Monday, September 30, 2019

2.5 work file Essay

Directions: Complete the food safety interactive quiz. Use the information from the interactive quiz to complete the following responses regarding food safety practices. For each of the following food safety practices, share at least 2 statements from the interactive quiz. Be sure to put these statements in your own words and explain why they are helpful in preventing food borne illness. An example would be: When dining from a buffet, make sure hot food is hot and cold food is cold. Food that is 40 – 140 degrees Fahrenheit has already begun to grow bacteria and pathogens. Clean (16 points): 1. After handling raw meat, poultry, fish, or eggs wash your hands because you can get a foodborne illness. 2. Rinse fruits and vegetables with running tap water before eating, cutting, and cooking to reduce amount of bacteria present. Separate (16 points): 1. Keep many foods separate to avoid cross-contamination. It is the transfer of harmful bacteria from foods to other foods. Especially, when handling raw meat, eggs, or poultry. 2. Be sure to wash your counter and utensils with hot, soapy water to kill bacteria. Cook (16 points): 1. I f you leave cooked food out for 8 hours, throw away the food. See more: Recruitment and selection process essay Bacteria can grow rapidly and cause illness when it has the nutrients it needs. 2. You can a hamburger is cooked when you use a food temperature and the internal part of the hamburger is 160 F. Chill (16 points): 1. Freezing food should be kept and 0 F and below because it inactivates microbes- bacteria, yeasts, and mold. 2. By refrigerating foods at cold temperatures, you keep bacteria from multiplying. In your own kitchen, explain 2 food safety practices you feel your family can improve and 2 food safety practices you feel your family does well. (16 points) 2 food safety practices are: Run fruits and vegetables under tap water before cooking, eating, and cutting. Refrigerate food when not being used because bacteria forms rapidly. 2 safety practices: Wash utensils with warm, soapy water. Clean your counter with warm, soapy water to kill bacteria. In what ways do your school and community practice or promote food safety to contribute to your personal health? (20 points) They contribute to this by reducing pollution and cleaning up the community. By doing these little things, it can help my lungs be full of oxygen and not pollutants and cleaning up the community can save my life my protecting fish that I eat.

Sunday, September 29, 2019

Internet Security Essay

During the past ten years, the intensiveness and variety of electronic financial transactions have increased dramatically. The last decade was characterised by the rapid spreading of financial transactions involving the use of online and/ or remote mechanisms. E-services and e-transactions have become an essential element of the postmodern technological reality. As the number of online financial services increases, so do the number and variety of security threats. Small and large companies are equally vulnerable to the risks of security breaches in various types of financial transactions. These threats are becoming more and more complex and can take full advantage of the existing network and application vulnerabilities. The current state of technology provides numerous solutions to the existing and emerging security threats; however, the success of the proposed countermeasures will depend on how well businesses realise the seriousness of the major security threats and are prepared to invest additional resources in the development and implementation of the complex security strategies. Security threats and statistical information: The current state of literature A wealth of literature was written about the most serious security threats and the financial losses which security breaches and various types of system vulnerabilities cause to large and small businesses. The period between 2006 and 2008 was marked with the slight decrease in the number of financial frauds and security breaches in financial operations: U. S. Federal Trade Commission asserts that frauds as a percentage of online revenue in the United States and Canada has decreased slightly over the past few years and stabilised at 1. 4 percent in 2008 (Paget 2009). Meanwhile, the losses caused by security breaches and financial fraud display a marked increase – in 2008 alone, the American market lost over $4 billion due to security breaches and financial frauds (Paget 2009). This is a 20 percent increase compared with 2008 (Paget 2009). Given the new trends in technology-related financial services and businesses’ striving to reduce their transaction costs, the development of new methods of e-payment and the use of open architectures will create new technological challenges for professionals and new fraud opportunities for hackers (Glaessner, Kellermann & McNevin 2002). The current state of literature provides the basic overview of the most serious security threats and proposes unique solutions businesses and individuals can take to address these threats. Financial transactions and security threats: what literature says The discussion of security threats in the context of e-financial transactions is one of the most popular topics in scholarly literature. Today, the rapid growth of wireless technology and the increasing role of wireless solutions in daily financial operations turn electronic security into the issue of the major public concern. Numerous authors tried to identify the most important security threats and to categorise them according to their severity and define the risks they pose to the stability of the financial e-flows. For example, Glaessner, Kellerman and McNevin (2002) state that the most frequent problems in the financial transactions arena include (a) insider abuse, (b) identity theft, (c) fraud, and (d) hacking. Cate (2005) concentrates on the discussion of identity-based fraud and suggests that account fraud, true identity fraud and synthetic identity fraud are the three most frequent forms of security threats in online financial transactions. In this context, Keller et al. (2005) seem the most objective and detailed in their observation of the existing security threats and financial transaction issues. According to Keller et al. (2005), the first generation of vulnerabilities started in the middle of the 1980s and took a form of boot viruses that affected computers and networks over the course of weeks; the next generation of viruses was spread by means of macros and e-mails. Denial-of-service attacks became prevalent in the middle of the 1990s and still present one of the basic problems in financial transactions domains (Keller et al. 2005). New types of threats include worms that affect individual and multiple computers and networks, and can easily self-replicate to infect large number of users (Keller et al. 2005). Trojans are used extensively to steal passwords or create back doors on computers, compromising network security (Keller et al. 2005). Keller et al. (2005) believe that the rapid expansion of spyware and malware are of particular concern to IT specialists and business people – these programmes are downloaded into computers without users’ knowledge or consent, typically run in the background, track personal information and execute damaging commands. Statistically, every PC contains approximately 27. 5 pieces of various malicious programmes (Keller et al. 2005). Fortunately, IT professionals actively work to develop effective countermeasures against the most sophisticated security threats. Financial transactions and security threats: Potential solutions Given that malware presents one of the most serious issues in the field of electronic financial transactions, numerous authors sought to offer their solutions to the problem. Vlachos and Spinellis (2007) provide an overview of the so-called Proactive malware identification system, which is based on the computer hygiene principles and demonstrates relative effectiveness in combating the risks of malware in financial transactions. Vlachos and Spinellis (2007) call the proposed algorithm PROMIS and base it on a peer-to-peer architecture; the choice of the P2P architecture is justified by the fact that P2P networks often become a propagation vector for various types of malicious software. The P2P architecture used by Vlachos and Spinellis (2007) contains two types of nodes, the member and the super nodes, and all nodes wishing to participate in the discussed P2P networks must authenticate themselves to the super nodes. PROMIS nodes generally fulfill the two basic types of operations – a Notifier daemon regularly checks the log files on the security applications, while a Handler daemon analyses the incoming rates from other peers of the group and computes a global malicious activity rate (Vlachos & Spinellis 2007). The researchers use experimental design to prove that the performance of the P2P group improves proportionately to the number of P2P members. Extensive simulations suggest that PROMIS has a potential to protect the operating networks from known and unknown worm activity (Vlachos & Spinellis 2007). That during virus epidemics PROMIS exploits only specific vulnerabilities and leaves all other systems intact is considered as one of the basic system’s benefits (Vlachos & Spinellis 2007). However, Vlachos and Spinellis (2007) are not the only professionals in the field of financial security. The fact is in that malware is often associated with denial-of-service attacks, which continue to plague the Internet. Malware substantially lower the bar for massive distributed denial-of-service attacks (Wang & Reiter 2008). Unfortunately, the current state of protection against DoS attacks is passive by nature and does not offer incentives to the owners of the Internet networks to protect their computers from the risks of malware (Wang & Reiter 2008). Wang and Reiter (2008) suggest that client puzzles be a potentially effective mechanism against DoS attacks in financial transactions. Client puzzles imply that â€Å"a client solves a computational puzzle for requesting service before the server commits resources, thereby imposing a massive computational burden on adversaries bent on generating legitimate service requests to consume substantial server resources† (Wang & Reiter 2008). End-to-end puzzles imply that each client bidding for a financial service from the Internet server must present his solution to a puzzle; meanwhile, the server will allocate its limited resources to the bidders who solve the most difficult puzzles (Wang & Reiter 2008). In this system, an adversary cannot seize the financial and informational resources of a victim without committing its own resources first (Wang & Reiter 2008). These systems are effective in mitigating DoS threats at all application layers and can be readily interoperable with various legacy systems (Wang & Reiter 2008). These, however, are unique technological solutions to the existing security threats. Other authors offer less sophisticated but no less effective ideas of how to deal with security threats in financial transactions. According to Corzo et al. (2008), Automated Banking Certificates (ABC) can be readily used to timely identify unauthorised financial transactions. In the current system of electronic transactions, a financial transaction is considered authentic if it (a) is performed by an authorised entity; (b) has not been altered since the moment it was generated; and (c) is not a replay of another valid transaction (Corzo et al. 2008). Unfortunately, current banking systems can identify non-valid and fraudulent transactions only by means of audit after the transaction took place; as a result, there is an urgent need to develop a mechanism which will trace and identify fraudulent transactions before and while they are taking place (Corzo et al. 2008). An ABC is a data structure which allows monitoring the relationships between various transactions within one workflow (Corzo et al. 2008). A complete ABC allows tracing operations within workflows that go beyond the boundaries of one financial institution, as long as their tasks are related (Corzo et al. 008). The use of ABC’s in the current system of financial transactions proves that the task of identifying an unauthorised user is absolutely achievable. The use of network smart cards is another potential solution to the existing and emerging security threats. A network smart card â€Å"is a smart card that is an Internet node and is accessible from the Internet† (Lu & Ali 2006). The Smart Card stores user information and provides this information only to the trusted client or server, as soon as the user authorises the service or transaction (Lu & Ali 2006). Smart cards are beneficial in the sense that they can create and maintain secure Internet connections with another Internet node, a web server or a web browser (Lu & Ali 2006). As long as the smart card sends selected user information directly to the service provider, this information does not go through the local computer and the threats of identity theft or similar security breaches becomes minimal (Lu & Ali 2006). Unfortunately, the effectiveness of these developments is yet to be discovered. Meanwhile, companies continue using more traditional solutions to their security issues. The current research suggests that AdAware and Spybot are the most common tools used by businesses to deal with such threats (Keller 2005). Moreover, despite the availability of effective tools that cost little or nothing at all, many businesses recognise that they do not use any spyware at all (Keller 2005). As a result, businesses either lose significant material resources or fail to timely identify the emerging threats. The case is particularly difficult with the so-called insider threats, when security threats are being born from within the business entity. For example, in 2008, the FBI alleged that a former Intel employee copied top secret documents that posed a threat to the future of the whole company and its business projects (Patel 2009). The cases when bank workers become the basic sources of the security threats and the initiators of the complex financial frauds are not rare. As a result, the success of financial transactions, their security, and the technical safety of consumers depends on how well companies realise the seriousness of the security threats and whether they are prepared to deal with them. The current state of technology provides numerous solutions to the security issues in financial transactions, and businesses can secure themselves from the potential risks and failures by using the proposed technological Internet solutions at low or no cost. Conclusion The past years have been marked with the rapid increase in electronic financial transactions. The use of online and/ or remote mechanisms in financial operations has already become an essential element of the daily business routine. Financial transactions are associated with numerous security threats, including identity fraud, insider abuse, and the use of malware and denial-of-service attacks to access and steal personal user information. The current state of literature provides numerous solutions and ideas, which businesses could use to address the existing and emerging security threats. Smart cards, automated banking certificates, and the use of client puzzles are just some out of many ways to address security threats in financial transactions. Unfortunately, businesses often neglect the existing technological opportunities and do not deem it necessary to use effective protection from the real security threats. As a result, the effectiveness and safety of financial transactions largely depends on how well businesses realise the seriousness of the discussed threats and are prepared to invest additional material resources in the development of effective security strategies and solutions.

Saturday, September 28, 2019

Service Request - HR Systems PT.2 Essay Example | Topics and Well Written Essays - 750 words

Service Request - HR Systems PT.2 - Essay Example They can be a presentation done in the data flow diagrams, DFD and their processes. DFD's design allows increasing level of details with each level where they further divide into sub-process until they reach an indivisible sub process. Service Request system will cater for both the employee of the company and visitors who will be visiting the company website. The process design will have two components in which, one will have employee’s data and can only be accessible by the employees through security details. (Szalapaj, 2005) The second will be open to the visitors and the customer for a service request from the company and those gathering information about the company, its services and products but are not in a state of placing order now. The human resource department will be the general administrator of the system to assign the employee tasks of seeing through the customer request have been the fulfillment. This is the manager’s task who is also an employee of the co mpany. His responsibility includes managing the whole information system, talk with clients, and look into sales, the accounting. Architecture of this service request system application incorporates both server/client and internet/intranet technology. Professionals in Human resource department will access the system to HR on-line through the web-based service and client/server for human resource functions. By up grading of the HRSR application mostly provides pure internet architecture more stable environment for operation. Added advantage for this is allowing the client or service requester access the application without installing since it is on their web browser. The system should have the capability to merge HRM processes and activities with the information technology field. (Rosenblatt, 2011) This is where data programming process involves the system into standardized routines and packages of enterprise resource planning (ERP) software. ERP systems software has features of coll ecting information from different applications into one universal database. This is an added advantage since linkage of human resource modules through one database makes the system application both flexible and rigid. Highest level of security is a primary advantage of the upgrading of the application. Service request system should remain as a protected application that they afford to it. Introduction of registering or signing up for the accounts, for the purpose accessing system. The upgrading of the system should result to the collection of any new data and the third party would not be in a position to access any new services. The goal of the system should be to deliver service to the customer and the employee that is more efficient, faster and enhances the credibility of the system. Providing customer and employees, with a mechanism of viewing and updating their own personal information. The goal of service delivery leads to its attainment. The system security administrator will trace system changes to individual system users. Limiting access is a security measure where employees with computerized personnel records do not perform the same functions as their peers. This helps in audit trails and internal security (Accounting: smart Pros: Payroll and security: A Great combination.) The system architecture should have the capability to keep track of the employee information as personal informat

Friday, September 27, 2019

Management of change - How organisational structure and culture can Essay

Management of change - How organisational structure and culture can influence the promotion or inhibition of change strategies w - Essay Example As such, the only way to remain competitive is to be able to change strategies in a manner that ensures the company remains competitive. This is particularly important for the engineering organizations that operate in a very competitive environment. Despite the benefits that change brings in an organization, most managers and employees are often resistant to change. Martins and Terblanche (2003, p. 68) noted that most employees and managers fear change and will often resist it. The reasons for resisting change are many, including fear of losing jobs, fear of changing the organization structure, culture, and fear of new responsibilities, just to name but a few. However, the organizational structure and culture has a huge influence on the change strategies that an organization may adopt at any one time. In this regard, the organizational structure and culture can either promote or impede the change strategies within an organization. The aim of this discourse is to explore the extent to which an organizational structure and culture can promote or inhibit change strategies within an organization. Organizational Culture and Change Management Culture plays a crucial role in driving a company to success. Pheysey (1993, p. 9) defines organizational culture as a set of norms and beliefs of an organization. In other words, it refers an organization’s ways of doing things. As earlier stated, organizations operate in a dynamic environment where change is necessary. Today, no company can compete favorably without embracing change, according to West and Farr (1990, p. 5). However, most managers tend to resist change when faced with the pressure of change. This is partly due to the organizational culture. For instance, most managers would try to deal with challenges facing the organization they manage by reverting the company’s traditional ways of doing things. In this regard, whenever a manager is confronted with the pressure for change, the manager will most l ikely try to deal with the situation in suh as way that is in line with the organizations ways of doing things. However, sticking to these cultural nuances impede the management of strategic change. Kotter and Heskett (1992, p. 13) advised that sticking to cultural ways of dealing with pressures of change may not be good for an organization since it inhibits the management of strategic change in an organization. For example, instead of adopting a new strategy of dealing with a situation in an organization, most managers tend to search for what they can understand and manage in terms of the existing paradigm. The adoption of cultural ways of doing things has been reported in the engineering companies where most managers tend to stick to traditional ways of dealing with situations that require change. However, this is dangerous since it inhibits the management of strategic change (Dent and Goldberg 1999, p. 36). For instance, report indicates that when managers are faced with the prob lem of declining performance in the engineering organizations, they have the habit of first seeking ways of improving the implementation of the existing strategy. This may involves actions such as tightening organizational controls. This implies that they only attempt to tighten up their accepted way of operation. However, in case this proves ineffective, then the managers change a strategy, though the change

Thursday, September 26, 2019

Special Stain NoteBook Research Paper Example | Topics and Well Written Essays - 3500 words

Special Stain NoteBook - Research Paper Example Again, the tissue is rinsed in the stain with cold water and finally, dipped in ethanol fixate, then in xylene for forty-five seconds (Yakovlev, 2009). Procedure (Steps): Bouin’s solution, an inorganic oxide, is used in microwave for one minute and is allowed to stand for fifteen minutes. Subsequently, for five minutes, the stain is washed in tap water, followed by the application of one drop of hematoxylin and is allowed to stand for ten minutes. Correspondingly, it is again washed in tap water for five minutes and then rinse in distilled water. In the following step, the stain is dipped in biebrich scarlet solution for five minutes and then rinsed in distilled water. Then phosphomolybdic or phosphotungstic is applied with a resting time of ten minutes required to discard it. Sixth, then transferred to aniline blue solution, and is kept for five minutes. The stain is then rinsed in distilled water. Again one percent of acetic acid is applied on the specimen and rinsed in distilled water. Finally, it is dehydrated and cleared (Media Lab Incorporated, 2015). Procedure (Steps): At the initial step, sections of the tissue is deparaffinized and hydrated and then suspended in distilled water. In the second step, 250 ml of iron stain solution is added to the specimen and dipped for thirty minutes. Then the specimen needs to be washed for three times in distilled water. Again it needs to be stained with 250 ml nuclear fast red solution for five minutes and then rinsed in distilled water. In the third step, the specimen needs to be dehydrated through 95% of alcohol for two changes, followed by the final and the last process to clear it in xylene solution for three changes and for two times, before covering the slip by using permanent mounting medium (Biogenex, 2015). Procedure (Steps): First, deparaffinize sections of the liver and hydrate it to deionized water. Second, oxidize the liver section in 1% potassium

Wednesday, September 25, 2019

The Industrial Revolution from 1820 to 1870 Essay

The Industrial Revolution from 1820 to 1870 - Essay Example Whereas the first revolution played a role in the invention, development and implementation of spinning and weaving machines for the textile industry, which use water power until the introduction of steam power, it was the second revolution that really changed American economy and society into a modern industrialized state. The process had begun in the 19th century. Growth in the 19th century was fuelled by many factors: plentiful resources, innovative technology, cheap and efficient energy, swift transportation and labor and capital which were readily available (Wikipedia 2007). In the west, forests, mines and cattle supplied the raw materials for key industries. The rapid expansion of railroads allowed businesses to transport raw materials to and from factories and move products to the cities where the bigger markets lay. Around this time too, a continual flow of European and Asian immigrants arrived in America to seek work. Many found work in the factories and mines. Advancements in technology shaped and improved production with the invention of the assembly line in a number of industries. This along with new machine tool industries which produced cutting, drilling and milling machineries, hastened manufacturing and production. A series of breakthrough inventions and discoveries such as the phonograph, electric light, telephone, typewriter, automobile and others opened up new industries. Businesses changed with the times and the corporate heads discovered how to conduct business and broaden their economic activities to encompass wider geographic territories and eventually global ones. This permitted businesses to expand and today's mega corporations are founded on business organization with their own theories and practices. From 1870 to 1900 the United States became the most industrialized nation in the world. In numerous sectors such as steel and timber production, mining of coal, iron, silver and gold, meatpacking and other industries, the US emerged as a leader. In general, the nation saw a huge upsurge in the pace and scale of industrialization which had altered businesses, commerce, the environment, job opportunities and daily life. With the development of industries around major cities, people moved from farms and the countryside to the cities for work. But agriculture was not neglected as advancements were made with agricultural machines. The established political and legal systems which the US had inherited from the British model, encouraged entrepreneurship and rewarded innovation and initiative. The nation was socially more mobile than any other, and receptive to change. Three important developments in the mid 1850s spurred the Second Industrial revolution in America. One, was the transportation system was developed and expanded. Two, electrification was successful exploited and put to use. Three, major progress was made to the industrial system such as improving the refining process and hastening production. The government passed a protective tariff to protect American manufacturers. There was a great demand in the railways, not only for transportation of goods but also to make it more durable. This led to development and production of cheap mass produced steel which during the time saw its use in many aspect of industrial activity. After steel, the industrialization took on to include chemical and electrical industries, petroleum refining and distribution and eventually

Tuesday, September 24, 2019

National day in U.A.E Essay Example | Topics and Well Written Essays - 250 words

National day in U.A.E - Essay Example What is its significance for citizens? Facts about the UAE The UAE is a Middle Eastern federation of seven states situated in the southeast of the Arabian peninsula in the southwest Asia on the Arabian Gulf, bordering, Oman and Saudi Arabia, from tribally organized peninsula. The seven states of Emirates are Abu Dhabi, Dubai, Sharjah, Ajman, Umm – AlQwain, Ras AlKhaimah and Fujairah. Immense wealth has been invested in numerous development projects, capital improvements, social services throughout the UAE. It is one of the most developed federations in the world. Over 200 nationalities and cultures are represented here. Therefore professional Arabic translation and interpretation services play a major role. The UAE’s History Near the end of the nineteenth century, the UK and the Trucial sheikdoms established close bonds in 1892 treaty. One of these bonds is that British promised to protect the Trucial Coast from all aggression by sea and to help in case of land attack. After the First World War, Japan invented the cultured pearl. Their invention destroyed our â€Å"Natural Pearlsâ€Å" that means they became worthless. This affected our economy and business. In the early 1960s, oil was discovered in Abu Dhabi. As a result, Sheikh Zayed undertook a massive construction program, building schools, housing, hospitals and roads.

Monday, September 23, 2019

The Challenge of Seeking a Career with an International Component Assignment

The Challenge of Seeking a Career with an International Component - Assignment Example This, therefore, creates challenges in managing the two and people seeking a career with an international component but must also be managed as their cultural background are obliged to find a way of balancing the two. Learning teamwork is the most fundamental way to work in such a context. Teamwork enables people with different backgrounds, skills, and expertise to come together and work collaboratively to achieve the set ends. With this in mind, one should learn to work with others by creating an attitude that makes them easy to relate and work with. It is critical to understand that people will have a different opinion and in a team, conflict is meant to arise on certain issues where people do not agree on something and the best thing to do is to learn to compromise on issues that may cause disagreements. Learning to live with people despite differences that may arise enables one to be in a demanding environment like the global workplace as it eliminates chances of disputes, which may hamper collaboration. In the global workplace, companies are now providing an environment of allowing people to be their own individuals despite being required to maintain the international context. This means that the companies will provide an environment that allows for collaboration and teamwork where people will learn from each other and understand one another (Martin 28). The companies also engage employees in constant training and one should ensure that they are adequately trained to conquer all the challenges that they may encounter while on the job. Training will enable one to be aware of how they will deal with people from different backgrounds and gives them a common way to ensure that they follow the guidelines of international labour laws. In order to manage a career with international component but must be managed as one's cultural background, it is necessary to ensure that one is well versed in the company’s values.     

Sunday, September 22, 2019

Message to Garcia Synopsis Essay Example for Free

Message to Garcia Synopsis Essay The message to Garcia describes the average human mindset, action and reactions toward a given task. Many men and women from past to present want work, status, money and reputation; but feel work is not needed. It describes not all but many situations pertaining to people having lack of initiative. In this book Elbert Hubbard states people on average will ask one or many question about the task being given to them. How I do it, where can I find it, who can I get to help, what time does it have to be done; are all examples. People get lazy and complacent, instead of getting some initiative and finding out the answers to their questions themselves. Message to Garcia isn’t saying every task has to be accomplished but, rather ideations of how problems could be solved through statistics and opinions. Many situations Hubbard has explained have facts about men and woman in today’s society. How many times have we heard â€Å"Go take this to†¦Ã¢â‚¬  and the person being tasked asks multiple questions about the task the he himself could very well find. By asking questions the employer or task giver is being held up from completing other tasks he has been issued, to explain to this person where, when, why, how. In a lot of cases today, by the time we have completed explaining the task; we ourselves could’ve completed it. By no means is Hubbard expressing to us readers we shouldn’t task out our subordinates but do our jobs as well. On the other hand he is also elaborating on his belief no matter the details, many or few, the task should be done when given to. I feel Message to Garcia was trying to get a point across to us readers; that many of us desire great things but, in order to achieve great things we must do great works. We cannot want and not give anything; little effort will bring little fortune. I don’t believe the book is trying to tell us how we should go about our business day to day, yet allowing us to ponder ideas on how to eradicate these issues. Make pragmatic decisions during tasks given rather than giving up early or not doing it at all. By giving our undivided attention to our job, and not stopping until it is complete or no other outcome is possible to accomplish it. I believe everybody plays a role in a job; it is everyone’s duty to do their part and not pass it to another person or not complete it. When we all do our jobs an elliptical motion continues, rolling smoothly.

Saturday, September 21, 2019

African American Religion Essay Example for Free

African American Religion Essay Before Africans were brought to America during the slave trade, they had their own culture and society. They had their own language and dance. They also had their own religion. History tells us that the Europeans justified their abuse toward the Africans as helping them become more civilized because the Africans lifestyle appeared primal to them and not as developed and industrialized as theirs. What is often overlooked is that even though Africans were taken from Africa and Americanized and have been stripped of their religion, culture, language and even their name, the very essence of the African as a people did not go away. Some African American slaves rejected Christianity’s religion because they saw it as the â€Å"white man’s religion†. History tells us American Slave Masters abused the Africans by whipping them like animals and by treating them inhumane. The fact that these slave masters wanted the African American to worship their god was unacceptable for some because they could not fathom why they should worship a god who allowed people to be so badly treated. Some Africans accepted Christianity’s religion and faith by identifying with Jesus Christ, the son of God who according to the Bible was innocent of sin and yet he was beaten, bruised and crucified for the sins of the world. Some African Americans wanted to remain faithful to their heritage yet did not agree with the conjure practices. Seth Holly’s character is a good example of conforming to the economic prosperity of America which was founded by Christians. White Christians enforced Christian beliefs, values, and some practices based on the Euro American Christian interpretation of Christian text. Seth developed a kind of hatred for his own people proving that he has adopted the practices of white America in the early 1900s. â€Å"Niggers coming up here from that old backwoods†¦ coming up here from the country carrying Bibles and guitars looking for freedom. † Seth says. â€Å"They got a rude awakening† (6). Seth signifies the African American who resents assimilation to the white American culture. But, at the same time, he too attempts to connect with his heritage by simply allowing Bynum to live in his home and bless it with his conjures rituals. Seth also participates in an African dance ritual called the Juba. Bynum’s character is introduced by practicing conjure rituals. He cuts open pigeons and spreads its blood onto him as a type of cleansing to communicate with spirits. Bynum represents the African American who chose to remain faithful to the religion of his heritage. Others who have chosen the faith of Christianity view conjure rituals as evil, witchcraft, or demonic. Some African Americans wanted to remain faithful to their heritage yet did not agree with conjure practices anymore. Loomis walks in on the juba dance and goes into a trance after dinner at the boarding house. He had a vision of skeletons emerge from a body of water. â€Å"Loomis: I done seen bones rise up out the water. Rise up and walk across the water. Bones walking on top of the water† (53). Loomis recognizes through the vision, his state of ignorance to the knowledge that will lead him to the new way of thinking. Bynum serves as a supporting character reacting to Loomis’s trance. â€Å"Bynum: They walking around here now. Mens. Just like you and me. Come right up out the water† (56). Loomis’s trance and Bynum’s interpretation of it is a turning point in the story. The skeletons coming from the bottom of the sea in Loomis’s vision represent the slave ships, the disorientation experienced by the slaves during emancipation, and the confusion of his release from Joe Turner. Both Loomis and Bynum have tapped into their ancestral religion. The difference between the two is that Bynum represents the African who never renounced his religion and Loomis is the African-American who turned from conjure religion and converted to the faith of Christianity. After Joe turner took his life away from him, Loomis questioned his Christian faith and his identity. By walking in on the ancestral ritual of the Juba dance, Loomis literally walked into what he had actually been looking for, his religion, consequently, his ancestral identity and this is why he fell into the trance. Throughout the play conjures is encompasses four generations; Bynum’s father, Bynum, Loomis, and the neighbor boy Reuben. Reuben’s vision is of Seth’s mother by the pigeon coop, she encourages Reuben to release the caged pigeons. Wilson writes in a way that leads the reader to believe that Loomis needs to find his missing wife. Martha Pentecost is not the one who was lost; Loomis was the one who was lost, wondering around from town to town, searching. Loomis came into the state of belief when Bynum helped him translate his vision. That vision represented Loomis going back to his ancestral conjure religion. Loomis needed to find Martha Pentecost simply to say good-bye to her and their life former together. Up until this point of the story, I believed that Loomis needed to find his wife so they could live out the rest of their lives as a happy free family with their daughter. However, it is made pretty obvious this was never Loomis’s intentions. â€Å"That goodbye kept me out on the road searching,† Loomis says, â€Å"now that I see your face I can say my goodbye and make my own world† (90). Martha Pentecost, a woman of Christian faith, represents the African who assimilated into white America’s culture and Loomis needed to find her to say good-bye to her and the Christian faith. Martha stands by her Christian faith by accusing Loomis â€Å"you done gone over to the devil† (91). White man’s religion believed that conjure was evil or the way of the devil. Loomis finds it easier to reject her for her Christian beliefs. â€Å"Loomis: Great big old white man†¦your Mr. Jesus Christ. Standing there with a whip in one hand and a tote board in another, them niggers swimming in a sea of cotton† (92). Loomis proves with his statement, his version of a bible story that differed from other African Americans but was similar to that of the white man who believed that they were on a level below God and the African’s were beneath them, African’s were one third of a person. Loomis now believes that if African’s are going to be free then they have to take charge of their own destiny. Martha Pentecost represents the African American’s religion, she identifies that Loomis needs to â€Å"be washed in the blood of the lamb† (92) and â€Å"you done gone over to the devil. (91) Through class lessons I learned that African American slaves compared themselves with stories in the bible to instill hope of a life free from oppression, violence, and bondage. Jesus according to the bible was innocent of sin and yet he was beaten, bruised and crucified for the sins of the world. The hope of reigning in heave with Jesus is considered the ultimate reward for suffering life’s trials and tribulations. It is the faith of the African Americans who accepted Christianity religion. Blacks trusted in the Lord instead of man. America was Egypt in the exodus story and as long as the enslaving and oppressing took place America would face the same wrath as Egypt. â€Å"Stand still and see the salvation of the Lord. † The bible was depended on in justifying and motivation rebellion for the blacks and used as a tool to keep blacks enslaved by the whites. African Americans used sermons, song, and prayer to convey and teach their message of travail and triumph of Israel. Some African Americans could not get past the treatment from the white people that called themselves Christians and as a result they rejected Christianity. Selig’s role suggests that the link between characters is the acquisition of material goods. Selig admits that his ancestors have always made their living pursuing African Americas; his great grandfather transported slaves from Africa, his father captured runaway slaves and returned them to their masters for a reward, and Selig locates displaced people for a fee. Selig attains his ecstasy through consumer capitalism, through the selling of material goods. African Americans are objects for exploitation and exchange in the new economy. He binds African Americans to the economic system, demanding payment of his services and products which necessitates subsistence labor by taking them from one construction site or work site to another, similar to a temporary employment agency today. You pay for an employee to work for some time, but Selig is getting paid by the person looking for work or a ride to a chance of freedom. Selig cannot find a person that has not purchased a dustpan from him because he keeps the names of his customers. Seth is determined to achieve material success, he has very little patience for African Americans migrating north looking for the same prosperity that he desires. Seth is very demanding of his patrons, insisting on advance payment in full, and is preoccupied with maintaining a respectable house. â€Å"It’s hard enough now without all that ignorant kind of acting. Ever since slavery got over with there ain’t been nothing but foolish-acting niggers. Word get out they need men to work in the mill and put in these roads†¦ and niggers drop everything and head north looking for freedom. †(5, 6) Seth wants to blend in with the white man’s world; therefore he keeps a link with Selig by negotiating the manufacturing and sale of dustpans. Seth does not have any idea of what it would be like to be a slave, as he was born free in the North and was educated. He demonstrates his education with his math calculation when dealing with the boarding house patrons and the quick notation of him letting Selig know that he is trying to overcharge him for the dust pan materials. Educational differences played a role in tension with Southern blacks, most of who were forbidden from learning to read, saw religion as a matter of oral tradition and immediate experience and emotion. Northerner blacks, stressed that one could not truly be Christian unless they was able to read the Bible and understand it. This play denies individual worth and identity for some of Wilson’s characters. To be defrauded of the products of one’s labor or to see that creation diminished, like with Jeremy and the guitar contest, is to be denied a reflection of individual worth and identity. If people have been separated from this truth of individual worth and identity through oppression their capacity to bond with one another, form friendships, or couples, families are undermined. Social alienation in Wilson’s characters are expressed in their stores of broken relationships, uncertainty, or suspicion that they feel toward one another. â€Å"Seth: Something ain’t setting right with that fellow, Bynum. He’s one of them mean-looking niggers look like he done killed somebody gambling over a quarter. †(20) Connection between oppression, alienation from self and inability to form bonds with others is displayed in the character of Loomis. Joe Turner’s ability to oppress Loomis carried a judgment of non-worth. â€Å"Loomis: He told me I was worthless. Worthless is something you throw away. Something you don’t bother with† (73) Turners judgment of worthlessness forced Loomis to accept the reality of the white man’s power; he was marked as â€Å"one of Joe Turners niggers and forced to forget his song. †(71) Being alienated from himself and displaced with his relation to the world, Loomis is unable to establish bonds with people around him. The oppression encountered by Wilson’s characters is material or economic, that oppression is spiritual as well in the capacity to deprive the individual of a sense of himself or his unique song. The reawakening of Loomis after his encounter with cultural wisdom is not the self discovery of an average African American but creation of a new source of cultural wisdom, a new African holy man. Wilson uses many metaphors throughout the play. The song is a metaphor for Loomis’s identity and the African American cultural identity. Music is a large part of African American identity, so it makes since that in search of one’s identity they are searching for their song. The boarding house serves as an inn for traveling folk, but the tenants actually receive a form of healing during their stay. Tenants get direction and guidance from Bertha and Bynum. The shiny man that Bynum is in search for signifies African American independence. The man that Bynum met on the road was an independent African American, just as Loomis was freed by his past when he cleansed himself in his own blood. â€Å"Bynum: Herald Loomis, you shining! You shining like new money! †(94) Loomis has dismissed that the blood of Christ can wash away his sins and make him the man he used to be, but by washing himself in his own blood he has sacrificed the old life to begin his new journey on his terms. Bynum’s shining man has been found, meaning his work is complete; he has passed his powers on to the next generation, Loomis. â€Å"They tell me Joe Turner’s come and Gone† is a song that is sung by Bynum, when I first read the story I thought that the meaning was came and now he is dead however, the second time I read the play I realized that it meant that Joe Turner has come and snatched the men and now he is now gone. August Wilson uses symbolism in the play as a very important part in conveying the meaning of the story. Wilsons use of symbolism is demonstrated through Mr. Wilsons use of the road, Martha Pentecost, and Herald Loomis. Symbolic importance is give to the word freedom. The word freedom has instilled hope into the lives of African Americans: during slavery, hope for the release from bondage; after emancipation, the right to be educated, employed, and to move about freely; twentieth century, social, political, and economic justice. Freedom has always stood for the absence of any restraint, because God made all men from his image. There are a number of characters that travel around searching for their place in the world. Mattie, mentions that she keeps on looking, seems like she just keeps starting over, I ain’t never found no place for me to fit. † (76) Reuben tells Zonia, when he finds out that she is leaving the boarding house in search of her mom, â€Å"when I get grown, I come looking for you. †(84) Jeremy does not seem to care much when he loses his job because, â€Å"don’t make me no difference. There’s a big road out there, I can always get my guitar and find me a place to stay. I ain’t planning on staying in one place for too long noway. † (64) Martha Reverend Tolliver moved the Church up north because of the trouble the church was having. When the Civil War finally brought freedom to previously enslaved African Americans, the task of organizing religious communities was only one element of the larger need to create new lives, to reunite families, to find jobs, and to figure out what it would mean to live in the United States as citizens rather than property. August Wilson’s play, Joe Turner’s come and Gone, examines African Americans search for their cultural identity following slavery. Bibliography Murphy, L. G. (2000). Down By the Riverside. New York: New Yourk University Press. Wilson, A. (1988). Joe Turner Come and Gone. New York: Penguin Group.

Friday, September 20, 2019

Alaska Airlines Flight Human Factors

Alaska Airlines Flight Human Factors The term human factors can be defined as anything to do with humans. In aviation maintenance human conditions like stress, illness, complacency are important because if these factors are not taken care of can lead to fatal accidents. Human factors in aviation industry have become more significant as over the time it has been realized that in most airborne accidents, human error is the main reason rather than mechanical failure. Human Factors are too broad a definition for our understanding of its application in aircraft maintenance. It focuses on a wide range of challenges faced by any human in his/her day to day personal or professional life and when combined how they can lead to human errors and ultimately to a fatal accident. This report is the case study of one such incident, Alaska Airlines Flight 261, a McDonnell Douglas MD 83, which crashed into Pacific Ocean near Anacapa Island, California killing all 88 people on board. The National Transportation Safety Board (NTSB) determines that the probable cause of this accident was a loss of airplane pitch control resulting from the in-flight failure of the horizontal stabilizer trim system jackscrew assemblys acme nut threads. The thread failure was caused by excessive wear resulting from Alaska Airlines insufficient lubrication of the jackscrew assembly (NTSB (2003). Loss of Control and Impact with Pacific Ocean Alaska Airlines Flight 261. WASHINDTON, DC: NTSB. 180.) After going through the accident and studying all the possible causes of this fatal accident it has been observed that it was the chain of events that led to one error after the other. The Cheese Error Model is used for analysis to explain the causes. C:UsersYashikaDesktopswisscheese2.gif Fig 1 (http://www.aviation.unsw.edu.au/about/articles/swisscheese.html) SYNOPSIS According to NTSB report 2003, on January 31, 2000, about 1621 Pacific standard time, Alaska Airlines flight 261, a McDonnell Douglas MD-83, N963AS, crashed into the Pacific Ocean about 2.7 miles north of Anacapa Island, California. The 2 pilots, 3 cabin crewmembers, and 83 passengers on board were killed, and the airplane was destroyed by impact forces. Flight 261 was operating as a scheduled international passenger flight under the provisions of 14 Code of Federal Regulations Part 121 from Lic Gustavo Diaz Ordaz International Airport, Puerto Vallarta, Mexico, to Seattle-Tacoma International Airport, Seattle, Washington, with an intermediate stop planned at San Francisco International Airport, San Francisco, California. Visual meteorological conditions prevailed for the flight, which operated on an instrument flight rules flight plan. (NTSB. (2003). HISTORY OF FLIGHT. In: NTSB Loss of Control and Impact with Pacific Ocean, Alaska Airlines Flight 261. WASHINDTON, DC: NTSB. 1.) PROBABLE CAUSE The National Transportation Safety Board carried out an intense investigation to find out what brought the flight 261 down and founded many reasons responsible for this accident. The NTSB report considered the main reason as the loss of airplane pitch control due to the in-flight failure of the horizontal stabilizer trim system jackscrew assemblys acme nut threads. The thread failed because of excessive wear resulting from Alaska Airlines insufficient lubrication of the jackscrew assembly. NTSB reports also mentions about the design flaw of McDonnell Douglas MD-80 as it didnt have fail safe mechanism to prevent the disastrous effects of failure of acme nut threads. AEROPLANE INFORMATION The McDonnell Douglas MD-83 is low wing, twin engine commercial aircraft. The horizontal stabilizer is mounted on top of the 18-foot-high vertical stabilizer in a T-tail configuration and controls the pitch movement of an aircraft. The horizontal stabilizer is about 40 feet long and its movement is provided by the jackscrew assembly, which consists of an acme screw and nut, a torque tube inside the acme screw, two gearboxes, motors an alternate and a primary trim motor, and associated components. C:UsersYashikaDesktopAlaska 261 1.gif Fig 2 http://www.tailstrike.com/310100.htm The movement of horizontal stabilizer is controlled either by autopilot automatically when engaged or manually by the pilots by de-pressing either set of dual trim switches (located on each control wheel), moving the dual longitudinal trim handles on the center control pedestal, or moving the dual alternate trim control switches on the center pedestal. Through these controls one of the two electric motors that rotate the acme screw by applying torque to the titanium torque tube that is held fixed inside the acme screw gets activated. When autopilot senses that the horizontal stabilizer has reached the desired pitch trim condition or when pilot commands are terminated, or when the horizontal stabilizer reaches its maximum travel limits the motor is de-energized. The MD-80 horizontal stabilizers design limits are 12.2 ° leading edge down, which results in airplane-nose-up trim, and 2.1 ° leading edge up, which results in airplane-nose-down trim. In Alaska flight 261, horizontal sta bilizers went beyond its design limit plunging the aircraft nose and rolling the plane to 360 °. ANALYSIS AND EVALUATION The captain and first officer of Alaska Flight 261 were highly qualified and experienced pilots of Alaska Airlines. There were no medical problems or any other drug abuse that could have affected the performance of either pilot. The Alaska Airlines Flight 261 was dispatched in accordance with Federal Aviation Administration (FAA) regulations and approved procedures by Alaska Airlines. Prior to take off and during the initial phase of the flight, the longitudinal trim control system was functioning normally and did not record any problems but as they reached 23,400 feet pilots realized the horizontal stabilizer on tail plane was not moving and they immediately carried out a standard checklist to try and free the stabilizer. They tried to troubleshoot the problem by repeatedly trying the two switches that operate the stabilizer. The primary motor is activated by both the switch on the control stick known as pickle switch and a longitudinal sliding handle on the pedestal but both the sy stems were inoperative so they decided to disengage the autopilot and fly the plane themselves. The jammed stabilizer was pushing the nose of aircraft towards the ground therefore it was taking lot of physical strength for the pilots to keep the plane at level altitude. Meanwhile they contacted ground maintenance to seek advice or if there is any hidden switch or system they are not aware of but dint get any considerable help. As they were approaching to the destination the problems got worst. For one more time pilots tried to free the jammed stabilizer by turning on both alternate and primary motors at same time. The plane plunged downwards for over a minute. Pilots tried to level the plane and they did with lot of efforts. They slowed the plane and informed Air Traffic Controller at Los Angeles and made a decision for emergency landing at Los Angeles. They tried to contact the ground maintenance again but they did not appreciate the significance of the situation and pilots had no appreciable advice from them. They slowed down the plane and headed towards Los Angeles when suddenly the jackscrew holding the horizontal stabilizer broke moving the stabilizer way beyond its aerodynamic limits. The aircraft plunged rapid losing altitude. It rolled 360 degrees and ultimately crashed into Pacific Ocean killing 5 crew members and 83 passengers onboard. After going through all the incident and report of NTSB, it is clear that it was not just the mechanical failure of jackscrew assembly but it was a sequence of events that ultimately led to failure of acme nut threads which was paid off by the lives of 88 innocent people on board. Number of factors contributed to the crash of flight 261. The summative economical and organizational pressure led Alaska Airlines to increase the lubrication interval of jackscrew assembly and FAA oversight to those extensions and use of unapproved tools and measures. Along with these the maintenance staff falsified the records of work done when actually the work wasnt done. This evaluation involves the use of Swiss Cheese Model to explain the chain of events like design flaw, inadequate maintenance, extended lubrication and end play check intervals and deficient maintenance procedures of Alaska Airlines that led the tragic end of Alaska airlines flight 261. The design of McDonnell Douglas MD-80 had major design flaw to it. The horizontal stabilizer jackscrew assembly did not have the fail safe mechanism to prevent the disastrous effects of failure of acme nut thread. The Federal Aviation Administration (FAA) certification procedures for DC-9 did not sufficiently considered the consequences of excessive wear in context to horizontal stabilizer jackscrew assembly. Designers of the system presumed that at least one set of the jackscrew assemblys acme screw and nut threads would always be sound and engaged to act as a load path. Therefore, the consequences of stripped acme nut threads and the corresponding effect on the airplane (including the possibility of the acme screw disengaging from the acme nut) were not considered in the design of the horizontal stabilizer trim system. After the accident the investigators recovered the wreckage from 700 feet underneath the sea. The horizontal stabilizer jackscrew assembly were found intact and attached to the horizontal stabilizers front spar. The acme screw was found cracked but attached to the support assembly. Metallic filaments were found wrapped around the central part of the acme screw. Fig 3 http://www.aero-news.net/index.cfm?do=main.textpostid=a406ede6-772f-4c84-a95f-410a0744a8ca The probable cause of this was the inadequate maintenance procedures of Alaska Airlines. In aviation industry there is enormous pressure to maintain, rectify and deliver the plane on scheduled time to prevent the delay in departure of flight. The economic turn down in early 1990s had hit the company badly and they started to fly their fleets more intensively thereby sharply increasing the planes average daily use and thus altering the maintenance intervals. The initial C-check interval of Alaska Airline was 2,500 flight hours. The recommended C-check interval according to MRB (Maintenance Review Board) report was either 3,500 flight hours or 15 months, whichever came first. In 1988, Alaska airlines extended its C-check intervals to every 13 months (which was about 3,200 flight hours, based on the average airplane utilization rate at Alaska Airlines at the time). In 1996, again the C-check interval was extended to 15 months (which was about 4,775 flight hours, based on the average air plane utilization rate at Alaska Airlines at the time). The task of lubrication of jackscrew assembly was to be accomplished in every B-check intervals which was increased to 500 hours in 1987 from 350 hours in 1985. However in 1988, Alaska Airlines removed B-checks and the entire tasks of B checks were conjoint with A-checks and C-checks. Lubrication of jackscrew assembly was due at every eighth A-check or every 12,000 hours of flight but in July 1966 the task of jackscrew assembly lubrication was removed from A-check and was placed on a time-controlled task card with time interval of 8 months. At that time there was no accompanying flight-hour limit and thus based on airplane utilization rates at that time, 8 months was about 2,550 flight hours. Also the investigators found widespread deficiencies within the Alaska Airlines maintenance procedures. Two years before, during the crashed airliners last overhaul one of the lead mechanic at airlines Oakland maintenance facility had ordered the jackscrew for this particular aircraft. He then went off shift and his recommendation was over ruled by the next shift personnel and the plane was put back to service. It would be 2 years for the next due overhaul but the time ran out and flight 261 faced the fatal consequences. Fig 3 http://www.ntsb.gov/doclib/reports/2002/AAR0201.pdf Along with extended intervals Alaska Airlines changed the lubrication grease from Mobilgrease 28 to Aeroshell 33 even after McDonnell Douglas didnt approve it completely. Alaska Airlines notified FAA about this change but FAA dint reply to this change until the flight 261 accident after which it disapproved the use of grease Aeroshell 33. Not only this, the maintenance personnel at Alaska Airlines were not trained properly for the lubrication task. It was evident when in interview with the mechanic responsible to carry out the lubrication task stated that the lubrication task took about 1 hour, whilst Boeing documents and testimony said that, when properly done, the task should take more than 4 person hours. INCOMPLETE: small access panel (include in design flaw), important senior managers positions vacant for 2 years, missing records. à ¢Ã¢â€š ¬Ã‚ ¦..Page no 171 of NTSB report. FAA oversight CONCLUSION Following can be concluded from the above analysis: The flight crew on Alaska flight 261 was fully qualified and had received sufficient training as per the federal regulations. Both the pilots did not have any preexisting medical conditions that could jeopardize with flights safety. The flight 261 was dispatched in accordance with the FAAs regulations and Alaska airlines procedures. The weight and balance of the plane was within the limit. Weather was not the factor for the accident and there was no evidence of fire or bird impact or any other foreign object damage. Both the engines were functioning normal during the flight. Air traffic control personnel was properly certified and qualified for the respective jobs. The horizontal stabilizer was functioning normally during the initial phase of flight but jammed at 23,400 feet. Neither the pilots nor the ground maintenance staff could understand the reason for this jam. The worn threads inside the horizontal stabilizer acme nut were incrementally sheared off by the acme screw and were completely sheared off during the accident flight. As the airplane passed through 23,400 feet, the acme screw and nut jammed, preventing further movement of the horizontal stabilizer until the initial dive. As there was no checklist present to land as soon as possible and the circumstances confronting the flight crew, their decision not to return to Lic Gustavo Diaz Ordaz International Airport, Puerto Vallarta, Mexico, immediately after recognizing the horizontal stabilizer trim system malfunction was understandable. The flight crews use of the autopilot while the horizontal stabilizer was jammed was not appropriate. The flight crews decision to divert the flight to Los Angeles International Airport, Los Angeles, California, rather than continue to San Francisco International Airport, San Francisco, California, as originally planned was apposite. Alaska Airlines dispatch personnel appear to have attempted to influence the flight crew to continue to San Francisco International Airport, San Francisco, California instead of diverting to Los Angeles International Airport, Los Angeles, California. There was no effective lubrication on the acme screw and nut interface at the time of the Alaska Airlines flight 261 accident.

Thursday, September 19, 2019

Celebrities and their Tibet Essay -- Expository Tibet Essays

Celebrities and their Tibet Tibet has long been a mystical land, a place that not many have known about. However this has changed. The celebrities have come out in force in making Tibet the center of attention. Even now, most people don't know more about Tibet than its location, somewhere in Asia. So, while the popular support of the struggle of the Tibetans has become well known due to the involvement of celebrities spreading the word, has it really helped the cause or simply let people know what is going on there? Even more importantly, is the information that the celebrities are passing on always correct? Before any of these questions can be answered though, one must first know the origin of the conflicts between the two regions as well as the history of the Free Tibetan Movement. As said above, Tibet used to be a place that not many people knew about. This made it much easier for the Chinese government to come in and take control of the people and the land without much protest from the outside world. In fact even if other countries, like bordering India, had known, not much would have been done. This is because no nation had ever recognized Tibet as an independent country. Rather, it was the events that followed which caused the uproar. According to defected citizens of Tibet that traveled to India and then dispersed throughout the world, the Chinese started a form of spiritual cleansing. Monks and spiritual leaders that would not follow their ground rules were detained, captured or killed. The lama's of the Tibetan people were either taken as political prisoners or exiled. However, there are also those that said that some of this never happened. "'The first troops had appeared in the city in September, 1951.' The ... ...Collins. 1969. Connolly, Paul. "Tale of Two Cities." The Times. Newspaper Source. 2/23/2002 Dolker, Sonam. "So Far from Home." Time for Kids. Issue 11(1997): page 4. 3/27/02. Ewing, Alice. "How The Tibet Movement Can Backfire on America." --- Chinese American Forum. Issue 2(2001): page 22. 3/28/02. Free Tibet Campaign. 3/31/02. http://www.freetibet.org/menu.htm. Fricke, David. "Lama-palooza." Rolling Stone. Issue 774(1997): page 105. 3/28/02. Kim, Albert. "Lookin' Tibet." Entertainment Weekly. Issue 416(1998): page 15. 3/28/02 McQueen, Dane. "Discos or the Dalai Lama: what does Tibet want?" YPA. 3/31/02. --- http://www.ypa.org/issues/previous/tibet.html. Snellgrove, David, and Hugh Richardson. A Cultural History of Tibet. New York: --- Praeger. 1968. Trebay, Guy. "And Then Tibet." Village Voice. Issue 3(1998): page 26. 3/27/02.

Wednesday, September 18, 2019

A True Hero Essay -- Definition Hero Heroes Essays Role Model

A True Hero As I read David Halberstam’s ideas in his essay, â€Å"Who We Are† (2004), I started thinking about our nation’s leaders and heroes. September 11th came to my mind and the many firefighters and rescue workers who heroically risked their lives to save complete strangers. Then, I remembered that the media dubbed Jessica Lynch a hero when she came back to the United States. Not only Jessica, but also many other American soldiers fighting abroad are called heroes. I started wondering if their bravery actually makes them true heroes or not. I asked myself, what is a hero? Do people need heroes? Where does the belief that we need heroes come from? This belief has caused us to over apply our use of the word to almost everyone: leaders, firefighters, and even sports figures. Sometimes, those who we title heroes are merely good people in the right place at the right time or are simply doing their jobs. Essentially, we shouldn’t need â€Å"heroes.† Instead, we should seek role models and acknowledge the everyday worker. However, the ultimate search for a hero should be within us. We all have the capacity to embrace our inner strength in order to lead our lives with courage and nobility. I. Archaic Definitions In a US News & World Report special online issue about heroes, Clark (2001) gives several definitions of a hero: [heroes] go above and beyond the call of duty, they champion a good cause, and (my favorite) they serve as a calling to our higher selves. In an online â€Å"Answers† dictionary, hero is defined as â€Å"a person noted for feats of courage or nobility of purpose, especially one who has risked or sacrificed his or her life† (2005). There is a song sung by Bonnie Tyler called â€Å"Holding Out for a Hero† in which a line is: â€Å"I n... ..., from http://www.yourdictionary.com/library/changed.html. Jordan, R. (1989). The quiet hero. Washington D.C.: The Catholic University of America Press. Ruotolo, L. (1973). Six existential heroes: the politics of faith. Cambridge, MA: Harvard University Press. Singh, Manjari-Lu, & Yu, Mei. (2003). Exploring the function of heroes and heroines in children's literature from around the world. Retrieved Dec. 04, 2005, from http://www.ericdigests.org/2004-1/heroes.htm. Steinman, J. (2005). Bonnie tyler. Retrieved Dec. 11, 2005, from http://www.lyricscafe.com/t/tyler_bonnie/holding_out_for_a_hero.html. Think Exist Quotations, (2005). Quotes. Retrieved Dec. 06, 2005, from http://en.thinkexist.com/quotes/with/keyword/martyrs/. Warner, J. (2004). Do we need another sports hero?. Retrieved Dec. 04, 2005, from http://www.webmd.com/content/article/93/102060.htm.