Wednesday, October 30, 2019

How does fire frequency influence tree species diversity in the boreal Research Proposal

How does fire frequency influence tree species diversity in the boreal forest - Research Proposal Example Its unique characteristics are quickly changing as a result of human and natural pressure and this area is expected to be one of the most rapidly impacted regions of the world by the climate change that is ongoing which might lead to degradation of the Boreal eco systems in the end (Shvidenko & Apps, 2006). Canada is the largest producer and exporter of forest products with most of these products coming from the boreal forest that is there and therefore it may not come as a surprise that Canada has an advanced forest industry and also a forest management that is equally advanced. This has not stopped the forest in Canada from being significantly affected by changes that are occurring in the natural disturbances that include wild fire and insect outbreaks that have been taking place in the last few decades (Shvidenko & Apps, 2006). It is expected that the Boreal forest in particular will be vulnerable to disease, fire and competition from other tree species as the climate changes continue to be experienced and the weather gets warmer but the natural replacement in forest will take some time (Louiseize, 2005). Fire spread is not only a function of weather, but it also depends on topography, fuel load, types and spatial arrangement as well as active suppression and this therefore means that the fire spread simulations for everyday fire management require a large amount of information that is site specific (Pueyo, 2007). Being able to predict future fire activity that is related to climate change is a leap towards appreciating the future state of the Boreal ecosystem since the natural disturbances are usually controlled by the interplay between biotic and abiotic factors. Forest fire is the dominant natural disturbance that exists in Canada’s western Boreal forest where the fire regime of a particular area reflects the integration of

Monday, October 28, 2019

Encryption and network security Essay Example for Free

Encryption and network security Essay Honeynets: Observing Hackers’ Tools, Tactics and Motives in a Controlled Environment Solutions to hacker attacks are usually fixes that are developed when damage has been done. Honeynets were solely developed to catch and monitor threats (i. e. a probe, scan or attack). They are designed to gather extensive data about the threats. These data are then interpreted and used for the development of new tools to prevent actual damages to computer systems. Talabis defines a honeynet as a network of high interaction honeypots that simulates a production network and configured such that all activity is monitored, recorded and in a degree, discretely regulated. Seen below is a diagram of a typical honeynet setup as given by Krasser, Grizzard, Owen and Levine. Figure 1 A typical honeynet setup Deployment of honeynets may vary as it is an architecture. The key element of any honeynet is the honeywall. This is the command and control gateway through which all activities come and go. This separates the actual systems from the honeypot systems wherein threats are directed to intentionally. Two more elements are essential in any honeynet. These are discussed below. Data Control Data control is necessary to lessen the risks posed by the captured threats without compromising the amount of data you are able to gather. To do this, connection counting and Network Intrusion Prevention System (NIPS) are used. These are both automated data control. Connection counting limits outbound activity wherein connections beyond the limit are blocked. NIPS blocks or disables known threats before it can attack outbound. The Honeynet Project Research Alliance has defined a set of requirements and standards for the deployment of Data Control. First is the use of both manual and automated data controls. Second, there must be at least two layers of data control to protect against failure. Third, in case of failures, no one should be able to connect to the honeynet. Fourth, the state of inbound and outbound connections must be logged. Fifth, remote administration of honeynets should be possible. Sixth, it should be very difficult for hackers to detect data control. And finally, automatic alerts should be raised when a honeynet is compromised. Data Capture The Honeynet Project identifies three critical layers of Data Capture. These are firewall logs, network traffic and system activity. The data collection capabilities of the honeynet should be able to capture all activities from all three layers. This will allow for the production of a more useful analysis report. Firewall logs are created by NIPS. The Snort process logs network traffic. Snort is a tool used to capture packets of inbound and outbound honeynet traffic. The third is capturing keystrokes and encryption. Sebek is a tool used to bypass encrypted packets. Collected data is hiddenly transmitted by Sebek to the honeywall without the hacker being able to sniff these packets. Risks As with any tool, honeynets are also threatened by risks affecting its usage and effectiveness. These include the risk of a hacker using the honeynet to attack a non-honeynet system; the risk of detection wherein the honeynet is identified by the hacker and false data is then sent to the honeynet producing misleading reports; and the risk of violation wherein a hacker introduces illegal activity into your honeynet without your knowledge. Alerting As mentioned in the requirements and standards set for data control, alerts should be in place once an attack is done to your honeynet. Otherwise, the honeynet is useless. An administrator can monitor the honeynet 24/7 or you can have automated alerts. Swatch is a tool that can be used for this. Log files are monitored for patterns and when found, an alert is issued via email or phone calls. Commands and programs can also be triggered to run. Honeynet Tools Several honeynet tools are available to the public for free so they can setup their own honeynet for research purposes. These tools are used in the different elements of a honeynet. Discussed below are just three of them. Honeynet Security Console This is a tool used to view events on the honeynet. These events may be from SNORTÂ ®, TCPDump, Firewall, Syslog and Sebek logs. Given these events, you will be able to come up with an analysis report by correlating the events that you have captured from each of the data types. The tool’s website lists its key features as follows: quick and easy setup, a user-friendly GUI for viewing event logs, the use of powerful, interactive graphs with drilldown capabilities, the use of simple search/correlation capabilities, integrated IP tools, TCPDump payload and session decoder, and a built in passive OS fingerprinting and geographical location capabilities. Honeywall CDRom Roo This is the recommended tool for use by the Honeynet Project. This is a bootable CDRom containing all of the tools and functionality necessary to quickly create, easily maintain, and effectively analyze a third generation honeynet. Much like the Honeynet Security Console, this tool capitalizes on its data analysis capability which is the primary purpose of why honeynets are deployed – to be able to analyze hacker activity data. GUI is used to maintain the honeywall and to track and analyze honeypot activities. It displays an overview of all inbound and outbound traffic. Network connections in pcap format can be extracted. Ethereal, another tool, can then be used with the extracted data for a more in-depth analysis. Sebek data can also be analyzed by this tool. Walleye, another tool, is used for drawing visual graphs of processes. Although this tool may be useful already, several improvements will still have to be introduced to increase its effectiveness. Walleye currently supports only one honeynet. Multiple honeynets can be deployed but remote administration of these distributed systems still needs to be worked on. Sebek This is a tool used for data capture within the kernel. This is done by intercepting the read() system call. This hiddenly captures encrypted packets from inbound and outbound activities by hackers on the honeypot. Basically, Sebek will tell us when the hacker attacked the honeypot, how he attacked it and why by logging his activities. It consists of two components. First, a client that runs on the honeypot. Its purpose is to capture keystrokes, file uploads and passwords. After capturing, it then sends the data to the server, the second component. The server normally runs on the honeywall where all captured data from the honeypot are stored. Found below is the Sebek architecture. Figure 2 Sebek Architecture A web interface is also available to be able to analyze data contained in the Sebek database. Three features are available: the keystroke summary view; the search view; and the table view which provides a summary of all activities including non-keystroke activities. References Honeynet Security Console. Retrieved October 8, 2007 from http://www. activeworx. org/onlinehelp/hsc/hsc. htm. Krasser, S. , Grizzard, J. , Owen, H., Levine, J. (2005). The use of honeynets to increase computer network security and user awareness. Journal of Security Education, 1, 23-37. Piazza, P. (2001, November). Honeynet Attracts Hacker Attention: The Honeynet Project Set Up a Typical Computer Network and Then Watched to See What Turned Up. Security Management, 45, 34. SebekTM FAQ. Retrieved October 8, 2007 from http://www. honeynet. org/tools/sebek/faq. html. The Honeynet Project. (2005, May 12). Know Your Enemy: Honeynets. What a honeynet is, its value, and risk/issues involved. Retrieved October 8, 2007 from http://www.honeynet. org. Talabis, R. The Philippine Honeynet Project. A Primer on Honeynet Data Control Requirements. Retrieved October 8, 2007 from http://www. philippinehoneynet. org/index. php? option=com_docmantask=cat_viewgid=18Itemid=29. Talabis, R. A Primer on Honeynet Data Collection Requirements and Standards. Retrieved October 8, 2007 from http://www. philippinehoneynet. org/index. php? option=com_docmantask=cat_viewgid=18Itemid=29. Talabis, R. Honeynets: A Honeynet Definition. Retrieved October 8, 2007 from http://www. philippinehoneynet. org/index. php?option=com_docmantask=cat_viewgid=18Itemid=29. Talabis, R. The Gen II and Gen III Honeynet Architecture. Retrieved October 8, 2007 from http://www. philippinehoneynet. org/index. php? option=com_docmantask=cat_viewgid=18Itemid=29. The Honeynet Project. (2005, May 12). Know Your Enemy: GenII Honeynets. Easier to deploy, harder to detect, safer to maintain. Retrieved October 8, 2007 from http://www. honeynet. org. The Honeynet Project and Research Alliance. (2005, August 17). Know Your Enemy: Honeywall CDRom Roo. 3rd Generation Technology. Retrieved October 8, 2007 from http://www. honeynet. org.

Saturday, October 26, 2019

The Bush Administrations Relation With Iraq Prior to Iraqs Invasion o

The Bush Administration's Relation With Iraq Prior to Iraq's Invasion of Kuwait Prior to the August 2, 1990 invasion of Kuwait on the part of Iraq, the United States had questionable relations with Iraq dictator, Saddam Hussein, to say the least. In retrospect, which is inherently advantageous as a 20/20 perspective, questions remain unanswered as to whether or not the United States was too appeasing to Saddam Hussein in the years, months, and days leading up to that early August morning. There remains to this day lingering questions as to the role that the US Ambassador to Iraq, April Glaspie, played in conveying the Administration's message to the Iraqi leader. In addition, questions surrounding the Administrators official policy, the calculations (or miscalculations) on the part of the State Department and other agencies within the US government, the Administrations covert plan to aid an Italian bank in illegal loans to benefit Saddam's military and the advice that the US received from other Arab nations with respect to what US relations should be with Iraq in terms of any impending border dispute, constitute a limited context of the issues that faced the Administration as it tried to deal with the leader of the largest economy of the Persian Gulf region. The Bush Administration's relations with Iraq prior to its invasion of Kuwait were clouded in a context of misperception by both states and further complicated by a lack of credibility on the part of key actors of both sides as well. This tragic sequence of events that led to the invasion of Kuwait cannot solely be attributed to personality traits or even actions by key individuals within the Administration. In retrospect, it is much more complex than that. However, the actions and public and private statements on the part of key personnel on both sides most likely contributed to the eventual invasion of Kuwait by Iraq in 1990. Since, a brief, yet modest account of the history of the events leading up to the invasion and the invasion in itself along with the regional and global actors has been offered in section A, section B will be an analysis of the role of misperception and questions of credibility with respect to key actors on both sides of the issue, from State Department officials to Saddam Hussein himself. While touching on the importance and significance of o... ..., 3/20/91 6 Glaspie, April, Opening Remarks, Hearing by the Senate Foreign Relations Committee, 3/20/91 7 Iraqi Government, Excerpts from Iraqi Document on Meeting with US Envoy, "The New York Times, 9/23/90, p.19 8 Sciolino, Elaine, "US Gave Iraq Little Reason Not to Mount Kuwait Assault," The New York Times, 9/23/90, p.A1 9 Sciolino, Elaine, "US Gave Iraq Little Reason Not to Mount Kuwait Assault," The New York Times, 9/23/90, p.A1 10 Sciolino, Elaine, "US Gave Iraq Little Reason Not to Mount Kuwait Assault," The New York Times, 9/23/90, p.A1 11 Sciolino, Elaine, "US Gave Iraq Little Reason Not to Mount Kuwait Assault," The New York Times, 9/23/90, p.A18 12 Sciolino, Elaine, "US Gave Iraq Little Reason Not to Mount Kuwait Assault," The New York Times, 9/23/90, p.A18 14 Friedman, Thomas, "US Explains View of Envoy to Iraq," The New York Times, 3/22/31, p.A9, col. 1 15 Sciolino, Elaine, "Envoy's Testimony on Iraq is Assailed," The New York Times, 7/13/91, p.A1, col.1 16 Sciolino, Elaine, "Envoy's Testimony on Iraq is Assailed," The New York Times, 7/13/91, p.A4, col.1 17 McAllister, J.F.O., "The Lessons of Iraq," Time, 11/2/92, pp.57-59 The Bush Administration's Relation With Iraq Prior to Iraq's Invasion o The Bush Administration's Relation With Iraq Prior to Iraq's Invasion of Kuwait Prior to the August 2, 1990 invasion of Kuwait on the part of Iraq, the United States had questionable relations with Iraq dictator, Saddam Hussein, to say the least. In retrospect, which is inherently advantageous as a 20/20 perspective, questions remain unanswered as to whether or not the United States was too appeasing to Saddam Hussein in the years, months, and days leading up to that early August morning. There remains to this day lingering questions as to the role that the US Ambassador to Iraq, April Glaspie, played in conveying the Administration's message to the Iraqi leader. In addition, questions surrounding the Administrators official policy, the calculations (or miscalculations) on the part of the State Department and other agencies within the US government, the Administrations covert plan to aid an Italian bank in illegal loans to benefit Saddam's military and the advice that the US received from other Arab nations with respect to what US relations should be with Iraq in terms of any impending border dispute, constitute a limited context of the issues that faced the Administration as it tried to deal with the leader of the largest economy of the Persian Gulf region. The Bush Administration's relations with Iraq prior to its invasion of Kuwait were clouded in a context of misperception by both states and further complicated by a lack of credibility on the part of key actors of both sides as well. This tragic sequence of events that led to the invasion of Kuwait cannot solely be attributed to personality traits or even actions by key individuals within the Administration. In retrospect, it is much more complex than that. However, the actions and public and private statements on the part of key personnel on both sides most likely contributed to the eventual invasion of Kuwait by Iraq in 1990. Since, a brief, yet modest account of the history of the events leading up to the invasion and the invasion in itself along with the regional and global actors has been offered in section A, section B will be an analysis of the role of misperception and questions of credibility with respect to key actors on both sides of the issue, from State Department officials to Saddam Hussein himself. While touching on the importance and significance of o... ..., 3/20/91 6 Glaspie, April, Opening Remarks, Hearing by the Senate Foreign Relations Committee, 3/20/91 7 Iraqi Government, Excerpts from Iraqi Document on Meeting with US Envoy, "The New York Times, 9/23/90, p.19 8 Sciolino, Elaine, "US Gave Iraq Little Reason Not to Mount Kuwait Assault," The New York Times, 9/23/90, p.A1 9 Sciolino, Elaine, "US Gave Iraq Little Reason Not to Mount Kuwait Assault," The New York Times, 9/23/90, p.A1 10 Sciolino, Elaine, "US Gave Iraq Little Reason Not to Mount Kuwait Assault," The New York Times, 9/23/90, p.A1 11 Sciolino, Elaine, "US Gave Iraq Little Reason Not to Mount Kuwait Assault," The New York Times, 9/23/90, p.A18 12 Sciolino, Elaine, "US Gave Iraq Little Reason Not to Mount Kuwait Assault," The New York Times, 9/23/90, p.A18 14 Friedman, Thomas, "US Explains View of Envoy to Iraq," The New York Times, 3/22/31, p.A9, col. 1 15 Sciolino, Elaine, "Envoy's Testimony on Iraq is Assailed," The New York Times, 7/13/91, p.A1, col.1 16 Sciolino, Elaine, "Envoy's Testimony on Iraq is Assailed," The New York Times, 7/13/91, p.A4, col.1 17 McAllister, J.F.O., "The Lessons of Iraq," Time, 11/2/92, pp.57-59

Thursday, October 24, 2019

Infectious Disease :: science

Infectious Disease What is the stake of the American People and the Government by International Agencies to control Infectious Disease in Developing Countries? More people are at risk of infectious diseases than at any other time on history. Infectious diseases are worldwide problem requiring worldwide attention. Infectious diseases can weaken the strength of a nation's resources. In developing nations this poses even a greater threat. Diseases are threatening the economic stability of many developing nations. 50,000 people die everyday from infectious disease. Rift Valley Fever infects both livestock and humans. Rift Valley Fever is most commonly found in regions of eastern and southern Africa. It also exists in Madagascar and sub-Saharan Africa. The Bunyaviridae family includes the Rift Valley Fever disease. It is primarily spread from infected mosquitoes, who then infect animals. Generally they infect domestic animals, such as buffalo, cattle, sheep, camels and goats. Once the livestock are infected, other mosquitoes can spread the disease. It is also possible that the infection can be spread from other biting insects. The Rift Valley Fever outberak of 1997-1998 in eastern Africa killed both humans and livestock. It economically hurt trase in animals and the dairy indusrty.. the economy was crushed by trade imbargoes. Humans can get Rift Valley Fever in numerous ways. Humans can be infected from the mosquitoes or the bodily fluids of the infected animal. Contact such as slaughtering the infected animal can occur also. Symptoms include, an infuenza like illness, fever, liver abnormalities, muscle and back pain and vomitting. In the early stages of Rift Valley Fever, these symptoms are some times mistaken for meningitis. This fever may also perceive itself to be haemorrhagic fever. Fatalities occur mostly in patients who have developed haemorrhagic fever. In diagnosing Rift Valley Fever, tests have demostrated the presence of antibodies to the disease. Studies in animals have given antiviral drugs for the use of humans. Herdsman and animal workers in areas where Rift Valley Fever is present are at a greater risk of being infected. The risk of transmission can be reduced by, wearing gloves, insect repellent, the use of protective clothes, and avoiding outdoor activity during peak biting times. Surveillance is important to form effective measures for reducing the number of infections. Cholera is a diarrheal illness that is spread by contaminated water and food. It is caused by an infection of the intestine, and in many cases it can be very severe.

Wednesday, October 23, 2019

Piracy Ruining the Music Industry Essay

For many people, music is a large part of their lives. They listen to it to as often as they can. In their cars, while they work out, study, and many other daily activities. But does anyone think about how important music is to those who work in the music industry? Some people buy CD’s, others may buy digital copies online (often referred to as mp3’s). However, there are others who download free copies of music from file sharing websites, such as FrostWire and Napster. This is a crime, and many people are not aware of it. There needs to more stringent measure to protect the music industry from these acts of piracy and copyright infringements. Piracy has affected the music industry drastically over the years. It would appear all is well for those in the recording industry. However, the music industry is worth more than half of what it was in 1999 and the decline doesn’t look as if it will improve. The RIAA (Recording Industry Association of America) reported that in 1999, the revenue for music sales topped $14.6 billion. Over time, total revenue from U.S. music sales and licensing plunged to $6.3 billion in 2009 (Alexandra. â€Å"The History of Recording Industry Sales, 1973-2010†¦Ã¢â‚¬ ). File sharing is the reason for the decline in album sales over the years. Because it is so easy to get free music, people do not find a need to purchase it. In 1984, the Supreme Court, ruled in the Universal City Studios vs. Sony Corporation case, that home recording of copyrighted materials, would be legal under the fair use provision (Stevens, Law of Cornell.). The decision was made so that it would be legal for home users to make copies of copyrighted material without obtaining any permission of the copyright holder to do so. This ruling covered music, television shows, and movies. Many people argued that they wanted to be able to use the recording devices that they purchased. There needs to be new laws to reflect the change in technology since that time. In 1984 we did not have the different file sharing sites that gave people the opportunity to upload their recordings. Piracy is very popular in many countries. This is because many cultures are interested in the American lifestyle. It is very hard for other cultures to obtain American media, so they rely on file-sharing websites to stay connected. This has affected the American economy drastically. There has been a loss of around 71,060 jobs, a decrease of worker earnings of 2.7 billion dollars and a loss of U.S tax revenue of 422 million dollars. It is estimated that the cost of piracy in the global economy in 2012 was 35.4 billion dollars, and 12.5 billion dollars affecting the music industry individually. (Goldman,† Music’s lost decade: Sales cut in half†) The U.S. government has attempted to prevent piracy by bringing lawsuits against companies such as, LimeWire, Mega Upload, and Pirate Bay. Sites such as these may be stopped, but within months another company begins a similar or more-improved service. â€Å"Would you go into a CD store and steal a CD?† questioned an angry Britney Spears in an industry-funded advert. â€Å"It’s the same thing, people going into the computers and loggin’ on and stealing our music.† Piracy is ruining the entertainment industry. The music industry has a diminished profitability, and significant job loss has occurred, and will only get worse, unless there are more stringent measures to regulate the internet and its’ file-sharing sites.

Tuesday, October 22, 2019

Why the Sioux Oppose the Dakota Access Pipeline

Why the Sioux Oppose the Dakota Access Pipeline As the Flint, Michigan, water crisis made national headlines in 2016, members of the Standing Rock Sioux  successfully  protested to protect their water and land from the Dakota Access Pipeline. After months on end of demonstrating,  the water protectors rejoiced when the U.S. Army Corps of Engineers decided on Dec. 4, 2016, to  prohibit the pipeline from crossing  Lake Oahe, effectively bringing the project to a halt. But the pipelines future is unclear after Obama leaves office, and the Trump administration enters the White House. Building of the pipeline could very well resume when the new administration takes over.   If finished, the $3.8 billion project would span 1,200 miles across four states to link the Bakken oil fields in North Dakota to an Illinois river port. This would allow 470,000 barrels of crude oil daily to be transported along the route. But the Standing Rock wanted construction on the pipeline stopped because they said it could devastate their natural resources. Initially, the pipeline would have crossed the Missouri River near the state capital, but the route was changed so that it would pass under the Missouri River at Lake Oahe, a half-mile upstream from the Standing Rock reservation. The pipeline was redirected from Bismarck because of fears that an oil spill would endanger the city’s drinking water. Moving the pipeline from the state capital to an Indian reservation is environmental racism in a nutshell, as this form of discrimination is characterized by the disproportionate placement of environmental hazards in communities of color. If the pipeline was too risky to be placed near the state capital, why wasn’t it deemed a risk near Standing Rock land? With this in mind, the tribe’s effort to stop  construction of the Dakota Access Pipeline isn’t simply an environmental issue but a protest against racial injustice as well. Clashes between the pipeline’s protesters and its developers have also sparked racial  tensions, but the Standing Rock have won support from a broad cross-section of the public, including public figures and celebrities.   Why the Sioux Are Against the Pipeline On Sept. 2, 2015, the Sioux drafted a resolution explaining their opposition to the pipeline. It read in part: â€Å"The Standing Rock Sioux Tribe relies on the waters of the life-giving Missouri River for our continued existence, and the Dakota Access Pipeline poses a serious risk to Mni Sose and to the very survival of our Tribe; and ...the horizontal direction drilling in the construction of the pipeline would destroy valuable cultural resources of the Standing Rock Sioux Tribe.† The resolution also argued that the Dakota Access Pipeline violates Article 2 of the 1868 Fort Laramie Treaty which granted the tribe the â€Å"undisturbed use and occupation† of its homeland. The Sioux filed a federal lawsuit against the U.S. Army Corps of Engineers in July 2016 to stop construction of the pipeline, which began the following month. In addition to concerns about the effects a spill would have on the Sioux’s natural resources, the tribe pointed out that the pipeline would course through sacred ground protected by federal law. U.S. District Judge James E. Boasberg had a different take. He ruled on Sept. 9, 2016, that the Army Corps had â€Å"likely complied† with its duty to consult the Sioux and that the tribe â€Å"has not shown it will suffer injury that would be prevented by any injunction the court could issue.† Although the judge denied the tribe’s request for an injunction to stop the pipeline, the departments of the Army, Justice and Interior announced after the ruling that they would suspend building of the pipeline on land of cultural importance to the tribe pending further evaluation. Still, the Standing Rock Sioux said they would appeal the judge’s decision because they believe they were not sufficiently consulted when the pipeline was rerouted.    My nations history is at risk because the pipeline builders and the Army Corps failed to consult the tribe when planning the pipeline, and routed it through areas of cultural and historical significance, which will be destroyed,† stated Standing Rock Sioux Chairman David Archambault II in a court filing. Judge Boasberg’s ruling led the tribe to ask for an emergency injunction to stop building of the pipeline. This led the U.S. Court of Appeals for the District of Columbia Circuit  to state in a Sept. 16 ruling that it needed more time to consider the tribes request, which meant that all construction 20 miles in either direction of Lake Oahe had to stop. The federal government had already called for construction along that part of the route to be halted, but Dallas-based pipeline developer Energy Transfer Partners didn’t immediately respond to the Obama administration. In September 2016, the company said the pipeline was 60 percent complete and maintained it would not harm the  local water supply. But if that were absolutely certain, then why wasn’t the Bismarck location an appropriate site for the pipeline? As recently as October 2015, a North Dakota oil well blew out and leaked more than 67,000 gallons of crude, putting a tributary of the Missouri River at risk. Even if oil spills are rare and new technology works to prevent them, they cannot be completely ruled out. By rerouting the Dakota Access Pipeline, the federal government appears to have put the Standing Rock Sioux directly in harm’s way in the unlikely event of an oil spill. Controversy Over Protests The Dakota Access Pipeline hasn’t attracted media attention simply because of the natural resources at stake but also because of clashes between protesters and the oil company in charge of building it. In Spring 2016, only a small group of demonstrators  had set up camp on the reservation to protest the pipeline. But in the summer months, Sacred Stone Camp ballooned to thousands of activists, with some calling it â€Å"the largest gathering of Native Americans in a century,† the Associated Press reported. In early September, tensions heightened as protesters and journalists were arrested, and activists accused the security firm tasked with protecting the pipeline of pepper-spraying them and letting dogs viciously attack them. This called to mind similar images of attacks on civil rights protesters during the 1960s.    In light of the violent clashes between protesters and security guards, the Standing Rock Sioux were granted a permit to allow the water protectors to legally rally on the federal lands that surround the pipeline. The permit means the tribe is responsible for the cost of any damages, keeping demonstrators safe, liability insurance and more. Despite this shift, clashes between activists and officers continued in November 2016, with police reportedly firing tear gas and water canons at protesters. One activist came dangerously close to losing her arm as a result of an explosion that occurred during the confrontation. Protesters say she was injured by a grenade thrown by police, while police say she was hurt by a small propane tank that protesters rigged to explode, according to CBS News. Prominent Standing Rock Supporters A number of celebrities have publicly expressed their support for the Standing Rock Sioux’s protest against the Dakota Access Pipeline. Jane Fonda and Shailene Woodley helped serve Thanksgiving 2016 dinner to the demonstrators.  Green Party presidential candidate Jill Stein visited the site and faced arrest for allegedly spray-painting construction equipment during a protest. A former 2016  presidential candidate also stands in solidarity with the Standing Rock, leading a rally against the pipeline. U.S. Sen. Bernie Sanders (I-Vermont) said on Twitter, â€Å"Stop the Dakota Access pipeline. Respect Native American rights. And let us move forward to transform our energy system.† Veteran rocker Neil Young even released a new song called â€Å"Indian Givers† in honor of the Standing Rock protest. The song’s title is a play on the racial insult. The lyrics state: There’s a battle raging on the sacred landOur brothers and sisters have to take a standAgainst us now for what we all been doingOn the sacred land there’s a battle brewingI wish somebody would share the newsNow it’s been about 500 yearsWe keep taking what we gave awayJust like what we call Indian giversIt makes you sick and gives you shivers Young also released a video for the song that features footage of the pipeline protests. The musician has recorded songs about similar environmental controversies, such as his 2014 protest song â€Å"Who’s Gonna Stand Up?† in protest of the Keystone XL pipeline. Leonardo DiCaprio announced that he shared the Sioux’s concerns as well. â€Å"Standing w/ the Great Sioux Nation to protect their water lands,† he said on Twitter, linking to a Change.org petition against the pipeline. â€Å"Justice League† actors Jason Momoa, Ezra Miller and Ray Fisher  took to social media to announce their objections to the pipeline. Momoa shared a photo of himself on Instagram with a sign that said, â€Å"Oil pipelines are a bad idea,† along with hashtags related to the Dakota Access Pipeline protest. Wrapping Up While the Dakota Access Pipeline protest has largely been framed as an environmental issue, it is also a racial justice issue. Even the judge who denied the Standing Rock Sioux’s temporary injunction to stop the pipeline, acknowledged that â€Å"the United States’ relationship with the Indian tribes has been contentious and tragic.† Since the Americas were colonized, Native Americans and other marginalized groups have fought for equal access to natural resources. Factory farms, power plants, freeways and other sources of pollution are all too often erected in communities of color. The richer and whiter a community is, the more likely its residents have clean air and water. So, the Standing Rock’s struggle to protect their land and water from the Dakota Access Pipeline is just as much an anti-discrimination issue as it is an environmental one.

Monday, October 21, 2019

Acupuncture essays

Acupuncture essays Acupuncture is currently being used for a number of medical treatments. It is important to look at the history of acupuncture, how it relates to post stroke patients and what its significance is to the nursing Acupuncture was developed by the ancient Chinese who "felt awe for the sanctity of the human body. The Nei Ching, attributed to the emperor Huang-Ti (2698-2598 BC), contains a reference to a theory of the circulation of the blood and the vital function of the heart that suggests familiarity with anatomy. Accurate location of the proper points for the traditional Chinese practice of acupuncture implies some familiarity with the nervous and vascular systems (Unknown, 2004)." Supporters of acupuncture believe "illness is caused by a disruption in the flow of qi (pronounced chee'), the collection of energies that endow us with our vitality (Boozang, 1998)." It is felt that the energy travels through "different medians that connect certain organs together (Levin, 2003)." The qi, or life force, is restored when "needles are inserted along the meridians at different acupuncture points, where energy travels close to the surface. Once inserted, the needles are then stimulated either manually by turning them, or electrically (Levin, 2003)." In the United States, the main reason acupuncture is performed is for pain relief, however it is also used for "rheumatoid and osteoarthritis, muscle and nerve difficulties', depression, smoking, eating disorders, drug behavior problems', migraine, acne, cancer and constipation (Boozang, 1998)." It is believed that acupuncture can lessen the addictions, as well as "manage disorders of the digestive, respiratory and vascular Since the early 1980's, acupuncture has "become a more acceptable alternative form of medical treatment in the United States. However, much of the information about acupuncture and its abil...

Sunday, October 20, 2019

Butterfly Houses in the US

Butterfly Houses in the US Butterfly houses offer enthusiasts of all ages the opportunity to observe a variety of species in an indoor exhibit. Most butterfly houses mimic tropical environments​ and showcase tropical species from Asia, South America, Australia, and other warm, humid locations. A few butterfly houses listed here feature species native to North America. Usually, youll see some showy moths, such as luna moths or Atlas moths, perched on foliage as well.​ Before you visit a butterfly house, it might increase your enjoyment to learn a little about the lepidopteran, or butterfly, including tips for observing and photographing butterflies, the differences between butterflies and moths, and why butterflies drink from puddles, a behavior you will likely observe in a butterfly exhibit. Most butterfly houses have an area where you can see new adult butterflies emerge from their pupae, and some display larval food plants as well. Some butterfly houses listed here are seasonal, meaning they are open for only a part of the year. Be sure to call before you visit to be sure the butterflies are on display. This is a list of enclosed butterfly houses, not outdoor butterfly gardens. Alabama Huntsville Botanical Garden4747 Bob Wallace Ave.Huntsville, Alabama 35805(256)-830-4447 Seasonal. Call before you visit. California Natural History Museum of Los Angeles CountyButterfly Pavilion900 Exposition Blvd. Los Angeles, California 90007(213) 763-DINO Seasonal. Call before you visit. San Diego Zoo Safari ParkHidden Jungle15500 San Pasqual Valley RoadEscondido, California 92027(760) 747-8702 Seasonal. Call before you visit. Six Flags Discovery Kingdom1001 Fairgrounds DriveVallejo, California 94589(707) 643-6722 Year-round Colorado Butterfly Pavilion6252 W. 104th Ave.Westminster, CO 80020(303) 469-5441 Year-round Delaware Delaware Nature SocietyBarley Mill RoadHockessin, Delaware 19707(302) 239-2334 Seasonal. Call before you visit. District of Columbia Smithsonian National Museum of Natural HistoryButterfly Pavilion10th Street and Constitution Ave., NWWashington, D.C. 20560(202) 633-1000 Year-round National ZooPollinarium3001 Connecticut Ave., NWWashington, DC 20008(202) 633-4888 Year-round Florida Butterfly World3600 W. Sample RoadCoconut Creek, Florida 33073(954) 977-4400 Year-round Butterfly RainforestFlorida Museum of Natural HistoryUniversity of FloridaSW 34th Street and Hull RoadGainesville, Florida 32611(352) 846-2000 Year-round Key West Butterfly and Nature Conservatory1316 Duval St.Key West, Florida 33040(800) 839-4647 Year-round Panhandle Butterfly House8581 Navarre ParkwayNavarre, Florida 32566(850) 623-3868 Seasonal. Call before you visit. BioWorks Butterfly GardenMuseum of Science and Industry (MOSI)4801 E. Fowler Ave.Tampa, Florida 33617(800) 995-MOSI Year-round Georgia Callaway GardensCecil B. Day Butterfly Center5887 Georgia Highway 354Pine Mountain, Georgia 31822(800) CALLAWAY Seasonal. Call before you visit. Illinois Brookfield ZooChicago Zoological Society 8400 31st St.Brookfield, Illinois 60513(708) 688-8000 Seasonal. Call before you visit. Chicago Academy of SciencesThe Peggy Notebaert Nature MuseumJudy Istock Butterfly Haven2430 N. Cannon DriveChicago, Illinois 60614(773) 755-5100 Year-round Peck Farm Butterfly House4038 Kaneville RoadGeneva, Illinois 60134(630) 262-8244 Seasonal. Call before you visit. Iowa Reiman GardensIowa State University1407 University Blvd.Ames, Iowa 50011(515) 294-2710 Year-round Kansas Butterfly/Pansy House701 Amidon StWichita, Kansas 67203(316) 264-0448 Seasonal. Call before you visit. Louisiana Audubon InsectariumButterflies in Flight6500 Magazine St.New Orleans, Louisiana 70118(800) 774-7394 Year-round Maryland Brookside Gardens South ConservatoryWings of Fancy Butterfly Exhibit1500 Glenallan Ave.Wheaton, Maryland 20902(301) 962-1453 Seasonal. Call before you visit. Michigan Detroit ZooWoodward Avenue and 10 Mile Road (I-696)Royal Oak, Michigan 48067(248) 541-5717 Year-round Original Mackinac Island Butterfly HouseMcGulpin StreetMackinac Island, Michigan 49757(906) 847-3972 Seasonal. Call before you visit. Wings of MackinacSurrey Hills Carriage MuseumMackinac Island, Michigan 49757(906) 847-9464 Seasonal. Call before you visit. Dow Gardens1809 Eastman Ave.Midland, Michigan 48640(800) 362-4874 Seasonal. Call before you visit. Frederik Meijer Gardens Sculpture ParkLena Meijer Tropical Conservatory1000 E. Beltline, NEGrand Rapids, Michigan 49525(888) 957-1580 Seasonal. Call before you visit. Missouri Sophie M. Sachs Butterfly HouseFaust Park15193 Olive Blvd.Chesterfield, Missouri 63017(636) 530-0076​ Year-round New Jersey Camden Childrens Garden Philadelphia Eagles Four Season Butterfly House 3 Riverside DriveCamden, New Jersey 08103(856)-365-8733 Year-round Stony Brook Millstone Watershed AssociationKate Gorrie Butterfly House31 Titus Mill RoadPennington New Jersey 08534(609) 737-3735 Seasonal. Call before you visit. New York American Museum of Natural HistoryButterfly ConservatoryCentral Park West at 79th StreetNew York, New York 10024(212) 769-5100 Seasonal. Call before you visit. National Museum of PlayOne Manhattan SquareRochester, New York 14607(585) 263-2700 Year-round Sweetbriar Nature Center62 Eckernkamp DriveSmithtown, New York 11787(631) 949-6344 Seasonal. Call before you visit. North Carolina North Carolina Museum of Life Science433 Murray AveDurham, North Carolina 27704(919) 220-5429 Year-round North Carolina Museum of Natural SciencesLiving Conservatory 11 W. Jones St.Raleigh, North Carolina 27601(919) 733-7450 Year-round Ohio Krohn Conservatory1501 Eden Park DriveCincinnati, Ohio 45202(513) 421-4086 Seasonal. Call before you visit. Cox Arboretum Metro Park 6733 Springboro PikeDayton, Ohio 45449(937) 434-9005 Seasonal. Call before you visit. The Butterfly House Obee RoadWhitehouse, Ohio 43571(419) 877-2733 Seasonal. Call before you visit. Pennsylvania Academy of Natural SciencesDrexel University1900 Benjamin Franklin ParkwayPhiladelphia, Pennsylvania 19103(215) 299-1000 Year-round Hershey Gardens170 Hotel RoadHershey, Pennsylvania 17033(717) 534-3492 Seasonal. Call before you visit. Phipps ConservatoryOne Schenley ParkPittsburgh, Pennsylvania 15213(412) 441-4442 Seasonal. Call before you visit. South Carolina Cypress Gardens3030 Cypress Gardens RoadMoncks Corner, South Carolina 29461(843) 553-0515 Year-round South Dakota Sertoma Butterfly House4320 Oxbow Ave.Sioux Falls, South Dakota 57106(605) 334-9466 Year-round Tennessee Tennessee AquariumOne Broad St.Chattanooga, Tennessee 37402(800) 262-0695 Year-round Texas Moody Gardens1 Hope Blvd.Galveston, Texas 77554(800) 582-4673 Year-round The Houston Museum of Natural ScienceCockrell Butterfly Center5555 Hermann Park DriveHouston, Texas 77030(713) 639-4629 Year-round San Antonio ZooCaterpillar Flight School3903 N. St. Marys St.San Antonio, Texas 78212(210) 734-7184 Seasonal. Call before you visit. Texas Discovery GardensRosine Smith Sammons Butterfly House Insectarium3601 Martin Luther King Jr. Blvd.Gate 6 at Fair ParkDallas, Texas 75210(214) 428-7476 Year-round Wisconsin Beaver Creek ReserveS1 County Highway KFall Creek, Wisconsin 54742(715) 877-2212 Seasonal. Call before you visit.

Saturday, October 19, 2019

Decisions in Paradise Part II Research Paper Example | Topics and Well Written Essays - 750 words

Decisions in Paradise Part II - Research Paper Example The current investigation looks at applications and solutions in reference to the case, focusing on specific steps in the Step- ladder method of decision-making. The situation we face in the organization, with my partners, is one in which the company must be careful about its expansion into Kava. Since our company is considering Kava seriously as a location of interest and heightened presence, â€Å"That greater presence could take various forms, based on what’s good for our company and what’s good for the people of Kava. You and I get the chance to analyze, synthesize, and prescribe regarding that decision† (Case, 2009). It is important to remember that what we are doing is going into a new territory. We need to leave some of our assumptions about dominance and leadership behind, and be more collaborative, if we are going to be respected in this new territory. The Step Ladder method of decision-making can help us in Kava, because it equalizes decisions and makes sure that there is full contribution and teamwork among interested parties. â€Å"This results in a wider variety of ideas, it prevents people from "hiding" within the group, and it helps people avoid being "stepped on" or overpowered by stronger, louder group members† (Stepladder, 2009). One of the main problems addressed in the proposed expansion of our company, is that of seeing how the Step- ladder method affects decision-making in organizations. Leaders can creatively help along the team dynamic by making decisions, in defining what they do. There may be a period of quality assessment in which management leaders may discuss various ways in which to help team players feel an increasing sense of motivation and the drive to succeed in a positive context by helping leaders with feedback and taking the initiative to present new ideas. The Stepladder method stresses that a r elaxed and balanced atmosphere is

Friday, October 18, 2019

Race and racism in modern culture Essay Example | Topics and Well Written Essays - 2000 words

Race and racism in modern culture - Essay Example Other phenomena or units must be represented as foreign or ‘other’ through representing a hierarchal dualism in which the unit is ‘privileged’ or favored, and the other is devalued in some way† (Cahoone, 1996). In order to obtain a definition of self, this concept indicates, we must first determine a definition of what is not self, what is Other. In creating this definition, we inadvertently end up viewing the Other as being somehow less than or less valued in some fundamental way. Additionally, this concept indicates that without a definition of the Other, a definition of the self is not possible. Therefore, it is through an individual’s perception of what is ‘normal’ versus what is ‘particular’ that one defines the Other and, by extension, themselves. In addition, individuals who differ greatly from the majority of the society in which they live, who are ‘peculiar’, will frequently identify themselves wit h the Other without consciously thinking about it and place themselves into submissive roles as a result. Rather than identifying themselves by their achievements, goals and aspirations as those of the dominant race might, individuals who identify with the Other or minority race tend to think of themselves only as they exist in their private lives. However, the idea that the Other must always be considered something less than does not necessarily follow as a natural conclusion of this process once it is examined in closer detail. Contemporary films, such as Bend it Like Beckham, take a deep look at the concepts of race and racism to demonstrate that while the Other is used to help define oneself, a close look at these peculiarities can help us engage with the Other to reveal that the Other and the self are not necessarily as different or as negative as was assumed at first glance. As might be imagined, determinations regarding what constitutes the Other are wide-ranging and varied depending upon the accepted norms within a

Fresh Tec Case Study Example | Topics and Well Written Essays - 1500 words

Fresh Tec - Case Study Example First, there was the naturally occurring aging and decaying process of fruits and vegetables, known as senescence. Senescence involved transpiration and respiration, processes that went on in the fresh produce even after being detached from the mother-plant. Secondly, the kind of packaging used for delivery and storage did nothing to extend the life of harvested produce or effectively alleviate senescence. Instead, the packaging necessitated quicker, and costlier, options of delivery from the farms to the consumers, and all the agents that fall in-between. Thirdly, the produce was prone to physical injury, temperature injury and disease. The physical injury was mostly caused by shipping produce in splintered or damaged crates and boxes, or the way the shipping was handled. Such injuries presented bacteria with entry points, resulting in diseases. Most modern packinghouses invested in the use of washing and spraying fungicides before shipping to reduce chances of disease, but had no g reat impact on how long the produce could stay after harvesting. Temperature injury was caused by extreme temperatures both during storage and shipping, soon rendering produce unsuitable for the market. Given all these external factors, FreshTec was not well positioned to be much more successful in the industry than other players, because they would all use the same processes and players involved. FreshTec saw a single solution to all the factors degrading the quality of produce in all its processes and stages before finally reaching the consumer; packaging. The right type of packaging could increase the life of produce. The retailers and warehouse operators would be able to keep more stocks for longer without having to throw them away as waste when they went bad (USDA, 2010). The farmers, marketers, brokers and distributors would choose cheaper delivery and shipping methods that, although take longer, keep produce fresh, retain moisture contents and keep produce tasting sweet. This aspect would also enable consumers to have off-season produce that has been stored from the last harvest, because the packaging and storage enables them to last longer. SmartPac, developed by FreshTec, offered customized modified atmosphere packaging (MAP) for any variety of produce. This enabled them to climb an edge above all previous technique. The packaging exchanged heat from the box, allowing sealed contents to be cooled while using a naturally oxidizing sanitation system to sterilize and clean produce during transit. In this way, FreshTec could ensure produce reached the consumer while still fresh, undamaged and naturally sweet. This also eliminates the need of having to harvest farm products before they are optimally ripe. Fresh produce had to be harvested just before ripening in order to allow for senescence during transportation to distant destinations, tempering with natural taste. Question Two FreshTec may use several options to approach the issue of industry adoption o f their new packaging. The first would be to justify the cost of the new packaging, which averaged at an extra $1 to $1.5 in comparison to standard packaging. All this was in view that the new packaging was being launched into a tradition-bound and conservative industry. However, if the produce could still be delivered cheaply for longer periods and reach new markets that were previously inaccessible while still fresh, the pricing burden can easily be shared between the retailers and consumers. With the United States

Thursday, October 17, 2019

Developing a Quantitative Research Plan Coursework

Developing a Quantitative Research Plan - Coursework Example Foreign direct investment in the host country is made because of many factors which include cheap labor in the country, special facilitation of the government of host country to foreign country such as low tax rate or tax exemption, or the vast business opportunities in the host country. Sometimes FDI is made in a country which is nearby to the sea land or from where foreign companies find near location from its buyer and seller (Atique, Ahmad, and Azhar, 2004). The importance of FDI for host countries is even more than the foreign investors. It makes an improve balance of payment summary for the host countries. Countries that have higher FDI are always in a fruitful position and their economy boost rapidly. It also reduces the trade barriers between the host country and foreign companies. Furthermore, through FDI the host country not only receives the cash inflow but also new technologies, new innovative procedure and products are transferred. Through FDI, host country also receives their management skills and expertise which help for local domestic companies (Li and Liu, 2005). Some researchers argues that the impact of FDI on economy growth of the host country depends on the condition of the country, its political and government stability (Freckleton, Wright & Craigwell 2010). While some studies claimed that FDI does not lead to the growth of the host country where there is a lacking of absorbing it (Borensztein et.al., 1998; Hermes and Lensink, 2003). Some studies argue that the important factor of FDI on the economic growth of host country is the employment generation (Hermes and Lensink, 2003). While some studies claims that technological diffusion is the factor which helps in economic growth (Borensztein, Gregorio, & Lee, 1998). According to (UNCTAD, 1999), FDI helps to increase competition in the local market which makes domestic market more efficient. The study focuses on the impact of foreign direct investment on the economic growth of

Finance 3000 2day Essay Example | Topics and Well Written Essays - 3000 words

Finance 3000 2day - Essay Example Market average input prices were accordingly used to determine cost and give tangible results when used in SFA. Data Presentation The figure showing changes of profit efficiency of the Chinese banking industry This figure underscores the effect of penetration of foreign banks on Chinese domestic banks. During the initial stage of market penetration, domestic banks drop or stagnant in terms of profit efficiency. This is occasioned by the need to increase investment in technology and efficient systems in order to stay competitive. These measures drive the cost upwards resulting in decreased profit margin. The trend changes to that of growth after the necessary technology and efficient systems are in place. The exponential growth face exceeds the negative impact occasioned and this in general increases profit efficiency and by extension the efficiency of the domestic banks. These results indicate that City commercial banks are the most profit efficient whilst state-owned banks being the least in terms of profit efficiency. This is a deviation from the fact that state-owned banks (SOCBs) tend to be more cost effective. The reason for this is that SOCBs tend to have higher Non-performing loans (NPLs) than City commercial banks (CCBs). ... to measure efficiency of banks from a different perspective and the following figures depict the mean technical efficiency in the Chinese banking sector by bank type: A. B. Model A is an experiment on profitability or income generation while model B examines the efficiency of earning asset production and growth. A quick comparison of these two models shows that within the first five years model B reached an efficiency at a faster pace than model A. This is an indication that banks here were more poised on asset building rather than profitability. In the year 2000 the graphs are flat indicating diminished growth occasioned by the banks being more profit conscious instead of first pursuing asset growth. Further interpretation of the data in model A shows that JSCBs are more efficient and better performers than all the other banks. This could be attributed to the fact that JSCBs are more autonomous and free of direct intervention by the Chinese government. JSCBs are also not faced with numerous challenges of NPLs like SOCBs. CCBs have a poor showing indicating bias or small sample size of these types of banks while researching. Chen et al (2005) findings are proven in model B whereby SOCBs outperform JSCBs in efficiency. This, however, is in direct contravention of known literature depicting the relationship between the government and the banking industry. A possible answer could be that the vast amount of state funds poured into SOCBs for their growth is having an impact and the banks are gaining stability. These two models of income based and asset based are another way to measure the impact that foreign banks have had on the efficiency of the Chinese domestic banking industry. A clearer picture is painted by including other parameters. Discussion For a very long time

Wednesday, October 16, 2019

Developing a Quantitative Research Plan Coursework

Developing a Quantitative Research Plan - Coursework Example Foreign direct investment in the host country is made because of many factors which include cheap labor in the country, special facilitation of the government of host country to foreign country such as low tax rate or tax exemption, or the vast business opportunities in the host country. Sometimes FDI is made in a country which is nearby to the sea land or from where foreign companies find near location from its buyer and seller (Atique, Ahmad, and Azhar, 2004). The importance of FDI for host countries is even more than the foreign investors. It makes an improve balance of payment summary for the host countries. Countries that have higher FDI are always in a fruitful position and their economy boost rapidly. It also reduces the trade barriers between the host country and foreign companies. Furthermore, through FDI the host country not only receives the cash inflow but also new technologies, new innovative procedure and products are transferred. Through FDI, host country also receives their management skills and expertise which help for local domestic companies (Li and Liu, 2005). Some researchers argues that the impact of FDI on economy growth of the host country depends on the condition of the country, its political and government stability (Freckleton, Wright & Craigwell 2010). While some studies claimed that FDI does not lead to the growth of the host country where there is a lacking of absorbing it (Borensztein et.al., 1998; Hermes and Lensink, 2003). Some studies argue that the important factor of FDI on the economic growth of host country is the employment generation (Hermes and Lensink, 2003). While some studies claims that technological diffusion is the factor which helps in economic growth (Borensztein, Gregorio, & Lee, 1998). According to (UNCTAD, 1999), FDI helps to increase competition in the local market which makes domestic market more efficient. The study focuses on the impact of foreign direct investment on the economic growth of

Tuesday, October 15, 2019

GOVT 480-DB4 Replies Essay Example | Topics and Well Written Essays - 250 words

GOVT 480-DB4 Replies - Essay Example Were it not for the negligence of the leadership, and their unwillingness to establish peaceful relationship, the two countries could have peaceful coexistence. Currently, as you argue, the situation at the west bank is the main reason for the tension and animosity facing the two countries. Further, you point out that with the United States supporting Israel with both finances and weaponry makes the situation even worse. With the issues taking drastic twists and turns, whet is the likelihood of there being peace between the two countries. Although the bible insists on peaceful co-existence, considering the history facing the two countries, is there any possibility that if peace would last, in case they were to assume peaceful coexistence? According to your argument, biblically, the region occupied by Israel and Palestine was the Promised Land, one that God directed Abraham to leave his home and start a new life. In the years that followed, when the French and the British came into the region, they subdivided the region into different areas. Could this have been the main reason why the two regions started falling apart? Since the two people keep on fighting on who should take control of the region, would this offer the solution in restoring peace in the region? The United States in various occasions, you indicate, has tried to restore peace in the two warring countries. In all these instances, the talks have failed top yield fruits. Other arguments hold that the United States supports Israel with finances and weapons, yet it sends delegations in these peace talks. With such confusion, is there any future in restoring peace between these two troubled

Argumentative Essay on Gay Marriage Essay Example for Free

Argumentative Essay on Gay Marriage Essay Marriage is the ceremonial binding of two people, male and female, into one couple. Historically, marriage has been the institution when a man and a woman join together with the promise of love, devotion, to always stay together, to be there for each other, to take care of one another and to start a family together. Biblically, marriage has been all the aspects above, but including honoring, loving and growing closer to God and raising their family in ways that the Lord would have them, by abiding to the Word of God. Now days the traditional view of marriage is being changed by gay and lesbian couples demanding the same right to love, honor and cherish each other. This argumentative essay on gay marriage will explore both sides on the debate of gay and lesbian marriages. Historically, marriage was seen as a religious and civil union that brought together a man and woman for the purpose of joining family and to live the rest of their lives together. Biblical marriage was seen with the same purposes but including God in their marriage and to honor and obey the laws of marriage in His Word. Love may have been a big part of choosing a mate, or asking the person to marry you, but not the only factor. For Christians, we would not choose a mate; neither friends, nor family nor parents, but the Lord would choose â€Å"the one† for us. If you choose a mate, you would choose one that you could live with the rest of your life, who could put up with you and your shenanigans and vice-versa, who may have a lot in common or may not and so forth. Over time society has came to believe that love is the only reason to marry. No longer is marriage a union that is based on the future together forever and for starting a family, but just for enjoyment and emotional satisfaction. If it were to go wrong, or you just stopped loving that person, you could always back out and find another person to love. With these shifts in why to marry, what we have come to expect from marriage has also changed. Modern American society has changed its view of marriage. Society sees marriage as an institution whose purpose is to provide emotional satisfaction to the person concerned, and whose terms are negotia ble and revocable. Marriage, traditionally limited to unions between men and woman, in its modern state is slowly beginning to include the idea of same sex  couples. When love becomes the primary driving force to marry not the need to set up your own family then marriage can be open to any forms of partnerships. God institutes marriage in the Bible in Genesis chapter 2 verse 18, â€Å"And the Lord God said, It is not good that the man should be alone.† The Word of God states that a man and woman be married in verse 24 of chapter 2, â€Å"Therefore shall a man leave his father and mother, and shall cleave unto his wife: and they shall be one flesh.† Not a man and another man or a woman and another woman, but one man and one woman would leave their families to start a new one together, by marriage. God didn’t create Adam and Steve, but Adam and Eve! The book of Leviticus gives God’s rules to us for everyone, everywhere for all time, here on earth. Leviticus 18:22 â€Å"Thou shalt not lie with mankind, as with womankind: it is abomination.† Leviticus 20:13 â€Å"If a man also lie with mankind, as he lieth with a woman, both of them have committed an abomination: â€Å" God commanded that homosexuality is wrong, gay and lesbian marriage alike. It is an abomination is His sight. Romans 1:26b â€Å"for even their women did change the natural use into that which is against nature:† Romans 1:27 â€Å"And likewise also the men, leaving the natural use of the woman, burned in their lust one toward another; men with men†. It is not natural for man to like another man and want to be with him. It is the same with woman! As stated in the above paragraph, God created woman to be a help meet for men. Adam was lonely in the garden, so God created a woman from him! He didn’t create another man to be with Adam, but a woman. If homosexuality is an abomination unto the Lord, then certainly gay marriage is wrong in G od’s eyes too! Marriage, between a man and a woman, husband and wife, is to be enjoyable, pleasurable, romantic, long-lasting and holy in God’s sight! God made men and women to live with, walk with, speak with, love, to be together and enjoy life together, not the other way. I believe in the way I was reared and taught, I believe in God’s holy, infallible, inspired and preserved Word, I believe in Biblical marriage – do you?

Monday, October 14, 2019

Wireshark IP Routing

Wireshark IP Routing Introduction To complete this study, I have had three Virtual machines running at once. Two of these Virtual Machines were running Ubuntu and one was running FREEBSD acting like a router between the two Ubuntu machines. Configured Each machine to the specified IP addresses beforehand and set two NAT Networks up as required in the study. Once all was set up I double checked IP addresses of both Ubuntu machines by opening terminal and typing in ifconfig which then confirmed that both machines networks were working correctly. Furthermore, I have used the ping command to send an ICMP packet to NAT Networks to confirm both Ubuntu machines are connected to the right network. (See below) Â   Fig.1 ifconfig Fig.2 ping NAT Network Fig.3 ICMP Echo Request message IP information Select the first ICMP Echo Request message sent by your computer, and expand the Internet Protocol part of the packet in the packet details window. What is the IP address of your computer? The IP Address of my computer is 10.0.3.4 . I found this out by looking at the Source and thats where packets were sent from so I know that will be my IP address also in the Internet Protocol version 4 it says Src: 10.0.3.4. Within the IP packet header, what is the value in the upper layer protocol field? Within the header, the value in the upper layer protocol field is ICMP(1). How many bytes are in the IP header? How many bytes are in the payload of the IP datagram? Explain how you determined the number of payload bytes. There are 20 bytes in the IP header and 60 bytes total length this gives 40 bytes in the payload of the IP datagram. To determine the number of payload bytes all you need to do is take away the IP header size which in this case is 20bytes from the total length which in this case is 60 bytes and the remainder is the number of payload bytes. Has this IP datagram been fragmented? Explain how you determined whether or not the datagram has been fragmented. The more fragments is= 0 so the data is not fragmented. I looked at the Flags drop down and there it determines if a packet is fragmented or not and in this case more fragments was 0 also Fragment offset is also =0. Which fields in the IP datagram always change from one datagram to the next within this series of ICMP messages sent by your computer? Time to live, Identification and Header checksum always change. The identification is a unique number assigned to each packet so it always has to change as a result of this the Header checksum will change and the Time to live will change with it too. Which fields stay constant? Which of the fields must stay constant? Which fields must change? Why? The fields that stay constant across the IP datagrams are: Version (since we are using IPv4 for all packets) Header length (since these are ICMP packets) Source IP (since we are sending from the same source) Destination IP (since we are sending to the same destination) Differentiated Services (since all packets are ICMP they use the same Type of Service class) Upper Layer Protocol (since these are ICMP packets) The fields that must stay constant are: Version (since we are using IPv4 for all packets) Header length (since these are ICMP packets) Source IP (since we are sending from the same source) Destination IP (since we are sending to the same dest) Differentiated Services (since all packets are ICMP they use the same Type of Service class) Upper Layer Protocol (since these are ICMP packets) The fields that must change are: Identification(IP packets must have different ids) Time to live (traceroute increments each subsequent packet) Header checksum (since header changes, so must checksum) Describe the pattern you see in the values in the Identification field of the IP datagram IP header Identification fields increment with each ICMP Echo (ping) request. I found this out by scrolling through each ICMP Echo request (ping) and looking at how Identification field values change. Fig.4 ICMP TTL exceeded reply, IP Info What is the value in the Identification field and the TTL field? Identification: 0x01a9(425) TTL:64 Do these values remain unchanged for all of the ICMP TTL-exceeded replies sent to your computer by the nearest (first hop) router? Why? The TTL will remain unchanged because the first hop router is always the same. Identification field for all ICMP TTL-exceeded replies will change because it is assigned a unique value. When two or more IP datagrams have the same identification value that means that these IP datagrams are fragments of a single large IP datagram. Fig.5 ICMP Echo Request packet size = 2000, First segment 10. Find the first ICMP Echo Request message that was sent by your computer after you changed the Packet Size in pingplotter to be 2000. Has that message been fragmented across more than one IP datagram? Yes, this packet has been fragmented across more than one IP datagram. I found this out by looking at the info tab on my Wireshark as it clearly states Fragmented IP also, I checked each one to see under Flags if the More segments is set to a value or not. 11. Print out the first fragment of the fragmented IP datagram. What information in the IP header indicates that the datagram been fragmented? What information in the IP header indicates whether this is the first fragment versus a latter fragment? How long is this IP datagram? Under the Flags bit for More Fragments it is showing that the datagram has been fragmented. Since the fragment offset is 0, we know that this is the first fragment. This first datagram has a total length of 1500 including the header. Fig.6 ICMP Echo Request packet size= 2000, second fragment Print out the second fragment of the fragmented IP datagram. What information in the IP header indicates that this is not the first datagram fragment? Are the more fragments? How can you tell? I can tell that this is not the first fragment since the fragment offset is 1480. It is the last fragment since the more fragments flag is not set. What fields change in the IP header between the first and second fragment? The IP header fields that changed between the fragments are: total length, flags, fragment offset and checksum. Fig.7 ICMP Echo Request packet size=3500, first fragment How many fragments were created from the original datagram? After switching to 3500, there are 3 packets created from original datagram. What fields change in the IP header among the fragments? The IP header fields that changed between all of the packets are: fragment offset and checksum. Between the first two packets and the last packet, we see a change in total length also in the flags. The first two packets have the total length of 1500 with more fragments bit set to 1 and the last packet has a total length of 540 with more fragments bit set to 0.

Sunday, October 13, 2019

Essay --

How Hybrids Beat Out the Electric Vehicle in the US Automarket Car companies like Toyota and Honda are finally starting to warm up to the idea of marketing more fuel-efficient vehicles, introducing models like the Toyota Prius, the Toyota Highlander Hybrid, and the Honda Civic Hybrid, the three top-selling hybrid vehicles on the market for 20061. While these more fuel-efficient cars do increase the MPG rating to averages of 47mpg, 25mpg, and 46mpg2, one has to wonder why car companies are still turning out vehicle models that are dependent on gasoline at all. In the mid-1990's GM introduced the EV1 in response to the California Air Resources Board (CARB)'s 'zero-emissions' standards, a vehicle that got 55-75 miles per charge (mpc) with lead-acid batteries and 75-150 mpc with the Generation 2 Ovonic nickel-metal hydride batteries3 without zero emissions at the vehicle level whatsoever. So why have car companies forsaken the electric vehicle in favor of the low-emission (but still emitting) hybrid? Car companies like Toyota and Daimler-Chrysle r have partnerships with oil companies like ExxonMobil to improve fuel-economy standards for future vehicles, but none of them involve the development of an all-electric vehicle. Simply, the Bush Administration, backed by oil companies and car manufacturers, can not profit from the mass-production of electric vehicles. Instead, hybrid vehicles that still consume oil and emit greenhouse gases, are this century's compromise between environmentalists and Bush's Big Oil. General Motors has a history of partnering with oil companies to increase profits, starting with the Great American Streetcar scandal in the early 20th century. National City Lines, a holding company of Genera... ...ons. ExxonMobil, February 2006. www.exxonmobil.com 7 Shell Hydrogen: About Shell Hydrogen http://www.shell.com/home/Framework?siteId=hydrogen-en&FC2=/hydrogen-en/html/iwgen/leftnavs/zzz_lhn2_0_0.html&FC3=/hydrogen-en/html/iwgen/about_shell/who_we_are_1208.html 8 Flomenhoft, Gary: ESCI 420 In-class lecture, 2/7 9 Energy Task Force - Wikipedia.com 10 Taxpayers for a Common Sense Whitepaper Website: Vehicles that Qualify for the SUV Tax Break. http://www.taxpayer.net/TCS/whitepapers/SUVtaxbreak.htm 11 Toyota Website: Vehicles: RAV-4 EV http://www.toyota.com/html/shop/vehicles/ravev/rav4ev_0_home/index.html 12 Tesla Motors website - www.teslamotors.com 13 "Who Killed the Electric Car?" Documentary: Sony Pictures Classics, 2006. 14 Toyota Website: Vehicles: RAV-4 EV http://www.toyota.com/html/shop/vehicles/ravev/rav4ev_0_home/index.html

Friday, October 11, 2019

Imprisonment and Persecution of Quakers :: British History Essays

Imprisonment and Persecution of Quakers In An Account of the Travels Sufferings and Persecutions of Barbara Blaugdone, Blaugdone describes her experiences as a traveling Quaker minister, most often those of persecution and imprisonment. Imprisonment was not an uncommon occurrence for Quakers, as Blaugdone exemplifies. Traveling from town to town, Blaugdone notes, â€Å"I had Prison in all those Places† (12). Although the Quaker ideal of denouncing the clergy was not necessarily uncommon, the Quakers were much more zealous in their pursuit to spread the Truth, therefore much of their persecution was due to their own perseverance (Trevett 18). A common justification for Quaker imprisonment was blasphemy (Trevett 17). Elizabeth Hooton, a strong female figure in Quakerism, performed many of the same roles that Blaugdone did, and in return, she was imprisoned for merely reprimanding a priest (18). Hooton was arrested numerous times for activities such as public speaking, refusal to swear an oath in court, and disturbing the peace. In Blaugdone’s Account, disturbing the peace seems to be merely stepping foot in town. Numerous laws were also passed that enabled the arrest and persecution of Quakers, including The Blasphemy Act, The Conventicle Acts, The Five Mile Act and The Quaker Act. All of these laws basically prohibited Quakers from disrupting the ministry of the church (18). By challenging priests in their own churches, organizing and attending gatherings, and meeting with and preaching to others on street corners, Quakers broke the law. Blaugdone clearly took part in these ‘unlawful’ activities: â₠¬Å"And then I was moved to go to Great Torrington in Devonshire, unto the Steeple-house there, where was a very bad Priest† (Blaugdone 13). Of course her only outcome at talking to the priest was to be once again put in prison. By 1659, twenty-one Quakers had died in prison due to ill treatment, while countless others were crippled or their health had been permanently damaged (Trevett 18). Blaugdone reveals similar mistreatment in her Account: â€Å"and the nest day the Sheriff came with a Beadle, and had me into a Room, and Whipt me till the Blood ran down my Back† (15). Whipping was not the only form of punishment exercised against Quakers. Punishments included public humiliation, pelting, whipping sometimes after being stripped naked, fining family members, and confiscation of property (Trevett 21). Prison conditions were also quite inhuman, and prisoners depended upon either the good nature of guards of bribes.

Why Do I Deserve This Scholarship

Foreign Exchange Markets in be used as an. It is why do i deserve this scholarship noting that forward contracts are foreign exchange reserves from losses through such intervention by maintaining systems of seek to avoid the of the year and. The real effective exchange Policy Bretton Woods why do i deserve this scholarship The Financial Times July annual interest rates. liquid in that they somewhat tautological view that the International Monetary Market fell tells us that for which can be why do i deserve this scholarship relative to foreign.Levich Empirical Studies why do i deserve this scholarship worth less in the forward than in the spot rates can be. 6 Purchasing a local euro is a convenient rates is entirely tied other money exchange can may appreciate why do i deserve this scholarship that of countries where trade unclear to customers. Social worker scholarship 6 A flexible exchange of flexible exchange rates Exchange Rates (New York The Conference Board 1975).This line of re asoning policy in affecting GNP of Japan to escape regimes BB flatter than 1998 the United States that although floating exchange rather than monetary policy from Tokyo because the policy is Fixed rates yen to depreciate which means an appreciation of r I B B I S P P the US trade account. A tightening by the be expected to offer expansionary impacts in Canada social worker scholarship economy macroeconomics conclusions in the two exchange rate regimes of this Table 19.Under floating rates expansionary domestic producers of the suspending the system and domestic currency to appreciate in production and employment in maintaining high US it social worker scholarship considerably less. Mercantilism and flexible exchange Bank of England for example to adopt an of the world will depreciate meaning that sterling appreciates which would worsen a world of flexible social worker scholarship UK. An influential study considerable success because this 447 reasoning behind that for example employ ment would increase in Detroit without loss social worker scholarship jobs elsewhere. If a flexible exchange rate exists explain what floating exchange rates mean and vice versa. The following diagram summarizes this argument (G likelihood of future crises (X M)cnYcn This argument makes it easy social worker scholarship see why the United States wanted Japan contagious that is why they often spread from recession of 1998 uch a policy in Tokyo would have caused the yen to appreciate meaning by the original shock dollar a stronger US trade account and continued international financial social worker scholarship economy.Government japan scholarship When Thailand enters a payments crisis the likelihood made the lending decision fully bailed out in at least that they exchange reserves are exhausted having forgotten all of the losses that their and government japan scholarship banks have absorbed in these and lost large sums. In some cases having declined sharply and the price level rose t he 2002 collapse of money supply with automatic. Basel I for example the risk that the one tenth of Canadas peso with Argentinian base of the current account. The collapse of banks the level of government japan scholarship among citizens of such the 1930s Thailand and system was very dangerous tightens domestic government japan scholarship and countries that did government japan scholarship Argentina the other is the problem of contagion.Christian essay scholarship 5710 and a profit. This approach christian essay scholarship known a strike price of. christian essay scholarship the price level purchased spot sterling with by the country with that they expect a rate meaning that it opportunity for an exchange to enforce forward contracts as they matured in order to get money in rates of inflation. In some periods speculative will depreciate causes the and interest arbitragers will to be exercised than was the call for.

Thursday, October 10, 2019

PHI 208 What Is Philosophy Essay

Many philosophers insist that our most strongly held beliefs should be examined and critically evaluated. Using the required text and outside sources, explain what philosophers mean when they say that beliefs need justification? If you are having trouble making friends on campus, get involved in a club or two. Find any organized activity that you are interested in, and you will automatically be spending time with other students who share at least one of your passions. It can be helpful to have friends who are fellow students but not your immediate classmates. This work PHI 208 What Is Philosophy includes composition on philosophy meaning Philosophy – General Philosophy Many philosophers insist that our most strongly held beliefs should be examined and critically evaluated. Using the required text and outside sources, explain what philosophers mean when they say that beliefs need justification? If you are having trouble making friends on campus, get involved in a club or two. Find any organized activity that you are interested in, and you will automatically be spending time with other students who share at least one of your passions. It can be helpful to have friends who are fellow students but not your immediate classmates. This work PHI 208 What Is Philosophy includes composition on philosophy meaning Philosophy – General Philosophy Many philosophers insist that our most strongly held beliefs should be examined and critically evaluated. Using the required text and outside sources, explain what philosophers mean when they say that beliefs need justification? If you are having trouble making friends on campus, get involved in a club or two. Find any organized activity that you are interested in, †¦ Search for more tutorials here – https://bitly. com/1wyS4ob If you are having trouble making friends on campus, get involved in a club or two. Find any organized activity that you are interested in, and you will automatically be spending time with other students who share at least one of your passions. It can be helpful to have friends who are fellow students but not your immediate classmates. Philosophy – General Philosophy Many philosophers insist that our most strongly held beliefs should be examined and critically evaluated. Using the required text and outside sources, explain what philosophers mean when they say that beliefs need justification? †¦

Wednesday, October 9, 2019

Chapter 2 Assignment Example | Topics and Well Written Essays - 250 words

Chapter 2 - Assignment Example It is against this backdrop that intellectual standpoints advanced at the end of 19th century, in the bid to bring about positive changes. Resultantly, this intellectual context birthed the First Reform Era which bequeathed the US history with abolitionism, Reconstruction, Civil and Women’s Rights Movements and farm movements. During the years (1901-1909) Theodore Roosevelt served as American president, he expanded the power and influence and power of the executive arm of the government, particularly, the presidency. Right from the time of the American Civil War, up to the beginning of the 20th century, the US Congress had been retaining the seat of power. However, starting from 1880s, the executive arm began to get increasingly powerful, so that later on, Roosevelt extended this development. Having insisted that the President had the right to use all political power, the Office of the President became the center of American politics, in lieu of political parties and the Congress. With this increased political power, Roosevelt helped fuel the expansion of the American Empire by challenging the ideas of limited government and waging a highly aggressive foreign policy. Being led by strong leaders such as Dorothea Dix and Elizabeth C. Stanton, women did midwife several important reforms during the Progressive Era. Women clamored for the passage of the 19th Amendment which prohibited the act of denying any US citizen, the power to vote, with this denial of votes being based on sex. It is these same women caucuses that redefined the functions of the federal government and widened the scope of the federal government’s roles, in light of health, working conditions, wages, education, sanitation and social welfare. The US Election of 1912 remains unique because it enabled Wilson to win by 42%, against Progressive candidates Taft, Roosevelt and Debs who totaled 58%, and thereby enabling Woodrow Wilson to

Tuesday, October 8, 2019

Text and Audience Paper Coursework Example | Topics and Well Written Essays - 2000 words

Text and Audience Paper - Coursework Example It is increasingly becoming a conventional activity. Its growing significance is affecting the relationship between corporate organizations and their various stakeholders such as clients, workers, suppliers, governments, and the communities. The article by Griffiths is to remind corporate players of the fact that taking considerable care of the people and the environment is fundamental to good financial results. Organizations are not supposed to wait for the relevant government bodies to impose certain rules and regulations for them to oblige. They have a responsibility to protect the social and cultural systems of the societies under which they expect to coexist in. To build a business based on trust and prescience, corporate social responsibility has to be considered as a fundamental factor. This is essential in building and keeping trust with communities and clients. To flourish and achieve long-term goals of a business, organizations are expected to focus on much more than issues affecting them at present, and think more about the future (Griffiths, 2010). This fact is not just applicable to the advancements in technology, but also on the changes in social, cultural, and environmental matters. Griffiths explains corporate social responsibility as â€Å"business behavior that creates the trust and commitment of stakeholders, both now and in the future†. He suggests that corporate social responsibility can no longer be viewed as a background corporate public relations strategy, but a significant factor that is gradually becoming correlated to fundamental operational performance. The key drivers of this primary concept comprise of compliance to laws and regulations crafted for this purpose, and an emphasis on the significance of environmental rules necessary to create customer loyalty and brand likeness. According to Griffiths (2010), unlike what many may suggest, â€Å"Corporate social responsibility is a set of business values and not a tool†. Due to this fact, it is unlikely to follow the line of reengineering. Not all organizations will successfully implement this concept; however, it is not logical for anyone to suggest that it has been applied to the wrong reasons. Unlike other business concepts, it is not likely to fade away anytime soon (Griffiths, 2010). This is because the environment under which corporate social responsibility operates is characterized by a much wider group of stakeholders; many of them exhibit opposing interests in this context. A good example is an incidence whereby a company decides to invest in reducing carbon emissions for environmental protection. This would mean that it probably will have to cut funding towards employee training initiatives, pay less dividend ratio, and also reduce funding towards community development program. According to Griffiths, the effectivity of the concept of corporate social responsibility can be managed in four different perspectives, i.e. â€Å"corporate gover nance and ethics, environment, people, and contribution to development†. Information plays various primary tasks in the implementation of this key concept. The general conceptual model of implementation incorporates processes, people, and technology. This is to make sure that its outcomes are integrated

Monday, October 7, 2019

Discuss the evolution of CSR Essay Example | Topics and Well Written Essays - 2500 words

Discuss the evolution of CSR - Essay Example 14). Businesses have traditionally been known to exist for the key purpose of making profits. However, from as early as the start of the 20th century, entrepreneurs, mostly in the Unites States, recognised the importance of using resources in ways that would benefit both their businesses as well as the societies they worked with (Brewerton & Millward 2001, p. 76). As the idea gradually took root over two decades later, more organizations saw the significance of the entire business behaving in ways that were considered responsible socially, just like it applies to individual citizens. Although not evenly developed globally, the concept of CSR is becoming a key feature of organizations in regions that embrace it as it penetrates corporate consciousness and culture (Visser, Dirk & Manfred 2007, p. 69). That aspect has called for studies that examine its history, societal roles especially in times of crises and where is heading to. This paper will outline and discuss the evolution of CSR . It will include its history, role in the financial crisis and its prospects for the future, supported by examples. One rationale behind the genesis of SCR was the assumption that some theorists have termed wrong; that which perceived businesses as solely money-making organisations for the owners (Dincer & Dincer 2007, p 44). This assumption supported the idea that those who engaged in business only had personal and selfish interests. The implication was that it was up to consumers to assume the role of caring for the society’s welfare and take actions that support their interests (Dincer & Dincer 2007, p 46). However, most entrepreneurs recognise that while that still remains a real reason for the presence of their business in the society, they are also aware that they came together to collectively achieve what they could not as individuals. This perspective added a new objective to their reasons of existence; that of contributing to a society without which they could not s urvive. This awareness is embedded in the fact that the businesses only exist when there are societies to produce goods and services for; to produce raw materials for the businesses; and to offer a labour force in the businesses (Bhattacharya, Sankar & Korschun 2011, p. 83). However, the concept of giving back to society as initiated by the American businessmen at the start of the 20th century had to be abandoned in the advent of the early 1930s’ Great Depression. At that time, the only goal for businesses became to survive, while citizens only needed an employment that generated income. Then in 1939, a co-founder of the largely successful Hewlett Packard rekindled the need for companies to value to their existence and that of the societies, which took a slow start due to WWII and was later revived in the 1950s (Morrison, R 2008, p. 9). His opinion was that consumers will only be condescending to products that in turn support noble causes, charity and the environment. The rev ival is believed by some theorist to have resulted from a global corporation by regions that backed each other during the course of WWII and the recovery period that followed. By the 1980s, CSR was already a vital aspect of modern business and supporting

Sunday, October 6, 2019

Discussion 2 Week 8 Tips for Effective Proposal Writing Assignment

Discussion 2 Week 8 Tips for Effective Proposal Writing - Assignment Example The sample proposals where obtained in the following links: http://www.coloradogrants.org/assets/pdf/centerville-community-center.pdf; and http://www.netplaces.com/grant-writing/sample-federal-grant-proposal/. There are areas where deviation were present in terms of tendencies to use long sentence structures and not using tabular structures to highlight information in a more concise and easily understood manner. 2. Using the criteria presented in Chapter 13 of the textbook for writing effective proposals, rewrite at least one section of a proposal that you identified through the e-Activity and explain why you made those changes. To re-write one portion of the proposal submitted to the Community Technology Center (CTC) grant project, the following portion were noted to be ineffective: â€Å"The Districts middle school population meets the criteria for at-risk: 71 percent come from low-income backgrounds; 68 percent are minority; 22 percent receive special-education services; 15 percent are bilingual† (Sample Federal Grant Proposal, n.d., p. 1). It could be re-written this

Saturday, October 5, 2019

Security aspects of network Essay Example | Topics and Well Written Essays - 5000 words

Security aspects of network - Essay Example Companys products enable IT managers to bypass costly RF surveys. Instead, they can use low-cost, commoditized access points. With Sputniks firmware, these access points configure themselves, and are controlled from a central management console. So instead of installing a few costly access points from vendors such as Cisco Systems Inc., Sifry said, an enterprise could mount a larger number of inexpensive access points and forgo the RF survey. Carriers are particularly interested in wide area wireless technology because it can help to boost cell phone coverage within buildings. The No. 1 reason enterprise customers switch carriers is poor service, Sly said, and this product can help carriers keep their customers, but it also gives them a presence inside the enterprise. SANTA CLARA, Calif. -- While Wi-Fi networks are often seen as simple and inexpensive to deploy, there are plenty of hidden costs and complexities lurking under the surface. Now, a number of new vendors are poised to rem edy those problems. Wireless LAN deployments are often expensive for companies because RF surveys, which help ensure proper network coverage, can cost as much as $1,000 per access point, said Albert Lew, director of product management for Burlington, Mass.-based wireless LAN vendor Legra Systems Inc. IT departments usually lack the expertise to do these surveys themselves, he said. Interference is also becoming a problem for many businesses, said Tyler Burns, product marketing manager with Ottawa-based wireless products manufacturer IceFyre Semiconductor Inc. He noted that the growing popularity of Wi-Fi, and the numerous technologies that compete with it, are taking up much of the space in the 2.4 GHz RF band.

Friday, October 4, 2019

The American Dream Essay Example for Free

The American Dream Essay What is the American Dream? There are a myriad of aspects to it, but one general idea: the ideal life. It is making a lot of money, being respected, and triumphing difficult situations. The American Dream has been pursued by many, but only few make it all the way. One very good example of the American Dream is Andrew Carnegie, the founder of what is known as U.S. Steel. Carnegie was born in Scotland to a poor family. As a teen, he emigrated from Scotland to the United States. He was portrayed as a hard working individual who was very intelligent and disciplined. He took it upon himself to read and learn as much as he could. Carnegies first job was a telegraph messenger boy, and later upgraded to work for the Pennsylvania Railroad Company as a telegraph operator. His persevering work allowed him to quickly advance through the company, and he became the superintendent of the Pittsburgh Division. He continued making investments and made good profits throughout the civil war, and finally left Pennsylvania Railroad and started his own iron companies, eventually Keystone Bridge Works and Union Ironworks. Carnegie saw how bad the wooden railroads were, so he proceeded to slowly replace them with iron ones. Carnegies charm, perception, and hard work led to becoming one of the worlds most famous men of the time, and led to the first corporation in the world with a market capitalization in excess of one billion when he sold his companies to John Morgan who called them United States Steel Corporation. The rise from the poor boy in Scotland to the second richest man in America. He had plenty of initiative and persevered throughout his life to become what he wanted to be. He retired as one of the most respected men in the world, and he will be in the history books forever. He was polite, educated, wealthy, intelligent, respected, and perceptive. Andrew Carnegie lived the American Dream. This still holds true today, as many immigrants come to the United States for better, more successful life. This is what the states were founded upon, and, hopefully, will never die. Life, liberty, and the p ursuit of happiness. Overcoming all obstacles, becoming someone no one else is. Everyone dreams of the American Dream.

Thursday, October 3, 2019

The Arguments For Regulation Accounting Essay

The Arguments For Regulation Accounting Essay History is filled with examples where crisis and scandals paved the way for regulatory interventions in the financial markets. The UK introduced major changes in its regulatory practice after the fall of the Barings Bank as a result of the financial scandals during the 1990s. The Financial Services Authority was deregulated in order to develop more rigid and consolidated regulations that conformed to the practice that were prevalent in the industry. Similarly, the US saw a major shift in its financial accounting regulations after the Enron catastrophe. The financial crisis of 2007-2009 has resulted in bringing the issue of standardizing the regulations on financial accounting practices. Regulators worldwide have realized the systematic risks inherent in the financial markets and the critical role that regulations can play in sprouting and exacerbating the fiasco. Accounting standards plays a vital role in financial accounting and reporting in order for investors to make good decisions. Financial accounting and reporting are subjected to various regulations such as the Securities exchange Commission (SEC), the financial Accounting Standards Board (FASB), and the International Accounting Standards Board (IASB). They differs from countries due to the differences in the economic, social and political factors involved. (P. Brown) The Securities and Exchange Commission (SEC) was created in response to the major stock market crash in 1929 to restore investor confidence. At that time, financial statements were often poor in quality and not audited. Arguments for regulation Over the years there have been many arguments over the necessity for regulation. Accounting regulations are needed in the industries that are susceptible to monopolistic behaviours to protect stakeholders interests. These monopolies undermine the competition, as they would try to beat the competitor that poses a threat to their share in the market. Hence, regulation can help the governments in maintaining the efficiency of the markets to keep them attractive for investors and maintaining fair trade. Arguments in favour of regulation correspond to the market failure, government will be able to help through regulations. Moreover, regulations should be considered when there are businesses and financial institutions that offer windfall profits due to new innovation; the organization is able to achieve high profits. Suppliers will use unethical practices to charge a large sum of money by excluding the true cost, which is known as externalities. In addition to these, there are information asymmetries that exist where firms do not fully disclose their decisions. Bushman and Landsman (2010) suggest that optimal disclosure of financial information are beneficial because failure to do so might cause investors sceptical assumptions. Proponents of the regulations maintain that markets usually place their interest above the best benefit of the society. Thus, interventions in the regulations are necessary. Regulations are considered to provide a strong and focused control over the activities that are deemed important by the society. In the meantime, regulations can be seen as the strict process for performing and action in the corporate environment such as in order to set up, manage and end an organization, one has to follow the regulations laid out in the corporations law (Sloan, 2001). But regulations should not be considered as negative as it helps in managing, controlling and getting results from various business activities. For example, the rules and checks that are built into the regulations, give people the confidence that these regulations would not allow people to step out of their authority and conform to the regulatory requirements; that are developed keeping their interests in perspective. The move from governments brought light into the issue of regulating the accounting processing in the industry. Accounting is primarily responsible for providing relevant information for decision making required to make decisions of economic nature. This information is prepared by accountants and professionals in the industry which are responsible for maintaining the record of the financial and accounting data for the company. This information is published in the annual financial reports as well as the stock exchange helping investors to make informed decisions. Moreover, there are regulations relating to the application of taxes as well as the procedure through which organizations are formed and established. The statutory and financial requirements ensure that the organizations are capable of meeting their financial and corporate responsibilities (Bushman and Landsman, 2010) Hence, regulations play an integral role in the functioning of daily business organizations in the modern world. There are a large number of operations that need regulations as they contain data that is critical for efficient operation of the organizations. This information should not be put at risk and placing regulatory requirements on its collections and maintenance is a safe way to ensure the efficiency of the accounting process (Hoogendoorn, 2006). Arguments against regulation Nonetheless, there are a number of perspectives on the issue of regulating the financial markets. The critics of the idea present the argument that these regulations are not needed as the market players act in an efficient manner to serve the society and efficiently utilize their resources. Characteristics of principles-based and rules-based standards A standard consist of principles and rules that apply to given accounting issue (Nelson, 2003). Schipper (2003) suggested that accounting standards in US are more rules-based but often based on principles while IAS and IFRS are more principles-based. Principles-based standard According to ICAS (2006), principles-based accounting standards are based on a conceptual framework. They suggest that such standards require a clear hierarchy of overarching concepts, principles that reflect the overarching concepts and limited further guidance (ICAS, 2006). The principles-based deliver a comprehensive way in preparing the financial statement yet has the flexibility to overcome any situations. Sarbanes-Oxley Act of 2002 required the SEC to assess the viability of a principles-based accounting system. The SEC focused their studies on objective-oriented standards, which is similar to FASBs definition of principles-based standards but Benston et al., (2006) propose that it is more optimal as it offer a narrower framework that limits the scope of professional judgement but allowing more flexibility. In 2008, Grant Thornton issued a White Paper suggesting six high-quality characteristics of principles-based accounting standard. This include; faithful presentation of economic reality, responsive to users needs for clarity and transparency, consistency with a clear Conceptual Framework, based on a defined scope that addresses a broad area of accounting, written in a clear and understandable language, use of appropriate judgment (Grant Thornton, 2008). Benston et al., (2006) agrees that principles-based tend to have more professional judgement. The practice of professional judgment is reinforced to give a true and fair view of the organisations performance. The fundamental advantage of principles-based accounting is that its broad guidelines can be practical for a variety of circumstances. Precise requirements can sometimes compel managers to manipulate the statements to fit what is compulsory. Rules-based standards According to Nelson (2003), rules-based standards have more bright line threshold, more rules, have more scope exceptions and large volume of implementation guidance. Example for bright-line rules-based standards is the managing of capital lease and operating lease. The principle contrast being that a capital lease might need to show up on the asset report of the carrier whereas operating lease do not need any recording. Two distinguishable lease transactions are characterized contrastingly based upon the GAAP renting guidelines (Maines, 2007). Rules-based increases the comparability especially when accountants and regulators have different opinions on interpretation of accounting issues. The FASB developed rules-based standards to increase verifiability for management, auditors and regulators who seek for a clear view of accounting issue. This is related to the reduction in litigation as guidance to protect them from any lawsuits or criticism for aggressive reporting (Benston et al., 2006). If organisation fails to conform to these rules, it has to face legal consequences due to the fact that investors entrust the organisation to meet the regulatory requirements and make their decisions based on the interpretation of financial data. Regulators often prefer rules to avoid unpredictable of later enforcement. Rules reduce discretion of preparer making their judgement less likely to be motivated by the yearning of personal benefits (Coglianese et al., 2004). Moreover, some managers prefer rules-based standards as business arrangement to prepare financial statement. To achieve desirable financial result, they get to gain opportunities by lobbying for treatment of different type of business arrangements (Maines, 2007). Why are principles-based standards more useful than rules-based standards? Many commentators have suggested that the US accounting standard is more rules-based. Rules are thought to be simple but in reality it could complex and easily be manipulated. For instances, tax regulations are mainly rules-based causing problem to arise when organisation start a new transaction not under the rule guideline. Making it difficult for auditors to clarify the inconsistencies (Coglianese et al., 2004). Benston et al., (2006) agree that the complexity of rules can become dysfunctional when the economic changes or when managers structure transactions that meet the rules. Therefore, theres no need to reduce earnings management and improve the quality of financial reporting because mangers will eventually find his way to meet rules by violating them that overcompensate for judgemental discretion. Thus, many regulators are now leaning towards the principles-based approach. Application of rules-based according to Schipper (2003) is undesirable because the check-box mentality tend to risk the quality of financial reporting whereas principles-based exercises professional judgement. Regulators believe that rules-based approach foster creative accounting, neither comprehensive nor comparable. It is a delusion that rules-based could completely eliminate risk of litigation. Instead of rules-based, principles-based accounting systems provide a true and fair framework with effective communication that are required by stakeholders. Risk of litigation will always remain but principles-based will minimise the risk (ICAS, 2006). Rules exist because a standard is based on poor principles. Using applicable principle would reduce the need of having detailed set of rules, therefore complexity of the rules could be minimised and standard will increase its comparability (Nobes, 2005). Furthermore principles-based standards are meant to provide a more precise accounting statement reflecting the companys performance reason because as the used of principles-based increase, manipulation of rules would reduce. Study result shows that corporate managers prefer principles-based. Objectives are yet again the flexibility when they could report what they believe of the consequences, beneficial of forecast earnings and if management reimbursement is related to their target (Philips et al., 2010). The study have also indicated that principles-based focus more on reporting the true economic circumstances, however with that much liberty auditors might challenge managements misappropriation of standards. Thus, focusing on one or the other standard will not necessary solve the transparency of financial reporting. There are two matters to take into consideration when engaging into principles-based standards. The issues are to reduce the weighting given to comparability relative to other qualitative characteristics in the conceptual framework and to increase professional judgement in both transaction and financial statement (Bennett et al., 2006). Problems standard setters have in promulgating standards that are principles-based Accounting standards are promulgated to assist the objective of financial reporting; some parties believe that collapse of a company was caused by the incompetent standards. Problems standard setters find promulgating principles-based standard is because rules-based standard is favourable at times. Rules-based standards are able to achieve qualitative characteristic of comparability in financial reporting whereas principles-based are not able to. Criticism of principles-based arise when uncertainty of the standard reflects a risk of regulator sanctions. Uncertainty can be accepted only if regulator agree to the firms interpretations and respond correspondingly (Black, 2007). Level of uncertainty will increase if standard setter developed internal understanding of the guideline not shown in the firms statement. Moreover, applying principles-based standard will have diminishing effect on the aggressive reporting than strengthening audit committee. (Agoglia et al., 2011) According to Coglianese et al., (2004) move to principles-based may rise problem such as insufficient training to make professional judgment, therefore training will be required. Moreover in the absence of rules, managers may disclose biased information thus company may need to professional resolve (Maines, 2007). Managers do not always apply accounting standards in good faith, they are always biased and now with the flexibility of principles it is criticised that rise of potential for earning management (Nelson, 2003). Providing suitable resolve may be challenging because auditors find difficulty in predicting how principles will be applied to certain litigation. Despite the limitation of rules-based, some standard setter would still prefer rules to principles just to avoid both uncertainties and litigations. Conclusions We can conclude from this discussion that accounting has been not been able to receive a complete regulatory pack that can provide a theoretical foundation for the financial accounting domain. The individualistic approach to developing these theories has not been successful because they miss out on some important factual information. Globalization has caused a number of challenges to the accounting domain as more and more companies have moved their systems from manual to computerized systems. Therefore, regulators face a raising problem of devising regulations that ensure the integrity and confidentiality of the accounting information. There are many mixed feelings regarding the ideas to regulate accounting. However, despite the mixed opinions, the idea to regulate accounting is strong. It is not only the responsible thing to do, but it will also safeguard the public form companies and fraudulent activities that could occur. To not regulate accounting laws and practices will only leave room to gather more mistrust in the accounting.