Thursday, December 26, 2019

Financial Analysis And Competition Of Microsoft Finance Essay - Free Essay Example

Sample details Pages: 6 Words: 1788 Downloads: 2 Date added: 2017/06/26 Category Finance Essay Type Analytical essay Did you like this example? To enable people and businesses throughout the world to realize their full potential The company, founded in 1975, has worked to achieve its mission through developing and marketing of software and hardware and providing services and solutions that delivers greater convenience and add value to peoples lives. Microsofts presence is throughout the world with offices in more than 100 countries. Microsoft generates revenue by developing a larger range of software products and giving support services for various types of computing devices. Few to name are operating systems for various computers, server applications, business solutions applications, software development tools and video games. Don’t waste time! Our writers will create an original "Financial Analysis And Competition Of Microsoft Finance Essay" essay for you Create order It provides support services for its products (customer retention policy) and also gives training to computer system developers. There are a number of Microsoft certified specialized courses. Designing hardware is also a part of their job. Few examples are Xbox 360 gaming, the Zune digital music, and Microsoft personal computer (PC) hardware products. It earns revenues through license fee for software, even as it develops and delivers cloud-based computing services. (https://www.microsoft.com/investor/default.aspx ) Examples of cloud-based services which Microsoft currently offers are: ÃÆ' ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒâ€šÃ‚ ¢ Bing, its Internet search service; ÃÆ' ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒâ€šÃ‚ ¢ Windows Live Essentials suite, it allows users to upload and organize photos, make movies, communicate via email and messaging and enhance online safety; and ÃÆ' ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒâ€šÃ‚ ¢ Xbox LIVE service, it enables online gaming, social networking, and content access. Current cloud-based services (for business users) are: ÃÆ' ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒâ€šÃ‚ ¢ Microsoft Office Web Apps (online companions to Microsoft Word, Excel, PowerPoint, and OneNote) ÃÆ' ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒâ€šÃ‚ ¢ Business Productivity Online Suite (Offering communications and collaboration solution) ÃÆ' ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒâ€šÃ‚ ¢ Microsoft Dynamics Online family of customer relationship management (CRM) and enterprise resources planning services. Also, Microsoft is in research and development of advanced technologies. Microsoft believes in delivering breakthrough innovation through their integrated software platform in order to meet their customers need and for future growth opportunity. Microsoft focuses on long term growth by improving customer feedback and delivering new products and services and creating new opportunities for its existing partners. Their prime focus is to build on this foundation. OPERATING SEGMENTS Microsoft operates its business in five segments: Windows Windows Live Server and Tools Online Services Microsoft Business Entertainment Devices These segments are very cleverly chosen. They enable Microsoft to easily achieve its Mission. Windows Windows Live Division The overall responsibility of Windows Windows Live Division, also termer as Windows Division, is the development and marketing of the Windows operating system, Windows Live and Internet Explorer. Its revenue growth is mostly correlated with the growth of the PC market, as the original equipment manufacturer (OEM) distribution channel (e.g., Dell, HP, Lenovo, Compaq, HCL, Sony, Toshiba etc) accounts for approximately 80% of total Windows Division revenue. Some of the factors impacting OEM revenue are: ÃÆ' ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒâ€šÃ‚ ¢ Hardware market changes ÃÆ' ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒâ€šÃ‚ ¢ Promotions and pricing changes: Due to variation associated with OEM channel shifts from local system builders to large, multinational OEMs. Windows Division offerings Premium Operating systems Those which contain additional functionality (above standard) and are sold at premium rate Online software and services made available through Windows Live. Versions of Windows operating system: Windows 7, Windows Vista, Windows XP Home and other older versions as Windows 98, Windows 2000 etc. Competition The competitors for Windows operating system are various commercial software products available in the market, offered by some of the well-established companies, including Apple and Google, and from the Linux operating system. Now, Linux (derived from Unix) is available to its users free of any charges. It is one of the first of its kind Open Source operating system. Some other competitors for Microsoft are: Apple Google Mozilla Opera Software Company All of the above offers browsers in competition to Windows Internet Explorer. Server and Tools Server and Tools segment develops and markets and provideservices and solutions around Server software Software developer tools Products and Services: Windows Server operating system Windows Azure Microsoft SQL Server SQL Azure Visual Studio Silverlight System Center products Biz Talk Server Microsoft Consulting Services Premier product support services Competition Computer manufacturers such as Hewlett-Packard, IBM, and Oracle are major players along with Microsoft in this field. Online Services Division The Online Services Division (OSD) includes online information offerings. Examples are Bing, MSN portals and channels. Microsoft majorly earns revenue from online advertising, including search, display, and advertiser and publisher tools. Products and Services: Bing Microsoft adCenter MSN and Atlas online tools (advertisers and publishers). Competition Major competitors for OSD division are Google, Yahoo!, and many other Web sites that provide content and online ad offerings to its users. Microsoft Business Division Microsoft Business Division (MBD) majorly revolves around the following two: Microsoft Office system Microsoft Dynamics business solutions. 90 % revenue of Microsoft Business Division is from Microsoft Office System. Products and Services: Microsoft Office Microsoft SharePoint Microsoft Dynamics ERP and CRM Microsoft Office Web Apps Competition Competitors to the Microsoft Office system include Corel, Adobe, Apple, Google, IBM, Novell, Oracle, Red Hat, Zoho, and other local application developers in Europe and Asia. Infor and Sage compete with Microsofts Dynamic Business solution in both small and midsized markets. Oracle and SAP are solution providers to large size organizations. Entertainment and Devices Division The Entertainment and Devices Division is responsible for developing and marketing: the Xbox 360 platform which includes the Xbox 360 gaming and entertainment console with accessories, third-party games, and Xbox LIVE services. Products and Services: Xbox 360 console and games; Xbox LIVE; Windows Phone; Windows Embedded device operating system; and numerous consumer software and hardware products (such as Mac Office, mice, and keyboards); and Windows Automotive. Competition Competitors of entertainment and devices vary in size from very small companies to very large corporations (with substantial financial and marketing resources). Microsofts Xbox gaming and entertainment business competes Nintendo and Sony. Windows Phone faces competition from a large number of players across the globe. Few to name are Apple, Google, Nokia, QUALCOMM, Research In Motion, and Symbian. (https://www.microsoft.com/en/us/sitemap.aspx) FINANCIAL HIGHLIGHTS                                                    Year Ended June  30,    2010       2009       2008       2007       2006    Revenue    $   Ãƒâ€šÃ‚  62,484       $   Ãƒâ€šÃ‚  58,437       $   Ãƒâ€šÃ‚  60,420       $   Ãƒâ€šÃ‚  51,122       $   Ãƒâ€šÃ‚  44,282    Operating income    $ 24,098       $ 20,363       $ 22,271    (c)    $ 18,438       $ 16,380    Net income    $ 18,760       $ 14,569       $ 17,681    (c)    $ 14,065       $ 12,599    Diluted earnings per share    $ 2.10       $ 1.62       $ 1.87       $ 1.42       $ 1.20    Cash dividends declared per share    $ 0.52       $ 0.52       $ 0.44       $ 0.40       $ 0.35    Cash and cash equivalents and short-term investments    $ 36,788       $ 31,447       $ 23,662       $ 23,411       $ 34,161    Total assets    $ 86,113       $ 77,888       $ 72,793       $ 63,171       $ 69,597    Long-term obligations    $ 13,791    (a)    $ 11,296    (b)    $ 6,621       $ 8,320       $ 7,051    Stockholders equity    $ 46,175       $ 39,558       $ 36,286       $ 31,097       $ 40,104    Includes $1.25 billion of convertible debt securities issued in June 2010 and $3.75 billion of debt securities issued in May 2009. See Note 12 Debt in the Notes to Financial Statements. (b) Includes $3.75 billion of debt securities issued in May 2009. See Note 12 Debt in the Notes to Financial Statements. (c) Includes charge of $1.4 billion (ÃÆ' ¢Ãƒ ¢Ã¢â€š ¬Ã… ¡Ãƒâ€šÃ‚ ¬899 million) related to the fine imposed by the European Commission in February 2008. (* All figures in Million) (Source Annual report, Microsoft Corporation, 2010) Financial Ratios: Current Ratio : Total current Asset / Total Current Liability = $ 55,676 m / $ 26, 147 m = 2.13 This is also termed as working capital ratio. This ratio gives an idea of how well the company is in a position to pay back its liabilities (short term vs. long term). Compared to Microsofts ratio, Google has a Current ratio of around 10 followed by Adobe, which has a ratio of around 3.5. Quick Ratio : ( current Asset Inventory ) / Current Liability = ($ 55,676 $ 740) m / $ 26, 147 m = 2.1 Quick ratio tells a companys ability to meet its short term liabilities with its most liquid assets. Compared to Microsofts ratio, here again, Google has a Current ratio of around 12 followed by Adobe, which has a ratio of around 4 Cash Ratio: Total Cash / Current Liability = $ 36,788 m / 26,147 m =1.4 Debt to Equity ratio : (Short term debt + long term debt)/ Total stakeholders equity = $ 5,939m/ $ 46,175 m = 0.128 Here, amongst Microsofts competitors, Dell has the highest Debt to Equity ratio of 4.It measures a companys financial leverage by dividing its liabilities to stake holders equity. Financial Leverage : Total Asset / Total Equity =$ 86,113 m / $ 46,175 m = 1.86 Net Profit Margin : Net income / Net revenue = $ 18,760 m / $ 62,484 m =0.30 Return On Asset (ROA) : Net income / Average total asset ( average of current year and previous year) = $ 18,760 m / $ 82,000 m =0.228 =22.8% ROA for Microsoft is highest amongst its competitors followed by google, which has around 19%.It says, how profitable a company is relative to its assets. This makes Microsoft a better investment option for investors. Return On Equity (ROE): Net Income / Average total Equity ( Average of current year and previous year) =$ 18,760 m / $ 42,866 m =0.437 (All calculations are based on financial results of Microsoft for 2010, available at public domain of Microsoft, for its stakeholders) Balance Sheet (In millions)                         June  30,    2010       2009    Assets                         Current assets:                         Cash and cash equivalents    $ 5,505       $ 6,076    Short-term investments (including securities loaned of $62 and $1,540)       31,283          25,371                      Total cash, cash equivalents, and short-term investments       36,788          31,447    Accounts receivable, net of allowance for doubtful accounts of $375 and $451       13,014          11,192    Inventories       740          717    Deferred income taxes       2,184          2,213    Other       2,950          3,711                      Total current assets       55,676          49,280    Property and equipment, net of accumulated depreciation of $8,629 and $7,547       7,630          7,535    Equity and other investments       7,754          4,933    Goodwill       12,394          12,503    Intangible assets, net       1,158          1,759    Deferred income taxes       0          279    Other long-term assets       1,501          1,599                      Total assets    $   Ãƒâ€šÃ‚  Ãƒâ€šÃ‚  86,113       $   Ãƒâ€šÃ‚  Ãƒâ€šÃ‚  77,888                               Liabilities and stockholders equity                         Current liabilities:                         Accounts payable    $ 4,025       $ 3,324    Short-term debt       1,000          2,000    Accrued compensation       3,283          3,156    Income taxes       1,074          725    Short-term unearned revenue       13,652          13,003    Securities lending payable       182          1,684    Other       2,931          3,142                      Total current liabilities       26,147          27,034    Long-term debt       4,939          3,746    Long-term unearned revenue       1,178          1,281    Deferred income taxes       229          0    Other long-term liabilities       7,445          6,269    Commitments and contingencies                         Stockholders equity:                         Common stock and paid-in capital shares authorized 24,000; outstanding 8,668 and 8,908       62,856          62,382    Retained deficit, including accumulated other comprehensive income of $1,055 and $969       (16,681 )       (22,824 )                   Total stockholders equity       46,175          39,558                      Total liabilities and stockholders equity    $ 86,113       $ 77,888                               (# Microsoft Financial Statement, 2010) STOCK PERFORMANCE COMPARISON OF 5 YEAR CUMULATIVE TOTAL RETURN* Among Microsoft Corporation, The SP 500 Index And The NASDAQ Computer Index       6/05       6/06       6/07       6/08       6/09       6/10    Microsoft Corporation    100.00    95.03    121.86    115.40    102.15    100.77 SP 500    100.00    108.63    131.00    113.81    83.98    96.09 NASDAQ Computer    100.00    100.43    126.57    117.26    98.08    119.38 (# Microsoft Financial Statement, 2010) As can be clearly seen, No Agency issues or contingent liabilities could be identified from the financial statements of the company. A company finances its assets through issue of bonds and stocks. Bonds: Bond is a debt instrument. Through bonds, an investor lends money to an entity (corporate or governmental). In return the entity pays the lender a fixed amount of interest. Bonds are issued for a defined period of time. Stocks: Stocks represent the original capital invested by the founders of the company. Later, stocks are divided into shares, having a certain face value. Now, there are two types of stocks, Common stock and Preferred stock. A common stock carries voting rights where as a preferred stock typically does not carry voting rights. Using these two instruments, a company can raise any amount of money to finance its assets. A company, since has many means of financing its assets, it also has a number of obligations to meet. A company usually splits its liabilities into short term (current liability) and long term. A liability must be settled through the payment of an asset in some time in future. A liability which is expected to be liquidated with in a companys operating cycle or one year is called short term liability. Now, any other left over liability which is not expected to be paid in a year are termed as long term liability. ( Bragg.M. Steven., The ultimate accountants reference, 2nd edition, 2006)

Wednesday, December 18, 2019

History Is Only What Someone Wrote Down - 1528 Words

A. Whitney Brown once said, â€Å"The past actually happened but history is only what someone wrote down†. From the very beginning of time mankind has looked for ways to pass down their ideas, beliefs, dreams, hopes, values and their understanding of the world around them to the future generations. This need to be remembered led to storytelling. Eventually someone decided to preserve those stories permanently by writing them down. Not too long after the invention of writing came the development and sophistication process of civilization, society and government. By introducing the art of writing, humanity forever altered what would come to be considered â€Å"history†. This is especially true in the case of ancient civilizations. The little information concerning them that is still available to us is in the form of the written word; ancient texts from their respective time periods. Historians have studied these texts and have come to realize a lot about what some of the ancient societies valued and believed. Humanities past is littered with assigned labels and roles according to one’s gender, color and social standing and these ancestral societies were no different. They left lasting legacies with their assigned roles especially in the case of women. One would be mistaken though, in thinking that all ancient societies viewed women’s roles in the same light. â€Å"The Epic of Gilgamesh†, â€Å"Hammurabi’s Code† and â€Å"Assyrian Law† shows that the ancient Mesopotamians, Babylonians and Assyrians allShow MoreRelatedWhat Are We Supposed To Know? The Depiction of a Controversial Character and the Accuracy of a Historical Story972 Words   |  4 Pageslikely to see.† Winston Churchill seems to be saying, that if you don’t understand what happened in the past, you cannot help yourself in the future. William Shakespeare’s depiction of Julius Caesar is very controversial. It seems as if he gi ves the readers the chance to figure out if they like or dislike him. In the form of historical accuracy, Shakespeare is accurate with what he believes to be true. For Shakespeare, what he has written is accurate for his location and time. Shakespeare is very confusingRead MoreThe Rise of National Socialism Essay1162 Words   |  5 PagesThe Germans needed something and someone to believe in again. Adolf Hitler was a great orator and the perfect man for the job. He was an early member of the Nazi party. Hitler was imprisoned for treason and while in prison he wrote. He wrote about the problems the Germans faced. Someone needed to take the blame and the Germans were tired of it always being them. Hitler convinced the people it was the Jews faults. He classified them as stingy and rich he wrote that the Jews ratted out the GermansRead MoreI Carry Enormous Weight And Power911 Words   |  4 PagesAneeq Ahmed Robin Cedar WR 222 18 February 2017 Words carry enormous weight and power. They have been used throughout history to take away agency and power away from people. They have been used to dehumanize, to oppress and to subjugate. This colonizing power of words is encapsulated by the use of the ‘N-word’ by the colonizer of the Americas. What was once a harmless word was turned into a racial slur used to dehumanize and ridicule a group of people becauseof their race. Words can be violentRead MoreWhat Makes An American?791 Words   |  4 PagesWhat is an American? One may say an American is just someone who gets to live free in America, but it is so much more than that. at American is not just a single person but instead it’s everyone as a whole. It’s not who we are as a person but who we are supposed to want to be. An American is everything beautiful. When I think of America I can’t help but think of the song by Katharine Bates, â€Å"America! America! God shed his grace on thee And crown the good with brotherhood From sea to shining seaRead MoreKarl Marx s Theory Of The Classical Era1699 Words   |  7 Pagesprogressed through class struggle. Where there was this conflict between the proletariat and the bourgeoisie social classes. The proletariat being any person who is a member of the working class and has no other choice than to work for someone else. The bourgeoisie being someone who makes their money from the surplus of goods or by the labors of others. He believed the bourgeoisie class exploits the proletariat class. This struggle Marx’s writes about and believes in leads to his hatred of the idea of capitalismRead MoreNathaniel Hawthorne and His Projected Self in the Scarlett Letter970 Words   |  4 Pagesall over. In fact, I just read it for my history class. Not only can the novel be read for an English, but for a history class as well because of the Puritan background. Nathaniel Hawthorne wasn’t just an author that blended in within his era, he stood out. Hawthorne w as unique. He used identifiable contexts that influenced his work, and wrote in mediums such as short stories and novels. In my opinion what made Hawthorne so unique is that he was not only just a writer but he was a very meticulousRead MoreIt is a fact that every day, 22,000 children die that live in poverty. It is a fact that more than800 Words   |  4 Pagesway to stop it would be to educate and teach people survival skills. If you give someone food, they can eat for the day, but if you teach them how to farm, then they can have food for the rest of their life. The two articles that I read were interesting. The next part of the project I worked on was gathering information to prepare for my interview. First, I used the computer to research poverty and wrote down important facts. Then, I created two column notes about all of the facts. AfterRead MorePrimary Source Evaluation Essay1018 Words   |  5 Pagesserious and unforgettable ones. He wrote the material at the time he had already been a member of the Anti- Slavery Society leaving room for a little suspicion of his tendency to exaggerate some descriptions in his narrative. This been said, it is pertinent to note that it is unequivocally clear that the events he describes in this book are those he witnessed firsthand and they made a lasting impression on him. Consequently, this impression motivated him to not only join the Anti-Slavery Society, butRead MoreMain Characters In Electra1446 Words   |  6 Pagesa son, the son could rise in power and cause a revolt and that’s why she had to marry someone of such a lower stati on. When Orestes is a grown man, he comes disguised as a messenger for himself to Electra to see how she is and what she thinks of the current situation. An old servant who saves Orestes’ life when he was younger recognizes him and tells Electra his identity. Then they conspire together to take down their mother Clytemnestra and the man she married that helped kill their father, AegisthusRead MoreThe Confederate Flag Is A Flag Of Hate1163 Words   |  5 PagesIt is the proof that despite the fact that we boast about being stubborn, we are ignorant to the fact that all we do is follow the crowd. It represents a piece of history incredibly rich, yet so full of sorrow, that we are trying to erase. But people do not see this, they only see hate, and they are too oblivious to truly understand what this symbol of liberty stands for. This is why the Confederate flag is a flag of freedom, not hate. The root of the misunderstanding lies in the civil war. The

Tuesday, December 10, 2019

radio news Essay Example For Students

radio news Essay Radio News SpeechGood morning, Sioux City. This is Adam Lewis and you are tuned to KLR on this delightful March 3rd for all your news so youll know whats going on. This story coming right out of good old Sioux City. Eleven businesses in a strip mall on Gordon Drive are all wet after a water main burst early Wednesday morning. Water and mud spewed from the break in the main and into businesses at Sioux Citys Gordon plaza. We walked in to open the store, said Beverly Gonzalez, Dollar etc. manager, and there was mud and water all over.Water began leaking overnight from a fire water main beneath this utility building. The first reaction was one of surprise, of course, said Roan Gruis, Little Chicago Deli Manager, The owner got here at four oclock and the water was running out the front and back doors.When the water drained, the stores were left with a quarter-inch of mud to cleanup. Half of the affected businesses reopened by mid-afternoon. Theres no word yet on what caused the water main to break. And now for your State news.. An Urbandale man whose girlfriend called police after she recognized his face in a surveillance photograph was sentenced Friday to 20 years in federal prison for seven bank robberies. Richard Matzke, 58, was arrested in March 2002 as a suspect in more than 24 bank robberies in several states. He was convicted of seven Nebraska heists and was sentenced Friday in Omaha. Several robbery witnesses described a man who roughly fit Matzkes physical description, but none provided authorities with the license number of a getaway car. Matzkes arrest last year came after his fiance tipped off police. Kim Ford called police to say she recognized him in a surveillance photo published in The Des Moines Register from an Illinois robbery in February. Matzkes criminal history includes 11 drunken-driving convictions, a 1993 bank robbery conviction and a decades-old escape charge. We are going to take a short commercial break now, but when we return we will take a look at national news, and then your Sports and weather. Stay tuned. Play CommercialAnd.were back to take a look at some more newsAnd now this disturbing story coming out of Columbus, Ohio. Thats right, and they arent just taking dogs off the streets or from the pounds, their henchmen are stilling pooches right from their own yards. Its an alarming practice, but it makes good business sense, says one expert. Mongrels from the streets are too lean. But Fido from a backyard is almost guaranteed to be fat and healthy. Rumors first began to surface more than two years ago when a rise of dog napping corresponded with a rise of business at a neighborhood Fast Burgers. Similar reports have been made nation wide. Its really out of hand. In some cases, heart broken owners are eating their own dogs, reports one Fast Burgers employee. Sue Longhorn claims that her yellow retriever purebred met with such a fate. One day when I came home from work, buttons wasnt there to greet me. I looked in all the pounds and called all the neighbors. Nobody saw anything. Then I heard reports of similar dog disappearances, and peoples suspicions. Thats when I knew what had happened. This is obviously a nation wide concern, and itll make a lot for this barbaric practice to be stopped. But I believe if we all work together, we can do it, Sue insists. Dogs may not be the only targeted animal. Any domesticated animal is fair game, because they are the healthy fat ones. Businesses will do what they have to do, especially with the price of beef steadily climbing, one expert points out. Does this mean our animals are doomed? Not if you take the proper precautions. Be careful who baby-sits and walks your dog, and be sure your dog is safe in your back yard, Sue instructs. And now lets take a look at your sports for today. .u15fca9bce19b4626c9d715d8fa15a7c7 , .u15fca9bce19b4626c9d715d8fa15a7c7 .postImageUrl , .u15fca9bce19b4626c9d715d8fa15a7c7 .centered-text-area { min-height: 80px; position: relative; } .u15fca9bce19b4626c9d715d8fa15a7c7 , .u15fca9bce19b4626c9d715d8fa15a7c7:hover , .u15fca9bce19b4626c9d715d8fa15a7c7:visited , .u15fca9bce19b4626c9d715d8fa15a7c7:active { border:0!important; } .u15fca9bce19b4626c9d715d8fa15a7c7 .clearfix:after { content: ""; display: table; clear: both; } .u15fca9bce19b4626c9d715d8fa15a7c7 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u15fca9bce19b4626c9d715d8fa15a7c7:active , .u15fca9bce19b4626c9d715d8fa15a7c7:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u15fca9bce19b4626c9d715d8fa15a7c7 .centered-text-area { width: 100%; position: relative ; } .u15fca9bce19b4626c9d715d8fa15a7c7 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u15fca9bce19b4626c9d715d8fa15a7c7 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u15fca9bce19b4626c9d715d8fa15a7c7 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u15fca9bce19b4626c9d715d8fa15a7c7:hover .ctaButton { background-color: #34495E!important; } .u15fca9bce19b4626c9d715d8fa15a7c7 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u15fca9bce19b4626c9d715d8fa15a7c7 .u15fca9bce19b4626c9d715d8fa15a7c7-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u15fca9bce19b4626c9d715d8fa15a7c7:after { content: ""; display: block; clear: both; } READ: Homeless Essay Salim Stoudamire scored 18 pts and No. 1 Arizona clinched the PAC. 10 title for the 10th time in coach Lute Olsens 20 year tenure, beating No. 19 Stanford 72-69 on Saturday. Josh Childress had 20 pts and 10 rebounds

Monday, December 2, 2019

The Case of the Bambus Essay Example

The Case of the Bambus Paper The Case of the Bambus The Story of the Gambus and its Evolution Yap Yuan Li Ben U0921231H AAI481 Studies in Malay Music Nanyang Technological University The Story of the Gambus and its Evolution Introduction The gambus is an omnipresent and most commonly found lute instrument in the various styles of Malay folk music. It is usually made from wood and is formed almost like a guitar but with 9 to 12 wire strings compared to the guitar’s 6 to 12 strings. There are two types of gambus, namely Gambus Melayu which is the Malay gambus and Gambus Hadhramaut which is the Arabian gambus. Both of them originate from similar backgrounds with the Gambus Melayu a modification of the Gambus Hadhramaut. Today, the gambus is recognised as a national musical instrument of Malaysia and a symbol of Malay traditional music identity (Hilarian, 2006). We will explore further in this essay the origins and evolution of gambus and its role in the Malay musical genre of zapin, hamdolok and ghazal. Gambus Melayu The slimmer and smaller pear-shaped gambus Melayu is comparable to the Yemeni qanbus. Its uniqueness is in its ornamented sickle-shaped carved pegbox that has emblems engraved into it (Hilarian, 2003). Its body is made from jackfruit tree wood and it has a goat skin belly. The strings in gambus Melayu is attached and tuned precisely similar to gambus Hadramaut (Nik Mustapha, 1998). The gambus Melayu is frequently used in Zapin and Hamdolok performances in Johor (Matusky, 1985 as cited by Ang, 2005). The sounds of the gambus Melayu can also be heard in Singapore, Sabah, Sarawak, Indonesia and Brunei (Hilarian 2006). Gambus Hadhramaut The arched-back, pear-shaped Gambus Hadhramaut is quite similar to the classical Arabian ‘ud (Hilarian, 2003). It is made from a combination of ight wood like red meranti, a type of construction timber and durian belanda. The gambus Hadramaut does not have frets and the strings are plucked and attached in double course except the 11th string. The strings are tuned in perfect 4ths beginning from the highest string from the middle C (Ang, 2005). The Transition of the Gambus from Arab to Malay Culture Studies done by Hilarian (2003, 2007) theorized t hat in the 9th century, Muslim Persian conquerors and traders brought the barbat, an early form of lute instrument, into the Malay Archipelago during their migration to Southeast Asia for entertainment purposes (Sachs, 1940). We will write a custom essay sample on The Case of the Bambus specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on The Case of the Bambus specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on The Case of the Bambus specifically for you FOR ONLY $16.38 $13.9/page Hire Writer This is supported by Alatas (1985) who claimed that many Persians and Indians traded in the rich port of Klang, Selangor. The barbat was then modified by Arabs in Mecca to ‘ud and qanbus in Yemen which explains why the gambus bears a striking similarity to barbat, ‘ud and qanbus (During, 1984) down to the tuning in perfect 4ths (Lambert, 1997). In the 16th century, Portugese traders introduced folk music, plucked and bowed stringed instruments to the people of Malacca. However they did not directly influence the introduction of the gambus to the Malay world. The African, Indian and Moorish slaves present at that time integrated their influences of music together with the portugese instruments and created a fusion of music styles that included dondang saying and joget ronggang (Kartomi, 1997). Between the 17th and 18th century, the close ties amongst Johor, Riau and Aceh states via trade, commerce and inter-marriages provided a permeable barrier for gambus to enter the Malay world. Between the 19th and 20th century, the opening of Suez Canal expedited sea journeys from the Middle-East to the Malay world. Many Arabs settled in Indonesia, Singapore and Malaysia from Hadhramaut (Yemen) bringing along the ‘ud (Alatas, 1997). Consequently, the eminence of gambus Hadhramaut succeeded the gambus Melayu in the late 19th or early 20th century in Peninsular Malaysia. The patronage of gambus by Malay rulers, spread of Islam and the cultural convergence of people facilitated dissemination and modification of the gambus throughout the Malay world (Hilarian, 2006). Uses and Evolution of Gambus Both types of gambus are interchangeable and only one is played during a Malay ensemble performance like zapin, hamdolok and ghazal. They are usually the lead melodic instrument for these ensembles and are essential because the sound of gambus is linked to Islam and carries the essence of the Malay vibe. For example, gambus is played in Islamic singing and in taksim (solo performances) during Islamic events like Hari Raya Puasa and Haji. Moreover, the use of gambus associates the ensembles with particular genres of Malay traditional music (Hilarian, 2003, 2007). Zapin Zapin is a form of traditional dance complemented with music by rhythmic characteristics and singing. It uses the voice, the gambus, violin, harmonium, accordion, marwas and dok (Ang, 2005). Anis (1993) asserted that zapin originated from Hadhramaut and is maintained in Malaysia in its original form, named zapin Arab and as a modified form, named zapin Melayu. The zapin Melayu in Johor today is a product of intermarriage of the Arab and Malay cultures literally with modifications by the Malay community over time (Hilarian, 2003). Zapin songs reflect a blending of Malay and Islamic influences. Zapin Melayu has evolved from a group dance of solely males in zapin Arab to that of two separate rows of male and females. Adhering to the Islamic influence, the sexes do not touch during the dance. The entire zapin Melayu repertoire also reflects the love of the Malays for nature. The dance moves are inspired by chickens and fish and interpreted in stylistic refined movements including small graceful jumps. For instance, like a chicken with a broken leg (ragam anak ayam patah) or fish wriggling on mudflats. The men and women dance without shoes and adorn themselves in traditional Malay apparels. The sarong is not tied but held throughout the performance reflecting the past Malay women culture in attempts to protect their modesty. Md. Anis (1993) however is concerned with the recent situation of zapin. He argues that any changes to zapin or any other Malay genres for that matter must be sensitive to its past and values. Historically, zapin Melayu was meant for play and family entertainment. Now, with it being showcased in performances, the dance moves are exaggerated and the production glamorized with special effects. He frowns upon modern choreographs where females raise their arms too high thereby revealing parts of their arms. In addition, the attention of Malay performances today seem to focus more on fanciful costumes, superseding the beauty of the simple dance. The sarong is also hitched exposing the calves and knees, hence clashing with the original modest values of zapin. Hamdolok Hamdolok is a traditional dance theatre performance found in Johor, originating from the Middle East. It is performed during weddings and includes zapin and inang dance forms too. Instruments used include the tambourine, maracas, conga drums and gambus Melayu (Asmad 1990). Today, the use of gambus Melayu sadly remains only in hamdolok. Ghazal Ghazal, a popular music genre in Johor, is formed from the fusion of elements from two or cultures and a modification of the shared features as aforementioned of the mix between various ethnic music influences. The word ghazal in Arabic means poetry of love and it aims to serenade. The ghazal originated from India and arrived in Johor from Riau-Lingga before 1870s. Songs were formally sung in Hindi are supplemented by the sharinggi, sitar, tabla and harmonium (Ang, 2005). In Johor, ghazal has evolved. Johor players substituted the original sitar with the violin and sharinggi with gambus Melayu initially, and then with ghazal Hadramaut subsequently. Songs are now sung in Malay but still mirror its Hindustani and Persian influences prominently. The song titles are also uniquely Malay because they are written about nature and love. For instance, songs were written about the full moon and â€Å"Pak Ngah balik† meaning Pak Ngah has returned. Today, modern ghazal groups also include instruments like mandolin, guitar, flute, Japanese drum and ukulele (Mohd Ishak, 1978, as cited by Ang, 2005). Is The Gambus Gaining Popularity? 18-year-old Fauziah Suhaili from Sabah, Malaysia who recently won the Gambus Fest Female Solo performance competition faced a mountain of challenges from the start. She had to gain approval from her elders as well as earn that trust to play the gambus. Fortunately, she has received much support from the gambus community in Sabah which enabled her to achieve so much (Fauziah, n. . ). However, especially in the states of Kelantan and Trengganu, these success stories are not as prevalent with the number of gambus female players dwindling. In 1950s, numerous female players in Johor contributed significantly to the music. However, in present times, women are limited to singing in traditional musical ensembles. Similarly, in Brunei, women are discouraged to play the gambus over the last 25 years. The school of Islamic practice in Brunei also generally dissuades women from playing music or performing with men. Other than Fauziah Suhaili, it appears that our generation of youths are not interested in traditional Malay music like ghazal because of widespread dissemination of popular Western culture into the traditional music space (Hilarian, 2007). Conclusion Gambus in zapin, hamdolok and ghazal has evolved innovatively through the decades and is now an expression of Malay culture. The residual distinctive characters from its original forms are clearly evident but the profound changes allow it to be proudly called a symbol of the Malay traditional and contemporary music distinctiveness. However, traditional Malay music has not received much support from the media, especially in Singapore unlike other styles like Chinese and Indian music which has deep roots locally and are always portrayed in media for awareness. The dominance of Western music, ideals and pop culture has intruded into the Singapore’s Malay community, infringing the space of traditional Malay Music. It will be a disaster if this dying art gets killed off in our generation and that beautiful traditional Malay music we take for granted so easily would be only a myth for our future generations. Much support and efforts by the younger and older generation are needed in tandem with the media and government funding to revive this dying treasure back to its glory days. References i) Alatas, S. F. (1985). Notes on Various Theories Regarding the Islamization of the Malay Archipelago. Muslim World, 75, No. 3-4, 162-175. ii) Ang, M. K. (2005). Musical Malaysia. Retrieved October 28, 2009, from http://www. musicmall-asia. com/minni/index. html iii) During, J. (1984). In S. S. (Ed. ). The New Grove Dictionary of Musical Instruments. London: Macmillan Publishers Limited. v) Fauziah Suhailah/ Gambus (n. d. ). Fauziah Gambus. Retrieved October 28, 2009 from http://fauziahgambus. synthasite. com/ v) Hilarian, L. F. (2003). Gambus (lutes) of the Malay World- Its Origins and Significance in Zapin Music. Presentation of paper at A Symposium in Memory of John Blacking, 12-14 July 2003, University of Western Australia. vi) Hilarian, L. F. (2006). The Folk Lute (Gambus), and its Symbolic Expre ssion in Malay Muslim Culture. Institute of Lithuanian Literature and Folklore Studies XXXII. vii) Hilarian, L. F. (2007). The Migration of Lute-Type Instruments to The Malay-Muslim World. Presentation of paper at the Conference of Music in The World of Islam, 8-13 August 2007, Assilah. viii) Kartomi, Margaret J. (1984) . Gambus.. The New Groves Dictionary of Musical Instruments, (ed. ) Stanley Sadie, London: Macmillan, No. 2, 9-10. ix) Lambert, J. (1997. La medecine de l. ame, Hommes et Musiques. Paris: Societe d. ethnologie, France x) Matusky, P. (1982). Music from Malaysia. Resound. I/4: 1-2. xi) Matusky, P. (1982). Musical Instruments and Musicians of the Malay Shadow Puppet Theater. Journal of the American Musical Instrument Society. VIII(1982): 38-68. ii) Mohd. Anis Md. Nor. (1993). Zapin-Folk Dance of the Malay World. London: Oxford University Press. xiii) Mohd Ishak Abdul Aziz. (1978). Ghazal. Kuala Lumpur: Kementerian Kebudayaan, Belia dan Sukan. xiv) Nik Mustapha Nik Mohd. Salleh (1998). Alat Muzik Tradisional Dalam Masyarakat Melayu Di Malaysia. Kuala Lumpur: Kementerian kebudayaan, Kesenian dan Pelancongan Malaysia. xv) Pickens, L. (1975) Folk Musical Ins truments of Turkey. London: Oxford University Press. xvi) Sachs, C. (1940). The History of Musical Instruments. New York: W. W. Norton and Company, Inc. Publishers.

Wednesday, November 27, 2019

Unit 10 Lab Essay

Unit 10 Lab Essay Unit 10 Lab Essay NT 1310 Unit 10 Lab Max Haney 11/18/2014 Building a New Structure- Problem Analysis Errors are common in communication systems due to various reasons like noise, interference, inter-modulation, echoes, signal fading, equipment limitations, etc. Though optical fiber medium is considered to be the best medium, we know that practical media cannot be hundred percent error-free. Here is a list of standard problems in most fiber solutions: Bit-Error-Ratio is defined as the ratio of the number of bits received in error to the total number of bits transmitted in a specified time interval. Degraded Minutes (DM) - Degraded Minutes is a group of 60 consecutive seconds after excluding SES, with a BER of 10^-6 or worse. Hence a DM will have at least 5 errors, assuming a data rate of 64 kbit/s. Available Seconds (AS) The measure of percentage of time for which the circuit is available for use in an error free condition is called Available Seconds. Unavailable Seconds (US) - If the error activity continues at an excessive level for a significant period of time (say 10 seconds or more) then the circuit is considered to be unavailable. Unavailable Seconds is a measure of percentage of time the circuit is not available for use. Error Seconds (ES) - A second with at least one anomaly or defect is called Error Second. List of testers and tools: Optical Time Domain Reflectometer (OTDR) - OTDR provides various applications such as normal (point-to-point) fiber cable construction testing and fault location, splice

Saturday, November 23, 2019

Recommendation Letters in Signed, Sealed Envelopes

Recommendation Letters in Signed, Sealed Envelopes Graduate and undergraduate schools alike often require hopeful students to include recommendation letters with their applications, with many graduate programs requiring the envelope containing the letter be signed and sealed by the recommending writer. Often students will ask the letter-writer to return their recommendations, each in a separate signed and sealed envelope, but many students also wonder if its too much to ask for the mentor to do- is organizing all that paperwork unreasonable? The short answer is no- its almost required in order for the contents of the letter to remain private from the students they are about.   The Standard for Recommendation Letters For most academic institutions accepting applications that require recommendation letters, the standard is that students are not to have contact- be able to read- their letters of recommendation. Traditionally, programs required that faculty submit recommendation letters independently of the student or give them to students in sealed and signed envelopes. The problem with asking faculty to send recommendations directly to the admissions office is the possibility of losing a letter, and if a student does choose this route, it would be best to contact the admissions office to determine that all expected letters have arrived. The second option is for the faculty to return their letters of recommendation to the student, but the letters are confidential, so admissions committees ask that faculty seal the envelope and then sign over the seal, assuming that it will be obvious if a student opened the envelope. Its Okay to Ask for Signed, Sealed Envelopes Admissions offices often prefer that applications arrive complete, with faculty recommendations in the packet, and most faculty  members know this, so dont feel that youre asking faculty to do too much work. Because this is and has been a standard part of most college application processes, the letter writer will likely understand the official preferred process. That said, a student can make it easier by preparing an envelope for each program he or she is applying to, clipping the recommendation form and any relevant material to the envelope. Recently, electronic applications have become very common, possibly even the norm, making this whole process almost obsolete. Instead of the traditional sign, seal, deliver process, a student will complete his or her application online then send the person writing the recommendation letter a link to submit it online. The student will be notified if and when the letter is received and can, therefore, contact the faculty member if any problems arise. Dont Forget to Say Thank You After everything is said and done, the recommendation letter and complete registration packet submitted, its important for students to take the time to thank the person who wrote his or her recommendation letters and helped him or her in the application process.   Although not required, a token of appreciation like flowers or candy goes a long way in returning the faculty members consideration of the student- plus, who doesnt like getting a little thank you gift?

Thursday, November 21, 2019

Law problem Article Example | Topics and Well Written Essays - 500 words

Law problem - Article Example Although the FCC is responsible for regulating communication providers in the country, they clearly overstep their mandate when they appear to control the television channels and dictate the content that they air. The FCC cannot dictate what amount of money that these cable companies charge for fees. Subsequently, they are overstepping their mandate and these rules clearly exceed the authority given to them. Any appeal lodged against the FCC will be successful on these grounds. The FCC has a right to censor obscene or provocative language on the national radio. When Pacifica decided to broadcast, "Filthy Words†, they made that decision at their risk. The situation that they are in lies in the fact that they chose to air controversial content on the radio, without the use of censorship. Therefore, the FCC is justified in the decision that they made due to his careless conduct of the local radio station. The FCC may use its powers to suspend licenses of broadcasters who have breached indecency regulations. They may also suspend licenses, revoke licenses and deny applications for broadcast licenses based on these laws. For this reason, the FCC has the legal right to carry on the necessary proceedings against Pacifica. The prisoners were right in making a complaint against the FDA for failing to take action against the manufacturers of the drugs used in lethal injection. The procedure, however, is legal and is utilized in the execution of death row inmates. Therefore, the FDA has no authority to question the utilization of the lethal injection drug. Nevertheless, these prisoners are all death row convicts who are awaiting execution, and the standard procedure involves execution by lethal injection. Therefore, the prisoners are wrong to put up a case with the FDA, who have no jurisdiction whatsoever over the issue. Although the Sierra Club has a genuine environmental concern, the leased land from the federal government

Tuesday, November 19, 2019

Marketing Communication Based on Video Research Paper

Marketing Communication Based on Video - Research Paper Example Absolut is a business entity which was originated as a brain child of Lars Olsson Smith, the king of Vodka. The Absolut organization exists to provide the best quality vodka in the world. Today it is one of the leading brands of Vodka. The originators suggest that the main ingredient required to produce Absolut is a grain grown in Ahus, in Southern Sweden. The producers have coined a â€Å"one source concept†. It is this one source concept that the manufacturers believe causes Absolut vodka to be absolute. The Absolut website states that it is made of only natural ingredients, namely, winter wheat and water. Absolut is viewed as a perfect unit in that its bottle, its taste and its price combine to form one package. Over the years Absolut has added many flavors to its original and premium product. Flavors include Peppar, Citron, Mandarin, Rasberri, Vanilla, Kurant and Pears. Absolut on their website proposes that their Mandarin and Orange are two of the most popular flavors in the world. The brand’s origins and its background The brand Absolut was established since 1889 when Lars Olsson Smith registered the brand name and began to revolutionize the manner in which vodka was made. By 1979, it was imperative for Absolut to begin to export to countries around the world in order to survive. The genesis for Absolut was the idea of the legendary Lars Olsson Smith who revolutionized the manner in which distillation was done. He created the rectification method of distillation and to this day producers of alcoholic beverages still use this method. For Smith, rectification allowed all the impurities involved in the production of vodka to be removed. Thus, Smith called the product of his rectification Absolut rent branvin which means â€Å"Absolute pure vodka† in Swedish. For this reason, Lars Olsson Smith is known as the King of Vodka. In 1992, Absolut advertising campaign was inducted into the American Marketing Association’s Marketing Hall of Fame. Amazingly, this feat was won without the use of te levision as an advertising medium. Richard Lewis (1996) the mastermind behind Absolut’s advertising campaign claims that the major purpose of the campaign was â€Å"to build a healthy and enduring brand for Absolut.† Throughout the first hundred years of its existence Absolut was perfected in its taste, its texture and its packaging. 1.3 The brand’s popularity Although Absolut in its website views itself as the number one selling vodka in the United States, other sources such as Impact International believe that in 2010 Absolut was the fourth largest â€Å"international premium spirit in the world. Impact International noted that Absolut is available in 126 markets. Lewis (1996) notes that in 1981 at the beginning of the Absolut advertising campaign, 20,000 cases of vodka were sold to the United States each year by 1995; sales had reached to 3 million cases per year. Sarah Edmunds of Reuters in her interview with Bengt Baron posits, â€Å"In the United States †¦ Absolut has about 10-1/2 to 11 percent of the total vodka market, sales rose to 4.9 million nine-litre cases in 2006, up from 4.7 million in 2005. Also at this interview Baron observed that Absolut has â€Å"98 percent brand awareness in the (U.S.) consumer (market) and we're still growing faster than the market in general†. Nonetheless, Absolut still advertises itself on its website as the leading brand of vodka in the world. A positioning- perceptual map is an

Sunday, November 17, 2019

Modern Terrorism Essay Example for Free

Modern Terrorism Essay Part One: 1. What major measures can the international community take to prevent terrorism? The fight against terrorist organizations and terrorism is not just a fight that the United States must face alone. This is evident from the Madrid train bombings, the bombings in London, and the terrorist attacks that Israel seems to face everyday from Hizballah. Terrorism is, in effect, international. All nations have a responsibility to combat terrorism to protect them and to protect other nations as well. One of the security measures that can be undertaken is that of securing aircraft and airports. Enders and Sandler cite in their book that between 1973 and 2002, there was an average of ten skyjackings per year (Enders, W. . Sandler, T., 2012). This was a number that is surprising due to the fact that it seems like most werent reported or very little coverage was given to the incidences. There are new technologies being developed all the time to aid in securing of air travel. There is new technology in the area of explosive detection devices. One such technology is called micro-tagging. During this process, tiny chips of micro-taggants are blended into explosive substances and color-coded to identify the manufacturer and batch of explosives (IME, 2005). This system would also be beneficial in the reconstruction of bomb scenes and used to gain knowledge and prepare for future terrorist acts. Another innovative technology is called dielectric analysis. Dielectric analysis is a powerful non-destructive tool for characterizing materials; it can provide accurate, repeatable results unavailable by other electrical means. This, in essence, gives the explosive agents a â€Å"fingerprint† and could provide immediate identification of explosive substances at airports (DHS, 2012). Along with technological advanced in air security, people can often make the biggest impact. In this area, Federal Air Marshals play an important role. This is not something that all countries partake in but more and more countries are adding these individuals to their flights. The airline association estimates that 10 or 20 out of some 115 airlines that fly into the United States already use air marshals (Lichtblau, 2003). Israel, for instance, has used marshals on El Al flights for years, and as stated, some other countries have followed suit more recently, as Australia announced in 2003 that Qantas Airways would begin placing armed marshals on flights to Singapore. Mexico has stated that they would start to use their own air marshals on flights that are going to the United States. However, not all countries and airlines are signed on to the idea. Air France does not use air marshals and the British Air Line Pilots Association said it does not believe that arms belong on aircraft, and British Airways, the countrys biggest airline, said it reserves the right not to fly if it is forced to add air marshals (Lichtblau, 2003). Although there is a general feeling among passengers that they would feel safer on a flight if there were an air marshal on board, not everyone believes the passengers would necessarily be safer. There are those that cite that an armed conflict on a plane would become more dangerous to the passengers as opposed to just letting the terrorist state their demands and work with them for the release of passengers. Sound, actionable, intelligence is another area that countries can utilize for overall protection. Political intelligence is an important factor to combating terrorism. This can be used to identify where the groups are garnering the most support for their cause. When this has been determined, pressure from other nations can be placed on these states to not support the terrorists. The gathering and use of military intelligence is vital in any operation. The intelligence gathered by our forces can assist in finding out how many are in a particular group, what kinds of weapons they have, and where they are located. 2. Do you think the U.S. should follow Israel’s example of fighting terrorism? Explain fully. Israel has been fighting terrorism for many years, even before they became a nation in 1948. They are surrounded by Muslim nations, which historically do not get along with Israelis. This is particularly true of Palestinians. Since Israel is surrounded by so many that wish to do them harm, they have had to take more drastic steps in order to protect themselves. They had become one of the first countries to articulate a deliberate and official policy of retaliation against terrorism. Most nations understand that a nation must fight back in order to protect itself and its interests. Israel on the other hand seems to retaliate in a much more aggressive manner. Such a case was their retaliation against an Arab village in Qibiya, Jordan in 1953. On October 13, 1953, Jordanian terrorists infiltrated the Israeli border and threw a grenade into a house, killing a mother and two children in Tiryat Yehuda. In an effort to prevent further attacks and protect its borders, Israel launched a reprisal raid on Qibiya, a Jordanian town across the border from Tiryat Yehuda. Unit 101, led by then Colonel Ariel Sharon, destroyed 50 homes, killing 69 Jordanian civilians who were hidden inside and had gone unnoticed (Oreck, A. 2007). Sharon had stated that he was not aware that civilians were involved but that did not help in the embarrassment that Israel suffer ed due to the incident. The Israelis have pioneered the area of preemptive strikes against terrorism. This policy is a bit more difficult to convince the international community for its justification. It is one thing to fight back against an attack on your country it is another to strike first to prevent such an attack. But in many cases is necessary to do so. Should we follow Israel’s example? If that question had been posed ten or fifteen years ago, I may have said no. Today, my answer would be yes, with a caveat. Though it may be difficult, I think we would need other countries to publicly back us to carry out certain missions. In the case of a preemptive strike, our allies must be informed of such action so they are not taken by surprise of the situation. As far as targeted killings, we had better have support in this undertaking or else we are going to look like the aggressors or worse, assassins. A prime example is our current situation in the Middle East. Although the United States has a policy against taking out heads of state, which President Ford imposed by executive order in 1976, there is nothing to say that we cannot take out leaders of terrorist groups as in the case of Osama bin Laden. In the climate we live in today, we had better have all of our options open and on the table if we want to defend ourselves and help prevent future attacks. 3. Identify and explain at least three international conventions organized to suppress terrorism. I.The International Convention for the Suppression of the Financing of Terrorism adopted by the United Nations General Assembly on December 9, 1999, and signed on behalf of the United States of America on January 10, 2000. The Convention is aimed at cutting off the funding that terrorist groups need to operate. This Convention provides an obligation that States Parties criminalize such conduct and establishes an international legal framework for cooperation among States Parties directed toward prevention of such financing and ensuring the prosecution and punishment of offenders, wherever found. II.The International Convention for the Suppression of Terrorist Bombing was adopted in 1997. At this convention, The United Nations (1997) states: Created a regime of universal jurisdiction over the unlawful and intentional use of explosives and other lethal devices in, into, or against various defined public places with intent to kill or cause serious bodily injury, or with intent to cause extensive destruction of the public place. (article 2) It is similar to other conventions in that it requires parties to extradite or submit for prosecution person’s accused of committing or aiding in the commission of such offenses. III.The Convention on the Making of Plastic Explosives for the purpose of Detection was ratified by the United Nations in 1991. The members of the U.N. were concerned that plastic explosives had been used for such terrorist acts in the past and could be again in the future and wanted to do something about it. This Convention was aimed at deterring such unlawful acts of the use of plastic explosives because they felt there was a need for an international mandate for States to adopt appropriate measures to ensure that plastic explosives are marked. 4. Briefly evaluate the provision of the U.S. Patriot Act. The U.S. Patriot Act has ten different provisions that outline the United States governments war on terrorism. These provisions impact the war on terrorism in different ways. Some of the provisions deal with rights and responsibilities; others provide areas in which terrorism can be fought. The first title is for the enhancement of domestic security and provides for funding and information gathering. It also prohibits the discrimination against Muslim Americans. Title II is probably the most controversial of all the provisions. It is here where the perceived infringement on civil liberties takes place. This provision reshapes the way the federal government can collect information. The FBI can seize materials from private citizens when it believes national security is at stake and then get permission from courts to do so afterwards. Title III involves the area of money laundering and the financing of terrorist organizations. Title IV increases border patrols and mandates the detention of suspected terrorists. Title V deals with removing obstacles in the investigation of terrorism and addresses the capture and prosecution of terrorists. Title VI provides aid to the families of Public Safety Officers who were injured or killed in terrorist attacks, and amends the Victims of Crime Act of 1984. Title VII supports the sharing of information by federal law enforcement agencies. Title VIII strengthens criminal laws against terrorism, defines domestic terrorism, and expands biological weapons statutes. Title IX provides guidance on intelligence information sharing from foreign agencies. The information derived from electronic surveillance or physical searches is disseminated for efficient and effective foreign intelligence purposes. The last title is kind of a catchall and is listed as miscellaneous. It contains 16 sections that do not fall under other titles in the act. 5. Briefly discuss the impact of emergency powers on defeating terrorism. Many nations have forms of so called, â€Å"Emergency Powers†. Some countries call it â€Å"State of Exception†, â€Å"Special Powers†, or â€Å"Terrorist Affected†. No matter what a country may call their emergency powers, extreme circumstances may exist in which the security of the country in needed and these powers allow for authorities to stop, search, question and detain individuals suspected of terrorist involvement. There have been emergency powers used even before the United States was formed. Between 1775 and 1781, the Continental Congress passed a series of acts and resolves which count as the first expressions of emergency authority. These instruments dealt almost exclusively with the prosecution of the Revolutionary War (Relyea, 2006). The President of the United States has available certain powers that may be exercised in the event that the nation is threatened by crisis, exigency, or emergency circumstances (other than natural disasters, war, or near-war situations). Part Two: What changes has the F.B.I. made since 9/11? How have these changes improved the F.B.I.’s ability to respond to terrorism? Director of the Federal Bureau of Investigation, Robert S. Muller, III said the following in a 2008 Washington Times article: Before 9/11, we were an agency that focused primarily on investigating crimes after the fact, he told The Washington Times in an e-mail interview this week. Today we are actively preventing and disrupting destructive and illegal acts before they occur. (para. 3) A few examples of how the F.B.I. is accomplishing this are how they recruit and train their special agents. Mr. Muller instituted a five-year move up or get out plan for its leadership, calling it critical to the success of the future success of the F.B.I. The budget for 2012 was $8.1 billion including $119.2 million in program increases to enhance counterterrorism, computer intrusions, and other programs (The FBI, 2012). They have also made great efforts to increase information sharing with other intelligence agencies which makes efforts to prevent terrorists activities a greater success as in the thwarting of the attempted bombing of downtown Manhattan financial district just a few short months ago. Since the institution of Director Muller’s initiatives and the FBI’s new focus on counterterrorism rather than just being a reactive agency, the FBI is better trained and equipped to not only respond but to go on the offensive when needed. With the help of the Patriot Act and the expanded powers it allows law enforcement to react more decisively and with greater effectiveness. Part Three: What were the policies of Germany and Japan before 9/11? What measures have been taken by these two countries in order to combat terrorism? Prior to 9/11, the German government had a typical laissez faire approach to international terrorists and their organizations. After 9/11 this changed. In a CRS report, Miko, F.T. (2004), stated the following: The German response to the 9/11 terrorist attacks against the United States was immediate and unprecedented in scope for that country. Setting aside its post-World War II prohibition against deploying forces outside of Europe and overcoming pacifist leanings of some in the governing coalition, Germany quickly offered military and other assistance to the United States. In his initial reaction to the attacks of 9/11, Chancellor Gerhard Schroeder declared Germany’s â€Å"unlimited solidarity† with the United States. On September 12, 2001, the German government, along with other U.S. allies, invoked NATO’s Article V, paving the way for military assistance to the United States. The Chancellor gained approval from the German Parliament to deploy troops to Afghanistan with a call for a vote of confidence in his own government. Since then, German efforts in the fight against terrorism have expanded across a wide spectrum. Germany has instituted significant policy, legislative, and organizational reforms. Bilateral cooperation with the United States has been extensive, despite differences stemming from the distinct approaches and constraints in each country and frictions resulting from sharp disagreement over Iraq policy. (p. 1) Since the end of WWII and Japan’s defeat, their policy has been one of maintaining a Ground Self Defense Force (GSDF) aimed at protecting the homeland only. While Japan remains a loyal supporter of the United States, the public is very reluctant to view military intervention outside the country as favorable. However, they did send a small force to Iraq in a relatively peaceful operating environment in the town of Samawah. While there they neither caused nor received any casualties, which was popular with the Japanese public. Although Japanese opinion on the wars in Afghanistan and Iraq suggests a willingness to recognize the utility of military power for territorial defense, but not for offensive uses of force, unless these are directly related to national defense, they remain a strong supporter of U.S. policies against terrorists. Part Four: Summarize the salient points of the National Strategy For Combating Terrorism. The salient points of the National Strategy For Combating Terrorism can be summed up as follows: âž ¢Defeat Terrorists and Their Organizations âž ¢Deny Sponsorship, Support, and Sanctuary to Terrorists âž ¢Diminish the Underlying Conditions that Terrorists Seek to Exploit âž ¢Defend U.S. Citizens and Interests at Home and Abroad The list above serves as the Goals and Objectives of the National Strategy for Combating Terrorism as of 2007. These same goals still hold true today. Part Five: Summarize the salient points of the National Strategy To Combat Weapons of Mass Destruction National Strategy to Combat Weapons of Mass Destruction. This was first issued by then President, George W. Bush in December 2002. A description of strategy is as follows: The Weapons of Mass Destruction strategy presents a national strategy to combat weapons of mass destruction (WMD) through three major efforts: (1) nonproliferation, (2) counter-proliferation, and (3) consequence management in WMD incidents (The White House, 2003). The plan addresses the production and proliferation of WMD among nations, as well as the potential threat of terrorists using WMD agents. I leave you with a final quote from President George W. Bush. â€Å"The gravest danger our Nation faces lies at the crossroads of radicalism and technology. Our enemies have openly declared that they are seeking weapons of mass destruction, and evidence indicates that they are doing so with determination. The United States will not allow these efforts to succeed. History will judge harshly those who saw this coming danger but failed to act. In the new world we have entered, the only path to peace and security is the path of action.† President Bush The National Security Strategy of the United States of America September 17, 2002 References: (2005). Taggant History and Background. IME. Retrieved January 8, 2013 from http://www.ime.org/dynamic.php?page_id=66 (2012). Electromagnetic Studies of Explosives Laboratories. 1-2. Department of Homeland Security: http://www.orau.gov/DHS-TSLvisSciProg/labs/TSL_EMX LAB.pdf. (2012). Quick Facts. The FBI. Retrieved January 15, 2013 from http://www.fbi.gov/about-us/quick-facts Conery, B., Mueller praises FBI’s changes since 9/11. The Washington Times. [Editors Picks]. Retrieved January 15, 2013 from http://www.washingtontimes.com/news/2008/jul/25/mu eller-praises-fbis-changes-since-911/?page=all Enders, W. . Sandler, T. (2012). The Political Economy of Terrorism. (2nd ed., pp. 86-90). New York, NY: Cambridge University Press. Lichtblau, E. (2003). U.S. says it will force countries to arm flights. San Francisco Chronicle, A/1. Retrieved January 8, 2013, from http://www.sfgate.com/cgi-bin/article.cgi?file=/c/a/2003/12/30/MNGJD40F651.DTLtype=printable. Miko, F.T. (2004). Germanys Role in Fighting Terrorism: Implications for U.S. Policy. (RL32710). 1. United States Congress. Retrieved January 15, 2013 from http://www.fas.org/irp/crs/RL32710.pdf Oreck, A. (2007). Qibya. Jewish Virtual Library, The Library. Retrieved January 8, 2013, from http://www.jewishvirtuallibrary.org/jsource/History/Qibiya.html. Relyea, H. C. (2006). National Emergency Powers. In CRS Report for Congress. Congress. Retrieved January 9, 2013, from http://www.fas.org/sgp/crs/natsec/98-505.pdf. The White House. (2003). National Strategy to Combat Weapons of Mass Destruction. Arms Control Today. Retrieved January 15, 2013 from http://www.armscontrol.org/act/2003_01-02/document _janfeb03 United Nations. (1997). Conventions Against Terrorism. Retrieved January 9, 2013, from United Nations: http://www.un.org/law/cod/terroris.htm

Thursday, November 14, 2019

Anthony Trollopes: An Eye for an Eye :: Ethics Morals Anthony Trollope

Anthony Trollope's: An Eye for an Eye Anthony Trollope's intense commitment to drawing for his readers a picture of the world as it actually is, to creating a fictional reality in which they "might recognise human beings like to themselves" (Autobiography 145), can obscure the depth and sincerity of his concern with the moral dilemmas confronting the characters he has so painstakingly rendered lifelike. But as the startlingly candid passage quoted above from the Autobiography reveals, Trollope's purposes in his fiction are not merely descriptive, but normative as well; he sets out both to show us "the way we live now" and to direct our attention to questions that are in the broadest sense ethical: how ought we to live? His unflagging desire to "please," however, and his firm belief in the primacy of characterization among the novelist's tasks render the extraction of his "system of ethics" from his novels a delicate and difficult task: his characters are, ineluctably, individuals and unlike those populating the works of more overtly "philosophical" novelists, cannot often be taken as unproblematic representatives of an abstract quality larger than themselves. Trollope's "system" is to be an ethics of everyday life, one that takes as its province situations irreducible to arid formulae. Close examination of the late novel An Eye for an Eye illustrates both the nuanced, even protean, subtlety of Trollopean ethics and the ways in which his moral code is complicated by the gender, class, and national dimensions of the life he portrays so vividly. The novel, in its remarkably evenhanded treatment of the agonizing choice facing a young English aristocrat who seduces and impregnates an Irish girl of disreputable provenance, displays a sophisticated and sympathetic understanding of the manner in which larger social and historical forces impinge on the decisions we make as supposedly free moral agents. The story dramatizes the tension between two approaches to moral problems: on one hand, there is what we might call an ethics of particulars, represented by Scroope Manor and the older members of the Neville family, an insistence that questions of right and wrong can only be justly resolved by reference to the social position of the moral agent and to the organic structure of the society in which he or she is enmeshed. On the other hand, there are the claims of a universalizing ethical praxis in which each individual must be viewed as an end in himself or herself, regardless of circumstance. Anthony Trollope's: An Eye for an Eye :: Ethics Morals Anthony Trollope Anthony Trollope's: An Eye for an Eye Anthony Trollope's intense commitment to drawing for his readers a picture of the world as it actually is, to creating a fictional reality in which they "might recognise human beings like to themselves" (Autobiography 145), can obscure the depth and sincerity of his concern with the moral dilemmas confronting the characters he has so painstakingly rendered lifelike. But as the startlingly candid passage quoted above from the Autobiography reveals, Trollope's purposes in his fiction are not merely descriptive, but normative as well; he sets out both to show us "the way we live now" and to direct our attention to questions that are in the broadest sense ethical: how ought we to live? His unflagging desire to "please," however, and his firm belief in the primacy of characterization among the novelist's tasks render the extraction of his "system of ethics" from his novels a delicate and difficult task: his characters are, ineluctably, individuals and unlike those populating the works of more overtly "philosophical" novelists, cannot often be taken as unproblematic representatives of an abstract quality larger than themselves. Trollope's "system" is to be an ethics of everyday life, one that takes as its province situations irreducible to arid formulae. Close examination of the late novel An Eye for an Eye illustrates both the nuanced, even protean, subtlety of Trollopean ethics and the ways in which his moral code is complicated by the gender, class, and national dimensions of the life he portrays so vividly. The novel, in its remarkably evenhanded treatment of the agonizing choice facing a young English aristocrat who seduces and impregnates an Irish girl of disreputable provenance, displays a sophisticated and sympathetic understanding of the manner in which larger social and historical forces impinge on the decisions we make as supposedly free moral agents. The story dramatizes the tension between two approaches to moral problems: on one hand, there is what we might call an ethics of particulars, represented by Scroope Manor and the older members of the Neville family, an insistence that questions of right and wrong can only be justly resolved by reference to the social position of the moral agent and to the organic structure of the society in which he or she is enmeshed. On the other hand, there are the claims of a universalizing ethical praxis in which each individual must be viewed as an end in himself or herself, regardless of circumstance.

Tuesday, November 12, 2019

Evaluate the regulation of care provision for looked after children and young people Essay

The organisation that support carers and who regulates them include: The General Social Care Council (GSCC) is responsible for the registration of all people who work in social services in England and for regulating their education and training. This includes those working with adults and with children. Local Authority Children’s Services: Ofsted are responsible for the inspection of local authority arrangements, for the protection of the children within them. These unannounced inspections look at how well the local authority and its partners identifies, helps and protects children in the local authority area, and safeguards the organisations that are responsible for children in vulnerable positions or may need extra looking after, for example children in foster care. The Care quality commission (CQC) deals with the essential standards to make sure quality and safety is taken into account. This includes places that care is provided such as the District general hospital and car e homes. The CQC has the authority to take action on behalf of people who use services that may be unsatisfactory. This can only take action if there is reason to think that anyone’s basic rights or safety are not being met. The CQC can make particular actions in reaction to risks seen as serious. For example, the CQC can request that a care home or hospital is closed until the provider reaches the safety requirements, otherwise suspension will go forward. The CQC can take a service off the register without question when necessary. Third section organisations are also in place for the protection of children; these can be charity organisations which receive both public and private funding. These organisations include: Barnados- This is a charity which helps to support: vulnerable children, children’s families, communities and young carers. Their job is to prevent as much child poverty, child abuse and child sexual abuse from happening. They campaign for the rights of children and provide a range of support including: counselling, fostering, adoption, training and educational services. For more than 100, 00 children and young people and their families, they also help asylum seeking children. It is one of the biggest children’s charities in the UK and raises money through high streets stores, local retail shops and second hand stores as well as an online shop.  NSPCC- Their â€Å"aim is to end cruelty to children in the U K.† The NSPCC helps children at risk, by helping those who are the subjects of: neglect, physical abuse and sexual abuse. They also help children under one, looked after children. To help end cruelty to children and young people in the UK, they create and deliver services that will be capable for protecting children and young people. They provide support and advice for adults and professionals if they are concerned about a child. They work with organisations to make sure that they will effectively achieve protection of children and young people and campaign for changes to legislation for the protection and rights of every individual child. Childline is a service that children and young people can contact for free if they are ever in need of talking to someone confidentially about general issues and problems, big or small. If a child is worried, scared, upset or just in need of talking to someone they can contact Childline and someone can provide information and support where they can call free, have a 1-2-1 chat online on an instant chat service, send emails, message on the Childline message boards or Ask Sam. â€Å"Whenever children need us, Childline will be there for them- 24 hours a day, 7 days a week, and 365 days per year.† Private Providers are put in place for the care of children such as: private nurseries that provide day care for the carers of children, where they pay for them to be looked after. The Early Years Foundation Stage (EYFS) is part of the governments’ wider scheme. It is laid out in the Children’s Plan and Every Child Matters, which gives every child a chance to start develop ing early on in life. Every nursery that is registered in England is inspected by CQC against the EYFS.

Sunday, November 10, 2019

Chapter 2 Related Studies and Literature

Chapter 2 Review of Local and Foreign Studies and Literature Local Studies According to the study of Anna Marie Beltran Distor of Proposed Sales Monitoring System issued 1995, the accelerated work structure of the company proper monitoring is essential in order to keep track of the company’s sales activities. Her system aims to come up with an efficient, and accurate mechanized system of preparing invoices that will keep track of the daily transaction and generate reports.Important information will be provided by this study in order to prove that the computerization of the company’s operation and achieve a more reliable and efficient means of monitoring day to day activities. Her system focuses on the analysis and design of the sales monitoring system which will monitor the stacks inventory of the sales departments. This system of hers is somewhat related to our study but our system focuses more on the inventory monitoring system of a trading company. Local Literature P opular author of Accounting, Waldo T.Passion (1990) in his book stated that, to improve their efficiency and reduce their cost of operation. Reports are more timely and accurate. Computers have large capacity to store data and tremendous speed to manipulate and recall data to the format a user wishes to use which the introduction of microcomputer computation of business is more affordable. Foreign Study According to the study of Edwin Bello and his fellow researchers of Computerized Monitoring and Inventory of Stock with Warning Level dated March 2005, many firms have thousands of items of inventory which require some form of control.The usage calculations and record keeping chores would soon become overwhelming were it not for the computer and its unique information storage and retrieval capabilities. Iventory management is a process of developing and maintaining products that are in demand by customers efficient inventory management, an important aspect of physical distributor, ca n help a firm achieve its profit goals. For instance, Hanes Hosiery Inc. evelop a computerized inventory management system to drastically reduce the time needed to restock a store carrying Hanes product, orders that once took seven days to reach a store now arrive in one. Good inventory management balances the cost of holding a large inventory with the cost of losing sales because of shortages, or stock outs, of certain products. One inventory management technique used to achieve this balance I just-in-time(JIT) inventory, popularized in Japan.Companies using JIT maintain smaller inventories by ordering more often and in smaller quantities, just in time for production. Fire place manufactures, which makes metal fireplace in Santa Ana, California, trimmed its inventory from $1. 1 million to $75,000 using JIT. In the meantime, sales doubled because the firm was able to be respond to customers’ orders much faster. The study is somewhat similar to our systembut we are focusing on inventory monitoring rather than inventory management of a system. Foreign Literature Kendal and Kendal (1999) p. 85 in his book said, â€Å"The computer was adapted initially to take over the routine work and force personnel for more creative task(in addition to holding certain highly routine task for more rapidly done manuals)†. Ralph M. Stair(1984) p. 57 of his book â€Å"Priciple of Data Processing† said, â€Å"The purpose of a management information system is to get the right information to the right people at the right time. The success of any organization depends on good decision-making and good decision-making depends on good information.

Friday, November 8, 2019

Vitis Vinifera essays

Vitis Vinifera essays Vitis vinifera, better known as grapevine or wine grapes, is native to Asia Minor where wild grapes still grow. V. Vinifera is commonly cultured for fruit, eaten fresh or processed into wine, raisins, or juice. Over 8,000 cultivars are listed, most of them having been selected for a specific region and purpose. Cultures are mainly limited to the Northern Hemisphere. In United States this grape is grown in California and Arizona, and will not tolerate the cold winters and humid summers of eastern United States. Requirements are for long, warm to hot dry summers and mild winters. Plant damage occurs at -18C; frost kills young shoots. Daily mean temperature should be at least 18C. This species will not endure the high temperatures coupled with high humidity of tropics. Thus grapes are unsuitable to humid, steamy, hot tropics, as they need a cold period for resting and a dry sunshine climate for ripening fruit. However Vitis vinifera has been identified in some tropic conditions includ ing Sri Lanka, Trinidad Forms of V. Vinifera date as far back as 4000 B.C. where forms of the wild were already being selected and in cultivation in the Middle East. Ancient Egyptian records from 2500 B.C. mention the use of grapes for wine making. The Old Testament references to wine confirm this early origin and the significance of the wine industry in the Middle East. The familiarity of grape vines can be seen in both physical and metaphorical references to the 'vine'. The Greeks had an active wine trade and planted grapes in their colonies throughout the Mediterranean region. The Romans brought grape growing into the valleys of the Germany and France. The need for Wine in the Christian mass continued this wine-growing tradition after the fall of the Roman Empire, monastic orders preserving and developing many of the highly regarded wine-producing areas. ...

Tuesday, November 5, 2019

Of Mice and Men Study Guide

Of Mice and Men Study Guide Of Mice and Men is a 1937 novella by John Steinbeck. Set during the Great Depression, the book tells the story of George Milton and Lennie Small, two migrant workers and long-time friends employed on a ranch in California. Through its use of colloquial language and detailed characterization, Of Mice and Men offers an unsparing portrait of its characters and the violent and harsh conditions they face. Fast Facts: Of Mice and Men Author: John SteinbeckPublisher: Viking PressYear Published: 1937Genre: Literary fictionType of Work: NovellaOriginal Language: EnglishThemes: The nature of dreams, strength vs. weakness, man vs. natureCharacters: George Milton, Lennie Small, Curley, Candy, Crooks, Curley’s wifeNotable Adaptations: 1939 film directed by Lewis Milestone, 1992 film directed by Gary SiniseFun Fact: John Steinbecks dog ate an early draft of Of Mice and Men. Plot Summary George and Lennie are two farm workers traveling through California in search of work. When the novella begins, they have just been kicked off a bus while journeying to their latest ranch. They spend the night in a makeshift shelter and arrive at the ranch in the morning. The ranch owner is initially hesitant because Lennie, who is physically strong but has a mental disability, doesnt speak, but he ultimately accepts the men as workers. Lennie and George meet fellow ranch hands Candy, Carlson, and Slim, as well as Curley, the son of the ranch owner. Curley, a diminutive but confrontational man, verbally targets Lennie. Carlson shoots Candys old, dying dog. Lennie reveals that he and George have a plan to buy their own land someday, and Candy offers to join them, pitching in his own money. Slim gives Lennie a puppy from his own dog’s recent litter. The next day, Curley attacks Lennie once more. Out of fear, Lennie grabs Curleys fist and crushes it. Later, the ranch workers go out drinking, and Lennie stays behind. He talks to Crooks, an African American farm hand who lives separately from the other workers. Curleys wife approaches and asks what happened to her husbands hand. When none of the men tell her, she berates Crooks with racial slurs and threats. The following day, Lennie accidentally kills his puppy by petting it too hard. Curleys wife finds him with the puppys body in the barn. Lennie and Curleys wife begin to converse. Curleys wife reveals her former dreams of Hollywood stardom and offers to let Lennie touch her hair. While doing so, Lennie unintentionally breaks her neck and kills her. When the farm workers discover Curleys wifes body, Curley begins a vengeful pursuit of Lennie, with the other workers in tow. George takes Carlsons gun and breaks away from the group in order to meet Lennie at their predetermined spot. George tells Lennie all about the beautiful future in which they have a farm of their own to tend to rabbits, then finally shoots Lennie in the back of the head. Major Characters Lennie Small. Contrary to his surname, Lennie is an extremely large and physically strong man. However, he is also gentle-hearted and often fearful. Lennie has a mental disability and is dependent on George for protection. He loves rubbing soft materials and small creatures, from mice to puppies to hair. This desire leads to unintentional destruction and even death. George Milton. Crafty and resourceful, George is both the domineering leader and loyal protector of Lennie. Although he sometimes complains about taking care of Lennie, he is deeply committed to him. At the end of the novella, George decides to kill Lennie in order to protect him from greater harm at the hands of the other ranch workers. Curley. Curley is the son of the ranch owner and a former Golden Gloves boxer. Despite his small stature, Curley picks fights and struts around confidently. He is a jealous husband who rages at his wife. He also targets Lennie, despite the fact that gentle Lennie doesnt want a fight. When Lennie accidentally kills Curleys wife, Curley seeks out Lennie in a murderous rage. Candy. Candy is an old farm worker who has lost a hand. He owns an aging dog that Carlson insists upon shooting. When Candy overhears Lennie talk about his plan to buy some land with George, Candy offers up $350 of his own money to join them. Crooks. Crooks, the only African American character on the farm, lives away from the other workers in segregated quarters. He is world-weary and skeptical of Lennies dream of buying land. Crooks faces racism on the ranch, most notably when Curleys wife verbally attacks him with racial slurs and violent threats. Curley’s wife. Curleys wife, whose name is never mentioned, is treated badly by her husband and warily by the other farm workers. She has a flirtatious nature, but she also expresses loneliness and lost dreams during a conversation with Lennie. When Crooks and Lennie refuse to tell her what happened to her husbands hand, she verbally attacks Crooks with racial slurs and threats. She ultimately dies an accidental death at Lennies hands. Major Themes The Nature of Dreams. Dreams play a key role in Of Mice and Men. Most significantly, George and Lennie share a dream of owning their own land, but their perspectives on this dream differ significantly. In Lennies mind, the dream is sure to become reality; for George, discussing the dream is a way to comfort Lennie and pass the time in a harsh environment. Strength vs. Weakness. In Of Mice and Men, strength and weakness have a complex relationship. This relationship is most evident in Lennie, whose physical strength is a direct contrast to his gentle and guileless personality. In the tough world of the book, strength- particularly mental toughness- is essential. Man vs. Nature. Tension between the human world and the natural world exists throughout Of Mice and Men. Sometimes the characters exert control over the natural world, and sometimes, the natural world rises up to overpower the characters. Ultimately, the novella suggests that the natural and human worlds- the worlds of mice and men- are not so different after all. Literary Style Of Mice and Mens literary style is largely simple and straightforward. The dialogue is written in a colloquial dialect intended to reflect the working-class backgrounds of the ranch workers, whose speech is also peppered with slang terms and vulgar expressions. The novella is also notable for its use of foreshadowing. Lennies accidental murder of the puppy parallels his accidental murder of Curleys wife; the apparent mercy killing of Candys dog mirrors the mercy killing of Lennie. Of Mice and Men has been the subject of censorship due to its harsh subject matter, but it remains one of the most widely-read works of American literature of the 20th century. About the Author Born in 1902, John Steinbeck is one of the most prominent and widely-read American writers of the 20th Century. Much of his work focuses on everyman protagonists in California during the Great Depression. He said that Of Mice and Men was inspired in part by his own experiences alongside migrant workers during the 1910s. In addition to Of Mice and Men, Steinbeck penned over two dozen books, including The Grapes of Wrath (1939) and East of Eden (1952).  He won both a Pulitzer Prize and a Nobel Prize.