Tuesday, November 26, 2019

Free Essays on Mythology Short Story

For ages man has looked up at the Moon with wonder in his mind. Why does the Moon exist? Why hasn’t the Moon come crashing into the Earth and destroyed us all? While these questions have been answered by modern ideals and science, I will tell you the real reason the Moon exists. Long ago when the world was just spec of dust in the universe, and life had not found its way to the planet, a great struggle occurred between the two most powerful gods, Sunubious and his smaller brother Moonous. Sunubious was the creator of the world, and between the two of the planned to rule over all life for all time. Sunubious had started the creation by creating powerful immortals to form the Earth. He shot down powerful flames of all colors to help him make the Earth. These colors turned into several lesser gods. The blue flame was responsible for creating great oceans, seas, lakes, rivers, ponds and all the life that would reside in them. The red flame had to create the rock and lava that made up the surface of the Earth. Next, he sent down the green flame or Natures flame. She began to make trees and other vegetation grow from the earth. She also formed all the different landscapes that make the different ecosystems on the earth. Sunubious had ordered her to make t he entire world the same, but she openly defied the great god. Before Sunubious could send down the white flame, the flame of creation, he had to decide where to create life. His original plan was to have all kinds of life all over the world, but since natures flame had defied him, he was stuck in an awkward position. He consulted his younger brother Moonous, who had not grown his mighty flames and was thus still a young god. Moonous was very clever and not the most trustworthy of siblings. When Sunubious asked for his help he quickly agreed. Moonous told Sunubious that life could be created anywhere, since he was such a powerful god any life he creates will be able to ... Free Essays on Mythology Short Story Free Essays on Mythology Short Story For ages man has looked up at the Moon with wonder in his mind. Why does the Moon exist? Why hasn’t the Moon come crashing into the Earth and destroyed us all? While these questions have been answered by modern ideals and science, I will tell you the real reason the Moon exists. Long ago when the world was just spec of dust in the universe, and life had not found its way to the planet, a great struggle occurred between the two most powerful gods, Sunubious and his smaller brother Moonous. Sunubious was the creator of the world, and between the two of the planned to rule over all life for all time. Sunubious had started the creation by creating powerful immortals to form the Earth. He shot down powerful flames of all colors to help him make the Earth. These colors turned into several lesser gods. The blue flame was responsible for creating great oceans, seas, lakes, rivers, ponds and all the life that would reside in them. The red flame had to create the rock and lava that made up the surface of the Earth. Next, he sent down the green flame or Natures flame. She began to make trees and other vegetation grow from the earth. She also formed all the different landscapes that make the different ecosystems on the earth. Sunubious had ordered her to make t he entire world the same, but she openly defied the great god. Before Sunubious could send down the white flame, the flame of creation, he had to decide where to create life. His original plan was to have all kinds of life all over the world, but since natures flame had defied him, he was stuck in an awkward position. He consulted his younger brother Moonous, who had not grown his mighty flames and was thus still a young god. Moonous was very clever and not the most trustworthy of siblings. When Sunubious asked for his help he quickly agreed. Moonous told Sunubious that life could be created anywhere, since he was such a powerful god any life he creates will be able to ...

Saturday, November 23, 2019

Federalism and How it Works

Federalism and How it Works Federalism is the process by which two or more governments share powers over the same geographic area. In the United States, the Constitution grants certain powers to both the U.S. government and the state governments. These powers are granted by the Tenth Amendment, which states, â€Å"The powers not delegated to the United States by the Constitution, nor prohibited by it to the States, are reserved to the States respectively, or to the people.† Those simple 28 words establish three categories of powers which represent the essence of American federalism: Expressed or â€Å"Enumerated† Powers: Powers granted to the U.S. Congress mainly under Article I, Section 8 of the US Constitution.Reserved Powers: Powers not granted to the federal government in the Constitution and thus reserved to the states.Concurrent Powers: Powers shared by the federal government and the states. For example, Article I, Section 8 of the Constitution  grants the U.S. Congress certain exclusive powers such as coining money, regulating interstate trade and commerce, declaring war, raising an army and navy and to establish laws of immigration. Under the 10th Amendment, powers not specifically listed in the Constitution, like requiring drivers licenses and collecting property taxes, are among the many powers reserved to the states. The line between the powers of the U.S. government and those of the states is usually clear. Sometimes, it is not. Whenever a state governments exercise of power might be in conflict with the Constitution, we end up with a battle of â€Å"states rights† which must often be settled by the Supreme Court. When  there is a conflict between a state and a similar federal law, the federal law and powers supersede state laws and powers. Probably the greatest battle over states rights- segregation- took place during the 1960s civil rights struggle. Segregation: The Supreme Battle for State's Rights In 1954, the Supreme Court in its landmark Brown v. Board of Education decision ruled that separate school facilities based on race are inherently unequal and thus in violation of the 14th Amendment which states, in part: No state shall make or enforce any law which shall abridge the privileges or immunities of citizens of the United States; nor shall any state deprive any person of life, liberty, or property, without due process of law; nor deny to any person within its jurisdiction the equal protection of the laws. However, several predominately Southern states chose to ignore the Supreme Court’s decision and continued the practice of racial segregation in schools and other public facilities. The states based their stance on the 1896 Supreme Court ruling in Plessy v. Ferguson. In this historic case, the Supreme Court, with only one dissenting vote, ruled racial segregation was not in violation of the 14th Amendment if the separate facilities were substantially equal. In June of 1963, Alabama Governor George Wallace stood in front of the doors of the University of Alabama preventing black students from entering and challenging the federal government to intervene. Later the same day, Wallace gave in to demands by Asst. Attorney Gen. Nicholas Katzenbach and the Alabama National Guard allowing black students Vivian Malone and Jimmy Hood to register. During the rest of 1963, federal courts ordered the integration of black students into public schools throughout the South. In spite of the court orders, and with only 2 percent of Southern black children attending formerly all-white schools, the Civil Rights Act of 1964 authorizing the U.S. Justice Department to initiate school desegregation suits was signed into law by President Lyndon Johnson. A less momentous, but perhaps more illustrative case of a constitutional battle of states rights went before the Supreme Court in November 1999, when the Attorney General of the United States Reno took on the Attorney General of South Carolina Condon. Reno v. Condon - November 1999 The Founding Fathers can certainly be forgiven for forgetting to mention motor vehicles in the Constitution, but by doing so, they granted the power to require and issue drivers licenses to the states under the Tenth Amendment. That much is clear and not at all disputed, but all powers have limits. State departments of motor vehicles (DMV) typically require applicants for drivers licenses to provide personal information including name, address, telephone number, vehicle description, Social Security number, medical information, and a photograph. After learning that many state DMVs were selling this information to individuals and businesses, the U.S. Congress enacted the Drivers Privacy Protection Act of 1994 (DPPA), establishing a regulatory system restricting the states ability to disclose a drivers personal information without the drivers consent. In conflict with the DPPA, South Carolina laws allowed the States DMV to sell this personal information. South Carolinas Attorney General Condon filed a suit claiming that the DPPA violated the Tenth and Eleventh Amendments to the U.S. Constitution. The District Court ruled in favor of South Carolina, declaring the DPPA incompatible with the principles of federalism inherent in the Constitutions division of power between the States and the Federal Government. The District Courts action essentially blocked the U.S. government’s power to enforce the DPPA in South Carolina. This ruling was further upheld by the Fourth District Court of Appeals. United States Attorney General Reno appealed the District Courts decisions to the Supreme Court. On Jan. 12, 2000, the U.S. Supreme Court, in the case of Reno v. Condon, ruled that the DPPA did not violate the Constitution due to the U.S. Congress power to regulate interstate commerce granted to it by Article I, Section 8, clause 3 of the Constitution. According to the Supreme Court, The motor vehicle information which the States have historically sold is used by insurers, manufacturers, direct marketers, and others engaged in interstate commerce to contact drivers with customized solicitations. The information is also used in the stream of interstate commerce by various public and private entities for matters related to interstate motoring. Because drivers personal, identifying information is, in this context, an article of commerce, its sale or release into the interstate stream of business is sufficient to support congressional regulation. So, the Supreme Court upheld the Drivers Privacy Protection Act of 1994, and the States cannot sell our personal drivers license personal information without our permission, which is a good thing. On the other hand, the revenue from those lost sales must be made up in taxes, which is not such a good thing. But, thats how federalism works.

Thursday, November 21, 2019

Ethics of Online Learning with Pros & Cons Research Paper

Ethics of Online Learning with Pros & Cons - Research Paper Example Online education refers to a system of education whereby the learner is autonomous in learning and is separated from the instructor by time and space. The history of online education stems from the growth of modern communication technologies such as the internet that have enabled the students to learn at their pace (Bill & Mary, 2007, p 122). The topic is important since online education presents certain ethical challenges that may hinder the quality of education. The topic is essential in my career as a mathematics teacher since students expect educational content that will enable them meet their learning objectives (Bill & Mary, 2007, p126). In addition, learners need more explanation on complex mathematical models and techniques in order to effectively solve mathematical problems (Browne, 2010, p 247). Accordingly, skills in mathematics improve the cognitive and analytical capabilities of the learner thus leading to succeed in the workplace. The topic interests me because numerous multinational companies have complained about the low analytical and mathematical skills of graduates in the labor market. Accordingly, the education policies must promote equity of access, quality and diversity of choice of the mode of study (Bill & Mary, 2007, p 135). ... It is also referred as e-learning, web-based learning and computer-based learning due to the use of web technologies and computing in delivering knowledge and skills to the learners (Smith, 1996, p 25). It entails the use of telecommunication technology and computing in delivering and receiving of the course content materials. This type of education relies on videoconferencing and internet in ensuring that students receive the digital content (Browne, 2010, p 250). Course materials can be provided through different online medium such as e-mails, bulletin, online videos, discussion forums and chat rooms. Online learning can take place in the workplace, home, online access points or at a public library. For the past few years, the number of online learners has grown substantially that traditional higher education enrollment due to the high internet access and flexibility of online learning. Since 2003, online enrollments have grown by more than 400 percent. According to latest statisti cs, about 6.7 million students are enrolled to a least one online course in the United States. About 32 percent of the US higher education students have participated in online education while 65 percent of the higher education institutions have implemented online learning programs (Browne, 2010, p 257). Accordingly, the 21 percent annual growth in online learning enrollments has by far exceed the just 2 percent growth in traditional classroom enrollments in higher education (Haughey, 2007, p 141). About two-thirds of higher education institutions regard online learning as part of their long-term strategy in increasing the access, flexibility and quality of education. Despite the ethical challenges, about 70 percent of the educators rate online education outcomes either

Tuesday, November 19, 2019

Education Children Services Analysis Essay Example | Topics and Well Written Essays - 2250 words

Education Children Services Analysis - Essay Example A constructive campaigner is able to work together with parents because of the understanding that working with parents gives them more voice over the progress of the children and great influence when dealing with professionals (Foley and Leverett 2008). Active involvement of children in decision making Having the right knowledge among children is a contested are and with the recognition of the law, values and policies in shaping the activities done by practitioners, they are required to have ethical responsibility during the decision making in order to intervene in the lives of children. Approaches to decision making that is transparent, based on a careful consideration and accountable considers compelling evidence on the effects of interventions on various groups, communities and welfare individuals (Stanier 2009). Training of practitioners on matters related to safeguarding of children makes them be aware of the procedures and responsibilities, and what works well in protecting chi ld environment and during the assessment and intervention of family lives. One of the instances was that of Macdonald that reviewed evidence of the consequences of child abuse where interventions were successful at a broader primary prevention and a secondary and tertiary work. Knowing involves the application of rigorous approach to research evidence and this involves systematic review of the research evidence while having an explicit methodology and placing weight on the research outcome studies. Potential limitations to, or tensions within, children’s ability to shape services Rixon (2008) states that there is a lot of focus that has been put on evidence-based practice which has been criticized as an overemphasis on positive approaches... Having the right knowledge among children is a contested are and with the recognition of the law, values and policies in shaping the activities done by practitioners, they are required to have ethical responsibility. Approaches to decision making that is transparent, based on a careful consideration and accountable considers compelling evidence on the effects of interventions on various groups, communities and welfare individuals (Stanier 2009). Training of practitioners on matters related to safeguarding of children makes them be aware of the procedures and responsibilities, and what works well in protecting child environment and during the assessment and intervention of family lives. One of the instances was that of Macdonald that reviewed evidence of the consequences of child abuse where interventions were successful at a broader primary prevention and a secondary and tertiary work. Knowing involves the application of rigorous approach to research evidence and this involves system atic review of the research evidence while having an explicit methodology and placing weight on the research outcome studies. Rixon (2008) states that there is a lot of focus that has been put on evidence-based practice which has been criticized as an overemphasis on positive approaches above other knowledge types and it is able to minimize complexities that may occur with family engagement. There are evidence from different countries and settings which make it difficult to apply to new contexts

Sunday, November 17, 2019

Wireless devices without Wi-Fi Essay Example for Free

Wireless devices without Wi-Fi Essay 3.1.1 What would happen if wireless devices were not governed by the Wi-Fi Alliance and each vendor had its own standards and protocols? What impact would this have on your personal life or business communications? Personal information and business will slow down due to each vendor having its own standards/protocols. It will also be more vulnerable to attacks and make accessing more difficult. 3.1.2 Give another example of a model that is used to visualize something that is difficult to observe or perceive. How does the model make it easier to understand? Another way of displaying information for easier understanding is to use a flow chart. A flow chart can be used as a step by step guide. 3.1.3 Based on what you already know about networks, what are the different layers you think would be necessary for communication to be mapped to a model? Consider direct connections between host devices and connections that require other routing equipment, such as a hub, switch, or router. 1. Data link 2. Physical 3. Application 4. Network 5. Transport 3.1.4 The granularity of the reference model will often determine the usefulness of the model. What will happen if a model is too general? What will happen if a model is too granular (focused on individual detail)? If the data is too detailed, it may overlap with other information. However if the data is too general, then there may be crucial information missing. 3.1 Review 1. Why would a three-layer model of communication that has the layers  physical, network, and application be insufficient to adequately describe network communication? The model would be insufficient because it would not have the ability to transport data to any other network. 2. What is the history of the OSI reference model? How did it come about and why was it created? Use your textbook and internet research to support your answer. OSI was created in the late 1970s. It was created to define a unifying standard of architecture for networking systems. OSI was meant to be the foundation for what would later be known as the internet but when comparing to TCP/IP protocols, OSI just wasn’t enough to support the rapid growth of the internet. Now, the OSI model is used to explain networking in general terms. OSI is still used today by software/hardware designers to clarify roles in a networking system. 3. What is the history of TCP/IP model? Why was it created? Use your textbook and internet research to support your answer. TCP/IP was developed in the early 1970s, originally as part of a research network the United States Defense Advanced Research Projects Agency (ARPA) developed. However, due to the TCP/IP protocols limitations and flaws, ARPA developed a new network. In the mid-1970s, it was found that TCP was attempting to do too much. This is when they decided to split TCP and IP into two separate layers. In the 1980s, TCP/IP was used to run ARPAnet and also started to expand to other machines and networks, completely evolving ARPAnet. This is how the internet was born. 3.2.1 Using Figure 3-1, define each layer of the OSI model in your own words and state what each layer provides. Use your textbook or internet research to support your answer. Application – Quality of service is established, communication partners are identifies, user authentication and privacy is considered and established. Presentation – Changes data into a form that the application can accept. Session – Manages and terminates connections between applications. Transport – Transfers data between systems, maintains flow control and recovery. Network – Provides switches and routing technologies and creating logical paths. Data link – Data packet is encoded Physical – provides the hardware necessary for sending and receiving data, bit stream 3.2.2 Using Figure 3-2 as a basis, complete the diagram to show the intermediate  encapsulation provided by each layer. Use your textbook and internet research to support your answer. Transport – Segments Network – Packets Data link – Frame 3.2.3 Briefly explain the de-encapsulation steps in the communication of host B receiving a message and host A destined for an active application. Host A will use application for the OS while allowing the PC to still communicate to other devices. Transport will control the data sent and received. The network will place IP addresses to the packets allowing data to be added to the MAC addresses and physical link between host and lines. Exercise 3.2.4 Explain why routing devices do not need the upper layer of the OSI model to route traffic. What is the highest layer of the OSI model used by the router to decide where to forward traffic? The first three layers of the OSI is typically what a router needs to route traffic. The first three layer are physical, data link and network. The highest level the OSI decide where to forward traffic to is the transport layer which is located in the host layers. Lab 3.2 Review 1. How does the abstraction of the physical layer facilitate interoperability across networks using different types of physical wires? IP terminals might be located in different parts of the build making it complex. There are lines coming in and out of the build that might be different than that issued to a company. To try and replace one will be complex, confusing and time consuming if unsure. 2. The OSI model is not directly implemented in networking and often the distinction between the layers will blur in implementation. Why does it endure despite these issues? Use your textbook and internet research to justify your answer. Technicians still use the OSI model because it gives a step by step guide on  how the information is being transported and makes troubleshooting more precise. 3. Given the purpose of each, is it necessary to retain the top three layers of the OSI model as separate entities? Use your textbook and internet research to justify your answer. It is not necessary to keep the top three layers of the OSI model when TCP/IP combines the top three layers of OSI into one layer that ultimately does the same functions. Exercise 3.3.1 Using your textbook and internet research, create a mapping between the TCP/IP model and the OSI reference model. What are the distinct differences between them? One major difference between OSI and TCP/IP is the first three layers of OSI are combined into a single layer in TCP/IP known as the Application Layer. The other difference is the last two layers, Data link and Physical layer are combined into one layer known as Network Access or Link Layer. Exercise 3.3.2 Identify the layer in which each protocol resides according to the TCP/IP model. OSI # OSI Layer Name TCP/IP # TCP/IP Layer Name Encapsulation Units TCP/IP Protocols 7 Application 4 Application Data FTP, HTTP, POP3, IMAP, telnet, SMTP, DNS, TFTP 6 Presentation 5 Session 4 Transport 3 Transport Segments TCP, UDP 3 Network 2 Internet Packets IP 2 Data Link 1 Network Access Frames 1 Physical Bits Exercise 3.3.3 The most common protocols used from this suite are IP, TCP, and UDP. Briefly describe the purpose and function of each of these. Use your textbook and internet research to support your answer. UDP – User datagram protocol – this is a connectionless service the gives best-effort delivery but does not guarantee delivery. This is often used for point-to-point and point-to-multipoint communications such as video conference applications. IP – Internet protocol – Primarily a communications protocol within the internet protocol suite that relays datagrams across network boundaries. Ultimately it establishes the Internet. Delivers packets from the source host to destination hosts based on IP address in the packet header. TCP – Transmission Control Protocol – Core protocol of IP. Known for its reliability and error checking delivery between programs running on computers connected by common networks. Sends data in the form of message units between comp uters using the internet. Lab 3.3 Review 1. UDP is a connectionless protocol, unlike TCP, so there is no feedback on whether a packet was received. When would this type of protocol be used and what is the benefit of using it? Use your textbook and internet research to draw your conclusions. UDP is ideal for when you are managing a large amount of information and you don’t want to use TCP because the operating system won’t be able to support that many sessions at one time. This does not happen frequently as TCP has become more reliable but it still is one example of why you’d rather use UDP. UDP can also get a quick response from another server more quickly. However UDP has been viewed as unreliable because there is no feedback and information can get lost. 2. HTTP is the common protocol used to retrieve web resources in a web browser. This runs over TCP/IP networks using TCP. What characteristics of TCP make its use in this situation desirable? Use your textbook and internet  research to draw your conclusion. The feedback feature in TCP is ideal because you are guaranteed that messages will be sent and received successfully. One common application that is a prime example of TCP and its success is through e-mail. Exercise 3.4.1 The data link layer introduces physical addressing in the form of Media Access Control (MAC) addresses. Each frame header is Ethernet, for example, will contain a source and destination MAC address. Why is this sufficient to route traffic locally without invoking the higher-level logical addressing? Use your textbook and internet research to guide your conclusion. MAC addresses are sufficient enough to route traffic to other networks because the frame header of MAC addresses contains all that is required without having to access higher level logical addresses. Exercise 3.4.2 Choose one of the captured packets. Click the + sign next to the Ethernet entry. This should give you the data link layer information for the frame, including the source and destination MAC addresses. Record the frame number and the source and destination MAC addresses identified by the data link layer heading. You can identify a MAC address by its format; for example, 00: 26: 62: 65: 81: 07 00:26:62:65:81:07 is a MAC address. These are commonly written in hexadecimal shorthand. Exercise 3.4.3 Open a web browser and navigate to a site that you use frequently (or visit www.pearson.com) while the packet capture is active. This will record the individual frames involved in resolving the website and delivering its content to your PC. When you view this traffic in the life packet capture, what protocols do you see invoked? You can find these under the Protocol heading for each frame. Exercise 3.4.4 and Exercise 3.4.5 cannot do because student doesn’t have access to data link layer connection (Omnipeek). Lab 3.4 Review 1. Wireshark give you the ability to save captured traffic. This can be a  great benefit to network administrators, but it can also pose a security risk. What kind of security risks does this present? Use your textbook and internet research to support your conclusion. There are a few risks associated with Wireshark. There is a possibility of a back-door hack, and the security configuration of Wireshark enables it to run in the background after exiting. While running in the background, one can access your routing information, IP addresses, passwords and usernames. 2. The frame encapsulates all other information from the higher layers of the network communication. What kind of information on the network layer encapsulation is available in Wireshark? Using Wireshark, you can track Wi-Fi access, IP addresses, network routings and encrypted packets.

Thursday, November 14, 2019

Sylvia Plaths Poetry Essay -- Sylvia Plath Poem Essays

Sylvia Plath's Poetry Wrapped in gaseous mystique, Sylvia Plath’s poetry has haunted enthusiastic readers since immediately after her death in February, 1963. Like her eyes, her words are sharp, apt tools which brand her message on the brains and hearts of her readers. With each reading, she initiates them forever into the shrouded, vestal clan of her own mind. How is the reader to interpret those singeing, singing words? Her work may be read as a lone monument, with no ties to the world she left behind. But in doing so, the reader merely grazes the surface of her rich poetics. Her poetry is largely autobiographical, particularly Ariel and The Bell Jar, and it is from this frame of mind that the reader interprets the work as a complex, crushing, confessional web that most truly describes the mythic Sylvia Plath. Her two most significant volumes of poetry, The Colossus and Ariel, flesh out her poetic lexicon: wading through the deep, patterned labyrinth of her poetry with her life as a guide. Title piece to her first collection of poems, â€Å"The Colossus† is a daughter’s attempt to reconstruct her dead father in the fallen statue at Rhodes: â€Å"†¦his death nine days after her eighth birthday left an imprint upon her imagination that time did not erase or soften† (Butscher 3). Because Plath never really knew her father as a healthy man (Stevenson 12), she likens him to this decrepit stone which, as an archaeologist, she must piece together â€Å"with gluepots and pails / of lysol† (Plath C. 20). In reality, she must function as an emotional archaeologist in order to reconcile her loss, to revenge herself on her father for leaving her. She attempts, continually, to prove herself to him; as a child she continually showcased her artis... ...Colossus. 1998. New York: Vintage International; New York: Alfred Knopf, Inc., 1962. Rosenblatt, Jon. Sylvia Plath: The Poetry of Initiation. Chapel Hill: The University of North Carolina Press, 1979. Stevenson, Anne. Bitter Fame. Boston: Houghton Mifflin Co., 1989. Van Dyne, Susan R. Revising Life: Sylvia Plath’s Ariel Poems. Chapel Hill: The University of North Carolina Press, 1993. â€Å"Fueling the Phoenix Fire: The Manuscripts of Sylvia Plath’s ‘Lady Lazarus’† . Sylvia Plath. Ed. Harold Bloom. Philadelphia: Chelsea House Publishers, 1989. 133-147. Works Consulted Broe, Mary Lynn. Protean Poetic: The Poetry of Sylvia Plath. Colombia: University of Missouri Press, 1980. Plath, Sylvia. The Journals of Sylvia Plath. New York: Anchor Books, 1998. Strangeways, Al. Sylvia Plath: The Shaping of Shadows. Cranbury: Associated University Presses, 1998.

Tuesday, November 12, 2019

John Locke and the Un-Equal Distribution of Wealth Essay

It is stated by John Locke that in the state of nature no man may take more then he can consume. â€Å"? make use of any advantage of life before it spoils? whatever is beyond this is more than his share and belongs to others. Nothing was made by God for man to spoil or destroy. (Locke 14)† Locke then goes on to say, â€Å"God gave the world to man ? for their benefit and the greatest conveniences of life they were capable to draw from it, it cannot be supposed he meant it should always remain common and uncultivated. He gave it to the use of the industrious and rational- and labor was to be his title? (Lock 15)† Both of statements can stand alone, each could be argued. For starters, it is not only selfish to take more then you ever will be able to use, it is just stupid, and if you make it with your sweat, why shouldn’t it be yours to keep or profit from. The only problem is, that one of these statements is the head of a starving serpent, and the other its delicious tale. It is hard to believe the head could stay alive without devouring the tale. We should start this argument at the head and work our way down. If John Locke were alive today he would be a lawyer. Not just any lawyer though, a big business lawyer working for a company like Enron. He would try to justify the destruction caused by overly rich, overly powerful people, with statements such as ones that will follow. When first reading Locke you might think, † Hey, this guy sounds like a lawyer. † but soon you would realize, lawyers sound like this guy. Because anyone claiming God is a capitalist with a straight face has to be a bit slippery. Which brings us to the head of the serpent. In Locke’s opinion the idea of fair unequal distribution of wealth came about with the creation of money. Before money, things could not be saved fairly. Over stocking by some would lead to spoilage, and leave others with nothing. Once money was introduced though, this allowed the accumulation of wealth, without waste, so Locke says â€Å"? thus came in the use of money- some lasting thing that men might keep without spoiling, and that by mutual consent men would take in exchange for the truly useful but perishable supports of life. (Locke 20). † Now one man could have, † ? a disproportionate and unequal possession of the earth? (And) ? fairly possess more land than he himself can use the product of? (Locke 22)†. The word â€Å"fairly† in that last statement should jump off the page. When speaking on the state of nature Locke’s main concern is spoilage or waste of commodities, but with the introduction of money he sees this problem solved. When in fact a floodgate for spoilage and waste is opened. Today the market is flooded with products, and products supposed to be better then the other product, the leading brand, and the other leading brand. Combine this with the introduction of digital property such as television and the Internet, all other forms of mass media marketing, and we have a whole new concept of hoarding and spoilage. Today we have companies taking up more then their â€Å"fair† share of the world, and practically forcing their goods down our throats. It’s not that we need or actually think Doritos are the best. It is just the fact that they are practically spilling off the shelves of every single store across the globe, and if they were actually made from biodegradable ingredients, they would spoil by the boatload. Just because these companies’ do not let the products go to waste in their possession, does not mean that they are not fully aware that a large portion of everything produce will end up in the garbage. Then we have to think of the environment, Martha Stewart, and wars over oil. Is it not waste and spoilage when a one hundred pound woman drives her six-ton S.U. V to K-Mart for yet another useless ceramic kitten, while someone’s family member is pumped full of shrapnel while trying to secure her next tank full over seas? All the while burning enough fuel to heat a small home, as she passes by a man without one. The God sent industrious producers of this vehicle is to blame. They know what is at stake, and what is to gain. But more importantly, they know what to waste and just how to waste it. How could they be wrong, â€Å"He gave it to the use of the industrious and rational? â€Å"? Didn’t He?

Saturday, November 9, 2019

Meaning to Your Name…Hehehe

What does the name â€Å"Magdeline† mean? A name is much more than just a name! M is for  musical, your hidden talent! A is for  absolute, for you know your mind. G is for  goal, your eye on the future. D is for  dazzle, the sparkle of you. E is for  excellence, your passion, your drive. L is for  luxury, the luxury of your smile. I is for  intense, your zest of living. N is for  neatness, your orderly way. E is for  exquisite, who could argue? What does the name â€Å"Gladys† mean? A name is much more than just a name! G is for  genial, a pleasing personality. L is for  luxury, the luxury of your smile.A is for  accomplished, in all that you do. D is for  dashing, the romantic you! Y is for  yearn, your innermost desires. S is for  sensible, the practical side What does the name â€Å"Magdeline† mean? A name is much more than just a name! (1991/11/20) M is for  munificent, for you are extremely liberal in giving. A is for  able, for you surely are. G is for  glitter, the spark that is you. D is for  dependable, on you I can rely. E is for  easy going, no ruffles here. L is for  lucky, who is more? I is for  impress, for impress you will. N is for  name, a pleasant one indeed. E is for  enchant, for enchant you will.What does the name â€Å"Catherine† mean? A name is much more than just a name! C is for  casual, no pretension here. A is for  affirm, the certainty of knowledge. T is for  treasure, that of your friendship. H is for  heavenly, your spirit is strong. E is for  elate, you make others happy. R is for  refreshing, the sparkling you. I is for  inspire, others seek your guidance. N is for  noble, your regal bearing. E is for  expressive, not one to hold within. The name  Ã¢â‚¬Å"Catherine†Ã‚  is of Greek origin and it means  Ã¢â‚¬Å"Pure†. It’s a name commonly given to girls. What does the name â€Å"Cletuse† mean?A name is much more than just a name! C is for  confident, no doubts here! L is for  look, the way you look at life. E is for  excellence, your passion, your drive. T is for  treasure, of your friendship. U is for  upstanding, your inner-self. S is for  select, as few are chosen. E is for  elegant, born within you. What does the name â€Å"Alphoncina† mean? A name is much more than just a name! Ais for  accomplished, in all that you do. Lis for  laughter, you spread wherever you go. Pis for  passion, your fire! His for  hope, the encouragement you give. Ois for  outlook, pleasing to all. Nis for  nice, need I say more?Cis for  cuddle, those intimate moments you cherish. Iis for  impress, for impress you will. Nis for  nice, need I say more? Ais for  affirm, the certainty of knowledge. What does the name â€Å"Rethabile† mean? A name is much more than just a name! Ris for  realist, the way you are. Eis for  enjoy, your life can be fun! Tis for  trie d, tried and true you. His for  honor, your most valuable possession. Ais for  abundant, your cheer knows no bounds. Bis for  beloved, as you are to many. Iis for  instill, the lesson of life. Lis for  luxury, the luxury of your smile. Eis for  expressive, not one to hold within.

Thursday, November 7, 2019

How to Reference an Ebook †Chicago Style

How to Reference an Ebook – Chicago Style How to Reference an Ebook – Chicago Style The Chicago Manual of Style is used in various academic fields and sets out a system for citing sources. And when writing a paper with Chicago style citations, you may need to know how to cite an ebook. Footnotes or Author-Date Citations? The Chicago system is unusual in that it permits two types of referencing, covering both â€Å"notes and bibliography† and â€Å"author-date† styles. Remember to check your institution’s style guide for advice about which to use. Well look at both styles in the rest of this post. Ebook Citations: Notes and Bibliography â€Å"Notes and bibliography† citations are most common in the humanities. The basic format uses superscript numbers in the text to indicate a footnote, in which you provide the relevant information for the source you’re citing. For an ebook, this includes either the format or URL where it can be found: n. Author Name, Title (City of Publication: Publisher, Year), Format/URL. For example, the first citation of an ebook for Kindle would appear as: 1. Michelle Bookman, How to Write Ebooks (New York: PMP Publications, 2015), Kindle edition. Subsequent references to the same source can then be shortened to just the author surname and title: 1. Michelle Bookman. How to Write Ebooks (New York: PMP Publications, 2015), Kindle edition. 2. Bookman, How to Write Ebooks. If you’re quoting a source, remember to provide the relevant page numbers in your footnote. If no page numbers are available, use a section, chapter or paragraph number instead: 3. Bookman, How to Write Ebooks, 75. 4. Bookman, How to Write Ebooks, chap. 2, para. 13. Every cited source cited must be added tot he bibliography. The information to provide for an ebook is similar to the first footnote, but the punctuation is a little different and the authors names are reversed: Author Surname, First Name. Title. City of Publication: Publisher, Year. Format/URL. For the example above, the bibliography entry would be: Bookman, Michelle. How to Write Ebooks. New York: PMP Publications, 2015, Kindle edition. Ebook Citations: Author-Date Style The â€Å"author-date† format is more common in the sciences. When referencing an ebook, in-text citations should include the author surname and year of publication in parentheses: Writing ebooks is simple (Bookman 2015). If you’re quoting the source, citations need page numbers, too (either in the main citation or after the quoted passage if author is named in the text): Writing an ebook will be â€Å"simple† (Bookman 2015, 7). According to Bookman (2015) ebooks are â€Å"easy to write† (7). You then give full information in a reference list using the following format: Author Surname, First Name. Year of Publication. Title. City of Publication: Publisher. Format/URL. For example, we could list an ebook as follows: Bookman, Michelle. 2015. How to Write Ebooks. New York: Penguin Classics. Kindle edition.

Tuesday, November 5, 2019

13 Electric Vehicle Conversion Companies

13 Electric Vehicle Conversion Companies Fuel is expensive, but one way to eliminate stops at the pricey pump is to go electric. An electric vehicle (EV) conversion is a procedure that involves modifying a petroleum fuel-powered vehicle into an all-electric vehicle. If your commuting needs and lifestyle are such that you can go electric with one or more of your vehicles, here’s a list of companies to get you started. Depending upon where you’re located, there may or may not be one of these companies within a reasonable distance. If youre not within driving distance, choose a company on this list that will sell you the parts for a DIY conversion, or hire a reliable mechanic to do the hard work for you.   Companies That Offer DIY Conversion Kits Canadian Electric Vehicles Ltd.  CEV was established in 1991 to convert internal combustion engine vehicles to electric power- including heavy-duty diesel truck conversions for the airline industry. In addition to selling conversion kits for many vehicles, they offer components for modifications and offer custom-build options. Their customers include governments, industrial companies, and private individuals. Conversion Companies Clean Ride Electric Vehicles  Located in Minnesota, this company restores and electrifies classic VW beetles from top to bottom. They replace the internal combustion engine and fuel system with an electric motor and 6 12-volt lead acid batteries and upgrade standard components. These all-electric VWs offer a 20- to 30-mile range with a top speed of 50 mph.EVPorsche.com  Located in West Palm Beach, Florida, and Los Angeles, CA, this company can convert any vehicle to all-electric power but specializes in Porsche sports car conversions due to their dependability, lightweight design, and engineering. They offer a wide variety of battery, range and model configurations to meet driving styles and needs. Speeds for their EVs: 0-60 in about 5 seconds or even faster with 2 motors and series to parallel switching.Eco-conversions  This company specializes in converting regular gas burning cars into clean electric machines- they have zeroed in on luxury vehicles with their benchmark, the BMW 8-Series, aiming to â€Å"shatter the image of the traditional electric car.† They recently partnered with eVionyx, an American company that has developed superior charging nickel-zinc batteries. Electric Vehicle Systems – Based in New Underwood, SD, this company offers complete repair services for all-electric vehicles, using the latest technology. According to their website, most repairs of a two-wheel electric scooters run $45. Call them to learn more.Electro Automotive – Located in Felton, CA, Electro Automotive was founded in 1979 as a single source for quality conversion components. According to their website, Electro Automotive â€Å"believes in electric vehicles built to live in the real world.† They are all about EVs that are simple in design, easy-to-use, reliable, affordable and practical.Electric Vehicles of America (EVA) - EVA provides free detailed calculations for specific all-electric applications, from industrial, on-road electric car or truck, off-road EV or boat. They also offer free technical papers on safety, batteries and conversion details, in addition to system design, supplier data and drawings, installation manuals and videos. Lo cated in New Hampshire.EV-Blue/Electric Blue – Based in Kansas, this company will convert any gasoline burner to electric- you supply the vehicle, they do the conversion. Their basic option includes a 144V battery and charger for $11,000. AC, heat and power steering are extra. Call or email for additional details. EV Source LLC - Located in Logan, UT, this company provides high-quality electric vehicle components to the high performance, high voltage EV conversion market. From speed controllers, fuses and breakers to assembling your own conversion kit, they know how to help you go all-electric.Green Motors Inc.  - Based in northern Arizona, Green Motors converts standard vehicles to electric power, in addition to servicing, maintaining and refurbishing all types of electric vehicles. They offer service support for the DIYer, plus sales of parts. Visit their products page for a current list of available vehicles.Metric Mind Corporation  - Based in Oregon, Metric Mind Engineering (MME) is an international company that supplies high end AC drive systems and other EV components. According to their website, MME is a single source of all the main electronic hardware necessary to complete an EV conversion.†REVOLT Custom Electric Vehicles LLC  - This company provides design, building and m aintenance services for electrical vehicle conversions in the Austin, TX area. Wilderness Electric Vehicles  - Located in Utah, this company specializes in electric car conversions. You supply the vehicle- they provide the conversion in 3 to 4 months. They also offer a variety of kits to convert to electric. Call or email for additional details.

Sunday, November 3, 2019

European Cinema Essay Example | Topics and Well Written Essays - 2000 words

European Cinema - Essay Example The concepts that were associated with pan – European films created an alternative culture that identified the margins of culture, as opposed to the mainstream that was often accepted in contemporary movies. The concept of pan – European films began to become significant after the 1950s and 1960s with the emergence of Hollywood. As the styles and themes of Hollywood began to reach popular culture, those in Europe also began to change the approach to film. While looking at the movies of Hollywood, there was a movement that was defined which rejected the American culture in movies. The pan – European movement was one that went in the opposite direction of creativity and inspiration as Hollywood, specifically to create a European style film. The particular movement began with the French New Wave in the 1950s and 1960s and was known to adapt to specific influences that were a part of the films in cinema. â€Å"Here European cinema adopts a mode of film practice that rejects dialogue with Hollywood, favouring instead filmic models, which appear to be embedded in European culture and untouched by American cultural influence.1† The rejection of influence from popular cultu re, as well as the influences of American Hollywood was then able to define the pan – European film and the way that it was associated with the culture of Europe. The concept of moving into the culture of Europe to produce films was not the only definition that was associated with Europe and the functions that it had for film. The establishment of culture in pan – Europe also led to the understanding of borders and the concept of Europe as the cultural affiliation that was associated with this particular arena. The pan – European film focused not only on the concepts of culture, but also was affiliated with creating movies that were nationalistic in nature. Because there was a movement against