Wednesday, December 25, 2019

Gender Roles The Man Or The Woman - 1369 Words

Who is supposed to take out the trash? The man or the woman? Gender roles have become norms within heterosexual relationships in our society. Beyond simple tasks being associated with gender—women washing dishes and men taking out the trash—power has also become tied to gender. Men have acquired an unbalanced hold of power that women have been denied. Ciara points out these unfair gender roles in her music video Like a Boy. To Ciara, men have been allowed to lie, cheat, be secretive, and come home late—giving men an unequal hold of power within the relationship. She refers to these actions as acting â€Å"like a boy.† In order to reveal the unfairness of these double standard gender roles, Ciara asks what would be if she, more broadly what would happen if women did these things; what if they acted â€Å"like a boy?† The video begins with shots of Ciara after switching roles and says: â€Å"2007 ladies, I think it’s time to switch roles.† She makes a call to women to switch roles, to critique the actions that have been deemed acceptable for men, but unacceptable for women. Ciara’s video seems to show an empowering message to women: dismantle the power that men have acquired. But when we take a closer look at Ciara’s music video, we can see that Ciara’s critique of men does not redistribute power within a relationship. There is not an actual switch of roles that Ciara calls for. Ciara is the only one in the relationship that switches roles. The man keeps his role and his power. Since she hasShow MoreRelatedGender Roles Of Man And Woman1668 Words   |  7 Pages From the beginning of the human race, gender roles of man and woman appeared to be straightforward with certain characteristics embedded in us. Women, being able to procreate, were sought to as nurturers, while men were to protect and provide for their family. Men were considered to be the dominant sex who lead, are powerful, and masculine, while women are considered to be nurturing, sensitive, and feminine. The stereotypes that individuals must encounter are visible everywhere from social situationsRead MoreGender As A Man And The Role Of A Woman932 Words   |  4 Pages Many people define gender as the range of characteristics pertaining to, and differentiating between, masculinity and femininity. In modern and traditional society, gender is used to teach the â€Å"role of a man and the role of a woman†. The role of gender in adolescent literature dates back to the first kind of literature for children, oral folk tales. On the beaches of Greece, Homer told the tale of Odysseus. A Greek king, who was strong, fearless and wise; whom traveled great lands and fought manyRead MoreGender Roles Of A Man And A Woman1493 Words   |  6 Pageswell, as gender roles origin start from an early age. As children we are taught the difference between toys and colors; blue is for boys having to be associated with being masculine and pink is girls having to be associated with being a soft and feminine color. Though gender roles aren’t always clear as let’s say how most people associate an action figure or a dream car/ cooking station, gender role s are a huge part of the society we live in today. The power struggle between a man and a woman has muchRead MoreFInal Paper1429 Words   |  6 Pagesï » ¿Gender Inequality Within Society Society has conformed our minds to view gender based on one’s role in society. This labels the person as a man or a woman and then classifies them based on the â€Å"roles† that society has assigned for each. Gender inequality is caused by the unequal perceptions or even the way someone is treated, based on them being a man or woman. It tends to be the result of what is seen as socially constructed differences of the typical gender roles. This is a social problem I findRead MoreGender Representation Of Female Gender Roles Affect Society Through Social Oppression Of The Minority Group1110 Words   |  5 Pagesnot encourage the individual empowerment of women through separation of traditional gender stereotypes. In fact, Mulan emphasizes the roles between binary genders that ensure privilege of men over women. Additionally, the film shows how such stereotypical gender roles affect society through social oppression of the minority group. Throughout the film, it is obv ious that, although it is possible to have gender performativity, there is disempowerment of women and a man’s life is that which is moreRead MoreGender Roles Of Society And The Bible Essay1691 Words   |  7 PagesGender Roles in Society and the Bible Upon losing the election to become the 45th president of the United States, Hillary Clinton gave a concession speech and told â€Å"all the little girls who are watching this...never doubt that you are valuable and powerful and deserving of every chance and opportunity in the world to pursue and to achieve your own dreams† (Clinton). While Candidate Hillary Clinton said these girls are â€Å"deserving of every chance,† our society may prove otherwise. Although women todayRead MoreCatalina de Erauso: On Playing Gender Roles Essay1460 Words   |  6 Pageslate sixteenth and early seventeenth centuries, gender roles were distinct and the opportunity gap was enormous. Catalina de Erauso compares the two roles through her memoir, â€Å"Lieutenant Nun,† where she recounts her life as a transvestite in both the new and old world. Through having experienced the structured life of a woman as well as the freedom involved in being a man, de Erauso formed an identity for he rself that crossed the boundaries of both genders. Catalina de Erauso’s life demonstrates theRead MoreIdentifying The Gender Stereotype Example773 Words   |  4 PagesTo describe the gender stereotype example, I have selected advertisement from the website of coloribus. It is the advertisement of the Johnson Johnson Company to promote the Johnson baby care products. It released on June 2009. It is picturized with the woman with her baby and saying that this company’s baby products are more suitable for the small babies’ skin. I found this ad online Johnson’s baby product advertisements. I have the photo of the advertisement at the end of the writing part. AndRead MoreGender Roles : Modern And Fast Passed1144 Words   |  5 Pageshow can it be that it is stuck on something as prehistoric as stereotypic gender roles? Starting with the caveman to the men and women of the Victorian period and even to now in the twenty-first century, society has imprinted its own idea of what a man and women should be and the what role each should hold in society. The idea of what is appropriate in behavior and how one should act are most likely attributed to what gender they are. In the eyes of society, all are seen with a stereotypic lends.Read MoreGender Roles And Gender : A Season Of Madness By Hanan Al Shaykh950 Words   |  4 PagesGender Roles And Gender Stereotype Problems in society Gender problems are big problems in society. Although today s gender problems are better than before, it still cannot be resolved completely. There are many kinds of gender problems. For example, gender role, gender identity, gender stereotypes and gender-equal problems. The short story A Season of Madness, by Hanan Al-Shaykh, shows some problems of genders and society. In A Season of Madness, the author tells a story of a Lebanese woman-

Tuesday, December 17, 2019

Honor, Humility, Strength, And Courage - 1338 Words

Honor, humility, strength, and courage. When one tells stories of heroes, their characteristics are generally the same. They perform feats of greatness that no ordinary person can do and they do it for the good of a kingdom or wherever they may be. The story of Beowulf is not much different. The Epic poem is about a man who, like I said earlier, goes around protecting people from monstrous creatures and he gains fame with each completed quest. His adventure take him to the land of Danes in order to fight a monster that has been terrorizing the kingdom and bring peace to the land. After disposing of the monster Grendel, he seeks out Grendel’s mother and like with Grendel, he strikes her down. While his motivation for doing so can easily be†¦show more content†¦Ã¢â‚¬Å"When it comes to fighting, I count myself As dangerous any day as Grendel. So it won’t be a cutting edge I’ll wield To mow him down, easily as I might. He has no ideas of the arts of war, Of shield or sword-play, though he does possess A wild strength. No weapons, therefore, For either this night: unarmed he shall face me If face me he dares.†(677-685). By choosing to fight him without armor he basically leaves his life up to fate though he knows he won’t lose. Grendel was this frightening monster that literally eats people and Beowulf decided to fight him in a fair fight thus proving to everyone there that none can frighten him. It took courage to do the things he did, and he definitely showed time and time again that he is courageous, but his strength is what kept him alive. Just like with his bravery, Beowulf displayed his immense strength throughout the poem. Were it not for his strength he most likely would not have been able to survive many of his encounters with his enemies. â€Å"The captain of evil discovered himself in a handgrip harder than anything he had ever encountered in any man on the face of the earth. Every bone in his body quailed and r ecoiled, but he could not escape.† (749-753). In his battle with Grendel he proved to be too much for the monster and as the battle went on, he ripped off his arm. The monster that no one could ever match was bested by Beowulf without even using his weapons or armor. Not that his sword would have helpedShow MoreRelatedThe Old Man And The Sea1009 Words   |  5 PagesHemingway. Hemingway endured many tragedies, from the wounds of his time in war and even during two successive plane crashes in which Hemingway was permanently injured. Throughout it all, however, Ernest Hemingway still stood with great honor and took pride in his humility. These are the characteristics that really led Hemingway to greatness and success. His book is the story of an epic battle between an aged, seasoned fisherman and the biggest catch of his life- a 1,000 pound marlin, set on the coastsRead MoreEssay on Santiago as Code Hero in The Old Man and the Sea1619 Words   |  7 PagesSantiago demonstrates the traits of the code hero. The Hemingway’s code hero covers the principal ideals of honor, courage, and endurance in a misfortune life. Throughout the novel, Santiago shows a contrast between opposite attitudes and values which associate his behavior with the guidelines of the code. In this case, the depiction of conflicting values, such as dignity despite humility, perseverance despite despair, and victory despite defeat are aspects that help to describe and understand theRead MoreSir Gawain And The Green Knight Short Paper1409 Words   |  6 Pagesjust a human being, but was faithful to his or her God, and King, and had a sense of chivalry and courteousness. Sir Gawain is depicted as a true Christian hero because he possessed qualities of selflessness, courage and bravery, courteous, chivalry and devotion to his word and honor, and humility. Throughout the book, Sir Gawain’s heroic actions demonstrate qualities and principles that represent the true meaning of a Christian hero of the Arthurian times. Sir Gawain appears as a real Christian heroRead MoreCharacteristics Of Beowulf936 Words   |  4 Pagesleaders powerful ways to lead. Common traits are shown in the story illustration common themes for leadership. Throughout the epic of Beowulf, an element of Anglo-Saxon culture is represented in the virtues of humility through actions, loyalty in the fighting, and the Code of Comitatus. Humility reflects strong character in a good leader, which is one of the many reasons it is held so high in Anglo-Saxon culture. As the epic begins, Beowulf shows characteristic of arrogance and proud fullness whenRead MoreEpic Hero In Beowulf1134 Words   |  5 PagesWhat is a hero? The technical, dictionary definition of a hero according to the EOD (English Oxford Dictionary) is â€Å"a person who is admired for their courage, outstanding achievements, and noble qualities† (â€Å"Hero†). While this seems like a fairly reasonable definition, do all heroes possess all of these qualities? During the medieval times, stories were told of knights and of fierce warriors who all became heroes for defeating beasts, going on grand adventures, and fighting for love. But were theyRead MoreHeroism: Hero and Ar Te1442 Words   |  6 Pagesand mine own. Hector was a great man, he was a hero, and thus went off and fulfilled his duty to the state, which is another aspect of heroism. A hero as seen by Homer has courage, strength, bravery, and honor. Continuing with the Greek tradition of the importance of the state, Pericles remarks on the ideals of strength and greatness within the state. However the differences between the Athenians, who value freedom and independence, and the Spartans, who value order and strict control, are foundRead MoreBeowulf: The Epic Hero1159 Words   |  5 Pageswarrior was the ultimate hero who represented strength and courage. Beowulf, the hero in the poem, illustrates the Germanic principles of the heroic code. Through the battles and character interactions, Beowulf converges loyalty, strength, courage and forgiveness into the hero archetype. The Anglo-Saxon culture ran on the outline of the heroic code. The warrior pledged allegiance to his lord in exchange for protection (â€Å"Beowulf† 38). Through acts of strength and bravery in battle, the warrior roseRead MoreThe Role Of Leadership As A Leader1728 Words   |  7 Pagestrue spiritual maturity, however, is what we do about our weaknesses.† A leader, therefore, recognizes the imperfections within and takes steps to prevent the weaknesses from overshadowing the ability to lead. He also seeks ways to enhance those strengths that are tools afforded to the individual by God. In addition to the inward spiritual growth, a leader must be a fearless evaluator. Avoiding the truth about the health of a church is naà ¯ve and foolhardy. A good leader helps a congregation faceRead MoreA Leader Is Good And Ethics Essay1424 Words   |  6 Pages A leader, â€Å"has compassion, a sense of justice, and courage, and he makes no distinctions between human beings...he has the same consideration for everyone† (34). If a leader is to be effective, they must have the ability to persuade others. In order to persuade others to follow a principle, a leader must have personal integrity. Morality in leadership is important; every word and action of a leader is watched by their followers intently. Gradually and cautiously, they will produce a culture whereRead MoreThe Epic Of The Odyssey Essay942 Words   |  4 Pagessupernatural powers, Gods, and an interesting journey of a hero bringing back knowledge and honor to his village or province. Furthermore, we as readers are able to identify both The Odyssey and Sunjata as epics. To be convinced of my claim, the first thing a reader needs to know is what the definition of a hero is. The modern definition of a hero stems from the idea of a person who is admired or idealized for courage, outstanding achievements or noble qualities. If we use this definition both epics contain

Monday, December 9, 2019

Apple Pay and Google Wallet

Question: Give short description on the Software in Apple Pay and Google Wallet and how its work and all details about Software? Answer: Introduction Allums (2014) commented on the essential fact that with the modernization and introduction innovative technology and mobile phones, within some days, the phones or smart watches will become a good replacement of the wallet. In order to make the payments easy and instant, Apple, Google and Samsung has adopted a new technology of payment that depends on the NFC hardware. According to Ghag Hegde (2012) in this process, the phone communicates without the wire with the payment terminal that is contactless and thereby only tapping to the device, payments can be done instantly. This involves simple waving or tapping the phone over the card reader instead of inserting or swapping the card. As a result, as per commented by Ahson Ilyas (2012) usage of these modern payment systems prohibits the customers in carrying the debit or credit cards for payment purposes. This assignment will be dealing with the software that is used in Apple Pay along with the working and functioning of it. Moreover, the software used for Google Wallet is also discussed along with its operation and functioning. This assignment also focuses on the essentiality of having both Apple Pay and Google Wallet in todays emerging busy lifestyle along with the vivid comparison between Apple Pay and Google Wallet. Software used in Apple Pay Coskun (2013) had mentioned that Apple Pay can be referred to as the digital wallet or mobile payment service that is made by Apple Inc. It facilitates the users in making payments through the wireless device rather than credit cards or debit cards. The Apple devices that are facilitated with this Apple Pay service are iPhone 6, iPhone 6 Plus, iPad Air 2, iPad Mini 3, Apple Watch and its compatible devices etc. As per commented by Ahson Ilyas (2012) Apple Pay doesnt need any kind of contactless terminals of payment and works with MasterCards PayPass, Visas PayWave as well as ExpressPay Terminals. The technologies that ate used in Apple Pay finger touch print technology, breakthrough contactless payment, Near Field Communications as well as Touch ID sensors. Ghag Hegde (2012) commented that these technologies make the usage of Apple Pay secured, private and simple to use. Moreover, Apple Pay also successfully works on any mobile e-commerce sites that are easily accessed via iOS 8.x devices. As mentioned by Gallo (2012) due to the presence of Near Field Communication technology, the users dont even need to open the app or wake the display. This is because; holding the iPhone near the contactless reader by just touching the finger on the Touch ID makes a successful payment. Gallo (2012) commented that the users dont require seeing the screen for knowing whether the payment is done or not as a beep and a delicate vibration will let the customers know about it. In the case of Apple Watch, the customers only need to double click the side button and hold the Apple Watch near the contactless reader and the payment will be done. Here also a gentle tone and a pulse will let the users know that payment is done successfully. Coskun (2013) mentioned that the when Apple Pay is used, an inimitable Device Account Number is consigned that is encrypted and fully secured. These numbers never get saved on the Apple servers and when the users make a transaction, then the Device Account Num ber as well as dynamic transaction-specific security code is used. Working and Functioning of Apple Pay Software According to the opinion of Kim, Lee Fang (2012) Apple Pay is an iOS supported mobile payment service that use the phone in making a valid and successful transaction on NFC facilitated credit card terminals at any POS (Point of Sale). The finger-print software in Apple devices helps in securing the cards and its details within the devices. Initially, the users need to enter the information of the credit card into the Passbook app of Apple. After that as per the outlook of Lance (2014) the users need to wave or tap the iPhone over the NFC supported POS terminal for initiating the payment. The NFC software also helps the payment reader to scan the details of the card that is necessary and essential without even swapping the card over the reader. Moreover, as per mentioned by Zeng (2012) the finger print software also facilitates the users in making a successful payment just by touching on the screen. The NFC that Apple uses for payment purpose generates radio communication for connect ing the Apple devices with the transaction machine. This also helps in verification of the card details of the user for making a successful and secured communication. Timberlake (2013) had an opinion that Apple devices follow a simple and most secured way of payment that facilitates the users for not carrying any kind of credit or debit cards for payment. The procedure for payment through Apple Pay is easy and is clearly demonstrated by the researcher. According to the outlook of Katz (2011) initially, after making purchase, the users bring the Apple device near the wireless transaction device and touch the screen. The transaction device will then automatically scans and read all the essential details from the card which is followed by the successful transaction. Gallo (2012) commented by the NFC thereby builds up a strong communication bridge between the Apple devices and the transaction device. The Touch ID technology will automatically verify the details of the user as well as the card. The NFC technologies are bets applicable for all kinds of cards such as debit card, credit card, Master Pay card etc. According to the outlook of Zhou (2015) th e usage of Apple Pay facilitates the users so that the users do not require carrying any kind of credit cards or debiting cards. The NFC technology helps in making card-less as well as cashless payments along with transit payments. Moreover, as per commented by Coskun et al. (2011) the MST technology that is the Magnetic Secure Transmission helps in NFC tap and pay facility. It also facilitates making transactions online as well as offline with a guarantee of secured check-outs. As commented by Zeng (2012) there are several uses of NFC technology such as Apple Pay facilitates Card-less Payment, Payment while transaction, Secure Checking out and facilitating both online as well as offline payments. The Membership along with the loyalty cards can also be purchased and also helps in proper verification and identification of the cards. As per the comment of Coskun (2013) Apple Pay is more or less like an electronic wallet to the users. In order to make the payments the users need to use the Touch ID as well as the security code where the transaction process needs a special code which is secured to the maximum extent. Necessity of having Apple Pay As commented by Nelson (2011) the Apple Pay facilitates the usage of easy, secured and private ways for payment of services and goods. This also facilitates in easy clothings, tickets as well as uses transaction data that are stored in iOS devices. This makes the payment easy without involving the loose of any important detailing of the card. The card details as well as the personal details are not at all stored in the device. As per the opinion of Johnston (2013) the Apple Pay makes sure that the whole transaction is done successfully and also enhances the card less payment. Moreover, if the iPhone or iPad is ever lost, then the users can easily out the device in the Lost Mode that will suspend the Apple Pay immediately on that device. Software used in Google Wallet Google Wallet is the oldest mobile wallet service that is available in the market in September, 2011. According to Kim, Lee Fang (2012) the software that is being used in Google Wallet is NFC or Near Field Communication. The software that is been used the field communication technology assists the Google device in developing and maintaining wireless connection between the payment device as well as mobile device. According to the viewpoint of Ghag and Hegde (2012) the software and the technologies that are used by Google for operating securely are the security patterns and pins. This is because, the security pins as well as security patterns are thereby used for both awaking the mobile devices and later on verification of the card details as well as for the information. As mentioned by Jung (2014) the Google wallet mainly depends on the Near Field Communication Technology for secured online payment. The cards that enables NFC are Debit Master Card, Visa pay Wave POS and also enables withdrawal of funds with a compatible ATM. Gallo (2012) commented that the devices that are supported by Google Wallet are iOS 6, Android 4.4, LG, Motorola, HTC etc. Working and Functioning of Google Wallet Software Resatsch (2010) commented on the essential fact that Google Wallet uses Near Field Communication or NFC just like Apple Pay. The steps of security are more strong and lengthy in case of Google Wallet. Google devices need to wake their devices before starting the transaction process. Moreover, the users also will need to enter the security pin that will help them in continuing the payment. According to the opinion and outlook of Park (2012) the Near Field Communication (NFC) technology will be helping the Google mobile devices in order to receive radio supported connection with the payment machine. The payment machine scans the card details and hence the payment becomes successful. As per commented by Ahson Ilyas (2012) the Google Wallet facilitates the transaction on both online and offline basis. The Google wallet users also are provided with large number of options in order to make successful transactions. The Android ginger bread devices along with IOS 6+ are the devices that can be used for Google Wallet. Moreover, as commented by Jung (2014) the Google wallet has more options on using cards and therefore the users also can use the balance amount for shopping purposes. The user can buy any product or service and hence the Google device can be kept in front of the wireless transaction device. According to the outlook of Lerner (2013) the security measures uses both the security pins as well as security patterns that will be helping in making payment along with awaking the devices. The online coupons, store loyalty coupons, credit and debit cards along with payback cards etc. can be easily used for proper functioning. Moreover, Zeng (2012) also commented that the additional features of Google wallet is the application of the adding money to Google wallet at any location. The similar features makes Google wallet unique in their approach. The transfer of money as well as addition of bala nce can be done with the help of the technology named Near Field Communication. The activities that are performed Google wallet are that the providing automatic screen as well as application locks facility. Moreover as per mentioned by Coskun et al. (2011) the wallet pin security as well as monitoring process both are secured. The automatic lock facility of the app as well as the screen also helps in protection of both information and data. In contrast, Park (2012) also mentioned that the main disadvantage of using Google wallet is unlocking the app as well as locking it after using it. The Google wallet requires a 4 digit pin that will only be known to the users. According to the comment of Kolin (2013) the Google wallet is used on the Google smart device that has android operating system. As commented by Lance (2014) the Google wallet users performs transaction where the users initially need to awake as well as lock the screen and app. only by entering the security pin. This let the users swap their devices over the transaction devices. As a result, the device s scan and read the data that are required and hence also helps in monitoring the whole process. In addition to this, as mentioned by Ghag and Hegde (2012) the password used by the company is a 4 digit one that helps in monitoring the whole transaction of the users. Google regularly monitors the whole process of the Google wallet users. The NFC that is used by Google wallet helps in wireless as well as card-less transactions. According to Zhou (2015) the NFC supported Google devices can also be used in the parking lot by the users. This also facilitates the non-carrying of the money as well as cards from one place to another. Irrespective of any place and location, Google wallet can be used most securely and easily by the users. As per mentioned by Allums (2014) the Google Wallet users will be using the phones over the transaction devices and hence secure transactions will be made. The radio connection that Near Field Communication Technology uses creates a connection between the Google device and the transaction device. After the secured connection is made, safe transactions ar e thereby done. In addition to this, as per commented by Zhou (2015) the security pin that is been created is also been verified by Google when used. Necessity of having Google Wallet According to the opinion of Google Heads (2011) Google Wallet is used in order to make a secured payment by the users. This prevents the users in carrying cash and cards and only the presence of Google support android phone will do the privilege. The usage of this Google Wallet saves time as well as enhances the security of the transaction. Coskun et al. (2011) commented that the evolution of Google pay also has facilitated that if the device gets lost, then the user can immediately stop the service of Google wallet thereby facilitating the fraud and misplace of money. Comparison of Apple Pay and Google Wallet With the introduction of Apple Pay and Goggle Wallet the fraud of the credit cards has decreased to the maximum extent. Allums (2014) commented on the fact that in case of Apple Pay the users need not wake up their screen whereas for Google Wallet, the users of Google wallet need to awake their screen. Google wallet is somewhat a replica of the original wallets. Conclusion Google wallet and Apple Pay both are used in order to make secured transaction for preventing fraud of the cards. Apple Pay uses both software and technology for security purposes. The Near Field Communication, Touch ID and touch finger print etc. are the software that are been used by both Apple Pay and Google Pay. The security pins for both Google Wallet as well as Apple Pay are four digit security pin that makes a secure and easy transaction. These wireless devices also can be used in the most secured way that will prevent the unauthorized access or 3rd party interference into the bank. Google Wallet awakes the screen whereas the Apple Pay need not awake the home screen. This assignment also deals with the both the advantages and disadvantages of Google Wallet as well as Apple Pay.

Sunday, December 1, 2019

Start Of The European Union Essays - Council Of Europe,

Start Of The European Union European Integration into a common market Europe today is tied together within a common market which enables it to work simultaneously on issues that arise upon its borders. This has not always the case. The phenomenon of a joint union is a recent thing brought on in the post war 1950s and is one of the greatest historical undertakings of the 20th century. The horrible economic instability and political divisions after the second World War were the main turn points for Wetern European counties to come together and work as a whole. Western Europe, divided by different language, culture, and religion , experienced long periods of tension, war and hostility due to these differences(Nugent,4). The first world war swept across Europe dividing Britain , France ,Russia and Italy against Germany , Austria-Hungary. This put horrible stress upon the European states and pulled the economies of these nations down to a low point . It was around this time that people were starting to feel a need of unification for Europe. In the 1930s The Briande plan, by Aristide Briande , came out in which he talked about how the peoples of Europe, if the y are to enjoy security and prosperity , must come together to establish a permenant regime of joint resposibilty for the rational organization of Europe(Leiden Univ). We see throughout the forties many individuals and groups stat responding to this sense of unity. In 1942, Italian secretary for the sociolist party of Italy declares unity, 1943 the European Federalist movement is formed, and in March 1944 a secret meeting in Geneva in which people from countries such as France Holland, Italy , Norway, Poland, Chechoslovakia and even memebers of the underground German Movement attend to speak on resistence to Nazi opression(THE WAY TO UNITY). This is seen as a first time in which European communities unite in a common struggle. In 1946 close to the end of the second World War Churchill spoke out at the University in Zurich where he announced We must build a kind of United States of Europe. If Europe is to be saved from infinite misery , and indeed from final doom, there must be this act of faith in the European family(Churchill,1946). Six countries originally rallied for this concept of a united Europe. The formation of these countries started coming together in the Treaty of Brussels 1948, where Netherlands Belgium , Luxembourg, and Britain signed a pact for collaboration in Economic, social and cultural affaires. It was around this time that the second World War was ending and its total collapse threatened the equilibrium of the world(Braudel,Unity in Europe). With the Marshall plan devised, important Statesmen, more than 800 members of parliament, trade union leaders , intellectuals and economist met at the Hague in May 1948,resulting in a congress of Europe. The task of this body goes on to establish a European assembly which advises measures that would bring political integration of Europe(THE WAY TO UNITY). With much success a year later January 1949 France Great Britain and Benelux countries decide to create a council of Europe and ask Denmark, Ireland, Italy, Norway and Switzerland to help(E.U WEBSITE). Eu rope had finally come a long way in terms of peaceful integration but a key factor was still holding this unification back and that was the bad relationship between France a Germany. Jean Monnet came forward and suggested to French prime minister, Robert Schuman and German chancellor, Konrad Adenauer, that a community of interest should be taken underway between the two countries. This was to become known as the European Coal and Steel Community and was welcomed by other countries as well. This treaty established the first European Community and opened the door to many more achievements between European countries. With the outbreak of Economic instability and tension arising throughout Europe during WW1 and WW2 , many figures came forth with proposals too heal the wounds that Europe has endured for hundreds of years. It was now time for this nation to come together and work with eachother in equilibrium so that devastating events could be prevented in the future. They wanted Economic advancement and peaceful trade between each other so that they