Thursday, November 28, 2019

The Artic Essays - Artic, Pollution, Lichen, Sea,

The Artic Introduction. The Artic is a region at the upper most tip of the Northern Hemisphere. The Artic includes the area around Greenland, USSR, Canada and Alaska. Much of the Artic circle is permanently frozen ice. The Artic is a pristine environment, clean and void of human interference. However as humans move into these areas and begin to extract what ever they can be balance can be tipped, resulting in pollution and destruction of the environment. Climate. The Artic winters much longer than the Summer. In the winter the sun never rises and in the summer it never sets. The average temperature for the Artic is zero degrees of less. Industry and the Artic. There was once a time when the land of the Artic Circle was considered useless and only hospitable to those native to it. However once vast quantities of oil and fish had been found there was a rush of interest in the land. Fishing in the Artic has occurred for thousands of years but in recent years man has been fishing the Artic; in greater numbers and taking more fish. Professional fishermen are taking all kinds of fish as well as whales and seals. In some areas fishermen have become so efficient at their job that quotas have needed to be put on to limit or stop the capture of certain animals. There are many mineral deposits within the Artic Circle. In Russia: nickel, iron ore, apatite, diamonds, gold, tin, coal, mica, and tungsten. In Sweden: iron ore. In Greenland: lead, zinc, molybdenum and cryolite. Spitsbergen: coal. Canada: uranium, copper, nickel, lead, zinc, tungsten and iron ore. The digging out of minerals would inevitably disturb the natural habitat as well as the environment there would be a great cost to maintain the site. Industry that is designed to process various minerals have waste products that would be most unwelcome in the Artic. A good example of this is the pollution that has arisen as a result of the smelting of metals in the Artic. It is for this reason that there is very little industry in the Artic. However Russia, Canada, Greenland and Iceland have several small scale manufacturing plants. The largest industry in the Artic is oil. The rush began in 1968 when a large oil field was discovered, there was a great deal of protest but the development went ahead. Oil extracted from the felid makes its way to Port Valdez via a 1300 kilometre pipeline. Although steps were taken to limit the pipelines affect on the environment it still disrupts the migration of caribou. In 1989 the unthinkable happened and the super tanker Exxon Valdez ran aground spilling millions of gallons of crude oil into the Prince William Sound. The effects of the slick were devastating. Within a week workers counted 24000 dead sea birds and 1000 sea otters. The effects of the slick were felt throughout the food chain from photoplankton to bears. The Exxon company funded the clean up but there was no compensation for the hundreds of people that lost their job as a result of the slick. Pollution of the Artic A large threat to the Artic is transboundry pollution and bioaccumulation. These are both complex subjects but are easily explained. Transboundry pollution is the pollution of the Artic from other countries. The ocean currents and wind conditions result in large amounts of pollution being deposited in the Artic. In winter when the sun is low thick blankets of haze can be seen over the Artic. Bioaccumulation is the process where pollutants build up in the Artic because they cannot be broken down due to the extreme cold. Once harsh chemicals find their way into the food chain they stay there forever, trapped in the animals and sediments. A result of increased pollutants in the atmosphere is the occurrence of acid rain. Sulphur and Nitrogen dioxides drift from developed countries and when they mix with water in the atmosphere they can produce acid rain as strong as lemon juice. The acid snow melts in summer and spring producing an acid shock that can kill animals and plants alike. In 1986 the nuclear reactor in Chernoybl exploded sending a nuclear cloud into the atmosphere that among other places contaminated plants and animals in the Artic region. Particularly affected were lichens, lichens are a plant that makes up the majority of a reindeers' diet. When the reindeers ate the lichens they became radioactive and many thousands had to be shot. Tourism vs conservation. In the battle between tourism and conservation, tourism seems to always win. However in the Artic tourism has so far had little effect (compared to other human activity) on the environment.

Sunday, November 24, 2019

Free Essays on SWOT Analysis - Sun Microsystems

I. CURRENT SITUATION A. Financial Performance – Sun Microsystems has managed to have at least 10% sales growth over the last several years. Net revenue in fiscal 1998 increased to $9.7 billion, or 13% compared to $8.6 billion in fiscal 1997. Sun has one of the strongest balance sheets in the industry, with $822 million in cash in the bank. Revenues grew an average of 34.1% annually between 1988 and 1998. Approximately 49% of the total revenue was generated from outside the United States. Its net income grew 41% annually on average over the same time period. B. Strategic Posture 1. Mission – enable customers to create breakaway business strategies by using their network computing products, solutions, and services. Allow individuals or entire organizations to access information from anywhere to anything on any device. 2. Objectives – Sun would like a networked computing future driven by the needs and choices of the customer. It is a vision in which every man, woman, and child has access to the collective planetary wisdom that resides on the network. 3. Strategies a. Putting its expertise in high performance system design enabled the company to lower the price of advanced workstations and graphics technologies. b. Reach the ultimate goal of harnessing the Internet to stop Microsoft from swallowing them. c. Break Microsoft’s cash cow, Microsoft Office. d. Improve, change, and implement several new business practices, processes, and a series of related information systems. e. Work extensively to transform Sun’s product line in order to capitalize on networking. 4. Policies – One of any Java licensee’s most significant contractual obligations was to pass the Java compatibility tests. These tests determine if a licensee’s technology conformed to the Java specifications and APIs. II. CORPORATE GOVERNANCE A. Board of Directors: Scott McNealy, the CEO and Chairman of the Board of Director’s at Sun... Free Essays on SWOT Analysis - Sun Microsystems Free Essays on SWOT Analysis - Sun Microsystems I. CURRENT SITUATION A. Financial Performance – Sun Microsystems has managed to have at least 10% sales growth over the last several years. Net revenue in fiscal 1998 increased to $9.7 billion, or 13% compared to $8.6 billion in fiscal 1997. Sun has one of the strongest balance sheets in the industry, with $822 million in cash in the bank. Revenues grew an average of 34.1% annually between 1988 and 1998. Approximately 49% of the total revenue was generated from outside the United States. Its net income grew 41% annually on average over the same time period. B. Strategic Posture 1. Mission – enable customers to create breakaway business strategies by using their network computing products, solutions, and services. Allow individuals or entire organizations to access information from anywhere to anything on any device. 2. Objectives – Sun would like a networked computing future driven by the needs and choices of the customer. It is a vision in which every man, woman, and child has access to the collective planetary wisdom that resides on the network. 3. Strategies a. Putting its expertise in high performance system design enabled the company to lower the price of advanced workstations and graphics technologies. b. Reach the ultimate goal of harnessing the Internet to stop Microsoft from swallowing them. c. Break Microsoft’s cash cow, Microsoft Office. d. Improve, change, and implement several new business practices, processes, and a series of related information systems. e. Work extensively to transform Sun’s product line in order to capitalize on networking. 4. Policies – One of any Java licensee’s most significant contractual obligations was to pass the Java compatibility tests. These tests determine if a licensee’s technology conformed to the Java specifications and APIs. II. CORPORATE GOVERNANCE A. Board of Directors: Scott McNealy, the CEO and Chairman of the Board of Director’s at Sun...

Thursday, November 21, 2019

The Filipino Culture Essay Example | Topics and Well Written Essays - 750 words

The Filipino Culture - Essay Example The Filipino characteristic is a mix of various cultures put together although it is basically of Malay stock. The spirit of kinship and camaraderie is inherited from the Malays, the close family relations from the Chinese, and the piousness from the Spaniards. The Filipinos have distinguishing characteristics of hospitality. They are divided geographically and culturally and their traits and dialects differ accordingly. They are easily distinguished by their fair color, tall structure and fairly formed nose structure. The main religion is Christianity (Roman Catholics). About 80 percent of the population is Catholic Christians while 15 percent are Muslims. The rest are Buddhists. The Filipinos refer to themselves as ‘God-fearing’ people. Rice is the main food eaten thrice a day. Fish and seafood are the principal source of protein. The food had minimal cooking and they either steamed, boiled or roasted their food. The ethnic food is Chinese cuisine which includes noodles and soy products. It is known as the Filipino-Chinese food. Gradually local ingredients were added to suit the local taste. The cuisine was given Spanish name for the convenience of the clients. The Spaniards too brought food influence from Spain and Mexico. After independence, there was a severe recession in Philippines and the economy shrunk by more than 10%. The Asian financial crisis added to the grim situation. It is now experiencing a very fast economic growth. It is now making a steady growth and meeting all government targets. Its growth rate is amongst the fastest in the Asian region. The Filipino language known as Tagalog, contains many Spanish words. Amongst their customs the most noticeable is the "fiesta" or the celebration of a towns patron saints feast day. This is an annual event and is celebrated with street parade, church ceremonies, fireworks and a grand feast. They

Wednesday, November 20, 2019

Relection on Total knee replacement surgery Research Paper

Relection on Total knee replacement surgery - Research Paper Example After the knee is open, a four-step procedure is undertaken to have the knee completely replaced with metallic components, some plastic spacers and button, to enhance the normal functionality of the knee joints. The first step of the knee replacement surgery entails the removal of the damaged knee components, where the damaged knee cartilage on the surface of both tibia and fibula are removed, together with some reasonable amount of the underlying bone (Scuderi & Tria, 2002). This marks the preparation of the knee, for a total replacement, since the already damaged components are removed and the knee is now ready to take a replacement. This step is followed by positioning the metal implants. Here, the components of the knee; the cartilage and the bone surface, are now replaced with some metal components that recreate the surface of the joint (Bellemans, Ries & Victor, 2005). During this replacement, the metal components, which have been prepared to suit the natural knee components, a re either cemented or pressed to fit into the remaining bone component. The next step that follows the positioning of the metal implants is the resurfacing of the patella (the knee cap), which requires the knee cup to be cut and then resurfaced with a plastic button, which will not collide with the metallic implants that have been implanted on the knee (Scuderi & Tria, 2002). However, as explained by the surgeon, depending on the case and extent of the knee damage, the knee cap might not be resurfaced. The final step of the Total knee replacement surgery is to place the spacers. This step entails putting some medical-grade plastic spacers between the metal components that have been implanted on the knee, to create a smooth gliding surface (Bellemans, Ries & Victor, 2005). My feeling during the procedure was that the patient may fail to function fully after the knee is replaced, because the operation was being undertaken for a 70 year old woman. I also felt that the Total knee replac ement surgery was not a very complex sort of operation, although it required a high degree of concentration and precision, lest the metal implantations done on the knee fails to fit accurately and thus lead to more knee problems. The lesson that I learnt from the Total knee replacement surgery procedure is that; it is a surgical procedure that is compatible with all ages. Additionally I learnt that the Total knee replacement surgery is not uniformly done to all people, and that some aspects of the procedure depends on the patient, their situation, and the extent to which their knee is damaged either through injury or arthritis. While the Total knee replacement surgery basically follows a four-step procedure, I realized that the final step of the surgical procedure, referred to as spacer insertion, is not a mandatory or universal step in the Total knee replacement surgery, since it can be omitted for some patients. Another invaluable lesson that I learn regarding the Total knee repla cement surgery is that; the medical history of the patient is fundamental in determining their qualification for the procedure. This is because, the medical history helps the surgeon to assess the strength of the patient

Monday, November 18, 2019

Which former ally, the U.S. or the U.S.S.R., was most at fault for the Essay

Which former ally, the U.S. or the U.S.S.R., was most at fault for the Cold War - Essay Example The most affected areas were the European countries although later the war extended to Asia, Middle East and Third World countries as the two nations struggled for dominance. The war was characterized by arms race and space race with an imminent danger of a nuclear war erupting. However, the question that needs answering is; who was responsible for the war? Traditionalists blame the U.S.S.R; the revisionists blame the U.S while the post-revisionists believe both were to blame. This paper will argue that the U.S.S.R was solely to blame for the start of the cold war due to its expansionist motives and the need to spread communism to the whole world. Although the US and U.S.S.R were both isolationists (remained neutral) in the two world wars, it was clear that the two were mutual antagonists. The US was a strong advocate of the capitalist system and hoped that all nations would embrace democracy while the U.S.S.R was a strong critic of the capitalist system and an advocate of communism. The Soviet wanted to convert the world into communism and abolish capitalism which was viewed as exploitative. Furthermore, the attempt by the US to aid anti-communist Russian forces in the 1918-1919 revolution was not forgotten. However, when German invaded Soviet Union in 1941 an alliance was formed between both powers whereby the Soviet Union was to help US against the Japanese after conclusion of the Nazi-Soviet war. According to Mooney, â€Å"Despite these mutual antagonisms, President Roosevelt extended Lend-Lease aid to the Soviets in November 1941 and initiated the wartime partnership between the U.S.S.R. and the U.S that endured until the war’s successful conclusion† (165). Stalin was not genuine in his dealings according to William Bullitt an advisor to the president. The first signs came when Soviet insisted on instituting a provisional government in Poland referred as the Lublin Committee and refused the Poland government in-exile which was operating in Lo ndon. The Soviets were also advantaged by the Moscow agreement whereby Churchill and Stalin agreed to formula for division of post-war South Eastern Europe spheres (75% for Britain and 25% for U.S.S.R). This enabled U.S.S.R to dominate most of Eastern Europe and advance its cause. Another meeting for Churchill, Roosevelt and Stalin was held in Yalta in 1945 whereby they agreed to form an international peace organization and re-arrange post-war map of Europe. As such, the United Nations (UN) and the UN Security Council were formed. However, the Soviet Union was against this Security Council as it refused to acknowledge the communist government of China. According to the Yalta agreement, each power was to control its ‘zone of occupation’ after the war in Germany but Berlin City was to be divided among the four nations. The Americans condemned the agreement and blamed Roosevelt and Churchill for giving up Eastern Europe to the Soviets. However, Robert Dalleck of Boston Uni versity states that, â€Å"this idea that Roosevelt and Churchill gave away Eastern Europe to the soviets is nonsense.†(60 years later debating Yalta). The Big three also made a Declaration on Liberated Europe which mandated the superpowers with the role of supporting the shattered nations to rebuild themselves and also create democratic institutions of their own choice. This meant the nations were free to hold elections and decide on the form of government they wished to institute and which is responsive to people’s will. The superpowers could not interfere with democratic processes of those nations. However, the Soviet Union defied this rule and went ahead to establish a communist government in Romania. The Soviet Union was

Friday, November 15, 2019

Ethics of Biobanks

Ethics of Biobanks Biobank is a large collection of biological information and tissue samples kept for research purposes. It is also a powerful tool used in the study of diseases. It is an important resource in supporting different types of contemporary research such as personalised drug and genomics. Biobank enable scientist to have cross purpose research studies in which data derived from samples in biobanks can be used for multiple researches. E.g. Biobanks can enable scientist identify disease biomarkers by using large collections of samples which represent hundreds of thousands of people. Its been shown that before biobanks was invented little or known was known about different disease and biomarkers and scientist struggled to find enough samples to know what sort of disease they are dealing with. Although its not all good news for the use of Biobanks due to research ethics and medical ethics. This issues were raised because of PRIVACY whereby operating biobanks without the knowledge of governing bodies and policies could be bad for the societies that take part in Biobank programs There are types of biobanks, Tissue banks and Virtual biobanks and population banks, before I explain the types Im going to explain a lot more about biobanks Biobanks incorporate cryogenic storage facilities for samples in which it can be an individual refrigerator or a big warehouse refrigerator. They are kept up to standard by the hospital, pharmaceutical companies and universities etc. Disease oriented biobanks may be classed by design and purpose because this biobanks collect information or samples representing different forms of diseases in which it can be used to also find a biomarker associated with a specific disease. Population based biobanks are big biobanks that collect large samples from large numbers of people in a community. This is done to look for biomarkers for disease in a general population. Tissue Banks- Store and harvest human tissue for transplantation, stem cell and researches based on tissue and cells Virtual biobanks samples are collected and termed to meet national regulations and integrate epidemiological cohorts Population banks they store organic material associated with clinical, lifestyle and environmental data. Biobank ethics There are many roles which comes into effect when researchers wants to collect a human specimen for research and storing it. The issues that comes into effect are the right of the participants to be private, ownership of the specimen and where the data is derived from. Also how far the donor can consent to the research study should be considered and to which extent the donor can far in sharing research results. The main issue is that biobanks collect sample and data for different future research and it is not easy to get a specific consent for any single research. Biobank controversies[1] issue consensus controversy notes Commercialization Different aspects of biobanks serve public, private, commercial, and non-commercial interests. How can policymakers set guidelines to fairly balance public, private, commercial, and non-commercial interests? Who owns biological specimens and data derived therefrom? When biobanks and related projects are publicly funded, the result will benefit private industry. To what extent is this outcome satisfactory? (Social Fairness). It may also undermine public trust in biobanks projects. It may skew research agenda in favour of research projects which are more profitable and compromise necessary but not profitable research. discrimination, including Genetic discrimination Biobanks should prevent donor communities from facing discrimination as a result of participating in a Biobank project Research reveals private information and release of it may cause participants to face discrimination. What responsibility does the Biobank have to mitigate the problem? Participants may reveal their own information because of participation in a Biobank and subsequently face discrimination. What responsibility does the Biobank have to mitigate the problem? informed consent Donors to biobanks need a consent process adjusted specifically to biobanks. What breadth of consent should biobanks have? [2] Institutional review board It would be nice to have a robust governance system before biobanks are created. How will a good governance system be designed? The oversight institution reviewing biobanks should be independent of the Biobank. Where should checks and balances be? An individual organization needs multinational support to do international research. Who should govern when research spans different countries with different legal and personal rights standards? Privacy for research participants Donors should have their specimens sufficiently anonymised. A specimen by nature includes some data about donors how much anonym zing is sufficient? [3][4] Donors have some right to return of results. How does one return results to anonymised donors? [3][5] Donors have a right to withdraw from research. Specimens can be destroyed, but to what extent should anonymised data which has already been shared be withdrawn? [5] Data derived from specimens should be shared. Who gets access and how much? [3] Changing technology makes it difficult for researchers to say how safe participant information is. What protections can be promised? [6] Return of results Donors have a right to know the purpose of a Biobank and what results it generates When should all donors share general information and when does each donor have a personal right to personal information? Public consultation Everyone wants the researchers and community to work together. What resources should be spent doing outreach, and how much involvement does the community want, and what role should the community have? Communities should participate in writing laws, standards, and policies for research. How can communities be encouraged to participate, who represents the community, and how much involvement should there be? Patients should be involved when there is research on diseases. When people are desperate because of a disease, to what extent can they participate fairly without feeling obligation to support research? Communities which donate specimens to a Biobank should have special involvement in their Biobank. What kind of involvement? Resource sharing Research efficiency increases greatly when resources are shared. How should beneficiaries share costs? This is especially problematic when a Biobank is a national resource and another country wants access to it. Results of studies should go to the widest possible audience. When should this happen and in what way? Can results be released with commercial licensing for use?

Wednesday, November 13, 2019

Copyright Laws :: essays papers

Copyright Laws CHAPTER 1 Lennie and George are two friends during the depression. Lennie is a big guy that is not very intelligent. George is a medium size man that takes care of all the business. In the first chapter George and Lennie talk about getting a new job at a ranch. They want to save enough money to build their own ranch and â€Å"Live off tha fatt a the land.† They explain that they will have bunnies, alfalfa, and other goods to sell. CHAPTER 2 George and Lennie get the new job in chapter two. They meet the people they will be working with. Candy is an old man that has a dog. Slim is a respected man. Curley is the boss’s son who is small and used to box. Curley is also a jealous man who has a wife. Curley’s wife is known as a tart. She talks to all of the guys even when she shouldn’t. Crooks is a black man, the stable buck who isn’t aloud to be by the white people much. This chapter is mainly about George and Lennie meeting all of the new co-workers. CHAPTER 3 All of the guys on the ranch think Candy should get rid of his dog. The dog is old, stinky, and can’t even walk or eat. Slim tells Candy that the dog should be shot for his own good. Slim shoots the dog. Curley and Lennie get into a fight. Lennie doesn’t really understand why. Curly wants to fight. Curley is a jealous man and hates the fact that Lennie is bigger than him. Lennie blocks a punch from Curley and broke his hand. Lennie also got a new puppy in chapter three. Lennie spends as much time as he can with his new dog. CHAPTER 4 All of the men went to the whore house except for Lennie, Crooks, and Candy. When Lennie went to check on his puppy, he decided to talk to Crooks in his room. Crooks’ room was part of the stable. There were shoes, hay, horse reins, and horse shoes everywhere. Crooks didn’t really want Lennie to come inside, but he thought some company was better than none. Curley’s wife came to see what was up. Crooks told her to leave. Curley’s wife was mean and told Crooks that she would have him hung if he wasn’t nice to her. Copyright Laws :: essays papers Copyright Laws CHAPTER 1 Lennie and George are two friends during the depression. Lennie is a big guy that is not very intelligent. George is a medium size man that takes care of all the business. In the first chapter George and Lennie talk about getting a new job at a ranch. They want to save enough money to build their own ranch and â€Å"Live off tha fatt a the land.† They explain that they will have bunnies, alfalfa, and other goods to sell. CHAPTER 2 George and Lennie get the new job in chapter two. They meet the people they will be working with. Candy is an old man that has a dog. Slim is a respected man. Curley is the boss’s son who is small and used to box. Curley is also a jealous man who has a wife. Curley’s wife is known as a tart. She talks to all of the guys even when she shouldn’t. Crooks is a black man, the stable buck who isn’t aloud to be by the white people much. This chapter is mainly about George and Lennie meeting all of the new co-workers. CHAPTER 3 All of the guys on the ranch think Candy should get rid of his dog. The dog is old, stinky, and can’t even walk or eat. Slim tells Candy that the dog should be shot for his own good. Slim shoots the dog. Curley and Lennie get into a fight. Lennie doesn’t really understand why. Curly wants to fight. Curley is a jealous man and hates the fact that Lennie is bigger than him. Lennie blocks a punch from Curley and broke his hand. Lennie also got a new puppy in chapter three. Lennie spends as much time as he can with his new dog. CHAPTER 4 All of the men went to the whore house except for Lennie, Crooks, and Candy. When Lennie went to check on his puppy, he decided to talk to Crooks in his room. Crooks’ room was part of the stable. There were shoes, hay, horse reins, and horse shoes everywhere. Crooks didn’t really want Lennie to come inside, but he thought some company was better than none. Curley’s wife came to see what was up. Crooks told her to leave. Curley’s wife was mean and told Crooks that she would have him hung if he wasn’t nice to her.

Sunday, November 10, 2019

Engendering violence Essay

Violence could occur in various ways and in different levels. It may happen in the form of physical, sexual, verbal and psychological abuse, and could be inflicted by any individual, groups, institutions or nations. Whatever form of violence is inflicted, it could threaten the body of the violated person in the most complex way (Jarvis, â€Å"world of the body†). The society today is not new with the issue of violence. Every now and then, the media is consistently reporting events that are inhumane. Although violence could occur among different people, it has been well identified that the prevailing cases of violence are those that are gendered-based. Before one could fully identify gender-based violence, it is an imperative to clarify various definitions that are centered to the area being studied. It should be well understood that the usage of the words gender and sex are needed to be given identification in order to fully understand gender-based violence. In many cases the words gender and sex are used alternately; however there is a distinction between the two words. Sex is often referred to as the differences in the physical aspects of males and females while gender is known to be the roles of the males and females that are socially-prescribed. Such gender roles are acquired through the process of socialization (Ward, 2002 qtd in Benjamin and Murchinson 3). While the physical differences between male and female is persistently identified to be something that is easily distinguished and could be possessed in common, the gender roles are wide range and could be found in different aspects of an individual’s life and may apply in various aspects such as access to various resources, responsibilities that are public and private or even during the period of courtship. Although gender roles could be altered in the long run, it should be well understood that these gender roles reflect the position of men, women and children in the society (Benjamin and Murchinson 3-4). Based from these roles, gender-based violence could be identified as a form of violence that is done to an individual in accordance to the role he or she played within the society. Although such violence could also be directed among men, gender-based violence is prevalent among women and girls. The violence inflicted to females intends to empower hierarchies and strengthen gender inequalities (Benjamin and Murchinson 4). The term gender-based violence is now taking a new context where in it tends to examine and deeply understand the violence against women and discusses the role of gender in inflicting the violence. The power of gender relations always place women in a more disadvantaged position compared to their male counterparts. Gender-based violence place women at a level where they have less access to resources, information, decision making, benefits and have lesser hold on their rights. Aside from these, gender-based violence are also closely related to violence against women and girls because of the involvement of the idea that women are the subordinate gender in the society (UNIFEM 2-3). In various nations, women and girls are victims of myriads of forms of violence. Most of the cases of violence were not done randomly. The victims became the targets of the perpetrators because of the reason that they are females. Among the many forms of violence, sexual violence specifically rape is the most commonly inflicted among women. All sexual assaults are done out of aggression, despite of the gender and age of the victim. The primary motivation of the assailant to carry out rape is not centered towards satisfying a sexual desire or an issue of sexual deprivation from the past rather the perpetrator inflicts rape in order to express their power over somebody (Groth qtd in New York City Alliance against sexual assault, â€Å"Factsheets†). In most cases of female rape the act of violence was predominantly done by males who all come from socio-economic classes, racial or other ethnic groups. All through out the world, rape is often directed towards women because of their gender, regardless of their age, ethnicity or political affiliation (UNIFEM, â€Å"violence†). In the United States alone, it was reported that a woman is raped every two minutes. Just in 1995, the number of women who were raped or sexually assaulted reached over 354,670. The risk factors for initiating rape were accounted for early sexual experience, stereotyping which include the negative attitudes of males toward females, consumption of alcohol and the acceptance of rape myths (â€Å"American rape statistics†). In addition, during war and civil conflicts gender-based violence such as rape and sexual abuse were done in order to attack the morale of the enemy including men and women. For others gender-based violence was also conducted as â€Å"spoils of war. † (Benjamin and Murchinson 5) During the 1994 Rwandan genocide, sexual violence, especially rape was directed or encouraged by the Hutu Militia groups in order to strengthen their goal of destroying the whole Tsutsi clan. At this point in time, the violence was directed towards the Tsutsi women due to their gender and ethnicity. Furthermore, the sexuality of the Tsutsi women was also regarded by the Hutu’s, who were the genocide perpetrators, as a medium that could be used by the Tsutsi community to infiltrate the community of the Hutus. Because of this reason, the propaganda of sexually violating the Tsutsi women became prevalent in order to dehumanize and subjugate the Tsusti community as a whole. Aside from the Tsutsi women other Hutu women were also targeted for rape by their own tribesmen because they were associated with Tsutsi men who are considered as an opposition (Norwojee, â€Å"Shattered lives†). During the conflict in Bosnia-Hercegovina, Muslim women were raped and sexually abused as a part of the so-called â€Å"ethnic cleansing† for the establishment of the Greater Serbia, which is said to be ethically pure. On the basis of investigations, it was estimated that over 20,000 women became the victims of rape and sexual abuse. It was also documented that the rape was directed among the women in order to impose humiliation among the victims, their families and the community where they belong (WomenAid International, â€Å"EC investigative mission†). Much has been written about the prevalence of rape and rape reporting among females. However, it was stated earlier in the study that gender-based violence could also occur among males. In the case of rape, males are often disregarded about the issue because of the social context that males are the initiators of the sexual act, or if not they are considered as the dominating gender and that the women should be take the submissive role (Gagnon and Simon, 1973; Schneider & Gould, 1987 qtd in Duncan and William, â€Å"Gender role,† 1). Despite this traditional sexual script, male rape is also very much similar to female rape. The most common perpetrators of male rape are also males, yet on a larger scale, the involvement of female as accomplices or perpetrators were also reported. In 2002, it was documented that out of eight rape victims, one of those involves a male (RAINN, 2003 qtd in Stanford’s men against violent group, â€Å"male rape†). More often than not, male rape is one of the many violence issues that are least discussed in the society. This is because such issue is often interpreted as an extension of the life in prison and is often regarded as a part of the homosexual subculture (Kaufman et al. , 1980 qtd in Pino and Meier, 1). However, what people do not recognize is the fact that male rape survivors include not only homosexuals but also heterosexuals, teenagers, homosexuals and children. Case research even suggested that males also experience the same reactions felt by females. Alongside with the feelings of depression, anger, self-blame, guilt, sexual dysfunctions, vulnerability and emotional distancing, male rape victims also have to endure unsympathetic attitudes from people even their friends, family and acquaintances (Brochman, 1991 qtd in New York City alliance against sexual assault, â€Å"Factsheets†). Likewise, it was also reported that males are more likely to become victims of multiple aggressors, yet the assailants could inflict sustained physical trauma and male victims could be held as captives for a longer period of time compared to their female counterparts (Kaufman et al. , 1980 qtd in Pino and Meier, 1).

Friday, November 8, 2019

TItan A.E. and Lost in Space essays

TItan A.E. and Lost in Space essays The film genres that i picked was Sci-fi namely space. The two movies that i watched were Titan A.E. and Lost in Space(the movie not he TV series. The basic story of Titan A.E. by the year 3028 humans have conquered many feet's in science and other fields even the ability to make a planet. So in the year 3028 the most powerful race of alien are called the Drej which are scared of the fact the human can make a planet so they blow it up. And that is were the movie begin they evacuation of Earth. Boy named Cale, which is the main character Cale, is about 4 and playing in the woods, when if father comes to get him then Cale's father intrust Cale with a friend promising him that they well see each other again. Cale's father puts Cale on a ship while his father goes to the Titan takes off while the Drej are blowing up the Earth. Then the movie flashes forward to 15 years later were Cale and he man he was intrusted with are working where another friend of Cale's father finds him and they e scape away from those annoying Drej which are always on there tail. And the movie continues where they meet good aliens bad aliens good human and bad human in and out drifter colonies. In there quest of the Titan. My favorite part of the movie is then Cale is fly the ship that they are on called Valkyrie. I don't know just the graphics and music all fit together and just look good it is eye candy. The biggest key moment of this movie that i can think of is when they find out who on the Ship is a trader and working for the Drej. The most dramatic sence of this movie I think is then this little alien (the one in charge of navigation) is almost killed by the traders on the ship. The effectiveness of this movie ending is I believe is show that human will never give up then they are faced with horrible tragic problems. As for part two of this project I picked Lost in Space as said above. This movie is about a family "The Robinson" who on their way across...

Wednesday, November 6, 2019

How To Set Up Your Author Profile on Reedsy

How To Set Up Your Author Profile on Reedsy How To Set Up Your Author Profile on Reedsy In today’s competitive publishing landscape, ensuring that you have the most cohesive and effective online presence is a crucial challenge towards establishing an author brand. This is what the Reedsy profiles are for: we allow you to integrate all the information about your writing and your books in one single, customizable website. Here’s how to set it up and take full advantage of its capabilities!Seamless integrationsLet’s start with the easiest stuff. Reedsy allows you to integrate in one click with Goodreads, Twitter, Linkedin and your favourite blogging platform (WordPress, Tumblr or Blogger). That way, we just pull the relevant information to build your author profile for you!Your books, straight from AmazonNow to what matters: your books! We allow you to upload them by just copy-pasting their Amazon or Google Play URLs. Again, we’ll extract the relevant information.Customize it!Here’s where you have to do a bit of actual work. Write a nice, engaging â€Å"short summary† and â€Å"about me† that will prompt readers to â€Å"follow† you and leave their email address. Mention your reader magnet (if you have one) and share some personal stuff with your audience, so readers know the human being behind the books.Don’t forget your profile picture, if it’s not already there, and the cover image! These make your author profile truly unique and immediately recognisable to readers! The recommended specs are 400x400 for the profile picture and 900x450 for the cover image.Finally, make sure you’ve put the link to your personal website under your social media links. This way your Reedsy profile will act as the perfect SEO booster!If you have any questions about the author profiles, or want to help us make them better, leave your feedback in the comments below!

Monday, November 4, 2019

Keystone XL Pipeline Essay Example | Topics and Well Written Essays - 1250 words

Keystone XL Pipeline - Essay Example Despite the probable environmental impact it acts as the best safe alternative for shipping oil sands crude. Apart from its probable impact on the environment, the project bears major impact on the economy thereby making it a subject to economic debaters. Major economic impacts include effect on the cash flows and job claims. An analysis on the economic and environmental impacts of the project makes it less feasible for implementation. The following are the pros and cons associated. The Keystone XL provides a safer alternative for transporting sands crude thereby making the proposers to conclude on the environmental friendliness. Even though many environmentalist have argued against the environmental friendliness of the project, the study done by the State Department shows that it is better to have the project that the environmental significance of the project are far more valuable than when it is rejected. Whether in the absence or presence of the Keystone XL, there still will be higher production of the oil sands. This implies that there would be need for a railway to transport the crude oil in case the Keystone pipeline is not built. Considering the far much impacts which could transpire because of the recent high profile crude-by-rail accidents, Keystone XL is the most suitable alternative for transporting oils sands with lesser impacts on the environment. Intuitively, there is need to build the pipeline since it assures of reducing the environmental impact s which could result from use of railway (Chang, 9). Economically, the project proves viable in increasing the cash flows of the national economy and the overall number of investors in the country. Usually, pipeline is a source of steady and stable cash flows as compare to any other means of transport. In this case, a country has to consider the volume of oil to be transported and the immediate returns from the project. For the TRP, the owners of the

Friday, November 1, 2019

The Development Information Security Essay Example | Topics and Well Written Essays - 6250 words

The Development Information Security - Essay Example There are many well-known security standards available, for instance, ISO, NIST, and COBAT. However, most of the Security Frameworks stress more on compliance requirements and controls rather than effectiveness. Standards, procedures and practices provided to larger organization easily swamp the SMEs. Due to lack of resources, SMEs often spend minimum amount on security and scarcely utilize their resources to apply hundreds of good practices provided by security standards and frameworks. Furthermore, SMEs do not adapt to all the ISO security standards rather they define their own strategies in order to meet their specific security goals. It indicates the importance of providing SMEs a security framework that facilitates the task of identifying and applying security measures in accordance with their own needs and requirements. Therefore, we need to go back to square one and design a more suitable portfolio of solutions in order to cater a broader set of organizations and circumstances . There is no single industry security standard that provides all the answers. However, a good industry standard does provide a widely accepted and proven framework. It not only defines a particular security program in order to provide a foundation for security system but also satisfies particular needs of the organization. Such framework is derived from the development of a prioritized set of objectives and practices as suggested by literature and standards provided by ISO standards. This security framework provides steps to establish best suited Information Security Management System (ISMS) for SMEs. These ISMS are based on ISO standards which enable SMEs to see the value of security outside of technical constraints and regulatory compliance. Moreover, it helps SMEs to incorporate security  practices, controls and procedures to align business requirements with IT security requirements. Moreover, it provides support for effective use of technology, central management, adaptabilit y, flexibility, performance, interoperability and compliance on the forefront.