Saturday, November 30, 2019

The Virtual Reality Gaming Industry to Generate Bi Essays

The Virtual Reality Gaming Industry to Generate Billions in years to come. Video games are the core of most V.R hardware found on the market according to a recent survey carried out. Game developers will also have a global audience of 55.8 million virtual reality users and produce 38.9 million virtual reality devices this year, according to the report. Consumers will spend $5.1 billion on virtual reality gaming hardware, accessories and software in 2016. That's up from the $660 million spent in 2015, says the marketing leader. Meanwhile, the global market is expected to grow to $8.9 billion in 2017 and $12.3 billion in 2018. A breakdown of this year's $5.1 billion global market shows Europe in the lead with a $1.9 billion share and North America close behind with $1.6 billion. That's followed by Asia with $1.1 billion, and the rest of the world accounting for $0.6 billion. SIGN UP: Get Data Sheet, Fortune's daily newsletter about the business of technology. According to SuperData director of research Stephanie Llamas, light mobile virtual reality devices (like Google (GOOGL) Cardboard) will drive the market at first with an audience of 27.1 million. Premium mobile virtual reality hardware, like Samsung Gear VR, will account for 2.5 million units sold in 2016. However, PC virtual reality devices (like Facebook's Oculus Rift and the HTC Vive) will only sell 6.6 million headsets, with Sony's PlayStation VR selling 1.9 million units. Breaking down the global virtual reality market, Llamas says Asia's 2.5 billion smartphone users lead the mobile virtual reality market, with hardware like Google Cardboard accounting for almost 80% of new devices installed. "Western markets with large PC and console user bases will ignite device sales for the two platforms," Llamas says. "American gamers interested in VR look most forward to console and PC devices. One-third intend to purchase a Playstation VR and 13% look to buy the Oculus Rift." Who's Willing to Pay to Play While Facebook is expected to announce its Oculus Rift pricing at CES, HTC is holding off on pricing for the HTC Vive. Additionally, Sony isn't expected to announce a PlayStation VR price until later this year, possibly at the March Game Developers Conference in San Francisco. Looking at the consumer market in more detail, Llamas says that younger consumer groups show a stronger interest in virtual reality. According to the company's recent survey, 74% of U.S. respondents under 18 years of age indicated that they were "very interested" in virtual reality. For Millennials that number dropped to 65% and 54% for Gen Xers in contrast to only 42% for Baby Boomers.

Tuesday, November 26, 2019

Example of Graduate School Admission Essay †Experiencing Culture Shock

Example of Graduate School Admission Essay – Experiencing Culture Shock Free Online Research Papers Have you ever experienced culture shock? What did it mean to you? (250 words approx.) Even though I had been to the United States before, to move there presented me with a big challenge to adapt to a completely new environment. During the first few weeks, I was thrilled, pleased by all of the new things I encountered. Mostly everything I came across was new and exciting, such as the tennis academy, the car, the house, the opportunity to learn another language, to expand my horizons in a foreign country. However, little by little I came to realize that I was the foreigner. Mainly, I started to be frustrated because of the language barrier. As a result, I became unsocial which did not allow me to make new friends. In addition, attending classes made me feel incompetent since I only understood partially what was being taught. Besides, reading Mark Twainà ¢Ã¢â€š ¬Ã¢â€ž ¢s The adventures of Huckleberry Finn as a first assignment did not help much. Curiously enough, Calculus was the subject I understood most of what was being said given that I had the numbers as a reference. Fortunately, I was playing tennis and determined to become a professional player so my drive kept me going. This transition stage lasted for about four months. Finally, instead of giving up and returning to Brazil, I decided to change my attitude. I realized this was a great opportunity for learning and acquiring new perspectives. Subsequently, I rediscovered a new feeling of pleasure and I reached a balance. I became more familiar with the environment, created a circle of friends, got good grades in school, improved my tennis and for once I felt like I belonged there. Without being conscious, I was developing a better understanding of myself. Research Papers on Example of Graduate School Admission Essay - Experiencing Culture Shock19 Century Society: A Deeply Divided EraAnalysis of Ebay Expanding into AsiaStandardized TestingHip-Hop is ArtAssess the importance of Nationalism 1815-1850 EuropeAnalysis Of A Cosmetics AdvertisementComparison: Letter from Birmingham and CritoDefinition of Export QuotasAppeasement Policy Towards the Outbreak of World War 2PETSTEL analysis of India

Friday, November 22, 2019

Chapter Study Questions 1 & 2 Essay Example for Free

Chapter Study Questions 1 & 2 Essay 1.What percentage of Texans live in urban areas (cities & suburbs)?   90% of the population now lives in crowed cities and suburbs. 2.Name the three cities in Texas that are three of the largest in US?   Houston, San Antonio and Dallas 3.What are the three diverse economic businesses in Texas? 4 Oil and gas producer now work alongside high-tech companies, telecommunications giants, and other important business sectors. 4.In what areas does Texas consistently rank at the bottom in state spending compared to other states? 4 Texas consistently ranks near the bottom of the states in spending on education, welfare, and healthcare for poor. 5.Is Texas a high-tax, high-business regulatory state or is it low-tax, low-regulatory?   Texas is low-tax and low-regulatory climate. 6.Are Texas well informed about government and elected officials? Do they trust government? 4 Texans are woefully ignorant of their state and local government and the public officials who make important decisions affecting their daily lives. 7.Does Texas have a regressive or progressive tax system and what do these mean?   Texas has a regressive tax system, which means a tax that imposes a disproportionately heavier burden on low-income people than on the more affluent. 8.What is meant by economic diversification and has Texas done this? 6 Economic diversification is the development of new and varied business activities. New business were encouraged to relocated to or expand in Texas after the oil and gas industry, which had been the base of the state’s economy, suffered a major recession in the 1980’s. 9.What is meant by ‘cowboy rugged individualism’ and how has this impacted Texans’ views of government as a solution to problems?   The cowboy rugged individualism, with strong connotations of self-help and independence, symbolizes a political culture in Texas that does not like to look to government as a solution to many of its problems. It is the kind of individualism that continues to be exploited by political candidates in campaign ads. 10. What impact did having a frontier have on Texans? On might argue that the â€Å"wide-open spaces† of the frontier shaped Texan’s  view of their autonomy, independence, and vulnerability. It has clearly shaped attitudes toward land and the legal right to use land as one sees fit. 11. What three combined groups now make up the majority of Texans and how does their historical experiences differ from that of Anglos? What celebration are part of their political culture?   African American, Hispanic, and Asian Americans. The white population have limited relevance to the relevance to the cultural and historical experiences of many African American and Hispanic Texans. For African American is Martin Luther King Jr’s birthday as state holiday in 1991. And for Hispanics is the Cinco de Mayo. 12.Just what does political culture mean and describe the individualistic subculture in terms of government size, assistance, politics, and primary goals? 9 Political culture a widely shared set of views, attitudes, beliefs and customs of a people as to how their government should be organized and run. Individualistic subculture holds that politics and government function as a marketplace. Government does not have to be concerned with creating a good or moral society but exists for strictly. Government should be limited, and its intervention in the private activities of its citizens should be kept to a minimum. The Government primary function is to ensure the stability of a society so that individuals can pursue their own interests. 13. Describe the moralistic subculture in terms of government size, assistance, politics, and primary goals? 9-10 Moralistic subculture is a view that government’s primary reasonability is to promote the public welfare and should actively use its authority and power to improve the social and economic well-being of its citizens. The Moralistic subculture regards politics as one of the great activities of a man in his search for the good society. 14.Describe the traditionalistic subculture in terms of government size, assistance, politics, and primary goals? 10 a view that political power should e concentrated in the hands of a few elite citizens who belong to established families or influential social groups. Public policy basically serves the interests of this small group. The traditionalistic subculture  holds the view that there is a hierarchical arrangement to the political order. This hierarchy serves to limit the power and influence of general public, while allocating authority to few individuals who comprise self-perpetuating elites. 15. In what states or colonies did you originally find these three subcultures and what two best describe Texas? 16. How big is the Native American population in Texas and of the three remaining groups, do they have the right to have casinos? 11 Alabama-Coushatta, Tigua and Kickappo are the three small Native American groups that live on reservations in Texas. And the Native American population is less than one-half of 1 percent of the States total population. They have been denied the right to run casinos on their reservation. Even thought, their leader consider casinos a major potential source of revenue, jobs and economic development for their people, but recent efforts to change state law have been unsuccessful. 17. Were there ever a great many Hispanics in Texas prior to 1830 and what was it down to by 1887? How much had this increased by 1930, 1990, and 2012? 12 Prior 1830 the Hispanic population were a small minority of the population. By 1887 the Hispanic population had declined to approximately 4 percent of state’s population. In 1930 it was 12 percent and was concentrated in the border counties from Brownsville to el Paso. By 1990s, it had reached 25 percent, spurred by immigration from Mexico and other Latin American countries. By 2012 the Hispanics comprised 37.6 percent of the state’s population. 18.What two ethnic or racial groups are growing the fastest in Texas and by 2030-what group will be the largest? How have Hispanics done in terms of elected officials compared to other states?12 The two ethnic will be Asian and Hispanics. However the Hispanics are likely to exceed 50 percent of the state’s total. 19. Compare the %s of Anglos, African Americans, Hispanics, and Asians found in Texas in 1860 and those found in 2010? Chart 13 In 1860 it was a percent of 63.2% of Anglo. The 30.3 % are African American and 6.5% were Hispanic. However in 2010, 45.3% were Anglo, 11.5% were African American, 37.6% were Hispanic and 5.6% were other. 20.Where do African Americans tend to live in Texas?   African American settled in large numbers in the urban areas of Dallas, Fort Worth, Houston and Austin. 21. In 2010, how many Texans were there and what was the growth rate of the state compared to the national growth rate and where did people move from and to in the US? 16 According to the 2010 census, the state’s population was 25,145,561, an increase of approximately 4.3 million people in ten years. This growth rate of 20.6 percent was significantly higher than the national growth rate of growth rate of 9.7 percent. Chapter Study Questions 1 & 2. (2016, Mar 16).

Wednesday, November 20, 2019

Exploring Entrepreneurship in Dubai Coursework Example | Topics and Well Written Essays - 3250 words

Exploring Entrepreneurship in Dubai - Coursework Example The secondary research tool used was the internet. The website of the MOBH group covers all essential aspects of the company background, mission and vision, and future projects. It focuses on all areas of the company and served as a helpful resource. Gulf News and other articles on the group's acquisitions and deals assisted in getting a background on the company. The most important source of primary research was Mr. Mohammed Omar bin Haider, who agreed to a discussion and is the major source of research. The detailed discussion dealt with all the topics that were to be covered in the report as well as most issues faced by him and the corporation. The limitations faced were that the discussion could have been more objective and straightforward and it was difficult to get real problems out on the table. Third party sources and information from and about major customers was difficult to find. Most statements from the entrepreneur were biased or ambiguous. Mohammed Omar Bin Haider Group (MOBH) is a Dubai based corporation run by Mohammed Omar bin Haider. His father Omar Ali bin Haider was the founder of the company in the early 1950s along with his son. He started with a factory for gas production from 1964 to 1971 was the exclusive provider in Dubai. Mohammed Omar bin Haider is the current chairman of the group and is actively involved in its operations, direction and overall strategy. The company’s vision is to be the best at everything. The mission is to be a high growth company and diversify into various sectors.

Tuesday, November 19, 2019

A critique paper Essay Example | Topics and Well Written Essays - 500 words

A critique paper - Essay Example Allie’s parents are impressed with Lon, but Allie cannot stop thinking about Noah, although she has not received any information from him for a while (Wasowski 67). However, one day Allie embarks on visiting Noah subsequent to seeing his photo in the newspaper standing by an old house, which he had promised to refurbish. Later on, Allie realised that Noah had been sending her letters since when they parted ways and only her mother hid them from her, all this long. Their love was still evident, just as it was several years back (Wasowski 68). However, Allie did not know whether to choose Lon or Noah. Her dilemma was tied on the hatred that her mother had against Noah and the great love she had for him (Sparks 45). She results to choosing Noah and they live a happy life together, until when they die next to each other in the nursing home. The movie is creatively produced and directed with great film techniques all through the scenes. In particular, the presence of a narrator in a couple of scenes was significant in presenting the love story. This narration is applied stylistically to create a difference between the past and the present events (Sparks 56). The viewer can comprehend the themes easily with the help of this narration. The movie manages to preserve the emotions and sentiments of the characters through narration. The movie also highlights the two lovers reacting to each other roughly when angered. In particular, it is surprising to see the two lovers exchanging heartless words and further push and shove around as a mark of bitterness and rage. It is sad for the movie to allow this theme to be perceived as the best way lovers should react when angered. This is for the reason that not many people will desire to be in a relationship where fighting or violence towards each other is evident, all in the name of love. Conversely, the movie presents vivid pre-marital sex scenes. In particular, there are

Saturday, November 16, 2019

William Burroughs’s Fiction Essay Example for Free

William Burroughs’s Fiction Essay This paper will argue that William Burroughs’s fiction is directed at subverting and deconstructing the dominant social order and mainstream conventions and social practices. In such novels as The Western Lands (1987), The Soft Machine (1961), The Ticket that Exploded (1962) or The Nova Express (1964) the author constructs full-fledged literary outlaws – gangsters, conmen, etc. – in order to epitomize the forceful and illegitimate ways in which ideas, opinions or the entire reality can be imposed on the ostracized other. Therefore, William Burroughs’ novels also offer a reflection of American capitalist society and its unorthodox power relations. This theme will be investigated in the novel in light of Guy Debord’s The Society of the Spectacle which discusses the specular character of the capital society and the gaps between reality and representation. In his article on Burroughs, Frederick M. Dolan argues that   in the writer’s novels, all the rogue figures â€Å"control others by mastering the art of producing vivid and convincing representations, exploiting the naà ¯ve, metaphysical urge to believe that when language appears most meaningful, it has because it has established a referential relationship to the world† (Dolan, p. 536). This is precisely what the â€Å"society of the spectacle† is attempting to achieve by superimposing the show of capitalist order on everyday reality. Burroughs was also very interested in showing the distorting power of language and the ways in which reality can be manipulated because of this. From this perspective, Jacques Derrida’s book, Of Grammatology, will be particularly useful in the analysis of Burroughs’s language treatment and of the ways in which the writer’s deliberate foregrounding of the gaps between signifier and signified undermine the capitalist social order and ingrained thought-mechanisms. Burroughs denounces contemporary man as automaton, as passive receiver of ideology. Works Consulted: Burroughs, William S. The ticket that exploded. Grove Press, 1987. Dolan, Frederick M.   Ã¢â‚¬Å"The Poetics of Postmodern Subversion: The Politics of Writing in William S. Burroughss The Western Lands†, pp. 534-551. Contemporary Literature  © 1991 University of Wisconsin Press. Debord, Guy. The Society of the Spectacle. New York: Zone Books, 1994. Derrida, Jacques: Of Grammatology. Johns Hopkins University Press, 1998. Harris, Oliver (Oliver C. G.). William Burroughs and the secret of fascination.   Southern Illinois University Press, c2003. Lee, Witness. Word virus : the William S. Burroughs reader. Grove Press, 1998. -. Nova express. Grove Press, 1965. -. The soft machine ; Nova express ; The wild boys : three novels. Grove Press, 1988. Lydenberg, Robin. Word cultures : radical theory and practice in William S. Burroughs fiction. University of Illinois Press, 1987.Johns Hopkins University Press, 1998 New York : Zone Books, 1994. New York : Zone Books, 1994. New York : Zone Books, 1994. Morgan, Ted. Literary outlaw : the life and times of William S. Burroughs. H. Holt, 1988. Pepper, Andrew. â€Å"State Power Matters: Power, the State, and Political Struggle in the Post-War American Novel†. Textual Practice, vol. 19, no. 4, pp. 467-91, December 2005. Philips, James. â€Å"Life in Space: William Burroughs and the Limits of the Society of Control†. Literature and Aesthetics: The Journal of the Sydney Society of Literature and Aesthetics, vol. 16, no. 1, pp. 95-112, June 2006. Schneiderman, Davis. Retaking the universe : William S. Burroughs in the age of globalization. Pluto Press, 2004. Sobieszek, Robert A. Ports of entry : William S. Burroughs and the arts. Los Angeles County Museum of Art ; 1996.

Thursday, November 14, 2019

Consequences of Actions in Shakespeares King Lear :: King Lear essays

Consequences of Actions in Shakespeare's King Lear King Lear is a perfect demonstration of the great consequences one man's actions can cause. While there are certainly religious Christian elements to the story, the story is not one of morality or hope. King Lear is a lesson, making an example of what can come of a single, foolish, egotistical action. King Lear's action is the surrendering of his throne to his daughters. The element of Christianity enters here, because King is a God-appointed position, not to be given up. Lear, however, decides to disregard this fact, instead focusing on the immediate gratification he will receive from his daughters, and boosting his self-esteem while making him feel loved. Lear essentially offers his land and power for love, "Which of you shall we say doth love us most? That we our largest bounty may extend where nature doth with merit challenge," forgoing his God-given position and rights. Next enters the punishment, seemingly brought about by God. Because Lear has disregarded God's wishes, he is made to suffer insanity and excruciating physical torment. Lear is even given multiple opportunities to revoke his decision, but rather than heed the advice of those trying to help him, he banishes them for questioning his selfish decision. This leaves Lear surrounded by the people looking only to better themselves by using the now vulnerable Lear. Lear is estranged from his kingdom and friends, causing his loss of sanity. In the midst of Lear's self-pity he is discovered by the fool. Fittingly enough the fool is the one able to lead Lear back to the normal world. He is made to appreciate the people who truly cared about him from the beginning. He sees that they were right all along, and repents from his foolish decision, though it's too late to do him any good. Once more, the consequences of Lear's single sin are felt. In a typically Christian or hopeful ending, King Lear would learn to listen to the caring friends he has, and become less selfish. Shakespeare, however, chooses not to end it so predictably or simply. Even after all of Lear's suffering and repenting, he continues to receive punishment. Cordelia, who he has now realized truly loved him most, is killed. Lear is left feeling hopeless, saying, "I know when one is dead, and when one lives. She's dead as earth," which seems slightly to refer to his now cynical view of the earth.

Monday, November 11, 2019

Identity and belonging Essay

1. Familial and societal values and expectations define who we are. Our parents are at the centre of our upbringing and teach us values, attitudes and beliefs that help to define us from our conception and birth. Family expectations can either act as a burden on a child’s sense of self and abilities, or an opportunity to learn and grow. In order to preserve their cultural identity, some parents tend to preserve their traditions and language by entrusting nuances of their national heritage onto their children. There is often a tension between children’s desire to follow their own dreams and ambitions, and the hopes and expectations of their parents. Sometimes a compromise must be made. Our actions and decisions are restricted by the expectations that our parents have of us, which then manifests itself into a vast change in our identity as we may not be following our instincts. We construct a sense of ourselves through social interaction in our family from an early age. They set the examples for us to follow and we subconsciously adapt to share similar lifestyles and ideals. Adherence to pre-existing guidelines that define social groups, and to the expectations of others, can often be the easiest and in some cases the only path to fitting in. Especially during the teenage years, there is a need for others’ validation and adherence to social convention. 2. Establishing an adult identity. Determining who we are and where we belong as adults is influenced by both our past and our present, by what we already know and what we yearn for in our lives. Finding peers, friends and partners who respect and accept our presence is a vital part of our establishment of an adult identity. Our identity gets more complicated with the passage of time. With age comes new frontiers, challenges and opportunities that individuals can grasp with either hesitation or optimism. The movement from an adolescent identity to an adult identity can often be a challenging one, particularly when the experience is fuelled by frustration, mishap and confusion. Being an  adolescent or young adult is a time fraught with fear for the future and uncertainty, since the body and the mind experience great change – physical, physiological and social change. As gregarious and cognisant beings, we loathe ostracism and desire assimilation. 3. Families and intimate relationships with others shape who we are. Families ideally provide love, protection, security and the opportunity for us to find out who we are. The need to belong is an intrinsic motivation in all humans to feel accepted and valued by others through sustained, meaningful connections that validate our role in society. Not all families provide the same kinds of opportunities for personal growth and, even in the most stable and supportive families, pressures to conform may occur. While we do not choose our families, we can choose the close connections we forge with other people. A desire to belong is also a desire to connect with others. Changing circumstances can precipitate a change in our close and intimate relationships, which in turn reshapes and further develops our identity. It may seem that our everyday lives are filled with mundane routine, however we eventually realise that every relationship and commitment gradually becomes a significant part of who we are and how we see the world. 4. Groups and communities provide us with a sense of belonging. Groups and communities can provide security, support and acceptance in our lives. By nature, human beings are not solitary creatures. Belonging is an inherent aspect of our human condition that is a universally ubiquitous concept in humanity. Examples of groups include families, factions, teams, clubs, schools and workplaces. Contributing to the social fabric can have a positive effect on our sense of self – it can enhance our self-esteem as well as our self-worth. Not only do we belong to a family group, but also to racial, religious and cultural groups – even without our knowledge (passive). We fulfill the need for belonging satisfactorily when the group values and respects the contribution our presence makes to the group. Belonging to a group often carries with it a sense of exclusivity or privilege. It also fosters a feeling that we are accepted and loved. Belonging can often be contradictory in nature as people may want to belong to a group or organisation out of fear of being left out or ostracised. To attain a sense of social integration, we attempt to affiliate ourselves with groups that share mutual values and ideologies which affirm our identity and social role. It is often difficult to belong if we hold different ideas, beliefs and values from the majority of a group or community. Refusing to conform to the expectations of the majority – especially in schools or workplaces – can take considerable courage and strength of character. Misalignment between individual and group identity will have the same isolating effect as social solicitude, leaving us spiritually disoriented and emotionally desolate. 5. Our identity can often be challenged. The people and ideas we encounter on a daily basis change the way we see the world and how we see ourselves. Our identity develops as we grow and change. As teenagers we may be challenged by peer pressure and thus might be easily swayed by others with stronger personalities. Our beliefs – political, religious and personal – may also be challenged and our identities reshaped as a result. Beliefs add meaning to our lives and connect us to others, by giving a sense of direction and purpose. If our beliefs are shunned, all semblance of our individuality and character can sometimes be diminished. When we are disconnected from others, we tend to view our own ideals and values unfavourably because they are ‘different’ from the rest of society. This disparity can place a burden on one’s self-worth and identity. In some circumstances the only method to find our true self is to go against the boundaries applied to use by others. Overemphasis on adapting ourselves to satisfy what others think and desire can cause individuals to turn into such parochial beings that we lose sight of reality and who we really are. Knowing who we are and where we belong is fundamental and it allows us to live as happy and confident individuals able to reject conformity. We are all part of a family, a community and a culture. While we think of ourselves as being individuals, we must also accept that as social creatures we like to feel like we belong and feel safe. This, in turn, gives us the confidence to be †me†. The clothes we wear, the music we listen to, the  football team we belong to, even the school we attend forms the parcel of who we are. 6. Choosing not to belong. Conforming to the needs of a group can often stifle one’s true identity, and thus an individual can choose not to belong to a certain group. Whilst belonging suggests a desire to be connected to others, it may also result in a dependence on others and a subsequent loss of individuality. Choosing not to belong to the mainstream can be a difficult yet rewarding decision. An individual may define themselves in opposition to social norms and expectations. When an individual decides that they do not want to belong to a specific group or community, they demonstrate strength and courage, as well as a dominant, unique identity that is able to cope on its own. However, there may be some drawbacks. In not belonging and conforming to a group or community, we may be left feeling lost, confused and without purpose in life, regardless of the strength of our individuality. If we do not fulfill the fundamental necessity for social integration, we may feel isolated from a world that we share n othing with and lose the sense of purpose that defined social roles are able to provide. If this crucial aspect of the human condition is not fulfilled, we may lose all semblance of our identity and place in society. The nature of isolation holds no benefits for the individual, as it disallows an individual to view life in a positive manner, and denies them the right of relishing upon the positives in life. When individuals are alienated, they tend to lose their sense of identity because they feel as though they are ‘nothing’; to the world they do not exist. 7. In order to belong, we must make sacrifices. To gain a true sense of acceptance sometimes requires compromise. Because there will inevitably be conflict between the views of the individual and that of the group, we must often conceal or renounce nuances of our true character that are contradictory to the group’s collective identity. In order to belong to a group, we have to give up some of our individual  freedom. Sometimes we may even have to compromise certain personal beliefs or modify our behaviour in order to fulfill an impulse to belong. This means belonging will invariably challenge our identity by forcing us to either uphold our own values or conform to the will of the group. Thus, a sense of belonging can benefit or hinder personal development. A sense of belonging can either support or detract from our personal identity. We must make compromises to suit which direction we would like to take in our lives. While in some instances belonging may challenge identity, identity and belonging must coexist in society. This is because identity is actually formulated through perceptions of individuals and that without social groups, identity would only be a figment of one’s imagination. In a society which inherently seeks to categorise individuals and others’ acceptance is based largely on the extent to which one conforms, it is paramount that every individual finds their genuine place in the world. Despite the often horrific consequences that come attached to defying convention, the determination to find who we truly are is sometimes so great that we are willing to risk everything in order to try. Some sort of balance must be reached such that we feel validated and significant but also understand our true selves. Conforming with prevailing culture has the capacity to strip an individual of their identity or at least parts of it – it is the self that is compromised and dampened. Isolated are those who maintain individuality to the detriment of collectivism. Assimilated are those who unconditionally accept conformity; entropy awaits those who have no regard for self and others; but salient are those who are able to maintain a discernible element of individuality whilst concurrently achieving societal acceptance. It is difficult to fulfill these dual impulses: to belong to a group, and to be free to express one’s individuality. This is the distinction between accepta nce and the exertion of individual identity (through personality, beliefs, gestures etc.). 8. A sense of belonging can strengthen our identity by assigning us defined social roles. We are more likely to uphold our own values and personal beliefs if we are under some form of obligation to do so. Roles can be both explicit (teacher) and implicit (bully). Where we sit in the social hierarchy can affect how we see and how we feel about ourselves. While there are no specific rules or conventions for such roles, we are inclined to behave in a way that is synonymous with our designated ‘identity’ so that we meet other people’s expectations. In all of the social groups that we as individuals belong to, we have a status to abide by and a role to fulfill. Status is our relative social position within a group or community, whilst a role is the part our society expects us to play in such a status. For example, a man may have the status of father in his family, and is thus expected to nurture, educate, guide and protect his children. Mothers usually have complementary roles. One can also have multiple roles and statuses – such as an uncle, grandfather and so on. 9. Individual growth comes from belonging. Individuals gain more from belonging to a group than from living in isolation. Most groups have certain expectations that members must conform to, but they also provide a forum in which individuals make valuable connections with others and enrich/reinforce/question their identities. Members of a group can also teach each other, sharing the wisdom they have gained from their life experiences. The wisdom is used to enrich the group’s collective knowledge. Belonging can facilitate or perhaps stifle personal growth. 10. Types of identity and belonging. Types of identity: Career: lawyer, nurse, politician. Family: father, mother, older sister, cousin. Skills: athletic, intelligent, leader. Cultural: history, tradition, religion, ethics. Social: peer group, clique, club, gang. Also collective/multiple/gender identity. Types of belonging: Relationships: family, friends, partner, teacher. Social: groups, classes, clubs, organisations. Environment: Australia, metropolitan, farm.

Saturday, November 9, 2019

Character Analysis of Creon

After all of the confusion and corruption occurred, there is a new king for Thebes and that is Creon. In the Greek play, Antigone written by Sophocles, shows that Creon was a man of great complexity. He values friendship but Creon feels that friendship would not keep his city standing therefore â€Å"no one values friendship more highly than [he]; but [they] must remember that friends made at the risk of wrecking [their] Ship are not real friends at all. † (Sc. 1 L. 32-35) Creon is a strong person and he believes in the reality of the society and how there needs to be laws and regulations in order to conduct correctly. For example, he set the laws and he has to abide by the law so he has to punish Antigone. Creon does not believe that love is a force strong enough to fix problems but it is one of the causes of the problems, â€Å"go join them, then; if you /must have your love,/ Find it in hell! † (Sc. 2 L. 119-120) He doesn't have passion for the law breakers because that only leads to corruption but Creon has respect for the true warriors, â€Å"But whoever shows by word and deed that he is on the side of the State– he shall have my respect while he is living, and my reverence when he is dead,† (Sc. L. 52-55) instead of those who rebel against their own city. One example would be Eteocles and Polyneices, according to Creon, only Eteocles dies as a true warrior because he sided with his own city while his own brother, Polyneices, chose to rebel. Creon does not want to acknowledge Polyneices and so Polyneices is left to die a shameful death. Finally, Creon seems to be the type of man who holds grudges or even stubborn. He does not allow people to make amends once the mistake has been made. Creon is persistent that he is doing the right thing and â€Å"an enemy is an enemy, even dead. † (Sc. 2 L. 117) Creon is a character with many traits, like his value of friendship, and his respect to the warriors defending his city. Other traits may not be the best but they make Creon who he is, he does not believe in using love as an excuse to rebel, and he is stubborn because he thinks that once an enemy, always an enemy. There are many different traits of Creon that make him easier to distinguish from others.

Thursday, November 7, 2019

Virtual Private Network

Virtual Private Network Virtual Private Network Introduction The sharing of information amongst departments within corporations has become an integral part of ensuring efficiency and decision making hence yielding in productivity. In order to bolster the communication channel within our corporation, it becomes necessary to adopt new technology such as the Virtual Private Network (VPN). The VPN can be defined as a private network that operates through the use of a public network such as the Internet in order to connect multiple locations, which are remote. The VPN facilitates interconnectivity of networks over long distances and, therefore, forms a wide network area (Stairs et al., 2009). In technical terms, the VPN is Wide Area Network across the Internet that creates links between sites even though it appears to users as a private network link (Wouters Bantof, 2006). The VPN also supports secure connections between an organizations private network and that of the remote users through a third party service provider. The network is normally encrypted, and telecommuters have vouched for the reliability, safety and low-cost of VPN in a bid to connect an organization's intranet (Shinder Shinder, 2004; Stairs et al., 2009). It is, however, important to note that there are basically two types of VPN namely: the remote access VPN and the site-to-site VPN. I highly recom mend a site-to-site VPN, otherwise referred to as the router-to-router VPN connection. Summary of Technology/Problem Solution The Site-to-Site VPN Connection The Site-to-Site VPN connection is a network that enables an organization to have routed connections between its varied separate offices and/or with other affiliate organizations through a public network without compromising the security of the network (Morimoto et al., 2008, Schnider, 2011). In essence, a routed VPN across the routed VPN connection through the use of the internet operates logically as a Wide Area Network link. Whenever the network is connected through the use of the Internet, a router effectively sends forward packets into another router along the VPN connection. In terms of the routers, the VPN connection serves as data layer link (Lewis and Lewis, 2006; Morimoto et al., 2008, Schnider, 2011). Besides, the Site-to-Site VPN connection can be used to link two disparate portions of a private network. In this case, the VPN server plays the role of providing a routed connection to the network that is attached to the VPN server. Therefore, the calling router- also referred to as the VPN client- automatically authenticates itself to the VPN server which is otherwise termed as the answering router. It should be noted that for the purpose of mutual authentication, the answering router does authenticate itself in response to the calling router. Therefore, in a Site-to-Site VPN connections the packets sent from either of the routers across the VPN connection do not typically originate from the router (Morimoto, 2004; Bendell, 2006; Morimoto et al., 2008). In essence, the site-to-site VPN connects two networks that are dispersed by linking them with a leased line, a WAN circuit or through a public network such as the Internet. The actual underlying infrastructure for the network is inconsequential, provided that the sites can be linked to each other through the IP (Khan, 2005; Matei, 2012). The sites can operate using the pre-shared keys: the key can be shared between the sites to enable mutual authentication and to help establish the encryption of initials that can be exchanged IPsec tunnel parameters. On the other hand, the site-to-site VPN may operate using digital certificates, which belong to each particular site. This is provided by a central CA for the facilitation of authentication and encryption of the earlier exchanges between the sites (Khan, 2005; Matei, 2012). The use of a site-to-site VPN connection provides substantial constant savings when compared to the other network that uses dedicated Wide Area Network link. Whatever is required to use a site-to-site VPN is a VPN gateway and a working Internet connection that is relatively inexpensive. After the VPN connection has established connections between sites, the site-to-site VPN link is invariably established (Shinder Shinder, 2004; Schinder, 2011). The users on each end can then communicate with the other networks through the site-to-site VPN link as it would be the case with the routed connection on their very own networks. In this case, the gateways serve as routers and, therefore, route the packets to the designated networks. In a typical context, the site-to-site VPN connections are established between the offices of an organization either between departments, the main office and the myriad branch offices (Schinder, 2011). This is considered as an approach to social theory that is agent based. The theory bears its origin from social studies and regards objects as being part and parcel of a social network. The theory puts much emphasis on the agency of non-humans in a communication channel and helps in mapping the simultaneous relationships between the semiotics or the concepts and the material within a communication network (Fenwick et al., 2010). Therefore, the ANT provides the means through which the relational ties in a particular network can be explored but does not shed additional light on the reason and the form of the network. In a nut shell, this theory provides the explanation of how the material and semiotic networks are built up so that they function as a whole. Therefore, the clusters of actors who are involved in the creation of meaning can be described as being both material and semiotic. This explicitly relates the various elements that are found within a network, thereby coming up with the coherent whole. Such networks are invariably transient, and as a result, they exist in a constant re-making and making process. Subsequently, the relations are repeatedly performed without which the network is subject to dissolution. The theory also makes the assumption that the networks of relations are by no means intrinsically coherent (Fenwick et al., 2010). The actors in this theory include both human and non-humans and in the context of the network they relate with one another. This theory assumes that there is nothing that lies outside this network of relations; implying that there are no distinct differences in the abilities of the technology, human and non-human to act. Therefore, as soon as the actor engages with the actor-network, it is invariably involved in the web of relations, thereby becoming part of the entelechy (Fenwick et al., 2010). This theory is imperative in the quest to install the site-to-site VPN as it helps in understanding the position and interaction of various players (human and non-human) within the network. The understanding of this relation is critical in ensuring that the network is exploited to the maximum. Structuration Theory The structuration theory talks about the duality of structures of communication. This duality involves the relationship between structure and agency. In essence, the theory attempts to look at how agents relate to the structural elements of the society. The theory perceives structure as that which gives form to the social life without necessarily being the form itself. Therefore, structures come into being through the activities of the agents (human). On the other hand, agency refers to the patterns of peoples actions and not their intentions for doing their activities (Stones, 2005). In general term, the structuration theory is considered as a theoretical approach towards sociological phenomenon. Initially, during its formulation the theory did not address the technological aspect of human relations. However, as technology began to take a critical and almost central place in human relations, especially in the organizational setups the theory was extended to include the information technology dimension (Stones, 2005). This theory will be instrumental in the implementation of this set-to-set VPN as it will help to understand the position of the corporations staff as agents; and how their interactions across the network is a dual nature. Therefore, this gives the interactions a form that either displays the success or failure of the communication system. Systems Theory The systems theory has been considered as a study that rather cuts across all disciplines. This study delves into the abstract organization of various phenomena bearing in mind the independence of their types, substances and/or spatial scales of existence. The theory investigates the principles that are found in all complex entities and models that can be used to lend their understanding. According to this theory, a system consists of four main components. The first components can be defined as objects: they involve variables, elements and parts within the system. They can either be abstract, physical or both in accordance to the systems nature. The second component includes the attributes: these are qualities or properties that the objects and system exhibit. The third component is the internal relationship between the objects in the system, and the final component is the environment in which the system exists (Dwivedi, 2012). Therefore, according to the theory, the system is a set of things that impact on each other within a particular environment, forming a larger pattern that is disparate from any other parts. In the analysis of the organizations, the important systems interactive paradigm consists of looking at the continual stages such as the input, processing and the output. These stages reveal the concept of openness and/or closeness. The closed system does not interact with the environment in which the system is set up: such a system does not take in new information and can, therefore, wither and die away. On the other hand, an open system takes in new information since it interacts with the environment in which it is based. The open system, therefore, increases the possibilities of survival and prosperity (Dwivedi, 2012). This theory is critical in helping shape that kind of system that will be effective for the corporation. The theory proposes that we open our soon to be implemented site-to-site VPN connection to new information as this will not only enable our sustainability, but this appreciation of our environment will make our communication channel efficient and productive. Social Construction of Technology Theory Also referred to as SCOT, this theory posits that technology does not determine the actions of humans within a communication channel but rather it is the human actions that shape the technology. The theory also posits that the ways in which technology is used, can hardly be understood whereby a full comprehension of the ways in which that technology is ingrained in the social context. This theory is referred to by some scholars as technological constructivism, especially those who consider it a response to technological determinism (Bijker, 2012). According to the theory, the study of the social world is critical in understanding the criteria that people use to determine whether to accept or reject a particular technology. The theory is, therefore, a methodology as it helps in the formalization of the principles and steps that need to be followed when analyzing the failures and success of a particular technology (Bijker, 2012). This theory is fundamental in these initial stages of implementing the site-to-site VPN connection in our corporation. The theory proposes that we understand the effectiveness of this system by taking a critical look at the social milieu in which it is going to be set. This is because; the social environment will determine the form and productivity of the system. The Activity Theory This theory principally aids in understanding the mental capabilities of an individual. The theory, however, goes ahead to confirm that isolated individuals are sufficient to conduct the analysis of a unit, the analysis of the technical and cultural aspects of the interactions between human beings. Therefore, the theory is mostly used in the description of socio-technical system based on six interrelated elements. These elements include the objective of the system; the actors that are engaged in the system (Kaptelinin and Nardi, 2009). The other elements also include the tools that are used by the actors in the communication system; the social context within which the system is based; the division of labor or rather the hierarchical structure of the actors in the system and finally the conventions, rules and guidelines put in place to regulate the various activities of the system (Kaptelinin and Nardi, 2009). This theory is invaluable in the implementation of the site-to-site VPN connection in the company. The theory helps in understanding the various actors in the system and more so the role that they play in the conception and effectiveness of the system. Understanding the individuals is crucial in further understanding the general social context within which the system is based, thereby making it possible for the prediction of its suitability and potential. The Technical Specification of the Site-to-Site Virtual Private Network The system will use an OpenVPN, which is an open source SSLVPN client server that will enable the setting up of the corporations encrypted VPN. The OpenVPN is crucial in securing the sharing and access of information between offices irrespective of their distances. The system will require a central office that will be linked to a handful of computers across the various departmental offices. These computers will be connected by routers. This will require access to both the client and server side routers (Teska, 2008). Therefore, the client network and the server network will be separated into disparate broadcast domains - a process that will require a WINS server in order to route the Windows file-share information between the two or various sub-nets. The required hardware will, therefore, include the Linksy WRT54G (for the client router); the D-Link DLG-4300 (for the server router). The server OpenVPN Machine will have the following specifications: Processor AMD Athlon 1600+, RAM 768 Mb and Operating System Slackware 10.2. The client OpenVPN Machine will have the following specifications: Processor AMD Athlon X2 3800+, RAM 2 GB and Operating System Slackware 12 (Teska, 2008). Feasibility Study The installation of the site-to-site Virtual Private Network is not just feasible for the organization but also an inevitable measure. Notably, the installation of this system can be completed within the next six months as reflected in the operation plan, given the commitment of the corporation to prioritize its implementation. The installation will not be an added financial burden to the corporations already scheduled financial budget. This is because some of the equipment required for successful installation of the system is already in place, including cable networks and computers and other installation materials. While an upgrade of some of the computers is called for, they can still be used for the installation purpose and be replaced at a later stage, at the corporations convenience. Arguably, the only new dimension that the site-to-site VPN connection introduces to the already existing communication system is the Internet aspect, which will be able to bridge the offices that ha ve not been able to communicate due to geographical distances. It is worth noting that the Internet is affordable, and the necessary measures have been put in place to ensure that the corporations information will be secured. Due to the magnitude of the corporation, especially with offices scattered across the country, there is a need for swift up-to-the-minute communication between these various departments. The site-to-site VPN connection is the apt solution that can help bridge this information gap due to its cost effectiveness and information safety. Operation Plan The implementation dates of the various aspects of installation of the site-to-site VPN is indicated chronologically in the table below. Time Line Activity January 25 to February 15, 2013 Review and Approval of the Site to Site VPN Proposal Report February 16 to March 30, 2013 Examination of the Existing System across the Countrywide Offices April to June 15, 2013 Setting Up the New Infrastructure between the Main Office and the Remote Offices June 16 to July 31, 2013 Testing the installed system. August 1, 2013 Launching the system. Recommendations After intensive discussion in this report on the merits of the site-to-site VPN connection and the provision of the reasons as to why the corporation should adopt the system, I would recommend that the implementation of the same be given prominence to enable timely communication between the various departments in the corporation. In this case, time is of the essence as information is considered today as one of the determinants of profitability and efficiency in organizations. Therefore, the corporation should promptly consider the merits of the proposed communication system and embark on its implementation. In the installation process, the proposed installation price should be duly followed to avoid the omission of the key elements of the proposed system. Conclusion In this discussion, it is proposed the site-to-site Virtual Private Network is befitting for the upgrade of the communication system of the corporation. This proposed VPN model will use the Internet to facilitate communication between different offices within the corporation. The security of the information and the affordability of the Internet are some of the merits that we have pinpointed as being inherent with this system. We have also discussed its pertinent requirements and how they enable the efficiency and security of the system. Besides, we have discussed how the five telecommunication technology theories are applied in the proposed system and revealed the theories that help in understanding the various components of the system. In summary, the recommendation of the site-to-site VPN connection is in recognition of the corporations communication needs and financial constraints. This system will help the corporations effective sharing and access of information, which is critical in timely decision making and hence productivity.

Monday, November 4, 2019

Analysis of Corporate Governance by Monks, Robert & Minow, Nell Article

Analysis of Corporate Governance by Monks, Robert & Minow, Nell - Article Example As a result, the managers strengthened the company’s governance by ensuring that their imperative efforts focused on their judicial systems reforms, property rights, and informational freedom as well as evaluating other institutions that were vital for realizing democratic market economies. In addition, Banca Comerciala Romana of Romania experienced successful cases of good corporate governance in 2004. Due to itemized corporate governance, the institution was able to access cheaper debt that made it possible for the bank and its affiliate rating agencies to access lower borrowing costs. Fitch Ratings upgraded both individual ratings and long-term counterparty ratings from C/D and BB- to D and B+ respectively. The company cited the upgrading of the ratings came because of the improvement of corporate governance. They were able to manage the bank’s risks that led to changes that brought the bank back to European Union standards hence acting as a role model for the other financial institutions in the region. Furthermore, good corporate governance brings success in companies since it helps facilitate profit-making operations. With good corporate governance, investors will not just assume whether the company will perform better, but knows it will perform best due to better corporate governance (Monks & Minow, 63).  Ã‚   According to the study, the companies transformed due to affirmed systems of good corporate governance. The refining and developing of standards of corporate governance often followed cases of failures within the subjugated company. For instance, in the late 1990s, there were bursts of high technology bubbles associated with telecommunication companies. As a result, there was the development of interests by both brokers and analysts that led to conflicts, underpinning the ability to introduce the principle that would bring advice and analysis into the new system of corporate governance. Enron is one of the companies that felt the heat of failed corporate governance as it pointed the source of its failures to the auditing committee. The auditor and audit committee was an independent body thus mistakes involved during corporate governance application led to deficiencies due to failed accounting standards. Enron’s system of corporate governance failed due to lack of advice and an alysis principles. Another failed case of corporate governance is that of Parmalat. The Parmalat is a group of companies in Italy that deals with dairy food business worldwide. In December 2003, the company’s management team announced the collapse of the company due to lack of funds and entered into the bankruptcy protection program.  Ã‚  

Saturday, November 2, 2019

Health care marketing Essay Example | Topics and Well Written Essays - 250 words

Health care marketing - Essay Example Each patient wants to receive quality health care services. Quality health care is a priority to every individual because it means life. Marketers in this field should identify the specific needs of the client and design health care products that target to address these needs. Comfort and care prove to be the leading need of the patient. Businesses in this field should seek to persuade the patient with quality in terms of effectiveness, comfort, speed, and specialized care. With many businesses in this field projecting inefficiencies in satisfying the patient and his family, a business that prioritizes these needs is likely to stand out among the competitors. Effective marketing should seek to persuade the patient and family with an assurance of expertise in health care provision, speedy diagnosis, and professional advice from consultants. With such conviction, patients will be able to try out a health care provider. If they derive satisfaction, clients will develop a level of loyalt y that is good for the business. On a different note, healthcare providers should adopt a new business culture. These businesses should give the patient the freedom to make an informed choice. This will only occur if these enterprises disclose the charges of their services prior to delivery of these services. A transparent health care system will enable compare prices between different health care providers. That comparison will enable the clients to choose the one that presents a higher utility worth the price. Majority of health care providers assume that patients do not need to know prices before hand. However, it is reasonable to let the patient make informed health care choices. The health care sector can increase clients through effective marketing and deliverance of quality health services. Understanding the specific needs of clients and designing services that seek to satisfy those needs should be a priority. A patient will visit a health care provider