Monday, September 30, 2019

Gender in Translation Essay

Abstract Metaphors are taken to be the most fundamental form of figurative language, carrying the assumption that terms literally connected with one object can be transferred to another object. A writer/speaker uses metaphor more often than not with the intentions of introducing a new object/concept, offering a more precise meaning, or simply presenting a more poetic effect to his text/speech. The main focus of this study is image metaphors of color in the Shahnameh of Ferdowsi. The study set out to determine how this particular figure of speech is rendered by reviewing two English translations of the work. The framework of the study was Newmark’s (1988a) seven suggested procedures for translating metaphors. In addition to determining which of these procedures have been applied in the two translations, the study also aimed at discovering whether any new procedures might have been applied. The study also attempted to find out whether any exclusive patterns were observed in each translator’s rendering of the discussed items. The study concluded that out of the seven procedures proposed by Newmark for translating metaphors, Warner & Warner applied five procedures and Davis applied all seven of the procedures in the translation of image metaphors of color. No new procedure was observed in their translations. The translators’ choices of procedures for translating these specific items showed that Warner & Warner had a tendency towards the first procedure which resulted in a literal translation of the particular metaphor, whereas Davis had a tendency towards the other six  procedures which all led to explicitation, simplification and the production of a reader-oriented text. Key terms: the Shahnameh, figurative language, metaphor, image metaphor of color, translation procedure 1. Introduction Translation, as Catford (1965) defines it, is â€Å"an act of transference, in which a text from the source language is replaced by its equivalent in the target language† (p. 20). Newmark’s (1988b, p. 5) more modern version of the term is â€Å"often, though not by any means always, rendering the meaning of a text into another language in the way that the author intended the text. † Even the mere thought of inferring from these two definitions that the task of a translator and the whole translation process is a simple one seems a naivete on the part of the inexperienced. Any given source text intended for translation, regardless of its text-type, is required to undergo a close reading in order to understand what it is about, and then an analysis from the point of view of the translator. The analysis stage consists of determining the intention of the text – which, according to Newmark (1988a), represents the SL writer’s attitude to the subject matter – and also the style in which it is written. Being attentive to the selected lexicon, the syntax, figures of speech, neologisms, punctuations, names, and many more is a vital role the translator plays in the process of translation. In the case of poetry, apart from all the above features there is a surplus of sound effects such as rhyme, meter, assonance, alliteration, stress, onomatopoeia. The most common goal among translators is, and always should be, to create the same effect on the target reader as the original writer had intended for his readers. In Nida’s own words, â€Å"the relationship between receptor and message should be substantially the same as that which existed between the original receptors and the message† (Nida, 1964a, p. 159). Understanding and analyzing figurative language in a text, as mentioned above, is one of the difficult processes in translation. One of these figures of speech is metaphor which is considered by linguists as the most basic where one object is used to describe another object and both objects are essentially disparate entities, but common in one or more attributes. In the following section, the theoretical preliminaries of the study will be presented, which includes an overview of metaphor, concerning its definition, classifications, identification, and also translation procedures introduced by Newmark (1988a) on the translation of metaphors in general. The image metaphor of color in particular will also be discussed along with several exemplifications. Thereafter, a selection of the collected data will be presented, analyzed and discussed. The last section will include the conclusion of the study. 2. Theoretical Preliminaries 2. 1. Definition of Metaphor Metaphor, as stated in the Merriam Webster online dictionary, is etymologically from Greek, from metapherein, meaning ‘to transfer’ and from meta- + pherein, meaning ‘to bear’. It is defined by the same source as â€Å"a figure of speech, in which a word or phrase literally denoting one kind of object or idea is used in place of another to suggest a likeness or analogy between them. † One of Shakespeare’s most famous and oft-quoted lines, ‘All the world’s a stage’, is an example of a metaphor, where he indicates that ‘the world’ and ‘stage’ are analogous. According to Richards (1936), a metaphor consists of two parts, tenor andvehicle, also introduced as object and image by Newmark (1988a), respectively. The tenor is the term to which attributes are ascribed and the vehicle is the term from which attributes are borrowed. The properties of the vehicle which apply to the tenor in a given metaphor are namedgrounds of a metaphor, also known as the sense of a metaphor. Therefore, in the example given above, ‘world’ is the tenor or object, and ‘stage’ is the vehicle or image. The ground of this metaphor is more apparent when the next two lines are added: All the world’s a stage And all the men and women are merely players, They have their exits and their entrances This metaphor is extended through adding another pair of tenor and vehicle, i. e. ‘men and women’ is the second tenor and ‘players’ is the second vehicle. Therefore, as the actors on stage have an entrance and also an exit, the inhabitants of the world do as well, their entrance to this world being ‘birth’ and their exit being ‘death’. 2. 2. Classifications of Metaphors Metaphors have been categorized in different ways by different linguists. Black (1962a, p. 25) asserts that â€Å"the only entrenched classification is grounded in the trite opposition between ‘dead’ and ‘live’ metaphors. † He adds that â€Å"this is no more helpful than, say, treating a corpse as a special case of a person: A so- called dead metaphor is not a metaphor at all, but merely an expression that no longer has a pregnant metaphorical use†. However, he does present a classification for metaphors, but not before declaring that â€Å"if the ‘actuality’ of a metaphor †¦ is important enough to be marked, one might consider replacing the dead and alive contrast by a set of finer discriminations†; hence, the following classification (ibid, p. 25): 1. extinct metaphors: expressions whose etymologies, genuine or fancied, suggest a metaphor beyond resuscitation (a muscle as a little mouse, musculus) 2. dormant metaphors: those expressions where the original, now usually unnoticed, metaphor can be usefully restored (obligation as involving some kind of bondage) 3.  active metaphors: those expressions, that are, and are perceived to be, actively metaphoric He continues further to discriminate between two types of active metaphor: an emphatic metaphor whose â€Å"producer will allow no variation upon or substitute for the words used†, and a resonant metaphor, which supports â€Å"a high degree of implicative elaboration† (ibid, p. 26). On this account, he calls a metaphor of marked emphasis and resonance a strong metaphor, and in contrast, a metaphor of relatively low emphasis or resonance a weak metaphor. Lakoff (1977) made a revolutionary contribution to the study of metaphors when he suggested a new theory of metaphor which basically stated that metaphors are â€Å"fundamentally conceptual, not linguistic, in nature† (Lakoff, in Ortony, 1993, p. 244), which resulted in the advent of the conceptual or cognitive theory of metaphor. In his proposal of the theory, he does not provide us with any specific classification for metaphors, but rather, he only refers to them in his writings as he explains and elaborates on the theory. He states that conceptual metaphors â€Å"map one conceptual domain onto another† (ibid, p.  229). On the other hand, the novel metaphors of a language are, except for image metaphors, â€Å"extensions of this large conventional system† (ibid, p. 240). Therefore, it can be implied that he believes most metaphors to be ‘conceptual metaphors’ and some others to be ‘novel metaphors’ under which ‘image metaphors’ are subcategorized. However, more than twenty years after Black’s declaration of his standpoint on the categorization of metaphors, Newmark (1988b) was still a faithful believer in the dead/live metaphor classification, as he distinguishes six types of metaphors, beginning with dead metaphors: 1.dead metaphor: this type of metaphor â€Å"frequently relates to universal terms of space and time, the main part of the body, general ecological features and the main human activities† (ibid, p. 106). Dead metaphors have lost their figurative value through overuse and their images are hardly evident. Some examples of a dead metaphor include ‘at the bottom of the hill’, ‘face of the mountains’, and ‘crown of glory’. 2. cliche metaphor: this type of metaphor is known to have outlived its usefulness, and is â€Å"used as a substitute for clear thought, often emotively, but without corresponding to the facts of the matter† (ibid, p.107). Some examples include ‘a jewel in the crown’, ‘to make one’s mark’, and ‘backwater’. 3. stock or standard metaphor: this type of metaphor is defined by Newmark (1988b, p. 108) as â€Å"an established metaphor, which in an informal context is an efficient and concise method of covering a physical and/or mental situation both referentially and pragmatically. † He also states that stock metaphors, in contrast to dead metaphors, are â€Å"not deadened by overuse† (ibid). Examples of this type also mentioned by Newmark are: ‘to oil the wheels’, ‘he’s in a giving humour’, and ‘he’s on the eve of getting married’. 4. adapted metaphor: this type of metaphor is actually a stock metaphor that has been adapted into a new context by its speaker or writer, for example, the stock metaphor ‘carrying coals to Newcastle’ can be turned into an adapted metaphor by saying ‘ almost carrying coals to Newcastle’. 5. recent metaphor: this type of metaphor is produced through coining and is spread in the SL rapidly. Examples of this kind are ‘spastic’, meaning stupid, and ‘skint’, meaning without money. 6.original metaphor: this type of metaphor is â€Å"created or quoted by the SL writer†, and in the broadest sense, â€Å"contains the core of an important writer’s message, his personality, his comment on life† (ibid, p. 112). 2. 3. Identifying Metaphors The recognition of a metaphor in a certain text or speech may be rather easy for native speakers, but when it comes to a non-native, the challenge begins. The supposition that an expression is a metaphor when it yields a false or absurd meaning when interpreted literally is not reliable â€Å"because not all metaphors have false literal interpretations† (Way, 1991, p.14). This unreliability is proven by Way when she exemplifies through the following lyrics of a song: ‘A rock feels no pain, and an island never cries’. This statement is a metaphor, but it is also â€Å"literally true; rocks do not feel pain, and islands are not the kind of things that can cry† (ibid). But how do we identify it as a metaphor, even when the literal meaning seems true? Way (1991, p. 14) explains: â€Å"Perhaps because, while not actually false, talking about rocks feeling pain and islands crying is certainly a peculiar combination; maybe we can identify metaphors by their odd juxtaposition of ideas. † A more classical way of identifying metaphors, which again is not reliable, is the form ‘x is a y’. Although many metaphors do take this form, many more do not. As Way exemplifies through Shakespeare’s ‘Let slip the dogs of war’, she states that although this is clearly a metaphor, but â€Å"it does not fit the form of ‘x is a y’, for we are not comparing dogs to war, but rather to armies, something which is never explicitly mentioned in the phrase† (ibid, p. 15). She goes on to explain that even the syntactic structure of a metaphor can not be proof of its essence, as it has no consistent syntactic form. She provides an example by Saskice, where it is shown how one â€Å"metaphor can be rephrased as a statement, a question or an exclamation† (ibid): The moonlight sleeps sweetly upon the bank. Does the moonlight sleep sweetly upon the bank? How sweet the moonlight sleeps upon the bank! She also mentions that a metaphor’s focus can be of any part of speech. In the following examples by Saskice provided by Way (1991, p. 15), it is stated that â€Å"the focus is first a verb, then a noun, and finally a participle†: The smoke danced from the chimney. The trees bowed in the dance of the seasons. Dancing waters surrounded the canoe. According to all the above, there is no reliable method for identifying a metaphor. The more we strive to analyze a metaphor, the more we understand that its creation and comprehension are challenging tasks, specifically for the non-native speaker. 2. 4. Translating Metaphors Newmark (1988b) proposes the following seven strategies for translating metaphors; the examples included for each strategy are provided by Tajalli (2005, p. 107): 1. Reproducing the same image in the TL. Play with someone’s feelings > 2. Replacing the image in the SL with a standard TL image which does not clash with the TL culture I got it off my chest > 3. Translation of metaphor by simile, retaining the image The coast was only a long green line > 4. Translation of metaphor (or simile) by simile plus sense, or occasionally metaphor plus sense He is an owl > 5. Conversion of metaphor to sense To keep the pot boiling > 6. Deletion. If the metaphor is redundant or serves no practical purpose, there is a case for its deletion, together with its sense component 7. Translation of metaphor by the same metaphor combined with sense. The addition of a gloss or an explanation by the translator is to ensure that the metaphor will be understood The tongue is fire > . 2. 5. Image Metaphors of Color As mentioned earlier, image metaphor is a subcategory of Lakoff’s ‘novel metaphor’. He distinguishes between conceptual metaphor and image metaphor due to their distinct mapping processes. The conceptual metaphor maps one conceptual domain onto another, often with many concepts in the source domain mapped onto many corresponding concepts in the target domain, whereas the image metaphor maps only one image onto one other image; thus, Lakoff (1977) calls them ‘one-shot metaphors’. The following poem, interpreted by Louis Watchman (as cited in Ortony, 1993, p. 231), contains several image mappings: My horse with a hoof like a striped agate, with his fetlock like a fine eagle plume: my horse whose legs are like quick lightning whose body is an eagle-plumed arrow: my horse whose tail is like a trailing black cloud. He continues by explaining that â€Å"Metaphoric image mappings work in the same way as all other metaphoric mappings: by mapping the structure of one domain onto the structure of another. But here, the domains are conventional mental images† (ibid, p. 229). Therefore, image metaphors map one attribute of the source domain onto the target domain. Image mapping may involve physical part-whole relationships, as in the following example extracted from The Descriptions of King Lent, translated by J.M. Cohen (ibid, p. 230): His toes were like the keyboard of a spinet. Lakoff explains that â€Å"The words do not tell us that an individual toe corresponds to an individual key on the keyboard. The words are prompts for us to perform a conceptual mapping between conventional mental images† (ibid). Image mapping may also involve a dynamic image, as in the following lines by Shakespeare (as cited in Hawkes, 1972, p. 46), where the movement of the curtains is mapped onto the movement of the eye: The fringed curtains of thine eye advance,  And say what thou sees yond. Other attributes, such as colors, may also be mapped, which are the main focus of the present study. The following lines by Shakespeare (ibid, p. 47) map the whiteness of the lily and also ivory onto the girl: Full gently now she takes him by the hand, A lily prison’d in a gaol of snow, Or ivory in an alabaster band: So white a friend engirts so white a foe. There are many examples of image metaphors of color in the Shahnameh, where the attribute of color has been mapped onto the target domain. The following translation of a couplet in the Shahnameh, produced by Warner & Warner, contains four image metaphors (of which two are similes), but only in two of them is the attribute of color intended to be mapped; the whiteness of camphor is mapped onto the character’s hair, and the redness of a rose onto his cheeks: His stature cypress-like, his face a sun, His hair like camphor and his rose-red cheeks (Warner and Warner, 1925, vol. 1, p. 191) Also in the following example from the Shahnameh, Davis has compared blood to the redness of wine in this metaphor, even including the sense. But here, the metaphor has been applied simply as a device for making the text more poetic, as Way (1991, p. 33) discussed about the substitution theory of metaphor. He saw Sohrab in the midst of the Persian ranks, the ground beneath his feet awash with wine-red blood. (Davis, p. 205) 2. 6. Formal and Dynamic Equivalence Nida (1964) divides equivalence in two different types in his article entitled ‘Principles of Correspondence’, i. e. formal and dynamic equivalence. He depicts formal equivalence as a focus on the message, in both its formal aspects and its content. Thus, in a translation from â€Å"poetry to poetry, sentence to sentence, and concept to concept† (Nida, in Venuti 2000, p. 129), the concern is formal equivalence. In this type of equivalence, the message produced in the TT should match the different elements of the ST as closely as possible. Nida further explains that a gloss translationtypifies formal equivalence. In this type of translation, he states, â€Å"the translator attempts to reproduce as literally and meaningfully as possible the form and content of the original† (ibid). In order to be comprehensible, such a translation â€Å"would require numerous footnotes† (ibid). This structural equivalence seems to be rather identical to Larson’smodified literal translation, where the translation is basically literal, but with modifications to the order and grammar of the ST, so as to produce â€Å"acceptable sentence structure in the receptor language† (Larson, 1984, p. 16). To a great extent, it also resembles Newmark’s semantic translation, which he states, â€Å"attempts to render, as closely as the semantic and syntactic structures of the second language allow, the exact contextual meaning of the original† (Newmark, 1988a, p.39). Dynamic equivalence, on the other hand, maintains that â€Å"the relationship between receptor and message should be substantially the same as that which existed between the original receptors and the message† (Nida, in Venuti 2000, p. 129). In a translation of dynamic equivalence, the target readership is not necessarily required to understand the SL culture in order to understand the message. Most importantly, this type of equivalence â€Å"aims at complete naturalness of expression† (ibid) , and is also based on the principle of equivalent effect, which maintains that the translator should produce the same effect on his own readers as the SL author produced on the original readers. Similar to Nida’s dynamic equivalence is the traditional idiomatic translationdiscussed in Larson (1984). â€Å"The translator’s goal should be to reproduce in the receptor language a text which communicates the same message as the SL, but using the natural grammatical and lexical choices of the receptor language† (ibid, p. 17). Also rather similar to this type of equivalence is Newmark’s communicative translation, which he claims, â€Å"attempts to produce on its readers an effect as close as possible to that obtained on the readers of the original† (Newmark, 1988a, p. 39). According to the above-mentioned, after comparing Warner & Warner’s (1925) and Davis’ (2007) English translations of the Shahnameh with the original, it was concluded that the first translation is a semantic translation, while the second one is a communicative translation. Warner & Warner have translated poetry into poetry and also strived at preserving the archaic tone of the original. Furthermore, they have indicated in their Introduction to the translation that many explanatory notes have been added; hence leading to a semantic translation. Davis, on the other hand, has converted poetry into prose, with occasional lines of verse in some episodes. He also explains in his Introduction to the translation that he has intended this translation for the general reader and not for scholars; thus his version is a communicative translation. 3. Empirical Data 3. 1. Data Collection and Analysis Thirty-three examples of image metaphors of color identified in theShahnameh were located in two English translations, i. e. Warner & Warner (1925) and Davis (2007). It is worth noting that over forty-five metaphorical expressions of color were identified in the entire Shahnameh, but as Davis’ translation is not a complete translation, rather an abridged version, only thirty-three were applicable to this study. The first step in this procedure was to identify all terms/objects in theShahnameh that presented color imagery. This information was found in a list provided by Rastegar Fasaei (1990). Seventy-nine items were listed, but only thirty-three were applicable in this study, because the list was obviously not intended for metaphors of color, but rather a list indicatingterms that denote a color. Many of these terms were basic color terms, e. g. , which could not produce any potential metaphorical expression implying a color. They were mostly used in adjectival phrases describing a particular object or event. Therefore, all color terms were ruled out, as well as other terms which indicated some kind of ‘brightness’ or ‘shiny effect’, e. g. the expression , in which the metaphor implies that the sword is very shiny. Unfortunately, approximately eighteen of the items in this list were of this kind, representing brightness of an object, colors of the air, and colors of the earth, of which the latter two seemed ambiguous and impracticable for this study. As mentioned earlier, the translation by Davis is not a complete translation of the wholeShahnameh, as many episodes have been omitted. Therefore, several of the items in the list have occurred only in the sections not translated by Davis; hence, deleting them from the list was inevitable. Many of the terms in the list, unfortunately again, were observed only in the form of similes, and not metaphors; therefore, they could not be applied either. After settling on these thirty-three items, they were sought in aShahnameh software, in order to locate the couplets which contained these terms. The next step was to review each couplet to see which one had an image metaphor of color created with that specific term. For some terms, the frequency of occurrence was very high, e. g. approximately 400 couplets, which caused some difficulties in terms of being highly time-consuming. A minimum of one couplet carrying an image metaphor of color was chosen for each of the thirty-three instances via the Shahnamehsoftware. These examples were then initially located in the translation by Davis, as his is an abridged translation. Regarding this, he states in the Introduction to his book: â€Å"Given the poem’s immense length, some passages have inevitably been omitted, and others are presented in summary form† (Davis, 2007, xxxiv). After determining which of the examples were included in Davis’ translation, one couplet was eventually chosen for each instance, and then the corresponding expression was located in Warner & Warner’s translation. So far, there were thirty-three Persian examples of image metaphors of color, along with their corresponding expressions in the two English translations. These were the steps taken in the data collection stage. The next step was to analyze the collected data, which included determining the translation procedures involved in each of the two translations. The framework applied was Newmark’s (1988b) seven procedures introduced for translating metaphors. The goal here was not just determining which translator applied which procedure(s) and the frequency of each procedure, but also finding out whether any new procedures were applied other than Newmark’s. The study also aimed atdiscovering any possible translation patterns exclusive to each translator. The following three examples were selected as representatives of the collected data in this study. (?. – ?) The night was like jet dipped in pitch, there lent No planet luster to the firmament (Warner & Warner, vol. 3, p. 287) A night as black as coal bedaubed with pitch, A night of ebony, a night on which Mars, Mercury, and Saturn would not rise. (Davis, p. 306) In this ST context, the poet has depicted the scene as though the night has actually covered its face with pitch. Both translators have reproduced the same image in their TTs, thus likening the night to a black stone ( ) that has washed its exterior with pitch. (?. – ) Raised such a dust! But swift as dust they sped Till day’s cheeks turned to lapis-lazuli. (Warner & Warner, vol. 7, p. 67) They rode quickly until the day turned purple with dusk. (Davis, p. 642) The definition provided for is ‘a dark blue stone’; its translation by Emami is ‘lapis-lazuli, azure’. Britannica’s online dictionary definition forlapis-lazuli is ‘a semiprecious stone valued for its deep blue color’. Therefore, the first translator has again reproduced the same image through the same metaphor. The second translator, however, has converted the metaphor to its sense, i. e. the color it represents. ? ? (?. – ) This he said, And heaved a sigh. The colour of his cheek Turned from pomegranate-bloom to fenugreek (Warner & Warner, vol. 6, p. 25) Having said this he heaved a sigh from the depths of his being, and the rosy pomegranate petal turned as pale as fenugreek. (Davis, p. 455) The mental image of this ST metaphor is mapped onto the king’s face, describing the change of color in his complexion. The first translator has interestingly enough converted the metaphor to its sense, which seems rather a rare procedure for a semantic translation. The second translator, however, has reproduced the same image in TT2. 3. 2. Discussion Thirty-three cases of image metaphors of color were identified in theShahnameh and then located in two English translations, i. e. Warner & Warner (1925) and Davis (2007). Afterwards, the procedures applied by each translator in rendering these thirty-three items were identified. The framework chosen was that of Newmark’s (1988a). The analysis of the data showed that Warner and Warner applied five of Newmark’s suggested procedures in translating the specified image metaphors of color. They also presented two cases of wrong translation. In the following table, the procedures applied by Warner & Warner in translating the thirty-three image metaphors of color identified in this study and their frequency of occurrence, along with the corresponding percentages are shown. Table 4. 1. Frequency and percentage of procedures applied by Warner & Warner Procedure| Frequency| Percentage| Reproducing the same image in the TL| 23| 69. 69| Replacing the image in the SL with a standard TL image| 3| 9. 09| Translation of metaphor by simile, retaining the image| 1| 3. 03| Translation of metaphor by simile plus sense| 0| 0|. Conversion of metaphor to sense| 3| 9. 09| Deletion| 0| 0| Translation of metaphor by the same metaphor plus sense| 1| 3. 03| Wrong translation| 2| 6. 06| Total| 33| 100| As evident in this table, Warner & Warner have neither translated any metaphors by simile plus sense, nor deleted any metaphor. The most frequently applied procedure in their translations was the reproduction of the same image in the TL. The translation of the Shahnameh produced by Warner & Warner is a semantic translation, which clearly proves the reason as to why their most frequently applied procedure is the one mentioned above. â€Å"A semantic translation attempts to recreate the precise flavor and tone of the original: the words are ‘sacred’, not because they are more important than the content, but because form and content are one† (Newmark, 1988a, p. 47). The analysis of the data also shows that Davis has applied all seven procedures introduced by Newmark in translating these items. There was no evidence of any wrong translation. The following table presents the frequency of each procedure which was applied and also their percentages. Table 4. 2. Frequency and percentage of procedures applied by Davis Procedure| Frequency| Percentage|. Reproducing the same image in the TL| 12| 36. 36| Replacing the image in the SL with a standard TL image| 3| 9. 09| Translation of metaphor by simile, retaining the image| 3| 9. 09| Translation of metaphor by simile plus sense| 2| 6. 06| Conversion of metaphor to sense| 6| 18. 18| Deletion| 2| 6. 06| Translation of metaphor by the same metaphor plus sense| 5| 15. 15| Total| 33| 100| As indicated in the table, the most frequently used procedure by Davis is also the reproduction of the same image in the TL. He has opted for deletion of the image metaphor of color in two cases. In one of the two cases, his deletion seems to serve the purpose of a more easy-going, reader-friendly text (where the metaphoric elements seem complex or far-fetched to the target audience), whereas in the other case, his deletion seems somehow arbitrary or unjustifiable. The following table compares the two translations in terms of the percentage of procedures applied. P1 through P7 are the seven translation procedures involved in this study, also indicated in the previous table, and WT stands for wrong translation. Table 4. 3. Percentage of the procedures applied by both translators | P1| P2| P3| P4| P5| P6| P7| WT| Total %| W. & W. | 69. 69| 9. 09| 3. 03| 0| 9. 09| 0| 3. 03| 6. 06| 100| Davis| 36. 36| 9. 09| 9. 09| 6. 06| 18. 18| 6. 06| 15. 15| 0| 100| 4. Conclusion Thirty-three cases of image metaphors of color were extracted from theShahnameh and relocated in two English translations, i. e. Warner & Warner (1925) and Davis (2007). The main objective of the study was to determine which translation procedures introduced by Newmark (1988a) for translating metaphors in general were applied by the two above mentioned translators. According to the collected and analyzed data, Warner & Warner applied five of Newmark’s suggested procedures. The two procedures they did not apply at all were deletion and translation of metaphor by simile plus sense. The figures indicated that approximately 70% of the thirty-three cases had undergone Newmark’s first procedure, i. e. reproducing the same image in the TL, which was also considered the most frequently used procedure by Warner & Warner. This is a verification that their translation is indeed a semantic translation, as the objective in this type of translation is to recreate the ST, both its form and its content. This occurs to a great extent through literal/word-for-word translation, which is rather similar to the above- mentioned procedure. Davis, on the other hand, applied all seven of Newmark’s procedures in his translation of image metaphors of color. The most frequently used procedure was again, a reproduction of the same image in the TL (36%). The second aim was to determine whether any new procedures for translating image metaphors of color other than those proposed by Newmark for translating metaphors resulted from this study.

Sunday, September 29, 2019

Psychological Causes of Depression

Psychological Causes of Depression The actual causes of depression are still unknown today but there are a few theories that could help explain them. It is widely believed by psychologists and scientists that all mental disorders are brought about by a complex correlation of psychological, biological, and social factors. A serious loss, chronic illness, relationship problem, work stress, family crisis, financial setback, or any unwelcome life change can ignite a depressive disorder (Psychologyinfo. om). Depression is a serious disorder in the United States and has only become more prevalent among individuals as their lives become more stressful and overwhelming. One theory for the cause of depression is the bio-psycho-social model of causation and is the most commonly recognized theory for the cause of disorders such as depression by professionals. As stated earlier, it consists of a complicated correlation of psychological, biological, and social factors.This can be caused by fluctu ated levels of hormones, which would explain why many people first experience depression during puberty. (Grohol, 2006). The exact causes of depression are vast and unknown. Some types of depression have been found in families from generation to generation, which may possibly suggest that it can be inherited (Grohol, 2006). With that said, major depression seems to be present generation after generation, in some families, but not with a frequency that suggests clear biological causes.Furthermore, it also occurs in people who have no family history of depression (Psychologyinfo. com). This is also found in people with bipolar disorder. A study on family members that belong to particular families of each generation that develop bipolar disorders, has found that those with the illness have a somewhat different genetic makeup than those who do not have the disorder. Nonetheless, not everybody with the genetic makeup that is subjective to bipolar disorder will contract the disorder.Addit ional factors such as stresses at home, work, or school, are also involved in the disorder’s onset (depression-guide. com. , et al. ). An assortment of psychological factors appears to play a part in the susceptibility to these unrelenting types of depression. People who have low self-esteem, are not optimistic, and readily overwhelmed by stress, are prone to depression (Grohol, 2006). More than likely, these psychological factors are completely accountable for other forms of mild and moderate depression, particularly reactive depression.Reactive depression is generally diagnosed as an adjustment disorder during treatment. Social learning factors also demonstrate why psychological complications appear to occur more regularly in family members, throughout generations. For example, if a child is raised in a pessimistic household, in which discouragement is frequent and encouragement is not, the child will establish a vulnerability to depression as well. (Psychologyinfo. com. , et al). Recently, researchers have found that physical changes in the body can be paired with psychological changes as well.Medical ailments such as a cancer, Parkinson’s disease, stroke, heart attack, and hormonal disorders can bring about a depressive illness. This can result in the ill person to feel unconcerned with their health and be unwilling to further care for their physical needs. In addition, any stressful change, financial problems, relationship problems, or serious loss can activate a depressive affair (Grohol, 2006). Depression is a serious growing problem in the United States.Modern science and research is slowly helping to further decipher the disorder to help slow its growth. Over 9. 2 million Americans have major or clinical depression. At an economical standpoint, depression is a major problem and needs to be accounted for, with an estimated $30. 4 billion spent annually on depression related treatments, medication, and diagnostics. Surprisingly, the World Health Organization estimates by the year 2020, depression will be the number two cause of, â€Å"lost years of healthy living,† worldwide.As our populations keeps rising and our economy worsening, we can only hope that Psychologists help diminish the illness of depression. References â€Å"Cause of Depression: different causes of depression. † Depression Treatment, Medication, Help, Symptoms: Anxiety Attacks Depression Test, Types, ADHD Causes. Web. 14 Nov. 2009. . â€Å"Causes of depression. † Psychology Information Online. Web. 14 Nov. 2009. . Grohol, John M. â€Å"The Causes of Depression | Psych Central. † Psych Central – Trusted information in mental health and psychology. 6 Dec. 2006. Web. 14 Nov. 2009. .

Saturday, September 28, 2019

Guest Speakers and Investigation of Lifestyling Case Study

Guest Speakers and Investigation of Lifestyling - Case Study Example On the other hand, unlike most partnerships, the John Lewis Partnership has distinctive HR structure and management because it is employee-owned and among the main aims is guaranteeing happiness for all the members (John Lewis Partnership, 2015). Given Capital Insight’s reputation, the consultancy has been the provider of HR solutions for corporations through excellent ideas on retained contracts, interim support, outsourced services, training design and delivery among other significant areas focusing on personnel management. Moreover, Capital Insight advocates for the Soft and Hard Models of HRM. Despite being a well-established company in the UK, Capital Insight has worked even with small firms providing manageable services at low costs (Capital Insight, 2015). I think the experience of more than two decades has made it easy for the company to understand the UK market and corporations hence their strong reputation and credibility. This is the reason why, unlike other consultancy agencies, Capital Insight can provide services to companies and allow on-going monthly payments. Capital Insight’s persistence on speed, quality and expertise as the main values of performance and achievements makes the provision of the HR services very efficient. However, the culture is the key aspect to the professionals guaranteeing their clients interim support despite the limitations of time (Capital Insight, 2015). Helping the HR departments for large corporations such as Virgin, Siemens or Fins-bury Food Group reflects on the powerful reputation of Capital Insight, which shows that the amount of attention given to reputation determines a company’s success and can become an issue too. I believe Capital Insight’s input in developing standard and strong relationships with the clients facilitates their ability to offer specific services most consultancy agencies overlook such as conflict management.  

Friday, September 27, 2019

On a specific documentary called Two Towns of Jasper - Image Ethics Essay

On a specific documentary called Two Towns of Jasper - Image Ethics - Essay Example The film has however tried to bridge the gap by displaying images to illustrate the widening difference and discrimination between blacks and whites. This paper therefore seeks to explore the image ethics that emerge in Two Towns of Jasper. The paper will also illustrate how the film makers approach and understand their various obligations and responsibilities to their viewers, to those who are featured in the film, to their profession as well as to themselves. Reference is made to the Moral Rights of Subjects in Photographs, Film, and Television by Katz, Gross and Ruby via analyzing Two Towns of Jasper, a documentary film. There are significant ethical issues and concerns that are provoked by the William and Whitney in the film â€Å"Two Towns of Jasper.† These issues arose where the white and black subjects used in the film were affected by the nature of the images displayed to the viewers. Therefore the two filmmakers made ethical considerations that took care of the rights of the subjects as well as those of the viewers of the film or television. The film, â€Å"Two Towns of Jasper,† observes the moral rights of those appearing in it as the subjects. However, the film has been criticized that it presents fake images of the subjects that are somehow embarrassing and intrusive to both the viewers and the film subjects. Some of the image ethics that raise concerns in the â€Å"Two Towns of Jasper† and the documentary include the situation in which the subjects were portrayed in a false light. It appears to the viewers that the subjects may have failed to secure a consent that is completely informed and therefore their images were appropriated. In this film, â€Å"Two Towns of Jasper,† the groups of minority and individuals were represented accurately and fairly. Williams and Whitney observed the peculiar moral obligations of the subjects in the film. This is a clear indication that the filmmakers understand their obligations and res ponsibilities to the subjects as well as to their viewers. By respecting the moral rights and observing image ethics when making the film, it shows that the filmmakers clearly understand well the role of their profession. From my review of the film, â€Å"Two Towns of Jasper,† the concerns and issues of image ethics that are exhibited is the journalistic integrity threat that is probably posed by the software visual editing used by the filmmakers. The type of images displayed in the film also raises concern as they appear so uncertain to the viewers. The minority group is also not presented in an appealing manner which may raise ethical questions among the viewers. It also appears in the film that there has been an erosion of civility and privacy of the minority group, the blacks, in the film. However, the book, â€Å"Moral Rights of Subjects in Photographs, Film, and Television† by Katz, Gross and Ruby, has elaborated these ethical concerns as a breach to the privacy and rights of the subjects. The mentioned authors have also amplified the qualms of image ethics as mistakes committed in darkroom of electronics. The issues of image ethics in the film add to the continuous visual development studies. The anthology in the film, â€Å"Two Towns of Jasper,† has reached into perspectives and discipline beyond any criticism and considers the dilemmas in the visual presentations. Additionally, the filmmakers, Williams and Whitney, have taken into consideration the challenge of observing, to

Thursday, September 26, 2019

Research Analysis Assignment Example | Topics and Well Written Essays - 1250 words

Research Analysis - Assignment Example This paper examines two health researches to point out that researches though, similar in type of industry being studied upon, does not always mean that the studies will utilize similar research methods and that appropriate methods should be a huge consideration to be able to study in depth the external and internal validities of such studies. Keywords: analyze, methodologies, research design, variables, interventions, timeframes, rationale, external and internal validity Research Analysis: A Closer Look at the Methodology of Two Different Health Research Studies Research studies were conducted to determine the cause and effect relationship of each independent variable to its corresponding dependent variables. The aim of these studies is to generate conclusions on the relevance of a certain variable to the samples and to provide evidenced based decision making on the issue at hand (â€Å"Study Design†, n.d.). To further analyze the similarities and differences of the methodolo gies used in the two different health research studies, this paper will look at the research designs, variables, interventions, and timeframes and timing along with its corresponding rationales in methods section of each article as used by the authors. ... ata and clinical data of patients, SCHFI scale a 22-item questionnaire that measures heart failure self-care and MLHF questionnaire that is developed to evaluate the quality of life specifically for heart failure patients. Alpha coefficients used for the study are 0.76 for heart failure self-care and 0.94 for quality of life. Data collection was done by soliciting the approval of the physician and the patients to avoid future ethical problems and the interview process thereafter. Data analysis used was descriptive statistics using SPSS base 16.0 software and considering frequencies, means and reliability estimates as well as bivariate correlations as measurements. The purpose of the study is to determine if there are any statistically significant relationships between heart failure, self-care deficits and quality of life among recently hospitalized heart failure patients. The above study showed that there was a clear link between the research purpose which was to determine if there w ere any statistically significant relationships between self-care and quality of life among recently hospitalized heart failure patients and the study design used which was non- experimental such that the study does not involve a control group but refers only to the cross-section sample of the population (â€Å"Evaluation Design†, n.d.). The link can also be inferred by the use of interview process to obtain the data and by the method of analysis which was through the use of descriptive statistics and the social statistics software (SPSS). The intervention in the study was provided for by the inclusion and exclusion criterion that was well defined in the methodology section. The rationale for the inclusion and exclusion criteria to be well defined in the study is to provide the limitation to

Wednesday, September 25, 2019

Satellite Centers Essay Example | Topics and Well Written Essays - 750 words

Satellite Centers - Essay Example The initial paragraph of the agreement states, â€Å"This Satellite Center will be responsible for establishing a knowledge of and capacity for initiating and supporting accelerated schools for at-risk students in its local school district and to spread this capacity to schools in districts in surrounding areas. The Stanford staff will work with the Satellite Centers to build this capacity and all activities will be geared to that end† (Satellite Center Agreement, 1990). The Satellite Center approaches to Accelerated Schools for a number of reasons. Prominent among these was the desire to get leverage by establishing local capacity and advocacy that would be far more effective with school systems in a specific locality than would be a program operating out of a single national site, We also wanted to try to provide the conditions and incentives for teacher and administrator training programs to transform their activities in conjunction with the hands-on transformation of the schools they would be working with. The Satellite Center Project has a number of objectives (Satellite Center Agreement, 1990) which may be grouped together into three major goals. The first goal of the project is for the Satellite Centers to become the focus for Accelerated Schools training, evaluation and facilitation in their geographic area. They win serve as a vehicle for implementation for many different educational entities desiring to participate in the Accelerated Schools Project. They are expected to provide a forum for the promotion and understanding of accelerated schools through the sponsorship of and participation in conferences and the production of and contribution to publications. Accordingly, Satellite Centers are also expected to revise their teacher education programs to include the Accelerated Schools principles and processes in the curriculum in meaningful ways and to place student observers,

Tuesday, September 24, 2019

Economics - DQ 2 Essay Example | Topics and Well Written Essays - 500 words

Economics - DQ 2 - Essay Example However, the point where marginal cost and marginal revenue intersects represents output which is less than maximum capacity. Thus, there lies inefficiency in production as these firms control the level of supply in order to regulate the prices. This is true in the real world. For example, monopolist firms in developing countries especially those in the provision of public utilities like water and utility set prices too high while controlling quantity. They do not operate in their full efficiency in order to bid up the prices of their goods and services. Thus, most countries where utilities are monopolized are where the highest electricity costs are found. Monopolists take advantage of the situation by using their capacity of influencing price level. Globalization is characterized by the entry of foreign firms in the domestic market and vice versa. This is also a process by which business organizations operate anywhere in order to take advantage of profit opportunities. Globalization is seen as the way of increasing the number of competitors in the market through the entry of new players and the survival of the most efficient ones. Yes, globalization intensifies the market competition in a given country. It is irrefutable that multinationals or huge business organizations operating on three or more markets have gained significant economies of scale and are the most efficient ones. The entry of these players in the domestic market often threatens the local players who are less efficient. Thus, competition heats up as these smaller players cope with the ability of large foreign firms to operate more efficiently and profitably. In so doing, it also tries to safeguard its shares by equipping itself with competencies. Local manufacturers often go beyond their limit. The entry of foreign players pressures them to improve their processes, strengthen their brand image, produce higher quality products, and even double

Monday, September 23, 2019

Southern blotting application Assignment Example | Topics and Well Written Essays - 750 words

Southern blotting application - Assignment Example A labeled DNA sequence is usually an RFLP probe that hybridizes with either a single or multiple fragments of the digested DNA sample after separation by gel electrophoresis resulting to showing a unique blotting pattern attributed to a genotype that is specific to a locus. RFLP probes are usually short, single or low copy genomic DNA or cDNA clones. Application of RFLP probes are usually used in variation analysis such as in paternity tests, ping and diagnosis of hereditary diseases. RFLP probes are also used in genome mapping. RFLPs are detected by using restriction enzyme that can recognize and fragment a sample of DNA where there is a specific short sequence. This step is known as restriction enzyme digestion. Single nucleotide polymorphisms can either create or destroy restriction endonuclease recognition sites therefore affecting the length and the quantity of DNA fragments resulting from restriction enzyme digestion. Agarose gel electrophoresis separates the resulting DNA fragments and transferred to a membrane through a Southern blot procedure. The membrane is a paper like matrix made up of nitrocellulose and usually has a slight positive charge. The fragment lengths that are complementary to the RFLP probes and are considered as alleles in genetic analysis is determined by the hybridization of the membrane to the labeled DNA probe (National Center for Biotechnology Information ). In developing RFLP probes, a methylation sensitive enzyme digests the total DNA thus enriching the library for sequences that are single or low copy expressed. The digested DNA is size fractionated on preparative agarose gel and excision, elusion and cloning into plasmid vector of is done. The digested plasmids are consequently screened for inserts. Total sheared DNA can be used to probe southern blots of the inserts to select clones that can hybridise to single and low copy sequences. Genomic DNA of different genotypes

Sunday, September 22, 2019

Pay Structures, Pay & Merit Assignment Example | Topics and Well Written Essays - 500 words

Pay Structures, Pay & Merit - Assignment Example Executive compensation differs from sales or human resource personnel on the ground that executive compensation involves negotiation between the executive and the employer (Peter, 2002). Thus, it is negotiated and agreed on unlike other employees whose compensations are spelt out in advance. Executive offer letter is more detailed comprising a variety of options such as housing agreements, bonuses, incentives, guaranteed service pack in case of termination of employment, and income protection guarantees in the event of sale or other liquidity event resulting to change in the company administration. All these benefits and variety of options are not available to other employees. Offering of more lucrative salary to executives is made in a bid to attract, motivate, and retain executive officers who have the capability of leading and managing business successfully, link an organization cash incentives with measurable performance align their interests with the company’s’ interests to achieve long-term goals. This has contradicting effects on low paid employees. In some instances, it motivates them to work hard and acquire the executives in order to receive such compensation in future. In other situations, low paid employees are demotivated, arguing that they are the ones who do most of the work, but executives ends up receiving more compensation than them (Worldatwork, 2007). During survival mode, reduction of staff compensation strategy may be preventing layoffs, but an organization may end up losing its top talent. As a human resource manager, I would adopt a pay-for-performance strategy. In implementing this strategy, I would let them be aware that each of them will be compensated with the same amount of monetary value he or she will create for the company, with little basic salary as benchmark. For top management, I will make them realize that their success is counted on how the organization successfully attains its goals (Peter, 2002).

Saturday, September 21, 2019

Global Warming Outline Essay Example for Free

Global Warming Outline Essay Pierre de Fermat was born in Beaumont-de-Lomagne, France in August of 1601 and died in 1665. He is considered to be one of the greatest mathematicians of the seventeenth century. Fermat is considered to be one of the fathers of analytic geometry. Fermat along with Blaise Pascal is also considered to be one of the founders of probability theory. Fermat also made contributions in the field of optics and provided a law on light travel and made wrote a few papers about calculus well before Isaac Newton and Gottfried Leibniz were actually born. Fermats most important work was done in the development of modern number theory which was one of his favorite areas in math. He is best remembered for his number theory, in particular for Fermats Last Theorem. This theorem states that: xn + yn = zn has no non-zero integer solutions for x, y and z when n is greater than 2. Fermat almost certainly wrote the marginal note around 1630, when he first studied Diophantuss Arithmetic. It may well be that Fermat realized that his prove was wrong, however, since all his other theorems were stated and restated in challenge problems that Fermat sent to other mathematicians. Although the special cases of n = 3 and n = 4 were issued as challenges the general theorem was never mentioned again by Fermat. In fact in all the mathematical work left by Fermat there is only one proof. Fermat proves that the area of a right trangle cannot be a square. See more: what is essay format Meaning that a rational triangle cannot be a rational square. In symbols, there do not exist integers x, y, z with x2 + y2 = z2 such that xy/2 is a square. From this it is easy to deduce the n = 4 case of Fermats theorem. The proof of Fermats Last Theorem marks the end of a mathematical era. Since all of the tools which were brought to bear on the problem still had to be invented in the time of Fermat. Judging by the tenacity with which the problem wa for so long, Fermats alleged proof seems likely to have been illusionary. This conclusion is further supported by the fact that Fermat searched for proofs for the cases and , which would have been superfluous had he actually been in possession of a general proof.

Friday, September 20, 2019

Challenges Faced by Managers in the Public Sector

Challenges Faced by Managers in the Public Sector There are different levels of management in the three different sectors of the economy. There are non-managerial employees, first-line managers, middle managers and the top managers. Robbins et al ;( 2009). This essay will critically evaluate the challenges faced by managers in the public sector organisations. The essay will assess the roles of the manager in this sector and the difficulties managers encounter whilst carrying out their duties. The challenges posed by organisational structure and design with an example from the Northampton Borough Council, the issues due to the organisational culture, privatisation of some of the public sector services, the strategic management of the public sector and the complexities due to the constant changing environment in which these organisations operate, and the challenges to managers of the most recent comprehensive budget cuts, will be evaluated in this essay. The typical roles of a manager in any organisation is to organise, lead, plan and control the activities of the people and other resources within it towards achieving the objectives of that organisation; Naylor (2004). The role a manager plays is dependent on the level of management position although each level has its challenges. At the senior level, the managers role is much broader and in depth and it requires creativity and innovativeness; Robbins et al (2009). The senior manager is involved in decision making, strategic management planning and control, the manager, at this level of management is expected to have an understanding of all areas of the organisation to enable sensible handling of any given situation Hanagan;(2008). The role of the manager did not change in the 21st century rather the method of carrying out the above mentioned roles are different, for instance the manager has to organise work differently, communication is more sophisticated such as, the use of internet, mobile telephones and e-mail. In recent times, the management of change is considered as the most important skill of management due to the pace of change in the 21st century Hanagan, (2008).The rapid changes in technology, enormous improvements in communication, the increase in focus on global economy, and the environment are issues to the modern day manager. In addition to the above, the role of the manager in the public sector is challenged by the constant changes in legislation and political policies subject to government in power Hanagan (2008). An organisation is an arrangement which has been set up for a particular purpose. Robbins et al (2009). Different organisations belong to different sectors of the economy. There are three sectors; the public, the private and the third sector such as social enterprises. This three sectors have some common characteristics which are: they all have distinct purpose, each organisation is made up of people, and all create a structure within which the people could carry out their duties Robbins et al(2009). Organisations are grouped as public sector depending on certain factors such as; how much the organisation competes with similar organisations, goods and services are charged indirectly and how much it allows itself to be influenced by demand and supply of goods and services. The less such organisations are influenced by the above factors the more the organisations are considered as public sector organisations Hanagan (2008). Instances of these organisations are; Local Government council, Libraries, the National Police Force, the Defence Ministry, Colleges and Universities. The common features of these organisations are; they are set up to fulfil specific purposes, they are service motivated, they are accountable to many stakeholders and the public, they carry out their duties for the good of the people and they are funded through the use of taxpayers money. Avery important challenge to a manager whether in the public sector or in the private sector is to be aware of their relevant s takeholders and operate the organisation in ways which will yield maximum returns to each stakeholder group Bloisi et al (2007). The public sector organisation has a centralised organisational structure whereby authority and decision making is made at the senior managerial level. Organisational structure is a connected arrangement of positions and work units through which the important tasks of an organisation are subdivided and categorised to form decision centres from where the strategic plans of the organisation are carried out Bloisi et al (2007). Most of these organisations have a Matrix design structure which enables double responsibility and reporting roles with particular projects. Bloisi et al (2007). The managers in the matrix organisation are challenged by the constant need to resolve conflicts due to differences in perspectives and priority Bloisi et al (2007). For instance, the organisational structure of the Northampton Borough Council has over five managerial levels of management. According to Nicole Macdonald, a HR Manager Strategy with the council, one of the challenges they have is getting approval to carry out plans as quickly as possible. The council has about forty-seven councillors through whom decisions are made. These councillors represent different political fronts. Sometimes it is difficult to reach a consensus on certain issues and therefore arriving at a decision is elongated said, Cassie Triggs, a Democratic Chief Executive Services Manager at the Northampton Borough Council. The manager in the private sector will in relation to their organisational structure which is much flatter be able to arrive at a decision much quicker. Private sector organisational structures are designed to embrace the pace of changes in technology and also to survive. Flatter structure allows for incorporation of ideas from almost every employee in the organisation Bloisi et al (2007). The manager in the private sector will be challenged by how to control an employee wh o is working from home and coming to the place of work only one day in a working week Naylor (2004). Included in the challenges encountered by managers in the public sector are challenges due to the cultural beliefs of the organisation. Organisational culture is the way we do things around here Robbins et al (2009). According to Meek (1988), organisational culture could be used as a means to find out how people behave in a complex setting Hanagan, (2008). Organisational culture can be something abstract or peoples perception and experience within an organised setting. According to Stacey, the culture of any group of people is that set of beliefs, customs, practices and ways of thinking that they have come to share with each other through being and working together. Hanagan (2008). According to Handy, there are four major types of organisational cultures; the power culture in which the power and authority is from one person in a central position, the role culture which is labelled as a bureaucracy where the role of the individual specialists are more important than position and power , the task culture is about the activity which is being carried out and lastly the person culture which focuses more on what individuals do in a particular setting Mullins (2005). The challenge of managing cultural change in a public sector organisation will depend on how strong the existing culture is and the weight of the proposed change Hanagan (2008).The difficulty is in bringing about the change. For instance the Further and Higher Education Act which made colleges and higher education in England to become Corporate Bodies Limited by Guarantee indicates that organisational culture can be overtaken by accountability to more prominent stakeholders as the organisation would want to survive Hanagan (2008). The challenge is even more where there is existence of subcultures within the organisation. For decades, Public organisations have been managed by people who have been raised into managerial positions through years of service to the organisation, for instance; football clubs were managed by ex-footballers, and schools were managed by former teachers, local government council by people who were promoted through long years of service Hanagan (2008). There are difficulties faced by managers moving from the private sector to the public sector. The manager from the private sector is more focused on profits and accounting to shareholders, decision making is simplified, there is much flexibility and autonomy, there is power and authority attached therefore, the challenge to the private sector manager moving into the public sector will be changing the profit making, quick decision making mindset, there is less power and authority, no flexibility and autonomy Hanagan (2008). These challenges are not without approaches with which the managers could use to minimise them. For instance, the managers could use the recruitment process to recruit people who will fit into the existing culture, by the method of questioning they are made aware of what is important in the organisation, the induction process, promotion policy, training and development Hanagan (2008). Following the challenges posed by organisational structure, design and culture, are the challenges which managers face with the move of the UK government in the 1980s to privatise some of the services of the public sector when they realised that the costs of providing services were becoming too much, costs were weighing much on National budgets and the motive to make public sector organisations to work more effectively and efficiently Hanagan (2008). The move gave rise to such contractual arrangements as the Public Private Partnership (PPP) and the London underground contractual arrangement which came from a simpler Private Finance Initiative (PFI) which was set up to establish contracts between the local authority controlled London Underground and Tubelines and Metronet Hanagan (2008). Privatisation as defined by Bryan Hurl (1992), is the sale of government owned equity in nationalised industries or other commercial enterprises, to private investors with or without the loss of government control of the organisation. There are three methods which have been used by the government, these are; denationalisation which is the sale of public sector assets, deregulation which is removal of barriers to entry to a previously protected market to allow private enterprises to compete and franchising whereby the public sector provides the finance and the private sector provide the services Hurl (1992). One of the key principles of managing resources to deliver better services is by setting up strong partnerships which means that various departments of the public sector are relying on other public, private and third sector to deliver public services, these organisations, most of the time may have better expertise and better understanding of the needs of the citizens Bourn (2003, p26). The increasing difficulty with which public services are delivered is a challenge. According to the National Audit Office, delivery of public services are no longer the duty of a single department for instance, different organisations are involved in provision of criminal justice such as the police, the crown prosecution service, the forensic Science service and the courts. Changes in economic conditions and unforeseen circumstances could place much demand for public services, for instance, the sudden rise in unemployment during the most recent inflationary period. The volume and value of benefits payment made by the job centre plus or the unexpected foot and mouth disease and its effect to the public requires a good resource management Bourn (2003 p18). Some of the services provided by the public sector organisations are; Defence by the Army, Public Health by the NHS, Direct service delivery agencies which handle payments of benefits, issuing of prescriptions and National insurance numbers, processing of student loans, access to heritage, museums and galleries, developing frameworks for other service providers such as regulation of educational standards, teacher training and social housing, promotion of business opportunities abroad, transport integration, purchasing information technology systems and professional services and others. The challenge to the manager is the ability to coordinate and monitor the different service chains involved in the delivery of public services and also the difficulty in ensuring that resources are channelled appropriately to the provision of the most required service Bourn (2003 p.20) . Strategic thinking, planning and continuous are important in every organisation Bloisi et al (2007). Strategic thinking means being able as a manager to device ways to balance both the human, technical and the limited resources of the organisation and the environmental forces Bloisi et al (2007). The public sector manager has no power and authority, no autonomy and flexibility and therefore may not have as much influence in the decision making as their counterpart in the private sector Hanagan (2008). Strategic management is used in the public sector to find out schedules of activities in the sector which fit into the political agendas taking into consideration the politicians who might be looking for quick returns which they can point to as their successes and achievements Hanagan (2008). This means that the strategic planning has to be short term. There is lack of clarity in relation to what the manager is trying to achieve. There is the constant challenge to the manager in the public sector as to whether you are trying to fulfil your statutory obligation, please the politicians, follow the directions of the board or the people for whom the services were meant for. The manager in the public sector is challenged as he cannot change or alter the system. There are too many stakeholders, interest groups to satisfy in the public sector therefore the manager in this sector has to device different kinds of ways to deliver information to the different groups in the public who believes they have a stake in the public sector, such methods are through, governing bodies, advisory committees, taskforces, public meetings and public announcements Hanagan (2008). The manager in the private sector uses strategic management to review actions, slow down processes and hence make changes where necessary, the manager in the private sector has a profit making mindset and therefore considers product viability, the private secto r manager has power and authority, flexibility and autonomy and therefore decision making is quicker. The private sector manager is accountable to shareholders Bloisi et al (2007). The public sector is funded by the government and the managers are accountable to whichever ruling political party at any given time. According to the National Audit Office, before the 1998 public service agreements, different departments were funded annually with some exception such as the Department of Health, so there was uncertainty as to whether funding will be the same as the previous year or reduced or increased. This was a challenge to managers as there was no certainty with the flow of funds to make long term plans as the private sector with assurance of long term financing. The agreement was set out with the awareness of the aims, ideals and targets of the various departments Bourn (2003 p.20). Assessed so far are internal factors which challenge managers in the public sector however there are certain external factors which managers have to contend with as well. Some of these are; the speed of technology which has affected every process in organisations irrespective of sector, the force of competing interests who are not ordinary rivals to gain customers but those seeking for resources and those trying to make their points to be heard and the fluctuations in social behaviour which starts with movements in peoples expectations and values Bloisi et al (2007). Finally, managers are currently facing challenges due to the recent comprehensive budget cut. There is greater demand for services however there are fewer resources to meet demand. It is morally challenging to managers to prioritize who to help and who not to In conclusion, Suggested approaches from management science which could alleviate some of the challenges are; the systems approach and contingency approach. With systems approach, managers could discuss their departmental needs in terms of the general organisational requirement. The use of this approach requires open communication and the removal of barriers between the individual departments, also the approach shows management consideration of all the systems involved, synergy that is the whole is greater than the sum of its parts, open and closed systems, limits, movements of information, materials and feedback through which the manager could monitor and evaluate progress reports Hanagan (2008). The second recommended approach is the contingency approach. This approach says that different problems requires different ways of solving them it all depends on how much experience the manager has because what might work well in one situation may not work well in another situation Hanagan (2008). Applica tion of this approach requires that the manager recognises several view points, one of which is the pragmatic view point. Pragmatic viewpoint says that no approach is generally acceptable which means that the manager has to check the motives for every action taken for instance, the services being delivered, the availability of equipment required and also the internal and external environment Hanagan (2008).

Thursday, September 19, 2019

It’s Time to Tell the True History of Texas :: Personal Narrative

It’s Time to Tell the True History of Texas When the Bob Bullock Texas State History museum opened in March 2001, it advertised itself as â€Å"The Story of Texas.† It still calls itself the story of Texas in letters chiseled into the top of the building, on its Web site, on signs directing visitors to the museum, and even on the refrigerator magnets you can buy in the gift shop. When I first saw the slogan, I wondered how there could be â€Å"the† story of Texas, since Texas has been culturally diverse throughout its history as a part of Mexico that became a separate nation and later a state. Shortly Texas will have no one group as a majority. I grew up in the Rio Grande Valley, where the great majority of the population, like me, is Mexican American. How was this new museum going to present my story? I had to go and find out.   Ã‚  Ã‚  Ã‚  Ã‚  When I first walked into the lobby, I noticed the large mosaic on the floor but I couldn’t figure out what it depicted. I just saw a campfire and a bunch of wiggly figures. Someone next to me told their kids that they’d be able to see the entire mosaic from the third floor. I decided to wait and do the same.   Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  The first exhibit I saw was the â€Å"It Ain’t Braggin’ if it’s True† (one of my friends told me I had to see the shrine to Lance Armstrong and the rhinestone car). The name of the exhibit didn’t make much sense to me though; aren’t all museum exhibits, especially ones about history, supposed to be true? The big banner in the middle of the room didn’t help much either. It simply said â€Å"Vision† and had a quote about how only those with great vision can see opportunity where others see empty space. Maybe those who have this type of vision get the braggin’ rights?   Ã‚  Ã‚  Ã‚  Ã‚  Texas was never a big empty space. The Spaniards and later the French who came here discovered cultures that were centuries old. But history, and the museum itself, begins with European colonization. The history of Texas, one of the signs says, was shaped by the way the different groups of people who came to Texas responded to the land and to each other. So land, and interaction between different groups of people, would be used a lot in the telling of this story of Texas, I assumed.

Wednesday, September 18, 2019

Free Essays: Antigone and Ismene in Oedipus at Colonus :: Oedipus at Colonus Essays

Antigone and Ismene in Oedipus at Colonus "Behold this Oedipus, --/ him who knew the famous riddles and was a man most masterful;/ not a citizen who did not look with envy on his lot-- see him now and see the breakers of misfortune swallow him!" (Oedipus the King, 1524-1527). Now that Oedipus has lost everything-- his wife, mother, kingdom, and all power-- his existence rests entirely on the aid of his two daughters. However, that dependence is not evenly distributed between Antigone and Ismene. Even though both daughters provide assistance to Oedipus, the relationship that Oedipus has with Ismene is weaker in comparison to the firm and unwavering relationship that he has with Antigone. Oedipus's incompetence is evident from the very beginning of the play, explaining why he relies on Antigone time and again. When they arrive at the sacred grove at Colonus, Oedipus asks Antigone to leave him and find out if anyone lives nearby, and she says that she can see a man approaching. To which Oedipus follows with more inquiries: "Is he coming this way? Has he started towards us?" (I, 30). Even after the stranger leaves, Oedipus cannot tell that he has exited until Antigone tells him so. Antigone also aids Oedipus by warning him that she sees the Chorus approaching. Oedipus, once a great intellectual, is not even capable of responding to a simple request of his name without the aid of Antigone: "My child, what can I say to them?" (ii, 214). Additionally, Oedipus seems to need help with every little move he makes, even for the mere act of being seated: "Help me sit down; take care of the blind man." (I, 21). Luckily for Oedipus, his relationship with Antigone reach es a point where Antigone no longer needs instructions from her father; it is assured that she will help him: "After so long, you need not tell me father" (I, 22). Even though Antigone helps her father with everything, Oedipus's reliance on Antigone seems to weigh greatly on her ability to see for him, emphasizing Oedipus's blindness and impotence, as well as the strength of Oedipus's relationship with Antigone. Oedipus and Antigone have a mutual commitment to each other, supporting the fact that their rapport is greater than the attachment between Oedipus and Ismene.

Tuesday, September 17, 2019

Android Essay

|Google Android |November 15 | | |2011 | |An operating system for mobile devices such as smartphones and tablet computers. Developed by the Open |Operating System | |Handset Alliance led by Google. | | Table of Contents Introduction3 About 4 Architecture7 System Threading11 CPU Scheduling 12 Process States14 Memory Management18 Synchronization Techniques19 Event Handling 20 Security21 Networking22 Evaluation23 Bibliography24 Introduction Since its initial launch on the T-Mobile G1 in October of 2008, Google's Android operating system has evolved rapidly, perhaps more rapidly than any other operating system in recent memory, to become one of the most important and prolific smartphone platforms in the market today. The Android OS is the name of the Linux based operating system owned by Google and supported by the Open Handset Alliance. Android is used as an operating system for devices such as cell phones, tablets and netbooks. Google bought the original developer of the software, Android Inc. , in 2005. Android's kernel (core of the OS) was derived from Linux but has been modified by Google developers. Android is also open source, which means developers can customize the OS for different phones and applications. This is why different phones may have different looking graphical interfaces and features even though they are running the same OS. Android OS is completely open source, which means that developers can use the core OS functions to develop applications, unlike iphone OS which is a closed system. About The version history of the Android operating system began with the release of version 1. 0 in September 2008. Android is a mobile operating system developed by Google and the Open Handset Alliance. Android has seen a number of updates since its original release. These updates to the base operating system typically fix bugs and add new features. Generally, each version is developed under a code name based on a dessert item. The code names were released in alphabetic order: Cupcake, Donut, Eclair, Froyo, Gingerbread, Honeycomb, and Ice Cream Sandwich. Like Apple's Appstore, Google opened its Android market, allowing the apps developers to publish their apps without any restrictions. Unlike Apple's Appstore, Google Android market does not have any restrictions for third party development and will not run an apps approval system. Android is an open source platform. The entire stack, from low-level Linux modules all the way to native libraries, and from the application framework to complete applications, is totally open. More so, Android is licensed under business-friendly licenses (Apache/MIT) so that others can freely extend it and use it for variety of purposes. Even some third-party open source libraries that were brought into the Android stack were rewritten under new license terms. Therefore, every developer has access to the entire platform source code. There are several advantages of the Android OS for developers, besides the fact that it’s completely open source, let’s mention a few: Advantages [pic] †¢ The entire Application framework can be reused and replaced by selective components Wi-Fi network applications support (Depends on hardware) †¢ Dalvik[1] virtual machine enhances the power management systems †¢ Supports 2D and 3D graphics †¢ Supports common media file formats †¢ Reliable and enhanced data storage using SQLite framework[2] †¢ Open source Web-Kit Engine-based web-browser †¢ GPS, Navigational compass, Touch-Unlock, and acceleromet er applications support †¢ Androids development environment includes a device emulator, debugger, performance profiling tool, and an Eclipse IDE plug-in [pic] Logo of Android OS Architecture [pic] The main components of the Android architecture: 1. Applications: These are applications written in Java. Some of basic applications include a calendar, email client, SMS program, maps, making phone calls, accessing the Web browser, accessing your contacts list and others. [pic] 2. Application Framework: This is the skeleton or framework which all android developers has to follow. The developers can access all framework APIs an manage phone’s basic functions like resource allocation, switching between processes or programs, telephone applications, and keeping track of the phone’s physical location. The architecture is well designed to simplify the reuse of components. Think of the application framework as a set of basic tools with which a developer can build much more complex tools. [pic] 3. Libraries: This layer consists of Android libraries written in C, C++, and used by various systems. These libraries tell the device how to handle different kinds of data and are exposed to Android developers via Android Application framework. Some of these libraries include media , graphics, 3D, SQLite, web browser library etc. The Android runtime layer which includes set of core java libraries and DVM (Dalvik Virtual Machine) is also located in same layer. [pic] 4. Runtime Android: This layer includes set of base libraries that are required for java libraries. Every Android application gets its own instance of Dalvik virtual machine. Dalvik has been written so that a device can run multiple VMs efficiently and it executes files in executable (. Dex) optimized for minimum memory. [pic] 5. Kernel – Linux: This layer includes Android’s memory management programs, security settings, power management software and several drivers for hardware, file system access, networking and inter-process-communication. The kernel also acts as an abstraction layer between hardware and the rest of the software stack. pic] The basics of the Android kernel are just like any other monolithic architecture, all services (file system, VFS, device drivers, etc. ) as well as core functionality (scheduling, memory allocation, etc) are a tight knit group sharing the same space. The kernel of this system is both a hybrid and a monolithic modular design. It is br oken down into five major subsystems: †¢ Process Scheduler: (SCHED) responsible for controlling process access to the CPU. The scheduler enforces a policy that ensures that processes will have fair access to the CPU, while ensuring that necessary hardware actions are performed by the kernel on time. Memory Manager: (MM) permits multiple processes to securely share the machine's main memory system. In addition, the memory manager supports virtual memory that allows Linux to support processes that use more memory than is available in the system. Unused memory is swapped out to persistent storage using the file system then swapped back in when it is needed. †¢ Virtual File System: (VFS) abstracts the details of the variety of hardware devices by presenting a common file interface to all devices. In addition, the VFS supports several file system formats that are compatible with other operating systems. Network Interface: (NET) provides access to several networking standards an d a variety of network hardware. †¢ Inter-Process Communication: (IPC) subsystem supports several mechanisms for process-to-process communication on a single Linux system. System Threading By default, an Android application runs on a single thread[3]. Single-threaded applications run all commands serially, meaning the next command is not completed until the previous one is done. Another way of saying this is that each call is blocking. This single thread is also known as the UI thread because it’s the thread that processes all the user interface commands as well. The UI thread is responsible for drawing all the elements on the screen as well as processing all the user events, such as touches on the screen, clicks of the button, and so on. Threads may suspend themselves or be suspended either by the Garbage Collector (GC), debugger or the signal monitor thread. The VM controls all the threads through the use of a internal structure where all the created threads are mapped. The GC will only run when all the threads referring to a single process are suspended, in order to avoid inconsistent states. CPU Scheduling The Linux kernel uses the Completely Fair Scheduler (CFS), which has the objective of providing balance between tasks assigned to a processor and applies fairness in the way that CPU time is assigned to tasks. This balance guarantees that all the tasks will have the same CPU share and that, each time that unfairness is verified, the algorithm assures that task rebalancing is performed. Although fairness is guaranteed, this algorithm does not provide any temporal guarantees to tasks, and therefore, neither Android does it, as its scheduling operations are delegated to the Linux kernel. Android uses its own VM named Dalvik (see footnote 2), which was specifically developed for mobile devices and considers memory optimization, battery power saving and low frequency CPU. It relies on the Linux kernel for the core operating system features such as memory management and scheduling and, thus, also presents the drawback of not taking any temporal guarantees into consideration. [pic] In terms of execution, the algorithm works as follows: the tasks with lower virtual runtime are placed on the left side of the tree, and the tasks with the higher virtual runtime are placed on the right. This means that the tasks with the highest need for the processor will always be stored on the left side of the tree. Then, the scheduler picks the left-most node of the tree to be scheduled. Each task is responsible for accounting the CPU time taken during execution and adding this value to the previous virtual runtime value. Then, it is inserted back into the tree, if it has not finished yet. With this pattern of execution, it is guaranteed that the tasks contend the CPU time in a fair manner. Another aspect of the fairness of the algorithm is the adjustments that it performs when the tasks are waiting for an I/O device. In this case, the tasks are compensated with the amount of time taken to receive the information they needed to complete its objective. [pic] Since the introduction of the CFS, the concept of scheduling classes was also introduced. Basically, these classes provide the connection between the main generic scheduler functionalities and the specific scheduler classes that implement the scheduling algorithms. This concept allows several tasks to be scheduled differently by using different algorithms for this purpose. Regarding the main scheduler, it is periodic and preemptive. Its periodicity is activated by the frequency of the CPU clock. It allows preemption either when a high priority task needs CPU time or when an interrupt exists. As for task priorities, these can be dynamically modified with the nice command and currently the kernel supports 140 priorities, where the values ranging from 0 to 99 are reserved for real-time processes and the values ranging from 100 to 139 are reserved for normal processes. Process States The order in which processes are killed to reclaim resources is determined by the priority of the hosted applications. An application’s priority is equal to its highest-priority component. Where two applications have the same priority, the process that has been at a lower priority longest will be killed first. Process priority is also affected by interprocess dependencies; if an application has a dependency on a Service or Content Provider supplied by a second application, the secondary application will have at least as high a priority as the application it supports. All Android applications will remain running and in memory until the system needs its resources for other applications. A process has five different states. [pic] †¢ Active Processes Active (foreground) processes are those hosting applications with components currently interacting with the user. These are the processes Android is trying to keep responsive by reclaiming resources. There are generally very few of these processes, and they will be killed only as a last resort. Active processes include: o Activities in an â€Å"active† state; that is, they are in the foreground and responding to user events. You will explore Activity states in greater detail later in this chapter. Activities, Services, or Broadcast Receivers that are currently executing an onReceive event handler. o Services that are executing an onStart, onCreate, or onDestroy event handler. †¢ Visible Processes Visible, but inactive processes are those hosting â€Å"visible† Activities. As the name suggests, visible Activities are visible, but they aren’t in the foreground or responding to user events. Thi s happens when an Activity is only partially obscured (by a non-full-screen or transparent Activity). There are generally very few visible processes, and they’ll only be killed in extreme circumstances to allow active processes to continue. Started Service Processes Processes hosting Services that have been started. Services support ongoing processing that should continue without a visible interface. Because Services don’t interact directly with the user, they receive a slightly lower priority than visible Activities. They are still considered to be foreground processes and won’t be killed unless resources are needed for active or visible processes. †¢ Background Processes Processes hosting Activities that aren’t visible and that don’t have any Services that have been started are considered background processes. There will generally be a large number of background processes that Android will kill using a last-seen-first-killed pat- tern to obtain resources for foreground processes. †¢ Empty Processes To improve overall system performance, Android often retains applications in memory after they have reached the end of their lifetimes. Android maintains this cache to improve the start-up time of applications when they’re re-launched. These processes are routinely killed as required. State Diagram [pic] Memory Management Android’s process and memory management is a little unusual. Like Java and . NET, Android uses its own run time and virtual machine to manage application memory. Unlike either of these frameworks, the Android run time also manages the process lifetimes. Android ensures application responsiveness by stopping and killing processes as necessary to free resources for higher-priority applications. Each Android application runs in a separate process within its own Dalvik instance, relinquishing all responsibility for memory and process management to the Android run time, which stops and kills processes as necessary to manage resources. Dalvik and the Android run time sit on top of a Linux kernel that handles low-level hardware interaction including drivers and memory management, while a set of APIs provides access to all of the under- lying services, features, and hardware. Synchronization Techniques Regarding synchronization, Android uses its own implementation of libc – named bionic. Bionic has its own implementation of the pthread library and it does not support process-shared mutexes and condition variables. However, thread mutexing and thread condition variables are supported in a limited manner. Currently, inter-process communication is handled by Open-Binder. In terms of real-time limitations, the mechanisms provided by the architecture do not solve the old problems related with priority inversion. Therefore, synchronization protocols such as priority ceiling and inheritance are not implemented. Event Handling In terms of interrupt/event handling, these are performed by the kernel via device drivers. Afterwards, the kernel is notified and then is responsible for notifying the application waiting for that specific interrupt/event. None of the parts involved in the handling has a notion of the time restrictions available to perform its operations. This behavior becomes more serious when considering interrupts. In Linux the interrupts are the highest priority tasks, and therefore, this means that a high priority task can be interrupted by the arrival of an interrupt. This is considered a big drawback, as it is not possible to make the system totally predictable. Security Android has a unique security model, which focuses on putting the user in control of the device. Android devices however, don’t all come from one place, the open nature of the platform allows for proprietary extensions and changes. These extensions can help or could interfere with security, being able to analyze a distribution of Android is therefore an important step in protecting information on that system. Android applications run in a sandbox, an isolated area of the operating system that does not have access to the rest of the system's resources, unless access permissions are granted by the user when the application is installed. Before installing an application, Android Market displays all required permissions. A game may need to enable vibration, for example, but should not need to read messages or access the phonebook. After reviewing these permissions, the user can decide whether to install the application. Networking Android supports connectivity technologies including Global System for Mobile Communications (GSM)[4], Enhanced Data rates for GSM Evolution (EDGE)[5], Integrated Digital Enhanced Network (IDEN)[6], Code division multiple access (CDMA)[7], Evolution-Data Optimized (EV-DO)[8], Universal Mobile Telecommunications System (UMTS)[9], Bluetooth[10], Wi-Fi[11], LTE[12], (Near field communication) NFC[13] and Worldwide Interoperability for Microwave Access (WiMAX)[14]. Evaluation Mobile software development has evolved incredibly over time, giving us the power of not having to carry our laptop everywhere, or waiting to get home to access our networks or documents, 3G and 4G speeds directly on our phones give us that power, making mobile devices the most popular way to stay connected, as speeds are comparable to standard net speeds. Android has emerged as a new mobile development platform, building on past successes and avoiding past failures of other platforms. The android OS is an open source, meaning that is freely available to anyone who wishes to learn it. Google has opened up the software to creativity, because now we all have access to learning the development process. Hackers, coders, and all techy gurus have created a plethora of net-libraries ranging from support groups, forums and websites to further help newbies in the process. Android was designed to empower developers to think creatively by giving them almost absolute power over creating innovative applications. Bibliography Android Developers. Web. 11 Nov. 2011. . Burnette, Ed. Hello, Android: Introducing Google's Mobile Development Platform. Raleigh, NC: Pragmatic helf, 2010. Print. Burns, Jesse. â€Å"DEVELOPING SECURE MOBILE APPLICATIONS FOR ANDROID. † DEVELOPING SECURE MOBILE APPLICATIONS FOR ANDROID (2008). Print. Linux. com | The Source for Linux Information. Web. 11 Nov. 2011. . Maia, Claudio, Luis Nogueira, and Luis Pinho. â€Å"Evaluating Android OS for Embedded Real-Time Systems. † Print. â€Å"Memory Management in Android  « Welcome to Mobile World !!! † Welcome to Mobile World !!! Web. 11 Nov. 2011. . Shevchenko, Aleksey. â€Å"Application Handling of Database Timeouts and Deadlocks – Developer. om. † Developer. com: Your Home for Java and Open Source Development Knowledge. Web. 11 Nov. 2011. . â€Å"White Paper Android by 2012, Android OS, Android SDK. † Upload & Share PowerPoint Presentations and Documents. Web. 11 Nov. 2011. . ———————– [1]A Java interpreter machine, completely optimized for Android platform a nd which is developed to run on low-end memory mobile devices. One of the prominent aspects in Dalvik is its capability to run along an application compilation enhancing the runtime performance of the applications. Dalvik is not exactly, a Java machine, because Dalvik could not read Java code, but consists its own byte code called â€Å"dex† and so the executable files compacted using Dalvik holds the file type name ‘. dex'. Google states that the credit for Androids successful development goes to Dalvik VM, because this type of virtual machine, delivers a good performance over various stages of an application runtime environment, conserving more battery-power during long run of an application. [2] An embedded relational database management system contained in a elatively small (~275 kB) C programming library. The source code for SQLite is in the public domain. [3] Processing of one command at a time [4] A standard set developed by the European Telecommunications Standards Institute (ETSI) to describe technologies for second generation (or â€Å"2G†) digital cellular networks [5] A digital mobile phone technology that allows improved data transmission rates as a backward-com patible extension of GSM. [6] A mobile telecommunications technology, developed by Motorola, which provides its users the benefits of a trunked radio and a cellular telephone 7] A channel access method used by various radio communication technologies [8] A telecommunications standard for the wireless transmission of data through radio signals, typically for broadband Internet access [9] A third generation mobile cellular technology for networks based on the GSM standard [10] Technology standard for exchanging data over short distances (using short wavelength radio transmissions in the ISM band from 2400-2480 MHz) from fixed and mobile devices, creating personal area networks (PANs) with high levels of security 11] A mechanism for wirelessly connecting electronic devices [12] A preliminary mobile communication standard, formally submitted as a candidate 4G system [13] NFC allows for simplified transactions, data exchange, and wireless connections between two devices in proximity to e ach other, usually by no more than a few centimeters [14] A communication technology for wirelessly delivering high-speed Internet service to large geographical areas