Tuesday, August 25, 2020

Ballard Integrated Managed Services Essay Example for Free

Ballard Integrated Managed Services Essay When Barbara Tucker, General Manager for Ballard Integrated Managed Services, Inc., understood that her employee’s mentalities and practices were on a declining course, Barbara realized she should act immediately. Barbara directs 452 laborers isolated into three divisions, each including its own supervisory crew; these divisions are food administration, neighborliness and upkeep. So as to fix the issues with workers, Barbara needed to distinguish the difficult first; with the assistance of associates, Barbara had the option to make an arrangement. The arrangement distinguished and expressed the issue, reason, look into questions and theory for the examination; Barbara additionally needed to choose which instrument to use for information assortment. Barbaras look into plan distinguished how the information would be gathered and recognized estimations for the factors engaged with her investigation. When the examination was finished, the information was investigated by dispensing with the information input blunders. At long last, an end must be made about the suitability and pertinence of the information to meet a definitive motivation behind the investigation. A more critical investigate the exploration and the execution of the arrangement will offer administration the responses to their inquiries concerning worker spirit. BIMS the board includes saw negative changes inside the organization in the course of recent months. The turnover rate for the organization has expanded by near 9%, the utilization of debilitated time has expanded, the executives is seeing a lot of representatives killing time all through their work day as opposed to working, and the nature of work has declined too, making protests from the Douglas Medical Center organization, which contracts BIMS. Lamentably for Barbara and her group of directors, representatives leaving the organization have not left any intimations with regards to why these things are going on when post employment surveys were led, leaving this supervisory crew to investigate all alone in order to find arrangements. Barbara and the managersâ involved in discovering answers for the undeniable issues choose to utilize a representative study instrument so as to gather information which is believed to be applicable; HR chief Debbie Horner was placed accountable for making the worker overview since she finished her MBA and put together her theory with respect to worker inspiration. Debbie made a study with ten inquiries posing to laborers to communicate their view about working conditions, move hours, nature of preparing, and level of remuneration, reasonable treatment, inner organization correspondences, and employer stability. The representatives were asked to answer the accompanying inquiries on a scale from one to five, with five being extremely positive; 1. How well do you appreciate functioning for BIMS? 2. You make the most of your doled out move. 3. Your solicitation for your ideal move was satisfied. 4. How frequently have you phoned in wiped out in the most recent month? 5. You are all around prepared for your work. 6. You are paid decently for the work you do. 7. Your administrator treats you decently. 8. Your supervisor’s manager treats your division decently. 9. The organization is acceptable at imparting. 10. You don't expect that you will lose your employment. A couple of socioeconomics were additionally included so that Debbie could isolate reactions by division; Debbie included socioeconomics on the grounds that she needed to register engaging and recurrence strategies, and afterward further investigation the information for potential connections. The Quantitative research done for this situation was made as a worker overview so as to get a brief look at employee’s contemplations and emotions about their activity and to disentangle whether representatives feel they are being dealt with decently. This overview was dispersed with finance checks initially and an update message was conveyed with the accompanying finance checks. The instrument to be utilized is a study dependent on the inquiries that were posed of the workers, the kind of factual poll was inferential insights it depended on questions asked of the representatives and was given to an example size of assessed 449 workers; be that as it may, the manner in which the review was regulated was not viable for the 449 workers to finish and just 78 representatives finished the study. The variable is quantitative and coded with discrete data, which is helpful for the kind of overview utilized, and obviously shows holes between values, anyway it isn't delegate to closing a finding because of the example size being littler then what the review was structured and made arrangements for. Lamentably, the General Manager was not fruitful at regulating the overview that brought about a 17% reaction rate, which doesn't show a goodâ sample size nor does it create the outcomes planned to make solid enhancements and changes to the organization. Reference Engaging versus Inferential Statistics Whats the Difference. (December 1, 2011). Recovered from http://www.mymarketresearchmethods.com/engaging inferential-measurements contrast/

Saturday, August 22, 2020

The Project Managment Office System

The Project Managment Office System Free Online Research Papers The task office is the workplace or office answerable for setting up, keeping up, and authorizing venture the executives procedures, methods, and measures. It offers types of assistance, backing, and confirmation for venture administrators [web definition]. From a more extensive perspective, if an association embraces a couple of undertaking at some random time, it might ready to effectively actualize venture the executives discipline. Nonetheless, the bigger an association gets, and the more tasks that are executed at once, the more troublesome it becomes to build up an extensive procedure, train everybody and uphold the reliable utilization of the innovation on all activities. Without this consistency, the full estimation of actualizing a typical estimation of a task the executives approach isn't reached (TenStep, Inc). There are numerous associations that have begun understanding the potential benefit of setting up a Project Management Office to reinforce their upper hand. The PMO structures venture the board into a sorted out, deliberate methodology that incorporates the accompanying objectives (Engle, 2005): 1. Project Definition: Goals and targets, association outlines, and jobs and obligations are reported. A few organizations embrace a contract that spreads out each part of the venture before the primary dollar is spent. 2. Project arranging and control: The contract records what could possibly be done, the task plan spreads out how it will be practiced. The task plan incorporates the timetable, required assets, and financial plan. 3. Issue Management: Management must distinguish and address unexpected issues in a convenient way. Issues in this sense are primarily the issues that should be tended to in the application that simply created. 4. Risk Management: Risks are distinguished and observed toward the start of the venture and choices are created to relieve them. 5. Change/Scope Management: Few Projects are finished without changes. Changes must be tended to rapidly and truly, with insignificant effect on the timetable, staffing and spending plan. 6. Reporting and Communications: The PMO regularly investigates the undertaking every week and distinguishes critical issues oftentimes. These reports normally center around timetable, financial plan, and assets. 7. Quality Management: Quality administration tries to distinguish holes during the venture with the goal that they can be tended to rapidly 8. Financial Management: The PMO creates and controls the task spending plan. Reports are arranged week by week that contrast real consumptions with the spending plan so as to recognize the issues before they can affect the task. Review of ABC Technologies, Inc ABC Technologies is a main universal framework incorporation consultancy with unrivaled worth evaluated administrations for both private and government division customers. ABC Technologies offers benefits on an undertaking or key staffing premise, in both custom and endeavor asset arranging (ERP) bundle conditions, and over all innovation stages, working frameworks and foundations. ABC Technologies has earned a notoriety for being an exceptional firm in a quick paced commercial center. ABC Technologies teams up with clients to reliably and cost-adequately plan, execute and convey top notch administrations and results. Current Issues ABC Technologies is at present convincing more undertaking agreements than Time and Material agreements. Accordingly there are a wide range of activities that are being grown at the same time under various Project Managers. Each undertaking has its own procedures of which some are shared among various activities and others are venture based. There are endeavor wide procedures that can be utilized across numerous ventures. In this paper the issues are distinguished, arranged and talked about dependent on Project Management Functions plot above. Issue #1, Project Planning and Control: Task arranging is the key component in venture control. It assists with coordinating and guide the venture the correct way and along these lines helps with finishing the undertaking on time. Task arranging is the fundamental piece of good venture the board (Giridhar, 1998). The Project Directors and Project Managers create venture arranging utilizing Microsoft Project for singular tasks and transfer them in the undertaking intranet site. Yet at the same time the administrators and executives at ABC Technologies plan their task by regular techniques, for example, well established realities, verifiable information, and without previous, best instructed surmises. Accordingly, the appraisals takes the structure directed by history of experience and are commonly founded on past victories and measures used to assess them (Hartman, Jergeas, 1996). Issue #2, Issues Management: ABC Technologies right now utilizes a merchant item to log and track issues. This product doesn't incorporate with Change Control programming, Risk Management programming. On the off chance that an issue is entered and the engineer or designer establishes that the issue opens up a change procedure the issue is shut in the product and separate procedure is begun in the change control. A few issues recognized may even influence the venture arranging and conveyance process. The undertaking supervisors will possibly come to know whether QA work force who logged the issue send the report to the task director. The product that is as of now being utilized doesn't make any aware of the concerned individuals from the group other than telling that an issue has been entered. ABC Technologies contributions far less exertion to target setting for Issues Management. Target setting for issue the board has interesting prerequisites which recognize it from more extensive corporate arranging forms (Jaques, 2005). The product that the ABC Technologies utilizes doesn't address the vital procedure of Issues Management. Issue #3, Change/Scope Management A venture is a moving objective and things change all the time. Presently ABC Technologies set up a change control process and however differs from venture to extend. The Project Managers tops off a long structure on an intranet site made only for each task to start the change control process. The procedure doesn't get contribution from some other modules or programming other than manual contribution from venture directors. Therefore it is tedious procedure for the task chief to start a change control process. The Project administrator is the administrator for the site who can give or deny access to the site. This one long structure gets the contribution from different quarters, for example, customers, designers, QAs and others. Controlling â€Å"Change† is a key factor to an effectively oversaw venture. Actualizing a decent change control method will significantly affect the project’s main concern (Chen, 1992). With the present procedure, the undertaking directors will in general make just degree creep on the grounds that a significant number of the engineers are not by any means mindful of progress control process. I heard the task director gripe that we changed the structure of the item for the customer liberated from cost. Issue #4, Reporting and Communications: The task status reports are the one that the vast majority of the product engineers neglect to create in time due to their different commitment. It is found out that not very many undertaking directors at ABC Technologies demand week after week venture status report and keeping in mind that others utilize their judgment and oral interchanges to compose their report for their supervisors. There is definitely no mechanized report generator at ABC Technologies that the venture group can utilize. Undertaking Managers walk an almost negligible difference with regards to mentioning (and really getting) status reports from colleagues. The colleagues need to keep up their own status provides details regarding their PCs if there should arise an occurrence of checking on or following back. In spite of the fact that the venture directors routinely plan the gathering on a week by week premise there is definitely no record of conversations. Now and then it drives occasion to pointing fingers in case of something turns out badly. There is appropriate documentation other than the email sent after the gathering about the conversations held during the gathering hours. Issue #5, Risk Management: IT anticipates are prestigious for their high disappointment rate. Hazard the executives is a basic procedure for its effective conveyance ventures. The best five dangers, all together, are: work force setbacks, preposterous undertaking calendar and financial plan, ridiculous desires, inadequate necessities, and lessened fateful opening because generally conveyance of programming (Baccarini, Salm, Love, 2004). Since ABC Technologies is administration situated organization, the task chiefs face the previously mentioned five dangers in their everyday undertaking exercises. Now and again in view of the idea of the economy, the organizations, for example, ABC Technologies are constrained to wander into unsafe agreements. On definitely known dangers, some more dangers are included as the venture advances. This is because of need to process set up. Now and then the task administrators and colleagues neglect to recognize and resolve the issues in an auspicious way that may transform into da ngers. Proposals Issue #1, Project Planning and Control: The endeavor arrangement will have a module for venture arranging and control. The task arranging and control module is separated into two sub modules: time booking, and asset planning. The module will utilize PERT and CPM organize techniques to design the task. The supervisors and executives will give the fundamental data to the framework. The framework ought to likewise bolster the information entered in Microsoft Project and do important estimations. The module ought to be intended to incorporate the accompanying prerequisites (Giridhar, 1998): Listing exercises with terms, agreeing to WBS, conforming to working days and occasions in association, allotting assets required for every action, characterizing asset accessibility, advancement of asset necessities, observing advancement, controlling and estimating issues, revealing the status of the task, and examination of present status versus the first calendars. Issue

Tuesday, July 28, 2020

The Official Minimalist T-Shirt

The Official Minimalist T-Shirt The most frequently asked question we receive is about our minimalist wardrobe. It seems everyone wants to know where The Minimalists get their T-shirts. And weve always kept it a secretâ€"until now. Today were introducing the official minimalist T-shirt, an iconic masterpiece with clean lines and a classic crew neck, available for men and women in black or white (the only true minimalist colors). Click here for additional photos. Each internationally sourced, 100% combed-cotton tee is woven by hand by a small group of enthusiastic young shirtmakers in the Longhua Town area of Shenzhen, China. After the final stitch is in place, the finished garment is packaged in an individually numbered, velvet-lined box and shipped to your door, ready to wear. With its precision, its unabashed attention to detail, and its timeless design, this artisanal tee will replace every shirt in your wardrobe. This is the only T-shirt recommended by The Minimalistsâ€"because its the only shirt we wear. Note: nearly 2% of all profits go to charity. Buy: $729.00 4/2 UPDATE: April Fools! Read our essay about this gag here.

Friday, May 22, 2020

The Criminal Justice System And Crime Prevention - 970 Words

INTRODUCTION: Deterrence or rational choice, which one is the better, or should I say wiser theory to follow when it comes to the criminal justice system and crime prevention. Using extreme capacitation (Deterrence) can be an effective punishment for many in our society, however, there will still be a small portion of our society that will still commit crimes. The majority of the society would use good-ole common sense (Rational Choice) and not commit crimes in the first place. DISCUSSION: Deterrence and Rational Choice are two theories that our criminal justice system have in place to prevent criminals from committing crimes. Of the many types of deterrence that is available to use that displays our societies consequences, we are going to look at two types of deterrence, General and Specific. General deterrence can be viewed by society as a whole. It allows everyone to both view the crime committed and to see the punishment that follows the crime. i.e. 10 years in prison for robbery or the rest of your natural life in prison for the crime of murder. In this example, the criminal justice system puts on display the punishment for the crimes committed. This is a type of formal sanctions. If done properly, correct penalty can have an impacts on the offenders’ choice on crime. According to the video â€Å"In order for deterrence to work though, the punishment had to be Severe, Swift, and Certain.† (Slide 6). Without severe, swift, and certain punishment some people in our societyShow MoreRelatedCrime Prevention And The Criminal Justice System1776 Words   |  8 Pagesforms of crime prevention using evidence to back them up and then will go on to discuss whether crime prevention is primarily achieved through the criminal justice system or beyond the system, discussing the involvement of the police and whether crime is better controlled through crime prevention techniques or if other methods enforced by the criminal justice system are more efficient in achieving the goal of lower crime rates. Crime prevention is enforced mainly by the government to reduce crime, toRead MoreDeterrence And Rational Choice : The Criminal Justice System And Crime Prevention1196 Words   |  5 Pagesto the criminal justice system and crime prevention. Using extreme capacitation (Deterrence) can be an effective punishment for many in our society, however, there will still be a small portion of our society that will still commit crimes. The majority of the society would use good-ole common sense (Rational Choice) and not commit crimes in the first place. DISCUSSION: Deterrence and Rational Choice are two theories that our criminal justice system has been in place to prevent criminals from committingRead MoreThe Major Components Of Crime Prevention963 Words   |  4 Pagesof crime prevention. You might think that this is an easy thing to do however, there are many aspects to crime prevention and in order to define it we need to have an understanding of what crime prevention is. In this essay I will give you my definition of what crime prevention is as well as describe the major components of crime prevention. I will explain the relationship of crime prevention to the Criminal Justice System. I will then give you two or more institutions through which crime preventionRead MoreCrime Prevention Essay1208 Words   |  5 PagesCrime Prevention Marcos Williams Unit 2: Assignment Abstract Crime prevention has become a major issue in our Nation. In our text we have learned that in the early 1990’s President Bill Clinton had passed a bill that hired 100,000 police officers as a result of the Violent Crime Control Act (Worrall, 2008). The hiring of all the police officers looked as if was going to make a huge impact across the nation. With the rate of crime going up across the world crime prevention is really needed.Read MoreCrime Prevention1330 Words   |  6 PagesCrime Prevention 1 Crime Prevention TuLisha Blackshear CJ212 Crime Prevention Professor Sperling March 9, 2010 Crime Prevention 2 Crime is an ever growing problem in our society. Law enforcement officers put themselves at risk on a daily basis in their quest to apprehend suspects and attempt to deter crime. I will be discussing the components and concepts of crime prevention throughout the course of this essay. Crime prevention is the attempt to deter crime and reduceRead MoreCriminal Justice System1524 Words   |  7 Pagesfor the Criminal Justice System is to reduce the crime and the fire of crime. In order to achieve this it is using different agencies and the major of them are the Police, Prosecution, Courts, Prisons and Probation. They all are operating in synchrony for achieving their legal responsibilities and particularly for reducing the level of crime. The aim of this essay specifically is to discuss the functions of the police and how they actually fit with the objectives of the Criminal Justice System as aRead MoreCrime Prevention Programs And Juvenile Delinquency1378 Words   |  6 PagesCrime Prevention Programs Juvenile Delinquency Jenna Moffitt American Military University Professor Parkinson CMRJ295 November 29, 2015 Crime Prevention Programs Juvenile Delinquency Crime is the one constant thing in our country that will always be around. For decades we have enhanced our technology, changed our laws, put away criminals, but crime still, and will always exist. Crime prevention programs are put into place to help prevent juveniles and adults fromRead MoreCrime Prevention Concepts and Theory, Such as Crime Prevention Through Environmental Design (Cpted) and Other Such Preventative Programs.1713 Words   |  7 PagesCRIME PREVENTION CONCEPTS AND THEORY, SUCH AS CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN (CPTED) AND OTHER SUCH PREVENTATIVE PROGRAMS. First to start developing the item on the prevention of crime we must have the concept that is a crime. The crime can be defined as the action consisting of acting or doing, is a positive, which implies that the person or agent performs one or more body movements and commits the violation of the law by itself, or by instruments, mechanisms or persons. We canRead MoreCrime Essay1672 Words   |  7 PagesThe meaning of crime is stated: act or omission injuries to public welfare, punishment prescribed by law. a) Two different parties that are involved in a crime are ‘principal in the first degree’. This is the actual perpetrator, the person who committed the crime. ‘Accessory after the fact’. This person helps the perpetrator get away, knowing that a crime had been committed by this person. b) Situational crime prevention is making it harder for a person to commit a crime. They are doingRead MoreEssay on Approaches to crime prevention1666 Words   |  7 Pages Approaches to crime prevention have emerged over time and are demonstrated in different solutions, practices, and policies executed by law enforcement, courts, corrections, family, and community. Some of the dominant approaches to crime prevention currently used by law enforcement, courts, corrections, family, and community are: situational crime prevention, crime prevention through social development, crime prevention through environmental design, community crime prevention, reduction of recidivism

Saturday, May 9, 2020

Athena in the Odyssey vs. Virgil in the Inferno Essay

Athena in the Odyssey VS. Virgil in the Inferno Two of the greatest works ever written, The Odyssey by Homer and The Inferno by Dante, are detailed, multi-sectioned poems about the journey’s of two men. In each story, the main character is given some sort of guidance by another character in order to aid them in their travels. In The Odyssey, Athena is portrayed as the protector to Odysseus on his journey back home from the Trojan War to his family in Ithaca. In The Inferno, Virgil is requested to lead Dante through the depths of Hell in order to save his soul. Many similarities can be seen between the two characters as they both served as advice givers, protectors, and guides for the main character. While the two guides seem very†¦show more content†¦Athena appears to Odysseus in the form of Mentor and tries to motivate Odysseus to kill all the suitors off with threats and accusations. She even commands the suitors to through their spears at Odysseus all at once. â€Å"At his command,/ concentrating their shots, all six hurled as one/ but Athena sent to whole salvo wide of the mark†¦Ã¢â‚¬  (Ody. 22. 267-269). Odysseus sees that all of his men are untouched by the suitor’s spears, and this action propels him to take charge and lead an attack on the suitors. Each time Athena guides or protects Odysseus, it’s in order to save his life. She desperately wants Odysseus to get home because Odysseus is a war hero and a King, very much deserving of a safe return home. Athena thinks very highly of Odysseus because he is such a great warrior and she feels he exemplifies the virtue of excellence. It’s easy to see how the ideals of society on life and death in Homer’s 7th Century BC times are portrayed through Athena’s help. The people of this time were most concerned on how you lived your life during the time you had. For them there was no glorious afterlife, so there was no need to try and save your soul to reap the prize of a great time after death. Homer uses Athena as Odysseus’s guide to get back home and live out the rest of his life the way he pleases. He’s spent his time as a warrior and won his most important battles before the beginning of the poem, so now he deserves to live out the rest of his life in peace with

Wednesday, May 6, 2020

Holmes Free Essays

Herman Webster Midget was the first American serial killer the terrorized Chicago in the late sass’s, yet he was a slave to his own mind and his own disorders. Herman, who Is also famous as H. H. We will write a custom essay sample on Holmes or any similar topic only for you Order Now Holmes had two personality disorders that drove him to commit the actions that he committed. Evidence shows that Holmes had personality disorders Like narcissistic personality disorder and antisocial personality disorder. H. H Holmes shows signs of antisocial personality disorder in many ways. To begin with, Midget started at an early age torturing animals (CNN). He used to be afraid of actors but one day he had an experience with a skeleton and after that he was changed forever. Also in his famous castle there was remains of bodies in the basement with pure evidence of torture. It is evident that Dry. Holmes tortured these young women with no evidence of any remorse. (How Stuff Works). Dry. Holmes himself that he was slowly and slowly turning into the devil since he didn’t feel any remorse or anything of such towards his victims (H. H. Holmes; Master of Illusion, chapter 17). The treatment for antisocial personality disorder Is very tricky but usually most actors use operant conditioning-rewarding the good actions and punishing the Illegal ones-(Notational Library of Medicine). Of course such treatment was not present In the time of Dry. Holmes so he had no way of getting help. Another personality disorder Dry. Holmes had was narcissistic personality disorder. Narcissistic personality disorder is when a person has an inflated self image and inflated goals that he will stop at nothing to achieve them. This was the case with Midget, as a matter of fact, Herman killed his con-partner in order to perfect a con on an insurance company to get some extra money. H. H. Holmes; Master of Illusion, chapter 3). Having shown that he doesn’t really care about his friend or anyone he supposedly had an emotional attachment with, he proved that he has narcissistic personality disorder. This might be caused by his father’s beating to him and his abuse. The only way to truly treat that Is through talk therapy so he can try to form deeper connections with people he should be familiar Walt(Notational Library of Medicine). Again, this kind of treatment wasn’t available in the time of Dry. H. H. Holmes so he had no opportunity to seek help. Some people might argue that Dry. Midget had a form of fetishism paraphernalia since he picked out his victims to be young blonde women. Thyrotrophic, or attraction you hair could have been the reason for his choice of victims (Right Diagnosis). The treatments of this include psychoanalysis, hypnosis, behavior therapy, cognitive therapy, drug therapy(Relight Diagnosis). It’s very unclear whether he had this disorder or not. All In all Dry. H H Holmes had a lot of personality disorders that led him to become the monster he was. How to cite Holmes, Papers

Tuesday, April 28, 2020

Save the Orangutans from Extinction an Example by

Save the Orangutans from Extinction At present, there are many animal species that are in danger. The orangutans are one of them, and in the few years they may be extinct. There are many factors that are threatening their species: loss of habitat due to population growth and illegal logging, natural disasters as well as illegal animal trade and poaching. The authorities must act immediately, as the problem continues to worsen as time goes by. This research paper aims to discuss the short life history of the orangutans, the problems that endanger them, and the solutions that are currently being made to prevent their extinction. Need essay sample on "Save the Orangutans from Extinction" topic? We will write a custom essay sample specifically for you Proceed Undergraduates Usually Tell EssayLab writers: Who wants to write paper for me? Essay writers advise: If You Think About Someone To Write Your Paper - Essaylab The Right Place! Best Essay Writing Company Write My Paper College Essay Writing Service Get Paid To Write Papers For Students The orangutans are known by the scientific name of Pongo pygmaeus (Orangutan). Originally, the orangutan species live throughout the Southeast Asian forests, and are native to Borneo and Sumatra islands (Orangutans; Orangutan). Their habitat is the rainforest, and they share this habitat with other animals, such as tigers and rhinos (Orangutans). Orangutans live in groups, that which consist of only two to four animals; nonetheless, adult males are usually solitary (Orangutan). Orangutans are arboreal animals; in fact, they are the world's largest exclusively tree-dwelling mammal (Orangutan; Xu). They seldom leave the trees, and their nourishment includes fruit, leaves, bark and birds' eggs (Orangutan). They spend the night on nests or platforms that they built themselves (Orangutan). The orangutans reach their full maturity at 10 to 12 years of age, while their sexual maturity is attained at eight years of age (Orangutan). The female orangutan has a 29-day menstrual cycle, and just like humans, the gestation period lasts for nine months (Orangutan). In addition, it is the only species with the longest birth interval: female orangutans only give birth after eight years (Xu). Unfortunately, the only threat to the species is mankind (Orangutan). The orangutan species is so threatened that it was declared by the IUCN or the World Conservation Union as critically endangered (Mayhell). How does mankind threaten the existence of the orangutans? Humans endanger the species due to actions that lead to the orangutans' loss of habitat. In the last two decades, orangutans have lost 20% of their habitat (Orangutans). In 1996, there were 20,000 orangutans in Borneo; at present, the number is estimated between 12,000 to 15,000 (Orangutans). In Sumatra, there are only an estimated 4,000 to 6,000 orangutans left, from its original number of 10,000 in 1996 (Orangutans). The growth of the Indonesian population is one of the contributing factors behind the loss of habitat. One hundred years ago, the population of Indonesia was approximately 10 million; today, however, the population has increased to 200 million (Mayhell). Currently, the area where people live is no longer sufficient to sustain the growing population, which forces the authorities to convert rainforests to residential areas (Orangutans). This means the habitat of the orangutans would be utilized for human consumption. Moreover, the increasing population requires more food, which forces farmers to modify their agricultural techniques, one of which is the slash-and-burn technique (Mayhell). This technique makes land clearing much easier, and is used by timber and palm oil companies on many acres of land (Orangutans). This manner of land clearing forces the orangutans deeper in the forests (Mayhell). However, the conditions of the forest are not conducive for orangutans to live either. Illegal logging is still rampant, as it provides for a lucrative industry (Orangutans). Illegal logging had decreased the forests' resources, and a few trees are inadequate for the survival of the orangutans (Mayhell). Natural disasters are also to blame for the decrease in the orangutan population. Between 1997 and 1998, there were forest fires that were caused by drought (Mayhell). Many orangutans were killed, and those that survived had to look for food in human territory which made the orangutans victims of poaching (Mayhell). Because the forests can no longer provide the nourishment for their survival, orangutans search for food in human territories. The people, in turn, are bothered by the presence of these animals in their farms (Mayhell). These orangutans are then killed for food (Orangutans). Poaching, along with illegal animal trade, also decreased the populations of the orangutans. Both of these are effects of the economic problems that affected Asia in 1997 (Mayhell). Many Indonesians were unemployed, and the rainforests seemed to present an opportunity for them to earn a living (Mayhell). The young orangutans are taken from their mothers to be sold as pets (Orangutans). However, orangutans are never meant to be pets because they are wild animals. While they are an infant, they may seem as cute pets. However, once they grow up, taking care of them becomes extremely difficult (Orangutans). Moreover, once they have been sold as pets, most of them die either from sickness or poor living conditions (Orangutans). Even at death, orangutans prove to be a source of income, as orangutan skulls are sold as souvenirs for tourists (Mayhell). The possible extinction of orangutans poses a serious problem not only for Indonesia, but also for the world. So far, steps have been made to regulate this problem. To prevent the further loss of orangutan habitat, the Indonesian and Malaysian governments have sent police patrols to guard the animals' territory (Xu). In addition, there exists the U.S. Great Ape Conservation Act of 2000 (U.S. Fish and Wildlife Service). This act seeks to provide monetary assistance to other countries for the conservation of great apes such as the orangutans (U.S. Fish and Wildlife Service). Other animals that would benefit from this law include gorillas, chimpanzees and gibbons (U.S. Fish and Wildlife Service). The aforementioned measures would surely help in preventing the extinction of orangutans. However, these are not enough. The Indonesian government should create policies that would surely make a difference in the conservation of orangutans. Illegal logging such be closely monitored, and the agricultural sector must be advised to stop the slash-and-burn method. The citizens should also be educated, so that illegal pet trade and poaching would no longer occur. Orangutans are great animals, and if their species are not taken care of, future generations may not get to see them. Everyone should do their part in preventing the extinction of orangutans. Works Cited Mayhell, Hillary. Orangutans Edging Closer to Brink of Extinction. National Geographic. 24 October 2000. National Geographic Society. 16 February 2008 http://news.nationalgeographic.com/news/2000/12/122800orangutans.html>. Orangutan. Lexicon Universal Encyclopedia. 1992 ed. Orangutans Face Extinction. 16 February 2008 . U.S. Fish and Wildlife Service. Great Apes Program. 31 January 2008. 16 February 2008 . Xu, Risheng. Professor Predicts Orangutan Extinction. The Harvard Crimson. 1 October 2003. 16 February 2008 .

Friday, March 20, 2020

Wireless Networking Essay Example

Wireless Networking Essay Example Wireless Networking Essay Wireless Networking Essay Wireless Networking Name: Course: Institution: Instructor: Date: Wireless Networking Local access networks can be described as a network connection that limits access to the network over a specific radius. There are wired and wireless local access networks. Wired local access networks are characterized by the use of cables and adapters for network connection whereas wireless networks are characterized by the use of receptors and nodes for network access. Wireless local access networks are used in institutions such as hospitals, schools factories, offices and homes. In the named institutions, wireless LAN is used by hospitals and offices to access records and work without the use of bulky material such as paperwork. The wireless access network is considered superior to the use of wired local access networks. The advantages attributed to the use of wireless access networks are mobility, whereby the user can access the network at the comfort of the office or the workstation without having to move from one location in order to access work, documents or records. In addition, the user has low costs of installation compared to the wired local access network that has very many cables and adapters, which enable transmission in the network. The wireless local access network has low infrastructure in that no wire connections are necessary for the user to access the network. Moreover, the use of wireless networks enables the user to ease the change in the network topology into any that best works to the advantage of the network users. Wireless networks are catastrophe resistant in that they are manageable and scalable in size. Furthermore, wireless networks are easily maintained in that they do not require complex maintenance routines. However, the wireless networks are not free from problems. They are faced by interference by other signals such other networks from around the area of operation and radio signals from devices such as mobile phones and media gadgets such as radios and television sets. In addition, they also are coupled by security threats from hackers and malicious software. The wireless networks are rarely interoperable because of lack of transferability from one vendor to another owing to the very many regulations in each vendor system. Wireless networks also accrue health and safety issues in that they pose health risks associated by the electromagnetic fields associated with wireless gadgets. Moreover, the use of wireless networks is associated with lower data charges There are several technologies for wireless networking in a private local access network. They are mainly Bluetooth, HIPERLAN, Ultrawideband, cellular/Personal Computers infrastructure and custom /private protocols. The use of a standard wireless local access network is advantageous in that it serves as a guide for developing new and reliable hardware. In addition, the wireless network enables the network user to interoperate the network with other network vendors such that one network has multiple network vendors. It also reduces the risk associated with new products, which might corrupt the network and even wreck the whole system of the user. However, these advantages are countered by disadvantages whereby the use of a specific standard does not allow for innovation on the part of the users. It also may lead to dormancy in the development of technology in a fast-growing technology field. Standard sharing vendors cannot fully market and sell their products with the existence of rigi d standards. The IEEE 802.11 is a standard for implementing wireless networks. It release was by unlicensed use whereby the spectrum is free. The unlicensed bands for the wireless networks are essentially good for deploying relatively small private radio networks. Wireless networks are also forced to compete with other in-band users, which are erratic in number and interference. Unlicensed band usage is categorized into the 2.4GHZ-ISM band and the U-NII band. The 2.4GHZ ISM band is referred to an Industrial Scientific Medical band; it is specifically on the 2.4000-2.4835 GHz band. It has 83.5 MHz of free spectrum, and it has inexpensive hardware. The band is very useful to the users because of its easy compatibility with other users. The U-NII band is described as the Unlicensed National Information Infrastructure band. It lies on the bands of 5.15-5.35 GHz and on 5.725-5.825 GHz and comes with 300 MHz of free spectrum and fewer co-existing systems. It is relatively inexpensive to install and use but its radio hardware is the only expensive bit about the band. The IEEE 802.11 has more extensions to it. They are mainly 802.11a, which is a standard, which adds more Orthogonal Frequency Division Multiplexing (OFDM) to the standard for high data rates in the U-NII band. Another extension is the 802.11b whereby there are additional 5.5mbps and 11 mbps capabilities to the IEEE 802.11standard.furthermore 802.11e is a future extension that is responsible for maintaining the quality of service capability for some applications by the user. It also has the 802.11g, a future extension for 2.4 GHz links for using the OFDM for 22 mbps data rates. For security purposes, the 802.11i was developed to counter threats to the network. The IEEE 802.11 has two parts, which are PHY and MAC. The PHY correspond to the physical outlines and the operations of the standard to the OSI protocol stack. It also ahs many different specifications and its specific extensions only exist for the 802.11 standard. It entails of how the data in the network is specifically sent in and out of the network. Whereas the MAC consists of and correspond to data links and outline operations in the OSI protocol. In summary, it handles the data part of a network. The Mac is the same for all 802.11 standards regardless of which PHY is specified and its main aim is concerned with how data is framed into data packets for transmission via the network. The PHY is divided into two main parts namely the Physical Medium Dependent (PMD) and the Physical Layer Convergence Protocol (PLCP) The PMD is responsible for modulation, coding and decoding, and multiple access of the network. The PLCP is responsible for channel assessment, physical layer services t hat are independent of any physical medium. The Data Link layer is divided into two parts the Medium Access Control MAC and the Logical Link Control (LLC). The data link layer’s purpose is to transfer data within adjacent network nodes while the Medium access control is a protocol sub layer of the data link layer that provides channel access and addressing the control mechanisms between several terminals for them to communicate within a multiple access network. The IEEE 802.11 standard for wireless networks has interoperability challenges. There existed difficulties in the cross vendor operations for the users such that it was impossible for the users to change network vendors. The network vendors did not follow the IEEE 802.11 standard to the latter, which brought rise to numerous problems to both the vendors and the users. However, some issues were addressed and some were not therefore some problems regarding the standards still exist and need address. The interoperability issues prevent the public from accepting new technology thus the industry loses a lot of money and its credibility. In addition, the lack of interoperability leads to little or no innovation as new technology is prevented from the development of new technology. Interoperability issues were countered by the solution of formation of the Wireless Ethernet Compatibility Alliance. WECA is an industrial association formed on 23 August in the year1999.It sole purpose is to provide interoperability-testing services for vendors of the IEEE 802.11 wireless modem. The WECA is responsible certification of Wi-Fi enabled equipment, which gives any equipment tested by the organization a very high degree of reliability and interoperability. In the use of Wireless networks, multiple access issues also arise. For the wireless network to fully function simultaneous links must be coordinated in the same network. The interference in ISM bands and deep fading in the frequency of the bands is also another issue facing network users. The direct spread system consists of eleven overlapping channels with each channel having 22 MHz total bandwidth. The radio links can also use the overlapping channels simultaneously. Frequency hopped spread spectrum is characterized by the presence of over seventy nine channels with each channel having a total 1 MHz bandwidth. The unique hop sequence is characterized by a unique hop sequence for each length, which avoids simultaneous use. Direct sequence spread spectrum is a modulation technique favored by modem designers. It is best for coexistence of networks where there are in-band wireless systems. In addition it also woks to the contribution of more gentle interference to other in-band systems thus for this reasons it is regarded highly among the information modem designers. The Direct sequence spread spectrum enables the links to be easily modified for IEEE 802.11b extensions. Japan has the largest number of channels with fourteen frequencies followed by Europe in overall and then by the United States and France and Spain respectively. Spreading a signal in the IEEE 802.11 standard uses the Barker sequence due to the low correlation properties of the method. The method implies change of phase of the waves at 180degrees.A barker’s spread signal is similar to that of a spread signal. When signal is interfered by noise it becomes blurred and is represented by an almost straight line whereas a realistic signa l is almost similar to that of the spread signal. When noise is filtered in a despread signal, it becomes refined and it becomes easily transmittable through the network. Despreading is the art of spreading an interfered signal to come up a new signal that is ready for retransmission through the network. Spreading increases with bandwidth of the signal for increasing resistance to interference of the signal.

Tuesday, March 3, 2020

Voting Rights Act of 1965

Voting Rights Act of 1965 The Voting Rights Act of 1965 is a key component of the civil rights movement that seeks to enforce the Constitutions guarantee of every Americans right to vote under the 15th Amendment. The Voting Rights Act was designed to end discrimination against black Americans, particularly those in the South after the Civil War. Text of the Voting Rights Act An important provision of the Voting Rights Act reads: No voting qualification or prerequisite to voting, or standard, practice, or procedure shall be imposed or applied by any State or political subdivision to deny or abridge the right of any citizen of the United States to vote on account of race or color. The provision reflected the 15th Amendment of the Constitution, which reads: The right of U.S. citizens to vote shall not be denied or abridged by the United States or by any State on account of race, color, or previous condition of servitude. History of the Voting Rights Act President Lyndon B. Johnson signed the Voting Rights Act into law on August 6, 1965. The law made it illegal for Congress and state governments to pass voting laws based on race and has been described as the most effective civil rights law ever enacted. Among other provisions, the act prohibited discrimination through the use of poll taxes and the application of literacy tests to determine whether voters could take part in elections. It is widely regarded as enabling the enfranchisement of millions of minority voters and diversifying the electorate and legislative bodies at all levels of American government, according to The Leadership Conference, which advocates for civil rights. Legal Battles The U.S. Supreme Court has issued several major rulings on the Voting Rights Act. The first was in 1966. The court initially upheld the constitutionality of the law. Congress had found that case-by-case litigation was inadequate to combat wide-spread and persistent discrimination in voting, because of the inordinate amount of time and energy required to overcome the obstructionist tactics invariably encountered in these lawsuits. After enduring nearly a century of systematic resistance to the Fifteenth Amendment, Congress might well decide to shift the advantage of time and inertia from the perpetrators of the evil to its victims. In 2013, the U.S. Supreme Court threw out a provision of the Voting Rights Act that required nine states to get federal approval from the Department of Justice or a federal court in Washington, D.C., before making any changes to their election laws. That preclearance provision was originally set to expire in 1970 but was extended numerous times by Congress. The decision was 5-4. Voting to invalidate that provision in the act were Chief Justice John G. Roberts Jr. and Justices Antonin Scalia, Anthony M. Kennedy, Clarence Thomas and Samuel A. Alito Jr. Voting in favor of keeping the law intact were Justice Ruth Bader Ginsburg, Stephen G. Breyer, Sonia Sotomayor and Elena Kagan. Roberts, writing for the majority, said that portion of the Voting Rights Act of 1965 was outdated and that the conditions that originally justified these measures no longer characterizes voting in the covered jurisdictions. Our country has changed. While any racial discrimination in voting is too much, Congress must ensure that the legislation it passes to remedy that problem speaks to current conditions. In the 2013 decision, Roberts cited data that showed turnout among black voters had grown to exceed that of white voters in most of the states originally covered by the Voting Rights Act. His comments suggest that discrimination against blacks had diminished greatly since the 1950s and 1960s. States Impacted The provision struck down by the 2013 ruling covered nine states, most of them in the South. Those states are: AlabamaAlaskaArizonaGeorgiaLouisianaMississippiSouth CarolinaTexasVirginia End of the Voting Rights Act The Supreme Courts 2013 ruling was decried by critics who said it gutted the law. President Barack Obama was sharply critical of the decision. I am deeply disappointed with the Supreme Court’s decision today. For nearly 50 years, the Voting Rights Act – enacted and repeatedly renewed by wide bipartisan majorities in Congress – has helped secure the right to vote for millions of Americans. Today’s decision invalidating one of its core provisions upsets decades of well-established practices that help make sure voting is fair, especially in places where voting discrimination has been historically prevalent. The ruling was praised, however, in states that had been overseen by the federal government. In South Caroline, Attorney General Alan Wilson described the law as an extraordinary intrusion into state sovereignty in certain states. This is a victory for all voters as all states can now act equally without some having to ask for permission or being required to jump through the extraordinary hoops demanded by federal bureaucracy. Congress was expected to take up revisions of the invalidated section of the law in the summer of 2013.

Sunday, February 16, 2020

Toxicology Research Paper Example | Topics and Well Written Essays - 250 words

Toxicology - Research Paper Example Methyl mercury can coordinate (bond) to more than one cysteine amino acid. Unlike ingested inorganic mercury, ingested methyl mercury is easily absorb by the gastrointestinal tract and found its way into the blood, where its forms bonds with the thio groups in cysteine of amino acids, peptides, and proteins. The methyl mercuric-cysteinyl compound or complex mimic another essential amino acid, known as methionine, and it is, unfortunately, recognized by amino acid transporting proteins in the body as methionine (Kerper, Ballatori, & Clarkson, 1992). Thus it is freely transported throughout the body to various parts including the brain and across the placenta, where it is absorbed by the developing fetus. It causes several health disorders in the body. Hence, methylation turns metal mercury into a toxic compound. Bibliography Kerper, L. E., Ballatori, N., & Clarkson, T. W. (1992). Methylmercury transport across the blood-brain barrier by an amino acid carrier. Am. J. Physiol. , 262 .

Sunday, February 2, 2020

AIG Insurance Essay Example | Topics and Well Written Essays - 750 words

AIG Insurance - Essay Example Though the company had to endure seventeen long years in the wait, the breakthrough came when AIG had already owned twelve subsidiaries in China allowing it to apply for an insurance license. The group had access to the Chinese market through its subsidiaries and by getting licenses to sell various insurance products in multiple cities, AUIG was able to break into the institutional void of the Chinese market. The manner in which AIG tailored its products to suit the Chinese market was another way in which the company ensured that its preciously procured licenses were not wasted away. The institutional void in the Chinese market was filled not only by AIG but later on by the Italian insurance giant too. However, AIG had the benefit of being the first in the market. The framework developed by Khanna regarding strategic policies and planning of an insurance company provides set guidelines that can be adopted by firms entering newer markets. The emphasis of companies should be to develop global policies and strategic standards in homogenous markets. However, the Chinese market was not comparable to any previous market that AIG had operated in - the key was to use Khanna's framework and adopt the insurance products in order to suit the Chinese market. AIG trans... It is obvious that there was no lying on part of AIG, however, the emphasis of the marketing program was to project the life insurance policies as savings schemes so that the Chinese market would pay attention to the products. The FSA's developed by AIG in the markets provided it the advantage that it needed in the Chinese market. It allowed AIG to target the Chinese population and attract it to products that had not been there in the market earlier due to the institutional voids. However, AIG was not able to reap the complete benefits of the first mover's advantage due to the other companies getting licenses for insurance in the Chinese market soon after. This led to a reduction in the effectiveness of the program that AIG had initialized and in spite of the fact that it had invested in training and agents earlier, the company was unable to create a huge mark in its profits due to the benefit is had procured so preciously. Question 4 AIG was able to thrive in the market as the leader for several years because of its operational effectiveness. However, the FSAs developed in the Chinese market shield it from competition. The competition in the market was inevitable for AIG and thus the overtaking of AIG was evident once the Chinese market was open to further foreign insurance companies. The question was always a matter of time: the duration that AIG spent as the market leader was critical for it and was the best time for it to make profits from operations. The Italian invasion of the market proved to be fatal fgor AIG as it never recovered. Profitability was not the central goal of AIG; it needed something beyond that. Its first mover advantage got eroded once the Italians got hold of

Saturday, January 25, 2020

Research Onion Explanation of the Concept

Research Onion Explanation of the Concept Introduction The research onion was developed by Saunders et al. (2007). It illustrates the stages that must be covered when developing a research strategy.When viewed from the outside, each layer of the onion describes a more detailed stage of the research process (Saunders et al., 2007). The research onion provides an effective progression through which a research methodology can be designed. Its usefulness lies in its adaptability for almost any type of research methodology and can be used in a variety of contexts (Bryman, 2012). This essay will examine and describe the different stages of the research onion, and explain the concepts at each stage. 1.1: Understanding the Research Process The research onion was developed by Saunders  et al. (2007) in order to describe the stages through which the researcher must pass when formulating an effective methodology. First, the research philosophy requires definition. This creates the starting point for the appropriate research approach, which is adopted in the second step. In the third step, the research strategy is adopted, and the fourth layer identifies the time horizon. The fifth step represents the stage at which the data collection methodology is identified. The benefits of the research onion are thus that it creates a series of stages under which the different methods of data collection can be understood, and illustrates the steps by which a methodological study can be described. Figure 1: The Research Onion (Source: Institut Numerique, 2012, n.p.). 1.2: Research Philosophy A research philosophy refers to the set of beliefs concerning the nature of the reality being investigated (Bryman, 2012). It is the underlying definition of the nature of knowledge. The assumptions created by a research philosophy provide the justification for how the research will be undertaken (Flick, 2011). Research philosophies can differ on the goals of research and on the best way that might be used to achieve these goals (Goddard Melville, 2004). These are not necessarily at odds with each other, but the choice of research philosophy is defined by the type of knowledge being investigated in the research project (May, 2011). Therefore, understanding the research philosophy being used can help explain the assumptions inherent in the research process and how this fits the methodology being used. Two main ontological frameworks can inform the research process: positivism and constructionism (Monette et al. 2005). These frameworks might be described differently (such as empiricism and interpretivism) but the underlying assumptions are broadly similar (Bryman, 2012). Positivism assumes that reality exists independently of the thing being studied. In practice this means that the meaning of phenomena is consistent between subjects (Newman, 1998). Conversely, constructionism suggests that the inherent meaning of social phenomena is created by each observer or group (ÃÆ'–stlundet al. , 2011). In this philosophy, one can never presume that what is observed is interpreted in the same way between participants and the key approach is to examine differences and nuances in the respondentsà ¢Ã¢â€š ¬Ã¢â€ž ¢ understanding. Despite the inherent differences between these two practices, it is not necessarily the case that they form an inherent belief by the researcher that is then applied to all research contexts. One philosophy is not inherently better than the other, although researchers may favour one over the other (Podsakoffet al., 2012). The philosophy simply provides the justification for the research methodology. The methodology should be informed by the nature of the phenomena being observed. 1.3: Research Approaches Two types of approaches are outlined here: the deductive and the inductive approach. 1.3.1: Deductive Approach The deductive approach develops the hypothesis or hypotheses upon a pre-existing theory and then formulates the research approach to test it (Silverman, 2013). This approach is best suited to contexts where the research project is concerned with examining whether the observed phenomena fit with expectation based upon previous research (Wiles et al., 2011). The deductive approach thus might be considered particularly suited to the positivist approach, which permits the formulation of hypotheses and the statistical testing of expected results to an accepted level of probability (Snieder Larner, 2009). However, a deductive approach may also be used with qualitative research techniques, though in such cases the expectations formed by pre-existing research would be formulated differently than through hypothesis testing (Saunders et al., 2007). The deductive approach is characterised as the development from general to particular: the general theory and knowledge base is first established and the specific knowledge gained from the research process is then tested against it (Kothari, 2004). 1.3.2: Inductive Approach The inductive approach is characterised as a move from the specific to the general (Bryman Bell, 2011). In this approach, the observations are the starting point for the researcher, and patterns are looked for in the data (Beiske, 2007). In this approach, there is no framework that initially informs the data collection and the research focus can thus be formed after the data has been collected (Flick, 2011). Although this may be seen as the point at which new theories are generated, it is also true that as the data is analysed that it may be found to fit into an existing theory(Bryman Bell, 2011). This method is more commonly used in qualitative research, where the absence of a theory informing the research process may be of benefit by reducing the potential for researcher bias in the data collection stage (Bryman Bell, 2011). Interviews are carried out concerning specific phenomena and then the data may be examined for patterns between respondents (Flick, 2011). However, this approach may also be used effectively within positivist methodologies, where the data is analysed first and significant patterns are used to inform the generation of results. 1.3.3: The Quantitative Approach As the name suggests, this approach is concerned with quantitative data (Flick, 2011). It holds a number of accepted statistical standards for the validity of the approach, such as the number of respondents that are required to establish a statistically significant result (Goddard Melville, 2004). Although this research approach is informed by a positivist philosophy, it can be used to investigate a wide range of social phenomena, including feelings and subjective viewpoints. The quantitative approach can be most effectively used for situations where there are a large number of respondents available, where the data can be effectively measured using quantitative techniques, and where statistical methods of analysis can be used (May, 2011). 1.3.4: The Qualitative Approach The qualitative approach is drawn from the constructivist paradigm (Bryman Allen, 2011). This approach requires the researcher to avoid imposing their own perception of the meaning of social phenomena upon the respondent (Banister et al., 2011). The aim is to investigate how the respondent interprets their own reality (Bryman Allen, 2011). This presents the challenge of creating a methodology that is framed by the respondent rather than by the researcher. An effective means by which to do this is through interviews, or texts, where the response to a question can be open (Feilzer, 2010). Furthermore, the researcher can develop the questions throughout the process in order to ensure that the respondent further expands upon the information provided. Qualitative research is usually used for examining the meaning of social phenomena, rather than seeking a causative relationship between established variables (Feilzer, 2010). 1.4: Research Strategy The research strategy is how the researcher intends to carry out the work (Saunders et al., 2007). The strategy can include a number of different approaches, such as experimental research, action research, case study research, interviews, surveys, or a systematic literature review. Experimental research refers to the strategy of creating a research process that examines the results of an experiment against the expected results (Saunders et al., 2007). It can be used in all areas of research, and usually involves the consideration of a relatively limited number of factors (Saunders et al., 2007). The relationship between the factors are examined, and judged against the expectation of the research outcomes. Action research is characterised as a practical approach to a specific research problem within a community of practice (Bryman, 2012). It involves examining practice to establish that it corresponds to the best approach. It tends to involve reflective practice, which is a systematic process by which the professional practice and experience of the practitioners can be assessed. This form of research is common in professions such as teaching or nursing, where the practitioner can assess ways in which they can improve their professional approach and understanding (Wiles et al., 2011). Case study research is the assessment of a single unit in order to establish its key features and draw generalisations (Bryman, 2012). It can offer an insight into the specific nature of any example, and can establish the importance of culture and context in differences between cases (Silverman, 2013). This form of research is effective in financial research, such as comparing the experiences of two companies, or comparing the effect of investment in difference contexts. Grounded theory is a qualitative methodology that draws on an inductive approach whereby patterns are derived from the data as a precondition for the study (May, 2011). For example, interview data may be transcribed, coded and then grouped accordingly to the common factors exhibited between respondents. This means that the results of the research are derived fundamentally from the research that has been completed, rather than where the data is examined to establish whether it fits with pre-existing frameworks (Flick, 2011). Its use is common in the social sciences (Bryman, 2012). Surveys tend to be used in quantitative research projects, and involve sampling a representative proportion of the population (Bryman Bell, 2011). The surveys produce quantitative data that can be analysed empirically. Surveys are most commonly used to examine causative variables between different types of data. Ethnography involves the close observation of people, examining their cultural interaction and their meaning (Bryman, 2012). In this research process, the observer conducts the research from the perspective of the people being observed, and aims to understand the differences of meaning and importance or behaviours from their perspective. An archival research strategy is one where the research is conducted from existing materials (Flick, 2011). The form of research may involve a systematic literature review, where patterns of existing research are examined and summed up in order to establish the sum of knowledge on a particular study, or to examine the application of existing research to specific problems. Archival research may also refer to historical research, where a body of source material is mined in order to establish results. 1.5: Choices The choices outlined in the research onion include the mono method, the mixed method, and the multi-method (Saunders et al., 2007). As the names of these approaches suggest, the mono-method involves using one research approach for the study. The mixed-methods required the use of two or more methods of research, and usually refer to the use of both a qualitative and a quantitative methodology. In the multi-method, a wider selection of methods is used (Bryman, 2012). The main difference between the mixed and the multi-method is that the mixed-method involves a combined methodology that creates a single dataset (Flick, 2011). The multi-method approach is where the research is divided into separate segments, with each producing a specific dataset; each is then analysed using techniques derived from quantitative or qualitative methodologies (Feilzer, 2010). 1.6: Time Horizons The Time Horizon is the time framework within which the project is intended for completion (Saunders et al., 2007). Two types of time horizons are specified within the research onion: the cross sectional and the longitudinal (Bryman, 2012). The cross sectional time horizon is one already established, whereby the data must be collected. This is dubbed the à ¢Ã¢â€š ¬Ã‹Å"snapshotà ¢Ã¢â€š ¬Ã¢â€ž ¢ time collection, where the data is collected at a certain point (Flick, 2011). This is used when the investigation is concerned with the study of a particular phenomenon at a specific time. A longitudinal time horizon for data collection refers to the collection of data repeatedly over an extended period, and is used where an important factor for the research is examining change over time (Goddard Melville, 2004). This has the benefit of being used to study change and development. Furthermore, it allows the establishment of some control over the variables being studied. The time horizon selected is not dependent on a specific research approach or methodology (Saunders et al., 2007). 1.7: Data Collection and Analysis Data collection and analysis is dependent on the methodological approach used (Bryman, 2012). The process used at this stage of the research contributes significantly to the studyà ¢Ã¢â€š ¬Ã¢â€ž ¢s overall reliability and validity (Saunders et al., 2007). Regardless of the approach used in the project, the type of data collected can be separated into two types: primary and secondary. 1.7.1: The Primary Data Primary data is that which is derived from first-hand sources. This can be historical first-hand sources, or the data derived from the respondents in survey or interview data (Bryman, 2012). However, it is not necessarily data that has been produced by the research being undertaken. For example, data derived from statistical collections such as the census can constitute primary data. Likewise, data that is derived from other researchers may also be used as primary data, or it may be represented by a text being analysed (Flick, 2011). The primary data is therefore best understood as the data that is being analysed as itself, rather than through the prism of anotherà ¢Ã¢â€š ¬Ã¢â€ž ¢s analysis. 1.7.2: Secondary Data Secondary data is that which is derived from the work or opinions of other researchers (Newman, 1998). For example, the conclusions of a research article can constitute secondary data because it is information that has already been processed by another. Likewise, analyses conducted on statistical surveys can constitute secondary data (Kothari, 2004). However, there is an extent to which the data is defined by its use, rather than its inherent nature (Flick, 2011). Newspapers may prove both a primary and secondary source for data, depending on whether the reporter was actually present. For a study of social attitudes in the Eighteenth Century, or for a study of the causes of fear of crime in present day UK, newspapers may constitute primary data. Therefore, the most effective distinction of the two types of data is perhaps established by the use to which it is put in a study, rather than to an inherent characteristic of the data itself. 1.8: Research Design The research design is the description of how the research process will be completed. It is a framework which includes the considerations that led to the appropriate methodology being adopted, the way in which the respondents were selected, and how the data will be analysed (Flick, 2011). There are a number of different characteristic research designs, namely the descriptive, explanatory, and the exploratory. The descriptive research design relates to reflecting the experiences of respondents. It is thus related closely to ethnographic studies, but a quantitative framework is also an appropriate framework; for example, the demographic characteristics of a population subgroup can be reported (Bryman, 2012). An explanatory research design is focused on how to effectively explain the characteristics of a population or a social phenomenon (Saunders et al., 2007). This may be seen as effective where using a quantitative framework, where the influence of one variable on another can be established (Kothari, 2004). The exploratory study is an exploration of an issue that takes place before enough is known to conduct a formulaic research project. It is usually used in order to inform further research in the subject area (Neuman, 2003). 1.9: Samples A sample is a representative segment of a larger population (Bryman, 2012). In quantitative research, the sample size and how it is selected can be used to establish the reliability of the results of the study. In qualitative research, the sample characteristics are also important, but much smaller samples tend to be used. 1.9.1 Sample Size The sample size represents the number of respondents selected from the overall population that are used in the research (Newman, 1998). In quantitative research, the size of the sample is essential in determining the reliability of the results of a study. Sample sizes of much less than 30 will tend to produce results where individual respondents may skew the results. In such cases, the larger the sample size the more reliable will be the results (Flick, 2011). In qualitative research, the size of the sample is less important, and the concept of representativeness is not as strong a guideline for the validity of the research. 1.9.2: Sampling Techniques Sampling techniques are the ways in which an appropriate sample size is selected for the wider study (Bryman, 2012). There are a number of accepted techniques that can be used. A random sample represents individuals within a larger population who are chosen at random. However, this can result in random distribution, which can mean significant skewing resulting from the random nature of sample selection (Neuman, 2003). For example, a random sample may result in more males than females being represented in a sample, or an unequal distribution across ages. A stratified sample may then be used to ensure that the representatives of the population in the sample reflect the significant characteristics of the wider population, such as making sure that the demographic characteristics of age and gender are reflected in the sample (Newman, 1998). A convenience sample is where the sample is taken from an existing framework, such as an educational institution, given that the ways in which respondents may be recruited is relatively straightforward. This may be appropriate if a study is concerned with studentsà ¢Ã¢â€š ¬Ã¢â€ž ¢ views, and it proved convenient to sample just one educational institution; it may be considered unlikely that significant variation in studentsà ¢Ã¢â€š ¬Ã¢â€ž ¢ characteristics will occur between institutions or that those characteristics will have a significant effect on the results of a study. Conclusions In this study, the different stages of the research onion were described. Given the research onion comprises different stages of many research projects and can be effectively adapted to different models, this report has necessarily been summative and restricted in depth. However, the stages defined by Saunders et al. (2007) have been expounded upon, and the usefulness of the staged development of the onion demonstrated. The most effective model of its effectiveness, however, lies in its use. References Banister, P., Bunn, G., Burman, E., Daniels, J. (2011). Qualitative Methods In Psychology: A Research Guide. London: McGraw-Hill International. Beiske, B. (2007). Research Methods: Uses and limitations of questionnaires, interviews and case studies, Munich: GRIN Verlag. Bryman, A. (2012). Social research methods (5th ed.). Oxford: Oxford University Press. Bryman, A., Allen, T. (2011). Education Research Methods. Oxford: Oxford University Press. Bryman, A., Bell, E. (2011). Business Research Methods (3rd ed.) Oxford: Oxford University Press. Feilzer, M. Y. (2010). Doing mixed methods research pragmatically: Implications for the rediscovery of pragmatism as a research paradigm. Journal of Mixed Methods Research, 4(1), pp.6-16. Flick, U. (2011). Introducing research methodology: A beginners guide to doing a research project. London: Sage. Goddard, W. Melville, S. (2004). Research Methodology: An Introduction, (2nd ed.) Oxford: Blackwell Publishing. Gulati, P. M. (2009). Research Management: Fundamental and Applied Research, New Delhi: Global India Productions. Institut Numerique, (2012). Research Methodology, http://www.institut-numerique.org/chapter-3-research-methodology-4ffbd6e5e3391 [retrieved 3rd October, 2014]. Kothari, C. R. (2004). Research methodology: methods and techniques. New Delhi: New Age International. May, T. (2011). Social research: Issues, methods and research. London: McGraw-Hill International. Monette, D.R., Sullivan, T. J., DeJong, C. R. (2005). Applied Social Research: A Tool for the Human Services, (6th ed.), London: Brooks Publishing. Neuman, W. L. (2003). Social Research Methods: Qualitative and Quantitative Approaches, London: Allyn Bacon. Newman, I. (1998). Qualitative-quantitative research methodology: Exploring the interactive continuum. Carbondale: Southern Illinois University Press. ÃÆ'–stlund, U., Kidd, L., WengstrÃÆ' ¶m, Y., Rowa-Dewar, N. (2011). Combining qualitative and quantitative research within mixed method research designs: a methodological review. International Journal of Nursing Studies, 48(3), pp. 369-383. Podsakoff, P. M., MacKenzie, S. B., Podsakoff, N. P. (2012). Sources of method bias in social science research and recommendations on how to control it. Annual Review of Psychology, 63, pp.539-569. Rowley, J. (2012). Conducting research interviews. Management Research Review, 35(3), pp.260-271. Saunders, M., Lewis, P., Thornhill, A. (2007). Research Methods for Business Students, (6th ed.) London: Pearson. Silverman, D. (2013). Doing Qualitative Research: A practical handbook. London: Sage. Snieder R. Larner, K. (2009). The Art of Being a Scientist: A Guide for Graduate Students and their Mentors, Cambridge: Cambridge University Press. Wiles, R., Crow, G., Pain, H. (2011). Innovation in qualitative research methods: a narrative review. Qualitative Research, 11(5), pp.587-604.

Friday, January 17, 2020

Whale Riders Film Analysis

When choosing a film for this assignment, my original choice was Bend It Like Beckham because I had heard of it and I had a general idea what it was about. I then decided that I wanted to take on a more challenging film, one that I had never heard of, and one that I would really have to study to understand its full meaning. After looking into a few of the listed movies, I ended up choosing Whale Rider, a drama filmed in New Zealand in 2002. After watching the movie two times, I feel that I now understand some of the more drastic cultural and gender based problems that are occurring today. The film's plot follows the story of Paikea Apirana, yet she goes by the name Pai in the film. Pai is a 12-year-old girl who is the only remaining child in the line of the tribe's chiefly succession after the death of her twin brother and mother when she was born. By tradition, the leader of the tribe should be the first-born son, or a direct descendant of Pai’s family. Yet because there is no direct male descendant, Pai’s grandfather Koro Apirana has to find the next male leader amongst their tribe. Koro is the current leader of the tribe and has to set up a series of tasks that are required to become the next leader of the tribe. Unfortunately, Pai is female and technically cannot inherit the leadership. Throughout the movie, Pai’s grandmother Nanny Flowers encourages her to train just as the boys of the tribe do to hopefully convince her grandfather to name her the new leader. One of the final tasks to be named the tribe leader is to retrieve a whale’s tooth from the sea by riding the back of a whale out to sea, hence the name of the film being Whale Rider. After watching this film, I feel that the director Niki Caro is trying to explore the ways that gender and power are exemplified in certain cultures around the world. I feel that the main example from this film involves the main character Pai being female and how that limits what she can and cannot do in her tribe. The tribe’s past history has always told them that a male should be leader and that females are to never be in power in any way, shape, or form. When the young boys are training with Koro to hopefully become the next descendent to be leader of the tribe, Pai is still not allowed to take part in the events. I feel that gender issues are also present in the everyday life of people all around the world, not just in this particular small tribe. It is a proven fact that in America, the average wage of men is higher than the average wage of women. Men also tend to hold higher positions in various labor industries across the country. Gender discrimination has always been a major issue in many societies around the world, yet many feminists groups around the world are slowly making the issue diminish. Another aspect of the film that Niki Caro explores is the way the power and control affects the lives of anyone in a given society. In the film, Pai’s grandfather Koro exerts his power over Pai by informing her that she will never be leader of the tribe due to her gender. Throughout the film he continuously tells her that she is the reason that the tribe may be at its final downfall. Even though she did nothing wrong, her being female makes her grandfather feel let down. Koro is in charge of everything that the people of the tribe do on a regular basis. He is the person who makes all of the decisions and controls all events. The presence of his power makes him seem like more of an intimidating figure who can control the lives of others. This leads to my first concept from our reading that was illustrated in Whale Rider which is Ideology of Patriarchy, or the structural dominance of men that is built into the institutions of society. Whale Rider exemplified the Ideology of Patriarchy perfectly because of how Koro ran his tribe. For generations, this tribe was always told that a man is to be the leader. When Pai is the only remaining family descendent, Koro becomes aggravated because she is female and will not be able to carry on the tradition of men as leaders. As the movie progresses, you begin to notice that Koro is slowly starting to accept the fact that maybe his granddaughter is fit to be a leader of their tribe. This leads to the second concept that I feel was expressed which is the idea of identification and the extent to which an individual is likely to make a decision that aligns with organizational objectives. When Koro originally has the feeling that Pai is not suitable to be leader, he is under the impression that he has to find someone outside of the family to take over his role once he passes. He soon realizes that the real thing that he should be focusing on is keeping the leader role in the family. Identification is accomplished by accepting the importance of family and what it means to be true and respecting of those who are closest to you in your life. The theory of identification also carries over to idea of the control that Koro has over his tribe. When Koro initially begins scouting young boys around the tribe in order to find his next leader, he set up training and a series of tasks each person needed to succeed with. Koro exerts what is my third concept of concertive control, or when explicit written rules are replaced by common understanding of values, objectives, and means of achievement, along with a deep appreciation for the organization’s mission. During Koro’s training of the young boys, Pai was secretly training with her uncle who knows all of the ways of fighting and training needed to succeed. When Pai defeats a young student of Koro’s in a fight, Koro becomes very upset but begins to realize that she may be the most suitable for the leader role. Koro eventually understands that the value of keeping the leadership role in the family is the most important objective, even if the descendant is female. This leads to the final concept that the film expresses which is the role of gender in society and the different aspects of how gender is treated in this particular tribe. From our readings, we learned that gender is socially constructed depending on the society’s specific views and morals. In this tribe, females are not able to hold any type of leadership role. We also learned that gender is learned and performed. Typical themes of femininity could be classified as sensitive, caring, beautiful, and in some cases accept negative treatment. Even though Pai had always grown up learning what it meant to be a girl and a woman, she had to learn certain aspect of masculinity in order to become leader of the tribe. She had to learn how to fight, how to train, and how hold a position of power of a group of people. Pai was able to show her family and the people of her tribe that a female can do anything a male can do and do it just as successfully. Whale Rider taught me a lot of different aspects the ways that people treat others in society. I have never agreed with the idea that men can always do things better than women, but this film really pressed that into my mind. I now have a whole new appreciation for feminists and everything that they stand for. Women have the same rights that men do and should be given the same amount of opportunities in life. I feel that Whale Rider was a great film that was able to show the viewers how power and control really affects people. This film was the perfect way to show the world what it really means to stick up for yourself and fight for what you believe in.

Thursday, January 9, 2020

Comparison of Humanistic and Biological Theories

Comparison of Humanistic and Biological Theories The articles chosen tend to be more informative in illustrating the humanistic theories and the biological theories. The articles are more scholarly and add knowledge in comprehending and being able to apply the different ideologies concerning the comparison of the theories and application in the real life situation. The basic concepts of biological theories and the humanistic theories show great differences. To begin with, it important to highlight the basic concepts that illustrates the social psychology. The humanistic theories describe the adherence on the present rather than to the past or to the future (Maslow, 1967). Healthy people need to take the health regardless of the actions taken. Every person; explain the possession of the inherence. Regardless of the presence of the negative actions that may affect a person. In addition, the fourth aspect indicates the achievement of personal growth and comprehending the goal in life. On the hand, the biological view has the different focus in that the feeling other that the personal worth. The living theorists point at the generic makeup, which depicts the individual way of determining the intelligence. The indirect relation of their biological concept shows the way it affects growth. The living theorist point at the intelligences and the genes and determine the character of humans (Zentall Galef, 1988). Regardless of this view, the humanistic theories are oversimplified in the way of its argument while the biological theory is overcomplicated. Although they represent the essence of being on the illustration of the person, personality there is the emphasis on the essence of the theories. The premise of the biological theory indicates that people inherit the features from their family members. Furthermore, the theory indicates that individuals have no power of influencing their characteristic characteristics since they are genetically modified and predetermined. This differs with the humanistic theory in which it indicates that an individual have the power to influence their features. This can be through learning behaviors and influences from the environment. Findings The findings according to the different theorists indicate that humanistic and biological theories are different. The humanistic theory as stated by Abraham Maslow in the example of the hierarchy of needs. According to Maslow, (1967) â€Å"A THEORY OF METAMOTIVATION: THE BIOLOGICAL ROOTING OF THE VALUE-LIFE†, the highest rank based on his pyramid is self-actualization as individuals fulfill their needs fully. According to biological theorists, Hans introduced the three dimension of their explanation of the individuals character. They include the extroversion-introversion, psychotics and neurotics. His argument is based ion the classification that either shows the outgoing and the impulsive example of the personality traits. In my opinion, a different view tends to show the character of people. The theory of Maslow is valid since in the current world people strive to meet basic needs and climb the ladders as they seek to self-actualize. It helps in the management and motivation regarding personal development. The psychological; needs are food, sex, clothing, shelter, health, water and sleep. The biological perspective is in detail as it is a fact that our brains develop and consist of neutrons. The physical characteristics show the disposition of the characteristics. I would choose the humanistic theories because I can easily relate and understand especially when using Maslows theory. Conclusion In conclusion, the theoretical perspective tends to explain the human character. The theory relates in their explanation of character. It is important to view the behavioral characteristics that are learned depending on the environment. The analysis of the humanistic and biological theories helps in understating the human character and the traits they represent. References Maslow, (1967) A THEORY OF METAMOTIVATION: THE BIOLOGICAL ROOTING OF THE VALUE-LIFE., A. H. Journal of Humanistic Psychology, Vol 7(2), 1967, 93-127. Doi: T. R. Zentall, B. G. Galef, (1988) Social Learning: Psychological and Biological Perspectives

Wednesday, January 1, 2020

Indian Classical Dance and Music - 1978 Words

Its only for a section of society. The masses cant really relate to it.; Its extinct.; I dont know anything about that. But I can talk to you about Jazz, if you want. Talk about Classical Music and Dance and these are the replies you get from the people of the country, supposedly so rich in heritage and culture. Boasting to have strong traditional and cultural roots, our country has always called itself the land of arts. Unfortunately, the very same country lives in an irony today as its classical arts face an abandonment from the masses. Who is to be blamed? is the big question. India claims to be the land of art and culture. Yet sadly, if we look at the present scenario, we find hardly anyone with genuine interest or†¦show more content†¦The times have changed. And so have the demands of the people. They enjoy a Reshammiya Concert over a Classical Music Night. The basic thought that Indian classical arts are backward Indian Classical arts instil within you the kind of traditional values that We take great pride in talking about our great Indian culture. But who is keeping it alive? Its the ignored artists who are keeping the literature, The basic interest in classical traditional art was more. The number of performances have gone up Western influence too much in lifestyle and art. Is the media, people or the audience? We are making the effort of going out. Institutions are going and trying to create awareness Even if you somehow find the opportunities, it is disheartening to see the response of the audience. Though, Shovana Narayan has a different story to tell. After performing in front of a jam packed crowd at Surajkund, I least expected to have a Haryanvi man coming up to me and telling how much he enjoyed the beauty of the performance. We judge the intellect of the common man too soon. Given the platform to see quality arts, they will also learn to appreciate it. Professional Hazard Every profession has its own related hazards with it. Its a non glamourous profession and it has and appeal to a select audience, says Oddissi dancer, Rashi Khanna. There is so much art in our country. And every art form hasShow MoreRelatedIndian Dance Is The Expression Of India s Rich Cultural Heritage And Traditions1142 Words   |  5 PagesIndian dance is the expression of India’s rich cultural heritage and traditions. Mythology, legends, classical literature, nature and everyday life is the basis and inspiration of the movements from Indian dance. Indian dance is separated into two main forms, folk and classical. Indian folk dance is the expression of joy. It is performed regularly, and also on special events, such as to celebrate the arrival of seasons, birth, festivals and weddings. On the other hand, some examples of classicalRead MoreRole of Youth in Enriching and Conserving Your Cultural Heritage1661 Words   |  7 Pagesand prove unity among diversity. India does n ot have one but many great traditions. Cultural heritage stands for things that have been passed on from earlier generations to the present generation. Of special significance are the works of literature, music and arts in all its forms and shades. India has a rich cultural heritage. It is a healthy blend of various Cultural Heritage. In the initial phases of our civilization, we remained aloof but for the last three thousand Cultural Heritageyears tillRead MoreA Brief Note On Hip Rap And Hip Hop And Rap Industry830 Words   |  4 Pagestheir music. Yo Yo Honey Singh, is a prime example of an artist who used the high exposure to introduce a new and exciting style of music to the Bollywood industry. Bollywood being the largest movie producing industry in the world, is known for its native and colorful music. Yo Yo Honey Singh being an Indian rapper and hip hop artist, influenced the Bollywood industry by breaking free from the customary music selection and introducing a fresh taste. Yo Yo Honey Singh revolutionized the Indian hip hopRead MoreMusic of India Essay883 Words   |  4 PagesMusic of India The music of India is a mosaic of different genres and levels of sophistication. At one extreme, classical music is performed in the urban concert halls for purely artistic reasons, and at the other, many kinds of functional rural music accompany life-cycle and agricultural rites. In between are many other musical genres of different regions of the country, reflecting the diversity of its peoples. The origins of classical music can be traced to the Natya Shastra, a SanskritRead MoreEssay on Indian Music1105 Words   |  5 PagesIndian Music The music of India is one of the oldest unspoken musical traditions in the world. The basis of for Indian music is â€Å"sangeet.† Sangeet is a combination of three art forms: vocal music, instrumental music (Indian music). Indian music is base upon seven modes (scales). It is probably no coincidence that Greek music is also base upon seven modes. Furthermore, the Indian scales follow the same process of modulation (murchana) that was found in ancient Greek music. Since Greece is alsoRead MoreKathak And Indian Culture And Culture1296 Words   |  6 Pageswell-known then others. It can take the form of both music and dance, and Indian culture in particular is very popular around the world, especially concerning their types of dance. One dance style is called kathak, and it is performed in several countries. Kathak is especially important for Indian culture because it is also a way for the Indian diaspora to connect with their culture and associate with it. As a result, kathak dance is a part of Indian identity, and strongly influences its individualsRead MoreIndian Music4009 Words   |  17 PagesIndia The music of India includes multiple varieties of folk, popular, pop, classical music andRB. Indias classical music tradition, including Carnatic and Hindustani music, has a history spanning millennia and developed over several eras. It remains fundamental to the lives of Indians today as sources of spiritual inspiration, cultural expression and pure entertainment. India is made up of several dozen ethnic groups, speaking their ownlanguages and dialects, having distinct cultural traditionsRead MoreThe Taj Mahal or The Golden Temple820 Words   |  3 PagesTomb 2 Festivals 3 Dance 3 Theater 3 Music 3 India has some of the world’s greatest arts. For example the Taj Mahal, the Golden Temple, and Sri Ranganathaswamy Temple. In India, art is expressed in many different forms. India has one of the world’s largest collections of songs, music, dance, theatre, folk traditions, performing arts, rites and rituals, paintings and writings. PAINTED ART History History in painted art is very important to Indian culture. The earliest Indian paintings were theRead MoreA Brief Look at Bharatanatyam1597 Words   |  6 PagesIntroduction â€Å"India’s precious heritage of music, drama and dance is one which we must cherish and develop. We must do so not only for our own sake but also for our contributions to the cultural heritage of mankind. Nowhere is it truer than in the field of art that to sustain means to create. Traditions cannot be preserved but can only be created afresh. It will be the aim of this Akademi to preserve our traditions by offering them an institutional form†¦Ã¢â‚¬  (Maulana Azad, 28th January 1953, inaugurationRead MoreHindu Religion And Hindu Churches1153 Words   |  5 Pagessinging and dancing. Also he helps many people in the community to sing and learn to dance Indian classical music. Rick teaches two days a week Mondays and on Wednesdays. He also told me that he loves helping people realize their talent in dancing classical music and singing bhajans (a traditional Indian song sang in church). My last person who I interviewed is Valiene; she helps Rick with teaching the stud ents to dance. I asked her how many people does she teach? She told me she teaches about 20 students