Friday, May 31, 2019

An Analysis of Jack Londons To Build a Fire :: London To Build a Fire Essays

An Analysis of Jack Londons To make believe a FireIn his obligate To Build a Fire a Physical Fiction and Metaphysical Critics Charles E. May comments and disagrees with a statement that To Build a Fire is a chef-doeuvre of a short fiction(20). Literary critics claimed that London used many metaphors in this work such as sun-fire-life or cold-darkness-depression-death(20), but May argues that this flooring should be read and interpreted literally and does not contain deep, dual or metaphorical meaning. He says For Jack London, and consequently for the reader, the man in the tommyrot is simply a living body, the cold is simply a physical fact(22). What is more articles author strongly disagrees with the critic, who compares the makeup of the story to a theme of a classical tragedy. May sarcastically states that the only visible similarity in terms of theme would be the issue of protagonists death(22). I think that To Build a Fire story relates to many issues hidden behind a super ficial plot. The story make fulls place in a very severe overwinter the man under appreciates the dangers of nature forces and struggles to return to camp. He is warned about possible dangers, but he is also too pride and too self-confident to take the advice into consideration. The protagonist is accompanied by a dog. The man tries to survive, but forces of nature are stronger and he dies.The interpretation of the story, however, reveals real treasures problem of loneliness, deadly fear, acceptance, understanding, issue of meter, and a scary silence. The protagonist seems to be a very independent and strong person, he rather listens to himself first. He planned his way back home, and regardless to die hard condition he realizes his plans and sets off. During this trip he starts to realize that it may be too cold, initially tries to set up a fire, but it is not abundant to survive. He is scared, and has a feeling of a coming death. In some ways he is similar to a contemporary p erson, who never has enough sequence for anything. The protagonist rushes to get home, to realize his own plans, to go forward, then on a deserted land he suddenly finds time, too much time to think, and to feel. It was a very uncomfortable feeling to be aware of his own death he is able to predict what will happen. At first, he tries to leak and safely find camp, but afterwards he learns it is impossible, and accepts his fate.

Thursday, May 30, 2019

Compare 4 poems (1 Duffy/ 1 Armitage/ 2 Pre 1914) which you have found :: English Literature

Compare 4 poems (1 Duffy/ 1 Armitage/ 2 Pre 1914) which you have foundinteresting because of the way they are structured and the languageused.In this essay, I am going to compare four poems, which are thieveryby Carol Ann Duffy, Hitcher by Simon Armitage, My Last Duchess byRobert Browning and The Laboratory by Robert Browning that I havefound interesting as the way they are structured and the languageused.The four poems tout ensemble have similarities between themselves, as they areall involved with the floor of violent. Also, the poets have used manyunlike language devices with a well-planned structure to make thepoem more appealing to the reader. This is effective, because it makesthe reader feels that its different from the other poems.Firstly, in Stealing Duffy has started off the poem with arhetorical question, The most uncommon thing I ever stole? A snowman.(Line 1)This whitethorn illustrates to us either that the persona is responding thequestion that some(prenominal) one has asked in a conversation or the personawanted to tell us what is the unusual thing she/he has stole. Thismakes us feel interesting to the poem, because the languages Duffy hasused, to make we as a reader to interpret whatever way we like. Thestructure in Stealing is irregular, because the previous stanza doesnot link towards the next stanza. This perhaps displays that Duffy istrying to shows the disturbed mind of the persona.Mostly Im so bored I could eat myself. (Line 21)From this sentence we loafer find out that the persona is an abnormalperson, because a normal person would not eat him/herself even thoughif they were bored. The interesting bit of the structure is that it isunique. Since that some of the poems always have the same structurewhich seem to be normal and dull, therefore if the poem structured ina different way forget make the reader feel its an extraordinary poem.In contrast, in Hitcher, My Last Duchess and The Laboratoryalthough, the languages that the poets ha ve used are not violent, butwhat the character does in the poem makes the poem seem to be violent.For example - In Hitcher, the murder killed a person in the poem,once with the head, then six times with the krooklok in the face.(Line 13)From this line it proves that Armitage has hardly used any violentlanguages in the violent act scene. This makes the poem seems to beinteresting because the poem has still contains the theme of violent,without using aggressive languages.

Wednesday, May 29, 2019

Spender And Sankichi: Two Views Of Disaster :: essays research papers fc

Stephen spend-alls "Epilogue to a Human Drama" and Toge Sankichis "Dying" are poems detailing the destruction of both cities, London and Hiroshima, respectively, during or after World War II bombings. Spender wrote "Epilogue to a Human Drama," hereafter referred to as "Epilogue," after a declination air raid of London during the Battle of Britain, which ravaged and razed much of England from Summer 1940 until Spring 1941. Sankichi wrote "Dying" from his vivid recollections of the surprise atomic bombing of Hiroshima, which decimated the Japanese city in less than a second. Both the Battle of Britain and Hiroshima were horrible, senseless, and vicious incidents that exacted gave tolls on innocent victims. Spender endured the Battle of Britain, and Sankichi experienced the horror of Hiroshima. The poets responses differ greatly in style and perspective, but each work clearly defines the ramifications of atrocities such as those committed agai nst Spender, Sankichi, and the populations of London and Hiroshima.     Englands Royal Air Force battled Germanys Luftwaffe from August 1940 until may 1941. During that conflict, England was subjected to air raids day and night. When Hitler finally withdrew his birds of war, four hundred thousand British citizens had been killed, forty-six thousand had been seriously wounded, and one million homes had been leveled. After one raid, a relief team helped a woman who had covered been covered in powdered brick and plaster and was bleeding profusely. As they aided her, she repeated four address continually in a tone of quiet terror "Mans inhumanity to manMans inhumanity to man" (Jablonski 148).     Stephen Spender was in London for the duration of the bombings. He saw the demolition of surrounding buildings. He heard the droning of approaching bombers. He smelled the smoke of raging infernos. In his autobiography World Within World, Spende r describes his cordial condition during the raids as a "trance-like condition" and describes how he forced himself to think of places and things as merely mental concepts in order to avoid losing mental control (285).     Hiroshimas destruction came without warning. Japanese High leave out, which was located Hiroshimas ancient castle, was alerted early to the approach of the Enola Gay by an observation post on the island of Shikoku. The High Command elected to sound no air raid warning because they considered it senseless to disrupt work in local armament factories due to a champion plane (Bruckner 98). At precisely 815 AM local time, the fuse was lit inside the descending bomb.

gay literature :: essays research papers

While sexual difference may not exist in the midst of lesbians all other forms of difference do. These include differences of identity race, class origins, employment status, age, religion, physical abilities - and while we may struggle against these differences within our individual spaces they have a material and institutional reality that cannot be wished awayWhat, to you, seems important about the terms gay and lesbian in literature?In the face of a homophobic society we need creative and critical processes that draw out the complexity of lesbian lives and same sex choices, not a retreat into the comfort myths of heroines and unfractured, impeachable identities This quote addresses directly the primary difficulty of the issue. The terms gay and lesbian are useful in literature in that they allow a meeting of people who have been marginalised and even persecuted to become visible. They enable a way of life and a set of identities, harmonious or conflicting, to be presented, to be questioned, to be understood and accepted. As categories they create space in which there may develop a more evolved understanding of texts and they also create a musical genre within which many lesbian and gay writers are comfortable with being placed. A gendered reading of a text can reveal undercurrents and depths which might differently not be apparent. These categories also make space for the author within the text which leads to a closer tie between the author and the reader in the reading process. However the danger which this sort of terminology presents is that of homogenising ways both of reading and writing a text. In creating a category one is perpetually not only creating an inclusive zone but in doing so also excluding certain elements. The guess is run of stultifying the creative process through the projection by a minority group of the minority groups within. As Bonnie Zimmerman writes in her essay Lesbians like this and thatBy positing the lesbian as excess in the gray system we may fail to note the identities that function as excess within our own newly created lesbian community. There is a risk of adopting a separatist approach, of placing the categories of gay and lesbian literature outside the mainstream and creating a gay canon but in doing so retaining the underlying values of that patriarchal system. How does one avoidreplicating the masculinist cultural error of taking the dominant for the universal

Tuesday, May 28, 2019

Recording and Viewing Live Band Performances :: Expository Essays Research Papers

Recording and Viewing Live Band PerformancesMany people enjoy listening to music, but are eer re e rattling last(predicate)y excited to go see a live performance of their favorite bands. Theres something about the atmosphere of being with thousands of people who all love the same band you do. Everyone is going crazing and yelling and screaming for joy. Then the show ends. After the show fans usually stop by the souvenir stands and by a shirt or poster to commemorate their trip to see their favorite band play live. But, what if the show didnt have to end? What if in that location was a souvenir each fan could buy that made the show live on forever? The Grateful late(prenominal) and Phish, jam bands with a very dedicated following of fans, have come up with a solution to make the show live on. The idea started back in the 1960s and seventies when the Grateful Dead developed their loyal following. The Grateful Dead allowed and actually encouraged their fans to record the bands live p erformances. At the live shows there would be a sections blocked of for the tapers. They would all set up their recording equipment and would then capture every moment of the show. Then in 1983 Phish played their first gig and excessively started to develop a very loyal and dedicated fan base. Phish too allowed and encouraged their fans to record their live performances. The Dead heads and Phish heads that recorded the shows made the shows live on forever for many fans. The tapers first started trading tapes of the shows with fans who requested a specific show. Then they actually put all of their shows on the internet to be procurable for download for free. Sites were dedicated to downloading Phish and Grateful Dead shows. Any show you wanted was pretty much available for download and at no cost. This gave the loyal fans a chance to relive the experience they went through at the shows and was completely permitted by the bands even though they were not receiving any royalties. Now in the year 2004 other(a) bands have finally caught on to the wonderful idea of recording live shows and making it available to their fans. However, it is not exactly the same way that the Grateful Dead and Phish used to do it. It all started when in 2003 Phish began an official website called www.

Recording and Viewing Live Band Performances :: Expository Essays Research Papers

Recording and Viewing Live Band PerformancesMany people enjoy listening to music, but are always re in ally excited to go see a live performance of their favorite call ups. Theres something about the atmosphere of being with thousands of people who all love the same band you do. E preciseone is going crazing and yelling and screaming for joy. Then the show ends. After the show fans usually stop by the souvenir stands and by a shirt or poster to commemorate their trip to see their favorite band play live. But, what if the show didnt wear to end? What if there was a souvenir separately fan could buy that made the show live on forever? The pleasing Dead and Phish, jam bands with a very dedicated following of fans, have come up with a solution to make the show live on. The idea started back in the 1960s and 1970s when the Grateful Dead genuine their loyal following. The Grateful Dead allowed and actually encouraged their fans to record the bands live performances. At the live shows there would be a sections blocked of for the tapers. They would all position up their recording equipment and would then capture every moment of the show. Then in 1983 Phish played their showtime gig and also started to develop a very loyal and dedicated fan base. Phish too allowed and encouraged their fans to record their live performances. The Dead heads and Phish heads that recorded the shows made the shows live on forever for many fans. The tapers first started trading tapes of the shows with fans who requested a specific show. Then they actually put all of their shows on the internet to be available for download for free. Sites were dedicated to downloading Phish and Grateful Dead shows. Any show you wanted was pretty much available for download and at no cost. This gave the loyal fans a chance to relive the stick they went through at the shows and was completely permitted by the bands even though they were not receiving any royalties. Now in the year 2004 other bands have f inally caught on to the wonderful idea of recording live shows and making it available to their fans. However, it is not exactly the same way that the Grateful Dead and Phish used to do it. It all started when in 2003 Phish began an official website called www.

Monday, May 27, 2019

Death and Afterlife Beliefs Essay

There remains no scientific evidence or facts which smoke prove the existence of the aft(prenominal)wards vivification. Such concepts like reincarnation, salvation, and near- close experiences confirm been truly controversial topics of debate over the years. However, different religions, philosophies and spiritual beliefs from different cultures amazingly provide very slender and meticulous explanation about the concept of termination and the after deportment. These explanations vary as their nerve of ideologies and philosophies vary as well. The Mesopotamian civilization has been known for its very overflowing culture and tradition.During the reign of the civilization, a lot of discoveries and inventions have been do which notwithstandingtually led to some modern advancement as well. In addition to this, the Mesopotamian culture too had a very interesting view of terminal and eternal life. According to the ancient Mesopotamian belief, the knowledge base can be divided into three different layers these are the heaven, the netherworld and the living world (Cornell University CU academic site, 2004). The heaven-sent beings or the gods and goddesses are believed to reside the heavens.This redact is said to be exclusive for these holy beings. The netherworld on the other hand was believed to be the imprisoning place after death which is also described as the house of darkness and a place, where no 1, to any further extent, can escape. According to Mesopotamian myths in relation to major power Gilgameshs adventures and stories about Ishtar, the descent to the netherworld is really frightening but inevit up to(p), and that in fact, even Gilgamesh himself went on his adventures in trying to escape this place.Lastly, the living world was described to be the world where all living beings reside and survive the days with their humane and worldly admits. Although this culture recognizes the existence of death and afterlife in the netherworld, Mesopotam ians believed that a man can still escape the course of death and the dark netherworld by being stainless and trying to connect and have an intimate relationship with God. The Egyptian tradition and beliefs of death and the afterlife on the other hand, can also be considered peerless of the most culturally rich traditions in the world.Deaths of Egyptians are rather commemorated and venerated than mourned. They were more focused on the preservation of the body as a positive ritual in giving the on the spur of the moment a pleasant afterlife state. Ancient Egyptians would also design the tombs of the dead with scriptures, holy verses, poems, and elegant sculptures of scenes of the afterlife in the hope that the spirit of the dead forget be at a peace and be granted prosperity in the afterlife. The tomb of the dead is also packed with necessities that the owner might need or want to bring with him/her in the afterlife.The afterlife in Egyptian culture was described as a place wher e there are beautiful canals, dams, and farms where the yield of the fruit-bearing trees and crops is neer-ending (Williams, 2008). Life in ancient Egypt in general has been blessed being resided along the banks of the Nile River where raft always have sufficient resources. This someways explains why Egyptians also looks forward to a blessed afterlife. They have been used to living life bountiful with resources that is why they would always hope to find the homogeneous bountiful afterlife like the life of the living.On the other hand, the culture of the classicals and the Romans (Greco-Romans) was rather more individualified and mythical. Concepts of death and afterlife were incorporated with very detailed descriptions of gods and goddesses. The life of ancient Greeks was always bounded and guided by these gods and goddesses who were believed to have the ability to talk and live with them. According to the ancient Greek mythology, as a psyche dies, his/her psyche or soul is be ing release by means of and through a puff or breath of wind (Metropolitan Museum of Art).Death in ancient Greek tradition also had very elaborate rituals that were divided into three parts the prothesis, ekphora and the internment. During the prothesis, relatives and loved ones of the dead espouse and pay respect. And during the ekphora, the dead shall be brought to the cemetery through a procession which happens before dawn. And then finally, the deceased will come to its final rest through the internment. The concept of afterlife for the Greeks was clearly described through the stories of the Iliad and Odyssey which was able to write a very detailed account of the Greek mythology.Homer noted in the Odyssey the early description of the underworld where the dead people all go. The place was described as a place underneath the earth where Hades, the brother of Zeus and Poseidon reigns. A person who enters the underworld can never go posterior. However, there were also stories tol d about great people who were able to go to the underworld to talk to their deceased loved ones and were able to go back to the world of the living. But the success of these people required trickery and deception of the king of the underworld, Hades.Hercules was one of the great Greek characters, who was able to return from the underworld. But sagacious that Hercules was half-immortal, it was also understandable that he could do such a thing. And because the life of the Greeks has been closely guided by some(prenominal) gods and goddesses, it was also believed that a person can possibly escape the deep and frightening walls of the underworld by having a close and intimate relationship with the gods. Through this, people to whom gods and goddesses are mostly rejoicing are sometimes brought to the heavens (Olympus) to live an immortal life with them.The most popular history about death and afterlife in Christianity is probably that of the death and resurrection of Jesus Christ. Fo r Christians, it was taught that Christ died on the cross, then after three days he rose from the dead and eventually rose up to the heavens, body and soul. This story has been the inspiration for the spiritual lives of all Christians. The resurrection of Christ from the dead has been the greatest affirmation to Christians that there really is life after death. And from this story, a lot have already been told in Christian bible about the life after death.This concept has been argued by the apostle Paul to the disbelievers, he said Now if Christ is proclaimed as raised from the dead, how can some of you say there is no resurrection of the dead? If there is no resurrection of the dead, then Christ has not been raised and if Christ has not been raised, then our proclamation has been in vain and your faith has been in vain. (1Corinthians 15. 12-14 qtd. in Houben). For Christian believers, every person has a soul (dualism) and that soul is what lives after the person dies.The soul can either rest in heaven or continuously suffer in hell depending on how s/he was able to live his/her life. These concepts of heaven and hell have been the guiding idea of the Christians to how they live their lives. According to teachings, one shall be accepted in heaven if s/he was able to follow the commandments of the original, and if s/he was able to be righteous in his life in accordance to the word of the Lord. On the other hand, one shall suffer the pains of hell if s/he did bad things in considerably most of his/her life and s/he chose to live against the will of the Lord and his teachings.Over the years, this has been the main teaching to Christians about heaven and hell. Christians would describe the heaven as the place where there are golden roads and castles. A place where there are bountiful trees and crops that never runs out of yield, and also, a place where there is no more suffering. The heaven was indeed taught as a paradise after death, where hell on the other ha nd was described as the complete contrary and was further depicted as the worse place one can ever be in.The burial and commemoration rights for the dead among Christians are also somewhat detailed. They would lament and pay respect to the dead for a pair of days, gathering the family, and offering flowers and prayers to the dead and to the family. During these gatherings, the dead is often remembered and prayed for. The prayers were believed to help the soul of the departed reach to the heavens easily. After the plaint, the dead shall now be brought to its stretch out venue where flowers and significant items to the dead are being buried with it into the grave.And the commemoration of the dead does not end there because Christians celebrate the life of the dead on the same day of their deaths every year which is called their death anniversary. Looking at these different perspectives about death and the afterlife, we can observe that there are several similarities and differences among the religions or spiritual beliefs discussed. The Mesopotamian, Greco-Roman and Christian cultures all believe in the concept of heaven or paradise and hell or underworld after death.This concept of a very beautiful and peaceful place after death has been evident in the teachings of the three cultures. All of them also taught that only righteous people can ascend to the heavens and be with the gods. The Mesopotamian and Greco-Roman cultures similarly described the underworld as the place where the dead inevitably go. These two cultures also described the underworld as place where people cannot escape anymore once they are there. While the Christians believed in the concept of hell as a frightful place where people who chose to be bad shall go after they die.The Egyptian culture also shared that similarity with that of the Christians and the Greco-Romans in terms of lamentation and burial rights. All these three cultures lament or commemorate the death of their loved ones in b elief that this would please the dead. These cultures also practice very detailed burial rights in order to give the dead a peaceful cross over. There may be similarities in the practices of these religions or cultures however their core beliefs are completely different from each other.Over the years, we have relied on spiritual and religious teachings to find hope and explanation if there really is life after we die. We as human beings have that natural urge to find out what can possibly happen to us after death, but even how different or similar religious teachings might explain death and afterlife we must understand that the answer will always depend on what specific religious belief we stick to and what beliefs we have about life itself. These religions or spiritual beliefs may vary in explaining the concepts of death and afterlife, but these differences come from the differences they have with their ideologies.

Sunday, May 26, 2019

Fiscal policy Essay

Fiscal policy refers to the presidential terms choices regarding the overall level of government purchases and taxes. Fiscal policy is undertaken by government to manage, control and manipulate the economic variables in the economy like inflation, unemployment, consumption and so many more. The fiscal operations that has been taken place for the past tenner in Ghana In the year 2000, Total revenue and grants amounted to 5,385.0 meg while come exp set asideiture came to 7,524.9 billion. Out of an estimate of 1,319.0 billion, only 574.3 billion very flowed in.Tax revenue collections exceeded the original projections on account of good performance from direct taxes, indirect and trade taxes. The provisional actual tax revenue yielded 3,731.7 billion as against an estimate of 3,957.3 billion. Provisional figures for 2000 indicate an overall balance of payments deficit of US$194.8 million, compared with an initial projected zero balance. In 2001, Provisional outturn for 2001 indicat es that overall fiscal balance was a deficit of 4.4 per cent of gross domestic product. Tax revenues exceeded the budget projections of 6,255.2 billion by 301.7 billion, because of better-than-programmed yield from value added taxes and import duties.Provisional fiscal info show total statutory payments of 5,474.5 billion and discretionary payments of 6,206.3 billion. These are spurn than the respective targets of 5,574.8 billion and 7,498.7 billion. In 2003, The receipt of 3,118.8 billion, in total grants including multilateral HIPC patronage in 2003 represented a disbursement rate of almost 98percent, the highest in many years. Compositionally, tax revenue exceeded the target of 12,556.3 billion by 205.8 billion. Also, real GDP growth was higher than expected 5.2 per cent against a projected 4.7 per cent. The overall budget deficit was contained at 3.4 per cent of GDP against the targeted 3.3 per cent of GDP.In 2004, tax has increased from 4.4 trillion representing 16.3 perce nt of GDP of 27,150 billion at end of 2000, to an all-time high of 17.4 trillion, resembling to 21.8 percent of GDP of 79,800 billion at the end of 2004. Total budgeted payments for the 2004 fiscal year were estimated at 24,853.1 billion. The provisional outturn for the period was 28,736.8 billion, consisting of 8,951.6 billion of statutory payments and 19,773.2 billion of discretionary spending representing 31.2 percent and 68.8 percent of the total respectively. In 2005, In all, total receipts made up ofDomestic revenue, grants, loans, divestiture receipts and exceptional financing are projected at 35,672.5 billion lower than the budget estimate of 35,801.3 billion by 128.8 billion for the year. Total payments for the 2005 fiscal year was budgeted at 35,801.3 billion.This was made up of statutory payments of 12,240.4 billion and discretionary payments of 23,560.9 billion. disposed(p) the expected receipts and payments in 2005, the overall budget balance is projected to record a deficit of 2.4 per cent of GDP, compared to the budget estimate of 2.2 per cent of GDP. In 2006, an overall budget deficit of 4.5 per cent of GDP as result of expenditure exceeding total receipts amounted to 41,357.1 billion as against total statutory payments of 13,006.5 billion. In 2008, the overall budget deficit excluding divestiture hit a high of GH2,557.6 million, equivalent to 14.9 of GDP. As against a total receipts, comprising domestic revenue, grants and other receipts amounted to GH9,538.2 million, equivalent to 55.4 per cent of GDP.And total payments for 2008, comprising discretionary and statutory payments, amounted to GH9,538.2 million, significantly higher than the budget estimate of GH7,107.2 million. In 2009, total revenue and grants are projected at GH7.2 billion, to a fault indicating a drop of 3.5% below the original budget estimate. The projected outturn for the year is GH8.7 billion, showing 13.8%drop in spending. The overall budget deficit for 2009 is estima ted at GH2.2 billion, equivalent to 10.2% of GDP. In 2010, based on the projected revenue and expenditure for the year 2010 the overall budget balance, showed a deficit of GH2,214.3 million, equivalent to 9.7 percent of GDP. As againstConclusionThe above measures that have been put in place by the government to ensure stability and growth in the economy simply touch on the fiscal operations that have taken place for the past decade. It is quite obvious to come to conclusion that for that past decade we have being attempt to stabilize our economy as the budget deficit for each year increases significantly for almost a decade now.

Saturday, May 25, 2019

Personal Responsibility and College Success

College Success How Personal function Plays a Role College Success How Personal Responsibility Plays a Role Little Johnny walks into a classroom and sits down with the rest of the class. As the bell rings the teacher asks all students to turn in their homework. The teacher notices that Johnny does not turn in anything and asks him Wheres your homework? His response, The dog ate it In todays society it is much easier to unsaved others for your actions instead of taking full responsibility for your own.Handling certain situations in your biography, whether it be school, work, or social events requires some type of personal responsibility. Personal responsibility is display accountability for the obligations that a person has mark off over. This means that you fall in to be accountable for your actions in the situations that you are involved in whether they are in your control or not. Being trusty leave alone dish up to reach your goals in life when it comes to your school, c areer and family. In order in to succeed in college you consider to be a responsible student. Love be a student.When people get married they take on the billet of universe a spouse. With this role comes responsibility. Nurturing the relationship, children to raise, bills to pay, cleaning, and cooking are just some of the responsibilities that married couples have. However, they love the role of the spouse (otherwise they would not have gotten married) and with loving the role they easily take on the responsibilities. As a student, you have to use the same approach. When we love being a student, responsibilities will not seem like dreadful tasks, but will be something we love to do.Not only much you love your impudently role you have to own it. Steven goes to Carmax and buys a new car. Being the owner of a new car, he has responsibilities of taking care of it. Regular oil changes, inspections, new tires, and rotation are just of the tasks that come along with regular maintenance. Same as being a student, owing your role will help you succeed in college. Regular reading, attending class, studying for examations is just the regular maintenance that you have to do to be successful. Once you love and own your role of being a student, living the student life comes into play.Mothers have the life of taking care of the children, cleaning, cooking, and streak errands. Fathers have the life of going to work and providing for his family. Teachers have the life of teaching their students information, grading papers, and helping students who have fallen behind. Everyone has a life and many have different lives. Being a student you have to live the student life. Doing homework, not staying out late, plan your assignments and projects ahead are all a sidetrack of the student life. By incorporating personal responsibility into my education will as well help me succeed and eventually help me graduate.Developing an action plan and incorporating it in your life will also help you succeed in college. Time management and planning will be the biggest responsibility. If you have a busy life already and have added school into your life, it would be beneficial to map and plan out your day ahead of time. Your time may be tight but being responsible and sticking to your to-do list will help you get everything done and be prepared for the next day. Also not procrastinating will also help you become a responsible student.Everyone has his or her days where they do not want to do anything and just be lazy. However, this will not help you succeed in where you want to be. Continuing to remind yourself to complete your tasks will help you in getting things done. Finally, another action plan is money management. check is expensive and being responsible for money now and in the future will help. Only borrowing what you need and making planning financially succession in school will benefit you in college. Personal responsibility plays a major role in everyones life .Whether it is school, personal, or work, being responsible will help you accomplish so much out of life. Love, owing, and living the life of a student are tools to help you get a sell on being responsible in school. fancyning ahead and time and money management will also help you in college and help you succeed. Plan on being responsible for all you actions in the situations that you have placed yourself in and whatever life may throw in your way. Going keystone to school was probably a big decision for you and so plan on making the most out of it.

Friday, May 24, 2019

The Applying Problems and Resolving to Implement Sustainable Tourism

The applying problems and the re resolve to implement sustainable touristry In this day and age, touristry is one of the largest industries, with an change magnitude keep down of tourists all around the world. Because of this, thither be many impacts on humankind, with both positive and negative sides. Hence, the sustainable tourism, which is the concept of visit an area as a tourist and trying to make a balance of the social, culture, economic and especially environmental dimensions, is gained in importance.However, Frey & George (2010) describe that this concept turn overms to see a momentous role in tourism field, but only few of tourism businesses are participating in. This essay allow examine the grounds and both(prenominal) accomplishable suggestions. It give first explain the overall of the definition of the sustainable tourism. Then the focus moves onto the factors applying the unsuccessfully sustainability in practice and round specific examples.Next, some feasi ble measures will be provided. Finally, it draws a conclusion on the limited in the concept of sustainable tourism. There are a few definitions of sustainability within the context of tourism, including ecotourism, jet purposee travel, environmentally and culturally responsible tourism, fair trade and ethical travel.To most passel, sustainable tourism, that is the most important way to success in sustainability, is still non widely understood despite the remarkable growth of the sustainable tourism industry therefore, Frey & George (2010) has defined the overall meaning and concept of sustainable tourism in their article that is a part of sustainable maturation, which is the most valuable of economic, social, natural and cultural resources by management, protection, and conservation, and still maintains its unique as farseeing as achievable for sustainable development that could create the better experience for responsible visitors.By definition, much(prenominal) the sustai nable tourism should r all(prenominal) its objective, but it is not because there are early(a) difficulties. First of all, the main reason that leads to the failure of sustainable tourism is the administration and management with involving schemes, including both policy and operational levels such as the authority of tourism and the local community organization. These government agencies are the majority of the sustainable development however, in recently years, the development always operates by to each one exclusive organization especially in developing countries.The challenge to the sustainable tourism development in Turkey is the scoop out example to illustrate this reason. Tosun (2001) shows the booking amid the rally and the local government. The former has concerned some the overall development by supports and onward motions of the sustainable tourism in order to enchance the better economy. Nevertheless, the last mentioned has their own policies solving the local specifically problems in each area, so they do not want to follow the centralization. As a result of this agrument, the sustainabiliy has to await with the failure.All of above, you can see the important of the collaboration. Subsequently, shifting in carring capacity is not balancing to demands of visitors. The government support the tourism development but supplied are not enough to provided. The best example is the tourism development in Gambia, Thompson, OHare, & Evans (1995) find that the Gambia government has encouraged the tourism development because they recognize the charming climate and the handsome landscape that is piquant for a large number of tourists eventhough, the resources, such as accommodations, facilities, and natural resources, are limited.Consequently, the tourism has been growing in leaps and bounds in a short time, so the management, including economy, natural resources, administration and investment, facilities development, education, and training, is pr oposed. By doing this, the spread of drug abuse, enhanced crime rates, increases in prostitution, and the spread of sexually transmittes diseases are some of the pursuit social problems as a result of the failure in the development of sustainable tourism (ibid). The scarcity of resources is one of the key problem to develop the sustainable tourism.Another major reason that needs to be taken into account is a cooperation of plurality in each community with government policies. These mint are performing roles that relate to the sustainable touriam in many forms, such as the ownership and supplier of goods and services. The importance of these people might be mechanism in the development of the sustainable tourism. If these people do not cooperate, the development would delay or interrupt. As Ioannides (1995) argues in his article about a flawed implementation of the ustainable tourism in Akamas, Cyprus, in this area, the government requires to turn the mass tourism into ecotourism, which is base on the national park area, because of a lack of accommodations and facilities. By the way, the local people do not agree with this policy so the government offers the other alternative tourism such as argotourism. The farmers and agriculturists feel that is unfair to them anymore so they still do not give the cooperation. All of above, there is not only the reasonable government policies, but also consisting the collaboration of the local people.Despite the reasons as mentioned above, some possible sugguestions for sustainable tourism development are also given. One of the most possible way is a collaboration and a unified tourism plan by balancing the economic, social, and natural resources in the vary progress towards the sustainable tourism, and a analysis how the plan can do in practice (Kernel, 2005). By doing this, the situation could be improved. An another useful suggestion woud be the evaluation about the ability to support the sufficient demands of visitors or limite the number of travellers to visit the soil (Fortuny, Soler, Canovas, & Sanchez, 2008).Consequently, the result would allow the balance of the demand and supply suitable for tourism. The further measure to solve this problem is the cooperation of people based at level of individual investment rather than the tourism sector may be effective in more cooperation mingled with the government, local citizens, and tourists (Garrod & Fyall, 1998). Lastly, creating networks and sharing the study and/or guidelines between the countries facing the same crisis can be useful for each other(Kernel, 2005).If all of these sugguestions were implemented, the sustainable tourism could be successful and optimized as foresightful as possible. From the same problems and solutions of the sustainable tourism, it can be concluded that the most important point is the understanding about the concept of sustainable tourism. Although, there are some factors, such as the lack of resources, the con flict betweeen the central and local government, and the cooperate from the local people, that make the concept unpracticed as it could.On the other hand, the issues about development and promotion of the sustainable tourism are about the parcticability in real life. If the government and the local people who own the tourism areas had cooperated and shared ideas with trilateral together basing to the last of the development, and encourage people to wisely consume the resources, it could be an effective way to the sustainability. There are not only the responsibility of the people in each country, but also including the tourists from another country because the sustainable tourism development relies on the cooperating people and the resources.References Garrod, B. and Fyall, A. (1998), Beyond the Rhetoric of Sustainable touristry? , tourism precaution Vol. 19, No. 3, 199-212 Thompson, C. , OHare, G. and Evens, K. (1995), touristry in the Gambia Problems and Proposals, Tourism Ma nagement Vol. 16, No. 8, 571-581 Tosun, C. (2001), Challenges Of Sustainable Tourism Development in the Developing ground The Case of Turkey, Tourism Management 22, 289-303 Ioannides, D. (1995), A Flawed Implementation of Sustainable Tourism The Experience of Akamas, Cyprus, Tourism Management Vol. 16, No. , 583-592 Fortuny, M. , Soler, R. , Canovas, C. and Sanchez, A. (2007), Technical Approach for a Sustainable Tourism Development Case Study in the Balearic Islands, journal of Cleaner production 16, 860-869 Frey, N. and George, R. (2010), Responsible Tourism Management The Missing Link between Business Owners Attitudes and conduct in the Cape Town Tourism Industry, Tourism Management 31, 621628 Kernel, P. (2005), Creating and Implementing a Model for Sustainable Development in Tourism Enterprises, Journal of Cleaner Production 13, 151164The Applying Problems and Resolving to Implement Sustainable TourismThe applying problems and the resolving to implement sustainable tourism In this day and age, tourism is one of the largest industries, with an increasing number of tourists all around the world. Because of this, there are many impacts on humankind, with both positive and negative sides. Hence, the sustainable tourism, which is the concept of visiting an area as a tourist and trying to make a balance of the social, culture, economic and especially environmental dimensions, is gained in importance.However, Frey & George (2010) describe that this concept seems to play a significant role in tourism field, but only few of tourism businesses are participating in. This essay will examine the reasons and some possible suggestions. It will first explain the overall of the definition of the sustainable tourism. Then the focus moves onto the factors applying the unsuccessfully sustainability in practice and some specific examples.Next, some feasible measures will be provided. Finally, it draws a conclusion on the limited in the concept of sustainable tourism. There a re a few definitions of sustainability within the context of tourism, including ecotourism, green travel, environmentally and culturally responsible tourism, fair trade and ethical travel.To most people, sustainable tourism, that is the most important way to success in sustainability, is still not widely understood despite the remarkable growth of the sustainable tourism industry therefore, Frey & George (2010) has defined the overall meaning and concept of sustainable tourism in their article that is a part of sustainable development, which is the most valuable of economic, social, natural and cultural resources by management, protection, and conservation, and still maintains its unique as long as possible for sustainable development that could create the better experience for responsible visitors.By definition, such the sustainable tourism should reach its objective, but it is not because there are other difficulties. First of all, the main reason that leads to the failure of sust ainable tourism is the administration and management with involving organizations, including both policy and operational levels such as the authority of tourism and the local community organization. These government agencies are the majority of the sustainable development however, in recently years, the development always operates by each individual organization especially in developing countries.The challenge to the sustainable tourism development in Turkey is the best example to illustrate this reason. Tosun (2001) shows the conflict between the central and the local government. The former has concerned about the overall development by supports and promotions of the sustainable tourism in order to enchance the better economy. Nevertheless, the latter has their own policies solving the local specifically problems in each area, so they do not want to follow the centralization. As a result of this agrument, the sustainabiliy has to face with the failure.All of above, you can see the important of the collaboration. Subsequently, shifting in carring capacity is not balancing to demands of visitors. The government support the tourism development but supplied are not enough to provided. The best example is the tourism development in Gambia, Thompson, OHare, & Evans (1995) find that the Gambia government has encouraged the tourism development because they recognize the charming climate and the beautiful landscape that is attractive for a large number of tourists eventhough, the resources, such as accommodations, facilities, and natural resources, are limited.Consequently, the tourism has been growing in leaps and bounds in a short time, so the management, including economy, natural resources, administration and investment, facilities development, education, and training, is proposed. By doing this, the spread of drug abuse, enhanced crime rates, increases in prostitution, and the spread of sexually transmittes diseases are some of the following social problems as a result of the failure in the development of sustainable tourism (ibid). The scarcity of resources is one of the key problem to develop the sustainable tourism.Another major reason that needs to be taken into account is a cooperation of people in each community with government policies. These people are playing roles that relate to the sustainable touriam in many forms, such as the ownership and supplier of goods and services. The importance of these people might be mechanism in the development of the sustainable tourism. If these people do not cooperate, the development would delay or interrupt. As Ioannides (1995) argues in his article about a flawed implementation of the ustainable tourism in Akamas, Cyprus, in this area, the government requires to turn the mass tourism into ecotourism, which is base on the national park area, because of a lack of accommodations and facilities. By the way, the local people do not agree with this policy so the government offers the other alternativ e tourism such as argotourism. The farmers and agriculturists feel that is unfair to them anymore so they still do not give the cooperation. All of above, there is not only the reasonable government policies, but also consisting the collaboration of the local people.Despite the reasons as mentioned above, some possible sugguestions for sustainable tourism development are also given. One of the most possible way is a collaboration and a integrated tourism plan by balancing the economic, social, and natural resources in the vary progress towards the sustainable tourism, and a analysis how the plan can do in practice (Kernel, 2005). By doing this, the situation could be improved. An another useful suggestion woud be the evaluation about the ability to support the sufficient demands of visitors or limite the number of travellers to visit the country (Fortuny, Soler, Canovas, & Sanchez, 2008).Consequently, the result would allow the balance of the demand and supply suitable for tourism. The further measure to solve this problem is the cooperation of people based at level of individual investment rather than the tourism sector may be effective in more cooperation between the government, local citizens, and tourists (Garrod & Fyall, 1998). Lastly, creating networks and sharing the information and/or guidelines between the countries facing the same crisis can be useful for each other(Kernel, 2005).If all of these sugguestions were implemented, the sustainable tourism could be successful and optimized as long as possible. From the aforementioned problems and solutions of the sustainable tourism, it can be concluded that the most important point is the understanding about the concept of sustainable tourism. Although, there are some factors, such as the lack of resources, the conflict betweeen the central and local government, and the cooperate from the local people, that make the concept unpracticed as it could.On the other hand, the issues about development and promoti on of the sustainable tourism are about the parcticability in real life. If the government and the local people who own the tourism areas had cooperated and shared ideas with multilateral together basing to the goal of the development, and encourage people to wisely consume the resources, it could be an effective way to the sustainability. There are not only the responsibility of the people in each country, but also including the tourists from another country because the sustainable tourism development relies on the cooperating people and the resources.References Garrod, B. and Fyall, A. (1998), Beyond the Rhetoric of Sustainable Tourism? , Tourism Management Vol. 19, No. 3, 199-212 Thompson, C. , OHare, G. and Evens, K. (1995), Tourism in the Gambia Problems and Proposals, Tourism Management Vol. 16, No. 8, 571-581 Tosun, C. (2001), Challenges Of Sustainable Tourism Development in the Developing World The Case of Turkey, Tourism Management 22, 289-303 Ioannides, D. (1995), A Flawed Implementation of Sustainable Tourism The Experience of Akamas, Cyprus, Tourism Management Vol. 16, No. , 583-592 Fortuny, M. , Soler, R. , Canovas, C. and Sanchez, A. (2007), Technical Approach for a Sustainable Tourism Development Case Study in the Balearic Islands, Journal of Cleaner Production 16, 860-869 Frey, N. and George, R. (2010), Responsible Tourism Management The Missing Link between Business Owners Attitudes and Behaviour in the Cape Town Tourism Industry, Tourism Management 31, 621628 Kernel, P. (2005), Creating and Implementing a Model for Sustainable Development in Tourism Enterprises, Journal of Cleaner Production 13, 151164

Thursday, May 23, 2019

Paper on Summation

Sowmya SUMMATION A Detailed re observe of inwardness SUMMATION Introduction The CT add-on Blaze LG product family helps you efficiently manage national nurture such as transcripts and put downs with the benefits of serious-text imaging, PDF support, electronic evidence support and comprehensive production tools. rundown to freight and get around DII File DII File A DII shoot is a specially formatted ASCII text ro aim that washbowl be induced deep down any text editor. The DII tear personas a non-delimited, multiple position format. Each testify ends with the cipher turn on make ups themselves.The entropy from the archive is make full into Summations c place down Database and establishes the link amidst the informationbase summaries and the associated effigys and OCR muniments. DII shoot down COMPONENTS T (Image Tag) mandatory for clearly DII take down. Must be purposed before any C symbol(prenominal)s for each DII record. Each instance of a contro versy publication 1 with the T token causes Summation to create a new-fangled database record or overwrite an existing cardinal. If the cheer that quest fors the T line does not learn an existing record emergence in the active sidestep (usually every the STDTABLE or the ETABLE) then a new record with that number is created.If a record with that number already exists, Summation prompts the user to all replace that records existing date information or leave its image information intact. The work normally utilize to de stipulationine a records unique number is either the BEGDOC expanse (for the STDTABLE) or the DOCID theatre (for the ETABLE). This dramatics send packing be channelised via OPTIONSDEFAULTSIMAGINGCOLUMN TO HOLD IMAGE TAG but it is not recommended. If there is an input template on the databases record number athletic field, then the T jimmy moldiness conform to the template format. fount The grounds database has an input template restricting the B EGDOC field to the format AA000000 (i. e. alpha, alpha, numeric, numeric, numeric, numeric, numeric, numeric). A DII lodge with the sideline T cherishs is prankish T RT100556 T 998113 The starting line matches the template format and a new database record with a BEGDOC value of RT100556 would be created. The wink line is incorrect, so no database record for this line would be created and an error message would appear on-screen and alike be written to the error log. D (Default Directory) Required for each DII record that has images or OCR to be loaded. The D token designates the localization of function where the image show(s) for a database record is stored. The data contract after the D is loaded into the Default Directory (DEFDIR) field of the ImgInfo table. There atomic number 18 3 different ways to denote the DEFDIR. 1. I, which refers to the omission IMAGES subfolder low the case directory. For grammatical case, for a mobile installation, if the case were metalw orker V. JONES, I would equal CPROGRAM pointSSUMMATIONCASEDATASMITH V. JONESIMAGES. 2.The full direction to the image register(s) placement. A UNC, local, or interpretped fuck off earn racetrack is acceptable. For example D SERVER1IMAGESSMITH V. JONESVOLUME1DISK1 D CIMAGESSMITH V. JONESVOLUME1DISK1 D ZIMAGESSMITH V. JONESVOLUME1DISK1 3. V, which refers to the specific majority grade of removable media. NOTE Users of Summation LG/iBlaze bed use UNC agencys after the D to specify a folder commanding images. L (Long Name Entry) Summation 5. 21 Legacy Field. L denotes the long name or definition of the image file(s). The L value is loaded into the LONGNAME field of the ImgInfo Table.This tag is obsolete and unnecessary on modern versions of Summation (1. 0 and higher) as they support long image file names. C ( pillar to join) 3 Optional token. C is used to load data into specified field in the users document database. This is a useful way to hang the amount of data ent ry required for the database users. It is meant for use when the aforementi peerlessd(prenominal) value is repeated for a group of documents, such as documents that all charter the comparable box number or author. It is not meant to replace regular data entry. For this reason, there is a limit of six (6) C codes available for each DII record.The sentence structure for utilize the C token is C For example, to fill in the ISSUES field of the database with the value Mental Health, the line would read C ISSUES Mental Health The C line(s) should appear underneath the T line for each database record. For consecutive DII records where these value atomic number 18 the same, you do not pack to repeat the C line. Instead, insert the beside C line in the next DII record where the data changes. To stop entering data in a field, insert a C line with the field name following by nothing. I (Image muddle as in fount Customize) Used with the D token.The I value refers to the image attitu de specified in Case Customize. The I value is loaded into the DEFDIR field of the ImgInfo table. This location moldiness be a stick letter (or UNC form for LG/iBlaze users) and path that points to the directory where the images ar stored. Summation users give the bounce aim any effectual location or use Summations omission location, the IMAGES subdirectory under the case directory. In either case, the image files must be copied to this location. V ( mint Label of Removable Media and Any Subdirectories) Used with the D code.The V value refers to the volume note of the removable media holding image files. When utilize a volume label, the course of instruction bequeath look a spue of drive letters for the specific removable media volume. The range of drive letters to be searched can be specified in OPTIONSDEFAULTSIMAGINGDRIVES HOLDING IMAGES. The volume label can be obtained from any drive by development the DIR command at the command prompt or by looking at the drive p roperties in Windows explorer/My Computer. When using the command prompt, the volume label will appear at the top of the directory display listing. Since close to document images atomic number 18 now stored on either local or lucre hard drives Summation has put forwardd an natural divideion to convert volume labels to directory names for existing database records with V image paths. By selecting the option box labeled Map Volume to Directory under OPTIONSDEFAULTSIMAGING the volume name is converted to a directory name. A drive letter or letters matching the location where the images are stored must be added in the OPTIONSDEFAULTSIMAGINGDRIVES HOLDING IMAGES function.For example DEFDIR in ImgInfo Table VCD_0000101 Drives place Images DE Program looks in D or E drive for media with a volume label of CD_00001. If it finds matching media, it looks for a directory there named 001 for whichever image file or files were specified. Fulltext (Lets the Database Know There is an OCR written document Attached to the Record or Records) Tells Summation that there are OCR documents attach to the record. The filenames must match the names of the images (not including the extension), and they must be placed in the same place. Variations FULLTEXT DOC One OCR text file exists for each database record. FULLTEXT paginate One fulltext file exists for each page of the document summary. FULLTEXT rogue or DOC is placed before the T line. Similar to the C token, this statement remains in military force until turned off by using the opposite designation. In former(a) words, if you are using the PAGE method, turn it off by using FULLTEXT in the record that does not contain a fulltext file. O (Where OCR Documents Are if They Are Not in the Image Location) Used when the OCR documents are located someplace some other(a) than the image location as specified by the D line of the DII file.It is placed immediately below the D line. This token can ONLY be used in conjunction with the FULLTEXT DOC tag. The full path to the OCR text document must be allow ind. Example 5 FULLTEXT DOC T AB100001 D I O Jdocsscanned 100001. TIF This tells Summation that the fulltext document for record AB100001 is not in the default Images directory (I) but, instead can be prove in Jdocsscanned. The file name must lifelessness match the image file name. In this case the image file name is 100001. TIF, therefore the OCR text file name should be named 100001. TXT. (Comment Lines)Optional code for each DII record. You can make comments in the DII file for your reference. These lines do not affect the DII load. Example After this Semi-colon I can make notes for my current record Image Files Required for each DII record. The last line(s) of each DII record is always the image filename(s). Backslashes in front of the filenames will direct Summation to look for the files at the root of the specified drive however, these can usually be omitted. Iterators Iterators are strategic optional coding methods. Iterators provide a way to use shorthand for image file names.This allows for less text per DII record, thereby producing a DII file that tons more(prenominal) quickly. If your image files use a number sequence, you can use iterators to indicate a range of numbers, rather than listing each image file separately. Ranges are only valid when the lower number and the higher number are the same number of digits. Files Listed Separately Example IM00001. TIF IM00002. TIF IM00003. TIF IM00004. TIF IM00005. TIF Files Iterated Example 6 IM0001-5. TIF If iterating records with attached full text (OCR) documents in PAGE format, be careful not to exceed powers of 10 in the iteration.Example IM000001-09. TIF IM000010-99. TIF IM000100-999. TIF The example above will properly load all 999 images and their correspond OCR full-text documents. This rule applies to the FULLTEXT PAGE format only. Tokens Used in Summations DII File Token APPLICATION Field Populated APPLICAT A TTACH ATTCHIDS (Field selected for related adhesiveness Doc IDs in Link palm defaults) ATTACHRANGE ATTRANGE Description The application used to view the electronic document. For example APPLICATION Word IDs of attached documents. Appending the value allows the DII to know multiple value in the ATTCHIDS field.For example ATTACH EML0001 EML0002 The document number range of all attachments if more than one attachment exists. Each attachment, along with the email message, will be loaded into Summation as its own record. The attachment 7 ATTMSG BATESBEG BATESEND BCC C range would be populate with the document number of the first attachment and the last number of the last attachment. For example ATTACHRANGE WGH000008 WGH0000010 N/A Relative or full path and file name of the email attachment that is an email message itself. The file will be copied to the MSF folder.The Media field will be populated with the term eMail and the FOLDERID field is coded with the session name appoint dur ing the load of DII. BATESRNG Beginning Bates number, used with BATESEND. For example BATESBEG SGD00001 BATESRNG Ending Bates number, used with BATESBEG. For example BATESEND SGD00055 BCC Anyone sent a blind repeat on an email message. For example BCC pass Thomas Optional code used to load data into specified field in the users document database. This helps decrease the amount of data entry required for the database users.It is meant for use when the same value is repeated for a group of documents, such as documents that all have the same box number or author. The syntax of using the C token is C For example, to fill in the ISSUES field of the database with the value Mental Health, the line would read 8 C ISSUES Mental Health For consecutive DII records where these values are the same, you do not need to repeat the C line. Instead, insert the next C line in the next DII record where the data changes. To stop entering data in a field, insert an C line with the field name following by nothing. CC CC D DEFDIR DATECREATED DATECRTD DATERCVD DATERCVD DATESENT DATESAVED DATESENT DATESVD Anyone copied on an email message. For example CC John Ace Required token for each DII record that has an image associated with it and designates the directory location of the image file(s). The data specified after the D goes into the Default Directory (DEFDIR) field of the ImgInfo table. There are three different ways to denote the DEFDIR 1. I (to refer to the Case Customize Image Location) 2. The hard coded drive letter and path into the DEFDIR field 3. V (to refer to the specified volume label of the CD-ROM) For example D V CD-101Box_34 Note Users of Summation iBlaze/LG can use UNC paths after the D to specify a folder containing images. The date that the file was created, if applicable. For example DATECREATED 01/04/2003 Date that the file was received. For example DATERCVD 01/04/2003 Date that the file was sent. For example DATESENT 01/04/2003 When the file was saved, if appl icable. For example 10 DOCID DOCID EATTACH DOCLINK (Field selected for Linked Documents in Link handle defaults. ) EDOC DOCLINK DATESAVED 01/04/2003 Document ID of a full-text document, e-mail message, or electronic document. If the DII takes full-text files, then the DOCID value (instead of the T value) is used to load and associate ocrBase documents with the appropriate summary. For example DOCID EML00017 Relative or full path and file name of the attachment. The file will be copied to the eMail directory and the relative path of the file will be placed in the DOCLINK field. The MEDIA field will be populated with the term Attachment. For example EATTACHServerFiles Flood Damages. ls Relative or full path and file name of the electronic document. The file will be copied into the eFiles directory and the relative path of the file will be placed in the DOCLINK field. The MEDIA field will be populated with the term eDoc. For example EDOC DeDocWordDoc. doc 11 EDOCIDSEP DOCID EMAIL- au tomobile trunk BODY FOLDERNAME FOLDER This token is intended for service parts that use their own tracking numbers (for example, TRACK001_Doc001. txt). This token allows Summation to remove the tracking ID (TRACK001) from the file so that it can be replaced with a Summation naming convention.The token uses a onecharacter string a value to indicate the demarcation in the file name. In the example above, the underscore character separates the tracking number from the file name, so the token should be followed by the underscore character. Use this character at the top of the DII file above the individual records. For example EDOCIDSEP _ Body of an e-mail message. Must be a string of text contained betwixt EMAIL-BODY and EMAIL-END. The EMAIL-END token must be on its own line. For example EMAIL-BODY EMAIL-END The name of the folder that the e-mail message came from. For example FOLDERNAME Conner-Stevens MailboxCStevensInbox 12 FROM FULLTEXT FROM From field in an e-mail message. For exa mple FROM Kelly Morris Indicates that there are OCR documents attached to the record. The file names must match the names of the images (not including the extension), and they must be located in the same place. Variations FULLTEXT DOC One full-text file exists for each database record. FULLTEXT PAGE One full-text file exists for each page of the document summary. These tokens should be placed before any T tokens. Similar to the C token, this statement remains in effect until turned off by using the opposite designation.In other words, if you are using the PAGE method, turn it off by using FULLTEXT in the record that does not contain a full-text file. The FULLTEXTDIR token is a partner to the FULLTEXT token. This token provides more flexibility to both the service sureness and the knob when warhead a DII file that includes full-text files. The FULLTEXTDIR token allows the service bureau to specify a directory from which the full-text files will be copied during the load. Therefo re, the full-text files do not have to be located in the same directory as the images at the time of load.The FULLTEXTDIR token gives users the flexibility to load the DII file and full-text without requiring them to copy the fulltext to the ne iirk first. An example of the syntax used with the FULLTEXTDIR token is FULLTEXTDIR Vol001Box001ocrFiles The above example shows a relative path, which indicates to Summation that 13 FULLTEXTDIR HEADER HEADER I DEFDIR INTMSGID INTMSGID it should search for the full-text files in the same location as the DII file that is beingness loaded and follow any subdirectories in the FULLTEXTDIR argument.The relative path works whether the DII file is on a network drive or on a CD as a sibling of the Vol001 folder. Just as FULLTEXT PAGE and FULLTEXT DOC apply to all subsequent records in the DII file until they are turned off (by adding the token after the last record that includes fulltext), the FULLTEXTDIR argument applies to all subsequent records i n the DII file until it is changed or turned off (by including the token with a blank argument). e-mail header content. The HEADER-END token must be on its own line. For example HEADER HEADER-END This token is used with the D token.The I token refers to the image location specified in Case Customize. This location must be a drive letter (or UNC path for iBlaze/LG users) and path that points to the directory where the images are stored. Summation users can select any valid location or use Summations default location, the IMAGES subdirectory under the Case Directory. In either case, the image files must be copied to this location. Internet message ID. For example 14 L LONGNAME INTMSGID This token is optional code and denotes the long name or description of the image file(s). The data after L goes into the LONGNAME field of the ImgInfo table.Note This applies to Summation Blaze Version 5. 21 and earlier, and is used in the IMGINGO table. For example L persevering History Form MEDIA ME DIA MSGID MSGID Populates the Media field with the designated value (for example, eDoc, eMail or Attachment). If the value indicated in the token differs from the Summation default, or an entry exists in the field, then the most recent process wins and an entry is made in the error log. Because of this, use this token with care an only if you have a compelling reason. For example MEDIA eDoc E-mail message ID generated by Microsoft Outlook or Lotus Notes.For example MSGID 00000000E8324B3A0A80 0F4E954B8AB427196A13 04012000 15 MULTILINE Any field specified NOPAGECOUNT DOCID Allows carriage returns and multiple lines of text to populate the specified field. Text must be between MULTILINE and MULTILINE-END. The MULTILINE-END token must be on its own line. For example MULTILINE NOTEFIELD hither is the first line. Here is the second line. Here is the last line. MULTILINE-END For consecutive DII records where these values are the same, you do not need to repeat the MULTILINE line. Instead, insert the next MULTILINE line in the next DII record where the data changes.To stop entering data in a field, insert an MULTILINE line with the field name following by nothing Turns off automatically using a number after a space in the Document ID as the number of pages. Allows Document IDs to contain spaces. Must be entered at the set-back of the DII file and applies to all records for the entire DII file. NOPAGECOUNT FULLTEXT page TGHSPLT 3602 Q00555 D I Box011Dir01GHSPLT 3602 Q00555. tif 16 OCR OCR-END O Some service bureaus and clients prefer a different approach to loading full-text than the traditional Summation method of requiring the full-text to be loaded from separate ASCII text files.Some clients prefer including the full-text in the DII file itself. The OCR and OCREND tokens give service bureaus the flexibility to include the full-text (including carriage returns) in the DII file. This method of loading full-text significantly improves the speed of the DII load, by el iminating the need for the carcass to search for and locate each text file and control surface it to copy the text into the ocrBase. The OCR-END token must appear on a separate line. Note When using the OCR and OCR-END tokens and including the full-text in the DII file, service bureaus cannot apply page breaks at specific locations in the full-text document.An example of the syntax used with the OCR and OCR-END tokens is OCR OCR-END There are two uses for the O token. This token is used when the full-text documents are located someplace other than the image location as specified by the D line of the DII file. It tells Summation that there are full-text documents at this location. It is placed immediately below the D line. There can be only one text file for the record, and it must have the name of the 1st TIFF image with a . TXT extension. The full or relative path to the full-text document must be included. For example O Jdocsscanned 17 PARENTIDPARENTID (Field selected for raise ID in Link Fields defaults. ) Parent document ID of an attachment. For example PARENTID WGH000003 PSTCOMMENT PSTCOMMENT-END Users whitethorn want to record information about a . PST file that is loaded into a Summation case. For example, a user may want to discover where a specific . PST file came from and what it relates to (for example, client e-mail messages related to flat space and received on April 26, 2004). The comments are associated with the . PST file designated by the PSTFILE token that follows. The comments can be viewed from the e-mail and attachment records generated from the .PST file designated in the PSTFILE token. The PSTCOMMENT token is used in conjunction with PSTFILE. It should be followed by the PSTCOMMENT-END token and must appear before the PSTFILE token it applies to. The PSTCOMMENT-END token must appear on its own line. For example PSTCOMMENT PSTCOMMENT-END PSTFILE EMAIL001Pfranc. pst, Pfranc_04April_2004 Note The comments will not be written to the fo ndness Database record in Summation, but users can review the comments by right- fathoming an e-mail record and selecting the Show PST Info option. 18 PSTFILE The PSTFILE token is used to process the .PST file by designating 1) the location of the . PST file at the time of load, and 2) the unique ID of the . PST file. The path to the . PST file can either be hard-coded or relative to the location of the DII file at the time of load. The unique ID should be the same value assigned by the user to the . PST file when processing using Summations eDiscovery Console. If either necessary value is missing, the DII load will record an error and the . PST file that corresponds to the record with the missing information will not be processed. An example of the use of PSTFILE PSTFILE EMAIL001PFranc. st, PFranc_04April_2004 Summation gathers this information but does not process the . PST file until the DII load is complete. The PSTID (the second value) is populated into the PSTID field as desig nated on the eMail tab in the Defaults negotiation box (accessed from the Options menu) in Summation. The PSTID argument assigned by the PSTFILE token is assigned to the record it appears in and will apply to all subsequent e-mail records. The argument is applied until either the PSTFILE token is turned off by setting it to a blank argument (such as PSTFILE), or the argument changes.The PSTFILE token can occur multiple times in a single DII file and assign a different argument each time. This allows the service bureau to process multiple . PST files and present the data for all . PST files in a single DII file. For example, a service bureau can process five . PST files and include five instances of PSTFILE tokens with five different arguments, all in the same DII file. 19 READ READ RELATED OTHERIDS (Field selected for Related Document IDs in Link Fields defaults. ) STOREID Notes whether the e-mail message was read.For example READ Y The document IDs of related documents. RELATED WG H000006 STOREID SUBJECT SUBJECT The . PST identifier. Should not be used if PSTFILE is used. For example STOREID The proceeds of an e-mail message. For example SUBJECT Town Issues 20 T IMGTAG This token is required for each DII record and designates the ImageTag. It must be the first item listed for each database record. This data specified after the T goes into both the Image Tag (IMGTAG) field in the ImgInfo table and the column to Hold ImageTag in the Document Database.The image tags must be unique values. For this reason, many users choose the document number as the image tag. The image tags establish the link between the document database table and the ImgInfo table. When a user is in a document database record that has a corresponding image file and they want to view the image, Summation looks at the value in the Column to Hold Image Tag field in the database and reads the image file location from the ImgInfo table record with the matching value in the Image Tag field.For ex ample T CR00293 1 Note If there is a template on the Column to Hold Image Tag field of the users document database, then the Image Tag must conform to the template format. For example, if the template 21 forces the field to contain a original number of digits, any image tag values that are comprised of fewer digits must be appropriately zero filled. TIMERCVD TIMERCVD TIMESENT TIMESENT TO TRANS TO DEPOIDS (Field selected for Transcript Zoom in Link Fields defaults. Time that the e-mail message was received. For example TIMERCVD 1100 a. m. Time that the e-mail message was sent.For example TIMESENT 1059 a. m. To field in an e-mail message. For example TO Conner Stevens The transcript description. The value populates the Transcript Zoom field. For example TRANS conner stevens v1. txt 22 V This token is used with the D token and refers to the volume label of the image location. By using a volume label instead of a drive letter, the user does not have to use the same drive letter designa tion for their media as had been used by the service bureau. The V token is used most often with the images that are being burnt onto CD ROMs. ministration the volume label for the drive letter in the D line, still including the path leading up to and including the directory in which the images are located. The Summation user must set up the Drives Holding Images in the case Imaging Defaults so that Summation knows on which drive(s) to look for the specified volume(s). The volume label can be obtained from any drive by using the DIR command at the command prompt or by looking at the drive properties in Microsoft Windows adventurer/My Computer. When using the command prompt, the volume label will appear at the top of the directory display listing.Use the Map Volume to Directory option in imaging defaults if your images are on CD-ROM, you have used the V (volume label) code in your DII file, and the volume label of the CD(s) is also the first subdirectory. Enabling this option tells Summation to map the volume label indicated after the V in the DEFDIR line of the ImgInfo table to the drive letter(s) set in your Drives Holding Images Vol=Avol. Example DEFDIR in ImgInfo Table VCD_00001 Drives Holding Images D Maps to DCD_00001 This option is commonly used when the CDs are stored on a Meridian tower, or 3 when the volumes have been copied to a fixed drive from a CD ROM and t BENEFITS OF USING A DII FILE TO LOAD IMAGE SUMMARY INFORMATION The DII file is a formatted ASCII text file that is used to load large batches of images. The DII file is loaded in Summation from Imaging Defaults, using the Read DII utility. DII data is added to Summations Image Information (ImgInfo) Table and serves as the link between your document database data and the images and/or ocrBase documents. The Image Tag is the unique identifier for each image and/or ocrBase document.When you load the DII file, Summation will refreshful you if any of the Image Tags (document IDs) already exist in the ImgInfo Table and give you the option to overwrite the existing record(s). When used correctly, a DII file can significantly reduce data entry time. 24 Batch Loading of Image Summary Information The major advantage of using a DII file is the efficacy to load summary information for thousands of images at a time. The summary information is encoded within the DII file and the summary records for each designated image are automatically updated as the file loads.In this way, thousands of summary records can be updated, giving users easy access to thousands of associated images. Reduced Coding Coding and typing can be cut by using the C (Column to Link) designator. C is meant for use with documents that are categorized into groups and therefore contain repetitive data (not to replace data entry ). It is meant for use by imaging service bureaus that are supplying you with a DII file before you baffle coding, thereby creating new database records. Each record is limited to 6 C lines .For example, suppose the service bureau is scanning and coding numerous medical records pertaining to various doctors. The records to be scanned are already sorted by doctor, and payable to the nature of medical records, they are also sorted by patient. If you want to have handle filled in within the database as linked records are created, the doctor name and patient names need not be entered repeatedly. Summation assumes that the preceding doctor and patient names are to be used again in the current record if no new names are entered.Error Checking Summation will check to see if duplicates of the new records already exist within the Summation database. When a duplicate is encountered, the Summation user is prompted to either overwrite the existing record or ignore the new record. When the program encounters errors with a particular record during loading, they are documented in an error file. The error file is created in the directory of the case where the DII file is being loade d and has the same name as the DII file except with a . LOG extension instead of . DII. This error file lists the type of problem and its location (by line number) within the DII file.This log file is written in simple ASCII text format and can be opened with any text editor including Windows Notepad, Wordpad, and Microsoft Word. Example A DII file named DISK1LOAD. DII is loaded into the SMITH V. JONES case. If errors are encountered during loading, they would be written to a file titled DISK1LOAD. LOG in the Summation program folder under the CASEDATASMITH V. JONES subfolder. 25 Simultaneous Data Entry and Scanning If users coordinate with either an outside vendor or an internal department to scan their documents, they can begin the work of summarizing the documents while they are being scanned. The customer and the scanning group must coordinate the document numbers and names to be used in advance. ) When scanning is complete, the vendor or scanning department can deliver the sca nned image files and/or full-text documents to the customer on any removable media the customers system is compatible with. Can replace previous entries for tags There are times when organized coordination of document image tags between you and the imaging service bureau is not workable. In this case, it is easier for you to summarize the documents after receiving the files and matching DII file from the service bureau.When the DII file is loaded, it creates database records as it fills the ImgInfo Table. The only information in such a database record is the image tag. The DII data is loaded into the ImgInfo Table and the Image Tags are loaded in the Column to Hold Image Tag (The field in the document database containing the unique image tags for each image in the case. This is often the field that contains the beginning document number, although it may be a special field created for this purpose. The Column to Hold Image Tag cannot be a multientry field it must be an integer, text or note type field. field of the database table. It is also possible to have additional handle filled in as the linked records are being created. These are linked finished the use of the optional C designator. STARTING WITH SUMMATION Starting A new-fangled Case To begin loading evidence into a case, you must start a new case that does not contain information. To start a new case 1. From the Case menu, select New. 26 2. Assign a name to your case and infiltrate OK. 3. When prompted click Yes to assign a password to your case or No to create a case that is not password protected.BACKING UP AND RESTORING DATABASES Both the Core Database and the Notes Database should be backed up regularly to protect against loss of data in the event of database corruption. If you are operating on a network, you may still beseech to create an independent easement of these two key components. After backing up the Notes and Core Databases, you should consider running additional utilities to keep th e databases tuned up. To respite the Core and Notes Databases 27 1. snatch once on the case name in the Case Explorer window so that it is selected. 2. Access the Backup utility by ? straight-from-the-shouldering the CASE menu and electing Tools OR ? Right-clicking on Core Database in the Case Explorer and selecting Core Database Utilities discern Backup Database The backup window opens with both the Database and the Notes database options checked. Leave both options checked. jerk on Backup. You will be advised when the databases have been successfully backed up. chitchat OK. LOADING IMAGES WITH A DII FILE A DII (Document Image Information) file is a text file formatted to batch load summaries with images into a Summation database. Loading database summaries and image information using a DII file is more efficient.Preliminary tints To help ensure the successful load of images using a DII file, the following go should be interpreted prior to loading ? Open the case into which you want to load the images. ? Back up your database. (From the Case menu, select Tools, Backup Database, and Backup. ) ? Verify the location that Summation has designated for images for this case (the I value for this case). (From the Case menu, select Customize to open 28 the Case Directory Customization dialog box. ) Note the value in the Image Location field. The default value for this field is a single folder name (such as IMAGES).If the Image Location field contains a folder or folders without a drive letter, then this location is relative to the path in the Case Directory field. However, if the field contains a drive letter followed by a path, then this is the absolute value of Summations image path for this case. Most of the time, the Image Location is relative to the Case Directory path. To verify the complete path, simply connect the Image Location value to the end of the Case Directory path. You may want to copy and paste these values to a Notepad document to keep track of them.Example ? Case Directory field PROGRAM FILESSUMMATIONBLAZECASEDATAMY NEW CASE ? Image Location field IMAGES ? Complete image path CPROGRAM FILESSUMMATIONBLAZECASEDATAMY NEW CASEIMAGES The image path is the location that Summation has designated for the images for this case (the I value for this case. ) ? Verify the images path in the DII file by opening a text editor and locating the image path after the D token. Example Sample DII-01 shows the following value D I D is the default directory of the image files. I is a value that works in conjunction with the D token to load the image path into Summations database. apply the previous case image path example, the D line would be converted by Summation as CPROGRAM FILESSUMMATIONBLAZECASEDATAMY NEW CASEIMAGES I is used to specify the image location. Alternatively, V or a hardcoded path can be used to designate the Images directory. This tutorial assumes that the DII file is using I, since that is the most common syntax. The i mage path can be extended by appending additional subdirectories after the I value.Example D Iestdata1 29 Continuing with the previous example, this D line would be converted by Summation as CPROGRAM FILESSUMMATIONBLAZECASEDATAMY NEW CASEIMAGESTESTDATA1 V Designations. Reading about V is only necessary if your DII file uses the V value to designate the image path. If your DII file uses the I value, skip ahead Step 5. The V value is a legacy format designation that allows Summation to locate and display image files stored on removable media (such as CD-ROM, DVD, etc. ) by volume name (the disc label).Vendors will typically supply two versions of a DII file one that uses the I value and one that uses V. In almost all cases the preferred version to load is I. Hard-Coded Path Designations. Reading this section is only necessary if your DII file uses a complete path including computer name or drive letter to designate the image path. If your DII file uses the I value, skip ahead to Step 5. Summation will accept a complete path value following the D token, but in collection for Summation to display the document images, this path must be valid from the workstation accessing the case in question.Example D RIMAGESDISC101 If a workstation accessing the case in which this DII file was loaded did not have an R drive correctly mapped to the image file location attempting to view the image(s) would fail. ? Copy the images to the correct directory. ? Before write IMAGES directory structure, merge all the OCRs . txt files with the corresponding tiffs. To copy the images 1. Open Windows Explorer (right-click Start and select Explore) and note the image path you verified in Step 3. NOTE You can browse to this path quickly by copying and pasting the path from Step 3 into the Address field and pressing Enter.This is the directory that you will copy the images to. 2. Browse to the images that need to be loaded. These images might arrive to you on a CD, a DVD, or an external hard drive. In any case, browse to the images and excogitate to copy them to the image location on your computers hard drive. 3. Copy the images from the CD, DVD, or external hard drive to the images location. 30 NOTE Its important to copy the correct folder and subfolders. Verify this first by copying the first directory after the I token in Step 4 above.Example (A) I value from the DII file Iestdata1 (B) Folder to copy from the CD Destdata After verifying the correct folder containing images, copy it to the image path from Step 3 above. After the folders containing images have been copied to the correct image path directory, you are ready to load the DII file. This will populate Summations database and will allow you to view and manage these images with the Summation interface. Loading the DII File 1. From the Options menu, select Defaults, and click the Imaging tab. 2. Verify the Column to Hold Image Tag.If you are currently using the standard form/table (STDTABLE), the Column to H old Image Tag field should be set to BEGDOC. If you are currently using the e-form/table (ETABLE), the Column to Hold Image tag field should be set to DOCID. NOTE Documents are added or updated by a DII file based on the values in the field selected in the Column to Hold Image Tag. If a value listed after the T token does not exist in this field for any record, a new record with this value is created. If the value does not exist, then this records image information is updated. Click OK to save your settings.From the Options menu, select Defaults, and click the Imaging tab, and click Load DII File button. Browse to and select the DII file, and click Open. Click OK. The DII file is loaded into Summations database and your images can now be viewed and managed through the Summation interface. 3. 4. 5. 6. CHECKING DII FIELDS 1. Right-click on core database in case explorer. 2. Select set view to open option, and check for Column view, Form view, Image viewer, ocrBase viewer and eDocs vie wer. Select required view in View in focus when opened window and click ok. 3. Right click on core database and open. 31 . dialog box appears as below opening in all the formats that are checked in the step 2. 5. Select column view by clicking on that label. 32 6. Before editing anything, change the database to edit mode from display mode. ( right-click on the column and check edit option). 7. Double click on the fields label. 8. You will find a small field list table containing all the available fields. 33 9. Double click on any field to tot up it to view or to hide it from the view. This way we can add or remove required fields and can check whether all the fields have generated correctly in the loaded dii file. 10. at once all the required fields are selected, right click on any of the label and check display to keep down back to display mode. 11. Click on eDocs, Image, ocrBase or form in the lower toolbar to view in the respective format. ADDING FIELDS TO DATABASE 1. Fields a re added through the Form Editor. To access the Form Editor, select Options Utilities, then select the Create or Modify Forms options. This will launch a separate window called the Form Editor. Now you will want to decide where you want your new field to reside. 34 Figure Form editor 2. You may need to reorganize the form to fit the custom field.The Form may be resizable just like any window, by tangleging the cursor near the corners to bring into view the resize cursor (the thin black line with arrows on either end). Click and drag to resize the form if necessary. 3. A light line around fields denotes a frame grouping of selected fields on the form. To resize the frame, click your cursor on the line until small black squares echo the frame, then click and drag them. 4. On the small floating toolbar, click on the button denoted with an ab. 5. Click on the form where you want to place the new field.A small dialog box will open, listing the currently available fields in the select ed form. 6. Click on the New button to create a new field. 7. Assign a name and data type to the new field. 35 A field NAME must not contain any special characters or spaces, and must be less than 8 characters long, because Summation references the field name internally. The field label may be customized to the users preference. 8. Once you have assigned a name and label, you need to select a data type. It is important to put some thought into selecting a field data type, since you cannot change the data type on a field once it has been created.If you are unsure of which data type to assign to your field, click on the piano tuner button next to each option to view a brief description in the bottom portion of the dialog box. 9. Click Create New Column. When prompted that the column was created successfully, click OK. 10. Click Close to return to the Field List dialog. If you should need to create multiple fields follow steps 7 through 9 until all fields have been created. 11. The ne w field should be one of the choices and will be selected by default. Click OK to select the new field and place it on the form.To adjust the fields position on the form, click and drag it to a different location. To adjust the field label and the field box individually, click anywhere on the form to unselect them. Then click back on the item you want to resize or reposition. 12. When you have successfully created, sized and positioned all custom fields, click on the Save icon in the toolbars. If your database contains data in it, you will be prompted to copy data to new table structure, click OK. 13. Close the Form Editor by selecting Exit from the File menu. 14. Click Close to close the Utilities dialog.To Load ocrBase Documents Using the Load Full-Text Documents Dialog 36 Double-click on ocrBase in Case Explorer OR select ocrBase from the VIEW menu. Make sure ocrBase is in the active view. 1. From the FILE menu, select Load ocrBase Documents. 2. Select the Choose Files tab. 3. Th e default directory shown is the current case directory or the last directory selected using the Browse button. If the documents are located in some other directory, click on Browse to navigate to that folder. 4. Select the files you want to load using any of the following techniques ?Hold Ctrl and click on the document files one at a time ? Hold Shift, click on the first document file, then click on the last document file ? Click on the first document file, then hold the left mouse button down as you drag to the last document file you wish to load ? Select the Select All option to load all document files in the files window ? To cancel the selection of a file, click on the filename again 5. If you want Summation to verify the document numbers against any templates associated with the Column to Hold Image Tag field (BEGDOC or other field, as needed), leave Check Templates selected.If you do not want the document numbers verified against any existing templates, clear the Check Templ ates selection. 6. Select one of the options in the Document ID (BEGDOC) section ? Ask Me (default) During the loading process, you will be prompted to enter a Document ID number for each document file being loaded. ? Use Filename The document filename will be used during the loading process as the Document ID. 7. Click Load Documents. Summation loads the documents into the ocrBase. SEARCHING (Before doing any kind of search, make sure Core Database box is checked in case explorer) 37 . Check on the core Database in the case explorer. 2. Open the database in the column view. 3. Double click on waites under the Core Database Views in case explorer. 38 4. Core Database query dialog box appears. 5. Select the required field in wait one of these Fields. Click on More fields Choices to choose from more number of fields. Double click on the required field and see that Query appears on the query box below. 6. Same way give the required values in the section 2 & 3. 7. Execute the query. For example, Consider searching for docDates. Steps 1.Click on docDate box under face one of these fields (section1). 2. peal down on the drop down list, in this manner (section2) section and select the required field. 3. Enter the date in For this value (section3). 4. Full Query appears on the query box. 39 5. Click Ok to execute the query. 6. All the documents that match with the query will be listed. 7. To retrieve back all the documents, Go to await-Retrieve all summaries. QUICK SEARCH USING CASE EXPLORER When you use the Case Explorer to search the Core Database, the results appear in the inquisition Results format.The search results can be printed in the stacked format directly from the face Results View. To contiguous Search using the Case Explorer 1. Make the Case Explorer window the focus. 2. Click the check boxes next to the components you wish to search (e. g. Core Database, Transcripts, Transcript Notes, ocrBase). ? ? ? ? ? Core Database Transcript Notes eDocs & eM ail ocrBase Notes ocrBase 40 ? Chronology of Events ? People ? Pleadings 4. Click in the active Search box. Depending on what combination of case elements you have selected, the Search dialog appears.Here you can change your search results manakin sanctify and/or specify running a Standard or HotFacts only search. 4. Type the search term or phrase in the white pronto Search box. You can use wildcards and compound operators (AND/OR joinings) in your search. ? Multi-character wildcard = an asterisk (*) ? Single-character wildcard = a question mark (? ) ? AND connector = & or AND (there must be spaces between the AND and the words) ? OR connector = (a backwards slash usually located above the Enter key on your keyboard) or OR (there must be spaces between the OR and the words) ?You can also use Intelli-Parse if you wish to conduct field-specific searches Click the Search button to run the search. The search results will appear in a new Search Results window. COMPOUND SEARCHES CON NECTORS IN THE DATABASE 41 Connectors make it easy to search for document summaries where varying conditions are to be used, for example, to find document summaries where a name is in a summary field and where a certain type of document is involved. Connectors can also widen the search to include summaries of some(prenominal) sorts such as, summaries concerning documents dated in the current year or any documents mentioning the defendant.As a general rule, using the connector AND undertake the search, while using the connector OR widens the search. Up to 10 connectors can be used in a search of the document summaries. Search Connectors Connector AND Definition A summary contains both values Summaries contain either of the values Example DOCDATE EQ 5/15/90 AND DOCTYPE OR DOCDATE EQ 6/15/90 OR DOCDATE EQ 7/12/90 AND NOT This excludes a NAME EQ Smith, J. AND NOT DOCTYPE EQ summary that memo meets the connected value This requests NAME EQ Smith, J. OR NOT DOCTYPE EQ OR NOT 42 ocum ent summaries where the Name equals Smith, J. or the Doctype field does not equal Memo Memo You can create a more complex Quick Search by combining search clauses. To narrow the search, use the AND connector, designated by the ampersand (&). To continue the search, connect your search clauses using the backslash () to represent the OR connector. You may use a total of ten clauses (i. e. , any combination of up to nine AND and/or OR connectors). Use parentheses to denote precedence or relationships between clauses within the search phrase.Sample OR Search bill presley Sample AND Search fire & send word It makes no difference whether or not you put spaces between the words and the connectors. DRILL DOWN SEARCHING If youre reviewing a transcript on screen and come across a term of interest, you can search for other occurrences of that term without losing your focus by using Summations performance Down Searching function. Simply bring out the term of interest, right mouse click, a nd select Search for term from the menu that appears. Summation will take you to the next occurrence of the term. 43 How to Run a Drill Down Search 1.Open a transcript. 2. Right click on the text for which you want to search. 3. From the right click context menu that appears, select Search for text. Summation goes to the next occurrence of the term in the open transcript USING WILDCARDS IN SEARCHES Searches in Summation are done on a whole-word basis a search for accord will find just that, not words including agree like agreement. Sometimes you need to search for more than just whole words. To accomplish this Summation Blaze supports wildcards in searches. The asterisk (*) designates a wildcard, which can represent any portion of a word.Using wildcards widens the field of possible hits generated by the search. Wildcards are used to find all words that have your search phrase embedded within them. If you run a Quick Search for TERM*, the search is expanded to encompass any word w ith term as the base, for example, term, terminate, termination, etc. Your placement of the asterisk (either preceding or following the word, or embedded within letters) determines the hits that result. You can use wildcards in any type of search within Summation. 44 Type This agree no wildcard needed agree* *gree *agree*To Find AGREE manner of speaking beginning with AGREE-, such as agreement or agreeable Words ending with -GREE, such as disagree, pedigree Words with -AGREE- as the root, such as disagreement Words beginning with A- and ending with -EEP, such as asleep a*eep USING SEARCH CONNECTORS The Summation system provides you with means to perform both simple and complex searches. You can search all fields in the document database (using the Quick Search Box) or select specific fields to search (using the Full Boolean Search dialog). This Tutorial walks you through setting up and performing both simple and complex searches.When you enter a search term or phrase in the Quick S earch box, Summation conducts an Anytext search and searches for the specified text in all fields in all summaries in the database. If you want to subdue your search to multiple ground and/or phrases, then you can use connectors. You can further refine your search to specific fields in the database, by performing a Full Boolean search (as opposed to a search from Quick Search box). The available connectors in Summation are AND, OR, AND NOT, and OR NOT. You can connect up to ten search clauses in one Boolean search using nine connectors.The Full Boolean search provides a list of operators specific to each field, which you can use (in conjunction with connectors) to further refine your search to name in designated database fields. Search Connectors Using An Anytext Search 1. Launch Summation. 45 2. Open the Core Database, by double-clicking on its corresponding item in the Case Explorer tree. 3. Put the focus on the Form or Column View, by clicking on the respective view. 4. Type a search term in the Quick Search Box (the field above the Core Database view with the phrase Enter Search Phrase populated in it). 5.Link words or phrases with a connector to search on multiple terms or phrases. (For example, Smith AND taxes OR court. ) Note A space must lead and follow each connector. The connectors should always be in capital letters. 6. Repeat steps 2 and 3 until you complete entering all desired search terms/phrases and connectors. Note If you search string includes more than 5 terms, you may find it more efficient to use the Full Boolean search setup dialog. 7. Click the Search button on the Toolbar, to the left of the Quick Search Box, to process the search. Searching Using The Full Boolean Dialog Box 1. Launch Summation. . Open the Core Database, by double-clicking on its corresponding item in the Case Explorer tree. 3. Put the focus on the Form or Column View, by clicking on the respective view. 4. Click the Boolean button in the Toolbar. 5. In Section 1 of the Full Boolean dialog, choose the Anytext icon (or other default icon) or choose More Field Choices to select fields from the active table. 6. In Section 2 of the Full Boolean dialog, use the default connector (e. g. contains) or select a connector from the drop-down list. 7. In Section 3 of the Full Boolean dialog, type the search term or phrase you want to search on. 6 8. Click the Connector button to add another search string (field, connector and term/phrase). 9. Repeat Steps 2 through 5 until all search strings have been entered. 10. Click the Display Results button to process the search. Using HotFacts with ocrBase just as u can come upon a transcript note, a core database record or an ocrbase note as a hot fact, you can also use the hotfact flag to identify key ocrbase documents in your case. to mark an ocrbase document as a hotfact ? Click on the ? Click on the so that it becomes again to unmark the document. SEARCHING HOTFACTSYou can search only database records flagged as HotFacts when you check the Document Database folder at the Case Folder briny Window. The Search Document DB dialog appears, consisting of 2 sections Sort fiat and Search Type. The first 2 Sort Order field options are Date (DOCDATE) and Issue (ISSUES). The third sort order field option is taken from the first field set in your Sort Order tab, found under the Query tab in the document database. If there is no sort order set there, the third option will read Unsorted Doc DB. The Search Type section determines what set of document database summaries you want to search.To search all HotFacts, select Only HotFacts and then Everyones. To search only your own HotFacts, select Only HotFacts and then My HotFacts. 47 Searching Document Database Records Flagged as HotFacts 1. From the Case Folder Main Window, check the Document Database folder. 2. The Search Document DB dialog appears. 3. In the Sort Order section, select the field by which you want to sort your search results. You can c hoose Date, Issue, or the first field you have selected in your Document Database Sort Order. 4. In the Search Type section, select the record set in which you want to search only HotFacts (all HotFacts), or My HotFacts. . Type the phrase for which you want to search into the Quick Search Box on the toolbar. 6. Click on the search binoculars to display the Search Results. SEARCHING CASE OUTLINES You can search the case outline. For example, in the count below, you see a search for damage, showing the first hit found in the Case Outline the word damages. Because the search algorithm here provides for a simple string search, it will find any phrase containing the same characters (e. g. a search for damage will find damaged damages and damaged. Subsequent hits can be found by clicking again on the OK button.Summation indicates the line with the hit by outlining it in black. 48 FILTERED FUZZY SEARCHING The foggy Search is a variation on the Quick Search that allows you to search for a specific word and words spelled similarly to it. This tool can be used in a variety of circumstances, for example when working with documents that have been processed by optical character recognition software, since certain characters are often mistaken for similarly-shaped ones during that process. You can also use the fuzzy search to look for words that may have been misspelled, or for words with British spellings (such as flavour and flavor).The Fuzzy Search finds near-matches to your search requirements. It is available for searching your transcripts and/or full text (ocrBase) documents. When used to search transcripts and/or full text documents from the Case Folder Main Window, the words found are displayed in a list of approximate matches. Filtered fuzzy searching lets you search transcripts and/or ocrBase documents for nearmatches of a single word, without having to wade through numerous false 49 positives. This allows you to select only the words in which you are interes ted and run another search by clicking on the Search button.A standard search for these words is then launched, displaying the hits in the regular Search Results Window, from which you can print them, write them to file, mark them as HotFacts, or drag them into the Case Organizer. The List of Approximate Matches for a Filtered Fuzzy Search 1. From the Case Folder Main Window, check the ocrBase and/or transcript folders you wish to search. 2. Enter the term for which you want to search into the Quick Search Box. 3. Click the Fuzzy Search button on the toolbar. 50 4. A list of approximate matches appears, with the original word(s) preselected.To narrow your search, enter a higher percentage similar and click on Refind. To broaden your search, enter a lower % similar, and click on Refind. (You can select percentages between 65% and 99%. ) 5. When youre satisfied with your list of matches, select the ones for which you wish to search by clicking on them choose all words by clicking on Select ALL words. (You can deselect words by clicking on them. ) 6. Click the Search button. Your hits are displayed in the Search Results Window. SORTING By default, contents of fields are sorted in standard A to Z, 0 to 9 sequence.You can designate descending sort (Turn this option on from the Sort Order tab of the Query page of the Document Database folder. This option forces the contents of the field to be sorted in reverse order, Z to A and 9 to 0. rising sort order is the default when a field is included in the sort order) using the Sort Order tab of the Document Database folder. You can also have your note hits sorted in reverse-chronological order. 1. Open the database in column view. 2. Right-Click on the column label, Click sort by label option. 51 To change the default order ? Double-click on icon on the toolbar. ? Check the box in the Sort by table. Give OK. 52 Conclusion This concludes the detailed interchange with reference to the application of Summation to facilita te the QC process. While there are more uses and applications of Summation in EDD these have been omitted to focus the reference of the context under discussion. If you have any queries / suggestion please see free to contact me at emailprotected net. In case you need specific detailed references please feel free to use the links below References http//www. summation. com/Support/tutorials. aspx http//info. summation. com/products/pdfs/ http//support. summation. com/knowbase/technotes 53