Tuesday, December 31, 2019

How to Read George Saunders “Lincoln in the Bardo”

Lincoln in the Bardo, the novel by  George Saunders, has become one of those books everyone is talking about. It  spent two weeks on The New York Times bestseller list, and has been the subject of numerous hot takes, think pieces, and other literary essays. Not many debut novelists get this kind of adulation and attention. Not all debut novelists are George Saunders.  Saunders has already made his reputation as a modern master of the short story—which explains his low profile, even among avid readers. Short stories usually don’t get much attention unless your name is Hemingway or Stephen King—but the story has been having a bit of a Moment in recent years as Hollywood has discovered that you can base entire feature films on shorter works, as they did with the Oscar-nominated Arrival (based on the short story Story of Your Life by Ted Chiang). Saunders is a delightful writer who combines a sharp intelligence and wit with science fiction tropes and a keen understanding of how people live and think to produce unexpected, unusual, and often thrilling stories that go in directions no one can possibly claim to have predicted. Before you rush off to buy a copy of Lincoln in the Bardo, however, a word of warning: Saunders is deep stuff. You can’t—or at least you shouldn’t—just dive in. Saunders has created a novel that really is different from any other that has come before, and here are a few tips on how to read it. Read His Shorts This is a novel, it really is, but Saunders honed his craft in the field of short stories, and it shows. Saunders divides his story up in smaller stories—the basic plot is that Abraham Lincoln’s son, Willie, has just died of fever in 1862 (which really happened). Willie’s soul is now in the Bardo, a state of being in-between death and what comes later. Adults can remain in the Bardo indefinitely through sheer willpower, but if children don’t shuffle off quickly they start to suffer horribly. When the President visits his son and cradles his body, Willie decides not to move on—and the other ghosts in the graveyard decide they must convince him to go for his own good. Each ghost gets to tell stories, and Saunders further divides the book into other snippets. Essentially, reading the novel is like reading dozens of interconnected short stories—so bone up on Saunders’ short work. For starters, check out CivilWarLand in Bad Decline, which is not at all what you think it is. Two others you can’t miss would be 400 Pound CEO (in the same collection) and The Semplica Girl Diaries, in his collection Tenth of December. Don’t Panic Some folks might be tempted to assume this is too much for them—too much history, too much literary trickery, too many characters. Saunders doesn’t hold your hand, that’s true, and the opening of the book is deep, lush, and extremely detailed. But don’t panic—Saunders knows that what he’s done here might be overwhelming to some, and he’s structured the book with alternating waves of energy—highs and lows. Make it through the first few dozen pages and you’ll start to see how Saunders offers up a moment to catch your breath as he slides in and out of the main narrative. Watch for the Fake News When Saunders dives out of the narrative, he offers up the personal stories of the ghosts as well as glimpses of Lincoln’s life before and after his son died. While these scenes are offered up realistically, with the dry tone of historical fact, they’re not all true; Saunders mixes real events with imagined ones pretty freely, and without warning. So don’t assume that anything Saunders describes in the book as part of history really happened. Ignore the Citations Those historic snippets are often offered with citations, which serve to both burnish that sense of realism (even for the imagined moments) and root the story in the real 19th century. But a curious thing will happen if you simply ignore the credits—the veracity of the scenes ceases to matter, and the voice of history becomes just another ghost telling its tale, which is a little mind blowing if you allow yourself to sit with it a while. Skip the citations and the book will be even more entertaining, and a little easier to read. George Saunders is a genius, and Lincoln in the Bardo will no doubt remain one of those books that people want to talk about for years to come. The only question is, will Saunders come back with another long-form story, or will he go back to short stories?

Monday, December 23, 2019

Creativity and Adolescent Behavior - 2187 Words

Introduction Upon the preponderance of psychological literature on adolescent behavior, research indicates that children thrive in environments in which they are able to use their creativity. With the opportunity to individually express themselves, adolescence often improve their behavior, have an increased level of participation to given tasks, and have improved prosocial skills (Wright, John, Alaggia, and Sheel, 2006). The ingenuity of hands- on projects teaches adolescence to work toward goals in a variety ways (Larson and Angus, 2011). The present paper seeks to examine the effects of extracurricular project involvement, active creativity, and youth programs on the psychological development of adolescence. In addition, this current paper will provide pair information on The SEED School of Maryland and the special project conducted as part my required internship. Creativity and Adolescent Development Children respond in a variety of positive ways to extracurricular projects and projects that use creativity. Extracurricular projects are any projects done by the students that are outside the realm school curriculum. These projects serve the purpose of inspiring learning, growth, and knowledge to students. Projects that are organized outside of the school curriculum remove pressure from children to perform for a grade and ensure that they are working in their full realm of creativity. This is important because according to Luttrell Parker (2001) children value creativityShow MoreRelatedSports As A Tool For Development Of Social Character Development1309 Words   |  6 PagesOver seventy percent of adolescents play sports (Uzoma, 2015). Athletics can be used for the development of social character, values of teamwork, sacrifice, and obedience (Rudd Stoll, 2004). The sports world offers social opportunities for adolescents (Rutten, Schuengel, Dirks, Stams, Biesta, Hoeksma, 2011). Participating in sports as adolescents may help with learning how to respect the community, peers, family, and themselves (Berlin, Dworkin, Eames, Menconi, Perkins, 2007). Sports may affectRead MoreVideo Games Help Motor Development And Brain1501 Words   |  7 Pagesimprovement of the mental abilities of the child or adolescent. A growing number of university studies suggest that video games improve creativity, decision making and perception. How video games help motor development and brain. The positive aspects of video games should not be neglected, although in order to take advantage of them, it is necessary to closely monitor how much time and what kind of electronic entertainment our children and adolescents consume. According to the Illinois Institute forRead MoreMedia s Influence On Our Attitudes And Behavior Essay1313 Words   |  6 PagesIn our society, the mass media have enormous influence on our attitudes and behavior, and what we see shapes our views and our living. In the 21st century, children are digital consumers, who using TV, computers, gaming systems, as well as smartphones and tablets. Once the baby enters the world he or she is surrounded by media devices. The average American child, age 2-17, watches 25 hours of TV per week, plays 1 hr per day of video or computer games, and spends an additional 36 min per day on theRead MoreWhy Marijuana Is The Common Juvenile Crime Performed By The Youth1525 Words   |  7 Pagestoo much marijuana among teens would be lack of focus and the use of this kind of chemical can lead to emotional distress such as depression and anxiety. Based on the report of the American Academy of Child and Adolescent Psychiatry entitled Marijuana and Teens (2013), a lot of adolescents wants to explore about marijuana. Many factors were influencing children to use marijuana and this can be their friends, peer pressure, and media’s portrayal on marijuana. Parents has the greatest role on how theyRead MorePiaget Of The Child : Theories Of Development Essay960 Words   |  4 Pagesdescribes stages of cognitive development stages that occur in succession always in the same order from the reflexive movements of very youthful infants to the trial-and-error approach for adolescent children, to the thought-out reasoning of the early adolescent (Jean Piaget, 1896-1980). Erik Erikson believed behavior as more related to feelings than mind. He stated that â€Å"feelings are the major focus of people who follow the psychoanalytical theory of development(Erikson 1902-1994). Erik Erikson wasRead MoreEssay on Teenage Boot Camps - Not The Way To Achieve Discipline940 Words   |  4 PagesBoot camps for teenagers have become a popular disciplinary option for parents with adolescent children. Often recommended by counselors or by state justice systems as an alternative to juvenile detention centers, the boot camps are rigid military environments. Some are wilderness camps that teach young people survival skills in a military-like setting, while others are held closer to home. Many are state-run in conjunction with the justice system but many are also privately owned and operated. TheRead MoreThe Effects Of Social Media On Children And Adolescents962 Words   |  4 PagesThe Effect of Social Media on Children and Adolescents Life at home is normally peaceful until my mother shouts â€Å"Switch of that television and do something more constructive†orâ€Å"No phones at the table,†orâ€Å"switch off that laptop and get some good night sleep.† My little brother is always watching cartoons on television or playing video games while I spend most of my time on the laptop or on my phone twitter, Facebook, MySpace, Instagram or on blogs, or Youtube or any other social media website havingRead MoreJournal Article Critique Paper1099 Words   |  5 Pagesrecently. Children and adolescents become addicted to video games easily so it is important to monitor what they are playing and how it is affecting them and their character. A recent study on many boys and girls reported why they are entertained by these games and how it affects them as a whole. Many children and teens in today’s generation have a favorite pastime of playing video games. It is easy for any parent to not like these video games and to blame their child’s bad behavior on them playing theseRead MoreJournal Article Crititque1098 Words   |  5 Pagesrecently. Children and adolescents become addicted to video games easily so it is important to monitor what they are playing and how it is affecting them and their character. A recent study on many boys and girls reported why they are entertained by these games and how it affects them as a whole. Many children and teens in today’s generation have a favorite pastime of playing video games. It is easy for any parent to not like these video games and to blame their child’s bad behavior on them playing theseRead MoreCognitive Theory1395 Words   |  6 Pagesimpractical philosophies are precisely responsible for producing dysfunctional feelings and their subsequent behaviors, such as anxiety, despair, and social extractions; and humans can be purged of such feelings and their validities by demolishing the theories that give them life. The cognitive restructuring model is a proven model in addressing behavioral issues concerning stroke victims and adolescents. Team A’s focus will be addressing the perceptions into these interventions. Behavioral changes can

Sunday, December 15, 2019

Ddos Prevention Best Practices Free Essays

To begin with, system hardening should be implemented on all University workstations, and especially the Web servers. This means turning off any unused services, closing all ports except those that are specifically needed for the operating roles of the servers, and ensuring that an anta;plus solution Is in place and regularly updated. Additionally, a strong patch management policy and procedure should be used to keep University computing assets up to date. We will write a custom essay sample on Ddos Prevention Best Practices or any similar topic only for you Order Now This is to help prevent the exploitation of newly discovered vulnerabilities, and is part of the hardening process. All publicly available services, such as Web facing servers, DNS servers, and application servers, should be separated from private university resources. The separation should include enclosing the public servers in a DMZ. The DMZ should have firewalls in place on both sides of the network, to protect from external threats, and Internal ones. This separation also Isolates the servers from the rest of the network, in the event one of them is compromised. Furthermore, PLANS should be implemented to break up broadcast domains, and IP subletting used to control outwork traffic, further isolating the public systems from the internal network devices. Also, A split DNS scheme that consists of an external DNS server separate from an Internal DNS server can help limit the Impact of DNS Dos style attacks. Network Address Translation (NAT) should remain in place, as it also has the effect of hiding the internal network from the Internet. Moreover, the blocking of IGMP or ping attempts should be blocked, at least externally, so that attempts to Identify systems from the Internet are reduced. As part of capacity planning, consideration should be made to plan for excess. This should help to absorb any Dodos attacks by having plenty of resources to maintain network operations. This Includes having more than adequate switch and router bandwidth, CAP]. And frame/packet processing ablest. Additional consideration should be made to use different Internet Service Providers (ISP) for redundant connections. In the event of an attack, this has the benefit of having alternate paths to the Internet, providing redundancy and load sharing. When upgrading or replacing network equipment, anta-DoS capable devices should be carefully evaluated and selected. Intrusion Detection/Prevention Systems (DIPS) should be deployed, with the emphasis on prevention at the network perimeter. An inline device will be more effective placed behind the external facing firewall. The firewall is configured to allow only traffic that Is desired, blocking all other traffic, while the DIPS Is designed to block specific traffic and allow the rest. An DIPS device that uses both signature- 1 OFF positives, and therefore a better chance of detecting attacks. The DIPS device should be capable of sending alerts via email, SMS, and pager communication methods to Taft. The DIPS should also be configured to alter the firewall filtering rules on the fly, in the event an attack is occurring. A period of fine tuning is necessary to reduce false positives, and ensure information is not lost due to miscommunication. Ingress and egress filtering needs to be implemented. This involves configuring the firewalls to block unreliable IP addresses as specified in RFC 1918, using Access Control Lists (Calls). This will help prevent IP address spoofing, and computing assets from being used to attack other organizations outside the University IP address pace. Egress filtering should only allow IP addresses to leave the University that fall within the range of allocated addresses. Log monitoring and review of all network and server devices should be performed regularly. In addition, IT staff should be alerted when suspicious activity or events are detected. For instance, repeated failed attempts to access a network device might indicate a password hacking attack. Performance baselines of essential network and server equipment needs to be documented. This will provide a metric of network utilization under normal operating conditions. Excessive use of resources above equipment baselines might indicate a Dodos attack. Also, establishing a performance baseline will aid in capacity planning and provide data for scalability and growth planning. A honesty with relaxed security should be installed. Its purpose is to draw hackers away from actual University computing assets by providing an easier target. It needs to be completely isolated from all other critical assets. The honesty should also be monitored, as data obtained from attacks can be used to shore up the rest of the network. An Incident Response Plan (RIP) needs to be drafted and provided to all University administrative staff. Potential items in the plan should include Points of Contacts (POCK), and handling procedures if an attack is suspected. In conjunction with the RIP, an Emergency Response Team (RET) comprised of senior network and information security personnel, as well as members of the management team, should formalized. This team will be tasked with the responsibility as first responders to an attack. The RET should also have a Plan of Action (POP) more detailed than the RIP. Items in this Lana should include detailed network documentation, disaster recovery plans, any business continuity plans, ISP support numbers, etc. The combined effect of all of the measures previously described, will significantly lessen the impact of a Dodos attack. By no means is this document complete, and should be considered as a living document. As new threats emerge, additional or even different methods may be required to be put in place. Technology also improves over time, therefore a periodic review of the practices described should be conducted, and this document adjusted accordingly. How to cite Ddos Prevention Best Practices, Papers

Friday, December 6, 2019

Dissatisfaction and Complaining Behavior †Free Samples to Students

Question: Discuss about the Dissatisfaction and Complaining Behavior. Answer: Introduction Recently an electronic company has been receiving numerous customer complaints management which make sales and customer service representative (CSR) department sick of hearing angry customers voice. The marketing/sales manager requested for analysis of the customer complaints data to find out problems and come up with solutions. In this paper therefore we attempt to discuss customer complaints, product family, and types of customers. In business arena, customers are regarded as the Kings and Queens who deserve to be listened to. The handling of customer complaints is therefore a critical component aimed at providing superior customer performance. According to Albrecht (1995), there are three key aspects of handling customer complaints. The aspects are; acknowledging customer complaints, identifying customer complaints, and handling customer complaints. Data analysis The data in the spreadsheet is pulled out from Enterprise Resource Planning (ERP) system of the company which is active in the electronic industry. The ERP systems takes note of the date when the complaint was initiated, date when the response was received, name of the customer, type of the complaint, family in which the product under complaint belongs to among other variables. A total of 719 complaints were received and this makes the basis of the analysis for this report. For efficient analysis and internalization, the data is broken down into various variable-specifics as below: Complaint types Table 1 below gives the total complaint types. As can be seen, majority of complaints management (n = 233, 32.4%) reported by customers was related to delivery followed by wrong quantity (n = 136, 18.9%). The least type of complaints recorded was other (unspecified) type of complaints (n =3, 0.4%) Table 1: Total complaint types Row Labels Count of Complaint Type Delivery 233 Wrong Quantity 136 Lost In Transit 127 Wrong Product 118 Packaging 36 Poor Response 33 Damaged 18 Quality of workmanship 8 Invoice Error 7 Other 3 (blank) Grand Total 719 The chart below illustrates the above information. Product family Next, we looked at the frequency distribution of the various product families. The complaints received were found to come from 15 different product families. Majority of the complaints (n = 60, 8.34%) belonged to the product family PF12. The product family PF6 had the lowest number of complaints recorded (n = 41, 5.70%). Row Labels Count of Product Family Percent PF12 60 8.34% PF10 55 7.65% PF2 54 7.51% PF8 49 6.82% PF14 48 6.68% PF3 48 6.68% PF7 48 6.68% PF1 47 6.54% PF15 47 6.54% PF4 47 6.54% PF11 46 6.40% PF5 44 6.12% PF9 43 5.98% PF13 42 5.84% PF6 41 5.70% Grand Total 719 100.00% The chart below illustrates the above information. Association between complaint type and product family We also conducted an association test to verify whether there is significant association between type of complaint and product family. The following hypothesis was tested; H0: There is no significant association between type of complaint and product family H1: There is significant association between type of complaint and product family Tested at 5% level of significance Chi-Square Tests Value df Asymp. Sig. (2-sided) Pearson Chi-Square 142.012a 126 .156 Likelihood Ratio 144.794 126 .121 N of Valid Cases 719 a. 90 cells (60.0%) have expected count less than 5. The minimum expected count is .17. A chi-square test of independence was performed to examine the relation between type of complaint and product family. The relation between these variables was insignificant, Problem definition The major problem as can be seen is the process of packaging till the products gets to the product management. This was established to be the major root cause of the various issues experienced by the customers. The companys organizations structure could also possibly affect the customer satisfaction levels. It seems there are few employees who have a lot of tasks put on them to accomplish. This affects the workmanship thereby resulting to some of the issues experienced-the few workers available are highly overworked to the extent that they get confused. In terms of the warehouse supervision, there are only two supervisors manning the warehouse and they are both in charge of the inbound and outbound supervisory work going on. The equipment and machinery used in the warehouse seems to be faulty thus brining issues such as wrong quantity packed as well as wrong product (Radovilsky Hegde, 2011). Response received also contributed as being one of the major complaints raised. This shows either the staff deliberately fail to acknowledge the customer complaint or they dont give a clear direction on how to handle the customers issue. Solutions and suggestions Most of the complaints raised by the customers are to do with human aspect (human errors). It is therefore imperative that all the staff in the warehouse to undergo serious training so that the can fully understand their roles and how to go about their duties in a more effective and efficient way. All customer service personnel should also be trained on how to handle various customer complaints effectively and being empowered to respond in a positive manner. The company should also ensure that the machines and equipment in the warehouse are up-to-date and in condition. One problem noted was failure by machines to package right quantities, this can be minimized by doing away any faulty machine at the warehouse(Yilmaz, et al., 2015). References Albrecht, K., 1995. At Americas Service: How Your Company Can Join the Customer Service Revolution. Davidow, M., 2014. The a-craft model of organizational responses to customer complaints and their impact on post-complaint customer behavior. , Dissatisfaction and Complaining Behavior. Journal of Consumer Satisfaction, Volume 27, p. 70. Radovilsky, Z. Hegde, V., 2011. Identifying and Analyzing Quality in Supply Chain. California Journal of Operations Management. 9(1), p. 5870. Yilmaz, C., Varnali, K. Kasnakoglu, B. T., 2015. How do firms benefit from customer complaints?. Journal of Business Research, 69(2), pp. 944-955.