Monday, September 30, 2019
Letter from hospital
I thought I should write to let you know IM safe and IM recovering. I miss you and the rest give everyone a hug from me and tell Rosier I hope she's being good. The hospital Is constantly got new soldiers coming In suffering from nervous exhaustion and shell shock too so IM not the only one, the doctor said It Is an Injury to the nerves and told me to rest and they are putting In place electric shock treatment.All the nurses are very sympathetic but sometimes when they think we can't hear them they call us all weak and say we are cowards. Im not suffering as much as most, a young gentleman has been learning to walk again yet he still wants to get back to the frontline. Yes, am returning to the frontline soon so that's why I took this opportunity to write. We had strict orders not to take prisoners, no matter if wounded my first Job was when I had finished cutting some of their wire away, to empty my magazine on 3 errands that came out of one of their deep dugouts they was bleeding ba dly begging for them to be put out of their misery.They cried for mercy, but I had my orders, they had no feeling what so ever for usâ⬠¦ It makes my head Jump to think about It. One time I was In serious danger I was almost completely paralyses with fear. I was slating with Taylor (a fellow soldier) on the fire-step of a trench during an intense bombardment,when it seemed certain that we must be killed at any moment. Shots fired around us; each moment threatened to be the last. I was conscious of biting the fabric on my top to prevent my teeth from chattering.If I had been alone on that occasion I believe that I would be dead now; it was the presence of others that saved me. It's not all been like that, one evening me and Owen was in the barracks and I received a letter from you for my birthday and it kept me going for so long, but everyone has a breaking point: weak or strong, courageous or cowardly- war frightens everyone my breaking point has now unfortunately came. Give my l ove to everyone, Yours sincerely
Sunday, September 29, 2019
Research Paper on Abortion
The ethics of abortion is one of the most controversial topic that has been continually argued over years and probably many years to come. The main controversy is the question of legalization of abortion, which ties into ethical issues, emotions, and political issues or laws. Before I discuss the many sides to abortion, it is critical to define the term. The Websterââ¬â¢s Dictionary defines abortion as the termination of a pregnancy after, accompanied by, resulting in, or closely followed by the death of the fetus. Despite the liberal attitudes toward abortion, it still remains an important political issue. Even in societies where abortion has been legalized, many actions are being raised by the anti-abortionists. These anti-abortionists believe in ââ¬Å"pro-lifeâ⬠and their religious perspectives are responsible in their arguments against abortion. They believe that ââ¬Å"it is equally as heinous intentionally to kill a human being in existence at fertilization, as to kill a larger pre-born child. â⬠On the other hand, there are reasons for legalization of abortion. Most people agree with the concept of reproductive freedomââ¬âthe fundamental right of every individual to decide freely and responsibly when and whether to have a child. Human life is defined as ââ¬Å"any living entity that has DNA from the species homo sapiens. This includes an ovum, spermatozoon, zygote, embryo, fetus, newborn. It also includes an infant, child, adult, elder. It also includes a breast cancer cell and a hair follicle and a skin scraping. Some forms of human life have little or no value; others are the most valuable and precious form of life in the known universeâ⬠. Because an unborn fetus is considered to have a human life, abortion should not be legalized. It is a definitely a crime to kill a living and breathing fetus even though the embryo may not take the form of a human structure. If abortion is permitted, the dignity of human will be destroyed. In the medical field, the doctors prescribe the baby before 15 days after conception as dividing cells. But after this short period, abortion is prohibited from the principal of identifying. This is because the fertilization process contains many cell divisions by zygote progressing into a human being. Many people assert the right that women do not have a baby because they have the right to choose. But it is neglecting the right of the baby who has his or her own life. Just because an unborn fetus is not capable to express his or her feelings, is it morally right to end its life? Considering moral issues, abortion is definitely equally termed a murder. However, I do understand the other point of view for legalizing abortion. The exception to abortion is considered when the mother bearing the child has illnesses or diseases that can be transmitted to the baby genetically. Also, financial issues are often being raised by the parents whom are not able to support another family in the house. In this case, abortion may be permitted because it is rather better to not be alive than be living under such poor conditions. Furthermore, abortion is considered as a rightful act when the women get pregnant from rape. Some people may generally think that a crippled person is pessimistic about the world. But in fact, they thank their parents who gave life to them. The life as a handicapped person could be better than not experiencing life at all. If itââ¬â¢s not by the force of other one, people must take the responsibility for their behavior. Every action you make comes in consequences and therefore, it is important to choose birth controls if pregnancy is not wanted. If the reason that causing abortion is merely a problem of foster, it is never permitted. We must keep in mind that life is most precious thing in the world. It is estimated that the number of aborted babies is almost 4000 in a month. Vast majority of abortions are done for convenience, by women who simply want to terminate an unwanted pregnancy. But abortion is a murder. So, now is the time for us to think about the abortion again and to search for the best solution. In any circumstances, the life must be admired. Work Cited http://www.religioustolerance.org/abortion.htm http://abortion-alternatives.adoption.com/ http://www.friesian.com/abortion.htm
Friday, September 27, 2019
James C. Curtis, Andrew Jackson and the Search for Vindication Essay
James C. Curtis, Andrew Jackson and the Search for Vindication - Essay Example Throughout the start of the book, Curtis widely relates Andrewââ¬â¢s early encounters with his prospective motivations both in political and personal thoughts. Andrew Jackson personally participated in important national and international events within the period between, 1767 and 1845. For one, it is within this period that Andrew Jackson was the seventh president of the U.S. serving between 1829 and 1837. During this period, he remained a polarizing figure and controlled the Second Party System. As a president, he demolished the national bank and repositioned most Indian tribes to the west of river Mississippi. Before this, Jackson had served as a politician and an army general who was able to defeat the Indians during the 1814 battle of Horseshoe Bend. Similarly, Andrew defeated the British forces during the 1815 battle of New Orleans. It is during this period that Jackson became a rich slaveholder and appealed to the United Statesââ¬â¢ common people. He is also known for po litically fighting against what he referred to as closed and undemocratic aristocracy, hence, the era of Jacksonian democracy. Another event that marks this period in Jacksonââ¬â¢s life is the Nullification crisis. This crisis was characterized by the tariff issue that evidently established one of the most important elements of Jacksonââ¬â¢s term as a president. ... Andrew Jackson was extraordinarily successful in national politics as he played a major role in it. For instance, the Americans viewed Jackson as the embodiment of success as he was a man who could overcome inseparable opposition through determination. Hence, he was referred to as the Man of Iron Will .One of his remarkable characteristics as president was his well-known inflexibility of purpose. Andrew Jackson has remained extraordinary, as he was able to close the second Bank of the United States. He did this in order to avoid the destruction that would befall the bank due to corruption. Another noticeable success of Jackson was his famous duel with Charles Dickson, as suggested by O'Brien (89). In the duel, he was able to use his wisdom and ended the life of Dickson. Hence, his behavior in the duel gave an example of animal courage and demonstrated his ability to conquer battles. Jackson also alleged in rights of the states. He asserted that there were firm limits in the constitut ion in as far as federal government authority was concerned. As a result, he supported the state of Georgia in its jurisdictional disagreement with the federal government concerning the Cherokees. Moreover, Jackson strived to advance the common person interest against his almost equally corrupt opponents. Andrew Jackson also had outspoken commitment to particular principles that led him to shaping his party. He was also consciously and honestly dedicated to working people whether in agriculture or industry and to the Americaââ¬â¢s democratization. As a result, he insisted to limited public economy and government apart from where the Presidentââ¬â¢s power was required to defend the interest of the
Law Essay Example | Topics and Well Written Essays - 750 words
Law - Essay Example The understanding of Common Law is important because it forms the basis for understanding of the important provisions of other laws. Certain laws in the UK, like Law of Torts, Contract Law and Property Laws exist only in Common Law and, therefore, it assumes greater importance. Even in Australia, the Common Law practiced is derived from the UK Common Laws. There is a single Common Law prevalent in Austrialia and there is a common bond between the Common Law practiced in Australia and that found in the UK. The decisions of the House of Lords in England also forms the basis for judgment in many decided cases in Australia , and even today, the previous decided cases in the House of Lords forms the basis for judgment passed regarding Common Laws practiced in Australia. STEP 2: The tort of negligence includes the following aspects of the law such as the duty of care to be shown, breach of duty on the part of the defendant, factual causation, legal causation or remoteness and damage. The Australian Common Law says that the defendant must have a duty of care towards the claimant. The claimant must prove that the defendant has breached his duty by not exercising reasonable care. The first aspect is whether the defendant owed a duty towards the claimant. The second aspect relates to whether the duty has been breached. Again for the case to hold good, it is also necessary that the particular act were the cause of the loss or damages suffered. Again the aspect of how remote or close the action of the person caused harm to the claimant should also be assessed. Finally even though the breach of duty of the defendant has been proved, the negligence should have caused injury to the claimant, as a direct result of breach of care on the part of the defendant. (a) The case mentioned is regarding unintentional trespass on the part of Mary Jane, and as
Thursday, September 26, 2019
Risk Factors of Culture Research Paper Example | Topics and Well Written Essays - 2000 words
Risk Factors of Culture - Research Paper Example ââ¬Å"Business hasâ⬠, Ball & Wendell submit, ââ¬Å"entered the era of the one-world market. Increasingly, companies are going overseas to attain sales and profits unavailable to them in their home markets.â⬠(1993:6) In addition, since technological revolution has made communication and traveling very fast and speedy, it has also become very convenient for the individuals to travel to even the remotest corners of the globe for business, education and employment purposes. Consequently, the fast means of traveling have brought the nations closer to each other and have paved the way towards the formation of diversified corporate culture particularly in the USA, China and the Western World. As a result, the individuals having different cultural backgrounds are now working shoulder to shoulder with one another under one roof in various corporate firms as workers and employees, which has given birth to the idea of cultural amalgamation and outsourcing. Thus, cultural amalgamati on has altered the entire corporate atmosphere from top to bottom, where the professionals belonging to different racial, ethnic and religious groups have to work as colleagues, bosses and sub-ordinates under one and the same environment. Not only this that the businesses have witnessed imperative boom and escalation in the aftermath of cultural diversification, and has proved extremely profitable for the companies, but also such a profound development has turned out to be beneficial for the consumers and end-users, because the incurring of the global talent has given a go to the manufacturing of innovative products and wide range of choice available for the consumers in the market. Consequently, the concept of universal co-existence has helped out in respect of mitigating the prejudices like nationalism and regionalism, and businesses observe unabated flourishing at global level. In the same way, there have appeared inevitable risks of some negative impacts too
Wednesday, September 25, 2019
Composing a Philosophy of Eating Essay Example | Topics and Well Written Essays - 1500 words
Composing a Philosophy of Eating - Essay Example I have few friends in my school who are suffering from obesity related health problems. These friends do not have the ability to play with us because of their overweight. Because of the severe harassments facing from their friends, they like to spend their leisure time either in the library or in front of the computers. Replying to one of my question, one of these obese friends told me that it is difficult for him to take less food even though he likes to reduce his weight. In other words, it is better to take preventive measures before obesity actually strikes a person. The above fact taught me a lesson and I decided to control my eating habits in order to escape from the threat of obesity related problems. This paper describes my philosophy of eating, formulated based on the data collected from my surroundings. My current philosophy of eating can be described in few words; eat nothing unless itââ¬â¢s worth eating. In other words, it is better to eat something only at times when we experience hunger. There are many people who eat something even if they donââ¬â¢t feel hunger, in order to give company to others. I also had such habits. Foods should be consumed only at times when a person feels hungry. Our body has the ability to remind us the necessity of energy in the form of hunger. The energy or calorie received from foods taken at the time when a person feels hungry, will be utilized for some bodily functions. Therefore extra energy or calorie will never be accumulated in our body if we take normal food at the time of hunger. On the other hand when we take food during unwanted times, the body forced to store the extra calorie in the form of fats which will make the person obese. Another major point in my current eating philosophy is the avoidance of fast foods as much as possible. Fast foods are tastier than other foods and people who take fast food may consume more than what is required for the body because if this extra taste. Most of the fast foods are enriched with fat contents. Moreover fast foods are comparatively cheaper and easy to cook. And therefore people make use of it more frequently. Half boiled or half cooked foods are popular in all over the world at present. Nobody wants to spend too much time in kitchen after a busy day schedule. So, people will purchase half boiled foods from groceries or supermarkets and prepare it quickly using a microwave oven or some other cooking equipment. Frequent use of foods cooked using microwave oven could raise radiation related health problems. In short, fast foods, half boiled or half cooked foods can create lot of health problems and it is better to avoid it as much as possible. It is better to eat slowly rather than attacking the dishes in a hurry. Slow eating will help us to eat only the required amount of food, Moreover, such habits will help the digestion process. I have a friend who does have the habit of taking foods in a hurry, irrespective of whether the food is tastier o r not. His philosophy of eating is take food as quickly as possible. He faced lot of problems in the past because of this peculiar eating style. Many times, the bones of fried chicken and fishes get jammed in his throat because of his speedy eating style. Since he is taking food in a hurry, he doesnââ¬â¢t have any idea about the volume of food he has taken. For him taking food three or four times in a day is a routine job and he
Tuesday, September 24, 2019
Multicultural Management Essay Example | Topics and Well Written Essays - 3500 words - 1
Multicultural Management - Essay Example artment in many areas has become accustomed to the challenges that are being posed by the diversity in the work place and as such there have been efforts to come up with ways of managing this diversity. The combination of work force demographics in the work place has been as result of increased globalization in business which has placed the management of cultural and background differences one of the leading agenda in modern times in many corporate organization. This has been due to increased heterogeneity in gender, race, ethnicity, and nationality due to mix up of people. (Vonslid, 2006) To the organization, this has an advantage of better and quicker decision making, higher creativity and innovation in the work, remarkable success in marketing in foreign communities and countries and also equal distribution of economic opportunities. However, if not well handled, it can lead to increased cost due to high turnover rates, conflicts due to interpersonal differences, and breakdown in communications. The hospitality industry is one of the industries that have a high mixture of people both in customers and in the work force. The diversity in the hospitality industry has been one of the challenges facing many firms in the industry since their survival is based on the quality of services that is offered to the customers. Diversity in the industry is also important due to the diverse customers that it serves. Hence a diverse workforce in the industry will help to serve diverse customers who are served in the industry. Managing this diverse workforce in the industry is poses a challenge in the industryââ¬â¢s human resource department. This paper will explore the strategies that can be used by the human resource department in the industry to successfully handle the diverse work force. The hospitality industry is one of the growing industry industries in the world. Increased globalization and increased outsourcing of businesses has been one of the driving forces in
Monday, September 23, 2019
HIV and HBV Essay Example | Topics and Well Written Essays - 500 words
HIV and HBV - Essay Example This in vitro study is called transient transfection cell culture systems and has been used to establish sensitivity or cross resistance to analogues. Imperative in this activity is the acquisition of quantitative real time data and previous knowledge on the replication and pathogenesis of HIV or HBV. Any difference in expression of the transfected cell is identified and analyzed. Another approach is to introduce derivatives from certain sources that can serve as potent inhibitor of in vitro HIV or HBV replication. For example, synthetic DNA molecules called antisense oligodeoxynucleotides (ODN) were administered to cells transiently and stably transfected with HBV protein encoding plasmids. The cells were observed for any HBV replication and pathogenesis for 48 hours. It was found that there ODN effectively inhibited viral protein expression and replication. ( Karayiannis, 2003) Animal models have also been very useful in understanding the replication and pathogenesis of the virus mentioned. Many of the models are na've primates such as chimpanzees, rhesus macaques and Aotus monkeys. HBV or HIV carrier animals are administered with potential cures.
Sunday, September 22, 2019
Should Wealthy Nations Be Required to Share Their Wealth with Poorer Nations by Providing Essay Example for Free
Should Wealthy Nations Be Required to Share Their Wealth with Poorer Nations by Providing Essay In recent years, there is a controversial issue is that the rich countries should share their assets among the poorer countries or not. Most of the public agreed that it is a necessary activity to help the poor improve their lives. On the other hand, some tax payers resolutely keep their opinions when they supposed that the governments of poorer nations are liability to take care of their inhabitants by themselves. As a supporter of sharing with the poor, I think that we have many reasons to establish philanthropic organizations to support the wretch in other countries and territories. Several main reasons will be analyzed in this essay. Beginning with lack of natural resources, poor nations cannot take advantages of fertile soil to cultivate or minerals to exploit. Moreover, weak education causes many consequences, one of them is a large number of residents are illiterate so they cannot approach modern life by knowledge. Because of that, they always live with the shortage of food, clothes and other articles of daily necessities. They do not have enough money and technology to improve the environment so it brings them to need the help of other countries for surviving. Besides, economic crises occur after several years, as a stage of the economic cycle. Given their capabilities and power, rich nations often recover more quickly than their poor counterparts. This means that the poor is not only more prone to negative impacts of economic crises but also in more difficult circumstances. In these cases, if we do not join our hands to offer them financial assistance, then the gap between the rich and the poor is become wider, lead to the loss of economic balance. When the living standard has been improved, they can afford to quality good and the trade all over the world will be more prosperous. Last but not least, sharing wealth with the poor is a humanitarian activity, and anyone can do it. This is the best lesson for children about the important of sharing in hard times. From that, the love of human races will be larger. However, the government of poorer countries should not only rely on others. They also have to improve their own situation by carrying out the reform in education, changing some unsound customs and opening to obtain the knowledge of the world. In conclusion, if the richer can give their wealth and the poorer can improve by themselves, we will soon have a thriving future.
Saturday, September 21, 2019
Cybercrime in Indonesia Essay Example for Free
Cybercrime in Indonesia Essay Even if Indonesia has not ratified or signed the Convention on Cybercrime yet, officially Indonesia has implemented almost all cyber crime provisions set forth in the Convention. These provisions are set out in several articles in Law No. 11 Year 2008 on Information and Electronic Transaction. The seven provisions, among others; offense related to child pornography, illegal access, illegal interception, data interference, system interference, misuse of devices, and computer related forgery. The provisions of computer-related fraud and attempt and aiding or abetting are no longer regulated under this Act due consideration has been accommodated by the existing provisions in the Penal Code. Likewise, some offenses related to infringements of copyright and related rights are deemed to have been sufficiently set forth in the Law on Intellectual Property Rights. In addition to the above provisions, the Law No.11/2008 is the merely cybercrime statute in Indonesia, which also includes provisions on e-commerce and e-signature referring to the UNCITRAL Model Law and the EU Directives on such subjects. This is by virtue of the awareness of regulator about inevitable legal convergence of telecommunications, media, and informatics. By means of the principle of neutrality and efficiency, this product of law will be able to encompass the three specialties. Moreover, hacking, according to BATAN is defined as ââ¬Ëinfiltrating or breaching activities into an electronic system without rights, which usually aim to misuse or damage the system.ââ¬â¢ Identical definition of hacking is also proposed by David S. Wall which is ââ¬Ëdeliberate unauthorized access to spaces over which rights of ownership or access have already been established.ââ¬â¢ Therefore, hacking can be incorporated into illegal access provisions. In the Article 30, there are three paragraphs that organize illegal access, inter alia; 1. ââ¬ËSetiap Orang dengan sengaja dan tanpa hak atau melawan hukum mengakses Komputer dan/atau Sistem Elektronik milik Orang lain dengan cara apa pun.ââ¬â¢ It means ââ¬Ëany person intentionally and without right or unlawful access to computers and/or electronic system belongs to any other person in any way.ââ¬â¢ 2. Setiap Orang dengan sengaja dan tanpa hak atau melawan hukum mengakses Komputer dan/atau Sistem Elektronik dengan cara apa pun dengan tujuan untuk memperoleh Informasi Elektronik dan/atau Dokumen Elektronik. It means ââ¬Ëany person intentionally and without right or unlawful access to computers and/or electronic system in any way aim at obtaining electronic information and/or document.ââ¬â¢ 3. Setiap Orang dengan sengaja dan tanpa hak atau melawan hukum mengakses Komputer dan/atau Sistem Elektronik dengan cara apa pun dengan melanggar, menerobos, melampaui, atau menjebol sistem pengamanan.ââ¬â¢ It means ââ¬Ëany person intentionally and without right or unlawful access to computers and/or electronic system in any way by infiltrating, trespassing, surpassing, and breaking through a security system.ââ¬â¢ The first offenses are to be punished with imprisonment up to 6 years either with or without an administrative fine of up to IDR 600 million. Meanwhile the second offenses are to be sentenced by imprisonment up to 7 years either with or without an administrative fine of utmost IDR 700 million. The latter is to be sanctioned by imprisonment up to 8 years either with or without an administrative fine of up to IDR 800 million. During the past four years since enactment, a myriad of hacking incidents have taken place in Indonesia . However, only two cases were successfully expressed and processed in court. The first case is a case of hacking (defacing) the Election Committee website in 2004 by Dani Firman. While the second case is a similar case against the website of one Indonesias largest party, Golkar, by Iqra Syafaat. In fact, according to data from the Association of Indonesian Internet Service Provider (APJII), in 2003, it has recorded 2267 cases of network incidents and in 2004 there were 1103 such cases. It can be concluded that the cases which fails to trial far less. Furthermore, another concern is phishing, defined as ââ¬Ëthe pursuit of personal financial information that is subsequently used to defraud the victim and relies upon the recipientââ¬â¢s inability to distinguish a bogus email from a real one.ââ¬â¢ Hence, it should be categorized into ââ¬Ëcomputer related forgeryââ¬â¢ provision. Article 35 states ââ¬ËSetiap Orang dengan sengaja dan tanpa hak atau melawan hukum melakukan manipulasi, penciptaan, perubahan, penghilangan, pengrusakan Informasi Elektronik dan/atau Dokumen Elektronik dengan tujuan agar Informasi Elektronik dan/atau Dokumen Elektronik tersebut dianggap seolah-olah data yang otentik.ââ¬â¢ It implies ââ¬Ëany person intentionally and without right or unlawful manipulate, create, delete, alter, or suppress any electronic document and/or information with the intent that it be considered as if it were authentic.ââ¬â¢ Accordingly, this breach is to be sentenced up to 12 years in prison and a maximum fine of IDR twelve million. Unfortunately, there is no case hitherto which is brought to court proceeding. Finally, rare incidents of cybercrime exposed and processed in court trial as the aforementioned are caused by several factors, inter-alia; the lack of awareness among users, the absence of single identity number, the reluctance of victims to report, the limitedness of infrastructure or equipment and devices in the field of IT, and also the lack of law enforcement officers who have expertise in the field of IT. [ 1 ]. Indonesia Law Number 11/2008 about Information and Electronic Transaction, entry into force on April 21,2008 [ 2 ]. See (n 1) art 27 and art 9 in Convention on Cybercrime, Council of Europe, entry into force on July 1, 2004 [ 3 ]. See (n 1) art 30 and art 2 in Convention on Cybercrime, Council of Europe, entry into force on July 1, 2004 [ 4 ]. See (n 1) art 31 and art 3 in Convention on Cybercrime, Council of Europe, entry into force on July 1, 2004 [ 5 ]. See (n 1) art 32 and art 4 in Convention on Cybercrime, Council of Europe, entry into force on July 1, 2004 [ 6 ]. See (n 1) art 33 and art 5 in Convention on Cybercrime, Council of Europe, entry into force on July 1, 2004 [ 7 ]. See (n 1) art 34 and art 6 in Convention on Cybercrime, Council of Europe, entry into force on July 1, 2004 [ 8 ]. See (n 1) art 35 and art 7 in Convention on Cybercrime, Council of Europe, entry into force on July 1, 2004 [ 9 ]. art 8 in Convention on Cybercrime, Council of Europe, entry into force on July 1, 2004 [ 10 ]. (n 9) art 11 [ 11 ]. (n 9) art 10 [ 12 ]. Indonesia has several Laws on IPR such as Law No.12/1997 about Copyright, Law No.29/2000 about Vegetal Variety Protection, Law No.30/2000 about Trade Secrecy, Law No.31/2000 about Industrial Design, Law No.32/2000 about Layout Designs of Integrated Circuits, Law No.14/2001 about Patent, and Law No.15/2001 about Trademark [ 13 ]. See UNCITRAL Mode Law on E-commerce on http://www.uncitral.org/pdf/english/texts/electcom/05-89450_Ebook.pdf and UNCITRAL Mode Law on E-signature http://www.uncitral.org/uncitral/uncitral_texts/electronic_commerce/2001Model_signatures.html accessed September 28, 2012 [ 14 ]. (n 1) Explanation [ 15 ]. BATAN is an Indonesian government institution which constitutes one of consulting agents of ICT, http://www.batan.go.id/sjk/uuite.html accessed September 29, 2012 [ 16 ]. Wall, David S, ââ¬ËCybercrime: The Transformation of Crime in the Information Ageââ¬â¢, (Polity Press 2008) 53 [ 17 ]. (n 1)
Friday, September 20, 2019
Requirements Engineering and the Agile Approach
Requirements Engineering and the Agile Approach Yangqing Lu à à With the evolution of Project Management (PM) methodology, Requirements Engineering (PE) has experienced huge change, especially when Agile is adopted by projects increasingly. However, no matter how the PM approach develops, the importance of PE is unshakable. Based on the Qualitative Research Approach, three articles has been viewed to introduce requirements issues regarding requirement elicitation,Ãâà consensus, prioritization, user story. In the first article, the author introduced concepts of traditional RE and some changes in Agile approach.Ãâà The second article demonstrates criteria of how to build qualified user stories. Ten requirement prioritization methods are compared in the third paper. These three articles are sound fundamentals for readers to gain basic skill for requirement management. Requirements Engineering and Agile Software Development This article discusses the difference and similarities between traditional Requirements Engineering (RE) and agile approaches. RE is a process comprising Requirements Elicitation, Requirements Analysis, Requirements Documentation, Requirements Validation, and Requirements Management. RE have a high dependency on documents for communications and the manner of prediction of future needs often leads to over documentation. (Paetsch F., Eberlein A., Maurer F., 2003) During Requirements Elicitation, approaches concerning the closed or open interviews of stakeholders, use cases and scenarios, observation and social analysis, focus group, brainstorming, and prototyping are often conducted during the period of the Requirement Elicitations. Based on this phase, in phase Requirements Analysis, information gathered is checked prioritized regarding necessity, consensus, completeness, consistency, and feasibility. Requirements are discussed by stakeholders and developers before write them down in requirement documents which are verified to be acceptable to organizational standards and organizational knowledge. (Paetsch F., Eberlein A., Maurer F., 2003) By contrast, the Agile approach is preparing to cater to continuous requirement changing and close collaboration so much that it has been adjusted to deliver upgraded products frequently. The mission of Agile determines that it cannot precisely follow the standards of RE. In fact, Agile never prepare to include a formal RE process: people cannot clearly separate a phase regarding Requirements Elicitation or Requirements Analysis from Agile process. Whereas, most RM methodologies are embedded into the Agile process: such as elicitation methods concerning interviews, brainstorming, and prioritization are also adopted in Planning Game a phase designed in Extreme Programming(XP). (Paetsch F., Eberlein A., Maurer F., 2003) It is highlighted that requirement document is both essential for RE and Agile. However, Agile, as the lazy approach, do only the right thing by eliciting, analyzing, validating, and documenting only when needed (Paetsch F., Eberlein A., Maurer F., 2003). Improving Agile requirements: the Quality User Story framework and tool This article introduces the concept of User Story and thirteen items of criteria towards creating Quality User Stories (QUS). Basing on the introduction, a software tool called Automatic Quality User Story Artisan (AQUSA) is introduced and its function has been assessed too. According to (Lucassen, G., Dalpiaz, F., van der Werf, Jan Martijn, E. M., Brinkkemper, S., 2016), User stories are a concise notation for expressing requirements that are increasingly employed n agile requirements engineering and in agile development. As explanations of requirements, user stories are used to discuss ideas with stakeholders and also act as criteria for acceptance. A user story should be able to state who it is for, what it does, and optionally why does that. Thus, an accepted user story format is As a, , I want , [so that, some reason/end]. Whereas in Scrum a specific Agile pattern, Epic and Themes also involved into user story design with the former one identifies a list of smaller, implementable user stories and the later one defines a set of user stories who are in the same criterion such as authorization. To qualify a user story, thirteen criteria are separated into three categories regarding Syntactic, Semantic, and Pragmatic. Those standards are used to guideline the creation of user stories and aim to make user stories clearly defined, focus on a single feature, able to be estimated, etc. The article also gives out a table of ill-defined user stories to explain what regulation is broken. Such as I want to see an error when I cannot see recommendations after I upload an article, this user story breaks the law of well-formed since the role is missing in the story. (Lucassen, G., Dalpiaz, F., van der Werf, Jan Martijn, E. M., Brinkkemper, S., 2016) User stories inside a specific user story set must be unique without confliction (no similar stories can exist in one set, the scope of work items must be consistent), uniform (most stories in the set use same format), independent (stories must not rely on the implementation of another case), and complete (a story cannot use an undefined term without reference. the undefined term or dependency should be stated in terms of relationship). (Lucassen, G., Dalpiaz, F., van der Werf, Jan Martijn, E. M., Brinkkemper, S., 2016) Both those 13 single-user-story criteria and four user-story-set criteria are guideline for agile project engineer to follow when they want to create agile requirements in high quality. Comparison of Requirement Prioritization Techniques to Find Best Prioritization Technique This article introduces ten techniques for requirement prioritization and compares them to find the best method. Some methods are using grouping approach by assign requirements with different group level then those requirements in the same group will be in the same priority. One of the famous grouping methodologies is Museum of Soviet Calculators on the Web (MoScoW) who provides four prioritization groups concerning MUST have, SHOULD have, COULD have, and WONT have. Based on the research result demonstrated in this article, grouping approaches feature low effort, low difficulty, consistent, and high confidence from the users. Especially, MoScoW can help to handle a large number of changes. (Javed, A. K., Rehman, I. U., Yawar, H. K., Iftikhar, J. K., Rashid, S., 2015) Bubble Sort, Minimal Spanning Tree, and Binary Search Tree provide methods for sorting requirements into a requirements list from the most important requirement down to the least important one. When these approaches are adopted, stakeholders and software engineers should be able to compare requirements pair by pair then adjust the location of their importance one by one until all requirement have been put into the correct position. The sorting approach needs the most number of decisions although this method is easy to use. (Javed, A. K., Rehman, I. U., Yawar, H. K., Iftikhar, J. K., Rashid, S., 2015) Hundred Dollar Method and Analytic Hierarchy Process (AHP) are typical methods using ratio to identify priorities of requirements. During these processes, stakeholders should either balance importance among several requirements or mark out between requirements to what extent one is important than the other. AHP is considered to be the most reliable approach for its fault tolerance, consistency, ratio feature. However, to get the final results, AHP needs the most effort regarding decision making and time-consuming. (Javed, A. K., Rehman, I. U., Yawar, H. K., Iftikhar, J. K., Rashid, S., 2015) Requirements are the baseline for specific IT product or service since they define what the product/service is, regulate development scope, provide background for discussion and negotiation between stakeholders and project engineers, and most importantly, act as a guideline for newly hired engineers to understand the product/service. Thus, requirements management are essential for all kind of IT project. To elicit requirements, interview, brainstorming, and observation is often adopted. While to reach consensus, negotiation and team-decision are often valuable to be considered. (Paetsch F., Eberlein A., Maurer F., 2003) However, Traditional RE approaches cannot fulfill the current project management approaches. With more and more project adopt Agile methodology, engineers use user stories to replace traditional requirement document, and the way they elicit requirement has also changed: they document what exactly needed only when needed; more collaborations are involved whenever they need, but they only discuss what are needed; traditional requirements tend to explain what customer need or want while user story focuses on interaction between role and object user to machine, user to user, machine to user, machine to machine. (Paetsch F., Eberlein A., Maurer F., 2003) Since user stories are as important as traditional requirement document, the quality of user stories become equally important. To define high qualifies user stories, a set of guideline consisting of 13 criteria concerning syntactic, semantic, and pragmatic are required to adopt. (Lucassen, G., Dalpiaz, F., van der Werf, Jan Martijn, E. M., Brinkkemper, S., 2016) Before start iterations or springs, choosing specific requirements or user stories out of the whole repository on the basis of requirement prioritization technology is a must. To mark priority of each requirement or just sort them in order, the customers must make most of the decisions such as a case is a must or just what they want. Project engineers also need to estimate time effort and provide to what extent they think the estimation is accurate or not (risk aspect). Sometimes, stakeholders are asked to group these requirements (grouping requirements) or to vote 100 dollars to several requirements(buy requirements).Ãâà Some prioritization methods are easy to use and reasonably accurate (MoScoW) while some are the most reliable but very difficult to use regarding (AHP). (Javed, A. K., Rehman, I. U., Yawar, H. K., Iftikhar, J. K., Rashid, S., 2015) Requirements: conditions or capabilities that must be met by the project or present in the product, service, or result to satisfy an agreement or other formally imposed specification Requirements engineering (RE): is a traditional software engineering process with the goal to identify, analyze, document and validate requirements for the system to be developed. Requirements Prioritization: to deliver the most valuable feathers as early as possible under a tight schedule, limited resources, and high customer expectations, the customer should decide which requirements are more urgent than others to be implemented. Javed, A. K., Rehman, I. U., Yawar, H. K., Iftikhar, J. K., Rashid, S. (2015). Comparison of requirement prioritization techniques to find best prioritization technique. International Journal of Modern Education and Computer Science,7(11), 53-59. doi:http://dx.doi.org/10.5815/ijmecs.2015.11.06 Abstract: This paper describes an assessment of different requirement prioritization techniques (binary search tree, AHP, hierarchy AHP, spanning tree matrix, priority group/Numerical Analysis, bubble sort, MoSoW, simple ranking and Planning Game) on the basis of previous literature. Five research papers and thesis are critically reviewed, in order to select best requirement prioritization method. The study of literature shows that AHP is the best requirements prioritization technique amongst all the requirements prioritization techniques. It provides the most efficient and reliable results which are on ratio scale. It is fault- tolerant and provides a consistency check. Lucassen, G., Dalpiaz, F., van der Werf, Jan Martijn, E. M., Brinkkemper, S. (2016). Improving agile requirements: The quality user story framework and tool. Requirements Engineering. 21(3), 383-403. doi:http://dx.doi.org/10.1007/s00766-016-0250-x Abstract: User stories are a widely adopted requirements notation in agile development. Yet, user stories are too often poorly written in practice and exhibit inherent quality defects. Triggered by this observation, we propose the Quality User Story (QUS) framework, a set of 13 quality criteria that user story writers should strive to conform to. Based on QUS, we present the Automatic Quality User Story Artisan (AQUSA) software tool. Relying on natural language processing (NLP) techniques, AQUSA detects quality defects and suggest possible remedies. We describe the architecture of AQUSA, its implementation, and we report on an evaluation that analyzes 1023 user stories obtained from 18 software companies. Our tool does not yet reach the ambitious 100 % recall that Daniel Berry and colleagues require NLP tools for RE to achieve. However, we obtain promising results and we identify some improvements that will substantially improve recall and precision. Paetsch F., Eberlein A., Maurer F. (2003). Requirements engineering and agile software development. International workshop on enabling technologies: infrastructure for collaborative enterprises,IEEE.308-313. doi: 10.1109/ENABL.2003.1231428 Abstract: This article compares traditional requirements engineering approaches and agile software development. Our paper analyzes commonalities and differences of both approaches and determines possible ways how agile software development can benefit from requirements engineering methods.
Thursday, September 19, 2019
Essay --
Recently, the topic of oil consumption and production has been thrust onto the world stage. As demand for oil increases internationally, the role of major producers will change dramatically. As a representative of Saudi Arabia, I will offer my position on these topics, and I will represent the views of my nation as clearly as possible. The first topic Iââ¬â¢d like to address is OPECââ¬â¢s control on global oil production, supply, and pricing. Right now, OPEC member nations control nearly 81% of crude oil reserves, compared to 19% of non-OPEC member nations (EIA.gov). Because we control such a large percentage of the total amount oil reserves in the world, we can effectively control prices through production. If we decrease production, prices rise, and if we increase production, prices fall. As a representative of both Saudi Arabia and OPEC as a whole, I believe that our control over world oil production and supply is both justified and correct. My country in particular controls nearly 1/5 of total world oil reserves, and acts as the largest exporter and producer of petroleum (EIA.gov). Therefore, we should have a significant amount of control over world oil prices, because we control such a large percentage of world oil reserves. We should be able to essentially control international oil prices, and cut off supply to any country we see fit. On the topic of our cooperation with OPEC, the current member nations need to reorganize and reassess our goals. Although we have set oil production allocations for each nation to ensure price stability and adequate supply, nations like Iran and Iraq have skewed production due to their unstable oil output and refusal to adhere to production quotas. In terms of my countryââ¬â¢s position on non-OPEC produ... ...my, because OPEC has such a large influence on world oil supplies. Therefore, although Iraq and Iran have, in the past, taken action contrary to OPEC policy, we have to continue cooperating with them. These points of opposition against my country, although they may be justified, do not take into account Saudi Arabiaââ¬â¢s political and economic situation. Because of this, they are short-sighted and unreasonable. At this conference, we hope to resolve outstanding foreign relations issues with countries around the world to both ensure continued oil exports and stable oil prices. We will not, however, make any concessions in terms of oil production and greenhouse gas emission, as any decrease in production would stunt our economy growth. Hopefully, we will be able to achieve our goals of mending foreign relations issues while sustaining our control over world oil prices.
Wednesday, September 18, 2019
Puritanism: The People, Religion, and Poetry Essay -- Religion History
Puritanism: The People, Religion, and Poetry Puritan literature began the American tradition. Though they followed the traditions of European poetry, later American poets continued this borrowing from Europe, until innovations led American poetry further away from the standards the Puritans had held for poetry. The poetry the Puritans wrote was characterized substantially by their religion. It affected their themes, taken from their everyday lives, but focused on faith and theology. Also, it influenced the degree of community and individualism, which bridged the older traditions of community to the growth of individualism down through American history. They also valued logic and considered it an important means to learning God's truth. It was this logic and their concepts of God and how he revealed himself to people, that gave them a strong belief in nature as a book to be read, containing the truths they already held. Reading the book of nature was one of the significant aspects of Puritan poetry that later poets followed unti l some began to question that there were any good foundations for doing this. Gradually, conceptions about nature and God and perception led poets farther from this Puritan tradition. By the time of modern poetry, understandings about nature, God, and people had been completely changed. Thus, Puritan poetry affected American poetry by providing ideas that could not only be followed, but could also be rejected. One of the results of reading the book of nature is the tendency to use metaphors to nature. Use of metaphor extended beyond nature, though. Many Puritan poets used metaphors and extended metaphor often. Their examples were English metaphysical and conceitists poets. Like these poets, the Puritan... ...American Poetry. Ed. Jay Parini. New York: Columbia University Press, 1995. pg 50. Taylor, Edward. "Upon a Spider Catching a Fly." Columbia Anthology of American Poetry. Ed. Jay Parini. New York: Columbia University Press, 1995. pg 49 Tenth Muse Lately sprung up in America, The . By a Gentlewoman in those parts. (London: Stephen Bowtell, 1650): 3-4. Representative Poetry On-line: Editor, I. Lancashire; Publisher, Web Development Group, Inf. Tech. Services, Univ. of Toronto Lib. RPO 1997. à © I. Lancashire, Dept. of English (Univ. of Toronto), and Univ. of Toronto Press 1997. available at http://www.library.utoronto.ca/utel/rp/poems/abrad1c.html. accessed 12/6/01. Winthrop, John. ââ¬Å"A Modell of Christian Charity.â⬠The American Intellectual Tradition, volume I. third edition. Eds. David A. Hollinger and Charles Capper. New York: Oxford University Press, 1997.
Subscribe to:
Posts (Atom)