What Can't You Do With an English Major? (Winter 2014; Volume 5, Issue 1)


Welcome to the Winter 2014 issue (Volume 5, Issue 1) in which we discuss the different opportunities offered to English majors. We appreciate receiving your feedback. The new CFP for the Summer 2014 issue will be posted shortly. Enjoy!

The Editors
~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~

Letter from the editors

Table of Contents

Contributors' Biographies

Notes from the field: Editorial

A Letter Home to Parents - Jennifer Jennings Davis

Publishing from the Margins - Angelic Rodgers

Scholarly Articles

Cross-Pollinating the Mind: Reflections at the Crossroads of the English and STEM Studies - Cindy Lutenbacher and Alison Ligon

The Necessity of Humanities in Medicine: How English Studies and the Arts Contribute to the Human Experience - Ashley Beason-Manes

Creative Works

Good Writing - Sally Jarzab

Trapped - Fathima E. V.

Book Reviews

Review of The War Against Grammar by David Mulroy - David Aguilar

Review of Not Trivial: How Studying the Traditional Liberal Arts Can Set You Free by Laurie Encott Thomas - Sarah Dierlam

Review of I Have Always Been Here by Christopher Carmona - R. Dean Straight

Share:

1 comments

  1. RECOVERY OF LOST FUNDS:
    ARE YOU A VICTIM OF THE BINARY OPTIONS, BITCOIN and LOAN SCAM?
    Meet THE GLOBALKOS HACK RECOVERY TEAM.

    WHO ARE THE GLOBALKOS?
    GlobalkOS is a vulnerability coordination agency that enact penetration appraise to help victims who are faced with cyber challenges get back on their feet.
    Although hiring a professional hacker has been one of the world's most technically valued navigating information, our community of investigative cohort spans across the globe making us pretty outstanding on this subject.

    The recovery is achieved using a session encryption protocol whereby the locations and data of a deceptive provenience are traced into their monetary base system. Our community of investigative cohort spans across the globe making us pretty outstanding on this subject.

    However, The crucial benefit of contacting The Global-KOS hackers is• ZERO TRACE: After a successful hack recovery is carried out by the Global-KOS, no active or passive attacks will be used to trace any of our hacks to our clients or our organization. One common practice that attackers employ to evade detection is to break into poorly secured systems and use those hijacked systems as proxies through which they can launch and route attacks. So in a nutshell, attackers' efforts on this platform are useless. The reason is because our server is protected with a vigorous firewall switching and a firm security system to prevent unauthorized bodies from tracking or modifying our network accessible resources. I.e the hacker and clients are 100% safe and anonymous. Secondly, the company is large enough to provide a comprehensive range of services such as. • MOBILE PHONE HACKS.(Catching A Cheating Spouse)
    • CREDIT SCORE UPGRADE,
    • PENETRATION OF WEBSITES AND DATABASE.
    • UNLOCKING FROZEN CRYPTO WALLET
    • EMAIL HACKS
    • HACKING A FRAUDULENT WEBSITE.
    • UBER FREE PAYMENT LICENCE.

    For prolific services and info,
    Contact:
    ✉️Email: theglobalkos @ gmail . com
    leroysteckler @ gmail . com
    ®Global KOS™
    2020

    ReplyDelete