Saturday, August 31, 2019

Pomegranate story

The internal rate of return was found to be In the range of 57-59 per cent which was much higher compared to the cost of capital (9. 5 percent) and hence highly profitable. Overall, the proposition of growing pomegranate crop was highly profitable as revealed by the financial feasibility tests. Key words : Investment pattern, cost, returns, pomegranate Introduction per cent of the total area under pomegranate in the district. Hence, Chalkier and Hurry talk was specifically selected for the study.The top villages having larger area under pomegranate cultivation were selected. The Information on area under pomegranate crop and number of pomegranate growers from the selected villages was obtained from the respective village accountants (Total). A proportionate sample of ten per cent of the population from each village was selected randomly. Thus, the total size of the sample selected for the study was 120. The average age of the ample farmers in both talk was found to be 44 years and mo re than 50% farmers depended mainly on agriculture as their primary occupation.Around 25% tot tatters in the selected talks completed their primary education were as the per cent of illiterate farmer in the selected talks ranged from 12 to 15%. So far as size of family was concerned, it was found to be 7 members in family in both talks. The average size of holding of sample farmers was 2. 30 and 2. 89 ha and the average size of the pomegranate orchards was 1. 58 and 1. 47 ha in Chalkier and Hurry talks respectively. The varieties of pomegranate grown in the study area were Ganges or Baggy type. The range of age of bearing orchards was 4 to 15 years.The expected productive life span of pomegranate orchard as estimated by the respondents was 25 years. On an average plant population per ha was 375. For analyzing the data collected during the study, tabular analysis and financial analysis were employed. The technique Material and methods of tabular analysis was employed for estimating t he investment Pomegranate cultivation is practiced throughout the district. Pattern, maintenance cost of pomegranate, pattern of labor However, the large scale litigation of pomegranate is use, yield and return structure of pomegranate etc.In order to concentrated mainly in Chalkier and Hurry talk extending know the relative profitability of investment in pomegranate on an area of 260 and 628 hectares and forming 20. 08 and 48. 42 cultivation measures of project evaluation namely. Pay Back * Part of M. Sc. (Agar. ) thesis submitted by the first author to the University of Agricultural Sciences, Dharma – 580 005, India Horticulture is a fast growing sector and expects comparatively lower requirements of water and easy adaptability to adverse soil and waste land situations.The productivity of fruits and vegetables is of vital importance as it provides higher cash income than cereals per unit of land. India is one of the leading countries in pomegranate production and more than 1. 32 lake hectare area is under cultivation presently. Out of this, nearly 94,000 hectare area is covered in Maharajah's, which produces fruits of over 1 lake metric tones worth about RSI. 400 scores. In Chitchatted district of Karakas, where the study has been conducted pomegranate is being grown on commercial scale. The area under pomegranate in the district is 1297 ha (10. 9 % of total area under pomegranate in the state). Dry land horticulture is picking up fast in the district. The important horticulture crops grown in the district are pomegranate, Saputo, Beer and Papaya. Study of the economics of pomegranate production is indispensable since there is no proper farm business data on its cost of production. The accurate figures on establishment cost, operating cost and input requirement of pomegranate orchard could be of great help to the pomegranate growers of Chitchatted district in particular.Therefore, an attempt was made to study the investment pattern in pomegranate orch ard and to compute the cost and returns in pomegranate litigation in Chitchatted district. 164 Karakas J. Agric. Sic. ,24 (2) : 2011 Period (BP), Net Present Value (NAP), Benefit Cost Ratio (BCC), and Internal Rate of Return (AIR) were computed. Results and discussion The cost of establishing a pomegranate orchard up to bearing can be broadly classified into establishment cost and maintenance cost.So, the establishment cost included not only the costs incurred in the zero years that is at the time of planting but also the costs incurred in maintaining the plants till the time of bearing that is up to three years tot planting. For establishing, pomegranate orchard investment NAS to e made on land, well, pump set, pump house, plant material, digging of pits and sprayer and these costs together constituted the material costs of establishment. These costs have to be invested during the year of establishment of the orchard and are considered as the costs incurred during zero year in the study.During next three years farmers has to maintain the orchard by applying fertilizers, manures, chemicals irrigation etc. The costs incurred by the farmers on all these items for the three years are grouped together as cost of maintenance. The total costs of establishment (Table 1) were found to be 1,90,888. 1 and 1,89,644. 33 per ha of which material costs constituted 56. 87 and 58. 15 per cent and maintenance costs 43. 13 and 41. 85 per cent in Chalkier and Hurry talk respectively. Similar results were obtained by Giuliani (1990) in his study of the pattern of investment in pomegranate orchards in Bujumbura district, Karakas.The establishment cost 24,229. 53) consisted of material cost in the initial year (85. 65) and maintenance cost (49. 35%) Upton bearing three years. The material cost included the value of land, plant material, cost of digging of pits and planting, well, pump set, pump house, and sprayer. The per hectare total establishment cost worked out to be 24, 224. 5 3 and returns per orchard was 45,429. 96. The maintenance cost (Table 2) as indicated in the results included the wages of labor as well as cost of materials utilized and fixed costs in Chalkier talk. It was observed that out of Table 1 .Investment pattern in pomegranate orchards SSL. No. Particulars total maintenance cost the major component was variable cost followed by material cost and fixed cost. Under the variable cost the labor cost formed an important cost accounting nearly 50 per cent of total maintenance cost, since the crops require Geiger amount labor involvement to prefer the important activity like loosening the soil around the trunk and formation of basin, watch and ward, pruning and training and land preparation etc. Among material cost the major component fertilizers, PC and manure.Since the pomegranate crop is responsively to nutrient and as well as in the recent year the diseases like bacterial blight and anthracnose have created lot of problem hence to control th ese diseases the farmers have been trying with different chemicals thus the expenses on these items were found to be higher. So far as fixed cost is concerned the rental value of land formed the major cost component and it is observed that because of the higher productivity of the land and crops which are higher profit fronted the farmers to go for renting of land for the production of pomegranate crops.Even for the farmer who has been entering this crop on their own land where imputed the rental value taking into consideration ongoing rental rate the cost worked out to be higher. Since the opportunity cost of land was taken into consideration for calculating the rental value of land,it was found to vary over the years. In Hurry talk, the maintenance cost (Table 3) included the wages of labor as well as cost of materials utilized and the fixed costs. It was observed that variable cost formed an important component followed by material cost and fixed cost.

Friday, August 30, 2019

Evaluation of Software Industry in Bangladesh Essay

Chapter-I: Introduction 1. Origin of the Study The MBA program of DIJ requires that each student complete an internship attachment period of at least 10 to 12 weeks with an organization and submit a report on the basis of it. Considering the fast pace of the software industry today, I am working one of the youngest and brightest organization in the industry, Hello Dacca, as my place of internship. There is a lot of speculation regarding the future of the software industry, in general. With the little bit of healthy competition that the industry had been lacking till now, it is no doubt that the consumers would soon egin feel its affect in the form of lower prices and more packages to choose from. However, it remains a doubt as to which companies would Just survive and which companies would thrive and prosper. Hence, I chose to carry out a comparative analysis of the prospects and challenges of software companies in Bangladesh, with particular emphasis on the future prospects of Hello Dacca Pvt. Ltd. 1. 1 Watershed of the Software Industry In 1955, the world’s first software company was formed in the United States. Now, more than half a century later the software market has entered a period of drastic change. Many information processing functions found in packaged software has been transferred to the Web, and the use of open source software (OSS) has become widespread. There are also strong signs that â€Å"Software as a Service† (SaaS) will assume a greater prominence. These developments go beyond a mere discussion of whether to charge fees or to choose between packaged software or contracted development, or to use open source or proprietary software; they have shaken the software industry to its very foundation. Will the software industry continue to develop as a high-tech industry, or will creative destruction occur and a new industry rows from the ashes? Perhaps the industry will disappear altogether and become just another business service like embedded software? Tim O’Reilly describes three long-term trends in the evolution of software: (1) commoditization, (2) network collaboration, and (3) SaaS 2. History & Definition of the Software Industry Software Industry consists of that part of computer programming activity that is traded between software-producing organizations and corporate or individual software consumers. Traded software represents only a fraction of domestic software activity, whose extent cannot be reliably estimated, since much computer rogramming takes place within firms and its value is not captured by the industrial census or software industry analysts. According to the industry analyst INPUT, in 2000 the U. S. market for traded software was $138 billion (Table 1). The U. S. software in the year 2000 were $259 billion, according to the trade publication Software Magazine. The traded software industry consists of three main sectors: programming services, enterprise software products, and shrink-wrapped software products. These three sectors became established in the mid-1950s, the mid-1960s, and the late 970s, respectively, in response to the technological opportunities and the business environment of the time. The most successful firms developed specialized capabilities that enabled them to prosper within their sector; however, this specialization made it difficult to move into other sectors, and very few firms have been successful in more than one software sector. It should be noted that the software industry is not confined to independent software vendors, but also includes computer manufacturers such as 18M, Unisys, and NCR who supply programming services and software products alongside their hardware offerings and are among he largest software suppliers. These are sometimes referred to as â€Å"captive† markets because computer users have relatively little choice in the supplier of basic operating software for corporate systems. 2. 1 Programming Service The first commercial electronic computers†usually known as â€Å"mainframes†Ã¢â‚¬ were sold in the early 1950s. They were very expensive, typically renting for $100,000 a year. Most computer-owning corporations undertook their own program development and operations, for which they maintained a staff of up to thirty or forty individuals. This was not a disproportionate expense in relation to the overall costs of unning a computer. By the mid-1950s, however, mainframe prices had fallen significantly, and computer use diffused rapidly†the national computer stock rising from 240 mainframes in 1955 to over four thousand by 1960. Owners of these more moderately priced computers were often unwilling to recruit a permanent programming staff, preferring instead to commission programs from software contractors. Many of the early programming services firms were established by programming entrepreneurs to satisfy this demand. The first such firm, the Computer Usage Corporation (CUC), was incorporated in New York in 1955 by two ormer IBM programming employees, and the firm initially specialized in developing technical applications for the oil and engineering industries. The capital barriers to software contracting were (and remain) very low, and it was often said that all one needed was â€Å"a coding pad and a pencil. † The most important capability was the technical knowledge of the principals, usually acquired through working with a computer user or manufacturer. Several dozen firms entered the programming services industry in the second half of the 1950s. In a majority of cases, the firms pecialized in particular technical applications, or within a vertical market such as financial services, retail, or manufacturing. A very different type of entrant came into programming services in the mid-1950s, specializing in the construction of very large programs that were beyond the technical capability of even the largest and most sophisticated users. The first firm of this kind was the Systems Development Corporation (SDC), a subsidiary of the RAND Corporation, Santa Monica. SDC was incorporated in 1956 to develop the programs for the giant SAGE air-defense system. more than a million computer instructions. SDC employed several hundred programmers, estimated at the time to be perhaps halfof the nation’s programming manpower. SDC also trained hundreds of individuals to become programmers. There was, however, a rapid turnover of staff, as experienced programmers left for more remunerative employment in the private sector. At the time, SDC was hailed as the â€Å"university for programmers† and it was said that in the 1960s, SDC alumni were to be found in almost every major software firm in the country. SAGE was a â€Å"real-time† system, in which the computer lay at the heart of an information system that esponded instantaneously to external events. As the U. S. government deployed more and more real-time defense systems in the late 1950s and 1960s, systems integrators such as TRW, MITRE, General Electric, Wasting house, Hughes Dynamics, and Lockheed began to develop expertise in software construction. Real-time technologies were hugely expensive to innovate but once established by the military, they quickly diffused into the civilian sector in applications such as airline reservations and on-line banking. When Europe and the rest of the world began to catch up in the 1960s, American independent software firms and the programming ervices operations of computer manufacturers had a strong first-mover advantage. By the late 1960s, the most successful of the start-up software contractors had become significant firms. For example, by 1967 CUC had 700 employees, offices in twelve U. S. cities, and annual sales of$13 million. CUC, and firms like it, now offered a broad range of computer services that went well beyond program writing. Another firm, the Computer Sciences Corporation of El Segundo, California, established in 1959 by five programmers to write software for computer manufacturers, grew to ecome one of the largest computer services firms in the world (which it remains, with revenues in 2000 of$9. 4 billion, and sixty-eight thousand employees worldwide). Nonetheless, giant firms are the exception and the programming services industry is remarkably lacking in concentration. By the late 1960s there were several hundred programming services firms, but less than fifty of them had as many as a hundred employees.

Thursday, August 29, 2019

Public Health Promotion Strategy

Public Health Promotion Strategy of Lhuntse Introduction Public health is the first priority of a nation as health is the chief priority to man. According to the American Public Health Association, APHA(2001), public health as the practice of preventing diseases and promoting good health within groups of people from small communities to entire countries. The functions of public health include preventing epidemics, monitoring health status of the population, developing policies and laws to protect health, providing health care services at all costs and all activities related to benefiting public and their health.Bhutan, within the confines of China in the north and India in the south, was a late bloomer in to development. Now, 90% of the population has access to basic health care services delivered through a network of 29 hospitals, 176 Basic Health Units and 541 outreach clinics. Of the twenty Dzongkhags or districts in Bhutan, Lhuentse dzongkhag is one of the least developed with ei ght gewogs. â€Å"Most of the villages are still in accessible with lack of roads and electricity. one hospital, 11 Basic Health Units and 31 Outreach clinics render public health services in the dzongkhag.About 50% of the households have access to piped drinking water supply. †(Ninth five year plan, Bhutan, n. d). This paper plans to focus on studying the public health sector scenario in the particular dzongkhag and improving it. Purpose of the action plan Purpose of the action plan is to promote various factors such as followings †¢To improve maternal health care, it is very essential to provide healthy manner of health services to improve maternal health care to make pregnancy safe. Mother’s education, Mother’s education is the basic knowledge of parenting. †¢To Improvement in food supply and sanitation, improvements in food supply and sanitation will lead to increase life spans and reduce disease. Initiatives taken by the health services such as cl ean drinking water supply and hygiene directly help in improvement in food supply and sanitation. †¢ To Reduce in Poverty, to make reduction in poverty line . To Change living standard, with the development taking place in the country, living standard of the people has been rapidly changed.Public health Issues and Concerns †¢Lhuentse Dzongkhags has the concern over the issues related to public health as follows; †¢As the morbidity among the children under five year of age and all pregnant women and women in child bearing age was accounted to , Male-767 and Female-642. (PHCB, pg. 191). †¢The number of deliveries of the new born babies attended by health professionals was – 90 pregnant women, whereas, the number of deliverie not attended was recorded to -231 cases as noted in (PHCB, pg. 04). †¢According to PHCB, 2005,The Dzongkhag has also noted the increase in the number of disables that was numbered to 990 people and most were disabled to seeing that was recorded to-327 people. (PHCB,pg. 211) †¢Most of the people in the Dzongkhag had limited access to safe drinking water with the account of 253 households having piped water within house and 2377 households having piped water outside house. (PHCB, pg. 222) 5.The people in the Dzongkhag had limited acces to basic health facility of proper toilet. As, 2143 households had the accessibility to pit latrine and 423 households had no latrines at all (PHCB, pg. 241). The issues also includes, †¢Maternal and child health †¢The lack of nutrition in the diet leading to malnutrition †¢Outbreak of infectious diseases †¢The high alcohol consumption leading to increase in alcohol related diseases (Liver cirrhosis). Public Health Promotion StrategyTheir strategies put emphasis on improvement ofquality of services, development of human and institutional capacity, and decentralization with focus on rural access. 1. Enhance the quality of health services To improve the qual ity of services and further consolidate the infrastructure. Standardization and quality assurance, focusing on diagnostic and healing aspects, and use of appropriate technology. 2. To reach the inaccessible population There are still population groups who are not reached satisfactorily by the health services.Taking into account all of the problems and factors, Out Reach Clinics (ORCs) have been constructed and organized. 3. Strengthen traditional medicine system The traditional medicine system is being strengthened with the emphasis on human resource development through the Institute of Traditional Medicine. This has also been included in the ordinary health services at the hospital. The capacity and productivity of the Pharmaceutical Units have been increased.

Wednesday, August 28, 2019

Research Paper for Master of Midwifery Details to follow Essay

Research Paper for Master of Midwifery Details to follow - Essay Example to these are the development of rapid diagnostic tools in molecular biology like the polymerase chain reaction, microarray technology and DNA sequencing facilities (Berg et al, 2002; Mathews andVan Holde, 1996). In obstetrics, many antenatal tests are offered at different gestational periods (British Columbia Reproductive Care Program, 2003). Options for genetic testing are given to the mother once she presents as pregnant following the guidelines set by the country’s National Health Service (Department of Health, 2007). Issues that surround antenatal genetic screening are those that pertain to the safety of the fetus and the mother due to the sampling procedures, the implications for the termination of the pregnancy if the tests come out with a prediction or detection of serious genetic illness, the provision for an informed choice to the mother and/or father, and the roles that the medical practitioner play during the antenatal period (Rothenberg and Thomson, 1994; Kent, 2005). The aim of this paper is to present basic antenatal screening procedures, the difficulties and genetic counseling associated with the decision-making process towards pregnancy termination, the roles that health care personnel play during this period, and antenatal care of the mother who decides on the fate of her unborn child. Each person is different from all others because of his distinct DNA. This DNA codes for his genes, and these genes are translated to the proteins or enzymes that are involved in basic metabolic processes of life (Mathews and Van Holde, 1996; Alberts et al,2002). When there is a defect in the genetic code, an erroneous protein is produced and the metabolic process where this protein participates in is affected resulting in disease. There are many causes of genetic defects because of the several essential processes leading to the correct translation of the protein code (Kornberg and Baker, 2005). Single errors or mutations in copying a piece of DNA can lead a

Tuesday, August 27, 2019

Organizational Analysis, FMC Green River and FMC Aberdeen Essay

Organizational Analysis, FMC Green River and FMC Aberdeen - Essay Example I. FMC Aberdeen is a relatively new location for FMC that manufactures missile canisters for the Navy. It is a complex and highly technical component, but it is the only product made at Aberdeen. Aberdeen, with 100 employees, has been managed by a succession of individuals who have empowered the employees and encouraged the company to be a thinking organization. They work in teams of from 3 to 16 members, the employees are flexible, and they seek unique solutions to problems on a continual basis. This approach has worked well for Aberdeen and the present manager Roger Campbell has been very successful (Clawson 2005). The manager of FMC Green River, Kenneth Dailey, would like to incorporate some of Aberdeen's organizational models at the Green River facility. The Green River plant is over ten times the size of Aberdeen. It has been in existence for over 50 years, almost since the beginning of the parent corporation. The plant is unionized and the labor is specialized. There is not a close company social structure associated with work at Green River. Green River is a good place to work, the employees are well paid, and they have no trouble attracting qualified applicants (Clawson 2005). III. The types of jobs at the two facilities are considerably different. At Aberdeen, everyone works toward the production of one product. Though there are several stages to its production, there is a common bond to the end result. At Green River there are several products and numerous customers. There may be a separation between departments that produce the different products. Furthermore, the employees at Green River are geographically isolated within the plant. The plant at FMC Aberdeen is more adept at the management of ability due to its smaller size and limited products. The Aberdeen plant has a history of open management styles. The workforce has been hand picked to operate in this environment. They work well in teams and understand the concept of networking. The employees of Green River are Union workers who have not been exposed to an open team environment. They may not have the organizational ethics that are required for Aberdeen's organizational structure. Green River's workforce has been selected based on their qualifications, but haven't been screened for ability to work in teams or to network. This has given the FMC Aberdeen workforce a great organizational commitment with the necessary ethics, while Green River has developed a culture and an atmosphere of a rigid bureaucracy that expects others to solve the problems that are outside their job description. The Green River plant has taken on its own culture and it has become institutionalized within the organization. The geographical isolation has reduced communications and the Union structure has discouraged free thinking and acting. This has reduced both organizational commitment and job satisfaction. The employees at Green River have certain expectations of management in the way of pay, raises, and safety. In return, management gets dependability and production. Job satisfaction and organizational co

PROBLEMS AND CHALLENGES OF SUSTAINABILITY IN THE PROFESSIONS (fashion Essay

PROBLEMS AND CHALLENGES OF SUSTAINABILITY IN THE PROFESSIONS (fashion marketing) - Essay Example Introduction Fashion has always been the heart of the matter for most individuals and does not have an age barrier to contain its creativity. Fashion is enjoyed by the young and the old alike, but how far this industry is able to sustain itself is a matter of concern among fashion gurus within fashion markets. Sustainable fashion has the backdrop of a developing design philosophy and tries its best to cater to people according to changing times, tastes and trends in relation to its sustainability. In our contemporary society, fashion has taken on a whole new meaning in relation to the bigger picture involving sustainable designs. The environment is the fulcrum around which sustainable fashion revolves and it seems to have impacted upon the fashion industry in a big way by initiating the production of clothing made from plants such as bamboo, flax, corn and wood pulp. This is because people have become more conscious of their environment and what it has to offer them in terms of †Å"eco- friendly products† that are not very cost effective but quite safe to use. This research attempts to investigate how the environment impacts upon the fashion industry and helps in sustaining it. ... Sustainable fashion in simple words is environmental friendly clothing and is part of the larger picture of â€Å"ethical fashion†. According to Vogue of 2008, ethical fashion is not ‘a short term trend, but one that could last for many seasons.’ (Vogue, 2008) Many fashion designers have adopted the concept of sustainability and are making use of more environmentally friendly materials and methods in their clothing production. However, the cost of sustainable fashion clothing in comparison to the traditional manufacture of clothing, is much higher for the simple reason that much greater care has to be taken for the maintenance, manufacture and transport of these products. In terms of cost, a sustainable designer has to spend 30% more on organic material than when making use of regular cotton. This is the reason why many sustainable fashion designers are not in the position to manufacture their eco- friendly clothing using100% of organic material. Celebrities like Jennifer Aniston, Cameron Diaz, Stella McCartney, Selma Hayek, and Bono have exhibited a social responsibility and solidarity by drawing people’s attention to environmentally – friendly fashion and creating an awareness among them. In support of sustainable fashion, many fashion magazines encourage small photo spreads to be featured in their magazines. Fashion magazine ‘Elle’ was the first to initiate a complete issue on ‘green fashion’ that was printed on paper that was recycled. Another good example of social responsibility is that of Wal-Mart that has become the largest buyer in the world of organic cotton. In addition to this, Wal-Mart is reducing the use of

Monday, August 26, 2019

Sexuality in America comedy show Essay Example | Topics and Well Written Essays - 1250 words

Sexuality in America comedy show - Essay Example It is obvious that comedy shows tend to replicate the environment which fits the society regardless of the degree of contamination of the environment. Last Holiday is a comedy movie directed by Wayne Wang and is a remake of a 1950 British comedy that involves a woman who decides to enjoy pleasure when she finds out that she is going to die. It is a generic and romantic comedy with Queen Latifah, the main character and the main reason to enjoy the movie. It is interesting to note that someone enjoys her life only when she realizes that she is going to die instead of what most people could have done of forgoing the fun and perhaps ask their doctors for any other alternative and pray hard (Wang Film). The Queen Latifah’s ailment, which the doctor describes as diabolical, leads to her instant transformation from being a boring spinster to life of pleasure. She decides to abandon her desire of becoming a great cook and the need for dieting when she is told that she has three to four weeks to live. Latifah who plays a sales clerk named Georgia cashes in her savings to enjoy life in Czech Republic where her hero Chef Didier works. She mingles with other major powerbrokers in the hotel, she treats herself to all the services of spa, and the ski slopes (Wang Film). Georgia attracts the attention of wealthy men seated in the hotel and could not help taking their eyes off because of her beauty. She brings romance in the air due to unmistakable chemistry with LL Cool J as well as being attractive to the staff and the chef. However the films starts to bore when the focus turns from being a romantic comedy to parts that are more concentrating on politics, healthcare issues and corruption. This movie shows the attitude of most men who view women as sex tools. Sexual appeal of a woman’s body is crucial since a woman is considered a

Sunday, August 25, 2019

Discussion question week 5 Essay Example | Topics and Well Written Essays - 250 words - 1

Discussion question week 5 - Essay Example s in formal social control like engaging in criminal activities like stealing and killing leads to formal prosecution or punishment by the concerned social authority. On the other hand, failure to comply with the informal social control system often leads to subtle punishments such as mockery, gossip, and even being ignored (Innes 43). An example is discouraging an obese friend from eating too much food on the condition that if he does he or she will be mocked. Deterrence is the act of preventing a certain behavior or act from repeatedly happening. General deterrence is the impact of the threat of legal punishment on the public at large while specific deterrence refers to the impact of the actual legal punishment on the apprehended people (Akers 19). While specific deterrence focuses on an individual in question and aims at discouraging them from future criminal activity by instilling an understanding of the consequences, general deterrence focuses on the general crimes prevention mechanisms with reference to specific social deviances (Akers 20). For instance, violating traffic laws that influence driving behaviors leads to the apprehension with respect to general deterrence while specific deterrence results from actual experience of apprehension and prosecution of the offender. However, both types of deterrence are ways of instilling order in the society as they ensure that people abide by the set rules and

Saturday, August 24, 2019

Management Society and new forms of work Essay Example | Topics and Well Written Essays - 1500 words

Management Society and new forms of work - Essay Example On the other hand, it can be seen that this concept raises a lot of social issues that might also destabilise peace and tranquillity in different areas. Against this backdrop, this paper has been designed to explore the reasons why the issue of precarity is of concern to the current labour and management practices. The paper starts by outlining the concept of precarity and its impact on the welfare of people as well as to suggest measures that can be implemented in order to address this particular problem. The concept of precarity is a quite a new sociological discourse in the contemporary labour and management practice. â€Å"In 2003, the concept of precarity emerged as the central organizing platform for a series of social struggles that would spread across the space of Europe,† (Neilson & Rossiter, 2009, p. 51). This concept is concerned with highlighting the issue that social security in different workplaces is disappearing as a result of the fact that the employers are pr imarily concerned with productivity in their organizations while overlooking the needs and interests of the employees such as improving their welfare through offering them rewards for their efforts. This scenario is evident in different sectors of the society where people working on part time basis, permanent employees as well as the unemployed often find themselves in a predicament where they often fail to derive security from their jobs. These people live a precarious life whereby it can be seen that they are not in a position to secure themselves against things like mounting debts as well as to enjoy good welfare. People who are entitled to low wages also face the same predicament since they are forced to eke a living from the meagre income they earn from their work. The concept of precarity has negative effects on different sectors of the economy and society at large. Generally speaking, employees living under precarious conditions are not satisfied with their work. According to a study by Patterson et al (1998) entitled, ‘Impact of People Management Practices on Business Performance,’ it can be seen that people in an organization make a difference between success and failure. The management practices have an impact on the performance of the people in the organization. People who are satisfied with their work are productive compared to those who are not. Satisfaction can be derived if the employees are rewarded for their effort in an organization. However, if there are no measures in place that are designed to address the issue of employee motivation through giving them rewards for their performance, it can be observed that the workers are likely to lose goodwill in the company in the long run. The adverse effects of precarity among the workforce during the contemporary period mainly involve aspects related to quality of work as well as productivity. According to Robbins (1993), a workforce that is dissatisfied is likely to be less productive compared to workers who are happy about their work. This impacts on the performance of the organization as a whole since it may fail to achieve its set goals. On the other hand, it can be seen that this state of affairs can also compromise on the aspect of quality of the goods and services offered by the company concerned. This in turn may impact on the profitability of the company since the targeted customers

Friday, August 23, 2019

Consent form, permission letter&interview questions Essay - 1

Consent form, permission letter&interview questions - Essay Example rved: that the interview would be conducted on the free-time of the indicated manager within the hotel premises, that the company name, as well as the names of the managers should be disguised in the project, and that the results must be shared with the HR department. As a Master of Science in Administration graduate student at CMU, I am currently conducting the above-mentioned research in compliance with graduation requirements. In this regard, I am hereby seeking the consent of your organization, the Sheraton Dongguan Hotel, to participate in the study. The study aims to explore and determine the strategies employed by Sheraton Dongguan Hotel in China which enables them to excel in an increasingly competitive hospitality service industry. As such, five (5) managers in Sheraton Dongguan Hotel, specifically those in the position of designing or implementing strategies, are planned to be interviewed. As the researcher, I will conduct the interview on a face-to-face basis, depending on the availability of the manager. Please bear in mind that I would abide by standards of ethics in research where privacy and confidentiality is strictly to be observed. No personal information would be divulged in the study. You are free to refuse to participate in this research project or to withdraw your consent and discontinue participation in the project at any time without penalty or loss of benefits to which you are otherwise entitled. Your participation will not affect your relationship with the institution(s) involved in this research project. Please note that if you are not satisfied with the manner in which this study is being conducted, you may report (anonymously if you so choose) any complaints to the MSA Program by calling 989-774-6525 or addressing a letter to the MSA Program, Rowe 222, Central Michigan University, Mt. Pleasant, MI

Thursday, August 22, 2019

Effects of television Essay Example for Free

Effects of television Essay Television may be one way to educate children but alongside of it is something that is very hazardous especially to toddlers. Letting your children watch cartoons such as Dora the Explorer, Sesame Street and the likes is both beneficial and dangerous. At some point there are things that need to be addressed by the parent when their children are watching television on their own. For parents whose child is under 2 years of age, letting their kids watch television for the entire day would be very harmful. One way to prevent any untoward things to happen at a young age is to limit their viewing hours. The Baby Center Medical Board Advisory wrote in their website: Since your child is under age 2, its best to keep TV-watching to a bare minimum. If you choose to allow some television, break it up into 15-minute increments. Much more than that and your toddlers brain can shift to autopilot. Do away with letting your children watch television program of their choice as it may have violent scenes. Researchers have found that when a toddler watches those kinds of programs, it is likely that they will, sooner or later, imitates the scene or they will display an aggressive behavior. Also, letting children watch television all day would give them less time to read books, exercise, play outdoors and make friends in the neighborhood. If a child owns a video game console, there is a big chance that they will be hard to discipline. Parents will have to deal with calling their kids for dinner time and get no response since they are busy with whatever game they are playing. The promotions of different kinds of alcoholic drinks, cigarettes, and illicit drugs are also harmful to children who watch television all day. Such kind of promotion makes the child think that using these products is good for everyone. Additionally, the meaning and ideals conveyed in any television program may give children a different understanding of things that will eventually influence the way they think and the kind of behavior that they will exhibit. A concern raised by the American Academy of Pediatrics says that, children are being subjected to much sexual imagery in the likes of music videos, television programs, and the advertisements. On the other hand, there are things that can be taught while watching television such as good moral values, following proper diet, other learning such as speaking, reading, appreciation of arts and many others. Parents should actually guide their children when watching television. They should be able to explain to their children what is happening in the scene or if the scene is not appropriate for them. Also, having parents watch television with their children is one way of bonding. There is a way where parents can restrict the shows that can be seen by the children through the help of the V-chip. V-chip is a device use to block programs that are not suitable for children in a specific age bracket. Setting the viewing time limit of a child can contribute much to their growth. A practice such as letting children watch television program only after finishing their homework is one of the ways where they can be limited to watching or playing video games. More, watching television is risky for children since they tend to become obese. A study presented by Harvard Medical School student, Sonia Miller, shows that the more a child sits in front of the television set, the more tendency of eating unhealthy foods and taking in too much sugar. The study showed that for each additional hour of TV viewing per day, the children consumed 0. 06 additional servings per day of sugar-sweetened beverages, 0. 32 additional servings per week of fast food and a total of 48. 7 additional calories per day, after adjusting for age, sex, maternal socio-demographics, race, body mass index, breastfeeding duration and sleep duration. Moreover, the more additional hours a child spent in front of the boob tube means that they have taken a number of fruits or vegetables that is required for their daily intake. However, Miller said that obesity and television watching is in any way not the same. â€Å"Watching television all day and doing nothing physical is not a cause for a child to be obese at an early age, but still the researchers are working out on the said matter† (Lepage-Monette, 2007). However, for a working mother, she cannot just contain her children to watch programs that she intends to watch. In a confession made by a working mother, she said that in order to have things done, she sometimes needs to turn on the television to catch the attention of her children and leave her with whatever work she has to do. The use of television in school is, on the other hand, one way to get the attention of a child especially those in their kindergarten. With the use of different educational DVDs, students become more interested in learning things. Using videos that have subjects like biology and history captures the interest of a student since they tend to understand more the lesson given that they are able to see it for themselves. In biology, the teacher can let their students watch a certain episode on National Geographic or Discovery channel that is in reference to their upcoming lesson. In the Philippines, there are television programs that are intended to be used as an instructional media to students. There are programs for enriching the knowledge of students in Mathematics, Science, English, History and Literature and the Arts. For over 4 years, the Philippine government has agreed to use these media in order to teach students. Both private and public schools in the Philippines use the said media to let their students further understand the lesson. Personally, the use of instructional media like that in the Philippines is very beneficial to students. It does not expose the student to a long time of television viewing yet it helps them understand their respective lessons with the help of the videos. Letting students read thick books is something that they will not do and will only give them the idea of having an A-list classmate do the work and in the end; the student does not learn anything. Whereas, with showing video clips or documentaries, they tend to be more attracted to the lesson and will later on research on things that is in accordance to what they saw and learn a thing or two from it. It is not bad to let children watch television programs, only there should be proper guidance from elders. And these elders should be able to explain if the scene is really intended for students at a particular age or not. References BabyCenter Medical Advisory Board (2006, October). TV-watching guidelines for toddlers Milton Chen, Ph. D. (1994). The Smart Parents Guide to Kids TV. KQED Books. Hanna D Margeirsdottir; Jakob R Larsen; Cathrine Brunborg; Leiv Sandvik; et al (2007, June). Strong Association Between Time Watching Television and Blood Glucose Control. Diabetes Care. pg. 1567.

Wednesday, August 21, 2019

Video games Essay Example for Free

Video games Essay â€Å"What Video Games Have to teach us about Learning and Literacy† I’m sure that we all are, or were at one time, around video games whether we were playing the game or someone we know was playing. Most adults think children spend too much time playing video games. I know my mom is constantly yelling at my 10 15-year-old brothers to get off. My mom thinks that video games for so long will eventually ruin their eyesight. My brothers are video game addicts. My brothers always complain when my mom tells them to get off. Maybe my mom is wrong about video games. Maybe they could actually help my brothers. James Gee has a different thought than my mom and most parents. James Gee is also a father of his 11-year-old son, which made Gee â€Å"immigrate† to the world of video games. James would sit there with his son and play with him, until one day he decided that he would play on his own. After playing by him, James realized that there is a lot more to video games and they can actually in a way be positive. James sees video games as a way for children to use their brains. You have to learn how to play the game before you play it or else you will not be able to move forward in the game. Most games have a goal that you have to learn how to get there. By the children learning how to play, it is positive and in scary way actually benefits the children even though parents would never think it. Gee and Prensky’s views are similar. In Prensky’s essay he says that he thinks it would be the right time for us to advance our educational system because as we can see, technology is now a big part of our generation and it is only going to grow. Prensky referred to the students of the world today as â€Å"digital natives† because we grew up with digital technology. Growing up into the world of technology made us adjust and get used to using it so quickly. The teachers don’t know as much as the â€Å"digital natives† (students) do about new technology. In my opinion, I think technology is a great thing in the world today. As a student in college, technology plays a huge part. I use my computer for 99% of my schoolwork. I use it in class, to take notes, for homework, for research, to print, etc. I’m sure I am not the only one that doesn’t like to read, so instead of us students using the library to use books for research, we can do it on our computers. I personally do not play video games and cannot see myself sitting there like my brothers for countless hours learning how to play. I definitely do agree with Gee, and can see video games benefiting people of all ages.

Tuesday, August 20, 2019

Definition Of Voting System Information Technology Essay

Definition Of Voting System Information Technology Essay Using an electronic voting system has become more and more popular worldwide and is replacing traditional paper voting methods. However, with wider adoption it has been increasingly criticized for not being secure enough and has had some controversy over the fact that the voters need to put their trust in a system they have no idea how works and is often closed black box device. However, although users demand a transparent and secure voting system, they also demand fast and reliable results, and that is something that only an electronic voting system can provide. In the last decade many organizations and governments have started electronic voting. Some companies have also specialized in electronic voting systems, and some of them have had a lot of criticism19 2 Definition of voting system a voting system is not just the equipment necessary to cast a vote. the voting system standards (VSS) has two definitions, addressing the physical and functional components of a voting system. the physical aspect defines a voting system as comprising all the hardware and software, procedures, manuals, and specifications . http://homepages.nyu.edu/~tsc223/ElectronicVoting.pdf Voting system means, a method of casting and processing votes that functions wholly or partly by use of electromechanical, or electronic apparatus or by use of paper ballots and includes, but is not limited to, the procedures for casting and processing votes and the programs, operating manuals, tabulating cards, printouts and other software necessary for the systems operation. A voting system consists of a configuration of specific hardware and software components, procedures and expendable supplies; configured into a system which allows votes to be cast and tabulated. No single component of a voting system, such as a precinct tabulation device, meets the definition of a voting system. Sufficient components must be assembled to create a configuration, which will allow the system as a whole to meet all the requirements described for a voting system in this publication. http://election.dos.state.fl.us/voting-systems/pdf/dsde101Form.pdf Properties of voting systems Researchers in the electronic voting field have already reached a consensus pack of four core properties that an electronic voting system should have (Cranor and Cytron 1997): Accuracy: (1) it is not possible for a vote to be altered, (2) it is not possible for a validated vote to be eliminated from the final tally, and (3) it is not possible for an invalid vote to be counted in the final tally. Democracy: (1) it permits only eligible voters to vote and, (2) it ensures that eligible voters vote only once. Privacy: (1) neither authorities nor anyone else can link any ballot to the voter who cast it and (2) no voter can prove that he voted in a particular way. Verifiability: anyone can independently verify that all votes have been counted correctly. Accuracy, democracy and verifiability are, in most cases of todays electoral systems, assured by the presence of representatives of opposite parties. The privacy property is currently assured by the existence of private voting booths, allowing voters to cast their votes in secrecy. 50 Voting system life cycle Many discussions of voting system security vulnerability fail to consider the entire voting system. In addition to the hardware and software that make up the voting equipment, the system includes election workers, voters, and is deployed in a variety of physical environments. Election workers are often volunteers whose skill with technology can vary widely. Similarly, voting technology that assumes a level of technological literacy on the part of the individual voter will potentially be susceptible to error. A security assessment of election equipment that only considers hardware and software without examining its use in real contexts may conclude that the equipment is satisfactory. Considering the larger system including election workers and voters will require analysis of procedures with a focus on fair voting criteria anonymity, confidentiality, integrity, and audit ability. http://www.ejeg.com/volume-2/volume2-issue3/v2-i3-art4-lauer.pdf Voting Places Voting at polling places [8] : The department can provide the reliable, no virus, and easy-handled voting machine in the polling places. The voters can be authenticated by the traditional protocol and the technological authentication of voters might not be necessary. It provides the highest security compared to other electronic voting place. Voting at home with voters computer [8]: Voters can cast their votes by using their own computers at home. It is hard to prevent the third partys advertisement appearing on the screen while voting. It is much more difficult to secure the voters computer from the attacks of hackers and virus. Voting at anyplace with mobile devices [8]: The voters can use their devices to get access to internet in any place and cast a vote through the electronic voting system. Not only can the laptop be used to vote, the PDA, cell phone, and any other mobile devices might also be used to vote in the future. But there are many harsh problems need to overcome. The security is the most serious problem. It is vital to make sure that the computer and network in which the voters get access is not monitored, intercepted, or tampered by any attackers. http://homepages.nyu.edu/~tsc223/ElectronicVoting.pdf Voting in Egypt Voting in Egypt is like any other country; most of countries still using the conventional voting technique in government election, but now Egyptian government think to electronic voting system rather that conventional voting to avoid the problems they faced on it. There is a lot of problem in conventional voting in Egypt: 1- There is no good relationship between the government and popular, popular cant trust the government and depend on it, voter here is like a blind person that must rely on the other person to vote for him. 2- Sometimes, government coerced and carries on the voters to vote for a particular candidate, and eliminate them from voting freely. 3- Some candidates trying to win by buy the votes from the voters. 4- Government can cheat by substitute the original ballot by derivative ones. So there must be another way to solve these problems or reduce it as possible, and give the voters the confidence to believe of the system, form this point we think to use a new technology to improve the election by building a new system that is convenience for environment of our country Egypt. A novel in e voting in Egypt http://docs.google.com/viewer?a=vq=cache:0tkjSklsJf0J:citeseerx.ist.psu.edu/viewdoc/download%3Fdoi%3D10.1.1.96.19%26rep%3Drep1%26type%3Dpdf+electronic+voting+system+diagramhl=engl=ukpid=blsrcid=ADGEESg4A60cHXQU91yKcqMtBvIK_QDFE30y-uM9olPWwuYpBHDS3k8QAmQIPJ_Nrm_aeGkQIaxMoxq3mTREZsaEZvCCdW3GsOQGS61G15RFdCai5s2KbqO728FXRmPkFgmGU_UwQWHbsig=AHIEtbSKAxn_DBTwcaIIcGPif-nYac-epA How voting works In the United States, voting is a local issue. The Federal government certainly has a lot of say about voting through the Federal Election Commission, but in the end, its state and local officials who administer elections. In most states, the secretary of states office runs an elections office that sets rules and administers statewide elections. The actual elections themselves are usually the purview of the county clerk. Moreover, counties and municipalities bear the majority of the cost of managing elections. In 2000, the total county election expenditures were estimated at over $1 billion, or about $10 per voter. Voting is more complicated than simply tallying votes. In fact, most of the work in an election occurs long before the voter ever steps into the booth. Voter registration requires large databases of voters, their addresses and geographic calculation of precinct and district information. Ballot preparation is a long process that is complicated by myriad rules and regulations. The election itself must be administered, usually with the help of a large, volunteer workforce that gets to practice about once per year. All of these activities, in addition to vote tallying, are part of a voting system. http://www.extremedemocracy.com/chapters/Chapter%2011-Windley.pdf Voting systems design criteria Authentication: Only authorized voters should be able to vote. Uniqueness: No voter should be able to vote more than once. Accuracy: Voting systems should record the votes correctly. Integrity: Votes should not be able to be modified without detection. Verifiability: Should be possible to verify that votes are correctly counted for in the final tally. Audit ability: There should be reliable and demonstrably authentic election records. Reliability: Systems should work robustly, even in the face of numerous failures. Secrecy: No one should be able to determine how any individual voted. Non- coercibility: Voters should not be able to prove how they voted. Flexibility: Equipment should allow for a variety of ballot question formats. Convenience: Voters should be able to cast votes with minimal equipment and skills. Certifiability: Systems should be testable against essential criteria. Transparency: Voters should be able to possess a general understanding of the whole process. Cost-effectiveness: Systems should be affordable and efficient. http://www.terena.org/activities/tf-csirt/meeting7/gritzalis-electronic-voting.pdf 3 Definition of e-voting system An electronic voting (e-voting) system is a voting system in which the election data is recorded, stored and processed primarily as digital information. Electronic voting is a means of having a paperless voting system. Electronic voting is a term used to describe any of several means of determining peoples collective intent electronically. Electronic voting includes voting by kiosk, internet, telephone, punch card, and optical scan ballot (a.k.a. mark-sense). Thefreedictionary.com 17 An electronic voting system (on-line voting, internet voting) is an election system which uses electronic ballot that would allow voters to transmit their secure and secret voted ballot to election officials over the internet [2]. With the prosperity of internet over the years, inventers start to make the use of electronic voting in order to make the voting process more convenient and raise the participation of the civic. From now on, engineers have repeatedly created new technology to improve the feasibility of electronic voting system. http://www.terena.org/activities/tf-csirt/meeting7/gritzalis-electronic-voting.pdf electronic voting refers to use of computer or computerized voting equipment to cast ballots in an election. this term, sometimes, is used more specifically to refer to voting that take place over the internet. electronic system can be used to register voters, tally ballots, and record votes. http://profsite.um.ac.ir/~kahani/doc/ejisdc05.pdf 3.1 Type of e voting system E-Voting is a type of voting that includes the use of a computer rather than the traditional use of ballot at polling centres or by postal mail. It encompasses various types of voting: kiosks, the Internet, telephones, punch cards, and marksense or optical scan ballots. http://jatit.org/volumes/research- papers/Vol2No1/4vol2no1.pdf there is two types of e-voting: polling place voting and Internet voting. Polling place voting. In a polling place, both the voting clients (voting machines) and the physical environment are supervised by authorized entities. Depending on the type of polling place (precinct or kiosk [6]), validation may be either physical (e.g. by election officials) or electronic (with some kind of digital identification). Casting and tallying are electronic: the voting clients may be Direct Recording Electronic. Internet voting. The vote is cast over the Internet and the voting client is unsupervised during voting (the voting client may be at home, at work, in a library, etc). Registration may be either physical (at the elections office) or electronic (with some form of digital identification). Validation, casting and tallying are electronic. I-voting requires a much greater level of security than e-commerce. While checking the eligibility of voters, and that no voter casts more than one vote, is no more difficult than meeting the security requirements of an e-commerce application, ensuring this and meeting other requirements such as privacy, a universally verifiable audit trail and uncoercibility, has been difficult to achieve in a practical and affordable way. http://euro.ecom.cmu.edu/program/courses/tcr17-803/Burmeister.pdf Advantage The advocate of electronic voting claims that the convenience, mobility, tally speed, less cost, and flexibility are the main advantages. Following are the descriptions of the advantages. Convenience: With the well-designed software and system, the voters can simply use his voting equipment with the minimal time and skill to finish the voting process [2]. Mobility: Voters can cast their votes at a specific polling place, home, or any place in which they can get access to the internet. People can even use the mobile device such as cell phone or PDA to vote. There is no restriction on the location [2]. Tally Speed: [3] Once the voting time is over, the computer can immediately calculate the result of the election. It is much faster than the traditional ballot counting method operated by people. Less Cost: [3] Compared to paper ballot voting, electronic voting saves money from reducing the personnel expense, expense for location management and administration fee, etc. In the beginning, the investment expense of building up the electronic voting system would be very high. But after the system is built up, the total expense would be reduced to be much lower than paper ballot voting. Flexibility: Electronic voting system can be designed to support a variety of ballot question formats [2]. It can be used to collect public opinions or election. Voter participation: With convenience and mobility of the system, it would motivate people who are not interested in voting or unable to vote originally. It would increase the participation of voters. http://homepages.nyu.edu/~tsc223/ElectronicVoting.pdf 2.5 Disadvantage Despite the particular advantages to electronic voting system, critics of electronic voting argue about the security issue and the unequal access chance to the internet are the main drawbacks to the system. Inequality problem: It is apparent that the people with low salary might not be able to afford the equipment for electronic voting. And some people who are not able to use the computer facility might lose their privilege in voting. Vulnerable to Security: The security issue is the main drawback of the electronic voting system. So far, there are still many kinds of attacks which are hard to prevent completely. The attacks might be happened from the webpage, network, to the extent of servers database. Denial of Service attack: A denial of service is characterized by that an attacker prevents legitimate users from using resources. An attacker may attempt to flood a network and thus reduce a legitimate users bandwidth, prevent access to a service, or disrupt service to a specific system or a user [4]. Now it is very hard to completely avoid this kind of attack. Nevertheless, people can adopt some methods such as Filtering Routers, Disabling IP Broadcast, Disabling Unused Services, and Performing intrusion Detection [4] to make the network more secure. Virus: Virus such as Trojan horse would do great damage to the system. The server can be easily protected from the attack of virus by using some specific kinds of operating system. But the client such as personal computers might not secure enough and are easily infected with virus. These viruses might attack computer from http://www.vvk.ee/public/dok/Yldkirjeldus-eng.pdf E-voting system concept The e-voting concept is similar to the envelope method used during advance polls today to allow voting outside of polling place of voters residence: * the voter identifies himself/herself to polling commission, * the voter fills the ballot and puts it in an inner envelope, * that envelope is put into another envelope on which the voters data is then written, * the envelope is transported to the voters polling station, the voters eligibility is verified, and if the voter is eligible, the outer envelope is opened and the anonymous inner envelope is put into the ballot box. The e-voting follows the same scheme. E-voter creates during the voter procedures an inner envelope (which is essentially an encrypted vote) and an outer envelope (which is essentially a digital signature). The following considerations speak in favour of the envelope method: * simplicity and understand ability of the scheme, possibility to draw a parallel with traditional elections; * simplicity of system architecture the number of components and parties is minimal; * full use of digital signature. http://www.vvk.ee/public/dok/Yldkirjeldus-eng.pdf 2. Votes cannot be known before the official ballot reading; 3. Only registered voters will be able to vote; 4. Each voter will have one and only one vote; 5. Vote secrecy is guaranteed; it never will be possible to link a voter to his/her vote; 6. The voting website will resist any denial of service attack 7. The voter will be protected against identity theft; 8. The number of cast votes will be equal to the number of received ballots; 9. It will be possible to prove that a given citizen has voted; 10. The system will not accept votes outside the ballot opening period; 11. The system will be audible. Character of e-voting system discusses the following characteristics of a good electronic voting system: accuracy, democracy, privacy, verifiability, convenience, flexibility, and mobility. Each account includes the characteristic of accuracy, but the authors define accuracy in different ways. For example, Schneier defines accuracy as direct mapping from intent to counted vote. Standard defines accuracy as the extent to which a given measurement agrees with an accepted standard for that measurement and includes significant discussion of acceptable error rates in the body of the document. For Cranor, A system is accurate if (1) it is not possible for a vote to be altered, (2) it is not possible for a validated vote to be eliminated from the final tally, and (3) it is not possible for an invalid vote to be counted in the final tally. Combining these definitions produces: An accurate voting system counts all valid votes with minimal processing error such that the intent of eligible voters is reflected in the final tally. Each account also discusses the requirement that voters be able to cast their vote in secret, without a link between the voter and the cast ballot. This characteristic is referred to as anonymity, confidentiality, or privacy. Both characteristics, accuracy and privacy, are essential in an ideal voting system. Yet, it is a non-trivial matter to achieve both simultaneously. For example, how do we insure that the intent of eligible voters is reflected in the final tally, without a back-channel to the voter after the vote has been counted but, wouldnt a back-channel to the voter compromise privacy. Each account also discusses the requirement that voters be able to cast their vote in secret, without a link. http://brahms.emu.edu.tr/rza/An%20Introduction%20to%20Electronic%20Voting.pdf characteristics, such as security, reliability, ease of use, and cost effectiveness http://www.gao.gov/new.items/d07576t.pdf Basic Principles of E-voting The main principle of e-voting is that it must be as similar to regular voting as possible, compliant with election legislation and principles and be at least as secure as regular voting. Therefore e-voting must be uniform and secret, only eligible persons must be allowed to (e-)vote, every voter should be able to cast only one vote, a voter must not be able to prove in favour of whom he/she voted. In addition to this the collecting of votes must be secure, reliable and accountable. According to Estonian election legislation e-voting takes place from 6th to 4th day before Election Day and the following requirements are laid out: (1) On advance polling days, voters may vote electronically on the web page of the National Electoral Committee. A voter shall vote himself or herself. (2) A voter shall identify himself or herself using the certificate entered on his or her identity card which enables digital identification. (3) After identification of the voter, the consolidated list of candidates in the electoral district of the residence of the voter shall be displayed to the voter on the web page. (4) The voter shall indicate on the web page the candidate in the electoral district of his or her residence for whom he or she wishes to vote and shall confirm the vote by signing it digitally using the certificate entered on his or her identity card which enables digital signing. (5) A notice that the vote has been taken into account shall be displayed to the voter on the web page. (6) Voter may change his or her electronic vote during the advance voting period from 6th to 4th day before Election Day: 1) by voting electronically; 2) by voting in polling station. http://www.vvk.ee/public/dok/Yldkirjeldus-eng.pdf E-Voting Procedures In this section we will describe in greater detail the behaviour of the components present in the general architecture of the system during different stages of e-voting. 6.1. Key Management The key management procedures and the security scheme used are one of the most critical points of the system on which the fulfilment of the main requirements of the system (privacy and secrecy of voting) depends. What follows is not a final description of the measures and procedures, but we will outline the main concept, main risks and possible solutions. The main tool to guarantee the secrecy of voting in the system is asymmetric cryptography. A system key pair is generated, the public component of which is integrated into client software and is used to encrypt the vote. The private component of the key pair is used in the Vote Counting Application to decrypt the vote. It is of utmost importance that the use of private key is possible only for counting the votes in the VCA (at 19.00 on election day and, if necessary, during recount). When the period for filing complaints has expired, the private key will be destroyed The privacy and secrecy of an e-voter can be compromised by a simultaneous occurrence of two security hazards: a party appears in the system (or outside the system) who has access to both the private key of the system as well as the digitally signed votes. Even though this data is separated in the system, the risk remains. A one and only private key is probably a lot easier to protect than the digitally signed e-votes the latter pass through several system components (Voter, VFS, VSS) and data transfer channels, consequently, the danger of leaked e-votes is higher. Thus fo r ensuring the security the main focus should be on key management. The private key is subject to two dangers: * Compromise or becoming publicly available. The occurrence of this would enable the parties in possession of digitally signed e-votes to determine who cast a vote in favour of whom, thus compromising the privacy of the voter. * Corruption. The private key carrier may be destroyed, lost or be corrupted because of a technical error. When this occurs it becomes impossible to decrypt the e-votes and all the electronically cast e-votes are lost. This is a critical danger and therefore two key pairs should be used simultaneously in the system. The key pair is generated in a Hardware Security Module (HSM) in such a way that the private component never leaves the module. The generation of the key pair and use of private key is maintained by key managers, there should be several of them. A scheme N out of M is recommended, for National Electoral Committee four members out of seven should be present in order to perform security critical operations. Key managers have physical (for example a keycard) as well as knowledge-based (PIN-code) authentication devices for communicating with the HSM. The procedures of key management, meaning the generation of the key pair and PINs, delivery of the public component to the vendor of client application, preservation of the private component, its backup and delivery to the VCA must be subject to audit supervision and should be described in a separate document. http://www.vvk.ee/public/dok/Yldkirjeldus-eng.pdf Paper voting system Paper-based voting: The voter gets a blank ballot and use a pen or a marker to indicate he want to vote for which candidate. Hand-counted ballots is a time and labour consuming process, but it is easy to manufacture paper ballots and the ballots can be retained for verifying, this type is still the most common way to vote http://crypto.nknu.edu.tw/publications/200805ICIM_eVoting.pdf In paper voting, the conformation to these principles is achieved via voter identification, supervised voting and distributed counting procedures. People are admitted to the polling station only once, and they only get one opportunity to cast their vote. It is also hard to add invalid ballots to or remove valid ballots from the ballot box unseen. The paper system uses separate counting sessions in the different districts, and allows any citizen to attend the counting process, and thereby verify the result. Moreover, since voting is done under supervision of the election officials, you will be guaranteed a private voting environment. This is a warrant for the secrecy of your vote. Via these aspects, paper voting has acquired a large deal of trust in the experience of citizens. Still, the ease with which this system has been replaced in the Netherlands suggest that there are other factors involved as well. One may argue that the electronic voting machines currently in use have been accepted based on passivity rather than trust. When these machines were introduced in the Netherlands, there has not been much debate about the conformation to the aforementioned principles. Instead, their introduction has been more or less tacitly accepted in spite of decreased transparency which is typical of passivity. http://www.win.tue.nl/ipa/archive/falldays2005/Paper_Pieters.pdf Paper voting has earned a large amount of trust in the experience of citizens, partly due to the well organised social context. Progress in technology should not lead to problems with democratic progress in society, which may easily become the result of distrust in the election system. If voting technology mediates the relation between people and democracy in such a way that the experience of trust and stability is reduced, for whatever reason, the actions that are invited are political passivity on the one hand, and protest and obstruction on the other. http://www.win.tue.nl/ipa/archive/falldays2005/Paper_Pieters.pdf Voting by Paper Ballot In colonial America, early voters substituted beans, kernels of corn, seashells, or rocks for the multi-colored balls used in Greece, as well as using a show of hands and voice to conduct elections (Rusk 313). In 1629, the first vote credited with using paper ballots took place in a Salem, Massachusetts church and by the Civil War only Kentucky and Virginia were still voting by voice.6 In 1800, the Northwest Territory enacted a law stating that elections should be held by ballot. http://josephhall.org/arnold_ca_vs_hist.pdf Paper-based E-voting system In a paper based e-voting system, a touch screen is used in voting. After the voter has finished casting his votes, the unit prints out a hardcopy of the ballot which the voter has to pass to the election officer in charge so that it can be counted in a centralized location. The ballots will then be counted through optical-scan voting systems. This system has the advantage of a paper trail as every persons votes are recorded on a piece of paper. However, holes that are not properly aligned in a punch card or stray marks on an optical-scan card may lead to a vote not being counted by the machine. Moreover, physical ballots can still be lost during or after transit to the counting stations. http://www.topbits.com/e-voting.html Direct recording electronic systems A DRE (Direct Recording Electronic) voting system consists of a computer with a touch-screen monitor, a permanent storage medium such as a write-once memory card, software, and, in some systems, a ballot printer. The computer is much like a home computer. A touch-screen monitor allows the user to touch a marked spot on the monitor surface with his finger, thus entering data as if the screen were a keyboard; you have seen one if you have ever used an Automatic Teller Machine. The software consists of two parts: 1) An Operating System that supports the voting software and directly controls the monitor, the permanent storage, and any other device that forms part of the computer system. 2) The voting system itself, which runs as an application on the Operating System. It manages the user interface, guards against certain user errors e.g., it refuses to accept a vote if the user votes for more candidates than there are offices to be filled and records the vote of each user on the users command. The voting system also counts the votes and records the counts, or else cooperates with a central computer to produce these results. The ballot printer, if there is one, produces a document that may look like a ballot; it shows the choices made by the user. After the user has examined it, he may direct the system to record his vote or he may ask for another chance to vote. When the voter has made his choice, the system disposes of this document in one of a number of ways, which will be described later. Most of the DRE systems installed in the United States today do not have these printers. Direct Recording Electronic Voting Systems This is essentially voting through a comput

The Case For Progress :: Technology Technological Papers

The Case For Progress This assignment doesn’t scare me. I’m tackling it with WordPerfect 9 on my nice, new VAIO Pentium 4. It’s way more powerful than that last hunk of scrap, whatever it was caled, but I’m sure it’s not nearly as amazing a s whatever they’l think of next. Progress is such an exciting thing. It boggles the mind to think that, once upon a time, man made his way through the world with nothing but sticks and stones and his wits and no WordPerfect 9. Are scientists positive t hat those guys were the same species as us? If so, we’ve certainly grown up a lot. We overcame nature, for one thing. The primitives did rain dances. We have irrigation and central heating and cooling. We’ve managed to figure out how things work. Ev en 500 years ago, people thought the universe revolved around the Earth. Now we know about atoms and quarks and general relativity and evolution, and prety soon we’l have anti -mater thrusters. Everyone just builds on what everyone before them figured out, with each discovery making it faster and easier to discover things, and progress just happens and goes faster and faster until it’s a blur, like it’s powered by anti -mater thrusters and you can hardly keep track of it! There are a lot more reasons t han irrigation to have faith in progress. Look at the comfort it’s given us. I mean, if I want pain, I have to go find it. I have to pick a fight or do stupid bike tricks until I wipe out. But if I were a caveman, I would probably be covered in tooth s cars, have a spear wound in my bely, and live every day in fear of being brain -raped by a saber -toothed tiger fang. And everything is so easy these days. If I’m hungry, do I have to go try to kill something or start planting seeds? No, I just toss some Chef Boyardee in the microwave. If I want new girlie pictures I just log onto the internet. How did people get more nudie pics hundreds of years ago, I wonder? Probably had to draw it themselves or something. Speaking of the internet, how great an exa mple is that? People used to think that there were other countries that were ful of people who were stupid or mean or backward.

Monday, August 19, 2019

samsung in china :: essays research papers

Environmental Analysis External Environment Chinese Market -  Ã‚  Ã‚  Ã‚  Ã‚  still socialist economy „ »Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  huge gap between the stated plans and the actual ability of government to manage and control the economy „ »Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  tremendous amount of economic interaction took place outside the government ¡Ã‚ ¦s formal economic plan -  Ã‚  Ã‚  Ã‚  Ã‚  many smugglings and piracies -  Ã‚  Ã‚  Ã‚  Ã‚  regional blockades -  Ã‚  Ã‚  Ã‚  Ã‚  over-employment problem Chinese color TV Market -  Ã‚  Ã‚  Ã‚  Ã‚  full production capacity in demand „ »Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  principal battleground -  Ã‚  Ã‚  Ã‚  Ã‚  high competition „ »Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Japanese firms: high-end market. Increasing production bases „ »Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Domestic Firms: low-end market. But they were less competitive in large screen TV. -  Ã‚  Ã‚  Ã‚  Ã‚  small color TV market was shrinking „ »Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  large market size of these product lines facilitated the fast achievement of cost reduction(economy of the scale, learning effect) Consumer analysis -  Ã‚  Ã‚  Ã‚  Ã‚  only 41% of households had color TV „ »Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  80% of urban, 28% of rural „ »Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Low-end market is not a viable long-term. But overall market was still expanding. -  Ã‚  Ã‚  Ã‚  Ã‚  Buying power: expanding both high-ends and low-ends -  Ã‚  Ã‚  Ã‚  Ã‚  Tendency that first image of a product lasted long in the eyes of the consumer. „ »Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  the reason for differentiation needed focusing on high-ends -  Ã‚  Ã‚  Ã‚  Ã‚  consumer preference „ »Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Urban- brand name, functionality were important factors. „ »Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Rural- reasonable quality and low price were preferred. -  Ã‚  Ã‚  Ã‚  Ã‚  High protected market: too much tariff cost „ »Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  localization needed Domestic (Korean) Market -  Ã‚  Ã‚  Ã‚  Ã‚  Deteriorating of competitive advantage: rising the labor cost -  Ã‚  Ã‚  Ã‚  Ã‚  Korean government policy: supportive of big business „ »Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  getting worse of Korean market „ »Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Losing the M/S in the U.S. and no longer competitive in the low-end product „ »Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  need to change the strategy focusing on high-end, high-tech -  Ã‚  Ã‚  Ã‚  Ã‚  Liberalization of Korean market „ »Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Foreign firms were permitted to sell their product directly „ »Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  More competitive in Domestic market, losing the domestic M/S „ »Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Samsung had to expand the foreign market. Internal Environment Experience in the U.S. -  Ã‚  Ã‚  Ã‚  Ã‚  Set up the subsidiary there in 1979 -  Ã‚  Ã‚  Ã‚  Ã‚  Focusing on the low-end market segment based on competitive labor cost in Korea because of large demand and low competition base, and low barrier in the U.S. -  Ã‚  Ã‚  Ã‚  Ã‚  Samsung produced a few of the most popular sizes TV for cost reduction through economies of scale and the experience curve. -  Ã‚  Ã‚  Ã‚  Ã‚  Dual brand policy: adopting  ¡Ã‚ §buyer brand name(large retailers or OEM) ¡Ã‚ ¨ mostly but trying to build its own brand image -  Ã‚  Ã‚  Ã‚  Ã‚  Establishing a production subsidiary in the U.S. because of trade barrier -  Ã‚  Ã‚  Ã‚  Ã‚  Policy of Japanese firms: targeting high-ends for differentiation through brand name recognition „ »Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Matsushita: 4% of M/S in 1995 but could be high-price, higher profit -  Ã‚  Ã‚  Ã‚  Ã‚  Policy of Samsung: still pricing strategy even though it had good quality of product „ »Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  3% of M/S, but much less profit than Matsushita and facing intense competition -  Ã‚  Ã‚  Ã‚  Ã‚  Importance of TV industry to Samsung: second proportion of Samsung electronics „ »Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  It was getting worse in situation of Samsung electronics, so needed some way to solve these problems Market participation in China -  Ã‚  Ã‚  Ã‚  Ã‚  later market entering than Japanese firms -  Ã‚  Ã‚  Ã‚  Ã‚  The establishment of SCH would enhance its image in China and speed up the accumulation of local knowledge of the market.

Sunday, August 18, 2019

England: The City of Today :: European Europe History

England: The City of Today Glorious, glorious England. As the Empire spreads some say "so does its glory"; others mumble of the price which we pay for our greatness. Many of us Londoners have read, if not discussed, the intriguing debate transpiring between Sir Andrew Ure and Sir James Phillips Kay. Are the cities of great England truly representative of the jewels in Her Majesty's Crown? Or are they the stain of exploitation and abuse that some have proclaimed? Sir James Phillips Kay, an M.D. at Edinburgh and the Secretary to the Manchester Board of Health, has recently published a work titled, "The Moral And Physical Conditions of the Working-Class Employed in Cotton Manufacturing in Manchester." (Kay/Ure Debate, Handout) He argues quite persuasively about those poor wretches living in the most hideous of conditions. Half the blame he attributes to the Irish and the other half to the environment of an industrialised city. The Irish immigrants have brought to Manchester a system called "cottier farming". Sir James argues that this system is responsible for the "demoralisation and barbarism" of the working-class. If that is not bad enough, the potato has been introduced as a main article of food. Influenced by the Irish subsistence living, the working-class are abandoning those values which promote increasing comfort. They seemingly have given up the hope of betterment and adopted hopelessness. Sir James does well in his description of the living conditions of the working class is living in. The mere thought of such suffering and misery is shocking to the soul. The problem Kay argues, is caused by combinations of poor living and working conditions, lack of education, influence by a lesser culture and the presence of great immorality. This recently published work is a plea to the Capitalist, to convince him to concern himself with his workers. Andrew Mearns, another prominent fellow on these matters goes into even greater detail in his work, "The Bitter Cry of Outcast London". Making a study of our city, he has reported, with astonishing detail, that the filth present in Manchester can be found in this city! Mr. Mearns makes his argument to the church in his call to unite and fight this growing misery together. He cites examples of immorality, poverty and heart-breaking misery. His call also addresses the need for the state to intervene on the behalf of the organisations trying to elevate the working-classes' misery. What can be done for the motherless children, diseased and ailing siblings and the poor forced into thievery for filthy lucre?

Saturday, August 17, 2019

Poem Analysis- Robert Fross; Robert Browning; Anne Bradstreet Essay

Robert Frost, â€Å"Out,Out—â€Å" 1. In line 15, Frost describes the saw as being sinister. He infers that the saw has a mind of its own, by stating that the saw jumped out of the boy’s hand and cut the boy’s hand terribly. Frost also makes it seem as if the saw is in a way, like a friend. He does this by demonstrating that using the saw is an advantage for the boy because it is making his job ten times easier. Without the saw, the boy would spend hours cutting through the wood. 2. In Frost’s poem, the people that surround the boy must be his family. It could also very much be friends, or members of his community, along with the doctor and nurses working on his injury. The tone of the poem leads me to conclude that the â€Å"they† in the poem weren’t very surprised or moved by the boy’s injury, or death, because this might have happened before, or they just didn’t care for the boy. 3. Frost’s reference to Macbeth’ contributes to my understanding of  "Out, Out-â€Å"that this poem’s theme is about death. From the reference to Shakespeare play, Macbeth, I can expect read about someone dying, an unexpected death. In my opinion, the theme of this poem is the cruel, emotionless, merciless relationships adults had with their children back then in America. Children weren’t given the opportunity to enjoy their childhood. They had many responsibilities and tasks to fulfill. 4. Robert Frost’s â€Å"Out, Out-‘† resembles the medieval folk ballad, â€Å"Sir Patrick Spence,† in its theme. Both poems are relaying a message about death. In Frost’s poem, the boy acknowledges the fact that he is going to die when he realizes he is losing a lot of blood. In â€Å"Sir Patrick Spence,† the sailor realizes he is coming face to face with death when he reads the letter the king has sent to him. Both of the protagonists in the poems are on the verge of dying a sudden, unexpected death. Robert Browning, â€Å"My Last Duchess,† 1. Throughout the entire poem, it is almost impossible allocate who the Duke is addressing. Towards the end of the poem, lines 49-52, it is disclosed that the Duke is speaking to a servant, or worker of a Count. This specific Count seems to have the Duke interest, because he wants to marry the Count’s daughter. The Duke appears to be hosting some sort of gathering in his home. I inferred this from lines 47 and 48. 2. Throughout the poem, the Duke emphasizes on his last Duchess, kindness and flirtatious attitude. In the Duke’s opinion, and observance, the Duchess was easily impressed, and fulfilled. Everything and anything made her happy. She would always say thank you to anyone, and everyone that would bring her things, or do things for her. The Duke interprets the Duchess’ kindness, and mannered behavior as flirtatious, which leads to his distrust in her. Based on the Dukes description, the Duchess, in my eyes was a well mannered woman. She wasn’t mean, or sought herself above anyone. Which is how he, the Duke wanted her to act. He wished she’d be a greedier or unfulfilled character. 3. In lines 34-41, the Duke explains why he never sought to confront his Duchess on her behavior. He states he didn’t have the eloquent skills to do so. He claims that he didn’t posses the speech to confront her. â€Å"Who’d stoop to blame/This sort of trifling? Even had you skill/ In speech-(which I have not)-to make your will/† This in my opinion is a lame excuse. I believe that he was simply afraid of confrontation. The Duke also states that if he had confronted the Duchess on her behavior, she would have made an excuse for her actions. 4. From this poem, I conclude that the Duke himself murdered, or gave orders to murder his Duchess. There is no clear evidence to support this, but I believe it is a clear interpretation. The poet should have included the Duchess’ fate in the poem. It would leave little room to assume her fate. 5. Robert Browning makes a direct connection between the Duke’s art collection, and the attitude towards his wife. The Duke has the portrait of his wife; his last Duchess displayed in his home, behind a curtain. A curtain, which only he can draw back, or remove. In other words, he, the Duke, controls the Duchess; or he wishes to control his Duchess. The Duke wouldn’t want anyone to see the portrait of his Duchess, with her blushed cheeks, unless he was there. The same can be inferred from the last few lines of the poem, line 54-55, â€Å"Notice Neptune, though,/Taming a sea-horse, thought a rarity,/ Which Claus of Innsbruck cast in bronze for me!† The Duke is implying, that he himself is Neptune, and his last Duchess is the sea-horse. No one could have imagined that a sea-horse could be tamed, but Neptune achieved it. Identical to the way that the last Duchess herself was tamed. Adrienne Rich, â€Å"Aunt Jennifer’s Tigers,† In her poem, â€Å"Aunt Jennifer’s Tigers,† Adrienne is describing the protagonist’s feelings towards her marriage. In lines 9-10, the protagonist feels that she is a prisoner of her marriage, and will only be set free when she dies. The protagonist uses the tigers as a symbol of who she wished she could be. In the first stanza of the poem, Adrienne describes the tigers as being un-fearful of the men. A trait she wishes she possessed. Sharon Olds, â€Å"Rite of Passage,† 1. The speaker describes the first-grade boys at her son’s birthday party as men. Their behavior is pure imitation of the men they have been around. Her description of them is ironic, because how can first-graders realistically be grown men? She also uses the concept of violence a lot in the poem. 2. In the last two lines of the poem, the author compares the first-graders to generals, and states that they are playing war. This is ironic, because she is inferring how (grown) men glorify war. The first-graders are innocent and naà ¯ve to the truth behind war. They don’t understand the sadness, and deaths behind it. To them, it is a reason to celebrate and rejoice. What is even more ironic, are the lines prior to the last two lines of the poem. The speaker quotes what the little boy has said. In line 22, â€Å"We could easily kill a two-year-old†. Little boys should not be speaking of death. But just like (grown) man boost up their ego by feeling superior to others and educing violence, these first-graders are doing the same. 3. From line 15-20, the mother describes her son as being innocent. She paints her son to be better than the other first-graders, because she seeks him out to be more mature than they are. Throughout the rest of the poem, due to the speaker’s description of her son, it can be inferred that the speaker’s on is the leader of the group. He is the mediator; the peace maker. Suji Kwock Kim, â€Å"Monologue for an Onion,† 1. The tone of this poem is mocking, and judgmental. It implies that humans live their lives chasing false hopes; searching for a truth that does not exist. The poet symbolizes this by using the analogy of shaving an onion to get to its heart; searching for a heart that does not exist. It depicts that humans are hopeless, and helpless. Humans are viewed as lost creatures. The speaker expresses hostility towards the human. It begins to mock humans by describing them as an idiot, thirsty (to find the truth), soulless, foolish, and destined to die. The speaker does this by comparing how a human cuts an onion over and over again, even though the onion makes the cutter cry relentlessly. 2. In line two, â€Å"I mean nothing† is projected to be interpreted on two ways, â€Å"intend†, and â€Å"signify. The poet is saying that the onion’s intentions aren’t to make the â€Å"cutter/human† cry. As the onion is cut, it forces the cutter’s eyes to fill up with tears. A reaction that is not intended, but occurs automatically. The poet also uses the phrase â€Å"I mean nothing† to symbolize that the onion feels like it is no one. It feels as if it has no value, or meaning of existence. 3. If someone said this to me, it would prove how close-minded and naà ¯ve they are. Poems generally convey a meaning far beyond what the poem explicitly reads. In poetry, you must read between the lines to understand the underlying significance of the poem. The poet is using the analogy of an onion’s (chemical) reaction to a human’s tear ducts to deploy how foolish human beings can be, and are. Continuing to cut through an onion, knowing that the onion will force us to cry is foolish. This simple action is identical to human life. Human’s cut through life searching for a truth they never attain. 4. I personally feel that the author is trying to give everyone a wake-up call in this poem. Suji Kwock Kim is trying to give her readers a few words of wisdom. She is exploring, and revealing a new approach on how one should view the world. Trying to encourage her readers to refrain from what an onion cutter is doing: cutting away at life causing them harm. Anne Bradstreet, â€Å"The Author to Her Book† Anne Bradstreet’s poem, â€Å"The Author to Her Book† is a complex narrative concerning the conflicting emotions and thoughts an author can have for a piece of literature he or she has written. Through metaphor and personification, Bradstreet examines the similarities between being a parent and being an author. The love, discouragement, and fear that all come into play when something is going to be revealed to the world at large are present in both a parent and a writer. Metaphor is used to relate authorship to parenthood in order to convey to the reader the complex emotions the narrator is feeling about sending a book he or she wrote out into the world. As the narrator points out, â€Å"Thou ill-formed offspring of my feeble brain†, drawing the parallel between the author and a parent and all of the complicated emotions that go with it (line 1). The narrator refers to the book-child as â€Å"My rambling brat†, revealing the negative side of the emotion (l ine 7). As a frustrated parent with a child who will not behave, so the narrator feels towards the book because it is not as perfect as he or she would want and the narrator sees this as a reflection upon the author, just as a parent would see a naughty child as a reflection on themselves. But later the narrator writes, â€Å"Yet being mine own †¦ affection would thy/Thy blemishes amend† demonstrating the conflicting emotions associated with love (lines 10-11). The metaphor of the book as a child reflects the conflicting emotions of the narrator as the book is seen as an extension of the narrator, just as a child is seen as a reflection of a parent. Personification of the book as a child creates empathy within the reader and makes it easier for the reader to relate to the anguish and love felt by the narrator. â€Å"I washed thy face† the narrator writes, speaking to the book, giving it life even as the book’s qualities as an inanimate object are examined (line 13). The narrator cares for the book’s presentation to the world just as a parent would care for the presentation of a child to the world. â€Å"I stretched thy joint to make thee even feet† the narrator writes, emphasizing the care needed for the book (line 15). The personification of the book and the metaphor of the book as a child work together to give the reader a full and complete understanding of the complex emotions felt by the narrator towards the book. The understanding needed and the guidance required to make the book the best possible so that it reflects well on the narrator is cast in light of parenthood and the ways in which a parents must care for and bring up a child. There is shame and the love that go along with an imperfect child, but it all is ultimately overshadowed by the pride felt in the final product.