Monday, December 30, 2019

Oku no Hosomichi and Tosa Nikki Compare and Contrast

Comparing Oku no Hosomichi and Tosa Nikki within reason is very difficult because of the many factors that must be taken into account. The authors were from different time periods, the writing style is different, the subject is different, and many other things all contribute to its difficulty. While there are many differences there are perhaps an equal number of similarities between the two works, which offers a converse view of the relationship between them. In regards to the authors of Oku no Hosomichi and Tosa Nikki, Matsuo BashÃ…  and Ki no Tsurayuki respectively, there are several points of interest when comparing them. One of the main points is that the authors lived in completely different times, which shows in their style of†¦show more content†¦Oku no Hosomichi is arguably an evolved form of Tosa Nikki as it is reminiscent of the Tosa Nikki in many ways. Also in regards to religion, it is a very distinguishable point that there was a great deal of religion in Ok u no Hosomichi which was not present in Tosa Nikki. There are many easily discernable religious themes like impermanence, karma, and even Chinese concepts like yin and yang. This is a key point in looking at the Oku no Hosomichi because of the fact that Matsuo BashÃ…  frequently referenced many famous religious poets like SaigyÃ… . In terms of rhetoric there is an emphasis on the poetry in both works. Much of the poetry in the Tosa Nikki reflects grief and tragedy which complements the overall theme of the work. Alternately, the Oku no Hosomichi has poetry that focuses on nature and distinguishes itself in its more blatant and somewhat vulgar advances. The poetry of the Tosa Nikki was also placed towards the occasion as an accompaniment and while the poetry of Oku no Hosomichi was also in accompaniment to the situation, BashÃ…  many times also included the back story to the poem in detail. It is also important to note that the Tosa Nikki was written in a combination of pros e and the more traditional waka, while the Oku no Hosomichi was written in both prose and haiku. Also the writing of the Tosa Nikki was in Chinese characters mainly because the

Sunday, December 22, 2019

Essay about The Iliad of Homer - 1055 Words

The Iliad is the quintessential epic. It is full with gods, goddesses, heroes, war, honor, glory, and the like. However, for just short while near the very conclusion Homer avoids all of those epic qualities. The banquet scene in Book XXIV is the most touching, the most â€Å"human† scene in the entire poem . In the midst of the dreadful gulf of war and anger there occurs an intimate moment between two men who ironically have much in common below the surface. Priam, old and fragile, makes his way to the camp of the enemy’s greatest warrior late at night. He bears what little treasures have not been exhausted by the ten-year conflict and plans to plead for the rightful return of his son’s body. This is his final heroic endeavor. And perhaps,†¦show more content†¦He calls upon his attendants to remove Priam’s gifts from the wagon and prepare Hektor’s body so that his mournful father may carry him home. But extraordinarily when the body has been washed and wrapped it is Achilles himself that embraces Hektor up and places him in the wagon. At the same time he is embracing his own inevitable fate. Upon returning Achilles invites Priam to join him for supper and reminds him that, mournful as they may be, they must remember to eat. Neither has eaten in days but now it is as if a great weight has been lifted from each man’s heart and a strange healing power has surfaced. Finally relieved, they are able to satisfy one of their basic human needs. Again, Achilles assumes the role of the elder of the two and shares with the old king a story to support his decision to have supper. Again, though he has accepted his death it seems as though Achilles is buying himself a little more time. â€Å"But when they had put aside their desire for eating and drinking,† Priam gazes at Achilles in wonder. In him he sees godlike qualities and he is reminded of his own heroic son. This is again a bizarre occurrence taking into consideration that Achilles has the killed so many of his children. Perhaps Priam accepts those deaths as an element of the war and doesn’t see Achilles exclusively as a killer. If this is so than Priam’s kind heart and ability toShow MoreRelatedThe Iliad By Homer1654 Words   |  7 Pages The Iliad is a collection of poems by Homer describing the 10-year siege on Troy by Greeks in what is now famously referred to as the Trojan War. Several Greek and Trojan characters are worth a special mention in these Homeric poems because of the roles they played in the battles before the war was won, how they conducted themselves to help eventually win the war for their side. This paper specifically investigates the writings in the Homeric poems to look are important in the overall text. TheRead MoreThe Iliad By Homer892 Words   |  4 Pages The Iliad by Homer depicts the great struggle by Agamemnon and the Greeks to take the mighty city state of Troy and return Helen to her rightful husband, Menelaus. While many ponder if the war actually happened, or why the gods always seemed to be more human than humans themselves, few ask the key but often overlooked question; why is Agamemnon the leader of the Greeks in the first place? What happened that put him in charge of the Greek forces? Why does there seem to be an underlying resentmentRead MoreThe Iliad, by Homer980 Words   |  4 Pages The Iliad written by Homer in the days of Ancient Greece has become one of the most epic poems of all time. It is a poem that has been debated for centuries. Within the tale of Achilles and the wrath of war lies a magnificent object that is shortly mentioned in Book 18. The brief section in Book XVIII, lines 505-660, described the shield that Achilles would carry into battle. How ever, it also tells us something about the nature of Achilles and his heroic image full of rage and anger. In orderRead MoreThe Iliad By Homer2007 Words   |  9 PagesThe Iliad is a collection of poems written by Homer describing the 10-year siege of the city of Troy by Greeks in what is now famously known as the Trojan War. Several characters stand out in the series of poems because of the roles they played in the war, how they behaved and the acts they took to help eventually win the war for the Greeks (then known as Akhaians). This paper specifically investigates the writings in Books two, four, thirteen, sixteen and seventeen and why the events in these booksRead MoreThe Iliad, by Homer855 Words   |  4 PagesIn Homers epic Iliad, the poet emphasizes the control of the gods in the war he describes. He creates literary devices around these well-known deities to illustrate their role in the action, conveying to his audience that this war was not just a petty conflict between two men over a woman, but a turbulent, fiery altercation amongst the gods. To an audience which had likely lost their fathers, brothers, or husbands to the Trojan War, it would be a welcome relief to hear that the whole affair wasRead MoreThe Iliad by Homer1383 Words   |  6 Pageswas, in fact, useful. Aristotle agreed with Plato that literature induces undesirable emotions, but he stated that it only does so in an attempt to purge us of these harmful sentiments, a process which he termed â€Å"catharsis†. The events in Homer’s Iliad, while used by both Plato and Aristotle to defend their theories about literature, lend themselves to the defense of Aristotle’s ideas more so than Plato’s. Specifically, the juxtaposition of Achilleus’s intense lamentation with the portrayal of Hephaistos’sRead MoreThe Iliad By Homer2191 Words   |  9 PagesThe Iliad By Homer was created in the late 5th-early 6th century A.D. This Epic was a best seller, but the publishing date and publisher is unknown, due to the story being so old. The Iliad is around 576 pages long. Some facts that have to do with the Iliad that are not well knows include the name Homer resembling the greek word for â€Å"hostage.† Also, taking place after the events of the Iliad, Aeneas supposedly survives the war and goes on to become the founder of roman culture. Going on to a differentRead MoreIliad by Homer1216 Words   |  5 Pagesin Homer’s Iliad, to be a hero is to be â€Å"publicly recognized for ones valour on the battlefield† and to have a prize with it (Sale). In other words, a hero is someone who fights for his own fame and glory. However, the modern perception of a hero is quite different. A hero is someone who do not endeavor to become a hero, but someone who act in admirable ways, often for the better of everyone else. The modern concept of heroism is what defines a true hero. Achilles is a hero in the Iliad, because ofRead MoreThe Iliad Of The Homer s Iliad Essay1475 Words   |  6 PagesThe Iliad ranks as one of the most important and most influential works in terms of world literatures since its establishment. Between the underlying standard to which the Iliad offers us as audience members, along with the plethora of writers that have followed in the footsteps to which Homer’s Iliad paved, the impact that the Iliad has played is remarkable in itself. While the Iliad can be credited for much of present day literature we study today, Hollywood can be created for the plethora ofRead More The Iliad of Homer Essay711 Words   |  3 Pages When analyzing the Greek work the Iliad, Homer procures an idealistic hero with an internal conflict, which questions the values of his society and the Greek Heroic Code. The Greek Heroic Code includes respect, honor, and requirements to procure an exorbitant image. To be considered a Greek hero you must meet the perquisites and fulfill all of the aspects of the code. Achilleus was deemed a hero, he was the strongest and swiftest of the Achieans. Achilleus lived up to all of these aspects until

Friday, December 13, 2019

Locke on the Social Contract Theory Free Essays

Social Contract Theory is a philosophy, which states that political and moral obligations of a person are rendered to him, upon an agreement between the ruler and the society. This agreement governs both the ruler and the ruled society to act in accordance with one another. John Locke, along with Thomas Hobbes and Jean Jacques Rousseau, is one of the best known proponents of this theory, which emerged as one of the most influential political theories in the history of the Modern West. We will write a custom essay sample on Locke on the Social Contract Theory or any similar topic only for you Order Now Social Contract Theory was an answer to reject the Divine Right Theory, which was used by kings and queens as their basis for their right to rule. Locke’s most important and influential writings are in his book, Two Treatises on Government. The first treatise in his writing is geared towards the rejection of Divine Right theory; and the second treatise states Locke’s own views on the justification for the civil government, which he entitled An Essay Concerning the True Original Extent and End of Civil Government. John Locke’s Social Contract Theory held a positive view about human nature. He argued that humans have a gift of reason, and man’s natural condition is a state of perfect and complete liberty wherein, humans live their lives at its best without interference from other people. People are assumed to be in equal footing with one another and are bound by the Law of Nature. This Law of Nature however is according to Locke’s view is the basis of all morality, and thus must not extend to harm other people’s rights with regards to their life, health, liberty or possessions (Locke 2003). Further more, as his concept of State of Nature lacks civil power amongst men and an appeal to the Law of Nature allowing people to defend themselves. Because of this lack of authority, a war is likely to break out, thus prompting the reason to abandon the State of Nature and recognize a contract that shall in turn form a government. This, as a result to man’s having the ability to think rationally, humans submit themselves to a higher authority for the protection of their rights. However, in Locke’s Social Contract Theory, a rational individual will only agree to a government, with minimal and limited control, and a government that is controlled by the citizens. Because for Locke, the government can be easily lured to become restrictive, corrupt and abusive of powers, thus prompting the individuals to always retain some power over the government for the sake of freedom and equality. This issue concerning freedom has always been central to Locke’s market government. Government must always employ the right blend of freedom and restrictions with it. For the people, their property and lives are their rational interests; and their concept to form a government is geared towards the protection of these interests. Therefore, the people, although putting the security of their rights in the government, are still fearful of the government’s potential power (The Social Contract). Thus, according to Locke, should the government cease to become responsive to its citizens, the government should be overthrown. They still hold the right to revolt against their ruler if they realize that their ruler is no longer able to cater to their needs and has been abusive and oppressive to the rights of man. Locke also supported the idea of laissez-faire, wherein there will be limited government intervention for the market to be able to generate a prosperous civil society based on individual’s rational competition. Locke’s version of the theory has played a great role in the development of the Western politics, particularly in America. His social contract plus laissez faire, has also became the basis for market institutions. Locke’s theory has been influential to the current criminal justice system, with property playing an essential role in the society’s government and contract that establishes it. With the State of Nature being itself chaotic when no one is bound to control the state of liberty for men, hence bringing about the State of War, and eventually creating the need to establish a contract between the ruler and the ruled society to enable people to rightfully defend their life and liberty. Thus, the need to protect their properties has prompted the people to abandon the State of Nature and form the social contract between the civil society and the government. Given the great influence that John Locke has posed through his political theories, his philosophies have continued to live until the present time, especially in American politics. The criminal justice system and world politics in general have exhibited strong influential heritage from Locke’s philosophies; in particular pertaining to the way the government must handle its affairs, so as to please the civil society who placed them in power. The Democratic form of government and criminal system, wherein the civil society is always left with a choice to whom must be put into power is an example of a social contract. And in turn, the overthrow or government leaders who did not much perform for the benefit of the people is an illustration of Locke’s theory. Reference Locke, John. (2003) Two Treatises of Government and A Letter Concerning Toleration. Yale University Press. The Social Contract. Retrieved October 25, 2007 from http://www.sagepub.com/upm-data/2769_Swri01.pdf    How to cite Locke on the Social Contract Theory, Essay examples

Thursday, December 5, 2019

California SB 1386 Essay Example For Students

California SB 1386 Essay On July 1, 2003, California enacted an electronic data privacy law to protect residents from one of its fastest growing crimes: identity theft. SB 1386 (Civil Code 1798.29) requires businesses to notify California residents if a security breach results in disclosure of personal electronic data. All businesses are subject to this law regardless of size, location, or operations. Business owners should be aware of the problems associated with identity theft, the steps required to comply with SB 1386, and the preventative measures available. Identity theft is a significant problem to both citizens and financial institutions. The FTC estimates that over 27.3 million Americans have been the victims of identity theft in the past five years. The U.S. financial impact is staggering; in 2002 alone, losses were estimated at $48 billion to financial institutions and $5 billion to victims. The FTC reviewed trends from 214,905 cases reported in 2003, and California accounted for the highest number of incidents (39,452). In 20% of all cases, the source of the information breach involved disclosure of personal data over the internet or other electronic sources. In 55% of all cases, the identity theft resulted in credit card, bank, or loan fraud. Federal and state laws address this growing problem. The FTC provides some protection by aggressively enforcing existing federal laws. Under the unfair and deceptive trade practices law, a website operator must adhere to the companys own privacy policy or face prosecution for failing to exercise a reasonable standard of care. Reasonable care includes addressing potential system vulnerabilities such as viruses and encrypting personal information so that it cannot be viewed. The FTC recently ordered several large corporations to implement stronger privacy controls after breaches exposed personal information. In January of 2001, Eli Lilly settled with the FTC after accidentally releasing the e-mail addresses of nearly 700 consumers who were using the companys anti-depressant Prozac. Seven months later, Microsoft was targeted by the FTC for misrepresenting the security of its Passport Wallet web service. More recently, in April of 2004, Tower Records faced allegations for allowing and failing to correct a breach that disclosed consumer information including names, billing and shipping addresses, email addresses, phone numbers, and purchase histories. Under the separate settlement agreements, the three companies were barred from misrepresenting website security and required to implement rigorous programs to prevent future incidents. Californias SB 1386 takes the FTCs efforts one step further by requiring companies to notify California residents when a security lapse has resulted in disclosure of personal information so that immediate action may be taken to mitigate damages. In 2002, the California state employee payroll database was breached. Confidential information about 265,000 employees was available to hackers including names, addresses, bank account numbers, and social security numbers. The data center didnt notify anyone for several weeks, leaving the employees vulnerable to identity theft longer than necessary. In response, SB 1386 was enacted as a means to ensure that Californians receive prompt notification so they may take immediate steps to protect their personal information. SB 1386 applies to any business that stores unencrypted personal information of an employee or customer that resides in California. According to the law, personal information means an individuals name in combination with any one or more of the following elements:1.Social security number2.Drivers License number of California Identification Card number3.Account number, Credit or debit card number, in combination with any required security code, access code, or password that would permit access to an individuals financial account. Any unauthorized access of a computer and its data constitutes a breach. Notification must be provided even if confidential personal information was not stolen due to the difficulties of proving that all data remained secure. Any breach discovered on or after July 1, 2003 falls within the scope of SB 1386, and the law requires notification in the most expedient manner and without unreasonable delay. Legal notification can be conducted by direct mail, e-mail, posting on the companys public website, or notification to major statewide media. Compliance with SB 1386 and litigation could be costly. To date, there have been no lawsuits, however Wells Fargo recently spent millions of dollars to comply with the new law. .uc819e565fc56871cc8ce3517adb0965b , .uc819e565fc56871cc8ce3517adb0965b .postImageUrl , .uc819e565fc56871cc8ce3517adb0965b .centered-text-area { min-height: 80px; position: relative; } .uc819e565fc56871cc8ce3517adb0965b , .uc819e565fc56871cc8ce3517adb0965b:hover , .uc819e565fc56871cc8ce3517adb0965b:visited , .uc819e565fc56871cc8ce3517adb0965b:active { border:0!important; } .uc819e565fc56871cc8ce3517adb0965b .clearfix:after { content: ""; display: table; clear: both; } .uc819e565fc56871cc8ce3517adb0965b { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .uc819e565fc56871cc8ce3517adb0965b:active , .uc819e565fc56871cc8ce3517adb0965b:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .uc819e565fc56871cc8ce3517adb0965b .centered-text-area { width: 100%; position: relative ; } .uc819e565fc56871cc8ce3517adb0965b .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .uc819e565fc56871cc8ce3517adb0965b .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .uc819e565fc56871cc8ce3517adb0965b .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .uc819e565fc56871cc8ce3517adb0965b:hover .ctaButton { background-color: #34495E!important; } .uc819e565fc56871cc8ce3517adb0965b .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .uc819e565fc56871cc8ce3517adb0965b .uc819e565fc56871cc8ce3517adb0965b-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .uc819e565fc56871cc8ce3517adb0965b:after { content: ""; display: block; clear: both; } READ: Major Tasks Of Quantity Surveyor Construction EssayIn 2003, Wells Fargo hired a consulting firm to perform some work and turned over a database that contained names and social security numbers of 200,000 consumers that had secured loans from Wells Fargo. A petty thief stole the laptop containing the database from the consultants office. When the theft was discovered, Wells Fargo took steps to comply with SB 1386 and sent letters to all 200,000 customers, not just those residing in California. A follow up call was placed to each customer to ensure that the correspondence had been received. Account numbers were changed, and customers were encouraged to contact credit reporti ng agencies and monitor their credit. Wells Fargo also offered to purchase Privacy Guard service for each customer. Privacy Guard service costs approximately $75 per person and provides notification of activity on credit reports. Even though the laptop was recovered and it was determined that the information had not been used, compliance with SB 1386 was costly due to the number of individuals affected. Businesses can implement preventative measures to help reduce the costs and loss of good will that can result from such a breach of security. Companies that electronically store personal information should have a formal written security policy that addresses data security. An effective plan addresses the size of the organization, the existing computing infrastructure, the types of activities conducted over the internet, and the amount the company is willing to spend on security features to mitigate problems. Security features include firewalls, secure socket layer encryption (encryption at the starting and end points), and intrusion detection systems. The plan should outline notification procedures and allow for the investigation and documentation of all breaches. Implementation of a formal written security policy will ensure compliance with SB 1386. Identity theft is a growing concern due to the enormous financial consequences. SB 1386 outlines a companys responsibilities for securing private information. Businesses have a moral and legal obligation to provide a high level of security and disclose breaches so action can be taken. Adherence to SB 1386 will reduce the damages of identity theft and protect companies from litigation and loss of good will. ReferencesFTC Press Releases and Reports:Identity Theft Victim Complaint Data, Figures and Trends in California, January 1 December 31, 2003. http://www.consumer.gov/idtheft/IDT_CY03/California%20CY2003.pdfJanuary 18, 2002, Eli Lilly Settles FTC Charges Concerning Security Breach. http://www.ftc.gov/opa/2002/01/elililly.htmAugust 8, 2002, Microsoft Settles FTC Charges Alleging False Security and Privacy Promises. http://www.ftc.gov/opa/2002/08/microsoft.htmApril 21, 2004, Tower Records Settles FTC Charges. http://www.ftc.gov/opa/2004/04/towerrecords.htmArticles:Cheryl A. Falvey, Disclosure of Security Breaches Required by New California Privacy Legislation. http://library.lp.findlaw.com/articles/file/00008/009186/title/Subject/topic/Antitrust%20and%20Trade%20Regulation_Unfair%20Trade%20Practices/filename/antitrustandtraderegulation_2_237Whole Security, Facts on Identity Theft. http://www.wholesecurity.com/threat/identity_theft.htmlAuxillium West, California SB 1386 Personal Information: Privacy. http://www.auxillium.com/californiaSB1386.shtmlStrongAuth, Inc., Californias SB 1386 Frequently Asked Questions. http://www.strongauth.com/regulations/sb1386/sb1386FAQ.htmlLegislation:California SB 1386http://info.sen.ca.gov/pub/01-02/bill/sen/sb_1351-1400/sb_1386_bill_20020926_chaptered.html

Thursday, November 28, 2019

Reality body soul free essay sample

Reality body soulIn analyzing this concept, I will start saying that reality can be modified very easily and it is important take it into account. In this case, it does not apply to the real body, but to the one represented on the canvas. Dorians pact transfers this reality very easy from the external body reality to the inward reality of the soul within the portrait. How sad it is! Murmured Dorian, with his eyes still fixed upon his own portrait. How sad it is. I shall grow old, and horrible, and dreadful. But this picture will always remain young. It will never be older than this particular day of June†¦ If it were the other way! If It were I who was to be always young, and the picture that was to grow old!. .. for that, I would give my soul for that! (PODG 28)According to this quote, this is the exact moment when Dorian basically invoke his soul and as a consequence he made his sole exist within the picture in stead of within his body. We will write a custom essay sample on Reality body soul or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Which meant that all of his sins from that moment on will be represented and manifested not in his body but in his soul which is within the picture. As a result, he sees the modifications occurring on his soul by contemplating the portrait from the outside. This modifications and alterations are due to the individuals actions and thoughts that occur in Dorians body. The Picture of Dorian Gray reflects then a division of the individual: On the one hand, the soul, inner reality which is subject to change and on the other hand, the body, outer reality which its change is suspended. The two realities cannot be separated, they are irrevocably connected and the change cannot be negated.Real-IdealOscar Wildes questioned the relationship between art and life which puts into doubt what it is real and what it is not real (ideal). The first issue that comes to mind is: Who is the true individual the painting or the man? Well, this is not very clear according to Wildes sense of self.In my opinion, the portrait represents the true, naked self. An idealized one represented before Lord Henrys influence. But eventually, Dorians self esteem will be truncated, he can never again adore his own particular beauty once he knows it is only a mask of his real ugliness represented on the canvas. His self claim is a way of postponing this mirror reality because at first when he made that pact he completely forgot his pain and suffering until he could see there the projection of his actions. The only way to calm down this inward turmoil is, as Dorian sees it, to pulverizes the only proof of his crimes, the portrait that once delighted him and now terrifies him. He needs to dispose of the past keeping in mind the end goal to adapt to the present, unburdened by this present existence of the spirit.The portrait mediates the transition to a subsistence clearly determined by sin, worry and his understanding of affection. Once the portrait is destroyed, what was hidden from the others becomes real, the hid inner reality involves be reflected within the outward reality of the body. Dorian grey returns to the human condition that reacts to the passage of your time and acknowledges death, whereas the portrait returns to its status of a piece of art.From the beginning of the novel, we can clearly see two things that are going to be key in this story: On the one hand how Basil Halward represesnts his obsessive fascination for Dorian into Dorians picture showing too much of himself and on the other hand how Lord Henry Wooton gives one of his very well-known sermons that will make Dorian a totally different person and that will change his lifes perspective (including the idea of beauty, youth, and other things important to Henry.)[†¦]†¦youth is one thing worth having†¦ you dont feel it now. Some day when you are old and wrinkled and ugly, when thought has seared your forehead with lines, and passion branded your lips with its hideous fires, you will feel it, you will feel it terribly†¦. Beauty is a form of Genius, is higher, indeed, than Genius, as it needs no explanation. It is of the great facts of he world, like sunlight, or springtime, or the reflection in dark waters of that silver shell we call the moon. It cannot be questioned You smile? Ah! When you have lost it you wont smile. As I said before this quote from the book tell us that from this moment on Dorian starts changing his mind and starts panicking about his own physical appearance and becoming jealous of his own picture that will always be fresh and young. Indeed, from the beginning of the book we can infer that Dorian is a very young boy which had a very difficult youth. His mother, Lady Margaret Devereux and Dorians father were gone early in his life. His dad was killed by a Belgian brute a few months after his marriage to Lady Margaret, who died soon after. This important years in his life lacked this unconditional love from his parents. So his personality was not strong enough at the end of his youth which will cause him serious trouble and unhappiness during thenovel when he becomes very influenced in the bad sense of the word by the Victorian society (Lord Henry Wooton). He is going to commit a lot of sins and bad actions that will end killing him, first psychologically but later on physically.

Monday, November 25, 2019

The Technology of Computer Wireless Networking essays

The Technology of Computer Wireless Networking essays Computer technology and use are more in demand today than ever. In an attempt to accommodate computer users, the amount of computer peripherals and accessories is on the rise. This paper will discuss particular hardware that is on the market today, which is wireless computer networking. Moreover, it will go in depth as to what exactly wireless networking entails, how to configure your computer for wireless networking and some advantages and disadvantages associated with wireless networking so potential users could determine if this type of hardware is one that would be suitable for their use. With computing technology on demand today, there is a wide variety of computer hardware on the market to select from, depending on the needs of the user. A specific type of hardware that is of special interest to me is wireless computer networking. I would like to discuss what wireless networking entails, how it works and some advantages and disadvantages associated with the hardware. To begin with, wireless computer networking is the ability to link multiple computer systems in a household together without any wires. One may wonder how this could be possible, and this will be discussed later on in this paper. At any rate, this type of technology could be proven useful in a household with a lot of computer users to even a single household user with a desktop PC and a laptop. It all depends on the frequency of use for the system, which now and days majority of households depend on computer technology in one way or another. Currently, there are four types of wireless networks available: Bluetooth, IrDA, HomeRF (SWAP), and WECA (Wi-Fi). The difference between them is the range from slow and inexpensive to fast and expensive. Bluetooth is not readily available on the market, and WECA (Wi-Fi) is mostly used in offices instead of homes because it is expensive and complicated to set up (How wireless networking w ...

Thursday, November 21, 2019

What is a purpose of a college education Essay Example | Topics and Well Written Essays - 1000 words

What is a purpose of a college education - Essay Example However, even the best college institutions are not providing these skills. The main purpose of the higher education institutions, colleges in particular, should be to provide the students with a wide range of skills that would help them in functioning appropriately in the workplace such as broadmindedness and problem solving skills that may not be accomplished if the institutions are underequipped. This claim is correct because the modern world has intense competition that requires an individual to be equipped with a wide range of skills since some job positions are highly competitive. Therefore, if one position is not available, an individual can utilize other skills and work in a different position. The article, â€Å"College at Risk† by Andrew Delbanco maintains that although the original purpose of colleges had the interests of the students in mind, it has changed. In fact, in a broader sense, a college institution is a place where the students encounter ideas both from fellow peers and from instructors that help them in becoming creative. In addition, the concept of broad-mindedness was meant to be emphasized through college education. This was meant to help the individuals in dealing with hardships that they may encounter in the workplace. Personally, I agree with these claims. The higher education sector has become a commodity that is only available to the wealthy few; therefore, secluding the unfortunate ones and diverging from the original purpose, which was not economic-oriented. I have also seen many colleges charge very high tuition fees, which was not the case in the past. For instance, my own college has been charging higher fees as compared to previous years. This implies that only the wealthy can afford higher education. This is affecting the availability of opportunities and acquisition of skills especially in the American society, thus affecting the original purpose of colleges. The colleges have concentrated on profit

Wednesday, November 20, 2019

Describe a Place Essay Example | Topics and Well Written Essays - 250 words

Describe a Place - Essay Example Its features give an objective idea of the pre-historic world. There is so much for the tourists to visit the Okefenokee Swamp Park including wilderness walkways, wildlife shows and exhibits, Pioneer Island, visits to original Indian Waterways on boats and the preserved natural habitat of the native animals and birds. (Barrett) has recorded the statistics about wildlife in the Okefenokee Swamp in her article some of which are discussed here. A total of 64 species of reptiles are found in the Okefenokee Swamp, of which the alligator happens to be one. These cold-blooded animals find the climate and environment of the Okefenokee Swamp perfectly suited to their needs. There are also 12 different species of snakes in the Okefenokee Swamp that include both poisonous and non-poisonous snakes. Some of the extremely rare species of snakes like the copperhead snake also lives in the Okefenokee Swamp. The park also contains 50 species of mammals and 235 species of

Monday, November 18, 2019

The management of people Essay Example | Topics and Well Written Essays - 2500 words

The management of people - Essay Example Management is a serious task (Aguilar, 2002). Low team morale is a hindrance to success in any project and it is the Manager's responsibility not only to make sure that the project is successful, but also see that the team is satisfied. People work in projects to make something for people. The problems in projects are human problems. For every technical, financial or schedule problem there is a human problem behind it. The most significant resource any business has is its people. A significant element in managing a complicated project knows how to manage the most precious asset the human resources. Perhaps the greatest challenge that is presented by a global project is the management of the human resource pools. This is true at a macro or overall staffing levels and micro or delegation of work to labour pools level. Management is now assuming a greater role to strategic business partners (Holsapple and Joshi. 2000). Successful businesses realize that true competitive advantage lies in the people. Businesses have been forced to redefine the responsibilities and develop a compelling response for critics who dispute human resource's value to the bottom-line. Management has been around since the dawn of civilization (Terry, 1960). In primitive societies almost everybody had to do physical labour. To break away from this burden, about the only choices were going into politics (kings) or religion (priests). Complications arise in tracing the history of management. Others see it by definition as a late modern in the sense of late modernity conceptualization (Ahmed, Lim, and Zairi. 1999). On those terms it cannot have a pre-modern history, only harbingers. Others, on the other hand, detect management-like activities in the pre-modern past. Civilized urban societies led to more specialization, produced new vocational alternatives to manual labour, and saw a tendency of those who did not work with the hands to look down on those who did. Others argue modern management as a discipline started as an off-shoot of economics in the 19th century (Drucker. 1988). Economists provided a theoretical background to resource allocation, production, and pri cing issues (Conceicao, Gibson, Heitor, and Shariq. 1997). About the same time, innovators produced elements of technical production such as standardization, quality-control procedures, cost-accounting, interchange ability of parts, and work-planning. Many of these aspects of management existed in the ante-bellum (pre-1861) US slave-based economy. There, 4 million people were, as the contemporary usages had it, managed in profitable quasi-mass production. By the late 19th century, a new layer of complexity is introduced to the theoretical underpinnings of management (Bennis, 1989). The first tertiary-level course in management in 1881 is offered. Management of People provides managers and human resource professionals with skills and knowledge for managing the people aspects of strategic implementation (McWilliams, Abagail, and Siegel 1999). In the early 21st century, it was easy to see the development of a "third wave" in these well-established concepts (Stacey, 1992). Just as the 21st century has seen new types of organizations and new ways of doing business arise, so, too, will there

Friday, November 15, 2019

Risk Management To Avoid Delays In Road Construction Construction Essay

Risk Management To Avoid Delays In Road Construction Construction Essay The challenges in the construction industry are of same nature irrespective of geographic locations. The areas of concern in construction project management are timely completion of projects within the allocated cost, also serious concerns about resources utilization and project planning/control measures. Risk management is the art or practice of dealing with risk. It includes planning for risk, assessing (identifying analyzing) risk issues, developing risk handling strategies, and monitoring risks to determine how they have changed. My core area of works is in the field of engineering consultancy for various road projects in Dubai, which includes project planning and monitoring the performance of these projects, most of the times we face delays as well as cost overrun at these projects. Intension of doing the project works in this area is to form a procedure/systematic approach for identification and management of various risks in the road project with the help of various lean tools and TOC concepts. The risk management is not new to the organizations where as there is lack of awareness and systematic approach towards it. Risk management plan is successfully being implemented in Banks, Oil Companies, Health care etc also the IS 31000 suggests the frame work which can be implemented in any kind of industry irrespective of type place. IS 31000 guidelines can be modified as per the specific industry requirements. (Ref ISO 31000 page v Introduction) Risk is an uncertain event or condition that, if it occurs, has an effect on at least one of the following project objective; Complete Project in allocated time Complete the project in allocated budget Maintain all quality standards as per Quality Management Plan Cover entire scope of works Project has known as well as unknown risks, in which known risks are considered for the risk management plan which can be identified, analysed and response plan can be prepared but to handle unknown risks we can have a contingency plan ready. The project work will require access to highly sensitive data of RTA (Road Transport Authority Dubai ) Parsons Overseas Ltds road projects and use of these data will be limited up to academic purpose only. Working with the various road projects in Dubai, I first derived the basic data which shows how many projects are delayed in terms of time/days as well as how much more the client has to pay for these projects other than the budgeted cost. (Ref Chart 1 for Days Chart 2 for Cost) Chart 1 Chart 2 The data above is taken from ten road projects in Dubai which clearly suggests that the delay in days has caused the respective increase in the cost this cost also may include the variation in scope. Causes behind the delay in these kinds of projects are external as well as internal, e.g. the global recession has caused client (RTA) to change the policy in terms of executing some projects, changing the priority, suspending some works etc is an external factor for the road projects where as the delay in material purchase is an internal factor. My work is more focused on the internal operational risks in these projects, where the data base in of ten RTA road projects will be used where as the sample risk management plan will be prepared based on ongoing project R800/6 for analysis purpose. Also the risk management plan for occupational Health safety as well as environmental risks are not considered for this exercise. Objectives behind Risk management plan Encourage Proactive rather than reactive management Be aware of the need to identify and treat risk throughout the organization Improve identification of opportunities and threats. Comply with relevant legal and regulatory requirements and international norms Improve reporting Improve corporate governance Improve stakeholders confidence trust Establish reliable basis for decision making and planning Improve Control Effectively allocate and use resources for risk treatment Improve operational effectiveness and efficiency Improve incident management and prevention Minimize loss Improve organizational learning RISK MANAGEMENT STRATEGY PARSONS GOALS Lead industry in Safety Continuously enhance the value of Parsons Corporation Maintain sustainable growth consistent with the demand in each market Grow consolidated net operating income and sales at least 10% annually Maintain a strong balance sheet. PARSONS STRATEGY Provide responsive, high quality service to our customers Develop long term relationships with customers who share our values. Promote best value solutions to our customers This document describes how we will perform the job of managing risks for RTA road projects in Dubai. It defines roles and responsibilities for participants in the risk processes, the risk management activities that will be carried out, the schedule and budget for risk management activities, and any tools and techniques that will be used. The objective behind this plan is to give systematic approach to identification, analysis, and monitor the various risks involved in the construction of Road/Bridge projects in Dubai and to avoid delay in the project. The risk identification at design phase is not considered for the exercise; largely emphasis is on construction activities. As a part of continuous improvement this plan has to be updated bimonthly or whenever necessary modifications are need to be done, with the consent of Risk Management team. SCOPE OF SAMPLE PROJECT This project is a component of the overall R800 Project Ras Al Khor Crossing Corridor. This Contract matches R800/5 Contract on one side. It involves the construction of a major grade-separated interchange to replace the existing Interchange No. 1 at Shaikh Zayed Road. The new interchange involves the construction of several bridges and underpasses to allow free flow of traffic and caters for the high volumes of traffic that will access new developments such as the Burj Dubai Developments, Business Bay and Dubai International Financial Center (DIFC) from Shaikh Zayed Road. The bridges of this project are connected to the elevated viaducts above Doha Road that will be built as part of Contract R800/5s. The existing Interchange No. 1 structure will be demolished as part of this project The project also include the construction of roadway signage and pavement marking, landscaping, street lighting, irrigation ducts, diversion and/or protection of services such as DEWA-ED, DEWA Water, Etisalat, Sewerage, Storm Drainage and Irrigation Systems. Engineer M/s Parsons Overseas Limited Contractor M/s Salini Costruttori S.p.A. Contract Sum (Dhs.) AED 617,871,651.00 Project Commencment Date 11 October 2006 Contractual Completion Date 28 March 2009 ( Work is in Progress ) Time of Completion 730 Days ROLES AND RESPONSIBILITIES The risk management team is not a separate task from the project management; it is an integral part of the project and requires team work. So as the construction team at project site is the part of risk management plan, where as to organize this work following members are assigned certain responsibilities. TEAM MEMBER RESPONCIBILITY PROJECT MANAGER RESIDENT ENGINEER Form a risk management team Review the risk management reports Decide a mitigation / contingency plan. Decision making. Review the exposure assessments for any new risk items. The Project Manager and other members of the Project Management team shall meetbiweekly suggestedto review the status of all risk mitigation efforts. RISK OFFICER PLANNING ENGINEER The Risk Officer has the following responsibilities and authority Coordinating risk identification and analysis activities. Maintaining the projects risk list. Notifying project management of new risk items Reporting risk resolution status to management. Project Member Assigned a Risk Civil Engineer, Structural Engineer Quantity surveyor Material Engineer The Risk Officer will assign each newly identified risk to a project member. Assess the exposure and probability for the risk factor and report the results of that analysis back to the Risk Officer. Assigned project members are also responsible for performing the steps of the mitigation plan and reporting progress to the Risk Officer biweekly. ROJECT RISK MANAGEMENT PROCESSES PLAN RISK MANAGEMENT This is the controlled document to be prepared which suggests how to conduct risk management for projects. Risk planning is important to provide enough resources time for risk management activities. To start the risk planning the following major inputs are necessary; Scope of project Schedule management plan Cost management plan Communication management plan The output of this process in a Risk Management Plan which can be modified as the project progresses also as the project scope changes. Risk management plan includes; Methodology How to approach the risks, what are the tools to be used, data sources to be used in order to perform risk management. Roles Responsibilities Risk management is not an individual task it is a team work. Organization chart to be prepared. Budgeting Assign resources, estimates funds needed for risk management in case of contingency plans if any. This part we are not considering at present for our risk management plan assuming the budgeting is readily available. Timing Establish the review for RMP during tenure of the project as well as establish a mile stone to prepare and approve RMP before the commencement of actual project woks. Risk Category Prepare a Risk Break down structure that can provide a systematic approach to identify risks from different categories from the RBS. Risk Probability, impact and matrix The risks for qualitative as well as quantitative analysis can be measured as a defined scale and the specific combinations can be rated for planning response. Reporting Out come of the risk management processes to be documented and reported. Tracking How risk activities will be recorded for the benefit of the current project as well as for future needs and lessons learned, as well as the audit of the risk management processes. IDENTIFY THE RISKS The risk identification information is to be collected from all departments using tools such as document review, unstructured interviews, check list, assumptions, and experience from old projects. The risk team can extend this task to all other projects team members in identifying the risks then it can be compiled together to prepare a risk register. The risk identification can be initiated by forming a risk breakdown structure. RISK BREAK DOWN STRUCTURE As per the project scope and nature of the project the risk breakdown structure can be prepared, for the sample project the risk are identified using the following risk breakdown structure. RISK REGISTER Once the risk break down structure is final then the risk identification can be done and can be listed in the following format called Risk Register. Sr No Risk Risk WBS Probability Remark 1 132 kv electic line relocation Obs Utility 0.9 Obstructing NW bridge 2 1200mm dia water line Obs Utility 0.9 Bridge work 3 Sewerage line Obs Utility 0.9 Can delay the traffic diversion 4 Etisalat Line Obs Utility 0.75 Obstructing NW bridge 5 Mobilization Res- Manpower 0.4 Overall project 6 Trial Trench works Int- Authority Approvals 0.8 Utility Relocation works 7 Traffic Diversion scheme implementation Obs- Traffic Diversion 0.9 Utility Relocation as well as bridge works 8 Toyota Building Obs- Expropriation 0.8 Traffic Diversion 9 Diversion of the Existing 600mm 300mm Water Diversion Obs Utility 0.8 affecting bridge UW3 10 Programme submission and approval PM- Planninng 0.8 Overall project 11 132 Kv electric line, water pipe valves , irrigation pipe valves , long lead material Int- Material 0.8 Relocation works 12 Soil investigation , Pilling, Rebar subcontractor finalization Int-Subcontractor 0.8 Road Structure works 13 Plant machinary Res- Machine 0.4 14 utility line crossing along Sheikh Zaid Road Int-Method Statement 0.3 Special works required 15 Change in design Int-Scope 0.5 QUANTITAVIE RISK ANALYSIS ( Monte Carlo Simulation ) Monte Carlo simulation is a statistical method used to produce number of trials to determine the expected value of a random variable. The Risk register mentioned above indicates a variable Risk Probability the major task in a risk management plan is to ascertain the probability right. The above variable can range from minimum to maximum probability limits which are taken from individual interviews as well as the experts opinion. Aim of the simulation exercise in to derieve Expected probability value. This exercise is done on MS Excel separatly results of which are attached in Appendix D First step is to prepare a table as shown below which Sr No Risk Probability Minimum Probability Maximum 1 132 kv electic line relocation 7 10 2 1200mm dia water line 6 10 3 Sewerage line 5 10 4 Etisalat Line 4 8.5 5 Mobilization 4 4 6 Trial Trench works 6 9 7 Traffic Diversion scheme implementation 7 9 8 Toyota Building 6 9 9 Diversion of the Existing 600mm 300mm Water Diversion 6 9 10 Programme submission and approval 2 2 11 132 Kv electric line, water pipe valves , irrigation pipe valves , long lead material 4 6 12 Soil investigation , Pilling, Rebar subcontractor finalizatin 4 7 13 Plant machinary 3 6 14 Utility line crossing along Sheikh Zaid Road 4 6 15 Change in design 4 6 Once the table is ready the data is transferred to the excel sheet to perform simulation. The results from the simulation are summarized below Sr No Risk Probability Minimum Probability Maximum Probability From Simulation 1 132 kv electic line relocation 7 10 8.5 2 1200mm dia water line 6 10 8.0 3 Sewerage line 5 10 7.5 4 Etisalat Line 4 8.5 6.2 5 Mobilization 4 4 4.0 6 Trial Trench works 6 9 7.5 7 Traffic Diversion scheme implementation 7 9 8.0 8 Toyota Building 6 9 7.5 9 Diversion of the Existing 600mm 300mm Water Diversion 6 9 7.5 10 Programme submission and approval 2 2 2.0 11 132 Kv electric line, water pipe valves , irrigation pipe valves , long lead material 4 6 5.0 12 Soil investigation , Pilling, Rebar subcontractor finalizatin 4 7 5.5 13 Plant machinary 3 6 4.5 14 utility line crossing along Sheikh Zaid Road 4 6 5.0 15 Change in design 4 6 5.0 The above simulation is just a guide line to reach to a specific probality figures where as there are limitations to this method , one it is assumed that these variables for each risk are independent and analysed independently but practically there can be relationship between two or more risk issues. PERFORM QUALITATIVE RISK ANALYSIS Risk probability and Impact Matrix With the help of risk register, risk management plan the risk will be identified for qualitative analysis. These risks are listed and assigned a risk rating using Risk probability and Impact Matrix. Aim of this method is to identify the critical risks based Risk rating which represents frequency of occurrence and the risk probability it self. The listed risks are then categorized as per the matrix established below. The numbers in the matrix represents the risk numbers from the risk register, from the above matrix we can establish the below categories High Risk, Medium Risk Low Risk. Sr No Risk Risk Rating Probability Risk Type 1 132 kv electic line relocation 8 8.5 High 2 1200mm dia water line 7 8.0 High 3 Sewerage line 6 7.5 High 4 Etisalat Line 4 6.2 High 6 Trial Trench works 5 7.5 High 7 Traffic Diversion scheme implementation 8 8.0 High 8 Toyota Building 3 7.5 High 9 Diversion of the Existing 600mm 300mm Water Diversion 8 7.5 High 15 Change in design 6 5.0 High 10 Programme submission and approval 3 2.0 Low 5 Mobilization 5 4.0 Medium 11 132 Kv electric line, water pipe valves , irrigation pipe valves , long lead material 4 5.0 Medium 12 Soil investigation , Pilling, Rebar subcontractor finalization 2 5.5 Medium 13 Plant machinery 4 4.5 Medium 14 utility line crossing along Sheikh Zaid Road 3 5.0 Medium ROOT CAUSE / CURRENT REALITY TREE ANALYSIS The above identified and categorized risk need to be further analysed to identify the root cause in order to avoid a potential delay or prepare a mitigation plan or to prepare a recovery plan. The above major risks are here classified by Current reality tree method Appendix E and the Plan Risk Response The process of developing options and actions to enhance opportunities and reduce threats to project objective. Monitor Control Risk The process of implementing risk response plans, tracking identified risks, monitoring residual risks, identifying new risks, and evaluating risk processes effectiveness throughout the project. Indentify Risks The risks to be identified based on historical events of other projects as well as the expertise opinion on the current project. 1. Risk management methodology to be used Risk Identification The objective behind this is to prepare comprehensive list of risks based on those events that might enhance, prevent, degrade or delay the achievement of objectives stated earlier. Also consideration has to be given to all risks whether they are with in the control or not in control. Risk Assessment Questionnaire, historical delay events/reports of other projects will be used to identify the risk. The questionnaire will be asked to the Design Engineers, Resident Engineer, Civil Engineer, Structural Engineer, Quantity Surveyor, Quality/Material Egg, Planning Engineer etc. The data to be entered as per the formats attached in Appendix 1A. B. Categorize Risks The data collected from risk identification templates will be categorized as per the risks High Risks, Medium Risks, Low Risks also the probability of risk occurrence to be mentioned. The data to be entered as per the formats attached in Appendix 1B. Risk Impact Assessment For the each risk identified, the probability of risk occurrence for the particular risk will be established then asses impact of the same in terms of cost and time delay. Monte carols simulation, Decision tree analysis, and Failure Mode effect analysis to analyze risks one of these tools will be used to analyze the risk and forecast the impact. D. Prioritize Risks Risks that meet the threshold criteria will be recorded in the Risk Response Plan. E. Risk Response Planning: For each risk in the Risk Response Plan, determine the options and actions to reduce the likelihood or consequences of impact to the projects objectives. Determine the response based on a cost/benefit analysis (cost vs. expected effectiveness). Describe the actions to be taken to mitigate the risk Describe the actions to be taken when the risk event occurs (contingency plan) Assign responsibilities for each agreed upon response. Assigned a due date where risk responses are time sensitive Incorporated this information into the Risk Response Plan F. Monitor Risk: Document the dates and the actions taken to mitigate the risk Document the actions taken when the risk event occurred (contingency plan) Document any subsequent actions taken Incorporate this information into the Risk Response Plan Refer appendix 1F for the templates. Establish systematic reviews and schedule them in the project schedule. These reviews are to ensure: All of the requirements of the Risk Management Plan are being implemented Assess currently defined risks Evaluate effectiveness of actions taken Status of actions to be taken Validate previous risk assessment (likelihood and impact) Validate previous assumptions State new assumptions Identify new risks Risk Response Tracking Communications H. Control Risk: Validate mitigation strategies and alternatives. Take corrective action when actual events occur Assess impact on the project of actions taken ($$, time, resources) Identify new risks resulting from risk mitigation actions Ensure the Project Plan (including the Risk Management Plan) is maintained Ensure change control addresses risks associated with the proposed change Revise the Risk Assessment Questionnaire and other risk management documents to capture results of mitigation actions. Revise Risk Response Plan Communications 4. 8. Assumptions Only the project related risks are considered, the corporate issues, economy risks are not considered. Separate risk management plan is to be prepared for Occupational Health, Safety Environment as per IS14000 18000.The other significant assumptions to be mentioned if any. The application of the risk management plan is only limited to the construction work The objective behind risk management exercise is to implement a plan for a new project where as for dissertation purpose I have taken a old, ongoing project which gives realistic picture of delays happened so far and helps in analysis.

Wednesday, November 13, 2019

Mary Jane :: essays research papers

Mary Jane A good book is one that you cannot quit thinking about. For days after you finish it, you will catch yourself daydreaming about it. That is what The Bluest Eye did to me. I can’t say that I liked the novel, because I didn’t. It left me with an empty, horrified feeling in the pit of my stomach; a realization of how harsh the world can be. I believe that this was Toni Morrison’s goal for this book. She didn’t want me to feel all warm and cozy when I finished. She didn’t want me to ‘like’ The Bluest Eye; she wanted me to learn from it. I learned about a child’s understanding, how people can react differently to a harsh environment, the importance of white symbols in a black girls life, and what could possess adults to do horrible things to helpless children. In short, I learned about the world.   Ã‚  Ã‚  Ã‚  Ã‚  Claudia narrated most of the book, though the story is mainly about Pecola. Claudia and her sister, Fridea, are, in all visible ways, exactly like Pecola. They are poor, black girls in a world where only white is beautiful and good. The difference is that Claudia and Fridea could ignore society and still love themselves, but Pecola felt that she was worthless because of her black features. The world around Claudia, Fridea, and Pecola is filled with symbols of whiteness. The first thing that is brought to our attention is the elementary school readers, where the main characters are Dick and Jane. Dick and Jane are perfect white children and they live in a perfect, white, cheery, loving, world. Morrison concentrates on this at the beginning of every chapter to bring focus on the life that Pecola wants to live. This establishes the theme of white domination over the culture. Pecola worshipped Shirley Temple. While she was at the Macteer’s she couldn’t get enough white milk, which she drank out of a Shirley Temple cup. She also loved Mary Jane candies because â€Å"Each pale yellow wrapper had a picture on it. A picture of little Mary Jane, for whom the candy is named. Smiling white face. Blond hair in gentle disarray, blue eyes looking at her out of a world of clean comfort. The eyes are petulant, mischievous. To Pecola they are simply pretty. She eats the candy, and its sweetness is good. To eat the candy is somehow to eat the eyes, eat Mary Jane.