Wednesday, July 31, 2019

Messages

Messages are all around us, and they are able to change how successful we are in life. The messages you receive from your environment dicta the way you act. For example, a study using children and dolls show that messages are conveyed even in the early years of life. A different study showing how our appearance can have an affect on people. In the realistic fiction by Sherman Alexei, â€Å"The Absolutely True Dally of Part-Time Indian,† demonstrates how messages can affect us.The mall character,Junior, has always lived by the preconceived Idea that he was supposed to conform Like everyone else unfortunately, that message was always pushed onto him; and It affected the way he thought. If continued, his quality of life. He was always told that white people were above him. This affected how he saw them, he put them on a pedestal. This book shows that people are affected by their environment. The experiment conducted by CNN, The Doll Test, showed that messages even affect the youn g. It opens our eyes to how well messages invader brains.They presumed thing about the dolls just based on looks and no other evidence. White children have n overwhelming bias toward white, and that black children also have a bias toward white but not nearly as strong as the bias shown by the white children. These messages will eventually grow and affect how they Judge others. A study by freakishness discussed the question, â€Å"can you put a price on looks? † It shows how subconscious feminism/female entitlement is in our culture. Beautiful women have the most power with their looks.Also, the data in the study referred to how much extra income a male of a different skin color would need to make to be as appealing. There hidden messages in the subconscious of all our minds telling swath we want and don't want. This proves that messages are likely to change how successful we are in life. Messages are all around us, and they are able to change how successful we are In life. Ul timately, messages can effect our future success. Based on the assumptions of others we have different chances of success. Our environment, our development, and our phallic characteristics will effect how successful we are In life.Messages By dazed In the realistic fiction by Sherman Alexei, â€Å"The Absolutely True Dairy of Part-Time Indian,† demonstrates how messages can affect us. The main character, Junior, has always lived by the preconceived idea that he was supposed to conform like everyone else. Unfortunately, that message was always pushed onto him; and it affected the thing about the dolls Just based on looks and no other evidence. White children have we want and don't want. This proves that messages are likely to change how our physical characteristics will effect how successful we are in life.

Tuesday, July 30, 2019

Connections Les Murray Essay

A connection is an avenue of interaction that establishes and develops a relationship between people, places, and culture. Connections as social constructs may be positive or negative, impacted by internal beliefs, values and ideas that underlie the external determinants of environment, attitudes and culture within society. Poet Les Murray and educator Jane Elliott critically explore in their texts the cultural disconnection in the Australian and Canadian communities in response to the interaction of these factors and their effect on the avenues of interaction between people. Les Murray’s Sydney and the Bush embodies the poet’s personal connection and attachment to the ‘farmer lifestyle’ as he blames the disconnection of urban and rural Australia entirely on the city’s infatuation with materialistic pleasure. This consequently emphasises his value of the nature of rural society. Murray perceives the infatuation as an external attitude of the modernised and corrupted urban society, factored by the city individual’s internal values of luxury, wealth and power being the unmistakable cause of the cultural divide. He reinforces this notion through the technique of repetition, using the phrase ‘When Sydney’ in order to periodically mark the progression of cultural disconnection and accentuate the attributing internal and external factors. â€Å"When Sydney ordered lavish books, and warmed her feet with coal† reiterates the internal necessity for comfort and sophistication as few of limited sources of satisfaction. Les Murray further develops the concept of disconnection in the poem when â€Å"then bushman sank and factories rose, and warders set the tone†, contextualising this to reveal a loss of cultural identity for the rural community through industrialisation. â€Å"Then convicts bled and warders bred, the bush went back and back† whereby the poet suggests that nature is the central value of the farmer lifestyle, governing the internal and external factors of their connections, which in this poem is a disconnection to the urban society. Thus, Murray demonstrates that our connections are negatively impacted by internal and external factors, expressing a critical perspective that reflects his own value of and connection to nature and its simplicity as a source of contentment. creates another social critique of the urban social hierarchy contrast he begins the poem with â€Å"When Sydney and the Bush first met, there was no open ground† and ends with a juxtaposing â€Å"When Sydney and the Bush meet now, There is no common ground† enabling readers to identify the divided Australia in its urban and rural communities.

Monday, July 29, 2019

Tour Report at a nearby airport firefighting facility Essay

Tour Report at a nearby airport firefighting facility - Essay Example The facility was built and got commissioned in July, 2009. The facility has ten modern fire fighting vehicles that have a location on a drive through design. The purpose of the vehicles being placed in the drive through position is to be able to move as fast as possible in case of a fire emergency. The drive through design has direct access to the Hartsfield – Jackson Atlanta International Airport aircrafts apron system. Airport apron is the area in the airport where the planes are parked before departure or during maintenance. The new building where ARFF is at accommodates approximately fifteen firefighters (Snedeker, 2009). The building has training facilities, offices and conference rooms where several meetings happen. There are individual sleeping rooms for the firefighters who are on shift and locker rooms enough to accommodate the firefighters. There is a long sloping roof form that has a direct relation to the line-of-sight that is necessary between the control towers f or the taxiway. The airport has a Fire Training Research Centre (FTRC) that is used to train the staff and the firefighters. The staff acquire the much-needed technique to be able to deal with fire. The Hartsfield – Jackson Atlanta International Airport firefighters are trained because they must always be ready for blistering heat, blinding smoke, and blazing fires whenever they have to be on duty (FAA, 2015). Duty calls at any time, whether it is at night or during the day. There are challenges that the firefighters go through in their line of work. One of the challenges involves going through the fire and smoke to help people who are trapped. There are protective gears the staff members get to help protect against the fire flames and smoke. The firefighters have to go to the location in case one of the planes catches fire. The response time should be minimal to be able to save as much life as possible. The ARFF facility’s

Sunday, July 28, 2019

Final project Essay Example | Topics and Well Written Essays - 1250 words - 5

Final project - Essay Example Aggregated demand curve represents the overall quantity of goods that are demanded at different price level. Second model that has been employed is IS-LM Model, and the third model is Keynesian model The concept of aggregate demand is that increase in total demand of products cause to increase the output that lead to the increased demand of labor. If the aggregate demand is lower it will cause to decrease the output and lead to decreased demand of labor (Anderton, 590). As in the case of United Kingdom economy is facing decrease in aggregate demand due to the financial crisis because this crisis made a significant impact over the purchasing power of people. People who have money are saving rather spending their money. This decrease in demand is leading country towards decrease output, therefore, towards unemployment; because firms working in the economy do not require workers to produce output. It has been observed that uncertainty shocks cause to slow down the demands. Therefore, economies have to face higher inflation rates. Such as in United Kingdom, the financial crisis showed huge uncertainty in the financial market that slow down the demand of goods market and result occur red in lower economic growth and increased unemployment rate. For example, the 2008 financial shock reduced the purchasing power of households. By using the right of postponing the purchases, households forced the firms to reduce the manufacturing and in result made delays in new hiring and increased firings of employees that contributed in high unemployment rate. The uncertainty increased the unemployment from the year of 2009 to 2013 in United Kingdom and now the effects are slowing down (Leduc & Liu, 1-30). Increase in the lowering demand of labor is high this time as compared to prior shocks of 1981. This is because this time â€Å" the zero lower bound† restrained the monetary policy on the nominal interest rate. As it has been observed that uncertainty shocks reduced the

Saturday, July 27, 2019

Supply Chain Assignment Essay Example | Topics and Well Written Essays - 5000 words

Supply Chain Assignment - Essay Example These include a lean supply chain, an agile supply chain and lastly a hybrid supply chain. This study will seek to discuss the growing supply chain relationship in today’s supply chain management while analysing the various established relationship management models and exploring both the strategic and operational considerations that are extremely essential for enabling a relationship posture that is appropriate within the supplier (Christopher 2004). Additionally, the study explores the various emerging concepts of lean supply management while discussing the importance of both the efficiency and effectiveness brought about by a lean approach and consequently proposing a general approach an organization can initiate, develop and sustain. The growing importance of the supply chain relationship in today’s supply chain management Numerous studies have observed a highly interesting trend amongst the leading companies in the world. The companies are discovering a somehow ver y powerful new source of competitive advantage in the market (Christopher 2004). This is what is increasingly gaining popularity as the supply-chain management. Supply chain comprises of all the integrated activities responsible and that can be traced to the final product in the market and which determines customer satisfaction. Supply chain management by the nature of its existence heavily depends on relationships and connections. In the context of supply chain management, the term relationship implies a lot. This may include strategic relationship, internal relationship, and transactional relationship amongst many more others. What has made supply chain necessary is the benefit that is derived from supplier relationships, most notably the increasing value and supply chain cost minimization. Additionally, the need by most companies to gain competitive advantage has made maintaining supply chain relationship very serious (Robert, Ernest 2002). The programs related to supply chain ma nagement integrates topics from all the departments of the organization which include the manufacturing operations of the company, purchasing of the company’s products, and transportation of the sales, in addition to, physical distribution into a unified program (Robert, Ernest 1989). For supply chain management to be considered successful, it must coordinate and ensure there is integration of all the above stated activities into a process that is seamless (Robert, Ernest 2002). The supply management team should further, in addition to, embracing link all the partners in the chain. Consequently, in addition to, the various departments within the organization, the other partners include vendors, carriers, information system providers and third party companies. The most fundamental objective of the supply chain management has always been to add value. Supply Chain Management has been transformed into a tool that is essential for accomplishing corporate strategic objectives (Fin ancial Executive 2002). Amongst these would include reducing working capital, accelerating cash-cash cycles, taking assets off the balance sheet and increasing inventory turns amongst and most importantly monitoring average annual sales (Carlisle & Parker 1989). Supply chain management has in the recent past become top managements new main focus area. In light

Probation and Parole vs. Incarceration - Cost Comparison Essay

Probation and Parole vs. Incarceration - Cost Comparison - Essay Example This may be due to some reasons which, for instance, may include some probationers may have committed a minimal offense which is not severe (Bureau of Justice Statistics, 2015). Parole on the other hand, refers to law offenders who are conditionally released from prison to serve the remaining term of their sentence in the community. The offenders may be released by a parole board decision (Bureau of Justice Statistics, 2015). According to the research done in 2008, the mean cost of incarceration was over $23,000 per inmate in the United States. The correctional spending by local and state governments was approximated to have been 52 billion dollars. These costs arose upon conviction and subsequent imprisonment for parole prisoners. 35 percent of the 1.4 million convicts imprisoned in the jails and state prisons are imprisoned for parole violations. This was according to the department of justice in the United States (Criminal Justice Section, 2012). Increase in prison population has grown enormously leading to sanction of state budgets. Therefore the state needs more effective correction policies. For instance, individuals who pose the greatest threat to the community should be sentenced to imprisonment but alternatives such as early freedom should be given to the individuals who pose minimal risks. They can greatly benefit from outside rehabilitation efforts posted in correctional institution. Individuals who post low-risks to the community should not be put in incarceration. When this is done, the individual is separated from family life; work and offenly fail to address the issues that caused initial violations (Criminal Justice Section, 2012). So, the individuals who face parole and probation benefit from transitional sanction such as fines, home detention, and community service or increased reporting. The state of Maryland, for instance, had to deal with considerable budget

Friday, July 26, 2019

Media planning Case Study Example | Topics and Well Written Essays - 250 words

Media planning - Case Study Example It will target the individuals that will participate in running or racing, it will target the sponsors and clients that need the checkups for the cervical cancers. McDougal (2015), coming with media of choice to reach such a diversified audience becomes supreme. It will need to use multiple media or one that is most used. For the major sponsors of the event, a direct and focused media such email can be used because they are helping by directly being involved in the event. For the participants that will be on the race, social media such as Facebook, website of the hospital or twitter can be used since most of the people are young and they embrace them. Foster (2012), by doing combined media approach, it become tranquil in reaching many and relevant audience making it a success. Television can also be used, though at prime time such as most watched programs and news to have the opportunity of having many who viewed

Thursday, July 25, 2019

Principles of Microeconomics Essay Example | Topics and Well Written Essays - 750 words

Principles of Microeconomics - Essay Example However, it is observed that the marginal utility tends to diminish as you consume more of the goods (Investopedia ULC). There are two limits observed in the determination of utility; the limit beyond which the marginal utility begins to decline and the other limit shows that beyond which the utility becomes negative. The second limit works like a satiation point for the consumer so that an additional consumption of the product will bring displeasure instead. Generally, this decline in utility is called the "diminishing marginal utility". It is through this law of diminishing marginal utility that the economists were able to understand the law of demand and the negatively sloping demand curve (Investopedia ULC). It basically equates to the understanding that the less you have of a product the higher is your marginal utility that's why the willingness to pay (the price) is also high. On the other end, as the product increases the marginal utility declines, therefore the willingness to pay also diminishes. Answer to #3. Income is generally accepted as a determinant of demand which moves on the same direction. However, there are products which show the opposite response. We call them the inferior good, as opposed to the normal good. The demand for "normal good" increases as income increases, such as clothing and food. On the other hand, we have products in which the demand for such declines as income increases. A classic example of this is a bus ride. This is so because when people get more income, they may opt to buy their own cars. There is also what we call "related goods". Related goods can be "substitutes" or "complements". "Substitutes" are products in which the demand for one increases as the price of the other increases. This is because consumers will shift from the product whose price increases to the product whose price remained. On the other hand, complements are those whose demand for one product decreases as the price of the other increases. This is because as complements they are consumed together. Lastly, "giffen good" is one which people consume more of as price rises, which apparently violates the law of demand (Wikimedia Foundation, Inc., 2009). This happens due to the absence of substitute, giving way to the dominance of the income effect leading more people to buy more goods even as its price arise (Wikimedia Foundation, Inc., 2009). Answer to #4. Generally, the supply curve is observed to be upward sloping, adhering to the law of supply stating that as the price of the goods increases, more will be supplied of it. However, in some cases, we see the supply curve come to a point of downward slope rather than continuously sloping upward. There are two cases mentioned when this thing happen. First is the supply of labor with respect to the (real) wage rate. The real wage serves as a price to labor and a cost to leisure. Therefore as the law of supply suggests, an increase in the price of labor should be followed by a greater quantity supplied. This is also supported by the logic that given that the cost of leisure is now higher, the substitution effec

Wednesday, July 24, 2019

Maintenance Awareness in Design Essay Example | Topics and Well Written Essays - 2500 words

Maintenance Awareness in Design - Essay Example Findings: The findings of this paper indicates that systems always fail due to miss management and poor planning on the part of managers, companies and all individuals involved in any specific project. Moreover, it further indicates that designers can learn from various failures and they can minimize the risk factors by taking several measures. System failure, basically, stands for any situation when a system stops working and fails to achieve desired objectives. It further lacks in smooth functioning of an overall system which is very much required for any successful design and project. Nowadays, it is common trend that people prefer to use new systems and advanced technology rather than old ones. They feel themselves more compatible with latest technology just because of demand and trend. Projects are usually driven just to replace the old trends and architecture. Old systems are extensively replaced with new ones having new technology. However, it is very essential to understand that there are several important aspects and stages involved in any good design. All of these stages should be accessed if you want a successful design. It is not wise option to go just for modern and trendy designs. Essential stages should be kept in mind. These generally include, If we look at technical side of the modern projects, we will observe that nowadays projects are built with a goal of offering multiple functions that was not possible in recent past. Currently, systems become the integration of various sub systems. Some additional constraints are also getting involved day by day with changing needs and demands of various people. Now people are more concerned about reliability and security systems offer within a design. Nowadays, we can also observe that the success rate is continuously decreasing and most of the large projects of engineering are less satisfactory. Many of the projects are getting failed and end up in failures and great risks. However, it is also a

Tuesday, July 23, 2019

Military Industrial Complex Essay Example | Topics and Well Written Essays - 1250 words

Military Industrial Complex - Essay Example Eisenhower was worried about the costs of an arms race that was taking shape between the United States and Soviet Union (Pavelec 95). He wanted to caution the American citizens and the incoming administration about concentrating militarization of the country, which he claimed, would deny other areas of the economy the necessary resources. According to Eisenhower, overspending in the military sectors will divert finances aimed for sectors like building of hospitals and schools. Further, increase in military spending resulted in large budgets that were not sustainable by the country; therefore, Eisenhower wanted the country to budget for what it can afford (Pavelec 95). Eisenhower was also worried the union between defense contractors, and the armed forces would change the way the country handles international relations and disputes. This union, Eisenhower thought would increase the chances of war as a means of solving conflicts instead of depending on peaceful negotiations. As a milit ary veteran, Eisenhower had seen the horror and lingering sadness that result from war. According to Eisenhower, his successors should balance between a strong national defense and diplomacy when dealing with the Soviet Union threat during the cold war. Therefore, he encourages those that were coming after him to settle differences with other countries not with arms, but with intellect and decent purpose (Pavelec 96). Another concern that stimulated the warning was that as the military and the arms industry accumulated power; they posed a threat to the country’s democracy. Eisenhower thought that the massive power of the military and the arms industry and resultant lose democracy would lead to the loss of citizen control over the military-industrial complex (Pavelec 96). The threat posed by military-industrial complex as envisioned by Eisenhower has become true the years following his speech. Concerning endless conflict with hostile ideology, the former president was right gi ven that the United States has continued to engage in never ending wars with different groups or countries. After the end of Eisenhower’s presidency, the country went on to fight in Vietnam, Afghanistan, and Iraq. War has become a permanent engagement given the recent declaration by the United States’ political leadership that there is no foreseeable end to the war against terror. Even after the killing of the Al-Qaeda leader, the country still faces a threat from the terrorist group, which implies its ability to survive the death of its targeted leadership (Eisenhower 7). The United States has become a country of unending war where the end of one signals the chance for the military-industrial complex to find a new enemy that must be neutralized therefore perpetuating the complex’s appetite for war (Eisenhower 8). The Military-Industrial Complex now dictates a large part of the United States foreign policy. The sale of military equipment to foreign governments h as now become a source of major revenue for American arms industry (Pavelec 96). On the permanent military industry, the former president’s warning has come true. Since the end of nineteenth century, the United States military has grown to become a major industry in the country’s defense system. As with any other industry, the arms industry has an ambition to grow, which means

Monday, July 22, 2019

Aplastic Anemia Essay Example for Free

Aplastic Anemia Essay Aplasitc anemia is a very rare blood disorder. Sometimes, it is connected with leukemia; it could be a result from chemotherapy given to leukemia patients. In aplastic anemia, the bone marrow does not make the necessary blood cells needed in the blood; however, leukemia is when the blood cells are deformed and not working properly. Leukemia is a cancer where as aplastic anemia is not. Chemotherapy treatment for cancer can lead to the secondary condition of aplastic anemia that may cause slowing down of producing blood cells. What are the anatomical and physiological symptoms and causes for aplastic anemia? What is the diagnosis and what treatments are available for aplastic anemia? One symptom is fatigue from being anemic. Anemia is when the red blood cells are low in the blood. The red blood cells carry the oxygen from your lungs to all parts of the body (Aplastic Anemia and MDS International Foundation, Inc. ). This will cause fatigue when the body does not get enough oxygen. There is a little more than just low red blood count in cells in aplastic anemia. It is when the body doesn’t produce all three different blood cells that the body has: white blood cells, red blood cells, and the platelets termed pancytopenia (Wikipedia). In aplastic anemia, it is when the bone marrow stops producing or slows down in producing these new blood cells. The white ones or leukocytes are to fight infections in the body by attacking and killing bacteria and viruses (Aplastic Anemia and MDS International Foundation, Inc. ), so with out them patients easily catch viruses. A low white blood cell count is called neutropenia (Aplastic Anemia and MDS International Foundation, Inc. . The other is the platelets; they are for blood clots. A low platelet count is called thrombocytopenia (Aplastic Anemia and MDS International Foundation, Inc. ). A low platelet count leads to another symptom that would be uncontrolled bleeding because the body does not have the platelets to stop the bleeding. You can also causes bruising and petechiae (Wikipedia). Some of the other symptoms include shortness of breath, headache, pallor and, ultimately tachycardia and heart failure (Lippincott 508). Bone tenderness should not be present (Mc Phee 454). The cause for aplastic anemia develops when the bone marrow is damaged or in some cases is unknown. About 75 out of 100 cases of acquired aplastic anemia are idiopathic (Aplastic Anemia MDS International Foundation, Inc. ). This means they have no known cause. Sometimes, the case can be from radiation and chemotherapy treatment used for cancer. This can destroy the healthy cells in the bone marrow leading to the secondary condition. Some other causes for secondary condition of aplastic anemia are toxic chemicals and certain drugs, such as the chemical benzene that is found in gasoline, or with the use of certain drugs, including chloramphenicol[-0], carbamazepine[-1], felbamate[-2], phenytoin[-3], quinine[-4], and phenylbutazone[-5] (Wikipedia). Chloramphenicol treatment is followed by aplasia in less than 1 in 40,000 treatment courses, and carbamazepine aplasia is even more rare (Wikipedia). The medication for rheumatoid arthritis is connected to ones getting aplastic anemia; this would be called also a secondary condition when aplastic anemia appears. Likewise Lupus, an autoimmune disorder, can attack the healthy stem cells. This would cause the slowing down or stopping of making the blood cells the body needs. The rest may result from immunologic factors (unconfirmed), severe disease (especially hepatitis), viral infection (especially children), or preleukemic and neoplastic infiltration of bone marrow (Lippincott 397). Therefore, to confirm a diagnosis for aplastic anemia they first take a blood sample to see if the blood count is low. If that shows up low in all the blood cells, the next step is to take a bone marrow sample or biopsy. The bone marrow is usually taken from the large hip bone by a needle. The sample is looked at in a microscope to rule out leukemia, which the blood cells would look abnormal and would be the reason the blood cells are not working properly. However, aplastic anemia would show very little red and white blood cells in the blood stream. Some options of treatment given to patients are medications, bone marrow transplant, and blood transfusion (MayoClinic). Just recently, they have stem cell transplants. The medications are immunosuppressive combine with cyclosporine. Maybe one of the causes is the immune system is attacking its own good blood cells, and these drugs will slow down the process. This medication treatment is usually given until the patient can get a stem cell transplant. The other medication can be used with the immunosuppressive is the growth factor. The new genetically engineered growth factor drugs help with making new white blood cells. That is really important, since the body makes a blood cell that only last for awhile, so the body is always generating new blood cells. However, aplastic anemia patients body for some reason stops this process. The other medicines used are antibiotics either to help prevent infections or already established infection, since the immune system is weak and would not be unable to fight of a common cold. Most likely the doctor will administer them before an infection appears, so that the patient will not get an infection. Those are the medications used and if the condition doesn’t improve, the patient would await for a bone marrow transplant. The bone marrow transplant might have been the first choice, which the medication is administered until the patient can find a match donor. The bone marrow transplant is usually a successful treatment to cure aplastic anemia in people under 55 years old (Aplastic Anemia and MDS International Foundation, Inc. ). Bone marrow transplantation from a related, matched donor can treat aplastic anemia – without recurrence- in about four out of five cases (MayoClinic). Up to half the people with matched, but unrelated, donors can expect to have successful bone marrow transplants (MayoClinic). There’s a chance that your body may reject the transplant, leading to life-threatening complications (MayoClinic). The bone marrow transplant uses a matched blood type. When found, the donor will have surgically removed some of his or her healthy bone marrow. It is then injected intravenously in the blood to the patient. The donated bone marrow will collect to the patient’s bone marrow and help with making new blood cells; it may take two to four weeks to show the new blood cells are producing. Before they even give the aplastic patient the donated marrow, they give them chemo to get rid of the diseased marrow, and will also be administered drugs to help prevent rejection of the bone marrow. Another precaution a doctor may limit the number of blood transfusions before the operation to avoid complications. Technology is advancing that they can use stem cells now instead of bone marrow transplant. The new stem cell transplant is taken from the bone marrow, umbilical cord, or the blood stream of the donor. They just get the stem cell from either of those places, and again like the bone marrow transplant, place the stem cell into the blood stream of the patient. The patient will be given chemo before the procedure as in the bone marrow transplant. This time the complication of the new stem cells will create an immune system that attacks the body of the donor, instead of the body rejecting as in the bone marrow transplant. If this does occur, they also have drugs that will help combat this. The treatment of blood transfusion is not usually used because it is a treatment for fatigue. Fatigue is not a medical emergency. First, use rest to see if it alleviates the symptom. White blood cells only last a day because that is how long they last in the body. That is why the bone marrow is important in making the new cells the body needs. The other complication that blood transfusions may cause is hemorrhaging. For long term recovery, they usually need other treatment along with this procedure. Aplastic anemia is a very rare disease and affects very few people. It is not contagious. It is more commonly diagnosed in young adults and children. It can affect any age group anytime in life and the illness might be brief, also it can come on suddenly or slowly. The symptoms vary depending on the blood cells that they are low in. The patient could have a slight case that might just be observed or to a severe case that needs treatment. A doctor should be the one to make the diagnoses and treatments. Doctors estimate that there are about 900 new cases of aplastic anemia diagnosed in the United States each year (Aplastic Anemia MDS International Foundation, Inc. . Patients need to be extra careful not to get an infection because the body having low white blood cell count would have a hard time combating against viruses. Steps are also taken to prevent hemorrhage: avoiding parenteral injections, suggesting the use of an electric razor, humidifying oxygen to prevent dry mucous membranes, and promoting regular bowel movement (Venes 116). Mortality for aplastic anemias with severe pancytopenia is 80% to 90% (Lippincott 507). In advancing technology today, why not consider to be a bone marrow donor that could save lives of others.

The Main Purpose of Magnetic Separation Machine Essay Example for Free

The Main Purpose of Magnetic Separation Machine Essay The magnetic separator is one of commonly used preparation equipments in magnetic separation factory. It has dry and wet two types. According to types of magnets, it can be divided into permanent magnet type and electromagnet type. It is also can be divided into strong magnet type, middle magnet type and weak magnet type according to the magnetic field strength. Different magnetic separators have different characteristics and performance. The common things have magnetite iron ore (belong to strong magnetic minerals), hematite (belong to weak magnetic minerals), limonite, lens iron ore, siderite (they are weak magnetic minerals), etc. They are the raw materials of iron and steel industry, Chinas iron ore grade is low, most of the impurities high, so more than 80 percent of the need for magnetic separation. Manganese, such as hard manganese, pyrolusite, rhodochrosite are weakly magnetic, commonly used in magnetic separation recovery. Ilmenite, wolframite, monazite (phosphorus cerium lanthanum mine), niobium-tantalum minerals are weakly magnetic minerals. Also commonly used in the recovery of magnetic separation. If the above examples are magnetic minerals as a purpose of mineral recovery (the magnetic minerals as a concentrate) is regarded non-metallic mineral beneficiation of iron, titanium and other mineral impurities harmful ingredients, generally magnetic method removed. For example, the beneficiation of kaolin, kyanite, quartz, feldspar, tourmaline, etc. are generally used magnetic separation to remove iron, titanium minerals. Heavy media beneficiation ferrosilicon or magnetite to do to increase the quality, magnetic separation is a simple and effective method of recycling to increase the quality of this application, common in the coal preparation plant. The broken ore crushing crusher broken cavity into the Iron Crusher will be damaged, commonly used magnetic separation to remove the material in the iron. Comprehensive utilization of the useful ingredients in the processing of waste, wastewater, waste gas, such as three wastes to protect the environment, application of magnetic separation is also available. Example, recycling steel slag in steel mills, power plants deal with fly ash, steel mill wastewater treatment, there is the method of magnetic separation. The magnetic fluid separation method is a new magnetic separation process, the use of a magnetic liquid in a magnetic field may increase the role of objects immersed in the great magnetic force can separate objects of different density. The United States, Japan and other countries using magnetic fluid separation method to deal with auto junk, and our country are mainly used in the beneficiation of diamonds

Sunday, July 21, 2019

Digital Intellectual Property Law Essay: Big Data Patents

Digital Intellectual Property Law Essay: Big Data Patents By Sandro Sandri   1- BIG DATA Big data is a term for data sets that are so large or complex that traditional data  processing applications are inadequate to deal with them. Challenges include analysis, capture, data curation, search, sharing, storage, transfer, visualization, querying, updating  and information privacy. The term big data often refers simply to the use of predictive  analytics, user behaviour analytics, or certain other advanced data analytics methods that  extract value from data, and seldom to a particular size of data set.1 There is little doubt  that the quantities of data now available are indeed large, but thats not the most relevant  characteristic of this new data ecosystem. In another way Big Data is an evolving term that describes any voluminous amount  structured, semistructured and unstructured data that has the potential to be mined for  information. It is often characterized by 3Vs: the extreme Volume of data, the wide Variety  of data types and the Velocity at which the data must be processed. Although big data  doesnt equate to any specific volume of data, the term is often used to  describe terabytes, petabytes and even exabytes of data captured over time.  The need for big data velocity imposes unique demands on the underlying compute  infrastructure. The computing power required to quickly process huge volumes and  varieties of data can overwhelm a single server or server cluster. Organizations must apply  adequate compute power to big data tasks to achieve the desired velocity. This can  potentially demand hundreds or thousands of servers that can distribute the work and  operate collaboratively. Achieving such velocity in a cost-effective manner is also a  headache. Many enterprise leaders are reticent to invest in an extensive server and storage  infrastructure that might only be used occasionally to complete big data tasks. As a  result, public cloud computing has emerged as a primary vehicle for hosting big data  analytics projects. A public cloud provider can store petabytes of data and scale up  thousands of servers just long enough to accomplish the big data project. The business  only pays for the storage and compute time actually used, and the cloud instances can be  turned off until theyre needed again. To improve service levels even further, some public  cloud providers offer big data capabilities, such as highly distributed Hadoop compute  instances, data warehouses, databases and other related cloud services. Amazon Web  Services Elastic MapReduce is one example of big data services in a public cloud. Ultimately, the value and effectiveness of big data depends on the human operators  tasked with understanding the data and formulating the proper queries to direct big data  projects. Some big data tools meet specialized niches and allow less technical users to make  various predictions from everyday business data. Still, other tools are appearing, such as  Hadoop appliances, to help businesses implement a suitable compute infrastructure to  tackle big data projects, while minimizing the need for hardware and distributed compute  software know-how. a) BIG DATA AND THE GDPR The General Data Protection Regulation, which is due to come into force in May  2018, establishes a few areas that have been either drafted with a view to encompass Big  Data-related issues or carry additional weight in the context of Big Data, lets analyse just  two aspects. Data processing impact assessment According to the GDPR, where a type of processing in particular using new  technologies, and taking into account the nature, scope, context and purposes of the  processing, is likely to result in a high risk to the rights and freedoms of natural persons, the  controller shall, prior to the processing, carry out an assessment of the impact of the  envisaged processing operations on the protection of personal data. This criterion is most  likely going to be met in cases of Big Data analytics, IoT or Cloud operations, where the  processing carries high privacy risks due to the properties of either technology or datasets  employed. For example, linking geolocation data to the persons name, surname, photo and  transactions and making it available to an unspecified circle of data users can expose the  individual to a higher than usual personal safety risk. Involving data from connected IoT  home appliances or using a Cloud service to store and process such data is likel y to contribute  to this risk. Pseudonymisation According to the GDPR, pseudonymisation means the processing of personal data  in such a manner that the personal data can no longer be attributed to a specific data subject  without the use of additional information, provided that such additional information is kept  separately and is subject to technical and organisational measures to ensure that the personal  data are not attributed to an identified or identifiable natural person. At least two aspects link  pseudonymisation to Big Data. First, if implemented properly, it may be a way to avoid the  need to obtain individual consent for Big Data operations not foreseen at the time of data  collection. Second, paradoxically, Big Data operations combining potentially unlimited  number of datasets also makes pseudonymisation more difficult to be an effective tool to  safeguard privacy. b) BIG DATA APPLICATIONS Big data has increased the demand of information management specialists so much  so that Software AG, Oracle Corporation, IBM, Microsoft, SAP, EMC, HP and Dell have  spent more than $15 billion on software firms specializing in data management and  analytics. In 2010, this industry was worth more than $100 billion and was growing at  almost 10 percent a year: about twice as fast as the software business as a whole. Developed economies increasingly use data-intensive technologies. There are  4.6 billion mobile-phone subscriptions worldwide, and between 1 billion and 2 billion  people accessing the internet. Between 1990 and 2005, more than 1 billion people  worldwide entered the middle class, which means more people became more literate, which  in turn lead to information growth. The worlds effective capacity to exchange information  through telecommunication networks was 281 petabytes in 1986, 471 petabytes in 1993, 2.2  exabytes in 2000, 65 exabytes in 20073 and predictions put the amount of internet traffic at  667 exabytes annually by 2014. According to one estimate, one third of the globally stored  information is in the form of alphanumeric text and still image data, which is the format  most useful for most big data applications. This also shows the potential of yet unused data  (i.e. in the form of video and audio content). 2 Data, data everywhere. The Economist. 25 February 2010. Retrieved 9 December 2012.   3 Hilbert, Martin; Là ³pez, Priscila (2011). The Worlds Technological Capacity to Store, Communicate, and  Compute Information. Science. 332 (6025): 60-65. doi:10.1126/science.1200970. PMID 21310967.   While many vendors offer off-the-shelf solutions for big data, experts recommend  the development of in-house solutions custom-tailored to solve the companys problem at  hand if the company has sufficient technical capabilities. 2- PATENTS A patent is a set of exclusive rights granted by a sovereign state to an inventor or  assignee for a limited period of time in exchange for detailed public disclosure of  an invention. An invention is a solution to a specific technological problem and is a  product or a process. Being so, Patents are a form of intellectual property. A patent does not give a right to make or use or sell an invention.5 Rather, a patent  provides, from a legal standpoint, the right to exclude others from making, using, selling,  offering for sale, or importing the patented invention for the term of the patent, which is  usually 20 years from the filing date6 subject to the payment of maintenance fees. From an  economic and practical standpoint however, a patent is better and perhaps more precisely  regarded as conferring upon its proprietor a right to try to exclude by asserting the patent  in court, for many granted patents turn out to be invalid once their proprietors attempt to  assert them in court.7 A patent is a limited property right the government gives inventors in  exchange for their agreement to share details of their inventions with the public. Like any  other property right, it may be sold, licensed, mortgaged, assigned or transferred, given  away, or simply abandoned. The procedure for granting patents, requirements placed on the patentee, and the  extent of the exclusive rights vary widely between countries according to national laws and  international agreements. Typically, however, a granted patent application must include one  or more claims that define the invention. A patent may include many claims, each of which  defines a specific property right. 4 WIPO Intellectual Property Handbook: Policy, Law and Use. Chapter 2: Fields of Intellectual Property  Protection WIPO 2008 A patent is not the grant of a right to make or use or sell. It does not, directly or indirectly, imply any such  right. It grants only the right to exclude others. The supposition that a right to make is created by the patent  grant is obviously inconsistent with the established distinctions between generic and specific patents, and with  the well-known fact that a very considerable portion of the patents granted are in a field covered by a former  relatively generic or basic patent, are tributary to such earlier patent, and cannot be practiced unless by license   thereunder. Herman v. Youngstown Car Mfg. Co., 191 F. 579, 584-85, 112 CCA 185 (6th Cir. 1911)   6 Article 33 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS).   7 Lemley, Mark A.; Shapiro, Carl (2005). Probabilistic Patents. Journal of Economic Perspectives, Stanford Law and   Economics Olin Working Paper No. 288. 19: 75. relevant patentability requirements, such as novelty, usefulness, and non-obviousness. The  exclusive right granted to a patentee in most countries is the right to prevent others, or at  least to try to prevent others, from commercially making, using, selling, importing, or  distributing a patented invention without permission. Under the World Trade Organizations (WTO) Agreement on Trade-Related  Aspects of Intellectual Property Rights, patents should be available in WTO member states  for any invention, in all fields of technology,9 and the term of protection available should  be a minimum of twenty years.10 Nevertheless, there are variations on what is patentable  subject matter from country to country.   a) EUROPEAN PATENT LAW   European patent law covers a wide range of legislations including national patent  laws, the Strasbourg Convention of 1963, the European Patent Convention of 1973, and a  number of European Union directives and regulations in countries which are party to the  European Patent Convention. For certain states in Eastern Europe, the Eurasian Patent  Convention applies.   Patents having effect in most European states may be obtained either nationally, via  national patent offices, or via a centralised patent prosecution process at the European  Patent Office (EPO). The EPO is a public international organisation established by the  European Patent Convention. The EPO is not a European Union or a Council of  Europe institution.[1] A patent granted by the EPO does not lead to a single European  patent enforceable before one single court, but rather to a bundle of essentially  independent national European patents enforceable before national courts according to  different national legislations and procedures.[2] Similarly, Eurasian patents are granted by  the Eurasian Patent Office and become after grant independent national Eurasian patents  enforceable before national courts. 8 Lemley, Mark A.; Shapiro, Carl (2005). Probabilistic Patents. Journal of Economic Perspectives, Stanford Law and  Economics Olin Working Paper No. 288. 19: 75. doi:10.2139/ssrn.567883. 9 Article 27.1. of the TRIPs Agreement. 10 Article 33 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS). European patent law is also shaped by international agreements such as the World  Trade Organizations Agreement on Trade-Related Aspects of Intellectual Property  Rights (TRIPs Agreement), the Patent Law Treaty (PLT) and the London Agreement.   3- BIG DATA PATENTS 11 Patent Analytics Solutions That Help Inventors Invent, Outsell Inc, June 3 2016   Patent data is uniquely suited for big data tools and techniques, because of the high  volume, high variety (including related information) and high velocity of changes. In fact,  patents are leading the way with big data and analytics in many ways. The patent space  offers a fascinating insight into the potential of big data analytics, rich visualization tools,  predictive and prescriptive analytics, and artificial intelligence.11 Especially recently, big  data tools and technologies are being used in several ways in the patent world to transform  and improve patent analysis. Patents and Intellectual Property are gradually gaining significance around the  world. This is leading to a bottleneck-large databases and ever growing information. A new  way around the innovation problem is to acquire patents. With examples such as Nokia,  Motorola, Twitter, the patent purchases seem rather straightforward. Nokia sold a large  chunk of its company to Microsoft, but held on to the crucial patents by signing a licensing  deal. They can now earn a revenue using patents licensed to Microsoft. Google bought  Motorola and its patents and later sold the company to Lenovo while holding on to the  patents. There are ample such examples in the industry.   Transactions of Intellectual Property (IP) are rather complex. Per example, a basic  component to be verified before a patent is granted, is novelty. In other words, if a priorart  describing the invention is found, the application stands to be rejected. A prior-art  could be in the form of a publication, a blog post, a lecture, a video, or a book. With a  massive amount of information generated, that doubles every 18 months, it is extremely  difficult to found prior-art. One way, some organizations follow, is crowdsourcing the  prior art search. Details about the patent are published on a website asking IP professionals  from around the world to find a prior-art. The emergence of Big Data analytics, on the other hand, has provided a clear solution. In addition, the outcomes through this method  get better and precise with each operation. Since Big Data analytics is still not commonly used by most government authorities,  prior-art gets overlooked and many false patents are granted. This comes out when-in  litigation-the opposing parties put all their efforts in looking for a prior-art to invalidate  each others patents. More often than not, a prior-art is found or there is an out of court  settlement. Hence, a concept called patent wall has gained traction. It is very common for  companies to file as well as acquire a number of patents around the technology they are  working on. This serves as a defence against litigators and allows the companies to market  and sell their products/services without any fear of litigation. The core value of patents is that the invention must be publicly disclosed in  exchange for a time-limited monopoly on the invention. Patents are not only a legal asset  that can block competitors, they are potentially a business and financial asset. For market  participants, patents can provide direct insight into where competitors are headed  strategically. Big Data is the key to unlocking this inherent value. Patent information is  comprised of vast data sets of textual data structures involving terabytes of information.  When unlocked through Big Data techniques and analysis, the insights are compelling,  revealing the direction a technology is headed and even uncovering the roadmap for a  specific companys product plans. But, deriving these insights from the proliferation of  information requires truly sophisticated Big Data analysis.   While Big Data is quickly growing as a trend, whats delivering more value these  days are Big Data services that optimize specific data sets and create specialized analysis  tools for that data. Technology teams that are dedicated to certain data sets will curate and  improve the data, learn the specifics of that data and how best to analyze it, and create selfservice  tools that are far more useful than generic Big Data technologies.   A key part of the Big Data service is a specialized analysis engine tailored to  particular data. For example, a patent analysis engine must understand the dozens of  metadata items on each patent in order to group patents correctly and traverse the  references. To be most effective, Big Data services need to automatically keep up with the  data updates, as patents are living documents that change over time. Even after the patent  Big Data Patents  is finalized and issued, it can be reclassified, assigned to a new owner, reexamined and  updated, attached to a patent family or abandoned. Most importantly, Big Data services are only as good as the insights they deliver a  Big Data service should provide a specialized user interface that allows real-time, userdriven  analysis with search, correlations and groupings, visualizations, drill down and  zooms. The patent data analysis must be presented in a manner that is compelling and  consistent. There are more than 22,000 published patent applications between 2004 and 2013  relating to big data and efficient computing technologies, resulting in almost 10,000 patent  families. Patenting activity in this field has grown steadily over the last decade and has seen  its highest increases in annual patenting over the last two years (2011-2012 and 2012-2013)  of the present data set. The growth has continually been above the general worldwide  increase in patenting, showing a small increase of 0.4% over worldwide patenting for the  2005-2006 period and showing a maximum increase of 39% for 2012-13.~ Using a patent effectively means suing a competitor to have them blocked access  to market, or charge them a license for allowing them to sell. When a patent holder wishes  to enforce a patent, the defendant often can invoke that the patent should not have been  granted, because there was prior art at the time the patent was granted. And, while patent  offices do not seem to have a clear incentive to take into account actual reality, including  the exponentially available information created by Big Data, when reviewing the  application, the situation is very different for a defendant in a patent lawsuit. They will have  every incentive to establish that the patent should never have been granted, because there  was pre-existing prior art, and the information in the patent was not new at the time of  application. And one important consequence of Big Data will be that the information  available to defendants in this respect, will also grow exponentially. This means t hat, the  probability of being able to defend against a patent claim on the basis of prior art, will grow  significantly. Because of the lag of time between patent applications and their use in court,  the effect of the recent explosion of information as a result of Big Data is not very visible  in the patent courts yet. A patent is, of itself, an algorithm. It describes the process of a technical invention   how it works (at least, thats what a patent is theoretically supposed to be doing). It is  therefore quite possible that a lot of algorithms around analysis of Big Data will become  patented themselves. It could be argued that this will act as a counterweight against the  declining value and potential of patents. Many of these algorithms are, in fact, not technical inventions. They are theoretical  structures or methods, and could therefore easily fall into the area of non-patentable  matter. Algorithmic patents are particularly vulnerable to the ability by others to innovate  around them. It is quite unlikely that a data analysis algorithm would be unique, or even  necessary from a technical point of view. Most data analysis algorithms are a particular way  of doing similar things, such as search, clever search, and pattern recognition. There is, in actual fact, a commoditization process going on in respect of search and analytical  algorithms. Patents are frozen algorithms. The elements of the algorithm described in a  patent are fixed. In order to have a new version of the algorithm also protected, the patent  will either have to be written very vague (which seriously increases the risk of rejection or  invalidity) or will have to be followed up by a new patent, every tim e the algorithm is  adapted. And the key observation around Big Data algorithms is that, in order to have  continued business value, they must be adapted continuously. This is because the data,  their volume, sources and behaviour, change continuously. The consequence is that, even if a business manages to successfully patent Big Data  analytical algorithms, such patent will lose its value very quickly. The reason is simple: the  actual algorithms used in the product or service will quickly evolve away from the ones  described in the patent. Again, the only potential answer to this is writing very broad, vague  claims an approach that does not work very well at all.   80% of all big data and efficient computing patent families (inventions) are filed by  US and Chinese applicants, with UK applicants accounting for just 1.2% of the dataset and  filing slightly fewer big data and efficient computing patents than expected given the  overall level of patenting activity from UK applicants across all areas of technology.   Against this, however, it should be borne in mind that many of the potential improvements  in data processing, particularly with regard to pure business methods and computer  software routines, are not necessarily protectable by patents and therefore will not be  captured by this report. UK patenting activity in big data and efficient computing has, on the whole, increased over recent years and the year-on-year changes are comparable to the  growth seen in Germany, France and Japan.12 12 Intellectual Property Office, Eight Great Technologies Big Data A patent overview   BIBLIOGRAPHY à ¯Ã¢â‚¬Å¡Ã‚ · Herman v. Youngstown Car Mfg. Co., 191 F. 579, 112 CCA 185 (6th Cir. 1911) à ¯Ã¢â‚¬Å¡Ã‚ · Hilbert, Martin; Là ³pez, Priscila (2011). The Worlds Technological Capacity to Store, Communicate, and Compute Information. Science. (6025). à ¯Ã¢â‚¬Å¡Ã‚ · Lemley, Mark A.; Shapiro, Carl (2005). Probabilistic Patents. Journal of Economic Perspectives, Stanford Law and Economics Olin Working Paper No. 288. à ¯Ã¢â‚¬Å¡Ã‚ · Springer, New Horizons for a Data-Driven Economy à ¯Ã¢â‚¬Å¡Ã‚ · Data, data everywhere. The Economist. 25 February 2010. Retrieved 9 December 2012. à ¯Ã¢â‚¬Å¡Ã‚ · Eight Great Technologies Big Data A patent overview, Intellectual Property Office, à ¯Ã¢â‚¬Å¡Ã‚ · Patent Analytics Solutions That Help Inventors Invent, Outsell Inc, June 3 2016 à ¯Ã¢â‚¬Å¡Ã‚ · Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS). à ¯Ã¢â‚¬Å¡Ã‚ · Article 33 of the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS). à ¯Ã¢â‚¬Å¡Ã‚ · 75. doi:10.2139/ssrn.567883. à ¯Ã¢â‚¬Å¡Ã‚ · TRIPs Agreement. à ¯Ã¢â‚¬Å¡Ã‚ · WIPO Intellectual Property Handbook: Policy, Law and Use. Chapter 2: Fields of Intellectual Property Protection WIPO 2008 Google Chrome: A Freeware Web Browser Google Chrome: A Freeware Web Browser Google Chrome is a freeware web browser developed by Google that uses the WebKit layout engine. It was released as a beta version for Microsoft Windows on September 2, 2008, and as a stable public release on December 11, 2008. As of September 2012, according to StatCounter, Google Chrome had 34% worldwide usage share of web browsers making it the most widely used web browser. (wikipedia) An Internet browser developed by Google, that combines a minimal design with sophisticated technology to make the Web faster, safer and easier. The Google Chrome browser offers features including access to favourite pages instantly with thumbnails, desktop shortcuts to launch Web applications, and independently run tabs within the browser to prevent browser crashing. Chrome is known for is simplicity and speed, and people use it because it gets the job down, fast. But it doesnt end there, while being simple it is also very customizable allowing users to make it their own, some people get rather sceptical due to that, as they think, if its highly customizable, how can it be simple? Chromes UI is flawless; its simple yet effective that your mind just knows where to go without having to think. This is one of the main goals for any browser, to achieve this, the design and icons that the browser uses have to be recognisable straight away, for instance, the button to get back to chromes homepage is shaped as a house, this way our brain quickly realises it. Pros. 1. It wont crash. Perhaps Chromes largest feature is its multiprocess design, which helps the user a lot, protects you from having a bad Web page or application take your browser down. Every tab, window, and plug-in runs in its own environment, so one faulty/broken site wont affect anything else that you have opened. This approach also adds another layer of security by isolating each site and application within a limited environment. 2. Its really fast. Again because of the multiprocess design, one slow site wont drag down the rest of your browsing. Instead, you can effortlessly click to another tab or window. With plug-ins, the arrangement works similarly: If you open a site that has a slow-loading Java ad, for example, the Java itself will be isolated and the rest of the page wont be affected. The program itself opens within seconds of when you click the icon, tooa distinct advantage over some slower-loading alternatives. This gives users great control over their browsers and also developers of websites, as they can isolate problems quicker and easier. 3. You barely notice its there. Calling the design of Chromes interface efficient is an understatement. The program barely looks like a program, and the vast majority of your screen space is devoted to the site youre visitingwith no buttons or logos hogging space. Chromes designers say that they wanted people to forget they were even using a browser, and it comes pretty close to achieving that goal. 4. It makes searching simpler. One of Chromes signature features is its Omnibox, an integrated all-purpose bar at the top of the browser. You can type in a URL or a search termor bothand Chrome takes you to the right place without asking any questions. Omnibox can learn what you like, tooa talent that goes beyond the obvious automatic completion function. Say that you want to use the PCWorld.com search function, for example. Once youve visited the site once, Chrome will remember that PCWorld.com has its own search box and will give you the option of using it right from Omnibox. The function thus automates keyword searches. 5. It gives you more control over tabs. Chrome gives the idea of tabbed browsing new power. You can grab a tab and drag it out into its own individual window. Or you can drag and drop tabs into existing windows to combine them. Chrome also gives you the option of starting up in any tab configuration you wantwhether a custom setup or the set of tabs you had open in your previous session. Other browsers require third-party add-ons to provide this capability. 6. It opens new doors on your home page. Chrome comes with a default dynamic home page. As you use it, the program remembers the sites that you visit most often. The top nine of those appear in snapshots on your home page, along with your most commonly used search engines and bookmarks. Theres no force-feeding here, though: You can override the dynamic home page with any home page you want, just as you can set the default search engine to any service you prefer. 7. It lets you stay incognito. Like  Internet Explorer 8s recent beta release, Chrome offers a private browsing optionone it calls Incognito. You can open a special type of new window and rest easy knowing nothing you do in it will be logged or saved on your computer. And unlike Internet Explorers, Chromes Incognito window is isolated from the rest of your browsing experience, so you can have your private window open alongside your regular windows, and each will operate independently. http://www.neowin.net/forum/uploads/monthly_12_2010/post-261952-12913175021568.png RockMelt RockMelt is a proprietary social media web browser developed by Tim Howes and Eric Vishria. The project is backed by Netscape founder Marc Andreessen. RockMelt integrates a technique for surfing the web that focuses on Google Search and social media, in particular Facebook and Twitter. (wikipedia) RockMelt is Very Similar to Chrome, it uses an older engine than what chrome uses but otherwise the same, the only thing that is different is the UI, RockMelts UI is built for the people who use online social sites a lot, like Facebook and Twitter. The Left and Right sides of the browser are where the main social features are, it displays your friends that are online on the right (Facebook) and links displaying how many messages you have on Facebook, Twitter etc. on the left. Other social features can be found in the title bar and the menu dropdown. Pros The Facebook chat integration. The pop-out instant messaging windows enable you chat without needing to keep Facebook open. Plus, by adding friends the favourites list, you can easily see if the people you chat with the most are online. Another feature is the drag and drop ability. If you are on a website that I want to share with friends, simply grab the link and drag it over their photo on the left side bar. Then you have the option to share it with them via Facebook Chat, Facebook Message, or by posting it on their Facebook Wall. Additionally, you can easily share it with all of my Facebook friends or Twitter followers by dragging to the Share button next to the address bar. Cons There are a lot of Distractions! With everything from Facebook to the favourite blog feeds integrated right into the browser, theres almost too much going on. This is definitely not a browser to be used in the office. While its a really useful tool for social media integration, it definitely lowers peoples productivity Social Entrepreneurs: Traits And Limitations Social Entrepreneurs: Traits And Limitations This article is oriented to through a light and argues that social entrepreneurs do not give adequate consideration to gender and emphasise that there was a lack of research on womens contribution as social entrepreneurs; this article suggests other possible areas of study to advance this field of research. It brings out the extensive literature on social entrepreneurs and female entrepreneurs, while also drawing on the gender/diversity literature. This article creates interest to researchers who wish to examine aspects related to women as social entrepreneurs. It is also relevant to government agencies and social enterprise organisations those are looking to gain a more understanding of social entrepreneurs, their characteristics and the issues they face. It provides key avenues of further work to better understand the way in which sex and gender interact with the practices of social entrepreneurs. Though there is a tremendous increase in research on social entrepreneurs in recent years, a little consideration has been given to the womens contribution make as social entrepreneurs. Some work in academic research has started to profile social entrepreneurs, describe why they choose to become social entrepreneurs, the hurdles they face and the strategies they adopt. Although the research on the topic of social entrepreneurs is increasing, it is still largely based on an idealised vision of which the social entrepreneur is, often restricting the concept to a narrow pool of individuals and not taking into account the actual diversity within this category. Teasdale et al., 2011 says one such category which has been largely ignored in the literature consists of the contribution that women make as social entrepreneur. For the purpose of this paper, we will discuss the concept of social entrepreneurs independently of social entrepreneurship. This will avoid difficulties linked to the fact that not all social enterprises may be entrepreneurial or that not all social entrepreneurship comprises social enterprises. The premise of this paper is that much of the literature on social entrepreneurs is heavily influenced by mainstream literature on management and entrepreneurship, and as such the work on female social entrepreneurs may follow the same trend. Much of the work in the field of sex/gender and management/entrepreneurship has changed focus over the past two to three decades, moving from a largely descriptive field of research to a much more analytical one. One of the key characteristics has been the progressive move from sex to gender, going from looking at if sex makes a difference, to how gender makes a difference (see Carter and Shaw, 2006 for a fuller account). The literature on women entrepr eneurs has adopted an increasingly critical stance, denouncing the implicit maleness of the entrepreneur as a construct. One of its main criticisms is the androcentricity inherent in much of the entrepreneurship literature, which often relies on very gendered and stereotypical assumptions as to the role of men and women. The mainstream literature has given much attention to the topic of traits, looking for the actual social or psychological attributes possessed by successful entrepreneurs. However, the gendered nature of these very traits has been heavily criticised by scholars in the field of gender and entrepreneurs (Ahl, 2006; Marlow et al., 2009). In opposition to trait theory, which relies on a social-psychological approach, a more sociological approach has been proposed to look at identity construction rather than traits. This gives a voice to alternative groups (e.g. women), for example in the male-dominated Science, Engineering and Technology (SET) incubators (McAdam and Marlow, 2010) or among ethnic female entrepreneurs (Essers and Benschop, 2007; Humbert and Essers, 2012). This paper builds upon this body of work to provide a critical view of existing work on (female) social entrepreneurs and to shape a future research agenda. In particular, it aims to provide a brief account of current res earch on social entrepreneurs, followed by some of the findings directly related to the contribution of women. Because of the limited amount of material on women as social entrepreneurs, the paper also draws on literature on women within the social entrepreneurship, with applications to the case of social entrepreneurs where feasible. This review is informed by a focus group organised in June 2009 in London that brought together key informants such as policy makers, female social entrepreneurs and academics. Finally, the paper aims to provide a reflective gendered account of how these bodies of literature can be combined to inform further research on women as social entrepreneurs, before suggesting some possible avenues for research on the topic in the future. Social entrepreneurs: traits and limitations Some of the traits attached to social entrepreneurs are starting to be well documented. Some studies like Prabhu, 1999 suggest that social entrepreneurs are younger, possibly due to a higher risk propensity related to lower levels of family responsibilities. Ramsay and Danton, 2010 found that evidence from the UK suggests however those very young individuals are not very well represented among social entrepreneurs. It is important to consider the effect of age as there may also be potential links with the type of social enterprise being set up: younger social entrepreneurs may work on transformational actions while older social entrepreneurs may tend to focus more on charitable organisations. It might also be alternative forms of organisations that are adopted by younger social entrepreneurs. Leadbeater, 1997 focused on the development of social capital which is seen as important in the creation and subsequent development of social enterprises. Research into the potential importance of social capital among social entrepreneurs shows some evidence that personal/family history of (social) entrepreneurship may have a positive influence on the creation of social ventures but overall remains inconclusive. In the entrepreneurship literature, women are portrayed as being particularly influenced by this personal/family history (Marlow et al., 2009). This raises the question of to what extent this is also a factor among women social entrepreneurs. Shaw and Carter, 2007 stated that social entrepreneurs are able to show drive, determination, ambition, charisma, leadership, the ability to communicate vision and inspire others and their maximum use of resources. In order to do so, as Alvord et al. (2004) suggest, a characteristic associated with successful social entrepreneurs is that of a bridging capacity. This capacity is shaped by a social entrepreneurs background and experience which in turn is shaped by gender relations. Some authors have focused on developing a universal definition of social entrepreneurs, one which is heavily linked to, and directly derived from, the definition of an entrepreneur. One of the definitions adopted by Nicholls (2006:224) draws on Dees (2001) and bears some similarities with Chell (2008). It is worded in the following terms: Social entrepreneurs play the role of change agents in the social sector, by: à ¯Ã¢â‚¬Å¡Ã‚ · adopting a mission to create and sustain social value (not just private value); à ¯Ã¢â‚¬Å¡Ã‚ · recognising and relentlessly pursuing new opportunities to serve that mission; à ¯Ã¢â‚¬Å¡Ã‚ · engaging in a process of continuous innovation, adaptation and learning; à ¯Ã¢â‚¬Å¡Ã‚ · acting boldly without being limited by resources currently in hand; à ¯Ã¢â‚¬Å¡Ã‚ · exhibiting a heightened sense of accountability to the constituencies served and for the outcomes created. This definition assumes that there are fundamental differences between mainstream entrepreneurs and social entrepreneurs. Chell (2007:18) has worked on reconciling the two definitions and concludes that the differences can be eliminated by adopting the following: (social) entrepreneurship is the process of recognizing and pursuing opportunities with regard to the alienable and inalienable resources currently controlled with a view to value creation. This definition, while providing a platform for renegotiating theoretical differences between entrepreneurs and social entrepreneurs is still proving to be a very polarised stringent definition. This problem is in part resolved by adopting an alternative viewpoint where the ideal social entrepreneur should not necessarily fulfil all criteria in the above definition fully, but that there are different degrees of fulfilment for each and that a social entrepreneur does not necessarily need to meet all of them (Dees, 2001). If there are many commonalities between mainstream and social entrepreneurs, academic discourse bestows social entrepreneurs with extra, special, traits which underline the importance of their commitment and dedication to social aims. Not only are social entrepreneurs largely described as different in the literature, they are also often described as extraordinary individuals. Dees (2001:2) for instance describes entrepreneurs in the following terms: their reach exceeds their grasp. Entrepreneurs mobilize the resources of others to achieve their entrepreneurial objectives. Chell (2007:5) portrays a similar vision of the entrepreneur as a household name with a personality that is larger than life'. These quotes present a view of the entrepreneur as both metaphorically and literally uncontainable. Further research needs to explore how this discourse relates differently to men and women. It is also important to examine the role of women in the governance of social enterprises, The Social Enterprise Coalitions State of Social Enterprise Survey (Social Enterprise Coalition, 2009) show that the social enterprise sector provides a more egalitarian environment for women, as can be seen in terms of presence on boards; 41% of social enterprise board members in the SEC Survey 2009 are women (Humbert, 2011). However, this differs considerably between sectors. There is a strong need to recognise diversity among social entrepreneurs. Indeed mainstream entrepreneurship studies have often been criticised for failing to address heterogeneity (Ahl, 2006; Essers and Benschop, 2007) and it appears that these issues are at least as pronounced with regards to social entrepreneurship. An emphasis on entrepreneurial traits can therefore be criticised as being overly reductionist in that it discursively creates a hegemonic model of the social entrepreneur as s/he ought to be. Furthermore, it embeds the characteristics of social entrepreneurs into individualistic and economic settings, while disregarding the impact of the socially interactive and emotional settings (Goss, 2005). Social entrepreneurs: motivations, obstacles and strategies In addition to work focusing on who social entrepreneurs are, other studies analysed why they choose to become social entrepreneurs, the obstacles they face in doing so, as well as some of the strategies they employ to overcome these. This approach departs from attempting to describe successful social entrepreneurs in that it does not solely rely on natural characteristics but also recognises the importance of the environment, for instance through cultural or social influences. As such, social entrepreneurial awakening can be seen as a multiplicity of trigger factors in individual, personal, familial and professional backgrounds. Becoming a social entrepreneur can be seen as the end result of a more or less long maturing journey, characterised by a range of positive and negative inputs which are interpreted in a time-dependent cultural, societal and personal context. Amin (2009) talks about two main routes that lead to becoming a social entrepreneur. One is about being nurtured with the social economy and using the skills and resources acquired within that setting. The other is to come from the public or private sector and apply skills gathered there in the context of the social entrepreneurship. Motivations for social entrepreneurs are extremely complex, with evidence that rational choice theories are inappropriate due to the complexity and range of different inputs and their interpretations (Spear, 2006). Most studies find that there are usually many similarities between the motivations of mainstream and social entrepreneurs. Social entrepreneurs may not rate independence and income security highly, but give a lot of importance to their social objectives (Shaw and Carter, 2007). These social objectives are often portrayed as additional factors (Prabhu, 1999; Spear, 2006; Hudson, 2009) and include factors such as altruism, ethical/social concerns or ideological aims. While there is a significant degree of overlap among these categories, all of these extra motivations rely heavily on an individualistic identity construction, without considering the collective identitys role. Furthermore, social entrepreneurs motivations remain conceptualised using the entrepreneurs model, albeit with some added elements. This approach of adding extra elements is replicated when looking at the obstacles faced by social entrepreneurs. These are presented as being quite similar to those faced by mainstream entrepreneurs (Thompson, 2002). Future research will need to consider how some factors such as ethnicity and gender affect the magnitude of the obstacles encountered. Very little work has looked at issues of diversity among social entrepreneurs. The UK Government Equalities Office (2008) examined the motivations and obstacles associated with women social entrepreneurs within BAME (Black, Asian and Minority Ethnic) communities. This work identifies a tendency to get involved with ones community as a motivating factor while at the same time experiencing multi-disadvantage and discrimination. Multiple, and interacting, layers of identity can therefore be seen both positively and negatively. Generally social entrepreneurs report experiencing difficulties in accessing finance, as do mainstream entrepreneurs. Alternate sources of funding are used with little reliance on the three Fs (family, friends and fools), but instead finance is sought from charitable trusts or the public sector (regional, national, and European) (Shaw and Carter, 2007). This differs from the situation among mainstream entrepreneurs, who are more likely to rely on bootstrapping methods of financing their business (relying on internal funds rather than raising money externally). Women entrepreneurs are themselves more likely to rely on bootstrapping, raising the question of whether this is also the case among women social entrepreneurs. Another characteristic of social entrepreneurs is that they tend to operate in locations and sectors where they have experience (Shaw and Carter, 2007). Although this could be presented as caused by lack of experience, it could also be explained by the fact that they use available resources in a way that maximises their experiential capital. Alternatively, it could also be a strategy to minimise risk. As Shaw and Carter (2007) stress, in the context of social entrepreneurship, social and personal risk are more prevalent as opposed to financial risk. No discussion of the concept and experience of risk among women social entrepreneurs exist in the literature to the authors knowledge. Women in the Social Entrepreneurship To understand the area of female social entrepreneurs, and given the paucity of material available, this paper will therefore take a broader view by examining research on gender more broadly defined before discussing how the findings in those fields may apply to social entrepreneurs. Labour can be subdivided into at least three categories: self-employed, domestic and community work. While the experiences of women in both self-employment and domestic work have been well documented, less work has been undertaken on their community work and volunteering. This section aims to present some of the key findings in the literature on womens paid and voluntary labour. Mailloux et al., 2012 says women have had a positive impact on society through their involvement in the social entrepreneurship, by putting some topics such as children, family, womens health, violence and discrimination towards certain groups of population on the social agenda. Research also suggests that women may use the voluntary sector to counteract negative attributes such as re-entry to the labour force or building up skills. Generally, the involvement of marginalised groups is they women, ethnic-minority groups, are associated with greater levels of change. This can be seen through the involvement of women in supporting womens issues, sometimes within particular communities which may otherwise not benefit from the services or products provided. Caputo (1997) for example finds a link in the US between black women volunteering and changing social conditions. Research on women in the social entrepreneurship, whether in paid work or volunteering, attempts to generate a profile of these women and what they do. The proportion of women involved in the social entrepreneurship is greater than other parts of the labour market, as shown by example by Mailloux et al. (2002) and Teasdale et al. (2011) in Canada and the UK respectively. Their activities are contrasted to that of men and studies show that there are differences apparent in the type of work performed by women, the type of organisations they are involved with, as well as the nature of their involvement within these organisations. Women perform extra volunteer work on a regular basis (e.g. care work) without recognising it as such in the formal voluntary sector (Mailloux et al., 2002). In addition, the link between lower earnings and women seems to also apply in the social entrepreneurship, with lower salaries and benefits than in the private sector in a Canadian context (Mailloux et al., 2002). The popular misconception that involvement in volunteering is a way of occupying free or leisure time, particularly among privileged groups, needs to be challenged given that, in fact, much (less formalised) volunteer work is being undertaken by members of marginalised groups in order to counteract negative circumstances (Neysmith and Reitsma-Street, 2000). The motivations of women in the social entrepreneurship do not appear to be specific to women. They can consist of wanting to make a difference, to act, to help; belong to a group; build links with the community (Mailloux et al., 2002), thereby suggesting that there is a strong community embeddedness in the voluntary sector. Neysmith and Reitsma-Street (2000:336) emphasise that what they call the participatory component should not be underplayed and that volunteers attach importance to being part of something that [à ¢Ã¢â€š ¬Ã‚ ¦] is ours, not mine or theirs'. The motivations for volunteering are therefore seen as wanting to build relationships with others, developing life and work skills, getting ownership of the fruit of ones labour and combating negative social stereotypes. However, volunteer work is devalued in contrast to paid work. One aspect of this devaluation is through the invisibility of volunteer work. Volunteering has been theorized as an extension of womens family work, reinforcing separate spheres of ideology where mens work is defined and rewarded, as a public contribution but womens work, even though done in the community, is defined essentially as an extension of their private responsibilities to family (Neysmith and Reitsma-Street, 2000: 342). Further research should examine the extent to which expectations of such gendered roles are present in the social entrepreneurship. In terms of paid work, Gibelmans (2000) research suggests that the glass ceiling is still prevalent in the US nonprofit sector, along with evidence of a gender pay gap. An analysis of HR policies revealed a set of anti-discrimination affirmations with usually no plans for implementation. Furthermore, policies related to facilitating access to management for women (i.e. flexitime or help with caring arrangements) were seldom addressed. The study however fails to examine the role these policies play in (dis)advantaging (wo)men. Indeed, Moore and Whitts (2000) findings indicate that men are disproportionately more present on voluntary organisations boards, more likely to occupy multiple seats and to be involved in a various number of sectors compared with their female counterparts. As they state, nonprofit boards in the United States remain bastions of white, male privilege (2000: 324). Overall, the authors conclude that attention needs to be given to the lack of access to boards to pro mote greater gender equality rather than on how individuals fare within the boards once they get in. The notion of conflict for women between traditional and modern gender roles is an important one to draw upon. Very little work has been done on this topic, but some US and Canadian evidence suggests that even though women hold a desire to break away from traditional gender roles, there are advantages in using these along with punishment for moving to a more modern structure (Mailloux et al., 2002). However, this move to more modern gender roles may have a detrimental effect, particularly on volunteering, with lower participation from women (Caputo, 1997). The extent to which these patterns of inequality are found amongst social entrepreneurs is largely under-researched. In addition, since many of the sources quoted above are based in North America, the degree to which these findings could be extrapolated to Europe, or the rest of the world, remains a serious concern. Current European studies (e.g. Teasdale et al., 2011; Humbert, 2011) infer that there are many similarities, but their number and scope remains limited. In their study, Teasdale et al. (2011), support many of the findings highlighted in this section, and are not able to examine social entrepreneurs operating in either the public or private sector. While there is a dearth of research into gender effects in the social entrepreneurship, patterns of inequities present in the private sector may be largely replicated in the social entrepreneurship, albeit on a smaller scale. The extent to which these patterns are similar, or different, remain critically under-researched. Furthermore, none of this work to date has been applied to social entrepreneurs. In the next section, a gendered reflection on these areas of research is provided, along with some possible topics of research into this field. Conclusion Research on social entrepreneurs remains largely dependent on the assumption that a common set of characteristics inherent to social entrepreneurs exists. In effect, this has led to attempts to produce a universal definition of the social entrepreneur. This approach, which replicates the development of research on entrepreneurs, is problematic in the context of female social entrepreneurs since it relies on individual characteristics and may ignore the collective nature of entrepreneurship and may not address the real diversity of social entrepreneurs. This tendency towards the reification of the social entrepreneur requires further research particularly in terms of how it affects men and women differently and whether it excludes particular groups. This tension replicates the long-running argument in mainstream entrepreneurship as to the degree of inclusiveness that should be bestowed to the definition of an entrepreneur. Indeed, this area of research remains highly centred on previous research on entrepreneurs, and merely adds in extra elements, such as the social or the female, often ignoring the contribution of the intersection of these two concepts. It is the lack of attention given to the interaction between these two concepts, coupled with a lack of questioning of their stereotypical underpinning, that constitute one of the major drawbacks of this field of research. The stereotypical position is often evident through studies undertaken on women in the social entrepreneurship. Women are portrayed as doing different types of jobs, in different types of organisations, at a lower level and for less money. The rhetoric of difference (with men?) prevails. Moreover, women are portrayed as not motivated by pecuniary reasons but more by a desire to act as what can only be described as mothers of the community: women are there to help, to build, for others but never for themselves, and are seldom valued or rewarded for their work. Research undertaken on social entrepreneurs has often consisted of examining them in contrast with mainstream entrepreneurs (Nicholls, 2006). There is a lurking danger in any comparative stance in that it can easily position one party as the deviant other, often implying an inferior position. This is certainly the case with female entrepreneurs (Ogbor, 2000; Bruni et al., 2004; Hytti, 2005; Ahl, 2006). Indeed, previous research has shown that in the case of female entrepreneurs, it might be inadequate to use theories derived from an essentially male experience to describe women entrepreneurs (Stevenson, 1990; Greene et al., 2003). This argument has much deeper implications in that it shows that existing models of entrepreneurs based on the so-called mainstream entrepreneur are models based on what Ogbor (2000) terms the white male hero. These models assume that the entrepreneur does not have caring and/or domestic responsibilities (Ahl, 2006). The challenge resides in creating new models or adapting these to the area of the social and the female simultaneously. Adapting models in entrepreneurship research such as the family embeddedness perspective advocated by Aldrich and Cliff (2003) or the socio-economic context presented by Brush et al (2009) would be beneficial. The difficulty in conducting research on women as social entrepreneurs lies in paying attention to the discourses briefly outlined in this paper. It is important to depart from these discourses, as discourse and perspectives about, and for, the nature of entrepreneurialism are fundamental to both theory (how we think about, conceptualize and define terms) and practice (what capabilities and behaviours we believe apply to people whom we refer to as entrepreneurs) and moreover, to how the terms are used in a wider socio-political arena to serve particular ends (Chell, 2007:7).

Saturday, July 20, 2019

Free Terrorism Essays: We Need the United Nations :: September 11 Terrorism Essays

We Need the United Nations in Our War Against Terror The United Nations has often been criticized, but events after the terrorist attack of September 11 show how essential it is to international peace and security. The United Nations Security Council, in particular, has proved its value in the present crisis. To combat terrorism, and specifically Osama bin Laden's network and the governments of Iran, Iraq, North Korea and other countries, a broad and diverse coalition is necessary. President Bush quickly realized that the active cooperation of other countries, including Muslim countries, was essential to the intelligence and policy work needed to find terrorists and destroy their networks. The support of these countries was also important to avoid a severe political backlash against the use of military force in Afghanistan. To secure such cooperation and support, country-by-country negotiations were necessary, but they were not sufficient. The campaign against terrorism needed to be rendered legitimate in the eyes of the world - particularly in countries whose governments and people are suspicious of the United States. Unilateral American action could have too easily been portrayed as lashing-out by the powerful "hegemon" at the expense of the poor and the weak. To be legitimate, action had to be authorized collectively, in a public forum representing the whole world. No such forum exists except the Security Council of the United Nations. Its fifteen members currently include three Muslim countries - Bangladesh, Mali, and Tunisia. Hence unanimous resolutions by the Security Council belie the claim that efforts against terrorism are "anti-Muslim." The Security Council has passed two unanimous resolutions on terrorism since September 11. Meeting in New York the very next day, it adopted Resolution 1368, which unequivocally condemned the terrorist attacks on the United States, and called on the international community to redouble its "efforts to prevent and suppress terrorist acts." Resolution 1368 also referred to the "inherent right of individual or collective self-defense," in accordance with Article 51 of the United Nations Charter. In effect, it declared that military action by the United States against those responsible for the attacks would be lawful. Last Friday, September 28, the Security Council passed a more specific and equally far-reaching resolution, Resolution 1373. In this resolution it acted under Chapter VII of the UN Charter, which gives the Security Council authority to order states to carry out "the measures decided upon by the Security Council.

Friday, July 19, 2019

Chinese Shih Poetry And Philosophy Essay -- essays research papers

Since the beginning of time, man has sought to explain the world around him. This is called philosophy, a Greek word which means "love of wisdom." However, over the millennia it has come to mean much more. The philosophies of the ancient Chinese people, whether they explain nature or present ways to live a just life, became so complex that simple prose could not suitably express their meaning. Yet paradoxically, the simpler, less exact form of poetry does put forth the ideas. Nowhere is this more exemplified than in the literature pertaining to the two major schools of ancient Chinese thought; Taoism and Confucianism. Poets such as Tu Fu and Po Chà ¼-i expressed the ideas of Taoism and Confucianism, respectively, while their fellow poet T’ao Ch’ien expressed both, through their poetry. Confucianism is based on the ideas of Confucius, the man who gave the school of thought its name. The main goal of Confucianists was to return a gentlemanly society to China. The core of Confucianism concerned social structure. Confucius taught that a man should respect and obey those of higher rank than himself, whether they be the father of a family, or the emperor of a nation. But even with absolute obedience, Confucianists believed that men should practice restraint and benevolence in those inferior to them. At the same time, those in high status were expected to lead virtuous lives, and to set examples for those that followed them. Confucianists believed that the moral code of man was set down by heaven, and if those in positions of authority did not set good examples, then they would deposed by the forces of heaven. One of the first great Chinese poets to write of Confucianism was T’ao Ch’ien. T’ao Ch’ien’s poem Substance, Shadow, and Spirit shows a comparison between Confucianism, Buddhism, Taoism, and the views on life and death of each. A clear example of Confucian beliefs can be taken from this poem. He states, "Let us strive and labor while yet we may / To do some deed that men will praise." This clearly demonstrates the fact that Confucianists do not believe in reincarnation. Also, in his Poem on Returning to Dwell in the Country, T’ao Ch’ien writes, "In the same world men lead different lives; / Some at the court, some in the marketplace." These lines illustrate that for every man there is a place in an ... ...orld around him, which was full of chaos and turmoil. In the final section of the poem Substance, Shadow, and Spirit he discusses the Taoist view, which is that one should not worry about death, but should "go where Fate leads – Drift on the Stream of Infinite Flux" and "make as little fuss as you can," when death finally comes. His Poem on Returning to Dwell in the County also shows Taoist ideas on simplicity, and following the way of nature. Passages such as "Long I have loved to stroll among the hills and marshes, / And take my pleasure roaming the woods and fields," demonstrate the Taoist love for nature. Poets such as Po Chà ¼-i presented the ideas of in a form that better impacted the common man, and carried their ideas crystal clear to the intellectuals. His fellow poets, T’ao Ch’ien and Tu Fu presented images of nature so intense, that the reader could gain a sense of calm from reading their poems. These poems have passed the test of time, and have not weathered the slightest. The followers of these schools were gifted enough to state their beliefs in poetry so vivid that they still enlighten lovers of wisdom today.