Thursday, October 31, 2019

Experiment on Prisoner and Prison Guard Psychology Movie Review

Experiment on Prisoner and Prison Guard Psychology - Movie Review Example The two works illustrate that the negative quality of the surrounding environment has a big role to play in creating violent people. There are similarities between the Experiment movie and the actual experiment that Zimbardo conducted. First, both consist of volunteers that take part in a psychological study, who act as guards and prisoners. The Experiment movie and the actual experiment involve making prison life as real as possible. In the actual exercise, the police arrested prisoners without a warning from their homes and drove them to a nearby police station. Within a short time, the guards in the actual experiment began treating them like any other criminal  (Zimbardo). They fingerprinted, photographed, and blindfolded them before driving them to prison rooms. The rooms have bare walls, small cells, barred doors, and windows. Within no time, every participant settles into his role. Secondly, both The Experiment and the actual exercise involves taunting of prisoners with insults, pointless tasks and dehumanizing actions. For example, in The Experiment movie, Barris leads a group of other guards to abduct, shave and urinate upon Travis, a hard-headed prisoner that plots a strike. In the actual Zimbardo’s experiment, prisoners were also humiliated to a point of starting to develop some mental disorders. Evidently, the two movies depict violence since participants go through emotional and psychological discomforts, stay in a poor environment, and are physically insulted. According to psychology, violence is an extreme form of aggression such as rape, murder or assault (Gerdes  142). It results from frustration, violence in homes, tendency to view other people’s behavior as hostile, and exposure to violent media. Psychologists also agree that some situations such as insults, drinking, provocations, drinking, and unsuitable environmental factors may also increase the risk of aggression. Sociologists define violence as harmful actions of people

Tuesday, October 29, 2019

Determining the Rate Equation of a Reaction Essay Example for Free

Determining the Rate Equation of a Reaction Essay The aim of this experiment is to determine the rate equation for the reaction between sodium thiosulphate and hydrochloric acid using the order of the reaction with respect to each of the reagents. HCl (aq) + Na2S2O3 (aq) 2NaCl (aq) + SO2 (g) + S (s) When Hydrochloric acid is added to sodium thiosulphate, a solid ppt of sulphur is formed. I will use this to judge when the reaction has ended. The rate equation for this reaction is R = k [HCl]x [Na2S2O3]y In this equation: R = the rate of reaction k = the rate constant x and y = order of reaction with respect to HCl and Na2S2O3 (e. g. 0, 1, 2 etc) [HCl] = the concentration of HCl [Na2S2O3] = the concentration of Na2S2O3 My experiment will enable me to calculate x and y through plotting the volume against the reciprocal of the time it takes for the ppt to form. Preliminary work: The demonstration done by my teacher show that 50 cm3 of thiosulphate and 20 cm3 of deionised water mixed with 5cm3 of hydrochloric acid took 14.93 seconds to form the ppt. I will use this as a guide to decide which set of concentrations I will use to get a reasonable time which I can plot. When I implement my plan, I will plot my results. Using the shape of the graph, I will then deduce the order of the reaction. The following graphs show the shapes I should get for each order of a reaction. I am not changing the volume of hydrochloric acid because I want to test the effect of changing the concentration of the sodium thiosulphate to be able to find out the order of the reaction with respect to the sodium thiosulphate. Apparatus: * White tile with X in the middle. I will place my reacting solution on this white tile and time until the cross can no longer be seen. * Stop watch to time the experiment * Stirring rod * 5 cm3 measuring cylinder to measure the hydrochloric acid * Two 50 cm3 burette to measure the deionised water and the sodium thiosulphate as it is more accurate than a measuring cylinder. * One 250 cm3 conical flask into which I will mix my reagents * Two funnels to full my burettes, which I will remove before looking at the meniscus. * I will be supplied with deionised water, HCl and Na2S2O3 Concentrations: Run 1 Run 2 Run 3 Run 4 Run 5 Na2S2O3 (cm3) 50 45 40 35 30 Deionised Water (cm3) 20 35 30 35 40 Variables: Fixed Independent Dependent Temperature: the experiment will be done at room temperature. I will control the temperature because changing the temperature changes the rate which will affect me results. Concentration of HCl: I will keep this constant because I can only change the concentration of one reagent to see the effect this has on the rate. If I change both reagents I will not be able to tell the order of the reaction is with respect to which reagent. The white tile and cross: changing this might affect my visibility of the cross and the time. Total volume: I will keep this the same to ensure a fair experiment and the same visibility due to smaller volumes being more shallow and I might see the ppt at different times. My independent variable is the volume of the sodium thiosulphate. By altering the volume and adding deionised water, I am changing the concentration. This will enable me to observe how this will affect the rate of the reaction The dependent variable is the time taken for the cross to disappear. Method: 1. fill one of the 50 cm3 burette with sodium thiosulphate and the other with deionised water using the funnel and remove funnel before looking at meniscus. The bottom of the meniscus should be on the zero line. 2. measure into the conical flask the exact amount stated in the table above of the sodium thiosulphate and the water for run 1. 3. measure using the 5 cm3 cylinder 5 cm3 of HCl. 4. place the conical flask on the white tile with the cross 5. add the hydrochloric acid and start the stop clock. 6. stir the mixture briefly. 7. look at the conical flask from the top and stop the stop clock as soon as the cross is no longer visible. 8. write the time taken in the table. 9. repeat steps 1-8 for the other runs. I will then convert the times into rates by doing 1/t. this will go along my y-axis. The volume of the sodium thiosulphate will go along the x-axis. Based on the shape of my graph I will then decide what the order of the reaction is with respect to the sodium thiosulphate. Safety: Chemical Hazards HCl Solutions equal to or stronger than 2 mol dm-3 but weaker than 6.5 mol dm-3 are IRRITANT. Na2S2O3 Sodium thiosulphate may be harmful if you swallow it. It may also irritate the eyes or lungs. Eye contact: Flush the eye with plenty of water. If irritation persists, call for medical help. Skin contact: Wash off with water. If swallowed: If the amount swallowed is not trivial, call for medical help. SO2 Major hazard : Inhalation Odour : Pungent and Irritating S Contact with the eyes can cause irritation. The solid may also irritate the lungs if breathed in. Sulphur burns to give toxic gases, so should not be burnt in the open laboratory. Wear safety glasses. Solid sulphur should pose only minor hazards unless heated to a temperature at which it will burn. Safety glasses required. NaCl May cause eye irritation. Reference: http://www.cartage.org.lb/en/themes/sciences/Chemistry/Miscellenous/Helpfile/Kinetics/Rateorder.htm Chemistry 2 Cambridge Advanced Sciences Endorsed by OCR page 109 http://physchem.ox.ac.uk/~hmc/hsci/chemicals/sodium_thiosulphate.html

Sunday, October 27, 2019

Comparison Between Mainframe And Distributed Information Technology Essay

Comparison Between Mainframe And Distributed Information Technology Essay Client-server invent has actual and instant profits to software developers, apart from the volume of system. The client-server model is accepted model which operates client and server machines which are designed for exact purposes for computer networking. The Internet and Local Area Networks (LANs) both can use client-server model. Examples of the client-server systems on internet could be Web servers and Web browsers, FTP clients and servers, and DNS (Domain Name System). In FTP, users enter a computer name or sometimes an IP address in interface to locate connections to the server. There are two split devices in client-server model which are personalized for their considered reasons. For instance, a network client works most excellent in a big screen display, whereas a network server does not require any display and can be placed wherever in the world. On the other hand a device can be used as both, a client and a server for identical purpose. Similarly, a server device for one app lication can concurrently work as a client to other servers, for changed applications. People like client-server architecture because it offers error separation between modules, scalable performance in multiple servers, and central server is easy to manage and easy to program. The problem described in the assignment question says that in 1987 Hures implemented its first information system which was in mainframe computer that served Altos terminals to the users desktop. Then they ported the application on the client/server network to keep pace with changes in both the business and information system environment. Although the company started to grow non-stop, they noticed the following problems: Difficulty in scaling the servers to respond to the increased load in the distributed environment. Continual requirement for increasingly powerful desktop machines. But the main problem faced by Hures was as follows: Difficulty in configuring application into client-server modules. Modifying the configuration in response to user feedback. Analysis: Client/Server Devices: Long time ago as PCs (Personal Computers) turn out to be option to older mainframe computers, Client/server networking model developed in fame. The devices which ask for and accept information over the internet is Client PCs with network software applications established. Client functions can be found in mobile devices and desktop computers. Files and databases plus composite applications such as websites are stored in server device. High performance central processors, larger disk drive and more memory than clients are needed in server devices. Client/Server Applications: Applications and devices are differentiated by the client-server model. Client devices request a server side via posting messages in networks, and those servers reply to their clients with proceeding on those requests and sending back outcomes. According to about.com one server generally supports numerous clients, and multiple servers can be networked together in a pool to handle the increased processing load as the number of clients grows. Suggested solution for Hures problems: Here the problems faced by Hures are unique as my understandings. The described problem relates on the speediness of the system. The system should be created as which can handle upcoming demands or requirements of the business. According to this, the corporation or the designer of the system would not have concentrated on the upcoming development of the adjustment of the system or the system itself, to make sure that the system will give the future requirements and demands because of the various alteration in both external and internal situation that can vary the whole flow of information in the corporation. The bigger centre of attention should be the customer, and accordingly on the information resources and services that are needed to maintain communication with customers. So the information system should be created which can support the future demands, requirements and also support the user communication. Client Server Architecture: Nowadays client-server architecture is flexible in rapidly altering IT landscape. It relies on messaging services for interaction between components and is modular in structure as well. It is actually considered for improving usability, flexibility, interoperability, and scalability. Usability means the capability of the C/S architecture to achieve customers objective which is the part of human computer interaction. An obvious consistent process of evolution towards an objective and ease of use could be considered as some of the defined features. Term flexibility offers a better key space than that reachable with single computer models and it means C/S architecture is capable to change according to different users and various system requirements. Scalability is very important term for C/S architecture which refers to a products capacity to modify in size or amount kindly to meet up requests from users. Interoperability is ability to utility with other systems with no involving person involvement and manpower. Efficiency in all of these above features can be improved through improvements by client-server architecture. According to Chris Loosley and Frank Douglas client server architecture has following primary qualities: Systems are created by collecting independent components which gives unique and specific functions to system. Client components relate with users and servers to manage computing resources in the easiest arrangement where in more difficult arrangements, some servers can also be clients of other servers. Clients and servers can use hardware and software uniquely suited to the required functions. Front-end and back-end systems usually need computing resources that differ in type and power. C/S architecture is expanded due to the limits of file-sharing architectures that needs loads of bandwidth and sometimes it may stop or jam a network reasoning it to collapse. Only low shared usage and low volume of data can be transmitted. The file servers are replaced with database servers in C/S architecture and RDBMS (Relational DBMS) answers user queries and also improve consistency of data between different users so every user can have right to use the equal updated information. Till now only particular queries were being answered so the data of the file transferred in place of the whole file which reduces speed of the network. Client/Server with Database servers is shown below: Client Application Network Client Application Client Application Database Server Figure 1: C/S architecture with Database server C/S Architecture in Mainframe Environment: The design of complex mainframe by using modular programming and the association of modules into consistent groupings, or layers, has been a standard practice from long time. Layering is good design practice. In mainframe environment host computer (a mainframe) levers all processing, counting input, output, data storage and retrieval and that was being used in 70s. No matter what the target environment, specialization of function within distinct layers encourages designers to keep similar functions closely aligned, from both a functional and a performance viewpoint (Chris Loosley and Frank Douglas 1998, pp.30) thats why layering is good practice. C/S architecture in mainframe environment with file server is shown in the following figure: Client Application Network Client Application Client Application Figure2: Client/Server with file servers in mainframe environment. C/S Architecture in Distributed System: In distributed system number of computers (workstations, PCs) is distributed physically and connected by a communication network which handle all processing and are being used by the todays generation. The coverage is not nearly as absolute as in mainframe environment. For distributed systems, the coverage is not nearly as complete as it is in a mainframe environment. Distributed system became famous when a client posts a request and gets any service that did not appear from nowhere. Client/server model a lot referred to as a two-tier model which is related with tiny LAN-based distributed systems. But architecturally, it originated from software engineering principles developed for usual, centralized mainframe systems. Client Application Network Client Application Client Application File Server File Server Figure 3: Client/Server with file servers in distributed environment. Comparison between Distributed and Mainframe: The following figure shows comparison between distributed system and mainframe environment system and the difference of layering in between those two: Figure 4: Functional layering in mainframe and distributed systems (Chris Loosley and Frank Douglas, 1998) 2. Alternative Architecture for Hures: To solve the problem faced by Hures current client/server technology, Client-Queue-Client can be useful as alternative architecture. This uses a passive queue which allows the client instances to communicate directly with each other, which will refine their request from the services (Exforsys Inc). It helps out to maintain and avoid any inconveniences with the server so it could be helpful for Hures to use this architecture as alternative. To track the number of clients that are connected to the server, client queue is utilized. Therefore, the server can trace which resources the client has obtained, and the server can release the resources after the client connection breaks down (Chan Leong 2003). Scalability is very important feature which take part in Client/Server architecture effectively. Nowadays enterprise systems must accommodate growth. As the information systems grow, performance problems take place alongside six different dimensions; those are databases, stored objects, user population, transaction rates, data analysis, and networks. Good design anticipates the effects of business growth on performance. To shorten debate of performance, one of these dimensions is considered individually from each other. In any actual enterprise, some relationships will usually be real amongst these four effects for example, complex networks typically host large client populations, and a high transaction rate generally implies a large client population. However, such relationships are not necessary. Compared to the mainframe environment, client/server gives enhanced scalability since connections can be made as required rather than being set. More and more servers can be included to a network since application needs raises. Though, the increase in power will not be linear in terms of the number of servers. Intranet web Technology: Intranet is a web technology which is constructed by applying similar protocols and tools those are applied by the global internet but only difference is the internet is applied to the different place in the world and intranet is applied to the internal network such as in organisation. It can be described like a closed-circuit television system, which can be viewed only by those people within the organization that owns the system (Lowe 2009). Intranet site could only be viewed by those who are within that network of that particular organisation. Even though based on the same protocols as the World Wide Web, an intranet is protected from the outside world either by not being connected to the outside or through a series of hardware and software obstacles known as a firewall (Matthews Matthews 2003, p. 64). Advantages of Intranet: Intranet could be huge method of making available information to the internal users of the organisation and that can be the key benefit of the intranet. The applications which are used for newsletters, price lists, policy manuals etc. might be published by using intranet web technology. It can also help to transact application by gathering information that is related on expense and programs (Lowe 2009). Since intranet permits to make a personal position in the Internet, the position will be protected and safe, because only those persons with abilities to access can make use of the website over the Internet. Most of all, it can facilitate to distribute information to the users in more easier and effective manner. Intranet also gives increased productivity, reduced margin of error, flexibly; it has appropriate and accurate information, and lets smaller for marketing. Disadvantages of Intranet: Intranet web technology can be expensive to set up and maintain within the organisation because it could require extraordinary team for managing the process of allocating and maintaining the resources which are occupied in the website. If the access is got by someone else on the outside of the organisation it can be risky for the company so there could be some security issues might be raised. For instance, an employee might have posted sensitive information for all employees to see. Intranet is the technology which could need upgrades and might not have software compatibility and security features can be insufficient as well. Sometimes poor user support may not be effectively scale up. If some users may not have PCs at their desk, they could not be able to access the intranet. There can be possibilities of information overload which can happen when the big amount of data has been put on the intranet and that can make very difficult for employees to find the way and find data that is meaningful or that they need. With Intranets, firms have to set up and maintain separate applications such as E-mail and Web servers, instead of using one unified system as with groupware that is less back-end integration7. Intranet software and the internet: There is no uncertainty that intranet software is measured as one of the most taken advantage of networking technology in the business world. The previous sentence becomes true because it can give various advantages which cannot be achieved by the peer-to-peer and client-server architecture. It permits companies to obtain improvement of the wireless and Internet technology, and on top of that, it gives the privacy and security which can be presented by established client/server system. As a result of this, it has been seen that the attractiveness of intranet software and the Internet pose threats towards the traditional client/server systems. However, it is significant to think about that although intranet and the Intranet are being exercised and conventional worldwide, there are still fractions or characteristics of the company which are in necessitate of using the established client/server systems. Conclusion: To conclude that client/server architecture is the well known and well established network model which is used a lot nowadays. It gives more scalability, flexibility, usability, interoperability which improves the efficiency of the network and throughput as well. As we know there could be some problems with system and tools which are provided but as long as we consider that the problems could be solved with the C/S architecture that is main advantage of the C/S architecture. In the report client/server architecture is explained and we compared the C/S architecture in both mainframe environment and in distributed environment. The arrangements of the mainframe and distribute systems are explained in order to C/S architecture so from that we can figure out how the client/server model will suit the different environment. As we discussed there are some issues raised about C/S architecture used in the information systems which was developed for the Hures and it was in mainframe environment so in place of that distributed systems can be used to solve the problem and also the alternative solution for the C/S architecture can be considered to solve the problem of Hures. References: About.com: Wireless/Networking (2010) Introduction to Client Server network [Online], Date of retrieval: 29/01/2010, Available from: http://compnetworking.about.com/od/basicnetworkingfaqs/a/client-server.htm Chris Loosley and Frank Douglas (1998), High performance, client/server, (pp. 38-40), John Wiley Sons. Chan, A T S Leong, H V 2003, Cooperative Internet Computing, Springer.   Exforsys Inc. (2000-2010) Peer-to-Peer and Client-Queue-Client Architecture [Online], Date of retrieval: 03/02/2010, Available from: http://www.exforsys.com/tutorials/client-server/peer-to-peer-and-client-queue-client-architecture.html Lowe, D 2009, Networking for Dummies, For Dummies. Matthews M Matthews (2003), Microsoft Office FrontPage 2003: The Complete Reference, McGraw-Hill Professional. Ravi Kalakota Andrew B. Whinston (1997), Electronic Commerce, pp.88-90, Addison Wesley Longamn, Inc.

Friday, October 25, 2019

Relationships in Tennessee Williams A Streetcar Named Desire :: Streetcar Named Desire

Relationships in A Streetcar Named Desire  Ã‚     In many modern day relationships between a man and a woman, there is usually a controlling figure that is dominant over the other. It may be women over man, man over women, or in what the true definition of a marriage is an equal partnership. In the play A Streetcar Named Desire by Tennessee Williams Stanley is clearly the more dominant figure over Stella. Throughout the play there are numerous examples of the power he possesses of her. Williams portrays Stella as a little girl who lives around in Stanley’s world. She does what he wants, takes his abuse yet still loves him. Situations likes these may have occurred in the 1950’s and lasted, but in today’s time this would only end up in a quick divorce.   The first scene of the play (pg. 14) Stanley has just thrown a piece of meat up to Stella as he turns the corner heading for the bowling ally. He makes no motion to stop, run up the stairs and explain to his wife what’s going on, similar to what would occur in an equal relationship. Instead he continues down the street like a boy with no responsibilities. Stella yells, â€Å"Where are you going,† and then asks if she could come to watch, he agrees but doesn’t stop to wait for her. This scene demonstrates how Stella follows Stanley along, and serves him according to what he wishes to do and when he wants to do it.   In scene three Stanley is having his poker party (pg. 57). At this point he is very drunk. Blanche distracting Stanley by listening to the radio instigates him to grab it off the table and toss it out the window. Stella in a state of panic tells everyone to go home which angers Stanley so he chases after her and hits her. This type of behavior is not normal of any human being involved in any relationship. Stanley repeatedly gets what he wants by use of any means possible. In addition the person whoever threatens the existence of his poker game receives a beating, in this case his wife.   This scene demonstrates Stanley’s viscous animal like traits with such violence. If what happened here was repeated in today’s society he would find himself in a jail cell with a pending divorce. During the last scene of the play (pg.

Thursday, October 24, 2019

Out Out Poem’s Analysis Essay

Through the use of metaphoric presentations, Frost was able to describe the causes and the facts behind the truth of child labor. It could be observed that the discussion of the boy’s feeling towards the situation that he faces. To be able to end the dilemma that he has been involved with, he tried to cut himself. However, freeing himself was something that caused further problems for him, and worse is his death. This notes of the possibility that young individuals involved in child labor usually feel uneasy and are not having the fine time of their lives. The disgust that they particularly feel about the situation that they are in has been noted through the description of the natural reactions with regards the certain changes of climate. The climate particularly describes the actual emotional intensity of the situation. On the other hand, the issue of the poem may also refer to the different beauties of human living that is dealing with the challenges of life as it is. Challenge and hardships are described as the major part of human living. Without them, life would not be as fascinating as it may seem. In this particular view, the boy’s death could be observed to have been involved in the description of what giving up may have cause many others who decided to simply quit fighting for a better life. Those people are the ones who are less able to see the importance of challenges in actually assisting them in their growth towards individual involvement. The interpretation of the poem actually depends on the idea of the readers themselves and their view upon life. The author’s point in completing the poem has actually been based from the sensitivity that he feels towards nature and the way it relates to actual human living.

Wednesday, October 23, 2019

Contemporary vs Society in 1984

A. P. English 12 21 March 2011 Contemporary Society vs. 1984 In his dystopian novel 1984, Orwell expresses his vision of the nearing future through a fictional plot. Within the plot, Winston Smith, the novel's protagonist, lives a life controlled entirely by a manipulative and exploitative government. He, embodies the stereotypical personality of each citizen of Oceania—a person who abides by the laws of the ruling Big Brother government. Through the developing setting and characterization of our protagonist, the reader is able to witness the numerous aspects of control, manipulation and exploitation exercised by the Party and Big Brother. As his frustrations with the Party's control of history and longing desire to meet with a female co-worker increase, Winston begins to question the society he once aimlessly conformed to and the laws he once followed. Through Winston’s ordeal, Orwell expresses his concerns with an exponentially expanding American government. Such gross violations of personal liberties have played a prominent role in America's past as well as in its present. While writing the novel, Orwell recollected his childhood experiences in an oppressed India and began to draw comparisons to the then-current state of America. During the 1940s, America experienced increased military involvement, significant expansion of the federal bureaucracy and world dominance. In turn, Orwell’s writing of 1984 seemingly serves a cautionary and educational purpose. Honest government may expand into an oppressive one if its citizens do not vigilantly monitor its activity. In contemporary society, Americans face similar circumstances to those subject to the environment portrayed in 1984. The unfortunate happenings of the Terrorist Attacks on September 11th, 2001 still affect Americans presently. Consequently, Americans knowingly placed greater trust in their government and sacrificed certain liberties for superior security. Resulting legislation, such as the Patriot Act of 2001, allows the US government to bypass certain privacy rights in order to ensure safety within the nation. During the summer of 1798, the Alien and Sedition Acts passed by congress brought the United States closer to a â€Å"Big Brother† institution than ever before. The Alien Act â€Å"authorized the president to arrest and deport aliens suspected of ‘treasonable' leanings† Davidson 219). With no clear definition as to what actually constitutes a â€Å"treasonable leaning,† the president could've forced someone out of the United States the instant they engaged in a form of anti-American protest. Surveillance cameras in most buildings and some public streets further demonstrates the constant and grim reality of governmental supervision. US troops are stationed throughout the Mi ddle East in addition to their already inhabited locations. Similar to those subject to the omniscient Big Brother government in 1984, Americans are controlled by specific qualities and principles, social constraints, manipulated by a homogenous and monopolized society and exploited by the falsified allure of the â€Å"American Dream. † â€Å"Freedom is the freedom to say that two plus two make four. If that is granted, all else follows. † (Orwell, p81). Such a simplistic definition of freedom misleads those striving for absolute freedom. In fact, American and Oceanian citizens share ultimate freedom if freedom was solely confined to its previously stated definition. However, the reader knows that those within Oceania are enslaved by their own totalitarian government. Therefore, freedom's true definition is much more complex and often contradictory. The contradictory nature of freedom and democracy proves the similarities between America and Oceania. Although not as radical of their 1984 counterparts, Americans defer to an elitist society to maintain their â€Å"freedom. † â€Å"In a paradox for democratic theory, the masses express the greatest confidence in the most elitist, nonelected branch of the government† (Dye 309). With greater confidence, comes blind trust. Since Americans allow a minority of elitists to dictate their society, true freedom and democracy cannot exist. Therefore, Americans are more like pawns that are governed by a select few, which was the reality of those subject to the Party, rather than the assumed impression that the majority controlled its own destiny. Throughout Orwell's novel, 1984, a fictional character named Big Brother exists. Throughout the town of Oceania are constant reminders of Big Brother's existence and his limitless oversight on the community. In addition to the sense of surveillance by Big Brother, telescreens within every household and microphones scattered across the town, further accentuate the lack of privacy within Oceania. Ultimately, in 1984, technology’s sole purpose was to intrude into each citizen's personal and private life. As technology further engulfs itself in modern society, aspects of 1984 are become more prominent. While telescreens are not exactly monitoring us every second of the day, many people are probably unaware of how public most of their private life really is. Between computers and security cameras, it really is not too hard for a member of some government agency to keep track of what someone does everyday. In contemporary society, human interaction and technology are becoming exceedingly intertwined. The rapid advancement of technology has allowed for the possibility of an inseparable combination of humans and technology. Upon writing his novel, Orwell extrapolated much of the detail about the technology within 1984 because of its unavailability or primitive features. The technology of modern society far exceeds that of 1984. If government could utilize lesser quality technology and control an entire population, what could amass if the technology were superior? Cell phones, computers, cameras, global positioning systems (GPSs) and other significant technological inventions in modern society have numerous benefits, but beget several drawbacks to ponder. Within each computer and cell phone are locating devices which allow the respected companies to observe the websites visited and the location of the each device. Wiretapping, legalized by the Patriot Act of 2001, permits governmental monitoring of telephone and Internet conversations to ensure safety. Surveillance cameras survey the actions of pedestrians to prevent crime. Although most of these cameras are operated by private businesses, privacy is still invaded. Realistically, the government’s use of technology as a means to intrude on American privacy is a definite possibility. In the past, and currently, the US government has used technology in order to ensure safety despite sacrificing certain liberties. With humans bearing a greater dependence on technology, the exploitation of technology by the government would prove devastating and irreversible. â€Å"War was a sure safeguard of sanity, and so far as the ruling classes were concerned it was probably the most important of all safeguards. While wars could be won or lost, no ruling class could be completely irresponsible† (Orwell 198). The focal point of the Oceania’s economy was its overextending military. The constant war, overshadowed by the developing plot involving Winston, provides justification and a safeguard against its citizens. The purpose in participating in a perpetual war is to consume human labor and commodities. Without commodities, Oceania is able to justify their engagement in an unwinnable and â€Å"necessary† war. In addition, constant warfare keeps the population fearful, and creates emergency conditions whereby the government can expand its powers. People, manipulated into fear, will respond more favorably to regulations in times of war. Accompanying the sacrifice of personal liberties, following the distressing events on September 11th, 2001, includes an extension of military activity. First beginning with Former President Bush, and current President Obama, the US Army is combative throughout the world, specifically the Middle East, in its attempt to curtail acts of terrorism. Seemingly, as in the case with Oceania, the United States is continuously in a warring state. When peace is made with one country, war is claimed or threatened on another nation to continue a military presence. The Department of Defense, comparable to the Minister of Peace, allocates the largest level of budgetary resources and coordinates the activity of the United States armed forces. Not counting the cost of the wars in Afghanistan and Iraq, the Defense budget is expected to be $553 billion in 2012, up from $549 billion in 2011† (Factor 24). In addition, the Department of Defense posts useless statistics, incorrect economic predictions, and slanted opinions polls. The most infamous example of incorrect statistics and bias speech was Former President Bush’s Mission Accomplished speech. In spite of the continuing warfare, Bush stated this was the end to major combat operations in Iraq. Certain aspects of the Oceania war machine further manipulate the actions of the Oceanian citizens. The government of Oceania, orchestrated by the Party, influences its citizens into believing that they have a common enemy in the Brotherhood, specifically Goldstein. The Two Minutes of Hate, a daily period in which Party members of Oceania must watch a film depicting The Party's enemies, entices mob action and a blind expression of hate. The picture of Goldstein comes up on the screen, while the people scream in anger and horror at the image. Goldstein, they are told, is everywhere and must be destroyed. The similarities to modern society are more real than apparent and speak to what has been happening in the United States since World War II. Each significant event in history has seen evil characters that have been determined on destroying â€Å"the American way of life. † During World War 2, Adolph Hitler and Josef Stalin led the rise of fascism and against democratic principles. During the Red Scare, Mao Tse-Tung of China disturbed American peace with communists influence on the American public. During the Arms Race, Lenoid Brehznev of the USSR challenged the social integrity of America. During the 1980s, Saddam Hussein of Iraq and now Bin Laden promoted use of terrorist attacks to harm Americans. Like Goldstein in Oceania, each man menaced society, striking fear and hatred into the peoples’ hearts. After their deaths, American society was not safer and soon after a replacement continued to terrorize America. Ultimately, the Party’s slogan â€Å"War is Peace† perfectly represents their exploitation of war and stronghold over their citizens. Through the expression of the slogan, the Party contends that in times of war, Oceania is at peace. Such a contradictory statement provides an example of the Party’s use of â€Å"double think† and manipulation of the people. Oceania – the Party – is able to remain at peace during times of war because of a war’s natural temperament. War acts as a means to ensure a stagnant social structure and prevent true socialism. War, specifically in 1984, guarantees a destruction of produce (Orwell 191). With a scarcity of produce, economic disparity becomes apparent and overprotection of produce becomes unlikely. Thus, the Party is â€Å"at peace† because revolution or any social change is improbable. Similarly, war has a parallel effect in modern society. In times of war, America is economically and socially stable. War creates an abundance of jobs which distills any opposition from the lower class which has an innate tendency to protest the actions of the highest class (Orwell 199). Industries rejoice as the government agrees to purchase any and all military related goods. The government expands its power by restricting several personal liberties which are voluntarily and willingly bequeathed by the people. The nation rallies around a common enemy, fueled by propaganda, and confidence in its government reaches a pinnacle. War establishes peace to authorities dictating the path of the nation: War is peace. Throughout 1984, the Party, in accordance with the Ministry of Truth manipulates its control of the past and rewrites history. In rewriting history, the Party ensures the completion of one of its slogan: â€Å"Ignorance is Strength. † The constant change of the â€Å"truth: and destruction of supporting records, allows the Party to keep its citizens ignorant of its true actions. Thus, the Party avoids confrontation with questioning and aware citizens. To address those unaffiliated with the Party, the Party ses a more indirect approach to keep the Proles ignorant. With guaranteed liberties, the Proles are content with their uncommon privileges and do not seek to interrupt their happiness and therefore do not challenge the Party. According to the Party, promoting ignorance prevents doubt and creates a powerful strength in the idea. The only way to keep an idea strong is to remove all suspicion of doubt. If one has no reason to question a belief, then that belief will remain despite its unreasonableness. And if this lack of questioning can become indefinite, then the belief is also indefinite. In American history, some events are understated, while others are overstated to glorify patriotism or conform to modern belief. Most recently, President Bush’s vacillation through several reasons to invade Iraq provide an example of understatement and deceit in politics. Initially, President Bush stated that Iraq had weapons of mass destruction which would prove harmful to Americans in the near future. After no weapons of mass destruction were found, President Bush stated that then President Saddam Hussein had anthrax and other biological harmful weapons. Anthrax was found in Iraq; however, the United States did not mention that the same anthrax was sold to Iraq by America. President Bush, then, justified the military activity in Iraq by claiming to fight terrorism and spread democracy. Congressmen, who supported the War of Terrorism, eventually reversed their opinions of the war and stated that the President and the Department of Defense provided inaccurate accounts of the terrorist activity in Iraq. President Bush’s waving between his reasoning to invade Iraq demonstrates an ability to keep Americans ignorant of the true motives of US invasion in Iraq. In 1984, there was an obvious separation of wealth. The London that Winston Smith calls home is a dilapidated, rundown city in which buildings are crumbling, conveniences such as elevators never work, and necessities such as electricity and plumbing are extremely unreliable. The grimy urban decay offers insight into the Party’s priorities through its contrast to the immense technology the Party develops to spy on its citizens. The conditions O’Brien, an Inner Party member, lived with greatly differed from the livelihood of Winston. O’Brien’s home was ornately furnished and enjoyed the likeness of cigars, coffee and tea. In modern society, the trend continues. The wealthy can afford to live lavishly, while the poor can barely afford to live. The concentration of wealth significantly favors the elitists. Those poor, in America and Oceania, ignorantly misuse their money on lotteries with the false hope of becoming wealthy. Despite being regarded as a fictional novel, 1984 and its portrayal of a controlling and exploitative government are comparable to the current conditions of modern society. Through Winston’s characterization, Orwell expresses his concerns with an exponentially expanding American government and a foreseeable future. Orwell, as told through 1984, envisioned a world of constant surveillance, where the privacy of the individual was virtually extinct. Although the technology he predicted seems unsophisticated, the concept of surveillance is applicable. Naturally, as the government expands, intrusion on the personal lives of its citizens is becoming accessible and simple. The use of technology, such as computers and cell phones, is becoming greatly intertwined in human interaction and everyday life. These advances in technology can be interpreted both positively and negatively. Legislations, such as the Patriot Act (2001) and the Alien and Sedition Act, have given the government an almost limitless means to interrogate radical thinkers. With the initial reading of this polemic book, Orwell’s work was subjected to pillory of all sorts; however as society has let time take its course it seems that those who criticized this work were the most jejune of all, about our Lugubrious society.