Monday, September 30, 2019

Engendering violence Essay

Violence could occur in various ways and in different levels. It may happen in the form of physical, sexual, verbal and psychological abuse, and could be inflicted by any individual, groups, institutions or nations. Whatever form of violence is inflicted, it could threaten the body of the violated person in the most complex way (Jarvis, â€Å"world of the body†). The society today is not new with the issue of violence. Every now and then, the media is consistently reporting events that are inhumane. Although violence could occur among different people, it has been well identified that the prevailing cases of violence are those that are gendered-based. Before one could fully identify gender-based violence, it is an imperative to clarify various definitions that are centered to the area being studied. It should be well understood that the usage of the words gender and sex are needed to be given identification in order to fully understand gender-based violence. In many cases the words gender and sex are used alternately; however there is a distinction between the two words. Sex is often referred to as the differences in the physical aspects of males and females while gender is known to be the roles of the males and females that are socially-prescribed. Such gender roles are acquired through the process of socialization (Ward, 2002 qtd in Benjamin and Murchinson 3). While the physical differences between male and female is persistently identified to be something that is easily distinguished and could be possessed in common, the gender roles are wide range and could be found in different aspects of an individual’s life and may apply in various aspects such as access to various resources, responsibilities that are public and private or even during the period of courtship. Although gender roles could be altered in the long run, it should be well understood that these gender roles reflect the position of men, women and children in the society (Benjamin and Murchinson 3-4). Based from these roles, gender-based violence could be identified as a form of violence that is done to an individual in accordance to the role he or she played within the society. Although such violence could also be directed among men, gender-based violence is prevalent among women and girls. The violence inflicted to females intends to empower hierarchies and strengthen gender inequalities (Benjamin and Murchinson 4). The term gender-based violence is now taking a new context where in it tends to examine and deeply understand the violence against women and discusses the role of gender in inflicting the violence. The power of gender relations always place women in a more disadvantaged position compared to their male counterparts. Gender-based violence place women at a level where they have less access to resources, information, decision making, benefits and have lesser hold on their rights. Aside from these, gender-based violence are also closely related to violence against women and girls because of the involvement of the idea that women are the subordinate gender in the society (UNIFEM 2-3). In various nations, women and girls are victims of myriads of forms of violence. Most of the cases of violence were not done randomly. The victims became the targets of the perpetrators because of the reason that they are females. Among the many forms of violence, sexual violence specifically rape is the most commonly inflicted among women. All sexual assaults are done out of aggression, despite of the gender and age of the victim. The primary motivation of the assailant to carry out rape is not centered towards satisfying a sexual desire or an issue of sexual deprivation from the past rather the perpetrator inflicts rape in order to express their power over somebody (Groth qtd in New York City Alliance against sexual assault, â€Å"Factsheets†). In most cases of female rape the act of violence was predominantly done by males who all come from socio-economic classes, racial or other ethnic groups. All through out the world, rape is often directed towards women because of their gender, regardless of their age, ethnicity or political affiliation (UNIFEM, â€Å"violence†). In the United States alone, it was reported that a woman is raped every two minutes. Just in 1995, the number of women who were raped or sexually assaulted reached over 354,670. The risk factors for initiating rape were accounted for early sexual experience, stereotyping which include the negative attitudes of males toward females, consumption of alcohol and the acceptance of rape myths (â€Å"American rape statistics†). In addition, during war and civil conflicts gender-based violence such as rape and sexual abuse were done in order to attack the morale of the enemy including men and women. For others gender-based violence was also conducted as â€Å"spoils of war. † (Benjamin and Murchinson 5) During the 1994 Rwandan genocide, sexual violence, especially rape was directed or encouraged by the Hutu Militia groups in order to strengthen their goal of destroying the whole Tsutsi clan. At this point in time, the violence was directed towards the Tsutsi women due to their gender and ethnicity. Furthermore, the sexuality of the Tsutsi women was also regarded by the Hutu’s, who were the genocide perpetrators, as a medium that could be used by the Tsutsi community to infiltrate the community of the Hutus. Because of this reason, the propaganda of sexually violating the Tsutsi women became prevalent in order to dehumanize and subjugate the Tsusti community as a whole. Aside from the Tsutsi women other Hutu women were also targeted for rape by their own tribesmen because they were associated with Tsutsi men who are considered as an opposition (Norwojee, â€Å"Shattered lives†). During the conflict in Bosnia-Hercegovina, Muslim women were raped and sexually abused as a part of the so-called â€Å"ethnic cleansing† for the establishment of the Greater Serbia, which is said to be ethically pure. On the basis of investigations, it was estimated that over 20,000 women became the victims of rape and sexual abuse. It was also documented that the rape was directed among the women in order to impose humiliation among the victims, their families and the community where they belong (WomenAid International, â€Å"EC investigative mission†). Much has been written about the prevalence of rape and rape reporting among females. However, it was stated earlier in the study that gender-based violence could also occur among males. In the case of rape, males are often disregarded about the issue because of the social context that males are the initiators of the sexual act, or if not they are considered as the dominating gender and that the women should be take the submissive role (Gagnon and Simon, 1973; Schneider & Gould, 1987 qtd in Duncan and William, â€Å"Gender role,† 1). Despite this traditional sexual script, male rape is also very much similar to female rape. The most common perpetrators of male rape are also males, yet on a larger scale, the involvement of female as accomplices or perpetrators were also reported. In 2002, it was documented that out of eight rape victims, one of those involves a male (RAINN, 2003 qtd in Stanford’s men against violent group, â€Å"male rape†). More often than not, male rape is one of the many violence issues that are least discussed in the society. This is because such issue is often interpreted as an extension of the life in prison and is often regarded as a part of the homosexual subculture (Kaufman et al. , 1980 qtd in Pino and Meier, 1). However, what people do not recognize is the fact that male rape survivors include not only homosexuals but also heterosexuals, teenagers, homosexuals and children. Case research even suggested that males also experience the same reactions felt by females. Alongside with the feelings of depression, anger, self-blame, guilt, sexual dysfunctions, vulnerability and emotional distancing, male rape victims also have to endure unsympathetic attitudes from people even their friends, family and acquaintances (Brochman, 1991 qtd in New York City alliance against sexual assault, â€Å"Factsheets†). Likewise, it was also reported that males are more likely to become victims of multiple aggressors, yet the assailants could inflict sustained physical trauma and male victims could be held as captives for a longer period of time compared to their female counterparts (Kaufman et al. , 1980 qtd in Pino and Meier, 1).

Sunday, September 29, 2019

History of AIDS Essay

AIDS is a disease that destroys a person’s immune system. AIDS is a blood born pathogen. It was originally only found in gay men. This led to people calling it the â€Å"gay men disease. † They use to think that this was punishment from God for their being gay. Then researchers found out some drug users were also getting the HIV virus, which leads to AIDS, from sharing needles. After that, it was referred to as the â€Å"gay man and druggy disease. † All of the labels AIDS has been given are completely wrong; even heterosexual, sober people can get AIDS. Considering the many ways of contracting HIV/AIDS it seems foolish to limit the causes to sex and drug use. Jonathan Mann wrote: We do not know how many people developed AIDS in the 1970s, or indeed in the years before. We do now know that the origin of AIDS and the virus HIV was probably in Africa. What we also know is: â€Å"The dominant feature of this first period was silence for the human immunodeficiency virus (HIV) was unknown and transmission was not accompanied by signs or symptoms salient enough to be noticed. While rare, sporadic case reports of AIDS and sero-archaeological studies have documented human infections with HIV prior to 1970, available data suggest that the current pandemic started in the mid- to late 1970s. By 1980, HIV has spread to at least five continents (North America, South America, Europe, Africa, and Australia). During this period of silence, spread was unchecked by awareness or any preventive action and approximately 100,000-300,000 persons may have been infected. (qtd in â€Å"History†) The first awareness of AIDS was in June of 1981, when they found traces of PCP in five men in Los Angeles, California. This event occured when they believed only gay men could get the disease, so they were not worried about it spreading to heterosexual people. This was all also before the method of transmission was known; they thought a person could catch it if he or she were standing to close to someone who had the disease. In December of 1981 the first cases of AIDS were reported in intravenous drug users. In 1982 AIDS was still nameless. People started calling it numerous names, such as â€Å"Gay Compromise Syndrome,† â€Å"GRID (gay-related immune deficiency),† â€Å"AID (acquired immunodeficiency disease),† â€Å"gay cancer† and â€Å"community-acquired immune dysfunction. (â€Å"History†) Later that year, reports emerged of children and transfusion recipients getting AIDS. Everyone knew this was no longer a gay related disease. Persons who may be considered at increased risk of AIDS include those with symptoms and signs suggestive of AIDS; sexual partners of AIDS patients; sexually active homosexual or bisexual men with multiple partners; Haitian entrants to the United States; present or past abusers of IV drugs; patients with hemophilia; and sexual partners of individuals at increased risk for AIDS. qtd in â€Å"History†) This was the message that CDC (Center for Disease Control) sent out when researchers discovered that AIDS was spread through body fluids. It was not until March 1983 that researchers discovered this. Between 1987 and 1992 there were many prevention groups created. ACT-UP (the AIDS Coalition to Unleash Power) was founded to attempt to end the AIDS crisis. â€Å"On April 2, 1989, Hans Verhoef, a Dutch man with AIDS, was jailed in Minnesota under the federal law banning travelers with HIV from entering the USA. †(â€Å"History†) In July of 1990, Kimberly Bergalis was infected with HIV by her dentist, David Acer. The CDC would not believe Kimberly, they didn’t think this type of infection was possible. Her father kept telling the CDC that Kimberly would not back down, thus by the end of it all the CDC supported her conclusion. Early in 1991, the CDC confirmed that the same dentist infected two other patients. In the fall of 1991 Kimberly requested mandatory HIV testing for all health care workers, so that â€Å"others don’t have to go through the hell that I have. (â€Å"History†) A few years after the CDC chose not to do the mandatory testing, Kimberly Bergalis died. In 1991 Earvin (Magic) Johnson announced that he was HIV positive; he then retired from professional sports. He wanted to use his celebrity status to educate kids about the disease. He also said, â€Å"I think sometimes we think, well, only gay people can get it – it is not going to happen to me. And here I am saying that it can happen to anyone, even me Magic Johnson. † (â€Å"History†) In 1992 the FDA(Federal Drug Administration) approved the use of two drugs combined, it was the first combination of drugs that was successful. This new drug is not a cure, but it constitutes an important addition to the expanding group of antiviral drugs currently available, including AZT and DDI, for treating people with AIDS. † stated James Mason. (â€Å"History†) On December 1, 1993, World AIDS Day, Benetton and ACT UP Paris put a giant condom (22m x 3. 5m) in the time square equivalent in Paris to raise awareness of the disease. (â€Å"History†) One of the television ads, entitle Automatic, features a condom making its way from the top drawer of a dresser across the room and into bed with a couple about to make love. The voice-over says, ‘It would be nice if latex condoms were automatics. But since they’re not using them should be. Simply because a latex condom, used consistently and correctly will prevent the spread of HIV. ’ (qtd in â€Å"History†) This was a commercial that attempted to make men wear condoms to keep the HIV virus from spreading. If a man wears a condom it will reduce the chance of the woman contracting the virus. In 1994 scientists found a medication that reduced the spread of HIV from mother to infant by two thirds. This was the first sign that mothers can decrease the spread of HIV to their children, and maybe stop it all together. In 1996, a heavyweight boxer was tested positive for HIV before a fight. This was his reaction: â€Å"I thought AIDS was something that happened to gays and drug addicts. A macho guy like me who loves ladies and super fit – he doesn’t get AIDS! † stated Tommy Morrison. (â€Å"History†) In his State of the Union address on 28th January, US president George Bush proposed spending $15 billion in combating AIDS in Africa and the Caribbean over the next 5 years. He called the scheme ‘a great mission of rescue’. â€Å"This comprehensive plan will prevent 7 million new ‘AIDS’ infections, treat at least 2 million people with life-extending drugs, and provide humane care for millions of people suffering from AIDS, and for children orphaned by AIDS. †-President Bush Just two days later, US Health Secretary Tommy Thompson was elected as the new chairman of the Global Fund for HIV, TB and Malaria. It was hoped this move would prevent a conflict between the Bush administration and the international health community. (qtd in â€Å"History†) Symptoms of AIDS include; heart infections, intestine infections, and other infections that are uncommon. When a person has AIDS he or she gets very uncommon infections that a healthy immune system could fight off. Since his or her immune system slowly gets destroyed he or she can’t fight off infections and viruses that most people can. The most common cause of AIDS is sexual transmission. This can be between two men, two women, or heterosexual intercourse. The second highest cause is being exposed to blood borne pathogens. This can happen from blood donations, or just having open wounds. This however cannot happen from close contact, like some people believe. The least likely way to contract the virus is from mother to child, because we now have drugs that make it so less than one percent of children will get it from their mother. AIDS is a disease that will completely destroy your immune system. It attaches to your white blood cells and keeps them from doing their job. White blood cells would normally fight off any infection that get into your body, but when the HIV virus changes to AIDS it will block the receptors from the message your brain sends saying to attack this bacteria. This means AIDS does not kill you, rather the illness AIDS won’t let your body fight kill you. There are many ways to prevent AIDS, the most effective way is abstinence. If you are not sexually active, you cannot get an STI. However, if you feel you have to have sex use a condom. Not only does it prevent unwanted birth, but it will also reduce the transmission of STIs. (â€Å"CDC†) The importance of condoms in the fight against STDs is readily apparent, whether one focuses on the past, the present or the future. But condoms clearly have not been used as widely as they must be to significantly slow the spread of infection. One solution is the greater promotion of condoms through advertising, education and public-awareness campaigns. We believe another necessary step is to improve condoms – making them more user-friendly, sexy and pleasurable. (qtd in Pinkerton) Another way to prevent the spread of AIDS is to avoid infected blood. So if you are a doctor working on an HIV positive patient, wear rubber gloves. Also, if you are HIV positive, don’t have sexual relations with multiple people, and tell them if you are going to sleep with them. The least you can do is let them know they are risking their lives. William B. Kaliher has investigated cases of venereal disease for more than twenty-five years. In the following viewpoint, Kaliher asserts that while it is mandatory for health departments to find and notify the sexual partners of patients with venereal disease, partner notification in HIV cases is not mandatory. He argues that partner notification is especially important in HIV/AIDS cases, however, as AIDS is always fatal. Without mandatory notification, he contends that those who have HIV can continue to infect other people. If people with HIV/AIDS are notified that they may be infected, they can get tested. qtd in Kaliher) In this society, two things are very clear. The government is not making decisions in the best interest of the public health. The government is also not utilizing every tax payer’s dollar; they are not doing as much to prevent the spreading of AIDS as they can do. Also another way of preventing the spread of AIDS would be to educate the people most likely to spread the disease. The health official could do this by going into the areas where drug users live, and tell them that if they share needles they are at risk of dying earlier than normal people are. They could also talk to the prostitutes in Las Vegas, the women who are with ten, fifteen, or twenty men a night. They could tell them not only are they at higher risk for spreading the disease, but they could also spread it to hundreds of other men. (Kaliher) There is no vaccine against HIV, and no cure for AIDS. The key to decreasing the spread and reducing the impact of this disease is to promote healthy behaviors that prevent infection or minimize the adverse effects of treatment. Health promotion, disease prevention, and symptom management are key components of the research conducted by the biobehavioral scientists supported by the National Institute of Nursing Research (NINR). The Institute funds both domestic and international HIV/AIDS research programs. (qtd in NINR) There are also many myths about AIDS. First of all AIDS is not just the gay men disease. Anyone can contract AIDS, and not a lot of people try to prevent spreading it. Like the saying â€Å"gay as AIDS† that statement is very inaccurate. AIDS is present in many heterosexual peoples’ lives. Also AIDS is not only in drug addicts who share needles. Someone cannot call AIDS the druggy disease or the gay men disease just because they were some of the first people to have it. The solution to the myths about AIDS is to increase awareness on all of the aspects of AIDS. People need to know that people can get AIDS from more than just sharing needles and having gay sex. People can catch AIDS from their mother when they are born or being breast fed, people can catch it from having heterosexual sex, and people can also catch it when they receive a blood donation from an infected donor.

Saturday, September 28, 2019

THE IMPORTANCE OF EMPLOYEE EMPOWERMENT IN THE GLOBAL WORLD Essay

THE IMPORTANCE OF EMPLOYEE EMPOWERMENT IN THE GLOBAL WORLD - Essay Example The logic behind employee's participation and empowerment is quite simple: by involving workers in those divisions that affect them and by increasing their autonomy and control over their work lives, employees will become more motivated, more committed to the organisation, more productive and more satisfied with their jobs. Empowerment is the authority to take decisions within one's area of operation without having to get approval; from anyone else. Here the operatives are encouraged to use their initiative to do things the way they like. To this end, the employees are given not just authority but resources as well so that they not only take decisions but implement them quickly. This empowerment means giving the employees the authority to make decisions and providing them with financial resources to implement these decisions (Koch & Godden, 1997 11). Employees participation and empowerment participation means sharing the decision making power with the lower ranks of an organisation in an appropriate manner (Lashley & McGoldrick, 1994, 35). When workers participate in organisational decisions they are able to see the big picture clearly and also how their actions would impact the overall growth of the company. They can offer feedback immediately based on their experiences and improve the quality of decisions greatly. Since they are now treated with respect, they begin to view the job and the organisation as their own, and commit themselves to organisational objectives whole heartedly. 3. Creating an Empowerment Culture Organization culture depends basically on its history, technology, industry, custom and practice, leadership style organization structure etc. All organizations are unique and therefore have unique cultures. However, if one examines the attributes of the majority of industrial organizations, there are a number of traits that are seen as desirable for effective organization. First, no organization can be isolated from cultural environment, that is, organization as a social unit must operate within the framework of the larger cultural system. As such, a congruency has to be maintained with the values of total culture. Second, organization may be considered as a subculture within the framework of total broader culture. No doubt, every organization develops its own norms and cultural pattern of behavior; these elements are developed within the context of the larger cultural pattern. No part of the system should go against it if both have to succeed. From this point of view, the creating an empowerment culture is important for the functioning of a modern organization. A model for understanding organizational culture is: Which effect

Friday, September 27, 2019

The Summary & Strong Response Essay Example | Topics and Well Written Essays - 750 words

The Summary & Strong Response - Essay Example It is also a fact that parents force their children to win in order to realize their ambitions to win. While it is important to have competitive skills in adult life, parents decrease the quality of childhood experiences. Statsky states that sport games are very selective and they do not let all children to participate. The fear of failure is supported by this selectiveness as all children become afraid of being worse than others. Finally, the author suggests that it is better to focus on skills to cooperate with other children until children are psychologically ready to compete. The article by Statsky touches upon very important issues, which exemplify how parents make their children grow up too quickly. Pieces of evidence she provides draw a comprehensive picture where childhood seems to different from what it should be. When a 7-year old boy makes himself vomit, children hit each other or fear to lose the game, it means that something is going wrong with sport activities they join. Basically, children are forced to compete instead of enjoying the process of playing and communicating with each other. Young children learn to meet the demands established by adults to master their performance in sports. Children have to face the ugly reality where the winner takes it all and it often makes them suffer. They need to show that they are the best to make their parents feel proud of them or demand rewards for their achievements. At the same time, they have to stand the fear and the stress after the communication with their coaches, which is not always friendly. Even though Statsky mentions that Little League coaches have to attend psychology workshops to regulate their ambitions and be more sensitive to children, the reality shows that they do not rush to follow those guidelines. In most Hollywood movies about sport competitions, coaches are depicted as irritated, shouting and strict people.

Thursday, September 26, 2019

Adolf Hitler was evil but not monstrous Research Paper

Adolf Hitler was evil but not monstrous - Research Paper Example itler, it is clear that the urge to establish peace and salvage Germany at a moment of crisis drove him to perpetrate the crimes that jeopardized his good reputation as an intelligent leader. In reality, his main aim was to streamline the economy of the country and make Germany a super power. In this effect, Adolf Hitler was an evil but not a monstrous leader. The evil side of Hitler is more pronounced than his good side in regard to his use of power within the time he led in Germany. Roberts notes that Adolf Hitler was an evil leader who fled the war that would span across the whole world and end in the worst suffering of human beings. Robert terms the First World War as â€Å"†¦ one of the worst crimes mankind has ever committed, the Holocaust† (7). In this war, over ten million of human beings lost their lives and many more became victims of suffering. His role as an army in the war depicts him as one of the most evil persons who was pleased with the suffering of the human beings. It is during the period of the war that Hitler started his anti-Semitism movement, which culminated into the suffering of the Jews. From this angle, it is clear that Hitler was a man who did not fear participating in evil. When Hitler gained political power in Germany, he perpetrated a lot of evil against human kind. His discrimination of the Jews depicts him as one the most evil leaders that could do anything to pursue his goals. Over the history of Germany, the people had a presumption that the Jews backstabbed the country and that they were the unloyal lot that betrayed the country. Roberts notes that â€Å"the idea that Jews had stabbed Germany in the back†¦. Was a lie† (14). However, Hitler’s reaction to this rumor was severe and especially on the part of the Jews. He formed concentration camps where he ordered the torture of Jews in a situation that was worse than any prison. In these camps, the Jews were starved and the quantity of food that they ate was just enough for

Wednesday, September 25, 2019

How to keep a romantic relationship in long distance via social media Essay

How to keep a romantic relationship in long distance via social media and phones - Essay Example This paper explains the various theories that have been proposed to hinder long distance relationships and how in my interpersonal encounters, they have been overcome. Relationships for different people have different meanings. Most people get invested in the other person too early in the relationship and end up giving up when things do not go the way they want to. The key to a successful relationship is keeping a check and balance on your expectations. The rest of the necessities can be taken care of by the various mechanical devices that have been invented and discovered for the ease of communication. My romantic relationship has been going strong since the last five years, thanks to the efficient communication with the help of social media and mobile phones. It has been postulated that most of the difficulty arises in being unable to see your partner. This is because it fosters uncertainty, which may lead to distrust and disloyalty, and spoil the relationship sooner or later. This complication usually arises either during the early phases of a relationship, when the feelings of apprehension and skepticism may take over logic. It may also arise over a span of few years, since partners tend to get tired of long distances over long spans of time and need a way to either reduce the distance, time, or suffer termination of the relationship. Phones are an important means of bridging this gap, as are increasingly popular internet applications such as Skype, Viber, imo, etcetera. If you designate a particular time in the day when you can use either of these to have some time conversing with the person you are involved with, or share precious moments ranging from birthdays and anniversaries, to joys and sorrows such as getting employment or losing a family member. The face to face communication offers not only a way out for the frustrations that result due to the distance, but also eases doubts that result due to the social expectations out of a

Tuesday, September 24, 2019

Reaction paper Essay Example | Topics and Well Written Essays - 500 words - 17

Reaction paper - Essay Example What is more, the Algebra Project’s exclusive approach to school restructuring deliberately builds up worthwhile student-focused models by constructing partnerships of stakeholders in the neighboring communities, especially the traditionally underserved populace. Ever since 2000, the Algebra project persistently afforded the environment in which schools, students, parents as well as communities took ownership of their own community development, mathematics education reform efforts, furthermore, made the most of local reserves, which now consist of middle and high grade schemes. In addition, the civil rights efforts in the 1960s concluded in the nationwide reaction to defend a basic right: the right to vote. Therefore, the Algebra’s Project present work looks for a nationwide response to institute a basic right: the right of each child to quality public school edification. Dr. Robert P. Moses is a renowned MacArthur Award-winning educator as well as a civil rights campaigner. Additionally, He is the Founder as well as President of the Algebra Project Inc, a nationwide nonprofit devoted to enhancing the mathematical accomplishment of traditionally underrepresented communities as well as students. In addition to that, in his youthful adult life, Dr. Moses was the director of SNCC’s Mississippi Project Student Non-Violent Coordinating Committee (SNCC), as well as the chief coordinator for the civil rights lobby group as field secretary for the SNCC. Additionally, He was the motivation at the back the Mississippi Summer Project of 1964 in planning the Mississippi Freedom Democratic Party (MFDP), which confronted the Mississippi regulars at the 1964 Democratic Convention. As of 1969-1976, he worked for the Ministry of Education in Tanzania, East Africa, where he served as chairperson of the math department at the school. Dr. Moses came back to the U SA in 1976 to carry on with his doctoral

Monday, September 23, 2019

Response to ''why can't Ex-Felons vote Essay Example | Topics and Well Written Essays - 500 words

Response to ''why can't Ex-Felons vote - Essay Example Loss of political voice is the worst type of oppression citizens may be exposed to. They are no longer able to choose the leaders they desire. In such states therefore, the statutes governing the right to vote should be amended so ex-felons regain eligibility to vote. This will restore the political voice of crime-hit districts. The restoration of rights to vote should not be left to depend entirely on the governor, as this will mean that not all ex-felons will be allowed to vote. Looking back in history, disenfranchisement laws were crafted to bar blacks with even minor criminal record from polls and this brings about the issue of racism. This limits blacks from exercising their right to vote and such laws should be made more reasonable so that even states populated by blacks do not lose their voice in American politics with time. In any nation that believes in democracy, ex-felons should be allowed to vote as this leads to bitterness and alienation. Sometimes these people have honestly transformed yet no matter what they do, they are not allowed to contribute to the politics of their nation. Such people end up going back to crime as life with the restrictions of an ex-felon is unbearable. It is only fair therefore if they are allowed to vote. This issue has been confused as partisan between the republicans and democrats, with each group having different views, as it is clear to them that restoration of voting rights to these people will change the political alignment. However, this should not be the case in a democratic nation. In the law of any nation, and this includes America, voting is a basic human right and not a privilege. This right essentially defines one as a citizen of a specific nation. When ex-felons are denied the right to vote, then they can no longer be described as citizens, they are therefore

Sunday, September 22, 2019

Operations Management Essay Example | Topics and Well Written Essays - 2000 words - 19

Operations Management - Essay Example These two areas are among the objectives of operations management. The analysis of the company will use operations management tools and techniques that include standard operations positioning tools that are the 4vs, performance tools and transformation process. In addition, the report will look at capacity measurement techniques and operations improvement tools. Finally, the report will highlight the recommendations that can help improve the condition of RWE npower Company. Operations management is an art and a science of guaranteeing successful creation and delivery of goods and services to the customers (Collier and Evans, 2010, p.3). It involves managing inputs which are the resources through a transformation process to deliver outputs that are the goods or services (Rowbotham, Azhashemi and Galloway, 2012.p. 2). Processes refer to the many different ways of producing a product (Poonia, 2010, p.6). Operations management is the key to realizing competitive benefit for a company whether it is in manufacturing or service industry (Williams, 2012, p. 1). It addresses issues that an organization faces in its choices of products, production technology, utilization of capacity, preservation of quality, costing and sourcing of materials and client handling policies (Mahadevan, 2010, p 7). RWE npower is among the five leading electricity and gas companies in Europe. The company is number 3 and 5 in terms of sales in electricity and gas respectively. The company has other market segments in Czech Republic, Netherlands, and Germany and in the UK where it’s among the top suppliers of fuel. In addition, the company has leading positions Central Eastern and South Eastern Europe markets (RWE Corporate Website, 2015, p. 1). The company specializes in four business areas namely, RWE npower Company has a market positioning statement that reads â€Å"The Energy to Lead†. The company has

Saturday, September 21, 2019

Banjo Paterson Biography Essay Example for Free

Banjo Paterson Biography Essay Andrew Barton Banjo Paterson was best known as a poet and author. He became the most popular poet in Australia. He was best known for the ballad Waltzing Matilda and his book called The Man from Snowy River and Other Verses. Banjo Paterson was born at Narrambla in New South Wales. He was the eldest of seven children. Banjo had one brother and five sisters. His parents names are Andrew Bogle and Rose Isabella Paterson, he had a Scottish heritage. Banjos parents were graziers on the Illalong station in the Yass Districts. Most of Banjos life was spent on the family property, but when he was ten his parents sent him to live with with his grandmother in Sydney, for educational reasons. Banjo Paterson was an accomplished equestrian (horse rider), and polo player. When Banjo was young he was educated by a governess. Once he was able to ride a pony he went to a bush school in Bingalong. When he was living with his grandmother in 1874 he was sent to Sydney Grammar School and in 1875 he shared the Junior Knox Prize with George Rich. He completed school aged 16 and enrolled at a university but failed the examination. When Banjo Paterson was a law student he began to write verses. His first poem that he wrote was called El Mahdi to the Australian Troops, which was published in the Bulletin in February 1885. He later adopted the pen name The Banjo, which was taken from the name of a station racehorse that was owned by his family. He later became one of the Bulletin writers and artists. Angus and Robertson published Banjo Patersons first book, The Man from Snowy River and Other Verses, in October 1895. The launch of this book was very successful, it sold over 7000 copies in just a couple of months. While in Queensland on a holiday late 1895, Banjo stayed with friends. This is where he wrote Waltzing Matilda which later became one of Australias best known folk song. Banjo Paterson travelled to South Africa in 1899 as a special war correspondent for the Sydney Morning Herald during the Boer War. In 1903 Banjo was appointed editor of the evening news, he held that position until 1908 when he resigned. In 1903 Banjo married Alice Walker in Tenterfield. Their first home together was in Queen Street, Woollahra. They had two children, they were named Grace and Hugh. Grace was born in 1904 and Hugh was born in 1906. During World War One Banjo sailed to Europe hoping for an appointment as war corespondent. Instead he was an ambulance driver to the Australian Voluntary Hospital in France. He was eventually promoted to Major. When Banjo was back in Australia he went back to journalism and retired in 1930. Later in 1939 Banjo was created CBE (Commander of the Order of the British Empire). He passed away due to a heart condition on the 5th of February 1941, it was just 12 days before his 77th birthday. His reputation as the principle folk poet of Australia was secure, Banjos work included seven volumes of poetry. Banjo Paterson was not only known for Waltzing Matilda, but also for his attempt to improve the lives of his fellow Australians by exposing their hardships to the public. Banjos role in Australian culture has been celebrated by placing his face on the $10 note. His poems are still being published and are still selling.

Friday, September 20, 2019

Online Shopping System (OSS) Application Development

Online Shopping System (OSS) Application Development CHAPTER ONE Introduction 1.1 Introduction: Nowadays, shopping online is occupying an essential part of shopping, big and small companies or stores need to have its commercial website ,any serious business can`t be improved and reaches all over the world unless it has web site, even most families, clubs and pet snakes do, too. Having a web site gives people around the world opportunity to know your business or provided services. It can spread your business so fast, therefore you can achieve success. Its easier for everyone to do shopping online and buy what needed without moving from their home. Also another reason let people buy online, is that one line grocery stores have a wider range of products and various kinds of the same products whereas the online ones don`t have. 1.2 The Project Objectives: The Online Shopping System (OSS) is a web-based application. The purpose of the application is to automate and facilitate the whole process of shopping. This application fixes the limitation and problems of paper based processes. The main goal to increase the quantity of sales by making the new technology of web pages design more attractive and to search a lot of customers and company to their location. By this system we can advertise and send procure to a lot of customer by sending email. 1.3 The scope of the work is: The scope of this work is to design, develop, and test the application according to the time table using Microsoft Access database and Visual Studio 2008. In addition, we will need to use Some Designer software to design the interface and system logo and photos. 1.4 Project Organization: The project is made up of four chapters, besides chapter one (The Introduction and the Objective of the project and finally the project scope) the project is consists of the three chapters are as following:- Chapter Two: in this chapter we will talk about an introduction to the project of what is E-shopping with its advantage and disadvantages, and a comparison between e-shopping traditional shopping. Chapter Three: in this chapter we will talk about requirement, use case and graphical user interface (GUI) design, and also coding. Chapter Four: in this chapter we will talk finally about the conclusion and future work to our project and how to improve. Chapter Two Online Shopping System (OSS) 2.1 Introduction: This chapter presents E-shopping, E-shopping is an easy way to buy your grocery. It can be very effective for the working mothers since they can do all of their shopping easily, they can do it at any place. Online grocery shopping may have unique foods or equipment that your local grocery store doesnt have. An online shopping aims at making shopping comfortable and enjoyable process. 2.2 E-shopping E-shopping is an online grocery store that delvers your food supplies. Its also 24 hour open shopping-shopping considers as the innovative and creative way for shopping. Shopping is no longer needs to waste time and efforts. E-shopping is a successful business in the present days, every product should have its own website, it is the best way to find what you need, these web contains all kinds of grocery stores, that provide you all your needs in a shorter time, the price maybe higher to some extinct, but it can`t be disadvantage since prices differ from place to place and between groceries in the same town. 2.2.1 Advantages: E-shopping has various advantages, it widens the range of target customers. It helps people to find what they need by just pressing a button, also they wont need to drive all the way to the grocery store and deal with traffic and other stuff. Online shopping website serves as the engine for spreading the goods and services. 2.2.2 Disadvantages: E-shopping has its disadvantages which may lack of some targeted quality or these products don`t comply with its promotions. The setup time (first time apply E-shopping) could be one of disadvantage of OSS. 2.3 Compression: The differences between E-shopping and traditional shopping are the following: traditional shopping E-shopping You need to carry the purchased products You neednt carry the purchased products you have to go through the traffic and the parking, experiencing a lot of difficulties You just click on a button then you deliver what you need. You have to deal with the casher line and that always takes time. Saving time and effort and avoid you dealing with cashers. Table (2.1) the differences between E-shopping traditional shopping Chapter Three Analysis, Design Implementation of proposed system 3.1 Introduction: This chapter represents an overview of the system requirements needed to achieve the goals of the study, including description of software requirement, system diagram and use case. 3.2 System Requirements The proposed system needs the following Requirements: Interface Requirements The system will be professional in its appearance and it has a user-friendly interface for the user to input the relevant data and obtain the corresponding results. Usability Requirements a. Ease of use The system will be able to be used quickly and easily. It will be forgiving if an error is made and will ask for confirmation before entering into a timely process. b. Ease of learning. This system will be easy to learn for a novice user. c. Accessibility requirements. It is not currently planned to add accessibility to the application (e.g. large font for the visually impaired). Performance Requirements a. Speed and latency requirements The system will produce a viable Order within a reasonable amount of time and provide feedback on the progress. b. Safety critical requirements There are not felt to be any safety critical requirements for this system. c. Reliability and Availability requirements This program will be available either through the web or on a machine. e. Robustness requirements The program will have sufficient error handling abilities that it will not crash any other part of the system. f. Scalability or extensibility requirements The program will be able to handle a Sales shop with up to 150 user and customers. PC Requirements You will need a PC with an Internet connection. A printer is optional. Software Requirements Internet Browser such as Internet Explorer 6.0 and higher or another browser of the same generation is required to access the application. Maintainability and Support Requirements a. Maintenance of the system New product, category and Vouchers must able to be added by the admin. This system must easily maintainable. b. Supportability There will be online help and/or a printed manual. c. Portability requirements The product is expected to run under any operating system that run explorer IE or other web browser and its successors or through a web browser. Security Requirements a. Access requirements Anyone have ability to enter the system (admin or customer) each one have its own password and user name. The customer can retrieve and create a new orders and the admin can enter new product and can see the customer orders. Each one has its own page. b. Integrity requirements Wherever possible, system will prevent incorrect data from being introduced and shall protect itself from accidental misuse. In the event of lost integrity, complete system (and settings), data, and most recent current Orders will be reloaded from backup source. This may be a manual process analogous to opening a previous copy of a data after system has crashed. c. Privacy requirements The Customer and Order information will be entered into the program and stored. This program will need to be kept on a PC that has adequate security. The program is not providing security. -Cultural and Political Requirements The system will not account for holidays or multilingual display. 3.3 Users of the OSS: Potential users of this system are administrators and Customers of OSS. The Customer will enter the required information in the Order form. Also, the admin must fill his form with required information. However, the Customer will register themselves, enter constraints into the software, and build Orders. The administrator will have familiarity with the way the Order should be filled. The Customer will be anywhere from a novice with using computer programs to an expert. 3.4 The proposed system design In the proposed system design the customer will select category of product and after that the system will show him all product under this category. Customer will select the product and also select the wanted quantity and add this product to the cart shopping. The system automatically will show all cart products with their price and quantity and the total for each product and also the net total for all orders. The proposed system consists of the Order Page Register Page Product Page Admin pages Category Pages ASP.NET: Prior to the advent of ASP.NET, three main technologies and platforms were available to develop Web applications: ASP, Java Server Pages (JSP), and the open source Web platform commonly referred to as LAMP (Linux plus Apache plus MySQL plus either Perl, Python, or PHP as the Programming language). [5] Visual Studio: Visual Studio is a container environment that integrates the functionality of multiple visual designers. You have a designer for building Windows applications, one for building Web sites, one for building Windows Communication Foundation (WCF) services, and so on. All items required by your work-such as references, connectors to data sources, folders, and files-are grouped at two levels: solutions and projects. A solution container contains multiple projects, whereas a project container typically stores multiple items. Using these containers, you manage for your solution as a whole or for individual projects. Each item in the project displays its own set of properties though a secondary through a secondary window-the properties window.[6] User Function RegisteredUser : (Customer, Administrator) Loginsystem (Username Password) Customer Fill the Form (with the required Customer Information) Display Old Orders select one of them to display its items Start New Orders select required product and quantity Fill Payment Details and send order 4. Administrator Display Product Details and add new products. Display Category list and can add/modify theme. Create, Modify Display main category. Create Modify Display payment type. Register new admin employee (CreatesuserIDsfortheadmin and Employeesinordertologin). Change current user password after log in. Display customer orders. Create, Modify Display Country Information. SCHEMA Products Product_ ID (PK) Product_ name Product_ Description CountryID CategoryID Unit_ price Balance _Qty Min_ Level Max_ Discount Brand_ ID Customer Customer _ID (PK) Customer _Name Address House _tel Mobile _tel Work_tel Email_1 Email_2 Customer _pwd Orders Order_ID (PK) Order _Date Customer_ID (FK) Payment _Type Card_Type Card_ Number Expiry_Date OrderStatus Order Details Order_ID (FK) Product_ID (FK) Quantity Unit_Price Row_Discount Payment Type Payment_ID (PK) Payment_name Category CategoryID (PK) CategoryName MainCategoryID (FK) MainCategory MainCategoryID (PK) MainCategoryName Country CountryID (PK) Country Name Brand_Tbl Brand_ID (PK) Brand_Desc Table (3.1) Data Base Scheme 3.5: Use Case Diagram: The login system used by Customer or administrator: form filling, displaying Customer Order Information: Form filling by Customer: Administrator use cases: Brand name DB Theuserswillusethe (usecases)asfollows: # Actor Use Case 1 RegisteredUser (Customer, Administrator) Loginsystem (Username Password) 2 Customer Fill the Form (with the required Customer Information) 3 Customer Display Old Orders select one of them to display its items 4 Customer Start New Orders select required product and quantity 5 Customer Fill Payment Details and send order 6 Administrator Display Product Details and add new products 7 Administrator Display Category list and can add/modify theme 8 Administrator Create, Modify Display main category 9 Administrator Create, Modify Display payment type 10 Administrator Register new admin employee (CreatesuserIDsfortheadmin and Employeesinordertologin) 11 Administrator Change current user password after log in 12 Administrator Display customer orders 13 Administrator Create, Modify Display Country Information Table (3.2) Use Case 3.6 The proposed system Implementation: Cart shopping system is an online system that enables any customer to order his precuts from internet without going to any place. The system is very easy to use and for any one can. In the below system user can select his product in easy way. And the administration can manipulate the product and customer order by easy way. Most of the work is doing by mouse. Administration can change the price in any time and this will not effect on the previous order. System has one page for orders and many pages for administration. The system categories all products under main category and each category divide to another category to facilitate the dealing with the system. This system can be used for any shopping for example Food shopping Car spare parties shopping †¦ etc. 4. Cart Shopping Figure 3-4 shows the product list of the selected category and customer can select the required quantity and add the product to shopping cart by clicking on the button add to Cart 5. Product Details Figure 3-5 will show the product information to the administration and enable user to add, modify, and delete any product from the system and enable user to update product price 6. Add new product Figure 3-6 will used to add new product to the system and upload the product photo. 7. Payment Types Figure 3-7 will used to enter or delete or modify the payment type. 8. Main Category Figure 3-8 will used to create new main category or update old main category name 9. Category Figure 3-9 will used to create new category or update old category name 10. Country Figure 3-10 will used to create new category or update old category name 11. Brand Name Figure 3-11 will used to create new Brand name or update old Brand name. Chapter Four Conclusion Function 4.1: Conclusion: Having an online grocery web site would make other life easier, it would reduce the traffic on the local grocery store, and the buyer will feel comfortable buying from his/her own home. These days computer is an important device that is a must have in every house. Computers made our life much easier and practical. 4.2: Future Work: In the future I will improve my web site by adding coupons and wish list so; the buyer can have some of things for free.

Thursday, September 19, 2019

Ineffective Argument in Jessica Statskys Essay, Children need to Play,

Jessica Statsky, in her essay, â€Å"Children need to Play, Not Compete† attempts to refute the common belief that organized sports are good for children. She sees organized sports not as healthy pass-times for children, but as onerous tasks that children do not truly enjoy. She also notes that not only are organized sports not enjoyable for children, they may cause irreparable harm to the children, both emotionally and physically. In her thesis statement, Statsky states, â€Å"When overzealous parents and coaches impose adult standards on children's sports, the result can be activities that are neither satisfying nor beneficial to children† (627). While this statement is strong, her defense of it is weak. One of the assumptions Statsky makes is that, â€Å"One readily understandable danger of overly competitive sports is that they entice children into physical actions that are bad for growing bodies† (627). This statement rests on the assumption that children would not perform any â€Å"physical actions that are bad for growing bodies† (Statsky 627) without organized competitive sports. This is simply untrue. Children jump from swings, climb trees, skateboard, â€Å"pop wheelies† and otherwise put themselves in physical peril with alarming regularity. Children’s free and unorganized play often results in broken bones and stitches, even for the most timid children. Statsky also makes another faulty assumption, which is that competition is an adult imposition on the world of children’s play. She says in her article, â€Å"The primary goal of a professional athlete – winning – is not appropriate for children† (629). Children compete to win in the same way that adults do, and they do so on their own without any adult pressure. Common playground gam... ...petitive sports can cause lasting harm and have no benefits for these children (Statsky 627), then examples of how childhood competition negatively affected individuals years after the fact would go a long way to proving her accusation. As Statsky's thesis rests on the assumption that adult imposition of competition and organization in children's sports makes the games neither satisfactory nor beneficial to the children, then lack of benefit must be shown along with lack of satisfaction. The existence of unsatisfied child athletes in organized sports is no indication that children are somehow unsuited to competition and team sports. Works Cited Statsky, Jessica. â€Å"Children Need to Play, Not Compete.† Reading Critically Writing Well: A Reader and Guide. Ed. Rise B. Axelrod, Charles R. Cooper, and Allison M. Warriner. 7th ed. Boston: Bedford, 2005. 627-631.

Wednesday, September 18, 2019

Why Hester Is A Whore :: essays research papers

Adulterous relationships always end in pain. Examples of such pain are present throughout the intricate web of time. From Shakespeare's star-crossed lovers, to the media buffet of Bill Clinton, adultery leaves pain. Hester embodies this pain. Not in pity but in cause. She embodies pain. Pain of loss, suffering. The pain of adulterous relationships. The universal wronging of adultery is deserving of such pain. Even in present times, with views much lax than puritan epoch, the wrong exists in full force, and just as deserving. Nathaniel Hawthorn's "The Scarlet Letter" deals in the justice of adultery. Wronging. This simple word exemplifies all things that one could do to destroy any sort of bond between two objects. A politician wrongs a public, a teacher wrongs a student, a boss wrongs an employee. A wife wrongs a husband. Wronging is universal in its presentation. The act which juxtaposes the wrong remain unimportant, it's the simple wronging which exists most corporeal. Hester wronged. She wronged more than her husband, but deeper, she wronged herself, and because of her times she wronged her god. Wronging deserves punishment. "Before the ugly edifice, and between it and the wheel-track of the street, was a grass plot, much overgrown with burdock, pigweed, apple peru, and such unsightly nail in the soil that had so early borne the black flower of civilized society, a prison." Almost parallel to Hester's deserving of pain stands a prison. Born out of civilized society springs a prison, a home of villainy. A breading ground for the wrong. What building more deserving, a nd what woman? Hester became a prison. Holding in the wrongness of her sin. Her justice was to carry out it's sentence. "It may be less soothing than a sinless conscience. That I cannot give you." Truly spoken from Nathaniel Hawthorn's text. Hester's wronging was her cross to bear and hers alone. Much like when Christ made a walk to his own crucifixion, so must Hester, deserving, make a walk through life bearing her A shaped cross. However, religion is a rather minor reason for her rightful punishment. The feelings and morals of the time dictate right and wrong. Presently we have values and views quite different than those of Hesters period, but the wrongness of her act of adultery remain universal. Even to this day, with views much lax of those Puritans in question, her wrong remains quite acute. Why Hester Is A Whore :: essays research papers Adulterous relationships always end in pain. Examples of such pain are present throughout the intricate web of time. From Shakespeare's star-crossed lovers, to the media buffet of Bill Clinton, adultery leaves pain. Hester embodies this pain. Not in pity but in cause. She embodies pain. Pain of loss, suffering. The pain of adulterous relationships. The universal wronging of adultery is deserving of such pain. Even in present times, with views much lax than puritan epoch, the wrong exists in full force, and just as deserving. Nathaniel Hawthorn's "The Scarlet Letter" deals in the justice of adultery. Wronging. This simple word exemplifies all things that one could do to destroy any sort of bond between two objects. A politician wrongs a public, a teacher wrongs a student, a boss wrongs an employee. A wife wrongs a husband. Wronging is universal in its presentation. The act which juxtaposes the wrong remain unimportant, it's the simple wronging which exists most corporeal. Hester wronged. She wronged more than her husband, but deeper, she wronged herself, and because of her times she wronged her god. Wronging deserves punishment. "Before the ugly edifice, and between it and the wheel-track of the street, was a grass plot, much overgrown with burdock, pigweed, apple peru, and such unsightly nail in the soil that had so early borne the black flower of civilized society, a prison." Almost parallel to Hester's deserving of pain stands a prison. Born out of civilized society springs a prison, a home of villainy. A breading ground for the wrong. What building more deserving, a nd what woman? Hester became a prison. Holding in the wrongness of her sin. Her justice was to carry out it's sentence. "It may be less soothing than a sinless conscience. That I cannot give you." Truly spoken from Nathaniel Hawthorn's text. Hester's wronging was her cross to bear and hers alone. Much like when Christ made a walk to his own crucifixion, so must Hester, deserving, make a walk through life bearing her A shaped cross. However, religion is a rather minor reason for her rightful punishment. The feelings and morals of the time dictate right and wrong. Presently we have values and views quite different than those of Hesters period, but the wrongness of her act of adultery remain universal. Even to this day, with views much lax of those Puritans in question, her wrong remains quite acute.

Tuesday, September 17, 2019

afrofornication, The New Black Culture Of Indiscriminate S :: essays research papers

Does anyone notice, when you see the way most young Negro males behave these days it seems like they are constantly thinking about fornication, almost obsessed by it? I have noticed this. When one attempts to converse with one of these people the conversation will rarely end without some reference to sex or sexual behavior, whether it be minor references such as 'mah dick' or 'yo mama', or more direct references 'i be da pimpsta', 'i be yo daddy', 'gettin jiggy down dere'. I have been wondering for some time why fornication is such an essential part of the thoughts and culture of many of these people. To give us a better understanding of the reasons for this behavior we must look at the social strategy of the Negro. There have been many studies performed to try to explain the disproportionately high birth rate among Negroes and in fact the clearest and most observant of these was by Rushton (1996) [1], who found two distinct socio-reproductive patterns, he called them the 'R-Strategy' and the 'K-Strategy'. The 'R-Strategy' is the typical Negro reproductive pattern which he observed both in Africa and around the world. This pattern has the characteristics of a high birth rate, but also puting very little effort into parental care and nurturing. Often, the parents will not stay long as a couple, one father may in fact have several wives or women which he fornicates with on a regular basis. Also the gestation period is slightly shorter, children reach physical maturity earlier and begin having sex at an earlier age. 'R-Strategy' societies are usually less stable, with children being born into no definite family structure. In effect it is really a strategy of having as many children as they can, as quickly as possible. The 'K-Strategy' is exactly the opposite of this. It is mostly observed in White and some Mongoloid cultures and involves having less children but investing great effort in their nurturing and development. There is a slightly longer gestation period, and children mature more slowly but that slower maturation helps develop a higher intelligence. Society tends to be more stable, with parents staying together as a couple and building a family. This is a strategy which places more emphasis on learning and thinking than just all-out breeding, placing quality over quantity. We also have to look at how these breeding strategies evolved. In Africa, say, a thousand years ago, with all the tribal wars and cannabalism going on, what do you think was the key to survival as a community?

Monday, September 16, 2019

Corporate Culture and the Enterprise Architect

All companies have their own unique corporate culture which is evident in their work environment. Also known as company culture, corporate culture stands for the company’s values, beliefs and behaviors (Kotelnikov, 2009). Usually expressed in companies’ vision and mission statements, it also gives the company and its employees a united identity. Company cultures are distinctive – they are unique to each company’s history.Similar to a person’s personality, corporate culture is the result of the assimilation of all the values, habits, ethics, and goals that the company has developed over the years (Heathfield, 2009).The growth experience has enabled companies to identify their strengths, weaknesses, and company goals. From these, they build their vision statements for the company. Thus, whether they describe the kind of customer service their company offers or the integrity and progressive-thinking their company has, vision statements essentially make up companies desired corporate culture. Corporate culture drives the company’s working environment and organizational structure. It is represented in each employee’s language, priorities, work practice and business decisions (Heathfield, 2009).Every single employee has a hand in shaping the company’s environment and corporate culture. Though company founders and executives draft the desired and beneficial culture, all employees contribute to its actualization. Still, there is not any underestimating work leaders’ capacity for influencing and instructing lower-level employees regarding the proper interpretation and practice of their company’s corporate culture. Even more so if the leader’s opinions and actions are witnessed and followed by many employees. One such work leader with the opportunity to influence fellow employees is the Enterprise Architect (EA).On paper, the EA works for the company’s Information Technology (IT) side. Ho wever, the dynamic roles and responsibilities requires the EA to constantly cross boundaries and priorities between the business and technology processes thereby allowing him or her to have influence on both aspects. Adams described the EA as the technology strategy manager and implementer (cited in Walker, 2007). The EA acts as a project manager responsible for handling a wide span of IT domains such security, infrastructure and information architecture (Walker, 2007).He or she is also in charge of creating and developing the company’s IT strategy. The EA directs the current state of IT architecture, and plans the needed improvements. The EA defines the future of their company’s technology and also build the transition technology (Walker, 2007). At the same time, he or she should prioritize the business side of the company and consider business cost savings, advance vendor relations and empower his or her staff (Walker, 2007). The EA is also accountable to following t he company’s corporate culture and standards.He or she must be able to successfully and effectively merge the interests and priorities of IT strategies and organizational policies and standards. Being the EA allows one much responsibility and influence over many employees, even crossing the boundaries of the technology and business aspects of the company. It is vital then that the EA believes and is directed by his or her company’s corporate culture. By doing so, he or she identifies with the company visions and goals, and shares its business practices.Heathfield (2009) writes that company cultures envision and work towards the creation of a productive and enriching environment. Therefore by aligning one’s own values with that of the company, the EA increases his or her motivation for working making him or her more productive and effective. Also, an EA who believes in the corporate culture believes that he or she is working under desirable work environment. Apar t from increasing his or her motivation, the EA also has an improved loyalty and therefore longevity with the company.According to Walker (2007), an EA needs not only to be technology proficient but also business savvy. Knowing the industry and the company culture helps the EA understand how the much and what kind of technology will affect and advance the entire company (Walker, 2007). An EA who is aware and agrees with the corporate culture, the personality of the company, is better suited in building IT processes and executing IT strategies that complement business functions. The knowledge of the corporate culture definitely results into competence and confidence for the EA.Walker (2007) believes that this consequently adds to his or her credibility and leadership skills. If the EA him or her self believes and behaves according to the tenets of their company culture and goals, then he or she is seen as a credible and trustworthy leader. The EA is able to effectively pass on the vi sion of the company to the lower-level employees thereby helping them identify with the company and encouraging them to perform remarkable work. As a leader, the EA holds responsibility in training and making sure that all IT staff is performing at top level.He or she should also be able to foster productive collaborations and intimacies amongst teams and between employees and the company (Kouzes & Posner, 2003). Since value alignment between employees and culture increases efficiency and passion to work, the EA must also inspire all workers to believe and participate in their culture (Walker). Heathfield (2009) asserts that corporate culture is learned and is shared through interaction. Thus the EA must be an effective and reliable model for the team. He or she must inspire others by becoming an example of the virtues and behavior he or she asks of others.The value of the EA being directed by his or her company’s culture is beneficial for the company, the EA him or her self, and the other employees under the influence of the EA. Their behavior and beliefs shape and actualize the corporate culture. It also improves their motivation for their work thereby increasing their productivity and chances of successfully reaching the goals of their organization. References Heathfield, S. M. (2009). Culture: Your environment for people at work. About. com Retrieved February 27, 2009 from http://humanresources.about. com/od/organizationalculture/a/culture. htm Kouzes J. M. & Posner, B. Z. (2003) The Leadership Challenge Workbook. San Francisco, California: Jossey-Bass Kotelnikov, V. (2009). What is corporate culture?. Business E-coach. Retrieved February 27, 2009 from http://www. 1000ventures. com/business_guide/crosscuttings/culture_corporate. html Walker, M. (2007 Jul). A day in the life of an enterprise architect. Microsoft Corporation. Retrieved February 27, 2009 from http://msdn. microsoft. com/en-us/architecture/bb945098. aspx

Sunday, September 15, 2019

Multiple Intelligence Theory and Its Application to Education

The discourse surrounding multiple intelligence theory (MI) and its integration into education has been that of much debate. Written as an opposition to IQ testing, MI was originally developed as an alternate account of cognitive function, initially identifying seven distinct intelligences (verbal-linguistic, logical-mathematical, bodily-kinesthetic, spatial, interpersonal, intrapersonal and musical), and later acquiring two more (naturalist and existential).Applied to an educational context, the main aim of MI theory is to demonstrate the insufficiencies of IQ measurements and traditional testing methods as evaluations of student intelligence and the grounds for planning programs and curricula suitable for all students (Moran, Kornhaber, & Gardner, 2007). MI theory is attractive to many because it offers â€Å"a more pluralistic cognitive universe† (Gardner, 1995b, p. 16).However, vigorous debate challenges MI theory, whilst the lack of clear instruction for its integration i nto pedagogy has led to misconceptions and unfaithful application of its key elements. Some of the arguments pertaining to the integration of MI in schools, and in art and design classrooms in particular, will be explored below, firstly examining critiques of the theory itself. The first debate considers the empirical aspects of MI. In Frames of Mind (1983), Gardner presents his investigation of numerous empirical studies, from which he identified the initial seven intelligences.Thus, it can be said that MI theory is formed solely on empirical evidence. Since there can be no permanence to any empirically based theory, MI can be modified in accordance to new studies, openly allowing for discussion and constant reconceptualisation (Gardner, 1995a). Whilst Kevin Williams (2000) highlights the intuitively appealing natureof MI theory, Robert J. Sternberg identifies the need for a basis for testing and comparing these â€Å"attractive† empirical theories (1984, p. 700). Klein (199 8, p. 06) points out that Gardner, whilst expanding the claims of MI theory, â€Å"provides no evidence for them,† but further demonstrates the virtually â€Å"untestable† nature of MI theory that continued to exist over a decade after Sternberg’s critique.This means that whilst it difficult to prove that MI is wrong, it is equally difficult to prove that it is correct, which questions the validity of the theory in educational contexts. Secondly, MI theory has been accused of confusing intelligence with domain and discipline. Gardner (1995a, p. 02) explains that on the contrary, â€Å"an intelligence is a biological and psychological potential†¦ capable of being realized†¦ as a consequence of the experiential, cultural, and motivational factors that affect a person. † This definition is dissimilar to that of â€Å"domain,† which is a cultural concept, relating to culturally organized activities, in which individuals are involved. In the a rt and design context, sculpture, painting and woodwork would be examples of domains, which, according to MI, can be accomplished through the utilization if intelligences such as spatial, bodily-kinesthetic and logical mathematical.In saying that, Gardiner argues that intelligences can operate in many diverse domains(Gardner, 1995a; Gardner, 1998). Logical mathematical intelligence must be applied in planning and constructing a table, for instance, to attain correct measurements and angles. Perry D. Klein accuses MI of linguistic redundancy on the basis that each intelligence is defined â€Å"as an ability in a corresponding set of domains,† and an ability in each domain is explained â€Å"with reference to the intelligence† (Klein, 1997, p. 103).Gardner (1998) believes that Klein has confused these concepts, as each domain involves several intelligences, not just one by which it is defined. For example, a student who possesses high spatial intelligence might not neces sarily produce an effective poster design without also incorporating a degree of bodily-kinesthetic intelligence, cultural support, practice and good instruction. Gardner strongly disagrees with a third critique that MI theory â€Å"so broadens the notion of intelligence that it includes all psychological constructs and thus vitiates the usefulness, as well as the usual connotation, of the term,† (Gardner, 1995a, p. 03). His argument stems from allegations that the traditional definition of intelligence provides a thin and incomplete observation of its nature, touching on only psychometric capacity and disregarding other cognitive aspects. MI deals only with matters of the intellect and Gardner believes that a more useful comprehension of cognition can be gained by considering multiple semi-independent intelligences than what is offered by the hypothesis of a single â€Å"bell curve† model of intelligence. Conversely, some critics show concern that MI regiments the var iety of human intelligences due to the restriction of categories.The formation of categories and intelligences they include is, in the opinion of John White, based â€Å"on Gardner’s own value preferences† (White in Williams, 2000, P. 107). Williams (2000), however, asserts that White may have misjudged the way in which MI can allow for the diverse combinations of intelligences in the classroom. MI encourages that key concepts or disciplines be approached in a multiple ways to enhance a students experience of ideas and implications in a way that is familiar to them.In art and design, topics can be taught using a range of approaches, from narration of an artists or designers experience (interpersonal), class discussion (verbal-linguistic) and individual reflection (interpersonal and intrapersonal) to practical experimentation or stimulation (logical-mathematical, spatial and bodily-kinesthetic). By approaching content from different perspectives, teachers can increase t heir access to the intelligences of more students and allow students to see that they are capable of representing content and their knowledge in different ways (Gardner, 1995a)A fourth concern takes the form of what Gardner (1995a, p. 203) deems a myth: â€Å"MI theory is incompatible with g (general intelligence), with hereditarian accounts, or with environmental accounts of the nature and causes of intelligence. † His response is that MI theory is primarily concerned with exploring the intelligences and intellectual procedures that g does not take into account. MI examines the scope of g, not it’s actual existence. Similarly, MI theory focuses on exploring the interaction between genetic and environmental elements, impartial on the issue of whether particular intelligences are heritable.MI’s exploration of the unique intelligences of individuals allows them to understand that they have potential to be â€Å"intelligent† in multiple ways and are no longe r restricted to the â€Å"smart† or dumb† categories that are often ascribed to g (Moran, Kornhaber, & Gardner, 2007). Considering the above arguments, MI practice should not be considered in separation of MI theory and teachers should be aware of the discourse surrounding MI theory in order to make a more educated integration of its principles into their classrooms.The almost immediate attempt to integrate MI theory into educational contexts has generated positive results in its development. However, Burke (2007) also notes that many teachers have acquired information about MI that is in contradiction to what the theory actually suggests. Written in the context of psychology, Frames of Mind relates only six paragraphs to MI practice in education (Burke, 2007). Gardner denies that MI attempts to instruct pedagogy and sees it as the educator’s role to decide how MI will best serve students (Gardner, 1995a).Considering MI theory is not the result of standardized te sts, any testing that claims to be MI based, should use an â€Å"intelligent-fair† method, as opposed to linguistic or logical methods of pen and paper testing, so that each individual intelligence is directly examined. For instance, if a student is to be assessed in aspects of spatial intelligence, it should be done based on their practical interaction with and application of visual arrangements and materials, rather than written assessment.Gardner points out that the assessment of MI’s is not always a main concern in education, but if it is appropriate for testing to occur, it should exist within an environment where the student feels comfortable and is provided with familiar materials (Gardner, 1995a). Misguided notions of MI have led to the concern that teachers need â€Å"to plan eight or nine different entry points or approaches for each lesson† (Moran, Kornhaber, & Gardner, 2007, p. 26).Burke (2007) reports that in art classes where teachers attempted to teach to every intelligence, students began to complain about far-fetched lessons. It is not always feasible, nor appropriate to attempt to conduct lessons in this way, and Gardner (1995a) agrees that to do so would be a waste of time and effort. Klein points out that the complication of growing class sizes combined with the â€Å"supposed existence of eight intelligences† and their various levels of operation, would result in an â€Å"explosion in the workload of the teachers who would have to plan and deliver these programs† (1997, p. 38). Whilst the identification of â€Å"strong† areas of intelligence in individuals can be beneficial, Klein (1997) predicts that this could also mean that students will avoid areas where their intelligence is deemed â€Å"weak. † Within an art program, for example, a student with strong verbal linguistic intelligence and weak spatial intelligence might focus their efforts more heavily in developing a written report on an artist case study and avoid tasks that require them to create or interpret compositions or work with 3D modeling.Furthermore, if a student ascribes their strong logical-mathematical intelligence to an ability such as the careful planning of measurements for a project, and the calculations prove to be more difficult then they expected, Klein suggests that they often quit as they â€Å"interpret failure as a lack of this ability† (1997, p. 389). MI has also been applied to classrooms in trivial ways. This includes the practices that exercise aspects of particular intelligence without cultivating the mind (Gardner, 1995a).An example of this would be to have students thrash their limbs about to make random marks on a surface without informing them of what energized mark-making is about and how it is relevant to art. In order to achieve deep learning, applications of MI should be student-focused, considering the intellectual attributes of each individual in order to plan educatio nal programs that are relevant, appropriate, fair and engaging (Gardner, 1995b). Understanding the dynamics of intelligences within a classroom can assist teachers in their provision of rich learning experiences.This means understanding which intelligences, both on an individual and class level, will create interference, compensation or enhancement (Moran, Kornhaber, & Gardner, 2007). Having students work collaboratively on projects can allow for intelligences to operate â€Å"across students†¦ to build shared strengths† (Moran, Kornhaber, & Gardner, 2007, p. 28). In concluding, Gardner (1998) maintains the position that MI theory can provide a rich, flexible and useful set of tools and ideas for teaching that allow educators to meet the needs of increasingly diverse classrooms by utilizing knowledge of and tapping into the specific intelligences and ubskills of individual students. MI can be useful in explaining the behavior of individuals and identifying obstacles in t heir learning with the aim of making teaching and learning relevant for more students in order to achieve deeper learning. However, to avoid misconception and subsequent misapplication of MI theory, educators must be aware of the debate that surrounds it and its progress as a continually developing empirical theory.

A Study Analysis on The Process of Information Technology

In the world of today, the process of information technology is a part of organizations due to the importance of information systems. These are the processes through which one derives solutions to the challenges faced in organizational and management problems. There is also a view among experts that the quantity of interaction between the IT department of the organization and other units are what determines the success of any organization. The entire process of IT can be used in a centralized or decentralized manner. The structure of IT in any organization should provide assistance in its strategy and must conduct the needed research for this purpose. (Centralized versus Decentralized Information Systems in Organizations) Today, several organizations in all sectors of industry, commerce and government are based on their information systems. In some industries like telecommunications, media, entertainment and financial services, the survival of the organization itself depends on how efficiently it applies to information technology — IT. A new system called e-commerce has now burst into the arenas of international trade, and that makes IT as a method of conducting modern business. This is now changing the attitudes of the business leaders and IT is no longer only a method of performing existing business, but should also be used for development as that is expected to provide advantages in competition. Thus many organizations today want to develop a more strategic approach to their use of IT, but more have probably arrived at their present situation due to their adoption of short-term ‘tactical' decisions with IT. The Evolving Role of Information Systems and Technology in Organizations: A Strategic Perspective) At the same time, many organizations would wish that it were possible to rethink their investments, or begin with a clean sheet, but that is impossible as they have a ‘legacy' system built up from their approach to IT in the past. It is not possible to start again as we can see that many banks and insurance companies still focus on systems that they had developed over 30 years back. It is also not required as IT is not the only determinant of success unless the ability and knowledge of the organization have increased radically. (The Evolving Role of Information Systems and Technology in Organizations: A Strategic Perspective) The important part of strategic management depends on learning from experience which means the successes and failures of the past. The results achieved through IT helps only through experiences and experimental analysis that it provides. Thus, it should not be viewed as an essential component for strategic decisions. The main advantage that IT provides to organizations is that IT helps in the processing of information much faster so that uncertainty can be lower. The uncertainty comes from lack of knowledge, or information, even though it may be possessed at power levels. The advantage with IT is that the information can be collected, gathered and processed in a faster manner. (Benbunan-Fich, 2002) Though most organizations are trying to use for quite some time to solve these problems, it is unlikely that any organization has been exposed to the entire range of experiences in IT. Still it is important to study the process of development of IT in large organizations as that may be of use in the general evaluation of development of IT in another organization. In general it is known that there are some important matters that result in the speed and effectiveness of IT in organizations. The importance of the different factors in the list changes over time, but it is still important to make a note of the list of the factors. (The Evolving Role of Information Systems and Technology in Organizations: A Strategic Perspective) Those are the capabilities of the organization, the economics of the technology that the organizations following, the applications that the organization is carrying out and their feasibility, the skills and availabilities that are available within the organization or from outside vendors, the capacity of the organization and it ability to use the applications and the overall pressures that exist on the organization or the entire industry to improve performances. What we are talking about here is Information Technology with the insistence on technology and that means hardware, software and telecommunication links. This form of technology has both items that one can see and feel, like servers, desktops and network cables; as also items that cannot be touched but only paid for, like software. At the same time, the world is moving to a digital era, and it is IT that helps in the collection, processing, storing, developing and sharing of all these items. At the same time, there are also differences in terms for referring to the entire process and what is called IT in the states is called Information and communication Technologies in the European Union. This is the item that we are referring to though at times in the past, the two were seen as clearly different areas. (The Evolving Role of Information Systems and Technology in Organizations: A Strategic Perspective) The next important question is to find out how this technology helps us. The first area of help is in business strategy and this helps by creating new opportunities for dynamic changes in products and services. There were some services in the past that had to be handled manually, but can now be handled over the network. The important advantages cone from re-sequencing which includes parallel processing of data bases; simultaneous delivery of data; time extension of data by making it available 24 hours a day and all 365 days in the year; portability or taking the service and product closer to the user; and re-usability or developing the capacity to use the data collected for one purpose to be used for other purposes. There are also changes to organizational culture and that is the second most important development. The Impact of IT on Organizations) This is through devices like electronic mail and group ware. Information can now flow much faster between organizations and their clients. The changes in organizational culture have also led to changes in organization structures, and this has happened due to the larger spans of control and greater use of group ware. A lot of this has happened due to business process re-engineering and also the requirement to cut costs due to high competition. There have been efforts to find out whether IT encourages increased concentration or increased decentralization has not given out any clear results, but it certainly permits the organizational structure to be more flexible and fluid, dispersed teams and even teams that can come and go with the requirement of changes in the organization. (The Impact of IT on Organizations) This is also leading to changes in management processes and that includes even routine business processes. IT has provided methods for collecting information from many sources, directly and collectively through the use of databases and the Internet. Yet, though it has tried, it cannot still replace certain decision making that has to take place in groups and in meeting rooms as there is certainly the need for a master facilitator who can take the group discussion to an end. At the same time it can be seen that the impact of IT is leading to changes in the methods of professional work today. Practically all offices of today use personal computers and the availability of ready information has made the job expectation also to involve greater levels of knowledge. This is in addition to the earlier required skills of organizing, thinking, writing, convincing, etc. Now, in addition to doing all that, the managers of today are combining the greater knowledge that they are collecting. All the changes in situations due to the use of IT have also come as it is now essential for most people to have direct access to it while they are working. At the same time, IT itself has to find out methods of controlling the flow of information so that all information does not reach everybody. (The Impact of IT on Organizations) At the same time, a situation has come where the organizations have to now determine whether IT should be a separate department, or become a part of all departments. The different systems suit different organizations. It should be remembered that IT itself has some goals and that may be said to be innovation and efficiency. Yet, innovation is necessarily cost conscious and the organization has to determine the levels of different goals. (Centralized versus Decentralized Information Systems in Organizations) The most interesting and probably intriguing part of development of IT has been concerning Internet, and a stage has now come through which this medium has started influencing the environment, which is the biggest concern of the world of today. In the recent trade talks also, it was seen that United States has decided to retain its control over it. Does it mean that we are about to find a new source of business?

Saturday, September 14, 2019

Scholastic’s Marketing Strategy

Evolving a successful marketing strategy depends on an effective situation analysis, which involves identifying the customer needs, changes in the operating environment, new opportunities, and the capability of the company to meet these changes. Scholastic corporation is one of the leading publishers catering to the children's segment. With decades of experience in children's publishing and links with most schools libraries across the nation the company has a great outreach to the student segment compared to other competing publishers. However, some changes in the external factors have clearly affected the company's business in a negative way. First and foremost of them is the government's cutting short of school budget allocation, which implied that libraries could no longer afford to spend funds for buying new books. This was a drastic blow for Scholastic as the company depended on its extensive tie-ups with school libraries for its regular business. Next, is the surge of the competitors such as Simon and Schuster and Houghton Mifflin who are capitalizing on Scholastic's inept handling of the changing market situation. These competitors, by their more effective marketing strategies have already started to increase their share in the market, which was previously largely dominated by Scholastic. Scholastic has failed to forge relationships with teachers and management in reaching out to the students. This lack of appreciation of the value of proper human relations is another big hurdle in its business interests, especially when the market seems to be lagging. To be successful under these changing circumstances Scholastic has to revamp their marketing strategy. Focus should be placed on increasing the literacy interests of the younger generation. Under the strange circumstances that the government is crying about improving the literacy skills of students while at the same time cutting the funding for the schools, Scholastic could put to good use its extensive connections with schools by actively participating and organizing book fairs and book clubs. An important fact is that book fairs promote book sales and stimulates reading in children, which in turn implies more books sales. Scholastic should sponsor more book clubs, which would help kindle the reading habits of the school going children. Thus by co-ordinating and working actively with school management Scholastic could promote the reading interests among children which seems to be threatened by the funding cuts by the government. Given that more than 100,000 school book fairs are organized every year around the country, it is plainly obvious that Scholastic should actively participate with the schools in organizing and conducting these book fairs and book club's. These programs, though, may involve expenditure on the part of the company, constitute a good strategy which promises a lot in the long-term. Thus, by organizing these book fairs and book clubs with minimum or even as a non-profit initiative, Scholastic corporation could actively contribute to promoting literacy interests of children upon which rests the success of its future business.

Friday, September 13, 2019

Why i want to be a Nurse Essay Example | Topics and Well Written Essays - 500 words

Why i want to be a Nurse - Essay Example After I graduated from paramedic school in 1997, I became an EMT paramedic and continued for a few years there. There, I realized that my career was grinding to a standstill as there was a limit to which I could learn and grow professionally. Further, I like challenges and the job duties and responsibilities there were not satisfying enough. Once I realized that I was hitting a ceiling of sorts, I decided to apply to join nursing school. I feel very comfortable being a healthcare provider and thus would like to state my professional goals as being part of the intensive care unit or surgical nursing. I have great regard for cardiac surgery and I would say that being in cardiac nursing would be immensely gratifying for me. Lastly, I would like to state that my experience as a paramedic has given me a solid foundation and my courses in the nursing school have helped me build on that. I have developed skills that would help me in being a nurse and I am fascinated by the healthcare sector and the knowledge that comes along with it. I look forward to a fulfilling career with your

Thursday, September 12, 2019

Financial Resource Management Essay Example | Topics and Well Written Essays - 750 words

Financial Resource Management - Essay Example With the help of trade goods are made available to consumers at the time of their need. It removes the hindrance of persons by bringing together producers and consumers who are widely scattered. Financing is of two types, equity financing and debt financing. When you are in need of money or looking for capital, company's debt-to-equity-ratio should be considered. It is the relations between the Dollars or Euros that an entrepreneur has borrowed and Dollars or Euros invested in the business. The more the investment by the owners the more they attract the financing. When the equity to debt ratio of the firm is high then debt financing should be taken. If the proportion of the debt to equity ratio of the firm is high then it is advised that the owners should increase their equity investment, that way they cannot jeopardize firm's survival. Limited equity financing is used by most of the small or growth stage businesses. Whereas in debt financing, funds pour in from different quarters like from friends, relatives, etc. Venture capitalists are the most common source of equity funding. Venture capitalists may be institutional risk takers, financial institutions, wealthy persons, etc. and most of them specialize in industries. Venture capitalists are risk takers and show interest only in three to five year old companies that result in more than average profits. These venture capitalists are called as investment gurus whose interest lies in those companies that have major regional and national concerns. Debt Financing Commercial finance companies, financial institutions, banks, savings and loans, Lloyds Bank small business, etc. are some of the sources for debt financing. Because of their positive impact on the whole economy local and state government encourage the growth of the small companies. In debt financing additional funds comes from friends, family, relatives, and industry colleagues, etc when capital investment is smaller. Generally banks formed as a major source for loans for the establishment of small businesses. Banks don't offer long term loans to small firms instead they grant short term loans for machinery and

Wednesday, September 11, 2019

Extra Cridets Essay Example | Topics and Well Written Essays - 250 words - 1

Extra Cridets - Essay Example Extra Credits was first viewed on The Escapist from 2010 to 2011. It was developed in 2008. This was the time when Floyd came up with two video presentations (Harris 118). The presentations were meant for media theory and respective art history classes. The classes were held at Savannah College, a school of art and design. The series of videos in Extra Credit are presented in a loosely modeled style. The director of the video, Floyd, makes use of pitch-shifting technique to come up with a unique and high-pitched voice. Portnow wrote the episode scripts for Extra Credits. Floyd then redefined the scripts for recording. Floyd also edited the video series. The show in Extra Credit is presented in a lecture hall style. The tone of the series in the film is humorous and light-hearted. However, the tone is also didactic since it is aimed at raising discussions on the major subject being presented. The shows in Extra Credit target game designers (Harris