Tuesday, December 31, 2019

Disasters Caused The World Since The Beginning - 1500 Words

Calamities have plagued the world since the beginning. The twentieth century, no exception. Millions lost their lives in World wars one and two, diseases spread like wild fire in foreign countries, and poverty was striking the world. Isolated events bearing striking similarities to these were in no short supply either. At this time, no event may have been worse than the sinking of the Titanic. The European designed and manufactured luxury ship boasted a length of 883 feet and was described, billed and sold as â€Å"The unsinkable ship†. This behemoth, massive ship weighed well over fifty thousand tons and dominated the Atlantic for her maiden voyage. The Titanic, like many other entities of the time, was not immune to calamity. Off the coast of the United States of America, the Titanic struck an iceberg and sank to the bottom of the ocean. Claiming over one thousand lives, the wreckage of the Titanic left few survivors. But, results of a new study indicate the Titanic may have a hidden secret, one that was not intended for the world to find out; a secret flaw that may have decided the fate of thousands in a minute. In the words of John F. Kennedy in the 1960’s regarding yet another calamity of the era, a day that will live in infamy. The world the passengers of the titanic knew was a world of difference compared to our own. Much of the world in Europe was seperated a single line, the line of poverty. The higher class were business owners and monopoly caretakers. While the poorShow MoreRelatedDisasters Caused By Natural Disasters1175 Words   |  5 Pages Disasters are a series of disruptions involving widespread human, material, economic or environmental losses and effects, which exceeds the capability of that affected community to cope up with its already present resources. Disasters have been happening ever since the beginning of time. Every disaster can be classified as either a human caused disaster which basically involves the negligence or irresponsibility of one single person or a group of people, or natural caused disasters. Natural disastersRead MoreHurricanes and Earthquakes1652 Words   |  7 Pagesnatural disasters in the United States. They can be very disastrous and deadly. In the United States, t here have been 73 hurricanes since 1954. Earthquakes are harder to detect because they have to have at least a magnitude of 5 (Earthquakes per year, 2009). The amount of earthquakes detected in the United States was 1656 in the past 10 years (Earthquakes per year, 2009). The World Meteorological Organization is the organization that can choose the names of hurricanes. At the beginning of theRead MoreInternational Committee Of The Red Cross1281 Words   |  6 Pageseither because of natural disasters or armed conflicts. Across the decades, this concept has been changing; it was never the same. At the beginning it was only focused on certain type of people, such as soldiers. Nowadays, humanitarianism embrace all people without discrimination of any type. Over time the world is experiencing new and stronger natural disasters due to climate change; moreover, wars and conflicts between nations continue to create catastrophes all around the world. If humanitarian organizationsRead MoreCi elo Caldelas. Mrs. Gallos. English Iii Honors. 6 April1598 Words   |  7 PagesHunger Many children in this world suffer everyday in very different ways. Suffering ways could be the loss of shelter or having a very chronic disease. â€Å"We could start with hunger and malnutrition, which kill 3.1 million children under the age of five every year† (McGowan 8). Hunger is considered one of those ways and also causes other suffering barriers. Hunger is the craving and want of food. At times hunger causes a person to become very weak. Hunger has caused many child deaths throughoutRead MoreMan s Relationship With Nature1438 Words   |  6 Pages Nature is a marvelous and fascinating topic studied by man for centries. Since the beginning of human civilization, man is in a constant battle against nature. Man tries and tries to cultivate the wild side of nature but fails. We know more about the moon then the bottom of the ocean. Humans don t depend on the environment, they take advantage and discard the effects, while nature sits and halts waiting to strike back. Throughout the progression of the human timeline, catastrophic events almostRead MoreChernobyl: One of the Greatest Accidents the World Would Learn From1714 Words   |  7 PagesThe world has seen numerous engineering disasters and from each one, has gained insight to better prepare for future calamities. However, it is very difficult to fully foresee how an accident might occur just by looking back to past disasters. In addition, it is even harder to prepare for something that hasn’t even happened before. The Chernobyl accident is a prime example of an event that couldn’t be fully prevented just by looking to past disasters or even predicting this exact accident. PsychologicalRead MoreA Narrative on Terrorism670 Words   |  3 PagesNarrative on terrorism There have been occurrences of some major natural disasters over the recent times, this have had great impact on families and lives of many people. The event that has had a great impact to me is the recent occurrence of the September 11 terrorist attacks. These events made headlines in media all over the world in newspapers as well as television got an in depth detail of the occurrence that had a great impact on me ,I failed to understand how terrorists could be so evilRead MoreThe Tragic Downfall Of Creon s Antigone 1260 Words   |  6 Pageslargely affects the plot’s actions. Creon manages to extend and enlarge the disaster by sentencing Antigone to death, rejecting Haemon’s wisdom, berating Tiresias’ prophecy, and ignoring the Leader’s advice. The motive for Creon’s change attributes primarily to the expediency of the decision to free Antigone and have Polynices buried, which may have influenced Haemon’s and Antigone’s actions. Creon initially extends the disaster of the plot by sentencing Antigone to death after he discovers her involvementRead MoreA Country Of Chaos : Haiti1635 Words   |  7 Pagesthey have a lot of natural disasters, they have a history of an unstable government, and they have a poor healthcare system. Since Haiti is located between tectonic plates, it is prone to natural disasters. Natural disasters have forced the country farther into poverty due to the cost of damages. A good example is the earthquake that hit Haiti in 2010. The earthquake caused billions of dollars’ worth of damages. Haiti was already a very poor country before the disaster, but the earthquake forcedRead MoreThe Effects Of Renewable Energy On The United States1550 Words   |  7 Pages Renewable Energy In the 1960’s and 1970’s a movement regarding the physical environment began, this movement focused on a few environmental issues and disasters caused directly or indirectly by pollution. As the years progressed, this movement grew into a multifaceted activist movement gaining more attention in the US, more often referred as â€Å"Environmentalism† or â€Å"Environmental Activism†. As the human race realized the physical environment is fragile and thus must be protected, scientists started

Monday, December 23, 2019

Child Needs For A Child s Life - 1344 Words

A child needs to grow in an environment where their physical, emotional, social and educational needs are met. Many parents are working full time and find it difficult to find a balance to give all the things a child requires in the period of age where they are exploring a lot of changes and need support to help them from being confused and feel lonely. Adolescence is the period between 11 to 19 years of age. This is the period when children start asking questions and are able to make possible judgments by thinking about the various outcomes. Adolescence is a bewildering stage of not only physical change, but emotional, social and educational as well. Children in this stage are starting middle school and continue until high school. A few†¦show more content†¦I tmakes them feel left out. Estrogen in girls stimulates the growth of breast tissues as early as age of 9. Some girls mature at an earlier age than others and they too feel uncomfortable growing up. Body image as an ad olescent is very important as kids try to meet new peers and make new life choices such as joining the school’s sports team, requires a good body image. Physical growth occurs rapidly in the adolescent years than any other after infancy and one of the main reasons is nutrition. P An average adolescent needs 2400-3200 calories depending on body mass index. Lack of nutrition can lead to eating disorders such as anorexia and bulimia which is more common in females than men. The ratio of anorexia is over 10 girls to 1 boy. Such disorders are common in women as it may help them cope with sexual fears. Jean Piaget’s stage of cognitive development suggests that adolescence is the stage of formal operations which is at the top level in Piaget’s theory. By this stage children have met their cognitive maturity, have increased ability to classify objects and ideas, they engage in logical thoughts and can use experiences to generate hypothesis. In the videos to study Piaget ’s formal operations, many children were asked the same questions – where would you place a third eye, if A was taller than B and B was taller than C then who is taller? Such question were asked to asked of children under 11 years and another set over 12 years of age. The

Sunday, December 15, 2019

DNA Profiling and Ethics Free Essays

string(119) " the use of genetic fingerprinting to determine whether two individuals have a biological parent–child relationship\." DNA Profiling and Ethics Reflection Journal Vanshika Khemka 14th October 2012 â€Å"33 autorad off† On 10th September 1984, geneticist Alec Jeffrey’s wrote these three words in his red desk diary. This marked the completion of an experiment, which studied how inherited illnesses pass through families. The experiment failed entirely. We will write a custom essay sample on DNA Profiling and Ethics or any similar topic only for you Order Now (McKie, 2009) However, this led to the most profound discovery: the world’s first DNA fingerprint. Now, the smallest swab of blood or sweat can determine the identity of an individual. We will discuss this process of DNA profiling in this journal. After going into the in-depth analysis of DNA profiling, we will discuss its uses and the ethical and legal issues that swarm the subject. |What is DNA Profiling? | Formally, DNA profiling is the analysis of short, highly specific, tandem-repeated- or hypervariable- genomic sequences, minisatellites known as variable number of tandem repeats (VNTRs), to detect the degree of relatedness to another sequence of oligonucleotides. Segan, 1992) It is a technique employed by  forensic scientists  to assist in the identification of individuals by their respective  DNA  profiles, which are encrypted sets of numbers that reflect a person’s DNA makeup and can also be used as the person’s identifier. |The Process | Deoxyribonucleic Acid (â€Å"DNA†) is a six-foot long molecule found in the nucleus of every cell in the body. With the exception of identical twins, each individual’s DNA is unique. Thus the first step in the profiling process is to obtain a sample of the individual’s DNA, which is usually done using a buccal swab (i. e. from the cheek). We could also use a sample of blood, semen or hair. This sample is then analyzed using different techniques; discussed below. |Techniques of DNA Profiling | |Restriction Fragment Length Polymorphism (RFLP) | It is a technique that exploits variations in homologous DNA sequences. It refers to a difference between samples of homologous DNA molecules that come from differing locations of restriction enzyme sites, and to a related laboratory technique by which these segments can be illustrated. In this process, the DNA is first chemically extracted from the sample. It is then fragmented using restriction enzymes. These enzymes act like scissors and cut the DNA where a specific sequence occurs. By gel electrophoresis, the DNA fragments are placed in a gel through which an electric current is passed. Owing to the negative charge of the DNA, the fragments migrate toward the positively charged pole of the gel. The DNA is then denatured and Southern blotting transfers the DNA fragments to a nylon membrane. A buffer solution is pulled through the gel and membrane and absorbed in paper towels. Hybridization, brought about by radioactive probe, shows only those fragments of interest from the polymorphic area of the DNA. Autoradiography is carried out next where the blot is placed in contact with a piece of x-ray film, where the radioactivity probe exposes the film and bands appear on the film where the probe has bound to the DNA. The results are then interpreted and in the case of a criminal investigation or civil case, it is matched against the suspect’s DNA profile, thus completing the process. (Hoeffel, 1990) This method is however very long-winded, cumbersome and the combination of all the above-mentioned steps could take about a month to complete. A large sample is required which makes it tougher. Hence other methods are adopted in recent times. |Polymerase Chain Reaction | With the invention of the polymerase chain reaction (PCR) technique, DNA profiling took huge strides forward in both discriminating power and the ability to recover information from very small (or degraded) starting samples. PCR greatly amplifies the amounts of a specific region of DNA. This process increases the number of copies of the allele, making enough DNA to allow the test to be performed on what may have originally been a DNA sample of insufficient molecular weight. Due to this technique the test can be conducted using a single hair strand. (Hoeffel, 1990) This process consists of a series of 20-40 repeated temperature changes, called cycles, with each cycle commonly consisting of 2-3 discrete temperature steps. The cycling is often preceded by a single temperature step (called  hold) at a high temperature (90 °C), and followed by one hold at the end for final product extension or brief storage. The temperatures used and the length of time they are applied in each cycle depend on a variety of parameters. These include the enzyme used for DNA synthesis, the concentration of divalent ions and dNTPs in the reaction, and the melting temperature (Tm) of the primers. The rest of the process is similar to the RFLP method. The major breakthrough is the fact that now the smallest trace of evidence can be used for DNA profiling as opposed to the large samples needed in the RFLP method. |Short Tandem Repeat Analysis | Also known as Microsatellites, short tandem repeats is used as an extension of the PCR Method. This method uses highly polymorphic regions that have short repeated sequences of DNA (the most common is 4 bases repeated, but there are other lengths in use, including 3 and 5 bases). (Hoeffel, 1990) Because unrelated people almost certainly have different numbers of repeat units, STRs can be used to discriminate between unrelated individuals. These STR  loci  (locations on a chromosome) are targeted with sequence-specific primers and amplified using  PCR. The DNA fragments that result are then separated and detected using  electrophoresis. |Amplified Fragment Length Polymorphism | This is another technique that is much faster than RFLP and uses PCR. It not only has higher reproducibility, resolution, and sensitivity at the whole genome level compared to other techniques, but it also has the capability to amplify between 50 and 100 fragments at one time. In addition, no prior sequence information is needed for amplification (Meudt Clarke 2007). As a result, AFLP has become extremely beneficial in the study of bacteria, fungi, and plants, where much is still unknown about the genomic makeup of various organisms. |Applications of DNA Profiling | DNA profiling is extensively used for paternity testing and forensic analysis for criminal investigations. Parental testing is the use of genetic fingerprinting to determine whether two individuals have a biological parent–child relationship. You read "DNA Profiling and Ethics" in category "Essay examples" Comparing the DNA sequence of an individual to that of another individual can show whether one of them was derived from the other. Specific sequences are usually looked at to see whether they were copied verbatim from one of the individual’s genome to the other. (Berry, 1991) As for forensic analysis, laboratories compare the molecular weights of fragments of DNA from the suspect sample and crime sample and decide whether the two fragments could have come from the same individual. There are major benefits from this technology: the potential to make speedy and robust suspected offender identi? ations through automated profile comparisons in centralized criminal justice databases; the ability to con? dently eliminate innocent suspects from investigations; the increased likelihood of generating reliable and persuasive evidence for use in court; a reduction in the cost of many investigations; the likely deterrent effect of DNA databasing on potential criminal offenders; and a poss ible increase in public con? dence in policing and in the wider judicial process. (Berry, 1991) We will explore the ramifications of this extensive use in the next section. Is it ethical? | Now that we know the widespread use of DNA profiling, we see the power that it has and the influence it can have when it comes to people’s lives and the verdict issued in criminal cases. But is this power justified on an ethical front? Is it ethical to give so much power into the hands of the people responsible for carrying out these tests? Indeed, the development and application of DNA pro? ling has been widely described as the â€Å"greatest breakthrough in forensic science since ? ngerprinting. † However, the spread of forensic DNA pro? ing and databasing has also prompted a wide range of concerns about problems that may arise from the storage of tissue samples (especially those taken from individuals without consent) and the proliferating uses of genetic information by the polic e. (Williams Johnson, 2006) One could say that DNA profiling violates basic ethical values. Based on the values of liberty, our rights are technically reduced by police powers, which have the right to take and retain fingerprints and DNA profiles and samples without consent. The Forensic Use of Bioinformation: Ethical Issues, 2007) â€Å"So act that you use humanity, whether in your own person or in the person of any other, always at the same time as an end, never merely as a means†; these words of wisdom imparted by Kant, also suggest that DNA profiling and the freedom to use that as evidence without explicit permission of the individual concerned would be using them as a means to an end and not an end in themselves. Therefore it can be argued that using DNA profiling takes away autonomy. The Forensic Use of Bioinformation: Ethical Issues, 2007) Spatial privacy is â€Å"a state of non-access to the individual’s physical or psychological self†. This is invaded by the nonconsensual taking of biological samples and fingerprints, and, to a lesser extent, by unwanted surveillance of the individual. And as can be inferred by the very nature of DNA profiling, informational privacy and anonymity is infringed upon by using samples obtained from databases and tests. (The Forensic Use of Bioinformation: Ethical Issues, 2007) Additional issues arise if identifiable samples or profiles on a forensic database are used for research outside the narrow context of identification and police investigations. Using DNA profiling for paternity testing and for determining one’s lineage can be very harmful as it violates the privacy of the people concerned. It could cause potential moral and mental harm to the parents and the children concerned as entire families can be uprooted as a result of this. Past criminal cases which used paternity testing also prove that relatives and families can be affected mentally as well as physically. People in witness protection programs as well as people on the police databases can be negatively affected if a previously unknown family link is reestablished without their knowledge and consent. (Haimes, 2006) The list of legal and ethical concerns is endless. The question the arises that which side wins? Benefits of DNA profiling, or the issues concerning DNA profiling? |Which side is stronger? | Having seen the costs and benefits of DNA profiling and its usage, the benefits are debatable on moral and ethical grounds. However, in my personal opinion, it does not have to be black and white; good or bad. There can be a grey area, a middle ground, where DNA profiling is neither entirely correct nor entirely wrong. There have been cases where DNA evidence has saved many innocent lives and incriminated people who had been causing immense harm to others. Thus, we should pass legislations, which aim at curbing violations and encouraging true and just practices. In the cases where the DNA of individuals is being used as evidence or if parental testing is being done, their should be informed consent by the individuals. They should be aware of the sensitive nature of the information and should be expressly asked for consent to have the data published or used as evidence. The National DNA Database set up in the UK is an example of the dangers and benefits DNA profiling can hold. Personally, a national DNA database in all countries would be a very risky venture as a lot of personal information would be at stake and inter country rivalries could result. We have established the power of DNA profiling and the power that people who have access to this information have. So I would like to end with a quote. One’s interpretation of this quote can determine where they stand on the matter. â€Å"It is time for you to gather some idea of what power means. The first thing you must realize is that power is collective. The individual has power in so far as he ceases to be an individual†¦ The second thing for you to realize is that power is power over human beings. Over the body- but, above all, over the mind. Power over matter- external reality, as you would call it- is not important. Already our control over matter is absolute. † – George Orwell, Nineteen Eighty-Four Bibliography | Berry, D. A. (1991). Inferences Using DNA Profiling in Forensic Identification and Paternity Cases. Statistical Science , 6 (2), pp. 175-205. Haimes, E. (2006, June 1). Social and Ethical Issues in the Use of Familial Searching in Forensic Investigations: Insight from Family and Kinship Studies. Journal of Law, Medicine and Ethics , 263-276. Hoeffel, J. C. (1990, January). The Dar Side of DNA Profiling: Unreliable Scientific Evidence Meets the Criminal Defendant. Stanford Law Review , 42 (2), pp. 465-538. McKie, R. (2009, May 24). Eureka moment that led to the discovery of DNA fingerprinting. Retrieved October 10, 2012, from The Guardian: http://www. guardian. co. uk/science/2009/may/24/dna-fingerprinting-alec-jeffreys Segan, C. J. (1992, February 15). DNA Profiling. The Dictionary of Modern Medicine . The Forensic Use of Bioinformation: Ethical Issues. (2007, September). NuField Council on Bioethics . Williams, R. , Johnson, P. (2006, June 1). Inclusiveness, Effectiveness and Intrusiveness: Issues in the Developing Uses of DNA Pro? ling in Support of Criminal Investigations. Journal of Law, Medicine and Ethics , 234-247. Wikipedia How to cite DNA Profiling and Ethics, Essay examples

Saturday, December 7, 2019

Food, Inc., By Eric Schlosser Essay Example For Students

Food, Inc., By Eric Schlosser Essay Over the past 50 years, there has been a major change in the food production industry. Unlike many years ago when people used to get their food right from the farm; fresh and purely organic, nowadays most people in America rely on processed industrial food, but do these consumers know the truth behind the processed food? In the movie documentary titled Food, Inc., which was directed by renowned director Robert Kenner, author Eric Schlosser explores the facts and secrets behind the food industry. This paper will review the video documentary by giving a brief summary of the movie; a five point discussion on the important issues it raises; a personal evaluation of the movie and lastly examples on how I can apply its ideas in my lifestyle. Like no other ordinary documentary, Food, Inc. explores the reality behind one of the most controversial part of the human lifestyle; food. The movie starts with the author, Eric Schlosser showing some of the more than 47,000 food brands in a regular supermarket. It’s here that it is revealed that food production has changed from years ago when food was acquired from privately owned farms growing fresh produce, whereas in the current market, food is processed in industries (Food, Inc., 2008). In fact, it is revealed in the film that the American food industry is dominated by five giant corporations, who control about eighty percent of the whole industry. Among other issues, the movie talks on how fruits and vegetables are now laced with chemicals, the resulting economic impact, the health impact on consumers, and the role of the government in supervising the food industry. In order to illustrate the facts in an exceptional way, the author discusses a number of key issues. For one, the movie expos. .th from the general public. Moreover, the movie uses clear examples to illustrate and convey its message on various key issues despite the presence of some disgusting scenes such as the clip of a messy slaughterhouse (Food, Inc., 2008). Overall, the documentary explores a sensitive part of many people’s lifestyles. It gives people an exceptional form of insight on the health risks associated with the much hyped industrial food products. Like many other people, the information from the movie will facilitate a change in my eating habits; further causing me to buy and consume organic foods. By choosing products with less synthetic ingredients, there’s less mystery in what gets ingested. This is because whereas industrial foods are less expensive and readily available with many quantities, the health risks associated with them in the long-term are permanent and harmful.

Friday, November 29, 2019

Sphinx Essay Research Paper BullheadedDuring this great free essay sample

Sphinx Essay, Research Paper Bull-headed During this great age of information and transit, in a universe traveling so fast that our contemplations are nil salvage a fuzz on the cosmic mirror, who has the clip logically challenge the dating of ancient memorial. Egyptologists have done the research and concluded that the memorials located in the Giza tableland can be attributed to the 4th dynasty ( 2900-2750 BC ) . Why should we blow our limited clip reinvestigating what appears to be a closed instance? Egyptologists have conclude that the constructions located at the Giza tableland can be attributed to forth dynasty Pharaoh Khufu ( big pyramid ) , Menkaure ( little pyramid ) , and latter Khafre ( sphinx and medium pyramid. ) The rock quarried to construct these buildings were brought from as far off as Tura ( casing rocks ) which is located five stat mis east, Aswan ( granite ) , and the bulk of the rock used was from the tableland itself. Egyptologists say that a bulk of the rock taken from the tableland for Khufu s pyramid originated around the current site of the Sphinx. We will write a custom essay sample on Sphinx Essay Research Paper BullheadedDuring this great or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page The pyramids entombed their several Pharaoh organic structures, yet the sphinx and its next edifices have no evident intent. These memorials have changed in visual aspect since building, the pyramids holding lost their extremely polished casing s ( pilfered by Arabs after thirteenth century temblor ) , and both the pyramids and sphinx have sustained significant conditions harm. The conditions eroding nevertheless is non consistent in all constructions ; the pyramids have horizontal weathering as a consequence of drawn-out exposure to strong air currents and dust storms, while the sphinx and its next constructions have both horizontal and perpendicular harm. What could do both horizontal and perpendicular weathering? Egyptologists attribute the uneven weathering to come up groundwater motion, chemical weathering, and exfoliation. The Giza tableland has a southeasterly contour, with the Sphinx busying a place at the low prevarication, easterly border of the tableland. A figure of Egyptologists suggest that Sphinx was carved from a block left over from the quarrying undertaken by Khufu, therefore the south-easterly dip in terrain. Topographical research has proven this claim false, showing grounds that the topography of the Giza tableland was a consequence of natural procedure. The Giza country was inundated by a rush of the Mediterranean Sea during the Pliocene epoch ( 2 to 7 million old ages ago ) , ensuing in the tableland and the North and due east facing drops that surround it. Although waterless conditions have dominated most of the dynastic period of Egyptian history, wetter periods are known to hold existed, with current waterless conditions non to the full established until the terminal of the 5th dynasty. During the passage period nevertheless, waterless conditions were interrupted by seasonal rain. G ive the small flora or sub-soil screen, sporadic heavy rainfall would rapidly saturate the tableland, seeing how under the sand is stone. The H2O would flux down the sloping topography E and hit the Sphinx on the western side doing eroding. Although both western and eastern exposures of the Sphinx are the same age, eroding on the West is significantly more sever. As both archeological and climate indicate, Giza was capable to rain and rain run-off during the Forth and portion of the 5th dynasty. So this fact entirely does non, in itself, necessitate a alteration of the Sphinx s birthday. Located to the West ( acclivitous ) of the Sphinx an archeological digging revealed a 480-foot long ( twice every bit long as Sphinx ) prey filled by windblown sand. Upon entire digging, quarry letterings were found imputing it to Khufu. This big hole consisted of extremely permeable unconsolid ated sand that would hold certainly intercepted all the run-off H2O from its West, that would hold antecedently raced towards the Sphinx. This, nevertheless, lies in contradiction to the Sphinx s terrible H2O eroding on the western side. I feel this means that the building of the Sphinx pre-dates Khufu s quarrying, and subsequent pyramid. I do, nevertheless, feel that the 4th dynasty played a partial manus in the present visual aspect of the Sphinx. Khufu s replacement Djedfe, was the first Pharaoh to integrate the name Re into royal rubric. Djedfe taught that Pharaoh were populating illustrations of Gods, peculiarly Re, the Sun God. This instruction is maintained throughout all of the undermentioned dynasties. Surely by the clip Khafre, the tenet of the Pharaoh as the earthly manifestation of the Sun God had developed farther. To strengthen his correlativity with Re, he commissioned Masons and sculpturers transform the king of beasts caput to that of his ain similitude. This theory has given the recognition of the Sphinx to Khafre, and surely explains why the caput is proportionately much smaller in relation to the organic structure and significantly more preserved. Egyptologist refute that the caput was re-carved by Khafre, but concede that the caput was re-sculpted at some point in its being to resemble a Pharaoh. One such Egyptologist is Ahmed Fayed who believes that the well-known Tutankhamen ordered the face lift. If the builders where non ancient Egyptians, than who built it, and what was its intent. A cosmopolitan lingua that transcends all cultural and linguistics boundaries is the stars, or uranology and star divination. The emanation of the equinox tells us that the universe, in relation to us, invariably alterations in a expansive rhythm of 26,000 old ages. Why did these cryptic builders carve a king of beasts in the terrain confronting east? Astrologers have noted that the age of Leo began at 10,500 BC, and uranologists have calculated that a coinciding heavenly event would besides go on that twelvemonth. At morning before dawn on the twenty-four hours of the spring ( youthful ) equinox, the age of Leo would be ushered in by the heavenly king of beasts resting due east merely above the skyline, in perfect alliance with the Sphinx. Egyptologist confronted with these facts brush them off as coincidental and irrelevant, seeing as they believe the Sphinx was constructed in the Fourth dynast y. Pharaohs who build memorials expected and received congratulations for their creative activities. To continue their reign and remind people of the hereafter merely how power-full and almighty they were they adorned practically every inch of their creative activities with hieroglyphics. These hieroglyphics are found throughout all of the dynasties and on the 100s of pyramids and constructions found in Egypt, except for one. Throughout the Sphinx and its next temples non a individual in lettering, carving, or any other hieroglyphics identified Khafre, our anyone else for that affair as the Godhead. Egyptologist # 8217 ; s, true have no account for this phenomena. I feel that the field of Egyptology has a fatal defect. When confronted with grounds that does non neatly fit into their pre-conceived constructs or tenet of history, they attempt to de-bunk it. The alternate to disregarding grounds, is the prostration of a bulk of theories that they, and infinite others before them, have regarded as sacred truth. I feel that this pattern slaughters the virtuousness of objectiveness in the name of heritage and tenet. To accept the grounds above would in fact repositing this major memorial off from the Egyptian people and confer it upon a cryptic and ancient civilization. Egyptologist claim there is no grounds of this ancient civilization ; to them I present exhibit 1, the Sphinx. . 314

Monday, November 25, 2019

Business Networks Homework Assignment

Business Networks Homework Assignment Free Online Research Papers 1. A key problem when designing data communications networks is how to adapt to new technologies while organizations change. [True; p. 336] Easy 2. A traditional network design approach follows a structured systems analysis and design process similar to that used in building applications. [True; p. 336] Easy 3. The traditional network design approach works very well for rapidly changing networks. [False, it is best for static or slowly evolving networks; p. 336] Easy 4. Today, most network designers use a three-year planning horizon. [True; p. 337] Easy 5. Today, the most expensive part of the network is the hardware. [False, it is the staff who design, operate, and maintain it; p. 337] Easy 6. Today, many organizations design networks using the building-block approach. [True; p. 337] Easy 7. Needs analysis is the final step in the building block approach to network design. [False, it is the first step; p. 339] Moderate 8. In technology design, a network designer looks at available technologies to see which options will satisfy users’ needs. [True; p. 339] Easy 9. Cost assessment is used to look at the relative cost of technologies used in a network design. [True; p. 339] Easy 10. The goals in the needs analysis step of network design are exactly the same when designing LANs vs. when designing WANs. [False, they are slightly different; p. 340] Easy 11. The step of understanding current traffic on a network provides a baseline against which future network requirements can be compared. [True; p. 341] Easy 12. The goal of the needs analysis step in network design is to develop a physical network design. [False, a logical network design is produced; p. 341] Easy 13. The technology that is closest to a user in a network design is the core layer. [False, it is the access layer; p. 341] Easy 14. The core layer of the network is usually the busiest. [True; p. 341] Easy 15. Today, all network traffic is due to traffic from internal application systems. [False, use of the Internet accounts for a significant portion of network traffic; p. 343] Easy 16. Desirable requirements are those that have the highest priority. [False, they come after mandatory requirements in terms of priority; p. 344] Moderate 17. Capacity planning is used to design circuit capacity. [True; p. 346] Easy 18. The turnpike effect results when a network is used at a much lower rate than was anticipated when it was designed. [False, it results from higher use; p. 346] Moderate 19. Simulation is a tool that can be used in designing networks. [True; p. 347] 20. Cost assessment is the step in the network design in which user requirements are documented. [False, this step is used to understand the costs of various network alternatives produced from the Technology Design stage; p. 349] Moderate 21. When obtaining the support of senior management for a proposed network, it is important to use as much technical network jargon as possible. [False, it is important to speak to senior management in language they understand and can relate to; p. 350-351] Easy MULTIPLE CHOICE The following are possible multiple-choice questions for tests. The question is posed and the answer is provided under the choices. The level of difficulty (easy, moderate, or difficult) and the page(s) relevant to the topic are also furnished. 1. Which of the following is not a step under the traditional network design approach? a. An analyst develops cost estimates of the circuits needed to support the network. b. An analyst takes the traffic on the current network and then multiplies that by a factor of 3.65 to come up with the estimate of the total traffic for the new network. c. An analyst meets with users to identify user needs. d. An analyst develops a precise estimate of the amount of data that users will send and receive to estimate the total amount of traffic on each part of the network. e. An analyst designs the circuits to support the estimated traffic, allowing for modest growth. Answer: b, Moderate, p. 336-338 2. The traditional network design approach does not work well for _________ networks. a. slowly evolving b. rapidly growing c. static d. modestly growing e. not growing Answer: b, Easy, p. 336 3. Which of the following is not making the traditional design approach less appropriate for today’s networks? a. The underlying technology of networking devices is changing very rapidly b. The underlying technology of client and server devices is changing very rapidly c. The underlying technology of circuits is changing very rapidly d. Growth in network traffic is very high e. The most expensive part of any network is the hardware Answer: e, Moderate, p. 336-338 4. Which of the following is not contributing to the dramatic increase in network traffic today? a. Video applications on networks are becoming common. b. Electronic mail is now used by most people who work in organizations. c. Web searches are now commonly performed by network users. d. Most client computers today have 4 meg of RAM, a 40 meg hard drive, and an 8Mhz386 processor. e. Multimedia applications on networks are becoming common. Answer: d, Easy, p. 336-338 5. Which of the following is not true about an overlay network? a. It is a way that interexchange networks are trying to keep up with demand. b. It co-exists with primary voice networks. c. It supports separate services such as Internet traffic for an interexchange network. d. It was part of the traditional planning for interexchange networks to handle voice, data, and video on the same circuits. e. It is designed to handle ‘special’ traffic such as WAN traffic for an interexchange network. Answer: d, Moderate, p. 337 6. Which of the following is false about staff costs for a network? a. The most expensive part of the network today is the staff who design, operate, and maintain it b. The emphasis is on network designs that reduce staff time needed to operate them c. Network staff are often required to learn to operate a variety of devices d. Network staff are often required to maintain a variety of devices e. When a variety of devices are used in a network, it takes less time to perform network management activities Answer: e, Moderate, p. 337 7. The building block design approach is sometimes called: a. wide and shallow b. narrow and deep c. wide and deep d. narrow and shallow e. narrow and flat Answer: b, Easy, p. 338 8. Nowadays, most organizations use a simpler approach to network design called the ___________ approach. a. building-block b. frame definition c. prototype d. systems development life cycle e. guided network Answer: a, Easy, p. 338 9. Which of the following is not a step that is used in newer type of network design process? a. cost assessment b. technology design c. implementation d. needs analysis e. none of the above is a correct answer Answer: c, Easy; p. 339 10. In __________, the network designer attempts to understand the fundamental current and future network needs of the various users, departments, and applications. a. technology design b. needs analysis c. narrow and deep analysis d. cost assessment e. distribution layering Answer: b, Easy, p. 339 11. In __________, the network designer examines the available technologies and assesses which options will meet the users’ needs. a. technology design b. needs analysis c. narrow and deep analysis d. cost assessment e. distribution layering Answer: a, Easy, p. 339 12. In __________, the network designer considers the relative cost of the technologies. a. technology design b. needs analysis c. narrow and deep analysis d. cost assessment e. distribution layering Answer: d, Easy, p. 339 13. Which of the following is not true about network design? a. In designing LAN networks, network designers tend to err on the side of building too big a network b. In designing BN networks, network designers tend to err on the side of building too big a network c. In designing WAN networks, network designers tend to err on the side of building too small a network d. In designing LAN networks, network designers tend to err on the side of building too small a network e. In designing MAN networks, network designers tend to err on the side of building too small a network Answer: d, Moderate, p. 340-341 14. In needs analysis: a. a great deal of the work has probably never been done b. the goal is to understand what users and applications the network will support c. the geographic scope is not an important consideration d. a baseline of current operations is not important e. the rate of growth of network traffic is not an issue Answer: b, Easy, p. 341 15. Gaining an understanding of the current application system and messages provides a _________ against which future design requirements can be gauged. a. backplane b. baseline c. turnpike document d. wish list e. RFP Answer: b, Easy, p. 341 16. The goal of the needs analysis step is to produce a ___________, or a statement of the network elements necessary to meet the needs of the organization. a. building block b. access layer c. core layer d. cost assessment e. logical network design Answer: e, Easy, p. 341 17. Which of the following is not a conceptual part, or layer, of the geographic scope of the network? a. core layer b. application layer c. access layer d. distribution layer e. the layer that connects the different distribution layers to each other Answer: b, Moderate, p. 341-342 18. Which of the following is not a basic level of the geographic scope of the network? a. local area network b. focused area network c. backbone network d. metropolitan area network e. wide area network Answer: b, Moderate; p. 341-342 19. Which of the following would not be collected by a designer, working in the needs analysis phase, who was documenting general information and characteristics of the environment in which the network must operate? a. local laws that could affect the network b. international laws that could affect the network c. federal laws that could affect the network d. building codes that could affect the network e. traffic laws that could affect the network Answer: e, Moderate, p. 342 20. __________ is not an important consideration when network designers review old and new applications. a. Reviewing the NFL scores b. Reviewing the organization’s possible changes in product mix c. Understanding the organization’s strategic plans d. Understanding development plans for new uses of electronic commerce e. Reviewing the organization’s projections of sales Answer: a, Easy; p. 342-343 21. Which of the following is not an example of identifying protocols that are needed to support hardware and software requirements of applications that will use the network? a. an application will use HTTP over TCP/IP b. an application will run on an IBM mainframe and so the network will require SNA traffic c. an application will need a gateway to translate SNA traffic into TCP/IP protocols d. an application will use SPX/IPX with a Novell file server e. an application will have drop down menu choices Answer: e, Easy, p. 342-343 22. Which of the following is not a way in which network requirements, identified in the needs analysis of the network design process, are organized? a. non-necessary requirements b. wish list requirements c. desirable requirements d. mandatory requirements e. none of the above is an appropriate answer Answer: a, Easy; p. 344 23. Which of the following is not included in the key deliverable for the needs assessment stage, the set of logical network diagrams? a. applications of the proposed network b. servers in the proposed network c. circuits in the proposed network d. specific routers that have been chosen to implement the proposed network e. clients in the proposed network Answer: d, Moderate, p. 344 24. Which of the following is not an example of a building block used in technology design? a. typical application b. typical user c. high traffic application d. standard network circuit e. specifications for a particular lighting fixture in the network operating center Answer: e, Easy, p. 346 25. Once the needs have been defined in the logical network design, the next step is to develop a(n) __________. a. application b. baseline c. physical network design d. turnpike design e. backplane design Answer: c, Easy, p. 348 26. Which of the following would not be a type of protocol that needs to be considered in technology design? a. Ethernet b. 10 Mbps c. TCP/IP d. ATM e. SNA Answer: b, Easy, p. 346 27. Estimating the size and type of the â€Å"standard† and â€Å"advanced† network circuits is called _________. a. needs categorization b. turnpike design c. cost assessment d. capacity planning e. soliciting RFPs Answer: d, Easy, p. 346 28. Which of the following would not be a type of circuit capacity that needs to be considered in technology design? a. 1000 Mbps b. Ethernet c. 10 Mbps d. 100 Mbps e. 1 Gbps Answer: b, Easy, p. 346 29. In the technology design stage of network design, a. the fundamental technology/protocols to be chosen have no relationship with the circuit capacity b. the decision for fundamental technology/protocols can be made without considering circuit capacity c. the decision for circuit capacity can be made without considering fundamental technology/protocols d. the decisions for fundamental technology/protocols and circuit capacity are interrelated e. the decision for fundamental technology/protocols and/or circuit capacities is not made at this stage Answer: d, Moderate, p. 346-348 30. ___________ refers to the amount of data transmitted on a circuit. a. Circuit loading b. Leading edge deployment c. Capacity planning d. Calculating message volumes e. Requirements documentation Answer: a, Easy, p. 346 31. __________ is an estimate of the highest data volume on a link. a. Data mode b. Backplane load c. Peak circuit traffic d. Leading edge data flow e. Circuit transfer Answer: c, Easy, p. 346 32. To establish circuit loading, the designer usually starts with the: a. total characters transmitted per day on each circuit, or, if possible, the number of characters transmitted per two-second intervals if peaks must be met b. individual user training c. bus diameter, disk cache that is used at the server station d. channel bandwidth and baud rate used at each client e. local, trunk, IXC, DDD, and leased-line circuit bandwidth for each node Answer: a, Moderate, p. 346 33. According to one rule of thumb, ______ percent of circuit loading information is easy to gather. a. 50 b. 25 c. 80 d. 19 e. 20 Answer: c, Easy, p. 346 34. A _________ results when a network is used to a greater extent than was originally anticipated by the network designer. a. leading edge data flow b. circuit load c. turnpike effect d. protocol volume e. capacity plan Answer: c, Moderate; p. 346 35. There are some network modeling tools that can ________ the existing network. a. discover b. disassemble c. sensitize d. maintain e. implement Answer: a, Moderate, p. 347 36. ________ is used to model the behavior of the planned communication network once the proposed network map is complete. a. Implementation b. Post-implementation review c. Documentation d. Simulation e. Training users Answer: d, Moderate; p. 347 37. Which of the following are not costs that are generally considered during the cost assessment stage of the network design process? a. cost of advertising brochures for new products to be offered by an organization b. internetworking devices cost c. network management costs d. circuit costs e. software costs for network operating system Answer: a, Moderate; p. 349 38. Which of the following is not a main item for which network designers estimate costs for the proposed network? a. software b. hardware c. purchasing and installing circuits d. ergonomic chairs for users e. circuits provided by common carriers Answer: d, Easy, p. 349 39. To estimate costs for large network purchases, organizations often: a. purchase all network purchases ‘off the shelf’ b. obtain ‘book value’ information for the existing network from the accounting department c. ask other users what they paid for their network bought in the past d. multiply old network costs by a factor of 3 e. issue an RFP to vendors Answer: e, Moderate, p. 349 40. RFP stands for: a. Request for Proposal b. Ring Fault Path c. Routing File Protocol d. Record Facsimile Program e. Redundant File Protocol Answer: a, Easy; p. 349 41. Estimating the cost of a network is ______ complex than estimating the cost of one new piece of data processing hardware. a. much more b. much less c. about the same d. exactly the same e. a little more Answer: a, Easy; p. 349 42. Which of the following is a way to sell the network proposal to management? a. talk about upgrades from 10Mbps to 100Mbps b. give many details about using routers vs. gateways for a particular connection c. concentrate on a discussion about token ring vs. Ethernet protocol d. focus on network reliability e. discuss SNA architecture Answer: d, Easy, p. 350-351 43. Which of the following is not a key deliverable for the cost assessment step? a. RFP b. list of wish list requirements c. revised physical network diagram d. business case, defined in business objectives and business language, that supports the network design e. none of the above is an appropriate choice Answer: b, Easy; p. 351 44. The physical network diagram is done: a. before the vendors are selected b. before the RFP is sent out c. after the RFP is sent out, but before the vendors are selected d. after the vendors are selected e. after the network has been implemented Answer: d, Easy, p. 351 Short Answer Questions 1. What is a RFP and why do companies use them? Answer: A request for proposal is a way that organizations can get vendors to provide their best prices for specific equipment, software, and/or services. These products and/or services often cannot be purchased â€Å"off the shelf†, so organizations cannot go to a retail store to comparison shop. By permitting vendors to compete, organizations can find out the cost of products and services for which pricing is not readily available. Once all vendors have submitted their proposals, the organization evaluates them against predetermined criteria and selects the winner(s). 2. What is a network baseline and when is it established? Answer: A network baseline is part of the needs analysis. At this step, it is important to gain an understanding of the current operations (applications and messages). Future design requirements can be compared to this baseline. The designers must review the list of applications that will use the network and identify the location of each. 3. Why is it important to analyze needs in terms of both applications and users? Answer: In the past, application systems accounted for the majority of network traffic. Today, much network traffic is produced by the discretionary use of the Internet by users. In order to understand how a network will grow and change, network designers need to assess the number and type of users that will generate and receive network traffic and identify their location on the emerging network diagram. It is important to understand current applications and proposed changes to the organization’s applications. 4. What issues are important to consider when explaining a network design to senior management? Answer: The key to gaining senior management acceptance lies in speaking their language (cost, network growth, and reliability). Using ‘jargon’ will not be effective. Tying the technical needs to business goals and using business language will be far more compelling. 5. What is the turnpike effect and why is it important in network design? Answer: The turnpike effect results when the network is used to a greater extent than was anticipated because it is available, is very efficient, and provides new services. 6. Under what circumstances would the use of the building block approach be less appropriate than the â€Å"traditional† approach to network design? Answer: The use of the building block approach would be less appropriate than the â€Å"traditional† approach to network design for those applications for which hardware or network circuits are unusually expensive (e.g., WANs that cover long distances through many different countries). 7. What are the three major steps in current network design? Answer: Needs analysis (the designer attempts to understand the fundamental current and future network needs of the various users, departments, and applications; Technology Design (the designer examines the available technologies and assesses which options will meet the users’ needs); and, Cost Assessment (the relative costs of the network are considered). 8. How can a network design tool help in network design? Answer: Some network tools help the designers â€Å"discover† the existing network so that they can document the current network very well. Then, the user can change it to reflect a new design. A tool like this is most helpful when the network that is being designed is an upgrade to an existing network, and when the network is very complex. Research Papers on Business Networks Homework AssignmentOpen Architechture a white paperThe Project Managment Office SystemBionic Assembly System: A New Concept of SelfIncorporating Risk and Uncertainty Factor in CapitalRiordan Manufacturing Production PlanAnalysis of Ebay Expanding into AsiaInfluences of Socio-Economic Status of Married MalesPETSTEL analysis of IndiaMoral and Ethical Issues in Hiring New EmployeesResearch Process Part One

Friday, November 22, 2019

The Graduate Essay Example | Topics and Well Written Essays - 1250 words

The Graduate - Essay Example The Graduate supports these arguments by ignoring all the political upheavals and concentrating on the topics of adultery and sex as the major themes of his work. The Graduate movie ignored the political movements that were taking place in the1960s. This was a time when many of the European wars were coming to an end. There were many political activists, civil rights advocates, feminist movements among others. Example of these movements included the Vietnam anti-war movements. The Graduate focuses on issues other than the political culture. It concerns with the generational gap while ignoring the counterculture movements. It attacks the film race by applying the Hollywood style; thus, causing the youth of a generation to re-examine their future by altering their course of lives. The Graduate also ignored the activist movements such as anti-racism; this indicates that the author was explicitly interested in issues of sex and adultery (Schuth 47). Dr. Benjamin argued that America had entered into a period of middle-class affluence that gave parents a chance to raise their children with greater permissiveness than before. The Graduate movie focused on the adult race. Its main focus is to criticize the adult insensitivity to the graduate. The adults are portrayed as vulgar and crass. It condemns the parents’ inability to raise their children in a pervasive way. The upper social class is portrayed as stereotyped and corrupt beyond their understanding of the meaning of true love. This is further illustrated in the movie by the character of Mrs. Robinson. When Benjamin runs away with Ms. Robinson on the wedding day, Mrs. Robinson is cross with her and openly tells her daughter that her decision is wrong. However, the love that Elaine is big enough to blind her from her mother’s arguments. This argument results in Mrs. Robinson’s slap on her daughter. On the

Wednesday, November 20, 2019

Homeland Security Case Study Example | Topics and Well Written Essays - 1250 words

Homeland Security - Case Study Example The actions of this department are what are amalgamated into the term Homeland security. The main focus of this formation is to deal with issues of the domestic population, building the necessary infrastructure to deal with both internal and the external aggressions and threats, sovereignty and the protection of the U.S territory. Inside the United States of America, the â€Å"Homeland Security† concept recombines and extends to the state agencies’ entities and responsibilities. The Homeland security research lays down the composition and formation of the Homeland Defense and the Homeland Security. These include the Transportation Security Administration, the Secret Service of the United States, United States Citizenship and Immigration Services, Americas Immigration and Customs Enforcement, Border and Customs Protection and the United States Coast Guard. Others Include the Federal Emergency Management Agency, the United States National Guard, among other departments adding up to one hundred and eighty-seven companies. The functions of the Homeland security are a major responsibility of the state (Berman & Flint, 2003). There have been several issues that affect the United States of America and that the Department Of Homeland Security has been grappling to deal with over years and presently. These issues include terror attack threats, immigration, capabilities, resource allocation, civil liberties, incident response, transportation security, intelligence, biotechnology, cyber security, infrastructure, funding allocation, border control among other issues. This paper will focus on cyber security threat that has been a challenge to the United States of America’s Homeland security. Cyber threats have been a challenge, both in past and present, to the United States. The policy makers and the Department of Homeland Security have been working hard to deal with issues relating to cyber security. The fight has been backed up by the use of

Monday, November 18, 2019

Tuskegee Airmen History Research Paper Example | Topics and Well Written Essays - 1250 words

Tuskegee Airmen History - Research Paper Example From the days approaching he first world war onwards, African American men had tried to become involved in the emerging discipline of air training, but the path was initially blocked by the planning bureaucrats when they tried to apply. The reason given in 1917 was that â€Å"No colored aero squadrons were being formed at the present time,... but, if later on, it was decided to form colored squadrons, recruiting officers would be notified to that effect.† Francis and Caso, 1997, p. 37) The uncomfortable truth of that era was that the War Department simply did not believe that African American men had the talent and ability to benefit from training as pilots. Besides this wholly unjustified prejudice concerning the qualities of African Americans, there was also a deep-seated commitment to segregation of white and African American people in all walks of life. The military could not conceive of an inter-racial force combining these different groups, as we have today in the modern navy, airforce and army, and so the only possible idea in their minds was a segregated unit for non-white groups. From the beginning of its existence, the U.S. Air Force was considered a profession only for the brightest and best students. It combined a highly technical training in all the skills needed for flight, with a demand for courage and exceptionally good judgement in difficult circumstances. Most airmen were graduates of respected colleges, and of course the general exclusion of African American students from most white colleges and universities made it difficult for this group to obtain even the basic prerequisites for entry. The Tuskegee Institute filled this gap by designing the first advanced courses specially tailored to prepare African American students for a career in flying. Civilian pilots and other trainees were recruited, and the types of training provided covered quite a range, including preparation for roles as airplane mechanic, aircraft armorer, aircraft sup ply and technical clerk, instrument and weather forecasting. (Francis and Caso, 1997, p. 55) One of the reasons for this expansion into African American training institues was the increasing need for qualified staff, but another was the efforts of teaching staff and potential trainees, especially in the Southern States to be allowed to take up an equal position along with other groups in defending their country in the case of war. The Second World War made it abundantly clear that the country needed to be equipped for defence and action in Europe and elsewhere, and this is perhaps what encouraged the planners to provide the resources for training. Despite the logical reasons for the Tuskegee programs, many people in government and in society at large remained to be convinced that African Americans could take up such vitally complex and difficult roles as flying in combat. A significant factor in overcoming these reservations was a visit by the President’s wife, Mrs Eleanor Ro osevelt, to fly with Charles Alfred Anderson. â€Å"Thanks to his skill and obvious abilities, the First Lady returned to the White House convinced about the Blacks’ capabilities not only to fight in the Air Corps, but to fight as well in the Army and in the Navy.† (Francis and Caso, 1997, p. 31) While permission to train for the Air Corps was pushing ahead, things were not quite so positive in

Saturday, November 16, 2019

Entrepreneurs Personal Characteristics And Influence On Growth Commerce Essay

Entrepreneurs Personal Characteristics And Influence On Growth Commerce Essay Barons (2002) definition of entrepreneurship indicates that entrepreneurship involves a complex process in which specific individuals recognize opportunities and then act to convert them into tangible economic benefits by setting up a new business. This corresponds with Schumpeters (1934, from: Elliot, 1983) early definition of entrepreneurship and entrepreneurs. He states that an enterprise is a carrying out of new combinations and entrepreneurs are the individuals whose function it is to carry them out. According to Schumpeter everyone is an entrepreneur only when he is actually carrying out new combinations, and he loses that character as soon as he built up his business. The entrepreneur then becomes only a small business owner (Carland et al., 1984). In this report I use Schumpeters definition of entrepreneurs and with that focus on entrepreneurs that started a business recently. Several meta-analyses have shown that entrepreneurs differ from other groups in terms of a broad range of personality (Zhao et al., 2010). The five-factor model (FFM) of personality provides a meaningful and generalizable taxonomy for studying these differences. The FFM consists of five relatively independent dimensions: Extraversion, Neuroticism, Conscientiousness, Agreeableness, and Openness to Experience (Wang and Erdheim, 2007). Each dimension reflects certain personal characteristics. Small businesses are different from large organizations. Their characteristics are that they are reactive, fire-fighting mentality, have resource limitations, informal strategies and flexible structures (Terziovski, 2010). While small firms opportunity-seeking skills may be strong, their limited knowledge stocks and lack of market power inhibit their ability to enact the competitive advantages necessary to appropriate value from opportunities the firms choose to pursue (Ketchen et al., 2007). This paper consists of a literature study on the personal characteristics of entrepreneurs and their influence on small business growth. Scientific literature will be consulted to study this relationship. I have chosen to investigate the relationship between an entrepreneurs personal characteristics and their influence on small business growth because I am interested in entrepreneurship and because I am working on setting up my own small business. It is an interesting topic because there are not many articles written about it and I think it can give entrepreneurs insights in how to use certain personal characteristics to make a positive contribution to the growth of their small business. The research question of the paper is: To what extent are an entrepreneurs personal characteristics of influence on small business growth? The sub questions are: How can personality be defined? Which personal characteristics are according to the literature specific for an entrepreneur? What are the characteristics of the small business sector? What kind of challenges will an entrepreneur face after starting up a business? The paper will be structured as follows. In the next section I will put up a definition of personality and review the Five Factor Model. Some insights about personal characteristics of entrepreneurs that are written about in the literature are also being discussed. After that a section is dedicated to the characteristics of the small business sector and what kind of challenges entrepreneurs face after starting up their business. Section 4 consists of an analysis where the insights from the foregoing two sections are combined. I will also analyze and discuss the results of an interview with an entrepreneur in this section. In the last section a conclusion will be given with a concrete answer to the sub questions and the research question. I will also discuss the limitations of this study and some recommendations for future studies. Figure 1 summarizes the paper structure. Figure 1: Paper structure An entrepreneurs personal characteristics In this section an overview is given of an entrepreneurs personal characteristics that are elaborated on in the literature. First a definition of personality will be given. In the same section The Five Factor personality Model (FFM) is explored because in this model certain personal characteristics are grouped together into five different personality dimensions. After that other personal characteristics that are quoted in the literature are being discussed. The goal of this section is to derive a set of personal characteristics from the literature that are typical for entrepreneurs and match them to the dimensions of the FFM. Personality and the Five Factor Model This paragraph starts with a definition of personality. After that I will explain the FFM model and specify an amount of personal characteristics that are typical for the five dimensions of the model. Personality can be defined as enduring dispositions that cause characteristics patterns of interaction with the environment (Parks and Guay, 2009). Personality consists of personality traits that are endogenous basic tendencies tied to underlying biophysiological response systems. They are strongly heritable, immune to social and parental influences and quite stable throughout maturity (Olver and Mooradian, 2003). In the 1990s consensus was reached about five broad categories of personality. These five categories together are called the Five Factor personality Model. The five FFM dimensions are: Conscientiousness, Emotional Stability/Neuroticism, Extraversion, Agreeableness, and Openness to experience (Parks and Guay, 2009; Wang and Erdheim, 2007; Zhao et al., 2010). Conscientiousness refers to making deliberate choices and being reliable. The personal characteristics that belong to this dimension are being careful, thorough, responsible, motivated, organized and efficient. Emotional stability/neuroticism represents the individual differences in the tendency to experience distress and the typical behaviors that are associated with it. According to Parks and Guay (2009) emotional stability refers to the characteristics self-confident, resilient and well-adjusted. According to Wang and Erdheim (2007) neuroticism is the opposite of emotional stability and is being anxious, depressed, emotional, worried and insecure. The third dimension, extraversion, refers to being ambitious, talkative, assertive, and sociable. Agreeableness consists of the social aspect of personality, that is being friendly, cooperative, loyal, courteous, good-natured and tolerant. Finally, openness to experience refers to the characteristics curious, imaginative, open-minded and artistically sensitive. This dimension reflects the creative side of personality. According to Zhao et al. (2010) these five dimensions do not cover all personality traits, so they expanded the model with the dimension Risk propensity. Risk propensity can be defined as the willingness to pursue decisions or courses of action involving uncertainty regarding success or failure outcomes. This was a short explanation about personality and the FFM. In the next paragraph I will discuss several personality traits of entrepreneurs that were elaborated on in literature. An entrepreneurs personal characteristics In this paragraph I will start with Schumpeters theory about the psychology of the entrepreneur. After that several personal characteristics of an entrepreneur that are reviewed in the literature will be discussed. Schumpeter (1934, from: Elliot, 1983) was one of the first to discuss the personal characteristics of the entrepreneur. He argues that there is the dream and the will to found a private kingdom, usually, though not necessarily, also a dynasty. Then there is the will to conquer: the impulse to fight, to prove oneself superior to others, to succeed for the sake, not of the fruits of success, but of success itself. Finally, there is the joy of creating, of getting things done, or simply of exercising ones energy and ingenuity (p. 93). After Schumpeter several other researchers investigated the psychology of the entrepreneur. Entrepreneurs differ from the rest of the population in a number of ways (Beugelsdijk and Noorderhaven, 2005; Brandstà ¤tter, 1997; Zhao et al., 2010). Entrepreneurs can be characterized by an incentive structure based on individual responsibility and effort, and a strong work ethic (Beugelsdijk and Noorderhaven, 2005). This means that they think that the state should not take more responsibility, private ownership should be increased, that unemployed should not have the right to refuse a job and success is not a matter of luck and connections but of hard work. Brandstà ¤tter (1997) attaches an entrepreneurs personal characteristics to some situational characteristics that are common to all entrepreneurs. First, it is the absence of people who give orders, set goals and control the outcome. This means that entrepreneurs are more individually oriented than other people (Beugelsdijk and Noorderhaven, 2005). A second aspect is the insecurity. There is always the risk of economic failure that entrepreneurs have to deal with. They dont need to be upset or worried very easily, so emotional stability is a prerequisite for entrepreneurs. This corresponds with the vision of Zhang et al. (2009). They mention that the level of neuroticism was a key predictor of centrality in advice and friendship networks. People that score low on the level of neuroticism tend to obtain central positions in advice and friendship networks and people high in neuroticism tended to become the center of adversarial networks. Because social networks are very important for entrepreneurs, these results suggest that entrepreneurs have to be emotional stable. The third characteristic Brandstà ¤tter (1997) defines is the demand for social contact. Entrepreneurs have to convince their customers of the usefulness of their product and they have to keep in touch with them to fulfill their needs. Finally, entrepreneurs have to be ready to try out new ideas and respond quickly to changes around them. This means that entrepreneurs have to be more innovative than others. Another characteristic of entrepreneurs is that they score high on the extraversion dimension (Zhang et al., 2009). This seems logical because extraverted people tend to have more social skills and this is important for entrepreneurs because they have to persuade different stakeholders. Baron (2002) supports this vision. He states that entrepreneurs who are successful in generating enthusiasm in others, may be significantly more successful than those who are not. Smith-Hunter et al. (2003) defined the most researched personal characteristics from the traditional school, that is a group of researchers who focused on the personality characteristics of the individual. These characteristics are locus of control (Poon et al., 2006), risk-taking (Zhao et al., 2010), achievement motivation (Poon et al., 2006), and problem solving style and innovativeness (Beugelsdijk and Noorderhaven, 2005; Schumpeter, 1934, from: Elliot, 1983). Locus of control can be defined as peoples perception of their ability to exercise control over the environment (Poon et al., 2006). People with an internal locus of control believe that their own effort determines certain outcomes in life, whereas people with an external locus of control believe that outcomes are determined by external factors they cant influence. Locus of control is one of the classical themes in the entrepreneurial trait research that differentiate entrepreneurs from non-entrepreneurs (Beugelsdijk and Noorderhaven, 2005; Poon et al., 2006). Entrepreneurs are characterized by a more internal locus of control (Dvir et al., 2010). Many recent studies have focused on the relationship between the locus of control and an entrepreneurs level of self-efficacy (Smith-Hunter et al., 2003). Entrepreneurial self-efficacy is the degree to which people perceive themselves as having the ability to successfully perform the various roles and tasks of entrepreneurship (Hmieleski and Baron, 2008). Hmieleski and Baron (2008) investigated that self-efficacy is moderated by the degree of optimism and the industry conditions. The results of their study indicate that (1) in dynamic environments, entrepreneurial self-efficacy exerts positive effects on performance for firms led by moderately optimistic entrepreneurs, but exerts negative effects on performance for firms led by entrepreneurs who are highly optimistic and (2) in stable environments, the effects of entrepreneurial self-efficacy on firm performance are less clear and not moderated by the degree of optimism. The opinions about the characteristic risk-taking are diverse. Some researchers found that entrepreneurs are high risk takers (Zhao et al., 2010), but others mention that entrepreneurs are moderate risk takers (Xu and Ruef, 2004). There are two forms of risk tolerance that may lead individuals to entrepreneurial activity, strategic and non-strategic (Xu and Ruef, 2004). In strategic risk tolerance rational actors actively prefer low-probability, high payoff outcomes. In non-strategic risk tolerance rational actors need not have active risk preferences, but only appear to prefer low-probability, high payoff outcomes because their information on the distribution of outcomes is based on conditions of imperfect knowledge. The need to achieve refers to a desire to do well in order to achieve a sense of personal accomplishment (Poon et al., 2006). The need to achieve can be related to the characteristics desire for independence (Dvir et al., 2010; Poon et al., 2006) and risk-taking propensity (Zhao et al., 2010). People who have a high need for achievement possess five critical attributes (Smith-Hunter et al., 2003). High achievers like situations where they can take responsibility. They like rapid feedback on their performance, so they can criticize their own improvements. They avoid very easy or very difficult tasks and they dislike succeeding by chance. They prefer striving to achieve targets and the last characteristic is that they are interested in concrete knowledge about the results of their decisions. Finally innovation and problem solving capabilities are expected to be the core of the entrepreneurial capability of an entrepreneur (Smith-Hunter et al., 2003). Schumpeter (1934, from: Elliott, 1983) mentioned that creative destruction, whereby new products and processes replace old ones, is more important than price competition among existing firms and products. This means that entrepreneurs are more innovative than non-entrepreneurs (Beugelsdijk and Noorderhaven, 2005). For this end the most important characteristics of an entrepreneur that were cited in literature were discussed. Dvir et al. (2010) mentioned the most frequently cited personality traits of entrepreneurs. These are the desire to be independent (Beugelsdijk and Noorderhaven, 2005), internal locus of control (Poon et al., 2006), creativity or innovativeness (Schumpeter, 1934, from: Elliott, 1983), risk-taking propensity (Xu and Ruef, 2004; Zhao et al., 2010), need for achievement (Poon et al., 2006), and credible role models. In the next paragraph the above mentioned characteristic will be related to the FFM dimensions. An entrepreneurs personality traits and their relation with the FFM dimensions The characteristics mentioned in the foregoing paragraph can be related to the dimensions of the FFM. The five dimensions were Conscientiousness, Emotional Stability/Neuroticism, Extraversion, Agreeableness, and Openness to experience. The extra dimension added by Zhao et al. (2010) was risk propensity. Because of the strong work ethic (Beugelsdijk and Noorderhaven, 2005) and the high need for achievement (Poon et al., 2006) entrepreneurs score high on the conscientiousness dimension. Conscientiousness has been found to be a consistent predictor of job performance across occupations involving managing others and sales performance (Ciavarella et al., 2004). Emotional stability is a prerequisite for entrepreneurs because of the insecurity they have to deal with (Brandstà ¤tter, 1997). People that score high on the level of emotional stability tend to obtain central positions in advice and friendship networks (Zhang et al., 2009). An internal locus of control (Poon et al., 2006) and mostly a high level of entrepreneurial self-efficacy (Hmieleski and Baron, 2009) are specific for an entrepreneurs emotional stability. Entrepreneurs also score high on the extraversion dimension (Zhao et al., 2010). The reason for this is that being extraverted should facilitate the development of social networks, ultimately resulting in stronger partnerships with suppliers and customers, which is very important for entrepreneurs (Ciavarella et al., 2004). The characteristics of extraversion are being ambitious, talkative, assertive, and sociable (Parks and Guay, 2009). According to Ciavarella et al. (2004) agreeableness is an interpersonal factor that focuses on the quality of relationships through cooperation and trust. Entrepreneurs who establish trusting, flexible, and courteous relationships with their customers should expect to reap the profits of repeat business. Zhao et al. (2010) expected that, given the limited margin for unselfish behavior and the high likelihood of guarded and even conflictual interpersonal relationships associated with entrepreneurship, there would be a negative relationship between agreeableness and entrepreneurial intentions. However their results have shown that this is not true and that entrepreneurs do score high on agreeableness and with that are highly cooperative and reliable. Openness to experience describes the extent to which individuals tend to be curious, creative, and open to new ideas, which relates to self-direction values, those are beliefs that individuals ought to be independent and self-directed (Parks and Guay, 2009). Successful entrepreneurship is likely to require constant information monitoring and learning to keep up with changing tastes and market trends, competitor behavior, and new Technologies (Zhao et al., 2010). This indicates that entrepreneurs are more innovative than non-entrepreneurs (Beugelsdijk and Noorderhaven, 2005) and that they score high on openness to experience. For the last dimension, risk propensity, the visions are not always the same. Zhao et al. (2010) argue that entrepreneurs are characterized by a high risk propensity, while Xu and Ruef (2004) argue that entrepreneurs are moderate risk-takers. The goal of this second section was to derive a set of personal characteristics for an entrepreneur from the literature and relate them to the FFM dimensions. After first discussing the FFM model and after that, reviewing the personal characteristics of an entrepreneur, I attached the personal characteristics to the dimensions of the FFM. With this the second section is finished. In the next section I will discuss the characteristics of the small business sector. Because of the focus on entrepreneurs that recently started their business, some challenges they face will also be reviewed.

Wednesday, November 13, 2019

And Then There Were None by Christie Agatha Essay -- Vera and Lombard,

Vera felt as though it was only right to follow the poem. Every time somebody died or disappeared a little china figure would break or disappear but at the end Vera toke the last one standing with her as a token saying that they made it to the end. While she was hanging herself the little figure broke, â€Å"The little china figure fell from her hand. It rolled unneeded and broke against the fender† (Christie 268). She also thought that’s what Hugo wanted her to because she was responsible for his nephew death. The antagonist of And Then There Were None is Judge Justice Wargrave. He was also known as Issac Morris to hide his real identity from all the other characters. He was the judge of all of the characters cases and he found them guilty and thought it was right for them to die. He knew almost everything about all of the characters, how they would think, how they would react to certain things, and some of the decisions they would make. Wargrave lead the characters to have both internal and external conflicts. For example external conflicts â€Å" They felt now like the people just awaking from a nightmare. There was danger, yes, but it was danger in daylight. That paralyzing atmosphere of fear that had wrapped them round like a blanket yesterday while the wind howled outside was gone† (Christie 243). These people are so terrified they are not getting sleep, barely eating, and hardly talking. They are living they worst nightmare. Not only that Wargrave is killing people but he is also scaring the people that is alive more and more which is causing them to have internal conflicts. For example Vera Claythorne ,the protagonist went through the deepest internal conflict â€Å"What was that-hung from the hook in the ceiling? A rope with a noose ... ...why. They all did a crime and thought they got away with it. In conclusion Agatha Christie wrote this very popular novel called And Then There Were None , to teach the readers that free or not you are never free from justice. By using both external and internal conflicts with the characters, symbolism with the poem Ten Little Soldiersand the china figures both symbolizing each character and irony of Justice Wargrave. This book is one of the reasons why Christie became the first grandmaster recognized by the mystery writers of America Works Cited â€Å"Christie, Agatha.† Literary Lifelines. 1998. Print. Christie, Agatha. And Then There Were None. New York: Harper Collins Publishers, 1939. Print. Kunitz, Stanley J., ed. Twentieth Century Authors. New York: The H.W. Wilson Company, 1973. Print. Stade, George and Karen, Karbiener., eds. British Writers. 2003. Print

Monday, November 11, 2019

Maguindanao Massacre Essay

November 23, 2009 a very significant date to all cotabatenos and a very controversial date to anyone who knows about the massacre. A day that brought the city into darkness.The time where majority of the people were into a great fear.The day where many innocent people were executed due to the willingness of others to win the position. Even for a country long hardened to election violence, the massacre of at least 57 defenseless civilians on the main southern island of Mindanao, many of them relatives and supporters of a local politician and a large group of journalists, sets a new low. This troubled corner of the Philippines usually makes headlines for its long-running Muslim separatist rebellion. But the killings starkly exposed a nationwide malaise: the fierce competition for regional power among the country’s small à ©lite of a few hundred families and clans that control an inordinate amount of the national wealth — and the desperate lengths some will go to protect their hold on power. The most talked about incident that happened 4 years ago has not been resolved until now. The brutal killing of 57 persons that were just about to file candidacy for Cotabato’s former governor Esmael ‘toto’ mangudadatu. On that day, the wife of Esmael Mangudadatu, a local politician, was to submit a Certificate of Candidacy on his behalf. He was to run for provincial governor. Local journalists joined them in a convoy going to the office of the Commission on Election in the municipality of Shariff Aguak. The journalists were interested as it was the first time that there is a man who will take risks to have a rivalry with an ampatuan in terms of running for a  position.. It was a challenge to the Ampatuans, the powerful ruling political clan. The Ampatuans were supporting Andal Ampatuan Jr., son of the then incumbent governor, Andal Sr., to succeed him as governor. But before Esmael’s wife, her party and the journalists could reach the Comelec office, the local policemen, soldiers and paramilitary forces blocked their way at the highway. They were allegedly given orders by Andal Ampatuan Sr., then incumbent governor and also the patriarch of the Ampatuans; and his son, Andal Jr., to kill the group. All the victims were taken to a hilltop where they were executed. Their bodies were buried in a mass grave together with their flattened vehicles. Their purpose was not to know where the killed people were. The magnitude of the Maguindanao massacre stands as evidence of an enormous challenge to the country’s system of justice. In this case, there are 196 defendants, each of them charged with 57 counts of murder for the death of 57 people, all charges being heard at the Regional Trial Court (RTC) in Metro Manila. The body of one journalist, which is required in prosecuting a murder case, could not be found. Over 500 others named only as â€Å"John Does† in the criminal charges have not yet been identified. Of the 196 defendants, 93 have been arrested; however, three of them have accused the police officers of arresting them in the place of real accused. Of the 93 defendants in detention, 29 of them have not been arraigned in open court yet. Before the trial could begin, it took the National Prosecution Service, the prosecution arm of the Department of Justice, over two months to file the 57 counts of murder in court against the defendants. Here, although the prosecution body did comply with its legal obligation to complete the preliminary investigations in at least 40 days for ordinary cases and 90 days for cases involving public officials as required by the Revised Rules of Criminal Procedure, Rule 112 on Preliminary Investigation, to be able to proceed with the trial to ensure that an â€Å"effective remedy† is achieved has been problematic in reality. The failure of the Philippine National Police to arrest the other 103 defendants, who are still at large two years after the massacre, has further delayed the trial of the case. Although all of the accused are charged for murder in a single incident, in determining criminal liability each must be arraigned, tried and examined individually in court during the tria l. The accused could also question the merit of the case by submitting petitions and motions in court either to have their names  excluded from the murder charges or having the entire case dismissed on question of merit. However, not all motions and petitions filed by defendants, particularly those of powerful and influential political figures are in good faith. In this case, some defendants who invoked a remedial right filed their petitions to either exclude their names from the murder charge or dismiss case allegedly to deliberately delay the trial. To date, there are still 29 defendants, including Zaldy Ampatuan, former governor of the Autonomous Region in Muslim Mindanao, who have not been arraigned. Zaldy is the son of Andal Sr. Under the Speedy Trial Act of 1998, section 6, in trial of criminal cases â€Å"in no case shall the entire trial period exceed one hundred eighty (180) days from the first day of trial†; however, four of the seven â€Å"exclusions† applicab le in this case, as stipulated in section 10 of the same law, have rendered the law inoperative. These exclusions are delays due to trials with respect to charges against the accused; interlocutory appeals; hearings on pretrial motions from orders of inhibition, or proceedings relating to change of venue of cases; finding of the existence of a valid prejudicial question; and absence or unavailability of the accused or an essential witness. Thus, the delay in this trial has so far been justifiable in the domestic law. I argue that these open-ended and broad exclusions have denied both the accused and the complainants their constitutional rights to speedy trial. The absence, if not lack of, adequate legal provisions that would ensure that motions and petitions that the defendants filed are examined thoroughly to prevent any attempt to deliberately frustrate the course of justice has exposed the court system as being open to manipulation. In this case, the defendants filed numerous petitions, motions and appeals that were legally justifiable in the  ¡Ã‚ §exclusions ¡Ã‚ ¨ clause of the Speedy Trial Act. Even though according to the Philippine Daily Inquirer â€Å"the court (had) practically holds three hearings a week — motions are heard on Mondays in Quezon City while the actual trial is conducted at Camp Bagong Diwa in Bicutan, Taguig City, on Wednesdays and Thursdays† (23 November 2011) for over a year now, there is no sign that the trial of the massacre case could reach its conclusion anytime soon. Therefore, the remark by one of the private lawyers, Harry Roque that the trial could take â€Å"55,000 years† if we take as a basis that â€Å"it takes five years to try a single case in the Philippines† (according to one study) is  not an overstatement. This could in fact be the length of the trial if the 196 defendants would be tried each for charges of 57 counts of murder. Effective remedy: violations in international law I argue that the Speedy Trial Act, in particular its section 10, does not conform to international norms and standards because its exclusions institutionalize delays in trial of cases and thereby deny an â€Å"effective remedy†. The domestic law and the rules of procedures that protect these rights exist, but they do not conform to international law. The domestic law rather has diluted substantive rights to be mere procedural rights. The UN Human Rights Committee has already held that the Philippines was in two cases in violation of its obligation under the Covenant for failing to ensure the â€Å"effective remedies† at the domestic level. In its views on Evangeline Hernandez v the Philippines (Communication No. 1559/2007, views adopted on 26 July 2010, UN Doc. CCPR/C/99/D/1559/2007), the Committee held it was in violation  ¡Ã‚ §of article 6, as well as a violation of article 2, paragraph 3†³ because domestic remedies had been â€Å"unreasonably prolonged† . The Committee reminded that the â€Å"State party may not avoid its responsibilities under the Covenant with the argument that the domestic courts are dealing with the matter, when the remedies relied upon by the State party have been unreasonably prolonged.† Evangeline is the mother of Benjaline Hernandez, a human rights defender murdered by the military and paramilitary forces in Arakan, North Cotabato in April 2002. Evangeline filed the individual communication even without fully exhausting domestic remedies, arguing that investigations, prosecution and trial in her daughter’s murder â€Å"have been ineffective and unreasonably prolonged.† The Committee has also observed that for â€Å"over eight years later, at the time of examination of this communication, it would appear that criminal proceedings initiated against the accused have not yet been finalized.† In another case, Lenido Lumanog and Augusto Santos v the Philippines (Communication No. 1466/200 6, views adopted in 20 March 2008, UN Doc. CCPR/C/92/D/1466/2006), the Committee also held the state party violated article 14, paragraph 3 (c) of the Covenant because it failed in concluding the petition for review into the death sentences of the complainants for eight years. Here, the state party was reminded of its legal obligation with article 2, paragraph 3 (a),  of the Covenant, to ensure â€Å"an effective remedy, including the prompt review of their appeal before the Court of Appeals and compensation for the undue delay†. The complainants, Lenido Lumanog and Augusto Santos, are two of five torture victims, collectively known as the â€Å"Abadilla Five†. The five were illegally arrested and detained, tortured to confess and after over 14 years of trial, were convicted for the assassination of Rolando Abadilla, a police colonel, in June 1996. They were convicted based on the testimony of one witness, Freddie Alejo. Alejo’s credibility has been questioned. In these two cases, the Committee found the Philippines has violated the rights of the complainants because the domestic remedies were ineffective and unduly delayed; however, legally these violations to international law had found justification under the country’s dome stic law, notably the Speedy Trial Act. In the domestic legal framework, delay is justifiable as part of the domestic criminal legal process, even though in these two cases it constituted a breach of the ICCPR. When domestic remedies are â€Å"ineffective and unduly delayed†, the aggrieved parties can file individual complaints with the Committee, since the Philippines has ratified the Optional Protocol of the ICCPR. Even when cases are within domestic procedural jurisdiction, the state could not invoke this as non-compliance to â€Å"exhaustion of domestic remedies.† To my knowledge, the Committee’s views and opinions have so far not been implemented at the domestic level. While the country’s Constitution adopts the â€Å"generally accepted principles of international law†, without an established mechanism to fully implement the Committee’s views, even if a state is held to have committed the violations of the Covenant and international law it signed, the notion of â€Å"effective remedy† will not exist in reality. The Maguindanao massacre is proof that the existing domestic mechanism, despite its recognition of the rights, is unable to comply with its international obligations because of the chronic defects of its own criminal justice system. The recognition of these rights in the 1987 Constitution, the codification of statutory laws and in criminal procedures and adoption of jurisprudence from foreign countries will not have substantial benefits to ensure protection of the right to an â€Å"effective remedy†. A well-developed domestic mechanism is a precondition in order to implement these rights. A backhoe driver has described in chilling detail how he used the excavator to bury the 58 victims of the Philippines’ worst  political massacre, according to a video aired Tuesday. The man said he dug a big hole near where the victims were shot by the Ampatuan clan in November 2009, then pushed the bodies as well as their cars down the pit. â€Å"I am Bong Andal, a trusted employee of the Ampatuans†¦they ordered me to bury the people they had massacred,† said the man in the clip aired by Manila-based GMA network. The clan allegedly ordered the massacre to stop a political rival, Esmael Mangudadatu, from running against one of its members for governor of Maguindanao, a poor farming province in the south. The Ampatuan patriarch, two sons and several family members are in custody and on trial for the murder of 58 victims, including 32 journalists who were covering the political contest. The backhoe driver was arrested last November, while more than 90 other suspects remain at large. GMA said Andal had signed a deposition that was given to state prosecutors. It said it later had an exclusive interview with him, in which he repeated the allegations made in the written deposition. The network said part of his quotes were from the deposition and part from the interview. â€Å"I used the backhoe to push the vehicles into the hole first. Then I flattened them with its metal arm,† the station quoted him as saying. â€Å"Some of the vehicles had dead people inside, so I just closed my eyes out o f fright and got on with it.† Andal also said he used the excavator’s arm to drag the dead bodies into the hole, the station said. Andal alleged in the video clip that the clan patriarch, Andal Ampatuan Senior, ordered him to take the excavator to the place where the 58 people were shot dead, and to make sure it had enough fuel. â€Å"The Ampatuans warned me and my parents not to get myself arrested. They said if I get caught they would kill my parents, my siblings and my children.† The driver is being held by the national government’s witness protection program, along with other witnesses, amid fears they could face retribution for testifying against the clan, GMA said. At least three witnesses have been killed since 2010, including a former Ampatuan family employee whose dismembered remains were found stuffed into a sack in 2012. Andal wants to become a state witness, GMA said GENERAL SANTOS CITY, Philippines – Lest we forget, we must remind ourselves that 4 years ago, 58 people were killed in one of the most reprehensible massacres in the long line of political murders in the country. On a scorching mid-day on Nov 23, 2009, Datu Unsay town Mayor Andal Ampatuan Jr and some 192 relatives, policemen, militiamen, and bodyguards  stopped a convoy of vehicles that was on its way to the provincial capitol of Maguindanao in Shariff Aguak and diverted it to a secluded and remote village in Masalay, Ampatuan town. There, witnesses said Andal Jr and his minions peppered the wailing and begging victims with bullets. Some 4 hours later, the world was jolted and revolted by the gruesome massacre. Thirty-two of those who were mercilessly gunned down were journalists and media workers. Standing accused and being prosecuted for the barbaric crime are members of the most fearsome and influential political warlords in Mindanao, along with their henchmen and avid supporters. Six members of the Ampatuan clan have since been arrested and are now detained at Camp Bagong Diwa in Bicutan, Taguig City. While most suspects have been arrested and detained, many are still at large. At least 8 of those still in the lam bore the surnames of the principal suspects – Ampatuan. And while 96 or so of the suspects are now detained, all but one have yet to face trial, the process bogged down by delaying tactics by the defense. In that one case that has gone on trial, the lawyers of the accused have yet to present their case after the prosecution rested on November 6 – or 4 years to the month since the massacre. At least 3 witnesses have been killed since 2010, including a former Ampatuan family employee whose dismembered remains were found stuffed into a sack in 2012. Despite this, Justice Secretary Leila de Lima has said that President Benigno Aquino III wants suspects convicted before his term ends in 2016. The final road On Thursday, November 21, families of the media workers and journalists who perished in the massacre will retrace the final road traveled by their loved ones and carry one message: When will justice ever be achieved? Indeed, it is not enough to see the masterminds and their minions confined in their detention cells. Paramount is retribution for the victims – for the massacre committed by the Ampatuans. The families are demanding justice. The world is insisting on the day of reckoning. Many are convinced that without it, the culture of impunity will forever be with us. 2009 will go down in history as the darkest year yet for the Philippine media with the killings of 57 people, including 32 journalists in southern  Philippines on 23 November – an event that has come to be known as the â€Å"Maguindanao massacre. A Philippine regional traial court today ordered the arrest of 189 suspects linked to the gory November 23, 2009 Maguindanao killings of 57 civilians, which shook the media worldwide. It was as if some senators read an oracle on the fate of the civilian massacre case in Maguindanao. Though governments all over the world deplored the killings, the case has lost its momentum. The celebrated Maguindanao massacre case took another twist when two members of the powerful Ampatuan clan tagged as two of the main suspects in the November 23, 2009, killings were cleared by the Department of Justice because the â€Å"existence of a conspiracy was not proven† Anger and relatives’ cries for justice reverberated on Thursday at the resumption of the celebrated Maguindanao massacre trial as a medical legal officer testified that one of the victims may have been raped before she was shot. Maguindanao massacre had been the most talked about topic since the day it happened. It affected not just the city of cotabato but also other places as soon as it was aired on television. The people in cotabato, specially those families who had lost their loved ones because of the brutal killing had been traumatized. It brought fear to us because it was the most brutal happening that happened. I know that in cotabato there are a lot of incidents happening. Like bomb threats,kidnapping,killing and the war against the terrorists but this topic was the most fearful. To compare, authorities arrested 12 suspects at the time of the massacre’s second anniversary in 2011. Two other suspects considered â€Å"big fish† who each carried the P300,000 bounty were arrested that year: Tumi Timba Abas and Dukoy Badal. Then in 2012, eight were also arrested, including two prominent Ampatuan clan members, namely: Datu Anwar Upham â€Å"Ulo† Ampatuan and Datu Anwar â€Å"Ipi† Ampatuan Jr. But this year, apart from not arresting any prominent Ampatuan clan member, authorities have only arrested one suspect that carries the P300,000 bounty: Talembo â€Å"Tammy† Masukat, who was collared on February 16. The six others arrested this year carried a lower bounty of P250,000 each: Nasser Guia, arrested on February 8 Maot Bangkulat, April 8; Kudza Uguia Masukat, April 15; Edris Nanding Tekay, May 28; Mama Nomba Habib, July 25; and Alimudin Sanguyod, October 18. An eighth suspect, Maguid Amil, was killed by authorities after resisting arrest in Maguindanao on February 8. Amil reportedly hurled a grenade and fired at one of the arresting officers. As of posting time, the total number of arrested suspects stands at 108. Of this number, 104 have been arraigned and all pleaded not guilty to the multiple murder charges. Among those arraigned are the eight prominent Ampatuan clan members, including patriarch Andal Ampatuan Sr, a former Maguindanao governor, as well as his three sons, Andal Jr, Rizaldy, and Sajid. Considered the worst single-day election-related violence in Philippine history, the Maguindanao massacre claimed the lives of 58 people, including 32 journalists, who were part of a convoy that was supposed to register then Buluan Vice Mayor Esmael Mangudadatu, an Ampatuan rival in the gubernatorial race for the 2010 automated polls. They were said to have been stopped at a checkpoint at Sitio Masalay in Barangay Salman, Ampatuan town and gunned down by armed men led by the Ampatuans. Mangudadatu eventually won as governor. This tragedy will never be forgotten as it was one of the most significant and historic happening that happened in cotabato city.It took us years to moved on to what happened. Mangudadatu stayed strong even though he lost most of his family member. He still continued his filing of candidacy and luckily he won. As he won, it brought happiness to the people as well as the families of the victims because it gave them hope that there will be justice served. But until now there are some petitions and complaints about the case because of the slow movement that causes the family victims to get angry because it is been years and until now there are still improvement in the said case. As the ampatuan denies about the massacre, it is one of the  factor why it is still an ongoing case. It gave the supreme court a hard time to resolve it because of their statements. They’ve been creating new stories for their sake to be not in prison but still there were some evidences that are strong b ut needsa very careful and intelligent study to really know who’s the real suspect to the said crime. http://content.time.com/time/world/article/0,8599,1943191,00.html http://www.gmanetwork.com/news/story/336621/news/specialreports/4-years-after-ampatuan-massacre-88-suspects-still-at-large http://www.rappler.com/nation/44427-families-maguindanao-massacre-compensation http://www.abs-cbnnews.com/focus/07/02/13/backhoe-man-describes-maguindanao-massacre-burial http://www.humanrights.asia/resources/journals-magazines/article2/1102/the-maguindanao-massacre-legal-and-human-rights-implications-of-court-delay http://themediaproject.org/page/maguindanao-massacre-story-index