Thursday, January 30, 2020

Plato Apology Essay Example for Free

Plato Apology Essay The Apology is Plato’s accurate depiction of the Socrates’ own defense at the trial provoked by Meletus. However, besides current accusers, Socrates has to speak out to defense against former accusers who have created prejudices of him for long time. Former accusers prosecute Socrates for â€Å"studying things in the sky and below the earth† and â€Å"[making] the worse into the stronger argument† (Plato 18b-c). Moreover, Meletus, who is one of recent accusers, charges Socrates of â€Å"[corrupting] the young and not believing in the gods in whom the city believes, but in new spiritual things† (Plato 24c). The dialogue between Socrates and the jury as well as Meletus describes the true personality of Socrates and answers the question if Socrates is guilty or innocent of those charges. First, Socrates is accused of studying â€Å"things in the sky and things below the earth† (Plato 23d). In this time period, Athenian people believe that gods are the ones who create and rule the world. Everyone must believe in and worship with no doubt. Therefore, if anyone tries to study and explain matters in terms of natural phenomenon instead of religious belief, he or she is immediately charged of not believing in gods and receives punishments from whole society. In this case, older accusers believe that what Socrates is doing is as same as other philosophers who trying to oppose religious belief and negatively impact the society. This is reflected by the comedy of Aristophanes depicting Socrates as a person who has ability to â€Å"walk on air† and present â€Å"a lot of other nonsense† matters (Plato 19c). However, Socrates proves that he is not that type of person and he does not have any knowledge of those matters by saying â€Å"I do not speak in contempt of such knowledge† and asking if anyone has ever heard him discussing about these subjects (Plato 19d). In fact, Socrates’ occupation is a wisdom searcher who dedicates his life to find wise men and to discuss about virtues (Poage). Therefore, the first accusation is not true, and Socrates is not guilty because Socrates does not â€Å"[study] things in the sky and things below earth† to oppose the trust of gods. Second, the earlier accusers prosecute Socrates for â€Å"[making] the worse into the stronger argument† as many Sophists do (Plato 18b-c). The accusers claim that Socrates is one of many Sophists who are â€Å"very good speakers. Indeed, they [have] reputations for being able to convince a crowd that up [is] down, that day [is] night, that the wrong answer could be the right answer, that good [is] bad and bad is good, even that injustice is justice and justice would be made to appear as injustice† (Pecorino). Furthermore, Sophists are paid for delivering speech and only care about winning debates and lawsuits more than anything else. Thus, most of them are feared and hated by Athenian people. Nevertheless, Socrates distinguish himself from Sophists by giving evidence that he â€Å"live[s]in great poverty because of [his] service to the god† (Plato 23b). While Sophists such as Gorgias of Leontini, Producs of Ceos, and Hippias of Elis charge fee for their services, Socrates never asks or receive money from anyone whom he approaches and asks questions regarding to wisdom and virtue. Unlike Sophists who are wealth and famous, Socrates is so poor because of his free service. In addition, Socrates’ intention is to help other people understand virtue and become wiser rather than teaching them how to become good speakers as Sophists do. Therefore, Socrates is not guilty of â€Å"[making] the worse into the stronger argument† (Plato 18b-c). Another charged brought by later accusers against Socrates is â€Å"corrupting the young† (Plato 23d). Socrates teaches his young men be wiser and think about themselves. This annoys the Athenian government and officials because they think those young could break the laws and create rumor among the society. Hence, Meletus prosecutes Socrates for teaching the young to go against the government and emphasizes that all the Athenians make the young become better except Socrates (Plato 25b). In order to reverse that accusation, Socrates uses example of horse breeders who are trained and have experience to take care of horses and make them better while the majority lacking of skills and knowledge cannot. As a result, it is impossible for all the Athenians to know what benefits the young. Only Socrates who has knowledge and skills is able to teach the best for the young. Moreover, Socrates indicates that no one wants to harm oneself; neither does Socrates. If he intentionally corrupts the young, he is putting himself at risk because â€Å"the wicked people do some harm to their closest neighbors while good people do them good† (Plato 25e). Therefore, it is impossible for Socrates to teach the young in the way to harm him. After Socrates disproves Metelus’ charge, he criticizes Metelus’ prosecuting procedure. If Socrates harms the young unintentionally, Metelus has to â€Å"get hold of [Socrates] privately, instruct and exhort [Socrates]† (Plato 26). In contrast, Meletus brings Socrates straight to the court â€Å"where the law requires one to bring those who are in need of punishment, not of instruction† (Plato 26). As a result, Socrates again shows that he is not guilty. The last accusation brought against Socrates is â€Å"not believing in the gods in whom the city believes, but in other new spiritual things† (Plato 24c). In order to prove that Socrates does not trust in gods, Meletus states that Socrates â€Å"says that the sun is stone, and the moon earth† (Plato 26d). If Socrates does say this statement, he denies the presence of Apollo the god of the sun and the presence of Selene the goddess of the moon. Nevertheless, Socrates claims that Anaxagoras of Clazomenae is actually the one who said those matters. Moreover, Socrates catches Meletus’s contradiction when he claims that Socrates does not trust in gods. To make Meletus admit his contradiction, Socrates asks Meletus â€Å"[d]oes any man believe in spiritual activities who does not believe in spirits? † and Meletus answers there is no one (Plato 27c). Socrates believes in the Oracle of Delphi which is related to spiritual activities, and everyone in Athens including Meletus knows that. This means that Meletus agrees that Socrates also believe in spirits which are â€Å"either gods or the children of gods† (Plato 27d). Now, Meletus contradicts himself by saying Socrates believe in gods. Consequently, Socrates successfully shows Meletus’s false and prove that he not guilty of the charge. In conclusion, Socrates is not guilty of the charges from the earlier accusers as well as the recent ones. Socrates provides many evidences and uses his excellent argument skill to prove that he is innocent, but the jury still is not convinced and sentences him to death. What Socrates does is not harmful to anyone in Athens; he only try to question about wisdom and discuss about ethics in order to find the answer for the Oracle. Socrates teaches his students to realize that they are not wise as they thought and show them the way to better themselves by seeking more wisdom. Unfortunately, jealous people and conservative culture does not understand his divine destiny and fallaciously accuse him like a criminal. Works Cited Pecorino, Philip A. An Introduction to Philosophy: An Online Textbook. Study Web. n. d. Web. 13 July 2013. Plato. Five Dialogues: Euthyphro, Apology, Crito, Meno, Phaedo. 2nd ed. Indianapolis: Hackett Publishing Company, Inc. , 2002. Print. Poage, Nathan. Apology Outline. Behavioral Social Sciences Department. Houston Community College. n. d. Web. 13 July 2013.

Wednesday, January 22, 2020

Value of Health Care Essay -- United States Healthcare

The Value of Health Care The development of value based healthcare reimbursement systems between healthcare payers and healthcare providers is evolving from the need to provide patients with beneficial healthcare technologies under conditions of significant economic uncertainty. The concept examined centralizes on shifting the focus of the healthcare system from volume to value. Value is measured by outcomes achieved based on a full cycle of care not volume of services rendered based on each service performed. Summary of Article The article chosen for this assignment was published on December 23, 2010 in the New England Journal of Medicine (Porter, 2010). The author, Porter (2010) examines the role of value in the healthcare system in the United States. According to Porter (2010) â€Å"Value should define the framework for performance improvement in healthcare.† Porter indicates that value in healthcare should be measured by outcomes achieved not the volume of services rendered. According to Porter (2010), â€Å"The proper unit for measuring value should encompass all services or activities that jointly determine success in meeting a set of patient’s needs. Posistive and Negative Affects, Cost, Quality, Access, Trade-offs The national pay for value based system development has positive and negative aspects. System implementation will require multiple entity participation. Hospitals, physicians, outpatient centers, and clinics all will be responsible for collaboration in developing an integrated communication system which will present additional expense on the front end. Government mandates will be required; from implementation dates to specified circumstances in which assistive funding may be available. Multi provider ... ...g outcomes are important actions towards improving outcomes. True reform will require both moving toward restructuring the care delivery system and a national system of consistency, regulation and payment. References Lee, T.H. (2010). Putting the value framework to work. New England Journal of Medicine. 363:2481-2483 Porter, M.E., (2010). What is the value in healthcare? New England Journal of Medicine. 363:2477-2481 Porter, M.E., (2009) A strategy for helath care reform – Toward a value-based system. New England Journal of Medicine. 361:109-112 Carlson, J.J., Sullivan S.D., Garrison, L.P., Neumann, P.J., Veenstra, D.L. (2010). Linking payment to health outcomes: A taxonomy and examination of performance-based reimbursement schemes between healthcare payers and manufacturers. Health Policy, 96(3), 179-190. doi: 10.1016/j.healthpol.2010.02.005

Tuesday, January 14, 2020

God-given attributes Essay

The 19th century held some of the very best traditions and practices the United States had. Yet, some of them today are not existent anymore due to the fact that the concept of the â€Å"American Dream† is slowly fading from the recesses of our very consciousness. If we are to examine the art of the late 19th century, we can observe that the paintings project an old fashioned way of American life, where people do what is right and honorable; a peaceful way of life. It is a life full of hopes and dreams that the American people will work and progress further together into the future. Each individual, as a free man, can do what he can with his God-given attributes. The concept of the â€Å"American Dream† has changed so much to the extent that the perception nowadays is that financial stability is the gauge of living this dream. Working parents are always scampering out of their homes in search of monetary gain, leaving their kids behind to care for themselves. This effectuates circumstances of broken homes, where children are neglected and not taught the honest ways of life; thus, they grow as individuals lacking good character traits. This eventually leads to the erosion of the American society; the breaking down of the social structure based on the â€Å"American Dream† concept. If we are to retain the things that make us good Americans, then we have to compromise with ourselves and with our fellow man for the benefit of everybody. Development is not at all bad; yet, we have to integrate some of the fine old-fashioned ways of the 19th century with that of the present in order to alleviate the effects brought upon by some of the destructive ways of present living.

Monday, January 6, 2020

Barnard College Acceptance Rate, SAT/ACT Scores

Barnard College is a private womens college with an acceptance rate of 14%. Founded in 1889, and located on a four-acre urban campus in Manhattan, New York, Barnard College is one of the original  Seven Sisters  colleges. Barnard is affiliated with the adjacent  Columbia University, but maintains its own faculty, endowment, governance, and curriculum. However, Barnard and Columbia students can easily take classes at either school. Considering applying to this highly selective school? Here are the Barnard admissions statistics you should know. Acceptance Rate During the 2017-18 admissions cycle, Barnard College had an acceptance rate of 14%. This means that for every 100 students who applied, 14 students were admitted, making Barnards admissions process highly competitive. Admissions Statistics (2017-18) Number of Applicants 7,897 Percent Admitted 14% Percent Admitted Who Enrolled (Yield) 55% SAT Scores and Requirements Barnard College requires that all applicants submit either SAT or ACT scores. During the 2017-18 admissions cycle, 58% of admitted students submitted SAT scores. SAT Range (Admitted Students) Section 25th Percentile 75th Percentile ERW 670 740 Math 660 760 ERW=Evidence-Based Reading and Writing This admissions data tells us that most of Barnards admitted students fall within the top 20% nationally on the SAT. For the evidence-based reading and writing section, 50% of students admitted to Barnard scored between 670 and 740, while 25% scored below 670 and 25% scored above 740. On the math section, 50% of admitted students scored between 660 and 760, while 25% scored below 660 and 25% scored above 760. Applicants with a composite SAT score of 1500 or higher will have particularly competitive chances at Barnard. Requirements Barnard does not require the SAT writing section or SAT Subject tests. Note that while Barnard requires applicants to submit all scores and does not participate in the scorechoice program, the admissions office will consider your highest score from each individual section across all SAT test dates. ACT Scores and Requirements Barnard requires that all applicants submit either SAT or ACT scores. During the 2017-18 admissions cycle, 51% of admitted students submitted ACT scores. ACT Range (Admitted Students) Section 25th Percentile 75th Percentile English 32 35 Math 27 32 Composite 30 33 This admissions data tells us that most of Barnards admitted students fall within the top 7% nationally on the ACT. The middle 50% of students admitted to Barnard received a composite ACT score between 30 and 33, while 25% scored above 33 and 25% scored below 30. Requirements Note that Barnard does not superscore ACT results; your highest ACT score will be considered. Barnard College does not require the ACT writing section. GPA Barnard College does not provide data about admitted students high schoolGPAs. Self-Reported GPA/SAT/ACT Graph Barnard College Applicants Self-Reported GPA/SAT/ACT Graph. Data courtesy of Cappex. The admissions data in the graph is self-reported by applicants to Barnard College. GPAs are unweighted. Find out how you compare to accepted students, see the real-time graph, and calculate your chances of getting in  with a free Cappex account. Admissions Chances Barnard College has a highly competitive admissions pool with a low acceptance rate and high average SAT/ACT scores. However, Barnard has a  holistic admissions process involving other factors beyond your grades and test scores. A  strong application essay, short answer essay, and  glowing letters of recommendation  can strengthen your application, as can participation in meaningful  extracurricular activities  and a  rigorous course schedule. Students with particularly compelling stories or achievements can still receive serious consideration even if their test scores are outside of Barnards range. While not required, applicants can participate in an optional interview either on or off-campus. In the graph above, the blue and green dots represent accepted students. Youll notice that most admitted students had A averages, combined SAT scores over 1300 (ERWM), and ACT composite scores of 28 or better. Many applicants had 4.0 GPAs. If You Like Barnard College, You May Also Like These Schools Tufts UniversityVassar CollegeBoston CollegeSwarthmore CollegeNorthwestern UniversitySmith CollegeBryn Mawr CollegeMount Holyoke College All admissions data has been source from the National Center for Education Statistics and Barnard College Undergraduate Admissions Office.

Sunday, December 29, 2019

Famous Inventions History of the Bulldozer

Some historians give credit to an American named Benjamin Holt for inventing the first bulldozer in 1904, and originally calling it a caterpillar or a crawler tractor. However, this would be misleading. Benjamin Holt Did Not Build a Bulldozer Expert Deas Plant from the Gold Coast, Queensland, Australia commented that Benjamin Holt developed an endless chain tread for his steam traction engine at the end of 1904. At around the same time, the Hornsby company of England converted one of its wheeled steam traction engines ​to a tracklayer [crawler] format based on a patent granted to their chief engineer. Neither of these developments was a bulldozer, both were purely and simply track-laying traction engines. However, the Hornsbys version was closer to the bulldozers we know today in that it was steered by controlling power to each track instead of having a tiller wheel out in front of the tracks as Holts machines did. Hornsby sold their patents to Benjamin Holt around 1913-14.​ First Came the Bulldozer Blade It is not certain who invented the first bulldozer, however, the bulldozer blade was in use before the invention of any tractor. It consisted of a frame with a blade at the front into which were harnessed two mules. The mules would push the blade into a heap of dirt dumped by a cart and spread the dirt or push it over a bank to fill a hole or gully. The fun part came when you wanted the mules to back up for the next push. Definition of a Bulldozer The term bulldozer technically refers only to a shovel-like blade, over the years people have come to associate the term bulldozer to the entire vehicle both blade and crawler tractor combined. Deas Plant added that There is also some debate about who first fitted a bulldozer blade to a track-laying tractor, perhaps the La Plante-Choate company, one of the early manufacturers of bulldozer blades. Again, there are various claimants for the title of first to fit a power control to one of these bulldozer blades with Robert Gilmour Le Tourneau probably being the leading contender. The Caterpillar Tractor Company The name caterpillar was coined by a photographer working for Benjamin Holt who was taking photos of one of Holts track-laying or crawler tractors. Looking at the machines upside-down image through his camera lens, he commented that the top of the track undulating over its carrier rollers looked like a caterpillar. Benjamin Holt liked the comparison and adopted it as the name for his track-laying system. He was using it for some years before the formation of the Caterpillar Tractor Company. The Caterpillar Tractor Company was formed by the merger of the Holt company and their major competitor, the C. L. Best Gas Tractor Co., in August 1925. What Do Bulldozers and Bulls Have in Common? It appears that the word bulldozer came from the habit of stronger bulls pushing their lesser rivals backward in not-so-serious contests of strength outside of the mating season. These contests take on a more serious note during the mating season. According to Bulldozers written by Sam Sargent and Michael Alves: Around 1880, the common usage of bull-dose in the United States meant administering a large and efficient dose of any sort of medicine or punishment. If you bull-dosed someone, you gave him a severe whipping or coerced or intimidated him in some other way, such as by holding a gun to his head. In 1886, with a slight variation in spelling, a bulldozer had come to mean both a large-caliber pistol and the person who wielded it. By the late 1800s, bulldozing came to mean using brawny force to push over, or through, any obstacle.

Saturday, December 21, 2019

The Modern University System Essay - 1307 Words

The modern university system as a whole is an exploitative, capitalist construction. Those within it, whether they be undergraduate or graduate students, tenured or nontenured professors, researchers, etc. To exist within the university system and survive, one is essentially placed in a system that very closely resembles the free market economy of the United States. Academia exists to make one successful in whatever career path one chooses, including careers in the academic world. Specific to academic careers, a cycle of oppression and exploitation of labor exists to prevent any one person from getting too successful, lest they challenge the system and destroy it. Academia forces its participants to work in a very individualistic, neoliberal manner which encourages exploitation of other participants and perpetuates abusive labor practices, all in an effort to preserve a structure which encourages the professionalization of knowledge. And despite being detrimental in various ways to a ll involved, no one, whether due to inability or unwillingness, makes motions to break down the system because of how completely encapsulating and powerful the university has become. In order to succeed in an academic career, one must succeed in academic publishing. The length of the published works section of one’s resume determines one’s job offers, promotions, pay scale, ability to receive grants, and ability to receive tenure. However, as one eventually goes through the academic system of theShow MoreRelatedSince its birth Pakistan has been attached Capitalism in almost all aspects. From the education1700 Words   |  7 Pageslevel to the university level, it is all influenced by the concept of modernity. This is only deteriorating the new generation because by this type of education system the youngsters are not being educated (mainly) but they are being materialist at the first place. As far as the pure Pakistani traditions are concerned, it teaches the youngsters to be respectful, it teaches them respect, honor, dignity, family values, religious values and a lot more. But by acquiring this type of modern education theRead More Middle Ages Essay712 Words   |  3 PagesMiddle Ages The history of the modern world derives from thousands of years of human history. Embedded in its history are the many eras of man which have constructed our modern learning, art, beliefs, and order. The middle ages, although represented as â€Å"dark†, backwards, and idle, were in fact a bridge linking the classical and modern world. Medieval society may not have been in a sense glorious, but the era of itself was a prime foundation of the modern world’s newfound stability, a revivalRead MoreEgyptian Higher Education Essay1229 Words   |  5 Pagesdecadence in quality of education services, non improved systems; in addition, the absence of democratic culture either in society or in institutions responsible for educational making decisions.(Elsadda 9-13 feb 2008) The need for establishing a national university has come as a result of raises from national figures such as Mustafa kamed and saad zagloul, the idea behing that was to make this university leads the nation into the modern world and to become a source for enlightenment in the societyRead MoreData Collection Of Hejing County And A Laboratory Analysis Phase At Washington University1728 Words   |  7 PagesHejing County and a laboratory analysis phase at Washington University in St. Louis. Phase 1 - Data collection (April 2017): My local collaborator Xin Wang and I will work at MGK for a week to collect nine OSL samples from MGK1, MGK2, and MGK6 and a soil column from a natural profile near MGK. After the completion of our fieldwork, I will ship all newly acquired OSL samples together with other OSL samples collected in 2016 to the University of Georgia Luminescence Dating Laboratory. Additionally, IRead MoreComparison Between American And Chinese Higher Education1624 Words   |  7 Pagesdifferent system of higher education.We will research the commons and differences of higher education between China and America.It not only puts forward the differences of the higher education system between China and America,but also analyze the social environment,schools and teachers resources and attitude of the country government. Key words: Comparison, Higher education, American, China, Common, Differences A:Introduction of American Higher Education in the 21th Century 1.The system of AmericanRead MoreEducation And Its Impact On Education1706 Words   |  7 Pagesrespectful life in the society. This is because education offers a setting in which culture and values of a society are developed. Education in modern society provides a forum where the society examines its issues and identifies solutions. The advancement of a society both economically and socially is by gaining education which consequently enables them to run a modern society. The events and actions that had occurred in past based on education led to an economic growth in Japan, Germany free education Read MoreCollegiate Education Is An Integral Part Of The Formation Of Future Successful Adults1487 Words   |  6 Pagesstyle of education that is received by college students is lecture-based. A professor stands in front of a large classroom presented various facts with little to no participation by students. In recent years, however, there has been a shift in some universities towards a more involved, participatory style of teaching that incorporates a discussion-based classroom setting. These classrooms have been noted to lead to a much more diverse and individually successful learner. Students in this type of classroomRead MoreWhich Modern Thinker, Individual, or Leader Has the Greatest Chance of Having a Long-tern Influence?1627 Words   |  7 PagesThe modern era, which encompasses the period between the climax of the nineteenth century and the beginning of the twenty first century, has been a prosperous time for the fields of innovation, which may be composed of advances in technology and intangible knowledge. This period of time has included innovations such as the electrical system upon which nearly all homes operate, more comprehensive understanding of the field of astrophysics, advancements in the understanding of atomic theory, and innovationsRead MoreInfluence of Vollmer and Wilson on Modern Law Enforcement1663 Words   |  7 Pagescrime prevention, au thority, professionalism and discretion have evolved in modern law enforcement since the twentieth century. August Vollmer instituted university training as a tool for young officers in training and under Vollmer’s teachings; O.W. Wilson pioneered the use of advanced training for officers and is also known for the start of criminal justice as an academic field. Wilson was also instrumental in applying modern management and administrative techniques to policing. Vollmer’s drive forRead MoreThe Contribution Of The University Of Dhaka Essay1456 Words   |  6 PagesThe University of Dhaka (also known as Dhaka University or simply DU) is the oldest university of modern Bangladesh which was established in 1921. It is called the ‘Oxford of the East’. It is more or less renowned educational institution in South Asia which produced and still producing a large number of great personalities. Some notable alumni of this institution are Fazlur Rahman Khan (pioneer of modern structural engineering), Muhammad Yunus (winner of ‘Nobel Peace Prize’ of 2006, pioneer of ‘microcredit’)

Thursday, December 12, 2019

Contemporary Computing can be seen as an Assemblage

Question: Discuss contemporary computing can be seen as an assemblage? Answer: Introduction This report is based on two top stories in IT. One is the selling out of a human like robot named pepper and the other is about the Bank of England hiring hackers in their system. Hacking is a modern technology that can be used in two ways: for good or to harm others. The recent events of hacking that are mentioned in these two stories can be avoided or minimized with ethical hacking. Few inquiries that digital innovation are changing the method in which we take part in the research process. In all actuality, it is ending up being clearer that investigation is progressively being mediated through automated development. Contemporary computing can be seen as an assemblage means that how modern and latest technologies can work perfectly with the latest technologies. The first story is on a robot that is created to be a friend or companion for the humans. The robot can understand the facial expressions of human. It is designed and programmed in such a manner that it acts like a human. Th e second story is about ethical hacking, though the concept is not that new but it has begun to take a toll on the society. New technologies are helping in making this concept better and advanced. A.N.T An approach to research and social theory originates in the study of science is known as actor network theory. In spite of the fact that it is known mainly for its dubious emphasis on the limit of nonhumans to act or take an interest in networks or systems or both, actor network theory is likewise connected with compelling studies of critical and conventional sociology. Actants: It denotes the non-humans and humans actors. Network: It is undetermined relation among the entities. A.N.T can be used for computing purpose because it is broad and adaptive. In A.N.T, the ideas and concepts can be expanded into precise directions. All the ideas can be collectively used in systems. It helps is assembling all the ideas as a whole. The utilization of ANT has turned out to be valuable keeping in mind the end goal to catch the on-screen characters which are included in the advancement of latest innovation for various reasons. The primary thing is to concentrate on the on-screen character systems as the essential building square for the improvement of the latest innovation. Story 1 An emotional robot named Pepper sold one minute after 1000 units were bought: A robot named pepper made by the company Softbank Robotics was sold out 1 minute just after it was put to sale (Japanese information site for all people who love Japan, 2015). One thousand pieces of this robot was built to display and respond emotions. Each unit cost about 1610 dollars and a monthly fee of 200 dollars has to be paid (Mail Online, 2015). Actants in the story: Robot named Pepper (HUMAN ACTANT): company Softbank Robotics; Customers, Software engineer (HARDWARE ACTANTS) Hardware used for building the robot: 4 microphones, 2 high definition cameras, 3 dimensional sensor, gyroscope in the chest, touch sensors, 2 sonar, 6 lasers, 3 bumper sensors. SOFTWARE ACTANTS: Algorithms, Standards, Computer language used STRUCTURAL ACTANTS: NOT APPLICABLE IN THE STORY CULTURAL ACTANTS: Human like; Presence of various human like emotions How the actants are acting with each other: The robot has a humanoid face and a display on its chest, the robot is mainly designed to empathize and communicate using touch and voice. The software engineers designed the robot named Pepper, with human like capabilities. It is designed using artificial intelligence for bringing out various emotions. ANT can be used in this story to analyze the story according to the behavior of the actants in the story. Pepper is capable to examine facial expressions, words and body language via its sensors; it adapts its mannerisms and behavior to suit the person (Japanese information site for all people who love Japan, 2015). Pepper is a robot designed to detect emotions and respond to it, it is designed to co-exist with humans. The robot can understand various emotions and can analyze the expression of the humans. It is able for self-improvement and adaptation (Mail Online, 2015). It is mainly designed to serve as a companion. It has many sensors att ached to it so that it can detect the emotions and runs with the help of a battery. The robot has a three dimensional camera attached so that it can comply with its surroundings and move safely by avoiding the obstacles on its path. It is build with various speakers and has a screen attached to its chest. The robot was sold out as soon as was put to sale. The users were thrilled to see the functionalities of the robot. How can the robot be used in the business? It is build by Softbank Mobile and Aldebaran robotics. It was designed to act as a companion for the humans. It has the capability to read and identify the emotions of humans. It is an interactive robot and has the ability to talk to the humans. It rather has a very funny voice. It cannot perform any domestic work; instead, it can be used to improve the life of people. It is used to connect with various peoples and have fun with them. Peppers loves to converse with people, it is exceptionally inquisitive about humans (Mail Online, 2015). As one keep on associating with the robot, Pepper will remember and learn latest things about the persons taste. Equipped for both adjustment and self-change, it will soon have the capacity to hunt down new applications. The primary objective of the robot is to develop and learn orderly so that it can be a friend at home. Story 2 Bank of England employs hackers (HUMAN ACTANT) Actants in the story: Ethical hacker; Bank of England; customers (SOFTWARE ACTANT) Software used to perform hacking: There are many computer languages that can be used by the hackers or programmers for hacking. Computer languages like C#, java, C, C++ and many more can be used to hack into various systems. (HARDWARE ACTANT) Hardware used perform hacking: Computer or PC; Network; Internet Connection DIGITAL ACTANT: Protocols for performing hacking, various hacking algorithms STRUCTURAL ACTANT: Privacy law CULTURAL ACTANT: Hacking How the actants are working with each other: It is a well-known mystery in the IT industry that huge companies and organizations regularly utilize the service of hackers. An ethical hacker is someone whose occupation is to nudge and jab at frameworks to verify the corporation is as secure and ensured as could be expected under the various circumstances (Theregister.co.uk, 2015). Still, the majority of the companies and organizations that contract programmers do not turn out transparently to talk about on this matter. The Bank of England reported that they were going to contract ethical hackers to assist test the safety of the organizations . Many banks were cynical of this choice however; the CEO of web security firm Bloxx said it was an exceptional choice. Hacker: The phrase hacker has fallen into disrespect, drawing closer to demonstrate that in the popular medium the culprits of a mixture of types of PC law violations (Farsole, Kashikar and Zunzunwala, 2010). In any case, numerous persons who are known as programmers, have pretentiously borne that mark from 1950's, are not criminal. A large number of them are entrepreneurial and scholarly pioneers of their eras. The expression hacking is obvious as a prohibited utilization of the system assets or the PC framework that does not fit in with them (Amorosi, 2010). The remark hacker was earlier used to portray a developer who is great at his or her employment. Ethical hacking: Ethical programmer and Ethical hacking are expressions used to depict hacking done by an individual or organization to help recognize potential dangers on a network or PC (Bodhani, 2012). Ethical hacker endeavors to sidestep framework security and quest for any feeble points that could be subjugated by malevolent hackers (Beaver, 2010). The company to improve the quality of its security can later use the information gathered from this kind of activities. The hacker uses various computer languages for encrypting and decoding of the codes. They use a computer for the basic work hat is needed to be done. They hack in to the network following all the privacy laws made by the government. Can it enhance a business ? Ethical hacking and Ethical programmer are terms used to depict hacking performed by an organization or individual to help recognize potential dangers on a PC or system. Ethical hacker endeavors to sidestep framework security and quest for any powerless focuses that could be abused by malevolent hackers (Mcfedries, 2010). MasterCard passwords and particulars can be stolen making financial harm to persons and again the PC systems can be hacked conveying on the machine to stop working which will make individuals to stop using electronic sparing cash. Subsequently, it can be said that utilizing good developers was not a terrible thought for the bank of England. The methodology of using some individual to hack ones association is good hacking (Mcfedries, 2010). Good hacking is one of the instruments that are used to judge the security ventures of the affiliations. It is in like manner suggested as entering testing, red teaming, intrusion testing, lack of prote ction and even security judgments . Everybody these has unmistakable ramifications in various countries. Hacking is moreover portrayed as new progression of the present activities, programming and code. It enhances them and more beneficial. Good means a hypothesis with moral quality. Developers hack structures to perceive hazardous, unapproved get to and misuse. These hackers utilize a mixed bag of strategies to soften the security structure up the relationship in the season of computerized attack. Ethical hacking can be beneficial for the bank because it has the capability of making the network better and thus can help to regain the trust of the clients or customers. The hackers should follow the following rules: Goals should be set: The hacker should be able to recognize the loopholes in the system that are at a risk of getting hacked. Planning the process of testing: Planning is vital and distribution it by means of the anxious personnel advisable. Consent of the testing procedure by all the stakeholders who are involved is necessary. Permission: To avoid any legal notice in the future, one should et permission prior to the procedure is done. The permission acquired should be in written. Ethical and professional work: All the plans and goals that were set at the beginning of the procedure should be followed at any cost. Confidentially should be maintained always given that any circumstances may appear. Records should be maintained: The hacker should always keep Formal records. Privacy should not be violated: Even if all the data and information can be acquired by the hacker, yet it should be not be used for exposing them (if the person is not bound by investigation). Rights should be maintained: The hackers should respect others right and should not pryin the lives of others. Scientific process should be used: To start with lay down a target that is scientific. The test must be reliable to the findings. One tool should be used throughout the process: There are various tools present for hacking. Therefore, one might be overwhelmed to use many at a time. This scenario of using various tools for one purpose should be avoided. Provide well-timed updates: All the work done should be completed in the stipulated time frame. Conclusion This report is conducted on two stories of computing or IT. Two stories that are identified with IT are clarified in this report. One is about the selling out of 1000 units of robot pepper in few minutes after put on sale and the other is about the programmers being utilized in the bank of England. Hacking has turn into a grave issue in nowadays. The vast majority of the associations and even people are aggravated because of this occasion. This is the motivation behind why bank of England utilized moral programmers for their association as it can help them to secure their association. The humans can use the robot as a companion as it can read and understand all the emotions on the face of humans. This robot is used for interactive purpose and can learn many new things from its surroundings. References Amorosi, D. (2010). In defense of hackers.Infosecurity, 7(5), p.38. Beaver, K. (2010).Hacking for dummies. Hoboken, NJ: Wiley Pub. Bodhani, A. (2012). Bad... in a good way [ethical hacking].Engineering Technology, 7(12), pp.64-68. Engebretson, P. (2010).The basics of hacking and penetration testing. Waltham, MA: Elsevier. Farsole, A., Kashikar, A. and Zunzunwala, A. (2010). Ethical Hacking.International Journal of Computer Applications, 1(10), pp.14-20. FBI thwarts ATM hacking attempt. (2010).Computer Fraud Security, 2010(4), pp.3-20. Goldstein, H. (2010). Hacking for humanity.IEEE Spectr., 47(2), pp.33-34. Hacking popular among students. (2010).Network Security, 2010(9), p.20. Mail Online, (2015).Pepper the $1,600 'emotional' robot sells out in ONE MINUTE. [online] Available at: https://www.dailymail.co.uk/sciencetech/article-3134746/Pepper-emotional-robot-sells-ONE-MINUTE-1-000-models-Japanese-humanoid-sell-1-600-each.html [Accessed 14 Jul. 2015]. Mcfedries, P. (2010). Hacking the planet [technically speaking.IEEE Spectr., 47(8), pp.23-23. Philipp, A., Cowen, D. and Davis, C. (2010).Hacking exposed computer forensics. New York: McGraw-Hill/Osborne. Wilhelm, T. (2010).Professional penetration testing. Rockland, Mass.: Syngress. Japanese information site for all people who love Japan, (2015).Japanese Robot Pepper with heart. [online] Available at: https://nicejapan.co.nz/news/japanese-robot-pepper-with-heart/ [Accessed 24 Jul. 2015]. Theregister.co.uk, (2015).Bank of England seeks 'HACKERS' to defend vaults against e-thieves. [online] Available at: https://www.theregister.co.uk/2014/04/24/ethical_hackers_drafted_to_probe_banks/ [Accessed 24 Jul. 2015].