Wednesday, March 18, 2020

History of the Cherokee Indians Essays

History of the Cherokee Indians Essays History of the Cherokee Indians Essay History of the Cherokee Indians Essay History of the Cherokee Indians: Growth to Reduction of the tribes Mary Ruef Axia College University of Phoenix I would like to provide you with some information regarding the Cherokee Indians. I am one quarter Cherokee Indian. My grandmother is full blooded Cherokee and may mother is one half Cherokee. Cherokee comes from a creek word â€Å"Cherokee† meaning â€Å"people of a different speech† (Cherokee history 1996). There are 561 officially recognized Indian tribes in the United States. The Bureau of Indian Affairs is the largest database of records and histories of Native American tribes in the country. The language of the Cherokee Indian is Iroquian, although the Cherokee language differs slightly from the Iroquian language. Before the coming of the Europeans my family the Cherokee’s were forced to migrate to the southern Appalachians from the northwest after a defeat at the hands of the Iroquois and Delaware. According to Cherokee history, The growth of my hertiage started in the southern Appalachian Mountains including western and North and South Carolina, Northern Georgia and Alabama, Southwest Virginia, and the Cumberland Basin of Tennessee, Kentucky, and Northern Alabama (www. olatsga. org/cherokee. html 1996). The Eastern Cherokee still maintain their reservation in western North Carolina but most live in Oklahoma, Northern Cherokee nation of old Louisiana territory still has almost 12,ooo members and they are recognized by the state of Missouri unlike North Alabama whom do not have federal recognition. We lived in small communities usually near river bottoms. Homes ar e made of wooden frames covered with woven vines and saplings plastered with mud. Each village usually consisted of 30 to 50 log and mud huts. These huts are usually grouped around the village to make a town square, which was known as the council house. â€Å"The council house was seven sided to represent the seven clans of the Cherokee Indians : Bird, paint, deer, wolf, blue, long hair, and wild potato† (smoky mountain mall, 2007). We lived in the dense evergreen forests among the Allegheny and Great Smoky Mountains because these areas were plentiful with game, fish, and plant life. Clothing was made of deer skins. According to the wild west the women farmed corn, beans, squash and sunflowers which they preserved for use year around. Gourds were used as utensils, storage containers and ceremonial rattles. â€Å"Our spiritual belief revolves around a Creator and spirits who embody the sun, moon, and stars. Harvest ceremony is very important to any agricultural tribe† (www. thewildwest. org 2008). A dance known as the Green Corn Dance is held each August to hedge our bet for a good harvest. My native American culture live and love with nature. We created harmony within our environment in what we wear, create, what we eat and how it we prepare it. Our home life is important as well as our beliefs and philosophies. Even though Indian heritage is rich in tradition and culture, many Indians that live on reservations are struggling with a different legacy. According to the American Indian Tragedy more than 300,000 Native Americans are either homeless or living in life threatening conditions. â€Å"American Indians are faced with suicide rate double that of all other nonwhites, and higher levels of school dropouts, alcoholism, and unemployment† (American Indian Tragedy 2008). Many housing for the Indian reservations do not have electricity or running water due to these areas being so isolated. Many of our Indian reservations lack high quality natural resources. Agricultural productivity on Indian lands is less than on similar private lands. Income for us consist of casinos however these casinos are not created equal. Some of the casinos that are tribally owned are economic failures. Some of these casinos are profitable and create millions of dollars or more in profits. According to the American Indian Tragedy the high rate of poverty on many Indian reservations stems from a historical amalgam of federal policies which were intended to push Indians to become civilized. A lot has changed in the Cherokee nation it now has become a leader in housing, education, vocational training, economic development and business. According to the federal government the Cherokee nation has the right to exercise control over their tribal assets. Our assets not only include the 96 miles of the Arkansas River bed but also include 66,000 acres of land. February 10, 1990 a tax code was approved by the Cherokee nation to include sales tax and tobacco tax on all services and goods sold in the Cherokee Indian tribal land. The main purpose of this tax code is to increase the revenue so that they can provide the Cherokee Indians with a better way of life (Cherokee Nation 2008). References Cherokee History. Retrieved from web site www. tolatsga. org/cherokee1. html May 25,2008. Cherokee Nation Cherokee Indians, 2008. Retrieved from web site www. smokymtnmall. com/cherokee_indians/cherokee_nation. shtml May 25, 2008. The Wild West Cowboys and Legends. Retrieved from web site http://thewildwest. org/interface/index. php? action=539 May 25,2008

Monday, March 2, 2020

Free sample - Usage of Internet and Email. translation missing

Usage of Internet and Email. Usage of Internet and EmailNowadays it is very difficult to imagine modern world without computer technologies and using of computer programs as practically every sphere of our life is connected with them. Computers and Internet constitute rather big part of business life, as it is very difficult to control work without computers and Internet (Soong, 2010, p. 15).   It is understood that with the appearance and development of Internet, it became one of the most effective methods of influence, controlling and sharing information. Internet and everything that is connected with cyber industry affect people greatly. Such democratization of Internet and IT technologies means people are able to share their points of view and visions of certain problems despite their geographical location (Hatchen, 2000, p. 34). People can share messages by means of internet with the high speeds because they are shared by means social networks. It means that everyone is struggling for attention and place in a media environment. This environment now is cramped with information. Needless to say, that modern society is very dependent upon Internet and popular networks that became inevitable part of life of every user.   Every day life is hard to imagine without Internet and IT technologies. With their help, it is easier to tell the public about technological improvements and events from social and political spheres.   Whatever the reason or interest is, any person has the opportunity to transmit a message through the Internet and this massage can be potentially heard by thousand of people all over the world. This means of taking information is very hard to substitute. I am a current employee of the company dealing with the development and delivery of the trade equipment. In our company, the use of Internet and corporate email has become an inevitable part of the working process. The use of e-mails as a means of sharing information and communication becomes very popular in any company or organization, as this is a very simple process requiring minimum time and strengths. This means of communication and sharing the data and information is very popular and widely spread from the point of view convenience and time-consumption. The development of Internet and its implementation made the process of communication easier and faster. It gained great popularity among the employees, as Internet allows being aware of the information necessary for the production process and communication. As usual, every company is provided with the personal server that is able to serve the consumers of the company, where every employee is provided with the personal corporate e-mail address in order to communicate and share messages within the company (Kirshenbaum, 2009, p. 23). As a rule, the content of the shared information and emails is strictly controlled by the management of the or ganization in order to prevent frauds, viruses and leakage of personal and corporate information. In this case, the companies make use of the privacy policy. One of the main aims of such policy is to prevent computers from the illegal access, use of information by the third persons and fraud and viruses invasions. In my company, this kind of policy is provided by means of computers’ protection from outside users. The IT managers entitled to use the personal information of the employees to protect it from illegal utilization. It is one of the most popular and reliable measures, as not every employee can distinguish potential danger and see that the E-mail box, containing his or her personal information, stored in his computer was broken and used. There are a lot of measures the companies should take to protect and guard their networks. A good safety plan outlining essential safety measures is required for quick reply and disaster revival. Auditing, tracking and constant monito ring of the network should be conducted to distinguish leaks and intrusions. Moreover, different kinds of firewalls and other appliances of software and hardware can become helpful for discouraging network intruders. A great number of companies use some regulations and laws that are developed to protect personal information of the employees stored in their computers. This is the email privacy used by very company on the legal basis. Email privacy was elaborated by the US government and is derived from the Fourth Amendment to the U.S. Constitution. This policy is governed by the standard of reasonable expectation of privacy. According t this policy, the managerial of every American company is able to control e-mail and Internet use of the employees during their working hours. Moreover, the regulations of the privacy policy presupposes constant monitoring of email boxes and websites visited by he employees within working day. Most employers make their employees sign a computer and network use policy that usually sets forth that their email should be to be used merely for business purposes and entitles the employer to monitor usage of email and computer.   This agreement usually deprives an employ ee of any rational expectation of privacy, and means that the emails of the employees are fair game for the employer to seek through.   Employers, disparate from law enforcement, do not have many obstacles averting them from checking the emails of the employers. It is only a matter of business as the employees should take into account the fact that theory can cause difficulties to their business, that is why, the main aim of the agreement of privacy policy is to protect the company, but not to adversely modify the rights of the employees (Levmore and Nussbaum, 2010, p. 45). Privacy policy measures are forwarded to protect company from illegal usage and leakage of business information through the emails of its employees. Every company should control usage of Internet usage and content of email messaging. It is regulated by the current legislation and every employee should stick to the laws of privacy policy. The employees realize that the privacy policy is very significant for the both, them and their company. It is an inevitable part of the policy of every company used to prevent the leakage of company’s information and preserve the order within the organization. As usual, privacy policy does not have any negative effect on the employees. Indeed, it makes them more careful and watchful concerning the problem of security and privacy, as privacy at work is a half of success of every organization. Reference List Hatchen, W.A. and Hatchen, H. (2000). The World News Prism: Changing Media of International Communications. Iowa: Iowa State University PressNissenbaum, H. ( 2009) Privacy in Context: Technology, Policy, and the Integrity of Social Life (Stanford Law Books). Stanford: Stanford Law BooksLevmore, S. and Nussbaum, M. ( 2010) The Offensive Internet: Speech, Privacy, and Reputation. New York: Harvard University PressSoong J., (2010) When Technology Addiction Takes Over Your Life. Boston: Wiley