Saturday, August 31, 2019

Kings David and Solomon: from 10th Century B.C.E. to Present Day Controversy

Kings David and Solomon: From 10th Century B. C. E. to present day Controversy Introduction Perhaps the most famous Old Testament Kings, as well as two of the most famous Hebrew heroes of all time were, King Solomon and his father King David. Their stories have been told time and time again throughout the ages: passed down orally for centuries, then later reproduced and shared all over the globe as intricate portions of many historical religious texts including the Torah, the Koran and the Holy Bible. Biblical sources include: I Chronicles, I Kings, Ecclesiastes, as well as the accounts of many prophets.Furthermore, King David and King Solomon have been attributed to writing several Old Testament books including: the Song of Solomon, Proverbs, Ecclesiastes, and various Psalms. Historically, David is known for uniting the Kingdom of Israel, replacing Hebron and making Jerusalem its capitol, as well as establishing a dynasty that was held sacred in the hearts and hopes of the Jews for centuries after its demise. His son and successor Solomon is most noted for advancing David’s kingdom and for building the First Temple.In fact, according to Abba Eban (1999), author of over half a dozen historical reference books on Jewish history as well as the PBS television series â€Å"Civilization and the Jews,† â€Å"Solomon’s Temple was the crowning glory of a building program that rivaled those of the Pharaohs† (p. 50). Archaeologists claim to have found remnants of Solomon’s Temple as well in the form of a tablet dated tenth century B. C. E. (Carpenter, 2003, p. 46). However, not all historians and archaeologists agree to the authenticity of the tablet or even to the extent of King David and King Solomon’s rule.Recently, controversy has erupted concerning whether or not, King David and King Solomon, of the Old Testament (also known as the Jewish Bible) were actually the â€Å"grand builders of the united north-south monarchy in An cient Palestine† attributed to them through the Bible and said to unravel after their demise (Halken, 2006, p. 41). The Legacies of David and Solomon According to Rogerson (1999): It is no surprise that David should be one of the most important figures in the bible. As printed in the tradition his achievements were outstanding.Before his reign Israel was a defeated vassal people. Within a few years David made Israel free, and even extended his control over some small neighbouring peoples. Before his reign there was no one dominant political or religious centre in Israel. Within a few years Jerusalem had obtained a centrality that it never subsequently lost (p. 82). David was born around 1040 B. C. E. in Bethlehem, Judah (Castel, 1985, p. 87). He grew up the youngest of eight sons of Jesse, and has been linked with the Ammonite royal family (Rogerson, 1999, p. 78; 2 Samuel, 10: 1-2; 17:25-7).As a teenager David joined the entourage of Israeli King Saul as a minstrel and harpsic hord player. It was during this time period that he first gained notoriety when he defeated the ominous giant Goliath armed with a mere slingshot. In 1 Samuel 18:20-30 it states that with a dowry of 200 Philistine foreskins he married King Saul’s daughter Michal. Unfortunately, David’s marital bliss was cut short by the jealousy of his new father-in-law. Already a seasoned warrior David was praised as a military force with songs proclaiming â€Å"Saul has slain his thousands, and David his ten thousands† (Rogerson, 1999, p. 78).While fleeing Saul’s armies to the south, David accomplished a great many military victories alongside his former enemies the Philistines, as described in 1 Samuel. Though his military reign started as an almost nomadic band with him a â€Å"robin-hood like bandit-chief,† his strategic prowess was realized by the Judean elders and he was proclaimed King of Judah in Hebron, c. a. 1010 (although some texts have him proclaiming himself King of Judah) (Castel, 1985, p. 89; Halkin, 2006, p. 41). He unified the Israeli tribes to the north and Judah to south and became the ruler of all of Israel seven years later following the death of King Saul c. a. 000 B. C. E. (Castel, 1985, pp. 87-89; Grant, 1984, pp. 75-78; Learsi, 1949, pp. 49-51; Rogerson, 1999, pp. 79-80; 2 Samuel, c. a. 1100-1010 B. C. E. , pp. 505-555). In a brilliant political move David took over the Jebusite city of Jerusalem and made it the capitol of the new United Kingdom of Israel â€Å"thenceforward to be honored as the City of David† (2 Samuel, 1997, pp. 505-555; Eban, 1999, p. 47). Moving the capitol to Jerusalem was an ingenious move on David’s part since it placed him geographically between the northern tribes of Israel and the former Judah. This also unified the Hebrew nation politically since Jerusalem was a fresh tart, not being formerly of Israel or Judah. In order to unify the nation religiously David (with the help o f King Hiram of Tyre) built a palace on Mount Zion where he housed the Ark of the Covenant (Castel, 1985, p. 90; Eban, 1999, p. 49; Halkin, 2006, p. 43; Learsi, 1949, p. 55; Rogerson, 1999, pp. 81-82). He then set out to expand his kingdom taking over and taxing all of Canaan (Rogerson, 1999, p. 82). King David ruled Israel for the next 33 years (Castel, 1985, p. 89; Harkin, 2006, p. 41). Unfortunately the house of David, like many great monarchs (especially those who practiced polygamy) faced great diplomatic personal odds.Among them was internal dissent including a great deal of â€Å"palace intrigue† that was coupled with David’s personal struggles involving subduing his strong passionate nature (1 Samuel, 1997, pp. 439-504; 2 Samuel, 1997, pp. 505-555). As for Solomon, his controversial legacy began before his birth with the scandalous circumstances surrounding his parents union. His mother, Bathsheba, had been married to another man when David saw her, had her, an d then had her husband put to death by placing him on the front lines of battle (Rogerson, 1999, p. 85). Since Bathsheba was a favorite of David’s he promised her that her son would be his successor.It took some clever maneuvering but Solomon was proclaimed King of Israel in c. a. 960 (Harkin, 2006, p. 43). Solomon’s reign was characterized by his diplomatic matrimonial choices, made in order to enhance his trade routes and expand his Kingdom. His first betrothal was to one of King Hiram’s daughters, solidifying his kinship with Tyre. This provided him with the materials necessary to build his father’s Temple. Another strategic marriage was to an Egyptian pharoah’s daughter. As a dowry the pharaoh burnt down the city Gezer and gave it to Solomon.All in all Solomon had 700 wives and 300 concubines (Eban, 1984, p. 49-50). Historical and Archaeological Controversy In the last several years there has been an abundance of historical and archaeological d ebate over the reigns of King David and King Solomon. According to Harkin (2006) archaeologist Israel Finkelstein and author Neil Asher Silberman state that, kings David and Solomon, though â€Å"genuine historical figures† were but â€Å"bandit chiefs† (p. 41). Finkelstein believes that Israel could not have reached its peak during the reigns of David and Solomon in the 10th century, but rather in the 8th or 9th.Finkelstein’s account relies wholly on the lack of archaeological evidence to prove the existence of the monumental architecture described in the biblical accounts of David and Solomon (Harkin, 2006, pp. 41-48). However, their opinion is countered by several archaeological discoveries that have occurred over the last several years, resulting in their evidence being described as â€Å"†¦tendentious†¦like a conspiracy theory†¦Ã¢â‚¬  (Harkin, 2006, p. 48). According to Blakely (2002) two maps of tenth century BC. E. ere uncovered providing archaeological evidence of King David and King Solomon’s kingdom (p. 49). Then in 2003 a possible breakthrough discovery was made: a piece of sandstone was unearthed said to be the first documented archaeological evidence of Solomon’s temple. Researchers at the Geological Survey of Israel examined the tablets and found them to be â€Å"almost certainly genuine† (Carpenter, 2003, p. 46). According to Bar-llan University archaeologist Gabrial Barkai, these tablets â€Å"could be the most significant archaeological finding in yet in the land of Israel† (Carpenter, 2003, p. 6). Further proof of the existence of King David and King Solomon’s kingdom was the amazing find of a 3000 plus structure by archaeologist Eilat Mazar which debunks Finkelstein’s claim that David and Solomon were nothing but â€Å"bandit chiefs† (Halkin, 2006, pp. 41-48). Conclusion The tedious process of gathering archaeological information certainly takes time. Not just time but a great deal of clever maneuvering, as well as ready manpower and abundant monetary resources. Even if you do have permission to dig, there is modern day architecture to be worked around.One just cannot go around up heaving present day civilizations in order to prove the existence of past civilizations. However, in the case of kings David and Solomon their existence has been proven time and time again. Backing up the biblical account is the â€Å"Tel Dan Stele† an Aramaic text uncovered in 1993 dated 835 B. C. E. which boasts of Hazael King of Damascus’ victory over northern Israel’s king Jehoram son of Ahab and southern Judah’s Ahaziahu of the house of David (Halkin, 2006, p. 48).

Friday, August 30, 2019

Investigating World Financial Markets Essay

The stock markets in consideration, the Dow Jones Industrial Average (DJIA), the Shanghai Stock Exchange Composite Index (SSE), and the Australian All Ordinaries (ASX-All Ords) are among the major stock markets in the world. The value of these stock markets often gauge the local economy and is considered as the benchmark of economic health within their regions (Kaeppel, 2009). For instance, DJIA is the primary indicator of US economic health. Along with the S&P 500 and NASDAQ, the Dow is a collection of the top 30 industrial and commercial companies in the United States. The dominant industries in the DJIA range from Banking, Oil and Mining, Heavy Industries, and Food Manufacturing among others. According to Yahoo! Finance for the past couple of years during the global economic recession, the composition of the Dow has changed as it did for the past decades. Particularly, banking giants Citigroup and AIG were replaced in mid-2009 by The Travel Company and Kraft Foods, respectively due to the former’s poor stock performance on the onset of the global recession. One particular similarity of the stock markets mentioned in this paper is how other markets (SSE & ASX All Ords) were affected by the crisis that started in the United States. The Shanghai Stock Exchange Composite Index was at its all-time high (6000-level) in 2007 but suddenly cascaded downwards to the 4000 level during the global recession. The SSE in recent years has become a significant stock market indicator in Asia along with the Nikkei 225 of Japan and the Hang Seng in Hong Kong. The Shanghai bourse is divided into 2: Shanghai-A for foreigners and Shanghai-B for the local Chinese. Dominant industries in the SSE are mining and commercial banking. For instance, one of the largest IPOs in the world happened in 2007 during the listing of the Industrial and Commercial Bank of China (ICBC). Another is the Australian All Ordinaries which is on a league of its own. It is considered to be the primary bourse of the Australian market and is usually classified together with the Asian markets due to proximity. The ASX has been known for in the past due to its mining and rubber industries. The ASX of today however is dominated mostly by food manufacturers and commercial banking while mining industries still contribute significant amounts of trade volumes. On the other hand, this paper will also look into the bonds market through the JP Morgan Global Bond Market-All Maturities which are government issued IOUs which a government usually guarantees to pay on a specified amount of time. Usually issued as 5-10 year bonds, the bonds market are resistant to bankruptcy and default since the government guarantees it in a long period of time. Cross-Market Comparisons The performance of the stock markets around the world has suffered a lot for the past two years due to the global economic crisis. Several banks and industries filed for Chapter 11 bankruptcy and sought for their governments to intervene (Selden, 2010). On Figure 1 below, the US market in general was already on a downward direction even before the worse of the global crisis. This was due to the fact that defaults on the US Housing market was heavily affecting investor sentiments and the uncertainty of the then incoming US presidential elections was leading the markets down. With the DJIA as one of the benchmark indices for other markets in Europe and Asia-Pacific, the SSE and the ASX also were on a minor down shift. This worsened when the American company Lehman Brothers which is a century-old company in the US filed for bankruptcy on September 2008 prompting panic on Wall Street and around the world. News stories of companies with large defaulting accounts sent shockwaves in other markets causing bear markets around the world as reflected on the graph. A slight recovery was seen on March of 2009 when newly sworn US President Barrack Obama agreed to bail out Wall St and provided Bailout packages to Citigroup and the US Auto Industry. On Australia, the market also reacted positively over the acquisition of BHP Billiton of Rio Tinto in late 2009 ending a series of sour negotiations in the previous year. China was also able to prove that it was resistant to the worse of the financial crisis and was still able to compensate for its 11% inflation for 2008. The local Chinese economy was also saved by the revenues from the 2008 Beijing Olympics as well as other industries who are still eager to invest in China all the more in order to reduce costs.

Thursday, August 29, 2019

Should College Be Mandatory

As children we are presented or rather questioned on what we would like to be when we are adults. A smile appears on our face and a twinkle is can been seen in our eyes. They are but dreams, or fantasies that which we hope to achieve. To our dismay, life is not certain, nor is our future. As we enter adoclesents and into our teenage years, reality sets in. We were faced with decisions that could have possibley affected our future to come. Aside from football games, pep rallies, and house parties, highschool can be fun, but stressfull all at the same time.It is then we are faced with yet another serious question; to attend college or not to attend college. College with out a doubt should be a goal or standard set by each and every individual: however, it is a choice and should not be frowned upon it was not in his or her future. For those who successfully earned a degree at an accredited college, will not hesitate to admit it was no easy task. It is through theatrical pictures or movi es, t it is portrayed as ongoing beerfests and non-stop shenanigans.Alas, Hollywood fails to depict the true reality of a full time college student. College last stretch to a brighter future. It would be the last step in order to achieve ones ultimate goal, a life that could only be described as picturesque. The very life of a star including an immaculate home, the ever popular sports car, swimming pool, and a bank account with no limit. Yes it is a life we all want, but in truth it is too far from reach. College

Wednesday, August 28, 2019

The position of the packaging industry Essay Example | Topics and Well Written Essays - 2500 words

The position of the packaging industry - Essay Example This requires further discussion. The position at Sonoco Each division has the autonomy and hence had their own HR functions, their own budgets and systems, performance management processes, and leadership and training programs. Sonoco has a tight-knit culture in which there is resistance to hold the underperformers responsible. It has inconsistent HR practices and processes. The divisional HR managers are involved in day-today employee relations issues. Lack of communication persists in the organization while the GMs have been empowered to decide on the compensation and appraisals for their subordinates which results in unfair practices. HR just had to follow the dictates of the VPs and the GMs. Career and succession planning was lacking within the organization which dampened the enthusiasm of the employees. Divisional HR can enhance performance and productivity within the organization. A hybrid structure can provide a strategic link between corporate HR functions and businesses. Ho wever, a hybrid structure does not enable interaction with line managers which is possible through the centralization approach. Moreover, Sonoco had changed over to the hybrid approach and found that it is not sure of it had the right people at the right jobs. It may be difficult to segregate the responsibilities between the head office and the individual divisions which can result in regular conflicts. Thus, the above discussions suggest that the HR changes at Sonoco were far from successful. While each division having its own GM deciding on the benefits and other HR related functions about their employees, giving so much autonomy can lead to competition within divisions in an organization. This strength ultimately results in diluting the power... This study on Sonoco has been an eye-opener on how talent has to be managed in an ever-changing business environment. It is not sufficient to formulate certain principles and implement them within the organization. To work with a globally diverse workforce, to work in different business environments, and to work with a workforce that has independent views and varied lifestyle, is a challenge. This realization has been the result of the case analysis of Sonoco which is in a dilemma whether to adopt the centralized or the hybrid approach.   CPD is essential because there has been a shift in what the people and the organizations want. ole, there would be no interest or motivation to give his best. His interests have to be sustained and hence for optimum productivity, the right talent has to match the right job role. Motivation to a large extent comes from the supervisors as they are in regular contact with their subordination.  Employees must know how to support their staff for CPD of every employee in an organization. It helps to manage and develop their careers and the Gen-yers are more conscious of their future growth than the current pay package. Talent cannot be managed in an informal way. The strategies have to be integrated so that succession planning also is undertaken. This is part of CPD, essential in an organization. CPD and talent management are all inter-related terms and to achieve the intended objectives, HRM policies have to be integrated with the strategic organizational objectives.  

Tuesday, August 27, 2019

Dynamics of ethics Essay Example | Topics and Well Written Essays - 1000 words

Dynamics of ethics - Essay Example There are two sides to this issue: while one believes that the client should be a party to all available data, the other group is in favor of professional secrecy, which is mandatory to the cause of the treatment. What follows is an inquiry into issues which are imperative to the cause of telling the truth to patients; both sides are represented therein, and the most plausible option is debated over. Subsequently, a few relevant areas are discussed hereunder, which are deemed important for the judicious evaluation of the issue. It is purported that by telling the truth, one would be able to present a scenario that is non-malicious. Lies and withholding of truth have basically been taken as sinful over the years spanning human civilization. So it would go without saying, that if somebody is telling the truth to the patients, then an act of virtue is being upheld. â€Å"The purpose of truth telling is not simply to enable patients to make informed choices about health care and other aspects of their lives but also to inform them about their situation. Truth telling fosters trust in the medical profession and rests on the respect owed to patients as persons† (Glass, et al, 1997). Conversely, it is also believed that the actual care would be actualized when the patient finds his cure. Subsequently, if the health care provider feels that there is something that the patient would be well off without knowing, then they should not disclose that information. â€Å"The best time to discuss life-altering and life-threatening disease is when patients can remember the conversation, understand its significance, and participate in health care decisions† (Chodosh, 2000). The ethical grounds may seem to be coming under strife here, but even still, the stance for the cure of the patient is overriding to other facts in the health care profession. For that, ends may well be justifying means. All this has shaped up because it is

World History 1 Essay Example | Topics and Well Written Essays - 500 words

World History 1 - Essay Example In the civilized society, the role of the individual still might be deemed important, but not in the same close-connection sort of way. In terms of the educational area, one of the hallmarks of civilization is its ability to pass on its legacy through literature. Nomadic peoples tended to provide oral traditions and stories, but it wasn't until these became written down that society advanced to what might be called a civilized state. Through education in general, and literacy in particular, civilization developed into its modern form. Thirdly, there is a distinct difference between the commercial activities of hunter/gatherer tribes and civilized society. For nomadic tribes, goods were acquired primarily for consumption. Excess items could be traded with other groups, but the primary goal was meeting daily need. Modern civilization is characterized by elaborate trading patterns that have no equal in the hunter/gatherer world. Finally, the political difference is dramatic. While hunte r/gatherers had political rank or pecking order, it consisted primarily of who was strong enough to lead the tribe; and conducted through a fairly straightforward means of combat or test of skills.

Monday, August 26, 2019

Final Crime Essay Example | Topics and Well Written Essays - 1500 words

Final Crime - Essay Example By the end of the 20th century, observers such as Craine, S. and Coles, B. (1995) described early adolescence as an unsettling and stormy phase of the life course. The growth of public schools, and the concomitant age grouping that resulted, prompted increased public concern about youth. Although some private or public primary schools were established in a few 17th-century New England towns, most parents either taught their own children or shared in the paying for a temporary private school teacher. By the early 19th century, however, primary schools were established in many northeast towns, and by the mid-19th century most communities in that region had well-developed public common school systems. In the South, however, few public schools were created, so that as late as 1900 large numbers of children received little formal education (Newburn, T. and Stanko, E. (eds) 1994). A disproportionate amount of recorded crime is committed by young people, especially by young males. In 1994, two out of every five offenders were under the age of 21 and a quarter were under 18 [Audit Commission, 1997]. A small number of persistent offenders commit most of the crimes by young people. A survey through which respondents self reported their offences over the previous twelve months identified that 3% of young people, mostly young males, were responsible for about a quarter of all offences [Graham and Bowling, 1995]. http://www.dft.gov.uk/stellent/groups/dft_mobility/documents/page/dft_mobility_503832-04.hcsp In contrast to a decade ago, young people and young males in particular are not growing out of offending behavior as they reach their late teens and early twenties. Property offending by young males may now be increasing with age up to the mid twenties [Bright, 1997]. The known rate of offending by young adult males aged 18 to 24 years has increased significantly and, as a result, the peak age of offending for young men has increased from 15 years in 1986 to 18 years in 1994. In contrast, the peak age of offending for women has remained between 14 and 15 years of age [Audit Commission, 1997]. Female offenders who become socially mature adults are significantly more likely to stop offending than those who do not, whereas this development process appears to make little difference to male offenders [Graham and Bowling, 1995]. http://www.dft.gov.uk/stellent/groups/dft_mobility/documents/page/dft_mobility_503832-04.hcsp Crime by young people hasn't risen in the past five years and the number of known young offenders fell by 14% between 1995 and 2001 (Source: Criminal Statistics 2001). However, three-quarters of respondents in a recent survey believed the number of young offenders had risen (Source: Youth Crime and Youth Justice: Public opinion in England and Wales 2004). http://www.homeoffice.gov.uk/crime-victims/reducing-crime/youth-crime/version=1 Youthful offenders were more likely to be arrested for property crimes and ordinance violations compared to older adults who were more apt to be charged for drunkenness and moral offenses. Perhaps the most striking finding, however, was that arrest rates at all ages are much higher today than in the past, and that there has been a relative increase in the proportion of crime committed by young people (Davies M, Tyrer J & Croall H 1998). The growing attention to youth

Sunday, August 25, 2019

The Overview of an Article about Japanese Animation Essay

The Overview of an Article about Japanese Animation - Essay Example The essay "The Overview of an Article about Japanese Animation" talks about the article that describes the Japanese attempts to animate the western ways of imagination and even some aspects of its art culture. The article starts with a sort of story and this continues for a while but at the end of the paragraph comes the thesis statement which explicitly enables the reader to know what the article will be about. The thesis presented in the article is backed up by the artwork of Monet’s La Japonaise where even though it has a bit of Japanese theme based on clothing, the other impressionists are all western. This is a new thing in the Japanese art. This is evidence of the painting is also in coincidence with the films and other artwork by the Japanese whose direction has changed from purely Japanese themes to a mixture of Japanese and western ideas. Questions and even answers about more evidence of this thesis statement and in support of the article are found further in the article. The author also specifies the time changes of these art impressions and direction and hence anyone with more questions can check this up against historical books. The explicit explanations offered by the author about this subject of discussion leaves the audience satisfied. The author’s discussion about the change in direction of Japanese art and also the pictorial evidence makes me agree with her. I do not agree with her argument that Japanese culture still has great influence over the western type of art since the 19th Century to date.

Saturday, August 24, 2019

Scar by Amy Tan Essay Example | Topics and Well Written Essays - 750 words

Scar by Amy Tan - Essay Example The author emphasizes this when she states â€Å"In those days a ghost was anything we were forbidden to talk about† (Tan 291).This is clearly illustrated in the case of An-mei’s mother, who is disowned by her family for running off to be a concubine and refusing dowry from An-mei’s father. An-mei grows up hearing her grandmother constantly talking ill of her mother and she perceives her to be a â€Å"thoughtless woman who laughed and shook her head, who dipped her chopsticks many times to eat another piece of sweet fruit, happy to be free of Popo, her unhappy husband on the wall, and her two disobedient children (Tan 292 ).† Tan’s short narrative â€Å"Scar† builds on the themes of unconditional love and respect, by using symbolism and figurative language, among other literary elements. As a child, An-mei’s mother comes to visit and a commotion arises. A giant pot of boiling broth spills and burns the little girl’s chin and neck. The boiling soup is symbolic of the family’s raging anger towards An-mei’s mother for becoming a concubine and dishonoring them. The burn results in a physical scar, hence the title of the short story. However, the term scar is also symbolic since it signifies the emotional harm suffered by the little girl, as well as, the bad memories of her mother instilled in her by the grandmother. The prevalent theme in the short story is that of unconditional love. For instance, in the course of the story An-mei’s grandmother becomes seriously sick and her young girl’s mother comes back. In spite of everything that she had been told by her grandmother and the constant absence of her mother, she grows to love her. This is evident when she says â€Å"I came to love this mother as well, not because she came to m e and begged me to forgive her† (Tan 294). An-mei recognizes the fact that her mother is not to blame entirely for her absence. She also realizes that her mother never stopped loving her even after being expelled from the community. Tan illustrates this illustration when An-mei says when â€Å"Here is how I came to love my mother, how I saw her in my own true nature, what was beneath my skin, inside my bones† (Tan 294). The narrative also elaborates on the theme of respect. This is attributable to the fact that people should respect their elders regardless of the situations they are in. This is shown by An-mei‘s depiction of respect towards her mother when she sacrifices herself to Popo even after disownment. An-mei‘s mom also shows respect to Popo by looking after her even through the last living moments of her life. Respect was an issue that affected many people in China and despite the fact that An-mei did not really know her mother; she respected her and valued her actions towards her grandmother. The author’s narrative skills once more unfold yet another theme of traditions and identity. This is clearly depicted in honoring of Popo by following the ancient and acceptable way. This is done in an effort to save Popo from dying and An-mei's mother shows the respect of traditions and identity by making a sacrifice. Despite the fact that there is no good form of communication between Popo and An-mei's mother, she does not abandon her. In contrary, she cuts off part of her flesh in attempt to enrich Popo’s soup so as to heal her (Tan 295). This theme is further elaborated when An-mei realize the real meaning of the sacrifice that is conducted by the mother. In order to fully determine one's identity and heritage, one should symbolically peel off their

Friday, August 23, 2019

My structural engineering class Essay Example | Topics and Well Written Essays - 250 words

My structural engineering class - Essay Example Tall structures conventionally require deep foundations. The foundations can go up to several meters below the ground level. This affects the ground conditions significantly and may disturb the load distribution of smaller structures. In addition to that, exposure of a tall structure to wind loads is significantly reduced when it is surrounded with other tall buildings. This reduces the additional cost of bracing or safety equipment that the constructors otherwise have to provide to an unprotected tall structure. Although the structures in surrounding of the Burj Khalifa Tower are also tall, yet it is the tallest among all. Its height can not be compared to other structures in its surroundings. Tall structures may also be constructed in such regions where other structures are of lesser height in order to add to the beauty and usability of the area. People take pride in tall structures and see them as a symbol of pride. Tall structures become the symbol of area in which they are

Thursday, August 22, 2019

Religious Discrimination Essay Example for Free

Religious Discrimination Essay Religious discrimination under Title VII as defined by the U. S. Equal Employment Opportunity Commission (EEOC) involves treating a person unfavorably because of his or her religious beliefs. The law protects not only people who belong to traditional, organized religions but also others who have sincerely held religious, ethical or moral beliefs. The law forbids discrimination on the basis of religion in any and all aspects of employment. This includes hiring, firing, pay, job assignments, promotions, layoff, training, and benefits. Title VII also prohibits workplace segregation based on religion, such as assigning an employee to a non-customer contact position because of actual or presumed customer preference. Title VII also addresses reasonable accommodation in relation to religion. The law requires that the employer must reasonably accommodate an employee’s religious beliefs or practices, unless doing so would cause more than a minimal burden on the employers business. For example, if an employee needs to be off work on Sunday mornings to regularly attend church services it would be the responsibility of the employer to reasonably attempt to accommodate this need. An accommodation for this could include paying another employee to cover the Sunday morning shift, even if it requires paying overtime. Or the employer could hire an additional employee to be able to cover the shift. Since Title 7 of the United States Civil Rights Act was passed in 1964 there have been several judicial decisions that have molded the way this law in interpreted and applied. The first such court case that I came across was the case of Welsh V. United States which brought into question what types of beliefs can be used to obtain conscientious objector status when being selected to go to war. In this case the prosecutor was convicted of refusing to accept induction into the armed forces; he did claim conscientious objector status but did not base this decision off religion. He did not claim to believe in a deity that would morally keep him from fighting in a war, he instead asserted his own personal moral opposition to any conflict in which people are being killed. He alleged that the sincerity of his belief should qualify him for exemption from military duty under the Universal Military Training and Service Act. The Act allowed only those people whose opposition to the war was based on religious beliefs to be declared conscientious objectors. However in a 5-3 decision the court allowed Welsh to be declared a conscientious objector even though his opposition was not based on religious convictions. The implication this case has on Human Resources Management is that HR personnel must be aware of the broad scope of beliefs that will be protected under Title 7. Whereas before this case only majorly defined religions such as Judaism and Catholicism would be protected you now see religions such as scientology seeking protection under the law. Another relevant case would be Seshadri v. Kasraian which established that an employee bringing a religious discrimination claim does not need to belong to an established church. Another case that has shaped this law and impacted human resource management was Campos v. City of Blue Springs. In April 1996 Campos was hired as a crisis counselor for the Blue Springs Police Department’s Youth Outreach Program (YOU). At the time she did not have the advanced degree as required by the written job description, but her supervisor told her that she would have until February 1997 to obtain her degree and guarantee her position. She was also guaranteed via verbal contract that she would be paid an extra $10,000 per year for support group work, she would be a team leader within three months, and she would be an assistant director within six months of starting her full-time employment. She began working in October 1996, enjoying her job until she disclosed to her supervisor that she observes tenets of Native American Spirituality, not Christianity. Campos claimed that immediately her supervisor’s behavior towards her changed; she was unfriendly and critical, excluded her from employee meetings, and told her that she may not have been a good fit for the job. After failing to show up to work due to attending a mandatory meeting to obtain her dissertation, which was required by her employer, Campos received so much scrutiny from her supervisor that she resigned. After her resignation, Campos filed suit against the City, alleging that she suffered from employment discrimination based upon her religion, sex, and national origin. The charges of sex and national origin discrimination were eliminated, and the case was submitted to the jury on the theory that Campos was constructively discharged because of her religion. On April 13, 2001, the jury awarded Campos $79,200 for back pay and compensatory damages. The district court denied the Citys Motion for Judgment as a Matter of Law, or in the Alternative, for a New Trial, and awarded Camposs attorneys 90,556. 20 in fees and $11,825. 41 in expenses. This case has implications on Human Resources Management today because it establishes that employment decisions cannot be made based on whether or not an employee or potential employee agrees or disagrees with the employers religious views. One relevant business that comes to mind is Chik Fil A and their openly Christian beliefs. Even though they include Christian values in the core content of their mission statement and business plan they know that they cannot make any employment decisions based on religious affiliation. In Eatman V.  United Parcel Service in 2002 the company’s policy of requiring its drivers that had unconventional hairstyles to wear hats was called into question. The plaintiff was required by the company to wear a hat while on the clock because his hairstyle of choice was dreadlocks, a hairstyle where sections of hair are hand-rolled together in tight, interwoven spirals. After putting a lot of thought into the decision, Eatman, who is black, began wearing locks in February 1995 as an outward expression of an internal commitment to his Protestant faith as well as his Nubian belief system. At this same time he also became enlightened about locked hair and its connection to African identity and heritage. The position that his supervisor at UPS took on his hair was that the company uses common sense to determine which hairstyles are not businesslike; he finds ponytails, Mohawks, green hair, carved shapes, and locked hair—short or long—unacceptable. And there were currently 19 other drivers at this particular UPS that were required to wear hats to cover their unconventional hairstyles, including others that had dreadlocks. Even though Eatman claimed that the policy was discriminatory the jury did not rule in his favor. It was ruled that Eatman’s hairstyle was dictated by a personal choice. Nowhere in his religious texts did it dictate in any way that followers of the faith must wear their hair uncovered in dreadlocks. The implications of this case are actually pro employer and pro Human Resource Manager. It shows that not every claim that an employee makes based off of religious need has to be immediately catered to. There are cases where the request can be frivolous and off topic of religion, in which case the employer does not need to go out of their way to make accommodations. Another very interesting court case that I came across was EEOC v. Union Independiete De La Autoridad De Acueductos y Alcantarillados De Puerto Rico. I found this case to be very interesting because it stipulates that employees cannot pick and choose which parts of their religion they wish to follow and which ones they do not. In this case the issue was whether or not a Seventh day Adventist’s objection to union membership was the product of a sincerely held belief. Although the religious foundation of the Seventh day Adventist faith’s opposition to union membership has long been recognized, there was evidence that this employee often acted in a manner inconsistent with his professed religious beliefs. He was divorced, took an oath before a notary upon becoming a public employee, worked five days a week (instead of the six days required by his faith), and there was some evidence that the alleged conflict between his beliefs and union membership was a moving target. This case seemed important because is forces the employee to prove that religion is vital part of their life. It keeps them from claiming that they are Christian for the sole purpose of being off on Christmas, or from claiming that they are Catholic only to be off on Easter. It not only keeps people from faking being religious but it also helps to ensure the sanctity of those who actually are as religious as they claim to be. And the final court case that I found addresses sincerely held beliefs that have not always been there but can conceivably come about. In the case of E. E. O. C. v. Ilona of Hungary, Inc. an employee sincerely believed that she should refrain from working on the Jewish holiday of Yom Kippur even though she had not frequently celebrated Jewish holidays in the past. Her rise in faith was brought on by recent family events such as the passing of her mother-in-law and father, the birth of her son, and her husband’s rising faith. The court decided that these were significant enough to have caused a change in lifestyle and that she did believably have a real change of faith. After reviewing all of the cases mentioned above, along with numerous others, I have found that the topic of religion isn’t nearly as â€Å"black and white† as most would assume. There are many grey areas: What constitutes religion, how do you know if someone legitimately believes in their religion, and what aspects of someone’s lifestyle are pertinent to their claimed religion are just a few examples of where courts have to make a decision that will affect the way this topic is viewed for years to come. With the world become more and more diversified every day the topic of religion and all others under title 7 will continue to be tested and pushed to their limits. It is the job of the Human Resources Management team to be on high alert of potential discrimination cases and have all employees properly trained on these matters to ensure it does not happen at their company.

Wednesday, August 21, 2019

This Is What I Do Essay Example for Free

This Is What I Do Essay Conformity involves the changing of one’s attitudes, opinions, or behaviours. It causes sound-minded individuals to go against their best judgement, to engage in behaviour which they usually would not engage in, even accept and welcome an idea they internally disagree with, all in order to not be a deviant from the group. When faced with a challenging or trivial task, there are two common ways of handling the situation. One is to do so according to your own personal desires and beliefs. The other is to base the decision on the how others will view and respond to it. Remember that time in class when you thought you had the right answer but changed it because a majority of the class thought different, or that time you made fun of the nerdy kid in your class because it was considered the cool thing to do? Their might have been no problems at the time but when you found out your answer was the correct one and you got in trouble for picking on the nerdy kid, the majority of us would find ourselves saying everyone else was doing it. The main reason for conforming is the guarantee that you will never be left alone. It is so often that people commit wrong acts, then when accused, they retreat into the numbers of those involved. Personal desire, like conformity, is essential to life even though we may not appreciate its value. At one point we want to be different from all the rest in one way or another. So we might dress a bit differently and choose to do things we really like. For once, we might form our opinions based on what we really feel. However, sooner or later we are forced to change our spontaneous desires so that society does not label us as different or weird, simply because we are scared of being alone. It seems though that the more unique and out going individuals make an impression on others in life, people like Martin Luther King Jr. who took a stand for what he believed in even though the majority of people were against him. Maybe one day you stand out as unique to someone of great distinction, a C. E. O. of a major company or a director of a new movie, it could change your life indefinately to be someone offbeat from everyone else. In life we must balance our personal desires with what other people think is right, follow your own path and do what you believe in but do not disregard how others feel or think about you. one day the way you present yourself might just make the right impression on the right person.

Tuesday, August 20, 2019

Pentium Memory Management Unit Computer Science Essay

Pentium Memory Management Unit Computer Science Essay The main aim of the research paper is to analyze Pentium Memory Management Unit. Here, certain key features associated with a memory management unit like segmentation, paging, their protection, cache associated with MMU in form of translation look aside buffer, how to optimize microprocessors performance after implementing those features etc. have been discussed. Some problems and their respective solutions related to Pentium memory management unit are also covered. Also, the current and future research work done in the field of memory management is covered too. The main challenge is to get accustomed with the Pentium memory management unit and analyze the crucial factors related. Introduction A hardware component liable in handling different accesses to memory requested by CPU is known as memory management unit (MMU), which is also termed as paged memory management unit (PMMU). The main functions of MMU can be categorized as follows:-[1] Translation of virtual addresses to physical addresses which is also known as virtual memory management (VMM). Memory protection Cache Control Bus Arbitration Bank switching The memory system for Pentium microprocessor is 4G bytes in size just as in 80386DX and 80486 microprocessors. Pentium uses a 64-bit data bus to address memory organized in eight banks that each contains 512M bytes of data. Most microprocessors including Pentium also supports virtual memory concept with the help of memory management unit. Virtual memory is used to manage the resource of physical memory. It gives an application the illusion of a very large amount of memory, typically much larger than what is actually available. It supports the execution of processes partially resident in memory. Only the most recently used portions of a processs address space actually occupy physical memory-the rest of the address space is stored on disk until needed. The Intel Pentium microprocessor supports both segmentation and segmentation with paging. Another important feature supported by Pentium processors is the memory protection. This mechanism helps in limiting access to certain segments or pages based on privilege levels and thus protect critical data if kept in a privilege level with highest priority from different attacks. Intels Pentium processor also supports cache, translation look aside buffers, (TLBs), and a store buffer for temporary on-chip (and external) storage of instructions and data. Another major issue resolved by MMU is the fragmentation of memory. Sometimes, the size of largest contiguous free memory is much smaller than the total available memory because of the fragmentation issue. With virtual memory, a contiguous range of virtual addresses can be mapped to several non-contiguous blocks of physical memory. [1] This research paper basically revolves around different functions associated with a memory management unit of Pentium processors. This includes features like virtual memory management, memory protection, and cache control and so on. Pentiums memory management unit has some problems associated with it and some benefits as well which will be covered in detail in the later part. The above mentioned features help in solving major performance issues and has given a boom to the microprocessor world. History In some early microprocessor designs, memory management was performed by a separate integrated circuit such as the VLSI VI475 or the Motorola 68851 used with the Motorola 68020 CPU in the Macintosh II or the Z8015 used with the Zilog Z80 family of processors. Later microprocessors such as the Motorola 68030 and the ZILOG Z280 placed the MMU together with the CPU on the same integrated circuit, as did the Intel 80286 and later x86 microprocessors. The first memory management unit came into existence with the release of 80286 microprocessor chip in 1982. For the first time, 80286 offered on-chip memory management which makes it suitable for multitasking operations. On many machines, cache access time limits the clock cycle rate and in turn it affects more than the average memory access time. Therefore, to achieve fast access times, fitting the cache on chip was very important and this on-chip memory management paved the way. The major functionalities associated with a memory management are segmentation and paging. Segmentation unit was found first and foremost on 8086 processor which had only one purpose of serving as a gateway for 1MB physical address space. To allow easy porting from old applications to the new environment, it was decided by Intel to keep the segmentation unit alive under protected-mode. Protected mode does not have fixed sized memory blocks in memory, but instead, the size and location of each segment is set in an associated data structure called a Segment Descriptor. All memory references are accessed relative to the base address of their corresponding segment so as to allow relocation of program modules fairly easy and also avoid operating system to perform code fix-ups when it loads applications into memory. [2] With paging enabled, the processor adds an extra level of indirection to the memory translation process. Instead of serving as a physical address, an application-generated address is used by the processor to index one of its look-up tables. The corresponding entry in the table contains the actual physical address which is sent to the processor address bus. Through the use of paging, operating systems can create distinct address spaces for each running application thus simplifying memory access and preventing potential conflicts. Virtual-memory allows applications to allocate more memory than is physically available. This is done by keeping memory pages partially in RAM and partially on disk. When a program tries to access an on-disk page, an  Exception  is generated and the operating system reloads the page to allow the faulting application resume its execution. [2] The Pentium 4 was Intels final endeavor in the realm of single-core CPUs. The Pentium 4 had an on-die cache memory of 8 to 16 KB. The Pentium 4 memory cache is a memory location on the CPU used to store instructions to be processed. The Pentium 4 on-die memory cache is an extremely fast memory location which stored and decoded instructions known as microcode that were about to be executed by the CPU. [3] By todays standards, the Pentium 4 cache size is very lacking in capacity. This lack of cache memory means the CPU must make more calls to RAM for operating instructions. These calls to RAM are performance reducing, as the latency involved in transferring data from RAM is much higher than from the on-die cache. Often overlooked, the cache size of any CPU is of vast importance to predicting the performance of a  computer  processor. While the Pentium 4s level one cache was very limited by todays standards, it was at the time of its release more than adequate for the majority of computer applications. [4] Likely Pentium Pros most noticeable addition was its on-package L2 cache, which ranged from 256 KB at introduction to 1 MB in 1997. Intel placed the L2 die(s) separately in the package which still allowed it to run at the same clock speed as the CPU core. Additionally, unlike most motherboard-based cache schemes that shared the main system bus with the CPU, the Pentium Pros cache had its own back-side bus. Because of this, the CPU could read main memory and cache concurrently, greatly reducing a traditional bottleneck. The cache was also non-blocking, meaning that the processor could issue more than one cache request at a time (up to 4), reducing cache-miss penalties. These properties combined to produce an L2 cache that was immensely faster than the motherboard-based caches of older processors. This cache alone gave the CPU an advantage in input/output performance over older x86 CPUs. In multiprocessor configurations, Pentium Pros integrated cache skyrocketed performance in comparis on to architectures which had each CPU sharing a central cache. [4]However, this far faster L2 cache did come with some complications. The processor and the cache were on separate dies in the same package and connected closely by a full-speed bus. The two or three dies had to be bonded together early in the production process, before testing was possible. This meant that a single, tiny flaw in either die made it necessary to discard the entire assembly. [5] Technical Aspects of Pentiums Memory Management Unit Virtual Memory Management in Pentium The memory management unit in Pentium is upward compatible with the 80386 and 80486 microprocessors. The linear address space for Pentium microprocessor is 4G bytes that means from 0 to (232 1). MMU translates the Virtual Address to Physical address in less than a single clock cycle for a HIT and also it minimizes the cache fetch time for a MISS. CPU generates logical address which are given to segmentation unit which produces linear address which are then given to paging unit and thus paging unit generates physical address in main memory. Hence, paging and segmentation units are sub forms of MMUs. Figure 3.1 Logical to Physical Address Translation in Pentium Pentium can run in both modes i.e. real or protected. Real mode does not allow multi-tasking as there is no protection for one process to interfere with another whereas in protected mode, each process runs in a separate code segment. Segments have different privilege levels preventing the lower privilege process (such as an application) to run a higher privilege one (e.g. Operating system). Pentium running in Protected mode supports both segmentation and segmentation with paging. Segmentation: Pentium This process helps in dividing programs into logical blocks and then placing them in different memory areas. This makes it possible to regulate access to critical sections of the application and help identify bugs during the development process. It includes several features like to define the exact location and size of each segment in memory and set a specific privilege level to a segment which protects its content from unauthorized access. [6] Segment registers are now called  segment selectors  because they do not map directly to a physical address but point to an entry of the descriptor table. Pentium CPU has six 16 bit segment registers called SELECTORS. The logical address consists of 16 bit of segment size and 32 bit offset. The below figure shows a multi-segment model which uses the full capabilities of the segmentation mechanism to provide hardware enforced protection of code, data structures, and programs and tasks. This is supported by IA-32 architecture. Here, each program is given its own table of segment descriptors and its own segments. Figure 3.1.1.1 Multi-Dimensional Model When the processor needs to translate a memory location SEGMENT: OFFSET to its corresponding physical address à Ã¢â‚¬  , it takes the following steps: [7] Step 1: Find the start of the descriptor table (GDTR register) The below figure shows CPU selectors provide index (pointer) to Segment Descriptors stored in RAM in the form of memory structures called Descriptor Tables. Then, that address is combined with the offset to locate a specific linear address. Figure 3.1.1.2 Selector to Descriptor and then to finally linear address in Pentium MMU Step 2: Find the Segment  entry of the table; this is the segment descriptor corresponding to the segment. There are two types of Descriptor tables: Global Descriptor Table and Local Descriptor table. Global Descriptor Table: It consists of segment definitions that apply to all programs like the code belonging to operating system segments created by OS before CPU switched to protected mode. Local Descriptor Table: These tables are unique to an application. This figure finds the entry of the segment table and then a segment descriptor is chosen corresponding to the segment. [7] Figure 3.1.1.3 Global and Local Descriptor Table Pentium has a 32 bit base address which allows segments to begin at any location in its 4G bytes of memory. The below figure shows the format of a descriptor of a Pentium processor: [7] Figure 3.1.1.4 Pentium Descriptor Format Step 3: Find the base physical address à Ã‹â€  of the segment Step 4: Compute à Ã¢â‚¬   = à Ã‹â€  + OFFSET [7] Paging Unit Paging is an address translation from linear to physical address. The linear address is divided into fixed length pages and similarly the physical address space is divided into same fixed length frames. Within their respective address spaces pages and frames are numbered sequentially. The pages that have no frames assigned to them are stored on the disk. When the CPU needs to run the code on any non-assigned page, it generates a page fault exception, upon which the operating system reassigns a currently non-used frame to that page and copies the code from that page on the disk to the newly assigned RAM frame. [9] Pentium MMU uses the two-level page table to translate a virtual address to a physical address. The page directory contains 1024 32-bit page directory entries (PDEs), each of which points to one of 1024 level-2 page tables. Each page table contains 1024 32-bit page table entries (PTEs), each of which points to a page in physical memory or on disk. The page directory base register (PDBR) points to the beginning of the page directory. Figure 3.1.2.1 Pentium multi-level page table [8] For 4KB pages, Pentium uses a two level paging scheme in which division of the 32 bit linear address as: Figure 3.1.2.2 Division of 32 bit linear address The below figure shows the complete address translation process in Pentium i.e. from CPUs virtual address to main memorys physical address. Figure 3.1.2.3 Summary of Pentium address translation [8] The size of a paging table is dynamic and can become large in a system that contains large memory. In Pentium, due to the 4M byte paging feature, there is just a single page directory and no page tables. Basically, this mechanism helps operating system to create VIRTUAL (faked) address space by swapping code between disk and RAM. This procedure is known as virtual memory support. [9] The paging mechanism in Pentium functions with 4K byte memory pages or with a new extension available to the Pentium with 4M byte memory pages. The 20-bit VPN is partitioned into two 10-bit chunks. VPN1 indexes a PDE in the page directory pointed at by the PDBR. The address in the PDE points to the base of some page table that is indexed by VPN2. The PPN in the PTE indexed by VPN2 is concatenated with the VPO to form the physical address. [8] Figure 3.1.2.4 Pentium Page table Translation [8] Segmentation with Paging: Pentium Pentium supports both pure segmentation and segmentation with paging. To select a segment, program loads a selector for that segment into one of six segment registers. For e.g. CS register is a selector for code segment and DS register is a selector for data segment. Selector can specify whether segment table is Local to the process or Global to the machine. Format of a selector used in Pentium is as follows: C:Bb4JPGfoo4-43.jpg Figure 3.1.3.1 Selector Format The steps required to achieve this methodology are as follows:- Step 1: Use the Selector to convert the 32 bit virtual offset address to a 32 bit linear address. Step 2: Convert the 32 bit linear address to a physical address using a two-stage page table. Figure 3.1.3.2 mapping of a linear address onto a physical address [9] The below figures shows the complete process of segmentation along with paging which is one of the important functionalities of Pentiums memory management unit. [9] Figure 3.1.3.3 Segmentation with paging Some modern processors allow usage of both, segmentation and paging alone or in a combination (Motorola 8030 and later, Intel 80386, 80486, and Pentium) the OS designers have a choice which is cgiven in the below table. [9] Segmentation Paging No No Small (embedded) systems, low overhead, high performance No Yes Linear address space BSD UNIX, Windows NT Yes No Better controlled protection and sharing. ST can be kept on chip predictable access times (Intel 8086) Yes Yes Controlled protection/sharing Better memory management. UNIX Sys. V, OS/2. Figure 3.1.3.4 Usage of segmentation and paging in different processors Intel 80386, 486 and Pentium support the following MM scheme which is used in IBM OS/2. The diagram is shown below: Figure 3.1.3.5 Intels Memory Management scheme implemented in IBM OS/2 3.1.4 Optimizing Address Translation in Pentium processors The main goal of memory management for address translation is to have all translations in less than a single clock cycle for a HIT and minimize cache fetch time for a MISS. On page fault, the page must be fetched from disk and it takes millions of clock cycles which are handled by OS code. To minimize page fault rate, two methods used are:- 1. Smart replacement algorithms: To reduce page fault rate, the most preferred replacement algorithm is least-recently used (LRU). In this, a reference bit is set to 1 in page table entry to each page and is periodically cleared to 0 by OS. A page with reference bit equal to 0 has not been used recently. [10] 2. Fast translation using Translation Look aside Buffer: Address translation would appear to require extra memory references i.e. one to access the Page table entry and then the other for actual memory access. But access to page tables has good locality and thus use a fast cache of PTEs within the CPU called a Translation Look-aside Buffer (TLB) where the typical rate in Pentium is 16-512 PTEs, 0.5-1 cycle for hit, 10-100 cycles for miss, 0.01%-1% miss rate. [11] Page size 4KB -64 KB Hit Time 50-100 CPU clock cycles Miss Penalty Access time Transfer time 106 107 clock cycles 0.8 x 106 -0.8 x 107 clock cycles 0.2 x 106 -0.2 x 107 clock cycles Miss rate 0.00001% 0.001% Virtual address space size GB -16 x 1018 byte Figure 3.1.4.1 TLB rates Using the below mentioned two methods, TLB misses are handled (hardware or software) The page is in memory, but its physical address is missing. A new TLB entry must be created. The page is not in memory and the control is transferred to the operating system to deal with a page fault where it is handled by causing exception (interrupt): using EPC and Cause register. There are two ways of handling them:- Instruction page fault: Store the state of the process Look up the page table to find the disk address of the referenced page Choose a physical page to replace Start a read from disk for the referenced page Execute another process until the read completes Restart the instruction which caused the fault [12] Data access page fault: Occurs in the middle of an instruction. MIPS instructions are restartable: prevent the instruction from completing and restart it from the beginning. More complex machines: interrupting instructions (saving the state of CPU) 3. The other method used to reduce the HIT time is to avoid address translation during indexing. The CPU uses virtual addresses that must be mapped to a physical address. A cache that indexes by virtual addresses is called a virtual cache, as opposed to a physical cache. A virtual cache reduces hit time since a translation from a virtual address to a physical address is not necessary on hits. Also, address translation can be done in parallel with cache access, so penalties for misses are reduced as well. Although some difficulties are associated with Virtual cache technique i.e. process switches require cache purging. In virtual caches, different processes share the same virtual addresses even though they map to different physical addresses. When a process is swapped out, the cache must be purged of all entries to make sure that the new process gets the correct data. [13] Different solutions to overcome this problem are:- PID tags: Increase the width of the cache address tags to include a process ID (instead of purging the cache.) The current process PID is specified by a register. If the PID does not match, it is not a hit even if the address matches. Anti-aliasing hardware: A hardware solution called anti-aliasing guarantees every cache block a unique physical address. Every virtual address maps to the same location in the cache. Page coloring: This software technique forces aliases to share some address bits. Therefore, the virtual address and physical address match over these bits. Using the page offset: An alternative to get the best of both virtual and physical caches. If we use the page offset to index the cache, then we can overlap the virtual address translation process with the time required to read the tags. Note that the page offset is unaffected by address translation. However, this restriction forces the cache size to be smaller than the page size. Pipelined cache access: Another method to improve cache is to divide cache access into stages. This will lead to the following result: Pentium: 1 clock cycle per hit Pentium II and III: 2 clock cycles per hit Pentium 4: 4 clock cycles per hit It helps in allowing faster clock, while still producing one cache hit per clock. But the problem is that it has higher branch penalty, higher load delay. [13] Trace caches: A trace cache is a specialized instruction cache containing instruction traces; that is, sequences of instructions that are likely to be executed. It is found on Pentium 4 (NetBurst microarchitecture). It is used instead of conventional instruction cache. Cache blocks contain micro-operations, rather than raw memory and contain branches and continue at branch target, thus incorporating branch prediction. Cache hit requires correct branch prediction. The major advantage is that it makes sure instructions are available to supply the pipeline, by avoiding cache misses that result from branches and the disadvantage is that the cache may hold the same instruction several times and it has more complex control. [13] System Memory Management Mode The system memory management mode (SMM) is on the same level as protected mode, real mode and virtual mode, but it is provided to function as a manager. The SMM is not intended to be used as an application or a system level feature. It is intended for high-level system functions such as power management and security, which most Pentiums use during operation, but that are controlled by the operating system. Access to the SMM is accomplished via a new external hardware interrupt applied to the SMI# pin on the Pentium. When the SMM interrupt is activated, the processor begins executing system-level software in an area of memory called the system management RAM, or SMMRAM, called the SMM state dump record. The SMI# interrupt disables all other interrupts that are normally handled by user applications and the operating system. A return from the SMM interrupt is accomplished with a new instruction called RSM. RSM returns from the memory management mode interrupt and returns to the interrupted program at the point of the interruption. SMM allows the Pentium to treat the memory system as a flat 4G byte system, instead of being able to address the first 1M of memory. SMM helps in executing the software initially stored at a memory location 38000H. SMM also stores the state of the Pentium in what is called a dump record. The dump record is stored at memory locations 3FFA8H through 3FFFFH. The dump record allows a Pentium based system to enter a sleep mode and reactivate at the point of program interruption. This requires that the SMMRAM be powered during the sleep period. The Halt auto restart and I/O trap restarts are used when the SMM mode is exited by the RSM instruction. These data allow the RSM instruction to return to the halt state or return to the interrupt I/O instruction. If neither a halt nor an I/O operation is in effect upon entering the SMM mode, the RSM instruction reloads the state of the machine from the state dump and returns to the point of interruption. [14] Memory protection in Pentium In protected mode, the Intel 64 and IA-32 architectures provide a protection mechanism that operates at both the segment level and the page level. This protection mechanism provides the ability to limit access to certain segments or pages based on privilege levels. The Pentium 4 also supports four protection levels, with level 0 being the most privileged and level 3 the least. Segment and page protection is incorporated in localizing and detecting design problems and bugs. It can also be implemented into end-products to offer added robustness to operating systems, utilities software, and applications software. This protection mechanism is used to verify certain protection checks before actual memory cycle gets started such as Limit checks, type checks, privilege level checks, restriction of addressable domains and so on. The figure shows how these levels of privilege are interpreted as rings of protection. Here, the center (reserved for the most privileged code, data, and stacks) is used for the segments containing the critical software, usually the kernel of an operating system. Outer rings are used for less critical software. At each instant, a running program is at a certain level, indicated by a 2-bit field in its PSW (Program Status Word). Each segment also belongs to a certain level. Figure 3.3.1 Protection on Pentium II Memory protection implemented by associating protection bit with each frame valid-invalid bit attached to each entry in the page table: Valid indicates that the associated page is in the process logical address space, and is thus a legal page. Invalid indicates that the page is not in the process logical address space. As long as a program restricts itself to using segments at its own level, everything works fine. Attempts to access data at a higher level are permitted. Attempts to access data at a lower level are illegal and cause traps. 3.4 Cache in Pentium Processors Cache control is one of the most common techniques for improving performance in computer systems (both hardware and software) is to utilize caching for frequently accessed information. This lowers the average cost of accessing the information, providing greater performance for the overall system. This applies in processor design, and in the Intel Pentium 4 Processor architecture, caching is a critical component of the systems performance. The Pentium 4 Processor Architecture includes multiple types and levels of caching: Level 3 Cache This type of caching is only available on some versions of the Pentium 4 Processor (notably the Pentium 4 Xeon processors). This provides a large on-processor tertiary memory storage area that the processor uses for keeping information nearby. Thus, the contents of the Level 3 cache are faster to access. Level 2 Cache this type of cache is available in all versions of the Pentium 4 Processor. It is normally smaller than the Level 3 cache and is used for caching both data and code that is being used by the processor. Level 1 Cache this type of cache is used only for caching data. It is smaller than the Level 2 Cache and generally is used for the most frequently accessed information for the processor. Trace Cache this type of cache is used only for caching decoded instructions. Specifically, the processor has already broken down the normal processor instructions into micro operations and it is these micro ops that are cached by the P4 in the Trace Cache. Translation Look aside Buffer (TLB) this type of cache is used for storing virtual-to-physical memory translation information. It is an associative cache and consists of an instruction TLB and data TLB. Store Buffer this type of cache is used for taking arbitrary write operations and caching them so they may be written back to memory without blocking the current processor operations. This decreases contention between the processor and other parts of the system that are accessing main memory. There are 24 entries in the Pentium 4. Write Combining Buffer this is similar to the Store Buffer, except that it is specifically optimized for burst write operations to a memory region. Thus, multiple write operations can be combined into a single write back operation. There are 6 entries in the Pentium 4. The disadvantage of caching is handling the situation when the original copy is modified, thus making the cached information incorrect (or stale). A significant amount of the work done within the processor is ensuring the consistency of the cache, both for physical memory as well as for the TLBs. In the Pentium 4, physical memory caching remains coherent because the processor uses the MESI protocol. MESI defines the state of each unique cached piece of memory, called a cache line. In the Pentium 4, a cache line is 64 bytes. Thus, with the MESI protocol, each cache line is in one of four states: Modified the cache line is owned by this processor and there are modifications to that cache line stored within the processor cache. No other part of the system may access the main memory for that cache line as this will obtain stale information. Exclusive the cache line is owned by this processor. No other part of the system may access the main memory for that cache line. Shared the cache line is owned by this processor. Other parts of the system may acquire shared access to the cache line and may read that particular cache line. None of the shared owners may modify the cache line. Invalid the cache line is in an indeterminate state for this processor. Other parts of the system may own this cache line, or it is possible that no other part of the system owns the cache line. This processor may not access the memory and it is not cached. [15] Current Problems and Solution associated with them When you run multiple programs (especially MS-DOS-based programs) on a Windows-based computer that has insufficient system memory (RAM) and contains an Intel Pentium Pro or Pentium II processor, information in memory may become unavailable or damaged, leading to unpredictable results. For example, copy and compare operations may not work consistently.   This behavior is an indirect result of certain performance optimizations in the Intel Pentium Pro and Pentium II processors. These optimizations affect how the Windows 95 Virtual Machine Manager (VMM) performs certain memory operations, such as determining which sections of memory are not in use and can be safely freed. As a result, the Virtual Machine Manager may free the wrong pages in memory, leading to the symptoms described earlier. This problem no longer occurs in Windows 98. To resolve this problem, install the current version of Windows. [16] There is a little problem with sharing in

Technology and Medicine :: Exploratory Essays

Technology and Medicine Technology has had a great impact on society when it comes to medicine. Medical technology has been around since the cave man began using rocks as tools to perform trephening. Since then there has been many new advancements in medicine due to technology. From painless needles to robots used for surgeries technology is around to stay. Painless needles are one way technology is improving society. Needles are always scaring young children and even adults. Now with the new painless needle pediatricians can give vaccinations pain free. Researchers at Georgia Institute of Technology call theses new needles micro needles. [1] They are made from silicon, metal, glass or biodegradable polymer. Theses needles are 500 times smaller then ordinary hypodermic needles, which are too small to irritate nerve endings. These new needles will consist of 400 embedded micro needles will be glued to a patch that will gently puncture the skin. Now with this new technology society can have pain free shots. Technology in terms of medicine has also increased the life expectancy of the average person. With new technological advancements in surgeries, medicines and treatments the average life expectancy is still on the increase. A recent study shows that the average life span for 2004 of a United States Citizen is 77.4 years old. This has increased significantly from 1900 where the average lifespan for a male was 48.2 and for the female 51.5. Thanks to technology we can now live longer. Technology has also helped medicine with the use of robots. At the Bayfront Medical Center in St. Petersburg, Florida, Jeff Lannigan oversees 1,300 prescriptions a day. [2] That is a huge amount of prescriptions. Now he has a new kind of help. Spencer is a one million dollar robot that dispenses prescriptions at speedy rates. It takes Spencer three and a half hours to do what it took pharmacists 24 hours to do. This new technology also eliminates the room for human error. This means that people will have the right medication every time. If you are a customer waiting for a prescription than this technology will defiantly better society. Some people say that this new technology will hurt society because it will eliminate jobs for pharmacists. This is not true. The article says, â€Å"Instead of spending the whole day dispensing medicines, pharmacists have time to do what they’re trained to do—take care of patients.

Monday, August 19, 2019

Body Image Essay example -- Psychology

Laurie was a size fourteen at age eleven and weighed one-hundred fifty-five pounds. She went through elementary school being the kid that everyone called fat and never felt love from any of her peers. Even a counselor at her after-school YMCA program made an example of her to the other children. The teacher told all the children that she used to be as big as Laurie. Putting aside all the criticism from her fellow peers and teachers she found the courage and strength to lose weight. She began doing sit-ups and eating â€Å"healthier†. In all reality, she was eating less and less every day. She went from a size fourteen to a nine and then from a nine to a five. This all happened to her between summer and Christmas. By the following summer Laurie was a size double zero. During the following school year, she was called to the nurse’s office to be weighed and the scale read ninety-seven pounds. Laurie had become anorexic from the mentally abusing childhood she experienced f rom her peers. Every culture has a â€Å"perfect body image† that everyone compares their own bodies to. Girls especially have the mental thinking that they have to live up to the models on TV and magazines. In the United States the skinnier the girls, the more perfect their image is perceived. The â€Å"perfect body image† has an intriguing background, health and psychological problems, and currently few solutions. Background The history of having an â€Å"ideal body† type goes all the way back to the colonial times. Jennifer L. Derenne and Eugene V. Beresin have researched the â€Å"ideal body† from the colonial times up until now. During the colonial times, women were valued who were fertile, physically strong, and able women. This was because women during this time helped tend to t... ... (Ed.), Nutrition and Well-Being A to Z (Vol. 1, pp. 69-71). New York: Macmillan Reference USA. Retrieved from http://go.galegroup.com Drugs (Illegal). (2006). In J. Merriman & J. Winter (Eds.), Europe Since 1914: Encyclopedia of the Age of War and Reconstruction (Vol. 2, pp. 886-891). Detroit: Charles Scribner’s Sons. Retrieved from http://go.galgroup.com Franco, K.N., Alishahie, M., & Bronson, D. L. (2004). Body Image. In S. Loue & M. Sajatovic (Eds.), Encyclopedia of Women’s Health (pp.110-112). New York: Kluwer Academic Publishers. Retrieved from http://go.galegroup.com Gleason, W. (2006). Leisure. In J. Gabler-Hover & R. Sattelmeyer (Eds.), American History Through Literature 1820-1870 (Vol. 2, pp. 639-644). Detriot: Charles Scribner’s Sons. Retrieved from http://go.galegroup.com http://www.eating.ucdavis.edu/speaking/told/anorexia/a42laurie.html

Sunday, August 18, 2019

Impeachment Of Andrew :: essays research papers

One man’s bullet would force him into the presidency, and but for one man’s vote he would have been forced out. Like the impeachment of President Clinton, the impeachment trial of President Andrew Johnson in 1868 also ended in an acquittal.And like President Clinton, Johnson was a Democratic president who faced a Republican-controlled Congress. And while many were hostile to him for his political agenda, it would be an event separate from his policies that would nearly bring him down.Before it would end, a drama would play out in the Senate filled with partisanship, legal hairsplitting, and the swing votes of a handful of Republicans. The Road to Impeachment A â€Å"war† Democrat opposed to secession, in 1864 Johnson was tapped by Republican President Abraham Lincoln as his running mate to balance the Union ticket. He became president following Lincoln’s assassination in April 1865, just days after the Civil War ended. As president, Johnson’s desire to scale back Lincoln’s Reconstruction legislation following the Civil War angered the Radical Republican majority that sought to punish the former rebels of the Confederacy. The stage was set for a partisan fight that would ultimately center around a single act. In February 1868, Johnson fired Secretary of War Edwin M. Stanton, who was sympathetic to the Radical Republicans and who was overseeing the military’s Reconstruction efforts. A year earlier, Congress had passed the Tenure of Office Act, which prohibited a president from dismissing any officer confirmed by the Senate without first getting its approval. With Stanton’s firing, the call for Johnson’s impeachment began. â€Å"To say that they seized the opportunity was too strong,† says Michael Les Benedict, a history professor at Ohio State University and the author of The Impeachment and Trial of Andrew Johnson. â€Å"The president was in obvious defiance. He was daring them, it seemed, to impeach him. And if they didn’t, it would have given him a green light to basically dismantle the Reconstruction program that Congress had passed.† Political Opportunism? But others today see that impeachment as political opportunism. â€Å"Namely, Johnson was opposed to congressional Reconstruction,† says Hans Louis Trefousse, author of Andrew Johnson: A Biography. â€Å"So Johnson blocked that and, because he did, they [Republicans] eventually decided they should throw him out.† â€Å"A more technical inquiry can hardly be imagined, and as a separate basis for removing a president from office it bordered on the absurd,† wrote U.S.

Saturday, August 17, 2019

Compensation and Benefits

Compensation and benefits From Wikipedia, the free encyclopedia (Redirected from Compensation & Benefits) Jump to: navigation, search Compensation and benefits (abbreviated â€Å"C&B†) is a sub-discipline of human resources, focused on employee compensation and benefits policy-making. It is also known in the UK as â€Å"total reward† and as â€Å"remuneration† in Australia and New Zealand.Contents[hide] * 1 The basic components of employee compensation and benefits * 2 Variable pay * 3 Benefits * 4 Equity-based compensation * 5 Organizational place * 6 Main influencers * 7 Bonus plans| [edit] The basic components of employee compensation and benefits Employee compensation and benefits are basically divided into four categories: 1. Guaranteed pay – monetary (cash) reward paid by an employer to an employee based on employee/employer relations. The most common form of guaranteed pay is the basic salary. . Variable pay – monetary (cash) reward paid by a n employer to an employee that is contingent on discretion, performance or results achieved. The most common forms are bonuses and sales incentives. 3. Benefits – programs an employer uses to supplement employees’ compensation, such as paid time-off, medical insurance, company car, and more. 4. Equity-based compensation – a plan using the employer’s share as compensation. The most common examples are stock options. Guaranteed pay Guaranteed pay is a monetary (cash) reward.The basic element of the guaranteed pay is the base salary, paid based on an hourly, daily, weekly, bi-weekly or a monthly rate. The base salary is typically used by employees for ongoing consumption. Many countries dictate the minimum base salary defining a minimum wage. Individual skills and level of experience of employees leave room for differentiation of income-levels within the job-based pay structure. In addition to base salary, there are other pay elements which are paid based so lely on employee/employer relations, such salary and seniority allowance. edit] Variable pay Variable pay is a monetary (cash) reward that is contingent on discretion, performance or results achieved. There are different types of variable pay plans, such as bonus schemes, sales incentives (commission), overtime pay, and more. An example where this type of compensation plan is prevalent is the real estate industry and real estate agents. A common variable pay plan might be the sales person receives 50% of every dollar they bring in up to a level of revenue at which they then bump up to 85% for every dollar they bring in going forward.Typically, this type of plan is based on an annual period of time requiring a â€Å"resetting† each year back to the starting point of 50%. Sometimes this type of plan is administered so that the sales person never resets and never falls down to a lower level. It also includes Performance Linked Incentive whcih is variable and may range from 130% to 0% as per performance of the indiviudal as per his KRA. [edit] Benefits There is a wide variety of employee benefits, such as paid time-off, insurances (life insurance, medical/dental insurance, and work disability insurance), pension plan, company car, and more.A benefit plan is designed to address a specific need and is often provided not in the form of cash. Many countries dictate different minimum benefits, such as minimum paid time-off, employer’s pension contribution, sick pay, and more. [edit] Equity-based compensation Equity based compensation is an employer compensation plan using the employer’s shares as employee compensation. The most common form is stock options, yet employers use additional vehicles such as restricted stock, restricted stock units (RSU), employee stock purchase plan (ESPP), and stock appreciation rights (SAR).The classic objectives of equity based compensation plans are retention, attraction of new hires and aligning employees’ a nd shareholders’ interests. [edit] Organizational place In most companies, compensation & benefits (C&B) is a sub-function of the human-resources function. HR organizations in big companies are typically divided into three: HR business partners (HRBPs), HR centers of excellence, and HR shared services. C&B is an HR center of excellence, like staffing and organizational development (OD). [edit] Main influencersEmployee compensation and benefits main influencers can be divided into two: internal (company) and external influencers. The most important internal influencers are the business objectives, labor unions, internal equity (the idea of compensating employees in similar jobs and similar performance in a similar way), organizational culture and organizational structure. The most important external influencers are the state of the economy, inflation, unemployment rate, the relevant labor market, labor law, tax law, and the relevant industry habits and trends. edit] Bonus plan s Bonus plans are variable pay plans. They have three classic objectives: 1. Adjust labor cost to financial results – the basic idea is to create a bonus plan where the company is paying more bonuses in ‘good times’ and less (or no) bonuses in ‘bad times’. By having bonus plan budget adjusted according to financial results, the company’s labor cost is automatically reduced when the company isn’t doing so well, while good company performance drives higher bonuses to employees. . Drive employee performance – the basic idea is that if an employee knows that his/her bonus depend on the occurrence of a specific event (or paid according to performance, or if a certain goal is achieved), then the employee will do whatever he/she can to secure this event (or improve their performance, or achieve the desired goal). In other words, the bonus is creating an incentive to improve business performance (as defined through the bonus plan). 3.Emp loyee retention – retention is not a primary objective of bonus plans, yet bonuses are thought to bring value with employee retention as well, for three reasons: a) a well designed bonus plan is paying more money to better performers; a competitor offering a competing job-offer to these top performers is likely to face a higher hurdle, given that these employees are already paid higher due to the bonus plan. b) if the bonus is paid annually, employee is less inclined to leave the company before bonus payout; often the reason for leaving (e. g. dispute with the manager, competing job offer) ‘goes away' by the time the bonus is paid. he bonus plan ‘buy' more time for the company to retain the employee. c) employees paid more are more satisfied with their job (all other things being equal) thus less inclined to leave their employer. The concept saying bonus plans can improve employee performance is based on the work of Frederic Skinner, perhaps the most influential p sychologist of the 20th century. Using the concept of Operant Conditioning, Skinner claimed that an organism (animal, human being) is shaping his/her voluntary behavior based on its extrinsic environmental consequences – i. . reinforcement or punishment. This concept captured the heart of many, and indeed most bonus plans nowadays are designed according to it, yet since the late 1940s a growing body of empirical evidence suggested that these if-then rewards do not work in a variety of settings common to the modern workplace. Research even suggested that these type of bonus plans have the potential of damaging employee performance. Retrieved from â€Å"http://en. wikipedia. org/w/index. php? title=Compensation_and_benefits&oldid=478107814† View page ratingsRate this page Rate this page Page ratings What's this? Current average ratings. Trustworthy Objective Complete Well-written I am highly knowledgeable about this topic (optional) I have a relevant college/university d egree It is part of my profession It is a deep personal passion The source of my knowledge is not listed here I would like to help improve Wikipedia, send me an e-mail (optional) We will send you a confirmation e-mail. We will not share your e-mail address with outside parties as per our feedback privacy statement. Submit ratingsSaved successfully Your ratings have not been submitted yet Your ratings have expired Please reevaluate this page and submit new ratings. An error has occurred. Please try again later. Thanks! Your ratings have been saved. Please take a moment to complete a short survey. Start surveyMaybe later Thanks! Your ratings have been saved. Do you want to create an account? An account will help you track your edits, get involved in discussions, and be a part of the community. Create an accountorLog inMaybe later Thanks! Your ratings have been saved.Did you know that you can edit this page? Edit this pageMaybe later Categories: * Human resource management * Employment compensation Personal tools * Log in / create account Namespaces * Article * Talk Variants Views * Read * Edit * View history Actions Search ————————————————- Top of Form Bottom of Form Navigation * Main page * Contents * Featured content * Current events * Random article * Donate to Wikipedia Interaction * Help * About Wikipedia * Community portal * Recent changes * Contact Wikipedia Toolbox What links here * Related changes * Upload file * Special pages * Permanent link * Cite this page * Rate this page Print/export * Create a book * Download as PDF * Printable version * This page was last modified on 21 February 2012 at 18:25. * Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. See Terms of use for details. Wikipedia ® is a registered trademark of the Wikimedia Foundation, Inc. , a non-profit organization. * Cont act us * Privacy policy * About Wikipedia * Disclaimers * Mobile view * *

Friday, August 16, 2019

Effects of Rape

Psychological Effects of Rape A victim often suffers intense emotional and psychological reactions immediately after a rape. These can be described as personal crises where the victim relives the fear, agony or anxiety, mixed with emotional feelings. For most rape victims, the reactions begin days or weeks after the rape and will sometimes decrease after two to six months. However, disturbing emotions combined with low self-respect and sexual dysfunction may last for a year or more for some. Survivors will likely feel anger, depression, anxiety, and perhaps have a general sense that everything is falling apart. This phase is often marked by recurring nightmares, a generalized feeling of anxiety, and flashbacks to the attack. While these feelings are disturbing, they are a normal reaction to a trauma and are part of the healing process. Often it is at this time that survivors seek assistance from trained professionals who can help to put their lives back together and recover from rape-related post-traumatic stress. Even long after a sexual assault, some reactions may be triggered by people, places or things connected, or seemingly unconnected, to the assault. These are called â€Å"triggers† and they are difficult, but common. Defense mechanisms such as denial, suppression and dissociation are common among rape victims. The function of suppression is to block out the strong emotions and thereby escape the painful feelings for a short time which can be psychologically very exhausting. Denying or putting the worst parts of the assault out of the memory allows the rape victims to cope with their altercation. Dissociation is a defense mechanism which can be employed during painful physical or psychological abuse impossible to escape. This technique provides a feeling of â€Å"leaving† one's body, making the trauma harder to remember, especially the details. Defense mechanisms like these may affect the victim's ability and motivation to talk about the abuse they suffered. Professionals and health care personnel has to strongly take this into consideration while talking to a rape victim. Other long-lasting traumatic reactions following rape may be hyper-vigilance, avoidance of certain thoughts, feelings and situations that remind the victim of the abuse. Avoidance behaviors serve as a psychological defense against severe anxiety and tend to be long-lasting. Research shows that a person's normal work-capacity may be disrupted for as long as eight months after the rape. Depression is one of the most common effects of a rape victim and it can last for months. Suicide episodes begin to occur along with the depression. Sleep disturbances are also common, especially if the victim was assaulted in her own bed. Some examples of how a victim's lifestyle may change after rape are that she may stop opening the door if alone at home, stop using the laundromat, avoid going out after dark, and avoid social interactions, especially with men. I have a friend that was raped years ago and she only eats at restaurants that deliver her food. I hate that she can’t enjoy her life because, she is still young and has a lot going for herself. Spousal rape damages an individual’s psychological state more than stranger rape. It is longer-lasting than stranger rape because, it is carried out by a trusted individual whose trust is now damaged. Ongoing violence and rape within a close relationship may result in effects comparable to those of torture and war. Due to the repeated violence, the effects become even more difficult to work through, leading to deeper wounds. Many times, marital rape involves a combination of several types of crimes, such as physical harm, threats and property damage. All this often intensify the trauma Environment can play a huge role in the recovery process after a rape. It is important for the victim to be able to talk about the assault without being interrupted and questioned as a person. Therapy may be necessary to help the victim work through the traumatic experience. It is important that the woman is not made to feel guilt or responsibility after a sexual assault because that may harm instead of help. The immediate care by health care professionals and doctors is also very important. Some important points to cover are: The patient must be informed about examinations and tests that will be done and why. The patient must never be left alone in the waiting area, and the waiting time should be kept as short as possible. The patient must be informed that certain questions have to be asked, and why it is necessary to ask them. The immediate social situation must be evaluated. Does the patient have someone to stay with her over night? Does she wish to be admitted to the hospital or need to stay home from work? Was a police report filed? Unfortunately, reactions from society often involve some blame of the victim's own behavior. It is not unusual that the victim blames herself for the rape, and the public's attitude has an effect on that action. Blame and doubt by the public most likely stem from their own psychological defense system rather than from an uncaring attitude. This mind-set is partly a result of an unconscious conviction that those who behave appropriately will escape trouble, which also strengthen our own sense of security and control. Another reason is that placing blame on the victim relieves oneself of the responsibility to take action and help. Resistance and self-defense is another technique rape victims carry out. The perpetrator's first objective is to gain control of the victim so the rape can be completed. Some strategies are physical violence, threatening violence, scare-tactics and the use of alcohol or other drugs. Another strategy is that the perpetrator first attempts to gain the victim's trust and create a situation she cannot get out of. Strategies vary, depending on the situation, the relationship between perpetrator and victim as well as on the perpetrator's intent. All investigations clearly show that women who have been raped tended to avoid to resist. This is true for both marital and stranger rapes. No resistance is presumed to be the best defense, but the lack of resistance could be held against the victim later in court. Research in this area points to two things: Attempts by the woman to defend herself against aggression and rape in her own home are seldom successful. Physical resistance is also rare within a marriage. To actively defend oneself and physically and verbally resist the perpetrator decrease the risk for completed rape by a stranger. By and large, the risk for injuries does not appear to be higher because the woman resisted, even if the common belief is that it is â€Å"safest† not to resist. Traditionally, women learn that no resistance is the best strategy in a rape situation. However, there are two obvious problems with this viewpoint. First, the non-resistance may be used against them in court; and, second, new research shows that women who physically resist an assault by a stranger have a good chance to avoid being raped. Research like this must never be interpreted in a way which places resonsibility on those who are unable to or too afraid to resist or whose resistance was not effective. The fact is, and must always be, that the perpetrator is responsible for his actions. This is especially relevant when speaking of rape within the marriage, where resistance appear to be both more dangerous as well as rare. The most successful resistance strategies often talked about are kicking the assailant hard between the legs, pulling his hair, poking him hard in the eyes, and digging with the nails or other objects. At the same time, the woman must also try to find a way to escape. As a result of the newer research, girls and women are now more often encouraged to take self-defense classes. However, this type of resistance does not appear to have the same effect on rape within the marriage. Men who assault and rape women in close relationships must be held accountable and prosecuted. They should also be offered appropriate individual or group psychotherapy. Women and their children also need help and support to leave an abusive relationship, and offered better protection as well as psychotherapy if needed. Rapists come from all areas of society. Many times, they live in normal relationships with other women. Research has been done to find specific biological and personal reasons to why men rape, but the results vary. Therefore, it is difficult to determine a particular biological reason or personality trait of the typical rapist. . Victims of rape are found in all classes of society and are of all ages. However, one common factor emerges: almost every rape victim will have some kind of psychological problem afterwards.