Thursday, October 31, 2019

The Beatles recording catalog covers a wide range, to say the least, Essay

The Beatles recording catalog covers a wide range, to say the least, from the likes of Love Me Do (1962) to Revolution 9 (1968) - Essay Example These forms of life were reflected in their production of music with Hindustani, avant-garde and Western classical influences (Young 14). This period saw the Beatles redefine the meaning of rock and roll as a form of culture. Some of the American artists, whom they admired, such as Elvis Presley, became their inspirations and role models for the younger rock musicians. Consequently, the first songs that the Beatles wrote and recorded widened the musical range as well as the expressive scope of the music genre they had inherited. They used subtle arrangements, vocal harmonies, and clever touches in production (17). Additionally, they used elemental rhythm that was characterized by drumming. It added beauty and excellence to their songs. In the wake of the student protest eruptions in France and Mexico, the Beatles gave up their roles as global leaders of an immature youth culture. Nevertheless, they continued recording and releasing new music while maintaining their popularity that has remained unshaken ever since then. Apple was their record label that was launched in 1968, with the hope of nurturing pop art. However, they only created commercial failure and chaos. Nevertheless, the band continued enjoying extensive popularity. Abbey Road, launched in 1969, became the Beatle’s most-loved and best-selling album (19). The Beatles laid the benchmark for teen idol quality. Before their arrival, the pop scene in the United States was stale. However, the Beatles blasted the pop landscape with their exotic accent and queer looks. While Paul was the cute and adorable one, George was quiet and shy, Ringo was fun and goofy and John was smart and slightly dangerous (20). Their character traits covered all teen tastes. Also, their matching â€Å"moptops†, collarless suits, and Cuban ankle boots made their appearance uniform. Different from their competition, the Beatles controlled their appearance. Despite the fact that disrespect has existed for

Tuesday, October 29, 2019

Subject-Management Process Case Study Essay Example for Free

Subject-Management Process Case Study Essay This case is about Victor D’Cuhna, young executive who has joined to take charge of data processing cell. The main problems which were there in department are; there is no co-ordination between the employees due to lack of training and there is communication gap. D’Cuhna is keen of making changes immediately in the department and conducts seminar training session. D’Cuhna faces various problems during his change management, which were neglected by him and hence turns into failure. Case Analysis: Problems: * Immediate Implementation (Hasty decisions): D’Cuhna soon after joining started implementing change in the department like seminar on communication and feedback and training session. * Unable to connect and co-ordinate with his colleagues: Female sub-ordinates ignored his implementations, his senior management was also uncomfortable and his junior promoted officers also had negative prejudice. * No consent taken from higher management: He did not consider taking opinions of the regional head before firing the female employee. * Lack of formal training: Fresh recruits and junior clerk cadre were not formally trained. So, blame was always put on data processing cell in case of any discrepancies. Reasons for Failure: There are certain functions of a Manager which needs to be fulfilled like planning, organizing, staffing, leading, controlling and coordinating. D’Cuhna fulfilled few of the functions but failed to be efficient in some functions such as: †¢ Leading: He couldn’t influence most of the people in the department so that they can contribute work towards organizational goal as a group. †¢ Controlling: He couldn’t measure correct individual performance to ensure that events conform to plans. †¢ Co-ordination: He was unable to achieve harmony among individuals. †¢ Lack of Understanding: Improper communication and lack of understanding with sub-ordinates and seniors. Precautionary Steps: 1) As he was new to the office he should have first acquainted himself well with his peers, seniors and juniors. He should have spent some time in building understandability with them. 2) Before conducting seminars he should have taken the senior management into confidence by making them understand the loopholes in the process and why such seminars are required. 3) He should have tried to build a rapport with juniors as well by making them understand why they need training before imparting them the same. 4) He should have consulted the senior management and her immediate officer before firing the clerk. MINUTES OF MEETING Following is the minutes of meeting of the group discussion for this case let. †¢ Date Time: 30 January 2013, 05.30 pm to 7.00pm †¢ Members Participated: Following were the contribution of each member:- †¢ Prateek: He suggested that, D’Cuhna shouldn’t have made immediate changes to departments. †¢ Pallavi: He lacked leadership qualities highlighted the need of training. †¢ Prachi: Controlling co-ordination was missing, was suggested by her. †¢ Dinesh: Understanding employees was necessary to know the problem. †¢ Saugat: Suggested consulting with senior management was necessary before firing. †¢ Vikas: He misused the authority given to him did not make efforts to change opinion of the female employees.

Saturday, October 26, 2019

Understanding Linear Cryptanalysis

Understanding Linear Cryptanalysis Dipanjan Bhowmik Abstract The objective of this paper is to provide a better understanding of the Linear Cryptanalysis Attack developed by M.Matsui [2]. This paper has been written after going through noted literature in this field and has been structured in such a way that a beginner in this field would be able to understand the idea with little prior knowledge. The paper describes a simple cipher and then applies Linear Cryptanalysis to break it. The cipher has been intentionally taken to be very simple so that a beginner can actually implement it and get an actual feel of the attack. The paper also describes all the algorithms involved in this attack again with the intention of letting a beginner actually realize the attack. Keywords: Linear Cryptanalysis, Linear Approximation Table, s-box, Toy cipher, Parity. Introduction: If one feeds a random input with a particular property into a magic box and can guess the corresponding property in the output, the magic box is some what linear. For example imagine that the box takes an input and adds one to it. Now, let’s say that the property which is looked at is whether the input/output is even. By feeding it an input, one knows the property will be opposite in the output every single time. In other words, adding one to an even number will always produce an odd number and vice versa. This magic box will be completely linear with respect to divisibility by 2. In an iterative cipher, substitution box(s) (S-Box(s)) add non linearity to it. Ideally, an s-box should receive an input with property X and output a number that has property Y exactly 50% of the time. The property, which is being looked at in Linear Cryptanalysis is Parity. Definition Parity: It is a Boolean value (a 0 or a 1), that we get if we perform an XOR operation on some or all of the bits of a number expressed in binary form. The bits that are being XORed together is defined by another number called the mask. The mask lets us to ignore some of the bits of the input while calculating the parity. In order to calculate the parity, the mask value it bitwise ANDed with the input value, the bits of the resultant is then taken and XORed together to obtain the parity. Generating Linear Approximation Tables (LATs): The masked input parity concept is used to find linearity in the S-boxes. Every single combination of input mask vs. output mask has to be tested for all possible inputs. Basically we will take an input value, mask it using an input mask and obtain its parity (Input Parity). Next, we will take the original input, run it through the S-box and mask it with 6the output mask. We then compute its parity (Output Parity). If they match, then we know that the combination of input and output mask holds true for that input. After doing this for every possible input against every possible pair of input/output masks, we have made a table called the Linear Approximation Table. Each entry in the table is a number indicating the number of times a specific input/output mask pair holds true when tested against all possible inputs. For example, if a certain S-box takes 4 bit inputs and produce 4 bit output, then the LAT will be of dimension 16 x 16 and each entry will range from 0 to 16, indicating th e number of successful matches between input and output parity. Algorithm 1: Algorithm for generating Linear Approximation Table For i=0 to 2m -1 For j=0 to 2n -1 For k=0 to 2m -1 If Parity (k AND i) =Parity(S-box[k] AND j) then LAT[i][j] à ¯Ã‚ Ã‚ ¦LAT[i][j] +1 Where, LAT is a 2-D array of size m x m. Parity () is a function that computes the parity of the given input. M is the total number of bits fed as input to the S-box. N is the total number of bits produced as output by the S-box. I ranges from 0 to 2m -1 , it represents all possible input masks. J ranges from 0 to 2n-1 representing all possible output masks. K ranges from 0 to 2m -1, it represents all possible inputs to S-box. Let us assume an S-box that takes 4 bit inputs and produces 4 bit output. Both the input and output ranges from 0 to 15. Such a S-box is injective in nature. For such an S-box, the algorithm to generate the Linear Approximation Table is modified as following: Algorithm 2: Algorithm for generating Linear Approximation Table for the S-box given in Fig 1. For i=0 to 15 For j=0 to 15 For k=0 to 15 If Parity (k AND i) =Parity(S-box[k] AND j) then LAT[i][j]à ¯Ã‚ Ã‚ ¦ LAT[i][j] +1 In this case, the LAT generated is of dimension 16 x 16.The following table depicts the Linear Approximation Table generated for the S-box given in fig. 1 using algorithm 2. Similarly, the LAT for any of the DES S-box can also be generated, For DES S-box; the algorithm is modified as the following: Algorithm 3: Algorithm for generating LAT for DES S-Box. For i=0 to 15 For j=0 to 63 For k=0 to 15 If Parity (k AND i) =Parity(S-box[k] AND j) then LAT[i][j] à ¯Ã‚ Ã‚ ¦AT[i][j] +1 In this case, the LAT is of dimension 16 x 64, the reason being DES S-box takes 4 bit input and produces 6 bit output. Piling Up Principle One of the fundamental tools used for linear cryptanalysis is the Piling Up Principle. Let us conceder two random binary variables X1 and X2, and let us assume And Then, the probability of the relationship X1(+)X2 will be That is, X1 (+) X2 will be 0 when X1=X2 i.e. when both X1 and X2 are 0 and both X1 and X2 are 1. And X1 (+) X2 will be 1 when X1≠  X2 i.e. when X1=0 and X2=1 or X1=1 and X2=0. Accordingly probabilities are computed, assuming X1 and X2 are independent. We are particularly interested in deviation of the probability from  ½, so, let us consider p1=1/2+ ÃŽ µ1 and p2=1/2+ÃŽ µ2, where ÃŽ µ1 and ÃŽ µ2 are the deviation of p1 and p2 from respectively from  ½ and are referred to as probability bias. Now, P(X1 (+) X2=0)=(1/2 + ÃŽ µ1).(1/2+ÃŽ µ2) + (1-(1/2+ÃŽ µ1)).(1-(1/2+ÃŽ µ2)) =1/2+2.ÃŽ µ1.ÃŽ µ2 So, probability bias of X1 (+) X2 is given by ÃŽ µ1,2=2.ÃŽ µ1.ÃŽ µ2 Generally, if X1,X2,†¦Xn are n independent random binary variables, then the probability of X1 (+) X2 (+) †¦(+) Xn=0 is given by the Piling Up Lemma. P( X1 (+) X2 (+) †¦Xn =0) =  ½ + 2 n-1 . ∠i=1†¦n ÃŽ µi†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.(1) And the probability bias of (+) X2 (+) †¦(+) Xn=0 is given by ÃŽ µ1†¦n=2 n-1 . ∠i=1†¦n ÃŽ µi Note that, P( X1 (+) X2 (+) †¦Xn =0) =  ½, if there exist some ÃŽ µi such that ÃŽ µi=0 or pi=1/2. And P( X1 (+) X2 (+) †¦Xn =0) = 0 or 1, if for all ÃŽ µi, ÃŽ µi=+1/2 or -1/2 respectively or pi=0 or 1 respectively. Attacking a Toy Cipher Let us consider a toy cipher that takes 4 bit input goes through two iterations of key addition and block substitution and yields a 4 bit output. The following figure diagrammatically represents the toy cipher. P1, P2, P3, P4 represents the 4 bit plain text C1, C2, C3, C4 represents 4 bit cipher text. K0, K1, K2 are 4 bit sub keys Total key length is of 12 bits. The cipher uses two identical S-boxes, which is same as the S-box described earlier. The following algorithm implements the toy cipher Algorithm 4: Implementing Toy Cipher Kye[]à ¯Ã‚ Ã‚ ¦{k0,k1,k2} Sbox[]=à ¯Ã‚ Ã‚ ¦{E,4,D,1,2,F,B,8,A,6,C,5,9,0,7} For i=0 to 15// 16 possible inputs { p=i For j= 0 to 1// 2 iterations pà ¯Ã‚ Ã‚ ¦Sbox [ p (+) Key[j]] C[i]à ¯Ã‚ Ã‚ ¦ p (+) Key[2] //final key whitening step } The toy cipher yields the following output when Key[]à ¯Ã‚ Ã‚ ¦{B,7,F} The first step towards attacking the cipher begins by obtaining an equation of the form X1 (+) X2 (+)†¦(+) Xn =0. Such an expression can be obtained using Linear Approximation Table. In our example P(LAT[F][A])=12/16 or equivalently Bias( LAT[F][A})=4/16,k where F is the input mask and A is the output mask. It should be noted that although LAT[0][0]=16 but it cannot be used. Let Uij demote the jth input of ith S-Box and Vij denote the jth output of the ith S-Box. So, P(U11 (+) U12 (+) U13 (+) U14 =V11 (+) V13)= 12/16 Let Kij denote the jth bit of the ith sub key, then U11 = P1 (+) K01, U12 =P2 (+) K02, U13 = P3 (+) K03, and U14 = P4 (+) K04, where Pi denotes the ith plain text bit. Therefore, P( P1 (+) K01 (+) P2 (+) K02 (+) P3 (+) K03 (+) P4 (+) K04 = V11 (+) V13)) = 12/16 orP ( P1 (+) P2 (+) P3 (+) P4 (+) ∑K0 = V11 (+) V13) = 12/ 16 Since, U21 = V11 (+) K11 or, V11 = U21 (+) K11 and U23 = V23 (+) K13 or, V13 = U23 (+) K13 Hence, P (P1 (+) P2 (+) P3 (+) P4 (+)∑K0 = U21 (+) K11 (+)U23 (+) K13) = 12/ 16 or, P (P1 (+) P2 (+) P3 (+) P4 (+)∑K0 (+) K11 (+) K13 = U21 (+)U23) = 12/ 16 Let us assume K=∑K0 (+) K11 (+) K13, which can either be 0 or 1 Therefore, P (P1 (+) P2 (+) P3 (+) P4 (+) K= U21 (+)U23) = 12/ 16 Or,P (P1 (+) P2 (+) P3 (+) P4 = U21 (+)U23) = Now, as we have obtained a linear expression with a relatively high probability bias, we would now partially decrypt the cipher text to obtain U2 (input to the 2nd S-Box). The following algorithm does this. Algorithm 5: Partially decrypting the cipher text C[] à ¯Ã‚ Ã‚ ¦ { 3,B,6,D,1,7,F,2,4,9,E,5,8,A,C,0} Isbox[] à ¯Ã‚ Ã‚ ¦ {E,3,4,6,1,C,A,F,7,D,9,6,B,2,0,5} For k=0 to 15 {pro[k]à ¯Ã‚ Ã‚ ¦ 0 For I = 0 to 15 {pdc [k][i] à ¯Ã‚ Ã‚ ¦ isbox [ C[i] (+) k] If Parity (pdc[k][i] AND A) = Parity ( I AND F) then pro[k] à ¯Ã‚ Ã‚ ¦ pro[k] +1 } } It should be noted that Parity (pdc[k][i] AND A) = Parity ( I AND F) is the algorithmic implementation of P1 (+) P2 (+) P3 (+) P4 (+) = U21 (+) U23. Since, bit wise ANDing retrieves the required bits when ANDed with a mask having 1 in the required position in its binary equivalent. The algorithm yields the following probabilities. From the result we observe that probability when key=F is 12/16 which matches with our expected probability, there by indicating that K2=F. It should be noted that in our example, it so happened that there is only one candidate for K2, but generally there may be more than one candidate and all of then should be given due consideration. For the next round, we use the partially decrypted cipher text with respect to key =F as the cipher text and perform the procedure defined as algorithm 5. That is , now C[]à ¯Ã‚ Ã‚ ¦{B,1,D,4,0,7,E,2,6,A,3,9,F,C,8,5} The output yielded at this point is given below. At this time we are comparing the plain text block P1, P2, P3, P4 to the input of the first S-Box i.e. U1, U2, U3, U4, so the expected probability is computed as P( P1 (+) P2 (+) P3 (+) P4 = P1 (+) P2 (+) P3 (+) P4) =1 Or, P( P1 (+) P2 (+) P3 (+) P4 = P1 (+) P2 (+) P3 (+) P4 (+) ∑K0) = Or, P( P1 (+) P2 (+) P3 (+) P4 = P1 (+) K01 (+) P2 (+) K02 (+) P3 (+) K03 (+) P4 (+) K04) = Or, P( P1 (+) P2 (+) P3 (+) P4 = U11 (+) U12 (+) U13 (+) U14) = The expected probability match4es with the observed probability for sub key K1= 7. Therefore with high degree of certainty, K1=7. So, we retain the partially decrypted cipher text for sub key =7, which is contained in pdc[7][i] for i=0 to 15. The partially cipher text for sub key =7 is given in the following table. Now, in order to obtain the sub key K0, we need simply to choose any pair of plain text and partially decrypted cipher text and perform a bitwise XOR operation. Say, we choose (4,F), then 4 (+) F = B, So, K0=B. Thus, the actual key ={B, 7, F}, which is the key we originally used in our example toy cipher. It should be noted that, at every step of our attack, we obtain unique sub key values that matches our expected probability, which may not be the case all the time. And in such situations where multiple sub keys matches the expected probability we need to consider each of these sub keys. Observations If the Linear Approximation Table (LAT) has an entry such that Bias (LAT[i][j])| =1/2 (50%) and i=j, then the S-box is prone to Linear attack. So, such an S-box is a strict no for any cipher If the Linear Approximation Table has entries such that |Bias(LAT[i][j])| =1/2 and | Bias (LAT[j][k])| =  ½ where i ≠  j ≠ k , then such a cipher is also susceptible to Linear Attack. If |Bias(LAT[i][j])| =  ½ where i≠ j and there is no pair such that |Bias(LAT[i][j])|=1/2 and |Bias(LAT[j][k])|=1/2 where i ≠  j ≠ k , then after a certain number of iterations, Linear Cryptanalysis becomes ineffective. The observation is illustrated using the following graph. Conclusion As the number of iterations of an iterative cipher increases and observations 1 and 2 does not hold, Linear Cryptanalysis becomes increasingly less effective. References: Heys,H.M,2002,†A Tutorial on Linear And Differential Cryptanalysis†, Cryptologia,XXV(3),189-221. Matsui, M.,1994,†Linear Cr4yptanalysis Method For DES Cipher†, Advance in Cryptlogy-EUROCRYPT’93, Springer-Verlag,386-397. Jakobson, B.T.,Abyar, M.,Nordholt, P.S.,2006,†Linear And Differential Cryptanalysis† Paar, C., Pelzl, J.,2010,Understanding Cryptography.Berlin:Springer-Nerlag.

Friday, October 25, 2019

Macbeth: Predestination or Free Will? Essay -- Literary Analysis

When reading William Shakespeare’s play, Macbeth, it seems that Macbeth was predestined to do the terrible deeds that he did. However, there is also a valid argument that Macbeth exercised his free will and chose to do those things on his own. This discussion leads into many different topics, but it relates most to spirituality. The concept of free will and how it relates to Macbeth and our present lives yields a relevant and interesting topic for further discussion. The first argument for Macbeth being predestined arises in the first Act when the witches called themselves the â€Å"weird† sisters: â€Å"The weird sisters hand in hand† (I.iii. line 32). At the time of Macbeth’s writing, weird did not mean strange or unusual as it does today. Weird was derived from the Old English word wyrd, meaning fate.1 Essentially, the witches were calling themselves the â€Å"fate† sisters. As defined by Merriam-Webster, fate is â€Å"an inevitable and often adverse outcome, condition, or end.† 2 Based on this definition, the women of fate appear to have either been controlling the way history played out, or they had the ability to see what was going to happen. Either way, Macbeth had no control over his life so he was basically a pawn on a bloody chess board moving about under the control of â€Å"fate.† As Macbeth progressed further into his downfall and more of the witches’ prophecies came true, Macbeth started to believe that their statements could not be false. â€Å"The spirits that know/ All mortal consequences...† (V.iii. lines 4-5). This fact is reiterated when Macbeth drew all of his confidence from those prophecies near the end of the play: â€Å"But swords I smile at, weapons laugh to scorn,/ Brandished by man that’s of a woman born.† (V.vii. lines 12-13). (In ... ...s in the context of Macbeth, but once these beliefs are placed into the realm of the real world, there is a lot more room for argument. Things in real life are less certain and there are many variables that can affect a person’s opinion on this matter. Ultimately, it comes down to a personal decision that everyone exercises their freedom of choice on to establish what they believe. Works Cited 1. Online Etymology Dictionary. Web. 24 Nov. 2010. . 2. "Fate - Definition and More from the Free Merriam-Webster Dictionary." Merriam-Webster Online. Web. 24 Nov. 2010. . 3. Shakespeare, William. The Tragedy of Macbeth. Elements of Literature [Gr. 12]. Literature of Britain with World Classics. Austin [Tex.: Holt, Rinehart and Winston, 2000. 301-82. Print.

Wednesday, October 23, 2019

How Has Globalization Shaped Your Community Essay

The term â€Å"globalization† is a complex concept to define in a single, precise statement as one might find in a dictionary. Although the phenomenon has many facets, it is generally described as the trend whereby countries, on a global scale join socially, politically and economically. This process is facilitated in many ways, like through public and private sector decisions, education and by the ever increasing rate of information transfer via the Internet and social media, which has been a major catalyst in contemporary politics. An example of this would be the ways in which the social media has facilitated the Arab Spring revolutions, as individuals see themselves increasingly as part of the larger picture; as citizens in the global scheme. Globalization is said to bring people of all nations closer together, especially through a common medium like the Internet, and through the common mechanism of economics. Growing up in one of Brooklyn’s most iconic religious communities, I have experienced the many changes to its population and commercialism as it has â€Å"evolved† due to globalization. I have seen the resistance to this change as well, which may be typical of areas where the majority are conservative, religious men and women. However, as all communities eventually yield somewhat to the changing political and social landscape, I have noticed the ways in which Crown Heights Brooklyn has also gave way to the phenomenon of globalization. From a lifelong perspective on my particular block, I have see the changes in the ways my neighbors and I shop, how we interact, and the effects of this change on the community. In particular, I’ve notice mass merchants opening up around my neighborhood. Neighborhoods comprised of a dominant ethnicity or religious majority tend to favor the â€Å"mom and pop† version of food markets, pharmacies, as well as locally owned day cares, schools, banks and other institutions. It is therefore interesting to watch the process of globalization gradually change my community in similar ways it has changed other secular neighborhood. Particularly notable is how the the local hardware store (where we went to buy our batteries and Walkmans) was replaced by a home depot, and the Jewish operated kosher markets give way to (still Kosher) super-centers. Additionally, in the generation of my youth prior to the technological revolution, the idea of a cell phone for every able bodied adult a nd teen was as foreign as the notion of a flying car, Let alone the use of the Internet for recurrent ordering of good and service. Before everyone was on board with â€Å"America Online† and learning the ins-and-outs of the Internet in the 1900’s, the community of Crown Heights had almost blatantly-defined boundaries, and consumers rarely, if ever traversed these invisible lines for their consumer needs- they had no need for Kosher food, or religious materials or traditional Jewish food. In one article, Mele makes an analogy using the Lower east side of New York City to describe the visceral effects of globalization on the urban life (5), explaining the ways big business has reinvented and marginalized the â€Å"local character† of these neighborhoods. When big companies seek to get bigger by opening chains in small religious neighborhoods, the negatives are the same as when they open in secular locales, such as the Lower East side of the New York City- the negatives are blatant. The anti-globalization arguments are also the same region to region; that is, the fear of mistreatment to workers and low wages for them to bring home (Clawson 1) among other things. With respect to my neighborhood, I can recall discussions by a few Rabbi’s about ways to slow or ameliorate such ills of the global market sprawl. But the sprawling of global living is inevitable, and as conservative a community may be, we should look for ways to live with the effects of globalization. We should strive to maximize the advantages while minimizing the harms. I will not claim that this trend in my neighborhood has lacked any appeal or advantage. Price and convenience of products are changing for the better, as we are able to obtain goods and services from the far reaches of the world by a click of a button, a phone call or a trip to your mass retailer. These large businesses offer delivery, savings selection and convenience often not affordable to the mom and pop store. The local butcher, local grocers and authentic, traditional bakeries in my neighborhood were replaced by large supermarkets promoting deep discounts and convenience of â€Å"one stop shopping.† According to recent research, Zhu, Singh and Dukes argue that some stores located near these larger enterprises performed better than those located miles away or more (3). Still, one can not ignore that In a society which is fast paced, local community economies are suffering greatly. The availability of goods and services may be more prolific than ever, but the quality leaves much to be remembered, as I do from the time of my childhood. The citizens of Crown Heights have learned to adapt to change, yet they may be powerless after all. Globalization means you aren’t just competing against the store across the street, but rather someone in another town or other nation, one quite possibly with a lower labor rate, cheaper raw materials and cheaper overhead. In a world like this, how can the small guys survive? Actually, there have been many suggestions for local sustainability put forth by both the merchants and the consumer culture. The government has attempted tariffs and legislations to promote local industry, and there are myriad anti-globalization organizations such as environmental groups like Greenpeace, and international groups like Oxfam (â€Å"Globalization† 1) However, experience from my community suggests that it is not government agenda, but community action that will bring forth the best long term changes. Studies often result in competing and/or mixed results and conclusions, but it is clear that Crown heights has changed for the worse in many ways due to globalization. For that reason it is logical to site academic studies to explain the causes and cures to this downside of global markets. Conventional wisdom and research may suggest that when large â€Å"Wall-Mart’s† open in a community, local businesses suffer for it. This model may also explain what is going on in Crown Heights- the total drawbacks of globalization outweigh any benefits. The negative impacts of the giant Wall-Mart is often used (perhaps correctly) to generalize the ills of the globalization. One recent study analyzed them once again, making use of national data, finding that the opening of a Wall-Mart reduces local-level (county) retail employment by 150 jobs. Because Wal-Mart stores employ an average of 360 workers, this suggests that for every new retail job created by Wal-Mart, 1.4 jobs are lost as existing businesses downsize or close. The study also found that the arrival of a Wall-Mart store reduces total county-wide retail payroll by an average of about $1.2 million (Flandez 1) So it would seem that local ownership is vital to the livelihood of a community, as well as the survival of the community’s traditions and to prevent global homogenization of consumer products and services. The obvious question for a member of a local community, concerns how to take back the consumer market. Perhaps local supermarkets can offer more comprehensive and effective promotional material or increase the scope of product being sold. A community member can do his or her part by buying from the local Farmers Market. This action has been proven to help local economies, and it is also currently trendy to be a devout â€Å"locavore† in certain places in New York City. The fact that farmers are selling direct to the most proximal residents means revenue stays within the community. Even if every need cannot be fulfilled from a local market, each local purchase has an incremental impact; and, when applied by the masses, grows exponentially. By supporting local food, Tierney (1) points out some benefits to the local community: one does not support shopping malls, chains, and the roads and infrastructure needed to nourish them. Instead, one supports farms, and the natural habitat that comes with them. This is a positive from a conservationist perspective. Lastly, but by far of least importance, is that locally grown food is fresher, and more flavorful. If the model of the farmer’s market can be applied to any other commercial product, it should; and other forms of push-back by consumer behavior modification such as this should be used to enhance the benefits of local markets on their respective communities. The fact that these markets are growing independent of government influence is a sign that people do value their small community enterprises. Every aspiring entrepreneur has big dreams. Many have small budgets, though, and globalization processes have led to the suppression and elimination of these entrepreneurial types to actualize their dreams and help the communities and maintain the cultures they were born into. Globalization has changed the look and feel of my community, as well as the very physical and social definition and boundaries of my community. A visitor in Crown Heights today, taking a stroll down the street intent on some consumer purchase, may have come from much further away compared to decades past. Hopefully, this consumer will consider the affect of his or her dollar on the local economy and chose wisely about where to spend it. Many times one will find that buying a product which is â€Å"grown locally† won’t cost you more than the alternative; and even if it it does, your purchase helps future generations of your community. Even in the slow-changing conservative religious community of my youth, commercial globalization takes a toll on the local economy and eventually effects traditional values, yet we still have choice as a community about where we shop. It is my hope that the small budget entrepreneur of today’s market will make a comeback in my neighborhood! Sources Clawson, Julie. â€Å"Globalization and Consumerism.† Onehandclapping: incantations at the edge of uncertainty. Julie Clawson, 20 Nov 2008. Web. Web. 28 Feb 2013. Flandez, Raymund. â€Å"What Can You Do to Fight Wall-Mart.† Wall Street Journal. 20 Mar 2009: n. page. Web. 30 Jan. 2013. Marco Lauteri, et al. â€Å"Combining Demographic And Land-Use Dynamics With Local Communities perceptions For Analyzing Socio-Ecological Systems: A Case Study In A Mountain Area Of Italy.† Iforest – Biogeosciences & Forestry 5.3 (2012): 1-8. Academic Search Complete. Web. 23 Jan. 2013. Tierney, John. â€Å"Fresh and Direct From the Garden an Ocean Away.† New York Times. 30 Aug 2011: n. page. Web. 30 Jan. 2013. Zhu, Ting, Vishal Singh, and Anthony Dukes. â€Å"Local Competition, Entry, And Agglomeration.† Quantitative Marketing & Economics 9.2 (2011): 129-154. Business Source Complete. Web. 29 Jan. 2013.

Tuesday, October 22, 2019

Definitions and Examples of Tapinosis

Definitions and Examples of Tapinosis Tapinosis is a  rhetorical term for name-calling: undignified language that debases a person or thing. Tapinosis is a kind of meiosis. Also called  abbaser, humiliatio, and depreciation. In The Arte of English Poesie (1589), George Puttenham observed that the  vice of tapinosis might be an unintentional figure of speech: If you abase your thing or matter by ignorance or error in your choice of your word, then is it by vicious manner of speech called ​tapinosis. More commonly, however,  tapinosis is  regarded as a deliberate use of a base word to diminish the dignity of a person or thing (Sister Miriam Joseph in  Shakespeares Use of the Arts of Language, 1947).In a broader sense, tapinosis has been likened to understatement and humiliation: the low presentation of something great, contrary to its dignity, as  Catherine M. Chin defines the term in  Grammar and Christianity in the Late Roman World  (2008).  Ã‚   See Examples and Observations below. Also see: CursingFlytingHow to Rant: Bernard Levins All-Purpose InvectiveInvectivePejorative LanguageSnarkSwear Word EtymologyFrom the Greek, reduction, humiliation Examples and Observations Phillips: We play on a real diamond, Porter. You ain’t good enough to lick the dirt off our cleats.Porter: Watch it, jerk!Phillips: Shut up, idiot!Porter: Moron!Phillips: Scab eater!Porter: Butt sniffer!Phillips: Pus licker!Porter: Fart smeller!Phillips: You eat dog crap for breakfast, geek!Porter: You mix your Wheaties with your mama’s toe jam!Phillips: You bob for apples in the toilet and you like it!Porter: YOU PLAY BALL LIKE A GIRL!(from the movie The Sandlot, 1993)Listen up, maggots. You are not special. You are not a beautiful or unique snowflake. Youre the same decaying organic matter as everything else.(Brad Pitt as  Tyler Durden in the film Fight Club, 1999)Yes, you squashed cabbage-leaf, you disgrace to the noble architecture of these columns, you incarnate insult to the English language! I could pass you off as the Queen of Sheba!(Henry Higgins addressing Eliza Doolittle in George Bernard Shaws Pygmalion, 1912)Draw, you whoreson cullionly barber-monger, dra w.(Kent addressing Oswald in William Shakespeares King Lear, II.2) - I was going to have a few comments about John Edwards, but you have to go into rehab if you use the word faggot.(Ann Coulter speaking at the Conservative Political Action Conference, March 5, 2007)- Ann Coulter, maniacal, money hungry, far right-wing nut burger, has called John Edwards a faggot.(abillingss journal, March 6, 2007)Charlie Kaufman. Oy vay. I have hated every incomprehensible bucket of pretentious, idiot swill ever written by this cinematic drawbridge troll.(Rex Reed, Could Synecdoche, New York Be the Worst Movie Ever? Yes! The New York Observer, October 27, 2008)Hope not for mind in women; at their bestSweetest and wit, they are but Mummy, posessed.(John Donne, Loves Alchemy)Patient: Dr. Chase said my calcium is normal.Dr. House: We call him Dr. Idiot.(Informed Consent, House, M.D.)There are cretins, there are cowards, there are rats who walk like men. And then there is Larry Patterson Jr.(Leonard Pitts, The Lowest of the Low, February  22, 2008) John Synges CurseIrish poet and playwright John Synge addressed this poem to a sister of an enemy of the author’s who disapproved of [his play] The Playboy [of the Western World].Lord, confound this surly sister,Blight her brow with blotch and blister,Cramp her larynx, lung, and liver,In her guts a galling give her.Let her live to earn her dinnersIn Mountjoy with seedy sinners:Lord, this judgment quickly bring,And Im your servant, J. M. Synge.(John Synge, The Curse, 1907) Pronunciation: tap-ah-NO-sis