Monday, September 30, 2019

Psychological Effects of Technology Addiction Essay

Technology is taking over all aspects of life. Education, work and leisure are all becoming increasingly dependent on being able to interact with technology. But what of the academic or career prospects of those who do not want to interact with this technology? Before taking this English 305 class, I tried to avoid computers as much as possible. I didnt have any interest in cyberspace such as chatting, email, and gender swapping. Through this class, I had a chance to contact others through cyberspace. However, I still have a fear of computers. I decided that I want to know more about computers and cyberspace. I will first discuss cyberspace, then I will discuss about technophobia. Its well known that people say and do things in cyberspace that they wouldnt ordinarily say or do in the face-to-face world. The virtual world is quite different from the real world. People cant see a person in cyberspace. People cant see a persons facial expressions and body language. The sensory experience of encountering others in cyberspace-seeing, hearing, and combining seeing and hearing is limited. For the most part, people communicate through typed language. In cyberspace, people will probably never be able to physically interact with each other. There are no handshakes, pats on the back, hugs, or kisses. The limited sensory experiences of cyberspace have some significant disadvantages- as well as some unique advantages – as compared to in-person encounters. Since communicating only with typed text, people have the option of being themselves, expressing only parts of their identity, assuming imaginative identities, or remaining completely anonymous. Anonymity has a disinhibiting effect that cuts two ways. Sometimes people use it to act out some unpleasant need or emotion, often by abusing other people. Anonymity also allows them to be honest and open about some personal issue that they could not discuss in a face-to-face encounter. Sitting quiet and staring at the computer monitor can bring a person to an altered state of consciousness. Some people experience a blending of their mind with that of the other person. Some people experience a state of consciousness that resembles dreams. These altered and dream-like states of consciousness in cyberspace may account for why the Internet is so attractive for some people. It might also help explain some forms of computer and cyberspace addiction. In cyberspace, birds of a feather easily can flock together. Support groups  devoted to helping people with their problems can be a very beneficial feature of cyberspace. For people with antisocial motivations, thats a very negative feature of cyberspace. In most cases, everyone in cyberspace has an equal opportunity to voice his or her opinion. Everyone, regardless of status, wealth, race, gender, etc. starts off on a level playing field. Some people call this the net democracy. Although ones status in the outside world ultimately will have some impact on ones life in cyberspace, there is some truth to this net democracy ideal. Now, I want to write about technophobia, which is a resistance to talking about computers or even thinking about computers. Although technology is taking over all aspects of life, there are up to half of the population is technophobic, possessing negative opinions about, or having anxiety towards, information technology such as personal computers. I found a study the book, Technophobia (Mark J. Brosnan). Thirty-seven per cent of the general public report regularly using a personal computer, a far higher percentage than mobile phones, electronic organizers, pagers, modems, etc. (MORI, 1996). When the factors of anxiety and attitude, or, more specially, of computer anxiety and computer attitude, are combined, the concept of computer phobia indeed begins to emerge. Since I was a technophobic person, I want to know how this psychologically impact peoples life. There was an original assumption that technophobia would be a transitory phenomenon, common amongst older adults who had missed out upon technology in their education. Raubs (1981) early study reported that older people were more anxious than younger people. Other research indicates that the over fifties are less anxious than the under thirties, suggesting that far from reducing anxiety, computer experience can increase anxiety levels (Brosnan pg. 11). However, Anderson (1981), Elder et al. (1987) and Igbaria and Parasuraman (1989) have all found that age has a positive effect upon computer anxiety. As the diffusion of technology throughout many aspects of life has exposed virtually everyone to computerization, the relationship between anxiety, age and experience has become less clear. The only clear relationship between age and computer anxiety would therefore appear to be with respect to ones age when first interacting with a computer. I found a very interesting study, which shows the difference of psychological impact between male and female. Just as technophobia has been reported as affecting more females than males, computer addiction has been   found to be almost exclusively a male phenomenon (Shotton, 1989). Brosnan (1995) identified that in a student population, male students first interaction with computers occurred significantly earlier than female students first interaction with computers. This is significant as Todman and Monaghan (1994) report that early use of computers is associated with more favourable quality of initial experience, which leads to lower anxiety and greater readiness to use computers. A large number of studies found that females report higher levels of computer anxiety than males (it is maybe not true because of my English teacher!). A smaller number of studies report no sex differences in computer anxiety. For example, Anderson (1981) found that males and females did not differ in their levels of anxiety, either before or after a computer literacy course. Temple and Lips (1989) found male students to have taken more computer science course and to be more likely to want to choose it as their major than female students. In conclusion, the findings regarding gender differences in technophobia have not been consistent. Conclusion Whether we refer to the second industrial revolution or the digital revolution there can be little doubt that computer tech nology will play an ever-increasing role within our domestic, leisure and work environments. For the technophobe, this can only mean an increase in the potential sources of anxiety. Through this research, I could find a few things. First, by studying technophobia the full extent of the phenomenon has become apparent. With surveys revealing technophobia in up to 50 per cent of many populations, feelings of computer-related anxiety cannot be dismissed or marginalized. Indeed the sheer numbers of technophobes provide the commercial motivation for continued user-friendliness in hardware and software design. The huge preponderance of technophobia can in itself be empowering, such that an individual does not have to internalize feelings to personal inadequacies. Second, I found that much research has highlighted that feelings are transitory and that sex differences in computer-related attainment can be eradicated when recasting the computer-based task as appropriate for females. The literature on sex differences has been used to emphasize the role of these influences. Technophobia is a legitimate response to technology. Technology is taking over all aspects of life. Education, work and leisure are all becoming increasingly dependent on being able to interact with technology. But what  of the academic or career prospects of those who do not want to interact with this technology? Before taking this English 305 class, I tried to avoid computers as much as possible. I didnt have any interest in cyberspace such as chatting, email, and gender swapping. Through this class, I had a chance to contact others through cyberspace. However, I still have a fear of computers. I decided that I want to know more about computers and cyberspace. I will first discuss cyberspace, then I will discuss about technophobia. Its well known that people say and do things in cyberspace that they wouldnt ordinarily say or do in the face-to-face world. The virtual world is quite different from the real world. People cant see a person in cyberspace. People cant see a persons facial expressions and body language. The sensory experi ence of encountering others in cyberspace-seeing, hearing, and combining seeing and hearing is limited. For the most part, people communicate through typed language. In cyberspace, people will probably never be able to physically interact with each other. There are no handshakes, pats on the back, hugs, or kisses. The limited sensory experiences of cyberspace have some significant disadvantages- as well as some unique advantages – as compared to in-person encounters. Since communicating only with typed text, people have the option of being themselves, expressing only parts of their identity, assuming imaginative identities, or remaining completely anonymous. Anonymity has a disinhibiting effect that cuts two ways. Sometimes people use it to act out some unpleasant need or emotion, often by abusing other people. Anonymity also allows them to be honest and open about some personal issue that they could not discuss in a face-to-face encounter. Sitting quiet and staring at the computer monitor can bring a person to an altered state of consciousness. Some people experience a blending of their mind with that of the other person. Some people experience a state of consciousness that resembles dreams. These altered and dream-like states of consciousness in cyberspace may account for why the Internet is so attractive for some people. It might also help explain some forms of computer and cyberspace addiction. In cyberspace, birds of a feather easily can flock together. Support groups devoted to helping people with their problems can be a very beneficial feature of cyberspace. For people with antisocial motivations, thats a very negative feature of cyberspace. In most cases, everyone in cyberspace has  an equal opportunity to voice his or her opinion. Everyone, regardless of status, wealth, race, gender, etc. starts off on a level playing field. Some people call this the net democracy. Although ones status in the outside world ultimately will have some impact on ones life in cyberspace, there is some truth to this net democracy ideal. Now, I want to write about technophobia, which is a resistance to talking about computers or even thinking about computers. Although technology is taking over all aspects of life, there are up to half of the population is technophobic, possessing negative opinions about, or having anxiety towards, information technology such as personal computers. I found a study the book, Technophobia (Mark J. Brosnan). Thirty-seven per cent of the general public report regularly using a personal computer, a far higher percentage than mobile phones, electronic organizers, pagers, modems, etc. (MORI, 1996). When the factors of anxiety and attitude, or, more specially, of computer anxiety and computer attitude, are combined, the concept of computer phobia indeed begins to emerge. Since I was a technophobic person, I want to know how this psychologically impact peoples life. There was an original assumption that technophobia would be a transitory phenomenon, common amongst older adults who had missed out upon technology in their education. Raubs (1981) early study reported that older people were more anxious than younger people. Other research indicates that the over fifties are less anxious than the under thirties, suggesting that far from reducing anxiety, computer experience can increase anxiety levels (Brosnan pg. 11). However, Anderson (1981), Elder et al. (1987) and Igbaria and Parasuraman (1989) have all found that age has a positive effect upon computer anxiety. As the diffusion of technology throughout many aspects of life has exposed virtually everyone to computerization, the relationship between anxiety, age and experience has become less clear. The only clear relationship between age and computer anxiety would therefore appear to be with respect to ones age when first interacting with a computer. I found a very interesting study, which shows the difference of psychological impact between male and female. Just as technophobia has been reported as affecting more females than males, computer addiction has been found to be almost exclusively a male phenomenon (Shotton, 1989). Brosnan (1995) identified that in a student population, male students first interaction with computers occurred significantly earlier than female  students first interaction with computers. This is significant as Todman and Monaghan (1994) report that early use of computers is associated with more favourable quality of initial experience, which leads to lower anxiety and greater readiness to use computers. A large number of studies found that females report higher levels of computer anxiety than males (it is maybe not true because of my English teacher!). A smaller number of studies report no sex differences in computer anxiety. For example, Anderson (1981) found that males and females did not differ in their levels of anxiety, either before or after a computer literacy course. Temple and Lips (1989) found male students to have taken more computer science course and to be more likely to want to choose it as their major than female students. In conclusion, the findings regarding gender differences in technophobia have not been consistent. Conclusion Whether we refer to the second industrial revolution or the digital revolution there can be little doubt that computer technology will play an ever-increasing role within our domestic, leisure and work environments. For the technophobe, this can only mean an increase in the potential sources of anxiety. Through this research, I could find a few things. First, by studying technophobia the full extent of the phenomenon has become apparent. With surveys revealing technophobia in up to 50 per cent of many populations, feelings of computer-related anxiety cannot be dismissed or marginalized. Indeed the sheer numbers of technophobes provide the commercial motivation for continued user-friendliness in hardware and software design. The huge preponderance of technophobia can in itself be empowering, such that an individual does not have to internalize feelings to personal inadequacies. Second, I found that much research has highlighted that feelings are transitory and that sex differences in computer-related attainment can be eradicated when recasting the computer-based task as appropriate for females. The literature on sex differences has been used to emphasize the role of these influences. Technophobia is a legitimate response to technology.

Sunday, September 29, 2019

Cross Cultural Perspectives Essay

In this paper I am going to cover the cultural and ethical factors involved with a company by the name of Levi Strauss and Company and the issues the company faces when attempting to expand to another country. Expansion is a goal that all companies want to achieve; because there are a lot of benefits a company can receive when expanding, makes more money, getting into the stock market, lower cost for part and labor, and most of all becoming a well-known name brand. With expanding it is not just glitz and glamor there are moral cultural and ethical issues to face. When bring a product and organization to another country. Cultural Issues when Facing a Global Organization Levi Strauss and Company is a well-known clothing brand. This organization was originated in North America, state California City San Francisco. Levi Strauss and Company manufactures clothes in 110 countries outside of the US; and as a result of that t50% or more of the organizations profits came from overseas. Levi Strauss and Company has had to face some of those ethical and cultural issues for the public and exterior partner companies. This issue stems from factories in Bangladesh because there are reports of the organization having under age workers. In Bangladesh children working at a young age in common. In their soil this is not an issue because without the children and parents working there is not enough money to support the family. The issue in this situation is in Levi Strauss and Company terms and engagement is say that the organization is not allowed to higher or work kids under the age of 16 because in the US it is illegal. Child labor laws is an issue that always get the media, workers right unions, stock holders and investment firms upset. (Levi Strauss and Co., 2010). The Ethical Perspectives Ethical perspectives set by last Levi Strauss and Company comply with the majority of other global organization. To be considered ethical all global businesses must follow the following. †¢Emphasizes accountability for anticipating and responding to ethical crises †¢Encourages participation in decision making †¢Aligns personal, professional, and organizational aspirations and behaviors †¢Promotes courageous efforts to identify and resolve ethical dilemmas †¢Fosters dialogic communication †¢Establishes transparent structures, policies, and procedures As of now the only standards being upheld and practices by Levi’s are A Global Anti-Bribery Policy An Anti-Corruption policy (Shaw, W. H., & Barry, H.,2001) A Worldwide Code of Business Conduct 2010 was not the only year Levi Strauss and company had issues complying with child labor laws; back in 2008 the company has issues with their cotton fields in Uzbekistan. The organization has not tried to cover up any of the information that has been found; in fact the company said they have been looking into changing that correcting that situation. That situation ended in Levi Strauss and Company not accepting any fabric from Uzbekistan and all of their factories. Doing this solves the issue in regards to the company but this does not stop Uzbekistan form doing the same thing with other countries. Levi Strauss and Company has been good about handling their issues when it comes to violating child labor laws. In most cases when the organization finds out this is happening the first thing they do is fire all of the underage workers and make sure they cannot be rehired until they reach the proper age limit. Another step Levi Strauss and Company has taken is education students and teachers of the child labor laws to avoid future issues with child labor laws. Ethical Perspectives in Different Cultures When a business has expanded to over 100 countries facing ethical and cultural issues is something that can’t be avoided; and sorry to say child labor laws are not the only ethical or cultural issue the organization has to deal with in the global market. Some may try to compare this to a discrimination issue, because this topic has become popular today. In most cases decimation consist of religion, race, age, or gender. However that is just in the US because in other countries businesses are straight forward when it comes to discriminating and it is not viewed as illegal. This raises the question should businesses adapt to the ways of the country that they are doing businesses in? But if this is done will it lower the standers of the organization and the relationship between the public and the business. Aside from child lobar laws corruption is another issue Levi Strauss and Company has to face. The organization have factories in Vietnam and just like all other businesses in Vietnam there is a tax to be paid; not a government tax but a tax form corrupt people in the country, it is said that 67% of businesses in Vietnam have to pay bribes. (Unruh & Arreola, 2010). These are just some of the issues that a business has to face when they expand to other countries. it is clear to see the different ethical stander set be different countries in regards to Levi Strauss and Company. This organization is not different than any other working outside of the US; they must commit to fixing the issue that come about when operation a business in another country and maintain the ethic codes set by the organization. Levi Strauss and Company has ablations to their employees, customers, and the public. They took a vow to operate their business in an ethical manor. Just talking the talk is not enough Levi Strauss and Company need to stay on top of everything to avoid child labor and all other issues when running a business outside of the US Conclusion In all there are a large number of businesses they have traveled outside of the US in efforts to make more money. What the businesses need to work in is businesses sticking to ethical standers; and making sure that all standers being set by the company are completely being followed. The best thing a business can do is stay up to date with all methods of operation in countries outside of the US. Also being properly educating the key players in the organization is how to be successful in a global market. References Adler, I. (2006). Double Standards. Retrieved from http://www.mexconnect.com/articles/1780-double-standards Levi Strauss and Co.. (2010, April). Case Study: Child Labor in Bangladesh. Retrieved from

Saturday, September 28, 2019

Genetically Engineered Potato

NAME:  SHIZA ALI CLASS:  BS III TOPIC:  GENETICALLY MODIFIED POTATOESGENETI CALLY ENGINEERED POTATO A genetically designed potato could be a potato that has had its genes changed, exploitation recombinant DNA technology. Objectives of modification contain presenting pest-fighting, amendment the number of some chemicals fashioned by the plant, and to avoid staining of the potatoes. Multiplicities changed to reap a good variety of starches could also be accepted for industrial usage merely, not for diet. THE PROCESS OF GENETIC ENGINEERING:  Genetic engineering is wide employed in scientific research. Mouse models ar designed for medical specialty studies, bacterium are designed to supply medications like internal secretion, and crops are designed for agriculture. All of those product of gene-splicing were created exploitation identical basic steps: 1. Distinguishing an attribute of interest. 2. Uninflected that genetic attribute. 3. Inserting that attribute into the order of a desired organism. 4. Growing the designed organism. The US Department of Agriculture (USDA) has quite recently given the thumbs up for ranchers to begin industrially growing a few distinctive hereditarily changed potatoes. The potatoes, which come in Russet Burbank, Ranger Russet, and Atlantic Varieties, have been built to create less of a fixing that can transform into a growth causing operator when seared. The potatoes additionally oppose wounding, a typical event in gathering and transport which can lessen their esteem or considerably render them unsellable.The new assortments, which have been named â€Å"natural† potatoes, were created by Idaho based biotech organization JR Simplot. The potatoes are joining another age of GM substances that are intended to profit both the ranchers and the shoppers, instead of simply the cultivators as herbicide or pesticide-safe assortments would. A few GM apple assortments, for example, were as of late made which take more time to dark colored when cut, in spite of the fact that these â€Å"Cold apples† presently can't seem to get the endorsement.To achieve the upgraded attribute, Simplot analyst added charming characteristics to the tubers that are ordinarily found in other created and wild potatoes. The characteristics encode a system that results in deceased age of amino destructive (the building square of proteins) called Asparagine. Regardless of the way that Asparagine is found in various foods, it's conveyed in high obsessions in a couple of groupings of potatoes. Exactly when warmed to high temperatures, for example in the midst of singing or warming, it can shape a manufactured called Acrylamide f the right sugar particles are accessible. French fries and potato chips have been found to contain particularly a lot of acrylamide when differentiated and diverse sustenance. Lab examinations found that the inborn potatoes delivered between 50 to 70% less Acrylamide when fricasseed than non-designed assortments, however by and large the levels of different supplements were unaffected. In spite of the fact that it's realized that acrylamide is a poisonous concoction, the advantages of these potatoes to shoppers are murky at this stage.Since the Innate assortments were made by including qualities from different potatoes, instead of various creatures, Simplot is cheerful that shoppers will be all the more inviting of the yields. In any case, sensibly it's impossible that this will influence hostile to GMO supporters, and some have just whined that the innovation has not been enough controlled and hence endorsement ought not to have been conceded this early. One gathering has additionally squeezed McDonald's to not utilize the potatoes, regardless of the way that Simplot has been a noteworthy provider of solidified French fries to the chain since the 1960s.

Friday, September 27, 2019

Rhetorical Analysis Paper (Ethos, Pathos, and Logos) Assignment

Rhetorical Analysis Paper (Ethos, Pathos, and Logos) - Assignment Example Additionally, Maranhao has won the prestigious Premio Jabuti award in 1999 and had a book – Color of the Word – recognized as the best book of poetry by the Brazilian Academy of Letters. In terms of derived ethos the speaker is able to establish significant ethos within this category through his means of presentation. In this way he holds significant control over his poetic delivery and is able to carry the audiences’ attention throughout. For instance, he often pauses throughout his recitations as a means of creating viewer suspense. In this way it is clear that he is an experienced reader and understands his material deeply. Ultimately, this experienced and deep understanding of the poetry grants him significant terminal ethos. Another prominent aspect of rhetorical criticism is logos. Logos considers forms of reasoning that contribute to the overarching rhetorical message. While poetry is recognized as deriving much of its meaning from eschewing traditionally structured forms of ‘reason,’ there are ways this presentation implements logos effectively. In these regards, Salgado Maranhao will use Latin phrases in his poetry; the speaker will then take a moment to explain these phrases to the audience. This adds credibility to his presentation through the recognition of the deep texture of the poems. In another instance the speaker takes time to explain specific aspects about the poems. For instance, he indicates that one poem is symbolic of man’s position in modern society. Ultimately, his willingness to discuss the underlining meaning of the poems contributes considerably to logos. A final aspect of rhetorical criticism is pathos. Pathos specifically refers to the emotion that is established in the construction of the presentation. The speaker is effective in creating pathos both through his words and his modes of presentation. One of the most prominent means he achieves pathos is through linking his presentation

Thursday, September 26, 2019

Introduction to the city Essay Example | Topics and Well Written Essays - 750 words

Introduction to the city - Essay Example Cash flow can be defined as ‘the pattern of income and expenses, and its consequences for how much money is available at a given time’ The process of managing working capital would involve deciding what quantity of cash, other liquid assets, accounts receivable and inventories the firm would require to have at any given point of time. â€Å" The management of working capital is concerned with the management of assets such as cash, marketable securities, account receivable, investor prepaid expenses and the current assets; also liabilities such as accounts payables, wages payables and accruals.†2 Working capital can generally be generated by receiving short term loan from a bank or by placing aside a sum from the equity. Generally working capital can not be added up while taking a long term loan from a bank. According to Keynes a firm holds working capital for three basic reasons; to benefit from timely opportunities arising in the market, as a fund to deal with unforeseen crisis that require immediate action and to carry out the regular business activities of cash inflow and outflow. The process of working capital management is relatively complex and it is meant to ensure that a firm is capable to carry out its regular activities with optimum efficiency at the same time fulfill the short term debt requirements and forthcoming operational expenditures. This process requires an analytical approach towards the spending and receiving of the funds available on hand. â€Å"The analysis requires decisions to be taken for the following questions such as: how should the firm manage its cash? To whom should the firm grant credit? How much inventory should the firm keep? What should be the composition of the firm’s current debt? â€Å"3 The goal of managing working capital is to have cash inflow as early as possible and to delay the cash outflow as much as possible and at the

Why did London attract such a large and diverse flow of immigrants Essay

Why did London attract such a large and diverse flow of immigrants - Essay Example Lasting four days, the fire destroyed 87 parish churches and 13,200 residential houses, killing several citizens and leaving 70,000 homeless. This essay will give a description of the rebuilding of London just after the Great Fire and what it meant for the city as well as the outlook of immigration at that time. It will further address significant events in the growth of the city relating to immigrant groups that arrived in different time periods upto the period after World War Two (WWII) and the early 1960s. Each group impacted differently on the city, contributing to different aspects of life ranging from clothing, cuisine, architecture and the industrial revolution. Most of the wooden structures and the springing slums were destroyed by the fire, resulting in devastating economic and social problems. To facilitate reconstruction, King Charles II initiated and encouraged resettlement to other areas amidst fears of rebellion from dispossessed refugees. This led to depopulation of th e city just after the fire. Disputes between landlords and tenants were settled by a specially convened fire court to decide who must rebuild, and most of the plan of the old city was used for rebuilding. However, new regulations were also included such that the plan, additionally, had improved fire safety and hygiene standards, stone and brick structures, wider streets, communication infrastructure and no obstructions to the access of river Thames. A monument was also built near Pudding Lane in commemoration of the fire, together with the famous St. Paul’s Cathedral and 50 other smaller churches. The rebuilding process was slow, and within one year, the new houses did not number more than 200. However, things soon picked up and 7,000 new buildings had been completed by 1671[8]. The emergent city was by the standards a modern one, attracting back the population and wealth that had shifted to London’s suburbs and the Town. New insurance companies were also set up to fig ht fires. Presently, the houses in Spitalfields along Folgate Street in eastern London, grand and terraced, reminds any visitor to London of the refugee silk weavers who designed and constructed them[1]. Although it existed before the Great Fire of London, silk weaving was one of the economic successes that attracted immigrants to London in the late 17th century and early 18th century. It was initially introduced by the French Protestants, known as the Huguenots, along with the manufacture of guns and clocks[2]. They arrived in London fleeing a wave of persecution in their home country and were welcomed by King Charles II, joining the Jewish settlers who had earlier been expelled but allowed back into London by Oliver Cromwell. At the end of the 17th century, there were an approximate 50,000 Huguenots and 20,000 Jews in London, most notably in the Spitalfields area, who were later joined by the Bangladeshis. Recently, estimates have shown that 25 percent of London’s contempor ary population has a Huguenot ancestor. However, mass transfer of silk weaving technology into London was via Netherlands from the Far East, Middle East and Italy, during which time, early signs of an interwoven thread of cultures and ethnicities, often contrasting, began to show. By 1713, silk workers migrated from most parts of Europe into London, and the city employed close to 300,000 immigrants skilled in the industry[4]. This influx of immigrants was fuelled by the royal family’s presence in London and the fact that the city was home to England’

Wednesday, September 25, 2019

Is there a necessary connection between a philosopher's politics Essay

Is there a necessary connection between a philosopher's politics and their philosophy - Essay Example It should be noted that Heidegger was forced into the sidelines within only months of joining the party and despite the claims that his philosophy is compatible to Nazism, it actually went in the opposite direction. Heidegger’s philosophy was based on an attempt to understand Being, and to address it as a problem that philosophers throughout history had failed to address. He believed that an understanding of being was necessary to ensure that human beings were not only able to understand themselves, but the world around them as well.2 This is in complete contrast with Hitler’s and Nazi policies, which often concentrated on the promotion of the Aryan race as well as the development of social programs designed to destroy rather than to develop and understand. When compared to Heidegger’s philosophy, which advocated for the universality of the human race, the basis of the social programs promoted by the Nazi regime was to ensure that racial purity for the Aryan race was maintained at all costs. This is because it was believed that the German nation had become weak and would not be able to continue retaining its superior status if undesirable individuals were allowed to survive .3 One of the cruellest of these social policies was that of the forced sterilization of those individuals who were believed to be from lesser races and who carried any form of genetic weakness. In order to make this policy effective, laws were put in place to ensure that doctors provided all the information concerning their patients to the state so that the latter could be able to determine those individuals who had the desirable characteristics to ensure the creation of the German master race. A process where individuals could report others who they suspected of being genetically weak was made possible and this ensured that the Nazi government was able to get to as many people

Tuesday, September 24, 2019

Private security Research Paper Example | Topics and Well Written Essays - 1000 words

Private security - Research Paper Example The study by the Small Business Administration (SBA) in 2002, showed that 23.7% of small businesses fail within two years of start-ups, 51.7% fails after 4 years, 62.7% fails after 6 years and 80 % fails after 10 years (Rogers and Makonnen, 2002, p. 15). The latest statistics from the SBA shows that seven out of 10 new businesses survive at least two years and about 50% survive for only five years. As for 2008, there were 627,200 new business startups and 595,600 small business closures and 43, 546 bankruptcies. These success and failure trends do not vary greatly across different industries and sectors (score.org, 2009). Schaefer (2006) found that many entrepreneurs fail because they start their business for wrong decision and they run it with poor management. Those who failed with new businesses have been fund that they lack sufficient capital and proper planning. Many businesses fail due to its overexpansion and location factor as well. Small businesses failing mainly because it experiences a number of problems related to money, capital, management and planning as these are the key components to the success (Pride, Hughes and Kapoor, 2009, p. 142). As detailed above, improper planning, insufficient capital and poor management are the major reasons for the failure of most small businesses. The major red flags or alerts of the failure of a business are high debt ratio, because giving too much credit to the customers will eventually cause business failure. Inadequate stock, poor management, declining working capital and selling the goods below the cost price due to fierce rigorous competition are some other factors that very often cause failure of small businesses. Strong cash flow is critical to the business success and thus many businesses fail because it lacks sufficient cash flow. When the business is experiencing gross loss and net loss, the outcome is that business will ultimately fail. Better management skill is

Monday, September 23, 2019

To what extent is social class relevant in relation to those who make Essay

To what extent is social class relevant in relation to those who make the law and those who break it - Essay Example There are four main a social classes, such as â€Å"upper class, middle class, working class and the lower class† (Murray, 1995). In order to discuss relation of a social class to lawbreakers, it is relevant to consider a a social class of Britain as the biggest class of lawbreakers. Law breakers in Britain are often accused of avoidance of tax payment, are undercharged in shops etc. A dishonest behavior was admitted by more than 50% of Great Britain inhabitants. A paradoxical behavior of British society is defined in the following terms: â€Å"While nine out of 10 people demand action against those committing these offences, the majority actually admit to committing one of them† (Carrabine&South, 2000). In America there is no strict and intense relation between representatives of different classes. Nevertheless, American constitution was developed in the eighteenth century, but in the modern time there is a lack of special social and economic rights (Carrabine&South, 2 000). A social class is more objective entity in relation to the society than race. A social class has been shaped under the influence of economic relations, symbolic systems and other external factors. Therefore, it is relevant to claim that representatives of a social class are shaped under the influence of education, surrounding people, family traditions, income rates and many other factors. As a result, representatives of lower class have fewer possibilities to realize themselves as successful politicians. It can be supposed that they will become criminals or lawbreakers sooner than lawmakers. Lawmakers/breakers and social class Symbolic context of a social class has been influenced by politics freight. The western considerations about the nature and the culture and thus further considerations about what class is, is usually conducted in terms of â€Å"binary oppositions†. In the theory of criminology, social class considerations in terms of â€Å"binary oppositions† have remained relevant to the modern society. On the one hand, in accordance with criminologists, it is impossible to differ between â€Å"criminals† and â€Å"non-criminals†. Nevertheless, starting from the XXI century it has been claimed that nature of criminals is related to gender, race and class. More often criminals are accounted for representatives of an underclass, i.e. the most disadvantageous people who are unemployed or neglected by the society (Andersen and Collins, 1998). It is relevant to trace these interrelations in terms of four main sociological approaches: â€Å"quantitative studies; time and place studies; ethnographic studies, and social construction studies† (Andersen and Collins, 1998). In quantitative studies individuals’ misbehavior leads to a crime. A representation of certain socio-economic groups is usually questioned in this approach, because very often data collection for such kind of researches limits background data of c riminals. Some analysts claim that â€Å"The lack of both significant class effects and any race effects in our general crime scale may suggest a possible interaction effect between a social class and race† (Ibid, p. 607). Therefore, in making their judgments lawmakers often take into account an interrelation between a social class and a crime or between who may be potential lawbreakers or lawmakers. Gender, age and family income are often influential factors of crime’

Sunday, September 22, 2019

Men Are Superior to Women Essay Example for Free

Men Are Superior to Women Essay Men are Superior to Women for the Appellation of ChineseThe cultures in china, Men are stereotyped as a muscular, tough, and strong figure. Until now, the positions of men are still the same. In the traditional Chinese point of view, they deem that men are better. I don’t deny this opinion because I am a man. As a result, my assumptions for the man culture in china in the following aspects, parental training, education and social expectations. First of all, in my country, parents or grandparents used to treat sons better than daughters. According to my culture, â€Å"men should take care of the outside (means earn money), and women should take care of the business inside (means domestic). † My assumption is in the poor area, when a lady is young; she is not got the best from her parent. They used physical punishments when she was misbehaved; she can not allowed to sleep on the bed or couch, instead, she had to sleep on the ground; while she can not allowed to receive education. Besides parental training, education is another area that I think being a man is better in china. My assumption is there are more choices for men in either high school or college most of the time. It is because in china, the educational system in high schools is divided to two major which is art and science. There are no such requirements that woman couldn’t take the science streams. As well as the education and parental training, there are conscious different in social expectations between males and females in china. It is always true that there are more social expectations of males than females. My assumption is A male without a job is seen as somebody who is simply not fulfilling his or her major social role, whereas a woman without a job is more acceptable. The responsibilities for men are taking care of their soul mate and their family. After leaving school, men just work. All the entire life is about work. However, there are no such things for woman. No one will blame a woman who does not have a job. Even so, once I born as a male, I deserve the challenge. Is it become a men are easier than women? There is no certain answer for this question. I strongly believe that men cultures make their life easier in the following aspects, parental training, education and social expectations. As a result, my assumptions for the men culture in china in the following aspects, parental training, education and social expectations. I am proud of being a man and I know my assumption is negative for the women. Indeed, I do not deny that most of the Asian’ nations limit the female’s opportunities. Thus, encouragement needs to be given to girls to help them get past the societies limits on girls. Today, woman power going up and a lot of people talk about men and woman should be more equal. My positive assumption for the future is Chinese culture will start change due to china opens the door to accept new thing form the west. It should be good for women and I hope women’s life will be better. Now they start trust that men and women are equal in importance, either one side has a heavier proportion.

Saturday, September 21, 2019

A Smart Action Plan

A Smart Action Plan After I had started my first year at University I realised that if I want to become a successful student it is crucial to develop time-management skills. It is based on identifying our goals, prioritising and listing them in order to help us achieve the best result. We also need to identify our strengths, look at our work and think how we could improve it to get a better result in the future. We can do so using a diary or personal organiser. Time-management skills are very important because if we know how to organize our time properly, we can carry out more and meet deadlines. It is important to start with setting our priorities because sometimes there is no time to complete all of them. We need to be aware that some of them might take longer than we expected so we should write somewhere what we want to do and when we want to do it. Resources: We should start with identifying our goals and priorities. When doing so, we need to be realistic and definite about them. We must precise what needs to be done, how and when. Then, it is recommended to start keeping an academic diary or a personal organizer where we can write in everything we do (such us important dates or study activities). It will help us to look at the way we work and identify where further improvements can be made. (Oxford Brookes University) To take the most out of the diary we should always carry it with us and keep it up to date. It is also recommended to check it many times a day and add new tasks straight into it. The last step is to identify how we spend the time in order to see if we use it productively. We need to list the work we have to do and precise the amount of time we want to spend on carrying out particular tasks. The most important things should be highlighted or stared that can be easily seen, where the least important ones should be written in a pencil so we can change or remove them easily. (Cottrell S., 2003) Reflective comment: The first thing I did in order to improve my time-management skills was doing some background reading. I used a chapter of a book recommended by my tutor as well as some online resources. It gave me understanding of which steps should be taken in order to became successful. I started with identifying my goal, which was preparing a good set of notes for my oncoming exam. Then I started writing in a diary activities I was planning to do. The most important ones I wrote in using a pen (such as searching for material for my notes) and less important in pencil (like going to the store or meeting someone). The following, I highlighted the most important one so every time I opened my diary it was the first thing I saw. It was a reminder of what is need to be done. Then I identified how much time I want to spend on these tasks. This technique helped me a lot with organizing my time. Now I know that before my problem had lied in spending too much time on unimportant things, therefore I had not had too much time to complete everything I wanted. After getting into a routine of planning my time and studying at set times I am more systematic and precise. References: Cottrell, S. (2003). The CREAM strategy for learning. In: The Study Skills Handbook. 2nd ed. New York: Palgrave Macmillan Ltd. p74-76. Oxford Brookes University. (2012). Time management. Available: http://www.brookes.ac.uk/student/services/health/time.html. Last accessed 12th Jan 2013. 3. Theme 2: Developing an academic writing style Theme: Developing an academic writing style Activity: As an international student I am even more aware of the importance of well-developed writing skills. It is crucial because the better our skills in writing are, the more flexible we can be while writing. There is no definitive definition what an academic writing style is but there are five technical qualities that help making a piece of writing academic. It needs to be Formal, Others, Cautious, Succinct, Impersonal (FOSCI). However, we need to start with developing a habit of writing which is fundamental when working on academic essays and writing under time and exam conditions. Resources: First what we should do is build up our confidence in writing. We can start with writing one world several times and find out our writing style. When a habit of writing is already developed, we need to get used to writing continuously. To do so, it is recommended to try to write for at least five minutes, whatever the content is. We can use this piece of writing in next step where we need to rewrite already done piece of work and add the new detail to it (such us information, opinion). Further step is focused on rewriting that piece and playing with what we have already written (changing the words, the orders). Then comes organising material where we highlight each idea in a different colour. Then rewriting the passage so colours are grouped. It is also important to know how to overcome writerà ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒ ¢Ã¢â‚¬Å¾Ã‚ ¢s block. We can for example write in pencil (it will remind us that this is a draft so mistakes are allowed and nobody needs to see it). We can also write on th e computer where we can use a spellchecker. (Cottrell S., 2003) Reflective Comment: I decided to improve my academic writing skills because I know how it can affect my grades. I applied this technique in several steps. I started with writing in pencil about my first day in Scotland to get used to writing. I was doing it constantly for 5 minutes. Then, I read it and changed some words and added more details to it. The following, I have rewritten it and checked the grammar and spelling mistakes. Next, I again rewritten the piece but this time in different colours, each relating to a different section: what I saw, how I felt, what I wanted to do. While rewriting the last draft, I was grouping sections together so it looked all tidied up and therefore easier for the reader to understand. The final piece I have rewritten on my computer and checked for unnoticed spelling and grammar mistakes. This technique was time consuming as required rewriting each piece of work several times but it is really worth it. The time I spent on getting used to using this technique took me nearly two weeks but it was really worth it. It paid me off with better-quality and enriched in details work in later days, when I was working on my coursework. References: Cottrell, S. (2003). Writing for university. In: The Study Skills Handbook. 2nd ed. New York: Palgrave Macmillan Ltd. p143-148. 4. Theme 4: Self-knowledge Theme: Self-knowledge Activity: In order to take some more control in my life and improve my performance I am going to improve my self-knowledge skills. Self-knowledge is about knowing ourselves intimately. It means knowing and understanding our inner feelings, motivations, weaknesses, strengths, motivations, desires, skills, etc. and how they affect our behaviour (Ong T., 2004). This is the starting point when developing a skill and in achieving set goals. When is well-developed, increases our confidence and chances of success. It allows us to turn our weaknesses into strengths and present ourselves well to others, develop confidence or set our priorities for creating new skills. Resources: It is essential to know where are we starting from. Therefore we need to estimate to ourselves what we want to improve and how are we going to improve it. There are many ways of developing it, such as self-evaluation questionnaires, psychometric tests, reflective journals or using tutor feedback on our work. All of these are valuable because are giving people an objective view of how they behave and compare in outlook with others. It is also recommended to put ourselves in new situations, go to new places, experimenting new hobbies (exploring unfamiliar roles and situations à ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬ we often discover new things about ourselves when were in unusual situations, or facing new challenges. (Mind Tools, 2012) It is also essential to write every day about our thoughts, feelings and emotions because regular writing improves self-knowledge (Cottrell S., 2003). It builds our emotional fluency and helps to find out things we need to work at in order to improve our performance. Reflective comment: To understand more about myself I am going to do a self-evaluation questionnaire or psychometric test. It will give me basic understanding of who I am and what should I work at, what my traits and preferences are. Then, I am going to apply the second step. I will present myself with new situation. I am planning to go the gym to attend aerobic class by my own. Because I had never been at this place before, I will be surrounded by strangers. I hope this experience will help me to discover new things about myself and how I deal with some of the aspects of my life. The following, I will write in my diary about my feelings of that experience and reflect on that. I believe that the collection of writing will help me understand the range of emotions I have experienced. I believe that out emotional self-analyse is a key-point in order to improve our performance. References: Mind Tools. (2012). Coaching to Develop Self-Awareness. Available: Coaching to Develop Self-Awareness. Last accessed 12th Jan 2013. Tim Ong. (2004). The Importance of Self Knowledge. Available: http://ezinearticles.com/?The-Importance-of-Self-Knowledgeid=3560883. Last accessed 12th Jan 2013. 5. Theme 4: Becoming a reflective practitioner Theme: Becoming a reflective practitioner Activity: To improve my overall performance it is important to reflect on our work. Therefore I decided to improve my reflective practise skills. It is imperative because it helps us to better understanding of the work we are doing when we do it as well as after we have done it. It is critical evaluation of all the available evidence. Its purpose is reflecting on what went wrong and how we could possibly improve it and reflecting on what went good and thinking why it went good. It improves our evaluation skills, action plan for success as well as develops answers to our difficulties. Resources: Our performance is likely to increase when we know how to reflect on our work. Things like studying are going to improve when we look at things such as our motivation, skills needed, things that disturb us and so on. There are several methods of developing the act of reflection while studying: writing a learning journal, using the self-evaluation questionnaires, keeping portfolio, using the tutorsà ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒ ¢Ã¢â‚¬Å¾Ã‚ ¢ feedback on our work or filling the progress sheets. In order to reflect on personal, academic and professional development we can start off with writing down anything we can reflect on. Such as our feelings about our friends or people we work with, the things we struggle with or the things we want to achieve. How everything we have learnt relate to real life or things we want to change. Writing our emotions down will help us to simplify our inner feelings, to work out plans and to focus on our development. The final step is reflecting on what we have learn t from the previous situation to the next one. (Cottrell S., 2003) Reflective comment: To improve my overall performance as a student at the University I am aware that it is crucial to start reflecting on my work and see what I do wrong or well. After doing some background reading, I decided to improve my reflective practise skills. To do so, I am going to use my copies of the assessments with the tutorsà ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒ ¢Ã¢â‚¬Å¾Ã‚ ¢ comments on them. Then I am going to write down all the mistakes I have done and reflect on them, asking myself what I did wrong and why I did it and being focused on what skills I need to avoid this next time and how am I going to achieve this. I believe this will bring me a wider understanding of my mistakes and allow me to see what I could possibly improve and change to get a better grade. In the next step I am going to be focused on filling the progress sheets for each module. I believe this activity will enhance my motivation because it will allow me to see the progress I am making and see the things I did wrong and therefore this will be helpful in avoiding them. In my final step will be reflecting on what I have learnt from the previous situation and applying it to the next one. I think this step is very important because when we are aware of what had gone possibly wrong, we can avoid making the same mistakes next time, improving our work and performance.

Friday, September 20, 2019

The Hindu Temples Architecture And Style Theology Religion Essay

The Hindu Temples Architecture And Style Theology Religion Essay The temples in India have always taken an important place in their cultural and spiritual life of its people, from the early times and till nowadays. In fact the whole cultural and spiritual life of Indian people is built around the temple. The overall purpose of the Hindu temple can be presented in such a way: like the Himalayas, the temple points to the heavens, the abode of the gods. The Hindu temple, step by step, shape-by-shape reverses this primeval descent and places man back on the path toward heaven. Temples were usually built in places marked by special holiness.  The legends associated them with the acts of Vishnu, Shiva, Durga and other gods.  In the 4-5 centuries, when Hinduism during the reign of Gupta dynasty, became the state religion, the main structural elements of the temples were plinth, sanctuary and superstructure.  The stone base of a Hindu temple symbolized the altar, on which the temple itself was sacrificed to a deity.  With the modular characteristics of the proportions of the temple measure cap not taken into account.  The temple was conceived as a structural unit, resting on the altar.   In some early temples the wall of the sanctuary served as main walls of the building, in others the sanctuary was surrounded by a second ring of walls, which created a special gallery to circumvent.  In any case, the churches were dark inside.   Module for Hindu temples and their center was a sculpture of a deity his idol.  Temple priests were called guardians of the idol and the servants of God, whose dwelling was in the temple. Modern scientific analysis of a temple shows that temple-space is surcharged with great positive energy and the visitors can feel physical welfare and mental well-being. This fact rises a lot of questions: how could a structure built of stone or of brick have that kind of energy? What makes the temple so powerful? There is a scientific view that a temple is not a home of God but it is the form of God that means that the temple structure itself is worthy of worship . (Michell , p. 68.) The temple architecture is a scientific phenomenon. The basic concept that determines worthiness of the structure and form of temple is The layout adopted for temple form is synonymous with the layout of the Cosmos. The plan of the layout of a temple is technically called Mandala or Vaastu Pada with a grid of 8x 8 =64 spaces or 9x 9 = 81 spaces of equal dimensions. In modern architectural terminology this can be addressed as energy-grid. Those two layouts are the geometrical formulae to replicate the subtle substance of the universe into visual material form. (Volwahsen, p 44) The important aspect of Hindu temple is that it serves as a cosmic intersection of man, God, and the Universe. But it also is the Universe, reflected in its repeating architectural forms. The careful mathematical measurements that lie in the basic construction of a Hindu temple express the structure of the Universe. For example, in order for the temple to face east, its width must be a perfect multiple of the fraction three-eighths. The outer dimensions of the temple must also satisfy five other equations relating to stars, planets and the passage of time. (Kramrisch, p.132) Another important analogy is between the temple and the mountain that can help to understand the divine purpose of the temple-to serve as a meeting place between man and the gods. It means that the gods could descend to be in the presence of man, like human souls rising up to meet the gods. (Rao, p. 126) The piece of land upon which the temple stands is itself a sacred location a tirtha, a Sanskrit word literally meaning crossing place is a site favored by the gods where water, shade and seclusion are plentiful. Temples must be built on tirthas in order to serve their true purpose as crossing places, and this site selection is only the first step in building a temple. Another important aspect is the vastu-purusa-mandala , that is a rough architectural blueprint for the foundation of the temple, that serves both a practical and a highly symbolic purpose, becoming the architectural and spiritual foundation of the Hindu temple. (Rao, p. 135.) As suggested earlier, the temple is also a microcosm of the Universe, the mandala reflects this aspect of the temple as well: the center square of the mandala stands for the mythical mountain of Meru, the geographic center of the cosmos. Around Mount Meru is arranged a symbolic pantheon of gods, and each god occupies its own square and is ranked in importance by its proximity to the center. (Rao, p. 135.) The next part of this essay analyzes separate elements of the temple, both interior and exterior, and places these elements within the context of the temples divine purpose: to serve as a cosmic meeting place for devotee and deity. The garbhagrha, the sanctum sanctorum of the Hindu temple, presents itself as a point of departure: if the temple is a mountain, the garbhagrha is the cave inside the mountain. The garbhagrha is dark, and its walls are largely undecorated, that contrasts the exterior of the temple, which is often highly ornate and replete with thousands of sculpted images. The simple darkness of the sanctum reflects its function as a womb house, one of the meanings of garbhagrha. (Kramrisch, p. 169) Analysis of Hindu temples in Nagara and Dravida styles The two temples described here, one at Khajuraho (Madhya Pradesh), the other at Angkor Wat, give the best possible idea of how the contrasting Nagara and Dravida styles had developed by the 11 century and present aesthetic achievements of the Hindu architectural tradition. Style Nagara, which developed during the 5h century, is characterized by a tower-type hive (called shikhara) made up of several words of architectural elements, such as kapotas and gavaksas, culminating in a large round cushion like element, named amalaka, and  parlance Drum.  The plan of the temple is based on the square, but the walls are often broken down decorative elements in creating the impression that the tower is round.  In more recent temples the central mandapa was surrounded by several small temple buildings, creating a visual effect of a fountain. From the 7th century Dravida , or southern style, has formed a pyramidal tower consisting of progressively diminishing tiers, bottleneck, and the dome on top, also called shikhara (in the southern terminology).  Repeated horizontal tiers visually impart the southern temples squat. Less obvious differences between the two main temple types Nagara and Dravida include the plan area, the selection and arrangement of stone, from which the cut shapes on the external walls and the interior, the range of decorative elements. In spite of their obvious stylistic differences, the temples at Khajuraho and Angkor Wat have basic principles connected with Hindu beliefs and practices. Kandariya Mahadeva temple, Khajuraho This temple was built in the middle of the 11th century by one of the kings of the Chandella dynasty, this great Shiva temple represents the Nagara style ad is one of the best achievements. Kandariya Mahadeva temple is the tallest monument at Khajuraho, its spire rising more than 30.5 metres above the plinth on which the temple is elevated. The temple has 30.5 metres in length and 20 metres in width. Like other fully developed Chandella temples at Khajuraho, it consists of a linear east-west sequence of access steps, entrance porch, columned hall with side balconies, and linga shrine with encircling passageway, off which open three additional balconies, that bring porches. The porches serve as balconies with high seating, bringing ventilation and light to the interior. What distinguishes the Kandariya Mahadeva temple from the other monuments a Khajuraho is its grand scale and elaboration of design and ornamentation. Undoubtedly, the glory of the temple is its lofty curving tower, crowned by an amalaka ( ribbed circular motif). Very significant in the temple is the sculptural treatment of its outer walls, which are covered with images of the god Shiva, to whom the monument is dedicated, with consorts, attendants and lesser divinities. Important among the images here are the aspect of the god, including those who subdues the blind demon, the cosmic dancer, and the destroyer of the triple demon cities. The sculptures are arranged in three tiers on the outside, amounting to no less than 646 figures in all, not counting the 226 figures of the interior. The temple is well known for its erotic groups which are placed on the juncture of the walls of the mandapa and the passageway surrounding the sanctuary, marking one of the most ritually vulnerable parts of the monument. Among the other images are those of female deities, such as the seven mothers, let alone the countless apsaras, or heavenly maidens that attend on the gods, and who are shown in alluring postures that reveal the mastery of the Khajuraho artists in rendering female contours with conscious sophistication and exuberant grace. Angkor Wat in Cambodia, is the second Hindu temple described in the paper, that refers to the Dravida style. This temple was dedicated to the Hindu god Vishnu, the preserver of the world. Angkor Wat is a gigantic threeà ¢Ã¢â€š ¬Ã‚ step pyramid adorned by nine slender towers of enormous height, the steps of the pyramid are capped by galleries. Framed by an enclosure wall and a majestic moat, the temple covers 2.5 square kilometres. The pyramid is raised on a vast terrace of 2 m high, and surrounded by naga balustrades. It opens to the cardinal points by entrance pavilions and stairways. The steps are crowned by surrounding galleries: the first step, containing the gallery of the basreliefs, is 203 m large and 3 m high. Pavilions mark the corners, at the corners of the second tier are four towers, their superstructure is partly missing. The outer gallery of the pyramid, including the western corner pavilions, shelters the most precious treasures of Angkor Wat, reliefs in a total length of more than 600 m. They depict narrative scenes from mythology and history. Reliefs do not simply embellish a temple; they make it a sacred space. In the images which depict the gods and their deeds, the gods themselves are present, and figures and parts of the body are either shown frontally or in profile. Reliefs were always carved in situ, after the walls had been finished; they were cut into the stone. It is important to mention twelve stairways rise to the third level of the pyramid. All five towers open to the cardinal directions, giving open views along the galleries, and the overall picture was a wide and airy hall, full of light. The third level, where are the finest reliefs of Devata, was the throne room of God Vishnu. As for the symbolism of the temple, Angkor Wat is an unsurpassed image of the Mount Meru, the abode of the Gods in the centre of the world. Corresponding to the five peaks of this mountain, at Angkor Wat five towers were visible from every cardinal direction. The enclosure wall symbolizes the mountains surrounding and hiding the Mount Meru; the moat symbolizes the cosmic ocean. The temple complex is a microcosm, an image of a perfect world, stable and in geometrical harmony. We can see that Angkor Wat, as well as Kandariya Mahadeva temple, as all Hindu temples serves as a cosmic intersection of man, God, and the Universe, and also the Universe is reflected in its repeating architectural forms.

Thursday, September 19, 2019

Each Mans Son :: essays papers

Each Mans Son ï » ¿1) Doctor Ainslie’s role in the community is to take care of the injured people of Cape Breton. He works long hours to keep up with the demand of the patients. He is also very much respected by everyone in the community. Molly thinks that Doctor Ainslie is a very well educated person. She thinks of Dr. Ainslie as a great role model for her son. 2.) Page 27 is saying that whatever the doctor does it is never good enough for him. He is too hard on himself, never being pleased with himself. Doctor Ainslie is hard on the outside but inside he is a very caring person. 3) Dr. Ainslie doesn’t think too highly of Archie. He thinks that Archie is not very smart and that he deserted his family. 4) I believe that Alan is not dependent on his father for everyday life. I do think that Alan is very dependent upon his father for the money of his education but that’s it. Molly believes that Alan can be a doctor just like Dr. Ainslie. Get his education from the USA and come back to Cape Breton or go far away to help others. 5) He can understand because he was in her position he once was poor where margret was rich her whole life. Mining effects almost everyone in the town. Miners are very poorly paid so the houses they live in are shared between two families. The men work in the mines all day, go home to get cleaned, eat supper, and then go down to the bar. They come home covered in black coal dust. The younger miners are very cocky and have nothing better to do after work that to pick fights. The middle aged men are very quiet and worn out. Mining takes a great toll on the workers lives. After working in the mine for a few years they look 10-20 years older then what they should look like. If they survive mining in time for their retirement they are lucky. A young Newfound lander (20) is brought into the hospital after an accident The Newfound lander’s hands are badly hurt and bandaged up in clothes The doctor operates, he cut off 1 hand and a finger The doctor talks to his friends to find out what had happened The young man took a bet to see if there were one or two cables running in the colliery

Wednesday, September 18, 2019

The Comitatus Relationship in Beowulf Essay -- Epic of Beowulf Essays

Throughout history rulers have always been protective of their kingdoms. In hopes of always being in control of their territory, rulers develop special relationships with the people to protect them. This relationship was usually achieved by of instilling fear into the minds of their warriors, or instilling respect between each other. In the story Beowulf the relationship between the ruler and his thanes is that of honor, friendship, and respect. In Anglo Saxon stories, the relationship between the ruler and his thanes is known as comitatus. The comitatus relationship requires that "the thane swear to defend a lord to their death, while he provides them with the protection and a share of his wealth and weapons." This sounds like a typical warrior defending master relationship, but the relationship between a lord and his thanes is far more complex than that. Along with the thane and lord each providing services for the other, there is also a great deal of camaraderie between the thanes and their lord: "Some of the native terms used for this group in Beowulf may suggest something of ...

Tuesday, September 17, 2019

Alexander the Great’s Military Accomplishments Essay

There is only one other man who is written about in at the level of Jesus Christ, his name was Alexander the Great. Alexander the Great is one of the most told about, and written about Kings of the ancient world. Not only was he a vastly loved and appreciated leader to his army but he was a conqueror of much of his known world. His military genius and tactics, even at his young age of attaining the throne from his father Philip II after he was assassinated, were unrivaled resulting in him never to lose a battle. Alexander the Great had no easy time upon his ascent to the throne, the authors said â€Å"He had to put down the revolts that erupted immediately after Philip’s death-notably at Thebes.† (Cole, Symes, Coffin, and Stacey 90) The dispute in Thebes was settled when Alexander the Great punished them by tearing down their walls. Two years after Alexander had settled all the unrest in his new kingdom he turned his sights on Darius III and his kingdom of Persia. The kingdom of Persia was led by Darius III, the authors state â€Å"Darius III was a minor member of the royal family who had been placed on the throne after a palace coup.† (Cole, Symes, Coffin, and Stacey 90). Darius had ascended the throne the same year as Alexander but at the much older age of 45 in comparison to Alexander at the age of 20Darius’ first mistake was that he and his advisors refused to take Alexander seriously even though they suffered defeat at the hands of the Greeks in the past. Perhaps it was their sheer numbers that kept the Persians from seeing past their ego’s and not understand the aim of Alexander the Great. Alexander’s conquest began with a victory at Anotlia; this was near the field that the battle of Troy took place at. He continued down the Ionian coastline in more strings of victory leading him to an opportunity that took him a year to get, Darius III. Alexander finally had the opportunity to challenge Darius personally on the river bank near Issus; the authors tell us â€Å"The chosen site†¦favored Alexander’s fast-moving infantry, not the heavy cavalry and chariots of the Persians.† (Cole, Symes, Coffin, and Stacey 90). The defeat of the Persians was so bad Darius III abandoned both his army and his family, including his mother. Darius’ family was captured by Alexander the Great but was treated with the respect that their standing as a royal family called for. Darius was chased for the remainder of his life by Alexander the Great until his defeat at Gaugamela. After this defeat Darius III was killed by a local chieftain who was trying to win over A lexander’s favor however that backfired worse than the chieftain probably realized it could have, the author states â€Å"Alexander – acting as the new Great King – had the chieftain executed for treason.† (Cole, Symes, Coffin, and Stacey 90). After that devastating defeat at Illus had completed his tour of conquest in Asia Minor. Syria and Palestine surrendered to the will of Alexander the Great he implemented the same tactics of Cyrus the Great which the authors explain as, â€Å"†¦a policy of offering amnesty to cities that submitted peacefully-but dealing mercilessly with those that resisted.† (Cole, Symes, Coffin, and Stacey 90). The merciless example was provided at the city of Gaza on the Egyptian border where Alexander killed the men and enslaved the women and children, even going to the extreme of dragging the defeated commanders body through the streets of the freshly sacked fortress. The conquest of Egypt was much easier on Alexander’s army mainly because he was unopposed, the authors even go as far as to state, â€Å"He was welcomed as a liberator: Egypt had been governed as a Persian satrapy since 525 B.C.E.† (Cole, Symes, Coffin, and Stacey 90). Alexander was actually so welcomed in Egypt he obtained the â€Å"double crown† as it were by being crowned pharaoh of Upper and Lower Egypt. It was in Egypt where Alexander the Great was proclaimed as the son of Ammon, a god identified with Zeus, and a god himself. It was from here that Egypt was named as the capital in the empire. The authors state, â€Å"†¦it was in Egypt that he would build his shining new city of Alexandria.† (Cole, Symes, Coffin, and Stacey 90). Unfortunately he would not live to see the completion of this city, his return to this city was in his sarcophagus. Alexander also pushed deeper into the far reaches of Persia including his defeat of the warlord Porus at the Battle of Hydaspes in what is modern day Pakistan. This was one of his last major battles where the authors state, â€Å"†¦his famous warhorse, Bucephalus, was killed. And it was here Alexander’s exhausted army refused to go on, thousands of miles and eight years from home.† (Cole, Symes, Coffin, and Stacey 91). Forced to turn back he headed for the Arabian Sea, when he reached Susa he indicated to combine armies with Persia and have them fight in the hoplite formation. He even arranged a mass marriage with his officers to Persian noblewomen and adopted the dress code of the Persian Empire. Alexander tried to continue his conquest but began to show the signs of malarial fever and diminishing signs of health. The authors however go as far to say I was feasible that, â€Å"†¦he was poisoned; his closest companion, Hephaistion, had died the year before at Ecbatana, leaving Alexander without his most vigilant bodyguard.† (Cole, Symes, Coffin, and Stacey 92). He refused to take the advice of his physician however, so the malarial fever does seem like the more likely of the two to have taken his life. Alexander eventually died in Babylon in Hammurabi; he never reached thirty-three years of age. Alexander the Great is one of the most told about, and written about Kings of the ancient world. Through his military prowess and tactics he was able to conquer much of the know territories but still did not live to see his dreams. There is no shortage of information on Alexander the Great as long as you know where to look, and don’t use the Colin Farrell movie. Upon researching for this paper it is no wonder why he comes second only to Jesus Christ in written down tales of his life, adventures, and conquests. Works Cited Cole, Joshua , Carol Symes, Judith Coffin, and Robert Stacey . Western Civilizations Brief Third Edition. New York: W.W. Norton & Company, Inc., 2012. Print.

Monday, September 16, 2019

Cyber Crime

Crime   is   on   the   rise   just   about   everywhere   these   days,   but   nowhere   has   this   up   rise   in   crime   become   more   apparent   than   in   cyber   space.   Like   so   many   other   aspects   of   our   lives,   major   fraud   has   gone   high   tech.The   FBI   estimates   that   businesses   alone   lose   an   upwards   of   $1.5   trillion   annually   as   a   direct   result   of   cyber   crimes.   The   number   of   these   crimes   has   tripled   in   the   past   two   years   and   the   numbers   continue   to   climb.   (O’Leary   &   O’Leary)   p. 287Through   the   duration   of   this   essay   we   will   be   embarking   on   a   journey   into   the   dark   and   seedy   world   of   cyber   crime.   Within   this   text   you   will   find,   the   definition   of   cyber   crime,   the   most   typical   types   of   cyber   criminals,   as   well   as   the   most   common   forms   of   cyber   crime.The   exact   definition   of   cyber   crime   is   still   evolving.   (   www.davislogic.com/cybercrime.htm   ).   Cyber   crime,   or   computer   crime,   is   an   extremely   broad   term.   This   term   is   most   commonly   used   to   describe   criminal   activity   committed   where   a   computer   or   network   is   the   source,   tool,   or   target   of   a   crime.   Like   traditional   crime,   cyber   crime   can   take   many   shapes   and   occur   at   any   time   or   any   place.When   an   individual   is   the   main   target   of   cyber   crime,   the   computer à ‚  can   be   considered   a   tool   rather   than   the   target.   These   crimes   generally   involve   less   technical   expertise   as   the   damage   done   manifests   itself   in   the   real   world.   In   these   types   of   cases   the   damage   dealt   is   primarily   psychological.By   now   many   of   us     are   all   too   familiar   with   spam.   Spam   or   spamming   refers   to   the   abuse   of   electronic   messaging   systems   to   send   unsolicited   bulk   messages indiscriminately.   While   the   most   widely   recognized   form   of   spam   is   e-mail   spam,   the   term   can   also   be   applied   to   similar   abuses   in   other   media.Some   of   these   abuses   include;   instant   messaging   spam,   web   search   engine   spam,   s pam   in   blogs,   wiki   spam,   mobile   phone   messaging   spam,   social   networking   spam,   as   well   as   internet   forum   spam. As   applied   to   email,   specific   anti-spam   laws   are   relatively   new,   however   limits   on   unsolicited   electronic   communications   have   existed   in   some   forms   for   some   time.Another   common   crime   plauging   cyber   space   is   identity   theft.   Internet   identity   theft   is   different   from   common   identity   theft   in   a   few   different   ways.   Common   identity   theft   is   different   from   common   identity   theft   takes   place   after   something   is   physically   stolen   from you   like   a   wallet   containing   credit   cards   and   a   driver’s   license   or   an   un-shredded   credit   card   statement from   your   garbage   bin.The   thief   would   take   these   stolen   articles   and   use   them   to   make   a   fraudulent   purchase   or   something   of   that  Ã‚   nature. Internet   identity   theft   can   be   much   more   devastating   than   conventional   identity   theft   at   times   due   to   the   fact   that   most   victims   of   internet   identity   theft   are   completely   unaware   that   anything   has   been   stolen   from   them   until   it   is   far   too   late.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Gone   are   the   days   when   we   had   to   step   outside   to   purchase   our   groceries,   book   flights,   and   vacations,   or   simply   transfer   money   between   bank   accounts.Today,   we   can   simply   grab   our   checkbooks,   debit   cards   or   credit   cards,   sit   down   at   a   computer   in   the   comfort   and   safety   of   our   home,   and   complete   these   transactions   with passwords   and   PIN   numbers.Thanks   to   advances   in   technology,   the   types of   transactions   we   can   now   complete   online   are   virtually   endless.   Unfortunately,   the   increase   in   online transactions   has   been   accompanied   byà ‚   an   increase   in   online   identity   theft.   Fraudulent   access   to   personal information   over   the   internet   is   increasingly   prevalent   and   sophisticated.Two   forms   of     identity   theft   are   at   the   forefront   of   this   internet   piracy are   phishing   and   pharming.     Both   pharming   and   phishing   are   methods   used   to   steal   personal   information   from   unsuspecting   people   over   the   internet.   Phishing   typically   involves   fraudulent   bulk   email   messages   that   guide   recipients   to   (legitimate   looking)   fake   web   sites   and   try   to get   them   to   supply   personal   information   like   account   passwords.   Pharming   is   in   many   ways   similar   to   phishing.Pharmers   also   send   emails.   The   consumer,   however,   can   be   duped   by   the   pharmer   without   even opening   an   email   attachment.   The   consumer   compromises   his   personal   financial   information   simply   by opening   the   email   message.The   pharming   email   message   contains   a   virus   that   installs   a   small   software   program   on   the   end   user’s   computer.   Subsequently,   when   the   consumer   tries   to visit   an   official   web   site,   the   pharmer’s   software   program   redirects   the   browser   to   the   pharmer’s   fake   version   of   the   web   site.   This   allows   the   pharmer   to   capture   the   personal   financial   information that   the   consumer   enters   into   the   counterfeit   web   site,   and   the   consumer’s   a ccount   is   again   compromised.The   latest   form   of   pharming   does   not   require   email   at   all.   Password   stealing   Trojan   horses   can   attack   through   Microsoft   Messenger   where   key loggers   are   run.   Key loggers   are   viruses   that   track   a   user’s   keystrokes   on   legitimate   sites   and   steal   passwords,   allowing   a   thief   to   have   access   to   a   consumer’s   password   for   future   fraudulent   transactions.The   most   common   blunder   people   make   when   the   topic   of   a   computer   virus   arises   is   to   refer   to   a worm   or   Trojan   horse   as   a   virus.   While   the   words   Trojan,   worm   and   virus   are   often   used   interchangeably,   they   are   not   exactly   the   same.à ‚  Viruses,   worms   and   Trojan   horses   are   all   malicious   programs that   can   cause   damage   to   your   computer,   but   there   are   differences   among   the   three,   and   knowing   those   differences   can   help   you   to   better   protect   your   computer   from   their   often   damaging   effects.A   computer   virus   attaches   itself   to   a   program   or   file   enabling   it   to   spread   from   one   computer   to another,   leaving   infections   as   it   travels.   Like   a   human   virus,   a   computer   virus   can   range   in   severity. Some   viruses   may   cause   only   mildly   annoying   effects   while   others   can   damage   your   hardware,   software   or   files.Almost   all   viruses   are   attached   to   an   executable   file ,   which   means   the   virus   may   exist   on   your computer,   however,   it   may   not   actually   infect   your   computer   unless   you   run   or   open   the   malicious   program.  It   is   important   to   note   that   a   virus   cannot   be   spread   without   human   action,   such   as   running an   infected   program   in   order   to   keep   it   going.   People   continue   the   spread   of   a   computer   virus,   mostly unknowingly,   by   sharing   infecting   files   or   sending emails   viruses   as   attachments   in   the   email.In   summary,   the   same   types   of   fraud   schemes   that   have   victimized   consumers   and   investors   for   many years   before   the   creation   of   the   internet   are   now   appearing   online.  In   the   process,   they   not   only   cause   harm   to   consumers   and   investors,   but   also   undermine   consumer   confidence   in   legitimate   e-commerce   and   the   internet.People   who   commit   cyber   crime   are   cyber   criminals.   Like   cyber   crime,   cyber   criminals   can   take   many   forms.   These   criminals   are   typically   terrorists,   child   predators,   members   of   organized   crime,   employees,   outside   users,   hackers   and   crackers.   It   is   important   to   point   out   the   difference   between   hackers   and   crackers.   Hackers   are   individuals   who   gain   unauthorized   access   to   a   computer   system   simply   for   the   thrill of   it.   Crackers   do   the   same   thing,   but   for   malicious   purposes.Computer   hackin g   is   most   common   among   teenagers   and   young   adults,   although   there   are   many older   hackers   as   well.   Many   hackers   are   true   technology   buffs   who   enjoy   learning   more   about   how computers   work   and   consider   computer   hacking   an   art   form.   They   often   enjoy   programming   and   have expert   level   skills   in   one   particular   program.For   these   individuals,   computer   hacking   is   a   real   life   application   of   their   problem   solving   skills.   It   is   perceived   as   a   chance   to   demonstrate,   or   showcase   their abilities,   and   talents,   and   not   an   opportunity   to   harm   others.Cracking   is   the   act   of   breaking   into   a   computer   system,   often   on   a   network.   Cont rary   to   popular   belief,   crackers   are   hardly   mediocre   hackers.  Ã‚   Computer   hackers   were   early   pioneers   of   computing.   These   early   pioneers   were   frantically   dedicated   to   inventing   and   exploring   how   things   worked.   As   a   part   of   the   sixties   generation,   these   hackers   were   also   prone   toward   being   anti-establishment   and   somewhat   disrespectful   towards   property   rights.Eventually   a   pair   of   these   hackers,   Steve   Wozniak   and   Steven   Jobs,   hacked   together   the   first   commercially   successful   personal   computer,   the   Apple.   The   sixties   generation   hackers   flooded   this   new   industry   and   many   quickly   attained   positions   of   wealth   and   authority   creating   the   inf ormation   communications   ecology   that   dominates   Western   life.   Meanwhile,   two   things   happened.1.  Ã‚  Ã‚  Ã‚  Ã‚     A   new   generation   of   hackers   emerged.2.  Ã‚  Ã‚  Ã‚  Ã‚   The   world   economic   and   social   order   went   completely   digital,   and   so   crime   as   we   know   it   went   digital   as   well.It   is   somewhere   at   the   interstices   of   the   new   generation   of   alienated   young   hackers   ( they   sometimes   refer   to   themselves   as   Ã¢â‚¬Å"cyberpunks† )   and   the   world   of   sometimes   organized   crime   that   we   locate the   concept   of   the   cracker.   The   term   is,   to   some   degree,   an   attempt   by   the   now   established   older-generation   hackers   to   separate   themselves   from   computer   crime.The   debate   still   rages   as   to   what   constitutes   the   difference   between   hacking   and   cracking.   Some   say   that   cracking   represents   any   and   all forms   of   rule   breaking   and   illegal   activity   using   a   computer.   Others   would   define   cracking   only   as   particularly   destructive   criminal   acts.  Others   would   claim   that   the   early   hackers   were   explicitly   anarchistic   and   that   acts   of   willful   destruction   against   Ã¢â‚¬Å"the   system†   have   a   place   in   the   hacker   ethos,   and   that   therefore   the   term   cracker   is   unnecessary   and   insulting.This   concludes   our   journey   into   the   world   of   cyber   crime.   Through   the   course   of   our   journey   we   have   successfully   defined   cyber   crime,   identified   typical   cyber   criminals,   and   discussed   some   of  Ã‚   the   most   common   forms   of   cyber   crime.The   effects   of   cyber   crime   are   far   reaching.   It   would   be   a   difficult   task   to   find   someone   who   has   never   been   affected   by   malicious   internet   activity,   or   who   does   not at   the   very   least   know   someone   who   has   been   negatively   impacted   by   cyber   criminals.  Advances   in internet   technology   and   services   continue   to   open   up   innumerable   opportunities   for   learning,   networking and   increasing   productivity.   However,   malware   authors,   spammers   and   phishers   are   also   rapidly   adopting   new   and   varied   attack   vectors .If   the   internet   is   to   become   a   safer   place,   it   is   imperative   to   understand   the   trends   and   developments   taking   place   in   the   internet   threat   landscape   and   maintain   online security   practices.   Internet   threats   continue   to   increase   in   volume   and   severity.It   is   important   that   computer   users   are   on   guard   in   order   to   make   themselves   less   vulnerable   to   risks   and   threats.   Staying on   top   of   the   trends   and   developments   taking   place   in   online   security   is   critical   for   both   industry   researchers   and   all   computer   users   alike.  References  Ã‚  Ã‚  Ã‚   O’Leary,   T. J. ,   &   O’Leary   L.   I.   (   2008   ) .   Computing   essentials   introductory    2008.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   New   York:   The   McGraw-Hill   Companies.  Ã‚  Ã‚  Ã‚   Cyber   Crime.   (   2008   ) .   Types   of   cyber   crime.   Retrieved   September   27th   ,   2008 ,  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   From   http://www.davislogic.com/cybercrime.htm

Sunday, September 15, 2019

49 Simple Things You Can Do to Save the Earth Essay

Some of them, with their complicated timers and instant start-up features, constantly consume small amounts of electricity. (â€Å"Even the TV?† my wife asks. â€Å"Good thinking,† I tell her.) 3. SEPARATE YOUR GARBAGE. At our house we have separate garbage cans for glass, paper, plastic, aluminum, wood, organic matter, natural fabrics, synthetic fabrics, and rubber. (We split the work—my wife does the separating, I drop everything off at the recycling center.) 4. USE LESS WATER. We have two bricks in our toilet tank. But there’s a much simpler way to save water: Don’t flush every time! (â€Å"Don’t take the sports section in there with you!† is my wife’s tip. A sense of humor isso important.) 5. DON’T MOW THE LAWN. Let it grow. Naturally. Like a meadow. (â€Å"Like a dump!† jokes my wife.) See more:  Perseverance essay 6. DON’T SHAVE AS OFTEN. I shave once a week. (â€Å"If it’s good enough for Don Johnson,† I quip. â€Å"That was passà © years ago,† my wife informs me.) 7. DRIVE SLOWER. I try to maintain a nice, steady 40 miles per hour, the legal minimum on most highways. Also, I roll up the windows. It reduces wind resistance — and noise. (â€Å"You can’t hear those horns?† my wife asks, incredulous.) 8. SHOP WITH A RE-USABLE SHOPPING BAG. And, if you can, walk to the store. (â€Å"It’ll do wonders for your figure,† I mention casually to the missus.) 9. BOYCOTT! Boycott polluters, or anyone who sells any product that can cause pollution, or any product that might contain an ingredient that can cause pollution. (â€Å"What does that leave?† my wife asks. â€Å"Just the good stuff,† I reply.) 1 0. DO YOUR LAUNDRY BY HAND. It may be drudgery of the lowest order to have to hand-launder your clothes and hang them on a clothesline, but it saves water and energy. (â€Å"Whistle while you work,† I kid my wife. â€Å"Hitler is a jerk,† she continues. I’d forgotten that verse!) 11. TURN DOWN THE HEAT. Especially the water heater. (â€Å"They take cold showers in Sweden,† I like to hint. â€Å"Go to Sweden!†Ã¢â‚¬â€my wife.) 12. TAKE FEWER SHOWERS. But don’t share them, even if it’s been touted, albeit humorously, in other â€Å"x-number-of-simple-things-you-can-do-to-save-the-earth† books. Why? It uses more water. Figure it out for yourself. Better would be to take a bath in â€Å"recycled† bath water. Best: An occasional sponge bath. (â€Å"No, I’m not kidding,† I tell the wife.) 13. REPLACE METAL DOORKNOBS. During the winter, when it’s very dry, touch a metal doorknob and you get a little shock from the static electricity. That’s wasted electricity, I figure. We’ve replaced all our metal doorknobs with ones made of non-conducting rubber, wood or glass. (â€Å"You’ve got a screw loose,† my wife points out. And she’s right!) 14. GO SOLAR. For a small investment of about ten thousand dollars you can convert your house to solar energy. It’ll pay for itself in twenty years, I estimate. (â€Å"What next?† my wife wonders, as we all do.) 15. MOUNT A WINDMILL ON YOUR ROOF. It’s cheap—about eight hundred dollars—and easy to install. (â€Å"A little more to the right,† I yell up to her.) 16. MAKE YOUR OWN HONEY. In addition to producing delicious honey, our beehive is a real conversation starter. (â€Å"We have to talk,† my wife says. See?) 17. WORK AT HOME. Recently, I quit my job of twenty years to become a full-time writer. I write at home, on a computer. I’m not using up any gasoline or motor oil, I’m not wearing out any clothing or shoes. To put it simply: I’m not a drain on the environment. (â€Å"You don’t move,† my wife observes, exaggerating slightly.) 18. BOARD UP THE WINDOWS. Windows are nice, but they either let in too much heat, or let out too much, or vice versa. (â€Å"This is better than mini-blinds!† I shout to the wife, who can barely hear me over her own hammering.) 1 9. GET RID OF THE TELEPHONE. Think you can’t live without a telephone? Think again. We’ve done fine. (â€Å"Who would call us?† my wife rationalizes.) 20. GET RID OF THE BED. Many leading chiropractors say that sleeping on the floor, with no mattress or cushion, is the best way to sleep. (â€Å"We certainly haven’t needed a bed much lately,† my wife confides to a mutual friend.) 21. GET OUT AND ORGANIZE. At my wife’s suggestion, I got out of the house and into the community—to organize. Now I work with a diverse group of community activists and we meet four times a week—at our house. (â€Å"Whoare these people?† my wife asks. â€Å"They are the people,† I tell her proudly.) 22. BAN ALL CHLOROFLUOROCARBONS. Not just spray cans, but the refrigerator and the air conditioner. Get rid of them! We now have ice delivered to our house every day. (â€Å"You’re crazy!† my wife shouts from the kitchen. â€Å"So was Van Gogh!† I shout back.) 23. TREAT WOUNDS NATURALLY. If you’re injured, cut on the head, above the eyebrow—from a sharp piece of ice, let’s say—treat it naturally. Salt and lemon juice is the combination my wife favors. (â€Å"I want a divorce,† she says, pouring salt on my wound. â€Å"Ouch!† I say.) 24. KNOW THE LAW. And know a good lawyer. (My wife does.) 25. WHEN YOU MOVE, BE A GOOD NEIGHBOR. Having recently relocated to a smaller environment—an apartment—I can empathize with anyone who has had to go through a â€Å"moving experience† as I call it. Remember, along with a new habitat come new co-inhabitants. Get to know them. They are your neighbors and, as simplistic as this sounds, they are the keys to your survival. (When I explain this simplistic theory to one of my new neighbors, she’s fascinated. Maybe the beard works!) 26. CARPOOL. At my new part-time job I carpool with a couple of the ladies from the office. We’re saving gas, money, and we’re getting to know each other better. (â€Å"He used to have a fear of intimacy,† my wife tells the judge. On the advice of Barry, my lawyer, I can say nothing.) 27. MAKE LOVE, NOT WAR. I know, I know. But, if I could just use one earth-saving tip to draw your attention to the beautiful and cosmic experience of making love with a truly giving and understanding sexual partner. (Takethat, you lying, blood-sucking witch!) 28. SHARE YOUR SHOWERS. I’ve done a complete one-eighty on this one. Use a kitchen timer. (Or Ravel’s Bolero!) 29. WOMEN! Or should I say, women judges! (This just in: She gets the car, the house—everything except the profits from this book, Dear Reader.) 30. YOU CAN MAKE A DIFFERENCE. When someone (especially someone much younger and less experienced than yourself that you only met two weeks ago) tells you that one person can’t make a difference—that no matter how much shouting and yelling and â€Å"whining and complaining† one person does nothing will change, that â€Å"you’re too old to be acting that way,† that â€Å"you should settle down and focus on one thing and do that well†Ã¢â‚¬â€when someone lays that trip on you, it’s time to split. (â€Å"I can make a difference!† I tell her, gathering my things.) 31. BUNDLE AND RECYCLE NEWSPAPERS. Sorry, I lost sight of what we’re trying to do here, which is save the earth. Take all your old newspapers, bundle them together, and bring them to a recycling center. They’ll give you a few bucks, which is nothing to sneeze at. (What happened?) 32. BUY A â€Å"RECYCLED† CAR. There are some good deals in used cars—if you take the time to look. (I didn’t, and boy am I sorry.) 33. DON’T LITTER THE HIGHWAYS. Be considerate. There are laws, but they’re rarely enforced. (Except in my case, of course. I told the officer I wasn’t living in my car—it had broken down, I was tired—but: A $100 fine for vagrancy, a night in jail, a towing charge of $75, and a ticket—I’m getting rid of this damn car!) 34. KEEP FIGHTING. That’s right. No matter how tough it gets, the fight to save the earth will go on, with or without you. (Right now it’s without. I’m back to my old habits again—smoking, drinking, and hanging out with a bunch of losers. One of them is a real nut, calls himself â€Å"The Master.†) 35. DONATE OLD CLOTHING. There are people out there who can get some good use out of your old moth-eaten sweater or sports jacket or worn-out pair of shoes. (I’m a 41 short.) 36. FOLLOW THE MASTER. The Master has forged an â€Å"alliance with the human spirit† that allows him to speak directly and simultaneously to every living thing on this planet. (Follow The Master.) 37. THINK FOR YOURSELF. Take it from someone who, after having his self-esteem obliterated by a persuasive con man and his gang of sycophants, escaped on foot—with nothing to eat for nine days but wild berries and mushrooms—and lived to talk about it! (You might have seen the story in the papers—†DAZED FOLLOWER OF DIZZY GURU FOUND ON FREEWAY†) 38. HI, HOW ARE YOU? I knew it was her before I picked up the phone. (The cobwebs that covered the receiver were now sticking to my face. â€Å"Fine,† I said.) 39. DON’T BE FOOLED. A wise consumer is a protected consumer. (I told my ex this when we got together for some Irish coffee at the mini-mall, near the old house. She ended up selling that barn for—get this—$650,000! â€Å"Honey, it seems like old times!† I whooped.) 40. RECYCLE! REVIVE! RERUN! Excuse my exuberance, but something is finally happening out there—something positive, something good. People are separating their garbage. They’re using biodegradable, ecologically safe, recyclable and reusable materials. Everything old is new again! (When my ex-wife and I decided to re-marry, I suggested a â€Å"Save the Earth† clause be added to our pre-nuptial agreement. â€Å"We have to talk,† she said, showing great interest at the time.) 41. MOVE TO THE COUNTRY. Inherit the land again. That’s what we did. Bought forty-three acres in Upstate New York. It’s a working farm, where my wife can go out to the barn and milk the cows, pick out the freshest eggs and knit our clothes from the wool she shears from our very own sheep. (And I can finish this book!)