Saturday, August 31, 2019

Poetry Essay Essay

In the poems ‘How to Eat a Poem’ by Eve Merriam and ‘Introduction to Poetry’ by Billy Collins, important ideas are presented about how poetry should be experienced and enjoyed. The poets used the techniques extended metaphor, repetition, metaphors and personification to show me how these ideas is important. In ‘How to Eat a Poem’ by Eve Merriam, the author describes how poetry is to be experienced. Poetry doesn’t need any manners and has no rules. â€Å"Don’t be polite / Bite in.† is an example of just jumping in to poetry because it’s got no manners and it’s for everyone. â€Å"It is ready and ripe now, whenever you are.† Shows us that poetry is for everyone. Poetry never goes away because it always written on paper. It’s not hard you don’t have to be clever to enjoy poetry because it’s always there to be read. Poetry is to be experienced and enjoyed by anyone. In the poem ‘How to Eat a Poem’, the techniques of Extended metaphor and repetition are used to show me the important idea. Extended metaphor us used in the lines â€Å" Pick it up with your fingers and lick the juice that. / May rush down your chin. / It is ready and ripe now, whenever you are.† To compare juicy fruit to poetry. Through doing this, the poet helps me understand that poetry is about experiencing poetry, and not holding back but in fact diving in. It also helps me understand that you can be messy and enjoy your poem. Repetition is used in the lines â€Å"or stem / or rind / or pit / or seed or skin.† To compare poetry to the inside of a fruit. Doing this has helped me understand that poems aren’t hard, that they are fun and don’t have the bad bit of a fruit. That it’s really tasty and anyone can do it. These two techniques help compare juicy fruit to poems. In the poem ‘Introduction to Poetry’ the poet shows me the important idea that poetry is about having fun. Poems are made to have fun for everybody not just cleverest people. It’s for people who like having fun. â€Å"I want them to waterski / across the surface of a poem / waiving at the authors name on the shore.† The author is also trying to tell you to not over  analyze things. In the poem it states that all we want to do is torture it and get a confession out of it. Poems are to be about having fun, not trying to find every possible meaning and to just skim across getting the ideas that the poet wants us too. Poems are about having fun and not over analyzing them. In the poem ‘Introduction to Poetry’, the techniques metaphor and personification are used to show me the important idea. Metaphor is used in the lines â€Å"I want them to waterski / across the surface of a poem / waving at the authors name on the surface.† Which compares waterskiing and having fun to a poem that is fun and relaxing. This helps me understand that poetry is fun and relaxing just like waterskiing. When you imagine yourself waterskiing you imagine a sunny day, speeding along bouncing up and down on waves while waving to your friends on the shore in the sand. Poems are the same you can enjoy yourself through rhyming or using alliteration. All the techniques that make a poem fun and enjoyable to write and read. Personification is used in the lines â€Å" But all they want to do / is tie the poem to a chair with a rope / and torture a confession out of it† to compare tying up a person to a chair and trying to get a confession out of it. Over analyzing a poem and taking meanings that aren’t meant to be instead of taking the idea that the poet tries to convey. Doing this the poet helps me understand that poetry is to be about the images or the meanings that the poet is telling you. That poetry doesn’t need to be â€Å" tied to a chair and tortured†, so it gives a confession that it doesn’t have to be an expert that needs to analyze it, anyone can do it. Poetry is intended to be enjoyed, anyone can do it, it doesn’t need to be over analyzed. Both of these poems have helped me understand more about poetry and what it’s about. That poetry is about having fun and to be experienced by everyone. Anyone and everyone can enjoy poems, they don’t have to be the cleverest or the smartest to understand poetry. I think these two poems represent what poems are about.

Friday, August 30, 2019

Prevent Animals and Plants from Dying Out Essay

Increasing number of animals and plants are dying out, but little has been done to prevent. This problem has given rise to great public concern now. In this essay, I’ll analyse some possible causes of this phenomenon and then propose some solutions. Firstly, some people think it is waste of resource to prevent animals and plants. They suggest that the money should be better spent on human population. They want take more space and totally ignore the animals’ and the plants’. Secondly, human being is selfish and greedy, some people cannot resist the temptation of wearing the fur coat or eating the delicious food, (such as shark’s fin, wild animals etc.) though they have been aware of this problem for a long time. Based on the above analysis, I think there are some ways to deal with the problem. To start with, the sense of protection animals and plants should be enhanced. To let people know that the disappearance of animals and plants will result in serious threat to the balance of ecosystem. It is hard to imagine what our world would be like without animals and plants. Next, a healthy lifestyle should be advocated, like healthy diet, simple life, get alone well with natures. Finally the most important thing is to lay down the low to punish those who kill animals or cut plants without permission strictly. In summary, to protect animals and plants is to protect our living environment. Every individual should participate in doing something to preserve animals and plants from dying out.

Thursday, August 29, 2019

Karl Benz Essay

Karl Benz was born on 25th November 1844 in Karlsruhe, the son of an engine driver. The middle of the last century, when Benz was an apprentice, was a time of widespread fascination with the â€Å"new technology†. The first railway line in Germany from Nuremberg to Furth had been opened in 1835, only twenty years before, and in the space of just a few decades the railways, steamships and new production processes had ushered in a new era in technology, industry and everyday life. Karl Benz attended the Karlsruhe grammar school and subsequently the Karlsruhe Polytechnic. Between 1864 and 1870, he worked for a number of different firms as a draughtsman, designer and works manager before founding his first firm in 1871 in Mannheim, with August Ritter. But little money was to be made in the building materials trade and the economic convulsions of the 1870’s caused difficulties for the young company. Karl Benz now turned to the two-stroke engine, in the hope of finding a new livelihood. After two years’ work, his first engine finally sprang to life on New Year’s Eve, 1879. He took out various patents on this machine. Equally important were the contacts with new business associates, with whose assistance Benz founded a gas engine factory in Mannheim. But after only a short time he withdrew from this company since it did not give him a free enough hand for his technical experiments. Benz found two new partners and with them founded â€Å"Benz & Co., Rheinische Gasmotorenfabrik† in 1883 in Mannheim, a general partnership. Business was good and soon the production of industrial engines was being stepped up With this new financial security, Karl Benz could now set about designing a â€Å"motor carriage†, with an engine based on the Otto four stroke cycle. Unlike Daimler, who installed his engine in an ordinary carriage, Benz designed not only his engine, but the whole vehicle as well. On 29th January 1886, he was granted a patent on it and on 3rd July 1886, he introduced the first automobile in the world to an astonished public. In 1903, Karl Benz retired from active participation in his company. The next year however, he joined the supervisory board of Benz & Cie and he was a member of the supervisory board of Daimler-Benz AG from 1926, when the company was formed, until his death in 1929. In 1872, Karl Benz married Bertha Ringer, who was to be of major support to him in his work. The couple produced five children. Benz lived to witness the motoring boom and the definitive penetration of his idea in to everyday life. He died on 4th April 1929. The former Benz family residence in Ladenburg is now open to the public. The Daimler-Benz foundation, founded in 1986, has its registered office here.

Wednesday, August 28, 2019

Woman in the work place Essay Example | Topics and Well Written Essays - 1500 words

Woman in the work place - Essay Example Often women have to assume dual personalities in order to get ahead – one for the office and the other for the home. At the office, she has to be assertive and in clear command, to a certain extent, also shrewd and manipulative, to get what she wants, but at the home, she has to be demure, obedient and dutiful, subservient to the wishes of others. The different roles assigned to women to support themselves and their families have enhanced their potential and also made them stronger and determined individuals, coping to succeed in a male dominated world. And their ability to finish projects on time have made women make.† (Gomez, Armando). The reasons why women make more progress than men is because they have the right attitude to work and interpersonal relationships and would rather avoid arguments and heated discussion, rather than try to win them. Besides, they take their jobs more seriously then men and excel in producing quality work within targeted time and lower bud gets. Unlike men, they do not nurse bruised egos and are generally well-informed about relevant matters concerning the corporate matters while striving for excellence in chosen assignments. There are distinctive personality traits between men and women which need to be understood in its correct perspective. Although women may deny gender discrimination and sexual harassment, the fact that this is a reality cannot be denied.† Violence against women can occur on the job. Employers need to be concerned about their responsibility to maintain safe work sites.† (Strategic Employer Responses to Domestic Violence. A Crucial Human Resource Challenge). In a survey conducted in US, 50 % of the women in the age group of 35-49 admitted that they were the subject of gender discrimination and 40 % admitted to have faced sexual harassment at their work place. (Gomez, Armando). It is felt that discrimination exists among the

Tuesday, August 27, 2019

Jazz experimentalists Essay Example | Topics and Well Written Essays - 1000 words

Jazz experimentalists - Essay Example On a track called ‘Blue Eyes’, Bradford and his accompanying band expertly meld individual instrumental artistry with warm and lush melodies to create an inviting, yet wholly unique jazz experience. The track features Douglas Bradford on guitar, Chris Ward on tenor saxophone, Peter Schwebs on bass, and Luc Decker on drums, and starts with Bradford’s skilled virtuosity on the guitar. Shortly, afterward Chris Ward joins in on tenor and offers a nice counterpoint to Bradford’s syncopation. While Bradford displays his considerable skill on the guitar, his sound never loses touch with the audience and is always underlined by a soothing melodic element. Perhaps was greatest about the band’s sound is the seamless transitions they exhibit. Bradford’s guitar playing gives way to Ward’s saxophone and rather than sounding forced, the quick pause shows the band makes excellent use of the in-between times and silences. Ward’s saxophone is part John Coltrane part Miles Davis. As he weaves in and out of skilled improvisations, and contemplative ballads, it’s almost as if he is serenading the listener` at midnight. The band’s sound is sure to never fall into a lull however, and just as the listener begins to fall into a trance, they are quickly punctured by an off-setting pitch, or sharp burst of melody. While the percussion is never overly obtrusive, neither does it merely keep pace. The nature of the band’s sound is such that stylistic flourishes occur, in however a subtle fashion. This is perhaps the most accurate way to categorize their drums. At times they rely on stark minimalism to seduce the listener into the sinuous sonic journey, and at other times they are capable of stylistic flourishes that leave the listener calling for a long extended drum solo. In all they stand as virtuously proud as any other component of the band’s sound. While the individual features of Bradford’s sound are too be recognized for their excellence, it’s

Questions about the NSA Research Paper Example | Topics and Well Written Essays - 2250 words

Questions about the NSA - Research Paper Example These include e-mailing and telephone addresses used in communication and the dates and times of the communications. However, the programs do not give permission to collection of the content of the e-mails or calls themselves (Electronic Frontier Foundation). It is worth noting that although a huge amount of the information is collected, a vast majority of it does not usually get reviewed. This is because of the unresponsive nature of the information toward the limited queries authorized for purposes of intelligence. These programs are also subjected to extensive regimes of internal checks, more so for U.S persons and are monitored by the FISA court together with the congress. Therefore, NSA bulk collection programs are important tools in fighting against terrorism, they are greatly helpful in identification of terrorist plots aiming the homeland. The tools have the uniqueness of producing intelligence that is otherwise not available to the NSA. During the time before the 9/11 terrorist attack in New York, the NSA failed to establish that a call made by one of the persons involved in the attack, one al-Mihdhar, was in fact originating from San Diego, California. Instead, despite intercepting and transcribing the calls, NSA could not get to know al-Mihdhar’s calling location, leading to the conclusion that he was overseas. It is because of this that programs were developed to close such gaps that allow individuals like al-Mihdhar to go undetected while communicating, in fact while in the United States, during plotting of terror attacks. One such program operates under the FISA Court authority and which is pursuant to FISA’s â€Å"business records† authority, which has a common reference as â€Å"Section 215†. Together with similar programs in operation pursuant to FISA, and including exercising of trap/pen authorities,

Monday, August 26, 2019

Software Engineering CW4 Essay Example | Topics and Well Written Essays - 1750 words

Software Engineering CW4 - Essay Example In the engineering sector, fire safety has remained a highly critical undertaking regarding any project initiated in the contemporary world. According to Casey and Grant (2008), the risks posed by fires in the current times, continues to cause a serious challenge to engineers across the entire profession. The requirement of control measures to fire outbreaks becomes an imperative undertaking in the construction of buildings. Therefore, Fire and Security Alarm Monitoring (FASAM) has a greater role in the engineering projects. Fire safety, remains a key concern for many engineers and leads to the initiation of fire safety elements in the projects forming a core part in their implementation (Garis and Clare 2012). This is dictated by diverse challenges emanating from the fire concerns. The requirements for fire fighting equipments like fire extinguishers comes in handy and are highly critical in this context. Further, the installation of an automated fire safety remains essential in ens uring fire safety within expansive buildings. According to NICET (2010), the understanding of various types of fire alarms system forms a basic concept in the fire control. The construction and development of fire safety reporting software could be termed as the beginning of developing a Fire and Security Alarm Monitoring (FASAM) system. The development of automated system could essentially provide immense assistance to the security of fire within buildings or industrial premises. This paper aims at looking at the goals and principles underpinning the FASAM in software engineering as well as the achievements realised. 2.0. Goals and Principles of Software Engineering in regard to FASAM 2.1. Goals The automated Fire and Security Alarm Monitoring system ought to achieve several organisational goals in dealing with the threats posed by fire, and other security concerns within large buildings. The main operational goals of developing the automated system revolve around ensuring that the security threats become handled in a timely and efficient manner (Schwalbe 2005). Among the fundamental concerns that might ensure timely response, include ensuring the involved individuals remain prepared for unexpected occurrences. Preparedness of the involved individuals shall be ensured through the information gathered from the system on a daily basis. The main goals which the FASAM system should achieve include: Providing detailed information concerning the security of the building to the relevant authorities involved in security management. Activating security and fire alarms, in the event of a safety threat, occurring within the concerned building. Storing the information regarding daily occurrences within the building that might assist involved individuals in improving the security within the building. 2.2. Basic Principles According to Pressman (2005), the software development process follows the specified basic principles utilized in development of software within the sof tware engineering profession. The utilized principles govern the profession where development of new programs involves coming up with systems aimed at performing duties previously performed manually. The development of this FASAM system shall inherently involve the conversion of the

Sunday, August 25, 2019

Computed Tomography (CT scan) Research Paper Example | Topics and Well Written Essays - 1750 words

Computed Tomography (CT scan) - Research Paper Example The last two decades have seen popularity in terms of the increase of usage and new technological implications that can enhance this machine to produce even more detailed imaging solutions in the future. That being said, the potential side effects of this imaging that have been known to cause cancer or kidney problems in most cases, make a strong case against the development and use of such a technology. This paper will elaborate on the technology and its usage with a study on the potential side effects of this kind of imaging. It will also shed light on is wide spread application in today’s medical world and means through which the harmful implications from the use of radiation technology of CT scanning can be minimized. The word tomography is derived from the Greek language where ‘tomo’ means ‘slice’ and ‘graphien’ means ‘write’ (Medical News Today, 2013). The technology basically involves the creation of 3-D imaging with the help of many 2-D images taken of the body, referring to the ‘slicing’ of images. First introduced in the 1970s, the technology has come a long way as far as the mechanism and clinical usage patterns of this technology are concerned. Starting off with the technology itself, computing tomography or Ct scanning conventionally makes use of an x-ray tube and sensory detectors that rotate behind the circular surface of the scanning head. Several functional options enable doctors to focus on a specialized scan that may be used to evaluate a specific body part for example blood vessels, nerves or bones. As the rotation takes place several mages are captured and collected as sonograms. These multiple sonograms are then made into information that can be interpreted. Sonograms combine through tomographic reconstruction to produce a series of cross sectional images. There are various types of mathematical and geometric techniques that can be used for this conversion, like linear algebra, filtered back

Saturday, August 24, 2019

Youth Connexions Literature review Example | Topics and Well Written Essays - 1250 words

Youth Connexions - Literature review Example Connexions link the work of the government departments with those of the voluntary and private sector groups and the careers and youth services. All the support and services that are needed by the young people during their teenage years are brought together by Connexions (Bekaert 2005, p165). In the year 2003/2004, close to 3.6 interventions were made with the young people. By March 2004, nearly 100,000 teenagers aged 16 – 18 years left the ‘Not in Education Employment or Training’ group and entered training, a job with training or education (Department for Work and Pensions 2004). Connexions provide practical assistance in the choosing the right careers and courses. It also offers access to a number of personal development activities such as volunteering activities, performing arts, and sport. Advice and assistance is also provided on issues such as homelessness, sexual health, and drug abuse. Connexions provide an all inclusive support to the young people. A per sonal adviser is made available to these young people. The personal advisers have different roles depending on the need of the young person. Some are career advisers and others it is personal adviser who provides an in-depth support to the young person, and to help them in the identification of learning barriers and find solutions and gain access to a more specialist support. The personal adviser works in a number of settings such as colleges, community centres, one-stop shops, on an outreach basis, and schools (Bekaert 2005, p165). Connexions has its own website that has all the information for the personal advisers and other professionals; this is the national website for the Connexions. A national Connexions website for the young people also exists. Another website for Connexions is the Connexions Direct and it assists the user with information and advice in regard to issues such as housing, health, career and learning options, relationships with friends and family, activities to participate, and money. The local Connexions partnerships website also exists (Bekaert 2005, p165). There are proposals to sustain Connexions in regions where its performance is good and there are still indications that the guidance and support provided by Connexions is supposed to go local as much as possible. The responsibility for organizing the focus of the services in regard to working with the young people should have a coherent and holistic response approach and should lie within the future of the Children’s Trusts (Hine and Wood 2009, p177). The Connexions Strategy The proposal for the Connexions strategy was signed in 2000 by the Prime Minister and 7 Cabinet Ministers. The intention of the strategy is to coordinate policy in a number of partner agencies; they include colleges, training providers, schools, drug action teams, employers, leaving care teams, social service, the youth service, teenage pregnancy coordinators, and the voluntary sector. The primary aim of t he strategy is to offer support service to all 13 – 19 year olds through a system of personal advisers; the services are delivered by multi-agency teams (Roche 2004, p97). The Connexions Service There are around 47 Connexions partnerships that cover England. Each of the Connexions partnership has an extensive workforce that works directly with the young people. The workforce is composed of professional qualified personal advisers and delivery staff who work under the supervision of the qualified professional personal advisers. The main focus of the Connexions service is the young people and their primary objective is the promotion of the welfare of the young people (Great Britain

Friday, August 23, 2019

The Hague Rules Essay Example | Topics and Well Written Essays - 1250 words

The Hague Rules - Essay Example The Hague Rules radically changed the legal status of sea carriers under the bill of lading. Again in 1963 CMI adopted the text of a draft document which was intended to make limited amendments to the 1924 convention which was considered at 12th Session of the Brussels Diplomatic Conference on Maritime Law in 1967 and 1968. The Protocol was signed in this respect on 23 February 1968 at Visby on the Swedish Island and the Carriage of Goods by Sea Act 1971 was passed by the UK Government with effect to the protocol and re-enacted Hague Rules and Hague Visby Rules. (Martin Dockray and Katherine Reece Thomas, 2004) The Hague Rules were adopted in 1924, The Hague/Visby Rules in 1968 and 1979 and the Hamburg Rules in 1978. Each international convention in turn attempted to broaden its application in order to avoid lacunae, to encompass all contracts of carriage as well as bills of lading, and to permit incorporation by reference.2 The accepted international standard of the rights and duties of a Carrier, Shipper and consignee of goods carried by sea is the Hague Rules Convention of 1924 which has been given the force of law by most maritime nations.(Richard Price and Andreas Haberbeck, 1986)3 The general principle regarding the application of The Hague Rul... ect to the provisions of Article 6, under every contract of carriage of goods by sea the carrier, in relation to the loading, handling, stowage, carriage, custody, care and discharge of such goods, shall be subject to the responsibilities and liabilities, and entitled to the rights and immunities hereinafter set forth."4 Art. 1(b) -'Contract of carriage' applies only to contracts of carriage covered by a bill of lading or any similar document of title, in so far as such document relates to the carriage of goods by sea, including any bill of lading or any similar document as aforesaid issued under or pursuant to a charter party from the moment at which such bill of lading or similar document of title regulates the relations between a carrier and a holder of the same."5 The most important obligations under Hague or Hague Visby Rules are those imposed by Art. III6 Rule 1 (a) and (b) which requires the carrier to exercise due diligence to make the ship seaworthy and to properly man, equip and supply the ship before and at the beginning of the voyage. (Simon Gault et al, 2003) There were some initial problems in the proper implementation of Hague Rules as seen in Vita Food Products Inc V Unus Shipping Co. Ltd, where Herrings were shipped in Newfoundland under bills of lading of the Newfoundland Carriage of Goods by Sea Act 1932 which stated that bill of lading 'shall contain an express statement that it is to have effect subject to the provisions of the Hague Rules as expressed in this Act' and also provided exemption from liability for master's negligence in navigation which exemption was also part of the Hague Rules. The Hague Rules further provided that any clause or agreement in the bills of lading relieving the carrier from liability for negligen ce imposed by the

Thursday, August 22, 2019

Proxy Server Essay Example for Free

Proxy Server Essay Annotations: This research paper is an extract from an about 100 pages enfolding diploma thesis of Martin Eisermann, student at the Fachhochschule Rosenheim (University of Applied Sciences), Germany. It contains the results of performance tests, accomplished with MS Proxy Server 2.0, MS ISA Server and Linux Squid Proxy. This work reflects the personal impressions and test results of the author, made with web performance testing software, described later in this document. The paper is a translation from German into the English language, so it might not be written with the best phraseology. Microsoft, Windows, Windows NT, Windows XP, Internet Information Server (IIS), Web Application Stress Tool, Internet Security and Acceleration (ISA) Server, Proxy 2.0 are either registered trademarks or trademarks of Microsoft Corporation in the United States and other countries/regions. Other products and Company names mentioned herein may be trademarks of the respective owners. 1. Executive Summary This technical research paper contains the results of a performance test scenario with the Microsoft Internet Security and Acceleration (ISA) server, which should make clear, how good proxy servers can improve the speed of a web server. At the beginning, it describes the structure of the test scenario, with aspects of hardware and software. Then, a product will be chosen from a variety of different test tools, which compete with each other. The benefits and drawbacks of every product will be elucidated. The next chapter explains, which products will be compared with the MS ISA server and why they were selected. The following test results are representing the biggest section in this research paper. Finally, there is a short summary of the newly gained cognitions. 2. Test scenario To get an impression, how proxy servers can improve the performance of a network or of a single web server, the following scenario was build: 100 Mbit 100 Mbit Webserver (IIS 5.0) Proxy Server Workstations ill. 1 The workstations shown in illustration 1 are simulating the internal LAN (local area network) clients, which are among themselves connected with a fast Ethernet switch (100 Mbit). The web server, which is also connected with 100 Mbit, simulates the Internet. However, this network capacity is mostly not found in small and/ or middle enterprises, but for compensation, the web server is an outdated machine. The technical data of all components used for the tests is described in table 1. Technical data: System web server proxy server Workstations CPU Pentium AMD Duron Pentium II MHz RAM 200 800 400 96 MB 512 MB 256 MB OS Win XP Prof., IIS 5.0 variable Win NT 4.0 Prof. Tab. 1 3. Test tool selection In the Internet, it is not difficult to find programs, which can execute diverse performance tests for web servers. Many of them, especially if they are build for Linux, are free of charge, but if one likes to have graphical analysis it gets more difficult. Often one has to decide using a Microsoft Windows 32-bit application, which, in general, costs a lot of money. Another problem is the possibility to integrate a proxy server to the web testing tools. Most tools dont support that. Of course, this is comprehensible: which operator, who wants to test his web server performance, likes the results be influenced by a proxy? But in this scenario, it is absolutely necessary. Regarding this two product selection preconditions, there arent left a lot tools. Three remaining products are the WebPolygrah Benchmark Tool from Measurement Factory, Microsofts Web Application Stress Tool and the Web Performance TrainerTM from Web Performance Inc. On a first look, they all three seem to offer the wished functionality. a) WebPolygraph Benchmark Tool: The WebPolygraph Benchmark Tool is freely availably at http://www.webpolygraph.org. The tool was originally developed for Linux based systems, but in between there are also MS Windows 32-bit binaries downloadable. The actually available documentation in the Internet is not sufficient to set up a test environment quickly and without intensive knowledge of the product. More examples and more detailed descriptions would help a lot. A graphical user interface is not implemented, too. b) Microsoft Web Application Stress Tool Also freely available is Microsofts web testing utility, the Web Application Stress Tool. It is downloadable at http://www.microsoft.com. The documentation, which can be found in the Internet, is clearly structured and useful. The handling of the product is intuitive for experienced Windows users. The missing integration of a proxy server in its configuration setup, makes the tool nearly useless, but Microsoft offers a solution: one have to install the Microsoft Proxy Client (or the Microsoft ISA Firewall Client) on the machine, which is used to perform the web tests, then the tests are working suitable. There is only one more problem left, which will get clearer in the next few minutes: There is no proxy client or firewall client available for Linux! And because there is a Linux product in the test environment, the Stress Tool is not useful at last. c) Web Performance TrainerTM 2.4 Finally, the software product from Web Performance Inc. (http://www.webperformanceinc.com) fulfilled all preconditions: graphical user interface, proxy configuration, easy understandable, Internet based documentation. All installation problems and handling questions where answered fast and competent. The product handling is similar to the Web Application Stress Tool, but there are versions for both, Linux and Windows operating systems. The demo version only supports an amount of 25 users, but Web Performance Inc. offered a time limited 3000 user version, for the tests. At this point many thanks for that again. 4. Test specification The web content for the tests is completely static, that means pictures and html-files, No dynamic pages like asp or php were inherited. Reason: these pages are normally not cached in a proxy server. The amount of data used is about 4.8 MB. The test run time is determined to 30 minutes. Significant performance differences should be visible within this time. The Web Performance trainer v2.4 can increase the number of concurrent users by 25 every minute. So, at the end of the test, a maximum number of 750 users can poll the web server. 5. Choosing the proxy products If someone tests the speed of a web or proxy server, he would not now, if his results are good or bad, if he doesnt make a comparison with other products. For this reason, beside the ISA server, the Microsoft Proxy 2.0 and a Linux Squid proxy were other test candidates. The decision for MS Proxy 2.0 is easy to explain. It is the original product, Microsoft build the ISA server on. It also runs on Windows 32bit operating systems and Microsoft propagates, that the ISA server runs about 10 times faster. The Linux squid proxy is in the test field, because it has the same functionality like the MS proxy versions, but runs on a completely different platform. Another reason is, that Linux and squid are both freeware products and thats a big advantage. 6. The test results The most important results, if one tests the performance of web or proxy servers, are described with the data: Total Hits, Errors, Hits/sec and Bytes/sec. In all following diagrams, the colors are defined as follows: Total Hits Errors red Hits/sec Bytes/sec black yellow (with factor: 0,001 kB/sec) green 6.1 Web server (standalone) For a first view, the next two illustrations are showing the test results of the web server, without a proxy: Ill. 2 Ill. 3 While the 30 minutes test duration there were only 111.451 hits and 298.778 errors recognized by the Web Performance TrainerTM and only 470 users could by simulated at all. In the first minutes of the test, the amount of kilobytes per second is relatively high (~ 550) but from minute 11:00, they decrease to an average number of 165 kb/s. A stable result of only 50 hits per second can be metered. Already explained before in this paper, the used web server is an old computer, so these bad results are nothing to wonder. How good the results could get with proxy servers in front of it, will be shown in the next chapter. 6.2 MS Proxy 2.0 vs. MS ISA-Server In a first step, the two Microsoft products will be compared with each other. Already their total hits within this 30 minutes, differ a lot. The ISA-Server has about four times better results than it’s predecessor, while the total number of errors is just about three times higher. MS Proxy 2.0 – Total Hits: 206.953 – Errors: 74.572 Ill. 4 Ill. 5 MS ISA-Server – Total Hits: 781.851 – Errors: 232.879 So, the superiority of the new product is verified. Surprisingly, the count of errors of the MS Proxy 2.0 loose their nearly parallel growth with the total hits line in the 8th minute, and increase much slower in the next 22 test minutes. For this effect couldn’t be found a reason. MS Proxy 2.0 – Hits/Sec – kB/s Ill. 6 MS ISA-Server – Hits/Sec – kB/s Ill. 7 The comparison of the hits/s, shows that the MS Proxy 2.0 cannot exceed the previous peak values of the web server a lot, but holds them constantly (~ 550 kB/s at ~120 hits/s). Whereas the ISA server lies with it’s ~500 hits/s explicit over the MS Proxy 2.0. A ten times higher rate, shown in the small illustration 8 (submitted by Microsoft), cannot be proven. Ill. 7 6.3 Linux Squid vs. MS ISA server The second test candidate is the squid proxy server, based on the operating system RedHat Linux version 7.2. The software products can be downloaded freely from the Internet (http://www.redhat.com; http://www.squid-cache.org). The squid version, used for the test, is release 2.4 stable 1-5. Linux Squid – Total Hits: 1.335.949 – Errors: 303.204 Ill. 9 MS ISA-Server – Total Hits: 781.851 – Errors: 232.879 Ill. 10 This comparing test shows significantly, the higher performance of the squid proxy in opposite to the MS ISA server: it is nearly doubled. The amount of not completed requests is irrelevant higher. Further results like hits per second and kilobytes per second are making this even clearer. Linux Squid – Hits/Sec – kB/s Ill. 11 MS ISA-Server – Hits/Sec – kB/s Ill. 12 In the first six minutes, ISA and squid are competing with each other and are reaching values of 2.600 kb/sec. But then, the performance of the ISA server slackens and even decreases to an average value of 2.200 kb/s. Whereas the performance of the squid proxy reaches its limit not before the maximum possible network throughput rate (at 100 Mbit) of about 4450 kb/sec in the 9th test minute. Then the average value also decreases a little until circa 4300 kbytes per second. 7. Summary The squid proxy, running on a freeware product, is apparently the fastest proxy server within the three test candidates. Its normal implementation is not hard, if the corresponding administrator has little knowledge about Linux. On the other hand, which corporation is in the need of this high caching rates? Who has 750 users that make 1.35 million web requests in 30 minutes? So, if there is already a Windows based network, which perhaps already implemented a MS Proxy 2.0 server, there is no real need to change to a Linux proxy variant instead of updating to an ISA server. On further reason, to prefer the MS ISA server instead of the squid proxy in an existing Windows based network, might be, that all already implemented user groups can be left and later used in the ISA server configuration after an update. Implementing the authorization structure of a Windows 2000 or NT domain on a Linux computer is certainly possible, but probably not easy for a typical Windows Administrator. And implementing the users on two security

Wednesday, August 21, 2019

Essay Free

Essay Free Will Essay â€Å"Free Will† takes one of the central questions of any religious realm. Whether a human has a freedom in his choice? Whether a human can make a personal, independent decision such us what he should do in each situation? Or are all of his actions predetermined, and the possibility of making a free choice an illusion? Since the time of the Greek philosopher Socrates to modern times, philosophers, theologians, scientists have tried to prove the existence of â€Å"Free Will† or its absence, and as well have to answer to the question do people have real control over their actions? The question, about existence of â€Å"Free Will†, appeared in ancient Greek philosophy. Socrates and his followers believed that the dependence of the lower sensual impulse is an equivalent to slavery, but responsible subordination which was inspired by human mind, means a â€Å"Free Will†. Socrates argued that all humans are looking for the good behavior, but not all equally know what good behavior is. If a person really knows what the true goodness is, then this person wants to do it, but one, who doesnt know, usually takes imaginary goodness instead of real goodness. Then rushes to reach the imaginary goodness and makes mistakes. This then produces evil deeds. No one is willing to be bad on their own will. This way, moral evil reduced to thoughtlessness, that equal to a lower needs level, and goodness for Socrates, according to Aristotle, expresses of the intellect, which is an equivalent to a â€Å"Free Will†. Which means, only human who doing good things can have â€Å"Free Will†. Based on the foregoing, it is possible to make a conclusion, that by the term â€Å"Free Will†, Socrates understands the qualities that exceptional people have, rather than an integral part of every human being. The idea of â€Å"Free Will† gets a new interpretation with the development of Christianity. If we trace the history of â€Å"Free Will† in the Bible, it is necessary to start with the character of God, who decided on his own and created the universe and all that fills it. The Bible says that man was created in the image and likeness of God. This means that a human is equal to God, and has a consciousness, feelings and will, and has the ability to think and make decisions. Suppose a person is really free in his choice. In such a case, two problems appear right away. According to religious beliefs, everything in this world happens only by the will of God. God makes, all he wants, in heaven and on earth. And no one, including human can’t resist God’s will. How, then, can a person can have any â€Å"Free Will†? If a person is not free, another ethical problem appears. According to Christianity (as well as Islam and Judaism) God rewards man for good behavior and punishes him for his bad. However, if a person cannot choose what he should do in each case, if his actions were predetermined and even corresponded to the will of God, how and why in this case, it is possible to punish humans? And what then is the â€Å"Free Will† for a man? Scientists consider issues related to the freedom of will. With development in science particularly genetic engineering, neuroscience and psychiatry; human view the presence of â€Å"Free Will† has changed. Scientists believe that people do not choose the genotype and the environment, do not choose the other factors affecting their lives. People do not choose in which family to be born, therefore they do not choose hereditary genes that are the most meaningful way determine our lives. Some genes predisposing to a human disease, some genes determining appearance, behavior, intellectual abilities all of them affect our lives. According to scientists, human body is as a kind of machine, established and acting at the direction of the external forces that cause it to work in certain way. This point of view is a concern because it is mean that people cannot be responsible for their behavior in any situation. No one has found the answer to the question of whether people have the â€Å"Free Will† or is it just an illusion. But in any case, a human has the right to follow the path of good or choice the path of evil. All humans exist like cells in a single large organism called the universe. World created from all its parts or elements. Each element contributes to the world their personal characteristic; effects and change world’s destiny. It may be weak and insignificant in the overall system of the world, but it is exists. It operates within certain limits on domestic fundamentals essence and nature. Without any of these elements would be a different world.

Tuesday, August 20, 2019

Financial Analysis of Vodafone

Financial Analysis of Vodafone Vodafone group PLC is a British multinational mobile network operatorheadquarter in Newbury, England. It has formed in 1984 as a subsidiary of recal electronics PLC. It became an independent company in 1991 and changed its name to Vodafone group PLC on 2000.Vodafone is a world leading mobile telecommunications company. Vodafone provides a wide range of Communication services, including voice calls, SMS text messaging, MMS picture and video messaging, internet. Access and other data services Vodafone is the world largest telecommunication network company with 146 subsidiaries Vodafone directly own and manage about 2,200 stores around the world and they also have around 10,300 Vodafone-branded stores run through franchise and exclusive dealer arrangement, An industry with 5.6 billion customers with growth driven by increasing global demand for data services and rising mobile penetration in emerging markets. TYPES OF ORGANIZATIONS An Organization is a group of people that working together towards a common goal. There are 2 types of Organizations. Private Sector Public Sector Private Sector It is the part of national economy that is not directly controlled by the government. It provides more job opportunities for the people. So they will give a good support to the government. Private Sector includes sole traders, partnerships, joint ventures, limited companies, Co-operatives, clubs and societies. Sole Trader ship It has no complexities, with minimum interference of statutes, which is run by a single individual with his own capital, the decisions too being taken by himself. The most common business unit of the world is these. The main reason for this is that, ability of this business to be carried on without the necessity for adherence to rules. Partnerships It is a legal relationship between two or more individuals who are working together to achieve a specific goal. They should have an intention to earn profits, Collective responsibilities and a common destiny or goal. Joint ventures It is a short term association of a few persons in order to accomplish a specific task. Generally they do not use a business name. The joint venture is dissolved when the specific task is accomplished. This is a short term business type. Incorporate Companies In Sri Lanka institution registered under the companies ACT NO.7 OF 2007 is considered as an incorporated company. It includes Limited Companies, Companies limited by guarantees, unlimited companies, Offshore Companies, Foreign Companies. Public Sector It is the part of an economy that is directly controlled by the government. Public Sector is the largest sector of any economy in the country. It provides basic goods or services that cannot be provided by the private sector. It includes Gov. Departments, Gov. Corporations, and Gov. Companies. It is also known as State Sector or the Government Sector. Responsibilities of stakeholders Stakeholders are individuals, groups or organizations that have an interest in the activities and behavior of a business. They can be internal stakeholders, like employees and partners, or external, such as customers, suppliers, government or the media for example. All stakeholders can influence as well as be influenced by Vodafone. Every Stakeholder has responsibilities towards the Vodafone to achieve vodafones goals and objectives. Owners and share holders As the owner of a business, it is the responsibility to pay for employees and provide them with proper benefits, including sick time and health insurance. Aside from payment and benefits, responsibilities of an entrepreneur include listening to employee concerns keeping employees in good working conditions, and hiring and firing employees when needed. Managers The manager must be able to ensure that all requirements of his department are met on time and motivate employees to perform at their highest capabilities. He must also know exactly what each of his staff is capable of and give them work that they can complete effectively while also challenging them to achieve more. Staff and employees They have to perform their tasks carefully, keep business and professional secrets confidential. They have to follow the supervisors instructions and improve their abilities and skills. They have to be honest and polite to the company. Customers After using goods or services they have a responsibility to give feedback to the company. Customers have to provide clear and correct information about their needs and wants. And they have to give the correct information required. They have to be loyal and honest to the company. Suppliers They have to supply the good quality products to the company at right place at right time. They have to be honest to the company. Have an effective communication process with the company. Government They provide rules, regulations, lows, and policies for business. They have to find weather the business is legal or not and they can provide licenses for the sensitive products. Identify Vodafone profile Mission statement; To enrich customers lives through the unique power of mobile communication Vision statement; To be the worlds mobile communication leader Goals Goals are the clearly stated objectives of the company, Vodafone has stated six global strategic goals Delight our customers Built the best global Vodafone team Leverageglobal scale and scope Expand market boundaries Be a responsible business Provide superior shareholder returns Values Values are the beliefs of an individual or a group. Vodafone has four core values described internally as passions For customers For results For Vodafone people For the world around Vodafone Vodafone growth Vodafones Key revenue performance indicators Vodafone group PLC has shown their growth of revenue in this table. We also aim to lead the tablet segment, which is growing rapidly. We were the first operator to launch an Android Honeycomb tablet with the Samsung Galaxy Tab 10.1v and we have started to distribute the Apple iPod 2. During the year we introduced the Vodafone K4605 USB stick which provides theoretical peak data download speeds of 42.2 Mbps using 3G/HSDPA technology and a 4G/LTE USB stick which has the potential for faster download speeds. We also launched Vodafone WebBox and Vodafone TV services (Annual report-2011 page23). Vodafone market share We can clearly identify the market share of the Vodafone group has increased rapidly year by year. The good will of the vodafone has increased by providing perfect service for thie customers and could have create loyal customers. Different types of economic systems Capitalism (market economy) Capitalism is an economic system in which the means of production are privately owned and the firms mainly target profits, in competitive markets. it is known as market economy because it is seek to maximize satisfaction or profit through own decision regarding consumption or production. Characteristics all resources are owned by individuals The decisions about the allocation of those resources are made by individuals without government intervention No significant economic role for government is necessary. The concept of supply and demand plays a role in determining the pricing structure A market economy encourages competition. The U.S. is most commonly example for market economy which had many provisions that facilitated and protected the market economys characteristics.. Advantages: The market gives producers an incentive to produce goods that consumers want. The market provides an incentive to acquire useful skills. The price system encourages producers and consumers to conserve scarce resources. Disadvantages (1) A private market economy may be quite unstable (unemployment, inflation, growth) (2) Business may simply satisfy the wants they have created through advertising. (3) Prices may affect to the consumers (4) Markets just do not work in some areas such as public goods, and national defense Socialism (command economy) Characteristics The government creates a central economic plan for all sectors and regions of the country. The government allocates all resources according to the central plan. The goal is to use the nations capital, labor and natural resources in the most effective way possible The central plan sets the priorities for production of all goods and services. The goal is to supply enough food, housing and other basics to meet the needs of everyone in the country. Cuba, North Korea, China, Russia and Iran are the most commonly examples of command economies. Russias Go plan has been the most studied. It was also the longest running, lasting from the 1930s until the late 1980s. Advantages The govt. Will ensure a more equal distribution of income and wealth Essential goods/services will be provided to the community The govt. Can determine which goods are produced. 1. There is little consumer choice. 2. Little variety of goods and services 3. Loss of individual freedom 4. Leads to allocate and productive inefficiency 5. Subsidies on essential goods and services quickly lead to shortages. Mixed economy A mixed economy is an economic system that incorporates aspects of more than one economic system. This kind of economic system has both privately-owned and state-owned enterprises or that combines elements of capitalism and socialism, economic systems. Characteristics private sector business activity encouraged. taxes used to collect revenue to pay for state goods and services. The government also provides services such as education, health, military defense, legal and infrastructure to society. The government plays an important role in resolving economic problems faced by society advantages less inequality of income because intent of government is to have a balanced economic growth of an economy. allows individuals to run their business and make profits Goods and services are produced to benefit the society rather then to benefit the economy. Fiscal policy Fiscal policy is the use of taxes and government spending to control the economic activity of a country.the government uses this policy to continue, Economic growth Price stability Full employment Expansionary fiscal policy Before the government spending increase and before the tax rate reduction or both GDP is low because the price level of the economy is low. After increase G and reduction T, GDP is high because increase of the AD. Shifting the graph to the right. (AD to AD1 )This is accomplished by increasing aggregate expenditures and aggregate demand through an increase in government spending or a decrease in taxes. Expansionary fiscal policy leads to a larger government budget deficit or a smaller budget surplus. Crowding out effect C:Documents and SettingslankaDesktopquestion_24.gif Contractionary fiscal policy Before the tax increase and government spending decrease or both GDP is high because price level is high. After increase tax and decreased government expenditure increased AD is low, GDP is low and price level is low. Contractionary Fiscal Policy creates budget surplus shifting the graph to the left(AD1.to AD) . monetary Policy Monetary Policy consists of change in money supply to influence interest rates and thus the total level of spending in the economy. Monetary policy tools are, Open market operations This is the most important instrument to control the money supply and demand of the economy.FED buying bonds from banks and public to expand monetary policy by increasing bank reserves. FED selling the bonds to the bank and public to tight the monetary policy by reducing the bank reserves. Reserve ratio It is Designed to change the amount of required reserves. FED raises the ratios to cantrction the monetary policy. It means bank loose the reserves and reduce the ability of the creating money. FED lowers reserve ratios to expan the monetary policy, banks gain tha reserves and ability to create money. Discount rate Interest rate charge by FED on the loans they granted to commercial banks. Easy money policy (Contractionary monetary policy) It is the monetary policy that seeks to increase the size of the money supply by buying securities, lower the reserve rate and lower the discount rate. These all directly impact the interest rate.FED increase bank reserves by purchasing securities and at the lower rate bank can keep more money in the volute and create money. C:Documents and SettingslankaLocal SettingsTemporary Internet FilesContent.Wordfig115.gif It is the monetary policy that FED seeks to reduce money supply in the market by selling securities, increasing the reserve rate, and rising the discount rate. It is causes to reduce bank reserves and volute money at banks. It is decrease money supply in the economy. In the curve shifted to the left (Ms1 to Ms2) Fiscal policy impact to the Vodafone UK Because of the UK statutory tax rate reduced to 26%, effective from 1 April 2011 and the impact on the year end tax balances. EBITDA increased by 8.0% with the EBITDA margin increasing by 0.7 percentage points, reflecting higher service revenue. A shareholder in the Company who is an individual resident for UK tax purposes in the United Kingdom is entitled, in calculating their liability to UK income tax, to a tax credit on cash dividends we pay on our shares and the tax credit is equal to one-ninth of the cash dividend. The tax free allowance all income earners are allowed to earn an amount of income before they start to pay tax., the personal tax free allowance in the UK for 2011-2012 was  £7,475. Monetary policy impact to the Vodafone UK According to the Vodafone annual report, 45.9bn revenue performs in 2011 and it is 3.2% growth in compared with 2010. It is because the UK government expands the monetary policy by buying Bonds from people and it caused to money supply increased. People has more money to spend on Vodafone services and products there for the demand of the mobile customers are increased by 14.5% to 370.9 m. International trade The economic interaction among different nations involving the exchange of goods and services, that is, exports and imports. The guiding principle of international trade is comparative advantage, which indicates that every country, no matter their level of development, can find something that it can produce cheaper than another country. As a multi national company, Vodafone Global Enterprise manages the communication needs of over 560 of our largest multinational corporate customers. It provides a range of managed services which bring together every aspect of a customers telecommunications infrastructure, both fixed and mobile,(Annual report Vodafone group-2011) Advantages by international trade for Vodafone Quality of the product has been increased because of high competition with foreign businesses Having an open economy Growth of high technologically methods using by Vodafone group Increased company reputation world wide Market share has been increased Disadvantages smart phones and the tablet market begins to take off. markets remain competitive and the economic environment, particularly across southern Europe, is challenging. Foreign Industry regulators continue to impose lower mobile termination rates and lower roaming prices. The combination of competition and regulatory pressures. Increase prices of the Vodafone products because of tariffs. Emerging markets Definition The term emerging markets is commonly used to describe an economy with a GDP per capita substantially below the advanced world average and typically with a growth potential above the global average. According to the World Banks definition an emerging markets country has a Gross National Income (GNI) per capita less than approximately USD 9,000.(growing markets) The most exciting emerging markets are, BRICs( Brazil, Russia, India, China), Mexico, South Africa, Clombia, Hungary, Indonesia, Turkey, Poland, Malaysia,Chile,peru, Thailand. Barriers to entering emerging markets for UK businesses Differences in language and culture are important barriers to entering fast-growing markets like the BRICs. Global trade has always been vital to the UK UK firms looking to export for the first time continue to face too many barriers that put them at a competitive disadvantage to their overseas competitors. capital is drives many businesses to take on the risks of doing business in emerging markets. Considering about the success of Vodafones in emerging markets, The number of customers using mobile services in emerging markets such as India and Africa has grown rapidly over the last ten years, increasing by over 17 times, compared to nearly 130% in more mature markets such as Europe. increased revenue market share in India and Turkey. Approximately 75% of mobile customers are in emerging markets such as India and China. EU crisis This week BCC met with a delegation from APEX, the Brazilian trade and investment promotion agency. It is clear that there are vast opportunities in the country, as indeed there are in the other emerging markets, which UK firms are yet to take full advantage of. BCCs latest research confirms that the EU remains the most popular destination for UK exports. Just under half of Chamber exporters see the large and faster-growing BRIC economies of Brazil, Russia, India and China as the best prospective markets for increasing business over the next twelve months. Unfortunately, exporters to the fast-growing BRIC markets are the most likely to encounter barriers that hold back sales.

Science and Morality in Shelleys Frankenstein - Consequences of Technology :: Frankenstein essays

The Consequences of Technology Revealed in Shelley's Frankenstein      Ã‚  Ã‚   In Mary Shelley’s Frankenstein, written in the late nineteenth century, the author proposes that knowledge and technology can be dangerous to individuals and all of humanity.   Frankenstein was one of the first cautionary tales about scientific research.   Shelley's novel offers profound insight of the consequences of morally insensitive scientific and technological research.    Learn from me. . . at least by my example, how dangerous is the acquirement of knowledge and how   much happier that man is who believes his native town to be the world, than he who aspires to become greater than his nature will allow (Shelley 101)      Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The popular belief of how Frankenstein came to be written derives from Shelley herself, who explains in an introduction to the novel that she, her husband Percy Shelly, and Lord Byron set themselves the task of creating ghost stories during a short vacation at a European villa.   According to Shelley, the short story she conceived was predicated of the notion as the eighteenth became the nineteenth century that electricity could be a catalyst of life.   In her introduction she recalls the talk about Erasmus Darwin, who had preserved a piece of vermicelli in a glass case, till by some extraordinary means it began to move with voluntary motion," (Joseph vii).   The extraordinary means forms the basis for Frankenstein.   Many people also believe that a nightmare that Mary Shelley had could also be partly responsible for the creation of the novel.      Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   At the time the novel was written, England was on the brink of leading the Industrial revolution in Europe.   The experiments of Huntsman (crucible steel manufacture), Newcome (steam-powered pumps), and Cochrane (coal tar production) throughout the eighteenth century in England were decisive in the initial transformation of England into an industrialized country (Burke 137, 173, 195).   The emerging age of technology appears to have found followers throughout the culture and to have become firmly reinforced by the time   Frankenstein was written.   Eric Rabkin (author), says that in England early in the eighteenth century, "there exist a populous discourse community that accepted the rhetoric of science" (Rabkin 39).   This rhetoric has proof extending back to the English Renaissance. Those sensitive to change and those prepared to embrace a rhetoric of change need not be scientists.   While scientists address a discourse community of scientists, novelists   Ã‚   address a wider discourse community of the literate.   If we can accept the earlier   argument that science and poetry are not ontologically antagonistic, then we might well hope to find fictional uses of the rhetoric of science . Science and Morality in Shelley's Frankenstein - Consequences of Technology :: Frankenstein essays The Consequences of Technology Revealed in Shelley's Frankenstein      Ã‚  Ã‚   In Mary Shelley’s Frankenstein, written in the late nineteenth century, the author proposes that knowledge and technology can be dangerous to individuals and all of humanity.   Frankenstein was one of the first cautionary tales about scientific research.   Shelley's novel offers profound insight of the consequences of morally insensitive scientific and technological research.    Learn from me. . . at least by my example, how dangerous is the acquirement of knowledge and how   much happier that man is who believes his native town to be the world, than he who aspires to become greater than his nature will allow (Shelley 101)      Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The popular belief of how Frankenstein came to be written derives from Shelley herself, who explains in an introduction to the novel that she, her husband Percy Shelly, and Lord Byron set themselves the task of creating ghost stories during a short vacation at a European villa.   According to Shelley, the short story she conceived was predicated of the notion as the eighteenth became the nineteenth century that electricity could be a catalyst of life.   In her introduction she recalls the talk about Erasmus Darwin, who had preserved a piece of vermicelli in a glass case, till by some extraordinary means it began to move with voluntary motion," (Joseph vii).   The extraordinary means forms the basis for Frankenstein.   Many people also believe that a nightmare that Mary Shelley had could also be partly responsible for the creation of the novel.      Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   At the time the novel was written, England was on the brink of leading the Industrial revolution in Europe.   The experiments of Huntsman (crucible steel manufacture), Newcome (steam-powered pumps), and Cochrane (coal tar production) throughout the eighteenth century in England were decisive in the initial transformation of England into an industrialized country (Burke 137, 173, 195).   The emerging age of technology appears to have found followers throughout the culture and to have become firmly reinforced by the time   Frankenstein was written.   Eric Rabkin (author), says that in England early in the eighteenth century, "there exist a populous discourse community that accepted the rhetoric of science" (Rabkin 39).   This rhetoric has proof extending back to the English Renaissance. Those sensitive to change and those prepared to embrace a rhetoric of change need not be scientists.   While scientists address a discourse community of scientists, novelists   Ã‚   address a wider discourse community of the literate.   If we can accept the earlier   argument that science and poetry are not ontologically antagonistic, then we might well hope to find fictional uses of the rhetoric of science .

Monday, August 19, 2019

Jeannie Brown and Invasive Group A Streptococcus :: essays research papers

our everyday lives bacteria is constantly surrounding us, some of the bacterium that we encounter are beneficial to us but then there are the ones that are severely detrimental to our health. The way that they effect a persons body can differ from person to person. Many of the â€Å"microscopic foes† are very resilient and have a very fast reproduction rate. Not only do they reproduce quickly they sometimes seem to outsmart our immune system and not allow our bodies to fight the infection making it almost impossible to stop them. One thing that a lot if people rely on is the assistance of prescription drugs to get them better but even the drugs are not being effective and we can’t stop the pathogens from invading our personal places such as work, home, school, or anywhere. Even though modern medicine is advancing the pathogens could still get the get the best of us. The scary thing is we never know when the next pandemic or epidemic is going to arise. All it needs is s ome ordinary microbe to swap genes with a deadly germ to produce a â€Å"super pathogen† and it could happen to anyone, anywhere, as it did to Jeannie Brown who is from â€Å"our neck of the woods†. Jeannie Brown was a hard working thirty- two year old woman from Canton North Carolina. She worked two jobs to make ends meet at home for her and her ten year old son. Jeannie was insecure about her recent weight gain and that caused her to get sucked into depression. Not only was she stressed and depressed she also had high blood pressure which she was taking medication for. Jeannie needed a break and she decided that she was going to take one and go to Myrtle Beach with one of her friends for a relaxing three day weekend. After they got settled in at the beach Jeannie changed into her bathing suit and it was then when she noticed an unfamiliar feeling in her neck and behind her left ear. She also said that she felt as if there was a knot in her neck. Jeannie then asked her friend if she noticed anything different. There were no visible signs that would make them come to the conclusion that anything significant was wrong with her. Not â€Å"overreacting† to the situation they came to the conclusion that Jeannie had probably slept funny the night before, so they continued with there day relaxing on the beach.

Sunday, August 18, 2019

How to Handle the Situation After Missing a Test or an Important Assign

How to Handle the Situation After Missing a Test or an Important Assignment If you have ever missed a test or failed to turn in a major assignment on time, then you know that the longer you’ve been gone, the harder it becomes to work on that late project. What can you do to break the cycle of avoidance and delay? Realize that your absence weighs heavier on your mind than the other person’s. Advisors are not losing sleep over late dissertation proposals and journal editors aren’t agonizing over missing manuscripts. The project is more important to you than anyone else. Remember, when you do get in touch, the person is unlikely to be angry and punitive. We tend to be much harsher about our own tardiness than we are about other people’s delays. Advisors know it is difficult to write dissertation drafts. Journal editors are accustomed to academics who take a long time to turn around R&R manuscripts. Lower rather than raise your standards when you’re running late. Don’t try to make your work more polished to make up for taking so long. Just try to get something sent out for feedback. End the cycle by chanting to yourself â€Å"A done dissertation is a good dissertation† or â€Å"A published paper is the only paper that counts.† Get in touch even before you have the â€Å"completed product† ready for review. Try to get in touch as soon as you know that you are going to miss the deadline. Let the person know that you are working on your project. Facing your fear of the other person’s disapproval and re-establishing contact, will help lower your anxiety so that you can get back to work Beware of setting deadlines you won’t be able to meet. If you are running late with a project, and you decide to resume contact, try not to set yourself... ...or the point. You’re late. You’re sorry. You’re now doing your best to complete the project. Try a â€Å"practice run† before clicking on the send button. I often advise coaching clients to write a draft of a difficult email without typing in the address to prevent sending an unfinished message accidentally. Often, clients report that once they’ve drafted a short ‘hello’ it feels surprisingly easy to send the email. Keep in mind that even if you get a negative reaction when you revive contact, at least you’ve faced your dread of the unknown. Anticipating how the other person may respond to your missed deadline can feel like a black hole of potential admonishment. Even if your advisor or colleague is angry, at least you can begin to repair the relationship rather than allow resentment to fester. Get in touch and get it over with. You are likely to experience relief.

Saturday, August 17, 2019

Al Qaeda in the Arabian Peninsula Essay

Stability in the Arabian Peninsula region has been a concern for the United States for some time now. AQAP poses a direct threat against the U.S. and U.S. interests of Stability and Security in the Arabian Peninsula. This instability and threat is why I have chosen the AQAP as the FTO to research making the next attack. The AQAP comes from the merging of the al Qaeda cells from Yemen and in Saudi Arabia. There are approximately one –two hundred members, with thousands of supporters. The merger took place in January 2009, due to the success of the Saudi Arabian government in destroying al Qaeda’s infrastructure in the Kingdom of Saudi Arabia. AQAP is a subsidiary of the al Qaeda, whose center of gravity is in Pakistan and Afghanistan, but works independently of its parent organization. Since formation occurred, they are responsible for a number of attacks on the â€Å"West† and are considered responsible parties of the â€Å"UPS and FEDEX cargo bombing attemptsâ €  (Kurczy, 2010). They were deemed a terrorist organization on December 14, 2009, by U.S. Secretary of State Hillary Clinton. (Gerstein, 2010). Prior to the formation of AQAP, al Qaeda claimed responsibility for numerous attacks in Saudi Arabia and Yemen. Those attacks include: the 1993 attack on World Trade Center, 1998 suicide bombings of Embassies, the 2000 bombing of the USS Cole, and the 2008 car bombing outside the U.S. Embassy in Sana’ killing 19 people including 6 of the terrorists (Poland, 2005 ). AQAP has claimed to plan on targeting oil facilities, tourists, and security forces in the future. It is believed though that AQAP provided spiritual guidance by U.S. Citizen Anwar al Awlaki to U.S. Army Maj. Nidal Malik Hasan, who was the gunman behind the 2009 Ft. Hood killings and the December 2009 attempt to down a passenger airline to Detroit. Responsible parties to these terroristic events are said to be that of the top five â€Å"key leaders† of AQAP. These men include are in order of their rank from the top spot of leaders to the last. 1. Ibrahim Hassan al-Asiri, aka the bomb maker. He is believed to be the creator of the bombs intercepted in October last year on cargo planes. 2. Anwar al-Awlaki, aka the chief ideologue. He is suspected of being part of three unsuccessful terrorist attacks to include the Fort Hood Shootings (Bryant, C., & Kasinof, L., 2010), bombing attempt on airliner jet on Christmas, and the Times Square bombing on May 2. 3. Said Ali al-Shihri, deputy chief of AQAP. He is suspected of participation in  September 2008 US Embassy attack and the kidnapping of nine missionaries in June 2009 according to Fox News. 4. Qasim al-Raymi, military commander. He followed Osama bin Laden’s lead on media releases â€Å"building an ever-more sophisticated propaganda arm for al Qaeda in Arabian Peni nsula† (Kurczy, 2010). 5. Nasir al Wuhayshi, head of AQAP. Known as the personal secretary of Osama bin Laden (Kurczy, 2010). Most of AQAP is made up of fighters that returned from Afghanistan during the Russian invasion and fighters that have been serving in Iraq and Afghanistan. They lure new recruits who are sympathetic to al Qaeda and have animosity towards the U.S. and western nations. The recruiting pool is vast in the region with fighters fleeing Iraq and Afghanistan and relocating to Yemen and Somalia. Both countries have weak central governments that are conducive for lawlessness in the region and have vast ungoverned territory. Government cooperation with American counter-terrorism efforts has historically been spotty and portions of both populations are hostile to the United States. (Kerry, 2010) AQAP aims to overthrow the Yemeni government for its support to the U.S. and its offensive operations against al Qaeda. The group also emphasizes its global ambitions and desire to target western interests within the region. Additionally, AQAP has stated it will focus on cutting supply lines of western nations supporting Israel and looks to expand its influence throughout the region (Boucek, 2010). The animosity against the western nations continues to grow, as does the technology and ideas for new weapons. The newest information is that a poisoned perfume plot against religious and government officials was prevented due to arrest of 149 al Qaeda suspects. This is just an example of the creativity AQAP has come up with. Last summer the country’s Deputy Interior Minister had been attempted to be assassinated by a bomber with the weapon in his anus (Rawnsley, 2010). These weapons are just the newest form used by AQAP. Yemen has emerged as a major staging base for al Qaeda and other likeminded groups for attacking American targets within Yemen as well as to reach targets outside of Yemen including the United States. U.S. officials have warned that al Qaeda in the Arabian Peninsula was a growing threat even before the failed 2009, Christmas Day airline bombing attempt (Kerry, 2010). In February 2009, Director of National Intelligence Dennis Blair stated that, â€Å"Yemen is reemerging as a jihadist battleground and potential regional base of operations for Al Qaeda  to plan internal and external attacks, train terrorists, and facilitate the movement of operatives.† (Rollins, 2010). The threat coming from AQAP is greater than the threat coming from al Qaeda’s central leadership located in Pakistan. AQAP is increasingly a more pressing concern for U.S. national security. AQAP has relative freedom of movement in the Arabian Peninsula and region which allows for its ability to increase its ranks through recruitment as well as its ability to train new recruits. Additionally, AQAP has also shown its ability to influence other like-minded individuals to conduct attacks to our homeland with little to no warning. AQAP has proven it has the means and capability to attempt to conduct attacks globally although it has yet to be successful. It is only a matter of time before they possess the ability and trained personnel that are able to conduct something equal to or greater than the attacks against the United States on September 11, 2001. AQAP poses a direct threat to the U.S. and U.S. interest of stability and security in the Arabian Peninsula. AQAP is capable of every threat that has been uttered against the US and western countries. The US as well as the other western territories that are considered allies against AQAP, can end or at least moderate the terroristic threat by â€Å"interdicting terrorists, disrupt their planning, restrict their travel, reduce the flow of financial (EO 13224 signed 9/23/01) and material support to terrorist groups, and enable partner governments to assert control over weakly governed territory where terrorists find sanctuary† (US Department of State, 2005). The Antiterrorism Assistance program is a well used deterrent against FTO’s such as AQAP. The AQAP became a bigger threat than al Qaeda, and the instability and security issues within the Arabian Peninsula are threats we must contend with. With the knowledge and training gained since the imperative attacks on American soil in 2001, we can deter and detain these terrorists and protect our homeland and allies. The ideologies and animosity against the US and other western nations are targeted towards the recruiting of others who sympathize with al Qaeda. Preemptive and retaliatory methods are other forces to use to impede the AQAP’s threats and/or attacks. It is also noted in the Country Reports that by American’s helping partner nations in the quest for improving their abilities to detect and prevent terrorist activities this will clearly enhance the overall security of all nations (US Department of State, 2005). References Boucek, Christopher (2010). Terrorism out of Yemen. Carnegie Endowment for International Peace. Retrieved from http://carnegieendowment.org/publications/index.cfm?fa=view&id=41705 References Bryant, C., & Kasinof, L. (2010, October 29). Suspicious UPS, FedEx packages raise new concerns about Al Qaeda in Yemen. Christian Science Monitor. p. N.PAG. Retrieved from EBSCOhost CPJ. (2008, April 15). Iraq: Journalists Abducted 2003-09. Retrieved March 15, 2011, from Committee to Protect Journalists: Defending Journalists Worldwide: http://cpj.org/reports/2008/04/abducted.php. Gerstein, Josh (2010). Clinton named Al Qaeda Yemen as terror group. Politico. Retrieved from http://www.politico.com/blogs/joshgerstein/0110/Clinton_named_AlQaeda_Yemen_as_terror_group_a_month_ago.html Kerry, John (2010). Al Qaeda in Yemen and Somalia: A ticking Time Bomb. Committee on foreign relations United States Senate. Retrieved from http://www.fas.org/irp/congress/2010_rpt/sfrc-aq.pdf Kurczy, S. (2010, November 2). Five key members of Al Qaeda in Yemen (AQAP). Christian Science Monitor. p. N.PAG. Retrieved from EBSCOhost. Poland, J. (2005 ). Understanding terrorism: Groups, strategies, and response s 2nd edition. Upper Saddle River: Pearson. Rawnsley, A. (2010, December 7). Danger Room What’s Next in National Security. Retrieved March 15, 2011, from Wired: http://www.wired.com/dangerroom/2010/12/al-qaedas-latest-weapon-poison-perfume/ Rollins, John (2010). Al Qaeda and Affiliates: Historical Perspective, Global Presence, and Implications for U.S. Policy. Congressional research Service. Retrieved from http://www.fas.org/sgp/crs/terror/R41070.pdf US Department of National Security. (2006). The National Security Strategy of the United States of America. Washington DC: USDOS. US Department of State. (2005). Country Reports on Terrorism 2004. Washington DC: US Government.

Friday, August 16, 2019

Female Gender Role and Video Games in the Modern World Essay

Video games are an electronic game that involves human interaction with a user interface to generate visual feedback on a video device. Sixty-five percent of the households in the U. S play video games and two out of five gamers are female. Approximately ninety percent of video games feature men on their covers, and most of the women that are shown on the covers are portrayed in sexual and seductive ways. Female gender roles in video games are primarily presented as sexual object prizes and victims, but on the other hand male gender roles are shown as heroes, villains, and SUPER STRONG! Even the story of the most popular videogame â€Å"Super Mario† is about a hero saving the princess from the super villain Bowser, the male turtle-like monster. This reveals that female gender roles in video games are dependent on men, and women are portrayed as weaker than male gender roles in the game. The battle of equality has been fought by women throughout the generations and cultures, and has now reached the video game industry. If we look at outcomes, women have prevailed in most industry statistics, and there is no reason to believe that their right to be respected, their leadership roles within the games and as well, their ability to produce and develop games within the market place will not be denied. In Katherine Fletcher’s piece â€Å"Confessions of a call of Duty girl: Women in games today, she says that, â€Å"about 40% of the gaming population is made up of women, yet we are severely under represented and if we are represented it is in an overtly sexual way. (Fletcher, 2010) To repeat a commonly held phrase, sex sells, in the gaming industry. According to Fruzina Eordogh, â€Å"Sexually charged conversation is the dominant voice,† (Eordogh) apparently, male gamers want to see â€Å"boobs and skin†. Women who are gamers are frustrated by the lack of respect for their gender playing and creating the games in an organization that, according to Fletcher’s, â€Å"seeks to a ddress the industry’s gender awareness about women in the games industry,† (Fletcher,2010) the hope that this organization will develop a fuller understanding of games and game playing associations. Video games are played globally and have the opportunity to educate cultures about gender equality within the game as well as the equality of game creators. The initial audience for video games was males and focusing on the younger generation. The people making the games were men, starting in their basements; some were professional programmer, hobbyists, and women came late to the math, science and technology related fields, so the men had the advantage from the beginning. Today the gaming industry is a huge global market with 67 billion achieved in 2012, and new reports forecast 82 billion by 2015 easily. It is obviously clear that women will work to be a part of this gaming industry as they were in the growth of film and television. Today there is greater gender equality in the acting profession as well as in production. It is to be noted that today more and more female characters are demonstrating a strength that writers and developers have previously denied them. The field can be challenged when, â€Å"EA Sports, responsible for the lion’s share of sports video games, was recently called out by a 12 year old girl for continually failing to include woman in its smash hit FIFA soccer series and the presence of hyper sexualized female characters is hardly a thing of the past. † (Morris, 2013) Things are changing even in the parts where they aren’t the star in the game; female characters are showing strength and character development. It will take time and constant vigilance for women to achieve gender respect and equality in the field It is interesting to note that women are enjoying the art of playing games. The average age of a gamer is 30 years old and has been playing for at least 12 years. 68 percent of all gamers are 18 years of age or older. 47 percent of players are women, and women who are 18 years of age are over one of the industry’s fastest growing demographics. Another interesting fact is that today, adult women represent a greater portion of game-playing population than boys age 17 or younger. With this demonstration of women involved in playing games, there must be greater sensitivity in gender roles in the games. Women will not put up with old stereotypical attitudes in these games. As their playing numbers increase women will become responsible for making financial decisions that will affect the success or failure of products. If women are not respected in gaming roles, they will make their preferences felt, and the number of sales for a particular product will fall short. As the gap between numbers of gender gamers lessens, the industry ill have to look at the decision of targeting or, creating female- targeted games similar to male targeted games. Possibly the goal should be gender neutral games. to encourage the creative role of women producers in the industry. The development of games that are gender neutral will probably end up to be the industry’s choice. There will always be a small percentage of male and female gamers that prefer the old style stereo typi ng of men and women, but as education today encourage gender neutrality, the majority of gamers will enjoy the neutrality of games. Women will be encouraged to move in to the leadership field with the exiting challenges of creating new products. As in any new field, confusion as to direction can make or break the bank. There is still discussion in the boardrooms about male and female directed games. Some female developers are working on female- only games and are calling them â€Å"the games by girls for girls. † These have been supported by companies such as her Interactive, Girl Games, Girl Tech, Silicon Sisters, and Purple Moon. These are female owned and female staffed. These companies hope to stimulate a female- only market stressing on the fundamental differences between what girls want and like as do boys want and like in gaming. It is of interest to note that older female gamers prefer the gender neutral games. The Wii game has certainly introduced the females to this type of gaming and it has been hugely financially successful. Financial success is always the deciding factor in the market place, and it makes sense to target the untapped female gamer population rather than restricting the market to males only. Keith Stuart, writer for The GuardiN introduces his Article by saying,† Nearly half of the UK’s video game players Re women, and now they are designing and writing them too, in lauding top sellers Gears of War 3, Deus Ex: Human Revolution, as well as Uncharted 3. These three were the biggest game releases last year, and all were written by women. Siobhan Reddy, Studio Manager at Media Molecule says that, â€Å"games development is becoming more appealing to girls as a potential career. † Women have grown up with technology all around them, and in an era where entertainment, games and music are combined. In conclusion, women are growing in the video game and not so dependent on men as leaders. In the singing, men use females in games as sexual objects and remained the hero-who-saved-the-women. As the time keeps passes, our generation enjoys and needs more and more gender neutral games. The sexual exploitation of women in gaming will become a thing of the past in the production of mainstream games, and there will continue to be steady growth in the female production of games. Women went through their struggle in film and television and are well-respected in this industry. There is a beginning recognition of respect for women who are pioneering this gaming industry. The populations of female gamers are rising every day as well, and some day in the future they may even outnumber the male gamers; and most of the game programming companies will do what the â€Å"money† says. So, I can guarantee you that in the near future there will be the same number of female gender video games as the male gender video games and that is gender equality. We will see more and more women in the production field, developing wonderful products for men, women and children.

Thursday, August 15, 2019

Prison Health Care Agency Essay

There are many facets in the health care industry. Examples include hospitals, urgent care centers, physicians’ offices, medical labs, and more. One not really spoken about, is the prison health care system. Prison health care is the medical treatment of inmates in the United States Correctional Facilities (Means & Cochran, 2012) this is according to the report. The National Commission on Correctional Health Care (NCCHC) is a federal agency that oversees the medical needs of prisoners. According to the Bureau of Justice Statistics, â€Å"In 2012, the number of admissions to state and federal prison in the United States was 609,800 offenders (Carson & Golinelli, 2013). With these prison inmate statistics, clearly there is a need for health care in the prison system. The NCCHC is a federal agency that was constructed to improve the quality of health care in the prison setting. The NCCHC was founded in the early 1970’s. The American Medical Association (AMA) executed a study on the conditions of jails. The AMA found â€Å"inadequate, disorganized health services, and a lack of national standards† (National Commission on Correctional Health Care, 2013). The National Commission on Correctional Health Care states their mission is to improve the quality of health care in jails, prisons, and juvenile confinement facilities. They support their mission with the help of other national organizations, mirroring the fields of health, and law and corrections, examples include The American Bar Association, The American Medical Association, The Academy of Pediatrics, and The American Dental Association. The NCCHC cannot fulfill its’ mission without the proper structure within the agency. This organization is comprised of accreditation and facility services, health professional certification, education and conferences, standards and guidelines, and a board of directors from supporting organizations. These supporting organizations play a role in helping the NCCHC fulfill its’ mission and roles for the prison health care system. The board of directors role is ensuring all guidelines are adhered to and assessing the overall direction and strategy of the organization. The NCCHC  has many roles and standards for their organization. One of the most important is patient safety. Put in place are patient safety systems to ensure prisoners are receiving proper care. Another role of NCCHC is continuous quality improvement. Continuous quality improvement is the process of requiring each prison facility to complete a process study on inmates needing health care services. â€Å"Process studies examine the effectiveness of the health care delivery process. Outcome quality improvement studies examine whether expected outcomes of patient care were achieved† (Rechtine, D., 2008). There must be a review in the event of a patient’s death. Proper procedures must be followed. The NCCHC requires health care professionals to continue their education by completing annual certification classes. Initial health assessments must be performed on each new inmate within 7 days of arrival to the facility. These health assessments are to be given by board certified and trained registered nurses or midlevel practitioners, followed by a physician’s review. If a prisoner is at risk for suicide, there is a prevention program in place with treatment plans. Any inmate with special needs requires an individualized treatment plan provided by a doctor. The NCCHC has put in place a chronic disease program for inmates, which requires the physicians to document in a patient’s medical chart, making sure they are following the correct disease procedures. The impact that NCCHC have on health care is one that relates to their mission. The mission, role, and impact has a direct association with each other. Providing quality health care for incarcerated individuals. The commitment to continually improve health care in confinement facilities, to help these correctional facilities in improving their inmate’s health and the communities that they will return to, increase the efficiency of health services delivery, strengthen organizational effectiveness, and reduce the risk of adverse legal judgments (NCCHC, n.d.). â€Å"NCCHC offers a broad range of services and resources to help correctional health care systems provide efficient, effective, and high-quality care† (NCCHC, n.d.). An example of the National Commission on Corrective Health Care carrying out a duty is the commitment to treating inmates in a humane manner. The NCCHC, in partnership with supporting organizations, including the American College of Physicians, the American Medical Association, the American Nursing Association, the American Bar Association, the American Psychological Association, the  American Psych iatric Association, and the American Public Health Association. Through the standards the NCCHC has set, has persistently declared the components of a policy against mistreatment. â€Å"The Standards for Health Services in Prisons (2008) preclude, for example, health staff participation in non-clinically ordered restraint and seclusion, except to monitor health status (P-I-01 Restraint and Seclusion), or in the collection of forensic information (P-I-03 Forensic Information). They require informed consent of the patient for â€Å"all examinations, treatments, and procedures† and recognize the patient’s right to refuse treatment (P-I-05 Informed Consent and Right to Refuse), and protect inmates as subjects in human research (P-I-06 Medical and Other Research)† (NCCHC, 2012). â€Å"Other standards require medical autonomy in clinical decision making (P-A-03 Medical Autonomy), maintenance of confidentiality of health information (P-H-02 Confidentiality of Health Records), and patient privacy (P-A-09 Privacy of Care). NCCHC standards require documentation of patients’ health status at each encounter (P-H-04 Management of Health Records), with special attention to the medical and mental health of inmates under close confinement (P-E-09 Segregated Inmates)† (NCCHC. 2012). In regard to health care, the NCCHC has the best standards of care and are the most recognized and accepted. Medical personnel for the prison system must follow the policies and procedures set in each facility. These policies and procedures allow guidance, standardization, and consistency in practices, a nonfulfillment to comply with these rules and regulations places the nurses, patients, and institutions at risk. The NCCHC has the authority to establish that these policies and procedures are followed by all correctional medical personnel. â€Å"Policy topics are wide ranging. Applicable laws and standards should be incorporated into institutional policies, procedures and protocols for the correctional nurse. For example, they should reflect federal and state regulations for reporting public health concerns, conditions of abuse, rape, communicable diseases, trauma, unexpected and expected deaths and care of the mentally ill. Regarding standards, NCCHC standards address topics such as access to care, quality improvement, grievance mechanisms, patient and staff safety, medication services, screening and assessment, patient restraint and much more† (NCCHC, 2012). The NCCHC has a process for accreditation, certification, and authorization. The NCCHC offers a  voluntary accreditation health services program. They have offered this program since the 1970’s. The NCCHC has standards in place as a guide for any correctional facility to follow. The process of accreditation involves an external peer review to determine if the correctional institutions can meet the standards in their provision of health services. â€Å"The NCCHC renders a professional judgment and assists in the improvement of services provided† (NCCHC, 2012). NCCHC provides an Opioid Treatment Programs (OTP) for accreditation. OTP accreditation allows OTPs to achieve legally required certification from the Substance Abuse and Mental Health Services Administration (SAMHSA) of the United States Department of Health and Human Services. â€Å"The only SAMHSA authorized accrediting body that focuses on corrections, NCCHC has developed standards that are based on federal regulations but tailored for this field† (NCCHC, 2012). The NCCHC has accreditation surveyors that are formed of nurses, experienced doctors, health administrators and other health care professionals who have knowledge of the correctional system. The survey team reviews any medical records, including policies and procedures, interviewing of staff personnel, and inmates are included, along with touring the facility. There is an exit conference conducted at the end of the survey to talk over the primary outcomes. Specially trained surveyors visit correctional facilities seeking accreditation to measure compliance with NCCHC standards. These individuals share their time and knowledge because they are committed to the cause of improved quality in correctional health care (NCCHC, 2012). To become an NCCHC surveyor, one must complete 5 years of experience in correctional health care, a CCHP certification (or receiving one in a year), and the drive to participate in preparatory and follow on training. Surveyors must be health care professionals. Examples include, Medical Doctor (MD), Doctor of Optometry (DO), Doctor of Dental Surgery (DDS) Doctor of Dental Medicine (DMD), Nurse Practitioner (NP), Physician Assistant (PA), and Registered Nurse (RN), or have a Master’s degree. The utmost important requirement of a NCCHC surveyor is the need of devotion and obligation to improving the quality of correctional health care. References Carson, A., & Golinelli, D. (2013). Prisoners in 2012: Trends in Admissions and Releases, 1991- 2012. Retrieved from: http://www.bjs.gov/index.cfm National Commission for Correctional Health Care. (2012). Promoting Excellence in Health Care: About NCCHC. Retrieved from: http://www.ncchc.org/about/index.html Rechtine, D. (2008). NCCHC’s New Standards and the Role of the Physician. Retrieved from: http://societyofcorrectionalphysicians.org/corrdocs/corrdocs-archives/summer-2008/ ncchcs-new-standards-and-the-role-of-the-physician U.S. Department of Justice. (2012). About the Bureau of Prisons. Retrieved from: http://www.bop.gov/about/index.jsp