Expert says: August 18, 2011 at 12:44 am Thank you Judi. I didnt really think I was out of a job though I did want to know how thorough LinkedIns tool would be! Log in to Reply The Essay Expert says: August 17, 2011 at 2:58 pm Im glad to hear LinkedIn recommends that you fill in a Summary section. Its a key section of your profile! If you want assistance with making sure the summary is written effectively, let me know! Log in to Reply The Essay Expert says: August 17, 2011 at 7:02 pm Thanks Avi. I wonder what it meant by Appear in keyword searches. I suppose you need a human to tell you how to do that! Log in to Reply The Essay Expert says: August 17, 2011 at 8:03 pm Thanks Leigh! I do recommend adding the Skills section in ADDITION to the Specialties section. The two sections are searched differently so it is worth duplicating efforts! Log in to Reply Judi Hays says: August 17, 2011 at 11:01 pm The only improvement it suggested was to add the dates of my education. Thats not really much of an improvement. I think the value you add is that you are actually reading the profiles. LI is just scanning for blank fields. Log in to Reply The Essay Expert says: August 18, 2011 at 12:45 am Thank you Judi. I do indeed read every word when I work with someone on a profile. Log in to Reply

Sunday, November 3, 2019

Adventures in New Zealand Essay Example | Topics and Well Written Essays - 1000 words

Adventures in New Zealand - Essay Example Maori were tribal societies (iwi) ruled by chiefly rulers who were thought to be descendants of gods. The European and the western influence first injected into their society in 1642. Briton James Cook, a British explorer established harmonious relation with them. By the 1800s emerging concept of colonization made frequent visits of European ships into New Zealand. Severe permeation of the Europeans resulted in the alteration of the Maori culture and reduction in their population followed by conflicts and turmoil. British rule in New Zealand was established by signing the treaty of Waitangi between the Maori representatives and the British. The treaty granted British citizenship to the Maori and recognized their land rights (Gream 1999). In his famous book Adventure in New Zealand  Jerningham elucidated his experience of the expeditions encountered by him in New Zealand and also his interaction with the Maori tribe. First, I am going to focus upon a part of the book in this paper w here Jermingham set out for the purchase of the Port Nicholson in New Zealand. I will also bring into focus his interaction with the Maori. Secondly, I will depict the author’s viewpoint about the Maori and the contrast between Europeans and the Maori. Biography of Edward Jerningham Wakefield A literary maestro and highly intellectual British politician, Edward Jerningham Wakefield (1820-1879), son of the colonist Edward Gibbon Wakefield spent his early childhood in England serving as an agent and explorer for his father’s chief colonial enterprise, the New Zealand Company, which was involved in land settlement deals. In August 1839 he arrived in New Zealand and engaged himself in the works of land purchasing expeditions. His explorations were mainly concentrated in the districts of Wanganui, Upper Rangitikei, Taupo and Nelson. In 1850 he moved to Christchurch in New Zealand and had two stints as a member of parliament and died in 1879. The contemporary period of his l ifetime was generally referred the era of colonization. His father Edward Gibbon Wakefield was known for his significant role in reaping enormous profits through his land settlement enterprise, the New Zealand Company. Jerningham Wakefield was a hardcore proponent of colonization and well known for his colonial explorations in South Australia, Canada and New Zealand. Adventure in New Zealand   The Tory (name of the ship) expedition was led by Edward senior’s brother, Colonel William Wakefield and his son Edward Jerningham Wakefield who was then 19 years old. Jerningham was the secretary of his uncle and was vested with the responsibility of executing various transactions. They planned to purchase Port Nicholson. On September 25th, 1839 the goods intended to be presented were arranged in the deck of Tori where hundreds of natives were present. Although the natives conversed among themselves, they did not hinder the process of transaction. But when they filled up a good deal of room on the deck which was wanted in order to segregate things Jerningham’s uncle wanted an explanation from chief Warepori and told him to guide them towards the shore. On 26th September when all the articles were selected and arranged message was sent to the shore addressing the chiefs. The chiefs came and carefully examined the quality and quantity of the articles. However they were very much embarrassed seeing the distribution of the goods among the six minor tribes. In order to have a strict vigilance on the transaction process Colonel Wakefield sent a young native missionary teacher. But it was found that he was himself attracted towards the presents and tried to appropriate them for himself rather than authorizing and influencing the local chiefs. Colonel Wakefield allotted ample presents for the

Thursday, October 31, 2019

Q1. Google. What makes Google a great company to work for In Essay

Q1. Google. What makes Google a great company to work for In particular, explore the nature and impact that the company's HR - Essay Example To make the ‘different’ employees coordinate and cooperate, a common and effective organizational culture has to be actualized by the organization in line with effective HR policies. When such a culture is implemented, the employees’ mind will become more focused on the targets and tasks, and their motivational levels will get elevated. With highly motivated mind, the employees could contribute maximally to organization’s functioning, resulting in success. When success is achieved, the employees will be aptly rewarded, and these rewards and the success, will make the employees build a psychological contract with their employers. So, this paper will discuss how Google with its effective HR policies is able to positively impact its organizational culture, leading to better motivation and psychological contract, thereby making Google a great company to work for. Background In today’s internet savvy world, Google has become one of the best known brands, making its ‘presence’ or virtual presence in maximal parts of the world. Established by Larry Paige and Sergey Brin in 1998, Google, apart from having physical infrastructures of over one million servers, also has offices world over employing around 25,000 employees. The way, Google provides an optimal working environment for these employees or Googlers (as the Google employees call themselves) only makes them a dream company to work for. Google tops the list of various yearly surveys conducted by prestigious agencies to find the companies that are great places to work for employees. Right from the early days, its founders Larry and Sergey were clear cut that the working environment that will be visible in Google will not be the conventional one. This can be clearly seen in the way, they advertise to prospective employees, â€Å"Google is not a conventional company, and we don’t intend to become one. True, we share attributes with the world’s most success ful organizations – a focus on innovation and smart business practices comes to mind – but even as we continue to grow, we’re committed to retaining a small-company feel.† (google.com). This wish to maintain a non-conventional and small company feel has made Google to implement an organizational culture and its related HR practices, which not only motivates the current employees, but also evokes the interest of maximum number of prospective employees. â€Å"Google is attractive to prospective workers. Worldwide, 760,000 individuals applied for just 3,000 positions in 2006. The firm receives approximately 1,300 resumes per day.† (Griffin and Moorhead 2009, p.218). As mentioned above, Google tops the list of various surveys for the best employers including Fortune magazine's list of great companies to work for, having ranked in the top five for the past four years. Importantly, revenue wise, Google has been showing tremendous growth garnering revenues close to 30 billion dollars, with profits itself is in the range of 8 billion. (U.S. Securities and Exchange Commission 2010). Its’ share price has always been on the upswing. All this financial growth has been achieved within 12 years of its inception, with employees being one of the main beneficiaries in the form of sizable financial rewards and other incentives. This raises the question, whether Google is a great place to

Tuesday, October 29, 2019

UNit 8 Written Assignment Essay Example | Topics and Well Written Essays - 1250 words

UNit 8 Written Assignment - Essay Example The clients rights include: to be diligently served in the management of his business; to be informed of its progress, and; that his counsel shall not disclose what has been professionally confided to him. (Garner, 2007) The term witness is defined as one who can give a firsthand account of something seen, heard, or experienced. (Garner, 2007) An example is â€Å"a witness to the accident†. For legal purposes, a witness is :One who is called on to testify before a court; One who is called on to be present at a transaction in order to attest to what takes place; One who signs ones name to a document for the purpose of attesting to its authenticity and an attestation to a fact, statement, or event. (Garner, 2007) The initial interview is, of course, the one unit of service that is constant across all forms of legal service delivery. It is also one of the most critical units of service. The initial interview: (1) shapes client perception of the lawyer; (2) defines the service to be provided in terms of both problem and goal; and (3) is an important opportunity for client education, e.g. confidentiality, substantive legal rights, what the client can do for himself or herself, and the need to preserve evidence. (Alfieri 1991) In many cases the initial interview may in fact be the most significant communication before outcome determinative events such as hearing or settlement. The duty of confidentiality exists to inspire client trust and prompt candor. To achieve these purposes, clients should be informed about confidentiality at the very outset of the relationship. The most important the time to bring up attorney-client confidentiality is when you start asking questions, and offer the followin g sample statement: The witness is not interviewed in the same way as the client. The witness does not have confidentiality protections, thus they are

Sunday, October 27, 2019

Crisis of Low Morale in Nursing Staff

Crisis of Low Morale in Nursing Staff Introduction of Firm This case study describes Los Rayos a medical center that is in a nurse crisis not only for their high turn over rate but for their low morale among its nursing staff. Although the hospital works diligently to provide quality care to its patients it is failing in many areas due to understaffed and overworked nursing staff. Mandated to keep up government regulations, the hospital understands the importance of not compromising quality even though it has had to minimize quantity in staff. The hospital requires nurses to come up with strategies to be implemented to help improve not only working conditions and quality control but patient care and ideas to help increase personal job performance. Over the last eight years the hospital has enforced some of the changes suggested but it finds itself still with the issue of nurses who feel that they are overextending themselves. Nursing staff is still in the position of trying to keep up with the demand of continuous educational conditioning an d development while performing on the job tasks in addition to extra curricular activities. Overview of Firm Competitive Advantage In order to have a firm competitive advantage an organization has to possess something unique that its competition does not have. What makes one different from another? This question is what separates groups and classes and makes one stand out among the rest. At Los Rayos they have qualified staff just not enough of it. Partnering with another major medical facility was a good business move as it can serve the purpose of showing Los Rayos ways it can improve on its functions within the facility. A normal turnover rate for hospitals is at 14% while Los Rayos is at 21%. Changes in an industry can affect bases and balance among it (Porter, 1985). Job satisfaction will make the difference on the advantage another medical facility will gain when nurses are looking upon where they would like to settle for a career. Some nurses will take a salary cut or drive further in order to work within a medical facility that offers them more than an opportunity to use their credentials. As the medical environment is forever changing one thing that may give a hospital a firm competitive advantage would be their values. Having an expectation of learning within the organization lets nursing staff know that they will be encouraged and required to continue to advance in their field and stay current on all resources and advancements in medicine. Having a competitive advantage means that you make it more difficult for competition and shake up the level playing field. According to Michael Porter (1985), if an organization can achieve and maintain differentiation they will be an above average performer in their industry and exceed competition. In order to be successful in this strategy Los Rayos will have to identify attributes and qualities among their nursing staff that are different from their rivals who are the organizations who benefit from their high turnover rate. They need to identify the factors that contribute the turnovers and come up solutions to keep nursing staff from leavi ng and also keep staff happy on the job. Problem statement The problem with Los Rayos medical facility is management does not resourcefully use staff, which leads to a high number in turnovers. The facility is understaffed and overworked and they promoted housekeepers to health techs and provided no skill training leaving nurses to double work as they would need to perform the patient care tasks that the health techs: were promoted to do. The hospital also dropped moral amongst staff as they took away appreciation events such as the employee picnic and Christmas party that gives staff something to look forward to every year. It is highly noted that when employees feel they are appreciated on the job it reflects in their job performance. The hospital reduced its nursing staff to double patients per nurse and increased shifts from 8 hour to 12 hour. This tedious and exhausting work schedule not only creates a hostile work environment as staff are reluctant to go the extra mile or over achieve for patients and colleagues. The hospital requires a lot from its nursing staff and where a raise or an on the job leisure activity would have compensated for the tedious job detail, management has taken those tokens away. Alternative Solutions/Opportunities a.) Create a rewards system to retain staff -there should be a work environment where staff have materials and training to properly perform tasks and should be awarded for productive performance. Evaluations should be done quarterly on staff to review job performance and adhere to what can be done better but also praise what has been done successfully. During this process not only is staff being rewarded for their accomplishments but also they acquire new knowledge and education that helps expand their skill and personal development. i) Build moral in the workplace ii) Cause discord among staff b.) Regular Shifts- Staff has become overwhelmed by the hours they spend on the job. If they had shorter shifts they would have time to reprogram and detox and come back refreshed eliminating turnover and burnouts i.) Gives staff a chance to unwind from a days work and not have to report right back for duty ii) Staff may call out or take more time off with shorter shifts Decision and Support In order to create a work environment that constantly develops nurses skills so that they can efficiently perform job tasks management needs to create a rewards system to help retain staff. Management has to recognize the nurses core commitment is to provide quality care to their patients and they need to help reduce job related stress by ensuring that supporting staff such as health techs are properly trained and skilled in work related duties. Nurses need to feel important, valued, and appreciated by their organization, as they love their job and they just want working conditions to improve. Action Plan Moving to implement the rewards system and shorter shifts for staff should take place immediately to ensure that staff understands management understands their concerns and have worked to rectify their issues. To implement successful changes, management must play an active role in the entire change process. It is the managers responsibility to understand how to address and put the change into action along with properly overseeing resistance from the staff. It is the managers responsibility to understand how to address and put the change into action along with properly overseeing resistance from the staff. Identifying potential risks, anticipating risks, estimating impact of risks, and managing risks successfully are all accomplishments and work towards building moral and retention. Scundra (2016) explained the importance of leaders understanding how to deal with different people and personalities hence the importance of the quarterly evaluations so management can provide feedback to each nurse and staff member personally. Once nursing staff feels compensated for their diligent work they will be eager to preform on the job and happy to work at Los Rayos now and in the future. REFERENCES Drucker,P. (2009). Management Cases.New York, NY. Harper Collins Publisher Porter, M. E. (1985). Competitive Advantage . Creating and Sustaining Superior Performance , 1-30. Retrieved January 22, 2017. Sacndura, T. A. (2016). Essentials of Organizational Behavior. Thousand Oaks, CA: Sage Publications.

Friday, October 25, 2019

Murder Rationale in Dostoevskys Crime and Punishment Essay -- Crime P

Murder Rationale in Dostoevsky's Crime and Punishment Feodor Dostoevsky's Crime and Punishment is a murder mystery unlike most murder mysteries. In this novel the reader knows "who done it"; the mystery lies in why the murder is committed. Throughout the story, Raskolnikov gives three main reasons why he kills Alena Ivanovna. Although these reasons seem unrelated on a superficial level, there is truth in all of them. What's more, each one builds on its predecessor. Raskolnikov's first two reasons are scrutinized by Sonya one at a time as his solitary motive for murder. These reasons are then disproved on their own, leaving one ultimate motive that essentially encompasses the other two. As readers, we sometimes tend to want a direct explanation for events that have occurred. Dostoevsky gives us explanations, but they are not direct and can be confusing if we are looking for an obvious cause and effect relationship. Crime and Punishment imitates life in that the happenings do not always fit in nice neat categories. Perhaps this is one of the elements that make it such an intriguing and acclaimed novel. Raskolnikov's first reason for murdering the pawn broker is to help himself. He claims he wanted the money. He states in his confession to Sonya, "It was to rob her" (348). It is obvious that he needed money for school. Also, if he had the money to put himself through school, his mother would not have to scrimp and borrow from others to help her son. Since the death of his father, Raskolnikov's mother and sister are greatly dependent upon him to make something of himself. His mother says in a letter to him, "You are all we have, Dunya and I, you are everything to us, our only hope and trust" (25). In this same letter, his mo... ... commoners. His last reason was accepted as his ultimate motive; "Sonya understood that this gloomy creed had become his faith and his law" (353). Raskolnikov himself does not really know why he is committing murder when the murder is taking place. It is a discovery of self and of a theory that was not yet developed. He uses excuses for his reasoning in the beginning, saying that he needs the money, and, later, that he is performing a service for the greater good. These excuses are necessary and fundamental steps of Raskolnikov's journey into self-discovery. It is human nature to rationalize, which is what he is doing. Ironically, this very need for rationalization and excuse is what fails him in his quest for proof of his superiority. Work Cited Dostoevsky, Feodor. Crime and Punishment. Trans. Jessie Coulson. Ed. Goerge Gibian. New York: Norton, 1989.