Monday, December 30, 2019

Should Marijuana Be Legalized Essays - 1254 Words

Legalizing Marijuana has been a common subject for debate in the United States. As the debate continues on in the political system, marijuana has become the most popular illegal drug in the United States. There are many arguments for and against the legalization of marijuana ranging from the effects on the mind and body to the economic possibilities after legalization. Both sides embrace strong facts and stronger support, but much of these facts consist of similar research with contradicting results. The side that tends to have the most and the strongest support in the most prominent arguments, economics, health, and criminal association, is the group for legalizing marijuana. Drug dealers and cartels finance their operations and†¦show more content†¦Therefore if marijuana was legalized, cigarette sales would decrease causing the tobacco companies to lose money. If the companies lose business and money then they will lay off workers because they won’t have the ne cessary profits to keep all of the hired employees. Even though many people do smoke cigarettes because they cannot smoke marijuana, many of the same people would still smoke cigarettes do to the addictive quality of nicotine. Then there are the other smokers that smoke cigarettes and not marijuana just to satisfy the oral fixation of smoking. Therefore there would be only minimal losses to the profits of tobacco companies, not enough to cause them to lay off any of their employees. Legalizing marijuana would also save an estimated $7.7 billion dollars per year in prohibition enforcement from state and federal expenditures, this includes the high expense of housing marijuana offenders and the high number of offenders incarcerated each year. (Time to Legalize Marijuana?) Economics would seem to support the position that legalizing marijuana would be a positive action to take as it would increase revenue and decrease state and federal expenditures. Marijuana is not considered to be a healthy substance, especially if used in excess; many argue that it is a safer drug than any other illegal drugShow MoreRelatedShould Marijuana Be Legalized?849 Words   |  4 Pageswhether marijuana should be legalized. Around 23 states have legalized marijuana for medical and recreational use. In the state of Illinois, medicinal use of marijuana has been passed on April 17, 2013. Since January 2014, patients are able to obtain marijuana with a doctor s recommendation. The new debate is whether marijuana should be legalized for the general public as a recreational drug. Although some believe that marijuana is harmless, and that it has beneficial medicinal uses, marijuana shouldRead MoreShould Marijuana Be Legalized?1715 Words   |  7 PagesMarijuana in Society Cannabis, formally known as marijuana is a drug obtained from the tops, stems and leaves of the hemp plant cannabis. The drug is one of the most commonly used drugs in the world. Only substances like caffeine, nicotine and alcohol are used more (â€Å"Marijuana† 1). In the U. S. where some use it to feel â€Å"high† or get an escape from reality. The drug is referred to in many ways; weed, grass, pot, and or reefer are some common names used to describe the drug (â€Å"Marijuana† 1). Like mostRead MoreShould Marijuana Be Legalized?1489 Words   |  6 Pagescannabis plant or marijuana is intended for use of a psychoactive drug or medicine. It is used for recreational or medical uses. In some religions, marijuana is predominantly used for spiritual purposes. Cannabis is indigenous to central and south Asia. Cannabis has been scientifically proven that you can not die from smoking marijuana. Marijuana should be legalized to help people with medical benefits, econo mic benefits, and criminal benefits. In eight states, marijuana was legalized for recreationalRead MoreShould Marijuana Be Legalized?1245 Words   |  5 PagesMarijuana is a highly debatable topic that is rapidly gaining attention in society today.   Legalizing marijuana can benefit the economy of this nation through the creation of jobs, increased tax revenue, and a decrease in taxpayer money spent on law enforcement.   Ã‚  Many people would outlaw alcohol, cigarettes, fast food, gambling, and tanning beds because of the harmful effects they have on members of a society, but this is the United States of America; the land of the free and we should give peopleRead MoreShould Marijuana Be Legalized?1010 Words   |  5 PagesThe legalization of marijuana became a heated political subject in the last few years. Twenty-one states in America have legalized medical marijuana. Colorado and Washington are the only states where marijuana can be purchased recreationally. Marijuana is the high THC level part of the cannabis plant, which gives users the â€Å"high† feeling. There is ample evidence that supports the argument that marijuana is beneficial. The government should legalize marijuana recreationally for three main reasonsRead MoreShould Marijuana Be Legalized?1350 Words   |  6 Pagespolitics in the past decade would have to be the legalization of marijuana. The sale and production of marijuana have been legalized for medicinal uses in over twenty states and has been legalized for recreational uses in seven states. Despite the ongoing support for marijuana, it has yet to be fully legalized in the federal level due to cultural bias against â€Å"pot† smoking and the focus over its negative effects. However, legalizing marijuana has been proven to decrease the rate of incrimination in AmericaRead MoreShould Marijuana Be Legalized?1231 Words   |  5 Pagesshows the positive benefits of marijuana, it remains illegal under federal law. In recent years, numerous states have defied federal law and legalized marijuana for both recreational and medicinal use. Arizona has legalized marijuana for medical use, but it still remains illegal to use recreationally. This is absurd, as the evidence gathered over the last few decades strongly supports the notion that it is safer than alcohol, a widely available substance. Marijuana being listed as a Schedule I drugRead MoreShould Marijuana Be Legalized? Essay1457 Words   |  6 PagesSHOULD MARIJUANA BE LEGALIZED? Marijuana is a drug that has sparked much controversy over the past decade as to whether or not it should be legalized. People once thought of marijuana as a bad, mind-altering drug which changes a person’s personality which can lead to crime and violence through selling and buying it. In the past, the majority of citizens believed that marijuana is a harmful drug that should be kept off the market and out of the hands of the public. However, a recent study conductedRead MoreShould Marijuana Be Legalized?1596 Words   |  7 Pages But what needs to be known before a user can safely and completely make the decision if trying Marijuana is a good idea? Many do not want the drug to be legalized because they claim that Cannabis is a â€Å"gateway drug†, meaning it will cause people to try harder drugs once their body builds up a resistance to Marijuana, because a stronger drug will be needed to reach a high state. This argument is often falsely related to the medical si de of the debate over legalization. It is claimed that this wouldRead MoreShould Marijuana Be Legalized?985 Words   |  4 PagesLegalize Marijuana Despite what people believe about marijuana, it hasn’t once proved to be the cause of any real issue. It makes you wonder what the reason as to why there is a war on drugs. Why is marijuana the main concern? Since the time that alcohol and tobacco became legal, people wonder why marijuana isn’t legal yet. The fact that marijuana is illegal is mainly caused by the amount of money, jobs, and pride invested in the drug war. Once the government starts anything, they stick to it. At

Saturday, December 21, 2019

The Principle Of Act Utilitarianism - 3018 Words

Principle 1: Act Utilitarianism ‘Act Utilitarianism looks to single actions and bases the moral judgment on the amount of pleasure and the amount of pain this single action causes’ (Crane and Matten, 2010, p. 104). The Resolution/Argument Using the table above to analyse the consequences of Ben-Artzi’s decision to blow the whistle under the principle of Act utilitarianism, we argue that his decision was morally wrong. Our rationale is that the decision Ben-Artzi took inflicted more pain than gain to a greater amount of people. From the table, we can see that only the SEC, Ben-Artzi and some investors benefited directly from his decision. Ben was relieved of his troubled conscience and his story gained considerable media coverage. His decision to capitalise on the level of attention the story received by writing a book on his experience also served him positively. Analysis: Balance of benefits and losses Ben-Artzi capitalises on enhanced regulatory provisions empowering the United States’ Security and Exchange Commission (SEC) to encourage and motivate corporate whistleblowing in order to check incidences of corporate malpractice of the financial kind in the United States. His decision helps provide deeper insight into the nature of financial malpractices Wall Street banks and other financial institutions engaged in in the build up to the financial crisis of 2008. From the insight gained, the dimensions of regulatory oversight over the financial system are enhanced, bothShow MoreRelatedAct Utilitarianism Versus Kant s Principle Of Ends Essay1199 Words   |  5 PagesAct Utilitarianism versus Kant’s Principle of Ends. Introduction There are many theories out there when it comes to any kind of ethics. I will be discussing Act Utilitarianism and Kant’s Principle of Ends. Both are good theories, but they do have their differences. I think that how we perceive either of these depends on how we were brought up by our families and what we believe in when it comes down to making decisions. While both are similar theories they are also different in their own wayRead MoreCan Utilitarianism Be Defended Against The Injustice Objection?1361 Words   |  6 PagesCan Utilitarianism be defended against the Injustice Objection?    In this essay, I will argue that utilitarianism cannot be defended against the injustice objection. Utilitarians may be able to reply to the injustice objection in some cases by invoking one of two replies, the ‘Long term consequences’ reply, in which utilitarians will avoid unjust actions that increase short-term utility because in the long-term they will not lead to the greatest good. The other reply that may help utilitarianism avoidRead MoreRelationship Between The Principle Of Utility And Moral Rules1462 Words   |  6 PagesEvaluate Mill’s understanding of the relationship between the principle of utility and moral rules. In this essay I will argue that Mill thinks that there is a strong relationship between the two concepts, although he regards moral rules as having a subordinate relationship towards the principle of utility. Mill is a rule utilitarian who believes moral rules are useful guidelines for everyday uses, but reverts to the principle of utility in complex moral situations. In this essay I will also argueRead MoreMill s Utilitarianism : Utilitarianism1251 Words   |  6 PagesMill’s Utilitarianism For centuries philosophers have attempted to explain morals, creating ideas that break this ethical system down into basic components. English philosopher, John Stuart Mill, was a large contributor to the idea of utilitarianism. Although Mill’s utilitarianism provides a strong argument for explaining morality, it is not a bulletproof theory. J.S. Mill’s Principle of utility, also known as the greatest happiness principle, is an ethical philosophy that looks at the developmentRead MoreDifference Between Utilitarianism And Nietzsche934 Words   |  4 PagesPhilosophy Utilitarianism  and Nietzsche Utilitarianism is the actions that things are right by what makes others the happiest. Utilitarianism and Nietzsche theories are very important to know because they show us ways that our society conducts in. Knowing these theories can help us understand or even question the way we believe. The theory is Utilitarianism is an ethical theory of right and wrong and it solely relies on outcomes. Some criticisms of act-utilitarianism are slavery and the act that itRead More Jeremy Bentham : Father of Utilitarianism Essay1444 Words   |  6 Pages Assess the merits of Utilitarianism (24 Marks) Utilitarianism is a theory aimed at defining one simple basis that can be applied when making any ethical decision. It is based on a human’s natural instinct to seek pleasure and avoid pain. Jeremy Bentham is widely regarded as the father of utilitarianism. He was born in 1748 into a family of lawyers and was himself, training to join the profession. During this process however, he became disillusioned by the state British law was in and set outRead MoreUtilitarianism Can Not Be Defended Against The Injustice Objection1162 Words   |  5 Pagesessay, I will argue that utilitarianism cannot be defended against the injustice objection. Utilitarians may be able to reply to the injustice objection in some cases by invoking one of two replies, the ‘Long term consequences’ reply, in which utilitarians will avoid unjust actions that increase short-term utility because in the long-term they will not lead to the greatest good. The other reply that may help utilitarianism avoid injustice in some cases is the ‘Secondary principles’ reply, where some rule-basedRead MoreKants Moral Theory and Utilitarism Comparison Essay1166 Words   |  5 PagesKantâ€⠄¢s moral theory and utilitarianism are two very different moral theories. Kant’s moral theory works off of the categorical imperative. Utilitarianism works off of the greatest happiness principle. Morality and right action are very different within these two theories, and the idea of slavery is a good example of the differences. Utilitarianism can allow slavery, whereas Kant’s moral theory cannot allow slavery. Kant’s moral theory uses the categorical imperative as its basis. The categoricalRead MoreEssay on Utilitarianism1264 Words   |  6 PagesUtilitarianism There are many essays, papers and books written on the concept of right and wrong. Philosophers have theorized about moral actions for eons, one such philosopher is John Stuart Mill. In his book Utilitarianism he tries to improve on the theories of utilitarianism from previous philosophers, as he is a strong believer himself in the theory. In Mills book he presents the ideology that there is another branch on the utilitarian tree. This branch being called rule-utilitarianismRead MoreUtilitarianism : Utilitarianism And Rule Utilitarianism871 Words   |  4 PagesUtilitarianism, which is also called consequentialism, is a theory in normative ethics. It is one of the best known and most influential moral theories. The main idea of utilitarianism is to determine whether actions are morally good or bad, right or wrong depends on their consequences rather than intentions. (Moreland 1) In order to understand utilitarianism, it is important to learn about Jeremy Bentham, who is the influen tial philosopher represented utilitarianism the best. The utilitarianism

Friday, December 13, 2019

Marketing Essay †FedEx Corporation Free Essays

Fed acquired Kink in 2004 for $2. 4 billion, ‘expand[inning] its presence among small and midsized businesses that have long been Kink’s main customer base’. Fed Chairman stated â€Å"it [was] supremely logical for [them] to offer arrives to the whitewall’s and office segment that are analogous to what [they] offer [their] corporate customer base† (Deutsche, 2003). We will write a custom essay sample on Marketing Essay – FedEx Corporation or any similar topic only for you Order Now Fed has a more defined white-collar customer base, mainly consisting of â€Å"fast-cycle logistics shippers seeking time-definite morning deliveries† (Richer, 2009). Their services will meet demands for time-definite morning deliveries to wholesalers,’ (ibid. ) manufacturing businesses, retail stores, and high-value goods. 10 Recommendations Although Fed has been successful in moving into the international arena, it still does not have a competitive advantage in the shipping industry. Its chief competitor, UPS, controls the ground shipping market (see Appendix A), guaranteeing them a large portion of the domestic market share. Fed should maintain a controlling stake in the express delivery market while increasing their market share in domestic ground delivery, by further differentiating itself from UPS through innovation and service offerings. Securing more business partnerships, even at slightly lower margins, will help develop brand loyalty. This is especially true of long-term contracts with large firms. Studies predict the international package market will grow by 5-6% in the coming ears, nearly double the expected annual growth in world GAP (Waistlines, 2014). Fed should continuously invest capital in Asia, whilst penetrating into foreign markets by partnering with local carriers. This will give them valuable insight into a relatively foreign and unknown market. Acquiring smaller shipping companies, such as Excel (I-J) or Suppose (France) also increases their international reach. Fed could seek alternative energy sources to reduce their operating costs. Investing in solar power or bio-fuels could help counter additional costs due to increased fuel prices. Fed should utilize economic aircrafts to increase their carrying capacity, thereby reducing the number of operating planes. Lastly, by forging strategic alliances with oil and gas suppliers, they could bargain for discounts, whilst curtailing the negative effects associated with volatile oil supplies. Looking forward, Fed has positioned itself for growth opportunities in the domestic and international arena. It has exhibited an exceptional track record of international expansion and good financial restraints during times of easy credit, proving it can operate successfully even in a tough economic climate. How to cite Marketing Essay – FedEx Corporation, Essays

Thursday, December 5, 2019

The Problem And Its Background free essay sample

Chapter 1 THE PROBLEM AND ITS BACKGROUND Introduction The mission of the academic library is to contribute to the goals of the college or university of which it is a part to the wider scholarly community. These goals pertain to teaching, learning, research and public service in some combination. The enduring traditional and widely accepted function of the academic library is to provide bibliographical and physical access to books and the information sources required to support the diverse missions of our various academic and research institution. The primary characteristics of a good library are its identification with the institution. The measure of excellence is the extent to which its resources, services and facilities support the institutions mission and objectives. The library in the tertiary level institution is designed as: (1) a teaching component; (2) a stimulus to independent intellectual development; and (3) as essential resource to well-rounded liberal education. The library shall be regarded as a vital academic resource of the institution and as such its organizational structure. Academic libraries, whether private or public, have been considered as essential part of advanced learning. Its fundamental role is educational. It should not be operated on as a mere storehouse of books attached to a reading room, but as a dynamic instrument of education. It plays a very vital role in the life of a nation. It feeds the intellect of students, faculty, researchers, scholars, and casual readers and also those who enter its place to partake fully its intellectual and cultural fare. In line with goals of the institution the academic library is an important intellectual resource of the academic community, needs of its patrons or readers by providing as adequate, well-selected and well-organized collection supporting its courses and programs offered and adequate facilities. Background of the Study(profile of the company, location, history) Statement of the problem 1. What are the common problems encountered with the existing manual system of the library. 2. What are the possible solutions to the problems encountered with the current system? 3. What is the difference between the manual system and the proposed system? 4. What are the levels of the proposed system in terms of: a. Functionality b. Usability c. Reliability d. Maintainability e. Efficiency f. Portability The students encountered slow processing of transaction in borrowing, every library users who goes inside the library needs to show the library card and sign in to a log book for verification. The users of the library must need to show their library card, log in to the log book, searching of the need book, go to the librarian to confirm his/her library card, inform for the said book to be borrowed and fill up the book card then the borrower might submit his/her library card together with the book card. Besides, it’s not the only work or job of the librarian, so by the manual procedure it may take so much time to finish all the task of the librarian. So meaning, there’s an instance that the librarian cannot control the number of the users. And sometimes, there are students of Saint Rita College telling them that his/her library card was lost, together with the people who want to borrow or return books, some library users that needed to get their overdue slip that causes blockage in the library. In the end of the day the librarian must have an overtime to work, to generate her report and double check all the transactions to be done. Another is the librarian encountered difficulty in monitoring and tracking of records, librarians cannot easily determined the status of the book whether it is available or not. There is no log form stating that the book was already returned. Additional to that, Inventory of books are not being done correctly in manual operation and some of the books have the same accession number resulting to recounting of books manually in the book shelves. Records of Discharged books are not tracked sometimes, librarian still looks for it on the shelves not knowing that it already in the binding section for repair or it is already weep-out. Also is the slow generation of reports. The chief librarian will compile all the reports given to her monthly and will start to generate the whole annual report. Once the monthly reports are not being done and passed on time to the chief librarian, the results of the annual report will not be accurate due to incompleteness. If the monthly reports are late, the generation of the annual report will also be late. Overdue reports are posted in the bulletin board to inform the borrowers including students and faculty members about their liabilities. However, there are some borrowers like students were able to get clearance and honourable dismissal without paying the overdue fine due to slow generation of monthly report. Additional to that, some faculty members that are already resigned were not also able to settle their overdue fine. All of the books which are not replaced will be paid and shouldered by the librarians. Lastly, the Cataloguing System is not dependable. The library user, instead using the cataloguing system, just look and search manually on the books located on the shelves or ask for the assistance of librarian and write it on the call slip, for a reason that there is no cataloguing system. Objectives of the Study General Objective The aim of the study is to create an â€Å"Automated Library System for Saint Rita College with Bar Coding† that will enable a better flow of transactions. The system may be more functional and user-friendly to the users of the library and may provide accurate services. Specific Objectives 1. To create a cataloguing module that will help to have a faster and accurate searching of books in the library. 2. To create an acquisition module that will enable to edit and update the database of system. 3. To have a more accurate and faster generation of reports. 4. To create a bar coded module and printable receipts for faster transactions. 5. To improve the current assessment system and to deal into more efficient way. 6. To create system that will have adequate records of borrowed and returned books. Significance of the Study Accuracy, efficiency and effectiveness are necessary for a modern institution. Automation of the system would improve the workflow of any organization. Occurrences of errors caused by the manual operation would be minimal with the automated system. Aspects such as this are given more attention due to the importance of modernization and organization of files. The developed study’s implementation would benefit the following: Academic Institutions – This will serve as an evidence of continuous development of the whole institution and edge to other institutions. This study will help the institution to achieve its main vision in global competitiveness. Library Administration – It will help in a more systematic and faster transaction and generation assignment to their employee that will lessen their workload because of its features. Students – It will help them to request books, and borrow books conveniently. It will also help them to be informed of whether the books are available or not in a faster manner. Scope and Limitation The study is designed for managing various activities of â€Å"Saint Rita College Library†. Since library has a very large number of books and a large number of members, it is impossible for librarian to manage day to day activities. It covers the problem experienced by librarians and the library user on their system. In this study, the researchers would design an automated library system that would help in the improvement of the flow of transactions in the library. Moreover, through this study, their system would be more efficient and more convenient, more reliable, more accurate for the librarians and its user. This study is limited only with the problems with flow of transaction in the library like registration of students, searching in OPAC, circulation, cataloguing, acquisition, bar coded module and generating of receipts and reports. It is not responsible to provide solutions that deal with physical appearances of the library. The student will access only the borrowing and searching part of system, while the librarian can access only the circulation of the system and the chief librarian and technical librarian who can access the whole system.

Thursday, November 28, 2019

William Davis Essays (1473 words) - Fiction, Literature,

William Davis Professor Caroline Champman English 121 6 September 2015 Twelve Angry Men In the "Twelve Angry Men" (directed by Sidney Lumet and produced by Henry Fonda), you will see that to obtain justice you must make a choice. This story takes place in New York City where an eighteen year old boy is on trial for stabbing his father and killing him. The jury leaves it up to the twelve jurors to decide the fate of this boy. As soon as they start all of them immediately decide his guilty. Lucky enough there's one man who renders this boy not guilty because he thinks they should all take it seriously and spend some time thinking about the loads of evidence before them. Once juror 8 said that everyone became so annoyed, it all went out of control but soon enough they all sat down and discussed it. The jury foreman makes the jurors tell their side of the story as to why the boy should be guilty or not guilty. Everyone goes around and give their statements. Juror eight tells his side, although it still isn't enough. This then goes on for hours compelling them to change their answers. Evidence is brought into the room because juror eight recalled about the weapon the 18 year old boy stabbed with. The weapon was a switchblade, a switchblade the juror 8 has an identical copy of. Once that blade is shown the jurors freak out. They continue talking about the significance of the blade. In later events the jurors just want to quit talking and go home but juror eight decides that before they all go they should give a secret ballot saying guilty or not guilty and if it turns up that someone new says not guilty then they continue. Crazy as it is juror 9 is the one who continues this discussion because of all that's said by juror 8. Juror 3 gets very angry at the continuation. Juror 5's vote changes when juror 8 talks about an elderly man who hears the boy yell " I'm going to kill you", when the old man testified he said he couldn't hear clearly what was being said because of a passing train. So he changes his vote. Soon enough juror 11 questions whether the young man left the scene then come back in 3hours to clear off the fingerprints. Juror 11 joins juror's 8, 9, and, 5. The old man is brought up a gain because he made a second claim about the young man running to the door in fifteen seconds. Not enough evidence is really proven upon this fact so juror eight says it's impossible and juror 3 gets upset and says " I'll kill him", meaning he would kill the boy because he doesn't really cares if he dies at all. Juror 2 and 6 also decide not guilty. By doing that they are at a tie of 6-6. Suddenly juror 7 isn't happy because a rainstorm happens and those baseball tickets of his are out of use. Juror 4 argues that he doesn't believe the boy's alibi. The alibi was the on the night of the murder he went to a movie with his friends. Juror 4 doesn't believe the boy even remembers the movie. Juror 8 tells him that he must have been under emotional stress. Later Juror 8 asks juror 4 about what he remembers, which proves his point later. Juror 2 questions how a 5'7" person can stab down a 6'2" person. Juror's 3 and 8 experiment on it and find it's possible. Juror 5 shows up and tells them about his experience with switchblade knifes and shows them how the switchblade is properly used which makes a 5'7" person killing a 6'2" person possible. Juror 7 quickly decides to vote not guilty just because he wants this discussion to end but jurors 3 and 11 push him to really think about his decision so that it's not just on rational thinking. Juror 7 makes up his mind and votes not guilty. Two more jurors decide not guilty only leaving three people left. The two jurors were 12 and 1. Juror 10 gets fierce and tells his reasons. The rest

Sunday, November 24, 2019

The eNotes Blog Fifteen Tips for Writers from Ernest Hemingway, Anne Lamott, and StephenKing

Fifteen Tips for Writers from Ernest Hemingway, Anne Lamott, and StephenKing Of the many good things about being a writer The pay! The fame! The constant attention If you believe any of that, you are not a writer. But one of the GOOD things about writing, or really, any of the arts, is the sense of shared community. Writers want to tell other writers things that worked for them. There are, of course, hundreds of books of advice on writing. But there is one  thing I think all writers should remember. This advice actually came from a book on parenting, but I feel it is just as applicable to writing: Take the advice that makes sense to you and throw out all the rest. Here are the three writers I turn to most often when I want to remember why Wall Street isnt for me (aside from a complete inability to math): Ernest Hemingway 1.   If a writer of prose knows enough about what he is writing about he may omit things that he knows and the reader, if the writer is writing truly enough, will have a feeling of those things as strongly as though the writer had stated them. The dignity of movement of an iceberg is due to only one-eighth of it being above water.   Death in the Afternoon 2.   A serious writer is not to be confounded with a solemn writer. A serious writer may be a hawk or a buzzard or even a popinjay, but a solemn writer is always a bloody owl. 4.   I like to listen. I have learned a great deal from listening carefully. Most people never listen. 5.   The good parts of a book may be only something a writer is lucky enough to overhear or it may be the wreck of his whole damn life and one is as good as the other. Anne Lamott:  Bird by Bird: Some Instructions on Writing and Life 1.   Ã¢â‚¬Å"Perfectionism is the voice of the oppressor, the enemy of the people. It will keep you cramped and insane your whole life, and it is the main obstacle between you and a shitty first draft. I think perfectionism is based on the obsessive belief that if you run carefully enough, hitting each stepping-stone just right, you wont have to die. The truth is that you will die anyway and that a lot of people who arent even looking at their feet are going to do a whole lot better than you, and have a lot more fun while theyre doing it.† 2.   Ã¢â‚¬Å"I heard a preacher say recently that hope is a revolutionary patience; let me add that so is being a writer. Hope begins in the dark, the stubborn hope that if you just show up and try to do the right thing, the dawn will come. You wait and watch and work: you dont give up.† 3.   Ã¢â‚¬Å"Because this business of becoming conscious, of being a writer, is ultimately about asking yourself, How alive am I willing to be?† 4.   Ã¢â‚¬Å"Try to write in a directly emotional way, instead of being too subtle or oblique. Dont be afraid of your material or your past. Be afraid of wasting any more time obsessing about how you look and how people see you. Be afraid of not getting your writing done.† 5.   Ã¢â‚¬Å"I dont know where to start, one [writing student] will wail. /  Start with your childhood, I tell them. Plug your nose and jump in, and write down all your memories as truthfully as you can. Flannery O Connor said that anyone who has survived childhood has enough material to write for the rest of his or her life. Maybe your childhood was grim and horrible, but grim and horrible is okay if it is well done. Dont worry about doing it well yet, though. Just get it down.† Stephen King  On Writing 1.   Ã¢â‚¬Å"The road to hell is paved with adverbs.† 2.   Ã¢â‚¬Å"If you expect to succeed as a writer, rudeness should be the second-to-least of your concerns. The least of all should be polite society and what it expects. If you intend to write as truthfully as you can, your days as a member of polite society are numbered, anyway.† 3.   Ã¢â‚¬Å"Lets get one thing clear right now, shall we? There is no Idea Dump, no Story Central, no Island of the Buried Bestsellers; good story ideas seem to come quite literally from nowhere, sailing at you right out of the empty sky: two previously unrelated ideas come together and make something new under the sun. Your job isnt to find these ideas but to recognize them when they show up.† 4.   Ã¢â‚¬Å"I like to get ten pages a day, which amounts to 2,000 words. That’s 180,000 words over a three-month span, a goodish length for a book - something in which the reader can get happily lost, if the tale is done well and stays fresh.† 5.   Ã¢â‚¬Å"It starts with this: put your desk in the corner, and every time you sit down there to write, remind yourself why it isnt in the middle of the room. Life isnt a support system for art. Its the other way around.†

Thursday, November 21, 2019

Section 179 Essay Example | Topics and Well Written Essays - 250 words

Section 179 - Essay Example This is if the purchased equipment is depreciable over a certain period. It is an incentive sometimes used for some of the small enterprises to expand their businesses (Daily 45). This is with the purchasing of new equipment in the business. Limitations of Section 179 There is a higher tax bill that is acquired if the equipment purchased under section 179 is converted into personal use. If equipment is purchased under the method of section 179, it is highly likely that, during its depreciable life, it can be converted to personal use (Daily 48). However, it may prove costly to do so to the party that intends to do this conversion. Section 179 also dictates that a taxpayer’s deduction in a year cannot exceed or surpass their income from that active financial year. This means that they are not capable of, or cannot use more than what they may earn in their active conduct of business (Daily 51). All this is within the duration of a year. Moreover, under section 179, if one buys an asset, it is impossible for them to claim a deduction of more than what one paid for initially. This implies that purchasing an item using cash, the deduction on that item or asset is based only on the exact amount paid for the asset. In conclusion, section 179 is only suitable for the growth of businesses (Daily 58). It is not suitable, or advisable for purchasing equipment for personal use. Businesses can save a lot of money while using this method and can manage to grow and expand.

Wednesday, November 20, 2019

American Education Today Essay Example | Topics and Well Written Essays - 2000 words

American Education Today - Essay Example Society has no other institutions upon which it can rely in the matter. If schools and colleges do not emphasize rigorous intellectual training, there will be none. This is not true of the other services that educational agencies may incidentally render. It is well for the schools to pay attention to public health, for example, but if they are unable to do so, the health of the nation will not go uncared for. Puritan values and beliefs became a part of education system and pedagogy. The crucial doctrinal issues of the century concerned questions about human nature and God's grace. In what manner did God communicate redemption How might an individual transcend sin and find salvation How did God elevate a soul into union with Himself Protestants from the beginning rejected Catholic teaching concerning a "divine spark" that survived the Fall and remained unblemished by Original Sin. Following Stubblefield and Keane (1994) puritan philosophies reflected in education and brought religious values to curriculum. Freedom was indeed one pole of the Puritan axis, but order was the other. The new order was to be rooted in biblical authority and precedent. If any people ever were, Puritans were people of the Book. The new order they created, and the world view that undergirded it, was meticulously scriptural in nature. "Puritans rejected liturgical traditions, no matter how venerable, that had no di scernible basis in the Bible, replacing them with worship and devotional practices seen as more soundly scriptural" (Karier 1991, 34). At the same time, as we have seen, some devotional themes and methods with slight scriptural foundation were so strong that they were able to survive the transition from medieval Catholicism to New England Puritanism. New England's participation in this moral system is well known and persisted through the century even as the society itself changed. Education system introduced religious education and teaching as the main subject studied during the colonial era. Today, religion is still of vital importance for private and public schools. Puritan philosophy brought to education ideas of sin and guilt, honesty and patience (Karier 1991). Puritan emphasis on literacy, based on the Protestant insistence that individuals must be able to read their own Bibles, was a further iconoclastic and socially divisive element in Puritan devotion. Puritanism encouraged believers to read, meditate, and pray on their own. Meditation focused on personal experience, and prayers expressed personal hopes and concerns. Puritanism was not only a lay movement; like radical religious movements in Europe generally, it was also a women's movement. In their writing, Gordon and Gordon (2002) state that women formed the "front line in defense of their preachers" under persecution in England, and women emerged as leaders and "prophets" among radical groups throughout the Civil War. The first Latin grammar school was opened in 1635 for high social classes including clergy and state officials. The preliminary grammar or Latin curriculum also became compartmentalized, entrusted to specialist grammar teachers. The effect of this new specialization of education is well known at the university level: scholasticism became ever more preoccupied with the

Monday, November 18, 2019

Assignment 5 Example | Topics and Well Written Essays - 500 words - 1

5 - Assignment Example In the initial phase, there is a need for segregating all junk mails which arrive from different recipients. It is worth mentioning that the mail process would only reply to the issue letters. Thus, after segregating junk mails, it will be decided that whether the letters possess any issue or not. Issue letters are considered as those letters which advocate a position and most of them arrive from arranged campaigns. After identifying the issue letters, they would be scanned and processed for recognizing the issues which require strict attention from senator. Most of the issues which are described in those letters are from several agencies or on behalf of certain citizens. Thus, it is vital for the Senator’s office to scan and process them accordingly to recognize how the issues can be dealt with. A decision would be made regarding whether to respond to the identified issues or not in the letters. In some cases, letters do not contain any kind of return addresses, to which they can be mailed back to the respondents. Besides, at times, these issues also requests for special visits and favors. Thus, in such circumstances, a few of the issue letters would not be responded. In such letters, a position would be created in the computer database of Senator’s office. For the letters that would be decided to respond, they would be printed and then mailed to the respondents. Apart from flow chart, there are several other tools which can be used for improving the process of issue mail processing such as check sheet and cause and effect diagram. Check sheet is considered as an organized method of collecting and structuring information. The objective of check sheet is to collect the information in the most effective way and check them accordingly against prearranged groups of measurements (Soković, Jovanović, Krivokapić & Vujović 1-9). Cause and effect

Friday, November 15, 2019

Controller Area Network Sensors: Applications in Automobiles

Controller Area Network Sensors: Applications in Automobiles 1: Introduction In this paper an overview on the Controller area network sensors and their real world application in the automobiles is presented to the reader. The fact that controller area networks employ various sensors and actuators to monitor the overall performance of a car (K.H. Johansson et al, 2001[1]), this paper focuses only on the sensors and their role in supporting the CAN performance. 2: Laser Speed Velocimetry (LSV) sensor The application of this sensor is present in the Reanult range of vehicles where the company is incorporating the LSV as an on-board sensor to measure ground speed with better than 0.1km/h accuracy (LM Info, 2006[2]). The LSV technology is an approach to measure ground speed of a moving automobile with greater accuracy thus ensuring better on the road performance as argued by K.H. Johansson et al (2001). The purpose of the technology is to measure real-time speed of an automobile at accuracy level of 0.1km/h.The technology behind the LSV system comprises of the sensor that continuously records the interference with the motion surface that is fed back to the controller in the system that measures the speed of the car. The diagram in fig 1 below explains the aforementioned effectively. The above is the schematic representation of the mounting of the LSV 065 sensor head (Source: www.polytech.com). The above diagram further clarifies that the use of the LSV system not only provides an effective and accurate measurement of the speed but also proves that the use of this system can provide an effective control over the performance and over the velocity of an automobile. The LSV systems from Polytech, the schematic for which was presented in this section â€Å"combine a sensor head, a controller and software into a rugged industrial package that makes precision measurements from standstill to speeds of more than 7,200 m/min in either direction† (LM INFOR Special Issue, 2006). 2: Braking System sensors and Speed sensors The ABS system utilizes multiple sensors to prevent the wheels from locking whilst braking at high speeds. The main sensors used in this set-up are 2.1: Speed sensor The speed sensor is the sensor that is fitted to each wheel of the automobile. The purpose of the sensor is to identify the wheel slip whilst braking which is then fed back to the ABS controller unit to control. The speed sensor records the speed of the rotation of the wheel and when one or more of the wheels are recorded to be rotating at a considerably lower speed then the ABS control unit reduces the pressure on the pressure valves thus ensuring that the braking does not lock the wheel. The speed sensor equipment comprises of various models and can be mounted on different positions of an automobile in facilitating the measurement of the speed. The application of the speed sensor in the ABS is one of the many applications of speed measurement. The ECM method of measuring the speed using speed sensors is increasingly popular as part of the ABS technology. It is also argued as the later version of ABS that overcomes the fundamental sensor positioning related flaws in the ABS system. The ECM uses the Pulse Code Modulation technique to communicate with the sensor and the control system of the Controller Area Network of the automobile. From the figure above it is clear that the ECM plays a critical role as the controller to capture the sensor signals and transmit to the master controller area network Electronic Control Unit (ECU) for overall control of the automobile. It is also evident that the sensor plays a vital role in the speed measurement and efficient operation of the ABS braking system. The fundamental difference between the VSS and the WSS is that the VSS is part of the controller area network and is connected directly to the ECU of the network whilst the WSS feeds into the ABS controller unit that is connected to the CAN of the car or automobile under consideration. The VSS is also a successful and flexible method for motorbikes and other two-wheeled vehicles as the mounting is simpler compared to the WSS mounting for ABS system that is popular in a car. The cases of VSS mounted in transaxle and the transmission serve effectively for the purpose of velocity measurement and also provides near accurate readings for the efficient speed control by the driver of the car or the rider of the bike. In the case of the VSS mounted in the transmission, the sensor sends a 4 pulse signal at regular intervals to the combination meter that then sends the signal to the ECU of the CAN in the car. The signal so sent is recorded as the speed and shown to the driver as the velocity of the car. This approach is more accurate to the traditional analogue approach to the speed measurement and management. The above schematic makes it clear that although the mounting of the sensor on the transaxle provides an efficient method of measuring velocity, the response of the sensor can be damaged due to the mechanical wear and tear that is directly associated with the transaxle in a car. The VSS mounted in the transmission is perceived to have resolved the issue through the mounting of the sensor near the core rotor and using a magnetic field to hold the sensor in position. This approach agreed to the more effective compared to the former where the mechanical wear and tear was a critical drawback to the overall performance of the system. The schematic mounting of the VSS in the transmission is presented in the fig 4 below. The above mounting schematic in the figure further justifies that the positioning of the sensor by the rotor will help measure the speed effectively and more accurately 3: Differential Hall effect Sensors Daniel Dwyer (2007)[3] argues that the differential Hall effect sensors are not only capable of accurately measuring speed but also providing the safety measures through effectively controlling the speed. The hall effect sensors utilize the fundamental principle behind the Hall Effect which is described as follows â€Å"When a bias voltage is applied to the silicon plate via two current contacts, an electric field is created and a current is forced.† †¦ Daniel Dwyer (2007). This principle is utilized in the gear tooth profiling and speed measurement through the gear tooth sensing both in the linear and the differential cases. The differential case is argued as a more successful element especially in case of the automatic transmission automobiles because of the need to effectively control the speed associated with the car. Another interesting element with the differential Hall-effect sensors is the fact that the sensor positioning is robust in nature and its wear and tear is minimal. The differential element sensing that is the key for the differential Hall effect sensors utilizes the fundamental Hall effect. Alongside the sensor also â€Å"eliminates the undesired effects of the back-biased field through the process of subtraction.† (Daniel Dwyer (2007). The differential baseline field for the sensor is made close to zero gauss since each of the two Hall elements in on the IC (the sensor) approximately see the same back-biased field as argued by Daniel Dwyer (2007). A schematic representation of the differential element sensing is presented in fig 5 below. The major feature of the Differential Hall effect sensor is the production in the form of an integrated circuit that can respond to the magnetic field interference and differential effects due to the change in speed and the gear tooth positioning in the magnetic field. The differential element sensing and the speed measurement is accomplished through the overall peak holding of the Integrated Circuit (IC) in the field. Although the traditional peak-detecting scheme could resolve the issue of peak holding, the sensor requires an external capacitor for peak holding in order to effectively control the overall automobile speed. Since a large gain is required to generate a signal strong enough to overcome the air gap in the case of the hall effect sensor especially in the drawbacks associated with the timing accuracy and duty cycle performance in the slope of the magnetic signal strength as argued by Daniel Dwyer (2007). From the above arguments it is clear that the Hall effect sensor is a successful but expensive sensor to perform measurements and be programmed as part of the overall CAN of the automobile. Thus to conclude the research in this paper the four sensors that were discussed include The Laser Speed Velocimetry (LSV) sensor and an insight on the LSV 065 module as an example. This sensor proves to be successful and accurate speed measurement equipment but the mounting and safety related elements pose a big drawback for its commercial application. The Wheel speed sensor for the ABS in an automobile was then discussed followed by the analysis of the Velocity Speed Sensor. Finally the Differential Hall Effect sensor was discussed in the research paper. This sensor on the other hand can be mounted easily in an automobile and can perform effectively to provide accurate measurements but has higher cost liability and maintenance requirements making it a secondary choice to the traditional VSS And WSS sensors used in most of the cars. Footnotes [1] K.H. Johansson et al, (2001), Vehicle Applications of Controller Area Network, ARTIST2 Network of Excellence on Embedded Systems Design, [2] LM: INFO (2006), Toyota Motor Sales, U.S.A [3] Daniel Dwyer (2007), Differential Hall-effect sensors aid rotational speed control, Allegro MicroSystems, Inc

Wednesday, November 13, 2019

Tupac is Alive, Not Dead Essay -- Tupac Shakur 2pac Makaveli

In the same fashion that Elvis defined Rock ‘n’ Roll; Tupac Shakur defined the hip-hop music scene, as we know it today. What made Tupac (also known as 2Pac, or Makaveli) so special were his enormous talent, his on screen friendly looks, and the sense that he was â€Å"real† and talked the talk, while walking the walk. Tupac was born on June 16, 1971, Tupac Amaru Shakur. He was named after Tupac Amaru, the Inca Indian that was sentenced to death by the Spaniards. He was originally from Brooklyn, New York. Tupac spent a lot of time moving around as he was growing up. He was the son of a Black Panther activist Afeni Shakur and Billy Garland. Tupac moved from Harlem, to Baltimore, to Oakland. The constant moving caused Tupac to fit into his new communities by joining gangs, and his lengthy rap sheet was created even before his profalic entry into music and film. He was arrested eight times before even turning twenty (MTV.com).   Ã‚  Ã‚  Ã‚  Ã‚  Tupac’s first big break came when he joined the group Digital Underground as a dancer and roadie. During that time, Tupac spent a lot of the time composing his own poetry and lyrics to launch his own career. In 1991 he signed with Interscope records and a year later he released his first album 2Pacalypse Now, which immediately landed him   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   into â€Å"gangster† rap stardom. That year he also starred in Juice with Omar Epps and Samuel L. Jackson. It was the beginning to a bright acting career, which also landed him parts in other urban and African American oriented films such as Poetic Justice (1993), Above the Rim (1994), Bullet (1996), and Gridlock’d (1996). His main notoriety was through music, and he followed up his successful debut with Strictly 4 My N.I.G.G.A.Z. (1993), which also was a success. In 1995 he released Me Against the World, and in 1996 came All Eyez On Me (Smith 15-18).   Ã‚  Ã‚  Ã‚  Ã‚  Shakur’s post celebrity run-ins with the law were almost as frequents as when he was growing up. In 1992 he was arrested when a stray bullet killed a six-year old child during a scuffle between Shakur and two others. The charges were later dropped. In 1993 Tupac was arrested for allegedly shooting two off duty Butts County Atlanta police officers who were harassing a black motorist, but the charges were again dropped. Ironically one of the officers was shot in the... ...re are many people that believe everything they have to say. For example take Bill Clinton, our own President; he stood up and lied straight to all of us saying he never committed adultery. And then what about Watergate? And we elect these people into office to govern us. I cannot believe the media, they only tell what they get from the government, a system that lies and cheats its way through.   Ã‚  Ã‚  Ã‚  Ã‚  I still believe that he is alive. I believe in all of the evidence that I have suggested that he some how in some way faked his own death. I believe that Tupac, his family and some presumably well-paid, official looking stand- ins have conspired to pull of the ultimate scam. But is it really a scam? A scam to gain what? There is still a multi- million-dollar life insurance policy out there with Tupac’s name on it. It’s been six years and no one has bothered to cash it. I will tell you why. He had a reason to believe that his life was in danger, and he had to do something to take care of it. Besides haven’t you ever been curious about who would show up at your funeral, and who would really be crying? Tupac was curious, but he never had a funeral, so his questions may never be answered

Sunday, November 10, 2019

Network Security Plan Essay

INTRODUCTION (Purpose and Intent) The Corporation Tech IT Network Security Plan establishes guidelines for IT practices used on a day to day basis to provide a secure and robust computing environment. These practices are used in order to protect the mission, operation, and reputation of Corporation Tech System and its information systems. These system security policies, standards, and procedures that have been established for the Corporation Tech System, are intended to comply with the regulations and policies set down by the State of Florida, Corporation Tech, and the Federal Information Security Management Act (FISMA). SCOPE These standards and procedures apply to all information systems and resources under the control of Corporation Tech, including all computers connecting to the Corporation Tech network and all Corporation Tech System employees, contractors, and any other individuals who use and/or administer those systems and computers, particularly those involved with information system management. STANDARD PROVISIONS Corporation Tech IT will manage risk by identifying, evaluating, controlling, and mitigating vulnerabilities that are a potential threat to the data and information systems under its control. User accounts and passwords are implemented to maintain individual accountability for network resource usage. Any user who obtains an account and password for accessing a Corporation Tech provided resource, is required to keep these credentials confidential. Users of these systems may only use the accounts and passwords for which they have been assigned and authorized to use, and are prohibited  from using the network to access these systems through any other means. This plan also prohibits the sharing of personal user accounts or passwords for accessing Corporation Tech or Internet computing resources. In the interest of maintaining account security, passwords will be changed on a regular schedule or anytime the integrity of the account is in question. Corporation Tech IT network or computing resources may not be used for personal commercial purposes, for personal profit or to violate the laws and regulations of the United States or any other nation, or the laws and regulations of any state, city, province or other local jurisdiction in any material way. Use of Corporation Tech resources for any illegal activity may result in loss of network access privileges, official reprimand, suspension or dismissal. Corporation Tech will cooperate with any legitimate law enforcement agency or inquiry in the investigation and prosecution of any alleged wrongful activity. Corporation Tech’s network or Internet facilities may not be used to disable or overload any computer system or network, or to circumvent any system intended to protect the privacy or security of another user. Corporation Tech owned networking and communications equipment, may only be moved by Network and Computing Support staff, or authorized agents. Reconfiguration of network hardware or software, except by designated individuals within IT, is strictly prohibited. Prior to connecting any server, network communication or monitoring device to the Corporation Tech Network, approval must be obtained from Data Center Communications. Attachment of any the following devices to the Corporation Tech network, other than those provided or approved by Network and Computing Support, is strictly prohibited: a. DHCP servers. b. DNS servers. c. NAT routers. d. Network Gateways. e. Packet capturing or network monitoring devices. f. Any device that disrupts or negatively impacts network operations. STATEMENT OF PROCEDURES The procedures for conducting a risk assessment and for the control and mitigation of risks to the Corporation Tech Information Systems include: NETWORK CONTROL Corporation Tech IT has software and systems in place that have the ability to monitor and record network, Internet and computer system usage. This includes monitoring and security systems that are capable of recording network traffic, including traffic to World Wide Web sites, chat rooms, newsgroups and e-mail messages, file servers, telnet sessions and file transfers into and out of our internal networks. This capability is necessary in order to maintain the health of Corporation Tech network operations and diagnose network related problems. Corporation Tech IT reserves the right to perform network monitoring at any time. The information collected may be used by technicians and management to assess network utilization and trends, and may also be provided to upper management or other authorities as evidence as part of any investigation of alleged policy violations. Corporation Tech IT reserves the right to perform periodic port scans, segment sweeps, and vulnerability scans on all network segments. Network operations, functions, and resources, which are not required as part of the normal and approved job duties or projects at Corporation Tech, may be bandwidth limited or blocked by network control devices in order to protect the integrity and availability of the overall system. Corporation Tech IT may suspend network access to any location or system that disrupts normal network operations or systems that violate Corporation Tech policy. In this event, an attempt will be made to contact the responsible individual to resolve the problem. DHCP SERVICES Corporation Tech IT provides centralized and redundant DHCP and DNS services for Corporation Tech. Due to the nature of these services, and because of the potential disruption of service and possible security breaches resulting from incorrect setup of additional systems, attachment of unauthorized DHCP or DNS servers is prohibited. The following guidelines must be followed when requesting or using any DHCP or DNS services: †¢ Systems requiring an IP address must support DHCP and be capable of obtaining DHCP address information from one of the centrally administered University DHCP servers. †¢ Using DHCP, devices requesting an IP address will be assigned a dynamic pool address from the subnet to which the device is attached. Devices with dynamically assigned IP addresses may have their address change. †¢ Static IP addresses needed for server class machines or specialized clients must be  requested from the Data Center Communications Team via a Help Desk ticket. DNS SERVICES User workstations, which have been assigned a dynamic pool IP address, will have an associated DNS name assigned by the network. Any DNS name or domain name that is to be associated with Corporation Tech network, must be requested from and/or registered through Web Services. DNS names ending in corptech.com are made available upon request for Corporation Tech approved services. Requests for assignment of DNS names must be for valid Corporation Tech related purposes. DNS names for domains other than corptech.com, and which are to be hosted by Corporation Tech systems, must be requested from Web Services. Any charges for initial or ongoing registration of the requested name are the responsibility of the requestor. DNS names, not in the corptech.com domain, will be handled on a case by case basis. Corporation Tech IT will work with any user requesting a domain name to identify an appropriate and available name, however Corporation Tech IT has final approval for all DNS name assignments. WIRELESS NETWORK SERVICES Because wireless networks can be used to provide access to the same resources and services as wired network systems, the same basic procedures that are used in a wired network environment can also be applied in a wireless network environment. However, due to the nature of wireless networks, additional security and control mechanisms are needed in order to maintain the security, operation and inter-operability of both traditional and wireless systems. Wireless routers are not allowed on the Corporation Tech network unless they have been approved by Corporation Tech IT. Access to the Corporation Tech Wireless network is limited to individuals who have a Corporation Tech account except in locations where the guest network is available. The Corporation Tech Guest Network is segregated from the internal servers and resources used by authenticated users to keep the network secure. The Corporation Tech Guest Network is only available in approved areas, and require a request to be expanded into any other areas. Users of the Corporation Tech Guest Network are required to provide a valid cell phone number in order to authenticate. Destruction and Disposal of Information and Devices Restricted information must be disposed of in such manner as to ensure it cannot be retrieved and recovered by unauthorized persons. When donating, selling, transferring, surplusing or disposing of computers or removable media (such as DVDs), the proper procedures to make data unreadable on those media will be taken. Acceptable procedures are listed on ISSP-009, â€Å"Medial Disposal.† NETWORK ACCESS Anyone who uses the Corporation Tech computing environment must have appropriate status (e.g. management, employee, staff, or authorized third party) and must be properly authenticated when required. Access will be provided to vendors and or other Corporation Tech partners through the sponsored VIP account process, as described on http://www.corptech.com/it/services/vip.aspx. VIP accounts are reviewed and renewed on six month intervals to see if access is still needed. When an employee leaves the organization accounts will be disabled once TERM status is updated, and individual departments must approve re-activation of account access. USER COMPUTING DEVICES Users are responsible for the security and integrity of Corporation Tech information stored on their workstation, which includes controlling physical and network access to the equipment. Users may not run or otherwise configure software or hardware that may allow access by unauthorized users. Anti-virus software must be installed on all workstations that connect to the Corporation Tech Network. Corporation Tech Computers may not be used to copy, distribute, share, download, or upload any copyrighted material without the permission of the copyright owner. PHYSICAL ACCESS Access to Corporation Tech IT Data Center should be restricted to those responsible for operation and maintenance. Access by non-IT personnel is not permitted unless they are escorted by an authorized IT staff member. Computer installations should provide reasonable security measures to protect the computer system against natural disasters, accidents, loss or fluctuation of electrical power, and sabotage. Networking and computing hardware are placed in secure and appropriately cooled areas for data  integrity and security NETWORK HARDWARE Network hardware are housed behind a locked door to protect physical access to switches and other network hardware. Access is only allowed though card access or with a checked out key. All switches and network hardware are password protected at a minimum via a local account setup on the device itself, these passwords are changed periodically as administrators leave the organization. Subnets allowed to authenticate with switch management will be restricted, to create tighter control of backend administration. Exec level access Timeouts implemented on Console and VTY lines, so that any idle sessions are terminated automatically. All switches are time synced using NTP, so that incidents can be tracked and correlated to the proper timeframe. SERVER ENVIRONMENTS All servers are subject to a security audit and evaluation before they are placed into production. Administrative access to servers must be password protected and use two-factor authentication whenever possible. Servers should be physically located in an access-controlled environment. All internal servers deployed at Corporation Tech must be owned by an operational group that is responsible for system administration. Servers must be registered with the IT department. At a minimum, the following information is required to positively identify the point of contact: a. Server owner contact(s) and location. b. Hardware and Operating System/Version c. Main functions and applications d. MAC address (If not a virtual server) Services and applications that will not be used must be disabled where practical. Access to services should be logged and/or protected through access-control methods to the extent possible. The most recent security patches must be installed on the system as soon as practical. Do not use administrator or root access when a non-privileged account can be used. Privileged access must be performed over secure channels, (e.g., encrypted network connections using SSH or IPSec). EXCEPTIONS All requests for exceptions to these standards and procedures will be handled by request, and will follow these guidelines: †¢ Must be submitted in writing to and approved by the CIO or with the proper authority. †¢ Will be reviewed on a case by case basis. NETWORK SECURITY Corporation Tech network design is built around three principles, Defense-in-Depth, Compartmentalization of Information and Principle of Least Privilege. Our first step was to look at what we are protecting, which is ultimately our business and clients data and information. To ensure a sound architecture we started the design of our network with scalability in mind. It is important that our design is flexible enough to meet future needs. The threats we know about and face today may not be the ones we face tomorrow. While developing security requirements for our IT system resources, we will determine if they are mission-critical or data-sensitive resources. This will allow us to determine where data confidentiality and integrity are the most important requirements, or where the priority is continuity of operation (availability). DEFENSE-IN-DEPTH Network safeguards offer the first protection barrier of IT system resources against threats originating outside the network. These threats can be in the form of intruders or malicious code. Our network design offers layered protections. What this means is the security layers complement each other; what one misses the other catches. This will be accomplished by locating security defenses in different places throughout our IT system, as well as not using two of the same types of safeguards. Although this may increase the complexity of our security system and can potentially make management and maintenance more difficult and costly, we believe the safety of the IT system resources should be based on the protection. With defense-in-depth in mind, the first layer of our network security plan starts with our network perimeter security. The principle network security defenses are firewalls, intrusion detection and prevention systems (IPS/IDS), VPN protections and content inspection systems like anti-virus, anti-malware, anti-spam and URL filtering. The traditional first line of defense against attacks is typically the firewall, which is configured to allow/deny traffic by  source/destination IP, port or protocol. It’s very straight forward, either traffic is allowed or it’s blocked. With the advent of Next Generation firewalls, which can include application control, identity awareness and other capabilities such as IPS, web filtering, and advanced malware detection, all of these features can be controlled by one device. COMPARTMENTALIZATION OF INFORMATION Corporation Tech will have IT system resources with different sensitivity levels or different risk tolerance levels and threat susceptibilities. These resources should be located in different security zones. The idea is to hide the data or information and make it available only to those systems where it is necessary for conducting system tasks. Examples of this are: †¢ E-mail, Web and DNS servers are located in the DMZ behind the perimeter firewall. †¢ Databases servers such as SQL servers are located in the Database Zone, within the internal firewall/IPS. †¢ Intranet servers, file servers and user workstations are in the LAN zone within the internal firewall. †¢ The Internet is located in the Internet zone behind the perimeter firewall. Principle of Least Privilege Corporation Tech administrators and users will have minimal privileges necessary for proper functioning within the organization. This rule applies also to data and services made available for external users. An extension to this rule is the â€Å"Need-To-Know† principle which says that users and administrators of Corporation Tech IT system have access to only the information relevant to their role and duties performed. Other points of security that we will address in our network services availability is the single point of failure principle, the separation of duty and job rotation rules. The network paths between users and mission-critical IT system resources, all the links, devices (networking and security) as well as the servers will be deployed in redundant configurations. The goal of the separation of duty and job rotation rule is to limit an employee’s ability to neglect and break the IT system’s security policy. Separation of duty dictates that important tasks/functions should be performed by two or more employees. Job rotation states that there should be rotation of employees in important positions. NETWORK HARDENING For each layer of security, we will ensure they are running the most up-to-date software and operating systems, and that the devices are configured properly. SECURITY ZONES Intrusion Prevention (IPS) devices are responsible for detecting and blocking penetrations and attacks conducted by intruders and malicious malware applications. We recommend an IPS be installed in the network path between potential threat sources and sensitive IT system resources. Attacks through encrypted SSL sessions are a potential vulnerability so we recommend decrypting the sessions prior to it reaching the IPS device in order to inspect unencrypted packets. The IPS will be properly optimized and monitored to catch attackers that have slipped past the first defense (firewall/router). Internal networks will not have direct access to the Internet so a Trojan sent to a user’s workstation through a phishing attack would not allow the intruder to connect to the external network. Internet services are available for internal users only through company email and HTTP Proxy servers. ENABLE SECURE NETWORK ACCESS We will install a VPN that is configured to allow encrypted communication to our network from the outside. Utilizing two-factor authentication, ensuring the integrity of the users making the request. This is external-facing to our network and allows users to tunnel into our LAN from the outside once the appropriate measures are taken to secure access. SEGMENTED DMZ There will be a front-end firewall for the external traffic and a back-end firewall for the internal traffic. Firewall rules will be optimized and tightened on all publicly available systems to allow traffic to only the necessary ports and services living within the DMZ. Firewall rules have been created to only allow the source IP addresses and port to the specific servers and proxies have been added in the network from which administrators are allowed access to the systems. Systems within different VLANs (with a layer 3 switches) have been configured to help isolate and respond to incidents if a server in the DMZ is compromised. Authentication on the LAN is required before access to the DMZ is even attempted. This prevents allowing complete control over these systems at any given time. DEVICE  INTEGRITY All hardware and software will be purchased only from the manufacturer or from resellers who are authorized and certified by the equipment manufacturer. Unused physical interfaces on network devices will be shut down. Access lists that allow only those protocols, ports and IP addresses that are required by network users and services are implemented. Everything else is denied. Network device configuration file are protected from unauthorized disclosure. Steps have been taken to avoid plaintext passwords in the configuration files. This has been accomplished by using encryption and/or a salted hash with iteration to protect the confidentiality of passwords in configuration files. Change passwords/keys immediately if the network device configuration file is transmitted in the clear (or is otherwise exposed) while containing non-encrypted passwords/keys. Secure protocols will be used when transmitting network device configuration files. All unneeded services on network devices must be sh ut down. Log files will be reviewed regularly to gain an in depth understanding of normal network behavior. Any irregularity will be reported and investigated. SECURE MANAGEMENT Only secure protocol standards (SSHv2; IKEv2/IPsec; TLS v1.0+) will be used when performing remote management of network devices. Default usernames and/or passwords will not be used. The network infrastructure security policy should define password length and complexity requirements. Review the network infrastructure security policy. This policy identifies who is allowed to log in to network infrastructure devices and who is allowed to configure network devices, and defines a plan for updating network device firmware at scheduled intervals. PORT VULNERABILITES Port 25 – Is used for SMTP (Simple Mail Transfer Protocol). It uses both tcp and udp protocols. This port used for e-mail routing between mail servers and is susceptible to many known Trojan’s. We are keeping this port in a closed state. Port 80 – Is used for web traffic Hyper Text Transfer Protocol (HTTP). It uses both tcp and udp protocols. Port 80 udp is also used by some  games, like Alien vs Predator. Code Red and Nimda worms also propagate via TCP port 80 (HTTP). Also, a number of trojans/backdoors use these ports. We are keeping this port in a closed state. Port 139 – Is used for NetBIOS. NetBIOS is a protocol used for File and Print Sharing under all current versions of Windows. By default, when File and Print Sharing is enabled it binds to everything, including TCP/IP (The Internet Protocol), rather than just the local network, meaning your shared resources are available over the entire Internet for reading and deletion, unless configured proper ly. Any machine with NetBIOS enabled and not configured properly should be considered at risk. The best protection is to turn off File and Print Sharing, or block ports 135-139 completely. We will leave this port in an open state but will turn off file and print sharing capabilities. Port 1900 – Is used for SSDP, UPnP. UPnP discovery/SSDP, is a service that runs by default on WinXP, and creates an immediately exploitable security vulnerability for any network-connected system. It is vulnerable to denial of service and buffer overflow attacks. Microsoft SSDP Enables discovery of UPnP devices. We are keeping this port in a closed state. Port 2869 – Is IANA registered for: ICSLAP. It uses both tcp and udp protocols and is used for Microsoft Internet Connection Firewall (ICF), Internet Connection Sharing (ICS), SSDP Discover Service, Microsoft Universal Plug and Play (UPnP), and Microsoft Event Notification. We will leave this port in an open state. Port 5357 – Is used by Microsoft Network Discovery, and should be filtered for public networks. It uses both tcp and udp protocols. It is also IANA registered for: Web Services for Devices (WSD) – a network plug-and-play experience that is similar to installing a USB device. WSD allows network-connected IP-based devices to advertise their functionality and offer these services to clients by using the Web Services protocol. WSD communicates over HTTP (TCP port 5357), HTTPS (TCP port 5358), and multicast to UDP port 3702. We will close this port and redirect traffic to HTTPS (TCP port 5358). Port 6839 – This port is not associated with any particular services and should be closed unless it is associated and used. Port 7435 – This port is not associated with any particular services and should be closed unless it is associated and used. Ports 9100, 9101 and 9102 – These TCP ports are is used for printing. Port numbers 9101 and 9102 are for parallel port s 2 and 3 on the three-port HP Jetdirect external print  servers. It is used for network-connected print devices. These ports should remain open to allow print services. There are no listed vulnerabilities associated with these ports. Port 9220 – This port is for raw scanning to peripherals with IEEE 1284.4 specifications. On three port HP Jetdirects, the scan ports are 9290, 9291, and 9292. It is used for network-connected print devices. This port should remain open to allow print services. There are no listed vulnerabilities associated with this port. Port 9500 – TCP Port 9500 may use a defined protocol to communicate depending on the application. In our case we are using port 9500 to access the ISM Server. The ISM Server is used for exchanging backup and recovery information between storage devices. This port should remain open while services are in use. There are no listed vulnerabilities associated with this port. Port 62078 – This port is used by iPhone while syncing. The Port used by UPnP for multimedia files sharing, also used for synchronizing iTunes files between devices. Port 62078 has a known vulnerability in that a service named lockdownd sits and listens on the iPhone on port 62078. By connecting to this port and speaking the correct protocol, it’s possible to spawn a number of different services on an iPhone or iPad. This port should be blocked or closed when service is not required on the device. References BEST: Network Security Policy and Procedures. (n.d.). Retrieved from http://www.ct.gov/best/cwp/view.asp?a=1245&q=253996 Example Security Plan. (2014, November 17). Retrieved from http://www.binomial.com/security_plan/example_security_plan_template.php Hardening Network Infrastructure Security Recommendations for System Accreditors. (n.d.). Retrieved from https://www.nsa.gov/ia/_files/factsheets/Hardening_Network_Infrastructure_FS.pdf Network Security Policy: Best Practices White Paper – Cisco. (2005, October 4). Retrieved from http://www.cisco.com/c/en/us/support/docs/availability/high-availability/13601-secpol.html Paquet, C. (2013, February 5). Security Policies > Network Security Concepts and Policies. Retrieved from http://www.ciscopress.com/articles/article.asp?p=1998559&seqNum=3 SANS – Information Security Resources | Information Security Policy Templates |.

Friday, November 8, 2019

Outline and Evaluate The Cognitive Interview Essays

Outline and Evaluate The Cognitive Interview Essays Outline and Evaluate The Cognitive Interview Essay Outline and Evaluate The Cognitive Interview Essay Outline and Evaluate The Cognitive Interview BY 997 Outline and Evaluate The Cognitive Interview (12 marks) The cognitive interview was created by Fisher and Gieselman in 1992, the cognitive interview is a technique which aims to bring out more accurate information from eye witnesses. It consists of four stages; the interviewee is asked to mentally recreate the environment from the original incident including weather conditions and their feelings. The interviewee is asked to report every single detail of the incident even if it may seem irrelevant. Theyre asked to recall the incident in reverse order, this is to top them relying on their schemas when recalling. Then this is where they are asked to imagine they were somewhere else or someone else recalling based on their point of view. There are a number of studies that demonstrate the positive effectiveness of the cognitive interview; kohnken conducted a meta-analysis of 53 studies and found a 34% increase in correct recall using the cognitive interview process instead of the usual procedure. This was supported by Geiselman et al who conducted a study to see the effectiveness of the cognitive interview compared to traditional interview technique. Footage of violent crimes were shown to students who two days later were either asked to recall using the standard interview or the cognitive interview. The students remembered more detail when the cognitive interview was used compared to the standard interview. This study demonstrates that the Cognitive Interview technique is more effective than the normal interview procedures for retrieving accurate testimonies. Geiselmans studies were lab experiments therefore they lack external validity as the participants are not as emotionally aroused as they would be in real life and the videos do not represent real life situations.

Wednesday, November 6, 2019

Free Essays on Rousseaus Social Contract

What Freedom? One of the most thought provoking ideas in Rousseau’s Social Contract was when he stated that â€Å"Man is born free, and everywhere he is in chains.† Today, this very same idea still stands true. Everywhere you look, there is an example of a person being tied to, or answering to another. It is sad to think that even though it is our constitutional right to be free, no one can ever be absolutely free. An example of man being in chains could lie within the family. Until most people are 18, they are expected to obey their parents, regardless of how they may feel. Even if a teenager is completely responsible and trustworthy, his parents may decide against something he wants to do, whether it be going to a party or going to the mall to ‘hang out’. It all depends on the type of parents a teenager may have. If this teen decides to do whatever he wants, then his parents will lose a sense of respect and trust for him, even if he did nothing wrong. Sadly, things happen in our world that make it impossible for parents to agree to everything teens want to do. So, in a sense, it is almost society that puts the chains on teenagers. Either way, a lot of teens do not get to experience as much as they would like because of how parents feel about what is going on around them. Another good example of how we are in chains lies inside each and every one of us. We are sometimes held back by our own values and beliefs of the world around us. For instance, a person may feel it necessary to act outside of his usual boundaries, but not do so because he is afraid of how others will view him and how he will feel about himself. If I were to decide I wanted to go to a party, I would feel very uncomfortable because it is not something I do. My beliefs and feelings would interfere with what I want to do, so in a way, I am held back by my own chains. Still, another example lies in the federal and state governments. There ... Free Essays on Rousseaus Social Contract Free Essays on Rousseaus Social Contract What Freedom? One of the most thought provoking ideas in Rousseau’s Social Contract was when he stated that â€Å"Man is born free, and everywhere he is in chains.† Today, this very same idea still stands true. Everywhere you look, there is an example of a person being tied to, or answering to another. It is sad to think that even though it is our constitutional right to be free, no one can ever be absolutely free. An example of man being in chains could lie within the family. Until most people are 18, they are expected to obey their parents, regardless of how they may feel. Even if a teenager is completely responsible and trustworthy, his parents may decide against something he wants to do, whether it be going to a party or going to the mall to ‘hang out’. It all depends on the type of parents a teenager may have. If this teen decides to do whatever he wants, then his parents will lose a sense of respect and trust for him, even if he did nothing wrong. Sadly, things happen in our world that make it impossible for parents to agree to everything teens want to do. So, in a sense, it is almost society that puts the chains on teenagers. Either way, a lot of teens do not get to experience as much as they would like because of how parents feel about what is going on around them. Another good example of how we are in chains lies inside each and every one of us. We are sometimes held back by our own values and beliefs of the world around us. For instance, a person may feel it necessary to act outside of his usual boundaries, but not do so because he is afraid of how others will view him and how he will feel about himself. If I were to decide I wanted to go to a party, I would feel very uncomfortable because it is not something I do. My beliefs and feelings would interfere with what I want to do, so in a way, I am held back by my own chains. Still, another example lies in the federal and state governments. There ...

Monday, November 4, 2019

Workplace Issues Assignment Example | Topics and Well Written Essays - 250 words

Workplace Issues - Assignment Example However, whether such belongingness affects the reputation of the nursing profession positively or negatively really depends upon the performance of a union as different unions vary in their response, activities, and proceedings. One disadvantage is that many nurses tend to make negative use of the protection that comes with association with these unions. They are lazy and yet cannot be fired. The day-shift and night-shift nurses are involved in a constant blame game where they hold each other responsible for the faults and mistakes. Another disadvantage for nurses is that they have to depend upon the union for everything. While an independent nurse may switch days with a coworker, the one associated with a union has to get the holidays preapproved from the union which may be an inconvenient process. Taking everything into consideration, the overall effect of association with a collective bargaining association on the nursing practice is generally more negative than positive particul arly because it comes in between the patient and the nurse, and has the ability to erode the status and freedom of a

Friday, November 1, 2019

What Changes and what Stays the Same in America Taking a look at epic Essay

What Changes and what Stays the Same in America Taking a look at epic western films - Essay Example By this I mean to say that American society has undergone a vast amount of change since times immemorial and comparing one time period to another, especially through films set in that time, can help to give us a proper picture of the social status that different kinds of people had, and also help us understand their roles in society with respect to politics; the acceptance of their historical background, as well as their personal gender and identity and how they perceive the same. In this paper, we will be focusing on the Native American Indians and their diminishing face in contemporary American society. The objective of this paper is to understand the changes that American society has undergone over the last couple of decades by taking a look at epic western films and answering questions that are crucial to the existence of society such as the topics of politics, race, gender and sexuality, as well as the historical identity of Native Americans. The idea of race is a very harping issue, especially in the western society in the western world – the western genre of films, movies like Brokeback Mountain and Dances with Wolves for example, do not talk about the inclusion people belonging to different races. These films only address the â€Å"fantasies of the master race: the white hero's Indianness evokes the figure and fantasy not of the human and humane Indian but of the American Adam† (Pratts, Armando Jose) this statement merely encompasses the fact that most western American films only focus on the light skinned Americans, forgetting that there could be westerners belonging to a different racial background. This leads to a sort of lack of diversity among the community and also gives a very unclear picture to the rest of the world regarding the kind of people that live in west native Indian community. The idea of class on the other hand is portrayed wonderfully. In the film Dances With Wolves too, the hero is portrayed as a white Indian and thus gives the audience an image of the ‘perfect American’ hero rather than what the actual situation in the western Indian community is like. (Horner, Joy) Renowned Native American author Sherman Alexie makes an attempt to ans wer questions regarding Native Americans and race as is not easily portrayed in contemporary film and music today. He talks about the Buffalo Soldiers, or the all African-American regiment that fought during the American Civil war – also hailing from a western American Indian society. Such communities are given little or no representation at all today in art despite being a part of the community and that is the fundamental issue in the portrayal of western society and how it is incorrect for the rest of the world that looks at a cowboy as a young white man, with a southern accent. In Dances With Wolves, the idea of race is portrayed excellently as Colonel Dunbar manages to adapt himself to the life of a Buffalo Soldier, and even fall in love with one of their kin – thus the name ‘Dances With Wolves’ as he manages to adopt the lifestyle of a black western man. Next, we touch upon the aspect of gender and sexuality as seen in the two films and understood in terms of western society. Sexuality is a very daunting issue world over today; it is very difficult for people to understand the social construct of gender as opposed to sexuality because of the fact that they have been created by society. The director talks about â€Å"a story that had never been told before, of two aging men who bear up under their drab, empty, unbearably lonely lives as long as they can just escape a time or two a year to Brokeback Mountain, where, as teenaged boys herding sheep, they

Wednesday, October 30, 2019

Technical Communication Assignment Essay Example | Topics and Well Written Essays - 1500 words

Technical Communication Assignment - Essay Example So, from the wide variety of fields or branches that will be available, the individuals will chose their field, specialize in it, ‘graduate’ in it and even ‘Master’ it, going through different stages. So, I James Peck, an estate agent also went through all these stages or part of these stages. Working in the property development sector, I have quite a good knowledge about my field and the job I do. As mentioned above, each of the individual will have an academic choice and career choice of their own, based on their interest, influences and also expected opportunities. If anyone is interested in my field of property development, or if anyone haven’t made their career choice, or if anyone wants to change their current choice to an estate agent, or even if anybody wants to know about the field of property development, as a general knowledge subject, my speech will be quite useful. Importantly, this speech could also be an influencing activity. To entice the listeners and make them attentive to my speech, I intend to plan the outline in a logical way. That is, firstly, I wanted to speak to them about their interests and influences in their childhood and during their school life. This is because; humans are mostly ‘made’ in their childhood and teenage years, before they enter their adulthood. Every human’s life will be composed of several stages, which are inter-linked. And, for every living individual in this world, who has lived long enough, the stage when they were young will be considered the crucial one. At that stage only, an individual’s life can take a turn, both in the positive as well in the negative direction. Positive direction in the sense, if the individual, when he/she was a juvenile concentrates on education, career, etc, their lives will be a successful one. Even if their parents or

Monday, October 28, 2019

Sustainable tourism Essay Example for Free

Sustainable tourism Essay Kenya is in Africa and is becoming a popular holiday destination with tourists and the number of advantages have increased and also the number of disadvantages. There are more advantages for the local community to work and earn money but there are also the large tourist companies which are taking a large chunk of the countrys money out of the country via leakage. In this report I will recommend how to improve the disadvantages and to maximize the advantages for the income and welfare of Kenyan local communities and environments to keep sustainable tourism in Kenya. The Tour Companies The tour companies are responsible for the package holidays, and making them up, deciding what to include in them and whether they are suitable. Tour companies need to make sure the packages they use are environmentally friendly and will be sustainable for the future. More and more people are visiting Kenya and want to go on safaris and get as close to the animals as they can, so the tour company drivers go off the track so they can get close to the animals and please the tourists. As a result of this the animals get scared. I recommend that they do a couple of things to ensure the safety of tourists and to keep the trips sustainable. First I think there should be strict rules as to where the drivers may go and when, at certain times some animals will become a lot more agitated and may even attack the safari vans. Drivers should remain on the tracks in doing this they are not scaring the animals or killing the environment so it remains sustainable. Secondly there should also be restrictions on the time of day safaris are so the animals are not constantly disturbed, this will help sustainability as the animals will be able to reproduce and keep the numbers up. Another ride that scares the animals is the hot air balloon rides. If the balloons go too low the animals are scared and may move from their normal terrain to get away from the hot air balloons. I recommend that there are fewer hot air balloons and there are height restrictions as to how low they can go. Sustainability is a major key that I think the tour companies need to think about and remember when creating

Saturday, October 26, 2019

A Girl Named Lisa :: Personal Narrative, Autobiographical Essay

A Girl Named Lisa I was working in the seafood department one day when I saw them...well, her actually. I wondered what her name was. She was about 13 or 14 years old, maybe a bit more, but certainly not old enough to drive yet, or maybe she was. She was with her family, I think...no, I assume. Her father (I assume) was the big guy with a red sash on his waist and a jacket with a yin-yang patch on the front right side of it and it was black. The jacket, I mean. Her mother (I assume) was there too, and...I don't remember anything at all about her. There was another kid there, younger than her, and I assumed it was her brother. She was beautiful. Not in the gorgeous model way or the cute puppy way but in the sort of beauty that just is, Plato's beauty, you know? And I don't know why or how but when I saw her I got a feeling like when you know something's going to happen but you don't know what but you can just tell but it wasn't love. Sorta like butterflies but higher and stronger. Maybe butterflies on steroids. And the feeling stayed, sort of an anticipation. And she went away and I went to work, but I happened to look across the store towards the milk, and she was there. And she looked at me. No, not at me. It was like. . .like when you're driving over a familiar stretch of road and you know it so well that you just stare straight ahead and almost forget you're driving. It was like she knew me. It was like she was me. And then she turned down the cookie aisle and was gone. It had been over a year, and I still hadn't seen her in the store. I honestly didn't know what I'd say if I saw her, but I tried to imagine it. I saw her father (I assume) every week in the store, the same red sash, the same yin-yang jacket, as he bought fruit and eggs and bread and beer and toilet paper. But he never bought fish. And I never said anything to him, and he never noticed me or said Hi. But she noticed me. She knew me. And one day, I knew she would be in the store again, and I would see her standing by the milk, and she would see me standing by the frozen fish.