Friday, December 27, 2019

Scientific and Social Definitions of Race

Its a common belief that race can be broken down into three categories: Negroid, Mongoloid and Caucasoid. But according to science, thats not so. While the American concept of race took off in the late 1600s and persists even today, researchers now argue that there’s no scientific basis for race. So, what exactly is race, and what are its origins? The Difficulty of Grouping People Into Races According to John H. Relethford, author of The Fundamentals of Biological Anthropology, race â€Å"is a group of populations that share some biological characteristics†¦.These populations differ from other groups of populations according to these characteristics.† Scientists can divide some organisms into racial categories easier than others, such as those which remain isolated from one another in different environments. In contrast, the race concept doesn’t work so well with humans. That’s because not only do humans live in a wide range of environments, they also travel back and forth between them. As a result, there’s a high degree of gene flow among people groups that make it hard to organize them into discrete categories. Skin color remains a primary trait Westerners use to place people into racial groups. However, someone of African descent may be the same skin shade as someone of Asian descent. Someone of Asian descent may be the same shade as someone of European descent. Where does one race end and another begin? In addition to skin color, features such as hair texture and face shape have been used to classify people into races. But many people groups cannot be categorized as Caucasoid, Negroid or Mongoloid, the defunct terms used for the so-called three races. Take Native Australians, for instance. Although typically dark-skinned, they tend to have curly hair which is often light colored. â€Å"On the basis of skin color, we might be tempted to label these people as African, but on the basis of hair and facial shape they might be classified as European,† Relethford writes. â€Å"One approach has been to create a fourth category, the ‘Australoid.’† Why else is grouping people by race difficult? The concept of race posits that more genetic variation exists interracially than intra-racially  when the opposite is true. Only about 10 percent of variation in humans exists between the so-called races. So, how did the concept of race take off in the West, particularly in the United States? The Origins of Race in America The America of the early 17th century was in many ways more progressive in its treatment of blacks than the country would be for decades to come. In the early 1600s, African Americans could trade, take part in court cases and acquire land. Slavery based on race did not yet exist. â€Å"There was really no such thing as race then,† explained anthropologist Audrey Smedley, author of Race in North America: Origins of a Worldview, in a 2003 PBS interview. â€Å"Although ‘race’ was used as a categorizing term in the English language, like ‘type’ or ‘sort’ or ‘kind, it did not refer to human beings as groups.† While race-based slavery wasn’t a practice, indentured servitude was. Such servants tended to be overwhelmingly European. Altogether, more Irish people lived in servitude in America than Africans. Plus, when African and European servants lived together, their difference in skin color did not surface as a barrier. â€Å"They played together, they drank together, they slept together†¦The first mulatto child was born in 1620 (one year after the arrival of the first Africans),† Smedley noted. On many occasions, members of the servant class—European, African and mixed-race—rebelled against the ruling landowners. Fearful that a united servant population would usurp their power, the landowners distinguished Africans from other servants, passing laws that stripped those of African or Native American  descent of rights. During this period, the number of servants from Europe declined, and the number of servants from Africa rose. Africans were skilled in trades such as farming, building, and metalwork that made them desired servants. Before long, Africans were viewed exclusively as slaves and, as a result, sub-human. As for Native Americans, they were regarded with great curiosity by the Europeans, who surmised that they descended from the lost tribes of Israel, explained historian Theda Perdue, author of Mixed Blood Indians: Racial Construction in the Early South, in a PBS interview. This belief meant that Native Americans were essentially the same as Europeans. They’d simply adopted a different way of life because they’d been separated from Europeans, Perdue posits. â€Å"People in the 17th century†¦were more likely to distinguish between Christians and heathens than they were between people of color and people who were white†¦,† Perdue said. Christian conversion could make American Indians fully human, they thought. But as Europeans strove to convert and assimilate Natives, all the while seizing their land, efforts were underway to provide a scientific rationale for Africans’ alleged inferiority to Europeans. In the 1800s, Dr. Samuel Morton argued that physical differences between races could be measured, most notably by brain size. Morton’s successor in this field, Louis Agassiz, began â€Å"arguing that blacks are not only inferior but they’re a separate species altogether,† Smedley said. Wrapping Up Thanks to scientific advances, we can now say definitively that individuals such as Morton and Aggasiz are wrong. Race is fluid and thus difficult to pinpoint scientifically. â€Å"Race is a concept of human minds, not of nature,† Relethford writes. Unfortunately, this view hasn’t completely caught on outside of scientific circles. Still, there are signs times have changed. In 2000, the U.S. Census allowed Americans to identify as multiracial for the first time. With this shift, the nation allowed its citizens to blur the lines between the so-called races, paving the way for a future when such classifications no longer exist.​

Wednesday, December 18, 2019

Gender inequality Male underachievement - 1304 Words

Critical Reading and Writing in Social Sciences: FOUN1013 Documented Essay Worldwide, women are achieving higher representation and success. At the post-secondary level women are earning most of the degrees awarded. Where did our males disappear to? Gender inequality is an extensive, complex and often vague concept. Simply it is defined as the ranking of a particular gender, whether male or female, over the other and how they are treated based on their gender. Gender inequality and the result of male underperformance in schools have become major issues in the Caribbean, and affect the individuals involved and the society on a whole. Boys’ underachievement therefore should not be ignored and an analysis of†¦show more content†¦Delinquent behaviours may also develop, such as crime when males find other ways of surviving in providing for themselves and their families. Society, on the other hand, is economically affected by the reduction in the workforce. Less people working in an economy, results in a decline in levels of production. Unemployed persons may also put a strain on the countries’ resources. This is the current state of Jamaica’s economy. As society progresses and changes, the roles of males and females continue to change. Historically, Caribbean men were known to take part in manual work or attend schools, as academic excellence was seen as a male domain, while females did domestic work. Men were also given better paying jobs, while females had to work twice as hard to be qualified for those same jobs. In contemporary Caribbean society, the roles have interchanged and it appears that men are lagging in education as well as in job placements. Due to the history of the socialisation of males, it is evident in today’s society that they are more likely to survive after not attending school than females, whose only other option is domestic labour. This is so because males are hardened to find other ways of making a living. (Chevannes, 1999) Figueroa (2004) identifies other minor factors which i nfluence male underperformance such as: the absence of motivational factors, aShow MoreRelatedCharacteristics of Gifted Underachievers2021 Words   |  8 Pagesachievement. The gap or discrepancy is not explained by a severe learning disability. The expected learning is measured by standard tests and other methods of assessment while actual achievement is measured by grades and teacher evaluations. Underachievement has been a nagging program in the education community because it involves poorly performing brightest students. Recent statistics revealed that 15-40% of gifted students have been performing below par. Data from the US Office of Education sorelyRead MoreInequality Between Gender And Education2181 Words   |  9 PagesThis essay will provide evidence of how inequalities are found in both gender and education, and will show how these inequalities intersect. An important tool in overcoming any form of oppression and injustice is education, education withholds the power to destroy, to correct and to defeat (Bagher and Hanna, 2016). Sociologists argue that gender inequalities in education, particularly the more rapid improvement in girls’ results, can be best explained by external and internal factors. This essayRead MoreFactors Causing Gender Inequity609 Words   |  2 PagesThe gender gap has been a concern for decades, it used to be that females lagged behind males when it came to academic achievement. Females now outperform males academically and are more likely to obtain college degrees and enroll in graduate school despite the gender inequalities that remain in American society. The underachievement of females has diminished if not vanished due to the focus of the United States for the past 30 years to close the gender achievement gap. Yet, the concern in theRead MoreInequality in British Schools2111 Words   |  9 Pagesthere a problem of Inequality in British schools? The educational system is one of the most influential institutions in society as it provides young people with a vast amount of knowledge, attitudes and skills. These are acquired formally through set lessons or informally through the ‘hidden curriculum’ which provides the unofficial and unplanned consequences of school experience. Social Inequality is one of the major preoccupations of sociology. The relationship between inequality and education hasRead MoreWright Edelman s Education965 Words   |  4 Pagesyoung Black males. According to Jenkins (2006) in the needs assessment for African American Men of Arizona State University (AAMASU) program, the university noted that Black males experience a high level of underachievement in the higher education arena, over involvement in the criminal system, and high rates of unemployment, poverty, and dying via homicide (Arizona State University, 2004). All too often African American males have been caught in a web of stereotype d notions of race and gender that placeRead MoreGender, Sex and Society of Jamaicans2006 Words   |  8 PagesQuestion: Examine and discuss the main ideas put forward by prof. Errol Miller in his theory of â€Å"male marginalization† and responses to this theory presented by at least three well known Caribbean scholars as well as your own views. What is wrong with our males? This question is a frequently asked question among Jamaicans. â€Å"The sight of idle males on the road corner, the daily news of the brutal, senseless murders they commit, their virtual dereliction of higher education, their cruelty to ladiesRead MoreSocial Institution3293 Words   |  14 PagesPreserving order – Providing sense of purpose Conflict theorists: †¢ View social institutions as the primary means by which the elite maintains its privileged position †¢ Through the preservation of order society, legitimizes and perpetuates social inequalities Major social institutions 1. FAMILY †¢ Function: producing and rearing the young †¢ Basic unit: society and educational system Characteristics - closely knit, strong family ties, strong loyalty, extended: big, kinship ties: â€Å"compadre†, higherRead MoreThe Fairness And Lack Of Fairness1634 Words   |  7 Pageslead to a blockade of participation, singling certain people out. To ensure that equality is achieved it must first insure equity. Throughout many institutions of education social inequity has been shown through social class, race and ethnicity and gender. As of this many minorities and certain people have been caused to feel an unjust service is being provided to them. However, teaching and learning process have seen to be altered and improved to try and promote greater social equity. Education notRead MoreThe First Presumption Associated With Dominant Privilege Is Innocence1200 Words   |  5 Pagescalculus class. Males are often thought to be the only gender competent in mathematics or science, so women often have to prove their competence with these subject fields. It was assumed by my teacher that males were competent in Calculus, but the teacher did not match the same assumptions for females. I had to constantly work for tests, assignments and participation to prove that I was just as competent as the males in my class. This is clearly an example of privilege because males do not have toRead MoreThe Specific Learning Disability992 Words   |  4 Pagesbut the key factors, as apparent from researchers are; (1) gender difference, (2) overrepresentation of Culturally and Linguistically Diverse CLD population, (3) unsuccessful teaching approaches, (4) poor classroom management skills, and (5) assessment policies and practices. The gender difference is one of the key factors responsible for disproportionate in many categories listed under IDEA. Researches show that greater numbers of male students are recognized with special needs than female students

Tuesday, December 10, 2019

Zimbardo Prison Experiment free essay sample

The Stanford Prison Experiment harbored interest concerning the psychological effects that would be exhibited from normal people when put into simulation prison. Stanford Prison experiment had elements of social structure of a real-life prison. Zimbardo himself held â€Å"ultimate† master status as the warden. Participants were selected by Zimbardo for the experiment. Participants held achieved master status of prison guards and another group of male students were portraying inmates in the study. The social interaction in the experiment had extreme psychological effects on the participants in the experiment. Both guards and inmates conformed to the expectation of their social role. Originally the Stanford Prison Experiment was planned for two-week research study. The experiment ended prematurely after six days because the students became so absorbed into their roles. The roles the subjects played believed they actually were those roles. The guards adopted sadistic abusive attitudes. Authority and power over another person went to extreme measures in some subjects. We will write a custom essay sample on Zimbardo Prison Experiment or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page The group selected to portray inmates became discouraged and rebellious. These subjects felt guilty, people staring at them, being in police car, being in a police station. Riding in a police car, and the process of arrest created guilt in their minds. Even though they knew no crime was committed going through the arrest process created distress. The subjects playing inmates believed they could not leave the experiment. These boys were having trouble with their identity in this experiment. Inmate subjects were really not able to adapt in this social structure. They did not possess the life skills a real criminal has in his personality.

Tuesday, December 3, 2019

The Rise of Technology in India Essay free essay sample

INTRODUCTION The rise of technology in India has brought into force many types of equipment that aim at more customer satisfaction. ATM is one such machine which made money transactions easy for customers to bank. The other side of this improvement is the enhancement of the culprit’s probability to get his ‘unauthentic’ share. Traditionally, security is handled by requiring the combination of a physical access card and a PIN or other password in order to access a customer’s account. This model invites fraudulent attempts through stolen cards, badly-chosen or automatically assigned PINs, cards with little or no encryption schemes, employees with access to non-encrypted customer account information and other points of failure. Our paper proposes an automatic teller machine security model that would combine a physical access card, a PIN, and electronic facial recognition. By forcing the ATM to match a live image of a customer’s face with an image stored in a bank database that is associated with the account number, the damage to be caused by stolen cards and PINs is effectively neutralized. We will write a custom essay sample on The Rise of Technology in India Essay or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Only when the PIN matches the account and the live image and stored image match would a user be considered fully verified. The main issues faced in developing such a model are keeping the time elapsed in the verification process to a negligible amount, allowing for an appropriate level of variation in a customer’s face when compared to the database image, and that credit cards which can be used at ATMs to withdraw funds are generally issued by institutions that do not have in-person contact with the customer, and hence no opportunity to acquire a photo. Because the system would only attempt to match two (and later, a few) discrete images, searching through a large database of possible matching candidates would be unnecessary. The process would effectively become an exercise in pattern matching, which would not require a great deal of time. With appropriate lighting and robust learning software, slight variations could be accounted for in most cases. Further, a positive visual match would cause the live image to be stored in the database so that future transactions would have a broader base from which to compare if the original ccount image fails to provide a match – thereby decreasing false negatives. When a match is made with the PIN but not the images, the bank could limit transactions in a manner agreed upon by the customer when the account was opened, and could store the image of the user for later examination by bank officials. In regards to bank employees gaining access to customer PINs for use in fraudulent transaction s, this system would likewise reduce that threat to exposure to the low limit imposed by the bank and agreed to by the customer on visually unverifiable transactions. In the case of credit card use at ATMs, such a verification system would not currently be feasible without creating an overhaul for the entire credit card issuing industry, but it is possible that positive results (read: significant fraud reduction) achieved by this system might motivate such an overhaul. The last consideration is that consumers may be wary of the privacy concerns raised by maintaining images of customers in a bank database, encrypted or otherwise, due to possible hacking attempts or employee misuse. However, one could argue that having the image compromised by a third party would have far less dire consequences than the account information itself. Furthermore, since nearly all ATMs videotape customers engaging in transactions, it is no broad leap to realize that banks already build an archive of their customer images, even if they are not necessarily grouped with account information. LITERATURE REVIEW For most of the past ten years, the majority of ATMs used worldwide ran under IBM’s now-defunct OS/2. However, IBM hasn’t issued a major update to the operating system in over six years. Movement in the banking world is now going in two directions: Windows and Linux. NCR, a leading world-wide ATM manufacturer, recently announced an agreement to use Windows XP Embedded in its next generation of personalized ATMs (crmdaily. com. ) Windows XP Embedded allows OEMs to pick and choose from the thousands of components that make up Windows XP Professional, including integrated multimedia, networking and database management functionality. This makes the use of off-the-shelf facial recognition code more desirable because it could easily be compiled for the Windows XP environment and the networking and database tools will already be in place. For less powerful ATMs, KAL, a software development company based in Scotland, provides Kalignite CE, which is a modification of the Windows CE platform. This allows developers that target older machines to more easily develop complex user-interaction systems . Many financial institutions are relying on a third choice, Windows NT, because of its stability and maturity as a platform. On an alternative front, the largest bank in the south of Brazil, Banrisul, has installed a custom version of Linux in its set of two thousand ATMs, replacing legacy MS-DOS systems. The ATMs send database requests to bank servers which do the bulk of transaction processing (linux. org. ) This model would also work well for the proposed system if the ATMs processors were not powerful enough to quickly perform the facial recognition algorithms. In terms of the improvement of security standards, MasterCard is spearheading an effort to heighten the encryption used at ATMs. For the past few decades, many machines have used the Data Encryption Standard developed by IBM in the mid 1970s that uses a 56-bit key. DES has been shown to be rather easily cracked, however, given proper computing hardware. In recent years, a â€Å"Triple DES† scheme has been put forth that uses three such keys, for an effective 168-bit key length. MasterCard now requires new or relocated ATMs to use the Triple DES scheme, and by April, 2005, both Visa and MasterCard will require that any ATM that supports their cards must use Triple DES. ATM manufacturers are now developing newer models that support Triple DES natively; such redesigns may make them more amenable to also including snapshot cameras and facial recognition software, more so than they would be in regards to retrofitting pre-existing machines . There are hundreds of proposed and actual implementations of facial recognition technology from all manner of vendors for all manner of uses. However, for the model proposed in this paper, we are interested only in the process of facial verification – matching a live image to a predefined image to verify a claim of identity – not in the process of facial evaluation – matching a live image to any image in a database. Further, the environmental conditions under which the verification takes place – the lighting, the imaging system, the image profile, and the processing environment – would all be controlled within certain narrow limits, making hugely robust software unnecessary . One leading facial recognition algorithm class is called image template based. This method attempts to capture global features of facial images into facial templates. Neural networks, among other methods, are often used to construct these templates for later matching use. An alternative method, called geometry-based, is to explicitly examine the individual features of a face and the geometrical relationship between those features (Gross. ) What must be taken into account, though, are certain key factors that may change across live images: illumination, expression, and pose (profile. A study was recently conducted of leading recognition algorithms, notably one developed by two researchers at MIT, Baback Moghaddam and Alex Pentland, and one a commercial product from Identix called FaceIt. The MIT program is based on Principal Feature Analysis, an adaptation of template based recognition. FaceIt’s approach uses geometry-based local feature analysis. Both algorithms have to be ini tialized by providing the locations of the eyes in the database image, from which they can create an internal representation of the normalized face. It is this representation to which future live images will be compared . In the study, it was found that both programs handled changes in illumination well. This is important because ATM use occurs day and night, with or without artificial illumination. Likewise, the programs allowed general expression changes while maintaining matching success. However, extreme expressions, such as a scream profile, or squinted eyes, dropped the recognition rates significantly. Lastly, matching profile changes worked reasonably well when the initial training image(s) were frontal, which allowed 70-80% success rates for up to 45 degrees of profile change†¦ however, 70-80% success isn’t amenable to keeping ATM users content with the system. The natural conclusion to draw, then, is to take a frontal image for the bank database, and to provide a prompt to the user, verbal or otherwise, to face the camera directly when the ATM verification process is to begin, so as to avoid the need to account for profile changes. With this and other accommodations, recognition rates for verification can rise above 90%. Also worth noting is that FaceIt’s local feature analysis method handled variations in the test cases slightly better than the PGA system used by the MIT researchers . Another paper shows more advantages in using local feature analysis systems. For internal representations of faces, LFA stores them topographically; that is, it maintains feature relationships explicitly. Template based systems, such as PGA, do not. The advantages of LFA are that analysis can be done on varying levels of object grouping, and that analysis methods can be independent of the topography. In other words, a system can examine just the eyes, or the eyes nose and mouth, or ears, nose, mouth and eyebrows, and so on, and that as better analysis algorithms are developed, they can fit within the data framework provided by LFA The conclusion to be drawn for this project, then, is that facial verification software is currently up to the task of providing high match rates for use in ATM transactions. What remains is to find an appropriate open-source local feature analysis facial verification program that can be used on a variety of platforms, including embedded processors, and to determine behavior protocols for the match / non-match cases. OUR METHODOLOGY The first and most important step of this project will be to locate a powerful open-source facial recognition program that uses local feature analysis and that is targeted at facial verification. This program should be compilable on multiple systems, including Linux and Windows variants, and should be customizable to the extent of allowing for variations in processing power of the machines onto which it would be deployed. We will then need to familiarize ourselves with the internal workings of the program so that we can learn its strengths and limitations. Simple testing of this program will also need to occur so that we could evaluate its effectiveness. Several sample images will be taken of several individuals to be used as test cases – one each for â€Å"account† images, and several each for â€Å"live† images, each of which would vary pose, lighting conditions, and expressions. Once a final program is chosen, we will develop a simple ATM black box program. This program will server as the theoretical ATM with which the facial recognition software will interact. It will take in a name and password, and then look in a folder for an image that is associated with that name. It will then take in an image from a separate folder of â€Å"live† images and use the facial recognition program to generate a match level between the two. Finally it will use the match level to decide whether or not to allow â€Å"access†, at which point it will terminate. All of this will be necessary, of course, because we will not have access to an actual ATM or its software. Both pieces of software will be compiled and run on a Windows XP and a Linux system. Once they are both functioning properly, they will be tweaked as much as possible to increase performance (decreasing the time spent matching) and to decrease memory footprint. Following that, the black boxes will be broken into two components – a server and a client – to be used in a two-machine network. The client code will act as a user interface, passing all input data to the server code, which will handle the calls to the facial recognition software, further reducing the memory footprint and processor load required on the client end. In this sense, the thin client architecture of many ATMs will be emulated. We will then investigate the process of using the black box program to control a USB camera attached to the computer to avoid the use of the folder of â€Å"live† images. Lastly, it may be possible to add some sort of DES encryption to the client end to encrypt the input data and decrypt the output data from the server – knowing that this will increase the processor load, but better allowing us to gauge the time it takes to process. CONCLUSION We thus develop an ATM model that is more reliable in providing security by using facial recognition software. By keeping the time elapsed in the verification process to a negligible amount we even try to maintain the efficiency of this ATM system to a greater degree.

Wednesday, November 27, 2019

Pricing Fall07 Stu Essay examples

Pricing Fall07 Stu Essay examples Pricing Fall07 Stu Essay examples Pricing Strategies Week 6 EWMBA 206 Ganesh Iyer 1 Analysis Framework Competitor Analysis Perceptual mapping Company Analysis Marketing Myopia First mover advantages Customer Analysis Positioning Segmentation Marketing Strategy Pricing process Pricing and innovation Product Marketing Orientation Branding Price Promotion Place Market Ganesh Iyer 2 Economics of Pricing Two Problems with Single Price Strategy ï  ± Leave money on the table ï  ± Some customers are willing to pay more ï  ± Pass-up Profit ï  ± Some potential customers were not served even though the firm could have served them at prices above the marginal cost Ganesh Iyer 3 Price Discrimination Customization by Observable Characteristics Based on observable characteristics that signal buyers’ price sensitivity ïÆ'Ëœchessclub.com/ : Students: $29.95/year; Adults: $59.95 ï  ¬ AMC theaters can observe the consumer-type using his student ID, seniors  » Customer 1 No student ID $6.75  » Customer 2 Haas student ID $4.75  » Customer 3 Haas student ID $4.75  » etc. Ganesh Iyer 4 Price Discrimination Purchase Location ï  ± Consumers at different purchase locations have different price sensitivity ï  ± Cure for anthrax: $450 in the U.S. $190 in Canada canadadrugs.com ï  ± Staples website asks for zip code staples.com/ ï  ± Select segmentation variables that ensure ï  ± different segments purchase at different locations ï  ± high enough shipping cost to prevent arbitrage Ganesh Iyer 5 Customize By Time of Purchase ï  ± Peak-load pricing: designed to re-distribute usage from peak time to off-peak time ï  ± Redeye flight. ï  ± Electronic road pricing. Ganesh Iyer 6 Electronic Road Pricing Ganesh Iyer 7 Price Discrimination Palm Pilot: Product-line in Action Palmm505 Palmm500 Palm VIIx $399 Color $399 $449 Palm Vx $299 Palm IIIxe $179 Palm m100 $129 Ganesh Iyer 8 Microsoft Office: Product Line (Versioning) in Action Office 2000 Developer Office 2000 Premium Office 2000 Small Business Ganesh Iyer Office 2000 Professional Office 2000 Standard 9 How to Price Discriminate Using through Product Line Design? ï  ¬ Key to Successful Versioning ï  ² Identify the best ways to distinguish the different versions of the product/service ïÆ'Ëœ Need to determine which features will be highly valuable to some customers but of little value to others. ïÆ'Ëœ Goal: Create the â€Å"right† # of versions targeted at the â€Å"right† customer segments by setting the â€Å"right† prices. ï  ² Strategic Issue Cannibalization: Will the high-end customers buy the higher priced version? How to dissuade them from buying the lower priced version? Ganesh Iyer 10 Product Line (Versioning) Segmentation, Targeting & Cannibalization ï€   Example 1: Pricing Dell Laptops ï€   Table: Perceived Economic Value Personal Users ï€   Business Users ï€   Segment Size 60 40 ï€   Dell 350 MHz $ 500 $ 750 ï€   Dell 550 MHz $ 750 $ 2500 Ganesh Iyer 11 Product Line (Versioning) Segmentation, Targeting & Cannibalization ï  ° Example 1: Pricing Dell Laptops ïÆ'Ëœ Option I: Dell 350 MHz only: ï  ² Targeting: Business Users – Price $ 750 – Total Revenue $ 30,000 ï  ² Targeting: Business Users & Personal Users – Price $ 500 – Total Revenue $ 50,000 ïÆ' ° Ganesh Iyer Optimal targeting if introducing 350 MHz: Business Users + Personal Users 12 Product Line (Versioning) Segmentation, Targeting & Cannibalization ï  ° Example 1: Pricing Dell Laptops ïÆ'Ëœ Option II: Dell 550 MHz only: ï  ² Targeting: Business Users – Price $ 2500 – Total Revenue $ 100,000 ï  ² Targeting: Business Users & Personal Users – Price $ 750 – Total Revenue $ 75,000 ïÆ' ° Ganesh Iyer Optimal targeting if targeting 550 MHz: Business Users 13 Product Line (Versioning) Segmentation, Targeting & Cannibalization ïÆ'Ëœ Option III: Both 350 MHz & 550 MHz : ï  ² What will be the price of 350 Mhz = 500 ï  ² What are the options available to Business Users? ï  ² Buy 350 MHz at $ 500 or 550 MHz at $ X? ï  ² Surplus from 350 MHz = $ 750 - $ 500 = $ 250 Thus, price of 550 MHz

Saturday, November 23, 2019

Simile and metaphor Essays

Simile and metaphor Essays Simile and metaphor Paper Simile and metaphor Paper The speakers anger is a central to the whole poem. In stanza two Afrika achieves a shocking intensity by his line arrangement and repetition. The repetition of and(12-15) gives the impression of deep familiarity with the bureaucratic sounding District Six (9) and we can understand the sentiment amiable weeds(8) more clearly. The listing effect establishes a rhythm and a pattern, which the reader anticipates. This means that when and(15) turns into anger(16) it comes as a shock. The stanza also concentrates on the sensitive parts of his body, skinlungseyes(13-16) all, which are subject and vulnerable to hurt. Anger is also associated closely with heat and fire. It is the hotanger of his eyes(15-16); the sign of the restaurant is flaring(18) and his hands burn(45). The image of glass(17, 30, 41, 47) is very important in the poem (the word appears four times) as well as a reference to clear panes(28). It is glass which shuts out the speaker in the poem. It is a symbol of the inequality between whites and blacks, rich and poor. The glass symbolises the exclusion of the blacks from the whites world. But in the glass as well as looking in on outside, one can also see a reflection of oneself. The glass acting as a mirror means that it brings about a double traumatic experience . The speaker sees the standard of living that he has, the stains of bunny chow on his jeans, but he also sees the higher standard of living being enjoyed by his (now) equal countrymen. It is this injustice, which causes the speaker to yearn, for a stone, a bomb, to shiver down the glass(46-47). It is not the actual glass that he wants to smash; it is the racist mentality of those in power that he wants to shatter. The poems title and last line suggests, Nothings changed(48). The speakers familiarity with this environment has not changed. Although there is no sign there, the poet can feel that he is in District Six, my feet know/and my hands.(11-12) The gap in the standard of living has not shortened between the black and white people. There is still that element of exclusivity, no sign says it(25) as the apartheid is over, but there is a guard at the gatepost(23). The poet still feels the anger and violent rage towards those that exclude him. The title in this sense is ironic, physically everything has changed, the Port Jackson trees(21) threaten to take over and there is new restaurant whose patrons are exclusively white. However deep down the important matters and worthwhile changes have not taken place. This leads to a sense of disappointment because an expected change has not happened. District Six has changed, but the speakers feelings have not because the new South Africa operates apartheid based on wealth. The poet reflects that despite the changing political situation, there are still huge inequalities between blacks and whites. The poem is a protest about the injustices of a system that allowed apartheid in the first place, but now does so little to improve the lives of the non-whites. Those in powerful and influential positions resist progress and deny justice to the common people. The title, Inglan is a Bitch is repeated as a refrain throughout the poem. The word bitch has many connotations, all of which are negative, so straight from the beginning the reader can intelligently guess that the poem criticises England. Black immigrants were brought to England to help alleviate the labour force after the Second World War; it was labelled as a country of many opportunities, a promise that turned out to be false. Literally a bitch is a female dog and they are noted for their hardworking nature. This could signify that in order to survive in England you have to be diligent also. In Linton Kwesi Johnsons, Inglan is a Bitch the narrator is black immigrant worker, who describes his work history in England. He has worked in the andahgroun(2); has had a lickle jab in a big otell(11) and in a crockery factory. All his jobs have been hard labour and menial work even at the age of fifty-five(42). He tells the reader that he was doing well while he was working as a dish-washa(11). This type of employment is quite unskilled and a job that most white Britons would consider beneath them. The poem dispels the myth that England has good economic prospects for everyone. Not only are the immigrants working very hard for a lickle wage packit(17), they are forced to pay high taxes also. (Employment) In the 1950s and 1960s people from the Caribbean migrated to Britain in relatively large numbers. Most of these settled in cities, especially in the large English cities, and in most of these communities people from Jamaica were more numerous than people from other parts of the Caribbean. Although the Caribbean is made up of many different islands and mainland territories, including many where an English Creole is not spoken, British Black English is most similar to Jamaican Creole, because of the larger number of Jamaicans who settled in this country. (Sebba, Creole English and Black English) The most striking element of this poem I felt was the sound of the poem. Written in a Street Creole variety of dialect it forces the reader to read the poem with a different tongue; London is written as Landan(1). However this may also cause a problem with communication. It is hard in some sections to decipher what the poet is actually trying to say. A language barrier is formed. The tone of the poem is conversational, but it also has a musical, song-like quality. The rhyme scheme, rhythm and the beat all contribute to this Caribbean musical quality. There is also a refrain or in the context of a song, a chorus. The aural nature of the poem functions as a mirror for cultural identity. The style and speech represents Jamaica, but the context is in England. The refrains in the poem are very interesting, deres no escapin it(5) is repeated in every other stanza along with Inglan is a Bitch. The speaker wants to escape, but cannot. The tone is resigned and there is not much hope. Because he has lived in England, he cannot even go back. This could be due to a fused identity and now he does not fit in either culture. noh baddah try fi hide fram it(16) The poet feels oppressed and has accepted defeat. The discrimination is ever-present. This next line is important, a noh lie mi a tell, a true(24) the speaker explains to the reader that he is not moaning or exaggerating, but is giving a accurate representation of his problems. yu haffi know how fi suvvive in it(32) The verb used is survive, a harsher substitute for live. The speaker explains that life is not easy and the basics are hard to come by. yu bettah face up to it(40) echoing line 16 the speaker tells us and tells himself to just accept the hardship. There is no point in denying or trying to change something more powerful. He has no options, as no one will even listen to his problems. This is why he is writing the poem, hoping this medium will reach out to those who can help him and understand his despair. is whey wi a goh dhu bout it?(56) The last line seems to invert the vibe given out in the lines above. There is a positive emphasis as the speaker asserts this question to his audience, who may be influential black people or sympathetic white people. The wi (we) is also only seen in the last line. It signifies collectiveness and unity for a particular purpose. On his own he is nothing, but through his poetry he may find people in similar predicaments and together they can bring about a change. Ending the poem with a question means that the poet is leaving the reader to make up his mind on the situation. The poem as well as reflecting the cultural identity of the black immigrants in England, also creates a mirror for national identity. It depicts to those in power what the condition of the Afro-Caribbean contingent is. It is sweet and glorious to die for your country. This is the full translation of the phrase Dulce et decorum est Pro patria mori. Which comes from Dulce Et Decorum Est by Wilfred Owen. The title of the poem is ironic. The poem does not so much induce pity as it does shock, especially for the civilians at home who believed war was noble and glorious. Owens war poems are for civilians to make audible to them the authentic experiences of the arm. (Kerr, p.219) The soldiers are trudging back from the battle, a daunting depiction expressed through simile and metaphor. The mens wretched condition is compared to old beggars(1), hags(2). The young men have grown unnaturally old and decrepit (Kerr, p.276). They cannot walk straight as their blood-shod(6) try to negotiate the mud. The words that Owen uses have different meanings beyond the real meaning and exploit ambiguity, for example, distant rest(4), what kind of rest? In line 8 the rhythm slackens as a particularly dramatic moment approaches.

Thursday, November 21, 2019

Biological Roots of Criminal Behavior Essay Example | Topics and Well Written Essays - 1750 words

Biological Roots of Criminal Behavior - Essay Example Biological roots of criminal behavior lost much of its ground during the Second World War, largely discredited by Nazi Germany’s eugenics and the discriminatory treatment of ethnic groups and races that were determined to be predisposed to deviance and thus mercilessly removed from society (Rafter, 2009). However, during the latter part of the 20th century, biological explanations of criminal behavior have been making a comeback (Rafter, 2009). Biological explanations of criminal behavior have been largely influenced by investments in genetic studies are developing impressively and threatening to â€Å"break the monopoly† of sociological explanations (Rafter, 2010, p. 199). The emphasis on genetics was spurred by a determination to understand, predict and prevent â€Å"harms of all types† from â€Å"cancer to terrorism to criminality† (Rafter, 2009, p. 199). The renewed interest in biocriminology has resulted in a number of theoretical assumptions. For ins tance, Robinson et al (2008) identified the progress made in scientific understandings of the connection between genes, the human brain and corresponding social conduct. According to Robinson et al (2008), the link is explained by reference to â€Å"two key vectors of influence† (p. 896). ... According to McInerney (1999) even if it were possible to explain social behavior by virtue of gene functioning and gene expression, environmental influences have a significant influence on factors that give way to criminal behavior. These factors are self-control, motives and any number of factors that function independent of an individual’s genetic make-up (McInerney, 1999). Human behavior is therefore a complex area of study and the factors contributing to criminal behavior are many. There is no single biological factor, nor is there a single environmental factor that causes criminal behavior. The most reasonable conclusion is that there are number of biological factors that interact with a number of environmental and social factors that lead to criminal behavior (Hamer, 2002). Hagan (2011) therefore suggested that biological theories of criminal behavior â€Å"will never replace social etiology† (p. 140). What we are left with is determining the â€Å"psychological , biological, and sociological factors† and how they â€Å"interact to produce crime and delinquency† (Hagan, 2011, p. 140). Mainstream criminologists are slow to embrace the concept of biological factors as appropriate explanations of criminal behavior. Perceptions among mainstream criminologists are that accepting biological explanations of criminal behavior is regressive. Biocriminology requires going back to antiquated ideals of the natural born criminal and accepting that criminal behavior is somehow sick rather than criminal. Thus one is expected to ignore the reality that crime is essentially a conflict between law and behavior and as such can be corrected by rehabilitation and/or punishment (Hagan, 2011). During the Victorian Era, scientific