Wednesday, October 9, 2019

Music - the ministrel show Assignment Example | Topics and Well Written Essays - 250 words

Music - the ministrel show - Assignment Example The passage relates to the topic of impact of stereotypes in the society and creates a deep message for the white Americans that discriminated the black people slave trade era. From the passage one learns that the minstrel shows and the entire music industry could be instrumental in delivering messages not deeply received through other forms. The passage raises questions about the efforts of the Americans in combating the injustices towards the black Americans. More information would be necessary to show the aftermath of the minstrel performances on the welfare of the African-Americans. â€Å"Early minstrelsy was not only about race, but also class and region; it was as much anti-Southern as it was anti-black. There were also black minstrel troupes, comprised largely of African-American men (Brooker and Clayton Minstrel Show, Thomas Dilward, William Henry Lane, Callendars Minstrels, and Blackbirds) imitating poor and uneducated African-Americans from the south† (OTRCAT.com 4). This passage was chosen because it shows the diverse impacts of the minstrel shows on the society that goes beyond undermining the African cultures. The shows were mainly intended to humiliate the African Americans but in contrast it affected the entire southern society. The passage relates to the topic of development of the stereotypes due to the minstrel show and impacts to the entertainment industry as well as the society. Through the passage, one learns about the emergence of stereotypes imitating uneducated Black Americans that shows influence in the entertainment industry. It also shows some superior capabilities/ talents for of the black southerners. It raises question based on the educational status of Africans and more information would be needed on the educational developments for southerners due to the performances of the

Tuesday, October 8, 2019

Labor power Assignment Example | Topics and Well Written Essays - 250 words

Labor power - Assignment Example The intrinsic value of a commodity, which is labor related, determines its exchange value, a concept he calls â€Å"the law of value.† are robbed of their rightful sweat. This is indeed the reason why Marx called for the elimination of profits and for workers to conquer of capitalists. the value of labor-power manifests as subsistence means. According to Marx, profit originates from exploitation of workers by capitalists. He explained that profits result when capitalists pay workers less than the actual value they add to the commodities they produce. Marx explains the main distinction between societies by arguing that the difference in the â€Å"mode in which the surplus-labor is in each case extracted from the actual producer, the laborer† (Marx and Engels 241). Despite the fact that capitalist workers, they (workers) cannot stop to work because they have no choice. Workers own labor but lack the means like tools, and raw materials to execute labor. For them to acquire these resources, they have no alternative but to sell their labor-power to the exploitative capitalists. In Marx’s model, profits keep falling because of increased efficiency in production, which translates to less labor utilization and spending more on labor-saving, efficient machinery. As such, the capitalists own attempt to increase prof it result into falling rate of

Monday, October 7, 2019

Analyze and evaluate Robert Frost's The Road Not Taken Essay

Analyze and evaluate Robert Frost's The Road Not Taken - Essay Example According to Larry Finger (1978), he once told an audience, â€Å"You have to be careful of that one; it’s a tricky poem - very tricky† (478) when referring to this poem. The title of the poem is â€Å"The Road Not Taken† rather than â€Å"The Road Less Taken† (emphasis added), which provides the first clue as to the author’s original intentions and a different reading of the poem. Understanding Frost’s background enables one to analyze the poem through each of its four stanzas and trace the linguistic tools used by the author to make his personal philosophical meaning clear. Robert Frost was born in 1874 in San Francisco, California. Although he lived in small apartments throughout the city during his first 11 years, Frost is more commonly associated with the natural scenes of the New England countryside that is used in his poetry (Parini 2000, 3). When his father died, Frost moved with his mother and sister to his paternal grandparents’ home in Massachusetts until his mother found a teaching post in nearby Salem. Life was always a struggle for Frost and his family, but he did well in school and helped on the farm and eventually earned a scholarship to Dartmouth, supplemented by his grandfather, in 1892. Soon after this and before receiving a degree, he returned home to take over his mother’s unruly classroom. He did this and other odd jobs until his secret fiancà © Eleanor graduated from St. Lawrence University and they could get married (Pirini 2000). Frost then began attending Harvard until it became necessary for him to support his gr owing family. His grandfather bought him a farm that Frost attempted to work, but he eventually returned to teaching, through it all demonstrating a heavy preference and talent in the area of literature. However, by this time, his writing was beginning to gain recognition and he was developing his own style and poetic approach. â€Å"The Road Not Taken†

Sunday, October 6, 2019

How the Digital Transformed our Experiences of Art and Design Essay

How the Digital Transformed our Experiences of Art and Design - Essay Example Digital imaging has impacted various disciplines within the fields of art and design that range from painting, photography and the making of prints (Heller & Womack, 2007). Despite the fact that these technologies are expensive, they have helped students engaging in these fields to effectively practice their skills (Johnson, 2012). This has been enabled with the invention of software like Abode Photoshop and various other engineering drawing programs like Auto-CAD (Lockwood, 2009). Digital technologies used in paintings have been utilized for purposes of stimulating the painted marks by providing optical illusions (Museum Education Roundtable, 2003). There are computer programs like painter that have been designed for making clever tricks including automating the paintings of photographs (Susanka, 2004). They have brought about our ability to clearly differentiate the color values in images displayed on monitors with the advancements that are being made by several companies like Appl e Mackintosh (Johnson, 2012). The advances that have been made in digital technology have continuously given students in art along with design colleges’ greater opportunities in producing high quality works in two or three dimensions (Heller & Womack, 2007). ... The other risks that could arise from digital technologies result from the attribution of aesthetic elements to the artists and designers utilizing them (Friesinge, Grenzfurthner & Ballhausen, 2012). Recently there have been increases in the use of digital technologies which have resulted in the over influencing of the qualities of the final images desired through different processes that are semi-automated (Susanka, 2004). The use of modern digital applications may influence the assessment of diverse final outcomes in various works of art and designing by the viewers or users despite the fact that they may be faulty (Boomen, Lammes & Lehmann, 2009). Digital information enables designers and artists to independently express a wide variety of ideas with enthusiasm along with perseverance (Clark & Brody, 2009). Independent judgments are also enabled through the use of critical vocabulary that show a clear comprehension of the complex issues that may be involved in a situation (Heller & Womack, 2007). The technologies additionally help designers and artists to properly explore the processes that are involved in various the experiments they may carry out (Johnson, 2012). These experiments may be used for testing the strengths of different models by designers, the risks encountered after their implementation along with their effects on the surrounding (Museum Education Roundtable, 2003). The use of these technologies can therefore be said to have facilitated the creation of safer habitats for people along with better presentations by artists in their exhibitions (Susanka, 2004). Through the use of digital technologies, artists and designers have been able to clearly expound on complex issues that

Saturday, October 5, 2019

E_Week2DQ Essay Example | Topics and Well Written Essays - 750 words

E_Week2DQ - Essay Example However the extent to which ad business would attain sustainability and growth is disreputable. For instance in the US market Groupon offer daily discounts ranging from 50% up to 90%. This offer is amazingly interesting to attract customers to purchase Groupon. With such steep discounts the retailer is affirmed a certain amount of sales attained by setting the minimal number of purchases in a stipulated period in order for the discounts to be effective (Verma, 2007). Despite the numerous growths attributed to massive advertising, Groupon and other coupon businesses bear losses. The companies offering the massive discounts suffer huge losses too. According to research results published in MIT Sloan Management review, three business (restaurant, car wash and spa) reported huge losses amounting to thrice the monthly earnings for the restaurant, while the other two lost more than their monthly earnings in a period of one year (Aaker, 2004). Although Chaffey (2007) argues that such losses are anticipated and that with time the business will recover due to the new customers introduced by the coupon, the expected period can be as long as 10 years. For instance the salon will need an equivalent of 8 years in order to record its first profit. Groupon and other coupon business offer unlimited merits as compared to traditional forms of advertising and marketing. Because it is free, businesses can showcase what they offer without the risk of running into losses as a result of low or no sales. In addition, sites such as www.Groupon.com and www.couponsuzy.com allow sharing of information with their partner businesses. With such incentives, businesses alleviate the huge premiums they would have otherwise paid to attain direct advertising to a certain group of people. With the help of experts, customized promotion ads are designed by the coupon sites to makes sure that the business attains the minimum sales (Kaplan, &

Friday, October 4, 2019

Phenomenology and the sociology of knowledge Essay Example for Free

Phenomenology and the sociology of knowledge Essay Phenomenology can both be understood to be a discipline and a movement in the history of philosophy. As a discipline, Phenomology can be defined to be the study of structures of experience and consciousness. Ontology, epistemology, logic and ethics are other disciplines which are related to Phenomology though they are distinct (Schulz, Wagner, 1997). In a different perspective, Phenomology can be defined as a historical movement which was launched by great thinkers such as Edmund Husserl among others in the 20th century. Phenomenology and social science Common theories present in social science are based in the real world. This leads to my conviction that phenomenological research can be used in the future studies of some methods which are in use in social science. Phenomenology can further be used in social science to facilitate the understanding of some phenomenon’s which are often taken for granted. For instance, man is assumed to be social being and language and communication systems do exist. Methods in social science fail to address why there is mutual understanding and communication and why men are motivated by certain experiences. Moreover, the social science methods fail to describe the underlying assumption and their implications in the interpretation of social interrelationship (Collins, 1998). All these can only be addressed through philosophical analysis which Husserl referred to as phenomenological philosophy. Phenomenology can also be used to bring meaning and insights to the study of grief, anxiety and pain which are some social issues which affect the very existence of man. Through phenomenology, social scientists can account and analytically describe the acts of intentional consciousness. Finally, phenomenology creates a bridge for the phenomenological sociology which provides an understand ding of the formal structures common in everyday day life. Sociology of knowledge Sociology of knowledge refers to the study of the social sources of knowledge and its impact on the society. In the study, knowledge is assumed to be a cultural product which can only be understood in the social context of its origin. The study is important to Collins in that it provides an explanation to most of the philosophical ideas which exist. In his book, he asserts that great and philosophical ideas are only produced through interaction between humans whose construction relies on the social structure of the intellectual world. Through the sociology of knowledge, Collins is able to explain that the rationalization process of Western, Indian and Asian philosophies has only been achieved through conceptual framework and social knowledge. He uses the sociology of knowledge to explain that social processes have an explanation as to why what is said to whom which he calls the sociology of thinking (Geoffrey, 2003). He also asserts that through the sociology of knowledge one is in a capacity to predict the conversation between two individuals if only their characteristics and the emotional synergies are known. He further uses the sociology of knowledge to explain how it is possible to predict the thinking process of an individual. Though thinking is an internalized conversation, Collins asserts that what we think is often a reflection of what we write on paper or we talk with other people. Collins believes that emotional energy and what we anticipate for the future determines our thinking process (Collins, 1998). Finally, the sociology of knowledge has enable Collins to describe the philosophical transformations which have been achieved in modern Europe, Japan and china. References Collins, R. (1998). The Sociology of Philosophies: A Global Theory Of Intellectual Change Harvard University press, USA ISBN 0-674-00187-7 Geoffrey, L. (2003). Modern Philosophy. London: Routledge Schulz, A. Wagner, H. (1997). On Phenomenology and Social Relations: Selected Writings. University of Chicago press. London ISBN 0-226-74153-2

Thursday, October 3, 2019

A Review On Internet Cafe Networks Information Technology Essay

A Review On Internet Cafe Networks Information Technology Essay This assignment is based on the network implementation of internet cafe which is based near the campus of University of East London. We have to design and implement a network and describe the Local Area Network and Wide Area Network management. We have to describe the cost effectiveness solutions with software and hardware we use in this network with justifications. Different layers will also be discussed at different stages in this assignment. Different IP schemes and other network suggestions will be discussed. This assignment also includes conclusion and references of the research used to build this assignment. Research method plays an important role in this assignment. Introduction to ARPANET: Advance Research Projects Agency Network (ARPANET) is the worlds first Network which gives Packet Switching and allows access over network widely. Packet switching helps in establishing a communication link. It was started in the mid 1968. It started through LAN. Phenomenon of Internet cafe: We have to work on internet cafe project which is close to University of East London. This cafe is exists on three floors, and we have to connect or share 75 computers in cost effective solutions. These all computers should be registered with the single IP address. OSI layers have to been defined at different stages on the network. TCP/IP systems relate to local area network and the internet. This network has to been defined using network layout diagram. Network Cost and specifications: This project of internet cafe would require 75 computers, 1 router, 4 switches, LAN cables and 3 printers. A normal computer specification should be: 1 GB RAM At least 2.1 GHZ processor (Intel or Atom) 150 GB hard disk 17 Display Standard USB keyboard Standard USB mouse CD/DVD ROM This is normal system specifications which could be used in internet cafe and can be easily used by the customer. Normally when computers are purchased in bulk for a computer lab or internet cafe system, loyalty discount is normally given by that provider. This specification would estimate cost around  £250  £300 as according to Currys or PC world. Dell computers are normally recommended and purchasing from DELL can be more cost effective. Router We also have to use a router. As this is internet cafe connection, so there should be powerful router connection which could enable more surfers to use internet more easily. There is a router which has recently been launched (EDIMAX BR-6574n Wireless Gigabit Router) this is really power and is available at Currys store for  £80. Apart from that, there are other NETGEAR routers as well which range starts from  £30. Switches We would also need at least 4 switches. Cisco switches are normally recommended by engineers. They are quite fast and comply with the requirement of network. It normally costs around  £100. Some Belkin and Netgear switches are cheaper as well. LAN cable We wo ­uld need LAN cables to make connections overall on the network to connect computers with switches and router. RJ-45 connector cable is used for this purpose. A 50 meter Ethernet LAN cable costs about  £5. The more length would be needed, more prices would be increased. Printers We can also add Printers to the network. It is essential in network computers to have a printer but it is not recommended or compulsory. Normally Printer ranges from  £40 that is all in one, which is better for home and office purposes as it includes Printer, Scanner and Copier. Implementation of Network: We have to work on internet cafe. Cafe has 3 floors and we have arranged 75 computers over three floors. We have to place 3 computers for server purpose. We can divide 25 computers on three floors and also 3 computers as server on third floor. To make a network local, we connect computers first using switch. On first floor, we will place 25 computers, and we have connected these 25 computers using Fibre cable for LAN (Local Area Network). Also we need 3 printers to share on three floors and we connect 1 printer on each floor. We connect all 25 computers and 1 printer with switch. This process has to be repeated on three floors, and then we have to connect them with router. Server computers will be connected with router directly but through switch. When server is directly connected with router, it enables firewall implementation and sharing among the network with secure authentication. LAN is used to connect computers within local area and make a network between them. We use this network in this case to connect computers within the same building. After connecting them through LAN cable, we connect them to Switch. HUB is also called concentrator or multi station access unit (MAU). A normal hub contains 8 to 24 ports for the computers and other devices. It works as a multiple port repeater. It receives a digital signal and re amplifies or regenerates that signal. It then forwards the digital signal to all ports on the hub without looking at any data. Switch is also used for the same purpose as hub but it is more intelligent device. It operates at data link layer of OSI model. The biggest benefit of using switches instead of hubs is that each switch port has its own collision domain. Switch plays really an important role in network. Once they are connected with hub or switch, they will be connected with ROUTER. ROUTER ROUTER is a device which connects multiple networks using similar or different protocols. It manages the route between any two communication networks. IP address will remain the same because there is just one router and it will supply access to all four switches. Each Switch which is having 25 computers and 1 printer on three floors and third one is also having server computers on it will connect with switch which will lead to router. Each computer will have different IP but their ISP will be one only as this will be provided by service provider. After three sets of 75 computers and three printers connected with Switch which is connected to router, after this process we connect one more switch with router which has 3 server computers on it. One server would be file server or printer server, and one would be DHCP/Authentication/Certification server and DNS server. This server system would help in file or printer sharing along the network to protect the computers with firewall option and also to provide certification to computers for different task over the network. OSI OSI stands for Open System Interconnection. It is a set of protocols that allows any two different systems to communicate regardless of their underlying architectures. This physical connection of router with switch and computers comes in Physical Layer of OSI model. Physical layer relates the electrical, optical, mechanical and functional interface to the cable as it defines how the cable is attached to the network adaptor card. Connection of computers with Switch includes Data Link Layer of OSI model. It sends data frames from network later to physical layer. Router is supplying single IP address, and each computer has different IP address. This concept involves Network Layer of OSI model which is responsible for putting data segments into packets. Transport layer works after Network Layer which is responsible segmenting data. It ensures that packets are delivered free of errors with no loss. For implementation of Network especially of Internet cafe, some softwares have also been recommended. Cyber cafe management and installation of networking protocols like IPX, SPX and TCP/IP. This thing comes in Session Layer. The main purpose of session layer is to establish a connection through application running on two different computers. Presentation layer and Application layer are after session layer. Presentation layer is used to determine the format of exchanging the data among network. Application layer handles network access, control the flow and recover errors. Addressing Scheme: Addressing scheme plays an important role in network. TCP/IP, IPv4, IPv6 are essentials of Network scheme. They are normally set to default but they can be changed according to the requirements. Each network system must be identified as unique. This is done through MAC address of device. Each machine always has different IP address on the network. TCP/IP is known as transmission control protocol/Internet protocol. It is a technology that is used to manage the transmission of data by breaking it into packets. These packets travel through router. TCP/IP addressing scheme is used in implementation of this network. This network scheme is normally used for sharing of computers over the network and gives them internet access. IPv4 (Internet Protocol version 4) addressing scheme is really important in a network. The most important aspect of IPv4 is its size. It is most widely organized internet layer protocol. It is a connectionless protocol used for packet switching link layer. IPv4 can establish more than 256 connections. Its range starts from 0 255. This connection is really helpful in internet cafe setup. Normally IPv4 is set to default which detects IP automatically, but we can define IPv4 manually as well which can be allocated. Manual configuration can change IP of the system for some purposes as well. Sub-netting plays an important role in networking. It is a subdivision of an IP network or when the network is divided into several small networks. It results in logical division of an IP address. Subnetting an IP can be done for the various reasons which generally include different physical media, address space, security, control network traffic etc. Subnetting makes it easier to manage the smaller network as well. Subnet masks are also used with IP. Computer performs a bitwise logical AND operation between the address and subnet mask in order to find the Network Address or number. The general syntax for Subnetting is 255.255.255.0 There are generally three classes used for Subnet masks Class A: 255.0.0.0 Class B: 255.255.0.0 Class C: 255.255.255.0 Calculations of Network Subnetting: We have to implement a network with single registered IP which is given by our service provider. 195.5.20.0 This is known an IP address. The default subnet mask for this one would be 255.255.255.0 We have to implement 4 networks and they should be provided with different IP addresses. We use the following steps to find out the network and host computers over the network and range as well 195.5.20.0 255.255.255.0 We use 8 bits for binary written form. 255.255.255.0 = 11111111.11111111.11111111.00000000 This is default Subnet of network We have to implement four networks in a network, so we will do with 4 in binary 2 4 2 2 0 1 0 4 Decimal = 100 binary We will take 3 bits as a result of binary conversion from bit scale. The bit scale helps in implementing a network more easily 128 64 32 16 8 4 2 1 We will take 3 bits for new subnet mask and new Subnet mask will be 11111111.11111111.11111111.11100000 This will be equal to 255.255.255.224 Our new IP range will be 195.5.20.0 195.5.20.31 195.5.20.32 195.5.20.63 195.5.20.64 195.5.20.95 195.5.20.96 195.5.20.127 This is our range of new 4 Networks made by Single registered IP. Network Layout Diagram: Analysis and Synthesis: This research is a conceptual base in which most of the prediction has also been used apart from research on different structures and equipments used in this setup. A concept has been taken from http://www.ccautosoft.com/2011/03/connecting-all-hardwares-in-internet-cafe/ which shows the setup for the internet cafe. This is was quite helpful in equipment structure. This project has been designed to improve the performance of internet cafà © setup with compare to new technology as of library or lab network. Conclusion: This has been concluded from this project that it is reliable and secure network. It can easily give access to all the computers equally. There is less risk of virus spreading over the network as secure switches have been used which gives the high profile for Firewall and other activities. This project uses the latest technology routers and switches which enables the network to communicate more effectively. Also this project is cost effective, and it allows less cost to be spent over the network. Computers have been used with moderate specifications which are compatible to run over network properly.