Featured Post

The Pictures from Iraq essays

The Pictures from Iraq articles There are no reasons for what a portion of our soliders have done; a life is an actual existence regardle...

Friday, December 27, 2019

Military Commissions Act of 2006 How Should Detainees Be...

Guantanamo Bay in Cuba houses some of the most dangerous people. The people being held have ranged in committing various crimes. What makes Guantanamo Bay well known is how the time period a detainee has spent in prison without a trial. While in prison for an extensive period of time, a detainee is bound to receive discipline for not following the guards. There are often a variety of different methods that the guards use to teach discipline to the detainees. All who follow Guantanamo Bay as institution often criticizes the measures taken. What makes Guantanamo Bay an ironic place to start this journey is because Guantanamo Bay is at the center of attention to a very important, controversial law passed in 2006. The controversial law was†¦show more content†¦By passing the Military Commissions Act of 2006, the person in control of all decisions would be the President. â€Å" They also gave the president absolute power to designate enemy combatants, and to set his own definiti ons for torture† (Military Commissions). If someone were to identify the players who were deemed responsible for this act to pass, that someone would most likely identify President Bush and Congress. These central figures wanted to take the extra step in keeping the United States protected from any additional acts of terrorism. With what is stated in the Military Commissions Act of 2006 and those who stressed for the passage of the act, mixed messages are sent. President Bush, at the time, believed in less harm and more protection for the United States due to the extenuating circumstances. By creating a law that gives the President absolute authority and leaving no room for improvement, how was the United States going to look like? What it going to be looked at as a weak country with no control of power? The other player involved, Congress, was weak on its part. By allowing this act to pass with authority give to the President, this law was interpreted as unconstitutional and violated the rights of the judicial branch and ultimately the supreme law of the land, The Constitution. How the judicial branch got involved in this matter was based upon its given rights ofShow MoreRelatedInhuman Enhanced Interrogation Techniques1564 Words   |  7 Pagestorturing someone without leaving a mark. These techniques include â€Å"waterboarding†, submersion in water or dousing to produce the sensation of drowning, and denying food, water or sleep for days or weeks on end. The techniques used by the CIA and military in the wake of 2001 involved stress positions, strikes, sensory and sleep deprivation. These Enhanced Interrogation Techniques have been compared to torture and torture lite. While strikes, stress positions, and deprivation leave no lasting marksRead MoreHow Should We Treat Non American Prisoners1274 Words   |  6 PagesHow Should We Treat Non-American Prisoners in American Prisons Casie Alaniz Ashford University Professor Beth Garcia POL: 201 American National Government How Should We Treat Non-American Prisoners in American Prisons How Should We Treat Non-American Prisoners in American Prisons The war on terror has changed how our country sees many things from travel, privacy rights, security levels and a person’s right to due process. The rights of accused terrorists have been stripped due to the need for intelligenceRead MoreGuantanamo Bay And The War Of Terror1756 Words   |  8 Pagesissues have risen because of this detention facility. The detainees held at the facility have to and had to face many challenges. The government took away their human rights and treats these detainees very harshly. Currently, there are still detainees held at Guantà ¡namo bay. However, some actions have occurred to stop these inhumane actions, but there have not been enough to close the facility down. Interrogation Techniques Detainees held at Guantanamo bay are all interrogated and later classifiedRead MoreGuantanamo Bay At The Southeastern Tip Of Cuba2299 Words   |  10 Pagesestablish a detention facility in a secure and isolated location eliminating any chance the detainees could escape and return back to their countries. In addition, Guantanamo Bay allowed the U.S. to avoid bringing those individuals suspected of terrorism from entering domestic soil. As of today, Guantanamo Bay only holds 80 detainees. Since the attack on the World Trade Center, the US has been holding detainees without trial and there have been reports of torture being used. This is not only unconstitutionalRead MoreReweneable Essay1236 Words   |  5 PagesHabeas Corpus Monica Cruz Ashford University POL 201 Jamie Way May 5, 2013 Our country has certain laws that protect both civilians and prisoners. This law was given a name as Habeas Corpus Act. Habeas Corpus comes from the word Latin which means â€Å"May you have the body† stated in the (Encyclopedia.gov). This law Habeas Corpus states that an accused must be brought before a judge and there must be sufficient evidence and reason of why the accused is being sent to jail.

Wednesday, December 18, 2019

Teamwork at Walmart - 705 Words

Teamwork at Wal-Mart It is essential to have teamwork within a company. Companies who have embraced the concept of teamwork have reported increased performance in work production, problem solving and it has stimulated new growth. This group project approach has improved employee morale and increased input when managed correctly. The benefits of teamwork can make a positive effect in the company that incorporates this type of teamwork approach. As each new project is started, a new team leader may be assigned. The reason for this is with each new project the area of expertise needed may change. These teamwork groups are helpful to the manager. By delegating the responsibility of a project to the designated group, it lessen†¦show more content†¦Their ability to work together affects the quality of service that the customers receive. To give the very best service to their customers, and to each other, they rely on guidelines that make their culture great. It also makes them a proud member of the Wal-Mart family. Wal-Mart has three basic beliefs that are an integral part of their teamwork. The first is respect for theShow MoreRelatedWalmart : A Success For Many Years1684 Words   |  7 Pagescompany I will share is Walmart, I like to shop at Walmart for varies reasons. Walmart has more than just your typical clothing items, now you can do your grocery shopping, have a prescription filled, get automotive services, shop home dà ©cor, toys, and if you like gardening, there’s a lot of gardening tools, shrubs, and accessories to maintain a beautiful and vibrant gardening. Through this research I will share a brief introduction of Walmart, their company culture, teamwork policies, structure, leadershipRead MoreWal Mart Stores Inc. Essay1311 Words   |  6 PagesWal-Mart Stores Inc. (Walmart) is engaged in the operation of retail stores, wholesale, and other various formats across the world (MintGlobal, 2016). Headquartered in Bentonville, Arkansa, Sam Walton founded Walmart in 1962 and t he company was incorporated in 1969 (Reuters, 2016). Being the largest retailer in the world with over 2.3 million employees (MarketLine, 2016), Walmart is a multinational company with operations in over 27 countries (Reuters, 2016). Every week, Walmart gets approximatelyRead MoreWalmart International Segment Of Walmart1553 Words   |  7 PagesWalmart International segment First, Walmart is the largest retailer in United State of America and also Walmart is the largest retailer in the world. Wal mart has branches in all states in US., and more than 11,000 stores in 28 countries as 65 banners that people know. At first Walmart established the first international store in Mexico City, Mexico in 1991, that the organization uses the name Walmart for operating in the United States and Canada. Walmart has an employee 2.2 million employees aroundRead MoreWalmart : Market And Social Values1599 Words   |  7 PagesWalmart has always been a controversial topic centering its economic and social values since the day it started to expand. However, even with the intensifying voices against Walmart, it has changed the retailing industry by ‘training’ its customer into buying commodities at their lowest price, revolutionizing manufactures and actively promoting itself and participating in charitable events. Before Walmart, no retailer seriously considered the importance of customer experiences and how theRead MoreWal Mart Stores Inc.1621 Words   |  7 Pagesstores in over 28 countries, as well as e-commerce sites in 11 countries each week. After 50 years in business, Wal-Mart Stores Inc. continues to grow at an exponential rate each calendar year and shows no signs of slowing down. As a corporation, Walmart promotes integrity as an everyday behavior amongst their employees. Owner and founder, Sam Walton, said, â€Å"Personal and moral integrity is one of our basic fundamentals and it has to start with each of us.† Our organizational analysis of Wal-Mart StoresRead MoreWal Mart : An Examination Of Management Tools And Effectiveness1734 Words   |  7 Pagesculture which promotes teamwork and competitiveness for the overall betterment of the organization. To aid managers in this task, organizations will establish tools and or processes which when utilized correctly will he lp managers to achieve their respective goals. In the following analysis, this paper will comment on the tools and processes provided through Walmart to their managers for the purpose of maintain market dominance, while also analyzing how top management at Walmart critique and monitorRead MoreHow Planning Has Changed Over The Years Essay1710 Words   |  7 Pagesto new market shares. For example, Walmart, the largest physical retailer in the United States, changed domains when it recognized the external threat from Amazon. In an effort to compete with the number one online retailer, Walmart made a concerted effort to generate and gain shares of the online shopping domain. Daft (2016) explained, â€Å"Walmart is trying to learn the rules of technology business from the ground up at its dot-com division† (p. 164). Walmart shifted their domain to become moreRead MoreInternal And External Factors That Affect The Four Functions Of Management1039 Words   |  5 PagesWal-Mart to be competitive with Trader Joe’s, Whole Foods and Kroger, Wal-Mart must start offering organic product. Recently Wal-Mart announced they will offer organic products 25% less then the competitors. Jack L. Sinclair, executive vice president of Walmart U.S.’s grocery division said, â€Å"We’re removing the premium associated with organic groceries†, the Wild Oats organic products will be priced the same as similar nonorganic brand-name goods. Wal-Mart will introduce â€Å"Wild Oats’ product to 2000 storesRead MoreKroger Company s Owner, The Great Western Tea Company909 Words   |  4 Pagessupermarket chain. Kroger Company has multiple stores in different areas. It serves the Food Staples Retailing. Kroger provides different products in its stores including food and drugs (Overview-SP NetAdvantage, 2016). Business Concept: Although Walmart is taking over the chain as the country’s largest grocery store, Kroger is still the United States’ largest traditional grocery stores. It operates 3,900 stores (Company Description-Hoover’s, 2016). The stores that Kroger Company operates includeRead MoreAnalysis of Target Corporation 819 Words   |  3 PagesTarget Corporation is a well-known American discount retailing company, founded in 1902 and is headquartered in Minneapolis, Minnesota. It is the second-largest discount retailer in the U.S. (Walmart being the largest) (Target, 2014). Target’s analysis will provide an insight into the corporation and its working. It look at and evaluate it in terms of terms of its effectiveness in each of these areas, such as: the structure, goals, agendas, boundaries, control, culture, politics, and decision-making

Tuesday, December 10, 2019

Sports vs women Essay Example For Students

Sports vs women Essay Sports are a very important part of the American society. Within sports heroes are made, goals are set and dreams are lived. The media makes all these things possible by creating publicity for the rising stars of today. Within society today, the media has downplayed the role of the woman within sports. When the American people think of women in sports, they think of ice skating, field hockey and diving. People do not recognize that women have the potential to play any sport that a man can play, with equal skill, if not better. Right now in some part of America, there is a women who aspires to play hockey for the New York Rangers, but what she does not realize is that the media will not give a positive backing to her effort. This negative coverage will shatter her dream within a matter of seconds. Women today have found the intensity that drives people to play sports. One of the most recent electrifying events that shows women expressing their love for the game, regardless of which game, is when Brandi Chastain tore her jersey off after the United States womens soccer team won the Womens World Cup final. After this incredible display of victory, the media put Ms. Chastains face all over the world. She was a feature on Sportscenter on ESPN and she was on every news broadcasts for a solid week. But this was not the biggest accomplishment, Brandi made the cover for Sports Illustrated the following month. For winning the World Cup the women each received a sum of $12,500, whereas if the men won they would have each received a s um $388,000. This event also influenced sitcoms. In a March 2000 episode of the television sitcom, Third Rock From the Sun, on of the characters makes a direct quote in relation to the extravagant display of triumph. The character was quoted to say, She is about one goal away from ripping her shirt off. Since the World Cup, taking your shirt off is something that people relate with women soccer and its players. Coverage of another female athlete, Laila Ali, was due to reasons other than ripping off her shirt. The reason that Ali was covered was due to the fact that she is a legacy. She is a the daughter of the famous Muhammed Ali. Laila, 22, started to box and try to follow the famous foot steps of her famous father. The media coverage of this up and coming female boxer is phenomenal. In her first fight, Laila Madam Butterfly Ali, knocked out her opponent, April Fowler, in thirty-one seconds. The main focus of her fame is in direct relation with the fame of her father and his reign of her famous father. Laila fame has brought a whole new light to the world of female boxing. Other former heavyweight champions, George Foreman and Joe Frazier, have encouraged their daughters to participate in this brutal sport. These women who are successful in the business world, working an attorney and a nail salon owner, are very interested in trying to share the spotlight with their famous counterpart fathers. The media has deemed women boxing as an unruly display of masculinity. Labeling women who participate in this sport as a dyke or lesbian. Since boxing is such a brutal sport, some parts of the media have labeled the sport as an act of unnecessary roughness with a strong undertone of un-called for violence. Throughout time women have gone through a lot within the world of sports. In 1999, Newsweek, published an article outlining the Leaps and Bounds the women have overcome to be where they are today. The events outlined in this article include dates which have made history such as in 1920 when the first woman competed in the Olympics and won three gold medals and 1965 when Donna De Varona became the first women to a sportscaster on network television. One of the most important stats within this article lies in the fact that in women sports have taken off so much that in 1996 the WNBA, the first women pro basketball league is launched. One of the most important public documents was passed in 1972. Title IX, aimed to provide equality within the sports world. The main purpose of this document was to ban the sexual discrimination in federally funded school programs, which included the sports programs. The current statistic of girls playing sports in high school was 1 in 27. In 1996, 1 in 3 girls in the United States was involved in some sort of federally funded and privately funded sports activity. Art Controversy-Piss Christ EssayThe WBNA is tagged as a runaway hit due to the fact that it is the first womens sport to sign a deal with a major network to air their games. In 1999, media coverage up for the league as well as ratings, while the attendance for the games is up twelve percent. The WBNA commissioner believes that the only way to have a successful league is based on one single solitary element. You need TV, TV, TVnational TV. That breeds credibility with fans. The WBNA plays in the summer so that they do not have to compete with the NBA, NFL, NHL, or NCAA for the airtime that is required to run a successful league. Sean McManus, president of CBS Sports, believes that there is little room for womens sports on todays networks. Advertisers are not convinced that the way to reach women is through womens sports. A lot more women watch the World Series than the WBNA. McManus believes that the whole womens sports movement is still in its early stages and will need serious room to grow. Other sports teams that were scheduled to sign network deals include the Womens Professional Hockey League (WPHL) the National Soccer Alliance (NSA) and the Womens Pro Fastpitch (WPF). The WPHL was scheduled to start in the winter of 1999 with four teams in Quebec, Connecticut, Massachusetts, and New Hampshire. This league was to start with a 2.5 million dollar budget. There were twenty players with signed letters of intent, six of which were Olympians. The tickets were priced at five dollars a piece and the maximum salary for a player was $21,000. This league never took of and the networks dismissed then completely. The NHL is now working on starting on plans for a womens league. The NSA was supposed to start in 1997. They had a commitment from twelve Olympians including American star, Mia Hamm. This league also never kicked off because there was hostility due to the worry that the NSA would interfere with Womens World Cup Soccer. The softball league, WPF, was backed by ATT Wireless and had six teams set up to begin play in 1997. The six teams were from states such as Florida, Georgia and North Carolina. The planned salary cap for the entire team was a mere $25,000. The coaches would drive the buses and the players would stay at shady hotel rooms. They played one year and went bankrupt in November of 1999. Sometimes it is not money that decides the media coverage which womens sports receive. Henry Freeman, who was a sports editor, increased the amount of coverage that the LPGA received. This was excepted, but no one knew the reason that Freeman had for backing the LPGA so strongly. It all came out when a local pro uncovered her relationship with the network sports editor from USA Today. Although Freeman increased coverage to please his friend, the publicity helped to turn out record breaking attendance for LPGA events. Gene Policinski, managing editor for USA Today, points out that 25 to 30 percent of the readers of USA Today are women. He also points out that womens sports play are second to what he calls the Big Three which include mens baseball, basketball and football. Libby King, who works for ESPN, states that Bibliography:

Tuesday, December 3, 2019

Why I am Interested in a Health Related Field an Example by

Why I am Interested in a Health Related Field Health is wealth. These are short but very meaningful words that have been inculcated in my mind by most elderly people that I have met in my life. For many, the absence of any illness or disability is a measure of a healthy person and a healthy living. It is difficult to contradict this assumption since a person without health problems tend to function independently and effectively. Health is not only a fundamental human right. The World Health Organization (1948) viewed health as a state of complete physical, mental and social wellbeing, and not merely the absence of disease of infirmity. The promotion of health and the achievement of this world-wide social goal require the action of social services, economic and health sectors as well as personal resources and physical capabilities. Due to the magnitude of services that are needed in the field of health and my passion for volunteer work and community service, I would like to be involved in providing therapy and rehabilitation serv ices to the elderly and those who have health-related problems. Need essay sample on "Why I am Interested in a Health Related Field" topic? We will write a custom essay sample specifically for you Proceed Early in life, I have been involved in various community and voluntary services, e.g. encouraging and helping the neighbors segregate their garbage, taking the sick to nearby health centers, visiting the elderly who are in the nursing homes or living away from their families, helping children with special needs, talking and listening to the elderly and attending to their basic needs. In my years of performing these services, the personal satisfaction that I have gained is overwhelming. A beautiful smile, a warm hug and words of appreciation are rewards that have inspired me to extend my services and to improve my skills. Although there are many challenges that I have encountered especially when people are sick, depressed or in pain, I learned to be more patient and to empathize with them. The sick and the elderly handled their pains and depression in ways which may be challenging for many healthcare workers. Manny have become withdrawn, demanding, verbally abusive and unpredictable. Managing patients effectively and learning to use various modalities are the skills that I need to learn so I can become a better healthcare worker. While rendering voluntary services to people who are homebound, I discovered that some patients fail to continue their therapy and rehabilitation on a regular basis due to their inability to travel or due to the unavailability of their family or companion to take them to the health center. This inspired me to consider taking a college degree so I could be a physical therapy assistant. In addition to working in a rehabilitation center or hospital, I intend to work closely with the physical therapist so I could provide home therapy services to patients who are homebound or living in nursing homes. I believe that to achieve the optimum function of an individual, it is necessary that continuous therapy be implemented. When patients are unable to travel and avail of the rehabilitation services in health centers or hospitals, they will not be able to return to active life as quickly as possible. Furthermore, their pain may not be reduced, their functions and recuperation will not be maximi zed, and their quality of life will not be enhanced. When I become a physical therapy assistant, I want to be a part of the team that will provide education so patients will learn about their disorders, the functions of their body and the importance of physical fitness and prevention of impairments and disabilities. After completing the degree that will allow me to be a physical therapy assistant, I will enrich myself with knowledge and experience through work exposure and reading of articles and research materials related to physical therapy and rehabilitation. In the future, I also want to be a physical therapist so I can work directly with doctors, evaluate the condition of patients, design and implement a treatment and intervention plan to meet the needs and goals of every patient. With a dedicated heart for the elderly and persons in need, a passion to be of service to my community and a determination to succeed, I will be able to complete my education and attain success in my chosen endeavor. Reference World Health Organization (1948). Preamble to the Constitution of the World Health Organization as adopted by the International Health Conference, New York, 19-22 June, 1946; signed on 22 July 1946 by the representatives of 61 States (Official Records of the World Health Organization, no. 2, p. 100) and entered into force on 7 April 1948.

Wednesday, November 27, 2019

Learn How Many Total Electoral Votes There Are

Learn How Many Total Electoral Votes There Are In the United States, the president and vice president are elected by the Electoral College rather than the popular vote of the people- and, as of April 2018, there are a total of 538 electoral votes. This system of indirect democracy was chosen by the  Founding Fathers  as a compromise between allowing Congress to elect a president and giving potentially uninformed citizens a direct vote.   The history of how that number of electoral votes came to be and the number needed to elect a president is an interesting story. Electoral Votes Background Former U.S. Treasury Secretary  Alexander Hamilton  wrote in Federalist (Paper) No. 68: Nothing was more to be desired than that every practicable obstacle should be opposed to cabal, intrigue, and corruption.  The Federalist Papers, authored by Hamilton,  James Madison, and John Jay, represented an attempt to convince the  states to ratify the Constitution. The framers of the Constitution, and many in leadership positions in the 1780s, feared the influence of the  unwashed  mob. They feared that, if allowed to directly elect the president, the general populace might foolishly vote for an unqualified president or even a despot- or the  masses might be unduly  influenced by foreign governments  when voting for a president. In essence, the Founding Fathers felt the masses could not be trusted. Hence, they created the Electoral College, where citizens of each state would vote for a slate of electors, who theoretically were pledged to then vote for a specific candidate. But, if circumstances warranted, the electors could be free to vote for a candidate other than the one to whom they were pledged. The Electoral College Today Today, each citizens vote indicates which electors he would like to have represent  him during the Electoral College process. Each presidential ticket has a group of designated electors ready to respond should their party win the popular vote of the people during a presidential election, which occurs every four years in November. The number of electoral votes is derived by adding the number of senators (100), the number of members in the House of Representatives (435), and three additional votes for the District of Columbia. (The District of Columbia was awarded three electoral votes with the passage of the 23rd Amendment in 1961.) The total number of electors, then, adds up to 538 total votes. To win the presidency, a candidate needs more than 50 percent of the electoral votes. Half of 538 is 269. Therefore, a candidate needs 270 Electoral College votes to win. More About the Electoral College The total number of electoral votes does not vary from year to year because the number of members of the House of Representatives and the Senate does not change. Instead, every 10  years with the new census, the number of electors shifts from states that have lost population to states that have gained population. Though the number of electoral votes is fixed at 538, there are circumstances that can arise requiring special attention. There is a constitutional process that goes into effect in case of a  tie in the Electoral College.Most states use a winner-takes-all method, where the candidate who wins the states popular vote is awarded the states entire slate of electors. As of April 2018, Maine and Nebraska are the only states that do not use a winner-takes-all system.Because of the way electors are apportioned, the presidential candidate with the most votes by the citizenry does not always win the election and become president. This was the case with  Hillary Clinton, who  won the popular vote by nearly 3 million ballots  in the 2016 presidential election, but  Donald Trump  became president because he  received 290 out of 538 electoral votes, 20 more than the 270 electoral votes he needed to win.

Saturday, November 23, 2019

Kirchhoffs Laws for Current and Voltage

Kirchhoff's Laws for Current and Voltage In 1845, German physicist Gustav Kirchhoff first described two laws that became central to electrical engineering. Kirchhoffs Current Law, also known as Kirchhoffs Junction Law, and Kirchhoffs First Law, define the way that electrical current is distributed when it crosses through a junction- a point where three or more conductors meet. Put another way, Kirchhoffs Laws state that the sum of all currents leaving a node in an electrical network is always equal to zero, notes Resistor Guide. These laws are extremely useful in real life because they describe the relation of values of currents that flow through a junction point and voltages in an electrical circuit loop, explains Rapid Tables. In other words, these rules describe how electrical current flows in all of the billions of electric appliances and devices, as well as throughout homes and businesses, that are in use continually on Earth. Kirchhoffs Laws: The Basics Specifically, the laws state that: The algebraic sum of current into any junction is zero. Since current is the flow of electrons through a conductor, it cannot build up at a junction, meaning that current is conserved: What goes in must come out. You can think of perhaps the most well-known example of a junction: a junction box. These boxes are installed on most houses: They are the boxes that contain the wiring through which all electricity in the home must flow. When performing calculations, then, the current flowing into and out of the junction typically has opposite signs. You can also state Kirchhoffs Current Law as: The sum of current into a junction equals the sum of current out of the junction. You can further break down the two laws more specifically. Kirchhoffs Current Law In the picture, a junction of four conductors (wires) is shown. The currents i2 and i3 are flowing into the junction, while i1 and i4 flow out of it. In this example, Kirchhoffs Junction Rule yields the following equation: i 2 i 3 i 1 i 4 Kirchhoffs Voltage Law Kirchhoffs Voltage Law describes the distribution of electrical  voltage within a loop, or closed conducting path, of an electrical circuit. Specifically, Kirchhoffs Voltage Law states that: The algebraic sum of the voltage (potential) differences in any loop must equal zero. The voltage differences include those associated with electromagnetic fields (emfs) and resistive elements, such as resistors, power sources (for example, batteries) or devices (such as lamps, televisions, and blenders) plugged into the circuit. In other words, you can picture this as the voltage rising and falling as you proceed around any of the individual loops in the circuit. Kirchhoffs Voltage Law comes about because the electrostatic field within an electric circuit is a conservative force field. In fact, the voltage represents the electrical energy in the system, so it can be thought of as a specific case of conservation of energy. As you go around a loop, when you arrive at the starting point has the same potential as it did when you began, so any increases and decreases along the loop have to cancel out for a total change of zero. If it didnt, then the potential at the start/end point would have two different values. Positive and Negative Signs in Kirchhoffs Voltage Law Using the Voltage Rule requires some sign conventions, which arent necessarily as clear as those in the Current Rule. You choose a direction (clockwise or counterclockwise) to go along the loop. When traveling from positive to negative ( to -) in an emf (power source) the voltage drops, so the value is negative. When going from negative to positive (- to ) the voltage goes up, so the value is positive. Remember that when traveling around the circuit to apply Kirchhoffs Voltage Law, be sure you are always going in the same direction (clockwise or counterclockwise) to determine whether a given element represents an increase or decrease in the voltage. If you begin jumping around, moving in different directions, your equation will be incorrect. When crossing a resistor, the voltage change is determined by the formula I*R, where I is the value of the current and R is the resistance of the resistor. Crossing in the same direction as the current means the voltage goes down, so its value is negative. When crossing a resistor in the direction opposite the current, the voltage value is positive (the voltage is increasing). Applying Kirchhoffs Voltage Law The most basic applications for Kirchhoffs Laws are in relation to electrical circuits. You may remember from middle school physics that electricity in a circuit must flow in one continuous direction. If you break the circuit- by flipping off a light switch- you are breaking the circuit, and hence turning off the light. Once you flip the switch, you re-engage the circuit, and the lights come back on. Or, think of stringing lights on your house or Christmas tree. If just one light bulb blows out, the entire string of lights goes out. This is because the electricity, stopped by the broken light, has no place to go. Its essentially the same as turning off the light switch and breaking the circuit. The other aspect of this with regard to Kirchhoffs Laws is that the sum of all electricity going into and flowing out of a junction must be zero: The electricity going into the junction (and flowing around the circuit) must equal zero because the electricity that goes in must also come out. So, next time youre working on your junction box (or observing an electrician doing so), stringing electric holiday lights, or even just turning on or off your TV or computer, remember that Kirchhoff first described how it all works, thus ushering in the age of electricity that the world now enjoys.

Thursday, November 21, 2019

New Mexico and the American West Assignment Example | Topics and Well Written Essays - 750 words

New Mexico and the American West - Assignment Example As such the major goal was supply water to the cities and the farms. Notably the Colorado River water was diverted to phoenix. The fourth stage involved the analysis of water issues concerning storage. This happened from 1998 to the present day. As such, conservation of water, removal of Glen canyon dam, climatic changes as well as finding a future water hole were brought in the limelight. Colorado River basin project offered a much more diversified approach in balancing the local and imported water resource developments with the increased demand for the side management required to satisfy the current water demand as well as the future demands Response to 2 According to phoenix metro Arizona has had 6.4 million people by 2012 while New Mexico had 2 million people. Conflicts over land in Arizona have been dominated by the Anglo, however, a huge conflicts exist over the US Mexican border. In New Mexico, conflicts with the over the border are not extensive. The population in Arizona was much lower than New Mexico during the Spanish colonization. Politically, Arizona is more conservative than New Mexico. Arizona immigration law passed in Arizona but, it failed in New Mexico. In Arizona, agriculture is on the declining rate while in New Mexico it is on the increasing rate. The Spanish presence in Arizona lower than that in New Mexico due to the fewer number of the natives, implying that only few souls could be converted, thus low amount of money The major difference between Arizona and New Mexico is that majority of the population in New Mexico are the natives while in Arizona has inhabitants from different regions. As such, Arizona has more stringent rules regarding immigration, as opposed to New Mexico Response to 3 The period I between1848-1865 is characterized by the onset of mining. As such, the Yuma and Wickenburg were gold mining towns. Period II between 1866-1878, this period is characterized by the Mormons and the wealth harvesting, Mormon farming towns inc luded, the small Colorado towns of St John’s, snowflake as well as, the Safford, mesa, Tempe and Thatcher. Additionally, crops were cultivated and later on sold to the miners for the Mormon mercantile functions. Notably, phoenix grew as a farming town. Period III between1879-1899 was characterized by transportation and copper, during this period the sante Fe, and the southern pacific railroads were built and linked in the national grid. Towns like Tombstone grew as a silver mining town, and Flagstaff grew as timber town. Period IV between1900-1939 was characterized by the five Cs, copper, cattle, cotton, and climate. Period V also known as the post 1940 was characterized by a shift in the economy where mining and agriculture declined while service and the manufacturing industry increased. Additionally, this was the period for the Urbana Arizona Whose population grew from 500, 000 to about 6.5 million in 2012. This period is also characterized by a massive demographic force wh ere it was viewed as a burial ground for the wealthy and a place for relaxation Response to 4 Essential elements of Navajo culture include, the for sacred mountains which are, the east sierra Blanca depicting faith and thinking, the south Mount Taylor depicts planning, the west Mt Humphrey depicts love and life. Additionally, the ceremonies performed include singing, the blessing away, as well, sand paintings or healing purposes. The Hozho, depicts a

Wednesday, November 20, 2019

What role do vulnerability and resilience play in the emergence of Essay

What role do vulnerability and resilience play in the emergence of atypical child development - Essay Example Genetic and environmental factors interact with varying degrees of plasticity to effect developmental change. To very briefly outline the stages, or milestones of a child’s growth from birth onwards, research has identified, physical, motor, cognitive. socio-emotional, language acquisition variables, and their mechanisms, along with speed and pattern of development in terms of both population and individual differences. In spite of minor variations due to cultural and environmental factors, there is wide agreement as to what could be seen as ‘gifted’ or super-normal development and, at the other end, sub-normal or less than optimal development and functioning of children. Such differences are likely to persist into adulthood. However, the term atypical development is used more in the context of sub-normal rather than super-normal populations. More recent research into the lower end of the scale in child development, which is a minority, and considered atypical under normal conditions, has concentrated on what have been identified as vulnerability and resilience factors. The motivation has been to identify, intervene, and actively improve the chances of accomplishment of a satisfactory life trajectory for those children identified as being in danger of failing to reach societal norms of everyday life. To emphasise the global spread of child development research and application, studies from the USA, Australia and South Africa within the last decade are cited in this essay; (Masten & Gewirtz (2006), Mutimer, Reece, and Matthews (2007), Theron (2006). Vulnerability in children is described as risk factors, both individual and environmental hazards, which tend to result in negative developmental outcomes. Among individual characteristics are, intrauterine growth retardation, low birth weight, in-utero experience of maternal drug use, physical disability, and a variety of genetic defects. Among the immediate environmental hazards are family

Sunday, November 17, 2019

The Woman Warrior Essay Example for Free

The Woman Warrior Essay Women of Chinese culture carry an innate characteristic of uselessness in a country that esteems only men.   The men are strong providers, carriers of family names, and maintainers of family ideals and honor.   In a country where one child per family is the norm, the birth of a female is not met with glee, but more commonly remorse.   Maxine Hong Kingston challenges these roles in her novel, The Woman Warrior.   The author shares five tales of strong women from her cultural and familial history.    The title aptly describes the character’s often-imagined lives. The first of the five women introduced is the author’s own aunt.   No-Name Woman, an unknown relative of the past, relives her horrid tale in the form of a dubious lesson told to little girls upon reaching puberty.   Her uncelebrated life is used as a moral tale to stress fidelity to family and honor.   No-Name woman bore a child out of wedlock and killed herself and the child for the disgrace brought to the family.   The reader gets the sense of the woman’s inner strength by the description of her imagined livelihood as told by Kingston. No-Name Woman picks a chosen fate over the traditional Chinese role she is expected to play.   The next morning, I found her and the baby plugging up the family well, (Kingston, 5).   In choosing the family well, the suicide affects them all, highly symbolic of the disgrace, yet also physically tampering with their well-being at the same time.   Although No-Name Woman encounters mostly shame and destruction of her sense of self – in that one moment when she chooses her heart over her forced duties, she becomes a warrior woman – a woman who knows what she wants and goes for it, regardless of the heavy price of her shunning. Unlike No-Name Woman who exists regretting her decision, the tale of Fa Mu Lan follows an entirely different course. The story obviously depicts a warrior defying the typical female characteristics in Chinese tales.   Recently retold in a Disney film series, the role of Fa Mu Lan is well known to girls of all ethnicities today.   Kingston’s version, however, tells the tale from the present tense with the narrator often filling the position. Contrary to the stereotype, the family supports Fa Mu Lan as she goes of to battle the baron to save her family from his tyranny.   We are going to carve revenge on your back, my father said, Well write out oaths and names, (Kingston, 34).   Her parents readily accept the strength of Fa Mu Lan, sending her out to save them all.   The warrior status is cemented when she beheads the evil baron and gives reign to a peasant who will care for the people.   Men turn to her for guidance and protection.   Her husband even cares for their young baby, getting it out of harm’s way, while Fa Mu Lan fights the Chinese Army. Brave Orchid, Kingston’s mother, finds her warrior way in yet another far different way from the characters discussed thus far.   This story is one of educational bravery and the devotion to a better way of life.   Through the hardship of living husbandless in a harsh climate, Brave Orchid lives through the deaths of her children, using the monies sent to her from America to improve herself. She decided to use the money for becoming a doctor, (Kingston, 60).   The braveness of her choice far outweighs the status of Brave Orchid as a ghost hunter.   In a time of defeat and anguish, she finds her own way.   Although the mother appears obnoxious and cold throughout much of the story, it is in her history that the reader appreciates the bravery depicted in her name. Moon Orchid, the anti-thesis of many of the strong woman in the novel, comes across as weak and silly.   In following the children around and marveling at the wonders she encounters in this new country, Moon Orchid is forced to stand up to her felonious husband and attempt some form of recognition from him.   His direct dismissal destroys her sense of self and defeats her contentment. For a brief moment, the reader sees the strength of Moon Orchid in her easy acceptance of the truth.   But he gives us everything anyway.   What more do I have to ask for?   If I see him face to face, what is there to say, (Kingston, 126)?   She avoids the confrontation with her husband and solidifies her way of life.   Her strength comes from her avoidance, as though her inner sense of self knew he had forsaken the family and her foresight to avoid him allowed her a sense of normalcy, something stripped from her in the end. The entire novel shows bits and pieces of the author’s own sense of strength.   She fits herself into each chapter through direct commentary and inferred presence.   The reader sees the warrior side of Kingston in prevailing over the Chinese stereotypes and expectations of her more traditional mother.   The reflections are often times told from hearsay and inference, yet each tale forms a foundation for the author herself.   In the final chapter, Kingston shares a personal telling of her life. The reader sees her nastiness as a child in her reaction to the silent girl, her blatant hatred for many of the things her mother has tried to instill in her, and an honest questioning of the role of Chinese and American cultures in her life.   I dont know any Chinese I can ask without getting myself scolded or teased, so Ive been looking in books, (Kingston, 204).   The struggle for her between the two worlds was a difficult one.   She becomes the warrior by having the strength to reflect on herself and her foundations, the women of her life. The tales of the five women, and many others throughout the novel, depict a deep sense of woman fighting for their right to be as they wish to be.   Whether an unwed mother to the love of her life, the warrior queen to save all China, the educated liberator of her own children, the contended wife living in her chosen realm, or an accepted Chinese-American in an un-accepting world Kingston illustrates the right of women to be whatever they want – fighting for independence on the many fronts of societal norms. Works Cited Kingston, Maxine Hong.   The Warrior Woman. New York, NY: Random House, 1989.

Friday, November 15, 2019

Chaos In The Currency Markets : Currency Crisis Of The EMS :: essays research papers

Chaos in The Currency Markets : Currency Crisis of The EMS 1. What does the crisis of September 1992 tell you about the relative abilities of currency markets and national governments to influence exchange rates?   Ã‚  Ã‚  Ã‚  Ã‚  The currency markets and national governments both have abilities to influence exchange rates. Like other financial markets, foreign exchange markets react to any news that may have a future effect. Speculators are the part of the currency markets that take currency positions based on anticipated interest rate movements in various countries. Day-to-day speculation on future exchange rate movements is commonly driven by signals of future interest rate movements. By using the signal, speculators usually take the position before the things actually occurred. Sometime, if high power enough, the speculators position can influence the exchange rate movement. The government controls is one of the factors affecting exchange rate. The government can influence the equilibrium exchange rate in many way, including direct intervening (buying and selling currencies) in the foreign exchange markets and indirect intervening by affecting macro variables such as interest rates. 2. What does the crisis of September 1992 tell you about the weakness of fixed exchange rate regimes?   Ã‚  Ã‚  Ã‚  Ã‚  From European currency crisis of September 1992, it shows us that there are weakness of the fixed exchange rate system. When exchange rate are tied, a high interest rate in one country has a strong influence on interest rates in the other countries. Funds will flow to the country with a more attractive interest rate, which reduces the supply of fund in the other countries and places upward pressure on their interest rates. The flow of fund would continue until the interest rate differential has been eliminated or reduced. This process would not necessarily apply to countries outside ERM that do not in the fixed exchange rate system, because the exchange rate risk may discourage the flow of funds to the countries with relatively high interest rate. However, since the ERM requires central banks to maintain the exchange rates between currencies within specified boundaries, investors moving funds among the participating European countries are less concerned about exchange rate risk. 3. Assess the impact of the events of September 1992 on the EU 's ability to establish a common currency by 1999.   Ã‚  Ã‚  Ã‚  Ã‚  A major concern of a common currency is based on the concept of a single European monetary policy. Each country's government may prefer to implement its own monetary policy. It would have to adapt to a system in which it had only partial input to the European monetary policy that would be implemented in all European countries, including its own. Chaos In The Currency Markets : Currency Crisis Of The EMS :: essays research papers Chaos in The Currency Markets : Currency Crisis of The EMS 1. What does the crisis of September 1992 tell you about the relative abilities of currency markets and national governments to influence exchange rates?   Ã‚  Ã‚  Ã‚  Ã‚  The currency markets and national governments both have abilities to influence exchange rates. Like other financial markets, foreign exchange markets react to any news that may have a future effect. Speculators are the part of the currency markets that take currency positions based on anticipated interest rate movements in various countries. Day-to-day speculation on future exchange rate movements is commonly driven by signals of future interest rate movements. By using the signal, speculators usually take the position before the things actually occurred. Sometime, if high power enough, the speculators position can influence the exchange rate movement. The government controls is one of the factors affecting exchange rate. The government can influence the equilibrium exchange rate in many way, including direct intervening (buying and selling currencies) in the foreign exchange markets and indirect intervening by affecting macro variables such as interest rates. 2. What does the crisis of September 1992 tell you about the weakness of fixed exchange rate regimes?   Ã‚  Ã‚  Ã‚  Ã‚  From European currency crisis of September 1992, it shows us that there are weakness of the fixed exchange rate system. When exchange rate are tied, a high interest rate in one country has a strong influence on interest rates in the other countries. Funds will flow to the country with a more attractive interest rate, which reduces the supply of fund in the other countries and places upward pressure on their interest rates. The flow of fund would continue until the interest rate differential has been eliminated or reduced. This process would not necessarily apply to countries outside ERM that do not in the fixed exchange rate system, because the exchange rate risk may discourage the flow of funds to the countries with relatively high interest rate. However, since the ERM requires central banks to maintain the exchange rates between currencies within specified boundaries, investors moving funds among the participating European countries are less concerned about exchange rate risk. 3. Assess the impact of the events of September 1992 on the EU 's ability to establish a common currency by 1999.   Ã‚  Ã‚  Ã‚  Ã‚  A major concern of a common currency is based on the concept of a single European monetary policy. Each country's government may prefer to implement its own monetary policy. It would have to adapt to a system in which it had only partial input to the European monetary policy that would be implemented in all European countries, including its own.

Tuesday, November 12, 2019

Aestheticism: Philosophy of Beauty Essay

Aestheticism is presently defined by the Encyclopedia Britannica as â€Å"intended to designate a scientific doctrine or account of beauty, in nature and art, and for the enjoyment and originating beauty which exists in man†. In other words, aestheticism is a philosophy of beauty. An Aesthete has a great appreciation for nature. One may look at an object, place, or person and perceive it a different way than another person may perceive it. For an Aesthete to obtain pleasure, â€Å"it is the perspectives of perception that is necessary to an understanding of both appreciation and creation†. Aestheticism is a very deep and meaningful philosophy whose meaning has been changed and interpreted by many historical figures such as Alexander Baumgarten, Immanuel Kant, and Oscar Wilde. The philosophical discipline of aesthetics did not receive its name until 1735, when the twenty-one year old Alexander Gottlieb Baumgarten introduced it in his Halle master’s thesis to mean episteme aisthetike, or the science of what is sensed and imagined. Initially, the focus of aestheticism was not so much on art as it was on the experience of, and judgments about, beauty in all its forms. Aesthetics is necessarily interdisciplinary and may be interpretive, prescriptive, descriptive, or a combination of these. The younger Baumgarten started at the university at sixteen (in 1730), and studied theology, philology, poetry, rhetoric, and philosophy, especially Leibniz, whose philosophy was not banned. He began teaching there himself in 1735, upon the acceptance of his thesis on poetry, and published his Metaphysics in 1739. In 1740, the same year as he published his Ethics, he was called to a professorship — or more precisely, ordered to accept it — at another Prussian university, in Frankfurt an der Oder. The first volume of his Aesthetica appeared in 1750. It was written in Latin, like Baumgarten’s other works, and was the first work ever to use the name of the new discipline as a title. The next year, however, Baumgarten’s health began to decline and a second volume of the Aestheticacame out only in 1758, under pressure from the publisher. Baumgarten’s Meditations on Poetry conclude with his famous introduction of the term â€Å"aesthetics†: â€Å"The Greek philosophers and the Church fathers have always carefully distinguished between the aistheta and the noeta,†that is, between objects of sense and objects of thought, and while the latter, that is, â€Å"what can be cognized through the higher faculty† of mind, are â€Å"the object of logic, the aistheta are the subject of the episteme aisthetike or AESTHETICS,† the science of perception. However, in the 18th century, the German philosopher Immanuel Kant defined aestheticism as both â€Å"the analysis of taste† and â€Å"the analysis of sensible cognition or intuition†. Immanuel Kant was a Prussian philosopher who is widely considered to be a central figure of modern philosophy. He argued that human concepts and categories structure our view of the world and its laws, and that reason is the source of morality. One part Kant’s philosophy of aestheticism was the â€Å"Deduction of Taste†, which instilled that everything interesting and fundamental happened in the formation of concepts, or in the receiving of intuitions. But now Kant argues that judgment itself, as a faculty, has an fundamental principle that governs it. This principle asserts the purposiveness of all phenomena with respect to our judgment. In other words, it assumes in advance that everything we experience can be tackled by our powers of judgment. Normally, we don’t even notice that this assumption is being made, we just apply concepts, and be done with it. But in the case of the beautiful, we do notice. This is because the beautiful draws particular attention to its purposiveness; but also because the beautiful has no concept of a purpose available, so that we cannot just apply a concept and be done with it. Instead, the beautiful forces us to grope for concepts that we can never find. And yet, nevertheless, the beautiful is not an alien and disturbing experience – on the contrary, it is pleasurable. The principle of purposiveness is satisfied, but in a new and unique way. For Kant, the other basic type of aesthetic experience is the sublime. The sublime names experiences like violent storms or huge buildings which seem to overwhelm us; that is, we feel we ‘cannot get our head around them’. This is either mainly ‘mathematical’ – if our ability to intuit is overwhelmed by size (the huge building) – or ‘dynamical’ – if our ability to will or resist is overwhelmed by force (e. g. the storm). The problem for Kant here is that this experience seems to directly contradict the principle of the purposiveness of nature for our judgment. And yet, Kant notes, one would expect the feeling of being overwhelmed to also be accompanied by a feeling of fear or at least discomfort, whereas, the sublime can be a pleasurable experience. In contrast, Oscar Wilde prefaced his novel, The Picture of Dorian Gray, with a reflection on art, the artist, and the utility of both. After careful scrutiny, he concludes: â€Å"All art is quite useless† (Wilde 4). In this one sentence, Wilde encapsulates the complete principles of the Aesthetic Movement popular in Victorian England. That is to say, real art takes no part in molding the social or moral identities of society, nor should it. Art should be beautiful and pleasure its observer, but to imply further-reaching influence would be a mistake. The explosion of aesthetic philosophy in fin-de-siecle English society, as exemplified by Oscar Wilde, was not confined to merely art, however. Rather, the proponents of this philosophy extended it to life itself. Here, aestheticism advocated whatever behavior was likely to maximize the beauty and happiness in one’s life, in the tradition of hedonism. To the aesthete, the ideal life mimics art; it is beautiful, but quite useless beyond its beauty, concerned only with the individual living it. Aesthetics found that through their great interest in beauty, pleasure that is derived from objects of art is more beautiful than other pleasures. Overall, many philosophers have interpreted the principle of aestheticism in their own ways. Without aestheticism, the deep understanding we now have of the connection of our lives with all forms of art would not be possible. Therefore, after centuries of conceptual making, aestheticism remains as a very complex subject which any poetic heart would be delighted to learn for the benefit of further understanding the purpose for the existence of art. Art through music, paintings, dance, and performance are all unique, but alike in one way: they are products of an artist’s ability, and desire, to create beauty. Works Cited Burnham, Douglas. Internet Encyclopedia of Philosophy: Immanuel Kant: Aesthetics. n. d. 9 February 2014 . Duggan, Patrick. The Conflict Between Aestheticism and Morality in Oscar Wilde’s The Picture of Darian Gray. n. d. 9 February 2014 . Guyer, Paul. Stanford Encyclopedia of Philosophy: 18th Century German Aesthetics. 16 January 2007. 9 February 2014 . Rohlf, Michael. Stanford Encyclopedia of Philosophy: Immanuel Kant. 20 May 2010. 9 February 2014 .

Sunday, November 10, 2019

Prison Healthcare Essay

In researching healthcare in the prison system there seemed to be a definite difference in the type of regulated health care being given or even offered to prisoners. Prisons have state and federal laws that they must abide by in delivering health care services to their inmates. Therefore this paper will discuss the Federal Bureau of Prisons which came about in 1930 and was put together to deliver compassionate and open-minded care for Federal prisoners. In addition, the BOP (Federal Bureau of Prisoners) was implemented to change the prison health care services to be able to offer a more professional type of care. The government agency being discussed in this paper is known as the Federal Bureau of Prisons. The BOP’s head office is located in Washington D.C. and is part of the U.S. Justice Department. The Federal Bureau of Prisons is held accountable for the operation and administration of the federal prison organization. The main reasoning behind the BOP is to deliver a neutr al and sympathetic type of treatment for federal inmates in the United States penitentiary system. The BOP also provides inmates with any health care they may need in agreement with any Federal and State laws. The BOP is in charge of the protection and upkeep of roughly 200,000 centralized prisoners and is accountable for setting the standard for federal prisons dispersed through the U.S. The BOP starts out by deciding where a prisoner should be placed such as; what facility? The next thing BOP would then assess is the level of security needed for the prisoner and what type of counseling he or she may need while serving their time in prison? In addition to counseling services the prisoner will be assessed for any mental health issues at this time as well. After many of these types of questions are answered concerning the inmate the BOP will then assess what type of health care services the prisoner is in need of and too what degree they are needed. An example of this could be if a p risoner is in need of some type of Prison Health Care Agency 3 immediate surgery, then he or she would be put at the top priority level for care needed. These types of questions are quickly reviewed along with administration to determine where the inmate will need to serve his or her time. The reason for this statement is a prison’s inmate capacity along with the level of treatment able to be offered at a specific prison may influence a decision to place an offender at one location over another. According to the United States Department of Justice (2013), â€Å"the Federal Bureau of Prisons are responsible for confining federal offenders in prisons that are safe, humane, cost-efficient, and secure† (Agencies). According to the Federal Bureau of Prison’s (2008), â€Å"as part of these duties, the BOP is able to control health care in prisons by being responsible for the delivery of medically necessary health care to inmates in accordance with applicable standards of care† (Executive Summary). The American Correctional Association has established nationwide principles connected to the safe, effective and professional operation of corrections facilities. These values are vital leaders in regards to the policies and procedures that defend the wellbeing and security of employees and inmates of the prison. These principles are frequently reviewed by a group looking over the standards. The amendments are grounded on decisions based by the court, practice sessions, and constitutional organizations. In order to comply with both federal and state laws, medical facilities or health care services must be provided at prisons and state-run correctional facilities. This type of task would require the combined efforts of several sections within the American Correctional Association which is primarily associated with the Administrative Services, Offender Operations, Support Services, and Health Services. In addition, things such as making financial arrangements for the construction and upkeep of medical faciliti es would fall to the obligation of Administrative Services and the Offender Prison Health Care Agency 4 Operations. In addition the Health Services at a prison are those responsible for the day to day procedures of the prison’s medical treatment centers. To make sure that the health care being provided to prisoners is meeting a high level of quality the American Correctional Association has required and expects accreditation and certification from any agencies regarding the National Commission on Correctional Health Care. The NCCHC healthcare principles and standards are intended to assist things such as; prison healthcare clinics meet international and national standards of basic human rights. By November 29, 2007, the BOP had held 166,794 inmates in approximately 114 BOP prisons at 93 different sites (The Federal Bureau of Prisons, 2008). Also, throughout 2007 the Federal Bureau of Prisons was indebted around $736 million for health care being offered to prisoners in the United States. The Federal Bureau of Prisons continues to deliver health care services to prisoners chiefly by internal medicinal providers working by the BOP or allocated to the BOP from the Public Health Service, and ultimately constricted health care physicians which were the ones’ that delivered wide-ranging treatment or separate health care services offered for a single person (The Federal Bureau of Prisons, 2008). Then with adjusting or controlling the growing prices regarding health care and the various other services the Federal Bureau of Prisons executed resources that were intended to offer additional competent health care to prisoners. The Federal Bureau of Prisons exertions to get some type of control on health care in prisons began by learning the various steps a prisoner must go through before he or she is transferred or sent to their assigned penitentiary. To start off prisoners are sent to a prison established around the level of treatment that is needed by this particular inmate. According to the Federal Bureau of Prison’s (2008) â€Å"the Department of Justice Office of the Inspector General (OIG) initiated an Prison Health Care Agency 5 audit to determine whether the BOP was appropriately containing health care costs in the provision of necessary medical, dental, and mental health care services; as well as effectively administering its medical services contracts and effectively monitored its medical services providers† (Executive Summary). To make sure that federal and state laws are being followed regarding health care facilities being offered at penitentiaries as well as state-run correctional facilities. For something like this assignment to take place would entail the joint efforts of numerous subdivisions inside the ADC, primarily Administrative Services, Offender Operations, Support Services, and Health Services. When it comes to planning and budgeting for the construction and maintenance of health care centers this is ultimately the obligation of the Administrative Services and Offender Operations. Therefore, the health care that is being provided to prisoners must be of a high quality and acceptable. In order to ensure that the quality of healthcare being provided to inmates is of a high quality and above criticism the ADC received certification from a self-governing agency to receive their accreditation which was the National Commission on Correctional Health Care (NCCHC). The healthcare standards that are in place by the NCCHC were envisioned to assist prisons with health care centers for their inmates as well as making sure to meet and follow the international and national principles regarding basic human rights. Inmates of all ages, race, color, creed and nationali ty are able to receive an equivalent standard level of treatment regarding ones’ health that is offered to the public that are not be held behind bars. According to Health Care in Prison (2013), â€Å"This general principle is outlined in Prison Service Order 3200, which states: The Prison Service in partnership with the NHS has a responsibility to ensure that prisoners have access to health services that are broadly equivalent Prison Health Care Agency 6 to those the general public receives from the NHS† (What Healthcare Services is Prisoners Entitled to). This means that prisons already provide health education, patient education, prevention and other health promotion interventions in that general context.† In addition, it is a requirement that each and every prisoner be able to find the penitentiaries’ policy statement regarding the health care services that are offered. In this policy statement it must be able to be viewed in a noticeable spot that is in an accessible location for all inmates. The policy statement must explain in detail what specific primary care, dental and specialist clinical services are available to prisoners, along with who is responsible for providing them (Health Care in Prison, 2013). All prisons must provide the policy statement to any prisoner who requests this information regarding the health care services available to them within a particular time frame. Prison Health Care Agency 7 References: Chen, S. (2009, November). Prison health-care costs rise as inmates grow older and sicker. CNN Justice, (), 1-3. Retrieved from http://articles.cnn.com/2009-11- 13/justice/aging.inmates_1_prison-inmate-largest-prison-systems-medical-costs? Health care in prison. (2013). Retrieved from http://www.aidsmap.com/Health-care-in- prison/page/1503575/ The Federal Bureau of Prisons. (2008). Retrieved from http://www.justice.gov/oig/reports/BOP/a0808/final.pdf The United States Department of Justice. (2013). Retrieved from http://www.justice.gov/ag/

Friday, November 8, 2019

Analysis Of The Poem Babi Yar Essays - The Holocaust In Ukraine

Analysis Of The Poem Babi Yar Essays - The Holocaust In Ukraine Analysis of the Poem "Babi Yar" In the poem, Babi Yar, Yevgeny Yevtushenko does a wonderful job of paying tribute to the Jewish victims of the Holocaust. He does this by portraying the history of the Jewish people. Yevtushenko also uses various literary devices to heighten the sentiment of the poem. The poem is told in the first person, by the author of the poem. In the poem it is also apparent that he is addressing all Russian citizens when he writes "O Russian people". In this manner Yevtushenko is able to eulogize the Jewish victims of the Holocaust in front of a wide audience. This technique also allows him to speak directly to the Russian people and tell them of their wrongs at the end of the poem. Through usage of the first person he is able to place himself in the various situations of anti-Semitism in history. He takes us from Egypt, to the cross; from the Dryfus affair to the pogroms; from Anne Frank's dark room to the massacre of Babi Yar. Through all this Yevtushenko proclaims that "I" was there. This gives the reader a sense of being trapped in the middle of these horrifying events. The first person gives an eerie description that a third person description could not give. After he finishes his recitation of past events he begins addressing the Russian people of the present. He tells them that in general the Russians are a good hearted people. But, he goes on to say that there are a minority of Russians who ruin the good name of the whole. Yevtushenko contends that these people call themselves "The union of the Russian people". However, he then goes on to directly contradict their self-proclaimed name with clever uses of diction. He claims that the Internationale, or the Russian "union" song, will only be sung after these same anti-Semites are dead. In the last lines of the poem he admits that although he is not a Jew he demands to "let me be a Jew". Only when he is a Jew can he then go on to "call myself a Russian". What he means by all this is that the Russian people are not a group of Jew-haters, but rather a country of people who feel for the sorrows of the Jewish people. The first ezza is an introduction that tells us the occasion of the poem. It claims that "There are no monuments on Babi Yar, A steep ravine is all, a rough memorial." He then goes on to devote the rest of the poem as a eulogy to the Jews killed by the Russians. Therefore, this first ezza gives us the reason why he wrote the poem. This poem would in fact be the memorial for Babi Yar. The first ezza also does a terrific job of setting the gloomy tone for the rest of the poem. He also seems to hint at the fact that the anti-Semitism that began with the Christians is the same exact anti-Semitism that has continued to the present date. The anti-Semitism of Egypt remained in "her ancient days", but he insists that "I perish on the cross, and even now I bear the red marks of nails." His usage of the words "even now" contend that that specific anti-Semitism continues to the present date. In the next few ezzas sound plays a critical role. In the first line of the second ezza there is a repetition of the letter "d" in "Dryfus, detested, denounced". This sound conjures something approaching from behind you, like a march. Although, this ezza only affects one man, Dryfus, but there is the image of something approaching in the "d" sound. The second line of the third ezza reads "I seam to see blood spurt and spread". Here we have the repetition of the "s" sound. This sounds like air escaping from something, getting ready to explode. Then all of a sudden there are "The rampant pogrom roars". Things are getting worse. In the following ezza is a "translucent twig". The repeated "t" sound is like the ticking of a time bomb. Immediately after this one reads of the "pounding", or the final explosion. The explosion creates a "silent" sound and

Tuesday, November 5, 2019

D-Day

D-Day What Was D-Day? In the early morning hours of June 6, 1944, the Allies launched an attack by sea, landing on the beaches of Normandy on the northern coast of Nazi-occupied France.   The first day of this major undertaking was known as D-Day; it was the first day of the Battle of Normandy (code-named Operation Overlord) in World War II. On D-day, an armada of approximately 5,000 ships secretly crossed the English Channel and unloaded 156,000 Allied soldiers and nearly 30,000 vehicles in a single day on five, well-defended beaches (Omaha, Utah, Pluto, Gold, and Sword). By the end of the day, 2,500 Allied soldiers had been killed and another 6,500 wounded, but the Allies had succeeded, for they had broken through the German defenses and created a second front in World War II. Dates:   June 6, 1944 Planning a Second Front By 1944, World War II had already been raging for five years and most of Europe was under Nazi control. The Soviet Union was having some success on the Eastern Front but the other Allies, specifically the United States and the United Kingdom, had not yet made a full-fledged attack on the European mainland. It was time to create a second front. The questions of where and when to start this second front were difficult ones. The northern coast of Europe was an obvious choice, since the invasion force would be coming from Great Britain. A location that already had a port would be ideal in order to unload the millions of tons of supplies and soldiers needed. Also required was a location that would be within range of Allied fighter planes taking off from Great Britain. Unfortunately, the Nazis knew all this as well. To add an element of surprise and to avoid the bloodbath of trying to take a well-defended port, the Allied High Command decided on a location that met the other criteria but that did not have a port the beaches of Normandy in northern France. Once a location had been chosen, deciding upon a date was next. There needed to be enough time to collect the supplies and equipment, gather the planes and vehicles, and train the soldiers. This whole process would take a year. The specific date also depended on the timing of low tide and a full moon. All of this led to a specific day – June 5, 1944. Rather than continually refer to the actual date, the military used the term â€Å"D-Day† for the day of attack. What the Nazis Expected The Nazis knew the Allies were planning an invasion. In preparation, they had fortified all northern ports, especially the one at Pas de Calais, which was the shortest distance from southern Britain. But that was not all. As early as 1942, Nazi Fà ¼hrer Adolf Hitler ordered the creation of an Atlantic Wall to protect the northern coast of Europe from an Allied invasion. This was not literally a wall; instead, it was a collection of defenses, such as barbed wire and minefields, that stretched across 3,000 miles of coastline. In December 1943, when highly-regarded Field Marshal Erwin Rommel (known as the â€Å"Desert Fox†) was put in charge of these defenses, he found them completely inadequate. Rommel immediately ordered the creation of additional â€Å"pillboxes† (concrete bunkers fitted with machine guns and artillery), millions of additional mines, and a half million metal obstacles and stakes placed on the beaches that could rip open the bottom of landing craft. To hinder paratroopers and gliders, Rommel ordered many of the fields behind the beaches to be flooded and covered with protruding wooden poles (known as â€Å"Rommel’s asparagus†). Many of these had mines fitted on top. Rommel knew that these defenses would not be enough to stop an invading army, but he hoped it would slow them down long enough for him to bring reinforcements. He needed to stop the Allied invasion on the beach, before they gained a foothold. Secrecy The Allies desperately worried about German reinforcements. An amphibious attack against an entrenched enemy would already be incredibly difficult; however, if the Germans ever found out where and when the invasion was to take place and thus reinforced the area, well, the attack might end disastrously. That was the exact reason for the need of absolute secrecy. To help keep this secret, the Allies launched Operation Fortitude, an intricate plan to deceive the Germans. This plan included false radio signals, double agents, and fake armies that included life-size balloon tanks. A macabre plan to drop a dead body with false top-secret papers off the coast of Spain was also used. Anything and everything was used to deceive the Germans, to make them think that the Allied invasion was to occur somewhere else and not Normandy. A Delay All was set for D-Day being on June 5, even the equipment and soldiers had already been loaded onto the ships. Then, the weather changed. A massive storm hit, with 45-mile-an-hour wind gusts and lots of rain. After much contemplation, the Supreme Commander of the Allied Forces, U.S. General Dwight D. Eisenhower, postponed D-Day just one day. Any longer of a postponement and the low tides and full moon wouldn’t be right and they’d have to wait another whole month. Also, it was uncertain they could keep the invasion secret for that much longer. The invasion would begin on June 6, 1944. Rommel also paid notice to the massive storm and believed that the Allies would never invade in such inclement weather. Thus, he made the fateful decision to go out of town on June 5 to celebrate his wife’s 50th birthday. By the time he was informed of the invasion, it was too late. In Darkness: Paratroopers Begin D-Day Although D-Day is famous for being an amphibious operation, it actually started with thousands of brave paratroopers. Under the cover of darkness, the first wave of 180 paratroopers arrived in Normandy. They rode in six gliders that had been pulled and then released by British bombers.   Upon landing, the paratroopers grabbed their equipment, left their gliders, and worked as a team to take control of two, very important bridges: the one over the Orne River and the other over the Caen Canal. Control of these would both hinder German reinforcements along these paths as well as enable the Allies access to inland France once they were off the beaches. The second wave of 13,000 paratroopers had a very difficult arrival in Normandy. Flying in approximately 900 C-47 airplanes, the Nazis spotted the planes and started shooting. The planes drifted apart; thus, when the paratroopers jumped, they were scattered far and wide.    Many of these paratroopers were killed before they even hit the ground; others got caught in trees and were shot by German snipers. Still others drowned in Rommel’s flooded plains, weighed down by their heavy packs and tangled in weeds. Only 3,000 were able to join together; however, they did manage to capture the village of St. Mà ©re Eglise, an essential target. The scattering of the paratroopers had a benefit for the Allies – it confused the Germans. The Germans did not yet realize that a massive invasion was about to get underway. Loading the Landing Craft While the paratroopers were fighting their own battles, the Allied armada was making its way to Normandy. Approximately 5,000 ships including minesweepers, battleships, cruisers, destroyers, and others – arrived in the waters off France around 2 a.m. on June 6, 1944. Most of the soldiers on board these ships were seasick. Not only had they been on board, in extremely cramped quarters, for days, crossing the Channel had been stomach turning because of extremely choppy waters from the storm. The battle began with a bombardment, both from the armada’s artillery as well as 2,000 Allied aircraft that soared overhead and bombed the beach defenses. The bombardment turned out to be not as successful as had been hoped and a lot of German defenses remained intact. While this bombardment was under way, the soldiers were tasked with climbing into landing craft, 30 men per boat. This, in itself, was a difficult task as the men climbed down slippery rope ladders and had to drop into landing craft that were bobbing up and down in five-foot waves. A number of soldiers dropped into the water, unable to surface because they were weighted down by 88 pounds of gear. As each landing craft filled up, they rendezvoused with other landing craft in a designated zone just outside of German artillery range. In this zone, nicknamed â€Å"Piccadilly Circus,† the landing craft stayed in a circular holding pattern until it was time to attack. At 6:30 a.m., the naval gunfire stopped and the landing boats headed toward shore. The Five Beaches The Allied landing boats were headed to five beaches spread out over 50 miles of coastline.   These beaches had been code-named, from west to east, as Utah, Omaha, Gold, Juno, and Sword. The Americans were to attack at Utah and Omaha, while the British struck at Gold and Sword. The Canadians headed toward Juno. In some ways, soldiers reaching these beaches had similar experiences. Their landing vehicles would get close to the beach and, if they were not ripped open by obstacles or blown up by mines, then the transport door would open and the soldiers would disembark, waist-deep in the water. Immediately, they faced machine-gun fire from the German pillboxes. Without cover, many in the first transports were simply mowed down. The beaches quickly became bloody and strewn with body parts. Debris from blown up transport ships floated in the water.   Injured soldiers that fell in the water usually did not survive – their heavy packs weighed them down and they drowned. Eventually, after wave after wave of transports dropped off soldiers and then even some armored vehicles, the Allies started making headway on the beaches. Some of these helpful vehicles included tanks, such as the newly designed Duplex Drive tank (DDs). DDs, sometimes called â€Å"swimming tanks,† were basically Sherman tanks that had been fitted with a flotation skirt that allowed them to float. Flails, a tank equipped with metal chains in front, was another helpful vehicle, offering a new way to clear mines ahead of the soldiers. Crocodiles, were tanks equipped with a large flame thrower. These specialized, armored vehicles greatly helped the soldiers on Gold and Sword beaches. By early afternoon, the soldiers on Gold, Sword, and Utah had succeeded in capturing their beaches and had even met up with some of the paratroopers on the other side. The attacks on Juno and Omaha, however, were not going as well. Problems at Juno and Omaha Beaches At Juno, the Canadian soldiers had a bloody landing. Their landing boats had been forced off course by currents and thus had arrived at Juno Beach a half hour late. This meant that the tide had risen and many of the mines and obstacles were thus hidden under water.   An estimated half of the landing boats were damaged, with almost a third completely destroyed. The Canadian troops eventually took control of the beach, but at a cost of more than 1,000 men. It was even worse at Omaha. Unlike the other beaches, at Omaha, American soldiers faced an enemy that was safely housed in pillboxes located on top of bluffs that soared 100 feet above them. The early-morning bombardment that was supposed to take out some of these pillboxes missed this area; thus, the German defenses were nearly intact. The were was one particular bluff, called Pointe du Hoc, that stuck out into the ocean  between Utah and Omaha Beaches, giving German artillery at the top the ability to shoot at both beaches. This was such an essential target that the Allies sent in a special Ranger unit, led by Lt. Col. James Rudder,  to take out the artillery on top. Although arriving a half hour late because of drifting from a strong tide, the Rangers were able to use grappling hooks to scale the sheer cliff. At the top, they  discovered that the guns had been temporarily replaced by telephone poles to fool the Allies and to keep the guns safe from the bombardment. Splitting up and searching the countryside behind the cliff, the Rangers  found the guns. With a group of German soldiers not far away, Rangers snuck in and detonated thermite grenades in the guns, destroying them.   In addition to the bluffs, the crescent-shape of the beach made Omaha the most defensible of all the beaches. With these advantages, the Germans were able to mow down transports as soon as they arrived; the soldiers had little opportunity to run the 200 yards to the seawall for cover. The bloodbath earned this beach the nickname â€Å"Bloody Omaha.† The soldiers on Omaha were also essentially without armored help. Those in command had only requested DDs to accompany their soldiers, but nearly all of the swimming tanks headed toward Omaha drowned in the choppy waters. Eventually, with the help of naval artillery, small groups of men were able to make it across the beach and take out the German defenses, but it would cost 4,000 casualties to do so. The Break Out Despite a number of things not going to plan, D-Day was a success. The Allies had been able to keep the invasion a surprise and, with Rommel out of town and Hitler believing the landings at Normandy were a ruse for a real landing at Calais, the Germans never reinforced their position. After initial heavy fighting along the beaches, the Allied troops were able to secure their landings and break through German defenses to enter the interior of France. By June 7, the day after D-Day, the Allies were beginning the placement of two Mulberries, artificial harbors whose components had been pulled by tugboat across the Channel. These harbors would allow millions of tons of supplies to reach the invading Allied troops. The success of D-Day was the beginning of the end for Nazi Germany. Eleven months after D-Day, the war in Europe would be over.

Sunday, November 3, 2019

Project management group project 5 Essay Example | Topics and Well Written Essays - 750 words

Project management group project 5 - Essay Example This paper compares how business organizations and education organization use of information system to assist them control their internal activities and to make decisions concerning their organizations. Businesses use of information system at all stages of organization procedure to obtain information, work on the information obtained and keep the information. Organization totals and publishes this information by presenting data needed for proper decision making within the organization (Lindsay, 2000). All individuals within the organization use information system to make decisions concerning the effectiveness of their organization. For example, a firm that vends automobiles might use information system to vend automobiles through the internet and can interact with different clients through the internet (Lindsay, 2000). In fact, most business organization advertises their products using information management systems (Lindsay, 2000). Experts in management system develop information systems used by organizations to store information, and analyze the information obtained to meet the needs of business organizations. By businesses using of management information system, they are usually in a position to modernize their activities into a consistent operative unit. Through it, several businesses obtain support in proper decision-making process (Lindsay, 2000). Similar, organization like education settings use information system to manage registration of learners, students absence, performance of students, organized studying, examination organization, construction of timetables, cover administration as well as other educational activities (Laudon and Laudon, 2010). Information system is used in education to maintain education information to help educationist to conduct frequent and complete evaluations, teaching and

Friday, November 1, 2019

Areas of Concern to Ensure Business Success Case Study

Areas of Concern to Ensure Business Success - Case Study Example Finally, they are often unable to raise sufficient funds as they only rely on their own ability. Â  Diversification is a method used in spreading risk. In the case of Jones Electrical Distribution, the business is only in operation during summer and spring when the weather is conducive for construction work. He should expand operations to ensure that business activity is not faced by seasonality. He should try other products that sell throughout. Â  Having a fewer supplier helps in cutting down distribution costs and the degree of logistics of the company. Consistency in the quality of materials supplied is also assured. This also reduces the number of customer complaints and establishes an intimate relationship with the supplier. In addition, the supplier aims at pleasing the customer because of the huge quantities by giving discounts. It’s not fit to have a single supplier though because if the supplier is adversely affected by an event, the business is also affected. The supplier might also become complacent since he knows you cannot get a better supplier than them. Â  The $350,000 line of credit is not enough money for the business. Looking at the 2007 balance sheet, the amount of financing required in more than $350,000. The business requires twice the amount in order to bring its liquidity to an acceptable level. Â  Alternatively, Jones can consider using profits of the business as a source of finance. Secondly, he can borrow from friends at agreeable interest rates.

Wednesday, October 30, 2019

Effects of inflation Term Paper Example | Topics and Well Written Essays - 1750 words

Effects of inflation - Term Paper Example The reduction in investments level will lead to a reduction in economic growth levels which depend on the level of investments. Inflation makes it hard for firms to plan for the amount of output to produce since the firms cannot forecast the demand for their product at the higher prices they will have to charge to cover costs. High inflation causes speculation on prices and interest rates which in turn increases the risk among potential trade partners, discouraging trade. Inflation reduces the value of depositor’s savings and as well reduces the value of bank loans. In the long run, the company’s revenue and earnings should increase at the same pace as inflation. But it could also reduce the confidence of investors by reducing confidence in investments that take a long time to mature. When there is a high rate of inflation a firm may look as if it is doing well when inflation is the reason behind the growth (Wildermuth, 2012).The effect of inflation on investment occurs directly and indirectly. People are not ready to enter into contracts when inflation cannot be predicted making relative prices uncertain. This reluctance to enter into contracts will affect economic growth. High inflation leads to financial repression as governments take action to protect certain sectors of the economy.Inflation is particularly detrimental to retirees whose pensions and financial investments have to be adjusted for inflation. Pension payments are now indexed to inflation in order to reduce the effects of inflation... When there is a high rate of inflation a firm may look as if it is doing well when inflation is the reason behind the growth (Wildermuth, 2012). The effect of inflation on investment occurs directly and indirectly. People are not ready to enter into contracts when inflation cannot be predicted making relative prices uncertain. This reluctance to enter into contracts will affect economic growth. High inflation leads to financial repression as governments take action to protect certain sectors of the economy. Inflation is particularly detrimental to retirees whose pensions and financial investments have to be adjusted for inflation. Pension payments are now indexed to inflation in order to reduce the effects of inflation Inflation can lead to a poor performance in the stock markets. In times of high inflation, if the firms cannot pass on the extra cost to the consumers they will most likely end up making losses. This will reduce the viability of their stocks and lead to the investors w ho had invested in the firms' stocks will suffer financial setback as the company makes losses. It leads to the changes in the preferred assets held by the wealthy individuals in a country. In the initial stages the three would be a preference for intangible assets so as to make a killing from the interest rates but as inflation increases there is capital flight from the stock markets by foreign and domestic investors and who instead invest their wealth in tangible assets whose value is not likely to be eroded swiftly by the inflationary tendencies. Inflation leads to a reduction in the balance of payments. When the domestic price level rises faster than it is rising

Monday, October 28, 2019

Network Security Plan Essay Example for Free

Network Security Plan Essay INTRODUCTION (Purpose and Intent) The Corporation Tech IT Network Security Plan establishes guidelines for IT practices used on a day to day basis to provide a secure and robust computing environment. These practices are used in order to protect the mission, operation, and reputation of Corporation Tech System and its information systems. These system security policies, standards, and procedures that have been established for the Corporation Tech System, are intended to comply with the regulations and policies set down by the State of Florida, Corporation Tech, and the Federal Information Security Management Act (FISMA). SCOPE These standards and procedures apply to all information systems and resources under the control of Corporation Tech, including all computers connecting to the Corporation Tech network and all Corporation Tech System employees, contractors, and any other individuals who use and/or administer those systems and computers, particularly those involved with information system management. STANDARD PROVISIONS Corporation Tech IT will manage risk by identifying, evaluating, controlling, and mitigating vulnerabilities that are a potential threat to the data and information systems under its control. User accounts and passwords are implemented to maintain individual accountability for network resource usage. Any user who obtains an account and password for accessing a Corporation Tech provided resource, is required to keep these credentials confidential. Users of these systems may only use the accounts and passwords for which they have been assigned and authorized to use, and are prohibited  from using the network to access these systems through any other means. This plan also prohibits the sharing of personal user accounts or passwords for accessing Corporation Tech or Internet computing resources. In the interest of maintaining account security, passwords will be changed on a regular schedule or anytime the integrity of the account is in question. Corporation Tech IT network or computing resources may not be used for personal commercial purposes, for personal profit or to violate the laws and regulations of the United States or any other nation, or the laws and regulations of any state, city, province or other local jurisdiction in any material way. Use of Corporation Tech resources for any illegal activity may result in loss of network access privileges, official reprimand, suspension or dismissal. Corporation Tech will cooperate with any legitimate law enforcement agency or inquiry in the investigation and prosecution of any alleged wrongful activity. Corporation Tech’s network or Internet facilities may not be used to disable or overload any computer system or network, or to circumvent any system intended to protect the privacy or security of another user. Corporation Tech owned networking and communications equipment, may only be moved by Network and Computing Support staff, or authorized agents. Reconfiguration of network hardware or software, except by designated individuals within IT, is strictly prohibited. Prior to connecting any server, network communication or monitoring device to the Corporation Tech Network, approval must be obtained from Data Center Communications. Attachment of any the following devices to the Corporation Tech network, other than those provided or approved by Network and Computing Support, is strictly prohibited: a. DHCP servers. b. DNS servers. c. NAT routers. d. Network Gateways. e. Packet capturing or network monitoring devices. f. Any device that disrupts or negatively impacts network operations. STATEMENT OF PROCEDURES The procedures for conducting a risk assessment and for the control and mitigation of risks to the Corporation Tech Information Systems include: NETWORK CONTROL Corporation Tech IT has software and systems in place that have the ability to monitor and record network, Internet and computer system usage. This includes monitoring and security systems that are capable of recording network traffic, including traffic to World Wide Web sites, chat rooms, newsgroups and e-mail messages, file servers, telnet sessions and file transfers into and out of our internal networks. This capability is necessary in order to maintain the health of Corporation Tech network operations and diagnose network related problems. Corporation Tech IT reserves the right to perform network monitoring at any time. The information collected may be used by technicians and management to assess network utilization and trends, and may also be provided to upper management or other authorities as evidence as part of any investigation of alleged policy violations. Corporation Tech IT reserves the right to perform periodic port scans, segment sweeps, and vulnerability scans on all network segments. Network operations, functions, and resources, which are not required as part of the normal and approved job duties or projects at Corporation Tech, may be bandwidth limited or blocked by network control devices in order to protect the integrity and availability of the overall system. Corporation Tech IT may suspend network access to any location or system that disrupts normal network operations or systems that violate Corporation Tech policy. In this event, an attempt will be made to contact the responsible individual to resolve the problem. DHCP SERVICES Corporation Tech IT provides centralized and redundant DHCP and DNS services for Corporation Tech. Due to the nature of these services, and because of the potential disruption of service and possible security breaches resulting from incorrect setup of additional systems, attachment of unauthorized DHCP or DNS servers is prohibited. The following guidelines must be followed when requesting or using any DHCP or DNS services: †¢ Systems requiring an IP address must support DHCP and be capable of obtaining DHCP address information from one of the centrally administered University DHCP servers. †¢ Using DHCP, devices requesting an IP address will be assigned a dynamic pool address from the subnet to which the device is attached. Devices with dynamically assigned IP addresses may have their address change. †¢ Static IP addresses needed for server class machines or specialized clients must be  requested from the Data Center Communications Team via a Help Desk ticket. DNS SERVICES User workstations, which have been assigned a dynamic pool IP address, will have an associated DNS name assigned by the network. Any DNS name or domain name that is to be associated with Corporation Tech network, must be requested from and/or registered through Web Services. DNS names ending in corptech.com are made available upon request for Corporation Tech approved services. Requests for assignment of DNS names must be for valid Corporation Tech related purposes. DNS names for domains other than corptech.com, and which are to be hosted by Corporation Tech systems, must be requested from Web Services. Any charges for initial or ongoing registration of the requested name are the responsibility of the requestor. DNS names, not in the corptech.com domain, will be handled on a case by case basis. Corporation Tech IT will work with any user requesting a domain name to identify an appropriate and available name, however Corporation Tech IT has final approval for all DNS name assignments. WIRELESS NETWORK SERVICES Because wireless networks can be used to provide access to the same resources and services as wired network systems, the same basic procedures that are used in a wired network environment can also be applied in a wireless network environment. However, due to the nature of wireless networks, additional security and control mechanisms are needed in order to maintain the security, operation and inter-operability of both traditional and wireless systems. Wireless routers are not allowed on the Corporation Tech network unless they have been approved by Corporation Tech IT. Access to the Corporation Tech Wireless network is limited to individuals who have a Corporation Tech account except in locations where the guest network is available. The Corporation Tech Guest Network is segregated from the internal servers and resources used by authenticated users to keep the network secure. The Corporation Tech Guest Network is only available in approved areas, and require a request to be expanded into any other areas. Users of the Corporation Tech Guest Network are required to provide a valid cell phone number in order to authenticate. Destruction and Disposal of Information and Devices Restricted information must be disposed of in such manner as to ensure it cannot be retrieved and recovered by unauthorized persons. When donating, selling, transferring, surplusing or disposing of computers or removable media (such as DVDs), the proper procedures to make data unreadable on those media will be taken. Acceptable procedures are listed on ISSP-009, â€Å"Medial Disposal.† NETWORK ACCESS Anyone who uses the Corporation Tech computing environment must have appropriate status (e.g. management, employee, staff, or authorized third party) and must be properly authenticated when required. Access will be provided to vendors and or other Corporation Tech partners through the sponsored VIP account process, as described on http://www.corptech.com/it/services/vip.aspx. VIP accounts are reviewed and renewed on six month intervals to see if access is still needed. When an employee leaves the organization accounts will be disabled once TERM status is updated, and individual departments must approve re-activation of account access. USER COMPUTING DEVICES Users are responsible for the security and integrity of Corporation Tech information stored on their workstation, which includes controlling physical and network access to the equipment. Users may not run or otherwise configure software or hardware that may allow access by unauthorized users. Anti-virus software must be installed on all workstations that connect to the Corporation Tech Network. Corporation Tech Computers may not be used to copy, distribute, share, download, or upload any copyrighted material without the permission of the copyright owner. PHYSICAL ACCESS Access to Corporation Tech IT Data Center should be restricted to those responsible for operation and maintenance. Access by non-IT personnel is not permitted unless they are escorted by an authorized IT staff member. Computer installations should provide reasonable security measures to protect the computer system against natural disasters, accidents, loss or fluctuation of electrical power, and sabotage. Networking and computing hardware are placed in secure and appropriately cooled areas for data  integrity and security NETWORK HARDWARE Network hardware are housed behind a locked door to protect physical access to switches and other network hardware. Access is only allowed though card access or with a checked out key. All switches and network hardware are password protected at a minimum via a local account setup on the device itself, these passwords are changed periodically as administrators leave the organization. Subnets allowed to authenticate with switch management will be restricted, to create tighter control of backend administration. Exec level access Timeouts implemented on Console and VTY lines, so that any idle sessions are terminated automatically. All switches are time synced using NTP, so that incidents can be tracked and correlated to the proper timeframe. SERVER ENVIRONMENTS All servers are subject to a security audit and evaluation before they are placed into production. Administrative access to servers must be password protected and use two-factor authentication whenever possible. Servers should be physically located in an access-controlled environment. All internal servers deployed at Corporation Tech must be owned by an operational group that is responsible for system administration. Servers must be registered with the IT department. At a minimum, the following information is required to positively identify the point of contact: a. Server owner contact(s) and location. b. Hardware and Operating System/Version c. Main functions and applications d. MAC address (If not a virtual server) Services and applications that will not be used must be disabled where practical. Access to services should be logged and/or protected through access-control methods to the extent possible. The most recent security patches must be installed on the system as soon as practical. Do not use administrator or root access when a non-privileged account can be used. Privileged access must be performed over secure channels, (e.g., encrypted network connections using SSH or IPSec). EXCEPTIONS All requests for exceptions to these standards and procedures will be handled by request, and will follow these guidelines: †¢ Must be submitted in writing to and approved by the CIO or with the proper authority. †¢ Will be reviewed on a case by case basis. NETWORK SECURITY Corporation Tech network design is built around three principles, Defense-in-Depth, Compartmentalization of Information and Principle of Least Privilege. Our first step was to look at what we are protecting, which is ultimately our business and clients data and information. To ensure a sound architecture we started the design of our network with scalability in mind. It is important that our design is flexible enough to meet future needs. The threats we know about and face today may not be the ones we face tomorrow. While developing security requirements for our IT system resources, we will determine if they are mission-critical or data-sensitive resources. This will allow us to determine where data confidentiality and integrity are the most important requirements, or where the priority is continuity of operation (availability). DEFENSE-IN-DEPTH Network safeguards offer the first protection barrier of IT system resources against threats originating outside the network. These threats can be in the form of intruders or malicious code. Our network design offers layered protections. What this means is the security layers complement each other; what one misses the other catches. This will be accomplished by locating security defenses in different places throughout our IT system, as well as not using two of the same types of safeguards. Although this may increase the complexity of our security system and can potentially make management and maintenance more difficult and costly, we believe the safety of the IT system resources should be based on the protection. With defense-in-depth in mind, the first layer of our network security plan starts with our network perimeter security. The principle network security defenses are firewalls, intrusion detection and prevention systems (IPS/IDS), VPN protections and content inspection systems like anti-virus, anti-malware, anti-spam and URL filtering. The traditional first line of defense against attacks is typically the firewall, which is configured to allow/deny traffic by  source/destination IP, port or protocol. It’s very straight forward, either traffic is allowed or it’s blocked. With the advent of Next Generation firewalls, which can include application control, identity awareness and other capabilities such as IPS, web filtering, and advanced malware detection, all of these features can be controlled by one device. COMPARTMENTALIZATION OF INFORMATION Corporation Tech will have IT system resources with different sensitivity levels or different risk tolerance levels and threat susceptibilities. These resources should be located in different security zones. The idea is to hide the data or information and make it available only to those systems where it is necessary for conducting system tasks. Examples of this are: †¢ E-mail, Web and DNS servers are located in the DMZ behind the perimeter firewall. †¢ Databases servers such as SQL servers are located in the Database Zone, within the internal firewall/IPS. †¢ Intranet servers, file servers and user workstations are in the LAN zone within the internal firewall. †¢ The Internet is located in the Internet zone behind the perimeter firewall. Principle of Least Privilege Corporation Tech administrators and users will have minimal privileges necessary for proper functioning within the organization. This rule applies also to data and services made available for external users. An extension to this rule is the â€Å"Need-To-Know† principle which says that users and administrators of Corporation Tech IT system have access to only the information relevant to their role and duties performed. Other points of security that we will address in our network services availability is the single point of failure principle, the separation of duty and job rotation rules. The network paths between users and mission-critical IT system resources, all the links, devices (networking and security) as well as the servers will be deployed in redundant configurations. The goal of the separation of duty and job rotation rule is to limit an employee’s ability to neglect and break the IT system’s security policy. Separation of duty dictates that important tasks/functions should be performed by two or more employees. Job rotation states that there should be rotation of employees in important positions. NETWORK HARDENING For each layer of security, we will ensure they are running the most up-to-date software and operating systems, and that the devices are configured properly. SECURITY ZONES Intrusion Prevention (IPS) devices are responsible for detecting and blocking penetrations and attacks conducted by intruders and malicious malware applications. We recommend an IPS be installed in the network path between potential threat sources and sensitive IT system resources. Attacks through encrypted SSL sessions are a potential vulnerability so we recommend decrypting the sessions prior to it reaching the IPS device in order to inspect unencrypted packets. The IPS will be properly optimized and monitored to catch attackers that have slipped past the first defense (firewall/router). Internal networks will not have direct access to the Internet so a Trojan sent to a user’s workstation through a phishing attack would not allow the intruder to connect to the external network. Internet services are available for internal users only through company email and HTTP Proxy servers. ENABLE SECURE NETWORK ACCESS We will install a VPN that is configured to allow encrypted communication to our network from the outside. Utilizing two-factor authentication, ensuring the integrity of the users making the request. This is external-facing to our network and allows users to tunnel into our LAN from the outside once the appropriate measures are taken to secure access. SEGMENTED DMZ There will be a front-end firewall for the external traffic and a back-end firewall for the internal traffic. Firewall rules will be optimized and tightened on all publicly available systems to allow traffic to only the necessary ports and services living within the DMZ. Firewall rules have been created to only allow the source IP addresses and port to the specific servers and proxies have been added in the network from which administrators are allowed access to the systems. Systems within different VLANs (with a layer 3 switches) have been configured to help isolate and respond to incidents if a server in the DMZ is compromised. Authentication on the LAN is required before access to the DMZ is even attempted. This prevents allowing complete control over these systems at any given time. DEVICE  INTEGRITY All hardware and software will be purchased only from the manufacturer or from resellers who are authorized and certified by the equipment manufacturer. Unused physical interfaces on network devices will be shut down. Access lists that allow only those protocols, ports and IP addresses that are required by network users and services are implemented. Everything else is denied. Network device configuration file are protected from unauthorized disclosure. Steps have been taken to avoid plaintext passwords in the configuration files. This has been accomplished by using encryption and/or a salted hash with iteration to protect the confidentiality of passwords in configuration files. Change passwords/keys immediately if the network device configuration file is transmitted in the clear (or is otherwise exposed) while containing non-encrypted passwords/keys. Secure protocols will be used when transmitting network device configuration files. All unneeded services on network devices must be sh ut down. Log files will be reviewed regularly to gain an in depth understanding of normal network behavior. Any irregularity will be reported and investigated. SECURE MANAGEMENT Only secure protocol standards (SSHv2; IKEv2/IPsec; TLS v1.0+) will be used when performing remote management of network devices. Default usernames and/or passwords will not be used. The network infrastructure security policy should define password length and complexity requirements. Review the network infrastructure security policy. This policy identifies who is allowed to log in to network infrastructure devices and who is allowed to configure network devices, and defines a plan for updating network device firmware at scheduled intervals. PORT VULNERABILITES Port 25 – Is used for SMTP (Simple Mail Transfer Protocol). It uses both tcp and udp protocols. This port used for e-mail routing between mail servers and is susceptible to many known Trojan’s. We are keeping this port in a closed state. Port 80 – Is used for web traffic Hyper Text Transfer Protocol (HTTP). It uses both tcp and udp protocols. Port 80 udp is also used by some  games, like Alien vs Predator. Code Red and Nimda worms also propagate via TCP port 80 (HTTP). Also, a number of trojans/backdoors use these ports. We are keeping this port in a closed state. Port 139 – Is used for NetBIOS. NetBIOS is a protocol used for File and Print Sharing under all current versions of Windows. By default, when File and Print Sharing is enabled it binds to everything, including TCP/IP (The Internet Protocol), rather than just the local network, meaning your shared resources are available over the entire Internet for reading and deletion, unless configured proper ly. Any machine with NetBIOS enabled and not configured properly should be considered at risk. The best protection is to turn off File and Print Sharing, or block ports 135-139 completely. We will leave this port in an open state but will turn off file and print sharing capabilities. Port 1900 – Is used for SSDP, UPnP. UPnP discovery/SSDP, is a service that runs by default on WinXP, and creates an immediately exploitable security vulnerability for any network-connected system. It is vulnerable to denial of service and buffer overflow attacks. Microsoft SSDP Enables discovery of UPnP devices. We are keeping this port in a closed state. Port 2869 – Is IANA registered for: ICSLAP. It uses both tcp and udp protocols and is used for Microsoft Internet Connection Firewall (ICF), Internet Connection Sharing (ICS), SSDP Discover Service, Microsoft Universal Plug and Play (UPnP), and Microsoft Event Notification. We will leave this port in an open state. Port 5357 – Is used by Microsoft Network Discovery, and should be filtered for public networks. It uses both tcp and udp protocols. It is also IANA registered for: Web Services for Devices (WSD) a network plug-and-play experience that is similar to installing a USB device. WSD allows network-connected IP-based devices to advertise their functionality and offer these services to clients by using the Web Services protocol. WSD communicates over HTTP (TCP port 5357), HTTPS (TCP port 5358), and multicast to UDP port 3702. We will close this port and redirect traffic to HTTPS (TCP port 5358). Port 6839 – This port is not associated with any particular services and should be closed unless it is associated and used. Port 7435 – This port is not associated with any particular services and should be closed unless it is associated and used. Ports 9100, 9101 and 9102 – These TCP ports are is used for printing. Port numbers 9101 and 9102 are for parallel ports 2 and 3 on the three-port HP Jetdirect external print  servers. It is used for network-connected print devices. These ports should remain open to allow print services. There are no listed vulnerabilities associated with these ports. Port 9220 This port is for raw scanning to peripherals with IEEE 1284.4 specifications. On three port HP Jetdirects, the scan ports are 9290, 9291, and 9292. It is used for network-connected print devices. This port should remain open to allow print services. There are no listed vulnerabilities associated with this port. Port 9500 – TCP Port 9500 may use a defined protocol to communicate depending on the application. In our case we are using port 9500 to access the ISM Server. The ISM Server is used for exchanging backup and recovery information between storage devices. This port should remain open while services are in use. There are no listed vulnerabilities associated with this port. Port 62078 This port is used by iPhone while syncing. The Port used by UPnP for multimedia files sharing, also used for synchronizing iTunes files between devices. Port 62078 has a known vulnerability in that a service named lockdownd sits and listens on the iPhone on port 62078. By connecting to this port and speaking the correct protocol, it’s possible to spawn a number of different services on an iPhone or iPad. This port should be blocked or closed when service is not required on the device. References BEST: Network Security Policy and Procedures. (n.d.). Retrieved from http://www.ct.gov/best/cwp/view.asp?a=1245q=253996 Example Security Plan. (2014, November 17). Retrieved from http://www.binomial.com/security_plan/example_security_plan_template.php Hardening Network Infrastructure Security Recommendations for System Accreditors. (n.d.). Retrieved from https://www.nsa.gov/ia/_files/factsheets/Hardening_Network_Infrastructure_FS.pdf Network Security Policy: Best Practices White Paper Cisco. (2005, October 4). Retrieved from http://www.cisco.com/c/en/us/support/docs/availability/high-availability/13601-secpol.html Paquet, C. (2013, February 5). Security Policies Network Security Concepts and Policies. Retrieved from http://www.ciscopress.com/articles/article.asp?p=1998559seqNum=3 SANS Information Security Resources | Information Security Policy Templates |.