Saturday, August 31, 2019

Historical documen Essay

Do you believe every historical document or book was true? Before, we consider if the historical documents or books are true; first, we have to look at the historical event with a different point of view because it is easy to get biased information; if we only focus on one side of the event. In the book After The Fact â€Å"The View from the Bottom Rail† by James West Davidson and Mark Hamilton Lytle, the authors demonstrate that discovering the historical story of the freed people is difficult because histories deal with â€Å"top rail† rather than the â€Å"bottom rail† of the lower social classes. Therefore, the freed people’s history has become flawed. Writing about a historical event is exceedingly difficult, because we have to consider different points of view. Thus, if a historian focused on only one side of the story, the historical event will remain biased. For example, the history of slavery was biased and was not accurate. According to the authors, the black slaves could not read or write during that time; even if someone could read, they had to hide this skill from their masters. Then, almost of the written books or documents about slavery were written by the white masters. Therefore, the information was not only accurate but also biased because the information came from white masters rather than slaves who actually know the truth. Moreover, although the interviews came from slaves, almost every interviewee experienced slavery by his or her childhood; therefore, the interviews were also biased because they focused on those who survived slavery. As the author explains, â€Å"the average life expectancy of a slave in 1850 was less than fifty years†(Davison and Lytle 180). Thus, when they were interviewed by someone, they were old. Two-thirds of them were over 80 years old; that could lead us to assume that they were treated less harsh than other people who died early because of harsher treatment in earlier years. Moreover, as interviewees get older, their memories could fade, and they could not certainly remember the details. This is common sense that if the event occurred a long time ago, the person could not remember every detail. In addition, the interviewees couldn’t answer honestly because they were scared. One interviewee says,† I’ve told you too much. How come they want all this stuff from the colored people anyway? Do you take any stories from the white people?† (Davison and Lytle 183). Like the interviewee, other interviewees were also scared to speak out about what they really experienced because they thought speaking out frankly would put them in a trouble. Therefore, they could not answer honestly. In retrospect, the slave interviews become flawed, and it was biased, because the interviews were not considering different points of view. Additionally, there was no voice recorder, which could provide us with what the interviewees truly said to the interviewer. Therefore, when we look at historical events, we have to consider different points of view; thus, we do not accept everything we just find out or read. As the authors state, we cannot believe everything at â€Å"face value† before we carefully discover.

Causes of the Dust Bowl Essay

One of the most devastating environmental crises that occurred in the United States was the Dust Bowl. The Dust Bowl began shortly after the Great Depression began in 1929 and lasted throughout the 1930’s. It affected everyone, farmers and consumers alike, in its path negatively. The Dust Bowl of the 1930’s was caused by four major factors: drought, climate misconception, poor land management, and most importantly, wind erosion. The first of the four major factors is drought. During the Dust Bowl and the 1930’s there were four major periods of drought. The first lasted from 1930 to 1931, the second occurred in 1934, the third in 1936, and the last period of drought lasted from 1939 to 1940. The Great Plains had experienced periods of drought before and no major problems had occurred, so the main problem was that the farmers did not have enough time in between the periods of drought to recover because they were so close together. Another issue was that the droughts occurred at the same time as the economic downfall known as the Great Depression. This meant the farmers did not have the money to spend to help their crops. Also, many farmers simply believed that the droughts would end and that the rains would come soon as they had many other times in the 1900’s (Drought). Climate misconception played a large role in the creation of the Dust Bowl as well. The misconceptions about the climate and the annual rainfall in the Great Plains first began in the nineteenth century when people first began to settle in the area. Many of these settlers believed that they would always get enough rain to grow healthy crops because they settled on the land during years with abnormally high amounts of rain. Another reason people believed that the land would always be good to farm is because they were fed propaganda by railroad companies and land boosters. Even though there were several periods of drought that occurred before the 1930’s and the Dust Bowl, people were encouraged by the rains that always came soon after. The farmers’ misconceptions of the climate and annual rainfall also affected the way they farmed the land (Causes). Poor land management is one of the two most important causes of the Dust Bowl. The farmers were not able to manage their land well because they were not aware of the different techniques they should have used on their farms in the Plains. One of the techniques that the farmers should have used was crop rotation. Crop rotation would have been a great help in keeping their soil in larger clumps, whereas when the farmers repeatedly planted wheat in the soil, the nutrients were used up and were not replenished. This caused the soil to break up into a dust-like consistency that made the soil easier to be swept away by the winds. Farmers also should have had a year round ground cover on the soil to prevent the wind from sweeping it away, but the farmers were not aware of the heightened risk of wind erosion because they had not had to deal with it in the past. The last technique that the farmers should have used to help manage their land is known as shelter belting. Shelter belting is the process of planting trees and bushes in order to slow and block the winds that blew across the otherwise flat ground of the Great Plains. Another issue with the way the farmers managed their land was that they switched from the lister (a type of plow commonly used by farmers in the 1900’s) to the one way disk plow. The one way disk plow was favored by the farmers because it made plowing the field easier and much faster, but the downside to the new invention was that it left the soil even more susceptible to wind erosion (The Dust Bowl). The last factor that contributed to the Dust Bowl is wind erosion. Wind erosion is considered to be the most important and the most preventable cause of the environmental crises. It has since been proven that the size of the farm is directly related to the amount of wind erosion that will occur on the land. Experts say that the smaller the farm is the more wind erosion there will be on the land because larger farms are necessary to finance and benefit from erosion control. Small farmers on the other hand need to cultivate more of their land more intensely and they usually do not earn enough money to be able to spend anything on soil conservation. Many historians and researchers blame the overabundance of small farmers who did not participate in erosion control for the extent of the wind erosion during the 1930’s and they blame the Homestead Act of 1862 for bringing these farmers to the Plains. The Homestead Act gave away hundreds of thousands of  land plots that ranged from about 160 acres to about 320 acres even though agricultural experts recommended that the farms should be about 700 acres to 1200 acres to minimize wind erosion. The farmers that moved onto the land that was given away were the kind of farmers that did not implement the soil conservation tactics that were necessary to prevent the Dust Bowl in the Great Plains (Wind Erosion). In conclusion, drought, climate misconceptions, poor land management, and wind erosion were the four main causes of the agricultural tragedy of the 1930’s. These four factors came together at the beginning of the 1930’s to create what is now known as the Dust Bowl which lasted until the end of the decade. Thankfully, an environmental crisis like this has never taken place again in the United States and thanks to the organizations founded after the Dust Bowl, such as the Soil Conservation Service, our generation and the generations that follow will not have to live through the hardships that another Dust Bowl would cause.

Friday, August 30, 2019

A Critique of the Qualitative Research Essay

Beatrice J. Kalisch, PhD, RN, FAAN, reports her qualitative study â€Å"Missed Nursing Care† on medical-surgical units in the Journal of Nursing Care Quality. In the article, † Nursing Care: A Qualitative Study,† the researcher helps us understand what nursing care regularly missed on medical-surgical unit and what are the reasons nursing staff give for not completing these aspects of care. The reader will examine her use of grounded theory qualitative research method based on the guidelines provided by Geri LoBiondo-Wood and Judith Haber (2014). This research report will be analyzed using the criteria found in the Critiquing Criteria box on p. 135-136 in Nursing Research: Methods and Critical Appraisal for Evidence-Based Practice. Statement of the Phenomenon of Interest In Research: Methods and Critical Appraisal for Evidence-Based Practice, the authors define phenomena as those things that are perceived by our senses (LoBiondo-Wood & Haber, 2014). The research clearly states the phenomenon of internet in the introduction, â€Å"†¦specific aspects of nursing care missed routinely and nursing staff reasons why these elements of care are prioritized as less important than others† (Kalisch, 2006, p. 306). Beatrice Kalisch (2006) used the qualitative research method because the she had to discover information about her phenomenon from nurses experiences in their medical-surgical units. Kalisch (2006) explained, â€Å"A literature search revealed a lack of studies†¦Ã¢â‚¬  about â€Å"The specific aspects of missed nursing care† and â€Å"the association between less staffing and the negative outcomes† (Kalisch, 2006, p. 306). The researcher realizes current relationship between nursing staff and poor patient outcomes. Kalisch found there was a gap and wanted to discover what â€Å"the missing nursing care† was and why it is missing. Kalisch helps her audience understand the philosophical underpinnings by explaining the utility of grounded theory in phenomenal  sense making. The authors of Methods and Critical Appraisal for Evidence-Based Practice differentiate ground theory from other qualitative research methods by stating that ground theory focus on process. The research identifies the process elements of her phenomenon rather than just describing it (LoBiondo-Wood & Haber, 2014, p.153). Purpose Kalisch tells the reader the purpose in her first line of her abstract which is â€Å"†¦to determine nursing care regularly missed on medical-surgical units and reason for missed care† (Kalisch, 2006, p. 306). ). Kalisch conveyed to the reader, â€Å"Ensuring quality nursing care and patient safety is a major challenge facing nurses and nurse leaders today† (Kalisch, 2006, p. 306). Thus, this research is done to discover what can change nursing practice to ensure better patient outcomes. Method The authors of Research: Methods and Critical Appraisal for Evidence-Based Practice defines grounded theory as â€Å"different types of qualitative research method in that it goes beyond the traditional methods of phenomenology and ethnography, which focus on the process that is at the heart of the inquiry† (LoBiondo-Wood & Haber, 2014, p.154). According to Glaser and Strauss (1967), grounded theory method was â€Å"developed originally as a sociologist’s tool† and Denzin and Lincoln (1998) add â€Å"researchers†¦use the grounded theory method when they are interested in social process from the perspective of human interactions†¦Ã¢â‚¬  (LoBiondo-Wood & Haber, 2014, p. 116). Kalisch analyzed social process among nurses who are divided by job title into focus groups. She properly use grounded theory method to discover the phenomenon and collect data for the stated purpose. However, it is unclear if the study followed the guidelines of the grounded theor y method. Sampling In Methods and Critical Appraisal for Evidence-Based Practice, LoBiondo-Wood and Haber (2014) explains â€Å"In qualitative studies, the researchers are usually looking for purposive sampling†¦a particular kind of person who can illuminate the phenomenon they want to study† (p. 100). The reader knows Kalisch (2006) purpose is about the views of nurses on medical-surgical units, and the author does interviews with â€Å"A total of 107 registered nurses, 15 licensed practical nurses, and 51 nursing assistants, working in  medical-surgical patient care units†¦Ã¢â‚¬  from two different hospitals (Kalisch, 2006, p. 306). These nurses live the experiences of â€Å"missed nursing care† and can shed light on why care is missed on medical-surgical unit; therefore, they are an appropriate sample for this phenomenon of study. However, Kalisch could made a stronger sample for the grounded theory method if she included the words â€Å"purposive sample† , explained why this group of nursing staff was chosen, and given details about the inclusion/exclusion criteria for the sample (LoBiondo-Wood & Haber, 2014, p. 100). Data Collection The description of data collection lacks details in Kalisch (2006). The reader knows the author interviewed â€Å"25 focus groups† using â€Å"semistructured design and each interview â€Å"lasted 90-120 minutes† and the interviewees â€Å"were asked to commit to confidentiality† (Kalisch, 2006, p. 306-7). The data collection did include human experience which was the nursing staff. Though the author states asking the interviewees to â€Å"commit to confidentiality†, but this is not enough to protect them from disclosure. In addition, data saturation isn’t confirmed and little known about the data collection process. The author should have stated during the interviews â€Å"nothing new is emerging† (LoBiondo-Wood & Haber, 2014, p. 101). Furthermore, the author should included clues about questions that were asked and if anything collected from the interviews focused her study. Data Analysis The author used â€Å"qualitative analysis software† to apply â€Å"a grounded theory approach by which empirical data are thematically categorized by induction† (Kalisch, 2006, p. 307). There are two analyses of the â€Å"tape-recorded, fully transcribed† interviews, and â€Å"to be included as a theme, supporting data had to be contained†¦ in all of the focus groups† (Kalisch, 2006, p. 307). The reader identifies the research to be true to data because, as the two analyses â€Å"extracted the same issues from the empirical material† (Kalischp. 307). Trustworthiness, known as rigor for qualitative research, is established through credibility, auditability, and fittingness, none of which is communicated by Kalisch (LoBiondo-Wood & Haber, 2014, p. 126). Credibility requires that the â€Å"informants recognize the experience to be their own† (LoBiondo-Wood & Haber, 2014, p. 155). The author never discussed  taking the themes obtained fro m the interviews back to the nurses to allow the interviewees the opportunity to confirm the findings. Nor does the author give any indication that enough time was allowed for full understanding of the phenomenon. Auditability requires that others, â€Å"not engaged in the research, be able to follow the auditrial of the primary researcher† (LoBiondo-Wood & Haber, 2014, p. 155). The author should have described data saturation as mentioned previously. In the data analyses section of Kalisch (2006) the author mentioned grounded theory method was used for extraction of themes from the interviews. However, the reader doesn’t know the systematic process used, if there was â€Å"open coding† and â€Å"constant comparative method† (LoBiondo-Wood & Haber, 2014, p. 117). The neglect of giving the step-by-step process inhibits the reader’s ability to follow the thinking of the researcher. Fittingness is the â€Å"criterion that provides the reader with an opportunity to determine the usefulness of the data outside of the study† (LoBiondo-Wood & Haber, 2014, p.156). The reader knows the author chose grounded theory method appropriately for the purpose of Kalisch (2006); however, because of missing information the reader is unsure if this is study is repeated in other hospitals or other units if the same themes would evolve (LoBiondo-Wood & Haber, 2014, p. 117-120). If the author gave the systematic process the study could be replicated. This necessary information would allow wider application to other professions. Findings The author gives great details in the findings section of Kalisch (2006) allowing the reader â€Å"to apprehend the essences of the experience† (LoBiondo-Wood & Haber, 2010, p. 130). Use of quotes from the interviews allowed the reader to understand how the themes emerged (LoBiondo-Wood & Haber, 2010, p. 108). The author’s conceptualizations are sincere to the findings. The â€Å"Nine elements of regularly missed nursing care†¦and 7 themes relative to the reasons for missing this care†¦Ã¢â‚¬  described in Kalisch (2006) abstract is clearly defined throughout the findings section (p. 306-310). Additionally, in the discussion section the author relates the findings to the literature review (Kalisch, 2006, p. 310-311). The author discussed how other research â€Å"corroborate[d] these findings† and â€Å"many studies have pointed to the relationship between number of patients per nurse and  negative outcomes† (Kalisch, 2006, p. 311). Conclusions, Implications, and Recommendations In the implication section, the author expresses the use of her findings to change nursing practice and â€Å"decrease the problem of missed nursing care† (Kalisch, 2006, p. 312). The author continues to maintain confidence about her findings in the conclusion, â€Å"it is clear that nurses are often distracted for care†¦and should be engaged in delegation training and performance follow-up† (Kalisch, 2006, p. 312). Yet, the author declares a need for further research because â€Å"only 2 facilities† were studied and â€Å"additional studies are needed to determine the validity of these findings† (Kalisch, 2006, p. 312). The author recommends implications for nursing practice by the details to examine this phenomenon on their unit by doing â€Å"root cause and other analyses†¦to determine the causes of the problem and strategies to address them† (Kalisch, 2006, p. 312). Plus, the author gives suggestions about â€Å"development of a tool to measure missed care† and questions to answer in future research. After scrutiny of Kalisch (2006) the reader has an understanding the author used qualitative, grounded theory method to study â€Å"missed nursing care† and â€Å"staff reasons why† they were missed. However, before application of these findings the reader should conduct more research and more analyses because Kalisch (2006) findings are not conclusive. Also, the reader would have to do more literature review or even contact author if possible to gain more knowledge about her process of sampling, collection and analyses so the study can be repeated and validity of the findings can be affirmed. References Denzin, N.K., & Lincoln, Y.S. (1998). The landscape of qualitative research. Thousand Oaks, CA: Sage. Glaser, B.G., & Strauss, A.L. (1967). The discovery of grounded theory: Strategies for qualitative research. Chicago, IL: Aldine. Kalisch, B.J. (2006). Missed Nursing Care: A qualitative study. Journal of nursing care quality, 21(4), 306-13. LoBiondo-Wood, G., & Haber, J. (2014). Nursing research: Methods and critical appraisal for evidence based practice (8th ed.). St. Louis, MO: Mosby-Elsevier.

Thursday, August 29, 2019

E-marketing Plan Essay Example | Topics and Well Written Essays - 2250 words

E-marketing Plan - Essay Example The company then put together a lot of tips and tricks to help find the perfect swimsuit for their shape. The company hopes that in the future they would continue to grow and promote a healthier outlook on what beauty really is and help one find something that is right, just for them (‘Swimwear Galore-About us.’ 2014). The website also show that swimwear industry is among the most fancied industries across the globe with the players fetching fabulous returns from the sale of the leisure costumes. The swimwear market has been projected to be among the most valued enterprises in the globe in the near future as swimming is increasingly being appreciated as a healthy, leisure activity across the globe. Popularity of the activity is therefore perceived as among the most influencing factor to the glowing market awareness of the swimwear. Besides, increased innovation in fashion in the industry is contributing towards market growth and especially so to the young generation (â⠂¬ËœSwimwear Galore-About us.’ 2014). In Australia for instance, the strong sporting culture as well as beach culture has influenced much on the growth of the fashion industry especially as concerns the swimwear and such designs (Austrade, 2014). The fashion designs in Australia on the swimwear are effective in representing changes over time in customs, tastes as well as on international trends according to the website. The main brand in the industry within Australia has been and continues to be Speedo with such others as Quiksilver, Rip curl as well as Billabong companies sharing on the market segment remaining. The industry has however evolved to become very competitive with such other swimwear brands like the Wahine, AussieBum as well as Funky Trunks commanding great influence in the industry (Austrade, 2014). Swimwear galore however continues to influence trends in the

Wednesday, August 28, 2019

Organisational Behaviour Essay Example | Topics and Well Written Essays - 750 words

Organisational Behaviour - Essay Example There is always a high demand for people having good communication skills and those professionals who are young and adaptive to change. To study the demographic factors is vital for a manger as it helps him in selecting the best person for the job. In job interviews, managers are mostly looking for confident candidates and also those candidates that have good interpersonal and good communication skills. These types of employees tend to prove themselves highly valuable to the firm. The abilities and skills of a person highly influence his behaviour and performance. If your skills and abilities match the requirements of the job, you are likely to perform better. This is so because one knows the job description requirements and can perform well accordingly. The manager plays a key role when matching the job requirements with the skills and abilities of the employees. This is crucial as matching skills and abilities will allow the desired results to be achieved by the firm. Perception is a process by which sensory impressions are organised and interpreted by an individual in order to give meaning to whatever is around him. The perception of a person can be influenced by many factors. For managers it is really important to create a work environment that is favourable and that it is positively perceived by the employees. If the employees perceive it positively, it will improve their performance and overall, the firm will become productive and profitable. Attitude is the propensity to react positively or negatively towards certain things, people or circumstances. The supervisor of a company should study the factors related to employment to create a positive work environment so that workers are encouraged to form a favourable attitude towards their particular jobs. The variables such as family, society, traditions and culture, friends and organisational characteristics affect the development and attitude of the employees. The workers can perform efficiently if they for m a better attitude in the workplace. Employees also need to work upon having a good work life balance so that they can achieve their targets successfully without having pressure from anyone side of professional work or personal life. Personality is the study of the unique characteristics of an individual, the relations between these individuals and how they alter and change with respect to society and changing circumstances. The numerous dynamics that affect the personality of a person are inheritance, family, friends, society, culture and other circumstances. This shows that individuals are different when working in an organisation and their personality changes along with it. Personality can be considered as the most difficult part of an individual, and this largely affects the behaviour of a human being. Studying the personality characteristics of an individual is a good opportunity to comprehend them. It motivates them to complete the organisational goal in an efficient manner. Diverse environmental variables produce different reactions, and studying these reactions is very crucial for the organisation. By studying these responses certain types of behaviours that are demanded by organisations are discovered and learnt. Examples of these behaviours are

Tuesday, August 27, 2019

Information security in wireless local area networks Essay

Information security in wireless local area networks - Essay Example Man in the Middle (MitM) is a real information security concern for the Wireless Local Area Networks. In the MitM attack, address of the proxy server changes with any fake address and hacks the wireless network in the form of traffic tunnelling, proxy attack, DNS poisoning, and rout mangling. This paper also outlined the solution of the major information security issues through the development of the techniques and protocols. Alloy model is the core focus in this paper, which contains the written code. Execution of this code is verified whether it met the expected function. Development of these techniques and protocols is aimed to ensure the data integrity and security. C# is the core programming language for the client side and PHP programming is used for the server side. Model checking involved the testing of the written features of the application in terms of verification of the descriptions. Static analysis, deductive verification, dynamic analysis and software model checking are the best examples of technology, which use the theorem proving for the validity of verification. Information Security in Wireless Local Area Networks Summary and Conclusion Introductory chapter of thesis narrates the aims and objectives of the work, and describes the structure of the thesis. This early chapter is focused on the Wireless Local Area Networks (WLAN), which is the biggest segment in the Wireless products’ market. Wireless Local Area Networks facilitates the communication and computing in spatial domains including the enterprises, hospitals, offices and campuses. In these environments, WLAN expands and complements the coverage in the existing networks. There are three main objectives behind the information security for the wireless networks such as the data integrity, confidentiality, and availability. Data Integrity; It is ensured that no data or information has been modified. Confidentiality; It is ensured that nobody other than receiver can see or read the inf ormation. Availability; It ensures the availability of information needed at any time. The second chapter of this thesis work has been on the history and background of the study. This chapter describes the ways of the wireless detection using when data packets pass through the Network Interface Card (NIC). Managed and â€Å"rfmon† modes of data transferring through NIC are stated. The function of the Kismet has been specified when data packets pass through the NIC and saved in the file named as â€Å"pcap†. Beacon frame is most wanted for the sniffer that contains the information about sniffing operation. Data sending and receiving over the WLANs need the connection with Access Points. The requirements of the encryption protocol for the data encryption of the beacon frame are also realized in this part of the thesis. A hacker attacks the wireless network and selects a wireless channel from where it attacks the network. Hacker uses the two probing techniques such as act ive and passive. NetStumbler tools works as active probing and receives the Service Set Identifies (SSID) and host information. An active probe detects the access points in scope of hackers’ transmission. Passive Probing technique is used to drop the data packets over a channel and neither data receiver nor the data sender can detect the attacker’s presence. Surveillance is a passive technique that a hacker uses to capture the data traffic over a

Monday, August 26, 2019

Journal Responce Essay Example | Topics and Well Written Essays - 500 words

Journal Responce - Essay Example King supports the argument stating that civil disobedience is one of the main tools used by historical figures and nations to protect and justify their rights and freedom. "There is nothing new about this kind of disobedience" (p.5). Stating a thesis, King uses historical information to attract listeners attention at once. The author shows that Americans should be free from segregation and racial discrimination using direct actions, because "freedom is never voluntarily given by the oppressor" (p.3). The argument is aimed to persuade and convince its audience of the truth of his statement explaining that non-violent civil disobedience have deep historical roots and closely connected with human rights movements. King attempts to persuade listeners that all people are equal and racial discrimination is based on unjust laws which should be eliminated. King uses definitional arguments to explain just and unjust laws. He explains that segregation laws are unjust laws: "Conversely, one has a moral responsibility to disobey unjust laws. I would agree with St. Augustine that 'an unjust law is no law at all" (p.4). These arguments are crucial for the speech because they explain to unprepared listeners principles and social rules of a free society and equal rights. Definitional arguments help listeners to grasp the idea at once and inform them about legal rules and principles of social justice. It

Sunday, August 25, 2019

Defining the Word Hot Essay Example | Topics and Well Written Essays - 750 words - 6

Defining the Word Hot - Essay Example Perhaps the primary reference of the word hot is a high temperature. During the summer, weather temperatures could go as high as a hundred degrees Fahrenheit or even higher. In Dubai, it has recorded 122 degrees Fahrenheit high. This is an extremely high temperature for humans and animals so that they need to stay indoors more often and have relied on air-conditioners to lower the temperature. When people need to go out, they should have something to block them from the sun such as an umbrella and they should also carry water to quench their thirst brought about by the high temperature. Obviously, the heat of the sun is a big factor affecting this hot temperature during summer. With no clouds to block the sun, the earth’s direct exposure to it elevates the temperature and therefore makes people perspire as a result of the hotness of the atmosphere. Similarly, hot is often associated with fire which is used to cook food or to make the house warm during winter.  Secondly, the word hot can also refer to a person’s hot-headedness. This association is most probably based on the fact that an angry person has an elevated blood pressure that causes his face to become red especially with white men. When a person is angry, his heart beats faster and pumps blood more rapidly which explains the increased blood pressure. Consequently, the temperature of the man also rises like a person suffering from the fever so that, in relation to the discussion above, an angry person is called hot. The process allows more blood on the head and changes the color of one’s face. Therefore, this could also be associated with the blood. Blood and the heart are identified with the color red. Moreover, a fire which emits some reddish glow or the color of ember or glowing coal is red. Blood, heart, and anger are all interconnected and this is the reason why an angry person is also referred to as hot-tempered. The term is the opposite of the slang word â€Å"cool†.

Saturday, August 24, 2019

Piaget's theory Essay Example | Topics and Well Written Essays - 2000 words

Piaget's theory - Essay Example ntelligence was active; and that children are not passive recipients of information, rather that they actively construct and reconstruct their knowledge of the world. Cognitive disequilibrium and the child’s action and interaction with the physical environment fuel the development of the cognitive system towards more advanced psychological structures (Fisher & Lerner, 2004). This paper will evaluate Piaget’s theory of the four stages of cognitive evolution in child development. Further, similarities and differences will be identified between Erikson’s theory and Piaget’s theory of child development, with respect to the development of identity. According to Piaget’s theory, the development of intelligence and cognitive functioning in children progresses through a series of four stages based on age and concurrent biological changes and maturation. This leads to the child demonstrating a higher level of functioning at each successive stage, as compared to the previous stage (Videbeck, 2007). The stages of development are not universal, since cultural differences exist. However, the mechanisms that underlie cognitive development are considered to be universal (Pressley & McCormick, 2007). 1. The sensorimotor stage: This extends from birth to two years. The child develops a sense of self, differentiated from the environment, and develops the concept of object permanence. That is, a perception of the existence of tangible objects even when they are out of sight, that they do 3. The concrete operations stage: Between six to twelve years the child begins to apply logic to thinking, understands spatiality and reversibility, is increasingly social and able to apply rules; however, thinking is still concrete. 4. The formal operations stage: From twelve to fifteen years and beyond, the child learns to think and reason in abstract terms. Further, there is development of logical thinking and reasoning, and the achievement of cognitive maturity in the child

Friday, August 23, 2019

Gender studies and sex Essay Example | Topics and Well Written Essays - 500 words

Gender studies and sex - Essay Example Homophobia defines this situation as the ability to be unmasked and be rendered unworthy to be a real man in front of other men. Fear is also one way of identifying a real man. If you are so shameful and fearful, you may not be identified as a real man. Homophobia is almost interwoven with sexism and racism. The fear of being identified as homosexual has proved to control mens behaviors. Homosexuality was not in the American norm thus rendering them unmanly. So men tend to avoid women especially in public to avoid others from judging them. Slaves for example, were identified as dependable men thus unable to defend their women and children. Native American were also believed not to be real men. Manhood is equal to power. This is seen in various jobs in the government. Men have more jobs than women. In various institutions, men have it all. So the feminine have been left powerless. Women in various instances are complaining publicly. They have been rendered powerless by men. It seems men have really framed it wrongly since life expectancy has been lower in men than women. Males have higher mortality than females. This could be based on their psychological, social and behavioral factors. Behavioral factors include, smoking, excessive consumption of alcohol, poor diet and risk taking. There are a number of causes leading to improper health options for men. It is believed that true masculinity can be seen through mens body and therefore it could be based on provision of health. Biological determinism sees the gender distinctions as biologically based thus natural, unavoidable and unchangeable; it therefore perpetuates males power. Mans power is well enhanced and privileged through artificial understanding of masculinity and power. Traditionally, various traits of masculinity is evident and are seen to be correct and natural that men find supremacy as a demand. Hegemonic masculinity is replicated through

Thursday, August 22, 2019

International development assignment Essay Example | Topics and Well Written Essays - 1500 words

International development assignment - Essay Example The following discussion will focus on this Brazil responsible sourcing project and the first three years of project implementation. Initially, the project will be outlined, then its organization and performance will be evaluated. Finally, a concluding section will assess its impacts and effects. The Brazil Responsible Sourcing Project partners are the United States Agency for International Development (USAID), TransFair USA, Walmart Stores and local Brazilian partner Sebrae-MG. Thus, the project unites the private sector (Walmart), government agencies (USAID) and non-governmental agencies (TransFair USA). It also includes a local (Brazilian) partner, Sebrae-MG a Brazilian agency dedicated to provide, through access to new knowledge, new business opportunities for micro and small enterprises. The three-year project was initiated in 2007. In total, project partners contributed $1.9 million. Of that amount, $144,000 were infrastructure upgrade grants. (USAID, 2009) By 2008, â€Å"eleven producer families [had] used the grants to build coffee drying patios on their properties so their coffee beans could reach proper quality,† according to Coopfam president Luà ­s Adauto de Oliveira. Coopfam was one of five Brazillian cooperatives that received project infrastructure grants. (USAID, 2008) The project objective was â€Å"to help smallholder farmers increase exports of Organic and Fair Trade Certified coffee by 400% and 350% respectively.† (USAID, 2009) The concept behind the project was to provide farmers with better access to global markets, thus increasing their income. A second objective was to provide retailers in the United States with enhanced access to premium-quality coffee beans. (USAID, 2009) The most noteworthy organizational aspect of the project was the number and diversity of project partners. The local Brazilian partner agency, Sebrae-MG, specializes in organizing and coordinating interested parties in developing programs that are

Ethics in Intelligence Essay Example for Free

Ethics in Intelligence Essay On a clear, late summer day in September of 2001, the hectic yet peaceful lower portion of Manhattan, New York City was turned into the site of one of the largest mass murders in world history when terrorist attacks turned the once imposing World Trade Center complex to a smoking pile of debris and left thousands of Americans dead, physically and psychologically scarred for life. In the aftermath of this act of aggression, the United States, with the cooperation of allies around the world, launched intelligence collection efforts on a scale that had never before been seen. Some nations would be able to do so as they wished without regard for the privacy or rights of their people, but for a nation conceived in liberty and human rights as the US was, issues of ethics and the preservation of individual rights had to be balanced against the dire need to protect the masses from further violence. This research will focus on the ethics of intelligence collection in the US, Constitutional implications of these efforts for American citizens, and the consideration of how much liberty US citizens should be willing to sacrifice for the greater good. Ethics of Intel Collections, Means and Methods Intelligence gathering has always been an essential part of the preservation of American security, dating back to the days of the American colonies and beyond. In the late 1990s, for all of the violence brewing in other nations and the potential for domestic terrorism in the US, the intelligence gathering efforts of American officials consisted mostly of the analysis of data from the comfort of offices located in the US and some offices scattered across the globe. However, these efforts were initially proven to be weak by international terrorist acts against American military installations in other nations, and the original emergence of Osama Bin Laden as an international terrorist to be closely monitored. With such formidable enemies to consider, it became obvious that the old ways of gathering intelligence were badly in need of change, including the introduction of more field intelligence agents, enhancements to technology, better networking with other nations, and many clandestine activities. With the need to increase and improve all levels of intelligence gathering in the US, the question arises as to how far a nation like the US, which stands as a beacon of righteousness and safety in the world, will be willing to go to gain the level of security that is needed to protect American citizens at home and abroad? The child of this need emerged, known as the Department of Homeland Security, an organization which put on a public front of protection of the US in a manner that is illustrative of ethical behavior and forceful yet proper action. With the introduction of the Department, the public gained a higher level of confidence in the protection they would be receiving. However, many of the methods that were necessary, at least behind the scenes, were of the nature that the general public would frown upon at the very least, and rise up in heated protest against at worst if it were known the full extent of what the Department was forced to resort to in the interest of intelligence gathering. Among the steps that were taken, such actions as the monitoring of telephone and Internet communications, the detention of suspected terrorists and the like began to raise the issue of the appropriateness of such activities in line with the promises and obligations of the US Constitution. Constitutional Implications of United States Intel Collection on United States Citizens The war against terrorism is unlike any other war that the US has seen; fighting an enemy that does not wear a recognizable uniform or hails from any specific geographic location poses quite a challenge and makes the application of conventional warfare tactics all but impossible. Therefore, as with those conventional warfare methods, it is necessary for certain drastic measures to be taken. However, it is important to understand that there are Constitutional implications for such actions, especially in the areas of intelligence collection which require frequent intrusions into the privacy that Americans hold so dear and have fought and died to protect for hundreds of years. First, there are misconceptions about the Constitution that are necessary to point out. Specifically, there is a thin line between the investigation of criminal activity and suspected threats to national security, which of course are in and of themselves criminal but take on an added dimension when one realizes that the safety and future of the nation hangs in the balance. In the interest of national security, it is permissible for the surveillance of Americans, domestically and abroad without the obtaining of search warrants, which are usually the standard procedure when an American is being investigated as a possible criminal, under any ordinary circumstances. In this instance, permissible and acceptable are two entirely different things. While authorities may be allowed to basically spy on their fellow citizens so that the nation is protected, where does this leave those who are the target of the surveillance? The argument can fairly be made that if one is not doing anything wrong, if they are being monitored, they actually have nothing with which to be concerned. Further, if that surveillance yields information on other wrongdoers who are in fact a threat to America, the net result makes all of it worthwhile. The issue of habeas corpus also is a key element in the consideration of the rights the accused. In the past, this legal remedy, in place since the days of the Magna Carta, existed to protect the rights of the accused. Constitutionally speaking, it had been established in the early 1940s that habeas corpus would stand if: â€Å"(1) the conviction is void for lack o f personal or subject matter jurisdiction; (2) the statute defining the offense is unconstitutional, or the conviction was obtained in violation of a federal constitutional right; (3) the statute authorizing the sentence is unconstitutional, or the sentence was obtained in violation of a federal constitutional right; (4) the sentence is contrary to the applicable statute, in excess of the statutory maximum, or otherwise unauthorized by law; or (5) the conviction or the sentence is otherwise deemed subject to collateral attack. † In times of crisis, this right has been suspended in the interest of national security, and has been suspended in the age of terrorism due to the need to make terrorists who are evading capture by authorities accountable in courts of law for their crimes. This, also, however is one of those fine points of law that draw criticism and scrutiny in many cases because anytime a right is suspended, innocent people are affected and their rights are often sacrificed, albeit for the sake of the common good. A closer look at the underpinnings of the Constitution itself reveals some interesting powers that many do not realize exist. For example, the Constitution does in fact give Congress the right to make laws as necessary to allow the Constitution to function as it was intended. This right, however, is akin to a broad stroke of a paintbrush, when the finer details of the stroke are really where the beauty lies. In other words, on the surface, it is true that Congress possesses such power, but this is also a power that is open to interpretation and debate. Where one draws the line between permissible monitoring and the trampling of the rights of the majority is an issue with which the American people are currently wrestling and undoubtedly will continue to do so for many years to come. With this in mind, there surely must be a balance to be obtained between sacrificing for the common good and giving up everything that Americans are constitutionally guaranteed. How Much Liberty Should US Citizens Give Up Under the Notion of National Security? It has been said that liberty is something which can be gained all at once, but often is stripped away one small piece at a time, like the gradual erosion of a mighty mountain. If this is true, the question of how many small pieces the citizens of the US can give away before a landslide consumes them? After the horrible events of September 11, 2001, it became readily apparent that there was a need for American governmental agencies to gather additional power if they were to properly mount an offensive against terrorism and to avert a repeat of the horrible events of that tragic day. This need to gather additional power was viewed by many as a feeble excuse for those within the government who craved power to grab as much as they wished, regardless of the inevitable fallout. Still others saw the sacrifice of a small amount of liberty as the necessary toll that needed to be paid for a much larger amount of overall protection and the long-term survival of the US while others around the world plotted to destroy the most powerful nation on earth. Again, however, as was mentioned at the beginning of this passage, small surrenders can sometimes lead to large damage over a period of time.

Wednesday, August 21, 2019

Impact of Change Management on British Airways (BA)

Impact of Change Management on British Airways (BA) Executive Summary This report identifies the Leadership Theory and The Change Management with its impact on British Airways. It clearly outlines the external and internal factors which the new Chief Executive, Willie Walsh, has to consider in order to successfully drive the company forward. In this report different change models are explained as well as the reasons for the change. Leadership Theory: Leadership is actually a process of social influence for the accomplishment of a common task in which one person enlist the aid and support of others. Alan Keith of Genentech states that, Leadership is ultimately about creating a way for people to contribute to making something extraordinary happen. According to Ken SKC Ogbonnia, effective leadership is the ability to successfully integrate and maximize available resources within the internal and external environment for the attainment of organizational or societal goals. All above leadership definition and scholars views about leadership interpret that leadership is a unique quality which works in uniting different people on the same point and plate form to win the certain goals and objects. Different theories including power, vision and values, behaviour traits, charisma and situational interaction, intelligence were evolved by the students of leadership. For centuries the search for the characteristics of leaders has been in progress. The early detection of significance of the leadership was the basis of this search and the theory that leadership is embedded in the characteristics that few individual seize. This thought that leadership is based on individual characteristics is called Trait Theory of Leadership This view subjugated experimental and theoretical work in leadership for centuries. Between 1940-1950 reviews of these studies provoked researchers to consider different view for the definition of leadership. There are various models for the theories of leadership. MODEL 1: This model comprises of three effective styles of leadership: Authoritarian leadership style: This style gives the criteria of leadership style in which the working environment is managed by the leader using the strong directives, instructions and controlling actions by enforcing the rules. Democratic leadership style: It is very important style through which leaders take such actions which are collective, interactive and responsive. Laissez-faire leadership style: Let the things and tasks be done by the followers as they want is the essence of this style. The leaders give liberties but no guidance and framework to the followers to perform actions and accomplish the task themselves. MODEL 2: This model bears the great characteristics, the task versus interpersonal. INTEPERSONAL -ORIENTED STYLE OF LEADERSHIP: According to Clark, Donald, 2005, there are certain characteristics of this style of leadership. It offers the style of leadership that gives the opportunity to the leaders to ask the followers for opinions and suggestions and motivate the followers. The leaders give much priority to the thoughts, ideas, and the feelings of the followers. In this style the leaders give liberties of free communications. They have good listening skills and not much oral communication TASK- ORIENTED STYLE OF LEADERSHIP: According to YUKL.G, 2002, the task oriented style of leadership has certain characteristics: In this style, the leaders distribute information. The leaders do not pay attention to the ideas, thoughts and the feelings of others. The rigid sort of communication is exercised. Related to performance, the demands are made by the leaders. In this style written communication works. Model 3: There are four important theories of leadership in this model that are acted upon by any organization to update the business and for extensive management decisions. Michigan leadership studies. Ohio state leadership. McGregors theory X Y Blake and Macaneses leadership study. Importance of leadership skills in 21st Century The leaders of the 21st century are finding it hard to manage the progressively more multi faceted and constantly fast paced nature of the businesses. Engrossed in the unpredictable markets, leadership failures continue to rise even among highly eminent CEOs. Leaders have always developed their skills through, training courses, seminars and coaching-and attaining 21st century leadership skills are no different. In business management, leadership plays a successful role in identifying strengths and weaknesses of an organization and utilize them efficiently to accomplish the goals and objectives set by the organization. Other than decision making, leader has to encourage and lead his team on the road to success. 21st century leaders have many roles to perform due to changing trends in markets, cajole organizations, numerous stakeholders and splited job where they persistently face tradeoffs in focus, energy and time. With a new set of leadership qualities a blended 21st century leadership style is rising: Their leadership style matching to a complex, fast-moving technology based business Skilled in oral communication is a key element of good customer service Articulating a convincing future vision Guiding different groups of people to deliver business goals Cutting unnecessary overheads today while building for tomorrow. Bringing new perspectives and confronts threats without being overloaded Searching for new solutions outside conventional areas Open-minded and inquisitive about their environment To take advantage of new market opportunities organizes the company Works across boundaries and view business as a networks for communities To maximise sustainable growth uses partnerships and collaboration Have the ability to identify and define problems, invent and implement solutions, and trail and assess results. Another key to success is good personal management, self motivation, and career development skills are critical. Irrespective of whether a company is running with ten people or with ten departments the importance of leadership is obligatory. These leadership skills play a vital role in increasing the competence of the available resources and achieving the set goals of an organization. Organizational Change Management: Change management is defined as, to prepare, commence, recognize, organize, and stabilize change processes on both, corporate and personal level There are two types of changes: 1. Organizational Change: It is more steady and evolutionary approach and is based on the hypothesis that it is possible to ally company objectives with the individual employees objectives. This is rarely possible in actual practice 2. Reengineering Change: Known as business transformation or corporate transformation. It is the more fundamental form of change management, since it challenges all elements of processes or structures that have evolved over time. CHANGE MODEL: Bechard and Lewin introduced the most famous and important change model in 1951 and 1969. In 1980 Quinn and Lewian further explained this task. LEWIN: According to Lewin 1951, the introductory methods to manage the change are as follows: Unfreezing, existing attitudes are supported by the change in the present equilibrium. New responses can be developed according to new information. Refreezing, by introducing new responses in the personality concerns, can stabilize the change. THE FIELD FORCE ANALYSIS is the only methodology observes change suggested by Lewin that involves: The transition to the future state is affected analysing the driving forces. The differentiation between driving and restraining forces is necessary. Measures should be taken to give rise to critical driving forces and diminish critical restraining force (Martin, 2006). In order to conclude the need and capability of Organizational change management should begin with the identification of the current circumstances, deep understanding about leadership skills, group dynamics, and creative marketing. RESISTANCE TO CHANGE: May be external or internal. EXTERNEL: External resistance defiantly affects the process of change. The cultural, social and political environment all resist to change. Effective Communications with various stakeholders explaining them the reasons for the change (why?), the benefits of successful implementation (what is in it for us, and you) as well as the details of the change (when? where? who is involved? how much will it cost? etc). INTERNEL: At the time of implementation of change, organization can face some resistances to change internally from the workers like: Lack of knowledge Deficiencies in training Fears to lose something. Absence of trust. Communication problems. Normally, people perceive change processes in seven typical stages. Introduction: This report reviews the understanding of the concept of Organizational Change and its long term effect on the organization with regard to changes brought in British Airways British Airways is the fourth largest and one of the fastest growing airlines in the world. Leadership qualities and its unique culture helped in the growth of the company. Chief executive Bob Ayling, brought changes in the company without its employees support. At the time when BA was making record profit he thought change was necessary as some long term decision were to be made. He brought the change by outsourcing departments like engineering, information technology and maintenance to developing countries and by raising the morale of the staff by introducing training programmes and establishing hotel for the staff at Heathrow airport. Our aim is to be benefiting the customers, employees and shareholders, and to fulfil our commitments to the society. (http://www.guardian.co.uk). Background of British Airways British Airways aims in bringing people together by taking them wherever they want to go. This apply not only to the 36 million passengers that travel with them but also to their employees.Inspite of having challenges over the past few years the company is very competitive travel industry. They believe that they have firm strategy which keeps them moving forward. Based in London at Heathrow Airport British Airways PLC is the leading intercontinental airline in the world. Being UKs sole network carrier globally it serves 95 million people a year approximately to 550 destinations in 97 countries using about 1000 planes and 441 airports. British Airways feels proud in providing full range of services to their customers whether they are in air or on ground. British Airways A Snap shot 1916: Establishment of Predecessor Aircraft Transport Travel Ltd. 1919:Worlds first scheduled international air service was inaugurated 1933: Establishment of service to India and Singapore. 1935: The merger of three smaller airline companies forms the basis of British Airways. 1939: British Overseas Airways Corporation (BOAC) was formed by the union of British Airways and Imperial Airways and also nationalized. 1949: BOAC imbibe British South American Airways (BSAA) 1958: Successful completion of first jet trans-Atlantic service. 1962: Supersonic transport (SST) is build by BOAC and Air France agreement to commit funds. 1967: Second around-the-world route is established by BOAC. 1974:Company is restructured under the British Airways name 1976: The first SST Concordes service was inaugurated simultaneously by British Airways and Air France. 1987: Privatization of British Airways. 1987: British Airways buys British Caledonian (BCal). 1988: Marketing alliance of British Airways with United Airlines that two years later collapses. 1992:44 % of USAir Inc is purchases by British Airways. 1998: Between British Airways, Cathay Pacific, Canadian Airlines, Qantas and American Airlines One world global alliance is launched -a group that grows to eight members. 2000: Opening of British Airways London Eye observation wheel; in its first year of operation 3 million people ride the wheel. 2006 and 2007 award of the year for SKYTRAX and OAG airline. 2007 award of best airline based in Western Europe. 2007 best trans-Atlantic airline award. 14-03-2008 at a cost of 403 billion pound Heathrow terminal 5 was opened to be used exclusively by BA. Additional Details Public Company Frequent Flyer Programme :Executive Club Premier (Invitation) Key People :Willie Walsh (CEO) Tense Relationships :Virgin Atlantic, Formed 1984 Employees: 65,157 Sales: Â £9.278 billion (US $13.151 billion) (2001) Stock Exchanges: London New York Frankfurt Munich Ticker Symbol: BAY (London); BAB (New York) NAIC: 481111 Scheduled Passenger Air Transportation; 481112 Scheduled Freight Air Transportation; 56152 Tour Operators Changes in British Airways: To improve the future of the organization and reputation against the competitors British Airways chairman and board of directors decided to downsize the organization. The changes were totally revolutionary and dominantly strategic. Vast resistance was faced by British airways from department of labour and development, local and environmental NGO and unions both internally and externally against these changes. As BA marketing value changed at 15% due to fierce competition with other international airlines they had huge pressure to bring this change. The change started in 2005 by changing its top management and appointing Willie Wash as CEO. The main focus to change is followed: Reduction in cabin crew Internal and external change. Financial losses. Drop in profit. Increased Competition. Loss of Market Share. Technological Development. Cultural change. Vision of change The vision of British Airways is One Destination seeks to ensure our customers fly confident that, together, we are acting responsibly to take care of the world we live in. Mission to change In its words: British Airways is aiming to set new industry standards in customer service and innovation, deliver the best financial performance and evolve from being an airline to a world travel business with the flexibility to stretch its brand in new business areas. (http://www.britishairways.com) Objectives of change To face the global economic and market environment give new ideas and innovation to the individuals so that they are competitive. Changing internal and external culture of the organization Offer good services to the passengers Introduction of the continental food. According to market conditions introduction of new technology and packaging. To have profound effect on the character and personality of the BA individuals give them comprehensive knowledge of managerial and technological skills. To increase the productivity of the units fabricate leadership qualities in individuals. Creating a positive and dynamic learning environment to bring a paradigm shift. The hub for the introduction of MBA programme by BA was that the knowledge and training should be thoroughly applied within the organization and future growth and development of the employees should be related to this training. Strengthens of Change in British Airways: Before change a clear and set objectives are there. Specific issues and problems were focused in planning and involvement. Before introduction of new technology collection of data and marketing survey was done. Every employee got incentive in the shape of Golden handshake and transfer in other units by downsizing strategy. According to market demand introduction of new technology. Weaknesses of Change in British Airways Identification of the problems that were surfacing in the organization. In some areas lack of policy direction. Need of cross functional communication Long distance between communication chain like the decision-making unit and the primary sources of information. Senior executives were over worked Power structure was weak. Top management was difficult to reach. Decentralized structure Lack of sufficient training. SWOT Analysis: Strengths: Well-established brand name British Airways gained loyalty and trust from the customers. With strong international alliances BA has a global geographic exposure with excellent communication. BA took full advantage of technological development through innovative culture e.g. online sales, drive thru check in. Purchase of the new fleet and the appropriate aircrafts to make travelling comfortable for the passengers gave BA advantage over their competitors. Weaknesses Soaring debts are still BA main concern. Events like 2001 Iraq war and 2005 terrorist attacks had negative effect on BA due to its reliance on the international air travel and this threat still persists. Job cuts may have negative effect on the BA as previous experience with the cost -cutting exercise resulted in understaffing and 2004-2005 industrial actions. Exposure of the rule that adult male passenger cannot sit next to the child led to sex discrimination allegation against BA. Unions threatening to go on strike against downsizing. BA was declared by AEA as the worst airline for lost and delayed baggage due to clogging of belt carrying bags and malfunction of baggage handling system. Worst airline for the arrival and departures of the short and medium haul flights. In 2007 Heathrow as voted worlds least favourable airport as it being overcrowded and subject to delay. Shortage of the staff car park space due to non availability of space Delays in getting to work due to long queues for security check up. Opportunities BAs online customer base expanded further by the growth of internet worldwide. As customers expectations are raising value added and innovative flight services will attract more customers. Opening in 2020 of a third short runway and sixth terminal will benefit BA and make Heathrow a global gateway. Threats BA market share is under threat from the low cost airlines which continuously enjoy strong growth and power in the market. Fluctuations and continuing growth of the fuel prices pose another threat to BA. Customers are still vigilant of the threat of repeated terrorist attacks. More companies are focusing on high quality in their strategy plan which increases competition in low cost airline market. Conclusion: Organizations decision making both informing and enabling strategic direction should be fully incorporated in the Change management approach. Organizations history, readiness, and capacity to change forms the realistic review for the management change. British Airways is one of the leading international airlines in the world. The organizational Change brought by the British Airways were effective not only in introducing modern technology but also improved the performance of the airline. To defeat the competitors BA introduced different options for its customers and tried to stabilize its position in the airline market. By encouraging its employees through different incentives tried to improve their skills and knowledge which is beneficial not only for them but also for the organization.

Tuesday, August 20, 2019

Advantages And Disadvantages Of Star Topology Computer Science Essay

Advantages And Disadvantages Of Star Topology Computer Science Essay Many home networks use the star topology. A star network features a central connection point called a hub that may be a hub, switch or router. Devices typically connect to the hub with Unshielded Twisted Pair (UTP) Ethernet. Compared to the bus topology, a star network generally requires more cable, but a failure in any star network cable will only take down one computers network access and not the entire LAN. (If the hub fails, however, the entire network also fails.) Star Topology is the most common type of network topology that is used in homes and offices. In the Star Topology there is a central connection point called the hub which is a computer hub or sometimes just a switch. In a Star Network the best advantage is when there is a failure in cable then only one computer might get affected and not the entire network. In a Star Network the entire network is dependant on the hub so if the entire network is not working then there could be a problem with the hub. This feature makes it easy to troubleshoot by offering a single point for error connection ad at the same time the dependency is also very high on that single point. Star Topology Advantages à ¢Ã¢â€š ¬Ã‚ ¢ A Star Network Topology is very easy to manage because of its simplicity in functionality. à ¢Ã¢â€š ¬Ã‚ ¢ The problems can be easily located logically in a Star Topology and therefore is easy to troubleshoot also. à ¢Ã¢â€š ¬Ã‚ ¢ The Star Topology is very simple in format so it is very easy to expand on the Star Topology. Star Topology Disadvantages à ¢Ã¢â€š ¬Ã‚ ¢ The Star Topology is fully dependant on the hub and the entire working of the network depends on the hub or the switch. à ¢Ã¢â€š ¬Ã‚ ¢ If there are many nodes and the cable is long then the network may slow down. Since all the computers on the network have independent control of their networks and only dependant on the central hub computer, the failures in transmission and other possible problems in this area are less likely. Also if the hub is safe then every computer in the network is safe. This type of network also offers more privacy than any other network. All the computers in the network are communicating with one main centrally located computer and there is no peer to peer coordination. If the peer to peer coordination takes place it is routed through the central hub. This way the privacy of each and every computer on the network is maintained. b). UTP Cable Advantage: 1. The main advantage of cable lan is that it is capable of transmitting data at very high speed rates : even much faster to that data that can be transmitted over telephone. 2.It is cost effective as no excess hardware is required. 3. It is secure way of communication as no external virus interrupt. 4. It is stable as it show irs effect in smaller area. Disadvantage: 1.The Disadvantages to a twised pair cable (AKA A Cross Over Cable): 2.It will require direct p2p (peer to peer) connections , e.g. straight from one computer to another (Mostly Via Ethernet or Com) 3.It will be incompatiable if talking to more then 1 computer by going throught a switch or hub. 4.Cross Over Cables should only be used when one computer needs to talk to another one right next to it, or if you are connecting to a router (via the console port) to configure it. Wireless advantages and disadvantages One of the major problems that presents itself is the already limited spectrum available for communications. The remaining free spectrum has to be used to its maximum potential, spread spectrum technology presenting itself as a suitable means of increasing performance. Splitting up of the environment into a number of small cells also increases the overall accessible bandwidth of the communication system, but also increases the cost as more cell sites are required. Techniques such as diversity combining can also be used to increase the available bandwidth through improved reception capabilities. Where a large number of devices, each being of a low power, are transmitting, a sizable amount of radio power is being generated. The effects of radio communication on human health are being examined , however much more work is required in this area before large scale communication systems are developed. The unconstrained nature of the communication medium of radio requires the issue of network security to be addressed. Verification of communication entities must also be performed to ensure that only registered devices may communicate using the network, and that only registered devices may receive the data. c). Reason for why I choose star topology: à ¢Ã¢â€š ¬Ã‚ ¢ A Star Network Topology is very easy to manage because of its simplicity in functionality. à ¢Ã¢â€š ¬Ã‚ ¢ The problems can be easily located logically in a Star Topology and therefore is easy to troubleshoot also. à ¢Ã¢â€š ¬Ã‚ ¢ The Star Topology is very simple in format so it is very easy to expand on the Star Topology. Task-02 a). The Internet is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by a broad array of electronic and optical networking technologies. The Internet carries a vast range of information resources and services, such as the inter-linked hypertext documents of the World Wide Web (WWW) and the infrastructure to support electronic mail. Most traditional communications media including telephone, music, film, and television are being reshaped or redefined by the Internet. Newspaper, book and other print publishing are having to adapt to Web sites and blogging. The Internet has enabled or accelerated new forms of human interactions through instant messaging, Internet forums, and social networking. Online shopping has boomed both for major retail outlets and small artisans and traders. Business-to-business and financial services on the Internet affect supply chains across entire industries. b). Banglalion starts the shopping mall activation. you can know about Banglalion WiMAX enjoy our subscription at your nearest shopping Mall. following is the activation Calender. Shopping Mall Date Dhaka Pink City, Gulshan 5 June, 2010 Anam Rangs Plaza, Dhanmondi 11 June, 2010 Shah Ali Market, Mirpur 12 June, 2010 North Tower, Uttara 18 June, 2010 Eastern Plaza, Hatirpool 19 June, 2010 Multiplan Center, Elephant Road 25 June, 2010 Concord Twin Towers (Shantinagar) 26 June, 2010 Metro Shopping Mall 2 July, Qubee is a new and exciting company from Augere providing fast and reliable broadband internet services to residential and business customers across Bangladesh. We believe that everyone should be able to enjoy trouble-free access to the internet and the world of opportunities that it brings. Our aim is to make a magical internet experience available to everyone, everyday, without exception. Qubee is the creation of a group of global telecoms professionals who saw that a new technology called WiMAX could really change the internet experience for millions of people worldwide. WiMAX means that you dont need telephone lines or cable to get connected: all you need is to live close enough to a transmitter to receive the internet wirelessly. As you read, were busy building a network of base stations to offer our brand of internet access right across Bangladesh. Were starting in Dhaka, but quickly plan to do the same in cities nationwide. c). Bangla Lion Advanced Data Network (ADN) Qubee d). Qubee introduces range of new packages to suit your monthly need. Be it speed, volume; Qubee has the solution which is fast and reliable. Now you can enjoy the fast and reliable 512 kbps speed @ Tk 1250. Enjoy Skype, streaming YouTube, download and browse your Facebook profile faster. Qubee offers 5 GB, 10 GB and Sky solution for all three speeds. Whether you use email, Skype, connect through social network, browse information, listen to internet radio, and download movies or songs: you can choose the volumes according to your need. Monthly Usage Allowance* Speed 5GB 10GB Sky ** 256 Kbps BDT 850 BDT 950 BDT 1,250 512 Kbps BDT 1,250 BDT 1,450 BDT 2,250 1Mbps BDT 2,250 BDT 2,750 BDT 5,250 *Additional charge of BDT 0.15/MB beyond Usage Allowance is applicable in all packages except Sky. BDT figures in above table indicate monthly fee. Task-03 a). Frequencies: A recent innovation in assessing community vitamin A status is the Helen Keller International food-frequency method, which is based on weekly intakes of key foods among pre-school children. Since it excludes breastmilk, we investigated whether the amount of breastmilk received by 40 children aged one to three years in a rural area of Bangladesh contributed significantly to their vitamin A intake. Vitamin A intake was indirectly calculated from the consumption of breastmilk, which was quantified over a 9-hour period by a test-weighing technique. The estimated mean 24-hour milk intake was 548 g for the 97% who were breastfed at 12 to 23 months and 312 g for the 73% who were breastfed at 24 to 36 months. This represents an average daily intake of 41% and 23% of the safe recommended daily intake (400 RE) for vitamin A, respectively. The Helen Keller International food-frequency method should be revalidated for settings where breastfeeding is sustained beyond infancy. The Helen Keller International food-frequency method approach has certain advantages. The Helen Keller International food-frequency method has been validated against serum retinol in three countries: the Philippines, Guatemala, and Tanzania [16]. However, the majority of vitamin A deficiency is located in South Asia, where such studies have not yet been conducted. At the same time, the tradition of sustaining breastfeeding beyond the first year is stronger in this region than anywhere else in the world. In Bangladesh, for example, the 1996-1997 Demographic and Health Survey found that the mean duration of any breastfeeding was 28 months, based on current status data for children less than three years of age [17], and the median was 36 months. This is comparable to the mean of 27 months reported in 1975-1976 [181, suggesting that no decline in duration has occurred since then. Half Duplex: A duplex communication system is a system composed of two connected parties or devices that can communicate with one another in both directions. (The term multiplexing is used when describing communication between more than two parties or devices.) Duplex systems are employed in many communications networks, either to allow for a communication two-way street between two connected parties or to provide a reverse path for the monitoring and remote adjustment of equipment in the field. Systems that do not need the duplex capability include broadcast systems, where one station transmits and the others just listen, and in some missile guidance systems, where the launcher needs only to command the missile where to go, and the launcher does not need to receive any information from the missile. Also, there are spacecraft such as satellites and space probes that have lost their capability to receive any commands, but they can continue to transmit radio signals through their antennas. Some early satellites (such as Sputnik 1) were designed as transmit-only spacecraft. Pioneer 6 has transmitted for decades without being able to receive anything. Full Duplex: A full-duplex, or sometimes double-duplex system, allows communication in both directions, and, unlike half-duplex, allows this to happen simultaneously. Land-line telephone networks are full-duplex, since they allow both callers to speak and be heard at the same time. A good analogy for a full-duplex system would be a two-lane road with one lane for each direction. Examples: Telephone, Mobile Phone, etc. Two-way radios can be, for instance, designed as full-duplex systems, which transmit on one frequency and receive on a different frequency. This is also called frequency-division duplex. b). This Site and our business change constantly. As a result, at times it may be necessary for BD to make changes to this Privacy Statement and Consent. BD reserves the right to update or modify this Privacy Statement and Consent at any time and from time to time without prior notice. Please review this Statement periodically, and especially before you provide any Personal Data. This Privacy Statement and Consent was last updated on August 1, 2002. Your continued use of the Site after any changes or revisions to this Privacy Statement and Consent shall indicate your agreement with the terms of such revised Privacy Statement and Consent. User Data includes all information passively collected from users of the Site that does not identify a particular individual, including, by way of example, statistical information on Site usage.The terms you, your and yours when used in this Privacy Statement and Consent means any user of this Site. Information That You Give Us: We collect Personal Data such as your name, date of birth, e-mail or mailing address from you when you voluntarily choose to register for or use certain BD Services at this Site. We use the Personal Data that we collect in an effort to provide you with a superior customer experience on the Site and to improve and market BD Services. BD may store such Personal Data itself or it may be stored in databases owned and maintained by BDs affiliates, agents or service providers. BD retains its rights to these databases and the information contained in them. If you register with BD or use certain other of the personalized options we offer, we will create a profile that includes your name, mailing address, e-mail address, and other information that you provide that is pertinent to your specific situation. We may combine such information with data gathered from other sources. For instance, if incorrect postal codes are received, we may use third party software to correct them. We also may collect e-mail or other addresses from prospect lists of other companies, for example, in connection with a joint marketing effort. When we do so, (1) we acknowledge in our correspondence how the recipient was added to our list and (2) we provide a means for recipients to opt out of further communications from us. In addition we may ask you for Personal Data if you enter an educational program, contest or promotion sponsored by BD. c). The Microsoft Volume Licensing program agreements are refreshed annually. This years changes, effective October 1, 2010, will help clarify language, bring alignment among Volume Licensing agreements, and implement significant program enhancements that will help simplify licensing and improve the customer and partner experience. Your existing agreement remains unchanged, as the changes apply to agreements signed after October 1, 2010 (December 1, 2010 for all Select Plus for Academic, Select License for Academic, and Open Program agreements). No action is required until your agreement renewal. See your Microsoft reseller for additional information on the program updates. d). UTP Cable Limitation 1.The Disadvantages to a twised pair cable (AKA A Cross Over Cable): 2.It will require direct p2p (peer to peer) connections , e.g. straight from one computer to another (Mostly Via Ethernet or Com) 3.It will be incompatiable if talking to more then 1 computer by going throught a switch or hub. 4.Cross Over Cables should only be used when one computer needs to talk to another one right next to it, or if you are connecting to a router (via the console port) to configure it. Wireless Limitation: One of the major problems that presents itself is the already limited spectrum available for communications. The remaining free spectrum has to be used to its maximum potential, spread spectrum technology presenting itself as a suitable means of increasing performance. Splitting up of the environment into a number of small cells also increases the overall accessible bandwidth of the communication system, but also increases the cost as more cell sites are required. Techniques such as diversity combining can also be used to increase the available bandwidth through improved reception capabilities. e). Ever notice how you can speak to a dog in a happy, sing-song tone, but tell them something horrible, and they will still be really happy youre talking with them?   Tone of voice is often more important in communication than we realize. The way we send the message is often just as important as the content of the message itself, even to those of us with opposable thumbs and the ability to understand more than a few words of language. When training animals, consistency is key. Similarly, in order to train ones customers about ones brand, a company needs to have a consistent message to all customers in every interaction with every part of the business. Dealing with a company that is always changing its look, sound, and values can be confusing. If part of a businesss marketing materials are very serious, and part of it is surfer talk or chatty girl-talk, it can create accessibility problems for current and potential patrons and partners. How can you trust the company, or trust that it knows who it is and what it is doing, if it doesnt have a consistent message? The tone of voice should communicate your brands values and qualities. A company needs to decide not only the message it wants to get across, but the best way to deliver that message. Task-04 a). A good portion of this web site is devoted to mapping locations and the identification of cellular transmission equipment across Canada. This includes the maps for Victoria, Vancouver, Nanaimo, Kelowna, Whistler, Windsor, Halifax, plus new maps planned for the near future (e.g., Edmonton and Calgary) as well as the Cellular Equipment Identification Guide. Although I show each wireless providers locations on these maps, I do not mention the steps that each of the wireless providers took to establish their network in each of these locations. This article deals with why a wireless service provider would set up a wireless network in a particular market and the steps required to setup a new network. b). If youve looked into setting up, or have set up a home office, or a small business, youre probably aware of how far technology has come in terms of whats available to the average consumer. What used to take up a whole room can now fit neatly under a desk. You can have a multi-server wireless network with a handful of workstations and all the bells and whistles. But is this right for you? Maybe not, but a wireless network may be the key to making your Workplace more efficient. c). Wireless networks, also known as Wireless LANs (WLANs), allow for wireless communication between computers and the Internet without the need for cables between the networked devices. Simple wireless networks can be set up for the home or small office using ones existing Internet access. Typically, a person who is familiar with setting up a computer can install a home wireless network in about an hour by following the guides and manuals.   Typical costs: Wi-Fi technologies conform to several wireless standards that allow the network devices to communicate and interact with one another. There are currently four wireless standards: 802.11a, 802.11b, 802.11g and 802.11n. Every wireless networking device will list what standards it follows on the box. 802.11g and 802.11n are the prevalent wireless technologies, though most routers still support older standards. Wireless-G (802.11g) broadband routers typically cost less than the newer and faster Wireless-N (802.11g) ones. These 802.11g routers range from $40 to $60. The Linksys WRT54G2 Wireless-G Broadband Router is well-reviewed option in this price range. Wireless-N broadband routers cost more and offers the fastest speed and longest range. These routers cost anywhere from $70 to $170 depending on what features and capabilities get implemented. The D-Link DIR-655 Extreme N Wireless Router at $90 is good choice. The higher priced Netgear Rangemax WNDR3700 Dual Band Wireless-N Gigabit Router at $160 offers twice the bandwidth using Netgears RangeMax technology. What should be included: The wireless broadband router and a network cable to connect to your home internet cable or DSL modem. User manuals and quick start guides to help install and set up the router for the wireless network. Additional costs: In order for ones computer or laptop to communicate to the newly set up wireless network, network adapters such as wireless USB adapters, PCI cards or laptop PC adapters may also be needed. Most newer laptop and notebook computers already have built-in wireless capabilities. Discounts: TIP: Sometimes bundles will be offered at a better price and these often include a wireless router and a USB adapter to be used on a computer. TIP: Many of the networking companies also provide some online or telephone support if there are installation issues, thus saving on any outside professional servicing costs. Shopping for a wireless network: The companies Linksys by Cisco, D-Link, Netgear and Belkin are major manufacturers of wireless routers and adapters. Store retailers such as OfficeMax, Best Buy, Staples, and Office Depot all sell wireless networking equipment. Online retailers such as Amazon.com, Newegg.com and CompUSA also sell wireless computer components. TIP: All of the various networking companies also offer their products for sale on their websites. However, the prices there are often not as discounted as what one would find either in a store or from online retailers. d). Almost as important as properly sizing hvac equipment, is the estimation of annual heating and cooling costs. Most prospective hvac system buyers dont really care what size of a unit they need, they only care about costs, both initial and annual operating costs. To remain competitive, todays hvac contractor must be able to present a credible analysis showing the probable operating cost of a proposed system. A quick, ballpark estimate of operating costs can now be obtained for standard air conditioners and heat pumps listed in the directory published by the American Refrigeration Institute (ARI). In an attempt to compare all models on an equal basis, the ARI directory shows an average national operating cost for each unit listed. As expected, units with low estimated cooling costs also have high SEER (Seasonal Energy Efficiency Ratios) values. And heat pumps with low heating costs have high HSPF (Heating Seasonal Performance Factors) values .Using the guidelines given above, an have a contractor should be able to find a number of operating cost programs that can greatly aid equipment sales. The biggest difference a contractor can look forward to is the situation where a customer is facing the decision to repair an old, inefficient unit or buy a new, high efficiency model. . Task-05 Mobile Technology For the place where no electrical power and fixed telephone line: Here you will learn about mobile technologies, mobile phones, wireless communication introduction, overview to gsm, gprs, sms and mms reviews. A cellular or mobile phone is a long range portable electronic device for communication over long distance. Current Mobile Phones can support many latest services such as SMS, GPRS, MMS, email, packet switching, WAP, Bluetooth and many more. Most of the mobile phones connect to the cellular networks and which are further connected with the PSTN (Public switching telephone network). Besides mobile communications, there is a wide range of mobile products available such mobile scanners, mobile printers and mobile labelers. Mobile Network Technology Mobile phones and their network vary very significantly from provider to provider and country to country. However the basic communication method of all of them is through the electromagnetic microwaves with a cell base station. The cellular companies have large antennas, which are usually mounted over towers, buildings and poles. The cell phones have low-power transceivers that transmit voice and data to the nearest sites usually within the 5 to 8 miles (8 to 13 kilometers away). When a mobile device or phone is turned on, it registers with the mobile telephone exchange or switch. It is a unique identifier and is alerted by the mobile switch when there is an incoming phone call. The handset listens for the strong signals from the nearest base stations. When a user moves, the mobile device handoff to various nearest sites during phone calls or while waiting between calls it reselect the nearest cell phone sites. Cell sites have relatively less power radio transmitters. They broadcast their presence and relay communications between the mobile handsets and the switch. On the other hand, the switch connects the call to the same or another mobile network or subscriber. The dialogue between the mobile phone handset and the cell phone site is a stream of the digital data, which includes the digitized audio. This technology depends on the same system as of mobile phone operator. Some mobile phone technologies have adopted the AMPS for the analog communication and D-AMPS, CDMA2000, EVDO, GSM, UMTS, and GPRS for the digital communication. Each mobile phone network has a unique radio . Task-06 In Task-01 I will try to describe the star topology, advantage and disadvantage of star topology, advantage and disadvantage of medium and why I should like star topology. Star networks are one of the most common computer network topologies. In its simplest form, a star network consists of one central switch, hub or computer, which acts as a conduit to transmit messages.[1] Thus, the hub and leaf nodes, and the transmission lines between them, form a graph with the topology of a star. If the central node is passive, the originating node must be able to tolerate the reception of an echo of its own transmission, delayed by the two-way transmission time (i.e. to and from the central node) plus any delay generated in the central node. An active star network has an active central node that usually has the means to prevent echo-related problems. The star topology reduces the chance of network failure by connecting all of the systems to a central node. When applied to a bus-based network, this central hub rebroadcasts all transmissions received from any peripheral node to all peripheral nodes on the network, sometimes including the originating node. All peripheral nodes may thus communicate with all others by transmitting to, and receiving from, the central node only. The failure of a transmission line linking any peripheral node to the central node will result in the isolation of that peripheral node from all others, but the rest of the systems will be unaffected. Advantages Better performance: star topology prevents the passing of data packets through an excessive number of nodes. At most, 3 devices and 2 links are involved in any communication between any two devices. Although this topology places a huge overhead on the central hub, with adequate capacity, the hub can handle very high utilization by one device without affecting others. Isolation of devices: Each device is inherently isolated by the link that connects it to the hub. This makes the isolation of individual devices straightforward and amounts to disconnecting each device from the others. This isolation also prevents any non-centralized failure from affecting the network. Benefits from centralization: As the central hub is the bottleneck, increasing its capacity, or connecting additional devices to it, increases the size of the network very easily. Centralization also allows the inspection of traffic through the network. This facilitates analysis of the traffic and detection of suspicious behavior. Simplicity: This topology is easy to understand, establish, and navigate. Its simplicity obviates the need for complex routing or message passing protocols. Also, as noted earlier, the isolation and centralization it allows simplify fault detection, as each link or device can be probed individually. Easy to install and wire. Easy to detect faults and to remove parts. No disruptions to the network when connecting or removing devices. Disadvantages High dependence of the system on the functioning of the central hub Failure of the central hub renders the network inoperable The performance and scalability of the network depends on the capabilities of the hub Network size is limited by the number of connections that can be made to the hub Other nodes may see a performance drop if traffic to another node occupies a significant portion of the central nodes processing capability or throughput. Wiring up of the system can be very complex and expensive. In Task-02 I will try to describe the service for the new system and also Internet connection speed and the requirements of ISP. An Internet service provider (ISP), also sometimes referred to as an Internet access provider (IAP), is a company that offers its customers access to the Internet.[1] The ISP connects to its customers using a data transmission technology appropriate for delivering Internet Protocol packets or frames, such as dial-up, DSL, cable modem, wireless or dedicated high-speed interconnects. ISPs may provide Internet e-mail accounts to users which allow them to communicate with one another by sending and receiving electronic messages through their ISPs servers. ISPs may provide services such as remotely storing data files on behalf of their customers, as well as other services unique to each particular ISP. End-user-to-ISP connection ISPs employ a range of technologies to enable consumers to connect to their network. For users and small businesses, the most popular options include dial-up, DSL (typically Asymmetric Digital Subscriber Line, ADSL), broadband wireless, cable modem, fiber to the premises (FTTH), and Integrated Services Digital Network (ISDN) (typically basic rate interface). For customers with more demanding requirements, such as medium-to-large businesses, or other ISPs, DSL (often SHDSL or ADSL), Ethernet, Metro Ethernet, Gigabit Ethernet, Frame Relay, ISDN (BRI or PRI), ATM, satellite Internet access and synchronous optical networking (SONET) are more likely to be used. In Task-03 I will try to describe how each method works legal requirements of my country to operating the new system, cost estimate for operating and install the system, Limitation of the method and how voice communication established. Operating systems Quick links Operating System ABCs Operating System types Operating System overviews Troubleshooting

Monday, August 19, 2019

Boy Talk :: Example Personal Narratives

Boy Talk We keep tally marks (with parenthetical comments) in my little black book. When we score, we call them glory points. We conceived the idea on a Friday night of meandering around coffee shops, discussing the book Catcher in the Rye. I convinced my friend Michael that Catcher in the Rye satires pathetically alienated teens and mocks the protagonist as much as anyone else - and thus bore our tradition. We score glory points by convincing the other that he is wrong; my little black book is the memo pad I use for keeping phone numbers, homework assignments, other assorted notes, and of course, glory points. At the moment, I am beating Michael five to four in the "glory game." Michael actually gave me the book "Catcher in the Rye" to read somewhere near the end of my freshman year, at the time when I had very few friends because I had just changed schools. He, also being an alienated youth, began to talk to me about phonies and other Holden Caufieldesque things. To this day, he brags about how he drove me into a "three month depression." From the philosophy of Holden Caufield, we have since progressed to arguing philosophy and politics. Prior to discussing phonies, Michael and I had never gotten far beyond the surface-levels of conversation. That kind of relationship wasn't unusual for me - virtually every relationship I had was as shallow as a kiddie pool. In fact, discussing phonies was a breakthrough for me, if only because we exchanged some semblance of ideas about personal psychology. Michael and I thoroughly agreed: "Everybody in the world is a phony - except me." (We never did figure our if the "everybody" included the other person.) During the summer between my freshman and sophomore years, I began to miss people - no one person in particular, just those mystical creatures that I missed walking down the street while I spent three or four days inside reading and watching television. I made something of a commitment to myself to actually befriend more than the handful of people I talked to over that summer. I committed myself to making close friends whom I could talk to about personal problems. Friends, ironically, like Michael. Michael and I moved to this topic near the end of that summer, at a time when he was in the process of switching to a private high school from our old, public high school.