Saturday, August 31, 2019

Sentimental plot Essay

During the 19th century many writers began to publish works with sentimental plots. Generally the sentimental plot is written to make the reader feel an excess of unnecessary emotions, by overemphasizing every work. In every sentimental plot there will always be the typical sentimental hereon that fits the stereotype of a young orphan, unmarried women with moral obstacles. In this plot there are only two types of women the ones that are considered good and the ones that are bad. In the sentimental plot the good will get rewarded by marrying a decent man and the bad will always die. Even though this plot was very popular among writers many women were not happy with how the women were being portrayed among men writers so they decided to go against this plot. With women writers some would tend to go against the sentimental romance plot and instead write about actual situations that were happening around them. One example of this would be in Kate Chopin’s story â€Å"The Storm† it featured a married women falling into the seductions of a old flame. Do you remember in Assumption, Calixta? He asked in a low voice broken by passion. Oh! She remembered; for in Assumption he had kissed her and kissed and kissed her; until his senses would well nigh fail, and to save her he would resort to a desperate flight. If she was not an immaculate dove in those days, she was still inviolate; a passionate creature whose very defenselessness had made her defense, against which his honor forbade him to prevail. † Pg. 59 Author Kate Chopin was unable to publish her works because of the featured adultery with no follow up punishment, in order for her to successfully publish she would have to follow the sentimental romance plot and kill Calixta in the end to prove that the decisions she made were wrong and had consequences. Mary E. Wilkins in â€Å"The Revolt of Mother† is another example that goes against the grain of the sentimental plot it deals with a mother that confronts her husband and goes against his say so which in the 19th century was something that was frowned upon. Now father, said she you needn’t be scared. I ain’t crazy. There ain’t nothing to be upset over. But we’ve come here to live, an’ we’re goin’ to live here. We’ve got jest as good as right here as new horses mind I wa’nt fit for us to live in any longer, an I made up my mind I wa’n’t going’ to stay there. I’ve done my duty by you for forty year, an’ I’m goin’ to do it now; but I’m going to live here. † Pg. 672 After this story was published many people thought that it was based on a true story but Mary E. Wilkins explained that no New  England women would ever dare confront her husband it was all just a fantasy. Another example of the reversed sentimental plot would be in Charlotte Perkins Gilman story â€Å"The Yellow Wall-paper† It is based on a women who is said to be having nervous breakdowns and is being taken care of by her husband a physician she later comes to relies that she will no longer be trapped or hide her emotions. â€Å"I’ve got out at last. Said I, in spite of you and Jane! And I’ve pulled off most off the paper, so you can’t put me back! † pg 803. What all of these story’s have in common is that they tried to convey across the situations that the women were in and all of them one way or another expressed how the women felt trapped by the men. When it came to men writers they would always include a sentimental hereon in their stories. Henry James published â€Å"Daisy Miller† in 1978 and it dealt with a young unmarried woman somewhat considered an orphan because her parents were never around, who was seen in society as an outcast cause of the way she would conduct herself around men. Miss Daisy Miller was a flirt – a pretty American flirt. He had never, as yet, had any relations with young ladies of this category. He had known, her in Europe† pg. 427 since Daisy Miller was portrayed as an uneducated flirt Henry James followed the sentimental plot by giving Daisy a terrible case of the fever and later died. Later after the story was published Henry James stated that he believed that Daisy was innocent and that he did not kill her to state a point, it just so happened that she caught fever. So in some sort of way this story can sometimes be said that it was not your typical sentimental plot. Another male writer that followed the sentimental hereon was William Dean Howells â€Å"Editha† this was about a young unmarried woman who practically forces her boyfriend to enter the war in order to show off in front of others. â€Å"I shall always love you, and therefore I shall never marry any one else. But the man I marry must love his country first of all, and be able to say to me, I could not love thee, dear, so much, loved I not honor more. In these two story’s It seems to me as if the men writers are trying to put women down by making them seem selfish and not following the norm of obeying the men’s commands or ways of lifestyle that they want them to follow. In all of these stories we can see that there is a big difference in how men and women respond to the sentimental romance plot. The women write about there own personal experiences and the things that they see happen around them and the men write about what they want the people to read for example the good will get a great husband and get married and the bad will get punished and die.

Friday, August 30, 2019

Forces That Shaped the Mi’Kmaq Relations with the Europeans

What forces shaped the Mi’kmaq relations with the Europeans? When the early settlers of the Americas arrived on the East coast of what is now Canada, they discovered a people that was remarkably different from their own. First impressions would deem these people as â€Å"uncivilized† (source) â€Å"savages† (source) who lived â€Å"miserable lives† (source). However, as time went on the settlers began to realize just how deeply rooted this Aboriginal culture really was.The Mi’kmaq lived a simple nomadic hunter-gatherer lifestyle, able to recognize the stars and changing of the seasons leading them to a variety of different sources of food dependant on the season. Culturally they were a spiritual group, one that believed to live with the earth, not off the earth and practiced ceremonies to show appreciation of what the land gave them. Together they shared this land. Individually they were free to pursue their own life path without restrictions, resul ting in several sexual partners, homosexuality, marriages and divorces.They were a mostly peaceful people, preferring the act of gift giving over warfare which they only resorted to when deemed necessary. To the Mi’kmaq warfare was never used as a way to gain territory like their European counterparts but rather a way to seek revenge for wrongdoings. (paraphrase source) As the early European settlers and the Mi’kmaq people began to become familiar with each other, they found some common grounds in these values and learnt to peacefully coexist with each other creating a positive relationship built on trade, alliance and friendship.However, as time went on Mi’kmaqs values and very means of survival were challenged when settler population increased, warfare between the British and French ended with British officially claiming the territory through several treaties and were eventually backed up by the influx of Loyalist century. When the first French settlers began to arrive to the area the Mi’kmaq were optimistically curious of them. They viewed them as fellow man, as equals, who brought with them gifts of useful utensils, tools, alcohol, and weapons. source) The Mi’kmaq were quick to ceremoniously return the favor to their new friends, sharing with them their knowledge of the land and giving them furs. The Mi’kmaq who roamed over a large territory saw no harm in allowing the small French population of (HOW MANY? ) to settle in the Bay of Fundy region. (Wicken print off – 95-96) The similarities and differences between the Mi’kmaq and French people both helped improved relations.Differentially, the Acadians were sedentary and relied on agriculture and livestock for food, which worked well as the Mi’kmaq were able to continue their nomadic hunting gathering lifestyle undisturbed. Similarly, they shared a commonality in spirituality. Although they believed in different versions they were fascinated by e ach others beliefs and some Mi’kmaq were actually drawn into Catholicism and baptized(HOW MANY? SOURCE). Trade furthered improved relations as time went on the Mi’kmaq would reach a point of dependency on European goods.Evidence of improved relations can been seen in intermarriage between the two groups (HOW MANY? SOUCRE) Initially the Mi’kmaq had a much larger population and were never threatened by the settlers, mainly seeing them as a friend with many benefits economically, culturally, and at times militarily (EVIDENCE OF MI’KMAQ FRENCH FIGHTING TOGETHER IN EARLY SETTLEMENT YEARS) They continued these relations for about a century, with only minor conflicts erupting every now and then, but nothing that would seriously jeopordize their relationship. source). Over that century the French population remained quite low and numbered only about half of that of the Mi’kmaq population. This advantage acted as almost a power in which the Mi’kmaq a ble to preserve their ways and not give into French pressures to fully convert to Christianity or to living a sedentary agricultural lifestyle. This would all change when the Acadian population began to increase. (NUMBER OF INCREASE AND SOURCE) As the Acadian population increased so did tensions between the Acadians and the Mi’kmaq.As the population in Acadian grew so did their need for more food. In order to get more food they needed more land that they could use to farm with. The Acadians would take land near the ocean which they could use to fish and also they cleared forests which destroyed the habitats of animals which the Mi’kmaq used to hunt. The Mi’kmaq were therefore forced to look elsewhere for food. There were reports of some Mi’kmaqs who were forced in land looking for food, actually taking livestock from the Acadians.Threats would go back and forth over this growing tension. The Acadians would report these incidents to their council, but the council wise in noting that the Mi’kmaq were still in a majority choose not to punish them for their actions, preffering to avoid conflict and simply reimbursing the lost goods out of their own pockets. Evidence again can be demonstrated in intermarriage between the two groups as only one aborniginal women has been recorded as marrying an Acadian over (time period).The growing population in British settlements would be seen as alarming for the Mi’kmaqs who had a much more negative view of these settlers. Unlike the Acadian settlers a strong relationship had not been formed over the last centrury. The British were invasive and they shared very little in common with them. – Ramsay cook argues that the first European settlers were intent to civilize the so called savages through agriculture, technology, religion and language without realizing that these people were already civilized, just in a different way. In the early 18th century, the Mi’kmaq were a semi -nomadic peoples, who moved around the land freely according to the seasons. This lifestyle allowed them to live independently outside of the French and British querrals choosing for themselves when to go to war and when to agree to peace. -As conflict between England and France intensified in the 1740s tensions between the Acadian and Mi’kmaq populations grew.

Thursday, August 29, 2019

A Survey on Mobile User’s Data Privacy Threats

A Survey on Mobile Users Data Privacy Threats ABC EFG 1 , ABC EFG 2* and ABC EFG 3 Â   4. Security Challenges for Mobile Devices Mobile device applications offer a level of convenience that the world has never think before it. Everywhere (home. Office, hotel, playground, road, parking, picture palace, travelling in different countries or each place of world) any mobile user can use applications to fulfil their daily needs like communicate, buy, search, payment, sell, entertainment, find general information of their use. This extreme level of comfort has brought with it an extreme number of security risks. Below describing some mobile device challenges, how the vulnerabilities and attackers reducing mobile applications freedom. 4.1 Insecure Data Storage It can result in data loss for a user, after losing mobile devices an application is improperly secured and all user at risk. Some common piece of data store at high risk like personal information (Name, Address, Date of Birth, Banking information, Family information , Family picture, Social networking address, email address) ,working information (company name, working position, related some application, company contact numbers and official documents if any available). 4.2Physical Security Physical security of any mobile devices is too difficult, but when mobile users are constantly using mobile devices, which is in always for 24x7x365 and user lose his mobile device then the task becomes seemingly impossible. Intentionally physical security is most concern for risk free mobile devices. If a person lost and misplaced or theft their mobile devices so it may be misuse user’s sensitive data, personnel information, email correspondence , any unsecured documents, address books, business data and files by the thief . 4.3 Mobile Browsing Mobile browsing is the best feature for any mobile devices for providing best use of internet application but mostly in mobile devices user cannot see the whole URL or web address, least verify whether the web a ddress or URL safe or not and user reach (browse) their way into a phishing related attack. 4.4 Multiple User Logging Due to progressive growth of social media Single sign-on (SSO) in the mobile application ecosystem it is estimated 60% of mobile application insecure by using same login to multiple social networking application. Hackers who got login credentials for website or apps twitter , Facebook can possibly gain access to user’s profile page. Outmost use of social media single sign-on (SSO) is actually to facilitate social interaction at same time the developer also gain access to some of social information related to sign in user. 4.5Client Side Injection The execution of malicious programs on the mobile devices over the internet medium by application or web browsing client side injection occurs. Html injection ,SQL injection or other newer attack(abusing phone dialer, SMS ) comes in the client side injection. Hackers could load text based attack and exploit targeted e xaminer. In this way any source of data can be injected including resource targeted files or application 4.6 Application Isolation Mobile application is just about everything from transaction, business ,personnel and social networking. Before installing any application in your mobile devices clearly see the permission agreement, privacy and how to access your device with that application. It might be any application theft user sensitive data ,financial data, business data ,personnel data and other valuable file.

Wednesday, August 28, 2019

The Effects of Long-Term Care on the Quality of Life of the Elderly Essay

The Effects of Long-Term Care on the Quality of Life of the Elderly - Essay Example 1. Long term financial plans to underwrite the costs of LTC in a bid to resolve the problem of poor service delivery due to underfunding. Currently the funding of this sector is very low and with more people requiring such services soon, the system will be overburdened with financial needs. Nearly 70 % of those turning 65 in the year 2006 will need long-term care (LTC) in their lifetimes; 20 percent will need it for five years or longer. (Marcia, Clemmitt, 2006) 2. The staffing needs of the industry will be addressed by this study and thus help to plan staffing and labor related issues. The staffs available to deal with the huge numbers of elderly people are simply not available. An urgent recruitment and retraining of existing staff is necessary to cope with the challenges of new procedures and delivery systems. This issue is all the more acute taking into consideration that the need for caregivers will rise by 39%between 2000 and 2010, yet the population of those that make up the bulk of this workforce(18 – 55 tear old women) will increase by only 1.25%.(Marcia Clemmitt, 2006) 3. The appropriate service delivery systems necessary for the improvement of LTC and the future trends in relation to home and community based care of the elderly. Changing technology and newer treatments make it imperative that the delivery systems be continually updated to keep pace with the new developments. (Robyn I. Stone. 2000) The study will focus on how long term care (LTC) programs can be financed by the state and federal governments. It will identify the sources of income and possibly see how the general public benefitting from home based treatment and institutionalized care may contribute to this effort. The financial plan of this program must be long term in nature to take into consideration the increasing number elderly people that will need such care soon. Public insurance schemes like Medicare have been poorly managed. This study will examine how

Tuesday, August 27, 2019

US Immigration History Reading Journal Essay Example | Topics and Well Written Essays - 250 words

US Immigration History Reading Journal - Essay Example Adams (242) criticizes the exploitation by immigrant parents of their children’s earnings, and extols the role of public schools as Americanizing agencies: school-going daughters educate their immigrant mothers. The third sociologist (244) depicts the patriarchal immigrant family, in which arranged marriages are the norm, and children automatically assume responsibility for their parents. The the three Italian-American males (246), regret the undermining of traditional parental authority and the American-like freedom granted to immigrant women. The accounts of Swedish-Americans (248) demonstrate the economic and personal freedom gained by immigrant women in the USA. The Mexican ballads (249) echo the earlier Italian chauvinistic protest against liberalization of female behavior. The narrative of a Chinese prostitute (250) shows that, in some cases, female exploitation by ethnic groups continues even after immigration. Diner’s essay (252) depicts how low marital rates, late marriages, desertion by husbands and prevalent domestic violence, combined with Irish women’s long stint in the labor force, effectively raises women’s authority and status within the family order. Finally, Ruiz’s (262) essay uses oral testimony from Chicano women to show the tension between expected adherence to traditional culture and the attraction of the American way of life. World War 11 brings new employment opportunities and hastens the Americanization of Chicano immigrants. By the judicious choice and mix of primary sources, the author has succeeded in giving a very vivid picture of the life of women in traditional immigrant families and the changes brought about by contact with American society. It is evident that it is the women who served as the most active agents of change and accelerated the assimilation of immigrants into American

Monday, August 26, 2019

Iron and silk Essay Example | Topics and Well Written Essays - 750 words - 1

Iron and silk - Essay Example In the book, several times, people exert authority over him in a way he finds frustrating. This essay seeks to address several issues raised by Salzam in his book Iron and Silk, such as people frustrating him and others through exerting authority over them in a brutal way. One incident was when he killed a large rat during a lesson out of pure reflexes. A student suggests that he takes the rat across to the rat collection center so that he can receive a reward. He does not however get it as he is told that the reward is restricted to students killing rats in the dormitory. Later on a student explains to him that the official statements concerning rats is that they were no longer existent and that only internal documents that foreigners cannot read admit to the rat problem. Since he had killed the rat, he could not be rewarded as that would imply that they admit to the presence of rats and they could be criticized. Usually, I have found people to do what would appear to be a silly thing in order to protect how others think about them. It is in their nature to want to control the information that other people receive about them which informs their opinions towards them, for example how people carefully select what to post on face book. In this scenario, the institution would rather have denied the rats’ presence to an outsider that had seen one and obviously knotted their being than to admit to the public that they actually war. To them, it was a case of choosing the better evil. His restraint in this situation is however recommendable as he refuses to dwell for long on his grievances. This they probably did to protect their own reputation as an institution. It has been argued that actions that are felt to be wrong produce a need to withhold knowledge of them from others, which produces guilt and hostility. This implies that if one has been unable to solve a problem well and satisfactorily, they feel ‘forced’ to commit another action that

Project management Essay Example | Topics and Well Written Essays - 250 words - 12

Project management - Essay Example This is where all the required materials and methodologies are put on board so that the project is delivered on time. Control: This is important to control the cost, issues and the scope of the project to manage risks, time the project benefits effectively. This generates a report that gives the information required to result a good project. Team management: As a project manager, one is responsible for managing the project team members (Lock 194). Project work is mostly different from most business activity and needs proper management and training for better results. Communication: One must make sure that clear communication to all the team members is enhanced and to all the stake holder of a project. In adequate communication among team members, leads to a project failure, and hence communication is very vital. Procurement: This is the area that requires high level professionals especially when it comes to buy materials such as it systems to be used in the project. A project manager should take extra care when making a choice in this area for the appropriate materials. Integration: As majorities of projects do not stand on their own they often carry impacts to other areas in an organization. In project management, it is always important to make sure that the project will interface freely with other existing

Sunday, August 25, 2019

Essay in hr Assignment Example | Topics and Well Written Essays - 2500 words

Essay in hr - Assignment Example Studies conducted over the years have supported the argument that of the various factors that influence employee motivation and commitment at the workplace fairness and trust were ranked the highest. Although there is considerable debate and lack of consensus over the concept and appropriate definition employee engagement, there is hardly any disagreement or doubt over the issue of fairness and its relevance at the workplace. It has been clearly established by various researchers that along with adequate pay and opportunities the existence of fairness in the organisation and trust toward the management play a key role in gaining employee commitment and dedication. The psychological contract is a metaphorical representation of the various factors that help organisations in emphasising and exploring the key issues affecting their employees. It affords the management in addressing a range of issues faced by the employees and in devising effective plans to overcome the same. The fundamental objective of a psychological contract is to ensure that the management places more emphasis on the ‘people’ i.e., the employees as they are integral for organisational success and development. It also focuses on improving and enhancing the relationship between the employees and the management / organisation. The employees are integral to the success of any organisation and are instrumental in improving the profitability of the organisations. Hence various organisations include the element of ‘psychological contract’ as part of their strategic plans in order to help the organisations grow and prosper. It helps in the overall developmen t of the organisations and help in tapping the energies, creativity and knowledge offered by the employees (Truss, Soane, and Edwards, 2006). There has been a drastic change in the manner in which organizations operate and function. The attitude toward the employees has also

Saturday, August 24, 2019

FLSA Essay Example | Topics and Well Written Essays - 500 words - 2

FLSA - Essay Example me spent by workers after threshold (40) hours in a work-week is "FLSA overtime." This is to be noted here that few jobs may use the word "overtime" otherwise, as for example to describe "extra time worked after the employees normal schedule" or "time worked beyond normal hours in a day†. An organization may pay employees on whatsoever it wishes, keeping in mind that actual pay does not fall below the least standards defined by the FLSA. It is, therefore, allowed for an employer to apply the word "overtime" to mean something else from the actual definition of "overtime" prescribed by FLSA. However, that does not alter the meaning of the word â€Å"overtime† for FLSA principles, and it is important to keep the meaning of "overtime" to its legal definition in deciding the FLSA rights of employees. "Time worked after of normal working schedule" may not equate "time worked after threshold time (40 hours in a work-week)." Only the second is "overtime" under the FLSA rules, an d the FLSA governs only pay due for the overtime as per FLSA (McCarty, 2010). According to the Unites States Department of Labor (DOL), the time spend by employees performing duties that are related to job is termed as â€Å"work –time† and considered as working hours and must be paid, except attendance is beyond regular working hours. Important FLSA regulations on above points are at â€Å"29 CFR 785.11, 785.12, and 785.13†. Note as per FALSA rules all the activities that not benefitting the employer during the overtime should not be considered to pay. The reason for which I feel that Mr. Mike Murphy does not have a right to FLSA claim, because during his job he manages to train himself and stay in shape while he is on duty so that he can proceed to perform the required physical test in order to pursue his duties as a member of SWAT team. The extra overtime that was shown on his time card was outside of and in addition to the allotted time specified by the company, which was not the

Friday, August 23, 2019

Wal-Mart Strategic Management Essay Example | Topics and Well Written Essays - 2750 words

Wal-Mart Strategic Management - Essay Example But certainly the situation was not the same in the late 1950s or early 1960s, when Wal-Mart began its operations. Porter's five forces analysis proves to be quite useful in finding out the attractiveness of an industry. Porter came out with the five forces analysis, which helps in analyzing the attractiveness of an industry by taking into account different aspects of the business. Porter's Five Forces have become a yardstick for assessing industry profitability. This helps the retailer in consistent performance and planning. The five forces are; Suppliers: In today's context, large supermarkets like Wal-Mart have the overwhelming advantage over the small shopkeepers, as they are in a position to dictate the price they pay to the suppliers. The situation may not be as challenging for suppliers as now, but the lucre of supplying large quantities to reputed companies had always been there, as it helps the suppliers to leverage the economies of scale. Well, the number of stores of Wal-Mart and its presence was not as prevalent as today, but we must also take into account that the population and number of customers too was less. Therefore, even if we go back by about 55-60 years, we could easily figure out that the power of suppliers was not substantial enough to dictate terms to Wal-Mart. This helped the company to further strengthen its discount retail business. Competition: Competition in the retail business is a relatively newer phenomenon. The era of colonialism can very well be said to have given shape to the trend of globalization, but the roots of modern era of globalization came on the horizon in the late 1970s or early 1980s. Policies of liberalization by many countries around the world provided the all important catalyst to the modern era of globalization. There were indeed some reputed companies like K-Mart, Sobeys Inc, Family Thrift Centre etc in the retail business when Wal-Mart came out its concept of discount retail business, which might have given interesting competition to Wal-Mart even during those early days. Potential Entrants: Looking at the number of retailers and timeline of their origin, it becomes quite clear that the retail business seemed to attract quite a few entrepreneurs. Dan's Super Market, Wally's Supermarkets etc. are some of the new entrants during the 1950s, which found the retail business quite attractive. Therefore, while carrying out the discount retail business, the threat of new entrants was quite genuine one for the company even during those days. Buyer/ Customer's Power: If we go by the present circumstances, it is amply clear that today the customer is indeed treated like a king. Today companies believe in trying all out efforts to invite the attention of the customers and provide them with attractive discounts, better quality products and services. But the situation

Thursday, August 22, 2019

Richard and the Battle of Bosworth Essay Example for Free

Richard and the Battle of Bosworth Essay On 22nd August 1485, King Richard III lost the Battle of Bosworth to Henry Tudor. One of the main reasons for him losing was due to his unpopularity with the people and his nobles. Richard was disliked by many of his nobles because he gave power to nobles from the north, which he knew, annoying the nobility in the south of England. This meant that in the battle he had little support, and some of his nobles, such as the Stanley’s fought for Henry. Richard was also disliked by the people of England. He seized the crown in 1483, and rumours spread that he killed his two nephews. This made him disliked, and few people supported him. Another reason Richard lost the Battle of Bosworth was because of the Stanley’s changing sides. The Stanley’s controlled around 6000 of Richards troops, around half of his overall army. Although the Stanley’s began the battle on the side of Richard, they changed during the battle. This meant that Richard has far fewer troops than he may have anticipated, and had the Stanley’s not changed sides, it is possible that Richard would have won. Many of Richards other nobles were also unreliable, such as Northumberland. He did not help Richard when he needed it, refusing to bring in Richards reserves, and eventually surrendering, giving Henry an advantage over Richard, helping him to win. Another reason Richard lost was because of the support Henry had from the King of France. In 1485, the King of France wanted to distract Richard from invading France, so he gave Henry an army to invade England. When Henry landed in Wales with these extra men, many people joined him on his march through Wales to Bosworth, increasing the size of his army greatly. Another factor leading to the defeat of Richard at the Battle of Bosworth was Richards’s hesitance on the battlefield. Richard did not take advantage by attacking Oxford whilst he was deploying his troops. This allowed Oxford to launch an attack on Norfolk, who was soon killed. Although Surrey takes command, Richard lost men fast. Richard was so hesitance because he was so unsure of his support. A final factor which lead to the defeat of Richard at the Battle of Bosworth was the growing mistrust for Richard. Many Yorkists became so unhappy with the situation in England that they looked elsewhere for help. Many of them turned to Henry, and supported him in training and creating an army for him to fight with. This support from people once loyal to Richard led to him losing the battle because he did not have enough people fight for him, as many people in England were behind Henry.

Wednesday, August 21, 2019

Decrease Clabsi in the Nicu Essay Example for Free

Decrease Clabsi in the Nicu Essay The purpose of this initiative is to decrease and/or eliminate central line-associated bloodstream infections (CLABSI) in the neonatal intensive care unit (NICU) at Aurora Bay Care Medical Center. Hospital acquired infections, including CLABSI, is a major cause of mortality, prolonged hospitalization, and extra costs for NICU patients (Stevens Schulman, 2012). The goal of this initiative is to decrease CLABSI by 75% by reducing the number of days lines are in and standardizing the insertion process and line maintenance. CLABSI is preventable and increases the risk of neurodevelopmental impairment in very low birth weight infants. It is estimated that up to 70% of hospital acquired infections are caused by CLABSI in preterm infants (Stevens Schulman, 2012). It is also estimated that 41,000 CLABSI occur in United States hospitals every year (Centers for Disease Control and Prevention [CDC], 2012). It is easily preventable by managing the central line properly. Insertion of the central line must be done completely sterile and rigorous care needs to be done with catheter care. The catheter hub is the main culprit of infections so that needs to be a large part of the initiative (Stevens Schulman, 2012). The participants in this initiative include neonatologists, neonatal nurse practitioners, nurses, infection control personnel, the NICU supervisor, and the NICU manager. Together, they will form a core team of 10 people with at least one person from each level of care. The team will analyze the NICU practices and establish practice based on evidenced based practice. The team will investigate the cause of each infection and agree on changes that need to be made. They will meet every other week until the new practices have been established, at which time they can determine how often they need to meet. Each member must play an active role in the investigation process as well as the agreed-upon changes. There are multiple benefits to the proposed initiative. Hospital acquired infections will be reduced which means there will be a reduction in harm to the patients. This will mean a  major cost savings to Aurora Bay Care Medical Center because there will not be that additional cost of treating a preventable infection. Staff will be collaborating together for the greater good of the NICU. The best practices that come out of the initiative can be shared with other NICUs to help decrease CLABSI across all hospitals. The cost of the initiative will be minimal compared to the cost of treating a CLABSI. On top of the morbidity and mortality resulting from the infection, the financial costs are significant. Many of these costs are no longer covered by insurance because the infection was a result of the hospital stay. The CDC recently estimated the cost of a CLABSI to be $29,156 per case with an estimated mortality of 12-25% (Horan, 2010). The largest cost that will incur because of this initiative will be staffing costs. The team of approximately 10 people will get paid for their time on the team that will meet every other week for an undetermined amount of time, not to exceed 3 months. Any time spent on research will need to be reimbursed. The entire staff will need to be trained on the new processes before they are rolled out. They will be required to do hands on training as well as complete a competency designed by the team. There will not be an increase in the cost of supplies, as the NICU has all the supplies necessary at this time. If it is determined they need different supplies, it will be addressed at that time. Data definitions and the procedures used for collection will be determined by the team at the first meeting. The data will be tracked from the first day the team meets throughout the course of the quality initiative. The original goal will be to decrease CLABSI by 75% in the first year. A detailed analysis must be performed on the processes that were used to implement and maintain evidence-based practices. Each infection must have an investigational analysis completed. The data that is collected will be completely confidential so as to not break the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rules. In conclusion, the purpose of this initiative is to reduce CLABSI by at least 75% in the NICU at Aurora Bay Care Medical Center. This will be accomplished through training and education to the doctors, nurses, any staff that comes into contact with the infants, and the parents. This is a win-win for both the patients as well as the hospital because it will reduce morbidities and mortalities caused by the preventable infection as well as reduce costs significantly for the  hospital. References Centers for Disease Control and Prevention. (2012). Central line-associated bloodstream infection (CLABSI) event. Retrieved from http://www.cdc.gov/nhsn/pdfs/pscmanual/4psc_clabscurrent.pdf Horan, T. C. (2010). Central line-associated bloodstream infection (CLABSI) criteria and case studies. Retrieved from http://www.azdhs.gov/phs/oids/hai/documents/NHSN_Workshop1_CLABSI_Criteria_Studies.pdf Stevens, T. P., Schulman, J. (2012). Evidence-based approach to preventing central line-associated blood stream infection in the NICU. Acta Paeditrica, 11-16. doi:10.1111/j.1651-2227.2011.02547.x

Tuesday, August 20, 2019

Adopting MapReduce and Hummingbird for Information Retrieval

Adopting MapReduce and Hummingbird for Information Retrieval Adopting MapReduce and Hummingbird for Information Retrieval in dedicated cloud Environment Dr. Piyush Gupta Chandelkar Kashinath K. Abstract: Data collected in section 3 indicated the number of active internet users across the globe. The collected chunks of information termed as Big Data not only utilizes physical resources into the network, but also leads to increase in human and financial resources. Cloud computing being a technology with IaaS (Infrastructure as a Service), PaaS (Platform as a Service) and SaaS (Software as a Service) provides virtual resources on pay per use policy. MapReduce being widely used Algorithm is used in line with Hummingbird Search engine for information retrieval. Keywords: MapReduce, SaaS, IaaS, PaaS, Hummingbird, Big data 1. Introduction One of the papers published in International conference at Jaipur, entitled â€Å"The Need and Impact of Hummingbird Algorithm on Cloud based Content Management System† [21] elaborates on existence of humming bird algorithm on 15th birthday of Google. In existence with previous Google algorithms like panda 3.5, page rank and penguin, hummingbird is a new replacement of full engine instead of repairing individual modules. This has affected 90% of data across the globe. Migrating MapReduce algorithm on cloud environment using Hadoop, not only improves performance due to cloud features but also the efficiency is increased with cost minimization. 2. Problem Fig-1: Data center Source: IBM Enterprise System Fig-1 gives a snapshot of engineers working at data centers who manages information from diverse platforms and resources. Managing hardware and Network with virtualized resources needs dedicated young talent. When it comes to end user, he gets an average service as a result of improper management of data centers. MapReduce is one of the best known algorithms used for IR (Information Retrieval) in addition with existing algorithms as explained in section 7. Due to exponential increase in smart devices that supports voice based search, definitely needs fast and efficient searching algorithm for information retrieval. The voice based search assists to make smart decisions in real time applications like place identification, weather forecast and medical assistance using android based applications. 3. Why problem is important Fig-2: Global Internet users Source: W3 Foundation Looking at data increase across the globe as shown in Fig-2 (data collected till July 1, 2014) [19], the pilled content in repositories is increasing worldwide. It requires huge amount of hardware resources running for years to extract information and knowledge for decision making. The big challenge in big data is ever increasing content utilizing human resource and cost to create chunks in available networks across the globe, which needs attention. 4. It is an unsolved problem From the following relevant reviewed literature (table-1), it gives a blueprint that the problem has still remained unsolved. The authors have either focused on cloud components [6] [11] or had used traditional Google Components during the analysis. Since Hummingbird Algorithm [10] is not keyword based the searching criteria have changed. When combined with MapReduce [1] [3] [15] in cloud environment shall definitely yield efficient results with minimum cost and resources. Table-1: Existing Systems compared 5. Here is my idea Fig-3: Proposed Information Retrieval System Being cloud computing [4] [6] is upcoming Technology as discussed in section -7.2, is a good source of virtualized resources that helps to manage content on diverse platform irrespective of geographical boundaries. An instance of Hadoop that supports MapReduce Algorithm (elaborated in sec-7) is migrated in cloud environment using SaaS (Software as a Service) to whom input is diverted for processing. Hummingbird (more in section-7) Algorithm is a brand new search engine designed to understand meaning from acquired query instead of word, is imparted to collect output from MapReduce instance. The collected output on Amazon S3 cluster is efficiently and effectively delivered to end user based on voice based request, in addition to traditional systems for efficient decision making in the field of medicine, scientific research and so on. 6. My idea works To confirm the working of proposed idea, a hosted instance of Hadoop was used that supports MapReduce Algorithm and S3 data cluster from Amazon. It also has Qubole [20] managed database to test the instance in cloud environment. Qubole has an API (Application programming Interface) that gives overview of running instances through dashboard. A user shall give input as a database or can manually select file in addition to query wizard. Once the input is given to MapReduce cluster, data analysis shall be done by using hive query in addition to pig script. Following results were collected by using existing database. Fig-4: Cloud based Hadoop Instance Source: Qubole Figure -4 shows a dashboard running Hadoop instance, in which 2 queries have finished data analysis. It communicates at runtime with Amazon S3 bucket where data is stored for input. The mapper [1][3][15] scans the data files from the source and extends the output to reducer. The reducer further processes data and is sent back to S3 cluster for further processing. This information shall be accessed by end user through web access and with the support of Hummingbird Algorithm. Fig-5: Running Hadoop Cluster Source: Qubole Fig-5 shows a single running Hadoop Instance in cloud environment. Qubole supports metrics of instances running simultaneously that enhances performance their by increasing efficiency. The graph in the above figure indicates time spent to complete single job. Every task is monitored by master DNS having unique ID. To each DNS a list of queries shall be given as input for further analysis. Fig-6 shows process getting started on Hadoop Cluster that combines both map and Reduce session together. The jobs performed uses batch processing system for single instance. Running multiple instances on different clusters in cloud environment makes process more efficient without investing much is physical infrastructure. As a result of which end user shall enjoy the benefits of information retrieval with minimum time, cost and physical resources. As cloud supports pay per use policies resource allocation as per requirements becomes easier. Fig-6: Hadoop Master DNS Source: Qubole Detail explanation about concepts existing algorithms used for information retrieval BFS(Bredth First Search) Redundant BFS. ISN (Intelligent Search Machine) Directed BFS Random walker search Randomized Gossiping Centralized approach Distributed Information retrieval Searching Object identifier Following explanations shall help to elaborate more about specific areas. 7.2 Cloud Architecture Fig-7: Cloud Architecture Source: NIST Cloud is an upcoming technology that supports IaaS (Infrastructure as a Service) PaaS (Platform as a Service) and SaaS (Software as a Service) as shown in Fig-7. For any hosted instance in cloud, open source software is used as a server that supports virtualization and Grid technology. Virtual private network is used in addition to broadband network13] [16]. As a service provider SLA (Service level Agreement) is signed between an organization and service provider. Distributed computing is one of the known components as data transferred across the network requires secure, authentic and efficient service in a given network. The type of cloud includes public, private, community and hybrid cloud [2]. Private clouds are hosted in dedicated environment having firewall and other authentication features. Updating existing system and taking backup remains responsibility of the owner. Hybrid clouds may be hosted in private environment in synchronization with public resources. The end user held responsible for resources used in public cloud with minimum security. 7.3 MapReduce Algorithm Fig-8: MapReduce Algorithm Source: Jimmy Lin, University of Maryland The algorithm takes data input as a file or database in the form of query. A list of mapper instances are activated which travels across the database in search of information. The jobs or data values are shuffled based on keys and aggregated as an input to reducers. These reducers understand the key inputs and reshuffle to get unique relevant information for further processing as shown in Fig-8[1]. 7.4 Hummingbird Algorithm Hummingbird Algorithm [10] [21] is the latest birthday gift from Google. Panda 3.5 and penguin were basically filters applied to searching criteria in the form of web pages and hyperlink. The traditional search engine extracts information based on keywords. Considering a sentence â€Å"How many times does hummingbird flap their wings per second?† the traditional search engine being keyword based tries to extract word like times, flap and per second. Based on collected keywords the web pages are searched in database. The collected content undergoes filtering from panda and penguin. Resultant results are displayed to user in the form of hyperlinks. Being hummingbird is innovation in the field of search and meant for voice based information retrieval, it accepts query as a single sentence instead of keywords. The engine tries to understand meaning and creates knowledge base from provided information or query. Fig-9: Hummingbird Search Source: Google.com In fig-9, the query asked to Google was where am i? Using voice search. The search engine had found my current location based on IP address or physical location and displayed map for the same. 8. Conclusion and future work The paper is continuation to hummingbird Algorithm [21] that supports MapReduce Algorithm with Hummingbird search engine in dedicated cloud environment. Qubole a hosted Hadoop instance is used to confirm working of MapReduce in support with Amazon S3 for data during. A single hive query instance on single DNS is tested which shall be extended for testing multiple instances of hive and pig script simultaneously as future work. References [1] Rahul Prasad Kanu , Shabeera T P , S D Madhu Kumar 2014- Dynamic Cluster Configuration Algorithm in MapReduce Cloud, International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014, 4028-4033. [2] Mr. Kulkarni N. N., Dr. Pawar V. P., Dr. K.K Deshmukh -2014 Evaluation of Information Retrieval in Cloud computing based services, Asian Journal of Management Sciences 02 (03 (Special Issue)) [3] Brian Hellig, Stephen turner, rich collier, long zheng-2014- beyond map educe: the next generation of big data analytics HAMR.Eti.com. [4] Ismail Hmeidi, Maryan Yatim, Ala’ Ibrahim, Mai Abujazouh, 2014 Survey of Cloud Computing Web Services for Healthcare Information Retrieval Systems , International conference on Computing Technology and Information Management, Dubai, UAE. [5] Anil Radhakrishnan and Kiran kalmadi -2013- Big Data Medical engine in the cloud, Infosys Lab Briefing Vol-11, No-1. [6] Dr. Sanjay Mishra, Dr. Arun Tiwari 2013 A Novel Technique for Information Retrieval Based on Cloud Computing, international Journal of information technology. [7] Yu Mon Zaw, Nay Min Tun 2013-Web Services Based Information Retrieval Agent System for Cloud Computing. International Journal of Computer Applications Technology and Research Volume 2– Issue 1, 67-71. [8] Gautam Vemuganti 2013- Metadata Management in Big data, Infosys lab Briefing. [9] Aaditya Prakash 2013-Natured Inspired visualization of unstructured big data, Infosys lab briefing, Vol-11, No-1. [10] Xinxin Fan, Guang Gong,Honggang Hu-2011- Remedying the Hummingbird Cryptographic Algorithm, IEEE. [11] Mosashi Inoue 2009- image retrieval: research and use in the information retrieval, National Institute of Informatics. [12] Jeff Dean Google Fellow 2009- Challenges in Building Large-Scale Information Retrieval Systems. [13] Tsungnan Lin, Pochiang Lin, Hsinping Wang,Chiahung Chen-2009-Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks, IEEE. [14] William Hersh -2008 Future perspectives Ubiquitous but unfinished: grand challenges for information retrieval, Department of Medical Informatics and Clinical Epidemiology, Oregon Health and Science University, Portland, Oregon, USA. [15] Jeffrey Dean and Sanjay Ghemawat 2004-MapReduce: Simplified Data Processing on Large Clusters, Google.com. [16] Mehran Sahami Vibhu Mittal Shumeet Baluja Henry Rowley 2003-The Happy Searcher: Challenges in Web Information Retrieval, google.com [17] James Allan 2002-Challenges in Information Retrieval and Language Modeling, Report of a Workshop held at the Center for Intelligent Information Retrieval, University of Massachusetts Amherst [18] Amit Singhal 2001- Modern Information Retrieval: A Brief Overview IEEE Computer Society Technical Committee on Data Engineering. [19] tp://www.internetlivestats.com [20] https://api.qubole.com [21] Dr. Piyush Gupta, kashinath Chandelkar 2012- The Need and Impact of Hummingbird Algorithm on Cloud based Content Management System, vol-2, issue-12, IJARCSSE journal.

Monday, August 19, 2019

Lord Of The Flies Essay -- essays research papers

Essay on Lord of the Flies   Ã‚  Ã‚  Ã‚  Ã‚  The novel, Lord of the Flies, was written by William Golding. William Golding was born on September 19, 1911. His literary ambitions began at the young age of seven. He received his Bachelor of Arts from Oxford University in 1935. His novels explore characters and situations. In Lord of the Flies, it is a time of war. A group of English schoolboys are on a plane, when they are attacked and they have to evacuate their aircraft. They find themselves on a remote island, somewhere in the Pacific Ocean, without any adult supervision. A boy named Ralph takes charge and forms a crude society, with a democratic type of government. Then, a boy named Jack decides to break off and form his own society, with him being the leader, governing with a dictatorship type of government, causing Ralph’s society to crumble and fall apart. William Golding believed that the defects of a society could be traced back to the flaws of the human nature. These societies were very differ ent from each other because the individuals were very different.   Ã‚  Ã‚  Ã‚  Ã‚  Ralph’s society was based on everyone having a say in the government. Ralph was kind and good to the people of his society. He let them have freedom and liberties which was not go for his society because they abused their freedom and became lazy and irresponsible. His society did not have their priorities in order because Ralph did not stress that the rescue fire and the ...

Songs :: essays research papers

I don't know if I'll ever know why Or hear the sound when angels cry What you said to me late last night I'll remember for the rest of my life Every night when you close my eyes I see the ways that you've touched my life And I want you to know that I'll Always be right here These are the days these are the moments that pass us by We ask the questions but we never really find out why I dig my toes into the sand The ocean looks like a thousand diamonds strewn across a blue blanket I lean against the wind Pretend that I am weightless And in this moment I am happy...happy I wish you were here... I lay my head into the sand The sky resembles a backlit canopy with holes punched in it I'm counting UFO's I signal them with my lighter And in this moment I am happy...happy I wish you were here... And all the roads we have to walk are winding And all the lights that lead us there are blinding There are many things that I Would like to say to you but I don't know how Because maybe, you’re gonna be the one that saves me And after all, you’re my wonderwall I'm here without you baby But you're still on my lonely mind. I think about you baby and I dream about you all the time. I'm here without you baby But you're still with me in my dreams And tonight, it's only you and me. Cuz it’s you and me And all other people with nothing to do Nothing to lose And it’s you and me And all other people And I don’t know why I can’t keep my eyes off of you What are the things That I want to say Just aren’t coming out right And tripping on words You got my head spinning I don’t know where to go from here I'm slow But I'm trying And I'm still dying to know Say you won't leave for the rest of my I can't have you leave for the rest of my Say you won't leave for the rest of my life listen to your heart when he’s calling for you listen to your heart there’s nothing else you can do I don’t know where you’re going and I don’t know why but listen to your heart

Sunday, August 18, 2019

Essay --

Examine the role of Robert Walton and the role of his letters in Frankenstein. What effect does this character and his letters have on our interpretation of Frankenstein? Dulcinia Martinez once stated that â€Å" without music, life would B flat† , well without Robert Walton and his letters, Frankenstein would be flat. it would be just another typical novel rather than a literary classic that is being carefully examined with detail in IB English courses or university. Robert Walton states in at the beginning of the novel â€Å"You will rejoice to hear that no disaster has accompanied the commencement of an enterprise†(Shelly, 15). Taking a closer look at that sentence, YOU is the first word of the start of the whole novel. Here, Mary Shelly is cleverly using the first person pronoun allowing the reader to sense an interaction with Robert Walton who is introducing the novel, but more importantly trying to communicate the morale purpose of the story. The book commences with a collection of 4 letters written by Robert Walton, who is a ship’s captain writing to his sister over his goal of "trac[ing] a secure way over the pathless sea s"(15) for reaching the North Pole from Russia. He soon, throughout his journey, comes across Victor Frankenstein who lies stranded and frozen on ice. If you look on the bottom page 26 (4th letter), the way Victor is described through Walton’s point of view as being â€Å"nearly frozen, and his body dreadfully emaciated by fatigue and suffering† (26), immediately gives the reader the idea of the struggles that Victor has faced. Walton’s narration not only gives Frankenstein an introduction, but it also sets the scene for Victor’s story to begin. Mary Shelly’s decision of giving Walton the role of narrator in allows for... ...tors story to be dangerous. and although Victor Frankenstein succumbed into his own fate†¦ If you look at the top of pg. 31, Victor warns Robert that if â€Å"You seek for knowledge and wisdom, as I once did; and I ardently hope that the gratification of your wishes may not be a serpent to sting you, as mine has been† (31). He warns Robert; as a result, Robert learns his limitations through his story. Making the outcomes turn out differently. While Victor Frankenstein dies due to his over ambition and lack of responsibility, Robert Walton learns from Victors story and takes responsibility for his crew members while safely returning them back home. And so Walton is the only one who survives in the novel, which is important since he is the one who delivers or signifies the moral purpose of victors story, highlighting the dangers of over-ambition through victor’s story.

Saturday, August 17, 2019

“Mirror” by Sylvia Plath Essay

The poem â€Å"Mirror† by Sylvia Plath is told from the point of view of a mirror hanging up on a wall. This mirror has, over time, been privy to the tears of a woman over who she sees in it, desperate grasps at moonlit lies, and the endless speculations of a pink with speckles wall. â€Å"Mirror† is a poem that probes into the corners of human nature, beauty, life, and death, reflecting back their truths to readers as good mirrors do. In this poem, readers can see the truth about themselves reflected among the words as though the poem itself is a mirror, too. Just as the poem reflects truths to readers, so the mirror in it reflects truths to the woman it sees every day. It is objective about everything it observes in the woman, for it can have no biases simply owing to the nature of its stature. The description the mirror gives of itself in the first few lines is that â€Å"I am silver and exact. I have no preconceptions./Whatever I see I swallow immediately/Just as i t is, unmisted by love or dislike./I am not cruel, only truthful-/The eye of the little god, four cornered.† It is giving, true to its nature, a frank description of itself—nonjudgmental and unprejudiced of its admirers. Mirrors never have and never will pass any judgment on their gazers. They leave that for the gazers themselves to do, and they always do just that, as is human nature. The mirror prides itself on that same clear-cut honesty of the faces it regurgitates back for judgment. It is almost arrogant about it, refusing to falter in its own perfection for a moment, even as â€Å"she turns to those liars, the candles or the moon† which cast false shadows upon her face. It continues to reflect the woman honestly, even though she cannot see it, so that when she learns of the lies and turns back, there she is in all her self-perceived imperfection. Not one person, the woman of the poem included, has ever been judged by a mirror, but rather through it. It is because of it that the woman can see her outer self, so also because of it, she sometimes forgets her inner self. She forgets the pink behind the speckles on the wall of her face, seeing only that the speckles are marring the beauty of it. The mirror, however, does not see the destruction the woman sees, for she is the only one of the two who has the desire to judge. She was the only true master of herself, but she ended up caving in under her preconceived notions of society’s view of her. She became a slave to the mirror and her interpretations its truths. One of these truths is age. No one has yet achieved immortality, and so death is still a formidable foe. Mirrors  reflect the coming of this rival in the rivulets and creases found in a face of age, and many people obsess over this manifesting. In the poem, according to the mirror, â€Å"I am important to her. She comes and goes./Each morning it is her face that replaces the darkness./In me she has drowned a young girl, and in me an old woman/Rises toward her day after day, like a terrible fish.† The woman in the poem â€Å"h as drowned a young girl† in her obsessions, aging her into â€Å"an old woman . . . like a terrible fish.† With each day, the manifestation becomes more pronounced because â€Å"Each morning it is her face that replaces the darkness.† She wasted away in front of that mirror so that now, death â€Å"Rises toward her day after day, like a terrible fish.† She hates the mirror’s honesty on the matter, but cannot turn away. She is unable to resist knowing that death is creeping ever closer every day. She lives her life, it seems, around that knowledge, convinced that she should not be as she is. She is, as the poem says, â€Å"Searching . . . for what she really is.† She is unaware that all around her, death is marking others down for capture with the lines of age. All she knows is that she has gone from â€Å"pink, with speckles† into a world of darkness that she disapproves of seeing in the mirror. She does not seem to under stand that in fact, no one will be left unaffected. â€Å"The eye of the little god† will seek out everyone from all four corners of the globe. In the end, her obsession kills her, the â€Å"terrible fish† having finally made it to the surface. The woman in the poem lives and dies within it, mirroring any and all readers’ lives in that. The poem offers up a universal reflection of a person for readers to judge themselves. After all, it is a mirror and that is what mirrors do.

Friday, August 16, 2019

The History of Computer Technology

Only once in a lifetime will a new invention come about to touch every aspect of our lives. Such devices changed the way we manage, work, and live. A machine that has done all this and more now exists in nearly every business in the United States. This incredible invention is the computer. The electronic computer has been around for over a half-century, but its ancestors have been around for 2000 years. However, only in the last 40 years has the computer changed American management to it†s greatest extent. From the first wooden abacus to the latest high-speed microprocessor, the computer has changed nearly every spect of management, and our lives for the better. The very earliest existence of the modern day computer's ancestor is the abacus. These date back to almost 2000 years ago (Dolotta, 1985). It is simply a wooden rack holding parallel wires on which beads are strung. When these beads are moved along the wire according to programming rules that the user must memorize. All ordinary arithmetic operations can be performed on the abacus. This was one of the first management tools used. The next innovation in computers took place in 1694 when Blaise Pascal invented the first digital calculating machine. It could only add numbers and they had to be entered by turning dials. It was designed to help Pascal's father, who was a tax collector, manage the town†s taxes (Beer, 1966). In the early 1800s, a mathematics professor named Charles Babbage designed an automatic calculation machine (Dolotta, 1985). It was steam powered and could store up to 1000 50-digit numbers. Built in to his machine were operations that included everything a modern general-purpose computer would need. It was programmed by and stored data on cards with holes punched in them, appropriately called punch cards. This machine was xtremely useful to managers that delt with large volumes of good. With Babbage†s machine, managers could more easily calculate the large numbers accumulated by inventories. The only problem was that there was only one of these machines built, thus making it difficult for all managers to use (Beer, After Babbage, people began to lose interest in computers. However, between 1850 and 1900 there were great advances in mathematics and physics that began to rekindle the interest. Many of these new advances involved complex calculations and formulas that were very time consuming for human calculation. The first major use for a computer in the U. S. was during the 1890 census. Two men, Herman Hollerith and James Powers, developed a new punched-card system that could automatically read information on cards without human (Dolotta, 1985). Since the population of the U. S. as increasing so fast, the computer was an essential tool for managers in tabulating the These advantages were noted by commercial industries and soon led to the development of improved punch-card business-machine systems by International Business Machines, Remington-Rand, Burroughs, and other corporations (Chposky, 1988). By modern standards the unched-card machines were slow, typically processing from 50 to 250 cards per minute, with each card holding up to 80 digits. At the time, however, punched cards were an enormous step forward; they provided a means of input, output, and memory storage on a massive scale. For more than 50 years following their first use, punched-card machines did the bulk of the world's business computing By the late 1930s punched-card machine techniques had become so well established and reliable that Howard Hathaway Aiken, in collaboration with engineers at IBM, undertook construction of a large automatic digital computer ased on standard IBM electromechanical parts (Chposky, 1988). Aiken's machine, called the Harvard Mark I, handled 23-digit numbers and could perform all four arithmetic operations (Dolotta, 1985). Also, it had special built-in programs to handled logarithms and trigonometric functions. The Mark I was controlled from prepunched paper tape. Output was by card punch and electric typewriter. It was slow, requiring 3 to 5 seconds for a multiplication, but it was fully automatic and could complete long computations The outbreak of World War II produced a desperate need for computing capability, especially for the military (Dolotta, 985). New weapons systems were produced which needed trajectory tables and other essential data. In 1942, John P. Eckert, John W. Mauchley, and their associates at the University of Pennsylvania decided to build a high-speed electronic computer to do the job. This machine became known as ENIAC, for Electrical Numerical Integrator And Calculator (Chposky, 1988). It could multiply two numbers at the rate of 300 products per second, by finding the value of each product from a multiplication table stored in its memory. ENIAC was thus about 1,000 times faster than the previous generation of computers. ENIAC used 18,000 standard vacuum tubes, occupied 1800 square feet of floor space, and used about 180,000 watts of electricity. It used punched-card input and output. The ENIAC was very difficult to program because one had to essentially re-wire it to perform whatever task he wanted the computer to do. It was efficient in handling the particular programs for which it had been designed. ENIAC is generally accepted as the first successful high-speed electronic digital computer and was used in many applications from 1946 to 1955. However, the ENIAC was not accessible to managers of businesses Mathematician John Von Neumann was very interested in the ENIAC. In 1945 he undertook a theoretical study of computation that demonstrated that a computer could have a very simple and yet be able to execute any kind of computation effectively by means of proper programmed control without the need for any changes in hardware. Von Neumann came up with incredible ideas for methods of building and organizing practical, fast computers. These ideas, which came to be referred to as the stored-program technique, became fundamental for future generations of high-speed digital computers and were universally adopted The first wave of modern programmed electronic computers to take advantage of these improvements appeared in 1947. This group included computers using random access memory, RAM, which is a memory designed to give almost constant access to any particular piece of information (Dolotta, 1985). These machines had punched-card or punched-tape input and output devices and RAMs of 1000-word capacity. Physically, they were much more compact than ENIAC: some were about the size of a grand piano and required 2500 small electron tubes. This was quite an improvement over the earlier machines. The first-generation stored-program computers required considerable maintenance, usually attained 70% to 80% reliable operation, and were used for 8 to 12 years (Hazewindus,1988). Typically, they were programmed directly in machine language, although by the mid-1950s progress had been made in several aspects of advanced programming. This group of machines included EDVAC and UNIVAC, the first commercially available computers. With this invention, managers had even more power to perform calculations for such things as statistical demographic data (Beer, 1966). Before this time, it was very rare for a anager of a larger business to have the means to process The UNIVAC was developed by John W. Mauchley and John Eckert, Jr. in the 1950s. Together they had formed the Mauchley-Eckert Computer Corporation, America's first computer company in the 1940s. During the development of the UNIVAC, they began to run short on funds and sold their company to the larger Remington-Rand Corporation. Eventually they built a working UNIVAC computer. It was delivered to the U. S. Census Bureau in 1951 where it was used to help tabulate the U. S. population Early in the 1950s two important engineering discoveries hanged the electronic computer field. The first computers were made with vacuum tubes, but by the late 1950s computers were being made out of transistors, which were smaller, less expensive, more reliable, and more efficient (Dolotta, 1985). In 1959, Robert Noyce, a physicist at the Fairchild Semiconductor Corporation, invented the integrated circuit, a tiny chip of silicon that contained an entire electronic circuit. Gone was the bulky, unreliable, but fast machine; now computers began to become more compact, more reliable and have more capacity. These new technical discoveries rapidly found their way into new odels of digital computers. Memory storage capacities increased 800% in commercially available machines by the early 1960s and speeds increased by an equally large margin (Jacobs, 1975). These machines were very expensive to purchase or to rent and were especially expensive to operate because of the cost of hiring programmers to perform the complex operations the computers ran. Such computers were typically found in large computer centers operated by industry, government, and private laboratories staffed with many programmers and support personnel. By 1956, 76 of IBM's large computer mainframes were in se, compared with only 46 UNIVAC's (Chposky, 1988). In the 1960s efforts to design and develop the fastest possible computers with the greatest capacity reached a turning point with the completion of the LARC machine for Livermore Radiation Laboratories by the Sperry-Rand Corporation, and the Stretch computer by IBM. The LARC had a core memory of 98,000 words and multiplied in 10 microseconds. Stretch was provided with several ranks of memory having slower access for the ranks of greater capacity, the fastest access time being less than 1 microseconds and the total capacity in the vicinity of 100 During this time the major computer manufacturers began to offer a range of computer capabilities, as well as various computer-related equipment (Jacobs, 1975). These included input means such as consoles and card feeders; output means such as page printers, cathode-ray-tube displays, and graphing devices; and optional magnetic-tape and magnetic-disk file storage. These found wide use in management for such applications as accounting, payroll, inventory control, ordering supplies, and billing. Central processing units for such purposes did not need to be very fast arithmetically and were primarily used to access arge amounts of records on file. The greatest number of computer systems were delivered for the larger applications, such as in hospitals for keeping track of patient records, medications, and treatments given. They were also used in automated library systems and in database systems such as the Chemical Abstracts system, where computer records now on file cover nearly all known chemical compounds The trend during the 1970s was, to some extent, away from extremely powerful, centralized computational centers and toward a broader range of applications for less-costly computer systems (Jacobs, 1975). Most continuous-process manufacturing, such as petroleum refining and electrical-power distribution systems, began using computers of relatively modest capability for controlling and regulating their activities. In the 1960s the programming of applications problems was an obstacle to the self-sufficiency of moderate-sized on-site computer installations, but great advances in applications programming languages removed Applications languages became available for controlling a great range of manufacturing processes, for computer operation of machine tools, and for many other tasks. In 1971 Marcian E. Hoff, Jr. , an engineer at the Intel Corporation, invented the microprocessor and another stage in the development of the computer began (Chposky, 1988). A new revolution in computer hardware was now well under way, involving miniaturization of computer-logic circuitry and of component manufacture by what are called large-scale In the 1950s it was realized that scaling down the size of electronic digital computer circuits and parts would increase speed and efficiency and improve performance (Jacobs, 1975). However, at that time the manufacturing methods were not good enough to accomplish such a task. About 1960, photoprinting of conductive circuit boards to eliminate wiring became highly developed. Then it became possible to build resistors and capacitors into the circuitry by photographic means. In the 1970s entire assemblies, such as adders, shifting registers, and counters, became available on tiny chips of silicon. In the 1980s very large scale integration, VLSI, in which hundreds of thousands of transistors are placed on a single chip, became increasingly common Many companies, some new to the computer field, introduced in the 1970s programmable minicomputers upplied with software packages (Jacobs, 1975). The size-reduction trend continued with the introduction of personal computers, which are programmable machines small enough and inexpensive enough to be purchased and used by individuals (Beer, 1966). One of the first of such machines was introduced in January 1975. Popular Electronics magazine provided plans that would allow any electronics wizard to build his own small, programmable computer for about $380. The computer was called the Altair 8800. Its programming involved pushing buttons and flipping switches on the front of the box. It didn't include a onitor or keyboard, and its applications were very limited. Even though, many orders came in for it and several famous owners of computer and software manufacturing companies got their start in computing through the Altair (Jacobs, 1975). For example, Steve Jobs and Steve Wozniak, founders of Apple Computer, built a much cheaper, yet more productive version of the Altair and turned their hobby into a business. After the introduction of the Altair 8800, the personal computer industry became a fierce battleground of competition. IBM had been the computer industry standard for well over a half-century. They held their position as the standard when they introduced their first personal computer, the IBM Model 60 in 1975 (Chposky, 1988). However, the newly formed Apple Computer company was releasing its own personal computer, the Apple II. The Apple I was the first computer designed by Jobs and Wozniak in Wozniak's garage, which was not produced on a wide scale. Software was needed to run the computers as well. Microsoft developed a Disk Operating System, MS-DOS, for the IBM computer while Apple developed its own software (Chposky, 1988). Because Microsoft had now set the software standard for IBMs, every software anufacturer had to make their software compatible with Microsoft's. This would lead to huge profits for Microsoft. The main goal of the computer manufacturers was to make the computer as affordable as possible while increasing speed, reliability, and capacity. Nearly every computer manufacturer accomplished this and computers popped up everywhere. Computers were in businesses keeping track of even more inventories for managers. Computers were in colleges aiding students in research. Computers were in laboratories making complex calculations at high speeds for scientists and physicists. The computer had made its mark everywhere in management and built up a huge industry The future is promising for the computer industry and its technology. The speed of processors is expected to double every year and a half in the coming years (Jacobs, 1975). As manufacturing techniques are further perfected the prices of computer systems are expected to steadily fall. However, since the microprocessor technology will be increasing, it's higher costs will offset the drop in price of older processors. In other words, the price of a new computer will stay about the same from year to year, but technology will steadily Since the end of World War II, the computer industry has grown from a standing start into one of the biggest and most profitable industries in the United States (Hazewindus,1988). It now comprises thousands of companies, making everything from multi-million dollar high-speed supercomputers to printout paper and floppy disks. It employs millions of people and generates tens of billions of dollars in sales each year. Surely, the computer has impacted every aspect of people's lives (Jacobs, 1975). It has affected the way people work and play. It has made everyone's life easier by doing difficult work for people. The History of Computer Technology This report briefly explains the history of modern computers, starting from the year 1936 to present day time. There are many models of computers documented throughout the years, but they only computer models mentioned are ones that I deemed too have had the greatest effect on computer technology back then and now. This report will show how in just forty years, computers have transformed from slow, room-sized machines, to the small and fast computers of today. Computers are a part of important everyday life, but there was a time when computers did not exist. Computers are one of the few inventions that do not have one specific inventor. Many inventors have contributed to the production and technology of computers. Some of the inventions have been different types of computers, while the others were parts needed for the computer to function effectively. Many people have added their creations to the list required to make computers work, adding to the overall technology of computers today. The term â€Å"computer† originally referred to people. It was a job title for those who did repetitive work with math problems. A computer is define as a programmable machine that receives input, stores and automatically manipulates data, and provides output in a useful format. The most significant date in the history of computers is in the year of 1936. This is the year the first â€Å"computer† was developed by a German engineer named Konrad Zuse. He called it the Z1 Computer and it was the first system to be fully programmable. The Z1 Computer had computing power, setting it apart from other electronic devices. Programming early computers became somewhat of a hassle for inventors and in 1953 Grace Hooper invented the first high level computer language. Her invention helped simplify the binary code used by the computer so that its users could dictate the computer’s actions. Hooper’s invention was called Flowmatic and has evolved into modern day technology. In the same year, the International Business Machines (IBM) was introduced into the computing industry, forever altering the age of computers. Throughout computer history, this company has played a major role in the development of new systems and servers for public and private use. Inventors saw IBM as competition within the computing history, which helped to spur faster and better development of computers. Their first computer technology contribution was the IBM 701 EDPM Computer. During the three years of production, IBM sold 19 machines to research laboratories, aircraft companies, and the federal government. The first computer physically built in America was the IAS computer. It was developed for Advanced Study at Princeton under the direction of John Von Neumann between1946-1950. (History of Computer Technology, 2011). John von Neumann wrote â€Å"First Draft of a Report on the EDVAC; in which he outlined the architecture of a stored-program computer (Computer History Museum – Timeline of Computer History, 2006). Electronic storage of programming information and data eliminated the need for the more clumsy methods of programming. An example of stored-program data computer is the IAS computer. Many modern computers trace their ancestry to the IAS machine and they are referred to as von Neumann (or Princeton) architecture machines. The IAS computer embodied the concept of a stored-program computer. The main memory contained two main categories of information, instructions and data. The computer had an ability to place different sequences of instructions in the memory which made the computer very useful. This allowed inventions to build computers to complete different tasks at different times. Such a computer can be reconfigured (reprogrammed) at any time to perform a new or different task. The Hungarian-born von Neumann demonstrated prodigious expertise in hydrodynamics, ballistics, meteorology, game theory, statistics, and the use of mechanical devices for computation contributed to the production of the modern day computer (Computer History Museum – Timeline of Computer History, 2006). In 1955, Bank of America coupled with Stanford Research Institute and General Electric; saw the creation of the first computers for use in banks. Researchers at the Stanford Research Institute invented â€Å"ERMA†, the Electronic Recording Method of Accounting computer processing system. ERMA updated and posted checking accounts and manually processed checks and account management. The MICR (Magnetic Ink Character Recognition) was a part of ERMA and allowed computers to read special numbers at the bottom of the checks. This technology helped with the tracking and accounting of checks transactions. ERMA was officially demonstrated to the public in September 1955 and first tested on real banking accounts in the fall of 1956. (Blain, 2005). Today, computer technology has transformed the banking industry. One of the most important breakthroughs in computer history occurred in 1958. This was the creation of the integrated circuit, known as the chip. The integrated circuit device is one of the base requirements for the modern computer systems. On every motherboard and card inside the computer system, are many chips that contain vital information on what the boards and cards do. Without the integrated circuit, the computers known today would not be able to function. The first commercially integrated circuits became available from the Fairchild Semiconductor Corporation in 1961. All computers then started to be made using chips instead of the individual transistors and their accompanying parts. Texas Instruments first used the chips in Air Force computers and the Minuteman Missile in 1962. They later used the chips to produce the first electronic portable calculators. The original integrated chip had only one transistor, three resistors and one capacitor and was the size of an adult's pinkie finger. Today, an integrated chip is smaller than a penny and can hold 125 million transistors (Bellis). The late 1970s saw the popularization of personal computers and the progress continues from then until now. An explosion of personal computers occurred in the 1970s. The Tandy Corporation was one of the leading companies in computer technology. Their most popular invention was the TRS-80 arriving on the market in the late 1970s. It was immediately popular, selling out at Radio Shack where it was exclusively sold. The TRS-80 was sold for only $600, making it affordable for many individuals to own their own personal computer. Within its first year, over 55,000 consumers bought Tandy TRO-80 to use in their home or office and over 250,000 of them sold in the next few years. Tandy Corporation’s TRS-80 had a keyboard and motherboard all in one. This is a common trend that other companies today use for their personal computer products. TRS-80 also included office applications, including a word processor, calculator, and early spreadsheet capabilities (The People History – Computers From the 1970s). People during the late 70s embraced personal computers and used them for a variety of reasons, such as, games, office applications, home finances, storing date, and many other necessary usages. In 1975, Apple Computers was founded by Steve Jobs and Steve Wozniac. The Apple II was launched in 1977 and was an immediate success as well. Apple created the â€Å"home/personal computer† that could be used by anybody. The success of the Apple II established Apple Computers as a main competitor in the field of personal computers. Then Dan Bricklin created a spreadsheet program called VisiCalc for the Apple II. It went on sale in 1979 and within four years it sold 700,000 copies at $250 a time (Trueman, 2000). By 1980, there were one million personal computers in the world. Computers have come an enormous way since their initial establishment, as the earliest electronic computers were so large that they would take up the entire area of a room, while today some are so small that they can fit in your hands. While computers are now an important part of the everyday lives of human beings, there was a time where computers did not exist. Knowing the history of computers and how much progression has been made can help individuals understand just how complicated and innovative the creation of computers really is. The first programmable digital computers invented in the 1940s have dramatically changed in appearance and technology from today. They were as big as living rooms and were about as powerful as modern day calculators. Modern computers are billions of times more capable than early machines and occupy less space. Simple computers, such as smart phones, are small enough to fit into mobile devices, and can be powered on by a small battery. In today's world, computers play an incredibly large role in the way the world exists in general, and the majority of tasks could actually not be completed if not for the use of computers. Although there are certainly some areas and jobs that cannot yet be completed solely by computers and which thus still require actual manpower, for the most part, computers have helped to make life significantly easier, productive, and more convenient for us all. Future computer technology will help solve many medical problems by reinterpreting sensory data and modulating brain activity. Technology will be so advanced that it may allow people who have lost the use of their limbs to use robotics to regain their disabled movements. The future of computer technology is very bright and welcomed indeed. Current trends, research, and development happening at a lightning speed supports this statement. Our children today will see a whole new world of technology with computers within the next decade. Works Cited http://inventors.about.com/od/istartinventions/a/intergrated_circuit.htm http://www.computerhistory.org/timeline/?category=cmptr http://www.thepeoplehistory.com/70scomputers.html http://www.historylearningsite.co.uk/personal_computer.htm

Thursday, August 15, 2019

Course Outline of Organizational behaviour and Design Essay

Organizational behavior is concerned with the study and application of the human side of management and organization. Although, the traditional writers like Douglas McGregor’s 1960 classic Human Side of Enterprise take a cognitive, humanistic approach to the subject , this course is intended to be much more eclectic and wide ranging drawing from fields of psychology, sociology, social psychology and anthropology. The underlying aim is to use all these fields to better understand the complex phenomenon called the Human Behavior. The course will draw from the cognitive school analyzing perceptual process, personality attributes, attitude formation, motivational theories and their operational significance. Then the behaviorist school is covered drawing from the works of Pavlov, Watson and Skinner and the practical application of these theories especially in reward system and organizational processes. Moving from the Individual the area next covered is the dynamics of group behavior and the operational issues of the modern day work teams. The course then moves to a macro perspective of the overall organization covering the areas of Culture, Power, Leadership and the nature of politics. Finally the clinical and operational issues of occupational stress are covered. Finally, in terms of organizational design, the broad variables of organizational structure, environmental complexity and strategy effectiveness will be explored. Course Objectives The overall objective of the course is to understand human behavior in organizations so as to equip the students with the theoretical and operational tools to better predict, control and manage the contemporary human resource. In addition, the course aims to enable students to get an insight and appreciation of how organizational theory may contribute towards improving the design and management of organizations. An in-depth examination of certain concepts (e. g. , environmental complexity, Organizational Structure) will also be undertaken. The course will use an integrative macro framework to diagnose and analyze the interaction of organizations, their environments, and people within and outside of the organizations. Generally the most important asset of the organization is overlooked in organizations-human resources. The performance of the organization depends upon the drive of each and every employee working behind a product or a service that it offers to the consumer, thus organization works similar to a social community. Thus if organizations are comparable to a micro-society with its own set of culture, beliefs, norms and behaviors, it naturally follows that to keep organization competitive (especially in today’s cut throat competition), it is imperative to dissect and understand human behavior within organization. A chain is only as strong as its weakest link! Similarly an organization is only as strong or powerful as its weakest person. Learning Outcomes Define and understand organizations as ‘Social Systems’ and to discuss its implications Understand and explain the theoretical frameworks used to understand human behavior Understand the perceptual processes and principles and to examine the impact of these principles on attribution, decision making, conflict resolution and other organizational areas. Dissect the psychology of attitudes and understand the significance and impact of attitudes in an organizational context Define, differentiate and compare the major motivational theories along with the utility of these theories in modern organizations Define the basic nature of groups, the dynamics of formal and informal groups and various types of groups Analyze the elements of intra group and inter group behavior and to discuss the variables that make these groups effective Understand the principles of reinforcement and punishment in the context of organizational reward system and productivity Understand the multiple facets of organizational justice and its complex relationship to organizational commitment Understand the critical importance of organizational culture and the mechanisms of its perpetuation, typologies, contextualization with national culture and layers Define the various basis of power and understand the effective use of influence methods for modern managers Understand the dynamics of organizational politicking and its underlying causalities Defin e leadership, discuss the various theories of leadership and analyze the emerging trends in the broad debate of leadership.

Wednesday, August 14, 2019

African American and Black Women Essay

The article â€Å"Hip-Hop Betrayal of Black Women† was written by Jennifer McLune and appeared in Z magazine Online in the July 2006 issue. McLune argues that sexism in hip-hop’s culture is a big part and has helped make the industry what it is today. This article can be divided into 5 different sections. In the first section, she talks about Kevin Powell and how he writes how men talk about women in hip-hop. McLune goes on to say that even wealthy white boys talked about African American women in their songs, yet its okay with society. The second section she gives examples of entertainers that talk down on women and some that do not. Common, The Roots, and Talib Kweli are the artist are the artist she names that don’t talk bad about women, but they don’t stop other artist from doing so. Also they back up the artist that does degrade women so in reality they aren’t doing enough. Even black female artist are right along with the men talking about other females (McLune, 297). In the following section, McLune talks about the protest that women have done with little help to the situation. The misogyny is an attack on a woman’s character and it makes the black community looks bad as a whole (McLune, 298). The fourth section is about the acceptance of the hip-hop culture towards black women. Everyone makes excuses and tries to justify what’s going on in hip-hop, but few have actual answers to help. At a point black women writers were called traitors for writing articles and complaining about what was going on (McLune, 299). The author concludes that hip-hop thrives around the fact they bash black women and if they didn’t do this then black women would be more respected in today’s society. After careful examination of McLune’s use of rhetorical appeals, evidence of pathos, logos, and ethos were used throughout the article. McLune wrote about the discrimination of black women throughout hip-hop. The dominate rhetorical appeal used by McLune is pathos, which â€Å"is an emotional appeal that involves using language that will stair the feelings of the audience† (Hooper, etal 86). She complains about being a black woman and hearing the excuses for men when they talk about women in hip-hop and how it is just okay with society. McLune is also irate about the fact that Eve, who is a female rapper raps about women in a bad way and doesn’t seem to think that, that is not right. Another type of appeal McLune uses is logos â€Å"which demonstrates an effective use of reason and judicious use of evidence† (Hooper, etal 86). Back in the 60s it was wrong and considered unfair to demonize colored men, but yet the men in today’s society are disrespecting colored women. The author explains how record labels exploit this and benefit off of the disrespect artist show black women. The least used appeal by McLune is ethos â€Å"which establishes the speaker’s or writer’s credibility† (Hooper, etal 86). Hip-hop owes its success to woman hating. Few artist dare to be different and not speak badly about women and the ones that do, they don’t make it clear that they feel it’s disrespectful for rappers to demoralize women which is not good in itself. McLune uses evidence to support her claim, one type of evidence she uses is examples she brings up Jay-Z rap lyrics and how he talks about women in his songs, â€Å"I pimp hard on a trick, look Fuck if your leg broke bitch, hop up on your good leg. † Also talks about good rappers such as Talib Kweli and how he has been praised for his song â€Å"Black Girl Pain†, but at the same time McLune feels he isn’t fully aware of the pain a black girl goes through. Another type is when McLune uses expert opinions such as Kevin Powell, she quotes him in â€Å"Notes of a Hip Hop Head† he writes that you’d think men didn’t like women as much as they talked about them and how they refer to them as baby mommas, chickenheads, or b*****s (McLune, 297). McLune believes that hip-hop has benefitted from the woman bashing and Powell believes that it has spawned on its own terms of making something out of nothing. A third type is comparisons between other women writers that have spoke about this topic whose articles have been pushed away and they have been called traitors for refusing to be silent about the disrespect the rap community has given black women. Finally, several types of rhetorical fallacies are apparent in this article. One type is ad hominem â€Å"which refers to a personal attack on an opponent that draws attention away from the issues under consideration† (Hooper, etal 93). McLune talks about Jay-Z and his rap lyrics how they are degrading women and explains that he is one of the worst ones in the industry. Another type of fallacy is bandwagon â€Å"which is an argument saying, in effect, everyone’s doing or saying or thinking this, so you should, too† (Hooper, etal 93). For example, she says that same rappers don’t talk about women in their raps, but they don’t say anything to the rappers that do. In reality they know if they were to say something to those rappers that they probably would have a hard time getting somewhere in the rap industry. A final type of rhetorical fallacy is red herring â€Å"that means dodging the real issue by drawing attention to an irrelevant one† (Hooper, etal 95). Kevin Powell blames the negatives in hip-hop on everything but the hip-hop culture itself, he thinks it is another reason for that. McLune also talks about rap lyrics that are bad, but doesn’t bring up the good rap lyrics about women. As a result of man’s betrayal of black women in hip-hop the black women is not respected in today’s society which has been talked about in several articles. Another author who addresses this issue is Johnnetta B. Cole in â€Å"What Hip-Hop has done to Black Women† Cole explains that it has been a growing war between Black men and women since the 60s and hip-hop is a significant and influential site of contemporary gender battles (Cole 90). Both authors state that hip-hop has generated a lot of profit from the way that rap artist talk down on black women. We can follow McLune’s proposal to boycott rap music and maybe just maybe they will realize what they are saying in their songs actually have an impact on the black community and that to make things better artist have to respect woman. Music is a big part in everyday life and it would be hard to get everybody on the same page as to boycott it, but something must happen because black women do need to be treated much better by black men. If society can manage to boycott rap music then artist would be forced to listen to the peoples concern and change their music for the better (McLune, 300). Works Cited Cole, Johnnetta B. â€Å"What hip-hop has done to Black women. † Ebony Mar. 2007: 90. Print. Hooper, M. Clay, Teta Banks, D. Marzette, Beth Arnette Wade. Eds. Analytical Writing: A Guide to College Composition I. Mason, OH: Cengage Learning. 2011. Print. McLune, Jennifer. â€Å"Hip-Hop’s Betrayal of Black Women. † Analytical Writing: A Guide to College Composition I. Ed. M. Clay Hooper, Teta Banks, D. Marzette, Beth Arnette Wade. Mason, OH: Cengage Learning, 2011. 296-300. Print.