Monday, May 25, 2020
Tyler Wheaton Expos January 16th, 2015 High Off Gambling Las Vegas, known for itÃ¢â¬â¢s wild partyÃ¢â¬â¢s and casinos. Thousands upon thousands of people go to casinos weekly and go home richer. Some come home with less money in their pockets. Some become thrilled and Ã¢â¬Å"addictedÃ¢â¬ to gambling. So is gambling more than simple fun or is it dangerous. Gambling goes way back in history. Think about even making a simple bet with one of your friends for a small wage is considered gambling. Like if you said Ã¢â¬Å"Hey I bet you $20 you canÃ¢â¬â¢t touch your toesÃ¢â¬ thats a bet and considered gambling. High stakes Gambling hasnÃ¢â¬â¢t always been around though. The first lottery was in New Hampshire in the 1800Ã¢â¬â¢s and was such a success that it continued throughout theÃ¢â¬ ¦show more contentÃ¢â¬ ¦These raids were almost the same as a drug raid. The only place you could go if you wanted to gamble legally was California. Even though it was legal to gamble in California it wasnÃ¢â¬â¢t always safe. In 1856 professional gamblers were lynched in San Fransisco (Dunstan). One thing that really helped legalize gambling was the gold rush. The gold rush doesnÃ¢â¬â¢t have anything to do with gambling itself but when the California gold rush started in 1848 people who wanted a chance to strike it rich packed up and went to California to find gold. They also discovered the casinos. Many miners would spent there hard earned gold in casinos. The casinos were busy and making more profit than they ever had before. Once the rest of America saw what was going on they decided to legalize gambling to help out the government by creating more tax revenue. Even though gambling had been historically looked down on throughout history by Americans there are some good things that come from having big casinos. These big casinos create a lot of jobs. In America casinos provide over 600,000 jobs. Thats not the only type of legal gambling either. There are racetracks all around America where horses race a nd people place bets on the horses. One very challenging bet used at horse races is the superfecta. The person placing the bet has to pick the exact order that the horses will finish first, second, third, and fourth in a certain race. Due to the
Thursday, May 14, 2020
Chapter 1: Introduction 1.1 Overview The modern world has seen the formation of firms as a mechanism of integration, which enables individuals to develop an enterprise and to combine capital and expertise from different individuals. Mergers, especially the mega-mergers, change the market structure. Mergers and Acquisitions (MA) have unparalleled capability to transform firm and supplement corporate renewal. Research in MA has been done taking into consideration a multitude of disciplines, e.g. finance, economics, law, business, strategy formulation, organization theory, human resource management and sociology. MA becomes a real time phenomenon due to the attention it receives from different walk of life. The victory of firms and theÃ¢â¬ ¦show more contentÃ¢â¬ ¦The unusual returns to the acquiring firm shareholders show contentious results. No noteworthy abnormal returns are suggested by some studies whereas some studies suggest a negative abnormal return that means reasons are unrecognised. Tuch and OÃ¢â¬â¢Sullivan (2007) and Agrawal and Jafee (2000) provide concerned evidence and reviewed the literature to find out the influence of some bid characters on MA performance. Though, some questions regarding the influence of cross-border versus domestic transaction and timing of transaction on post MA performance remain unanswered and therefore, more study is required to have the understanding of the impact of bid characters on MA post performance. This study is different from previous research in many ways. Tuch and OÃ¢â¬â¢Sullivan (2007) present facts that shoot out from market measures-based and accounting measures-based studies. We widen the study of Tuch and OÃ¢â¬â¢Sullivan ( 2007) to fulfil the need of reassessing the previous research to estimate post MA performance by examining mix measures-based and qualitative measures-based studies that may aid to elucidate changes in post-performance. Tuch and OÃ¢â¬â¢Sullivan (2007) uncover that the acquisition of hostile targets, transactions that are paid for with cash and acquisitions of larger targets are associated with superior (or at least negative) performance, while there is mixed evidence on the
Wednesday, May 6, 2020
In February 2015 the Supreme Court of Canada struck down the Criminal Code provision prohibiting assisted suicide, though the ruling does not take effect until 2016. Among those challenging were the families of Kay Carter, a woman suffering from degenerative spinal steno-sis, and Gloria Taylor, a woman suffering for ALS, both of whom are deceased. As government struggles to draft a Bill that protects all, we pause to consider once again this very important is-sue in our world today within the context of Christian ethics. As we bring our upbringing, faith commitment, past experience and reflections to bear on everything we do, we now stand back and go to the sources that for Christians should provide the moral insight needed to proceed: (1) Scripture; (2) Tradition; (3) Reason; and (4) Experience. As it is generally believed today that the canon of Scripture was put together through a sincere act of discernment by the Christian community and that it is truly the coming together of the human and the divine, we begin our investigation with Scripture. We will then look at the remaining three: tradition; reason; and experience in light of Scripture. Scripture - When checking The New Jerome Biblical Commentary, The Word in Life Study Bible, New King James Version and the Catechism of the Catholic Church, which are known for connecting scripture to particular issues, we soon see the lack of biblical evidence di-rectly related to assisted suicide. Therefore we must call onShow MoreRelatedReviewing The Supreme Court Of Canada Case993 Words Ã |Ã 4 Pagesappellants to bring the civil claim which is against the prohibition on assisted suicide found in s. 14 and s. 241 (b) of the Criminal Code (Carter, para. 20). The same issue which was brought in Rodriguez v. British Columbia 20 years ago was declared to be constitutional. In this case, ultimately Lee CarterÃ¢â¬â¢s appeals succeeded. The Law Before the Ruling According to s. 14 and s. 214 (b) of the Canada Criminal Code, the law criminalized the person who aids another person to commit suicide and it banned theRead MoreThe Ethical Dilemmas Of Euthanasia Essay2007 Words Ã |Ã 9 Pageslaw (2) medical issues (3) patient capacity and autonomy (4) expenditures: palliative care vs. assisted suicide (5) family (6) ethics. This review will offer a foundational understanding of the practices of euthanasia and PAS and defining the various dilemmas that have arisen for medical professionals under the new Canadian law. The literature gives the acronym for euthanasia/ physician assisted suicide as PAS or EAS, and these terms can be used interchangeably. The Law Euthanasia in Canada distinguishesRead MoreThe Controversial Issue Of Legalizing Physician Assisted Suicide1962 Words Ã |Ã 8 PagesIntroduction The topic of legalizing Physician-assisted suicide (PAS) has long been a controversial issue in Canada and has recently received increased attention. In 1993, the Supreme Court of Canada ruled the provisions of the Criminal Code prohibiting assisted suicide. Two decades later, the Supreme Court of Canada began to deliberate whether to uphold or strike down the law prohibiting doctor-assisted suicide. On October 15th (What is the year), the nine justices of the Supreme Court heard impassionedRead MoreMedicare Policy Analysis447966 Words Ã |Ã 1792 Pagesthe Committees on Education and Labor, Ways and Means, Oversight and Government Reform, the Budget, Rules, Natural Resources, and the Judiciary, for a period to be subsequently determined by the Speaker, in each case for consideration of such provisions as fall within the jurisdiction of the committee concerned A BILL To provide affordable, quality health care for all Americans and reduce the growth in health care spending, and for other purposes. 1 Be it enacted by the Senate and HouseRead MoreEssay Paper84499 Words Ã |Ã 338 Pagesor more, and in all other cases, Army National Guard Soldiers are governed by NGR 600Ã¢â¬â21 and NGR 600Ã¢â¬â22. Portions of this regulation that prescribe specific conduct are punitive, and violations of these provisions may subject offenders to nonjudicial or judicial action under the Uniform Code of Military Justice. The equal opportunity terms found in the glossary are applicable only to uniformed personnel. AR 690Ã¢â¬â600 contains similar terms that are applicable to Department of Defense civiliansRead MoreInternational Management67196 Words Ã |Ã 269 Pages Middle Eastern Intercontinental Trade In ancient Egypt, the KingÃ¢â¬â¢s Highway or Royal Road stretched across the Sinai into Jordan and Syria and into the Euphrates Valley. These early merchants practiced their trade following one of the earliest codes of commercial integrity: Do not move the scales, do not change the weights, and do not diminish parts of the bushel. Land bridges later extended to the Phoenicians, the first middlemen of global trade. Over 2,000 years ago, traders in silk and otherRead MoreNotes18856 Words Ã |Ã 76 Pagespersuasion were applied. Missionaries were dispatched to Africa. They set up health clinics, schools, and social service centers. They treated the sick and taught people how to stay healthy. They taught European Ã anguages l to Africans, who in turn assisted missionaries in translating the Bible into African Ã anguages to help disseminate Christian doctrines. Individuals like l Dr. David Livingstone were able to combine missionary activities with extensive scientific research and geographic investigationsRead MoreHuman Resources Management150900 Words Ã |Ã 604 Pagesexactly what should be kept and for how long. Generally records relating to employment, work schedules, wages, performance appraisals, merit and seniority systems, and affirmative action programs should be kept by all employers who are subject to provisions of the Fair Labor Standards Act (FLSA). Other records may be required on issues related to EEO, OSHA, or the Age Discrimination Act. The most commonly required retention time for such records is three years. Throughout the book, details on the mostRead MoreFundamentals of Hrm263904 Words Ã |Ã 1056 PagesBenefits 42 Employee Relations 42 vi Contents Top Management Commitment 43 Effective Upward Communication 43 Determining What to Communicate 44 Allowing for Feedback 44 Information Sources 44 The Americans with Disabilities Act of 1990 62 The Civil Rights Act of 1991 63 The Family and Medical Leave Act of 1993 63 Uniformed Services Employment and Reemployment Rights Act of 1994 64 Relevant Executive Orders 64 vii WORKPLACE ISSUES: HRM Certification 44 Is a Career in HRM for Me? 45 ETHICALRead MoreOne Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.163893 Words Ã |Ã 656 Pagesthe century. Due in large part, however, to the weaknesses of the League, resistance to the rise of internal repression and interstate aggression in the interwar years was feeble at best. Stalinist, fascist, and Japanese militarist contempt for civil rights, much less even peaceful protest, opened the way for brutally repressive regimes that actively promoted or systematically engineered the massive episodes of rape, oppression, and genocidal killing that were major offshoots of a second global
Tuesday, May 5, 2020
Question: Discuss about the Concept, Impacts, Advantages and Future Prospects of Encryption. Answer: Encryption is a method to encode some information by using codes. It is used to prevent unauthorised access of other persons to any secured data. Encryption is a very important feature that is added in most of software now days to prevent unwanted access of other people. Encryption should be added in that software which mainly deals with the public personal information. Encryption was initially used by the terrorists, anti social people to secretly communicate among them (Li et al. 2013). Then it was also used among the military during war to communicate among them and to restrict the information only among them. In this report an overview about the concept, impacts, advantages and future prospects of encryption is discussed in details. Encryption can be defined as the method to secure some information by encoding with several codes. These codes can be of different types that depend upon the developer who created the codes. Encryption is done by using some particular algorithms. Thus once the information is encrypted, it cannot be decoded by other system or person who does not know about the algorithm (Shmueli et al. 2014). The information can only be accessed when it is decrypted buy using that algorithm. The originator may provide some keys that can only allow some users to decrypt the information. These users are called authorized users. Other unauthorised users cannot access the information since they do not have the keys provided by the originator. Encryption can have several types of keys. In case of a symmetric-key system, the user and the originator keys are same. In case of communication in an organisation or community the users must have same keys and those keys should be secured (Bellare, Keelveedhi and Ristenpart 2013). The keys may be of public key encryption, the encryption can be public key encryption type. In this case the receiving team gets the access to the decryption key that enables message to be read. The main users of the encryption were initially the military and the governments person who use encryption to communicate among them. Other opponent military or the outside country governments were obstructed by using encryption method (Brakerski, Gentry and Vaikuntanathan 2014). In modern era of information technology many software and applications deal with publics information that should be kept confidential. It is seen that the uses of the encryption is increasing day by day in several applications. It is claimed that the software companies and most of the organisations have started doing the encryption. The use of encryption is also made compulsory in most of the software and applications (Gentry, Sahai and Waters 2013). From a survey it is seen that 71% of the companies have utilized encryption in their software system. It is also seen that the 53% of the organisations utilised encryption to secure the information in the organisation. To prevent unauthorised access to this info rmation encryption is also used in the civilian systems. Encryption is used in most of the applications in modern technology. Different applications in mobile phones use encryption for their security of public personal information (Garg et al. 2016). Many popular applications like Whatsapp and Facebook use encryption to protect the information. Encryption is also done in case of transaction of money among the banking sectors. There are also many issues related to encryption. Many hackers are still able to overrule the encryption method by using the cryptographic approach. Sometimes the hackers also destroy the whole information that is encrypted. Sometimes the organisations only allow the information that is encrypted and for this reason the other branch organisations sometimes face the problem to transfer information (Brakerski, Gentry and Vaikuntanathan 2014). In case of transaction of information among different organisations encryption can be a real problem. There is also a dilemma for an organisation to put the encryption in case of e-mails. Naturally the system loses its fluency in case of encryption of e-mails (Daniel et al. 2014). It is seen several times that the e-mails are not able to be seen due to encryptions to normal users or clients. It happens when the users or the clients do not have the keys of the encrypted file. There are different types of encryption that is used in case of an organisation. Those are file and folder encryption, E-mail encryption, Full-disk encryption, Mobile data encryption and application encryption (Brakerski and Vaikuntanathan 2014). There are also many different ways of doing encryption like end-to-end method and gateway method. In case of gateway encryption method the e-mail encryption is possible for the users outside the organisations. The gateway based encryption provides security to most vulnerable point in case of the message as it was in transit, outside the boundaries. In case of more secured communication of the information the organisations use the end-to-end encryption method that is used for organisations which need inter organisational communication (Daemen and Rijmen 2013). There are also many solutions which can make the messages secured with the en d-to-end encryption. The gateway based solution should be able to deliver the message which can be off diff erent solutions that can give only one or other. There are also many future scopes of making the encryption method more useful in our daily life. There may be of different types of encryptions like autonomous encryption, transparent encryption and content-control encryption. The autonomous encryption simply encrypts everything, by default and automatically (Boneh et al. 2014). Autonomous encryption needs a lot of computing resources that can be used to make the internal me-mails and the system information more secured. In case of the transparent encryption the operations are encrypted without the direct action of the user (Bellare, Keelveedhi and Ristenpart 2013). It actually does not affect the way of the work of the users. It is often important component for large applications of the encryption system. In case of Content-control technologies the secured or sensitive information is detected and then it apply for the appropriate decision regarding the encryption. Finally it can be concluded from the above discussion that encryption is necessary for the security of public and organisational information. The use of encryption in various software and applications has increased in large extent. The advantages of making the system encrypted are also discussed. The issues related to the encryption method are also discussed and should be overcome for better reliability. References Bellare, M., Keelveedhi, S. and Ristenpart, T., 2013, May. Message-locked encryption and secure deduplication. InAnnual International Conference on the Theory and Applications of Cryptographic Techniques(pp. 296-312). Springer, Berlin, Heidelberg. Boneh, D., Gentry, C., Gorbunov, S., Halevi, S., Nikolaenko, V., Segev, G., Vaikuntanathan, V. and Vinayagamurthy, D., 2014, May. Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits. InAnnual International Conference on the Theory and Applications of Cryptographic Techniques(pp. 533-556). Springer, Berlin, Heidelberg. Brakerski, Z. and Vaikuntanathan, V., 2014. Efficient fully homomorphic encryption from (standard) LWE.SIAM Journal on Computing,43(2), pp.831-871. Brakerski, Z., Gentry, C. and Vaikuntanathan, V., 2014. (Leveled) fully homomorphic encryption without bootstrapping.ACM Transactions on Computation Theory (TOCT),6(3), p.13. Daemen, J. and Rijmen, V., 2013.The design of Rijndael: AES-the advanced encryption standard. Springer Science Business Media. Daniel, W.K., Chen, D., Liu, Q., Wang, F. and Wei, Z., 2014, September. Emerging issues in cloud storage security: Encryption, key management, data redundancy, trust mechanism. InInternational Conference, MISNC(pp. 297-310). Springer, Berlin, Heidelberg. Garg, S., Gentry, C., Halevi, S., Raykova, M., Sahai, A. and Waters, B., 2016. Candidate indistinguishability obfuscation and functional encryption for all circuits.SIAM Journal on Computing,45(3), pp.882-929. Gentry, C., Sahai, A. and Waters, B., 2013. Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based. InAdvances in CryptologyCRYPTO 2013(pp. 75-92). Springer, Berlin, Heidelberg. Li, M., Yu, S., Zheng, Y., Ren, K. and Lou, W., 2013. Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption.IEEE transactions on parallel and distributed systems,24(1), pp.131-143. Shmueli, E., Vaisenberg, R., Gudes, E. and Elovici, Y., 2014. Implementing a database encryption solution, design and implementation issues.Computers security,44, pp.33-50.
Friday, April 10, 2020
Crusades And The Church Crusades and the Church At the time of the Crusades, the official church had become corrupt and politically motivated. It should be noted, too, that crusaders did not take vows to go on crusade. The very term crusade, in English or in any other language, is a much later invention. What we call crusades, contemporaries knew as pilgrimages or even simply journeys. Aside from a tiny elite, people were illiterate and even if they could read, there was no access to a Bible or any scriptural teaching. It was an age of superstition and magic, where visions, signs and wonders were claimed by many. The masses' only source of knowledge about God was whatever the often corrupt and greedy clergy decided to teach. The early crusades broke new grounds for the power of the Church. It gave the Pope the highest order of command and brought about new religious vows. The crusade was a holy war, which differed from earlier wars against the enemies of Christendom in that it was waged by command of the pope. In order to ignite the fire of the Crusades, the Pope had to take existing theology about violence and warfare and turn it on its head. Until this time a Christian soldier had to do penance for any violence in order to reduce the time he would spend in purgatory before going to heaven. Violence was considered a necessary evil, but nevertheless still evil. Popes Gregory VII and Urban II changed that. They said that an act of warfare against the infidel, i.e. the Muslims, was in itself an act of penance, and if a Christian were to lose his life so doing, he would go straight to heaven. Many Crusaders extended this concept to include killing Jews too. With many people facing what they believed could be countless years in purgatory, it is no wonder that tens of thousands willingly gave themselves to the cause of killing the infidel. Regardless of motivation, an individual underwent a specific ceremony before he could be considered a crusader. The ceremony evolved somewhat over the centuries, but its general outlines remained the same. A would-be crusader sought out an ecclesiastical authority (a priest, bishop or higher cleric) and swore to carry out an armed pilgrimage in support of the Holy Places. He then usually received a cloth cross which he could place on his clothes to signify his new status. Crusading vows were usually taken in response to official preaching of a crusade by licensed churchmen. They were supposed to be taken only by fighting men or those who could otherwise contribute to a military effort, and they were not to be taken without the permission of the crusader's wife, since his long absence would deprive her of what was delicately called marital rights (Pope Innocent III, in need of troops for his crusading proposals, changed this in the thirteenth century, but in doing so he violated longstanding Church tradition and the plain intentions of canon law). The crusader's property and people were then placed under the protection of the Church, and he was to begin preparing to leave. If he did not discharge his vow within a certain period of time, he might be excommunicated by the church until he kept his word. Crusaders were often offered an indulgence in return for participation in the hardships of a crusade. The indulgence was later seriously abused, and the word acquired a justifiably obnoxious connotation. But in the beginning it was another of those carefully thought out doctrinal innovations that attended the reforms of the tenth and eleventh centuries. In brief, the indulgence assumed that if an individual were truly penitent for his sins, he might obtain remission or forgiveness for the temporal penalties of those sins by performing some arduous, virtuous or unpleasant task to compensate for them. This remission could apply to penalties imposed by the Church on earth (i.e., to penance prescribed for sin), and it might also apply to penalties imposed by the Church in the next world (i.e., to time spent in purgatory). Most medieval people were deeply interested in their fate in the next world, and the indulgence was a powerful incentive
Monday, March 9, 2020
Talking Writing, Music and Editing with Tom Flood Talking Writing, Music and Editing with Tom Flood Tom Flood helped us refine Reedsy from our earliest days. Now we want to share his amazing story. From songwriting to novels and finally manuscript editing, Tom has honed his knowledge of the writing craft over the years, and contributes today to our (aspirationally) literary blog.In one of our most in-depth interviews so far, what started as a conversation about TomÃ¢â¬â¢s agency Flood Manuscripts moved on to cover his work as an editor, a writer, and an independent musician.Tom analyses the oft-invoked parallel between book and music publishing and what the future holds for both these industries. He also shares his own experience as a writer - he made this great observation about identifying oneself as a writer:Ã¢â¬Å"When people ask, Ã¢â¬ËWhat do you do?Ã¢â¬â¢ and I answer, Ã¢â¬ËWriter, editor, musician,Ã¢â¬â¢ the next question is invariably Ã¢â¬ËOh, what do you play?Ã¢â¬â¢ Writing is both less and more mysterious. Nearly everyone writes, so it engenders the second q uestion Ã¢â¬ËWhat do you write?Ã¢â¬â¢ way less often. The more revealing Ã¢â¬ËHow do you write like that?Ã¢â¬â¢ comes rarely. People think skill in musicianship comes with practice and dexterity, but skill in creative writing? Like art, they believe itÃ¢â¬â¢s a gift. The reality is theyÃ¢â¬â¢re the same.Ã¢â¬ His tripartite career gives Tom a unique lens through which to see whatÃ¢â¬â¢s happening right now in the new world of publishing. His advice to writers is both practical / motivating - persevere, keep going - and informed by years of experience editing self-published authors.Hi Tom, you have an impressive portfolio and experience in writing, editing and proofreading. Which one came first in your career? In other words, what made you become an editor?Thanks, Ricardo. I came to editing via writing. I have always been a songwriter but in the 80s, buoyed by a boom of new Australian fiction engendered by the infrastructure built by the short-lived, ground-breaking Le ft government of the 70s, I began to try my pen at short stories, got one published in a short-lived journal, and finding that slow going, switched to the big picture of the novel. The success of that move (three national awards) led to connections in the world of publishing and I began occasional award judging, assessment through our major residential writersÃ¢â¬â¢ centre, and some editing for publishers throughout the 90s, also being commissioned to write a theatre piece and a feature film. That all petered out as I moved back towards music performance and had a stab at academia.In 2003, with a string of part-time jobs, and looking to find new income streams, I began working through the net for a few large assessment/appraisal services in other states, a relatively new industry, reading and advising across a wide range of prose writing. A year later my artist partner suggested I start my own to fund living through a PhD, and a writing client created the first Flood Manuscripts w ebsite. Within a year it was full-time assessment and clients began to ask if I would mentor them, act as agent, ghostwriter and all manner of services I had no intention of taking up. Dumping the doctorate to ride the growing self-pub wave with Flood Manuscripts, the next step was mentoring, structural editing and copy editing, and finally proofreading, as Aussie writers began to become impatient with the trade publishers and adept at dealing with the digital, their needs evolving. I keep the service personal, despite many suggestions to expand into an agency, because I like to be at the coalface.You have also both won and been a judge to major writing awards in Australia, how did that start, and what do these awards represent for you as an author? (Is that just a nice acknowledgement of your craft or something youÃ¢â¬â¢re genuinely proud of?)Awards! Without them Flood Manuscripts wouldnÃ¢â¬â¢t exist. Despite both parents writing pretty successfully (my mother, Dorothy Hewett, was a well-known poet and playwright), neither had published with a mainstream press. I made my name in fiction by winning our premier manuscript award, the prize including publication by Allen Unwin, and that novel then took out more awards, including our oldest and best known fiction prize, the Miles Franklin Award. Everything else I have been lucky enough to be involved with has stemmed from those awards. Flood ManuscriptsÃ¢â¬â¢ clients have since taken out even more awards, mostly international, and yes, IÃ¢â¬â¢m very proud to be a small part of that.We are in London, and most of our audience is in the US. But you live in Australia, so can you tell us how the publishing landscape looks like over there? How Ã¢â¬Å"bigÃ¢â¬ are ebooks and self-publishing?I think weÃ¢â¬â¢re trailing a decade behind USA in some aspects, particularly genre, as we are a small market and still retain a certain English literariness in our publishing landscape, largely fed by our tertiary educat ion system. That said, we were and still are ahead in acceptance of manuscript assessment /appraisal as an essential part of that landscape. Once convinced, Australians do have a fast technology take-up and self-pub is really developing into a snowball.Has the Ã¢â¬Å"digital revolutionÃ¢â¬ truly changed your career, or do you feel you continue working with authors more or less like you did before?Flood Manuscripts is a child of the digital Ã¢â¬ËrevolutionÃ¢â¬â¢. 98% of my work is sourced, contracted, paid and completed via the net. That has grown from about 70% over a decade. IÃ¢â¬â¢m receiving around one paper manuscript a year. I prefer to read and edit digitally for work, although I still like to read paper for pleasure. I like the ancient craft of bookbinding. It will be a shame if we lose that art form to the economics of the trade.Songwriting, though, has not changed for me. The pen is still mighty, the pencil mightier, and scraps of waste paper litter the study on ev ery surface. With the novel, I began handwriting it in Ã¢â¬Ë85, moved to a borrowed typewriter, then a borrowed word processor, and finally finished the last drafts on a redundant computer with bootlegged software (WordStar) from my partnerÃ¢â¬â¢s work place. I was over 30, on the dole, and on the rebound from an art pop band in Sydney. I donÃ¢â¬â¢t think I actually got on the net until 2003.This is a traditional question in our interviews: does working directly with an author (indie or hybrid) make it easier or harder for you? Does the absence of a traditional publishing structure change the way you communicate with the author?Except in the early days before Flood Manuscripts, IÃ¢â¬â¢ve almost always worked directly with authors. I donÃ¢â¬â¢t court the trade publishers because there are so few here and they donÃ¢â¬â¢t outsource much anyway. How it continues to change is in the speed, volume and creativity of new digital ventures and what they offer to litworkers. As an assessor, keeping up with even a small part of that change is a challenge.You are also a musician, singer and songwriter in the acoustic trio Blues Angels. The music industry and the publishing one are often compared, many people proclaiming that what happened in music will happen to books. WhatÃ¢â¬â¢s your opinion on that?Conventional wisdom has had the popular music evolution in four phases: 1) sign with a big label; 2) music publishers make big money from big musicians and use some of those profits to develop new talent; 3) big musicians realise theyÃ¢â¬â¢re leaving money on the table and set up their own labels (self-publishing), resulting in music publishers dwindling and new musicians having no corporate sponsorship; 4) digi-platforms like iTunes do the same as Amazon/KDP/Kindle and new musicians go direct to consumers (less 30%), but there is new pressure to discount or give away material for free; and we can now add phase 5) big musicians realise how much money they are leaving on the distributorsÃ¢â¬â¢ table and abandon digital platforms (Taylor Swift/Spotify, Radiohead /iTunes). New musicians have no sponsor, make no money from Spotify and canÃ¢â¬â¢t sell on iTunes without a massive marketing spend.The book trade significantly differs to music in that it doesnÃ¢â¬â¢t have a regular large performance aspect, although writers are often performers at festivals, schools, readings, etc., and libraries arenÃ¢â¬â¢t really a power in the same way in the music trade, although ideas like Self-E and the digital library may significantly endanger lending rights payments in the pursuit of Ã¢â¬Ëgoing viralÃ¢â¬â¢. ItÃ¢â¬â¢s not a matter of Ã¢â¬Ëwill happenÃ¢â¬â¢; it already has, at least to level 4. Writing, like music, has gone digital and that digital product is being given away in the millions to create traction towards a fame of sorts and is being streamed, not quite like Spotify et al, through Kindle Owners Lending Library, but podcasting and YouTube are pushing text more into performance re audiobooks, book trailers, and even as the music industry has been digitally driven back towards the single as its principal product, so Kindle Shorts, blogging, social media publishing and other developments continue to drive fiction back towards the heyday of shorter forms. Will this be a boon to poetry? It should be, but I havenÃ¢â¬â¢t seen a Shorts- or YouTube-based boom in verse, though itÃ¢â¬â¢s early days yet. I do see bundling going on in either form by both indies and trade, both live and product-based, and I expect weÃ¢â¬â¢ll see even more specific-subject social media appearing, like mootis, a Twitter for legals, and new models for crowdfunding, like Patreon.This is the big picture, but as with BluesAngels, who donÃ¢â¬â¢t operate in the world of popular music, we do our gigs and small festivals, make our recordings and sell our music at those live gigs, then rinse and repeat. Sure, weÃ¢â¬â¢ve put it up digit ally on iTunes and Spotify, but we donÃ¢â¬â¢t expect to compete with the pop forms; we donÃ¢â¬â¢t have that kind of money. So far weÃ¢â¬â¢ve made eight cents from streaming. Indie authors can and do still exist at this same level. I have a long term client with Flood Manuscripts who self-pubbed a hardback verse novel, offset printed, and took it on the road to sell Ã¢â¬â door to door! HeÃ¢â¬â¢s sold 15,000 over a number of years, making him a best seller in Australian poetry, and funded an audio CD, but he doesnÃ¢â¬â¢t register on Bookscan, nor have the poetry awards or Amazon ever heard of him.A hard question now: do you prefer being an author, and editor or a musician? Where do you feel you have more creative freedom?The last one was hard. Creative freedom might just be a curse to some. Many artists prefer a given structure within which to work, although IÃ¢â¬â¢m not one of them. Some like to push the boundaries of form, others to innovate within those boundaries, a nd others prefer to capitalise on proven market structures. Creative freedom is not a term I think about or relate to, perhaps because I have it? Perhaps not: like writersÃ¢â¬â¢ block, I donÃ¢â¬â¢t think you can pin down what it is. As to author, editor, musician, all three can be personally satisfying.Some say that certain media are better than others to express a particular message. Do you think music allows you to express some things that you cannot in writing, and vice-versa?As an aural form based on sound, not words, and not limited by language, only taste, music is probably capable of appealing more indefinably to the emotions, but IÃ¢â¬â¢m a songster, so for me itÃ¢â¬â¢s a vehicle to carry fewer words more urgently to the audience, kinda like poetry, but it can and does operate differently. Unlike writing, there are also visible tools, and people do appreciate visible, live craft. When people ask, Ã¢â¬ËWhat do you do?Ã¢â¬â¢ and I answer, Ã¢â¬ËWriter, editor, mus ician,Ã¢â¬â¢ the next question is invariably Ã¢â¬ËOh, what do you play?Ã¢â¬â¢ Writing is both less and more mysterious. Nearly everyone writes, so it engenders the second question Ã¢â¬ËWhat do you write?Ã¢â¬â¢ way less often. The more revealing Ã¢â¬ËHow do you write like that?Ã¢â¬â¢ comes rarely. People think skill in musicianship comes with practice and dexterity, but skill in creative writing? Like art, they believe itÃ¢â¬â¢s a gift. The reality is theyÃ¢â¬â¢re the same.Finally, if you had one word of advice for authors (mainstream, indie, hybrid) in 2015, what would it be?IÃ¢â¬â¢m a novelist! Even tweets give us more than one word, but when it comes to publishing, I shuffle between Ã¢â¬ËPersevereÃ¢â¬â¢ and Ã¢â¬ËQuitÃ¢â¬â¢, but Ã¢â¬ËTime ManagementÃ¢â¬â¢ may be two words worth contemplating. Things are both worse and better for authors than at any time in the history of printing, but the history of authors is millennia older. What weÃ¢â¬â¢re seein g today is the very rapid furthering of the democratisation of publishing. Making money is a relatively new notion in that history. What is an author? A writer: or a writer who is published? With the rise of self-pub, Ã¢â¬Ëis publishedÃ¢â¬â¢ is changing to Ã¢â¬Ëhas publishedÃ¢â¬â¢, from passive to active, but an author is simply an originator. So my advice to authors, as always, is mundane; if you enjoy writing, keep learning by reading and doing, and you will be constantly challenged to go further. It is principally a vocation. If you want to become a publisher, youÃ¢â¬â¢re back to square one Ã¢â¬â an ingÃ ©nue - set out to learn your new set of jobs thoroughly, and keep learning and doing.Thanks a lot for your time, Tom, and for sharing these fantastic insights with us.Thanks, Ricardo, for this opportunity, and thanks to the Reedsy crew for authoring this quality new service.Follow Flood Manuscripts and Reedsy on Facebook!What do you think about TomÃ¢â¬â¢s story? A re we right in drawing parallels between the book and music industries? What fundamental differences do you see, and whatÃ¢â¬â¢s the future going to look like? Leave us your thoughts, along with any question for Tom, in the comments below.
Saturday, February 22, 2020
American Well - Assignment Example This leads to resolving medical issues early hence a better quality of life for the patient and reduced costs in the end. Also, a patient can choose a physician of their liking in quick fashion (Internet health care, 2). Apart from physicians and specialists, patients can access services of pharmacists and NPs. The biggest disadvantage of using this platform is that often the doctor will be communicating with the patient via phone or chat and may not obtain all the facts. The result can be offering advice or prescription that is erroneous. Also, the ease with which patient access drugs may not be safe for them since they may omit some information either knowing or unknowingly. Physicians would have preliminary information before they finally meet their patients. This generally means a lot of time being saved hence the physician could attend to more patients. With this system, patient visits are expedited hence improved hospital efficiency. Physicians who are in low demand geographical areas can work with patients elsewhere (Putnam, 34). What this means is more work for them hence better pay. On the down side, data that the physician accesses about a patient may be erroneous because of editing of the same by unreliable persons. This can present serious legal and health issues. Insurance companies can improve their reputation by having such a service. Overall, people are distrustful to insurance companies (Kabbes, 21). By providing a service that is cheap and reliable, some form of goodwill is developed between the insurer and the public. Also, the insurance firms can align their financials with those of the physicians. The results would be better margins for the insurance company. One drawdown, the insurance may encounter logistical problems in incorporating this platform into their already complex system. If not properly streamlined this platform could lead to