Tuesday, November 26, 2019

Islamic Mullah

Islamic Mullah Mullah is the name given  to teachers or scholars of Islamic learning or the leaders of mosques. The term is usually a mark of respect but can also be used in a derogatory manner and is primarily used in Iran, Turkey, Pakistan, and the former Soviet republics of Central Asia. In Arabic-speaking lands, an Islamic cleric is called an imam or Shayk  instead. Mullah is derived from the Arabic term mawla, which means master or the one in charge. Throughout Southern Asias history, these rulers of Arabic descent have led cultural revolutions and religious war alike. However, a mullah is general a local Islamic leader, although sometimes they rise to national prominence. Usage in Modern Culture Most often, Mullah refers to Islamic scholars well-versed in the sacred law of the Quran, however, in  Central  and  East Asia, the term mullah is used on a local level to refer to mosque leaders and scholars as a sign of respect.   Iran is a unique case in that it uses the term in a pejorative manner, referring to low-level clerics as mullahs because the term derives from Shiite  Islam wherein the Quran casually mentions mullah multiple times throughout its pages while Shia Islam is the dominant religion of the country. Instead, clergymen and religious leaders use alternative terms to refer to their most respected members of the faith.   In most senses, though, the term has disappeared from modern usage except to mock those who are overly devout in their religious pursuits - a sort of insult for reading the Quran too much and assuming oneself the Mullah referred to in the sacred text. Respected Scholars Still, there is some respect behind the name mullah - at least for those who regard those well versed in religious texts as mullahs. In these cases, the astute scholar must have a firm understanding of all things Islam - especially as it pertains to the contemporary society wherein the hadith (traditions) and fiqh (law) are equally important. Oftentimes, those considered to be mullah will have memorized the Quran and all of its important teachings and lessons - though often times throughout history uneducated common folk would misname visiting clerics mullahs because of their vast knowledge (comparatively) of the religion. Mullahs can also be considered teachers and political leaders. As teachers, mullahs share their knowledge of religious texts in schools called madrasas in matters of Shariah law. They have also served in positions of power, such as the case with Iran after the Islamic State took control in 1979. In Syria, Mullahs play an important role in the ongoing conflict between rival Islamic groups and foreign adversaries alike, valuing the protection of Islamic law while staving off Islamic extremists and attempting to restore democracy or civilized form of government to the war-torn nation.

Saturday, November 23, 2019

How to Grow as a Content Marketer With John Rampton of Calendar

How to Grow as a Content Marketer With John Rampton of Calendar Have you heard the term, â€Å"growth-hacking†? It can be a bit of a buzzword. Today we’re going to learn about a real-life growth-hacking example. You don’t have to have a special sales and marketing gene it just takes the willingness to learn. Today’s guest is John Rampton. He’s a serial entrepreneur, the founder of several companies, and a contributor to sites like Huffington Post and Entrepreneur. Today’s episode is a case study in perseverance, so you won’t want to miss it! Some of the highlights of the show include: What John is up to as an entrepreneur and how his products help businesses, as well as how he got into the entrepreneurial world. The first steps John took to get involved in an online business, including a hack he figured out that wasn’t illegal at the time. The framework John thinks about when it comes to risk-taking. Why hyperfocusing on specific niches and problems is one way to succeed. John’s thoughts on learning: how he finds time to squeeze learning into his busy days and making time for what’s most important. How something as simple as a calendar can function as a powerful tool, as well as information about Calendar.com. How an excellent marketing strategy can even sell a crappy product that provides no value. John’s most sage wisdom and best advice for marketers just getting started. Powered by PodcastMotor Actionable Content Marketing powered by By AMP068: How To Grow (Like Crazy) As A Content Marketer With John Rampton 00:00/00:00 1x 100 > Download file Subscribe on iTunes Leave Review Share Links: Due.com Calendar.com John on Twitter JohnRampton.com UpWork Email your iTunes review to podcast@.com If you liked today’s show, please subscribe on iTunes to The Actionable Content Marketing Podcast! The podcast is also available on SoundCloud, Stitcher, and Google Play. Quotes by John â€Å"Don’t limit yourself to what you’re doing. Go find new and interesting ways there are always unique things to do.† â€Å"In your life, you’ll always go up or down, learning or not learning There’s no flat line.† â€Å"You will never be a better salesperson than your customers.†

Thursday, November 21, 2019

The Vietnam War Essay Example | Topics and Well Written Essays - 1250 words - 2

The Vietnam War - Essay Example The Vietnam People’s Army, on the other hand, practiced conventional warfare (Henriksen 16). The US and South Vietnamese forces typically relied on air superiority, as well as superior firepower for searching and destroying communistic operations through airstrikes, artillery and ground forces. It is undeniable that the upheaval in Vietnam during the 1960s had serious repercussions as both sides suffered immense losses of both lives and funds. This paper will examine the conditions in Vietnam that precipitated such upheaval, focusing on the social, economic and political conditions in Vietnam during the 1950s. The 1950s in Vietnam were critical years to the war. Political Conditions The most notable causes of the Vietnamese upheaval of the 1960s were largely political-based. One of the most critical situations that precipitated the upheaval in the 1960s was the involvement of the US government in the affairs of South Vietnam. The US had initially backed France in its pursuit t o take over Vietnam. However, upon the defeat of France, the nation (Vietnam) split into two; North and South (Henriksen 38). The US government sought involvement in the war with a view to deter a communist takeover of South Vietnam. The US was quite weary of the insurgency of communism in South Vietnam, and thus engaged a containment strategy or counterinsurgency to deter South Vietnam’s takeover. All this occurred from 1950 when the US sent its military advisors to the then French Indochina. The US government was adamant that the North intended to convert the South into a communistic state, thus warned the Southern political elite of the same. This precipitated animosity between the North and Southern leaders and in turn increased tension between the two states resulting in massive upheaval.   After France acceded defeat by the Vietnamese, the US government, under the administration of President  Dwight Eisenhower, embarked on building a state from the South Vietnamese political entity by fabricating government there. The US overtook the governance of South Vietnam through controlling the local government. This allowed the US to attain its mission, i.e. war against the communists to deter South Vietnam’s takeover. Furthermore, in addition to the US sending its military advisers to South Vietnam, it also dispatched the Central Intelligence Agency (CIA) to engage in psychological warfare with the North. The involvement of the US only angered the North who reciprocated through guerilla tactics against the South. In addition to helping South Vietnam to deter communist takeover, another key political reason for the Vietnamese upheaval in the 1960s was the US’ guarantee to support capitalistic South Vietnam to deter the reoccurrence of the Chinese takeover by communists. The US government throughout the administrations of Truman, Eisenhower, and Kennedy all guaranteed South Vietnam of their undying support. The US had rather selfish reason s for backing South Vietnam. According to the US government, under the administration of the aforementioned presidents, if the US deserted South Vietnam, its word would thus be considered as unreliable by other governments, both friendly and unfriendly. Therefore, because its credibility was at stake, the US advocated the war against South Vietnam. Social

Tuesday, November 19, 2019

Cultural studies Essay Example | Topics and Well Written Essays - 1000 words - 1

Cultural studies - Essay Example This ‘selective selfishness’, as the author calls it, is the essence of all great things that have happened in the world. The author also talks in detail about what he calls as historical men, men who take history as the basis of their future actions (p 65). The author debates that history should not be treated as a pure science and that it is neither a source for pure knowledge. Hence, he concedes to the theory that it can merely be used as a reference to take life forward. While total lack of history and too much of history are both derogatory, it is essential that human beings take the middle path and recognize its relevance in human life. According to the author, man should be able to selectively switch off and on his awareness and reverence for the past and must not fall a prey to delusions provided by historical anecdotes. In "On the Uses and Disadvantage of History for Life", Friedrich Nietzsche, analyses the importance of history in the guiding the modern generations. He lays out a path, a dogma, that is to be followed by all those who are desirous of attaining enlightenment in their lives. For example, he says that history that speaks of the past and provides nothing new, does not invigorate the mind (p 113). On the contrary, history shows its heroes and heroines as those who questioned a dogma is to be followed, if we are to make any sense of history and the future. Hence, Friedrich Nietzsche tells us that we need to be path finders in a world that is dominated by historical data that could be biased and one-sided and does not take into consideration information that has many perspectives to it. History, further can be conceived as a biased fabrication of an individual or a group of persons for furthering some rested interests. We have seen instances where historical information which ere believed to have been facts, had been challenged later on. Nietzsche, in particular,

Sunday, November 17, 2019

Aircraft Solutions Essay Example for Free

Aircraft Solutions Essay SecurityAircraft Solutions Security and Policy Assessment Table of Contents Executive Summary1 Company Overview1 Security Vulnerabilities1 Decentralized Anti Virus1 Access Control List Policy3 Recommended Solutions6 Bitdefender6 AlgoSec Security Management Suite7 Impact on Business Processes7 Budget8 Summary8 References9 Executive Summary As Aircraft Solutions takes the next step in its growth, it is imperative that its IT infrastructure keep pace as to not counteract gains made by the company during this expansion. This is especially important given it designs and fabricates components for both commercial and defense related industry. Given the increase in staff as well as outside vendors accessing the network, a more centralized approach to antivirus protection has to be adopted. It is equally important that certain elements within the network that have been done manually, such as Access Control List policy, be automated to avoid consuming the IT department in an ever escalating bar of employee hours. Company Overview Aircraft Solutions operates within California in two separate physical locations in San Diego and Santa Ana. Working within both commercial and defense industries, their products are used globally. Aircraft Solutions is overtly technical in nature utilizing Business Process Management (BPM) for end to end processes that interacts with customers, vendors, and suppliers. BPM also fills a critical role of internal communications for IT to ensure customer needs are being fulfilled precisely as they have been ordered. Security Vulnerabilities Decentralized Anti Virus In reviewing the software utilized by Aircraft Solutions, it is stated that security is handled by anti-virus software that is independently operated for all workstations and servers. This seems to be a continuation of the host centric theme as evidenced by host based IDS. Whereas host based IDS can be seen as a more viable alternative to network based IDS, the same cannot be said for anti-virus software in this scenario. Given that the company operates two individual physical locations that run the gamut from design to production, it can be assumed that their employee pool is not small despite actual numbers not being mentioned. With these numbers, it is quite unlikely that all employees are maintaining their due diligence in ensuring that they are properly updating their anti-virus applications and operating them in such a manner that they are being used efficiently. The primary weakness of this policy is that the end user is responsible for its upkeep. It is reasonable to assume that someone working in a loading dock may not have the same level of computer aptitude as an engineer and would be more likely to cause a break in security by allowing a virus into their computer and threaten the network (Department of Homeland Security, 2012). As security is only as strong as the weakest link, this opens the proverbial floodgates of illicit access to the company network. This is problematic in that official statistics gathered in 2012 estimated that the United States ranks third in the world with 50. 1% of all unique users detecting threats from a virus (Kaspersky Security Bulletin, 2012). The most common virus credited with 75. 01% of all online attacks with 712,999,644 instances are malicious URLs (Kaspersky Security Bulletin, 2012) that can infect a computer without the user even realizing what has occurred. Not even anti-virus software will keep a user completely safe as it is reported that 32% of all users have been infected with a virus despite such protection measures (Zorz, 2010). Once infected, viruses can either cause extreme lag with the network, slowly gather information to be used against the company or sold to anyone willing to purchase it, or even cause damage to physical components used in the business (Weinberger, 2012). There are many other nefarious effects of an infected computer within a network that can cripple productivity and cut into the revenue generating capacity of the company. When you take into consideration that a slower network will cause a decrease in company production and will not reduce the cost of daily operations in terms of equipment, utilities or workforce then you must look at the financial ramifications of such an event. The creation and dissemination of viruses has become big business that will grow exponentially as it has moved from the stereotypical basements of hackers into the realm of organized crime and legitimized aspects of armed services for many nations the world around (Fisher, 2012). It is reported that worldwide, viruses have stolen approximately $1. 6 trillion (CMP Media Inc. , 2013) from the global economy. Access Control List Rule policy Security policy at Aircraft Solutions dictates that all firewall and router access control rules pertaining to packet flow be evaluated on a bi yearly basis. Network infrastructure documentation for the company lists one firewall and two routers that are currently in operation that fall within these parameters. Within the San Diego headquarters, all of these devices act as a bulwark against any unwanted intrusion from the Internet at large. Documentation also details there are contractors and suppliers along with customers to contend with regarding external access to the network through these devices. Looking at the internal physical topology it is seen that there is a single router providing packet control for all traffic between the Defense Division in Santa Anna and the rest of the company consisting of Human Resources, Accounting, Direct Computer Numerical Control, Sales and Marketing, IT, and information from the database. Conversely, this same router would also have to act the single point of control between all internal departments at San Diego as it is the only piece of equipment that possesses layer three functionality before passing the firewall. Given these relationships this demonstrates these three devices, particularly the router connecting Santa Anna and San Diego, require extremely detailed and expansive routing rules to effectively run the business. Departmental access list rules could for the most part remain static and not require a great deal of attention once implemented as IP schemas would be established ahead of time for each department. Issues begin to arise when you take into account that over the course of two years, multiple projects will most likely be spun up, numerous unique circumstances, and growth of the network will create a myriad of antiquated access control rules that will represent gaping holes in security that can allow unauthorized access to sensitive company materials and intellectual property. This would also lead to a lack of documentation of access control rules so that there would be no manner in which to simply reference which rules were in place and for what reason. Each annual security review will then sideline the IT department as it analyzes the access control list rules and begins to path them out to their respective devices. At this point, ownership of the device would have to be established, the purpose of that device, and then verifying if access was still warranted. Disagreements at this juncture would result in managerial oversight as department heads would then have to present their cases for and against access. Obviously, this would draw management, especially that of IT, into contracted deliberation that would distract from day to day business. A lack of an overall firewall policy, a bi yearly evaluation of access control list rules, and the previously mentioned issue of non centralized anti-virus software creates a very dangerous environment for data security. A port that is opened for user access is a window into the companys network that can ultimately be exploited. The more ports that are left open, the greater the opportunity for intrusion. This same lack of a detailed firewall policy also entails that these multiple holes in security can vary in scope since there is not a set control in place to reign in the extent of the security exception being asked (Hogg, 2011). These open ports make the company susceptible to port scanning as outside entities search for network soft spots that can be exploited to gain entry. These scans occur with such constant frequency that they are referred to as Internet background radiation (Notenboom, 2008). Given these factors it is a foregone conclusion that there will inevitably be a breach of the network as a result. Such an event would result in loss of intellectual property, decrease of production, and repeated incidents would create a devastating loss of trust in the eyes of customers. An ancillary security risk is derived from the time and energy spent by IT during each manual review of all access control listings in the firewall and routers. It is feasible that each rule will take an average of an hour to complete if all goes smoothly with tracing the routed path from beginning to end, complying with internal ticket work, verifying the device, and accepting a reason for the route to be in existence. More time would be expended by both engineering staff and then management if there was a dispute as to if a rule should be left in place or not. In terms of just the basic work to go through all the established rules that will accumulate over the course of 2 years, a conservative estimate of 25 requests for new rules per week (based on personal experience within a mid-sized company) would yield a total of 2600 new lines to be analyzed. Assuming approximately a third of these rules could be associated together as projects are increased or decreased, that leaves roughly 866 lines that translates into as many employee hours that will be occupied for this task over the course of 108 days. A team of five in the IT department would require just over 21 full working days to effectively handle this task at a cost of $2,898. 75 to have entry level Network Engineers (Salary. com, 2013) dedicated to the task . If a quarter of these rules are disputed, then the company will pay out another $9,964. 70 (Salary. com, 2013) of lost productivity as the IT manager has to contend with other managers to mediate the need for the rules. It is likely that this endeavor would constitute a major departmental project at the end of the 2 years instead of being worked on throughout the duration. During this time, other work will be assigned to secondary status and put projects and perhaps updates that could be critical in risk of being done on time as all energy and focus resides on the access evaluation. Recommended Solutions Bitdefender To effectively control antivirus from a central source that will push updates to all network devices, demand all equipment connecting has antivirus and allow for mobile devices to be used without issue, Bitdefender small business pack would be the ideal choice. Given that this application suite will provide service to all Windows OSs from XP to Windows 8 along with Macintosh and Linux support [ (Squidoo. com, 2012) ], it is perfect for allowing outside vendors who may not conform strictly to the Windows platform adopted by Aircraft Solutions. Support for the product is offered by email, and phone coupled with configuration assistance free of charge. As it was not definitely declared how many employees are with Aircraft Solutions, there is a pricing scale of $449. 95 per year for 20 computers and 20 mobile devices [ (Bitdefender, 2012) ]. AlgoSec Security Management Suite In terms of Access Control List management on the firewalls, industry reviews would recommend a single piece of software, Algosec Security Management Suite. With this application, all a user is required to do is simply enter in the IP of the device wanting entry to the network as well as the IP of the device is wishes to access. Algosec will then compute the path from source to destination, provide a listing of all firewalls in the path, and then list out what changes would need to be made to firewall configuration. With a click of a button, it would even implement these changes thereby freeing an inordinate amount of time on the part of IT staff and management [ (AlgoSec, 2012) ]. Cost of the application is approximately $10,000 [ (AlgoSec, 2013) ] which also include support of the product and updates. Impact on Business Processes Implementation pains felt as both Bitdefender and AlgoSec are introduced will be minimal at best. In each instance, less work will be required of employees as they are no longer responsible for their own antivirus and the process by which firewall flows are drafted and put into configuration will be dramatically increased. The point of contention that might make itself known will be at the onset of these applications being installed as they will require some new policy changes. At first, there will most likely be an uptick in questions asked of IT as employees want to know what is required of them with Bitdefender antivirus. It will also require new policy on the part of IT in terms of management of the application as well as procedures for pushing updates into the network. AlgoSec will be almost entirely without incident as it will create a process by which a request is put in for access and instead of being delayed as the path is verified, it can move directly into managerial oversight for approval. Budget Product| Features| Cost| Bitdefender| Centralized AV updatesScalable user supportInternal firewallIntuitive GUIApplication supportInstallation assistance| $449. 95 per year per set of 20 computers/20 mobile devices| AlgoSec| Firewall path operation automationFirewall configuration change automationNegates access control rule auditsProduct support and updates| $10,000 (approximate quote)| Summary Without changes made to IT policy, requests upon the IT department for access to the network and the bi yearly audit of existing rules will eventually grind all departmental progress to a complete stop for months at a time. Automation in this arena as well as a universal standard for antivirus are dire in maintaining a secure network with the necessary resources to make changes as needed. In the face of company growth, if automation is not embraced, then it will become necessary to increase the IT staff by at least 50% within the next 2 years to simply maintain the status quo. Assuming an employee pool of 100, an investment in Bitdefender and Algosec at this time will cost $12,249. 75, with reoccurring annual fees of $2,249. 75. Such an amount if a far cry from an extensive uptick in staff. The end result will be a far more efficient IT department that will be able to accomplish more sustentative work with existing staff at hand. References AlgoSec. (2012, january). AlgoSec Security Management Suite. Retrieved February 18, 2013, from Algosec. com: http://www. algosec. com/en/products/products_overview AlgoSec. (2013, January). How to Buy. Retrieved February 18, 2013, from algosec.

Thursday, November 14, 2019

Free Essays - A Grain of Wheat :: Grain of Wheat Essays

Throughout my life I have read many novels. This book was very interesting. This is a compelling account of the turbulence that inflamed Kenya in the 1950s and its impact on people's lives. A brand new perspective upon the emancipation of so-called Third World Country .On the verge of Kenya independence, both colonizers and colonized were bewildered and confused. White colonial agents lost faith on their lifelong commitment, and Kenyans were cast into a precarious future, which they had been longed for, and at the same time, worried about. National passion became a nostalgia censorship and those who did not contribute to this "exploit" or those who chose to save his own skin or family and betray his to the movement bore a brand "Cain" on their forehead forever. A vivid description of the struggle between nation and individual. Despite Ngugui's flashback format A Grain of Wheat is certainly an attention keeper. Kenya at the brink of Uhuru (freedom) from the British, as experienced th rough the eyes of some interesting and greatly entertaining characters. Amazingly in the midst of this historical event the story is filled with love and betrayal. This is a tragic situation, where there can be no winners. It does not have heroes, heroes do not exist in tragedies- rather it has real people with real feelings, who due to the nature of the system, and their beliefs brought about by years of conditioning must come face to face with brutal realities. The book painfully traces the genesis of the conflict, and as demonstrated with Mugo, everybody is affected, you cannot be a bystander, neither is the people necessarily evil, but rather is as a result of complex situations that comforts them. Though, we do not want to believe, its with the quilt admission by Mugo, that makes him great, and which inevitably starts a healing painful process that must be addressed. Jomo Kenyatta is played a very important role in the backdrop of the novel A Grain of Wheat Through his role in the history of Kenya, his role in the novel as some what compared to Moses and his influentially book Facing Mount Kenya. Jomo Kenyatta played a vital role in the demanding Kenyan self-government and independence from Great Britain. Together with other prominent African nationalist figures, such as Kwame Nkrumah of Ghana, Kenyatta helped organize the fifth Pan-African Congress in Great Britain in 1945.

Tuesday, November 12, 2019

Comparing Beowulf with the Green Knight

When it comes to groundbreaking, classical literature, not many works can trump what Beowulf and Sir Gawain and the Green Knight have done. Although similar through importance, readers would be hard pressed to discover any more similarities between the two. Beowulf is an epic poem from the Anglo-Saxon period, while Sir Gawain and the Green Knight is a tale from the medieval period. The main characters of each novel, Beowulf and Sir Gawain, each endure personal struggles in the â€Å"problem of pride. In completely separate fashions, both of them lust for domination (libido dominandi) throughout each of their respective stories. Beowulf, the earliest of epic heroes, was significantly known for his bravery. With his lack of fear for death, he without a doubt was known as the greatest warrior at the time. However with great skill and the constant appraisal from fellow warriors, Beowulf becomes very boastful in his continued desire for dominance. In fact, his first words of the tale were, â€Å"When I was younger, I had great triumphs. Then news of Grendel, hard to ignore, reached me at home. Off the bat, he introduces himself as an accomplished warrior who felt it was his duty to slay the monster Grendel the minute he heard about his destruction. Beowulf revels in his decision to come over from Geatland to protect King Hrothgar and his people. He feels that this is his opportunity to come and â€Å"protect the thrown† in a God-like manner. Furthermore, in Beowulf’s quest, he completely ignores the medieval warfare’s protocol on weapons. While warriors typically use weapons in battle, Beowulf disagrees with this approach, risking his humanity while stepping outside of his human limits. He decides to fight Grendel on his own terms, and this over prideful, â€Å"superheroesque† mind frame (first interpreted as heroic) would come back to haunt Beowulf in his eventual death. As the story of Beowulf continues, Beowulf’s pride wears him down in his lust for domination. King Hrothgar, at one point, even warns a younger Beowulf to not let libido dominandi occur. Hrothgar proclaims, â€Å"He covets and resents; dishonors custom and bestows no gold; and because of good things that the Heavenly Powers gave him in the past he ignores the shape of things to come †¦ O flowers of warriors, beware of that trap. Choose, dear Beowulf, the better part, eternal rewards. Do not give way to pride. † However, Hrothgar’s advice doesn’t seem to help in Beowulf’s clash with the dragon towards the end of the tale. Beowulf was praised for his nobility when he was younger, but his aging only increased his lust for domination. He simply doesn’t care about the repercussions of his death, and how leaving them unprotected would severely impact his people. In conclusion, Beowulf recklessly battles this dragon to the death. He praises God before his death as he states, â€Å"To the everlasting Lord of all, to the King of Glory, I give thanks that I behold this treasure here in front of me, that I have been allowed to leave my people so well endowed on the day I die. † This ending, going out in a blaze of glory, was exactly what Beowulf wanted to happen. It was not exactly his fate, but his desire for glory was simply too strong, thus neglecting what should have been most important to him: the safety of his people. If he was truly a great hero, he would put the well being of others before his desire for dominance. In the case of Sir Gawain, his libido dominandi was enigmatic. Personal honor and valor seemed to be the two most important aspects of his life. Differing from Beowulf, Sir Gawain’s quest is a moral epic, and not one of physical attrition. However, Sir Gawain’s libido dominandi stems from his false humility, or in other words, his refusal to accept human failure. In the introduction of the story, the Green Knight travels over to King Arthur’s castle and demonstrates his Christmas game. At first, Arthur is asked to be put to the test, but in an act of chivalry, Sir Gawain (Arthur’s nephew/right hand man at the knight’s roundtable) steps up. He explains, â€Å"While so bold men about upon benches sit, That no host under heaven is hardier of will, Nor better brothers-in-arms where battle is joined; I am the weakest, well I know, and of wit feeblest; And the loss of my life would be least of any. † It is almost as if Sir Gawain undersells himself so much, to only further enhance his heroism. During his travels the corresponding winter season, Sir Gawain’s internal conflicts continue. He is fighting against his own demons; there is no Grendel (or any other physical monster for that matter) in this story, just a desire for moral reformation and satisfaction from others. In his stay at the Bertilak of Hautdesert’s castle, Sir Gawain’s morale is only further boosted. Bertilak states, â€Å"As long as I may live, my luck is the better that Gawain was my guest at God’s own feast! † In response, Sir Gawain quickly deflects the compliment and explains that the honor is his. Furthermore, after Gawain’s final interaction with the Green Knight, he flinches when the axe is first wielded towards his neck. This of course is a normal human reaction. But to this noble knight, it is completely unacceptable. This corresponds with his problems of Pride; Sir Gawain wears the green girdle around his arm given to him by Bertilak’s wife to constantly remind him of his wrongdoings (slightly giving into her seduction). After returning to a hero’s welcome, Sir Gawain’s false humility continues as he sulks about his minor faults and lives in shame. However, as those who surround him maintain their commemoration of him, his libido dominandi clandestinely grows. Throughout the text, Sir Gawain and the Green Knight, a common theme of â€Å"doubleness† is used effectively to portray the complexity of medieval life. In other words, there was never just one, blatant solution to courtly issues. In the case of chivalry, Sir Gawain was faced with social courtesy (secular) versus Christian courtesy (religious). In the case of the Green Knight, two separate images of positivity and negativity were deliberated. And in the case of the girdle, the knotted belt and open belt showcased two different connotations. During the medieval period, the policy of chivalry to the aristocracy ruled above all. It was a code of conduct developed from warrior knights. The debate between religion versus politics was significant during the â€Å"High Middle Ages† as personal morality became a big issue in 1400’s English literature. When Sir Gawain is first introduced to Sir Bertilak’s wife, â€Å"he politely approached; to the elder in homage he humbly bows; the lovelier he salutes with a light embrace. He claims a comely kiss, and courteously he speaks; they welcome him warmly, and straightaway he asks to be received as their servant, if they so desire. Honor, graciousness, and respect marked the typical knight’s introduction. However, Sir Gawain begins to question his honor when Bertilak’s wife begins her seduction tactics. Gawain is faced with the â€Å"doubleness† issue of doing what is right as a Christian versus doing what is right in knighthood. Should he deny the sexual advances because it was another man’s wife, therefore it was a sin against God, or should he accept the lady’s wishes out of honor and respect. The theme of temptation becomes the heart of this tale, as Sir Gawain’s adherence to the code of chivalry is constantly put to the test. After rejecting the first two advances, Sir Gawain begins to crack a little during the third and final bedroom scene. Bertilak’s wife changes her evasive language to a more assertive style, and her attire (moderate in earlier scenes) suddenly becomes risque and revealing. He declares, â€Å"My body is here at hand; your each wish to fulfill; your servant to command I am, and shall be still. † Gawain gives in due to the laws of chivalry, where knights are required to respect the set of laws concerning courtly love, and do whatever a damsel asks. The Green Knight also plays a huge role in continuing with the â€Å"doubleness† theme. This character is extremely difficult to interpret as some view him as a devilish figure whose only purpose is to tempt Gawain into sin, while some view him as a holistic figure whose purpose is to build Gawain into becoming an improved knight. In the Green Knight’s introduction to the Christmas party, he arrives with a holly branch and an axe. The holly branch represents peace and happiness, while the axe is supposed to represent violence and death. Furthermore, he states, â€Å"Not all, I think, for dread, but some of courteous grace let him who was their head be spokesman in that place. He immediately references God, but then counteracts that with his threats of beheading someone. To the reader, these two polar opposites begin to question what the Green Knight’s true intentions are. In addition, even the color green goes along the lines of the â€Å"doubleness† theme. During the medieval ages, the color green was conveyed as life, love, hope, and the birth chamber to some; while to others it provoked thoughts of jealousy, death, and sometimes the color of the devil. Towards the conclusion of the tale, the Green Knight’s true persona becomes revealed as he turns out to be the host, Sir Bertilak. This plays on with the theme of temptation, as this was all set up to test Sir Gawain’s honor and virtuosity. The girdle, which is the third theme of â€Å"doubleness,† contains a symbolic meaning that has been interpreted in a variety of ways. The girdle can be viewed as sexual or spiritual. Accordingly, the knotted belt of the girdle represented chastity, good faith, and virginity while on the contrary, the open belt represented sexual advances and poor faith. This girdle is very lavish, as it is made out of green silk and embroidered with gold thread (colors that link it to the Green Knight). Sir Bertilak’s wife claims that it possesses the power to keep the wearer of it away from harm. However, it is deciphered towards the end of the story that this girdle indeed has no magical properties, and was simply another experimental tactic used against Sir Gawain. While Gawain is able to resist the brunt of Bertilak’s wife’s sexual advances, he is unable to resist the powers of the girdle. When Bertilak returns home from each of his hunting trips, Gawain does not reveal the girdle and instead hides it in shame. This showcases the spiritual interpretation; his acceptance of the girdle is a sign of his faltering faith in God. After the Green Knight reveals his identity as Sir Bertilak/the host, Gawain curses the girdle for he believes it represents his cowardice. He states, â€Å"But your girdle, God love you! I gladly shall take and be pleased to possess, not for the pure gold, nor the bright belt itself, nor the beauteous pendants, nor for wealth, nor worldly state, nor workmanship fine, but a sign of excess it shall seem oftentimes when I ride in renown, and remember with shame the faults and frailty of the fresh preserve. Yet, the others celebrate him during his return from the quest. To show their support, Arthur and his people wear green, silk baldrics that appear just like Gawain’s girdle. The double interpretation of the girdle corresponds with its complex, multi-faceted symbol. This theme of â€Å"doubleness†, the constant use of temptation with more than one side, bec omes the main driving point in Sir Gawain and the Green Knight.

Saturday, November 9, 2019

The Cave – Creative Writing

Averting attention had always been far too easy for Deft. Imperial transponder codes, too easy to attain, to forge†¦ or have forged. â€Å"Commander Derivan, you have permission to proceed to sector 478. Please sir, do be careful, it is a savage world.†, the comm officer pleaded. â€Å"Thank you for your concern officer, it is duly noted.†, Deft arrogantly replied as he steered his Oppressor towards the planet. The small clearing was easy to see through the lush vegetation. He would owe the Captain for yet another favor. It was of no true concern to him however, he already owed him far more than he could probably ever repay. The lush surrounding vegetation violently shook as he touched down. Switching off the power, the whine of the generator slowly quelled, Deft stepped from the vessel, wearing only his robes under a black cloak, wielding his newly crafted lightsaber. The visions were weaker now, more distant. His thoughts were clearing. He began his trek through the dense jungle. Somehow, even after all this time†¦. Yinchorr felt inviting. The rocks around him hovered carefully in place. â€Å"You must feel it move within you.†, the small pyramid shaped holocron had instructed. The instruction was efficient. He was coming along quickly. The rocks began to swirl around him†¦ slowly at first, then gradually faster†¦. and faster still, until they were but blurred images of themselves. Deft's eyes closed with a cold determination as his head lowered slightly, focusing himself. The air seemed to hiss as the rocks spun violently around him. Images flooded his mind. Pale blue eyes, familiar, cold, callous. â€Å"You drove her away.†, the voice hissed. Pale blue eyes, calling to him distantly. â€Å"Why didn't you come?†, the new, softer voice implored. Pale blue eyes, exploding into blue flames. The flames faded to green. Deft felt himself pulled across the galaxy. Dathomir, a famliar place, once, home. The elder stood over the cauldron, her arms flailing in the air as she spoke her incantation. Spinning on her heal, her cold green eyes met with Deft's. â€Å"You only think you have won Deriun.† All he could see were the eyes. All he could hear, the roar of the flames. But no longer were they the Elders. Rosalyn gazed back at him. â€Å"Why have you foresaken me?†, her pained voice begged. Blackness. Void. A gentle hand reached out to him†¦. but he couldn't grab it, couldn't hold it, touch it. It slipped, further and further into the darkness. *CRACK CRACK CRACK* â€Å"GASP!†, The rocks had flown wildly out of control, and found themselves crashing into a nearby tree, the sound, pulling Deft from his vision. Even now, none of it seemed to make sense. He had come here for answers, but was only finding more questions. Training had been difficult. The holocron seemed to guide him with exercises intended to push a man beyond humanity. Deft yawned as it rambled on about running with the force, he had no interest in learning to be a coward. This wasn't helping the way he had hoped. He threw holocron in his pack. I've had enough of that. His red saber ignited, and he rushed off into the woods. For a fleeting moment, Deft succumbed to his youthful urges. As he ran through the foliage, he cut down branches, nicked rocks. Faster and faster, leaving a wake of mild destruction in his path. The trail of smoke and destruction, came to an abrupt halt. Deft stood, silently, watching out over the open field he had come to. â€Å"I do†, the words rolled so easily off of her lips. Deft had honestly never thought he'd see her again. The day she married Martyn, a piece of him had died. Then he saw the Watchtower, sitting high above Penumbra. â€Å"I am hearing rumor that there is to be an arranged marriage Deft.†, her words cut him. â€Å"My dear, I would never allow such.†, the words caused the air to stiffen, silent for a fleeting moment, â€Å"If we were to wed, it would be because we love each other.†, Deft stepped in, kissing her for the first time. The kiss, her hands at his back†¦.. they burned. Seering pain raged through him, coursing through his veins. He dropped to the ground, in utter agony. His scream echoed through the empty field. Then, he saw her, shackled to a grate, dangling over a flame, flickering between green and blue hues. Was this a vision of things to come? The vision changed as quickly as it had appeared. Rosalyn and Boden stood in the purple fields of Dantooine, together. Boden grasped her hand. The pain was becoming unbearable now, he could almost feel his flesh melting from his body. Sleep†¦.. it was the only escape. Deft's worn body, and torn psyche, collapsed to the ground, saber in one hand, and a small purple Corellian flower in the other. â€Å"Soon, my dear Aklin†¦. very soon indeed.†, the woman's cackling echoed in Deft's mind as he awoke. The rain fell on his face, but the soft touch of rain could not alleviate the pain he felt. He touched his back, the memory of the agony still with him. How long had he been asleep? How long had he been lying here? For a brief moment, he looked at the flower in his left hand, before tucking it safely away, wrapped in a piece of paper, in his pack. Through the foliage, he sensed something. Something nearby. Something, strong. He made his way cautiously, silently, through the jungle. His head peaked around a large tree to see it. As he stood in the entrance, he could sense something. It clouded him slightly, and for the first time in days, he was not thinking of the visions he had been having. Something was tuggin at him, something from deep within himself. This was the reason he had come here. This, was the reason he had journeyed so far. Why, he did not know, but something inside of him verified the uncovered truth. Something inside, told him that this was where he needed to be. Just inside the cave, he saw him. The hooded figure turned away from him, looking deeper into the cave of which he occupied. Who was this man? How could he have gotten here? Yinchorr was blockaded to all non-Imperial personnel. Even then, only the Imperial Royal Guard, and their hopeful trainees ever really came here. As Deft slowly enterred, time no longer existed. Space but a fleeting human assumption of distance. Everything, always, was right here. Such power, such depth, Deft had never felt before. â€Å"What is this place?†, he spoke out to the hooded figure. Anticipating to startle the man, his responce was far different than what he would have anticipated. â€Å"This my young friend, is your future†¦. and your past.†, the eerily familiar voice stated. The figure stood silent, gazing off into the distance as he approached. Then, as his footsteps brought him ever-closer, the man finally turned. The Emperor's visage, torn, weathered. Deft had never seen him like this before. â€Å"Deft, now you shall see.† There was no possible explanation for this. Deft knew it to be implausible for the Emperor to be here, and yet, here he was. Was he hallucinating? What manner of trickery was this? He turned to glance back at the entryway, but it was no longer there. Everything went foggy for a moment. His mind, his thoughts, even what he was seeing. When his eyes returned to where the Emperor had been standing, they did not meet his, they met†¦. theirs. Before Deft stood the four women he had ever truly loved. Yvaine, Lelu, Nydari and Rosalyn. In unison, they looked to him with pleading eyes and said, â€Å"You have abandoned us Deft†¦. why?† â€Å"You were the only man I ever loved, and you left me in your pursuit of power.†, Yvaine looked at him, her slave collar still attached, her subtle blonde braids gently caressing her tender neck where the collar had caused bruising. â€Å"Without you, I couldn't go on.†, her voice callously stated as she slapped him. â€Å"You never understood Deft, you never listened.†, Lelu said, her soft black hair blowing gently in the growing angry breeze, â€Å"I left you, because you had no time for me.† Nydari's gaze met his now, her cold callous blue eyes cutting through his soul. Deft heard not her words, he could feel what beat in her heart. He had taken her son, and for that, he could never be forgiven. â€Å"Deft, you never came for me.†, her eyes begged for a reason, â€Å"You gave up so easily, so much for love I guess.† â€Å"You left me to die on Dathomir.†, Rosalyn's words made little sense, â€Å"You allowed the Nighsisters to have their way with me.† Her inviting red hair still bore the subtle trace of a helmet. Deft could not help but wonder, was he able to speak with them now†¦. because they were all dead? He dropped to his knees, sobbing, the situation too much for even him, to handle. The incessant yelling stopped, all was quiet. Deft took control of himself once again, regaining his composure. Slowly, he raised his head to see the horrid depiction. All four of them†¦. lie dead before him. Their bodies broken, twisted lumps of flesh that once held a vibrance for life he fed off of. Now, empty vessels. The Emperor once again stepped forward. â€Å"What manner of treachery is this?†, Deft implored, â€Å"They cannot be dead.† â€Å"There is no treachery here, only truths within yourself.†, the Emperor explained, â€Å"What you see, is a mirror of what lies deep within you.† Deft knelt before the four corpses, and then, they came. From the shadows they stepped, each armed differently, each, having a different reason for being there. Those reasons, were the women lying before him. Percy, the insecure boy, placed a gentle hand on Yvaine's head, brushing her flowing blonde braids away from her green eyes. Then, turning his angry, jealous gaze to Deft, he unsheathed his blade. Noldat stood over Lelu Orion, his eyes never waivering from Deft's, this had been a long time coming. His pistol unholstered, and prepared to slay his sworn enemy. Wraidth shed a gentle tear as he touched Nydari's soft blue lekku one last time, unsheathing his sword, he snarled at him. â€Å"I would have cared for her as you never could.† Finally, Boden. Deft stood mildly perplexed at the sight, as Boden's eyes filled with rage and tears stared callously at him over Rosalyn's torn body. No words were spoken, but Deft did not need to hear them, he knew why Boden was there. However, was this a depiction of the truth†¦. or a vision of his own paranoia manifesting itself? In unison, their voices echoed through the cave, â€Å"We loved them as you could not. We cared for them, where you would not. In return for this, you destroyed them in your own lustful search for power.† Deft had no words. No charming way of explaining away the mishaps of his life. No intelligent responce to dissuade the anger and hatred in the room. He allowed his anguish to take hold. His saber ignited, the crimson hue echoing off of the walls, the color only amplified the tension. The hum of the weapon, requesting bloodshed. Percy was the first to charge, and the first to drop. With a gentle flick of the wrist, Deft tore through the young man's weapon, and his flesh. His now lifeless body, fell ironically parallel to that of Yvaine's. Noldat opened fire, and Deft's saber found the blaster bolts of it's own accord, deflecting them haplessly into the cavern's walls. His rage focused inward for a fleeting moment, and manifested itself in a bolt of lightning, sending Noldat to the ground in a lump of mangled and burned Rebel flesh. Wraidth did not hesitate, his scythe had cut Deft before he even had a chance to focus his attentions on his assailant. Blood dripping from his left shoulder, the open wound stinging with agonizing pain, Deft did not cringe, but found new purpose in it, new, unadulterated fury with which to wield his lightsaber. For his treachery, Deft cut him down to size, removing the better part of both his legs, just above the knee. As he lie there, helpless, Deft stepped forward to end his suffering. Wraidth's head made a gentle stop at Boden's feet. Both men stared at each other cautiously. Boden's indigo blue saber reverberating off of the walls, creating a purple hue as it mixed elegantly with the crimson of Defts that had already resided there. *CRACKLE HISS* Their blades met for the first time, held against each other, the sounds became almost deafening as they sparked and slid along one another. Deft arrogantly spun with his blade, driving Boden backward. With a kick, Deft pushed him even farther back as the green bolt erupted from his off hand. â€Å"Show me the truth.†, Deft asked of Boden's mind as he invaded it aggressively. The trick he had learned from the Nightsisters might just prove useful. Boden dropped to the ground, clutching at his head in agony. Yet still, Deft felt no battle, no conflict for the right to attain the knowledge he sought. Now Deft knew, this was not real. With a cold, calculated slice, Boden was no more. A soft voice invaded the newly created silence, â€Å"Deriun?† â€Å"Deriun, is that you?†, the voice called to him. After all these years, her soft voice still sent chills down his spine. He turned to face her. â€Å"I no longer go by that name†¦. mother.†, his cold callous stare met hers. Still adorned with rags, and carrying several collars in her hand, she snarled at him, â€Å"Nonsense, now get your things, we have to pick up some more goods this afternoon.† ‘Goods' was her more humane term for slaves. The idea that anyone could try and tone down what slavery was with simple verbage still sickened Deft. A swift backhand caught Deft off guard, his head cocked to one side partly, stopping midway as if to declare resistance. â€Å"You heard your mother boy, get ready.†, his father said angrily to him. As he stood there, looking at his parentage, something inside him snapped. It was all so much clearer. It all made sense. These people, they were nothing but pawns in a much larger game†¦ a game, Deft now played. A game of power. They were little more than cattle, to be done with as he saw fit. Wraidth's scythe hovered in mid air, both his parents stood there, confused at it's sight. â€Å"So boy, you think you've finally become a man? You think you're going to use that blade to kill us?†, his father nervously taunted, trying to play on Deft's insecurities. Insecurities that died long, long ago. â€Å"No father, I have no intentions of such.†, a cold grin formed on Deft's face as he called on the strength of the force, â€Å"She is going to kill you.† The blade hung still in the air before his mother, â€Å"Take the blade woman, and dispatch him.†, Deft said coldly with a slight hint of triumph in his voice. Her confused and shaking hand took hold of the hilt, she hesitated as she drew it back, â€Å"Let go your rage, allow the blade to find it's way.† â€Å"This is ridiculous.†, his fathers fearful expression made it quite apparent that he did indeed realize that this was no jest, â€Å"Woman, put that damn thing down and go get the slaves cleaned up.† â€Å"Now.†, Deft uttered but one word to reinforce his statements, his hand barely moving to send his message clearly, reinforced by the dark side within him. The blade moved swiftly, cleanly. From his shoulder to his nether regions, it made it's cut. A gentle red mist hung in the air, spackling her torn dress of rags. She dropped to her knees in front of her now lifeless spouse. The blade hit the ground, the sound of the metallic clang echoed through her soul as she realized what she had just done. Tear filled eyes looked to him, â€Å"Why Deriun? Why would you make me do this?† â€Å"Because I can.†, he said simply. The scythe flew true, of it's own volition, through her, pinning her ten feet in the air against the wall. Her last breath escaped, the gentle death rattle the only sound now heard in the cave, quickly replaced by the sound of her blood dripping on the floor. A cackle broke out from behind him as he callously stared at his now dead mother. â€Å"Good†¦. good.†, the voice with satisfaction, â€Å"You have done well, Lord Aklin.† He turned to face the voice, and again met eyes with the Emperor, his sinister grin filling the room with a cold warmth. â€Å"I do not understand, how can this be?†, his confusion showing on his face imploringly, â€Å"What is this place?† â€Å"This place is a mirror of your own inner self my friend.†, the Emperor placed a hand at Deft's back, walking with him casually, â€Å"It is a nexus for the Dark Side which all Jedi must at some point face.† â€Å"So this is a test?†, Deft's question had already been answered in his own mind, he needed his answer to be validated however. â€Å"You could say that. I prefer to look at it as a decision rather than a test.†, the Emperor chuckled. â€Å"I see.†, Deft turned to face the Emperor again, â€Å"I came here, I thought, to find answers.† â€Å"My boy, I am not here to give you the answers you seek.†, he coldly stared at him, â€Å"I think you already have those answers within yourself.† Deft had so many questions to still be answered, â€Å"And how is it you are here?. The Emperor smirked at him, â€Å"I am not here.† With that, the Emperor vanished, and Deft found himself standing again in the entryway of the cave. It was not long after that Deft found himself sitting at the foot of his Oppressor contemplating his existence. What was all of this for? What lessons were to be learned? Why was he doing all of this? For the Emperor? For himself? Where had it gotten him? The Emperor had always promised him, one day he would understand, but perhaps, even the Emperor, could not foresee what was to come. *beep beep* His subspace com erupted with authority. Deft could sense it. â€Å"Yes my Lord?†, he said, knowing exactly who it was. â€Å"I sense you have done well Lord Aklin.†, the cold feeling of triumph was apparent, â€Å"Now†¦. you understand.† â€Å"Yes†¦.. I do.†, he replied, his tone uncaring, indifferent. A short hesitation hung in the air before he proceeded, cutting the Emperor off as he begun to speak, â€Å"I understand that I have grown tired of your meddling old man. And perhaps†¦. a change is indeed needed.† The Emperor's sudden rage could be heard as Deft simply deactivated his com and boarded his ship. Activating the radio aboard The Subterfuge, he quickly contacted Tovina, â€Å"My dear, I think we need to have a little discussion.† Deft knew now what he sought, and being subservient to Palpatine was no longer fitting for him†¦ he was better than that†¦ stronger. The time had come for Deft to take what was his†¦. by force. For the Emperor had indeed twisted him to the Dark Side as intended, though, perhaps he twisted a bit too hard. Perhaps†¦. now it was Deft's turn, to twist back.

Thursday, November 7, 2019

buy custom Impact of Looping on a Urban Middle Schools essay

buy custom Impact of Looping on a Urban Middle Schools essay When Rudolf Steiner founded the first Waldorf Schools in Austria, in the beginning of the 20th Century, the idea of building long term relationships between teachers, students and parents was born. The schools were originally designed to accommodate the children of the Waldoft-Astoria factory workers children. (LAB 1997. p. 3.) There are different other names of the method of allowing children to stay with the same teacher for two-to three years. The most common expression, used by education professionals is looping, however, some call it multi-year grouping or continuous progress. Although in Waldorf schools teachers stayed with the same students through year 1 to 8, today looping lasts for a shorter period of time. There are different methods adapted in Europe, and in Germany, students and teachers stay together through year one to four. Similarly, in Middle and Eastern Europe, there is a system to assign one key teacher to the class for lower grade (1-4) and upper grade (5-8), whi le there are some supporting teachers assigned to teach specialist subjects, like sports, music, languages or science. Providing children with the most supportive environment in school in the years of adolescence has a great importance. Creating meaningful relationships is important, and the more disadvantaged children are, the more crucial role the school and educators would be. Although teaching the same class for more than one year would create extra challenges for teachers, there are many opportunities lying in this method. The transition between classes goes smoother, and instead of trying to understand other educators reports and comments on individual pupils teachers would be able to take children further based on their own experiences. When extra support is needed, the method would be successful, however, the risks are that if the level of education is low, children would be disadvantaged by not getting enough motivation and stimulation to try and achieve better results. General Benefits of Looping When reviewing the efficiency of looping, it is crucial to examine both social and academic aspects. Although staying with one teacher would help children feel more secure, they might miss getting to know other teaching styles and personality types of adults, which would be viewed as a disadvantage. The teachers level of knowledge should also be examined carefully, to ensure they can deliver next years academic projects as well. Prior to the developments in the beginning of the 1900-s, (Grant, Johnson, Richardson, 1996) looping was used, but not to enhance performance or student experience. Duing the 1980-s, looping gained more popularity, mainly in elementary schools. (NMSA, Online.) The advantages of looping consist of the following elements: (NMSA, Online.) time, relationships, student support and engagement. These advantages are detailed below. Time can be saved during the second and third (occasionally fourth) years of tuition, as the educator will not have to spend time on getting to know the strengths and weaknesses of every single pupil. Reviewing class transition documents would be hard when getting twenty new class members to teach, therefore, the teacher is able to focus on delivering the curriculum, instead of socializing. The socialization project might continue during the summer holidays as well, to keep pupils engaged and save even more time getting back to the old habits and orders of school life. (Crosby, 1998) Relationships can be improved between peers, as well as student - teacher and teacher-parent interactions. Working together in the classroom and having more time to build relationships with the teacher would have a positive effect on the sense of security. Social competence can be improved, which is important in the case of disadvantaged and minority children. A greater sense of community can be created for the later adulthood, (Westerfield, 2009) Support and community engagement can also be improved in schools using looping as an innovative development tool. As during adolescence, the frustration level of students grows significantly, returning to the same classroom and knowing what to expect of the teacher would contribute towards a better atmosphere and increased satisfaction. (Forsten et al., 1997.) Concerns Regarding Looping While looping seems to be a simple task in elementary school, in middle schools, like the particular one in question examined by the study, this might be challenging for a teacher, who is used to teaching one subject or particular curriculum. In the school in question, there is an existing shortage of staff, and the number of students did not decrease significantly. This indicates that the stress level of teachers is already high, therefore, a careful consideration should take place, before assigning new and more challenging responsibilities for educators. The staff shortage might mean that teachers need to undertake some additional courses to be able to deliver the knowledge. The school needs to ensure that they keep the level of underachieving students the same across looping classes, to provide equal opportunities for development and achievement. Some researchers argue that studdents might feel left out and they would be cut off new experiences. (Hegde Cassidy, 2004). Conflicts could get worse if teachers and pupils have to deal with issues on a daily basis for longer. The Implications of Looping on Middle Schools Many researchers have already proved the thesis that looping is extremely effective in middle schools. It can promote constructive work, higher parent and student engagement, and this is the main reason agencies recommend this restructuring method for underachieving schools in the USA. There is a need for careful planning and research, as well as introduction and laying the foundation of the project to make the implementation of the new structure successful. The above study was created to examine the implications, development areas and risk factors of implementing looping within urban middle schools. The school examined has not met the required targets for six consecutive years, and a decision was made to reconstruct the system and implement looping throughout year 6 to 8. Although the statistics of the individual school have been analyzed and a careful assessment has been created based on evidence, there is a need for ongoing monitoring of the progress. The importance of parental involvement and communication has been determined, and the study did take into consideration not only quantitative, but also qualitative data as well. The creators believe that without a supportive and inclusive school environment, there is no space for children to grow. Although looping would provide security and consistency for students, special measures need to be put in place, which are included in the recommendations section of the study. After analyzing the progress and decline in academic results, the study found that looping would be a sufficient and positive step to make a difference. Although it is not a system that is designed to be used by any school and it has its own risks, students, parents and teachers would be able to benefit from the changes. Certain risks are also associated with looping, and these were examined from the individual schools perspective to create a guideline for implementation. The framework was developed based on research study results and national statistics. Looping as it is a fairly new method to be used in large population urban middle schools and statistics are limited needs to be closely monitored. Looping itself does not improve academic results, parent involvement and staff commitment levels: the way of implementation, effective communication and advanced support system together with looping teachers ready to go the extra mile for children would. Buy custom Impact of Looping on a Urban Middle Schools essay

Tuesday, November 5, 2019

Using a Semicolon in Spanish

Using a Semicolon in Spanish The semicolon, or el punto y coma in Spanish,  is used and misused in Spanish much as it is in English. However, the rules for its application in Spanish can be more subjective than for the other punctuation symbols (signos de puntuacià ³n) and lead to a larger range of common mistakes. Still, there are two main utilities of the semicolon when writing in Spanish: joining independent clauses or detailing a list of items with multiple names in each section of the list - in both of these cases, the semicolon acts much as it does in standard English, separating thoughts into a neat, organized form. Be aware t;hat the punto y coma is invariable between singular and plural. In other words, the plural of el punto y coma is los punto y coma. You can also use los signos de punto y coma as a plural form. Using Semicolons Instead of Periods As its Spanish name suggests punto y coma means period  and  comma, which emphasizes its primary use as being to represent a break between independent clauses (a part of a sentence that could stand alone because it has a subject and verb) that is stronger than what a comma would stand for but weaker than what a period would stand for; the two clauses should be connected as part of a thought or relate to each other.   Note in these examples that separating the clauses with periods would not be wrong, but the use of a semicolon suggests a stronger relationship between the two clauses than making them into separate sentences would: Cuando estoy  en casa, me llamo Roberto; cuando trabajo, me llamo Sr. Smith. (When Im at home, Im Robert; when Im working, Im Mr. Smith.)Esta tarde vamos a la playa; los museos estn cerrados. (This afternoon we are going to the beach; the museums are closed.)En 1917, se inaugurà ³ la Estacià ³n de la Sabana; à ©sta funcionà ³ como punto central del sistema fà ©rreo nacional. (In 1917, the Sabana Station was put in service; it functioned as the center of the national railway system.) If the clauses are especially short, a comma is preferred in Spanish, such is the case with the sentence Te quiero, eres perfecto or (I love you, youre perfect), where it is grammatically acceptable to separate these two short ideas into one cohesive sentence. Using Semicolons in Lists Another use for the semicolon is in lists when at least one of the items in the list has a comma, as in English. In this way, the semicolon functions as kind of a supercomma. In the first example, the semicolons act as separators in the list of countries with deceased populations to provide clarity to the sentence structure. Encabezan la lista de los paà ­ses americanos con ms decesos Brasil y Colombia con seis cada uno; Mà ©xico con tres; y Cuba, El Salvador y Estados Unidos con dos. (Leading the list of American countries with the most deceased are Brazil and Colombia with six apiece; Mexico with three; and Cuba, El Salvador and the United States with two.)Los nominados son El ngel, Argentina; La noche de 12 aà ±os, Uruguay; Los perros, Chile; y Roma, Mà ©xico. (The nominees are The Angel, Argentina; 12-Year Night, Uruguay; The Dogs, Chile; and Roma, Mexico.)Mis parientes este verano viajan a todos lugares: mi madre, a Santiago; mi padre, a Sevilla; mi hermano, a Nueva York; y mi hija, a Bogot. (My relatives are traveling everywhere this summer: my mother, to Santiago; my father, to Seville; my brother, to New York; and my daughter, to Bogota. Semicolons can also be used in vertical lists at the end of each item other than the final one, such is the case with the following. Although the English example uses periods, commas (but not semicolons) can also be used in English: Tenemos tres metas:- aprender mucho;- amarnos;- vivir con autentididad. (We have three goals:- To learn a lot.- To love each other.- To live authentically.) Key Takeaways Semicolons in Spanish are used much as they are in English, as a punctuation mark that combines uses of the period and the comma.One common use of semicolons is show a connection in meaning between two clauses that would otherwise be made into separate sentences.Another common use of semicolons is to provide clarity in lists.

Sunday, November 3, 2019

Fundamental Musculoskeletal MRI Essay Example | Topics and Well Written Essays - 1500 words

Fundamental Musculoskeletal MRI - Essay Example However, similar to the posterior elbow, only one capsular attachment covers these two fossae. The proximal end of the ulna has two processes, the olecranon and coronoid, with the former being the site of attachment of the triceps tendon. Aside from the head, the radius also has a tuberosity, located beneath the medial aspect of the neck (Bhutani, 2011). The structure of the elbow is maintained by a weak fibrous tissue that envelopes the whole joint. The synovial membrane lines the inner surface of the capsule, and in between the synovial membrane and capsule are several fat pads. The collateral ligament complexes on the elbow are found to overlie the capsule. The radial or lateral collateral ligamentous complex consisting of the the radial ligament, annular ligament, lateral ulnar collateral ligament, and accessory ligament attaches superiorly to the lateral epicondyle and inferiorly to the radial notch of the ulna and to the annular ligament. On the other hand, the ulnar or medial collateral ligament spans from the medial epicondyle to the coronoid and olecranon processes. At the elbow is another joint, called the radioulnar joint, which is between the radial head and the radial notch of the ulna (Bhutani, 2011). Figure 1. Diagram of the Elbow. From The Ohio State University Wexner Medical Center. Tennis Elbow [online] Available at: In conducting elbow MRI, patient can be positioned prone or supine, with the arm overhead. Taking the latter is more comfortable for the patient (Vahlensieck, Genant, Reiser, 2000). Imaging is from 10 cm above the elbow joint to the bicipital tuberosity (Bhutani, 2011). The elbow MRI imaging options are axial, sagittal, coronal, oblique and reformatted thin-section gradient-echo images. The axial image is necessary to assess