Thursday, October 31, 2019
Fruit Essay Example | Topics and Well Written Essays - 500 words
Fruit - Essay Example Sit tight, this is going to be one intellectually enlightening experience. According to Rakesh Mohan Hallen (ââ¬Å"Taste and Smellâ⬠) the chemical composition of fruits dictate the flavor that we taste within it. He further explains that: ââ¬Å"During the process of the ripening of a fruit or roasting or frying a papad the chemical substances present in them undergo some chemical changes, which transforms the structure of some of the molecules that elicit a particular taste.(Allen,Rakesh, Mohan, ââ¬Å"Taste and Smellâ⬠). This would mean that the level of fructose, glucose, acid, and citric aid within fruits dictate the final sweetness or sourness of the ripened fruit (Mawuli, 2011). Seed dispersal is actually an interesting topic of which very little is known. What we do know however, is that the ripening of a fruit helps in seed dispersal because the seed pods of over ripened fruits tend to burst open thus scattering the seeds into the wind for depositing over vast land areas. Humans have also helped in propagating seed dispersal because of our tendency to carry fruit trees and plants that we consider decorative when we migrate from one place to another thus allowing for the spread of fruit and vegetable crops throughout various territories. (Hodag, 2011). However, considering that human beings tend to create fecal matter that is not deposited back into the soil but rather in sewer systems and land fills, human beings tend to disrupt the balance when it comes to seed dispersal because the seeds do not get back into the soil as a fertilizer as it would normally do when consumed by wild animals and the like. Now as we all know, polysaccharides, also known as starch, is a molecule that is not easily digested in its original form. It must be broken down into simpler forms such as fructose, which is a monosaccharide, in order to metabolize it. In fruits, these
Tuesday, October 29, 2019
Ause and Effect on Rhabdomyosarcoma Essay Example | Topics and Well Written Essays - 1000 words
Ause and Effect on Rhabdomyosarcoma - Essay Example Such genetic problems cause very quick development of the new cells and also cause the old cells to live for a very long period. The number of cells keeps increasing as a result of this, thus creating tumors. Certain genetic disorders can also cause damage to the DNA. However, in a vast majority of cases, doctors are unaware of the exact causes of abnormalities of the DNA which cause rhabdomyosarcoma in an individual. ââ¬Å"There are no known lifestyle-related or environmental causes of RMS, so it is important to know that there is nothing these children or their parents could have done to prevent these cancersâ⬠(ââ¬Å"Rhabdomyosarcomaâ⬠a). Risk Factors Although there is a lot of subjectivity about the real causes of rhabdomyosarcoma, yet there are certain risk factors that increase an individualââ¬â¢s susceptibility to acquiring rhabdomyosarcoma. These risk factors include but are not limited to age, gender, and inherited conditions. The population that is most freq uently affected by rhabdomyosarcoma is of children below ten years of age, though rhabdomyosarcoma may also be observed in adolescents, teenagers, and adults. Rhabdomyosarcoma is more frequently seen in boys or men as compared to girls or women. People inherit their risk to fall prey to different kinds of cancer. The DNA inherited by an individual from the parents may have some changes to cause this tendency. The risk of rhabdomyosarcoma is increased by some inherited conditions, though they are generally very rare. For example, people with a family history of Li-Fraumeni syndrome have increased risk of acquiring different kinds of sacromas including rhabdomyosarcoma. Patients of Beckwith-Wierdemann syndrome are at great risk of development of the Wilms tumor. Effects There are a lot of effects of rhabdomyosarcoma, some of which are discussed here. Rhabdomyosarcoma creates a mass inside the body which at times is painful while at other times, is not painful. Rhabdomyosarcoma causes development of tumors in the throat or nose. The development of tumors is accompanied with the symptoms of congestion, bleeding. Or neurological problems upon extension into brain. In some cases, the patient may experience problems in the process of swallowing. Sometimes, rhabdomyosarcoma in the patient causes the development of tumors around the eyes which can cause such harmful effects as the eyeââ¬â¢s bulging, and swelling. In a vast majority of cases when this happens, the individual experiences problems with vision. Rhabdomyosarcoma causes development of tumors inside the ears due to which, the patient suffers from a loss of hearing ability and also experiences swelling inside the ear. Rhabdomyosarcoma also causes the tumors to develop inside the vagina, and they may be visible from the vaginaââ¬â¢s opening. Tumors in such regions as vagina and bladder not only decline an individualââ¬â¢s control over urine, but also affect the sexual life of the individual. Tumors in the muscles are also a great source of pain. Owing to this, many patients interpret the muscle tumors as injuries. Treatment Treatment of rhabdomyosarcoma is complicated. It requires mutual effort of several nurses, doctors, and physicians. The most effective treatment option is worked out jointly by the pediatric oncologists, oncology nurses, surgeons, and radiation oncologists. ââ¬Å"
Sunday, October 27, 2019
Christmas and Chinese New Year Festival | Comparison
Christmas and Chinese New Year Festival | Comparison After researching both Christmas and the Chinese New Year Festival, interesting similarities between the two unique celebrations came into fruition. For instance, both contain traditional meals, presents, feasts, decorations, songs, poems, God(s), folk lore, and are family oriented occasions. When discovering similarities, there were also perceptible differences between the two, such as the time of year, and the significance of the occasion within their respective cultures. This paper will be showcasing both Christmas, and the Chinese New Year Festival in terms of their origins, as well as the similarities and differences they both share. Christmas is a religious celebratory holiday, which embraces the birth of Jesus Christ. Christmas Eve takes place on December 24th, the day before Jesus Christ is born. This is the day where family members gather for a festive meal, which in North America, usually consists of a large turkey, mashed potatoes, stuffing, vegetables, gravy and wine. It is significant to know that different cultures may eat different meals. According to Wikipedia.org, ââ¬Å"In Poland, traditional Christmas Eve meals include one or more of the following foods: Golabki filled with Kasza, Pierogi, Borscht, fish soup, carp, and pickled Herring. Krupnik is sometimes drunk after dinner,â⬠[1] and ââ¬Å"In the Republic of Macedonia and Bulgaria, a coin is concealed in a bread loaf and the host breaks a piece of the loaf at the dinner table for each member of the household: it is believed that the one who gets the piece of bread with the coin will be fortunate in the forthcoming year. The dinner is accordin g to the rules of fasting: fish, baked beans, sauerkraut, walnuts and red wine are common. The dessert may consist of apples and dried fruits: plums, dates, figs. The table is usually not cleared after the dinner and until the next morning, to leave some food for the holly spirits a custom which probably comes from pagan pre-Christian times.â⬠[2] Also, there are many families whom may attend mass or choose to ââ¬Å"divine fastâ⬠[3]on this day, as a means to celebrate on the night before Jesus birth. It is important to know that non-religious individuals may also celebrate Christmas as well, whom primarily focus on the family, feasting, and gift giving aspect of Christmas. Some may view Santa Claus, a mythological figure, to be more important than Jesus Christ. Santa Claus is known for travelling across the world on December 24th, from the North Pole, delivering presents to the ââ¬Å"niceâ⬠children, while the ââ¬Å"naughtyâ⬠children receive a lump of coal. H ence, Santas list for delivering gifts to children is called the ââ¬Å"naughty or nice list.â⬠Santa Clause originates from ââ¬Å"St. Nicholas, whom tried to help others while inspiring his virtues. Legends of his unselfish giving spread all over Northern Europe, and accounts of his heroic deeds blended with regional folklore. Eventually, the image of the stately saint was transformed onto an almost mystical being, one known for rewarding the good and punishing the bad.â⬠[4] How Santa Clauss name came to be in North America was due to Dutch immigrants whom ââ¬Å"presented Sinterklaas (meaning St. Nicholas) to the colonies. In their excitement, many English-speaking children uttered the name so quickly that Sinterklaas sounded like Santy Claus. After years of mispronunciation, the name evolved into Santa Claus.â⬠[5] December 25th is the day where Jesus Christ, known to many Christians as their savior, is born. This is the day where a few individuals will put up nume rous decorations, although many will decorate in advance. Examples of decorations used for Christmas are; miniature size nativity scene figures, stockings, wreaths, ornaments, candles, mistletoes, garlands, poinsettias, Christmas lights and most importantly, the Christmas tree. ââ¬Å"The origin of the tree is credited to Saint Boniface (circa 722) who stopped a child from becoming a human sacrifice to a pagan god by striking down the oak tree destined for use as the stake. A fir tree sprang up in its place and he declared it a holy tree and instructed the faithful to carry one to their homes and surround it with love and gifts.â⬠[6] Ultimately, the blending of numerous cultures is how Santa Claus, as well as the numerous traditions on Christmas Eve and Day, came to be. The Chinese New Year Festival is a major holiday, which has been celebrated in mainland China for many centuries, taking place on ââ¬Å"the second New Moon after the winter solstice.â⬠[7] It is significant to know that this festival is also celebrated in other countries by its Chinese inhabitants, while various foreigners have been known to participate in the festivities as well. During this coming year, 2010, the Chinese will be celebrating the year of the tiger, the first day being on February 14th. ââ¬Å"According to tales and legends, the beginning of Chinese New Year started with the fight against a mythical beast called the Nien (Chinese: ?;pinyin: nià ¡n). Nien would come on the first day of New Year to devour livestock, crops, and even villagers, especially children. To protect themselves, the villagers would put food in front of their doors at the beginning of every year.â⬠[8] The Chinese not only used food as a means to protect themselves from Nian, but they al so released firecrackers, and wore red attire. Hence, the color red is strongly used throughout the festival, such as clothing, decorations, envelopes, sweets, gifts, etc. When families come together, they will feast on meat, noodles, rice, dumplings, mandarin oranges, sweets, and so forth. Before the feast, which takes place on the Eve of Chinese New Year, red envelopes with money inside and gifts should have already been distributed amongst family members, and children. The Chinese New Year consists of fifteen days, with the majority of the days each signifying different customs and actions. For instance, ââ¬Å"The first day of the Lunar New Year is ââ¬Å"the welcoming of the gods of the heavens and earth.â⬠Many people abstain from meat on the first day of the new year because it is believed that this will ensure long and happy lives for them,â⬠[9] ââ¬Å"The fifth day is called Po Woo. On that day people stay home to welcome the God of Wealth. No one visits families and friends on the fifth day because it will bring both parties bad luck,â⬠[10] ââ¬Å"the seventh day of the New Year is the day for farmers to display their produce. These farmers make a drink from seven types of vegetables to celebrate the occasion. The seventh day is also considered the birthday of human beings. Noodles are eaten to promote longevity and raw fish for success,â⬠[11] and on ââ¬Å"the 10th through the 12th are days that friends and relatives should be invited for dinner. After so much rich food, on the 13th day you should have simple rice congee and mustard greens (choi sum) to cleanse the system.â⬠[12] These are just a few of the customs that the Chinese celebrate throughout their New Year Festival. ââ¬Å"It is also the tradition that every family thoroughly cleans the house to sweep away any ill-fortune in hopes to make way for good incoming luck. Windows and doors will be decorated with red color paper-cuts and couplets with popular themes of â â¬Å"happinessâ⬠, ââ¬Å"wealthâ⬠, and ââ¬Å"longevityâ⬠.â⬠[13] Decorations are usually red, consisting of pictures, greetings, and Chinese idioms. On the fifteenth and final day of the Chinese New Year Festival, the Lantern Festival takes place. During this period, numerous individuals decorate the streets with Lanterns they have lit, which are primarily red. Some people may add their own unique individuality to a lantern, by adding a song or a poem to it. The Chinese New Year Festival is a high-spirited, content time where family and friends come together in order to celebrate years of tradition, such as feasts, decorations, gifts, envelopes, mythology, fortune gods, national pride, etc. It is also an influential festival that has spread across the world, blending in with copious cultures. It is fascinating to learn that Christmas and the Chinese New Year have actual similarities, with slight variations to them. For instance, the use of flowers is strongly used in both celebrations, although the Chinese convention for flowers has a more significant meaning within their culture. A certain flower can symbolize different connotations, for instance, longevity, luck, prosperity, tranquility, health, etc. The Chinese are known for using many different flowers for the Chinese New Year Festival, such as pussy willows, plum blossoms, water lilies, bamboo, and so forth. For example, the reason for using pussy willows for the Chinese New Year is ââ¬Å"In Cantonese, ââ¬Å"Yin Liuâ⬠sounds like ââ¬Å"Yin Louâ⬠which is similar to ââ¬Å"Yin Liangâ⬠(money). Therefore, having this plant around during Chinese New Year would represent the invitation of abundant luck and prosperity into homes.â⬠[14] As for western cultures, when celebrating Christmas, individuals use flowers mostly as decorations. It is principal to know, that there is an origin story of how the poinsettia became the official flower for Christmas. ââ¬Å"The poinsettia is a shrub that features green leaves combined with red, white, or pink leaves surrounding tiny yellow flowers. Used by the Aztecs as a dye and medicine, it is native to Mexico and Central America where it is known as ââ¬Å"Flores de Noche Buenaâ⬠(Flower of the Holy Night) and was used in these areas by Franciscan friars in Nativity processions as early as the 17th century.â⬠[15] In terms of sweets and baked goods, sticky cake and Christmas cake closely resemble one another. Sticky cake, also known as Neen Gow, is a fruitcake that can be either steamed or baked. This particular cake is made in appreciation for the kitchen god. The Christmas cake started out as porridge from the English, evolving over the past couple of centuries into a fruit cake. The ingredients usually consist of eggs, flour, su gar, butter, marzipan, spices, dried fruit, spices, and whisky. ââ¬Å"All Christmas cakes are made in advance. Many make them in November, keeping the cake upside down in an airtight container. A small amount of brandy, sherry or whisky is poured into holes in the cake every week until Christmas. This process is called ââ¬Å"feedingâ⬠the cake.â⬠[16]Both celebrations are also known for the process of giving and receiving gifts to friends and/or relatives. For instance, during the Chinese New Year, individuals will give gifts, which ââ¬Å"are usually brought when visiting friends or relatives at their homes. Common gifts include fruits (typically oranges, and never pears), cakes, biscuits, chocolates, candies, or some other small gift.â⬠[17] Christmas gifts are also distributed, and some gifts can be similar to those that are given on the Chinese New Year, but Christmas gifts usually consist from a large variety of options. For example, food, alcohol, jewelry, elect ronics, toys, household appliances, automobiles, etc. Christmas and the Chinese New Year are both important celebratory occasions, which can bring joy and anticipation amongst those whom celebrate these events. These are times when family, friends and even complete strangers, can come together in harmonious enthusiasm. Both events contain similarities, such as, folk lore, feasts, decorations, gifts, traditions, songs, poems, flowers, God(s), games, etc. Christmas, a westernized occasion, may contain different significance and symbolic meanings to those whom celebrate it rather than those whom celebrate the Chinese New Year. But, the most important thing about these two occasions, even with their differences, is they bring people together, and are both accepting towards all cultures and beliefs. Works Cited Retrieved November.28, 2009 from http://www.wikipedia.org/chinesesnewyear Retrieved November.28, 2009 from http://www.educ.uvic.ca/faculty/mroth/438/CHINA/taboos.html Retrieved November.28, 2009 from http://www.ci.lenoir.nc.us/index.asp?Type=B_EVSEC=%7BF083A2AC-A24E-4B3B-8944-F912226F078D%7DDE=%7B817E6FA1-42C1-4B01-8A28-F0EF2477494F%7D Retrieved November 27, 2009 from http://en.wikipedia.org/wiki/Christmas_Eve Retrieved November.28, 2009 from http://www.familyculture.com/holidays/chinese_new_year.htm (December.2, 2001)The Guide to Life, the Universe and Everything. Retrieved November.28, 2009 from http://www.bbc.co.uk/dna/h2g2/A665949 (February.8, 2007) Popular Chinese New Year Plants. Retrieved November.28, 2009 from http://www.nparks.gov.sg/blogs/garden_voices/index.php/2007/02/08/popular-chinese-new-year-plants/ Davis, John K. (November.10, 2009)The Origins of Traditional Holiday Plants. Retrieved November.28, 2009 from http://botany.suite101.com/article.cfm/the_origins_of_traditional_christmas_plants Retrieved November.28, 2009 from http://www.nparks.gov.sg/blogs/garden_voices/index.php/2007/02/08/popular-chinese-new-year-plants/ Retrieved November.28, 2009 from http://botany.suite101.com/article.cfm/the_origins_of_traditional_christmas_plants Retrieved November.28, 2009 from http://www.northpolesantaclaus.com/santahistory.htm Retrieved November.28, 2009 from http://www.bbc.co.uk/dna/h2g2/A665949 Retrieved November.28, 2009 from http://www.chinapage.com/newyear.html Retrieved November 27, 2009 from http://en.wikipedia.org/wiki/Christmas_Eve References Retrieved November.28, 2009 from http://www.wikipedia.org/chinesesnewyear Retrieved November.28, 2009 from http://www.educ.uvic.ca/faculty/mroth/438/CHINA/taboos.html Retrieved November.28, 2009 from http://www.ci.lenoir.nc.us/index.asp?Type=B_EVSEC=%7BF083A2AC-A24E-4B3B-8944-F912226F078D%7DDE=%7B817E6FA1-42C1-4B01-8A28-F0EF2477494F%7D Retrieved November 27, 2009 from http://en.wikipedia.org/wiki/Christmas_Eve Retrieved November.28, 2009 from http://www.familyculture.com/holidays/chinese_new_year.htm (December.2, 2001)The Guide to Life, the Universe and Everything. Retrieved November.28, 2009 from http://www.bbc.co.uk/dna/h2g2/A665949 (February.8, 2007) Popular Chinese New Year Plants. Retrieved November.28, 2009 from http://www.nparks.gov.sg/blogs/garden_voices/index.php/2007/02/08/popular-chinese-new-year-plants/ Davis, John K. (November.10, 2009)The Origins of Traditional Holiday Plants. Retrieved November.28, 2009 from http://botany.suite101.com/article.cfm/the_origins_of_traditional_christmas_plants Retrieved November.28, 2009 from http://www.nparks.gov.sg/blogs/garden_voices/index.php/2007/02/08/popular-chinese-new-year-plants/ Retrieved November.28, 2009 from http://botany.suite101.com/article.cfm/the_origins_of_traditional_christmas_plants Retrieved November.28, 2009 from http://www.northpolesantaclaus.com/santahistory.htm Retrieved November.28, 2009 from http://www.bbc.co.uk/dna/h2g2/A665949 Retrieved November.28, 2009 from http://www.chinapage.com/newyear.html Retrieved November 27, 2009 from http://en.wikipedia.org/wiki/Christmas_Eve Retrieved November 27,2009 from http://www.calendar-updates.com/info/holidays/us/christmaseve.aspx Retrieved November 27, 2009 from http://www.ornamentshop.com/history_story/part1.asp Retrieved November 27, 2009 from http://en.wikipedia.org/wiki/Christmas_Eve Retrieved November 27, 2009 from http://en.wikipedia.org/wiki/Christmas_Eve Retrieved November 27, 2009 from http://en.wikipedia.org/wiki/Christmas_Eve Retrieved November.28, 2009 from http://www.northpolesantaclaus.com/santahistory.htm Retrieved November.28, 2009 from http://www.northpolesantaclaus.com/santahistory.htm (December.2, 2001)The Guide to Life, the Universe and Everything. Retrieved November.28, 2009 from http://www.bbc.co.uk/dna/h2g2/A665949 Retrieved November.28, 2009 from http://www.chinapage.com/newyear.html Retrieved November.28, 2009 from http://www.wikipedia.org/chinesesnewyear Retrieved November.28, 2009 from http://www.educ.uvic.ca/faculty/mroth/438/CHINA/taboos.html Retrieved November.28, 2009 from http://www.educ.uvic.ca/faculty/mroth/438/CHINA/taboos.html Retrieved November.28 2009 from http://www.educ.uvic.ca/faculty/mroth/438/CHINA/taboos.html Retrieved November.28, 2009 from http://www.educ.uvic.ca/faculty/mroth/438/CHINA/taboos.html Retrieved November.28, 2009 from http://www.ci.lenoir.nc.us/index.asp?Type=B_EVSEC=%7BF083A2AC-A24E-4B3B-8944-F912226F078D%7DDE=%7B817E6FA1-42C1-4B01-8A28-F0EF2477494F%7D (February.8, 2007) Popular Chinese New Year Plants. Retrieved November.28, 2009 from http://www.nparks.gov.sg/blogs/garden_voices/index.php/2007/02/08/popular-chinese-new-year-plants/ Davis, John K. (November.10, 2009)The Origins of Traditional Holiday Plants. Retrieved November.28, 2009 from http://botany.suite101.com/article.cfm/the_origins_of_traditional_christmas_plants Retrieved November.28, 2009 from http://www.familyculture.com/holidays/chinese_new_year.htm Retrieved November.28, 2009 from http://en.wikipedia.org/wiki/Chinese_New_Year Gulf of Tonkin Incident: Military Investigation Gulf of Tonkin Incident: Military Investigation Military Intelligence Organizations Military Intelligence is a division of military the purpose of which is to exploit the number of information collected and analysis techniques in order to provide guidance and directions to commanders in support of the crucial decisions made by them. They do it by performing an analysis and assessment of the available data which they gathers from wide range of sources, guiding and directing the commanders to make decisions or respond to focused questions as part of their operational campaign. The collected information is first identified and then incorporated into the process of intelligence collection, analysis and dissemination. Military Intelligence Organizations have played their role in resolving conflicts in any nation. Discusses here is the Gulf of Tonkin Incident and the role of U.S. Military Intelligence Organizations to resolve it. The incident took place on August 2 4 1964 (Kim, 1999). This was the incident that helped the Americaââ¬â¢s involvement in Vietnam War. Gulf of Tonkin Incident Overview When President Lyndon b. took over charge of the country after the death of President John F. Kennedy, he became worried about the South Vietnamââ¬â¢s ability to keep away the Communist Viet Cong guerillas that were actively operating at that time in the country. In order to follow the established policy of containment, the Secretary of Defense at that time Robert McNamara started to increase the military aid to South Vietnam (Trueman, 2000). Many Norwegian built fast patrol boats (PTFs) were purchased and sent to South Vietnam. These PTFs helped in conducting a series of attacks on coastal areas of South Vietnam as part of Operation 34A. 34A was originally began by Central Intelligence Agency in 1961, it was a extremely classified program of the covert operations against North Vietnam. Due to several early failed attacks, in 1964 it was transferred to Military Assistance Command, Vietnam Studies and Observations Group, and the focus of it was shifted towards maritime operations. In due course of time, U.S. Navy was also instructed to conduct Desoto patrols off the North Vietnam. The Desoto Patrols consisted of the American warships cruising in international waters in order to conduct electronic surveillance operations (Shane, 2001). As a result of 34A and the Desoto Patrols, the ships offshore were made able to collect important information about the North Vietnamese Military capabilities. The First Attack On July 31, 1964 the destroyer USS Maddox conducted the Desoto Patrol off North Vietnam (Paterson, 2008). Under the operational command of Captain John J. Herrick, it steamed through the Gulf of Tonkin collecting intelligence information. This mission was accompanied by several 34A attacks including many big attacks on two islands of North Vietnam. The Government of North Vietnam decided to strike the USS Maddox and on August 2, three Soviet built P-4 Motor torpedo boats were dispatched to attack the destroyer. About twenty-eight miles cruising in international waters, the torpedo caught the USS Maddox. In the meanwhile, Herrick requested for air support from the U.S. Air Force. The request was granted and the four F-8 Crusaders were sent towards the Maddox position. Herrick also ordered to fire the three warning shots if the torpedo reaches a range of 10,000 yards of ship. These warning shots were fired and the P-4s launched their first torpedo attack. The Maddox scored fire on P-4s and was just being hit by one 14.5 millimeter machine gun bullet. Soon after fifteen minutes, the F- crusades arrived to rescue the Maddox and started hitting the targeted fires on North Vietnamese boats, damaging the two and leaving the third one dead in the waters. The attack was retreated and the Maddox returned to join its friends but the Desoto mission was continued as per orders of the commander in the Pacific. The Second Attack On August 4, the American radars, sonar and radio signals were received of another North Vietnam attacks. Taking evasive action, the U.S. Maddox fired on numerous radar signals targets. After this incident (Parados, 2004), Herrick was not sure that his ship was attacked by the North Vietnam. Reporting at 1:27 AM Washington times that due to freak weather, the radar and sonar signals did report some of the enemy ships but nothing has been visualized by the Maddox. After suggesting the complete evaluation of the affair conducted by the U.S military intelligence, Herrick radioed a request asking for a complete reconnaissance in daylight by the aircrafts. But the American aircrafts flying over the area failed to find out any North Vietnam ship. Although there were doubts about the second attack, those present on Maddox were convinced that the attack did happen. This along with the flawed signals intelligence from the National Security Agency led the forces to attack retaliatory airstrikes against North Vietnam. On August 5, the Operation Pierce Arrow saw aircrafts from USS Ticonderoga and USS Constellation strike and attack about thirty North Vietnam vessels. Although the subsequent research and records prove that the second attack didnââ¬â¢t happen. This was also reinforced by the statements from the retired Vietnamese Defense Minister who admitted the August 2 attack but denied the second attack. After ordering the airstrikes, soon Johnson went on to address the nation on television regarding the incident. He in his address requested the passage of a resolution, which expresses the unity and determination of the United States in support of their freedom and in the hope to protect peace in the Southeast Asia (Cohen Solomon, 1994). He also argued that he didnââ¬â¢t want a wider war, and said that United States would continue to protect its national interests. As approved on August 6, 1964, the Southeast Asia (Gulf of Tonkin) Resolution, gave Johnson the power to use military intelligence and force in the region without requiring a declaration of war. Later on over the next few years, Johnson used this resolution to rapidly escalate the U.S. involvement in the Vietnam War. Intelligence has fulfilled the wider ranging and very important functions in different section including security, diplomacy and statecraft (Augustin, 2009). However in past few years, the role of military intelligence in resolution of conflicts has expanded and broadened its range and now it forms the core element of conflict management policies and procedures. Ancient Greece is the first democracy in the world. It has established several institutions that served as intelligence services. Proxenia were the upper class citizens of Greece who served as top class agents. They used to collect information and even executed the assassinations if required. The Heralds collected the public and private information. Both were protected by the Law of Greece and only the Heralds used to get the rewards of bringing good news back to the nation. Greece impressive political and military achievements really lacked the true intelligence system like today. Although they didnââ¬â¢t have the proper intelligence system like today but still they had the intelligence cycle existed in their military endeavors. The two major requirements of intelligence services are democratic control and the effectiveness of the actions and activities (Augustin, 2009). African countries always had difficulties in managing and creating the solid intelligence systems. The territory of the Sahara Dessert is always problematic so the military intelligence related to that area is restricted. In 1997, the African countries created a security sector reform whose purpose was to try and narrow the challenges and constraints of developing a proper military intelligence system in the area. The main challenges that African countries are facing these days include the legacy of the African socialism and colonialism, autocratic military and security services and the unknown and informal activities of the military intelligence services. Gambia established the National Intelligence Agency in order to protect the regime. The unsuccessful attempts of Eisenhower and Kennedy to remove Castro from the power are considered as the failed military intelligence actions (Augustin, 2009). According to them the biggest threat to democracy is the communism. In Cuba, the America supported the Batista leading anti-communist government. After Castro being elected to power, he started quickly eliminating his enemies. And started to nationalize the economy and created knots with the USSR. His actions made it clear by 1960 that he was following the communism path for the Cuba. Eisenhower tried to remove the Castro from power by training Anti-Castro forces and sneaking them into Cuba. They began to target the Cuban sugar fields and the CIA developed an assassination program to eliminate Castro. Although such attempts were failed again and again, Kennedy tried to invade the Cuba by the Bay of Pigs operation but that was again a failure. This was all due to the strong military intelligence of Castro which saved him from all the American attacks. The Shah of Iran has a weak legitimacy and had lot of enemies (Augustin, 2009), ], so to overcome them in 1957, he formed the SAVAK, a national intelligence and security organization. The SAVAK served a tool to torture and eliminated anyone who could prove as a threat to the Shah and his dynasty. No open opposition was allowed against the institution in Iran during Shah Regime, but with the passage of time the resistance of people became worst. Khomeini got exiled to Iraq and then to France because of his increasing popularity and threat to his life. In 1977, censorship law was introduced in Iran in order to retain the Shahââ¬â¢s power but due to his detachment from the public, the public dismissed him and Khomeini came to power after the over throw of the Shah of Iran .In 1980 under the rule of Reagan (Augustin, 2009), The U.S. Intelligence Community realized a need for more intense intervention in Central America in order to stop the communist expansion. El Salvadorââ¬â¢s mil itary government was the only potential barrier against the communism in the Central America. The DIA also tried to help the government of El Salvador to assist them fight against the leftist group called as FMLN. The DIA worked and operated with the direct military intelligence information sharing and between 1987 to 1989 a guerilla attack was made by the FMLN which surprised the El Salvador and the American armies. This also showed that how little the U.S support helped. Over all the defense of the El Salvador is considered as the failure in the history of the U.S. military intelligence. Intelligence is basically the sociological phenomenon that is used for the information gathering and to ensure the prevention of hostility (Augustin, 2009). It is important to differentiate between the intelligence that has been existed in any nation and the intelligence that is established as a result of state concept. Intelligence cycle, covert actions and counter intelligence are all the components necessary for decision making process. Intelligence focuses on the hostility both in democracies and non-democracies tenures. Intelligence in democratic system must have strong relations with the citizens and must work under a legal framework. The functions and scope of working of intelligence agencies must be clarified and their methods of working and sources of information must be protected. However intelligence in the non-democratic system concentrates more on internal opposition rather than external threats. So the intelligence is outside of the scope of legal framework in non-democ ratic system while intelligence in democracies should only be used to measure level of democracy in the country. In 1960, the Egyptian forces entered in Sinai which was a big surprise to Israel (Augustin, 2009). The IDF couldnââ¬â¢t respond in time and it lead to the result that intelligence was needed for an earlier warning of possible Egyptian attack. The methods or tools for an earlier warning were HUMINT, the SIGINT and the VISINT. The 1960 rotten affair and the 1973 Vom Kippur war failure show failure of the intelligence system and a need for strong intelligence system. References [1] Sankt Augustin (2009), Intelligence and Democracies in Conflict and Peace, retrieved from,à http://www.kas.de/israel/en/publications/18450/ [2] Tom Kim (1999), The Gulf of Tonkin Incident 1964, retrieved from,à http://www.thenagain.info/webchron/usa/GulfTonkin.html [3] Chris Trueman (2000), Gulf of Tonkin 1964, retrieved fromà http://www.historylearningsite.co.uk/gulf_tonkin_1964.htm [4] Scot Shane (2001), The Gulf of Tonkin Incident, retrieved fromà http://911review.com/precedent/century/tonkin.html [5] Lieutenant Commander Pat Paterson, U.S. Navy (2008), The Truth about Tonkin, retrieved fromà http://www.usni.org/magazines/navalhistory/2008-02/truth-about-tonkin [6]à John Parados (2004), The Gulf of Tonkin Incident, 40 Years later, retrieved fromà http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB132/ [7] Jeff Cohen and Norman Solomon (1994), 30-Years anniversary, Tonkin Gulf Lie Launched Vietnam War, retrieved fromà http://fair.org/media-beat-column/30-year-anniversary-tonkin-gulf-lie-launched-vietnam-war/
Friday, October 25, 2019
Personal Narrative- Random Story About my Life :: Personal Narrative, Autobiographical Essay
Personal Narrative- Random Story About my Life One of them was that I was on my journey with someone. I was on the journey with my boyfriend Dusty whom I have been with for four years. I am more like myself when I am with someone, especially Dusty, than when I am by myself. I do think that spending time with just yourself is a waste of time. You should just be out talking to people because who knows when that dreaded day of death will come. I think that you should just seize the moment and spend time with people. When I am by myself, I am quiet and withdrawn, but when I am with people, I talk up a storm and have a fun time just being me. I donÃâ¢t hold things back or try to act like someone IÃâ¢m not. Another similarity was when I was talking about the rocks. This is what I said. ÃâOh my gosh, we just ran into a huge cave filled with rocks. There are rocks everywhere. It is like a rock country. I can not believe it. There are small rocks, big rocks, pretty rocks, ugly rocks, thin rocks, and fat rocks. It is so amazing. There are rocks on top of the cave that are starting to bother me, they are very big, and they do not look too steady up there. I do not know about those. I tell Dusty and Duke to get away from there because I donÃâ¢t want them to get hurt if the rocks were to fall. Duke does not want to listen; he tries to climb up the side of the cave to get a better look at the rocks on top. As he goes up, one of the rocks he is on begins to fall. Duke falls with it and he is not moving. Dusty goes over and shakes him and thank god he is alright.Ãâ I think that this describes exactly how I deal with problems and how I see problems in my life. I always see them as these am azing ordeals and they often scare me. Then something will happen and I will think that it is going to be the end of the world, and then everything turns out to be just fine in the end. The last thing was when we were all in the garden and this was describing my childhood.
Thursday, October 24, 2019
Pepsiââ¬â¢s Needs Assessment Essay
Every organization at some point must design a training and development program to make sure that the managers and employees get the skills that it would take to perform their job. In order to design a training and development program, the organization must conduct a need assessment. ââ¬Å"Need assessment is the process used to determine if training is necessary; it also is the first step in the Instructional System Design model (Raymond A. Noe). In order a training need assessment to be conducted, the training manager need to know the organization goals and objective, must know the jobs and its related tasks that need to be learned, must know the skills and competencies that are needed to perform the job, and also must know who will need to be trained. The need assessment has three levels of analysis such as organization analysis, individual analysis, and task analysis. Through this paper, there will be some discussion on the three levels of analysis and Pepsiââ¬â¢s training nee d assessment. Levels of Analysisà The first level of analysis is organization analysis. ââ¬Å"Organizational analysis looks at the effectiveness of the organization and determines where training is needed and under what conditions it will be conducted (http://www. ispi. org/pdf/suggestedReading/Miller_Osinski. pdf). â⬠Organizational analysis is identified by the environmental impact (OSHA, FMLA, etc. ), changing work force demographics, changing technology and automation, political trends such as sexual harassment and workplace violence, and how effective is the organization in meeting its goals. Information needed to conduct an organizational analysis can be found through; strategic plans, turnover rates, accident reports, customer complaints, mission statements, cost of materials, audits, change in equipment, annual reports, and employees attitudes and satisfaction. The second level of analysis is task analysis. ââ¬Å"Task analysis provides data about a job or a group of jobs and the knowledge, skills, attitudes and abilities needed to achieve optimum performance (http://www. spi. org/pdf/suggestedReading/Miller_Osinski. pdf). â⬠Organization can collect task analysis from job, KSA, performance standards, observe the job, perform the job, and conducting a job inventory questionnaire, and find out all the operating problems if any. Without the task analysis, the organization would not know what areas to train the employees in when it comes to their job performance. The third level of analysis is the individual analysis. Individual analysis analyzes how well the individual employee is doing the job and determines which employees need training and what kind (http://www. ispi. org/pdf/suggestedReading/Miller_Osinski. pdf). â⬠There are many sources an organization can use to conduct an individual analysis. The first sources are performance evaluation, which shows areas of weakness. The second source is employeeââ¬â¢s performance, which includes absenteeism, productivity, lateness, product waste, quality in work, and customer complaint. The third source is interviews. HR can simply have a talk with the managers, supervisor, and employees to what it is they need to learn more about. There so many other sources that can be used to conduct an individual analysis. After the individual analysis, the individual that needs training will be able to get the additional help that they needed. Pepsiââ¬â¢s Need Assessment ââ¬Å"Pepsi believes that for their associated to thrive, they must continue to provide a supportive and empowering workplace. Which includes giving associates the opportunity to learn and grow professionally through regular training and proven career development tools, as well as the transfer of best practices, skills, knowledge and technology across the businesses (http://www. pepsico. com/Purpose/Talent-Sustainability/Associate-Learning-and-Development. html). â⬠Pepsi offers their associateââ¬â¢s specific job training that is required in order for them to perform their job. Pepsi also offered associates the opportunity to attend professional conferences to enhance their skills. Pepsiââ¬â¢s year-long proprietary career process includes objective-setting, performance and development reviews, development action plans, midyear reviews and 360-degree evaluationsââ¬âall supported by training and materials. Executive leadership training focuses on helping high-potential managers learn to be more effective leaders and to gain a broader perspective on our business. All associates are included in some form of the performance management process across PepsiCo (http://www. pepsico. com/Purpose/Talent-Sustainability/Associate-Learning-and-Development. html). Pepsiââ¬â¢s 360-degree feedback is used to focus on building self-awareness by linking to a best-in-class personality assessment inventory. Pepsi also uses survey to help them find ways for improvement. With Pepsi being all over the world, it is important to Pepsi that every employee conduct the survey. Pepsi recognize the concerns of their employees and they look for more and more ways to make sure employees and trained properly and become very successful within their career. Conclusions Implementing the needs assessment is very important for any organization. Needs assessment focus on the urgent training needs within and organization which is based off the information that is provided from the managers, supervisors, and employees. Pepsi being a billion dollar company knows the importance of need assessment. The three levels of analysis must be conducted or weighted out in ordered to have a successful training need assessment. At the end of the need assessment, you must evaluate the training and development program to make sure that all the needs were met.
Wednesday, October 23, 2019
Created in the Image of God Essay
The theme ââ¬Å"Created in the Image of Godâ⬠is saying that everyone is special and no human life should be wasted because God loves us all equally and has a plan for everyone. This theme also explains that everyone is created differently for a reason. The song Donââ¬â¢t Laugh at Me is about the people in the world that are made fun of and Mark Wills is saying that in Godââ¬â¢s were all the same. The song Donââ¬â¢t Laugh at Me represents the theme ââ¬Å"Created in the image of Godâ⬠because Mark Wills is explaining that God made us all different for a reason and he loves us all equally and we shouldnââ¬â¢t be treated different because we have braces or because we are blind; we should all be treated the same. The theme of Narcissism is a self-centered love. Narcissism is when you love the way you look more than you love others, it is being obsessed with the way you look. The TV show Jersey Shore is a show where there are eight people living in a house and they go partying every night and they are all obsessed with the way they look. The TV show Jersey Shore represents the theme of Narcissism because the cast members of Jersey shore are all obsessed with the way they look, they go to the gym every day, they spend way too much time on their hair and on their clothes. The theme ââ¬Å"When Love Goes Wrongâ⬠is explaining to us when we should know that your relationship is not good anymore and if we realize these things happening in our relationship, we should get out of the relationship. The song The Best Days of Your Life is about a guy cheating on his girlfriend and he got the other girl pregnant. His girlfriend is now trying to get over him. The song The Best Days of Your Life represents the theme ââ¬Å"When Love Goes Wrongâ⬠because the couple in the song, their relationship was ruined when the boyfriend cheated on his girlfriend. The theme of inclusivity is including everyone and making them feel welcome even if you arenââ¬â¢t best friends with them. The picture I chose of children playing shows the three children sitting down playing and one child standing and it represents the three children letting the one child play with them. The picture of children playing represents the theme of Inclusivity because these children are letting the one child play with them even though they may not like that child, they are being nice and letting him play with them, because they are doing the catholic thing to do by letting him play with them.
Subscribe to:
Posts (Atom)