Saturday, August 31, 2019

A Long Walk to Freedom – Nelson Mandela

Nelson Mandela in his book, Long Walk to Freedom argues through the first five parts that a black individual must deal, coop, and grow through a society that is hindering their lives† with apartheid and suppression of their rightful land. Rolihlanla Mphakanyiswa or clan name, Madiba was born on July 18, 1918 in a simple village of Mvezo, which was not accustomed to the happenings of South Africa as a whole. His father was an respected man who led a good life, but lost it because of a dispute with the magistrate. While, his mother was a hard-working woman full of daily choirs. His childhood was full of playing games with fellow children and having fun. In school, Mandela was given his English name of Nelson. After his father†s death, he moved to love with a regent, who was a well-off individual and owed Nelson†s father for a previous favor. The next several years were full of schooling for Nelson. These schools opened Nelson†s eyes to many things, which we will discuss later. He and the regent†s son, Justice decided to travel to Johannesburg and see what work they could find. They left on their journey without the regent†s permission, but eventually escaped his power and settled down in the town. In Johannesburg, Nelson settled down in a law firm as an assistant and went to University of South Africa and Witwatersrand University to further his law education. Witswatersrand University brought many new ideas to Nelson and awakened a spirit inside of him. The next several years, Nelson met many new political friends and began his involvement in the ANC. Also during this time, he met Evelyn and they became married. Gradually Nelson†s political involvement grew and his family life declined. Nelson and his good friend, Oliver Tambo opened a law firm, which took up most of Nelson†s time. Evelyn mothered two of Nelson†s children, but the gradually grew apart. Now, Nelson was an influential political individual and bans and jailing began to follow him around. One day, a young woman came into his life by the name of Winnie and they got married. Winnie gave birth to two more of Nelson†s children. As time passed, Nelson†s spirit for freedom grew more and more each day. Though his life was full of bannings and jailings, he never gave up his fight, but he knew that the south African government was becoming agitated with him and the ANC. The South African government became ruthless and strict and this forced Nelson to leave his family. After he left his family, he went underground. Nelson†s life has been full of hardships and decisions, but his heart for the struggle has never faltered. Now let us examine Nelson in closer detail. Nelson is an individual who fought through many hardships, but was also faced with decisions that affected his future, his family, and his livelihood. As we look at Nelson deeper, we can see many interesting points. He was opened to new ideas and beliefs through his experiences in the schools of Heraldtown and Fort Hare, but knew there was something better. He decided to travel to Johannesburg to find new and greater opportunities. While, in Johannesburg, he believed education would be a key asset. While working for a small firm, he took classes at University of South Africa and eventually Wits University. Here is where his mind and social life flourished. He interacted with great minds and influential political individuals. He talked to many Africans without proper education, who contained more knowledge and better social skills than many Africans with education. But, he still persisted in acquiring his B. A. Wits University brought his life to new extents. He was also talking to Indians, Coloureds, and whites for the first time in his life and Becoming friends with many more prominent African individuals. Nelson soon joined the ANC and became very prominent in the fight for freedom. Nelson was always open to listening to new ideas, but when his was just starting his fight. He believed that just Africans should fight the struggle and that the Indians, Coloureds, and communists would hinder their fight. As the ANC grew, Nelson also became well known. He was part of the Youth League, another beneficial part of the ANC. Nelson was not president yet, but was powerful enough to voice is opinions, which many people listened to and believed in. As Nelson†s political involvement grew, the police became more aware of him. Nelson received ban after ban, which ranged from months to years. He also experienced jail time constantly. Eventually, the police†s pursuit of him forced him to go underground. Nelson was also becoming more open-minded. He now believed that the fight should involve the Indians and the Coloureds. He also believed that Communism did have some good points, but he would never accept the whole communism aspect. There were many freedom fighters in South Africa. One that stood out was Dr. Xuma. Dr. Xuma was friend of Nelson and the president of the ANC, but the struggle forces many hardships on one†s life. Nelson gave everything up to pursue his fight for freedom. He left his family, his prospering law firm, and his past for the struggle. Dr. Xuma believed in the same ideas as Nelson, but would not give up his prominence with the whites and his wealthy occupation for the struggle. This decision had to be made by many freedom fighters. Nelson gave his life for the fight. While, Dr. Xuma thought his career was more important. Now let us look closer at some issues seen through Mandela†s book. Through this paragraph, I will compare foreign influence seen in Long Walk to Freedom to foreign influence seen in Mexico through Professor Hornibrook†s lectures and notes. As I have seen through your lectures, South Africa was affected by foreign influence from the British and the Dutch. Mandela†s autobiography helps give more detailed accounts of the European influence seen in South Africa. Ever since Mandela was born, the European†s power affected his people. European influence could be seen through every aspect of life. In Mandela†s school, he was given an English name and this was because â€Å"this was the custom among Africans in those days and was undoubtedly due to the British bias of our education. â€Å"(14) Also, â€Å"the education I received was a British education, in which British ideas, British culture, British institutions were automatically assumed to be superior. There was no such thing as African culture. â€Å"(14) This shows that it was difficult to get away from the British influence even for children in school. The British and the Dutch governments passed several acts that were instituted to fight against the Africans freedom struggle. The Africans struggle for independence was slowly growing and this scared the government. A new term was being seen and it was called â€Å"apartheid. † The government enacted laws and acts that prohibited Africans from doing Many things that were vital to their fight and survival. The Group Areas Act was one example. This act called for each racial group to be separated into separate areas. Another act was the Population Registration Act, which showed that race had become the most important and influential aspect of South African law and society. Another act was the Suppression of Communism Act. This act called for all communists to be brought to trial. The police could arrest anyone they believed were trying to overthrow the government by violence and communist ways. Lastly, the government put bans on individuals who were becoming to involved in the struggle and finally the government banned the ANC and all other liberation groups. This ban now made freedom fighting was illegal in South Africa. The effect of foreign influence was drastic. Africans lost sense of African culture in schools. While, the foreign government tried everything to break down the Africans chance for liberty. The foreign influence seen in South Africa crushed the African†s hope and survival. While this was occurring in South Africa, Mexico was also seeing the effect of foreign influence. Americans and Europeans came into Mexico and gained much power. Haciendas helped their rise and foreign investment in many minerals and oil. But, Mexico did not approve of this and changed it. In 1917, Mexico created a new constitution, which limited foreign investment and promised land reform. This showed that Mexico did not want an overpopulation of foreigners and would not allow it. While, in oil, the foreigners controlled much of the oil, which Mexico had an abundance of. In 1938, oil workers went on strike and the companies would not give in, but instead of allowing foreign influence to become too powerful. The Mexican leader, Cardenas sent in arbitrators. The arbitrators called for the one/third pay increase, but the companies refused. Therefore, Cardenas nationalized oil and limited the power of foreign influence in Mexico. Now, Mexican oil was controlled by PEMEX, which is controlled only by Mexico. Mexico become a large influence in the oil market during the oil crisis, but also went though hyperinflation and eventually needed some foreign help. But, the Mexicans would not allow foreign influences to dominate the Mexican state as foreigners have affected South Africa. Now I will examine another issue seen in the book. In this paragraph, I will examine the movement seen in Long Walk to Freedom to the movement seen in China during the 1900†³s. In South Africa, the movement I saw was the Africans fighting for freedom. In their time of struggle, they had little help from those with power. The liberation movement involved peasants, educated, and well-off Africans. But, the government did what ever they could to put down this struggle. They set up organizations, such as the ANC, Youth League, and others, but as seen in other places the wealthy and powerful would not help the struggle. Many people were blind to the struggle. â€Å"Most of these wardresses had no idea why we were in prison, and gradually began to discover what we were fighting for and why we were willing to risk jail in the first place. (249) Many individuals did not realize what the Africans were really fighting for and why the government was harassing them, but slowly they were learning. â€Å"Seeing prominent and educated white women discussing serious matters with a black man on the basis of perfect equality could only lead to the weakening of the wardresses† apartheid assumptions. â€Å"(249) The government tried to separ ate whites from blacks so whites would not turn sympathetic towards the Africans fight. This scared feeling made the government acts and laws stricter and harsher towards the African struggle. Therefore, in South Africa, the movement received little help from the people who had influence in the country and the help they truly needed. While, in China, their movement involved their peasants and they had help, which truly helped their struggle. Mao stated that â€Å"In a very short time,†¦ several hundred million peasants will rise like a mighty storm†¦ They will sweep all the imperialists, warlords, corrupt officials, local tyrants and evil gentry into their graves†¦ â€Å"(Mao, 24) Here Mao stated that the peasants would destroy the landlords and corrupt individuals. He helped the peasants by making some reforms. He gave peasants land and made marriages a free choice. He also instituted the 100 Flowers Campaign. This campaign allowed peasants to speak out and have freedom of speech. We see here that the peasants had help in their struggle, while the Africans had very little. This assistance helped the peasants to get the things they were fighting for. Mandela†s Long Walk to Freedom, helped show the rise of an incredible individual, who fought with many of his countrymen against the oppression and apartheid of white supremacy in South Africa. Throughout the book, I have seen Nelson†s open-mindedness. Nelson always listened to communist ideas and Indian goals, eventhough he did not agree with them. Nelson faced many hardships through his struggle and this had to cause some resentment against his oppressors. But if anyone would not be bias in his writing, I would say it would be Nelson Mandela. He has showed in his book that he is great individual and that he will not let his past feeling cloud his writing. You can see his feelings in his book and that is what makes it so good, but I believe he does not hide anything from us on both sides of the stories. In conclusion, Mandela†s autobiography is a brilliant book written by an incredible individual. I wish I could of read the whole book for this essay, but that was not possible. It is hard to write an essay on the first 5 parts when I know some things that happened further in the book. I did not know if I should include that information in the essay, but I did not involve it. This book helped to show the other side of the story. We always hear the victor†s story and in this class we got to hear the other side of the story.

Friday, August 30, 2019

Radiological Threat to Public Safety

Radiation is a silent death sentence i. e. you cannot see, smell, or taste it. When radiological material ends up in the wrong hands it can become a catastrophic weapon of mass destruction. The public's security against radiological threats is in the hands of federal, state, and local government agencies. These agencies have the responsibility to regulate, mitigate, monitor, and respond to incidents involving sources of radiological materials. An analysis of current radiological threats will provide an improved understanding of potential and creditable radiological threats confronted by the public. Radiological Threat to Public Safety Newswire (2011) states, â€Å"Less than one-third of the population feels they are prepared for a terrorist attack, specifically a radiological attack such as a dirty bomb; yet over eighty percent of Americans feel this type of threat is imminent†. Howard & Forest (2008), suggest that a terrorist radiological attack would come by way of a radiological dispersal devise (RDD) or a dirty bomb i. e. a bomb mixed with radiological material and conventional explosives (p. 90). Oppenheimer (2008) states, â€Å"The threat of nuclear terrorism is far more likely from a radiological dispersal device (RDD)–a conventional IED laced with a radioisotope–than via a nuclear fission weapon†(para 1). Uranium and plutonium are well known elements used in nuclear devises. Howard et al. (2008) states, â€Å"Only uranium and a few other elements, notably plutonium, can be turned into explosive weapons, but many more elements emit radiation† (p. 90). Howard et al. (2008), states, â€Å"Two basic designs of crude nuclear explosives are likely to be adequate for most purposes of terrorist groups intent on nuclear terrorism†(p. 14). The first generation, gun-type nuclear explosive device is similar to the bomb that destroyed the city of Hiroshima, Japan. This is the simplest crude devise to design and construct with a powerful nuclear explosion (Howard et al. 2008, p. 114). The United States Department of Health and Human Services (2011) stipulates that the first step in understanding creditable radiation emergencies is to â€Å"draw the distinction between a nuclear event (like the bomb dropped on Hiroshima, Japan) and a radiological event, such as a nuclear power plant incident or a radiological dispersal device (e. . , dirty bomb)†. The following is suggested credible nuclear and radiological events. Nuclear Events; * Produces a nuclear detonation involving the joining (fusion) or splitting (fission) of atoms to produce an intense pulse or wave of heat, light, air pressure, and radiation. * Highly destructive explosion that instantly devastates people and buildings because of extreme heat and impact of the blast. * Leaves large amounts of radioactivity and fallout behind. Radiological Events; * May involve explosion and release of radioactivity, but no nuclear fission. Typically, have less radioactivity released than in a nuclear event. In both events, the wind direction along with the weather patterns can spread radioactivity over a wide area (DHHS, 2008). Oppenheimer (2008), stipulated that the International Atomic Energy Agency (IAEA) suggested that â€Å"From 1993 to 2004, there were more than 400 confirmed incidents of trafficking materials–arrests and seizures involving radioactive sources–that could only be used to produce a RDD†(para 5). According to Howard et al. (2008) â€Å"no terrorist group has ever fielded or deployed a nuclear devise†(p. 110). However, Oppenheimer (2008) states, â€Å"Only one RDD incident is known: A dynamite bomb laced with cesium-137, a radioisotope used widely in medicine, was planted by Chechen separatists in a Moscow park in December 1995† (para 3). Authorities were able to find the terrorist RDD before it was detonated (Oppenheimer, 2008, para 3). The premise is evident i. e. terrorist organizations have the capability to obtain and deploy a RDD. Howard et al. (2008) suggest, â€Å"A homemade nuclear device, although crude and less efficient than a state military weapon, could very well serve the needs of a terrorist group† (p. 113). Bullock, Haddow, Coppola, & Yeletaysi (2009), describe different types of terrorist events that might include the use of radioactive material. * Introducing radioactive material into the food or water supply. * Using explosives to scatter radioactive materials. * Bombing or destroying a nuclear facility. * Exploding a small nuclear device† (p. 187). Oppenheimer (2008) described and highlighted the unpredictable radiological poisoning of a former â€Å"KBG agent Alexander Litvinenko by polonium-210 in London in November 2006 â€Å"(para 6). This type of radiation, once inhaled or ingested, will cause an illness that is slow and painful. The contamination spread as the Litvinenko moved about London and beyond (Oppenheimer, 2008, para 6). According to Oppenheimer (2008), â€Å"The U. K. Health Protection Agency had the unenviable task of tracing and testing the urine of hundreds of potential contacts and arranging for them to be treated and counseled†(para 6). There were a total of 17 people who were contaminated with radiation at above-average levels (Oppenheimer, 2008, para 6). Oppenheimer (2008) suggests that â€Å"A growing number of smuggling cases since 2002 have involved radioisotopes used in civilian industries and medicine†(para 2). Radioactive materials that are no longer considered useful in medicine could be used in building a RDD or a dirty bomb (The American Nuclear Society, 2005). Some agencies feel as though there has â€Å"not been enough of a concerted effort focused on the threat of a radiological attack such as a â€Å"dirty bomb† (Newswire, 2011). Oppenheimer (2008) describes four attempts at deploying RDD by Chechens i. e. â€Å"deploying an RDD and attacking a nuclear power plant, which are not well documented but are known within the EOD (explosives ordnance disposal) community†(para 1). Hawley (2008) suggests, â€Å"The use of a pharmaceutical grade radioactive material attached to a pipe bomb would release radioactive material†. In addition this small amount of radiation could cause sickness over time. Howard et al. (2008) states, â€Å"Extended exposure to low-level radioactive material increases the likelihood of cellular destruction†(, p. 90). The low level of security at many of Russia’s nuclear power plants and abandoned Russian Northern Fleet submarines has also increased the risk of possible terrorist attacks or takeovers. â€Å"There still are about 120 subs with fueled reactors in need of disposal† (Oppenheimer, 2008, papa 2). If a meltdown or explosion at a nuclear facility ever took place a large quantity of radioactive material would be released into the environment. Employees at the nuclear facility would likely be contaminated with radioactive particles to include injuries from the explosion itself. Individuals who received a large dose of radiation might develop acute radiation syndrome. Individuals in the surrounding area could be exposed or contamination and would need medical assists along with decontamination (Bullock, et al. 2009 p. 233). This huge concern and worry of radiological threats, voiced by the public, might not be credible. This is based on research and analyses performed by numerous agencies. According to Bevelacqua & Stilp (2009), â€Å"Bombings involving storage facilities or transportation vehicle pose the greatest threat†(p. 60). Mitigating potential bombings of critical facilities and transportation is a challenge for federal, state and local agencies. Bevelacqua et al. (2009) states† A nuclear bomb threat is unlikely to be carries out for a number of reasons, including the extreme expense, its logistical difficulty, and the enormous amount of technology necessary to develop a disperse such a devise† (p. 9). Hawley (2008) states, â€Å"The use of an actual nuclear detonation device is unlikely and very improbable given security these materials have† (p. 233). The amount of nuclear material required for an extensive nuclear result and the particular type of material needed makes use unlikely (Hawley, 2008, p. 233). Bullock, et al. (2009) states â€Å"Although a dirty bomb could cause serious injuries from the explosion, it most likely would not have enough radioactive material in a form that would cause serious radiation sickness among large numbers of people. Oppenheimer (2008) suggests, â€Å"There are numerous obstacles to overcome when weaponizing radioactive materials; the same devices that could be a threat to the public also pose potential threats to terrorists†(para 3). Howard et al. 2008, describe the seven myths identified about the threat of nuclear terrorism. 1. Terrorist want a lot of people watching, not a lot of people dead. 2. Nuclear material required to make a bomb are nearly impossible for terrorist to obtain. 3. Difficulties of constructing or stealing a nuclear bomb are unlikely by a terrorist group. 4. The only way a terrorist organization could acquire a nuclear bomb is from a state. 5. The mistaken belief that it is possible to put in place around the United States and other major countries a security cordon that can reduce to a low level the risk that nuclear weapons and material might be smuggled in. 6. The notion that an offensive security posture alone will mitigate the threat of nuclear terrorism. 7. A number of states analysts argue that states would not be especially interested in a stolen nuclear or stolen material to make one, because they want to produce the material for as many nuclear weapons as they need (p. 02). According to Shaw (2001) â€Å"Most studies of preventing terrorist nuclear attacks have reached the same basic conclusion–none of the available basic techniques is sufficiently capable to preclude a successful attack with a high degree of confidence† (p 3). The following are the seven suggested basic techniques: 1. Arms control and related diplomatic measures to control proliferation and access to technology and materials for making nuclear weapons. 2. Physical security and control of existing weapons and materials. 3. Pre-emptive actions. . Deterrent threats of retaliation for attacks. 5. Border controls and related domestic security measures aimed at preventing the movement of weapons or materials into the US. 6. Intelligence collection and law enforcement measures leading to the discovery and apprehension of would-be perpetrators. 7. Effective consequence control and mitigation—still a long way from reality—could be at best a distant second in desirability. Public education on the effects of radiation might allow for understanding the credibility of radiological events. Hawley (2008) states, â€Å"Education on hazards of radiation and the effective use of radiation monitors can ease this fear† (p. 234). There are organizations established to educate radiological protection, challenges, and issues. The Newswire (2011) states, â€Å"The Radiological Threat Awareness Coalition (R-TAC) was established to increase awareness and preparedness in this country against a possible radiological attack such as a â€Å"dirty bomb†(para 1) This synergistic awareness and preparedness was validated successfully by London government agencies responding to prevented a radiological event from becoming catastrophe. Oppenheimer (2008) suggests that the â€Å"London incident response demonstrate that government agencies could rapidly adapt to an unprecedented situation†(para 6). This radiological event also showed that nuclear events are all but impossible to predict. Conclusion The mitigation of nuclear weapons issues remain a heighten concern by free nations. The management of the existing stockpiles in the former Soviet Union continues to be a challenge in addition to the activities of the other governments that control nuclear weapons and demonstrate troublesome behavior especially, Pakistan, North Korea, and Iran (Banks, Nevers, & Wallerstein, 2008, p. 7). According to Hawley (2008) â€Å"there is currently speculation that there are some small nuclear devises missing from Russia; but this has never been substantiated† (p. 233). However, the fear of missing nuclear devises is a weapon itself. According to Hawley (2008), there is an advantage to a noncredible RDD or a small RDD, and that is the public's reaction. The public's perception, and first responders, is that this event would be a radioactive disaster. However, the reality is that the amount of the radiation would not be dangerous, and as time passed, the danger would lessen as the radioactive material decayed to a lesser hazard. Radiation is one of the big unknowns and cause of fear because it is unknown. This fear makes radiation a key weapon for a terrorist organization. Given this analysis, the question continues to be asked. Is there a credible radiological threat? The answer is yes or maybe no. Either way terrorist organizations have instilled fear of possible radiological events in our nation's future.

Thursday, August 29, 2019

Identify the strengths and weaknesses of Tokai UK’s international strategy. Essay

The Tokai Company was founded in 1947 in Hamamatsu, Japan and produced all forms of musical instruments,including a large range of pianos. Tokai instruments first appeared in the UK in the early 1980s when they were imported by a company called Bluesuede Music. At that time the two biggest names in electric guitars were those produced by the American companies Fender and Gibson, who both produced high quality electric guitars but at a price that was prohibitive for the average amateur guitarist. Tokai competed against Fender, with products that replicated the Fender quality and also closely esembled their guitars but for half the price. Not surprisingly the Tokai product stood alone in the marketplace and competed with Fender by making quality instruments available to customers who couldn’t afford a genuine Fender or Gibson guitar. Tokai’s biggest seller at the time was the ST50 which resembled the famous Fender Stratocaster. However, Fender issued writs against Tokai which forced them to change the designs so as to not infringe Fender’s copyright. Imports continued on for a further three years and Bluesuede Music did remarkably well with the product, using sales agents out on the road selling guitars to retailers. Unfortunately, in the mid-eighties one of the partners left Bluesuede owing the company and Tokai a lot of money. At that point Bluesuede had to stop the import of Tokai guitars. At the beginning of 2002 Nick Crane, a British entrepreneur, went to Japan to see Mr Shohei Adachi, the managing director of Tokai, and agreed a deal to import the company’s guitars once more into the UK. This started as a small operation and the products began to trickle into the UK. Shortly afterwards Nick Crane approached Bob Murdoch, who had 25 years’ experience in the music wholesale and retail business. Bob Murdoch saw the potential of these instruments on the European market and became a partner in Tokai UK in early 2002. The company began by working from a small garage, but over the subsequent 18 months turnover increased by 200 per cent and they are now selling into Ireland, Italy and Spain. They had a huge market in Germany but, as we will see later, have now pulled out of the market. Tokai UK now operates from premises on an industrial estate at Dinnington, South Yorkshire. Nick Crane left the company to follow other interests in Spain; Bob Murdoch bought out his partner and now has overall control of Tokai UKÂ  and plans to launch Tokai across the pan-European market.

Wednesday, August 28, 2019

Cross Cultural Health Perspectives Essay Example | Topics and Well Written Essays - 750 words

Cross Cultural Health Perspectives - Essay Example Four issues will be investigated: The best practice among a range of options in medical language interpretation, legal responsibilities in providing that services, CLAS standards seen in the case, and your role in a similar situation in the future. The best option in providing medical language interpretation is to hire a qualified medical interpreter. This means that the person is trained and is on-hand right away. Outsourcing from an agency also works, but interpreters might not be available at all times. A microphone helps by allowing these interpreters to speak on the phone with the patient and the healthcare provider at the same time. There are three less ideal options to choose from if a professional interpreter is not available: a.) Bilingual hospital staff, b.) community volunteers and c.) Family members and friends. None of these people are trained to be professional medical interpreters. Issues of time management, confidentiality and objectivity may arise when using these people. The legal responsibility of an organization to provide qualified language interpretation comes from Title VI of the Civil Rights Act of 1964, which states, â€Å"No person in the United States shall, on ground of race, color, or national origin, be excluded from participation in, be denied the benefits of, or be subjected to discrimination under any program or activity receiving Federal financial assistance† (Office of Minority Health, 2005). This entails providing meaningful access to services even if the patient cannot speak English. Other legal responsibilities are dependent upon the state or the institution. For example, JCAHO Standard RI.2.100 â€Å"requires that organizations ensure effective communication between the patient and the organization through the provision of interpreter and translation services. The standards also require the collection of race, ethnicity, and language data† (as cited in Office of Minority Health, 2005).  

The Ugly Truth About Beauty by Dave Barry Essay Example | Topics and Well Written Essays - 250 words

The Ugly Truth About Beauty by Dave Barry - Essay Example such, the author demonstrates the intention of pun on claiming â€Å"Some men form the opinion that they are irresistible stud muffins and they do not change their opinion even when their faces sag and their noses bloat to the size of eggplants.† The injected humor, nevertheless, bears no significant effect on my interpretation of the piece. Barry’s position is sufficiently clear on what he argues as the â€Å"ugly truth† which women tend to mask with their notion and seemingly painstaking attitude toward beauty. Men, according to Barry, hugely differ from women in this aspect where the latter spend a ridiculous amount of time fixing themselves just to end up barely convinced with â€Å"not good enough† outcomes while the male species can find plenty of ways to feel good and confident without many external tasks. Apparently, Barry’s essay serves as a call for women to realize the essence of character for the approval of the opposite sex not always rests on physical

Tuesday, August 27, 2019

Not sure Essay Example | Topics and Well Written Essays - 1250 words - 1

Not sure - Essay Example However, although rituals were important to Confucius, he had a very strict sense of duty. Confucius viewed rituals as one of the duties an individual must always do, and emphasized this particularly when he would be appointed by a duke or a king as an advisor. In analyzing the Confucian analects, Slingerland (67) states that â€Å"Confucius felt the rituals (even if they were being enacted by someone else), and remained profoundly affected by the emotions they evoked.† In the contemporary Chinese society, there were different powerful countries and tribes who wished to identify themselves distinctly from each other. Rituals thus became means to assert one’s identity and sometimes, they were very elaborate and strict. However, these elaborate and sometimes, magnificent rituals would be observed superficially. People might ignore the inner meaning and zest of the rituals they practiced. Confucius was not one among them. Likewise, he instructed his followers to practice the traditional rituals with not only extravagance but sincerity too. Therefore, in his lifetime, Confucius remained a source of inspiration and information for those who wished to follow the different contemporary rituals correctly and sincerely. Translating the Book Seventeen from the Analects of Confucius, Slingerland (209) notes that in one of the accounts from the Record of Rituals, Confucius used to give ritual instructions to guide his disciples and emphasize the antiquity of Chinese culture. There were different kinds of rituals in the Chinese society about which the researchers obtain considerable information from Confucius’s teachings. For example, there were certain funerary rituals. Some rituals were supposed to mark certain life events like reaching adulthood. Other rituals included strict methods for doing worship, making sacrifices, going to warfare, etc. However, Confucius did not pressurize his contemporaries to accept his doctrine of sincere and if necessary extravagant

Monday, August 26, 2019

Culture and Religion Essay Example | Topics and Well Written Essays - 1250 words

Culture and Religion - Essay Example This paper talks about the physicians who attended the girls were unable to offer any plausible explanation. The confusion escalated into mass hysteria and people believed that the hovering presence of the devil over the village caused this problem. Tituba, a migrant African, confessed that a conspiracy of witches permeated Salem Village. Thus began the Salem Witch Hunt. The episode’s far-reaching ramifications are dealt in three classic works: I, Tituba, Black Witch of Salem, a novel by Maryse Conde, The Crucible, a play by Arthur Miller, and Young Goodman Brown, a short story by Nathaniel Hawthorne. The themes of all three stories are inspired by historical accounts of the Salem witch trials. All of them attempt to comment earnestly and staunchly on the hypocrisy and social stigmas; class, ethnic and racial distinctions that draw the fine line between the privileged and under-privileged, through the literary devices like theme, characterization, symbolism. There is always an association between forests and evil because of its dark and gloomy nature. That is why the witch meetings were held in the midst of it. The minister and the deacon are also corrupt and evil. They all are considered to be holy and people of God, but they are just the opposite. This essay makes a conclusion that a reader can easily recognize a common thread of the authors’ criticism of the evils of Puritanism, of religious and class bias that served only to marginalize a certain segment. The extent to which race, gender, class and other indicators play a part in the events that form the basis for human history has been artfully and subtly dealt by all the three authors.

Sunday, August 25, 2019

Perfact reflection for a refer dissertation Essay

Perfact reflection for a refer dissertation - Essay Example I discovered I have poor time management skills because of the fact that I was unable to fully adhere to the time schedule that I had set for myself and in most cases I was forced to carry forward certain tasks beyond the deadline that I had previously set. I should great strengths in regards to records keeping and management since I was able to refer back easily to all the records that I had collected before starting to write the dissertation. Secondly, I showed great strengths in handling people since none of the respondents was harsh to me or refused to cooperate. This showed that I knew how to convince people and engage them in conversation up to the point they willingly agree to participate in my research project. The main problem that I encountered was limited secondary resources that directly touched on my research topic or objectives. This is to say that the number of scholarly books and articles that touched of personal selling and in stores, sales of Blackberry in stores that are located in China were not easily available. The lack of scholarly books and articles that directly covered my dissertation topic or objectives did not discourage me, but rather it confirmed that my research project was unique and it was bound to help in building the body of knowledge in marketing studies. That said, I solved the problem by relying on scholarly books and articles that indirectly touched on the subject, for example sources that touched on direct marketing and personal selling were completely relevant and useful. Secondly, I applied the use of internet sources from credible sites that touched on my research topic directly or indirectly, these sources helped to bridge the gap caused by limited scholarly books and articles. The methodology that I chose incorporated the application of both primary and secondary research, which validated the research findings in the sense that secondary data were used to validate

Saturday, August 24, 2019

Gender and Race in Picasso's Les Demoiselles Assignment

Gender and Race in Picasso's Les Demoiselles - Assignment Example The paper "Gender and Race in Picasso's Les Demoiselles" provide Chave's analysis of the painting. Les Demoiselles d’Avignon was rejected at first and was hidden for more than three decades as people saw what it portrayed was simply not in accordance with their beliefs. They believed that the naked women were not a good; it was an indirect attack to the prostitutes. Chaves objective is to view the picture from a different angle which was not allowed. She uses the picture to show various facts of gender and race and how they are brought out clearly in a picture that was painted so many decades ago yet so relevant in the occurrences that have taken place in the world. Mimicry is the act of copying what one is doing, their speech, look or even their actions. Minstrelsy on the other hand is whereby the Americans acted or performed skits and other acts in blackface. Picasso’s art in Les Demoiselles d’Avignon is an act of mimicry and minstrelsy whereby; using the two w omen on the right-hand side of the picture, he gives an exaggerated representation using the African masks which are sacred. This mimicry is to show that these women simply are African women being perceived as prostitutes. Mimicry is one of the most effective and an unrecognizable form of power that colonialists used as at a first glance it shows both resemblance and menace. They have the turbans which are usually worn by African women which is a continuous mimicry of African women. In Les Demoiselles, Minstrelsy is also seen where it makes fun of the clients.

Friday, August 23, 2019

Effect of Advertising and Mass Communication to the Society Research Paper

Effect of Advertising and Mass Communication to the Society - Research Paper Example This view, though still pandemic, was largely reproached by the research conducted in the 1940s and 1950s. These studies found that the voters with strongest political interests were the most likely to pay contemplation to the campaign and therefore were least likely to be affected by the campaign. Recently, research has aggrandized to move beyond looking only at the effects that media and contents of media have on individuals and society to observing on how living in a world with all-inescapable media change the nature of our interactions and culture. This essay will mainly focus on the effects of media on the interaction and culture of the society as a whole. (Ryan, J., & Wentworth, W. M. 1999) Mass Communication (media) is a strong force in the modern culture, particularly in the United States. Sociologists refer to this as a mediated culture where the media illustrates and creates the culture. Communities and individuals are assailed constantly with messages from a several source s including TV, billboards, and magazines etc. These messages endorse not only the products, but moods, attitudes and behaviors of the people of the society. Mass communication makes the possible visualization of celebrity: without the ability of films, magazines, and news to reach across thousands of miles, people could not become distinguished. As a matter of fact, only political figures and businessmen as well as some few notorious fugitives were famous in the past. (In Schramm, W., & In Roberts, D. F. 1971) The present level of media saturation has never existed before. As recently as the 1960s and 1970s, the television, for instance, consisted of mainly three networks, public broadcasting and a few local independent stations. These channels targeted their contents and programs primarily at the small, middle-class families. Even at that time, some middle-class families did not own a television. But today, one can find a television in the most poor of the homes and more than one TVs in the middle-class homes. Not only the availability has increased but the programming is increasingly assorted with shows aimed to satisfy the viewers of all ages, incomes, backgrounds and attitudes. The vast availability makes the television the cardinal focus of major mass-media discussions. And recently, the Internet has alleviated its role exponentially as more businessmen and ordinary working and non-working people â€Å"sign in.† While TV and Internet has dictated the mass communication (media), movies and magazines, specifically those lining the egress at grocery checkout points – also play an important role in culture as other forms of media do. (Ekstrom, R. R. 1992). The culturist theory, which was developed in the 1980s and 1990s, combines the previous two theories and illustrates that people interact with media to establish their own meanings out of the pictures and messages they receive. This theory observes the viewers as playing an active rather than a passive role in relation to mass communication. One research focuses on the audiences and how they interact with media while the other research focuses on those who create the media, especially the news. (Yssing, H. L., Handelshojskolen 2000) The researchers emphasize that the viewers choose what to watch among a wide range of channels and also how much to watch, and may choose the mute option or the VCR remote over the channel

Thursday, August 22, 2019

Enterprise Architecture as Strategy Essay Example for Free

Enterprise Architecture as Strategy Essay Technology is shifting at a faster rate resulting in development of new methods that assist in completion of certain technological demand. This has given birth to different enterprise architecture frameworks that fulfill the requirements of day-to-day activities. Architecture is a framework of guidelines, principles, models, standards and strategies that directs, construction and development of business process, design and information and resources through enterprise. Hence, enterprise architecture is a blueprint, which defines the structure and operation of a given organization (Fowler Rice 2003). Thus, a foundation in which an organization can determine how to achieve current and future aims. There are many types of EA frameworks with specified capabilities. Some of these frameworks include ToGAF, Zachman, FEAF, DoDAF and EAP. The aim of this paper is to analyze ToGAF, and analyze how it compares with other EA frameworks. The Open Group Architecture Framework (TOGAF) is an enterprise architecture framework, which approaches the development of enterprise information architecture through design, planning, governance and implementation. This EA framework employs four pillars to achieve its goals: Application, Business, Technology and Data. Before the architect plans for current and future aims of the organization, they are provided with foundation architectures that form the basis that they will use for the new development. The four pillars play a crucial role in ensuring that the process is successful. Business architecture allows the definition of governance, business strategy, the organization and any other important processes of the given organization. Applications architecture allows the provision of the blueprint for the specific application to enable the interaction, deployment and create relationships between the important business processes of a given organization. Data architecture describes the structure of the given organization and defines physical and logical data assets that are in the given organization. Technical architecture defines the software, hardware and network infrastructure that is in place and the required technical resources to accomplish the mission in question. The original aim of the TOGAF was to design and develop technology architecture for a given business entity. However, the framework has evolved becoming a methodology that is used to analyze overall business architecture. This resulted into splitting of the enterprise methodology into two parts: Architecture Development Method (ADM) and Enterprise continuum. The ADM ensures that the enterprise architecture meets the requirements of the organization in terms of business needs and information technology needs. Its ability to be tailored ensures that organizational needs are factored in each of the different execution steps of the architecture planning process. The process is usually cyclic and iterative because the entire process is split into phases. The ADM supports nine phases; the first is the preliminary and the second to the ninth ranges from Phase A to Phase H. Each phase requirements are checked and ensured that it fulfills its basic needs. For example, Phase C combines Application and Data architecture and phase B and C ensure that the clarity of the information architecture is achieved (Lankhorst 2005). For the ADM to be successful, Enterprise Continuum comes handy. Generally, the Enterprise Continuum can be seen as a ‘virtual repository’ of all the assets of the architecture that is in an organization. These assets may include architectural patterns, architectural models, architecture descriptions and other important artifacts. Enterprise Continuum brings together Solutions and Architecture Continuum. The Architecture Continuum structures the re-usable architecture assets, which brings together representations, rules, relationships of information systems that are available to the enterprise. The Solutions Continuum defines the blocks that are used by the Architecture Continuum. This then allows the architectural building models and blocks that assists building the architecture design and eliminates ambiguity during analysis and implementation of the process. Usually there is a relationship between the different EA frameworks in terms of how it operates and ways that enables it to accomplish its duties. Zachman Framework and TOGAF ADM part share some common features. ADM mapping in relation to the Zachman Framework supports a correlation. The Zachman Framework has a well established and comprehensive taxonomy that supports various models, viewpoints and other important artifacts, which an enterprise may consider developing as a phase of the EA (White 2007). The Zachman Framework covers the 30 cells, but the TOGAF does not cover all the cells. However, it is possible for the TOGAF to develop viewpoints to accomplish aspects of Zachman Framework. Nevertheless, there are some viewpoints that are supported by TOGAF, which are not included in the Zachman Framework. For example, the missing viewpoints include manageability and security. The purpose of the architecture is to define viewpoints, an aspect that is supported by the TOGAF ADM but lacks in Zachman Framework. Zachman Framework vertical axis provides a source of potential viewpoints while the horizontal may provide generic taxonomy concerns. Thus, the Zachman Framework does not have means for processes for conformant views or developing viewpoints. Hence, it does not employ a perspective that is shown by TOGAF’s ADM. FEAF structure resembles with TOGAF because it is portioned into Data, Business, Technology and Applications Architectures. Thus, it contains guidance that is analogous to TOGAF architecture and its architectural viewpoints and perspectives. However, the rows that are in the FEAF matrix do not directly map to TOGAF structure. However, the mapping of ADM to Zachman Framework has some correlation between TOGAF and FEAF. Hence, the columns that are in the FEAF matrix correspond to the three architecture domains that are supported by TOGAF; the fourth TOGAF domain covers business architecture that lacks in the FEAF structure. Enterprise Architecture Planning (EAP) is a framework that brings together Applications, Information and Technology Architectures in fulfilling the requirements of architecture. Thus, it shares many concepts with TOGAF because the aim of EAP is to form blueprints for architectures to solve business problems. Moreover, EAP supports the nine phases that are supported by the TOGAF (White 2007). The first three phases in the EAP (Business Architecture) maps to the Phase B of TOGAF ADM. Baseline Description, which is the step 4 in EAP maps to Phases C and D of TOGAF ADM. These are some of the basic features that both frameworks share. However, EAP does not support taxonomy of various views and viewpoints when compared to the TOGAF architecture. Department of Defense Architecture Framework (DoDAF) defines the architecture systems into consistent and complementary views. It defines a structure and mechanisms that help in understanding, visualizing and assimilating the complexities and broad scope of a given architecture design through tabular, graphic and textual means. Thus, it shares minimal aspect with TOGAF. In fact, TOGAF focus on the methodology of architecture in terms of â€Å"how to† without bringing into consideration architecture description constructs. This perspective is different when it comes to the DODAF architecture. DoDAF main functionality focus on the architecture through a given set of views without any specified methodology, a perspective that is different from TOGAF, which has a specific methodology (Bernus Fox 2005). ADM guides the way that TOGAF operates, an aspect that is less exhibited in the DoDAF. This is because the purpose of architecture determines description of use and supports a well tailored process to fulfill the requirements of the EA (McGovern Ambler 2003). DODAF requires that all information, analysis and products to build should be put forefront before building the architecture. However, TOGAF specify certain requirements that should be in place and grouped into the four pillars. DoDAF supports three â€Å"views† System, Operational and Technical while the TOGAF support four views. However, â€Å"views† in DoDAF differs from the view that is seen in the TOGAF. Deliverables and artifacts that are defined in the DoDAF have no corresponding parts in the TOGAF ADM. This is because DoDAF goes deeper in determining details of the specific architecture. Thus, DoDAF are at the system design level rather than in TOGAF, which is in the architecture level. Nevertheless, the level of detail can be included in the ADM especially at Phase B, C and D of the TOGAF. Enterprise Architecture plays an important role in ensuring that the business strategy and the requirements of a certain process are achieved. TOGAF approach is useful in achieving a business-oriented process through a well defined methodology. TOGAF have common features and minor differences with other EA such as the Zachman, FEAF, DoDAF and EAP. The view and viewpoint that is incorporated by the TOGAF ensures that the requirements of the organization are achieved. Thus, TOGAF plays an important role, which is envisaged by other Enterprise Architecture Framework. It fulfills the requirements that it is assigned, however, fulfills it different from the other EA frameworks. References Bernus, P. Fox, M. (2005). Knowledge Sharing in the Integrated Enterprise: Interoperability Strategies for the Enterprise Architect. London: Birkhauser. The book addresses Enterprise Architectures and Enterprise Integration in a way that makes it easy to utilize Enterprise Models and other Modeling Tools. It brings together the different models and forms of a framework into fulfilling a requirement. Thus, it develops interchange models between the given modeling tools, maintain its interdependencies and knowledge on the re-use of enterprise models. The authors also provide means towards the achievement of the ISO9001:2000. The book brings into consideration Design of Information Infrastructure Systems for Manufacturing (DIISM’04) and International Conference on Enterprise Integration and Modeling Technology (ICEIMT’04). Fowler, M. Rice, D. (2003). Patterns of Enterprise Application Architecture. New York: Addison-Wesley Publishers. The book provides proven solutions to the problems that are experienced by information system developers. The book utilizes code example in terms of C+ and Java. The book turns the problems that are associated with enterprise applications developers into a new strategy that eliminates these problems and ensures that the developers are in an environment that they can easily embrace. The authors’ helps professionals to understand complex issues associated with architecture. The book shows that architecture is crucial in completion of application development and multi-user environment. In addition, the book provides patterns and context in EA that enables the reader to have proper means to make the right decisions. Lankhorst, M. (2005). Enterprise Architecture at Work: Modeling, Communication, and Analysis. New York: Springer. The authors bring clearly the complexities that are associated with architectural domains. It brings into consideration description of the enterprise architecture and fulfillment into an organization in terms of processes, structure, systems, applications and techniques. The book brings into consideration description of components and unambiguous specification to allow for a logical modeling language. They utilize their skills in ensuring that the architects have concrete skills that fulfill the architectural practice. It also gives means that allows communication between stakeholders that are involved in these architectures. The authors also provide means to assess both qualitative impact and quantitative aspects of the given architectures. Modeling language that is utilized has been used in real-life cases. McGovern, J. Ambler, S. (2003). A practical Guide to Enterprise Architecture. New York: Prentice Hall PTR. The authors of the book have hands-on experience in solving real-world problems for major corporations. The book contains guidelines that assist the architects to make sense of the systems, data, services, software, methodologies, and product lines. The book also provides explanation of the theory and its application to the real world business needs. Perks, C. Beveridge, T. (2003). Guide to Enterprise IT Architecture. New York: Springer Publishers. The book brings into consideration different Enterprise Architecture frameworks. The authors’ clearly explains development of a modeling concept through various technical architecture, e-business and gap analysis. Moreover, the book brings into consideration operating systems and software engineering principles. Moreover, the book relates EA with service instances, distributed computing, application software and enterprise application integration. Ross, J. Weill, P. (2006). Enterprise Architecture as Strategy: Creating a Foundation for Business Execution. Chicago: Harvard Business Press. The aim of EA is to define the requirements of an organization in terms of job roles, standardized tasks, infrastructure, system and data. Moreover, the book also gives guidelines in the way that organizations will compete in a digitalized world providing managers with means to make decisions and realize visions that they had planned. Thus, the book explains EA vital role in fulfilling the execution of a given business strategy. The book provides thoughtful case examples, clear frameworks, and a proven and effective way of achieving EA. Scheer, A. Kruppke, H. (2006). Agility by ARIS Business Process Management. New York: Springer Publishers. The authors’ brings into consideration the benefits that are associated with utilizing of varies EA frameworks. It brings into consideration the various differences that are seen in each EA framework. Moreover, the authors explores the benefits that will result if a given framework is utilized in a given business strategy. Thus, the book is business oriented with EA playing an important role. Schekkerman, J. (2003). How to Survive in the Jungle of Enterprise Architecture Frameworks, 2nd Ed. New York: Trafford Publishers. This book defines the role that is played by enterprise Architecture Frameworks bringing clearly the main difference between the common Enterprise Architecture Frameworks. This book provides the right procedures and means that can allow selection of the right Enterprise Architecture Framework. The book further gives the history and overview of various Enterprise Architecture Frameworks and the capabilities that the specified Enterprise Architecture. Some common features of EA that the book explores are principles, purpose, scope, structure, and compliance and guidance to ensure that the right EA is chosen. Wagter, R. Steenbergen, M. (2005). Dynamic Enterprise Architecture: How to Make it work. New York: John Wiley and Sons Publications. The authors of the book present a way towards EA that enables organizations to achieve the objectives of their business. The book focuses on governance of the IT organization, advice and strategies provide tangible tools that assist in the achievement of the goals of the organization. If all the directives are followed the organization will achieve its goals at a faster speed. White, J. (2007). Managing Information in the Public Sector. New York: M. E. Sharpe. The book covers the basis of information technology, political and managerial issues that revolve the EA. This book is specifically written for the public and it covers all problems that are related to IT and the public.

Wednesday, August 21, 2019

Should you hire an experienced hacker to protect your IT systems Essay Example for Free

Should you hire an experienced hacker to protect your IT systems Essay Securing IT systems from potential threats and thefts is a daunting task faced by organizations. Sensitive information in wrong hands could be harmful and can cause lot of damage. Hackers not only gain access to information but also indulge in various forms of cyber terrorism such as extortion. Hackers, discover the vulnerabilities of an IT system and exploit it. They understand the nuances of the system so well that exploiting it for their advantage becomes easy. The question one needs to think about is if hackers are so talented enough to break into security system, why shouldn’t their services be sought to protect the system. A hacker depending on his intentions could be a white hacker/white hat, black hacker/black hat or grey hacker/grey hat. A hacker who indulges in hacking with a non-malicious intention to expose the vulnerabilities of the system is known as white hat. These hackers employ the techniques used by malicious hackers to test the security of an IT system and detect any errors. Hackers who intrude IT systems with motives such as theft of data or cyber terrorism are commonly known as black hat. They find the mistakes in the computer systems and use it to their advantage. A grey hat would be someone whose intention is at the borderline. Grey hat hackers are those who perceive breaking into a security system , a challenge for their skills. They may not cause any harm but nevertheless they intrude a system. White hat are also known ethical hacker assess the possible threats to a IT system. It is necessary for these ethical hackers to gain an insight into the mind and techniques of malicious hackers. An example of an ethical hacker is Mark Seiden who works as an independent security consultant. It is his job to find the weak links in a security system and provide solutions for those loopholes. He has helped various organizations in tracking the vulnerabilities of their security system. According to him, the creation of a security system is an effort required by two people. One who is responsible for creation of the security system and the second who would test the system for its faults. These days there are various institutes which offer training in hacking for the detecting loopholes in a security system. Anyone with knowledge of computer programming or network administration is eligible for this course. These modules which aim at producing a â€Å"certified hacker† , train people interested in hacking by providing them in-depth knowledge about security systems and how to detect loopholes within them. The sole aim of this training is to enable the white guys use skills such as penetration testing, internal/external network hacking, war dialing etc. to test the vulnerability of their networks and IT systems. Thus armed with knowledge about the workings of the bad guys, they are sought by organizations to help them avert intrusion. However, one needs to address the issue whether the ethical hackers work under a code on ethics that will prevent them from using this knowledge for a wrong cause. When students enroll for courses in learning regarding hacking systems, there is no way to detect whether he is going to use it for a malicious purpose or not. There are various risks associated with training people with skills to detect vulnerabilities. Some of the courses are taught online. It is possible for malicious hackers to gain access to this to further enhance their knowledge. There are certain disadvantages in hiring or training ethical hackers. There is no assurance that the hacker will comply to the code of ethics. Since they have the knowledge of breaking into systems and gaining access to valuable data, their intentions might vary and they may get lured into unethical activity. Therefore, while offering training on these hacking courses one needs to ensure awareness regarding misuse and unauthorized access. Information regarding the legal implication in unethical usage should be available to students availing such courses. Exposure to laws and punishments regarding malicious hacking should be provided. This can act as a deterrent to behave in an unethical manner. Organizations should exercise great caution while hiring hackers. They should have legal contracts which explicitly state the terms and conditions under which hacking is carried out. Ethical hackers should develop a code of ethics under which they operate. They should ensure that these hackers are working under strict policies and supervision of the organizations. Good security policies are another way to dissuade unethical hacking. Employees with a proven track record can be trusted with responsibilities of ethical hacking. One should be cautious while employing a criminal hacker to detect system weakness. Conclusion The advantages associated with ethical hacking outweigh the risks. Under supervisions and security policies organizations can engage experienced hackers to test their system for weal areas. Information in wrong hands could be dangerous and harm the credibility of organizations. An experienced hacker thus identifies the error in the software of security system and provides patches to secure it further. It is true, to overpower one’s enemy, you need to think like the enemy.

What Are The Uses Of Phenoxybenzamine Hydrochloride Biology Essay

What Are The Uses Of Phenoxybenzamine Hydrochloride Biology Essay Phenoxybenzamine Hydrochloride (RS)-benzyl(2-chloroethyl)1-methyl-2-phenoxyethylamine hydrochloride is a alpha-adrenoceptor blocker that covalently binds and irreversibly inhibits the activity of alpha-1 alpha -2 adrenoceptors.3,4 Phenoxybenzamine Hydrochloride is mainly used to treat episodes of high blood pressure and sweating related to phaeochromocytoma. Phaeochromocytoma is a rare catecholamine-secreting tumour of the adrenal medulla. Patients with phaeochromocytoma are usually hypertensive and suffer headache, palpitations, and excessive sweating.3 However it is rarely prescribed due to it unfavourable side effects. One of the side effects of Phenoxybenzamine is that block the ejaculation. Also some studies are under investigation to use Phenoxybenzamine as male contraceptive pills.11 , HCl Fig. 01 Molecular structure of (RS)-N-benzyl-N-(2-chloroethyl)-1- phenoxy-propan-2-amine Phenoxybenzamine hydrochloride is white, odourless, crystalline powder that is sparingly soluble in water; soluble in ethanol, chloroform, and propylene glycol; and insoluble in diethyl ether. Neutral and alkaline solutions are unstable; sensitive to oxidation and photo degradation.6,7,8 Molecular Weight9: 303.82638 [g/mol] Molecular Formula : C18H22ClNO MonoIsotopic Mass9: 303.138992 CAS-No. : 63-92-3 The stability studies for Phenoxybenzamine injection concentrate were carried out by Zeta Analytical Ltd. for their Clients. Also analytical method for related substance of Phenoxybenzamine Injection has been validated by them. During the stability studies, it has been found that some stability batches contain more than 0.1% of unknown impurities. Already there are three identified, process related impurities were reported in their clients analytical methods.10 Those three impurities A, B, and C are reported as shown below. 1. Impurity A: N-benzyl-N-(2-chloroethyl)-2-phenoxypropan-1-amine Fig. 02 Molecular structure of N-benzyl-N-(2-chloroethyl)-2- phenoxy-propan-1-amine 2. Impurity B: N-benzyl-N-(2, hydroxyethyl)-1-phenoxypropan-2-amine Fig. 03 Molecular structure of N-benzyl-N-(2-hydroxyethyl)-1-phenoxypropan-2-amine 3. Impurity C: N-(2-chloroethyl)-1-phenoxypropan-2-amine Fig. 04 Molecular structure a of N-(2-chloroethyl)-1-phenoxypropan-2-amine According to the International Conference on Harmonization1,2 (ICH) guidelines any component of a pharmaceutical product which is not the chemical entity of active substance or excipients, present at levels higher than 0.1% or 1 mg/day intake (whichever is lower) for a maximum daily dose of 2 g/day or less, need to be identified and qualified with appropriate toxicological studies. For a daily dose of greater than 2 g of drug substance, the identification threshold is 0.05%.1 ,2 Also British (BP), European (EP) and United states (USP) pharmacopeia texts refers the ICH criteria on impurity profiling for new drug substance and new drug products.5,6,7 Hyphenated techniques such as LC-MS and LC-NMR methods as an effective tool for characterization of impurities and degradation products in drug molecules. Therefore, Zeta Analytical proposed this project to perform LC-MS analysis on Phenoxybenzamine injection for structural elucidation of unknown impurity. This project involved method transferring (Tech transfer) from Zeta to Kingston University and developing a LC-MS compatible chromatographic method structural identifications of unknown impurity. Literature Study: There are no chromatographic methods have been reported in the literature describing the analysis of Phenoxybenzamine and its related substances using UV detection. The chromatographic Conditions mentioned in United States Pharmacopoeia (USP) monograph7 (refer Appendix) and Zetas method quiet similar apart from the detection wavelength, which is 268nm for USP and 220 nm for Zeta. Both methods are not compatible for LC/MS analysis. Because phosphate buffer is a one component that mobile phase consist in both methods. There are no reports available on the investigation using LC/MS/MS and isolation of related substances in Phenoxybenzamine active pharmaceutical ingredient (API). However, in order to analyse the sample in LC/MS and to get better chromatographic resolution the method has been modified for use in the present investigation. A synthesis route of Phenoxybenzamine has been mentioned in Vardanyan and Hruby,18 and slightly different route of synthesis for phenoxybenzaime related amines has been reported in Giardink et al.13 EXPERIMENTAL Material and Methods Chemicals used (all anal. Grade )were: Phenoxybenzamine Hydrochloride ( Sigma- Aldrich) , Impurity B (PBA) from med alchemy S.L Spain, HPLC grade Acetonitrile (Sigma- Aldrich), Potassium phosphate dibasic, Potassium phosphate monobasic, Ammonium formate, Ammonium Hydroxide, MilliQ grade water Samples Phenoxybenzamine injection concentrate ; Each 2 ml ampoule contains 100 mg Phenoxybenzamine Hydrochloride BP and excipients are absolute ethyl alcohol, hydrochloric acid AR and propylene glycol. Sample Preparation for HPLC and LC-MS Whole contents of ampoule was transferred to a 100mL volumetric flask and dissolved with 30 mL of acetonitrile. Then it was shacked for few minutes to mix well and added more acetonitrile to volume up the level of volumetric flask. HPLC analysis at Zeta Analytical Ltd. HPLC analysis was proceeded at these chromatographic condition : Column Phenomenex Gemeni-NX 5Â µm C18 110A 250-4.6 mm. Mobile phase used : pH 7.5 20mM Phosphate buffer (Dissolved 2.4g of K2HPO4 in 1L of water and adjusted to pH 7.5 with KH2PO4) : Acetonitrile = 30% : 70% (Isocratic mode ) .Column temperature 25C , flow rate 0.9 cm3min-1 , detection at 220nm . HPLC system used at Zeta analytical Ltd : Pump , Auto sampler ,UV detector and thermostat are Agilent 1100 series with Agilent Chemstation for LC data system. HPLC analysis at School of chemistry and pharmacy, Kingston University: HPLC analysis was proceeded at these chromatographic condition : Column Phenomenex Gemeni-NX 5Â µm C18 110A 250-4.6 mm. Mobile phase used : pH 7.5 20mM Phosphate buffer (Dissolved 2.4g of K2HPO4 in 1L of water and adjusted to pH 7.5 with KH2PO4) : Acetonitrile = 30% : 70% (Isocratic mode ) .Column temperature 25C , flow rate 0.9 cm3min-1 , detection at 220nm . HPLC system used at Kingston University: Pump , Auto sampler ,UV-VIS detector and thermostat are Perkin Elmer series 200 with Totalchrom v6.2 software. LC- MS analysis at School of chemistry and pharmacy, Kingston University: LC-MS analysis was proceeded at these chromatographic condition : Column Phenomenex Gemeni-NX 5Â µm C18 110A 250-4.6 mm. Mobile phase used : pH 8.3 20mM Ammonium formate buffer (Dissolved 1.3g of NH4HCO2 in 1L of water and adjusted to pH 8.3 with NH4OH) : Aceotonitrile = 30% : 70% (Isocratic mode) .Column temperature 25C , flow rate 0.9 cm3min-1 , detection at 220nm . LC system : Pump , Auto sampler ,UV-VIS detector and thermostat are Perkin Elmer series 200 with Totalchrom v6.2 data system. Mass detetectors used : Two different mass detectors were employed : Waters Micromass LCT ESI-TOF-MS system with Mass Lynx 4.1 software Thermo TSQ Quantum Access system ( MSMS ) with Thermo Excalibur software RESULTS AND DICUSSION HPLC Analysis at Zeta Analytical Ltd. Initially the sample was analyzed in Agilent HPLC in Zeta Analytical Ltd. Based on the Zetas Analytical Method validation report for the related substance of Phenoxybenzamine HCl injection, the three identified impurities and one unidentified impurity were confirmed. Below the fig.05 (Appendix A-1) shows the peaks of Phenoxybenzamine and its impurities and the table 01 shows the retention time of those peaks. Fig. 05 HPLC chromatograms of Phenoxybenzamine HCl injections Table 01: Peaks and its retention time of Phenoxybenzamine (zeta) Peaks Retention Time / min Impurity C 5.2 Impurity B 7.3 Unidentified Impurity 8.6 Impurity A 18.2 Phenoxybenzamine 19.6 HPLC Analysis at Kingston University: (Method Transfer) The above results obtained at zeta were replicated again with Perkin-Elmer HPLC system in Kingston University. Same chromatographic condition was employed with same Phenomenex Gemeni-NX 5Â µm C18 110A 250-4.6 mm column . The fig.06 below show chromatogram of Phenoxybenzamine HCl injection analysis repeated at Kingston University(Appendix A-2). The peaks were interested and its retention times are shown in the table 02 below. Fig.06 HPLC chromatogram of Phenoxybenzamine HCl Injection (Kingston) Table 02. Peaks and its retention time of Phenoxybenzamine (Kingston) Peaks Retention Time / min Impurity C 5.0 Impurity B 7.0 Unidentified Impurity 8.4 Impurity A 17.9 Phenoxybenzamine 19.5 LC-MS Analysis of Phenoxybenzamine Injection Concentrate: Phosphate buffers are not compatible for LC-MS due to their non volatile nature. Since it was necessary to replace the phosphate buffer to a volatile buffer. Mean while the chromatographic development should not be changed. The ammonium formate buffers are widely used in LC-MS analytical methods and has buffering pH range (8.2-10.2) close to the previous phosphate buffers used which is pH 7.5 . 20mM ammonium phosphate buffer was prepared adjusted the pH to 8.3. The HPLC analysis previously performed was repeated with mobile phase of Ammonium formate buffer : Acetonitrile =30: 70 instead of mobile phase of phosphate buffer : Acetonitrile = 30:70 . The isolation of peaks and the resolution obtained in previous analysis was replicated. Fig. 07 Show the HPLC chromatogram of replicated results with Ammonium formate buffer and the table 03 show retention time and its corresponding peaks. Fig.07 HPLC chromatogram of PBA Injection Sample ( Modified Mobile phase for LC-MS analysis) Table 03: Peaks and its retention time of Phenoxybenzamine (Ammonium formate as buffer)The samples were run on HPLC several times and constant chromatographic development was observed. Hence the sample fractions of unknown impurity was collected several time during HPLC run for LC-MS (accurate mass measurement) and LC-MS/MS (selective ion monitoring) analysis. Peaks Retention Time / min Impurity C 5.3 Impurity B 7.3 Unidentified Impurity 8.7 Impurity A 18.5 Phenoxybenzamine 19.8 Accurate mass measurement with Time of Flight (ToF) mass detector Feasibility of TOF mass detectors has made it to be used widely for measurement of accurate mass. Several unknown impurity sample fractions were analyzed for the accurate mass measurement on Waters micromass LCT ESI TOF-MS and obtained the average of the accurate mass value of unknown impurity. Ionization technique is Electron spray Ionization and mass analyzer is Time of Flight analyzer in this instrument. Results were taken on positive mode ( M + H + ). Hence mass of one proton must be deducted from the spectral mass value to obtain the exact mass value of unknown compound. H1 mass is considered to be 1.007 Da in the calculation below. Table 03: m/z value of Peaks observed its corresponding calculated monoisotopic mass M + H + / Da Mass of Unknown Compound / Da 344.215 343.208 344.216 343.209 344.216 343.209 344.219 343.212 344.211 343.204 344.209 343.202 344.215 343.208 344.214 343.207 344.215 343.208 344.213 343.206 344.215 343.208 344.22 343.213 344.213 343.206 344.221 343.214 344.223 343.216 The average molecular weight and standard deviation of results are found to be 343.2086667 and 0.003754363 respectively. Above results were subjected to statistical evaluation using Microsoft excel spread sheet. At 99% confidence level the molecular weight of the unknown impurity is found to be 343.2086667 0.002497. Determination of Elemental Composition of unknown impurity. Using Mass Lynx 4.1 MS data management software possible elemental composition was obtained for the molecular weight of 343.209 with 200.0 mDa tolerance . It was able to exclude a large amount elemental composition to narrow findings. That is elimination of Chlorine in the composition . Because the mass spectrum of unknown impurity does not show the isotopic pattern for chlorine. i.e. When one Chlorine atom is present in a molecule, that will show a n/n+2 ratio of 100/32.4 (35Cl/37Cl ratio of 100/32.4). 15,16 Hence only C,H,N and O elements were limited on search. Still hundreds of composition are left to be examined to find correct elemental composition . The second exclusion that is Nitrogen rule14 which was used to eliminate many of those composition. Since the unknown impurity molecular weight is odd number, we can eliminate all the composition with the even number of nitrogen in list. The following table shows considerable elemental composition left after above two exclusions . Table 04. Possible elemental composition and its Monoisotopic mass Elemental Composition Calculated Monoisotopic mass C12H25N9O3 343.2080 C16H29N3O5 343.2107 C23H25N3 343.2048 C21H29NO3 343.2147 C12H29N3O8 343.1955 C15H29N5O4 343.2220 C24H25NO 343.1936 The monoisotopic mass of main active compound is 303.14 and it contains 18 carbon on that molecule. Unknown impurity has the monoisotopic mass value 40 amu higher than the active compound. Therfore if it is been assumed that unknown impurity has more than 18 carbon on its molecule, only two elemental composition would be remained. i.e. C23H25N3 (343.2048) and C24H25NO (343.1936). LC -MS/MS (Tandem mass )Analysis of Phenoxybenzamine HCl Injection Concentrate Thermo TSQ Quantum Access LC-MS/MS was employed for the selective ion monitoring. The unknown impurity fractions , Phenoxybenzamine HCl standard (sigma ) and Impurity B standard were analysed. Analysis of Phenoxybenzamine HCl standard Parameter used: Parent mass: 304.4 Scan time: 0.5000 Collision energy: 16 Collision gas pressure: 1.1 Barr Spray Voltage: 4000 Scan Mode: Product Ion Scan Fig. 08 Product ion scan mass spectrum of Phenoxybenzamine Standard Peaks at m/z 63, 84, 91,107,120, 135 and 212 were observed. The base peak is observed at m/z 91 benzyl fragment . It is stabilized by the resonance form of benzene.17 The following figure illustrates the break downs and its corresponding mass units observed in the product ion scan spectrum. Fig. 09 Illustration of break downs of Phenoxybenzamine Apart from the peaks illustrated on above figure, the peaks at m/z 120 arise due to mass unit CH2NCH2CH2Cl + H+ . This is the middle portion after the mass unit at m/z 91 and 93 break apart from the whole Phenoxybenzamine molecule. i.e M + H+ the molecular ion is m/z 304, but 304 (91+93) = 120 . Analysis of Impurity B standard Parameter used: Parent mass: 286 Scan time: 0.5000 Collision energy: 16 Collision gas pressure: 1.1 Barr Spray Voltage: 4000 Scan Mode: Product Ion Scan Fig. 09 Product ion scan mass spectrum of Impurity B Standard Product Scan spectrum shows peaks at m/z 84, 91,102,107,135,178,194 and 285. The base peak is m/z 91and the molecular ion is m/z 286. The following figure illustrates the break downs and its corresponding mass units observed in the product ion scan spectrum. Fig. 09 Illustration of break downs of Impurity B As seen in the Phenoxybenzamine product ion scan spectrum the removal of mass units m/z 91 and 93 also is observed in this Impurity B spectrum. i.e . there is a peak arise at m/z 102 , this is due removal mass units m/z 91 and 93 from the molecular ion m/z 286. [286-(91+93)=102] Analysis of Unknown Impurity Parameter used: Parent mass: 286 Scan time: 0.5000 Collision energy: 16 Collision gas pressure: 1.1 Barr Spray Voltage: 4000 Scan Mode: Product Ion Scan Fig. 10 Product ion scan mass spectrum of Unknown Impurity Product ion Scan spectrum shows peaks at m/z 84,91,107,119,135,152,160,178,251,267 and 344 . Here the molecular ion peak and base peak are same at m/z 344. This mass spectrum shows quiet similar fragmentation pattern with Phenoxybenzamine and the impurity B were analysed before. Peaks at m/z 84, 91, 93, 107, and 135 are found in all three , Phenoxybenzamine , Impurity B and unknown impurity product ion scan spectrum. Also as studied previously in the spectrum of PBA and impurity B, the deduction of the mass units m/z 91 and 93 from the molecular ion (m/z 344) results a obvious sharp peak at m/z 160. From the facts studied above in product ion scan mass spectrum and accurate mass measurement for elemental composition using TOF -MS , It can be hypothesized a structure of the unknown impurity . The proposed structure for unknown impurity is shown below in figure. Fig. 11 The Molecular Structure proposed for unknown impurity, N-benzyl-N-[(E)-2-phenylethenyl] -1- phenoxy-propan-2-amine The proposed structure can be rationalized with the product ion mass spectrum of unknown impurity. Following fig.12 shows the break downs of the unknown impurity that correspond to the peaks observed on mass spectrum. Fig. 12 Illustration of break downs of Unknown Impurity Most of the impurities found in pharmaceutical compounds usually process-related compounds; they are most probably structurally similar to the synthesized target drugs. It is prominent to study the synthesis route of active pharmaceutical ingredient (API), when the unknown impurity of drugs substance is been identified. Unfortunately the original synthesis route followed by the API manufacturer of Phenoxybenzamine is not known. The prediction for synthesis route of Phenoxybenzamine with possibilities for arising of other 3 Identified process related impurities (A, B, and C) is shown in the following scheme below based on Giardink(1995).13 + (a) (ii) (iii) (iv) (b) (v) (c) (d) (vii) (vi) (a)Oxidation ;(b) 1-phenylmethanamine, HC1/EtOH,molecular sieves 4A, NaBH3CN; (c) Br(CH2)2OH, K2CO3, EtOH; (d) SOCI 2, HCI (g), Benzene (i)phenol; (2)2-methyl oxirane ;(3)1-phenoxypropan-2-ol;(4) 1-phenoxypropan-2-one; (5) N-benzyl-1-phenoxypropan-2-amine; (6) 2-[benzyl(1-phenoxypropan-2-yl)amino]ethanol;(7) N-benzyl-N-(2-chloroethyl)-1-phenoxypropan-2-amine (Phenoxybenzamine) Scheme 1. Predicted synthesis route for Phenoxybenzamine Formation of Impurity A The reaction between phenol (i) and 2-methyl oxirane (ii) is SN2 nucleophilic substitution. Nucleophiles are more reactive to most substituted carbon of epoxides under acidic condition and least substituted carbon is favoured under basic condition.19 In this case carbon position 2 (fig.13) is favoured under basic condition and its form 1-phenoxypropan-2-ol ,which is the precursor molecule for PBA . Fig. 13 Structure of 2-methyl oxirane To very few extent the nucleophiles react at carbon position 3 will form 2-phenoxypropan-1-ol, which will lead to the formation of Impurity A along synthesis process of PBA. Fig.14 Structure of 2-phenoxypropan-1-ol Formation of Impurity B and Impurity C Impurity B, 2-[benzyl(1-phenoxypropan-2-yl)amino]ethanol is intermediate product during synthesis. Refer structure (vi) of scheme 01 . Impurity C, N-(2-chloroethyl)-1-phenoxypropan-2-amine formed due to chlorination of intermediate product 1-phenoxypropan-2-ol (refer structure (iii) of scheme 01). The unoxidised 1-phenoxypropan-2-ol left over is chlorinated by SOCI 2, HCI during last step of the synthesis. Refer (d) of the scheme. CONCLUSIONS Preliminary structural assignments for unknown impurity of Phenoxybenzamine Injection were made on the basis of mass spectral data. Initially the works started with transferring HPLC method from Zeta Lab to Kingston university and developing a LC-MS chromatographic method. Ammonium formate volatile buffer was replaced for phosphate buffer in HPLC method . Same chromatographic development was able to replicated with ammonium formate buffer. Accurate mass measurement was carried out on ESI-TOF LC-MS . Also this studies led to determine possible empirical formula . Then LC-MS/MS analysis was performed. The Product ion Scan mass spectral data are very vital information in final structural elucidation of unknown impurity. The structure deduced from MS/MS confirms the empirical formula C24H25NO that derived with LC-TOF-MS spectral data. Eventually the impurity identified in this this preliminary structural assignments , which eluted at retention time of 8.7 minute was predicted as N-benzyl-N-[(E)-2-phenylethenyl] -1- phenoxy-propan-2-amine . The proposed molecular structure for unknown impurity is shown in fig.11 . The formation of impurities A, B and C those had already identified by manufacture were described based on the predicted synthesis route for Phenoxybenzamine . The formation unknown impurity was not able to explained at this stage of this project since the reaction would have occurred found to be more complicated. This project work was wrapped up at this stage due to time limitation. Further to these preliminary structural assignments various spectroscopic studies such as LC-NMR and IR need to be carried out to complete the characterization of the unknown compound. Ultimately the proposed st ructure can be confirmed by synthesizing N-benzyl-N-[(E)-2-phenylethenyl] -1- phenoxy-propan-2-amine in future.

Tuesday, August 20, 2019

Tracing Sexual Difference: Beyond the Aporia of the Other :: Philosophy Philosophical Essays

Tracing Sexual Difference: Beyond the Aporia of the Other ABSTRACT: A reading of Luce Irigaray suggests the possibility of tracing sexual difference in philosophical accounts of personal identity. In particular, I argue that Irigaray raises the possibility of moving beyond the aporia of the other which lies at the heart of Paul Ricoeur's account of self-identity. My contention is that the self conceived in Ricoeur's Oneself as Another is male insofar as it is dependent upon the patriarchal monotheism which has shaped Western culture both socially and economically. Nevertheless there remains the possibility of developing Ricoeur's reference to 'the trace of the Other' in order to give a non-essential meaning to sexual difference. Such meaning will emerge when (i) both men and women have identities as subjects, and (ii) the difference between them can be expressed. I aim to elucidate both conditions by appropriating Irigaray's 'Questions to Emmanuel Levinas: On the Divinity of Love.' I. Introduction Here I appropriate two questions from Luce Irigaray's 'Questions to Emmanuel Levinas: On the Divinity of Love' in order to disruptively refigure Paul Ricoeur's account of self-identity, without assessing Irigaray's reading of Levinas. Irigaray suggests the possibility of tracing sexual difference in philosophical accounts of personal identity. By 'tracing' I mean to follow the marks left by that which is no longer present to that which is never entirely spoken, i.e. sexual difference. I argue that Irigaray makes possible moving beyond the aporia of the Other which lies at the heart of Ricoeur's account of self-identity in Oneself as Another. This aporia is a self-engendered paradox which, as I have demonstrated elsewhere, Ricoeur is not able to go beyond: he cannot name the Other/other (whether l'Autre as a general category for the Other or l'autrui as a term for another person). My contention is that in appropriating Irigaray's questions, we can begin to refigure Ricoeur's account of self-identity, extend his use of 'the trace of the Other' and conceive the non-essential meaning of sexual difference. As it is Ricoeur's account of self-identity seems to eclipse sexual difference in being dependent upon the patriarchal monotheism which has shaped western cultures both socially and economically. Yet according to Irigaray sexual difference will be conceiveable once (i) both men and women can gain identities as subjects, and (ii) the difference between them can be expressed. Arguably Ricoeur's notion of narrative identity, to which I will return, could express this difference and these distinct identities.

Monday, August 19, 2019

Should Workers Be Allowed To Strike? - Argumentative Essay

It is difficult to see how anyone could deny that all workers should have the rights to strike. This is because striking gives workers freedom of speech. This is justifiable, because Britain is a democratic nation. My first reason supporting the motion that workers should be allowed to strike is in order to bring to the fore poor safety conditions. For instance, in the nuclear power industry, any breaches of safety can have tragic consequences. If the employees are exposed to nuclear material, this could lead to serious illnesses such as cancer, leukaemia and radiation sickness. Radioactive material could also affect residents of the surrounding area, as in the case of the Chernobyl disaster. In the light of poor safety conditions, workers striking can be justified by the fact that the government and public would be informed. Similarly, another justification for employees striking is that production and confidence would perhaps increase after industrial action. This could be because, when workers strike for higher pay or better conditions and their employers meet their demands, the employees return to their place of work with higher morale than before the walk-out. As a consequence, the higher productivity would be beneficial to the owners. Likewise, industrial action gives the worker a line of protest against unfair hours or miserly wages. Theoretically, if taking industrial action was outlawed, the management could impose any terms and contract changes that they wished ...

Sunday, August 18, 2019

The Humanistic View :: essays research papers

During the renaissance, humanism was a philosophy that was characterized by its blending of the concern of the history and actions of all human beings, and their influence in the world, with religious duty. Prior to renaissance thinking, medieval Europe considered life to be sinful and should despised, and that people should only be concerned about their duty to God. Writers of the renaissance time period expressed their opinions about human nature and human’s role in the universe through their writings. Alberti, whose work includes, â€Å" On the Family†, emphases the importants of self-worth and education. He writes, â€Å" If one wishes to gain praise and fame, he must abhor idleness and laziness and oppose them as deadly foes. Basically Alberti says, is that if a person goes about their everyday life without the desire for education, therefore, that person is useless to their community. Bruni, Castiglione, and Pico take humanism a step further. Unlike Alberti, they stress the importants of self-appearance. They believe men should act like a gentlemen, speak softly and be stern with their words, but also at the same time be war ready. From the Book of the Courtier, Castiglione writes, â€Å" where of I think the first should be to handle every sort of weapon well on foot and on horse, understand the advantages of each, and especially to be familiar with those weapons that are ordinary used among gentleman†, what he is saying is that a man during this time should be skilled to fight and he should also know his weapons. For a woman, basically it’s the same thing as a man, with two exceptions. The first exception is that if a woman, who is out in public, and engaged in a conversion she knows nothing about, for her sake she should not comment on anything. And the second exception is that if a woman when speaking, should be very careful not to show how smart she is or how she may have had a better up bringing than a man. Dante and the humanist have many things in common; such as they both like the classic styles of writing from ancient Greece and Rome, they both have praised the importants of a higher education in their works. But the only thing I see Dante differing from the humanist is the focus of God in their life. , Dante's relationship with God is evident in his writing, which portrays the experience of a deeply committed Christian.

Saturday, August 17, 2019

Planned Parenthood and Teen Awareness Group (TGA) Essay

The Teen Awareness Group or TGA is an educational program that is sponsored by Planned Parenthood in East Central Illinois. The aim of TGA is to mobilize specific age groups within the community to teach the younger population about teen pregnancy and other related issues. The ultimate mission or goal of the TGA is focused on a specific group of people, the youth, as a means to compartmentalize the services provided by Planned Parenthood and in the same way direct attention to vulnerable populations and ensure that specific needs or concerned posed by them are addressed. Another objective and motivation being utilized by Planned Parenthood is the consequences of being unguided throughout a young individual’s life. The organization recognizes through its educational program that undesirable results, such as unwanted teen pregnancy, etc. , are results of uninformed decision-making and an unguided life. Through education, TGA aims to teach the youth to become more responsible and aware. The program does not only benefit the youth in terms of being educated and guided. It also empowers them to become socially conscious of their responsibilities in terms of helping other people within the same age group to face challenges by becoming part time workers for the organization. Peer educators will be trained to be competent enough for the job requirements, and they should also be able to attend set meetings as required. Individuals who are eligible to join the cause should be between fourteen to eighteen years of age. The schools they are attending should be within the Bloomington-Normal and Champaign areas only. Aside from peer educators, individuals who will be joining the program will also be able to communicate with adults who are more experienced in the area. Planned Parenthood operates for TGA by coordinating with schools within the areas mentioned. Peer educators and individuals who want to join the program are asked to communicate with representatives working in their schools to be informed of how to join the cause whether as the subject or the educator. The resources for the programs that are lined up for the TGA are funded by the Illinois Department of Human Services Teen Pregnancy Prevention Program and the Cunningham Township/Urbana City Social Services Funds. Each institutions plays a major role in the production of resources that completes and realizes the purpose of Planned Parenthood through its educational problem facilitated by the TGA.

Friday, August 16, 2019

Knowledge and Understanding of “the Human Seasons” Essay

The poem â€Å"The Human Seasons† is a poem by John Keats is a poem John Keats wrote to a friend in a letter. â€Å"The Human Seasons† is a fourteen line English sonnet with twelve lines in the beginning followed by two final lines at the end. The poem has rhymes however the whole poem is neither uniform nor consistent throughout. The first four lines rhyme in an ABAB pattern. The second rhyme can be found between line six and eight. The Third rhyme can be found between nine and eleven and the final rhyme is in the last two lines, line thirteen and fourteen. All these rhymes are different, however they do share one thing in common the rhyming pairs all have one line in between to separate them. Another pattern that can be found in the poem is an iambic pattern. In pattern flows with the human blood flow making it easy to read. These patterns construct the bases that show the amount of thought John Keats put into the poem to express himself. The speaker we assume is John Keats himself since this poem was used in a letter to a friend from John Keats. The intended audience is the recipient of the letter, but now the poem is shared to all. In the poem John Keats is comparing the two different natural process, the four seasons of a natural year and the stages of human life. The season become metaphors for the various feelings and thoughts humans experience in the various phases of one’s life. The tone is serious as John Keats is expressing his thought on the topics of the natural human process. This serious tone can be felt from the diction since the John Keats choses to use formal language to write this poem. â€Å"The Human Season† is an example of John Keats ability to put a lot of thought in a fourteen line poem. The patterns and thoughts expressed in the poem are densely compressed but not too much that makes it hard on the reader to understand the topics and the expression of the speaker. One can really appreciate this with the careful analysis to see how much work John Keats puts into a short fourteen lines.

Thursday, August 15, 2019

Critical Disagreement Essay

Few modern writers reveal a more consistent intellectual development than Ernest Hemingway. In both his themes and the meaning he has found in them he has moved steadily and even logically from the earliest work of In Our Time to the significant orientation of The Fifth Column. The logic of this development has for the most part remained unnoticed by critics who have failed to realize that Hemingway, far from being a child of nature, is in fact an intellectual. They have presented him, consequently, as a sort of savage endowed with style, gifted but brainless. A Farewell to Arms ( 1929) takes us to the Italian front and includes a vivid account of the terrible retreat from Caporetto. An American lieutenant in the Italian Red Cross falls in love with an English nurse and she with him. Both have previously suffered more attrition than human nerves can stand, and in their passionate attachment they find a psychological refuge from the incessant horror of war. They escape to brief happiness in Switzerland, but in giving birth to a child the girl dies. The ending is far from inevitable. It is a comment on the looseness of Hemingway’s artistry that the moving picture version of this novel was equipped with alternative sad and happy conclusions. In A Farewell to Arms it is society as a whole that is rejected, social responsibility, social concern. Lieutenant Henry is in the War, but his attitude toward it is purely that of a spectator, refusing to be involved. He is leading a private life as an isolated individual. Even personal relations, of any depth or intimacy, he avoids; he drinks with the officers and talks with the priest and visits the officers’ brothel, but all contacts he keeps, deliberately, on a superficial level. He has rejected the world. Such an attitude is possible only to a sensitive and reflective person. Henry is no naive barbarian. He was studying architecture in Italy when the War began; he makes ironical remarks about sculptures and bronzes; his reflections and conversation contain allusions to Samuel Johnson, Saint Paul, Andrew Marvell, and Sir Thomas Wyatt. His flight from responsibility is the ultimate of the flight that Jake and Brett and Mike were trying to effect with drink and bullfights and sex. He is evading responsibility and emotion, taking refuge in simple primary sensations. Successfully, so far as the War is concerned: â€Å"I was always embarrassed by the words sacred, glorious and sacrifice and the expression in vain . . . Abstract words, such as glory, honor, courage, or hallow were obscene beside the concrete names of villages, the number of roads, the names of rivers, the numbers of regiments and the dates. † Characterization Hemingway’s greatness lies not in the range of his characterization or the suppleness of his style but in the astonishing perfection of these limited objectives. As Wilhelm points out, â€Å"the oppressive weight of death and anxiety in this object composition, subtly framed for the reader’s perusal, undercuts the scene’s â€Å"mask of well-being†Ã¢â‚¬â€œtwo wartime colleagues bonding rather sophomorically in their desire for women. Henry imbues the elements of this expansive still life with symbolic import, foreshadowing events to come. Because objects are frequently used for characterization, Henry’s possessions provide visual clues to the reader, but only as fragments in the larger narrative that withhold their essential meaning until the text’s conclusion†. (Wilhelm) The very intensity of Hemingway’s â€Å"nihilism† in his first stories and novels proved, however, that his need for an ideal expression in art was the mark of a passionate romanticist who had been profoundly disappointed. The anguish of his characters was too dramatic, too flawless; it was too transparent an inversion. The symbols Hemingway employed to convey his sense of the world’s futility and horror were always more significant than the characters who personified emotions, and the characters were so often felt as personified emotions that the emotions became sentimental. The gallery of expatriates in The Sun Also Rises were always subsidiary to the theme that the period itself was lost; the lovers in A Farewell to Arms were, as Edmund Wilson has said, the abstractions of a lyric emotion. Hemingway had created a world of his own socially more brilliant than life, but he was not writing about people living in a world; he was dealing in stock values again, driving his characters between the two poles of a tremulous inner exaltation and an absolute frustration. What he liked best was to invoke the specter of damnation. But A Farewell to Arms is a tragedy, and the lovers are shown as innocent victims with no relation to the forces that torment them. They themselves are not tormented within by that dissonance between personal satisfaction and the suffering one shares with others which it has been Hemingway’s triumph to handle. A Farewell to Arms, as the author once said, is a Romeo and Juliet. And when Catherine and her lover emerge from the stream of action–the account of the Caporetto retreat is Hemingway’s best sustained piece of narrative–when they escape from the alien necessities of which their romance has been merely an accident, which have been writing their story for them, then we see that they are not in themselves convincing as human personalities. And we are confronted with the paradox that Hemingway, who possesses so remarkable a mimetic gift in catching the tone of social and national types and in making his people talk appropriately, has not shown any very solid sense of character, or indeed, any real interest in it. The people in his short stories are satisfactory because he has only to hit them off: the point of the story does not lie in personalities, but in the emotion to which a situation gives rise. This is true even in The Sun Also Rises, where the characters are sketched with wonderful cleverness. But in A Farewell to Arms, as soon as we are brought into real intimacy with the lovers, as soon as the author is obliged to see them through a searching personal experience, we find merely an idealized relationship, the abstractions of a lyric emotion. Against the gaiety, the warmth of ‘A Farewell to Arms,’ Hemingway portrays, of course, the cumulative degeneration of the human temperament under the conditions of war. The novel is a series of human defeats within one continuous and terrible sequence: the rains, the cholera, the soldiers who mutilate themselves rather than go on fighting, the growing weariness of the Italian army which led up to Caporetto, the degeneration of Rinaldi himself who is symptomatic of the novel’s pattern, and at its start is so quick and alive. Contrasted against this in turn, in the love of Lieutenant Henry and Catherine Barkley we have another antithesis of increasing joy. The love and the despair are constantly related, intensely intertwined, and in the end almost gain the feeling of life and death themselves: the death preying upon the living organism of the lovers’ hope, eating into the flesh and destroying the form from page to page. Yet each change of form, each advance of destruction makes the life of the novel more vital, the life we know must yield, but in the manner of its yielding asserting itself beyond its destruction. A Farewell to Arms in this sense lies quite outside of the pattern of Hemingway’s development which we have been showing. For the feeling of tragedy in the novel comes precisely from the struggle to participate in life despite all the odds, from the efforts of the lovers to fulfill themselves in a sterile world, from the exact impact of the human will which Hemingway has negated. Yet even here we must notice that Lieutenant Henry turns his back upon our society after Caporetto. Following his personal objectives he abandons his friends, his responsibilities as an officer, the entire complex of organized social life represented by the army and the war. This farewell to arms is accomplished without request or permission. Lieutenant Henry, in fact, deserts, and his action is prophetic of his author’s own future movement. ‘You and me,’ says Nick to the Rinaldi of ‘In Our Time,’ ‘we’ve made a separate peace. ‘ And Hemingway’s separate peace was to embrace the woods of Michigan as well as Caporetto, the activities of normal times as well as war, and even at last the ordinary purposes of the individual’s life within his society, as well as the collective purposes of society as a whole. Conclusion A Farewell to Arms is even more strictly the story of one man; here, even more than in The Sun Also Rises, the reader feels the cleft between the primary and secondary figures. Both books have the foreshortening of time which is more properly the privilege of the drama than of the traditional novel a technique toward which, since Hemingway demonstrated its immense value, American fiction has been striving with remarkable persistence. Back in the nineteenth century, when people like Henry James and Paul Bourget were taking such distinctions seriously, books like these would have been classified as novelas. I have some difficulty in feeling any wide gap between books in which Hemingway is reporting upon young men who are in character-tastes, occupations, age very much like himself, and books in which he drops the pretense of fiction in order to discuss the same materials in definite reference to himself. And why, to come directly to the main question, do we have to consider Death in the Afternoon and Green Hills of Africa such failures, anyway? One may not be particularly interested in bullfighting and still find that the considered statement, by an accomplished artist, regarding the effect on his own personality of the study of the world’s most stylized form of violence is a document of extraordinary interest, particularly if the artist is making a special effort to see himself clearly at the time. We can also agree with Edmund Wilson that as a book about animals Green Hills of Africa is dull, as we can agree with Max Eastman that as a manual of tauromachy Death in the Afternoon is silly, and still be passionately interested in Hemingway’s report on himself as a killer. I imagine the answer is that we were concerned by the apparent disappearance of a novelist who seemed to be losing his grip. Hemingway himself was aware of the danger and discoursed upon it for the benefit of the German traveler in the beginning of Green Hills of Africa. He also seemed to feel the danger of losing his memory for sharply characterized sensations, so essential to his kind of writing. In the books after 1930 he seems disproportionately intent on catching things before he forgets them. Works Cited Balbert, Peter. â€Å"Courage at the Border-Line: Balder, Hemingway, and Lawrence’s the Captain’s Doll. † Papers on Language & Literature 42. 3 (2006) Bloom, Harold, ed. Ernest Hemingway†s a Farewell to Arms. Philadelphia: Chelsea House Publishers, 1987. Giles, Todd. â€Å"Simon and Schuster’s Hemingway Audio Collection. † The Hemingway Review 26. 1 (2006) Onderdonk, Todd. â€Å"†Bitched†: Feminization, Identity, and the Hemingwayesque in the Sun Also Rises. † Twentieth Century Literature 52. 1 (2006) Trodd, Zoe. â€Å"Hemingway’s Camera Eye: The Problem of Language and an Interwar Politics of Form. † The Hemingway Review 26. 2 (2007) Wagner-Martin, Linda, ed. Seven Decades of Criticism Seven Decades of Criticism. East Lansing, MI: Michigan State University Press, 1998. Whitlow, Roger. Cassandra’s Daughters: The Women in Hemingway. Westport, CT: Greenwood Press, 1984. Wilhelm, Randall S. â€Å"Objects on the Table: Anxiety and Still Life in Hemingway’s A Farewell to Arms. † The Hemingway Review 26. 1 (2006)