Monday, September 30, 2019

Pride and Prejudice by Jane Austen Analysis Essay

Introduction In the novel Pride and Prejudice Jane Austen identifies the key components of successful marriage – love, tolerance, affection and financial stability. The whole novel is written to underline the importance of marriage which shouldn’t be based on social status, wealth or affection of the youth. For her time the author was very radical as she strongly defended marriage for love, whereas in those times it was prestigious to marry for financial stability and social status. Through her characters – Elizabeth, Mrs. Bennet and Mr. Darcy – she shows the right and wrong attitudes towards the ideal marriage. Elizabeth and Mr. Darcy represent true love and true relationships, whereas Mrs. Bennet is motivated only by wealth when she decides to get her beloved daughters married. Through characters Austen makes readers believe that love and happiness can’t be bought. Character Analysis Mrs. Bennet is characterized as a miraculously tiresome character. Moreover, she is frivolous and too foolish. Mrs. Bennet is an irritating woman who becomes obsessed with idea to get her daughters married simply to improve her financial stability and social status as after her husband’s death she has been refused certain social entertainments. She cares for nothing in the world except money. Austen is willing to show that Mrs. Bennet does lack sense of virtue and property, and, what is more awful, she is not interested in intellectual and emotional education of her five daughters. Mrs. Bennet affects the attitudes of her younger daughters – Lydia and Charlotte Lucas – towards marriage. Mrs. Bennet is very pleased when Lydia gets married to an officer and she never reproaches her for shameful behavior. However, she can’t be blame as she was married only for beautiful appearance and she didn’t see another life. I think the author introduces Mrs. Bennet to highlight the necessity of marriage for young ladies. In contrast to Mrs. Bennet the author introduces the character of Elizabeth to show true virtues and necessity of love and happiness. Elizabeth is the most quick-witted and intelligent. Moreover, Elizabeth is clever, lovely and brilliant. Her positive character traits enable her to rise above shameful conduct of her mother and sisters. Elizabeth is strong enough to overcome all difficulties and to get married for love, not for financial stability or higher social status. Elizabeth is entailed with sharp tongue and ability for hasty judgments. She is the only character who manages to make Darcy love her for personality and who overcomes the power of prejudice: â€Å"My feelings will not be repressed. You must allow me to tell you how ardently I admire and love you†. (p.35) We see that Elizabeth has pride in her abilities to express herself and to perceive the truth. Mr. Darcy is one more positive character in the novel who overcomes prejudice and finds his true love – Elizabeth. Mr. Darcy is a wealthy aristocrat being extremely conscious of class differences.   Nevertheless, he has sense of virtue and honor. Firstly, he is not interested in Elizabeth saying that â€Å"she is tolerable; but not handsome enough to tempt me; and I am in no humour at present to give consequence to young ladies who are slighted by other men†. (p.13) However, with novel progression his character transforms and he recognized his faults of prejudice and pride. His character affects the novel as, despite high social status and wealth, he manages to overcome prejudice and to show that marriage should be based on love. He proves that a man should love women for her intelligence and personality, not only for beautiful appearance. Conclusion Mrs. Bennet, Elizabeth and Mr. Darcy affect the novel in different ways. Mrs. Bennet symbolizes misconception of true marriage as she is obsessed with financial stability and social status. Elizabeth and Mr. Darcy represent true virtues in the novel as they teach others that marriage should be grounded on love, happiness, and attraction. Works Cited Austen, Jane. Pride and Prejudice. UK, London: Penquin Books, 2005.

Sunday, September 29, 2019

Internalization of Values Socialization of the Baraka

Internalization of Values Socialization of the Baraka and Keiski Aubrey Love English Comp 3 Dr. Popham 3/21/2012 The people who inhabit a community and their interactions with one another comprise a society. These repeated interactions allow people to internalize or, hold true, what society portrays as everyday norms and values. These norms and values are instilled during childhood through the time he or she becomes an adult. Amiri Baraka’s autobiography â€Å"School† and Lisa Keiski’s essay â€Å"Suicide’s Forgotten Victims,† makes this evident.In both â€Å"School† and â€Å"Suicide’s Forgotten Victims,† Baraka’s and Keiski’s daily interactions with their peers, authority figures, and society contribute to the formulation of important life lessons. Through the daily interactions with his peers in his educational setting, Baraka internalizes concepts pivotal to real world situations. School provided Baraka with an environment to social with students that have common interests and goals: â€Å"The games and sports of the playground and streets was one registration carried with us as long as we live† (260). Friends compose the next primary socializing agent outside the family.It allows Baraka to see beyond his small world at home and introduces him to new experiences. Physical and recreational activities are important components in childhood development. Interactions with his peers provided Baraka with his first experience of equal status relationships. When Baraka played around with his friends, he made a distinction between himself and the others around him. The games shared between his friends shows that Baraka began learning to understand the idea of multiple roles; the duties and behaviors expected of someone who holds a particular status.Baraka took the values he learned from playing with his friends and certified them, implementing them in his everyday actions for the rest of his life. Baraka’s peers allowed him to internalize a vital life lesson necessary for the real world. Like Baraka, the daily interactions of Keiski with her roommate and friends in college allow her to experience a form of socialization necessary for reality. College not only provides a rigorous coursework, it offers Keiski and her peers a place to learn and grow from each other. I went to a mutual friend who was going to stay with her that night†¦ he had been around Sue too and said that she’d be all right†¦Ã¢â‚¬  (95). When faced with a scenario that Keishi is unsure about, she seeks refuge and clarification from a friend, hoping he can provide her with insight and wisdom about her situation. Although he tried to affirm Sue’s safety, deep in Keiski’s heart, she knew Sue faced trials and tribulations. From her interaction with her mutual friend, Keiski learns that she cannot depend on others to understand or take care of a situation for her.Keisk i had some kind of understanding of Sue’s hint for help, while her mutual friend did not sense suicidal signs from Sue and thus remained clueless the underlying pain. Keiski internalizes the life lesson that not everyone will understand a particular situation and if he or she does not understand, he or she will not have the answer to fix the situation; not all daily interactions lead to a positive end, a harsh but evident value in society. Similarly to the peers in Baraka’s â€Å"School,† authority figures contribute to Baraka’s socialization by exemplifying values and norms in their day-to-day actions.In this case, authority figures take the form of Baraka’s teacher, Mrs. Powell. â€Å"The only black teacher in the school at the time†¦, beat me damn near to death in full view of her and my 7B class†¦ (which apparently was sanctioned by my mother†¦)† (258). Baraka exerted the wrong class attitude by playing around while the te acher taught her class. Mrs. Powell uses Baraka as a demonstration for the class on what appropriate behavior in the classroom is. Mrs. Powell provides Baraka with an experience of the hierarchal system between adults and children.Baraka’s mother’s approval of physical discipline shows Baraka that certain behavior in a given situation will not be tolerated. The authority figures intend to instill the value they believe prove useful in society; values such as respecting authority figures or not talking over someone in a conversation. Through his experience with Mrs. Powell, Baraka internalizes the importance of recognizing people in positions of power and how to interact with them; a life lesson needed in almost every situation: family, friends, or the workplace.By the same token, authority figures in â€Å"Suicide’s Forgotten Victim† help the socialization of Keiski by allowing her to view the world in terms of how it affected her well-being. She says, â €Å"My own therapy has been immensely helpful, perhaps lifesaving† (96). Keiski’s repressed feelings grew stronger eating away at her conscious. She condemned herself for not having done anything to help prevent Sue from committing harm to herself. Keiski sought help from a psychiatrist whom gave her the support she needed, gingerly and sympathetically listening to Keiski’s issues.The therapeutic treatment of positive discussion allowed Keiski to think about herself and how she continuously handled the situation instead of worrying about her roommate and feeling guilty for not taking action to prevent such a travesty from occurring. It was helpful to Keiski in that she began to understand her why she was feeling the way she was. It can be argued that without having the support of the psychiatrist Keiski could have succumbed the pressure and guilt she felt and like Sue, have tried to end her life. That emotional outlet ultimately saved Keiski from herself and the personal guilt within her that built up.The authority figure, the psychiatrist, taught Keiski that she has to remember to consider herself and her own emotions when dealing with hardships in order to maintain good mental health. Not only do the peers and authority figures contribute to Baraka learning life lessons, society as a whole holds the many values and norms that vary from culture to culture. Baraka narrates a moment in time where he was on trial for supposedly cussing out a cop and making remarks about the cop’s father in a bank. Baraka countered stating African Americans focus on joking about mothers and the case was dismissed.From these societal experiences Baraka states, â€Å"I learned that you could keep people off you if you were mouth-dangerous as well as physically capable† (263). Away from the school or home setting, Baraka becomes exposed to values of society that may not have been so evident, such as racism. In society, it is important to be verball y educated. Not everything in life requires physical strength to overcome an obstacle. Baraka learned that words are just as powerful as physical abilities. He can get what he wants by persuading another by manipulating words and sentence structure.Language is used to convey rules, norms, and values amongst a group. It is main form of communication that exists. Baraka learns that life is based off previous statements about how to live, whether they are true or not. Without language, these ideals would not be able to be shared. Just like Baraka, society in Keiski’s â€Å"Suicide’s Forgotten History† society teaches life lessons on how to deal with the pressures of day-to-day interactions. The nature of society blames and points fingers when something goes wrong: â€Å"We, as a society, need to stop stigmatizing the friends and relatives of a suicide victim and start helping them† (94).The societal stigma that followed casted blame on Keiski for Sue’ s suicidal attempt, subjecting her to isolation. This stigma only promotes more grief, increases the recovery time, and discourages individuals from seeking help. Keiski argues that society needs to change its approach in deailing with suicide and suicide’s victim. Instead of pointing fingers and having scapegoats, society needs to give support and sympathy to families that have lost a love one to suicide. Keiski wants society to focus on prevention and intervention to allow families and friends to cope with their trama.Although â€Å"School† and â€Å"Suicide’s Forgotten Victim† tell the story of two distinctive individuals growing up, both account for strong life lessons learned in the process. Peers provide environments for individual to interaction and learn from one another. Authority figures give insight to the world at large through the experiences of their socialized minds. Society is the daily interaction of citizens in any environment exposing p eople to all the aspects that make up society. These are key agents in the development of norms and values in children throughout their growing period.

Saturday, September 28, 2019

Saphenous Vein In Varicose Veins Health And Social Care Essay

Aim: To find the efficaciousness of complete GSV denudation in footings of morbidity, nerve hurt and return rates. Methods: 42 patients with unsophisticated one-sided and/or bilateral varicosities affecting the great saphenous system were included in this survey. Patients with primary and/or recurrent varicose venas associated with active or cured ulcers, patients with bleeding diathesis and those who failed to subscribe the proforma for regular followups were excluded from this survey. Complete denudation of great saphenous vena up to the mortise joint, together with multiple phlebectomies was performed in all patients. Postoperatively, limbs were examined for complications like bruising, hydrops, wound site infections and centripetal abnormalcies. All the patients were followed up for the period of one twelvemonth for return and betterment in centripetal abnormalcies. Consequences: All the patients belonged to CEAP category 2 or greater. The average age of patients in this series was 33 old ages ( run 20-48 old ages, SD + 8.24 ) . There were 31 ( 74 % ) were males and 11 ( 26 % ) were females. Majority of the patients presented with blunt hurting in legs. 9 ( 21.4 % ) patients presented with bilateral varicosities affecting the GSV, whereas 20 ( 47.6 ) and 13 ( 31 % ) patients presented with right and left sided disease severally. 7 patients presented with some centripetal abnormalcies at foremost follow up. These were impermanent and spontaneously subsided within 4-6 hebdomads. None of the patient came back with return within a average follow-up period of one twelvemonth. Decision: We conclude that since lasting complication rates do non significantly differ from those secondary to knee degree denudation of GSV and with a low return, and reoperation rates, abandoning complete denudation of the saphenous vena to the mortise joint is non the right determination presently. Cardinal Wordss: G S V, entire denudation, saphenous nervus hurt Introduction: Varicose venas are the most common of all the vascular upsets that affect worlds. Visible varicose venas affecting great saphenous system ( GSS ) affect 10-15 % of work forces and 20- 25 % of women1. The purpose of the intervention for this awful disease is to obtain an acceptable consequence in footings of cosmetics and to alleviate patient & A ; acirc ; ˆâ„ ¢s ailments. Different mode of interventions for varicose venas include compaction stockings, froth sclerotherapy and assorted intravenous extirpation techniques 2-4 ; nevertheless the most acceptable intervention for primary varicose venas remains flush ligation of sephano-femoral junction, partial/complete denudation of Great Saphenous vena ( GSV ) and multiple phlebectomies5. Though serious complications are rather uncommon, the process may do considerable early morbidity, including bruising, cutaneal nervus hurt, hematoma, hurting and uncomfortableness in the inguen and leg, and hazard of lesion infection6,7. Limited articulatio genus degree denudation has been widely accepted as the gilded criterion operation for varicosities affecting the GSS. This attack is associated with important decrease in hurt to saphenous nervus. However, the hazard is non wholly eliminated as reported in different series8, 9. Restricted denudation of GSV to the articulatio genus degree on the other manus is associated with a high return in the residuary segment10. This completely nullifies the advantage of articulatio genus degree denudation of GSV and doing complete denudation of the vena up to ankle degree an attractive option. This prospective survey was designed to find the efficaciousness of complete GSV denudation in footings of morbidity, nerve hurt and return rates. MATERIAL AND METHODS: From July 2006 to June 2009, this prospective survey was carried out at Liaquat university infirmary and different private medical centres of Hyderabad metropolis. In entire, 30 patients with unsophisticated one-sided and/or bilateral varicosities affecting the great saphenous system were included. Patients with primary and/or recurrent varicose venas associated with active or cured ulcers, patients with bleeding diathesis and those who failed to subscribe the proforma for regular followups were excluded from this survey. The diagnosing and degree of incompetency were confirmed by manus held Doppler ultrasound. Informed consent was taken and patients were given autonomy to go forth the survey at any point without saying any ground.Operative Technique:All patients were operated under spinal block. Injection Cephradine 1gm was given as prophylaxis. The scratch was placed 2cm above the median melleolus. The Great saphenous vena ( GSV ) was identified and separated carefully from the chi ef bole of Saphenous nervus. Once stray, the GSV was ligated, and olive-head stripper was introduced through a rent in the distal portion and negotiated to the proximal portion. The distal leftover was cut and so ligated utilizing vicryl plus 2.0. Another 3-5cm scratch was made at the sapheno-femoral junction, 2 centimeter below and sidelong to the pubic tubercle. Feeders of GSV were identified and ligated. A little scratch was so placed at the tip of the stripper ; the vena was ligated utilizing vicryli? ‘ 1 and was so stripped from below-upwards. Multiple phlebectomies were done for big bunchs of venas as the state of affairs warranted. Wounds were closed utilizing vicryli? ‘ 000 for tegument and chromic 00 for hypodermic tissue. The limb was covered with elastic patch, applied in caudo-cranial way. Patients were encouraged for light walk on the first operative twenty-four hours and were discharged from infirmary on 2nd post-operative twenty-four hours in instance of u neventful recovery. The follow-up agenda was designed at 1st, 4th, 8th and 12th hebdomads of surgery. During each visit, limbs were examined for complications like bruising, hydrops, wound site infections and centripetal abnormalcies within the distribution of saphenous nervus utilizing cotton-stick. The abnormalcies were characterized as paresthesia and dysthaesia. All the patients were followed up for the period of one twelvemonth for return and betterment in centripetal abnormalcies. Consequence: All the patients belonged to CEAP category 2 or greater depending upon the badness of the disease. This is depicted in item in table I. Table I: Clinical Phase of the DiseaseCEAP ClassificationNo of Limbs ( n= 51 )PercentageClass 2 30 58.8 Class 3 14 27.5 Class 4 7 13.7 The average age of patients in this series was 33 old ages ( run 20-48 old ages, SD + 8.24 ) . Amongst 42 patients in entire, 31 ( 74 % ) were males whereas 11 ( 26 % ) were females. Majority of the patients presented with blunt hurting in legs, followed by dark spasms, weightiness on drawn-out standing. With comparative frequences, remainders of the symptoms are elaborated in table II. Table II: Symptom Profile of the PatientsSymptomsNo Of Patients ( n= 42 )PercentagePain 14 33.33 Night Cramps 09 21.4 Heaviness on Prolonged Standing 11 26.2 Rubing 06 14. 3 Skin Changes 01 2.4 Cosmetic Concerns 01 2.4 In this series, 9 ( 21.4 % ) patients presented with bilateral varicosities affecting the GSV, whereas 20 ( 47.6 ) and 13 ( 31 % ) patients presented with right and left sided disease severally. In entire, 19 limbs out of 51, showed bruising in station operative period, whereas 7 and 4 developed lesion infection and hydrops ( fig I ) . In this series, 7 patients presented with some centripetal abnormalcies at foremost follow up. Figure I elaborate these abnormalcies in item. They were impermanent and spontaneously subsided within 4-6 hebdomads. None of the patient came back with return within a average follow-up period of one twelvemonth. Figure I: Post-Operative Complications Discussion: Nerve hurt is a recognized morbidity after varicose vena surgery. The most normally affected nervus is the saphenous nervus, which is at hazard of hurt during denudation of the GSV, peculiarly when the vena is stripped to the ankle11. Complete denudation, nevertheless, is associated with a low return rate compared to knee degree denudation of the vein12, 13. The argument between complete denudation of the great saphenous vena ( GSV ) up to ankle versus partial depriving up to knee degree continues. The reported incidence of nerve hurt following GSV depriving varies between 23-58 % 9, 15, 16. This was a clinical survey with simple methodological analysis and consistent consequences. In this series, the centripetal abnormalcies were noted in 20 % patients. This is comparable with other surveies describing more or less the same incidence8, 10. Lofgren et al14 showed that GSV depriving from the inguen to the ankle brought good-to-excellent consequences in comparing to high ligation of the GSV entirely vis- & A ; Atilde ; -vis centripetal morbidity, with a success rate of 94 % and 40 % , severally. Dwerryhouse et al17 reported duplex-confirmed reflux in one one-fourth of limbs that underwent restricted denudation of the GSV, at the 5-year followup, connoting that this pathology might finally show itself as recurrent varicose venas. These findings besides suggest that Orthodox method of depriving the vena up to the articulatio genus may forestall the harm to sephanous nervus but at the cost of a high return rate. GSV depriving at mortise joint is besides being shown to better quality of life in early post-operative period7. We have observed that depriving in upward way, utilizing little olive can go through towards the inguens easy with less nerve harm. Cosmetic consequences were besides satisfactory. None of our patient came up with return during the mean follow up period of one twelvemonth. The restrictions of survey were comparatively little size and its descriptive methodological analysis. For the reflux in the full GSV ( inadequacy in the whole GSV ) , the intervention of pick is complete denudation of the GSV to the mortise joint with high ligation and phelebectomies because of low complication and return rates. Nerve hurt may happen after both complete and partial denudation and symptoms of nerve hurt are transeunt and mild. We conclude that since lasting complication rates do non significantly differ from those of other intervention methods evaluated along with high success, low return, and low reoperation rates, abandoning complete denudation of the saphenous vena to the mortise joint is non the right determination presently.

Friday, September 27, 2019

Journal Type Paper Essay Example | Topics and Well Written Essays - 2500 words

Journal Type Paper - Essay Example This paper shall discuss wildlife-based tourism, its attractions, and its negative and positive impact on wildlife, on the patrons, and Mother Nature in general. It shall discuss how it has successfully drawn in a largely European, middle class and affluent group of tourists to both the benefit and the detriment of the wildlife. In recent years, African safaris have become a very attractive activity for many tourists, but never more so than for the European, middle-class, and affluent ones. Big-game hunting, which is part of the African safari experience, has attracted many middle and high-class tourists from the Western hemisphere. These affluent tourists are very much willing to spend large amounts of their money in order to have the opportunity to get away from their normally stressful lives. These tourists also seek the thrill of being immersed in wilderness adventures while being able to relax in a more natural environment. They seek these adventures in order to relieve their stress and anxiety; in some instances to experience the spiritual and profound (Newsome, 2005). The big-game hunting sport usually culminates in the awarding of trophies for the best hunter among the participants, but this achievement usually plays a secondary role to the natural adventure that they get to experience through wildl ife-based tourism. This form of wildlife-based tourism is only seen in countries and areas with strict and capable monitoring measures in place. This ensures that big-game hunting does not unnecessarily endanger ecological balance and is safe for tourists. And the most important benefit on the part of the government and the locals is that big profit is coming in from this wildlife-based tourism. â€Å"Returns to governments accrue from land leases and trophy fees, apart from the indirect economic benefits of tourism† (Roth & Merz, 1997). This income flow is very much

Thursday, September 26, 2019

Massachusetts Board of Pharmacy Essay Example | Topics and Well Written Essays - 500 words

Massachusetts Board of Pharmacy - Essay Example acist who work in Massachusetts, should regulate his or her duty in such a way that they always follow and practise the required standard and ethics of the profession. The board also follows the duty of promoting, and protecting the public health and safety by implementing a proper pharmaceutical care to their citizens of Massachusetts. The function of the board involves, â€Å"The Board strives to assure consumers are receiving the highest quality prescription drug products from pharmacists who have graduated from accredited colleges of pharmacy. The Board also sets standards of quality assurance and best practices, requiring safe delivery systems in pharmacies licensed by the Board.†, says the administrative committee. More over the Massachusetts Board of Registration of Pharmacy has â€Å"The Board of Registration in Pharmacy licenses 9,902 pharmacists, 5,284 pharmacy technicians, 1,089 community/chain pharmacies, 7 nuclear pharmacies and 60 wholesale distributors in the Commonwealth† By looking at the function of the board it becomes quiet clear that the citizens of Massachusetts are at high safety and provided with full medical assistance by the board, more over there are lot of opportunities for the pharmacists who come out successfully from a strong educational background. The registration board of pharmacy of Massachusetts is found to have 9,902 pharmacists and more than five thousand pharmacy technicians are working, this clearly shows how much effort the board has put forth to implement the outcome and mission aims successfully. This would not only help the citizens to have a better and safe health, but also faith over the pharmacists. The role of a pharmacist is well defined by the board, because usually the pharmacists are considered as health professionals who should work according to supplying the exact prescription drugs to the patients. He should act according to the physician’s instructions. Becoming a pharmacist requires a basic educational

BUSN300 Unit 1IP Research Paper Example | Topics and Well Written Essays - 750 words

BUSN300 Unit 1IP - Research Paper Example Emission of harmful gases damages the ozone layer that is responsible for absorbing harmful radiations of the sun. This leads to increase in the overall temperature of earth’s atmosphere. The main culprit of global warming is carbon dioxide and its variants that are introduced in the earth’s atmosphere by human activities. The most potent argument given in this regard is that there is clear evidence that the temperature of the earth has increased over the last century. The temperature of the earth is increasing and this is creating climatic imbalance which has harmful effects for the natural habitat. People who consider global warming a serious threat argue that the change in climatic conditions of the world is clear evidence of the validity of global warming. Another reason why global reason is considered a serious issue by many is that icebergs all over the planet are melting. This melting of icebergs is leading to increase in the water levels of seas and oceans, and this can have disastrous effect on climate and natural life (Venkataramani, 2004). This has also led to the increase in occurrences of floods all over the world. Increase in water levels also creates imbalance of salty and fresh water in oceans which also leads to grave climatic issues. Melting of icebergs is also seen by many as proof of the existence of global warming phenomenon. Global warming is also considered a serious issue because it can be explained very well from the human activities in the 20th century. In 20th century, human beings have increases combustion of fossil fuels and in the same period earth’s temperature has increased. This correlation is considered by many as evidence that the phenomenon of global warming is real and can be explained through human activities in the 20th century. Many believe that global warming should not be taken seriously because the temperature of the world

Wednesday, September 25, 2019

Individual Research Project Sustainability and Food Essay

Individual Research Project Sustainability and Food - Essay Example This is because human beings are dependent to nature for its survivability. Thus, the need for human beings to preserve ecology and maintain it by regulating a healthy environment to live. Brundtland  (1987) stressed this when saying that sustainability is about maximizing resources without compromising the needs of future generations. This is recognizes the fact that nature is limited and that to sustain resources, people should be stewards of ecology. Harwood (1990) explicates that sustainability relates to agriculture where production of farm produce be done in methods or processes that ensures balanced utilization of resource and environment. Its should be complemented with social and economic design that upholds the standard of quality life (Pearce, Makandia & Barbier,1989) This is often manifested by producing goods that are organically-driven to preserve the fertility of the soil against commercial fertilizers and pesticides. Organic foods are perceived healthy and will not produce toxic enzymes that may affect human physiological system. Thus, sustainability is about preservation of ecosystems that are essential to life. This desire to sustain life substantially correlates with the kind of food served every meal. There were robust arguments which deliberated the vital significance of enhancing life by adopting a vegetarian lifestyle. Vegetarianism is a personal option, an ethical choice and a political statement. Often it is misperceived and thus, must be explicated in a wide range of health, ethical, religious, and historical issues on this perspective. The three basic vegetarian diets are lacto-ovo (milk, eggs included), lacto (no eggs), and vegan (no eggs, diary products or any foodstuffs made with eggs or dairy products). They abstain from food sourced from animal’s meat. Vegetarians were described as with lower weight, cholesterol level and blood pressures. Studies among dieticians

Tuesday, September 24, 2019

Analysis of Normal Accidents as described by Richard Bookstaber Essay

Analysis of Normal Accidents as described by Richard Bookstaber - Essay Example The best that an investor may get out of a bad investment is cost aversion. In the absence of this, the investor may be very certain that he or she would be running at a loss. In some cases, the choice of investment is not necessarily what constitutes a bad investment for an investor. Rather, it is the approach used in investing. So an investor may be selecting the best form of investment but he or she may be approaching the investment wrongly. This is exactly the point outlined by Bookstaber in his book, A Demon of our own. The writer is very concerned about approaches that are taken by investors because, in his opinion, a series of tightly coupled processes may only lead to normal accidents, which not as the name suggests, may be very disastrous. Normal Accidents Explained In his writing, Bookstaber describes normal accidents in relation to financial forces. The writer first uses scenarios of other forms of forces to explain his arguments of normal forces. The writer notes that â⠂¬Å"if you put in an extra warning light or sensor on a nuclear reactor or an aeroplane, that's one more thing that could fail, causing confusion and a disastrous cascade of cause and effect† (Fitch, 2009). In the words of Fitch (2009), the situation causes â€Å"investors to bet on stocks, bonds and interest rates, often with a large degree of leverage.† The resulting consequence for such decisions is that there have been derivatives that have led to high levels of complexities in the financial system and this has led to normal accidents (Bookstaber, 2008, pg. 143). The concept of normal accidents as introduced by Bookstaber could, therefore, be related to the everyday concept of putting all of a person’s eggs in one basket. It is known that the resulting effect of such an action is that once the basket breaks the fellow losses all the eggs. In the financial sector, once investors become overconfident in their investment and channel all their funds to a single domain, the resulting effect is tight coupling and complexity Indeed, â€Å"the combination of tight coupling and complexity is a formula for normal accident† – especially when the structure of the fin ancial system cannot handle the complexity. (Bookstaber, 2008, pg. 256). Tightly Coupled Processes in the Financial Sector In page 256, introduces a concept of the structure of the system when he says that normal accidents are â€Å"accidents that are all but evitable as a result of the structure of the system.† The idea that this piece of information creates is that normal accidents are actually often influenced by the prevailing financial structures and system. Indeed, it is when the financial sector gets tightly coupled that investment decisions by investors may result in normal accidents.  

Monday, September 23, 2019

Enlightening English Language Learners Essay Example | Topics and Well Written Essays - 2000 words

Enlightening English Language Learners - Essay Example As the study stresses  lack of resources is a constant challenge cited especially in the midst of budget cuts and the current financial recession we are recovering from. In practice, English Language Learners need additional funding in order to make it possible to provide a numerous facilities to ensure students are successful in learning the English Language. To this end, it has been observed that additional funding has been allocated. The funding formula is complex and is based on composite calculations. Simplistically, every English Language Learner receives, approximately, an additional allocation of $3,300 per year.From this paper it is clear that  some important factors seldom discussed in educational programs for English Language Learners are the lack of knowledge about how to educate them effectively, lack of teachers licensed for the teaching of ESL, lack of content that teachers prepared to educate newcomers, and the lack of understanding of how a second language is lea rnt. The educators are a product of educational institutions that fail to prepare teachers to educate urban students and in particular, English Language Learners. This becomes the root cause of ineffective current program implementation within our schools.  This could be interpreted as a knowledge gap ranging from the teacher to the administrator, resulting in the inability to successfully teach the English Language Learners.

Sunday, September 22, 2019

Symbolized and What it Meant to America Essay Example for Free

Symbolized and What it Meant to America Essay Though the negative preconception of the general American public was the widely carried message of newspapers before and during the early days of the said event, this is not what was covered by Colliers article since it was released during the last day of the event already. Therefore, what the article presented as the sentiment of America for the event, in the context of what happened during the supposedly last day of the event, was that of respect and commendation over the behavior of the hundred thousands youths who attended the event. This is exemplified by the same paragraphs in the previous page that Collier used to convey a positive image for the event. If we are to extract the American sentiment over the event from those few that were interviewed for the article, it could be viewed that America was surprised by and approved of the behavior of the participants, which was characterized by astonishing courtesy, order, and harmony. Coming from an explicit expectation of negative behavior from the youth who were going to attend the event, it could have really been such a pleasant surprise to America that the youth was able to rise above all their preconceived notions. However, it would be also reasonable to imagine that along with the positive perception of the American public over the relative success of the event was the concern over what was revealed the prevailing culture of drugs among the youth. With the reports of the event showcasing how drugs adversely affects the health of the youth and even lead to death and how the youth blatantly welcome such practices and even treats it as a culture, there is little argument that the rest of America who are not part of the said generation and culture is worried over the possible results of such a phenomenon in the long run. Thus, basing from Collier’s article, it could be said that America’s perception of the event could have been a mixture of both positive and negative things. Positive in terms of respect over the triumph of the American youth in staging such a peaceful display of unity, and negative in terms of their concern over the impending effect of the youth’s blatant drug practices. However, the respect for the youth and their generation’s culture that has been planted by the event in the hearts and minds of the American people is something that could not be erased for generations to come. A. What the Event Symbolized and What it Meant to America In Collier’s article, what was portrayed as the symbolism of Woodstock for those who participated in it was â€Å"an incredible unification† of people. Woodstock, for the youth who attended it, was the fulfillment of their thrilling expectation of being able to meet strangers who shared their practices, beliefs, and culture. The event was also a fulfillment of the youth’s eagerness to experiment with drugs along with all the other people of their generation. This is based form a paragraph in Colliers article . As for the rest of America who were not there at Woodstock and who were not part of the culture that Woodstock fostered, the event could still have symbolized a positive thing. For them, Woodstock could have been a symbol that though the youth of America have been practicing a culture entirely different from that of the previous generations, that does not mean that the generation was of no good. Woodstock could have well been a symbol that the youth of that day deserved to be respected for being the beautiful people that they are and for the beautiful things that they are able to do, beyond the prejudice that they have been faced with. For America, Woodstock could have meant that where their youth puts their heart into, there would also be peace, harmony, and beauty.

Saturday, September 21, 2019

Overview of VPN Evolution of Private Networks

Overview of VPN Evolution of Private Networks Before the emergence and popularity virtual private networks have gained as a secure and cheaper medium for sensitive information to be accessed and transmitted between two or more corporate network over a public network such as the internet, other network technologies have been innovated and used to connect within business sites and across to other sites that are miles away from each other. In the sixties, sites were connected together to enable data transfer through the use of analog phone lines and 2,400-bps modems leased from ATT, businesses had no other faster modems they could choose from because the telephone companies were controlled by the government. It was not until the early eighties that businesses were able to connect to sites at higher speed using 9,600-bps modems because other telephone companies emerged as a result of the changes in government control and policy on telephone. During this period, there were not much mobile workers besides the modem links were static not as dynamic as what is available now. The analog phone lines were permanently wired to the sites and were specially selected lines (called conditional lines) that were specifically built for full time use by companies; these lines are different from regular phone lines. This technology ensured full bandwidth and privacy but this came at a great cost, i.e. payment is expected for the full ba ndwidth even if the line was used or not. Another innovation that was used for connecting sites which came out in the mid 1970s was the Digital Data Service (DDS). This was the first digital service with a connection of 56 Kbps and was used for private line. This service later became a major and useful innovation for wide area networks, which grew into other services that are popularly used today such as the T1 service which consists of 24 separate channels and each can carry up to 64 Kbps of either data or voice traffic. In the late 1970s the idea of VPN was initiated with the introduction of an innovation called the X.25. It is a Virtual Connection (VC) form of WAN packet switching which logically separates data streams. With this function, the service provider is able to send as many point-to-point VCs across a switch network infrastructure, depending each endpoints have a device that facilitates communication in the site. Sometime in the early 1980s, X.25 service providers offered VPN services to customers (i.e. businesses) who used network protocols at the time as well as early adopters of TCP/IP. Over years, in the 1990s other networking technologies were deployed for connecting private networks such as the high speed Frame relay and Asynchronous Transfer Mode (ATM) switching. This networking technologies were provided to give virtual connection to businesses at the speed of up to OC3 (155 Mbps). The components for setting up this kind of technologies involved the use of customer IP routers (customer premise equipment, or CPE) interconnected in a partial or full mesh of frame relay or ATM VCs to other CPE devices, in other words less equipments are needed for its set up. – Metz, C. (2003). Based on some definitions and some researchers like Mangan, T. (2001), the frame relay and ATM technology are referred the standard for VPN technology. These technologies gained so much popularity after the leased line in connecting sites and they were also easy to set up. With the increasing speed at which businesses grow and expand globally, thereby allowing staffs to be mobile and work offsite, the frame relay is not the best technology to use for remote access since it is just an overlay technology. In as much as the leased line is a better technology alternative for connecting business sites, it is excessively expensive to be owned. With the advent of the internet and its wide use in everyday transaction, businesses have adopted the technology for transmitting and accessing data across various sites by implementing a VPN connection, which is relatively cheap, flexible and scalable, between both sites in order to secure the data that are sent across the insecure internet from being tampered by unauthorized persons. VPN definition There are various definitions of a Virtual Private Network (VPN) which are given by various vendors which best describes their products. Several books, journals, whitepapers, conference papers and internet sites have various definitions of what the technology is, and these definitions are usually put in different words and sentence structure but mostly they say the same thing. In order to get a good understand of what the technology is all about, definitions given by several people from different sources will be looked at and a concise definition will be formulated from all definitions that will be used throughout this research work. â€Å"A virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organizations network.† SearchSecurity.com (2008). â€Å"A VPN is a group of two or more computer systems, typically connected to a private network (a network built and maintained by an organization solely for its own use) with limited public-network access that communicates securely over a public network.† (Calsoft labs whitepaper, 2007) Aoyagi, S. et al. (2005) A Virtual Private Network (VPN) enables a private connection to a LAN through a public network such as the Internet. With a VPN, data is sent between two nodes across a public network in a manner that emulates a dial-link. There are two types of VPN systems, one is used for connecting LANs across the Internet, and the other is used to connect a remote node to a LAN across the Internet. â€Å"A VPN tunnel encapsulates data within IP packets to transport information that requires additional security or does not conform to internet addressing standards. The result is that remote users act as virtual nodes on the network into which they have tunnelled.† – Kaeo, M. (2004) p135. â€Å"A VPN is a virtual network connection that uses the internet to establish a connection that is secure.† Holden, G. (2003), p 286. â€Å"A VPN uses a public network, such as the internet, to facilitate communication; however it adds a layer of security by encrypting the data travelling between companies and authenticating users to ensure that only authorized users can access the VPN connection†. Mackey, D. (2003) p157 Randall, K. et al. (2002), p377 likened a Virtual Private Network (VPN) to a Tunnel Mode, as a means of transmitting data between two security gateways, such as two routers, that encrypts the entire IP packet and appends a new IP header entering the receiving gateways address in the destination address. â€Å"VPNs enable companies to connect geographically dispersed offices and remote workers via secure links to the private company network, using the public Internet as a backbone.† Lee, H. et al (2000) Looking at all these definitions closely from various authors, they all stress on security and connectivity. These are the essential features of VPNs because they are able to create a connection between two private networks over a public network by encapsulation and tunnelling protocols in transmitting data and also provide security by encryption and authentication in order to control access to data and resources on the company’s network. In other words a VPN is a network technology that securely connects two or more private networks over an insecure public network such as the internet, so as to enable internal access to files and resources and data transfer. Types of VPN There are three different VPN connectivity models that can be implemented over a public network: Remote-access VPNs: It provides remote access to an enterprise customer’s intranet or extranet over a shared infrastructure. Deploying a remote-access VPN enables corporations to reduce communications expenses by leveraging the local dial up infrastructures of internet service providers. At the same time VPN allows mobile workers, telecommuters, and day extenders to take advantage of broadband connectivity. Access VPNs impose security over analog, dial, ISDN, digital subscriber line (DSL), Mobile IP, and cable technologies that connect mobile users, telecommuters, and branch offices. Intranet VPNs: It links enterprise customer headquarters, remote offices, and branch offices in an internal network over a shared infrastructure. Remote and branch offices can use VPNs over existing Internet connections, thus providing a secure connection for remote offices. This eliminates costly dedicated connections and reduces WAN costs. Intranet VPNs allow access only to enterprise customer’s employees. Extranet VPNs: It links outside customers, partners, or communities of interest to an enterprise customer’s network over a shared infrastructure. Extranet VPNs differ from intranet VPNs in that they allow access to uses outside the enterprise. VPN configurations There are two main types of VPN configurations for deploying the VPN connection over a public network. These are; Site-to-site VPNs: This is sometimes referred to as secure gateway-to-gateway connections over the internet, private or outsourced networks. This configuration secures information sent across multiple LANS and between two or more office networks and this can be done effectively by routing packets across a secure VPN tunnel over the network between two gateway devices or routers. The secure VPN tunnel enables two private networks (sites) to share data through an insecure network without fear that the data will be intercepted by unauthorized persons outside the sites. The site-to-site VPN establishes a one-to-one peer relationship between two networks via the VPN tunnel Kaeo, M. (2004. Also Holden, G. (2003), describes a site-to-site VPN as a link between two or networks. This is mostly used in Intranet VPNs and sometimes in extranet VPNs. Client-to-Site VPNs: This is a configuration that involves a client at an insecure remote location who wants to access an internal data from outside the organization network’s LAN. Holden, G. (2003) explains a client-to-site VPN as a network made accessible to remote users who need dial-in access. While Kaeo, M. (2004) defined a client-to-site VPN as a collection of many tunnels that terminate on a common shared end point on the LAN side. In this configuration, the user needs to establish a connection to the VPN server in order to gain a secure route into the site’s LAN and this can be done by configuring a VPN client which could either be a computer operating system or hardware VPN – such as a router. By so doing, the connection enables the client to access and use internal network resources. This kind of configuration is also referred to as secure client-to-gateway connection. This is usually used in access VPNs and sometimes in extranet VPNs. VPN Topology VPN Components To create a VPN connection between sites or networks, it involves the use of some components. These components however contain some elements that need to be properly set up in order to aid the transmission of data from one network endpoint to another. These elements include: VPN server: This is either a computer system or router configured to accept connections from the client (i.e. a remote computer) who gains access by dialling in or connecting directly through the internet. This serves as one endpoint of the VPN tunnel. VPN client: This can either be a hardware based system; usually a router that serves as the endpoint of a gateway-to-gateway VPN connection, or a software based system; either an inbuilt or downloaded software program on the computer operating system that can be configured to function as an endpoint in a VPN, such as Windows XP, 2000 or vista or checkpoint client software. Tunnel – this is the link between the VPN server and client endpoints through which the data is sent. VPN protocols – These are set of standardised data transmission technologies the software and hardware systems use to create security rules and policies on data sent along the VPN. Types of VPN Systems The VPN components form the endpoints of the VPN connection from one private network to another through the public network. The choice of what components to use is dependent on various factors such as the size of the organization – is it a small, large or growing organization, the cost involved in implementing a VPN either by using new components or existing components and lastly, the choice of which of the components will is best for the connection. There are three components that can be used to set up a VPN connection, also a combination of any of these components can be used to set up a VPN connection. One way to set up a VPN is to use Hardware device. The hardware device is a VPN component that is designed to connect gateways or multiple LANS together over the public network by using secure protocols to ensure network and data security. There are two devices that are commonly used that perform these functions. One typical hardware based VPN device used is a router, which is used to encrypt and decrypt data that goes in and out of the network gateways. Another device is a VPN appliance, its objective is to terminate VPNs connection and join multiple LANs (Holden, G. 2003). This device creates a connection between multiple users or networks. The VPN hardware devices are more cost effective for fast growing organizations since they are built to handle more network traffic. It is a better choice when considering the network throughput and processing overhead. It is also a good choice when the routers used at each network ends are the same and controlled by the same organization. Another way to set up a VPN is to use a Software based component. The software component is a program, otherwise stored on the operating system of the system, which can be used to set up a VPN connection. It is easy to configure and more flexible and cost effective than the hardware VPN. They are suitable in networks that use different routers and firewalls or are best used between different organizations and network administrators – such as partner companies. The software VPNs allow traffic to be tunnelled based on address or protocols unlike hardware-based products, which generally tunnel all traffic that it handles. But software-based systems are generally harder to manage than hardware based systems. They require familiarity with the host operating system, the application itself, and appropriate security mechanisms. And some software VPN packages require changes to routing tables and network addressing schemes (Calsoft labs whitepaper, 2007). The third component, is the Firewall based VPN; it makes use of the firewall’s mechanisms as well as restricting access to the internal network. This kind of component ensures that the VPN traffic passes through the network gateway of the desired destination and non-VPN traffic is filtered according to the organization’s security policy, this is achieved by it performing address translation, making sure that requirements for strong authentication are in order and serving up real-time alarms and extensive logging. These three components can be combined together to set up a VPN in order add layers of security on the network. This can be a combination of hardware and software VPN or a combination of all three in the same device. There are several Hardware based VPN packages that offer software –only clients for remote installation, and incorporate some of the access control features more traditionally managed by firewalls or other perimeter security devices (Calsoft labs whitepaper, 2007). An example of such device is the Cisco 3000 Series VPN concentrator which gives users the option of operating in two modes: client and network extension mode. In the client mode the device acts as a software client enabling a client-to-host VPN connection while in the extension mode it acts as a hardware system enabling a site-to-site VPN connection. Also a combination of all these components by different vendors can be used to set up a VPN connection, but this comes with some challenges. The solution as proposed by Holden, G (2004) is to use a standard security protocol that is widely used and supported by all products. VPN Security Features The main purpose of VPN is to ensure security and connectivity (tunnel) over a public network and this cannot be done without some key activities being performed and policies set up. For VPNs to provide a cost–effective and better way of securing data over an insecure network it applies some security principles/measures. Data sent over the internet using the TCP/IP rule are called packets. A packet consists of the data and an IP header. The first thing that happens to a data being sent across a VPN is that it gets encrypted at the source endpoint and decrypted at the destination endpoint. Encryption is a method of protecting information from unauthorised persons by coding the information that can only be read by the recipient. The method, encryption, is done by using an algorithm which generates a key that allows information to be coded as unreadable by all and only readable to the recipient. The larger the number of data bits used to generate the key, the stronger the encryption and the harder it can be broken by intruders. Data encryption can be done in two ways; it can either be encrypted by transport mode or tunnel mode. These modes are process of transmitting data securely between two private networks. In transport mode, the data part (otherwise known as the payload) of the IP packet is encrypted and decrypted but not the header by both endpoint hosts. While in the tunnel mode both the data part and header of the IP packet are encrypted and decrypted between the gateways of the source computer and the destination computer. Another security measure implemented by VPN on data is IP Encapsulation. The VPN uses the principle of IP encapsulation to protect packets from being intercepted on the network by intruders by enclosing the actual IP packet in another IP packet having the source and destination address of the VPN gateways, therefore hiding the data being sent and the private networks IP address which â€Å"does not conform to internet addressing standards†. The third security measure is Authentication. This is a method of identifying a user by proving that the user is actually authorized to access and use internal files. Authenticating a, host, user or a computer that uses the VPN depends on the tunneling protocol established and also encryption for added security. The tunneling protocols that are widely used for authentication over a network are IPSec, PPTP, LT2P and SSL but the most commonly used is the IPSec. The hosts using VPN establish a Security Association (SA) and authenticate one another by exchanging keys which are generated by an algorithm (mathematical formula). These keys can either be symmetric key which is a private key that are exactly the same and only known by the hosts to verify the identity of one another or asymmetric key where each hosts has a private key that can be used to generate a public key. The sending host uses the other’s public key to encrypt information that can only be decrypted by the receiving host private key. The Point-to-Point Tunneling Protocol uses the Microsoft Challenge/Response Authentication Protocol (MS-CHAP) to authenticate computers using VPN by exchanging authentication packets to one another. Also the users connecting to VPN can be authenticated by what the user knows- a password (shared secret), what the user has – a smart card and what the user is – biometrics e.g. finger prints. VPN Tunnelling Protocols VPNs create secure connections, called tunnels, through public shared communication infrastructures such as the Internet. These tunnels are not physical entities, but logical constructs, created using encryption, security standards, and protocols Clemente, F. et al (2005). The VPN tunnelling protocol are set of standardised rules and policy that are employed on the transmitted data. There are various standard of protocol technologies used to create a VPN tunnel and each of these protocols is specially built with some unique security features. In this research work the protocols explained in this section are the most widely used. Internet Protocol Security (IPSec) The Internet Protocol Security (IPSec) has proposed in Internet Engineering Task Force (IETF) Request for Comment (RFC) database in RFC (2401), provides data packet integrity, confidentiality and authentication over IP networks. The IPSec policy consists of sets of rules that designate the traffic to be protected, the type of protection, such as authentication or confidentiality, and the required protection parameters, such as the encryption algorithm. (Jason, K. 2003, Hamed, H. et al 2005, Shue, C. et al 2005, Berger, T. 2006, Clemente, F. et al 2005, Liu, L. and Gao, W. 2007). The IPSec protocol provides security at the network layer and offers a collection of methods, protocols, algorithms and techniques to establish a secure VPN connection. There are two basic modes of IPSec connections, Transport mode and Tunnel mode. The transport mode, attaches an IPSec header to the IP header of the packet. The Tunnel mode is more flexible compared to the transport mode; it encapsulates the IP packet into another IP packet, also attaching an IPSec header to the outer IP packet. This mode protects the entire IP packet. The IPSec modes, are determined and agreed on by both corporate networks at each end of the VPN connection, are contained in the Security Association(SA) among other things. The SA is a set of policy and keys used to protect information such as the IPSec modes, symmetric ciphers, and keys which are used during secure data transmission. The IPSec uses two main protocols that are usually used with any of the modes, the Authentication Header (AH), and Encapsulating Security Payload (ESP). The authentication header contains a Security Parameter Index(SPI) and provides data authentication and integrity (MD5 or SHA-1 hash) on the whole IP packet but does not guarantee privacy (confidentiality) on the data. ESP guarantees privacy (confidentiality) on the data in addition to all the features AH provides. The ESP header includes an initialization field, which is used by symmetric block ciphers (Berger, T. 2006). Another essential protocol that IPSec uses in establishing the VPN tunnel is the Internet Key Exchange protocol (IKE). This protocol exchanges encryption keys and shares authentication data (RFC 2409) through UDP packets at port 500, and also relies on the Internet security association and key management protocol(ISAKMP) – this protocol allows both endpoints share a public key and authenticate themselves with digital certificates (RFC 2408). To create a VPN tunnel using the IPSec protocol, two things needs to be done. First, both networks need to agree on the SA for the IKE and this is done by using the Diffie – Hellman key exchange method to authenticate one another. After this is done, both network endpoints need to set the parameters for the VPN tunnel including symmetric cipher keys (and key expiry information), security policy, network routes, and other connection-relevant information. Point-to-Point Tunneling Protocol (PPTP) Point-to-Point Tunneling Protocol (PPTP) is a network protocol that enables the secure transfer of data from a remote client to a private enterprise server by creating a virtual private network (VPN) across TCP/IP-based data networks (Microsoft TechNet, 2008). PPTP operates at Layer 2 of the OSI model. PPTP, as specified in the RFC 2637 document, is a protocol that describes a means for carrying Point-to-Point protocol (PPP) – described in RFC 1661 – over an IP based network. It is created by a vendor consortium known as the PPTP industry forum which includes Microsoft Corporation, Ascend Communications, 3Com/Primary Access, ECI Telematics, US Robotics and Copper Mountain Networks. PPTP is the most commonly used protocol for dial-up access to the internet. Microsoft included PPTP support in Windows NT Server (version 4) and released a Dial-up Networking pack in Windows 95 and since then PPTP is supported in any Microsoft Windows version. The PPTP transfers two different types of packets over a VPN connection. The first is the Generic Routing Encapsulation (GRE) (described in RFC 1701 and RFC 1702) packet. It encapsulates PPP frames as tunneled data by attaching a GRE header to the PPP packet or frame. The PPP frame contains the initial PPP payload which is encrypted and encapsulated with PPP while the GRE header contains various control bits, sequence and tunnel numbers. The function of the GRE is to provide a flow- and congestion-control encapsulated datagram service for carrying PPP packets. The total sum up of the packet consists of a Data link header, IP header, GRE Header, PPP Header, Encrypted PPP payload and Data link trailer. The second type of packet is the PPTP control message or packet. The PPTP control packet includes control information such as connection requests and responses, connection parameters, and error messages and it consists of IP header, TCP header, PPTP control message and a data link traile r. In order to create, maintain and terminate the VPN tunnel, the PPTP uses a control connection between the remote client and the server using the TCP port 1723. This two different packets used by PPTP does not ensure privacy on the packet payload, so in order to enhance security on these packets, the PPTP supports encryption and authentication method same as used in PPP connections (Berger, T, 2006 and vpntools.com, 2006). To authenticate packets that pass through the VPN tunnel, PPTP uses any of the following protocols; Extensible Authentication protocol – Transport Layer Security (EAP-TLS), Microsoft Challenge Handshake Authentication Protocol (MS-CHAP), Shiva Password Authentication protocol (SPAP) and Password Authentication Protocol (PAP). For encryption, PPTP uses either the Microsoft Point to Point Encryption (MPPE) to encrypt PPP packets that passes between the remote computer and the remote access server by enhancing the confidentiality of PPP encapsulated packets (as described in RCF 3078) or uses the symmetric RC4 stream cipher to encrypt the GRE payload is encrypted. Layer 2 Tunneling Protocol (L2TP) The L2TP is an IETF standard established as a result of combining the best features of two protocols: Cisco’s Layer 2 Forwarding (L2F) protocol (described in RFC 2341) and Microsoft’s PPTP (Cisco Systems, 2008). L2TP facilitates the tunneling of PPP frames across an intervening network in a way that is as transparent as possible to both end-users and applications (RFC 2661). L2TP encapsulates the PPP packet (whose payload can either be encrypted or compressed or both can be done) into a User Datagram Protocol (UDP) packet at transport layer. The L2TP can be used over the internet as well as over private intranet and also can send PPP packets over X.25, Frame relay or ATM networks. The UDP packet consists of the following in this order: UDP header with source and destination address using port 1701, control bits representing options like version and length of the packet, sequence number and tunnel ID fields which is used to track the packet and identify the tunnel, the l ayer 2 frame which contains the following also: Media Access Code (MAC) addresses and the payload. To ensure security and enhance authenticity of the L2TP packet it is combined with IPSec by attaching an IPSec ESP header, using the IPSec transport mode. After combining IPSec to L2TP, the UDP packet is encrypted and encapsulated with an IPSec ESP header and trailer and ESP authentication trailer. The L2TP packet now consists the following: data link header, IP Header, IPSec ESP Header, UDP header, L2TP frame, IPSec ESP trailer, IPSec ESP Authentication trailer and Data Link trailer, resulting in excessive protocol overhead (Berger, T, 2006 and vpntools.com, 2006). Secure Socket Layer (SSL) Multiprotocol Label Switching Literature Review VPN Protocol Overhead The tunneling protocols also affect the performance of the network by adding processing overhead on the VPN connection. Implementing these secure technologies on any insecure public network like the internet comes with some weaknesses and this can be as a result of either the specific standards are not sophisticated enough to provide secure, stable and fast data links, or interaction with lower levelled protocols causes serious problems (Berger, T., 2006).For example the IPSec technology employs three kinds of protocols namely AH, ESP and IKE; in order to ensure security over the public network, this in turn adds overhead on the packet being sent. The IPSec uses two modes for transferring packets: transport and tunneling mode. The tunneling mode is the widely used because the tunnel can be used to access several resources and it encapsulate and encrypts all part of the IP packet within another IP packet. In a research paper by Shue, C. Et al (2005), an analysis was carried out in ord er to evaluate the performance of the overhead associated with IPSec on VPN servers, and the tunneling mode was used. The tunneling mode uses different technologies to ensure added security on the packet: it uses two different kinds of protocols namely ESP and IKE and various encryption algorithm and cryptographic key sizes, by so doing doubling the size of the packet. It is reported that overheads of the IKE protocol are considerably higher than those incurred by ESP for processing a data packet, also cryptographic operations contribute 32 − 60% of the overheads for IKE and 34 − 55% for ESP, and lastly, digital signature generation and Diffie-Hellman computations are the largest contributor of overheads during the IKE process and only a small amount of the overheads can be attributed to the symmetric key encryption and hashing. Also the layer 2 Tunneling Protocol (L2TP) implemented on the VPN connection originally does not cause any overhead since encryption, authentication and privacy mechanism is not used on the data packet. But when this protocol is combined with IPSec, it adds all the aforementioned mechanism on the packet and makes it very secure but this comes with added problems – protocol overhead, among other things. In this case both the IPSec and L2TP headers are added to the data packet which increases the size of the packet and by so doing, it decreases the VPN performance. (Berger, T., 2006) The Internet, the Problem. There are some articles and journals that clearly argues that VPN does not directly incur processing overhead on the network instead the internet affects the performance. According to an article that was posted on the internet by VPN Consultants in San Francisco Bay Area on FAQ on Security, it was argued that most performance slowdowns will in fact result from inconsistent Internet connections rather than by encryption processing overhead. Also, according to Liu, L. and Gao, W. (2007), explains that IPv4 ( this is an internet protocol that is widely deployed) based networks have inherent deficiencies which have become obstacles to the evolution of networks. They argue that VPNs implemented on the network i.e. the internet automatically inherits some of these problems, such as, big overhead of the net-transport, lack of quality assurance of Service (QoS), NAT traversing problem, and so on. They propose that VPNs implemented on IPv6 (Internet Protocol version 6), which is known as â€Å"the next generation protocol† can solve this problems effectively. Packet Loss A VPN tunnel can sometimes suffer high packet loss and reordering of packets problems. Reordering can cause problems for some bridged protocols, and high pack

Friday, September 20, 2019

Should We Continue To Commemorate Wars? :: essays research papers

Should we continue to commemorate wars? Discuss with reference to specific examples. Throughout the course of this essay I will be discussing whether or not we should continue to commemorate wars, I will be mainly referring to Armistice Day and Remembrance Sunday as my examples because these are the biggest commemorations for any of the wars in British history. Among all of the ceremonies and silences that occur throughout the year, there is still a tendency for people to forget what they are commemorating and remembering. When we commemorate wars, for example on remembrance weekend, we are remembering tens of thousands of people who died defending the country against evil; we also remember the people who these people loved and the loss that they encountered. We commemorate Armistice Day because it is 80 years to the day since World War One ended and the two-minute silence is to commemorate this. The silence, says the Royal British Legion, is "to remember the brave men and women who fought so courageously and with such sacrifice to secure the freedom which you and I enjoy today". On Remembrance Sunday there is another two minutes silence at eleven o’clock. The poppies worn and laid are a mark of respect for those who have died in wars everywhere in our name. Also a march past by veterans from wars symbolises the suffering and pain that goes on everywhere today and that is endured by some many. Commemoration is a time to reflect on the fact that our entire way of life is predicated on the sacrifices and courage of those that came before us and fought for our respective nations. It takes more courage than most of us can imagine risking ones life for an intangible goal such as victory for a nation. It has long been held that we should honour our past soldiers, to that honour I say that we should add thanks and deference. I think that commemorations should be an opportunity for all people but especially the young to thank and be grateful for the service of the forces and civilians during both the world wars. The sacrifices made and that are still having to be lived with by some should never be forgotten These commemorations means to me a time when the memories of those soldiers who gave their lives for the causes of peace are appreciated by people who have benefited from this.

Thursday, September 19, 2019

Positives of TV :: Television

Many years ago, almost no one had a television set. Now there are more houses with TV than ever. There is a lot of discussion about whether television is a good or bad influence for family life. There are many negative points and also many positive ones. Now I will run through some of each. One of the first reasons why parents should limit the amount of time their children spend watching TV is that children read less and watch TV more and of course this will lead into a lack of exercise. Therefore parents should help their children watch TV and read equally. Plus encourage them to move a lot due to the increase in number of obese people and practice other activities. Another complaint is that there is too much violence and sexual reference that can be accessed easily by children, this can destroy a young child's mind easily. Watching violent television programs teaches aggressive attitudes and behaviors and the children might try to imitate the bad behavior that these programs show, and bad expression because they wants to act like them as adults by thinking this is the right thing. Moreover, parents must have control and know what programs their children are watching. TV has many positive points, as it is considered an extremely valuable machine that provides us with relaxation and education. For example, People who have been working hard all day will look forward to watch an episode of a favorite show. This period of relaxation will reduce their stress and leaves viewers refreshed and ready to take all works again. Besides it?s a good option for parents who are tried trying to entertain their kids, to sit them down in front of a cartoon to take some rest. However it must not be done frequently. Secondly, the most important point about television is getting education. Children can learn colors, numbers, and letters from programs that shows on televisions like Barney. Also, it provides us with valuable information by covering important events and current news.

Wednesday, September 18, 2019

Percy Shelley and His Use of Romantic Elements Essay -- Literary Analy

Romanticism, an intellectual and cultural movement during the late 18th to 19th century that followed the Age of Enlightenment, could be described as a rebellion against the social and political norms of the aristocratic society. Merriam-Webster defines Romanticism as â€Å"a literary, artistic, and philosophical movement originating in the 18th century, characterized chiefly by a reaction against neoclassicism and an emphasis on the imagination and emotions (Romanticism)†. Historians oftentimes have reflected upon the conscious rejection of conventional societal manners as a characteristic of young poets (Spielvogel 657). Contrary to the rationalistic approach to thought that was typical of the Age of Enlightenment, Romantic literature focused upon human emotion, freedom of thought, individualism, self-reflection and the adoration of the ordinary. Romantic poetry also served as a way to express one of the foremost â€Å"characteristics of Romanticism: love of natureâ₠¬  (Spielvogel 658.) Intuition, free expression of emotion and thought, a return to the sacramental connection with nature and the belief in the goodness of humankind were all critical elements within much of the literature of this time. Percy Bysshe Shelley, a classic example of a Romantic poet, contributed immensely to the legacy of Romanticism. Critical writer Tel Asiado states, â€Å"[h]is poems over flow with intense emotional and radical ideas† (Asiado). During Shelley’s life, he composed many impressive works of poetry that were characterized by the freedom of thought, human emotion, individualism, reflection on the past, thoughts on humanity and dynamic power of nature. Although Matthew Arnold labeled him an "ineffectual angel," 20th-century critics have taken Shelley s... ...tions of Literature. Port Washington, NY: Kennikat, 1965. Print. Hesse, Hermann, Egon Schwarz, and Ingrid Fry. Siddhartha, Demian, and Other Writings. New York: Continuum, 1992. Print. Mazzeno, Laurence W. "Ode To The West Wind." Masterplots II: Poetry, Revised Edition (2002): 1-2. MagillOnLiterature Plus. Web. 21 Apr. 2012. McLean, John L. "Percy Bysshe Shelley." Magill’S Survey Of World Literature, Revised Edition (2009): 1-7. MagillOnLiterature Plus. Web. 21 Apr. 2012. "Note On Poems Of 1818, By Mrs. Shelley." [Notes...by Mary Shelley]. Web. 17 Apr. 2012. . Raymer, John. "Ode To The West Wind." Masterplots, Fourth Edition (2010): 1-2. MagillOnLiterature Plus. Web. 12 Apr. 2012. Spielvogel, Jackson J. Western Civilization: A Brief History, Volume 2. Seventh ed. Vol. 2. Boston: Cengage Learning, 2010. Print.

Tuesday, September 17, 2019

Analysis of learning outcomes with web-based tools

Research QuestionThe past research has shown that the experimental groups learning outcome was higher than the control group. However the follow-up questionnaires and interviews three months after the post-test showed that both the experimental and control groups seemed to retain the same amount of information and procedures learned in the session.The experimental group did show that they coached others more, deliberately applying the procedures and following up with the provided web-site for reviews. Our research will review the two group’s ability to retain the information for long points of time and which method provides the best long term retention rate. The research problem will review if web-based learning tools will help the one group retain the information longer we will retest both group in 6 months and 12 months. Does the use of web-based learning tools provide employees with a source to help them maintain knowledge learned longer? PurposeTo write a quantitative purp ose statement, we must first start with our general topic, which in this case is, interpersonal communication skills. We must include the variables (what are the outcomes and what factors influence those outcomes?), the participants in the study and the research site. As we narrow our topic, we see from the information given that we want to focus our investigation on using web-based instruction to teach interpersonal communication. The study will be conducted for the employer, so we know the subjects will be the employees   of ABC Corporation. We know that a good purpose statement takes the form of â€Å"the effect of x on y†.With the above information in mind, our purpose statement becomes: â€Å"The purpose of this study is to examine the effect of web-based instruction on the acquisition and application of interpersonal skills for employees at ABC Corporation†.Literature SearchThe research question addresses the use of web-based tools and how they can help profess ionals in a work environment learn and retain information better. Researching other companies and how their use of web-based tools have helped improve production, time management, communication skills, and the impact on return on investment would be the main groups of literature research to review.Looking at the different types of research is needed to create a concrete research paper. Benchmarking other companies, colleges and how they are using technology to improve the learning environment of their students, and technology sites to find out what changes in online tools are being developed. Because this research is using adult learners it is important to look at research from college level up. Most research on children and the use of web-based tools would not be useful. If the impact that we show can be compared to the impact other companies have seen then the data that our research fines will be more concrete. There are standard that we will have to follow before the research can even begin. We will need to review the professional ethics in educational assessments and also the ethical standard for developing the research. Review of the accreditations of all research papers we review is also important. When using a quantitative study it is important to justify the research problem and to compare the results with the prior predictions (Creswell, 2005).Ways to Collect DataThe researcher would have to get permission from management to do a research study. They need to determine if employees who have access to a web site after their training retain more information? The representatives of the study would be the employees who went through the four sessions on improving interpersonal communications in the workplace using the web-based tools and the control group that did not use the web.The researcher will show that longer term retaination of information can be enhances by using the web supported tools. Neither group will know they are participating in a planned study because if the study was know ahead of time people would be able to prepare and that would effect the data collected. A quantitative should be used because we will have to compare groups against each other. Managers should fill out questionnaires when employees access web sites. Did the employees solve problems without management becoming involved? Were employees without web sites able to solve problems as often as the web group? Information should be put into categories, those with web support and those without web support. Interviews and Likert scales could be used to evaluate the employees’ use of the web site. Tally sheets and logs should be kept each time a problem is solved with or without web site usage. A checklist inventory or assessment should be used each time a problem is solved with or without using the web site. A numerical chart can be used to compare the results after three months and six months. After the first three months the learning outcomes of the experimental group was higher. This could be shown on a chart or graph. Ten out of forty-four employees were using principles that they had learned. While only 3 out of 50 participants of the control group used knowledge they had learned. Post survey scores increased by 30% over pre survey scores for the experimental group. Observations of the employee’s behavior should be monitored. The groups should be compared at the end of three and six months to see which groups are doing the best job of retaining what they have learned. A personality assessment could also be used to determine if employees using the web site will continue to retain their training information. Data AnalysisThe data analysis process would consist of both quantitative and qualitative methods. The quantitative and qualitative data for both groups would be measured against their baseline abilities. This means that changes would be measured first against the behaviors practiced by each group before the intervention took place (for example, the 30% increase over pre-survey scores). Then, the intervention and control groups would be measured against each other in order to identify whether the changes that took place might be said to have occurred as a result of the web-based instruction.The quantitative data measurements would inclu de not only comparisons of the number of persons reporting their use of principles acquired at the seminar (that is, 10 against 3), as this would give a slightly less optimistic outlook for the technology intervention. Rather, percentages will be computed, which would generate a ratio of approximately 23:6 (23% vs. 6%) in favor of the experimental group.Qualitative analysis could be measured by constructing questionnaires that require the respondents to rate their current communication levels using a Likert scale and then applying quantitative measures to tell how many people (compared with baseline levels) detect an improvement in different areas. The questionnaire could also include areas that allow them to comment on the extent to which the improvement has taken place and the areas in which the intervention helped the most. Where verbal descriptions of changes are given, similar responses might be coded and grouped together. The number of occurrences of key words would be noted a s well as the use of qualifiers, such as â€Å"best,† â€Å"somewhat,† â€Å"significantly† or â€Å"dramatically†.Findings and RecommendationsThe problem of the research would be stated and detailed background information given to provide the reader with the proper foundation for the full comprehension of the research. Next, a review of the literature would follow, and this would allow the reader to expand his/her knowledge concerning the current trends and understandings about the subject as they prevail in the general academic circles. It would also grant the writer a chance to demonstrate his/her expertise on the topic.A description of the methodology would explain the methods of data collection and clarify the reasons for choosing these. This would include a description of the population sample, the intervention site and methods, and any other details that pertain to the study. It would also outline any limitations of the research. The findings would then be explicitly presented and a discussion of these findings would ensue.The discussion would include the discovery of any trends and an explanation of why these trends are believed to have occurred. After this, a conclusion would be given that would summarize the main points of the study. Finally, recommendations would be given, both for future intervention (through computer-based instruction) as well as for extensions of the study (such as conducting a similar study on younger persons who already have excellent exposure to technology to find out if results would be even better.) In short, the research would follow (more or less) the Trochim format: introduction, literature review, methods, results/discussion, conclusion/recommendations. ReferencesCreswell, J. (2005). Educational Research: Planning, Conducting, and Evaluation Quantitative and Qualitative Research. New Jersey: Pearson Education Inc. Retrieved September 26, 2006

Monday, September 16, 2019

Fangirl Essay

There are some kinds of love in this universe. Without love, a human being will not be able to live normally and there will be something empty inside their hearts. This can be love for our God, parents, families, lovers, or maybe just for our bestfriends. But now just think about this case: how about love for someone that we have never even met before? Maybe just fangirls who know how it feels, because they are the one who have a non-sense head over heels in love all over the time. What thing that comes in your mind when you hear the word â€Å"fangirls†? Maybe just a bunch of weird girls who are too much obsessed with the artist whom they admire to death. Why are they so weird? Because commonly, fangirls always have their own world, their own strange hobbies, and their own reason for being so crazy. The things such as plastering their idol’s face as their phone wallpaper, sticking so many huge posters at their rooms, overreacting when their favorite songs from their precious boys are played at the public place, sighing desperately when their hardisk is running out of memory due to a bunch of photos and videos that are too precious to be deleted, and other nonsense actions; they just do it naturally and with no other purpose than their own satisfaction over the idols. They just want to feel close with their boys. Moreover, fangirls even often call them as their ‘‘husband’’. See? It seems like fangirls’ imagination is their last hope. The other thing about fangirl is for most of them, every single thing about their boys always matters. That is why they joined some fanbases that keep updating about their boys’ current condition all the time. And believe me it means trully literally, starting from what their idols are doing, if there is any newest clip or tv show, attending some events, or even just being spotted at a supermarket without wearing any make up. They keep sharing the information with the other fangirls all over the world. That’s why for these girls, living in social networking such as twitter and facebook is much more interesting than their own and always-boring-real life. Being a fangirl sometimes can also be very annoying to the people surrounding them. I mean, when their â€Å"love†, or should we call it as an â€Å"obsession† instead? Yeah, stuff like that goes into an extreme level, obviously people may look at them in an oh-i’m-so-irritated-by-this-creature way. For example, when two angirls meet each other for the first time, have a little chit chat, and then find out that they are admiring the same person in a same group, those two will dive into their own world. Those fangirls will easily connected and nonstop talking about the newest news from their idols and ignoring the others who keep staring at them all the times, wondering what they are excitedly talking about. That is the reason wh y people always ignore the fangirls when they started talking about the topic-that-god-and-them-who-only-know. Now, let’s move on some obstacles that might bother most of fangirls in this earth. One of them is that being a fangirl is extremely expensive, since they always have the urge to wipe out their credit cards or spend lots of money to buy every single album, postcard, DVD, photobook, and other merchandise that has their idol’s face on it. This collecting habit will make their wallet pathetically empty. The most ironic thing about this is, when their idols’ groups come to their country and hold a big concert with such a high price ticket, the fangirls would separate into two paths. The first, in the case of fangirls who fortunately come from the have family, or maybe already have salary from their job, they will easily buy the ticket with no hesitation, watch the concert excitedly, and form a smile that will never leave their face for at least one month later. Such a sweet memories~ In the other way, for those who do not have enough money to own the ticket, they will just cry to death all day long, knowing that they will just let their boys come to their country and perform perfectly as always on the stage without witnessing it by themselves. Their sorrowful faces won’t dissapear easily for sure. Do you think fangirl is nothing than just a weirdo because theye’re crying for something that isn’t worth it? They do know it by themselves but they just couldn’t deny the feeling. Even though their obsession towards the boys sometimes makes no sense, there is still some positive things that can be taken from those fangirls. One of them that is, the faith. They always keep the faith, no matter what mistake that their boy’s done, they will find the excuse behind it, apologize them, and continue supporting them as always. That’s why the artist wouldn’t be exist without their loyal, caring, and supporting fans behind them.

Sunday, September 15, 2019

Bank Bailout 2008

Bank Bailout Outline I. Introduction II. Background III. Opposition’s point 1, refute, 1st support for thesis. a. Credit Card Act of 2009 b. No Change at all, Banks still operating the same way IV. Opposition’s point 2, refute, 2nd support for thesis. a. Creation of TARP b. $12. 2 trillion dollars of tax dollars were spent wrong c. TARP allowed many banks to allow credit again d. A majority of banks have paid back TARP money e. After TARP, Economy boosted V. Opposition’s point 3, refute, 3rd support for thesis a. Toxic assets cannot be removed easily b. Government takes more cost, then expects c.Economy will decline with removal of assets VI. 4th support for thesis a. Increased national debt b. Politicians were forced to sign this bill c. No solving of problems â€Å"Let’s hope we are all wealthy and retired by this house of cards falters† (Bloomberg, 2007). The credit crisis is known as the â€Å"House of Cards†, for years the banking indust ry has transformed many American lives, which has resulted in a troublesome economy. Many factors led to the credit crisis, such as the rise and fall of the housing market, and inaccurate credit ratings helped to create the sub-prime mortgage crisis (Issues & Controversies, 2010).Low interest rates developed easy credit, in which people could get a mortgage and credit cards based on inaccurate credit ratings with the creation of sub-prime mortgages. People have the ability to own a home, with no down payment or fixed income. In August of 2007, the United States began a loss of confidence in securitized mortgages, which resulted in the Federal Reserve injecting $20 trillion dollars into the financial markets to ease the situation (â€Å"Obama Sends Warning to Big Banks, 2010).The most important question to be answered in the decade is â€Å"How a loss of $500 billion dollars from the sub-prime mortgage resulted in a $20 trillion dollar loss in equity values and an entire shock to t he world’s financial system† (Woellert & Kopecki, 2007). The United States government should not have given the financial institutions bailout money, because financial institutions using loop holes in the system to take advantage of their clients, financial institutions operations have stayed the same, and the government’s belief of a tree market economy goes against the bailout.The credit crisis is a â€Å"worldwide financial fiasco, which resulting from sub-prime mortgages, Collateralized Debit Obligations, Frozen credit markets, and credit default swaps† (Jarvis, 2009). The credit crisis brings two people together, people on Main Street and investors. The people on Main Street represent their mortgages or houses, while investors represent their money, which also represents big institutions such as pension funds, insurance companies, mutual funds; sovereign funds (Jarvis, 2009). These groups brought through the financial system, composed of banks and bro kers on Wall Street.As a result of the September 11th attack, Chairman Allen Greenspan lowered interest rates only to 1%, to allow credit to flow; however, investors have a very low return on investment (Snow, 2008). By lowering interest rates, it allows for banks to only borrow money from the Federal Government for 1% plus the surpluses from the Asian and Middle East market, which makes borrowing money easy for banks and to allow leverage (Adding up the Government’s Total Bailout Tab, 2009). The definition of leverage is, â€Å"borrowing money to amplify the outcome of a deal† and is a major way banks make their money (Princeton University, 2010).Wall Street takes out a majority of loans and uses leverage to their advantage, and a heavy flow of capital comes in. In which return, they pay back their original investment. The investors notice that Wall Street is making money very fast, and they want to create a new product to sell to Wall Street. The mortgage connects th e home buyer with a mortgage lender on Wall Street who gives them a mortgage, which is great because housing prices throughout America have been rising (â€Å"Bailed out banks†, 2010).The mortgage lender gets a call from an investment banker who wants to buy the mortgage; and the lender sells it to him, and the investment brokers buys thousands of mortgages. Every month the investment banker gets the payments from all the mortgages that he purchased from the box and cuts the box into three slices â€Å"Safe, Ok and Risky†, and then he packs the slices into the box and calls it a Collateralized debt obligation or â€Å"CDO† (Woellert & Kopecki, 2007).However, greed has risen to the investment banker and wants’ more mortgages; however, the lender does not have any more mortgages to sell, because everyone who has qualified for a mortgage already has one; and the birth of the sub-prime mortgage is born. With a standard loan, the homeowner had to prove his wor th of a home, such as a job, good standing citizen, and assets. However, with a subprime mortgage, it was basically like free money. The person did not have to state their income, nor prove that you had a job.The investment banker and the lender are taking a risk, because if a home owner defaults on their mortgage, the lender gets the house and sells the house for a profit because home values have been increasing (Issues & Controversies, 2010). While home values have been increasing, American incomes have been plummeting for years; and because of sub-prime mortgages, the person did not have to prove income, a person with a $30 thousand dollar income; could own a $300 thousand dollar home. Many people defaulted on their mortgages, and foreclosures have been on the rise. In the United States, foreclosures were up 81% in 2008 and up 225% from 206†, which equals out to 19 per 1,000 households (CBS News, 2008). Due to there was a huge increase in foreclosures, instead of housing pr ices increasing; the houses values decreased in value very quickly and resulted in more foreclosures. A $300 thousand dollar mortgages was now only worth $75 thousand dollars. So all the mortgages that was in the investment banker CDO, now are worthless, and no one wants’ to take the CDO, and now the CDO is acting like a bomb (Roney, 2007).The investment banker is now panicking because he borrowed millions of dollars to buy the mortgage, and now he cannot get rid of it; however he is not the only one. Thousands of investment bankers throughout the world have CDO’s on their hand (Bailed out banks, 2010). In result the world’s financial system has become frozen, and everyone starts going bankrupt. As a result of the failure, the United States government rolls out a new program called Troubled Asset Relief Program (TARP) to prevent another bank failure.Under the bank bailout, creation of new legislation to protect the consumer has rapidly increased, and supporters of the bank bailout point to the Credit Card Act of 209. Not only were subprime mortgages affected, but due to the freeze in the credit market in the United States government needed a way to regulate the credit card industry, but also to stimulate spending. Under the Credit Card Act of 2009, they require the financial institutions to give the cardholders 45 day’s notice of any interest rate change and financial institutions are prohibited from using misleading terms such as â€Å"prime or fixed rate† (The White House, 2009).With this legislation in place, it protects the consumer from many of the scams that the mortgage industry used as bait to get clients into buying houses they could not afford, using the subprime mortgages (Roney, 2007). But also it allows for Congress to embrace new regulations placed on the financial institutions. The Credit Card Act of 2009 that has become part of the famous bank bailout, however, it has been shown to protect the consumer, and Co ngress will regulate the new rules placed on financial institutions.For example, â€Å"there is no cap on the interest rate the credit card companies can charge†, and while credit card companies cannot increase you interest rate but only if you are late on a payment, â€Å"However future purchases interest rates can be raised with no reason† (White, 2010). The credit card companies have the ability to raise the interest rate on any purchases, while they must still notify you of the higher interest rate, the ballooning of the interest rate can take place at any time.This is exactly the same measures the financial institutions have used to misinform their consumers and â€Å"kick them when they are down† and â€Å"corrupt the middle class of America† (White, 2010). How the subprime mortgage boomed, had to come from the terms that many of the average consumers cannot understand, and a major aftermath of the subprime/credit crisis, occurred when many people d efaulted on their homes and credit cards (Roney, 2007).Then the mortgage and home will not exist for the family any more, and the credit card companies will balloon their interest rate enough so that the card holders will not be able to pay their credit card/mortgage. In which then the financial institution hounds them and attacks them at their core roots and even calls other family members to alert them of the card holder financial problems because they cannot pay their bills. The banking and financial institution have not taken any actions to prevent another credit crisis from happening again.Supporters of the bank bailout, commonly referred to as TARP, argue that the bailout wiped all the bad toxic assets (CDO’s) which were collected as result of the credit crisis and prevented the assets from hurting the financial institutions. The major recipients were Freddie Mac; and Fannie Mae. Both were government owned enterprises which bought a majority of the sub-prime mortgages ( Roney, 2007). Removing the bad assets from the financial institutions will have a positive effect on the economy because it allows banks to start lending again and unfreeze the markets.Under TARP, some mortgages would require the government to rewrite some of the effected loans, effectively putting more Americans into homes that they will be able to afford and by rewriting the loans also increase the standard of living. John Douglas, general counsel at the FDIC, said, â€Å"It doesn’t make sense to give the authority to anybody else but the FDIC†; he goes on to say â€Å"That’s what the FDIC does, it takes the bad assets out of the banks and manages them and sells them† (Vekshin & Schmidt, 2009). However, the supporters of the bank bailout do not represent correct/valid points/facts.In a study by the IMF of the 124 banking crisis, they have concluded: Existing empirical research has shown that providing assistance to banks and their borrowers can be count erproductive, resulting in increased losses to banks, which often abuse forbearance to take unproductive risks at government expense. The typical result of forbearance is a deeper hole in the net worth of banks, crippling tax burdens to finance bank bailouts, and even more severe credit supply contraction and economic decline than would have occurred in the absence of forbearance. Valencia & Laeven, 2008) As a result of the IMF study, it has concluded that removing the bad toxic assets from the banks could actually hurt the financial institutions and a system as a whole could freeze the credit markets again with a result of an economic decline, instead of an economic incline. Also there is no definition of a troubled market or loan. If the government wants to rewrite troubled mortgages or loans, there are no set criteria to say whether a mortgage or loan should be taken by the government and given to the troubled family.Another point, as Steward said, â€Å"The only way for this pr ogram to work is for enough of the bad mortgages/loans to be purchased to connivance lenders that the problem mortgages cannot hurt the system, or to put in simple terms, the government has to purchase enough mortgages/loans to inspire intra- institution (Stewart, 2008) Furthermore, the institutions will sell the assets that will remain depressed in value; and â€Å"no one is going to sell a asset that has a higher chance of making the institution money (Obama Sends Warning to Big Banks, 2010). In result, under TARP the government has a high probability of taking a majority of the loss.With the bank bailout, the economy will decline, and the government will take a great loss of the bank bailout. Supporters of the bank bailout will say that if the government did not step in and inject $20 trillion dollars into the market, an economic collapse could have happened and set America into another Great Depression. A heavy incline of unemployment; foreclosures were through the roof, a majo r decline in incomes (Solomon, Enrich, & Hilsenrath, 2009). America was becoming a very sick nation, and the bank bailout would help the economy and stimulate the financial institutions to help start lending and unfreeze the credit market.As one writer wrote, â€Å"there was at no time better to inject the financial institutions at this time, if they collapse it may be the sign of the apocalypse† (Bailed out banks, 2010)/ If there was no bank bailout, there is a major chance that this will be a sign of the apocalypse because the United States drives the world and if the major financial institutions such as Bank of America or Merrill Lynch fails then the world economy could ultimately send the world in to another Great Depression.The major reason that the American government should not have passed the bank bailout was the cost to the government. Under the Bush administration, the national debit doubled to a record high $10 trillion dollars (Solomon, Enrich, & Hilsenrath, 2009) . There are more programs that the government has to pay for such as Social Security. Many economists call this the â€Å"polluter pays† which is defined as â€Å"polluters must pay for the cost of cleaning it up† (Princeton University, 2010).When the financial industry is bailed out of disasters, which a majority of the time throughout history, they have created those disasters. If the banking industry feels like they can be bailed out every time they make a major mistake, then the American people will pay because the bank bailout is directly connected to the taxpayer’s funds (Obama sends warning to Big Banks, 2010).A price tag of $700 billion dollar bailout has hidden costs which can go high as $3 trillion dollars, which can â€Å"be the shortfall between the economies potential output and its actual output from the crisis† (Issues & Controversies, 2010). Another factor in the bank bailout is the morality, because the banks do not pay the costs that are imposed on a world society, which the tax payers pay directly into the banks and then the banks pay back into the government. Also, the political had a major role in deciding to pass the bank bailout.A senator said, â€Å"We had no choice. We had a gun pointed at our heads. Without the bailout, things would have been even worse† (Woellert & Kopecki, 2007). While politicians did not have an actual gun to their head, figuratively speaking because they had a oversight on â€Å"saving the banks and shareholders† or â€Å"have saved the banks but let the bankers and shareholders go† because of the final tap that American tax payer will have to pay to the bailout the banks that created this mess (Solomon, Enrich, & Hilsenrath, 2009).The bank bailout was a major mistake in the evolution of the financial world because it did not solve any problems; people can still be charged higher interest rates on their credit cards/mortgages. With TARP, there is no true removal of the bad assets that caused the credit crisis to form the bank bailouts; it only hurts the government because it has to take on the debt. Truly, we have stroke the core of the American people with the credit crisis, but at the same time the financial world has been given more powers and in a free market enterprise, the credit crisis can happen again at any moment.