Monday, December 30, 2019

Ancient Religions And The Epic Of Gilgamesh Essay

Ancient Religions of the Mesopotamians, the People of the Indus Valley, the Egyptians And the Epic of Gilgamesh The dictionary tells us that religion is a set of beliefs relating to the cause, nature, and purpose of the universe, involving devotional and ritual observances, and often containing a moral code governing the conduct of human affairs. Where do we get information to study about ancient religions? The easiest would be from writings, but in some cases there is no documentation or evidence of writings. So we turn to graves, buildings, art, artifacts, and everyday objects that were used in ancient times. By examining these items found in Mesopotamia, Indus Valley, and Egypt we can compare and contrast these ancient religions. In the Epic of Gilgamesh, a story found written in Mesopotamia we can compare their religion to the story. We can also explore the Epic of Gilgamesh and see how it is comparable to the biblical story of Noah. Mesopotamia means the land between two rivers, the Tigris and the Euphrates. It is modern day Iraq. Writings left behind start as pictographs or drawings and then change to cuneiform, which is wedge shapes pressed in clay. From these cuneiform writings, we can tell the people practiced polytheism. Mesopotamian gods favored truth and justice they were also responsible for violence and suffering. The gods controlled all aspects of life, especially the forces of nature. (Gale) The name of the god depended on the location inShow MoreRelatedAnalysis Of The Epic Of Gilgamesh 1119 Words   |  5 PagesTranslation Comparison Gilgamesh The Epic of Gilgamesh has been read and reviewed/ critiqued by numerous authors. I took the articles’ ‘Angiology in the Epic of Gilgamesh’ by Th. Jacobson, and compared it to Benjamin Fosters ‘A New edition of the Epic of Gilgamesh’ These two articles both critique the writings of The Epic of Gilgamesh but in different ways. Foster’s article is a critique on a critique that has been written about The Epic of Gilgamesh, where as Jacobson critiques the epic itself, so we areRead MoreAnalysis Of The Epic Of Gilgamesh 903 Words   |  4 Pageshistory of the day. All ancient histories, as one of our wits has observed, are only fables that men have agreed to admit as true†¦1† No other genre is more appropriate to Voltaire’s quote than the epic. Epics in media are presented with high stakes, memorable heroes, and thought-provoking messages. They originated in preliterate societies and among the first epics is the ancient Mesopotam ian poem called â€Å"The Epic of Gilgamesh†. Written during the Third Dynasty of Ur, â€Å"Gilgamesh† tells the adventuresRead MoreGilgamesh Flood Comparison Essay823 Words   |  4 PagesThe Epic of Gilgamesh detail a grand flood in which a man saved life from extinction by building an ark, earning fame and immortality in some form. The theme of completing this grand task for a moral purpose holds true to both stories, but the depiction and actions of the divine and mortal characters in the stories contain different similarities and differences. The theme of virtue and its importance to one’s survival and legacy is prevalent in both the flood story from The Epic of Gilgamesh andRead Moreâ€Å"by the Waters of Babylon† vs Epic of Gilgamesh. Essay632 Words   |  3 Pagesâ€Å"By the waters of Babylon† Vs Epic of Gilgamesh. A lot of stories concerning religions and cultures have lot of similarities and differences, despite the fact that they are not from the same era of time. Humans used these stories and writings to express their culture and religious views. â€Å"By the Waters of Babylon† is very similar to the writings of the Mesopotamian writings in The Epic of Gilgamesh more specificlay â€Å"The story of the flood† and â€Å"The Return†. These similarities include manyRead MoreEpic Passages of The Epic of Gilgamesh and Homers Odyssey921 Words   |  4 Pageshero? In the two epic passages The Epic of Gilgamesh and Homers Odyssey, heroism appears to be a clear distinction with the literature, and has the same basic framework as today’s definition of a hero. Historically, in the texts, heroes such as Gilgamesh and Odysseus are protagonists viewed and credited with great bravery and most certainly heroism. Nearly all of the heroic figures throughout time, both fic titious and living and are viewed as a protagonist in their own epic challenge or struggleRead MoreDeath, Mortality, And The Afterlife938 Words   |  4 Pageslike the Epic of Gilgamesh, the Hebrew texture, the Bible and many more stories both historical and religious. All trying to answer the same questions regarding death, mortality and the afterlife. There are 5 immortality narratives that define the human process staying alive, resurrection, soul, a legacy, and wisdom. One of the most historical books that we have of early era is Epic of Gilgamesh. The concept of death, mortality and the afterlife are all the major themes of the book. Gilgamesh who isRead MoreAncient Civilization And Modern Day Iraq And Kuwait Essay1279 Words   |  6 PagesAncient Sumerian Civilization The ancient civilization of Sumer was located in modern-day Iraq and Kuwait, and is believed to have begun around 6000 B.C. It is considered ‘The cradle of civilization’ by most historians, because it’s where the first elaborate urban societies appeared. Sumerians were polytheistic, and had a pantheon consisting of many gods and goddesses, who were anthropomorphic superhumans. The Sumerians held a unique view of creation, the afterlife, and worship. They contributedRead MoreMesopotamian And Ancient Egyptian Are Two Very Comparable946 Words   |  4 Pagesand Ancient Egyptian are two very comparable cultures. There are similar and differences in regards to their Government, Law, Writing, Cities, Religion, Jobs, and Technology. This is reflected in their literatures, Epic Gilgamesh, and the Story of Sinuhe. Gilgamesh in the Epic of Gilgamesh and Sinuhe in the Story of Sinuhe are important characters that outline the perspective of an ancient society’s. The Epic of Gilgamesh was a story completely written in cuneiform. The author for this Epic poemRead MoreThe Search for Immortality in the Epic of Gilgamesh Essay1500 Words   |  6 Pagesfor eternal life is a cultural universal. The ideology surrounding immortality transcends time and a plethora of cultures. The theme, immortality appears in stories from the Epic of Gilgamesh, which was composed by ancient Sumerians roughly around 600 B.C., to present day works of fiction in the twenty first century. Gilgamesh, a figure of celestial stature, allows his mortal side to whittle away his power after the death of Enkidu. Undeniably, defenseless before the validity of his own end, he leavesRead MoreThe Epic Of Gilgamesh : The Struggle For Women1183 Words   |  5 Pagesfrom the ancient Mesopotamians to the 1900’s. There has been a continuous battle for women to gain equal rights legally and to be treated equally in all aspects of life. The Epic of Gilgamesh contains some of the oldest recorded accounts of the roles of women and their importance in a functional society. Women have been viewed as anything from goddesses to unwanted servants throughout history, regardless of a variety of changes in rulers, religions, and time periods. The Epic of Gilgamesh might lead

Saturday, December 21, 2019

Why Algebra Should Be Considered Prudent - 1358 Words

While taking algebra, students are exposed to abstract thinking by making decisions based on given information. When they apply for a job or participate in a work setting, the employers will look for these abstract thinking skills. In the article, â€Å"Should Algebra Required† which appeared in the New York Times, Hacker states that algebra as a requisite is an obstacle for many students to graduate from college. Hacker indicates that algebra should be considered prudent because it â€Å"develops student’s problem solving skills, which involve step-by-step analysis† (2012). Based on that, this step-by-step analysis skill is important in several career settings, including but not limited to the following fields: law, medical, and mathematics. However, further research shows that even occupations such as electricians, upholsters, and plumbers that do not require a college degree must have some type of background in mathematical and reading skills. If as a society we consider to lower academic standards, then we will face the consequences in our nation, especially with the immense competition in the new global economy. As a citizen, scientist, or simply a human being, one must prepare our mental abilities to be able to understand abstract thinking in different disciplines in order to make the proper connections between problems and solutions. At times, abstract math is best used when trying to picture a mathematical problem in the real world. Ed Yong from National Geographic statesShow MoreRelatedMathematics Is Essential For Life1536 Words   |  7 Pagesessential in life. College algebra is a mathematical concept that is currently being used in biomedical, mathematical, physics, and computer science degrees. This subject is considered the foundation for advanced mathematical courses. Students typically pursue a University degree in order to get a decent job after graduation; however, once hired, they are deficient in able to solve complex problems. This is due because of their lack of ability to use logical thinking. College algebra may be complex for someRead MoreAlgebra, Logical Thinking, Or Prerequisite For Future Courses Essay1647 Words   |  7 PagesIn order to understand what algebra is we must first look at a problem given to us understand what the problem is, question ourselves to what is given, and then reali ze the conditions that are presented which then helps us plan our strategy to solve a problem. This approach is useful not only in mathematics, but in other concepts such as in science. In algebra, logical thinking skills are used to make sense or make connections of a problem in order to find a solution. Mathematicians create universalRead MoreCollege Algebr A Problem Solving Skill Essay1785 Words   |  8 Pagesmembers, college algebra needs to be implemented in the school system. Their Standards show that â€Å"mathematical power† is required in order for students to perform effectively in a â€Å"variety of authentic settings† (Steen 1992). Algebra looked upon from a student perspective is known as a problem solving skill meaning a process to seek solutions to certain problems give. However, looking at algebra from a broad approach we notice that it is very similar to human stages which are considered to be a babyRead MoreThe Impact of Using Technology on Students’ Achievement, Attitude, and Anxiety in Mathematics8727 Words   |  35 Pagesstudy designed to determine the effects of using technology, specifically graphing calculators, on students’ achievement in College Algebra, attitude, and anxiety in mathematics. The respondents of the study belonge d to two intact classes consisting of 66 freshman students from the College of Science, De La Salle University, Manila, who were enrolled in College Algebra during the first term, schoolyear 2002-2003. For purposes of this study, three groups were formed, each with 22 students – the highRead MoreCfa Level 3 2013 Summary8327 Words   |  34 PagesRegulatory/legal, Liquidity, tIme, Tax TDA vs. TEA – Higher Enders Take TEA – Higher Ending Tax rate TEA better Residence vs. Source – Pay Greater rate with Credit, Exempt Source Income, Deduct Paid Taxes If our Human Capital is Bond-like, we should invest more aggressively (equity) and our demand for life insurance increases. ------------------------------------------------- Type I amp; II Error – Type I, I did something (rejected H0) wrong; Type II, failed TO reject H0 ------------------------------------------------- Read MoreAppraisal Techniques of Public Investments and Projects62994 Words   |  252 Pages(office) October 2011 The purpose of this Training Manual is to help PITT implement the use of international best practices of Investment Appraisal techniques in its programming of public sector investments. It describes how public sector investments should be assessed at conception or programming stage. The modules introduce the basic concepts behind the appraisal techn iques and their applicability in the Rwandan context. It describes the DCF methodology, the shadow pricing methodology and performanceRead MoreDatabase Design and Implementation38677 Words   |  155 Pagesthe database into production use and perform operational maintenance. 7. Repeat this cycle (probably every ten years or so). Being a visual animal, I have drawn a diagram to represent the database life cycle (Figure 2). Our expectation of databases should not be that we capture a large quantity of data and are done, but rather that we will need to cycle those data through 2 PhyloInformatics 7: 3-66 - 2005 Figure 2. The Database Life Cycle the stages of the database life cycle many timesRead MoreStrategic Human Resource Management View.Pdf Uploaded Successfully133347 Words   |  534 Pagesconceptual framework for this text begins with an investment perspective for guiding managerial strategic decisions regarding human resources. Human resource management practitioners and management scholars have long advocated that human resources should be viewed from an investment perspective. Current practices in many organizations indicate that employees are viewed as valuable investments. However, some still view their employees as variable costs of production, while physical assets are treated

Friday, December 13, 2019

Lone Bather Free Essays

The narrator described a boy who wished or longed to become a great swimmer. His bed became his pool. As he jumped to his bed, he feels like he was the greatest swimmer ever. We will write a custom essay sample on Lone Bather or any similar topic only for you Order Now He became a dolphin with a shoal using his thigh and flexible body. His imagination turned into reality as he closes his eyes and thinks of a swimming paradise. However, a dream is always a dream. The boy went back to reality as he heard someone threw a stone in his window. The first stanza of the poem seemed to be difficult because it shows abundant signs and symbolisms that readers could not thoroughly understand the topic of the poem or the attack of the author to the aspect of creativity and imagination. The most difficult part in this stanza is the first three lines – Upon the ecstatic diving board the diver, / poise for parabolas, let’s go / let’s go his manshape to become a bird. In the first read, I can say that I could not understand the scenario of the poem because of the complexities of the diving board for water and bird for air but after reading it many times, it simply represents the depiction of the boy imagining himself as a diver with a high jump like a bird before coming to the water pool. On the other hand, my favorite passage in this poem is in the second stanza – He rolls in his heap of fruit, / he slides his belly over / the melonrinds of water, curved and smooth and green. For me it illustrates the childish act of the boy as he imagines himself as a diver in a deep pool. His flexible body and astonishing moves give me an idea about the conviction of the boy to become a swimmer or it can also be seen as a frustration of thought as he wanted to pursue his dream. Work Cited Lone Bather. p.44 How to cite Lone Bather, Essay examples

Thursday, December 5, 2019

Information Security Security and Privacy Issues in Cloud Computing

Question: Discuss about theInformation Securityfor Security and Privacy Issues in Cloud Computing. Answer: Introduction Cloud Computing is defined as a computational paradigm that helps in providing quick, secure and convenient storage of data with the help of different computing resources which is visualized as services and delivered to the internet (Dinh et al., 2013). The significance of cloud computing is growing at a faster rate as it helps in enabling convenient, ubiquitous and on-demand network access for sharing a pool of configurable resources of computing. Although there are number of benefits of adopting cloud computing, there are also some important issues related with compliance, legal matters and privacy (Zissis Lekkas, 2012). The report unearthen certain challenges that are related with privacy and security issues of cloud computing, relevant technologies associated with cloud computing, their applications. The report also discusses the vague areas of cloud computing in order to resolve the issues. Summary of the Discussion According to Beloglazov, Abawajy Buyya (2012), there are numerous privacy as well as security issues that are associated with cloud computing because it encompasses different technologies which are included in the operating systems, virtualization, transaction management and load balancing. As a result, security issues, which are related with different systems and technologies, are applicable to cloud computing. The data security involves encryption of data as well as ensuring policies, which are enforced for sharing data, memory management and resource allocation. On the other hand, Zissis Lekkas (2012) argued that there are six specific areas that requires security attention. The six specific areas include security of data at rest, processes authentication, security of data in transit, robust separation between different customers, regulatory issues and response of the incident. According to Fernando, Loke Rahayu (2013), encryption is one of the best option that is used for transiting as well as securing data. Additionally mechanism of integrity protection as well as authentication ensured that the data goes where it is required by the customers and thus it is not modified in transit. Strong authentication is very much significant for the deployment of cloud. The primary basis of access control is authentication in the environment of the cloud. In the environment of cloud, access control and authentication are much more important as data can be accessed by anyone over the internet (Rittinghouse Ransome, 2016). When the access of a user is reassigned or revoked, it is very much important to notify the customer management system. On the other hand, Li et al. (2013) stated that presently there are different technologies that are available for providing significant improvement in the security issues for virtual network separation. Trusted platform modules are required helps in providing hardware based verification, which helps in ensuring strong separation of network and security. Regulatory as well as legal issues are very much important in cloud computing as it includes security implications (Zissis Lekkas, 2012). In order to verify a cloud provider, it is very much important to have regulatory and legal issues. The issues that are considered in this regard include exportation and data security, auditing, compliance, destruction and data retention. Challenges and Problems Challenges: Assessing entire status of Security: Cloud infrastructure is complicated and vast. It is challenging that the organizations entire security status of the cloud framework is a challenging activity. Most of the organizations faces challenges due to carry out process because it does not have proper visibility. In addition to that, the organizations do not have the capability of keeping up with the changes that is being placed in real-time (Zissis Lekkas, 2012). Monitoring workloads: Keeping track of the workloads that occurs in the across the cloud is a challenging task without accurate resources. The activity is most challenging it comes to hybrid cloud. The security team loses the visibility of the remote workloads. It can be a huge issue within an active heterogeneous cloud environment (Zissis Lekkas, 2012). It is because the things in the heterogeneous are always changing. Maintaining regulatory compliance: Through making use of the cloud infrastructure for maintaining regulatory compliance is one of the most challenges for establishing effective cloud security. Provisioning security control: These fresh workloads are assessed for the fresh workloads in the cloud (Loke Rahayu, 2013). It occurs if the cyber security team is not ready for keeping up with the DevOps teams use of things like Chef and Puppet. Monitoring traffic patterns: Keeping track of the cloud based traffic patterns are a really hard work for the cloud security providers. This task is carried out for detecting the anomalous behavior of the system. The monitoring activity can be related to keeping track of weaknesses. Problems: Data security: Security against data theft is a very critical against cloud. As the information flow occurs in open internet connection (Zissis Lekkas, 2012). Network security: The network is the key of securing the information from the attackers. Relevant Technologies According to Dinh et al. (2013), cloud computing is experiencing exponential growth and the reason behind the growth is adoption of various technologies in cloud computing. Cloud discovery: The technical tem can browse the application that an organization is currently accessing. Cloud data loss prevention: The organizations will experience less amount of sudden data loss while using a cloud system. Searchable strong cloud encryption: Encryption is a sound solution for protecting the data from being theft. Cloud tokenization: The requirements of data residency are met by the use of this technology (Dinh et al., 2013). Encryption key management: Encryption is not the only stage of protecting the data. Handling the encryption key is as much essential as other processes. Cloud malware detection: Scanning the cloud based systems and stops the system from getting affected by the malware attack. Cloud activity monitoring and anomaly detection: The activities that users carry out at the cloud system is motored and examined (Fernando, Loke Rahayu, 2013). Application of the Technologies Cloud discovery: The technical team classifies the entire cloud application that is being accessed by their individual organization. Through this technology the security team can efficiently analyze the usage of the network resources. It will assist the organization to to discover if any issue occurs as soon as possible. Cloud data loss prevention: The loss of data on the cloud can be prevented through gathering complete information of the sensitive data of the cloud along with users every activity (Mishra et al., 2013). Not only that the DLP policies of the organization can incorporated with cloud so that restriction on the activities can be carried out effectively. Searchable strong cloud encryption: Encryption refers to the process of conversion of a data to another form so that the data becomes unreadable. Without the right encryption key the encrypted data cannot be decrypted. This way if the information gets into the wrong hand the it cannot be accessed. Cloud tokenization: Through the creation of random values in terms of the original data the requirements of the data residency is met. This way the data stays in the organization for its entire lifetime (Ryan, 2013). Encryption key management: The enterprise key management tools can be used for managing the key. If the key is lost then there will be no meaning of encrypting the data. So keeping the key secured is a very significant activity. Cloud malware detection: Primarily the real time scanning is used for avpiding the viruses, spams and many other threats to enter into the cloud system. Zero-day updates are also very crucial for security (Liu, 2012). Cleaning and quarantining can be considered to be as important as scanning. Cloud activity monitoring and anomaly detection: Through tracking the interaction of the user across multiple platform the security can be increased. Spot anomaly and assure compliances can be achieved through security reports and dashboard description provided in detail (Ryan, 2013). Other security solutions: Solution provides, individuals and nonprofit are entering into the discussion that is being held by Cloud Security Alliance of CSA for discussing about the best practices for mitigating the security issues in the cloud (Mishra et al., 2013). Cloud Standards site is gathering and organizing data about cloud-related guidelines a work in progress by the gatherings. The Open OWASP or Web Application Security Project keeps up rundown of top vulnerabilities to cloud-based or SaaS models that is overhauled as the danger scene changes. The infrastructural and security specifications are published by Open Grid Forum. In addition to that, information regarding the grid computing researches and developers are also published by Open Grid Forum. The best security answer for web applications is to build up an advancement structure that has intense security engineering. Ryan (2013)bring up the benefit of sifting a packetsniffer yield to particular administrations as a powe rful approach to address security issues appeared by odd parcels coordinated to particular ports or administrations. Clarification of Vague Areas The approach depends on enhancing and supporting joint effort among cloud partners to build up a cloud security determination and requirement covering the greater part of their needs. FISMA or Federal Information Security Management Act standard is responsible for defining a structure in terms of managing security of information systems and data that reside within them (Disterer, 2013). Through classifying the service security, individual services that runs on the cloud system can be utilized by distinct tenants. From avoiding the assets from being breached, the selection of the security controls is the best option. This can be done by choosing the baseline security controls and tailoring of the security control baseline (Rittinghouse Ransome, 2016). The service risk assessment activities can be done through vulnerability identification, threat identification, risk likelihood and risk level assessment. The security control baseline tailoring process is done through security controls scope establishment, compensation setting, and parameter configuring. After completion of the previous processes the development of the security control is initiated. Security authorization step speaks to the formal acknowledgment of the partners on the recognized dangers required in the reception of the administration and the concurred on alleviations (Rittinghouse Ransome, 2016). The security arrangement and security evaluation arrangement are the security SLA among the included gatherings. Following to adjusting the FISMA standard to the cloud model the technical team can receive an arrangement of security guidelines to help enhancing the structure mechanization and its joining with the current security capacities (Disterer, 2013). Research Questions For carrying out the research few questions were asked to the ex and current employees of who are working in the cloud system or related technology. The questions are as following. Is monitoring the system activities a critical job? How much error remains in the security even after addressing all the issues? How often a attack on the system occurs? Which threat is the most popular? What technology is used for avoiding the security issues? Conclusion As per the description provided in the study there is several challenges and issues in terms of implementing cloud security in an organization. But there is also many technologies that can be used for securing the cloud from the attackers. Cloud computing is a troublesome innovation with significant ramifications for Internet administrations as well as for the IT area all in all. Still, a few remarkable issues exist, especially identified with to service level agreement. The loose ends of the security is presently preventing many users from making extensive use of cloud computing. Until an appropriate security module is not set up, potential clients would not have the capacity to influence the benefits of this innovation. This security module ought to take into account every one of the issues emerging from all bearings of the cloud. A coordinated security model focusing on various levels of security of information for a regular cloud foundation is under examination. This model is int ended to be more dynamic and confined in nature. In spite of the fact that there are numerous pragmatic concerns in regards to element security and information stockpiling in view of meta-information data my examination is quite focused to infer a system that focuses on these ideas and give a pragmatic arrangement. References: Beloglazov, A., Abawajy, J., Buyya, R. (2012). Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing.Future generation computer systems,28(5), 755-768. Dinh, H. T., Lee, C., Niyato, D., Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches.Wireless communications and mobile computing,13(18), 1587-1611. Disterer, G. (2013). Iso/iec 27000, 27001 and 27002 for information security management. Fernando, N., Loke, S. W., Rahayu, W. (2013). Mobile cloud computing: A survey.Future Generation Computer Systems,29(1), 84-106. Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption.IEEE transactions on parallel and distributed systems,24(1), 131-143. Liu, W. (2012). Research on cloud computing security problem and strategy. InConsumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on(pp. 1216-1219). IEEE. Mishra, A., Mathur, R., Jain, S., Rathore, J. S. (2013). Cloud computing security.International Journal on Recent and Innovation Trends in Computing and Communication,1(1), 36-39. Rittinghouse, J. W., Ransome, J. F. (2016).Cloud computing: implementation, management, and security. CRC press. Rittinghouse, J. W., Ransome, J. F. (2016).Cloud computing: implementation, management, and security. CRC press. Ryan, M. D. (2013). Cloud computing security: The scientific challenge, and a survey of solutions.Journal of Systems and Software,86(9), 2263-2268. Zissis, D., Lekkas, D. (2012). Addressing cloud computing security issues.Future Generation computer systems,28(3), 583-592. Zissis, D., Lekkas, D. (2012). Addressing cloud computing security issues.Future Generation computer systems,28(3), 583-592.

Thursday, November 28, 2019

Is Redemption Always Possible Essay Example

Is Redemption Always Possible? Essay Is Redemption Always Possible in the End? Amir made a crucial life altering decision at the age of twelve. Being so young he made choice and became a bystander. Throughout Amir’s life he was riddled with guilt; he spent most of his time hiding from the truth or trying to relieve his guilty conscience. Some of his methods were helpful and destructive to himself and others. Some ways Amir sought redemption were to: trying to get Hassan to punish him, asking Baba for new servants, framing Hassan, going back to Afghanistan, allowing Assef to beat him up and finally adopting Sohrab and bringing him home to America. Most of these methods don’t turn out exactly how Amir plans. After having a guilty conscience weigh Amir down he felt he need to seek redemption. One of his initial reactions was to try to get Hassan to punish him. His logic was Hassan could physically hurt him so they would both experience pain. Unfortunately what Amir didn’t consider was that Hassan would never do that to Amir; he is too loyal. Amir takes him to the pomegranate tree they frequent and provokes Hassan. He throws pomegranates at him and calls him names. Ultimately what happens: Then Hassan did pick up a pomegranate. He walked toward me. We will write a custom essay sample on Is Redemption Always Possible? specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Is Redemption Always Possible? specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Is Redemption Always Possible? specifically for you FOR ONLY $16.38 $13.9/page Hire Writer He opened it and crushed it against his own forehead. â€Å"There,† he croaked, red dripping down his face like blood. â€Å"Are you satisfied? Do you feel better? † (Hosseini 93). In the end Hassan was too good to betray his lifelong friend and brother. This made Amir feel even worse about what had happened. Another strategy Amir had to relieve his guilt was to ask Baba for new servants. If he didn’t have to see Hassan everyday possibly he wouldn’t feel so broken inside. When Baba refuses to get new servants and scolds him for ever thinking such a thing; Amir realizes he needs to take matters into his own hands. After his lavish birthday party he planted his new golden watch and money under Hassan’s mattress. His logic being, Baba says the greatest sin is stealing, if Hassan was caught stealing Baba would become enraged and kick them out. When Hassan confesses to stealing the watch Amir says, â€Å"I flinched, liked being slapped. My heart sank and I almost blurted out the truth. Then I understood: This was Hassan’s final sacrifice to me† (Hosseini 105). If he were to say no Baba would have believed him. Hassan is yet again too good; he was always loyal to Amir. Now Ali and Hassan are leaving, Baba is in a lot of pain and Amir’s conscience couldn’t feel worse. He has now caused total destruction to all four of them. Years later, Baba and Amir have fled to America for refugee. Amir is now married and feels weaker than ever. Years have gone by with no word from Hassan. He can’t help but think of him. When Soraya tells Amir her darkest secret Amir continues to feel worse. One day he receives a call from Rahim Khan, he asks Amir to come back to Afghanistan and that, â€Å"There is a way to be good again† (Hosseini 2). Amir wonders if Rahim knows about what he did as a child. He can’t help but return to seek redemption from Rahim and possibly Hassan. While in Afghanistan Amir finds out Sohrab is his nephew and that he must rescue him from the Taliban. The official Amir talks to about getting custody of Sohrab is Assef. They only way to get him back is if Amir kills Assef in a fight, then and there. This took much courage, something Amir had never shown before in Afghanistan. It takes a lot of bravery to agree knowing that Assef is a fighter and he is not. Amir decides to not fight back, he takes hit after hit. Eventually Amir says: I don’t know at what point I started laughing, but I did. It hurt to laugh, hurt my jaw, my ribs, my throat. But I was laughing and laughing. And the harder I laughed, the harder he kicked me, punched me, scratched me (Hosseini 289). He was laughing because he felt he finally was getting what he deserved; a beating from his bully. Knowing that he finally stood up to Assef and saved Hassan’s son was helpful in clearing his conscience, but he didn’t feel totally relieved. After rescuing Sohrab he didn’t have much to relax before he was thrown into adopting him. Sohrab tries to commit suicide and Amir prays for the first time in years. This was a wakeup call to Amir, he realized he already has Hassan’s blood on his hands he doesn’t want Sohrabs too. In adopting Sohrab this is his second chance, he can now do right to Hassan by taking care of his son. After the treacherous journey getting Sohrab the fight didn’t become much easier. Sohrab had complete shutdown he refused to talk. This caused even more of a problem for the General. One night at dinner the General makes a rude comment about Sohrab being a Hazara. Amir becomes irritated and stands up for Sohrab, something he never did for Hassan. After months of this behaviour most have given up on Sohrab, but not Amir. He takes him out kite flying; after chopping down a kite he chases after it. Sohrab finally showed emotion, â€Å"I looked down at Sohrab. Once corner of his mouth had curled up just so. A smile. Lopsided. Hardly there. But there† (Hosseini 370, 371) This was the best and most effective form of redemption. Amir didn’t mean to cause destruction by his action as a child. He was a scared boy trying to preserve himself. His actions as a child were cowardice, but he grew into a brave young man. He worked hard and was willing to give up everything to seek redemption. Work Cited Hosseini, Khaled. The Kite Runner. New York: Riverhead Books, 2003. `

Sunday, November 24, 2019

Love poems Essay Example

Love poems Essay Example Love poems Essay Love poems Essay Sometimes what you need to say can be very short. In fact it may be the fact that the poem is short that makes it special. Its short length may show that you put the time and effort in to make every word count. You considered carefully every word choice. Every word choice has a reason behind it. A short poem can be the ultimate act of romance when it is given the time and effort that it deserve. When I first looked into your eyes, I became weak I was so shy that I couldnt even speak So I handed you a letter and walked away Hoping youd read it, wondering what youd say I went to the lake as the sunset Thinking of you, I swear I couldnt ever forget The way you smiled and laughed so sweet Remembering how my heart skipped a beat Your eyes are more beautiful than the setting sun When you looked into mine, I knew you were the one I no longer think back of being so lonely Because all I need now Is you, my one and only Being hurt in the past only made me stronger Now have you and wish my days lasted longer Watching the rain as It falls from the sky Kissing your lips as we close our eyes Making you smile Is Like a dream come true Aside from the night I fell In love with you Im so happy you read the letter I wrote If I werent so shy, I promise I would have spoke Loving you dearly has always been easy Never having the feeling that youd ever leave me Every night when I dream Its always of you When I awake I realize my dream came true

Thursday, November 21, 2019

The Effect of Literacy and Education of Women on Conditions in the Essay

The Effect of Literacy and Education of Women on Conditions in the Middle East - Essay Example Freedom of choice is the main priority given by education and knowledge. Today, women in the Middle East are limited by their narrow worldview based on domestic values and prejudices (Jaffee 68). â€Å"Thus money is spent on boys, who could eventually pay it back† (Faisal 2003). Education and knowledge would give women great opportunity to choose their life path and become free from other people and events. From the social point of view, knowledge and education give the feeling of personal freedom and mobility. If women lack literary skills and education, democratic rights and freedom of speech and expression cannot make people free, because they cannot understand true meaning of these institutions (Rejwan 45). In modern world, a woman should be free to choose her life path and accept decisions based on this knowledge. To some extent, education embodies personal democracy for Muslim women, acting as a social leveling force, granting more and more people a wide range of personal choices (Moghadam 17). For instance, education would support democracy and lead to absence of physical oppression, result in a sustained outpouring of human creative activity in every form imaginable. The fundamental change would lead to new society based on equal rights and employme nt opportunities, abolition of patriarchy and male dominance in all spheres of life. Education and literacy would change family life and give women opportunities to become free from a father’s or husband’s will. Education and literacy would have a great impact on the society which can be compared with social changes in Europe and America at the end of the 19th century. During this period of time, women received a chance to educate themselves and became a strong political and social force. This tendency led to women rights movement and equal employment opportunities and protection of their family life

Wednesday, November 20, 2019

News and Communication Theory Essay Example | Topics and Well Written Essays - 3750 words

News and Communication Theory - Essay Example Significant level of literature on polarisation as well as selective exposure supposes that the Internet aggravates the fragmentation or separation of the media as well as of the citizenry. Nevertheless, this pays no attention to how the widespread utilisation of social media has changed news consumption across the world. Social media endow with readers a choice or option of stories from dissimilar sources that come advocated from politically, economically as well as socially heterogeneous individuals in the context that highlights social value over different ethnic affiliations. Building on different existing models of news and information selectivity (in respect to the business of journalism) to give emphasis to information utility, various researchers have hypothesised that the distinctive feature, social and political endorsements of social media trigger different decision heuristics which suggest utility. In respect to two experiments, researchers have demonstrates that much str onger social endorsements raise the probability that individuals select information and that their attendance decreases different selective exposure to the levels indistinguishable from the notion of chance (Messing and Westwood, 2011, p.1). This paper is aimed at providing a detailed analysis of the process of the emergence of Social Media re-shaped the gathering, dissemination and character of news and also its sustainability of the future trends. Thereafter the paper explains the ways which demonstrates different process through which the â€Å"many-to-many† model of communication affects the traditional notions and experience of accuracy, impartiality, fairness, spatial reach and relevance and timeliness. Research question: The research question of this essay is described as: what are the influences of social media and many-to-many models of journalism, communication and news delivery system across the globe consistent with its effects on traditional notions and are these trends in the system of journalism communicational system sustainable for the future? Social media and modern news delivery system: The emergence of the social media has been regarded as one of the most important aspects in modern structure of journalism and news. People who read news online use it because it is easily accessible, faster and it is available in 24/7. People who read hard copies of newspaper and magazine said it helps them to relax, gives more information than online, can be referred to anytime, good for the eyes and more comfortable. This makes the use of news and information easier for the readers. Also the use of advertisements is greater in case of online journalism compared to printed newspapers. This makes greater amounts of profit earning for the newspaper companies. This also helps the readers and audiences to gather greater amount of information regarding other products and services which are available in the market. Large number of people across the globe h as also argued that practices related to online journalism are helping business organisations in the business of news and journalism to spread higher amounts of news and information compared to the traditional sources of news and journalism business, such as print media. Large number of people have argued that the online journalism practices are sustainable in the future which has been possible because of the fact that the popularity of

Monday, November 18, 2019

David Cole Interviews Dr. Franciszek Piper Movie Review

David Cole Interviews Dr. Franciszek Piper - Movie Review Example The film is effective in showing the inconsistencies among Holocaust evidences. The presentation of the Soviet’s and Polish’s version of the Holocaust story is done in a logical manner. The new information David Cole gathers from the tour guide and Dr. Piper are, then, placed side by side with past evidences. As a viewer, it was easy for me to follow what David Cole is trying to tell without getting lost in the different sets of evidence presented. David Cole uses evidence from books and photographs that seem to contradict what Dr. Piper and the tour guide say about the camp. In addition, the film allows audiences to interpret the Holocaust story in their own. David Cole does not force the audience to believe in his theory, but he allows the evidence to speak for itself. He offers a new interpretation of Holocaust evidence and, thus, provides a new twist to the Holocaust story. After viewing the film, I realized that there is a lot more to investigate in the Holocaust story. It is important to get the facts straight since history itself is at

Friday, November 15, 2019

The effects of rape on victims

The effects of rape on victims Irina Anderson explores the current rape perception of both male and female rape and whether the respondents gender affects this perception in a journal article called What is a typical rape? Effects of victims and participants gender in female and male perception which was published in The British Journal of Social Psychology. This article also investigates the cultural lag theory of male rape. The findings in this study demonstrate that, contrary to predictions made at the start of the article, when asked to describe a typical rape, male and female, it was the stranger rape stereotype that was the prevailing way most used to describe this. It was also shown that instead of lagging behind female rape according to the stranger-acquaintance dimension, male rape was conceptualized in terms of other factor, for example sexual orientation, which were often deemed homophobic. I found this journal article interesting and accessible to read. After reading the hypothesis proposed at the begi nning of the article, I was intrigued to see that many of the predictions were in fact proved false at the end of the article, for example it was predicted that when asked to describe a typical rape participants would describe an acquaintance rape where as in previous years the stranger rape stereotype was the way most described a typical rape. However the results of this study show that in fact the stranger rape stereotype is still the predominant way people imagine a typical rape. This led me to question how much rape perception has actually changed in our society. I also found that both the aims and findings of the research were clear, accurate and relevant; they were clearly laid out and overall I found the article effortless to read. In addition the acknowledgment of the limitation to the research enhanced the article. The article begins by giving a brief summary of previous studies and research which has been carried out to investigate the same research topic. The ideas of acquaintance rape, where the victim is raped by someone known to them e.g. boyfriend, date, relative, friend, and stranger rape stereotype, where the victim is raped by someone unknown to them, are introduced and the ideas surrounding them are discussed. For example acquaintance rape is usually expected to happen indoors and the victim having spent time with the perpetrator prior to the rape. In contrast stranger rape is expected to happen outdoors, usually at night where the victim is grabbed, overpowered and raped. Date rape s also briefly discussed and used to support predictions that rape perceptions has changed considerably in the last few years due to increased media coverage of the topic. The issue of male rape is then raised and questions are raised such as are men raped in the same circumstances as women? It is describe d as more frequent phenomenon than previously believed. The ignorance and disbelief surrounding male rape creates myths and misconceptions in society for example Most men who are raped are homosexuals. This makes some researchers believe that male rape perception is lagging behind that of female rape, that is current male rape perception is at the stage female rape perception was at years ago in terms of the knowledge people have of it. I believe the author has succeeded in successfully introducing the research topic and conveying the main aims of the research. The one possible fault I have for the introduction is that the author does not discuss why she feels the topic of research is important and why she decided to carry out the study. I believe this would enhance the article even more for the reader. In the method section of this article Anderson explains in detail how the study was carried out. She describes how one hundred and nineteen undergraduate students were asked to take part; she also lists their gender and ethnicity. The participants were asked to describe what they believe to be a typical rape. Both male and female were included. The gender of the participant and the gender of the victim were the independent variables. Participants were assigned randomly so that women could be assigned to either a female rape or a male rape. Similarly men could be assigned to either female rape or male rape. They were asked to include details that led to the incident, details of the incident itself and details following the rape. Characteristics of the victims and the perpetrator including feelings and thoughts were also asked for. Anderson then moves on to describe how these accounts of typical rapes given by participants were analyzed. She describes the coding manuals given to coders who must sort the participants text into text which adhere to characteristics of the stranger rape stereotype and those which describe an acquaintance rape. This is the most important section of the article; any deficiencies would undermine the validity of the results. The only deficiency I could locate in this section was the fact that all the participants were university students; however the author recognizes this as a limitation at the conclusion of the article. Overall I found this section of the article to give a very comprehensive account of how the study was carried out. It covers all aspects that are important to the aims of the article. In my opinion the results section of this article is excellent. The findings are clearly laid out for the reader. Headings help divide the finding into different sections for example testing hypothesis 1 and frequency of category use in female rape. These headings also help list the results in terms of the original research question and predictions given at the beginning of the article. Tables are also used which illustrate different types of categories of description used by participants and the number of female and male who used these categories. Direct quotations are also inserted to give the reader insight into the types of descriptions participants gave which I found very interesting e.g.: due to the physical difficulty of male rape the perpetrator would typically be larger and stronger than the victim. The author acknowledges the results do not match the predictions made at the beginning and explains the possible reasons for this by stating perhaps researchers presumption that societies rape perception has evolved is in fact false and perhaps our perceptions have not progressed as much as it was thought. The cultural lag theory of male rape was only partly supported by the findings. Although female rape was described more in terms of acquaintance rape than male rape, the other aspect of the theory, that male rape would be described in terms of stranger rape stereotype more than female rape, was not supported. In fact many other factors played a part in the description of male rape such as penetration, the rapists strength and power over the victim and the victims shame and humiliation. Thus proving that female and male rapes are conceptualized along different continuums. The results overall highlight the importance of periodically examining rape perception and the effects of gender. The discussion section addresses the main findings of the article and any new information gained which can be added onto previous information discovered in previous research. Anderson discusses the reasons behind the participants which described a typical rape in terms of the stranger rape stereotype. It is here blame attributions are discussed. Anderson notes it is a possibility that participant didnt write more about acquaintance rape as they assumed the victim would therefore be more blameworthy. This is strengthened by the fact that women, when describing a female rape, used the stranger rape theory more than men and similarly men, when describing a male rape, used the stranger rape stereotype more than women. This perhaps proves that when writing about a victim of their own gender they preferred the stranger rape stereotype as they believed it would steer the blame away from the victim. In my opinion this article contains all the key elements of a good journal article. From the beginning the author explains clearly the key arguments and main points of the text. She also includes relevant background information and makes concrete predictions. The method and results of the study are clearly laid out and are easy to follow. Another aspect covered in the text is the acknowledgment of its limitations. Any good journal article is aware of the limitations of the findings and in this article they are clear. The way in which male rape is discussed is quite interesting as it not a subject many articles discuss. The idea of the lag theory was also remarkable, that the situation of male rape perception in society today was that of female rape years ago. Also the fact that males themselves described male rape in a homophobic and mocking tone intrigued me. For example, one of the two bufties edge towards the lone man. One of the very few limitations in this text is that all the p articipants were students from one university, a population which may be more aware of rape than the general population. It is noted that a study of the perceptions of rape held by police, medical personnel and juries may enhance findings in the future. Another fault I have with this article is that I believe the author should go into more detail on why she thinks this research is important and why she decided to conduct this study. In addition, while reading the findings of this research it struck me that another reason the majority of participants chose a scenario which adheres to the stranger rape stereotype is they may feel under stress to give certain answer or they may try to please the researchers by giving the answer they believe the researchers desire. In conclusion, I found this article to be comprehensive, relevant and interesting. All main ideas are clearly stated and concrete predictions are made from the start. The results examine the effects of gender in rape conceptualization and the importance of examining male rape alongside female rape to gain further insight into the differences in gender perception. A broader source of participants is acknowledged as a future improvement that could be made to studies such as these. The results section of the paper is, to me, the most impressive section. The findings are examined in a concise manner, taking particular notice of the reasons the results contradict the predictions made at the start. Overall I think this is an excellent example of a psychological journal article, it adheres to all the guidelines which helps make a journal article impressive and overall I found it hard to fault

Wednesday, November 13, 2019

The British Music Invasion: The Effects on Society and Culture Essay

  Ã‚  Ã‚  Ã‚  Ã‚  Ã¢â‚¬Å"So the British invasion was more important as an event, as a mood: than as music† (Bangs, 171). This was the British invasion. I wasn’t just about the music, it was more then that; this is what makes it so unique. It didn’t just happen to effect America by chance, it lifted the spirits and moods of its youth. It isn’t just coincidence that Kennedy was assassinated right before the Beatles famous Ed Sullivan Show performance. The whole country was in a deep depressive doldrum after the assassination, and for good reason. The British invasion was needed by Americans to snap out of this funk, and this was just the thing to do it. (One thing that Americans used to avoid the depressing times was to use illegal drugs, but that will be elaborated on later.) This is what it was all about; sure it was about the music, but it brought more, it brought a way of life across the ocean.   Ã‚  Ã‚  Ã‚  Ã‚  A lot of the invasion stayed in that generation, many bands and songs that were big then are all but totally forgotten about now. Bands such as the Searchers, the Swinging Blue Jeans, and Gerry and the Pacemakers all had one or two great hits which stayed in that time. This however, was part of the beauty of it all. Some of the music stayed with us thirty years later, and that’s great, it gives us a good sampling of the time. On the other hand, you have the music that was meant for the era, and not for future generations. That is part of the uniqueness of it all, and Lester Bangs says it best when he tells how it doesn’t matter that the music isn’t listened to anymore, that’s not what it was for. It was for the time, it was a â€Å"timepiece†.   Ã‚  Ã‚  Ã‚  Ã‚  On the other hand, we have the bands that were not simply â€Å"timepieces† and were able to stick around three decades later. These bands are the Who, the Kinks, the Rolling Stones and the Beatles. This is another aspect of why the invasion was so influential. Where would we be in rock and roll with out the Beatles, and on a slightly lesser extent the Stones. These bands transformed rock into what we know it today. Without them, the way might not have been paved for Pink Floyd, Led Zeppelin and countless others. Both sides of the spectrum were extremely important for the invasion to have the long lasting effects it continues to have.   Ã‚  Ã‚  Ã‚  Ã‚  Cu... ...s, it was a time of great turbulence from start to finish. Protests, assassinations, war, pacifists; they all played a major role in the United States during this time. Something substantial had to happen to help relieve some of the on going woes. It was the British music. Not once, but twice, within a span of ten years were the British the influence that helped get us over those times. It may have been in a more positive way in the first wave, and maybe in a more negative way in the second, introducing an entire drug culture, but either way it made an impact. I have always viewed the 60’s as one of the most intriguing decades to live in, because of its culture shock that occurred during this time. It was the decade of peace, love and drugs; it would have been great to be there to experience these things. Nevertheless, in the research I have done, I have realized the importance of not only the British music on this decade, but all of the feelings behind the music, all of t he meanings and emotions and social change which it encouraged. It was the decade with the highest highs and the lowest lows in the last half-century. It was the time when British music saved America from itself.