Monday, September 30, 2019

Philosophy Meaning Essay

PHILOSOPHY greek meaning â€Å"love of wisdom†, encompassed the love of all wisdom, but only in recent centuries came to refer to a special branch of enquiry, separate from other sciences, such as â€Å"natural philosophy†. * is universally defined as â€Å"the study of the wisdom or knowledge about the general problems, facts, and situations connected with human existence, values, reasons, and general reality. † It seeks reasons, answers, and general explanations to life and its factors. Thus, if we talk about philosophy, we talk about a school of thoughts. â€Å"philosophers† which makes a profession of studying things in their separation from human life and practice. The main branches of Philosophy are Logic, Epistemology, Metaphysics and Ethics. Western philosophy is referred to as the school of thought from Greek philosophy that influenced the greater part of Western civilization. * takes its roots from Rome and Christianity, specifically Judeo-Christianity. * Latin * Rational, Scientific, Logical schools. Western civilization is more individualistic, trying to find the meaning of life here and now with self at the center as it is already given and part of the divine. Eastern philosophy is based mainly in Asia, more specifically the Chinese philosophy. * Confucianism, Mahayana Buddhism, and Taoism. Chinese. Hinduism, Integral Yoga, Islam, Zen * Relationship with religion; Integration Search for absolute truth: * Systemic approach – all events in the universe are interconnected * Searching inside yourself – by becoming a part of the universe through meditation and right living. Eastern philosophy is drawn much more into groups or society or people’s actions and thoughts as one in order to find meaning in life as they try to get rid of the false â€Å"me† concept and find meaning in discovering the true â€Å"me† in relation to everything around them, or as part of a bigger scheme. Summary: * Western philosophy is mainly used in the Western parts of the world, such as in the European countries, while the Eastern philosophy is prevalent in Asian countries. * Both philosophies center on virtues. * West’s Individualism ( and the East’s Collectivism (A human being is an integral part of the universe and the society. People are fundamentally connected. Duty towards all others is a very important matter. Collectivism is stronger. ) * Eastern philosophy takes more of a spiritual approach while Western philosophy is more hands-on. The Ionian Philosophers * comes from Aristotle; first source to attempt systematic exposition of their doctrines. Thales * Prediction of the eclipse, and other astronomical activities. * Prediction of solstices * Mathematical discoveries (geometry ) * Cosmology * Natural phenomena – including the heavens – could be discussed as processes governed by natural laws. * Believed that the Earth was a large (? at) disk ? oating on an in? nite ocean of water, and that earthquakes resulted from disturbances in this ocean that shook and cracked the Earth. * concept of â€Å"unity underlying diversity† – some fundamental principles tying together all the multitude of things we see on Earth * water was the fundamental element from which all things were derived. Anaximander * Zoogony and anthropogony * thought the Universe formed out of an in? nite chaos he called the â€Å"boundless† due to a â€Å"separating out† of opposites (such as hot and cold, wet and dry). * ? rst recorded attempt to model the Universe. (the Earth was a cylinder and that the Sun, Moon and stars were all located on concentric cylinders, or hoops, rotating about the Earth. ) Anaximenes * one ruling material principle is air; imperceptible. * Air was the fundamental material of all things. * ? rst attempt to explain the diversity of the world with qualitative differences in terms of quantitative differences. Babylonians and Egyptians were excellent at mathematics. Greeks began to move away from their mythical view of the world and started to seek explanations of natural phenomena; later called science. * All questioned the origin of the Universe, what was here in the beginning, and what things are made from. They all believed that material substance (rather than some spiritual or supernatural substance; thus the name materialists) made up the Universe. In other words, matter is the only substance, and reality is identical with the actually occurring states of energy and matter. * ‘physicalism’. to distance oneself from what seems a historically important but no longer scientifically relevant thesis of materialism.

Sunday, September 29, 2019

Marketing to the Bottom of the Pyramid

The concept of the Bottom of the Pyramid (BOP) market was originally developed by C.K. Prahalad in â€Å"The Fortune at the Bottom of the Pyramid† to highlight a large potential market made up of a large segment of the world’s population that has, until recently, been an ignored market segment among multinational companies. In an age of increasing global competition and near-saturation for some products in more mature markets, this multi-cultural segment, made up of people from all parts of the world that earn less than two dollars a day, can generate significant revenues and be profitable for companies who have developed appropriate strategies for reaching this market segment. Among the issues related to BOPMs are establishing appropriate distribution channels, developing and pricing products that have value for those in these markets, and finding creative ways for financing. In terms of financing, this would include not only that related to the purchase of a product for those with relatively low incomes, but would also include strategies for financing business initiatives on the local level. Perspectives Stakeholder would include the local populations that make up the BOPMs. Cultural considerations must be a key component of product development and advertising. Care must be given that products will not harm those to whom they are marketed. Also, companies are stakeholders in that new strategies including BOPMs may be important ways for a company to grow organically. In extension, many large multinational firms are public-traded companies. As such, shareholders are the owners and increasing shareholder value is a goal. Discussion †¢ Ethics of marketing certain products to people in the BOPM. †¢ Issues related to distribution channels. It seems that companies marketing to BOPMs must think beyond the traditionally accepted distribution channels. Many people in BOPMs live in remote, harder to reach, areas. †¢ Issues related to advertising. Television and radio advertising are one approach, but may not be the best way to reach the target market. Action/Recommendation Distributions Channels A successful strategy for marketing to these segments would include more direct marketing, with people getting paid on commissions. For retailers, marketing efforts should be geared toward lower volume sales in smaller stores. In contrast to what we are accustomed to in our domestic market in which we shop in large retails stores where the prices per unit decreases as the product size increases, BOPMs would require a different approach. These markets would require smaller, possibly individual-size products that could be purchased for a relatively small amount of money for people that probably do not have credit and do not have a significant amount of money on any given day. Product Development In addition to the size of products offered, other important factors need to be considered. In terms of packaging, climate is important—products may be offered in small, more or less open-air stores in hot climates, for example. More important for products that have a technical component, consideration also needs to be given to the level of features available. Whereas some features ,such as battery capacity—important as noted in the case for those without reliable sources of electricity—may be critical for product success, others may not be useful and my unnecessarily increase the price or the complexity of the product.

Saturday, September 28, 2019

Big Data Analytics In Cyber Security

Big Data Analytics In Cyber Security Abstract In 2015 assault influencing the US Governments Office of Personnel Management has been ascribed to what’s being described as on-going cyberwar between China and the U.S. The most recent rounds of assaults have been alluded to utilizing a wide range of codenames, with Deep Panda being among the most common attribution. The attack on OPM in May 2015 was understood to have compromised over 4million US personnel records with fear that information pertaining to secret service staff may also have been stolen. And the FBI and various security experts concluded that it’s an advanced persistent threat (APT). Executing an APT strike requires a bigger number of assets than a standard web application assault. The culprits are normally groups of experienced cybercriminals having considerable money related support. Some APT assaults are government-subsidized and utilized as digital fighting weapons. Traditional security systems may not be able to help to control or mitigate the issue . That’s where the Bigdata analytics comes in to the picture of information security providing the ability to correlate logging events based on time and user behavior across the entire spectrum of devices and technologies in an enterprise and many more dynamic insights and solutions to keep it secured. Introduction Cyber-attacks have pushed corporate fraud around the world to an all-time high, with information theft overwhelming the apportionment of physical resources out of the blue on record, as indicated by new information. Levels of reported fraud have gradually climbed since 2012, but 86 per cent of organizations around the globe revealed that they had encountered no less than one digital occurrence in 2017, as indicated by reactions given to Krolls yearly worldwide misrepresentation and hazard study. The reactions come as nervousness is high in meeting rooms about hacking following multiyear when the WannaCry digital assaults focused on a huge number of associations worldwide, disabling operations from the UK’s National Health Service to US delivery service FedEx. Even more as of late, the imperfections found in chips made by Intel, AMD and ARM, have raised fresh concerns that companies could be vulnerable to attacks. Information-related risks are now the greatest concern cited amo ng executives who participated in the overview, as the experience of Equifax has honed minds and demonstrated that specialists are taking an increasingly robust response. The US credit-reporting company now faces criminal and regulatory investigations on both sides of the Atlantic after a digital assault brought about the burglary of individual information of the same number of as 143m US citizens. The greater part the respondents to the review trusted that their organizations were profoundly or somewhat vulnerable† to information theft; an ascent of six rate focuses on a year ago. Advanced Persistent Threat (APT) progression A successful APT attack can be broken down into three stages: network infiltration, the expansion of the attacker’s presence and the extraction of amassed information—all without being identified. STAGE 1 – INFILTRATION Endeavors are regularly invaded through the bargaining of one of three assault surfaces: web resources, network resources or authorized human users. This is proficient either through malignant exchanges or social building attacks perils looked by considerable affiliations constantly. Additionally, infiltrators may all the while execute a DDoS assault against their objective. This serves both as a smoke screen to divert arrange work force and as a means of weakening a security perimeter, making it easier to breach. When starting access has been accomplished, aggressors rapidly introduce an indirect access shell-malware that gifts network access and allows for remote, stealth operations. Secondary passages can likewise come as Trojans covered as genuine bits of programming. STAGE 2 – EXPANSION After the toehold is built up, aggressors move to widen their essence inside the system. This includes climbing an associations pecking order, trading off staff individuals with access to the touchiest information. In doing as such, theyre ready to assemble basic business data, including product offering data, representative information and budgetary records. Contingent upon a definitive assault objective, the collected information can be sold to a contending undertaking, modified to disrupt an organizations product offering or used to bring down a whole organization. If harm is the thought process, this stage is utilized to inconspicuously pick up control of different basic capacities and control them in a succession to cause most extreme harm. For instance, aggressors could erase whole databases inside an organization and after that disturb arrange interchanges to delay the recuperation procedure. STAGE 3- EXTRACTION While an APT case is in progress, stolen data is normally put away in a safe area inside the system being attacked. When enough information has been gathered, the cheats need to separate it without being recognized. Normally, white noise tactics are utilized to divert your security group, so the data can be moved out surreptitiously. This may appear as a DDoS assault, again tying up network work force and potentially debilitating site protections to encourage extraction. Most famous APT attacks in 21st century Titan Rain (2003) In 2003 malicious hackers situated in China started a progression of far-ranging cyber-attacks against U.S government focuses with the point of taking delicate state privileged insights and secrets, in a task nicknamed Titan Rain by U.S specialists (Thornburgh, 2005). The hackers emphasis was on military information and included APT assaults on top of the line frameworks of organizations such as NASA and the FBI. Sykipot Attacks (2006) Sykipot cyber-attacks use vulnerabilities in Adobe Reader and Acrobat and are a part of a long-running set of cyber-attack crusades happened in a series pointed basically at U.S and U.K associations including resistance defense workers, broadcast and telecommunications organizations and government offices. GhostNet (2009) GhostNet is the name that analysts provided for an extensive scale cyber espionage task that was first came out in 2009. Completed in China, the assaults were fruitful in bargaining PCs in more than 100 distinct nations with an emphasis on penetrating network devices related with international embassies and government services. Stuxnet Worm (2010) Considered at an opportunity to be a standout amongst the most advanced bits of Malware ever identified, the Stuxnet Worm was utilized as a part of activities against Iran in 2010. Its intricacies showed that exclusive country state actors could have been engaged with its development and deployment. A key differential with Stuxnet is that, unlike most infections, the worm targets frameworks that are customarily not associated with the web for security reasons. It rather contaminates Windows machines by means of USB keys and afterward proliferates over the system, examining for Siemens Step7 programming on PCs controlling a PLC (programmable rationale controllers). Deep Panda (2015) A recently found APT attack influencing the US Governments Office of Personnel Management has been credited to whats being portrayed as on-going cyber war amongst China and the U. S (Jeremy, 2015). The most recent rounds of attacks have been referred to utilizing a wide range of codenames, with Deep Panda being among the most well-known attribution. The assault on OPM in May 2015 was comprehended to have bargained more than 4million US personnel records with expect that data relating to mystery benefit staff may likewise have been stolen. Why should you make use big Bigdata analytics in cyber security? Before, anything it’s good to understand how exactly the data analytics functions with available data sets. The ever rise in the successful execution of digital attacks and its unwanted consequences and broad impacts demonstrate that the traditional cyber security instruments and practices are not ready to adapt to the complex danger scene because of the accompanying reasons retaining a lot of information analyzing unstructured information managing expansive information distribution centers responding progressively and detecting Advanced Persistent Threats (APT). To address these impediments, propose a development display for cybersecurity that energizes the fuse of enormous information apparatuses and advancements. There exist hundreds of such tools and technologies and are well-documented in the academic literature. A portion of the unmistakable enormous information instruments incorporate Hadoop, Spark, Storm, Flume, HBase, Hive, Kafka, Cassandra, and Mahout. It has been proposed in that huge information instruments and innovations would change cybersecurity investigation by empowering associations to (i) collect a large amount of security-related heterogeneous data from diverse sources (ii) perform deep security analytics at real-time and (iii) provide a consolidated view of the security-related information. The big data processing framework employed in the security analytic systems. The preparing structure gives the rules to handling the enormous information. In the reviewed papers, there are three frameworks used – Hadoop, Spark, and Storm. These frameworks are quite popular as evident from their use by well-known organizations such as Yahoo, Google, IBM, Facebook, and Amazon. Big data analysis may be an appropriate approach for APT detection. A challenge in investigation APTs is that the huge quantity of data to sift through in search of anomalies. Data comes from ever-increasing range of numerous information sources that must be compelled to be audited. This huge volume of information makes the detection task appear as if finding out a needle in a very stack. Because of the amount of information, ancient network perimeter defense systems will become ineffective in police investigation targeted attacks and that they arent scalable to the increasing size of organizational networks. As a result, a brand-new approach is needed. Several enterprises collect information regarding users’ and hosts’ activities inside the organization’s network, as logged by firewalls, net proxies, domain controllers, intrusion detection systems, and VPN servers. Whereas this information is often used for compliance and rhetorical investigation, it additionall y contains a wealth of knowledge regarding user behavior that holds promise for police investigation stealthy attacks. BIG DATA TOOLS FOR CYBERSECURITY Apache Spark Apache Spark is a fast engine for data processing on a large scale. It is an open source cluster computing framework. Apache Spark can help cybersecurity officers analyze data and answer questions: Which internal servers of the company are trying to connect to internationally based servers? Has user‘s access pattern to internal resources changed over time? Which users exhibit irregular patterns of behavior such as connecting using non-standard ports? Spark powered big data discovery solutions can be used to detect anomalies and outliers within large datasets. Visualization techniques help when Large amounts of data i.e. petabytes of data is to be examined. Fort scale Services Fort scale is a big data solution against APT attacks. APT attacks can take place over a stretched period of time while the victim organization remains ignorant about the invasion. According to Fort scale, big data analysis is a appropriate approach for APT recognition. A challenge in detecting APT is the massive amount of data to examine through in search of abnormalities. The data comes from an ever-increasing number of miscellaneous information sources that have to be audited. Fort scale uses Cloudera Hadoop distribution to address big data challenges and examine network traffic data to check for invasions if any. Fort scale employs data science techniques like machine learning and statistical analysis to adapt to changes in the security environment. IBM Security Radar This tool uses big data capabilities to help keep pace with advanced threats and prevent attacks proactively. It uncovers hid connections inside huge amount of security information, utilizing examination to lessen billions of security occasions to a controllable arrangement of organized occurrences. It uses the following features of Big Data solution: Real-time correlation and anomaly detection of security data, which is diverse in nature. High-speed querying of security intelligence data. Flexible big data analytics across structured as well as unstructured data – this includes security data, email, document and social media content, business process data; and other information. Graphical front-end tool for visualizing as well as exploring big data. Conclusion Big data technologies are changing the whole world, everything from internet of things to gathering both more qualitative and more quantitative data will lead to better decision-making and insight. By utilizing enormous information innovations successfully, associations can be more proficient and more focused. Privacy advocates and data organizers criticize the history of big data as they watch the growing ubiquity of data collection and increasingly tough uses of data enabled by powerful processors and boundless stockpiling. Scientists, business, and business visionaries firmly point to concrete or anticipated innovations that may be dependent on the default collection of large data sets. Also, the quick growth of the internet has bought with it an exponential increase in the type and frequency of cyber-attacks. Many well-known cyber security solutions are in place to counteract these attacks. The huge argument today is how should privacy risks be weighed against big data rewards? Especially the recent controversy over leaked documents revealing the massive scope of data collection, analysis. Big data makes gigantic shot for the world economy in field of security, as well as in promoting and credit chance investigation to restorative research and developed arranging. In the meantime, the startling advantages of huge information are tempered by worried that advances of information biological community will turn over the power connections between government, business and people, and prompt racial or other profiling. Isolation over criminalization, and other bound adaptabilities. At long last: It is extremely essential to comprehend the security and protection suggestions coming about because of huge information executions supporting non-data security capacities. Specifically, security required executives should be aware of who Big data increases attack surface of hackers and understand how to protect against link ability threats.

Friday, September 27, 2019

Marketing Strategy Essay Example | Topics and Well Written Essays - 750 words - 1

Marketing Strategy - Essay Example The start of the firm as a small retail shop was converted to a challenging company in the telecommunication sector. The academic vitality of the marketing strategy of Carphone Warehouse is due to the fact that the success of the firm is only due to the proper strategic approach to compete down the parallel rivals in the sector. â€Å"At The Carphone Warehouse everything we do is based on our five fundamental rules. The rules speak for themselves and need little embellishment.† (Carphone warehouse 2009, para.4). The study of those rules become significant for a management student as it was the route for their success. The run of company from the position of retail shop to a branded communication firm has much to explain in the case of planning, forecasting and efficient dealings with the customers without fail. The social changes they have faced in their developmental process are a major constraint of marketing as well as management analysis. The distribution includes the retail, whole sale and other sales services and the telecom services include voice call services, data communication services etc. The short messaging, multimedia messaging, ringtones, picture are some of the services put forward by the firm. The data communication requirement of the customers is met by the broadband provided by the firm. The requirement of the customers for a mobile for making calls has altered to an advanced necessity for data communication. Always the customers opt for well servicing after purchase and assisting service providers since they have real time zero for spending in encountering any problems after procurement of the product. The founders of the company kept the customer satisfaction as the strategy at the highest priority. They found that the objective of the firm that is the only responsible factor for easier innovation in any competitive market is achieving good remarks form the end users. So a clear cut smooth relationship is

Thursday, September 26, 2019

The Changing Geography of International Business Essay - 1

The Changing Geography of International Business - Essay Example The word ‘Latin America’ is used to explain the collection of 21 countries in the continent of South America. The language that is spoken is Latin. It has been observed that Latin America enjoys components of historical experience, culture and language. Latin America is an ethnically diverse region and is also deemed as a mounting political and economic force. The main languages that are spoken in this continent are Spanish, Portuguese and French. Conventionally, the Hispanic family is a cohesive group and the most vital social unit. They generally believe in extended family. It has been observed that in Latin cultures, the familial group is quite crucial. In a few of the Latin American countries, peasants might leave their workplaces during holidays so that they can meet their relatives in other parts of the country. They also tend to attend the funeral, weddings of their friends, or distant relatives. A manager may be faced with greater difficulties related to non-atte ndance impacting the workplace to a major extent. According to a study conducted by Geert Hofstede for Latin American countries, it was noted that there is high power distance in Latin America. In Latin America, the people in higher level of authority expect to gain respect from others and are familiar to make decisions without taking into consideration the viewpoints of their subordinates. Latin America has low individualism rate. In Latin America gender roles become quite different in comparison to the United States, men hold the greater authority.

Hereditary Disorders in Children Essay Example | Topics and Well Written Essays - 1000 words

Hereditary Disorders in Children - Essay Example Hereditary defects are one of the leading cause of death in children—â€Å"causing 1 in 5 deaths in babies through 12 months of age and as many as 40% of deaths in children through the age of 10 years. Hereditary disorders are also a significant cause of childhood morbidity and long-term disability. Children with hereditary disorders often require care that is expensive and highly specialized. Hereditary disorders often impact family dynamics resulting in additional financial pressures, marital discord, and concerns about the needs of siblings. There is very little that can be done to mitigate the cause of hereditary disorders, although non-genetic birth defects they can be competently managed through public health efforts, such as promoting folic acid intake to reduce the risk of neural tube defects, etc† (www.michigan.gov/mdch/). Genetic disorders can occur in males and females of all racial and ethnic backgrounds. It causes different types of birth defects, as well as developmental disabilities. To take a particular example, Down syndrome occurs in about 1 in 800 people. There is wide variation in the mental abilities of children with Down syndrome. Most have developmental delays. They usually learn at a slower pace, but do not lose skills once they are acquired. They may â€Å"also have trouble with judgment and reasoning. The degree of mental impairment is usually in the mild to moderate range. Emotional problems such as behavior issues or depression may occur in childhood. Common facial features include upward slanting eyes with epicanthal folds (skin over the inside corner of the eye), a small mouth, and a flat nasal bridge. Children with Down syndrome are often shorter than average, and prone to extra weight gain. Babies may seem â€Å"floppy† due to low muscle tone (hypotonia).† (www.lpc h.org) But all is not lost for parents of children with Down syndrome and other genetic disorders. Down syndrome cannot be cured, but some symptoms can be

Wednesday, September 25, 2019

Should be banned or not smoking in the sociery Essay

Should be banned or not smoking in the sociery - Essay Example Some of these arguments are seen to include. Why Smoking should not be banned in Society Proponents of smoking point out that most societies accept that adults can be able to decide to cause some form of harm to their individual selves as long as such harm is not seen to extend to other individuals. As such, the imposition of smoking bans in public places is not essentially valid as passive smokers who do not wish to involuntarily inhale tobacco smoke should naturally avoid going to places where smoking has been allowed. Proponents of smoking point out that as a result of its being legal for individuals to be allowed to smoke, it is essentially not within the rights of governments to try and cause people to desist from smoking. Smokers are not a liability to anyone as they are able to find their own healthcare via the relatively high taxes that they happen to pay on tobacco and in any case, any efforts by the government to try and dissuade smokers from smoking would be extremely diff icult as heavy smokers are normally seen to be addicted to nicotine and cannot be able to give up on smoking easily. It is also pointed out that any attempts to ban smoking in public spaces would have the involuntary effect of driving most clubs, bars and pubs out of business as smokers would avoid going to such places. These businesses would also be seen to run the risk of generating less revenue by any bans on tobacco sales (Whittingdale 130). In most places, pubs are seen to be social communal centers that aid in bringing the members of a given community together and in addition to this function, they also provide ample job opportunities for individuals that might happen to be having relatively few job skills. As opposed to attempting to place a ban on smoking, pubs should be encouraged to set up non-smoking bars to cater for the needs of the non-smoking patrons. There is a relatively large number of non-smokers who are seen to be working in smoky environments and do not seem to mind it. Most individuals are of the view that it is better for them to be working in the smoky job environment as opposed to the unenviable option of not having any job at all. In the event that an organization happens to employ a large number of non-smokers, it is possible for the company to invest in the installation of ventilation fans to help in removing the smoke from the office. Why Smoking should be banned in Society Scientists have been able to show that smoking is fraught with a number of dangers as it can lead to cancer, heart disease and stroke. According to Hong, the use of tobacco is largely considered to be the single largest cause of cases of preventable cancer deaths across the world. Cigarette smoking is estimated to account for an approximated over 1 million cancer deaths in the world each year, with a staggering ninety percent of lung cancer incidents and mortality cases being attributed to smoking (386). In addition to this menace, smoking has been shown to not only harm the smokers, but also any people who might happen to be near the smoking individual in what is commonly referred to as passive smoking. Although the smoker makes the active decision to engage in smoking, the people around the smoker essentially do not make the decision to smoke in a passive manner and as such, a complete ban on smoking in society should be effected so as to effectively protect such individuals. The enforcement of a ban on smoking would serve to encourage smokers

Tuesday, September 24, 2019

Memories on Cities, Nature and People through the Lenses of Andre Essay

Memories on Cities, Nature and People through the Lenses of Andre Aciman - Essay Example Definitely, Alexandria goes first in such a recollection by the author. It is a source for his passion where he is inclined to take a glimpse at the past experience which is never-ending for his entire life. Thus, the first claim of significance is that Aciman is well devoted to the value of a memory. Thereupon, in Alexandria: The Capital of Memory he states on what he gained and missed being an ordinary denizen of the city while the political conflict sprang up in his youth and what Alexandria means to him at present (Aciman 6). It is a so-called memoir represented through the lenses of the writer’s vision of sweet memories and dreams about this location. On the other hand, Aciman is sensitive to the subtle facets of his soul each time he reproduces his own vision of life and living it in close relation with the environment. Just roaming the streets of Alexandria helps the writer focus more on the way everything functions and stays in the city (Aciman 10). It is a particular way to fix the picture of the location at the writer’s specific foreshortening just in case something will change in the future. Such sweet things keep track to the writer’s appreciation of his young ages and how they went on. Besides, In Search of Blue depicts Aciman’s reasoning on the most valued features to stay in mind. It is unlikely that he is dreaming about some material amenities or some lucre. He is dedicated more to the abstract images of what he sees and what will be accumulated in his widespread mind afterwards. Flashbacks feed Aciman in his trip to Rome along with his parents. Along with Alexandria, Rome is a part of the writer’s colorful life (Aciman 24). It is all about a man living his life along and with the family at once. Aciman is open to describe the power of his feelings through the shades and hues of blue, namely: â€Å"For years this wonderful expanse of still and timeless blue, where hills and rippleless beaches seemed made to ex ist in memory alone, belonged nowhere† (Aciman 24). Admittedly, the writer aims at the height of his imagination while taking a look at the natural beauty of the city he lived in. Past memories presuppose the sense of living for Aciman. He takes care of each slight memory so as to keep it alive and vivid. Thus, in search of blue, Andre Aciman seems to find out the exact way of thinking about what a man can bear with him/her throughout life. In his another essay called Shadow Cities, the writer makes an attempt to bind another city to make sure a reader knows what New York means to him. The essay represents his worries about what happened to a little Straus Park just within the city (Aciman 38). He does not hesitate to come closer to the overall idea of a virtue and social responsibility of people inhabiting the city and contributing into its further development. It is all about the way Aciman once shared the significance of natural episodes within concrete jungles of todayâ₠¬â„¢s urbanized world. However, it does not describe him as an opponent of the city. He finds New York pretty magnificent along with its streets and avenues. Therefore, the writer’s great desire states as follows: â€Å"I wanted everything to remain the same† (Aciman 38). It is a voice of despair the writer faced in New York and realized it would never stop in the future. Everything is in the state of flux, as they say. However, Aciman behaves as a real foreigner keeping in mind the things as they were earlier. Hence, he illustrates his strict incapability to get accustomed with new names of the stores or some change to the places of sightseeing he once encountered in his life. To say more, being an adolescent, Andre Aciman obtained precious knowledge of what the world means to a man. Insofar, the essay called Square Lamartine is also a compilation

Monday, September 23, 2019

Curriculum Design and Evaluation; Standards -Based Education Essay

Curriculum Design and Evaluation; Standards -Based Education - Essay Example Critics assail standards-based education in two fronts – content and implementation. For instance, Hamilton et al. (2002, p. 27) argued that in standards-based curriculum development, there is a difficulty in deciding how many performance levels should be created, what method should be used to set those levels, how high they should be set, and what they should be called. Also, a number of research educators and students themselves disagree with the policy of passing a rigorous test just to get a high school diploma. There are also those who criticize the implementing agency of being vague as to the academic content and with being lax with schools in terms of following standards. (Cizek 2001, p. 418) Certainly, good arguments are also coming from similar sectors stressing the expectation from all students to perform in the same way since the fact is, there are ordinary students and there are academically talented ones. The former name of standards-based education is outcome-based education. This is not without reason because this system focuses on achieving optimum learning outcome and the performance of students. I believe this is essentially what education is all about. This example shows how standards-based education offers the most impact because it allows the students to explore on their own, creating learning opportunities where theories are applied in the process. Learning is more rigorous and the methodologies employed are more strategic in terms of meeting students’ learning needs. It is in my opinion that students receive and retain more learning content in this process due to the environment and the standard. Another point about standards-based curriculum is the fact that it works within the premise that education requires continuous improvement. So where in the traditionalist setting the grade of A is the same today and tomorrow, students in standards-based education must pass a test that is benchmarked 10 years from

Saturday, September 21, 2019

Native Son Theme Analysis Essay Example for Free

Native Son Theme Analysis Essay In his novel, Native Son, Richard Wright reveals his major theme of the Black population in America in the 1930’s. In the opening scene of the novel, Wright introduces his condemning message towards the ugliness of American racism and the social oppression of Blacks in his time. The opening scene of Native Son functions by foreshadowing future events that occur throughout the novel involving major symbols that are introduced in the scene to represent other elements in the novel. The scene also establishes an atmosphere of hopelessness and despair as it presents the Thomas apartment setting and its contrasting image of the Dalton mansion. The function of the scene is established by three major elements which is the alarm clock, the rat-catching, and the apartment setting. The first element that is introduced is the ambiguous alarm clock. The alarm clock that awakens Bigger Thomas and his family at the opening of the novel is a major symbol that Wright uses to attack American racism. The loud ring the alarm clock gives off serves as a wake-up call Wright wants his audience to hear. Wright uses the alarm to represent his assertive message to the American public of the destructive effects of racism and oppression American society has accepted. His call for change is like a prophetic warning such as Elisha gives, in Biblical context, demanding the need for social change before it is too late for the nation of ancient Israel. Similar to Elisha’s warning, Wright predicts revolutionary violence and social upheaval if racism and oppression is not stopped in American society. Another function of the alarm clock is its foreshadowing of Bigger’s symbolic awakening in the course of the novel. The clock in the opening scene represents Bigger as a powder keg, both of which are waiting to go off at any moment. Bigger’s climactic point of his explosive act of killing Mary serves the same function as the alarm given off from the clock whereas both wake and opens the eyes of those who hear it or see it. The alarm clock symbolizes Bigger’s new realization that he should not feel guilty for the killing of Mary because of the living conditions White society forced him to live into, which made him into what he is. Another important element in the opening scene that Wright uses to attack racism and oppression is the rat-catching. In the commencement of the novel, Bigger discovers a huge black rat and his mother and sister jump in hysteria. Bigger then corners the rat, and as the rat attacks back, he strikes it with a skillet; then smashes it superfluously until it became a bloody pulp and showed it to Vera. The rat-catching scene is significant because it foreshadows Bigger being tracked down and caught in the course of the novel. In the scene, Wright portrays the black rat as Bigger Thomas. Wright makes them resemble like each other because of their color and their unwanted presence. Like rats, the Black population are viewed as vermin and unwanted pests by White society. With this perspective, the public oppresses and controls the Black population to prevent them from getting near towards Whites in American society. Both Vera and Mother Thomas’ hysteria towards the rat resembles White society’s hysteria toward Bigger’s murder and assumed rape of a White woman. Vera and Mother Thomas’ reaction towards the huge black rat is that of disgust and fear of what it may do. In comparison, when the public found the truth behind the killing of Mary, they panicked and feared of what a Black murderer and rapist is capable of doing. Wright uses this episode to reveal the intense hate the racist American society has towards the Black population. He also uses it to call attention to the excessive paranoia the public exhibits which is a link to the intensity and depth of American racism. Another foreshadowing in the novel would be the representation of Bigger’s capture through Bigger’s cornering of the rat. In the beginning of the novel, Bigger blocks the exit of the rat such as how the police block the exit on Bigger later on in the novel. The foreshadowing extends also at how the rat attacks viciously at Bigger’s pant leg such as how Bigger shoots back at his capturers to prevent being caught. These aggressive scenes between survival and fear points out the result and effects of American society’s strong racist views as Wright describes the capturers drive to capture what seems dangerous and fearsome to them. The last and final foreshadowing in the opening scene would be Bigger’s superfluous bashing of the rat and his act of showing the bloody rat to Vera. The scene is used to portray Bigger’s excessive beating at the time of capture and Buckley’s exhibition of Bigger’s capture and death. The excessive beating of both the rat and Bigger relate the abuser’s need for their thirst witnessing pain being inflicted upon their subject. They are also similar because their unnecessary abuse is a signal of the intense hate the abuser had towards them. Also, the exhibition of Bigger by Buckley presents the similar racist connotations as the beating does. In the novel, Buckley holds Bigger as a political advantage, stressing a racist message to Blacks to show them what happens to the unwanted Blacks when they break the law in Richard Wright’s time which consists of strict and racist laws. One last important element of the opening scene is the setting of the dilapidated Thomas apartment. One function of this apartment setting is to set the atmosphere for the novel as a whole. The run-down and squalid apartment gives a sense of hopelessness and despair. The gloomy aspect of the setting describes the victimization of the Thomas family done by the society in which they are living in. Another function of the apartment setting is that it is a microcosm for how Blacks live throughout the city of Chicago. The apartment is a small, congested room fixed with a kitchen and no walls to separate the men from the women. The inappropriateness of their apartment is exemplified when both Buddy and Bigger have to turn their heads away while Mother Thomas and Vera dress. These unacceptable living conditions are created by an oppressive society and creates an unstable Black society which produces people such as Bigger who turn out to be exactly what White society believes they are like. The apartment setting is also part of a geographical contrast with the Dalton mansion. The apartment shows the unfair distribution of wealth as the Dalton mansion exhibits aristocratic characteristics with its multiple rooms and white columned porch; while the Thomas apartment has a mere single room, which occupies an entire family, and consists of a rat infestation. The contrast helps enforce the sense of the inequality and injustice while it also presents a divided Black and White society made possible by a racist country. Altogether, the opening scene functions to attack American society and its oppressive standpoint towards Blacks in Richard Wrights time. Wright establishes the scene’s function by using these three major elements: the alarm clock, the rat-catching, and the apartment setting. Richard Wright central theme of change is produced by the opening scene to correspond with the rest of the novel as it stresses the warning of a possible revolution and social upheaval if conditions do not change in American society.

Friday, September 20, 2019

Definitions of Multiprocessors in Computing

Definitions of Multiprocessors in Computing A multiprocessor can be defined as the computer which uses two or more processing units under the integrated control. Multi-processing is also defined as the way of using two or more than two CPUs within a single computer. As we all know that there are processors inside the computers, the multi processors, as the name indicates, have the ability to support more than one processor at a same time. Usually in multi-processing the processors are organized in the parallel form and hence a large number of the executions can be brought at the same time i.e. multi-processing helps in executing the same instructions a number of time at a particular time. Some other related definition of the multi processors are that multi-processing is the sharing of the execution process by the interconnection of more than one microprocessor using tightly or loosely couples technology. Usually multi-processing tasks carries two simultaneous steps. One is the performing the task of editing and the other is th e handling the data processing. A multi-processor device comprising, over a single semiconductor chip a plurality of processors including a first group of processors and a second group of processors; a first bus to which the first group of processors is coupled; a second bus to which the second group of processors is coupled; a first external bus interface to which the first bus is coupled; and a second external bus interface to which the second bus is coupled. The term multiprocessing is also used to refer to a computer that has many independent processing elements. The processing elements are almost full computers in their own right. The main difference is that they have been freed from the encumbrance of communication with peripherals. MULTIPROCESSORS IN THE TERMS OF ARCHITECTURE The processors are usually made up of the small and medium scale ICs which usually contains a less or large number of the transistors. The multi processors involves a computer architecture Most common multiprocessor systems today use an SMP architecture. In the case of multi-core processors, the SMP architecture applies to the cores, treating them as separate processors. SMP systems allow any processor to work on any task no matter where the data for that task are located in memory; with proper operating system support, SMP systems can easily move tasks between processors to balance the workload efficiently. Benefits Increased processing power Scale resource use to application requirements Additional operating system responsibilities All processors remain busy Even distribution of processes throughout the system All processors work on consistent copies of shared data Execution of related processes synchronized Mutual exclusion enforced Multiprocessing is a type of processing in which two or more processors work together to process more than one program simultaneously. Multi processor systems have more than one processor thats why known as multi processor systems. In multiprocessor system there is one master processor and other are the Slave. If one processor fails then master can assign the task to other slave processor. But if Master will be fail than entire system will fail. Central part of Multiprocessor is the Master. All of them share the hard disk and Memory and other memory devices. Examples of multiprocessors 1. Quad-Processor Pentium Pro SMP, bus interconnection. 4 x 200 MHz Intel Pentium Pro processors. 8 + 8 Kb L1 cache per processor. 512 Kb L2 cache per processor. Snoopy cache coherence. Compaq, HP, IBM, NetPower. Windows NT, Solaris, Linux, etc. 2. SGI Origin 2000 NUMA, hypercube interconnection. Up to 128 (64 x 2) MIPS R 10000 processors. 32 + 32 Kb L1 cache per processor. 4 Mb L2 cache per processor. Distributed directory-based cache coherence. Automatic page migration/replication. SGI IRIX with Pthreads Classifications of multiprocessor architecture Nature of data path Interconnection scheme How processors share resources Message-Passing Architectures Separate address space for each processor. Processors communicate via message passing. B) Shared-Memory Architectures Single address space shared by all processors. Processors communicate by memory read/write. SMP or NUMA. Cache coherence is important issue. 1. Classifying Sequential and Parallel Architectures(DATA PATH) Stream: sequence of bytes Data stream Instruction stream Flynns classifications: MISD multiprocessing: MISD multiprocessing offers mainly the advantage of redundancy, since multiple processing units perform the same tasks on the same data, reducing the chances of incorrect results if one of the units fails. MISD architectures may involve comparisons between processing units to detect failures. Apart from the redundant and fail-safe character of this type of multiprocessing, it has few advantages, and it is very expensive. It does not improve performance. It can be implemented in a way that is transparent to software. It is used inarray processorsand is implemented in fault tolerant machines. MIMD multiprocessing: MIMD multiprocessing architecture is suitable for a wide variety of tasks in which completely independent and parallel execution of instructions touching different sets of data can be put to productive use. For this reason, and because it is easy to implement, MIMD predominates in multiprocessing. Processing is divided into multiplethreads, each with its own hardware processor state, within a single software-defined process or within multiple processes. Insofar as a system has multiple threads awaiting dispatch (either system or user threads), this architecture makes good use of hardware resources. MIMD does raise issues of deadlock and resource contention, however, since threads may collide in their access to resources in an unpredictable way that is difficult to manage efficiently. MIMD requires special coding in the operating system of a computer but does not require application changes unless the programs themselves use multiple threads (MIMD is transparent to single-threaded programs under most operating systems, if the programs do not voluntarily relinquish control to the OS). Both system and user software may need to use software constructs such assemaphores(also called locksorgates) to prevent one thread from interfering with another if they should happen to cross paths in referencing the same data. This gating or locking process increases code complexity, lowers performance, and greatly increases the amount of testing required, although not usually enough to negate the advantages of multiprocessing. Similar conflicts can arise at the hardware level between processors (cache contention and corruption, for example), and must usually be resolved in hardware, or with a combination of software and hardware (e.g.,cache-clear instructions). SISD multiprocessing: In asingle instruction stream, single data streamcomputer one processor sequentially processes instructions, each instruction processes one data item. SIMD multiprocessing: In asingle instruction stream, multiple data streamcomputer one processor handles a stream of instructions, each one of which can perform calculations in parallel on multiple data locations. SIMD multiprocessing is well suited toparallel or vector processing, in which a very large set of data can be divided into parts that are individually subjected to identical but independent operations. A single instruction stream directs the operation of multiple processing units to perform the same manipulations simultaneously on potentially large amounts of data. For certain types of computing applications, this type of architecture can produce enormous increases in performance, in terms of the elapsed time required to complete a given task. However, a drawback to this architecture is that a large part of the system falls idle when programs or system tasks are executed that cannot be divided into units that can be processed in parallel. 2. Interconnection scheme Describes how the systems components, such as processors and memory modules, are connected Consists of nodes (components or switches) and links (connections) Parameters used to evaluate interconnection schemes Node degree Bisection width Network diameter Cost of the interconnection scheme Shared bus Single communication path between all nodes Contention can build up for shared bus Fast for small multiprocessors Form supernodes by connecting several components with a shared bus; use a more scalable interconnection scheme to connect supernodes Dual-processor Intel Pentium Shared bus multiprocessor organization. Crossbar-switch matrix Separate path from every processor to every memory module (or from every to every other node when nodes consist of both processors and memory modules) High fault tolerance, performance and cost Sun UltraSPARC-III Crossbar-s witch matrix multiprocessor organization. Hypercube n -dimensional hypercube has 2 nodes in which each node is n connected to n neighbor nodes Faster, more fault tolerant, but more expensive than a 2-D mesh network n CUBE (up to 8192 processors) Multistage network Switch nodes act as hubs routing messages between nodes Cheaper, less fault tolerant, worse performance compared to a crossbar-switch matrix IBM POWER4 COUPLING of PROCESSORS Tightly coupled systems Processors share most resources including memory Communicate over shared buses using shared physical memory Tasks and/or processors communicate in a highly synchronized fashion Communicates through a common shared memory Shared memory system Loosely coupled systems Processors do not share most resources Most communication through explicit messages or shared virtual memory (although not shared physical memory) Tasks or processors do not communicate in a synchronized fashion Communicates by message passing packets Overhead for data exchange is high Distributed memory system Comparison between them Loosely coupled systems: more flexible, fault tolerant, scalable Tightly coupled systems: more efficient, less burden to operating system programmers Multiprocessor Operating System Organizations Classify systems based on how processors share operating system responsibilities Types: Master/slave Separate kernels Symmetrical organization 1) Master/slave organization Master processor executes the operating system Slaves execute only user processors Hardware asymmetry Low fault tolerance Good for computationally intensive jobs 2) Separate kernels organization Each processor executes its own operating system Some globally shared operating system data Loosely coupled Catastrophic failure unlikely, but failure of one processor results in termination of processes on that processor Little contention over resources Example: Tandem system 3) Symmetrical organization Operating system manages a pool of identical processors High amount of resource sharing Need for mutual exclusion Highest degree of fault tolerance of any organization Some contention for resources Example: BBN Butterfly Memory Access Architectures Can classify multiprocessors based on how processors share memory Goal: Fast memory access from all processors to all memory Contention in large systems makes this impractical 1) Uniform memory access (UMA) multiprocessor All processors share all memory Access to any memory page is nearly the same for all processors and all memory modules (disregarding cache hits) Typically uses shared bus or crossbar-switch matrix Also called symmetric multiprocessing (SMP) Small multiprocessors (typically two to eight processors) 2) Nonuniform memory access (NUMA) multiprocessor Each node contains a few processors and a portion of system memory, which is local to that node Access to local memory faster than access to global memory (rest of memory) More scalable than UMA (fewer bus collisions) 3) Cache-only memory architecture (COMA) multiprocessor Physically interconnected as a NUMA is Local memory vs. global memory Main memory is viewed as a cache and called an attraction memory (AM) Allows system to migrate data to node that most often accesses it at granularity of a memory line (more efficient than a memory page) Reduces the number of cache misses serviced remotely Overhead Duplicated data items Complex protocol to ensure all updates are received at all processors 4) No-remote-memory-access (NORMA) multiprocessor Does not share physical memory Some implement the illusion of shared physical memory shared virtual memory (SVM) Loosely coupled Communication through explicit messages Distributed systems Not networked system Features of the multiprocessors Many multiprocessors share one address space They conceptually share memory. Sometimes it is often implemented just like a multicomputer In it the communication is implicit. It reads and writes access to the shared memories. Usually the multi processors are characterized by the complex behaviour. The MPU handles high-level tasks, including axis profile generation, host/controller communication, user-program execution, and safety event handling. Advanced real time algorithm and special filter execution Digital encoder input up to 20 million counts per second Analog Sin-Cos encoder input and interpolation up to a multiplication factor of 65,536 Fast, high-rate Position Event Generator (PEG) to trigger external devices Fast position registration (Mark) to capture position on input event High resolution analog or PWM command generation to the drive High Speed Synchronous Interface channel (HSSI) to manage fast communication with remote axes or I/O expansion modules Advantages of Multiprocessor Systems Some advantages of multiprocessor system are as follows: Reduced Cost: Multiple processors share the same resources. Separate power supply or mother board for each chip is not required. This reduces the cost. Increased Reliability: The reliability of system is also increased. The failure of one processor does not affect the other processors though it will slow down the machine. Several mechanisms are required to achieve increased reliability. If a processor fails, a job running on that processor also fails. The system must be able to reschedule the failed job or to alert the user that the job was not successfully completed. More work: As we increase the number of processors then it means that more work can be done in less time. Id more than one processor cooperates on a task then they will take less time to complete it. If we divide functions among several processors, then if one processor fails then it will not affect the system or we can say it will not halt the system, but it will effect on the work speed. Suppose I have five processors and one of them fails due to some reasons then each of the remaining four processors will share the work of failed processor. So it means that system will not fail but definitely failed processor will effect on its speed. If you pay attention on the matter of which save much money among multi-processor systems and multiple single-processor systems then you will know that multiprocessor systems save moremoneythan multiple single-processor systems because they can share power supplies, memory and peripherals. Increased Throughput: An increase in the number of processes completes the work in less time. It is important to note that doubling the number of processors does not halve the time to complete a job. It is due to the overhead in communication between processors and contention for shared resources etc. Reference BOOKS Referred: Morris Mano, Computer System Architecture, Prentice Hall, 2007

Thursday, September 19, 2019

Forbidden Knowledge in Digging for China :: Digging for China

Searching for Forbidden Knowledge in Digging for China In Richard Wilbur's poem, "Digging for China", he writes, " 'Far enough down is China,' somebody said. 'Dig deep enough and you might see the sky as clear as at the bottom of a well.'" (Lines 1-3) Wilbur was suggesting to his readers that if one looks at the world in a different way, they could find a totally different place. We can see this concept when we explore Wilbur's poem as a whole piece. He is talking about finding a paradise in one's backyard. He emphasizes a lot about prayer, and looking harder and digging deeper for this other world. He warns his readers that they must not loose the rest of their life by trying to change one thing. When we, the readers, break apart Wilbur's poem, we find the continuous acknowledgement of religion. The person in the poem works day and night trying to reach China. He/she was on hands and knees trying to dig this hole. "It was a sort of praying, I suspect." (Lines 12-13) This person is realizing that they have to look other places for their "paradise" they are trying to find, so they look to God. When they do this, they are covered in brightness. Wilbur uses the word "palls" to express this idea. The true definition is a black velvet cover that drapes over a coffin. If the person wouldn't have looked to God in prayer, then their "paradise" would be covered in this darkness, rather than the brightness they found. Another word that Wilbur used in reference to prayer was "paten". A paten is a plate that the Eucharist is carried on. The Eucharist is the body of Christ; his life. In the poem, the life that the person was looking for was growing before them, but they were still looking into the hole. The person then begins to realize that they are looking in the wrong place. We see this when Wilbur writes, "my eyes where tired of looking into darkness, my sunbaked head of hanging down a hole." (Lines 18-19) They realize that this idea of their "paradise" is taking away from their life and that they must take their head out of the darkness that it has caused. Wilbur brings up the sun because it shows that the person is coming back to consciousness.

Wednesday, September 18, 2019

Standardized Testing and No Child Left Behind :: Standardized Testing Essays

Policy Identification and Explanation Every year, students are required to participate in standardized testing. Why would each student be forced to take such tests every year? This is because of the No Child Left Behind Act of 2001(NCLB). In the NCLB Act of 2001 Public Law 107-110 115 Stat. 1445-6, it states that, â€Å"each state plan shall demonstrate that the state has adopted challenging academic content standards and challenging student academic achievement standards that will be used by the state, its local educational agencies, and its schools to carry of this part† (The NCLB LAW). The NCLB Act of 2001 Public Law 107-110 115 Stat. 1445-6 is based on the development of state content and academic achievement standards which are measured by state assessments and compared to the â€Å"adequate yearly progress† expectations. Each state is allowed to develop their own standards. History/Background Standardized tests date back as far as 2200BC, when the Chinese government administered written exams to candidates interested in being in the Civil Services (Young, 2005). The exams were mostly memorization of established wisdom. By 1803, exams were widespread throughout Europe as a way to get into a respected college. Standardized tests didn’t appear in the United States until the mid 19th century. Written exams were introduced in Boston in 1845 for government funded schools and in 1851, Harvard started the first entrance exams. From 1900-1915, psychology was a big influence on the tests that were administered. During this time, Lewis Terman helped expand Alfred Binet’s ideas about an intelligence test. This later, in 1916 became known as the IQ test. In 1926, colleges began using the SAT, a multiple-choice exam. This was a great advancement in the form of standardized tests. The SAT made grading easier and the testing more consistent. The SAT replaced any written test for college entry. For the next 19 years, the number of IQ tests increased substantially (Young, 2005). During these 19 years, different tests are created from the inkblot tests to the scholastic multiple choice test. At the start of the 1960’s, a book was published called, The Tyranny of Testing (Young, 2005). This book started the criticism due to the issue of standardized testing. The strongest criticism was standardized testing wasn’t helping students to achieve and reach their full potential. This statement was backed by the Russians launching of Sputnik in 1957. American’s began to wonder why the Russians had beaten us into space.

Close Company, Stories Of Moth :: essays research papers

Women during the time that A Visit from the Footbinder was written were willing to accept pain to fulfill society’s concept of beauty and to keep their position in society. Women’s role in this society was one in which they lacked any sense of power and they were therefore fully dependent on men. Hence, they were willing to suffer through the excruciating torture of crushing their toes under the weight of their own bodies in order to make themselves desirable enough to attract a wealthy husband.   Ã‚  Ã‚  Ã‚  Ã‚  The roles of men and women in this story are quite rigid, therefore allowing women little room to go against society. This is due in part to the economy, which does not permit much movement for neither race nor gender. Therefore, when one is born into a class they must conform to its standards. Women are generally given more rights and freedoms if they provide a direct economic function in society, such as owning and managing property to produce goods. Most of the property was passed down from father to son, though, and women had no rights. That is why the fathers had to decide on a dowry to marry off their daughters. Economically, men fulfill the â€Å"important† roles while women work â€Å"behind the scenes,† raising children and taking care of the household. These â€Å"simple† jobs that women perform cause them to be dependent on men, and relegate them into a subordinate position. Society’s attitude of women being weak and dependen t, while men are strong and in control, stems from the roles they are obligated to fulfill. Women are restricted to these roles because the idea of what a â€Å"good† woman or man should be becomes so ingrained into the culture. Society condemns that which is different, mainly due to fear, making it difficult for anyone to go against its belief systems. In the story, both the men and the women are really against the idea of the footbinding deep down. When asked if it will hurt, Tiger Mouse tells Pleasure Mouse that perhaps â€Å"the pain is so great that one’s sentiments are smashed like egg shells†(Prager 50]. Warm Milk, the concubine, fell in front of Pleasure Mouse’s door one night and said, â€Å"It is my legs. They are swollen like dead horses in the mud. And as for my feet, well, they’re no longer of this earth,† and then she says â€Å"They cannot bear the weight of two, Pleasure Mouse, but never say I said so.

Tuesday, September 17, 2019

Cruddy by Lynda Barry

Lynda Barry has provided a thoughtful, interesting, and provocative novel about Roberta Rohbeson featuring, on the surface, two diverse, but related story lines. The first is the story of Roberta as a sixteen-year-old girl and details what happened to her to cause her to be grounded for a year for dropping two hits of acid in September of 1971. It is Roberta who gives the book its name. While grounded in her room she begins to write in her diary with an ominous note of her intended suicide, â€Å"I planned this way before the drugs were a part of my life. . . .It was my idea to kill myself† (Barry two pagers before 1). This plot thread is interwoven with a more detailed sinister thread that took place five years earlier when Roberta's parents separated and, at her mother's insistence, Roberta hide in the back of her father's car and accompanied â€Å"the Father,† as she calls him, on a bloody, murderous, cross-country spree fueled by the near constant drinking by her al coholic father. The spree ended with her father as the prime suspect in the Lucky Chief Motel Massacre and with Roberta walking through the Nevada while covered with blood (Barry).It is unclear however whether either of the plot threads actually occurred within the world of the novel or whether they are the imaginings or hallucinations of a teenage girl being punished for misbehaving. Unlike many books that deal with teenage angst by portraying the protagonist as a person with a â€Å"woe is me† attitude, Cruddy distinguishes itself by not falling victim to this self-indulgent trap. Roberta is detached from her family. Like the impersonal description of her father as â€Å"the father,† Roberta's mother is called simply â€Å"the mother.† Roberta views her younger half-sister Julie with the usual contempt of teenagers who are forced to share a bedroom. Roberta has a matter of fact attitude toward the events in her life and blames no one for her actions. She remem bers and acts upon some of the philosophical aphorisms her father espouses. â€Å"DO NOT HESITATE. NEVER, NEVER HESITATE† and L. L. S. S. , (loose lips sink ships) (Barry 30, 99). The book features a large number of charcoal drawings that illustrate the accompanying text. These pictures provide the reader with the best physical description of the father.Page 22 features a portrait of a hard looking man with deep-set eyes and a cigarette drooping reminiscent of Humphrey Bogart. The picture reveals an independent man who will brook nonsense from no one and will not hesitate to use violence should the need or opportunity arise. The father's face reveals no compassion for anyone, not even his daughter Roberta whom he calls Clyde. Ostensibly the alcohol binge and crime spree of the father starts at the time of the separation of Roberta's parents.When the father discovers that Julie, the younger sister, is not his, but the child of his wife's boss he snaps because of the stress cau sed by the discovery. Combined with the apparent suicide of his father known as Old Dad, it was more than he could bear. The newspapers covering the story of the murders alleged that the father stole Roberta in the middle of the night and left a note threatening to kill Roberta if the mother calls the police or tried to find them (Barry 23). According to Roberta this is largely a fiction put on by her mother to get her picture in the paper.The real story is the mother made Roberta hide in the car and accompany her father. At the novel's beginning the father was due to inherit the family business, a well-known local meatpacking plant where he worked as a butcher and had developed a good reputation locally. Instead of leaving the business to his son Old Dad sold it â€Å"out from under† the father and left him unemployed and without funds. Allegedly Old Dad placed the money into three Samsonite suitcases none of which he gave to the father. Then Old Dad hanged himself in the me at cooler.He believes his father, Old Dad, has cheated him and that he is just getting back what was his by natural right. Allegedly much of the father's motivation lies in hopes of recovering the suitcases and the supposed money in them. However, it is difficult to determine if there is any truth at all to the story of the three suitcases of money. Supposedly the meatpacking plant was heavily mortgaged and selling the plant was necessary to pay the debts, â€Å"at least I'm not leaving you in the hole,† said Old Dad.If this were the case one would expect him to open the suitcases as he found them and make use of the money, but he does not do this. When he finds the first suitcase he merely holds it up and says, â€Å"not a scratch on it . . . It's Samsonite! We could do a [bleep] commercial† (Barry 25-38). This peculiar behavior calls into question whether this plot thread ever existed. Nonetheless with this theoretical motivation the father packs his butcher knives a nd leaves his wife. Blood has played an important role in the father's life.Although he spent time in the Navy, being a butcher was his work as a butcher that he believed that he would achieve success. He takes pride in the work he does and has hopes of challenging even the big packinghouses and that stores were going to come back and buy their meet from Rohbeson's Slaughter House (Barry 25). At the end of a workday he and his clothes were often covered with blood. He is devoted to his knives and goes so far as to name them. Little Debbie is his favorite and he gives it to Roberta to protect herself. The nature of the father's profession was inherently violent.The violence manifests itself throughout the novel. He kills people in a variety of ways including homicide by car and shooting people. When Roberta is injured and receives a small cut on her finger that becomes infected, he casually uses Little Debbie to remove the finger at the knuckle while promising that Roberta â€Å"wou ld not feel a thing: (Barry 198). The name of the combination slaughterhouse, restaurant, and bar where they stay for a time is the Knocking Hammer, presumably a reference to a notorious method of killing beef about to be slaughtered by hitting them in the head with a hammer.The violence in the father's life also occurs in Roberta's world. Shortly after the father amputated her finger Roberta found herself thinking about killing the father and the others who live at Knocking Hammer (Barry 214). Shortly afterwards Roberta uses Little Debbie to cut the throat of the deputy sheriff while he is driving her to the institution where her father has committed her. By the end of the novel Roberta has killed her father by slicing his throat with the knife named Sheila. She also killed the others staying at the Lucky Chief Motel.Roberta has become a serial killer. It is unclear whether or not examining the father helps understand his blood thirst. By the book's end the two plot threads have vi rtually merged and it is no longer clear how much of the events in the novel actually happened. It appears likely that the thread where Roberta gets grounded for dropping acid is true. However, it is less clear the other thread occurred at all. It may be the acid induced hallucinations of Roberta. It may be a story made up to entertain her friend Vicky.Both threads may be the imaginary world of a teenager trying to get back at her parents for grounding her for a year by imagining one of them an unfit mother and the father as a homicidal, alcoholic maniac. The novel works in all of these fashions and leaves the reader unsure just what is what. In any case the world where Roberta lives, whether it is real, imaginary, or the product of drug-induced delusions is a violent one. Works Cited Barry, Lynda. Cruddy: An Illustrated Novel. New York: Simon & Schuster, 1999.

Monday, September 16, 2019

Is Rosa Parks a True Hero

Rosa Parks-A True Hero A hero is a person, typically a man, who is admired or idealized for courage, outstanding achievements, or noble qualities. Despite what some may argue, Rosa Parks is a perfect example of a Civil rights hero. This can be seen not only through the famous Montgomery Bus ride, but also through other examples where she showed courage, made achievements, or proved herself to have noble qualities. These include: Sparking the Montgomery bus boycott, helping the formation of the MIA, Being directly connected to the Browder versus Gayle lawsuit, Working with Martin Luther King, Featuring on International news, Writing her Autobiography and gaining honors and Awards. In the segregated Montgomery of Dec. 1, 1955, the first 10 rows of a bus where reserved for white riders. As the bus went along its route, more people got on, and the white section of the bus filled up. When another white man boarded, the driver ordered Parks and three blacks seated next to her to move. Park s refused and was arrested.This act of individual resistance, especially in a time where there was lynching for blacks who stepped out of line was rare, especially for a woman. Although it seems insignificant, Parks’ resistance on Dec. 1, 1955 changed the course of history and led to her other major accomplishments, eventually making her an American Hero. 2 Sparked by the arrest of Rosa Parks on 1 December 1955, the Montgomery bus boycott was a 13-month mass protest that ended with the U. S. 3 Supreme Court ruling that segregation on public buses is unconstitutional. It started off, with a one day boycott, where people where asked to stay off the buses.However, On 5 December, 90 percent of Montgomery’s black citizens stayed off the buses. That afternoon, the city’s ministers and leaders met to discuss the possibility of extending the boycott into a long-term campaign. During this meeting the MIA was formed. 3 The Montgomery Improvement Association’s (MIA) role was to oversee the continuation and maintenance of the boycott. The organization’s overall mission, extended beyond the boycott campaign, as it sought to â€Å"improve the general status of Montgomery, to improve race relations, and to uplift the general tenor of the community. 1 King was elected president of the assosiation shortly after the formation. Parks recalled: ‘‘The advantage of having Dr. King as president was that he was so new to Montgomery and to civil rights work that he hadn’t been there long enough to make any strong friends or enemies’’ 4 The bus boycott demonstrated the potential for nonviolent mass protest to successfully challenge racial segregation and served as an example for other southern campaigns that followed.In Stride Toward Freedom, King’s 1958 memoir of the boycott, he declared the real meaning of the Montgomery bus boycott to be the power of a growing self-respect to animate the struggle for civil r ights. 4 That evening, at a mass meeting at Holt Street Baptist Church, the MIA voted to continue the boycott. King spoke to several thousand people at the meeting: ‘‘I want it to be known that we’re going to work with grim and bold determination to gain justice on the buses in this city. And we are not wrong. †¦ If we are wrong, the Supreme Court of this nation is wrong.If we are wrong, the Constitution of the United States is wrong. If we are wrong, God Almighty is wrong’’ 5On the 8th of December, After unsuccessful talks with city commissioners and bus company officials the MIA issued a formal list of demands: courteous treatment by bus operators; first-come, first-served seating for all, with blacks seating from the rear and whites from the front; and black bus operators on predominately black routes. The demands were not met, and Montgomery’s black residents stayed off the buses through 1956, despite efforts by city officials and whi te citizens to defeat the boycott. Although Rosa Parks was not the leader of the MIA, or the leader of the boycott, she was a huge influence on the entire revolt. Rosa was a role model to all of African Americans involved in the Boycott; She was subconsciously the leader of the group; whenever people had enough and wanted to quit, they would think of Rosa Parks who put her life on the line to fight for her rights and for the rights of all those around her. This shows her heroicness, and all of the African Americans of Montgomery saw the hero in Rosa, and it gave them the extra push to help pursue her dream. Shortly after beginning the Montgomery Bus Boycott in December 1955, black community leaders began to discuss filing a federal lawsuit to challenge the City of Montgomery and Alabama bus segregation laws. They sought a declaratory judgment that Alabama state statutes and ordinances of the city of Montgomery providing for and enforcing racial segregation on â€Å"privately† operated buses were in violation of Fourteenth Amendment protections for equal treatment. 2 On the 5th of June 1956, the federal district court ruled in Browder v.Gayle that bus segregation was unconstitutional, and in November 1956 the U. S. Supreme Court affirmed Browder v. Gayle and struck down laws which put an end to segregated seating on public buses. The order to desegregate the buses arrived the following month, it stated: 1. Black and white people could sit wherever they wanted to sit. 2. Bus drivers were to respect all riders. 3. Black people were now allowed to apply for driver positions. 2 On the 21st of December 1956 King officially called for the end of the boycott ; the community agreed.The next morning, he boarded an integrated bus with Ralph Abernathy, E. D. Nixon, anz d Glenn Smiley. King said of the bus boycott: ‘‘We came to see that, in the long run, it is more honorable to walk in dignity than ride in humiliation. So †¦ we decided to substitute tired feet for tired souls, and walk the streets of Montgomery’’ 5 King also stated, looking back upon the Boycott: ‘‘the Negro citizen in Montgomery is respected in a way that he never was before’’5 Although MLK emerged the hero, the credit is also merited by others, in particular Rosa Parks. King and Rosa became national ? ures during the boycott, and the MIA’s tactics became a model for the many civil rights protests to follow. Re? ecting on his the experience with MIA, King said: ‘‘I will never forget Montgomery, for how can one forget a group of people who took their passionate yearnings and deep aspirations and ? ltered them into their own souls and fashioned them into a creative protest, which gave meaning to people and gave inspiration to individuals all over the nation and all over the world’’ 3 The desegregation of the bus’s affected everyone’s life’s in Montgomery and gave them hope.Rosa was present throughout the boycott and spread her noble qualities, giving hope and courage, she worked hand in hand with MLK throughout the boycott, but was often in his shadows. Throughout the Boycott, Rosa often appeared on national news, this not only helped to spread her ideas, hope and wisdom to the rest of the world, but it also risked her life even more. National coverage of the boycott and King’s trial resulted in support from people outside Montgomery. In early 1956 veteran pacifists Bayard Rustin and Glenn E.Smiley visited Montgomery and offered King advice on the application of Gandhian techniques and nonviolence to American race relations. Rustin, Ella Baker, and Stanley Levison founded In Friendship to raise funds in the North for southern civil rights efforts, including the bus boycott. King absorbed ideas from these proponents of nonviolent direct action and crafted his own syntheses of Gandhian principles of nonviolence. He said: ‘‘Christ showed us the way, and Gandhi in India showed it could work’’ 7Other followers of Gandhian ideas such as Richard Gregg, William Stuart Nelson, and Homer Jack wrote the MIA offering support.Rosa made her image public which turned even more people against her. Risking her life for the benefit of other is truly heroic qualities hat you cannot find in many. Despite the previous facts proving Rosa Parks to be a hero, many still argue that she is not. It can be said that Rosa Parks had planned her act of Defiance to â€Å"spark† the Montgomery bus boycott. The evidence given to support this idea is: first, parks had long been a member of the local NAACP and had been involved in a case of the very same nature in an incident that happened on March 2, 1955, a full nine months before Mrs.Parks arrest. ; Secondly, she was not the first African American to refuse to give up her seat (there where in fact several examples dating from just a couple years earlier) 8 so why wou ld the NAACP suddenly act upon Rosa? And lastly, the speed in which the boycott was enacted and that the NAACP was ready for court is proof that it was a planned event. The historians who argue this case cause confusion and doubt: she the hero that she has been made out to be? Is the result of her actions any less important if it had been a planned action, instead of the spontaneous decision of one woman â€Å"tired of iving in†? The answer in No, Rosa is know for her spontaneous act of resistance, nevertheless, could this theory be one day proven true, it wouldn’t make any less a hero of her. Proof of her heroicness can be seen through her autobiography My Story was written and published in 1992 by Rosa Parks herself. The book told the story of Rosa's life leading up to the day she got on that bus and decided that she was not giving up her seat. Rosa later published another book called Quiet Strength, which described her faith and how it helped her on her journey thro ugh life.This allowed her to spread her ideas and feelings to people who look up to her. 4 In addition to her book, she has been recognized for many honors and awards:in the late 1900’s, the NAACP awarded Rosa Parks the Spingarn Medal, their highest honor and the Martin Luther King Jr. Award. In September of 1992, she was awarded the Peace Abbey Courage of Conscience award for her years of community service and lifelong commitment to social change through non-violent means and civil rights. In 1996, Rosa Parks was presented, by President Bill Clinton, with the Presidential Medal of Freedom.This is the highest honor that can be bestowed upon a civilian by the United States Government. In 1998, the National Underground Railroad Freedom Center presented Rosa Parks with the International Freedom Conductor Award. In 1999, she was presented with the Congressional Gold Medal, later that year she was awarded the Detroit-Windsor International Freedom Festival Freedom Award. In 1999, T ime Magazine named Rosa Parks as one of the 20 most powerful and influential figures of the century.In 2000, the State of Alabama awarded her the Governor's Medal of Honor for Extraordinary Courage. She also received the Alabama Academy Award the same year. 7 During her lifetime, Rosa Parks was awarded more than two dozen honorary doctorates from universities worldwide. She was also inducted as an honorary member of the Alpha Kappa Alpha Sorority. Rosa Parks, along with Elaine Eason Steel, started the Rosa and Raymond Parks Institute for Self Development in February of 1987. The Institute was developed in honor of Rosa's husband, Raymond Parks who had died in 1977 of cancer. The Institute's main function is to run the â€Å"Pathways to Freedom† bus tours, which take young people around the country to visit historical sites along the Underground Railroad and to important locations of events in Civil Rights history. 7 Three days after her death in October of 2005, The House of Representative and the United States Senate approved a resolution to allow Rosa Parks' body to be viewed in the U. S. Capitol Rotunda. Rosa was the first woman, and the second black person to ever have the honor of lying in state in the Nations capitol.Lastly, On the first anniversary of her death, President George W. Bush ordered a statue of Parks to be placed in the National Statuary Hall in Washington, D. C. When signing this resolution, President Bush stated: â€Å"By placing her statue in the heart of the nation's Capitol, we commemorate her work for a more perfect union, and we commit ourselves to continue to struggle for justice for every American. â€Å"3 Her worldwide recognition for her tremendous impact on the world can be easily seen through just her awards ranging from the late 1900’s to far after her death.Although Rosa is no longer here, her legend will live on forever and since the rest of the civil rights movement stemmed from what became known as the Montg omery Bus Boycott, Rosa Parks is known as the Mother of the Civil Rights Movement. Her act of individual resistance is one of seminal events in the civil rights movement. Parks' made her heroic stand in an atmosphere of lynchings for blacks who stepped out of line, putting her at great risk. Her actions changed the course of history and made her an American icon. ince the rest of the civil rights movement stemmed from what became known as the Montgomery Bus Boycott, Rosa Parks is known as the Mother of the Civil Rights Movement. Works Cted Page Adamson, Lynda G. Notable Women in American History: A Guide to Recommended Biographies and Autobiographies. Westport: Greenwood, 1999. Print. [ ]   Bennett, Lerone Jr. What Barbershop Didn't Tell You about Rosa Parks. Vol. 58. N. p. : Ebony, 2003. Print. [ ]   Chappell, Kevin. Remebering Rosa Parks: The Life and Legacy of ‘The Mother of the Civil Rights Movement' Vol. 61. N. p. : Ebony, 2006.Print. Small, Caroline M. â€Å"Rosa Pa rks. † Guide To Literary Masters ; Their Works (2007): 1. Literary Reference Center. Web. 9 Apr. 2013. [ ]   Ã¢â‚¬Å"The History Lesson from Rosa Parks; A Single Act of Responsibility Changes a Nation's Heart. † The Washington Times [Washington D. C] 31 Oct. 2005: n. pag. Print. â€Å"The Rebellious Life Of Mrs. Rosa Parks. † Booklist 109. 6 (2012): 4. Literary Reference Center. Web. 9 Apr. 2013. [ ]   Holmes, Tamara E. Mother of Civil Rights Hands Down Her Legacy: Rosa Parks Gave Birth to a Movement and Set the Bar for Future Generations. Vol. 36. N. p. Black Enterprise, 2006. Print. Huso, Deborah. Sitting Down to Take a Stand: Rosa Parks' Actions Advanced the Fight for Civil Rights. N. p. : Sucess, 2011. Print. ——————————————– [ 2 ]. 3 The History Lesson [ 4 ]. 1 Adamson, Lynda [ 5 ]. 4 Parks, Rosa [ 7 ]. 5 The Rebelious Life [ 8 ]. 3 The History Lesson [ 9 ]. 6 Huso,Deborah [ 11 ]. 2 Chappell, Kevin [ 12 ]. 5 The Rebellious Life [ 13 ]. 5 [ 14 ]. 3 The History Lesson [ 15 ]. 7 Tamara, Holmes [ 16 ]. 8 Lerone Bennett [ 17 ]. 4 Parks,Rosa [ 18 ]. 7 Tamara, Holmes [ 19 ]. 8 Lerone Bennett [ 21 ]. 3 The History Lesson

Sunday, September 15, 2019

The Pearl Harbor Address to the Nation

When you watch any movie, TV show or documentary on World War Two, there is one quote that you hear in almost every single one of them. This timeless and moving quote is â€Å"a date that will live in infamy. † This was the opening line said by Franklin D Roosevelt in his National address the day after the attack on Pearl Harbor. It is one of the most replayed and well known speeches in American history. It was the declaration of war against the Empire of Japan and entered the United States into one of the greatest wars it would take part in. Franklin D Roosevelt uses pathos, ethos and logos to deliver a resounding speech for the declaration of war and the entrance of the United States in to World War Two. He essentially assigns a third of the speech to each one of these rhetorical speaking tools. The speech was given at 12:30 p. m. on December 8th 1941 to a joint session of congress and was broadcast over radio and television. It was key for the president to get the people as a whole for the war and united for the cause. He wanted to arouse as many strong emotions from the people as possible. Luckily for him this was very easy to accomplish. At every point in history the American people have exploded with outrage at every deceitful military tactic ever used by another nation or people against America. The populace becomes very motivated to take the fight to the enemy to uphold core American values such as patriotism and justice. A prime example of this was the sinking of the U. S. S. Maine. The ship was unexpectedly sunk by Spaniards in the Havana harbor of Cuba. This event is considered the precipitating event of the Spanish-American war. He plays upon the circumstances in the same way that the Americans did with this instance back in 1898. He portrays America as a purely passive victim through his diction in the portion of the speech. FDR mentions multiple times that America and Japan still had ongoing peace talks and that the attack was completely unprovoked. He elegantly uses Pathos at the throughout his speech and really harps on Americas emotions about the event. After Franklin D Roosevelt talks about the surprise attack upon Pearl harbor, he goes on to list all of the other military advances Japan made shortly afterwards. This list of attacks is viewed as him trying to convince the American people why it is logical and necessary for their country to go to war with this aggressive nation. He lists islands all across the pacific and under American control. Each statement is staccato and kept to the point, followed a pause to let each one individually sink in. He says when each attack happened and where. This is a particularly ominous portion of the speech, and was expertly done by the president. Logical explanations are very important to the American people and are the primary basis of why we do what we do. In the last part of the speech Franklin D Roosevelt makes an effort to talk about the character of the American people. Our countries ethics and moral values are the staple of our nation and the reason our people are willing to do everything necessary to preserve and protect it. This acknowledgment of the American ethos is a testament to the greatness of this country and why the war must be fought and will be won. But the biggest portrayal of this ethics and patriotism shown by Roosevelt is unbeknownst to most Americans at this time. The president had polio early in his life, and was paralyzed from the waist down, but he refused to let the American people know this. When he gave the speech he walked up to the podium and stood tall. This is a perfect example of the determination of the American heart to never let bad circumstances stop someone from what they must do. I consider this one of the most important and powerful speeches ever given on American soil. It speaks to every true Americans heart through patriotism and moral fiber. Franklin D Roosevelt delivered the speech fantastically and ignited a war engine within the United States that was unparalleled at the time. This speech is still a powerful symbol today of a great and shaping time of our country and its people.

Saturday, September 14, 2019

Confirmation: Early Christian Community Essay

For people in the Early Christian Community who wanted to commit themselves as followers of Christ they first needed to receive the sacraments of initiation. Initiation into the Church took place in a single ceremony, which normally unfolded during the Easter Vigil service. In the early church, the three Sacraments of initiation—Baptism, Confirmation, and Eucharist—were celebrated in the same ceremony by adult converts. Although there was no clear emergence of Confirmation as a separate sacrament until after the third century, the elements of the Sacrament of Confirmation can be recognized in the Sacrament of Baptism in the early writing of the bible. After a long period of instruction that sometimes lasted as long as three years, each person was baptized, confirmed and also received the Eucharist. They were then brought before the Bishop where he laid his hands on each of their heads and prayed that they might receive the gift of the Holy Spirit and become responsible Christians living through Christ to fulfill his life long mission. At some point in the early Christian Community, the sacraments of initiation, baptism and confirmation, became primarily a sacrament for infants. Their baptism would allow them to become a member of the church and then confirmation would happen right after this, which was when the bishop would confirm or acknowledge this commitment. Eventually, however in the early 1900’s confirmation became a sacrament associated not with infants but with older youths. Where each child can consciously make the decision to strengthen the bond with god and accept the reasonability to the church and to others as well.

Friday, September 13, 2019

Native son Research Paper Example | Topics and Well Written Essays - 1500 words

Native son - Research Paper Example In a time where racial discrimination was rampant, and the whites were the rich and the blacks poor in the social classification, a time where interracial dating was looked upon as impossible, a time when violence was rampant, a time when there were many uneducated black people, the story hence narrates the story of Bigger, a boy who grew up in this situation and shaped to become whom he turned to later (Sharma 89). The American culture shapes Bigger to become a vicious thief and murderer, fighting the authority, opposing white rule, and hating the whites for whom he becomes. In this essay, we shall be analyzing the theme of racial discrimination, social stratification and violence in relation to the character of Bigger and how they influenced his life events. Bigger’ character is as a result of racial discrimination that has been in existent in the American culture. Bigger believes that he is where he is because of the oppressive force placed on his by the white people. He fears and yet hates the white people as they control, how blacks move, live, interact and work in the society. Full of hatred, Bigger does not want in the first place to work for Mr. Dalton because he is white. He prefers to work with his fellow black people to steal from other black citizens. Bigger is intimidated by seeing white people, though he had never stolen from them because of the fear he had. According to Bloom (23) he describes Richard to have used Bigger to bring out the issue of racism just like it exists in American culture. Racism is rampant to a point where the children born from the white and black race, know it exists, and do everything possible to avoid being caught in between. Bigger has never had a white girlfriend all his life, and is shock ed when he sees other black activists, Jan, dating Mary, Mr. Dalton’s daughter. Racial relationship is something which is not accepted by the society in America based on the hatred between