Saturday, August 31, 2019

Domestic Violence: Beyond Patriarchy

Domestic Violence: Beyond Patriarchy In the Beginning The Battered Women's movement of the 1970's enlightened society about a much secreted, and what at the time, was considered a family matter, that of violence against women by their male intimate partners. Many lives have been saved as a direct result of society's public awareness of this much-hidden scourge on our families. Federal and state laws prohibiting Intimate Partner Violence (IPV) have been enacted, and funding has been put in place for battered women's shelter programs. These changes have made a significant difference in the lives of battered women and children over the last few decades. The feminist theoretical perspective of IPVIPV has been depicted throughout our society as well as how victim services, and batterers intervention programs (BIP) are modeled. â€Å"Our culture has historically exhibited certain patriarchal values observable in religion and social custom. Working against the backdrop of this history, feminism quite naturally saw an antidote in ending social oppression of women. Wife assault, kept largely out of the public view and tolerated by prevailing attitudes, was regarded by feminists as an evil symptom of patriarchy. † (Dutton, page 17, 2006) Feminist theory defines IPV as a social problem with a single type of victim i. e. heterosexual women and one root cause, that of male privilege and patriarchy, which supports male domination, power, and control and the oppression of women. The need for services for IPVBIP's for female perpetrators is obscured and trivialized by this â€Å"one size fits all† view. Dutton describes feminist theory on IPV as being a â€Å"‘paradigm:†Ã¢â‚¬Ëœ [A paradigm is] a set of guiding assumptions or worldview, commonly shared within a group and serving to ward off recognition of data that are dissonant with the paradigm's central tenets. This theory views all social relations through the prism of gender relations and holds that men hold power over women in patriarchal societies and that all domestic violence is either male physical abuse to maintain that power or female defensive violence used as a self protection. (p. 2, 2005) developed through the anti-rape and battered women's movements. This perspective has been the guiding light for how the social problem of against men by women and The violence against women by men paradigm is so entrenched that if anyone pursues any other theories or presents any data that is contrary to that perspective it is automatically considered anti-domestic violence movement. (Dutton, p. 44, 2005) Lucal (1995) found that attempts to discuss the idea of battered husbands started an emotionally charged and fiercely contested debate among researchers which has been the classic debate filled with claims and counterclaims. Much of the debate has been centered around whether or not there are very many battered husbands. Most of the debate has been about whether or not battered husbands are a social problem worthy of support. (pp. 95-96) Revealing Statistics Dr. Murray Straus, co-founder and co-director of the University of New Hampshire's Family Violence Research Laboratory, has studied IPV and child abuse for over thirty years. In study after study he has found that both men and women are capable of being victims and committing IPV. For instance: (I? E(Busing data from the National Family Violence Survey of 1975, Straus (l980) found that 11. 6 (2. 6 million nationwide) of husbands reported having been the victim of severe violence by their wives. Severe vio1ence was defined as behaviors, such as kicking, punching, beating, or using a knife or gun, that have a high probability of causing physical injury. (as cited in Hines Malley-Morrison, p. 77, 2001) Presenting data that defies feminist logic has caused Dr. Straus and his colleague's substantial risk. As a result of the depth of the objections to our finding on assaults by wives, some of us became the object of bitter scholarly and person attacks. These attack included obstruction of my public presentations by booing, shouting, and picketing. In elections for office in scientific societies I was labeled as antifeminist despite being a pioneer feminist researcher on wife beating (Straus, 1973, 1996 as cited in Straus, pp. 225-226, 1992). Suzanne K. Steinmetz, a co investigator in the first National Family Violence Survey, was the victim of more severe attacks. There was a letter-writing campaign opposing her promotion. There were phone calls threatening her and her family, and a bomb threat at a conference where she spoke. (pp. 225-226) Studies such as the National Violence Against Women Survey tend to filter out male reports of victimization because of the â€Å"‘set†Ã¢â‚¬Ëœ of the survey (criminal victimization of women) (Dutton, p. 4, in press). However, the National Violence Against Women Survey in 2000(a) reports that more than 834,000 men are raped or physically assaulted by an intimate partner each year in the United States. This translates into about(I? E(B32 assaults per 1,000 men. (Tjaden & Thoennes, p. 11) Since the respondents in this study were told they were being interviewed about â€Å"personal safety† issues it's quite possible that this number is an underestimate as many of the men may not have perceived the violence that their wives or girlfriends were perpetrating against them as a threat to their safety. (Hines & Malley-Morrison, p. 77, 2001) The Establishment of Services for Male Victims Spreading the word as news of the availability of DAHMW's helpline became more known, calls from men and those concerned about a male relative or friend whom they thought were in an abusive situation started coming in from around the country. A website was created with information on male victimization and other resources and tri-fold brochures specifically addressing IPV against men were designed, printed and distributed through mailings and placements on community bulletin boards. Consequently, two years after its inception, DAHMWDAHMWIPV. as highlighted in the National Crime Prevention Council's book, â€Å"50 Strategies to Prevent Violence Domestic Crimes. † (2002) as, â€Å"[one of] 50 promising programs [that offer] new and alternative methods to aid under-served victims of violent domestic crime including teens in dating relationships, elderly victims of late-life abuse, child witnesses to violence, battered immigrants, male victims, and survivors in the gay and lesbia n community. † In 2003 Verizon began to publish the crisis line in a number of their phone books. Incoming calls to helpline have grown exponentially from fourteen a month in 2001, to over three hundred calls a month in 2006. The vast majority of the calls continue to be from or about a male victim (and children) of female Information gathered from male callers to the helpline suggests that some violent women use highly physically disabling tactics on their victims. â€Å"According to qualitative accounts, several physical attacks [are] reported to have occurred to the groin area, as in the following examples: â€Å"‘G reports that his estranged wife frequently targeted his testicles in her attacks, which included head butting and choking. Police were called to his home six times, one call resulted in the wife's arrest. â€Å"‘ â€Å"‘I was writhing, crying in the corner, I couldn't get up for two hours she kicked me in the groin at least 12 times. â€Å"‘ â€Å"‘She held a knife to my balls and threatened to cut them off. â€Å"‘ (Hines etal, p. 66, 2007) The stigma attached to being a man abused by a woman is profound. Many men report that they were taught never to hit a girl, be strong, do not cry and do not tell your personal business to anyone from their parents and caregivers. There is also a cultural belief that men should be able to defend themselves. However, if a man does defend himself against his abusive female partner and the police are called, the man is the one that will be arrested. When Dwayne Bobbit had his penis cut off by his wife in 1993, it was a big joke for late night comedy. Lorena Bobbitt was found not guilty by reason of temporary insanity. The reaction would have been entirely different had the genders been reversed. (Dutton, p. 148, 2006) Law Enforcement and the Court's Response The concerned family members and the victims themselves to the DAHMW helpline have recounted reports of the lack of concern for male victims: Misconceptions and Realities Feminists' theorists assert that women's violence against men is less likely than men's violence against women to result in serious physical or psychological harm. (Dutton & Nichols, p. 697, 2005) They use this claim to dismiss women's violence against men and male victims. Women, in general, may not be as big or strong as men are, however, what women lack in size and strength they make up for with the use of weapons. Research conducted at an emergency clinic study in Ohio (Vasquez & Falcone, 1997, as cited in Dutton & Nichols, 2005 ) revealed that 72). The authors reported that burns obtained in intimate violence were as frequent for male victims as female victims. As this study demonstrates, community samples, unless they require subjects to self-report as crime victims, show a different and more equivalent pattern of violence by gender than that alleged by the(I? E(Bfeminist perspective(I? E(B. Regardless of the variations in the studies, two conclusions seem reasonable: (1) women are injured more than men, and (2) men are injured too, and are not immune to being seriously injured. Simply because the injury rates are lower, men should not be denied protection. (Dutton & Nichols pp. 97-678, 2005) The feminist perspective of IPV being predominantly patriarchal in nature also excludes much of the victims in LGBT community. The LGBT community has had to set up their own domestic violence shelter programs that primarily or exclusively protect, educate and serve LGBT individuals who are victims of IPV. (e. g. see the www. gmdvp. org, w ww. lagaycenter. org/FamilyViolence etc ) According to Helfrich & Simpson (2006) lesbians have a difficult time accessing services through the traditional battered women's shelter programs due to the lack of policies to screen lesbian survivors and identify batterers. Lesbian batterers may use deception to access services through the same agency as the survivor and there are little to no stopgap measures taken to deal with those situations. (p. 344) Beyond Patriarchy, Alternative Theories on IPV Dutton (2006) asserts that the best predictor of intimate partner violence is not gender but personality disorder (p. 153). Since the beginning of the battered women's movement, researchers who have studied maritally violent men have often treated batterers as a homogeneous group. They have measured violent husbands by comparing them to nonviolent ones. However, more recently they have found that violent husbands vary along a number of important dimensions, including severity of violence, anger, depression and alcohol abuse. (Holtzworth-Munroe & Stuart, p. 476, 1994) More recently, researchers have begun to investigate what attachment styles and personality disorders have to do with IPV. The focus for this paper regarding typologies of batterers is on the dysphoric/borderline subtype and so a full description of each subtype of batterer is beyond this review. For more information of the various subtypes please review, Holtzworth-Munroe & Stuart, 1994; Holtzworth-Munroe et al. 1997; Holtzworth-Munroe et al. , 2000; Waltz et al. , 2000; Babcock et al. , 2003; Carney & Buttell, 2004) Researchers have found that batterers are more likely a heterogeneous than a homogeneous group and within that heterogeneous grouping various subtypes of batterers exist. Seminal research done by Holtzworth-Munroe and Stuart (1994) studied violent men and ascertained various typologies of male batterers. Holtzworth-Munroe and Stuart categorized three major subtypes and they labeled them, family only, dysphoric/borderline, and generally violent/antisocial. (Holtworth-Munroe & Stuart, p. 76-482, 1994) Holtzworth-Munroe and Stuart described dysphoric/borderline batterers as those who engage in moderate to severe wife abuse as well as psychological and sexual abuse. Their violence is primarily towards the family; however, they suggested that some extra familial violence and criminal behavior may be evident. Additionally, they found that these men are the most dysphoric, psychologically distressed, and emotionally volatile and that they have evidence of borderline and schizoidal personally characteristics. The may also have problems with alcohol and drug abuse. (ibid. According to Dutton (2006), â€Å"Across several studies, implemented by independent researchers, the prevalence of personality disorder in wife assaulters has been found t o be extremely high. These men are not mere products of male sex role conditioning or â€Å"‘male privilege†Ã¢â‚¬Ëœ [as the feminist theory of IPV suggests]; they possess characteristics that differentiate them from the majority of men who are not repeat abusers. † (p. 185) In addition to research on subtypes of batterers, there is also evidence to suggest that early attachment has bearing on what type of person may have the propensity towards perpetrating IPV. Buttell et al (2005) states that the presence of batterer subtypes is widely accepted in the field and that findings from [their] study seem to suggest that issues of attachment and dependency may be related to the development of an abusive personality for one type of batterer. They state that if true, efforts to improve intervention may need to focus on distinguishing batterer subtypes and developing intervention strategies relevant to the need for each subtype. (p. 216) Attachment styles may be the key to unlock many doors for both female and male perpetrators of IPV. Dutton in his book, The Abusive Personality, reiterates Bowlby's findings on attachment styles: In his landmark series of books entitled Attachment and Loss, Bowlby developed the notion that human attachment was of ultimate importance for human emotional development. In his view, it had sociobiological significance. His views encompassed the possibility of individual differences that came to be called â€Å"‘attachment styles'† referr[ing] to entire constellations of thoughts and feelings about intimacy. Reactions to the satisfaction or dissatisfaction of early attempts at attachment set up life-long attachment styles described as secure, fearful, or dismissing. The dismissing people tend to be wary of and stay out of relationships. The secure ones are comfortable with closeness. The fearful ones are stuck in the middle, exhibiting ambivalence toward intimacy and to those with whom they are emotionally connected. (as cited in Dutton, p. 116, 1998) Dutton (1998) further postulates that this push-pull reaction of the fearful attachment styled person resembles the ebb and flow of what he has coined the â€Å"cyclical personality. Dutton reports that in his notes on phrases used by female victims to describe their male batterers (who were clients of Dutton's) there was a recurring theme. They would express that their partners would act like â€Å"Jekyll and Hyde† and appear to be two different people at times. They also said things like, â€Å"He's like living with an emotional roller-coaster,† and describe their mates as moody, irritable, jealous and changeable. (p. 53) This cycling was first recognized by Lenore Walker in her book, The Battered Women, as the â€Å"‘battering cycle. â€Å"‘ (as cited in Dutton, ibid. As Dutton set out to gain some understanding of a cyclical or phasic personality he came across a book by John G. Gunderdson entitled, Borderline Personality Disorder: Dutton's research regarding attachment, borderline and the batterer's cyclical personality has been focused on male on female IPV, however, in his recent book, Rethinking DV, he discusses female perpetrators: Recent research has begun to explore the role of [fearful attachment, borderline traits, and chronic trauma symptoms, which generates what Dutton calls the abusive personality] among female perpetrators of partner abuse. Follingstad, Bradley, Helff, and Laughlin (2002) generated a model for predicting dating violence in a sample of 412 college students. (as cited in Dutton, p. 201, 2006) They found that anxious attachment resulting from early life experiences led to the development of an â€Å"‘angry temperament,†Ã¢â‚¬Ëœ which in turn related to attempts to control and use abuse against an intimate partner. The model predicted abusiveness for both genders (ibid. ) Other researchers have also hypothesized about subtypes of abusive males and females. For instance, Buttell et al (2005), states that researchers are beginning to explore the role of attachment theory and develop hypotheses on abusive behaviors relevant to different subtypes of abuser in order to improve intervention efforts for batterers. (p. 211) Gormley (2005) concluded that, â€Å"Insecure adult attachment orientations affect half the adult population, helping to explain the prevalence of men's and women's IPV. Women with insecure adult attachment orientations may be as much at risk as similar men of psychologically and physically abusing romantic partners, oing damage to relationships they may be socialize to value highly(I? E(B. † (p. 793) Female Batterers Scant research has been done on female batterers; however, due to the changes in mandatory arrest policies more women are being arrested than ever before. The debate about whether or not women perpetrate IPV has changed noticeably of late due in part to the fact that women are increasingly being arreste d, prosecuted, and sentenced to intervention programs for domestic violence offenses. Women's arrest for IPV is a direct result of legislation that has mandated the arrest of perpetrators in cases where police become involved when a domestic dispute has occurred. Warrantless arrest legislation gives police the power to arrest the abuser and press charges themselves when called to a domestic dispute. The victim no longer needs to press charges against the perpetrator. The arrest of women was certainly an unintended consequence of this legislation and has had a dramatic impact on the national debate regarding female initiated IPV. Carney & Buttell, p. 249, 2004) Feminist theory of IPV has created a dilemma regarding intervention services for female batterers. At present, the most prevalent legislated BIP's the system has set up are for dealing with batterers comes from the feminist model of IPV. Female batterers who are convicted of domestic assault and court ordered to attend a BIP have little choice but than to attend the feminist model of BIP's when court ordered to do so. (Carney and Buttell, p. 50, 2004) In addition, research on these [Duluth Model] BIP's indicate that few men who complete treatment benefit from it to the extent that they demonstrate positive changes in their behaviors. Of course, if men are not benefiting from a program that is specifically designed for patriarchal batterers then certainly abusive women will benefit even less. (ibid. ) According to Babcock & Siard (2003) some of the women arrested could have been acting in self-defense and were therefore falsely arrested but others with extensive violent histories may in fact be primary aggressors. p. 153) Men who are arrested are not given the same latitude. Babcock et al. (2003) mentions that in a study of women arrested for IPV, Hamberger and Potente (1994) found women who could clearly be identified as primary aggressors of IPV, yet in the treatment setting they were generally treated the same as those women who used self defense. (as cited in Babcock & Siard, p. 154). B abcock et al. (2003) proposed two categories of female batterers, those that were partner-only and those that were generally violent. The partner-only category covered women who may be more likely to use violence in self-defense and the generally violent women (of more interest for this paper) were women who used violence in any manner of situations including against their romantic partners. (pp. 153-154) Many studies on male batterer's include reports from their female victims; however, the researchers in this study did not ask the male victims for reports of their partner's violence. Iit is interesting to note that violent women were asked to report on their male partner's violence against them. (p. 57) They further note that power and control seems to be an issue for some abusive women and they suggest that women's power and control issues, traumatic histories, and psychological distress should be explored and indicate that clinicians may want to assess for psychopathology (i. e. post-traumatic stress disorder, borderline personality disorder, etc. ) (ibid. ) Recent studies have found that women's and men's viol ence share similar correlates (Giordano, Millhollin, Cernkovich, Pugh, & Rudolph, 1999; Magdol, Moffittt, Caspi, & Silva, 1998; Moffitt, Robins, & Caspi, 2001 as cited in Babcock et al, p. 53, 2003) therefore, they may also share similar motivations and circumstances. Female Batterers from Victims Reports Hines et al's (2007) research provides some insight into female batterers from their male victims. â€Å"Female abusers likely have a history of childhood trauma, may be suffering from a mental illness, and are likely to use alcohol and/or drugs. Further, these women have a high rate of threatening either suicide and/or homicide. † (p. 9) As previously stated, women have been asked to report on their male batterers and although this is not the ideal way to obtain information on batterers, feminist researchers have been gathering information in this way from battered women in shelters for years. (e. g. Walker, 2000 as cited in Hines et al, p. 69, 2007) Conclusion Men are vict ims of female perpetrated IPV and need services such as shelter, legal aid, support and counseling much the same as their female counterparts. Additionally, men's reports of victimization should not be called into question but treated with the same respect as women's reports. Protocols should be put in place within the domestic violence shelters programs, for law enforcement and the courts that will screen out potential female and male batterers so that victims are not judged by their gender. There is a dearth of research of female batterers and what has been presented from the feminist theory suggests that violent females use violence in self-defense. As we move away from the feminist theory of IPV researchers are discovering that childhood trauma, insecure attachment styles, mental illness, and/or alcohol and substance abuse play a role in IPV for both genders. Not all male batterers fit into the feminist theory of IPV, there are subtypes of batterers and attachment style plays a role in who perpetrates IPV. The subtype that is the focus of this paper is that of the borderline, cyclical batterer. Female batterers also show symptoms of having subtypes evidenced by reports from male callers to the DAHMW. Studies are beginning to assess psychological factors that predict female intimate partner violence. What is emerging is evidence of personality disorder, attachment style, and constricted affect that has also been seen in male abusers. Female abusers share much of the same traits as male abusers especially antisocial and borderline personalities. (Dutton, p. 203, 2006) As Babcock et al. (2003) explain, â€Å"[the] feminist perspective should be holistic, examining both the positive and negative sides of women's behavior. Bringing attention to some women being in the role of perpetrators, not solely as the victims of intimate partner abuse, involves viewing women as they are, not as we would wish them to be. † (p. 160) References About The Author

Friday, August 30, 2019

Gaming the Console Response

2121 – Writing for MIT Dr. Tim Freeborn January 31, 2012 Gaming the Console – Rhetorical Essay In Linda Bernstein’s informative article â€Å"Gaming the Console† she presents both sides to the ongoing debate about the possible consequences associated with playing video games. Some experts have concluded that gaming leads to negative outcomes such as an increase in violent behavior, or a decrease in academic and social skills. On the other hand, there is a belief that some video games can have positive educational and physical benefits.Bernstein touches on all of these aspects of gaming and leaves the ultimate decision up to the reader to form his or her own opinion on the matter. Throughout the article, there are three images displayed that effectively support the text and help develop the arguments presented. The initial picture that is splashed across the entire first page of the article seems to represent the type of teen who exhibits the potential for increased aggression as a result of playing video games.The photo depicts a male teenager with spiked hair, dark eyes, pierced ear, and stubble on his lip and chin. These characteristics are typically indicative of a more rebellious or aggressive individual. His concentration is evident in his wide-eyed expression and his grimacing face with his tongue in his mouth. He holds the console in a tight grip as shown by the redness of his skin around his thumbs, which indicates his level of intensity. All of these details compliment the notion that video games may be unknowingly impacting areas of the brain associated with aggression.Professor Craig A. Anderson of Iowa State University describes this as follows: â€Å"The effects aren’t huge or immediately noticeable by a game player, but they tend to increase over time† (Bernstein 14). The player may not feel more aggressive after playing a game, but there may be evidence to suggest the effect is still there none the less. The next image in sequence works well in conjunction with the text and seems to support the argument that gaming can have positive benefits if used appropriately. For instance, in the article eighteen-year-old David A. xpresses, â€Å"It’s a fun way of being with your friends when [you are] home relaxing. [It is] competitive and fun, but I only do it when I have extra time† (Bernstein 14). This opinion appears to be shared by the two male and two female teens shown in the picture. They appear to be having fun while playing the game and getting along. Although they have a look of concentration on their faces, the fact that they are all leaning in the same direction could indicate they are playing towards a common goal, and thus encouraging teamwork.It shows boys and girls playing together which illustrates that gaming can have a social and inclusive benefit, and is not simply for socially awkward children. This image can support the notion that if gaming is not performe d at the exclusion of other things such as schoolwork and sports, it can be a fun pastime. The last image Bernstein integrates into her article could be perceived as support for either side of the debate over the impact of video games. The presentation of a boy with his headset on and console in the air with a huge smile indicates again a positive image of gaming.On the other hand, the fact that he is wearing headphones may signify that he is a serious gamer who spends a lot of time gaming at the exclusion of other educational activities. This picture is rather ambiguous because depending on whether he is part of the 8% teen gamers who are addicted or 92% who are not addicted it can have a very different meaning (Bernstein 14). Overall, this image can be interpreted to support whatever argument you are rooting for by the end of the article.Bernstein is successful in presenting useful images that enhance the text while still being fair and showing all views discussed throughout the a rticle. The first image portrays the aggressive nature of gaming, the second illustrates the social aspect of gaming and the third image is left up for interpretation by the viewer. Overall, the article displays a balanced perspective complimented with appropriate corresponding images that support Bernstein’s thesis. Works Cited Bernstein, Linda. â€Å"Gaming the Console. † Current Health Teens. † March 2012.

Thursday, August 29, 2019

Website Credibility Evaluation

Evaluation of Website Credibility Evaluation of Website Credibility Familydoctor. org is a website that offers information on a health related topics and wellness. This website has a domain of . org which means it is operated by an organization. The main purpose of this website is to provide families with information on health related topics and offer wellness information that will benefit all members of the family. This website was chosen based on the fact that many people have families.Anyone who is interested in any health topics and/or wellness can find this site by searching in various search engines, such as Google or yahoo, by typing into the search bar family health or whatever health topic of interest. Evaluation of Credibility Authority This website provides information from family practice physicians, medical students and family practice residents. All of the information available on this site has been written and approved by physicians and educators who have expertise in family practice and patient education. The affiliates of familydoctor. rg are found on the website along with all of the doctors and educators responsible for the information found on the site. The information on the website goes through an editorial board that reviews the content, and then sends it to a physician of the specialty topic for final review before being placed on the web. Information This website is comprised of information that goes through a process of critiquing and evaluating before it is placed on the site. The information is written in a format that is understandable by all, regardless of the education. Objectivity The information provided on this site is not objective.The site has a partner and many sister sites that are listed. When health related information is to be displayed on the site by outside sources that information has to go through the same peer reviewing and critiquing that the information from the site itself goes through. As long as the criteria th at is set is met, then information can be posted on this site. Ease of Navigation Once on this site, there are headings labeled across the top that will aid in searching for what the site offers. For example, the diseases chosen are in alphabetical order and can be chosen using the first letter of the word.Another example is the headings are set for children, teens and elders. All of the information listed on this site can be printed and used as education or information. All advertisements on this site are clearly marked as advertisement and guidelines are set as to what the advertisements cannot contain. With all of this, browsing on this site is not difficult. Privacy and Security On this site is a simple explanation of the privacy policy with a link to a more extensive privacy policy from the organization that operates this website.It is clearly stated when, what and how personal information is collected and how it is used as well as how cookies are used. The American Academy of Family Physicians is clearly stated as the operator of this site with contact information and other pertinent information. Empirical Evidence Determining the credibility of a website starts with tools that can be used to evaluate the site. The National Library of Medicine (NLM) offers information defining how to evaluate websites credibility. Key factors such as; â€Å"Who runs and pays for the website, what the website’s purpose is, Where id the information on the site come from and how is the content selected,† (NLM, 2012). This writer went through the www. familydoctor. org website; it was determined to be credible by using the factors from NLM. Importance to Nursing This site can be used by nurses for many purposes. Some purposes are: a) education to patients and family about diagnosis and treatment, b) information on wellness and prevention c) information to assist families with caring for their elderly family member. Patients may receive conflicting health-relate d information from family, friends, and the media.Part of nurses’ role as teachers is to help patients access and evaluate information so that they can make appropriate decisions and facilitate self-care (Anderson & Klemm 2008). There are an endless number of uses for this website to the nursing profession. One can find this site to be easy to access and view. Conclusion Information found on the internet should not be the sole source of information, but can be used in adjunct to the education provided by the healthcare provider. Teaching the key factors to determine the credibility of a website is information that should be shared with patients and families.Although the Internet may be a source of empowerment for patients, it can overwhelm users because of the sheer amount of information that is available (Anderson & Klemm 2008). References Anderson, A. & Klemm, P. (2008) The Internet: Friend or foe when providing patient education? Clinical Journal of Oncology Nursing. 12(1) 55-63. National Library of Medicine (2012). Evaluating internet health information. A tutorial from the National Library of Medicine. Retrieved from http://www. nlm. nih. gov/medlineplus/webeval/webeval. html

Waikato River settlement Assignment Example | Topics and Well Written Essays - 1750 words

Waikato River settlement - Assignment Example Partnerships normally offer great opportunities to increase the availability of knowledge and the available resources and this opens up opportunities for development of an area which is more inclusive and unified as it brings on board all the concerned parties. Bodansky in his research states that there are a number of economic activities practiced by the Maori including forestry, fishing and agriculture and they normally account for annual income of between 1billion US dollars and 1.9 billion US dollars in their economy but this source of livelihood is under threat from the destruction of the environment and unsustainable use of the environmental resources. This paper takes a comprehensive overview of the Maori and Crown people scrutinizing their worldviews on different issues including their customary rights, ownership and stewardship. Finally we shall survey the issue of sustainability and how this important issue is under threat and finally recommend solutions for a better and mo re sustainable environment within the Waikato Basin. Until the year 2004, the Maori people have had a greater control on the management of resources and decision making than it has ever been during the colonial past periods. A number of treaty settlements have been used to bring the economy of the Maori people into the modern world market as well as the global economy (Selby, 2010). According to a recent analysis, forestry, fishery and agriculture account for about 1-1.9 billion US dollars of the Maori economy every year (NZIER, 2003). However, study has also indicated that this source of livelihood for the society is under threat from unplanned and unsustainable use of the available resources. The Maori leaders are expected to be conscious of the unique relationship they have with the environment and also of the ways in which long term sustainability of the environment, the society, the economy and the cultural values can be ensured. It is however not enough to simply achieve

Wednesday, August 28, 2019

How creative are the filmmakers when presenting a story Essay

How creative are the filmmakers when presenting a story - Essay Example Memento There is a usual ‘noir and revenge’ narrative behind Memento (Mottram, 2002). A husband seeks vengeance on the individual who killed his wife and left him with his condition. The police force could not be of assistance to him in finding the killer. The only aid he has is his somewhat suspiciously motivated female friend who is a barmaid. In addition, the entire plot plays in a completely ‘anonymous, bleak, and blank setting’ that puts emphasis on the seclusion of the leading role. Distinctive moods of typical film noir, for instance, isolation, loneliness, disappointment, negativity, immorality, guiltiness and mainly mistrust, can be found in Memento. In addition, the film is full of ‘noirish flashbacks’ and it has no ‘happy ending’ (Kania, 2009). It’s exclusively prepared storyline makes this movie so unique and different. Even though the narrative behind the movie is quite easy, the storyline structure is very diffi cult and smart, which requires continuous concentration of its viewers (Mottram, 2002). The memory loss issue of the leading role in addition to his confused and mostly pathetic efforts to slowly place the mystery of his wife’s killing together is cleverly connected to the way the entire story is told. The reverse storyline structure of the key plot with its ending being shown during the initial five minutes of the movie, the replacement of color and black and white sequences, and the fact that a few parts of the movie are displayed more than once, are believed to make the spectators feel as perplexed as Leonard (leading role) is. However, the closer the film gets to the closing part the less the spectators are perplexed as they can remember things that Leonard cannot. Memento is a sign of a movie that may have had a low finances, but came together with a lot of thinking, intelligence and especially persistence (Mottram, 2002). Due to the exceptional and complex approach of n arration, this movie not just ‘needs but also deserves multiple viewings’ (Mottram, 2002). Memento symbolizes an achievement of writing, directing, as well as acting. This movie belongs to the ‘neo-noir and revenge’ movie genre. One of the most significant features of classic movie noir is the plot, since all these movies had some similarities: They were all gloomy, distressed stories and they were all set in current settings of the city, or the inner-city cover. Their tales usually revolve around law and order, with strangers, entrepreneurs as well as criminals’ busy scheming vengeance or killing. The mood constantly stays the same. Classic film noir tales, regardless of their detail, are always gloomy, infatuated and packed with mysterious plan. Part of this gloom is to do with an unavoidable destiny that takes its ill harvest no matter what (Mottram, 2002). Memento has the features of ‘classic film noir’ (Kania, 2009). Frame of mind i n addition to tone, exemplified this genre. One of the methods applied is the very dim lights, which makes it difficult to understand the action. The use of nighttime as well as silhouettes is a persistent aspect of noir movies, putting emphasis on aloofness along with obscurity. In the movies, the world usually appears like a detention center, this is mostly revealed by image metaphors, ‘like sun blinds’

Tuesday, August 27, 2019

Sealed Bids vs. Competitive Proposals Essay Example | Topics and Well Written Essays - 250 words

Sealed Bids vs. Competitive Proposals - Essay Example In some cases, the contractors are able to change the price of their bids at the last moment as the lowest price gets leaked out. On the other hand, in the competitive proposals, more responsibility rests on the shoulders of the contractor as the entire work methodology is proposed by him rather than the client. It is risky as the competitive proposals are adopted as a method of procurement particularly for very complex projects (quelchnet.com, n.d.). The contractor might not be able to execute the work as the proposed methodology might turn out to be actually more complicated than the contractor had anticipated. â€Å"Through the process of procurement request for proposal, bidders can underscore their experience and expertise in an area† (Conviron, 2011). In addition to that, every contractor submits just one proposal as the submission is followed by negotiation with an evaluation committee chosen by the client if the proposal is deemed acceptable. Since competitive proposal s are more flexible as compared to sealed bidding, information from one contractor might be disclosed to

Monday, August 26, 2019

UNREACHED PEOPLE GROUP PROJECT ABSTRACT Assignment

UNREACHED PEOPLE GROUP PROJECT ABSTRACT - Assignment Example The modern lifestyles characterized with minimal physical social interaction are largely to blame for the lack of information on such evident topics in the public domain. This research therefore seeks to legitimize this claim by studying the missionary work in Arab countries by Brazilian missionaries. A missionary act, just like evangelism, is a means of spreading the gospel to regions considered unreachable by Christian adherents. The Arab world is largely Islamic which implies that such people have adequate knowledge on religion and arguably Christianity. However, the two have different cultures which may be a hindrance to changing their mentality into concurring with the teachings of Christianity thus influencing their refusal to change their religions. Hospitality is a virtue of religions espoused upon by Jesus Christ and enshrined in the holy books of the religion. The differing cultures of the Arabs and the Brazilian missionaries may arguably have an influence on their understanding of hospitality, which infers that the Arabic understanding if hospitality especially in relation to people ascribing to other faiths may impact their receipt of such sensational and radical information concerning a new faith. The research therefore seeks to establish the role that culture plays in understanding hospitality and how the two influences the spread of the

Sunday, August 25, 2019

Homelessness in the UK - what are the causes and its effect in the Dissertation

Homelessness in the UK - what are the causes and its effect in the society - Dissertation Example The houses of the people can also be destroyed by natural calamities like floods and hurricanes. (Main Causes of Homelessness, n.d.). The events of homelessness makes an individual all the more physically and psychologically unfit to live in. These people suffer from diseases like cold and insomnia. (Bodine, 2010). Aims The research paper on Homelessness in United Kingdom aims to achieve the following goals which can be listed as follows: 1. The causes which lead to making the people homeless in United Kingdom. 2. Effects of the factors which causes the people to become homeless on the life cycle of the people affected by such. 3. The changes brought about by the government through the introduction of policy measures aimed at preventing the people to become homeless. Objectives The objectives behind studying Homelessness in United Kingdom are to: 1. Identify the factors which cause the event of homelessness in United Kingdom. The identification of such factors would help focus on the safeguarding of communities from being made homeless. 2. Evaluate the potency of such impacts in disturbing the lives of the people in United Kingdom by making them physically and mentally impaired. The people put in the streets continually face the climatic changes which turns fatal for them. 3. Assess the amount of damages to life of the people rendered due to homelessness and policy measures taken if any to counter such. Scope of the Research The scope of the research paper is to underlie the causes which lead to the event of making people deprived of their homely or domestic environments. In that the paper endeavors to gauge the impact of such factors in immensely affecting the life patterns of the people residing in United Kingdom. The paper also divulges to find any significant policy measures taken by the government of the country in helping the people put in the streets to gain a better life. The research conducted gains due importance for it specifically focuses on a parti cular social evil which aims at snatching the basic means of living from the general population for which they also meet fatal incidents. The event of homelessness in United Kingdom has huge impact on the construction and housing business of the country. These families which were rendered homeless posed several types of complaints based on the houses rendered to them by the government of the country so as to counter the event. Homeless applicants who were rendered private homes to dwell in complained of lack of proper spaces to help them move away freely in the apartment. Further the location of the private buildings being near the crowded corners caused the occupants major disturbances in maintaining a silent environment in and around their homes. Further other special types of accommodation provided to the homeless people also countered huge problems for the rise in the amount of drug peddlers in the region. The people living in such households appeared to fear from the impacts of such people on affecting their children. For homeless people the best housing solution rendered by the United Kingdom government is to allow the local communities to build in permanent homes for them. Permanent homes build by the local authority for these people were favored above the temporary homes firstly because of their sense of security. However the government of

Saturday, August 24, 2019

Six Sigma and DMAIC Imporvement Process Coursework

Six Sigma and DMAIC Imporvement Process - Coursework Example There six sigma has proven to an effective tool for improving performance. Basically, the effective adoption of the six sigma facilitates quality improvement and efficient performance (Pande & Holpp, 2002). For a clear understanding of the benefits accrued from using the six sigma it is important to study its five phase, which are expressed as DMAIC. The five phase are definition of the problem (D) measuring/mapping the process (M), analyzing the cause of the problem (A), improving the situation (I) and finally controlling the implantation of the solution (C). The purpose of this study is to evaluate an article that focuses on a case study of an aluminum company. The issue of quality improvement has been very controversial among various companies. In essence, every company strives to outdo the competitors by producing unique products that are perceived to be of top quality. From the case study, it can be identified that the company faces considerable competition from other firms producing similar products. Earlier studies reveal that the six sigma model is an infective approach to quality improvement. Apparently. From the case study, it can be identified that the author recognizes the importance of six sigma in problem-solving. In addition, the author points out that DMAIC is an appropriate procedure to solve the problems facing the company. In essence, various scholars encourage the use DMAIC in solving business challenges (Breyfogle, 2003). It is important to note that businesses are usually exposed to problems and that these problems have to be solved cautiously to mitigate adverse consequences. Apparently, the quality of a product is an important component as far as generation of profits is concerned (George, 2002). In essence, a company whose products are of high quality enjoys a better market share compared to that whose products are of low quality. Both the author of the article and the existing studies argue

Friday, August 23, 2019

Critically evaluate the extent to which intangible resources can be Essay

Critically evaluate the extent to which intangible resources can be used to legitimise management authority in organisations - Essay Example Thus, they are the assets, which the company must recognize as its significant components, which are rather better determinants of the company’s performance than the actual money it generates (Cameron, pp. 88-92, 2004). Most authors and intellectuals, today, focus on the need of knowledge workers in the modern industry to keep the ship sailing. They are of the opinion than in this uncertain world, where downsizing and losses in one company, may also affect the situation in another company, located way far from the host (TSG, p.1, 2009). On the other hand, increase in demand of a product or a service in one country, may also lead to increase in demand of the same product in some other culturally distinct country. Economic insecurity may often liquidate tangible resources with no prior notice and the global dilemma of interrelated companies, put greater expectations on the managers to control and organize the information from around the world on their fingertips. In these difficult times, human resource, as the intangible resource of the company, is the most effective tool to cope up with changing situations (Andriessen, p.1 2004). Today’s era is information era and all the stake of the companies requires handling and managing information critically. This information may include knowledge about the product or service cost, employees’ needs and concerns, competitors in the market, company’s capital at hand etc. Managing company information carefully means that internal members of the organization take good care of the power entrusted upon them and channelized the information attained properly down the hierarchy. According to management research, much of the company’s progress depends on the top managements efforts to align the company’s resources. With regard to intangible resources, strategic competitiveness is much dependent on the way lower staff, age, workload, education standard, job performance, and empowerment

Thursday, August 22, 2019

Cost-Benefit and Cost-Effective Evaluation Methods Useful for Evaluating Effective Training Essay Example for Free

Cost-Benefit and Cost-Effective Evaluation Methods Useful for Evaluating Effective Training Essay For over a hundred years the concept of both cost-benefit evaluation and cost-effective evaluation methods has been used for numerous fields and industries to see the positive and negative sides of undertaking a project. These methods has been used to analyze public health; transportation; and etc. Each and every company would rather see more of profits than losses. Employers see that their employees and the trainings are investments to their business. Hence, employers need to have assurances that the trainings that they give out to their employees would be both beneficial to the employers in terms of profit and as well as return of investment (ROI). In order to gain much profit, the employers need to have their employees be up to par with industry standards with avant-garde skills through effective training. Employers do take note that in order to have highly qualified employees they need to give effective and quality training. Using the above mentioned evaluation methods would let the employers know: how much it would cost them to train their employees; the duration of the training – would determine the effectiveness and implementation of the skills. Then again these methodologies are not full-proof as there are numerous factors to be taken note of, to guarantee one hundred percent success rate of these trainings such as: the capabilities of their employees, the willingness of their employees to learn these trainings; and finally applying them during operation. The use of these evaluation methods can be a rough guide to corporations and institutions, to name a few, to see the quality and assess projected costs of trainings and steps to be taken. With such projections yielded by these methods one may be on track with their project management and asset management.

Wednesday, August 21, 2019

Against Banning Full-Face Veils Essay Example for Free

Against Banning Full-Face Veils Essay Mirayda Martinez Against Banning Full-Face Veils Banning Full-Face Veils would not only make Muslim women feel vulnerable to men as a sexual desire, it would also make them feel betrayed by the country or state they live in. Being told what to wear is like being told what to eat or who to hang out with, it is unjust. Muslim women should be able to dress how they would like without being Judged or assaulted by anyone. The veil helps assure the women that they are not being looked at as a desire and in a way, wearing the veil helps make them feel closer to God. Enforcing laws against Full-Face Veils would be amiss because it would e stripping them of freedom of expression and religion. First, Muslim women should not be Judged by what they wear Just because it is different from the culture and beliefs of everyone else. It is not a crime to be different, but then why do some women get assaulted and harassed for wearing a veil? Just because they do not believe in the same religion as other people does not mean they should get treated any differently than others. Muslim women should be entitled to wear whatever they want to, even if it is a Full-Face Veil that covers them from top to bottom. For some omen, veiling is an expression of their religious beliefs, and is no less or more a part of their religious observance than praying five times a day or fasting during Ramadan, the holy month of fasting and prayer in Islam. Veiling is a way women express their religious belief and should not get treated any less important than fasting or praying to wards Mecca; it should get treated with the same respect. Second, the veil is very important.

Postnatal Depression and Social Exclusion

Postnatal Depression and Social Exclusion An essay Structural Requirements : The essay must include: What postnatal depression is; What is Post Natal Depression? Postnatal depression is a discrete clinical entity which appears to have a number of different aetiological factors. It does not appear to be greatly influenced by geography (Affonso et al 2000), or culture (Oates et al, 2004). A typical rate for detection of postnatal depression is quoted as about 13% of postnatal women (O’Hara et al 1996). It classically arises during the first three months post partum but the spread of onset is wide. (Cooper Murray 1995) One of the prime factors is considered to be the sudden postnatal drop in progesterone levels in the post partum days. (Nappi et al 2001) The placenta is responsible for the vast majority of circulating progesterone during pregnancy and it’s delivery is effectively responsible for the precipitate drop in levels post partum. There may also be other related hormonal changes including the fluctuations in prolactin levels (Hendrick et al 1998) and falling oestrogen and cortisol levels. (Halari et al. 2004) Symptoms can initially include irritability, tearfulness, insomnia, hypochondriasis, headache and impairment of concentration. There is a maximal incidence of these symptoms on about the fifth post partum day and these can progress to frank depressive symptoms over a variable period. (Ramsay et al 1995). There are various tools that can be used to measure the degree of depression and these include the Edinburgh postnatal depression scale,(Cox et al 1987), The Stein scale for maternity blues, (Stein 1980) and the Beck depression rating inventory. (Beck et al 1961). The key issues that affect the health and well being of people who are described as vulnerable'(in this case have postnatal depression); Key issues affecting vulnerable patients There have been a number of studies that look at the effectiveness of treatment of postnatal depression. One of the most recent publications (Dennis 2005) provides a meta-analysis of the factors which influence the outcome in the condition. The author concluded that the only strategy that was shown to have â€Å"a clear preventative effect† was intensive post-partum support from the healthcare professionals involved in the case. Curiously, this was found to be more effective than similar regimes which included an ante-natal component as well. The morbidity associated with postnatal depression has a number of potential consequences not only for the mother, but also the child and the rest of the family as well. (Oakley et al 1996) One of the most significant is the fact that one episode of postnatal depression is the greatest predictor (or risk factor) for another episode after subsequent pregnancies. The children are likely to have difficulties because of possible problems with bonding and the mother’s possible negative perceptions of the behaviour of the children. (Cooper Murray 1997) Some studies have shown that mothers with postnatal depression have derived beneficial help from social support during pregnancy. (Ray et al 2000). It would therefore appear that the key issues in this area are identification of the predictive factors that make postnatal depression more likely and then the provision of prompt supportive measures if those factors are established. Resources at local, regional national level that offer support to people with postnatal depression (my local area is hull, east york’ ); Local resources for support Apart from the more â€Å"traditional â€Å" resources of the primary healthcare team of the General Practice the Midwife and the Health Visitor, some centres have tried experiments with postnatal support worker provision (To the client: I don’t know if this is relevant to your area. If it is, you may wish to enlarge on this) (Morrell 2000). This particular study found that the patients found an high level of satisfaction with the service – but no more so than with the services provided by the rest of the primary healthcare team. Analysis of the results showed that the postnatal support worker helped to achieve higher levels of breast feeding, but had little impact on the severity or frequency of postnatal depression. One significant factor that was found, however, was that support from a partner was a significant positive factor in preventing severe postnatal depression. Must identify and reflect on appropriate communication strategies when working with vulnerable people; Communication strategies Several recent studies have shown that healthcare professionals often fail to spot the signs of postnatal depression. (Bick et al 1995). Making the diagnosis is obviously the prerequisite of establishing a treatment regime so it is clearly vital for all healthcare professionals to be on their guard for warning signs – sleep disturbance, irritability, mood swings and irrationality. (Ramsay et al 1995) Reflection and reflective practice is a vital part of effective nursing. (Gibbs 1998) . Each healthcare professional should ideally reflect upon their management of each individual case to decide whether they were communicating optimally with the patient and that they were fully receptive to all that was on the patient’s agenda. Communication is a two-way modality. Bulman (et al.2004) points to the need to understand, at a deeper level, just what it is the message that the patient is taking away from any interaction. Communication is therefore vital in the strategy to empower and educate the vulnerable patient. Must identify the role of the midwife / health visitor and other health and social care professionals in the promotion of social inclusion Role of midwife and Health Visitor The new mother is often at the centre of an emotional rollercoaster. The sudden culmination of nine months of expectation results (frequently) in a flurry of support from healthcare professionals and family, which then rapidly evaporates and the mother is left to deal with the new situation which is frequently stressful. (Kitzman et al 1997) The midwife can obviously help by preparing the ground in the antenatal period and offering support in the immediate postnatal period. (Dennis 2005). The health visitor is probably better placed to be aware of any developing warning signals that postnatal depression is developing, as they are likely to be in contact with the patient during the â€Å"high risk period†. (Cooper Murray 1995). It has been suggested that encouragement of the mother to attend the health visitor clinic rather than to have home visits is a positive way of encouraging social inclusion. (Seeley et al 1996) Studies which have looked at the cost-effectiveness of using community postnatal support service workers have shown no benefit over the more traditional midwife and Health Visitor support. (Morrell et al 2000) References Affonso DD, De AK, Horowitz JA, Mayberry LJ. 2000  An international study exploring levels of postpartum depressive symptomatology.  J Psychosom Res 2000;49: 207-16. Beck AT, Ward CH, Mendelson M, Mock J, Baugh J. 1961  An inventory for measuring depression.  Arch Gen Psychiatry 1961;4:561-71. Bick D, MacArthur C. 1995  The extent, severity and effect of health problems after childbirth.  Br J Midwifery 1995; 3: 27-31 Bulman Schultz 2004  Reflective Practice in Nursing  The Growth of the Professional Practitioner Third Edition  Edited By: CHRIS BULMAN, School of Health Care, Oxford Brookes University SUE SCHUTZ, Oxford Brookes University 2004 Cooper Murra 1995  Course and recurrence of postnatal depression. Evidence for the specificity of the diagnostic concept  The British Journal of Psychiatry 166: 191-195 (1995) Cooper P, Murray L. 1997  Prediction, detection, and treatment of postnatal depression.  Arch Dis Child 1997;77: 97-9   Cox JL, Holden JM, Sagovsky R. 1987  Detection of post-natal depression. Development of the 10-item Edinburgh post-natal depression scale.  Br J Psychiatry 1987;150:782-6. Dennis C-L. 2005 Psychosocial and psychological interventions for prevention of postnatal depression: systematic review BMJ, Jul 2005; 331: 15.   Gibbs, G (1998)  Learning by doing: A guide to Teaching and Learning methods EMU Oxford Brookes University, Oxford. 1998 Halari, V. Kumari, R. Mehrotra, M. Wheeler, M. Hines, and T. Sharma 2004  The Relationship of Sex Hormones and Cortisol with Cognitive functioning in Schizophrenia  J Psychopharmacol, September 1, 2004; 18(3): 366 374.   Hendrick, L. L. Altshuler, and R. Suri 1998  Hormonal Changes in the Postpartum and Implications for Postpartum Depression  Psychosomatics, April 1, 1998; 39(2): 93 101 Kitzman H, Olds DL, Henderson CR, Hanks C, Cole R, Tatelbaum R, et al. L 1997  Effect of prenatal and infancy home visitation by nurses on pregnancy outcomes, childhood injuries, and repeated childbearing.  JAMA 1997; 278: 644-652 Nappi, F. Petraglia, S. Luisi, F. Polatti, C. Farina, and A. R. Genazzani 2001  Serum Allopregnanolone in Women With Postpartum Blues  Obstet. Gynecol., January 1, 2001; 97(1): 77 80. Oakley A, Hickey D, Rajan L. 1996  Social support in pregnancy: does it have long-term effects?  J Reprod Infant Psychol 1996; 14: 7-22. Oates MR, Cox JL, Neema S, Asten P, Glangeaud-Freudenthal N, Figueiredo B, et al. 2004  Postnatal depression across countries and cultures: a qualitative study.  Br J Psychiatry Suppl 2004;46: s10-6. OHara M, Swain A. 1996  Rates and risk of postpartum depression—a meta-analysis.  Int Rev Psychiatry 1996;8: 37-54. Ramsay. R and T. Fahy 1995  Recent Advances: Psychiatry  BMJ, July 15, 1995; 311(6998): 167 170. Ray KL, Hodnett ED. 2000  Caregiver support for postpartum depression. In: Cochrane Collaboration,ed. Cochrane Library. Issue 1.  Oxford: Update Software, 2000. Seeley S, Murray L, Cooper PJ. 1996  The outcome for mothers and babies of health visitor intervention.  Health Visitor 1996;69:135-138. Stein GS. 1980  The pattern of mental change and body weight in the first post partum week.  J Psychosom Res 1980;24:1165-71. PDG. Word count 1,665

Tuesday, August 20, 2019

Publication of Charlotte Bronte’s Shirley :: Essays Papeers

Publication of Charlotte Bronte’s Shirley Background on Charlotte Bronte Maria Brandwell Bronte gave birth to Charlotte, her third child out of six within the span of seven years, on April 12, 1816 in Bradford, Yorkshire. Charlotte began her schooling at the Clergy Daughter’s School on August 10, 1824, but due to harsh conditions at the school she returned after only one year. Upon returning home she was schooled by her aunt, and then attended Roe Head in 1831. Charlotte struggled finding an occupation that she enjoyed. She became a teacher at Roe Head, but she hated the way it was run and left shortly thereafter. She also tried to be a governess twice, but due to her shy nature and the fact that she missed her sisters so dearly, she returned home. Charlotte’s thirst for knowledge took her to Brussels with her sister Emily, where she learned French, German, and management skills. After Charlotte’s trip to Brussels, she had a streak of bad luck. In 1844 she attempted to open her own school, but failed. She then wrote a collection of poems with her sisters entitled Poems by Currer, Ellis, and Acton, but only sold two copies. She then decided to write her own novel, The Professor in 1846, but could not get it published. She attempted six different times, but no one would publish her book. Charlotte Bronte obtained her fame in 1874 when she published her first novel, Jane Eyre, which was an immediate success. Bronte did not want to use her real name, so at this time she called herself Currer Bell. Following Jane Eyre, Bronte wrote Shirley in 1848, but her second novel did not go over well with the public. In 1853, Bronte wrote Villette as a third novel, which was another success for her. Charlotte Bronte’s life began to take a turn for the better. She got married in 1854 to Arthur Bell Nicholls, who was her father’s curate. Unfortunately, she died on March 31, 1855, just a year after her marriage to Nicholls. She died from a digestive tract infection, and her unborn child died with her. It was said that she contracted this disease from her servant, Toby. Although Charlotte Bronte faced many setbacks throughout her life, she will forever remain an outstanding Victorian novelist because of her talented writing style.

Monday, August 19, 2019

Carol Ann Duffys Little Red-Cap and Delilah Essay -- Carol Ann Duffy

Carol Ann Duffy's "Little Red-Cap† and â€Å"Delilah" â€Å"During the 1980s, a unique type and style of women-led peace protest strategies emerged that relied on the powerful language, and particularly the powerful imagery of women as a group engaged in an extended protest against nuclear weapons† (LaWare 18). Carol Ann Duffy’s book, The World’s Wife, was first published in Great Britain in 1999, and two of its dramatic monologues similarly rely on the powerful language and imagery of women engaged in a protest against historically patriarchal narratives and male violence. â€Å"While some peace encampments [in the 1980s] included men and women, many were women only, including one of the first and longest lasting peace encampments, the Women’s Peace Camp at Greenham Common in Newbury, England, which evolved into and ignited a women’s peace movement† (LaWare 18). â€Å"[T]housands of women from Britain and the world†¦ later visited and lived at the camp during its almost twenty years of existence, until the last group of women left in 2000[,]† and while it’s not clear whether Duffy visited the camp, the camp’s strategies of resistance are embedded in two of her poems (LaWare 19). The speakers of â€Å"Little Red-Cap† and â€Å"Delilah† employ the camp’s strategies of physically embracing a symbol of male violence, subsequently defacing the symbol through an act of creative nonviolence, and finally transforming the symbol’s patriarchal sphere into a space filled with peace and feminine imagery. First, the speakers of Duffy’s two poems resemble the protestors at Greenham Common who physically embraced a symbol of male violence: [T]he Greenham Common Women’s Peace Camp gained both national and international attention in D... ...orld’s Wife. New York: Faber, 1999. 28-29. ---. â€Å"Little Red-Cap.† The World’s Wife. New York: Faber, 1999. 3-4. Holy Bible, New International Version. Zondervan, gen. ed. International Bible Society, 1984. BibleGateway.com. Gospel Communications International. 14 May 2005 search=judges%2016&version1=31>. LaWare, Margaret L. â€Å"Circling the Missiles and Staining Them Red: Feminist Rhetorical Invention and Strategies of Resistance at the Women’s Peace Camp at Greenham Common.† NWSA Journal 16.3 (2004): 18-41. Little Red Riding-Hood Picture Book. London: George Routledge and Sons, circa 1870. The Little Red Riding Hood Project. Ed. Michael N. Salda. Dec. 1995. The de Grummond Children’s Literature Research Collection, University of Southern Mississippi. 14 May 2005

Sunday, August 18, 2019

Philosophy of Classroom Discipline Essay -- essays research papers

Philosophy of Classroom Discipline â€Å"Power is exercised only over free subjects, and only insofar as they are free. By this we mean individual or collective subjects who are faced with a field of possibilities in which several ways of behaving, several reactions and diverse compartments may be realized.† (Foucault) Foucault and Heidegger, modern philosophers, both describe power in these terms, as the facility to manipulate an object without force. Understanding this point of view is important, not only for state institutions who attempt to exert power over citizens and deviants, but also for teachers as they try to use disciplinary power to control the events in their classroom. Unfortunately, the majority of status quo disciplinary systems are entrenched in the mindset that power can be exerted over individuals through the use of coercive punishments and threats, actions which usually have the complete opposite result, less control over the students. A system that more closely mirrors Thomas Gordon’s view of discipline as self-control would be a far superior disciplinary model because it recognizes the true nature of power. Thomas Gordon’s disciplinary model specifically critiques the use of coercion and intimidation to exert power and control over students. Coercion to Gordon only reinforces a notion that violence is an acceptable form of control. Additionally, coerced and intimidated students will often retaliate against authority figures who attempt to exert coerciv...

Saturday, August 17, 2019

Morality †Macbeth Essay

Morality is the reference to codes of conduct that are brought forward by a society. It is evident in the play Macbeth that making moral decisions is superior to making immoral choices. In the end of the play the result of the characters moral and immoral choices all comes to fruition. Consequently the actions of those who acted morally dealt with their situation much better than those who did not. Morality is the reference to codes of conduct that are brought forward by a society. It is evident in the play Macbeth that making moral decisions is superior to making immoral choices. In the end of the play the result of the characters moral and immoral choices all comes to fruition. Consequently the actions of those who acted morally dealt with their situation much better than those who did not. There were some characters in the play that knew exactly what was right and wrong, but still chose to ignore their integrity. Lady Macbeth demonstrates immoral behavior throughout the whole play which results in a tragic conclusion for everyone. For instance, she devised the plan to kill the king knowing very well that it was wrong to do so. In addition, she was tempted by the opportunity for power and convinced Macbeth to go along with the plan even though he was thinking about not doing it. â€Å"What beast was’t, then, /That made you break this enterprise to me? / When you durst do it, then you were a man;† (Shakespeare. 1. 7. 48-50). Macbeth was mainly depicted in the play to be immoral however he did seem to have some good morals in the beginning. He was perceived as a great warrior and was thought so highly of that Duncan granted him the title of Thane of Cawdor. Throughout the rest of the play there is a decline in Macbeth’s character after he immorally killed the King for no good reason other than power. â€Å"I am settled, and bend up/ Each corporal agent to this terrible feat. † (Shakespeare 1. 7. 80). This decision sparked a whole bunch of murders which resulted in a catastrophic ending for both Macbeth and his wife. There is some evidence in the play that would suggest that acting immorally will bring you good results. For instance, Macbeth knew that he would not become king since Duncan already revealed that his son Malcolm would be the imminent king. In order to fulfill the ambition that he was feeling he knew he had to act immorally. This turned out to be a great decision because Macbeth ended up with what he wanted which was to become the king. â€Å"Thou has it now: king, Cawdor, Glamis, all. † (Shakespeare. 3. 1. 1). Although Macbeth did get what the witches prophesied, the immoral behavior had its consequences. For example, towards the end of the play everything had turned against him including his own people and his wife committed suicide. â€Å"The Queen, my lord, is dead. † (Shakespeare 5. 5. 17). In Macbeth it is very blatantly depicted that choosing to indulge in immoral behavior will result in negative consequences. It is apparent at the end of the play that all of the immoral actions that took place resulted in a very disastrous ending.

Friday, August 16, 2019

A Culture of Violence

A culture of violence may not always go noticed by people, especially those who are living within a community. The closeness of the people therein, together with a fixed mindset or opinion about the community, may prevent residents from realizing or accepting the fact that things have changed for the worse.Moreover, there is the possibility that people might get too complacent that they would no longer bother to identify key issues, such as those involving attitudes or cultures that need to be changed.Article SummaryThe story of Reena Virk, a fourteen year old, East Indian girl, illustrates this point. In â€Å"Reena Virk's short life and lonely death: swept away: a 14-year-  Ã‚  Ã‚   old girl beaten by the very teens she wanted as friends was left to the cold salt-water,† Cernetig tells a classic story of a girl coming from a minority group who, for this reason, desperately tries to fit in her new surroundings.Being taken from her home, she finds herself in a new but unfrie ndly environment where teenagers already knew each other. It did not help Reena at all that she was overweight. Thus, she got picked on by the other teenagers in her school.However, this classic story turned out worse than it should have. While the usual story ends happily, with the ugly duckling fitting in after sometime, this one ended, quite tragically, in Reena’s death.Unbeknownst to the local community, small groups of teenagers in the local schools had been forming gangs that are similar to those seen in television shows featuring Los Angeles gangs (Cernetig). Moreover, these teenagers appear to have been influenced by songs and shows that abound in mainstream media, which all glorify violence and the proliferation of gangs.Examples of these media are what Cernetig calls â€Å"gangsta-rap CDs (Cernetig).† This influence has gone to the extent of ending up with a murdered young girl, without anyone taking responsibility for it, despite the fact that several suspec ts have already been apprehended (Cernetig).The story gets more notorious because of the delay with which Reena’s body was found. One week has passed before the police were able to locate her body. Moreover, their theory on the case had been built largely on speculations based on stories that had circulated about town.AnalysisReena’s story raises several issues for critical analysis. The first one involves the media’s portrayal of an L.A. gang. This is a crucial issue in the story because this was apparently the main reason why people at very young ages are exposed to violence. Worse, the media is shown to be primarily responsible for building a certain image of a gang as cool or fun.

Study Plan

All world’s population is 7 billion, 1. 3 billion people spoken Chinese in worldwide, approximately worldwide 1 in every 6-7 person can speak chinese. If you believe Chinese to be one language, rather than a grouping, it is the single most commonly spoken language on the planet. It is spoken in countries like China, Taiwan Singapore. For people interested in becoming fluent in Chinese, it can be intimidating and challenging. As Mongolia and China have been neighbors, many Mongolians are interested in China and its language and culture as well as Mongolians are more familiar about China than any other nation in the world.First reason of choosing China is it I’m familiar with country, secondly Chinese is getting more and more influential learning it gives me more advantage in the future. The international communication and trade program interests me because it gives me good intellectual. In today’s globalizing society, studying in foreign high developed country to be very significant to bring development to own business and individual’s development. I have information about Chinese education system which is excellent at trying theoretical knowledge to the practice work thus it affected me to choose it.Studying with people from various countries ;learning selected experience of such countries thus sharing information to be very important to the human development. Due to my studies, I am aware that my Chinese Language skills are still to increase. I have studied Chinese a little, but it’s not perfect yet. But I constantly try to improve myself by doing personal work. Besides it is one of the reasons I want to live and study in China. For my point of view, it’s the best way to acquire good accent and talk â€Å"true† Chinese, not only based on readings.As for a citizen, I would like to give my contribution to the development of my country as possible as I can on studying well in the China. I have many advantages to st udy successfully and keep studying with majoring on my profession without any difficulties further. I have shown some of my study plan as follows. – Study successfully majoring on my own qualification at the University; Attentively learn all subjects in accordance with appropriate term and planned hours; Get acquainted with the students who have the same purposes as well learn from Chinese history, culture, and life.I hope that you will look favorably on my application. Therefore accepting this scholarship is a big opportunity of good life and chance to become intelligent knowledge person that I dreamed of and it will be opening door to the my future. As for me, I have full confidence in myself that I am able to study Chinese as faster as I can. I have many advantages to study successfully and keep studying with majoring on my profession without any difficulties further.

Thursday, August 15, 2019

Jhkk

Culture Vocab Chart Word| Definition| Explain| Example| Language| Set of sounds, combination of sounds, and symbols used for communication. | Form of communication used amongst people. | EnglishFrenchBengali| Standard Language| Variant of language that a country’s people seek to use in schools, media, government, etc. | Used for official government business, education, and mass communications. English in AmericaFrench in FranceEnglish in Canada| Dialects| Local or regional characteristics of language| Has different pronunciation and distinctive grammar ad vocab| South: â€Å"Y'all† North: â€Å"You guys† South: â€Å"Fixin' to† North: â€Å"About to†| Isogloss| Geographic boundary within which linguistic feature occurs| separates regions in which different languages exist| Ossetia -European| Mutual Intelligibility| Ability of two people to understand each other when speaking | Understanding what someone else speaks| Bob understand what Billy says. L anguage families| Group of languages with a shared but fairly distant origin| Languages that came from same root language| Indo European| Sound Shift| Slight change in word across languages within subfamily or thorough language family | Change of language that affect pronunciation| | Proto-Indo-European| Linguistic hypothesis proposing existence of an ancestral Indo European language| Hearth of ancient Latin, Greek, and Sanskrit languages which link modern languages. Scandinavia to North Africa and North America through parts of Asia to Australia| Backward Reconstruction| Tracking of sound shifts and hardening of consonants â€Å"backward† toward original language | Going backward to original language | â€Å"milk† in English, â€Å"melk† in Dutch, â€Å"milche† in German. | Extinct Language| Language without any native speakers| Language not spoken anymore| Latin, Gothic, Hebrew| Deep Reconstruction| Technique using vocabulary of an extinct language to r e-create language that preceded it. Going back to a language’s preceded language| â€Å"milk† in English, â€Å"melk† in Dutch, â€Å"milche† in German| Nostratic| Language believed to be the ancestral language of Proto Indo Europeans| Also for the Kartvelian languages of the southern Caucasus regions| Hungarian, Finnish | Language Divergence| Opposite of language convergence; Process that German linguist August Schleicher suggested| languages are formed when language breaks into dialects due to lack of spatial interaction | French spoken in France is now different from the French spoken in Quebec. Language Convergence| Opposite of language divergence; collapsing of two languages into one| Results from consistent spatial interaction of people with different languages| Balkans where different languages (such as Greek, Albanian, Romania, Bulgarian) all share certain features of grammar| Renfrew Hypothesis| Developed by British scholar Colin Renfrew. Said th at 3 areas in and near first agricultural hearth, Fertile Crescent, gave rise to three language families. | Europe’s Indo European languages, North African and Arabian languages, and languages in present day Iran, Afghanistan, Pakistan, and India. Anatolia (Turkey), Western arc of Fertile Crescent, Eastern arc of Fertile Crescent. | Conquest theory| Major theory of how Proto-Indo-European diffused to Europe | Early speakers of Proto-Indo-European spread westward on horseback, and started diffusions of European tongues. | Modern day Ukraine. | Commodification | Process in which something is given monetary value| Good or idea is turned into something that has particular value and can be traded in market economy. | Chicken used to be expensive, and only for special occasions.With battery farming, chicken meat has become a commodity. | Monolingual States| Countries in which one language is spoken| These are countries with only one official language| Japan (Japanese)| Official Lan guage| Language selected often by educated and politically powerful elite| To promote internal cohesion, usually language used in courts and government. | America: EnglishFrance: FrenchMexico: Spanish| Toponym| Place name| Word coined in association with the name of a place. New York = From the Duke of York, Nova Scotia = â€Å"New Scotland†, New Jersey = from the Isle of Jersey in the English Channel| Secularism| Ethical and moral standards should be formulated and adhered to for life on Earth| Not to accommodate prescriptions of a deity and promise of comfortable afterlife| America| Monotheistic Religion| One supreme being is revered as creator and arbiter of all that exists in universe| Is the belief in the existence of one god or in the oneness of God. | Islam, Judaism, and Christianity. Polytheistic Religion| Multiple deities are revered as creators and arbiters of all that exists in universe| Belief in more than one god| Hinduism, Buddhism, Wicca| Animistic Religion| In animate objects possess souls | Can help or hinder human efforts on Earth| Shintoism, Animism. | Universalizing Religion| Belief that there is one true religion that is universal in scope| Religion that wants to take over world| Islam and Christianity| Ethnic Religion| Religion that is particular to one, culturally distinct group of people. Don’t actively seek converts through missionary work| Judaism, Hinduism| Romance Languages| Languages that lay in areas those were once controlled by the Roman Empire but were not subsequently overwhelmed. | Related languages derived from  Vulgar Latin and forming a subgroup of the  Italic languages  within the  Indo-European  language family. | French, Spanish, Italian, Romanian, and Portuguese. Germanic Languages| Languages that reflect expansion of people out of Northern Europe to west and south| Sub-branch of the  Indo-European  language family. | English, German, Danish, Norwegian, Swedish. | Slavic Languages| Languages developed as Slavic people migrated from base in present day Ukraine| Close to 2000 years ago| Russian, Polish, Czech, Slovak, Ukrainian, Slovenian, Bulgarian| Lingua Franca| Tongue spoken in ancient Mediterranean ports that consisted of mixture of Italian, French, Greek, Spanish, and some Arabic. â€Å"Common language†, language used among speakers of different languages for purpose of trade and commerce. | English| Pidgin Language| Parts of two or more languages are combined in simplified structure and vocabulary | Simplified language that develops as a means of communication between two or more groups that do not have a language in common. | Name of the Creole language  Tok Pisin  derives from the English words  talk pidgin. Creole Language| Language that began as pidgin language | Later adopted as mother tongue by people in place of mother tongue. | | Cultural Landscape| Visible imprint of human activity and culture on landscape| Imprinted on landscape by the activi ties of various human occupants | Building, forms, and artifacts| Placelessness| Loss of uniqueness of place | One place looks like the next| Association of Manchester with a distinctive style of music and club culture is relatively recent. Intrafaith boundaries| Boundaries within the same faith| A major religion’s boundaries| Sunni & ShiiteCatholic & Protestant| Interfaith boundaries| Boundaries between different religion| Major religions’ boundaries| Muslims & Christians. | Religious fundamentalism| Religious movement whose objectives are to return to the foundations of faith and to influence state policy| A usually  religious  movement or point of view characterized by a return to fundamental principles| Protestant  community in the  United States  in the early  20th century| Shari’a laws| System of Islamic law, sometimes called Qu’ranic law. Unlike most Western systems of law that are based on legal precedence, Sharia is based on interpret ation| Women must wear a hijab at all times, or else they will be stoned to death| Jihad| Doctrine within Islam, commonly translated as â€Å"Holy War† | Personal or collective struggle on the part of Muslims to live up to religious standards| defense of religion when attacked with aggressive wars of conquest and expansion| Folk culture| Cultural traits such ad dress mode, dwellings, and tradition| Institutions of usually small, traditional communities. Amish| Popular culture| Cultural traits such as dress, diet, and music that identify| Part of today’s changeable, urban-bases, media-influenced western societies. 2chainz, skinny jeans, Christmas tree| Local culture| Group of people in particular place who see themselves as a collective or community| Share experiences, customs, and traits, work to preserve those traits and customs| Hutterites in North America| Material culture| Art, housing, clothing, sports dances, foods and other similar items| Constructed or created by a group of people| Eating curry, wearing a kimono | Nonmaterial culture| Beliefs, practices, aesthetics, and values of a group of people| Not constructed or created by a group of people| Praying five times a day, French is spoken in France| Hierarchical diffusion | Idea or innovation spreads by passing first among most connected places or people | Leapfrogging of innovations over wide areas, with geographic distance a less important influence | Spread of fashion spreads from level to nest level | Hearth| Area where idea or cultural trait originates| Place of origin| Hearth of corn was from Mexico| Assimilate| People lose originality differentiating traits when they come into contact with another culture | Used to describe immigrant adaption to new places of residence| Mexican teens start acting/dressing more American after they move here. | Custom| Practice routinely followed by a group of people| Another word is tradition| Taking your shoes off before going into a house. | Cultu ral Appropriation| Culture adopts ustoms and knowledge from other cultures | Uses them for their unadoptable in that particular culture| Native American dream catchers adopted by USA and sold in stores| Neolocalism| Seeking out of regional culture and reinvigoration of it | In response to uncertainty of the modern world. | | Ethnic neighborhood| Situated in larger metropolitan city and constructed by a local culture| In which local culture can practice its customs| Little Haiti in Santa Domingo | Hinduism| One of oldest religions in modern world, originating in Indus River Valley| Doesn’t have a single founder, single theology, or agreement on its origins. | | Buddhism| Enlightenment would come through knowledge, no greed, craving, or desire. Complete honesty. Splintered from Hinduism as reaction to strict social hierarchy by Hinduism| | Caste system| Strict social segregation of people| Basis of ancestry and occupation| India’s Hindu society | Shintoism| Religion loca ted in Japan and related to Buddhism| Focuses particularly on nature and ancestor worship| | Taoism| Religion founded Lao Tsu and based on â€Å"Book of the Way† | Proper form of political rule on the oneness of humanity and nature| | Judaism| Roots and teachings of Abraham, uniting his people to worship only one god| Jews worship only one God, and God agrees to protect his chosen people, the Jews| | Diaspora | Forceful or voluntary dispersal of people from homeland to new place | Population dispersal or involuntary relocation| Jews during the Holocaust| Zionism| Movement to unite the Jews of the Diaspora| Establish a national homeland for them in the promised land. | | Sunni| Adherents to largest branch of Islam, believe in value of family and community in solution of life’s problem| Differ from Shiites in accepting the traditions of Muhammad as authoritative. | | Shiite| Also known as Shiahs, represent Persian variation of Islam | Believe in infallibility and divine right to authority of descendants of Ali. | Pilgrimage| Voluntary travel by an adherent to a sacred site| Pay respect or participate in a ritual at the site| Hajj| Hajj| Muslim pilgrimage to Mecca| Birthplace of Muhammad| | Authenticity| Accuracy with which a single stereotypical or typecast conveys| Otherwise dynamics and complex local culture or its customs| | Distance decay| Effects of distance on interaction| Greater the distance the less interaction | Mexican would be closer to American than Russian| Time-space compression| Social and psychological effects of living in a world which t-s convergence has rapidly reached high intensity| Associated with work of David Harvey | | Genocide | systematic killing or extermination of an entire people or nation| Planned elimination of a group of people| Jews during the Holocaust|

Wednesday, August 14, 2019

Itt221 Week 1 Research Assignment Part 1

Research Assignment, Part One Brandon Kelly IT221 – E-2 Fall 2011 Instructor: Stephen Todd 12-17-2011 Question 1 – Why does Windows Server 2008 come in different versions? What is the significance of each version? Most editions of Windows Server 2008 are available in x86-64 and IA-32 versions. Windows Server 2008 for Itanium-based Systems supports IA-64 processors. Microsoft has optimized the IA-64 version for high-workload scenarios like database servers and Line of Business (LOB) applications. As such it is not optimized for use as a file server or media server. Microsoft has announced that Windows Server 2008 is the last 32-bit Windows server operating system. Windows Server 2008 is available in the editions listed below, similar to Windows Server 2003. †¢ Windows Server 2008 Standard (IA-32 and x86-64) Windows Server 2008 Standard is one of Microsoft's entry level server offerings (alongside Windows Web Server 2008) and is one of the least expensive of the various editions available. Both 32-bit and 64-bit versions are available, and in terms of hardware Standard Edition supports up to 4GB of RAM and 4 processors. Windows Server 2008 is primarily targeted and small and mid-sized businesses (SMBs) and is ideal for providing domain, web, DNS, remote access, print, file and application services. Support for clustering, however, is notably absent from this edition. An upgrade path to Windows Server 2008 Standard is available from Windows 2000 Server and Windows Server 2003 Standard Edition. †¢ Windows Server 2008 Enterprise (IA-32 and x86-64) Windows Server 2008 Enterprise Edition provides greater functionality and scalability than the Standard Edition. As with Standard Edition both 32-bit and 64-bit versions are available. Enhancements include support for as many as 8 processors and up to 64GB of RAM on 32-bit systems and 2TB of RAM on 64-bit systems. Additional features of the Enterprise edition include support for clusters of up to 8 nodes and Active Directory Federated Services (AD FS). Windows Server 2000, Windows 2000 Advanced Server, Windows Server 2003 Standard Edition and Windows Server 2003 Enterprise Edition may all be upgraded to Windows Server 2008 Enterprise Edition. †¢ Windows Server 2008 Datacenter (IA-32 and x86-64) The Datacenter edition represents the top end of the Windows Server 2008 product range and is targeted at mission critical enterprises requiring stability and high uptime levels. Windows Server 2008 Datacenter edition is tied closely to the underlying hardware through the implementation of custom Hardware Abstraction Layers (HAL). As such, it is currently only possible to obtain Datacenter edition as part of a hardware purchase. As with other versions, the Datacenter edition is available in 32-bit and 64-bit versions and supports 64GB of RAM on 32-bit systems and up to 2TB of RAM on 64-bit systems. In addition, this edition supports a minimum of 8 processors up to a maximum of 64. Upgrade paths to Windows Server 2008 Datacenter Edition are available from the Datacenter editions of Windows 2000 and 2003. †¢ Windows HPC Server 2008 (Codenamed â€Å"Socrates†) (replacing Windows Compute Cluster Server 2003) Windows HPC Server 2008 R2, the Microsoft third-generation HPC solution, provides a comprehensive and cost-effective solution for harnessing the power of high-performance computing. Out-of-the-box, world-class performance, and scalability enable organizations of all sizes to rapidly deploy solutions ranging from personal HPC workstations to large clusters spanning thousands of nodes. Customers can lower both their operating and capital costs. Windows HPC Server 2008 R2 integrates easily with existing IT infrastructure to enable end users to access HPC resources using familiar Windows-based technologies. With a tightly integrated set of dedicated cluster and parallel development tools, anchored around Visual Studio 2010, developers can build robust and scalable HPC applications easily and quickly. Windows HPC Server 2008 R2 is complemented by a rich ecosystem of SI, ISV, and OEM partners to ensure that customers have access to the applications of their choice and the resources required to successfully run them. †¢ Windows Web Server 2008 (IA-32 and x86-64) Windows Web Server 2008 is essentially a version of Windows Server 2008 designed primarily for the purpose of providing web services. It includes Internet Information Services (IIS) 7. 0 along with associated services such as Simple Mail Transfer Protocol (SMTP) and Telnet. It is available in 32-bit and 64-bit versions and supports up to 4 processors. RAM is limited to 4GB and 32GB on 32-bit and 64-bit systems respectively. Windows Web Server 2008 lacks many of the features present in other editions such as clustering, BitLocker drive encryption, multipath I/O, Windows Internet Naming Service (WINS), Removable Storage Management and SAN Management †¢ Windows Storage Server 2008 (Codenamed â€Å"Magni†) (IA-32 and x86-64) Minimal information found. †¢ Windows Small Business Server 2008 (Codenamed â€Å"Cougar†) (x86-64) for small businesses Minimal information found. Windows Server 2008 for Itanium-based Systems Windows Server 2008 R2 for Itanium-Based Systems delivers an enterprise-class platform for deploying business-critical applications. Scale database, line-of-business, and custom applications to meet growing business needs. Windows Server 2008 R2, SQL Server 2008 R2 and the current 2010 line-up of our Developer Tools, plus associated . NET frameworks, will be the last iterations in each product line t o support the Intel Itanium processor and associated OEM server platforms. Windows Server 2008 Foundation (Codenamed â€Å"Lima†) Windows Server 2008 R2 Foundation is a cost-effective, entry-level technology foundation targeted at small business owners and IT generalists supporting small businesses. Foundation is an inexpensive, easy-to-deploy, proven, and reliable technology that provides organizations with the foundation to run the most prevalent business applications as well as share information and resources. Server Core is available in the Web, Standard, Enterprise and Datacenter editions. It is not available in the Itanium edition. Server Core is simply an alternate installation option supported by some of the editions, and not a separate edition by itself. Each architecture has a separate installation DVD. The 32-bit version of Windows Server 2008 Standard Edition is available to verified students for free through Microsoft's DreamSpark program. Question 2 – What are the new features or enhancements made to Windows Server 2008? How is Windows Server 2008 different from Windows Server 2003? Core OS improvements †¢ Fully multi-componentized operating system. †¢ Improved hot patching, a feature that allows non-kernel patches to occur without the need for a reboot. Support for being booted from Extensible Firmware Interface (EFI)-compliant firmware on x86-64 systems. †¢ Dynamic Hardware Partitioning o Support for the hot-addition or replacement of processors and memory, on capable hardware. Active Directory improvements †¢ Read-only domain controllers (RODCs) in Active Directory, intende d for use in branch office or other scenarios where a domain controller may reside in a low physical security environment. The RODC holds a non-writeable copy of Active Directory, and redirects all write attempts to a Full Domain Controller. It replicates all accounts except sensitive ones. citation needed][clarification needed] In RODC mode, credentials are not cached by default. Moreover, only the replication partner of the RODC needs to run Windows Server 2008. [clarification needed] Also, local administrators can log on to the machine to perform maintenance tasks without requiring administrative rights on the domain. †¢ Restartable Active Directory allows ADDS to be stopped and restarted from the Management Console or the command-line without rebooting the domain controller. This reduces downtime for offline operations and reduces overall DC servicing requirements with Server Core. ADDS is implemented as a Domain Controller Service in Windows Server 2008. Policy related improvements †¢ All of the Group Policy improvements from Windows Vista are included. Group Policy Management Console (GPMC) is built-in. The Group Policy objects are indexed for search and can be commented on. †¢ Policy-based networking with Network Access Protection, improved branch management and enhanced end user collaboration. Policies can be created to ensure greater Quality of Service for certain applications or services that require prioritization of network bandwidth between client and server. Granular password settings within a single domain – ability to implement different password policies for administrative accounts on a â€Å"group† and â€Å"user† basis, instead of a single set of password settings to the whole domain. Disk management and file storage improvements †¢ The ability to resize hard disk partitions without stopping the server, even th e system partition. This applies only to simple and spanned volumes, not to striped volumes. †¢ Shadow Copy based block-level backup which supports optical media, network shares and Windows Recovery Environment. DFS enhancements – SYSVOL on DFS-R, Read-only Folder Replication Member. There is also support for domain-based DFS namespaces that exceed the previous size recommendation of 5,000 folders with targets in a namespace. †¢ Several improvements to Failover Clustering (High-availability clusters). †¢ Internet Storage Naming Server (iSNS) enables central registration, deregistration and queries for iSCSI hard drives. Protocol and cryptography improvements †¢ Support for 128- and 256-bit AES encryption for the Kerberos authentication protocol. New cryptography (CNG) API which supports elliptic curve cryptography and improved certificate management. †¢ Secure Socket Tunneling Protocol, a new Microsoft proprietary VPN protocol. †¢ AuthIP, a Micro soft proprietary extension of the IKE cryptographic protocol used in IPsec VPN networks. †¢ Server Message Block 2. 0 protocol in the new TCP/IP stack provides a number of communication enhancements, including greater performance when connecting to file shares over high-latency links and better security through the use of mutual authentication and message signing. Miscellaneous improvements Windows Deployment Services replacing Automated Deployment Services and Remote Installation Services. Windows Deployment Services (WDS) support an enhanced multicast feature when deploying operating system images. †¢ Internet Information Services 7 – Increased security, Robocopy deployment, improved diagnostic tools, delegated administration. †¢ Windows Internal Database, a variant of SQL Server Express 2005, which serves as a common storage back-end for several other components such as Windows System Resource Manager, Windows SharePoint Services and Windows Server Update Se rvices. It is not intended to be used by third-party applications. †¢ An optional â€Å"Desktop Experience† component provides the same Windows Aero user interface as Windows Vista, both for local users, as well as remote users connecting through Remote Desktop. Question 3 – Why is 64-bit architecture an advantage? Advantages of 64-bit hardware and software Memory addressability Physical memory A 32-bit system architecture can directly address only a 4-GB address space. A 64-bit system architecture that is running a 64-bit edition of Windows Server can support up to 1,024 GB of both physical and addressable memory. Virtual memory The 64-bit editions of Windows Server can address 16 terabytes of virtual memory by using a flat addressing model. Virtual memory is divided equally between virtual address space for applications and the operating system. Even 32-bit applications can benefit from increased virtual memory address space when they are running in a 64-bit environment. For example, although a 32-bit application is still restricted to 4 GB of virtual memory, it no longer has to share that memory space with the operating system. As a result, it receives an effective increase in available virtual memory. Continuous memory Poor performance in 32-bit systems is often not the result of a lack of available memory, but the unavailability of large enough blocks of continuous memory. In a typical Windows SharePoint Services 3. 0 deployment, Windows, Internet Information Services (IIS), common language runtime (CLR), ASP. NET, SharePoint Products and Technologies, SSPs, and MDACs can all claim a portion of a server’s available virtual memory and can leave a 32-bit address space quite fragmented. When the CLR or SharePoint services request new memory blocks, it can be difficult to find a 64-MB segment in the crowded 32-bit address space. A 64-bit system offers practically unlimited address space for user mode processes. Better parallel processing A server that is using 32-bit architecture is limited to 32 CPUs. Improvements in parallel processing and bus architectures enable 64-bit environments to support as many as 64 processors and provide almost linear scalability with each additional processor. Faster bus architecture A 64-bit architecture provides more and wider general-purpose registers, which contribute to greater overall application speed. When there are more registers, there is less need to write persistent data to memory and then have to read it back just a few instructions later. Function calls are also faster in a 64-bit environment because as many as four arguments at a time can be passed in registers to a function. More secure The 64-bit editions of Windows Server offer the following enhanced security features: Buffer overflow protection A buffer overflow occurs when a data buffer is congested with more data than it is designed to handle. In 64-bit editions of Windows Server, the first parameters of a procedure call are passed in registers. As a result, it is less likely that the buffer will overflow, because the correct values have to be set up in registers and the variables and addresses have to be aligned on the stack. Data execution protection The 64-bit processors made by AMD and Intel include hardware support for data execution prevention (DEP). Windows Server uses DEP to prevent malicious code from being able to execute, even when a buffer overrun occurs. Even without a processor that supports DEP, Windows Server can detect code that is running in memory locations where it should not be. Patch Guard Microsoft Patch Guard technology prevents non-Microsoft programs from patching the Windows kernel. This technology prevents kernel mode drivers from extending or replacing kernel services, including system service dispatch tables, the interrupt descriptor table (IDT), and the global descriptor table (GDT). Third-party software is also prevented from allocating kernel stacks or patching any part of the kernel. Better scalability In a 64-bit environment, not only can database servers gain nearly unlimited virtual memory address space, but they also gain support for more physical memory. It is possible for a 64-bit server that is running 64-bit editions of Windows Server and SQL Server to get very large working data sets entirely into RAM, thereby improving performance and scalability. In addition, the number of application servers that are required to support a given user base can be substantially reduced because a 64-bit environment does not require worker processes to cycle as often. This reduced cycling results in fewer lost connections, improved I/O handling, and a better user experience. Lower total cost of ownership All the benefits of 64-bit operation that are listed in the previous sections enable you to do more with less. A 64-bit environment allows you to manage more data, serve more users, and run more applications while using less hardware. By reducing hardware, you are also able to reduce license, operations, and infrastructure costs. It takes up less floor space in your data center and costs less to maintain. Finally, because a Windows SharePoint Services 3. 0 farm that uses 64-bit hardware and software provides more room for growth, you can spend less over time on equipment because the life cycle of your equipment is likely to be longer. Question 4 – Explain the new features of Windows Server 2008, such as Server Core, Virtualization, and PowerShell. What is the role of these features and how will they improve efficiency in administering Windows? Server Core Windows Server 2008 includes a variation of installation called Server Core. Server Core is a significantly scaled-back installation where no Windows Explorer shell is installed. All configuration and maintenance is done entirely through command line interface windows, or by connecting to the machine remotely using Microsoft Management Console. However, Notepad and some control panel applets, such as Regional Settings, are available. Server Core does not include the . NET Framework, Internet Explorer, Windows PowerShell or many other features not related to core server features. A Server Core machine can be configured for several basic roles: Domain controller/Active Directory Domain Services, ADLDS (ADAM), DNS Server, DHCP Server, file server, print server, Windows Media Server, IIS 7 Web server and Hyper-V virtual server. Server Core can also be used to create a cluster with high availability using failover clustering or network load balancing. Andrew Mason, a program manager on the Windows Server team, noted that a primary motivation for producing a Server Core variant of Windows Server 2008 was to reduce the attack surface of the operating system, and that about 70% of the security vulnerabilities in Microsoft Windows from the prior five years would not have affected Server Core. Hyper-V Hyper-V is hypervisor-based virtualization software, forming a core part of Microsoft's virtualization strategy. It virtualizes servers on an operating system's kernel layer. It can be thought of as partitioning a single physical server into multiple small computational partitions. Hyper-V includes the ability to act as a Xen virtualization hypervisor host allowing Xen-enabled guest operating systems to run virtualized. A beta version of Hyper-V shipped with certain x86-64 editions of Windows Server 2008, prior to Microsoft's release of the final version of Hyper-V on 26 June 2008 as a free download. Also, a standalone version of Hyper-V exists; this version only supports the x86-64 architecture. While the IA-32 editions of Windows Server 2008 cannot run or install Hyper-V, they can run the MMC snap-in for managing Hyper-V. Server Manager Server Manager is a new roles-based management tool for Windows Server 2008. It is a combination of Manage Your Server and Security Configuration Wizard from Windows Server 2003. Server Manager is an improvement of the Configure my server dialog that launches by default on Windows Server 2003 machines. However, rather than serve only as a starting point to configuring new roles, Server Manager gathers together all of the operations users would want to conduct on the server, such as, getting a remote deployment method set up, adding more server roles etc. , and provides a consolidated, portal-like view about the status of each role. Windows Powershell Windows PowerShell is Microsoft's task automation framework, consisting of a command-line shell and associated scripting language built on top of, and integrated with the . NET Framework. PowerShell provides full access to COM and WMI, enabling administrators to perform administrative tasks on both local and remote Windows systems. Question 5 – What is a Read Only Domain Controller (RODC) and what are its advantages? What are the security and administrative issues addressed by a RODC? A read-only domain controller (RODC) is a new type of domain controller in the Windows  Server  2008 operating system. With an RODC, organizations can easily deploy a domain controller in locations where physical security cannot be guaranteed. An RODC hosts read-only partitions of the Active  Directory  Domain  Services (AD  DS) database. Before the release of Windows Server  2008, if users had to authenticate with a domain controller over a wide area network (WAN), there was no real alternative. In many cases, this was not an efficient solution. Branch offices often cannot provide the adequate physical security that is required for a writable domain controller. Furthermore, branch offices often have poor network bandwidth when they are connected to a hub site. This can increase the amount of time that is required to log on. It can also hamper access to network resources. Beginning with Windows Server  2008, an organization can deploy an RODC to address these problems. As a result, users in this situation can receive the following benefits: †¢ Improved security †¢ Faster logon times †¢ More efficient access to resources on the network Inadequate physical security is the most common reason to consider deploying an RODC. An RODC provides a way to deploy a domain controller more securely in locations that require fast and reliable authentication services but cannot ensure physical security for a writable domain controller. However, your organization may also choose to deploy an RODC for special administrative requirements. For example, a line-of-business (LOB) application may run successfully only if it is installed on a domain controller. Or, the domain controller might be the only server in the branch office, and it may have to host server applications. In such cases, the LOB application owner must often log on to the domain controller interactively or use Terminal Services to configure and manage the application. This situation creates a security risk that may be unacceptable on a writable domain controller. An RODC provides a more secure mechanism for deploying a domain controller in this scenario. You can grant a non-administrative domain user the right to log on to an RODC while minimizing the security risk to the Active  Directory forest. You might also deploy an RODC in other scenarios where local storage of all domain user passwords is a primary threat, for example, in an extranet or application-facing role. References – Works Cited â€Å"AD DS: Read-Only Domain Controllers. † Microsoft TechNet: Resources for IT Professionals. Web. 7 Dec. 2011. â€Å"Windows Server 2008. † Wikipedia, the Free Encyclopedia. Web. 12 Dec. 2011. Ward10/08/2007, Keith. â€Å"Top 10 Overlooked Windows Server 2008 Features, Part 2 — Redmond Developer News. † Powering the Windows Software Revolution — Redmond Developer News. Web. 03 Jan. 2012 â€Å"Windows Server 2008 Editions and System Requirements – Techotopia. † Main Page – Techotopia. We b. 05 Jan. 2012. â€Å"Microsoft Windows Server 2008 R2 Editions. † Web. 03 Jan. 2012. â€Å"Windows PowerShell. † Wikipedia, the Free Encyclopedia. Web. 01 Jan. 2012.