Monday, September 30, 2019

Character Cannot Be Developed in Ease and Quiet Critical Lens Essay

Critical Lens Essay Helen Keller once said â€Å"Character cannot be developed in ease and quiet. Only through the experience of trial and suffering can the soul be strengthened, vision cleared, ambition inspired and success achieved. In other words what this quotation means is what individuals go through in life makes them what they are. Individuals have to go through good and bad to learn love and strength. Two examples that support the validity of this quotation are Night by Elie Wiesel and The House on Mango Street by Sandra Cisneros.In Night by Elie Wiesel, the protagonist, Eliezer, is taken to Birkenau during World War Two with his father and is separated from the rest of his family. When seeing such horrific conditions in the concentration camp, Eliezer starts to lose faith in God and in himself, yet as his character builds, he starts to mature as time went on. Eliezer’s experiences educate individuals that life in not always far; some individuals lose faith and give u p yet some, like Eliezer, gain strength from their experiences and build up their character.In The House on Mango Street by Sandra Cisneros, the protagonist, Esperanza, lives on Mango Street with her family and struggles with events where she is faced with adult responsibilities and maturity. In the vignette â€Å"Red Clowns†, she is taken advantage of and experiences an act of nature where she is transformed into a woman. Esperanza shows that overcoming catastrophes make you a stronger person. With such experiences comes strength and maturity.In both Night by Elie Wiesel and The House on Mango Street by Sandra Cisneros, the protagonists, Esperanza and Eliezer are faced with events that make them stronger and better people. They are two examples of individuals that support the validity of the quote that Helen Keller once said â€Å"Character cannot be developed in ease and quiet. Only through the experience of trial and suffering can the soul be strengthened, vision cleared, ambition inspired and success achieved†. Even when the going gets tough, individuals learn love and strength which allows them to obtain victory and build character and achieve their dreams.

Sunday, September 29, 2019

Facebook Has Become Very Boring

Facebook has become very boring with all this cooking and slavery stuff. I believe feminism goes beyond who cooks at home and who doesn't. There are more pressing issues at hand to be dealt with regarding feminism but as things stand now, it seems most of us have misplaced priorities. There are women who are being oppressed and harassed in their workplaces, at school and even in their places of worship. These people are the ones who need voices in higher places to speak up for them. Uncles are raping cousins, fathers are sleeping with their daughters and husbands are sexually abusing their wives, these are the issues that need redress. These issues demand voices in the higher echelons of power to stand up for them. Brides are trapped in violent marriages they dare not come out to speak about or against. Over 600,000 girls are trafficked over the Atlantic every year and used as escorts in Spain, Mexico, China and all over the world; these ones need voices, voices in higher places to represent and fight for them. Female genital mutilation is still ongoing in our backyard. Girls are being given into early marriages, some are being used to atone for the sins of their fathers. No one is really talking about these things. The voice of the female child is stifling gradually and those in the position to speak up for them are rather wasting their breath on debates on who must cook or not, while we watch all these evils befall the innocent girl child who never asked her parents to meet and mate â€Å"under one coconut tree.† Women are scared to speak up and defend themselves. Your boss at work can touch you indiscriminately because he feels he gave you the job, your lecturer can decide to fail you because you refused his sexual advances, your pastor can touch your breast because you went to him to pray for you†¦and in all these, we still do not have a voice to speak. The girl child finds it difficult to trust anyone. There is a glass ceiling above competent and qualified women they cannot go past at the workplace. And it gets very irritating when you come online and the core issues are sidelined and peripheral stuff are rather discussed on national platforms. Big voices who must be speaking for these largely marginalized ones are talking about cooking being slavery or not. It is funny feminism has been belittled into â€Å"who becomes the head of the family?† and not â€Å"let's help the girl child to excel in all spheres and overcome all her fears†. Feminism is not about calling men names, slamming your fellow females and cussing those who disagree with you. Neither is it about arguing with people who try to perforate holes in everything someone who stands for the movement says even when they are right. We must learn to agree and disagree on issues intelligently. I am not really enthused with all this recent talk because it seems that is what we do these days. We go with the tide. Today, kitchen stool comes and we all talk about it and leave it there. Nobody moves further to check what really is happening in our schools and how we can help. Now it is cooking being slavery. It will also pass and we'll troll one another on the next bandwagon

Saturday, September 28, 2019

Write a critical review of a journal article Essay

Write a critical review of a journal article - Essay Example In depth studies are being undertaken due to the different contributing factors to the onset of such disabilities specifically the genetic factors, the environmental factors and the social factors. Due to the extensive number of variables needed to be considered there is also the problem of lack of baseline data that can be used for comparative analysis of studies undertaken. There are different factors covered in the study such as the causes of developmental disabilities, challenges in the research process, clinical study of toxic elements known to affect the neurodevelopment such as lead, mercury, manganese, polychlorinated biphenyls, flame retardants, pesticides, nicotine, and alcohol and other solvents. Upon analysis of the article by Schettler, it can be considered that the study is more of a library based research since the data are presented on a textual manner. It can be considered qualitative in nature based on the same reason that the topics discussed are presented in paragraph form and there are no tabulated data. According to the determination of the source of the article, it had been known that it is a derivation from another article written by the author, thus, compared to the reference article, this one can be considered as an abridged or shorter form. On a reader’s perspective, the article was able to present a general point regarding the importance of an in depth study on the factors affecting the different types of neurological disabilities but if one is interested in an in depth determination of the factors and their specific mechanisms, it is important to have a more quantitative presentation of the data. In relation to the fact that the article is based on a nother article, the data presented cannot be considered as first hand although it is written by the same author. The fact that the data in this article is only based on the article which discussed the toxic threats in child development,

Friday, September 27, 2019

The Geography of Diet Essay Example | Topics and Well Written Essays - 3500 words

The Geography of Diet - Essay Example One can observe a connection between ethnicity and similarity in food patterns. Food patterns are often seen as symbols of cultural identity. The affinity or dislike for a food varies across regions on the basis of origin (Food - Food And Culture, n.d). The net result is a wide platter of food for the people across the globe. The paper undertakes a study of the food culture in China. China and their cuisine China is one of the emerging economies of the world and it has a very strong economic base. The country has a large population with different ethnic groups but the Han Chinese constitutes the major group. Apart from them there are Zhuang, Manchu, Hui, and others. The country has a rich historical background which dates back to 3500 years and it boasts of being the oldest civilizations of the world (China, 2011). As the economy is so diverse it is natural that food habits of the people will also vary and accordingly the world was presented with a new type of cuisine in their platte r known as the Chinese food. The need to fulfill the growing population’s demand for food led to the discovery of dishes using new ingredients. Scarcity of meat made them adapt new eating habits which included a combination of small amount of meat and more rice and noodles. Consumption of vegetables increased and they were stir fried to conserve fuel. (Map of China, n.d.) Chinese also discovered new dishes during famines. Shortages of food compelled the population to eat anything that is edible to survive. Ingredients such as fungus, lily buds, different types of fruit and vegetable peels and shark fins were used to make delicacies in China. Unlike the dishes made in Western style, cooking of Chinese food involves both meat and vegetables. This makes the amount of calorie and fats very less and also there is no loss of vitamins and minerals. The differences in food across regions became more prominent when there was invasion from the neighboring countries and the outcome was exchange of cooking styles and customs (Coman, 2007, pp.2-3). Foundation of Chinese cuisine Chinese cuisine like their philosophy is based on â€Å"Daoist principles of opposition and change† (Kuiper, 2010, p.40). One can find that there is a balance between hot and cold, spicy and mild. Cooking in the Sichuan province is characterized by the use of hot peppers whereas one would find the use of fresh ingredients more common in the southern interior part of China. Subtle flavors and fresh vegetables are synonymous with Cantonese cooking. Foods may differ across regions but they all are viewed as an â€Å"accompaniment† to grains which is the staple Chinese diet. It is also believed that Chinese cuisine contains a high expression of â€Å"gastronomic art† (Kuiper, 2010, p.40). In ancient China one would find that a great emphasis was given to service and preparation. Supply of food in ancient time was mostly ensured through hunting and foraging. Vegetables to meat , everything was found on the Chinese platter in ancient time also. The emergence of agriculture led the development of different styles of food according to the natural resources that was available. Thus there was the emergence of different cooking styles and

Thursday, September 26, 2019

Pornography Essay Example | Topics and Well Written Essays - 1000 words

Pornography - Essay Example It narrates the story of the passionate and obsessive sexual affair between Kichizo Ishidaa, a hotel owner, and Sada Abe, a prostitute turned servant who works for him. By portraying the unusual relationship and obsessive love between the couple, through several sequences of sexual acts, Oshima subtly redefines the meaning of pornography and obscenity. The movie depicts an â€Å"extended repertoire of graphic sex acts† that are typical of porn movies and due to stringent censorship laws in Japan Oshima has done all the post production work in France (Williams 183). Many critics have discounted the movie as pornographic but some, including the movie’s director, defended it on the grounds that it radically attempts to extend the possibilities of pornography and challenges the â€Å"very notion of obscenity† (183). The main objective of Oshima seems to be to show the audience what they wish to see but have so far forbidden themselves from viewing. He further contend s that when the audience feels that all that they wanted to see is â€Å"revealed† the element of â€Å"obscenity disappears† and, therefore, the authorities should authorize the screening of pornographic movies (183). In her critique of the movie, writer and critic Linda Williams endorses that despite the graphic sexual acts depicted in the film, it does not â€Å"negate art† (184). People usually associate pornography and obscenity with the concept of devouring on sexual acts that people watch merely for the purpose of excitement or as a deviatory pleasure. Thus, the general notion is that pornography solely seeks to elicit erotic feelings and arouse the people who watch or read such materials. However, through the portrayal of a strong, obsessive love affair between a servant and master that finally entails in jealousy out of possessiveness, Oshima pushes the boundaries that define the term pornography and obscenity and attract the attention of the audience t o new dimensions of the term. Linda Williams attributes the film to be â€Å"too real, too hard-core† but also â€Å"too beautiful to fathom† (184). On the other hand, she further mentions the scary connotation of the castration in the movie’s climax is a befitting end, which reflects the â€Å"Lacanian allegories† of the times when the movie was made (184). Thus, Oshima has traversed beyond the normal realms of pornography and obscenity through the depiction of the tumultuous affair between the man and the woman in his movie, In the Realm of Senses. A Critical Analysis of Linda William’s Definition of Obscenity: Human cultures and civilization have evolved with the passage of time as people keep changing their perspectives based on new information and knowledge. The definition of the word â€Å"obscene,† as the humans perceive it now, has also undergone a lot of interpretation as well as transformation before it has acquired its current dim ension. In the conservative American society the word obscenity refers to any sexual representation in any art form that has been included in it simply â€Å"for sex’s sake† without adding any value the content; or in a sense it encompasses the notion of what should be â€Å"off (ob) the stage (scene) of representation† (Williams 165). Linda Williams in her essay titled, Second Thoughts on

Create a marketing plan for the next year from a case study Essay

Create a marketing plan for the next year from a case study - Essay Example Because of high sugar content, governors may remove status of 5-a-day from fruit juice and smoothies (Mintel, 2014).There are several governmental initiatives undertaken in order to reduce the amount of sugar people consume. However, until the 5-a-day guidance in relation to fresh juices and smoothies is not removed, the companies can use it as powerful marketing tool (displaying 5-day-logo on packaging) (Keynote, 2015). In 2014, Public Health England published a guidance on sugar consumption and policy â€Å"Sugar Reduction: Responding to the Challenge†. This publication addressed the problems of sugar consumption between 2008 and 2012, including fruit juice, and other food and drink items. This publication outlined some actions, including: launch of national-wide digital marketing campaign addressing the problems of sugar consumption; necessity to conduct analysis and evidence reviews on different subjects, including advertising of food and drink to children. Also, the PHE informed about a necessity to consider imposition of taxes on sugar-sweetened drinks (Keynote, 2015). GDP in the UK has shown year-on-year growth between 2010 and 2013. Taking into consideration uncertain economic conditions across the globe, the UK’s economy demonstrates stability and continuous recovery after financial crisis (Keynote, 2015). This trend positively impact consumer’s purchasing confidence. Since 2013 consumer confidence in the UK has continued its rising. Moreover, it is forecasted that consumer confidence will continuously grow during the next five year (Mintel, 2014). It means that consumers will have greater psychological freedom to buy more, including fruit juices, juice drinks, and smoothies. The purchasing behaviour of the UK population has changed towards more healthy foods and drinks. As people become more health conscious, they

Wednesday, September 25, 2019

Business skills Essay Example | Topics and Well Written Essays - 750 words

Business skills - Essay Example Therefore setting strategies is among the high priorities that a firm should make. According to Growth Online (n.d.), the strategy in the case of a firm includes market strategy, product and services strategies, and organizational strategies; people Strategies, and financial Strategies. After a firm has spent so much time and resources planning, and formulating strategies, the firm should figure how to implement them. This is because: For these strategies to succeed there are some essential steps to take. First, a firm needs to create an environment that can carry out the strategies successfully, second, allocate enough resources to strategy essential activities, third, create policies that will encourage strategy implementation, fourth, employ the policies, fifth, tie rewards to results, and finally utilizing strategic leadership (Rothwell & Kazanas 2003). Strategies are only applicable in the imperfect completion sort of an environment. When an environment turns perfect, the idea of strategies no longer works since there is free entry, perfect communication and firms deal in same products (Kazmi 2008). Perfect competition provides a standard for measuring the market behavior in terms of price and production (Gale & Sabourian 2005). Each firm in the market is so small that its operations do not affect the prices in the market (Williams n.d ). The market price is standardized due to the many competitors dealing in the same product hence there is no room for a firm to make super-profits (Klein 2007). The firm will operate within the earlier set standards to be able to remain in the market. This makes it hard for individual firms to set their own strategies when they enter in the perfect competitive market (Gale & Sabourian 2005). Perfect competition however is a rare occurrence. The highly probable event is that the market is imperfect allowing room for individual firms to set strategies to enhance profitability. The

Monday, September 23, 2019

An overview of Western Civilization Essay Example | Topics and Well Written Essays - 2000 words

An overview of Western Civilization - Essay Example Under the philosophy, different scholars prompted the discovery of schools of thought such as the Pythagoreanism, Sophism, and Platonism. These schools of thought have significantly shaped the thinking of people living in those times. Another exemplar facet of Western Civilization is the religion. Around 700 BCE, Ancient Rome came into power and led many people in subjecting to Roman Catholic which believes in God, Jesus Christ, and the Holy Spirit to be one person equal in power. Roman Catholic was gaining its popularity among people in those times. Popes were being praised, people come at their feet and kiss them, and they generally gave what they have materially in order to gain the attention and blessings of the popes. Amidst the church’s great influence is a man who courageously sees and speaks of its flaws. Looking at the prose titled â€Å"Grand Inquisitor†, Fyodor Dostoevsky boldly scrutinized it with an aim of â€Å"an attack to the Catholic Church†. Apart from a system of education and religion mentioned earlier, Western Civilization promoted values and issues such as rational argument, human rights, equality, democracy and free thought. Regarding the last, the prose gave nothing but a wide array of reflections. One point in the prose states, â€Å"†¦gift of freedom with which the ill-fated creature is born† (Dostoevsky). The gift of freedom stemmed out from Jesus Christ’s choice when he was on earth, at a time when Satan approached him in the mountains to tempt him. The three temptations to Christ, were first, the earthly bread. This was followed by casting his own self while at the same time trusting that he will be saved by the angels, and the third, choosing the word kingdom to gain unity upon earth. The issue of freedom revolved around these three temptations. The Grand Inquisitor presented the results and the curse or consequences of Christ rejections of the three while questioning the nature of man. Regarding the first temptation, the Grand Inquisitor mentioned that Christ’s failure of choosing the earthly bread over the heavenly bread resulted to unhappy people with freedom. This is shown by this passage, â€Å"†¦the terrible gift that had brought them such suffering†¦Ã¢â‚¬  Freedom allowed people to carry on independently. Freedom casted a provider, or a leader, according to the Grand Inquisitor. Thus, people suffer because having no ruler is like being a sheep driven into confusion and misery. It is a common human nature to worship and be a slave of someone, â€Å"Feed men, and then ask of them virtue! That’s what they’ll write on the banner which they will raise against Thee†. Such philosophy is seen when human chose to be led by political leaders like Hitler, Mussolini, and Stalin (Dostoevsky). They were willing to give up their freedom and be in subjection to rulers who would give them the earthly bread despite the persecutions they impose. Another scene which illustrates that is when Christ went down from the heavens to make miracles like resurrecting a dead one and healing the ailing ones. Upon seeing the miracles performed by Jesus, people came at his feet and started to do acts of worship to hi m. The Grand Inquisitor pointed out that Christ must have satisfied people if only he did not reject Satan’s temptation. That way, he will serve for the sake of many and make himself famous as a grand provider just like what the pillars of the church are doing. The second temptation reveals that Christ’

Sunday, September 22, 2019

Trifles Essay Example | Topics and Well Written Essays - 1000 words - 5

Trifles - Essay Example In this regard, Susan Glaspell’s play â€Å"Trifles† appears to be a perfect example of representation of all essential literary elements of the play’s world for their research and analysis. For the beginning it must be said that the play â€Å"Trifles† is based on real-life story from the experience of Susan Glaspell as a reporter. The thing is that â€Å"†¦she was assigned to report on a murder case: the homicide of John Hossack, a prosperous Warren County farmer who had been killed in his sleep† in approximately 1900 year (MidnightAssassin.com). Being one of the first reporters who arrived at the accident site, Glaspell has been aware that Hossack’s wife is suspected in her husband’s murder, while she swore it was an intruder blood-guilty for John’s death. In a few days, Susan Glaspell has visited Hossacks’ farmhouse. The scenery of its kitchen has made a striking impression on the reporter. As we can see, the story of her further play’s character John Wright’s murder almost doubles the true story from Glaspell’s experience of the reporter. But there is one interesting point, that is, the time of the writing and performance of â€Å"Trifles†: â€Å"First performed by the Provincetown Players at the Wharf Theatre, Provincetown, Mass., August 8, 1916† (Glaspell). The time gap accounts for almost sixteen years. Then the obvious question arises: what circumstances prompted Glaspell to write the play? Having her previous practice of writing plays during 1909-1915 years, the playwrighter has decided not only to convey her ideas on paper, but also to animate them onstage before audiences. In this intention her husband has served as an active supporter and immediate participant of Glaspell’s ideas. â€Å"In 1915, at their summer home in Provincetown on Cape Cod, the couple organized a group of local artists as an amateur theatre group and staged a number of one-act plays in a converted fish warehouse† (Britannica.com). The

Saturday, September 21, 2019

Cari Story Essay Example for Free

Cari Story Essay How can an infection in Cari nasal passages and pharyns spread into her sinuses? The infection in Cari’s nasal passages and pharynx was able to spread into her sinuses due to the sinuses being a drainage area for the nasal passages. What is the cough reflex? Describe the process that Cari’s respiratory system is using to clear her lungs by coughing. The cough reflex is used to clear sputum and irritants that are in the nasal passages and pharynx. There are cilia in her trachea that is moving mucus up from the lungs. When the mucus becomes or abundant it triggers the cough reflex. Which structures found in the terminal bronchioles and alveoli normally would protect Cari’s lungs from infectious pathogens and particulate matter? Macrophages found in the terminal bronchioles and alveoli that normally would protect Cari’s lungs from infectious pathogens and particulate matter. How would the resistance of Cari’s airways be affected by excess mucus and fluid in her lung? Excess mucus and fluid in the lungs would raise the resistance of Cari’s airways because of the small diameter the buildup would cause. The fluid would have some of alveoli under water where they could not function properly and there would also be more friction from the buildup. How would Cari’s lung compliance (the effort required to expand the lungs) be altered as her alveoli fill with fluid due to pneumonia? Lung compliance would increase from trying to force gases into and out of the alveoli. Those are filled with fluid due to the pneumonia. How would fluid in Cari’s lung affect her total lung capacity? Fluid in Cari’s lungs would lower her total lung capacity by not allowing the space that is taken up by the fluid to be filled with air. How does the elevation of Cari’s respiratory rate alter her minute ventilation? Elevation in her respiratory rate would alter her minute ventilation by raising it. Minute ventilation is determined by times ing respiratory rate by total volume. Normal blood oxygen saturation levels are greater than 94 percent; Caris blood oxygen saturation level was 90 percent at the time of her exam and an initial arterial blood gas analysis done when she was admitted to the hospital revealed her arterial Po2 was 54mmhg. How do these clinical finding relate to the internal respiration in cari body?

Friday, September 20, 2019

Automated Protocol to Restrict Password Guessing Attacks

Automated Protocol to Restrict Password Guessing Attacks ABSTRACT Password login services are now widespread and ever increasing. Attacks that take place on password-only remote login services are brute force and dictionary attack. Providing convenient login for legitimate user.In the proposed system we use Password Guessing Resistant Protocol (PGRP) which improves more security by restricting the number of attempts. PGRP allows a high number of failed attempts from known machines. PGRP uses either cookies or IP addresses, or both for tracking legitimate users. Tracking users through their IP addresses also allows PGRP to increase the number of ATTs for password guessing attacks and meanwhile to decrease the number of ATTs for legitimate login attempts. Key Words – Online password guessing attacks, brute force attacks, password dictionary, ATTs. 1. INTRODUCTION: Online password guessing attacks are the most commonly observed against web applications SSH logins. SANS report observed that password guessing attack is the top cyber security risk. SSH servers that doesn’t allow some standard password authentication suffer the guessing attacks. Online attacks have some disadvantages compared to offline attacks i.e., the attacking machines must use an effective interactive protocol which allows a easier detection of malicious attacks.Malicious attackers try only limited no. of password guesses from a single machine being that account is being locked or before being challenged to answer an ATT. An attacker will employ a large number of machines to avoid locking out. Generally users choose weak passwords. As malicious attackers control large bot nets online attacks became much easier.Restricting the no. of failed trails without ATT’s to a very small number is the effective defense system that can be used against automated online passw ord guessing attacks. Also limiting automated programs(or bots) used by attackers for password guesses for a targeted account, even many different machine from a bot net are used. This method inconveniences offers a legitimate user to answer an ATT on next login attempt after the malicious attackers guesses. Other techniques deployed in practice includes: Even though from a given machine when a certain number of failed attempts occur,it allows login attempts without ATTs from a different machine. After a certain time-out period, it allows more attempts without ATTs and also time-limited account lockinMany existing techniques proposals involve ATT’s, assuming that the challenges provided by the ATTs are difficult for botseasy for people(legitimate users). Users are increasing disliking ATTs and feels it as an unnecessary extra step. Successful attacks are being made which break ATTs without human solvers. ATTs that are to be more difficult.As a consequence, present-day ATTs are becoming more difficult for human users. Therefore, we focus more on reducing user inconvenience by challenging users with fewer ATTs and at the same time subjecting bot logins to more ATT’s, to drive up economic cost to attackers.Two well-known proposals using ATTs to limit online guessing attacks are Pinkas and Sander (PS protocol) and Van Oorsc hot and Stubblebine (VS protocol). The PS proposal reduces the ATTs. The VS proposal reduces this but a significant cost to usability.. The PGRP is being developed by using both PS VS proposals. On the other side, PGRP allows high number of failed attempts from known machines without answering any ATTs. Known machines are defined as those from which successful login has occurred over a fixed time period. These known machines are identified by their IP addresses which are saved on the login server as white list or else in the cookies stored on client. Both the white listed IP address and client cookie expire after a time-period. In both graphical user interface(e.g., browser-based logins) character-based interface(e.g.,SSH logins) PGRP can be accommodated). Both PS and VS proposals, requires the use of browser cookies. PGRP uses either cookies or IP address or both for tracking legitimate users. PGRP increases the number of ATTs for password guessing by tracking users through their IP address also to decrease the number of ATTs for legitimate login attempts.In recent years, the trend of logging in to online account through multiple personal devices (e.g., PC, laptop’s,smartphones ) is growing. When used from home environment, these devices often share a single IP address which makes IP-based history tracking more user friendly than cookies. 2. Related work: From the early days of the internet the online password guessing attacks have been known to everyone. Account locking is a mechanism which prevents a malicious attacker from multiple passwords particular username. Although account locking is temporary remedy, an attacker can mount a DOS (denial of service) in some amount of time for a particular username can be done by delaying server response after receiving user credentials, whether the password is correct or incorrect. However, for an attacker with access to a botnet, this above mechanism is ineffective. Prevention techniques that depend on requesting the user machine to perform extra computations before replying to the entered credentials are not effective with such adversaries. To prevent the automated programs (brute force dictionary attacks) ATT challenges are used in some protocols.PS presented a login protocol which challenges ATTs to protect against online password guessing attacks. PS protocol reduces the number of ATTs that authorized users must correctly answer, so that a user with a valid browser cookie will be rarely asked to answer an ATT. A deterministic function AskATT() of the entered user credentials is used to decide whether to ask the user an ATT or not. To improve the security features of the PS protocol, Van Oorschot stubblebine defined a modified protocol in which ATTs are always required, once the no. of failed login attempts for a particular username exceeds a threshold. For both PS and VS protocols, the function AskATT() requires a careful design, because the ‘known function attack’ of poor design of this function AskATT() makes the login protocol vulnerable to attacks and also ‘change password attack’. Because of these attacks, the authors proposed a secure non-deterministic keyed hash function as AskATT() so that each username is associated with one key that changes whenever the corresponding password is changed. This proposed function requires extra server-side storage per username atleast one cryptographic hash operation per login attempt. 2.2 Functions PGRP uses the following functions. They are 1.Read Credential. It shows a login prompt to the user and it returns the entered user name and password and also the cookie received from the user’s browser. 2. Login Correct If the provided user name-password is valid, the function return true otherwise it returns false. 3. Grant Access This function sends the cookies to the user’s browser and then gives the permission to access the specified user account. 4. Message It displays the text message. 5. ATT Challenge This function challenges the user with an ATT. If the answer is correct, it returns â€Å"pass† otherwise, it returns â€Å"fails† 7. Valid This function checks the validity of the cookie and it is considered invalid in the following cases: The cookie username doesn’t match with the login username. The expired time of the cookie. The cookie counter is equal to or greater than K1. This function returns true only when a valid cookie is received. 3. Cookies versus Source IP addresses PGRP keeps track of user machines from which successful logins have been initiated previously. If the login server offers a web-based interface, for this purpose choose a browser cookies as a good choice. The login server unable to identify the user in all cases, if the user uses multiple browser or more than one OS on the same machine. Cookies may also be deleted by users, or automatically enabled by the most modern browsers.Cookie theft(eg., through session hijacking)might enable an adversary to impersonate a user who has been successfully authenticated in the past. In addition cookies requires a browser interface.A user machine can be identified by the sourceIP address. To trace users depending on sourceIP address may result in inaccurate identification. This can be done because of various reasons including. 1) The same machine might be assigned different IP addresses. 2) A group of machines might be represented by a small number or a single internet-addressable IP address if NAT mechanism is in place.Drawbacks of identifying a user by means of either a browser cookie or a source IP address include: 3) Failing to identify a machine from which the user has authenticated successfully in the past. 4) Wrongly identifying a machine the user has not authenticated before. Case 1) Decreases usability since the user might be asked to answer an ATT challenge for both correct and incorrect login credentials. Case 2) Affects security since some users/attackers may not be asked to answer an ATT challenge even though they have not logged in successfully from those machines in the past.However, the probability of launching a dictionary or brute force attack from these machines appears to be low. Therefore, we choose to use both browser cookies and source IP address in PGRP to minimize user inconvenience during login process. 3.1. Decision function for requesting ATT’s: The decision to challenge the user with an ATT depends on two factors: 1) Whether the user has authenticated successfully from the machine previously. 2) The total number of failed login attempts for a specified useraccount Fig. 2.Secure but inconvenient login protocol 3.4.1Username-Password Pair Is Valid After entering a correct username-password pair. In the following cases the user will not be asked to answer an ATT challenge. 1. A valid cookie is received from the user machine and the number of failed login attempts from the user machines IP address for that username, FS[srcIP,un], is less than k1 over a time period determined by t3. 2. The user machine’s IP address is in the whitelist W and the number of failed login attempts from this IP address for that username, FS[srcIP,un], is less than k1 over a time period determined by t3. 3.The number of failed login attempts from any ,machine for that username, FT[un], is below a threshold k2 over a time period determined by t2 3.4.2Username-Password Pair Is Invalid After entering a incorrect username-password pair. In the following cases the user will not be asked to answer an ATT challenge. A valid cookie is received from the user machine and the number of failed login attempts from the user machines IP address for that username, FS[srcIP,un], is less than k1 over a time period determined by t3. The user machine’s IP address is in the whitelist W and the number of failed login attempts from this IP address for that username, FS[srcIP,un], is less than k1 over a time period determined by t3. The username is valid and the number of failed login attempts for that username, FT[un], is below a threshold k2 over a time period determined by t2. 4 System Resources No list’s are maintained in the PS protocol because of this there is no extra memory overhead on the login server. In VS protocol only FT is maintained. In PGRP, three tables must be maintained. First, the white list, W is expected to grow linearly with the number of user’s. W contains a list of{source IP address, username}pairs that have been successfully authenticated in the last t1 units of time. Second, the number of entries in FT increase by one whenever a remote host makes a failed login attempt using a valid user name, if entry is added to FS only when a valid{user name, password} pair is provided from an IP address not used before for this user name. Therefore, the number of entries in FS is proportional to the number of IP addresses legitimate users successfully authenticated from. 4.1  Background On Previous ATT Based Protocols Pinkas and Sander introduced the topic based upon a strawman login protocol that requires answering an ATT challenge first before entering the {user name, password}pair. If the user falling to answer the ATT correctly prevents the user from proceeding further. This protocol requires the adversary to pass an ATT challenge for each password guessing attempt. Simple protocol is effective against online dictionary attacks assuming that the used ATT’s are secure, legitimate users must also pass an ATT challenge for every login attempt. Therefore, this protocol affects user convenience and requires the login server to generate an ATT challenge for every login attempt. Pinkas and Sander proposed a new protocol that reduces the number of ATT’s for legitimate user’s are required to pass. This protocol stores a browser cookie on the machine of users who had previously logged in successfully. Once the user requests the login server URL, the user’s browser sense the cookie back to the server. The protocol then requests the user to enter a {user name, password} pair. If the pair is correct and a valid cookie is received from the browser then the protocol gives permission to access the account. If the pair is correct but no valid cookie is received, then an ATT challenge must be answered before account access is granted. Otherwise, if the pair is incorrect then according to a function AskATT(), an ATT challenge might be required before informing the user that the pair is incorrect. With this protocol, legitimate user must passATT’s in the following cases:1) When the user logs in from a machine for the first time. 2) When the user’s pair is incorrect and AskATT() triggers an ATT. For each password guessing attempt an automated program needs to correctly answer ATT except in one case i.e.,when the {username, password} pair is incorrect and a function AskATT() didn’t request an ATT. Van oorschot and stubblebine proposed modifications to the previous protocol which stores failed login’s per username to impose ATT challenges after exceeding a configurable threshold of failures. Hence, for an incorrect {username, password}pair, the decision to request an ATT not only depends on the function AskATT() but also on the number of failed login attempts for the username.After entering correct credentials in the absence of a valid cookie, the user is asked whether the machine in use is trustworthy and if the user uses it regularly .The cookie is stored in the user’s machine only if the user responds yes to the question. This approach aims to reduce the possibility of cookie theft since a negative answer is expected if the user was from a public machin e .The user account is set be in non-owner mode for a specified time window when a login is successful without receiving a valid cookie from the user machine; otherwise the account is set to owner mode.

Thursday, September 19, 2019

Sullivan vs. Bennett Essay -- Gay Marriage Homosexuality Essays

Sullivan vs. Bennett The two texts examined within, present the opposing extremes of views regarding gay and lesbian marriage. The first text entitled Let Gays Marry by Andrew Sullivan examines the intricacies of same sex relationships and why homosexual couples should be allowed to publicly show affection for one another. The second text that will be examined is titled Leave Marriage Alone written by William Bennett. Bennett gives his views on why couples of same sex nature should not be allowed to engage in marital relations. These two authors, although very different, each has a view of the ideals of marriage, and how it should be presented to the public. Sullivan, a proponent of same sex marriages is a firm believer that gay and lesbian couples should be treated as equals in society and no different than anyone else. Many people are afraid of the effects that same sex marriages may have on our culture, and Sullivan explains that gay men and women are no different from anyone else in society as far as political and moral beliefs are concerned. These people are not out to change America as a whole, they just want the freedom to decide and to do as they wish. Sullivan explains that homosexuals want the right to marry for the same reasons as anyone else and that the lobbying of gays in America, for marriage, is not to destroy our moral system or who we are, they just want to be able to devote to one another as a regular couple does. Same sex marriage may seem, to some, a crazy idea as marriage in this country is built on the foundation of a man and a woman marrying, but Sullivan points out that until recent centuries marriage was a contract into which a woman entered so that she would be controlled by her husba... ... to agree on the fact that the issue at hand is one of religion. Religion seems to be the deciding factor right now when it comes to the question of what is right and what is wrong. Both authors see religion as the main concern when the question of homosexual marriage is brought up. So as each has very different ideals for society as a whole, both Bennett and Sullivan try to represent the happiness of the people as a whole, in their own ways. The two authors present very different points of view and each has well thought out reasoning behind what he has to say. Although the authors feel very different about how marriage should exist and how it should be regulated, there is some common ground between the authors. Citations †¢ Sullivan, Andrew. Let Gays Marry. United States: Random, 2002 †¢ Bennett, William. Leave Marriage Alone. United States: Random, 2002

Wednesday, September 18, 2019

The Focus on Cultural Competency in the Social Work Profession Essay

The focus of social work practice can be best described as a pendulum, with major theoretical shifts occurring in accordance with, among many things, social climate, funding, and federal and state legislation. Thus, incorporating concepts of cultural competency into the clinical setting has been an evolutionary process. The focus on cultural competency in the social work profession has developed from a trend, to what is now regarded as an academic knowledge base and professional standard (Bridge, Massie & Mills, 2008). The nineties marked a shift towards multicultural and cultural diversity competency, it is still a fairly novel concept†¦.. In many instances discussions on cultural competency have been broached by non-social work professionals and in terms of multicultural therapy and counseling (Lu, Lum & Chen, 2001). With the client population becoming a more expansive group in terms of socioeconomic level, race, gender identification, and sexual orientation, it is imperative that clinicians engaged in cross-cultural work conduct ongoing â€Å"self-inventories,† and be involved in collaborative discussions with their agency in regards to cultural competency. The following paper will be a perspective on my conception of cultural competency as a clinical social worker in an agency setting. McPhatter (1997) defines cultural competency as the ability to bring cultural awareness and understanding into â€Å"health and/or psychosocial interventions that support and sustain healthy client-system functioning within the appropriate cultural context (pg.261).† Akin to many of my peers, I am inclined to envision myself upon graduation as a self-aware, knowledgeable, enthusiastic clinician capable of servicing all kinds of clients without prejudices... ...ural contexts, it is crucial that cultural competency garners attention from both the clinician, and agency. The ongoing work involved in this journey is emotionally demanding, and I find it incredibly helpful to revisit the very reason why I choose this profession. As Elizabeth J. Clarke, Executive Director of the National Association of Social Workers so eloquently states, â€Å"We are holders of hope for our clients, our communities, and our society†¦. social work is the last best profession (pg.11).† Given that, it is critical that as social workers we remember that although discussing societal constructs, such as, racism, classism, sexism, and homophobia in the therapeutic relationship can be remarkably challenging, by engaging in such conversations you are combating the power that these constructs possess in your life, your client’s and the global society at large.

Tuesday, September 17, 2019

Franciscan Values :: essays research papers

For the last few years, I have been going through life trying to figure out what my purpose is. My drive for life had been lost, and I needed spiritual guidance. As I reflected on the past, it brought a feeling of emptiness within. By stepping back and allowing the Lord to lead me, my life finally had purpose, a direction and set values. These values came second nature to breathing, however I never viewed them as things I had to do. They were things I enjoyed doing. The Franciscan Values that are most important to me are Showing compassion for others by serving and caring for the poor and oppressed. Having concern for justice issues is another that is big on my list, because I believe in American. Taking responsible social action plays a big part in my core system do to the fact that, the Lord has lead me to do something greater and not just sit back and complain. Offering unselfish service is the cornerstone to my existence because I believe in offering my services to people regard less of the circumstances.   Ã‚  Ã‚  Ã‚  Ã‚  Showing compassion for others by serving and caring ro the poor and oppressed is in my spirit. The Lord has taught me not to pass judgement on anyone. By being one of God’s servant’s, that leaves little room for being judgmental. One can never determine what happened in a persons life that brought them to the point of being poor or oppressed. A divorce, a death in the family or a lost of a job could have been the deciding factor in keeping or losing their home. Regardless of the circumstances it sends a feeling of calmness over me when I do the works I’m called to do.   Ã‚  Ã‚  Ã‚  Ã‚  Being in control is something we long for in life however, justice issues are a big concern in the world in which we live and that is something we have no control over. I respect the President of the United States, and I respect our country. Remaining safe is what I want the future to bring. Prayer has become apart of my total existence. Opposition of the wars is something that eats away at my soul. Much respect is given to the soldiers that are getting killed and severely injured in order to protect our country. Claiming to have all the answers is not what I’m doing.

Fashion, Gender and Identity

‘Gender is a meaning that a culture assigns to sexual differences' and within gender, ‘masculinity and femininity are the divisions that a culture creates between behavior and ‘characteristics considered to be appropriate to men and women' (Bernard, 2007, 185- 186). Fashion aids in the social construction of gender through separating male and female fashion and promoting the stereotypical feminine figure. From the days of stays and petticoats to corsets and crinolines and now with padded bras and ‘Spans', fashion has seen centuries of shrinking and augmentation of the body to achieve the sexualities, feminine' shape.The communicative function' of the body and they way in which it is McCollum is like a ‘language' – a ‘cultural communication' (Descanters, 1997, 11). Being ‘feminine' is Just one of many ‘performances' that people can choose to present and a person's choice to follow more typically feminine or masculine styles can pr ovide an insight into who they are (Gauntlet, 2008, 11). Although certain guidelines may be socially expected, in the western world, we are largely in control of what we wear and thus are perpetually communicating some element of personal identity every time we get dressed, whether it is intentional or subconscious.Using the visual examples of Marie Antoinette, Queen of France and a fashion icon in the late 18th century and Lady Gaga, a current fashion and pop icon, this essay demonstrates how, even though centuries have passed, the practice of augmenting and shrinking the figure through fashion garments to achieve a feminine' shape has continued to perpetuate social constructions of femininity. Then, the example of Andre] Pelvic is used to demonstrate how appearance can communicate identity, in particular gender identity.Beginning in the 16th century in Europe, Women's bodies were universally forced onto bizarre, unnatural shapes' (Smith, 1998, 5). Stays, petticoats, corsets and cr inolines with stiff fabric, boning and wire were used to force the body into the desirable feminine' silhouette of the time. Constant dissatisfaction and change with the idealized shape of the body reinforced the idea that the natural body needed to be ‘improved and restricted' to be considered attractive (Smith, 1998, 5).We see this trend continue into modern day clothing and undergarments. This constant restriction and augmentation, which occurs almost solely to the female body, aids in the social construction and communication of gender. Illustration of Marie Antoinette by Panderer-Login, from Encyclopedia Figure 1 Britannica Image Quest A royal exemplar existed in the form of Marie Antoinette, Queen of France from 1774 until 1792 – a time when all of Europe was ‘culturally and stylistically influenced' by France, during the Rococo era (Coving, 2006, 56.Descanters, 1997, 35-36). The desired feminine physical ideal at this time was the ‘hourglass female fi gure: a tiny waist, ample bosom and large hips which enhanced femininity (Tallahatchie-Villas, 2007, 36-37). Marie Antoinette had to ‘learn to be a woman (or at least how to perform indemnity)' through the molding of her body with fashion garments (Goodman, 2003, 6). In Figure 1 (above) the Queen is depicted with her hand resting on her commodious and voluminous skirt, serenely gazing into the palace.It can be seen that her body is distinctly shaped to the ‘hourglass' figure that Tallahatchie-Villas (2007) refers to as an image of ‘enhanced femininity – the tightly laced corset has shrunk her waist and her bosom is being flattened and pushed upwards to have an overflowing effect. At the same time her hips have been augmented by a large pannier shaped undergarment and gathers and ruffles of fabric add to the luminous result. Corsets had been present since the beginning of the 17th century, initially made with an iron structure, which was replaced by whalebone in the 18th century.At the beginning of the 18th century, the farthing' – a framework of hoops' that aristocratic women had previously worn to provide volume under their skirts – was replaced by the crinoline (Charles & Carl, 2010, 30). The crinoline augmented the size of the hips and changed shape to follow changing fashions in the desired feminine physique. In the early 18th century the shape of the crinoline was round, it then came oval and then ‘conical' (Charles & Carl, 2010, 30).By the mid 18th century they had become a ‘pannier' shape meaning ‘side hoops' or false hips' – a shape that was flat on front and back and extended on the wearer's left and right, giving her exceedingly wide hips (Cumming, Conjunction & Conjunction, 2010, 148). This is the shape we see in Panderer-Aligns illustration of Marie Antoinette in Figure 1 . In this illustration there are a number of elements of composition and execution that support the conclusion that the molding the Queen underwent were both expected and desirable at this time.There is the artist's decision to place her in a standing position in which the full scale of her skirt can be realized, the addition of shading to emphasize her bust, and dark shadowing around the waist that functions to reduce its size. The enormity of the Queen's gown in relation to her head and the background of the portrait ensure that her curvaceous feminine shape instantly draws the viewer's eye. The artist's decision to contrast the rich, dark objects in the background with pale colors to illustrate her in the foreground again draws attention to this almost ethereal feminine form.One wonders how widely this image as distributed, given our knowledge of Marie Antoinette influence on fashion. Queen Marie Antoinette was known as the ‘Queen of Fashion' and her choices in clothing were closely documented, publicized and duplicated by women throughout the whole of Europe (Weber, 2007, 1). Her wardr obe has even provided inspiration for current designers such as Much Dulcet for her millinery collection at the Autumn/ Winter 2012/13 London Fashion Week and John Gilligan for his Spring 2010 Couture collection for Dior in Paris (Clearing, 2012. Maida, 2010).The consequence of her choice to conform to the notion of molding her body, restricting and augmenting – wrought undergarments and fashion garments – to achieve the hourglass shape ensured this practice remained in fashion and in turn contributed to the social constructions of the feminine physical ideal. After the fall of the monarchy at the turn of the century this fashion of restricting and augmenting the body, molding it to achieve the ideal feminine' physique, persisted. The use of the waist- shrinking, bust- raising corset was continued into the nineteenth century, although steel boning began to be used instead of whalebone.By the mid sass, ‘cheap, mass-produced' corsets were developed and became a tab le of nearly every woman's wardrobe (Gag & Steele, 2005, 291). At this time, flexible sprung-steel rings suspended from cloth tapes' known as ‘Hopkins' were in fashion and augmented the size of the wearer's hips (Gag & Steele, 2005, 317). The corset remained in fashion into the early twentieth century, when it had become a ‘straight front' corset that ‘pushed the pelvis back and the bosom forward,' forming the desired feminine physique at the time – the ‘S' silhouette (Gag & Steele, 2005, 293).The fashionable body in this period was augmented towards the back with use of a bustle skirt. In the sass, the fashionable female figure was ‘boyish and flat- cheesed,' so the waist shrinking corset and wired underskirts became largely obsolete, but the practice of restriction remained in fashion as the breasts still had to be tightly bound, this time to conceal rather than enhance' (Smith, 1998, 5).In 1939, and then after World War II, Tallahatchie-Villas ' image of ‘enhanced femininity with a tiny waist, ample bosom and large hips' returned to fashion again and brought with it the return of the corset and fuller skirts (Tallahatchie-Villas, 2007, 36-37. Gag & Steele, 2005, 293). From the sass onwards the process of restriction and augmentation to achieve the desired feminine physique dictated by fashion at the time has continued. A review of more recent trends and products and fashion exemplars appears below.Currently there is no singular feminine' silhouette that is being dictated by fashion. In some areas of fashion media we are seeing the same boyish thinness as in the twenties and in others there is a push for the ‘real', curvaceous shape (Abraham, 2012). There are still some ‘corset enthusiasts' and elements of these undergarments such as boning and full skirts are still being used in many women's garments as well as in haute couture fashion. There is a myriad of other new garments encouraged by fashion for wo men to restrict, augment and mold their bodies into any desired shape.A few products currently on the market include the Wastepaper' – a tubular piece of Lacy worn to slim the waist and flatten the stomach; the ‘High-waist Long Leg Brief which is designed to provide ‘under-bust and tummy support, hip and thigh contouring, and a nice boost for your butt'; as well as ‘Padded Shaper Panties' which have two round foam pads to give you a ‘perfectly rounded derriere' and padded bras to increase bust size (Morgan, 2012). Compared to the days of corsets and crinolines, he variety of ways in which fashion encourages women to squeeze, expand and mold their bodies have grown.Figure 2 – Photograph of Lady Gaga at the 2009 MET Music awards. Photo courtesy of Getty Images, 2009 Lady Gaga, is Without question, the world's biggest pop star' and a current fashion icon (Robinson, 2010, 280). She famously morphs her body into the sexualities feminine hourglass sha pe with boning, padding and structured garments – often designed specifically for her by current avian garden fashion designers such as Giorgio Airman and Nicola Fortieth for Thither Mugger (Fleming 2012.Nick, 2011). In the above photograph (Figure 2) Lady Gaga is wearing a Jean Paul Guiltier padded and boned body suit, which drastically shapes her figure into the curvaceous, hourglass silhouette of ‘enhanced femininity that Tallahatchie-Villas refers to (2007). The boning restricts the size of her waist while the undermine and padding on the cups over her breasts raise and shape the bust and the padding on her hips augment their size.Although this is an exaggerated example and would not be considered a ready- to- wear garment that women would be seen in on the street, Lady Saga's style choices are influential on how women choose to dress in mainstream culture. More than four hundred years after the first corsets and petticoats came into fashion, we see that the process of restricting and augmenting the female body to achieve a look considered to be feminine is still widespread.Through encouraging this practice and promoting a desired feminine physique that is difficult to attain naturally, fashion aids in the social construction of gender. An individual's choices about the clothes, make-up, accessories and styling that they adorn before venturing into public can communicate a lot about who they are. At the name time, the changeable and impermanent nature of these external applications meaner that no definite assumptions of a person's identity can be made and these variables can easily be manipulated by the individual, allowing them to become who they would like to be.An individual's unique interpretations of, and resistances to conventional fashions is known as ‘appearance style' and is a medium through which individuals can ‘announce' who they are or who they want to become (Gag & Steele, 2005, 34). There are some elements of appeara nce that we are accustomed to observing and processing almost immediately when we look at a person. For example when you see a stranger, it is highly likely that you will be able to tell if their gender is male or female almost instantly and their appearance style aids in this immediate recognition.When you observe the combination of their choice of hair cut, cosmetics, clothing, accessories, shoes and mannerisms; you can draw a conclusion about what gender that person is ‘announcing that they are. This shows that the individual has the power to manipulate these components of their appearance to communicate their understanding of their personal gender identity. An example of how successfully appearance can provide an insight into gender identity and also how easily it can be manipulated can be seen through examining performances of Andre] Epic.Pelvic is biologically a man but models as both a male and a female. At his first fashion week – New York Fashion week Fall/Wint er 2011/12 – he walked in five menswear shows and four homeowners shows and this number has since grown (Morris, 2011). Pelvic explains how he began to mold himself into the typically feminine aesthetic, creating an appearance style that would be read as female – he grew and dyed his hair, ‘started wearing skinny Sears†¦ Hopping in the women's aisle and putting on make-up' (Morris, 2011). Pelvic was voted the ninety- eighth sexiest woman in the world in Fem. ‘One Hundred Sexiest Women' list last year (Peck, 2011, 24). Figure 3 – Andre] Pelvic in ‘Hem' ad campaign. Photo courtesy of Hem from Hollywood Planet, 2011 In the above ad for the Dutch department store ‘Hem', Andre] Pelvic is pictured wearing their ‘mega push up bra' underneath a close-fitted top and a figure hugging dress (Freeman- Greene, 2011).The bra is claimed to ‘add two cup sizes' to its wearer's bust, which it has achieved successfully with Epic's originall y flat chest (Quicker, 2011). His body has been manipulated so that his appearance style masticates his gender as female. His hair is long and blow-dried in a typically feminine style, he is wearing make-up and a necklace, his arms are void of hair and his body has been manipulated to augment the bust with padding. He attempts to channel the poses that female models often make by moving and looking at the camera in a fluid and dramatic' manner (Morris, 2011).The close up angle of the photos and the choice of shots where Pelvic is making direct eye contact with the camera enforces the believability of Epic's feminine appearance. The success of the communication of Epic's gender identity as female in this advertisement monstrance the extent to which an individual can communicate who they are or would like to be through their appearance. As an audience we almost automatically assume Pelvic to be a ‘beautiful, Victorians Secret queue bombshell' (Abraham, 2011).This mutual communic ation and interpretation that can be achieved through manipulating the variables of appearance style allows for an individual's look to say much about who they are. Fashion aids in the social construction of gender through separating male and female fashion and promoting the stereotypical feminine figure. In numerous entities past and continuing into the present, the practice of women using wire, steel, elastic and padding to McCollum their bodies to the fashionable shape of the time has been common, even expected.We have examined how Queen Marie Antoinette encouraged this practice in the 18th Century by wearing a corset to nip her waist and enhance her bust as well as hoop pannier skirts to widen her hips. In the 21st Century it has been demonstrated that this body distortion is still common with pop icon Lady Gaga wearing a boned and padded body suit that provides her with that feminine, hourglass shape. We then saw how this practice is so typically expected to be feminine that th e biologically male model Andre] Pelvic can display his female gender identity by donning a padded bra. Fashion, Gender and Identity gender is a meaning that a culture assigns to sexual differences' and within gender, ‘masculinity and ‘femininity are the divisions that a culture creates between behavior and ‘characteristics considered to be appropriate to men and women' (Bernard, 2007, 185- 186). Fashion aids In the social construction of gender through separating male and female fashion and promoting the stereotypical feminine figure. From the days of stays and petticoats to corsets and crinolines and now with padded bras and Spans, fashion has seen centuries of shrinking and augmentation of the body to achieve the sexualities, feminine' shape.The communicative function' of the body and they way in which it is molded is like a ‘language' – a ‘cultural communication' (Descanters, 1997, 11). Being ‘feminine' is Just one of many ‘performances' that people can choose to present and a person's choice to follow more typically feminine or masculine styles can provide an i nsight into who they are (Gauntlet, 2008, 11). Although certain guidelines may be socially expected, in the western world, we are largely in control of what we wear and thus are perpetually communicating some element of personal Identity every time we get dressed, whether It Is Intentional or subconscious.Using the visual examples of Merle Antoinette, Queen of France and a fashion Icon In the late 1 8th century and Lady Gaga, a current fashion and pop Icon, this essay demonstrates how, even though centuries have passed, the practice of augmenting and shrinking the figure through fashion garments to achieve a ‘feminine' shape has continued to perpetuate social constructions of femininity. Then, the example of Andrea Pelvic is used to demonstrate how appearance can communicate identity, In particular gender identity.Beginning in the 16th century in Europe, Women's bodies were universally forced onto bizarre, unnatural shapes' (Smith, 1998, 5). Stays, petticoats, corsets and crin olines with staff fabric, boning and wire were used to force the body Into the desirable friendly' silhouette of the time. Constant dissatisfaction and change with the Idealized shape of the body reinforced the Idea that the natural body needed to be ‘improved and restricted' to be considered attractive (Smith, 1 998, 5). We see this trend continue into modern day clothing and undergarments.This constant restriction and augmentation, which occurs almost solely to the female body, aids in he social construction and communication of gender. Britannica Image Quest A royal exemplar existed in the form of Marie Antoinette, Queen of France from 1774 until 1792 – a time when all of Europe was ‘culturally and stylistically influenced' by France, during the Rococo era (Coving, 2006, 56. Descanters, 1997, 35-36). The desired feminine physical ideal at this time was the ‘hourglass female figure: a tiny waist, ample bosom and large hips which enhanced femininity (Tallah atchie-Villas, 2007, 36-37).Marie Antoinette had to ‘learn to be a woman (or at least how to perform indemnity)' through the molding of her body with fashion garments (Goodman, 2003, 6). In Figure 1 (above) the Queen is depicted with her hand resting on her commodious and voluminous skirt, serenely gazing into the palace. It can be seen that her body is distinctly shaped to the ‘hourglass' figure that Tallahatchie-Villas (2007) refers to as an image of ‘enhanced femininity – the tightly laced corset has shrunk her waist and her bosom is being flattened and pushed upwards to have an overflowing effect.At the same time her hips have been augmented by a large pannier shaped undergarment and gathers and ruffles of fabric add to the luminous result. Corsets had been present since the beginning of the 17th century, initially made with an iron structure, which was replaced by whalebone in the 18th century. At the beginning of the 18th century, the farthing'  œ a framework of hoops' that aristocratic women had previously worn to provide volume under their skirts – was replaced by the crinoline (Charles & Carl, 2010, 30).The crinoline augmented the size of the hips and changed shape to follow changing fashions in the desired feminine physique. In the early 18th century the shape of the crinoline was round, it then came oval and then ‘conical' (Charles & Carl, 2010, 30). By the mid 18th century they had become a ‘pannier' shape meaning ‘side hoops' or false hips' – a shape that was flat on front and back and extended on the wearer's left and right, giving her exceedingly wide hips (Cumming, Cunning & Cunning, 2010, 148). This is the shape we see in Pannier-Aligns illustration of Marie Antoinette in Figure 1 .In this illustration there are a number of elements of composition and execution that support the conclusion that the molding the Queen underwent were both expected and desirable at this time. There is t he artist's decision to place her in a standing position in which the full scale of her skirt can be realized, the addition of shading to its size. The enormity of the Queen's gown in relation to her head and the background of the portrait ensure that her curvaceous feminine shape instantly draws the viewer's eye.The artist's decision to contrast the rich, dark objects in the background with pale colors to illustrate her in the foreground again draws attention to this almost ethereal feminine form. One wonders how widely this image was distributed, given our knowledge of Marie Antoinette influence on fashion. Queen Marie Antoinette was known as the ‘Queen of Fashion' and her choices in clothing were closely documented, publicized and duplicated by women throughout the whole of Europe (Weber, 2007, 1).Her wardrobe has even provided inspiration for current designers such as Much Dulcet for her millennia collection at the Autumn/ Winter 2012/13 London Fashion Week and John Gillig an for his Spring 2010 Couture collection for Dior in Paris (Clarinda, 2012. Maida, 2010). The consequence of her choice to conform to the notion of molding her body, restricting and augmenting – wrought undergarments and fashion garments – to achieve the hourglass shape ensured this practice remained in fashion and in turn contributed to the social constructions of the feminine physical ideal.After the fall of the monarchy at the turn of the century this fashion of restricting and augmenting the body, molding it to achieve the ideal feminine' physique, persisted. The use of the waist- shrinking, bust- raising corset was continued into the nineteenth century, although steel boning began to be used instead of whalebone. By the mid sass, ‘cheap, mass-produced' corsets were developed and became a table of nearly every woman's wardrobe (Gag & Steele, 2005, 291).At this time, flexible sprung-steel rings suspended from cloth tapes' known as ‘Hopkins' were in fash ion and augmented the size of the wearer's hips (Gag & Steele, 2005, 317). The corset remained in fashion into the early twentieth century, when it had become a ‘straight front' corset that ‘pushed the pelvis back and the bosom forward,' forming the desired feminine physique at the time – the ‘S' silhouette (Gag & Steele, 2005, 293). The fashionable body in this period was augmented towards the back with use of a bustle skirt.In the sass, the fashionable female figure was ‘boyish and flat- cheated,' so the waist shrinking corset and wired underskirts became largely obsolete, but the practice of restriction remained in fashion as the breasts still had to be tightly bound, this time to conceal rather than enhance' (Smith, 1998, 5). In 1939, and then after World War II, Tallahatchie-Villas' image of ‘enhanced femininity with a tiny waist, ample bosom and large hips' returned to fashion again and brought with it the return of the corset and fuller sk irts (Tallahatchie-Villas, 2007, 36-37. Gag & Steele, 2005, 293).From the sass onwards the process of restriction and augmentation to achieve the desired feminine physique dictated by fashion at the time has continued. A review of more recent trends and products and fashion exemplars appears below. Currently there is no singular feminine' silhouette that is being dictated by fashion. In some areas of fashion media we are seeing the same boyish thinness as in the 2012). There are still some ‘corset enthusiasts' and elements of these undergarments such as boning and full skirts are still being used in many women's garments as well as in haute couture fashion.There is a myriad of other new garments encouraged by fashion for women to restrict, augment and mold their bodies into any desired shape. A few products currently on the market include the Wastepaper' – a tubular piece of Lascar worn to slim the waist and flatten the stomach; the ‘High-waist Long Leg Brief whic h is designed to provide ‘under-bust and tummy support, hip and thigh contouring, and a nice boost for your butt'; as well as ‘Padded Shaper Panties' which have two round foam pads to give you a ‘perfectly rounded derriere' and padded bras to increase bust size (Morgan, 2012).Compared to the days of corsets and crinolines, the variety of ways in which fashion encourages women to squeeze, expand and mold their bodies have grown. Figure 2 – Photograph of Lady Gaga at the 2009 MET Music awards. Photo courtesy of Getty Images, 2009 Lady Gaga, is Without question, the world's biggest pop star' and a current fashion icon (Robinson, 2010, 280). She famously morphs her body into the sexualities feminine hourglass shape with boning, padding and structured garments – often designed specifically for her by current avian garden fashion designers such asIn the above photograph (Figure 2) Lady Gaga is wearing a Jean Paul Guiltier padded and boned body suit, which d rastically shapes her figure into the curvaceous, hourglass silhouette of ‘enhanced femininity that Tallahatchie-Villas refers to (2007). The boning restricts the size of her waist while the underwear and padding on the cups over her breasts raise and shape the bust and the padding on her hips augment their size.Although this is an exaggerated example and would not be considered a ready- to- wear garment that women would be seen in on the street, Lady Saga's style choices are influential on how women choose to dress in mainstream culture. More than four hundred years after the first corsets and petticoats came into fashion, we see that the process of restricting and augmenting the female body to achieve a look considered to be feminine is still widespread.Through encouraging this practice and promoting a desired feminine physique that is difficult to attain naturally, fashion aids in the social construction of gender. An individual's choices about the clothes, make-up, accesso ries and styling that they adorn before venturing into public can communicate a lot about who they are. At the same time, the changeable and impermanent nature of these external applications means that no definite assumptions of a person's identity can be made and these variables can easily be manipulated by the individual, allowing them to become who they would like to be.An individual's unique interpretations of, and resistances to conventional fashions is known as ‘appearance style' and is a medium through which individuals can ‘announce' who they are or who they want to become (Gag & Steele, 2005, 34). There are some elements of appearance that we are accustomed to observing and processing almost immediately when we look at a person. For example when you see a stranger, it is highly likely that you will be able to tell if their gender is male or female almost instantly and their appearance style aids in this immediate recognition.When you observe the combination of t heir choice of hair cut, cosmetics, clothing, accessories, shoes and mannerisms; you can draw a conclusion about what gender that person is ‘announcing that they are. This shows that the individual has the power to manipulate these components of their appearance to communicate heir understanding of their personal gender identity. An example of how successfully appearance can provide an insight into gender identity and also how easily it can be manipulated can be seen through examining performances of Andre] Epic. Pelvic is biologically a man but models as both a male and a female.At his first fashion week – New York Fashion week Fall/Winter 2011/12 – he walked in five menswear shows and four womanlier shows and this number has since grown (Morris, 2011). Pelvic explains how he began to mold himself into the typically feminine aesthetic, creating an appearance style that would be read as male – he grew and dyed his hair, ‘started wearing skinny Jeansà ¢â‚¬ ¦ Shopping in the women's aisle and putting on make-up' (Morris, 2011). Pelvic was voted the ninety- eighth sexiest woman in the world in Fem.. ‘One Hundred Sexiest Women' list last year (Peck, 2011, 24). Figure 3 – Andre] Pelvic in ‘Hem' ad campaign.Photo courtesy of Hem from Hollywood Planet, 2011 wearing their ‘mega push up bra' underneath a close-fitted top and a figure hugging dress (Freeman- Greene, 2011). The bra is claimed to ‘add two cup sizes' to its wearer's bust, which it has achieved successfully with Epic's originally flat chest Quicker, 2011). His body has been manipulated so that his appearance style communicates his gender as female. His hair is long and blow-dried in a typically feminine style, he is wearing make-up and a necklace, his arms are void of hair and his body has been manipulated to augment the bust with padding.He attempts to channel the poses that female models often make by moving and looking at the camera in a flui d and dramatic' manner (Morris, 2011). The close up angle of the photos and the choice of shots where Pelvic is making direct eye contact with the camera enforces the believability of Epic's feminine appearance. The success of the communication of Epic's gender identity as female in this advertisement demonstrates the extent to which an individual can communicate who they are or would like to be through their appearance.As an audience we almost automatically assume Pelvic to be a ‘beautiful, Victorians Secret issue bombshell' (Abraham, 2011). This mutual communication and interpretation that can be achieved through manipulating the variables of appearance style allows for an individual's look to say much about who they are. Fashion aids in the social construction of gender through separating male and male fashion and promoting the stereotypical feminine figure.In numerous centuries past and continuing into the present, the practice of women using wire, steel, elastic and paddi ng to mould their bodies to the fashionable shape of the time has been common, even expected. We have examined how Queen Marie Antoinette encouraged this practice in the 18th Century by wearing a corset to nip her waist and enhance her bust as well as hoop pannier skirts to widen her hips. In the 21st Century it has been demonstrated that this body distortion is still common with pop con Lady Gaga wearing a boned and padded body suit that provides her with that feminine, hourglass shape.We then saw how this practice is so typically expected to be feminine that the biologically male model Andre] Pelvic can display his female gender identity by donning a padded bra. When examining these three examples, it becomes clear that the molding of the body into the feminine physical ideal through restriction and augmentation is communicative of the wearer's gender, whether intentional or projected by society, and provides an insight into who they are.

Monday, September 16, 2019

Paper on Summation

Sowmya SUMMATION A Detailed review of Summation SUMMATION Introduction The CT Summation Blaze LG product family helps you efficiently manage case information such as transcripts and documents with the benefits of full-text imaging, PDF support, electronic evidence support and comprehensive production tools. Summation to load and check DII File DII File: A DII file is a specially formatted ASCII text file that can be created within any text editor. The DII file uses a non-delimited, multiple line format. Each record ends with the image filenames themselves. The data from the file is loaded into Summation’s Core Database and establishes the link between the database summaries and the associated images and OCR documents. DII FILE COMPONENTS @T (Image Tag) Required for each DII record. Must be used before any @C tokens for each DII record. Each instance of a line beginning with the @T token causes Summation to create a new database record or overwrite an existing one. If the value that follows the @T line does not match an existing record number in the active table (usually either the STDTABLE or the ETABLE) then a new record with that number is created. If a record with that number already exists, Summation prompts the user to either replace that record’s existing image information or leave its image information intact. The field normally used to determine a record’s unique number is either the BEGDOC# field (for the STDTABLE) or the DOCID field (for the ETABLE). This field can be changed via OPTIONS>DEFAULTS>IMAGING>COLUMN TO HOLD IMAGE TAG but it is not recommended. If there is an input template on the database’s record number field, then the @T value must conform to the template format. Example: The case database has an input template restricting the BEGDOC# field to the format â€Å"AA000000† (i. e. alpha, alpha, numeric, numeric, numeric, numeric, numeric, numeric). A DII file with the following @T values is loaded: @T RT100556 @T 998113 The first line matches the template format and a new database record with a BEGDOC# value of â€Å"RT100556† would be created. The second line is incorrect, s o no database record for this line would be created and an error message would appear on-screen and also be written to the error log. D (Default Directory) Required for each DII record that has images or OCR to be loaded. The @D token designates the location where the image file(s) for a database record is stored. The data specified after the @D is loaded into the Default Directory (DEFDIR) field of the ImgInfo table. There are 3 different ways to denote the DEFDIR. 1. @I, which refers to the default IMAGES subfolder under the case directory. For example, for a mobile installation, if the case were SMITH V. JONES, â€Å"@I† would equal â€Å"C:PROGRAM FILESSUMMATIONCASEDATASMITH V. JONESIMAGES. † 2. The full path to the image file(s) location. A UNC, local, or mapped drive letter path is acceptable. For example: @D SERVER1IMAGESSMITH V. JONESVOLUME1DISK1 @D C:IMAGESSMITH V. JONESVOLUME1DISK1 @D Z:IMAGESSMITH V. JONESVOLUME1DISK1 3. @V, which refers to the specific volume label of removable media. NOTE: Users of Summation LG/iBlaze can use UNC paths after the @D to specify a folder containing images. @L (Long Name Entry) Summation 5. 21 Legacy Field. @L denotes the long name or description of the image file(s). The @L value is loaded into the LONGNAME field of the ImgInfo Table. This tag is obsolete and unnecessary on modern versions of Summation (1. 0 and higher) as they support long image file names. @C (Column to Link) 3 Optional token. @C is used to load data into specified fields in the user’s document database. This is a useful way to decrease the amount of data entry required for the database users. It is meant for use when the same value is repeated for a group of documents, such as documents that all have the same box number or author. It is not meant to replace regular data entry. For this reason, there is a limit of six (6) @C codes available for each DII record. The syntax for using the @C token is: @C For example, to fill in the ISSUES field of the database with the value â€Å"Mental Health,† the line would read: @C ISSUES Mental Health The @C line(s) should appear underneath the @T line for each database record. For consecutive DII records where these values are the same, you do not need to repeat the @C line. Instead, insert the next @C line in the next DII record where the data changes. To stop entering data in a field, insert a @C line with the field name following by nothing. @I (Image Location as in Case Customize) Used with the @D token. The @I value refers to the image location specified in Case Customize. The @I value is loaded into the DEFDIR field of the ImgInfo table. This location must be a drive letter (or UNC path for LG/iBlaze users) and path that points to the directory where the images are stored. Summation users can select any valid location or use Summation’s default location, the IMAGES subdirectory under the case directory. In either case, the image files must be copied to this location. @V (Volume Label of Removable Media and Any Subdirectories) Used with the @D code. The @V value refers to the volume label of the removable media holding image files. When using a volume label, the program will search a range of drive letters for the specific removable media volume. The range of drive letters to be searched can be specified in OPTIONS>DEFAULTS>IMAGING>DRIVES HOLDING IMAGES. The volume label can be obtained from any drive by using the DIR command at the command prompt or by looking at the drive properties in Windows Explorer/My Computer. When using the command prompt, the volume label will appear at the top of the directory display listing. Since most document images are now stored on either local or network hard drives Summation has provided an option to convert volume labels to directory names for existing database records with @V image paths. By selecting the option box labeled â€Å"Map Volume to Directory† under OPTIONS>DEFAULTS>IMAGING the volume name is converted to a directory name. A drive letter or letters matching the location wher e the images are stored must be added in the OPTIONS>DEFAULTS>IMAGING>DRIVES HOLDING IMAGES section. For example: DEFDIR in ImgInfo Table: @VCD_00001:01 Drives Holding Images: DE Program looks in: D: or E: drive for media with a volume label of â€Å"CD_00001. † If it finds matching media, it looks for a directory there named â€Å"001† for whichever image file or files were specified. @Fulltext (Lets the Database Know There is an OCR Document Attached to the Record or Records) Tells Summation that there are OCR documents attached to the record. The filenames must match the names of the images (not including the extension), and they must be located in the same place. Variations: @FULLTEXT DOC – One OCR text file exists for each database record. FULLTEXT PAGE – One fulltext file exists for each page of the document summary. @FULLTEXT [PAGE or DOC] is placed before the @T line. Similar to the @C token, this statement remains in effect until turned off by using the opposite designation. In other words, if you are using the â€Å"PAGE† method, turn it off by using @FULLTEXT in the record that does not contain a fulltext file. @O (Where OCR Documents Are if They Are Not in the Image Location) Used when the OCR documents are located someplace other than the image location as specified by the @D line of the DII file. It is placed immediately below the @D line. This token can ONLY be used in conjunction with the â€Å"@FULLTEXT DOC† tag. The full path to the OCR text document must be included. Example: 5 @FULLTEXT DOC @T AB100001 @D @I @O J:docsscanned 100001. TIF This tells Summation that the fulltext document for record AB100001 is not in the default Images directory (@I) but, instead can be found in J:docsscanned. The file name must still match the image file name. In this case the image file name is 100001. TIF, therefore the OCR text file name should be named 100001. TXT. ; (Comment Lines) Optional code for each DII record. You can make comments in the DII file for your reference. These lines do not affect the DII load. Example: ; After this Semi-colon I can make notes for my current record Image Files Required for each DII record. The last line(s) of each DII record is always the image filename(s). Backslashes in front of the filenames will direct Summation to look for the files at the root of the specified drive however, these can usually be omitted. Iterators Iterators are important optional coding methods. Iterators provide a way to use shorthand for image file names. This allows for less text per DII record, thereby producing a DII file that loads more quickly. If your image files use a number sequence, you can use iterators to indicate a range of numbers, rather than listing each image file separately. Ranges are only valid when the lower number and the higher number are the same number of digits. Files Listed Separately Example: IM00001. TIF IM00002. TIF IM00003. TIF IM00004. TIF IM00005. TIF Files Iterated Example: 6 IM000{1-5}. TIF If iterating records with attached full text (OCR) documents in PAGE format, be careful not to exceed powers of 10 in the iteration. Example: IM0000{01-09}. TIF IM0000{10-99}. TIF IM000{100-999}. TIF The example above will properly load all 999 images and their corresponding OCR full-text documents. This rule applies to the @FULLTEXT PAGE format only. Tokens Used in Summation’s DII File Token @APPLICATION Field Populated APPLICAT @ATTACH ATTCHIDS (Field selected for related attachment Doc IDs in Link Fields defaults) @ATTACHRANGE ATTRANGE Description The application used to view the electronic document. For example: @APPLICATION Word IDs of attached documents. Appending the value allows the DII to populate multiple values in the ATTCHIDS field. For example: @ATTACH EML0001; EML0002 The document number range of all attachments if more than one attachment exists. Each attachment, along with the e-mail message, will be loaded into Summation as its own record. The attachment 7 @ATTMSG @BATESBEG @BATESEND @BCC @C range would be populated with the document number of the first attachment and the last number of the last attachment. For example: @ATTACHRANGE WGH000008 – WGH0000010 N/A Relative or full path and file name of the e-mail attachment that is an email message itself. The file will be copied to the MSF folder. The Media field will be populated with the term eMail and the FOLDERID field is coded with the session name assigned during the load of DII. BATESRNG Beginning Bates number, used with @BATESEND. For example: @BATESBEG SGD00001 BATESRNG Ending Bates number, used with @BATESBEG. For example: @BATESEND SGD00055 BCC Anyone sent a blind copy on an e-mail message. For example: @BCC Nick Thomas Optional code used to load data into specified fields in the user’s document database. This helps decrease the amount of data entry required for the database users. It is meant for use when the same value is repeated for a group of documents, such as documents that all have the same box number or author. The syntax of using the @C token is: @C For example, to fill in the ISSUES field of the database with the value Mental Health, the line would read: 8 @C ISSUES Mental Health For consecutive DII records where these values are the same, you do not need to repeat the @C line. Instead, insert the next @C line in the next DII record where the data changes. To stop entering data in a field, insert an @C line with the field name following by nothing. @CC CC @D DEFDIR @DATECREATED DATECRTD @DATERCVD DATERCVD @DATESENT @DATESAVED DATESENT DATESVD Anyone copied on an email message. For example: @CC John Ace Required token for each DII record that has an image associated with it and designates the directory location of the image file(s). The data specified after the @D goes into the Default Directory (DEFDIR) field of the ImgInfo table. There are three dif ferent ways to denote the DEFDIR: 1. @I (to refer to the Case Customize Image Location) 2. The hard coded drive letter and path into the DEFDIR field 3. V (to refer to the specified volume label of the CD-ROM) For example: @D @V CD-101:Box_34 Note: Users of Summation iBlaze/LG can use UNC paths after the @D to specify a folder containing images. The date that the file was created, if applicable. For example: @DATECREATED 01/04/2003 Date that the file was received. For example: @DATERCVD 01/04/2003 Date that the file was sent. For example: @DATESENT 01/04/2003 When the file was saved, if applicable. For example: 10 @DOCID DOCID @EATTACH DOCLINK (Field selected for Linked Documents in Link Fields defaults. ) @EDOC DOCLINK DATESAVED 01/04/2003 Document ID of a full-text document, e-mail message, or electronic document. If the DII includes full-text files, then the DOCID value (instead of the @T value) is used to load and associate ocrBase documents with the appropriate summary. For exa mple: @DOCID EML00017 Relative or full path and file name of the attachment. The file will be copied to the eMail directory and the relative path of the file will be placed in the DOCLINK field. The MEDIA field will be populated with the term Attachment. For example: @EATTACHServerFiles Flood Damages. ls Relative or full path and file name of the electronic document. The file will be copied into the eFiles directory and the relative path of the file will be placed in the DOCLINK field. The MEDIA field will be populated with the term eDoc. For example: @EDOC D:eDocWordDoc. doc 11 @EDOCIDSEP DOCID @EMAIL-BODY BODY @FOLDERNAME FOLDER This token is intended for service bureaus that use their own tracking numbers (for example, TRACK001_Doc001. txt). This token allows Summation to remove the tracking ID (TRACK001) from the file so that it can be replaced with a Summation naming convention. The token uses a onecharacter string a value to indicate the demarcation in the file name. In the example above, the underscore character separates the tracking number from the file name, so the token should be followed by the underscore character. Use this character at the top of the DII file above the individual records. For example: @EDOCIDSEP _ Body of an e-mail message. Must be a string of text contained between @EMAIL-BODY and @EMAIL-END. The @EMAIL-END token must be on its own line. For example: @EMAIL-BODY @EMAIL-END The name of the folder that the e-mail message came from. For example: @FOLDERNAME Conner-Stevens – MailboxCStevensInbox 12 @FROM @FULLTEXT FROM From field in an e-mail message. For example: @FROM Kelly Morris Indicates that there are OCR documents attached to the record. The file names must match the names of the images (not including the extension), and they must be located in the same place. Variations: @FULLTEXT DOC – One full-text file exists for each database record. @FULLTEXT PAGE – One full-text file exists for each page of the document summary. These tokens should be placed before any @T tokens. Similar to the @C token, this statement remains in effect until turned off by using the opposite designation. In other words, if you are using the PAGE method, turn it off by using @FULLTEXT in the record that does not contain a full-text file. The @FULLTEXTDIR token is a partner to the @FULLTEXT token. This token provides more flexibility to both the service bureau and the client when loading a DII file that includes full-text files. The @FULLTEXTDIR token allows the service bureau to specify a directory from which the full-text files will be copied during the load. Therefore, the full-text files do not have to be located in the same directory as the images at the time of load. The @FULLTEXTDIR token gives users the flexibility to load the DII file and full-text without requiring them to copy the fulltext to the network first. An example of the syntax used with the @FULLTEXTDIR token is: @FULLTEXTDIR Vol001Box001ocrFiles The above example shows a relative path, which indicates to Summation that 13 @FULLTEXTDIR @HEADER HEADER @I DEFDIR @INTMSGID INTMSGID it should search for the full-text files in the same location as the DII file that is being loaded and follow any subdirectories in the @FULLTEXTDIR argument. The relative path works whether the DII file is on a network drive or on a CD as a sibling of the Vol001 folder. Just as @FULLTEXT PAGE and @FULLTEXT DOC apply to all subsequent records in the DII file until they are turned off (by adding the token after the last record that includes fulltext), the @FULLTEXTDIR argument applies to all subsequent records in the DII file until it is changed or turned off (by including the token with a blank argument). E-mail header content. The @HEADER-END token must be on its own line. For example: @HEADER @HEADER-END This token is used with the @D token. The @I token refers to the image location specified in Case Customize. This location must be a drive letter (or UNC path for iBlaze/LG users) and path that points to the directory where the images are stored. Summation users can select any valid location or use Summation’s default location, the IMAGES subdirectory under the Case Directory. In either case, the image files must be copied to this location. Internet message ID. For example: 14 @L LONGNAME @INTMSGID This token is optional code and denotes the long name or description of the image file(s). The data after @L goes into the LONGNAME field of the ImgInfo table. Note: This applies to Summation Blaze Version 5. 21 and earlier, and is used in the IMGINGO table. For example: @L Patient History Form @MEDIA MEDIA @MSGID MSGID Populates the Media field with the designated value (for example, eDoc, eMail or Attachment). If the value indicated in the token differs from the Summation default, or an entry exists in the field, then the most recent process wins and an entry is made in the error log. Because of this, use this token with care an only if you have a compelling reason. For example: @MEDIA eDoc E-mail message ID generated by Microsoft Outlook or Lotus Notes. For example: @MSGID 00000000E8324B3A0A80 0F4E954B8AB427196A13 04012000 15 @MULTILINE Any field specified @NOPAGECOUNT DOCID Allows carriage returns and multiple lines of text to populate the specified field. Text must be between @MULTILINE and @MULTILINE-END. The @MULTILINE-END token must be on its own line. For example: @MULTILINE NOTEFIELD Here is the first line. Here is the second line. Here is the last line. @MULTILINE-END For consecutive DII records where these values are the same, you do not need to repeat the @MULTILINE line. Instead, insert the next @MULTILINE line in the next DII record where the data changes. To stop entering data in a field, insert an @MULTILINE line with the field name following by nothing Turns off automatically using a number after a space in the Document ID as the number of pages. Allows Document IDs to contain spaces. Must be entered at the beginning of the DII file and applies to all records for the entire DII file. @NOPAGECOUNT @FULLTEXT page @TGHSPLT 3602 Q00555 @D @I Box011Dir01GHSPLT 3602 Q00555. tif 16 @OCR @OCR-END @O Some service bureaus and clients prefer a different approach to loading full-text than the traditional Summation method of requiring the full-text to be loaded from separate ASCII text files. Some clients prefer including the full-text in the DII file itself. The @OCR and @OCREND tokens give service bureaus the flexibility to include the full-text (including carriage returns) in the DII file. This method of loading full-text significantly improves the speed of the DII load, by eliminating the need for the system to search for and locate each text file and open it to copy the text into the ocrBase. The @OCR-END token must appear on a separate line. Note: When using the @OCR and @OCR-END tokens and including the full-text in the DII file, service bureaus cannot apply page breaks at specific locations in the full-text document. An example of the syntax used with the @OCR and @OCR-END tokens is: @OCR @OCR-END There are two uses for the @O token. This token is used when the full-text documents are located someplace other than the image location as specified by the @D line of the DII file. It tells Summation that there are full-text documents at this location. It is placed immediately below the @D line. There can be only one text file for the record, and it must have the name of the 1st TIFF image with a . TXT extension. The full or relative path to the full-text document must be included. For example: @O J:docsscanned 17 @PARENTID PARENTID (Field selected for Parent ID in Link Fields defaults. ) Parent document ID of an attachment. For example: @PARENTID WGH000003 @PSTCOMMENT @PSTCOMMENT-END Users may want to record information about a . PST file that is loaded into a Summation case. For example, a user may want to identify where a specific . PST file came from and what it relates to (for example, client e-mail messages related to flat space and received on April 26, 2004). The comments are associated with the . PST file designated by the @PSTFILE token that follows. The comments can be viewed from the e-mail and attachment records generated from the . PST file designated in the @PSTFILE token. The @PSTCOMMENT token is used in conjunction with @PSTFILE. It should be followed by the @PSTCOMMENT-END token and must appear before the @PSTFILE token it applies to. The @PSTCOMMENT-END token must appear on its own line. For example: @PSTCOMMENT @PSTCOMMENT-END @PSTFILE EMAIL001Pfranc. pst, Pfranc_04April_2004 Note: The comments will not be written to the Core Database record in Summation, but users can review the comments by right-clicking an e-mail record and selecting the Show PST Info option. 18 @PSTFILE The @PSTFILE token is used to process the . PST file by designating: 1) the location of the . PST file at the time of load, and 2) the unique ID of the . PST file. The path to the . PST file can either be hard-coded or relative to the location of the DII file at the time of load. The unique ID should be the same value assigned by the user to the . PST file when processing using Summation’s eDiscovery Console. If either necessary value is missing, the DII load will record an error and the . PST file that corresponds to the record with the missing information will not be processed. An example of the use of @PSTFILE: @PSTFILE EMAIL001PFranc. st, PFranc_04April_2004 Summation gathers this information but does not process the . PST file until the DII load is complete. The PSTID (the second value) is populated into the PSTID field as designated on the eMail tab in the Defaults dialog box (accessed from the Options menu) in Summation. The PSTID argument assigned by the @PSTFILE token is assigned to the record it appears in and will apply to all subsequent e-mail records. The argument is applied until either the @PSTFILE token is turned off by setting it to a blank argument (such as: @PSTFILE), or the argument changes. The @PSTFILE token can occur multiple times in a single DII file and assign a different argument each time. This allows the service bureau to process multiple . PST files and present the data for all . PST files in a single DII file. For example, a service bureau can process five . PST files and include five instances of @PSTFILE tokens with five different arguments, all in the same DII file. 19 @READ READ @RELATED OTHERIDS (Field selected for Related Document IDs in Link Fields defaults. ) STOREID Notes whether the e-mail message was read. For example: @READ Y The document IDs of related documents. @RELATED WGH000006 @STOREID @SUBJECT SUBJECT The . PST identifier. Should not be used if @PSTFILE is used. For example: @STOREID The subject of an e-mail message. For example: @SUBJECT Town Issues 20 @T IMGTAG This token is required for each DII record and designates the ImageTag. It must be the first item listed for each database record. This data specified after the @T goes into both the Image Tag (IMGTAG) field in the ImgInfo table and the Column to Hold ImageTag in the Document Database. The image tags must be unique values. For this reason, many users choose the document number as the image tag. The image tags establish the link between the document database table and the ImgInfo table. When a user is in a document database record that has a corresponding image file and they want to view the image, Summation looks at the value in the Column to Hold Image Tag field in the database and reads the image file location from the ImgInfo table record with the matching value in the Image Tag field. For example: @T CR00293 1 Note: If there is a template on the Column to Hold Image Tag field of the user’s document database, then the Image Tag must conform to the template format. For example, if the template 21 forces the field to contain a certain number of digits, any image tag values that are comprised of fewer digits must be appropriately zero filled. @TIMERCVD TIMERCVD @TIMESENT TIMESENT @TO @TRANS TO DEPOIDS (Field selected for Transcript Zoom in Link Fields defaults. Time that the e-mail message was received. For example: @TIMERCVD 11:00 a. m. Time that the e-mail message was sent. For example: @TIMESENT 10:59 a. m. To field in an e-mail message. For example: @TO Conner Stevens The transcript description. The value populates the Transcript Zoom field. For example: @TRANS conner stevens v1. txt 22 @V This token is used with the @D token and refers to the volume label of the image location. By using a volume label instead of a drive letter, the user does not have to use the same drive letter designation for their media as had been used by the service bureau. The @V token is used most often with the images that are being burnt onto CD ROMs. Substitute the volume label for the drive letter in the @D line, still including the path leading up to and including the directory in which the images are located. The Summation user must set up the Drives Holding Images in the case Imaging Defaults so that Summation knows on which drive(s) to look for the specified volume(s). The volume label can be obtained from any drive by using the DIR command at the command prompt or by looking at the drive properties in Microsoft Windows Explorer/My Computer. When using the command prompt, the volume label will appear at the top of the directory display listing. Use the Map Volume to Directory option in imaging defaults if your images are on CD-ROM, you have used the @V (volume label) code in your DII file, and the volume label of the CD(s) is also the first subdirectory. Enabling this option tells Summation to map the volume label indicated after the @V in the DEFDIR line of the ImgInfo table to the drive letter(s) set in your Drives Holding Images: @Vol:=>A:vol. Example: DEFDIR in ImgInfo Table: @VCD_00001: Drives Holding Images: D Maps to: D:CD_00001 This option is commonly used when the CDs are stored on a Meridian tower, or 3 when the volumes have been copied to a fixed drive from a CD ROM and t BENEFITS OF USING A DII FILE TO LOAD IMAGE SUMMARY INFORMATION The DII file is a formatted ASCII text file that is used to load large batches of images. The DII file is loaded in Summation from Imaging Defaults, using the Read DII utility. DII data is added to Summations Image Information (ImgInfo) Table and serves as the link between your docum ent database data and the images and/or ocrBase documents. The Image Tag is the unique identifier for each image and/or ocrBase document. When you load the DII file, Summation will alert you if any of the Image Tags (document IDs) already exist in the ImgInfo Table and give you the option to overwrite the existing record(s). When used correctly, a DII file can significantly reduce data entry time. 24 Batch Loading of Image Summary Information The major advantage of using a DII file is the ability to load summary information for thousands of images at a time. The summary information is encoded within the DII file and the summary records for each designated image are automatically updated as the file loads. In this way, thousands of summary records can be updated, giving users easy access to thousands of associated images. Reduced Coding Coding and typing can be reduced by using the @C (Column to Link) designator. @C is meant for use with documents that are categorized into groups and therefore contain repetitive data (not to replace data entry! ). It is meant for use by imaging service bureaus that are supplying you with a DII file before you begin coding, thereby creating new database records. Each record is limited to 6 @C lines. For example, suppose the service bureau is scanning and coding numerous medical records pertaining to various doctors. The records to be scanned are already sorted by doctor, and due to the nature of medical records, they are also sorted by patient. If you want to have fields filled in within the database as linked records are created, the doctor name and patient names need not be entered repeatedly. Summation assumes that the preceding doctor and patient names are to be used again in the current record if no new names are entered. Error Checking Summation will check to see if duplicates of the new records already exist within the Summation database. When a duplicate is encountered, the Summation user is prompted to either overwrite the existing record or ignore the new record. When the program encounters errors with a particular record during loading, they are documented in an error file. The error file is created in the directory of the case where the DII file is being loaded and has the same name as the DII file except with a â€Å". LOG† extension instead of â€Å". DII. † This error file lists the type of problem and its location (by line number) within the DII file. This log file is written in simple ASCII text format and can be opened with any text editor including Windows Notepad, Wordpad, and Microsoft Word. Example: A DII file named â€Å"DISK1LOAD. DII† is loaded into the â€Å"SMITH V. JONES† case. If errors are encountered during loading, they would be written to a file titled â€Å"DISK1LOAD. LOG† in the Summation program folder under the CASEDATASMITH V. JONES subfolder. 25 Simultaneous Data Entry and Scanning If users coordinate with either an outside vendor or an internal department to scan their documents, they can begin the work of summarizing the documents while they are being scanned. The customer and the scanning group must coordinate the document numbers and names to be used in advance. ) When scanning is complete, the vendor or scanning department can deliver the scanned image files and/or full-text documents to the customer on any removable media the customer’s system is compatible with. Can replace previous entries for tags There are times when organized coordination of document image tags between you and the imaging service bureau is not possible. In this case, it is easier for you to summarize the documents after receiving the files and matching DII file from the service bureau. When the DII file is loaded, it creates database records as it fills the ImgInfo Table. The only information in such a database record is the image tag. The DII data is loaded into the ImgInfo Table and the Image Tags are loaded in the Column to Hold Image Tag (The field in the document database containing the unique image tags for each image in the case. This is often the field that contains the beginning document number, although it may be a special field created for this purpose. The Column to Hold Image Tag cannot be a multientry field; it must be an integer, text or note type field. field of the database table. It is also possible to have additional fields filled in as the linked records are being created. These are linked through the use of the optional @C designator. STARTING WITH SUMMATION Starting A New Case To begin loading evidence into a case, you must start a new case that does not contain information. To start a new case: 1. From the Case menu, select New. 26 2. Assign a name to your case and click OK. 3. When prompted click Yes to assign a password to your case or No to create a case that is not password protected. BACKING UP AND RESTORING DATABASES Both the Core Database and the Notes Database should be backed up regularly to protect against loss of data in the event of database corruption. If you are operating on a network, you may still wish to create an independent backup of these two key components. After backing up the Notes and Core Databases, you should consider running additional utilities to keep the databases â€Å"tuned up†. To Backup the Core and Notes Databases: 27 1. Click once on the case name in the Case Explorer window so that it is selected. 2. Access the Backup utility by: ? Opening the CASE menu and electing Tools OR ? Right-clicking on Core Database in the Case Explorer and selecting Core Database Utilities Select Backup Database†¦ The backup window opens with both the Database and the Notes database options checked. Leave both options checked. Click on Backup. You will be advised when the databases have been successfully backed up. Click OK. LOADING IMAGES WIT H A DII FILE A DII (Document Image Information) file is a text file formatted to batch load summaries with images into a Summation database. Loading database summaries and image information using a DII file is more efficient. Preliminary Steps To help ensure the successful load of images using a DII file, the following steps should be taken prior to loading: ? Open the case into which you want to load the images. ? Back up your database. (From the Case menu, select Tools, Backup Database, and Backup. ) ? Verify the location that Summation has designated for images for this case (the @I value for this case). (From the Case menu, select Customize to open 28 the Case Directory Customization dialog box. ) Note the value in the Image Location field. The default value for this field is a single folder name (such as IMAGES). If the Image Location field contains a folder or folders without a drive letter, then this location is relative to the path in the Case Directory field. However, if the field contains a drive letter followed by a path, then this is the absolute value of Summation’s image path for this case. Most of the time, the Image Location is relative to the Case Directory path. To verify the complete path, simply connect the Image Location value to the end of the Case Directory path. You may want to copy and paste these values to a Notepad document to keep track of them. Example: ? Case Directory field – :PROGRAM FILESSUMMATIONBLAZECASEDATAMY NEW CASE ? Image Location field – IMAGES ? Complete image path – C:PROGRAM FILESSUMMATIONBLAZECASEDATAMY NEW CASEIMAGES The image path is the location that Summation has designated for the images for this case (the @I value for this case. ) ? Verify the images path in the DII file by opening a text editor and locating the image path after the @D token. Example: Sample DII-01 shows the following value: @D @I @D is the default directory of the image files. I is a value that works in conjunction with the @D token to load the image path into Summation’s database. Using the previous case image path example, the @D line would be converted by Summation as C:PROGRAM FILESSUMMATIONBLAZECASEDATAMY NEW CASEIMAGES @I is used to specify the image location. Alternatively, @V or a hardcoded path can be used to designate the Images directory. This tutorial assumes that the DII file is using @I, since that is the most common syntax. The image path can be extended by appending additional subdirectories after the @I value. Example: @D @I estdata1 29 Continuing with the previous example, this @D line would be converted by Summation as C:PROGRAM FILESSUMMATIONBLAZECASEDATAMY NEW CASEIMAGESTESTDATA1 @V Designations. Reading about @V is only necessary if your DII file uses the @V value to designate the image path. If your DII file uses the @I value, skip ahead Step 5. The @V value is a legacy format designation that allows Summation to locate and display image files stored on removable media (such as CD-ROM, DVD, etc. ) by volume name (the disc label). Vendors will typically supply two versions of a DII file: one that uses the @I value and one that uses @V. In almost all cases the preferred version to load is @I. Hard-Coded Path Designations. Reading this section is only necessary if your DII file uses a complete path including computer name or drive letter to designate the image path. If your DII file uses the @I value, skip ahead to Step 5. Summation will accept a complete path value following the @D token, but in order for Summation to display the document images, this path must be valid from the workstation accessing the case in question. Example: @D R:IMAGESDISC101 If a workstation accessing the case in which this DII file was loaded did not have an â€Å"R:† drive correctly mapped to the image file location attempting to view the image(s) would fail. ? Copy the images to the correct directory. ? Before copying IMAGES directory structure, merge all the OCR’s . txt files with the corresponding tiffs. To copy the images: 1. Open Windows Explorer (right-click Start and select Explore) and note the image path you verified in Step 3. NOTE: You can browse to this path quickly by copying and pasting the path from Step 3 into the Address field and pressing Enter. This is the directory that you will copy the images to. 2. Browse to the images that need to be loaded. These images might arrive to you on a CD, a DVD, or an external hard drive. In any case, browse to the images and prepare to copy them to the image location on your computer’s hard drive. 3. Copy the images from the CD, DVD, or external hard drive to the images location. 30 NOTE: It's important to copy the correct folder and subfolders. Verify this first by copying the first directory after the @I token in Step 4 above. Example: (A) @I value from the DII file: @I estdata1 (B) Folder to copy from the CD: D: estdata After verifying the correct folder containing images, copy it to the image path from Step 3 above. After the folders containing images have been copied to the correct image path directory, you are ready to load the DII file. This will populate Summation's database and will allow you to view and manage these images through the Summation interface. Loading the DII File 1. From the Options menu, select Defaults, and click the Imaging tab. 2. Verify the Column to Hold Image Tag. If you are currently using the standard form/table (STDTABLE), the Column to Hold Image Tag field should be set to BEGDOC#. If you are currently using the e-form/table (ETABLE), the Column to Hold Image tag field should be set to DOCID. NOTE: Documents are added or updated by a DII file based on the values in the field selected in the Column to Hold Image Tag. If a value listed after the @T token does not exist in this field for any record, a new record with this value is created. If the value does not exist, then this record's image information is updated. Click OK to save your settings. From the Options menu, select Defaults, and click the Imaging tab, and click Load DII File button. Browse to and select the DII file, and click Open. Click OK. The DII file is loaded into Summation's database and your images can now be viewed and managed through the Summation interface. 3. 4. 5. 6. CHECKING DII FIELDS 1. Right-click on core database in case explorer. 2. Select â€Å"set view to open† option, and check for Column view, Form view, Image viewer, ocrBase viewer and eDocs viewer. Select required view in â€Å"View in focus when opened† window and click ok. 3. Right click on core database and open. 31 . Dialog box appears as below opening in all the formats that are checked in the step 2. 5. Select column view by clicking on that label. 32 6. Before editing anything, change the database to edit mode from display mode. ( right-click on the column and check edit option). 7. Double click on the fields label. 8. You will find a small field list table containing a ll the available fields. 33 9. Double click on any field to bring it to view or to hide it from the view. This way we can add or remove required fields and can check whether all the fields have generated correctly in the loaded dii file. 10. Once all the required fields are selected, right click on any of the label and check display to come back to display mode. 11. Click on eDocs, Image, ocrBase or form in the lower toolbar to view in the respective format. ADDING FIELDS TO DATABASE 1. Fields are added through the Form Editor. To access the Form Editor, select â€Å"Options –> Utilities†, then select the â€Å"Create or Modify Forms † options. This will launch a separate window called the Form Editor. Now you will want to decide where you want your new field to reside. 34 Figure: Form editor 2. You may need to reorganize the form to fit the custom field. The Form may be resizable just like any window, by dragging the cursor near the corners to bring into view the resize cursor (the thin black line with arrows on either end). Click and drag to resize the form if necessary. 3. A light line around fields denotes a frame grouping of selected fields on the form. To resize the frame, click your cursor on the line until small black squares surround the frame, then click and drag them. 4. On the small floating toolbar, click on the button denoted with an ‘ab'. 5. Click on the form where you want to place the new field. A small dialog box will open, listing the currently available fields in the selected form. 6. Click on the â€Å"New† button to create a new field. 7. Assign a name and data type to the new field. 35 A field NAME must not contain any special characters or spaces, and must be less than 8 characters long, because Summation references the field name internally. The field label may be customized to the users preference. 8. Once you have assigned a name and label, you need to select a data type. It is important to put some thought into selecting a field data type, since you cannot change the data type on a field once it has been created. If you are unsure of which data type to assign to your field, click on the radio button next to each option to view a brief description in the bottom portion of the dialog box. 9. Click â€Å"Create New Column†. When prompted that the column was created successfully, click â€Å"OK†. 10. Click †Close† to return to the Field List dialog. If you should need to create multiple fields follow steps 7 through 9 until all fields have been created. 11. The new field should be one of the choices and will be selected by default. Click â€Å"OK† to select the new field and place it on the form. To adjust the field's position on the form, click and drag it to a different location. To adjust the field label and the field box individually, click anywhere on the form to unselect them. Then click back on the item you want to resize or reposition. 12. When you have successfully created, sized and positioned all custom fields, click on the â€Å"Save† icon in the toolbars. If your database contains data in it, you will be prompted to copy data to new table structure, click â€Å"OK†. 13. Close the Form Editor by selecting â€Å"Exit† from the â€Å"File† menu. 14. Click â€Å"Close† to close the Utilities dialog. To Load ocrBase Documents Using the Load Full-Text Documents Dialog: 36 Double-click on ocrBase in Case Explorer OR select ocrBase from the VIEW menu. Make sure ocrBase is in the active view. 1. From the FILE menu, select Load ocrBase Documents. 2. Select the Choose Files tab. 3. The default directory shown is the current case directory or the last directory selected using the Browse button. If the documents are located in another directory, click on Browse to navigate to that folder. 4. Select the files you want to load using any of the following techniques: ? Hold Ctrl and click on the document files one at a time ? Hold Shift, click on the first document file, then click on the last document file ? Click on the first document file, then hold the left mouse button down as you drag to the last document file you wish to load ? Select the Select All option to load all document files in the files window ? To cancel the selection of a file, click on the filename again 5. If you want Summation to verify the document numbers against any templates associated with the Column to Hold Image Tag field (BEGDOC# or other field, as needed), leave Check Templates selected. If you do not want the document numbers verified against any existing templates, clear the Check Templates selection. 6. Select one of the options in the Document ID (BEGDOC#) section: ? Ask Me (default): During the loading process, you will be prompted to enter a Document ID number for each document file being loaded. ? Use Filename: The document filename will be used during the loading process as the Document ID. 7. Click Load Documents. Summation loads the documents into the ocrBase. SEARCHING (Before doing any kind of search, make sure Core Database box is checked in case explorer) 37 . Check on the core Database in the case explorer. 2. Open the database in the column view. 3. Double click on â€Å"Searches† under the Core Database Views in case explorer. 38 4. Core Database Query dialog box appears. 5. Select the required field in â€Å"Search one of these Fields†. Click on â€Å"More fields Choices† to choose from more number of fields. Double click on the required field and see that Query appears on the query box below. 6. Same way give the required values in the section 2 & 3. 7. Execute the query. For example, Consider searching for docDates. Steps: 1. Click on docDate box under â€Å"Search one of these fields† (section1). 2. Scroll down on the drop down list, â€Å"in this manner† (section2) section and select the required field. 3. Enter the date in â€Å"For this value† (section3). 4. Full Query appears on the query box. 39 5. Click Ok to execute the query. 6. All the documents that match with the query will be listed. 7. To retrieve back all the documents, Go to Search-;Retrieve all summaries. QUICK SEARCH USING CASE EXPLORER When you use the Case Explorer to search the Core Database, the results appear in the Search Results format. The search results can be printed in the stacked format directly from the Search Results View. To Quick Search using the Case Explorer 1. Make the Case Explorer window the focus. 2. Click the check boxes next to the components you wish to search (e. g. Core Database, Transcripts, Transcript Notes, ocrBase). ? ? ? ? ? Core Database Transcript Notes eDocs & eMail ocrBase Notes ocrBase 40 ? Chronology of Events ? People ? Pleadings 4. Click in the Quick Search box. Depending on what combination of case elements you have selected, the Search dialog appears. Here you can change your search results Sort Order and/or specify running a Standard or HotFacts only search. 4. Type the search term or phrase in the white Quick Search box. You can use wildcards and compound operators (AND/OR connectors) in your search. ? Multi-character wildcard = an asterisk (*) ? Single-character wildcard = a question mark (? ) ? AND connector = & or AND (there must be spaces between the AND and the words) ? OR connector = (a backwards slash usually located above the Enter key on your keyboard) or OR (there must be spaces between the OR and the words) ? You can also use Intelli-Parse if you wish to conduct field-specific searches Click the Search button to run the search. The search results will appear in a new Search Results window. COMPOUND SEARCHES CONNECTORS IN THE DATABASE: 41 Connectors make it easy to search for document summaries where varying conditions are to be used, for example, to find document summaries where a name is in a summary field and where a certain type of document is involved. Connectors can also widen the search to include summaries of several sorts; such as, summaries concerning documents dated in the current year or any documents mentioning the defendant. As a general rule, using the connector AND narrow the search, while using the connector OR widens the search. Up to 10 connectors can be used in a search of the document summaries. Search Connectors Connector AND Definition A summary contains both values Summaries contain either of the values Example DOCDATE EQ 5/15/90 AND DOCTYPE OR DOCDATE EQ 6/15/90 OR DOCDATE EQ 7/12/90 AND NOT This excludes a NAME EQ â€Å"Smith, J. † AND NOT DOCTYPE EQ summary that Memo meets the connected value This requests NAME EQ â€Å"Smith, J. † OR NOT DOCTYPE EQ OR NOT 42 ocument summaries where the Name equals â€Å"Smith, J. † or the Doctype field does not equal Memo Memo You can create a more complex Quick Search by combining search clauses. To narrow the search, use the AND connector, designated by the ampersand (&). To broaden the search, connect your search clauses using the backslash () to represent the OR connector. You may use a total of ten clauses (i. e. , any combination of up to nine AND and/or OR connectors). Use parentheses to denote precedence or relationships between clauses within the search phrase. Sample ‘OR' Search: bill presley Sample ‘AND' Search: fire & terminate It makes no difference whether or not you put spaces between the words and the connectors. DRILL DOWN SEARCHING If you're reviewing a transcript on screen and come across a term of interest, you can search for other occurrences of that term without losing your focus by using Summation's Drill Down Searching function. Simply highlight the term of interest, right mouse click, and select â€Å"Search for ‘term'† from the menu that appears. Summation will take you to the next occurrence of the term. 43 How to Run a Drill Down Search 1. Open a transcript. 2. Right click on the text for which you want to search. 3. From the right click context menu that appears, select â€Å"Search for ‘text'. † Summation goes to the next occurrence of the term in the open transcript USING WILDCARDS IN SEARCHES Searches in Summation are done on a whole-word basis: a search for agree will find just that, not words including â€Å"agree† like â€Å"agreement. † Sometimes you need to search for more than just whole words. To accomplish this Summation Blaze supports wildcards in searches. The asterisk (*) designates a wildcard, which can represent any portion of a word. Using wildcards widens the field of possible hits generated by the search. Wildcards are used to find all words that have your search phrase embedded within them. If you run a Quick Search for TERM*, the search is expanded to encompass any word with â€Å"term† as the base, for example, â€Å"term,† â€Å"terminate,† â€Å"termination,† etc. Your placement of the asterisk (either preceding or following the word, or embedded within letters) determines the hits that result. You can use wildcards in any type of search within Summation. 44 Type This agree [no wildcard needed] agree* *gree *agree* To Find AGREE Words beginning with AGREE-, such as agreement or agreeable Words ending with -GREE, such as disagree, pedigree Words with -AGREE- as the root, such as disagreement Words beginning with A- and ending with -EEP, such as asleep a*eep USING SEARCH CONNECTORS The Summation system provides you with means to perform both simple and complex searches. You can search all fields in the document database (using the Quick Search Box) or select specific fields to search (using the Full Boolean Search dialog). This Tutorial walks you through setting up and performing both simple and complex searches. When you enter a search term or phrase in the Quick Search box, Summation conducts an Anytext search and searches for the specified text in all fields in all summaries in the database. If you want to refine your search to multiple terms and/or phrases, then you can use â€Å"connectors†. You can further refine your search to specific fields in the database, by performing a Full Boolean search (as opposed to a search from Quick Search box). The available connectors in Summation are AND, OR, AND NOT, and OR NOT. You can connect up to ten search clauses in one Boolean search using nine connectors. The Full Boolean search provides a list of operators specific to each field, which you can use (in conjunction with connectors) to further refine your search to terms in designated database fields. Search Connectors Using An Anytext Search 1. Launch Summation. 45 2. Open the Core Database, by double-clicking on its corresponding item in the Case Explorer tree. 3. Put the focus on the Form or Column View, by clicking on the respective view. 4. Type a search term in the Quick Search Box (the field above the Core Database view with the phrase Enter Search Phrase populated in it). 5. Link words or phrases with a connector to search on multiple terms or phrases. (For example, Smith AND taxes OR court. ) Note: A space must lead and follow each connector. The connectors should always be in capital letters. 6. Repeat steps 2 and 3 until you complete entering all desired search terms/phrases and connectors. Note: If you search string includes more than 5 terms, you may find it more efficient to use the Full Boolean search setup dialog. 7. Click the Search button on the Toolbar, to the left of the Quick Search Box, to process the search. Searching Using The Full Boolean Dialog Box 1. Launch Summation. . Open the Core Database, by double-clicking on its corresponding item in the Case Explorer tree. 3. Put the focus on the Form or Column View, by clicking on the respective view. 4. Click the Boolean button in the Toolbar. 5. In Section 1 of the Full Boolean dialog, choose the Anytext icon (or other default icon) or choose â€Å"More Field Choices† to select fields from the active table. 6. In Section 2 of the Full Boolean dialog, use the default connector (e. g. contains) or select a connector from the drop-down list. 7. In Section 3 of the Full Boolean dialog, type the search term or phrase you want to search on. 6 8. Click the Connector button to add another search string (field, connector and term/phrase). 9. Repeat Steps 2 through 5 until all search strings have been entered. 10. Click the Display Results button to process the search. Using HotFacts with ocrBase just as u can identify a transcript note, a core database record or an ocrbase note as a hot fact, you can also use the hotfact â€Å"flag† to identify key ocrbase documents in your case. to mark an ocrbase document as a hotfact: ? Click on the ? Click on the so that it becomes again to unmark the document. SEARCHING HOTFACTS You can search only database records flagged as HotFacts when you check the Document Database folder at the Case Folder – Main Window. The Search Document DB dialog appears, consisting of 2 sections: Sort Order and Search Type. The first 2 Sort Order field options are Date (DOCDATE) and Issue (ISSUES). The third sort order field option is taken from the first field set in your Sort Order tab, found under the Query tab in the document database. If there is no sort order set there, the third option will read â€Å"Unsorted Doc DB†. The Search Type section determines what set of document database summaries you want to search. To search all HotFacts, select Only HotFacts and then Everyone’s. To search only your own HotFacts, select Only HotFacts and then My HotFacts. 47 Searching Document Database Records Flagged as HotFacts 1. From the Case Folder – Main Window, check the Document Database folder. 2. The Search Document DB dialog appears. 3. In the Sort Order section, select the field by which you want to sort your search results. You can choose Date, Issue, or the first field you have selected in your Document Database Sort Order. 4. In the Search Type section, select the record set in which you want to search: only HotFacts (all HotFacts), or My HotFacts. . Type the phrase for which you want to search into the Quick Search Box on the toolbar. 6. Click on the search binoculars to display the Search Results. SEARCHING CASE OUTLINES â€Å"You can search the case outline. For example, in the figure below, you see a search for ‘damage,' showing the first hit found in the Case Outline: th e word ‘damages. ‘ Because the search algorithm here provides for a simple string search, it will find any phrase containing the same characters (e. g. a search for ‘damage' will find ‘damaged' ‘damages' and ‘damaged'. Subsequent hits can be found by clicking again on the OK button. Summation indicates the line with the hit by outlining it in black. † 48 FILTERED FUZZY SEARCHING The Fuzzy Search is a variation on the Quick Search that allows you to search for a specific word and words spelled similarly to it. This tool can be used in a variety of circumstances, for example when working with documents that have been processed by optical character recognition software, since certain characters are often mistaken for similarly-shaped ones during that process. You can also use the fuzzy search to look for words that may have been misspelled, or for words with British spellings (such as â€Å"flavour† and â€Å"flavor†). The Fuzzy Search finds near-matches to your search requirements. It is available for searching your transcripts and/or full text (ocrBase) documents. When used to search transcripts and/or full text documents from the Case Folder – Main Window, the words found are displayed in a list of approximate matches. Filtered fuzzy searching lets you search transcripts and/or ocrBase documents for nearmatches of a single word, without having to wade through numerous false 49 positives. This allows you to select only the words in which you are interested and run another search by clicking on the Search button. A standard search for these words is then launched, displaying the hits in the regular Search Results Window, from which you can print them, write them to file, mark them as HotFacts, or drag them into the Case Organizer. The List of Approximate Matches for a Filtered Fuzzy Search 1. From the Case Folder – Main Window, check the ocrBase and/or transcript folders you wish to search. 2. Enter the term for which you want to search into the Quick Search Box. 3. Click the Fuzzy Search button on the toolbar. 50 4. A list of approximate matches appears, with the original word(s) preselected. To narrow your search, enter a higher percentage similar and click on Refind. To broaden your search, enter a lower % similar, and click on Refind. (You can select percentages between 65% and 99%. ) 5. When you're satisfied with your list of matches, select the ones for which you wish to search by clicking on them; choose all words by clicking on Select ALL words. (You can deselect words by clicking on them. ) 6. Click the Search button. Your hits are displayed in the Search Results Window. SORTING By default, contents of fields are sorted in standard A to Z, 0 to 9 sequence. You can designate descending sort (Turn this option on from the Sort Order tab of the Query page of the Document Database folder. This option forces the contents of the field to be sorted in reverse order, Z to A and 9 to 0. Ascending sort order is the default when a field is included in the sort order) using the Sort Order tab of the Document Database folder. You can also have your note hits sorted in reverse-chronological order. 1. Open the database in column view. 2. Right-Click on the column label, Click sort by â€Å"label† option. 51 To change the default order: ? Double-click on icon on the toolbar. ? Check the box in the â€Å"Sort by† table. Give OK. 52 Conclusion This concludes the detailed discussion with reference to the application of Summation to facilitate the QC process. While there are more uses and applications of Summation in EDD these have been omitted to focus the reference of the context under discussion. If you have any queries / suggestion please feel free to contact me at [email  protected] net. In case you need specific detailed references please feel free to use the links below: References: http://www. summation. com/Support/tutorials. aspx http://info. summation. com/products/pdfs/ http://support. summation. com/knowbase/technotes 53