Monday, December 30, 2019

I Want a Wife Judy Bradys Legendary Feminist Satire

One of the best-remembered pieces from the premiere issue of Ms. magazine is â€Å"I Want a Wife.† Judy Brady’s (then Judy Syfers) tongue-in-cheek essay explained in one page what all too many men had taken for granted about â€Å"housewives.† What Does a Wife Do? â€Å"I Want a Wife† was a humorous piece that also made a serious point: Women who played the role of â€Å"wife† did many helpful things for husbands and usually children without anyone realizing. Even less, it wasnt acknowledged that these â€Å"wife’s tasks† could have been done by someone who wasn’t a wife, such as a man. â€Å"I want a wife who will take care of my physical needs. I want a wife who will keep my house clean. A wife who will pick up after my children, a wife who will pick up after me. The desired wife tasks included: Work to support us so I can go back to schoolTake care of the children, including feeding them and nurturing them, keeping them clean, taking care of their clothes, taking care of their schooling and social lifeKeep track of doctor and dentist appointmentsKeep my house clean and pick up after meSee to it that my personal things are where I can find them when I need themTake care of the babysitting arrangementsBe sensitive to my sexual needsBut do not demand attention when I am not in the moodDo not bother me with complaints about a wife’s duties The essay fleshed out these duties and listed others. The point, of course, was that housewives were expected to do all these things, but no one ever expected a man to be capable of these tasks. The underlying question of the essay was â€Å"Why?† Striking Satire At the time, â€Å"I Want a Wife† had the humorous effect of surprising the reader because a woman was the one asking for a wife. Decades before gay marriage became a commonly discussed subject, there was only one person who had a wife: a privileged male husband. But, as the essay famously concluded, â€Å"who wouldn’t want a wife?† Origins Judy Brady was inspired to write her famous piece at a feminist consciousness-raising session. She was complaining about the issue when someone said, â€Å"Why don’t you write about it?† She went home and did so, completing the essay within a few hours. Before it was printed in Ms., â€Å"I Want a Wife† was first delivered aloud in San Francisco on Aug 26, 1970. Judy (Syfers) Brady read the piece at a rally celebrating the 50th anniversary of women’s right to vote in the U.S., obtained in 1920. The rally packed a huge crowd into Union Square; hecklers stood near the stage as I Want a Wife was read. Lasting Fame Since â€Å"I Want a Wife† appeared in Ms., the essay has become legendary in feminist circles. In 1990, Ms. reprinted the piece. It is still read and discussed in women’s studies classes and mentioned in blogs and news media.  It is often used as an example of satire and humor in the feminist movement. Judy Brady later became involved in other social justice causes, crediting her time in the feminist movement with being foundational for her later work. Echoes of the Past: The Supportive Role of Wives Judy Brady does not mention knowing an essay by Anna Garlin Spencer from much earlier in the 20th century, and may not have known it, but this echo from the so-called first wave of feminism shows that the ideas in I Want a Wife were in the minds of other women, too,   In The Drama of the Woman Genius (collected in Womans Share in Social Culture), Spencer addresses  womens chances for achievement the supportive role that wives had played for many famous men, and how many famous women, including Harriet Beecher Stowe, had the responsibility for childcare and housekeeping as well as writing or other work.  Spencer writes, â€Å"A successful woman preacher was once asked what special obstacles have you met as a woman in the ministry? Not one, she answered, except the lack of a ministers wife.† Edited and with additional content by  Jone Johnson Lewis

Sunday, December 22, 2019

Consent Is A Vital Part Of Human Socialization - 1593 Words

Consent. It is a vital part of human socialization. It means one’s voice, choice, agreement, and participation. Consent is a concept that some just do not understand. It is tremendously important when engaging in multiple affairs like intimacy, business agreements, legal contracts, etc. But consent could also translate to small activities like attending a party, making a drink for someone else, or agreeing on a film to watch. There are also some crimes that people consent to taking part in. In the eyes of the law, these crimes are considered â€Å"victimless† because the would-be victim consented to the crime. (Dempsey, 2013) There are two sides to every jail cell, meaning that the question â€Å"Does victimless crime exist?† has contrary answers depending on who’s answering. This paper’s assertion is in support of the present factor of victimhood for an act to be considered a crime. In Crime and Morality by Hans Boutellier, it is explained that â€Å"[Bedau (1974)] wonders whether there really is such a thing as victimless crime. ‘If there are crimes which are truly victimless, for what reason did they become criminal in the first place?’ (p.57) †¦ The fact that there is agreement does not necessarily exclude the possibility of victimhood.† (2000, pg. 57) Thus, if there is no victim, there is no crime, rendering some â€Å"victimless crimes† fallacious. Although, there are some â€Å"victimless crimes† that are indeed crimes because they do have a victim, also rendering the term â€Å"victimless crime†Show MoreRelatedThe For Colored Girls Who Have Considered Suicide / When The Rainbow Is Enuf1394 Words   |  6 Pagesin this poem allows the woman to have agency over her body, and address the concerning ways in which women are socialized; however, this gaze is problematic in the way that is treats men. The female perspective is an essential part to the pieces of this text, it is also vital that these view points do no take on the same destructive behavior that this text is attempting to end. The use of the feminine gaze in â€Å"Graduation Nite† gives the lady in yellow agency over her sexuality, body, and actionsRead MoreTheory And Practice Of Group Counseling1216 Words   |  5 Pagesaims to assist readers in understanding the connection between theory and practice within group counseling. Author’s Background and Credentials: Gerald Corey received his doctorate from University of Southern California, is a Professor Emeritus of Human Services and Counseling at California State University, a Diplomat in Counseling Psychology, American Board of Professional Psychology, a licensed psychologist, National certified counselor, and a Fellow of the American Psychological Association, AmericanRead MoreThe Ethics Of Human Sexuality1362 Words   |  6 PagesHuman Sexuality provided the introduction to the required skill set for the counseling profession not as a specialty, but as an avenue to self-reflect upon the learning of new concepts and ideas, gathered from sex researchers. Recognizing the impact of societal beliefs concerning the gender socialization process helps us understand bits and pieces of human sexuality. It is important to also understand attitudes, worldview, ethical considerations and prejudices as we process the topic of human sexualityRead MoreThe Marriage Of Arranged Marriage1895 Words   |   8 Pagesconsidered the norm in this culture. Free will marriages are considered to be a taboo among many families in the Indian culture, whether it is in India or American. According to them, marriage is a bond that two people should tie only with the consent, blessings and approval of their parents and family members. In the Western culture there is no such thing as arrange marriage since usually couples have the free will to marry someone based on their own liking. Introduction Roughly 40-50% ofRead MoreThe s Work Sex And Temperament1969 Words   |  8 PagesPrimitive Societies concludes that â€Å"sex differences are not ‘something deeply biological,’ but rather are learned and, once learned, become part of the ideology that continues to perpetuate them† (Kimmel 2013, 60). Basically, Mead is saying that sex roles and behavior vary from culture to culture (Angus 2016). As a result, gender is developed primarily by socialization or based on one’s cultural environment (Angus 2016). Upon observing three different cultures, Mead was able to come to a conclusion thatRead MoreJuvenile Recidivism3788 Words   |  16 Pagescourt involvement for serious delinquent activities† (p. 219). With all the studies that were done, from African-American, to single parents, it was shown that when a child lives in a step family, they can still do well. The reason for this is socialization theory proves that it is an environment that the child can still grow in a healthy manner. The child is having its needs met in a naturing manner (Mullins, 2010, p. 13). Also if the parents aren’t married when the child is born, there are no effectsRead MoreQueer Representation Of All Ages Media Essay2163 Words   |  9 PagesThis perception of the sissy character as a homosexual is absolutely vital in understanding the tumultuous portrayal of the queer identity. It exemplifies the medias one dimensional portrayal of queer people as the â€Å"other†, something unnatural, something to ridicule (a 1920s silent film dialogue card refers to a sissy character as â€Å"one of Nature s mistakes†). It shows the immense power media has as both an agent of socialization and a reflection of society. The sissy stock character provided anRead MoreMoral Development During Adolescence Essay8689 Words   |  35 Pagesthe pooled data was used for the quantitative part of the research. While for the qualitative study a sample of 20 adolescents (10 boys and 10 girls) who were high-school students (in grade 10 and 11) from 12 to 18 years of age from Gebeni High School in Swaziland was used. The researcher aimed to investigate the extent of determinants of moral development in curbing adolescents’ moral decay and to make recommendations on the development of socialization structures to curb adolescents’ moral decayRead MoreReflection on Workbased Learning3141 Words   |  13 Pagesinto the professional development of a practitioner. Furthermore, reflection is embedded in the dimensions of the Knowledge and Skills Framework [Department of Health, 2004] and is seen as a pivotal part of nursing as a professional activity [Jarvis, 1991.] The gaining of new knowledge and skills is vital to healthcare professionals as well as making the difference to the type of healthcare they deliver [Hinchliff et al, 2003.] However, Hogston and Simpson [2002] emphasise that each situation reflectedRead MoreThe Challenges and Practices of Human Resource Management in Ethio Telecom9631 Words   |  39 Pagesorganization for sustainable competitive advantage. Organizations that do not put their emphasis on attracting and retaining talents may find themselves in dire consequences, as their competitors may be outplaying them in the strategic employment of their human resources. With the increase in competition locally or globally organizations must become more adaptable, resilient, agile, and customer-focused to succeed. This study arises from the need to manage the HR of the company more effectively. The rapid

Saturday, December 14, 2019

Did God Create The World or was it Created by Chance Free Essays

Many atheists argue that religious believers have blind faith ,but does it not take blind faith to believe that DNA and cells were created by chance. The DNA is too complicated to have just been created by chance. Think of the dictionary, if I told someone that I thought the dictionary was created by chance over billions of years ago you would think I was insane. We will write a custom essay sample on Did God Create The World or was it Created by Chance? or any similar topic only for you Order Now Remember the second law of Thermodynamics- High Complexity equals low Entropy and Low Complexity equals high entropy. This means the more complex something is the more organised it will be. So in the beginning there was low complexity so must have meant high entropy or chaos, well then how was the earth created with such low complexity and such little apparent chaos. Also how does a DNA get created by chance if it comes from nothing. Years ago microscopes were useless and when you looked at a cell you would just see a blob. It could be easy to think that this blob came by accident. Which leads me to my second point how can something be created from nothing. In the beginning there was nothing and now according to many scientists there is everything. By everything I mean the earth and the universe. In living cells the catalysts are enzymes. In the 1980s there was another kind of enzyme found, this was the RNA molecule. The RNA molecule (which is also a carrier of genetic information and a catalyst) or ribozyme sped up the making of the basic DNA and protein. But even including this assuming a ribosome is 300 nucleotides long and every nucleotide has 4 types of different nucleotides on it the calculation would 4^300 which is a number far too great to have taken even 13 billion years to do let alone 4. 54 billion years. Other people besides creationist do not believe the Big Bang. Some people who want to deny God might say the ‘Intelligent Design Theory’ which states cells need a designer they are far too complex to have happened randomly. Think of it this way ‘Darwin’s Black Box’ which is a microscopic machine which was created to move the little flagellum a little bit took many years to create and was very complex it should be even harder to make everything else in the bacterium and to say it was created by chance would be preposterous. Opponents to Intelligent Theory Design hypothesise that there is a cluster of universes; more than our own observable universe. If our universe were one instance in a population of failed universes, then the fact that ours is fine-tuned for life would not be surprising. If this was true though and there were an infinite amount of universes then that means anything is possible. For example in one universe there could be an actual Easter Bunny living with an actual Father Christmas. So if this multiverse theory were to be true and there were many other parallel universes then that would leave an even bigger problem. Where are they? How do we know we are the ‘perfect’ planet. If this universe is fine-tuned and that is the reason why we are 19. 6 million kilometres from the sun or why gravity is not a little bit greater so the stars don’t become red-dwarfs. If they were red-dwarfs they would have been too cold to support life-bearing planets. All the rest of the planets are unfit for human life and this shows how unique the earth is which I believe must have taken a creator. Time is the creator of all things Well this is how it works we think to ourselves nothing is impossible, so the impossible become probable. The probable then becomes certain and the certain becomes reality. Spontaneous Generation is the theory that life came from inorganic materials but was proven wrong by Louis Pasteur. He wrote that you would need a parent cell to create another cell, it cannot just be formed just like that. Anyone who does believe in spontaneous generation have been deluded by their own poorly conducted experiments. Atheist prefer to hear that life came from inorganic substances instead of a creator or miracle. This makes sense because atheists believe that the universe just ‘popped’ into existence. One minute nothing, next minute everything. The earth also had to have been find tuned from the moments of its inception for it to be able to sustain life. And nothing was living in the beginning so there couldn’t have been any parent cell. This is thought of as Abiogenesis which the process by which living organisms are created from non-living things. This is obviously not true because there are no living things on earth that have come from non-living things. Why does science not know where the birds and butterflies migrate to? Why is we need maps and aids to help us fly our planes? How come a butterfly can fly to someplace it wants to get without any aid? Insects are very far down the evolutionary time scales. How does the most highly evolved life forms not have the capabilities of a simple butterfly. There are many things in nature we cannot replicate or improve upon. Things in nature are said to be the product of chance and time. Well what is time? How much does it weigh? What does it consist of? Time is not a thing. Time is a non-being. So you can add time to help you figure out the Big Bang Theory but in the end what existed first ,time or matter? Can time exist without matter? Things in nature are just too beautiful to be the outcome of a giant, random, nonsensical implosion. So according to atheists, if we leave chance and time to do its work on our computers ,will they just become the most high-flying, amazing piece of kits ever? NO, of course not. Birds can do all sorts of things,fly upside down, land on a thin piece of wire. Why can’t an aeroplane manoeuvre as well as a bird. If the bird just came by chance surely we could come with something much better than that. In 1953 Stanley Miller passed a spark through a chosen mixture of gases. What he found changed science forever. The gasses formed amino-acids. Amino acids which are the main ingredients in proteins. Proteins are what make up most of our body. In truth amino acids do link up together to form proteins but that is like saying bricks will come together to form a house . You would be missing important parts of the house like a door and a bathroom. This is the same for proteins ,they are far too complex to have been created just using amino acids. Some people also believe that there was a special protein which assembled itself by chance in a prebiotic environment. Prebiotic is the general term to refer to chemicals that induce the growth or activity of micro-organisms. Double Thinkers are also another sort of theory. It is the belief that God helped start evolution and the world. To Double Think actually means the acceptance of contrary opinions or beliefs at the same time, especially as a result of political indoctrination. In conclusion everything can’t start from one point of inception full of nothing. The Multiverse Theory is too extreme and crazy. To say that there are billions of other universes where something impossible in this universe is possible in another ,is too farcical to even consider. If we still believe in the Big Bang Theory then why is it still a theory and where does all the starting matter come from? ‘Our minds work in real time, which begins at the Big Bang and will end, if there is a Big Crunch – which seems unlikely, now, from the latest data showing accelerating expansion. Consciousness would come to an end at a singularity. ’-Stephen Hawking. How to cite Did God Create The World or was it Created by Chance?, Papers

Friday, December 6, 2019

Railway Safety Performance in Union †Free Samples to Students

Question: Discuss about the Railway Safety Performance in Union. Answer: Introduction: Hazards and risks can occur both at the private sphere and at the workplace. The definition assigned to a hazard is the condition that has the potential to cause injury, illness and death. It also extends to disrupting operations at work and damaging of goods. Risk can be defined as the probability that a hazard may occur and result in injury. Workplaces pose dangers of safety and risk due to the processes of production. Risk and safety management inculcates the sets of procedures that formulate and implement mitigation measures with regards to hazards. The management of risk is dependent on individual state policies and legislation on risk and safety management. The risk and safety policies on train accidents in Germany are governed by the EU laws together with federal legislation. The German legislation on health and occupational safety works under the umbrella guidelines that are set out in the Euro wide framework. The European Union guidelines define the structures and rules on occupational risks and its prevention. It also sets regulations on promoting safer working environments. The agency mandated to ensure safety standards in the train sector is the European Agency for Railways (ERA). Its core mandate is set out in regulation 2016/796 (Biennial Report, 2016, p.1). This agency works with stakeholders in the train sector and national train safety bodies of its member states. National Safety Authorities within the EU collect data gathered from this Euro agency for action at the state level. The Federal Railway Authority in Germany is the agency tasked with supervising railway operations, licensing and safety (BMVI, 2017). It operates in compliance with European Union laws and provides oversight on safety at the state level. This agency supervises safety operations at the federal level while regional railways are supervised by the federal states. It operates under the parent Ministry of Transport and Digital infrastructure. The risk and safety measures in the train sector in Germany are enshrined in the General Railways Act which spells out the statutory obligations to be adhered to. An operational safety management system is a pre-requisite as part of the obligations required to operate. It also has a railway inspectorate that performs random inspections on the railway infrastructure. The Federal Railway Authority regulates regional agreements on cross acceptance between the member states within the EU (EBA, 2017). This includes agreements between Germany and Italy, France and several other European nations. The rights of passengers are also regulated and safety information guidelines set out. It sets out the rights of the passenger and ensures these rights are safeguarded. Safety rules on stepping distances and gaps are set out in its national safety rules on trains. The National Investigations Body is the investigation branch and carries out investigations after train accidents have occurred within the Federal boundaries. It then initiates the appropriate preventive and corrective measures for the future. Train Accident- Bad Aibling 2016 In the month of February 2016, two trains in the Bad Aibling region of Germany were involved in a fatal collision which resulted in the deaths of more than ten persons (Railway Gazette, 2016). In addition, more than 85 people were also injured with varying degrees of severity. The accident occurred on the Mangfall Valley Railway which is single-track and involved two Meridian branded trains operated by Bayerische Oberlandbahn. The two trains had passenger numbers in excess of 150 persons. Both trains and the railway line were fitted with a train protection system (PZB) which is a safety measure designed to prevent train locomotive drivers from passing signals at danger by mistake. This safety feature is meant to reinforce signaling system at the sides of the railway track. According to the investigation reports, the cause of the accident was caused by the train controller who confessed that he had been playing a computer game and was distracted (Zuvela, 2016). While playing on his mobile phone, he transmitted the wrong signaling information to the two trains. When he realized his error, he tried to engage in emergency protocols by sending corrective codes to the two trains. He keyed in the wrong codes and this did not rectify the initial error he had made. The trains collided as they approached a bend which could have contributed to both drivers no seeing each other before the crash. Both trains had a driver and their instructor and were travelling at a relatively high speed when the accident occurred. The automatic braking system that is meant to stop trains that are not scheduled at that time failed to work during the accident. The breach on safety that translated the risk into an accident has been narrowed down to lapse of attention and breach of safety protocols. The lapse of attention was the primary offsetting cause that was compounded by the breach of safety rules. Lapses can be defined as omissions and missed actions that are caused by lack of proper attention to the task at hand. Most causes of lapse in attention are caused by boredom due to the repetitive nature of a task or job (Hopkins, 2014). Another cause could be attributed to fatigue which has been identified as an Occupational Health Safety hazard. It can result in reduced awareness in situations and impaired procedural memory and the reduced ability to recall information stored in the brain (Dawson, 2012).It can also lead to a state of reduced self-monitoring and greater divergence from the ideal desired state when working. The breach of safety protocols is in relation to not following the laid out procedures that should be followed in directing traffic over single track rails. The system used over the stretch where the accident occurred was the token block which allows for one train at a time to use the railway line (Sharples, 2016). The traffic controller did not check for the schedules of trains for that particular time and gave the go ahead for both trains to use the single track. His instructions disabled the Automatic Train Protection system temporarily. The onboard systems of both trains together with railway track system were disabled. This made it impossible for the system to work automatically and also cut off the input of the train drivers. Recommendations, Change of Policy and Implementation. The German Rail Accident Investigation agency carried out investigation into the accident and made several recommendations. The investigation showed that the documentation used by the company managing the tracks was outdated and incorrect in some areas. It did not also contain instructions for radio use in emergencies. The owner of the railway line at Bad Aibling is Deutsche Bahn which runs its operations through its subsidiary DB Netze. DB Netze is responsible for ensuring safety and controlling traffic. The company uses Automatic Train Protection (ATP) system which has some shortcomings on safety protocols. Bleiker (2016), states that the report recommended the implementation of the European Train Control System instead of the current system being used. The company as part of its policy change embarked on working with German Institute for Open Communications systems (FOKUS) in order to certify open-source software using the European standard across its infrastructure (Bleiker, 2016). The software is intended to reduce human errors along high speed railway tracks and to enhance safety of train passengers and crew. Human failure and technical mistakes are the most common cause of train accidents like the one witnessed at Bad Aibling (AP, 2016). The software is meant to be standard across the entire infrastructure operated by Deutsche Bahn. This standardization should result in lower costs of operating uniform safety standard protocols. In addition, Deutsche Bahn adopted an integrated Management System that factors in safety in its Safety Management System. The implementation involved the installation of a safety management system using global certification at its Schenker Logistics office (DB, 2017). This safety management system is comprehensive and includes measures and protocols that deal with occupational health and safety, management during emergency and fire safety. This is implemented using administrative actions in order to reduce hazards along its infrastructure (Safe Work Australia, 2017). This holistic approach looks intoinputs that affect productivity as human factors. This is intended to reduce human errors as in the case of the Bad Aibling accident. Actions to be taken in emergency and crisis situations are also included as part of the safety management framework. These risk and safety measures are continuously updated to fit the current best industry practices. The railway line operator has also undertaken a long-term infrastructure upgrade including its trains. The operator has embarked on an upgrade of stretches of its infrastructure which it operates. This involves modernizing the technology which controls the signal systems on danger and command protocols (SKF, 2017).This upgrade also involves building new lines which use new technology on control technology. The operator has undertaken a program to replace its existing fleet of trains with the new ICE-4 which has more security features. This includes smart sensor technology in its wheels which uses redundancy protocols. The sensors are integrated in the bearing unit and works with the existing safety signal systems. Hazards and risks are a common occurrence at work and require measures in mitigation which incorporates risk and safety features. The risk and safety management within Germany train operations is based on European standards and made operational at the Federal and regional level. The policy framework postulated is transposed into national laws and regulations. The train accident at Bad Aibling was the result of breaches in safety and risk management. The investigation that followed identified gaps in the risk assessment and asset management process. Recommendations made were implemented as a policy shift and infrastructure upgrade. This is to aid in eliminating potential risks in the future. References (2016). Cause of deadly German Train crash still a Mystery. CBS News. Retrieved from https://www.cbsnews.com/news/germany-train-crash-bad-aibling-human-error-or-systems-failure/ Biennial Report. (2016). Railway Safety Performance in the European Union. European Union Agency for Railway Safety. Retrieved from https://erail.era.europa.eu/documents/SPR.pdf Bleiker, C. (2016). After Bad Aibling: railway safety in Europe. DW. Retrieved from https://www.dw.com/en/after-bad-aibling-railway-safety-in-europe/a-19037919 BMVI. (2017). Railway Operating Safety. Retrieved from https://www.bmvi.de/EN/Topics/Mobility/Rail/Railway-Operating-Safety/railway-operating-safety.html Dawson, D. (2012). Fatigue Risk Management: A safety Management systems approach. Criterion Conferences. Retrieved from https://www.cqu.edu.au/__data/assets/pdf_file/0020/51851/HFESA.pdf (2017). Enhancing Safety Standards. Retrieved from https://ib2014.deutschebahn.com/ib2014-en/additional-info-sustainability/customer-and-quality/enhancing-safety-standards.html EBA. (2017). Federal Railway Authority. Retrieved from https://www.eba.bund.de/EN/home_node.html Hopkins, A. (2014). Safety culture and Risk. Wolters Kluwer. Railway Gazette. (2016). The Price of Safety. Retrieved from https://www.railwaygazette.com/analysis/single-news/view/the-price-of-safety.html Safe Work Australia. (2017). Identify, assess and control Hazards. Retrieved from https://www.safeworkaustralia.gov.au/risk Sharples, S. (2016). Germany Train crash-ways in which rail Safety systems can fail. Phys. Retrieved from https://phys.org/news/2016-02-germany-crashways-rail-safety.html SKF. (2017). Deutsche Bahns new trains run more efficiently and longer with advanced technologies. Retrieved from https://www.skf.com/il/news-and-media/news-search/2017-06-13-deutsche-bahns-new-trains-run-more-efficiently-and-longer-with-advanced-technologies-from-skf.html Zuvela, M. (2016). Prosecutor identifies Human Error as cause of Bad Aibling Train Disaster. DW. Retrieved from https://www.dw.com/en/prosecutor-identifies-human-error-as-cause-of-bad-aibling-train-disaster/a-19051663

Thursday, November 28, 2019

The Ice Age Essays - Pleistocene, Mammoth, Permafrost, Tundra

The Ice Age Twenty thousand years ago during the time of the last ice age period, many colossal mammals roamed North America. They survived during the times when much of the earth was covered by immense large bodies of ice that buried forests, fields, and mountains, but rapidly became extinct after the ice began to retreat and melt. Since then the human race has introduced many different theories to explain the extinction of these large mammals. One theory stands above all and explains the truth of this mysterious disappearance. The Paleo Indians that entered North America from Asia, the climate change, soil, vegetation and water levels were all major factors in this extinction. The results of these factors left the biggest impact on the food chain of these animals. The domino-effect of all these factors is responsible for the extinction of the ice age mammals. Animals, like all other living organisms have a tendency to adapt to the environment in which they live. A cold climate favors large animals, since large animals have more body fat and lose heat at a slower rate then do smaller animals. That is why many of the mammals that lived during the ice age were enormous. These large animals consisted of ground sloths and armadillos which came northward from South America, and horses, saber-toothed cats, mammoths, antelopes, and muskoxen that crossed over the land bridge from Asia into North America. For the longest time fossils from many parts of North America were the only evidence that many of these large beasts had once roamed the land, but in the spring of 1846 an unbelievable event happened that brought the world a step closer to the mystery of this great extinction. A Russian explorer Benkendorf and his survey team from Russia were heading for the mouth of the Indigirka River in Siberia. When they reached the spot of their destination, the land had disappeared and everything had changed. Left behind was two miles wide of torn up land, and wild waters carrying rapidly masses of peat and loam. In the mixture of the mess they seemed to notice what was once one of the mammoths who roamed the earth during the ice ages. (Chorlton 53) Our patience was tried. At last, however, a huge black horrible mass bobbed up out of the water. We beheld a colossal elephants head, armed with mighty tusks, its long trunk waving uncannily in the water, as though seeking something it had lost. Breathless with astonishment, I beheld the monster hardly 12 feet away, with the white of his half-open eyes showing. 'A mammoth! A mammoth!' someone shouted. (Chorlton 54) An elephant with a body covered with thick fur about thirteen feet in height and fifteen in length with tusks eight feet long that curved outward at the end. It had a trunk six feet long and colossal legs one and a half feet thick. The beast was fat and well grown. The outer hair was like wool, very soft, warm and thick, it was definitely well protected from the cold.(Chorlton 54) Unfortunately the mammoth soon began to decay and was swept away by the rapid waters. This dramatic find brought the world face to face with one of the great mysteries of the ice age, the sudden extinction of the great colossal mammals. These large mammals at one time lived in peace and survived gracefully for thousands of years, they adapted to the cold climate and tundra surrounding them. With an adequate food chain and nothing to affect it they were bound to survive forever, but because of simple changes that eventually triggered many other factors these animals are extinct and will never be on this earth again. When the massive continental glaciers locked up great quantities of water, the sea levels lowered which exposed parts of the shallow sea floor, therefore, the Bering Strait did not exist. Eleven thousand, years ago many Paleo Indians were able to cross the land bridge between Asia and North American which enabled them to populate North America. The great amount of large animals attracted these people to the frozen waste lands. In all hunting that ends with the extermination of a species, the motivation is never hunger. Money, and the greed for it, have been the incentive. The savage does not know these, he hunts to eat and so is unable to decimate the big game to any important extent (Cornwall 117) The large mammals of North American were never exposed

Monday, November 25, 2019

Telemachus essays

Telemachus essays Telemachus is the son of the great king Odysseus. However, without a father there to lead and teach him Telemachus is lost in the world of manhood. Everyone says that Odysseus was a righteous, fair king and a hero. However, Telemachus has no proof of this. He has never seen his father and his grandfather has shunned the throne and turned to farming. The people of Ithaca seem to have a standard for Telemachus to reach since he is the son of a great hero. However, Telemachus is lost and confused. He is trying to find his true identity, but without a father-figure, he only has the imprudent suitors to which to turn. When Athena, their guardian goddess, takes the form of Mentes and goes to the palace of Odysseus, she finds Telemachus feasting with the suitors. When Athena comments on the resemblance of Telemachus to Odysseus, he responds by saying . . . Mother has always told me Im his son, its true, but I am not so certain (lines 249-250). Feeling deserted by his father, Telemachus dons the identity of the suitors the only role-models he has known. It seems that the suitors have even slightly turned him against his own father by pressing ideas into Telemachus head that his father has left him alone and died a shameful death after leaving Troy. While Athena is still prodding for information from Telemachus, he makes the comment of I would never have grieved so much about his death if hed gone down with comrades off in Troy. . . and hed have won his son great fame for years to come. . . hes left me tears and grief. (lines 274-82) The danger of the suitors corrupting Telemachus is obviously present in that statement. Telemachus has only seen disorder, destruction, and chaos in his palace. He does not know how to make peace or how to set right the ways of Ithaca. However, once...

Thursday, November 21, 2019

Assignment Example | Topics and Well Written Essays - 250 words - 243

Assignment Example A dollar can be strong or it can be weak. A strong dollar helps the export sector of countries around the world. A strong dollar is good when inflation is not a problem. Conversely, a weaker currency increases the purchasing power of the Americans. A strong dollar is a disadvantage to the policy makers. However the US benefits from a strong dollar because it does not depend on exports. The countries whose economies are not strong as compared to the US lose when the dollar becomes strong. This means that their currency is losing value. In conclusion, a floating exchange rate is the exchange rate where the currency is set by the forces of demand and supply. These forces are in the foreign exchange market. The floating exchange rate change freely and are determined in the forex market. There is a managed float currency exchange system. This system unlike the later is subject to interventions by the monetary authorities. It is not dependent on the forces of demand and supply. The government may have set objectives that it wants to achieve and it interferes with the forces of demand and supply in the managed float currency exchange system. (Devereux,

Wednesday, November 20, 2019

Macroeconomic Convergence, Financial Development and Economic Growth Coursework

Macroeconomic Convergence, Financial Development and Economic Growth - Coursework Example The theory of absolute convergence states that the growth level of countries initially varies due to the difference in their levels of capital. The second theory of conditional convergence states that each country has a steady state and they converge to their own level of the steady state. The paper focuses on the effect of convergence on China and the resultant financial development and economic growth in this country. Deep-down analysis of the fact that poor countries can catch up to the rich countries through the increase in the average rates of growth has been carried on for a proper understanding of this topic. The investigation of the way in which the financial development and economic growth of China helped it to reach the position equivalent to a developed country is considered for the purpose of review. The Solow swan model and laws of diminishing marginal utility are used to help in the process of interpretation of the topic in a simple and easy manner. The empirical evidence is laid down in the paper along with charts to facilitate the process of understanding. The idea of catch-up-effect or convergence in economics is based on the hypothesis that the per capita income of the poorer economies will tend to grow at a much faster rate than the richer ones. The resultant factor is the convergence of both the economies in terms of the per capita income. The financial functions control the investment and saving decisions, technological innovations and therefore economic growth (Shahbaz, Khan and Tahir, 2013). Classical theories: The Ricardian theory of production and growth are related to the law of variable proportion. The law states that if any factor of production is increased while keeping the other same with no technological changes, there can be an increase in the output but in diminishing rate. This increased output eventually approaches towards zero.

Monday, November 18, 2019

Berkeley provides (at least) two objections to Lockes Essay

Berkeley provides (at least) two objections to Lockes - Essay Example In his second Principle, Berkeley claims that objects must be perceived in order to exist, â€Å"for the existence of an idea consists in being perceived† (Berkeley 461). He bases this premise on the evidence that thoughts, passions and imaginative ideas cannot exist without a mind capable of perceiving them. â€Å"And (to me) it seems no less evident that the various sensations or ideas imprinted on the sense, however blended or combined together (that is, whatever objects they compose), cannot exist otherwise than in a mind perceiving them† (471). This goes directly against Locke’s concept of primary properties which are described as properties of an object that are true regardless of who perceives them or even whether they are perceived. Examples of primary properties include the object’s solidity, its figure, its relative motion to its surroundings and its quantity. In the example of a table, primary properties might include its hard surface and open a rea between the legs, its flat surface and height from the ground, its motionless status within the room and its singular status as an object. While Locke says that these things exist whether or not anyone perceives them, Berkeley suggests that none of these elements of the object can be true without someone first perceiving that they’re true. In this, he essentially applies Locke’s concepts of secondary properties to the entire object, eliminating primary properties. â€Å"In truth, the object and the sensation are the same thing and cannot therefore be abstracted from each other† (471). Another area in which Berkeley disagrees with Locke is in the characterization of our understanding. Locke indicates that our perceptions and experiences of the world are learned and shaped by our experiences of innate things that exist in the material world independently of perception while Berkeley

Saturday, November 16, 2019

The IMF, World Bank and the Washington Consensus

The IMF, World Bank and the Washington Consensus The Washington Consensus was created in 1989 by John Williamson; it was used to describe the 10 policy prescriptions. The Washington Consensus was made to be the baseline of directions for countries, who are in need of assistance from international economic entities, for example the international Monetary Fund and the World Bank. Washington Consensus has been referenced many times; this has made it a general term of disparagement to those who go against the free market fundamentalism. (Williamson 1989) The ten points of the Washington Consensus were rather vague because they were to represent a baseline. The points included were, liberalizing foreign investment opportunities, keeping competitive exchange rates within the nation, privatizing enterprises run by the state, letting interest rates be handled by the market and remaining positive and moderate, strong legal guarantees for property rights, spending away from subsidies and to direct investments in infrastructure, education and health care, deregulation and reduce competition, except for consumer safety, environmental health and financial institutional stability. The last point raised is reforming the tax system to a broader tax base. (Williamson 1989) The Washington Consensus has resulted in limited success when it has been applied in nations which are suffering economic crisis. It has come under some criticism for a number of destabilisations for example the Argentinean crisis. John Williamson himself noted that the results have been disappointing upon implementation and how it could be improved and noted some of the flaws. John Williamson pointed out that the reason for failed results were that the Washington Consensus did not place any special measures on mechanisms for avoiding economic crisis. (Williamson 1989) People who opposed the ideas of the Washington Consensus believe that it represents exploitation of developing countries by developed countries. Some nations in Latin America have implemented policies which go directly against the Washington Consensus which resulted in good results in some occasions. Some socialist leaders like Evo Morales, Hugo Chavez and Nestor Kirchner have all spoken out against the Washington Consensus and implemented policies which have taken their nations to very different directions. (Reed 2007) Though other Latin American counties with governments of the left wing have in practice adopted the bulk of the policies included in Williamsons list but they often criticize the principles of market fundamentalism that they are often associated with. These policies have been promoted by the International Monetary Fund but have come under some criticism by US economists like Rodrik and Joseph Stiglitz. They have both challenged the fundamental policies of the IMF (International Monetary Fund) and the US treasury, Stiglitz called this a one size fits all action for individual economies. Joseph Stiglitz stated that the treatment that was suggested by the IMF is far too basic; he said the policies did not prioritise or look for side effects. (Reed 2007) The policies for the Washington Consensus were originally created as a response to the crisis that was happening in Latin America. In 2010, several nations from the area are now being led by socialists or other left wing governments. Some of the countries are campaigning for and have adopted some policies which are opposite to the Washington Consensus policies. Even though some nations in Latin America have left wing governments such as Chile, Peru and Brazil, they have still adopted most of the policies that are in the Washington Consensus, even though they go against the principle of market fundamentalism that on such occasions are associated with. (Reed 2007) There has been a lot of criticism about the Washington Consensus. Most of the criticism has been focused on the elimination of subsidies and on trade liberalisation. The criticism has been rather harsh towards the agriculture sector. Countries which have a substantial amount of natural resources, they have criticised the privatisation of industries exploiting these resources. Neo-Keynesian and post-Keynesian have both been very critical of the consensus and they have argued that the core policies were wrongly been laid out and are too inflexible to be successful. An example of this would be flexible labour laws were supposedly meant to create new job opportunities; economic evidence from Latin America has been largely inconclusive. Some critics have criticised that the policies do not take into account of the cultural and economic differences between the nations. They believe that these policies should be only implemented at times of economic growth and should not be implemented during economic crisis. (Naim 1999) Foreign Policy chief editor, Moises Naim, argued that there was no such consensus in the first place. Moises Naim had argued that there was and still is important differences between economists over what is the best and correct economic policy. This is the reason the idea of there being a consensus was also flawed. (Naim 1999) SOURCE: WORLD BANK and ECLAC As you can see from the chart above, it shows that Brazil and Latin America who have implemented the Washington Consensus from 1990-2004 have showed that the Economic Growth has dropped by more than half. East Asia economic growth has gone up and they have not implemented the Washington Consensus. This has shown that the Washington Consensus has had a considerable impact on the growth. East Asia did not follow the Washington Consensus policies in some important respects. They adopted strong industrial and government policies, as well as creating successful government enterprises. They were also slow to liberalise capital markets and trade. Such difference accounted for the performances between East Asia and Latin America, because of this there was faster and increased growth in East Asia. They also benefited from growth that was widely shared and became more stable except for the 1997 crisis where all the countries recovered quickly expect for Indonesia. (Franko 2007) SOURCE: ECLAC SOURCE: ECLAC The adoption of the Washington Consensus has had an immense impact on GDP per Capita. The GDP per Capita at the end of 2003 is -0.3 % and in the 1960s it was 2.6% The Washington Consensus policies had only produced very limited growth, but when growth occurred it was not equitably share. The Washington Consensus was at best indifferent, and at worst hostile, to specific ideas and policies that would have promoted equality. Unemployment rates have steadily been rising and the Washington Consensus has no impact on reducing unemployement rates. Critics of trade liberalisation such as Tariq Ali and Susan George, see that the Washington Consensus is a way to open up labour markets of underdeveloped economies so companies from developed nations can exploit this. Washington Consensus allows free movement of items across the borders, however labour is not allowed to move freely there are requirements like a work permit or a visa. This then creates a scenario which goods are manufactured by cheap labour in developing nations and then these good are exported to developed nations for a big mark-up. The criticism of this is that the underdeveloped economies workers remain poor, any pay rises that the workers may receive over the money they made before the trade liberalisation are then offset by inflation. Developed nations workers become unemployed because of work being moved offshore and the owners of the businesses become richer. (Reed 2007) Joseph Stiglitz believed that the Washington Consensus had proved that it was neither sufficient nor necessary to be successful for development. He believed that even if each of its policies made sense for specific nations at specific times it was still unsuccessful. Joseph Stiglitz said that any future consensus cannot be made just in Washington and that any new framework should provide tailored adaptation to particular circumstances that the nations are involved in. (Change, 2001) There has been a lot of criticism of the Washington Consensus policies; there has been evidence of their impact on health, which has led to the development of the post-Washington Consensus. The ideas and policies of the post-Washington Consensus aimed to: Create vertical and horizontal policy coherence Include the creation of enforceable codes and standards, and concessions to social welfare through targeted social safety nets Manage liberalized trade, finance and monetary systems Include firms and businesses in a Global Compact for Development and the PRSP process. Many supporters of the post-Washington Consensus believe it differs from the original ideas and fundamentals of the Washington Consensus. The main goal for the Washington Consensus was to make economic growth in development. The new post-Washington Consensus differed from this and moved away from the neo-liberal, market-friendly approach and places sustainable, egalitarian and democratic development at the heart of the agenda. The post-Washington Consensus is more focused on poverty, which supports and protects the poor and aims towards social spending on health and education. Some still argue that the original ideas of the Washington Consensus neo-liberal agenda still underpins the new ideas and policies of the post-Washington Consensus, referring to the social safety net aspects of the new policies are there to be an add-on to cope with market failures. (World Health Organisation 2010) Joseph Stiglitz believed that new framework was needed to guide us to stable, democratic, sustainable and equitable development. He also believed the framework should reform global economic architecture to promote efficiency, developing countries to focus on their goals and objectives, stability and equity among nations. The post-Washington Consensus looks at the importance of employment, and balanced roles of the government and markets. This would be completed by promoting and regulating markets, providing physical and institutional infrastructure and also by endorsing innovation, technology and education. (Change 2001) The Post-Washington Consensus recognises the importance of the a nation in open markets as well as more liberal policy environment. This approach sees the importance of avoiding state failure which needs institutional innovation and democratic governance. The Post-Washington Consensus sees the need to tackle inequality as well as poverty as their main objectives looking away from efficiency and growth objectives. An example would be that markets, themselves do not produce efficient outcomes when there is a changing of technology or the learning about markets. These processes are important in development and East Asian countries recognised this but the Washington consensus did not. In respect to all these points the Post-Washington Consensus is a more progressive approach to development compare to the Washington Consensus. (Onis and Senses, 2005) There has been criticism of the Post-Washington Consensus that it adopts a technocratic and narrow approach to markets in both a global and at national level. The Post-Washington Consensus sees existing power structures as pre-determined. This is the reason why it fails to tackle the asymmetries of power and the fundamental power relations that are between the classes at level of nation state, and also the powerful versus less strong nations in the economy. These issues would need to be tackled in order to get over development issues. (Onis and Senses, 2005) The IMF and the World bank have not welcomed the Post-Washington Consensus policies. The IMF went through a crisis with their identity straight after the Asian crisis and they have been trying to reform themselves. However the IMF has a restrictive understanding and viewpoint of what should be the foundations for the Post-Washington Consensus. This has had vital consequences because the IMF is an important player for crisis nations and emerging nations. (Onis and Senses, 2005) The criticisms that was given to the Washington Consensus by the newly designed Post-Washington Consensus has fallen short in terms of dealing with the main issues but the Post-Washington Consensus still has cracked the neoliberal approach, which may lead to new and fresh viable alternative. The jury is still out for the Post-Washington Consensus as a definitive viable alternative but together with flourishing other globalisation movements and alongside the background of growing distributional imbalances at every level, this would bring such a change to be an alternative option.

Wednesday, November 13, 2019

Charlie Chaplin :: essays research papers

When Charlie Chaplin was a little boy, a sheep escaped on its way to a slaughterhouse near where he lived. Charlie and other youngsters chased the sheep around, laughing and having fun. But when it was taken away, Charlie realized the sad finality of death and cried to his mother. That incident paved the way for the theme of Charlie’s future filmmaking career. Comedy mixed with pathos made perfect sense to him. He was also an everyman character, a lost soul, a wanderer - he embodied the American soul. He could be anyone. Chaplin was born Sir Charles Chaplin after his father on April sixteenth, 1989. His mother, Hannah Chaplin, was often put in mental houses and his brother Sydney and him were put into children’s workhouses. His father whom he almost never saw died of alcoholism. Charlie’s childhooCharlie directed and produced it. Its length is six reels, roughly an hour long. The Kid expertly showed Charlie’s use of pathos in his work, if perhaps too much pathos this time The Gold Rush. This 1925 film was a favorite of Chaplin’s. Charlie plays a lone prospector on a gold seeking quest in the Sierra Nevadas. Seeing shelter, he stumbles into a cabin where the villainous Black Larson lives. Black Larson doesn’t like this new guest and tells him to leave, rifle in hand. Charlie tries to leave, but a hilarious wind keeps blowing him back into the cabin. During this escapade in blows another luckier prospector, Big Jim McKay. Jim and Larson fight, and Larson goes off to find food for the trio. Meanwhile, the starving Charlie and Jim have the trademark meal of Charlie’s cooked boot. In this scene, Charlie eats the boot like it were a fine meal at a fine restaurant, twirling the laces around a fork like spaghetti. Later on they bid farewell, and Charlie finds a town with a love interest of his, Georgia. He invites her to a New Years Eve dinner, which she doesn’t come to. At the dinner, we see Charlie dozed off at the table, and he dreams that the Georgia came. Here is another trademark scene, the dance of the dinner rolls. Charlie spears two dinner rolls with his fork, and bowing his head down over them, he makes them dance and twirl. Big Jim shows up at the town now, and sees Charlie, telling him if he they find Black Larson’s cabin, they will find gold and be rich.

Monday, November 11, 2019

Human sexual behavior Essay

Sexual assault takes many forms including attacks such as rape or attempted contacts or threats. Usually a sexual assault occurs when someone touches you in a way, even through clothes, without that person’s consent. Some types of sexual assault include forced sexual intercourse, sodomy, or fondling and attempted rape. Sexual assault in any form is often a devastating acquaintances, friends, or family members. Assailants commit sexual assault through manipulation, pressure or tricks. Drinking and sexual assault, alcohol is often a contributing factor in sexual assault. A perpetrator may even buy a person drinks to intentionally increase the chances of being manipulate the senses and their judgment. Even if we pick up a danger sign or trust them. Tisa advisable to avoid having sex when you’ve had a lot to drink, because even if you have a condom, you’ll be much less likely to use it correctly and therefore face another consequence. Movies, television shows and music are full of sex. It seems that the world is all about sex. Parents and students both need to know what is happening in the worlds and among themselves. Talking about sex seems like a good way to begin by educating our children of the rights and wrong of such sexual activity. When it come to children being involved with sex; Now on child abuse cases, I believe that no single act such strong emotions as the act of child sexual abuse. Child molesters can not even find refuge in prisons where rapist and murderers are commonplace. These offenders are shut out in aspect of our society, yet there are no reasons as to the causes of this behavior. Sexual abuse of children is not new, and has not always been socially taboo. Back in the days it was a commonplace for adolescent males to be forced into sexual relationship with mature males. This behavior was normal and not objected to by the child’s parents but sex with children in the modern era is alive and well, the power of an older person is so great that their young victim often never tell of the horrors that they have experienced. It is just like the pedophiles who confessed that they insist that their behavior is not wrong. Because of the extreme sensitivity of this subject, research has been really difficult and quite hard to develop. In the case of the pedophiles in order for the community or society to go into further deepest they must first attempt to gain an understanding of WHY? Pedophiles can be classified into different categories by several issues, the most common of which are causation and victim-realtionship.Howerever; pedophiles can be separated by those who sexually abuse members of their own family and those who abuse non family members. The reasons rapists are going free is when will the men and woman of our world be able to live their lives without being raped by another person? I feel many men and woman are getting away with harming another person through sexual confrontation without their permission. Men as well as woman can be raped, but fewer men will the police about it they would rather keep it under because they are being criticized for being weak which are untrue. Both, men and woman are the scary thing is that there is a possibility that their cases will not be product of their rape kits are not being processed efficiently. These are the ones that are not being brought to trail. Going back to the Megan’s Law when people think of their neighbors, do they think of violent sex crimes? Many people have to deal with this everyday of life. There are no laws forcing people of a community when a sex crime offender moves into their town. Said to keep violent sex crimes offenders from staking again, but do we ask ourselves this questions? The answer all depends on the opinion of the person who is being asked. Many supporters of the Megan’s law say that the law is keeping some predators from striking again, but many critics says that the laws is unethical and many agreements come from that. This is another question proposed when the topic of sexual offenders brought up, is it breaking any of the amendments or is it necessary for co workers to know whether a sex crime offender is living in their neighbors. Are you a juvenile or an adult? Megan’s law makes this question very complicated. Some times we might think we are juvenile’s, but by law we can be and treated as an adult. At the age of 13, you can go to some health clinics and get some medical treatments and testing done without your parent’s permission, such as pregnancy, alcohol/drug, and sexual transmitted diseases. Most of the time, if you are under 18, you need your parents permission, unless you are married, or in the military. At 15 Â ½ you can get a special permit to drive with a legal guardian, but if you break a traffic law you are considered an adult if you commit crime, such as killing, drug related, rape, repeated offenses, or stealing a car. If you are under 18, and are picked up by a police officer and taken to juvenile court, a juvenile officer will decide how to handle your case. Then a juvenile judge hears the evidence with you and your parents. The judge studies the whole complete picture of you, and your crime, and then decides as to whether or not your case will be held in juvenile Court or in Adult Court. If your cases are held in Juvenile Court and you are found guilty, and since he has made a complete study of you and your case, he will be the one to decide how and what will happen to you. If you are tired as an adult and found guilty, naturally the punishment will be more severe.

Friday, November 8, 2019

A Guide to the History of Mongooses

A Guide to the History of Mongooses Mongooses are members of the Herpestidae family, and they are small carnivorous mammals with 34 separate species found in about 20 genera. As adults, they range in size from 1-6 kilograms (2 to 13 pounds) in weight, and their body lengths range between 23-75 centimeters (9 to 30 inches). They are primarily African in origin, although one genus is widespread throughout Asia and southern Europe, and several genera are found only on Madagascar. Recent research on domestication issues (in the English language academic press, anyway), has principally focused on the Egyptian or white-tailed mongoose (Herpestes ichneumon). The Egyptian mongoose (H. ichneumon) is a medium-sized mongoose, adults weighing about 2-4 kg (4-8 lb.), with a slender body, about 50-60 cm (9-24 in) long, and a tail about 45-60 cm (20-24 in) long. The fur is grizzled gray, with a markedly darker head and lower limbs. It has small, rounded ears, a pointed muzzle, and a tasseled tail. The mongoose has a generalized diet that includes small to medium-sized invertebrates such as rabbits, rodents, birds, and reptiles, and they have no objections to eating the carrion of larger mammals. Its modern distribution is all over Africa, in the Levant from the Sinai peninsula to southern Turkey and in Europe in the southwestern part of the Iberian peninsula. Mongooses and Human Beings The earliest Egyptian mongoose found at archaeological sites occupied by humans or our ancestors is at Laetoli, in Tanzania. H. ichneumon remains have also been recovered at several South African Middle Stone Age sites such as Klasies River, Nelson Bay, and Elandsfontein. In the Levant, it has been recovered from Natufian (12,500-10,200 BP) sites of el-Wad and Mount Carmel. In Africa, H. ichneumon has been identified in Holocene sites and in the early Neolithic site of Nabta Playa (11-9,000 cal BP) in Egypt. Other mongooses, specifically the Indian gray mongoose, H. edwardsi, are known from Chalcolithic sites in India (2600-1500 BC). A small H. edwardsii was recovered from the Harrappan civilization site of Lothal, ca 2300-1750 BC; mongooses appear in sculptures and associated with specific deities in both Indian and Egyptian cultures. None of these appearances necessarily represent domesticate animals. Domesticated Mongooses In fact, mongooses dont seem to have ever been domesticated in the true sense of the word. They dont require feeding: like cats, they are hunters and can get their own dinners. Like cats, they can mate with their wild cousins; like cats, given the opportunity, mongooses will return to the wild. There are no physical changes in mongooses over time which suggest some domestication process at work. But, also like cats, Egyptian mongooses can make great pets  if you catch them at an early age; and, also like cats, they are good at keeping the vermin down to a minimum: a useful trait for humans to exploit. The relationship between mongooses and people seems to have taken at least a step towards domestication in the New Kingdom of Egypt (1539-1075 BC). New Kingdom mummies of Egyptian mongooses were found at the 20th dynasty site of Bubastis, and in Roman period Dendereh and Abydos. In his Natural History written in the first century AD, Pliny the elder reported on a mongoose he saw in Egypt. It was almost certainly the expansion of the Islamic civilization that brought the Egyptian mongoose into southwestern Iberian peninsula, likely during the Umayyad dynasty (AD 661-750). Archaeological evidence indicates that prior to the eighth century AD, no mongooses were to be found in Europe more recently than the Pliocene. Early Specimens of Egyptian Mongoose in Europe One nearly complete H. ichneumon was found in the Cave of Nerja, Portugal. Nerja has several millennia of occupations, including an Islamic period occupation. The skull was recovered from the Las Fantasmas room in 1959, and although the cultural deposits in this room date to the latter Chalcolithic, AMS radiocarbon dates indicate that the animal went into the cave between the 6th and 8th centuries (885-40 RCYBP) and was trapped. An earlier discovery was four bones (cranium, pelvis and two complete right ulnae) recovered from the Muge Mesolithic period shell middens of central Portugal. Although Muge itself is securely dated to between 8000 AD 7600 cal BP, the mongoose bones themselves date to 780-970 cal AD, indicating that it too burrowed into early deposits where it died. Both of these discoveries support the intimation that Egyptian mongooses were brought into southwestern Iberia during the expansion of the Islamic civilization of the 6th-8th centuries AD, likely the Ummayad emirate of Cordoba, 756-929 AD. Sources Detry C, Bicho N, Fernandes H, and Fernandes C. 2011.  The Emirate of Cà ³rdoba (756–929 AD) and the introduction of the Egyptian mongoose (Herpestes ichneumon) in Iberia: the remains from Muge, Portugal.  Journal of Archaeological Science  38(12):3518-3523.Encyclopedia of Life.  Herpestes. Accessed January 22, 2012Gaubert P, Machordom A, Morales A, Là ³pez-Bao JV, Veron G, Amin M, Barros T,  Basuony  M, Djagoun CAMS, San EDL et al. 2011.  Comparative phylogeography of two African carnivorans presumably introduced into Europe: disentangling natural versus human-mediated dispersal across the Strait of Gibraltar.  Journal of Biogeography  38(2):341-358.Palomares F, and Delibes M. 1993.  Social organization in the Egyptian mongoose: group size, spatial behaviour and inter-individual contacts in adults.  Animal Behaviour  45(5):917-925.Myers, P. 2000. Herpestidae (On-line), Animal Diversity Web. Accessed January 22, 2012 http://animaldiversity.ummz.umich. edu/site/accounts/information/Herpestidae.html.Riquelme-Cantala JA, Simà ³n-Vallejo MD, Palmqvist P, and Cortà ©s-Snchez M. 2008.  The oldest mongoose of Europe.  Journal of Archaeological Science 35(9):2471-2473. Ritchie EG, and Johnson CN. 2009.  Predator interactions, mesopredator release and biodiversity conservation.  Ecology Letters 12(9):982-998.Sarmento P, Cruz J, Eira C, and Fonseca C. 2011.  Modeling the occupancy of sympatric carnivorans in a Mediterranean ecosystem.  European Journal of Wildlife Research  57(1):119-131.van der Geer, A. 2008  Animals in Stone: Indian mammals sculptured through time.  Brill: Leiden.

Wednesday, November 6, 2019

The Meaning of Vive la France!

The Meaning of 'Vive la France!' Vive la France! is an expression used in France to show patriotism. It’s difficult to translate the term literally into English, but it generally means â€Å"long live France!† or â€Å"hurray for France!† The phrase has its roots in  Bastille Day, a  French national holiday commemorating the storming of the Bastille, which took place on July 14, 1789, and marked the beginning of the French Revolution. Patriotic Phrase â€Å"Vive la France!† is mostly used by politicians, but you will also hear this patriotic expression bandied about during national celebrations, such as Bastille Day, around French elections, during sporting events, and, sadly, at times of crisis as a way to invoke patriotic feelings. La Bastille was a prison and a symbol of the monarchy in late 18th century France. By capturing the historic structure, the citizenry signaled  that it now held the power to rule the country. Bastille Day was declared a French national holiday on July 6, 1880, on politician Benjamin Raspails recommendation, when the  Third Republic  was firmly entrenched. The Third Republic was a period in France that lasted from 1870 to 1940. Bastille Day has such a strong signification for the French because the holiday symbolizes the birth of the republic. The related phrase Vive le 14 juillet! (literally â€Å"Long live the 14th of July!†) has been associated with the historic event for centuries. The key term in the phrase is vive,  an interjection that literally means long live. The Grammar Behind Vive la France French grammar can be tricky. The term vive  is no exception. Vive  comes from the irregular verb â€Å"vivre,† which means to live. Vive is the subjunctive. So, an example sentence might  be: Nous souhaitons, nous espà ©rons que la France vive longtemps, heureusement. This translates to: We hope that France will live for a long time, fortunately. Note, that the verb is vive and not viva, as in Viva Las Vegas, and it is pronounced veev, where the final e is silent. Other Uses for Vive The expression vive is very common in French to show enthusiasm for many different things, such as: Vive les vacances!   Hurray for the vacation! Vive les soldes! Hurray for the sales season! Vive moi! Yeah me! Vive  is also used in a number of other contexts that are not related to the famous phrase but still important in the French language. Examples include: On ne voyait à ¢me qui vive. There wasnt a living soul to be seen. Etre sur le qui-vive. To be on the alert. La vive- eau Spring tide Vivement Brusquely, sharply While the saying Vive la France is deeply rooted in French culture, history, and politics, the full slogan is generally invoked only on historical occasions and during political events. By contrast, the key term in the phrase, vive, is widely used by the French to express joy and happiness on many occasions. So, the next time youre in France (or find yourself among French-speakers who happen to use this famous phrase), impress them with your deep knowledge of French history. Source The Editors of Encyclopaedia Britannica. Bastille Day. Encyclopaedia Britannica.

Monday, November 4, 2019

Fear and Loathing on MySpace.com Essay Example | Topics and Well Written Essays - 1750 words

Fear and Loathing on MySpace.com - Essay Example But who is she hanging out with And who is lurking online in the shadows of MySpace leering at the profiles of these vulnerable tweens While some have hailed MySpace as the greatest social experiment of the century, others have called it a Sears and Roebuck catalogue for pedophiles. Social networking has forever altered the modern childhood relationship. This revolution has left our youngest children, ages 8-13, open to the threat of exploitation and for these kids MySpace is a dangerous space to be in. The greatest threat to these children who visit MySpace is the potential to be sexually solicited. A study conducted at the University of New Hampshire found that 1 in 5 children who have been online on a social network have experienced sexual solicitation (Mitchell, Finkelhor, and Wolak 3012). With the number of younger children creating a profile on MySpace skyrocketing1 this means millions of children are being exposed to this danger. As younger and younger children begin to logon and socialize, we put an age group at risk that are the least able to handle these abusive situations. Though MySpace requests that all users must be age 14 or older, younger and younger children are going online. ... Still, the children at risk get younger. A New Jersey Principal became concerned when "one of her 10-year-old students got an inappropriate message from "someone clearly an adult" ('"MySpace' Cadets"). This was on a school computer with close supervision. Younger children are able to deceive the registration process and could end up being molested or worse. The fact is that MySpace does not verify age and there is no way they can. The BBC reported in March 2006 that two men were arrested in the US over sex charges after they allegedly used MySpace to illegally contact their victims ("MySpace Tightens Age Restrictions"). One girl was just 11 years old. Though MySpace has made a token effort to tighten their age restrictions, they are well aware of the loopholes in security. They have even begun to warn teenagers of the danger. Recently, "the site introduced adverts warning teenagers about the dangers of sexual predators on the web" and the BBC contends that, "At the moment, MySpace has no way of verifying the age of users" ("MySpace Tightens Age Restrictions."). Currently there is not way to prevent an 8-year-old from registering as an 18-year-old. How easy is it for someone to pretend to be a different age or gender on MySpace According to computer security expert Richard Carlotti, anyone can do it. He says that MySpace currently uses the honor system and uses the information you supply it. He warns people that MySpace can never be safe for young children. He says, "If it is designed to be used by teen-agers, the security needs to be geared toward them, which means anyone with a 13 year old mind can subvert the system". The only way to increase the security is use biometric identification systems2 that are simply too expensive and

Saturday, November 2, 2019

Questions for Consideration (7-8) Assignment Example | Topics and Well Written Essays - 250 words

Questions for Consideration (7-8) - Assignment Example Since there is a similarity in the business operations irrespective of whether it is a small business or a large organization, then there should be no differential accounting. Furthermore, the introduction of differential account would lead to the formation of new accounting standard boards that would come up with the rules and regulations. This would require educating the auditors, financial analysts and accountants all over again. This would cost organizations a great deal of cash. Furthermore, there would be inconsistencies in financial records in case of dealings between the small companies and the large corporations. It would also not be cost effective for a private company that wants to go public since they would require changing a whole accounting system. In my opinion, the principles-based approach of coming up with accounting standards is better as compared to the rules-based approach. This is because the approach is not new to the U.S standard settings. Moreover, the approach has been in use for over 20 years thus financial departments of organizations are conversant with its framework. In addition, the principle-based method is detailed and precise for use. The approach also allows the developing of accounting from the conceptual framework ensuring a broad application and avoiding exceptions (Alexander and Britton 219). If the principle-based approach is universally adopted, there are several potential problems that may be experienced in the future. The increasingly detailed rules in the approach of the method would lead to accountants concentrating more on the required form rather than the substance of transactions. Furthermore, the required complex details of the method may lead to accountants structuring their business’s reports around the rules. This would lead to undesired accounting results (Alexander and Britton

Thursday, October 31, 2019

Bhp billiton PowerPoint Presentation Example | Topics and Well Written Essays - 1750 words

Bhp billiton - PowerPoint Presentation Example Slide 3 - 5 Panda Pit, BPH Billiton Open Cut Mining, BHP Billiton Crushed product awaiting shipment, BHP Billiton Slide 6 Industry Analysis (Barrile, 2008) Macro-environment Analysis Political issues Operates in countries with different political systems Black Economic Empowerment legislation introduced labor inequalities legislation in South Africa where most of the mining operations are located BHP Billiton has to operate within a broad range of the political (and legal) systems. The global nature of their operations in countries such as Chile, Australia, China and the US means that it must mitigate its activities in light of varying political processes and legal systems. By way of example in South Africa, where the company has considerable mining operations, Black Economic Empowerment (BEE) legislation has been introduced to address inequalities created by past history, particularly the exclusion of black African people from participating in the country’s economy. ... The compliance costs and in some cases remedial costs could increase the group's operational costs which in turn could affect its operating margins (Datamonitor, 2011). Consequently, these regulatory mechanisms could adversely impact the cost, production and financial performance of the group's operations. Furthermore, the interplay of demand and supply, as in other markets, is the key to price setting in commodity markets. In turn higher commodity prices can substantially add to BHP Billiton’s earnings which was the case at the end of the 2007 financial year (Barrile, 2008). Slide 7 Industry Analysis Macro-environment Analysis Social issues Affected by health, safety, environmental and community related issues BHP Billiton is affected by a range of social factors including health, safety, environmental and community related issues. The company uses the term ‘sustainability development’ to implement a broad program of policies, processes and activities that aim to make the company more responsive to social and community needs in the conduct of its businesses. Sustainability development is considered in two dimensions-the ‘business’ and ‘sustainability’ dimensions that come together to produce a more stable and valuable whole. (Barrile, 2008) Technological issues Innovation through the activities of employees such as engineers and scientists facilitate growth Focus on existing and new technologies in exploration and process engineering Science and technology are crucial factors that will bring continued success to the industry. Technological innovation through the activities of employees such as engineers and scientists facilitates growth and improved financial performance. The company focuses on understanding future trends and

Monday, October 28, 2019

Focal Point Consultants Essay Example for Free

Focal Point Consultants Essay While observing CanGo for last two weeks we at FPC (Focal Point Consultants ) have identified some six major issue that we feel should be addressed to allow the organization to better achieve there over all goals. First Concern—Priority 1 CanGo appears to have a financial issue and there is has not been a complete audit to address this issue. Also CanGo needs to learn how to use the resources that they already have and redefine the processes and procedures. First Recommendation The financial team at CanGo needs to work with all the key areas of the company to conduct an audit of current processes. This audit will allow for everyone to review all the current processes that are in place and determine what they can do to enhance them and at the same time the financial team can use this data to outline how much the current processes are costing the company overall. At the conclusion of this analysis the reports will allow for the company to cut spending in the correct areas so that they can improves the others. There are many things that can be done to make improvements without spending money or having to acquire new technology or devices. Within the warehouse for example the layout can be enhanced even more so that people are not wasting time walking. Minor and Major changes to just the layout will allow the CanGo to improve efficiency and overall performance. Each department head needs to complete a detailed time study on the processes they outlined above. Once this time study is complete then the data can be used to see what is taking the longest and make changes to that process. By taking these steps it will allow CanGo to approach improvements in the correct manner by taking those actions that don’t have ny hit to the company’s bottom line. After all these types of changes are complete that is when and only when money should be spent on new technology and devices to make processes more efficient. Second Concern—Priority 2 The loyalty of customers for the specific targeting market is declining. Second Recommendation Think about how you want to be treated as a consumer. Now apply that same concept to the targeting market. Review the evaluations that are submitted by the consumers. It will tell what impression the company is making. Also, spend time in the Customer Service department. This the first point of contact for consumer. How they are handle will determine whether a consumer will return: Customer service might just be the most critical of all in running your business. If your customers like how they are treated, not only will they keep coming back, but they will refer you to others. Treating customers as individuals and not as a stepping stone up your ladder of success can go a long way. Listen to their concerns and build a relationship with them. If your customer feels as though you have their best interest they will be loyal to you. Your customers can really do a lot of your marketing for you. Word of mouth, especially in a world where Facebook and Twitter are some people’s main way of communicating, is a very powerful tool (Debs Marketing Connections, 2012). Third Concern – Priority 3 Online purchases CanGo has talked about that they have a high rate of items added to the online shopping cart. Although this information does not support the amount of purchases actually received via CanGo’s online website. Third Recommendation  Having a high rate of items added to an online shopping cart means that you have a good storefront and getting customer’s to actually place the items within there shopping carts. This is only one piece of the multipart puzzle. The shopping site needs to be enhanced to entice the customer to actually complete their purchase as that is how we are going to make money overall. Since there is a high traffic volume to the website we would also recommend that the marketing team reach out to a third party website advertising company that will pay to place ads on CanGo’s website. This will drive also be another source of revenue for CanGo so they can then reinvest this money back into the company. Fourth Concern – Priority 4 While Reviewing the videos from weeks 3 and 4 I saw a issue that they is an issue within the warehouse and they do have a solution but no really reviewed the reports that Debbie provided. I think that these reports should have been reviewed while in the meeting so that they could have discussed all the points of the issue and the recommended solution to the warehouse productivity issue. Then Liz asked the group a question I wonder how the board will feel about this recommendation. Fourth Recommendation A solution to this problem would be to complete a full audit of the issue and do a trial run analysis of the proposed solution. This would allow for recommendations to be made to the board and the results of the proposed solution can be given right away. As people need to see measurable figures so that they can tell if something will be worth putting the time and money into the project. Fifth Concern – Priority 5  In the week 4 Videos they are talking about the market segment of boys in Japan. They ask each other questions about how they can get the market analysis complete and then the gentlemen having lunch say that I will do it. Fifth Recommendation There are a couple of thing on this problem that needs to be solved first managers should not interrupt an employee’s lunch unless it is extremely urgent. This is an issue because the employee stated he is Just trying to enjoy my lunch break. The Manager should have approached the employee at a later time when he was not at lunch. Then there is the issue of the market analysis. This assignment should get assigned out to a third party marketing company that can tap into the market in Japan and gauge what the consumer wants. This would be a lot more cost effective than attempting the complete this analysis on their own and wasting resources that they dont have in the first place. Sixth Concern – Priority 6 Sales are not increasing as projected for the company possibly due to the design of the online purchasing process. Sixth Recommendation Place a test run on the current online purchase process as a consumer. Time the entire process to see how long it takes. As the test run is being completed, keep the consumers’ needs and wants in mind. Determine if needs were met as well as satisfied. View the information available to see if it’s appealing to lead to the purchase the item. Also, notate likes and dislikes of the experience. Have a group of employees to assist to gather more information for comparison. Determine what updates can be implemented to entice the consumer to make a purchase. Keep track of different trends to keep a competitive edge for things like: 1.  In-store pick up. In the past few months we’ve seen Walmart implement in-store pick up for orders placed online, while Sears and Kmart are going a step further bringing online purchases out to your car. In Chicago, Sears and Kmart are even testing home delivery and bundling items with those from its retail partners at Sears’ Marketplace, further blurring the lines between online only retailers and those that came before. And in Florida, Farm Stores lets shoppers order groceries online and pick up at a drive through. 2. Pick up depots.  Smaller retailers without a vast network of stores like Walmart or Sears may open designated pick up locations for goods ordered online. Retail consultant Neil Stern of McMillan/Doolittle points to French retailer Chronodrive. com as an example. 3. Mobile Apps. Smartphones are the dominant cell phone and apps for all platforms are growing. The ones that allow for price comparisons or send out coupons are already among the most heavily used with good reviews, but we’re just getting started. 4. Less flash more function. Forget about flashy apps or features like virtual dressing rooms.  Consumers haven’t responded to these and rightly so. Maybe the technology will get there, but until it does, user reviews are better gauges of clothing fit and quality than any technology can offer. 5. Video. Look for more user-generated video on retail sites. Retailers are letting customers upload video clips modeling new clothes or using a new purchase. Davis believes this is one trend that will definitely pick up speed. 6. Social networking. Facebook and Twitter aren’t even close to played out yet. Consumers can increasingly â€Å"like† or follow a favorite retailer and get discounts or tips on deals.  JCPenney is using Facebook to actually sell goods and more than 12 million consumers â€Å"like† Victoria’s Secret on Facebook as of last month (March), making it the most popular retailer on the site (its Pink brand ranks No. 2, according to the ChannelAdvisor Facebook Commerce Index). That’s an active population of customers reaching out and requesting information from the retailer. And social shopping is just getting started, says Jim Okamura, managing partner at Okamura Consulting, a group specializing in online retail. There’s evidence (that Facebook offers) a good return on investment and there are a lot of retailers that haven’t done anything yet,† he says. â€Å"This is going to be the year of Facebook testing. 7. Daily deals and flash sales. This may seem like a very crowded playing field, but sites like Ruelala and OneKingsLane are reproducing at a furious pace. And based on how quickly many items sell out, often within minutes of email notifications going out, more will jump on this popular trend. 8. Retail based social networks. This is one trend experts don’t expect to happen at any large level. Sears is still trying to build a social network of its own customers and Walmart tried and abandoned a similar effort, neither attempt bodes well for its success. Facebook really owns this space, but look for small, focused sites to create communities of like-minded users, says Okamura. 9. International. â€Å"There’s been an accelerating trend in international or cross border e commerce, of small niche online retailers are now doing 10-20% of their sales outside of their own country,† says Okamura. Look to online shops like SousVide Supreme that sells specialized cooking equipment and StyleTrek. com, a community built to launch up and coming international designers as models. Other big name retailers like Zara and Top Shop are building out their online business to reach U. S. shoppers, even as the store base grows more slowly. 10. Deal aggregators. Of course there are always deal sites, like Dealnews, ConsumerSearch, FatWallet and Brad’s Deals that are cutting through the din of so many sites and sales to bring consumers only the information they’re interested in. (Forbes, 2012).

Saturday, October 26, 2019

Server Architectures of Existing Presence Services

Server Architectures of Existing Presence Services In this section, we describe the system model, and the search problem. Formally, we assume the geographically distributed presence servers to form a server to-server overlay network, G = (V,E), where V is the set of the Presence Server (PS) nodes, and E is a collection of ordered pairs of V . Each PS node ni ∈ V represents a Presence Server and an element of E is a pair (ni,nj) ∈ E with ni,nj ∈ V . Because the pair is ordered, (nj,ni) ∈ E is not equivalent to (ni,nj) ∈ E. So, the edge (ni,nj) is called an outgoing edge of ni, and an incoming edge of nj. The server overlay enables its PS nodes to communicate with one another by forwarding messages through other PS nodes in the server overlay. Also, we denote a set of the mobile users in a presence service as U = {u1,,ui,,um}, where 1 ≠¤ i ≠¤ m and m is the number of mobile users. A mobile user ui connects with one PS node for search other user’s presence information, and to notify the other mo bile users of his/her arrival. Moreover, we define a buddy list as following. Buddy list, Bi = {b1,b2,,bk} of user ui ∈ U, is defined as a subset of U, where 0 i ∈ Bj implies uj ∈ Bi.For example, given a mobile user up is in the buddy list of a mobile user uq, the mobile user uq also appear in the buddy list of the mobile user up. Note that to simplify the analysis of the Buddy-List Search Problem, we assume that buddy relation is a symmetric. However, in the design of Presence Cloud, the relation of buddies can be unilateral because the search operation  of PresenceCloud can retrieve the presence of a mobile user by given the ID of the mobile user. Problem Statement: Search Problem When a mobile user ui changes his/her presence status, the presence service searches presence information of mobile users in buddy list Bi of ai and notifies each of them of the presence of ai and also notifies ai of these online buddies. The Search Problem is then defined as designing a server architecture of presence service such that the costs of searching and notification in communication and storage are reduced. 1.2 Motivation Because of the increasing of the Internet, mobile devices and cloud computing environments can provide presence-enabled applications, i.e., social network applications/services, worldwide. Facebook , Twitter, Foursquare, Google Latitude , buddycloud and Mobile Instant Messaging (MIM) , are examples of presence-enabled applications that have grown rapidly in the last decade. Social network services are changing the ways in which They exploit the information about the status of participants including their appearances and activities to interact with their friends. The huge availability of mobile devices (e.g., Smartphones) that utilize wireless mobile network technologies, social network services enable participants to share presence experiences instantly across great distances. For example, Facebook receives more than 75 billion shared items every month and Twitter receives more than 60 million tweets each day. In the future, mobile devices will become more popular than today, sensing and media capture devices. Hence, we believe it is useful and social network services will be the next generation of mobile Internet applications. A mobile presence service is an important component of social network services in cloud computing environments. The key function of a mobile presence service is to maintain an present list of presence information of all mobile users. The presence information includes details about a mobile clients or user location, availability, activity, device capability, and their choices. The service must also bind the this clients ID to his/her current presence information, as well as retrieve and subscribe to changes in the presence information of the user’s friends. In social network services, each mobile user has a friend list, typically called a buddy list, which contains the contact information of other users that he/she wants to communicate with. The mobile user’s status is known automatically to each person on the buddy list whenever he/she moves from one location to the other. For example, when a mobile user logs into a social network application, such as an Instant Messagi ng system, through his/her mobile device, the mobile presence service searches for and notifies everyone on the user’s buddy list. To maximize a mobile presence service’s search speed and minimize the notification time, most presence services use server cluster technology. Currently, more than 400 million people use social network services on the Internet. Given the growth of social network applications and mobile network capacity, it is expected that the number of mobile presence service users will increase substantially in the near future. Thus, a scalable mobile presence service is deemed essential for future Internet applications. In the last decade, many Internet services have been deployed in distributed paradigms as well as cloud computing applications. For example, the services developed by Google and Facebook are spread among as many distributed servers as possible to support the huge number of users worldwide. Thus, we explore the relationship between distributed presence servers and server network topologies on the Internet, and propose an efficient and scalable server-to-server overlay architecture called PresenceCloud to improve the scalability of mobile presence services for large-scale social network services. First, we examine the server architectures of existing presence services, and introduce the search problem in distributed presence architectures in large-scale geographically data centers. The search problem is a scalability problem that occurs when a distributed presence service is overloaded with buddy search messages. Then, we discuss the architecture of PresenceCloud, a scalable server-to-server architecture that can be used as a building block for mobile presence services. The rationale behind the architecture of PresenceCloud is to distribute the information of millions of users among thousands of presence servers on the Internet. To avoid single point of failure, no single presence server is supposed to maintain all the information about all users. PresenceCloud arranges presence servers into a quorum-based server-to-server architecture to facilitate efficient searching. It also leverages the server overlay and a directed buddy search algorithm to achieve small constant search latency; and employs an active caching strategy that substantially reduces the number of messages generated by each search for a list of searching process. We analyze the performance of PresenceCloud and two other architectures, a Mesh-based scheme and a Distributed Hash Table based scheme. Through simulations, we also c ompare the performance of the three approaches in terms of the number of messages generated and the search satisfaction which we use to denote the search response time and the buddy notification time. The results demonstrate that PresenceCloud achieves major performance gains in terms of reducing the number of messages to reduce network traffic without sacrificing search satisfaction. Thus, PresenceCloud can support a large-scale applications distributed among thousands of servers on the Internet. The contribution of this paper is threefold. First, PresenceCloud is among the imporatanta architecture for mobile presence services. To the best of our knowledge, this is the first work that shown the architecture of presence cloud that significantly best than those based distributed hash tables. PresenceCloud can also be utilized by Internet social network applications and services that need to replicate or search for mutable and dynamic data among distributed presence servers. The second contribution is that we analyze the scalability problems of distributed presenceserver architectures, and define a new problem called the buddy-list search problem. Through our mathematical formula, the scalability problem in the distributed server architectures of mobile presence services is analyzed. Finally, we analyze the performance complexity of Presence- Cloud and different designs of distributed architectures, and evaluate to prove the applications of PresenceCloud. 1.3 Existing System In this section, we describe the previous research on presence services, and survey the presence service of existing systems. Well known commercial Instant Messaging systems has some form of centralized clusters to provide presence services. Jennings III et al. presented a taxonomy of different features and functions supported by the three most popular Instant Messaging systems and Yahoo! Messenger. The authors also provided an overview of the system architectures and observed that the systems use client-server-based architectures. Skype, a popular voice over Internet Protocol application, utilizes the Global Index (GI) technology to provide a presence service for clients and people. Global Index is a multi-tiered network architecture where each node maintains full knowledge of all available clients connected to it. Since Skype is not an open protocol, it is difficult to determine how GI technology is used for presence services. Moreover, Xiao et al. analyzed the traffic of MSN and A IM system. They found that the presence information is one of most network traffic in instant messaging systems. In, authors shown that the largest message traffic in existing presence services is buddy NOTIFY messages. 1.4 Limitations of Existing System This system allows makes congestion in the network. It is not applicable for large scale network. It increases the search latency. 1.5 Proposed System Recently, there is an increase amount of interest in how to design a peer-to-peer Session Initiation Protocol. P2PSIP has been developed to remove the the disadvantages of centralized server, reduce costs, and prevent loses due to failures in server-based SIP deployment. To maintain presence information, P2PSIP clients are organized in a Distributed Hash Tables system, rather than in a centralized server. However, the presence service architectures of Jabber and P2PSIP are distributed, the buddy-list search problem we defined later also could affect such distributed systems. It is noted that few papers in discuss about the scalability issues of the distributed presence server architecture. Saint Andre observed the traffic generated as a result of presence information between users of inter-domains that support the XMPP. Houri et al. Show that the amount of presence traffic in SIMPLE can be extremely high, and they analyze the effect of a large presence system on the memory CPU loading. Those works in study related problems and developing an initial set of guidelines for optimizing inter-domain presence traffic and present a DHT-based presence server architecture. Recently, presence services are also developed in the mobile services. For example, 3GPP has defined the integration of presence service into its specification in UMTS. It is based on SIP protocol, and uses SIMPLE to manage presence information. Recently, some mobile devices also support mobile presence services. For example, the Instant Messaging and Presence Services (IMPS) was developed by the Wireless Village consortium and was united into Open Mobile Alliance (OMA) IMPS in 2005. In, Chen et al. proposed a weakly consistent scheme to reduce the number of updating messages in mobile presence services of IP Multimedia Subsystem (IMS). However, it also suffers scalability problem since it uses a central SIP server to perform presence update of mobile users. In, authors presented the server scalability and distributed management issues in IMS-based presence service. CHAPTER 2: LITERATURE SURVEY Chapter – 2 Literature Survey 2.1 Introduction In this section, we describe previous researches on presence services, and survey the presence service of existing systems 2.2 Related Paper Discussions 2.2.1 Title: A study of internet instant messaging and chat protocols Year: 2006 Author: R. B. Jennings, E. M. Nahum, D. P. Olshefski, D. Saha, Z.-Y. Shae, Description: Well known commercial Instant Messaging systems has some form of centralized clusters to maintain presence services. Jennings III presented a taxonomy of different features and functions supported by the three most popular Instant Messaging systems, AIM, Microsoft MSN and Yahoo! Messenger. The authors also provided a description of the system architectures and analized that the systems use client-server-based architectures. 2.2.2 Title: Understanding instant messaging traffic characteristics Year: 2007 Author: Z. Xiao, L. Guo, and J. Tracey Description: Xiao analyzed the traffic of MSN and AIM system. They observed and got that the presence information is one of most messaging traffic in instant messaging systems 2.2.3 Title: Ims presence server: Traffic analysis and performance modelling Year: 2008 Author: C. Chi, R. Hao, D. Wang, and Z.-Z. Cao, Description: In this, authors shown that the huge message traffic in existing presence services is searching the locations ,buddies etc. 2.2.4 Title: Peer-to-peer internet telephony using sip Year:2009 Author: K. Singh and H. Schulzrinne Description: Now a days, there is an increase amount of interest in how to design a peer-to-peer Session Initiation Protocol . Peer to Peer SIP has been developed to remove the centralized server, reduce maintenance costs, and prevent disadvantages in server-based SIP deployment. To maintain presence information, P2PSIP clients are arranged in a DHT system, rather than in a centralized server. However, the presence service architectures of Jabber and P2PSIP are distributed, the search problem we defined later also could affect such distributed systems.