Thursday, November 28, 2019

On March Fourth, 1801, Thomas Jefferson Was Elected President Essays

On March fourth, 1801, Thomas Jefferson was elected President of the United States of America. Thomas Jefferson was a Republican. Republicans strongly supported farmers, and they wanted an agrarian nation. An agrarian nation means some changes had to be made in the country. The country needed strong trade with other countries, and they also needed more land to farm on. This led to the Louisiana Purchase. The French owned a huge amount of land west of the United States. Inside all of this land was the mouth of the Mississippi River, New Orleans. Because the Republicans wanted a farming nation, America needed a port like New Orleans. Jefferson didn't think that Napoleon would sell all of this land, but he asked him anyway if he was willing to sell. To his surprise Napoleon did want to sell this land because he needed more money for his fight with Great Britain. So Jefferson bought the Louisiana Territory, and doubled the nation's size. This purchase was a mastermind move by Jefferson that let the farming nation trade using the whole Mississippi. Another achievement of Thomas Jefferson was the exploration of the Louisiana Territory. He hired Lewis and Clark to explore the uncharted territory. He told them to search the land for a river passage to the Pacific Ocean. Jefferson also told them to keep diaries and make maps. This was Clark's task. In May, 1804, forty-four men set out on the expedition. The travelers tried to be friendly with the Indians on their way. When they reached North Dakota they hired the French trapper Toussaint Charbonneau, and his wife Sacajawea to be guides and interpreters. With them they traveled all the way to the Pacific Coast and back. Even though many people were disappointed upon their return that they had not found an all water route, Lewis and Clark were the first to map most of this land we call America. They also aroused an interest in the people to move westward in the growing nation. Let's go back a little bit to when Napoleon sold the Louisiana Territory to the United States. He needed money to fight in the war he was having with Great Britain. Since the United States had a small military, it did not want to be involved in the French-British War. America tried to stay neutral while trading with Europe, but France and Great Britain kept on violating their neutrality rights. The United States kept on trying to trade, but both sides put blockades on each others ports. This meant that the other countries took their ships. The British, however, not only took their ships, but they also impressed American sailors. During all of this mayhem President Madison came to power. Because of Britain's violations of America's sailors, he asked congress to declare war against Britain. Congress voted yes to the war. Afterwards, it was named the War of 1812. After two years of fighting, General Andrew Jackson came out victorious. A treaty was signed in Belgium, and the growing nation finally earned a little respect. They did this by changing the attitude of the Europeans towards them. Following the War of 1812, Andrew Jackson ran for president in 1828 and won. Jackson is said to be the first western president. President Jackson was odd in a the way he sided with states on some things and on other things he did not. He wanted to remove the Indians, get rid of the National Bank, and in 1828 he let a tariff pass that taxed imports. This angered Vice President Callhoon, and other people from South Carolina who said it was unfair. The consequence was that South Carolina nullified the tariff, Callhoon resigned, and South Carolina threatened to form their own government. Even though the Civil War wasn't until many years later, this was a sign of internal conflict that could threaten the growth of the country. Part of the reason that there was this internal conflict was that our nation was growing very rapidly, and each area of the country had huge differences. For example I will take political parties. The Republicans were farmers. They wanted a farming nation much like the South was. The Federalists were much different being from New England. They supported industry and manufacturing goods. An example of party differences is that of the Whisky Rebellion. In this the Federalists who were in power at the time past a law which put a twenty-five percent tax on whisky. This angered Republican farmers who turned their grain into whisky. A full scale revolt came out of this which threatened the ever-changing young country. Another difference was

Sunday, November 24, 2019

The Best Things in Life Are Free Essays

The Best Things in Life Are Free Essays The Best Things in Life Are Free Paper The Best Things in Life Are Free Paper The Best Things in Life are Free Over the decadesheck, even centuriesphilosophers, politicians, tycoons and other leaders have insisted that you cant get something for nothing: Theres no such thing as a free ride, or Nothing in life is free. Well-known economist Milton Friedman once said, Theres no such thing as a free lunch. Even Entrepreneur columnist Robert Kiyosakis rich dad told him the same thing. But in our evolving Web 2. 0 world and with Google leading the way, the rules have changed: You can get something for nothingand for entrepreneurs, that something can have a significant impact on their businesses. Today, the web is full of free tools to help entrepreneurs start, run and grow their businesses for next to nothing. Itll just cost you some time and an internet connection. On using free stuff * Just because its there doesnt mean you have to use it. Because theres so much out there, businesses have a tendency to be like a kid in a candy store, says Drew McLellan. Start with the strategy of what you want to accomplish, and then find the tool that will allow you to do that. Adds Mike Whaling, Its a matter of figuring out which tools are right for your business. Know your audience, and then go to where they are already having conversations. * You dont have to figure it all out by yourself. McLellan suggests doing a simple Google search on a tool or task you want to accomplish. Youll find people talking about it, he says. And people are incredibly quick to share what they know. * Dont lose your companys brand. Using a variety of tools can lead to an inconsistent company image and voice. Says McLellan, Run it through the litmus test of Is this right for my business? Does it portray my business the way I want? Whaling also emphasizes thinking about what your businesss name will be associated with because many free tools are ad-supported. * Push your preconceived notions aside. MySpace and Facebook arent just for the kiddies anymore. Says McLellan, There are a lot of people conducting business on [these sites]. * Does the tool have staying power? For every successful blog, video website or social network, there are dozens that wont make it. So, again, talk with people online and discuss their experiences with the tool to gauge its stability and reliability. It may be free, but you still need to invest. Just creating a profile wont cut it. Making the most of these tools requires time and effort, says Whaling. Theres an investment in reading other peoples blogs, commenting on posts, getting involved in the community and building relationships. Gary Vaynerchuk, co-founder of Wine Library, has been taking advantage of free business tools for nearly three years to grow his 11-year-old wine retail business. Using a combination of web-based tools, such as social networking, blogging and video, hes taken his company to annual sales of $50 million. His success with these tools has even landed him two book deals and regular speaking engagements across the country. Building brand equity and connecting with your consumers through these social tools has a global impact on your business and your brand, says Vaynerchuk, 33, who launched Wine Library with his father, Sasha, 65. Springfield, New Jersey-based Wine Library uses Facebook, MySpace and Twitter to notify its friends about daily specials, something it used to do solely through e-mail. Its Facebook presence includes a custom app called Ask Gary, where people can ask questions about wine. And the company keeps a regular video blog, Wine Library TV. Viral aspects of your message explode once you use these tools, says Vaynerchuk. When I think about how much brand equity I have with Wine Library TV and how quickly it happened for [so little cost], the fact that I spent millions of dollars building the brand prior to using these tools makes me want to throw up. As Vaynerchuk has found, customers appreciate the interaction, says Mike Whaling, president of 30 Lines, a social media marketing company that helps businesses expand their brands online reach. Traditionally, it was one way. It was shouting: brochures, white papers, advertisements. Now its much more focused on multimedia and engagement. And whereas brochures and advertising of days past had a price tag, more and more of todays tools are free. But aside from the obvious (duh, its free), what does this surge of tools mean for small businesses? It starts to level the playing field, says Whaling. It gives small businesses the opportunity to put themselves out there and really compete with the larger companies. It allows a little guy to look like a big guy, says Drew McLellan, owner and CEO of McLellan Marketing Group. It makes a small business look very sophisticated. For example, an entrepreneur can build a website easily with various blogging and web design options. A company can launch a targeted marketing campaign across numerous social networks. A business owner can manage calendars, clients and projects using different collaborative and project management software. All for free! Alison Boris and Kat hi Chandler, 38 and 31, respectively, have been capitalizing on free tools since nearly the inception of their Los Angeles-based online bag boutique, AllyKatStyle, in 2007. Like Vaynerchuk, theyve created a MySpace page for their company. They also have profiles on Digg and StumbleUpon, which are community-centric content sharing sites, to drive traffic to allykatstyle. com. Outside of the popular social networking tools, they use QuantCast (embedded in the website) to monitor traffic, frequency, demographics, geographics and more, and Skype is their official business phone. Says Chandler, Theyre great grass-roots tools to drive traffic to the site and provide free advertising through bloggers and word-of-mouth.

Thursday, November 21, 2019

Constitution Paper Essay Example | Topics and Well Written Essays - 750 words

Constitution Paper - Essay Example 3. â€Å"He has rejected his Assent to Statutes, the majorly wholesome and important for the civic good†. These remains tackled by the whole constitution through establishing the configuration of the state and in Article IV paragraph 2 â€Å"This constitution†¦ shall be the highest statute of the earth† 4. â€Å"He has forbidden his Governors to pass Statutes of instant and imperative significance, unless postponed in their function till his Assent must remain acquired†; and when so postponed, he has completely ignored to listen to them†. This remains handled through the listed powers in Article I section 8. It narrates what the state remains permitted to perform and in Amendments 9 and 10 where everything else remains preserved to the individuals and the governments. 5. â€Å"He has assembled collectively legislative organs at areas uncommon, uncomfortable, and far from the store of their civic Records for the one aim of tiring them into conformity w ith his steps†. This remains tackled through Article I Section 4 â€Å"The parliament shall meet at least one time annually, and such congregation must be on the earliest Monday in December, except they through statute select a varying day†. ... (At this moment, no restrain of periods had remained fixed). b. Assembly has the authority to lay and collect taxes and control trade with foreign countries, and within the governments. c. The judicial authority will remain vested in a single highest court and lower courts. d. To suggest modifications to the Constitution, two thirds of the two Houses vote to suggest a modification. To approve an alteration, three fourths of the government parliaments should endorse it. e. Assembly has the authority to form and promote military and navy, and to create policies and guidelines for the military and navy to stand by. The Great Compromise remained an accord made amongst the parties to the Constitutional Convention that the American state could have two houses in Assembly: the Senate where every government has double senators and the House of Representatives where every government has several Representatives founded on demography. Due to the Great Compromise of 1787, the Constitution offere d for crucially varying kinds of Representation in the House and Senate. Membership in the House remains relative to the demography of the government. The figure of Representatives to which every government remains permitted has determination each ten years following a countrywide poll, or head tally has remained taken. In the initial Assembly, every party to the House signified 30,000 constituents (Peterson, 2009). Through the 103rd Assembly, the middle House party signified almost 600,000 constituents. Initially, the figure of Representatives increased with every poll, from 105 the 1790 poll to 435 following the 1910 poll. Then Assembly solidified the figure at 435 to maintain the House at a controllable dimension. The

Wednesday, November 20, 2019

Discussion Assignment Example | Topics and Well Written Essays - 250 words - 26

Discussion - Assignment Example It is unfortunate that judges and other top government officials have personal immunity, which comes by professional courtesy and law. After one going through several blogs, one realizes that tyranny is greatly used as a strategy and the best example to illustrate this is the fact that Hamilton had tactics that worked with regard to tyranny. It is obvious that words are not sufficient and there must be true change in the United States of America when it comes to industrial espionage since the threat is not overblown. The main reason behind the US changing is the intelligent activity that the United States gathers foreign intelligence similar to that gathered by all nations globally. Being the superpower country, there must be some data protection, which can only happen with the help of changing the industrial espionage. Having data protection will be beneficial to almost every American citizen but mostly the leaders. Claims that America spies on other nations mean that the threat is not overblown but true change in industrial espionage will cover up

Sunday, November 17, 2019

Confessions Essay Example | Topics and Well Written Essays - 750 words

Confessions - Essay Example Before confession, an old woman named Ryan, who was also his teacher, was the main person who framed his views about religion and the hereafter. She was the one who would mention hell every now and then. She always had a candle in her purse, which she used to symbolize hell. She would ask boys to hold a finger in the flame, and would tell that it was nothing as compared to eternal burning in hell. â€Å"Then she asked were we afraid of holding one finger-only one finger! - in a little candle flame for five minutes and not afraid of burning all over in roasting hot furnaces for all eternity† (O’Connor 2) was what she would tell the boys. Jackie got the idea that religion was all about burning people who did wrong deeds. He knew that life did not matter, as all that mattered was the hereafter in which God had to burn people in â€Å"hot furnaces† (2). Ryan was responsible for outlining these ideas of Jackie’s, as she would say, â€Å"All eternity! Just thin k of that! A whole lifetime goes by and it's nothing, not even a drop in the ocean of your sufferings† (2). Jackie’s perception of confession before the priest was also very pessimistic, and this perception had also been granted by the off-putting Mrs. Ryan. She had mentioned an account of a man who had made a bad confession. He stayed in guilty for many days to come, and finally went to priest for correcting his confession; but, he got burnt the night before the confession. For Jackie, that was the consequence of a bad confession, because he says, â€Å"This story made a shocking impression on me† (2). Hence, he believed that a bad confession led to horrible death. Moreover, he also believed that he was a great sinner, as Ryan would mention, off and on, that it was important to examine the conscience to be a good person. She would ask the boys if they loved their parents and other people whom they knew; and, Jackie knew that he was an ultimate sinner because he hated his grandmother and his sister. â€Å"I had no hope of ever doing anything else† (3) means that Jackie had become hopeless because his perception of religion had been deteriorated in a very bad way. That is why, the day he was going to confess, he looked back at the houses and metaphorically thought that it was like â€Å"Adam's last glimpse of Paradise† (4). However, Jackie confessed. It was a heart-wrecking experience for him. He could not find the courage in the first instance; but, he confessed before the priest the second time he got the chance to speak it all out. To Jackie’s surprise and contrary to what Nora had told him, the priest proved to be very understanding. He listened to Jackie’s intentions of killing the grandmother and Nora, and gave him three Hail Marys. That changed the world for Jackie. Previously he had thought of religion as a freaking thing that intended to give punishments only; but now, he understood that religion was not scary. He says, â€Å"I knew now I wouldn't die in the night and come back, leaving marks on my mother's furniture† (9), which shows that he was not worried of burning due to a bad confession or burning in hell anymore. Before confession, his state of mind was upsetting, which shows when he says, â€Å"the wind whistled outside so that the silence within seemed to crackle like ice under my feet† (4); but, after the confession his mental state had totally changed, which shows when

Friday, November 15, 2019

The Department of Homeland Security: Technology

The Department of Homeland Security: Technology The statement: The Department of Homeland Security has complete responsibility for all U.S. homeland security related critical infrastructure (CI) matters is not entirely accurate; originally, matters of national security were the sole responsibility of the federal government (Homeland Security, 2003, p. 7). Today, national critical infrastructure protection is a joint effort among the federal government, public and private sectors. The Department of Homeland Security was established to protect and secure the homeland from both domestic and foreign threats. According to the Homeland Security Act of 2002, the development of a plan which will ensure the security of critical infrastructure is the responsibility of the DHS (Homeland Security, 2009). Likewise, the DHS is also responsible for recommending the measures necessary to protect the key resources and critical infrastructure of the United States (Homeland Security, 2009, p. 2). The mission of DHS is one that involves the protection of infrastructure and critical facilities and networks (Homeland Security, 2010, p. 33). The DHS is responsible for the identification and assessment of all components which make up critical infrastructure. In addition to mitigating potential vulnerabilities; improving the resilience of critical infrastructure, is also a top priority of the DHS. This includes but is not limited to: stand-alone facilities and interdependent systems and networks within and across critical infrastructure sectors (Homeland Security, 2010, p. 34). The DHS serves as the leader and facilitator for those agencies who share responsibility for protecting the nations critical infrastructures (Homeland Security, 2010, p. 31). Those agencies include territorial, tribal, local and state governments, as well as the private sector and other agencies not associated with the government (Homeland Security, 2003). Conversely, when a disaster occurs these agencies are the first line of defense for national critical infrastructures. Even though the DHS is responsible for leading critical infrastructure efforts, coordination of security measures within local and state governments and critical sector industry leaders are the responsibility of federal lead departments and agencies (Homeland Security, 2003). Similarly, it is the responsibility of state and local governments to provide protection to critical infrastructures that are located within their jurisdictions (Homeland Security, 2003, p. 10). If and when a catastrophic event should occur which exhaust the capabilities of local and state governments, it is up to the federal government to coordinate a response (Homeland Security, 2003). A majority of our nations critical infrastructures are privately owned or operated, which means that the private sector are initially responsible for providing protection against threats to their facilities (Homeland Security, 2003). When the threat becomes more than the private sector can handle then the government will step in to assist and ensure that our nations critical infrastructures and assets are protected (Homeland Security, 2003, p. 11). Likewise, the federal government will be there to provide support for an environment in which the private sector can better carry out its specific responsibilities (Homeland Security, 2003, p. 11). The chemical sector is one of the most vulnerable critical infrastructures to natural disaster and terrorist attacks, that being said the DHS is working with the EPA to enhance security at chemical facilities (Homeland Security, 2003). In addition, special attention is being paid to those facilities which house large quantities of hazardous chemicals (Homeland Security, 2003, p. 78). Studies conducted by the DHS and private sector are currently underway to identify and understand physical vulnerabilities within the telecommunications infrastructure and their associated risks (Homeland Security, 2003, p. 61). Even though the private sector must occasionally seek assistance from the DHS, there are times when the federal government must rely on the private sector to lend a hand in emergency response and recovery. An example of the federal government calling on the private sector for assistance was the anthrax scare of 2001. A large Washington D.C. construction corporation was contracted to oversee the abatement and restoration of the Brentwood Post office in Washington D.C. and the Trenton Post office facility in New Jersey. One must also understand that quite a few of our nations critical infrastructures cross international borders (Homeland Security, 2003, p. 35). Therefore the federal government has partnered with the neighboring countries to provide security for our interconnected infrastructures (Homeland Security, 2003, p. 35). The United States partnership with Canada is is a vital asset to national critical infrastructure, efforts are being made to provide protection for international interconnected infrastructures. An example of this partnership is the Alaskan Canadian hightway. In order to transport goods and supplies to Alaska we must travel cross Canadian territory. It is evident that matters of critical infrastrucutre involves not only the DHS but the public and private sectors as well. The DHS would not be able to carry out their responsibilites without the assistance of local and state agencies, the private sector and vice versa. The U.S. government has made great strides in developing techniques and strategies to harden U.S. critical infrastructures which will make them more resistant to terrorist attack and natural disasters. One of the U.S. governments goals is to establish a strong partnership that spans across all levels of government, in addition to the private sector and the American people (Homeland Security, 2009). The Protected Critical Infrastructure Information Program is just one of many steps taken by the U.S. government to harden critical infrastructure. This program provides protection to security-related critical infrastructure information (Homeland Security, 2009, p. 5). By breaking down each critical infrastructure sector it is easier to understand how the U.S. government has been successful in hardening each critical infrastructure. The agriculture and food sector is one of the most vulnerable critical infrastructures, that being said, efforts to harden this sector are an ongoing challenge (Mark Sauter James Carafano, 2005). The U.S. government has revised its measures by providing more protection through the hiring of more health inspectors, and adding more reporting requirements (Sauter Carafano, 2005, p. 291). Contamination of our nations water supply is often a topic of concern; efforts are being made by the Environmental Protection Agency as well as the Department of Homeland Security to conduct a vulnerability and threat assessment (Sauter Carafano, 2005). These assessments will improve not only site security at high threat locations it will also enhance monitoring and sharing of information (Sauter Carafano, 2005, p. 292). With regards to the critical infrastructure of public health the U.S. government has implemented measures to harden biomedical surveillance (Sauter Carafano, 2005). This is extremely important because of the risks of a biological attack. There have also been improvements in hardening security of emergency stockpiles of medical supplies (Sauter Carafano, 2005, p. 294). In order to improve the physical security of medical structures the U.S. government has provided incentives to the private sector (Sauter Carafano, 2005, p. 294). In response to hardening the critical infrastructure of emergency services the U.S. government has established measures to harden interoperable and redundant communication networks (Sauter Carafano, 2005, p. 295). The U.S. government has instituted a tougher national emergency preparedness exercise program which teaches better security and promotes consistent protection planning and response protocols (Sauter Carafano, 2005, p. 295). Since the defense industrial base critical infrastructure sector is owned by a majority of the private sector the U.S. government has implemented new measures to include critical infrastructure protection requirements in contract processes (Sauter Carafano, 2005, p. 296). Likewise, security is being strengthened in the defense related commercial production and distribution processes (Sauter Carafano, 2005, p. 296). The telecommunications critical infrastructure has been assessed by the U.S. government, and in return a program has been designed to identify where the most vulnerable areas are in the communication architecture and then address the security issue (Sauter Carafano, 2005). Conversely, there have also been efforts made in the energy critical infrastructure sector to enhance resilience of the energy facilities (Sauter Carafano, 2005, p. 298). Facility equipment is being repaired and replaced and there have also been improvements in restoration and recovery of services (Sauter Carafano, 2005, p. 298). Significant improvements have been made to harden the transportation critical infrastructure sector; for example, security initiatives have been established to provide commercial airliners with protection from shoulder fired missiles (Sauter Carafano, 2005, p. 299). There have also been new developments in screening technology which help identify potential threats to transportation as well as aiding the postal service sector in identifying suspicious mail (Sauter Carafano, 2005, pp. 301-302). Despite the many efforts being made to harden critical infrastructure, there are still several weaknesses in the U.S. governments strategy. Lets face it, the only other thing that is more costly than hardening critical infrastructure is the disruption or potential loss of operations in those critical infrastructures. It is clear that trying to harden all critical infrastructures is too daunting of a task and is not cost effective. The U.S. government needs to focus on those areas of the United States where our critical infrastructures are most vulnerable (e.g. New York City, Los Angeles, Washington D.C. etc.). The federal government also needs to look at the protection of our nations water ways. Information security systems need to be deployed to guard the locks on the Mississippi and St. Lawrence seaways (Bruce Don David Mussington). By employing an information security system it will enable the monitoring of vessels and ships while in locks or approaching locks (Don Mussington). To provide another level of security, river marshals could be deployed to accompany dangerous shipments through the locks (Don Mussington). Many people dont realize that a large majority of our nations goods are transported through inland waterways, which is why it is important that more attention be paid to the transportation sector.

Tuesday, November 12, 2019

The Bird Motif in Invisible Man Essay -- Ralph Ellison, Invisible Man

In Ralph Ellison's novel, Invisible Man, the narrator must go through a journey of self discovery. He does not identify himself with the black people, nor is he a part of the white culture. Throughout the novel, Ellison uses the bird motif emphasize the personalities of the groups that he is describing. In his humble beginnings the narrator's greatest desire is to achieve the power that would earn him respect from all races of people. He attempts to achieve this by adapting white ideals and adopting white customs. With the opportunity of going to New York, the narrator's future is open to many possibilities. "Man's hope can paint a purple picture, can transform a soaring vulture into a noble eagle or a moaning dove"(126). The narrator can either succeed at being powerful and influential or he can be one of the persons who talks too much, but shows no action. He does not want to be a part of the masses of black people that do not know what it is that they really want. They want to be happy, but do not know how to achieve this happiness. Ellison often compares birds to black...