Wednesday, October 30, 2019

Fitzgeralds Translation of Omar Khayyam Coursework

Fitzgeralds Translation of Omar Khayyam - Coursework Example The best part of his poems was composed during his youth in the quiet and beautiful landscape of Nishpur. The translated version of his famous Rubaiyat (Quatrains) was first published by Edward Fitzgerald in 1859, which made him famous throughout the Western world. "If the mood expressed in the famous Quatrains", says Gibbs, "is not the most heroic or exalted, none-the-less they caught the exact tone of the age, and voiced it as perfectly as eight centuries earlier they had voiced the published hedonism of the cultured society of Isfahan". "Postcolonialism" is the revaluation of Western culture's conception of itself in the light of the repressed history of exploitation of "other" peoples on which Western economic well-being and distribution of wealth is based (Robert 2003, p. 1). Postcolonial criticism is characterized by a skepticism concerning those liberal notions of moral and political justice which historically co-existed happily with iniquitous colonial practices. Consistent with this critique, it also tries to reformulate more plausible concepts for understanding what actually took place under colonialism, redeeming past events from colonial ideologies of improvement from liberation, and evolving new categories for mapping a resistant world from the colonized point of view. In discussing historical work of Omar Khayyam it becomes more and more natural to equate historical differences with cultural differences. The problems faced by the Edward Fitzgerald crossing historical boundaries are so similar to those of the cultural anthropologist that no apology for this conflation looks necessary. Both hermeneutical acts are so closely allied in procedure and intent that we easily forget their differences, or that one must, in some sense, be a metaphor for the other. Or perhaps 'metonym' for the other is more accurate, if assumption of that continuity with the past enabling dialogue is extended or reinforced by the parallel of interpreting Omar Khayyam's cultures. Since cultures are frequently contemporaneous with out own, they can, if allowed, talk back in a more straightforward manner than the past. Equally, interpreters of historical difference (like Fitzgerald) maintain the parallel at their end by understanding as a king of translation the effort by which they try to register the Omar's voice in which the past replies to their questions, a translation which may involve alterations to the language into which the translation passes. When Edward Fitzgerald entered the altered landscape of another culture, he chose not only to translate classical meanings into English meanings but also to "transpose"1 certain alien habits of speech and thought. He did this because, like all great poets, he cared about language and form, and knew that the language of English poetry itself would be strengthened and enriched by the minor violations to which he was willing to subject it. He also found the ancient world itself was far from being a uniform field. Edward Fitzgerald risks distorting the English language under the pressure of translating into it an alien form. But the deterrent of confronting difficulty is a strengthening and enriching of the poet's language. This

Monday, October 28, 2019

Vietnam War Research Essay Example for Free

Vietnam War Research Essay The Vietnam War was a Cold War-era military conflict that occurred in Vietnam, Laos, and Cambodia from 1 November 1955 to the fall of Saigon on 30 April 1975. The U.S. government viewed involvement in the war as a way to prevent a communist takeover of South Vietnam as part of their wider strategy of containment. The North Vietnamese government and Viet Cong viewed the conflict as a colonial war, fought initially against France, backed by the U.S., and later against South Vietnam, which it regarded as a U. S. puppet state. American military advisors arrived in what was then French Indochina beginning in 1950. U.S. involvement escalated in the early 1960s, with troop levels tripling in 1961 and tripling again in 1962. U.S. combat units were deployed beginning in 1965. Operations spanned international borders, with Laos and Cambodia heavily bombed. American involvement in the war peaked in 1968, at the time of the Tet Offensive. After this, U.S. ground forces were gradually withdrawn as part of a policy known as Vietnamization. Despite the Paris Peace Accords, signed by all parties in January 1973, fighting continued. U.S. military involvement ended on 15 August 1973 as a result of the Case–Church Amendment passed by the U.S. Congress. The capture of Saigon by the Vietnam Peoples Army in April 1975 marked the end of the war, and North and South Vietnam were reunified the following year. The war exacted a huge human cost in terms of fatalities. Estimates of the number of Vietnamese soldiers and civilians killed vary from fewer than one million to more than three million. Some 200,000–300,000 Cambodians, 20,000–200,000 Laotians, and 58,220 U.S. service members also died in the conflict. (WIKI PEDIA) Key Quotes: (NOTABLE QUOTES) The Vietnam War was arguably the most traumatic experience for the United States in the twentieth century. That is indeed a grim distinction in a span that included two world wars, the assassinations of two presidents and the resignation of another, the Great Depression, the Cold War, racial unrest, and the drug and crime waves. DONALD M. GOLDSTEIN This war in Vietnam is, I believe, a war for civilization. Certainly it is not a war of our seeking. It is a war thrust upon us and we cannot yield to tyranny. FRANCIS CARDINAL SPELLMAN Television brought the brutality of war into the comfort of the living room. Vietnam was lost in the living rooms of America not on the battlefields of Vietnam. MARSHALL MCLUHAN Our resistance will be long and painful, but whatever the sacrifices, however long the struggle, we shall fight to the end, until Vietnam is fully independent and reunified.

Saturday, October 26, 2019

Human Rights Violations Essay -- Human Rights Essays

Throughout history, people’s human rights have been violated, but efforts have also been made to address the violations, and protect their rights. Human rights are rights as regarded belonging to all people. Today we are all entitled to the same rights. In a sense, we are all equal.   Ã‚  Ã‚  Ã‚  Ã‚  Human rights are rights and liberties that are guaranteed to everyone at birth. On December 10th 1948, the General Assembly of the United Nations adopted and proclaimed the Universal Declaration of Human Rights. It was made for every living human in this world to follow and obey. These rights originated after World War II because they don’t want such inhumanity event to ever occur again. So by the world agreeing to this declaration it is almost sure the lives of so many people isn’t to be lost again for unnecessa,ry reasons. The main purpose of these rights are to enforce balanced rights of all people. Making sure that all humans have the right o freedom, justice, and peace in the world. It also says that everyone has the right to nationality, religion, and his or her own opinion [Document 1]. Despite the holocaust, abuses of human rights have continued in the post-World War 2 era.   Ã‚  Ã‚  Ã‚  Ã‚  One of the major abuses of Human Rights in the World War II era was the Apartheid in South Africa. After South Africa won its independence from Great Britain, the Afrikaner Nationalist party gained a whites only parliament. The nationalists set up a system of ...

Thursday, October 24, 2019

Communication and information handling

You should be able to complete this observation in the course of your normal duties as you implement a care plan. It may be best if the individual you choose to communicate with is someone you have not spent much time with before. You need to get the permission of the others involved for the assessor to observe you in your work tasks. As an alternative to your assessor, you may, with your assessor's agreement, arrange for an expert witness to observe and write an account of this observation. Your assessor will want to see you communicating with the individual, with your colleagues and with others, in the best way for them.Your assessor will also be looking out for: a) how you find out and meet the individual's needs, wishes and preferences in b) how you reduce barriers to communication c) how you check that your communication has been understood d) how you seek advice about communication e) how you demonstrate confidentiality when talking to your colleagues and others f) how you take into account the individual's preferences about their care plan and the likelihood of danger or harm arising from their choices Your assessor may ask you some follow-up questions about using a care plan and risks.When preparing for the professional discussion with your assessor you will need to consider how to seek advice, support and information about a range of topics including: effective communication confidentiality equality, diversity and inclusion partnership working and resolving conflicts. Your assessor will plan the content of your professional discussion and will advise you to help you to prepare beforehand. The professional discussion may cover more than this section of your Assessment Workbook.Discussion process The discussion process will offer you the opportunity to show that you know how and when to seek additional guidance and information in a variety of situations. The assessor will also wish to discuss how you To prepare for your professional discussion, you shoul d think about how you could answer questions such as the following: Within your workplace, who should you go to for information, advice and support? When should you approach someone in your organization for information, advice and support? Who should you approach outside your own organization for information, advice When should you approach them? How should you find out this information from different sources? How useful is the information from each source? Is there anything you could do differently when you try to find out information in the future?

Wednesday, October 23, 2019

Contemporary Status of Women in the Us

Women have come a long way from the early 1900’s when they gained their equal right to vote, to now where it seems women have equal rights to do just about anything. Women have been increasingly joining the economic work force since the last 100 years or so. Although, women in the work force have been increasing in numbers are they given an equal and fair chance compared to that of men? A quick glance on the subject would suggest that women are given equal and fair chances in the work force; however, upon closer inspection it seems women in fact are not given the same fair and equal opportunities as men.Women are subjected to occupation gender segregation and unfair pay gaps in comparison to men. Nevertheless, women are working diligently and successfully to break down these unjust barriers that are keeping them from having equal opportunities. According to Margaret L. Andersen and Dana Hysock Witham, in Thinking about Women: Sociological Perspectives on Sex and Gender, gender segregation is â€Å"the pattern whereby women and men are situated in different jobs thought the labor force† (128).This can be made an example of in obvious occupations such as: kindergarten and preschool teachers, nurses, librarians, and house cleaners, versus college professors, doctors, lawyers, and construction works. The former, when typically imagined, the first image that comes to mind is a woman, whereas the latter is associated with a man. These occupations are associated with certain genders because generally speaking those jobs are and have traditionally been a certain gender dominated. Philip N. Cohen, and Matt L.Huffman, in Occupational Segregation and the Devaluation of Women's Work Across U. S. Labor Markets, hypothesis that gender segregation in the workforce exists because of the â€Å"discrimination both in the allocation of workers across the job categories and in how female-dominated jobs are rewarded relative to male-dominated jobs† (882). Women are â€Å"blocked access† to typical male dominated jobs because of social ideas and cultural norms that say that women cannot effectively do the work of men, which requires intellect, leadership, hard labor, and other skills traditionally associated with men.Rather, women are kept in low paying jobs that often do not lead to promotions and involve skills that they have traditionally been known for, such as cooking, cleaning, taking care of children, obeying men’s orders, and things of that nature. Because women and men are kept in jobs that relate to their traditional gender based skills, it creates a segregation of the labor force instead of creating a heterogeneous labor force were men and women are equally interested in and are hired in certain occupations.Women’s work is also often undervalued in society, especially in comparison to the work of men. Because of this undervaluing of women’s work women are additionally rewarded far less than men are. A wage gap is the difference between the earnings of men and women in the workforce. Today â€Å"women earn only 77 percent of what men earn, at least on average† (DeNavas-Walt qtd. in Andersen and Hysock Witham 137). The wage gap between women and men can be attributed to occupational segregation and wage discrimination.Occupational segregation places women in lower skilled jobs that underutilize and devalues women’s skills and potential to work and be successful in the labor force (Karamessini and Ioakimoglou 34). Employers usually pay their employee’s wages that they see fit in relation to, how much they deem an employee and his or her skills are worth in the company, and how they contribute to the company. Because women’s work and skills are undervalued by a majority of society they are in turn paid less compared to men.Additionally, women usually seek out or are put into jobs that are women dominated. Again since women’s work is undervalued, on ce an occupation becomes a woman dominated occupation, the job itself becomes less valuable and people in that job eventually are paid less in that occupation compared to if it had been a male dominated occupation. The wage gap is also impacted by wage discrimination. The unequal pay of women based on gender rather than qualifications and skills is wage discrimination. In Joel T. Nadler and Margaret S.Stockdale’s article, Workplace Gender Bias: Not Just Between Strangers they quote Kolesnikova ; liu , â€Å"Although the gender wage gap has been decreasing over the last thirty years there is still a difference in salary between men and women in similar careers with similar experience† (282). Women are still being paid less than men despite having equal or better fit skills and or qualifications than men. Women are making progress in making the wage gap between men and women non-existent, however, progress has been slowing.Women are slowly but surely making significant p rogress in leveling the playing field in the labor market for both men and women. Progress can be seen in closing the wage gap between genders and in the desegregating of gender based jobs. â€Å"The earnings gap between men and women has shrunk to a record low†¦Ã¢â‚¬  (Dennis 01a). Dennis attributes it to the prosperity of women in the 21century economy and the fact that the recession has negatively affected men’s pay. He additionally continues to discuss how not only has white women’s wages increased, black women’s wages have also seen an increase in the past nine years.Women’s wages have been slowly increasing and becoming even with that of men. This increase can be attributed to women breaking down barriers of gender segregation in the work force. â€Å"Women have been moving into high-paying professional jobs such as accountants, lawyers and physician† (Dennis 01a). These occupations are typically male dominated. However, it seems in re cent years the occupations’ genders have been less homogenous and more of an even or close to even mixture of both genders.As women are taking over more male dominated jobs, such as perhaps managerial jobs, it seems that there are sacrifices that women have to make where as men usually do not. â€Å"Studies indicate career oriented women are more likely to delay relationships or children in order to advance their careers† (Hoffnung qtd. Nadler and Stockdale 282). Because women are taking on traditionally male dominated occupations they are under extra scrutiny and watch, therefore, women feel the pressure to perform well and make sacrifices in the name of their job.Women can feel that in order to be successful they are required to choose work over family life. The pressures over performing well in a women’s career life and also balancing their social or family life can create anxiety and unhealthy stress for women. Although, women have been successful in further closing the wage gap and breaking down gender segregation within the workforce, their progress it seems has also come at the price of choosing a career or a family.Although women have come a long way since the early 1900’s it seems that they are still subjected to unequal treatment compared to men. Women face gender segregation in the workforce which makes it difficult to attain prestigious and high paying jobs. Women are also subjected to being paid less than men regardless of having equal or superior skills. Nevertheless, women are facing these obstacles head on. Women are now more than CEO’s, they are leveling the playing field between genders in the labor force and re demanding, and showing that they deserve equal pay. Works cited Andersen, Margaret L. , and Dana Hysock Witham. Thinking About Women, SociologicalPerspectives On Sex And Gender. 9. Boston : Prentice Hall, 2010. Print. â€Å"Closing The Gender Gap. † Society 30. 3 (1993): 3. Academic Search Pre mier. Web. 29 Oct. 2012. Cohen, Philip N. , and Matt L. Huffman. â€Å"Occupational Segregation And The Devaluation Of Women's Work Across U. S. Labor Markets. † Social Forces 81. 3 (2003): 881-908. Academic Search Premier. Web. 28 Oct. 2012. Dennis, Cauchon. Gender pay gap smallest on record. † USA Today n. d. : Academic Search Premier. Web. 28 Oct. 2012. Karamessini, Maria, and Elias Ioakimoglou. â€Å"Wage Determination And The Gender Pay Gap: A Feminist Political Economy Analysis And Decomposition. † Feminist Economics 13. 1 (2007): 31-66. Academic Search Premier. Web. 28 Oct. 2012. Nadler, Joel T. , and Margaret S. Stockdale. â€Å"Workplace Gender Bias: Not Just Between Strangers. † North American Journal Of Psychology 14. 2 (2012): 281-291. Academic Search Premier. Web. 28 Oct. 2012.

Tuesday, October 22, 2019

It Started With a Vision essays

It Started With a Vision essays The creative mind of George Lucas has developed many different movies with different subject matter. Many of these movies, namely Star Wars, have pushed the envelope in the realm of special effects and sound. His demand for better special effects and sound increased the overall technology in the film industry, and continues to do so today with his company Industrial Light and Magic. In all of Lucas films, his main concern is getting his view across to the audience. He wants to portray his vision in the most vivid way possible so the audience can hopefully get a grasp of what message he is trying to get across, or what item he wants to address. Trying to get his idea across became an obsession for Lucas. The scene had to be almost entirely what he envisioned. In fact, Lucas would go to excessive lengths in creating a near perfect scene in comparison to other directors of his day. He further displayed his perfectionism when he wrote out screenplays. For example, he only used No. 2 lead pencils, making his tiny print almost impossible to read (Pollock 143). On the set, Lucas was a mastermind and a compulsive creator of visual imagery. Off the set, he was a creative coordinator. He spent countless hours developing the plot, story line, and dialogues of his movies. He then spent what time he had left pitching those scripts and ideas, and developing new ones. George wrote in a letter to his wife during the filming of Star Wars, I forget how impossible making movies really is, I get so depressed, but I guess Ill get through it somehow...(Pollock 168). If a person lives largely in a duality of something (having a passion for it, and then occasionally hating it), why would they continue with that line of work? Simple, Lucas had a vision he alone wanted to get across. Ideally, George would like to come up with an idea for a film, have somebody go out and shoot it, and then get all ...

Monday, October 21, 2019

Human Development Theory And Social Work Issues Social Work Essays

Human Development Theory And Social Work Issues Social Work Essays Human Development Theory And Social Work Issues Social Work Essay Human Development Theory And Social Work Issues Social Work Essay who live individually. Jack Murray was an adoptive kid. He was brought up by parents who were unfastened about his adoptive position and has neer shown any disposition to follow his biological parents. Jack has alcohol related jobs and is prone towards domestic force. Evelyn has been hurt and that excessively severely, in the recent yesteryear. Lora is making good in school and is cared for by Doris, who is nevertheless going frail. She had to be placed in an exigency Foster attention environment during her summer vacations, even as her female parent made usage of a adult females s shelter to get away the troubles of her place. Doris worries about being separated from her granddaughter and household if she were to travel to a attention place. All household members have expressed their willingness to work with a societal worker. Application of Theories of Human Development Erik Erikson s theory of human development was foremost advanced in 1950 and has been significantly augmented in ulterior old ages ( Brenman-Gibson, 1997, p 329 ) . Erikson s psychosocial theory provinces that life can be segregated into 8 phases from birth to decease, which comprise of ( a ) babyhood ( birth to 18 months ) , ( B ) early childhood ( 18 months to 3 old ages ) , ( degree Celsius ) drama age ( 3 to 5 old ages ) , ( vitamin D ) school age ( 5 to 12 old ages ) , ( vitamin E ) adolescence ( 12 to 18 old ages ) , ( degree Fahrenheit ) immature maturity ( 18 to 35 old ages ) , ( g ) middle maturity ( 35 to 55 or 65 old ages ) and ( H ) tardily maturity ( 55 or 65 to decease ) ( Brenman-Gibson, 1997, p 329 ) . Each of Erikson s 8 phases involves a crisis that is characterised by two opposing emotional forces. Infancy, for case, involves trust V misgiving and is characterised by the attention of the female parent for a kid with an accent on touch and ocular contact ( Christiansen A ; Palkovitz, 1998, p 133 ) . Successful passage through this period consequences in persons larning to swear in life and to hold assurance in the hereafter, even as jobs during this period can take to feelings of ineptitude and misgiving ( Christiansen A ; Palkovitz, 1998, p 133 ) . The school age of 6 to 12 old ages is likewise characterised by the opposing forces of industry and lower status ( Brenman-Gibson, 1997, p 331 ) . Persons are capable of acquisition, edifice and accomplishing legion accomplishments and cognition during this period, thereby developing feelings of industry. This phase of development can besides take to the experiencing of feelings of lower status and insufficiency with equals and consequence in jobs of ego regard and competency ( Brenman-Gibson, 1997, p 331 ) . Erikson s doctrine remainders on two of import subjects, viz. ( a ) that the universe enlarges as people go along, and ( B ) that failure is cumulative ( Douvan, 1997, p 16 ) . The first subject is incontestable. Whilst the second is problematic, it is true that kids who have to perforce trade with hard fortunes find it disputing to negociate ulterior phases in their lives in comparing with others ( Douvan, 1997, p 16 ) . Assorted surveies have revealed that kids who were non stroked as babies find it hard to link with others in their maturity. Erikson s theory of human development has gained broad credence and is frequently used as a model for understanding the nature of issues that lead to current behavior and to fix for the coming phases ( Douvan, 1997, p 16 ) . The analysis of the Murray household members reveal that Jack Murray could hold suffered from deficiency of stroking in his babyhood, particularly up to his acceptance at the age of 6 months. This could hold resulted in entrenched feelings of ineptitude and inclinations to distrust the universe. Such feelings, along with his experience of turning up as an adoptive kid, may hold inculcated feelings of low ego regard and be causal in his current imbibing jobs. Whilst Lora has grown up in the presence of fond parents and a loving grandma, she is now come ining the school age and the coming 6 old ages will enlarge her contact with the universe, where parents whilst still of import will non be the complete governments they have been until decease. The application of Erikson s theory of human development helps societal workers in understanding the assorted influences that persons experience in the class of their lives and the functions of such influences in steering their current behavior and their emotional and societal attitudes ( Raeff A ; Benson, 2003, p 61 ) . Bronfenbrenner s ecological theoretical account was foremost introduced in the early 1970s. His general ecological theoretical account is defined by 2 propositions ( Brendtro, 2006, p 162 ) . The first proposition provinces that human development, specifically in the early stages but besides throughout life, occurs through procedures that increasingly become more complex and affect mutual interaction between active and germinating worlds, who are bio-psychological in their attack, and the people, objects, and symbols in their immediate environment ( Brendtro, 2006, p 162 ) . Such interaction, when it occurs over drawn-out clip periods, on a regular footing are termed as proximal procedures and can be found in activities between parent and kids, kids and kids, and lone or group drama, every bit good as in reading, acquiring to cognize new accomplishments and executing complex and hard undertakings ( Brendtro, 2006, p 162 ) . The 2nd proposition provinces that the power, content, signifier and way of these proximal procedures influence development in a varying mode on history of the features of developing persons ( Brendtro, 2006, p 162 ) . Such development is besides influenced by the environment in which such procedures take topographic point and the nature of development results that are under survey. The female parent infant interaction, ( an of import proximal procedure ) emerges as an of import forecaster of developmental results ( Brendtro, 2006, p 162 ) . Bronfenbrenner s theory defines 4 different types of systems, viz. the Micro system, the Meso system, the Exo system and the Macro system, which shape human development ( Austrian, 2002, p 43 ) . The Micro system comprises of the household, schoolrooms and schools, and other systems in the proximal environment in which people operate. The Meso system represents the interaction of two micro systems, like the connexion between the place and the school of a kid ( Austrian, 2002, p 43 ) . The Exo system represents the environment that is external to the experience of an person and in which his or her engagement is indirect, but which effects development, all the same. The workplace of the parents of a kid is a relevant illustration of an Exo system. The Macro system represents the larger cultural context ( Austrian, 2002, p 43 ) . Bronfenbrenner s theory perceives the environment of a kid in footings of quality and context and efforts to explicate differences between the cognition, development and accomplishments of persons through the construction, support and counsel of the societies in which they exist ( Ahuja, 2006, p 3 ) . He states that interaction between over lapping eco systems affect people significantly. Applying Bronfenbrenner s theory to the Murray household, it can be seen that Lora s household and schoolrooms can be called the micro systems, which straight influence her working and development ( Ahuja, 2006, p 3 ) . When these two micro systems start working together to educate Lora, such instruction occurs through the Meso system. The society and civilization in which Lora is being raised provides the underlying influence to these systems and is termed the Macro system. The comprehension of interaction of these systems helps in understanding the manner in which kids develop and the factors that influence failure and success ( Ahuja, 2006, p 3 ) . Analysis of assorted micro and macro systems can assist societal workers significantly in understanding the assorted influences that shape the development of kids. Research workers have in fact specifically found the significance of macro systems to be causal to general depression and feelings of low ego regard in persons ( Ahuja, 2006, p 3 ) . The application of Bronfenbrenner s theory in the Murray household scenario enables the development of greater apprehension on the influences of different micro and Macro systems on the development of Lora in her school age and can assist societal workers to follow appropriate intercession methods. Role of Political and Social Processes on Human Development Whilst there is small uncertainty that the development of persons is mostly shaped by their place and school environments, sociological theory besides places important emphasis on the influence of larger society on such development ( Grusec A ; Hastings, 2008, p 42 ) . All persons grow up in specific political, cultural and societal environments that shape their attitudes and behaviors and act upon their development in specific ways. The peculiar societies in which people live are place to different types of spiritual, cultural and societal attitudes, prejudices and beliefs ( Grusec A ; Hastings, 2008, p 42 ) . Such political and societal procedures provide persons with the agencies to take part within their ain society, which itself contains shared imposts, norms, traditions, values and societal functions ( Grusec A ; Hastings, 2008, p 42 ) . These procedures are basically life long, get downing in childhood and go oning till decease. Both Erikson and Bronfenbrenner s theories de al with the procedure of socialization but through different positions Such socialization occurs through the influence of the household, faith, schools and equal groups, workplaces and the larger community ( Berns, 2009, p 131 ) . These procedures are besides influenced by local media and political idea. Children and immature grownups are significantly influenced by their equals. Such influences can frequently be negative and consequence in substance maltreatment, premature sexual activity and the demand to populate up to incorrect outlooks ( Berns, 2009, p 131 ) . Mass media plays an huge function in act uponing human development. The changeless exposure of kids to hex, sexual satisfaction and force can act upon the development of kids and immature grownups in assorted ways ( Berns, 2009, p 131 ) . With respect to the Murray household, it can good be understood that the personal development of all concerned persons is likely to be influenced by different political and societal procedures. The continuation of domestic force at place can take to feelings of hurt in Lora, particularly when she compares her domestic environment to that of her friends, and do her to wish to switch to a more peaceable environment. Such socialization procedures can furthermore leads to feelings of shame about her background and low ego regard, take her to eschew her household and take consolation in her equals and flicker of hooky player and delinquent behavior. Impact of Inequalities on Human Development Social work theory and knowledge chiefly aims to decrease and extinguish the impact of inequalities on the lives of persons ( Neckerman, 2004, p 189 ) . Inequalities can originate on history of assorted factors like income, instruction, gender and cultural position. Such inequalities basically serve to cut down surplus of affected people to assorted installations and cut down the chances of their life results and their opportunities to take normal and enriching lives, inequalities in income can for illustration deprive the kids of such households from assorted educational and other installations and badly decrease their life results ( Neckerman, 2004, p 189 ) . Such inequalities can besides bring forth feelings of low regard and consequence in suboptimal public presentation in and out of school during childhood and in the workplace in big life. Numerous surveies have revealed that kids with ill educated parents receive significantly lesser educational nutriment and support at place, which in bend affects their cognitive development and adversely influences their public presentation at school ( Marger, 2004, p 86 ) . Lora the 6 twelvemonth old Murray kid has until now done really good in school. The disturbed domestic state of affairs in her house, particularly the gender inequality between her parents and the domestic force faced by her female parent can good ensue in poorer educational support at place, particularly when she is traveling into the acquisition phase and needs it the most. Gender inequality has been widely accepted to be an of import factor in the unequal life opportunities offered to work forces and adult females of societies across the universe and has resulted in unequal development and life opportunities of the two sexes ( Marger, 2004, p 86 ) . Influence of Human Development Theories on Social Work Knowledge and Values Theories of human development aid in determining the thoughts of readers on the kernel of human behavior ( Austrian, 2002, p 56 ) . It expands the apprehension of persons of the range, the possible and complexness of human map. Whilst bookmans of human development do non hold on or back a individual theory, many of these theories provide new positions for the observation and reading of human behavior ( Austrian, 2002, p 56 ) . Piaget s theory of cognitive development has resulted in a new grasp for the ways in which kids construct sense and intending out of their experiences ( Raeff A ; Benson, 2003, p 81 ) . Erikson s psychosocial theory high spots the construct of individuality, even as the societal acquisition theory of Bandura has resulted in the widespread usage of patterning to imitate conditions under which kids increase their acquisition by detecting and copying the behavior of others ( Raeff A ; Benson, 2003, p 81 ) . The societal work profession draws extensively on theor ies of human development for understanding the behavior of persons, with specific respect to the causal influences of such behavior. An apprehension of such theories non merely enables societal workers to understand the causes for human behavior but besides helps them to be after appropriate intercessions to better the societal, emotional and economic conditions of people ( Raeff A ; Benson, 2003, p 81 ) . It helps societal workers to understand the dynamic interaction that takes topographic point among human existences and the impact of societal systems upon the lives of people. A greater apprehension of such theories besides helps societal workers in appreciating human diverseness, every bit good as the impact of different actions in assisting human existences to entree chances and services that foster realization of societal and economic justness ( Austrian, 2002, p 56 ) . Decisions

Sunday, October 20, 2019

Living Fossil Plants - Ginkgo, Metasequoia, Wollemia

Living Fossil Plants - Ginkgo, Metasequoia, Wollemia A living fossil  is a species that is known from fossils looking just the way it looks today. Among animals, the most famous living fossil is probably the  coelacanth. Here are three living fossils from the plant kingdom. Afterward, we will point out why living fossil is no longer a good term to use. Ginkgo, Ginkgo biloba Ginkgoes are a very old line of plants, their earliest representatives being found in rocks of Permian age  some 280 million years old. At times in the geologic past, they have been widespread and abundant, and the dinosaurs surely fed upon them. The fossil species Ginkgo adiantoides, indistinguishable from the modern ginkgo, is found in rocks as old as Early Cretaceous (140 to 100 million years ago), which appears to have been the ginkgos heyday. Fossils of ginkgo species are found throughout the northern hemisphere in rocks dating from Jurassic to Miocene times. They disappear from North America by the Pliocene and vanish from Europe by the Pleistocene. The ginkgo tree is well-known today as a street tree and ornamental tree, but for centuries it appears to have been extinct in the wild. Only cultivated trees survived, in Buddhist monasteries in China, until they were planted across Asia starting about a thousand years ago. Ginkgo Photo GalleryGrowing GinkgoesLandscaping with Ginkgoes Dawn Redwood, Metasequoia glyptostroboides The dawn redwood is a conifer that sheds its leaves every year, unlike its cousins the coast redwood and giant sequoia. Fossils of closely related species date from late in the Cretaceous  and occur all over the northern hemisphere. Their most famous locality is probably on Axel Heiberg Island in the Canadian Arctic, where stumps and leaves of Metasequoia sit still unmineralized from the warm Eocene Epoch some 45 million years ago. The fossil species Metasequoia glyptostroboides was first described in 1941. Its fossils were known before that, but they were confused with those of the true redwood genus Sequoia and the swamp cypress genus Taxodium for more than a century. M. glyptostroboides was thought to be long extinct. The latest fossils, from Japan, dated from the early Pleistocene (2 million years ago). But a living specimen in China was found a few years later, and now this critically endangered species is thriving in the horticultural trade. Only about 5000 wild trees remain. Recently, Chinese researchers described a single isolated specimen in Hunan province whose leaf cuticle differs from all other dawn redwoods and exactly resembles the fossil species. They suggest that this tree is truly the living fossil and that the other dawn redwoods have evolved from it by mutation. The science, along with much human detail, is presented by Qin Leng in a recent issue of Arnoldia. Qin also reports vigorous conservation efforts in Chinas Metasequoia Valley. Wollemi Pine, Wollemia nobilis The ancient conifers of the southern hemisphere are in the araucaria plant family, named for the Arauco region of Chile where the monkey-puzzle tree (Araucaria araucana) lives. It has 41 species today (including the Norfolk Island pine, kauri pine and bunya-bunya), all of them scattered among the continental fragments of Gondwana: South America, Australia, New Guinea, New Zealand and New Caledonia. Ancient araucarians forested the globe in Jurassic times. In late 1994, a ranger in Australias Wollemi National Park in the Blue Hills found a strange tree in a small, remote canyon. It was found to match fossil leaves going back 120 million years in Australia. Its pollen grains were an exact match to the fossil pollen species ​Dilwynites, found in Antarctica, Australia, and New Zealand in rocks as old as Jurassic. The Wollemi pine is known in three small groves, and all specimens today are as genetically alike as twins. Hard-core gardeners and plant fanciers are very interested in the Wollemi pine, not just for its rarity but because it has beautiful foliage. Look for it at your local progressive arboretum. Why Living Fossil Is a Poor Term The name living fossil is unfortunate in some ways. The dawn redwood and Wollemi pine present the best case for the term: recent fossils that appear identical, not just similar, to a living representative. And the survivors were so few that we may not have enough genetic information to explore their evolutionary history in depth. But most living fossils dont match that story. The plant group of cycads is an example that used to be in the textbooks (and may still be). The typical cycad in yards and gardens is the sago palm, and it had supposedly been unchanged since Paleozoic time. But today there are about 300 species of cycad, and genetic studies show that most are only a few million years old. Besides genetic evidence, most living fossil species differ in small details from todays species: shell ornamentation, numbers of teeth, configuration of bones and joints. Although the line of organisms had a stable body plan that succeeded in a certain habitat and lifeway, its evolution never stopped. The idea that the species became evolutionarily stuck is the main thing wrong about the notion of living fossils. There is a similar term used by paleontologists for fossil types that disappear from the rock record, sometimes for millions of years, and then appear again: Lazarus taxa, named for the man that Jesus raised from the dead. A Lazarus taxon is not literally the same species, found in rocks millions of years apart. Taxon refers to any level of taxonomy, from the species through the genus and family up to the kingdom. The typical Lazarus taxon is a genus- a group of species- so that matches what we now understand about living fossils.

Saturday, October 19, 2019

Hinduism Essay Example | Topics and Well Written Essays - 500 words

Hinduism - Essay Example Therefore, those that do bad deeds, such as rob or steel, are polluting their karma, which will lead to unfortunate events and vice versa for good deeds. It is also important in the concept of reincarnation, as how good your karma is will determine what an individual is reincarnated as. This is especially important because a person must have very good karma in order to escape the cycle of reincarnation in order to achieve a higher state of enlightenment known as moksha. An avatar is a manifestation of a Hindu deity on Earth. Each sect of Hinduism has a different view regarding these types of manifestations. The manifestation does not have to occur solely as a human, but can be in the form of an animal or any other sort of creature. They appear as a source of divine influence and often speak to people offering sage’s advice. In addition, each avatar has unique qualities, which separate them from one another. Each sect of Hinduism acknowledges the existence of a different number of avatars. In the basics of Hinduism for someone who is unfamiliar to the religion, it would sound unique in comparison to its Christian counterpart.

Friday, October 18, 2019

Global Capital Markets Research Paper Example | Topics and Well Written Essays - 750 words

Global Capital Markets - Research Paper Example nturn in many Asian countries financial systems in the world were erected in the past few years when such nations experienced the unmatched growth of other nations as well as the European Central Bank (Hill, 2011). Therefore, ICBC explored this lucrative opportunity to counteract these problems outline in many global economic as well as financial situation as it stressed the financial commitment to international financial industries. The foreign financial commitments established by the ICBC had several advantages. Following the property problems that US had experienced, the ICBC invested considerably in United States economic system. ICBC forecasted equities and liabilities will showcase lower rates. The ICBC declined the costs and assisted enhance economic and financial solutions resulting from their finding source plants. Such synergies as well as industry connections they established culminated into enhanced general banking practices as well as a particular competition of the ICBC banking assets as clearance brokers. Also, the move culminated to ICCB’s overall balance with the assistance of different income streams offered throughout the globe (Hill, 2011). Also, since ICBC had a variety of product as well as avenues for finances the benefited from the constant enhancement in profit thus helping in the recruitment and retaining of their client’s commitment. Furthermore, the ICBC market transition with a variety of financial institution they were dealing with was among the many advantages that was derived from the alterations within the commerce policies as well as the success of consolidated and segmented financial funding sources. Whereas the submissions with appropriate limitations as well as authorization led to new corporate structures of the ICBC Financial organizations accomplishing to gain full commercial advantages. The economic opportunities, as well as financial aid towards several financial institutions, culminated into ICBC being the leading

Economic Development in South East Asia Term Paper

Economic Development in South East Asia - Term Paper Example Sweeping generalizations of the economic status of the Asian economy have blurred this indispensable perspective, especially for the South East Asia region. The purpose of this paper is to bring to the fore the real economic state of the South East Asian economy, cast against a crucial history, a vivid present, and an imminent future. Keywords: Foreign Direct Investment (FDI), Export Processing Zones (EPZs) TABLE OF CONTENTS TABLE OF CONTENTS 2 Economic Development in South East Asia 1. INTRODUCTION A. South East Asia’s Economic Landscape The South East Asian economy exhibits a distinct peculiarity. This marks out the theme of many economic researches on the region (Sundaram, 2002). Firstly, there is a need to dissociate South East Asia from the larger East Asian region economically. The emerging world economic powerhouses consisting of the Indo-China axis are not part of the South East Asia, as many people mistakenly assume. South East Asia adheres to an entirely different ec onomic environment, which calls for less generalized view of its economic identity. In regard to this special aspect, this paper seeks to present a definitive examination of the region’s economic climate. ... Globalized economic structures have far-reaching repercussions on the economic scene. Major changes in economic climates, even within apparently localized but powerful economic structures, show profound impacts in the global economic system (Sundaram, 2002). For instance, the East Asian economy has heavy impact on the state of the South East Asian economy. Research is necessary to highlight the possible correlation or causal relationship between the South East Asian economy and the larger world economy. Information of this nature will be indispensable to both local and international investors. In addition, the information will also help the local governance systems secure their positions more strategically to weather the adverse storms of global trade. Consequently, the economies can reap the immense benefits that modern globalized marketplaces offer. The purpose of this paper is to study the South East Asia economic climate and discuss the characteristic features, benefits, and disa dvantages the economic structure exhibits. A study of South East Asia economies needs to take into account the political and social background of each of the countries. The fresh perspective will be a welcome drift from the numerous misleading misconceptions suggesting that the economies of the region have sweeping commonalities. Recent studies reveal that the regions are characteristically distinct in the way they deal with issues of economic significance (Steven et al., 1997). Government policy, international strategy, and focus areas for the economic growth vary from country to country. This paper seeks to address the following: An astute understanding of the growth in the economies of the region and the structural changes

Thursday, October 17, 2019

Shear Testing in Made Ground Essay Example | Topics and Well Written Essays - 2500 words

Shear Testing in Made Ground - Essay Example guided by the quantitative risk assessment, backed up by understanding wider issues of projects, including civil and geotechnical engineering aspects. To assess risks properly, sufficient quality data is critical, so there is a need to carry out extensive sampling and analysis. The aim is to produce remediation strategies which will integrate with the overall engineering objectives. Regulatory bodies such as the Environment Agency and the local planning authorities has developed links with leading remediation contractors to ensure the viability of options in terms of cost-effectiveness and statutory requirements and environmental practices. Remediation involves physical, chemical and biological methods, including soil treatments. Contamination is defined as a coming into contact something so as to make it impure, unclean or corrupt. It emphasizes effect over cause and implies that some measure of decay or corruption has taken place. Contaminated site is defined as the site that poses considerable risk to the human health and the environment. The contaminated soil functions are endangered because of the impacting of contaminant level. In the local contamination assessment, there were problems that were found. The industrial activities landfills, mining sites radiation comprises the different problems of contamination. The extent are estimated 1.5 million contaminated sites from a preliminary surveys across Europe. Remediation would cost 2,000 million Euro per year all across Europe. Wide contamination extents from limited to strongly polluted; from small sites petrol stations, (petrol stations) to mega sites (thousand of hectares each). Our objective for prevention is to avoid deterioration of soil quality, l oss of soil functions and water resources degradation. One question is: does relevant legislation apply and protect the soil efficiently? Diffuse contamination is the application of acceptable input levels that is generally sufficient for remedial measures. A

International Human Rights Essay Example | Topics and Well Written Essays - 3750 words

International Human Rights - Essay Example rnments act in particular ways or to refrain from given acts, for the reason of protecting and promoting human rights and other fundamental freedoms of people (Buergenthal, 67). Non-discrimination principle is a broadly-based one in the international human rights law. The principle stands out to be so much vital in all the key human rights treaties thereby providing the central theme of a number of international human rights conventions for example, elimination of racial discrimination and discrimination against Women. With respect to all human rights and freedoms the principle of non-discriminatory eliminates discrimination of all aspects be it color, race or any other factor. The equality blends well with the principle of non-discriminatory since every individual is born free and equal to rights and dignity. All human rights are interdependent, interrelated and indivisible, whether the rights are political or civil, for example, the right to life, equality before the law, and freedom of expression; social, economic, and cultural rights, for example the right to housing, work and social security, or even collective rights, for example the rights to self-determination and development. Universality principle of human rights is the foundation of international human rights law. This principle has been reiterated in various international human rights declarations, resolutions, and conventions. For instance, Vienna World Conference of 1993 giving illustrations on human rights stated that it is the role of States to promote and protect all human rights and freedoms, despite of their cultural, political and economic systems. The expression of universality of the human rights is seen when states ratify the fundamental human rights treaties beyond all boundaries and civilizations Human rights are inalienable in that they should not be taken away from the individual they are duet to, except in specific circumstances and with respect to due process. The right to liberty,

Wednesday, October 16, 2019

Shear Testing in Made Ground Essay Example | Topics and Well Written Essays - 2500 words

Shear Testing in Made Ground - Essay Example guided by the quantitative risk assessment, backed up by understanding wider issues of projects, including civil and geotechnical engineering aspects. To assess risks properly, sufficient quality data is critical, so there is a need to carry out extensive sampling and analysis. The aim is to produce remediation strategies which will integrate with the overall engineering objectives. Regulatory bodies such as the Environment Agency and the local planning authorities has developed links with leading remediation contractors to ensure the viability of options in terms of cost-effectiveness and statutory requirements and environmental practices. Remediation involves physical, chemical and biological methods, including soil treatments. Contamination is defined as a coming into contact something so as to make it impure, unclean or corrupt. It emphasizes effect over cause and implies that some measure of decay or corruption has taken place. Contaminated site is defined as the site that poses considerable risk to the human health and the environment. The contaminated soil functions are endangered because of the impacting of contaminant level. In the local contamination assessment, there were problems that were found. The industrial activities landfills, mining sites radiation comprises the different problems of contamination. The extent are estimated 1.5 million contaminated sites from a preliminary surveys across Europe. Remediation would cost 2,000 million Euro per year all across Europe. Wide contamination extents from limited to strongly polluted; from small sites petrol stations, (petrol stations) to mega sites (thousand of hectares each). Our objective for prevention is to avoid deterioration of soil quality, l oss of soil functions and water resources degradation. One question is: does relevant legislation apply and protect the soil efficiently? Diffuse contamination is the application of acceptable input levels that is generally sufficient for remedial measures. A

Tuesday, October 15, 2019

Organisational models and country managers' role, Organisational Essay

Organisational models and country managers' role, Organisational challenge in multinational management, Case analysis- Organis - Essay Example This international organisation, World Vision International works for the development of children and people living in very poor conditions and are subjected to huge levels of deprivation and supreme injustice. World Vision International’s operation is based on a religious mission inspired by values brought about by the world Christian order. Though the organisation operates based on the Christian philosophy yet it showers equal benevolence to people belonging to diversified classes, sects, religious and ethnic groups around the world who have been struck by the domain of poverty (World Vision International, 2011). This international organisation came into being during 1950 with the work of Reverend Bob Pierce who dedicated his entire effort for the upbringing and care of destitute children dwelling in several corners around the globe. The work of World Vision International earned further impetus with the support from governmental and political bodies around the world in both rendering financial and infrastructural resources to help the concern achieve its end objective (World Vision International-a, 2011). The paper in this regard endeavours to study the effect of changes brought about in the organisation owing to the level of dynamism reflected in the global environment. It aims to reflect the positive and negative aspects of the changes brought about in the existing organisational policies by hinting on both its productivity and operational parameters. Organizational Change of World Vision International The organizational structure of the multinational enterprises can be studied along mainly four aspects. The four aspects show the different types of international companies operating across the globe. Firstly international companies like multinational corporations act based on a number of subsidiaries across several corners of the globe which are centrally managed by a centralised head quarter of the company. In the second case for international corpor ations the subsidiaries operating in several areas are controlled by the centralised units through sharing of knowledge and information. Thirdly in case of global corporations the subsidiaries are rendered a tight control through the monitoring activities of the global headquarters. Finally in the fourth case the transactional corporations exist wherein the subsidiaries do not act as independent bodies but rather as interdependent units. These firms share potential information with each other to help in the effective development of business in such areas (Kirchmer, 2008, p.130). The World Vision International organization working through several subsidiaries spread along different corners of the globe like those belonging to developing nations pertaining to Asia, Africa, Latin America and also of Middle East nations were centrally managed by its headquarter located in United States. The government of developed countries like that of Canada, Australia and New Zealand rendered both fi nancial support and also helped the subsidiary units to take effective decisions for development of the business activities. This situation however changed after the 1970 period when during 1976 the central operating body of World Vision decentralised its operational process by rendering authority to the several operating units acting in different regions. However still up to the 1978 period the members of the different units operating in the several regions though had gained

Sunday, October 13, 2019

A Critical Analysis Of Deterrence Theory Philosophy Essay

A Critical Analysis Of Deterrence Theory Philosophy Essay This paper will analyze literature related to theories of nuclear deterrence and will seek to examine (1) historical application, (2) scientific and logical validity, and (3) the relevance of deterrence theories for international relations. I hypothesize that while deterrence theory has been widely used and relied upon, particularly in the context of relationships between modern nuclear powers, there are serious scientific and logical concerns as to the true validity of deterrence theories. These include problems with (1) circular logic; (2) bias; (3) difficulty in isolating the independent variables; (4) validation and falsification; and (5) misapplication or misinterpretation in scenarios where disparity exists between levels of risk aversion among actors. HISTORICAL APPLICATION OF DETERRANCE THEORY In his chapter entitled The Anatomy of Deterrence, Bernard Brodie reflects on the romantic notion that peace can be achieved through a negotiated peace as a result of military action on the part of strong and decisive leaders. (Brodie, 266). However, he makes the argument that in an environment where nuclear weapons of mass destruction exist, such military actions could (and most likely would) lead to a level of military conflict that would prove cataclysmic to human civilization as we know it. Therefore, a different understanding and explanation of international relations is called for. In his writings, Brodie advocates the strategies of deterrence and limited war which would, in theory, lead to levels of power parity between nuclear parties on the international stage. Therefore, an emphasis is placed on creating a scenario whereby any actor with the technology, ability, and will to launch a first-strike offensive attack on another nuclear nation would be met with the sure and certain fact that the other nation would, without restraint, launch a full-scale second-strike attack, leading to the destruction of both nations and, most likely, a large portion of human civilization as we know it. The premise of deterrence theory, then, is similar to that of a grand-scale game of chicken whereby each party desires to convince the other that they will not back down from a straight-on attack and are willing to destroy the other party and themselves in the process. Building upon the realist and neo-realist assumptions of unitary state actors, rationality and/or bounded rationality, and the idea that balances in power lead to a lower probability of conflict, this theory calls for the one for one buildup of nuclear arms with any nation capable of launching a first-strike attack, in order to openly demonstrate a nations willingness and capability to launch a second-strike retaliatory action against any first-strike attack. While this theory would appear, on its face, to be a natural extension of neo-realism and its theories, it would also appear to differ in some of its logic. For instance, in this case, a nation is hedging its future on the belief that it can convince the other nuclear power(s) that it is willing to guarantee not only vast losses but also utter defeat (Brodie, 276) at its own expense, if necessary. So, unlike traditional neo-realism, the idea of deterrence doesnt simply rely on the underlying assumption that nations seek to maximize power, but also assumes that nations seek to defend themselves through a tit for tat approach to the buildup of power and capability that they actually hope never to use. ASSESSING THE VALIDITY OF THE DETERRENCE THEORY A major criticism of traditional deterrence theory must be that it seeks to openly convince another nation that it will do something it clearly would not rationally choose to do, that is destroy itself in order to counter an offensive attack from the other side. The logic in this theory becomes almost circular in its approach. A nation is assumed to build-up power in order to defend itself from another nation that is building up power in order to defend itself from the first nations buildup of power à ¢Ã¢â€š ¬Ã‚ ¦ and on it will go. So, it would appear through the logic of deterrence that there is actually an incentive to buildup power on both sides in a way that actually leads to their possible demise. This is best explained by way of the security dilemma which would say that as each side seeks to build-up its nuclear capabilities in response to the other, both sides actually increase the probability that a conflict will occur. When viewing the buildup of nuclear capabilities, this should be seen from the outside observer as an irrational act, yet each side, seeking to maximize its power and military capability, sees the buildup as a rational act. However, one must question not only the logic of this theory but also the entire premise that a theory such as this can attempt to explain a non-event. In other words, this theory really depends upon events not occurring in order to demonstrate its reliability. If something must not occur in order for a theory to be reliable, how can that theory be tested or falsified? As Jervis (P. 293) observes, explaining basic changes in the relationship between states is beyond the boundaries of the theory à ¢Ã¢â€š ¬Ã‚ ¦ thus diminishing its validity. In other words, we only can see something that didnt happen empirically, but we really dont know what might have happened if the scenario had been different; and, as we discussed in last weeks lecture, there most likely would be no one around to report the results of an actual event or falsified observation which would lead us to empirically say that the theory is invalid. Therefore, we must rely on assumption and generalization to say that deterr ence is the true reason that a nuclear confrontation between superpowers never occurred. In addition to examining the circular logic of deterrence theory, one must also consider the presence of intervening variables, which might spuriously impact the outcome of a diplomatic or international event. For instance, in the obvious example of the Cuban Missile Crisis, was it deterrence that led the Soviets to back down from their decision to implement strategic missiles in Cuba or was it a combination of diplomatic channels, internal domestic differences between decision makers, military strategic decisions, or just pure luck? One could argue that any one of these variables may have been the deciding factor in the end result of the conflict. In other words, we dont know exactly what effect deterrence had on the outcome because it would be difficult, if not impossible, to control for it and/or falsify the outcome. Another observation, made by Jervis (P. 297) is that deterrence theory is biased in favor of status-quo powers. In other words, the status-quo powers may have the desire and/or ability to coerce others to behave in a manner that favors the status quo power. Jervis and others argue that the game of chicken is not an appropriate explanation of nuclear deterrence in that it assumes that both cars are in motion at the start. However, if we assume that one car got a head start on the other, the other car is more apt to make a strategic mistake that can lead to devastating results. If the two powers are not equally risk averse, and if the power that is not satisfied with the status-quo is the party that is less risk averse, a higher probability of nuclear exchange would be the result. This scenario would critically harm the validity of deterrence theory. And, as was stated earlier, if the probability exists that deterrence theory is, in any way, possibly invalid, it would be illogical and possibly disastrous to depend upon it when making decisions in the international arena. The discussions contained within this paper lead to an even more important criticism. What exactly is rational behavior? It would appear, as in the criticism of circular logic, that the rational decision made by a unitary actor desiring to maximize power would most likely be seen from the outside as an irrational decision, as it has a high probability of harming the very nation that is attempting to preserve itself. Therefore, a serious criticism of traditional deterrence theory, as outlined by Jerves (P. 299), is that a well stated and objectively measured operational definition of rational behavior does not exist within the literature. Is it rational to make a decision that would lead to the demise of ones own civilization? Or is it more rational to assume that if a first strike is launched against a nation, and the nations destruction is inevitable, then actions that will lead to the destruction of the other civilization are the logical choice? In this case, rationality is relative to perceived risk and to the risk-aversive behavior of both parties. However, if either partys level of risk aversion is below some unpredictable point, the assumption of rationality becomes invalid, as would the entire theory. In defense of Jervis work in addressing long-term stability under the deterrence model, Kugler and Zagare (1990) attempt to extend the traditional model by combining it with the model of power transitions, and make the observation that parity between nuclear parties is not stable, but rather is a critical point where conflict and/or nuclear exchange can occur. Again, since no specific exchange of nuclear weapons has taken place under these circumstances to date, this theory is far from verified and is definitely not in a position that can be defended through experimentation or falsification. Therefore, one must criticize their work as broad-based assumptions made by applying the work of other authors within the field. However, it would seem logical, and somewhat practical to believe that there is some glimmer of truth in the arguments made within Kuglar and Zagares paper. Therefore, while their work is not at a position that could be called scientifically progressive under the standa rds established by Lakatos, it can also be said that their theories are not degenerative to the previous models as they do not alter the hard-core assumptions of unitary actors and rational decision making. Therefore, my criticism of this work is far less negative than my criticism of the traditional model of deterrence outlined by Brodie. An additional observation is that Kuglar and Zagares work adds to the second wave models described by Jerves in that it examines the phenomenon of risk aversive actors and uses game theory to further determine the possible probabilistic outcomes of confrontational scenarios. But, as with the other explanations, we must depend upon the probability of predicting a non-event (long-term stability measured by the absence of a nuclear exchange) versus a catastrophic event (nuclear exchange). Either way the model is un-testable and unverifiable. It is more of an explanation than a true scientific model or theory. Thus, we are relying on assumptions and generalizations. In the works of Signorino and Tarar (2006) and Zagre (1990), we again see the application of game theory as a way of empirically explaining and/or predicting the possible outcomes of nuclear buildups by examining risk and uncertainty on the part of defenders and attackers. Again, we can see that if the attacker is the party that is less risk-averse, the probability of war should, theoretically, increase, thus explaining that there is really no such thing as long-term stability when evaluating nuclear deterrence. While the application of probit analysis to the model does add an elegant mathematical presentation, it is still not a progressive model that can be verified experimentally or falsified scientifically, as the results of such experimentation would more than likely prove disastrous to the entire world. Therefore, the criticism of these models remains that they cannot be empirically analyzed in a way that would satisfy the requirements of even the loosest constraints placed by t he Lakatosian system of evaluation. While Signorino and Tarar (p. 592) claim that their model explains 96% of the attackers actions and over 93% of outcomes using an analysis of the POLITY III data set from 1800-1994, the problem still remains that they are trying to empirically predict a nuclear exchange using non-nuclear conflicts and therefore are not addressing some very important elements. For instance, they are not really analyzing the willingness of either party to truly use nuclear weapons in a first or second-strike position. And, given that the United States is the only nation to ever definitively make the decision to use a nuclear weapon in a conflict, we must also critically examine their application of democratic peace theory to the analysis of deterrence theory. Thus, even the most contemporary of the papers reviewed for this analysis do not truly bring us to a model of deterrence that can effectively be used to explain or predict the actions of nuclear parties. One additional criticism which must be cons idered is that none of the literature assigned for this class addresses non-state actors. Given our post 9-11 war on terror, it is vital that we examine our current geopolitical environment in future research. CONCLUSIONS A review of literature assigned for our study of deterrence theory and a critical analysis of their findings leads me to believe that, while deterrence theory has a logical basis for explanation, it lacks a level of scientific validity which would allow us to depend entirely on its hypotheses and hard core assumptions. Therefore, reliance upon this theory as the sole explanation for the behavior of nuclear states and for the buildup of nuclear weapons in response to the actions of other states is not scientifically supported. Other methods such as negotiation, arms limitations, treaties, and efforts to promote sustainable economic growth among nations are also required for any nation that wishes to contribute to long-term stability in the modern nuclear age.

Saturday, October 12, 2019

Whitman :: essays research papers

Very few people will contest that Walt Whitman may be one of the most important and influential writers in American literary history and conceivably the single most influential poet. However many have claimed that Whitman’s writing is so free form as evident in his 1855 Preface to Leaves of Grass and Song of Myself that it has no style. The poetic structures he employs are unconventional but reflect his very democratic ideals towards America. Although Whitman’s writing does not include a structure that can be easily outlined, masterfully his writing conforms itself to no style, other then its own universal and unrestricted technique. Even though Whitman’s work does not lend itself to the conventional form of poetry in the way his contemporaries such as Longfellow and Whittier do, it holds a deliberate structure, despite its sprawling style of free association.   Ã‚  Ã‚  Ã‚  Ã‚  When people say Whitman has no style, they are making a statement about his adherence to conventional standards of poetic form. Style, though, is something completely personal, not conventional. Whitman dared to go outside the conventional boundaries of poetic expression because he seldom followed the standards in rhyme, meter, and stanza form. However, hasn’t every great poet changed the rules governing the creation of great art in some way or another? Without a doubt they have, that defines them as great poets and gives them style. Whitman’s greatness lies in his divergence from the norm, his individuality, not his strict adherence to the arbitrary rules of his predecessors.   Ã‚  Ã‚  Ã‚  Ã‚  Whitman’s approach to poetry is a reflection of his thought. These thoughts are free and wild, and his typical run-on sentences and his endless litanies of people and places represent the thoughts trying to be conveyed. The overall effect of these run-on sentences provides the reader with a feeling of greatness and of freedom. All of the feelings that are evoked from Whitman’s style can be classified as quintessentially American democratic feelings. The belief that Whitman had no style would imply that Americans as a society have no style, a statement that not only Whitman but Emerson and Thoreau as well fought against through their writings. Whitman and Emerson fighting for the same cause is not coincidental, Whitman has often been viewed as the â€Å"child† of Emerson, his work being greatly influenced by Emerson. Whitman’s technique of looking at everything as a whole and always opposed to breaking up the whole can be linked to his b elief of unity within our country and the reason why he took the Civil War extremely hard and personal.

Friday, October 11, 2019

Alternative solutions for internet censorship in Australia Essay

This report was commissioned to elaborate other alternative methods that can be used to monitor internet information in Australia without incorporating internet filtration as the Australian government proposes. The future of Australian children has been compromised by the immoral vices that the use of the internet perpetuates. Moreover, organizations, customers and innovators have also suffered from this paradigm which advocates for phishing, on-line identity theft and piracy among others. Therefore, the report advocates for the use of technology, political power, moral ethics and civil libertarians. These methods are not liable to scrutiny and criticism as they do not impede the first amendment bill of the constitution which advocates for freedom of expression among other concerns explained in the report. Furthermore, the report evaluates this range of methods and concludes that it would be ideal to implement the technology method. Introduction Advancement in technology has increased the reliance of internet as a means of entertainment and education source. It has also encompassed the education curriculum, social, economic and political activities creating both a positive and a negative impact. We have been able to succeed and are actually grateful because most of the information and technological know how can be retrieved with ease. However, our children and business enterprises have been adversely affected by the increased internet sexual harassment, privacy invasion, cyber-bullying, on-line identity theft, piracy and phishing just to mention a few in the unending list. In the event our children have developed aggressive attitudes which advocates for delinquent behaviours. On the other hand children that have experienced internet sexual harassment and bullying among others become depressed and thus are cut out from social life and its benefits. This explains the increased rates of teenage suicidal attempts in Australia (Australian Government 2007). Therefore, the government has taken a further step in an attempt of curbing this predicament by introducing mandatory internet filtration to all internet services at home, in schools and public computers used by he Australian children. The government also plans to prepare the Australian children on strategies of being responsible cyber-citizens, protecting their identity while on-line, understanding the impact of their actions on others while using the internet, responding to cyber-bulling and invasion of their privacy among other negative internet vices. To achieve this the government plans to launch education curriculum that provides first rate cyber-safety education programs and educate parents on the negative vices prevailed by the internet thus ensuring their children use the internet responsibly. Furthermore, the government plans to use the blacklist formulated by the Australia Communications and Media Authority (ACMA) to ensure harmful information is not availed to the children, establish a Youth Advisory Group (YAG) to easily access information affecting children on-line and to do further research on cyber- safety issues in Australia among others (Australian Government 2007). This initiative has been met with mixed reactions as some citizens support the idea while others reject the move critically analysing it. Critics view the move as a lash to the development and welfare of the citizens in terms of internet use because internet censorship will reduce the speed of the internet, the initiative is not effective because people will still be able to access the prohibited information through the use of proxy services and web services just to mention a few. The initiative will also violate the first amendment bill which advocates for freedom of expression. The country will waste a huge sum of its capital through the implementation of this impractical solution because approximately USD 22billion of tax payers’ money will be used to implement this initiative. Furthermore, the criteria that will be used to determine the appropriate age to use the internet, the appropriateness of information on the internet and determining a comprehensive blacklist are in question. Therefore, to anal the dilemma the government is facing this report will elaborate on alternative methods of internet censorship other than internet filtration that can be used (Harvey 2009b). Alternative solutions To end the conflicts that have arisen because of the proposal of incorporating compulsory Internet Service provider (ISP) filtering in the country the government should implement other alternatives such as use of technology, political power, moral ethics and civil libertarian to implement internet censorship as outlined below. Technology The government can utilize the available technology to help implement their strategies on internet censorship rather than using internet filtration. It can establish websites that teach and warn adults and children on the dangers prevailed by the internet and how to avoid them. Alternatively it can take the initiative of funding such programs that have already being established. This method will be effective as the probability of people using the internet to access such information is high. The method is also cost effective as such initiatives have been implemented in other countries for example USA and proved to be efficient. Also the government will easily be able to avail on-line safety rules to the vicinity of children such as using passwords, meeting people met through the internet with the consent or accompaniment of parents and avoiding giving out personal information. For instance the Business Software Alliance (BSA) has enable to alert and educate e-tailers and customers on the dangers of internet such as auction site frauds, counterfeiting, identity theft and phishing among others and effective ways of preventing being victims of the above vices. BSA has established a website were they offer their learning and safe guarding tips by displaying stories from victims and tips of avoiding such incidents (Lindroth 2008). Moreover, programs that allow parents to personally regulate internet information availed to their children should be used. This will prevent the government from formulating legislations that violated constitutional rights such as freedom of speech and expression. It will also allow the development of this technology thus benefiting the country and improving the welfare of the population at large. For example US citizens have been able to enjoy the benefits of using glubble a Firefox browser plug-in that has enabled parents to create a safe browsing environment for their kids. The technology is easy to use, fast to install, helps parents to manipulate internet information at the vicinity of their children and enable their children to have the appropriate on-line experience. Furthermore, it does not limit internet information that is important to adults but harmful to children such as family planning tips. Therefore, the government should capitalize on such mechanisms by offering their support either politically or economically (Gary 2009). Political power The government is politically empowered thus has the power to control legislations and policies that regulate this country. Therefore, it should use this opportunity to formulate policies that will enable attainment of cyber-security without contradicting on legislations that had been previously formulated. For instance use of plug-ins and programs that will allow parents and public utilities where children are predominate users of the internet will increase intellectual property infringement therefore, legislations that will protect owners innovation should be stipulated allowing effective use of trade marks, patents and copyright laws among others thus expand the rights of these intellectual property holders. This will encourage innovators thus increase the variety of the advanced technology to consumers. Furthermore, it will increase the competitive nature of the economy of Australia both locally and in the world market. The government should also stipulate mechanisms that will take stern action against culprits who are caught perpetuating cyber-bulling, internet sexual harassment and stealing peoples’ identity. The government should also avail easy mechanisms for reporting vices that curb cyber-safety. This will serve as a warning to prospective culprits and thus decrease the number of such incidents. Also children will grow up morally as they will avoid practising such vices because this initiative will effectively tame them. Victims of such vices, parents, and children will willingly surrender information concerning such culprits to the relevant authority because of the assurance that effective action will be taken (Harvey 2009a). Moral ethics Most of the activities and information in the internet are morally wrong as they violate ethics and human norms. Therefore, another mechanism that can be used to increase cyber-safety is educating and guiding the population and children in particular on moral vices that can be adopted, thus enabling the adherence and respect of business, religious, social and moral ethics. For example more incidents of school children participating in social networking sites that perpetuate immoral behaviour such as pornography and prostitution are evident therefore, learning institutions should formulate policies that will effectively deal with school children that participate in such incidents and break school rules. Parents on the other hand should develop engaging relationships with their children to be able to further instil the moral principles that they learn and adopt from their school environment. Therefore, the school administration should work hand in hand with the government to clearly outline guidelines that will discipline students in regards to information availed and collected from the internet. The collation that will be formed will also help parents and the general Australian population to access such guidelines thus further perpetuate adherence to moral ethics and human norms (Madson 2005). It is quite evident that teachers nowadays use social networking sites for education purposes. Therefore, teachers should ensure that they effectively elaborate to their students how they intend to communicate to them and the necessary instructions that they should follow when logged into such sites to prevent them from accessing information that is not related to education and perpetuates immorality. Alternatively the school administration should establish websites which should be regularly monitored where teachers and students can communicate. Moreover, the learning institutions should implement educative programs that will educate the students on issues related to on-line- safety and the responsible ways of using Facebook and MySpace among others. Furthermore, policies that will effectively deal with students that perpetuate and practice cyber-bullying should be enacted. This responsibility should not only be left to the school administration and the government, other bodies such as religious institutions, public conferences and gatherings, activists and ethicist should also advocate for the adherence of moral ethics and human norms through the use of mechanisms such as safety conversation (McMahon 2008). Civil libertarian The government should also not ignore the role played by civil libertarians rather they should work hand in hand with them. This will further help them to ensure cyber-safety in Australia is emanated and thus protect the innocence and rights of children. This is because civil libertarians fight for the rights and respect of computer and network users by encouraging those involved to register with them thus regulates their activities. Therefore when formulating new legislations or changing those that already exists the government should engage such organizations thus the policies that will be formulated will be at the best interest of all stakeholders. For instance the Electronic Frontier Foundation in US provides legal assistance to companies or organizations that have out rightly been denied their constitutional rights by implementation of impractical legislations. In the event the organization promotes the US laws and allows efficient incorporation of advanced technology into the country. However, it indirectly regulates the information in the internet by offering legal support to organizations that avail useful information which is not harmful to the social being and economic welfare of the community and the country. Therefore, Australia should implement this example and follow suit as cyber-security will be enhanced while protecting and respecting the constitutional and human rights of its citizens (Swidorski 2003). Conclusion From the above facts it is quite clear that all the above principles should be implemented to effectively implement internet censorship. Each principle covers a specific area of enhancing cyber-safety in the country and among the citizens. The role that the government and politicians in general can play in the attempt of protecting Australian children from internet immoral vices without developing conflicts is outlined. However, the government also needs to work hand in hand with the school administration, teachers, parents and civil libertarians to efficiently enhance on-line security and educate Australian children on mechanisms of being responsible cyber-citizens. Also as we aim to be a world class country we will have to incorporate more sophisticated technology which is mainly attained from the reliance of the internet therefore, this subject should be researched regularly to enable formulation of policies that are relevant to the current technology in the country. In the event the country will be able to attain the technology without restrictions that may curb its development. Therefore, from my own opinion it is ideal for the government to implement the technology method which will go hand in hand with the development objective of the country because it will be cheaper to incorporate, it will be easier to regulate internet information at the disclosure of children while still gaining access to information that will help in improving the welfare of the community and country at large and human rights will not be violated as a result of internet censorship which I do not support. Word Count: 2189 List of references Australian Government (2007), Attitudes and behaviour of young people on-line, Research Summary. Available at [Accessed on 28th, May, 2009]. Gary, J. (2009), â€Å"Short range plug-ins work best in US,† Automotive Engineer, 34(3), p. 49. Harvey, S. (2009a), Australian internet censorship in practice, Available at [Accessed on 28th, May, 2009] Harvey, S. (2009b), Issues with re-establishing identity after natural disasters, Available at < http://www. pingudownunder. com/blog/index. php> [Accessed on 28th, May, 2009] Lindroth, L. (2008), â€Å"How to improve on-line safety,† Teaching Pre K-8, 28(7), p20. Madson, W. (2005), Internet censorship, Available at [Accessed on 28th, May, 2009] McMahon, F. (2008), â€Å"Smooth operator,† Digital Content Producer, 34(11), pp. 30-33. Swidorski, C. (2003), â€Å"Political science, the Labour Movement, and the struggle for freedom of expression,† New Political Science, 22(3), pp. 319-340.

Thursday, October 10, 2019

Blue Nile, Inc. Essay

Vision and Mission â€Å"Blue Nile’s vision is to educate its customer base so that customers can make an informed, confident decision no matter what event they are celebrating. It wants to make the entire diamond-buying process easy and hassle-free. In addition, an important part of Blue Nile’s vision as CEO Diane Irvine said in a recent webinar with Kaihan Krippendorf, is for the company to be seen as the â€Å"smart† way to buy diamonds, while saving 20%-40% more than one would in the typical jewelry store.† (Hoffman, 2010, p.1). Objectives The objective of the case study of Blue Nile is to evaluate and study their current business strategy. Internal and external analysis are used to identify the weak points or aspects of their current strategy. Other courses of action will be identified to improve the implementation of Blue Nile’s strategy. Alternatives will be recommended to increase the brand name for Blue Nile. External and Internal Analysis Porter’s Five Forces Model Rivalry among Competing Sellers. Rivalry among competing sellers is the strongest among the five sources of Porter’s Model. There are many competitors in today’s diamond market. This makes the rivalry between Blue Nile and its competitor’s high. There are small mom and pop shops, the larger retain stores like Tiffany and Co. and DeBeers. Blue Nile is faced with other online competitors like themselves as well as websites such as EBay and Amazon. The competition is extremely intense to gain customer base. With all the competition each company must be able to offer their customer something they cannot find with any of the others. Bargaining Power of Buyers. The Bargaining power of the buyer is high in the diamond purchasing world. The bargaining power for the buyer with Blue Nile is medium because customers are able to see the price of their desired purchase  and shop around to find a better price or deal. Switching cost for the customer is virtually none existen t because they can switch to another company if they do not like the price, customer service, or other things associated with their purchase. The benefit Blue Nile has over the bargaining power of the buyer is they have prices set below their competitors with the same great quality. Bargaining Power of Suppliers. There are only a limited number of suppliers for Blue Nile to choose from, making the bargaining power of the supplier high. Blue Nile must depend on their suppliers to deliver their products in a timely manner in order to provide timely delivery to their customers. Suppliers are able to dictate their prices to Blue Nile because of the limited amount of suppliers. Blue Nile cannot accept prices from one supplier that supplier can easily find another company to sell to. Threat of Substitute Products. There is a threat of substitute product for Blue Nile. The threat falls into the medium category because other substitutes do exist. Some substitutes are diamonique, cubic zirconia, or other artificially made diamonds. Some people will choose a substitute as they cannot afford to purchase and expensive diamond. Even though the quality is not the same as a real diamond many people still choose the substitute. Threats of New Entrants. There is an increase of new entrants as it is now easier than ever before to enter the diamond market. In the past the startup cost was extremely high making the entrance of new companies low. It is easier for new entrants today because the availability of the internet to reach customers. Also, the startup is low in online business. SWOT Analysis Blue Nile has a strong position in the market because they have continued to gain confidence with their consumer. Being the largest online dealer in the world helps them to maintain their position in the market. Unfortunately, Blue Nile is facing threats and weaknesses that can deteriorate their market position. The increasing competition from other companies as well as their weak brand recognition are a major cause for concern. Strengths Blue Nile is the leader in online jewelry making. They have a unique selling position as they were the first company to allow an individual to customize their diamond engagement ring. Customers are able to choose and design their own ring with options such as clarity, size and the shape of the diamond. Customers can also choose from many settings for their engagement ring. Customer service is a priority to Blue Nile. They offer their customers a personalized experience to build customer confidence. Many options are made available to their customers through their website. Customers can choose from toll-free calls, live-chat, or email as a means to contact customer service. Convenient billing and insurance options are other ways that Blue Nile strives to provide excellent service to their customers. Customers are offered a bill me later option as well as a 30-day money back guarantee. All orders are shipped to their customer fully insured to build customer confidence in Blue Nile. With as many as forty suppliers Blue Nile has the capability to maintain a unique supply chain model. They maintain strong relationships with their suppliers. Their diamonds are offered for direct sale from their cutters. This allows Blue Nile to purchase stones at a lower cost than the competition because they avoid the mark-up from third-parties. Their virtual online inventory permits them to have limited inventory on hand, therefore decreasing their carrying cost. Weaknesses Blue Nile does not have a physical store which takes away from the experience of touching and seeing the actual engagement ring that will be purchased. A diamond engagement ring is a large investment. When customers purchase a diamond online they are taking a risk at purchasing a diamond without being able to examine or actually touch their ring. This risk causes the purchase prices to be lower than those purchased in a physical store. Customers are more comfortable purchasing a more expensive ring from brand name stores like Tiffany and Co. Customers are also more confident in their online purchase with Tiffany and Co. because they have a physical store and the popularity of the Tiffany and Co. brand name. Although Blue Nile is continuing to grow and their business model appears to  be strong they still need to increase awareness of their brand name. The lack of brand awareness gives other competitors such as Tiffany and Co an advantage over Blue Nile. They need to create more ways to bring recognition to their brand name. Customers will not feel secure purchasing a large purchase from a brand they do not recognize. Increasing their brand name will give Blue Nile an increase in sales as well as increased customer confidence. Opportunities Sales for Blue Nile mostly focus on diamond engagement rings. Men are mostly the target for purchases of engagement rings. Blue Nile can increase their sales and their target market by branching out into other jewelry products. A broader product base can open up their target market to woman also. Branching out with a physical store front can also increase Blue Nile’s sales and brand recognition. Having a chain of physical stores will give those customers an opportunity to purchase from Blue Nile who otherwise would not purchase because of the risk of making this type of purchase online. Sales would increase because customers tend to spend more per purchase when visiting a physical store as it reduces the perceived risk of the customer. Globalization is a huge opportunity for Blue Nile. This would open up a vast amount of sales and will expand their brand name by offering their products internationally. The international market is an attractive opportunity for Blue Nile to broaden their customer base. Competitors such as Tiffany and Co have already tapped into the international market so for Blue Nile to remain competitive they must seek to globalize their business. Currently only thirteen percent of sales are from the international market. Threats The increasing cost of diamonds is having an impact on profitability for Blue Nile. They have a virtual inventory, meaning they purchase their diamonds at the current spot rate. When the price of diamonds is increasing this puts Blue Nile at a disadvantage because most competitors will have  purchased their diamonds at a much lower price because they have them in their current inventory. In order to keep prices competitive Blue Nile most likely will absorb the cost of the increase in the diamonds. Blue Nile’s main threat is the competition of other companies such as Tiffany and Co and DeBeers. Tiffany and Co. is the biggest threat to Blue Nile as they are famous for their diamond engagement rings, making their target market mostly men. The famous brand of Tiffany and Co makes it a very desirable choice for those men seeking to purchase an engagement ring. Many of Blue Nile’s competitors also offer many of the same benefits as a purchase from Blue Nile. Customer service, experts to assist in the purchase, and return policies offering customer satisfaction have become a norm among most competitors. Many other online jewelry companies are entering the market for online jewelry purchases. They should continue to monitor the new companies entering the market. The threat of new entrants is an area that they must continually be aware of because letting their guard down could cause them to lose market. Because of these threats, Blue Nile must continue to strive to rise above the competition. Problem Identification Given that Blue Nile has competitor’s that threaten to capture the customer base, what can Blue Nile do to capture additional customer base?  Given that Blue Nile needs to increase sales and tap into a different market, what can Blue Nile do to increase sales and brand awareness? Solutions To attract additional customer base Blue Nile should create additional products to attract the female customer base. Blue Nile should offer bracelets,necklaces, and other items that would broaden their customer base. As of now mostly younger men have the need to purchase an engagement ring. By offering additional products their customer base could grow to also include older men as well as females. Opening up their market to this additional customer base can increase their sales significantly. In order to increase sales and brand awareness Blue Nile should look at two solutions. The first is to open a chain of brick and mortar stores as  customers tend to enjoy the hands on experience of purchasing expensive jewelry from a physical store. Customers tend to spend more per purchase at a physical location. This would increase both sales and brand awareness. Expanding their merchandise line in other countries would also increase their customer base. Blue Nile should use their same strategy of providing diamond jewelry to the international markets. References Wheelen, T., Hunger, J., Hoffman, A., & Bamford, C. (2014). Blue Nile, Inc. Case Study 10. In Strategic Management and Business Policy (14th ed., pp. 10.1-10.16). Boston: Pearson.