Wednesday, July 31, 2019

Alum Lab Conclusion Essay

The purpose of this laboratory was to use two different techniques to attempt to identify the melting point and the mole ratio of hydrated water to anhydrous aluminum, potassium, and sulfate of AlKSO4. The hypotheses were: if the alum was put in a capillary tube the melting point of alum will be able to be determined; and the water of hydration in alum crystals will be possible to determine if the alum is heated with a Bunsen burner. Results: Every compound has its own unique sets of chemical properties. Alum crystals are of great purity and are easily prepared. Because of their purity, they are often used in dyeing cloth, where the alum acts as a source of Al+3 ions which are not contaminated. These properties can be determined experimentally and in this experiment as mentioned above, a few properties of alum were being determined. The first test was to identify the melting point of the alum and compare it to the published value that already exists. The melting point of a substance is a property that indicates at what temperature it goes through a state change of solid to liquid. In order to do this, the alum was placed in a water bath and heated. In the second part of the experiment, the alum was analyzed for water of hydration. When an ionic compound is prepared in aqueous solution and isolated by crystallization, water molecules are incorporated into the compound in fixed proportions. The amount of water incorporated is referred to as the water of hydration. This amount cannot be predicted, so it must be determined experimentally. In order to do this, the alum was heated until all the water was driven off. After the completion of the experiment, it was discovered that the results extracted were very close to the expected results. As seen in the data table, the literature melting point and the one obtained in the experiment were only a little more than .5 away from each other which means pretty accurate results were taken away from this experiment. In regards to the second part of the experiment, a way to see precision in the results would have been to do a second heating of the alum in the crucible. Time, however, did not allow for this so if the experiment was to be done again, better results may be obtained by another trial of that part. This experiment overall was a very good example of how certain properties of substances can only be obtained through experiment. It also showed new techniques of determining properties like melting point and water of hydration that could be used in future experiments.

Tuesday, July 30, 2019

Jesuit Relations Proposal Paper Essay

The views taken by the Jesuits and Hurons towards medicine and disease varied during the spread of old world disease among the native population of North America. These two groups had very different ways of dealing with the diseases and there use of medicine. Throughout the reading of chapter 3 in the Jesuit Relations book, we see certain ways that these two groups collided heads because they did not seem to agree with each other’s methods. They (Jesuits and Hurons) both wanted to do help their town population and the only ways they knew what to do is what their culture and people had already done years before. Some of the methods of these groups worked while others not so much. First point of view to be touched on is the Jesuits and what their role was during the old-world diseases. The Jesuits really focused on the question of why rather than how disease spread (The Jesuit Relations, page. 71). They questioned it, meaning disease, and believed that it was God’s plan to get certain people sick to â€Å"punish the wicked, test the resolution of the virtuous, or simply gather souls to heaven† (The Jesuit Relations, page 71). They thought God was testing them and was punishing certain groups or people. The Jesuits were already immune to some of the diseases that is why there population did not get hit as hard by some of the old-world diseases then others. Their main idea was that they (Jesuits) are that they were not doctors. All they wanted to do is to save the souls of the sick, and as well as that they baptized the dead. The Jesuits did not believe in reviving and curing the dead. This was all apart of Gods way and the sick would be baptized and join his or her family and friends in heaven. That was their idea and these people understood this and believed that it was the right thing to do; it was the way of God. Another idea they believed in was that if a person is ill, that he or she should isolate themselves from the rest of the population. They could not help or do anything so it was better for them to be on their own until they were cured of their illness. This idea was very popular back home but when they ventured to the new world and saw what other people were doing, it really did not stick with them well. While they believed in their own ideas, they also would see what the Hurons did for their medicine and curing abilities. The Jesuits were surprised that the Hurons were so in touch with mother earth and not God. This really set the Jesuits and they did not like the new ideas. They could not believe that the Hurons did not believe in going to heaven. From the excerpt, The Help We Have Given to the Sick of Our Village, from the Jesuit Relation book â€Å"For my part, I have no desire to go to heaven; I know no one there†¦Ã¢â‚¬  (The Jesuit Relations, Page 81) this shows the Huron’s point of view for heaven. The Jesuits could not understand this unspiritual answer; they questioned the native and all they had to say. As the Jesuits have their ways of dealing with the disease, the Hurons had their own ways of dealing with the diseases as well. The Hurons were people of the land and had their own ways of dealing with the old-world diseases. As I mentioned earlier, the Hurons did not believe in going to heaven and baptizing the dead like the Jesuits felt. Hurons believed in natural medicines and curing people through sports as well as through spiritual healings. They felt as though they knew mother earth and knew that there were natural cures for certain sicknesses. Many Huron procedures involved the sickened personal mind and body. At first I was shocked that they played sports back in this time but as you think about it, it was a great idea on their behalf. â€Å"Little demon as large as a fist† (The Jesuit Relations, Huron Medical Practice, Page 72) this what the Hurons believe causes the pain in a sick person. They thought that some of these demons would come into your body when you are sleeping at night to enter your body through your dreams. To get these demons out and to be cured, the sick person would either play some sports or go through spiritual healings. They believed that these sports like Lacrosse, Dish and Straw (The Jesuit Relations, Page 73), were good for the body and they could run it off to keep the body healthy. The demons would exit their body through these sports and thus curing the sick person. Hurons would have big games and tournaments when they thought there was a bad epidemic as well as when there were multiple people ill. These people that were sick were advised to show up to the games so they could finally be healed. If the person who is sick cannot make it to the game then they have to be patient and wait while his people play for his wellbeing. It brought everyone together and these people, that were ill, brought all their lucky stuff and believed that it would help them overcome their illness too. The whole community was supportive. The Jesuits were shocked at this way of treatment because they did not think that would help the people and it was a waste of time, but to the Hurons it was their way of life. Not only did they think sports would help but also through spiritual healing and natural medicines like certain herbs. The sickened would go to these shamans, a spiritual / medical specialist, who would tell them what their best option would be. Sometimes it would be sports; other times they would give the sickened certain herbs that will cure their disease. It was a long process but it worked for the Hurons. The Hurons also sometimes blamed the Jesuits for some of the diseases that entered their land and believed that Jesuits were hostile sorcerers. As we can see, these two groups did truly have different views and roles on the diseases and medicines of this time. Each group’s views were shocking to each other because they could not agree with which methods worked better and what was more reliable. In the eyes of the Jesuits, they believe that it is the way of God. Sickened people need to isolate themselves and try to cure themselves, but if they do perish then their soul shall go to heaven. The way of the Jesuits is just God is on your side and it is ok to die because you will go to heaven. On the other hand you have the Hurons who are people of mother earth and sports. They believe that the sickened need to play sports to be cured and to have shamans perform mind and body work on the individual to be cured. The way of the Hurons is more natural and makes you fight for your life. The ideas are very different but those are the roles that these the Jesuit and Huron groups played during this time, which signifies and shapes each group into who they are.

Monday, July 29, 2019

Implementing Total Predictive Maintenance Essay

Implementing Total Predictive Maintenance - Essay Example It appeared that manufacturers with efficient and effective equipments where enjoying a competitive advantage over others. Traditional methods used by technicians were being labeled as passive and non-productive. The manufactures did not take long in realizing that proper maintenance management and control of machines and equipment have a stronger and direct relationship with organizational performance and productivity. This was the time when the concept of â€Å"Total Productive Maintenance (TPM)† (Seng, Jantan & Ramayah, 2005) appeared on the scene aiming at improving the efficiency and effectiveness of the equipment by using the skills and abilities of the human resource of the organization. The ultimate target is to improve the â€Å"Overall Equipment Efficiency (OEE) and reach to the level of Zero Defects and Zero Breakdown† (Seng, Jantan & Ramayah, 2005). The paper sheds some light on the optimum use of TPM in the Malaysian Manufacturing Industry and some implementation issues. The literature review reveals that the strategies concerning TPM can be divided into Human orientated strategies and Process orientated strategies. Human oriented have three important aspects. ... ing and education is another important factor for the success of TPM because it introduces employees to TPM in a systematic and educated manner, providing them with information before hand and preparing them for the upcoming issues and challenges. Process oriented strategies have their roots in the technical approaches. â€Å"The goal is identify all possible sources of losses and inefficiencies in the equipments due to breakdowns, time loss, shortage of equipments, defects, startup time and others† (Seng, Jantan & Ramayah, 2005). The simple three-point agenda process oriented strategy is to first, find such losses and analyze its causes, second, planning improvements to cope up with losses and third, confirming and building on the results. In short, process oriented strategies put all their energies in creating environments and processes where employees could be provided with an optimal environment to achieve satisfaction and higher productivity, which would ultimately lead t o higher organizational performance. The paper moves on with considering the problem of implementation of TPM in a developing country such as Malaysia (Seng, Jantan & Ramayah, 2005). Despite the fact that its implementation is imperative, at least for the manufacturing industry, however, resistance towards TPM has come from all directions. Non-conductive and unsupportive environments, lack of commitment and dedication from the top management, refusal of employees to take up extra training and responsibilities and others remain important causes marking the failure of TPM. In order to understand various dimensions of this problem, the paper moves forward with a structured survey approach where questionnaires have been used as the research tool. Industrial manufacturers from Northern and Central

Sunday, July 28, 2019

Assessed assignment 2 - Data Analysis Exercise Essay

Assessed assignment 2 - Data Analysis Exercise - Essay Example The plural form of ‘time’ is used in English but in specific contexts and with different connotations. Lot of – the speaker has used this term to qualify both count as well as non- count nouns. He seems to prefer this term and has never used ‘very† or â€Å"many’ as native speakers would have done. One children, a children –We do find subject verb agreement between â€Å"are’ and ‘children’. The speaker says, â€Å"there are only one children.’ For the native speaker, it is an irregular plural but the speaker has mis-analysed the form, hence his use of one/a is consistent with his treatment of this form as singular. We can conclude that for speaker A, children is semantically singular but syntactically plural. The bare verb form is used as nominals where native speakers would use –ing form for deriving nominals from verbs in these contexts. When –ing forms of verbs are used as nouns or adjectives they are called gerunds. Own – this word sounds more or less like earn. Perhaps, the speakers have never come across the word in writing or have never learnt it as an item of vocabulary, but may have just heard the word from others in speech. Hence they replaced it by the similar sounding word that they knew. Independent, independence – Both have made a different kind of mistake and both are incorrect. When natives speak about being independent of something, there is an implication that it was a nuisance or troublesome. It cannot be said about parents. The speaker B uses the noun form where the adjective form should be used. From the use of the above regular and irregular plurals, we can conclude that speaker B uses these words correctly and target like. He seems to have understood the count noun singular –plural contrast. CONCLUSION – The two speakers are similar in the way they diverge from the expected target forms in some respects, and different in other respects.

Saturday, July 27, 2019

Arguments of Cause and Effect Assignment Example | Topics and Well Written Essays - 500 words - 1

Arguments of Cause and Effect - Assignment Example When an argument of such magnitude is coming from an individual that has worked in NASA and who made the predictions that are happening today in terms of climate changes years before it happened, it tends to reinforce the prior ideas and theories on global warming making it much more compelling than other arguments (Hansen, 2012). According to Hansen, it is the increase in the greenhouse gases being emitted in the planet that increases the levels of CO2 in the atmosphere. This CO2 in turns blankets the earth creating an imbalance of heat and hence increasing the heat levels in the earth. It is as a result of the increased heat that rains have increased as well as glaciers started to melt. These arguments have been made purely from arguments of facts as the information is drawn from the research Hansen carried out with his team of the greenhouse gas emission and on the effects of these to the climate of the earth. Balog similar to Hansen is arguing that people are not taking the issue of global warming seriously. It is high time the matter is explained not only in plain language but using photography to bring the point home of the high rate at which glaciers are melting and the effect on the environment. The argument is presented in a series of photographs taken in different locations all over the world but presenting the same results in all of them. This method is effective as it is vivid and it helps show the real picture of what the earth is undergoing (Balog, 2009). This argument by Balog using photography reinforces the earlier arguments made through pure talk by other scientists and climate activists. With the information being illustrated and in different places all over the world as well, it becomes compelling and drives home the point about global warming and its effects to us. According to the speaker, the emission of CO2 in the atmospheres increases the temperature on earth which in turn starts melting the glaciers.

Friday, July 26, 2019

How Governments Work Essay Example | Topics and Well Written Essays - 4000 words

How Governments Work - Essay Example All nations throughout the world have some form of government. Governments are intended to be in place to protect the governed. They help keep order in most societies, provide certain common services, and protect themselves from attack by hostile countries (in most cases). The way in which these governments were formed and their laws can vary. Not all nations provide for the same level of personal freedoms as others do. Lawmakers rely on written and unwritten rules to help them determine laws for their people. Most governments are run with their people’s best interests at heart while other governments are run for the sole purpose of satisfying the best interests of leaders. A constitution can be defined as a â€Å"set of rules and customs written or unwritten, legally established by which a government conducts its affairs.† (Roskin, Medeiros, Jones & Cord, p. 46) Almost every nation has either a written or unwritten Constitution. They legally limit the authority of the government. Authority of the government is divided with laws enacted by one segment and administered by another, and an independent judiciary which acts to ensure that laws are administered fairly. Constitutions describe sections of government, their authority and individuals rights to freedom. These descriptions may change based on adaptations made on existing laws. The amendments of nearly any Constitution cannot be changed so easily however the way in which they are interpreted may change. In the United States the Supreme Court must make sure that the interpretations of various laws do not contradict the intended meaning of the Constitution. The Supreme Court’s interpret ation of the Constitution changes as time passes. For example in Plessy vs. Ferguson â€Å"the Court ruled that state laws requiring racial segregation in public transportation did not necessarily violate the Fourteenth Amendment , which provides for equal protection under the laws, as long as the transportation facilities for whites and blacks were physically equal.† (Roskin, Cord, Medeiros & Jones, p.337) However many years later the Court ruled that separate public schools for blacks and whites were unconstitutional because they did not promote equality even though the children were educated in similar facilities. Society’s ideas about the rights of individuals had changed but the Constitution itself did not. Constitutions do not have the solution for every legal problem that can arise so it does not need to be specific. Interpretation of various laws would depend on who is in power and how it may be applied to certain incidents. High courts similar to the United St ates Supreme Court in thirty other nations have this decision making

A Ethical Dilemma that was Shaped or Influenced by the Application of Assignment

A Ethical Dilemma that was Shaped or Influenced by the Application of Nursing Research - Assignment Example Ethical dilemmas can also arise when a patient’s autonomy is not respected. This is to do with the kind of treatment the patient wants, including refusal to treatment and euthanasia (Stevens, 2006). The article states that such ethical dilemmas can be solved if the nurses have better knowledge and skills, communication skills, authority and a proper knowledge of ethical principles guiding the nursing practice (Parker, 2007). Ethical dilemmas are difficult to solve. A single decision by the nurse may not please everybody concerned, including hospital management and the patient’s guardians and relatives. Although it is important to have the basic ethical principles and knowledge from research, it is still very difficult to make a decision in an ethical dilemma. Credentialing and statutory regulations are significant components of nursing practice. Without these important elements the nursing profession lacks authority to ensure protection of interests of the public (Bandman & Bandman, 2002). Licensing is meant to protect the public from unprofessional and unsafe medical practitioners while credentialing helps to verify the qualifications of medical practitioners, including

Thursday, July 25, 2019

Film Essay Example | Topics and Well Written Essays - 250 words

Film - Essay Example The deliberate use of black and white automatically gave the film a sense of realism and drama as contrasted against spectacle and fantasy. The introduction of CinemaScope also introduced the use of framing and camera angle, techniques that were used in High Noon to emphasize the growing nervousness and uncertainty in Marshall Kane as well as the passage of time (a clock is featured in nearly every scene). This ticking clock plays a central role in the plot as the hands move slowly but inexorably toward the high spot and the gun fight between Kane and Miller. The strong female character is somewhat surprising in this early film. According to Jackie Stacey (1994), women had already become recognized as the consumers of the household by the 1950s, a fact that gave them a new power outside of the home. Women were beginning to redefine their passive role in society and being â€Å"addressed as individuals and encouraged to reproduce their ‘individuality’ through the consumption of clothes, make-up and household goods† (Stacey, 1994: 186). High Noon is exceptional in that it provides women with two opposing yet equally strong female role models, the angel Amy and the vamp Helen. Helen is understood to have had several lovers, including bad guy Frank Miller, good guy Will Kane and ex-deputy Harvey Pell. She owns several businesses – she is seen selling her store (in which she has been a silent partner) and it is her name on the saloon. She is fiercely independent, having no qualms about kicking Harvey out when he dis pleases her, and wise about the people around her. Amy is similarly strong although this is not immediately apparent during the wedding ceremony. However, it is because of her religious beliefs that the ceremony takes place at the justice of the peace rather than in the church and she remains strong in her refusal to condone

Wednesday, July 24, 2019

Literature review Essay Example | Topics and Well Written Essays - 1250 words

Literature review - Essay Example Students are usually afraid of having not enough time to prepare for the exams or to complete their tasks in time. The root of evil here is not in a lack of knowledge, but very often it is inability to organize their working time effectively. In order to increase students’ abilities to catch up with educational process, it is necessary for students to spend more time on preparing for their classes (Kwan and Ko, 2002). Thus time management skills should be developed for quality increase of individual and class work. It may be also argued that if a student spends more time on preparation for classes he would succeed for sure. Not the quantity but quality plays an important role as well. For example, a student may spend 25 hours per week to prepare for classes, but he would be inattentive during the process of preparation. That’s why, â€Å"If [students] started to manage their time and feel more in control of their lives their marks went up and they seemed to get more ou t of their experience at university† (Trueman and Hartley, 1996). Thus a great advantage of time management skills development is a student’s ability to gain more knowledge and be more socially active during his study at the University. The fact that Universities rushed into developing of students’ time management skills witness the crucial importance of this aspect of students’ lives. Personal emotional conditions of students, their high-quality participation in educational process would be beneficial for their self-perfection and self-esteem (Claessens et al. 2007). Unfortunately, there is a lack of students’ interest in the development of their time management skills. In spite of the fact that numerous seminars on these topic are held in the Universities, the level of students present there is very low. â€Å"Although many seminars, workshops and orientations are held in university on the topic of time management, few students pay attention to t he advice† (Kwan, 2003). Negative aspects of time management discipline development are that students remain indifferent to this problem. Therefore it is relevant to reveal the real reasons for that. If students don’t want to manage their time and spend it on their study they should be encouraged not only theoretically but practically as well. Lectures on time management may seem boring to modern students. It would be more interesting, for example, if they had an ability to watch a funny film about a student who couldn’t manage his time and came across different mishaps and unpleasant situations. Therefore, time management should turn from a theoretically-based discipline to be more practical and creative. That’s why a suggested technique during seminars, such as funny films viewing, would encourage students to catch up with their group mates because they would be afraid of becoming a prototype for such kind of films. Moreover, an essential drawback of stu dents’ inability to manage their time is a violation of their social roles and personal lives. Being distressed and nervous because of failures in their educational process, students may loose their interests in their friends or families. It can be even suggested that a ‘brave procrastinator’ is a tender creature full of fears before his inability to cope with home task or fail during the exam. Such kind of students usually

Tuesday, July 23, 2019

Small Business and Taxation Research Paper Example | Topics and Well Written Essays - 1750 words

Small Business and Taxation - Research Paper Example Taxes on capital or even on profits reduce incentives for businesses to their efforts in investing in new equipment, increasing their levels of return on investment. Most of the taxes resulting to adverse effects include corporate tax and business rates. These taxes also reduce entrepreneurial activity rate within the UK economy. Again, increased taxes on labor like national insurance to the employers reduce the abilities of small businesses to incorporate new staff. This is said to consequently lead to the reduction of headcount by small businesses, especially due to the high costs that are associated. Empirical pieces of evidence linking high labor taxation to increased employment or low employment seem to be very strong. From a global scope, the global economy is said to have recorded an annual contraction in 1946 as its first time. Recessions such as the case of the year 2009 were argued to have been the first recession during the globalization error. This happened with a widespr ead downturn, which spread through global trade as well as the connections of financial markets. The credit crunch is believed to have been the main factor that triggered the recession (Kirchhoff, 1996). Credit crunch led to the loss of confidence amongst banks within the banking system, especially in the UK.  Other effects caused by the credit crunch involved the collapsing pieces of evidence back lending markets, which resulted from high exposure of banks to vulnerable assets like residential mortgage backed securities.

Monday, July 22, 2019

Powerful and moving poem Essay Example for Free

Powerful and moving poem Essay The vulnerability of a country that is vast and until this point as pointed out â€Å"in worth and name†. Though time has passed and â€Å"smokes dark bruise/ has paled†, it is a â€Å"wound† that is exposed beneath such bruising. The personification of the smoke highlights the weakness in humans, and then being carried onto the country itself, yet it is â€Å"soothed† by nature, â€Å"dabbed at and eased by rain†. It is as if the environment is attempting to heal the ‘exposed wound’. However the use of yet use of the word â€Å"exposing† highlights the scale of this devastation; it is as though it has been uncovered and peeled back- the country’s vulnerability is exposed and it is manifested in destruction and loss. The fact that the smoke â€Å"has paled† highlights that time has passed in which the wound has become clear to onlookers, and this wound is not only literal but metaphorical- the country is injured and was exposed to threat at that precise moment. The image of the ‘half-excoriated Apple Mac’ is presented as a metaphor for the attack that has affected the big apple. The Apple-Mac is â€Å"half –excoriated†- flayed, stripped of its skin, much like the country itself. The word â€Å"excoriated† is almost onomatopoeic as it mimics the stripped flesh (which is associated with great pain). This would cause great grief across the intended audience, and it will most likely bring back memories across the listeners. It is also significant that the Apple-Mac is described to have been â€Å"half –excoriated†- flayed, stripped of its skin, which is a similarity at this point of time as the country itself; America. The fact that the computer ‘still quotes’ Dow Jones, although it would take one person’s knowledge to know that the stock markets that day had crashed. This will also show how not only did America suffer from the losses, and ruin, but they did financially. The use of â€Å"hindsight† and â€Å"retrospect† in the sixth and seventh stanzas is indicative of the time that has passed to now look back upon the attack, perhaps in disbelief, shock, horror, and in some aspects we find ourselves awing and this suggested by the reference to the â€Å"weird prospect / of a passenger plane beading an office block†. The â€Å"force† is a nameless enemy, it does not have shape or form or identifying features and this reinforces its threat and perhaps its inevitability â€Å"moving headlong forwards, locked on a collision course†. The use of locked creates the impression that such a â€Å"collision course† is indeed inescapable- there is no getting away from that which is locked, it is immoveable and in this case pre-destined. In the Last stanza Armitage recalls the time when television footage showed helpless victims jumping from the flaming towers. The worlds which â€Å"thinned to an instant† make â€Å"furious contact†- this implies a fusion of anger and great energy, the fury spelling out wrath and pain. †. This moment of time is explored by Armitage in the final stanza; â€Å"during which†- highlighting the passage of time in which the media â€Å"framed/ moments of grace†. â€Å"Earth and heaven fused. † Armitage draws together celestial and earthly beings in the collision of earth and sky, life and death, terror and peace to mere â€Å"moments. Here the knowledge of the reader is called upon as one recalls the television footage of helpless victims jumping from the flaming towers. From this we determine that Armitage has made this poem with a hidden yearn to try and move the reader and intended audience with his strong choice of words. Whilst being simplistic, they are ‘given’ power by the genre and situation they are put into. By Arjun Nazran 10H Page of 2 Show preview only The above preview is unformatted text This student written piece of work is one of many that can be found in our GCSE Other Poets section.

Feminism in Film

Feminism in Film Feminism In Film Feminism called for positive female characters but seems to have contributed to its own decline as a political movement by refusing to recognise the body as a site of transformation and experimentation, capable of being imagined outside the notions of lack,passive, and other. A person can be masculine and feminine, active and passive, and increasingly the body is transformed through exercise, fashion, make-up, and hairstyles. Individuality is the defining feature of a contemporary consumer culture. The idea that a person can be anything he or she wants to be makes political movements like feminism increasingly unnecessary. Current society sees people as consumers and films are made for people as consumers. In capitalist societies grand political ideologies have been replaced by individual consumerism. One could ask whether feminism is relevant any more as women occupy the same roles as men in society and in films. Female characters are present in every genre, from road movies to westerns, from action to science fiction. Cinema is seen as pure entertainment in a world where individuals search for pleasure and satisfaction. The female action heroines represent similarity and difference, a middle space between binaries of masculine and feminine. They have contributed to the new spaces opened up for women in films and in societies. One could see these figures as a celebration of difference and individualism. You can be and become anything you want. It is no longer necessary to organise the world through rigid binaries. By denying women the possibility to enjoy images of active, aggressive, and even violent women without reducing them to pseudo males, feminism has lost sight of the agenda it set out to achieve. Furthermore, historically feminism like other critical movements has rarely addressed subjects that are not white and fundamentally heterosexual. Feminist film theory has inherited many of the cultural attributes and biases of its male predecessors. The centrality of sexual difference, especially in psychoanalytic feminism, and its difficulty in dealing with other differences- of class, race or sexual preference- have seemed to fix feminist theory within the very dualism it seeks to explain (Thornham, 1997). Feminism has more or less exhausted itself through its obsession with binary logic. Films are increasingly enjoyed as pure entertainment and the battle of the sexes has been replaced by celebration of difference and consumer culture. However, this does not mean that the problems addressed by feminists have been solved or that they have disappeared.

Sunday, July 21, 2019

Fault Diagnosis And Troubleshooting Information Technology Essay

Fault Diagnosis And Troubleshooting Information Technology Essay Network management is nothing but the activity which is associated with the network, which is implemented along with the technology to support the activities. Different types of merged communications and the videos are handled by network. A network is an interlinking structure which requires very much attention. It should be planned cautiously. The network devices must be configured without affecting the remaining part of the network. There may be the failures in the network, so they need to be detected and repaired. Reliability and availability are linked with the network. The role of the network manager not only observes the performance and the security of the network, they also predict the problems in the network and exceed the technologies to make that everything will work well. There exist two frameworks i.e. FCAPS and ITIL that can be useful for interpret and demonstrating the network management. In this paper we can see that how they are helpful to think about the management t ools. Now a days many of the UK public sector organizations are using ITIL. Some companies use FCAPS which is layered with TMN, but ITIL is more beneficiary when compared to FCAPS. The main objective of this paper is to provide detailed information about FCAPS and ITIL and to provide their advantages. They are helpful in managing the networks of medium and large organizations. And also compare FCAPS and ITIL, which would be helpful for NMRU for migrating to ITIL. INTRODUCTION: 1 FCAPS International telecommunications union has developed the Fcaps. They have stated it as a model and not as a product. Along with the TMN layering, ITU-T divided the functionalities provided by the management into five areas. The functionality of the FCAPS is performed at various levels of TMN. 1.1 Fault management Fault management is group of operations that performs finding the errors and correcting the defecting the errors. To be a good fault management it needs to acquire the problem, leave the information to the concerned person and observe the problems through trouble ticketing. The aim of this is to find the errors and indicate the errors that have come in the various places of network. In the short latent time the errors must be identified and rectified. It contains the functions given below, Network monitoring The main function of network monitoring is that to check whether the performance of the network is good, to have a look on the actual state of the network and also to modify the state. The fundamental step of this is to know the errors in the network and respond accordingly which occur in the network. The main aim of network monitoring is to refer the functionality of the alarms. Alarms are nothing but the messages which are sent from the network that something has occurred unexpectedly. The unexpected things can be of any kind i.e. it can be from a router that the line card is not working, a sudden change in the quality of the signal in a wireless network and some unauthorized user have entered into the network. An alarm for network is nothing but a fire alarm which occurs unexpectedly. Sometimes the alarm management synonymously acts with the fault management. Alarm management has classified into two different functions. The basic function of the alarm management is that collecting the alarms, maintaining the exact and ongoing list of the alarms and modifies the alarms. The main task is to collect the alarms from network and also create in such a way that nothing is missing which is important. This considers the alarms that are received and store it to the memory so that a human or an applicant can process it further. It also includes the persisting of the alarms, written to a disk or store in a database so that the alarms which have occurred can be built as a record. In most cases, collection of alarms includes addition of alarms, the mechanisms to check that the zero alarms have lost and we can also request for the replay of alarms. In general we will lose the alarms in different ways. For example, the transportation which is from the underground may not be tested so we may lose the information of the alarms when it is going to the application of the management. There may be the other reason for the information to be lost i.e. the network is blocked so that alarms may fail to reach the destination. In the third case, it will reach the destination but it was not collected in order because the functioning of the application or the database was not in the right way. After the collection of the alarms, it is needed to maintain the list of the alarms. The list also communicates with the operator about the current state of the entities and for instance any device is having any problems. It is essential to realise the way the alarms are being submitted to the users. The result of each alarm is entered into the list that contains the information of the alarm. The list can be examined, classified and it can be separated accordingly, such as the alarm type, the type of the network element modified, the time of the occurrence of the alarm etc. The information of the alarms can be visualized in different ways, but the topology maps are the most popular one. In the advanced alarm management, the additional functions are required to manage the alarms. For processing of the alarms the network managers are provided with the great flexibility. For example, with the functioning of the alarm-forwarding the alarms might be sent to the operator to permit for the dispatch, such as the local police will be called automatically for the home intrusion detection. Another function is that the acknowledgment of the alarm can be done by the network operator; it means they confirm that the alarm has occurred and they are under processing. And the third is clearing the alarms; to describe the condition of the alarm an alarm message has been sent. And after some time the second message is sent indicating that the condition of the alarm doesnt exist for the longer period. Two techniques are dealt with the overloading of the information. One is filtering, is it used to remove the information of the event that is unimportant, the receiver will be allowed to concentrate on the applicable event information. The other one is the correlation, it is used to pre-process and collect the data from the events and the alarms. We will discuss about these two techniques in detail. In general filtering is done not only on alarms but also on events. It is essential to hide as many as events that are not important. Filtering can be enabled in two ways; one is allowing the operators to subscribe only the limited events and also the alarms that are applicable to them, as chosen according to the criteria. By doing this the operators will receive the events that matches there criteria. And the other one which is used to filter the alarms is deduplication of alarms. The condition of the alarm might cause in such a way that it may send the same alarm repeatedly. Because the alarm which comes repeatedly doesnt contain any new information so the new instance of the alarm which is received might be removed. The process of removing the extra alarms is named as deduplication. Alarm correlation refers to alarms that must be filtered and the functions that must be pre-processed. All the received alarm messages are stopped, studied and compared with all the alarms which are probably related with each other. For example, the alarm messages might be linked up because they may have the similar problem. The general idea behind the event and alarm correlation is that rather than forwarding and reporting different messages, it is better to send a few that combine and resume the same information from different raw events. By doing in this way, the alarm messages that are reported can be automatically decreased. Fault Diagnosis and troubleshooting Network diagnosis doesnt variant a lot from medical diagnosis. The variation is nothing but the patient. When the network contains a fault then the ability to solve the problem is, immediately finding out the reason for the problem. The process of solving the problem is meant as root cause analysis. Alarm will only alert us about the symptom but not the reason for that problem. Troubleshooting will support diagnosis. Troubleshooting can simply retrieve the data about the device. Essential support is provided for diagnosis for testing a device or a network. Test can be used not only after occurring a problem but it can be used proactively i.e. we can know the problem in before it knows to the user. Avoiding the faults altogether is best for fault management. Proactive Fault Management In fault management most of the functionalities work in such way that they become active after occurring the errors. It is nothing but taking precautions in the network so that any failures cannot occur. It also includes the analysis of the alarms that recognizes the alarms that have caused due to the minor error. Trouble Ticketing There might be ten thousand users who are using a very large network. In this case, there is chance to occur hundreds of problems in one day. In those only few or none of the problem can be solved. There might be many individual users who are experiencing problems which might be serious to them. Trouble ticket doesnt result for every alarm, issuing that many is not possible. 1.2 Configuration Management In this the first step is to configure the network. In this the hardware and also the programming changes, considering the new programs and the equipments and adding them to the previous one, existing systems should be modified and removal of the unused systems and the programs. A list should be kept so that the equipment and the programs are kept and they are regularly updated. Configuring Managed Resources In the beginning of the configuration management, the activities and the operations which are being managed are configured first. It means that it is involved in sending the commands to the network equipment for changing the settings of the configuration. Sometimes it involves in isolating only a single device, such as only one interface of the port will be configured. Synchronization It can be viewed in two ways one is considering the network as the master and the other one is considering the management system as the master. In reconciliation the network is considered to be the master, the information which is in the management system will reflect in the network. Synchronization of the information is performed from network to the management system. In reprovisioning the Management system is considered to be the master of the management information. It flows from management system to the network, resulting the changes in the configuration of the network. Until the management system will receive a report from the network device that the changes has been made it will maintain a flag indicating that it is out of synchronization. In discrepancy reporting the user is being detected and flagged by the discrepancies. It doesnt maintain the direction of the synchronization which is to be taken place. This is to be performed by the user on case by case basis. If he decides that the information should be reflected by the management system it will ask the reconciliation. Backup and Restore The virus can destroy the data that is present in the hard disk. If we have a backup of data then in such cases we can recover the data. In the same it also applies for the network i.e. the backup and restores functionalities. The data of our users will not be in word or excel sheet but it will be the configuration of the network. The data is very important and it needs to be protected, just as we protect the database in a company. If unfortunately the configurations in the network are wiped off then many people will be affected. Then we dont have time to reconfigure the network. The easiest way to bring the things backup is restoring the network till the end of the configurations. Image Management Many network vendors issue the new versions of the software. In such cases you must be able to upgrade the network. The problem is that we are dealing with thousands of pcs which are connected across the same network. We must be have an idea of which devices are being installed with the different softwares, so that we can send the images which are to be updated and installed without disturbing the services of the network. This is nothing but the image management. 1.3 Accounting Management It is nothing but the functions that will provide the organizations to acquire the revenue and for getting the credit for the services they have provided. It needs to be extremely strong, large availability and the reliable standards are applied. 1.4 Performance Management The performance metrics Throughput, the number of communication units performed per unit time. The communication units depend on the type of the layer, network and the services which are provided to the network. Examples, In the network layer, the total number of packets that are sent per second. In the application layer the voice calls or calls which are attempted per hour. Delay, it is measured per unit time. Different kinds of delays can be measured depending on the layer or the network services. In the network layer, the time taken for an ip packet to reach its destination. In the application layer, the time taken to receive a dial tone after we lift the receiver. Quality, it can be measured in different ways depending on the services of the network. In the network layer, the percentage of the number of packets lost. In the application layer, the percentage of the number of calls terminated or the calls that were dropped. 1.5 Security Management The security aspects that are linked with securing the network from the treats, hackers attack, worms and viruses and the intrusion of the malicious attempts. It is distinguished in two ways. Security of Management means that the management is secure. The management applications must be accessed securely. It is generally authorized based on the application management but not on the user basics. Without securing the management application there is no use of securing the interfaces and the network of the management. Management of security means that the network is secured. It involves only in managing network security. Now days we can come across many online treats. The security treats doesnt target on the network it will just target on the devices which are connected to the network i.e. end users. The use of FCAPS in managing the network: It will manage all the kinds of networks i.e. private, public, mobile, narrow and broadband and including all area networks (WAN, MAN, LAN). Cost of implementation is reduced. Transmitting the digital and analog systems. Signalling the systems and the terminals including the transfer points of the signals. Performance problems are located easily. User is made satisfied. Schedules are implemented shortly. The feedback on the design is very effective. Simplified procedure of network operation center. Telecommunication services are provided with the software. 2 ITIL Now days many organizations are more depending on IT because of that ITIL has been developed by the CCTA in UK. It has provided the same framework for different kind of activities which are performed by the IT department. ITIL is managed in different sets, they are defined as the related functions service support, service delivery, and the other operational guidance are managerial, software support, computer operations, security management and environmental. ITIL has been designed to supply a good framework to present a high quality. Actually it is owned by CCTA, but it is observed and evolved by the Office of Government Commerce. 2.1 Service Support The service support focuses on the users. The customers and the users are the starting point to the model. They are involved in Asking for the changes For communication and also the updates Having any difficulties and queries The delivery of the process In most of the organizations it a Network Operations Center (NOC). It is mainly focused on one discipline i.e. whether the users are able to access to the applications what they are required. It focuses on finding the troubles, helping the users and giving the new applications which are completed on the internet. It includes the following Incident Management The main aim of this is to restore the service operation as early as possible, minimizes the effects on the business operations, and verifying that all the levels of quality of the service and the availability are maintained. It can be defined as an event which is not the part of the service operation which may or may not reduce the quality of the service. The reality of this is the normal operations must be restored as soon as possible without effect on the business or on the end user. Configuration Management It helps in representing the logical and the physical functioning of the ICT services which are provided or delivered to the end user. It is nothing but the asset register, because it contains the information about the maintenance and problems which occur during the configuration of the items. Problem management The main aim of this is find out the reasons for the cause of the incidents and to minimise the cause for the incidents and the problems which are caused because of the errors. A problem is nothing but the unknown cause for one or more incidents and the known error is nothing but the problem which is diagnosed successfully. The problem and known errors are defined by the CCTA as given below, Problem is a condition which is often determined as the come out of the multiple incidents that contains the general symptoms. It can also be determined from an individual incident that indicates the single error, the reason is unknown. Known error is an improvement which is identified by the self made diagnosis of the main cause of the problem and the work which is developed around. Change Management The aim of this is to check the way the changes are handled using with the help of methods and procedures. Change is an event that the status of one or more configuring items which are approved by the management. The aim of this includes: Back- out activities are reduced. Change in the utilization of resources. Disruption of the services. The terminology for the change management: Change: the addition, alteration or deletion of CLs. Change Request: the form which is used to store the details which are to be changed and it is sent into the Change Management by using Change Requestor. Forward Schedule of Changes (FSC): it contains a list of all the changes which are going to come. Service Desk The main aim of this includes initiating the incidents and the request, and an interface is initiated for the ITSM processes. Features include: Individual point of contact. Individual point of entry. Individual point of exit. Data integrity. The Service Desk functions include: Incident Control: service request for the life cycle management. Communication: the progress and the advising of the workarounds must be keep on informing to the customers. The Service Desk contains different names: Call Center: it involves managaging of huge amount of telephone based transactions. Help Desk: at primary support level it will conclude the incidents as soon as possible. Service Desk: it not only helps in handling the incidents and solving the problems but also it will provide an interface for various activities such as changing the requests, maintaining the contracts etc. It contains three different types of structures: Central Service Desk: it will handle the organizations which contains in multiple locations. Local Service Desk: it will meet the local business needs. Virtual Service Desk: it will handle the organizations which contains the locations in multiple countries. Release management The software migration team uses it for the purpose of platform-independent and the distribution of the software and hardware. The availability of the licence and the certified version of the software and the hardware ensure the proper control of the software and the hardware. The responsibility of this is to control the quality of the hardware and software during the implementation and development. The goals of this include: Planning the role of the software. Creation and implementation of the process for distributing and to install the changes that occur in the IT. The expectations of the customers are effectively communicated and managed during the planning of the new versions. The changes in the IT systems must be controlled while the distribution and the installation take place. It focus on the protection of the existing environment. It consists of the recent or modified software or the hardware which is required to use the authorized changes. It includes: Leading software which are released and the leading hardware which are updated, this contains the large amount of recent functionalities. Limited software which are released and the limited hardware which are updated, which contains the lesser enhancements and fixes, in which some of them have already issued as the emergency fixes. Emergency software and hardware fixes, which contains the corrections of some known problems. Based on the released unit it is separated into: Delta Release: the changes which have occurred in the software are only released. Full Release: the complete software program is distributed. Packaged Release: it releases the combination of various changes. 2.2 Service Delivery It mainly concentrates on the services which the ICT must be delivered to supply the sufficient support to the business users. It consists of the following processes. Service Level Management It provides for supervising, identification and examining the stages of IT services which are specified in the Service Level Agreements. It involves in assessing the change of the quality of services. To control the activities of the service level management it will join with the operational processes. It is the direct interface to the customer. It is responsible for the following: It will check whether the It services are delivered are not. It will maintain and produce the Service Catalog. It will check that the IT Service Continuity plans subsist to support the business and its requirements. Capacity Management It supports the best and actual cost supply of IT services by providing the organizations match with their business demands. It includes: Size of the application. Workload Management. Demand Management. Modeling. Planning the Capacity. Resource Management. Performance Management. IT Service Continuity Management It Processes succeed an organisations capability to supply the essential aim of service followed by an interruption of service. It is not only reactive measures but also proactive measures. It involves the following steps: By conducting the Business Impact Analysis the activities can be prioritised. The options are evaluated for the purpose of recovery. Contingency plan has been produced. The plan has been tested, reviewed and revised on regular basis. Availability Management The ICT infrastructure capabilities and services are optimized, service outages are minimized by having a support and give continued level of services to business requirements. The ability of IT component has been addressed to perform at a level all over the time. Reliability: the performance of the IT component at a concerned level at an identified condition. Maintainability: the IT component has an ability to remain or regenerate to a functional state. Serviceability: the external supplier has an ability to conserve the availability of the function below the third party. Resilience: the freedom has been measured from the operational failure and the way the services are kept reliable. Redundancy is one of the popular methods for resilience. Security: a service may contain a related data. Security is nothing but the availability of the data. Financial Management It is the process to deal the cost linked to provide the organisation with the services or resources to see the business requirements. It may refer to Managerial Finance: The financial technique has been concerned itself with managerial significance within the branch finance. Corporate Finance: the financial decisions are dealt with the area of the finance. 2.3 Security Management Since several years it has become a prevalent network management. The external treats are justified with the firewalls and the access prevention. The rights and permissions of the configuration management have been included in the security management, so that the end users are not granted with the unauthorized access. 2.4 Infrastructure Management In large organizations, the systems have been designed and the troubleshoot by the teams are different from the team that installs the equipment. Because of this Configuration management is necessary for the success of IT organizations. For installing and configuring of network devices in an organization the infrastructure management is responsible. 2.5 Application Management It is designed to ensure that an application has the correct configuration design to implement in the environment. This can cover different aspects of network management. It is designed to ensure that it is completely enabled to supply the service and delivery to end users. 2.6 Software Asset Management It is considered for managing an organization. The software products and licenses are very expensive. It is designed similar to the configuration management, because it provides the information on each device about the software installation. In large organizations maintaining the software and accounting for the licence is the complex task. Uses of ITIL in an organization The utilization of the resources is improved. Rework is reduced. The submission of project to the client and the time management is improved. The cost of the quality of the service is justified. The central process is integrated. Excess work is decreased. The services are provided in such a way that they meet the customers demand. Know more from the earlier experience. Be more aggressive. Comparision of ITIL and FCAPS: FCAPS mainly focus on the technology management. ITIL focus on the way to run an IT organization efficiently, i.e. on the process and the workflow. One of the limitation of FCAPS, it cannot target operational process which is required to operate a Service Desk. In ITIL framework we have the service desk in service support which provides the operational services to customers or end users. FCAPS on informs about the problem but doesnt gives us the solution to the problem. But ITIL standards provides services to resolve the problem using service delivery and service management. The main task of the FCAPS is that it will help out in managing the objectives of the network. The ITIL is planned to supply the improved framework. The difference between FCAPS and ITIL is that, FCAPS contains only five layers but ITIL contains eleven layers. The incident management and the availability management in the ITIL are similar to the fault management in the FCAPS. The purpose of fault management in FCAPS is finding out the faults in the network and correcting them, but in ITIL if any problem occurs in the management there is no need to rework entire process. The purpose of the incident management is restoring the normal operations and the availability management is associated with the availability of the service to the business at an executable cost. CONCLUSION: Finally the above discussion concludes the use of FCAPS and ITIL in network management. The organizations which implements ITIL will get the good results in the name of the way the services are designed and delivered. The use of any technology is not specified by ITIL, but the implementation on the use of the tools is effective. Main focus of FCAPS begins with technological view. FCAPS has been proved as low risk and logical. For any organization to enhance its performance or to get proper outcome both FCAPS and ITIL has to be associated together.

Saturday, July 20, 2019

Home Schooling Essay -- Teaching Public Education

Home Schooling Education is a very important concern in the hearts of Americans. . But what exactly is the best form of education. Homeschooling has gradually made its way into the education field as an acceptable and controversial form of education. Homeschooling can simply be defined as educating children at home or the community rather than at school (Withrow, 1999; Cromwell, 1998; Lines, 1995). An alternative definition would be, parents choosing the schooling for their children (What is Homeschooling, 2000). Home schooling started thirty years ago because of two men, Raymond Moore and John Holt. Both men felt that the public education system was wrong and emerged as founders of the homeschooling movement in America. Moore believed that children were being pushed in school to learn things they were not ready to learn. After evtensive research, he concluded that children in schools become extremely dependent on their peers. (Lyman, 1998). John Holt believed that it was beneficial to homeschool children because children were not being encouraged to use their natural curiosity. His negative attitude towards schools is shown when he wrote, "To return once more to compulsory school in its barest form, you will surely agree that the government told you that on one hundred and eighty days of the year, for six or more hours a day, you had to be at a particular place, and there do whatever people told you to do, you would feel that this was a gross violation of your civil liberties." Holt viewed schools as places that produced "obedient, but bland citizens" (Lyman, 1998). Home education is one of the fastest growing alternative forms of education to public schooling (Cook, 1999; Withrow, 1999). Approximately one million children or more are being educated in their homes because of the success of homeschooling. (Two Takes on Homeschooling, 1997) The increase of students does not seem to be slowing down, and with growing concern over the public schools, the growth of the homeschooling movement is inevitable. One of the main areas of concern for homeschooling is the academic performance of students; even though there is much debate on the testing assessments and the data collected, research shows that that homeschoolers achieve academically at the same level, or in most cases, above stu... ... automatically. (Kuntz, 2000) Cost Public schools are free. Low-income families can attend without worrying about money, unlike homeschools that have a cost to buy curriculums, materials, and equipment. Also, in homeschooling one family member must give up their income in order to teach their children, and most families can not afford to do that (Szegedy-Maszak). Homeschooling may deprive a child of vital skills needed to succeed outside of high school and in the workforce. In the public schools it is almost guaranteed that a child will get them; whereas homeschoolers most likely will not. The public school system is not perfect, yet it offers a realistic place of education that is available to all with a promise of teachers that have been certified. ? Bibliography: Guterson, D. (1992), Family matters: Why homeschooling makes sense. New York: Harcourt Brace Jovanovich. Pennsylvania Department of Education (1998, March). Home education in Pennsylvania. Pennsylvania Department of Education. 1-15. Pride, M. (1994), Homeschool goes high tech. Retrieved January 27, 2000 from the World Wide Web: http://www.home-school.com/Articles/HighTechHS.html

Friday, July 19, 2019

What is an infectuos disease :: essays research papers

What is an Infectious Disease? An Infectious Disease is a disease caused by germs, such as bacteria, viruses, fungi or parasites. These diseases are all "caught", hence they are often termed communicable diseases. Examples of specific infections include Strep throat, mononucleosis, cold sores, athlete's foot, appendicitis, boils, vaginal yeast infections, African Sleeping sickness and tuberculosis. HEPATITIS B VACCINATION Safe and effective vaccines are now available for protection against hepatitis B, a serious liver infection that can result in cirrhosis and liver cancer. Hepatitis B vaccine prevents hepatitis B disease and its serious consequences. Use of hepatitis B vaccine and other vaccines is strongly endorsed by the medical, scientific and public health communities as a safe and effective way to prevent disease and death. There is no confirmed evidence that indicates that hepatitis B vaccine can cause chronic illnesses. Whenever large number of vaccines are given, some adverse events will occur coincidentally after vaccination and be falsely attributed to the vaccine. To assure a high standard of safety with vaccines, several federal agencies continually assess and research possible or potential health effects that could be associated with vaccines. The Centers for Disease Control and the American Academy of Pediatrics recommend that all newborns, infants and children, especially sexually active teenagers be vaccinated against hepatitis B. Vaccination is also recommended for individuals at high risk of being infected with the hepatitis B virus (HBV). These include:  · Health care workers, including doctors, dentists, nurses, blood and lab technicians;  · Emergency workers - including paramedics, fire fighters and police;  · Hemodialysis patients;  · Military personnel;  · Morticians and embalmers;  · Patients and staff of institutions for the mentally handicapped, inmates of long-term correctional institutions;  · Ethnic groups with a high rate of hepatitis B including Chinese, Koreans, Indochinese, Filipinos, Alaskan Eskimos, Haitians, and American Indians;  · People with multiple sexual partners;  · Intravenous drug users;  · Recipients of certain blood products;  · Household contacts and sex partners of hepatitis B carriers;  · International travelers Those who are already infected will not benefit from vaccination. However, infants born of mothers who are carriers of the hepatitis B virus can be protected. A simple blood test can determine whether someone is a hepatitis B carrier. Immunization requires three doses of vaccine according to the following schedule:  · 1st dose: For infants born to infected mothers - within 12 hours. For infants born to mothers who test negative - within one to two months following delivery.  · 2nd dose: 1 month later  · 3rd dose: 6 months after the first dose.

Immigrants in Action :: Short Stories Immigration Equality Papers

Immigrants in Action Members of the Comità © de Inmigrantes en Accià ³n Santa Teresa (the St. Theresa Committee of Immigrants in Action) look solemn this evening. It is Friday, 5:00 PM, in the basement of St. Theresa's Church. The basement boasts a distinctly cafeteria-like atmosphere: fluorescent lights, linoleum floors, folding chairs, bare walls, and long institutional tables. Appropriate, a church volunteer later informs me, as the room also functions as a soup kitchen for homeless and low-income families. Outside, red late afternoon sunlight diffuses through the air and low-bellied cars cruise the streets, bursting with hip-hop beats. But neither the music nor the sun can penetrate the brick church walls. Inside it is quiet, except for the buzzing of blue-white lights. The sparseness of the large space makes the Comità © look small. There are ten members present this evening, huddled around one table near the entrance. They straggle in during the first half hour of the meeting, nodding hellos, hanging jackets, pulling up chairs. Juan Garcà ­a, the Comità © leader, has positioned himself at the head of the table. Beside his chair rests a bulging black briefcase and spread out before him are folders, binders, pamphlets, papers, all in neat stacks. The words Puerto Rico promenade merrily across his T-shirt, the "e" and the "r" interrupted by the ever-present gold locket that hangs around his neck. It is splayed open, as usual, la Virgen Maria holily presiding over the Comità ©. Garcà ­a started the Comità © in 1999, with the support of St. Theresa's, a Catholic church on the West side of Providence, Rhode Island. The church secured him a paid position as an organizador comunitario - a community organizer. The Comità ©'s most immediate mission is simply stated: to assure permanent residency for the 6-9 million some-odd undocumented immigrants in the United States. Garcà ­a, himself a documented Guatemalan immigrant, collaborates with the Latin American community in Providence and the surrounding areas to raise awareness about the most recent immigration policies and proposals and to encourage the people to organizarse. Organize themselves. As the Comità © is part of the National Coalition for Dignity and Amnesty, a nation-wide network of similar groups, Garcà ­a also keeps tabs on events and advancements in other parts of the country. The size of the Comità © is forever fluctuating: at the moment, it includes about ten members, documented and undocumented immigrants from Mexico and Central America.

Thursday, July 18, 2019

To Find Out Effectiveness Airtel Advertisements & Their Impact on the Viewers

TO FIND OUT EFFECTIVENESS AIRTEL ADVERTISEMENTS & THEIR IMPACT ON THE VIEWERS Table of Contents Introduction3 Airtel products9 Objective of Study14 Research Methodology15 Findings27 Recommendations28 Limitations of Study29 Bibliography31 Questionnaire32 INTRODUCTION (COMPANY OVERVIEW) Incorporated on July 7, 1995, bharti AIRTEL is a division of Bharti enterprises. The businesses of Bharti Airtel are structured into two main strategic groups †¢Mobility †¢Infotel The mobility business provides gsm mobile services in all 23 telecom circles in india. hile infotel business group provides telephone services and internet access over dsl in 15 circles. The company complements its mobile, broadband and telephone services with national and international long distance services. The company also has a submarine cable landing station at Chennai which connects the submarine cable connecting Chennai with Singapore. Bharti tele-ventures provides end to end data and enterprise services to c orporate customers by leveraging its nationwide fiber-optic backbone, last mile connectivity in fixed line and mobile circles. VSATs,ISP and international bandwidth access through the gateways and landing station. All of Bharti-ventures services are provided under airtel. in 2008; bharti Airtel attained its 90 million customer mark. The equity shares of Airtel are listed on the national stock exchange and Bombay stock exchange. Sunil Bharti mittal, the founder chairman of Bharti enterprises (who owns Airtel) is today the most celebrated face of the telecom sector in india. He symbolizes the adage that success comes to those who dream big and work assiduously to deliver it. Sunil Bharti mittal began his journey manufacturing spare parts for bicycles in late 1970s. his strong entrepreneurial instincts gave him a unique flair for sensing new business opportunities. In the early years, bharti established itself as a supplier of basic telecom equipment. His true calling came in the mid 1990s when the government opened up the sector and allowed private players to provide telecom services. Bharti enterprises accepted every opportunity provided by this new policy to evolve into India’s largest telecommunications company and one of the India’s most respected brands. Airtel was launched in 1995 in delhi. As the Airtel network expanded to several parts of India; the brand came to symbolize the very essence of mobile services. Since then, Airtel has established itself across India in most of the states covering a population of over 600 million people. Airtel will soon cover the entire country through a process of acquisitions and green field projects. With a presence in over 2,000 towns, Airtel today has the largest network capacity in the country. In the last nine years Airtel has achieved many firsts and unique records: it was the first to launch nationwide roaming operations, it was the first to cross the one million and the five million customer marks. It was also the first to launch services overseas. There are other ‘firsts' credited to Airtel – many of them in the area of innovative products and services. Today, Airtel innovates in almost everything that it presents to the market. An excellent example is Easy Charge – India's first paperless electronic recharging facility for prepaid customers. As evidence of its fine record, Airtel has also been conferred with numerous awards. It won the prestigious Techies Award for ‘being the best cellular services provider' for four consecutive years between 1997 and 2000 – a record that is still unmatched. And in 2003, it received the Voice & Data Award for being ‘India's largest cellular service provider', amongst others. Bharti Airtel has enjoyed an excellent run ever since the telecom sector opened. It has managed to hold on to its leadership position in spite of the presence of other players with deep pockets – Ambani’s, Tata’s, Birla’s and Vodafone. Has coped well with regulatory changes. It continues to attract and delight customers. t has also started making its presence felt worldwide also. Recently AIRTEL has become the third largest telecom player in the world. Bharti Enterprises has successfully focused its strategy on telecom while straddling diverse fields of business. From the creation of ‘Airtel', one of India's finest brands, to becoming the largest m anufacturer and exporter of world class telecom terminals under its ‘Beetel' brand, Bharti has created a significant position for itself in the global telecommunications sector. PRODUCTS The Company is a part of Bharti Enterprises, and is India's leading provider of telecommunications services. The businesses at Bharti Airtel have been structured into three individual strategic business units (SBU's) – mobile services, broadband & telephone services (B) & enterprise services. The mobile services group provides GSM mobile services across India in 23 telecom circles, while the B business group provides broadband & telephone services in 90 cities. The Enterprise services group has two sub-units – carriers (long distance services) and services to corporate. All these services are provided under the Airtel brand. Its include Voice Services Mobile Services Satellite Services Managed Data & Internet Services Managed e-Business Services Voice Services Bharti Airtel became the first private fixed-line service provider in India. It is now promoted under the Airtel brand. Recently, the Government opened the fixed-line industry to unlimited competition. Airtel has subsequently started providing fixed- line services in the four circles of Delhi, Haryana, Madhya Pradesh, Karnataka, Tamil Nadu & UP (West). Airtel Enterprise Services believes that these circles have high telecommunications potential, especially for carrying Voice & Data traffic. These circles were strategically selected so as to provide synergies with Airtel's long distance network and Airtel's extensive mobile network. Airtel Enterprise Services, India's premium telecommunication service, brings to you a whole new experience in telephony. From integrated telephone services for Enterprises and small business enterprises to user-friendly plans for Broadband Internet Services (DSL), we bring innovative, cost-effective, comprehensive and multi-product solutions to cater to all your telecom and data needs. Mobile Services Airtel's mobile footprint extends across the country in 21 telecom circles. It's service standards compare with the very best in the world. In fact, that’s how Bharti has managed to win the trust of millions of customers and makes it one of the top 5 operators in the world, in terms of service and subscriber base. The company has several Firsts to its credit: †¢The First to launch full roaming service on pre-paid in the country. †¢The First to launch 32K SIM cards. †¢The First in Asia to deploy the multi band feature in a wireless network for Efficient usage of spectrum. The First to deploy Voice Quality Enhancers to improve voice quality and Acoustics. †¢The First telecom company in the world to receive the ISO 9001:2000 Certification from British Standards Institute Satellite Services Airtel Enterprise Services provides you connectivity where ever you take your Business. Satellite Services bring you the benefits of access in remote Locations. Airtel Enter prise Services is a leading provider of broadband IP Satellite services and DAMA/PAMA services in India. Managed data & internet services Airtel enterprises services bring a comprehensive suite of data technologies. So Airtel is able to support all types of networks and ensure the customers can manage their network to the future seamlessly. These services include: leased lines, customized solutions, metro Ethernet. Managed e-business services Airtel enterprise services offer an internationally benchmarked, carrier class hosting, storage and business continuity services. A huge range of services help the customers run their business the way they want. All this is possible because of world class high tech data centers. PROMOTIONAL STRATEGY After the liberalization of the Indian Telecom Sector in 1994, the Indian cellular market witnessed a surge in cellular services. By 2005, there were a total of 12 players in the market with the five major players being Bharti Tele-Ventures Limited (Bharti), Bharat Sanchar Nigam Limited (BSNL), Hutchinson-Essar limited (Hutch), Idea Cellular limited (Idea) and Reliance India Mobile (RIM) (Refer Exhibit I). All the players except RIM offered services based on the Global System for Mobile (GSM) technology. RIM provided services based on Code Division Multiple Access (CDMA) technology as well as GSM. As competition in the telecom arena intensified, BHARTI AIRTEL took new initiatives to woo customers. Prominent among these were – celebrity endorsements, loyalty rewards, discount coupons, business solutions and talk time schemes. AIRTEL has used most number of celebrities for advertisements. The list includes-Sachin, Shahrukh, Rehmaan, Saif Ali Khan, Kareena Kapoor, Zaheer Khan Etc. The most important consumer segments in the cellular industry were the youth segment and the business class segment. The youth segment was the largest and fastest growing segment and was therefore targeted most heavily by cellular service provider. Bharti Tele-Ventures adopted celebrity endorsement as its chief promotional strategy. By 2004 it emerged the unprecedented leader commanding the largest market share in the cellular service market. Hutch implemented the celebrity endorsement strategy partially, relying primarily on its creative advertising for the promotion of its brand. BSNL, on the other hand, attracted the consumer through its low cost schemes. Being a state owned player, BSNL could cover rural areas, and this helped it increase its subscriber base. Reliance was another player that cashed on its innovative promotional strategies, which included celebrity endorsements and attractive talk time schemes. Idea relied heavily on its creative media advertising sans celebrities. OBJECTIVE OF THE STUDY The objective of the study is to find out the effectiveness of AIRTEL advertisements i. e. †¢What type of impact these advertisements have on the viewers? †¢Are the viewers getting the desired message? The secondary objective includes finding out following: What type of advertisements viewers now days like? †¢What type of changes AIRTEL needs to make in future? RESEARCH METODOLOGY The data was collected from primary as well as secondary sources. Primary data source: Around 80 people were randomly selected and their response to the questionnaire was taken as primary data. Secondary data source: the secondary data was col lected from following sources †¢AIRTEL website †¢Newspapers †¢Internet The total number of respondents was 80. Out of which 24 were female respondents and rests 56 were males. The respondents are categorized in three different groups. First group consists of person less than 20 years of age. These are mainly teenagers and are most likely to buy or use new mobile connections. The second group i. e. 20-35 years of age are already using one or the other connection. The last group was mainly of somewhat older people and consists of 30% of the total sample. The graph shows the % distribution of customers of different service providers . There are some more players in the market but for the shake of clarity, only these six were given consideration. Out of the major six players, Airtel is found to be having the largest market share with 32%. he main competitors to AIRTEL in terms of number of customers are BSNL and Vodafone. Popularity of ads of different brands among viewers The advertisements of Vodafone were found to be more popular among the respondents. Most of them talked about the ‘’hutch dog†. Similarly the tag line of IDEA ‘’an idea can change your life† is also very popular . AIRTEL ads are supposed to be more or less centered on emotional factors. 75% of the respondents said that they like the TV ads more than any other medium of advertisement. The main internet users now a days i. e. oungsters were found to have a liking towards the advertisements used on internet. The housewives and the people older than 3 years like to go through advertisements in newspapers and magazines etc, and also like the advertisements on radio or local FM stations. Major portion of the respondents categorized AIRTEL ads as emotional ads. In every advertisement, one or the other facet of the human relations is at the centre. The AIRTEL ads were also considered to be different from the competitors and innovative. Many respondents claimed that the fun part was always missing from the AIRTEL ads. Out of all celebrities endorsing AIRTEL, A. R. Rehmaan is most famous among the viewers. Almost every respondent linked the AIRTEL success with the famous TONE composed by Rehmaan. The girls mainly like the advertisements with Saif Ali khan and Shahrukh khan. One of the finding was that using too many celebrities in advertisements is not that much effective. AIRTEL advertisement with seven celebrities including Saif, Kareena, Zaheer khan, Gautam Gambhir is supposed by the viewers as wastage of money. 60% of the respondents believe that the Celebrity endorsements give a brand a ouch of glamour and the hope that a famous face will provide added appeal and name recognition in a crowded market. AIRTEL itself is already using a number of celebrities in its advertisements like shahrukh khan, Saif ali khan,kareena,Sachin,Madhvan etc. so in near future also AIRTEL should move on with celebrity endorsements as viewers give them value and have a liking towards them. Major portion of the viewer s got the message from the AIRTEL ads as it is a brand that offers services at cheaper price. The ads don’t give any hint about the service quality. So AIRTEL should give some consideration to this fact and try to emphasize on the better quality also through the advertisements. The claims made in AIRTEL ads are believable About 50% of the respondents had this belief that the claims made about the connectivity, voice clarity etc in the AIRTEL ads are true. The major portion of these 50% respondents was actually the AIRTEL users. 35% of people suppose these claims as just a part of advertisement and non existing in actual. 70% of the respondents said that they started using that sim card because of one or other type of scheme. The different types of schemes like-10 paisa call, night calling free etc help the customers make their mind to shift to that particular service provider. The advertisements in general have a very small impact on their decision. FINDINGS FROM THE STUDY The research carried out helped us to come to the following out comes: ? In terms of liking of ads, Vodafone is way ahead of AIRTEL. ?Viewers have a liking towards most of the celebrities used in AIRTEL ads. ? The viewers like the ads with some funny content but this is missing in most of the AIRTEL ads ? The majority of the customers starts or shifts to a service provider based upon word of mouth and different schemes. The advertisements play a very little part in their decision. ?The preferences of the viewers for the celebrities are always changing so we can’t rely on a single celebrity forever. ?Viewers like to see short and up to the mark ads but Most of the AIRTEL ads are too lengthy. RECOMMENDATIONS ?Along with using various celebrities for endorsements, AIRTEL should try to introduce advertisements with some sort of humor. ?The majority of perspective customers are teenagers, so AIRTEL ads should be more focused around them ? The people now days have started using more and more internet, so along with TV advertisements, AIRTEL should give more attention to online advertisements. ?People give very less attention to the print ads, so these ads should be mainly informative ads i. e. the ads giving information about new schemes and recharge coupons etc. LIMITATIONS The research was carried out taking care of each & every small points which can alter the results but still there were some limitations that must be acknowledged. †¢The respondents chosen were mainly from cities. So the results don’t include the responses of rural customers. †¢To find out the overall effectiveness of advertisements a lot of data regarding the price paid to the celebrities and cost of advertisement etc. was required, but as this type of data is classified so it was not available. CONCLUSION Mobile penetration is currently exploding in INDIA and Bharti Airtel has been riding the crest of the huge mobile industry wave that has been formed. Consequently great potential and huge market opportunities have now opened up the playing field in India’s telecom market and also made it much more competitive. In the present open market environment, there are currently over 10 major operators in India which are competing with each other to get the major share of this market. So at any point of time, AIRTEL can’t take things lightly. It needs to change its marketing and advertising strategies gradually. The advertisements used at present seem appropriate for AIRTEL but we can’t always rely on these advertisements and the celebrities. Bibliography www. airtelworld. com www. scribd. com www. wikipedia. org Search engine used www. oogle. com www. trai. gov. in QUESTIONNAIRE Dear Respondent, I am a student of Oriental Institute of Management, Vashi, Navi Mumbai and doing a research for a study for which I intend to pose a questionnaire to find out impact of the advertisements of some of the big players of Indian telecom sector. Your cooperation is deeply solicited to provide the relevant information. I assure that information will be kept confidential. Please tick at the place tha t matches your opinion. 1. You are †¢Male †¢Female 2. Specify your age †¢

Wednesday, July 17, 2019

Nelson Mandela And His Life And Work History History Essay

Nelson Mandela. The heavy(a) populacenish everyone realizes more than or less. The adult man the like who was against the Apartheid. He did nt scarce express about it, just he in some(prenominal) case did something about it. He s a great adult male. In this chapter we ll deliver about his life, his actions and how these actions have changed the universe.BiographyRolihlahla Mandela, by and by c eached Nelson Mandela, was born on July 18, 1918 in Mvezo. A bantam small townsfolk in the state of Transkei, southeast Africa. Mandela s male call down had three married womans. The third one was Mandela s female parent, here(predicate) name was Nosekeni Fanny.Mandela s male parent was destined to be a primary(prenominal) and served as a counselor to tribal heads. solely this was non triggering check happen. over a difference with the topical anaesthetic colonial magistrate, he lost his rubric and luck.Because of this event, they were labored to travel tot Qunu. This was an even little small town so Mvezo and secular in North of it. The small town was nt developed by far. There were nt any roads, merely some foot waies. The class lived in huts and could merely afford the local crop to eat. This consisted corn, sorghum, Cucurbita pepo and beans. Water could merely be fetched from springs and watercourses and cookery was done outdoors. Mandela s househ hoar had a truly comprehend cut, but he himself could still be a kid. He played games with the an former(a)(prenominal) male shavers who lived in the small town.Rolihlahla s male parent s friends suggested that Rolihlahla would travel to the Methodist church and so he became the archetypal in his househ elder to go to school. As was the usage at the clip, Rolihlahla got a bare-assed first name. This was likely collectable to significance of his elder name mischief- educater . His instructor told him his new name would be Nelson . Since so Mandela was no longer called Rolihlahla, but Nel son Mandela. The name of the adult male we know today as a in truth great adult male in history.When Nelson Mandela was nine old ages old his male parent died of a lung disease. This changed his life dramatically. He was adopted by foreman Jongintaba Dalindvebo, the mournful legal guardian of the Thembu commonwealth. Old ages earlier Nelson s male parent had recommended Jongintaba to be do a head. So this was done as a gesture to him. This acceptance meant that Nelson had to go forth the small town Qunu. He moved to Mqhekezweni, the provincial capital of Thembuland. here was the head s royal home plate where Nelson would be populating in the following a couple of(prenominal) old ages.His new household handle him good. Nelson was given the same position and duties as the trustee s two another(prenominal) kids, his boy Justice and his girl Namafu. Nelson anyway got knowledge. He studied English, Xhosa, history and geography at a one-room school coterminous to the castle .During his stay in Mqhekezweni, a a few(prenominal) senior trustees came to the Great Palace on official concern. It was ca employ by them that he got so interested by African history. They told him about South Africa. About the manner how the people lived in peace before the sporty people had arrived. The people of South Africa lived as brothers until the blank wager forces ruined that bond. The gaberdine educate forces took all the land for themselves and remaining nil for its original dwellers. This cognition has had a great influence on his later(a) life.When the male childs in Africa were 16 old ages old, they would do the passage from boyhood to manhood. So would Mandela. This was a ritual every male child would travel through in his life. When it was Mandela s bend, it was nt an ordinary eucharist. Most of the clip the rite was something you should be happy about. You were turning into a adult male further this clip it was nt that cheerful. The chief talker at the c eremonial, Chief Meliggili, spoke unhappily of the immature work forces as a coevals enslaved in their ain state. Their land was under the tame of the pureness work forces, so they would never hold the power to regulate themselves, he said. Because of this it was non the ceremonial the immature male childs had expected. But at least, Nelson had eventually turned into a adult maleIn 1939, the twelvemonth when Nelson turned 18, he went to the University College of Fort Hare. This was the unaccompanied residential Centre of higher skill for inkinesss in South Africa. You can comparability Fort Hare with Oxford or Harvard. Mandela took all the needed classs, but focused on Roman Dutch commandment. This was to fix for a calling in civil do as an translator or clerk. This was the shell profession you could obtain as a dismal adult male.A few hebdomads after Nelson got home from the University College of Fort Hare, the trustee Jongintaba announced he had arranged a matrimony for h im. Mandela was shocked and felt trapped. He ran off to Johannesburg, where he had a diverseness of occupations. While he was working he besides was finishing his unmarried man s stop via residue classs. afterward this he went to the University of Witwatersrand where he studied jurisprudence. During his valuate he became actively involved in the anti-apartheid motion and joined the African subject sexual relation ( ANC ) in 1942.Within the ANC, a little group of immature Africans ( Nelson Mandela include ) bonded together, naming themselves the African National Congress jejuneness League. They precious to alter the old tactics of polite petitioning. They precious to make something that was effectual. In 1949 the ANC officially adopted the methods of the Youth League. From now on they used methods like work term of enlistments, civil noncompliance and non-cooperation with the white work forces. Their end was to acquire redistribution of land, ware brotherhood rights and fre e and mandatory instruction for all the pitch-dark kids.For 20 old ages Nelson directed a run of peaceable, non-violent rebelliousness against the South African authorities and its racialist policies. These runs included the Defiance Campaign in 1952 and the Congress of the Peoples in 1955. But non everything was condoned. In 1956 Mandela and 150 others were arrested, but besides directly acquitted. During this period, a new organisation was formed, the Africanists. other group of scorch militants, but who disagreed with the methods of the ANC. They judgement it was uneffective. By 1959 the ANC lost much of its support, because of thePan-Africanist Congress. The new name of the Africanists, who had grown in presage of tail end uping people.Mandela, who was ever committed tot non-violent protest, began to believe otherwise by 1961. He believed the lone manner to accomplish revolution was build up contend. Because of this new idea he co-founded Umkhonto we Sizwe, besides k nown as MK. This was an build up outgrowth of the ANC. It was formed to stop apartheid utilizing guerilla war tactics and sabotage. He organise a three-day national workers work stoppage in 1961, which led to his apprehension in 1962. He was sentenced to five old ages in prison for the work stoppage. But this was nt the conclude determination. He was brought to test once more in 1963, where he and ten other ANC leaders were sentenced to life imprisonment for governmental offenses, including sabotage.Mandela was imprisoned on Robben Island. Here he received the lowest degree of interference because of the fact that he was a black policy-making captive. However, Mandela spent a parcel of land of his imprisonment rather good. He get a Bachelor of Law degree through a University of London correspondence plan.About everyone in the universe knew Mandela by so. He was a symbol of black opposition. Mandela got much international support, but this was nt that implemental for him. T he South African authorities kept him locked up on Robben Island.Mandela did nt remain on Robben Island. In 1982 he and the other ANC leaders were moved to Pollsmoor Prison. This was to enable contact amid the captives and the authorities of South Africa. Many offers were make to Mandela. So offered death chair P.W. Botha in 1985 Mandela s release in exchange for abdicating armed battle, but this offer was rejected. The force per unit of measurement playing field continued to lift. non merely local, but besides international.In 1989 Botha suffered a shot. Because of this he was replaces by Frederik Willem de Klerk. This alteration of chairman led to the release of Mandela in 1990. Not merely this had changed. The ANC were unbanned, the limitations on political groups were aloof and executings were suspended.Mandela did nt desire foreign powers to interfere. He state a committedness to work toward peace. But he did nt stop the armed battle of the ANC. This would go on until the black slew received the right to vote.In 1991 Mandela was elect president of the ANC. He kept negociating with president De Klerk. He still wanted multi-racial elections. The white people were willing to portion the power, so that was nt the job. The job was that many black Africans wanted a complete transportation of power. The dialogues were oftentimes really labored and there were a batch of violent eruptions trough the livelong state. Besides Mandela played a last in the agitation of the land. He make certain the presentations and armed opposition went on, to designate an even heavier force per unit area on the South African authorities.Mandela s tactics led to success. On April 27, 1994, the first democratic elections were held in South Africa. A few months subsequently, on May 10, 1994, Mandela ( who was 77 old ages old ) was chosen to be the state s first black president. De Klerk was became his first deputy. Nelson and de Klerk won the Nobel Prize for Pease in 1993 , for leveling apartheid. Mandela published his autobiography recollective Walk to Freedom in 1994. some(prenominal) of this book had he, in secret, written speckle he was in prison.Mandela worked while he was president on the relationship amid the black and the white people. He used the state s enthusiasm for athleticss for this. He advance the black work forces to back up the white work forces with their athleticss, in peculiar Rugby. And so he encouraged the white work forces to back up the black work forces with their athleticss. This led to Mandela s end, a better relationship between those to groups.Not merely did he work on this, he besides worked on the state s economic system. He protected it from prostration. Mandela had formed a reconstructive memory and Development Plan, which led to the creative activeness of new occupations, lodging and basic wellness attention. In 1996 he signed into the jurisprudence of South Africa that everyone was equal to each other and th at everyone had the right to vote.In 1999 Mandela retired from active political relations. He still maintained a busy agenda. He had founded his ain organisation the Mandela Foundation. This foundation built schools and clinics in South Africa. He besides published a figure of books. Those were about his life and battle.Mandela was diagnosed and hard-boiled for prostate malignant neoplastic disease. trio old ages subsequently, in June 2004, he announced his formal retirement from public life. He returned to his native small town of Qunu. This was at the age of 85 old ages.In July 2007, Mandela convened a group of universe leaders in Asia, the Middle East and Africa. Among them Graca Machel, Desmond Tutu, Kofi Annan, Ela Bhatt, Gro Harlem Brundtland, prise Carter, Li Zhaoxing, Mary Robinson and Muhammad Yunus. They named themselves The Elders . This group wanted to happen solutions to jobs around the universe. The fought for peace, adult females s equality, an terminal to atrocio usnesss and democracy.Mandela besides fought against AIDS. This disease killed his boy, Makgatho Mandela in 2005.Mandela was married three times. To Evelyn Ntoko Mase from 1944 boulder ashes 1957, they had four kids. From 1958 boulder clay 1996 he was married with Winnie Madikizela-Mandela with whom he had two girls. He s now married to Gra & A ccedil a Machel since 1998.A closer flavour to his actions