Monday, December 30, 2019

Vocative Definition and Examples in English Grammar

A vocative is a word or phrase used to address a reader or listener directly, usually in the form of a personal name, title, or term of endearment (Bob, Doctor, and  Snookums, respectively). The persons name or term of address is set off in the sentence with vocative commas. In  speech, the vocative is indicated by  intonation, meaning that an  utterance  is usually  accented  or emphasized. The grammar term for a sentence that uses a vocative is called being in the  vocative case (or direct address), and the term itself comes from a Latin word meaning call. Key Takeaways: Vocative When you address someone by name, youre using the vocative case.When you write a sentence with direct address, you set off the name with vocative commas.  When a vocative starts off with you, its likely negative—unless said in a sweet tone of voice. For example, You dork. How to Use the Vocative Case When you use  direct address, by definition you are speaking (or writing) to someone directly. Using a persons name gets his or her attention and can show respect (using a formal title) or emotion (term of endearment or derogatory name). A vocative doesnt have to be a proper noun. It can also be a noun phrase (as in the last example). Mary, do you want to go to the concert with me?Thank you so much, honey, for doing that for me.I dont know what Id do without you, Tim!Well, doctor, whats your conclusion?Professor, I have a question.  Son, we need to talk.Where are you, my little bookworm? Notice that these sentences are in  second  person, as they have  you  in them, or you is understood because of the direct address. Animals and objects can be in the vocative case as long as the sentence is talking directly to them. Darn it, keys, where the heck did I put you?Fido, stop chewing on the couch. Negatives Of course, theres a negative side to terms of endearment. Author Leslie Dunkling describes that in English, they often start off with you as a part of the vocative phrase, in the structure of you adjective noun. Typical realizations of the formula would be: you bloody fool, you bloody swine, you cheeky sod, you dirty bastard, you lying bastard, you old cow, you stupid bitch. Often the adjective is omitted, you bastard, you bitch, you fool being preferred. She also notes, however, that with the right tone and context, these insults can also be terms of endearment or lighthearted. Of course, a vocative phrase doesnt have to start with you to be negative or insulting; it just has to  be in second person.   Get out of my way, jerkface. Setting Off With the Vocative Comma In writing, you set off the name, term of endearment, or persons title with a comma (a vocative comma) at the start or end of a sentence, or with two commas if the name is in the middle of the sentence. In spoken language, theres typically a pause where the comma would be. When to Avoid the Vocative Comma Not every utterance of a persons name or title is direct address. If youre speaking or writing about someone in the third person (he, she, it), thats not vocative case or direct address, and commas arent used to set off the name or epithet. Some of the sentences here are in the first person, but they still use third to refer to the person spoken about. Mary went to the concert with me.I thanked my honey for the help.I dont know what Id do without Tim.I asked the doctor what her conclusion was.  I had a question for the professor.He needed to talk to his son.Where is my little bookworm? Its important to know the distinction because there are times when the lack of a vocative comma in a sentence can create confusion.   Direct address, talking to Kelly: I dont know, Kelly.Not direct address, talking about Kelly: I dont know Kelly.   Careful Use of the Comma Watch out for run-on sentences when using the vocative comma in the middle of a sentence. A name is not a conjunction that can join two independent clauses.   Run-on: Thank you so much, Shelly, I dont know what Id do without you.Correction: Thank you so much, Shelly. I dont know what Id do without you.  Or: Thank you so much. Shelly, I dont know what Id do without you.   Source Dunkling, Leslie. A Dictionary of Epithets and Terms of Address. Routledge, 1990.

Sunday, December 22, 2019

Blake Mycoskie of Toms Shoes Essay Example

Essays on Blake Mycoskie of Toms Shoes Essay The paper "Blake Mycoskie of Toms Shoes" is a perfect example of a business essay.  Toms shoes is a company shoe company that started way back in the year 2006. Its rampant growth has been felt all across the world (Toms, 2013). Today, the company has donated over 2 million pairs of shoes to needy children across the world. The company has recently expanded to include Toms eyewear which aims at helping patients in need to restore sight. Blake’s sympathy for needy children greatly propelled this innovative idea that has transformed into a major business enterprise. Blake appears to be a vivid leader who remains a great inspiration to many young people. His leadership style has significantly contributed to his success (Toms, 2013).Blake has been referred to as a servant leader. Servant leaders are described as those who put the concerns of others first. This type of leadership is driven by the question â€Å"what is best for my followers?’ servant leadership as explain ed by Greenleaf identifies that servant leadership is shaped by five principles (Greenleaf, 1996).First is a concern for people. The concern for others is clear in as far as Blake is concerned. Basis of the formation of the company tells it all. After observing that kids in Argentina stayed without shoes, he was touched greatly and this drove him into considering setting up a shoe company that could look into the needs of such kids (Toms, 2013). Toms Shoes today is shaped by the fact that for every shoe bought, a pair of shoes is donated to a poor child in Africa or Southern America. Blake is involved in travels around the world to deliver these shoe donations. One can argue that his concern has less to do with the employees but rather takes a different angle altogether. Looking back at the company, today Toms Shoes has over 72 employees who run the activities of the company (Toms, 2013). Toms is concerned about the welfare of the employees and this is what has significantly built t he status of the company.Stewardship is another principle that Blake has successfully integrated into his leadership. His social responsibility has greatly impacted his success. The company’s social responsibility was recognized in 2009 when he was awarded the ACE Award by Hillary Clinton. Through a demonstrated understanding of other people’s needs, Toms Shoes has shown a great impact on society by donating shoes and helping needy people with eyes problems (Bennis Nanus, 1997).Equity and justice is the third principle that has defined Blake’s leadership. This regards to fairness in office management that is a paramount characteristic that brings harmony in the working environment. Toms Shoes company employees have given information that regards to how Blake treats them in equity. He demonstrates no biasness in management a thing that has seen employees remain greatly motivated (Farling, Stone, Winston, 1999).The fourth principle is indebtedness. This refers t o positive expectations that employees expect from their leaders. Leaders need to positively impact on their employees (Greenleaf, 1996). Self-understanding is the last principle that is associated with servant leadership. Blake understands and makes appropriate changes in the work environment to suit the need of the employees. These principles have far-reaching effects and have increasingly resulted in the great success of his enterprise (Gonzaga University Greenleaf, 2005).ReferencesBennis, W., Nanus, B. (1997). Leaders: Strategies for taking charge. New York: HarperCollins Publishers.Farling, M. L., Stone, A. G., Winston, B. E. (1999). Servant leadership: Setting the stage for empirical research. The Journal of Leadership Studies, 6(1/2), 49-72.Gonzaga University Greenleaf Center. (2005). The International Journal of Servant-Leadership, 1(1), 3-27.Greenleaf, R. K. (1996). On becoming a servant leader. San Francisco: Jossey-Bass, Inc.Toms. (2013). Blake Mycoskie. Retrieved fro m http://www.toms.ca/blakes-bio.

Saturday, December 14, 2019

Technological Advances and their Effects on Media of Art Free Essays

Some people find comfort in being involved in art. For them, their creations are the product of self-expressions that have no other better way of being expressed than through art. Some feel that they connect to the world or to their surroundings and arouse feelings through art. We will write a custom essay sample on Technological Advances and their Effects on Media of Art or any similar topic only for you Order Now There may be some people whose passions center on art. For whatever reasons, art has become one of the areas where changes took place. Particularly, the media of art changed through the many technological advances that were introduced into the public. Art can be defined in many ways. There were traditional and contemporary definitions of art (Adajian). Generally, art refers to creative human endeavors. It also refers to any product of a creative impulse. Although it usually refers to visual arts, art also includes music, plastic arts, performing arts, and decorative arts. Moreover, art has many forms, including music, sculpture, painting, literature, performance art, drawing, and architecture. With the changing times and new technologies, art has included other forms such as conceptual art, computer art, photography, comics, video art, and film (WordIQ). All of these forms of art evolved as the world slowly became modernized. Recent technological advances have also placed great burden on some of the traditional media of art such as pencil and canvas. Many people think that along with hi-tech devices such as computer and camera, the use of pencil, coloring materials, ink or paint would become obsolete. Other technological advances that affected the media of art will be discussed as follows. The Quantel Paintbox The Quantel paintbox, which was launched in 1981, is a computer system which aids in manipulating video and in creating graphics. Through Quantel paintbox, the production of television graphics was further developed and improved. Quantel paintbox can now be run on workstations, unlike before when only hardware can run it. Moreover, professionals use Quantel paintbox up to this day for TV production. It was used extensively in creating artwork for the â€Å"Painting With Light,† which was a 1986 BBC series. Additionally, the Quantel was used in Arte, a European Network which created original TV designs. There were also new designs made for Quantel, namely: the Paintbox, Paintbox gQ, and QPaintbox (BroadcastEngineering). Computer Computer impacted the media of art in such a way that no traditional art media is needed to create art. For instance, with just the mouse, an artist can create cartoons and visual effects, unlike before when artists really must use pencil and paper. Artists before used materials for creating a film and sometimes these materials were unstable. For instance, images were placed in cels, or sheets of clear plastic. To avoid creating brushstrokes, colors must be manually painted from the back of the cel. Artists also used substances such as cellulose nitrate and cellulose acetate during the early 1900s. But today, artists are spared from using materials that decompose (Worth). Moreover, the ease of using computer and saving the works in it is an advantage that traditional medium cannot compete with. An artist can make use of visual or special effects with just a few clicks. A lyricist can write his songs in the computer. There is even software which allows the recording of songs. The invention of the computer has encouraged artists to use it for art purposes. Animation Software We see it on movies. From The Lion King to Bolt. There are even movies where humans and cartoon characters were incorporated as though the world of humans and that of the cartoons are one. Thanks to animation softwares that are of much help, everything can be possible today. The implementation of animation softwares among artists has also affected the media of art in major ways. With these softwares, it is much easier for artists to make animations. However, traditional media of art is still used. For instance, an artist creates a storyboard using pencil before the output can be fed into the computer for further changes or improvements. In another instance, character designs are created first by animators or artists. Then these designs would be produced on Model Sheets (or photographic stats) before distribution to the other artists (Worth). Camera Camera was first invented in 1841 by Joseph Nicephore Niepce. It has evolved from the machine that only takes images from the dark to the high-tech ones today (ShotAddict). With the invention of the camera, photography became the â€Å"in† thing. As time passed by, many more persons added features to the first camera. There was the invention of film, and now there are digital cameras which do not use films. It is also much easier to print out pictures taken by a digital camera. With the appearance of digicams, the traditional cameras slowly become obsolete, although there are still some artist which prefer using ones that they can manipulate Paints From the paints that were used on canvas, now there are paints that can be used for clothing, foils, and specialty papers. With these paints, artists can turn any flat surface into printable surface. These paints have affected paint as a traditional medium of art because now paints are not only limited to paper or canvas (ArtMedia). With the fast paced world, art has been under a lot of changes, particularly in its media. Pencils, markers, paints and the other materials that were used before were now substituted with more hi-tech materials such as computer, camera, and animation softwares. However, despite the technological advances, art has always been there and man continually seek art. How to cite Technological Advances and their Effects on Media of Art, Papers

Friday, December 6, 2019

Examining the Encryption Threat-.com

Question: Should Encryption Technologies be restricted? Answer: Introduction The interest in the encryption originates from the background of technological know-how transforming business. Presently the rise to acquire communications has propagated on the progression of the encryption schemes to be able to protect the integrity of the data because it is been transferred electronically (Ball, Borger and Greenwald, 2013). There are a number of the security services that are involved with the encryption outside the problem of the privacy: confidentiality- that is the assurance which the events involved with the communication possess a distinctive understanding of the message; authentication- the guarantee which the parties required are who they say are. Encryption safeguards our information, specific whenever it is sitting on our computer systems and in the information facilities. This assist it whenever it is being transmitted around the World Wide Web (Ou, Chung, H.Y. and Sung, 2006). The protection of the information is important to everybody. The utilization of the encryption is most effective in case it is ubiquitous along with automatic. The two kind of the encryption that happen to be primarily used are the Https URLS on the browser along with the handset to the tower link for the mobile phone calls (Koops, 2006). The encryption needs to be allowed for everything by the delinquency, rather than a function you may switch on only when you are carrying out something you believe essential and even worth safeguarding (Koops, 2006). Encryption continues to be the most important security preserving technological innovation that is right now there in the world, one which is distinctly suited would be to protect against the bulk surveillance- this really is mainly done by the authorities to be able to manage on their populations in addition to their criminals who are searching for the susceptible victims. Through forcing both to focus on their attacks against individuals, we protect the society (Ou, Chung and Sung, 2006). It is important to n ote that just as much as encryption is important as well as crucial in protection of our data when utilized by the wrong people for instance the criminals the law enforcement officials could become incapable to prevent these people from committing crimes of extraordinary magnitude (Siegfried, Siedsma, Countryman and Hosmer, 2004). Existence of indestructible encryption could render these kinds of methods of the electronic surveillance worthless, even though the law enforcement authorities might intercept on the communication that are created by the criminals they may be not able to decipher on the encrypted messages. In this research I argue as to why the encryption should be restricted. On the first issue as to why encryption should be restricted is to enable that illegal activities are not protected by the strong encryption and that the law enforcement agencies have the access of the data that can be used to fight crime and prevent the acts of terrorism (Scarfone, Souppaya and Sexton, 2007). In some tech industry it has been observed that they are encrypting data with strong encryption such that the companies are not able to access on the information of the customer to comply with the court orders and the warrants from the courts (Ball, Borger and Greenwald, 2013). The regulation of the encryption should require a licensing where only certain firms or individuals who meet the predetermined criteria are allowed to use the encryption. This this means it would allow illegal activities are protected from these encryption and the law enforcement are able to target the individual who break the law (Siegfried, Siedsma, Countryman and Hosmer, 2004). Another issue is that through restricting of the encryption to allow the enforcement officials to regulate on the encryption for the good of the public safety through providing a back door to access the information that is encrypted in the special circumstances (Scarfone, Souppaya and Sexton, M., 2007). over the past it has been observed that criminals are using unbreakable encryption to communicate with one another which renders the methods of the surveillance to be useless, to an extent that the law enforcement officials are not able to intercept the communication that are made between the criminal as they are unable to decipher on the messages that are encrypted (Tavani and Moor, 2001). When there encryption are restricted the law officials are able to monitor on every communication that is made and as result be able to identify criminals that are conspiring to do harm and at the same time protect the public from the danger they pose through their criminal activities (Scarfone, So uppaya and Sexton, 2007). This would be a preventive measure of a criminal activity before it occurred. Another issue for the need of restricting of the encryption would be to control as well as monitor on the strong encryption. According to the policy in the US companies are not allowed to exports the products that has a strong encryption, unless there has been the recovery features, which would allow the government to have access to the encryption keys (Scarfone, Souppaya and Sexton, 2007). The purpose of this would prevent the export of product which may pose threat to the national security. It would allow the organization to secure their own intellectual property from getting into the wrong hands. On a certain level this restriction would protect the information of the company which when fell on the wrong hands could compromise on their operation and their intellectual property rights in case it is stolen by the criminals. The argument against the motion: encryption should not be restricted. First it is important to understand that encryption is intended to protect individuals data from the unwanted access, this is important to every individuals and not the selected few (Ou, Chung and Sung, 2006). Having an encryption has the ability of protecting our data as well as devices from the malicious attackers. What we should ask is that who determines what data is significant and what is not. We as the individuals should be given the opportunity when it comes to determing which of our data that deem important and worthy of being strongly encrypted (Ou, Chung and Sung, 2006). I an m of the opinion that individuals need to maintain some sort of the privacy in this age where we are being constantly tracked through the traffic cams or perhaps through the electronic footprint left on the internet. There is constant exposure of the possibility of personal data falling in the hands of the criminals. Encryption is important particularly in preserving on the individuals privacy, howeve r it should not replace our security (Siegfried, Siedsma, Countryman and Hosmer, 2004). There are limitation as to where encryption does not protect our devices from being hacked, but rather facilitates on the protection of our data which we believe to be important and necessary for our privacy to remain much intact. Conclusion There are various regulations in effect worldwide which relates to the protection of the private and the sensitive data. This can be achieved through the encryption of the data, some of which has focused on the protection of the specific information in the industry. The widespread of the use of the encryption has been a necessary consequence of the revolution of the information. With the coming of the electronic communication on the computer networks, individuals need a way of ensuring the both the conversation and transaction has remained confidential. Nonetheless, as much as these encryption are providing privacy and protection of the data there are being used by the criminals and the terrorists to prevent the authorities from intercepting on their communication. In my view the encryption should be restricted. The reason for restricting on the encryption would to enable the law enforcement to have access and intercept the communication that are made between the criminal as they are unable to decipher on the messages that are encrypted. Moreover, it would make sure that all the illegal activities are not protected by the strong encryption as well as the law enforcement agencies. References Ball, J., Borger, J. and Greenwald, G., 2013. Revealed: how US and UK spy agencies defeat internet privacy and security. The Guardian, 6. Koops, B.J., 2006. Should ICT regulation be technology-neutral?. Ou, S.C., Chung, H.Y. and Sung, W.T., 2006. Improving the compression and encryption of images using FPGA-based cryptosystems. Multimedia Tools and Applications, 28(1), pp.5-22. Scarfone, K., Souppaya, M. and Sexton, M., 2007. Guide to storage encryption technologies for end user devices. NIST Special Publication, 800, p.111. Siegfried, J., Siedsma, C., Countryman, B.J. and Hosmer, C.D., 2004. Examining the encryption threat. International Journal of Digital Evidence, 2(3). Tavani, H.T. and Moor, J.H., 2001. Privacy protection, control of information, and privacy-enhancing technologies. ACM SIGCAS Computers and Society, 31(1), pp.6-11