Sunday, December 29, 2019

The Annual Yulin Dog Meat Eating Festival - 1018 Words

Exploratory Essay The annual Yulin Dog Meat Eating Festival in Yulin, China has been a popular topic of discussion for Animal Rights Activists in the last few months. This festival consists of thousands of dogs ... be[ing] butchered, beaten to death, skinned alive and eaten, every June, a tradition that has happened for many years ( STOP THE YULIN, 2014). This petition on Change.org has raised over 4,355,743 signatures as of today, even though the festival for this year has already occurred. This type of support is monumental, but what about the animals that are tested on in United States labs every year? The topic of animal experimentation has been around for much longer than this recent topic and yet, it is still an issue. Efforts should be used to find out the exact process of animal experimentation along with the reasons, results and alternatives to the experiments. Even though there are many books and articles about animal experimentation, the actual process of it seems to be elusive. Many articles either defend or protest against the topic, but few articles actually delve into the actual happenings of the experimentation. A book by William I. Gay and James E. Heavner explains how animal selection for the experiments are chosen. Species characteristics [such as] size, temperament, anatomy, and physiology should be evaluated. For example, rabbits have insufficient blood volume to permit most..[experiments], while the blood of dogs may be too thick forShow MoreRelatedAll Animals Are Equal By Peter Singer1915 Words   |  8 Pagesjustifiable. Utilitarians believe that humans should do what maximizes pleasure and minimizes pain, so while the cows may have an immediate interest in avoiding suffering, they have lived a happy life and have no concept of death, so painlessly killing and eating them would not be morally wrong. Sentientist Kantians would also believe that there is nothing wrong with killing the cows for food because Kantians believe that, given that there was no cruelty involved with raising and killing the cows, the cows

Saturday, December 21, 2019

Plagiarism Discussion Questions - 1079 Words

Question Define plagiarism in your own words. What do you think plagiarism means? Illustrate your discussion with hypothetical examples. Why is plagiarism a serious problem? What is your opinion of the impact of the Internet and all its resources on academic integrity? How can plagiarism be avoided? One definition of plagiarism is that it is theft of intellectual property. Do you agree with this assessment? Why or why not? What suggestions would you offer to eliminate both inadvertent and deliberate plagiarism? Plagiarism is incorrectly attributing words or concepts to your own inventiveness, without giving appropriate credit to the originator of those words or ideas. The most obvious example of plagiarism is copying the words of others without inserting a footnote, endnote, or other form of citation in a research paper. Professional journalists and writers as well as students have been found guilty of plagiarism, when they incorporated the words of others into their prose, and did not give credit to the original source. Merely changing one or two words does not absolve someone of plagiarism. It is also plagiarism if you paraphrase the words or ideas of an author and do not give that person appropriate credit. It is more difficult to identify plagiarism regarding paraphrasing or the ownership of ideas (versus directly-quoted words). What constitutes an original idea is often hotly debated. For example, Shakespeare seldom used original plots. The author of theShow MoreRelatedJust Following Orders Essay1390 Words   |  6 PagesWEEK 3 Discussion Question 1: Just Following Orders? Do you believe the sentence she received is just? Wasnt she simply following orders? Why did Ms. Vinson make the ethical decisions that she made? In my opinion, from the two articles read I do not believe that the sentence of 5 months in prison that Ms Vinson received coincided with her level of involvement. Ms Vinson was the Senior of Corporate Reporting Department; for two years she chooses to continue to misrepresent and inflateRead MoreArticle Information Voelker, T. A., Love, L. G., Pentina, I. (2012). Plagiarism: What dont they600 Words   |  3 Pages, Love, L. G., Pentina, I. (2012). Plagiarism: What dont they know?. Journal of Education for Business, 87(1), 36-41. doi:10.1080/08832323.2011.552536 Summary In the article, What Don’t They Know? â€Å"they† refers to students of higher education in the United States. The authors’ intent was to begin filling in some of the missing pieces that exist in the empirical study of what undergraduate and graduate college level students actually know about plagiarism. The authors, college level BusinessRead MoreIntroduction to Psychology Reaction Paper Guidelines1029 Words   |  5 Pages you must also discover how the texts relate to one another. (If responding to just one text, you might need to situate it within the larger context of class discussions, readings, etc., depending on the prompt.) A reaction paper may include a discussion of interesting questions that the readings raise for the student, but such a discussion is not sufficient by itself. Preparation: Writing good response papers is more demanding than it might appear at first. It is not simply a matter of readingRead MoreStarting with Basic Essay1017 Words   |  5 Pagesthe following questions. Academic Help 1. WHAT ARE THE SIX MATH LABS AVAILABLE FOR STUDY IN THE CENTER FOR MATHEMATICS EXCELLENCE? HINT. CLICK RUNNING START BY ALEKS AND LOOK ABOVE OTHER MATH CONTENT. a. Self Assessment b. ALEKS Math Refresher c. Pre-Algebra Review d. Algebra 1 e. Algebra 2 f. Introduction to Statistics 2. Which three reviewing services are available to students through the Center for Writing Excellence? a. WritePoint b. CWE Review c. Plagiarism Checker 3Read MorePlagiarism : Plagiarism And Plagiarism815 Words   |  4 Pages There are many types of plagiarism, including several scenarios of inadvertent and deliberate plagiarism. This essay will discuss how plagiarism is defined, the various types of plagiarism, why plagiarism is such a serious problem, the impact of the internet on academic integrity, and how plagiarism can be avoided. It will also provide suggestions on ways to eliminate both inadvertent and deliberate plagiarism. There are several ways to define plagiarism. One such definition, according to the RegisRead MoreDiscussion 5 6718 Words   |  3 Pagestrademark apply? A. Symbols representing a product 14. It s important to keep organized notes when performing research because doing so will help you A. avoid plagiarism. 15. Some information that should be included on a note card to help you organize your research should be D. author, title, journal, date, and Web address. 16. Self-plagiarism occurs when you C. turn in one assignment for more than one course. 17. MLA is an abbreviation for which organization? A. Modern Language Association 18. APARead MoreSdffdgdfgfdg1230 Words   |  5 Pages | | | |8 Discussion Boards @5 points each=40 | |Discussion Boards (8) |points | | Read MoreResearch Articles On A Primary Literature1049 Words   |  5 Pagestermed as standard scientific articles. Since primary literature is an original report of study; it includes the research, an abstract, introduction, the materials and methods of the study, the data and results obtained from the collected data, the discussion of the results and finally the article ends with a list of references that were used in the study. A different type of journal article; not very different from a research article is called as a Review Article. So a review article is a report thatRead MoreCurrent Conditions And Desired Conditions1421 Words   |  6 Pages Table of Contents Discussion of Instructional Problem 3 Current Conditions and Desired Conditions 3 Data Collection Process 4 Discussion of Data Collection Instruments Used 4 Discussion of Sources of Data 5 Data Gathered Through Other Sources 6 Results of Data Analysis 6 Data Analysis Techniques Used 6 Results of Analysis 7 Table 1 7 Table 2 8 Table 3 9 Findings of Needs Analysis 10 Need for Instruction 10 Goal of Instruction 11 Appendix A: Student Pre-Assessment 13 Appendix B: Teacher SurveyRead MorePreventing Plagiarism When Writing A Research Paper980 Words   |  4 PagesPREVENTING PLAGIARISM WHEN WRITING In a research paper, you have to come up with your own original ideas while at the same time making reference to work that s already been done by others. But how can you tell where their ideas end and your own begin? What s the proper way to integrate sources in your paper? If you change some of what an author said, do you still have to cite that author? Confusion about the answers to these questions often leads to plagiarism. If you have similar questions or are

Friday, December 13, 2019

Nightmare in the city Free Essays

It was a cold dark night in metropolis, a large city just outside of New York, USA. The year is 2199 and the dawning of a new centuary is apon us with great delight to most of the million citizens or so that live here. But in the ranks we were more worried about the mass killings that strangely occur this time every hundred years. We will write a custom essay sample on Nightmare in the city or any similar topic only for you Order Now I am an underground detective that investigates for the police â€Å"The names Brody, Detective Brody,† I said to the new Detective sergeant of the NYPD. â€Å"It’s good to meet ya, Kid,† the new sergeant growled at me through the thick black smoke of his cigar. My first impressions of the character were one of trust and one of dress sense, which in both cases he had none of. I left the police station at about 10.30pm and took a back alleyway back to my apartment on 7th and 4th street when I noticed that every street lamp went out the moment I walked past, it went out â€Å"funny,† I say to myself aloud and carry on walking by the lights which still went out every time I walked past them. I had only experienced this once before in my lifetime but I was as usual under the influence of my favourite tipple at the time, Thankfully today I was sober. Then suddenly I heard a cry, a loud screeching noise a few hundred metres away dead ahead of me, I knew this alleyway well I used it every day. There was no way anyone could be attacked down this alleyway, but then again the excitement of the next few hours as the clock strikes twelve made me very apprehensive, so I ran down the alleyway to find out what had happened. I ran for about two minutes then I tripped over a large object on the floor I looked around and I found a woman on the floor unconscious and bleeding heavily so I instantly called an ambulance to help come and pick her up. Buy the time they arrived she was dead. No one knew who was there on site could understand her cause of death, No impact wounds on the head or body which could have caused the blood, No gunshot on her body, nothing. This got me even more worried. I got home about two hours later, the shock of seeing someone in that condition made me sick. Who or what as the case could be did this to such an innocent person. When I got into my bedroom I fell onto my bed and slept, as I was not in the party mood after this little fiasco. I woke up several times in the night as the partying kept me awake for hours at a time then before I knew it my alarm woke me up at about 7.30am before I got dressed I wrote a list of what I could do to help the poor ladies family. I finished my list had a wash and got changed I then sat down for breakfast I sat watching the holoscreen to see if the killings of last night had been better or worse than last time. The reporter informed me that the killings were ten times as bad as last time and that you should avoid going out at all costs. Unfortunately my time had come to leave the warm comfort of my home and headed downtown to my office on 12th and 9th. I left my apartment with caution, as you don’t quite know what is going to happen at this time of year. As I left the tatty main door to the block I saw all of the wonderful displays that all of the children had made for the city up in flames. They looked like old torn clothes rather than wonderful display of affection to the community. It looked like a scene from an old space movie where only the star was left after they destroyed the planet. The city even had the red glow of the fires that were here and their, as the fire robots tried to extinguish them How to cite Nightmare in the city, Papers

Thursday, December 5, 2019

Analysis of Network Architecture

Questions: You are required to produce the following deliverables as part of your contract: 1. Analyse the network and enlist all vulnerabilities found. 2. The vulnerabilities identified in the network architecture from (1) above should be explained in detail. 3. Provide recommended improvements to the network architecture in order to harden the entire network and to fix the vulnerabilities identified above. 4. Draw the improved network architecture. 5. Based on a rough estimate of the number of operating devices at the Perth HO and the Port Hedland Offices, as well as the network bandwidth, estimate the network traffic intensity during a given time of the day (approximated in numbers). Is there any bottleneck identified on this link that can be exploited by the adversary for launching a DoS attack? If so, propose a solution for countering this threat. 6. Create a JMeter profile to generate network traffic with intensity calculated in (5) above. 7. Generate the network traffic based on the profile from (6) above. 8. Capture the generated network traffic using Wireshark. (Hint: Run Wireshark on a separate virtual machine from JMeter). 9. Write-up network security policies for the resources of the network (devices and technologies). Do not write access policies for end-users rather define policies appertaining solely to the network architecture. Answers: 1.0 Introduction The days are gone for the individuals thats they need do need to determined anything early with respect to workstations for operating the work and they need to follow the complex work processes that is involves various physical devices for each and every single communication or interaction among their workstations. Even if we look at Two decades ago, IT (Information technology) and Computer networking have changed the way the world operates and how the individuals are fit inside it. The working hours are now not been restricted in firm or a corporate and the area of influence to the environmental location of their workplace. Irrespective of the political lines doing or operating business has become almost independent (Shen, 2013). All the individuals in the enterprise are now looking to be linked up with one another through internet and any other connections they so considered specifically at all location and time period. It has become hugely specialized as far as its functionalities are concern and the concept of the workplace has been completely differs that it is no more a mandatory meeting point for any task that is been done. It is been expected that any individual can perform any task based on their own devices as now a days everyone has one computing device for sure. Considering a scene that everything can be smooth and polished and we have to prepare ourselves to handle such huge amount of vulnerabilities and risks that have come in the same package as technological enhancements. They try to protect by keeping themselves checked every now and then (Xu, 2016). If we look at the requirements of old ages then we can easily put a correspondence or comparison between the network protections. Everything needs to be done in this case such as counter measures for different attacks needs to be put in the areas, regulation of traffic, blocks needs to be drawn up, the different entrance points needs to be checked. To protect such incident there is the only possibility with regular or consistent vigilance and sufficient preparation. 2.0 Solution and Details 2.1 Windows Server 2008 Windows server is one of the operating system from Microsoft and is completely depends on Windows Vista similar code. Windows Vista functionality and architecture is similar with Windows server and when if we review the installation of complete graphical user interface as Windows vista installations as it enhance the ability of server (Dugan Pruski, 2013). The launch of Windows server 2008 was highlight because of including native wireless support and IPv6 support and additionally to an amount of enhancement in general security and pace (speed). A huge amount of capabilities were included in the 2008 version of Windows Server that will assist the network administrator. Server managers, Self-healing NTFS, Failover Clustering, Windows system resource manager, Active Directory, Server core are included. For the domain of 64-bit operating system it is been marked as the entry server for Windows operating systems, moreover all other variations were released in both 64-bit and 32-bit versions (Jani Jbara, 2013). It is capable of supporting the 1TB of memory on 64-bit architecture and 64GB of memory on 32-bit architecture and it is also capable of supporting 32 single physical processor. 2.2 Windows 8 The operating system released by Microsoft is Windows 8 is a sample or attempt to unite and streamline the UI and OS platforms for all its private computing devices that includes cell phone devices. Windows NT family has been included Windows 8 as its part of a family. A huge amount of functionalities in Win-8 were cut down to User interface that is touch screen such as face or picture locking system and PINs for authentication of the user login (Chang, Tsai Chen, 2013). Latest add ups to Win-8 which includes UEFI and Hybrid Boot integration for better and quick startup, which support the close field communication and native support for Universal service bus 3.0 devices. The Win-8 protection functionalities which includes intelligent screen pushing and virus filtering, mainly controls provided by latest system backup options Reset and Refresh, Family Safety and Securing booting to protect boot kits from getting infected the system between other s. There are latest store apps and wins softwares that are provided or launched which streamline the utilization of the OS from the cell phone touch screen devices. 2.3 Windows 10 Win-10 is the new OS (operating system) for private computing applications released and developed by Microsoft. It prolonged on the older concept in win-8 that focuses on combing UI and features available to mobile users and desktop, effectively reducing the difference among the desktop devices and mobile devices and the global private computing applications (Stidley, 2012). Win 10 introduced by global apps are a proper placing up from older metro-style apps that launched Win 8 and its main objective is to process the application code to execute across Win based applications without any modifications. Win 10 launched with more protective functionalities catering to latest requirements and parallel with its mission or objectives of combining all private computing applications. This include various factors of authentication such as enhanced support for authentication related to biometric in the terms of face and iris recognition and permissions through inbuilt cameras and biometric such as fingerprint recognition if supported the fingerprint readers if available (Panek, 2015). The abilities are decoded on the selection versions of Win 10 and that allows the automatic decoding of critical information through various policies and selective rejection of access to decode the information to applications and creating hurdles running of software that is not been signed digitally through a device guard. 2.4 Red Hat Linux It is a Linux distribution that was developed by the organization Red hat and ended in 2014. It is recognize to be the first distribution in Linux to utilize the RPM package manager that is been developed originally for use with RED HAT LINUX but adapted lately and utilized many distributions in Linux. The Version 3.0.3 of RHL (Red Hat Linux) was also the first distribution Linux to support the linkable format and executable as divergent to the a.out format used by the older and other variations (Whitaker et al., 2016). It also launched such functionalities as Anaconda, it is a graphics installer which is user-friendly to use for Linux novices and have the ability of configuring firewalls and Lokkit. After the rejection was done, the Fedora assignment was included with RHEL (Red Hat Enterprise Linux) creation, thus providing the lift up to the Open source and Fedora free OS (Operating System). 2.5 Apache The most widely used web service in the world is Apache. The creation of Apace is conducted by an open source community of various developers under the foundation of the ASF (Apache Software Foundation) and at its core, the servers of apache as on HTTP daemon and as an HTTP server, but an amount of another functionalities has been included on to in the form of modules that are compiled which extended this common functionality (Minasi et al., 2013). Basic language user interface supports included Perl, Tcl, PHP and Python. Another functionality which includes SSL (Secure Sockets Layer), filtering support and a URL Rewriting module, Transport Layer Security support and so on so forth. It usage an open-source interruption and prevent modules called ModSecurity. It also provides the supports services of virtual hosting to allow an individual apache installation to handle different websites. Digital certificate authentication and password authentication are some of the authentication methods available (Tidro, Boyce Shapiro, 2015). It does not integrate in a individual architecture and does provide the support MPM (Multi Processing Modules) thus allow it to run in any one of the three different modes such as threat or process hybrid, event hybrid and process based. So here the right choice of MPM allows the Apache to be optimized for various architectures. Other recognition functionalities of apache which includes bandwidth throttling, gzip decompression and compression, IPv6 compatibility, Reverse Proxy functionality, custom logging and HTTP/2 protocol support. 2.6 MS Exchange Server It is a calendaring application as well as mail server which is been developed by Microsoft for executing exclusively on the line of operating systems of Windows Server (Chang, Tsai Chen, 2013). The actual version of this application or software was an inner mail server which is been used by Microsoft and the new versions of the application or software was launched for the basic or general utilization in the month of Oct, 2015. A huge amount of different versions of the Server Exchange has been launched over the years and it has been listed as Exchange Server 4.0, Exchange Server 5.0, Exchange Server 5.5, Exchange Server 2000, Exchange Server 2003, Exchange Server 2007, Exchange Server 2010, Exchange Server 2013, and Exchange Server 2016. The most recognizable functionality of the Exchange server of MS role is in clustering. Moreover the server exchange gives failover clustering for the exchange service, there is a individual point of rejection in the Exchange data as all the connecters in the cluster are expected to transmit the same information while using Exchange server MS (Zhu, Yang Lovinger, 2014). There are many issues that were recognized by the 2007 Exchange server, but not rely on the manufactures of storage and not fully eliminated and individual software suppliers to give the asynchronous and geo-clustering data replications to rectify the problem. 2.7 IEEE 802.11 This is bunch of basic issues and maintained by the IEEE (Institute of Electrical and Electronics Engineers) MAN/LAN regular committee for accessing media controls and physical layer terms. The rules apply to WLAN (Wireless Local Area Network) over the 60 GHz, 2.4 GHz, 5 GHz, 3.6 GHz, 900 MHz frequency bands. The brand Wi-Fi of products with respect to networking is based upon IEEE 802.11 standards. The different revisions to the standards that are 802.11a, 802.11b, 802.11a, and so on so forth, remove the older versions of the standard so as to include them and the standard stated only by the new revision. Moreover, the marketplace uses various revisions as single standards to particular abilities of their services and products. The first introduction of wireless techniques of modulation is stated in the 802.11 in the year 1997 and the latest or the present version of the modulation technique is stated by 802.11ac. The different standards each reflects the bands frequency that they can utilize and this utilization is also varies slightly on the local and country laws (Shinder, Diogenes Shinder, 2013). The work of 802.11b on the 2.4 GHz radio band frequency and utilize the same OFDM (Orthogonal Frequency Division Multiplexing) transferring scheme as was stated in 802.11a. The throughput that is average of 802.11g is about 22Mbit/s. 802.11g is completely backward compatible fir 802.11b and 802.11 standards older version is 802.11g that have been launched in the month of June 2003. 2.8 WPA and TKIP Wi-Fi Protected Access is a protocol of security and certification program with respect to security that was created by the Wi-Fi Alliance and it was created in response to serious issues that the finders exposed in the older wireless computer networking security system of WEP (Wired Equivalent Privacy). WPA has implemented a huge amount of 802.11i standard and most recognizably it usages of TKIP (Temporal Key Integrity Protocol). The basic variation among TKIP and WEP authentication is that TKIP automatically generates a latest 128-bit key for individual packets and WEP used an individual undetermined 64-bit or 128-bit key which is entered manually on all the devices and access points, thus TKIP prevents the attacks of WEP threats. Michael is a message integrity checker algorithm that is been included by WPA and it replaces the CRC algorithm of WEPs (Loschen, Stewart Lombardo, 2014). Various security threats to WPA2/WPA applications which includes WPS PIN backup, Hole 196 and MS-CH APv2 weaknesses. 2.9 BYOD Bring your own device is the full form of BYOD and the organization policy that is changing rapidly and gaining huge momentum. This rule is enabling the employees to bring their own computing applications or devices, such as tablets, smart phones and laptops to their organization and utilization of these applications or devices to enable the data that is addressed to be recognized by the organization and in the old fashion it is accessible only through the organization authenticated and provided desktop computers placed in the organization. The major drive behind such rules is that with the rise of computing and mobile devices, many workers have started to bring their devices in the office premises and they find it much easier to work on their own devices (Mavrogiannopoulos et al., 2013). Many other companies have placed a banned policy for employees to use their personal devices in the office premises but that policy completely fails. It has been observed that by BYOD the productivity of the organization has increased the reason is that they can utilize their personal device much easier and it will lead to easy operation and increase in productivity. 2.10 VPN The companies have made the employment of the Virtual Private Network for granting access for the private network of the company to the internet of the employees. The employees can make usage of the internet for accessing from remote place through the network of the company. It has the perception of the differences, which will be not be present physically in the campus of the company and office (Merlin, 2013). An achievement of the meaning variety, for an instance the protocols of tunneling through virtual mode, connections through dedication and the encryption of the traffic. VPN in the tradition has the network model which has point to point connection and has no support for the technologies of broadcasting. The usage of VPN has to make a creation of the Wide Area Network, which will make a connection among the employees staying in the remote place, which are at the outside of the offices. The company has made the campuses, which has the separation in geographic manner through a network, which is single. A provision of the confidentiality of the VPN is there against the sniffing in the packet level. It has the authentication of the sender, which has the integrity in their message (Weisbecker Hat, 2013). In generally, the protocols that are been followed make a consideration of the VPN protocols that are secure. The security of Internet Protocol (IPSec), the layer of transport security (TLS/SSL), the layer of security regarding Datagram Transport (DTLS), Encryption of Point to point basis of Microsoft (MPPE), Protocol of Microsoft Secure Socket Tunneling (SSTP), Network of Multi Path Virtual Private (MPVPN), and the VPN of Secure Shell (SSH). There is authentication of VPNs both ends which provide a performance of two factor authentication, biometrics, passwords and the methods of cryptography which are secure. The network to network has a tunneling through the usage of the digital certificates or passwords. The protocols of Mobile VPN has a difference from the protocols in the VPN of convention for the users of mobile (Ferrari, 2015). They expect for continuous roaming through the networks and going through the coverage of network. It actually makes a cause of the models of the convention based network of the tunnels used for disruption. In case of the connections which are dropped, timeouts of applications, data which are lost. The protocols of the Mobile VPN has a requirement for making disassociation of the tunnel networks that are coupling. It locates in between the functionalities of locator and host authentication. Both of them has the dependence on the address of IP. The protocol of Host Identity is the example of the protocol that belongs to VPN. 2.11 PPTP The meaning of the PPTP is Point to Point Protocol of Tunneling that implements the protocol of VPN. A tunnel of PPTP has made the establishment through the peer contact within usage of the port of TCP 1723. However, the tunnel of GRE has an initiation and maintenance regarding the usage of the connection of TCP (Farash Attari, 2014). Here is the encapsulation of GRE tunel of the packets of PPP, which makes an allowance of the protocols that are compatible with the PPP that are tunneled. There are certain vulnerabilities regarding security that have an existence in PPTP. There is an association of the vulnerabilities that have the existence in PPTP. The vulnerabilities have association with the protocols that are in PPP and MPPE, the integration which is mutual. A vulnerability is the MS-CHAP-v1 that has the unsecured consideration. The session key of RC4 has the usage of MPPE that can have the vulnerability for the MS-CHAP-v2 for the attacks in the dictionary level. There are attacks of brute force and the MPPE vulnerabilities for making the attacks of bit flip. 2.12 WAN A computer network that is termed as Wide Area Network has the connection of the network that is smaller or the computers in the individual level through a high distance. A general employment is there of the WAN that makes the interface of the leased telecommunication service (Brown et al., 2015). There is an operation on package of different subscription such as the consumption of the bandwidth that are based on the packages. There is example of internet that can be used for WAN. The employment of WAN is in the institutions, which is of variety. The companies along with the governments has the creation of the environment where an occurrence of their activities are there and the participation can have the communication for the location in the geography. The range of geography can have the coverage through the WAN that can be of cities of multiple numbers that is throughout the world. A connection of WAN has the LAN in multiple numbers, which are owned in private terms. It actually depends on the area of coverage and the type of application and the type of specification where the WANs have the definition. It has the terms of Metropolitan Area Networks and Campus Area Networks. On the other hand the CAN makes connections with multiple LANs that makes the presentation in the campus through the usage of the technology of WAN (Prahlad et al., 2014). There is the LAN for the building of individual in the campus. These are the usage of the organizations for the provision of the interconnections in interdepartmental level of the campus. There is the MAN which makes connection of campuses in multiple numbers which has the city blocks along with buildings that goes far for covering the entire city. There is the utilization of the network of the technology in the WAN for achieving the interconnections of LAN. The technologies that are been stated through the usage of WAN have several variation levels, such as the telephone lines that can be switched by the circuit with the waves of the radio and fibers of optic. The speed of the link in the edge is of the WAN that can have the range starting from 1 Mbit/s to 1 Gbit/s in case the core links of the WAN has the speed which has the range from 1Gbit/s to the higher of 100 Gbit/s. 2.13 Network of Mobile Ad-hoc The networks, which are in the level of Mobile Ad-hoc have the network which is absolutely infrastructure less that can have the self configuration and the task of technology which are wireless. Major devices in the MANET has the capability for moving freely about the direction in the independent level without the restrictions that are particular or the patterns that are predictable (Xu et al., 2013). It actually has the meaning of the link and distance between the nodes that are been subjected for change in continuous manner. The nodes has the receiving of traffic in large amount that has the consumption of the traffic that is relevant. It actually makes a doubling through the router. Each and every node has the maintenance for the information of routing and the transmissions of packet between the nodes. It is all about accounting the presence of an unknown number that is possible for the transceivers among the end nodes. The protocols of difference has a development and implementation in the last twenty years due to the wireless technologys proliferation and the computing device of the mobile that has the interest in the MANETs (Lobanov et al., 2013). On the basis of the technology and application used, the various MANET types used has the definition such as the SPANs or the Adhoc Networks of the Smart Phones, Adhoc Networks of Vehicle (VANETs), Mobile Adhoc Networks based on Internet (iMANET). It is absolutely needless for telling that the network has the employment of the technologies along with the pr otocols that are been specialized in difference from the protocols of regular network. It is the networking protocol that are the protocols of ad hoc network in the natural basis. 2.14 Firewall A network security systems category is the firewall that has the design for monitoring and regulating the flow of the traffic among the network for securing the network against the traffic that is malicious and vulnerabilities of the security. There is the deployment of the firewall for securing the network that is the system of single host (Little, Adams Brown, 2013). It is against the network that is potentially insecure such as the internet. The network is there in the protection of firewalls scope and there is a general assumptions that it will have trust and security. There will be the firewall that has the work for maintaining the state. In such case of the firewalls that are based on network, there will be the solution on software that is of the firewall. It can be the computer appliance of the hardware that makes a hostage of the firewalls and has all the software. The firewall has the work in the different level for the model of OSI as per its application. In the layer of Network there is a work of Firewall which has made a performance of filtering the packet, in the judgment that is not for the packets that are incoming. It follows the rules that are certain and defined by the administrator of the network (Kirsch, 2014). The packets actually has the rules following that is standardized by the administrator of the network. These rules are allowed for passing the firewall. The firewalls of Application Layer will have the functionality that is more and they have the analysis and reading of the data, which has transmissions in inside. It has the scanning of them for the items, which are improper. 2.15 Antivirus There is the software that is anti-malware and the software, that is of security that makes the helping of the users for preventing, detecting and removing the malware from the systems of the computer (Pires et al., 2012). The only intention for using to remove the virus of the computer where there is a growth of role for inclusion of the protection that is against the attacks of malware. Such attacks include the worm of computers, ransomware, hijackers of browser, Trojan horses, backdoors, spyware, keyloggers, dialers and rootkits. In the additional level, the software of antivirus have the bundle for the functionality in the additional level in the filtering of spam, scanning of URL, phishing and scam to attack the filters. Most of the programns in the antivirus has the employment in the security of layers in multiple level for achieving a rate in better detection. There is an impossibility of the algorithm for perfect detection in the viruses of possibility. The methods that are two up and coming are been recognized for the classifiers of frontier good of the techniques that are of scanning specific malware scanning (Pascal et al., 2012). A detection of the sandbox is there for the techniques in case of mining of data. In the detection of sandbox, files are been suspected for allowing for running in the environment that is virtual where there is the logging of the actions. It is all about to make decision to check that there is a malicious activity. In the techniques of data mining, there are features that are been extracted from the file and there will be an analysis to learn the machine and techniques to mine the data for the classification of its maliciousness. In the methods by tradition there is the detection of the malware that makes the inclusion of detection that is absolutely based on the heuristics and detection. 2.16 Policy of Security The policy of security in the system has the definition where a constitution of systems secure state. In the organizations case, the policy of security will have the dictation for the constraints that are various which are placed on the members in the organization that has the elements of external category, such as walls and the doors, which are locked (Willliams Tang, 2013). In case of the system of the network, the policy of security has the controlling of the system that is of various functions. There are components, which are internal to the users along with the systems that are external. The environment should have the performance of the tasks regarding the systems. The policy of security has the importance as because it has the power for prevention regarding the risks of security in the inadvertent level. It actually makes an ensuring the risk which has the area of attacks that are considered to be malicious. The design of policy regarding security for the systems, which are complex is for the task that is challenging. The security policy has the system for staying secure (Chaudhri et al., 2015). There should be the capability of the system for the enforcement of the security policy in the strict manner otherwise the existence will not make any yield of the results. 2.17 Vulnerabilities of network The vulnerability of network has the weakness in the architecture of the network that is of overall network. It actually provides the allowance for performing the actions for the attacker that makes the assurance of information in the level of compromise. In case of flaw of the system or the case of susceptibility, there is the existence of the attacker that have the capability for the exploitation of the gains regarding the flaw access. There will be a production of vulnerability in the system. There should be a noting that all the vulnerabilities does not have the carriage of the risk. In such case, there will be the existence of the vulnerability that can have the affection as possessed assets have the value of none. Several examples are there in the case of exploiting vulnerability are there in the knowledge (Durumeric et al., 2013). As the attacks of success are been conducted, there is a term for the exploitation of the vulnerability. There are attacks, which are conducted in t he level of success. There should be an exploitation of the vulnerability. In case of vulnerability, there is the time period that comes among the system vulnerabilitys introduction. There is a removal of the vulnerability that has the meaning to introduce the policy of security to limit the access for the updation of the system. Its also about the attackers removal in the system. There is quite variety of the vulnerability cause. The systems are quite complicated as they have the difficulties for securing the design flaws, which is susceptible in the inherent manner. In the point of access in the network there is the introduction of the point of possibility for creating the vulnerability throughout the network. The bugs of the software and the operating system has the flaw for leading the vulnerability creation. The management that is improper in case of the passwords by the employees can have the result in leaking the information through the creation of vulnerabilities. 2.18 DoS Attack The service attacks denial or the DoS is the malicious attackers attempt for causing the resource of the system for becoming unavailable for the usage that is intended through its users of dependency. There are current DoS Attackers in the service of network. In the modern days, the attacks of DoS have the distribution. It has general attack of spoofing of IP address (Chaudhri et al., 2015). The attacks are in two forms, services of crashing and flooding. The attacks worst known form is the DoS of Advanced Persistent. In such case the attackers have the resource and establishment for skills of networking. There is such attack that will be in between the multiple vectors. There should be strategic attackers that have switching targets for measures to prevent and mitigate. There should be the vectors for attack through cycling which makes target of continuous cause in case of suffering the provider of service. 2.19 JMeter There should be a development of the JMeter tool through the support of Apache Software Foundation which have the project for loading the web applications for the purpose of testing. It should be measured and analyzed to perform service of network (Williams Tang, 2013). The functionality of the JMeter should have the augmentation through the developers for usage of the plugins. The functionality has the expansion to install the design of new ones. 2.20 Wireshark Its a tool of open source to analyze the traffic of network in the level of packets. There should be a usage of troubleshooting of network, development, analysis and education. It should have the crossing of the platform software which has the running in the systems which are like the Unix. It has the similarity of the functionality for monitors of other packets that have the features of the interface along with options of sorting. It has the capability to understand the structure for protocols of networking. API pcap actually captures packets through the factor that is limiting through capabilities of capturing. 2.21 Vulnerability list Connection of wireless is open. There is no installation of the firewalls. There is no such protection of the servers behind the firewall of hardware (Pascal et al., 2012). Communication of long distance is through the network that is wireless. Exchange of web has the direct connection to the cloud that is without the security. There is no such definition of ACL. The polity of network is very old and high vulnerability is there. 2.22 Improvements that are recommended for hardening the network Fixing the vulnerabilities The connections that are wireless should have the security through the usage of firewall. There should be a protection behind the firewall hardware (Pires et al., 2012). There should be an ACL definition for protection. The policies of the revised network is required for threats that are current. 3. Implementation 3.1 Network that is improved Figure 1: Improved Network 3.2 Profile of JMeter Figure 2: JMeter 3.3 Capture of Wireshark Figure 3: Wireshark Capture 4.0 References Brown, M. S., Adams, N. P., Brown, M. K., Kirkup, M. G., Little, H. A. (2015).U.S. Patent No. 9,172,540. Washington, DC: U.S. Patent and Trademark Office. Chang, B., Tsai, H. F., Chen, C. M. (2013). Evaluation of virtual machine performance and virtualized consolidation ratio in cloud computing system.Journal of Information Hiding and Multimedia Signal Processing,4(3), 192-200. Chang, B., Tsai, H. F., Chen, C. M. (2013). Evaluation of virtual machine performance and virtualized consolidation ratio in cloud computing system.Journal of Information Hiding and Multimedia Signal Processing,4(3), 192-200. Chaudhry, S. A., Naqvi, H., Shon, T., Sher, M., Farash, M. S. (2015). Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems.Journal of Medical Systems,39(6), 1-11. Dugan, D., Pruski, B. A. (2013). Remote Desktop Services in Windows Server 2008 R2. Durumeric, Z., Kasten, J., Bailey, M., Halderman, J. A. (2013, October). Analysis of the HTTPS certificate ecosystem. InProceedings of the 2013 conference on Internet measurement conference(pp. 291-304). ACM. Farash, M. S., Attari, M. A. (2014). A secure and efficient identity-based authenticated key exchange protocol for mobile clientserver networks.The Journal of Supercomputing,69(1), 395-411. Ferrari, M. (2015). Release: Red Hat Enterprise Virtualization 3.4.Red,2015. Jani, A. J., Jbara, W. A. (2013). Securing Website by Secure Sockets Layer in WirelessNetwork using Windows Server 2008.International Journal of Information and Electronics Engineering,3(1), 49. Kirsch, D. M. (2014).U.S. Patent No. 8,825,362. Washington, DC: U.S. Patent and Trademark Office. Little, H. A., Adams, N. P., Brown, M. S. (2013).U.S. Patent No. 8,499,045. Washington, DC: U.S. Patent and Trademark Office. Lobanov, M. Y., Suvorina, M. Y., Dovidchenko, N. V., Sokolovskiy, I. V., Surin, A. K., Galzitskaya, O. V. (2013). A novel web server predicts amino acid residue protection against hydrogen-deuterium exchange.Bioinformatics, btt168. Loschen, W. A., Stewart, M. A., Lombardo, J. S. (2014). Public Health Applications in the Cloud.JOHNS HOPKINS APL TECHNICAL DIGEST,32(4), 745. Mavrogiannopoulos, N., Trmac, M., Hat, R., Preneel, B. (2013). A Linux kernel cryptographic framework: Decoupling cryptographic keys from applications [extended version]. Merlin, M. (2013, November). Live upgrading thousands of servers from an ancient Red Hat distribution to 10 year newer Debian based one. InLISA(pp. 105-114). Minasi, M., Greene, K., Booth, C., Butler, R., McCabe, J., Panek, R., ... Roth, S. (2013).Mastering Windows Server 2012 R2. John Wiley Sons. Panek, W. (2015).MCSA Windows Server 2012 R2 Installation and Configuration Study Guide: Exam 70-410. John Wiley Sons. Pascal, B. D., Willis, S., Lauer, J. L., Landgraf, R. R., West, G. M., Marciano, D., ... Griffin, P. R. (2012). HDX workbench: software for the analysis of H/D exchange MS data.Journal of the American Society for Mass Spectrometry,23(9), 1512-1521. Pires, C. G., Pinto, F. M., Teixeira, V. D., Freitas, J., Dias, M. S. (2012). Living Home CenterA personal assistant with multimodal interaction for elderly and mobility impaired e-inclusion.Proc. PROPOR. Coimbra. Prahlad, A., May, A., Pittaluga, I., Alexander, J., Schwartz, J. A. (2014).U.S. Patent No. 8,655,846. Washington, DC: U.S. Patent and Trademark Office. Shen, G. (2013). Construction of Windows Server 2008 web server based on.Electronic Test,5, 081. Shinder, T. W., Diogenes, Y., Shinder, D. L. (2013).Windows server 2012 security from end to edge and beyond: Architecting, designing, planning, and deploying windows server 2012 security solutions. Newnes. Stidley, J. (2012).MCTS: Windows Server 2008 Applications Infrastructure Configuration Study Guide: Exam 70-643. John Wiley Sons. Tidrow, R., Boyce, J., Shapiro, J. R. (2015).Windows 10 Bible. John Wiley Sons. Weisbecker, F., Hat, R. (2013). Keynote Talk Present and Future of Linux dynticks.OSPERT 2013, 4. Whitaker, H., Young, A., Wagner, R., Haque, S., Parrott, B., Fagan, R. (2016). Second Creek Monitoring. Williams, D. R., Tang, Y. (2013). Impact of office productivity cloud computing on energy consumption and greenhouse gas emissions.Environmental science technology,47(9), 4333-4340. Xu, F., Liu, Y., Moscibroda, T., Chandra, R., Jin, L., Zhang, Y., Li, Q. (2013, June). Optimizing background email sync on smartphones. InProceeding of the 11th annual international conference on Mobile systems, applications, and services(pp. 55-68). ACM. Xu, Z. X. (2016). Practices to Administration of Windows Server 2012 and 2012 R2.Scholar Works, SJSU. Zhu, D., Yang, L., Lovinger, D. (2014). Building High Performance Storage for Hyper-V Cluster on Scale-Out File Servers using Violin Windows Flash Arrays.

Thursday, November 28, 2019

West Indies Yacht Club Resort Essay Example

West Indies Yacht Club Resort Paper As West Indies Yacht Club Resort is one of the five renowned resorts in the British Virgin Islands, the managers and employees have to cope with cultural differences and nurture them to excel. However, there is low staff motivation due to the escalating tension between the expatriates and the locals, as well as a consistently high expatriate turnover. The internal operational problems would lead to an increase in the number of complaints when customers are dissatisfied with the declining employees’ performance, thus potentially hindering the future growth of the resort. The following report includes detailed analyses of the problems in the resort, their underlying causes and their feasible solutions based on the observation respectively to restore harmony among the employees and therefore boost the profit of the resort. Analyses One of the major root causes regarding low staff motivation is the widening culture gap between the expatriates and the locals. For instance, most of the expatriates from America tend to be goal-oriented and individualistic. They are more competitive compared to the Caribbean people as their job was not guaranteed in the US. Thus, they would try their best to make a good impression. In contrast, the nurturing environment drives the Caribbean people to value the relationships with coworkers and quality of life. They have low incentives to work harder as the local employment laws guarantee their jobs and they grant salary increment every year without any performance evaluation. As a result, employees have lower motivation when the workplace atmosphere does not match what they value. Additionally, the root cause of the escalating tension between expatriates and the locals is the ineffective management style used. We will write a custom essay sample on West Indies Yacht Club Resort specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on West Indies Yacht Club Resort specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on West Indies Yacht Club Resort specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Expatriate managers have been using a behind-the-scene management style, which involves frequent supervision of the resort without actual involvement in its daily operations. They usually give vague directions instead of precise instructions. Because of the one-way communication, managers are distant from the employees; they do not know the needs of the locals as well as the actual problems of the resort. On the other hand, the locals have no chance to clarify the instructions. Thus, they often feel discontented as they do not understand the ambiguous instructions. This root cause would further lead to misunderstandings and conflicts between the expatriates and the locals and hence intensifying the tension between them. Moreover, the high expatriate turnover rate problem is caused by the lack of management training for the expatriates and the strict employment regulations for the Caribbean government. Expatriates lack vital experience in communicating with people of different races. They do not understand the needs of the locals which led them to apply the behind-the-scene approach that is often used in the US in the resort. However, it is ineffective to manage Caribbean staff who value collectivism. Because of the cultural difference and the poor results of the management style, the managers often feel demotivated very soon as they cannot manage their teams effectively. Consequently, the expatriate managers resign their jobs. Furthermore, the increasing number of complaints is because of the lack of sensitivity of the British Virgin Island vacation market. The Chicago headquarter has been continuing its overbooking practice for three years yet did not inform the guests in advance about the issue of over-booking the resort by additional 20 percent, as well as neglecting the opposition of the Room Division Manager and the employees. Hence, when the number of customers was much larger than the resort’s capacity during the peak seasons, there was insufficient staff and rooms to serve the guests. This results to guests having to stay on boats until rooms are available for them. Therefore, the increasing number of complaints is inevitable. Recommendation I recommend you and other expatriate managers to hold meetings regularly; perhaps once a week either by division or organization-wise. Managers should take the lead to translate organization goals into the tasks, as well as motivate employees when necessary. You should evaluate the employees’ performance as a whole and individually. Thus, predicaments would be prevented before they begin to affect daily routines and business. The meetings could be taken place at the beginning of the week, and hence could boost the staff morale efficiently and increase communication between managers and the employees. Also, you could organize informal gatherings such as some sponsored meals and trips after every peak season to form closer bonds between the expatriates and the locals. During the gathering, sharing session with the locals, department heads and headquarter staffs can be organized. Expatriates, managers, and headquarter staff should participate in order to attain a more harmonious workplace atmosphere. In addition, the headquarter should send expatriate managers to some local management training programs every year. The training sessions allow the managers to adjust their management styles based on the local culture and learn to be sensitive to cultural differences, thus improving their communication skills to some extent. The training course should have various role-playing situations; therefore, managers can simulate tackling random real-life problems. Finally, the resort should establish an effective appraisal system, which guests can carry out complaints or nomination anonymously. For poorly performed staff, managers could move them to a less favorable work position. For greatly appreciated staff, since they value their family, the resort should provide welfare on the staff’s family members such as offering a free hotel stay night which allows his/her family member to enjoy all the facilities at the resort for free. As a result, the employees would have greater motivation for optimal performance. Conclusion In conclusion, the resort must provide better services to further enhance the reputation and boost the profits of West Indies Yacht Club Resort. The above feasible solutions could be established gradually to attain the final objective: narrowing the culture gap between the expatriates and the locals. By doing so, all three parties WIYCR, employees, and customers would benefit from the improvements.

Sunday, November 24, 2019

Executive Privilege Based on Separation of Powers

Executive Privilege Based on Separation of Powers Executive privilege is an implied power claimed by Presidents of the United States and other officials of the executive branch of government to withhold from Congress, the courts or individuals, information that has been requested or subpoenaed. Executive privilege is also invoked to prevent executive branch employees or officials from testifying in Congressional hearings. Executive Privilege Executive privilege refers to certain implied powers of the Presidents of the United States and other executive branch officials of the United States government.By claiming executive privilege, executive branch officials may withhold subpoenaed information from the Congress and refuse to testify in Congressional hearings.While the U.S. Constitution does not mention the power of executive privilege, the U.S. Supreme Court has ruled that it may be a constitutional exercise of the powers of the executive branch under the separation of powers doctrine.Presidents have usually claimed the power of executive privilege in cases involving national security and communications within the executive branch. The U.S. Constitution makes no mention of either the power of Congress or the federal courts to request information or the concept of an executive privilege to refuse such requests. However, the U.S. Supreme Court has ruled that executive privilege may be a legitimate aspect of the separation of powers doctrine, based on the constitutional powers of the executive branch to manage its own activities. In the case of United States​ v. Nixon, the Supreme Court upheld the doctrine of executive privilege in the case of subpoenas for information issued by the judicial branch, instead of by Congress. In the court’s majority opinion, Chief Justice Warren Burger wrote that the president holds a qualified privilege to require that the party seeking certain documents must make a â€Å"sufficient showing† that the â€Å"Presidential material† is â€Å"essential to the justice of the case.† Justice Berger also stated that the president’s executive privilege would more likely to be valid when applied to cases when the oversight of the executive would impair that the executive branch’s ability to address concerns of national security. Reasons for Claiming Executive Privilege Historically, presidents have exercised executive privilege in two types of cases: those that involve national security and those that involve executive branch communications. The courts have ruled that presidents can also exercise executive privilege in cases involving ongoing investigations by law enforcement or during deliberations involving disclosure or discovery in civil litigation  involving the federal government. Just as Congress must prove it has the right to investigate, the executive branch must prove it has a valid reason to withhold information. While there have been efforts in Congress to pass laws  clearly defining executive privilege and setting guidelines for its use, no such legislation has ever passed and none is likely to do so in the future. Reasons of National Security Presidents most often claim executive privilege to protect sensitive military or diplomatic information, which if disclosed, could place the security of the United States at risk. Given the president’s constitutional power as commander and chief of the U.S. Military, this â€Å"state secrets† claim of executive privilege is rarely challenged. Reasons of Executive Branch Communications Most conversations between presidents and their top aides and advisers are transcribed or electronically recorded. Presidents have contended that executive privilege secrecy should be extended to the records of some of those conversations. The presidents argue that in order for their advisers to be open and candid in giving advice, and to present all possible ideas, they must feel safe that the discussions will remain confidential. This application of executive privilege, while rare, is always controversial and often challenged. In the 1974 Supreme Court case of United States v. Nixon, the Court acknowledged the valid need for protection of communications between high Government officials and those who advise and assist them in the performance of their manifold duties. The Court went on to state that [h]uman experience teaches that those who expect public dissemination of their remarks may well temper candor with a concern for appearances and for their own interests to the detriment of the decision-making process. While the Court thus conceded the need for confidentiality in discussions between presidents and their advisers, it ruled that the right of presidents to keep those discussions secret under a claim of executive privilege was not absolute, and could be overturned by a judge. In the Court’s majority opinion, Chief Justice Warren Burger wrote, [n]either the doctrine of separation of powers, nor the need for confidentiality of high-level communications, without more, can sustain an absolute, unqualified Presidential privilege of immunity from judicial process under all circumstances. The ruling reaffirmed decisions from earlier Supreme Court cases, including Marbury v. Madison, establishing that the U.S. court system is the final decider of constitutional questions  and that no person, not even the president of the United States, is above the law. Brief History of Executive Privilege While Dwight D. Eisenhower was the first president to actually use the phrase â€Å"executive privilege,† every president since George Washington has exercised some form of the power. In 1792, Congress demanded information from President Washington regarding a failed U.S. military expedition. Along with records about the operation, Congress called members of the White House staff to appear and deliver sworn testimony. With the advice and consent of his Cabinet, Washington decided that, as the chief executive, he had the authority to withhold information from Congress. Although he eventually decided to cooperate with Congress, Washington built the foundation for future use of executive privilege. Indeed, George Washington set the proper and now recognized standard for using executive privilege: Presidential secrecy must be exercised only when it serves the public interest.

Thursday, November 21, 2019

The Artwork Soft Calendar for the Month of August, 1962. Metropolitan Assignment

The Artwork Soft Calendar for the Month of August, 1962. Metropolitan Museum of Art in New York City - Assignment Example One must wonder why the artist uses the particular medium that he does—especially since it is quite strange. â€Å"Soft Calendar for the Month of August, 1962† is basically canvas filled with shredded foam rubber; it’s painted with Liquitex and enamel. Now, Liquitex, as one understands it, is primarily a plastic paint—which we now know as acrylic gesso. Gesso is what artists usually put on their canvases in order to prime the piece of artwork with paint. So, it seems rational that Claes used Liquitex, perhaps for a first coat. Then, he most likely next applied enamel, which leaves a decorative and glassy coating. It’s a type of paint used for modeling (such as miniature toy plane replicas, etc.). One must ask why the artist uses this particular medium besides why he actually uses the types of paints—and rather, why does he feel this is the best way to represent his art? Perhaps this was the easiest way to paint shredded foam rubber. It must h ave taken some masterful skill to form the rubber just the way he wanted it, because the rubber numbers on the calendar look like dough. The advantages of working with acrylic gesso would be that the first coat would dry easily. The limitations of working with enamel include the fact that enamel takes a longer time to dry. III. Style Elements of the composition work to constitute the artist’s style, much in the way that putting a bunch of puzzle pieces together creates a whole picture. As for what movement within which Oldenburg was working, he was clearly in the realm of various possible categorizations: Modernist, Abstract Expressionism, and Pop Art. It’s possible it might have even been more than one style blended together. At any rate, â€Å"Claes Oldenburg's highly individual figurations make him one of the leading protagonists of Pop Art† (Osterwold 193). Pop art, short for popular art, was at its heyday in the ‘60s, along with the likes of Roy Licht enstein and others. Unmistakably, as one can see below, the calendar for the month of August of 1962 starts with the number â€Å"29,† as that was the day of the week from the previous month of July in that particular year. One also may note that the August calendar of 1962 ends with the number â€Å"1,† because the last day in the calendar was September 1st of 1962—according to the painting. The numbers and letters almost look like baked bread dough rising. More is forthcoming about why this painting looks like it does, in the next section regarding the context of the painting. IV. Context One should examine also, the context of the work. This was painted in the 60s by Claes Oldenburg. He was born in Sweden in 1929, but is an American citizen. It’s uncertain exactly where he painted it, nor with what other works it would be in conversation with unless one talks about this painting being a type of conversation piece in the context of Pop Art. All of the f irst days of the week on the calendar are painted red, while the other days are white. One is unsure whether the colors or this particular month held any kind of cultural or historical events or issues which the piece is addressing. To be sure, Soft Calendar for the Month of August, 1962 is definitely riveting. It makes you ask why a thousand times. Why are the first days of the week painted red, and the rest white? Why do these numbers look like rising bread dough? And so forth and so on. It is a discussion that must be had. V. Conclusion

Wednesday, November 20, 2019

Case study memo on Business Ethics in USA Example | Topics and Well Written Essays - 1000 words

Memo on Business Ethics in USA - Case Study Example We have received possible food poisoning reports from two counties in Seattle and south California about our unpasteurized products. Health officials through our company managers reported these cases to us and we dispatched them to these counties to collect batches of our nutritional products. As the most successful nutritional foods suppliers, it is our duty to figure out this problem before any more causalities arise from consumption of our nutritional products. When whether to pull all our products from the market or not. Because of lack of evidence that the products that caused the acute food poisoning are ours or not, we have to determine when to inform the retailers that we are pulling all our products. The ethical dilemma that the company is facing is whether or not to notify the customers about the food poisoning by its nutritional products and should it consider pulling all the products from the market. In this case, I find it difficult to agree with the decision that Fred James made but at the same time, I do not have a better solution. James and Healy acted after hearing of seven cases of nutritional food poisoning and after the newspapers had already informed the public. They should have recalled all the products from the market as soon as they learnt about the third or the fourth case of poisoning. Trying to minimize or cover up the damages would only cause more harm than good (Allott, 2001). To analyze the ethical issues in this case using the utilitarian approach, we should first identify the available courses of action. Then we should look at the stakeholders that shall be affected, the benefits and harms that shall be derived from these actions. Lastly, we should choose the action that will yield the least harm while producing the greatest benefits (Allott, 2001). Using the utilitarian approach, James and Healy should have apologized publically about the food poisoning and probably declared a deduction in the

Monday, November 18, 2019

Solar and wind electric power production and distribution for the San Research Paper

Solar and wind electric power production and distribution for the San Antonio area - Research Paper Example There are various forms of sources of energy that San Antonio city has embarked on establishing so as to meet the great need for energy that the city has currently (Michael, 2010). The major power projects that are supplying the energy need in this city includes the CPS Energy, the Texas Grid, solar power, On-grid wind generation and off-grid power generation for individual homes and business. This study embarks on discussing the entire energy project in this city and how they have helped in addressing the energy needs that the city has. The most important thing to understand is that environmental conservation is a core objective of the city of San Antonio, Texas (Paul, 1998). Therefore, all the energy sources are established in line with the need to conserve the environment and eliminate any form of environmental pollution. No wonder then, renewable energy has become the core for energy sources in the city of San Antonio, Texas. CPS Energy of San Antonio, is the largest city municipality owned energy utility, that provides both electric and gas energy (Jones, 2007). The revenues generated from this utility are huge, and they account for above 20% of the city’s operating budget every year (Michael, 2010). The utility was founded in 1942, and it is well known to serve above a million energy consumers, both in electrify and gas energy. The utility is comprised of a range of fuel generation combination, with nuclear power, coal, renewable energy and natural gas, a fact that has made this utility a very effective one for its clientele (Paul, 1998). For electric energy, CPS energy is the sole licensed producer supplying the electricity energy need for its territory that is well over 4060 square kilometers. The electricity energy produced by this utility is sufficient to serve all the electric energy need so f the resident clientele and for wholesale to other municipalities in the south Texas, that are

Friday, November 15, 2019

Theory of Heteronuclear NMR Spectroscopy and its Application

Theory of Heteronuclear NMR Spectroscopy and its Application SYED MASOOD HASSAN AKBARI Question 1: Describe theory of heteronuclear NMR spectroscopy and its use in pharmaceutical analysis. Current strategies for determining the structures of membrane proteins in lipid environments by NMR spectroscopy rely on the anisotropy of nuclear spin interactions, which are experimentally accessible through experiments performed on weakly and completely aligned samples. Importantly, the anisotropy of nuclear spin interactions results in a mapping of structure to the resonance frequencies and splatting’s observed in NMR spectra. Distinctive wheel-like patterns are observed in two-dimensional 1H–15N heteronuclear dipolar/15N chemical shift PISEMA (polarization inversion spin-exchange at the magic angle) spectra of helical membrane proteins in highly aligned lipid bilayer samples (Marassi and Opella, 2000; Wang et al., 2000). One dimensional dipolar waves are an extension of two-dimensional PISA (polarity index slant angle) wheels that map protein structures in NMR spectra of both weakly and completely aligned samples (Marassi and Opella, 2000). Dipolar waves describe t he periodic wave-like variations of the magnitudes of the heteronuclear dipolar couplings as a function of residue number in the absence of chemical shift effects. Since weakly aligned samples of proteins display these same effects, primarily as residual dipolar couplings, in solution NMR spectra, this represents a convergence of solid-state and solution NMR approaches to structure determination (Marassi and Opella, 2000). NMR structural studies of proteins There are three principal spectroscopic considerations for NMR structural studies of proteins: the overall rotational correlation time of the protein, the extent of alignment of the protein in the sample, and the strategy for assignment of the resonances to sites in the protein. Each of these considerations needs to be taken into account in the development of NMR for structural studies of membrane proteins (Opella, 1997). For relatively small globular proteins, the sample conditions, instrumentation, experiments, and calculations that lead to structure determination are well established (Cavanagh et al., 1996). The chief requirement for structure determination of globular proteins is that samples can be prepared of isotopically labelled polypeptides that are folded in their native conformation and reorient relatively rapidly in solution. Such samples have been prepared for many hundreds of proteins, and it is likely that this can be done for thousands more of the polypeptide sequence s found in genomes (Wuthrich, 1998). This is not yet the case for membrane proteins. Resonance assignments The traditional approach to protein structure determination is based on the same overall principles, whether solution NMR or solid-state NMR methods are used and whether the sample is aligned or not. This involves the resolution of resonances through the use of isotopic labels and multidimensional NMR experiments, the measurement of spectral parameters associated with individual resonances, for example, NOEs, J couplings, dipolar couplings, or chemical shift frequencies, the assignment of all resonance to specific sites in the protein, and then the calculation of structures. There are examples of the application of this approach to membrane proteins in micelles (Almeida and Opella, 1997) and bilayers (Opella et al., 1999). The availability of orientation information associated with individual resonances means that it is now possible to make effective use of limited amounts of assignment information, for example, some residue-type assignments or a few sequential assignments. It may al so be feasible to implement an â€Å"assignment-free† approach. The use of either limited or no assignment information prior to calculating structures would greatly speed the process of structure determination by NMR spectroscopy, especially in the case of membrane proteins where assignments are difficult to make in nearly all situations due to overlap of resonances and unfavourable relaxation parameters. Dipole–dipole interaction The local field, which results from the interaction between two nearby nuclei, is a direct source of structural information. Pake’s (1948) seminal paper demonstrated that the dipole–dipole interaction between two spin S = 1/2 nuclei is manifested as a doublet in NMR spectra, with the frequency difference a function of not only the distance between the two nuclei but also the angle between the internuclear vector and the direction of the applied magnetic field. The dipole–dipole interaction provides direct access to geometrical parameters that can be translated into molecular structures. Moreover, it is important for many aspects of solid-state NMR spectroscopy; for example, it is essential to minimize its influence through decoupling to obtain well-resolved spectra. In this regard, it is generally easier to deal with heteronuclear rather than homonuclear dipolar couplings. Heteronuclear dipolar couplings are used extensively to determine the structures of protein s, in particular the 1H–15N interaction at the amide sites in the protein backbone. Uniform labelling with 15N is particularly valuable in proteins because the properties of a â€Å"dilute spin† are retained, since the next nearest amide nitrogen is separated by two carbon atoms in the polypeptide backbone (Cross et al., 1982). In addition, each 15N label in an amide site provides three spin interactions for analysis: the 15N chemical shift, the 1H chemical shift, and, of course, the 1H–15N heteronuclear dipolar coupling between the two directly bonded nuclei. The dipole–dipole interaction is anisotropic; therefore, the value of the splitting varies with molecular orientation. It is maximal for an N–H bond parallel to the field, half-maximal when the bond is perpendicular to the field, and zero when the bond is at the â€Å"magic angle†. All of these possibilities are observed in experimental data from aligned proteins. The 1H–15N het eronuclear dipolar interaction has the dual roles of providing a mechanism for resolving among resonances with N–H bonds at different orientations and of providing the input for structure determination in the form of frequency measurements that can be translated into angles between individual bonds and the external axis imposed by the magnetic field. The angular information can then be used in conjunction with the well-established geometry of peptide planes to determine the three-dimensional structure of the polypeptide backbone (Opella et al., 1987). These methods can be extended to additional nitrogen and carbon sites for characterization of side chain conformations. Separated local field spectroscopy (Waugh 1976) combines several of the elements of high-resolution solid-state NMR spectroscopy to average out the unwanted broadening influences of homonuclear dipolar couplings and double resonance and multidimensional spectroscopy to average out and separate the heteronuclear dipolar couplings in different parts of the experiment. The chemical shift dimension in two-dimensional separated local field spectra is intrinsically high resolution because it is obtained while decoupling the hydrogens to remove the broadening due to heteronuclear dipolar couplings. Homonuclear dipolar couplings are minimal among the dilute nuclei and generally do not require attention. This enables the dipolar couplings between bonded pairs of 1H and 15N nuclei to be measured for individual 15N sites with different chemical shift frequencies. The original versions of separated local field spectroscopy have more than adequate resolution for studies of peptides or specifically or selectively labelled proteins. However, further improvements in resolution were needed for studies of uniformly 15N labelled proteins. PISEMA (polarization inversion spin-exchange at the magic angle) (Wu et al., 1994) is a high-resolution version of separated local field spectroscopy. Line widths in the key dipolar frequency dimension are reduced by more than one order of magnitude compared with the conventional separated local field experiment. The combination of narrow lines and favourable scaling factor has such a dramatic effect on the appearance of the spectra that it is now feasible to formulate solid-state NMR experiments where heteronuclear dipolar coupling frequencies complement chemical shifts as a mechanism for spectroscopic resolution as well as the measurement of readily interpretable orientationally dependent frequencies. PISA (polarity index slant angle) wheels The secondary structure and topology of a membrane protein can be described by the patterns of resonances observed in two-dimensional PISEMA spectra of uniformly 15N labelled polypeptides in aligned bilayers (Marassi and Opella, 2000; Wang et al., 2000). The characteristic â€Å"wheel-like† patterns observed in these spectra reflect helical wheel projections of residues in both transmembrane and in-plane helices. Therefore, PISA wheels provide direct indices of both secondary structure and topology. The resonance frequencies in both the 1H–15N heteronuclear dipolar and 15N chemical shift dimensions in PISEMA spectra of aligned samples of membrane proteins depend on helix orientation as well as on backbone dihedral angles, the magnitudes and orientations of the principal elements of the amide 15N chemical shift tensor, and the N–H bond length. It is possible to calculate spectra for any protein structure (Bak et al., 2002). The principals involved in the PISA whee l analysis of helices (Marassi and Opella, 2000) are illustrated in Fig. 2. In Fig. 2A, the projection down the axis of a helical wheel shows that the 3.6 residues per turn periodicity characteristic of an ÃŽ ±-helix results in an arc of 100 ° between adjacent residues. The drawing of a peptide plane in Fig. 2B shows the orientations of the principal axes of the three operative spin interactions at the 15N-labelled amide site. The 17 ° difference between the N–H bond axis and the ÏÆ'33 principal element of the amide 15N chemical shift tensor is of particular importance because of its impact on the spectral appearance of a PISA wheel. The striking wheel-like pattern of resonances calculated from a two-dimensional PISEMA spectrum of an ideal helix is shown in Fig. 2C. A PISA wheel reflects the slant angle (tilt) of the helix, and the assignment of the resonances reflects the polarity index (rotation) of the helix. When the helix axis is parallel to the bilayer normal, all of the amide sites have an identical orientation relative to the direction of the applied magnetic field, and therefore, all of the resonances overlap with the same dipolar coupling and chemical shift frequencies. Tilting the helix away from the membrane normal results in variations in the orientations of the amide N–H bond vectors relative to the field. This is seen in the spectra as dispersions of both the heteronuclear dipolar coupling and the chemical shift frequencies. Nearly all transmembrane helices are tilted with respect to the bilayer normal, and it is the combination of the tilt and the 17 ° difference between the tensor orientations in the molecular frame that makes it possible to resolve many resonances from residues in otherwise uniform helices and is responsible for the wheel-like pattern in PISEMA spectra, such as that illustrated in Fig. 2C. Figure 1: Illustrates principles of PISA wheels (Marassi and Opella, 2000). (A) Helical wheel showing the 100 ° arc between adjacent residues that is a consequence of the periodicity of 3.6 residues per turn in an ÃŽ ±-helix; (B) orientations of the principal elements of the spin interaction tensors associated with 15N in a peptide bond; (C) PISA wheel for an ideal ÃŽ ±-helix; (D) dipolar wave for an ideal ÃŽ ±-helix. Question 2: Structure Elucidation for C11H15NO.HCl Mw = 213.70 FT-IR Shows a sharp peak at 1690cm-1 which is representative of a C=O functional group. There is a broad peak turning up at the 3500cm-1 representative of a C-H group. 1H NMR Shows a cluster of peaks from 7.62-8.02ppm showing up as 5H. This means that the benzene ring is branched at one location. 5.25ppm shows up as a 1H this is the CH group 2.97-3.03ppm are the 2CH ­Ã‚ ­3 groups bonded to the Nitrogen. 1.64ppm comes up as a doublet with 3H this means that it is a methyl. The strong peak at the 4.80ppm is representative of the amine. 13C NMR The useful information gathered from this spectra is as there are negative peaks showing up so the angle at which this spectra was got was at 1350 clearly showing the CH2 in the ring and the benzene facing down. 196.51ppm shows the negative peak of the benzene ring. 136.69ppm shows the CH2 groups in the benzene ring. The peaks ranging from 128.54-131.90 are of the symmetrical benzene ring carbons. 69.57ppm is the CH3 group close to the ketone. 41.29ppm is the CH group which is beside the ketone. 14.46ppm is the 2 CH3 groups bonded to the amine. EI-MS Shows a small signal at 29 m/z which is representative of a CHO group. And the signal at 72 m/z is representative of a H3CHC=N+(CH ­3)2 ion. Chemical Structure Figure 1: Shows the structure of C11H15NO.HCl. References Almeida FCL, Opella SJ. fd coat protein structure in membrane environments: structural dynamics of a loop connecting a hydrophobic trans-membrane helix and an amphiapathic helix in a membrane protein.J. Mol. Biol.1997;270:481–495.[PubMed] Bak M, Schultz R, Vosegaard T, Nielsen NC. Specification and visualization of anisotropic interaction tensors in polypeptides and numerical simulations in biological solid-state NMR.J. Magn. Reson.2002;154:28–45.[PubMed] Bax A, Kontaxis G, Tjandra N. Dipolar couplings in macromolecular structure determination.Methods Enzymol.2001;330:127–172.[PubMed] Cavanagh J, Fairbrother WJ, Palmer AG, Skelton NS.Protein NMR spectroscopy.New York: Academic Press; 1996. Chou JJ, Kaufman JD, Stahl SJ, Wingfield PT, Bax A. Micelle-induced curvature in a water-insoluble HIV-1 Env peptide revealed by NMR dipolar coupling measurement in stretched polyacrylamide gel.J. Am. Chem. Soc.2002;124:2450–2451.[PubMed] Cross TA, DiVerdi JA, Opella SJ. Strategy for nitrogen NMR of biopolymers.J. Am. Chem. Soc.1982;104:1759–1761. Griffin RG. Dipolar recoupling in MAS spectra of biological solids.Nat. Struct. Biol. NMR Suppl.1998;II:508–512.[PubMed] Howard KP, Opella SJ. High resolution solid-state NMR spectra of integral membrane proteins reconstituted into magnetically oriented phospholic bilayers.J. Magn. Reson.1996;112:91–94.[PubMed] Ma C, Opella SJ. Lanthanide ions bind specifically to an added â€Å"EF-hand† and orient a membrane protein in micelles for solution NMR spectroscopy.J. Magn. Reson.2000;146:381–384.[PubMed] Marassi FM, Opella SJ. A solid-state NMR index of helical membrane protein structure and topology.J. Magn. Reson.2000;144:150–155.[PMC free article][PubMed] Marassi FM, Ramamoorthy A, Opella SJ. Complete resolution of the solid-state NMR spectrum of a uniformly15N-labeled membrane protein in phospholipid bilayers.Proc. Natl. Acad. Sci. U.S. A.1997;94:8551–8556.[PMC free article][PubMed] McDonnell PA, Opella SJ. Effect of detergent concentration on multidimensional solution NMR spectra of membrane proteins in micelles.J. Magn. Reson.1993;B102:120–125. Mesleh MF, Veglia G, DeSilva TM, Marassi FM, Opella SJ. Dipolar waves as NMR maps of protein structure.J. Am. Chem. Soc.2002;124:4206–4207.[PMC free article][PubMed] Opella SJ. NMR and membrane proteins.Nat. Struct. Biol. NMR Suppl.1997;I:845–848.[PubMed] Opella SJ, Stewart PL, Valentine KG. Structural analysis of solid-state NMR measurement of peptides and proteins.Q. Rev. Biophys.1987;19:7–49.[PubMed] Opella SJ, Marassi FM, Gesell JJ, Valente AP, Kim Y, Oblatt-Montal M, Montal M. Structures of the M2 channel-lining segments from nicotinic acetylcholine and NMDA receptors by NMR spectroscopy.Nat. Struct. Biol.1999;6:374–379.[PMC free article][PubMed] Pake GE. Nuclear resonance absorption in hydrated crystals: fine structure of proton line.J. Chem. Phys.1948;16:327–336. Sanders CR, Hare BJ, Howard K, Prestegard JH. Magnetically-oriented phospholipid micelles as a tool for the study of membrane-associated molecules.Prog. NMR Spectrosc.1993;26:421–444. Veglia G, Opella SJ. Lanthanide ion binding to adventitious sites aligns membrane proteins in micelles for solution NMR spectroscopy.J. Am. Chem. Soc.2000;122:11 733–11 734. Wang J, Denny J, Tian C, Kim S, Mo Y, Kovacs F, Song Z, Nishimura K, Gan Z, Fu R, Quine JR, Cross TA. Imaging membrane protein helical wheels.J. Magn. Reson.2000;144:162–167.[PubMed] Waugh JS. Uncoupling of local field spectra in nuclear magnetic resonance: determination of atomic positions in solids.Proc. Natl. Acad. Sci. U.S. A.1976;78:1894–1897.[PMC free article][PubMed] Wu CH, Ramamoorthy A, Opella SJ. High-resolution heteronuclear dipolae solid-state NMR spectroscopy.J. Magn. Reson.1994;A109:270–272. Wuthrich K. The second decade-into the third millennium.Nat. Struct. Biol. NMR. Suppl.1998;II:492–495.[PubMed]

Wednesday, November 13, 2019

Cell Membrane/ Electron Transport Chain / Biochemical Pathway :: essays research papers

1. The cell membrane structure is vital to the life of the cell. The cell membrane is shaped as having a phosphate head at the very outer surface, and two fatty acid tails hanging from it. The membrane is double, so at the tip of the fatty acid tails, there are two more fatty acid tails attached to another phosphate head. This is what it looks like:  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The reason the cell membrane is shaped like this is mainly to control the water flow in and out of the cell. Water is very important to the cell: if too much water enters the cell, the cell will explode, and if too much water leaves the cell, the cell will shrivel up and die. This is how the cell membrane controls water flow: the phosphate heads are polar, and slightly attract water. However, the fatty acid tails in between are non polar, and repel water, so the fatty acid tails prevent too much water from entering or leaving the cell. With this tough membrane, there has to be a way for things to enter the cell. This is where the channel proteins come in. They act as gateways to the cell. There are many ways to enter the cell. Some ways require energy, while others don’t. The ways that require energy are put into a category called active transport, while the ways that don’t require energy are put into a category called passive transport. An example of active transport i s the proton pump. The proton pump is an integral part of chemiosmosis, and it pumps protons from an area of low concentration to an area of high concentration. This requires energy since things like to move from an area of high concentration to an area of low concentration. An example of passive transport is facilitated diffusion. This is very easy since the particle is moving from an area of high concentration to an area of low concentration and through a channel protein made exactly for its size and shape. 2. These membranes are very important to the electron transport chain. This is because they house the membrane proteins that make up the electron transport chain. The two electron transport chains are similar in that they both make ATP by chemiosmosis, and they are different in the fact that they pump protons in different directions: the electron transport chain in the thylakoid layer pumps protons in the cell (from an area of low concentration to an area of high concentration) then the protons are forced out through the ATP synthetase channel.