Tuesday, November 26, 2019

Crm Comuncation Essays - Storm, Tornado, Wind, Supercell

Crm Comuncation Essays - Storm, Tornado, Wind, Supercell Crm Comuncation In dealing with weather there are many types which can seriously cause damage to people and communities. Especially in the aviation we as pilot have to take into account many consideration in preparing for a flight. For instance, thunderstorms, icing levels, winds aloft, and visibility all play major factors in preparing for a flight. But there are some weather phenomena that can be extremely dangerous to fly into. Hurricanes, wind shear, and tornadoes are just some of the major threatening systems that can cause serious damage to people and places. One of the most interesting systems is the tornado. So what is a tornado? A tornado is a violently rotating column of air, which is found below cumulonimbus clouds and is nature's most violent wind. A tornado is officially defined as an intense, rotating column of air extending from the base of a thunderstorm cloud to the ground. Wind speeds in tornadoes can vary from 72 to almost 300 mph. Fortunately, only 2 percent of all tornadoes have winds greater than 200 mph. When a tornado is seen and has not yet made contact to the surface this is what is called a funnel cloud. When a funnel cloud touches the ground, it becomes a tornado (Jack Williams, USA TODAY Information Network). Most tornado's range from 300 to 2,000 feet in diameters, but have been reported to extremes of one mile. Tornado's usually travel in a southwest to northeast direction at about 30 knots in the U.S. According to Peter F. Lester tornado's lifetime average only for a few minutes, but have been documented to last over three hours. In the United States there is one particular place that seems to be more prominent to have tornado's form. The American Meteorology Society's Glossary of Weather and Climate defines Tornado Alley as: The area of the United States in which tornadoes are most frequent. It encompasses the great lowland areas of the Mississippi, the Ohio, and lower Missouri River Valleys. According to USA today Depending on the time of year, the southern and northern borders of tornado alley extend from about central Texas to Nebraska and Iowa. This region is where tornadoes spin up most frequently and where most monster, mile-wide twisters roam. The question is why is this area so prime for tornado's to form? Thunderstorms thrive on lots of warm, humid air. And the rotating thunderstorms, called supercells, which spawn the biggest tornadoes, need low-level winds that shift direction and grow stronger just above the ground (USA weather). The Gulf of Mexico provides an abundance of tropical moisture blowi ng into the Plains on south and southeast winds. Meanwhile the higher and drier elevations of the Rockies allow a hot, dry layer of air to blow over the region from the southwest. (USA TODAY Chris Cappella USA weathers source). It's the unique combination of atmospheric parameters a large moisture supply, low-level wind shear, a drying and cooling middle atmosphere, and features such as the dryline and a convective cap that turn the Great Plains into a tornado alley. The conditions responsible for the cause of tornado's are basically wind from the west and moister that comes from the Gulf of Mexico. The clash of warm and cold air helps supply the humidity and energy needed. Winds from different directions high above the ground help supply more energy and also give the air the turning motion needed for tornadoes. The center of the tornado's vortex is a low-pressure area. As air rushes into the vortex, its pressure lowers, which cools the air. Cooling condenses water vapor in the air into the tornado's familiar funnel-shaped cloud. Although the air is rising in a tornado, the funnel itself grows from the cloud toward the ground as the tornado is forming. Tornadoes form in the air rising into a thunderstorm, in the updraft. The strongest tornadoes are often near the edge of the updraft, not far from where air is descending from the thunderstorms. (Jack Williams, USA TODAY Information Network). Some times tornado's can be mistaken for microburst. The difference between microburst and tornado's is that Air moves very rapidly upward around a tornado center. This distinguishes tornadoes from microburst, which often do tornado-like damage

Saturday, November 23, 2019

Boxes and Boxing

Boxes and Boxing Boxes and Boxing Boxes and Boxing By Mark Nichol Is there any connection between the word for a usually square or rectangular container and the name of the contact sport called the sweet science? The pugilistic sense of box may be related to the botanical one and therefore to the general sense of an object in which something is situated or enclosed, but no direct relationship has been traced. However, this post explains the etymological origin of the word in both senses and provides some definitions and usage examples. Box is ultimately from the word pyxos, the Greek name of the box tree, by way of the Latin term buxis. The wood of the box tree, also called boxwood, is used for making things- including, naturally, boxes. (The tree itself is used for hedges and topiary.) Now, however, a box can be made of virtually any material, and though most boxes consist of square or rectangular faces, they come in many shapes. By extension, the word has come to refer to seating compartments for spectators at a sports or performing-arts event, receptacles for mail (though mailbox may refer to both physical and electronic correspondence, and â€Å"letter box† is used in British English), a manually drawn or electronically produced square or rectangular space, or the defined space in which a batter stands while at bat during a game of baseball. (There is also a catcher’s box adjacent to the batter’s box, and the pitcher’s mound, from its origin as a boxed area, is still sometimes referred to as â€Å"the box.†) Box is also a verb meaning â€Å"place in a box,† the act of enclosing something in a box is boxing, and boxy is an adjective meaning â€Å"resembling a box.† In addition, many terms incorporate box as the first or second element in an open or closed compound (for example, â€Å"box office† and hatbox). Boxing Day, a holiday in the United Kingdom and various countries that were part of the British Empire, is said to stem from the tradition of giving boxes containing money or presents to servants and tradespeople on the day after Christmas (or near the holiday). But in the United States, the holiday is not observed and is little known; boxing is in American English solely a reference to the sport in which fists are used to strike or defend oneself from an opponent. The term derives from the verb box, which means â€Å"beat, strike, or thrash with one’s hands or fists.† Box itself can be a noun in this sense, though it is rarely used as such. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Vocabulary category, check our popular posts, or choose a related post below:20 Words with More Than One Spelling15 Great Word GamesCapitalizing Titles of People and Groups

Thursday, November 21, 2019

Racism Essay Example | Topics and Well Written Essays - 1250 words

Racism - Essay Example The concept of ‘other’ creates the boundaries between people. Racism is prevalent everywhere one goes. Asians go to the European countries and do menial jobs for minimum wages. It is hard for them to score jobs they dream of doing. Even the economic analysts consider the Asian community as the labor community; washing dishes, working at gas stations or flipping burgers. The situation is not only prevalent in European countries, Silicon Valley United States is considered a dream place to get a job. However such a statement is highly overrated because the situation on ground is based on segregation. Hence it is true that racism is not only physical but it is a mental state. And in Silicon Valley it is termed as environmental racism. The immigrants are the ‘others’. The definition of other is that there is always ‘us’ and there is ‘other’ which is different from ‘us’. The other looks, different, talks, walks and eats different. These differences create imaginary walls between the two (i-e us and them). On the same psychological basis people divide other people in nations, ethnicities and races. This segregation goes on to include religions, cultures and any other classifications. There are two aspects of racism. One is when a white person feels superior because of the skin color. The other is when a black person feels inferior because of his color. The standards of beauty are defined by the modern media (especially Hollywood productions) that project white beauty and white lifestyle as the symbol of success and prosperity. Screenwriters, storytellers, movie directors and producers are biased in portraying a story or a life event. Hollywood movies do not explicitly show racist culture in their movies. But the majority of the movies in Hollywood show white lead role. The black guy is in his accomplice. The black guy is usually

Tuesday, November 19, 2019

10 page Term Paper of an amendment to the United States Constitution

10 page of an amendment to the United States Constitution - Term Paper Example The legislative branch (Congress) which has the powers to make laws, the executive branch (which is represented by president, as well as his advisors,) of which has the power to apply the laws, and lastly the judiciary branch (i.e. the supreme as well as other federal courts) which has the power to reverse or dismiss laws that it decides are unconstitutional. Immediately after America won independence from Great Britain with its victory in 1783, during the American Revolution, it became evident that the newly formed nation was in need of a strong central government to remain stable. In 1786, a lawyer as well as a politician from New York by the names of Alexander Hamilton called for a discussion on the matter of a constitutional convention. In February 1787, the legislative body of the confederation supported the idea and invited all the 13 states to have their delegates meet in Philadelphia (A&E, 2014, 1). However, after the creation of the new constitution, it remained vague because that was the main intention of the constitution, so that with time the constitution would grow which in turn would solve many of United States’ current problems that the forefathers could not predict. The constitution’s first ten amendments are collectively referred to as the Bill of rights. The bill of rights ranks alongside the declaration of Independence as well as the constitution as one of America’s most treasured documents. The bill of rights was projected in order to appease the fears of the anti-federalists who opposed the constitutional approval. The bill of rights was fashioned exclusively to guarantee the individual rights and freedoms of citizens under the constitution of which included the first 10 amendments. The bill of rights was also reserved for definite powers to the states and the public, and limited the governments authority in judicial and other proceedings (Carey, 2003, 1). In addition, while the amendments were only initially

Sunday, November 17, 2019

Gender identity Essay Example for Free

Gender identity Essay Gender identity is a term which is used to refer to a person as a female or a male. It is the personal conception of a person of either being a male or a female while in rare circumstances one may manifest both the female and male characteristics. Gender identity is usually defined by a person depending on how such a person feels concerning his identity in terms of gender. Gender identity is different from gender role in that while gender identity refers to an individual’s feeling’s about his or her gender, gender roles are usually defined by the society and they are based on the physical appearance of a person as well as behavior of a person. As such, gender roles serves as outward expressions of a person’s gender identity. A person who claims to be a male for example must exhibit male behaviors in deed, dressing and also his behavior. Normally, gender and sex are always used interchangeably although scientifically and medically they are different words which are not even synonyms (Ghosh, n. d). Influence of hormone and behavior interaction on determination of gender identity The interaction between the behavior of a person and their hormonal composition is the most complex ideology of gender identity especially because it is difficult to truly ascertain that hormones directly influence the behaviors of an individual. However, there exists a relationship behind the two components of gender determination with this relationship having a reciprocal form. Presence of high levels of certain hormones in a person may influence or lead to certain behaviors while some behaviors may also lead to changes in the hormonal composition of an individual thus affecting their gender identity (Litosseliti Sunderland, 2002). Gender development of a child begins before he or she is born, that is, gender identity matures even before a child is born. After birth, the gender identity of an individual is determined by psychological, biological and sociological factors. Male and females have different hormones which affect the development of a person thus affecting or influencing the gender identity. In males, testosterone is the dominant hormone which leads to the development of male organs in a person. Testosterone is responsible for the development of major features found in males which included breaking of the voice, development of the genital organs and it also governs the distribution of fats in a person. On the other hand, estrogen is the dominant hormone in female which leads in development of feminine characteristics in females. This hormone aids in breast formation, formation of sexual organs and it also aids in development of other features common with the females like fat distribution in the body. These hormones also determines how a person behaves whether as a male or as a female. The behaviors of a person are also indicators of the gender identity of a person (Wolfe Mash, 2005). Some of the major determinants of gender identity are the hormones and the behaviors. Usually, hormones are the ones which influence the behavior of a person. People with more concentration of testosterone are more masculine while those with high levels of estrogen are more feminine. Testosterone and estrogen hormones are responsible for the sexual behavior of an individual which determines the sexual orientation of an individual. Interaction between the hormones and the behavior of an individual determines or influences to a great extent the gender identity of a person. Children reared in a neutral environment learn from an early age what are the acceptable roles and behaviors of the two different genders. As the hormones of a person correlate with the acceptable behavior of a certain gender, a person forms an idea of his or her gender identity. Also, at very tender age, parents also play a major role in shaping the behavior of a child. Parents usually buy cars and balls for the boys while girls are bought for baby dolls and other feminine toys. The behavior that the children are taught by the society determines how a person identifies himself or herself in terms of gender. Consistency in behavior may influence a person’s gender by influencing hormones release to the body. However, hormones also play a major role in formation of gender identity. Males with higher female hormones tend to behave like the ladies and may often wish to be a woman which forms his gender identity. This is also the case with females who find themselves interested in male activities. They exhibit behaviors similar to that of the males which is as a result to hormonal composition of such a person. When the hormones interact with the behavior of a person, such an individual is able to determine his or her gender identity (Jacobs, Thomas Lang, 1997). Psychological factors also affect gender identity of a person. It is believed that all persons are born with some intrinsic level of testosterone that is whether male and female. However, the level of this hormone varies from individuals and is usually exhibited through such behaviors as dominance. Testosterone hormone is directly and positively correlated to dominance and this affects the gender identity of an individual. All persons who are higher in the rank have an innate urge to dominate while those who are lower in the rank are less dominating. This is a psychological aspect and it also contributes to how a person views herself or himself in terms of gender. Ladies or women who are higher in the rank may exhibit male characteristics which may form their gender identity. Likewise, men who are lower in rank tend to behave more like women which influences their gender identity (Lee, 2005). Environmental factors are also contributors while forming our gender identity. The environment in which a person is reared in determines or influences his gender identity formation. The treatment one gets from different gender groups shapes his or her gender identity. In an environment characterized by clearly defined gender roles for the males and the females, people are likely to identify with either of the genders mostly through association and task performance. In a neutral community or society, gender identity tends to be more influenced by personal interaction and hormonal composition rather than environmental forces. Biological composition of a person also greatly influences the gender identity of a person. Unlike the psychological and environmental factors, biological influences are innate which a person is born with. The biological factors influencing gender formation cannot be influenced by the environment in which a person is reared though they may lead to discomfort especially when the outside pressure is more on a person. It is believed that the gender of a person is determined during prenatal development and as such it is a biological condition. Genes of a person determines his gender identity which cannot be reversed especially when these genes are very strong (Sonderegger Anastasi, 1984). In gender identity determination, the biological influence is stronger than all other influences. Most of males who have feminine characteristics being dominant continue to behave like women despite their environment or psychological exposure. This also applies to women who are more masculine than feminine. Usually, such people end up looking for sex re-alignment to transform them to the different sex. Also, a person who is has different sex characteristics as being dominant in them always feel uncomfortable while identifying with the gender the society view them to belong to. As such, biological influence is much stronger than all other influences while defining the gender identity of a person (Ehrhardt Meyer-Bahlburg, 1981). Reference: CREWS, D. WILLIAMS, E. E. (n. d): Hormones, Behavior, and Speciation. Retrieved on 7th April 2009 from, http://icb. oxfordjournals. org/cgi/content/abstract/17/1/271 Ehrhardt A. A Meyer-Bahlburg, H. F. (1981): Effects of prenatal sex hormones on gender-related behavior. Journal of American Association for the Advancement of Science, Vol 211 Ghosh, S. (n. d): Sexuality: Gender Identity. Retrieved on 7th April 2009 from, http://emedicine. medscape. com/article/917990-overview. Jacobs, S. , Thomas, W. Lang, S. (1997): Two-spirit people: Native American gender identity, sexuality, and spirituality. ISBN 0252066456, Published by University of Illinois Press Lee, J. W. (2005): Psychology of gender identity. ISBN 1594542147, Published by Nova Publishers Litosseliti, L. Sunderland, J. (2002): Gender identity discourse analysis. ISBN 902722692X, Published by John Benjamins Publishing Company Sonderegger, T. B. Anastasi, A. (1984): Psychology and gender. ISBN 0803241526 Published by U of Nebraska Press Wolfe, D. A. Mash, E. J. (2005): Behavioral and emotional disorders in adolescents: nature, assessment, and treatment. ISBN 1593852258, Published by Guilford Press

Thursday, November 14, 2019

The Communist Manifesto :: Literary Analysis, Marx

The Communist Manifesto written by Karl Marx in 1848 is noted as one of the most influential political documents in the world. The publication of the book earned Marx the reputation of a prominent sociologist and political theorist. Despite his renown, there are many controversies concerning the ideas and concepts of communism formulated in the papers that are still heatedly debated even today. Marx (1998) opened the book with, â€Å"The history of all hitherto existing society is the history of class struggles.† (p.4). He scrutinized the class differences and social inequality between the Proletariats and Bourgeoisies, two terms he coined to represent social classes that do not own the means of production and social classes that do own the means of production respectively. Since The Communist Manifesto was produced in an era of great social distress, it was the result of Marx’s desire to eliminate the gap between the two classes in order to ameliorate the social, polit ical, and economic conditions of the Proletarians. To achieve equality, Marx encouraged the Proletarians to conspire against the Bourgeoisies to end the exploitation of lower social classes and set up a communistic society where class distinction is a leap of imagination. However, his ideal required changes that a society cannot successfully adapt to and do not ultimately provide equality. Marx’s theories were established upon only class stratification and ignored the many other factors that contribute to the foundation of a society. The entire list of demands that outlines the rules and regulations of communism do not fundamentally offer fairness. Communism disrupts the whole social exchange system which will eventually corrupt the economy of a society. Thus, the theories introduced in The Communist Manifesto by Karl Marx are not relevant in modern industrialized societies primarily because they focus only on the issue of class stratification and neglected the other complica tions involved in a society. Marx (1998) believed that â€Å"Society as a whole is more and more splitting up into two great hostile camps, into two great classes directly facing each other – bourgeoisie and proletariat.† (p.4). It was a vital mistake to polarize the people exclusively on classes instead of taking into account the other factors that contribute to the build-up of a society such as traditions, religious ideologies, trust, laws, cultures, and such. Attempting to create equilibrium between solely the classes will cause new and severe problems that cannot be fixed with Marx’s theories.

Tuesday, November 12, 2019

Cyber Security

â€Å"Securing  a  computer  system  has  traditionally  been  a  battle  of  wits:  the  penetrator  tries  to  find the  holes,  and  the  designer  tries  to  close  them. †Ã‚  Ã‚  ~Gosser Warfare  has  always  been  a  game  of  cat  and  mouse. As  technology  increases  war  has  to  adapt with  it. Wars  have  evolved  from  a  contest  of  strength  to  a  show  of  potential. Previously  wars  were fought  with  large  armies  and  whomever  could  most  effectively  utilize  the  most  troops  with  better training  won;  now  however,  a  single  person  with  a  nuclear  bomb  can  destroy  a  city  within  seconds.In the  1980s,  a  new  technology  appeared:  the  internet. At  first  the  internet  was  just  a  way  for  people  to communicate  by  sending  t ext  files  to  each  other. Soon  however  the  internet  became  a  public  place  to store  and  access  information. As  more  and  more  personal  and  classified  information  gets  stored,  it  is only  natural  that  people  try  to  find  a  way  to  steal  information  for  their  own  benefits. Cyber  skirmishes are  right  now  being  fought  online  to  get  more  information.Bruce  Berkowitz  said:  Ã¢â‚¬Å"The  ability  to collect,  communicate,  process,  and  protect  information  is  the  most  important  factor  defining  military power. †Ã‚  Berkowitz  argues  that  weaponry  and  manpower  that  used  to  be  the  main  determining  factor of  wars  will  lose  out  to  the  amount  of  information  that  a  country  has. Knowing  where  the  enemies have  groupedà ‚  their  troops/weapons  will  allow  a  guided  missiles  and  unmanned  drones  to  wreak havoc. Cheap  cyber  weapons  such  as  worms  and  trojans  (viruses)  can  neutralize  conventional 2 eapons  as  missiles  and  nukes1. According  to  the  Department  of  Homeland  Security:  Ã¢â‚¬Å"Our  daily  life,  economic  vitality,  and national  security  depend  on  a  stable,  safe,  and  resilient  cyberspace. We  rely  on  this  vast  array  of networks  to  communicate  and  travel,  power  our  homes,  run  our  economy,  and  provide  government services. Yet  cyber  intrusions  and  attacks  have  increased  dramatically  over  the  last  decade,  exposing sensitive  personal  and  business  information,  disrupting  critical  operations,  and  imposing  high  costs  on the  economy. 2 Unlike  any  other  technological  advancement,  information  technology  has  changed  how  wars are  fought. Before  information  technology  wars  were  always  about  killing  enemy  combatants,  now skirmishes  are  about  the  speed  of  maneuvering  packets  of  information. There  is  no  longer  a  Ã¢â‚¬Å"front†Ã‚  in war;  rather  it  is  all  about  little  battles  between  counter ­invasion  and  invasion. While  previously  a command  center  would  be  untargetable  unless  you  bypass  the  enemy  armies,  now  each  Ã¢â‚¬Å"battle†Ã‚  online is  consisted  of  its  own  security  system. What  we  are  seeing  are  threats  against  critical  infrastructure,† said  Cyber  security  expert  Jessica  Herrera ­Flanigan  of  the  Monument  Policy  Group  . â€Å"So,  we  are talkingà ‚  about  threats  against  our  energy  sector,  the  banking  sector,  telecommunications,  smart  grids, oil  and  gas  Ã‚ ­Ã‚  basically,  all  the  critical  assets  that  we  have  that  operate  our  day ­to ­day  living  are  being impacted. † Like  traditional  war,  cyber ­war  has  two  basic  types  of  attacks:  disruption  and  espionage. 1 ttps://www. cia. gov/library/center ­for ­the ­study ­of ­intelligence/csi ­publications/csi ­studies/studies/vol48no4/ new_face_of_war. html 2 http://www. dhs. gov/cybersecurity ­overview 3 Disruption  attacks  can  be  compared  to  traditional  battles  between  two  armies. Attacks  of  this  type  is designed  to  halt  a  specific  site  or  server. Espionage  attacks  are  generally  attacks  for  classified information. Common  attacks  include  denial  of  service  attack,  viruses,  worms  and  trojans.Countries such  as  China  and  India  are  rapidly  outpacing  the  United  States  in  the  field  of  information  technology. Should  the  United  States  not  be  able  to  keep  up  with  China  and  India  in  information  technology,  these countries  will  be  able  to  steal  information  on  the  United  States  infrastructure  and  military  secrets. What  is  Computer  Security Cybersecurity  is  used  to  describe  a  set  of  hardware,  software  and  coding  designed  to  protect  a nation/company’s  networks,  computers,  programs  and  data  from  any  type  of  unauthorized  access.There  are  different  types  of  of  cyber  security:  Application  security  is  specific  to  different  applications (programs)  and   deals  with  the  measures  that  the  program  takes  while  it  is  running  to  prevent  errors and  handle  exceptions  when  there  is  a  flaw  (an  example  of  this  can  be  the  Windows  Blue  Screen  of Death). Information  security  is  when  a  company/nation  tries  to  defend  information  or  trade/military secrets  Ã‚  from  unauthorized  access  (an  example  of  this  is  when  Gmail  is  encrypting  its  passwords). Disaster  recovery  is  the  process  in  which  a  program  tries  to  recover  data  aft Cyber Security â€Å"Securing  a  computer  system  has  traditionally  been  a  battle  of  wits:  the  penetrator  tries  to  find the  holes,  and  the  designer  tries  to  close  them. †Ã‚  Ã‚  ~Gosser Warfare  has  always  been  a  game  of  cat  and  mouse. As  technology  increases  war  has  to  adapt with  it. Wars  have  evolved  from  a  contest  of  strength  to  a  show  of  potential. Previously  wars  were fought  with  large  armies  and  whomever  could  most  effectively  utilize  the  most  troops  with  better training  won;  now  however,  a  single  person  with  a  nuclear  bomb  can  destroy  a  city  within  seconds.In the  1980s,  a  new  technology  appeared:  the  internet. At  first  the  internet  was  just  a  way  for  people  to communicate  by  sending  t ext  files  to  each  other. Soon  however  the  internet  became  a  public  place  to store  and  access  information. As  more  and  more  personal  and  classified  information  gets  stored,  it  is only  natural  that  people  try  to  find  a  way  to  steal  information  for  their  own  benefits. Cyber  skirmishes are  right  now  being  fought  online  to  get  more  information.Bruce  Berkowitz  said:  Ã¢â‚¬Å"The  ability  to collect,  communicate,  process,  and  protect  information  is  the  most  important  factor  defining  military power. †Ã‚  Berkowitz  argues  that  weaponry  and  manpower  that  used  to  be  the  main  determining  factor of  wars  will  lose  out  to  the  amount  of  information  that  a  country  has. Knowing  where  the  enemies have  groupedà ‚  their  troops/weapons  will  allow  a  guided  missiles  and  unmanned  drones  to  wreak havoc. Cheap  cyber  weapons  such  as  worms  and  trojans  (viruses)  can  neutralize  conventional 2 eapons  as  missiles  and  nukes1. According  to  the  Department  of  Homeland  Security:  Ã¢â‚¬Å"Our  daily  life,  economic  vitality,  and national  security  depend  on  a  stable,  safe,  and  resilient  cyberspace. We  rely  on  this  vast  array  of networks  to  communicate  and  travel,  power  our  homes,  run  our  economy,  and  provide  government services. Yet  cyber  intrusions  and  attacks  have  increased  dramatically  over  the  last  decade,  exposing sensitive  personal  and  business  information,  disrupting  critical  operations,  and  imposing  high  costs  on the  economy. 2 Unlike  any  other  technological  advancement,  information  technology  has  changed  how  wars are  fought. Before  information  technology  wars  were  always  about  killing  enemy  combatants,  now skirmishes  are  about  the  speed  of  maneuvering  packets  of  information. There  is  no  longer  a  Ã¢â‚¬Å"front†Ã‚  in war;  rather  it  is  all  about  little  battles  between  counter ­invasion  and  invasion. While  previously  a command  center  would  be  untargetable  unless  you  bypass  the  enemy  armies,  now  each  Ã¢â‚¬Å"battle†Ã‚  online is  consisted  of  its  own  security  system. What  we  are  seeing  are  threats  against  critical  infrastructure,† said  Cyber  security  expert  Jessica  Herrera ­Flanigan  of  the  Monument  Policy  Group  . â€Å"So,  we  are talkingà ‚  about  threats  against  our  energy  sector,  the  banking  sector,  telecommunications,  smart  grids, oil  and  gas  Ã‚ ­Ã‚  basically,  all  the  critical  assets  that  we  have  that  operate  our  day ­to ­day  living  are  being impacted. † Like  traditional  war,  cyber ­war  has  two  basic  types  of  attacks:  disruption  and  espionage. 1 ttps://www. cia. gov/library/center ­for ­the ­study ­of ­intelligence/csi ­publications/csi ­studies/studies/vol48no4/ new_face_of_war. html 2 http://www. dhs. gov/cybersecurity ­overview 3 Disruption  attacks  can  be  compared  to  traditional  battles  between  two  armies. Attacks  of  this  type  is designed  to  halt  a  specific  site  or  server. Espionage  attacks  are  generally  attacks  for  classified information. Common  attacks  include  denial  of  service  attack,  viruses,  worms  and  trojans.Countries such  as  China  and  India  are  rapidly  outpacing  the  United  States  in  the  field  of  information  technology. Should  the  United  States  not  be  able  to  keep  up  with  China  and  India  in  information  technology,  these countries  will  be  able  to  steal  information  on  the  United  States  infrastructure  and  military  secrets. What  is  Computer  Security Cybersecurity  is  used  to  describe  a  set  of  hardware,  software  and  coding  designed  to  protect  a nation/company’s  networks,  computers,  programs  and  data  from  any  type  of  unauthorized  access.There  are  different  types  of  of  cyber  security:  Application  security  is  specific  to  different  applications (programs)  and   deals  with  the  measures  that  the  program  takes  while  it  is  running  to  prevent  errors and  handle  exceptions  when  there  is  a  flaw  (an  example  of  this  can  be  the  Windows  Blue  Screen  of Death). Information  security  is  when  a  company/nation  tries  to  defend  information  or  trade/military secrets  Ã‚  from  unauthorized  access  (an  example  of  this  is  when  Gmail  is  encrypting  its  passwords). Disaster  recovery  is  the  process  in  which  a  program  tries  to  recover  data  aft

Saturday, November 9, 2019

Nutrition and Dietetics Proposal-Discussion/Conclusion

Introduction The main aim of this project was to assess the relationship of CVD risk factors and diet in Cuban Americans. More specifically, this project was aimed to see the association of omega 3 fatty acid with CVD biomarkers, homocysteine and CRP in Cuban Americans with and without type 2 diabetes. These aims were targeted with the views to providing information on cardiovascular disease risk factors and its association with diet and type 2 diabetes.The results suggested positive association between omega 3 fatty acid andhomocysteine quartiles, suggesting the significant role of omega 3 fatty acids in the regulation of homocysteine level. However, the association of omega 3 fatty acid was not found with CRP levels, which suggested the very little or no role of omega 3 fatty acid in lowering the level of CRP. Moreover, diabetic status was not found to be associated with either homocysteine quartiles or CRP levels. This finding concluded that homocysteine and CRP may not be involved in regulat ing the blood circulating blood sugar. The result of the statistical t-test showed that waist circumference was directly associated with diabetes, which indicated obesity as a major indicator of diabetes. This finding supported several other previous findings that studied the association between obesity and type 2 diabetes (Daousi, et.al. 2006 and Yajnik and Ganpule, 2010). Interestingly, another CVD risk factor, total blood cholesterol was found to be significantly higher in non-diabetics. However, whether HDL or LDL was higher non-diabetics was not measured, making it difficult to draw any conclusion from this finding. Other factors, such as BMI, systolic and diastolic blood pressure, were not found to be associated with diabetes. These results seemed slightly contradictory as previous studies have found the correlation between these parameters and diabetes (Bays, et.al. 2007 and Mancia, 2005)., Interestingly, linkage was found between diabetes and glycosylate haemoglobin and omega 3 fatty acids, which suggested the implication of thee tow factor in diabetes risk. These findings corroborate with similar other findings. Edelman, et.al (2013) reported that high level of HbA1c was associated with higher incidence of type 2 diabetes. Similarly, another study by Virtanen, et.al (2013) suggested that intake of long-chain omega-3 polyunsaturated fatty acid w as associated with long-term lower risk of type 2 diabetes. Furthermore, the results showed no association between CRP and diabetes, which contradicted the inflammatory pathogenesis of type 2 diabetes (Muqabo and Renier, 2010). Another important finding was that diabetic status was directly associated with the distribution of homocysteine quartiles, which supported the previous findings by Ndrepepa, et.al (2008) and Badiou, et.al (2012) as explained earlier. Relationship between omega 3 fatty acid and homocysteine This study showed positive association between omega 3 fatty acid and homocysteine level, suggesting the role of omega 3 fatty acids in regulating the level of homocysteine in the body. As discussed earlier, homocysteine is an important biomarker of CVD and control of which may reduce the risk of CVD. These findings support previous finding by Kulkarni, et.al (2011) who studied the association of omega 3 fatty acid with homocysteine concentrations. In the study they found that altered omega 3 fatty acids (mainly docosahexaenoic acid) may lead to increased homocysteine concentration. However, majority of studies have focused on the association between omega 3 fatty acids and other CVD markers such as LDL, blood sugar and clotting factors (Yeh, et.al. 2009; Etherton, et.al. 2002). Thus, further long term studies should be done to unravel the possible association between omega 3 fatty acid and homocysteine. Limitations Despite some interesting findings, the study had few limitations. The association of omega 3 fatty acids with homocysteine and CRP was only studied in diabetics and non-diabetics. The study would have given much clearer conclusion if the implication of omega 3 fatty acids and its biomarkers was also investigated in CVD patients. Moreover, although the study found the correlation between cholesterol and diabetes, it did not assess whether HDL or LDL had greater implication in diabetics. Clinical implications of the findings and future research Diabetes and CVD disease are two chronic conditions that are the major killers among all the diseases. Preventive measures and early diagnosis remains the key for proper management of the disease. This study suggests the beneficial role of omega 3 fatty acids in diabetes and cardiovascular disease. More so, the study also showed the association of omega 3 fatty acids with CVD markers such as homocysteine, cholesterol, as well as diabetes marker such as HbA1c. Thus, people who are at risk of developing CVD and diabetes can be encouraged to intake diet rich in omega 3 fatty acids. But , the association of omega 3 fatty acid with inflammatory maker, CRP remained inconclusive. Also, whether increased homocysteine in diabetics was associated with CVD was beyond the scope of this project and demands further studies. Future studied should be done to see the effects of omega 3 fatty acids in altering homocysteine level and CRP in CVD patients. References Bays, H.E., Chapman, R.H., Grandy, S. & SHIELD Investigators’ Group 2007, â€Å"The relationship of body mass index to diabetes mellitus, hypertension and dyslipidaemia: comparison of data from two national surveys†, International journal of clinical practice, vol. 61, no. 5, pp. 737-747. Daousi, C., Casson, I.F., Gill, G.V., MacFarlane, I.A., Wilding, J.P. & Pinkney, J.H. 2006, â€Å"Prevalence of obesity in type 2 diabetes in secondary care: association with cardiovascular risk factors†, Postgraduate medical journal, vol. 82, no. 966, pp. 280-284. Edelman, D., Olsen, M.K., Dudley, T.K., Harris, A.C. &Oddone, E.Z. 2004, â€Å"Utility of hemoglobin A1c in predicting diabetes risk†, Journal of general internal medicine, vol. 19, no. 12, pp. 1175-1180. Etherton, P.M.K., Harris, W.S andAppel, L.J, 2002. AHA Scientific Statement. â€Å"Fish Consumption, Fish Oil, Omega-3 Fatty Acids, and Cardiovascular Disease†, vol. 106, pp. 2747-2757. Kulkarni, A., Mehendale, S., Pisal, H., Kilari, A., Dangat, K., Salunkhe, S., Taralekar, V. & Joshi, S. 2011, â€Å"Association of omega-3 fatty acids and homocysteine concentrations in pre-eclampsia†, Clinical nutrition (Edinburgh, Scotland), vol. 30, no. 1, pp. 60-64. Mancia, G. 2005, â€Å"The association of hypertension and diabetes: prevalence, cardiovascular risk and protection by blood pressure reduction†, ActaDiabetologica, vol. 42 Suppl 1, pp. S17-25. Mugabo, Y., Li, L. &Renier, G. 2010, â€Å"The connection between C-reactive protein (CRP) and diabetic vasculopathy. Focus on preclinical findings†, Current diabetes reviews, vol. 6, no. 1, pp. 27-34. Virtanen, J.K., Mursu, J., Voutilainen, S., Uusitupa, M. &Tuomainen, T.P. 2013, â€Å"Serum Omega-3 Polyunsaturated Fatty Acids and Risk of Incident Type 2 Diabetes in Men: The Kuopio Ischaemic Heart Disease Risk Factor Study†, Diabetes care. Yajnik, C.S. &Ganpule-Rao, A.V. 2010, â€Å"The obesity-diabetes association: what is different in indians?†, The international journal of lower extremity wounds, vol. 9, no. 3, pp. 113-115. Yeh, E, Wood, R.D, Leeson, S and Squires, E.J, 2009.British poultry science. â€Å"Effect of dietary omega-3 and omega-6 fatty acids on clotting activities of Factor V, VII and X in fatty liver haemorrhagic syndrome-susceptible laying hens†, vol. 50, no.3, pp. 582-392.

Thursday, November 7, 2019

Information Privacy

Information Privacy Information privacy is the privacy of personal information within organizations, and their attempts to define content of information stored on computer systems that third party can also access. Data masking, encryption, and authentication are some of the ways of protecting data from the public so that only authorized personnel can access such information (Rouse, 2013).Advertising We will write a custom research paper sample on Information Privacy specifically for you for only $16.05 $11/page Learn More Organizations always use this aspect of information technology (IT) to increase confidentiality within the management in order to reduce vulnerability and exposure of their systems to unauthorized segment. Information on finance, medical data, criminal records, and business information are some of the personal data that require continuous privacy. The United States, for instance, has different legislations on data privacy that deal with specific sectors given the different needs that emanate from them. Data usage by unauthorized persons is illegal in most parts of the globe. Therefore, concerned parties must come up with relevant protective measures to address the possibilities of such pieces of information of finding their way on the wrong hands. Patients’ records are essential in managing health facilities by ensuring that they offer quality services to the clients. For instance, a patient’s medical history is essential in determining the types of medication to administer to the patient. Such data remain confidential, and should only be used for treatment purposes only. As a way of preventing information leakage, which may result in stigma to a patient, the management must ensure that pieces of information on all patients are kept securely to maintain confidentiality. The US has the Health Insurance Portability and Accountability Act (HIPPA) that ensures that patients’ data remain accessible only to the authorized segment of the staff. HIPAA uses electronic data interchange to give patients’ information unique identifiers that the unauthorized group cannot interpret. Users are given privileges under strict laws to access all medical records, and, at the same time, have to maintain data integrity and confidentiality on information that may lead to identification of a patient (Rouse, 2013). Websites also have confidentiality policies that guide their service provision. Some organizations have put tracking measures in place to identify those accessing their websites for security purposes. For example, when one accesses such sites, the computer stores cookies automatically. This move prevents hacking of information by third parties as the organizations can trace all their users. This issue of cyber security has been contentious, with opponents arguing that it is against the privacy policy to allow organizations to track their users through cookies. However, proponents hold that even though the move infringes on the privacy of the public, it has impressive impacts on guarding the security of organizations. That is, loss of data by an organization has great impacts on society as compared to tracking individuals.Advertising Looking for research paper on communications media? Let's see if we can help you! Get your first paper with 15% OFF Learn More The US citizens use cyberspace to travel, power their homes, communicate, provide essential government services, and run their economy. The overreliance on the network has posed serious attacks thus causing more information vulnerability. Organizations should work towards limiting data breaches that may arise from information hacking. Using password-protected data is one way of improving the security of online data (Zhan, 2009). Markedly, choice of passwords is key in limiting data loss. In cybercrimes, one does not need to break into a physical property to steal information or use force to access the materials. For example, bank frauds have been on the rise with the coming of this new technology. In addition, cases of information confidentiality is worrying, as other internet savvy people can access such information, a recent example is the Wikileaks. These cases prompted US to pass legislations that could help in eradicating this menace. Since many departments and organizations use this modern technology, fighting the vices is a shared responsibility (Raab Mason, 2002). The private and public sectors are collaborating to create awareness on cyber security among the internet users. With the high rates of cybercrimes, financial institutions, for instance, have to use complex mechanisms to enhance the security of their data, as fraudsters can easily transfer funds through the online platform to their accounts. In this aspect, the browsing history of users is significant in enhancing information security for the benefit of both the users and website owners. Internet security has made most users to maintain anonymity while online. A study by Pew Research Institute revealed that 86% of Americans prefer being anonymous to keep their data private (Gorodyansky, 2013). They protect their IP addresses, encrypt emails, and delete cookies frequently from their computers. Information privacy remains a controversial issue in the US given the recent phone-tapping move by the federal government. The government has also gained access to emails of prominent personalities as a way of enhancing the overall security of the country. Instances of terrorist attacks similar to the 9/11 that led to loss of lives and destruction of properties have been common with the manufacture of nuclear weapons by some Middle East Nations. In security line, the US can breach the information security policy in order to enhance the safety of its citizens and the entire world. References Gorodyansky, D. (2013, October 13). Internet Privacy and Security: A Shared Responsibility. Wired.com. Web.Adv ertising We will write a custom research paper sample on Information Privacy specifically for you for only $16.05 $11/page Learn More Raab, C. D., Mason, D. (2002). Privacy, Surveillance, Trust and Regulation. Information, Communication Society, 5(2), 237-241. Rouse, M. (2013, August 5). Data privacy (information privacy). SearchCIO. Web. Zhan, J. (2009). Information Privacy: Security and Integrity. International Journal of Information Privacy, Security and Integrity, 1, 55-83.

Tuesday, November 5, 2019

Polis - Ancient Greek City-States

Polis - Ancient Greek City-States The polis (plural, poleis)- also known as a city-state- was the ancient Greek city-state. The word politics comes from this Greek word. In the ancient world, the polis was a nucleus, the central urban area that could also have controlled the surrounding countryside. (The word polis could also refer to the citys body of citizens.)  This surrounding countryside (chora or ge) could also be considered part of the polis. Hansen and Nielsen say there were around 1500 archaic and classical Greek poleis. The region formed by a  cluster of poleis, bound geographically and ethnically, was an ethnos (pl. ethne).   Pseudo-Aristotle defines the Greek polis as an assemblage of houses, lands, and property sufficient to enable the inhabitants to lead a civilized life [Pounds]. It was often a lowland, agricultural central area surrounded by protective hills. It may have started as numerous separate villages that banded together when its mass became large enough to be almost self-sustaining. The Largest Greek Polis The polis of Athens, the largest of the Greek poleis, was the birthplace of democracy. Aristotle saw the household oikos as the basic social unit of the polis, according to J. Roy. Athens was the urban center of Attica; Thebes of Boeotia; Sparta of the southwestern Peloponnese, etc. At least 343 poleis belonged, at some point, to the Delian League, according to Pounds. Hansen and Nielsen provide a list with member poleis from the regions of Lakonia, the Saronic Gulf (to the west of Corinth), Euboia, the Aegean, Macedonia, Mygdonia, Bisaltia, Chalkidike, Thrace, Pontus, the Pronpontos, Lesbos, Aiolis, Ionia, Karia, Lykia, Rhodes, Pamphyli, Kilikia, and poleis from unlocated regions. The End of the Greek Polis It is common to consider the Greek polis ended at the Battle of Chaironeia, in 338 B.C, but An Inventory of Archaic and Classical Poleis argues that this is based on the assumption that the polis required autonomy and that was not the case. Citizens continued to run their citys business even into the Roman period. Sources An Inventory of Archaic and Classical Poleis, edited by Mogens Herman Hansen and Thomas Heine Nielsen, (Oxford University Press: 2004).An Historical Geography of Europe 450 B.C.-A.D. 1330; by Norman John Greville Pounds. American Council of Learned Societies. Cambridge University Press 1973.Polis and Oikos in Classical Athens, by J. Roy; Greece Rome, Second Series, Vol. 46, No. 1 (Apr., 1999), pp. 1-18, citing Aristotles Politics 1253B 1-14.

Sunday, November 3, 2019

ENVIRONMENTAL EFFECTS OF GREEN CONCRETE AS A BUILDING MATERIAL Essay

ENVIRONMENTAL EFFECTS OF GREEN CONCRETE AS A BUILDING MATERIAL - Essay Example Green construction looks to balance resource efficiency, social and health issues all through the life cycle of a structure. Among them, green concrete many benefits that help in achieving this objective. This article offers an overview of the contemporary state of green concrete, which have reduced ecological impact. It is also stressed here that the use of green concrete has low energy cost, lower green house gas emissions, as well as low maintenance cost, which, in the long run, leads to sustainable construction materials. In addition, in terms of resource preservation, reuse of industrial byproducts and post-consumer wastes used as a partial replacement for Portland cement clinker, makes green concrete much more durable and eco-friendly. The overall change in the economic landscape and resource utilization factors is at the forefront of many green building movements. The research broadly focuses on the benefits of green concrete in achieving the sustainable and environment friendly construction goal. In regard to the use of concrete in construction, a number of questions arise; would the green concrete alleviate environmental pollution caused by the normal cement? Might there be any compromise in the quality and sustainability of green concrete structure? What are other social and economic contributions of green concrete relevant to the bodies advocating the green concrete? The buildings we reside in have an overreaching effect on our environment. Green building, otherwise referred to as sustainability, seeks to balance health, resource efficiency, as well as social concerns, all through the life cycle of a structure (Penttala 2004, p. 409). Green concrete has a couple of benefits to present in attaining this objective. Cement is a gray powder, which, when added to water, binds stone and sand together to produce concrete. Concrete is the worlds number one building material because of its durability and strength (Hendriks