Monday, September 30, 2019

About Steroids

Many people have had their lives ruined by the use of illegal steroids, yet the desired effects are so overwhelming that people tend to overlook the consequences. Steroid users believe taking anabolic steroids will enhance their performance, strength, size,etc. They regard the use of them as legitimate as any other aspect of training. To begin with, the term  «anabolic  » means  «to build tissue, » therefore anabolic steroids tend to increase constructive metabolic pathways within the body. Also, anabolic steroids are synthetic derivatives of the natural male sex hormone, testosterone. Testosterone was the first steroid developed, a natural occuring hormone in many plants and animals. The first clinical use of testosterone occured in 1958 when physicians injected it into underweight and ill patients to simualte weight gain. The first reported use of steroids in a non-medical setting occured during World War II. Steroids were adminstered by Nazi doctors into German soldiers to enhance their aggressiveness. The Soviet Union noted the Nazis’ use of the drug and recognized that enhanced aggressiveness, increasing in strength, and size could be desirable in athletic competition. The Soviets experimented with steroids in the early 1950’s and it is believed that they were used in the 1952 Olympic games. The introduction of steroids into the United States is often attributed to the late Dr. John Ziegler, the team physician for the United States weightlifting team at the last Vienna World Power lifting championships. A Soviet physician told Ziegler that some of the members fo the Soviet team were using testosterone as an aid to enhance their strength. Ziegler was impressed with the results and began conducting some studies on American lifters. The results were the development nd introduction of the steroid Dianobol, an anabolic steroid with fewer masculinizing properties than testosterone. Dianobol became well known in the athletic world. By the 1956 Melbourne Olympic games, steroid use had escalated to the point that many Olympic competetors in the strength events were either using them or were aware of their performance ehancing abilties. Anabolic steroids are all derivatives of the male sex hormone testosterone. With the use of steroids a person will receive two types of effects from the use. The first is the androgenic effects or masculinizing. These are the unwanted ffects such as the enlarging of the prostate, growth of male sex glands, deepening of the voice, and increased facial hair(other steroids were developed in an attempt to separate these effects of testosterone from the anabolic). The other effect is anabolic effects, the wanted effects. There are three major benefits that are wanted from steroid use and they are: Frist athletes will attain a greater increase in lean muscle mass and strength when it is used with a combination of rigorous training and the drug. The second major benefit of the steroid use is that the athlete’s body suffers less breakdown. This decrease in muscle breakdown and ecovery time permits more frequent training sessions at higher intensity and for longer periods of time. The third benefit is the increased aggresiveness they are believed to simulate. This increased aggresssiveness may drive athletes to train harder and longer without the usual fatigue. Other positive effects of using steroids is increases in; storage of muscle glycogen, blood volume, a general boasting of the immune system, and the reduction of body fat percentage. The effects are maintained as long as the athlete continues the steroid use. Anabolic steroids also have a number of potentially harmful side effects. The introduction of synthetic hormones results in decreased levels of other natural hormones. This worsens acne and accelerates baldness. This can also result in the decrease production of sperm and testosterone by the testes, which can lead to atrophy of the testes. Increased incidents of liver tumors and abnormal liver funtions have been noted in patients using anabolic steroids. Liver, prostate, and testicular cancer have been linked to steroid use, particularly oral steroids. Increases in high density cholesterol is noted in people using steroids, suggesting hardening of the arteries, high blood pressure, and blood-clotting disorders. Also, athletes using steroids seem to be suffering many more muscle and tendon injuries. Some doctors wonder if it is the drug-induced brittelness of the muscle or tendon or the heavier weights that is being lifted. Others think the increased aggressiveness causes lifters to ignore warning signals from an overworked body and they train harder than they should. In adult women, severe masculinizing effects have been documented including hair growth onthe cheeks and the chin, male patern baldness, irreversible deepening of the voice, shrinkage of the breast size, uterine atrophy, and menstrual irregularities. In pre-adults, anabolic steroids can cause the premature closure of the bone growth plates resulting in shorter structures. Another major side effect includes what has been popularly called  «roid rage ». For training and competition, the increased aggressiveness has been classified as a benefit of steroid use; however, with increasing dosage, the increased aggression will have an adverse effect. Wild aggression and paranoid delusions are common in some steroid users, and they may also suffer from major depressions and peroids of spontaneous violence. Steroids can also be both physicaly and psychologically addictive. Physcially many many athletes experience severe depressions following periods of not taking the drug, similar to that of any other drug addict. Psychologically, steroid use can be compulsive and unstoppable in what has been termed by the medical community as  «reversed anorexia ». The steroid users have an uncontrollable obsession with being big instead of skinny. This obsession results in the continuing or increased usage of anabolic steroids. The use of steroids in the United States has been estimated as high as one million persons, or one in every two hundred-fifty people. The major reason for his large amount of useage is that sports have envolved from recreational pastime to a lucrative money-making venture at the professional level. Speed and strength have opened the door to financial opportunities and a bond has been formed between sports and steroids. The concept of sports as a fun recreational activity has been surpassed by sports as a business. Many athletes will sell their bodies to steroids for an opportunity to win a spot on a professional roster or winning a gold medal in the Olympics. Since the introduction of steroids to sports, the reason for their use has remained the same; the pursuit of the winning edge.

Sunday, September 29, 2019

As I Lay Dying 9

May 10, 2010 013 Child Relations In the book â€Å"As I lay Dying† by William Faulkner the character that is dying name is Addie Bundren, the mother of five children. She was also the wife of no good Anse Bundren. Anse is lazy, selfish, no good farmer, who can hardly be called a farmer because he does almost none of the work himself. Out of an act of lust Addie and Anse married and ended up giving birth to Cash and Darl soon after. After the birth of her two sons Addie was bent on not having any more children. The birth of Cash confirms her feeling that words are irrelevant and that only physical experience has reality and significance. Through the act of giving birth she becomes part of the endless cycle of creation and destruction, discovering that for the first time her aloneness had been violated and then made whole again by the violation† (Vickey 54). Anse wanted as many children as possible so that he would have as many hands a possible to work for him, but Addie w as determined to have no more. This made their marriage very rocky and lead to Addie requesting to be buried with her blood relatives in town. In this time period this was hard because of the lack of transportation that they had as well as a lack of money. Her determination to not have any more children was brought to an end because she had an affair with Whittfield, which lead to the birth of Jewel. Anse did not know of this affair so he thought that jewel was his child. Addie decided to make it up to Anse by giving him two more children. â€Å"She consciously and deliberately gives Anse Dewey Dell to negative Jewel and Vardaman to replace him† (Vickey 55). Among the five children that she had Addie treated them all in a different way. Addie especially treated Cash, Darl, and Dewey Dell very differently. The relationship between Cash and Addie is magnificent for many reasons. Out of the five children that Addie had she liked Cash’s personality the most. Cash is the oldest of the five children. In addition to being the oldest, Cash is also a man of very few spoken words. He can be considered a very simple character compared to the others of the novel. For example, in his first narrative excerpt from As I Lay Dying Cash speaks in list form. {draw:custom-shape} This is one of the most simplistic forms of communication known. As a skilled carpenter, Cash, went and built his mothers coffin, especially to her liking in front of the window in which she was slowly dying. Cash and Addie had a relationship based off very few spoken words. â€Å"Her blissful union with Cash exist beyond body language: Cash did not need to say it [love] to me nor I to him† (Clarke 38). Clarke is explaining in this passage how there are no words needed in the relationship between Addie and Cash. As Cash built his mothers coffin, for each piece that he completed he held up for her approval. â€Å"She’s just watching Cash yonder† (Faulkner 9). This shows how Addie was continuously looking out the window to check on Cash’s progress on her coffin. Cash is extremely determined to complete the coffin. â€Å"With Cash all day long right under the window, hammering and sawing at that——â€Å"(Faulkner 19). This is proof of their strong relationship because he spends all his time doing this strenuous task. â€Å"Work is Cash’s way of communicating with Addie, his means of getting and holding her attention, and thereby assuring that unspoken understanding that has always existed between them†(Bleikasten 179). Bleikasten is showing that Cash rarely speaks unless it is through his actions such as building the coffin. Although Addie and Cash did have a very good relationship, Cash still needed something to help him cope with the death of his mother. For him this would be his carpentry skills. â€Å"The carpentering itself is an activity in which Cash can immerse himself sufficiently to insulate himself from the harsh reality of his mother’s imminent death† (Powers 56). This is simply saying that Cash is using carpentry to replace his mother after her death. The work of mourning begins before death has actually occurred† (Bleikasten 178). The mourning begins early because Cash already has a strong feeling that his mother is about to pass on so he begins to work on her coffin. â€Å"The building of the coffin should become for Cash the object of a manic counter investment. If he cannot be the jewel, he can at the very least be the jewler, the maker of the perfect shrine in which the mother’s precious body is preserved. In nailing Addie into the coffin, Cash encloses himself with her, burying his desire and pain† (Bleikasten 179). Cash making the most perfect coffin possible is his special way of mourning and the completion of the coffin with his mother’s body in he is enclosing his pain. â€Å"The infant loved by his mother grows to be a man of deeds; and Addie, in the absence of Jewel, calls out to him at the moment of her death—and he continues that relationship in his silent agony on the wagon†(Williams 117). Addie and Dewey Dell did not have the best relationship but at the same time did not have the worse possible relationship. Addie felt indifferently towards Dewey Dell, meaning that she didn’t particularly care what happened with her. She didn’t really care because Dewey Dell was only meant to negate Jewel because it was her illegitimate child that Anse did not know of. Addie purposely gave Anse Dewey Dell and Vardaman to make up for the birth of Jewel. Dewey Dell clearly did not have the strongest relationship with her mother though. â€Å"Dewey Dell is not so clearly disturbed by her mother’s death, yet her activity with the fan at Addie’s bedside may be seen as similar in protective function to Cash’s carpentry†(56 Powers). Dewey Dell too had something to substitute for her mother’s death. Dewey Dell, terribly preoccupied by the bud of life within herself- the result of going to the woods, the ‘secret shade,’ with Lafe- can scarcely attend to Addie’s death†(Powers 56). Dewey Dell quickly became pregnant after an agreement that she had with Lafe. Lafe manipulated the agreement and found a loop hole and ended up picking cotton into her basket. As she lost her virginity under the secret shade and realizes soon after that she is pregnant â€Å"Dewey Dell admits that ‘the process of coming unalone is terrible’† (Williams 105). It quickly became clear that â€Å"Dewey Dell has no need to replace the mother figuratively, for she replicates the mother in her own pregnancy† (Clarke 41). This shows that Addie and Dewey Dell really did not have a close relationship because even through her pregnancy she should have been attending to her mother’s needs as she left this world. Further more as they took the casket into town, Dewey Dell’s intent to go to town was so that she could try to find some abortion medicine, because like her mother she did not necessarily want her first child at that point in time. So the daughter goes through the same experiences as her mother: in pregnancy Dewey Dell discovers as Addie did her destiny as begetter, and like her mother she is snatched from aloneness only to be thrown back to it†(Bleikasten 180). Although Addie and Dewey Dell have many similarities when it comes to their pregnancies they are also different. â€Å"Unlike Addie, she is determined, if possible, to effect their separation. Thus, she will not name her condition even to her self because to do so would be to transfer her pregnancy from her private world of awareness to the public world of fact† (Vickery 61). Darl and Addie on the other hand had the worst possible relationship ever. This was proven several times throughout the novel As I Lay Dying by William Faulkner. Darl had said â€Å"I cannot love my mother because I have no mother† (Faulkner 95). This shows exactly how they have a bad relationship, but it is not just a one way street, Addie in turns hates Darl also. â€Å"Addie claims to have been tricked by a word in Darl’s conception; she says that my revenge would be that he would never know I was taking revenge. And when Darl was born I asked Anse to promise to take me back to Jefferson when I died† (Williams 115). This is the beginning of the dislike on Addie’s behalf because she did not want another child to begin with, so she intended on getting revenge on Anse. â€Å"He too must finally cast the son most like him (Darl, the one that folks say is queer, lazy, pottering about the place no better than Anse, the one who most resembles his father looking out over the land†¦with eyes [that] look like pieces of burnt out cinder†(Williams 115). In this passage Williams describes why Addie actually hates Darl. She hates Darl because she hates Anse with a passion, and Darl acts just like Anse in the sense that he is lazy like his father. Because Addie accepts the fact that she and Anse live in different worlds, her second child, Darl, comes as the ultimate and unforgivable outrage† (Vickey 54). Since Darl receives no love from his mother he makes it his duty to terrorize everyone else in the Bundren family minus Anse. â€Å"Never having had a mother, Darl is more surely poss essed by her than any of his brothers. Darl’s eyes, as Dewey Dell describe them, are full of the land dug out of his skull and the holes filled with distance beyond the land†(Bleikasten 188). Darl is known for his abilities to communicate without words, â€Å"at times, a kind of nonlinguistic â€Å"feminine† intuition† (Clarke 35). Using this ability he continuously terrorized Dewey Dell because he was the only one whom knew of her pregnancy in the Bundren house hold. In one of Dewey Dell’s narratives she said â€Å"He said he knew without words like he told me that ma is going to die without words, and I knew he knew because if he had said he knew with words I would not have believed that he had been there and saw us† (27). What Dewey Dell is explaining is that Darl speaks to her without words and knows of all things that are happening and only the most important things Darl says with no words, such as the death of their mother. Darl also takes it upon himself to confuse his youngest brother Vardaman even more than he already is. For example, Vardaman says â€Å"My mother is a fish† (84). This shows how confused Vardaman really is. The conversation that Darl and Vardaman had concerning Vardaman’s mother being a fish and the horse being Jewel’s mother really left Vardaman confused. As if this little part was not confusing enough for the five year old, Darl then confesses that he does not have a mother. â€Å"I haven’t got ere one, Darl said, Because if I had one it was. And if it is was, it can’t be is. Can it† (101)? This conversation leaves Vardaman in a world of confusion. He now starts to doubt if Darl and Jewel are really his brothers. â€Å"Darl, who seems to float through a world of words, passing into peoples minds and crossing vast spaces at will† (Clarke 46). Darl was able to make everyone miserable because he had no substitute for his mother’s death unlike everyone else in the family. Vardaman had the fish to replace their mother, while Dewey Dell had her pregnancy to occupy her mom, Jewel had his horse, and Cash had his carpentry to replace the emptiness left by their mother’s death. Darl had no substitute â€Å"because he never had a mother to replace† (Clarke 46). Darl said this several times throughout the novel in many variations. For example, â€Å"I can not love my mother because I have no mother† (95). There is a reason why Darl feels this way and Addie in turn hates Darl also. Darl’s feeling that he is not a part of his mother is more than just an expression of sibling rivalry. Addie’s rejection of him is absolute; it is the most terrible thing she does. † The rejection by his own mother makes Darl feels that he has no mother especially as a support system. In turn Addie rejects him because he is just like his father Anse of whom she despises as said previously. As a resulting factor â€Å"for Darl, the constant e xception, the journey is a continual nuisance, and he wants only to see his mother- distinctly dead- buried and out of the way†(Powers 61). Darl is constantly suffering emotionally throughout his life due to the absence of his mother, and continues to be affected by his lack of motherly guidance once Addie actually passes away. â€Å"His brothers, as we have seen, all end up some how displacing their grief and replacing Addie: Jewel with a horse, Vardaman with a fish, Cash with a coffin. But Darl’s mother is literally irreplaceable† (Bleikasten 188). Darl’s mother is irreplaceable because all his life he never had one because he was despised by Addie. In conclusion Addie Bundren had very different relationships with her children. After her death all her children had different ways of coping with her loss also. The relationship with Addie varied greatly from her children Cash, Dewey Dell, and Darl. Cash, her oldest child, she had a great relationship with. They loved and understood one another through the minimum use of words possible. Often times they communicated through body gestures and other types of movement. To substitute the emptiness in Cash’s heart due to the death of his mother, he focused on carpentry. Cash hand built Addie’s coffin to her approval as she looked beyond the window as she lay there dying. Addie and Dewey Dell had a relationship in which they felt indifferently about one another. They basically coexisted within the same house hold. Addie brought Dewey Dell into the world with a purpose: to â€Å"negative† Jewel because he was Addie’s illegitimate son. Dewey Dell also had a replacement for her mother after her death. At the time of Addie’s death, Dewey Dell is pregnant with her first child. This pregnancy takes the focus that Addie would have had on Addie and redirects towards an illegitimate child of her own because she is not married. And then there was Darl. Addie and Darl had the worst relationship possible between a mother and a son. They hated each other. Addie despised Darl because he was just like her husband Anse of whom she also despised. Darl also was her second child who she really did not want to have at all. This was the point in which she vowed to seek revenge upon Anse and made Darl an outcast. As for Darl, he hated Addie because she never mothered him his whole life, which left him broken emotionally causing him to terrorize the rest of his siblings especially his younger ones. Darl did not have a substitute for the death of his mother. In Darl’s eyes he had no mother so the mourning of her would be pointless for him. Work Cited Bleikasten, Andre. _The Ink of Melancholy_. Requiem for a Mother. Indiana University Press, Bloomington. 1990 Faulkner, William. As I Lay Dying. New York: Vintage, 1990. Powers, Lyall H. Faulkner’s Yoknapatawpha Comedy. : The University Of Michigan Press. Ann Arbor. Vickey, Olga W. The Novels of William Faulkner: A Critical Interpretation. Baton Rouge: Louisiana State University Press, 1959. Print Williams, David. _Faulkner’s Women: the Myth and the Muse_. University of Toronto Press. 1977.

Saturday, September 28, 2019

How Significant Was Kevin Rudd's Apology to the Stolen Generations Essay

How Significant Was Kevin Rudd's Apology to the Stolen Generations - Essay Example It was a very strong political expression that the country expressed towards the acknowledgement of fundamental human rights. The apology statement had very relevant political and social implications on Australia and the outlook of the country towards its indigenous populations. These implications stretch beyond the geographical boundaries of the country as the issue was discussed by the civil society all across the world. The objective of this essay is to analyze the significance of Kevin Rudd’s Apology to the Stolen Generations. Background of the apology The apology was a political statement which had been awaited for many years. Indigenous children and children of Torres Strait Islanders were forcefully separated from their families by the Australian government. The justification that the Australian government had for this act was the desired objective of upward social mobility and exposure of these children to the predominant modernized culture of Australia (Haebich, 2011) . These children were later referred to as the ‘Stolen Generation’. An enquiry commission The Human Rights and Equal Opportunity Commission, headed by Mick Dodson and Sir Ronald Wilson, was setup to undertake the â€Å"National Inquiry into the Separation of Aboriginal and Torres Strait Islander Children from their Families† (Haebich, 2011 p. 1033). ... 1033). The expression ‘Lost Generation’ is justified by the large percentage of children who were deprived of their parents and living systems. The report shed light to disturbing facts that these children were unhappy in the foster homes, institutions and adoptive families they were put in (Haebich, 2011, p. 1033). The report also contained evidence of forced labor imposed upon these children. The extensive interviews, conducted by the enquiry commission, observed consequences of separation which included medical and psychological issues, addiction, violence, self harm and even suicides (Haebich, 2011). In light of all these observations there was pressure on the Australian government both from within the country and human rights movements across the world. Moreover, out of the 54 recommendations made by The Human Rights and Equal Opportunity Commission, one was that the Australian government must apologize to the stolen generation (Haebich, 2011). Since then, this has been a matter of political debate for all the governments which came to power in Australia. In other words, the apology was much awaited by the world. The Political Importance of the Apology The decision of Kevin Rudd to apologize to the Stolen Generation has its importance as a strong political expression. It must be noted here that after the report thoroughly asserting the need of the apology was published, it was denied for 11 long years. No governments owned up the moral responsibility towards the Stolen Generation and the human rights violations faced by them. The general Australian response to the report was that the observations were inflammatory (Haebich, 2011, p. 1033). There was also

Friday, September 27, 2019

Leading, Managing and Developing People Essay Example | Topics and Well Written Essays - 3000 words

Leading, Managing and Developing People - Essay Example In ensuring that leaders achieve motivation of employees, some of them use some theories that help them to understand and choose the best way to treat their employees so that they can perform well. Through moderation of the working environment, leaders achieve active participation and engagement of employees, and this improves their chances of being productive and improving the performance of the organisation in which they work. There are various ways that help leaders motivate employees until they become actively engaged in performance of duties they have in organisation and can willingly contribute to the business (Lengnick-Hall, 2011, p. 245-247). In many circumstances, organisations experiences some changes which require employees to adapt so that they remain relevant in the production system and that the organisation in which they are working may continue to be productive and profitable. This means that leaders in organisations need to have their employees equipped with relevant information that will keep them focused on accomplishment of their goals in the company. The theories of improving engagement in an organisation require influence in the behaviour, improvement of the capacity, the collective environment of working and improvement of relationships among various individuals (Lengnick-Hall, Beck). In order to attain motivation of employees and cause them to be engaged in the operation of the company in which they work, the leaders should seek to understand the behaviour patterns of the employees (Collinson, 2005, p. 1421). This is because the way employees are influenced by the environment of the company operations, in the same way; it affects the company’s operations in the course of business. This means that to achieve actively engaged employees leaders will need to establish an environment that will ensure freedom of expression of ideas and feelings of the company. Influencing the behaviour systems of the employees, leaders should focus on i mplementing strategies that will conform to the behaviour systems and contribute to the success of the company in different situations. This implies that all employees will have their own perspectives represented in the course of doing business, and they will have the freedom they need to present ideas to the leaders as well engaging actively in creative activities in the company (Collinson, 2005, p. 1421-1422). The understanding of the personalities of the employees will help leaders to choose the right method to motivate them so that they can engage themselves in the company business. For instance, understanding the way employees could respond to various issue in the society could help the leaders to implement their plans of motivation. According to McGregor theory X and Y (Green, Wu, Whitten and Medlin, 2006, p. 577), there are two perspectives of looking at the employees in an organisation i.e. as inherently lazy and needing a form of pressure to perform their duties, or as a se lf motivated and needing little or no pressure so that they can perform. Using McGregor’s theory X and Y would help leaders to treat employees in ways that they are conscious of things they ought to do and those that they could not work for them. This ensures that leaders will be able to choose the right way of motivating the employees through punishment or by giving rewards that

Thursday, September 26, 2019

Finance 1750 3day Essay Example | Topics and Well Written Essays - 1750 words

Finance 1750 3day - Essay Example Close follow up shows that China’s economy has slightly outdone Japan’s, in terms of the GDP. This achievement suggests that in a few years to come China will only be a step behind the United States in terms of the largest economy. According to Lai and Yang’s (2009) report, after the two main stock exchanges Shenzhen Stock Exchange and Shanghai Stock Exchange that were launched in 1990, the state owned enterprises have been developed and supported by this two markets financially to a great extent. Taking a closer look at China’s stock markets and real estate it is not clear whether this two components are correlated or not. In this paper, we use volatility models to compare results between the two markets and finally establish whether the two are correlated as we further establish their potential variation effects. In this case we monthly data sets ranging from the year 2005 to 2010. From the data, several statistical test is applied to measure the rate of return on the correlation between the two markets, stock markets, and real estate. Stock Investment In general, investors purchase common stock from the stock market in terms of stock investments, which generate dividends that earn those profits or capital gain because of positive shift in the stocks’, selling price. ... The second advantage is that it is possible to minimize the risk on a portfolio greatly by having diversification where several types of stocks are held (Bodie, et al., 2009). The third important advantage is that it is now very possible to sell common stock on secondary markets with minimum transaction costs. This is possible due to the high liquidity of stocks. The other important advantage is that, when compared to other investments, the pricing of common stock is not only affected by shifts in interest rates but is also affected by performance of the firm and earning prospects. Stock Market Stock markets are also referred to as equity markets. They normally provide a platform where shares can be issued, and many investors can come and trade their shares and securities. The markets are divided into two depending on how they carry out transactions. The first is exchange market, and it is usually physical where investors can come and freely trade with their securities. The second on e is referred to as over the counter market. In this case, transactions are normally carried out over the phone or through the internet on the computer. The markets are also divided into two main parts, and these are primary and secondary. The primary market issues new securities such as initial public offering (IPO) while secondary markets offer securities that were previously offered and are being presented subsequently for trade. Returns and Risks of Stock Investment The first thing we need to understand is as an investor, there are two ways in which one can gain from their investment, and this is through dividends and capital gains. A capital gain is achieved because of an increase in the value of a capital asset such as stocks

Wednesday, September 25, 2019

What roles do religions play in Appiah's analysis How is your approach Essay

What roles do religions play in Appiah's analysis How is your approach similar to or different from his - Essay Example Let me highlight that most people have always sought the assistance of religion when cumbered with spiritual and social problems. This paper will therefore give a vivid explanation of Appiah’s story. Appiah has given a vibrant explanation of importance of religion. The following are the importance of religion according to Appiah. I will keenly observe the points raised by Appiah. In so doing I will criticize, such points to ascertain whether they are true. The importance of kingship is highlighted by Appiah to be very important. The arrival of the king at the palace is described as horrific. It is noted that the king wore quill of porcupine looking like a worrier ready to devour. In this way, the importance of the king in the Asante kingdom is very significant. This shows that kingship plays an integral part of Asante religion. Appiah highlights that when the king arrived, everyone remained standing until the king settled on the throne. This shows that the people had high degr ee of respect for their king (Furness 2009). The importance of modern religion has been highlighted in Appiah’s story. He was able to notice the picture of the king greeting the pope on the wall of the palace. This shows that the Asante people had respect and value for God. In this way, people are seen to have their own freedom of worship. Appiah has also highlighted that modernity has intruded in to acts of religion in the kingdom. In this case, most people have tried to embrace modernity. This has weakened the contemporary Asante religion. Appiah has noted that intrusion of western culture and way of life has tended to weaken the native Asante culture and religion (Kepler 2011). Appiah has highlighted vividly that religion is meant to unite people. For instance, people of Asante kingdom were seen to be united by this factor. They had common places for their worship. It has been noted that most people have embraced modern ways of religion. Most of the Asante elites are Catho lics. Modern religion has resulted in unity of different people. In this case, people are able to work together as a team. I must highlight that I have agreed with Appiah statement on unity. In fact, the ultimate reason for religion is to foster unity among different people (Schieman 2011). This is because people from different backgrounds always come together to worship one GOD. Another importance of religion is to foster growth and development among the people. Appiah has highlighted that missionaries came to transform Africa. Through their new religion, they brought Christianity. In this case, most Africans were able to condemn their native way of life. The rise of Pentecostal messengers has even developed this view farther. The Pentecostal preachers are currently challenging the churches and condemning the old rites of idolatrous. This shows that religion is responsible for condemning of vices in the society (Anthony 2011). The preaching of the bible is based on the Ten Commandm ents that are meant to guide people on their relationship with GOD and others. Religion has a role for ensuring spiritual fulfillment. It is important to note that Appiah highlights that different people always need different conditions for spiritual fulfillment. In this case, such people can no more exist better in the same moral as compared to the manner plants can exist in same physical and climate. I have to agree with Appiah that spiritual fulfillment is always achieved through religion. This is the reason most people with different problems always go to church. In fact, nowadays, most people believe that their problems can be solved through prayers rather than traditional and cultural interventions. The increase in the number of people who go to

Tuesday, September 24, 2019

The subject of occultism in Africa Research Paper

The subject of occultism in Africa - Research Paper Example Why do we continue to mistrust them, despite the studies that have been done on occultism as a discipline? This paper intends to elucidate on occultism and explain magic as part of occultism. Now, occult is a word that many people use on a regular basis, but little do they understand it. â€Å"Occult is supernatural, mystical; the magical beliefs, practices or phenomenon. It is beyond the range of ordinary, knowledge or experience; it is mysterious.† (Oxford Dictionary, 2009). The literal translation of the word occult is ‘hidden’. The former definition had been incorporated into the Oxford Dictionary as the literal definition not too long ago. That is because occult or occultism is no longer simply something that is hidden. It is so much more than that. It has almost become a culture. And ergo, the definition had to be revised with the dawn of it as a discipline/discourse/culture. The British occultist, Dion Fortune has explained this phenomenon in her book. â€Å"Occult science is the branch of knowledge which is hidden from many and reserved for few† (Fortune, 2001). The author explains that there are times when certain people are able to transcend the states of consciousness that are considered normal. In this state, these people are able to experience â€Å"those forms of existence with whom normally no contact can be made† (Fortune, 2001). We understand from this that occultism is not merely knowledge of the unknown, or of the hidden. It is the opening to the world of supernatural/paranormal, to the world of mystery for us. And this can only be done when a person defies the norms; when one goes beyond the reality that we have come to understand as our only true reality. Only then, are they able to enter a world that had been anonymous to them before. Now, many believe this is through magic; that when people learn to control this mystical power, they are able to control the Nature around them, to manipulate the

Monday, September 23, 2019

Merit Essay Example | Topics and Well Written Essays - 1500 words

Merit - Essay Example uous are rewarded and the vicious punished in proportion to their relative deserts† is- those who do good deeds are always rewarded while those who perform evil or bad actions are always punished. These actions are towards the attributes with which every individual is born. It also signifies the extent of goodness or evilness of the action that was performed and this is going to decide the merit or desert of the act (Pojman, 1999). In terms of merits the statement given by Pojman holds true in the sense that it promotes people to perform good or rather their best to secure rewards. This act is going to culminate the entire world a place where people are going to procure their merits according to their actions. These actions are in terms of promoting good deeds to make a healthy and congenial atmosphere. In the judicial system, it is not always true that those who have performed virtues are going to be rewarded! At times judgments have gone in favor of the evil task performer. Such cases create a sense of insecurity in the minds of people and tremble their trust and faith from the judiciary system of the country. The statement given by Pojman does not imply that this is how it is; instead it says that is how it should be. The theory in circumstance pronounce that it is not possible to change the minds of people and change the attitude but we all can strive hard to make this world a better place to live where people will receive their merits in proportion to their acts. There are various examples where people receive merits not because they have achieved something but they have deceived others to achieve their targets. Some examples are discussed here: one of the biggest politicians Saddam Husain was very popular amongst the people of Iraq; people rewarded him and offered him their wealth and everything what so ever they could and crowned him as the strongest person in the country. But as there is a saying that power corrupts so he started taking all the

Sunday, September 22, 2019

Vulnerable Populations - Homeless People in Los Angeles County, Research Paper

Vulnerable Populations - Homeless People in Los Angeles County, California - Research Paper Example m homelessness problem that last for a long time having this disability which is often complicated by means of getting addicted to drugs and suffering from some physical illnesses. According to the statistics regarding Los Angeles County in California, almost one quarter of the county’s homeless population are homeless as they are chronically ill. The chronic homelessness is described as an unaccompanied disabled person who has been made homeless for more than a year or has at least suffered four periods of homelessness in last three years (National coalition for homelessness, 2009). In Los Angeles County, there is increasing number of youngsters who have become homeless and there is also growing number of homeless veterans in the area. According to the report submitted by the government of Los Angeles, cited by Burt (2011), about 18% of homeless in County are veterans which are a 3% increase from last year i.e. 2010. Even the number of male and female veteran homelessness has increased by 51% and 22% respectively. According to Einspar (2010), homelessness is described as a lack of permanent housing that usually results either from extreme poverty problem or inability to have instant access to living environment which is suitable and ideal for the people. Recently, there has been growing trend of family homelessness and the main factors that have contributed to increase in this problem are decline in rental housing as they are unable to cover the rent amounts charged to them and widening of gap between income that is earned and cost of housing for families that have low income. Almost all vulnerable populations are facing extreme poverty and are at great risk for both mental and physical illnesses (Nooe & Patterson, 2011). In Los Angeles County, families that have children have received attention from government authority as it is the rising area of population that is homeless. Most of the cases have revealed that homeless families mainly comprise of mother

Saturday, September 21, 2019

Home Depot Analysis Essay Example for Free

Home Depot Analysis Essay Strategic audit 1. Current Situation A. Current Performance The Home Depot Inc. performed quite well in the past few years from 2000- 2005. Firstly, It opened more than 900 stores until 2005 and their sales doubled during that period as well. Secondly, The Earnings per share growth at least 20% in each of the year from 2000 till 2005. Thirdly, it accounts 10% market share of the US home appliances market by the end of 2005. This growth is outstanding because The Home Depot was just an inconspicuous company five years before. To sum up, its financial success ensures the company to create values to the shareholders. B. Strategic Posture Mission: The Home Depot is a home improvement retailer. It can be categorized as a retailer that devilries products and services at the same time because the goal of The Home Depot is to provide the highest level of service. The Home Depot is not just selling home improvement products but also installing the products, thus it combines the warehouse-format stores with a high level of customer service. Objectives: The slogan of the company is:â€Å" Improve Everything We Touch.† Strategies: The Company’s overall strategy is enhancing the core, extending the business and expanding the market. The 3E are consistent with each other. Policiesï ¼Å¡ 2. Corporate Governance A. Board of Directors There are 11 people in the board of directors and 9 of them were external member, which called no-management directors. The directors are full of experience in different aspects; they are closely working together to ensure the company is in the right track. Robert Nardelli: Chief Executive Officer of Home Depot. He is an inside director. Milledge Hart: non-independent outside director. He is an external member. Kennth Langone: Lead Director of the Board. Non-Management Directors Gregory D.Brennman: CEO and chairman of Burger King. Owned 33,519 of Home Depot stock. John L.Clendenin: CEO and chairman of Bellsouth Corporation. Owned 38,832 shares of Home Depot stock and chaired the boad’s Audit Committee. Claudio X.Gonzalez: Chairman and CEO of Kimberly-Clark de Mexico.Owned 64,457 of Home Depot stock. Milledge A,Hart: Chairman of DocuCorp International. Owned 3,568,411 of Home Depot stock. Bonnie G.Hill: Owned 22,370 of Home Depot stock, etc. 4. Internal Environment C. Corporate Resources Research and Design

Friday, September 20, 2019

Three Major Categories Of Software

Three Major Categories Of Software Software can be divided into three major categories according to popularity: application software, system software, and web applications. Within each category there are dozens, if not hundreds, of specialized software types, but for the purpose of this study, we will concentrate on the most popular software type of each category. Software applications refer to programs on a client machine which are written to perform specific tasks. Nowadays, there is a wide range of software applications being developed including word processing programs, database management tools, photo editing software, etc. But during the last decade the web has become the new deployment environment for software applications. Software applications that were previously built for specific operating systems and devices are now being designed specifically for the web (web-enabled). Because of this new movement, and as the web becomes increasingly a universal interface for software development, the software industry is experiencing a major evolution toward web-related software applications (Festa 2001). For example, the recent release of Googles Chrome web browser which was specifically designed to enable the execution of web applications and services in the web browser confirms this trend. As the web evolves, the surrounding and supporting technologies are becoming more complex. This is especially relevant in web-enabled applications such as web browsers, email/news clients, VoIP and chat clients which allow the interaction with the web from the client side. Web browsers specifically have become the doorway to the Internet and are currently the most widely used applications and the standard tool for consuming Internet services. This evolution toward web-related applications had a direct impact on the security of such applications. For instance, vulnerabilities and attacks against web browsers became more popular as such attacks compromise the security and privacy and have serious implications for web users. Once a web-related software is infected, the users web interaction can be fully exposed to the attacker. For instance, an infected web browser can expose the victims web addresses, data typed into forms, user sessions and cookies. Moreover, vulnerability risks in a web browser can have a serious implication for intranets (Anupam and Mayer 1998). Most users use the same browser to access information on the intranet as well as the Internet. A user who has been attacked through vulnerable web browser has compromised his or her firewall for the duration of the browsing session (c). Examples of such vulnerability risks against web browsers include key loggers. Key loggers are a form of spyware which can be installed through vulnerability in a web browser and then logs all pressed keys whenever a user visits a certain online banking web site. The increase in vulnerability risks in web-related software is related to the exponential growth of the Internet. As we enter through the second decade of the 21st century, the rapid adoption of the Internet market along its ubiquitous presence will continue to make Internet technologies such as web-related applications a prime target for attackers as they constitute the largest mass of victims. Hypothesis 1a: Vulnerability type will be highly positively related to web-related software applications Hypothesis 1b: Frequency of vulnerability will be highly positively related to web-related software applications Hypothesis 1c: Severity of vulnerability will be highly positively related to web-related software applications System Software: System software refers to the set of computer programs which are required to support the execution of application programs and maintain system hardware. Operating systems, utilities, drivers and compilers are among the major components of system software. Such components are the enablers and service providers to software applications. Among these components, the operating system is the most popular and important one. The operating system market for client PCs has evolved along the lines predicted by theories of increasing returns and network externalities (Shapiro and Varian 1999). But with this increase in network externality, there has been a dramatic increase in vulnerabilities (cite xxx). For instance, between 2007 and 2009, the number of operating system vulnerabilities almost doubled from 220 to 420 vulnerabilities (CVE 2010). Such increase in vulnerabilities can be caused by several reasons. First, network externality implies larger user base which makes operating systems an a ttractive target for hackers. In addition to that, viruses and worms can spread more rapidly because of the large installed user base and network effect. Second, the architecture of some operating systems like Windows allows vulnerabilities to gain a direct access to the operating system files through external scripts; meaning that if malicious scripts are sophisticated enough, they can exploit system files through software applications or through system software directly. And last, the fame factor for discovering vulnerabilities in systems with significant installed user base make them potentially significant target for hackers. Lately, new technologies such as web-based cloud computing, virtualization and Just enough Operating System (JeOS) have been gradually diminishing the importance of the traditional operating system (Geer 2009). With cloud computing technologies, users can access web applications through their web browser; meaning that an OS like Google Chrome will only be needed to run the web-browser. Moreover, with virtualization technology a personal computer or a server is capable of running multiple operating systems or multiple sessions of a single OS at anytime without having the user rely on a single OS. Similarly, Just enough Operating System (JeOS) focuses on running applications which require minimal OS. As these technologies are gaining popularity and becoming more adopted by users, the role of an OS is starting to decrease so does its network externality. With this is mind, we hypothesize that attackers interests and vulnerability risks will gradually shift to other technologies as they become more popular. Hypothesis 1d: Vulnerability type will be positively related to system software Hypothesis 1e: Frequency of vulnerability will be positively related to system software Hypothesis 1f: Severity of vulnerability will be positively related to system software Web Applications: The remarkable reach of web applications into all areas of the Internet makes this field among the largest and most important parts of the software industry. As of today, the Internet consists of hundreds of thousands of small and large-scale web applications ranging from e-Commerce applications to social networking sites to online gaming. This popularity has attracted large user base which made web applications lucrative targets for attackers to exploit vulnerabilities. Web applications are currently subject to a plenty of vulnerabilities and attacks, such as cross-site scripting (XSS), session riding (CSRF) and browser hijacking (Mansfield-Devine 2008). Hence, the landscape of vulnerabilities has changed significantly during the first decade of the 21st century. Previously, buffer overflow and format string vulnerabilities accounted for a large fraction of all vulnerabilities during the 1990s, but as web applications became more popular, new vulnerabilities and attacks such as SQL injections and XSS attacks exceeded earlier vulnerabilities. According to CVE surveys, security issues in web applications are the most commonly reported vulnerabilities nowadays. In response, web application vendors dedicated more resources towards securing their products as they tend to receive more attention as potential targets because of their large pool of possible victims (Mercuri 2003). The problem of web application vulnerabilities is becoming more complicated with the recent movement towards Web 2.0 technologies. The landscape of Web 2.0 enables new avenue of vulnerabilities by using sophisticated scripts on the client side. Moreover, Web 2.0 websites are becoming riskier than traditional websites because they use more scripting capabilities to allow users to upload content, share information and gain more control. Despite the growth of web applications and Web 2.0, these technologies are still limited by the available resources such as network bandwidth, latency, memory and processing power. More specifically, its argued that web applications are constrained by the capabilities of the web browser they are running in. With this drawback, web application users will ultimately have to rely on their own resources to accomplish magnitudes of tasks. Compared to system and software applications, we hypothesize that web applications will continue to experience vulnerability risks but at a lower rate than other popular software. Hypothesis 1g: Vulnerability type will be least positively related to web applications Hypothesis 1h: Frequency of vulnerability will be least positively related to web applications Hypothesis 1i: Severity of vulnerability will be least positively related to web applications Targeted Operating System Software producers often create applications to run on a single or a combination of operating systems (OS). From a software viewpoint, maintaining security is the obligation of both the OS and the software program. But since computer hardware such as the CPU, memory and input/output channels are accessible to a software programs only by making calls to the OS, therefore, the OS bears a tremendous burden in achieving system security by allocating, controlling and supervising all system resources. For the most part, each of todays streamlines OSs has a main weakness. For instance, earlier OSs such as Windows NT, UNIX and Macintosh had a weakness in their access control policies (Krsul 1998). Such OSs didnt specify access control policies very clearly which meant that applications that ran by users inherited all the privileges that the access control mechanisms of the OS provided to those users (Wurster 2010). An access control policy requires an OS to give a program or a user the minimum set of access rights necessary to perform a task. In his work, Denning (1983) illustrated the working of an access control policy which typically consists of three entities namely, subjects, objects and access rights matrix. Subjects refer to users or domains whereas objects are files, services, or other resources and access rights matrix specifies different kinds of privileges including read, write and execute which are assigned to subjects over objects. A configuration of the access matrix d escribes what subjects are authorized to do. Vulnerabilities in OSs tend to rely on weaknesses in configuration of access control matrices to gain access to software applications and system software. This creates a serious problem since vulnerabilities can exploit software applications through the OS gain access and ultimately take over the system. An example of an access control policy failure is Java virtual application. The Java virtual machine was among the applications which defined, and enforced its own access control matrix. Its sandbox was compromised of a number of OS components which ensured that a malicious application cannot gain access to system resources. But once the access control mechanism of the virtual machine fails, a malicious applet can be given access beyond the sandbox (McGraw and Felten 1997). Meaning that the OS can allow a malicious applet full access to the users files because to the OS there is no difference between the virtual machine and the applet. Moreover, even with an access control policy in place, consideration must be given to system design. The OSs which are in use today have different architectures and are designed with different kernels without considering security and controlled accessibility as significant design criteria. For instance, a large portion of UNIX and Linux vulnerabilities result from boundary condition errors which are commonly known as buffer overflow (cite xxx). These boundary conditions result from a failure to properly check the bound sizes of buffers, arrays, strings. Attackers tend to exploit this weakness in UNIX and Linux OSs to gain access to system software and software applications. On the other hand, vulnerabilities in Windows OS tend to be evenly divided among exceptional conditions, boundary conditions and access control validations (cite xxx). With these types of vulnerabilities root break-in and execution of arbitrary code are common types of attacks. When it comes to writing software for different platforms, programmers must acknowledge the potential vulnerabilities and threats targeting their software. Since different OSs have different vulnerabilities, the task of designing a secure application tend to become much difficult since they have to consider vulnerability risks of each OS. Therefore we hypothesize that: Hypothesis 5a: Vulnerability type will be positively related to software which target more operating systems Hypothesis 5b: Frequency of vulnerability will be positively related to software which target more operating systems Hypothesis 5c: Severity of vulnerability will be positively related to software which target more operating systems Software Free Trial Free trial strategy is used by many vendors to promote and sell their goods. This strategy is especially popular and found to be effective to promote and sell digital goods such as software and music. Unlike physical goods, the intangibility of digital products prevents consumers from assessing the products before the consumption and adoption (Heiman and Muller 1996). Such uncertainty of product functionality reduces consumers motivation to adopt the product and is considered a source of market failure. Nowadays, offering software free trial at a low marginal production cost has resulted in the prevalence of free trials strategy. For the software market, there are two strategies of free trial, namely a fully functional free version with limited trial period (time locked version) and a limited functional version (demo version). Each of these strategies has its own advantages and disadvantages. For instance a demo version has an advantage of capturing the network effect from both trial users and the buyers. In contrast, some consumers may find it adequate to use only the limited functionalities provided in the demo version rather than purchasing the full version software. Similarly, offering time locked software version can negatively affect the software vendor as consumers with limited usage can utilize this short-term to fully take advantage of the free trial without buying the full software product. Based on these trial strategies, there have been numerous studies regarding the effect of free trial on software learning curve (Heiman and Muller 1996), software piracy (Chellappa and Shivendu 2005) and software performance (Lee and Tan 2007). For this study, we are interested in measuring the effect of free trial strategies on software vulnerabilities. Although software vendors often release demo or time locked versions, such versions can still contain good source of information for the attackers. Attackers typically misuse the trial versions to look for, find and exploit vulnerabilities. Furthermore, attackers can reverse engineer the limited code and find vulnerabilities (Sutherland et al. 2006). This technique has become particularly important as the attacker can apply vulnerabilities found in free trial versions to exploit full version software. Moreover, there are many hacker groups on the internet who specialize in cracking free trial and full versions software and releasing them on the internet under what is known as warez. Such groups usually compete with one another to be the first to crack and release the new software. These cracked versions (warez) can also serve as potential targets for attackers looking for vulnerabilities. Hence, while providing free trial versions of software by software vendors is a marketing strategy, vendors should also expect such free versions can become targets for vulnerabilities and early exploits. Hypothesis 6a: Vulnerability type will be positively related to software which offer trial versions Hypothesis 6b: Frequency of vulnerability will be positively to software which offer trial versions Hypothesis 6c: Severity of vulnerability will be positively to software which offer trial versions Software License The diversity of the software business model drives the need for different types of software licenses. A software license is a legal agreement forming a binding contract (relationship) between the vendor and the user of a software product and its considered an essential part in the evolution of the software to a market product. Software license is regarded as one of the fundamentals of OSS as there are currently close to 73 different licenses (Perens 2009). Most OSS licenses are classified based on the restrictions they impose on any derivative work (Lerner and Tirole, 2005). Examples of OSS licenses include GPL, LGPL and BSD. General Public License (GPL) is currently the most popular OSS license which states that any derived work from other GPL software has to be distributed under the same licensing terms. The Lesser GPL (LGPL) and the Berkeley Software Distribution (BSD) are other popular alternatives to GPL with similar characteristics. OSS projects rely heavily on code reuse as shown by DrDobbs (2009). In their work, 1311 OSS projects were analyzed and 365000 instances were found of code reuse among those projects. In principle, most of the OSS licenses allow programmers to modify and reuse existing code. This degree of code inheritance can have positive and negative effects on the security of the software. In their work, Brown and Booch (2002) discussed how reuse of OSS code can inherent insecurities and talked about the concerns which companies have regarding OSS code and how it was developed and in particular the origins and the reuse of its code. Indeed an analysis study by Pham et al. (2010) suggested that one of the key causes of vulnerabilities is due to software reuse in code, algorithms/standards, or shared libraries/APIs. They proposed the use of new model which uses algorithm to map similar vulnerable code across different systems, and use the model to trace and report vulnerabilities to software vendors . Reuse of OSS software has caused concerns as developers might inherent vulnerabilities from existing code but regardless of the open source community or software vendors positions on this debate, the possibility of security issues by reusing OSS code has been sufficient to the point where some vendors stopped reusing OSS code in their software. From a security perspective and when it comes to reusing OSS, vendors tend to follow one of the following approaches. Abandon OSS software; only reuse code which has been extensively reviewed; or maintain a relationship with the OSS community and get involved with the development process (Brown and Booch 2002). Its our belief that licenses which allow developers to reuse source code will be more susceptible to vulnerabilities than closed source proprietary licenses. Meaning that software licenses which allow code reuse are more likely to inherit or contaminate derivate work. In contrast, commercial licenses which dont share or allow code reuse are less susceptible to inherit or contaminate vulnerabilities. Hypothesis 4a: Vulnerability type will be positively related to open source software licenses Hypothesis 4b: Frequency of vulnerability will be positively related to open source licenses Hypothesis 4c: Severity of vulnerability will be positively related to open source licenses Source Code Availability Security of open source software (OSS) and closed source software has been a hot topic with many arguments repeatedly presented. Advocates of OSS argue that more reviewers strengthen the security of the software as it eases the process of finding bugs and speeds it up given enough eyeballs, all bugs are shallow (Raymond and Young 2000). Opponents of this idea disagree and claim that not all code reviewers and testers have enough skills and experience compared to code reviewers at companies who are more skilled at finding flaws. The argument is that oftentimes code reviewers and testers need to have further skills other than programming such as cryptography, stenography and networking. Moreover, proponents of closed source software claim that security by obscurity is the main strength of closed source software since its harder to find vulnerabilities when the code is not accessible. However, proponents of OSS argue that its possible to gain access to closed source code through publicl y available patches and disassembling software (Tevis 2005). Its important to note that the impact of the availability of source code on security depends on the open source development model. For instance, the open source cathedral model allows everyone to view the source code, detect flaws/bugs/vulnerabilities and open reports; but they are not permitted to release patches unless they are approved by project owners. OSS projects are typically regulated by project administrators who require some time to review and approve patches. Attackers can take advantage of the availability of source code and published vulnerability reports to exploit them (Payne 2002). However, proponents of OSS argue that vulnerabilities in OSS projects can be fixed faster than those in closed source software because the OSS community is not dependent on a companys schedule to release a patch. Despite the continuous debate on OSS security, advocates from both sides agree that having access to the source code makes it easier to find vulnerabilities but they differ about the impact of vulnerabilities on software security. First of all, keeping the source code open provides attackers with easy access to information that may be helpful to successfully launch an attack. Publically available source code gives attackers the ability to search for vulnerabilities and flaws and thus increase the exposure of the system. Second, making the source code publicly available doesnt guarantee that a qualified person will look at the source and evaluate it. In the bazaar style environment, malicious code such as backdoors may be sneaked into the source by attackers posing as trustful contributors. For instance, in 2003 Linux kernel developers discovered an attempt to include a backdoor in the kernel code (Poulsen 2003). Finally, for many OSS projects there is no a priori selection of program mers based on their skills; project owners tend to accept any help without checking for qualifications or coding skills. Given the issues surrounding source code availability in OSS, we hypothesize that making source code publically available will induce attackers and increase vulnerability risks. Hypothesis 1a: Vulnerability type will be positively related to source code availability Hypothesis 1b: Frequency of vulnerability will be positively related to source code availability Hypothesis 1c: Severity of vulnerability will be positively related to source code availability Software Programming Language Selecting a suitable programming language is one of the most important decisions which have to be made during software planning and design. A chosen programming language has direct effect on how software ought to be created and what means must be used to guarantee that the software functions properly and securely. Software programs which are written using an insecure language may cause system dependent errors which are known to be difficult to find and fix (Hoare 1973). For example, buffer overflows vulnerabilities and other low-level errors are well known issues in C and C++ languages (Cowan 1999). As of today, there exist numerous programming languages but the topic of security in programming languages has been widely disregarded as its believed that programming errors and flaws should be eliminated by the programmers themselves. Current approaches to this issue are essentially ad hoc where best programming practices and secure programming techniques are implemented during or after the design stage. Although this approach helps in preventing coding errors and flaws by relying on programmers skills and experience, it is difficult to say with any certainty what vulnerabilities are prevented and to what extent. More importantly, the ad hoc approach doesnt protect against new and evolving vulnerabilities as it only handles known vulnerabilities and specific coding flaws. In his paper, Hoare (1974) stated that a programming language is secure only if the compiler and run time support are capable of detecting flaws and violations of the language rules. The main issue with this statement is that current compilers and debugging tools are not reliable since they parse code differently; therefore, its impossible to guarantee the same results for programs. Additionally, such tools dont help the programmer in finding vulnerabilities or flaws as they only report syntax errors. Typically, compilers and debugging tools dont allow for security checks on debugging runs, therefore no trust can be put in the results. An evolving trend in secure programming has been the use of formal language semantics. Formal language semantics try to reason with and prove security properties of the code. For example, in their paper, Leroy and Rouaix (1998) developed a formal technique to validate a typed functional language to ensure that memory locations always contain appropriate values to avoid buffer overflow vulnerabilities. Although the use of formal language semantics has been advocated (Dean et al. 1996, Meseguer and Talcott 1997, Volpano 1997), it wasnt widely adopted among programmers. When it comes to software languages, security is essentially dependent on numerous factors such as language developers, programmers and debugging tools. With so many factors, we believe that correlating software language with vulnerability risks will be insignificant. Hypothesis 2a: Vulnerability type will be insignificantly correlated with software language Hypothesis 2b: Frequency of vulnerability will be insignificantly correlated with software language Hypothesis 2c: Severity of vulnerability will be insignificantly correlated with software language Targeted Software Users There are many different types of computer users with a wide range of background, skills, and learning habits. Computer users are typically classified into two distinct groups, namely sophisticated and novice (unsophisticated) users. Sophisticated users have an advanced understanding of computer and Internet technologies; they tend to be more security-aware. Novice users refer to non-technical personnel who are not experienced with computers and the Internet; they rely on computers for simple tasks such as word-processing, spreadsheets, and occasional web surfing. Such users are more prone to security issues due to their inexperience. For instance ignoring software updates and security patches, failing to run essential protection utilities such as an anti-virus or firewall applications are typical security issues with novice users. Because of differences in experience level between both groups, some argue that vulnerabilities affect novice users more than sophisticated ones. Although this might be true for viruses and worms and old vulnerabilities, but when it comes to dealing with zero-day vulnerabilities everyone becomes a victim regardless of their sophistication level. Zero day vulnerabilities refer to unreported exploitable vulnerabilities for which a patch is not available from software vendors (cite xxx). Moreover, when it comes to attackers and potential targets, eventually everyone is a target. Despite the type of computer users, the objective of vulnerability attacks is to hack as many computers as possible with the least amount of effort (Spitzer 2002). Attackers tend to focus on a single vulnerability and use automated scanning tools to search for as many systems as possible for that vulnerability. Such automated tools are often called autorooters and can be designed to scan a specific network for vulnerable machines or scan a range of IP addresses until a victim is found. Its important to note that these tools dont distinguish between software user s as they look for any vulnerable target in sight. Hypothesis 8a: Vulnerability type will be insignificantly correlated with to targeted software users Hypothesis 8b: Frequency of vulnerability will be insignificantly correlated with to targeted software users Hypothesis 8c: Severity of vulnerability will be insignificantly correlated with to targeted software users Software Price Software price plays an important role in modifying the individuals attitude toward the software in many ways. For example, research studies which looked at software piracy found that software price to be a significant factor (incentive) which influenced the intention to pirate (Gopal and Sanders 2000). In their work, Peace et al. (2003) conducted a survey of 201 respondents and found that software price was among the major reasons for illegally copying software. Following the same analogy, studies have shown that attackers attitudes and hackers motivations for finding vulnerabilities are associated with several factors such as: peer approval, self esteem, politics, publicity, financial gains, curiosity and sabotage (Shaw et al. 1999). Within the hackers community, hacking achievements typically help individuals gain higher and more respectable status as it refers to the persons skills and mastery level. Reaching a higher status is oftentimes associated with noteworthy achievements such as hacking popular software. For those hackers who seek publicity or peer approval, they tend to target software with large user base due to their significant reach. So despite software price, hackers look for vulnerabilities in open source and proprietary software as long as there is a significant user base. Similarly, infamous social networking sites such as Facebook and Myspace are constant vulnerability targets regardless of their service cost. Outside the hackers community, hackers incentives tend to vary among political reasons (example: Google-China Hacking 2010), financial gains (example: ransom money attacks), self esteem and sabotage. Again, by analyzing each incentive, we find that software price doesnt play any role in v ulnerability risks. We therefore hypothesize that: Hypothesis 7a: Vulnerability type will be insignificantly correlated with to software price Hypothesis 7b: Frequency of vulnerability will be insignificantly correlated with to software price Hypothesis 7c: Severity of vulnerability will be insignificantly correlated with to software price

Thursday, September 19, 2019

Understanding Multiple Sclerosis :: Health Medicine

Understanding Multiple Sclerosis Diagnosis of Multiple Sclerosis There are several diagnostic tests used to detect Multiple Sclerosis (referred to as MS). An MRI (multilple resonance imaging) can confirm a diagnosis by showing lesions and sites of inflammation in the brain. Although the presence of lesions is common in Multiple Sclerosis sufferers, the absence of lesions is not a sign that the disease is not active. An electroencephalogram (EEG) can isolate changes in brain waves when introduced to audio or visual stimuli. The Evoked Potential test measures the speed with which nerve impulses travel. Demyelination significantly reduces the speed of nerve signal transmission and can be detected with this test. Lumbar punctures and spinal taps are also used to test spinal fluids for the presence of certain immuno-proteins present in Multiple Sclerosis sufferers. Facts about Multiple Sclerosis Multiple sclerosis is an inflammatory and demyelinating disease of the central nervous system and is believed to be immune mediated. This debilitating disorder affects at least 350,000 people in the United States. The disease occurs in young adults with the mean age of onset of 30 years. Women make up 70% of the MS population. This gender preference remains unexplained. Clinical Features The symptoms of MS may be mild or severe, of short or long duration and may appear in various combinations, depending on the area of the nervous system affected. Complete or partial remission of symptoms, especially in the early stages of the disease occurs in approximately 70% of MS patients. The initial symptoms of MS are often blurred or double vision, red-green color distortion, or even blindness in one eye. However, visual problems tend to clear up in the later stages of MS. Inflammatory problems of the optic nerve may be diagnosed as retrobulbar or optic neuritis. MS patients will have an attack of optic neuritis at some time or other and it will be the first symptom of MS in approximately 15 percent. This has led to general recognition of optic neuritis as an early sign of MS, especially if test also reveals abnormalities in the patient's spinal fluid. Most MS patients experience muscle weakness in their extremities and difficulty with coordination and balance at some time during the course of the disease.

Wednesday, September 18, 2019

He Knows He Was There :: essays papers

He Knows He Was There Human beings have a tendency to need some sort of tangible or perceivable proof in order to fully understand a concept. Most people will not take what is being told to them as true unless they are shown somehow that it is true. In a work of fiction, the author strives to create a tangible setting for the reader to captivate him in his reading experience. The author uses believable scenes to reveal character traits and various themes by showing how the characters act and react in different situations. This is apparent in F. Scott Fitzgerald’s greatest work, The Great Gatsby. This novel is set during the 1920’s in the New York City area. It revolves around the events and lives of a group of individual. These few people are of higher social rank. Fitzgerald takes the reader into this high society through the eyes of Nick, the narrator. His use of a first hand narrator aids him greatly in revealing the wasteful and greedy moral values of the characters and the soci ety in which they live in his novel, The Great Gatsby. During the 1920’s, wasteful use of money by the elite was rampant. In The Great Gatsby, there is a scene that depicts a sort of social gathering in a New York apartment. Tom and Nick, wealthy residents of the ‘Eggs’, are present. Myrtle and her sister Catherine are also present. Tom is currently having an affair with Myrtle, so she has a connection with the rich culture. Her sister Catherine, on the other hand, does not have any connection with such people. Nick, the narrator of the novel, provides us with a first hand account of the scene: â€Å"The bottle of whisky - a second one - was now in constant demand by all present, excepting Catherine who ‘felt just as good on nothing at all’† (39). This scene, depicted by a narrator who was present, reveals many details about the characters that otherwise could have not been displayed. It shows a group of people being dependent on a substance to have fun. The people participating are mainly the ri ch or individuals with some connection to the rich. To many, alcohol is a symbol of escape. Somebody abuses alcohol in order to run away from reality and to seclude himself from society. It seems silly that such an apparently well off group of individuals would want to escape reality.

Tuesday, September 17, 2019

John D Rockefeller as a captain of Industry Essay

John D Rockefeller, founder of standard oil was a captain of industry, he was led to the path of efficiency through his mother and father when he was younger; this helped him grow into one of the biggest companies of the time. He soon started Standard Oil and became a billionaire. Despite the robber barren ways he got to the top, he got there and set a way for American corporations of the future. His father started him on the road to business, when John D Rockefeller was seven his father loaned him five dollars at high interest rates. However harsh this may seem this paved the way for John. He soon made the correct business choice to lead him to the top. He started doing small job around the neighborhood such as digging up potatoes and saved every cent. He soon learned the harsh ways of his father such as buying pound candy and selling it by the piece and by age, thirteen he was lending fifty dollars at compound interests. His mother led him on a path of efficiency, which would prove to be key to his career. His mother taught him the proverb that willful waste makes woeful want. Soon John was efficient on everything, how quickly he ate and hiring people to do the task, which he thought time consuming. One instant he saved 1.54 per oil barrel by just putting one less drop of sealant on each barrel. John D Rockefeller was a genius businessman. He had a natural knack for it. He reduced the competition by inventing new ideas such as quantity discount, where he would charge less if the customer bought more. This way he could make people buy his oil instead of competitors because it seemed cheaper, and he was making the customer buy more because it seemed like a good deal. Rockefeller also saved money by demanding lower transportation costs, which he could do because he was dominating the business and without him, there would be no business. Soon his competitors were paying five times as much in transportation costs. Rockefeller at one point just eliminated the competition. He purchased his competitors to ensure he would undercut his competitors’ prices. It helped kerosene drop from 58 cents to 26 from 1865 to 1870. Rockefeller also started the Standard Oil Trust. A trust is a business combination in which a single board of trustees controlled a group of member corporations. He came up with it to efficiently control the  companies he had acquired. However soon this practice was seen as illegal and unfair because he dominated the market and could subject the customers to any price he decided, yet it was still ingenious. Not only did John D Rockefeller come up with creative new ideas that helped him to become more efficient and eliminated his competitors, which made him the largest and richest company but he also adjusted to the times. When a Dartmouth professor found a way to refine the oil he quickly jumped on the market. Soon the internal combustion engine was invented and Rockefeller ordered the production of gasoline and machine oils immediately and they were ready for mass production by the time the first car was reveled in 1887 John D Rockefeller was a captain of industry and he deserves the title. He was an ingenious man who set up the way for big American cooperations of the future. Standard Oil was used all over the world from India to Africa. By 1878 alone, he had control ninety percent of he held ninety percent of the oil refining capacity in the United States alone. No man had ever been able to reach Rockefellers fortune at his peak. Clearly, John D Rockefeller is the ultimate captain of industry.

Monday, September 16, 2019

American Popular Culture In Australia Essay

The 1950s and 1960s were times of unprecedented change, and Australian society was influenced greatly by American popular culture, through various mediums, such as: music, film, television and fashion. This especially affected teenagers. It will be explained how Australian society was impacted by American popular culture, and also why American popular culture had such an affect. Australian developed its own responses to these influences, and the extent of this will also be explored. The 1950s meant the emergence of the teenager; it also brought peace and prosperity to many. And during the fifties there were far more American films released in Australia, and they became more popular than many Australian films. Films were of great influence to the youth of the 1960s, films such as The Wild One and Rebel Without A Cause showed a new type of teenager, one who was not only different, but was rebellious. This new view of what a teenager could be gave birth to the idea of â€Å"bodgies† and â€Å"widgies† which is what many teenagers became known as during the fifties. These â€Å"bodgies† and â€Å"widgies† were greatly influenced by the culture of rock-‘n’-roll music. The term â€Å"Rock-‘n’-Roll† was invented in the mid 1950s for a new and exciting music. This type of music was to become popular beyond belief, it not only began to dominate the tastes of America’s youth, and it soon became the popular music of choice for youths throughout Australia, too. Popular artists such as Elvis Presley and Bill Haley and the comets were among the top entertainers influencing Australia’s impressionistic youth. The lifestyle trends of Australia were also, to a great extent, impacted by the trends of America. During the 1950s the lifestyle of a typical American was very different to that of a person during the forties. The lifestyle was more laidback, mainly due to the end of the war; people believed that they were entering a new age, where anything was possible. Australia followed Americas lead, and many of their lifestyles changed with the Americans. By the late 1950s, television was the most important form of mass entertainment and culture; it had become an important part of many people’s lives. Through television Australia saw the American life, and then modelled (to a certain  extent), parts of their lives on what they saw of the American lifestyle. During the 1960s, Australian society remained hugely affected by American popular culture. And although the culture of the youth was no where near as strong or powerful as it was in America, Australia was, to a great extent influenced by what was happening in America at the time. What happened in America was almost always mirrored by Australian teens (although to a smaller extent). Fashion-wise, the sixties saw the flowering of the Hippie Movement. All of a sudden the tight black pants, bright socks and hair grease of the fifties were gone, and in came the mini-skirt, velvet pants and paisley shirts. As American teenagers began to grow their hair longer and longer, it seemed Australian teenagers opted to follow this new trend. Films took on a new genre; the films of the sixties began to portray the story much more realistically. Blockbusters such as Easy Rider were on the scene. In the film industry in the sixties Britain tended to lead, but America adjusted, and Australian society continued to follow. Of course, there is one aspect of the sixties, which will remain in everybody’s mind forever: Psychedelia. A style like no other. It was a period like no other, a world of hallucinogenic drugs, swirling shaped and luminous colours. It was LSD, which provided the mental and visual stimulus behind psychedelia. Psychedelic patterns and colours quickly found their way in to mass-produced fabrics and clothes. Psychedelia also influenced the music industry significantly, with great bands such as the Beatles producing songs such as Lucy in the Sky With Diamonds with thinly disguised references to drugs. The Beatles were hugely popular in Australia as well, and it was the Beatles tour of Australia in 1964, which proved just how much this American pop group influenced these Australian citizens. During the tour parents and police were ignored, and Australian teenagers were lapping it up, the overseas excitement was finally there for then to fully be a part of. But the psychedelic styles of the sixties were so strong and unsympathetic to  other styles that it was inevitable that Psychedelia departed as quickly as it arrived. The fifties and sixties were completely different in so many ways; the times had changed a lot in the transition of decades. The types of music, for one, were in great contrast. By the sixties the rock-‘n’-roll and pelvic thrusting of the fifties had transformed into the pop, rock and folk music of the likes of the Beatles, the Rolling Stones and Bob Dylan. Teenagers changed a lot over the two decades a lot, too. The tight pant, leather jacket bodgies, with their greased hair, and the widgies, with their rope petticoats and flared dresses, were replaced by the teenagers of the Psychedelic era. These teenagers preferred the swirled shapes and bright colours, with their newly found mini-skirts, and for the guys it was paisley shirts. Although the two decades were different in themselves, there is still a parallel running between the two. Both were times of change, with popular culture culminated for the newly recognised youth, each decade had their own brand of pop music, and their own brand of teenagers. However, the teenagers of the sixties, despite the overuse of drugs, remained a lot more politically minded, by holding many war protests, for example. The fifties played home to a time where the brand teenager was first recognised, and the sixties were a carry on from this, an expansion where teenagers gained more and more out of life and the world. We have seen how Australian society was influenced by American popular culture in the fifties, now the question is why. There were many factors that contributed to this sudden change in ideals. One of the main factors involved was the end of WWII, WWII had brought America to Australia, it became one of Australia’s major trading partners, and our major investor. Economically and culturally we identified with America. Also, following the war communications around the world had been significantly improved, thus giving Australia greater opportunities to be connected with America, and therefore see and â€Å"copy† (in a way), just what they were doing. Another  factor of significant importance is the impact that television had on society overall. With the intervention of television Australian’s had a clear and self-evident view of America, as many of the programs shown on Australian television were in fact American. With more and more people seeing these programs the excitement grew and the popular culture of American society grew in Australia. Through the passage of time Australian culture absorbs these aspects of American culture and they become linked with our identity. The reasons for why Australia was impacted so greatly in the sixties can be traced back through the fifties. As the fifties went on America seemed to continue to dominate more and more. And by the time it reached the sixties there was an abundance of America programming on Australian television and radio, which influenced many young, impressionably minds. Another main factor was that Australia’s economy had substantially increased by the sixties, due significantly to such Government programs as the Assisted Immigration Scheme. With more money to spend, many Australian youths put their money to items, which then enforced pop culture, such as CDs and popular fashions of the time. But it all came down to the fact that America sells its culture and products to the world and teenagers in the western world are vulnerable to advertising. And perhaps the most important factor in all this was the Vietnam War. Many soldiers spent their R&R time in Australia. This impacted greatly upon the youth of Australia because many servicemen brought with them their own music and style which influenced the society that they brought it to. Of course, Australia didn’t just sit back and watch the excitement unfold, Australian society had their own responses to the latest trends. The culture, of course, in Australia was no where near as strong as that in America at the time. But still, in many ways Australia decided to copy the popular trends of the time, but in many other ways they had their own. Young Australians formed their own gangs, made up of â€Å"bodgies† who wore tight black pants and greased their hair and their female counterparts â€Å"widgies† who wore rope petticoats and flared dresses, throughout the fifties these groups became increasingly violent. These groups were in response to such  American hits as Rebel Without A Cause and The Wild One. The way that media targeted teenagers and advertising gave them a larger opportunity to get involved with the latest popular trends. Because teenagers got more money they had the means to respond to this advertising in the sixties. They had the means to be a part of Psychedelia (to a small extent). We can see from all this that the fifties were a big turning point for Australian society. This was the time were American had first been brought to Australia, until the 1950s Australia had not had as much contact with America. But through means of television and improved communications American popular culture influenced Australian society a great amount, in music, film, lifestyle and fashion. This same thing worked through the sixties, Australian society remaining significantly impacted upon by American popular culture, and we can see that still today we are affected to a certain extent, by American Popular culture.

Sunday, September 15, 2019

Cause and Effects of Working in High School Essay

Sally is a junior in high school; she works 38 hours, she’s engaged in sports, and is slipping from honor roll. Sally has no personal life due to the fact that she works a job while in high school. It’s a miracle she even gets her homework done sometimes. There are many teenagers in America that have experienced the negative effects from working while in high school such as, no social life, less time spent on homework, and diminished academic success. A personal life is imperative to have in high school; working a job while a high school student creates less time to have one. Some jobs put people on call, so students wouldn’t be able to make plans with their friends due to the fact that they don’t know when they could be called into work. Some jobs put student workers on call, while others just require them to work long hours. The long hours that students are working, make it so that a schedule looks something like: school, work, then home. They eventually will have no time for hanging out with their beloved friends because work consumed their lives. Getting a job in high school could ruin a teen’s personal life. One of the most time consuming things about school is the homework. If a student is willing to come home from work and stay up till 3am trying to get their homework and projects done then they should be fine with a job. But most students like precious sleep. Work would limit a student on the amount of time they had to complete their homework. And if a student doesn’t do their homework then they’re grades will drop. Slipping grades is a big issue for athletic students. If a student has an ‘F’ they become ineligible to play sports. A job would cause a student to fail to complete their homework. A job would eventually cause a student to lose focus on their academics. With already slipping grades, a student with become very unsuccessful with their academics. They’ll have to drop AP and ho nors classes, switch diplomas, and some students may possibly lose scholarships to their dream colleges. Their academic success will diminish with a job. Sally is a key example of a student who was once very excellent at school, but got a job and became below average. The negative effects that harm a high school student’s education are, no personal time, less time spent on homework, and academic struggle.

Saturday, September 14, 2019

Emotional Quotient Essay

Daniel Goleman has provided the most comprehensive view to date of the skills necessary for healthy personality development. Goleman reported that the usual way of looking at intelligence as only psychological abilities contributes about 20 percent to the factors that determine life success. 80 percent of the skills necessary for life success is determined by what he calls emotional intelligence (EQ) (Wilson, Douville-Watson, & Watson, 2002). In humans, infancy is a critical window of time. If the neurons are not properly formed and connections are improperly made, the effects can haunt a child for his lifetime. When the foundation of the brain’s architecture is properly in place, it can set the stage for future filled with potential. The foundation for emotional intelligence is formed during this period and continues for years (Schmidt, 2007). Recent evidence suggests that temperament and social environment contribute to the development of emotional labeling. Early emotional development suggests that the decoding component of emotion labeling and infants’ expressive responses to the detection of emotion signals has innate determinants and mainly a function of the emotion perception and expression systems. The emotion perception and emotion expression systems in infants are highly pre-adapted to facilitate infant-other communication. Furthermore, early studies showed that one component of EQ, children’s emotional labeling, predicted positive behavioral outcomes, after controlling for verbal and performance components of general intelligence. The ability of young infants to perceive emotion signals, discriminate among them, respond to them in meaningful ways suggest that emotional competence and adaptability has heritability and some independence of psychological development (Roberts, Matthews, & Zeidner, 2002).

Disney Princess

Maegan Cherry Dr. Walker Composition I 15 November 2012 The Princess and the Frog Princess Diana once said, â€Å"Being a princess is not all it is cracked up to be. † This is a true statement in some insistences such as Disney’s 2009 film The Princess and the Frog. The film is based in the 1920’s in New Orleans, Louisiana. The 1920’s was a time period of segregation, and it was not uncommon to see a black person working in a white family’s home. Southern states were more segregated than others, so the film being in Louisiana plays a very important role.Most black people were not as wealthy as white people; therefore they did not have the luxuries of the families they worked for. They tended to live in small houses, and they had to take the train or walk for transportation. Tiana’s family was no different than any other 1920’s African American family. Tiana’s mother, Eudora, worked as a seamstress and a caretaker for â€Å"Big Daddy’s† daughter, Lottie. â€Å"Big Daddy† is a wealthy white man who spoils his daughter, and gives her everything she wants. Eudora took Tiana with her to work where she became friends with Lottie.Lottie grew up with fairy tales, and wanted her life to be nothing short of one. Tiana, on the other hand, did not believe in fairy tales. She believed hard work would get you where you need to be. Tiana had a dream of owning her own restaurant, but she faces many challenges that keep her from achieving her dream. Many people believe that Disney has focused too much on race and the time period, rather than making Tiana a princess. Moon Charania and Wendy Simonds wrote an article titled â€Å"The Princess and the Frog† explaining the different stereotypes presented in the film.Ajay Gehlawat also wrote an article titled â€Å"The Strange Case of The Princess and the Frog: Passing and the Elision of Race† explaining the stereotyping of the races in the fil m. I think Disney did a great job of relating the time period to the characters. The film may have been stereotypical, but it was relevant to the setting. To make the film less controversial I think Disney could have made Tiana a princess in a different time period, so there would not be any stereotyping of the characters. The biggest stereotyping was between the white family and the black family.Being Caucasian in the 1920’s meant you lived a very fortunate life, and you did not experience the hardships that other races may have faced. In The Princess and the Frog, â€Å"Big Daddy† was a typical wealthy Southern man, who gave his daughter, Lottie, anything she wanted. Lottie was portrayed in the film as a spoiled girl. She wanted to marry her prince charming, and live happily ever after. Just like in the fairy tales she grew up with. Charania and Simonds stated, â€Å"Lottie, on the other hand, is a caricature of conventional Disney princesses† (page 70).I agre e that Lottie is portrayed as a typical princess, and I can see how people would think Disney is stereotyping. Since Lottie fits the normal Disney princess characteristics it seems like Disney is making her more of the princess than they are making Tiana. Gehlawat shows more of how Lottie is stereotyped in the white family. Gehlawat stated, â€Å"When Lottie, Tiana’s childhood friend, asks her to prepare a couple hundred of her famous beignes†¦. and drops a wad of bills in her hand† (422). This statement shows that Lottie’s family had lots of money, like a stereotypical white family did in that time period.I agree that Disney does portray the white family in a stereotypically way, but I also think that it was appropriate to fit the time period. Just like the white race the black race also had characteristics that can be put into a stereotypical way. Tiana’s family was very poor and her mother, Eudora, worked as a seamstress for â€Å"Big Daddy†. Tiana and her father had a dream of owning their own restaurant. After, her father died Tiana worked as a waitress to make the dream a reality. By Eudora working for a rich white family it brings back the idea of slaves, which is another way of stereotyping the African American race.Tiana had to work very hard for everything she wanted in life; it was never handed to her on a silver platter, like it was for Lottie. Tiana lived in a much smaller house than Lottie, and they were very close to their neighbors. By Disney making Tiana a frog for most of the movie, some people have argued that it is degrading to the black race. Gehlawat stated, â€Å"What becomes lauded in the process is the representation of a black girl as an animal, or the conflation of blackness with bestiality† (418). I disagree with Gehlawat’s statement. I think that Tiana being a frog was taken out of context. Her being a frog as just a fun aspect to the movie, and was not intended to be a racial a ttack on the African Americans. Another way the film stereotyped the black race, was by the real estate brokers telling her that since she is black she should not have such big dreams. Charania and Simonds stated, â€Å"When, Tiana, as a young adult dreaming of opening her own restaurant, is told by the real estate brokers of her dream property that â€Å"a women of her background† should not strive so high† (70). I think that this is a stereotyping comment that is made in the movie, but I do not think this comment was made in direct to blacks in today’s society.I feel that any stereotyping made was fitting to the time period the film was set in. In today’s society being stereotyped in some way is a common thing that people need to learn to live with. The 1920’s was a sad part of history, but it did happen. It is not a bad thing to remind people about what things were like in history. Disney made an effort to show how far America has come since the 1920’s, by making an African American princess. They could have just made Tiana a princess, like the past Disney princesses, and that might have made the film a little less of a controversial issue.Everything and everyone will be stereotyped at some point in life. It is how the people respond to it that will make the difference on the future generations. Works Cited Charania, Moon and Wendy Simonds. â€Å"The Princess and the Frog. † American Sociological Assosiation. 2010. Vol. 9. No 3. 69-71. Print. Gehlawat, Ajay. â€Å"The Strange Case of The Princess and the Frog: Passing and the Elision of Race. † Journal of African American Studies 14. 4 (2010): 417-431. Academic Search Complete. Web. 14 Nov. 2012. The Princess and the Frog. Dirs. Ron Clements and John Musker. 2009. Walt Disney Video. 2010. DVD.