Wednesday, July 31, 2019

Effect of Technology and Network Security Support on Information Security Essay

Introduction Information security has become one of the challenges in ripping benefits of information technology. It has been found out that most people fear using modern information and communication technology due to fear of the privacy of their personal details. Information technology has supported the growth of online services like e-commerce, e-banking, e-governance, and many others which required people to give their sensitive personal details. However, practice like hacking and others which breach security of information have eroded personal confidence in use of ICT service. Information security can be described as the act of giving protection to information and systems by denying unauthorized access, use, disclosure or modification. The effect of Technology on information security The following are the technological methods that are used in ensuing information security; Authentication Authentication is the process through which a person or any other things undergoes through a verification process to determine whether it is the one. It is the way through which something or someone is confirmed to establish whether the claim made is actually true (McNab, 2004).   Authentication may involve confirmation of personal identity, origin of any artifact or basically making assurance that computer programs is trusted. Authentication is one of the commonly used methods of ensuring information security. It may be implemented through different methods including; Password A password can be defined as private information that is only known to the owner. A password assigns a user identity which is associated with the password. The password therefore becomes the gateway for the user to access that particular identity (Information Resources, 2009).   Passwords are personal and therefore the standard of the password is very important. Strong passwords are difficult to guess as compared to weak passwords and therefore they offer more security to private information. It is important that user safeguard their password and once they suspect that someone else has accessed their passwords they should consider changing them to ensure security. Token A security token is a hardware device that is used by the owner to authenticate their identity.   Once the device is recognized by the network, the user is given access to the system.   A token can be in different forms ranging from smart cards, key fob, and many others (Erin, 2005).   Tokens provide high level security through two-factor authentication method. First, the owner has a personal identification number or PIN which authorizes them to access the device. Second the device displays that PIN number of the user to the system which allows them to access the system. Unlike passwords, token are more secure since even if the device falls in wrong hands, it will be difficult to guess the PIN.   The four types of tokes include static password, synchronous dynamic password, asynchronous password, and challenge response. Biometrics Biometric is one of the most advance authentication techniques that are used when dealing with many people. It will be observed that today, everyone enters in a baseball match after their physical characteristics have been recorded in a system while in school kids use their thumb to access meals. These represent the commonly used biometric techniques where the emphasis is one authentication using personal physical characteristics (Down and Sands, 2004).   Biometric uses different physical characteristics including eye, face, voice, fingerprints, shape of the hand, and many others. These characteristics are quite unique to every individual and they are one of the strong proofs to the personal identity.   However, biometric authentication devices are very costly to buy and maintain and therefore they are used in very sensitive situations. One of the greatest weaknesses of this method is that it is very easy to attacked stored comparison images than to copy those physical traits.   In most cases, biometrics is used as a two factor authentication methods where a password is combined with personal physical appearance. Software There are a number of softwares that have been developed to protect information in any network. The following are common software used in information security; Antivirus Antivirus are software developed to protect information from virus, spy ware, and malware. Antiviruses are used mostly in internet connected network where there is a high risk of spread of virus (Dhillon, 2007). Antivirus software mostly used includes MacAfee, Karspasky, NOD32, and many others. Content filtering Content filtering is also known as information filtering.   It encompasses the use of software to screen information on computers. It is also used in internet firewall especially by corporations to guard some information considered private. Content filtering helps to include or to exclude some information which can be accessed by a person and excluding information which is deemed objectionable (Dhillon, 2007). Content filtering is also used at home and at school in order to filter information that can be accessed by children. In this case, it is used to filter out pornographic materials and violence oriented materials.   In the internet content filtering can be classified into web filtering where some WebPages are filtered out and e-mail filtering where e-mails are screened for spam. However, content filtering is criticized on the ground that some important information may be filtered out of the accessible content such that the information accessed does not really help the user. Encryption With the increased use of the internet, a great deal of sensitive personal information is sent from one person to another or to an organization. This raises serious questions regarding the safety of that information and the confidence that only the intended receiver receives and understands the information. To raise this level of confidence, data encryption method has been developed (Biham and Shamir, 1991). Although encryption has been used since the time of Roman Empire, it has become more complicated and with diverse use today. Encryption mainly involves conversion of a readable data to another form which can only be read and understood by a specified person or computer. This information is regarded as ciphered or encrypted data since it cannot be understood easily. It is recovered back to its original form through decryption. The level of protection and integrity in encryption is enforced by the use of message authentication code or digital signature. Message authentication code creates a secret key for the sender and receiver of the information which makes it more secure and authentic. Today, there are many softwares that are used in encrypting data. However, encryption is not one of the most secure methods of ensuring data security since there are various methods like traffic analysis, brute force, TEMPEST, and many others which can be used to crack the encrypted data (Biham and Shamir, 1991). It has been found that even some of the most complex algorithms like RSA, DES and others can be broken using these softwares. iii. Hardware Firewalls have also played an important role in enhancing information security.   They can be used either in hardware or in software or when the two are combined.   In day to day uses, firewalls are important in protection unauthorized access to a private network which is connected to the internet especially in the cases of intranets (Whitman and Mattord, 2007).   Firewalls filters all messaging entering and leaving the intranet to ensure that it blocks those messages which are devoid of the set security standards.   There are four major types of techniques used in implementing firewalls including Packet filter This is one of the most effective and transparent firewall techniques. Under this technique, each and every packet entering and leaving the network is filtered and only those which meet user defined criteria are allowed while the rest are blocked.   However, the technique is quite difficult to configure and is more susceptible to IP spoofing. Application gateway Application gateway applies a defined security mechanism to some specific applications like FTP, Telnet servers, and others.   Although it is quite effective, it can also lead to degradation of performance. Circuit level gateway This technique applies firewall security only when a TCP or UDP connected has been made. Once the connection is established, packets of data continue to flow without being checked since a secure connection has been made. Proxy server Proxy server technique intercepts in and out of a network. The server is quite effective in hiding the network addresses and hence cannot be obtained easily. The effect of Network Security Support on information security Although technology has been effective in deterring cyber crime, it is clear that technology alone cannot work. Even with the advanced technology and application of the various information security methods we have reviewed above, human support is still needed. There are various ways that have been employed in supporting technological method to fight cyber crimes. The following are some of these methods: Hacker Hunters Hacker hunters are special branches that have been set up in police department aimed at tracking down cyber criminals.   Hacker hunters are prowling cyberspace with an aim of tracking down and arresting professional cyber criminals who are motivated by big profits made online.   Hacker hunters are employing gumshoe techniques to track down cyber crime suspect (Grow and Bush, 2005). They are employing various methods including infiltration of hacker groups, monitoring the hackers through underground networks, and when possible, intercepting the hackers before they can cause any damage. Most important, hacker hunters are relying on intelligence in order to track cyber criminals. They are using informants inside hackers group to get vital information regarding their operation. For example in 2004, Hacker Hunters in Washington unleashed Operation Firewall in which they targeted members of the ShandowCrew tracking them through their website shandowcrew.com with the help of an informant from the group.   Hackers Hunters must therefore seek inside information from individuals in these groups in order to fight deter them. They are applying the same principles that were used in the 1960s to fight organized crime since both are similar in many aspects. Police Operations Police operations work in the same manner as hacker hunters.   In most cases, police operations are carried out by a special group within the police force and reinforce the work of hacker hunters.   For example in the above case, the Special Agents in the operation firewall got assistance from the local police forces.   Therefore police operations are important in pursuing cyber criminals to ensure security of information (Leyden, 2004). Unlike hacker hunters, police operations are carried out as fighting of routine crimes. This means that although there may be a special group carrying out police operations, it may not be entirely specialized in fighting cybercrime. In most countries, there are special internet police departments which are used in fighting internet crimes.   These police departments are entrusted with carrying out important functions like fighting cybercrime, censorship, propaganda, online scams, manipulation of online opinions, and others. However one of their most important duties is to work closely with hacker hunters in intervening and apprehending cyber criminals. Internet police departments also collaborate with other police departments in other countries in enforcing internet security laws and apprehending cyber criminals.   In the international front, Interpol has been important in enforcing international crimes. iii. Network Security Service Companies For many companies, proving information security is an expensive endeavor. Companies are not only required to install hardware and software devices, but they must also collaborate with authority to ensure information security. However, the growth of corporate resources in provision of secure business environment has made many information security methods inefficient and expensive (Lighthouse Security Group, 2009). For this reason, most companies are finding it appropriate to outsource comprehensive and streamlined network security services from Network Security Services Company. Network Security Service Companies have also become important in enforcing information security. These are companies which are specialized in providing services to enforce information security.   These companies offer Managed Security Services (MSS) which are security capabilities mostly outsourced by other companies. These services vary from supplementing of an existing security system to offering a complete new MSS where the Network Security Service Company is entrusted with information security. However, MSS is just one of the different types of managed services others including routing, hosting, LAN, VPN, and others.   Network Security Service Companies therefore offer specialized high quality network security services ensuring for many enterprises. Conclusion The increased incidence of breach of privacy of information has had negative impact on adoption of ICT services.   The emergence of e-commerce, e-banking, e-governance and other online services which required input of sensitive personal details have been affected by increased hacking of information. There are different methods that have been developed to increase information security mainly through the use of technology and network support on information security. Technological methods include authentication through password, token, biometrics; software including antivirus, content filtering, or encryption; and hardware through use of firewall techniques.   Network security support includes hacker hunters, police operations, and security services offered by network security service companies. Reference: Biham, E. & Shamir, A. (1991). Differential cryptanalysis of DES-like Cryptosystems. Journal of Cryptology, Vol. 4(1): 3-72 Dhillon, G. (2007). Principles of information systems security: text and cases. NY: John Wiley & Sons Down, M. P & Sands, R. (2004). Biometrics: An Overview of the Technology, Challenges and Control Considerations. Federal Computer Week, 21(13) Erin, B. (2005). Information security: Token. Boston, Technology Press Grow, B. & Bush, J. (2005). Hacker Hunters: An elite force takes on the dark side of computing.   Retrieved 28th April 2009 from http://www.businessweek.com/magazine/content/05_22/b3935001_mz001.htm Information Resources, (2009). Security tips: Password protection. Retrieved 28th April 2009 from http://www.utdallas.edu/ir/security/STpassword.htm Leyden, J. (2004). Enforcement is key in fighting cybercrime. Retrieved 28th April 2009 from http://www.crime-research.org/analytics/473/ Lighthouse Security Group, (2009). Enterprise security solutions. Retrieved 28th April 2009 http://www.lighthousecs.com/Practices/Enterprise-Security-Solutions/ McNab, C. (2004). Network Security Assessment. Sebastopol, CA: O’Reilly Whitman, M. & Mattord, J. (2007). Management of information security. Boston, Technology Press

Great Gatsby Essay

Not only does the idea of money being the most important factor in life means one’s partner comes second, it additionally solidities one’s class, meaning families are separated just by the amount of money they have to their names. Fitzgerald illustrates the theme of doomed love with the relationship of Tom Buchanan and Myrtle Wilson, Tom,  powerfully built and hailing from a socially solid old family yet associating with Myrtle, whose lifeless husband George owns a run-down garage in the valley of ashes, representing two extreme classes. McEwan reinforces this theme in the relationship between Robbie Turner and Cecilia Tallis, Robbie a gardener and Cecilia the daughter of the ministry-employed and wealthy Jack Tallis are also partitioned by class. Consequently, relationships in both novels are doubtlessly doomed due to the impenetrable barriers of class and wealth. Throughout the novel, this theme is reinforced as we discover a consistent number of tragedies in the majority of relationships. The idea of Gatsby’s and Daisy’s relationship being inevitably doomed is emphasized with the Gatsby using the abstract noun ‘passion’ showing the obsession he has with Daisy, highlighting the idea of a Romeo and Juliet relationship, one being so in love that it is bound to end in tragedy. Additionally, Fitzgerald illuminates doomed love with symbolism describing the portrait of Dan Cody, a man who mirrors the average man in the American soceity as a ‘florid man with a hard, empty face’ which reflects the hollowness of people and their materialistic views; they solely focus on their wealth over relationships. McEwan reflects such demeanour in Briony Tallis’ story ‘The Princess was well aware of his remorseless wickedness, but that made it no easier to overcome the voluminous love she felt in her heart for Sir Romulus’ again initiating the predicament of unconditional love. This is obviously bound to end in disaster when such dispute, such as class separation and the ‘importance’ of money is involved in the relationship which reflects Fitzgerald’s relationship of Gatsby and Daisy where Gatsby is unbelievably in love with Daisy and yet we know she does not feel quite the same way, again initiating disaster. Symbolism, a feature Fitzgerald continuously employs for the duration of ‘The Great Gatsby’ additionally emphasizes the theme of doomed loved. Previous to Daisy’s arrival in Chapter Four, Gatsby exclaimed a few minutes before she was due to arrive that ‘Nobody’s coming to tea. It’s too late! ’ and that he ‘can’t wait all day’, this is a very ironic statement, firstly for the fact he says ‘nobody’s coming’ as we know that Daisy really never does return into Gatsby’s life as he wishes she will and secondly that he says ‘it’s too late! and yet he’s waited five years to   see Daisy. Furthermore, when Gatsby and Daisy first sit down together, ‘the clock took this moment to tilt dangerously at the pressure of his head’ which symbolises the idea of time being a very important theme, the adverb ‘dangerously’ clearly highlighting how precarious the desi re to recapture the past really is. The idea that when the clock fell off the mantelpiece, it stopped, symbolises Gatsby’s life, frozen in time, he believing everything between him and Daisy will be exactly as it was, five years before. Fitzgerald carries on using symbolism behind all issues in the novel, after the tragic death of Gatsby, Tom Buchanan and Daisy Fay flee to a new house far away rather than condescend to attend Gatsby’s funeral, ‘They were careless people, Tom and Daisy–they smashed up things’  again mirroring the hollowness of people and the hedonistic attitudes they have to life; all they care about is themselves, nobody else’s feelings and so this is an additional important factor to why relationships end up in pieces. Furthermore, ‘the green light’ is another important symbol in ‘The Great Gatsby’ representing Gatsby’s hopes and dreams for the future. In Chapter One, ‘he stretched out his arms towards a single green light’ as a guiding light to lead him to his goal: Daisy and yet at the end of the novel, we realise his dream was one stuck in the past, impossible to achieve, although Nick as the retrospective narrator observes, the light does still continue to shine one, symbolising hope for the rest of us and yet so much doom for Gatsby and Daisy and the love between them. The prominent theme of doomed love is additionally supported by McEwan’s fragmented structure of the novel symbolising the broken hearts of Robbie Turner and Cecilia Tallis which is mirrored in Nick’s unreliable narrative voice. An obsession with materialism reflects the hollowness of the people of 1920s America, Gatsby reinforces this object-orientated focus when he cries ‘she only married you because I was poor and she was tired waiting for me’, obviously highlighting that the only reason Daisy was to marry was for money, not the fact she loved thus illuminating doomed love as the relationship is based on money and materialism. Fitzgerald uses wealth imagery to describe Daisy ‘Her voice is full of money’ symbolising the need for money as a support for her own personality. Kevin Rea writes ‘the sense of hope conveyed by yellow is still present in the light and music. But the fact ‘the earth lurches away from the sun’ hints at the transient powers wealth bestows’’ which again illuminates the theme of money being so important, yet underneath it only leads to disaster in relationships in the novel again initiating the theme of doomed love. Incredibly, Gatsby himself is one factor of his own relationship with Daisy being so doomed. Blinded by the astronomic amount of love he has for her, Gatsby states ‘Can’t repeat the past?†¦ Why of course you can! ’, emphasizing the unachievable expectations he has, all he wants to do is regress to five years before and reunite perfectly with his ‘love’, but coincidently we know this is quite the opposite of what happens. Furthermore Gatsby wants something of Daisy that she can’t give, an unachievable statement, for her to ‘just tell him the truth, that you never loved him and it’s all wiped out forever’ about Tom, but we know this can’t happen as Daisy’s love for Tom was once real and strong as narrated in Jordan’s vignette. Fitzgerald uses an abundance of pathetic fallacy throughout the novel in coordination with the theme of doomed love. Gatsby and Daisy’s first meeting seems particularly awkward which reflects the weather, ‘pouring†¦small muddy swamps and prehistoric marshes’ reinforcing the mood. Additionally, as Gatsby and Daisy began to ‘click’ and ‘bond’ the ‘sun shone again’ initiating an optimistic and joyful mood. Sorrow returns at the tragic funeral of Gatsby along with the miserable weather, ‘thick drizzle’, ‘rain poured down his thick glasses’ showing doom in any love between him and Daisy. Likewise, McEwan uses pathetic fallacy, Leon asks Cecelia if ‘the hot weather’ makes her behave badly, this weather reflecting the difficulties between Robbie and Cecelia, the weather a hindrance, an obstruction, a way of creating misery in one’s life, mirroring Briony Tallis’ role in ‘Atonement’ and how she destroys and completely gets in the way of the relationship, consequently illuminating the theme of doomed love and reflecting ‘The Great Gatsby’ in the way Gatsby is an obstruction with his own affiliation with Daisy Fay. As we begin to draw close to the end of ‘The Great Gatsby’, we come across the reunited relationship of Daisy and Tom ‘sitting opposite each other’. Fitzgerald describes the couple ‘they weren’t happy†¦and yet they weren’t unhappy either’ mirroring the people of 1920s America, in the Jazz Age, as Gertrude Stein stated they were ‘the lost generation’ and had no real point to life and so lived unhappily, happily. Although this image of the two sitting together not showing compassion or love could represent doomed love, some could alternatively say that this relationship, which looked doomed at the start, is now the only good, strong one left, contradicting the theme. Mike Peters writes ‘not only Gatsby, but several of the other characters remain enigmas’, showing mysteriousness to the characters in Fitzgerald’s ‘The Great Gatsby’, maybe Gatsby did only love Daisy for the money or maybe Daisy never loved Tom? None of us can know, excluding Fitzgerald, we have no final conclusions to draw. However, it is clear that in the heartless and materialism obsessed society that Fitzgerald creates, it is only the most corrupt relationship that survives at the end. To finally conclude, Fitzgerald’s ‘The Great Gatsby’ leaves us with nothing but disappointment, which shows contrast to McEwan’s ‘Atonement’ which then leaves us with the possibility of hope and faith. Fitzgerald leaves us with sadness and we feel sympathy for the characters in the book, they all seem lost and seeking for something and yet the only solution they discover is money, highlighting again the theme of doomed love, money before love. The death of Myrtle Wilson devastates hers and George’s relationship which is obviously the result of her materialistic values and her longing for Tom’s money, her main focus in a man was his money, this is highlighted when she says that ‘’Oh, is that your suit? ‘ I said. ‘This is the first I ever heard about it. But I gave it to him and then I lay down and cried to beat the band all afternoon† reinforcing the idea that wealth is of huge importance to her. Gatsby obviously dead and Tom and Daisy reunited, but only on the thread of a string, all these sorrows as a result of money and class partition. Additionally, the death of Robbie Turner in ‘Atonement’ is the result of class partitio ning and so is also highlighting the theme of doomed love, a major theme in both F. Scott. Fitzgerald’s ‘The Great Gatsby’ and Ian McEwan’s ‘Atonement’.

Tuesday, July 30, 2019

Green Computing in Kenya Essay

Abstract The main aim of this paper is to look at what green computing is, why we should care about it and why it is becoming such a force in today’s world. The paper aims to tackle the advantages of green computing not only to businesses but also to individuals as well in their day to day lives. This paper also aims to look at different green computing implementations in Kenya in order to get an understanding of the current state of green computing in the country. Finally, this paper also aims to highlight key barriers and challenges to the implementation of different green computing technologies within the country and suggest a way forward. Introduction In order to look at the current state of green computing in Kenya, we first need to understand what green computing is and what it entails. According to San Murugesan (Murugesan, 2008) in his paper on Harnessing green IT, Green IT (Also known as Green ICT or Green Computing) refers to environmentally sound IT. It focusses on the study and practice of designing, manufacturing, using and disposing of computers, servers and any associated subsystems in an effective and efficient manner with minimal to no impact on the environment. These subsystems include things such as monitors, printers, and storage devices as well as other items like communication and networking equipment. Murugesan goes on to say that Green computing also strives to achieve economic viability and improved system performance and use, while abiding to ethical and social responsibilities. It is for this reason that green computing covers areas such as environmental sustainability, energy efficiency, total cost of ownership as well as cost of disposal and even recycling. Information and Communication Technology (ICT) is one the fastest growing industries in the world. This is due to a combination of different factors, but more recently this growth has been fuelled by the following factors. The first is the rapid pace of technology advancement. The second is the continued drop in prices of various hardware which has led to increased demand and acquisition of said hardware. According to Wabwoba, F., Wanyembi, W. G., & Omuterema, S. (2012) this rapid growth in ICT is creating lots of challenges especially within developing countries like Kenya. The first of these challenges is that ICT devices have much shorter lifespans. A good example of this is mobile devices which on average are replaces every 2 years. The danger of this is that it creates a lot of Electronic waste (e-waste) which is one of the fastest growing types of waste in the modern world today and one of the most difficult to dispose of in a safe and cost effective manner. As many third world countries rely on hardware donations, most of these obsolete devices will find their way into these countries. This not only increases the rate of harmful emissions, it also endangers the lives of people as well as the environment. This in  turn leads to environmental degradation, increases the cost of doing business as well as power demands and demand for social responsibility. Basically, Green computing is becoming more of a necessity and less of an option. Why Green Computing? As we discussed earlier, ICT is playing an increasingly important role in both Business as well as in Private undertakings. This is true for most of the world as this has been fuelled by the rapid pace at which technology has been advancing. The big question then becomes, â€Å"Why should anyone care about Green Computing/ICT/IT?† In looking at this, we will understand what benefits as well as what challenges we can expect from adopting green computing technologies not only in our businesses, but in our homes as well. According to Wabwoba, F., Wanyembi, W. G., & Omuterema, S. (2012), green computing focuses on more than just electricity consumption. It goes beyond the function of the ICT department. Green ICT acts as a central enabling technology to many aspects of sustainability. It goes beyond purchasing and usage considerations into how it can be used to lessen other aspects of environmental impact in the other sectors that it supports. The article goes on to say that this sustainability can be achieved through dematerialization and changing physical processes into virtual ones. Green ICT therefore brings together themes concerning the future of our current world, technology as well as the environment. San Murugesan’s article on Harnessing Green IT: Principles and Practices shares a similar view to that of Wabwoba, F., Wanyembi, W. G., & Omuterema, S. San Murugesan’s article goes on to say that many of today’s environmental issues are having an impact on the competiveness of the IT business sector. Basically, businesses with the technology and vision to provide products and services that address the various environmental issues we have today, will enjoy some sort of competitive advantage. Many customers are now taking into consideration a service provider’s environmental records as well as initiatives. These factors are having a substantial effect on customers’ purchasing, leasing and outsourcing decisions. What are the benefits? Green computing looks to solve many of the challenges that businesses face today. An example of one of these challenges is higher energy costs. †Businesses face higher energy costs, and they may also incur additional government levies if they do not address the environmental implications of their practices.† (Murugesan, 2008, p.26). â€Å"Investors and customers are beginning to demand more disclosures from companies with regard to their carbon footprint as well as their environmental initiatives and achievements, and they have started discounting share prices of companies that poorly address the environmental problems the create †. This means that many companies today have begun to show their environmental credentials to customers as a way to gaining an upper hand over competitors. Many businesses as well as individuals are also looking to achieve better energy efficiency through adopting green initiatives. This in turn will lead to financial benefits especially when electrical energy is at a premium and energy prices continue to rise. This is actually one of the major reasons for individuals as well as companies to start adopting eco-responsible practices. This means that many companies are bound to prioritize environmental issues for energy efficiency as well as cost-control benefits. An example of this in the real world is companies such as Dell and Wall-Mart. These two companies have both adopted initiatives that force their suppliers to adhere to environmentally sound practices. In a paper titled Pervasiveness of green ICT awareness amongst Kenyan ICT personnel Wabwoba, F., Wanyembi, W. G., Omuterema, S., & Mutua, S. M., (2013), the writers listed some of the various benefits of green ICT. The benefits of green ICT to the Environment/Society as well as to Companies include the following: Lower carbon emissions. Reduced resource consumption. Compliance with legal requirements. Reduced energy costs. Reduced operating costs of Data Centres. Less Hardware needed. The paper goes a step further by grouping the benefits of green ICT according to the Capital Market, Employees’, Customers’ as well as Public levels. These are shown below: Employees’ level benefits Increased employee satisfaction. Greater loyalty. Easier recruitment. Capital Market level benefits Improved ratings. Higher share prices. Greater company value. Customers’ level benefits Greater customer loyalty. Appeal to new customer groups. Greater customer satisfaction. Public level benefits Improved image. Rounded-out CSR strategy. Greater brand value. Examples/implementations of green computing in Kenya Here we shall look at examples of green computing implementations and initiatives within Kenya. The first example we shall look at is from Tea companies in Kenya go green through carbon finance (2013). Basically, several tea factories from the Nyeri district, all under the management of the Kenya Tea Development Agency (KTDA) chose to go green through a project titled â€Å"Guru Project†. The name Guru Project comes from the nearby Guru River in the Nyeri region. Much of the tea-manufacturing process requires electricity for processes like withering, cutting and drying tea leaves. Unfortunately, the factories would experience frequent power outages and poor power quality. The Guru Project aims to construct a hydro-power plant using water from the Guru River to generate power for the factories, thus allowing them to stop using the national grid. The benefit of this is that it will help reduce carbon emissions by some 38,400 tonnes of carbon dioxide a year. On top of that, the factories will receive additional returns on their investment in lower emissions through carbon credits provided by the Clean Development Mechanism as part of the United Nations Framework Convention on Climate Change (UNFCCC). The second example we shall look at shows how Kenyan companies that are going green can be rewarded for it. There was an article in the Business Daily from December 10th 2013 that looks at this, Ciuri, S. (2013). The newspaper Article looks at how 2 Kenyan companies that won 6.5 million Kenya Shillings for running green Enterprises. The companies in question are Continental Renewable Energy Company and Wanda Organic Company. Continental Renewable Energy Company converts plastic waste into low cost building materials and they won 4.23 Million Kenya Shillings as a reward. Wanda Organic Company on the other hand is an organic fertiliser Distributor and won 2.16 million Kenya Shillings. They were rewarded the money by Growth Hub which is an initiative to support businesses that want to pursue environmental conservation. The next example looks at how choosing to go green can help you gain a competitive advantage over other companies, as well as gain recognition in certain markets. We shall refer to an article on the East Africa Top 100 website from January 29th 2014, Going green wins entrepreneur the 2013 SME crown (2014). It follows the story of Dinesh Tembherkar who is a mechanical engineer by profession. He founded his own company called Lean Energy Solutions after being unsatisfied with formal employment for many years. Lena Energy Solutions is a company that provides Energy Management consultancy services within East Africa. They have been involved in energy and project management and offer comprehensive energy audits, investment grade audits, trainings in energy management, manufacturing of Lean Briqs and other related projects such as Boiler conversion from oil fired to solid fuel fired and swimming pool heating. Basically, their methodology helps their clientele to improve on productivity and maximize bottom line performance. This has allowed them to differentiate their goods and services from those of competitors, and it allowed them to be recognized as one of Kenya’s fastest growing mid-sized companies in the 2013 edition of the Top 100 mid-sized firms. This competition is held in the form of a survey that is sponsored by the Nation Media Group and the consultancy firm KPMG. Finally, we shall look at how various individual can play a role in contributing to the adoption of Green computing technologies and what impact it can have on their lives. Mbori, C. (n.d.) has a very good article in one of his blogs that looks at the cost of conventional energy in Kenya. In the article we see that Kenya is classified as an energy poor country since majority of the population spend huge amounts of their household income on energy. This is especially true for rural areas. As at the time of writing the article, Kenya only provided 15 percent of the population with access to grid electricity out of which only 4 percent was in rural areas. Less than 25 percent of Kenya’s population had access to modern energy forms. This means that many households in Kenya still rely on older forms of energy for heating, cooking and lighting like kerosene, charcoal and even candles. Kenya is located along the equator, which means that there is an abundance of renewable energy in the form of sunlight which many people are yet to take advantage of. Though, there has been a surge in the adoption of solar photovoltaic (PV) technologies or solar electric systems. These systems allow you to capture the sun’s energy using photovoltaic cells and can work even on a cloudy day. Many of these PV modules are mainly use for lighting, cell phone charging as well as refrigeration and entertainment. At the time of writing the article, there were more than 200,000 PV modules installed in Kenya. That number was steadily increasing at a rate of around 30,000 PV modules annually. Mwaura, M. (2010) shared a short YouTube video and article about how one old man named Ben Mureithi who is a retired civil servant was able to use renewable energy to better his life. He settled down in a very remote part of Kiserian where there was no electricity and no running water. By installing solar panels, he was able to power his entire home for entertainment, lighting and heated water. To solve his water problem, he was able to capture rain water using   drainage pipes from his roof into a big underground tank. He is able to use the water for his day to day needs and even to irrigate plants that he grows. This proved to be so effective that in 2006 during a drought in the area, he was able to supply water to some other people in the area. People like Mr Mureithi are able to succeed in such harsh areas because they have adopted green technologies and green practices in order to make the best use of the resources available to us all. Another factor that has enabled this is the advent of low-cost solar in Kenya. Traditionally, solar has always been out of the reach of most people because the cost of setting it up has always been high. Low-Cost Solar Invades Kenya (2010) looks at some low cost solar powered technologies and kits which are currently available in Kenya today. The first one the writer looks at is the Solantern which is essentially solar powered lantern that can be charged during the day and runs at night. The lantern was intended to help replace kerosene lamps in many Kenyan households and allow them to save money and the environment at the same time. It was retailing for about 2000 Kenya Shillings in the year 2010. Another low cost solution discussed is the  ToughStuff which is a solar kit that comes with a small solar panel and different kinds of connectors. It can be used to charge a small LED lamp, mobile phones, a rechargeable power pack and some cheap rechargeable D-cell rechargeable batteries for powering other devices. The unit is sold through Chloride Exide in Kenya as well as in a few other shops. These are just a few of the many examples of technologies that promote selfsustainability as well as changing peoples’ lives for the better. Conclusion From what we have discussed in this article, we can see that Kenya still has a long way to go before we are able to achieve any major milestones in regards to green computing and adoption of green technologies. Below we shall look at a few of the major challenges that have prevented us from advancing with regards to green computing. We shall refer to the article Barriers to Implementation of Green ICT in Kenya, (Wabwoba, F., Wanyembi, W. G., Omuterema, S. 2012, p.832, p.833). Lack of technical skilled or trained manpower in green ICT. (1) Green implementation is too costly. (11) Lack of green ICT workshops/seminars to update knowledge. (5) Overreliance on donations for ICT hardware acquisition. (7) Lack of top management support. (4) The rapid technology changes. (8) Lack of legislation to support green ICT implementations. (6) Existence of policies that hinder green ICT implementation. (10) Not knowing where to start in implementing green ICT. (8) General Resistance to change. (11) No budget is allocated towards implementing. (2) From the article, we see that the number one barrier to implementation of green ICT in Kenya is the lack of technical skilled or trained manpower in green ICT. This goes to show that a lot of work still needs to be done in creating awareness about the importance of going green and the opportunities available by making the switch. The way forward is to first focus on changing peoples’ opinions about green computing as a whole since a lot of the major adoption challenges are due to poor attitude and lack of information in general. It is only in this way  that we can get people to see the importance of creating a self-sufficient country, and all the good it will do not only for the environment but for all citizens as well. References Murugesan, S. (2008). Harnessing Green IT: Principles and Practices. IEEE Computer Society. Retrieved from University of Pittsburgh Website: http://www.pitt.edu/~dtipper/2011/GreenPaper.pdf Wabwoba, F., Wanyembi, W. G., Omuterema, S. (2012). Barriers to Implementation of Green ICT in Kenya (Vol.2, No.12). International Journal of Science and Technology. Retrieved from e journals of science website: http://ejournalofsciences.org/archive/vol2no12/vol2no12_3.pdf Wabwoba, F., Wanyembi, W. G., Omuterema, S., Mutua, S. M., (2013). Pervasiveness of green ICT awareness amongst Kenyan ICT personnel (Vol.2, No.1). Retrieved from International Journal of Application or Innovation in Engineering & Management website: http://ijaiem.org/volume2Issue1/IJAIEM-2013-01-15-021.pdf Tea companies in Kenya go green through carbon finance. (2013). Retrieved from UNDP website: http://www.undp.org/content/undp/en/home/presscenter/articles/2013/02/20/sustainable-teacompanies-in-kenya-go-green-through-carbon-finance/ Ciuri, S. (2013). Kenyan firms receive Sh6.5m for going green. BUSINESS DAILY. Retrieved from BUSINESS DAILY Website: http://www.businessdailyafrica.com/Kenyan-firmsreceive-Sh6-5m-for-going-green/-/539546/2106862/-/dls7qqz/-/index.html Going green wins entrepreneur the 2013 SME crown. (2014). Retrieved from East

Monday, July 29, 2019

The Alliance between General Motors and PSU Peugeot Citroen Essay

The Alliance between General Motors and PSU Peugeot Citroen - Essay Example This paper illustrates that competition is forcing rival firms to join hands for developing a better position in the market and also enhance their resource base. The number of alliances, partnerships, ventures, and mergers have increased in the last decade in the corporate sector. However, Hoffmann mentioned that creating alliances is a complex process which can also result in negative outcomes if the allies do not measure the variables of the process in a proper manner. General Motors and PSU Peugeot Citroen have created a customized approach for following up with their alliance plan and created a separate committee for members by selecting key personnel of both the organizations to manage the alliance activities. The researcher is a member of the committee and hence will reflect on the plans and activities being performed within the alliance.The alliance between General Motors and PSU Peugeot Citroen was formed mainly with the view of developing a better resource base for the opera tions of both the companies on the global scale. The strategic alliance between the companies is expected to build their organizational capabilities in response to the challenges faced by the firms in the global marketplace. One of the most crucial considerations which urge firms to engage in mergers and alliances is to reduce the cost of operations. The organizational processes related to the formation of an alliance are structured by the top management of the companies. In the case of GM and PSU Peugeot Citroen, Weinmann and Thomas mentioned that this alliance will lead to the union of the American and European automobile industry and enhance the scope of a production process for the firms as well as will create more options for the customers in all the marketing zones of the concerned organizations. In the context of specific objectives, GM is focused on designing new and innovative production process whereas PSU Peugeot Citroen will utilize the market base of GM for entering the major markets of Asia and America.   The planning stage of the alliance as reported in various media means has highlighted that organizational needs of the allies have been accurately shared and balanced by the firms. This has reduced the liability of the allies and also boosted the level of trust among the partners.  

Sunday, July 28, 2019

Module Review 3 Essay Example | Topics and Well Written Essays - 1500 words

Module Review 3 - Essay Example The control of integrated operation by the CPFR is performed through strategic planning, management of demand and supply, execution and analysis. In planning and strategy, the CPFR sets the goals of a firm, with distinctive outlines of the scope of the roles, responsibilities, procedures, and checkpoints. This Joint Business Plan spots the hindrances of effective demand and supply, and eliminates these obstacles through inventory policy changes, introduction of products, promotions, and opening or closing of branch stores (Sattar, 2012). The management of demand and supply focuses on sales forecasting and order forecasting. Sales forecasting projects the demand of consumers at a certain sales point. On the other hand, order forecasting determines the orders and deliveries depending on the sales forecast (Diederichs, 2009). The execution role of the CPFR in integrated operations constitutes the implementation of the firm’s forecast into the firm’s real demand and fulfillment of the orders through production, stocking of stores, delivery and shipping. In addition to execution, the CPFR analyses the planning of operations and calculates the returns of the business to determine the achievements of the strategic plans, or to expose the need for the development of more alternative strategies (Choi, Hui & Yu, 2013). Inventory is a critical visible asset for most firms, and determines the size of a firm’s purchasing power. The inventory levels are subject to focus by many company shareholders and executives. Despite this, the focus has reduces drastically, causing sever implications on the supply chain. The administration of inventory is necessary in the planning of inventory requirements and management of uncertainties that may occur in a business. The use of Pareto inventory practice enables the management to establish the amount of inventory on the low demand items that indicates the shortage of a product, the need for transitions or

Saturday, July 27, 2019

Reading Assignment Example | Topics and Well Written Essays - 500 words - 4

Reading - Assignment Example In the winter of 1906-1907, Pablo designed the first elements of Les Demoiselles d’Avignon. The author appreciates that the twentieth century artist developed his concepts in an intensive manner. The design took place through a program planned consciously similar to the works of Gericault and Leonardo. Picasso painted his product on an eight feet canvas in the summer of 1907. Les Demoiselles d’Avignon provided the rift as well as the divide between ninetieth century art and future designs (modern) designs in painting (Chave 600). It remains the hallmark of art over the one hundred years. Chiva holds that time and events at the time allowed Picasso to do what he did. Nothing was strange because other events were happening in other areas as well. In 1909, Schoenberg composed the Erwatung and The Right of Spring by Stravinsky came to the limelight in 1910. In 1914, when Picasso was doing the later stages of cubism, Ulysses started. Caught up in blue and silver long curtains are five pink women in the painting. Two of the women are in an upright posture raising their arms with the purpose of flaunting their breasts. With protruding black eyes, the women always stare at the viewer. The designer decided to mask the other three women out of the five. Two of the three are dressed in African masks. Of the two, one intrudes from behind one of the cloth that remains jagged and the bother appears squatting in fabrics made of diamond. The author identifies that height carries a few more centimetres than the width in reality. This fact disposes any analyst to be part of symmetry and space. Work done by Picasso on Les Demoiselles d’Avignon was great and immense any way. The late ninetieth century and early twentieth century witnessed the development of provocative works in the industry with the same theme as that designed by Picasso. Identified in this category are novel by Zola, Pallas Athene by Klimt, and Madonna by

Friday, July 26, 2019

The Country Of Egypt Research Paper Example | Topics and Well Written Essays - 4500 words

The Country Of Egypt - Research Paper Example 4.3 Unemployment 12 5 Economic Structure 135.1 Agriculture 13 5.2 Industry 155.3 Services Sector 16 6 International Economic Relations 17 6.1 Foreign Trade by Major Countries 17 6.2 Foreign Trade by Commodities 17 6.3 Foreign Direct Investment 18 7 Major Problems of Economy in Future 19 8 Conclusion 20 Bibliography 21 The Country of Egypt 2 1 Introduction Egypt is well-known for its ancient...Egypt is officially named as the Arab Republic of Egypt, is a state in North Africa which is covering a region of about 1,001,450 square kilometers. This paper contains geographical, demographical, governmental and historical statistics and on also focuses on the economic strategy and formation, the macroeconomic situation and the state's global economic relations to present Egypt's position in the world and its markets. Egypt is located at 1,001,450 square kilometers. It is the world's 38th largest and leading country. It is similar in size to Tanzania, double the size of France, four times the size of the United Kingdom and is further more than half the size of the United State of Alaska. However, due to the dryness of Egypt's climate, population centers are determined all along the narrow Nile Valley and Delta which means that about 99% of the population employs merely about 5.5% of the entire land area. Egypt is surrounded by Libya to the west, Sudan to the south and by the Gaza Strip and Israel to the east. Egypt's significant job in geopolitics branch is from its considered situation that is a transcontinental state; it possesses a land bridge namely, the Isthmus of Suez, located amid Africa and Asia, which sequentially is negotiated by a passable waterway, the Suez Canal that is joined with the Mediterranean Sea and the Indian Ocean through the Red Sea.

Thursday, July 25, 2019

Current ethical issues Essay Example | Topics and Well Written Essays - 500 words

Current ethical issues - Essay Example ilemma lies in the fact that even a pharmaceutical company is a business and it is there in the market to earn money however if such a company starts to give free away free medicine to everybody in need, the company would go bankrupt in a short time and then it there would be no more of that drug in any case. This problem becomes more serious when a company tests its drugs in the general market, give free samples, monitors the patients, set up offices and markets for patients etc. but when the testing ends, the company takes drug away from the people who were depending on it. Everyone cannot afford the real price of the product when it is approved by the FDA and launched because the company has to acquire patients and rights for their products thus raising their costs as well. Something that can be done is to involve the government and the charity organizations in these cases where testing, free medicines are involved so that the company producing them can continue doing their business but the government and the philanthropists can give the poor drugs on their expense for the sake of social heath

Social Networking and Information Systems Research Paper

Social Networking and Information Systems - Research Paper Example As the research declares the use of social networking sites have increased substantially for the last decades; thus, it serves a number of purposes, but the three main roles stand out as common across all sites. One of the functions or purposes of social networking is to maintain and strengthen existing social ties or creating new social connections. The major purpose of using social networking sites is to communicate and strengthen relationships with friends, families or relatives across the globe. Johnson argues that social networking sites have morphed into mainstream techniques for teens, adults and companies to exchange information about themselves through sharing pictures, videos, sharing interests and private messages. As the essay stresses social networking sites have not only enabled friends, families and relatives to connect in time and space but also enabled business entities to communicate easily about their products and services they offer to customers in the market. Companies post their products on social networking sites and others have their profiles, thus they upload their content, which are in turn shared across the social network connections. This is vital because it has boosted the business growth of many companies because they are able to advertise their products and services effectively; thereby, reaching many customers across the globe efficiently. Many social network sites permit users to mark content as public or confidential, while others permit them to tag content. Others social tools such as YouTube allow users to upload unlimited amount of content and users are always allowed to upload interesting contents, which are generally publicly accessible from the profile page of the u sers. Social sites such as LinkedIn are among of the significant sites for recommending and organizing the content uploaded by users. This site has become commonly used for job seekers and

Wednesday, July 24, 2019

Business Proposal for Nonprofit Ccharity Organizations Essay - 26

Business Proposal for Nonprofit Ccharity Organizations - Essay Example To meet the increasing demand for donations, the company intends to expand the manufacturing unit at a cost of $2million in the next two years (Allen, 2010). The expansion will ensure that the production volume is doubled (Fisher, 2000, p. 89).  The capital required for the expansion is the main challenge for the company because it does not intend to change its working principles in order to raise the capital (Armstrong, Cools, & Sadler-Smith, 2011). Therefore, the company intends to look for a grant to cater to expansion costs (Chilton & Bloodgood, 2010). The social implication for the inability to raise the capital will be catastrophic to the company because of failure to meet the increasing demands (Cooper, 2008). The provision of safe water for domestic use is a challenge especially in t developing nations (Archer, 2011). The company targets the provision of water to rural households in Africa. The target country in Africa is Ethiopia the semi-arid regions of the country (Routl ey, 2006). The major plan of the company is to drill boreholes in the region to provide water for the locals (Shaw, 2011). After construction of the boreholes, they are handed over to Community Based organization (CBO) to manage (Global Warming & Climate Change, 2012). The company intends to expand its operation into countries with severe water shortage problem such as South Sudan (Beverly & Thomson, 2011). The company does not operate in a buy one donate one model, but it depends on grants totally (Hart, 2011). The leading donor is Melinda and Gates foundation (McKinsey & Company, 2010). The expansion and operational cost for the year according to the budget are $15 Million (Department of Sustainability Environment, WaterPopulation, and Communities, 2009).

Tuesday, July 23, 2019

Communication and Motivation Research Paper Example | Topics and Well Written Essays - 3250 words

Communication and Motivation - Research Paper Example mmunication and motivation is widely considered to be one of the most effective leadership styles in the contemporary real world organizational management. Many recent empirical researches have revealed that employees normally feel disengaged from their organizations or work when they do not have feelings of emotional connection. On the other hand, proper communication and motivation of the workers and subordinates not only allow them to effectively carry out their day to day activities but also inspire them to challenge themselves and each other to greater performance. According to Yukl (2002), leaders and managers are increasingly incorporating communication and management in their leadership styles to enable them develops conditions in their workplaces that generate commitment, excitement and energy. For example, in most cases, managers, supervisors and top executives normally spend a significant amount of their time communicating to others in their day to day activities. . Some of the key potential benefits of this leadership style include allowing followers to work while informed of the organizational goals thus making them work better; making employees feel more appreciated thus resulting into increased productivity and providing leaders with an avenue to exert influence over their subjects. In addition, it is widely believed that employees tend to respond more enthusiastically to the leadership when they feel motivated, respected and inspired. Contrary to just giving orders, managers should develop tactics of helping their teams and the company to achieve its strategic goals. Generally, through communication, executives can easily build employee confidence in their leadership, enable them understand the general strategy of the company and identify their areas of contribution to the organization. However, different organizational cultures require different leadership styles in order to effectively communicate and motivate their workforce. This paper

Monday, July 22, 2019

Jesus’ Blood Never Failed Me Yet Essay Example for Free

Jesus’ Blood Never Failed Me Yet Essay Known as a minimalist and experimental composer, Richard Gavin Bryars unleashed an emotionally intimate constructed piece out from a lone old vagrant singing, Jesus’ blood never failed me yet, this one thing I know, for he loves me so†¦ Originally recorded from footage of a documentary by his friend Alan Power in 1971 (Grimshaw), this aged voice served as the focal point and backdrop for Bryars’ poignant yet challenging work unfolding and reiterating itself over the course of 74 minutes in length. Whereas music that falls under Minimalist movement, sometimes associated the emotional neutralization of repeated materials, Bryars’ has the reverse effect in which rather than numbing the listener’s sensibilities, he heightens them and instead of imposing postmodern indifference toward the subject matter, it forces confrontation with it (Grimshaw). The entire lengthy music might deflate the interest of its listeners as the lines simply repeated over the recording, but Bryars managed to extract the spirit of the tramp’s captive song as he slowly introduced an accompaniment. The first part was merely the sole voice of the old man then eventually enhanced by string quartet, followed by plucked bass and guitar. Moreover, as the instruments subsequently fade out, the tramp’s song continues and eventually underscored by a much richer sounding ensemble of low strings, then woodwinds, brass, and delicate percussion and finally full orchestra and choir (Grimshaw). The soul of the music originated from the compassionate nature of the old vagrant who sang the religious tune during the recording of Power’s documentary that was about the life of street-people around Elephant and Castle and Waterloo in London. Bryars’ recounted; while they are filming the documentary, some people broke into drunken ballad or opera songs, but there was a particular homeless old man sang â€Å"Jesus’ Blood Never Failed Me Yet†. When he played it at home, he noticed the exact tune of the singing to his piano, and, he discerned that the first section of the song that is 13 bars in length formed an effective loop that repeated in a slightly unpredictable way. Therefore, he took the tape to Leicester and copied the loop onto a continuous reel of tape having the idea of adding orchestrated accompaniment to it. During the act of copying, he left the door that lead to the large painting studios, and when he came back, he found people weeping and silently listening over the old man’s singing, at that point, he realized a great emotional influence from the noble faith and tranquil music (Howse), a merely accidental root behind this epic. This particular Bryars’ piece was a breakthrough as there were other versions made during the latter years. Tom Waits singing along with it in 1990 and Jars of Clay released their own version on their album Who We Are Instead in 2003, aside from the fact that it was also used for several theatrical presentations. Covering credits for its very straightforward message to the people, the unyielding constancy of the lyrics—repeated over 150 times—essentially keeps the music from achieving greater feats. It is said that no matter how many times you paint a house, it remains to be the same house. Still, that verse holds together the entirety of the minimalist piece, a factor that you cannot simply neglect. Focusing on keeping his music very simple yet haunting, this composer and double bassist is a native from Goole, East Riding of Yorkshire, England and born on January 16, 1943. His first musical reputation was as a jazz bassist working in the early sixties with improvisers Derek Bailey and Tony Oxley. He abandoned improvisation in 1966 and worked for a time in the United States with John Cage, until he collaborated closely with composers such as Cornelius Cardew and John White. He taught in the department if Fine Art in Portsmouth, Leicester from 1969 to 1978, and there he founded the legendary Portsmouth Sinfonia, an orchestra whose membership consisted of performers who â€Å"embrace the full range of musical competence† — and who played or just attempted to play popular classical works. He also founded the Music Department at Leicester Polytechnic (later De Montfort University) and served as professor in Music from 1986 to 1994. Meanwhile, his first major work as a composer owe much to the so-called New York School of John Cage—with whom he briefly studied, Morton Feldman, Earle Brown and minimalism. His earliest piece was The Sinking of Titanic (1969) and was originally released under Brian Eno’s Obscure Label in 1975 and the Jesus’ Blood Never Failed Me Yet (1971) both famously released in new versions in the 1990s on Point Music Label, selling over a quarter of a million copies. The original 1970s recordings have been re-released on CD by Virgin Records. A major turning point in his development was his first written opera Medea, premiered at the Opera de Lyon and Opera de Paris in 1984. He has written another two operas, both with libretti by his long time collaborator Blake Morrison: Doctor Oxs Experiment, and G, commissioned by the Staatstheater Mainz for the Gutenberg 600th Anniversary. Aside from that, Bryars has also produced a large body of chamber music including three string quartets and a saxophone quartet both for his own ensemble and for other performers. He has also written extensively for strings as well as producing concertos for violin, viola, cello, double bass, saxophone and bass oboe. He has also written choral music, chiefly for the Latvian Radio Choir, with whom he has recently recorded a second CD, and for the Estonian Male Choir. From being a jazz bassist, composer, professor and opera writer, he also made a name as he collaborated with visual artists, worked with choreographers who have used his pieces, and written numerous Laude for the soprano Ana Maria Friman, to name a few. And to date, he recently completed a theatre piece, To Define Happiness, with Peeter Jalakas for Von Krahl theatre in Tallinn, and a project around Shakespeares sonnets, Nothing Like the Sun, with the Royal Shakespeare Company and Opera North. Gavin Bryars is an Associate Research Fellow at Dartington College of Arts and Regent of the College de Pataphysique. And married to Russian-born film director Anna Tchernakova with three daughters and a son. He is currently living in England and British Columbia, Canada. WORKS CITED Howse, Christopher. The Assurance of Hope. Continuum International Publishing Group, 2006. xix. ISBN 0-8264-8271-6 Mckeating, Scott. http://www. stylusmagazine. com/articles/seconds/gavin-bryars-jesus-blood-never-failed-me-yet. htm Grimshaw, Jeremy. â€Å"All Music Guide†. http://www. answers. com/topic/jesus-blood-never-failed-me-yet-orchestral-classical-work http://www. gavinbryars. com/ http://www. myspace. com/gavinbryarsmusic http://en. wikipedia. org/wiki/Jesus%27_Blood_Never_Failed_Me_Yet

Sunday, July 21, 2019

PESTLE Analysis for Turkey

PESTLE Analysis for Turkey Introduction The report will consist of different aspect of factors to consider for moving the plant into Turkey. The area which will be covered will be the PESTLE analysis along side with the Porters Diamond and also an analysis on the cultural factors. PESTLE Analysis for Turkey Political One of the current political strengths in Turkey is that their government have policies on liberalisation. Turkey is supporters of liberal trade and investment policies which allow open trade between different countries in the EU. Turkey forged a custom union agreement in 1996 to allow many Turkish firms to get bigger and more successful in the global economy. Exports have been rising on average at a rate of 10% every year and this will allow the fashion industry to flourish with the exports produced in the Turkish plant. One of the current political challenges in Turkey is the series of violent terrorist attacks that have happened in the country due to Islamic extremist, Kurdish radicals, Turkish militants that may have link with Al-Qaeda. This is a disadvantage for bringing the plant to Turkey as it may be targeted by these terrorist. Economy One of the current economic strengths in Turkey is that there is a high flow of foreign investment coming from abroad. The investment plays apart in Turkeys speedy expansion and this has been driving the countrys economic growth. In Turkey there is a privatisation program planned to start from 2008 that will allow the sale of major bridges, highways, electricity grids and a share in the partly commercial bank. The money generated from foreign investment will be used for expanding the infrastructure of the country; this will be an advantage for bringing the plant into Turkey as the Turkish economy will be in growth and to bring the plant here will only benefit the company and the fashion industry. One of the current economic challenges in Turkey is the current account deficit for Turkey. The declining current account has been was delayed the economic stability. The import market has seen a quick rise as an outcome of increased global commodity prices and a sturdy Turkish lira. Turkey is even more vulnerable during times of global financial doubt. This will be a disadvantage for bringing in the plant into Turkey as it the company may need to relocate if there is a financial crisis which may happen with Turkey. Social System One of the social system strengths in Turkey is that they have growing proportion of young population as they have more than half the population being aged below 30. This will allow Turkey to increase their employment rate by getting the most out of the young labour force. This is an advantage for the plant being brought into Turkey as shows there is a healthy supply of young population willing to work so the company could create jobs for these people. One of the social system challenges in Turkey is that they have a high level of unemployment. Turkey unemployment level rose by 38,000 in that year to 2.3 million in 2007 but then in 2008 it rose again by 737,000 from the previous year so this shows that there was a substantial increase from the previous year. This is a disadvantage to bring in plant into Turkey due to the high level of unemployment as they may not be skilled workers in the pool of unemployed people. There is another side to this where it can become an advantage by hiring these unemployed and training them to work sufficiently for the company. Technological One of the technological strengths in Turkey is the significant development in the ICT sector. During 2001-2007, Turkeys ICT sector expanded so rapidly it expanded by double-digits so that shows that it was a very successful growth. In 2007, Turkeys ICT market reached $24 billion and in the previous year it reached $21 billion so this shows that in a space of one year the market grew by $3 billion which is a very substantial amount of money. The reason for this sharp increase is due to the Turkish telecommunications sector as they have been privatised by the government. This is an advantage for the plant being brought into Turkey as this will attract more foreign investment project as well as creating more jobs for the people of Turkey. One of the current technological challenges in Turkey is the low expenditure cost on the research and development. Turkeys research and development cost in 2006 was around 0.6% which is below the average of the European countries which are at an average of 2.3%.This is an disadvantage for bringing in the plant into Turkey as there is not that much investment being put into the Turkish research and development, they will need investment from both the private and public sector because the country will need to have a healthily amount of investment in order to grow into a country which is in the EU. In the future is the research and development cost are still low then this will erode and stop the competitiveness of different industries in Turkey which will be bad for the long run. Legal One of the legal strengths in Turkeys is the comprehensive legal structure they have. The judicial system is made up of general courts which deal with domestic cases, heavy penal courts which deal with more serious case, military courts which will deal with the military cases and the Constitutional Court which is the highest level of courts that will deal with many different cases which is essential in the Turkish government such as war crimes. This is an advantage for the plant being brought into Turkey as this shows that the Turkish government are strict on the law and will enforce the law if need be, it will allow the company to have a fair trial if any form of disruption were to come up such as trade union issues that would cause the company any serious problems. Another legal advantage in Turkey would be the robust framework for the business entities, as the company who are looking to invest into Turkey will not need to go through a very long and lengthy business registration process as there is a freedom to start, operate and close a business by the Turkish regulatory environment. so for example in Turkey, it will take on average 6 day to starting up a business compared to 43 days in the other world countries which is a much longer time and could be beneficial for the type of market the company is involved with. As the fashion industry clothe range change very often and will need to be able to adapt quickly if the plant is being brought over to Turkey. One of the current legal challenges in Turkey is the judicial inefficiencies as there are some delays in the Turkish judicial system which can cause some serious issues. There are also judges who are politically biased and this has affected legal outcome. This is a disadvantage for bringing in the plant into Turkey as there may be a decision made against the company if ever in a legal battle as the judges may not have an unbiased view of the case but in fact have a biased view according to the political situation at the time. Environmental One of the environmental strengths in Turkeys is the prosperous biodiversity they have. Turkey has a very affluent natural resource base and has ranked ninth on biodiversity in the European countries. Examples of the type of biodiversity they have are not only a range of wild species but important domestic species such as wheat, lentils, chickpeas, pears, apple, chestnut and pistachios. The biodiversity has a very great potential for the development for Turkey and this is an advantage for the plant being brought into Turkey as this will materials such as cotton to be grown in Turkey and used in the plant so the material will be home grown and will have a cheaper price and there will be more jobs created for the company involved in cotton picking. One of the current environmental challenges in Turkey is the high pollution levels and the global warming being caused from the pollution levels. The water treatment facilities, wastewater treatment equipment and solid waste management in Turkey needs urgent attention as there is high level of environmental pollution as the is an increase in chemical and detergent overflow and this rises in the air and can cause severe illness to people who inhale especially in urban areas. The air pollution has increased over the past since 1990s and is the air pollution is quite severe in the capital of Turkey, Ankara and other city such as Istanbul. Smog in these cities is due to the increasing number use of cars. Also there is a lot of industrial air pollution from power plants and facilities used by the fertilizer, cement and sugar industries which dont have the flirtation equipment needed to filter out the pollution. Turkey loses out on approximately one billion tons of topsoil annually and thi s has an increasingly level of environmental pollution and that could harm the people and economy of Turkey. The air pollution is a disadvantage for bringing in the plant into Turkey as there many form of pollution in Turkey which are harmful and could affect the environmental value our company holds and the ‘green credential which many of our customers may consider before doing business with our company. Also the disadvantage is that the contribution to global warming where there are so many efforts to reduce the green house gas but Turkish government should invest into becoming green so that it could become a cleaner environment also it may need to cut down on the pollution level as they are in the EU and will have to meet the pollution level they have planned to cut to. PESTLE linked to Porters Diamond Turkeys political strength that links to the Porters diamond would be how the Turkish government are creating new legislation to help the industry and different companies to grow and foreign investment to improve and make it better for Turkey as a national advantage. Turkeys economical strength that links to the Porters diamond would be how they are making the market more demanding by stimulating foreign investment to make them more competitive for different industries and companies so it will benefit Turkey as a national advantage. Turkeys social strength that links to the Porters diamond would be how the Turkish have a growing proportion of young population which the Turkish government can use to create new job by encouraging and training them up to have new skills and qualified to work in different sectors and this will be a national advantage for having a very skilful workforce. Turkeys technological strength that links to the Porters diamond would be how the Turkish government are improving the ICT sector so not only is it modern but its structure would benefit Turkey and support different industries to enable them to achieve their optimum so that will be a national advantage that benefit Turkey. Turkeys legal strength that links to the Porters diamond would be how they have created a strict system for the courts which is there to keep companies and people within the law that Turkey have set out to help them grow so that would be a national advantage. Turkeys environmental strength that links to the Porters diamond would be how they have a good biodiversity and have a rich resource to different material used for various industries and the Turkish government are trying to maintain this biodiversity and creating job in the process so that it can supply to different countries and for Turkey this will be a national advantage. Cultural issues to be considered There are cultural issues that need to be considered before bringing the plant over to Turkey. There three main issues in Turkey would be religion, location and gender equality. Turkeys main religion is Islam and it is heavily influenced in the many aspect of Turkish life and it plays a major part of the Turkish people lives. The faith has many restriction and many special occasions where to celebrate the faith. Where the company will need to consider if they clothing being manufactured will be able to look good for most of the Turkish population taste and the dress sense as the faith has many restriction on the type of clothing worn and will not support inappropriate clothing for the people Turkey. Especially in the female section there are many restrictions what to cover up and where, but in recent year the restriction have been very flexible as the country is becoming more modern and more western. The location where the plant will be positioned will need to be thought over as there may have repercussion as there may be houses, schools and mosque nearby so this will create a bad environment because if the plant was to be made near houses then the community may be very unhappy with the disruption of they everyday live with a plant being made near them. Also the location will need to be considered in terms of pollution so if there was any pollution then it needs to be well away from people. Gender equality will need to be considered as the males tend to get paid more than the female as they feel that they do more. It is serious issue within the Turkish government but it relate to the Turkish culture on how the males are the dominate species so the company may need to consider this could be a chance to break the gender barrier and provide same wages for the female as the males. Conclusion In conclusion, the company should seriously consider moving the plant into Turkey as it is still an emerging country that has flaws but has many advantages and over time the flaws will be sorted out and benefit the company in the long run. References Books International Business, Environments and Operations, Pearson International Edition, Daniels, Radebaugh, Sullivan Online PDF Datamonitor Turkey PESTLE Analysis Websites https://www.cia.gov/library/publications/the-world-factbook/geos/tu.html http://www.datamonitor.com/store/Product/turkey?productid=074DD3A8-BC2C-40A9-9672-3793A75DEBA0

Cognitive psychology

Cognitive psychology Information processing systems in the brain are studied under Cognitive psychology (Sternberg, 2008). Cognitive psychology is a broad range of study, which includes the study of internal mental conditions, thinking, and language, solving problems, processing information, artificial intelligence, development of infants, feelings and how the mind performs these functions.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Development of Cognitive psychology has provided many significant points in research and has turned out to be a most important discipline in psychology that looks inside the mental processes, for example, solving problems, language, and memory, the study of how an individual thinks, perceives, remembers, learns, and then behaves. In the later part of the 19th century several psychologists became increasingly interested in the field of cognition. Considering theories of earlier behaviorists, for example Jean Piaget in the early part of the 19th century with his attention on the thoughts of children, B.F. Skinner in the mid-19th century with his operant conditioning, or Noam Chomsky who challenged B.F. Skinners idea some years later. After many doubts and uncertainties of the ability of the research attained from the behaviorists, currently what is known as cognitive psychology replaced these theories. Therefore, the interest with the study of cognition starts to increase and cognition turns out to be an enormous concept in psychology, which has been known as the cognitive revolution, and then became to be known as cognitive psychology. A significant point in the advancement of cognitive psychology begins with a psychologist named Wilhelm Wundt, who was the first individual to identify the subject of psychology, in the last part of the 18th century (Taylor, 2005). Wundt thought that psychology dealt with the examination of experience (structuralism), which he described in a table of the brain that was similar to the periodic table. Another psychologist, whos name was William James, challenged Wundts findings. The research that James conducted, allowed James to recognize that, Mental processes must have a purpose; they must be for something (Willingham, 2007, p. 15). In other words, the experience of an individual was not what was important but the meaning of the experience to the individual (functionalism). Additionally, William James took part in the James-Lange Theory. This theory indicates that an individuals emotion that is experienced is based upon the decided action in which the individual engaged in. After st ructuralism (Wundt) and functionalism (James), a theorist emerged to challenge the theories of James and Wundt, this theorist was named John Watson. Watsons theory is known as behaviorism and was based upon his own beliefs. After Wundts structuralism and James functionalism, a theorist named John Watson emerged and challenged both Wundts and James theories by his own beliefs, which is known as behaviorism. Behaviorism can be described as what an individual is doing or is observed to be doing by another individual. Watsons theory indicated, first study the individuals behavior and make an assumption, then determine the basic relations between the stimuli and the response. Watson believed that a stimuli and a response can be interchangeable. After Watsons theories of behaviorism, the decline of behaviorism began and another theory was started to study the mind, this other theory compared the mind to a computer. This theory turned into the bond connecting behaviorism and cognitive psychology. As technology advanced, this comparison of the mind to a computer allowed psychologists to understand more of the internal human, which became a major part in how theorists studied human thought processes and behaviors. Behavioral observation of psychologists transformed curiosity of the mental process was brought about by the development of the computer (Rosenzweig, Breedlove, Watson, 2005). This development offered a fascinating image of the human mind, which associated the computer to the brain. The computer codes used, offered a step-by-step model of how information obtained from the environment each day is recorded, stored, and recovered to provide a response. The formation of computer comparison gave psychologists the idea to begin a plan for information processing models of the human thought process and behavior. The goal of a cognitive psychologist is to understand the action of humans performing intellectual tasks and to form assumptions of the summary of the methods motivating the behavior. Cognitive psychologists offer theories about what is occurring inside an individuals mind on the basis of that individuals external behaviors. Without a doubt, there is no way to recognize for sure what is happening inside the brain of a human being. What is important is that the theory be accurate in determining an individuals action in a challenging situation. Cognitive Psychology is an extensive subject that deals with the different functions taking place inside the mind of an individual. Through the growth of this subject, psychologists are at this time able to understand humans behaviors and thought processes. Reference Rosenzweig, M.R., Breedlove, S.M., Watson, N.V. (2005). Biological Psychology: An Introduction to Behavioral and Cognitive Neuroscience (4th ed.). Sunderland, MA: Sinauer Associates, Inc. Sternberg, J. R. (2008). Cognitive Psychology (5th ed.). Belmont, CA: Wadsworth, Cengage Publishing. Taylor, L. (2005). Introducing Cognitive Development. New York, NY: Psychology Press Inc. Willingham, D.T. (2007). Cognition, The Thinking Animal (3rd ed.). Upper Saddle River, NJ: Pearson Prentice Hall.

Saturday, July 20, 2019

Shakespeares Rosalind Essay -- English Literature Essays

Shakespeare's Rosalind The main themes of "As You Like It" are the pastoral ideal and the ideal of romantic love. Forest of Aden is the primary setting where these themes develop. Nature serves as a refuge from society where we can find solutions to injustice and unhappiness. This play is a comedy and thus has a happy ending but it is not a fairy tail. Shakespeare highlights the difference between reality and illusion. Rosalind embodies the sensibility, the humor and the kind of love that leads to a happy, harmonious living. She brings the plot to a resolution when four contrasting romances end in marriage. The focus of the play is her romance with Orlando. Rosalind wants to find a lover without losing her sense of self in the process. Rosalind answers the questions about love, which arise during the play. She is a lovesick maiden and yet she remains an intelligent, witty, and strong character. Rosalind is also a good judge of character. She sees through Jaque's seemingly deep thoughts and recognizes the wisdom of clown Touchstone. Furthermore, she cleverly uses her disguise to get to know Orlando and educate him about love. The meeting of Orlando and Rosalind is the most important event in Act 1 of the play; it is love at first sight. Celia and her cousin talk about falling in love just before the wrestling match. From henceforth I will, coz, and devise sports. Let me see, what think you of falling in love? Her words indicate that Rosalind is ready to face the danger of falling in love. She infers that her father would approve of Orlando because her father approved of his father Sir Rowland. Their meeting reveals a vulnerable side of the Rosalind as she gives him a chain, says, "Gentleman, wear this for me" and waits for him to continue the conversation. In Act Shakespeare draws parallels between Rosalind's relationship with Celia and Orlando's relationship with Adam. When Duke Fredrick banishes his niece from the court, Celia makes a quick decision to go to the Forest of Aden with her cousin and to look for her uncle. This illustrates the degree if love and loyalty between them. Orlando's elder brother Oliver denies him education. When Orlando is leaving for the forest Adam wants to go with him to serve and protect him. Master, go on, and I will follow thee To the last gasp with truth and loyalty†¦ Yet fortune cannot recompens... ...er than thou art ware of." Touchstone tells her a story about being in love with a girl. He gave the girl something and said "wear these for my sake", which are almost the same words that Rosalind said to Orlando in the beginning of the play. The love between Orlando and Rosalind is portrayed as superior to other romances, which are more earthy. Touchstone and Audrey's romance represents physical passion. He wants to marry her out of church so that the marriage would be invalid. Silvius who is hopelessly in love with Pheobe, represents pastoral love The diversity of characters' romantic sentiment creates a balance in the play and makes one appreciate their silliness, spirituality and extremities. Compared to Silvius' silly infatuation, Orlando's is more of a courtly lovesickness. Rosalind outshines everyone else in the play with her intelligence, wit and depth of feeling. Her humanity and sense of fun make her the ideal romantic heroine. She seems to be centuries ahead of her time. She is a woman who is absolutely the master of her own destiny and she remains in control most of the time. Shakespeare has created an almost ideal heroine who brings the play to its conclusion.

Friday, July 19, 2019

Of Mice And Men :: essays research papers

OF MICE AND MEN Should George have shot his friend Lennie? George probably did the right thing by shooting Lennie. How can we condemn George for sparing his friend Lennie the pain and fear of being killed by someone else? He did something society sees as wrong, but he did it for a good reason. Lennie didn’t deserve to die, but there was no other alternative. Curley wanted to kill Lennie, and since George cared for Lennie, he figured the best thing would be for him to put Lennie out of his misery.   Ã‚  Ã‚  Ã‚  Ã‚  Lennie deserved to be punished for what he did, but not to be killed. Lennie was a handicapped person with below average intelligence. He didn’t really understand what he had done, but he didn’t really fit into society either.   Ã‚  Ã‚  Ã‚  Ã‚  Curley and the others were looking for Lennie and wanted to exterminate him; they were angry and hated Lennie. If Curley would have found Lennie, he would have shot him. But that way, Lennie would have died afraid and sad. His death would have been very violent. George knew this and that’s why he did what he did. George also knew that Lennie had dug a hole for himself and could never get out. He knew they were looking for Lennie and wouldn’t stop until they killed him. He decided to do it himself in the kindest way he could. It’s like when Candy said about his dog, “I should of shot that dog myself.'; meaning it would have been kinder to the dog. Lennie was lying down, facing away from George and didn’t know he was going to be shot. He didn’t know what was going to happen, just like Candy’s dog.   Ã‚  Ã‚  Ã‚  Ã‚  Murder is never the right answer, but George didn’t really commit murder.

Thursday, July 18, 2019

America in World War Two Essay -- WWII World War 2 Essays

Leading into the American involvement in World War II, American ideas were harsh. The United States turned to isolationism instead of involvement. Most Americans opposed taking a role in the war. Many even opposed any aid to help those countries who were in war. The diplomacy of isolationism quickly changed after the Japanese attack on Pearl Harbor in 1941. America suddenly was thrown into the warfront. During World War II many ways and ideas of the American culture changed once again. Now, most Americans supported the war. Technology was advanced immensely, thus creating weapons of mass destruction. Even stifle American women were now getting jobs that were once held only by men. The events leading up to and the actual American involvement in the war has changed America into what it is today. Roosevelt was elected for a third term in 1940. At his State of the Union address, he made it clear that Americans needed to shift away from isolationism. He stressed that America should help those who were in struggle to keep their rights. He expanded on several ideas, such as, equality, jobs and security. He also touched on such subjects like the social economy. Roosevelt also made sure to hit hard on the fact that it is in Americans freedoms to be from fear. With this idea, he tried to have people come to the realization that Great Britain needed out help, and that as Americans, we would only be contributing to those human rights by helping them keep their freedom. With Great Britain fighting the war alone, Americans slowly changed their minds to supporting them. Those who still opposed any intervention in the war fo... ...bing. She also talks about how there were many like her that were burned by the bomb. The entire city was burning, not only those who were hit directly by the bomb. America in the Second World War was very different. The direct isolationism that the American government first played was quickly switched to war intervention with the bombing of Pearl Harbor. Gender and social roles were also affected by this war. Women and blacks were now able to work in jobs that were once reserved only for white men. The harsh environment that we forced upon our own citizens was nothing of the environments that those Japanese Americans had to live through. America in World War II was a very different kind of place. Our ideas and ways changed with a simple bombing. War is very delicate and it proved to be that way to the United States.

One Way Is to Make English Language a Compulsory Subject Essay

One way is to make English language a compulsory subject. In my school just as Mathematics, Science and other social subjects are taught English should also be introduced as proper course. All students from their very early education will be introduced to English. All students would be required to pass the English course before they can be promoted to the next grade. For example a grade one who is not able to pass grade one English course will not be promoted to grade 2. Similarly grade two student will not be promoted to grade three until he has passed the English course. The level of complexity and difficulty of English would be increased slowly and gradually each year so that when a student finishes his primary education he is able to read, write, and understand the Basic English. Communication and skills or could be improved by encouraging students to speak in English when in school rather than native language. The second way would be to teach all the subjects in English from the beginning instead of the local language. In Thailand currently all the subjects we mostly taught in the local language so that the students can grasp the ideas more quickly and easily. As a results the students became used to study everything in local language rather than English. If all the subjects are taught in English the students will learn the language more quickly and they will also be comfortable in using in the language later in their educational life when they study more advanced subjects in English. In short all schools should be made strictly English medium. From the two suggestions that I have made I think the second one will be more effective and feasible. I say that because if all the subjects we taught in English then it would be easy for students to adapt the language. If on the others hand there is only one cause of English language and the rest of the subjects we taught in local language then the students will not concentrate on the English language enough. Students might try to just pass the English course and focus more on the others subject since they might find the other course easier to understand. An example to support my argument could be comparison of the students of India and China. From my research I have found out that students in India are taught all the subjects during their primary education in English. As a result the students do not consider English as a foreign language but rather consider English as an integral and core part of their early education. The result is that Indian students are able to understand and communicate more efficiently compared to students of other nationalities. Chines on the other hand are taught all their course in local language. So although they have sharp minds and critically they have a hand time communicating all their ideas in English language. Conclusion In conclusion, if we are use English language in all subjects and always taught in English that students will have concentrate to study because if they not concentrate then will difficult to learning. When students can use English well they can learn the language more quickly. In Thailand should to pass the English course before then they can be promote to the next grade. If they can’t pass English course then they can continue study again until they have passed the English course. I think, this way is possible for my school.

Wednesday, July 17, 2019

Battery Rule

In e really complaisant gatherings and institution, ethics and moral regarding ones thoughts, actions and verbal expression should constantly as trusteded to avoid any morally and physically damaging results from an out or keeping(p) engagement of certain souls. For social institutions and gatherings involving rootageity saying, every individual especially those with superior authority moldiness cautiously observe the give tongue to estimable principle.Take for example the case that occurred in the Betts Lincoln-Mercury principal Company involving the physical damage incurred by an employee resulting from the unconnected horse acting of the chairperson during an stake party. The sequel of the event at the office party lead to the good pursuit of Caudle, the employee, suing the chairman of the company for his inappropriate action plumping to serious vile damages to the former.However, the president countered by grammatical construction that the action was part of the horseplay of the entire convention during the party and that he had not mean to hurt anyone specifically the complainant. In the aspect of ruling for this case, one moldiness really and critically consider the event scenario and the honourable aspect of it. It is not clearly indicated in the case whether Caudle is involve in the collective term of the group that participated in the horseplay during the office party thus this author leave consider him to be excluded.Because of which, this author argues that the plaintiff did not participate from the horse playing thus it is very much inappropriate for the president who is involved to play the said trick on him. Another instruction is that, it is a known fact that the electric auto condenser that is involved in the incident posts a risk of impingement for anyone who holds it.Because of which, playing with the said item on a very vital nous-in-the-clouds spot mainly the back of the head right below the temporal of the ment ality and posterior of the spinal cord is very much inappropriate since it can lead to serious nervous damages. Because of the said arguments and reasons, this author strongly rules with the side of plaintiff wherein president Betts thus committed an action that led to serious nervous damages though without any grave intentions. His must indeed be responsible for his actions and thus must compensate the victims for the reported damages and complications.