Saturday, December 28, 2019

Capital Punishment Should Be Legal - 933 Words

One of the most controversial issues in the country today is addressed in the question, should capital punishment be applied to minors and, if so how young it too young? Although, capital punishment has been a part of the United States for many years, the United States still have yet to figure out how to solve all its dilemmas and whether or not capital punishment should be administered to minors. Debates about the use of capital punishment for juveniles have grown increasingly intense, within the last ten years, because of the alarming increase of serious and violent crimes that demand for harsher punishment. In 2005, the U.S. Supreme Court outlawed capital punishment for juveniles who were under the age of eighteen at the time of the crimes, because they believe it violates the Eighth Amendment ban on cruel and unusual punishment. Although, capital punishment seems as a severe consequence for children under the age of eighteen, the punishment should fit the crime regardless of age. Critics of capital punishment believe minors should be excluded because their brains are not fully developed; thus minors make rash, impulsive decisions that cannot fully understand the impact or consequences of their actions. Scientific research shows that the human brain does not fully develop until the age of twenty-five. Which causes the debate of, why does the death penalty apply to individuals, ages eighteen to twenty-four, if their brains are also, not fully developed. The legal age ofShow MoreRelatedCapital Punishment Should Be Legal846 Words   |  4 Pagesyou within minutes. Should this be legal, or should criminals have to live with their crimes? Capital punishment is the cause of many debates throughout the country. Some people believe that Capital Punishment should be allowed as it gives the victims families the closure they desperately require. Others, like myself, believe that those who do unspeakable crimes should have to live with that guilt in a 6-foot by 8-foot cement room. Also, the problem with Capital Punishment, is sentencing the wrongRead MoreShould Capital Punishment Be Legal?974 Words   |  4 Pagessuch laws of capital punishment. His overall purpose was to inform that he does not agree with execution of Ted Bundy. He sees capital punishment an immoral as quoted (I think the killing of one human makes no sense and is inherently immoral). The author opinion is agreeable with mine. I argue that capital punishment the execution should be legal. And such manners that I don’t agree with the author because the execution of violent criminals. Such as Ted Bundy should be more legal by most statesRead MoreCapital Punishment Should Not Be Legal950 Words   |  4 PagesCapital Punishment is still used in the United States, and there has been 152 people that has been released from death row since 1973. There has been many more people that were not released but executed and possibly innocent. Kantian ethics is the theory that says the moral actions are not determined by the consequences but by the right nature of the action. Capital punishment may be questionable with some cases of innocents, with that being said the use of capital punishment should only be usedRead MoreEssay on Should Capital Punishment Be Legal?992 Words   |  4 PagesCapital punishment is a very controversial issue today. There are good statements made on both sides of the argument. A couple of questions should be asked before deciding which side to take in the never ending debate of capital punishment. Is capital punishment a cruel and unusual way of punishing serious offenders? Should the mentally ill be susceptible to capital punishment? A lot of states made capital punishment legal, but not all of them use it as freely as some states like Texas. The stateRead MoreCapital Punishment: Should it be Legal? Essay955 Words   |  4 PagesCapital Punishment: Should it be Legal? After the Timothy McVeigh execution over 80 percent of viewers polled supported the decision the courts made to put McVeigh to death, and even a handful of the people who supported the execution thought it was preformed in a way that was too humane. Some people say that the death penalty is the most effective way to control serious crimes such as murder, while others say that it is extremely unethical and should not be legal in a country as developed asRead MoreShould Capital Punishment be legal in the U.K?1022 Words   |  5 PagesShould Capital Punishment be legal in the U.K? A poll taken showed that 60% of citizens in the United Kingdom wanted Capital Punishment re-instated, even more people wanted it in cases of murder with Police Officers or children involved. Capital Punishment is the most severe deterrent or retribution in existence and aims to deter future obligates from committing such heinous crimes for which the death penalty would be apportioned. The principal of this being that the ‘future criminal’ will beRead MoreEssay on Capital Punishment Should Remain Legal1253 Words   |  6 Pages I am going to argue that capital punishment is a morally and logically justifiable punishment for criminals. I will demonstrate this by showing how the logic behind not having the death penalty is invalid. I will also present examples that will defend my argument. I will then present counterarguments and their implications. The death penalty in the United States is a contested subject, and even recently it has been voted to be unconstitutional by some states. Currently there are manyRead MoreCapital Punishment and its Controversies 1434 Words   |  6 PagesCapital punishment uses death penalty as a form of punishment in many states and countries. It is a practice that has raised endless questions all over the world. Capital punishment or death penalty policy has changed in many countries overtime. Countries such as, New Australia, Zealand and 15 states in the US do not have capital punishment. One of the major concerns arising with capital punishment is because it causes ending of a human life. People and organizations of different backgrounds areRead MoreDeath Penalty On Violent Criminals1520 Words   |  7 PagesPenalty on Violent Criminals The Death penalty, known as capital punishment is when a criminal is executed by a governing authority. We (the United States) continue to allow the death penalty. Many countries make the death penalty illegal. Many discussions over this being legal, moral ethical, and economic ramifications of the death penalty are continuous across the world. Most of the nations have at one time made the death penalty legal for serious crimes. â€Å"Since 1800, the number of nations thatRead MoreThe Merits and Pitfalls of Capital Punishment Today1482 Words   |  6 Pages Capital punishment is an age-old practice. It has been used in civilizations for millennia, and will continue to be used for millennia to come. Whether used for the right or wrong reasons, capital punishment is unmistakable in its various forms. From hangings, to firing squads, to lethal injections, capital punishment and the associated proceeding have evolved over time. There have been many arguments against capital punishm ent, many of which still hold true. As capital punishment has evolved over

Friday, December 20, 2019

History Is Written By The Victors Essay - 1382 Words

â€Å"History is written by the victors† aptly describes the inconsistency between the indigenous people’ and the European newcomers’ recounts of the American settler-colonialism period from the 16th to 19th century. To the Spanish and other European powers their presence in the New World had transformed the ecology and social dynamics for the better. However, through the lens of the Native Americans, there lies a different portrayal of the European influence: the foreigners brought a wave of negative events. Even though the colonists introduced new technology for warfare, hunting, and transportation and a plethora of domesticated animals to the natives, they also ushered a phase of epidemics, mass murder, and relocation. Whether it was indigenous people seeking independence from or assimilating into the new sovereignty, America’s natives were ultimately eliminated either physically or culturally. Defining elimination, Patrick Wolfe states that â€Å"inva sion is recognized as a structure rather than an event† because it can establish its intention as â€Å"structural genocide† (Wolfe, 402). Actions such as burning villages and pillaging when the members of the pueblos would not offer food and supplies as tribute were some of the many examples of European settlers justifying their undertakings for nonsensical reasons. Those who chose to acculturate into the dominating power found themselves losing their entire identities: the names of places and language all were replaced with EuropeanShow MoreRelatedHistory : Genghis Khan, Julius Caesar, And Alexander The Great919 Words   |  4 Pageshroughout history, Genghis Khan, Julius Caesar, and Alexander the Great are successful conquerors in history. Genghis Khan a tyrant and a bloodthirsty villain during his period he conquered more territory than any other leader in history. Julius Caesar a great general that ever lived, he also knew how to elevate money for festivals and gi fts. Lastly, Alexander the Great is a person who conquered many territories, had a large empire, formed the Hellenistic culture, and became very successful. E.HRead MoreAnalysis Of Mary Shelley s Frankenstein 843 Words   |  4 PagesThe Wretch Frankenstein is a novel written by English author Mary Shelley about a peculiar scientist named Victor Frankenstein. Victor, who is a scientist endeavoring to make history, engenders a monstrous but attentive creature in an eccentric scientific experiment. The monster that he engenders faces abnegation and fear from his creator and society. The monster is the worst kind of scientific experiment gone awry. The creature has compassion for society but additionally wants to take revenge onRead MoreSmoke Signals: the Importance of Oral Tradition in Native Culture997 Words   |  4 Pagesfondness for intimate storytelling, strongly represents the Native culture of the Oral Tradition, whereas Victor, however part of the Native culture himself, doesn’t fully embrace this practice, and is reluctant to engage in verbally sharing his feelings and memories of his father. As Tonto and the Lone Ranger set out on a journey to Arizona, two strangers in a land of Written Tradition, Victor mus t learn to accept the Oral Tradition as his own, as well as begin to understand his father’s unconditionalRead MoreAnalysis Of George Orwell s Pigs And The Party 1562 Words   |  7 PagesWinston Churchill once said, â€Å"History is written by the victors.† This means that victors ultimately document history and have jurisdiction over it. They control the past, present, and the future, establishing their accounts of â€Å"history†. In 1984 by George Orwell, Oceania and the Party is the victor and have absolute power over history. The totalitarian government authorizes practically everything and manipulates the citizens to the most extreme level. From psychological manipulation to NewspeakRead MoreAnalysis Of Mary Shelley s Frankenstein 966 Words   |  4 Pagesthe ideals proposed in Frankenstein, written in the late nineteenth century by Mary Shelley, can be applied to modern day practices. She proposes that an abundance of knowledge and technology can be threatening to individuals and all of humanity if used incorrectly. Shelley s novel provided society with philosophical insight of the impact of morally questionable scientific and technological research. The popular belief of how Frankenstein came to be written is explained in the introduction to theRead MoreWarning Of The Dangers Of Science Or Suggestion That The Human1309 Words   |  6 Pagesdiscover solutions for problems; humankind is truly one of a kind. This distinctive quality grants humanity the ability to innovate, improve on what already exists, and create completely new things. In Mary Shelley’s Frankenstein the main character Victor Frankenstein does just that, by creating his monster. Delving into the pages of Frankenstein one can discover many underlying themes such as science and morality, true monstrosity, and human thirst for discovery. Over the years many have posed theRead MoreMary Shelley s Frankenstein - Romanticism And Enlightenment1233 Words   |  5 PagesMary Shelley’s Frankenstein is a true literary masterpiece and one of the best horror novels ever written. The book also allows for us to get a glimpse into the nineteenth century world and the society in which this novel was written in. Like most novels, Frankenstein was deeply influenced by the society in which it was written in. Ideas such as romanticism and post enlightenment are seen throughout the work and have a great impact upon the book. Now the story of Frankenstein is legendary and everyoneRead MoreThe Victorian Era1706 Words   |  7 PagesThroughout history, cultures and societies across the globe have used monsters or any sort of creature to exemplify anxieties and fears that they have. The same can be said for works of literature and art. These authors use these anxieties, personify them, and use them to exaggerate the fears of the readers. In short, the monsters/creatures that are created in each literary era depict and personify the biggest fears and viewpoints of the society that it was written in. In the case of the Victorian/RomanticRead MoreMonsters within a Young Girl’s Mind: Frankenstein by Mary Shelley1379 Words   |  6 Pagesbliss. O n Eric McMillan’s website, The Greatest Literature of All Time: the commentary on Mary Shelley’s Frankenstein shows criticism. Though Eric states at the beginning, â€Å"that the novel only had three things going for it and that it was very poorly written† (McMillan). Furthermore, that it is, â€Å"unfortunately, the moral that readers and critics have taken from the story—and which Shelley clearly intends—is that expressed by Frankenstein: Knowledge is dangerous; ignorance is bliss† (McMillan). In theRead MoreA Comparison Of The Short Story In Smoke Signals1244 Words   |  5 Pagesnot going to follow The Lone Ranger and Tonto Fistfight in Heaven in quite the way that I originally expected. I do not think that this was a terrible thing. While the novel itself was made up of short stories, Smoke Signals focused primarily on Victor and Thomas’s trip to Arizona. Following their trip to retrieve Victor’s father made the film alm ost entirely different from the novel, but the film directors did a wonderful job ensuring that the message behind the film, as well as the native culture

Thursday, December 12, 2019

Analyze the Security Issues In Cloud Computing †Free Samples

Question: Discuss about the Analyze the Security Issues In Cloud Computing. Answer: Introduction There is an important requirement of securely store, share, analyze as well as manage huge amount of complicated data, which are semis-structured and unstructured in order to determine the specific patterns as well as trends for enhancing the quality of managing information (Lian et al. 2014). The critical nature of the applications leads to use cloud to be secure. However, major security challenges with the cloud become major concerns of the users. In this aspect, the emerging cloud computing model attempts in addressing the explosive development of the devices that are connected on the web and handle huge amount of data. Presently, Google has introduced MapReduce framework in order to process large amount of data on the commodity hardware. The research will analyze the security issues associated with cloud computing and recommended possible measures to mitigate the issues. Scope of the proposed research The research will be helpful to identify different types of attacks occurred in cloud computing. The issues including security in storage, network security, middleware security and data security will be analyzed in the research (Modi et al. 2013). On the other hand, particular aspects of cloud computing will be critically evaluated in the research that will be helpful to take measures to protect the attacks (Hashem et al. 2015). In addition, security issues in different types of cloud computing such as PaaS, IaaS and SaaS will be presented in the research. Proposed recommendations would be helpful to mitigate security issues in cloud computing. Definition of important terms Cloud computing: It is considered as information technology paradigm as well as model for enabling ubiquitous access to the shared pools for configurable resources. Access control: Access control systems can perform authorization for identification, authentication, access approval as well as accountability of the entities through login credentials that include passwords, biometric scans and personal identification number. Aim of the research The research aims to identify the security issues lied in the use of cloud computing and critically evaluate them. In addition, the research will provide appropriate recommendations in order to overcome the security issues in cloud computing. Rationale of the research Even though the cloud computing provides potential advantages, there are several security issues involved with cloud computing. It includes networks, databases, virtualizations, scheduling of resources, transaction management and memory management. Security issues for several systems as well as technologies are applicable to cloud computing. For instance, the network interconnecting the particular systems in a cloud needs to be secure. Hence, it becomes an important issue of research (Ali et al. 2015). On the other hand, mapping virtual machines to the physical machines needs to be carried out securely. A resource allocation as well as memory management algorithm requires to be secured so that the cloud services can be effectively offered. Furthermore, data mining techniques need to be applicable in order to detect malware in clouds that requires analyzing (Chang and Ramachandran 2016). Data security engages encryption of the data and ensuring that proper policies can be enforced for the process of data sharing. Therefore, analyzing cloud security issues becomes immensely important and achieved in the present research. Literature review Overview Cloud explains the utilization of a collection of services, information, applications as well as infrastructure that is comprised of pools of compute, network, storage as well as information resources. The elements can be rapidly provisioned, deployed as well as decommissioned providing for on-demand utility like model of allocations as well as demand utility-like model related to consumption and allocations. Cloud features: Cloud computing is an integral part of any business or companies who have adopted this process. The main use of this process is used to get scalability in architecture and efficiency in business processes (Li et al. 2013). Moreover, the various components of the cloud computing processes are the SaaS, PaaS and the IaaS. The SaaS is termed as the software as a service which is basically used t make software in the cloud. The PaaS is the platform as a service which is used to implement the platform of the cloud infrastructures. The third party vendors responsible for giving the cloud platform provides the tools and services for providing the customizable options to their clients (Rewagad and Pawar 2013). Lastly, the IaaS or the infrastructure as a service is used to get computational resources from the cloud to host the set of applications or software. Risks in cloud computing However, the use of these services can also be risky adoptions if proper security checks are not adopted. In addition to security for the data, the compliance to policies and standards are also other risks that must be addressed by the companies concerned. This report discusses about the various risks present in accepting cloud solutions. The first risk in the cloud features are the need for a good security policy. According to a survey among various business companies and organizations implementing the cloud solutions, the majority risks are in their security aspects (Xiao and Xiao 2013). This means that are always the target for security breaches by attackers or other unethical workers. This is termed as a red flag in any system and proper security must be in place for supporting them. The major services for collecting emails like the SendGrid or the major applications for taking notes like the Evernote, are always the targets for a data breach (Wei et al. 2014). This is always done to get the information from them which lead to grave threats for the company themselves. This gives a pre-requisite for adopting the risk mitigation techniques like encryption and tokenizing for enhancing the security needs. The non compliance to standards or policies is another issue in the cloud computing aspects which is of great concern. For a cloud vendor, the policies and security adopted in their services are to be opening sourced so that their clients can see them and adhere to them accordingly (Zhao et al. 2014). This is also of a concern to the companies accepting these solutions as the policies and frameworks in place for their infrastructure might be vulnerable to risks and breaches (Arora et al. 2013). Thus, a client of a third party business must also see to this to get compliance to the regulations as any breaches in their systems due to this can lead to extreme loss of business, fines or even lawsuits. The next issue is the loss of control over the services. A cloud service provide or the third party vendors always provide assurance to their clients about the type of the services that will be provide, the data centre that will be used or even the platform that will be used. From a survey conducted for cloud features, various companies do not accept the cloud solutions due to the loss of expertise in controlling their solutions (Kaur and Mahajan 2013). This loss of control is the main reason for almost all businesses to opt out of their cloud infrastructures. Although the cloud vendors are always providing trust in the minds of their clients, the fact still remains that the loss of services is to be addressed and the client companies need to have information about the location of their data and even the type of the solution used for security. In addition, in case of any breaches in the system, the clients along with the vendors will be considered responsible for these types of cases . The fourth issue in the cloud security features is the disaster recovery plans and the mitigation techniques adopted (Inukollu et al. 2014). During the strike of a disaster in the system, the operations and all the processes are backed up to the cloud which is stored in online and offline modes (Rao and Selvamani 2015). These are the normal methods of addressing disaster plans. However, the internet connections used a provided by the Ethernet cables which slows down the backup process. During the onset of the attack, information is to be sent by these media and this is the main cause in reduction of the speed. This raises a security issue in operations where sometimes backups cannot be made in the proper time (Cao et al. 2014). Furthermore, during recovery options, the reverting back of changes also requires downloading the solutions from the storages to make the system go online. This process also causes hindrances to the system as the rate of reverting back is extremely slow (Sugum aran et al. 2014). This is another area where the various risks in security need to be addressed. In case of reverting back the backed up process from storages, the need to secure their system against further attacks are necessary. Failure to comply with this can lead to many other attacks and may lead to loss in the backed up process. Research gap The research will identify the potential security issues involved with cloud computing. However, some areas will not be covered like issues lied in third part providers. Hence, future researcher can do research on the mentioned area of cloud computing. Additionally, cloud computing in SaaS needs to be analyzed in detailed. Possible measures to overcome the issues The cloud is the model of delivering on-demand computing resources from the applications to the data centers over the web on the basic of pay for use. In order to minimize security issues several measures can be taken such as multi-tenancy, information integrity as well as privacy (Rong et al. 2013). Multi tenancy can be implied on computational resources, storage, database, logical as well as physical platform at the premises of provider. In order to deliver secured multi-tenancy, it is required to maintain location transparency. On the other hand, exposing resources over the internet to valid users as well as malicious attackers needs to be included in this process (Dinh et al. 2013). In the perspectives of maintaining third party control, owner has any control on data as it is a known as third party issue. Cloud providers are not aware of the architecture effective; therefore it is required to adopt effective security measure so that security issues can be mitigated. Summary It can be summarized from above content that, there are generally three types of service models associated with cloud service such as software as a service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). However, with the rapid growth of the use of cloud computing, security issues are also increasing. Therefore, it becomes important to research on the security issues lied in the use of cloud computing. hence, it is important to research on the security issues in cloud computing. Methodology Research methodology assists to define most appropriate approach, which requires to be adopted in order to attain complete as well as detailed results of the procedure. The theories as well as concepts detailed results of the procedure. Mackey and Gass (2015) stated that theories as well as concepts in research methodology is helpful to analysis in detailed and better way regarding the topic of the research. Application of research methodology assists in comprehending the particular process adopted in the process of analyzing the research of cloud security issues. The detailed procedure of research methodology leads to find the common errors that may create limits within the process of research. Along with these, the researcher has tried to apply detailed process of research methodology, which helps in doing better analysis of cloud security issues. Research approach Research approach is a tool that helps to developed format needed to conduct the study. J A specific research topic can be undertaken for studying in broad ways either in deductive and inductive research. Inductive approach assists in studying in a research topic when adequate data on the selected topic is not available (Taylor et al. 2015). The initial phase of inductive approach is doing observation, which assists in obtaining relevant information and develops the way of the research proceed accordingly. Inductive approach can be helpful in serving the purpose of developing new theory for any topic. On contrary, deductive approach is utilized as a procedure that explains practical application of the theories that is studied in order to obtain access to the content of research. Deductive approach aims to develop a theory with more specifications as well as concepts of data analysis (Brinkmann 2014). On the other hand, depending upon the nature of the study as well as research topic, the chosen research approach is developed, which can assist in doing better analysis of the particular topic. The study will try to study the specific concepts associated to security issues in cloud computing with the assistance of several theoretical knowledge. Models related to security needed for selection of the approach, which can assist in comprehension for getting much precise as well as clear way. On the other hand, inductive approach fails to be implemented at the topic as there are no new theories emphasized by the researcher. Research strategy The research strategy assists in evaluating the specific research framework of the research topic. It would be helpful in order to select the collection as well as analysis pattern. During the procedure of data collection, a specific type of approach is applied, which is helpful in better explanation of the research strategy. Vaioleti (2016) stated that there are three types of research design used in academic research design such as explanatory, exploratory as well as descriptive. Exploratory research design is helpful for a researcher in order to acknowledge several types of ideas as well as thoughts needed for completion of the research paper. On the other hand, explanatory research design explains the possibility of occurrence of events as well as correspondingly effect of the process. Due to more description of the cause and effect relationship, penetration details of the particular research become limited. Finally, descriptive research strategy aims to obtain details as to state the occurrence of the detailed process along with appropriate explanation of the topic. Application of explanatory will be avoided as it supports the concepts of making longitudinal study, which is not possible for the topic. On the other hand, descriptive research design is able to define detailed procedure involved in the security issues involved in cloud computing. Data collection and analysis Data are considered as useful collection of information as well as facts, which are helpful to study any types of research. Gast and Ledford (2014) commented that data collections assist in order to deliver accurate outcomes to a research process as well as enables the standard format of the research study. Data sources helps in penetrating the topic of research as well as assist to extract data as per the needs. Primary and secondary data sources will provide materials that are helpful in order to obtain details of the research topic. Primary data assist in collecting raw data, which will be directly catered according to the requirements of the research topic. Primary data will be collected from randomly selected users of cloud services. On the other hand, secondary data are collected and used from different sources such as books, journals and websites Qualitative data are helpful in order to record narrative form of the data, which add better explanation of the research topic. Qualitative data assists in adding theoretical concepts in the practical field, which leads to make better comprehension of the research topic unlike quantitative process. Quantitative data will be applied in the form of statistical data, which assists in recording data of large sample sizes. In the study, quantitative research technique will be applied. Ethical considerations During the procedure of conducting research methodology, it is required to follow a code, which assists in detecting wrong and right set of behavior needed to adopt during the procedure. The researcher for analyzing the security issues lied in cloud computing and recommendations for minimizing the issues are discussed in the study. In the processing of data application, data obtained though conducting a study of the particular topic with special references to the cloud computing security issues (Bauer 2014). However, any types of commercial applications of the data will be avoided so that the findings and outcomes will be strictly limited to the academic purpose only. On the other hand, the research tried to include no external influence or pressure over the participants in the feedback process. Summary The present section portrayed the different research tool that will assist better analysis of the research topic. With the assistance of the section, researcher will true to align nature of the study with the available research technique. It helps to frame the best possible methodology for the research. Method for 11 week thesis Main activities Week 1 Week 2-3 Week 3-4 Week 4-6 Week 7-9 Week 10 Week 11 Selection of research approach Selection of research approach Selection of research strategy Selection of research strategy Data collection process Data collection process Primary data collection Data collection process Data analysis process Data analysis process Data analysis process Ethical consideration forming Research plan for 11 week thesis Main activities Week 1 Week 2-3 Week 3-4 Week 4-6 Week 7-9 Week 10 Week 11 Selection of topic Data collection from secondary sources Creation of layout Doing Literature review Forming research Plan Appropriate Research method selection Collecting Primary data Analysis and Interpretation of accumulated Data Findings from the data Conclusion of the research Forming Rough Draft Submission of the research References Ali, M., Khan, S.U. and Vasilakos, A.V., 2015. Security in cloud computing: Opportunities and challenges.Information Sciences,305, pp.357-383. Arora, R., Parashar, A. and Transforming, C.C.I., 2013. Secure user data in cloud computing using encryption algorithms.International journal of engineering research and applications,3(4), pp.1922-1926. Bauer, G.R., 2014. Incorporating intersectionality theory into population health research methodology: challenges and the potential to advance health equity.Social Science Medicine,110, pp.10-17. Brinkmann, S., 2014. Interview. InEncyclopedia of Critical Psychology(pp. 1008-1010). Springer New York. Cao, N., Wang, C., Li, M., Ren, K. and Lou, W., 2014. Privacy-preserving multi-keyword ranked search over encrypted cloud data.IEEE Transactions on parallel and distributed systems,25(1), pp.222-233. Chang, V. and Ramachandran, M., 2016. Towards achieving data security with the cloud computing adoption framework.IEEE Transactions on Services Computing,9(1), pp.138-151. Dinh, H.T., Lee, C., Niyato, D. and Wang, P., 2013. A survey of mobile cloud computing: architecture, applications, and approaches.Wireless communications and mobile computing,13(18), pp.1587-1611. Gast, D.L. and Ledford, J.R. eds., 2014.Single case research methodology: Applications in special education and behavioral sciences. Routledge. Hashem, I.A.T., Yaqoob, I., Anuar, N.B., Mokhtar, S., Gani, A. and Khan, S.U., 2015. The rise of big data on cloud computing: Review and open research issues.Information Systems,47, pp.98-115. Inukollu, V.N., Arsi, S. and Ravuri, S.R., 2014. Security issues associated with big data in cloud computing.International Journal of Network Security Its Applications,6(3), p.45. Kaur, M. and Mahajan, M., 2013. Using encryption algorithms to enhance the data security in cloud computing.International journal of communication and computer technologies,1(12), pp.56-59. Li, M., Yu, S., Zheng, Y., Ren, K. and Lou, W., 2013. Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption.IEEE transactions on parallel and distributed systems,24(1), pp.131-143. Lian, J.W., Yen, D.C. and Wang, Y.T., 2014. An exploratory study to understand the critical factors affecting the decision to adopt cloud computing in Taiwan hospital.International Journal of Information Management,34(1), pp.28-36. Mackey, A. and Gass, S.M., 2015.Second language research: Methodology and design. Routledge. Modi, C., Patel, D., Borisaniya, B., Patel, A. and Rajarajan, M., 2013. A survey on security issues and solutions at different layers of Cloud computing.The Journal of Supercomputing,63(2), pp.561-592. Rao, R.V. and Selvamani, K., 2015. Data security challenges and its solutions in cloud computing.Procedia Computer Science,48, pp.204-209. Rewagad, P. and Pawar, Y., 2013, April. Use of digital signature with diffie hellman key exchange and AES encryption algorithm to enhance data security in cloud computing. InCommunication Systems and Network Technologies (CSNT), 2013 International Conference on(pp. 437-439). IEEE. Rong, C., Nguyen, S.T. and Jaatun, M.G., 2013. Beyond lightning: A survey on security challenges in cloud computing.Computers Electrical Engineering,39(1), pp.47-54. Sugumaran, M., Murugan, B.B. and Kamalraj, D., 2014, February. An architecture for data security in cloud computing. InComputing and Communication Technologies (WCCCT), 2014 World Congress on(pp. 252-255). IEEE. Taylor, S.J., Bogdan, R. and DeVault, M., 2015.Introduction to qualitative research methods: A guidebook and resource. John Wiley Sons. Tuohy, D., Cooney, A., Dowling, M., Murphy, K. and Sixsmith, J., 2013. An overview of interpretive phenomenology as a research methodology.Nurse Researcher,20(6), pp.17-20. Vaioleti, T.M., 2016. Talanoa research methodology: A developing position on Pacific research.Waikato Journal of Education,12(1). Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y. and Vasilakos, A.V., 2014. Security and privacy for storage and computation in cloud computing.Information Sciences,258, pp.371-386. Xiao, Z. and Xiao, Y., 2013. Security and privacy in cloud computing.IEEE Communications Surveys Tutorials,15(2), pp.843-859. Zhao, F., Li, C. and Liu, C.F., 2014, February. A cloud computing security solution based on fully homomorphic encryption. InAdvanced Communication Technology (ICACT), 2014 16th International Conference on(pp. 485-488). IEEE.

Wednesday, December 4, 2019

Study Habits free essay sample

When the chance finally comes, they are not prepared and are likely to miss a similar shot again. In contrast, a tennis coach can give tennis players repeated opportunities to hit backhand volleys that are progressively more challenging ND eventually integrated into representative match play. However, unlike recreational play, such deliberate practice requires high levels of concentration with few outside distractions and is not typically spontaneous but carefully scheduled (Ericson, 1 996, 2002).A tennis player who takes advantage of this instruction and then engages in particular practice activities recommended by the teacher for a couple of hours in deeply focused manner (deliberate practice), may improve specific aspects of his or her game more than he or she otherwise might experience after many years of recreational play. Ericson, Kramer, and Teach-Roomer (1993) proposed that the acquisition of ex- pert performance was primarily the result of the cumulative effect of engagement in deliberate-practice activities where the explicit goal is to improve particular aspects of performance. These activities are typically designed by a teacher or by the elite performers themselves when they have reached a sufficiently high level of mastery. The specific goals of deliberate practice and the detailed nature of training activities will differ for a given person from practice session to practice session as it will from one errors to another in a given domain and particularly across domains.However, the general goal Of all forms of deliberate practice involves improving some aspect of performance in an effective manner and, thus, deliberate practice has a number of pre-requisites, including the capacity to sustain full concentration, a distraction-free environment, and access to necessary training resources. Hence to engage in deliberate practice the aspiring elite performers often need to travel to a training facility and to schedule the practice activity to assure the ability to sustain concentration during E. A. Plant et al. Contemporary Educational Psychology 30 (2005) 96-1 16 99 the daily practice activity (Ericson, 1 996, 2002, AAA). Ericson et al. (1993) and Ericson (1 996, 2002, AAA) demonstrated that the attained level of an individual?s performance is closely related to the reported amount of deliberate practice, primarily solitary practice focused on improvement, that he or she has accumulated since the introduction to a domain, such as chess (Chariness, Kramer, Marry, 1 996), sports (Ericson, 2001, AAA, Bibb; Helsel, Starkest, Hodges, 1 998; Starkest, Decking, Lard, Hodges, Hayes, 1996), and music (Ericson et al. 993; Kramer Ericson, 1996; Lehmann Ericson, 1996; Sailboard, 1996). In studies of college education, similar evidence has been accumulated for differential effectiveness of various learning activities. Inspired by Crack and Outliving ¶s (1975) classic work on depth of processing, Schemes and Grove (1979) found that college students with above average Gaps differed from students w ith below average grades in their reports of cognitive processes mediating their learning.The students with higher Gaps were found to endorse more inventory items about elaborative encoding and deep analysis and synthesis, but were not found to fifer in their endorsement of traditional study and learning methods from the students with lower Gaps. In fact, they found that students? endorsement of traditional study was negatively related to their academic assessment tests (ACT).More recent research on effective learning (for reviews see Pinprick, 2000; Pestilence Plinking, 2001 ; Zimmerman, 2000) has explored successful students ¶ reports of the regulation of learning activities and the study environment within educational settings. For example, Zimmerman and Bandeau (1994) showed that self-efficacy (as rated by college dents) and grade expectations predicted grades in a writing class. Bandmasters, Pinprick, and Badgering (1996) found that college students with low, medium, and high course grades differed in their reported learning characteristics for social and natural science but not humanities courses.Specifically, Bandmasters et al. (1996) showed that high achievers in social and natural science had more domain-specific knowledge, more adaptive motivational beliefs, and better self-regulation. More recently Zimmerman (1 998, 2002) has developed a general framework for self-regulation in studying. He demonstrated close parallels between effective activities in studying in academic settings and self-regulated practice in the development of expert performance in many domains of expertise (Ericson, 1996, 2002, AAA, Bibb).The current paper seeks to identify observable indicators of effective learning activities in the complex domain of academic performance in a university setting by extending the theoretical frameworks of deliberate practice and self-regulated learning. We propose that distinctions between deliberate practice and other types of practice can be applied to studying and hat this distinction can, at least in part, explain why measures combining all types of study activities in the school system are not valid predictors of grades.Furthermore, we propose a few observable indicators that would reveal active efforts by some of the students to plan study activities in environments that are conducive to deliberate practice and self-regulated study activities in college. Of particular interest are learning activities reflecting deliberate and self-regulated practice that are related to increased performance (GAP). However, in addition to factors that are hypothesized to remote the quality of study, there are numerous other factors in the college environment that also influence GAP 100 and performance across a wide range of academic subjects (e. . , prior knowledge of subject, skills, and cognitive abilities). Therefore, our approach focuses on measuring a wide range of factors important for academic performance, so that we can statistically control for these factors and eventually estimate the relationship between study time and academic performance. 1 . 2. Toward a model of factors that determine grades during a semester In college Common measures of performance in college are the emulated GAP or the GAP for a given semester. These measures are averages of course grades, which are likely determined by two types of factors.The first type can be measured prior to the start of a targeted semester, such as the knowledge, abilities, and skills that had been acquired prior to the start of the semester. The second group of factors consists of the concurrent study and the learning and non-learning activities that take place during the semester. We consider each of these types of factors in turn. 1 . 2. 1 . Factors reflecting conditions prior to the start of a semester Previously acquired knowledge, skills, and stable abilities relevant to a given course will directly affect performance on tests and the final examination.These factors will also have an indirect impact by influencing the amount and type of new learning that is necessary during the semester for a student to reach a given level of mastery. Based on a large body of research, the best measures of basic cognitive skills and abilities and prior learning are SAT scores, high- school GAP, and prior grades in college (e. G. , Allen et al. , 1972; Groaner Lawmakers Zulu, 2000; Henries, 1972; Schuman et al. , 1985). Allen teal. (1972), for example, found that high school rank was a better predictor of GAP than study time or test anxiety. Standardized assessments of aptitude such as SAT and ACT scores are also predictive of performance in college (Gardner Lawmakers Zulu, 2000; Henries, 1 972; Schuman et al. , 1985). One might argue that the single best variable summarizing this information would be the cumulative GAP for college at the time of the start of the relevant semester. However, this measure also reflects many stable characteristics concerning quality and quantity of past study behaviors that re likely to be continued into the current semester. . 2. 2. Factors reflecting effective study during a semester If the goal is to predict GAP and cumulative GAP for students, it is necessary to focus on information that students are capable of reporting accurately from memory about the entire current semester. Although it would be fascinating if students were willing to report their detailed study processes for every hour of study during the semester, it would be virtually impossible to validate this information, particularly retrospectively.Consequently, we chose to focus on observable heartsickness of activities that students actively initiated to influence not only the amount of study time but also the quality of study. Based on the deliberate-practice framework, effective learning requires high levels of concentration and focus on the study activities (Ericson, 1996, 2002; Ericson et 1993). As a result, studying should be more 101 effective if it takes place in environments that allow full concentration (Zimmerman, 1998, 2002).Whereas s ome students may walk over to the library to study alone, others may study with friends and in settings with many potential distracted. However, studying is more likely to reach a quality consistent with deliberate practice and slaughtered academic learning if students schedule studying activities at suitable times and in locations where they would be unlikely to be interrupted and distracted. Consistent with this argument, when researchers have taken steps to assess distractions or interruptions to studying they are typically successful in predicting academic performance.For example, Michaels and Mattie?s (1989) found that studying with the radio and TV was associated with a lower GAP Henries (1972) found that the amount of effective study time (I. . , the number of uninterrupted minutes spent studying) predicted GAP. In addition, Allen et al. (1972) found that the number of interruptions that students reported during studying was negatively correlated with GAP. These findings suggest that students interested in excelling in school might be well served by choosing study environments with a low probability of distraction (e. . , studying alone in the library). We argue that such study environments are more likely to foster the kind of concentration and focus necessary for effective learning (I. E. , deliberate practice and self-regulated learning). Based on research on expert musicians and other elite performers, we know that engagement in deliberate practice is not generally spontaneous but that future expert performers habitually practice at regularly scheduled times (Ericson, 1996, 2002).The factors that control engagement in deliberate practice thus differ from the unplanned and spontaneous engagement in more enjoyable and effortless activities, such as leisure activities with friends (Ericson et al. , 1993). The need for sustained concentration, appropriate environment, and sufficiently long uninterrupted time intervals for deliberate practice requires Eng-term time budgeting and active procrastination. Therefore, given the competing demands for time in college, deliberate practice among college students would require active planning of their time.Similarly, self-regulated, effective learning is argued to require careful forethought and planning (Zimmerman, 1998, 2002). Consistent with these propositions, Britton and Tester (1991) argued that because of the multiple demands on students? time, careful planning of time is critical to success. They believe that good organization and goal setting (I. E. , planning activities a week or more in advance) created a more focused approach to studying and more efficient monitoring of goal accomplishment. Such focus and monitoring are critical to deliberate practice.Consistent with their theorizing, they found that self- management practices such as proportioning tasks were predictive of college students? Gaps even when controlling for their SAT scores (also see Groaner Lawmakers Zulu, 2000). In order for students to engage in the high quality of study necessary for deliberate practice, it is also important that students expend the effort to come to the classes and attend a large percentage of them. It is in the classroom where students receive instruction regarding what information and skills need to be studied and practiced for high levels of performance.Therefore, it is expected that a high level of attendance is required for optimal quality of studying. In addition, other demands or draws for students? time tend to influence the use o f available time and, likely, energy 102 for studying. For example, students who work for pay for a large number of hours each week will have fewer hours available for studying and less freedom to choose when to study. As a result, instead of selecting study time eased on motivation and level of energy, people working many hours for pay may be left with fewer options for when to study (e. G. Late at night, between classes), which may lead to less effective and less focused studying. Similarly, students who choose to spend extensive time partying may also limit the available time for studying as well as the quality of their study time. 1. 3. The current study The current study examines those factors likely to indicate the high quality of study among college students, endemic to deliberate practice and self-regulated learning, in hopes that it will help to clarify the relationship teens study time and GAP Specifically, the current study examined a range of factors reflecting conditions prior to the current academic semester (I. . , high-school GAP SAT scores) as well as factors from the current semester (I. E. , study time, study environment, and planning) and attempted to predict college performance both cumulatively and for a current semester. First, we assessed the relationship between estimated study time and cumulative GAP. We then controlled for previous performance in high school, college, and on standardized aptitude tests before examining the effects of factors from the rent semester, including those related to quality of study on college GAP. Once previously acquired knowledge, skills, and abilities are statistically controlled, we predict that factors related to quality and quantity of study would emerge as predictors of college GAP. Therefore, in the current study, participants were asked about a range of their activities in order to gain a detailed picture of the characteristics as well as quantity of their study behavior. Across the factors assessed in the current study, we focused on objective and verifiable information, such as official university records (e. . , GAP, SAT scores).We selected quantifiable assessments that are verifiable in principle and minimally subjective. For example, the time spent studying in the library, attendance to classes, participation in parties, and outside employment can be validated in future studies by direct observation and interviews of close friends and roommates. We also collected information about studying and other activities in diaries. Similar methods have been used to validate concurrent and ret A respective estimates of deliberate practice (Cote, Ericson, Beamer, 2004; Ericson et al. 1993; Kramer Ericson, 1996). By examining a large range of factors simultaneously, the current work allows us to identify those factors that provide an independent contribution to grade point average. We anticipated that students, who reported studying behaviors that reflect important aspects of deliberate practice (I. E. , focused, uninterrupted, and carefully planned) (Ericson, 1996, 2002, AAA; Ericson et al. , 1 993) and characteristics theoretically related to self-regulated learning (Zimmerman, 1998, 2002), would excel.Specifically, based on the findings regarding deliberate practice and the review of the iterative on academic performance and self-regulated learning, we anticipated E. A. Plant et al. / Contemporary Educational Psychology 30 (2005) 96?1 16 103 that students who studied in a quiet environment with fewer distractions and who carefully organized their study time would achieve higher performance. Further, we expected that students who attended a large percentage of classes and had fewer outside competing demands for their time and energy, such as working for pay or frequently attending parties, would have higher Gaps. Finally, when other factors that may influence the quality of study time (e. . , study environment, planning) are taken into account, we predicted that the amount of reported study time would emerge as a predictor of academic performance. 2. Method 2. 1. Participants Participants were 88 volunteer, undergraduate college students (49% male) from Florida State University in Tallahassee, Florida. Participants were required to have completed at least 1 year or 24 credit hours at the university (mean credit hours = 58. 52, SD = 27. 39) to insure that there were enough credit hours to produce a meaningful GAP.Participants were drawn from classes in the departments of Psychology and Education as well as from sports teams at the university. The mean age of the participants was 19. 82 years (SD = 1. 19). All participants signed informed consent documents and release forms for their official university records. 2. 2. Procedure Participation took place in group sessions (typically 15-20 students) in classrooms at the university. Participants were given a packet of materials including a Time Allocation and Academic Performance questionnaire, seven time log forms, and seven stamped and addressed envelopes.

Thursday, November 28, 2019

A Written Analysis on Why I Write by George Orwell Essay Example

A Written Analysis on Why I Write by George Orwell Paper George Orwell’s 1946 essay ‘Why I Write’ is enshrined with a set of innate values adhered to and advocated by Orwell himself. In recounting his personal journey in becoming a writer, Orwell enlists the underlying ideals justifying his initial motives for writing. Subsequently, it is the representation of deeply held ideals such as the innate personal connection to writing, the impact of context on a writer, the value of writing and the reasons for writing that captivate audiences and underpin the meaning of Orwell’s essay. The eudemonistic virtues exhorted by Orwell as expressed through the essay form therefore serve to represent the values and ideals shaped by his context, that are eminent within his writings. The unfailing sense of personal connection Orwell bears to writing pervades throughout the essay, and subsequently captivates the audience. Orwell’s use of personal childhood anecdotes, of where he felt â€Å"isolated and undervalued† evokes a personal connection of sympathy from the reader, and thus signifies the development of Orwell as a writer. From the opening anecdotes, where Orwell alludes to the Greek playwright ‘Aristophanes’ and the English poet ‘William Blake’ it is event that ‘writing’ remained an innate component of George Orwell’s identity and that attempts to suppress or neglect this passion would be â€Å"outraging† his true nature. Orwell argues that the essence of his writing stems from personal experience and the innate connection of he bore to literature from an early age. However, whilst Orwell does argue that writing itself must involve a self-driven personal engagement, he concedes that the development of language is influenced and shaped by other writers. We will write a custom essay sample on A Written Analysis on Why I Write by George Orwell specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on A Written Analysis on Why I Write by George Orwell specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on A Written Analysis on Why I Write by George Orwell specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Therefore, the use of personal anecdotes underpins the innate, personal connection that Orwell shared with writing and thus captivates the audience. The exploration of context in shaping an author’s thoughts and writings are central concerns dealt with by Orwell within the essay. Orwell’s primary motivation, albeit obscured and categorically denied in the opening of the essay, is the political cause. Orwell concludes the essay in stating that â€Å"where I lacked a political purpose that I wrote lifeless books entences without meaning, decorative adjectives and humbug generally. † However, Orwell laments the political motivation of his works to the revolutionising political sphere of his own context. The purpose of the poem in the essay however, is more so to illustrate the lingering uncertainties of war and conflict that plagued Orwell’s time. The poem reflects on the certainties of the past, whereby imagery through â€Å"A happy vicar I might have been, two hundred years ago† illustrates the changing paradigms of religion, and its subsequent impetus for conflict. The poem is indicative of the â€Å"evil time† and increasing political tensions of Orwell’s context, and places his works into perspective. Therefore in exploring his personal development as a writer, Orwell further illustrates the impact of context in shaping a writer’s works creating a sense of personal engagement with the reader. Orwell’s presentation on the value of writing through the essay establishes an emotional connection that captivates the reader. The use of imagery, through the comparison of ‘good prose’ to a ‘windowpane’ underpins the augmented message enlisted in Orwell’s Why I Write. The image of the windowpane serves as a symbol for writing as a connection between the reader, the writer and the text. Constituents of a good prose allow for the writer to connect and see clearly through the issues of the text whilst similarly, the reader is able to maintain an understanding of the writer’s motivation and reasoning for the nature of his/her works. Therefore, Orwell concludes his essay with the argument that writing needs to be able to find a sense of commonality between the reader and the writer, with his ‘great motives for writing’ providing a conceptual framework in which such a connection can be fostered. Through the essay, ‘Why I Write’ Orwell constructs a balanced tone that is both anecdotal and reflective in order to crystallise and reduce any complications in meaning. The use of a particularly precise, authentic voice stems from the actual purpose of this essay which essentially was to provide a justification to the strong and confronting political-willed nature of his works. His outspoken fervour of democratic socialism, a belief manifested from his personal disillusionment to the institutions of governance of his time causes him to maintain a concise and direct prose, in order to present an unequivocal justification for the nature of his works. The authentic directness of his prose is encapsulated in sentiments such as â€Å"I did try very hard to tell the whole truth without violating my literary instincts†. The manner of his tone illustrates Orwell’s attempts to portray his character as one of integrity towards the literary cause. Thus, Orwell attempts to maintain integrity and honesty whilst fostering an emotional connection with the reader in order to propagate his ideals of the motivation of writing. Orwell’s justification for the reasons for writing ensures that he is levelled with the reader, enabling his ideals to captivate the audience. Orwell’s classification of the ‘great motives for writing’ serves as an appreciative framework from which the reader is then able to interpret literature. Orwell felt as though whilst an author maintains a connection to his/her works, such a connection may not be endeared by the reader. Therefore, Orwell classifies the ‘motives for writing’ in order to re-establish the connection between the author, the text and the reader by providing a conceptual framework serving as the basing point for an informed interpretation of the writer’s background, and reasons for writing. A secondary purpose of this classification predominantly focuses on the ideals of writing as a universal connector of people. In conclusion, the structure of the essay in recounting a chronological and biographical development of George Orwell as a writer allows for Orwell to express his views in an unequivocal manner. Orwell seeks to foster a connection between the audience, and his concerns through the range of techniques he applies through the essay form. Subsequently, Orwell’s representation of his innate underlying values and ideals are what captivates the audience and establishes the emotional connection between the reader, the writer and the text.

Sunday, November 24, 2019

The Battle of Chapultepec in the Mexican-American War

The Battle of Chapultepec in the Mexican-American War On Sept. 13, 1847, the American army assaulted the Mexican Military Academy, a fortress known as Chapultepec, which guarded the gates to Mexico City. Although the Mexicans inside fought valiantly, they were outgunned and outnumbered and were soon overrun. With Chapultepec under their control, the Americans were able to storm two of the city gates and by nightfall were in tentative control of Mexico City itself. Although the Americans captured Chapultepec, the battle is a source of great pride for Mexicans today, as young cadets fought bravely to defend the fortress. The Mexican-American War Mexico and the United States had gone to war in 1846. Among the causes of this conflict were Mexicos lingering anger over the loss of Texas and the US desire for Mexicos western lands, such as California, Arizona, and New Mexico. The Americans attacked from the north and from the east while sending a smaller army west to secure those territories they wanted. The eastern attack, under General Winfield Scott, landed on the Mexican coast in March of 1847. Scott made his way towards Mexico City, winning battles at Veracruz, Cerro Gordo, and Contreras. After the Battle of Churubusco on August 20, Scott agreed to an armistice which lasted until Sept. 7. The Battle of Molino del Rey After talks stalled and the armistice was broken, Scott decided to hit Mexico City from the west and take the Belà ©n and San Cosme gates into the city. These gates were protected by two strategic points: a fortified old mill named Molino del Rey and the fortress of Chapultepec, which was also Mexicos military academy. On September 8, Scott ordered General William Worth to take the mill. The Battle of Molino del Rey was bloody but short and ended with an American victory. At one point during the battle, after fighting off an American assault, Mexican soldiers crept out of the fortifications to kill American wounded: the Americans would remember this hateful act. Chapultepec Castle Scott now turned his attention to Chapultepec. He had to take the fortress in combat: it stood as a symbol of hope for the people of Mexico City, and Scott knew that his enemy would never negotiate a peace until he had defeated it. The castle itself was an imposing stone fortress set on the top of Chapultepec Hill, some 200 feet above the surrounding area. The fortress was relatively lightly defended: about 1,000 troops under the command of General Nicols Bravo, one of Mexicos better officers. Among the defenders were 200 cadets from the Military Academy who had refused to leave: some of them were as young as 13. Bravo had only about 13 cannons in the fortress, far too few for an effective defense. There was a gentle slope up the hill from Molino del Rey. Assault of Chapultepec The Americans shelled the fortress all day on September 12 with their deadly artillery. At dawn on the 13th, Scott sent two different parties to scale the walls and assault the castle: although resistance was stiff, these men managed to fight their way to the base of the walls of the castle itself. After a tense wait for scaling ladders, the Americans were able to scale the walls and take the fort in hand-to-hand fighting. The Americans, still angry over their murdered companions at Molino del Rey, showed no quarter, killing many wounded and surrendering Mexicans. Nearly everyone in the castle was killed or captured: General Bravo was among those taken prisoner. According to legend, six young cadets refused to surrender or retreat, fighting to the end: they have been immortalized as the Nià ±os Hà ©roes, or Hero Children in Mexico. One of them, Juan Escutia, even wrapped himself in the Mexican flag and leaped to his death from the walls, just so that the Americans would not be able to take it in battle. Although modern historians believe the tale of the Hero Children to be embellished, the fact is that the defenders fought valiantly. Death of the Saint Patricks A few miles away but in full view of Chapultepec, 30 members of the St. Patricks Battalion awaited their grim fate. The Battalion was composed mainly of deserters from the US army who had joined the Mexicans: most of them were Irish Catholics who felt that they should be fighting for Catholic Mexico instead of the USA. The Battalion had been crushed at the Battle of Churubusco on August 20: all of its members were dead, captured or scattered in and around Mexico City. Most of those that had been captured were tried and sentenced to death by hanging. 30 of them had been standing with nooses around their necks for hours. As the American flag was raised over Chapultepec, the men were hanged: it was meant to be the last thing they ever saw. The Gates of Mexico City With the fortress of Chapultepec in their hands, the Americans immediately attacked the city. Mexico City, once built over lakes, was accessed by a series of bridge-like causeways. The Americans assaulted the Belà ©n and San Cosme causeways as Chapultepec fell. Although resistance was fierce, both causeways were in American hands by the late afternoon. The Americans drove the Mexican forces back into the city: by nightfall, the Americans had gained enough ground to be able to bombard the heart of the city with mortar fire. Legacy of the Battle of Chapultepec On the night of the 13th, Mexican General Antonio Là ³pez de Santa Anna, in overall command of the Mexican forces, retreated from Mexico City with all available soldiers, leaving it in American hands. Santa Anna would make his way to Puebla, where he would unsuccessfully try to sever the American supply lines from the coast. Scott had been correct: with Chapultepec fallen and Santa Anna gone, Mexico City was well and truly in the hands of the invaders. Negotiations began between the American diplomat Nicholas Trist and what was left of the Mexican government. In February they agreed on the Treaty of Guadalupe Hidalgo, which ended the war and ceded vast tracts of Mexican land to the USA. By May the treaty had been ratified by both nations and was officially implemented. The Battle of Chapultepec is remembered by the U.S. Marine Corps as one of the first major battles in which the corps saw action. Although the marines had been around for years, Chapultepec was their highest-profile battle to date: the Marines were among those who had successfully stormed the castle. The marines remember the battle in their hymn, which begins with From the halls of Montezuma†¦ and in the blood stripe, the red stripe on the trousers of the marine dress uniform, which honors those who fell at the Battle of Chapultepec. Although their army was defeated by the Americans, the Battle of Chapultepec is a source of much pride for Mexicans. In particular, the Nià ±os Hà ©roes who bravely refused to surrender, has been honored with a memorial and statues, and many schools, streets, parks, etc. in Mexico are named for them.

Thursday, November 21, 2019

Ideology Research Paper Example | Topics and Well Written Essays - 1750 words

Ideology - Research Paper Example due in part to centuries of anti-Semitism and sensitivity to the way in which issues relating to Israel’s existence and the Holocaust are understood by individuals throughout society. Yet, rather than dismissing this topic out of hand, due to the fact that it is somewhat unpopular to discuss, this particular student has felt it necessary to undertake an analysis of the situation that could help to spread a further level of understanding with regard to whether or not the Israel lobby is in fact disproportionately powerful within the United States house and Senate. Research by Dov Waxman indicated that the Israel lobby has a long standing relationship with both political parties; thereby enabling it to engage newcomers and the executive branch in a way that few other lobbies are capable of doing. Such an understanding is essential towards realizing the scope and breadth of the Israel lobby and the means by which AIPAC and others mobilize their influence to effect key goals that relate to the strategic needs that Israel and its lobbies represent. Waxman further notes that even though many other countries have sought to label their own lobbies after that of Israel, the overall level to which they are able to accomplish their strategic vision and needs pales in comparison to the degree and extent to which Israel is able to continue to foist its views on to the political spectrum within the United States. Hila Tal indicated that the commercial success of the Israel lobby is ultimately continues to encourage it integrate the political process within the United States. Ultimately, as a direct result of the fact that the Israel lobby is effectively able to garner tens of billions of dollars each and every year for Israel and its respective interests throughout the region, the lobby self perpetuates and gains a further foothold with respect to the way in which it can engage the Democratic and Republican stakeholders within the United States Congress. Other lobbies that

Wednesday, November 20, 2019

Critical Approaches Essay Example | Topics and Well Written Essays - 250 words

Critical Approaches - Essay Example Realism assumes the state to be the paramount player in the economy, and the state is assumed to be unchanging monolithic entity. The problem with this assumption is the non-consideration of agency and internal factors that have an impact on state behaviours. Since most of the realism theory deals with power and the state, a misguided assumption of the state and power relation is the worst failing of the theory. I believe the weakest approach is the feminist approach because it emphasizes on the relation between power and gender instated of emphasizing on the unequal dissemination of resources and power. The best insight of the feminist approach is that women have been oppressed systematically with men historically being dominant. Despite this being the main insight of the theory it lacks a direct relation between the iniquity of power and resource distribution by emphasizing on power and gender relations. The need to cater for unequal power and resource distribution under feminism was not dealt with until recently with the advent of contemporary

Monday, November 18, 2019

Marketing information system (MIS) Essay Example | Topics and Well Written Essays - 1000 words

Marketing information system (MIS) - Essay Example Putting into consideration factors such as market trends, changes and needs occurring in a market, and how the rival businesses conduct their activities is what a good marketer needs to do before venturing into a business (Michael, 2012 p. 67). The components of a Marketing Information System such as marketing research, internal records and marketing intelligence are most crucial when trying to obtain information on marketing (Esad, 2013 p. 35). However, to understand the role information systems play, what managers do must be examined as well as what kind of information they require to make decisions. How decisions are made as well as the decision problems that be solved by information systems must also be understood. This paper stands to examine the role Marketing Information Systems play in assisting managers with their marketing endeavors. Marketing managers have roles such as organizing, planning, deciding, controlling and coordinating. Any information has to be built with the role of a marketing manager in mind if it is to serve him/her well. Recently, there has been stressing on the aspects of behavior in management decision making (Jules, 2013 p. 35). On this, marketing managers are supposed to be highly voluminous in their jobs, work at high speeds, they should be diverse, or able to offer variety, they should also be specific, highly interactive and able to use verbal communication. Researchers suggest that a manager’s day has many tasks, but very little time assigned to each. Marketing managers prefer being speculative and gossiping in brief. This helps them keep up to date with up-to-date information. Routine and historical information, usually receives less attention. Even from researchers, marketing managers are found to prefer verbal communication in comparison to written information. Verbal communication has been found to offer more

Friday, November 15, 2019

Challenges and Opportunities for Evidence Based Practice

Challenges and Opportunities for Evidence Based Practice Introduction In recent years Evidence-based practice (EBP) has been advocating in nursing profession, however until now there still encounter many difficulties, conflict impact on evidence-based practice development. In this essay will be discussed the challenges and opportunities of future direction of evidence-based practice in nursing. EBP is a decision making approach introduction in 1992. Sackett et al. (1996) state that EBP is a best evidence method of health care decision making which means to integrate sources from research findings, clinical expertise and consideration of client preferences, clinical setting and other external factors such as cost. (as cited in Hewitt-Taylor, 2002). EBP is a scientific and systematic process rather than traditional approach such as customs, rituals and authority from transmission to improve quality and efficiency of patient outcome (Shaneyfelt et al. 2006). Challenges can be defined as barriers, difficulty during apply the evidence-based practice in nursing. Actually, there are many challenges of EBP development, in the article will try to divide into four types to discuss: Challenge of the nurse, Challenge of the clinical environment, Challenge of the research and Challenge of the organization. The part of opportunities is to analysis how to improve or diminish the gap between research evidence and clinical practice, and discuss the factors that help for the future direction of EBP in nursing. Challenges Challenge of the nurse, Challenge of the nurse relate to the nurses beliefs or attitude to EBP, lack of understanding, knowledge and skills of EBP. A recent study (Oranta, Routasalo Hupli, 2002) indicated nurses have divergence the value between research and practice; some nurses have conservative ideas that do not welcome change the nursing practice. The result reflect nurses have misunderstanding or negative attitude about evidence based care which may create wrong belief i.e. indifference or ignore the value of EBP. Nurse unawareness of research, are not familiar with EBP, and no sense improve the knowledge, not to mention to implement it in clinical care. (Hutchinson Johnston, 2004; Wang, Jiang, Wang, Wang Bai, 2013). Attitudes affect behavior, if nurse attitude remain unchanged, would increase degree of difficulty to carry out EBP in the future. Lack of skills implementation of EBP also a big challenge facing by nursing (Majid et al. 2010; Hutchinson Johnston, 2004). There are multiple components of EBP include asking suitable questions, selecting the best pertinent information, evaluating the evidence and integration of patient preference, research evidence etc in clinical decision making (Shaneyfelt et al. 2006). Nurse requests ability of integration and critical appraisal research skills i.e. information seeking, understand statistical terms, implementation to run through the EBP process. Provide education and training for EBP should be an important concern in the future for nurse. Challenge of the research Next challenge point related to research. Nurses always complain articles from journal are not readily available (Chau, Lopez Thompson, 2008; Gale Schaffer 2009; Wang et al. 2013). Actually findings from different research may not always have high level of reliability and validly, methodologies and presentation inadequacies or misconception may exist. Nurses probably feel confused and difficult to appraisal quality of findings, research reports are lengthy, include many academic, jargon terms and statistical analyses cause difficult to comprehension (Oranta, Routasalo Hupli, 2002). Furthermore, research finding usually not publishes fast enough and lack of guideline to implement in the clinical practice. Develop the research disseminate type to improve clinical utilization is a main direction in future, otherwise presentation of researches increase barrier to use finding in patient care, eventually obstruct EBP implementation. Challenge of the clinical environment Clinical environment seem to be a big challenge which absolute restrict nurse implementing EBP (Lee, 2003). Most studies (Hutchinson Johnston, 2004; Gale Schaffer 2009; Wang et al. 2013) stated that nurses have lack of time and heavy workload influences on utilization of research in practice setting. Take Hong Kong as an example, according to the survey conducted by Association of Hong Kong Nursing Staff at 2013, the average of nurse-patient ratio1:17 (normal: 1:4-6) in public hospitals, the bed occupancy rate is 92.9%. Nurses not only have daily heavy workload, also facing a serious shortage problem. Time and labour restrict and clinical safety concerns, nurse tend to use traditional practices and cannot keep frequently follow update journals during working (Hutchinson Johnston, 2004). The working environment resistant changing tried and definitely threats EBP utilization in future. Challenge of the organization EBP is a complex and multifaceted process, cannot apply by individual, administrative support is very important. However lack of organization support is the common complaint by nurses. According to Chau et al. (2008) and Hutchinson Johnston, (2004) the most important challenge of research utilization are lack of authority and no time to implement new ideas or involve research activity. These concerns related to the organization which include the setting barriers and limitations; e.g. time, resources, support and mentoring. Besides, conservative attitude of organization such as lack of intention in changes or welcome new ideas must influences EBP utilization (Gale Schaffer, 2009). It would limit the development of clinical practice to implement EBP and reduce the health care qualities. In addition, nurse indicated that corporation with other professionals also a barrier of EBP implementation (Oranta, Routasalo Hupli, 2002). Health care is a team working which involve many different professionals, such as physician, physiotherapist etc. during co-operation may cause differences of decision making. In traditional doctor has the most authority in clinical decision making, nurse advice may cause conflict or challenges by doctor. Therefore relationship between medical and nursing is also an organization related challenge of EBP utilization. Although there are many challenges of EBP in clinical utilization, challenges creates opportunities, the following part would analysis how to overcome some barriers between research evidence and clinical practice, and talk about the factors that relate to the future direction of EBP in nursing. Opportunities Firstly, upgrading of nursing education curriculum improve nurses’ professional status and research knowledge. Nursing students learn of EBP show more potential of ability on clinical decision making (Brown et al. 2010). Although the nursing programme in universities already include research skills teaching to implement evidence-based practice, transferring finding into clinical practice still a big problem for novice nurses. The curriculum should be included how to connect the EBP to the utilization, not just focus the part of research skills training. Besides, base on shortage of nurse, there are different kind of organizations provide nursing training such as nursing school, hospital nurse training courses, these courses more focus on clinical practice, but not include teaching EBP. At least the basic concept and skills of EBP should be educated in those courses which to improve knowledge of apply EBP into clinical practice. Second, solidarity and cooperation is also an opportunity to future direction of EBP. No matter clusters, hospitals or ward in Hong Kong tend to working independently and lack of co-ordinate with other. To provide EBP should include cooperate and sharing. The hospitals or clusters can form some research groups from different hospitals or wards; include senior and junior nurses to conduct research-related work. This kind of workshop would improve the stuffs ability to identify the clinical issues, review researches, analysis, promote to implement research finding or conduct research etc. eventually improve the quality of nursing care. Third relate to organization, the inferiors imitate the superiors; if the organization have positive attitude to motivate and reward EBP can raise the awareness to the staffs pay attention to EBP (Gale Schaffer, 2009). To improve future develop of EBP, organizational should be modified the nurse ratios. Provide more time and facilities to encourage nurse for discussing and applying research finding in clinical (Lee, 2003). Fourth, facing of decreasing birth rate, the elderly increasing inevitable, aging population already became a international problem, elderly care must pay more attention in nursing. Community services would be a big tendency and increase outreach services and day care services nursing care. Communities’ services for example community nurse and Nursing Clinic also help to relive the treatment cost, reduce stress and workload of front line nurse and bed occupancy rate. This situation closely relate to EBP because the role of nurses become more arduous and specialization, the case nurse provide professional health care services with integration, multifunction should have both evidence and knowledge to support the practice and patient outcome. The phenomenon provides opportunity to EBP to walk out the hospitals and integrate into the communities. Fifth, in the future nurses implement EBP may not just focus on Western medicine, also include Chinese medicine. In current years, popularity of Chinese medicine increasing in Hong Kong, most elderly tend to use Chinese treatment such as acupuncture, qigong diet regimen. Chinese medicine research and the utilization on clinical should be part of concern in EBP when making decision. As favorable condition of geography and culture in Hong Kong, combine Chinese and Western medicine would be a tendency, as a nurse should have the knowledge integration and application in clinical care. In conclude EBP utilization provide a more scientific method to the clinical decision making lead to improve and maintain health care quality, it is definitely the general direction in nursing future development. Base on the restrictive of policies and environment, working environment and organization seems to be two bigger challenges of EBP utilization. Although there are many challenges of EBP, different limitations from nursing and the external environment such as aging population, Chinese medication become more popularity etc provide some opportunities to indicate the future direction of EBP. Nursing profession need to sensitive to those factors, then appropriate to develop or improve, probably reduce the gap between clinical practice and EBP, also may provide a new direction for EBP in nursing utilization.

Wednesday, November 13, 2019

Barn Burning - Charcter Analysis :: essays papers

Charcter Analylis Barn Burning Character Analysis William Faulkner’s â€Å"Barn Burning† In â€Å"Barn Burning† the setting is a time when people drove horse wagons and the workingmen were generally farmers. The major character in this story is Colonel Sartoris Snopes, called â€Å"Sarty† by his family who is a ten-year-old boy. In the beginning, Sarty is portrayed as a confused and frightened young boy. He is in despair over the burden of doing the right thing or sticking by his family, as his father states,† You got to learn to stick to your own blood or you ain’t going to have any blood to stick to you.† Sarty’s father, Abner Snopes is accused of burning down a barn and Sarty is called upon to testify against his father and to tell the events of what happened. He wants to tell the truth because it is the right thing to do, but he knows he might have lie to save his father from being reprimanded. To his relief, it is decided that Sarty will not have to testify and is dismissed from testifying. It is decided by the Justice of the Peace to order Abner and his family to leave town at once. Sarty has moved twelve times in his ten years of age and although the story does not state clearly, that this is not the first time his father has set fire to a barn, but shows that the chances are, that he probably has done this in the past which has affected Sarty in how he feels about his father. Sarty’s other family members include the mother, aunt, an older brother, and two twin sisters who are minor contributing factors in this story. The family knows the father is responsible for the burning of the barns and they even unwillingly help him at his requests. This story describes the family somewhat concerned for the father, but they never challenge his decision to burn the barns even though it is wrong. The critical point of the story is when Sarty decides to tell Mr. De Spain that his father is going to burn his barn. Sarty is in disarray because he doesn’t know what is going to happen to him next and is probably speculating that his family will never forgive him because the of the harm that will come to their father if he is caught in the act.

Sunday, November 10, 2019

Ethics Final

Humans decided to start categorizing, and grouping humans based on various things. Research shows that man is of but one kind, and not like an animal of several species (Schaefer, R, T. (2006).. Humans have assumed that because people with different skin color, different cultural beliefs, or different ways of thinking that they must be of a different biological race (Schaefer, R, T. (2006). Society has created everything from what foods to eat, what music to listen to, to what they teach their children and true generations about acceptance of each other and passing on racial beliefs.Politicians and people of wealth have been notorious for labeling groups and racial profiling to get the higher up so to speak, or to create justification in the community. Race began simply a categorization of physical biological characteristics such as hair type, shape of the eyes and nose, and skin color (Schaefer, R, T. (2006). White was white, and black was black; then came the categorizing of additi onal attributes such as afro-textured hair and large noses on African Americans, or olive skin, slanted yes, and shiny Jet black hair in Asians.Biologically speaking there is nothing as simple as black and white. For many, many years people have relocated or traveled all over the world and mingled and procreated with other races which has now mixed traits, and been passed down generation after generation. It seems virtually Impossible to truly Identify a person's race, because I find It hard to believe there would be any â€Å"purebreds† during this day and age. 2. How has the media contributed to prejudice and discrimination against Asian Americans? How might these problems be remedied?The media has contributed to the prejudice and discrimination against Asian American in several ways that demonstrate insensitivity and biased reporting. According to our textbook, the media has had a negative Impact on the views of Aslant Americans by using Inappropriate clicks, mistaken Iden tity, personalization, using ethnic slurs, biased and inflammatory reporting, bashing their native Japan, media Invisibility, and even model minority which sets the positive standards of Aslant Americans too high (Schaefer, R, T. (2006).Stereotyping them as a â€Å"model minority† creases tenet chances AT acceptance when It comes to social programs, employment, and other social ills (Schaefer, R, T. (2006). Asian Americans are often times viewed as well-educated and successful. Little does society notice that these Asian Americans do not normally hold high corporate positions, rather they are running their small own business and employ their family, taking care of one another as best they can. The media and even entertainment honchos never embrace Asian Americans as athletes or potential celebrities with mainstream roles. AsianAmericans are never heard and asked for their input when the media is addressing problems in their community, as well when it comes to issues regarding Asia (Schaefer, R, T. (2006). These problems of negative portrayal against Asian Americans held by the media can be remedied by first of all overcoming the idea that they are a â€Å"model minority' and realize that they work hard, love their families, sought the United States to live the â€Å"American Dream† and try to escape poverty. The media can choose their words wisely refraining from any slur words or phrases such as â€Å"Asian Invasion† or â€Å"OrientExpress†. The media should also express the increased population in areas of heavy Asian descent I also believe the media should tell or write stories of influence such as Asian Americans striving in America, working 7 days a week to make ends meet. I think the media should exploit the poverty side of the Asian American community to help decrease the model minority views so they may be eligible for more minority programs. References Schaefer, R, T. (2006). Racial and ethnic groups (10th deed. ). Upper S addle River, NJ: Pearson Prentice Hall.

Friday, November 8, 2019

Free Essays on Shakespears Sonnet 130 Vs. Christopher Marlowes The Passionate

show that he is willing to do anything and everything for her by giving her "a gown made of the finest wool" or even "coral clasps and amber studs" just for her to "live with him and be my (his) love." However, the poet knows that he can not give her these offerings because the gifts that he is willing to give her are merely tokens of exaggerations and are listed to show his beloved that this is how much he wants her. Whereas in Sonnet 130, the poet is earnest and truthful in what he writes about his love. "I love to hear her speak, yet well I know that music hath a far more pleasing sound, yet, I think my love as rare as any she belied with false compare." This shows his honesty in speaking about his object of affection, yet he achieves the same sense of unconditional love that the poet in Marlowe’s poem tries to delineate without using embellishments. The speaker in Sonnet 130 doesn’t hyperbolize about his "rare" love using a plethora of exaggerations to portray his fondness for his "mistress" as the poet in Marlowe’s poem did. Even though the two poems have the theme as unconditional love, the portrayals of it are achieved through different methods. Opulent treasures are also used within both poems whether it be treasures of physical attributes or treasures of tangible gifts to express their loves for the women in their lives. The poet of The Passionate She... Free Essays on Shakespear's Sonnet 130 Vs. Christopher Marlowe's The Passionate Free Essays on Shakespear's Sonnet 130 Vs. Christopher Marlowe's The Passionate Compare And Contrast Essay In William Shakespeare’s Sonnet 130 and Christopher Marlowe’s The Passionate Shepherd To His Love, the themes of unconditional love, opulent treasures, and vivid imagery are all conveyed throughout the poems but through different point of views. The theme of unconditional love is expressed through the two poems. The poet proclaims his affection for her by telling his "love" that he will give her anything in the world if she would just be with him. "And if these pleasures may thee move, come live with me, and be my love." His words show that he is willing to do anything and everything for her by giving her "a gown made of the finest wool" or even "coral clasps and amber studs" just for her to "live with him and be my (his) love." However, the poet knows that he can not give her these offerings because the gifts that he is willing to give her are merely tokens of exaggerations and are listed to show his beloved that this is how much he wants her. Whereas in Sonnet 130, the poet is earnest and truthful in what he writes about his love. "I love to hear her speak, yet well I know that music hath a far more pleasing sound, yet, I think my love as rare as any she belied with false compare." This shows his honesty in speaking about his object of affection, yet he achieves the same sense of unconditional love that the poet in Marlowe’s poem tries to delineate without using embellishments. The speaker in Sonnet 130 doesn’t hyperbolize about his "rare" love using a plethora of exaggerations to portray his fondness for his "mistress" as the poet in Marlowe’s poem did. Even though the two poems have the theme as unconditional love, the portrayals of it are achieved through different methods. Opulent treasures are also used within both poems whether it be treasures of physical attributes or treasures of tangible gifts to express their loves for the women in their lives. The poet of The Passionate She...

Wednesday, November 6, 2019

About the North Atlantic Treaty Organization (NATO)

About the North Atlantic Treaty Organization (NATO) The North Atlantic Treaty Organization is a military alliance of countries from Europe and North America promising collective defense. Currently numbering 29 nations, NATO was formed initially to counter the communist East and has searched for a new identity in the post-Cold War world. Background In the aftermath of the Second World War, with ideologically opposed Soviet armies occupying much of Eastern Europe and fears still high over German aggression, the nations of Western Europe searched for a new form of military alliance to protect themselves. In March 1948 the Brussels Pact was signed between France, Britain, Holland, Belgium and Luxembourg, creating a defence alliance called the Western European Union, but there was a feeling that any effective alliance would have to include the US and Canada. In the US there was widespread concern about both the spread of Communism in Europe – strong Communist parties had formed in France and Italy - and potential aggression from Soviet armies, leading the US to seek talks about an Atlantic alliance with the west of Europe. The perceived need for a new defensive unit to rival the Eastern bloc was exacerbated by the Berlin Blockade of 1949, leading to an agreement that same year with many nations from Europe. Some nations opposed membership and still do, e.g. Sweden, Ireland. Creation, Structure, and Collective Security NATO was created by the North Atlantic Treaty, also called the Washington Treaty, which was signed on April 5th 1949. There were twelve signatories, including the United States, Canada and Britain (full list below). The head of NATOs military operations is the Supreme Allied Commander Europe, a position always held by an American so their troops don’t come under foreign command, answering to the North Atlantic Council of ambassadors from member nations, which is led by the Secretary General of NATO, who is always European. The centrepiece of the NATO treaty is Article 5, promising collective security: an armed attack against one or more of them in Europe or North America shall be considered an attack against them all; and consequently they agree that, if such an armed attack occurs, each of them, in exercise of the right of individual or collective self-defense recognized by Article 51 of the Charter of the United Nations, will assist the Party or Parties so attacked by taking forthwith, individually and in concert with the other Parties, such action as it deems necessary, including the use of armed force, to restore and maintain the security of the North Atlantic area. The German Question The NATO treaty also allowed for the alliance’s expansion among European nations, and one of the earliest debates among NATO members was the German question: should West Germany (the East was under rival Soviet control) be re-armed and allowed to join NATO. There was opposition, invoking the recent German aggression which caused World War Two, but in May 1955 Germany was allowed to join, a move which caused upset in Russia and led to the formation of the rival Warsaw Pact alliance of Eastern communist nations. NATO and the Cold War NATO had, in many ways, been formed to secure West Europe against the threat of Soviet Russia, and the Cold War of 1945 to 1991 saw an often tense military standoff between NATO on one side and the Warsaw Pact nations on the other. However, there was never a direct military engagement, thanks in part to the threat of nuclear war; as part of NATO agreements nuclear weapons were stationed in Europe. There were tensions within NATO itself, and in 1966 France withdrew from the military command established in 1949. Nevertheless, there was never a Russian incursion into the western democracies, in large part due to the NATO alliance. Europe was very familiar with an aggressor taking one country after another thanks for the late 1930s and did not let it happen again. NATO After the Cold War The end of the Cold War in 1991 led to three major developments: the expansion of NATO to include new nations from the former Eastern bloc (full list below), the re-imagining of NATO as a ‘co-operative security’ alliance able to deal with European conflicts not involving member nations and the first use of NATO forces in combat. This first occurred during the Wars of the Former Yugoslavia, when NATO used air-strikes first against Bosnian-Serb positions in 1995, and again in 1999 against Serbia, plus the creation of a 60,000 peace keeping force in the region. NATO also created the Partnership for Peace initiative in 1994, aimed at engaging and building trust with ex-Warsaw Pact nations in Eastern Europe and the former Soviet Union, and later the nations from the Former Yugoslavia. Other 30 countries have so far joined, and ten have become full members of NATO. NATO and the War on Terror: The conflict in the former Yugoslavia had not involved a NATO member state, and the famous clause 5 was first – and unanimously - invoked in 2001 after terrorist attacks on the United States, leading to NATO forces running peace-keeping operations in Afghanistan. NATO has also created the Allied Rapid Reaction Force (ARRF) for faster responses. However, NATO has come under pressure in recent years from people arguing it should be scaled down, or left to Europe, despite the increase in Russian aggression in the same period. NATO might still be searching for a role, but it played a huge role in maintaining the status quo in the Cold War, and has potential in a world where Cold War aftershocks keep happening.   Member States 1949 Founder Members: Belgium, Canada, Denmark, France (withdrew from military structure 1966), Iceland, Italy, Luxembourg, The Netherlands, Norway, Portugal, United Kingdom, United States1952: Greece (withdrew from military command 1974 – 80), Turkey1955: West Germany (With East Germany as reunified Germany from 1990)1982: Spain1999: Czech Republic, Hungary, Poland2004: Bulgaria, Estonia, Latvia, Lithuania, Romania, Slovakia, Slovenia2009: Albania, Croatia2017: Montenegro