Friday, November 29, 2019

Achilles and Socrates free essay sample

Ancient history is well known for the astonishing number of real and fictional heroes; and for those who seek to explore the relevance and the impacts of the real-life heroism in depth, ancient history offers unlimited opportunities for understanding the essence of historical heroism in its true colors. Achilles and Socrates are fairly regarded as the two of the few most prominent ancient heroes. Although Achilles was well-known for his physical power, and Socrates exemplified the force of philosophic thought, both have produced irreversibly positive impacts on the following generations and their fellow countrymen and have revealed the unlimited potential of the human physical and spiritual nature. For historians and literature professionals, Achilles is considered one of the central cult figures for many epic narratives and numerous mythological episodes. Unfortunately, The Iliad appears the only one to have survived the long historical battles and the only one representing a complex picture of Achilles’ heroic character. We will write a custom essay sample on Achilles and Socrates or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page The Iliad positions Achilles as a man with unlimited physical power, whose close relationships with gods and whose spiritual integrity shaped the basis for his continuous heroic success. It is difficult to disagree to Michalakis (2007) who writes that Achilles’ â€Å"centrality to the poem is marked by his physical ability and his absence from the battlefield and by his reasoning and his strong emotions†. Nevertheless, where Achilles undertakes additional heroic responsibilities and acts as a true literary hero, the motives of his heroism do not go beyond a simple search for glory. Moreover, Achilles readily displays his human flaws and does not conceal his true desire for a revenge which brightly contrasts his genuinely humane image: â€Å"but the heart of Achilles was set on meeting Hector son of Priam, for it was his blood that he longed above all things else to glut the stubborn lord to the battle† (Homer, 1910). In this context, his motives and his heroism stand out as dramatically different from those displayed and pursued by Socrates in his pursuit of the revolutionary philosophic thought. True, in distinction from physical heroism for which Achilles was well-known, Socrates’ heroism is expressed through his desire to look deeper into the essence of the human life. His philosophy and real-life revelations expressed in Apology shape an undoubtedly heroic picture of Socrates. Moreover, where Achilles seems to be moved by the earthy considerations of pride and glory, Socrates seems to be motivated by his sincere desire to produce a new kind of positive doctrine which the following generations would use to take strategic philosophic decisions. Socrates does not try to deny the realities of life and the limitedness of the human against the forces of nature and gods. His heroism stems from his desire to recognize that â€Å"you too, my friends, must face death with good hope, convinced of the truth of this one thing, that no evil can ever happen to a good man either in life or in death, nor are his fortunes neglected by the gods† (Guthrie, 1971). What seems to be similar between Achilles and Socrates is that both sought to leave their trace in the human history and both sought to produce irreversibly positive impacts on the generations that followed. Moreover, as Achilles’ deeds proved the relevance of physical force in the battle against the enemy, Socrates’ achievements proved the relevance of the mental work and the training of mind as the instrument of spiritual refraction. In general, Achilles and Socrates shape a balanced image of an ideal personality. For Socrates as well as for Achilles living a good life on earth was the primary task (Guthrie, 1971); that is why they both can be equally considered the most prominent heroic personalities in ancient history. Conclusion Achilles and Socrates teach us that living a good life is the primary individual’s obligation. Moreover, whether in physical battle or in the process of training one’s mind, individuals are responsible for balancing their mental and physical abilities in ways that would help them pursue the principles of humanity, virtue, justice, and fairness over the life span. References Guthrie, W.K.C. (1971). Socrates. Cambridge University Press. Retrieved April 21, 2009 from http://books.google.com/books?id=a-h35nyFR7ICprintsec=frontcoverdq=socratesas_brr=3hl=ru Homer. (1910). The Iliad. Plain Label Books. Retrieved April 21, 2009 from http://books.google.com/books?id=37DatKTx9FUCprintsec=frontcoverdq=iliadas_brr=3hl=ru Michelakis, P. (2007). Achilles in Greek tragedy. Cambridge University Press. Retrieved April 21, 2009 from http://books.google.com/books?id=F3H2g9ZDGfICprintsec=frontcoverdq=achillesas_brr=3hl=ru

Monday, November 25, 2019

Alzheizmers Disease essays

Alzheizmers Disease essays Alzheimer's Disease is a scarcely understood, but exceedingly devastating disease. We need to learn more about it in order to eradicate it. I knew someone with the disease and he really couldn't go outside alone or do much without his wife by his side. He had to stay home most of the time thinking about vain imaginings and remembering the same life occurrences over and over again. His memory gradually was lost and he began to lose control of basic functions, including the ability to feed himself and communicate with others. He finally died after many years of painful suffering. The Andrew Pollack article examines this, and a hopeful solution to the problem. The article focuses on a clinical trial that produced evidence that gene therapy may slow the mental deterioration that defines Alzheimer's disease. The study included eight patients with early-stage Alzheimer's, the first of its kind to use gene therapy for the treatment of the disease. Six successfully received the gene transfer, all of whom showed a slower rate of cognitive decline in the 22 months following treatment than they had in the 14 months before. Dr. Mark H. Tuszynski of the University of California, assisted I the writing of the article. Dr. Tuszynski and his assistants stated in the paper that they thought it might be better to use the gene to induce cells in the brain to produce their own growth factor just where it was needed. They also point out that the long-term goal of this research is the same as that of any other genetic research, which is the possibility that science could o ne day alter our genetic make-up. While gene therapy is far from certain, there are those who believe in its potential. Genetic research is currently playing a major role in the study of other diseases, including diagnostic and predictive test for SAD. However, many industry pioneers have withdrawn from gene therapy, due to its inconsistent results. Still, some venture c...

Friday, November 22, 2019

Personality Traits and PTSD Resilience Research Paper

Personality Traits and PTSD Resilience - Research Paper Example The TR in DSM-IV-TR refers to† text revision†s. Numeroff et al. (2009), a reprint of the work of Numeroff et al. (2006), reviewed the state of science in posttraumatic stress disorder (PTSD). The authors pointed out five key points. First, PTSD is frequent among women than among men. Second, the presence of group C symptoms after exposure to trauma can predict the development of PTSD. Third, increases in corticotrophin-releasing factor or CRF concentration associated with PTSD â€Å"may be reversed† with paroxetine treatment. Fourth, â€Å"hippocampal volume appears to be selectively decreased and hippocampal function impaired among PTSD patients.† Fifth, prolonged exposure therapy is effective in modifying negative cognitions that are frequent among PTSD patients. Note that in Numeroff et al. (2009) or state of science on the PTSD, there was no mention on the role of personality traits and resilience. In the 2000 guidelines of 50 pages for treating PTSD wri tten by Foa et al., there was no mention on the role of personality traits in hastening or slowing down the treatment or management of PTSDs. The treatment guidelines were developed under the auspices of the PTSD Treatment Guidelines Task Force organized by the Board of Directors of the International Society for Trauma Stress Studies (ISTSS) in November 1997 (Foa et al., 2000, p. 539). The treatment guidelines described PTSD as a serious psychological condition resulting from an exposure to a traumatic event (Foa et al., 2000, p. 539). The 2000 guidelines mentioned that the symptoms associated with PTSDs are â€Å"reliving the traumatic events or frightening elements of it; avoidance of thoughts, memories, people, and places associated with the event; emotional numbing; and symptoms of elevated arousal† (Foa et al., 2000, p. 539). The treatment guidelines pointed out that PTSDs are â€Å"often accompanied by other psychological disorders† (Foa et al., 2000, p. 539). Fu rther, the treatment guidelines elaborated that the â€Å"PTSD is a complex condition that can be associated with significant morbidity, disability, and impairment of life functions† (Foa et al., 2000, p. 539). The fourth edition of the Diagnostic and Statistical Manual of Mental Disorders (DSM-IV) of the American Psychiatric Association (1994) guided the guidelines. The guidelines recognized that research that shaped the guidelines came largely from western industrialized nations and little is known about the treatment of the PTSD in non-industrialized countries (Foa et al, 2000, p. 540). The guidelines also noted that there are limitations in the scientific literature on the PTSDs because most studies have used inclusion and exclusion criteria and, thus, each study may not fully represent the complete â€Å"spectrum† of patients (Foa et al., 2000, p. 541). In particular, it is customary in the studies of PTSD treatment to â€Å"exclude patients with active substance dependence, acute suicidal ideation, neuropsychological deficits, retardation, or cardiovascular disease† such that generalization of the findings to all populations may not be appropriate (Foa et al., 2000 p. 541). However, like Numeroff et al. (2009), Foa et al. (2000) did not mention anything on the association

Wednesday, November 20, 2019

Fill out chap 11-12 Essay Example | Topics and Well Written Essays - 750 words

Fill out chap 11-12 - Essay Example In addition to this, food plays a crucial role in contributing to stress levels as people undergo two types of hunger. One is physical hunger while other is emotional hunger. Emotional hunger is there as an output of stress and requires one to have a certain craving of selected foods that contain elevated sugar and fat levels. Some foods that are required for emotional hunger can exacerbate stress condition. Directions: For a period of one month, starting today, keep track of all those purchases you make. This includes not only objects you buy—necessities and luxuries-- but also splurges for meals and social activities. After you have accumulated your list, go through the items one at a time and ask yourself in retrospect, with strict objectivity, which of these purchases you wish you could cancel. Which ones represented an impulsive decision? Circle those items on your list. The clothes that I bought contained certain items such as trousers and shirts that were not required or necessary currently because I was able to deal without them. I also got additional pair of socks that could be shifted to two months ahead for the purchase. I also consumed a lot of fast foods that I consider as additional expenses. I also got a cushion that I liked but did not need. Therefore, I could cancel two of the clothes items, two additional pair of socks, some fast food expenditures and the cushion. If I would have saved the money that I used on all these items, I could have obtained some intensely needed product after two months or so. Saving is in itself rewarding so that action would have merited me. Directions: Analyze how your dietary patterns for three days by using the following table provided. Examine it and write a summary about it. Is what you eat conducive to handling much stress and improving health? Look at the frequency and amount of food you eat. I usually skip morning breakfast that

Monday, November 18, 2019

Direct, Interactive & Digital Marketing Essay Example | Topics and Well Written Essays - 2000 words

Direct, Interactive & Digital Marketing - Essay Example Direct marketing is highly contributing to the growth of digital marketing and social media in the following ways. First, direct marketing is leading many firms to move from the monopolistic nature of marketing to the competitive type of market. Most firms are doing so in order to reach many clients across the world. In addition, they agree into the competitive market to be flexible in terms of their production to meet the customers demand. For instance, Tesco offers its clients with variety of products in its various branches across the world. It enables its clients to buy products online thus making it more competitive market. Moreover, direct marketing leads to the development of information environment within the society. That is; it opened transmission between individuals. Moreover, direct marketing made socialization and the society possible. The transformation of information networks is another significant role of direct marketing in the development of digital marketing and social media. Direct marketing is highly transforming information into the market place therefore giving clear understanding between the individuals. For example, Tesco club card is offering more discounting to the employees depending on how the client will agree with company management. In addition, one will also receive a voucher depending on the frequency of using the Tesco Club card. Moreover, the information, will aid to remove old barriers in the marketing industry and thus reducing inconvenience in the marketing industry. The message sent will not be distorted. That is the message you sent will ever be saved because of the backup from the sent items from the sending company. In addition, direct marketing is a faster way that can enable an individual to reach the audience quickly and without many difficulties. In addition, the technique allows the firm to have personal communication with the clients hence getting better understanding of the customers’

Saturday, November 16, 2019

Using Computer Forensics to Investigate Employee Data Theft

Using Computer Forensics to Investigate Employee Data Theft Introduction Over 25 percent of employees steal proprietary data when departing a company or organization.[1] To that end, our experience shows that departing employees have a sense of ownership over the data that they copy. Intellectual property commonly stolen includes customer lists, secret formulas, source code, strategy documents and other trade secrets. The information is often used against the organization when the former employee goes to work for a competitor or decides to start a new company.   Ã‚   When suspicions of employee data theft arise, it is important to engage a computer forensics expert to perform a theft of IP analysis in order to preserve electronic data and uncover important evidence. Using specialized software, the expert can reveal digital footprints such as: USB activity Files recently opened Cloud storage usage Files sent to personal email accounts Recently printed documents The results of the analysis can provide the foundation for legal action such as a temporary restraining order, permanent injunction, subpoena of personal devices, or other litigation to prevent the misappropriation of company data. When Employee Data Theft Is Suspected Employee data theft occurs most frequently just prior to, or immediately after, an individuals termination or resignation from an organization. Telltale signs that an investigation is warranted include unusual activity by the employee, such as: Plugging a personal USB thumb drive or hard drive into a computer Coming into work at odd hours or establishing remote desktop connections during off-hours Transferring large amounts of data on the company network Visiting file sharing sites like Dropbox or Google Drive Sending emails with attachments to personal accounts If there are concerns that a departing employee has stolen proprietary data, then it is important to take steps not to delete important electronic evidence located on his or her computer. If the computer is powered on, then leave it on, because important evidence may be stored on the computers random access memory and could be deleted if the computer is powered off. Also, ensure the computer cannot be accessed remotely by disconnecting it from the network. If the computer is already turned off, then place it in secure storage. Furthermore, confirm the employees login credentials are disabled or have been changed, but do not let the IT staff reinstall the operating system or reassign the computer to another employee. Such actions could destroy or overwrite any evidence of wrongdoing. Finally, resist the temptation to take a peek at what is stored on the computer by turning it on and accessing files because this could alter the data, thereby making the investigation more complex. If the suspected employee had a company-issued cell phone, then place it in secure storage as well. Smartphones hold an abundance of useful information such as text messages, emails, call logs, internet activity and more. The simple act of resetting the phone, however, can permanently destroy this data. IP Theft Investigations Preserving and Analyzing Electronic Evidence The first step in a theft of IP investigation is to forensically preserve the data on the employees device(s). The computer forensics expert will create chain of custody documentation, photograph the hardware, and verify the integrity of the preserved data, among other things. These steps ensure that the electronic evidence will be admissible in court. Once the data is preserved, the next step in the investigation is to perform an analysis to identify software and artifacts that may be indicative of IP theft. These areas on a typical Windows installation include: USB activity Files recently opened or deleted Cloud storage Personal email accounts Internet history report Printed documents USB Activity Analysis Many of todays USB devices, such as thumb drives and external hard drives, have enough storage capacity to save an entire copy of a users hard drive. As such, they are one of the most common tools used to steal data. The good news is that using a USB device leaves behind a trail of digital evidence that can prove invaluable to an investigation. Analyzing a users USB activity can reveal several key facts regarding what was connected to the computer and when. In most cases, forensic experts can determine the serial number and/or brand of the USB device, as well as the first and last time the device was connected to the computer. In some instances, they may also be able to verify each time a specific USB device was connected. Oftentimes, the analysis will reveal that an external USB hard drive or flash drive was connected for the first time during an employees last week of employment. While most analyses reveal a new USB connection, it is also possible that a device used throughout the duration of the suspects employment was never returned. A device such as this would likely contain numerous documents and files that were related to the employees day-to-day activities and could contain value to a competitor. If it is a requirement that employees return company-owned USB drives at the end of their employment, forensic experts have the ability to verify whether or not that policy was upheld. Files Recently Opened While confirming that a USB device was connected to a computer is significant, it is even more important to know what files were accessed and potentially transferred to the device. The Microsoft Windows operating system creates various artifacts when a user opens a file or folder. These artifacts indicate what was opened, when it was opened and where it was opened from. A classic red flag is if the employee was opening files during the last week of employment that were not related to the work being performing during that time. Another consideration is the organizations data access policy. If data access restrictions are not in place, then the employee may be able to access company files unrelated to current work that are stored on the network. The existence of these artifacts when combined with a USB activity timeline can indicate a high probability that data was copied off the system. Lastly, the artifacts can also contain specific information about where the file existed. If a file was opened from a USB drive, the artifact will indicate this, providing factual evidence that the suspect is in possession of a USB drive that contains specific files. For example, combining a USB analysis and files recently opened analysis could show that on October 7, 2016, at 7:22:08 a.m., a non-company-issued SanDisk thumb drive with serial number 851450 was plugged into the computer for the first time and a file titled Client Contact List.xlsx was opened. Cloud Storage If the analysis shows that certain files were accessed but no USB activity was detected, the next step in the investigation is to identify evidence that a cloud storage provider such as Dropbox, Google Drive or Microsoft OneDrive was accessed. The purpose of these applications is to share and sync data across multiple computers. For example, Dropbox may have been surreptitiously installed on the employees work computer as well as his or her home computer. Consequently, the simple act of syncing a company file to Dropbox will instantaneously also make that file available on the employees home computer. The good news is that cloud storage applications often have corresponding log files and databases that record what files the user accesses and what activities are performed. These logs can signify files have been uploaded to the cloud in the past even if they have already been deleted from the shared folder. Some of these applications even save deleted data in a separate hidden folder on the computer itself that users typically are not aware of. As a result, a theft of IP analysis may show that Dropbox was installed on the users work computer and that early in the morning on October 7, 2016, fifty files were deleted and the hidden folder reveals these were company files. Personal Email Accounts Some individuals may use their company email to send attachments to their personal email account such as Yahoo or Gmail. In these cases, forensic experts are able to perform a preservation of the employees work email to identify and document the evidence of misconduct. Internet History Report An Internet history report can be generated that shows, inter alia, recent Internet searches, web sites and pages visited, cookies from websites, and Internet downloads that occurred. Such information is helpful in establishing what an individual thought was important or even their state of mind. For example, analysts have discovered that individuals have searched on how to delete data or copy data surreptitiously and that they reviewed websites that were in essence how to manuals to perform certain deleterious acts. Paper Documents Finally, individuals who are a little less aware of more modern techniques to copy data will simply print the documents they wish to take out the door. In these cases, forensic experts are able determine the last known print date of Microsoft Office documents. Deliverables and Project Timeframe The turnaround time for a theft of IP analysis performed by an analyst is typically one week. Deliverables provided will be easy to understand in the form of spreadsheets, html reports, and written reports containing the findings of the analysis. A forensic expert should also spend time with the client either over the phone or in person to discuss the reports in detail so that they know exactly what a report contains and the assumptions and opinions of the forensic expert. If necessary, an expert will also provide depositions or expert witness testimony regarding the authenticity of the evidence and their findings. Authors Timothy M. Opsitnick, President, JURINNOV, LLC, Joseph M. Anguilano, Director of Operations, and Trevor B. Tucker, Forensic Analyst. JURINNOV, LLC, a wholly-owned subsidiary of Technology Concepts Design, Inc. (TCDI), is a technology company that provides cybersecurity and eDiscovery services. Cybersecurity consulting includes investigating accidental or malicious data breaches as well as providing security strategies and assessments to prevent such occurrences. eDiscovery consulting includes computer forensic investigations and ASP ESI hosting. JurInnov news and information is available at www.jurinnov.com. For over 25 years, TCDI has been providing technology solutions through partnerships with large corporations and law firms. These solutions include advanced litigation support software and services for electronic discovery, hosted review and production, and large-scale litigation case file management. TCDI news and information is available at www.tcdi.com. [1] Biscom, Employee Departure Creates Gaping Security Hole Says New Data, December 23, 2015; https://www.biscom.com/employee-departure-creates-gaping-security-hole-says-new-data/.

Wednesday, November 13, 2019

The Persian Gulf War Was NOT Iraqs Fault :: essays research papers fc

At 2:00 A.M. (local time) on August second 1990, Saddam Hussein sent the Iraqi military across the border into Kuwait, and sparked a war whose repercussions are still being felt. Today what eventually became known as the Persian Gulf War, featured the largest air operation in history; and a senseless destruction paralleled only to Danzig or Hiroshima. Even though Saddam was the one who physically invaded Kuwait, is balking at United Nations resolutions, and is generally known as a tyrant. He should not be destroyed . The Gulf War was nothing more than the United States attempting to establish, as former President Bush so aptly termed, the â€Å"New Order†. The United States supported Saddam Hussein and the Ba’ath regime prior to the Kuwaiti invasion. They even gave Saddam a â€Å"Green Light† to go ahead and invade. If Saddam were to leave power Iraq would either be plunged into a Lebanon style civil war or face another ruler no better than Saddam himself. The United States is contemplating another invasion of Iraq, however it is having a difficult time of gaining support of the Arab countries. While many people in this country believe Saddam Hussein should be destroyed, that he is a totalitarian dictator and gross human rights violator. He is, in fact, a stabilizing force in his country and the Middle-East, standing up to the only remaining superpower. The consensus currently prevalent in this country is that Saddam Hussein, the leader of Iraq, is a totalitarian dictator, thirsty for blood and prestige, who seems dedicated to disobeying the United States. It would seem Iraq is intent on keeping United Nation inspectors out of its own country, although technically â€Å"Iraq barred only American members of the inspection teams from carrying on their work†(Nelan 54). The Iraqi â€Å"Dictator† seems to have decided he would rather be bombed than inspected. He apparently has no regard for the international community, and yet still wants them to lift sanctions. Also the Iraqi: â€Å"government stopped Ritter from investigating sensitive sites, calling him a spy and complaining that his team was too ‘Anglo-American’... the Iraqis also revealed Ritter was looking for evidence Iraq tested chemical and biological weapons on humans - charge Baghdad called ‘a shear lie’† (Watson 34). Those reports of human testing are obviously false. â€Å"[E]ven Saddams strongest foes, including the C.I.A. seems to doubt them(Watson 34)†. In fact, the only testing done by Iraq was on dogs. There were no inspectors around when the U.S. committed the crimes at Tuskegee, or when hundreds of servicemen were exposed to radiation during the atomic tests in the sixties. The Iraqi â€Å"dictator† has stayed in power for some 6 years since sanctions were imposed.

Monday, November 11, 2019

Cross-Border Strategic Alliances and Foreign Market Entry Essay

Introduction It is indisputable that as the world gets globalized, virtually all companies are compelled to expand their market to the international or foreign nations. Expansion into the foreign countries is perceived to be associated with many positive impacts. However, it has been shown that some entry modes are detrimental to the performance of the company or the firm. This implies that before any firm decides to expand, it has to weigh different international entry modes and determine the best mode to use.   This paper discusses one of the modern entry modes, called cross-border strategic alliance. The paper will achieve this by reviewing one of the detailed article cross-border strategic alliances. Analysis The article entitled â€Å"Cross-Border Strategic Alliances and Foreign Market Entry† by Larry Qiu analyzes how firms are motivated to form cross-border strategic alliances when entering into new markets. The goal of the article trying to answer the question as to why most firms are forming cross-border strategic alliances and also identifying the economic factors that facilitate the formation of such alliances. Utilizing a two-country, multi-firm and three-stage economic model, the author reveals astonishing findings on the manner in which companies enter into international market (Qiu, 2006). The article reveals that the company can enter into an international market in different ways. Some of the ways include export and foreign direct investments. Cross-border mergers and acquisition, according to the article is the modern way in which a country can penetrate other countries. There are other traditional forms such as export and green-field foreign direct investment (FDI). The article analyzes based on the thesis statement that multinationals are shifting from the traditional forms such as FDI to modern forms such as cross-border mergers and acquisitions and cross-border strategic alliances. The factors that are considered to influence the choice of the entry mode include such aspects as variable costs such as trade and transport costs and fixed costs. The author argues that a company may set up just one plant in its own country and uses it to serve both the domestic and foreign markets. According to the article, search firm will be entering into foreign and international countries through export. Alternatively the same firm may opt to set up two plants, one plant in the domestic country and the other in the foreign country. In such a case, the firm will be entering into foreign country through foreign direct investment. The invention of cross-border strategic alliances, according to the article, has compelled most countries to switch from export to FDI. This is because the cross-border strategic alliance is associated with numerous benefits compared with the export strategies (Qiu, 2006). For example it creates different synergies in the domestic and foreign markets. In addition, it promotes production alliances, which help each of the allied firms to reduce production costs both in their domestic plants as well as their foreign plants. As far as distribution costs is concerned, the article argues that the cross-border marketing, which is a product of the cross-border strategic alliance, reduces the allied firms’ distribution costs in their foreign market (Qiu, 2006). Conclusion The foregoing analysis has shown why cross-border strategic alliance is becoming the most preferred mode of entry as far as international trade is concerned. Compared to other entry mode methods, cross-border strategic alliances create different synergies in the domestic and foreign markets (Qiu, 2006). Some of the synergies include production cost synergies and distribution costs synergies. These synergies helps the company reduce the production and distribution costs and hence get profits. References Qiu, L. D. (2006). Cross-Border Strategic   Alliances and Foreign Market Entry. Hong Kong   Ã‚  Ã‚  Ã‚   University of Science and Technology. Retrieved from:   Ã‚   http://www.etsg.org/ETSG2006/papers/Qiu.pdf   

Saturday, November 9, 2019

Personal and Imaginative – Scarred for Life

This was it. My legs were lead; my head throbbed violently. It felt as if the energy within me had slowly oozed away. I dragged my feet like I was being held down by iron chains. Gathering every ounce of my might, I heaved myself towards the bench- and collapsed upon it. Where was I? No clue. That was all I'd been saying to myself since the taxi left. And how long ago was that? Two hours†¦three hours†¦four hours? Still no clue. I hated myself for being so thick. If it wasn't for my ‘thick' brain, I would have been home by now. Home. I felt useless. â€Å"What the hell you doin' ere?† I looked up so fast it made my neck click; my anger rose. It was a brown haired boy who I guessed was trying to pass the time. I found him annoying. I wasn't in the mood of talking to anyone-I hardly ever was. â€Å"You tell me.† I replied stiffly. â€Å"Ain't seen you around this place.† I felt like punching him. I hated this about some people, butting in when they were least wanted. â€Å"That's 'cause I ain't from dis place.† I grumbled, glancing at him, thinking how much longer is he going to stay? There was a pause. Then, just as soon as I expected him to leave, he demanded, â€Å"Where you from then?† â€Å"Look yeh, I don't know you an' I ain't in da mood. So move.† I stated through gritted teeth, giving him the dirtiest look I could muster. He finally got the message and went off, gruffly. I didn't understand myself; I never used to be like this. My mood switched within seconds and I knew that many people found it hard around me. Even my own mates kept their distance from me at times. But they understood that I had a past. Life had changed a lot for me, and since that change, I was never the same person. I cast my eyes around, taking in my surroundings. Even though the street lamps were alight, the road seemed unusually dark. I squinted and could just make out the scenes of every day life before me. Here and there figures would move about; some closing their shops, others walking hastily, making their way home. I gazed blankly at the movements, not bothering to move from my seat. Eventually, the very last of the people edged away towards the end of the street, their silhouettes disappearing from under the very last street lamp. Silence followed. Almost radically, a harsh wind had begun to bluster, causing my numb face to sting. Fed up with my position, I pulled up my hood, got up from the rigid bench and stepped on to the road. The sound of my trainers hitting against the pavement seemed to echo into the night, leaving behind a lethal dead-like silence like that of graveyard. Trying to block out this atmosphere, I began to recount the event that occurred on the taxi†¦ I couldn't believe my stupidity. Losing my mobile was one thing- but losing my purse-on the same day†¦a bit extreme huh? And to make matters worse, being the idiot that I am, I tried to get home in a taxi when I was totally broke! The reaction the driver had when he realised I wasn't going pay was severe to say the least. I knew people had strange solutions but leaving me in the middle of God-knows-where was a bit too strange. Sad or what? Well, what was done was done and I knew there was no way in changing it. Thinking about it wasn't going to get me anywhere. My main priority was to see how to get home. I inhaled deeply as the bleak air rushed in to my blood. What was the point in living when surviving was so hard? Upon reaching the end of the street, I became aware of the bend which had not been visible to me from the bench. It was murky and even at this distance I could not make out what lay on its other side. As I began to make my way through it, my stomach gave a discomforting squirm. I didn't know why that was? Was it the darkness that had just fallen over me? Or the strengthening of the silence which had now reached its peak? Being able to distinguish traces of a light, I became relieved to know that I had entered just another street. This time there were no shops, but instead stood half a dozen or so houses, which I could tell were grand as well as ancient. They were positioned with a great deal of space and on either side of the road which lay in front of me. At the far end, I could discriminate the park which stood out due to its rusty iron gate. As my vision became clearer, I noticed a dark profile standing within the shadow of the great oak tree. Who would be out at this time of night? Or was it a trick of light? Sensing movement, I knew for sure that it wasn't just a fragment of my imagination. My heart began to beat loudly, vibrating heavily in my throat. Now I knew I wasn't alone. It ambled out from under the tree; light shining upon its limp body. Slowly, it began dragging its body in an oddly held manner. It – he was hurt. A slow moaning uttered from his mouth, and my fear turned into grief on seeing the pain radiating from him. On realising that his direction was headed my way, I heaved my body behind the nearest bush, afraid of being seen. From his gnawed, wrinkly hands, I realised he was well aged. His face was entirely hidden, due to the hood of his festering coat. He had now reached a house opposite me, one which I had not noticed due to its miniscule size. It was dilapidated and it showed no sign of warmth. Was this his house? I heard keys dropping, breaking the silence, and watched as he bent to pick them up. As he did so, his hood fell from his face. I screamed†¦ Everything was indistinct, the face flashed in front of me again, yet this time it looked younger by a few years. I could hear loud terrible screaming from within my own head. So loud that I thought that my head would explode. The screaming went on, never ending. The pain searing in the shrill cries was too much to take in. The screaming didn't come from the face, yet I recognised it. But it couldn't be! I tried to cry for help but nothing came out. Slowly, the picture blurred and my vision became focused†¦ My inhalation was hard, my heart aching endlessly. I tried to hold my breath, trembling from head to toe. Cold sweat trickled down my face and my clothes were soaked, clinging to my skin. How much time had passed? A door slammed shut, its reverberation hanging in the atmosphere. I turned my head towards the house- had the man just gone in? It had been ten years. Ten long, painful years since I had heard my brother's voice, shrieking with agonising pain just the same as on that night. The night that I last saw him alive. Was it just a coincidence that I had just seen the convict? All I remembered was the assassin's terribly scarred face, which had appeared there on the day my brother had fought eagerly for his life, aiming viciously at his face. This man was marked – scarred for life. Since then, I had promised myself to find the man who had finished my little brother off- and now that I had found him, there was no way I was going to let him escape. Not this time. No way†¦

Wednesday, November 6, 2019

Their Were Watching God essays

Their Were Watching God essays Isnt it ironic how two different characters have a lot of similarities and differences? Janie and Claire are a great example. What makes these characters connection so special is that Janie is a main character from the novel, Their Eyes Were Watching God and Claire is one also, but from the successful television show, The Cosby Show. Claire plays a mother of five and a successful lawyer. While the author, Zora Neale Hurston, uses Janie as a middle-aged woman who had married three times and had found what true love was like. Even though these characters appear to sound different, they really have the same characteristics. Happiness is one of the many similarities that Janie and Claire can relate to. Unlike many people, wealth and rank doesnt fulfill their conditions of supreme well-being and good spirits. They showed their contentment in other ways. Janie showed hers by remarrying a man with less money and rank than Joe Starks, her old husband, who had deceased. Tea Cake, the individual that married Janie, was unwealthy and only cared about having a good time and having fun. Janie liked that about him and was attracted to that. It was so crazy digging worms by lamp light and setting out for Lake Sabelia after midnight that she felt like a child breaking rules. Thats what made Janie like it.(Chapter 6, pg.98). She didnt care about the money and her social class. Going from marrying a rich and high ranked man to a man with less money than she had proved it. Claire was the same way, but her way of expressing happiness went through her family. She loved watching her children grow up right before her eyes. She loves every minute with her husband. She enjoyed caring for her family. That was the only fun in her busy day. When it come to gender roles, Janie and Claire are not alike. Janie had been married three times. In all o...

Monday, November 4, 2019

Development and the Environment- Human interventions in forest Essay

Development and the Environment- Human interventions in forest environments - Essay Example This paper will discuss various human activities that currently contribute to the tropical rainforest deforestation and the intensity of their effects specifically in Latin American and Asian regions. The activities that lead to deforestation According to the United Nations Framework Convention on Climate Change (UNFCCC) secretariat, the main reason behind deforestation is agriculture. While subsistence farming causes 48% of the destruction, cash crop cultivation or commercial cultivation leads to 32% loss followed by logging and fuel wood with 14% and 5% each. Geist, & Lambin (2002) also report four reasons behind 96% of deforestation; they are permanent cropping, cattle ranching, shifting cultivation and colonization. Shifted cultivators In fact, shifted cultivators are considered the biggest threat to tropical forests and they are the reason behind 48% of the total forest loss. The main reason that forces these people into forests is the unequal distribution of land. For example, in Brazil, 42% of the total cultivated land is owned by 1% of the population. In addition, according to World Rainforest Movement (n.d.), half of Brazil’s total population is landless farmers. ... Logging The role of logging in deforestation cannot be neglected. Big logging companies cut down trees for their commercial uses. However, it is not only the selected trees that are destroyed; the vines, epiphytes and lianas are all destroyed along with the tree which will take many hundreds of years to regenerate. In addition, for the removal of the wood, they construct new roads and the area gets heavily compacted by machinery leading to a further decline in the quality of the land. Furthermore, the roads constructed by these loggers are used by the farmers around the forests to get access to the deep forests. When these farmers start slash and burn to grow food, the impact of the issue grows manifold. Cattle ranching and cash crops Another serious issue is the modern day agricultural practices. The first among them is the monoculture plantations which are solely aimed at making quick money. However, the impact of this agricultural practice is unimaginable. In addition, a lot of ma chinery, fertilizers and pesticides are used to make maximum profit in the shortest possible time. This intensive farming leads to a rapid fall in the quality of the soil in a few years. The severity of cattle ranching practices is more or less the same. Cattle ranching leads to the destruction of more and more land and the land so damaged will not support any plant or animals for a long time. Fuel wood A per reports, about 2 billion people worldwide still depend on wood for cooking and heating. Considering the huge number of the people, one can easily imagine the magnitude of the issue. In addition, according to United Nation’s Food and Agriculture Organization, 75% of these people

Saturday, November 2, 2019

Job analysis Assignment Example | Topics and Well Written Essays - 500 words

Job analysis - Assignment Example hen a certain task is given to a custom agent, it is upon him to see that the task is accomplished precisely, rather than assuming that some other sailor will do it. In addition, a custom employee should not drift through his time while in the job. Each one of them must pay attention to all details no matter how small the matter may be. According to their guiding principles, attention to any detail may signify the difference between failure or success of a given task, and between life and death (Young 15). A custom employee is not expected to play favorites or put into effect the rules without considering honesty and neutrality. Permitting some custom officers to ignore other rules will bring challenges in the field. Integrity at the border and port also requires that a custom worker hold on to his or her responsibility no matter what comes on his or her way. This is the reason why their regulations provide that no custom officer should quit in simple tasks. With this in mind, a custom officer can never give up, even when he sees a likelihood of death, while carrying on his duties. A good custom officer is ethically responsible. He knows what is wrong and what is not, so he tries to do only what is acceptable. He performs all duties in a timely and correct human way possible without any worries of the inconveniences or personal gain. A custom officer does not entertain immature self-seekers who prioritize his or her best efforts solely when there is a personal reward. A custom officer should not be stubborn, resentful, self-important individual who turns down orders. The laid down rules and regulations guide the daily operation of the customs department, and if followed by all custom employees, life in the field can be so easy and enjoyable for everyone (Young 23). In the customs department, a team is much greater than an individual is. Given that, every team has leaders and simple members, every custom employee is part of a team, and he should respect and work