Monday, May 25, 2020

Race Riots During the Red Summer of 1919

The Red Summer of 1919 refers to a series of race riots that took place between May and October of that year. Although riots occurred in more than thirty cities throughout the U.S., the bloodiest events were in Chicago, Washington D.C., and Elaine, Arkansas. Causes of the Red Summer Race Riots Several factors came into play precipitating the riots. Labor Shortages: Industrial cities in the North and Midwest profited greatly from World War I. Yet, the factories also encountered serious labor shortages because white men were enlisting in World War I and the United States government halted immigration from Europe.The Great Migration: To fulfill these job shortages, at least 500,000 African-Americans moved from the South to Northern and Midwestern cities. African-Americans were also leaving the South to escape Jim Crow laws, segregated schools, and lack of job opportunities.Racial Strife: Working class white workers in Northern and Midwestern cities resented the presence of African-Americans, who were now competition for employment. Riots Erupt in Cities Throughout the South The first act of violence took place in Charleston, South Carolina, in May. For the next six months, riots occurred in small Southern towns such as Sylvester, Georgia and Hobson City, Alabama as well as larger northern cities such as Scranton, Pennsylvania, and Syracuse, New York.  The largest riots, however, took place in Washington D.C., Chicago, and Elaine, Arkansas. Washington DC Riots Between Whites and Blacks On July 19, white men initiated a riot after hearing that a black man had been accused of rape. The men beat random African-Americans, pulling them off of streetcars and beating street pedestrians.  African-Americans fought back after local police refused to intervene. For four days, African-American and white residents fought. By July 23, four whites and two African-Americans were killed in the riots. In addition, an estimated 50 people were seriously injured. The D.C. riots were especially significant because it was one of the only instances when African-Americans aggressively fought back against whites. Whites Destroy Black Homes and Businesses in Chicago The most violent of all the race riots began on July 27. A young black man visiting Lake Michigan beaches accidentally swam on the South Side, which was frequented by whites. As a result, he was stoned and drowned. After the police refused to arrest the young mans attackers, violence ensued. For 13 days, white rioters destroyed the homes and businesses of African-Americans. By the end of the riot, an estimated 1,000 African-American families were homeless, over 500 were injured and 50 people were killed. Arkansas Riot by Whites Against Sharecroppers One of the last but most intense of all the race riots began on October 1 after whites tried to disband the organization efforts of African-American sharecropper organizations. Sharecroppers were meeting to organize a union so that they could express their concerns to local planters. However, the planters  opposed the workers organization and attacked African-American farmers. During the riot in Elaine, Arkansas, an estimated 100 African-Americans and five whites were killed.

Thursday, May 14, 2020

The Epic Of Gilgamesh - 1523 Words

Mohammad El-haj Mid-Term Humanities Question #1: The Epic of Gilgamesh The story focuses on Gilgamesh who is a king, goddess and man in the ancient Sumerian City state of Uruk. Gilgamesh is presented as the strongest and handsome man in the world but this makes the king feel superior to his subjects.’ Gilgamesh exploits young men through tiresome activities. In addition, Gilgamesh sexually exploits young women in his Kingdom until the residents of Urk cannot take any more and prays to gods for deliverance. The god Adu hears the residents’ travails and commands the goddess Aruru to revenge by creating another man with same supernatural powers as Gilgamesh. Aruru creates Ekindu, a man who exhibits uncivilized character and lives in the wood†¦show more content†¦Later, Gilgamesh survives the great flood after heeding the advice of Siduri and the immortal man Utnapishtim. The epic of Gilgamesh is important in the study of early civilizations especially the Sumerian society in regard to culture and religion. The story depicts a religious society that believed in supernatural powers that punishes people for been sinners. The story is also significant in understanding the values, norms and beliefs of the Sumerians. In particular, we learn that the Sumerians valued morality, loathed beastly acts and believed in just leadership. The main themes in this epic of Gilgamesh are death, friendship, sex, man and the natural world among others. Other themes that have been well capture by the story are fear, pride, religion and perseverance. The story depicts the importance of friendship in the society, the need to avoid pride, the need to have perseverance of the face of problems and the importance of chastity or good morals (Cunningham and Reich 156). Question #2: The Concept of Pre-Socratic Philosophy The concept of Pre-Socratic philosophy refers to Greek philosophy before Socrates philosophy. Aristotle called the pre-Socrates philosophers as physicists since they used natural explanations in their phenomena unlike the theologians who explained phenomena based on supernatural aspects. The pre-Socrates rejected the mythological explanations of phenomena and instead applied the rational explanations. Others focused on explaining a

Wednesday, May 6, 2020

Cry, the Beloved Country by Alan Paton - 1076 Words

Alan Paton who was a South African author and anti-apartheid activist wrote the novel Cry, the Beloved Country, The novel publication in 1948 was just before South Africa institutionalized racial segregation under Apartheid. Paton addresses the destruction of the tribal system in South Africa due to white colonization by using the novel as a medium to illustrate is damage. Throughout the novel we are exposed to the numerous problems resulting from the colonization. Communities are in collapse, the land is bare, people are starving, and families are broken. These fictional communities and people are based on the real problem Paton saw in South Africa. The concern of â€Å"native crime† by the whites is a result of changes in the social†¦show more content†¦The most dramatic lost is of Stephen own son. Absalom while in Johannesburg is corrupted by his cousin and break into numerous white people’s homes. Absalom is the only one of three found guilty in the burglar y that lead to the death of Arthur Jarvis because he is the only one to admit his mistake while the other two, one being his cousin, denies any connection. Colonization and the unbearable life established by whites in South Africa has lead to the lost of family and sense of community. The Kumalo family serves are a prime example. They are act as individuals rather than a group in Johannesburg and this ends with numerous broken relationships such as John to Gertrude, Gertrude with her son, Absalom and his cousin. The family is battered and bruised as a whole, opposite of the tribal system of the Ndotcheni community that values togetherness and family. The deterioration of the tribal system can be stopped, but not without the help of the whites they must come together with the blacks to solve both their problems such as white priests like Father Vincent and black priests like Mismangu who lived and worked together to better themselves and those around them. It is not the fact that the tribal community and valves are broken by the whites, but â€Å"the tragedy is that they are not mended again. The white has broken the tribe†¦ It suited the white men to break the tribe. But is has not suited him to build something in the place of what is broken† (56).Show MoreRelatedCry, the Beloved Country by Alan Paton838 Words   |  3 Pagesindividuals. Alan Paton examines this problem in Cry, the Beloved Country. Throughout the story, Paton adds specific personalities to his characters to contribute to change. Characters in Cry, the Beloved Country went through hardships that changed them to realize reality and its outcomes. Paton accordingly creates a picture throughout his story to explain the problems in South Africa. There are many contributing factors of Paton’s idea to identify as being important for change to occur in Cry, the BelovedRead MoreCry, the Beloved Country by Alan Paton696 Words   |  3 PagesCry, the Beloved Country is a novel with remarkable lyricism written by Alan Paton. Born as a white South African, Alan Paton grew up during a time period marked by racial inequality and later became an activist against apartheid. He was a devout Christian so many of his writings reflect Christian faith. As an activist, he wrote many books about South Africa and racial injustice. While traveling around Europe, he began writing Cry, the Beloved Country, which was published in 1948. That same yearRead MoreCry, The Beloved Country By Alan Paton1155 Words   |  5 Pages Cry, The Beloved Country by Alan Paton is a stunning and all too accurate depiction of apartheid in South Africa. Even though the novel centers on John Kumalo and his struggling family, it subtly shows the social going ons of South Africa supposedly in 1948, when the book was written. Strong examples of this come across in the choral chapters of the novel. These chapters give voice to the people of South Africa. Chapter nine shows the struggles of being black during apartheid, chapter 12 shows theRead MoreCry, The Beloved Country, By Alan Paton1373 Words   |  6 Pagesescape with various routes, but an escape that interestingly calls back to the nature of innocence and child-like questions. It is in this way that Alan Paton’s enduring novel, Cry, The Beloved Country, takes on a unique and refreshing approach to a basic question: that of the equality and dignity of all people. Throughout Cry, The Beloved Country, Paton exudes frequent references to childhood, a devout religiosity, and of course, a return to simple questions; all of which contribute the idea of innocenceRead MoreCry, the Beloved Country by Alan Paton778 Words   |  4 Pagesfront to give it the opposite meaning. Therefor e, it means a land free of cold and horror. It’s such an ironic name for a country where people are living their lives with hunger and fear. The conditions in South Africa during mid-1900 were even worse than they are today. Alan Paton addresses these issues in his novel, Cry, the Beloved Country, published in 1948. Paton uses two contrasting places to present his view of South Africa while suggesting solutions. The desolate village of NdotsheniRead MoreImagery In Cry, The Beloved Country By Alan Paton768 Words   |  4 Pagesnoises, etc, as did the roles in the novel. Alan Paton uses a strong voice packed with imagery in his passage, â€Å"For they grow red and bare; they cannot hold the rain and mist, and the streams are dry in the kloofs. Too many cattle feed upon the grass, and too many fires have burned it. Stand shod upon it, for it is coarse and sharp, and the stones cut under the feet. It is not kept or guarded, or cared for, it no longer keeps men, guards men, cares for men† (Paton, 34). The overwhelming senses of touchRead MoreCry, The Beloved Country By Alan Paton Reconciliation981 Words   |  4 PagesDespite the violence depicted amongst the whites and blacks of South Africa, in Cry, The Beloved Country by Alan Paton reconciliation and the spirit of unity present themselves through two men: Reverend Kumalo and James Jarvis. To be able to reconcile and unite with others, people must first be able to look inward and come to peace with themselves. One of the main struggles throughout Cry, The Beloved Country emanates from within the characters, as they try to come to terms with events. StephenRead MoreAlan Paton s Cry, The Beloved The Country1358 Words   |  6 Pagesthe Blacks, leading up to the Civil War, and during the Apartheid, the Natives were segregated from the Whites. In Alan Paton’s Cry, the Beloved the Country, the main character Stephen Kumalo goes through a journey to restore his tribe. During his journey, he discovers and learns of the injustices in South Africa. Through the parallels and contradictions of biblical allusions, Alan Paton is able to explain the impact of racial inequality in South Africa, but signifies how unconditional love and hopeRead MoreCry, The Beloved Country By Alan Paton Analysis929 Words   |  4 Pages It is no new information that God tends to take the ordinary people out of their normal lives and make something great out of them. This is exactly what happened to Stephen Kumalo in the book Cry, the Beloved Country by Alan Paton. It is those are are broken and imperfect that God sees something special through. Taking these people out of their brokenness and make the world better through them. Like all the other ordinary people that got brought up by God, Stephen Kumalo’s journey was no differentRead MoreAlan Paton s Cry, The Beloved Country1747 Words   |  7 Pagesdevastating impacts of fear in slavery, Stalin’s brutal reign over Russia, and most significantly, the Nazi party. Fear has constantly been shown to possess and control people to engender dire consequences, much like it does in Alan Paton’s novel Cry, the Beloved Country. In his novel, Paton examines the negative impacts of fear, namely prejudice and corruption. Set in South Africa, the main chara cter, reverend Stephen Kumalo, observes the stark contrast between his poor village and the cosmopolitan city

Tuesday, May 5, 2020

ICT Service Management for Quantum Computing - MyAssignmenthelp

Question: Discuss about theICT Service Management for Quantum Computing. Answer: What Quantum Computing Can Do for You Warner, B. (2013). What Quantum Computing Can Do for You. Bloomberg. [Online], Available at: https://www.bloomberg.com/news/articles/2013-05-30/what-quantum-computing-can-do-for-you [Accessed on: 17 May 2017]. Quantum computing is the application of quantum mechanics in the computer systems and associated operations. The quantum computing has enormous potential and capability to revolutionize the current computing system. The quantum computers can be used to analyze and make deductions from large set of numbers which would otherwise have taken a huge amount of time. It has several applications such as it can be used for future rug cures or examining a huge avalanche of public data. The quantum computing uses the quantum nature of matter, atoms and computing devices. The quantum computer is different from the traditional computer as it can take both the binary digits as input initially. The quantum computer is programed to represent all the possible combination or set of input and they can be tested in the computer simultaneously. In the regular computing devices, all the possible combinations are tested in a serial cycle; therefore, the amount of time required for calculation is much highe r. It can be used to examine the chemical structure of complex molecules. It can also be used for the software verification and validation. Validating the performance of software is important for examining its effectiveness; however, it is time consuming and expensive. Features Canonical. (2017). Features. [Online]. Available at: https://www.ubuntu.com/desktop/features [Accessed on: 17 May 2017]. The Linux distribution refers to the operating system which is made up of Linux kernel and a package management system. Typically, the Linux distribution system comprises of Linux kernel, GNU tools, libraries and desktop environment. In Linux distribution, most of the software used are free of cost and open-source. Ubuntu is the most common Linux distribution software. It is fundamentally based on Debaian; however, it has several unique software repositories. The software in these repositories is synced to the Debian software, so that they could run on any platform. The focus of Ubuntu project is to provide the users with a solid desktop and server experience to the users. In this regard, the technology is customized for the operating system. The Ubuntu Touch edition is also commonly used in network servers. It can run on either the physical or the virtual servers. The security is a major concern for the Ubuntu software developers. In the default operations of the system, the utility programs run on the low privileges and cannot corrupt the operating system of the organization. Moreover, in order to increase the security other tools are used to provide temporary privileges and keep the root account locked so that the users cannot breach the security of the system (Canonical, 2017). Week 3 VMware Workstation - No Experience Necessary Vugt, S. (2013). VMware Workstation - No Experience Necessary. Packt Publishing Ltd. Virtualization is one of the latest applications of technology which assist in developing virtual machines with the technology. It includes the development of hardware platforms, storage devices and computer network resources as the virtual version of the actual devices. In the virtualization process, the developers create virtual software which can create and operate virtual machines. The virtual machines can be categorized into type-1 and type-2 machines. The type-2 virtualization machine can run on the basic operating system just like the actual physical device. The VMware Workstation is the standard platform which can be used for running multiple operating systems as virtual machines on a single device. The VMware Workstation can be used to enhance productivity, performance, reliability and increase the workplace security. It can be used with different operating systems such as Linux or Windows. The users can replicate the server and the desktop environment on the virtual machine . With this method, several applications can run simultaneously on the physical machine. It also provide safe and isolated environment for running the operating system. It also assists the system administrator in evaluating the hypervisors and other operating systems as well as using other technologies such as cloud computing without any interference with the IT operations of the system. Network Congestion Control: Managing Internet Traffic Welzl, M. (2005). Network Congestion Control: Managing Internet Traffic. John Wiley Sons. The transportation layer protocols provide assistance to the host-to-host communication services for the applications. The primary role of the transportation layer protocol is to support the connection-oriented data stream, increase reliability, flow control and multiplexing. The DCCP (Datagram Congestion Control Protocol) is a highly popular protocol for providing assistance to the dataflow in the transportation layer. DCCP protocol is a message-oriented protocol which is used in the implementation of reliable set-up and congestion control in the transportation layer. With DCCP, congestion control mechanism is immediately applicable without using them in the application layer. It is an advanced version of TCP and UDP protocols. It is employed so that the transportation layer can effectively control the congestion in the network. It also offers several other functionalities such as it can be used for identifying the sequence number of packets, maintaining data integrity and identific ation of port numbers so that the communication devices with the same IP address can communicate with each other. It increase the overall efficiency of the commination system such as it reduces the connection teardown, efficient acknowledgement, increases congestion control and increase the security of the system. WannaCry Ransomware: Everything you need to know Sherr, I. (2017). WannaCry ransomware: Everything you need to know. Cnet. [Online]. Available at: https://www.cnet.com/news/wannacry-wannacrypt-uiwix-ransomware-everything-you-need-to-know/ [Accessed on: 17 May 2017]. Recently, more than 140 countries are affected by the WannaCry ransom ware locks people out of their computers and data until they pay the ransom. The National Security Agency first discovered vulnerability and the cyber attackers have used to create the most prolific cyber-attacks all across the globe. The ransom ware has affected the computer systems from the USA to Russia and more than 200,000 commuters have been affected all across the globe. The victims include prominent banks, telecommunication companies and hospitals. It is a hacking attack which keeps the computing system hostage until a ransom has been paid. When the ransom ware infects a computer, it encrypts all the data then a program is run on the operating system which demands money from the user to get access to the computer. Furthermore, the price increases overtime until the end of the ransom period and at the end of time, the files get destroyed. The business organizations and the individuals are equally affected by this ransom ware. In order to protect the system from this virus, it is important to keep all the software updated. In addition to it, it is important that the user does not open suspicions mails, emails and links. Delta Finally Admits there was a 'Small Fire' at Data Center in Atlanta Monday as Airline Headaches Move into Day Four Graham, R. (2016). Delta finally admits there was a 'small fire' at data center in Atlanta Monday as airline headaches move into day four. [Online]. Available at: https://www.dailymail.co.uk/news/article-3734898/Delta-computer-outage-included-small-fire-data-center.html#ixzz4hbdZppcP https://www.cnet.com/news/wannacry-wannacrypt-uiwix-ransomware-everything-you-need-to-know/ [Accessed on: 17 May 2017]. In 2016, data center fire occurred in the computer network of the US Airline Delta. The airline cancelled a large number of flights and delayed many others after the incidence. Out of the myriads of threats posed to the operation of the data center, the most damaging incidence is fire. The fire blaze can spread quickly and halt the operations of the system in a short duration of time. The risk of data center fire can be reduced by the installation of data center temperature monitoring software. In this way, whenever the temperature of the server room reaches more than normal level, the higher authority should be immediately notified. In the case of US airline Delta, the data center fire lead to the disruption on the normal routine of flights and caused delays. The issue occurred when the switchgear used to control the data center temperature malfunctioned. It occurred during the examination of backup supplies of the organization wherein the switchgear malfunctioned and the system was locked out of its reserve generators. The major data center of the company was shut down which controlled the bookings, flight operations and other critical system of the organization. How This $200 Million Beauty Company Turned Product Development on Its Head Goldman, J. (2017). How This $200 Million Beauty Company Turned Product Development on Its Head. Inc.com. [Online] available at: https://www.inc.com/jeremy-goldman/the-200m-beauty-company-that-embraced-a-crowdsourcing-mentality.html [Accessed on: 17 May 2017]. Crowdsourcing is the sourcing model in which the business organizations use the contribution from the internet users to obtain the necessary services or ideas. In this model, the work is divided among the participants so that cumulative results can be achieved for the organization. It is different from outsourcing as the work is performed from the undefined or the general public. Crowdsourcing uses a mixture of bottom-up and top-down approaches for the selection of volunteers and getting work from them. It increases the speed, quality and diversity of the operations. It is also popular for its cost-effectiveness. Sundial Brands have famously employed crowdsourcing for increasing the productivity of the organization. It used the customer feedback to develop the consumer goods. The company manufactures the beauty products especially for women. The organization is heavily directed by the customer feedback. It manufactured a product with rosemary oil in it; however, later, some customers suggested that rosemary oil is not good for the pregnant customers. As a result, the organization changed Rose Mary oil and replaced it with the pepper mint. The use of the customer feedback is essential for the growth of the organization. The company emphasize on the feedback of the customers rather than focusing on its competitors. It has assisted the organization in obtaining customer loyalty. Hackers Finally Post Stolen Ashley Madison Data Zetter, K. (2015). Hackers Finally Post Stolen Ashley Madison Data. Wired. [Online] available at: https://www.wired.com/2015/08/happened-hackers-posted-stolen-ashley-madison-data/ [Accessed on: 17 May 2017]. At present, most of the companies are clod-based solution or internet for storing information and data of the organization. The information stored on the internet mediums is sensitive in nature; therefore, any breach in the security of the organization can negatively impact on the overall operations of the organization. The data security and sensitivity is critical in the organizations which are focused on customer-services as they save the sensitive and private information of the customers. In 2015, the hackers attacked the security system of Ashley Madison which provides dating services to the customers who are in serious relationships or are married. The hackers stole the address, names and locations of its users from the user database and the credit card details. There was serious impact on the customers due to the data theft and online publishing of the data. Several people left their jobs after the publishing of data. It also resulted in termination of employees from their jobs and increased the divorce rate of the people. Other than that, several victims have to face social shaming after the leak. The victims were avoided in social settings which resulted in clinical depression and suicides. Yahoos Demise Is a Death Knell for Digital News Orgs Lafranse, A. (2017). Yahoos Demise Is a Death Knell for Digital News Orgs. The Atlantic. [Online] available at: https://www.theatlantic.com/technology/archive/2017/04/yahoos-demise-is-a-death-knell-for-digital-news-orgs/523692/ [Accessed on: 17 May 2017]. In the present ever-changing business environment, it is important for the organization to adapt to the technological changes. The business organizations should be prompt to adapt to the latest technological advancements; otherwise they will fail and lag behind their competitors. One of the common examples of the companies which failed in to adapt to technology is Yahoo which was once one of the leading business organizations. In 2005, the company had approximately 21% of the market share; however, now it lags behind other major companies such as Google, Facebook and Microsoft. The biggest mistake of the organization was that it focused on creating a great online portal rather than focusing on the importance of the search engine. It outsourced tits search player to Microsoft Bing and neglected its importance. Over the years, the company also failed in several mergers such as Facebook and Google. The main reason was that it was unwilling to shell out money for the mergers. In successf ul operations of the organization, it is important that the organization conducts mergers and acquisition to foster its growth. Moreover, it is also important for the organization to examine the current trends in technology and adapt to it. Lessons Learned: IT's Biggest Project Failures Widman, J. (2008). Lessons Learned: IT's Biggest Project Failures. PC World. [Online] available at: https://www.pcworld.com/article/152103/it_project_failures.html [Accessed on: 17 May 2017]. Information technology is an innovative field and its growth is marked with constant ups and downs. Whereas, there have been some remarkable and revolution innovation, there are also some significant failure. One of the biggest failures in the Information Technology history is the stretch project by IBM. IBM (International Business Machine) is one of the prominent technology organizations in the world and pioneer in developing computing machines. In 1956, the company declared to manufacture the fastest super computer in the history of mankind. It was intended that the computer will be able to operate at very high speed and will be able to conduct complex calculations in millions of second. After over five year of hard work of the scientists, the company launched the computer in the market. Although the seed of the super computer was ridiculously high, it was still deemed as a failure. The major reason for this is that speed of the computer was only thirty to fifty percent than the in tended speed of the intended speed. Moreover, because of this reason, the organization also had to lower the price from 13.5 million US dollars to 7.5 million US dollars and had to sell the computers at a loss. However, the stretch project of the organization was a stepping stone in the development of supercomputers. Reference List Widman, J. (2008). Lessons Learned: IT's Biggest Project Failures. PC World. [Online] available at: https://www.pcworld.com/article/152103/it_project_failures.html [Accessed on: 17 May 2017]. Lafranse, A. (2017). Yahoos Demise Is a Death Knell for Digital News Orgs. The Atlantic. [Online] available at: https://www.theatlantic.com/technology/archive/2017/04/yahoos-demise-is-a-death-knell-for-digital-news-orgs/523692/ [Accessed on: 17 May 2017]. Zetter, K. (2015). Hackers Finally Post Stolen Ashley Madison Data. Wired. [Online] available at: https://www.wired.com/2015/08/happened-hackers-posted-stolen-ashley-madison-data/ [Accessed on: 17 May 2017]. Goldman, J. (2017). How This $200 Million Beauty Company Turned Product Development on Its Head. Inc.com. [Online] available at: https://www.inc.com/jeremy-goldman/the-200m-beauty-company-that-embraced-a-crowdsourcing-mentality.html [Accessed on: 17 May 2017]. Graham, R. (2016). Delta finally admits there was a 'small fire' at data center in Atlanta Monday as airline headaches move into day four. https://www.dailymail.co.uk/news/article-3734898/Delta-computer-outage-included-small-fire-data-center.html#ixzz4hbdZppcP Sherr, I. (2017). WannaCry ransomware: Everything you need to know. Cnet. [Online]. Available at: https://www.cnet.com/news/wannacry-wannacrypt-uiwix-ransomware-everything-you-need-to-know/ [Accessed on: 17 May 2017]. Welzl, M. (2005). Network Congestion Control: Managing Internet Traffic. John Wiley Sons. Vugt, S. (2013). VMware Workstation - No Experience Necessary. Packt Publishing Ltd. Canonical. (2017). Features. . [Online]. Available at: https://www.ubuntu.com/desktop/features [Accessed on: 17 May 2017]. Warner, B. (2013). What Quantum Computing Can Do for You. Bloomberg. [Online], Available at: https://www.bloomberg.com/news/articles/2013-05-30/what-quantum-computing-can-do-for-you [Accessed on: 17 May 2017].