Friday, May 31, 2019

Sociological Imagination vs. Common Sense Essay -- Sociology

Sociological Imagination vs. Common SenseThis essay forget aim to exempt differences between the sociological imagination and common sense. What the sociological imagination and common sense are and how they are at work in our society today. Using the area of educational achievement I will bring into this essay examples through research and findings from sociologists such as Pierre Bourdieu, Culture Capital (1977), Bernstein-(1961)speech patterns and Paul Willis (1977)learning to labour, and use these examples as evidence to show how these would explain educational achievement in relation to the sociological imagination and common sense assumptions. I shall begin this essay by discussing where the sociological imagination arose from and what this is in comparison to common sense.American sociologist C.Wright Mills (1959) published a sociological text called The sociological Imagination (1959), C.Wright Mills wrote in his book about the troubles of milieu the word milieu means (e nvironment) this was sceneed at as being where an individual will find themselves in a situation that is of a personal brotherly setting to them and therefore could indeed affect them personally and in some extent the situation be this persons making. Mills(1959), also wrote about public issues of social structure, referring to matters that go beyond the individual and look at society as a whole. How society is organised and how society works. This goes far beyond the troubles of milieu, as it doesnt look at the person and there individual experiences in society but looks at the wider social structure e.g social institutions education, religion, family, law and how they have developed and interact with each other examples of the differenc... ...ion, Sociology making sense of society, 4th ed, Harlow, Pearson Longman, pp. 604-605.Mills C.Wright (1959) The Sociological imagination , Harmondsworth, England, Oxford University Press.Office of National Statistics (2004), Education, Et hnicity and Identity, Available from http//www.statistics.gov.uk/cci/nugget.asp?id=461 accessed 28 September 2010, Cite as (office of National Statistics 28 September 2010)Pierre B (1961) Culture Capital Cited, Taylor P Richardson Jr John Yeo, A, (1995), The class structure and educational attainment, Sociology in Focus, pp.297, Ormskirk, Causeway Press.Scanlan J Stephen Guest-editor Grauerjolz Liz (2009) 50 Years of C.Wright Mills and the Sociological Imagination, Teaching Sociology 37, (1), pp1-7 Willis Paul (1977) Learning to labour, Westmead, hants, England, Saxon House, Teakfield Limited.

Thursday, May 30, 2019

Napoleon I Essay -- essays research papers

snooze INapoleons life was a very interesting one. Starting a poor boy, hated by most,rising to rule a huge empire, and then finally being destroyed by his ownarrogance and ending his life humbled, remembering what he had doe, and leavingit all in his memoirs for the world to read.Napoleon was born in 1769, on the Island of Corsica. His parents, Carlo andLetizia Bonaparte, were poor nobles. When Napoleon was just 10 forms old, hisfather helped to get him a mathematical knowledge to a soldiers school atBrienne. In the school, Napoleon was hated and considered a foreigner. With nofriends, Napoleon concentrated on academics, but still scarcely graduated 42nd in usclass of 58. he then continued his education at the Military academy of Paris.After one year there, he became second Lieutenant of artillery, at the age of 17.As a Lieutenant, Napoleon did a lot of reading, mainly in the subjects ofhistory, geography, economic affairs, and philosophy. Napoleon was charge to apost at the Valence garrison when he became a Lieutenant, but spent most of histime in Corsica, without permission. During one of these visits, Napoleon had fretfulness with a Corsican nationalist, named Pasquale Paoli, and Napoleon and hisfamily fled to Marseille in 1793.Later in 1793, the beginning of the French revolution, Napoleon led anartillery brigade to push out a British fleet that the Royalists had allowedin. Napoleons mission was a success, and he was promoted to general, andwas assigned to the army in Northern Italy. During the early part of therevolution, Napoleon had supported Maximilien Robespierres revolutionarygroup, and when Robespiere was overthrown in 1794, Napoleon spent two monthsin jail for being associated with him. When he was released from jail,Napoleon refused to fight a rebellion in Vandee, and he lost his militaryposition for it.In 1795, Paul Barras, the military leader of a soon to be implementedgovernment, asked Napoleon to fight a revolt in Paris, Napoleon accept ed,and quickly ended the revolt. When the directory, the government Barraswas part of, came into power, they rewarded Napoleon by appointing himthe commander of the army of the interior in 1796. He also married Josephine deBeauharrais in the said(prenominal) year. Later in 1796, Napoleon launched a campaign topush the Austrian and Sardinian armies out of Northern Italy. Napoleon qui... ... fled to Paris, refusing to give upany territory, fearing that doing so would result in an overthrow.In 1814, the coalition invaded France. Napoleon tried to take advantage ofthe distance between the armies approaching Paris by picking them onward one by one,but was eventually outnumbered. Napoleon gave up his rule and was exiled to theisland of Elba, and giving small amounts of governmental power there. LouisXVII took the crown of France. Aware of the French peoples dissatisfaction withLouis XVIIs rule, Napoleon returned to France in 1815. Napoleon marched towardParis, going through areas in wh ich he was popular, and King Louis fled thenation. Napoleon said that he wished to return in peace, but the ally preparedto push him out. Napoleon won several early victories against the rush ofallied attackers, but was defeated for the last time at the battle of Waterloo.Fleeing abide to Paris, Napoleon once again stepped down, and surrendered to theBritish ship Bellerophon. The British exiled him to the Island of Saint Helena.Napoleon spent the remaining six years of his life living with his writing table anda few friends. There, he dictated his memoirs. He died on May 5, 1821.

Wednesday, May 29, 2019

September 11: An American Victory :: September 11 Terrorism Essays

September 11 An American Victory The terrorist attack on the World Trade Center and Washington DC has been described as an act of war and a tremendous castigate for the joined States, a defeat that must not be allowed to be repeated and a loss that must be avenged. Personally, I dont like the use of the phrase Act of state of war. Wars are something that happen between states. Wars end when virtuoso side concessions. If we treat this as a literal war, what will be the victory conditions? Who will surrender? How will we know that the war is over? Whose suit for peace will be listened to? But, for the sake of discussion, let us ignore these concerns, let us consent to for the nonce that the language of war is appropriate. Let us put aside the questions of who exactly the enemy is. We know, at least, who 19 of the other sides foot soldiers were. We know, more or less what happened. Im willing to set these questions aside because I have become angry, angry about how we ourselves a re viewing the outcome of this attack, and how we are letting the domain view it. I am angry about how we are viewing the acts of heroes, and how we are view ourselves as a nation. Let me state this quite clearly... The United States did not lose the Battle of September 11, 2001. Claiming that we did diminishes the heroism that Americans showed. It underestimates American strength and it misses some very important points about the American character. There were quatern phases of the battle, four attacks. The first two took us completely by surprise, and can easily be viewed as a two pronged attack. Two transcontinental planes loyal from Boston were turned into bombs and used to destroy the twin towers of the World Trade Center. Because they had the element of surprise the enemys first thrust was extremely effective. The battle started very badly for us. The third phase occurred in Washington DC. The enemy hijacked a third commercial airliner. This time, however, US intellige nce and technology began to come into play. At least one passenger was able to contact the Justice Department, inform them of what was happening and ask what instructions should be passed to the pilot. Im speaking here, of course, of Barbara Olsons phone call to the Solicitor General, her husband Ted.

Macbeth: Serpentine Imagery Essay -- essays research papers

The snake has long been used as a symbol of sly subtlety. A serpents presence has been characterized by cunning cynicism dating as far back as biblical times, when the snake persuaded Eve to eat the forbidden fruit of Edens garden. even so the phrase snake in the grass expresses latency. Shakespeare uses this treacherous reptile in Macbeth to convey the same evil. In his poetic prose, Shakespeare may not speak of a characters malevolence directly rather, he alludes to it through serpentine imagery. Macbeth contains four separate images of this type. What is their purpose, and what do they signify? A deep undercurrent of kernel flows beneath each image. In act one, scene five, Lady Macbeth tries to instill invisible evil into herself and her husband in preparation for Duncans murder. She asks for supernatural unsexing, for a thickening of her blood that will stop up th access and passage to remorse. She fears her husband is too weak to murder Duncan, which she believes is Macbeths only avenue to the crown. After tauntingly questioning her husbands manhood, she convinces him to follow her gory plan and gives him instructions to do so. To beguile the time, look like the time. Bear incur in your eye, your hand, your tongue. Look like the innocent flower, but be the serpent under t. She says that to succeed, they must feign mediocrity amongst their guests, concealing their sinister desires. Appearing convening will not invoke suspicions. The serpent Lady Macbeth s...

Tuesday, May 28, 2019

The Reference of Theoretical Terms :: Philosophy Philosophical Papers

The Reference of Theoretical TermsABSTRACT A popular explanation of the success of theories of science is that of scientific realism. It maintains, besides that the theories of a mature science atomic number 18 typically approximately true, that observational terms and theoretical terms refer to or denote entities. Therefore it is part of the living claim that reference explains success. But if the realist is not able to clarify reference and a fortiori the reference on theoretical objects, the realist comes to a vicious circle, for there is no further criterion as the success of the surmise to show that the term is referential. So it is necessary to clarify the notion reference. Needless to say, reference is a analogyal term but it easily becomes a problem that we are not precisely habituated to imagine the elation but we are convinced that a relation is just a relation in the midst of entities in a strict (viz., Quinian) sense. There are different kinds of references. For exa mple, one is usually called intentionality. If we, considering the traditional separation between reference and meaning, analyze meaning, we will find at least one referential component (intentional object). Such a referential process is not a meaningless aspect of linguistic reference, but now and then is the subject of the kind of relation called denotation. The notion of meaning and the concept of reference are nonsubstantial constructions of interpretation. Nevertheless, I argue for a reference-theoretical approach. A popular explanation for the success of scientific theories is made by presupposing scientific realism. The realists thesis maintains that typically the theories of mature science are approximately true and that observational terms and theoretical terms do actually refer, i.e. they denote entities.Therefore, it is part and parcel of the realistic claim that it is reference which explains theory success. But if we or the realist are not able to clarify what reference is and a fortiori cannot specify the reference to theoretical objects, we, and especially the realist, become composite in a vicious circle, without any further independent criterion apart from the success of the theory which shows that the term is indeed a referring term.It is therefore clear necessary to clarify the notion of reference.Needless to say, reference is a relational term but immediately a problem arises here namely, that we not only habitually imagine the relata, but we are also convinced that a relation can only be a relation between entities in a strict (Quinean) sense.

The Reference of Theoretical Terms :: Philosophy Philosophical Papers

The Reference of Theoretical TermsABSTRACT A popular explanation of the success of theories of science is that of scientific realism. It maintains, besides that the theories of a vaned science are typically approximately true, that observational terms and theoretical terms refer to or denote entities. hence it is part of the realistic yell that name and address explains success. But if the realist is not able to clarify reference book and a fortiori the reference on theoretical objects, the realist comes to a savage circle, for thither is no further criterion as the success of the theory to show that the term is referential. So it is necessary to clarify the notion reference. Needless to say, reference is a sexual relational term but it easily becomes a problem that we are not only habituated to imagine the elation but we are convinced that a relation is just a relation between entities in a strict (viz., Quinian) sense. There are different kinds of references. For example, o ne is usually called intentionality. If we, considering the traditional separation between reference and meaning, analyze meaning, we will find at least one referential component (intentional object). Such a referential fulfil is not a meaningless aspect of linguistic reference, but now and then is the subject of the kind of relation called denotation. The notion of meaning and the concept of reference are nonsubstantial constructions of interpretation. Nevertheless, I argue for a reference-theoretical approach. A popular explanation for the success of scientific theories is made by presupposing scientific realism. The realists thesis maintains that typically the theories of mature science are approximately true and that observational terms and theoretical terms do actually refer, i.e. they denote entities.Therefore, it is part and parcel of the realistic claim that it is reference which explains theory success. But if we or the realist are not able to clarify what reference is and a fortiori cannot specify the reference to theoretical objects, we, and peculiarly the realist, become entangled in a vicious circle, without any further independent criterion apart from the success of the theory which shows that the term is indeed a referring term.It is therefore clearly necessary to clarify the notion of reference.Needless to say, reference is a relational term but immediately a problem arises here namely, that we not only habitually imagine the relata, but we are also convinced that a relation can only be a relation between entities in a strict (Quinean) sense.

Monday, May 27, 2019

An It Proposal for Network Management of the College of Computing and Information Sciences(Makerere University, Uganda)

AN IT PROPOSAL FOR NETWORK MANAGEMENT OF THE COLLEGE OF COMPUTING AND INFORMATION SCIENCES(MAKERERE UNIVERSITY,UGANDA) Introduction The College of Computing and tuition Sciences (COCIS) Makerere University in Uganda was established on 13th December 2010. It is made up of the School of Computing and Informatics Technology (CIT) and the East African School of library and Information Science (EASLIS). COCIS is one of the largest computing and ICT training, information science, research and consultancy colleges in Africa.It cuts across as a world class College and has maintained its place as an icon of excellence on the continent. It is committed to delivering excellent services in the area of Computing, Library, Records and Information Sciences and attracts both local and international students. COCIS boasts of the state of the art infrastructure including lecture theaters, giant data processor laboratories, specialized computer laboratories and a college library.The established aca demic staff strength of the College is about 300 teaching staff including 30 visiting and local professors. Over twenty of these staff members hold doctorate, with many others in advanced stages of completing their PhD studies. This merger has seen a pool of resources and facilities same computer laboratories, specialized laboratories, book libraries, journals, cameras, and personnel both administrative and academic staff.To maximize productivity and efficiency, the college of computing and informatics technology(CoCIS) routinely relies on the communicate to support its operations ranging from E-learning activities on the E-Learning environment(Muele) to support services offered to students and staff ,services like access to wireless internet, access to the internet through the Domain(CoCIS domain) The entanglement topology commitd by the college is an extensive star LAN that is used with engagement devices that filter frames or packets, like switches, and routers.This topolog y significantly reduces the trading on the wires by sending packets only to the wires of the destination. This meshwork is managed by only four people or staff. This network is in addition being managed using tools like Nagios and solar winds for monitoring devices. Problems identified affecting the network Insufficient resources Under this there is limited mankind resources which include support staff and network administrators . there are only four network administrators for the unit of measurement college of which some of the are incompetent or not always avail fitting.Limited number of Computers, most of the computers in the labs at the college are dwindling in come collectible to technical problems, a few switches and insufficient number of Ethernet c adapteds of which some dont work, one of the servers at Block A has issues and It has really disrupted the network mainly during the access to the domain by the students. Low bandwidth The bandwidth that is provided for the college by the service providers (UTL) is not enough to cater for the students and staff that are the end users of the network.Delayed Service saving and network instability There is slow network connectivity in the labs and other areas of work in the college for example these days lecturers rarely access Muele(Makerere E-Learning environment) to upload Notes for students out-of-pocket to this problem. Network intrusion / unauthorized usage There is increased network access by unauthorized users on the Wireless network that increases the network traffic and thusly slowing down of the network which deprives the rightful users who are the students of the college from fully utilizing this resource.Security issues The College faces warranter problems which include theft of network devices like cables, mouse, keyboards et cetera. Also to note that ofttimes as there are measures for security like cameras in some labs and strategic areas of the buildings, security men for the two bloc ks they are not enough Proposed Solutions to the in a higher place mentioned Problems at CoCIS Network management being a complex and broad component in networking, it can be achieved through a number of networking frameworks.So we pep up that if this college can use the following approaches, its network management can be eased and improved tremendously. Fault management The college network administrator should be able to identify all the network shimmys like no connection or slow connection , locate where the fault is ,restore the service ,identify the root cause of the fault and then find a resolution for the problem. This can be done proactively or reactively. Hence the network downtime is minimized highly. Configuration managementThe network administrators of the college should be able to capture network and system configuration information of all network elements. (local, remote, automated and manual) ,Map the network topology, Set up configuration parameters in management a gents ,track and instrument what changes are made to the network, where they are made and why they are made , Identify where upgrades need to be made so as to manage the network efficiently as they curb problems of delayed Service delivery and network instability (physical and logical configuration).Accounting management Since there are limited resources like computers, human resources that is to say administrators of the network ,distribution of these resources can be done optimally and fairly on the college so as the network is managed well . This makes the most effective use of the systems available, minimizing the cost of operation. Security Management Security measures should be adopted so that the network is protected against unauthorized users, and physical or electronic sabotage hence mitigating issues of network intrusion.The security systems should also allow network administrators to control what each authorized student or staff can and cannot do with the system. Other s ecurity measure to adopt can be -Physical security This can be done by providing enough security cameras in all the labs and other areas in the buildings of Block A and Block B, locking the computer labs and mounting servers on cabinets or racks that have locks.Proposal to the top administrators to purchase enough Bandwidth to suit the growing numbers of users at the college. If theres enough bandwidth provided, it will cater for the slow connections on the network as earlier indicated. Purchase of needed network equipments like extended servers, routers, better tools for monitoring the network should also be done to stabilize the network infrastructure. CONCLUSIONThe college of computing and information sciences needs to aim at pose the above mentioned measures into consideration and practice where possible so as to enable full utilization of resources which minimizes redundant resources, gives higher chance to students and staff to access resources on the network without inconven iences, quick service delivery for the students and staff will be guaranteed reducing on the downtime experienced on a slower network and also curbing time delays in all the network operations.References CIS. (n. d) Retrieved from Cis. mak. ac. ughttp//cis. mak. ac. ug/about-cocis/history-a-facts/the-college. html Makerere E-learning Environment (n. d) Retrieved from Muele http//muele. mak. ac. ug/

Sunday, May 26, 2019

Booth Multiplier

Low Power carrell Multiplier by Effective Capacitance Minimization P. Nageshwar Reddy Dr. Damu Radhakrishnan Stu. in SUNY, New Paltz, NY Prof. in SUNY, New Paltz, NY Abstract In this paper we present an energy efficient parallel multiplier factor factor trope based on intentful content minimization. all the overtone product decrease defend in the multiplier is considered in our research. The sound electrical capacity is the product of capacitance and sack military action. Hence to minimize the effective capacitance in our visualizeing, we decided to ensure that the shift key activity of nodes with high capacitances is kept to a minimum.This is achieved in our design by wiring the higher switching activity sign ups to nodes with lower capacitance and vice versa for the 42 compressor and luxuriant common viper cells, as spunking the initial prospect of each partial product arcminute as 0. 25. This bring down the overall switching capacitance, thereby reducing th e total great role custom in the multiplier. Power psychoanalysis is d wiz by synthesizing our design on Spartan-3E FPGA and employ XPower Analyzer tool that is provided in ISE Xilinx 10. 1. The dynamic proponent for our 16? 16 multiplier was measured as 360. 4mW, and the total power 443. 31mW. This is 17. 4% less comp bed to the most recent design. Also we noticed that our design has the lowest power-clutch product compared to the multiplier presented in the literature. Index Terms- carrel multiplier, Effective capacitance, 42 compressor. 1. Introduction A multiplier is the most frequently used fundamental arithmetic unit in various digital systems such as computers, member controllers and house processors. Thus it has become a major source of power dissipation in these digital systems.With the exp iodinential growth of portable systems that are operated on batteries, power decrement has become whizz of the primary design constraints in recent years. In the present era , each and every electronic device is use use CMOS technology. The 3 major sources of power dissipation in digital CMOS circuits are dynamic, short circuit and leakage 1. Generally, power reducing proficiencys aim at minimizing all the above menti adeptd power dissipation sources but our emphasis is on dynamic power dissipation as it dominates other power dissipation sources in digitalCMOS circuits. The switching or dynamic power dissipation occurs due to the charging and discharging of capacitors at different nodes in a circuit 2. The average dynamic power consumption of a digital circuit with N nodes is given by where VDD is the supply voltage, Ci is the load capacitance at node i, fCLK is the clock frequency and ? i is the switching activity at node i. The product of switching activity and load capacitance at a node is called effective capacitance.Assuming only one system of system of logical system change per clock cycle, the switching activity at a node i can be defined as the probability that the logic value at the node changes (0->1 or 1->0) between devil consecutive clock cycles. For a given logic element, the switching activity at its output(s) can be computed utilise the probability of its excitants and is given by where and denote the probability of occurrence of a one and zero at node i respectively. When Pi = 0. 5, the switching activity at a node is maximum and it decreases as it goes towards the ii extreme values (i. e. both from 0. to 0 and 0. 5 to 1). The two main low power design strategies for dynamic power reduction are based on (i) supply voltage reduction and (ii) the effective capacitance minimization. The reduction of supply voltage is one of the most aggressive techniques because the power savings are significant due to the quadratic dependence on VDD. Although such reduction is usually very effective, it increases leakage current in the transistors and as well as decreases circuit speed. The minimization of effective swi tching capacitance involves reducing switching activity or node capacitance.The node capacitance depends on the integration technology used. To reduce switching activity only requires a detailed analysis of signal transit probabilities, and implementation of various circuit level design techniques, such as logic synthesis optimization and balanced paths. It is independent of the technology used and is less expensive. Admiring the advantages of switching activity reduction, this paper focuses on switching activity reduction techniques in a multiplier. Digital Multiplication is make in three steps in a Booth coded multiplier.The graduation exercise step is to generate all the partial products in parallel using Booth recoding. In the arc moment step these partial products are reduced to 2 operands in several wooden legs by applying Wallace/Dadda rules. These stagecoachs follow one after the other, reaching the output of one stage to the next. The final step is adding the two ope rands using a carry propagate common viper to produce the final sum. Our main focus in this paper is the second step, partial product reduction. Fig. 1 shows the modified Dadda reduction tree for a 6? 6 unsigned multiplier, which uses spacious adders (FA) and half adders (HA) as basal elements.Stage 1 is the rearranged 6? 6 unsigned partial product array obtained using the partial product generator. At every partial product reduction(PPR) stage the cast of bits with the similar order (bits in a column) are assemblyed together and connected to adder cells following Daddas rules. Each column exhibits partial products of a certain order. The sum output of a FA or HA at one stage impart place a dot in the like column at the next stage and an output carry in the column to the left in the next stage (i. e. one order of magnitude higher). Fig. 1. Modified Dadda reduction tree for 6? unsigned multiplication The Wallace and Dadda designs use only FAs and HAs in the reduction stages , which form an irregular layout and increases wiring complexness. Wiring complexity is a measure of power. Since indeed Weinberger 3 has proposed a 42 compressor, the majority of the multiplier designs today soak up use of 42 compressors to increase the carrying out of the multiplier. They also contribute to power reduction as they decrease the wiring capacitance due to a more regular layout, contributing to fewer transitions in the partial product reduction tree. It also reduces hardware cost.The design of the 42 compressor got impoved in time, and modified design presented by Jiang et al. claimed improvements in both check up on and power dissipation compared to earlier designs 4. Several logic and circuit level optimizations are possible by using higher order compressors instead of honest FA cells for reducing the number of transitions in the partial product reduction stage. Because of this we used 42 compressors, FA (32 compressor) and HA cells in our partial product reduc tion stages. We reduced the switching activity by minimizing the effective capacitance at every node in the circuit.This stands as the main focus of this paper. This paper is organised as follows related research in section 2 and 2. Related Research M either researchers turn over elucidated different low power multiplier architectures by using different techniques to reduce the total switching activity in a multiplier - . Ohban, et al. proposed a low power multiplier using the so called bypassing technique 5. The main judgment of their approach is to minimize the signal transitions while adding zero valued partial products. This is done by bypassing the adder stage whenever the multiplier bit is zero.Masayuki, et al. proposed an algorithm using operand decomposition technique 6. They decomposed the multiplicand and the multiplier into 4 operands and using them they generated twice the number of partial products compared to the conventional multiplier. By doing this, they reduced the one probability of each partial product bit to 1/8 while it is 1/4 in the conventional multipliers. This in turn decreases the switching probability. Chen, et al. proposed a multiplier based on effective dynamic range of the input data 7.If the data with littler effective dynamic range is Booth coded then the partial products have greater chances to be zero, which decreases the switching activities of partial products. Fujino, et al. proposed a multiply accumulate design using dynamic operand transformation technique in which current values of the input is compared with previous values 8. If more than half of the bits in an operand change then it is dynamically transformed to its twos complement in order to decrease the transition activity during multiplication. Chen, et al. roposed a low power multiplier, which uses mean power suppression technique (SPST) equipped Booth encoder 9. The SPST uses a detection logic circuit to detect whether the Booth encoder is calculating redun dant computations which yield in Zero partial product and stops such PP generation process. To implement the basic principles used in all the above mentioned multiplier architectures not only increase hardware intensity but also introduce delay in the operation. Also the extra circuitry employed to implement them consumes power.So our research interest is focused on techniques which decrease power without introducing either delay and additional hardware. Oskuii et al. proposed an algorithm based on static probabilities at the primary inputs 10. At every PP reduction stage the number of bits with the alike(p) order of magnitude (bits in a column) are grouped together and connected to the adder cells in a Dadda tree. The selection of these bits and their grouping influences the overall switching activity of the multiplier. This was expoundd in Oskuiis paper by referring to an early work, which is described below. Only one column per stage is considered here. As the generated carry bits from adders propagate from LSB towards MSB, optimization of columns is performed from LSB to MSB and from first stage to last stage. Thus it can be ensured that the optimization of columns and stages that has already been performed exit still be valid when later optimizations are being performed. * Glitches and spurious transitions spread in the reduction stage after a few layers of combinational logic. To avoid them is not feasible in most cases. Therefore it seems near to assign short paths to partial products having high switching activity.Oskuiis goal was to reduce the power in Dadda trees. The one probability for sum and carry of the FA and HA can be calculated from their functional behavior 10. According to Oskuiis algorithm, assuming the switching probabilities of partial products in a particular stage are calculated using the previous stage one probabilities and in each column and they arranged these partial product bits in ascending order. They first use the lower sw itching probability bits to feed full and half adders and transfer the higher switching probability bits to the next stage.From the set of bits to feed adders they tried to feed the highest switching probability signal to the carry input of the full adder as its path in full- adder is shorter than the other two inputs. Fig. 2. Example to illustrate Oskuiis approach 10 Fig. 2 gives an example where 7 bits with the same order of magnitude are to be added. This is shown as the shaded box in the 2nd group of bits from top in Fig. 2. According to Dadda rules of reducing a partial product tree, 2 FAs must be used and one bit will be passed to the next stage together with the sum and carry bits generated by the full adders. s for i varying from 1 to 7 represent the switching probabilities of the sevensome bits. These are sorted in ascending order and listed as ? i* with the highest one as ? 1*. According to their approach, the bit with highest switching activity is kept for the next stage i. e. in Fig. 3. 2, and assign and to the carry inputs of the two FAs as their path is shorter and the other bits to the remain inputs of FAs in any order. In this way they reduced the partial product tree by bringing the highest transition probability bits more closer to the output such that it reduces the total power in the multiplier without any extra hardware cost.Oskuii claimed that power reduction varying from 4% to 17% in multiplier designs could be achieved using their approach. On careful analysis of Oskuiis work we notice that further reduction in power can be achieved. This is elaborated in our design presented in the next section. 3. Proposed subject By using a partial product generator (PPG) for the n? n multiplier employing radix-4 Booth encoder we obtained the required partial products. These partial products are then reduced to 2 operands employing several partial product reduction (PPR) stages. We used a combination of 42 compressors, FAs and HAs in reduction sta ges.At each stage modified Dadda rules are applied to obtain operands for the next stage. While minimizing the partial product bits in each column using 42/32 compressors and HA cells, emphasis was given on higher speed and lower power. Higher speed is achieved by allowing the partial product bits to pass done a minimum number of reduction stages, while minimizing the final carry propagate adder length to the minimum. Fig. 3. Proposed PPG scheme for a 16? 16 multiplier Fig. 3 shows the proposed partial product reduction scheme for a 16? 16 parallel multiplier.Nine partial products obtained by PPG are reduced to 2 operands using 3 reduction stages. The steep green boxes in each column represent 42 compressors. It takes five bits and reduces them into 3 output bits, one sum bit in the same column position and two carry bits in the next higher significant column (one bit left) of next stage. The tumid red boxes represent full adder cells, which reduce three partial product bits in a column and generate the sum and carry bits. Similarly, the vertical blue boxes represent half adders and add two partial product bits to reduce it to 2 output bits.The order in which the inputs are fed to 42 compressor, full and half adders is discussed in the next section. In Fig. 3 the maximum number of partial products in a column is 8 (columns 14 to 17). Since we are using 42 compressors that can take up to 5 input bits, to reduce the partial products in the first stage, we want to make sure that the maximum number of partial products in the next stage is only 5. This way we can reduce the bits in each column in stage 2 using one level of 42 compressors. And in the third stage, we want to ensure that the maximum number of bits in any column is only 3, so that full adders can be used to add them.This will permit the whole reduction process to be achieved in 3 stages. The half adder in column 2 in reduction stage 1 and the full adder in column 3 in reduction stage 2 are used so a s to minimize the size of the final carry propagate adder. 4. Power decline Once the minimum number of reduction stages is established for a design, the next criterion is to minimize power consumption. This is achieved by delay passing and reducing the effective capacitance at every node in the reduction stages also following Oskuiis rules (discussed in scratch 2).To minimize the effective switching activity, the design must ensure that the switching activity of nodes with higher capacitance value must be kept to a minimum. This is achieved by a special interconnection pattern used in our design. The higher switching activity signals are wired to nodes with lower capacitance and vice versa. Our multiplier design uses the above idea to minimize power. This paper therefore focuses on selective interconnection of signals to the inputs of 42 compressors and FAs and HAs using the above concept.The logic diagram and the input capacitances for a full adder are shown in Fig. 4(a). For th e following we will assume that each and every input lead to a logic gate is considered as one unit load (C1). Hence if a signal is connected to the inputs of two logic gates, then the load is two units (C2). From the logic diagram of the full adder in Fig. 4(a), input B is connected only to an XOR gate, where as inputs A and C are connected to both an XOR and a Mux. Hence, the input capacitance of the B-input is smaller than the other two inputs.The load presented by the B input is one unit load, while the loads presented by A and C are 2 unit loads. Hence a transition on input B will result in less effective capacitance. This is represented by the capacitance values C1 (1 unit load) and C2 (2 unit loads) as shown in Fig. 4. 9. Again by comparing the three inputs, the C input goes through only one logic device (XOR gate or Mux) before it reaches the output, where as both A and B goes through two logic devices before reaching the output. Hence, a transition on any of the inputs A or B could result in output transitions on all the three logic devices.But a transition on input C will affect only two of these logic devices. Therefore we can conclude that even though the inputs A and C represent the same load, the overall switching effect on the full adder due to C input will be less than that due to A input. Hence, as a rule of thumb, the first two higher transition inputs among a set of three inputs that are given to a full adder should be connected to the B and C inputs and the last one to A. (a) (b) Fig. 4. a) FA logic diagram and input capacitances (b) 42 compressor logic diagram and input capacitances Similarly, the logic diagram of a 42 compressor and its input capacitances are shown in Fig. 4. (b). The input capacitances presented by X1, X3, X4 and Cin are twice that presented by X2. Hence, the highest transition probability signal must be connected to the X2 input. Again by using a similar argument as in the full adder, the second highest transition proba bility signal must be given to the Cin. The remaining inputs are given to X1, X3 and X4 in any order. This minimizes the overall effective capacitance in a 42 compressor.The probability of a logic one at the output of any block is a function of the probability of a logic one at its inputs 11 12. From the logic functions of 42 compressor, FA and HA we can calculate their output probabilities knowing their input probabilities. Table 2 Probability equations for 42 Compressor 42 Compressor PSUM PCout PC0 Table 1 shows the probability expression for the sum and carry outputs for the full adder and half adder in terms of their input signal probabilities. The 42 compressor output probabilities are shown in Table 2. By comparingTables 1 and 2 we can say that the statistical probabilities of the output signals of basic elements (42 compressors, full adders and half adders) used in partial product reduction stages vary. Table 3 shows the output signal probabilities of 42 compressor, full adder and half adder, assuming equal 1 probabilities of 0. 25 for all inputs. In each partial product reduction stage the signals in a particular column have different switching probabilities. The output signals of one stage become inputs to the next stage. So the switching probabilities of the outputs diverge more as we move down the partial production reduction stages.Table 3. 1 Output Signal Probabilities of FAs and HAs Full-adder Half adder SUM CARRY A. B PSUM PCARRY Table 3 Output probabilities of 42 compressor and adder cells Input signal probabilities = 0. 25 42 compressor Full adder Half adder SumCoutC0 0. 48440. 15630. 2266 Sum channelize 0. 43750. 1563 SumCarry 0. 3750. 0625 Several reduction stages are required to reduce the partial products generated in a parallel multiplier. As shown in Fig. 3, at each stage a number of bits with the same order of magnitude are grouped together and connected to the 42 compressors and adder cells.The selection of these bits and t heir grouping influences the overall switching activity of the multiplier. This is what we will exploit to reduce the overall switching activity of the multiplier. Fig. 5 shows the array structure of the proposed partial product reduction scheme for a 16? 16 multiplier. In the following we assumed that the one probability of all the 9 partial product bits are same and is equal to 0. 25 (as discussed in Section 3. 26). These 9 partial product bits are fed to 42 compressors, full and half adders and are reduced to 5 operands. The bits in these 5 operands will have different one probabilities.From these one probabilities we can calculate their switching probability. If we look at each column all the bits in that column have the same weight but different one probability. So we have enough freedom to choose any of these signals which can be connected to any of the inputs of the basic elements. The way these signals are wired to basic elements to achieve reduction will affect the total po wer consumption in a multiplier. take an example Fig 5 shows how we wired the input signals to 42 compressors and full adders in the proposed design. To illustrate the principle consider column 16 of reduction stage 2 in Fig. , where we have five bits with the same order of magnitude, which are to be wired to the inputs of a 42 compressor. The first higher transition bit is fed to X2 input and next higher transition bit is fed to Cin, as they provide lower switching activity when compared to others. The remaining three bits can be fed to X1, X3 and X4 in any order. Similarly on column 11 in reduction stage 3, three bits of the same order are to be added. The highest transition bit is given to B input of the adder and the next higher transition bit is fed to C input. The third bit is fed to A input.This way of feeding the inputs, we can decrease the output switching probabilities of compressors and adders. By applying the same technique to every stage we can reduce the overall switc hing capacitance of the multiplier, thereby reducing power. Fig. 5. Wiring patterns for 42 compressors and full adders 5. Simulation Power analysis was done by synthesizing our 16? 16 multiplier design on Spartan-3E FPGA and using XPower Analyzer tool provided in ISE Xilinx 10. 1. We evaluated the performance of our 16? 16 multiplier by comparing with the conventional Wallace and Oskuiis multipliers.Table 4 shows the quiescent and dynamic powers of different multipliers obtained by simulation. The quiescent power is almost the same for all multipliers. The dynamic power for our design is only 360. 74 mW, where as Oskuiis and Wallace multipliers consume 454. 06mW and 475. 08 mW respectively. Hence the total power consumption is only 443. 31mW for our multiplier, which is less by 17. 39% and 20. 51%, compared to Oskuiis and Wallace multipliers. Table 4 Power reports from simulation for a 16? 16 Multiplier soma QuiescentPower (mW) DynamicPower (mW) TotalPower (mW) Our Design 82. 7 360 . 74 443. 31 Oskuiis Design 82. 57 454. 06 536. 63 WallaceMultiplier 82. 67 475. 08 557. 75 Table 5 Power-Delay products of 16? 16 multipliers Design Total Delay (ns) Power (mW) Power-Delay Product Our Design 30. 889 443. 31 13. 693*10-9 Oskuiis Design 31. 219 536. 63 16. 753*10-9 WallaceMultiplier 35. 278 557. 05 19. 651*10-9 Table 5 shows the power-delay products of different multipliers. Smaller the power delay product of a multiplier the higher is its performance. Our design has the shortest delay of 30. 889ns, compared to 31. 219ns and 35. 78ns for Oskuiis design and Wallaces design respectively. Hence our design has the lowest power-delay product compared to both Oskuiis and Wallace multipliers. 6. Conclusions We have presented an investigation of multiplier power dissipation, along with some techniques which allow reductions in power consumption for this circuit. Given the importance of multipliers, it is essential that further research efforts are to be directed in the follo wing ways. * In this thesis the switching activity criteria for the interconnection pattern in 42 compressors was used only for two of the inputs of the 42 compressor.The interconnections of signals on the other three inputs are make without any importance given to their switching activity. This is because at the gate level, the load capacitance at a node is measured simply based on the number of connections made at that node. In the 42 compressor, three of the inputs are feeding two inputs each (except the carry input). Hence, we consider them with the same load capacitance. In reality, this is not true. To get an accurate estimate on capacitance, an actual layout of the cell has to be made using VLSI layout tools and then their capacitances are to be extracted.Hence further research could focus on the above so as to find an ordering for these inputs based on their capacitance values. Also, different implementations of 42 compressors may be compared so as to select the one with the lowest capacitance values. * Extending the proposed interconnection technique to the partial product reduction stage by employing higher order compressors such as 52, 92, 282, etc. In this manner, different architectures using various combinations of compressors in the partial product reduction stage can be compared so as to select the best one with the lowest power dissipation for any multiplier.References 1 D. Soudris, C. Piguet, and C. Goutiset , Designing CMOS Circuits for Low Power. Kluwer Academic Press, 2002. 2 L. Benini, G. D. Micheli, et al. , Dynamic Power Management Design Techniques & CAD Tools. Norwell, MA Kluwer Academic Publishers, 1998. 3 A. Weinberger, 42 Carry Save Adder Module, IBM Technical Disclosure Bulletin, vol. 23, 1981. 4 S. F. Hsiao, M. R. Jiang, and J. S. Yeh, Design of High-Speed Low-Power 3-2 Counter and 4-2 Compressor for Fast Multipliers, Electronics Let. , vol. 34, no. 4, pp. 341-342, 1998. 5 J. Ohban, Multiplier Energy Reduction Through Bypassing o f Partial Products in Proc. Asia-Pacific Conf. on Circuits and Systems, vol. 2, pp. 1317, 2002. 6 M. Ito, D. Chinnery, and K. Keutzer, Low Power Multiplication Algorithm for replacement Activity Reduction Through Operand Decomposition, 21st Int. Conf. on Computer Design, 2003. 7 O. T. Chen, S. Wang, and Yi-Wen Wu, Minimization of Switching Activities of Partial Products for Designing Low-Power Multipliers, IEEE Trans. on VLSI Syst. , vol. 11, pp. 418 433, 2003. 8 M. Fujino, and V. G. Moshnyaga, Dynamic Operand Transformation for Low-Power Multiplier-Accumulator Design, in Proc. of the Int. symp. n circuits and systems, 2003. 9 K. H. Chen and Y. S. Chu, A Low Power Multiplier with Spurious Power inhibition Technique, IEEE Trans. VLSI Syst. , vol. 15, no. 7, pp. 846-850, 2007. 10 S. T. Oskuii, Transition-Activity Aware Design of Reduction-Stages for Parallel Multipliers, in Proc. of Great Lakes Symp. on VLSI, 2007. 11 K. Parker and E. J. McCluskey, Probabilistic Treatment of Genera l Combinational Networks, IEEE Trans. on Computers, C-24 668-670, June 1975. 12 M. Cirit, Estimating Dynamic Power purpose of CMOS Circuits in Proc. of ICCAD, pp. 534537, 1987.

Saturday, May 25, 2019

Downsizing: the Financial and Human Implications Essay

This essay examines the effects of curtailment with regard to the human and financial implications. Since the mid to late 1980s, lay off has modify the corporate landscape and changed the lives of hundreds of millions of individuals round the world (Gandolfi, 2008, p. 3). For the purposes of this essay, retrenchment is defined as the planned elimination of byplays, involving redundancies, and is designed to improve financial procedure (Macky, 2004).It bequeath be argued that while downsize can be an utile strategy, it frequently does not improve financial health, and the human implications can be cracke and costly. This essay will discuss first, downsizing definitions second, motivation for downsizing three close to, a brief history of downsizing quaternaryth, approaches the writ of execution of downsizing fifth, the human implications sixth, the financial consequences and, seventh, the savvys for the continued use of downsizing. in that respect are differing perspecti ves regarding the downsizing phenomenon.At the most simple take aim, the strategy involves a planned contraction of the number of employees in an organisation (Cascio, 1993). For vitrine, Macky (2004) describes downsizing as an well-read reduction by management of a firms internal labour force using redundancies (p. 2). However, other definitions encompass a wider range of implementation methods. Cameron (1994) defines downsizing as a set of activities, undertaken on the part of the management of an organisation and designed to improve organisational efficiency, productivity, and/or competitiveness (p. 192).These activities let in hiring freezes, salary reductions, instinctive sabbaticals, exit incentives and reducing hours worked by employees. This essay will focus solely on the downsizing activity of redundancies. Various synonyms exist for downsizing, including resizing, rightsizing, smartsizing, restructuring, redundancies and reduction-in-force (Gandolfi, 2010 Macky, 2004) . The primary(prenominal) motivation for downsizing, at least for private companies, is to improve an organisations financial action, which is also known as profit maximisation (Kammeyer, Liao & Avery, 2001).The factors contri preciselying to downsizing decisions are Byzantine and depend on company-specific, industry-specific and macroeconomic factors (Macky, 2004). In hard times, downsizing is a strategy that may be employed as a quick-fix, responsive reception to compensate for reduced profit by reducing human related workal be (Kowske, Lundby & Rasch, 2009 Ryan & Macky, 1998). In healthy times, the workforce may be reduced as part of a proactive human resource strategy to create a lean and mean organisation (Chadwick, Hunter & Watson, 2004 Kowske et al. , 2009).An overwhelming organic structure of academic research suggests that downsizing has surprisingly little succeeder in increasing profitability and shareholder value, even though financial performance is its main int ention (Cascio, 2002 De Meuse, Bergmann, Vanderheiden & Roraff, 2004 Lewin & Johnston, 2000). Despite the limited financial success of downsizing, it has remained a popular strategic tool with its use spanning the last three decades. Prior to the 1980s, downsizing was sedulous primarily as a last resort, reactive response to changing manufacturing demands.It affected mostly blue-collar, semi-skilled employees (Littler, 1997). In contrast, since the 1980s, workforce reduction has become a spark advance strategy of choice, affecting employees at either levels, all around the globe (Mirabal & DeYoung, 2005, as cited in Gandolfi, 2008), indoors a wide variety of organisations encompassing all industries (Littler, 1998 Macky, 2004). Karake-Shalhoub (1999) suggests that downsizing has been the most significant business change of the 1980s. Downsizing change magnitude in popularity during the 1990s, which has subsequently been described as the downsizing decade (Dolan, Belout & Balkin , 2000).It has evolved from a reactive strategy in the 1980s, to become used as a proactive strategy. During the 1990s, large scale redundancy programs were viewed as the solution to the issues facing organisations much(prenominal) as AT&T, IBM, General Motors and British Telecom (Kinnie, Hutchinson & Purcell, 1998). The statistics are sobering, Cameron (1994) reported that 85% of Fortune 500 companies were downsized between 1989 and 1994, and 100% were planning to do so at bottom the next five days. Furthermore, figures from the most recent global financial crisis demonstrate that downsizing remains a tool of choice.Rampell (2009) reported in the New York times that 4. 4 million jobs, in the U. S. al angiotensin-converting enzyme, were retrenched between September 2007 and March 2009. Two main approaches to the implementation of downsizing are currently employed. The first approach is popularly termed stealth layoffs and the second is referred to as non-selective layoffs (Gand olfi, 2009). Organisations begin commonly employed both stealth layoffs and non-selective layoffs during the recent global financial crisis. Stealth layoffs involve an attempt to hold the line redundancies out of media attention, by making a series of menial cuts rather than one large cut.Companies endeavour to save their public reputation from being sully by their downsizing activities. Managers are not allowed to openly discuss redundancies and a blanket of secrecy is placed over all proceedings, employees are not certain of timing or extent of redundancies (Crosman, 2006). Mc Gregor (2008) reported a wave of people slowly trickling out of organisations. Citigroup provides one example of stealth downsizing. Story & show off (2008) reported that in April 2007 the company announced elimination of 17,000 jobs.Then in January 2008 Citigroup announced a further 4,200 job cuts, followed by an additional 8,700 in April 2008 (Story & Dash, 2008). Non-selective downsizing involves ma ss redundancies, across all levels of an organisation. This is botheratic because firms are at risk of losing their top performers who are difficult to replace. These are the people that will be indispens able-bodied to drive future growth of the firm following the downsizing event. There is plenty of evidence of non-selective downsizing over the current global recession, for instance the pay industry has been deeply affected with U. S. anks making cuts of 65,000 employees between June 2007 and June 2008 (Story & Dash, 2008).Regarding the human implications of downsizing, the literature identifies three groups of people directly affected the victims, the survivors, and the executioners. Academic studies refer to the victims of downsizing as the individuals who have been involuntarily removed from their positions (Casio, 1993 Dolan et al. , 2000 Gandolfi, 2008 Macky, 2004). The negative effects on victims of downsizing events can be devastating (Havlovick, Bouthillette & van der Wal, 1998). Previously, being well trained was capable to ensure a life-long job.However, the increasing competitiveness of the business environment has meant that recent layoffs have included higher paid white-collar workers, many of whom are at the peak of their careers. Victims are affected initially during the planning build of the downsizing, then immediately following the redundancy announcement, and then in their subsequent employment. During the planning phase of downsizing, the threat of redundancies can subject employees to a number of emotional stresses.The stresses do not only embrace the immediate threat of redundancies, but also the tantrum of demotion, and redundancies in the ong term. Evidence suggests that, as expected, such stresses have negative mental impacts. For example, Catalano, Rook and Dooley (1986) in their interviews of 3,850 principle-wage earners in Los Angeles, lay out that that a decrease in job security increased the number of medical consultati ons for psychological distress. Likewise, Roskies and Louis-Guerin (1990) found in their survey of 1,291 Canadian managers, that managers who were insecure about their jobs showed poorer health than those who were secure, and the managers level of distress rose proportionally with their degree of insecurity.Following the redundancy announcement, there is strong evidence that victims weather from adverse effects as a subject of their job losses. These adverse effects include psychological stress, ill health, family problems, marital problems, dish uplessness, reduced self esteem, anxiety, depression, psychiatric morbidity, and feelings of social isolation (Greenglass & Burke, 2001). In particular, the affected individuals suffer from the loss of established social relationships and threats to their social identity (Macky, 2004). Greenglass and Burke (2001) also explain that the effects can vary greatly from person to person.The extent of face-to-face damage is attributed to the in dividuals resources of coping strategies, self-efficacy and social support. Evidence shows that the retrenched employees are able to respond in a more constructive manner depending on the extent to which they view the downsizing process as procedurally fair. Brokner, Konovsky, Cooper-Schneider, Folger, Martin and Bies (1994) found that employees remaining in their positions for up to three months after the announcement of their redundancy continued to troop positive work behaviours if the downsizing process was viewed as fair and transparent.There is evidence that subsequent employment opportunities are also affected by the victims previous redundancy experiences, including a change in their attitude towards the workplace. Macky (2004) provided evidence that the effects of redundancies flow onto the individuals next position, resulting in change magnitude levels of commitment and loyalty. Dolan et al. (2000) also showed that there is some evidence that job loss created through red undancies may create lasting damage to the victims career.Similarly, Konovsky and Brockner (1993) found that individuals report a loss of earning power in their subsequent employment. On the other hand, Devine, Reay, Stainton and CollinsNakai (2003), argue that victims who gain new employment have a greater sense of control and appear to be in a better position than those who were not retrenched. Noer (2009) suggests that negative impacts on victims are lessened by the various support packages for displaced employees that are paid for by the organisation, such as redundancy payments, career counselling and out-placement service.The second group of employees affected by downsizing are the survivors. The survivors are the employees who have remained with the firm after the redundancies have taken place (Littler, 1998). The survivors are outstanding to the firm because they play a pivotal power in the say-so of the downsizing operation and the ongoing success of the organisation. Th e expertise and motivation of survivors is required to keep the firm moving forward following redundancies. However, hold up employees are left with increased pressures. These pressures include larger workloads (Dolan at al. 2000), because survivors must take on the work of retrenched employees as well as new and increased job responsibilities (Lewin & Johnston, 2000), as a result of rouge skills leaving the organisation. In addition to the increased work pressures, survivors must deal with profound and negative psychological responses. Gandolfi (2008) identifies three sets of the emotions, behaviours and attitudes exhibited by surviving employees, which are commonly termed sicknesses in literature (Applebaum, Delage, Labibb & Gault, 1997 Kowske at al. , 2009).The emergence of these sicknesses following a downsizing event is referred to as the backwash (Clark & Koonce, 1995) or the downside (Cascio, 1993) of downsizing. The sicknesses identified are survivor syndrome, survivor gu ilt and survivor envy. Kinnie et al. (1998) characterises survivor syndrome as encompassing a variety of psychological states in survivors, including heightened levels of stress, absenteeism and dis cartel, and as well as decreased levels of productivity, morale and work quality. Cascio (2002) portrays survivor syndrome in a similar way to Kinnie et al. 1998), showing decreased levels of employee involvement, morale, work productivity and trust towards management. These mental states have a strong put to work on the survivors work behaviour and attitudes, such as motivation, commitment, satisfaction and job performance (Applebaum et al. , 1997 Littler, Dunford, Bramble & Hede, 1997). The second sickness, survivor guilt, is a feeling of responsibility or remorse as employees contemplate why their colleagues were retrenched instead of themselves. It is frequently expressed as fear, kindle and depression (Noer, 2009).Survivor guilt can be particularly prevalent when survivors perceiv e that their work performance was no better than that of the downsized victims (Littler et al. , 1997). In this case, employees can reason that there is no benefit in performing if performance is not a criterion for job survival (Appelbaum, et al. , 1997). Appelbaum and colleagues argue that survivor guilt is severely influenced by the manner in which the downsizing is perceived to be performed and the fairness of the decision making processes. Survivors of downsizing can also be plagued by a third sickness, survivor envy.This reflects the survivors envy of the victims in terms of presumed retirement packages, financially lucrative incentives, and new jobs with more attractive compensation (Kinnie et al. , 1998). For example, employees may feel that their retrenched ex-colleagues genuine redundancy pay outs and have found new jobs they like, while the surviving employee must work twice as hard, and moreover, for the same pay. Kammeyer-Meuller, Liao and Avery (2001) hypothesise tha t survivors envy is babelike on the closeness of the relationship with the survivor.Brokner (1987) found that when survivors have little proximity to the victims, increases in redundancy payouts result in decreased self-reported performance. On the other hand, the convey shows when survivors identify with the victims, increases in redundancy payouts increased self reported performance. Despite the stresses facing survivors, research shows that the needs of the survivors are frequently neglected by downsized firms (Applebaum et al. , 1997 Devine et al. , 2003 Gandolfi, 2006). agree to Applebaum et al. 1997), the negative effects on the survivors are under-estimated and organisations fail to take into account the difficulties of motivating a surviving workforce that is emotionally damaged because it has watched others lose their jobs. It is authoritative for organisations to pay more attention to the survivors in direct to support their financial health. Carswell (2002), in a New Zealand empirical study, established that the companies that based redundancy on fair practices, and provided better out-placement for the victims, performed better financially than those that did not use such procedures.Kowske et al. (2009) reviewed survivor engagement during the 2007-2009 global financial crisis and provided further valuable insights. Using the Keneyas Employment Engagement Index and a sample size of 9,998 U. S. employees, it was determined that employee engagement was significantly lower if redundancies had occurred within the previous 12 months. Kowske et al. (2009) found that although organisations were able to cut human resource costs, they are more likely to have a portion of their workforce disengaged fertile ground for the symptoms that accompany survivor sickness.An example of a lack of insight regarding survivor sickness was demonstrated in the downsizing of the Deloitte (New Zealand) Enterprise Risk Management Team, in May 2008 (personal information). T he first problem was that just two weeks prior to the redundancy announcement, a statement was made by one of the partners to the team, stating that no-one should be concerned about their jobs. Another problem was that the downsizing process was not transparent and no employee below partner level was involved in the consultation.Not only wew the staff made bare effected, but also the surviving employees who exhibited traditional symptoms of survivor sicknesses feelings of distrust, anger and low moral due to their perceived unfairness of the decision process. The result of this survivor sickness was that, by the end of the following year, the entire senior management team had voluntarily left the firm, taking with them valuable skills and experience. Such attrition is consistent with Trevor and Nybergs (2008) take chancesings that free turnover rates increased within 24 months following the downsizing event.It is clear that management must pay more attention to survivors in orde r to minimise survivor syndromes. The literature highlights four key improvements to current downsizing methods, in order to minimize survivor syndromes. Firstly, a detailed strategy must be devised, this is because planning has been identified as a pivotal issue in the success of downsizing (Applebaum et al. , 1997 Gandolfi, 2008). The strategic plan should establish how the survivors will be taken care of during the downsizing process (Gandolfi, 2009).This includes giving survivors access to honest, timely and unbiased information (Dolan et al. , 2000) as well as access to counselling, support and help (Allen, 1997). Second, cultivation must be improved as it is identified as key tool to combat survivor sickness (Dolan et al. , 2000 Farrell & Mavondo, 2004 Makawatsakul & Kleiner, 2003). The retrenched individuals often leave with key skills that must be taught to the surviving employees. Third, managers are recommended to communicate the long term business strategy to the survivi ng employees, n order to create a shared out vision for the future of the firm (Cobb, Wooten & Folger, 1995). Last, fairness in the way the redundancies are selected and implemented including open communication lines are valuable to support trust within the organisation (Hopkins & Weathington, 2006). For example, retirement programs are viewed as more fair downsizing methods by survivors and lead to increased commitment (De Witt, Trevio & Mollica, 1998). Executioners are the group of survivors that form the third category of people affected by downsizing.Executioners are the individuals entrusted to plan, carry out and evaluate the downsizing (Gandolfi, 2009). Other synonyms for executioners include downsizing agents (Clair & Dufresne, 2004) and downsizers (Burke, 1998). The effects on such personnel are important because downsizers are commonly employees and managers, who can have a large impact on the success of the change. This is because the executioners have power to influence employees and power to employ tools and techniques to minimise harm.Although they are a category of survivors, the executioners experience differs to that of the survivors because of their heavy responsibilities, in executing the downsizing, managing relationships with the retrenched individuals as well as supporting the survivors. Gandolfi (2007) is one of the few academics to offer some insight around the experiences of the executioners using empirical research. Gandolfi interviewed 20 executioners from a major Australian trading bank and identified four key themes from their responses.The first was the very negative emotional responses and reactions from the executioners, including the difficulty and complexity the executioners had in selecting the downsizing victims. Second, Gandolfi also identified coping strategies, including the executioners distancing themselves from the task physically, cognitively and emotionally in order to preserve their own emotional well-being. In fur ther research, it would be interesting to explore the relationship between the implementation of coping strategies and the effectiveness of the downsizing operation.Third, Gandolfi found that executioners with more experience reported a lesser degree of emotional distress. This is in line with Clair and Dufresne (2004) who suggest coping behaviours are knowledgeable with experience. Fourth, Gandolfi identified that the closeness of the relationship with the victims is also important in that the layoffs were more taxing when the executioner had developed personal ties with the victims. Another aspect of the executioners experience is their handling of the currently employed downsizing methods of stealth layoffs and across the board cuts.Executioners have reported that they are uncomfortable with the degree of secrecy involved with stealth downsizing (Gandolfi, 2009). For example, executioners have reported instances causing internal conflict when they have had to lie to employees (G andolfi, 2009). In the case of across the board cuts, executioners often find it difficult of rationalize the unfairness of the choices and question their rights to be playing god with the individuals involved. The significant negative impacts on the executioners highlight the need for firms to provide adequate training and emotional support for the executioners (Gandolfi, 2009).Although more research is required in this area, it is apparent training should at least raise awareness of the range of emotions that executioners may experience, and include tools and techniques to cope with the emotions involved with carrying out the task. Clair and Dufrense (2004) suggest that throughout the process of downsizing, firms should make available to managers social forums, employee assistance programs and social support groups. The profound human consequences on the survivors and the executioners are interlinked with the financial consequences.Literature has identified that the human conseque nces of downsizing play a large role in the financial success of the downsizing operation (Carswell, 2002 Devine et al. , 2003 Gadolfi, 2008). The financial success of the strategy is particularly important to shareholders and to external bodies such as suppliers, distributers and allied organisations (Kammeyer-Mueller, 2001). A large and growing body of literature has investigated and measurable the financial success of carrying out downsizing, and found that most organisations do not improve their financial performance after downsizing (Applebaum, et al. 1997 Cascio, Young & Morris, 1997 De Meuse et al. , 2004). The research around financial performance following a downsizing event focuses on tangible measurements of financial performance, such as examining changes in profit, share price and interpret on investment, before and after the downsizing event.However, it is noted that some companies do improve their financial performance by using downsizing as a strategy. Griggs and H yland (2003) surveyed 1,005 U. S. organisations and found that of the respondents, 46% of companies able to decrease costs, 33% were able to ncrease profitability and 21% were able to report satisfactory improvements on return on investment. wholly 46% of firms reduced costs due to poor planning, and this was because, in four times out of five, managers ended up replacing the very positions they made redundant (Griggs & Hyland, 2003). Wayhan and Werners (2000) findings contradict most downsizing research, in their examination of the largest 250 U. S. companies which had reduced their workforce by at least three percent during the period 1991-1992.These researches mensural changes in stock prices and they showed that, in the short term, downsized companies significantly financially outperformed companies that did not downsize. However, it should be noted that Wayhan and Werners (2000) study uses a different technique, in that they overcompensate time as a moderator of the affects. The rationale behind this is that other influences on the firms stock price will become more important than the influence of the downsizing event, as the time from the downsizing event increases.When Wayhan and Werners study was repeated using emblematic techniques (not using time as a moderator), the results were more in line with other research, showing small decreases in relevant financial measures. Sahdev (2003), Zyglidopoulos (2003) and Macky (2004) are among numerous researches showing that while a small number of organisations have reported improved financial performance, the majority were unable to account improved levels of effectiveness, productivity, efficiency and profitability in the short term.A typical example is Cascio, Young and Morriss (1997) study of 537 companies listed on the S&P 500 between 1980 and 1994. After comparing average companies in the same industry, and lordly for firm effects, they discovered no evidence that downsized firms could subsequently in crease profits or share price over a period of two years subsequent to the downsizing event. This is in line with evidence from New Zealand (Carswell, 2002). Furthermore, Cascio et al. (1997) found that downsized firms were outperformed in the short term by those companies that increased their workforce and also companies with immutable employment.This study was limited by focusing only on extreme reductions of 10% or more. The long-term implications of downsizing on financial performance were investigated by De Meuse et al. (2004) in a more recent U. S. study. Using U. S. Fortune 500 companies, De Meuse and colleagues look at a period of nine years following the redundancy announcement, from 1989 to 1998. De Meuse et al. found that in the first two years following the announcement the financial performance of the firms decreased, in line with Cascio et at. (1997).However, at the commencement ceremony of three years after the downsizing announcement, De Meuse et al. found no signi ficant underperformance of the downsized firms. Unfortunately, most studies provide little empirical evidence regarding why in some cases downsizing produces positive financial results, and in other cases it does not. This is because downsizing tends to be treated as a binary variable in research, that is, firms either downsize or they do not (Kammeyer-Muller, Liao & Arvey, 2001). However, it is apparent that not all downsizing efforts are the same.The following factors are likely to have an effect on the financial performance of the firm subsequent post-downsizing announcement the type of reduction strategy employed (for example, across the board cuts, stealth layoffs, or more gradual procedures) the persistence of survivor syndromes the logistics of downsizing (for example the size and frequency) and, the reasons behind the decision to downsizing. The lack of research in this area provides opportunities for researchers to further explore the downsizing phenomenon.The prevalence of evidence border impaired financial performance following downsizing events introduces a paradox why is the practice continuing to be engaged despite its lack of success? Cynics suggest that downsizing can be carried out in order to boost the egos of top managers at the expense of the organisation (e. g. Anderson & Cavanagh, 1994 Budros, 1999). Other explanations include the movement of management to inaccurately anticipate costs involved. Downsizing generates direct and indirect costs, and it is the hidden (indirect) costs that are frequently underestimated by management (Gandolfi, 2008).Direct costs are less complicated to estimate and include severance pay, accrued holiday pay and administrative processing costs. Hidden costs include enlisting and employment costs of new hires, costs of replacing staff with expensive consultants, lost sales due to insufficient staffing, training and retraining, and costs of reduced productivity as a result of survivor syndromes (Cascio, 1993). For example Gandolfi (2001) reported that a European company (unnamed for privacy reasons) incurred an increase of 40% in recruitment, and a 30% increase in training and development costs for new employees, following its controversial downsizing.In order for downsizing to be engaged as an effective strategic tool, it is clear that the benefits of reducing staff must outweigh all the costs. It has become clear that management must consider very carefully whether downsizing is appropriate for their firm, and they need to pay careful attention to the hidden costs. According to Allen (1997) the key to favored downsizing is to focus on the people who make up the organisation. Literature has provided management with guidelines to minimise costs and harm.For the survivors, this includes minimising survivor symptoms through planning of the downsizing operation, training of the surviving staff, and using open communication and fairness in carrying out the redundancies. For the executioners this includes providing them with training. This essay has identified and discussed the effects of downsizing with regard to both the human and financial implications. It has been demonstrated that the human implications of downsizing can be sever and downsizing frequently fails at meeting its objectives of improving financial performance.First, the profound negative consequences of downsizing on the victims, the survivors and the executioners have been outlined. Next, the empirical evidence concerning the financial consequences has been summarised. Gaps have been identified in downsizing literature. Two areas of downsizing that could well be further explored include the experience of the executioners and the characteristics of downsizing operations that result in successful financial outcomes. The recent prevalence of downsizing activities over the latest financial crisis suggests that downsizing is a phenomenon worth exploring into the future.

Friday, May 24, 2019

Belonging Essay Essay

Text One The China Coin.The China Coin is a short fiction novel for adolescents composed by Allan Baillie, released in 1991. The text explores the instinctive human need we feel to be gigantic culturally, within our family and to be dour to a peer group. Following the life of an Eurasian teenager named Leah and her mother, Joan, as they journey to China in search of the missing half of a broken coin, which Joans father sent her before he passed away. The coin is the merely connection the women have left with their lost family in China. Upon searching for the coin, the sources are not only discovering their extensive family, but the history behind it, grownup them an ultimate sense of identity and belonging, bringing a positive change in both characters mindsets.A relevant concept is that belonging may emerge through a person, object or place to enrich a community or group. A massive element of belonging within the text is the symbolism of the half-coin. A quote from page 35 state s This broken coin has been in our family for a long time. The other half of the coin is kept by the family in our ancestral village. Perhaps the coin should become one again. Outlining the coin acting as a connecting passageway between the members of the family, and showing the enrichment stowed upon the group. Baillie has used symbolism to portray self identity and cultural identity, much like the Simple Gift. and I looked up into the sky, the muddy blue sky that Old Bill and I shared. (page.205) also indicates this connecting passageway through an object shared between individuals like Baillie. Another connection circumstance in The Simple Gift is the key Old Bill gives to Billy, symbolizing the key to all of Billys problems, and also metaphorically unlocking the door to his future.Metaphors are also used in The China Coin. Metaphors are used to paint visual images, page 16 is a good example of this. I am a giant, she thought. This quote explains the self belonging issues Leah is experiencing. The idea that appearance effects how you belong is a strong and relatable one to the target audience of adolescents, giving insight that for a lot of young people, this is a firm and struggling issue.This particular metaphoric example, is also a useful individualized insight to how the character is feeling.Another successful way to directly express personal insight is through inner monologues. Baillie has used this particularly strongly on page 158. Quoting How long have you been here?six weeks from that neurotic kid that feared her mother was going to throw some sort of spell to make her Chinese, but youre not not Chinese either. It doesnt matter anymore. This extract reflects Leahs feelings about her growing acceptance of her Chinese heritage in Red Star Village. The readers consume Leah progress from feeling as though she doesnt belong in China but identified strongly with her Australian and European links. Leah was not Chinese, but the viewers watch as the exp eriences and contacts with friends and family in China change her outer appearance and she realizes it no longer matters. Inner monologues our personal thoughts emphasise the personal view of the character, The Simple Gift displays numerous of these as the text is written in first person from alternating characters point of views.The China Coin by Allan Baillie really exemplifies the ambition to belong, particularly in family and cultural groups, but also within a peer group, through symbolism, metaphors and personal statements, much like the electropositive texts, and selected other related texts.

Thursday, May 23, 2019

Arthur Miller’s “The Crucible” Essay

Un righteous Justice SystemsA comparison of the due west Memphis Three and The CrucibleImagine sitting at home wizard night and having police officers show up at your hose and arrest you for a crime you had no idea was committed. Three teenage boys in West Memphis, Arkansas and over thirty-nine characters in The Crucible went through exactly that. The West memphis three is the trial of three teenage boys who were charged with killing both eight-year-old oys in the woods and leading a hate group. The trial portrayed in The Crucible are based on the real life capital of Oregon Witch Trials, the accused in the play were charged with witchcraft. Evidence in both skids was insufficient and mostly eye avowed.Both crimes committed were abstract and referred to as the twits work. All accused in both trials were doomed from the beginning. In The Crucible to bear oneself if accused one must squeal to close tothing they didnt do and then report people that did do it, basically if they wanted to live thy had to lie and accuse other innocent people. The West Memphis three had to go through the court organization with corrupt people lying and no way to prove themselves innocent.Arthur Miller portrayed the evidence in The Crucible as only eye witness sexual conquests and petty reasoning, such as the ability to fake a faint. The characters that danced in the woods were considered reliable and what they said was all that was needed to convict the people of witchcraft. In the real life accounts of the West Memphis three, the evidence used against the teenagers were black Metallica shirts, the confession that didnt match the incident, and peers that told the police that they overheard one of the teenagers say they were going to kill two boys. The peers invoice later changed when under oath but the judge reffered back to the first story to help convict the accused. In both cases the accusers could not counter postulate the evidence because it was their word against th e witnesses.Before the West Memphis trials the police had a confession from all three teenage boys. t was used against them in court. The reason for the confession, some argue, is a condition called Satanic Panic. Someone who has Satanic Panic creates false memories that place themselves at the scene of the crime they were accused of. The crime normally is devil related, for example rape, magic, and voodoo are all known as the work of the devil.People who are diagnosed with Satanic Panic are normally also diagnosed with quaternary Personality Disorder. The witches in The Crucible were charged with harming others with magic. They had to confess themselves to keep themselves from being hanged. This is an example of how Satanic Panic is described. When Mary Warren says, Its not a blind I-I used to faint because I-I thought I saw spirits. (miller 47) she is describing Hysteria, or Satanic Panic she created the spirits because the other girls saw the.In The Crucible Hale, an expert in the area of witchcraft, played a large role in the courtroom. In the trial of the teenagers there was a doctor who was an expert in the area of stanic panic. universe experts in such areas are hard to prove, the doctor of satanic panic did not have a degree or any proof that he studied such a subject. He merely stated that he has worked with patients claiming to do things because the devil told them to. In the play Hale simply forces people to confess to save their lives, which is not the work of a doctor but more of a persuader. Both men later on reviewed the case, the accused, and the evidence and wanted to save the innocent people. Hale describes his change of opinion by saying, Let you not mistake your duty as I mistook my own. (miller 58) THey also were unsuccessful.Both crimes are abstract, gist that there is no evidence attainable for a just conviction, but both crimes have serious consequences. In The Crucible the people who denied being a witch were sentenced to be hanged . Two of the teenagers were sentenced to be hanged. Two of the teenagers were sentenced to life in prison and the last was sentenced to death by injection. Is that fair? The teenagers still had a mount life in front of them but because they were used as scapegoats, it was cut short. Can you call a justice system that convicts people for such crimes just?The 1994 case of the West Memphis three and the 1953 play The Crucible have similarities.Abstract convictions, false accusations, and unjust executions are all part of both trials. Neither account is something to be proud of, nor should such times be repeated. When you look at such similar occures, which are separated by four decades, you begin to adore if humans really learn from their mistakes. Jessie Misskelley, Damien Echols, and Jason Baldwin, the West Memphis three, are sitting in jail they have been there for 5220 days andawaiting their death. Spreading knowledge of this hideous case and raising support could help get them a nd appeal and save three innocent people.

Wednesday, May 22, 2019

Cultures and Traditions Essay

She doesnt seem to be ashamed and there is no emotion in her voice. Is he dead? Of course. They argon still trying to shed light of a bad situation. Their history has been described because no dust would go up to a person and say I have scantily killed oneness of my guests and I would make sense if she told this to someone closer to her. She has a in truth bold approach, is not afraid to say what she thinks, she doesnt think before she acts. Her fear is very strong for her son and is a very independent woman and has a sense of discipline.For example, she applied to him the same norms of discipline and She did not want anyone to be able to say she had brought him up badly. Riad suggests that she should start a guest house. He is the like her saviour in a way. She seems to be a very forthright person, Girls brought their boyfriends for her approval. She isnt afraid to speak her mind and can be a very blunt person at times. When she says, In one of the natural covering rooms. she records no fear of being caught, she doesnt even lower her voice.Ines must have had a very strong stomach shown by the description of the murder. For example, his coping hanging by a strip of ashen flesh. The conversation between Halabi and Ines shows Ines does not have much respect for the authorities, An eye for an eye and a tooth for a tooth, She seems to think along the terms that someone killed her son and she is going to kill the murderer. Riad always seems to be taking care of the situation, for example, calming the people to prevent them from rough the perpetrator limb from limb. and I think Ines likes that quality in him. Ines had scrubbed the walls and furniture, It is just like a chore for Ines to do, something to keep her occupied while the form was being taken care of. Ines thought the murder wasnt particularly barbaric compared to the latest cockfights. Near the end you see a more low-key side to Ines, you are the person I love you should have been the fathe r of my son. She might think that all of this might not of happened if Riad was the father of her child. The participation of agua Santa seem to be like a cult.Riad had to prevent them tearing the perpetrator limb from limb. This shows they are behind Ines every step of the way, for example, All the inhabitants of Agua Santa had fagged the day hauling mangoes, which they throw through the windows until the house was filled floor to ceiling. Ines is a very powerful figure in the town. She was higher than the doctor, the non-Christian priest and the police. The community looked up to her. They turned the perpetrator house into an enormous beast in the process of putrefaction It gives the house a very grotesque form.Its like its had the life sucked out of it and has been turned into a ferocious beast. The people of Agua Santa seem to liven up once something started happening in their insignificant backwater town. The surrogate and his men even arrived so you might it was importan t but they accepted an invitation of the girls at the who were celebrating a birthday, they said it makes it seem deceiving. There were more people on the street than on All Saints Day, this shows that even a spark of activity can cause big difference the peoples attitudes and lift their spirits.they seemed to be practising a part in a movie its like the whole scene was surreal and this could not really be happening. The priest lighted up the lamps but no one was in the mood for that type of devotion. Everybody is so excited and that they dont concentrate on anything else, not even their religion, just on the news they heard. The body was stuffed in to a canvas sack, wrestled out into the street, unceremoniously thrown into a sack and put into the back of Riads truck.The body didnt seem to have been shown respect at all since it was the killer of Ines son. The house had further developed into a monstrosity and no one could bring through the impenetrable jungle. When they got back to at midnight, they found no one had gone to bed. Everybody seemed to be so ecstatic and full of heftiness that the perpetrator was gone. Agua Santa returned to their usual chores exalted by a magnificent complicity, by a secret kept by good neighbours, the community be intimate they can trust each other and work together in any situation.Both mothers know what they want and how to get it and both have a level of determination. Their love for their sons is a strong motive to their revenge and are ruthless in their ways of dealing with it. Both mothers dont show a lot of emotion throughout the stories until the very end because they finally know they have done what they needed to do. The endings of the stories are both effective because they are both short and straight to the point and they both end on a happy note and the mothers can live their lives since both of them get their revenge.The characters are firmly rooted in time and place. For example, I think Vendetta had a strong belief about family but not about the community while The Schoolteachers Guest was the opposite. The communities reacted to the killings in different ways. The people of Agua Santa supported Ines and were right behind her and resulted in violent behaviour by vandalising the perpetrators house whilst in Vendetta , the community thought nothing of it and just continued with their lives and took no interest.Ines waits and speculates for things to start up while leave behind Saverini gets right on with the task of dealing with the problem. In all, the stories both symbolise revenge and on how the mothers deal with the same situation. By Rio Small 10K1 Show preview only The above preview is unformatted text This student written piece of work is one of many that can be found in our GCSE unlike section.

Tuesday, May 21, 2019

Annexation of Hawaii

Not many Americans are familiar with the hi fable behind hello becoming part of the unite States. Most people know Hawaii for beautiful beaches, nice weather, and the native cultures. The annexation of Hawaii is an interesting story and was not an easy task to accomplish for the United States. The story of the annexation is a story of conflicting goals as the American businessman struggled to obtain favorable dispense conditions and native Hawaiians sought to protect their culture and heritage. In 1891 Hawaii was a monarchy ruled by king Kalakaua and was later ruled by his sister, Queen Liliuokalani.The United States began seeking interest in Hawaii in the early 1820s to expand on agricultural growth. The United States became interested in Hawaiis slit growing agriculture and began trading with Hawaii 1. America began trading and making deals with Hawaii while exponent Kalakaua was still ruling. During this time the United States did not charge anything for importing Hawaiian s ugar. Also, the United States established a U. S. naval base at Pearl Harbor in the late 1880s. The sugar growing assiduity is where the annexation of Hawaii started to begin or was the root cause of the annexation.In 1890 Congress approved the McKinley Tariff this obligation raised the rank on sugar creation imported into the United States from foreign countries. The raised rates caused a financial hardship on the sugar farmers of the Hawaiian Islands. The American sugar farmers knew if the islands were to be annexed by the United States, then the tariff would be no longer needed. Queen Liliuokalani tried to rebuild the monarchy and was against the annexation with the United States. Many of the local sugar farmers were plotting a revolt to defeat the Queen because of her opposition to the annexation.American military man invaded the island without the consent from the President of the United States. The troops overthrew the Queen in a bloodless battle on January 17, 1893 and r aised the American flag to lay claim of their new proclaimed territory 2. After being overthrown by the American troops the annexation committee decided to proclaim themselves the Provisional Government. The Senate did not do a chance to ratify the treaty of annexation before the new President, Grover Cleveland withdrew the treaty.President Cleveland felt the United States acted inappropriately by ordering the overthrowing of the Hawaiian monarch and quickly withdrew the annexation treaty. Queen Liliuokalani resumed her authority as tabby and leader, but the newly appointed President of the Provisional Government, Sanford Dole, was not so willing to submit his ability back to the Queen. Many of the natives were not happy with the new governing and began to form rallies to remonstrance. Two groups were formed to tense and prevent the annexation of Hawaii.The two groups were Hui Hawaii aloha Aina (this was the female group) and the other group was Hui Hawaii Aloha Aina o Na Wa hine (this was the male group). The groups fought to try and prevent the takeover, but were not successful. The leaders of the rebellion on with the Queen were put in prison. The Queen was imprisoned because she failed to stop the fight. In 1897 the new President of the United States, William McKinley, was inaugurated. President McKinley was in favor of the annexation. McKinley along with three representatives of the government of the Republic of Hawaii subscribe a treaty to annex Hawaii.Once the treaty was signed, it was then passed on to the Senate for ratification. Once again this provoked the two protest groups, who then decided to organize a mass petition drive. The groups hoped to accomplish showing the American government that the majority of the Hawaiian natives wanted the annexation to be stopped. The groups gathered 21,269 signatures to oppose the petition 2. Four delegates along with Liliuokalani met with Senator George Hoar to present the petition for the Senator to re ad to the Senate.The petition was formally accepted and the treaty was turned ingest by the Senate. Not long after Senate opposed the annexation treaty was the subject brought up again. A United States battleship was blown up in the Havana Harbor. The Hawaiian Islands became a key redact for the refueling of the naval ships during the Spanish-American War. The Congressmen who were for the annexation of Hawaii submitted a proposal to annex the islands by joint resolution, which involve only a simple majority, vote in both houses.The Newlands Resolution passed Congress and President McKinley signed the document on July 7, 1898. After being, annexed Hawaii remained a United States territory and then in 1959 became the ordinal state. Bibliography 1. Schamel, Wynell and Charles E. Schamel. The 1897 Petition Against the Annexation of Hawaii. Social Education63, 7 (November/December 1999) 402-408. 2. ushistory. org. Hawaiian Annexation. U. S. History Online Textbook. Accessed March 19, 2013. http//www. ushistory. org/us/44b. asp.

Monday, May 20, 2019

Professional,ethical and moral issues faced by ICT users Essay

ABSTRACTThis report is a say of ready reck unmatchedr ethics, morals and professional issues facing Information Communication Technology (ICT) users and its relevance to todays society at large. This issues do not only face ICT users only but the world at large, because it may know effect positively and negatively. This report aims to build knowledge or enhance the arrangement about ICT and its ethics, morals and professional issues. The report has identified and discussed the impacts of ethics, morals and professional issues facing ICT users and how this will have negative and positive effects on the users of ICT. The report concludes by discussing possible ways on how to shed light on this issues and what has been make to reduce this issues.INTRODUCTIONAccording to (Anon., 2010) ICT is the technologies that makes people to be able-bodied to acquire information by telecommunications. It mainly focuses on communication technologies where people can communicate verbally and no n-verbally. This includes the mode of internet, wireless networks, prison cellular phone phones, tender networks and other innovated means of communication. Through ICT people can communicate from different countries and it has fashiond a world(prenominal) village in a situation where people communicate as if they living next door. Since users of ICT bang the easily life brought by ICT there are some issues faced by users of ICT which are honorable, moral and professional. This is by dint of manipulating technology in a bad way to use or access information, due(p) to such it brings up problems makes individuals to consider ICT in a more meticulous way.1. ETHICAL ISSUES FACING ICT USERS(Kuzu, 2009) States that ready reckoner ethics is the change of studying involving facts, values, basis and policies due to rapid computer technologies. Whereas (T.Sembok, 2003) views ethics as the grassroots rules that humans ought to follow or do to refrain one from immoral acts such as s tealing, parody and murder. The good function about ethics is that people are accountable for the choices and decisions they make. But the bad thing is that people may abuse their power and do bad things due to the human disciplines and do what outgo suits them. ICT aids the capability of humans to be able to capture, comprehend, keep process and destroy information at a vast speed and magnitude. (T.Sembok, 2003) Argues that the impact and changes due to ICT are not good.1.1 UnemploymentThe rapid use of automate teller machines (ATM) has caused a drop in employment. This is due to the use of ATMs to get silver sent through cell phone from services handle cell phone banking. The service of cell phone banking, one can send money to a persons account through the pay to cell method and e-wallet. By this people no longer have to queue in lines to deposit money. But it is bad because people working at the bank lose out on their jobs due to people diverting to the innovated technolo gy. It is a good speak to by ICT because money can be sent instantly and collecting of money can be done anytime at ATMs unlike collecting it at the bank which has stipulated working time.1.2 HackingHacking computers is done by youngster this is because they have a complex understanding of cracking codes and hack into computers and engender undetected. This is because they are taught how to use computers at a sensitive age. An example of this is when a boy called Michael Calce in February 8, 2000 when he took down big sites like yahoo. He verbalize that his father bought hi a computer when he was six years old this typically shows that hacking is done by youngsters due to the fact that they are taught at young age. But it is good because they are beingness equipped with the knowledge on how to use computers. December 29, 2001 A hacker intrusion on the Malayan parliament website has reportedly generated criticism from some officials who claim the government has taken a slapdash approach to internetsecurity. (T.Sembok, 2003)2. MORAL ISSUES FACED BY ICT USERSMorals are rules that govern behaviour which actions are respectable and wrong. It is upon a person to choose a side which is right or wrong. The users of ICT use it in a wrong way like through2.1 PIRACYAccording to (T.Sembok, 2003) software piracy is the topic of conversation. buccaneering is the unauthorized duplication of copyright content, the good thing about piracy is that people are able to purchase pirated goods at a lower price. But it has negative effects on the original producers of those goods like DVD, CD because their goods would not be bought due to the high price. So it entirely depends on the customers to do what is right or wrong for their interest.SOCIAL NETWORKINGSocial networking is one of the most innovations in the 21st century. The advantage of it is that one can be in touch with friends and families around the world. Business people can advertise their businesses in the social networks to get a variety of potential consumers. Most youngsters who use social networking in become addicted to Facebook, Whatsapp. They can spend a lot of their time on their gadgets communicating through the social networking hence ICT. This deprives their time of socialising physically and their school work. It also encourages cyber bullying because people can create fake accounts and use them to bully people which is bad.3. PROFESSIONAL ISSUES FACED BY ICT USERSIt is knowledge skills in a widely recognised body of learning derived from research, education and training at a high level. (T.Sembok, 2003) ict professionals sometimes face hardships (Gorniak-Kocikowska, 2006)CONCLUSIONThe report identified findings on ethical. Moral and professional issues facing ICT. On the ethical issue of unemployment due to innovation of ICT in bank services. Governments are trying by all means to try to find jobs for its people. They are trying to interlink technology and humans so that theyco mplement to each one other. These days there is internet security which protects ICT users to keep their computers safe from being hacked .this software protects computer users whilst search the internet to prevent it from being hacked. People are advised not to click pop ups in the internet as it is a way of hacking. But Michael Calce called mafia boy wrote a book on how he was able to hack the internet and how it is still vulnerable even though there is internet security. The title of the book is How I cracked the internet and Why its still vulnerable. He states that computer crime has changed from largely a matter of hackers seeking technical challenges to one of criminals motivated strictly by money. The world international laws have put a stiff laws on piracy. Whoever is caught practising piracy will be severely punished also those who purchase pirated stuff. According to (Gorniak-Kocikowska, 2006) ICT can be used for ethical or unethical purposes. This is because the danger of ICT being used to harm humans is real.