Thursday, October 31, 2019

Department of Defense Small Business Contract Essay

Department of Defense Small Business Contract - Essay Example (2009). Advantages 1. The requirement for this contract is only the delivery of the agreed merchandise, for which the contract was agreed. 2. Can also be used to test unknown contractors 3. It provides for a situation in which there is competitive bidding on the entire scope 4. Management by the owner is least required 5. It provides an incentive for the contractor to equip best resources Disadvantages 1) It bears a heavy risk to the contractor as s/he assumes the cost risk 2) Both the schedule and quality of risk is heightened 3) A very complete and in-depth definition will be needed upfront 4) There will be more costs attached when changes occur than in cost-reimbursement 5) The total schedule of the bidding process is lengthened in this case Cost-reimbursement contract This is that contract whereby a given contractor is compensated for every of its acceptable costs or rather expenses to a given limit, plus an additional imbursement to thrive to some profit (Project Management Inst itute. (1987). It is a contract with a fixed price contract, whereby the contractor is issued with a negotiated sum f money irrespective of the expenses that may be incurred thereof. There are various contracts namely the time and materials contract, the cost-reimbursement and the fixed price contracts. Each contract comes with its own performance risk and/or cost for the various agencies especially the governments but the different kinds of the cost-reimbursement contracts could be employed be it in form of the award fees, incentives etc that are put in place to motivate the contractor and subsequently dispel waste and inefficiency by the given contactor (Heldman, et al, 2007). Cost-reimbursement contract pay s the said contractor’s acceptable costs that are incurred to such extent set by the contract but may also pay an additional fee related to the performance. Such contracts do include an estimated sum intended to obligate the funds and a ceiling to that said contractor w hich exceeds at its own risk, unless agreed on and approved by the contracting personnel. This type of contract may be used in situations in which the accounting system used by the contractor for determination of costs is easily applicable to the contract and where appropriate surveillance at the time that the performance is underway (Schwalbe, K. (2009). Advantages 1) It’s also used in a situation where there is a concern in the long term quality is quite high. 2) In this case, final cost might be lower than some fixed price contract due to the fact that the contractors never inflate their prices to cover risk. 3) It has some small incentive to negotiate corners as opposed to the fixed-price contracting (Project Management Institute. (1987). Disadvantages 1. Oversight and administration is also needed in the designation of an award to be offered or any such appropriate incentive. 2. Additional administration and oversight is needed to ensure that it’s only the permiss ible costs are paid and that adequate general controls to costs are instituted. 3. Certainty is limited to the exact final cost (Project Management Institute. (1987). 4. The incentive provided to be efficient in itself is smaller as compared to the fixed-price contract. Advantage of the small over big companies in contracting There are a number of mechanisms that the government has set

Tuesday, October 29, 2019

PEST(LE) Analysis Essay Example | Topics and Well Written Essays - 1500 words - 1

PEST(LE) Analysis - Essay Example In UK market, there is further scope of growth for the company. UK’s consumer market demand is well aligned with business strategies of IKEA. The company has been able to secure desirable market share due to its effective cost control strategies, continuous new product development and competitive operational procedure. IKEA is inclined towards offering low prices to customers for its wide array of innovative products. According to Allen (2006), PESTEL analysis is a strategic tool that helps to determine key drivers of change present in the business environment. The main components of this tool are political, economic, social, technological, environmental and legal factors. Political factors stands for government policy which directly impacts workplace environment, technology quality, health and safety conditions, etc. Economic conditions include interest rates, rate of economic growth and taxation charges. Social factors relate to all possible events which are affecting community and market socially (Allen, 2006). As per Das and Teng (2009), it comprises of population dynamics, cultural expectations, norms, health consciousness, etc. Technology factor states that new products or processes are developed with the support of advanced technology. This factor facilitates quality enhancement, innovation and reduction in overall costs. Legal aspect corresponds to legislative and regulatory framework tha t governs countries of operations or respective product areas. Environmental factors encompass changes in climate and weather. Environmental awareness is an area of concern for all business organizations (Das and Teng, 2009). Research methodology lays the foundation for any research study. Any study can be classified as quantitative or qualitative research study. Quantitative study deals with market related data which can be statistically analyzed. On the other hand, qualitative study is opinions or views of experts. There are two

Sunday, October 27, 2019

Todays Society Vs Ideal Society Sociology Essay

Todays Society Vs Ideal Society Sociology Essay In The Communist Manifesto, the authors Karl Marx and Engels feels that this capitalism with the help of industrialization is the increasing the productivity of economy way beyond expected. This is the main reason for class struggle where the oppressor rule and ruin the oppressed class. In short Capitalism has turned out to be a money making system in which rich people own private properties and to stay in the market, they distribute it according to the growing competition amongst themselves. Capital is therefore not personal, it is social, power(Marx and Engels 24). On the other, Thomas Mores Utopia is completely a different society called as an ideal society where people do not run their business for sake of profit but still live a peaceful life. The reason for peaceful and happiness in their life is unity and public ownership which solves the main social problems such as poverty and inequality. The political laws, religious principles and social issues are development in such a ma nner that it benefits not a single individual but the complete utopian society. Not only throughout the history but also in todays society money is consider as a key to success and people think that power and fame along with the rise our their wealth. In the Communist Manifesto, the authors Marx and Engels point out that rise of capital as the main source of class struggle. Society as a whole is more and more splitting up into two great hostile camps, into two great classes directly facing each other Bourgeoisie and Proletariat (Marx and Engels 9). The Proletariats are the low working class society that live on the labor power and do not make any profit but rather work under Bourgeoisie to produce goods for the society. On the other hand Bourgeoisies are upper class people that own private properties and business that make profit by exploiting the Proletariats. A business can only make profit when the income of capital is more than the outcome or the expense. This is possible by making the labor class, work more and pay them less. The average price of wage-labor is the minimum wage, i.e., that quantum of the means of subsistence which is absolutely requisite to keep the labor in bare existence as a laborer (Marx and Engels 24). T his leaves labor with no choice, but to work under the upper class for their daily living. The authors believe that this upper class people should focus more on the improvement of their labors living, as they are their sole mode to earn profit. The class struggle has still not ended, in fact the rich are becoming richer and poor becoming poorer and wealth is the one responsible for this status. The case in Thomas Mores Utopia is different. He has made up a destination named Utopia which is known for the ideal society, a perfect and a social life where there is no competition among the people. This is complete different society which has different principles which treats everyone equally and more importantly, no one owns any property by himself. Agriculture is the main occupation and each family is given a piece of land. One of the principles that is different from todays time is that Utopian family has head of household that takes the things needed without any exchange for money or direct goods. Certainly fear of want makes all kind of animal greedy and rapacious, but only mankind is made so by pride, which makes them consider their own glory enhanced if they excel others in displaying superfluous possession, and in Utopia there is no place for such thinking. If everyone begins to think in such a manner, than there are chances that we could gain freedom from class struggle and achieve unity. The Utopian laws are very fair to people because every decision is taken for the benefits of the complete society. However, some of these laws are illogical and hard on people. For example, the son must have same trade as his father. But if anyone is drawn to another occupation, he is transferred by adoption into another household where he can work at the trade he wants to pursue. This breaks the bond a child has with his family just to achieve different trade. However, after mastering both the trades, he gets to practice whichever he wants until and unless there is higher demand of the other trade in the city. Moreover, he works for the trade which benefits the society as a whole and not himself as an individual. The education in Utopian society is not mandatory and very few people are allowed to leave their labor work for education. They also believe that value of life is gained through education for which every child is given complete education. It is interesting to find that alth ough the Utopians have labor work as their main career; most of this people are seen doing intellectual studies in their free time. In todays time, the education system is in danger and needs to be rescued from the influence of the ruling class (***). This upper people, with the influence of Modern Industry, are affecting the education of children of working labor class. This leads to transformation of their children to simple articles of commerce and instruments of labor (***). Nowadays there are some countries which has public schools providing free education to children. Utopia is titled as communist state not only by critics but also by the authors of The Communist Manifesto, Marx and Engels. After reading the text, we find Utopia as communist state. It is mentioned in the Manifesto that profit and competition is damaging the importance of the community: The bourgeoisie, wherever it has got the upper hand, has put an end to all feudal à ¢Ã¢â€š ¬Ã‚ ¦ has left no other bond between man and man than naked self interest, than callous cash paymentà ¢Ã¢â€š ¬Ã‚ ¦ has resolved personal worth into exchange value à ¢Ã¢â€š ¬Ã‚ ¦ and has set up that single, unconscionable freedom Free Trade (11). Similarly, in Utopia, Hythloday quotes that wherever there is property, everything is in the terms of wealth and profit. He further tells that it is hard for the common people to gain justice until justice is served when all the best thing go to the worst people or that happiness is possible when everything shared among themselves who are not entirely happy, while the rest are plunged into misery (46). However, some communist nations share few differences with Utopia in terms of religion. We know that religion exist in Utopia and has similar believe like other religions i.e., there is only one God but might have different nature. Whereas the communist nations like China and Russia are among the top atheist country where 59% and 22% of the population respectively, doesnt believe in God and follow no religion (Atheist). We know also that in Utopia people do not own any money or property whereas in China official misuse power of their position to gain wealth for personal benefit. The text by Thomas More, Karl Marx and Fredrick Engels shows that there could be two possible societies, an ideal society, i.e., Utopian Society, where everything works with perfection and money has no value and the other society would be our present society, which is divided into upper class and working class based on wealth. People are considering money as the sole source of happiness. This thinking of ours is ruining many lives each year. Although the unfair treatment such as inequality, labor wage, and class struggle had started off in the beginning of Capitalism, still continuing and seems to be an endless one. Todays society detracts the attraction of being youthful by forcing work onto people in order to succeed. It is unjust to the workers who contribute the most to the society and receive very less in return. We must put an end to private ownership and encourage public ownership. In public ownership people dont own anything and poverty doesnt exist. However, people have a gu arantees life of happiness and stability. Work Cited Marx, Karl, and Frederick Engels.  The Communist Manifesto. New York: International Publisher, 2012. Print.

Friday, October 25, 2019

Law School Admissions Essay - The Spirit Lives -- Sample Law School Ad

"Hasta la victoria siempre." (Che Guevara) I want to study law so I can help people with problems in the workplace.   I am unhappy with the decrease in real wages, the huge increase in temporary and part-time employment that includes few or no fringe-benefits, and the continued existence of unsafe work places.   I believe that technological advances are going to continue to put people out of work, perhaps on a massive scale, in the next twenty to fifty years, and that government, business, and workers will have a new opportunity to share the gains in productivity that are to come.   I believe that people have the right to work at a job that allows them to afford to raise a family, live in a comfortable, safe home, and work in a safe environment.   I want to devote my work to improving workers' pay levels, assuring them access to health care, paid vacation time, fair treatment by their employers, and physical safety in the work place.   Increasing the number of safe, well-paid, secure jobs will go a long way towards helping alleviate many of the social ills that are associated with poverty.   Ã‚  Ã‚   I was involved with labor issues at my job at the San Francisco International Youth Hostel, where I worked from 1992 to 1996.   I helped organize a group of workers there to discuss our work place and to smooth out scheduling conflicts between management and our group of workers.   In September 1995, part-time staff's holiday pay was taken away without any discussion at all, and I called the Executive Director of the Company the (The Golden Gate Council) and persuaded her to re-institute it.   I was regularly consulted for my opinion on various wage, hour and working-condition matters.   Ã‚  Ã‚   I have seen how working people organize them... ...ing as a community organizer for a volunteer service-exchange program that benefits seniors and the disabled.   the work I am doing reinforces the goals I have of helping solve problems in the workplace.   At my job here in West and South Berkeley, I have again seen the poverty that a dearth of good jobs breeds in a community.   I want to help raise my community's living standards through a more equitable sharing of the resources we transform in our workplaces.   Ã‚  Ã‚   The last thing I can say about myself is that I am interested in almost everything and hope to learn much more about solutions to social problems, science, questions of spirituality and religion, history, visual arts, music, literature, and the list could go on for a while form there.   The curiosity and interest in knowing about the world is an asset that I will take into whatever endeavor I choose.   

Thursday, October 24, 2019

Spontaneous Generation and Cell Theory

Spontaneous Generation and Cell Theory 1. Tradition thought is very hard to overcome- even with solid evidence to support new ideas * Social pressure has effect on acceptance of scientific ideas and technological advancements * Science is a social/political enterprise * New ideas often met with resistance * Sometimes ostracisms, persecution, death * Microscope helped to overturn some strange ideas * Disease processes * â€Å"spontaneous generation† Attitudes and skills of scientific inquiry (questioning, predicting, observing and recording) are required to provide unbiased and factual info * Investigations must follow ethical guidelines and results must be reproducible under controlled conditions * Example of way that science, technology and society are linked is found in development of the current understanding of the way living cells function * Microscope provided technology to explore the world of microscopic particles and organisms * Then possible to obtain evidence for or against generally accepted opinions or theories about living thingsSpontaneous Generation 2. Believed that life can emerge from non-living matter 3. A superstition- people unaware of microscopic forms of life * e. g. mice created from mixing wheat husks with sweaty undergarments * Maggots and flies emerge spontaneously from raw meat * Francesco Redi * Example of scientific method * Believed flies laid eggs on meat * Experiment to prove hypothesis Limited access to meat (air, no fresh air, flies, no flies) 4. Idea that life could emerge spontaneously from non-living matter = widely accepted from time of the Romans through to the 19th century * Even in time of Robert Hooke and Antoni van Leeuwenhoek * Believed that to produce mice, you put a sweaty underwear and husks of wheat in an open jar and after 21 days, the sweat and husks would combine and change the husks into mice 5. 668, Francesco Redi (Italian physician and poet) questioned belief that maggots appeared from raw meat * He believed that flies laid their eggs in the meat * Set up experiment to test his hypothesis * Set out flasks containing raw meat but some were sealed, some were covered in gauze and some were open to the air * Controlled the access of flies to the meat * Maggots were found only in the flasks that were open and accessible to flies to lay their eggs * Despite evidence, idea of spontaneous generation still thrived 6.John Needham (proving that living things could be produced from non-living matter) boiled chicken broth and put it in a flask and sealed it * Everyone accepted that boiling killed micro-organisms since boiling was a common method of removing substances that would make one ill * However, in his experiment, micro-organisms continued to appear * Suggested that there was a life force that produced spontaneous generation 7.Lazzaro Spallanzani (Italian priest) claimed that there were micro-organisms in the air that were responsible for the new growth * Re-did Needham's experiment but drew off the air in the flask, nothing grew in the remaining broth * Critics suggested that all Spallanzani had shown was that air was required for spontaneous generation to occur * Spontaneous generation theory continued to be accepted 8. 859, French Academy of Sciences announced a contest for the best experiment to prove or disprove spontaneous generation * Louis Pasteur used the work of Needham and Spallanzani with important change * Before boiling meat broth in flask, Pasteur heated the neck of the flask and bent it into an â€Å"S† shape * Air could reach the broth but micro-organisms and other particles would get caught in the S- bend * Nothing grew in this broth but if the flask were tipped so that the broth reached the S-bend in the neck, moulds would later appear 9.Pasteur controlled his experiment in that he used the same broth, same type of flasks and same light and temperature conditions * Controlled variables (conditions that are held constant throughout an e xperiment): broth type, flasks type, light, temperature * Manipulated ariable (condition deliberately changed in an experiment): access of dust to the flask * Responding variable (condition that changes in response to the manipulated variable in an experiment): ability to grow mould in the broth * Had experimental control, a part of the experiment which the manipulated variable is not changed in any way from its normal condition * Flask in which dust had normal access to the broth after boiling * Result: moulds occurred * Experiment treatment Prevent the access of dust to the broth, resulting in evidence of no growth of mould * To allow access of dust to the broth very briefly, resulting in evidence of mould growth * Strong evidence that says that spontaneous generation doesn't occur, but also that micro-organisms are found in the air * His work opened new doors to microbiology, immunology, biochemistry and gave credibility and new importance to the processes of conducting controlle d experiments, maintaining detailed records of observations, and connecting results to conclusionsThe Cell Theory 10. Importance of cell as the functional unit of life was recognized with the improvements in lens technology and increased number of observations made by scientists in several countries 11. 1833, Robert Brown identified an important cell structure, the nucleus, in study of orchids * Saw an opaque granular spot within the cell * Others had seen it too but he was the first to recognize at this cell structure must have something for cell function 12. 1838, M. J.Schleiden observed that all plants were composed of cells and he proposed that the nucleus was the structure responsible for the development of the remainder of the cell * Discussed his work with a friend (Theodor Schwann), who was studying animal physiology * Schwann believed that there must be similarities btwn plant and animal tissue * When Schwann searched for opaque spots in animal tissue, he found structures t hat resembled the cells that botanists were studying in plant tissue and the nucleus structure that Brown and Schleiden had identified 13. 839, Schleiden and Schwann proposed the cell theory as a result of observations of plant and animal specimens through the microscopes * All plants and animals were composed of cells and that the cell was the basic unit of all organisms 14. 1859, cell theory was further extended by Rudolf Virchow's statement that all cells arise only from pre-existing cells Cell Theory 15. All living things are made up of one of more cells and the materials produced by these cells 16. All life functions take place in cells, making them the smallest unit of life 17.All cells are produced from pre-existing cells through the process of cell division 18. Applies to all living things regardless of size, shape or number of cells involved * Subcellular particles (viruses and prions) fall into category that is neither living nor non-living although they may exhibit certai n characteristics of living cells 19. Evidence in support of cell theory came from Pasteur's experiment to investigate the concept of spontaneous generation in micro-organisms * Cell theory has become the cornerstone of the study of biology

Wednesday, October 23, 2019

Book of job: the unwritten message

The Bible is a library of many passages, written by authors from the ancient times dealing with different topics like creation, faith, suffering, glory. These and many more are scribbled all through out the texts and are divided into clusters called the books. The authors of these books came from different times and places. There are even views that additional chapters are added after the original book has been finished. Having said these, one cannot be sure of the exact origin of the stories, nor the message conveyed with in them. One of these books tackled on the idea of just punishment, a very simple one yet with a lot of twists. It was a part of the bible that was read, reread, and tested from time to time. Scholars tried to translate the many double meanings found in the book, as well as come up with their own ideas regarding it. The Book of Job tells the story of a man, Job, who had everything that he could possibly dream of. He has a nice family, good health, material possessions, and a peaceful life; all of which he thanked God for. This was noticed by the devil, who in turn made a wager with God – saying that Job only praises God because he has everything he would ever need, and that in times of misfortune he would definitely curse God. God agreed, and allowed Job to lose his possessions, his sons and daughters killed, his skin covered with boils, and his life completely ruined, provided that Job would not be dead. After these tragedies, the book focused next on the debates Job had with his three friends – Eliphaz, Bildad and Zophar. These debates marked the first of several conversations found in the book. The speeches were designed in such a way that Job answered each one of them and tried to defend himself. In the end, God himself talked to Job, taking part in another speech portion which led to God’s answers. The story ended with God giving back Job his lost health and wealth. God also ordered Job’s friends, who misinterpreted Job’s misfortunes, to ask him to pray for them. The Book of Job is a very controversial part of the Bible, since it deconstructs the logical belief on punishment – that a just punishment is given to those who have sinned and the level of the punishment depends on how grave the committed sin is. But for punishment to be rendered to someone like Job who in his whole life praised and worshipped God for all the goodness He has given him and the prosperity he has acquired, surely, we may say that there is injustice. That is why there are many assumptions on why God allowed these to happen to Job. It may be to prove to the devil that Job is really God’s man, or to show that God is really all powerful and all righteous, or it may also be for the atonement of the sins that Job’s sons had committed. These are wild guesses and can’t be really answered without reading and understanding the book as a whole. In the story, God responded to Job’s questions by a series of statements that could mean many things. His replies are intellectual, and may be interpreted in many ways and may take many points of view. In fact, the story itself may be seen in many ways. It all depends on who reads the text and how the said text is understood. The last chapters of the book define many things and answer a lot of questions that is reflected all throughout the book as well. To narrow it down, God’s reply can be found in chapters 38 to 41. The first verses from the said chapters may be analyzed in two ways. At a first glance, one can see God’s answers to Job’s questions as proof of His omnipotence and self righteousness. And the questions such as ‘Where were you when I laid the foundations of the earth?’ (Job 38:4), ‘Have you seen the gates of death?’ (Job 38:17) and ‘Who provided food for the young?’ (Job 38:41) that seem to have God as the only answer thus proves His confirmation of   His omnipotence and self righteousness more. They can be interpreted as God’s way of proving to Job that though the reasons behind His actions may be uncertain to us humans, He, in contrast, as an almighty being is certain of them. Another possible explanation would be that of God’s attempt in providing proof that ideas such as that of providence and purpose exist; purpose defined as being the reason given to everything that happens within the realm of God and providence as His way for intervention with everyday human life. And so, these assumptions suggest that there indeed is a purpose behind Job’s suffering. This â€Å"purpose† is also evident in evil which can be seen in God’s second speech to Job. God portrayed evil in the form of two fearsome beasts – the behemoth and the leviathan. The behemoth was described as having â€Å"bones of brass and gristles of iron† (Job 40:18). And that it could be found in the mountains eating â€Å"ox as if they were grass† (Job 40:15). On the other hand, the leviathan was depicted as a beast that lives by the river and that it has skin so hard it would be questionable to â€Å"pierce it with barbed irons and fish spears† (Job 40:31). The Bible had even more descriptions of this leviathan scattered in the Book of Isaiah, all pertaining to the beast as a possible manifestation of evil itself. Having said these, God made a point to Job that humans are indeed no match to these beasts and that nothing could bring them down except God Himself. In doing so, He admitted to have created these evils and He alone has the power to banish them (Job 40:19). Therefore, God concluded in His second speech that the purpose of evil in this case, Job’s suffering, will be explained at the end of the world as He smites the beasts. God, in His conclusion, only gave a hint of His side of the argument without actually producing a clear answer to Jobs many questions about his misfortunes. In this lack of explanation, a chance opened up for Job to question and criticize God. But instead, he still chose not to condemn God but to worship Him even further. It seems that despite everything, he understood the existence of the hidden purpose in evil. He also came to realize that had judged God prematurely and without faith. By analyzing God’s response to Job, we can draw a number of conclusions as to what He wishes us to understand. One is the purpose in evil, which was discussed in the previous paragraphs. Another is the presumptuousness of mankind. God may want to show that humans think that they know all. But by asking questions such as ‘Do you observe the calving of deer? Can you hunt the prey for the lions?’ (Job 39:1), He can easily mock this said high intelligence of humans probably hoping that instances as such may instill humility. Also, in the debate between Job and his friends, we can see another pitfall in human perspective, which is the hasty judgment of suffering as the end result of wrongdoing. It was stated in the book that his friends even asked Job to repent for sins that he didn’t commit. This is because we tend to see a misfortune merely as a retribution for offense. In line with this thinking, we automatically assume that there is a need for repentance, and that it is the only way to redeem ourselves and be given back what we lost through misconduct. The next conclusion is the mentioned existence of the end of time where unanswerable questions will be answered. It is also in this said time that God will put an end to the evil He has created. Finally, the statements made by God reveals a kind of test for us humanity – Will we condemn God so that we can justify ourselves? The Book of Job may seem controversial, but God in the end provided some sort of answers which to some may be incomplete. The way to view this book may differ from time to time, from reader to reader and from place to place. We really can’t put our finger on what the final message is but I believe that the conclusions drawn above are enough for now.   Summarizing the whole paper, we humans seem to have a certain fear against punishment, and quickly tie it with some sin or some failures. The Book of Job awakens us that the reasons for punishment come in different forms, and as long as we are certain of our faith, we must not judge and condemn anyone, for that matter, prematurely. Works Cited The New Oxford Annotated Bible â€Å"Book of Job† Chapters 1-31; 38-42   

Tuesday, October 22, 2019

Seepage Tank Lab Report Essays

Seepage Tank Lab Report Essays Seepage Tank Lab Report Paper Seepage Tank Lab Report Paper Measure the water level (head) difference. 2. Once the flow reaches its steady state (i. E. When a constant outflow rate is maintained), record the elevation head (by reference to an arbitrary datum such as the base of the tank) and the pressure head at each viscometer. Also measure the water and sand levels (relative to your datum), and the dimensions (length, depth and width) of the tank. 3. By injecting a small dose of dye just below the surface of the sand (against the glass) on the upstream side, trace the path Of the flow line by marking its movement with time on the glass. . Observe the change in velocity of the flow as it travels from the upstream sand surface to the downstream sand surface. Explain Why the velocity increases as the flow gets closer to the barrier wall and reduces as it moves away from the wall. 5. Repeat the above to trace a few more flow lines with an aim to provide enough information to assist you to sketch a flow net. Comment: LAMI NAR FLOW note the flow through the sand is laminar as the path traced by each shot of dye is a streamline flow and is not dispersed as in a turbulent situation. Confirm this by putting a shot to dye into the sand but this time away room the glass. The dye will reappear at a mirror position on the other side of the barrier wall. Also note that the now from the sand surface to the outlet on the right side is also a streamlined flow. 6. Measure the outflow rate by using a beaker and a measuring cylinder, Convert this flow rate to litter per second per meter width of the tank. 7. With the preceding flow line information, sketch a flow net (to scale) to represent the seepage flow in the sand. . From the flow net, calculate the discharge (per meter Width Of the flow net model). The k value of the sand can be estimated from the Hazes Equation low: k = 100 0210 where k is in units offs/sec, and DISC in units of CM (DID of the sand is posted near the model) 9. Compare this calculated discharge with the flow rate measured in (6). Suggest reasons for the difference (if any), 10, Based on the flow net, calculate the total head at each viscometer, Compar e each calculated value with the one measured in (2). A small dose of dye is injected just below the surface of the sand on the upstream side and the path of the flow line is traced by marking its movement with time on the glass. The final result when all the dye emerges at the downstream side is shown in Figure 1. Figure I : Traced glow Lines 4. The flow velocity increases as the flow gets closer to the barrier wall and educes as it moves away from the wall. This is because as the flow rate is constant (Conservation of mass) while the area of the flow cross section decreases when it gets closer to the barrier wall, the flow velocity increases. This is best understood by referring to the continuity equation, Alternatively, it can also be explained by referring to the equation , where the k value is constant while the hydraulic gradient i defined by AL/L increases because the head difference is constant while the flow length L becomes shorter when it gets closer to the barrier wall. 5. The final result when all the dye emerges at the downstream side is shown in Figure I _ 6. The outflow rate is measured by using a measuring cylinder _ It is measured 3 times and averaged for a more accurate result. The results are shown in Table 2. Measurement Average Flow rate (l,sec) 4. 17 Table 2 : Flow rate measurement The result is converted to mm/sec per unit width as shown below 7. With the preceding flow net information, a flow net is sketched and presented in Figure 3 of the attached Appendix 1. 8. From the flow net in Figure 3, the flow rate is calculated as shown below.

Monday, October 21, 2019

Two Industries in Different Market Structures

Two Industries in Different Market Structures Introduction An industry consists of many closely related firms offering differentiated goods and services. These firms offer similar products with minor modifications that make them different. The modifications are in terms of shape, size, or form of the products that make them different. Before starting a company, it is crucial to determine the industry structure within which the company lies.Advertising We will write a custom essay sample on Two Industries in Different Market Structures specifically for you for only $16.05 $11/page Learn More An industry structure refers to the number of firms in an industry and their size. If an industry comprises of small size firms in relation to the size of the industry, this form is a fragmented industry. On the other hand, a consolidated industry has a few small firms having a large market share. There are various types of industry structures depending on the concentration ratio. This ratio indicates the relative si ze of firms in relation to the whole industry (Scherer, 1996, p. 298). It shows if an industry consists of a few large firms, or several small firms. Therefore, the industry structure could be a perfect competition, a monopoly, a monopolistic competition, or an oligopoly. In a perfect competition market structure, no firm dominates the other. The firms sell similar products and the prices are set through the market forces of demand and supply. In a monopoly structure, there is only one firm in the industry. This firm sells high value products and sets the price in the market. A monopolistic competition is different from monopoly; it is an imperfect market consisting of many suppliers who sell differentiated products. These suppliers decide to set prices in the market. Finally, an oligopoly is a market structure that has a few suppliers with barriers to entry (Porter, 1979, p.15). This article analyses two industries in different market structures. Industry A Definition Industry A ha s 20 firms with a Concentration Ratio (CR) of 30%. This industry falls under a perfect competition market. In this type of industry, many firms sell similar products and services without one dominating the other (Porter, 1979, p.11). This industry has a CR of 30% meaning that, the largest firms in this industry own only 30% of the market share. Therefore, the industry is extremely competitive with a number of the 20 firms competing fairly. No firm dominates the other in this industry through owning a large market share. In this industry, the firms sell identical products, and they take the price set by market forces of demand and supply.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Characteristics This industry, being a perfect competition, has several characteristics. It consists of a many small firms that sell identical products. These firms have little influence on the price of the products. The market forces of demand and supply determine the price charged in this industry. This industry also consists of many buyers who are price takers. Their purchase of the products does not affect the price. The products sold are similar; therefore, the consumers are indifferent when purchasing these products. They can purchase from any supplier without affecting other suppliers. In this industry, there are no barriers to entry or exit in the industry. Firms are free to join and leave the industry without restrictions. Technological, social, legal, or economic barriers are not characteristic of this industry. Firms can choose to start or end production of their products at any time they wish. In this industry, firms and buyers do not incur any transactional costs in their operations. The firms aim at maximizing profits at the break-even point where â€Å"marginal revenue is equal to marginal costs† (Oster, 1994, p.231). There is perfect information in the in dustry, and all stakeholders are aware of the price charged in the market. If a firm raises the price, consumers shift to other sellers who sell at the prevailing market price. Consumers know the prevailing market price producers know the costs and workers know their wages and salaries. This way, there is free flow of information in the market. Adjustments The forces of demand and supply influence the price in this industry in different ways. If demand increases, price goes up, and if supply increases, the price reduces and the vice versa is true. These adjustments have various implications in both the short-run and the long run. In this scenario, if demand increased prices will go up. In the short run, it is possible for an individual firm to make profits. This phenomenon is possible because the firm can continue selling its products without incurring extra costs. However, in the end, this firm may not sustain the profits. According to Sheth and Sisodia, the industry will adjust it self by having many firms entering the industry (2001, p. 451). They do this in an effort to take advantage of the profits that the single firm was making because, in this industry, there is free entry of firms to the market. The price will then reduce because of the many firms in the industry, and this will benefit consumers in the end. This adjustment will affect the concentration ratio of the industry. It will reduce the CR for the industry because of the many firms in the industry. The industry becomes less competitive, and some firms may again start leaving the industry.Advertising We will write a custom essay sample on Two Industries in Different Market Structures specifically for you for only $16.05 $11/page Learn More Industry B Definition Industry B has 20 firms and a Concentration Ratio of 80%. This industry is an oligopolistic industry because it has a high concentration of 80%. Few large suppliers dominate this industry and the leading firms tak e a large section of the market share (Lee, 1998, p.71). Firms in this industry compete fiercely through advertising in an effort to lead the market. Firms control the operations of the industry with restrictive terms, such as restricting the amount of production. Industry B has the characteristics of an oligopoly. Characteristics Firms in this industry aim at maximizing profits, where the marginal revenue and marginal costs are equal. The firms set the prices to charge in this market by having total control. There are barriers to enter in this industry. These include barriers related to economies of scale, access to costly and expensive technology. Few large firms control the entire industry. These firms are large compared to the entire industry size. Firms in this industry produce either similar products or differentiated products. In an identical product oligopoly, firms produce inputs for other industries. On the other hand, a differentiated product oligopoly produces products f or final consumption according to the needs of buyers. This industry has three pricing models. The kinked demand asserts that if a particular firm raises its price, other firms will not follow that trend. In contrast, if the firm reduces its price, competitors enter the market. In collusive pricing, a cartel controls the price for their benefit. Finally, there is price leadership where a large firm dominates the others and sets the price for others to follow. Description Industry B has a high concentration ratio than industry B because the industry consists of few large firms that control the market. These firms have a large market share; therefore, the concentration in the industry is high. In contrast, industry A has a low concentration ratio because of the many firms in the industry. These firms do not have any influence in the industry. The industry has competitive firms that are price takers hence the low CR. It is not possible for small firms to thrive in industry B because, t his industry has a high concentration and only large firms are able to control the market. Smaller firms will have little or no influence, and their market share is relatively small (Sheth Sisodia, 2001, p.423). These firms are not in a position to set prices in the market since they have little influence. Only large firms with enormous influence can thrive in industry B. Conclusion It is prudent to consider the industry structure and concentration before a firm can enter the industry. This is because the size of the firm determines the category in which it falls. Small firms with a low ratio are likely to fit in competitive markets. In these markets, they will have little influence over the price. The market forces of demand and supply and demand will determine the price. On the other hand, large firms fit in oligopolistic markets. They control a large market share of the industry and influence price changes.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More References Lee, F. (1998). Post-Keynesian Price Theory. Cambridge: Cambridge University Press. Oster, M. (1994). Modern competitive analysis. New York, NY: Oxford University Press. Porter, M. (1979). How competitive forces shape strategy. Harvard Business Review, 57(2), 10-17. Scherer, F. (1996). Industry structure, strategy, and public policy. Reading, MA: Addison-Wesley. Sheth, J., Sisodia, R. (2001). The rule of three: Surviving and thriving in competitive  Markets. New York, NY: The Free Press.

Sunday, October 20, 2019

Quotes That Show Macbeths Intentions

Quotes That Show Macbeth's Intentions The motor that drives the tragedy of Shakespeares  Macbeth  is the lead character’s ambition. It is his primary character flaw and the trait that causes this brave soldier to murder his way to power. Early on in the famous play,  King Duncan hears of Macbeth’s heroics at war and bestows the title Thane of Cawdor on him. The current Thane of Cawdor has been deemed a traitor and the king orders him to be killed.  When Macbeth is made Thane of Cawdor, he believes that the kingship is not far off in his future. He writes a letter to his wife announcing the  prophecies, and it is actually Lady Macbeth who fans the flames of ambition as the play progresses. The two conspire to kill King Duncan so that Macbeth can ascend to the throne. Despite his initial reservations about the plan, Macbeth agrees, and, sure enough, he is named king after Duncans death. Everything that follows is simply the repercussion of Macbeths unbridled ambition. Both he and Lady Macbeth are plagued by visions of their wicked deeds, which eventually drive them insane. Brave Macbeth When  Macbeth  first appears at the start of the play, he is brave, honorable, and moral- qualities that he sheds as the play develops. He comes on the scene soon after a  battle, where an injured soldier reports Macbeth’s heroic deeds and famously labels him â€Å"brave Macbeth†: For brave Macbeth- well he deserves that name- Disdaining Fortune, with his brandishd steel,Which smoked with bloody execution,Like valours minion carved out his passageTill he faced the slave.(Act 1, Scene 2) Macbeth is presented as a man of action who steps up when he is needed, and a man of kindness and love when he is away from the battlefield. His wife, Lady Macbeth, adores him for his loving nature: Yet do I fear thy nature;It is too full o th milk of human kindnessTo catch the nearest way. Thou wouldst be great,Art not without ambition, but withoutThe illness should attend it.(Act 1, Scene 5) Vaulting Ambition An encounter with the three witches changes everything. Their premonition that Macbeth â€Å"shalt be king hereafter† triggers his ambition- and leads to murderous consequences. Macbeth makes clear that ambition drives his actions, stating as early as Act 1 that his sense of ambition is â€Å"vaulting†: I have no spurTo prick the sides onlyVaulting ambition, which oerleaps itselfAnd falls on the other.(Act 1, Scene 7) When Macbeth makes plans to murder King Duncan, his moral code is still evident- but it is beginning to be corrupted by his ambition. In this quote, the reader can see Macbeth struggling with the evil he is about to commit: My thought, whose murder yet is but fantastical,Shakes so my single state of man that functionIs smotherd in surmise.(Act 1, Scene 3) Later in the same scene, he says: Why do I yield to that suggestionWhose horrid image doth unfix my hair,And make my seated heart knock at my ribs,Against the use of nature?(Act 1, Scene 3) But, as was made apparent at the beginning of the play, Macbeth is a man of action, and this vice supersedes his moral conscience. It is this trait that enables his ambitious desires. As his character develops throughout the play, action eclipses Macbeths morals. With each murder, his moral conscience is suppressed, and he never struggles with subsequent murders as much as he does with killing Duncan. By the end of the play, Macbeth kills Lady Macduff and her children without hesitation. Macbeth’s Guilt Shakespeare does not let Macbeth get off too lightly. Before long, he is plagued with guilt: Macbeth starts hallucinating;  he sees the ghost of murdered Banquo, and he hears voices: Methought I heard a voice cry Sleep no more!Macbeth does murder sleep.(Act 2, Scene 1) This quote reflects the fact that Macbeth murdered Duncan in his sleep. The voices are nothing more than Macbeth’s moral conscience seeping through, no longer able to be suppressed. Macbeth also hallucinates the murder weapons, creating one of the play’s most famous quotes: Is this a dagger which I see before me,The handle toward my hand?(Act 2, Scene 1) In the same act, Ross, Macduffs cousin, sees right through Macbeths unbridled ambition and predicts where it will lead: to Macbeth becoming  king. Gainst nature still!Thriftless ambition, that will ravin upThine own lives means! Then tis most likeThe sovereignty will fall upon Macbeth.(Act 2, Scene 4) Macbeths Fall Near the end of the play, the audience catches a glimpse of the brave soldier who appeared at the beginning. In one of Shakespeare’s most beautiful speeches, Macbeth admits that he is short on time. The armies have amassed outside the castle and there is no way he can win, but he does what any man of action would do: fight. In this speech, Macbeth realizes that time ticks on regardless and that his actions will be lost to time: Tomorrow and tomorrow and tomorrowCreeps in this petty pace from day to dayTo the last syllable of recorded timeAnd all our yesterdays have lighted foolsThe way to dusty death.(Act 5, Scene 5) Macbeth seems to realize in this speech the cost of his unchecked ambition. But it is too late: There is no reversing the consequences of his evil opportunism.

Saturday, October 19, 2019

Applied Law Essay Example | Topics and Well Written Essays - 250 words

Applied Law - Essay Example It is extravagant to allow the public to acquire entertainment materials in digital forms while compromising the right of writers, artists and musicians. It is challenging to attain the rights of both the public and that of writers and musicians in the debate on whether to allow fair use of copyright materials. To protecting the rights of writers and artists, production of copyrighted materials should be subject to constitutional protection. This includes constitutional protections as that of the copyright clause. The first amendment should apply in an effort to protect writers and artists’ rights. The law should protect encryption codes that are important in ensuring access to materials protected under the copyright act. It is a protection of the rights of writers and artists by disallowing fair use. Protection on the rights of the public is under constitutional provisions on the use of copyright materials. Allowing fair use does not, therefore, entail the protection of public rights. Instead, advocating for fair use of copyrighted materials is tantamount to a violation of the rights of artists. It is, therefore, impossible t o attain the rights of both the public and artists in the debate to allow fair use of copyrighted

Friday, October 18, 2019

Current Trends and Services Essay Example | Topics and Well Written Essays - 1000 words

Current Trends and Services - Essay Example Current Trends in Workforce Recruitment Workforce recruiting is crucial to every organization and company as it brings with it new technology and more productivity. One of the current trends in workforce recruiting is the increased rate at which people tend to find new jobs after almost every three years. Currently, it is also important that one becomes computer literate and upgrade their skills in line with the current technology. While recruiting their workforce, the employers look for someone who is capable of keeping up with the market trend. For instance, a software developer should be aware of the changes in software development that are occurring at a phenomenal rate. Another trend in workforce recruitment is the overwhelming number of women who have entered and are fruitfully climbing the corporate ladder (Hankin, 2005). Moreover, there is an upcoming trend whereby smaller businesses are recruiting more workforces as opposed to bigger companies. This can be attributed to the increased growing rate of technology. Current Trends in the Payroll Management Payroll management is an important part of every company hence most companies are always striving for better effectiveness in their payroll management. Various trends have occurred in payroll management. ... This service sector has also adopted trends such as singe disbursement per pay cycle and circumventing of cycle payments that are done through investigation and eradication of errors. Currently, most companies are able to process payroll which include all required tax expenses, deductions and produce reports for their employees. Current Trends in the Accounting Services Currently in the accounting services there is more emphasis to shift from general accepted accounting standards to the international financial reporting standards. Changes in revenue recognition methodology have also taken place recently. This affects how particular sectors determine revenue recognition. This has significantly affected the construction industry. Current Trends in Call Center Functions One of the trends embraced today in the call center functions is the transition from traditional call center to multichannel contact center. There is also the integration of the current wide range of data and media chann els thus establishing a unified call center environment as stated by Friginal (2009). This environment includes: multichannel services on joined networks; IP networks and IP-supported voice application; and Customer Relations Management and business applications. Today a customer interaction network is founded in an IP-supported architecture that upholds a constantly changing set of multichannel services. This environment includes: multichannel services on joined networks; IP networks and IP-supported voice application; and Customer Relations Management and business applications. Today a customer interaction network is founded in an IP-supported architecture that upholds a constantly

Beckham's plan to build a new stadium for soccer in Miami Assignment

Beckham's plan to build a new stadium for soccer in Miami - Assignment Example To finance this, he intends to use his MSL contract of $25 million, in addition to collaborating with Simon Fuller and billionaire Marcelo Claure. The investors will fund the project privately, but are not close to the offer of state funding (â€Å"Beckham Unveils His Miami Stadium Plans†). Soccer in the USA has grown increasingly popular as a participant and as a spectator sport and with the construction of such a site, the sport could gain even more popularity. However, having such a huge venue does not guarantee that that is what the city needs. The project is already experiencing setbacks with the proposed site being considered inappropriate to erect a soccer stadium. It has also received mixed perceptions from the residents with some opting for more green space than a huge stadium. These setbacks could leave the investors with no choice other than looking for alternative

Thursday, October 17, 2019

Contrast and compare 'karnak cafe' and 'The day the leader was killed' Literature review - 1

Contrast and compare 'karnak cafe' and 'The day the leader was killed' by Naghuib Mahfouz - Literature review Example This is the uniqueness of the writing style of the author. As the story develops, it becomes poignant without losing its ground and reality. Mahfouz has created a sensational and beautiful character in Qurunfula, the proprietress of Cafe. She is just like the oases in desert. The stern author becomes an entirely different man when he portrays her character. He turns a poet in adoring her qualities of head and heart. How she puts up with the vicissitudes of life is brilliantly elucidated by the author. How intelligently she detaches from her glorious past and maintains her essential dignity as a common individual, is a lesson for womenfolk in any part of the world. The protagonist, though entered the Cafe, by chance, he was surprised to see Qurunfula there in her new role. He describes his past relationship with her in a cryptic style. Mahfouz (2008, p.4) writes, â€Å"We had never had any kind of relationship, whether of affection, self-interest, or simply courtesy.† How and to what extent she is able to retain her past beauty of the body and nobility of soul! Here is another masterful description of the Karnak Cafà © with the presence of Qurunfula. Mahfouz (p.5) writes, â€Å"Here you get to sense past and present, in a warm embrace, the sweet past and glorious present. To top it all, there is that enticement that the unknown brings.† The author has intelligently analyzed the contemporary ground realities of the Egyptian government. Though the governments change, nothing much happens to improve the social and economic conditions of the common people. The author touches upon the issues, how psychological imprisonment works in a seemingly free society, how an atmosphere of fear persists and how people are subjugated. No positive improvement is seen to break the age-old societal traditions, the freedom of the individuals is not guaranteed. It is a peculiar type of

Cnet report 221 Essay Example | Topics and Well Written Essays - 750 words

Cnet report 221 - Essay Example This is why Nguyen will still have revenue even if he stops creating updates for the game. I think Nguyen decided well because Flappy Bird was turning out to be like Candy Crush and those other apps people lose time and sleep over. Nguyen was only doing what he thinks is morally right and I applaud him for choosing right over money. The article talks about how the remake of RoboCop proves that the kind of technology seen in the movie is actually not that unreachable or fantasy-like as in the original installment of the movie. Statt shares that because the scientists of today are actually conducting experiments on controlling prosthetic limbs and a human’s brain, the technological elements present in the movie are not as unrealistic as when the original movie came out. Statt continues to describe a few advances and milestones in science today, comparing them to some aspects of the new RoboCop. He writes, however, that creating killer robots like those in the movie are not that close to reality yet. Although the information in the article is amazing, it is a bit scary for me, thinking that we are close to developing half humans/half robots. A future world similar to RoboCop’s world is daunting because it lacks the sense of warmth brought by the thought of interacting with another human. Also robots have a way of malfunctioning so that can be dangerous and the world might be like that in the movie I, Robot instead. The article talks about how Apple is trying to come up with an iWatch which is not only designed to be fashionable but helpful in keep track of one’s health. Apple together with important people from the U.S. Food and Drug Administration, fashion designers, medical sensor wizards, sleep researchers, exercise physiologists and fitness experts is making digital health accessible to consumers. I think Apple is doing something right this time. I am glad it is using its technology to help

Wednesday, October 16, 2019

Comparison between Chile- Haiti Earthquakes Research Paper

Comparison between Chile- Haiti Earthquakes - Research Paper Example An earthquake is a natural occurrence that takes place when an oceanic plate collides with the land plates thus causing an impulse. The resulting impulse between the two plates is always of a higher magnitude. It is this nature of earthquake’s higher magnitude that always causes the distractions of even stronger things including buildings, vehicles, heavy machinery among others. Earthquakes have mostly been experienced in most of Latin American countries compared to other continents. Some of these countries include Haiti and Chile. These two countries experienced what has been said to be two of the greatest earthquakes among other earthquakes in other countries. These earthquakes occurred respectively in these countries within a span of a year, causing death and destruction of properties which in turn resulted to affect the countries economically. Even though the both earthquakes caused almost similar destruction, the weight of their impacts differed in the respective countrie s. Consequences of the earthquakes As it is expected that earthquakes causes a lot of destruction which in turn tends to cause negative impacts on the victims, so was the case in both Haiti and Chile as they never escaped to face its consequences. Most of the destruction and consequences experienced by both the countries were similar and the main. Even though most of the consequences and destruction experienced by these countries as a result of the earthquakes were similar, the magnitude of their effects of the government and the economy was slightly different. This difference came as e result of their economic stability. The earthquakes had a greater blow to the Haitians compared to the Chileans because Chile’s economy was better compared to Haiti, a country which is among the poorest in the world (Farmer & Joia 87). The 2010 Haiti earthquake caused a lot of destruction which subsequently affected its economy (Castanos, Heriberta & Cinna p44). Some of these distractions were: demolition of buildings including presidential palace and The United Nation Peace keeps Mission. Demolition of buildings, led to one of the major consequences since it resulted in loss of homes. It is evident that close to 105,000 homes were destroyed. Destruction of homes could also mean that individuals whose homes were destroyed with them inside perished as a result. Secondly, demolition of buildings also implies that several industries were also destroyed it is believed that most of them collapsed as a result. This also implied that individuals who were employed in these companies were forced to lose their jobs. The increased number of joblessness and closure of companies eventually affected the economy since these individuals and companies were not able to pay the revenues (Farmer & Joia 87). Another department that was also affected by the earthquake is the transportation department. Transportation became a major problem causing a lot of things to stand still. The earthquake destroyed the cranes at the nearby ports hence making it difficult for the ports to operate. This was so due to the fact that the offloading of goods became a problem even to the ships that were transporting the aid. These ships were forced to inhibit temporarily (Castanos, Heriberta & Cinna 52). These destructions at the port did not only affect the transportation of the aiding goods, they also interrupted the importation and exportation of goods in and out of the country thus affecting the economy. On the other hand, air transport was also not left behind in experiencing this problem. The air transport department especially the Airport International Toussaint L’Ouverture Airport. This airport was also damaged by the earthquake, thereby causing inconvenience since most of the planes were forced to use the nearby airport. The destruction of the airport also impacted the reduction of air travels which further thus reducing incomes and initiating loss of

Cnet report 221 Essay Example | Topics and Well Written Essays - 750 words

Cnet report 221 - Essay Example This is why Nguyen will still have revenue even if he stops creating updates for the game. I think Nguyen decided well because Flappy Bird was turning out to be like Candy Crush and those other apps people lose time and sleep over. Nguyen was only doing what he thinks is morally right and I applaud him for choosing right over money. The article talks about how the remake of RoboCop proves that the kind of technology seen in the movie is actually not that unreachable or fantasy-like as in the original installment of the movie. Statt shares that because the scientists of today are actually conducting experiments on controlling prosthetic limbs and a human’s brain, the technological elements present in the movie are not as unrealistic as when the original movie came out. Statt continues to describe a few advances and milestones in science today, comparing them to some aspects of the new RoboCop. He writes, however, that creating killer robots like those in the movie are not that close to reality yet. Although the information in the article is amazing, it is a bit scary for me, thinking that we are close to developing half humans/half robots. A future world similar to RoboCop’s world is daunting because it lacks the sense of warmth brought by the thought of interacting with another human. Also robots have a way of malfunctioning so that can be dangerous and the world might be like that in the movie I, Robot instead. The article talks about how Apple is trying to come up with an iWatch which is not only designed to be fashionable but helpful in keep track of one’s health. Apple together with important people from the U.S. Food and Drug Administration, fashion designers, medical sensor wizards, sleep researchers, exercise physiologists and fitness experts is making digital health accessible to consumers. I think Apple is doing something right this time. I am glad it is using its technology to help

Tuesday, October 15, 2019

Effects of Energy Drinks Essay Example for Free

Effects of Energy Drinks Essay Whether it is a long night studying or just not ready for the day, college students choose to drink energy drinks to get full energy. These highly caffeinated drinks come with stimulating names such as Red Bull, Monster, Full Throttle, or Rockstar. Although these drinks are marketed as a healthful stimulant, consumers should be aware of the potential side effects, as they can be very harmful to one’s health. Energy drinks are beverages whose producers advertise that they â€Å"boost energy†. These advertisements usually do not emphasize energy derived from the sugar they contain, but rather increased energy is due to a variety of stimulants, vitamins, and herbal supplements. Energy drinks generally contain ingredients such a sugar, guarana, ginseng, taurine, B vitamins, carnitine, and ginkgo biloba. Guarana is a leading producer of caffeine, which is the main ingredient in many of the drinks. The caffeine herbs, vitamins and other ingredients combined in energy drinks are supposed to improve strength, endurance, and mental function. According to an article from WebMD, â€Å"Since Red Bull, the first energy drink to hit the U. S. market, launched in 1997, the market has boomed now totaling at least $5. 4 billion a year in the U. S. † (â€Å"Energy Drinks: Hazardous to Your Health? †). Makers of energy drinks generally market them as dietary supplement, in which dietary supplements are regulated different than soft-drinks. Although the FDA limits the caffeine contents in soft-drinks, energy drinks have no such limits because they are a form of â€Å"dietary supplement†. For example, a Coca-Cola Classic contains 34. 5 milligrams per 12-oz serving and Monster Energy Drink contains 160 milligrams per 16-ounce serving. A big difference as you can see. The high levels of caffeine can be detrimental to your health. A benefit of energy drinks are that they help to relieve fatigue and mental alertness by raising energy levels. For that very reason, college students tend to drink energy drinks before a long drive home or to stay awake for an all-night study session. As stated before, energy drinks are packed with guarana, which is a natural equivalent to caffeine. Besides giving you energy, guarana has been traditionally used to treat diarrhea and blood clots. Still, our ancestors also used guarana to promote physical endurance and increase mental acuity. Besides guarana, taurine also made its way into of the main ingredients in many energy drinks today. According to an article in Edrinks. net, â€Å"[Taurine is] one of the most abundant acidic chemicals in the human body and is found in the central nevous system and skeletal tissues, but it’s very concentrated in the brain and heart† (â€Å"Potential Benefits of Energy Drinks†). Taurine is basically a substance that helps to regulate heartbeat, maintain cell membrane stability and prevent brain cell over-activity. It is also often used to treat anxiety, hypoglycemia, epilepsy, and seizures. Along with guarana and taurine, energy drinks are packed with B Vitamins. B Vitamins are necessary for cell growth, health, and metabolism in the human body. B Vitamins can also help foster a positive mental attitude and enhance learning abilities. Also, energy drinks advertise their usage of ginseng in their drinks. According to Energy Fiend, â€Å"Ginseng is a slow growing root that contains complex carbohydrates, used to increase energy, anti-fatigue, stress relief, and memory† (â€Å"Energy Drink Ingredients†). Through the combination of guarana, taurine, B vitamins and ginseng, energy drinks give off the impression that they are the perfect form of strength and healthiness. Although the combination of healthy ingredients seems great, a surplus of each can be detrimental to your body. One drawback of energy drinks is they contain too much caffeine. Red Bull, one of the most popular energy drinks, contains nearly 80 milligrams of caffeine per 12-ounce can, but other drinks contain several times this amount. The amount of caffeine in an energy drink isn’t always indicated on the label, so it is difficult to gauge how much one is consuming. Like a shock to the system, an energy drink can give your body a caffeinated jolt. According to an article in ScienceDaily, â€Å"Researchers believe the caffeine and taurine levels in energy drinks could be responsible for increases in blood pressure and heart rate† (â€Å"Energy Drinks May Be Harmful To People With Hypertension, Heart Disease†). The increase in blood pressure and heart rate is known not to rise to dangerous levels among healthy individuals under the age of 30, but it could be significant in individuals with a cardiovascular disease of those with high blood pressure. By drinking energy drinks in excess, researchers also say that energy drinks could lead to heart complications. Along with increased heart rate, energy drinks dehydrate the body. The caffeine in energy drinks acts as a diuretic and promotes dehydration. Energy drinks are formulated to boost energy, not to replace lost fluid during exercise like sports drinks do. During exercise, your body is constantly losing water through sweat. Also, the high amounts of caffeine stimulate urine production, which removes more water from the body. It is important for you to keep your body hydrated if you are drinking energy drinks. In addition, college students are going to extremes by mixing energy drinks and alcohol. Red Bull and vodkas and Four Lokos have become popular mixed drinks at bars because they reduce the fatigue of alcohol while enhancing the â€Å"feel good† buzz. According to an article from CBS News, â€Å"†¦both caffeine and alcohol are diuretics, so mixing them can cause dehydration. A dehydrated body is slow to process alcohol, and that can interfere with coordination, balance, and ability to regulate body temperature† (â€Å"Four Loko: Is New Party Brew Liquid Cocaine†). The person may not realize how intoxicated they may be because they do not feel the lethargic feeling that depressants, such as alcohol, give them. Too much caffeine and dehydration are two of the many reasons people should stay away from energy drinks. In conclusion, the dangers of energy drinks far outweigh the benefits. Even though the ingredients in energy drinks look beneficial, they can really be detrimental to your health. If you are going to drink energy drinks, keep your body hydrated. Lastly, do not mix alcohol and energy drinks. The writing in this essay is my own work. If I have used outside sources, I have acknowledged them through correct documentation. Works Cited Aina, Hunter. Four Loko: Is New Party Brew Liquid Cocaine? CBS News. Breaking News Headlines: Business, Entertainment World News CBS News. CBS News, 17 June 2010. Web. 6 Apr. 2011. . Energy Drink Side Effects. Energy Fiend Obsessed With Caffeine. Web. 6 Apr. 2011. . Kathleen, Doheeny. Energy Drinks: Hazardous to Your Health? WebMD Better Information. Better Health. 24 Sept. 2008. Web. 6 Apr. 2011. . Potential Benefits of Energy Drinks. EDrinks. net Consumer Guide to Energy Drinks, Sports Drinks More! Web. 6 Apr. 2011. .

Monday, October 14, 2019

Components Of A Good Password Computer Science Essay

Components Of A Good Password Computer Science Essay Computer manufacturer and OS developers often build and deliver systems in default modes to secure the system from external attacks. From developers view this is the most efficient mode of product delivery. As per the organisation or a user, they require more protected and secured system before it is placed into service. Security baselines are standards which defines a minimum set of security controls for organisations. Security baselines typically address both technical issues such as software configuration and operational issues such as keeping applications up to date with vendor patches. In the security baselines, if hardware, OS, network and application followed the recommended minimum set of security settings then it will significantly decrease its vulnerability to security threats. The process of securing and preparing the system against the internal and external threats and system vulnerabilities is called hardening. Reduce the main reasons of attack that includes the removal of unnecessary services, software and unnecessary usernames or logins. It makes the system more secure, reliable, efficient and gives optimised performance. 12.2 Password Selection Password selection is one of the critical activities that often get neglected as part of a good security baseline. Currently most systems are protected by a user ID and password. If an attacker discovers the correct user ID and password by guessing or by using freely available password cracker tools, then they can gain access to the system. By following basic guidelines and principles in choosing passwords, the passwords used on the system will protect the assets. 12.2.1 Selecting a Password Users should consider a few basic requirements while choosing the password. Set a minimum number of characters and never accept shorter password. Do not use dictionary words and mix of lowercase and uppercase letters with usually one or two numbers. Randomly created passwords are strong passwords and they are difficult to guess and will defeat most password-cracking utilities. However, randomly generated passwords are difficult to remember and users often write down these passwords usually in a location close to the machine. Thus it defeats the purpose of the password. 12.2.2 Components of a Good Password User should create their own easy to remember passwords. Password is meant to protect access and resources from hackers. It should not be easy for them to guess or crack through password cracking tools. Common guidelines to make the password more difficult to guess or obtain are as follows: It should be at least eight characters long. It should include uppercase and lowercase letters, numbers, special characters or punctuation marks. It should not contain dictionary words. It should not contain the users personal information such as their name, family members name, birth date, pet name, phone number or any other detail that can easily be identified. It should not be the same as the users login name. It should not be the default passwords as supplied by the system vendor such as password, guest, admin and so on. 12.2.3 Password Aging Password aging is technique used by system administrators and it forces the user to change their passwords after specified period of time. If it is not changed within a specific period of time, it expires and must be reset. Password aging can also force a user to keep a password for a certain number of weeks before changing it. Changing passwords periodically will protect against brute-force attacks because when password is changed the attacker must restart the attack from the beginning. If password is changed periodically, an attacker will never be able to cycle through all the possible combinations before the password is changed again. Most operating systems have options that allow system administrators to apply password aging and prevent password reuse. Common guidelines are as follows: User must change their passwords in every 60 to 90 days. A very secured service requires to change passwords every 30 to 45 days. System must remember each users last five to ten passwords and should not allow the user to reuse those passwords. 12.3 Hardening Most computers provide network security features to control outside access to the system. All nonessential softwares such as spyware blockers and antivirus programs prevent malicious software to run on the system. Even with all these security measures, systems are still vulnerable to outside access. System hardening is a step by step process of securely configuring a system to protect it against unauthorised access. It also helps to minimise the security vulnerabilities. The three basic areas of hardening are as follows: Operating system-based hardening It includes information about securing and hardening various operating system. It also includes methods to secure file systems. Network-based hardening It examines the methods and procedures of hardening network devices, services and protocols. Application-based hardening It includes security of client-side user applications and services such as Domain Name Service (DNS), Dynamic Host Configuration Protocol (DHCP) and Web servers. 12.3.1 Operating System-Based Hardening Operating system hardening is the first step towards safeguarding systems from intrusion. Systems received from the vendors have preinstalled development tools and utilities which are beneficial to the new user as well as it also provide back-door access to an organisations systems. Operating system hardening includes the removal of all non essential tools, utilities and other systems administration options through which hackers can easily access the system. Hardening process will ensure that all security features are activated and configured correctly. This process makes the system secure, efficient, reliable and gives optimised performance. Some of the security tips to harden the OS include the following: Disable all unnecessary protocols. Disable all unnecessary services. Disable all unnecessary programs and processes. Verify and then install all vendor patches. Install all product updates. Use vulnerability scanner to identify potential security weaknesses. Configure file system security according to the least privilege rule. Note: Least privilege rule states that, allow access to those individuals who require it and allow only as much access required to complete the task. File System Controlling access to the resources is an important factor in maintaining system security. The most secure environment follows the rule of least privilege. The network administrator receives more complaints from users after following this rule as they are unable to access resources. However, receiving complaints from unauthorised users is more beneficial than suffering access violations that damage the organisations capability to conduct business. The least privileged environment can use the user groups to assign the same access to the resources instead of assigning individual access controls. However, in some cases individual users need more or less access than other group members. To maintain security, network administrator provides greater control over what each user can and cannot access. Updates OS updates are provided by the manufacturer of the specific component. Updates contain improvements to the OS and hence, will make the product more secure, efficient and stable to the users. For example, Microsoft updates are labelled with security updates. These updates address security concerns recognised by Microsoft and install them if required. In addition, updates enhance the capability of a specific function that was underdeveloped at the time the system or application was released. Updates should be thoroughly tested in non-production environments before implementation. Since this new and improved function has more security breaches than the original components, it requires complete testing. Hotfixes, security packs and patches are product updates to resolve a known issue. Hotfixes Hotfixes are components that are designed to fix a particular critical system fault. Hotfixes are created by the vendor when a number of client systems indicate that there is compatibility or functional problem with a manufacturers products used on a particular platform. These are fixes for reported or known problems. Hence, hotfixes should only be installed to correct a specific problem. Service Packs Service packs are collection of updates or hotfixes. It correct known issues and provide drivers, updates and system administration tools that extends product functionality that include enhancements developed after the product is released. Service packs are tested on different hardware and applications to ensure compatibility of existing patches and updates. Service packs must be thoroughly tested and verified in non-production environment before it installed on working systems. Patches Patches are used to prevent hackers from invading the system with virus and other malware that exploits the operating systems vulnerabilities. This improves the usability and performance of the system. OS patches are available on the vendor Website that supplies the product. Since patches are issued at unpredictable intervals, it is important to configure the system to automatically connect with the latest security patch updates. When the new update is released, the OS will prompt to install. While preparing clean installation it is advisable to download and install all known patches before introducing the system to the network. 12.3.2 Network-Based Hardening The tremendous growth of the Internet allows to openly access any system on a network. Hence, proper control over network access must be established on systems by controlling the services that are running and the ports that are opened for network access. In addition to the systems, network devices such as hub, routers, switches and modems must be examined for any security vulnerability. Any flaws in the coding of the OS can be exploited to gain access to the network components. These components should be configured with very strict parameters to maintain network security. The softwares of these components require to be updated regularly. By taking necessary steps, network administrator should limit or reduce attacks, accidental damage through their networks. In addition, network hardening also recommend the correct configuration of network devices and the requirement to enable and disable the services and protocols within a network. Firmware Updates Updating the firmware of the hardware device is provided by the manufacturers. These updates fix incompatibility problems or device operation problems. These updates should be applied if the update includes fixes for an existing condition or if it will make the device more secure and more functional or extends its operational life. It is recommended to install and test the firmware updates in a non-production environment to verify if the update contains the necessary fixes and benefits that are required. Device Configuration Network devices such as routers and switches configured with default installation settings. These default settings leave a system extremely vulnerable as it is set for convenience and not for security. Choosing a good password and limiting access to any open ports is very important in maintaining security of the devices. Good passwords are one of the most effective security tools because a good password can be resistant to several forms of attack. Determining the minimum set of services that the devices are running and good passwords is important for maintaining security of those devices. Apply patches and updates that are released by the product vendor in a regular interval. Enabling and Disabling Services and Protocols It is important to measure the current requirements and conditions of the network and infrastructure and then disable the unnecessary services and protocols. This leads to network infrastructure that is less vulnerable to attack. Access Control Lists Configure access list at the network devices to control access to a network. Access list can prevent certain traffic from entering and exiting a network. Access control lists are controlled by an administrator. 12.3.3 Application-Based Hardening Application hardening is the process to prevent exploitation of various types of vulnerabilities in software application by implementing the latest updates. Applications such as browsers, office suites, e-mail client and services provided through servers such as Web servers, File Transfer Protocol (FTP), DNS servers and DHCP servers on a network require regular updates to provide protection against newly developed threats. Web Servers At present most of the organisations have a Web presence on the Internet for numerous business advantages. Due to Internet popularity, Web servers have become extremely popular targets for attackers. Original content on the Websites are replaced with hackers data. E-commerce sites are attacked and users personal account information is stolen. Microsofts Internet Information Server (IIS) or Apache server are most popular Web servers applications in use today. To secure Web servers from hackers, administrator must apply updates and patches, remove unnecessary protocols and services and properly configured all native controls. It is also recommended to place the Web server behind a firewall or a reverse proxy. Microsoft has developed URLScan and IIS Lockdown tools which are designed to secure IIS servers from attacks and exploits. URLScan is a monitoring utility that examines all incoming URLs and rejects any requests for files, directories or services outside the intended scope of the Website. The IIS Lockdown tool turns off unnecessary functions which reduces the attack surface available to an attacker. E-mail Servers E-mail servers and clients are vulnerable to different attacks such as Denial of Service (DoS) attacks, virus attacks, relay and spoofing attacks. There are numerous deficiencies in the different versions of e-mail server software such as Sendmail for Linux and UNIX and the Exchange or Outlook for Microsoft. E-mail servers are constant potential sources of virus attacks and therefore must have the strongest possible protection for scanning incoming and outgoing messages. E-mail servers should not have non-essential services and applications installed. Administrative and system access should also be securely controlled to block installation or execution of unauthorised programs and trojans. The following attack points should be considered while hardening an e-mail server: Open mail relay allows unauthorised users to send e-mail through an e-mail server. Storage limitation, to limit DoS attacks based on message size. Spamming includes identical messages sent to numerous clients by e-mail. Virus propagation, ensure the anti-virus programs and applications are performing correctly. FTP Servers FTP allows number of users to access and download remotely stored data. It distributes application updates, device drivers and free software to users. Users access this data anonymously. This anonymous access to FTP servers becomes a problem as administrator does not provide anonymous access or does not properly secure the FTP service. This involves setting the appropriate permissions, not allowing the FTP process to be run by an unprivileged user and not allowing users to upload or modify files. Some FTP servers allow upload and download service for authorised users and hence, in that case anonymous access should be completely removed. To overcome buffer overflow problem ensure that FTP server software is up to date and patched. DNS Servers DNS server converts systems host names into IP addresses so that the communication can be correctly routed through the network. Client systems use DNS to locate Web servers, e-mail servers, FTP servers and number of other servers and network services. DNS can be major target for an attacker. The DNS server can be exploited by the following ways: Stealing zone transfers DNS servers are configured to provide information such as list of hosts and routers with IP addresses to other secondary DNS servers. This secondary DNS server is used to maintain a backup copy of the DNS database and to provide name resolution services for client systems. An attacker can receive a zone transfer and use it to track victims network and search for potential targets. Zone update spoofing An attacker can spoof the address of the primary DNS server and send a bogus update to a secondary DNS server. Client systems receive incorrect information and network communication from this bogus server and redirects users to a location controlled by the attacker. DNS cache poisoning Some DNS servers allow attackers to insert bogus information into a DNS cache. To secure and harden the DNS server from various types of exploits, actions to be taken are as follows: Do not place any information on publicly accessible DNS server to avoid snooping around the DNS server. Do not provide additional host information in Host Information (HINFO) records of DNS. HINFO record contains descriptive information about the OS and features of particular system and attacker could use this information to gain access. Configure the DNS servers to only allow zone transfers to specific secondary servers. Berkeley Internet Name Domain (BIND) allows zone transfer to be signed. Zone transfer signing allows secondary servers to verify the credentials of the primary server before accepting data. Ensure that DNS software is patched and up to date to avoid DNS cache poisoning. NNTP Servers Network News Transfer Protocol (NNTP) servers allow news clients to connect to news servers to share information privately or to post articles to a public NNTP server. NNTP servers are vulnerable to DoS attacks, buffer overflows. To exploit server, attackers connect to a private NNTP server to gain any information to compromise network. Sometimes users post accurate diagrams of their network to ask a technical question and attacker can use this information to find ways to exploit a network. They can even offer bogus advice to create a hole in the networks defences. To protect the organisation from NNTP server exploits, block the NNTP port at the firewall to make NNTP server inaccessible to external users. To protect posted private information, authenticate user to prevent anonymous logins to the NNTP server. Also encrypt communications using SSL/TLS to prevent packet sniffing of confidential data. Do not allow users to post confidential information to the public which will compromise their network. File and Print Servers Files and print servers in a network are used to share resources but it is a common way in which hackers can gain information and unauthorised access. When sharing is enabled to share the resources with a trusted internal network over a NIC, the system is also sharing those resources with the entire untrusted external network over the external interface connection. Attackers attempt to make unauthenticated connections to shared resources on the network. If sharing permissions are configured incorrectly for an easily exploited user account, attackers can gain access to resources and alter them. To secure the file and printer shares block access to shares and related information at the firewall. Use the rule of least privilege to secure shares from external attacker. Virtual Private Network (VPN) is also used to encrypt communications between clients and servers to secure data transmission. Data Repositories Data repositories are locations that hold information about networks, applications and users. Attackers can use the information stored in data repositories to formulate attacks against organisation. Hence, ensure that this information is limited and restricted for external users. As well as authentication and encryption of the data is necessary to protect them from external attacks. Directory Services A directory service is used to store, organise and provide access to information in a directory. The information in a directory services can include system accounts, user accounts, mail accounts, service locations and shared resource information. The Lightweight Directory Access Protocol (LDAP) is a common directory service that organises data in a hierarchical manner. The top entry in a LDAP directory information tree is called root and this LDAP root server creates the hierarchy. The directory service hierarchy and the information it stores provide a good map of network infrastructure. This is convenient for authorised users in a network as well as for attacker. Attacker can use numerous ways to compromise LDAP servers such as attacker can use network resources information stored at directory service to examine network structure, resources and potential targets. Attacker can gain victims network information that is transferred over LDAP through eavesdropping. Some of the ways to protect LDAP hierarchy are as follows: Protect LDAP hierarchy by configuring the strongest authentication to the different versions of LDAP. Both LADP v2 and LDAP v3 support anonymous and simple authentication which are not very secure. Anonymous authentication does not require password and simple authentication uses a password in unencrypted format which attacker can easily hack. Strong authentication over LDAP v2 and LDAP v3 is provided through Kerberos version 4 authentication and Simple Authentication and Security Layer (SASL) communications respectively. Use Secure LDAP (LDAPS) that allows encrypting communications using SSL/TLS. Block access to LDAP ports from the Internet so that attackers cannot make connections using these ports. Databases Database servers are used to store data. Both the data and the database server can be target for an attacker. An attacker can steal the data or take over the database server to exploit it. Some of the ways that the database servers can be exploited are as follows: Unexpected data queries or commands Numerous database servers use Structured Query Language (SQL) which allows for the querying and posting of data. An attacker can use SQL commands to do unexpected things is called SQL injection. Unauthenticated access If unauthenticated access to database server is allowed then the attackers can easily connect and exploit the database server. To secure database servers consider the following points: Test the database by running irrelevant queries and attempt to access unauthorised information. Do not allow unauthenticated connections to the database server. While transferring confidential data to and from database server, use SSL/TLS or VPN connection to protect data. To avoid database server to be queried by external users, block access to it at the firewall. 12.4 Chapter Review Questions 1. How an individual should secure a password? (A) Selecting a password with at least eight characters, at least one change in case and at least one number or special character (C) Storing the password in wallet or purse (B) Using the same password on every system (D) Changing passwords at least once a year Ans: A 2. Which of the following steps is part of the hardening process for OS? (A) Remove unnecessary programs and processes (C) Setting appropriate permissions on files (B) Disable unnecessary services (D) All of these Ans: D 3. Which amongst the following is the correct step to overcome buffer overflow problems? (A) Select strong passwords (C) Install the latest patches (B) Remove sample files (D) Set appropriate permissions on files Ans: C 4. Which of the following requires software up to date and patched? (A) Operating systems (C) Applications (B) Network devices (D) All of these Ans: D 5. Rule of least privilege states that ____. (A) allow access to users who requires it (C) allow limited access (B) allow access to everyone (D) allow full access Ans: A and C 6. Which of the following is designed to fix a particular critical system fault? (A) Hotfixes (C) Patches (B) Service packs (D) None of these Ans: A 7. Which of the following extends product functionality after the release of product? (A) Hotfixes (C) Patches (B) Service packs (D) None of these Ans: B 8. Which of the following fixes incompatibility problems or device operation problems? (A) Hotfixes (C) Firmware update (B) Service packs (D) None of these Ans: C 9. Which of the following steps are used to secure Web servers? (A) Apply patches and updates (C) Place the web server behind a firewall (B) Remove unnecessary protocols and services (D) All of these Ans: D 10. BIND stands for _______. (A) Berkeley Internet Network Domain (C) Berkeley Intranet Name Domain (B) Berkeley Internet Name Domain (D) Business Internet Network Domain Ans: B 12.4.1 Answers 1. A 2. D 3. C 4. D 5. A and C 6. A 7. B 8. C 9. D 10. B Summary In the chapter, Security Baselines, you learnt about: Components of a good password and password aging. Different ways to harden the OS. Different ways to harden the network and its devices. Different ways to harden applications such as browsers, office suites, e-mail client and services provided through servers such as Web servers, E-mail servers, FTP servers, DNS servers, NNTP servers, file and print servers, directory services and databases.

Sunday, October 13, 2019

American Dreams Come True Every Day! Essays -- Essays on the American D

â€Å"Life, liberty, and the pursuit of happiness†¦Ã¢â‚¬  are the famous words every American hears throughout their lifetime. These words are part of America’s history through the Declaration of Independence, America is the only country where the â€Å"pursuit of happiness† is actually guaranteed in writing. What exactly are the â€Å"pursuit of happiness,† and the â€Å"American Dream?† As defined by most writers, such as Hemmingway, it’s becoming rich young and having the opportunity and will to do what you please with your wealth. To many foreigners, such as my father, the â€Å"American Dream† is just to escape poverty and retain a better life. Maybe, the â€Å"American Way† is philanthropy, making billions of dollars and giving some of it back to those who really need it. The â€Å"American Dream† is different to all people but always involves one common factor, the almighty â€Å"buck.† Current times call fo r new techniques in gaining the â€Å"American Dream.† The possibilities are endless through the World Wide Web, and the booming economy make it possible for anyone to make a good living.   Ã‚  Ã‚  Ã‚  Ã‚  Henry B. Plant is featured in the article â€Å"Florida’s hidden treasures: Museums, cultural parks† written by Copley News Service in the Washington Post for talking about his dreams. Plant had the goal of turning the Florida wilderness in to a â€Å"shining utopia.† His dreams came true, Plant created a historic museum in the Pinellas Suncoast. He’s able to provide historical information to the public whil...