Tuesday, November 26, 2019

whose art is it essays

whose art is it essays Whose Art Is It?, an essay by Jane Kramer, talked about John Ahearn, an artist living in the South Bronx. Kramer describes John as a white male living in a predominantly African American and Hispanic community. His artworks sparked a great controversy not only in the town but the entire city of New York. His intentions were not to offend anyone but he created such a public outcry against his works that will be look backed upon forever. John Ahearn was an active part of the community. "South Bronx is known as a place of suffering, poverty, crime, drugs, unemployment, and Aids" (Stimpson 18), but this did not stop Ahearn for making his artworks. His earlier works were plaster portraits of the people that lived there. Some even displayed them in their homes. So he gained acceptance in South Bronx, nobody really minded he was white. The place became home to him. "On April 1, 1986, the New York City Department of Cultural Affairs began to choose... an artist to create a piece in front of a new police station in the 44th Precinct" (Stimpson 19). With his gained popularity in the town, Ahearn was commissioned to make the sculpture. He believed that his sculptures should be looked upon as guardian angels or saints. He believed that the people in his work should be the everyday, real people. To commemorate a few of the people... having trouble surviving in the street, even if they were trouble themselves. He wanted the police to acknowledge them, and he wanted the neighbors, seeing them cast in bronze and up on pedestals, to stop and think about who they were and about what he calls their "South Bronx attitude" (Kramer 38). So he turned to his immediate neighbors and casted to make his pieces. In 1992, Ahearn created three bronze figures: Raymond, a Hispanic, with his pit bull Toby; Corey, an African American with a boom box and a basketball; and Daleesha a second African American youngster on ...

Saturday, November 23, 2019

Upmarket Fiction The Forgotten Middle Child of the Publishing World

Upmarket Fiction The Forgotten Middle Child of the Publishing World Upmarket Fiction: The Forgotten Middle Child of the Publishing World Calling something â€Å"commercial† can sound like an insult in some circles, as if it’s a trifling entertainment not worthy of the term â€Å"literature.† In other circles, the term â€Å"literary† results in a half-stifled yawn, and is considered pretentious. A question you might ask when you’re writing is, "Can a book be both literary and commercial?† The answer is yes: you've just described "upmarket fiction." Can a book be both literary and commercial? Yes: that's upmarket fiction. While this article won't settle any age-old commercial vs. literary debates, it will help you get a better grasp on how to distinguish both types of fiction - and, above all, it answer the question you’ve been wondering: what is upmarket fiction?A brief history of the novel - and how terms like â€Å"genre† and â€Å"literary† came to beIn the 17th and 18th centuries, the novel was considered a genre in itself. It was a relatively new form of narrative, a drawn-out prose detailing fictitious matters. As Joshua Rothman notes in The New Yorker: â€Å"When Catherine Morland, the heroine of Austen’s ‘Northanger Abbey,’ is rebuked for reading too many Gothic novels, the proposed alternative isn’t ‘literary fiction’ but non-fiction (a friend suggests she try history). ‘Northanger Abbey’ was written in 1799.† How did distinctions like commercial, literary, and upmarket come to be? Find out inside. 50 Book Marketing Ideas Every Author Needs to Know Read post Just like with choosing your degree, understanding the market from the outset of the process is crucial. If you’re hoping to make a career off of your novels, you need to study your market, your competitors, and to identify where your story will fit there. Why is it so important to be able to classify what kind of fiction you're writing? Find out here Even if your book is classified as commercial, that does not mean it has less merit as a piece of literature. Commercial and literary fiction both have their place: just like a spoon works better for ice cream and spaghetti requires a fork. This fiction is kind of like a spork, then: it can be used for either occasion.The classification is a sales tool - it’s important to know. In the end, if you can write a book that someone enjoys reading, that someone derives meaning from, that challenges someone to think, that helps someone unwind, that’s fun, or sad, or uplifting - in other words, if you can write a book that speaks to someone, then, well done. Not sure if your book is commercial, literary, or upmarket fiction? Take this quiz to find out http://bzfd.it/2xQofFP Are you still not 100% sure how to classify your novel? Take our quiz to find out!What are some of your favorite works of commercial, literary, or upmarket fiction? Share them with us in the comments below!

Thursday, November 21, 2019

Capital budgeting practices in different countriesindustrial Essay

Capital budgeting practices in different countriesindustrial corporations - Essay Example In today’s world of complex business process, corporate capital budgeting is one of the most important and critical decisions faced by the financial managers. In businesses individuals invests large sums of money which generate cash flow benefit over a period of more than one year. This is the crux of capital expenditures. The goods on which capital expenditures are made include purchasing of new equipments, acquiring of new technologies and that of launching research and development programs and so on. Along with these capital expenditures, a huge volume of cash outlays are involved with significant implications on the future values of the company. Analysis of capital expenditures is a crucial dimension in the business sphere. In this respect concept of capital budgeting (CB) can be introduced. In simple terms it is a business practice utilized for planning the acquisition of long term investments. The prime factor included in capital budgeting is that the organization or the company which builds and starts to use in one year will be highly useful in the future years (Finkler, 244). The importance of capital budgeting is immense as it includes decisions for the future profitability of the companies. Now this technique varies across geographical borders and difference exists in a stark manner within the corporations of developed and developing countries. Developed countries like United States of America exercise thorough scientific analysis associated with the capital budgeting techniques. ... While in the developing countries, the corporations practice formal processes and some also do not follow proper scientific methods for evaluation resulting from the lack of familiarity with such scientific methods (Blum, 1). The underlying mechanism of this paper is based on highlighting the capital budgeting practices in different countries industrial corporations. Decision making is the most crucial process within business operations. Effective decision making evolves from properly analyzing and evaluating the alternatives that are available and then selecting the most feasible as well valuable decision from the available options. The process of capital budgeting assesses the business operations of the companies through quantitative evaluation techniques. Through these techniques, capital budgeting method involves the forecasting of the performances of the future decisions associated with long term investments within the corporations. Capital budgeting techniques utilizes data fro m the financial and operating reports of the firms for predicting the performance of the investment in the corporate and their also their strategic options. In majority of the businesses CB process follows a synchronized application process which involves some fundamental evaluation techniques. The first step of CB is to collect investment ideas followed by a analysis of costs and benefits associated with the proposed investments. Then the subsequent step involves ranking attachments to each of the proposed investments followed by implementation of the selected investment and also simultaneous evaluation of the investments which are implemented. There are certain valuation techniques

Tuesday, November 19, 2019

Philosophy of Religion Research Paper Example | Topics and Well Written Essays - 1000 words - 1

Philosophy of Religion - Research Paper Example Not many of us can answer properly what God actually means to them. The definition of God has widely varied across the globe from time to time. Regardless of nationality, religion and race, perhaps the greatest debate is whether God exists or not. It has been found out that some people believe in existence of God, they cannot identify Him. Some can identify God in differ forms, deities or elements but cannot find it difficult to relate or believe. While some others totally disbelieve in plurality of God, some people deny the total existence of â€Å"God†. To them, it is some supreme force that has created the universe and as the source of life in it (Remos 33-34). A further division of views can be made between people who do and do not believe that God transcends and present among worldly beings (Remos 34). Broadly, all the worldly religions can be divided into two distinct categories. First comes the ones who believe in oneness of God, or the monotheistic. Then comes polytheistic, or the ones who believe in plurality of forms of God. The ancient religions like the ones of Israel and Egypt were monotheistic religions (Allen 72). But it is found that, even within one single religion, be it monotheistic or polytheistic, purity is not followed, that is, within a monotheistic religion polytheistic features can be found. Christianity is n apt example of this. Bible supports the existence of â€Å"God, the Father, God, the Son, and God, the Holy Spirit.† (Remos 33) Some major religions like Islam and Jewish are strictly monotheistic, while religions like Hinduism supports polytheistic views. One finds numerous Gods and Goddesses, Demigods and even spirits, in various forms and avatars. In Hinduism, each of these Gods is supposed to serve different purposes. Worship of these individual Gods contains monotheistic

Sunday, November 17, 2019

The Presence of Fear in Lord of the Flies Essay Example for Free

The Presence of Fear in Lord of the Flies Essay The presence of fear in Lord of the Flies Lord of the Flies is a relatively short book, but within its small amount of text William Golding is able to do much more than tell an exciting story. He digs deep into human nature and the natural corruption in peoples souls. He specifically explores the impact that fear has on people and how it makes them act. In Goldings eyes, humans are doomed just as the children on the island are, and that is because of fear. He believes that just the presence of terror causes people to overreact and lose common sense, tearing away at the bonds that hold society together. In an attempt to calm or soothe their worries, people end up separating, singling out others and letting their inner savage take over, leaving themselves in an even worse situation. In Lord of the Flies, fear slowly drives all common sense and civility out of the boys and brings them back to a state of savagery. The boys are scared from the beginning of the novel. At first, they are too excited about having an island to themselves to dwell upon their insecurities, but nonetheless they are there. The fear is not openly shown or discussed, but the boys are already subconsciously trying to cover it up. The boys do such things such as singling out Piggy in an attempt to make themselves feel more powerful and in control. Then, Jack pulls a knife on the piglet to try to show power and also to try to show immunity to fear, however, when he did so his face was white under the freckles. (31). Jack is already trying to act tough but at this point this cover that he puts on to hide from the fear has not reached nearly the point of savagery that it does later in the story. It is not until the first fire that the boys begin to openly show fear and even then they quickly change the subject. The cause of this realization of reality is that one of the littleuns disappears. The idea of making a rescue fire is so exciting that they let it get out of control. When the fire burns out they realize that one of the children is missing. When asked what has happened to the child with the mark on his face Ralph replies by saying Perhaps he went back to the, the-. . He knows what has happened, the boy was burned to death, but he does not want to admit it. This is like a wakeup call for the boys and they start to see the reality and the dangers of the situation. As the novel continues the fear is progressively growing in all of the children. By page 59, the fear of not knowing what would happen to them and if they would ever be rescued had grown to the point where the littleuns suffered from untold terrors in the dark and they huddled together for comfort. The littleuns were certainly afraid but had no way to really explain their fear or anything to blame it on. It is for this reason that they subconsciously create the beast. At first the biguns are too old and mature to believe in this beast. They realize that it is a figment of the littleuns imaginations and dont give it much thought. However, as their fear of being alone and not being rescued grows, so does their need for something concrete to aim their insecurities toward and to distract them from their real problem. This causes the biguns to begin to lose their common sense and to believe in the beast as well. Simon sees this, but when he tells the others maybe its only us, (89) referring to the beast; he is laughed off. The other boys will not even consider Simons ideas because they have convinced themselves that the beast is reality. As their fear grows so does their image of the beast, and unfortunately their savagery grows as well. This is most evident in Jack. When he is hunting he feels powerful. He is in control and he loves it. Hunting starts to become more than just a food source, it becomes his life. Not only does his hunting activity increase in frequency, it also becomes more and more vicious.

Thursday, November 14, 2019

Hsun Ching’s Life Changing Journey :: essays research papers

Hsun Ching’s Life Changing Journey The journey Hsun Ching would embark on began as nothing more than weight on his shoulders. Little did he know, it would be an expedition that would change his life forever. Not only changing his perspective on the world, but also life, his personality, and character. All the risks and sacrifices that Hsun Ching has to make during his journey are a very small price to pay for the positive benefits on his life. The journey not only revolutionizes his outlook on the world and life, but also on the Sutra and what it truly means to the world. Before Hsun Ching embarks on his journey he has nothing but negative feelings toward the expedition. He sees it as a complete and total waste of his time and doesn’t see the way the journey will revolutionize his life. The beginning of the novel depicts Hsun Ching as a man who does not go back on his word, and always follows through on what he says he is going to do. I think this is the main reason that Hsun Ching goes on the journey in the first place. He does not want to be looked upon as a coward and feels as if it is his duty to uphold his word. Throughout the beginning of the novel Hsun Ching makes his views on the sutra perfectly clear stating that the sutra is nothing more than a waste of time and is not real what so ever. His outlook on the sutra will rapidly begin to Senkbeil 2 change as his journey progresses and he soon begins to realize that the journey his is embarking on is one that will change his life forever. I believe the true reason why he finally decides to embark on his journey to find the sutra is because the sutra will bring eternal life to whoever finds it. Despite how much Hsun Ching dislikes the idea of the journey he cannot resist everlasting life and therefore agrees to go on the journey. The beginning of the journey for Hsun Ching is quite pain staking and certainly unmemorable. He begins to question why he ever agreed to go on the journey in the first place. The trail is hard and very unforgiving and as a result it gets Hsun Ching’s hopes way down. But despite all the negativity he still presses on in search of the almighty sutra.

Tuesday, November 12, 2019

Achieving Fault-Tolerance in Operating System Essay

Introduction Fault-tolerant computing is the art and science of building computing systems that continue to operate satisfactorily in the presence of faults. A fault-tolerant system may be able to tolerate one or more fault-types including – i) transient, intermittent or permanent hardware faults, ii) software and hardware design errors, iii) operator errors, or iv) externally induced upsets or physical damage. An extensive methodology has been developed in this field over the past thirty years, and a number of fault-tolerant machines have been developed – most dealing with random hardware faults, while a smaller number deal with software, design and operator faults to varying degrees. A large amount of supporting research has been reported. Fault tolerance and dependable systems research covers a wide spectrum of applications ranging across embedded real-time systems, commercial transaction systems, transportation systems, and military/space systems – to name a few. The supporting research includes system architecture, design techniques, coding theory, testing, validation, proof of correctness, modelling, software reliability, operating systems, parallel processing, and real-time processing. These areas often involve widely diverse core expertise ranging from formal logic, mathematics of stochastic modelling, graph theory, hardware design and software engineering. Recent developments include the adaptation of existing fault-tolerance techniques to RAID disks where information is striped across several disks to improve bandwidth and a redundant disk is used to hold encoded information so that data can be reconstructed if a disk fails. Another area is the use of application-based fault-tolerance techniques to detect errors in high performance parallel processors. Fault-tolerance techniques are expected to become increasingly important in deep sub-micron VLSI devices to combat increasing noise problems and improve yield by tolerating defects that are likely to occur on very large, complex chips. Fault-tolerant computing already plays a major role in process control, transportation, electronic commerce, space, communications and many other areas that impact our lives. Many of its next advances will occur when applied to new state-of-the-art systems such as massively parallel scalable computing, promising new unconventional architectures such as processor-in-memory or reconfigurable computing, mobile computing, and the other exciting new things that lie around the corner. Basic Concepts Hardware Fault-Tolerance – The majority of fault-tolerant designs have been directed toward building computers that automatically recover from random faults occurring in hardware components. The techniques employed to do this generally involve partitioning a computing system into modules that act as fault-containment regions. Each module is backed up with protective redundancy so that, if the module fails, others can assume its function. Special mechanisms are added to detect errors and implement recovery. Two general approaches to hardware fault recovery have been used: 1) fault masking, and 2) dynamic recovery. Fault masking is a structural redundancy technique that completely masks faults within a set of redundant modules. A number of identical modules execute the same functions, and their outputs are voted to remove errors created by a faulty module. Triple modular redundancy (TMR) is a commonly used form of fault masking in which the circuitry is triplicated and voted. The voting circuitry can also be triplicated so that individual voter failures can also be corrected by the voting process. A TMR system fails whenever two modules in a redundant triplet create errors so that the vote is no longer valid. Hybrid redundancy is an extension of TMR in which the triplicated modules are backed up with additional spares, which are used to replace faulty modules -allowing more faults to be tolerated. Voted systems require more than three times as much hardware as non-redundant systems, but they have the advantage that computations can continue without interruption when a fault occurs, allowing existing operating systems to be used. Dynamic recovery is required when only one copy of a computation is running at a time (or in some cases two unchecked copies), and it involves automated self-repair. As in fault masking, the computing system is partitioned into modules backed up by spares as protective redundancy. In the case of dynamic recovery however, special mechanisms are required to detect faults in the modules, switch out a faulty module, switch in a spare, and instigate those software actions (rollback, initialization, retry, and restart) necessary to restore and continue the computation. In single computers special hardware is required along with software to do this, while in multicomputers the function is often managed by the other processors. Dynamic recovery is generally more hardware-efficient than voted systems, and it is therefore the approach of choice in resource-constrained (e.g., low-power) systems, and especially in high performance scalable systems in which the amount of hardware resources devoted to active computing must be maximized. Its disadvantage is that computational delays occur during fault recovery, fault coverage is often lower, and specialized operating systems may be required. Software Fault-Tolerance – Efforts to attain software that can tolerate software design faults (programming errors) have made use of static and dynamic redundancy approaches similar to those used for hardware faults. One such approach, N-version programming, uses static redundancy in the form of independently written programs (versions) that perform the same functions, and their outputs are voted at special checkpoints. Here, of course, the data being voted may not be exactly the same, and a criterion must be used to identify and reject faulty versions and to determine a consistent value (through inexact voting) that all good versions can use. An alternative dynamic approach is based on the concept of recovery blocks. Programs are partitioned into blocks and acceptance tests are executed after each block. If an acceptance test fails, a redundant code block is executed. An approach called design diversity combines hardware and software fault-tolerance by implementing a fault-tolerant computer system using different hardware and software in redundant channels. Each channel is designed to provide the same function, and a method is provided to identify if one channel deviates unacceptably from the others. The goal is to tolerate both hardware and software design faults. This is a very expensive technique, but it is used in very critical aircraft control applications. The key technologies that make software fault-tolerant Software involves a system’s conceptual model, which is easier than a physical model to engineer to test for things that violate basic concepts. To the extent that a software system can evaluate its own performance and correctness, it can be made fault-tolerant—or at least error aware; to the extent that a software system can check its responses before activating any physical components, a mechanism for improving error detection, fault tolerance, and safety exists. We can use three key technologies—design diversity, checkpointing, and exception handling—for software fault tolerance, depending on whether the current task should be continued or can be lost while avoiding error propagation (ensuring error containment and thus avoiding total system failure). Tolerating solid software faults for task continuity requires diversity, while checkpointing tolerates soft software faults for task continuity. Exception handling avoids system failure at the expense of current task loss. Runtime failure detection is often accomplished through an acceptance test or comparison of results from a combination of â€Å"different† but functionally equivalent system alternates, components, versions, or variants. However, other techniques— ranging from mathematical consistency checking to error coding to data diversity—are also useful. There are many options for effective system recovery after a problem has been detected. They range from complete rejuvenation (for example, stopping with a full data and software reload and then restarting) to dynamic forward error correction to partial state rollback and restart. The relationship between software fault tolerance and software safety Both require good error detection, but the response to errors is what differentiates the two approaches. Fault tolerance implies that the software system can recover from —or in some way tolerate—the error and continue correct operation. Safety implies that the system either continues correct operation or fails in a safe manner. A safe failure is an inability to tolerate the fault. So, we can have low fault tolerance and high safety by safely shutting down a system in response to every detected error. It is certainly not a simple relationship. Software fault tolerance is related to reliability, and a system can certainly be reliable and unsafe or unreliable and safe as well as the more usual combinations. Safety is intimately associated with the system’s capacity to do harm. Fault tolerance is a very different property. Fault tolerance is—together with fault prevention, fault removal, and fault forecasting— a means for ensuring that the system function is implemented so that the dependability attributes, which include safety and availability, satisfy the users’ expectations and requirements. Safety involves the notion of controlled failures: if the system fails, the failure should have no catastrophic consequence—that is, the system should be fail-safe. Controlling failures always include some forms of fault tolerance—from error detection and halting to complete system recovery after component failure. The system function and environment dictate, through the requirements in terms of service continuity, the extent of fault tolerance required. You can have a safe system that has little fault tolerance in it. When the system specifications properly and adequately define safety, then a well-designed fault-tolerant system will also be safe. However, you can also have a system that is highly fault tolerant but that can fail in an unsafe way. Hence, fault tolerance and safety are not synonymous. Safety is concerned with failures (of any nature) that can harm the user; fault tolerance is primarily concerned with runtime prevention of failures in any shape or form (including prevention of safety critical failures). A fault-tolerant and safe system will minimize overall failures and ensure that when a failure occurs, it is a safe failure. Several standards for safety-critical applications recommend fault tolerance—for hardware as well as for software. For example, the IEC 61508 standard (which is generic and application sector independent) recommends among other techniques: â€Å"failure assertion programming, safety bag technique, diverse programming, backward and forward recovery.† Also, the Defense standard (MOD 00-55), the avionics standard (DO-178B), and the standard for space projects (ECSS-Q-40- A) list design diversity as possible means for improving safety. Usually, the requirement is not so much for fault tolerance (by itself) as it is for high availability, reliability, and safety. Hence, IEEE, FAA, FCC, DOE, and other standards and regulations appropriate for reliable computer-based systems apply. We can achieve high availability, reliability, and safety in different ways. They involve a proper reliable and safe design, proper safeguards, and proper implementation. Fault tolerance is just one of the techniques that assure that a system’s quality of service (in a broader sense) meets user needs (such as high safety). History The SAPO computer built in Prague, Czechoslovakia was probably the first fault-tolerant computer. It was built in 1950–1954 under the supervision of A. Svoboda, using relays and a magnetic drum memory. The processor used triplication and voting (TMR), and the memory implemented error detection with automatic retries when an error was detected. A second machine developed by the same group (EPOS) also contained comprehensive fault-tolerance features. The fault-tolerant features of these machines were motivated by the local unavailability of reliable components and a high probability of reprisals by the ruling authorities should the machine fail. Over the past 30 years, a number of fault-tolerant computers have been developed that fall into three general types: (1) long-life, un-maintainable computers, (2) ultra dependable, real-time computers, and (3) high-availability computers. Long-Life, Unmaintained Computers Applications such as spacecraft require computers to operate for long periods of time without external repair. Typical requirements are a probability of 95% that the computer will operate correctly for 5–10 years. Machines of this type must use hardware in a very efficient fashion, and they are typically constrained to low power, weight, and volume. Therefore, it is not surprising that NASA was an early sponsor of fault-tolerant computing. In the 1960s, the first fault-tolerant machine to be developed and flown was the on-board computer for the Orbiting Astronomical Observatory (OAO), which used fault masking at the component (transistor) level. The JPL Self-Testing-and-Repairing (STAR) computer was the next fault-tolerant computer, developed by NASA in the late 1960s for a 10-year mission to the outer planets. The STAR computer, designed under the leadership of A. Avizienis was the first computer to employ dynamic recovery throughout its design. Various modules of the computer were instrumented to detect internal faults and signal fault conditions to a special test and repair processor that effected reconfiguration and recovery. An experimental version of the STAR was implemented in the laboratory and its fault tolerance properties were verified by experimental testing. Perhaps the most successful long-life space application has been the JPL-Voyager computers that have now operated in space for 20 years. This system used dynamic redundancy in which pairs of redundant computers checked each-other by exchanging messages, and if a computer failed, its partner could take over the computations. This type of design has been used on several subsequent spacecraft. Ultra-dependable Real-Time Computers These are computers for which an error or delay can prove to be catastrophic. They are designed for applications such as control of aircraft, mass transportation systems, and nuclear power plants. The applications justify massive investments in redundant hardware, software, and testing. One of the first operational machines of this type was the Saturn V guidance computer, developed in the 1960s. It contained a TMR processor and duplicated memories (each using internal error detection). Processor errors were masked by voting, and a memory error was circumvented by reading from the other memory. The next machine of this type was the Space Shuttle computer. It was a rather ad-hoc design that used four computers that executed the same programs and were voted. A fifth, non-redundant computer was included with different programs in case a software error was encountered. During the 1970s, two influential fault-tolerant machines were developed by NASA for fuel-efficient aircraft that require continuous computer control in flight. They were designed to meet the most stringent reliability requirements of any computer to that time. Both machines employed hybrid redundancy. The first, designated Software Implemented Fault Tolerance (SIFT), was developed by SRI International. It used off-the-shelf computers and achieved voting and reconfiguration primarily through software. The second machine, the Fault-Tolerant Multiprocessor (FTMP), developed by the C. S. Draper Laboratory, used specialized hardware to effect error and fault recovery. A commercial company, August Systems, was a spin-off from the SIFT program. It has developed a TMR system intended for process control applications. The FTMP has evolved into the Fault-Tolerant Processor (FTP), used by Draper in several applications and the Fault-Tolerant Parallel processor (FTPP) – a parallel processor that allows processes to run in a single machine or in duplex, tripled or quadrupled groups of processors. This highly innovative design is fully Byzantine resilient and allows multiple groups of redundant processors to be interconnected to form scalable systems. The new generation of fly-by-wire aircraft exhibits a very high degree of fault-tolerance in their real-time flight control computers. For example the Airbus Airliners use redundant channels with different processors and diverse software to protect against design errors as well as hardware faults. Other areas where fault-tolerance is being used include control of public transportation systems and the distributed computer systems now being incorporated in automobiles. High-Availability Computers Many applications require very high availability but can tolerate an occasional error or very short delays (on the order of a few seconds), while error recovery is taking place. Hardware designs for these systems are often considerably less expensive than those used for ultra-dependable real-time computers. Computers of this type often use duplex designs. Example applications are telephone switching and transaction processing. The most widely used fault-tolerant computer systems developed during the 1960s were in electronic switching systems (ESS) that are used in telephone switching offices throughout the country. The first of these AT&T machines, No. 1 ESS, had a goal of no more than two hours downtime in 40 years. The computers are duplicated, to detect errors, with some dedicated hardware and extensive software used to identify faults and effect replacement. These machines have since evolved over several generations to No. 5 ESS which uses a distributed system controlled by the 3B20D fault tolerant computer. The largest commercial success in fault-tolerant computing has been in the area of transaction processing for banks, airline reservations, etc. Tandem Computers, Inc. was the first major producer and is the current leader in this market. The design approach is a distributed system using a sophisticated form of duplication. For each running process, there is a backup process running on a different computer. The primary process is responsible for checkpointing its state to duplex disks. If it should fail, the backup process can restart from the last checkpoint. Stratus Computer has become another major producer of fault-tolerant machines for high-availability applications. Their approach uses duplex self-checking computers where each computer of a duplex pair is itself internally duplicated and compared to provide high-coverage concurrent error detection. The duplex pair of self-checking computers is run synchronously so that if one fails, the other can continue the computations without delay. Finally, the venerable IBM mainframe series, which evolved from S360, has always used extensive fault-tolerance techniques of internal checking, instruction retries and automatic switching of redundant units to provide very high availability. The newest CMOS-VLSI version, G4, uses coding on registers and on-chip duplication for error detection and it contains redundant processors, memories, I/O modules and power supplies to recover from hardware faults – providing very high levels of dependability. The server market represents a new and rapidly growing market for fault-tolerant machines driven by the growth of the Internet and local networks and their needs for uninterrupted service. Many major server manufacturers offer systems that contain redundant processors, disks and power supplies, and automatically switch to backups if a failure is detected. Examples are SUN’s ft-SPARC and the HP/Stratus Continuum 400. Other vendors are working on fault-tolerant cluster technology, where other machines in a network can take over the tasks of a failed machine. An example is the Microsoft MSCS technology. Information on fault-tolerant servers can readily be found in the various manufacturers’ web pages. Conclusion Fault-tolerance is achieved by applying a set of analysis and design techniques to create systems with dramatically improved dependability. As new technologies are developed and new applications arise, new fault-tolerance approaches are also needed. In the early days of fault-tolerant computing, it was possible to craft specific hardware and software solutions from the ground up, but now chips contain complex, highly-integrated functions, and hardware and software must be crafted to meet a variety of standards to be economically viable. Thus a great deal of current research focuses on implementing fault tolerance using COTS (Commercial-Off-The-Shelf) technology. References Avizienis, A., et al., (Ed.). (1987):Dependable Computing and Fault-Tolerant Systems Vol. 1: The Evolution of Fault-Tolerant Computing, Vienna: Springer-Verlag. (Though somewhat dated, the best historical reference available.) Harper, R., Lala, J. and Deyst, J. (1988): â€Å"Fault-Tolerant Parallel Processor Architectural Overview,† Proc of the 18st International Symposium on Fault-Tolerant Computing FTCS-18, Tokyo, June 1988. (FTPP) 1990. Computer (Special Issue on Fault-Tolerant Computing) 23, 7 (July). Lala, J., et. al., (1991): The Draper Approach to Ultra Reliable Real-Time Systems, Computer, May 1991. Jewett, D., A (1991): Fault-Tolerant Unix Platform, Proc of the 21st International Symposium on Fault-Tolerant Computing FTCS-21, Montreal, June 1991 (Tandem Computers) Webber, S, and Jeirne, J.(1991): The Stratus Architecture, Proc of the 21st International Symposium on Fault-Tolerant Computing FTCS-21, Montreal, June 1991. Briere, D., and Traverse, P. (1993): AIRBUS A320/ A330/A340 Electrical Flight Controls: A Family of Fault-Tolerant Systems, Proc. of the 23rd International Symposium on Fault-Tolerant Computing FTCS-23, Toulouse, France, IEEE Press, June 1993. Sanders, W., and Obal, W. D. II, (1993): Dependability Evaluation using UltraSAN, Software Demonstration in Proc. of the 23rd International Symposium on Fault-Tolerant Computing FTCS-23, Toulouse, France, IEEE Press, June 1993. Beounes, C., et. al. (1993): SURF-2: A Program For Dependability Evaluation Of Complex Hardware And Software Systems, Proc. of the 23rd International Symposium on Fault-Tolerant Computing FTCS-23, Toulouse, France, IEEE Press, June 1993. Blum, A., et. al., Modeling and Analysis of System Dependability Using the System Availability Estimator, Proc of the 24th International Symposium on Fault-Tolerant Computing, FTCS-24, Austin TX, June 1994. (SAVE) Lala, J.H. Harper, R.E. (1994): Architectural Principles for Safety-Critical Real-Time Applications, Proc. IEEE, V82 n1, Jan 1994, pp25-40. Jenn, E. , Arlat, J. Rimen, M., Ohlsson, J. and Karlsson, J. (1994): Fault injection into VHDL models:the MEFISTO tool, Proc. Of the 24th Annual International Symposium on Fault-Tolerant Computing (FTCS-24), Austin, Texas, June 1994. Siewiorek, D., ed., (1995): Fault-Tolerant Computing Highlights from 25 Years, Special Volume of the 25th International Symposium on Fault-Tolerant Computing FTCS-25, Pasadena, CA, June 1995. (Papers selected as especially significant in the first 25 years of Fault-Tolerant Computing.) Baker, W.E, Horst, R.W., Sonnier, D.P., and W.J. Watson, (1995): A Flexible ServerNet-Based Fault-Tolerant Architecture, Pr oc of the 25th International Symposium on Fault-Tolerant Computing FTCS-25, Pasadena, CA, June 1995. (Tandem) Timothy, K. Tsai and Ravishankar K. Iyer, (1996): â€Å"An Approach Towards Benchmarking of Fault-Tolerant Commercial Systems,† Proc. 26th Symposium on Fault-Tolerant Computing FTCS-26, Sendai, Japan, June 1996. (FTAPE) Kropp Nathan P., Philip J. Koopman, Daniel P. Siewiorek(1998):, Automated Robustness Testing of Off-the-Shelf Software Components, Proc of the 28th International Symposium on Fault-Tolerant Computing , FTCS’28, Munich, June, 1998. (Ballista). Spainhower, l., and T.A.Gregg, (1998):G4: A Fault-Tolerant CMOS Mainframe Proc of the 28th International Symposium on Fault-Tolerant Computing FTCS-28, Munich, June 1998. (IBM). Kozyrakis, Christoforos E., and David Patterson, A New Direction for Computer Architecture Research, Computer, Vol. 31, No. 11, November 1998.

Saturday, November 9, 2019

Authentic Leadership Essay

1. Learning about oneself is an essential step in becoming an authentic leader. What role did self-awareness play in Sally’s story of leadership? Throughout her journey, Sally’s self-awareness made her into an authentic leader she is. Self-awareness is having a personal insight of one’s self, and as Sally was being aware of her strength and weaknesses; she understood herself and what she clearly wanted. She was able to grasp her traits and characteristic, both her assets and flaws to her advantage. Sally also concentrated on her values, emotions, goals, motives and who she really was deep inside. And as she did so, she was able to familiarize herself to the situations she was in. She learned to be a chameleon that adapts to the current surroundings. After her second book, she rose to more fame and finally adjusted herself to be presented as who she really is in front of her audience. After finding oneself along those years of professional experiences and risks sh e took, she learned to present herself as simply an author, and not a social science expert who took advantage of what she has to offer. 2. How would you describe the authenticity of Sally’s leadership? Her authenticity comes from simply portraying herself, not pretending or conforming to what is the trend in leadership. Sally takes her internalized moral perspective, not allowing the pressure or what’s happening around her affect her but leaning on towards her core values and moral standards guide her behavior towards situations. Her experiences in different aspects of life were able to shape her into a genuine person, and that what makes her an authentic leader. She wasn’t simply conformed into following the flow of reality in her life, but she was determined to wait and figure out the vague spots in her verve. She knew what to follow without needing any help or advice, because as said earlier she was aware of whom she really is and what she really want. She had the sense of spontaneity in her probably in result of her inspiration in life who was Holly Golightly, a character known for her instin ctiveness, in contrast to structured leaders who confide to theoretical knowledge. 3. At the end of the case, Sally is described as taking on the â€Å"mantle of leadership.† Was this important for Sally’s leadership? How is taking on the mantle of leadership related to a leader’s  authenticity? Does every leader reach a point in his or her career where embracing the leadership role is essential? Yes, I personally think it was an important part of her leadership. She was evolving and maturing in her leadership as she wasn’t anymore an â€Å"outsider looking in† but someone who embraces the role she has. It is related in a leader’s authenticity because taking the mantle of leadership makes you know what you’re stand is among the community or the organization you are in. You are knowledgeable to what you should do, what you can do, and what are the needs of your followers are as a leader. You won’t be able to lead well if you are not confident enough to take on the shoes of responsibility and walk on it, it ta kes courage and commitment to do so. However, not every leader has the same approach and style in his/her leadership. Some are very hesitant to fully embracing and getting their hands dirty in the process, not being able to take risk as they don’t have a great sense of confidence in themselves. While others, like Sally are able to put their selves out in the open, taking the role and responsibility of an authentic leader and bringing their originality in leading. CASE 10.2 MOVING MOUNTAINS FOR EDUCATION AND PEACE 1. What are the driving forces behind Greg’s leadership? Which of George’s characteristics of authentic leaders does Greg exhibit? When Greg gave up on his attempt to scale â€Å"The Savage Peak† as a way to honor his late sister, it showed the lack of his commitment in reaching his goal. Greg got separated from his group and lost his way on his way down to the mountain, he went missing for seven days until he was found and aided by the villagers of Korphe, Pakistan. He was able to witness and experience the love and care that the villagers were providing him even though he was just a mere stranger plus a foreigner in the land. This incident became the starting point of the force that driven his leadership, it was the need in his heart to be able to give back to the village that once helped him when he was left exhausted, weak and disoriented. From then, he was able to discover more about the differences of their culture in contrast to the culture that the Americ ans were brought up. And as he observed and learn more about the Korphe village in general, he became more engrossed and attached to it. These forces were able to drive the once lacking-in-commitment man he was to a man behind 78 schools (by 2008) in Afghanistan and Pakistan. Greg exhibited the fifth characteristic of an authentic leader, which is having the passion about one’s mission. Everything that Greg did was an act from his heart and not to satisfy any selfish ambitions. He simply started by offering his expertise as a nurse to the village after recovering from the exhaustion of being lost. He then promised to come back and build a school for the people of Korphe, after learning that they couldn’t afford a decent education. Greg began asking for donations and even reached to a point of donating everything he owned. But after all the effort and passion that didn’t go unnoticed, he was finally able to give back and make his promise into a reality. 2. In the chapter, we discussed moral reasoning and transparency as components of authentic leadership. In what way is each of these components a part of Greg’s leadership? Greg exhibited his transparency in numerous of ways in his leadership. He was decisive in revealing his true self to the villagers and was honest to disclose the matter of the promise he needed to fulfill when he came back from Korphe to his relatives, friends and even celebrities. He was also able to share his motives and disposition in an appropriate matter with politicians and even religious leaders without spurring a conflict in between. Greg was able to show both his positive and negative trait, as a result of being transparent; but this transparency and openness in communication became a huge factor for him to be able to meet the needs of the people not only in Korphe but also reaching to Afghanistan and the rest of Pakistan. As the name of Greg Mortenson became rapidly known of, he had achieved in gaining the trust of various people; from Islamic religious leaders, government officials, military commanders and tribal chiefs. Not only those influential people who help position but also those individuals who Greg randomly interacts with, these individuals greatly helped him in his endeavors. His effort weren’t appreciated by everyone; he received death threats and hate mails that reached to a point of having him held at gunpoint. However, Greg used these happenings to his advantage and used to it as a channel for his avocation in regards to education and peace. He was able to make an ethical decision during an unlikely situation to be in, which I think is a characteristic of moral reasoning. This kind of strategy led Greg to make ethical decisions  one after the other, that resulted into 78 built schools by 2008, but I must say that he wasn’t able to give justice in exhibiting moral reasoni ng in contrast to his exhibition of transparency. 3. In pursuing his goals to build schools in Pakistan and Afghanistan, Greg faced enormous challenges. What role did authentic leadership play in helping him meet these challenges? Did being an authentic leader always have a positive impact on his work? Greg Mortenson’s authenticity in leadership was probably the result of a critical life event in his life. When he got lost in nowhere on the way down to the mountain and when he got frustrated but got a comeback of a life changing lesson with the chief village, these two were on of his life altering events. He not only became a stronger individual, but also a strong leader. It has triggered all the right characteristics in him that brought the authentic leader out of Greg. As Greg was shaped after the events of his life one after the other, he then knew how to handle the challenges he was faces not confiding in anything or anyone but just doing what he knows best. In the passage, there were a few instances that his authenticity in leadership weren’t well-received. When he was first starting the project of building the school, he was struggling to in searching for thr budget of 12 grand. After the help of a doctor and a good friend of him, he got the budget and started to put his promise into action. However, he encountered problems in regards to the supply and the case of building the bridge. After the success of building one school after three years, he continued doing his work and encountered quite a few more impacts. Greg was an authentic leader, meaning he was a leader whose traits were just merely based one his self, his influence and inspiration. He was not trained or taught how to be a leader and more importantly how to handle certain common situations. This was one of the downfalls of being authentic in Greg’s leadership.

Thursday, November 7, 2019

Definition and Examples of Antithesis in Rhetoric

Definition and Examples of Antithesis in Rhetoric Antithesis is a  rhetorical term for the juxtaposition of contrasting ideas in balanced phrases or clauses. Plural: antitheses. Adjective: antithetical. In grammatical terms, antithetical statements are parallel structures.   A perfectly formed antithesis, says Jeanne Fahnestock, combines isocolon, parison, and perhaps, in an inflected language, even homoeoteleuton; it is an overdetermined figure. The aural patterning of the antithesis, its tightness and predictability, are critical to appreciating how the syntax of the figure can be used to force semantic opposites (Rhetorical Figures in Science, 1999). Etymology From the Greek, opposition Examples and Observations Love is an ideal thing, marriage a real thing.(Goethe)Everybody doesnt like something, but nobody doesnt like Sara Lee.(advertising slogan)There are so many things that we wish we had done yesterday, so few that we feel like doing today.(Mignon McLaughlin, The Complete Neurotics Notebook. Castle Books, 1981)We notice things that dont work. We dont notice things that do. We notice computers, we dont notice pennies. We notice e-book readers, we dont notice books.(Douglas Adams, The Salmon of Doubt: Hitchhiking the Galaxy One Last Time. Macmillan, 2002)Hillary has soldiered on, damned if she does, damned if she doesnt, like most powerful women, expected to be tough as nails and warm as toast at the same time.(Anna Quindlen, Say Goodbye to the Virago. Newsweek, June 16, 2003)It was the best of times, it was the worst of times, it was the age of wisdom, it was the age of foolishness, it was the epoch of belief, it was the epoch of incredulity, it was the season of Light, it was the season of Darkness, it was the spring of hope, it was the winter of despair, we had everything before us, we had nothing before us, we were all going direct to Heaven, we were all going direct the other way.(Charles Dickens, A Tale of Two Cities, 1859) Tonight you voted for action, not politics as usual. You elected us to focus on your jobs, not ours.(President Barack Obama, election night victory speech, November 7, 2012)Youre easy on the eyesHard on the heart.(Terri Clark)We must learn to live together as brothers or perish together as fools.(Martin Luther King, Jr., speech at St. Louis, 1964)The world will little note, nor long remember what we say here, but it can never forget what they did here.(Abraham Lincoln, The Gettysburg Address, 1863)All the joy the world containsHas come through wishing happiness for others.All the misery the world containsHas come through wanting pleasure for oneself.(Shantideva)The more acute the experience, the less articulate its expression.(Harold Pinter, Writing for the Theatre, 1962)And let my liver rather heat with wineThan my heart cool with mortifying groans.(Gratiano in The Merchant of Venice by William Shakespeare)Jack Londons CredoI would rather be ashes than dust! I would rather that my s park should burn out in a brilliant blaze than it should be stifled by dryrot. I would rather be a superb meteor, every atom of me in magnificent glow, than a sleepy and permanent planet. The proper function of man is to live, not to exist. I shall not waste my days in trying to prolong them. I shall use my time.(Jack London, quoted by his literary executor, Irving Shepard, in an introduction to a 1956 collection of Londons stories) Antithesis and AntithetonAntithesis is the grammatical form of antitheton. Antitheton deals with contrasting thoughts or proofs in an argument; Antithesis deals with contrasting words or ideas within a phrase, sentence, or paragraph.(Gregory T. Howard, Dictionary of Rhetorical Terms. Xlibris, 2010)Antithesis and AntonymsAntithesis as a figure of speech exploits the existence of many natural opposites in the vocabularies of all languages. Small children filling in workbooks and adolescents studying for the antonyms section of the SAT learn to match words to their opposites and so absorb much vocabulary as pairs of opposed terms, connecting up to down and bitter to sweet, pusillanimous to courageous and ephemeral to everlasting. Calling these antonyms natural simply means that pairs of words can have wide currency as opposites among users of a language outside any particular context of use. Word association tests give ample evidence of the consistent linking of opposites in verbal memo ry when subjects given one of a pair of antonyms most often respond with the other, hot triggering cold or long retrieving short (Miller 1991, 196). An antithesis as a figure of speech at the sentence level builds on these powerful natural pairs, the use of one in the first half of the figure creating the expectation of its verbal partner in the second half.(Jeanne Fahnestock, Rhetorical Figures in Science. Oxford University Press, 1999) Antithesis in Films- Since . . . the quality of a scene or image is more vividly shown when set beside its opposite, it is not surprising to find antithesis in film . . .. There is a cut in Barry Lyndon (Stanley Kubrick) from the yellow flickers of a flaming house to a still gray courtyard, lined with soldiers, and another from the yellow candles and warm browns of a gambling room to the cool grays of a terrace by moonlight and the Countess of Lyndon in white.(N. Roy Clifton, The Figure in Film. Associated University Presses, 1983)It is clear that in every simile there is present both differences and likenesses, and both are a part of its effect. By ignoring differences, we find a simile and may perhaps find an antithesis in the same event, by ignoring likeness. . . .- In The Lady Eve (Preston Sturges), a passenger boards a liner by tender. This was conveyed by the two vessels whistling. We see a convulsive spurt of water and hear a desperate, soundless puff before the siren of the t ender found its voice. There was a stuttering amazement, a drunken incoordination to these elaborate preliminaries, foiled by the liners lofty unruffled burst of sounding steam. Here things that are like, in place, in sound, and in function, are unexpectedly contrasted. The commentary lies in the differences and gains force from the likeness.(N. Roy Clifton, The Figure in Film. Associated University Presses, 1983) Antithetical Observations of Oscar Wilde- â€Å"When we are happy, we are always good, but when we are good, we are not always happy.†(The Picture of Dorian Gray, 1891)- â€Å"We teach people how to remember, we never teach them how to grow.†(The Critic as Artist, 1991)- â€Å"Wherever there is a man who exercises authority, there is a man who resists authority.†(The Soul of Man Under Socialism, 1891)- â€Å"Society often forgives the criminal; it never forgives the dreamer.†(The Critic as Artist, 1991) Pronunciation: an-TITH-uh-sis

Tuesday, November 5, 2019

Biography of Mary Boleyn, the Boleyn Survivor

Biography of Mary Boleyn, the Boleyn Survivor Mary Boleyn (ca. 1499/1500–July 19, 1543) was a courtier and noblewoman at the court of Henry VIII of England. She was one of the king’s earlier mistresses before being supplanted by her sister Anne and marrying a soldier with little income. However, her absence from court allowed her to escape blame when her sister fell, and she was permitted to inherit what remained of the Boleyn property and fortune. Fast Facts: Mary Boleyn Occupation: CourtierKnown For: Sister of Anne Boleyn, mistress of King Henry VIII, and survivor of the Boleyns downfallBorn: circa 1499/1500 in Norfolk, EnglandDied: July 19, 1543 in EnglandSpouse(s): Sir William Carey (m. 1520-1528); William Stafford (m. 1534-1543)Children: Catherine Carey Knollys, Henry Carey, Edward Stafford, Anne Stafford Early Life in England and France Because of the shoddy record-keeping in the Tudor era, historians cannot pinpoint Mary’s exact date of birth or even her place in the birth order among the three Boleyn siblings. Most agree, however, that she was born around 1499 or 1500 at the Boleyn family home, Blickling Hall in Norfolk, and that she was the eldest child of Thomas Boleyn and his wife Katherine, nà ©e Lady Katherine Howard. The couple soon had another daughter, Anne, and a son, George. Mary was educated at her family’s primary seat, Hever Castle in Kent, along with her siblings. Her education consisted of basic school subjects such as math, history, reading, and writing, as well as the various skills and crafts required of a lady of noble birth, such as embroidery, music, etiquette, and dancing. When she was about fifteen, Mary’s father secured her a position in the royal court of France as a maid of honor to Princess Mary Tudor, soon to be Queen Mary of France. A Royal Mistress Twice Over Although young, Mary quickly established herself in the new queen’s household. Even when Queen Mary was widowed in 1515 and returned to England, Mary was permitted to stay behind at the court of Francis I. Her father Thomas, now the ambassador to France, and her sister Anne joined her. Between 1516 and 1519, Mary remained at the French court. While there, she apparently gained a reputation for her romantic behavior, having multiple affairs, including one with King Francis. Modern historians question whether contemporary accounts of her affairs were exaggerated or not; it certainly didn’t help that Francis infamously called her â€Å"a very great whore, the most infamous of all.† The Boleyns (aside from Anne) returned to England sometimes in 1519, and Mary was married to a respectable and wealthy courtier, William Carey, on February 2, 1520. She was given a position as a lady-in-waiting to the queen, Katherine of Aragon. Although King Henry was still fairly happy in his marriage to Katherine, it was well-known at this point that he often had affairs with the ladies of the court. One such affair, with a woman named Bessie Blount, resulted in an illegitimate son: Henry Fitzroy, whom the king acknowledged as his bastard. The queen, who had suffered several miscarriages and stillbirths and was approaching the end of her childbearing years, had no choice but to look the other way. At some point, though historians are unsure as to precisely when, Henry’s gaze fell on Mary, and they began an affair. In the early 1520s, Mary had two children: a daughter, Catherine Carey, and a son, Henry Carey. The rumor that King Henry fathered Catherine, Henry, or both has persisted and gained popularity, but there is no actual evidence behind the theory. The Other Boleyn For a time, Mary was the favorite of the court and the king (and thus of her family). However, in 1522, her sister Anne returned to England and also joined the queen’s court, although she and Mary likely moved in different circles, given Anne’s intense intellectual interests which Mary was not known to share. Anne became one of the more popular ladies at court, and, like so many before her, caught the attentions of the king. Unlike others, however, she refused to become his mistress. Many historians have interpreted this as an early sign of her ambitions to be queen, but other scholars have suggested that she simply was uninterested and would have preferred he cease his attentions so she could make a good, legitimate match. By 1527, however, Henry had made up his mind to divorce Katherine and marry Anne, and in the meantime, Anne was treated as de facto queen. Mary’s husband William died when the sweating sickness swept through the court in 1528, leaving her with debts. Anne took over guardianship of Mary’s son Henry, giving him a respectable education, and secured a widow’s pension for Mary. Anne was crowned queen on June 1, 1533, and Mary was one of her ladies. By 1534, Mary had remarried for love to William Stafford, a soldier and the second son of a landowner in Essex. Stafford had little income, and the couple was married in secret. When Mary became pregnant, however, they were forced to reveal their marriage. Queen Anne and the rest of the Boleyn family were furious that she had married without royal permission, and the couple was banished from court. Mary attempted to get the king’s advisor, Thomas Cromwell, to intervene on her behalf, but King Henry either never got the message or was not moved to action. Likewise, the Boleyns did not relent until Anne did; she sent Mary some money but did not reinstate her position at court. Between 1535 and 1536, Mary and William are believed to have had two children of their own: Edward Stafford (who died at the age of ten), and Anne Stafford, whose whereabouts as an adult are lost to history. Final Years and Legacy of Survival By 1536, Queen Anne had fallen out of favor, and she was arrested (along with her brother George and several male courtiers) and charged with treason, witchcraft, and adultery. Mary did not communicate with her family at this time – indeed, there is no record of contact after Anne’s brief gift following Mary’s exile. Anne was executed on May 19, 1536 (her brother had been executed the day prior), and the remains of the Boleyn family were disgraced. Mary, however, escaped notice. She and her family continued to live off their lands. Mary died on July 19, 1543; her specific cause of death is unknown. Mary never returned to court, but her daughter, Catherine Carey, was summoned by the head of the Howard/Boleyn clan to serve as a lady-in-waiting, first to Anne of Cleves, then to her distant cousin Catherine Howard. Eventually, she became the first lady of the bedchamber (a high-ranked lady-in-waiting) to her cousin, Queen Elizabeth I. Through Catherine and her husband Sir Francis Knollys, Mary’s lineage remains in the British royal family to this day: Queen Elizabeth II is her descendant through her mother, Queen Elizabeth the Queen Mother. Mary was mostly forgotten by history in favor of the more colorful and influential figures of the Tudor era. She featured in a few historical fiction and non-fiction texts, but she gained attention in popular culture following Philippa Gregory’s 2001 novel The Other Boleyn Girl and its subsequent 2008 film adaptation. Because many details of her life were not recorded (she was noble, but not especially important), we only know bits and pieces about her. More than anything, her legacy is not one of being the â€Å"unimportant† Boleyn, but of being the Boleyn who survived and thrived. Sources Gregory, Philippa. The Other Boleyn Girl. Simon Schuster, 2001.Hart, Kelly. The Mistresses of Henry VIII.  The History Press, 2009.Weir, Alison. Mary Boleyn: The Mistress of Kings.  Ballantine Books, 2011.Wilkinson, Josephine. Mary Boleyn: The True Story of Henry VIIIs Favorite Mistress. Amberley, 2009.

Sunday, November 3, 2019

World History I Essay Example | Topics and Well Written Essays - 500 words

World History I - Essay Example Questia is the world's largest online library of books and journal articles. Both sites are academic in nature, with no special interests. What is the site's purpose Wikipedia is designed to provide browsers with access to encyclopedic articles on a wide variety of topics. Like any encyclopedia, its purpose is academic and informational. Similarly, Questia is a full-service online library with books and journal articles, as well as newspaper and limited magazine articles. It is also designed to be an academic topic research source to paying subscribers (it has a free trial available to new users). How is the site listed Both sites are obtainable through standard internet search engines by either typing in a subject for research or the names of the organizations themselves. Both are replete with referenced material and reliable antecedents, as well as full citation information. Some sources on the sites include links to the publisher or author. Who is likely to use the site On Wikipedia, the intended audience appears to be those with general interests who need basic information. It is written on a high school level, has graphics and maps where relevant, and active links within the articles for additional research.