Thursday, October 31, 2019

Descriptive Statistics Assignment Example | Topics and Well Written Essays - 250 words

Descriptive Statistics - Assignment Example For the data presented; the descriptive statistics help in understanding the extent of spread of scores, the aggregate score s of groups of participants, and the most representative scores in different groups(Frankfort-Nachmias & Nachmias, 2008). For the control group, it is evident that the scores on both variables – Depression and the number of candy bars eaten – are higher than the group receiving CBT. The control group had a Mean score of 5.3 and a Median and Modal score of 5 for candy bars eaten. The range of the scores was 4 and variance was 1.79 while Standard Deviation was 1.34. The CBT group had a Mean and Median score of 1.5 and Modal scores of 1 and 2. The range of the scores was 3, with a variance of 1.17 and a Standard deviation of 1.08. For the whole sample, the Mean was 3.40 and mode was 5 while median was 3.50 while range was 8, variance was 5.2 and Standard deviation was 2.28. For both the groups; the Mean, Median and Mode are quite close and this may b e interpreted to mean that these groups are somewhat normally distributed, though the CBT group is a bimodal group with two adjacent modes. For all three measures of central tendency, the Control group had higher scores as compared to the CBT group. The control group also had higher scores on all measures of dispersion, showing that there was more variability in the control group’s scores than the CBT groups. The measures of variability were highest for the whole sample showing that all participants together had more variance in their scores. The same trend was noticed for depression scores with CBT group scoring lower than the control group. The control group had a mean score of 72.2, a median of 74.5 and a mode of 72. The range of scores was 32 with a variance of 87.57 and a Standard deviation of 9.36. The mean score for the CBT group was 40.8, the median was 40 and the mode was 35. Although the control group had similar mean, mode and median showing a relatively normal

Tuesday, October 29, 2019

Case Study Analysis Example | Topics and Well Written Essays - 750 words

Analysis - Case Study Example We all agree that wife battering is a serious crime in the law however a battered individual should not take matters into his/her hands, but should let the law take its course (Federal Judicial Center, 2002). In this case, Dr. Bauer should pursue her duties responsibly, in spite of the pity that she feels for the wife. How should she proceed? For justice to be attained in this scenario, Bauer should not try anything which will be against the course of justice. The role of the law is to protect the rights of the people, and since the attorney has trusted her enough to give her the task, she should undertake the matter with a lot of integrity (Federal Judicial Center, 2002). She should concentrate her efforts towards the selection of a panel that is competent in what they are going to do. Integrity and justice should be her driving forces in the process, putting it in her head that one time in her life she will also require justice. If the wife is guilty, she should be punished accordi ngly by the law. However, we cannot overrule the fact that the crime might have been committed in self defense. As a result, Bauer should let the real truth be discovered in order for fair judgment to be made. Should Bauer offer her advice regarding the syndrome evidence? Why or why not. Bauer can only do that if whatever she is going to say will be of help in the quest for the truth. It is apparent that she really is against women battering and very sympathetic towards the woman. The strategy to be used during the defendant’s trial will determine the magnitude of the sentence to be administered. She surely should give her advice, if she feels that the syndrome gives inadequate evidence which may lead to an unfair sentence. However, since her role is not to identify the strategy, she should not choose the strategy to be used. All she will do is to give advice on what she thinks will serve best the interests of the case, though this should be done without any form of bias (Can adian Judicial Council, 2000). She can also present her strategy (PTSD) so that those concerned with that role will make an informed decision on the strategy to be used. Should Bauer Pursue The Poison Pill Strategy? Why or Why Not. Her main aim of wanting to pursue the poison pill strategy is to block the truth from being discovered. According to her, she will select jurors who are going to conflict in such a way that their discussions won’t result in anything worth. It will be evil for her to pursue something which is going to waste people’s time. She should know that truth should always be left to reign in any circumstance. By pursuing the pill strategy, it may lead to the dismissal of the panel and new members appointed to take over the case. Unfortunately, if this happens it can only be worse for her because the new panel of jurors may even be too harsh on the defended. The poison pill strategy she chose may eventually work against her unless if it is executed with a lot of wisdom. Thus, she should come up with another better and fair strategy. What Are the Ethical Implications of Dr. Bauer’s decision? The decision made by Bauer is immoral and unethical since it is against the realization of justice (Canadian Judicial Council, 2000). As much as Bauer feels great pity for the battered wife, she should not defend the woman unethically. Rather she should look for

Sunday, October 27, 2019

Individual Reflective Report On Gibbs Cycle Of Reflection Education Essay

Individual Reflective Report On Gibbs Cycle Of Reflection Education Essay The Gibbs cycle of reflection is used in 2 incidences in the report. The first incident is the group project for CLS course on starch and second is the feedback given for the SIM course for the business report. In both of the incidences, problems are evaluated and necessary solutions are taken for the improvements. The solutions are action planed to make it achievable and measureable with in a specific time period. INCIDENT ONE: THE STARCH POSTER SESSION 1.1 DESCRIPTION OF THE INCIDENT: The incident happened during the starch poster session on the week 3 of commercialization of life sciences session. We were assigned a group project to commercialize the starch of a company. We were supposed to prepare a poster drawing the road for commercialization. The starch had several importances like high in fibre and decreasing the obesity rate. The poster was prepared showing the treads of obesity and how the starch will help the people have a healthy lifestyle. The market for the starch was collected from varies websites like euro monitor. The product advantage of the resistant starch was shown to that of Competitor Company. The road for commercialization of product was drawn. The poster was presented in the class. The same process was done by other groups. 1.2 FEELING OF THE INCIDENT (ON THE SPOT ANALYSIS): What I felt? I felt that the poster was not good in the visual representation even before it was presented. There were lot of gaps in the poster, the combinations of colours were not good and the content was not to the level of masters. During presentation, I managed the contents to give a good meaning yet I feared there was not enough data in the poster and I dont know the answer if I was questioned. Luckily, there were not so many questions. The only question asked was about how to create value in this poster which I managed to answer. What my group members felt? My group members felt that the poster was not as good as they expected. The visual content was felt very poor. No group member felt that there effort was shown in the poster. But everyone in the group accepted that the presentation by me was well done even though we had poor contents in hand. What did other group members feel? The other group members felt that the poster was good and well presented. Indeed it was better than the other groups. The other groups didnt proceed to take the starch to the market. They stopped at the point of analysing the importance of starch. The poster of other groups wasnt complete according to assigned work. What did the course instructor feel? The poster was appreciated by the course instructor for showing the market and how it can be commercialized. The course instructor felt improvements can be made in the poster especially in visual representation. 1.3 EVALUATION OF THE INCIDENT: Although it was a group activity only 2 of the group members did the poster with minor contribution from others. The group did not well co-ordinate for the project. Many members of the group taught it was simply unnecessary waste of time. Many group members felt that this was not the group they intended to be in and some of their actions like not contributing to group activities demonstrated their disinterest in co-ordinating with the group. The poor visual effects and content were due to the fact that many were not happy to work in the assigned group. Many conflicts were in the group on what content to put in the poster before the poster session. There was a conflict on who will present the poster on the day of presentation. Everyone wanted to present the poster and everyone wanted every letter of them to be in the poster. This was not possible because many of the contents were same and some of the data were not in the scope of the assignment. The group members felt that their efforts were neglected. Poor performance of the group was due to: Improper co-ordination of group members. 1.4 ANALYSIS OF THE PAST: This situation remembered me of the incident that happened once I was in my undergrad. The people were not happy to work in the group for the lab project. My team members went and stood with the friends in other groups. They used to chat and always my group had no results in the experiments. Out of 11 experiments in the lab we had result for only 2 experiments. The course instructor called each one in the group personally to know the problem. When he knew the problems he took the group to the dinner and helped us to know each other well. I remember he even assigned some nick names appreciating our good characters. We were taken for trekking to improve the co-ordination. After a month group members felt comfortable to work in the group and next semester we got 9 results out of 11 experiments in the lab. 1.5 ANALYSIS OF THE TECHNIQUE USED: The technique my undergrad course instructor employed was Wheelans Integrated Model of Group Development. Stage 1: Dependency and Inclusion In the dinner we exchanged the stories our own self about our families, friends and past life. The special talents we had like singing and dancing. Stage 2: Counter dependency and Fight We were introduced to topics that will cause conflict I remember some topics like Moral dress code made in colleges; we had conflicts that went for days. Stage 3 Trusts / Structure We were taken for trekking in steep mountains where we have to hold each other in order to be safe. We helped each other and build the trust. Stage 4 Works / Productivity When we went to work for the group lab project we still had conflicts but we had greater trust and were willing to help each other. That made as have good results in the lab in the next semester. Stage 5 Final This didnt apply to the lab group because we were in the same group till the end of my undergrad. I applied this technique number of times during my undergrad in order to form groups for cultural events in the university. 1.6 ANALYSIS OF WHAT WE COULD HAVE DONE FOR THE STARCH PRESENTATION: A similar approach like this should have been followed in the starch poster. Stage 1: Dependency and Inclusion We should have gone for dinner or indoor games. We should have known the individuals talents and appreciated him. So that he would have felt the importance of him in the group. Stage 2: Counter dependency and Fight We should have conflicted on the topics that like gulf war where everyone can talk and will contribute in a different way. Stage 3 Trusts / Structure We should have gone for activities and games like trekking in steep mountains where we could have build the trust and resolved our conflicts. Stage 4 Works / Productivity Then we should have worked in the starch poster so that everyone is willing to put the important contents in the poster. They would have taught the importance of group/team beyond their individual works represented in the poster. Stage 5 Final This wont apply to the group because we will be in the same group till the end of masters. 1.7 ACTION PLAN: The action plan is done for the better performance of the group in February in deciding the project that can be taken for the business plan. Step 1: Many group meetings are done not with motto of assignments but just to know each other better. (Have to be done before December.) Step 2: Many common issues of conflict are discussed about favourite actors and actress. The cultural misconceptions are conflicted. (Have to be done before January.) Step 3: The trust is developed in the individuals by trips to black pool and many places. (Have to be done before January.) Step 4: we have done the next presentation better but we have to still build the team because there will be more conflicts as only one project have to be selected for the CLS course to make business plan and others should accept it. (Have to be done before January.) 1.8 CONCLUSION: By following this technique I created high performance teams in my undergrad during cultural events. I believe the same management technique will work in the masters level and we will be able to select the project with less conflict. On the course of the analysis of this technique, Wheelans Integrated Model of Group Development; we will understand the talents of each member. This will help each member to work in the area in which they have great interest on and which they know better than other group members in the business plan. Thus the technique Wheelans Integrated Model of Group Development will help us do an excellent business plan for the CLS course. INCIDENT TWO: I GOT 54% IN SHAPING IDEAS FOR MARKET ASSIGNMENT. 2.1 DESCRIPTION OF THE INCIDENT: This incident happened on 17 December 2010. It was the feedback given for summative course work on the topic BUSINESS REPORT ON GENTRONIX in the course shaping ideas for market. Shaping ideas for market is one of my favourite subjects in my masters course. In this course I had special interest in reading number of books as possible. I read books like competitive strategy and balanced scorecards which were beyond the reading list. In the formative feedback this was reflected as my instructor mentioned your business model looks quite good and many things are just right. My reading and knowledge was well reflected in the class room when I answered I was always right and I knew the answer for every question put forward by my instructor. Such reflection in formative feedback and classroom sessions made me feel I will do well in the business report. I did the business report and when I submitted I felt I will get good marks yet the result was not that; I scored 54%. 2.2 FEELING OF THE INCIDENT (ON THE SPOT ANALYSIS): What I felt? I just felt the mark was not mine. I read the feedback completely and when the word Getronics came I was sure it was my mark. What did the course instructor feel? The feedback underlined area for low mark. The business template was not used. The referencing was not to the level of masters. Inappropriate usage of analytical tools. But the feedback mentions, A very confusing piece of work difficult after reading the whole assignment the markers could not understand what Gentronics really does and that makes it impossible to relate the analytical techniques used in the report. What my class members felt? When I said my marks many of my class mates felt I was simply lying and I was sarcastic. 2.3 EVALUATION OF THE INCIDENT: Understanding of what an assignment is; is derived from the past experiences in schools and colleges. The assumption I made in the assignment The business model is only a graphical representation of the theory. I could make my own graphical representation of the business model. I have referenced only a few articles in my undergrad when an assignment was given. Except for the literature review I didnt reference more than 5-6 references. The course instructor would clearly know what Gentronix really does before even reading the report as my undergrad supervisor knew, in and out the topic and checked whether I did it right. Yet clearly as the feedback mentions all my assumptions were wrong. And my 3rd assumption made my assignment impossible to be even marked. The lesson I have learnt is never change the template, an assignment is just like a literature review and I need to explain things from the scratch the markers dont know much about the company until I explain it in my report. This lesson was learnt at a great cost i.e. I lost 46% marks. Yet I have an exam for the other 50% to get things on track 2.4 ANALYSIS OF THE PAST: This situation remembered me of the incident that happened in my grad 10. It happened in the business mathematics course. I worked out hard for the exam I solved many questions as possible. I got answers for 8 questions out of 10 in exercises. In the main examination I failed to pass. In fact I got only 5 marks out 100. I remember the reason was I made a mistake in the critical equation that was the first step for every problem in the chapter. My course instructor could not give me marks because it was the first step of every problem in the examination. After I got the feedback I came to know, the mistakes I made was not only in the particular equation but I had mistake in number of equations. This problem was every time I did the sum I had the equation in front of me in the study room beautifully inscribed in colours. But in the exam hall I had no such equations in front of me and I failed to remember the inscription. The parameters and variables in the external environment changed in both of the occasions the shaping ideas for market and grad 10 examinations. And I failed. In my grad 10 I fought back the problem and I got 95 marks out of 100 in the final exam. The technique I used was improving my faith in the Napoleon Hills pyramid system mentioned in the famous book Think and Grow Rich 2.5 ANALYSIS OF THE TECHNIQUE USED: The technique revolves around 3 important parameters for success. The 3 vertices of the triangle in the success pyramid desire, faith and action. Napoleon Hills pyramid system Action Faith Desire In my 10 grad even after I saw 5 marks in the feedback I had a strong desire to score 100/100 in the paper in the final exam. The desire is just a wish and cant be converted into actions and goals unless I have faith in getting 100 marks. I had no faith in getting 100 marks after I got 5marks but I had faith in getting 10 marks. I made a goal that I will get 10 marks in the final exam I worked out problems and adopted techniques to get 10 marks. In a week I was very sure I will get 10 marks whatever the question paper and environment may be. With 100 marks as desire I had now faith to get 15 marks, I made goals and solved problems for getting 15 marks. I continued it till I increased my faith to get 100 marks. When I when for the final exam my parents and course instructor prayed that I should pass the exam. Yet I knew I am going to do it great and I did it. 2.6 ANALYSIS OF WHAT I COULD HAVE DONE FOR THE BUSINESS REPORT: I wish I could have got the assumptions right. Looked at business reports I could have got What is referenced how and how many? How business model template is used? What degree of basic data do the markers need about the company and its products? My next opportunity to employ my understanding would be my business plan. 2.7 ANALYSIS OF WHAT CAN BE DONE FOR SHAPING IDEAS FOR MARKET COURSE IN THE EXAMINATION: Every time, when the mark is low it affects the faith vertex in Napoleon Hills pyramid. Now I have faith in passing the shaping ideas for market exam with 50% marks. I will employ short goals to improve my mark by 10% every week. Work out different past question paper to find every time and in every paper I am consistently increasing the marks. I will check my confirmation by self analysis and discussion with classmates. I will do this until I am sure that I will get 100 marks. Personal SWOT to improve the shaping ideas for market marks Strength I have read Bragg and Bragg the course book. I know what is being done in classroom sessions. I have got good formative feedback and I was able to answer questions in the class. Weakness I have lost 46% marks in the business report. I dont understand where to use the tool and how to use them. Opportunity To look at past papers. To collect articles to see the usage of tools. Treats The pattern of exam and question paper will be new. I am writing an exam in the business course for the first time. Need to spend time for other exams. 2.8 ACTION PLAN: The 4 week plan to get high marks in shaping ideas for market Week 1: Revise course materials be confident to pass the exam. Week 2: See the past exam papers try to answer them within 30 minutes/question. Improve every time in answering the questions in time and content. Week 3: Discuss with friend on their views of exams and try to find the methodology adapted is same. Try to find what may be improved and what may be eliminated to score more marks. Week 4: Revise the work done for 3 weeks. Analyze all the possible risks. Be prepared a day before for the examination. 2.9 CONCLUSION: This action plan is made combining the SWOT and pyramid approach. The view of getting high marks is writing the exact number of words and information the examiner expects to see in the paper. This information on what examiner might expect is got by critically analyzing every session of the course which is the first week plan. The second week puts the understanding into action. The third week checks for faults and other class members views of the content presented in class. Week 4 taking note of what is very important, important and less important. This is a way of managing time where in 1.5 hours the exam is completed writing the very important and important details. Thus in exam I will never miss the very important or important details whatever the factors may be. This strategy is adopted in getting high marks.

Friday, October 25, 2019

Biography of William Shakespeare :: William Shakespeare Writers Playwrights Essays

Biography of William Shakespeare William Shakespeare (1564-1616) was a playwrite in England. The Merchant of Veniceis one of his many â€Å"comedies.† Some scholars however, have made the argument that the play is one of his tragedies. Other tragedies of Shakespeare include Hamlet and Romeo and Juliet. Shakespeare lived in a time when Jews had been expelled from England for over three centuries. However, as a playwrite, Shakespeare also probably faced much prejudice and hatred—theater was banned from his home town of London during his lifetime and so the theaters had to move outside of the city walls. This situation may have made him sypathetic to the plight of Jews, hence the play as a work of tragedy. Shakespeare married a woman named Anne Whateley, but he may have also had a male lover during his lifetime—a practice not uncommon for men of his era. Many of his sonnets suggest the possibility of this. Shakespeare’s comedies, performed at the Globe theater, were played to an audience which included as many peasants as it did nobles and loyalty, and so the comedy appeals to this lower class as well. Shakespeare’s works are full of political humor, but also run rampant with sexual and scatalogical humor. Shakespeare lived during the reign of Queen Elizabeth who had a man in her service who she cared for deeply (she never married during her reign, but was rumored to have lovers) and who was rumored to be a Jew. If this had been the case, Shakespeare’s play would have to have been sensitive to her favor. Hence, more evidence of the play as a tragedy. In Shakespeare’s time, it was the common practice for men to play the parts of women in most productions.

Thursday, October 24, 2019

Money

According to eHow Money, working conditions in many if not all places were extremely poor, most died from machinery or toxicity from work areas, especially as many worked long hours for poor pay. (EconLib, 2002) For most people, whether in the I-JK or the US, the working class were really Working class', even though Jobs were developing the intensity of the Job was not lessened, they were indeed laborious. As the years went on, leading from the early ages of industrial work, developing into the current year 2013 much has changed.Till now legislations have been passed in order for all employees to have rights within the organisation that they work, Rights such as Equal Pay, Sex Discrimination, Race Relations, Gender Recognition amongst many since as early as the 1970's. (University of Bradford, 2010) Through such laws being passed, men and women are able to work side by side , earn fair pay and have the same standing as man within the working society, though even through these laws, d iscrimination of sexes is still large and racism is still a factor.Individuals differ, and very much so, through ethnicity, physique, gender, family experiences, motivation, attitudes and personality. (Laurie J Mullins, 2010, Chapter 4) ‘Sensitivity to individual needs and differences, especially in terms of their resilience, becomes particularly significant, when organisations embark on change initiatives. Such changes may lead to new mind sets, new attitudes and new perceptions that enable people to cope and adjust to the different world'. Laurie J Mullins, 2010, Chapter 4) People's perception of the working environment has changed so much that for an employer to create a scenario of discrimination is no longer a laughing matter, employers must approach every situation with such sensitivity, they have to consider how people react to situations and how they can deal with individuals as opportunities and as the company changes, especially when culture also happens to e a facto r as mentioned by Schein, ‘a pattern of basic assumptions-invented, discovered or developed by a given group as it learns to cope with its problems of external adaptation and internal integration'. Laurie J Mullins, 2010, Chapter 6)In Hugh Collins book ‘Employment Law, he states how the employment rights act has paved the way for so many other rights such as anti-discrimination, trade unions and human rights. Through this we can understand that it is due to such laws amongst many others that organisations are literally forced into including rights for people they would not have thought of, and the law that assembles all the issues together is the Equality Act f 2006, where it is stated that there must be equality and human rights, discrimination unlawful on grounds of religion, belief, education etc. nd to create public authorities to create equal opportunity between men and women. (University of Bradford, 2010) These laws have been passed continuously throughout the dec ades in order to allow the greater populace, ever growing in numbers and diversity to engage in work, so they are not heckled at as they choose to earn and make a living for themselves.Each law holding a certain purpose has not only paved the way for diversity in race and eligion, but fundamentally in gender, which has been the concern even till now. How these acts are implemented in the working environment is the most interesting thing, from the advertising to the selection of a person. For example many years back a well renowned advert had been broadcast for some time, by Howard Brown, an employee of Halifax Banking, turned actor to promote his organisation.He was promoted in order to promote. There are many examples like this which allow for diversities to be represented in a positive light, something that wasn't witnessed even a decade ago. Job descriptions have become broader, allowing anyone to apply, by the 1900-2005 racism was still rifled in parts of Europe, especially the I-JK and France, according to a BBC online survey made in 2002, 40% of black people say that they had witnessed racism in a place ot employment, double the tgure tor white people.Looking at t you could it can be noted that even now this number though may have decreased it is still relevantly at an all-time high. Within the selection process, through the advance of educational equality, all generations of people are now educated, hence the growing number of unemployed, eople both educated high or at a lower level are struggling to secure Jobs, this nearly almost causes an issue in selecting Just the right person for the Job, one may have one good image but lack in other etc.There is something called the ‘Halo Effect', this is where if we see them first in a good side it becomes difficult to recognise the bad side in them, for example noticing a person's glowing eyes as being the factor for someone's employment rather than them having what it takes to hold the occupation. The Ec onomist, 2009) In conclusion, looking through the laws that have been passed and the decisions aken to improve on how people are employed through fair recruitment and equality of opportunity is that it allows for greater sympathy to people who want to work, it has now developed into a liking to employ a diverse group, the public eye is ever present on what actions a company takes with its employees and how it runs itself.Organisations do the best they can to apply fair rules and run the company through the passed laws as it shows they are willing to experience each member of its team and become more adaptive in how it deals with its staff. The better they do internally the better they are presented externally.

Wednesday, October 23, 2019

Virtual Reality In Theatre Spaces

This dissertation will explore the effects of virtual reality in theatre spaces and how it effects people's perception and experience about space and how the technology has advanced in past years.With the advancements in technology,the experience in theatre spaces has become hyper real thereby allowing people to perceive spaces in a different way. The concept of virtual reality can be introduced in film festivals by assessing the possible effects and influences that the VR might have on people and movie experiences.This dissertation will also focus on how the movie experience changes by immersing yourself in the movie cutting you off from the people and surrounding,there by understanding the problems and challenges faced by people using surveys and questionnaires.INTRODUCTIONVirtual Reality is the computer-generated simulation of a three dimensional image or environment that can be interacted with in a seemingly real or physical way by a person using special electronic equipment, such as a helmet with a screen inside or gloves fitted with sensors.The technological advancements today have led to various explorations in different fields. The various VR systems available today areOculus RiftHTC'S VR system with controllersSamsung gear VRGoogle cardboardTreadmill and haptic glovesVR movie watching is a 360 degree immersive experience where the viewer is at the center of action.As a scene unfolds,viewer has the choice to look in whichever direction he wants and become absorbed in whatever part of the action they choose.In VR cinemas, talking part is designed to be more about the technology and experience rather than the movie.When we watch movies,the action/reaction happens only within the narrative,but VR systems are considered to be linking human intelligence with artificial intelligence thereby engaging the audience.RESEARCH PROBLEMHow does introducing virtual reality in theatre spaces change the perception of movie experience and affect the psychology of people and what are the outcomes? AIM : The aim of this research is to study the incorporation of virtual reality spaces in theatre complex and to study the impact on people's behaviour and how they experience the space. The main idea is also to study on different VR technologies and the application of it in theatre spaces and to understand how virtual reality helps in improving the movie experiences by making it hyper real. OBJECTIVES:The main objective of this research is to understand how people perceive such environments and how people cope up with the change in the viewing atmosphere of a movie theatre.To study how the implementation of Virtual Reality technology in theater spaces will have its own reflections on theater design.To understand how the technological advancements have helped in improving the cinematic experience.SCOPE AND LIMITATIONS:This research will be limited to :Exploration of different virtual reality systems and the scope of it in future.Exploration of proposals of virtual realityUnderstanding the limitations and challenges of using VR in moviesUnderstanding the psychological impact of VR on people .The study will not be focusing on :Design guidelinesPrimary CasestudiesDATA COLLECTION : HISTORY AND EVOLUTION: Pictures have been used as a medium of communication for thousand years.But the canvas and techniques for drawing them have changed radically. Modern computer graphics have provided for many years,the newest and potentially most expressive media for pictoral communication . Improvements in the power and accessibility of interactive 3D graphic system have recently added a new dimension. By sensing the position and orientation of the human head and coupling the resulting data into a high performance computer graphics system,it is possible to generate a computer synthesized view of a virtual world wherever the user is looking.This is known as VR. CHALLENGES :Virtual Reality is a new concept in cinematic field. While the whole concept of the film festival is to bring people together for screening the movies,introducing virtual reality in the theatre could be a challenging aspect as different people might have different opinion on the concept of virtual reality. The only way to watch a VR film is to put on a headset—imagine a padded scuba-diving mask and a pair of headphones—which cuts you off from everyone and everything around you. In some ways, VR films are the opposite of what film festivals stand for.  The dissertation will focus on exploring more about the possibilities of improving the movie experiences with and without VR technology. It could be argued that in the future the participation might lower to individual contribution rather than a group involvement. Early VR headsets made some users feel nauseous. â€Å"The stereotype of virtul reality is an isolated person sitting alone in a room,their head sealed with a helme.Tribeca immersive programming at the tribeca film festival tries to make VR more tangible and social experience † PROPOSALS FOR VR :The global VR market ,which was valued at about $2 billion last year is expected to reach approximately $27 billion by 2022. Virtual reality isn't just for gaming anymore. VR movies are becoming mainstream with several Hollywood A-list directors jumping on board with a new approach to storytelling. Virtual Reality cities – Hypatia by Timefire media Virtual reality social networking – Vtime by Starship group. Virtual Reality tours by Chernobyl vrVirtual Reality research by Visualization laboratory. Architecture by Iris Vr. † A prominent project – Hero allows users to move around freely in a simulated syrian neighbourhood.† RESEARCH PAPER AUTHOR SUMMARYFusion of reality and virtual reality Narin SappakitThe research paper mainly focuses on how digital technology can be implemented between film and architecture.As walls and skin of the building can now become screens, changing the way the building relates and interacts to its context and the way people experience space.How does virtual reality influence cinema ? Exploring a possible future of cinematic environment by Benan DemirThe paper focuses on the new technology of virtual reality on the cinema and how the two may collaborate and converge. It also explores on the existing virtual cinema products and argue how they might converge in futureVirtual Reality in Theatre spaces Sherouk Mohamed Shehab El Din Saad Bad The paper focuses on two aspects.Traditional theatre spaces and virtual reality and its impact in theatre spaces.The study is based on creating virtual reality spaces with unlimited design creativity for entertainment and education by using dif ferent VR systems.Also by adding new architecture approaches to form spaces that can highly implement Virtual Reality TechnologyWhy virtual reality will change the design forever? Article by Mark Wilson Discusses about the various reasons and the positive sides of vr technologyTribeca film festivalHow virtual reality is changing the way we experience stage shows?Virtual Reality Movies: VR revolution Article Gabriel ElizondoArticle by The Conversation blog.The wall street journal Talks about how Tribeca Film Festival for the first time, showcases a theatre constructed for cinema-goers to fully experience films in 360 degrees. Discusses about the development f VR in recent years. When virtual reality is used interactively it opens up whole new worlds to be explored. The traditional relationship between space-actor-spectator becomes a space-spectator relationship. The audience is no longer in a passive role. Dramatic action is substituted by a real action, and how it plays out is shaped by the spectators. Talks about how Hollywood is Changing with Vr technology. Viewing VR is starkly different than watching a traditional film: With conventional movies, the director dictates your focus of attention. An aerial view cuts to a medium shot cuts to a close up—giving you no say in what you see. But virtual reality puts you in charge. The headset allows you to observe any aspect of a setting and, in some cases, even affect the way the story unfolds depending on where you look. Advancement of VR in marketing and investment – a digital survey report: â€Å"With investment in augmented reality (AR) and virtual reality (VR) on the rise, the results of a new survey by global law firm Perkins Coie LLP depict a growing industry that is moving to a greater focus on more practical applications, while facing concerns reflective of an expanding customer base. The survey of startup founders, technology company executives, investors and consultants, released in March 2018, follows the firm's inaugural AR/VR Surveyreleased in September 2016. † Biggest obstacle for mass adoption of VR technology Literature survey anaysis :Industry insights to the future of VR Gaming was considered as the sector they expected to attract the most investment for the Coming year but wasn't strong in 2018.with military,movies,among the areas making gains. Most of the respondents said that user experience was the top obstacle for VR because of Heavy headgears cost being the second biggest obstacle . The drop for movies and television could stem from a belief that shorter experiences work better VR. But the drop for live events and the annuncements including the October 2017 announcement that Facebook would use Oculus technology to allow its users to watch live concerts and sports with friends from around the world. â€Å"Overall, the survey shows that those in the industry have strong confidence in the potential of AR and VR. One respondent called this era a formative and experimental phase—one that will create significant rewards for both developers and players in the not-too-distant future.† SURVEY REPORT – QUESTIONNAIRE In a survey conducted among 20 people around 10 people have experienced VR more than 4 times. As the technology is advancing VR people are getting more Familiar with the devices used hence contributing to the Growth of VR industry. According to the survey, only 5% of 20 people haven't come across the devices used.

Tuesday, October 22, 2019

TFBR modernization essays

TFBR modernization essays Organizational Development and Change Enclosed is the change project paper on Technical Feedback Reporting Modernization. For many years the Fleet has been complaining that TFBRs are way too burdensome to submit and take too long to receive resolutions. The stark reality is that no matter how smart, how hard working, how dedicated or how strong, Sailors are, they simply cant speed up the process for providing feedback or seek resolution for maintenance procedures that are incorrect or lack clarity by themselves. Todays modern warships have electronic capability to allow for faster transmission and receipt of TFBR resolutions. I wish to exploit that capability. Today the submission of TFBRs is done manually on paper and is slow and cumbersome and most maintainers find it very difficult to receive TFBR responses in a timely fashion. Our sailors deserve and would very much like a system that allows for electronic TFBR submission and response receipt. Additionally, the current way of TFBR submission ties up valuable resources at the In Service Engineering Agent (ISEA) by making all TFBRs be routed to them for resolution instead of prescreening unnecessary TFBRs to resolve them at the lowest level possible. Costs estimate put each TFBR response at around $1,350 per resolution by an ISEA. This change project paper presents three possible solutions on how to help save valuable maintenance dollars by making TFBR submission and response all electronic; create electronic pre-screening to eliminate duplication of effort; and filter unnecessary TFBRs from reaching the ISEA. By enacting my change plan I can safely estimate a savings in excess over $1.5 million dollars for the Submarine Force alone. Multiply that number times 5, and you can see the entire fleet savings if all Type Commanders were switched to electronic TFBR submission and tracking. Admiral, please review the history, ...

Monday, October 21, 2019

Terrorist essays

Terrorist essays Terrorism by nature is difficult to define. Acts of terrorism conjure emotional responses in the victims as well as in the practitioners. No two writers agree on what is terrorism. Even the U.S. government cannot agree on one single definition. The old adage, "One man's terrorist is another man's freedom fighter" is still alive and well today ("Terrorism Research Center: Definitions" 1). Although many people believe that terrorism is evil, it is merely misunderstood because there is no set definition. Terrorist are responsible to most of the freedom movements in every country. Terrorist have used violence to get their point across to the public. These acts are often necessary for the success of the movement or cause. The use of this violence can be justified in several ways. You can't make an omelet without breaking some eggs has been used by terrorist to describe their actions. Terrorism has been used by governments and against them. It has been used as part of a campaign by guerrillas who have widespread support and by small groups. Terrorism has been used in societies where grievances can be expressed freely and where free speech is suppressed. In a well organized guerrilla campaign, for example, the main goal might be to destroy the governments military forces. The violence is limited to acts which will achieve that objective. This might be destroying a factory which is making arms, or putting out of action part of the government army, or bombing an airfield so that it cannot be used by government aircraft. In some cases, the use of terroris m appears to be a reaction to the disintegration of law and order. A stable society has normally evolved peaceful ways of keeping order and handling disputes between its members without violence. Once law and order breaks down, as they do in civil wars, members of society have to defend themselves in different ways. There may be in a situation where government forces ...

Sunday, October 20, 2019

How to Analyze a File Line By Line With Python

How to Analyze a File Line By Line With Python One of the primary reasons people use Python is for analyzing and manipulating text. If your program needs to work through a file, it is usually best to read in the file one line at a time for reasons of memory space and processing speed. This is best done with a while loop. Code Sample for Analyzing Text Line by Line fileIN open(sys.argv[1], r) line fileIN.readline() while line: [some bit of analysis here] line fileIN.readline() This code takes the first command line argument as the name of the file to be processed. The first line opens it and initiates a file object, fileIN. The second line then reads the first line of that file object and assigns it to a string variable, line. The while loop executes based on the constancy of line. When line changes, the loop restarts. This continues until there are no more lines of the file to be read. The program then exits. Reading the file in this way, the program does not bite off more data than it is set to process. It  processes the data it does input faster, giving its output incrementally. In this way, the memory footprint of the program is kept low, and the processing speed of the computer does not take a hit. This can be important if you are  writing a CGI script that may see a few hundred instances of itself running at a time.   More About While in Python The while loop statement repeatedly executes a target statement as long as the condition is true. The syntax of the while loop in Python is:   while expression: statement(s) The statement may be a single statement or a block of statements. All the statements indented by the same amount are considered to be part of the same code block. Indentation is how Python indicates groups of statements.

Saturday, October 19, 2019

Thesis Essay Example | Topics and Well Written Essays - 500 words

Thesis - Essay Example est footballers of all time is currently the president of Union of European Football Associations (UEFA).1Further, football has become a big business game, and all of the English Premier League clubs are currently listed on the London Stock Exchange. By purchasing popular players from different parts of the world, especially Asia, and by holding their training camps in different parts of the world, i.e., effectively touring, clubs are using strategic marketing, thereby creating a significant source of income. This is due to the large population and the rapid development in economic terms of countries to which they are marketing (Ashton-Jones et al., 2008:a). For example, the first appearance of Chinese Lie Tie and Sun Jihai in the English Premier League was broadcast in more than 700 million Chinese homes (Desbordes, 2006, p. 7). On the other hand, leisure activities have been proven to be â€Å"a normal good;† i.e., the demand for leisure increases with increasing income. Research has also shown that the residents of the wealthiest countries spend more time engaging in leisure activities, such as football (Houston and Wilson, 2002).2 Contemporary indication shows that economic prosperity may lead to sporting success than the other way around. Recent evidence indicates that after 1996 since the Bosman ruling, the success in football is dominated by the England ´s richest four teams (i.e. Manchester United, Arsenal, Liverpool, and Chelsea) called â€Å"the big four†. The dominance of these teams since 1996 has led to think that economic prosperity may lead to sporting success in football. Thus, whether economic prosperity leads to sporting success in the case of football or vice versa is unclear and needs to be proved empirically. This is needed to find out the contributing factors for the widening splits between richer and poorer football clubs. This can be considered as a type of inequality between haves and have-nots in football market. This inequality is now

Friday, October 18, 2019

Essay Assignment Example | Topics and Well Written Essays - 500 words - 4

Assignment - Essay Example It often comes with some challenges. This paper explores the benefits of working for an international firm as well as the disadvantages. First, working for an international company like BMW gives a person the chance of experiencing a new country with different culture. There is a possibility of an employee being posted to a foreign country, which is impossible with local companies. Working in a new country gives an employee the opportunity to explore places he or she may not have travelled to and experience new cultural practices across the world while getting paid. As such, working for an international firm is an adventure worth exploring. Second, working with foreign people at BMW enables one to get new business perspectives. Working in an international firm gives one an opportunity to develop a global view on business operations. Different countries have different approaches to doing business. As such, a person who works for an international firm is better placed to learn more about international business compared with someone who works for a local firm. Third, international firms like BMW usually offer their employees more competitive salaries compared to domestic firms. By accepting foreign appointment, one is likely to receive a potential increase in his or her income. This makes working for an international organization more of a fun and rewarding more than working for domestic firms. Fourth, BMW has a diverse workforce, which gives one the chance to experience the benefits of diversity in the workplace. The company is likely to give one a crucial opportunity of working with individuals of diverse backgrounds. One is in a position to learn different ways of solving a particular problem because different communities have different problem-solving approaches. While working for international companies such as BMW seems lucrative, there are some challenges for individuals who work for these organizations. First, cultural

Significant principles of project management Research Paper

Significant principles of project management - Research Paper Example And the success or failure of one phase can have a significant influence on other project management tasks. In this scenario, project management is a systematic method for managing, controlling and setting up project tasks and resources from its beginning to completion (Barkley, 2006, p. 14; Kerzner, 2006; TechTarget, 2008; Haughey, 2009). In addition, these resources and tasks can be divided into different stages depending on the size of a project. These stages could be initiation, planning, executing, controlling, and completion or termination of the project. In reality, this standard method of the project management can be used to manage any kind of project, because its fundamental goal is to organize the different tasks of project development. In addition, project management is a kind of plan administration that pays attention especially on developing and organizing project activities and tasks. Simply like there are billions of ice cream tastes, there are billions of kinds of pr ojects and the nature of a project varies from organization to organization. In this scenario, efficient and successful project management can defeat them both. Additionally, project management considers projects normally as a provisional attempt to produce an exclusive service or product. In addition, for the majority of organizations today, everything is a project; on the other hand, others believe that projects are particular and high level tasks that happen occasionally. In fact, a project is an exclusive thing. Alternately, the formation of a new implementation is exclusive, while the preservation and everyday support of an existing application is not accordingly exclusive (Tomayko & Hallman, 1989; Luckey & Phillips, 2006). In addition, a number of researchers believe that project management is simply a set of a wide variety of tasks and activities that are distributed to a number of people by a responsible authority normally acknowledged as a project manager. Additionally, in efficient project management there is no space for goobers. In addition, the successful project management focuses on serious trade of receiving work performed on time, within allocated budget and according to client’s needs and requirements. Furthermore, the successful project management involves various other attributes such as leadership, execution and owning the project capacity. Also, it is an excellent response to sign off on the project and know that we and our project team play a significant role in the project’s success. The benefits of project management for the organizations are countless. The effective use of project management allows organizations to organize project tasks and assign resources. In this scenario, organizations can also track the progress of project. Additionally, project management is helpful for controlling the project tasks and guiding the development (Barkley, 2006; Tomayko & Hallman, 1989; Luckey & Phillips, 2006). Project organizations and the importance of leadership and sponsorship In view of the fact that the project is a team activity in which people

Efficient Market Hypothersis Essay Example | Topics and Well Written Essays - 2000 words

Efficient Market Hypothersis - Essay Example While the extent of the validity of these criticisms remains debated, the efficient-market hypothesis (EMH) has held a pronounced influence on political and academic thought. This essay considers the extent that the market, as Warren Buffet claims, functions under irrational processes, or can be explained in rational terms through the efficient market hypothesis. Outline of the Efficient Market Hypothesis (EMH) In its modern incarnation Professor Eugene Fama first articulated the efficient-market hypothesis in the early 1960s during his time at the University of Chicago Booth School of Business. From an overarching perspective, the efficient market hypothesis theory contends that for investors it is impossible to ‘beat’ the market on a consistent basis. The main reasoning behind this notion is that the market will reflect all available information for the particular investment, such that gaining any sort of edge over other investors is made impossible. This contention do es not necessitate that individuals act in rational ways. Indeed, the efficient market hypothesis understands that a number of individuals will both over and under react to available market information. The cumulative impact of these reactions results in market efficiency, as the random reactions will fall proportionally along a normal distribution pattern. In these regards, it’s possible for an individual to be right or wrong about the market, but the market itself is necessarily an accurate reflection of available asset information. Structural Components There are three major versions of the efficient market hypothesis, each of them resting on a different part of a spectrum of efficiency. The first version is the weak-form efficient market theory. Within this perspective all prices on past publically traded assets, including stocks, bonds, and property, already have factored into them all publically available investment information. The semi-strong version of the hypothesis takes this a step further and argues that current asset prices reflect all publically available information and that when new information emerges prices change instantly to reflect this new public information. The third version of the efficient market hypothesis is the strong-form version. The strong-form version of the hypothesis goes even further in that it argues in addition to asset prices immediately reflecting public information, asset prices also instantly reflect insider or otherwise concealed information. Analysis Seminal Literature There are a number of seminal studies that established core elements of the efficient market hypothesis. While Fama first articulated the theory in its modern context, its original formulations were explored as early as the 19th century. Kirman (2009) notes that French mathmetician Louis Bachelier established many of the general tenants of this theory in his ‘Theory of Speculation’ published in 1900. The early years of the 20th cen tury witnessed another prototypical formulation of this perspective in the random walk model; this was a notion that stock prices operated through random steps and as such gaining a long-term predictive edge was

Thursday, October 17, 2019

PhD Proposal The Effect of learning English in an early age on the Essay

PhD Proposal The Effect of learning English in an early age on the phonological errors in EFL Saudi classes - Essay Example his can cause a great deal of strain in the efforts to communicate in English when pronunciation is diminished because of difficulties with forming English words through a tongue that is trained to form sound within the framework of another language. Learning a second language at an earlier age may diminish this effect as the ability to form language can be more easily manipulated. Phonological errors occur when syllables are either missed or not pronounced within a communication. The forms of these errors can include, but not necessarily be limited to errors involving consonants, vowels, substitutions, additions, omissions, movements, exchanges, prosody (the metrical sound of the way that the language is formed), metathesis (the transposition of letters, sounds, or syllables), or non-contextual errors where there seems to be no definable source (Jaeger, 2005, p 147). According to Binturki (2008), the most common phonological errors that are found in Saudi speakers within their use of the English Language are with the interdentally fricative /v/ and to some degree with the /p/ and /i/. As well, the positions of certain words created difficulty form many users of the English language with the common Arabic dialect of Nadji as their primary language (p. i). The proposed study will be based upon the study done by Tiono and Yostanto (2008) on the phonological errors that were common among Indonesian speaking students when learning the English language (p. 80). The study was centrally focused on the English consonantal sounds that do not exist in the Indonesian language. The researchers identified six specific sounds that were absent in Indonesian and therefore caused difficulty for these students who had completed six courses of education in English (Tiono and Yostanto, 2008, p. 81). An auditory examination was given to 25 students from a private university in East Java, Indonesia where the phonological differences could be appreciated through listening to the

Wednesday, October 16, 2019

The Internationalization and Brand Development of HuaWei Dissertation

The Internationalization and Brand Development of HuaWei - Dissertation Example Organization which can adapt itself with the changing business needs and scenarios are in a greater position to remain sustainable and competitive in the long term. This particular project dissertation has the title of internationalization as well as brand development of Huawei. It is important to mention that in this particular case, the influence of the factors of internationalization as well as brand development has to be researched in connection to the brand of Huawei. While doing the literature review, it was realized that the concepts of internationalization as well as brand development are very intrinsic in nature. In order to get a better understanding of the influence of the two in regards to the Chinese global brand, it is important to take the views of the people who are deeply associated and integrated with the process of the firm. As a result, a research question was developed to understand the influence of internationalization and brand development of Huawei and how it helped in achieving the dominance of the brand in the global markets. This dissertation based project in the course of progress will take into account, the factor of considering a primary based research and proper analysis of the collected data, so that significant amount of justice can be done to the research question, that has been framed. Introduction The world of the 21st century is moving at a fast pace. The fast pace of advancement of the modern day world is more on the lines of rapid change and tremendous development. It is of high importance to mention that the evolution of the telecommunication technology along with the process of evolution of high speed internet and various kinds of technology enabled gadgets has resulted in the process of playing a tremendous amount of influence in the lives of the masses around the world. It needs to be mentioned that because of the lines of emergence of high speed internet connectivity, the network of communication channels has improved in a drastic manner all over the world. The internet has played a major role in the process of creating the channels of communication in the various regions of the developed as well as the developing economies. It can be rightly said that it is of considerable importance to highlight that this technology powered development has resulted in the process of transformation of the globe, where the entire world can be represented and increasingly seen as a single and well connected global entity. Because of this technology powered transformation of the world around us, there has always been a steady evolution of various kinds of

PhD Proposal The Effect of learning English in an early age on the Essay

PhD Proposal The Effect of learning English in an early age on the phonological errors in EFL Saudi classes - Essay Example his can cause a great deal of strain in the efforts to communicate in English when pronunciation is diminished because of difficulties with forming English words through a tongue that is trained to form sound within the framework of another language. Learning a second language at an earlier age may diminish this effect as the ability to form language can be more easily manipulated. Phonological errors occur when syllables are either missed or not pronounced within a communication. The forms of these errors can include, but not necessarily be limited to errors involving consonants, vowels, substitutions, additions, omissions, movements, exchanges, prosody (the metrical sound of the way that the language is formed), metathesis (the transposition of letters, sounds, or syllables), or non-contextual errors where there seems to be no definable source (Jaeger, 2005, p 147). According to Binturki (2008), the most common phonological errors that are found in Saudi speakers within their use of the English Language are with the interdentally fricative /v/ and to some degree with the /p/ and /i/. As well, the positions of certain words created difficulty form many users of the English language with the common Arabic dialect of Nadji as their primary language (p. i). The proposed study will be based upon the study done by Tiono and Yostanto (2008) on the phonological errors that were common among Indonesian speaking students when learning the English language (p. 80). The study was centrally focused on the English consonantal sounds that do not exist in the Indonesian language. The researchers identified six specific sounds that were absent in Indonesian and therefore caused difficulty for these students who had completed six courses of education in English (Tiono and Yostanto, 2008, p. 81). An auditory examination was given to 25 students from a private university in East Java, Indonesia where the phonological differences could be appreciated through listening to the

Tuesday, October 15, 2019

Jain Man Fasts to Death Essay Example for Free

Jain Man Fasts to Death Essay A 76 year old Indian man died of starvation that is called â€Å"santhara†. It is an old practice in Jainism where a person fasts for a number of days and is believed to help the person achieve salvation. Some people are still not amenable to this practice as they believe that this is a sort of suicide. On the other hand, Amar Chand, the man who died, believed that it would help him cleanse his soul as he has been ill for some time already. â€Å"Santhara† is a religious ritual described as intended death by fasting. During the process of fasting, the person is given time to reflect on his life, which is reason why this is considered to bring salvation. If someone feels like he has served his purpose in life and felt like he has imparted enough of himself to the world, one can decide to fast. There are a lot of religious practices in the world; some may even seem absurd and illogical. However, to the followers of the specific religions, their belief stands by the fact that they would be able to achieve something out of it; in this case, salvation. If you think about it, to decide that you have served your purpose is a sign of consciousness and knowledge of the belief that you are following. It shows that given enough will power and faith in something, anybody can do anything. To the Jains, though some may think that â€Å"santhara† is synonymous to suicide, they still hold on to the practice because as far as they know, being able to reflect upon one’s life can help them save themselves from spiritual death just as the Muslims believe that they need to travel to Mecca at least once in their life.

Monday, October 14, 2019

Importance of Database Security

Importance of Database Security To be able to manage a huge amount of data effectively and fast, a well organized system is needed to build. It will also need to store and retrieve data easily. Generally, a database system is designed to be used by many users simultaneously for the specific collections of data. Databases are classified based on their types of collections, such as images, numeric, bibliographic or full-text. Digitized databases are created by using management system to make, store, maintain or search the data. Oracle, MS SQL and Sybase servers are mostly used in companies, agencies and institutions for their different purposes of the assets. On the one hand, internetworking technology provides the assets efficiently and effectively among cooperation but it also gives opportunities to hackers or lawbreakers to make profits. So, database security becomes the most important issue and all related agencies have to focus on the availability of their data to the authorized users only. The protection of data from unauthorized disclosure, alteration or destruction is the main purpose of the database security process. Database security is the system, processes, and procedures that protect database from unintended activity that can be categorized as authenticated misuse, malicious attacks made by authorized individuals or processes. Databases have been protected from external connections by firewalls or routers on the network perimeter with the database environment. Database security can begin with the process of creation and publishing of appropriate security standards for the database environment. Particularly database systems in E-commerce, can access the database for exchange and retrieval of information from web applications. As many layers consisted for web application access, it is needed to make sure the security of each layer. In this paper, we are making an attempt to present how to make secure database in each layer of database system of ecommerce in details. Importance of Database Security In this information technology age, it is compulsory for all types of institutions or companies to make avail their information assets online always through databases. However, they must have a policy to divide the levels of users with to which extent they can asset the information. It is vital not to give opportunities to mischievous intruders. Databases are used to provide personnel information, customer information, credit card numbers, financial data and business transactions, etc. The information is very sensitive and highly confidential and must be prevented from disclosure by other competitors and unauthorized persons. The security of data is crucial not only in business but also in even home computers as personal files, details of bank accounts are difficult to replace and potentially unsafe if they will be in wrong hands. Data destroyed by hazards like floods or fire is just lost but handing it in unethical person will have severe consequences. Other threats will be included human errors and espionage. Therefore, the data security starts with strategies of identifying the area of exposure which will be affected. It is important to define who can access what data, who is allowed and who is restricted, whether passwords are used and how to maintain it, what sort of firewalls and anti-malware solutions to use, how to train the staff and to enforce data security. Furthermore, the backup continuity plan should be laid out so that even though the systems fail, the business can be carried out without delay. While constructing the infrastructure security of a company, database security should be well considered. Database is very crucial to most enterprises at present days; the damage of database will have tragic impact on it. Unsecured systems will make hurt both the company itself and its clients. Based on the research done by American National Infrastructure Protection Center (NIPC) in 2000, the continuous attacks on U.S. e-commerce system are increasing. The most interrupted system is Microsoft Windows NT systems, but UNIX based operating systems have also been maltreated. The hackers are utilizing at least three identified system weaknesses to be able to achieve illegal access and download information. Even though these vulnerabilities are not freshly innovated and the mischievous activities of hackers had been in progress for quite long before the sufferer became noticed of the intrusion. The insecurity of the database can affect not only the database itself, but also the other running systems which have the relationship with that database. The process of an intruder can be first to get access to the poorly safe database, then use strong built-in database characters to get admission to the local operating system. In this way, other trusted systems connecting with that database will be easily attacked by the intruder. Database Security in E-commerce database Database system cannot stand alone and it needs to depend on many other systems. Hence, database security is a combination of many other associated and correlated systems are included as well. The following figure is a normal schema of E-commerce Company. In figure 1, the four basic layers are existed in order to defend a database system. These systems are the functioning system on which the database system runs. Firewall is a commonly applied mechanism to obstruct the interruption from the external network. Web server and web application offer numerous services to the end user by accessing the database. Network layer is the medium in which the data is transmitted. Operating system layer Operating system security is a very important characteristic in database administration. Some dominant features of database systems will possibly be a crack for the underlying operating system. Thus, the responsible person should very thoroughly scan the relations between a feature of database and it is operating system. According to Gollmann, there are five layers in Information Technology system. These layers are application, services, operating system, os kernel and hardware. Each layer is constructed on top of other fundamental ones. As the database system is at the service and application layer, it is existed in above the operating system layer. If the weaknesses of the operating system platforms are identified, then those weaknesses may lead to illegal database access or manipulation. Database configuration files and scripts are at server level resources and they should be sheltered severely to ensure the reliability of the database environment. In many database environments, membership in Operating system group is authorized full power of controlling over the database. To keep away from mistreatment and exploitation of the membership, those users membership and access to the database should be warranted frequently. One of the responsibilities of Administrator is to organize the settings of the operating system or to adjust the size of the buffer and the timeout period, so as to avoid the rejection of service attack stated previously. Most operating system vendors supply system patches generously and fast if any vulnerability has been detected on the system. Another weakness which is often ignored by the administrator is to bring up to date the operating system with the latest patches to abolish the newest revealed holes of the system. Network layer Data has to be transmitted through the network including local LAN and Internet when web applications communicate with database or other distributed components. The two major network transmissions are from user to web server, and from the web application to web database server. All these communications must be completely protected. Although the administrator can secured the network in local domain, the global internet is unmanageable. Encryption is another influential technology. It is set aside not only the invader cannot interrupt but also the encrypted data is unreadable and tremendously hard to presume or decrypt. The matching key can only be to decrypt the cipher text. The two means to apply encryption in database system are of the one way to use the encryption options provided by database products and another way to obtain encryption products form trusted vendors. In addition, one more approach for a safety connection is practicing the secured protocols above TCP/IP, for example, the technology of Ipsec and VPN (Virtual Private Network). The personal traffic in the course of the public internet by means of encryption technology can be provided by VPN. In generally, SSL (secure sockets layer) can be used as another way for cryptography on top of TCP/IP. Safe and sound web sessions can be obtained by Netscape. SSL has newly developed into Transport Layer Security (TLS) that make certain no other invasion may snoop or interfere with any communication. Utilization of SSL can help to validate and protect web sessions, but the computer itself cannot be safe. Web servers There are dissimilarities in functions of Web programs and common programs in area of safety. The major reason is safety for Web application program as the flaw is not easy to perceive. Web server that keeps the external disturbances is located in the middle of the application server and firewall. It can be applied as intermediary to get the data that we approved to be available. For the time being, the software commonly used in web applications is CGI (Common Gateway Interface). The web server can do a different function in easier way as it is uncomplicated. It is user-friendly as a web page counter. Moreover, for example as reading the input from the remote user, it can be used as multifarious to access the input as uncertainty to a local database. CGI proceeds the outcome to the user after retrieving the database. On the other hand, it is also risky since CGI scripts permit software applications to be carried out inside the web server. The well-known language for CGI scripts is Perl since it is simple to build applications and parse the input from the user. Nevertheless, Perl can be exploited by wicked users as it grants some forceful system commands. The invader can simply demolish the system if CGI was weakly executed by web server. This may be a huge hazard to the system as someone can easily eliminate the classified files from Web server as effortless to contact. To get rid of the intimidations, there are several ways to prevent these. The CGI scripts should be prohibited by abuser to write, and the arrangement should be done to CGI program that can be performed as a single way of directory. It should also be cautious in writing the CGI script. No more longer usage of CGI applications such as sample applications should be disposed as these are approachable to Web server and major intentions for invaders since older CGI samples have safety gaps. Without comprehensive handlings, default settings of Web application server can be a huge imperfection of the system if the database system networks with CGI. There need to make sure the system for which extent of operation is unapproved to the clients when a use logs into the database. Web serve with verification methods built in CGI is the most valuable way which means to prepare a CGI script with login name and password to prevent the files. By doing this, the files are protected to the web server apart from readable only. The safety gaps should be checked firmly and regularly to all the scripts even though these are obtained by self-developed, downloaded or bought from vendors. Firewalls The major significant layer to slab the external interruption of the system is Firewalls. Packet filter and proxy server are the two types of firewall mechanism. The connected data between the application and database are divided into packets which consist of much information in its headers, for examples, sources, destination address and protocol being used. A number of them are cleaned as with which source addresses are unbelievable to access to the databases. The arrangement of firewall should be done to access only one or few protocols which is helpful for application queries such as TCP whereas the other packets are choked-up firmly. Accordingly, the smallest amount of risks is maintained for the vulnerable system. Moreover, the ping of fatal loss will be kept systematically if the firewall is constructed to abandon the approached ICMP demand. The potential invaders should be marked out by reserving log files at the firewall. There are two connections in Proxy server. The first one is the connection between cooperations database and proxy server. Another one is the connection between proxy servers also provided the log and audit files. On the other hand, there are very hard to build up strong firewalls, and also too huge and tough to investigate the audit tracks. Database server Database servers are the fundamentals and essentials of greatest values in each and every sector of Education, Health, Military, Manpower, Economics, Modern Arts and Sciences, Information Technology, Electronic Businesses, Financial Institutions, Enterprise Resource Planning (ERP) System, and even universally comprised of sensitive information for business firms, customers, marketers and all stakeholders. The functions and purposes of Database servers are highly depended on the users of their particular intentions for applying the services provided by the operating systems. Some good safety practices for Database servers are to: use multiple passwords to access multi-functions of a server such as using one password to access the single system for administration; apply a different password for another operation; be audited for each and every transaction of the database; utilize application specific user name and password and should never use a default user name or password; back up the system thoroughly for late recovery in case of accidentally break down Allowing to know the end-user for the name and location of database is very worthless. In addition, exposing physical location and name of every database can also be a huge danger to the system. To cover up these issues, we should better practice the service names and pseudonyms. The several copies should be done for the important files which control the accessibility to the database services. Each and every copy should be also connected to a meticulous user group. Moreover, the members of each group should be allowed to access only the relevant documents concerning them. Conclusion The institutions, organizations and business firms mainly stored their important information and valuable assets as digital formats in online related excellent databases. The safety and security issues of Databases become strongly an essential role in the modern world for enterprises. To save from harm of database is to prevent the companiesà ¢Ã¢â€š ¬Ã¢â€ž ¢ untouchable information resources and digital belongings. Database is the multifarious system and very complicated to handle and difficult to prevent from invaders. Last, but not the least, database protection is also to be taken significantly to the confidentiality, availability and integrity of the organizations like other measures of the safety systems. It can be guarded as diverse natures to cover up. Although auditing is critical, but analysis is also very tough while potential analytical tools will be an enormous contribution to protect the online rationality of database system. There should be reinforced to the corporate safety and security issues. Means of verification and encryption will play the essential role in modern database precaution and safety system.

Sunday, October 13, 2019

The Summa Teologica By Thomas Essay -- essays research papers

The Summa Theologica by Thomas Aquinas  Ã‚  Ã‚  Ã‚  Ã‚   Born in Italy, Thomas Aquinas was one of the most educated men of his time. Aquinas, whose family were noble, was educated as a monk and later continued his education at the University of Naples followed by the University of Paris where he studied the ancient Greek thought of Aristotle. Educated in both philosophy and theology,Aquinas is thought to be one of the most important philosophers of Catholicism. One ofAquinas's most influential writings is the Summa Theologica. In this document, Aquinas clarifies four questions concerning the Church: Whether it can be demonstrated t Godexist? Whether it is always sinfuhatl to wage war? Whether it is lawful for Clerics and Bishops to fight? And whether it is lawful to fight on holy days? He answers each question thoroughly but indecisively; however, when he answers the second question it seems his conclusion have been manipulated in ways that can benefit the church without making them look double sided with their teachings. The second question is: Whether it is always sinful to wage war? In this question Aquinas states in his objection (1), 'It would seem that it is always sinful to wage war because punishment is not inflicted except for sin. Now those who wage war are threatened by our Lord with punishment; therefore, all wars are unlawful.'; (172) However, he justifies the act of war by giving three necessities. The first he mentions is only an au...

Saturday, October 12, 2019

Rose’s Breast Cancer in Jane Smileys A Thousand Acres :: Smiley Thousand Acres Essays

Rose’s Breast Cancer in A Thousand Acres Pete, representing erratic male rage in the novel, has a history of abusing Rose. This climaxes when he breaks her arm. It follows a terrible logic that since male rage hurts her body, so does her own, the impetus of which is provided by the patriarchal system. Ginny's description of Pete fits Rose equally well, with an anger that "would be quiet, but corrosive, erupting at odd times" (31). Rose's breast cancer symbolizes the way she is literally consumed with anger (the cancer eats at her flesh, consuming her body). Anger is the only way she knows to deal with her father, her husband, men and the system they represent: "We're not going to be sad. We're going to be angry until we die. It's the only hope."(354) She doesn't see that anger is destructive, that anger is in fact why things have turned out the way they have. She is continually reminded of the toll her anger takes on her body, as her arm unconsciously strays to the lost muscles under her other arm, by the lost breast. Nevertheless, she ignores the signs, anger has become a part of her body. The fact that this act resembles a posture signifying an attempt to contain her heart -her overflowing anger- suggests this, as does the fact that she especially does this when she is angry: "She pushed her hair back with her hand, then put her fist on her hip, defiant. Except that on the way down, her fingers fluttered over the vanished breast, the vanished muscles." (151) Her body, then, enacts her strategy. If you can't beat them, join them. If the system is based on egocentricity, cruelty, coldness and rage, then those will be her weapons. When Jess backs out of farming their land, she says: "When it came right down to building on something that we had, it scared him to build on death and bad luck and anger and destruction" (352). The underlying assumption of her statement is that it is impossible to challenge all the death and destruction, so one might as well turn it to one's own advantage. This strategy, ironically, turns her into what the patriarchy has accused hers and Ginny's intertextual counterparts -Regan and Goneril- of; an inhuman half-man. When she reigns supreme over the thousand acres, she has turned into her own worst nightmare: her father.

Friday, October 11, 2019

The Vampire Diaries: The Struggle Chapter Sixteen

Long ago, in the dark side streets of Florence, starving, frightened, and exhausted, Stefan had made himself a vow. Several vows, in fact, about using the Powers he sensed within himself, and about how to treat the weak, blundering, but still-human creatures around him. Now he was going to break them all. As he'd thought, the surge of Power had passed over Bonnie and Meredith and followed him, but it had receded again, and was now drawn back, waiting. He wouldn't let it wait long. Unencumbered by the burden of Elena's body, he broke into a predator's lope on the empty road. The freezing sleet and wind didn't bother him much. His hunter's senses pierced through them. He turned them all to the task of locating the prey he wanted. No thinking of Elena now. Later, when this was over. Tyler and his friends were still in the Quonset hut. Good. They never knew what was coming as the window burst into flying glass shards and the storm blew inside. Stefan meant to kill when he seized Tyler by the neck and sank his fangs in. That had been one of his rules, not to kill, and he wanted to break it. But another of the toughs came at him before he had quite drained Tyler of blood. The guy wasn't trying to protect his fallen leader, only to escape. It was his bad luck that his route took him across Stefan's path. Stefan flipped him to the ground and tapped the new vein eagerly. The hot coppery taste revived him, warmed him, flowed through him like fire. It made him want more. Power. Life. They had it; he needed it. With the glorious rush of strength that came with what he'd already drunk, he stunned them easily. Then he moved from one to another, drinking deep and throwing them away. It was like popping tops on a six-pack. He was on the last when he saw Caroline huddling in the corner. His mouth was dripping as he raised his head to look at her. Those green eyes, usually so narrow, showed white all around like those of a terrified horse. Her lips were pale blurs as she gabbled soundless pleas. He pulled her to her feet by the green sashes at her waist. She was moaning, her eyes rolling up in their sockets. He wound his hand in her auburn hair to position the exposed throat where he wanted it. His head reared back to strike – and Caroline screamed and went limp. He dropped her. He'd had enough anyway. He was bursting with blood, like an overfed tick. He had never felt so strong, so charged with elemental power. Now it was time for Damon. He went out of the Quonset hut the same way he'd come in. But not in human form. A hunting falcon soared out the window and wheeled into the sky. The new shape was wonderful. Strong†¦ and cruel. And its eyes were sharp. It took him where he wanted, skimming over the oak trees of the woods. He was looking for a particular clearing. Stefan ripped bloody strips out of his arms and heard Damon's answering scream of pain and anger. I'm not your weak little brother any more. He sent the thought down to Damon on a stunning blast of Power.And this time I've come for your blood. He felt the backwash of hatred from Damon, but the voice in his mind was mocking.So this is the thanks I get for saving you and your betrothed ? Stefan's wings folded and he dived again, his whole world narrowed to one objective. Killing. He went for Damon's eyes, and the stick Damon had picked up whistled past his new body. His talons tore into Damon's cheek and Damon's blood ran. Good. You shouldn't have left me alive, he told Damon.You should have killed both of us at once. I'll be glad to correct the mistake! Damon had been unprepared before, but now Stefan could feel his drawing Power, arming himself, standing ready.But first you might tell me whom I'm supposed to have killed this time. The falcon's brain could not deal with the riot of emotions the taunting question called up. Screaming wordlessly, it plummeted on Damon again, but this time the heavy stick struck home. Injured, one wing hanging, the falcon dropped behind Damon's back. Stefan changed to his own form at once, scarcely feeling the pain of his broken arm. Before Damon could turn, he grabbed him, the fingers of his good hand digging into his brother's neck and spinning him around. When he spoke, it was almost gently. â€Å"Elena,† he said, whispered, and went for Damon's throat. It was dark, and very cold, and someone was hurt. Someone needed help. But she was terribly tired. Elena's eyelids fluttered and opened and that took care of the darkness. As for the cold†¦ she was bone-cold, freezing, chilled to the marrow. And no wonder; there was ice all over her. Somewhere, deep down, she knew it was more than that. What had happened? She'd been at home, asleep – no, this was Founders' Day. She'd been in the cafeteria, on the stage. Someone's face had looked funny. It was too much to cope with; she couldn't think. Disembodied faces floated before her eyes, fragments And so tired. Better go back to sleep then. The ice wasn't really that bad. She started to lie down, and then the cries came to her again. She heard them, not with her ears, but with her mind. Cries of anger and of pain. Someone was very unhappy. She sat quite still, trying to sort it all out. There was a quiver of movement at the edge of her vision. A squirrel. She could smell it, which was strange because she'd never smelled a squirrel before. It stared at her with one bright black eye and then it scampered up the willow tree. Elena realized she'd made a grab for it only when she came up empty with her fingernails digging into bark. Now that was ridiculous. What onearth did she want a squirrel for? She puzzled over it for a minute, then lay back down, exhausted. The cries were still going on. She tried to cover her ears, but that did nothing to block them out. Someone was hurt, and unhappy, and fighting. That was it. There was a fight going on. All right. She'd figured it out. Now she could sleep. She couldn't, though. The cries beckoned to her, drew her toward them. She felt an irresistible need to follow them to their source. Andthen she could go to sleep. After she saw†¦ him. Oh, yes, it was coming back now. She rememberedhim. He was the one who understood her, who loved her. He was the one she wanted to be with forever. His face appeared out of the mists in her mind. She considered it lovingly. All right, then. Forhim she would get up and walk through this ridiculous sleet until she found the proper clearing. Until she could join him. Then they'd be together. The very thought of him seemed to warm her. There was a fire inside him that few people could see. She saw it, though. It was like the fire inside her. He seemed to be having some sort of trouble at the moment. At least, there was a lot of shouting. She was close enough to hear it with her ears as well as her mind now. There, beyond that grandfather oak tree. That was where the noise was coming from. He was there, with his black, fathomless eyes, and his secret smile. And he needed her help. She would help him. Shaking ice crystals out of her hair, Elena stepped into the clearing in the wood.

Thursday, October 10, 2019

Account for the continued existence of gender inequalities at work

Despite the laws and movements, women still do not enjoy equality in the workplace, in position or wages. In this essay I will discuss the origins of gender inequality in an effort to find out where this was first instigated. Initially I will talk about the historical motives of gender inequality and the work of the earlier women's movements and campaigns for equal rights in the early 1900's. I will then discuss various feminist theories of gender inequality, including recent government statistics. Finally I will conclude with my own viewpoints on gender inequality in the workplace in an attempt to discover why it continues to exist today. Ann Oakley 1981(cited in Haralambos and Holborn) gave a historical analysis of the changing role in society for women from before the industrial revolution in the 19th century to the 1970's housewife. Oakley says that men and women and also the children of the working class were employed in the factories. 1819 saw the beginning of the factory act that gradually restricted child labour. From 1841 to 1914 (the beginning of World War 1) women were seen as a threat to men and their employment. In 1852 women's employment was greatly reduced by The Mines Act which banned women from working in the mines, tradition said women should be in the home as a housewife and mother. In 1851 only 1 in 4 women were in paid employment by 1911 it was 1in 10. With the combination of these various acts passed and the growing restrictions on women's employment, more and more women began to stay at home but not by their own choice. Harolambos and Holborn 2000 p. 144) World War I saw many women return to the workforce while men were away fighting in the war; the economy needed women in the workforce even though they were paid less than they were worth. In February of 1918 the representation of people's act gave 2 Women the right to vote for the first time. Under this act only women over 30 were allowed to vote if they were householders, wives of householders, paying annual rent over i5, or graduates of British universities or women who were qualified although not graduates. About eight and a half million women were able to vote in the 1918 election. Women also became eligible to stand as MPs. Several suffragette campaigners stood for Parliament in the 1918 election. None were successful. Between 1914 and 1950 many women returned to work, but their primary role was still seen as that of the housewife/ mother, the industrial revolution had initiated many significant changes for women. Men were not happy about this as seen in the words of Jack Tanner: â€Å"We, as an organisation are opposed to the introduction of women as a general principal. â€Å"(Cited in Walby 1987). Braverman (1974) disagreed with Tanner saying there was a strong case for women being encouraged into the labour force, and that necessity for cheap unskilled labour was a requirement created by employers. Jack Tanner (at the time the leader of the Amalgamated Engineering Union in 1940) was doing his utmost to prevent women entering the male dominated workplace. The reason why men like Tanner should be so opposed to women to work in his male dominated union was not just because of their fear that women would work for fewer wages than men it was more a system of patriarchal objections which women's employment threatened to disrupt. Walby 1987 p2-3) 1970 saw the Equal Pay Act, which meant that women were to receive equal pay to men if they were employed to do similar work of the same value. In 1975 the Sex Discrimination Act was brought in to stop discrimination on the grounds of sex in employment, education and equal chances of promotion. Women in work i. e. paid employment have recently increased, between 1971 and 1997 (E. O. C. briefings, Work and Parenting) the percentage of women in work has increased so that women have now caught up with men in the labour market. The main reason for this is that more and more married women are going outside the home to work, although lone mother's statistics have dropped. (Harolambos and Holborn) 3 Sylvia Walby in Gender Transformations (1997) agrees with these findings, saying that since the 1980's integration of women in the male dominated workplace has increased dramatically, the number of women occupying higher ranking positions mainly in the professional and managerial careers has risen by 155% as opposed to a 33% rise by men. An increase in women's educational qualifications is seen as one of the main reasons for this remarkable boost to women's participation in higher ranking jobs. (Cited in Robinson and Richardson 1997) Norris (1987) says unquestionably women have always worked, but it is in caring for children and the elderly and the preparation and serving of food and looking after a household, known as unpaid labour, this has constantly been invisible in official statistics. One of the most significant changes for women in the labour force since the 1960's has been the percentage of women returning to the workforce and the decline of men's employment. Recently for every 6 men in paid employment there were 4 women, it has been predicted that these trends will continue to increase. However there are visible differences between some countries, in Scandinavia and North America, for example, women make up half the official labour force compared with less than a third in Spain, Ireland and America. In countries such as Canada Portugal and Norway the number of women in paid employment doubled. However in countries such as France, Britain and Germany, Women have been known to leave the workforce to start a family only to return in later years, this is known as the ‘M' curve. (Politics & Sexual Equality1987) Women in work i. e. paid employment has recently increased, between 1971 and 1997 the percentage of women in work has increased so that women have now caught up with men in the labour market. EOC briefings, work and parenting1997) The main reason for this is that more and more married women are going outside the home to work, although lone mother's statistics have dropped (Hood 1997) 4. Barron and Norris (Haralambos and Holborn2000) argued that there are 2 not 1 labour market as outlined below: Primary labour market is made up from good salaries, job security, good working conditions and good promotion prospects; secondary labour market is made up from lower paid jobs, less job security, lower working conditions and less opportunities of job promotion. These work side by side but it is near impossible for someone from the secondary labour market to be promoted to the primary labour market. Primary sector workers include professionals and managerial, highly skilled manual workers, secondary include unskilled and semi skilled workers manual and non manual workers. Dual labour market results from employers using these methods to keep the type of labour they require so incentives are offered to keep highly skilled in the workplace, secondary sector are seen as dispensable, easily replaced, no incentives for high wages, job security, or promotions is offered to them. The dual labour market can apply to both men and women but mainly women, who are seen as easy to replace and having no interest in learning new skills and less concerned with high wages. Men are still seen as the major bread winner and women's seen as having low status in society and not normally belonging to unions is one of the reasons why they are not as likely to aim for primary sector employment. Normally once a woman begins secondary employment there is little chance she will progress to the primary sector (Haralambos and Holborn 2000) Gender divisions and inequality has been linked to feminist campaigners who have tried to put an end to sexual discrimination and inequality in the workplace. The dominance of males throughout society is known as Patriarchy. Patriarchy explains gender and radical feminist explain male power. Radical feminists like Susan Walby in 1997 explains that ‘Patriarchy is seen as the primary form of social inequality' the domestic area is not the only one that women participate in. She shows how the idea of patriarchy is useful in explaining the relationship between women's restriction's in 5 he private and public area by showing that they work equally to achieve this dependence as well as maintaining patriarchy. Walby explains that it is men who are to blame for women's oppression; women are treated unequal because of their unwaged position in society and also because of household commitments. (Robinson and Richardson 1997) Recently in America there have been various discussions about the Glass Ceiling Syndrome and that there is a certain plateau that women can progress to in the workplace, then reach no further. Below are the three methods by which these are implemented; . Networking by word of mouth – most large companies fill vacancies through word of mouth connections, employees are sometimes identified and interviewed (at lunches, dinners or clubs) and then made an offer of employment outside normal working hours 2. Networking by Employee Referrals – an employee refers another employee from a group of (mostly) men mainly from within their own social group; this again does little for the promotional prospects of women. 3. Executive Search Firms – some companies use executive search firms to fill a large number of highs ranking jobs. Some companies have not made some of these firms aware of the equal opportunity obligations under the law. (www. theglassceiling. ) One of the projects that the government has recently introduced is the Work track Programme; this was said to benefit long term unemployed and to help them gain new skills and also to help them back into the workforce. It was said to be particularly beneficial to single parents (mainly women) with children as the family credit top up could be claimed. The downside of this was that it only lasted for 6 months. It created a false feeling of wealth and it was short term, the after effects are longer lasting. Personally I participated in this programme and although I thoroughly enjoyed my work experience it was very difficult to go back to income support. Many other non Work track jobs I applied for were not as flexible, wages were a lot lower and childcare was not as easily accessible, and there was also no follow on programme 7 either which would have been very helpful. On completing this Programme participants are informed that they will be ineligible to partake in any other Worktrack courses for the next three years. Personally I believe this is very unfair, on one hand he government is giving long term unemployed the opportunity to get a taste of what it is like to get back into the labour market, many of the women in this project had not worked for a long time either because they had stayed at home to raise a family or because of lack of skills or educational qualifications and just when they believe they are getting out of the poverty trap the government takes it away from them. Basically it looks to me like another way for the government rigging the unemployment benefit statistics to look as though there are more women in employment than there actually is. Unfortunately I can only account here for some of the reasons I believe exist for the continued gender inequality in the workplace today, in my remit of 2000 words it would be impossible to cover everything. It is, I feel significant and ironic that it had to be a woman, Ann Oakley, who undertook the first ever study on women and housework, she was incidentally told by her boss (probably a man) ‘to go away and come back with a proper topic'. (Harolambos and Holborn 2000)) In my research for this assignment I have to confess to feeling at times more than a little angry at the blatant and visible discrimination of women in the workplace down through the years. Gender equality in the workplace is still a myth that I personally believe will not be solved in the immediate future, although it has certainly improved in past few decades. I acknowledge that men have been somewhat discriminated against also but nowhere near the same level that women have been and not for such a long period of time. In an ideal world men and women would share equal rights, equal pay and equal status in all societies.