Wednesday, July 31, 2019

The Convenience of Today’s Technology

Who would have ever thought that you will be able to communicate with a person, just by typing a letter push press and send all from one location. Today’s technology is more convient, faster, and cost effective. As one of the projects that I have worked with for years is preparing the church newsletter, programs, notes, and other resources. In the past we had the manual and then the electric typewriters. When typing and a mistake were made, before the correction ribbon on the electric typewriter, you had to continually hit the back button and retype the correct letter. Your choice of print was very limited with the typewriter. There was no way to do spell check. Every paper had to be carefully proof read by a department of peoples. If you were adding a picture to your paper, you had to find pictures out of books and they were limited. Once the picture was found it had to be cut out and paste or taped to the paper. In order for someone else to add an article to the paper they had to type their part, get it proofread and then transport it to the location of the paper being prepared. In today’s world we have the technology that allows us to do all printing while sitting in one location. There are different types of programs to choose from to publish the newsletter, program, and other resources You have many different fonts to choose from depending on the type of message you are sending. There are thousands of clipart from cartoon, silhouettes, to any thing you can name to add as an image to your project. After finding the set up that fits your needs you can start your project, you can begin to type in your message in the designated area. To insert an image, you can go to the clipart or internet to locate the desired image. The computer does the spell check and some grammar checking as well. Usually when a word is misspelled it is underline with a squiggly red or green line. Some proofreading is still required but it may not take a team of people as in the past. In order from some one else to add a message to the paper being prepared all you need to do is send it to them by email as an attachment. As a downfall to this technology, if everyone is in the same office working with the same programs all will work well. However, if I’m working from home on my personal computer and I send it to another person at home, we may be working with different programs. Some people may have older systems while others may be on a up to date system. In conclusion, the convience of today’s technology and printing is much easier and faster in this day and time. As the years go on we will be amazed at how technology will advance in the future.

Tuesday, July 30, 2019

Organisational Behavior Assignment

Groups and Organizational Dynamics Assignment Prof. Nafisa Kattarwala Submitted by – Ryan Pereira PT-MBA Div. B Roll No. 39 What are the types of groups you have worked with in an organization, what are the conflicts that had arisen and how did you resolve them? A group is defined as two or more individuals, interacting and interdependent, who have come together to achieve particular objectives. Groups can be either formal or informal. Formal groups are those groups that are defined by the organization’s structure, with designated work assignments establishing tasks.Informal groups are alliances that are neither formally structured nor organizationally determined. Informal groups are natural formations in the work environment that appear in response to the need for social contact. Formal groups are further classified into command groups, task groups and functional groups whereas informal groups are classified into interest groups and friendship groups. As an employee of JPMorgan, I had the privilege of working with a wide variety of groups ranging from functional (formal) groups to interest and friendship (informal) oriented groups.The formal functional group which I was associated with had been formed in order to achieve the organizational objective. As a part of the corporate actions and income processing team, my groups’ primary function was to ensure corporate action notices were sent out to clients in a timely fashion and ensuring payment of incomes (dividends and coupons) to all entitled JPMorgan clients were completed as per the specified deadlines. We were a group of 5 individuals (4 males and 1 female). The conflict that had initially risen within this formal functional group was the work allocation to males and females.As the team was usually heavily burden with volumes throughout the major part of the week and as the female in the group had to leave early to take care of household activities, she had informed the group that she w ould not accept additional work and will be working for only a fixed number of hours. This did not go well with the rest of the male employees who had to put in extra hours in order to complete the work. The male employees felt that she was taking undue advantage of the fact that she was a female and taking on less work and responsibilities as compared to them.As the team leader was on an extended leave, it was the operations analyst’s responsibility to handle the situation and maintain order in the group. As I was the operations analyst in the group, I ensured that the interests of all the parties in the group were met by requesting the female member of the group to do an early shift (early morning 7 AM to 5 PM) so that she could handle a majority of the workload in the morning and could leave at her scheduled time so that she could also complete her household activities.In this way the interests of the female employee was met as well as that of her male colleagues who had r elatively less workload at the latter part of the day as compared to before the conflict. The second group that I was associated with was informal in nature and was an interest group. JPMorgan has a wide variety of hobby groups that an employee can join, in order to enrich the employees’ interest in certain hobbies like reading, trekking, etc.I had enrolled myself in the reading group as I am an avid reader and knew that JPMorgan has an extensive collection of books and literature and could benefit extensively from my associations with the group. The group used to give out books (novels of all genres – management, science fiction, adventure, autobiographies, crime, detective, etc. ) to employees for a period of two weeks after which the employee would be requested to return the book to the group so that the group could lend the books to others.The group used to also hold book reviews and discussions on many occasions. The conflict that arose in this group was that a fe w group members felt that only they were actively participating in the reading group and the others were just there for name sake and were like sleeping partners. The members felt that there were individuals in the group who were not even responsible for the books lent by them to employees nor did they keep accurate tabs on those who had taken the books and had not yet returned the books as per the scheduled deadlines.As a result of this irresponsibility, the group had lost/ misplaced several titles from its collection and the books could not be replaced as the group was formed as a recreational group without any funding from senior management for purchasing books. The books that were in possession with the group were donated by employees and colleagues over the years and the collection had amassed to an impressive one.The group decided that as there were indeed individuals who were contributing relatively less as compared to the other individuals in the group, the group should list down all the activities that it entails and should allocate jobs/ tasks to each individual in the group. There should be primary, secondary and tertiary roles assigned to individuals so that no task/ group activity is left unchecked if one or two employees of the group were absent on a particular day.This way each individual in the group is given the responsibility of a certain group activity or task and no individual is sitting idle in the group without any work or with making any contribution in the group. Furthermore, it was decided that the tasks/ group activities would be rotated amongst the group members so that no one individual gets bored/ uninterested with the same activity and so that all the members in the group gets a hands on approach to all the activities of the group. The rotation was done on a month to month basis and quarter basis depending on the activity.The third group that I was associated with was an informal friendship group. In JPMorgan, I had the privilege of meeting some amazing and extremely talented people. I was fortunate enough to form a lasting bond of friendship with such individuals. These individuals were from different backgrounds and had different thought processes and hence I was able to learn a lot from them. We were a total of seven friends at JPMorgan – four males and 3 females. All of us were from different departments and used to sit on different floors of the same building, but we used to meet up to have lunch together as a group.We used to co-ordinate amongst ourselves and used to meet in the office cafeteria. In a span of one year we had become really good friends and had some truly memorable times with each other. One day when the entire group was seated for lunch at the office cafeteria, a conflict of sorts broke out amongst the group when one of the guys in the group made a general statement and one of the girls in the group took the statement personally and felt that the statement was directed at her as an insult.The guy in the group did not intentionally want to insult the girl but the girl took the statement in that manner. Due to this miscommunication, there was a cold war between the girl and the guy and those that were around them. The rest of the friends in the group did not understand why the two were behaving in such a negative manner towards each other. All those who were part of the group started acting differently around each other as they too were friends with the guy and the girl in some way or the other and they could not take sides.Due to this there were a lot of petty issues which were brought up and made into big issues as the group started fighting amongst themselves. In the end, we all split up and are no longer in touch with each other. We decided to stay apart as the incident created a riff in the friendship which could not be bridged. These are some of the groups that I was associated with along with the conflicts that had been faced and how they were resolved .

Among the hidden–Reader’s report

Bolometer The book I read is Among the hidden Which is wrote by Margaret Peterson Haddam. This book was published by Simon & Schuster Children's Publishing in 1998. It is a science-fiction book Which has about 150 pages. My first impression of this book is that it is a sad story because the cover page is made up by cool tone. The story happens in the future which starts with Lake's birthday in Lake's home.With a new housing development replacing the woods next to his family farm, he is no longer allowed to go outside. There is a law about each family can only have tow children. Luke has lived his entire life in hiding because he is a shadow child, a third child forbidden by the population police. Luke admires his brothers so much because they can go to school and play with friends out side. This setting makes me feeling mysterious and depressive. Until one day, he find out there is an other shadow child in his neighbor's family.She is Jean, the creator of a chat room for shadow child ren chatting with each other. They become friends soon after they meet. Jean organizes a rally Which hundreds of shadow children are going to protest the government's population law, but Luck does not participate in the rally that day because of fear. After the rally day, Luck can not contact with Jean for a week. He is so anxious that he breaks in Jean's house. He meets Jean's dad in the house who tells him a appealing news Jean and other shadow children were killed by population police.Then, Jean's dad helps Luck escaping from population police' chase. Finally, they achieve to make a fake I. D for Luck. On this story, the main conflict is person versus society. All the shadow children are illegal, but they never stop the struggle for freedom. The two main character for the story are Luck and Jean. Luck is a small-bone and soft looking boy. Firstly, I think he is an obedient boy. He never disobey his parents' order about hiding. He does not ask much about why he have to hid even he is very unwilling to do that.Secondly, he is a person of perseverance. He observe his neighbors every day. So he can know each of his neighbors. And that's why he can find out Jean when he saw the light in her home after all her relatives are going out. Jean is the most impressive person I have read in this story. She is slim and has a short hair. She is so courageous that she organizes the rally at the risk of her life. And she is really decent that she wants all the shadow children have the same right with the normal people. She is dead because of trying to protest the totalitarian government.In my opinion, the reason author write this book is to tell the children how blessedness they are now. Comparing with these shadow children who are not accepted by the society, we are really lucky. This book make me occurring to China. China is a country have that population law, but not as serious as the book describes. The family who have more children in China have to pay a fine. That tel ls us each thing has its limit. If the overspent is so strict at population law, it will be a tragedy for someone.If the government do this reasonable, it will be a good thing to everyone. The major strength for reader to read this book is that the poll is very suspenseful Which you will never know what are going to happen. The weakness is that it is a sad story. Jean is dead at the end, it does not make reader feeling happy. I will recommend this book to my friends because it can tell them to treasure their life. I think if a person feels lonely and reactive by society, he can resonate with the children in the book and he will like this book.

Monday, July 29, 2019

Can it be legalize of the sale of human organs Essay

Can it be legalize of the sale of human organs - Essay Example Thus, it is unnecessary for the sale of human organs to be legalized because it will lead to the loss of many lives. Organ donors, as well as families to the deceased donor, believe that they are obliged to benefit from the organs. However, the governments, brokers as well as hospitals are the ones that benefit from the organ donated by a deceased or a living donor. Thus, legalization of the selling of human organs will only benefit the rich few in the society. Additionally, it is evident that some people are involved in the illegal sale of human organs (This House Would Legalize, 2011). For instance, the Chinese hospitals involve themselves in the sale of the organs of the executed prisoners. From this assertion, it is evident that politics will influence the sale of the organs and, as a result, many people will be convicted and executed in order to meet the demands of the few in the society. Additionally, it is evident that many debtors will be abused by their lenders. It is possib le for the organ lenders to be taking part in the selling of the organs belonging to their debtors in order to quench their demands. Thus, it is crucial to the sale of human organs not to be

Sunday, July 28, 2019

Poverty Essay Example | Topics and Well Written Essays - 500 words - 5

Poverty - Essay Example The same case applies to her citizens (Geoffrey, 2004). When America as a country is able to see the real faces of poverty; she will be able to see the need for stepping in and helping the poor countries. The very first motivation will be for humanitarian reasons. Thus, just like individuals who give their money for charity, America will see the need that it has a moral duty to assist people who are in other countries and are suffering from the devastating effects of drought, famine, disease as well as war. America also being the world’s superpower ought to donate money for not only her political ambitions but also diplomatic ones. America definitely wants to sustain a dependency relationship with the recipient countries or rather to basically influence the direction as well as the government of a given country. The other main reason why seeing the real faces of poverty is important to America as a country and to Americans as individuals is for economic reasons .America may be interested in controlling the supply of such commodities like water, wheat as well as oil. America may also alternatively want to guarantee markets for their own home made products, such as shoes, heavy machinery, computers as well as planes. This is a critical reason why America should be at the forefront of supporting poor countries and not just turning a blind eye to them. American businesses as well as entrepreneurs need poor countries as much as they need them. America may also be interested in seeing the real faces of poverty so that through her influence of global affairs, she can facilitate opening up of trade barriers so as to assist poor countries sell their products more easily, conveniently as well as profitably. On this same vein, America can see to it that punitive subsidies are removed so as to facilitate importation of products from poor nations; thus ensuring fair play and healthy competition. America as a global superpower

Saturday, July 27, 2019

Final Global Media writing task Final Exam 500 words Essay

Final Global Media writing task Final Exam 500 words - Essay Example I learnt that digital media for instance the internet, has played a major role in simplification of worldwide transmission of information. Internet is easily accessible in most parts of the world and therefore provides a platform for easy transmission of information in numerous parts of the world instantaneously. In the course Global Media Trends, I had the chance of acquainting myself with various issues pertaining global media presently. For instance, I realized that despite solving the problem of information transmission, global media continues to face challenges. The project on, â€Å"The growth in the concentration of media ownership around the world: A Case Study of Rupert Murdoch’s News Corp†, presented me with a chance to realize one of the current problems facing global media. The problem of media monopoly in the ownership of media leads to unethical practices. Media in a very critical part of the society and any unethical practices would lead to sabotage of societal rights. Through this course, I learned various ways in which developments in global media have simplified ways of sharing information throughout the world. The group assignment about online activism in particular widened my knowledge on how improvements in technology have made a great contribution in global media. Through online activism, it is possible to pass various messages to many people throughout the world. For instance, one is able to create awareness regarding an issue like pollution by publishing information online. The YouTube assignment made me realize how advancements in global media have contributed improvement of the education sector. Through YouTube, students can share education videos with their colleagues. Others get the chance of accessing scholarly videos at no cost. This course made me realize that, advancements in the global media, apart from

Friday, July 26, 2019

Pottery Statues of Ancient Chinese Art Essay Example | Topics and Well Written Essays - 750 words

Pottery Statues of Ancient Chinese Art - Essay Example There are various arts like painted potteries, folk arts, script, monuments, metal arts etc. Very expensive materials are used for the art works like granite, marble, lime stone, etc and even gold, silver and other precious materials are used. In early times they were not much aware about the materials used for arts and they used stone and rock for doing arts. These antique collections of ancient period are now placed in the museums. â€Å"The museum houses collections of various color-painted potteries of Neolithic Age and treasures of ancient grottoes. The design of these potteries is gorgeous and has the characteristic of the local culture.† (Gansu Provincial Museum). In museums there are varieties of wonderful art works which were done in the past. The Chinese culture hasn’t altered much from before and the people are still continuing with their traditional customs. The temples in China are considered as precious art wealth which signifies the prosperous culture of China. Chinese people have some beliefs with regard to their traditional arts. There are varieties of statues which symbolize different significances and faiths. Laughing Buddha is one among them which symbolizes health, prosperity, happiness, and so on and they believe that it brings all these goodness if it is placed somewhere and there are also other different kinds of laughing Buddha and each one has got some particular concept. The arts like Swastika, fengshui are some of the other Chinese artifacts which are used for good luck and to improve the life. Chinese people believe in such things; so most of them use these types of artifacts. The people from other countries prefer to use the Chinese arts mainly because of their quality and beauty. The ancient Chinese art is very gorgeous and superior which is totally different from other art works; so it has high demand. Not only the Chinese people buy this; people from every nation are now buying

Thursday, July 25, 2019

Virtualization Essay Example | Topics and Well Written Essays - 1500 words

Virtualization - Essay Example In fact, recent studies have found that organizations achieved on average an 18% reduction in their budget from cloud computing and a 16% reduction in data costs. Hence, virtualization should be embraced by organizations because it is cost-effective, flexible, and provides safe process of security protocols. As society progressed to 21st century, the criteria of defining and creating a feasible IT infrastructure continue to be a huge focal point for many companies. As mentioned above, many servers tend to create a huge problem with the traditional IT infrastructure. The problem with this idea is the fact that 90% of the time servers are not fully utilized. In order to combat this huge problem, the IT department attempts to install more applications. However, that is only a â€Å"band-aid† approach to a long-term problem. The result often times is the fact that that this solution is ineffective and unreliable. As the accumulation of factors such as: high energy costs, space iss ues, and generating heat become a huge issue, companies must seek a new and better solution that is available. Hence, virtualization is a cost-effective solution because it is a revolutionary concept that allows corporations to dynamically alter the current thinking of their IT infrastructure. ... Another amazing benefit of virtualization is the fact that it allows the organization’s system to be fully robust. Virtualization in essences allows the company to have a system that is flexible, independent, reliable, mobile and secured. Moreover, it can automate the IT process, manage a heterogeneous client environment, enhance application performance, and increase server utilization. Clearly, the biggest need for any organization is to foster an environment is data preservation and availability of service. For instance, a unique type of virtualization that is known as desktop virtualization is a prime example of the benefits that are illustrated in virtualization. Desktop virtualization allows organization to isolate machines in the network in an efficient manner. Moreover, it allows users to have a centralized data management system in which security and compliance is extremely enhanced. The unique element of virtualization is the fact that it can allocate resources effect ively in a client/server model. Unlike conventional model of networking in which power is allocated to one client, virtualization enables users to grant resource and power based on demand, not based on priority. This undoubtedly leads to enhanced business continuity and remote access. Another unique element that is depicted in desktop virtualization is the fact that desktop virtualization enables users to do are flawless switching of application. Lastly, it eliminates the problem of reinstallation. For instance, if the network has to configure upgrades, clients do not have to log off in order to achieve the upgrade. Since the upgrade is so dynamic, virtualization allows companies to be efficient and productive. The third element of virtualization that is highly

Wednesday, July 24, 2019

Recruitment and Retention. What are the keys Dissertation

Recruitment and Retention. What are the keys - Dissertation Example Evidence from studies and research allude to several reasons why teachers get into, stay within or leave the teaching profession. Of course, the issue is one to be discussed and redressed. One thing worthy of note is that teaching is the leading recruiter in the UK. It is estimated that recruitment of graduates should not fall within a 12 per cent range every year if a steady increase of teachers is to be maintained. Smithers and Robinson1 believed that not just the target of employing teachers that matter, but how these targets are accomplished. They state that: â€Å"Teaching’s lack of success in tapping the widest pool of potential applicants may mean the profile of those accepted on training courses for the secondary age range does not adequately reflect the needs of schools in terms of gender, age, ethnic background and location.† Sometimes, teachers are recruited from migrant or immigrant workforce. This has sometimes been criticised on the basis that it has a neg ative impact on pupil’s academic accomplishments. For example, OFSTED stated that â€Å"Teachers recruited from overseas are often less effective because they lack familiarity with the National Curriculum†2. Hard-to-fill vacancies always require specialists for such positions. For example, it was reported that: â€Å"the quality of mathematics teaching at Key Stages 3 and 4 suffers in many schools because the limited amount of specialist teachers' expertise is deployed largely on post-16 courses. As a result, non-specialist teachers undertake a significant minority of the teaching at Key Stage 3, where they find it difficult to respond effectively to the demands of the Key Stage 3 Strategy high staff turnover and staff shortages are also having a negative impact on Key Stage 3 Strategy development work in science in a minority of secondary science departments. â€Å"3 Employers are seeking for better ways to recruit and retain labour. In most cases, they go in search of general characteristics, skills and qualifications. On the other hand, factors that will determine the retention of labour include the nature of work, characteristics of the employer, job satisfaction, recognition by employer, remunerations as well as similar employment benefits, balance between work and life, the prospect of further training, affiliation with employer and correlation with fellow workers. A former British premier stated that: â€Å"The best defence against social exclusion is having a job, and the best way to get a job is to have a good education, with the right training and experience†4. This is the more reason why problems plaguing the general labour market situation in the United Kingdom will be addressed. It is also imperative to take notice of the fact the recommendations are indispensable, if situation relating to the current recruitment and retention needs some utmost attention. CONTENTS PAGE EXECUTIVE SUMMARY†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚ ¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...01 CONTENTS PAGE†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...03 INTRODUCTION†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..†¦...04 PROBLEM BACKGROUND†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...06 METHODOLOGY†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦

SEMESTER 1501 COURSEWORK ASSIGNMENT Essay Example | Topics and Well Written Essays - 500 words

SEMESTER 1501 COURSEWORK ASSIGNMENT - Essay Example The Labour party took power and halted the sales of the houses. This decision made Mr. Gibson sue the respondents claiming a breach of a binding contract. The county court and the court of appeal ruled in his favour but this was appealed to the House of Lords where the earlier decision was quashed. The dispute was a result of distinguishing between an offer and an invitation to treat. Notably, it should be comprehended that an offer is an expression of the desire to contract on various conditions upon acceptance while mere negotiations to enter into a given contract are not offers but invitations to treat. However, Geoffrey Lane LJ who was a court of appeal judge dissented and held there was no enforceable contract. The House of Lords unanimously allowed the appeal and made a final decision that there was no binding contract between the two parties. The principle behind the decision of the court of appeal was affirmed by Lord Denning. The honorable judge emphasized that the communication between the parties should be also established by their conduct. Their conduct had supposed a binding contract between them and this led to the parties coming into an agreement. The House of Lords had a unanimous approach in this case. The court affirmed that there was never an offer by the council available to be accepted or rejected. Therefore, if there was no offer in the first place then, a binding contract was not realized between the two parties. The council cannot be accused of breaching. Lord Diplock embraced the conventional approach which affirmed that there was never an offer which constituted to a legally enforceable contract. The conventional approach requires that the documents to be relied upon to be analyzed thoroughly and ascertained whether in their construction there can be found a contractual offer to sell the house and an acceptance of such an

Tuesday, July 23, 2019

The Abyssinian crisis led to the failure of the League of Nations Essay

The Abyssinian crisis led to the failure of the League of Nations - Essay Example This organization is commonly known as the League of Nations, which is the predecessor of the United Nations. The League of Nations was categorical that members must maintain peace among themselves and with other countries in the world. However, in 1935, one League member, Italy, attacked another member, Abyssinia. There were clear signs that Italy would attack Abyssinia but nothing was done by the League of Nations to prevent the attack. It seemed like the League was biased towards countries which led to that attack and several others that eventually led to the fall of the League of Nations. The Failure of the League of Nations to solve the Italy and Abyssinian crisis discredited the League significantly and is probably one of the reasons the League of Nations failed in the subsequent years. The League of Nations When the World War One finally came to an end in November 1918, many people in the world did not want to experience or have their future generations experience the horrors of war ever again. Leaders from Europe, United States and other world countries met in France in 1919 to come up with an organization that would safeguard the world from wars. The main working principles of the League of Nations were disarmament of the countries and provide security to the League members like an alliance. Under these terms and conditions, no League member would attack another League member. In the case of disputes among the members of the League, democratic process would be used to solve the dispute amicably under the oversight of the other members of the League of Nations. Events Leading to Italy-Abyssinia Crisis of1935 Italy was one of the most powerful countries immediately after the World War One. Benito Mussolini, the Italian Prime Minister of the time envisioned a large Italian empire that would be ruled by him. In this case, he was looking for regions to expand the Italian invasion to. The large empire would provide the much required material for the Italian industries and Military as well as provide regions for expanding population to settle in. A large empire would also play an important role in instilling national pride and prestige. In fact, Winston Churchill had lamented that countries that were dependent on many war commodities like Italy would consider getting unhampered imports (Florian 7). Italy also felt left behind by its European peers in the scramble for Africa in especially the Easy African region. The country has possessions in East Africa were not resourceful as its peers and wanted to expand. It is also claimed that the Battle of Adowa, in which Italian troops were defeated by Abyssinian troops was of great shame and Mussolini wanted to revenge the attack. In fact, it is thought that he was looking for reasons to regain glory by defeating Abyssinia (Mendum and Waugh 19). A German official was quoted saying that Mussolini was not moving his troops in Africa back to Italy without glory. There were Italian troops in Somali a and Libya at the time (Kelly and Lacey 78). An opportunity for Benito Mussolini to do exactly what he was waiting for arose in December 1934 during the Wal Wal dispute. It is claimed that on 22nd November 1934, Ethiopian troops arrived at the Wal Wal fort and demanded that the Somali-Italian troops there to withdraw from the fort as it was in Ethiopia. The head of the fort refused but the Ethiopian troops persisted for the following days. Tensions were high and between 5th and 7th December 1934, there were collisions between Ethiopians and Italians and Somalis. None of the two parties involved in the incident claimed responsibility. The Italian government demanded that the

Monday, July 22, 2019

The US Department of Housing and Urban Development Essay Example for Free

The US Department of Housing and Urban Development Essay The US Department of Housing and Urban Development maintains a website with a section dedicated to the Public Housing Environmental Conservation Clearinghouse. The website defines water conservation as a term that â€Å"refers to reducing use of fresh water, through technological or social methods. † In order to encourage water conservation, the site provides a spreadsheet that allows people to benchmark their water consumption. Based on the spreadsheet, a score of 0 means that water consumption is probably excessive, whereas a score of 100 probably means water is being effectively consumed. The spreadsheet was designed as a method for Public Housing Authorities to determine each project’s water consumption in order to encourage more efficient water consumption and reduce water related utility costs. The site also provides an area for related links to other sites that provide water conservation tips. Unfortunately, the only working link leads to the Natural Resources Conservation Service (sponsored by the US Department of Agriculture). This site describes ways in which people can conserve water use in their backyards. The other links appear to be outdated. There is also an area on the website entitled residents corner, which aims to provide research materials in order for residents and the general public to utilize and become more involved with environmental conservation. Unfortunately, only one of these links seems to work. The link leads the browser to a site sponsored by the US Environmental Protection Agency, which provides water conservation tips for residents. Finally, the website provides links that allow the browser to research and review more details about what Department of Housing and Urban Development and other federal government agencies are doing to further energy awareness. Although the site provides a useful spreadsheet that enables Public Housing Authorities to determine the effectiveness of water consumption in projects, the site does little to encourage browsers to conserve water. Most of the links are outdated, and there is barely any discussion as to the benefits of water conservation.

Sunday, July 21, 2019

Signs of Elder Financial Abuse

Signs of Elder Financial Abuse CHAPTER 1: METHODS AND TACTICS OF AN ELDER FINANCIAL ABUSER Our families, communities and state legal system have worked in recent years to protect our loved ones from elder financial abuse. That said, families with elder adults still share a deep fear about the physical, mental and financial safety of their loved ones. Elder abusers, however reprehensible, often find ways to circumvent the protections that our families and society provide our senior citizens. Wrongdoers have their methods and tactics, and its our responsibility to counter them at every turn. If they think theyve gotten away with hijacking estate or trust assets, trust litigation attorneys should make them pay under the full weight of civil law. In my practice, which likely mirrors our country at large, the following are the five most common ways elder financial abuse happens: 1. Caregiver Abuse When a Michigan trial judge dismissed a familys lawsuit against a home care company for sending a caregiver with two felony criminal warrants to care for a man in his 80s, the national press erupted with questions about how this could happen. In this particular case, a caregiver company Kentucky-based ResCare sent a woman to a retired Detroit-area businessman to look after his ailing wife, who had dementia. It didnt take long until the wifes jewelry began to disappear, as well as the businessmans fortune. Court filings estimate the losses to be as high as $1.5 million. The caregiver, if she could be called that, moved the businessman out of his bedroom into the basement of his lakefront home and moved her mother into the home. The businessmans wife died, and within months the caretaker married the businessman. When the businessmans family members finally intervened and removed him from his home, his finances were in a shambles. He didnt have bank accounts with positive balances or working credit cards. He had his social security monthly payment thats it. The Michigan businessman and his family are simply representative of the widespread abuse affecting our growing elderly population. I have handled a number of cases where predators, posing as legitimate caregivers, soon take advantage of the elderly. This misconduct includes physical and medical neglect often coupled that with embezzlement and theft. The Michigan case didnt work out well not that any of these abuse cases by nature work out well. Even with a partial financial recovery, the seismic emotional repercussions stemming from misplaced trust dont easily recede. 2. Financial Exploitation Financial exploitation takes many forms. Every day, even though I have been counseling families for decades, I am regularly surprised. The sale of an elders medications; grocery bills more attributable to cash withdrawals taken by caregivers than bread and milk purchased for the elderly; lawn service for a small yard at $300.00 per week; money used for gambling; medical care and dental care neglected because of the theft of funds; and assignments of bank accounts into joint tenancy with a wrongdoer. Most families with victimized elders could readily add to the list of the ways elders are financially exploited. Vigilance helps. Here are some examples of vigilance: Be very careful and take precaution when hiring caregivers. Simply hiring a caregiver company is not an insurance policy against wrongdoing. Watch your elders bank accounts particularly withdrawal activity or changes in accounts. Sometimes the horse is out the barn door before you discover bank transfers but it is still better late than never (or a year later). Be careful and inquiring when you hear that your elder has been making frequent trips to the bank. Be vigilant in watching your elders mail. We have seen circumstances where financial information is hidden from the view of the elder and his or her relatives. This is a sign of great danger. Some financial advisors believe that an elders credit report should be ordered periodically. This could also be a good canary in the coal mine. We have seen cases where social security checks were cashed by wrongdoers. Direct deposit of social security checks, retirement and dividend checks provide some distance between a wrongdoer and your elders money. Review receipts from vendors (grocery store, pharmacy, Costco etc.) for goods purchased for your elderly relative. We have seen wrongdoing first discovered in this review. A $350.00 receipt from the local grocery store showing a $200.00 cash withdrawal can make even the most oblivious suspicious. Watch for service scams. New heaters, air conditioners, garbage disposals or lawn irrigation systems sold at a large premium are not unusual. Reverse mortgages can be a blessing or a curse. Reverse mortgages may provide a large lump sum payment or a stable predictable monthly income to senior adults, but money coming from reverse mortgages may also be a large tempting cookie jar for unscrupulous caretakers or relatives. More than once have I seen reverse mortgages paid to vulnerable senior adults with questionable capacity. The existence of a reverse mortgage is often not discovered by the senior homeowners family until the senior has passed away. 3. Misuse of Powers of Attorney Durable powers of attorney can be a great legal vehicle for senior adults to appoint a trusted agent to handle health, legal and financial matters. Such powers, when used with prudence by trusted family members or agents, provide legal protection when and if the senior becomes incapacitated or incompetent. Such powers when used correctly are an unfettered blessing. If misused, such powers can destroy a lifetime of planning. The effective and prudent use of durable or medical powers of attorney brings no headlines. In the same way, misuse of such legal vehicles is often kept secret and only met with incredulity by relatives when discovered. We have seen a number of incidents where powers of attorney were misused at the end of life of an elderly adult to benefit the holder of the power of the attorney. Examples of misuse include: The transfer of real property to the holder negating trust provisions that provide for a different distribution; entry and seizure of safe deposit personal property coupled with later denials of the existence of such properties; dramatic changes in bank accounts that are inconsistent with will or trust provisions; and transfer of vehicles. Some holders of medical powers of attorney have misused their powers to prevent family members from visiting the hospital bed of a gravely ill or dying relative. California has recently addressed this issue in legislation making such abuse much more difficult. In the meantime stories abound about how a son or daughter, grandson or granddaughter, could not visit a dying relative because a stepmother or stepfather prevented the visit. If these problems were not so common there would be little need to address it. For those who face the issue, they should immediately contact a lawyer familiar with elder abuse laws. Medical facilities should also be aware of their own limitations is preventing visits. 4. Isolation and Freeze-Outs Isolation of elders from their families, neighbors and loved ones is an all too common occurrence. Changed door locks, new locked front gates, mobile telephone seizures, failure to answer or open the door to visitors, and unreported removals of elders from their homes are part and parcel of isolation. These actions cause family members to fear for the safety of their loved ones and also may create a sense of helplessness. Unfortunately, such conduct is common. For Californians who encounter isolation or freeze-out abuse, the first step is to call Adult Protective Services or its equivalent. Local law enforcement agencies also often have task forces that deal with such abuse. Civil lawyers skilled and experienced in elder abuse issues can assist in such contacts and can also address such issues in civil filings that include restraining orders and other appropriate measures. Words of warning while isolation and freeze-out conduct might be obvious to the family member of the elder, such conduct may not be as obvious to authorities. Criminals and wrongdoers do not usually jump at the chance to admit guilt. While there is no excuse for elder abuse, wrongdoers will readily provide excuses. Common excuses include I had to keep everyone away because they just upset the elder; We had to move Grandpa to Arizona because they had the best medical care there; I had to keep Aunt Bessie from the phone because she only got upset when she heard from her relatives; Of course I had to keep my dad away from my sisters and brother because they are greedy and they only wanted to get his money; and I needed to protect my uncle because he was afraid that his children were going to hit him, push him down or lock him up in a mental asylum. Dont expect the isolator to readily admit that she bought her boyfriend a new Harley with grandmas money, that the house and surrounding are a pigsty because she is doing meth, or that all of grandmas jewelry was sold to support her drug habit. Youve got to dig at it when your loved one is isolated when you are frozen out. The process can be demanding, frustrating, and can cause anxiety. Still dont turn your back on your elder do something protect the vulnerable. 5. Unwarranted Transfers First, an obvious acknowledgment: families often have difficulty in transferring an elderly family member to an assisted living or nursing facility in situations where it is absolutely in the seniors best interests to have such a transfer. Id venture to say that most transfers are absolutely warranted and done with love and care for the senior. It is the unwarranted transfers, coupled with wrongdoing, that can petrify family members. The common setting for unwarranted transfers is the presence of a family member maybe a stepbrother or stepsister who is estranged from the seniors other children and family members. For whatever reason, and by whatever treacherous means, the wrongdoer is able to get the elder into his or her home and get the elders estate plan altered. Once the estate plan is effectively altered, it can be Katy bar the door for change. More than once we have seen circumstances that the senior is transferred against his or her wishes to a facility geographically removed from other family members. In the meantime, personal goods and family mementos are often discarded or hidden. These actions often cause even greater anger than money transfers. You simply cant replace photographs, family heirlooms, military awards, or personal collections with money. The discarding of important family treasures is an affront to the remaining family members a complete disregard of important family history and a glaring mark of the greed of the wrongdoer. Difficulties abound when trying to address unwarranted transfers. First off, the senior often lacks capacity. So what do we look at when the senior lacks capacity? One way to deal with an incompetent senior is to seek a conservatorship of his or her person and estate. This is not without complications. Does the senior really wish to be supervised by a stranger or even a benign family member? Conservatorships can be expensive and time consuming. Prospective conservatees are afforded counsel public defenders or otherwise. The costs of such counsel is paid from the conservatees estate. Courts are often reluctant to appoint conservators even for those with great impairment it is the taking away of ones freedom, even if such freedom increases vulnerability to scams and unscrupulous people. Detecting the Tactics of Elder Financial Abuse The sooner elder financial abuse is detected, the better the chance for recovery of estate and trust assets on behalf of the victims. So what are the typical signs or red flags to look out for? According to the guidelines of National Adult Protective Services Association, the following factors should be watched closely to avoid a potential personal tragedy and financial disaster: 1. Liabilities Unpaid Bills: What if an elderly loved one should have the means to pay the bills every month, but somehow their utilities get shut off? There might be more in play than just a seniors faulty memory a bad actor may have made off with money from the elders accounts, leaving the victim high and dry. 2. Surrender of Oversight: Very often we see cases of a new friend, neighbor or opportunistic relative appearing on the scene to offer their help in managing the elders financial account. At times they even succeed in gaining power of attorney. This effective forfeiture of oversight should be looked into closely for other indicators of suspicious activity. 3. Suspicious Withdrawals: As any good investigator will tell you, follow the money. When financial accounts begin registering unexplained withdrawals or checks set to cash, its time for you to speak with bank employees and get further details on whos making these transactions. 4. Vanishing Assets: Another tell-tale sign of elder financial abuse is when valuables begin to disappear. Suddenly an elders jewelry, cash or financial documents like stock certificates vanish, and the perpetrator takes to living lavishly with new purchases of fancy attire, vehicles, property, etc. 5. Changed Estate Documents: Wrongdoers who commit elder financial abuse will often seek to legitimize their predatory behavior with the stamp of legitimacy. Exercising undue influence on the elderly victim, theyll shop around for any lawyer who will agree to change a will or trust document in their favor. Ask your elderly loved one about any such changes if you are faced with such a situation, it may be time to consult an experienced trust litigation attorney. 6. Creditors Come Knocking: Is the elder encountering financial trouble where there should be none? Find out the explanation for property liens or foreclosure warnings. The reason behind creditor claims may be more than just a mistake your elderly family member might have been financially exploited by an abuser who cleaned out their accounts. Identifying Financial Exploitation and Scams As the population of senior citizens in California continues to grow, so too will the challenge posed by fraudsters who want to prey on our elderly and steal their money. To help seniors and their loved ones identify and avoid scams, Ive compiled a list of the most common ploys, tricks, and tactics financial criminals use against the elderly. So watch out for the following forms of fraud: 1. Grandparents Scam A senior will receive a phone call beginning with, Grandma? The caller will cleverly elicit the grandchilds name. Posing as the grandchild, the scammer will then say theyve gotten into some form of deep trouble they might tell the senior theyre in jail or stranded in a foreign country. Its an emergency, and they need help immediately! With the grandparent now upset and ready to assist their supposed grandchild by any means possible, the scammer will ask them to wire money to their bank account, often by Western Union. To avoid falling for the grandparent scam, dont let a caller drag you into the guessing game, whereby you willingly provide them with the names of your grandchildren and other relatives. If a scammer is more sophisticated, they might research their victim on social media sometimes theyll run the scam on platforms like Facebook. Call your family members and check on the whereabouts of your grandchildren, no matter how convincing a story you may hear over the phone or through social media. 2. Secret Shopper To your surprise, you receive a check in the mail for several thousand dollars to Wal-Mart or another big-box store. Youve been chosen for the secret shopper program! In reality, youre being conned into depositing a bad check. Once youve deposited, the scammers will ask you to mail them a check with the difference and thats in addition to your being responsible for the fraudulent check youve cashed. Secret Shopper is a nasty scam that leaves its bewildered victims thousands of dollars poorer. Keep elderly loved ones away from fraud schemes like Secret Shopper by using the too-good-to-be-true rule: if its too good to be true, its not true someones after your money. That means Secret Shopper offers are as good as garbage. 3. Email Scams Email scams have been around a long time and arent going away its cost-effective for swindlers to send out millions of spam emails, even if they only get one or two responses from potential victims. If you have an email account, youre going to receive these from time to time, even with the best spam filters. The most notorious email scams are Nigerian prince letters, which inform recipients that they have been selected to share in an enormous royal fortune in Nigeria or some other West African nation. All the recipients have to do to gain their riches is wire money to the esteemed prince to pay the transaction fee. Naturally, there is no pot of gold at the end of the Nigerian rainbow, with the net result of your bank account being emptied. Another common type of email scam is known as phishing, the imitation of real websites to elicit personal and financial information. You might very well receive a bank alert that seems to be from your bank; the message will inform you that your bank account is overdrawn, you are the victim of identity theft, etc. Even the layout of the email and fake website will look convincingly real. Yet the actual purpose of the phishing scam is to get you to enter your bank account ID, password, Social Security Number, etc., into the phony website, all in order to defraud you. In addition to Nigerian prince emails and phishing schemes, you may also receive emails marked urgent, etc. Often theyll seemingly be sent from friends and relatives. Theyll have attachments in the form of letters or videos youre told to open. In reality, theyre fake letters with harmful attachments viruses or malware that are designed to infect your computer and steal your personal information. Online criminals can even mask their spam messages to make it appear they come from friends, family, and colleagues in their attempt to trick you into opening the attachment in order to unleash their virus. To steer clear of email scams, the best policy is simply to delete unfamiliar emails and not engage too-good-to-be true offers to share in African riches. If you get a bank alert email that youre unsure of, check your account online (dont click on any link in the message) or simply call your bank to check your account. Also remember to never open attachments in unknown messages, and be very weary of vague requests from seemingly familiar senders who might very well be identity thieves and con artists. 4. Investment Fraud Investment fraud is an all-too-common form of elder financial abuse, and scammers find numerous ways to perpetrate the crime against seniors. The first variety are classic Ponzi schemes, where elderly clients are recruited into dubious investment ventures promising big returns, but which in reality generate no profit investment proceeds are simply skimmed from client funds. Ponzi schemers will pose as legitimate entrepreneurs or investment advisors, sometimes offering free meals to attend their wealth seminars. By the time a Ponzi scheme collapses (as it inevitably will if authorities dont intervene), victims are often left penniless and effectively unable to recover any of the funds they had invested in the scheme the perpetrator likely spent all the money and distributed it out as false profits. Its unfortunate but true that there are also a few bad-faith brokers out there who are willing to defraud their elderly clients. Investment advisors and brokers who violate their clients trust can sometimes go years stealing before they finally get caught. To keep a financial predator from looting your accounts or those of your loved ones, make sure to review their background through FINRAs BrokerCheck it never hurts to get a second opinion on a firm or particular advisor. Along with Ponzi schemes and outright abuses by bad-faith brokers, also watch out for multi-level marketing schemes (MLMs). MLMs, otherwise known as pyramid schemes and network marketing, are technically legal business models that require the new member to recruit others into the venture in order to sell whatever product might be on offer. Senior citizens, at times lonely and in need of companionship, can be vulnerable to these schemes, some of which will send them box-loads of products and charge them whether they agreed or not. So while MLMs are technically legal, they are often highly exploitative of senior citizens through their deceptive terms and conditions. To steer clear of investment fraud, apply the too good to be true rule to investment offerings that boast sky-high returns and near-zero risk chances are its a Ponzi scheme. Conduct due diligence and consult a reputable advisor who can help you or your elderly loved ones make sound investment decisions. And stay away from MLM pyramids, the only point of which is to enrich their very top layer while exploiting everyone else below them with largely empty promises of wealth. 5. Telemarketing Fraud Often connected with investment scams are predatory telemarketing schemes, another way fraudsters look to entrap seniors. Many elderly Americans receive several phone calls a week from slick salesmen pitching everything from penny stocks to flimsy-sounding premium retirement programs for their portfolios. Quick-talking telemarketers will pressure lonely, confused seniors into once-in-a-lifetime investments in dubious or non-existent oil and gas holdings, foreign currency exchange, real estate, and even blockbuster movie productions. Another ploy is to hit up the victim for contributions to a supposed charity. Finally, dont be fooled by con men (and women) who pretend to be calling from your bank, hospital, insurance provider, etc. Theyre looking to elicit your personal information to commit identity theft against you. Its sad but true that financial abuse is made easy over the telephone. To prevent telemarketing fraud, make it an express policy to never sign onto anything over the phone. Courteously hang up and make sure to register for the US governments Do Not Call list. Keep it simple never give personal or financial information to unknown callers, no matter who they might claim to be. 6. Repair Fraud Seniors are frequently targeted for elder financial abuse right in their own home through the common tactic of repair fraud. If an elder is forgetful or possibly suffering from dementia, wrongdoers will look to exploit this weakness by overcharging for home repairs and yardwork. Sometimes scammers will even come around repeatedly, performing the same task several times over a given period and defrauding the victim in the process. Even unscrupulous auto mechanics have been known to jack up prices for elderly, confused customers and engage in dishonest, unethical practices like changing tires every few months. Another updated form of repair fraud is the antivirus scam, which can be perpetrated in person, online, or over the phone. You might receive a fake email, a telephone call, or even a door-to-door visit from someone claiming to check your computer for viruses. Theyll tell you your computer is infected and repair it, charging you for a non-existent service and possibly even stealing your personal and financial information while they access your computer. Countering repair fraud might mean going to the doctor and getting an evaluation over possible memory loss or increased confusion. Seniors with conditions like dementia must be protected from financial exploitation one effective way to shield vulnerable elderly loved ones from repair fraud is to obtain financial power of attorney. When a responsible younger relative takes on this legal duty, its sometimes possible to recover funds lost to repair fraud. 7. Sweepstakes Scams Fake sweepstakes, lotteries, and raffles represent a widespread form of fraud perpetrated against senior citizens. Youll get a flashy mailer informing you of your amazing prize winnings, or perhaps a telephone call or spam email. A fabulous fortune is yours to be had, youre told, and all you have to do to attain your winnings is pay a phony tax, shipping fees, or other made-up charges. Your social security number and bank information might even required to claim the supposed prize. In reality, of course, the sweepstakes is a scam meant to trick you out of hundreds or even thousands of dollars, potentially putting your identity at risk. The too-good-to-be-true rule applies to most scams, and ridiculous sweepstakes mailers are no exception. A real raffle or lottery wouldnt require you pay or provide sensitive personal info to access your prize. Sweepstakes offers and other contest winnings should be promptly tossed in the trash, and whoevers sending them through the postal system should be regarded with strong suspicion. Seniors should have a trusted loved one help them sort through mail and identify all such deceptive mailers. Countermeasures Heightened Vigilance What are some initial steps you can make to prevent elder financial abuse? Several measures are available for family members, lawyers, financial professionals and medical caregivers. Along with basic awareness, coordination and ongoing communication between parties translate to increased protection. Here are some basic actions you can take to keep elderly loved ones safe from exploitation: 1. Financial Oversight: A family member and financial professional at the local bank or advisory firm should establish a system of oversight over an elders accounts. In addition to setting up bill payment, keep a sharp eye on any excessive withdrawals or irregular transfers. Consider joint accounts with the elder, and look into the possibilities of a limited credit card for an elder susceptible to financial exploitation. 2. Revocable Trust: With a revocable trust in place, a trustee has access to a trust account without enjoying the status of legal ownership. Stopping irresponsible or just plain bad trustees from squandering assets translates to building in effective safeguards. 3. Communication: The human element is vital in preventing elder financial abuse, and that means maintaining effective lines of communication between all interested parties, whether it be the attorney, investment advisor or medical caregiver. Just as importantly, a loving relationship with an elderly family member makes all the difference in shielding them from harm. If a senior is lonely, theyll be more vulnerable to fraud or unethical sales pitches. Just visiting an elder regularly, talking and showing them you care is an enormous boost in keeping them safe. 4. No-Contact Lists: Boiler room telemarketers and deceptive mailers target elders who suffer from cognitive impairment. One way to block most, if not all, of these unwelcome solicitors is to contact the FTCs Do Not Call Registry, Nomorobo and the Direct Marketing Association. Speak with your elderly loved one about the harmful nature of these calls and fliers to help them spot when theyre being scammed. Protecting your elderly family member is virtually a full-time job for many it becomes a full-time job of care, comfort, housing, medical visits, and protection. Such duties may be embraced with love, but it is a love coupled often with real suffering. It is never easy to care for a parent with dementia or with chronic physical or mental problems. Both physical and mental exhaustion often accompany such care. Sibling issues arise between those who are near the elder family member and those who are geographically removed. Friends of the elder might be critical of the care or protections that are put in place for the elders benefits. Not all is black and white. Taking care of an elder adult often reminds us to reflect on the meaning of the Fifth Commandment: Honor thy father and thy mother. Doing this honor is a day-to-day process, and is not without its challenges.

Saturday, July 20, 2019

What is a Training Contract?

What is a Training Contract? To be a successful solicitor, you will need more than legal knowledge to ace your exams and plunge to the challenging world of law. You will also need to have a substantial training period. As aspiring solicitors, you need to start preparing to apply to training contracts. Currently, it is normal for students to start applying for training contracts in the second year of their LLB (their Law Degree program) or the final year of their non-law degree. However, the recent change to the Graduate Recruitment Code means law students may soon start applying in their first year of the university. The training contract, or period of recognised training, is the final stage on the path to qualifying as a solicitor. This period enables you to understand the practical implications of the law as well as developing your skills required in law practice. It is the stage where you put into practice what you learnt so far, and develop these still further within a working environment. You will have an opportunity to harness your commercial and financial awareness, negotiation skills, drafting, advocacy and client care skills. The training contract is usually a two-year period spent working at a law firm. Trainees in larger firms spend for blocks of six months each in different departments (they are usually called as seats). While in smaller firms, the training will not be so structured although the trainees will need to cover at least three areas of work. Your contract of employment Your relationship to your employer is that of apprenticeship, regulated by the SRA, to make you apply the skills you learn at the earlier stages into practice is a real, supervised environment. Hence your contract cannot be easily terminated by your employer unless there is a serious misconduct, you are so incapacitated that allow you not to be trained properly by the firm, or the business has been changed or closed. Training contracts often have a cancellation clause (like the inability to complete GDL or LPC). However, cases wherein trainees being fired by their employers are quite rare. Trainees must complete the Professional Skill Course, which the firm has to pay the course fees. The PSC will enable them to be fully qualified solicitors. This course is split into three modules: advocacy and communication skills, client care and professional standards, and financial and business skills. Aspiring solicitors must also be aware that SRA is considering a single central exam the Solicitors Qualifying Examination to be taken at the end of the training contract. What you need to learn During the training period, the SRA requires your firm to provide practical experience in at least three areas of English and Welsh law and practice. This apprenticeship provides the trainee solicitors avenues to develop and apply practical skills, which they will need as qualified solicitors. The trainees should develop the skills through the mixture of the following activities: Completing work and tasks by themselves; Assisting others; Observing experienced practitioners. Advocacy and oral presentation On completing the training period, trainee solicitors should be competent to exercise the rights of audience available to solicitors in admission. The trainees must be able to fully grasp the skills required to prepare, conduct, and present a case. Case and transaction management The trainee solicitors must acquire the skills in managing and running a case or transaction. To develop these skills, trainees should work on large cases or transactions as members of a team, or they should be given smaller transactions that they run by themselves. Client care and practice support To be able to deal with the strenuous demand of solicitors life, trainees should develop skills necessary to manage time, resources, and effort. They need to develop good working habits. Communication skills Through the apprenticeship, trainee solicitors should understand the importance of refined communication skills so that they can present oral and written presentation in a way that achieves its purpose. Dispute resolution Trainees should gain a full understanding of the skills and practice necessary in resolving disputes, including settling, mediation, and adjudication. in a fair, cost-effective, and timely manner that meets the clients needs. Trainees can develop these skills by attending tribunal hearings or alternative dispute resolution, meetings, and assisting with the preparation of cases. Drafting The trainees should develop the skills that enable them to produce clear, concise, and precise documents that achieve their purpose. Interviewing and advising This training experience will also help the trainee solicitors understand the importance of identifying their clients goal along with taking accurate instructions. They should experience observing and conducting interviews with clients, experts, witnesses, and others. Legal research Trainees should learn to find solutions by investigating the factual and legal issues, analysing problems, and communicating the results of their research. Negotiation By being given a chance a to observe negotiations conducted by experienced practitioners and/or conducting negotiations under close supervision, trainees will be able to understand the processes involved in contentious and non-contentious negotiations. They will also value the importance to the client or reach an agreement or solve the dispute. Other than the above-given skills needed, it is also important to note that the apprenticeship program can help develop the trainees character, which will make them suitable to practice law. Successful completion of training contracts does not necessarily guarantee a job offer, although the majority of the trainee solicitors work in the firms where they conduct their period of recognised training. Payment to Trainees All trainee solicitors receive a salary, but this varies depending on the firm and location. From August 2014, SRA announced that companies are required to pay the trainees the national minimum wage; however, may trainee solicitors receive more than the national minimum wage. Law firms particularly the larger ones offer to cover the cost of the LPC and/or GDL tuition fees, with some even providing support for living costs. In conclusion, the apprenticeship must be seen as a period to learn about several areas of practice and at the same time to find your spot in this competitive profession. Industrialization as an Engine of Economic Growth: India Industrialization as an Engine of Economic Growth: India A Case Study of India Introduction The process of Industrialization is considered at the core of economic growth in any economy and it is critical for development and progress. Since the Industrial Revolution, secondary sector development is regarded important for mass production, provision of employment opportunities, gaining advantage of technological advancements. The development of industrial sector has had spillover effects and brought about innovative solutions for other sectors as well such as agriculture, infrastructural development, trade and even the service sector. Thus, industrialization is considered as the ultimate engine of economic growth in an economy. This essay aims to provide insight into why Industrialization is critical for economic growth and how it results in creating development prospects in an economy. The essay will begin with exploring literature that highlights that Industrialization improves the GDP growth rate in an economy and absorbs labor surpluses created by other sectors of the econ omy. Literature also shed light on the popular Lewis Model. The essay then follows by presenting the case of India and how Industrialization has led to economic growth in India. The essay however pays little focus on the role of primary and tertiary sectors in the growth of economy. Industrialization as an Engine of Economic Growth: Literature Review Industrialization and its significance have been discussed by various scholars since the Industrial Revolution. While the debate has been taken to various fields of study, it is frequently mentioned in Economics to discuss the structural changes and the resultant economic effects it has caused. A large pool of literature has consensus over the stance that Industrialization is critical for development. Various scholars tend to prove their stance with the help of empirical analysis carried out in both developed and developing country. The core model supporting this stance was introduced by Arthur Lewis in 1950s in which explains why economies should shift from agricultural base to an industrial base. Lewis presented his theory of Development with Unlimited Supplies of Labor and claimed that as the agricultural sector of the economy experiences labor surplus and low productivity, an economy should shift these surpluses to the industrial sector (Ranis, 2004). The growing manufacturing se ctor of the economy will tend to offer higher wages to the unemployed to provide them with an incentive to shift towards the manufacturing sector as well as to compensate them for the expenditures of moving to urban areas. Thus, the resultant increase in productivity and capital accumulation will lead to growth of industrial sector and this will generate sufficient employment opportunities to absorb unemployment in other sectors of the economy (Guru, 2016). Lewiss model however, assumes that all the wages provided are used up and all the profit earned is reinvested. Thus, this would lead to expansion of the industrial sector. Conclusively, saving and investments as a ratio of national income in an economy will tend to rise, leading to growth and development in an economy (Guru, 2016). Lewis aims to directly address the issue of development through proposing the expansion of industrial sector. However, the theory is subject to various loopholes. Lewiss model is criticized for ignoring the surplus absorption capacity of the agriculture sector. Guru (2016) argues that developing nations like China and Bangladesh have an increasing population rate so the shift of labour from agriculture to manufacturing or smaller fraction of total population being employed in agriculture is difficult in labour surplus economies. Hence, development of agrarian sector through capital accumulation, reforms and technological advancement will generate opportunities within the sector to absorb any surpluses (Guru, 2016). Criticism however, still fails to undermine the contribution of the Lewis Model in Development Economics. Industrialization still tends to be the key towards development in various economies of the world. Supporting the Lewis Model, various scholars tend to highlight the role of industrial development in the economic growth of a country. Syrquin Chenery (1989) attribute increasing growth rates to the manufacturing sector development in a particular economy. They argue that an increase in industrial output (resulting from greater demand) will lead to GDP growth as well as improved labor productivity (Syrquin Chenery, 1989). A wide range of scholars also tend to acknowlege technological advancement and its role in evident structral changes. It is argued that less profitbale and productive sectors are replaced with more efficient ones in the contemporary era. In order to ehance aggregate productivity, technological change is considered to be the core of economic growth. Thus, scholars like Kaldor (1970) and Cornwall (1977), refering back to Industrial Revolution where technology revived the manufacturing sector, argue that improvements and growth in the manufacturing sector are the cor e drivers of economic growth. Technological advancement did not only improve the manufacturing sector, but also led to productivity improvements in various other sectors of the economy. For e.g. manufacturing of tractors brings imrpovement in the agricultural sector. Thus, technological advancement has been directly linked with industrial development and economic growth. Advocates of the aforementioned argument also tend to support their stance by examining the impact of industrialization on poverty and income inequality through empirical analysis. Bourguignon Morrison (1998), identified removal of trade protection in manufacturing sector as the reason for reduction in the income of the richest 20 percent and increse in the income of poorest 60 percent, in 35 developing countries of the world. Likewise, Dollar Kraay (2004) found a strong correlation between variations in trade volumes and, growth and inequality. This can be explained such that as the manufacturing sector imrpoves it production volumes, it earns more which can be reinvested. Reinvestment leads to better incomes and employment opportunities for the poor bridging the inequality and making poor better off. Opposing school of thought however have been trying to reinstate the importance of agricultural sector in the economies. An empirical study by Awokuse (2009) suggests that agriculture is a driver of economic growth such that agricultural produce leads to trade openess which has positive impact on GDP per capital. Thus, Awokuse (2009) argues that resource allocation and infrasturcture development should be carried out targeting agricultural improvements in an economy. Similarly, opposing school also favour the development of tertiary sector in order to undermine the importance of secondary sector in the economy. Park Noland (2013) argue that service sector can serve as the new engine of economic growth in an economy specifically in asian economies, as an analysis of 12 asian economies already indicated that service sector has contributed to the growth of the economies in the past (Park Noland, 2013). However, Szirmai Verspagen (2010) rule out their findings and claim that manufacturing sector is still important than any other sector in a country in the contemporary era. His empirical findings were inline with the engine of growth hypothesis and illustrate that manufacturing sector has the biggest share in the economic growth of a country and this impact is more prominent in poorer economies. Conclusively, majority of the scholarly pool of knowledeg supports the fact that countries shall inustrialise in order to develop. Industrialisation and Development in India South-Asian countries have been traditionally known to be export oriented particulrary in manufacturing products. Most of the Asian economies have been known for shifting from agrarian base to industrial base in order to develop. This has been inevitably true in the case of China, India, Bangladesh, Pakistan etc. India however, has been known for its strong industrial base and its Industrialisation led strategy of development and economic growth. Since Indias adoption of liberalisation policy in 1991, multiple opportunities for investment have attracted various foreign investors. The government ensured that projects were approved quickly and moreover 34 industrial sectors were allowed automatic approval of projects. The investment was focused on the industrial sector and thus, has majorly contributed towards manufacturing sector growth. There was also relaxation in the percentage of ownership to be held by foreign actors. This led to various industrial project initiation in the sectors like automobiles, infrastructure, computer softwares etc. Indias liberalization policy had been so successful that its Foreign Direct Investment (FDI) climbed up from being $170 million during 1991-1992 to $1.3 billion in 1994-1995. Since the last century India has been attracting $10 billion of FDI annually, most of which are for industrial projects. Hence, India;s FDI is approximately 25 times more than what it was before adoption of liberati on policy (Hambrock Hauptmann, 1999). Undoubtedly, Indias liberalization policy led to a major structural shift in the economy. The role of Industrial sector in the economy was enhanced and it ultimately led to development and economic growth. Kniivila (2007) reports that India has undertaken huge structural change since the last 40 years where the contribution of agriculture value added to GDP has gone down from being 45% in 1965 to 19% in 2005. Despite of this, the overall growth rates in the economy have risen mainly attributing to the growth in manufacturing sector. The growth rate of manufaturing industry value added averaged at 6.6% between 1980 and 2002 while the growth in agriculture was just 2.8% (Kniivila, 2007). Thus, this growth has brought various benefits to the country. The most evident trend in India has been the increase in trade flows. During the period 1991-2002, Indias gross trade flows trippled with trade-GDP ration rising from 21.3% to 33.1%. A major contributor to this was merchandise exports that grew by 145% (Kelkar, 2004). Manufacturing sector has a major proportion in the merchandise exports of the country. While it accounted for 43% of merchandise export in 1962, it trippled by 2003 (Figure 1). 11% of the total merchandise exports consisted of food exports in 2003. Other important manufacturings included textiles, clothing, gems, chemicals, drugs and dyes and automobile components (Kelkar, 2004). Thus, since the liberalization policy, he industrial portfolio of India has not only widened but has also brought about spill over benefit for the economy by improving the wages of basic level employees and increasign the national income through volumnous trading. While the industrialization process has improved economic growth in India, it simultaneously reduced the risk of growth volatility such that since 1980s the standard deviation of GDP growth has fallen down to 1.9% (Kelkar, 2004). An important reason for this is the rise of industries and decrease in the contribution of agriculture sector in national income. While Industrialisation has developed the national economy of India, it has also served to improve the living standards of the population addressing the issues faced by the poor population. Since the structural shift towards Industrialisation, the Indian government reports that the employmnet rates have gone up and the percentage of poor in the total population of the country as falledn from 45.7% in 1983 to 27.1% in 2000 in rural areas whereas it has fallen from 40.8% to 23.6% in urban areas. Overall, the poverty line of the country declined from 44.5% to 26.1%, which can mainly be attributed to the better earnings and living sta ndards of the poor resulting in better welfare for them. According to Mishra Kumar (2005), trade liberalization resulting in enhacement of industrial sector has decreased wage inequality in manufacturing. Sectors marked by tarriff reductions experienced wage increments. Because mostly the tarrif reductions were imposed in sectors with great number of unskilled labor, these sectors were marked by increasing wages an thus, it led to increase in inome levels of poor unskilled labour (Mishra Kumar, 2005). However, a significant loophole of liberalisation policy in India has been its biasness in implementation. It is to be noted that reforms for the manufacturing sector depended upon their location and level of technological advancement. While liberalization attempted to inroduce innovation and growth in industries, it mainly trageted industries with scope in technological advancement. Moreover, some industries that were labour intensive were prevented from introduction of innovation so that it does not lead to unemployment. This, restricted te spill over effects of industrialization in some areas and hence led to inequality. However, at large industrialization prominently improves the economic conditions of India. In support of theory, it has also been empirically tested that Industrialisation has served as an important engine of growth in India. Chakarvarty Mitra (2009) carried out empirical analysis and concluded on the basis of VAR analysis that manufacturing sector is one of th emain stimulator o growth in India and many economic activities in India are becomign dependent upon industries. Similarly, Kathuria, et al., (2013) examined the growth in manufacturing sector and output in Indian states and concluded that manufacturing is still an important for growth in India. Hence, the case of India clearly depicts that boost in the industrial sector has been the major driver of economic growth in India since 1991. Technological advancements have been balanced out with Industrial growth to imrpove the economic state of the country. Thus, Industrialisation is the engine of economic growth in India. Conclusion Conclusively, we have established that Industrialization and Manufacturing sector growth is the ultimate engine of economic growth. It helps in curbing inequalities by improving the wages of the poor unskilled labor force and also tends to improve the trade volume of the economy. This has been inevitable in the case of India. Post-Liberalization manufacturing sector development has brought about major benefits for India. Industrialization has resulted in consistent growth, increase in productivity and exports, and reduced level of poverty. This has certainly led to development at a phenomenal rate in India. Hence, Industrialization has served as the driver of economic growth in India, being in line with the Lewis Model. This has not only been proved theoretically but also empirically by Chakarvarty Mitra (2009) and Kathuria, et al., (2013). A few development challenges still faced by India attribute to the loopholes in the legal and justice system, and massive regulations in the lab or market. However, Industrialization has seemingly solved most of the development challenges in India. Figure 1. Export of Commodities in India 1988-2003 Source: Kniivila (2007) Awokuse, T. O., 2009. Does Agriculture Really Matter for Economic Growth in Developing Countries? , s.l.: University of Delaware: Department of Food Resource Economics. Bourguignon, F. Morrison, C., 1998. Inequality and Development: Role of Dualism. Journal of Development Economics, Volume 57, pp. 233-257. Chakarvarty, S. Mitra, A., 2009. Is industry still the engine of growth? An econometric study of the organized sector employment in India. Journal of Policy Modeling, 31(1), pp. 22-35. Cornwall, J., 1977. Modern Capitalism: Its Growth and Transformation. s.l.:Martin Robertson. Dollar, D. Kraay, A., 2004. Trade, Growth and Poverty. The Economic Journal, February, 114(493), pp. F22-F49. Guru, S., 2016. The Lewis Model of Development with Unlimited Labour Supply. [Online] Available at: http://www.yourarticlelibrary.com/economics/the-lewis-model-of-development-with-unlimited-labour-supply-2/38290/ Hambrock, J. Hauptmann, S., 1999. Industrialiation in India. [Online] Available at: https://www.tcd.ie/Economics/assets/pdf/SER/1999/Hambrock_Hauptman.pdf Kaldor, N., 1970. The Case of Regional Policies. Scottish Journal of Political Economy, November, 17(3), pp. 337-348. Kathuria, V., Raj, S. R. Sen, K., 2013. The effects of economic reforms on manufacturing dualism: Evidence from India. Journal of Comparitive Economics, Volume 41, pp. 1240-1262. Kelkar, V. L., 2004. India: On the Growth Turnpike, Canberra: Narayan Oration, ANU. Kniivila, M., 2007. Industrial Developemnt and Economic Growth: Implications for Poverty Reduction and Income Inequality. In: Industrial Development for 21st Century: Sustainable Development. New York: UN, pp. 295-332. Mishra, P. Kumar, U., 2005. Trade Liberalization and Wage Inequality: Evidence from India, s.l.: IMF. Park, D. Noland, M., 2013. Developing the Service Sector as the Engine of Economic Growth, Mandaluyong City: Asian Development Bank. Ranis, G., 2004. econ.yale.edu. [Online] Available at: http://www.econ.yale.edu/growth_pdf/cdp891.pdf Syrquin, M. Chenery, H., 1989. Three Decades of Industrialization. The World bank Economic Review, May, 3(2), pp. 145-181. Szirmai, A. Verspagen, B., 2010. Is Manufacturing Still an Engine of Growth in Developing Countries?, s.l.: The International Association for Research in Income and Wealth.

Analysis of Internet Protocols and Infrastructure Essay -- Internet Te

Analysis of Internet Protocols and Infrastructure Introduction: Network: Anything reticulated or decussated at equal distances, with interstices between the intersections. - A Dictionary of the English Language SECTION : 1 1.1 WHAT IS A NETWORK? A) What is a network? A network is simply a collection of machines connected in some way that allows them to communicate with each other and share information. To do this the machines have to be connected in some way that allows communication, and have an agreed upon a language to talk when they do communicate. Components of a network might include individual hosts, some form of communications hardware, a network protocol and a collection of network services. B) Individual hosts A network is a collection of individual machines sometimes referred to as hosts. Each host (computer) must have some unique identifier that allows other hosts to talk to it. 1.2 COMPONENTS OF A NETWORK A) Network Protocol In order to communicate the parties must speak the same language. Languages on computer networks are referred to as network protocols. A network protocol is simply a set of rules and formats that govern how information is sent and in what format it is sent. Some of the different network protocols used today include TCP/IP (Internet and UNIX favourite), IPX (Novell), Appletalk (MAC), DECnet and various others. TCP/IP is quickly becoming the networking protocol and is the one I concentrate on in this subject. B) Network services To be of use to users the network will provide various services including file, print and device sharing, electronic mail etc. 1.3 TYPES OF NETWORKS A) Network categories  · LAN (local ... ...UNIX the routing table can be viewed using the netstat command. The route a packet follows can be viewed using the traceroute command. Routing tables are either created statically, or by the systems administrator configuring the system, using the startup or configuration fiels, to used a pre-defined, unchanging route.dynamically.  · There are protocols, part of TCP/IP, that will dynamically modify the routing table in response to events.  · Adding a host to the network requires obtaining, installing and configuring the necessary network hardware, gather the required information including IP address and hostname of the new host, the gateway and the name server, the network address and the subnet mask, modify the appropriate configuration and startup files with that information, make sure the new host has an entry in the domain name service, test the connection.

Friday, July 19, 2019

Across Five Aprils By Irene Hunt :: essays research papers

Across Five Aprils By Irene Hunt Across Five April's by Irene Hunt is about how the civil war tears apart a family during the hard times of the civil war. There were 239 pages it this story. The book follows the life of Jethro Creighton, a young farm boy in rural Illinois as he grows from a protected and provided for nine year old, to a educated and respectable young adult during the chaos of the civil war. In the beginning of the book Jethro has an incorrect idea of what war is like. Jethro knows little about war except that of what he has heard from old war heroes tales. His brothers get packed away one by one to different sides of the war. Not until then does he realize through conversation at home and haunting letters from his brothers on the battle field, the true horror of war. One brother (whom is only really an orphaned cousin) is a deserter. Jethro writes to Abraham Lincoln in a effort to keep his brother and family out of trouble with the law. Another one of Jethro's brothers joins the confederacy which goes against all opinions and beliefs formed by the Creighton family and surrounding community. At first the Creightons disagree but they come to a decision and decide to respect and accept his choice of beliefs . This causes an upset with surrounding neighbors and they become destructive and rude. Attempts to ruin the life of the Creighton family are made because of their decision. Meanwhile his sister Jenny wishes to marry Shadrach Yale before he leaves for war. Even though he is a very close friend of the family, her father declines their request because he feels she is too young and won't allow her to marry Shadrach or anyone. He and Jenny continue to plan a wedding and he writes Jenny from his station on the battle field and further tension grows between the family and Shadrach's intentions of marrying.

Thursday, July 18, 2019

Philosophy Communication Barriers Essay

(a) How does James think of my intending to say something? Does he think of it as a process in consciousness? James argues that our phrasing â€Å"intended to say† is an almost wrong explanation on a subconscious or even psychic thing that it happening within our minds.   The point is that we never consciously form the words in our minds or even draw upon our memory banks to call to mind images of the thing that we mean to say. Instead, it is an unconscious function of the mind that we hear something and choose to respond to it with some form of language. In the event that the language we choose is wrong, we often react with the phrase. â€Å"What I meant to say was†¦Ã¢â‚¬  James argues that this happens when the precognition of our own mind fails to work rapidly enough to anticipate the reaction of the person we are speaking to and choose the proper words to convey to a thought stream to that specific person. On the most basic level, it means that our minds did not act quickly enough to substitute the proper word into a sentence. For example, imagine talking to your best friend about her sister. The intended sentence would be, â€Å"How’s she doing?† As the speaker you would not have planned out the conversation or thought specifically about what to ask, but when you speak and say, â€Å"How’s he doing?† the immediate response is to say, ‘I meant she. How’s she doing?’ there is never a point at which the conscious mind stops and chooses the words to use. This might therefore make an interesting discussion for linguists and psychologists to determine how speech actually happens. James argues that it is a subconscious thing, which implies then that speech is a learned ability you can train the subconscious mind. Take for example learning to speak another language fluently.   Teachers argue that you cannot speak another language fluently until you can think in that language. The premise is basically the same as what James has argues. If you are completely fluent in the language and someone asks,   â€Å"Que es el nombre del gato?† You will be responding with the cat’s name before the image of the cat is even called to mind. If you are less than fluent, you will need to translate the question before you can answer, thus moving the response from the subconscious speech centers to the conscious mind. [(b) Can the arguments Wittgenstein employs against the idea that understanding words is a conscious process be adapted to show that intending or meaning to say words is not a conscious process that begins before I say them   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Wittgenstein argues that the meaning of a word is defined as we use it, not by some memory flash card system begun when we are children.   This then would explain in English the tendency to crease euphemisms and phrases which cannot be translated literally based on the presumed meaning of the individual world. To use his argument, if language were a conscious thing, human speech patterns would always be precise and would never relay on simile, metaphor or any other form of literary device. Instead, in essence, he is arguing that because language to create imagery that is not a specific reflection of the exact meaning of what is said, it is a subconscious action. Likewise then, if the use of language is subconscious and not dependent on a specific meaning when a word is chosen, Wittgenstein’s argument can easily be developed to explain that the use of words or even the development of an answer is not necessarily a conscious thing. Think of it as a sort of language autopilot. Our subconscious mind understands what is being discussed and how to respond to it before the conscious mind has a chance to understand the nature of the question. Therefore, the subconscious mind can formulate a response and begin it before the conscious mind starts to speak. In the event that the conscious mind disrupts the process and inserts its own words, the subconscious mind can send it a message that says, ‘What I meant to say was†¦.† c) James claims that intending to say something is or provides an anticipation or premonition (=knowledge in advance) of the words I will say or think. Do Wittgenstein’s remarks in section. 187-192 show that James is laboring under some misunderstanding about this? Explain. Wittgenstein’s remarks indicate that James is misunderstanding the functioning of the mind by calling the natural process of communication between the conscious and subconscious premonition. He would argue that the act of speech is a sort of subconscious act, with only specific forms of speech coming from the conscious mind. If both parts of the mind are working in proper harmony, the subconscious can formulate and plan a response long before the conscious mind can even think about it. However, this is not a self-premonition or anything as supernatural as James might be implying. Instead, it is a factor of the understanding of the human brain and how it works. Since the body cannot, by definition, understand the workings of the subconscious, we simply must accept that these incidences occur when the subconscious works more rapidly than the conscious mind.   Wittgenstein argues that this is not a premonition, but simply evidence that the mind works much faster than we appreciate. 2.) P. F. Strawson writes: States or experiences†¦owe their identity as particulars to the identity of the person whose states and experiences they are. From this it follows immediately that if they can be identified as particular states and experiences at all, they must be possessed†¦in such a way that it is logically impossible that a particular state or experience in fact possessed by someone should have been possessed by anyone else. The requirements of identity rule out logical transferability of ownership. [Individuals, p. 97] (a) Briefly describe Wittgenstein’s treatment of the idea that â€Å"another person can’t have my pains† in Philosophical Investigations Section 253. (Describe the aims and strategy of his remarks.)[ Wittgenstein disagrees with Strawson, with a tongue-in-cheek sarcasm to illustrate that in the event of Siamese twins, two people could share the exact same pain. Ultimately, though his goal is to demonstrate that identity is not as important to the identification of pain as far as location and intensity. Whether a person has the exact same headache that you are having is not nearly as relevant as the fact that they have had a headache in the past and can therefore commiserate with the pain that you are feeling.   In essence, he is arguing that the sameness of the pain is also irrelevant. When discussing the human condition, it is more important to draw parallels between like circumstances than to throw up semi-rational boundaries such as the identifiers that Strawson used. While it may technically, maybe, be impossible for more than one other person to feel the exact same pain that you are feeling, in the human nature of inexact speech we often use the phrase â€Å"same pain† to indicate that we have been in similar circumstances. Drawing unnecessary barriers by pointing out that our individuality will affect the way that we feel pain does nothing to promote a greater understanding of pain, the nature of the individual, the nature of empathy or the human condition. If Strawson were attempting to define the uniqueness of the individual, his commentary might have been relevant, but in a discussion about the nature of pain, it is divisive and irrelevant. The point is to discuss the sameness of the human condition in that while we may have different understandings of pain, we can interrelate via the concept of pain. For example, two women with menstrual cramps may not be experiencing the same intensity of pain or even the same location, but they can relate based on the similar circumstance. (b) Do observations like those in his PhilosophicalRemarks *2 account for all the ways we use the expression (same) pain?] Wittgenstein’s examples via Philosophical Remarks perhaps do not go far enough in disavowing Strawson’s claims, but he does make a good start. By arguing that the criteria of identifying the sameness of pain involves location and intensity as criteria rather than identity of the person feeling the pain, Wittgenstein effectively argues that Strawson’s claim is false. What he fails to discuss are the non-physical sources of pain and whether they can be the same pain or if Strawson is closer to the mark when using inaccurate language to describe emotional trauma. But here too, if Wittgenstein had desired, he could argue that Strawson’s claim is fundamentally flawed. Again, we go first to the example of identical twins that are raised together. Though there might be some differences in their emotional makeup, for the most part, they are going to feel emotional pain in the same way. But even if we forgo the genetic aspect ad simply discuss emotion as an end result of experience, it seems ludicrous to assume that each of the six billion people on the planet will have experienced life in a completely unique way and will therefore never have the same pain as another person. (c) Push Wittgenstein’s investigation one step further. We say things like this: â€Å"I had two bad headaches today: one in the morning and one in the afternoon†. What are â€Å"criteria† for sameness and difference in such cases? The primary criteria for sameness and difference in this case would be the location of the headache and its intensity. For example, a tension headache might begin at the base of the spine and radiate upward, a sinus headache might begin just below the eyes and a migraine might be a throbbing in the temples. Each can be described as a bad headache depending on the severity and each is unique in its location. However, often people who are prone to headaches will have them in the same location and are given to saying, â€Å"I had that same headache again† to indicate to the listeners that this is a recurring problem in the same location with the same intensity. When language is used precisely, this is an inexact statement, but if the primary purpose of language is to convey meaning to the listener, this can be a much simpler way of saying â€Å"I have a headache again in the same spot as I did yesterday and it hurts the same amount.† Much like with the other discussion, Wittgenstein seems to be challenging his fellow philosophers regarding their choice and use of the language. Because the language itself is inexact, making a claim simply based on the language usage is invalid. (d) Do these cases vindicate Strawson? I do not believe these issues vindicate Strawson at all. It appears that he was doing exact what Wittgenstein was trying to warn against: he was using an imprecise example of language to erect a barrier to human empathy that need not exist. Generally speaking, when a person uses the phrases, â€Å"I feel your pain† it is to indicate that I have been in a similar circumstance and have felt pain because of it. As such, I can empathize with your pain. However, people simply do not talk that way and to expect them to do so is illogical. Therefore, Wittgenstein rebukes Strawson, fairly gently, trying to make him understand that the same is not always the same.   It makes perfect sense when you consider the propensity in English to use the phrase â€Å"exactly the same†. Though sameness implies that two things are alike, we have learned to differentiate between things that are similar and thus the same in casual conversation and things that are identical.