Monday, December 30, 2019

Essay on John Donne A Poet Out of His Time - 666 Words

John Donne: A Poet Out of His Time The first poet in the world in some things, applauded Ben Jonson of his friend, John Donne (Donne, John Donne: A Selection of His Poetry 11). In the midst of the stylized and often frivolous verses of the Elizabethan and cavalier poets, John Donnes work emerges as startling, intellectual, and honest to human nature and emotion- classifying him as the first of the modern poets. Through an exploration of Donnes The Sun Rising and The Flea, we shall reveal Donnes innovative style and technique, and how this repels him from the poetic orthodoxy of the seventeenth century and towards the style of the modern age. 0 Busy old fool, unruly sun,/ Why dost thou thus? Donne†¦show more content†¦Yet despite his realization of the suns power, his vanity grows, and he states that the worlds contracted thus in his own bedroom, and the sun, by shining only on the lovers, will warm the entire world. Donne also incorporates the emerging world of science into his poem: Ask for those kings whom thou sawst yesterday refers to the astronomic misconception that the sun rotated around the earth. Mixing science with poetry in Donnes time was extraordinary, considering the sonnets filled with Greek mythology and Bible verses of Donnes contemporaries. Writes John Hayward, Almost all of [Donnes] poems are dramatic monologues uttered in a mood of passionate apprehension (Donne, John Donne: A Selection of His Poetry 12). Like The Sun Rising, The Flea involves a direct speaker and listener, in this case a woman whom Donne is trying to get into bed with him. After the flea bites each of them, their two bloods mingled be, in coordination with seventeenth century belief that intercourse involved an exchanging of blood and even a sort of death of a part of each person. Since the flea has committed no sin in mixing the bloods, what is the harm in mixing the bloods themselves? However, his logic is in vain, for the woman is not swayed and kills the flea. Donne concludes that if she was able to kill her life in the flea, there should be no problem in exchanging more bloodShow MoreRelatedThe word Wit has multiple definitions, most of which metaphysical poets use in their distinctive1400 Words   |  6 Pagesdefinitions, most of which metaphy sical poets use in their distinctive poetic style. Definitions for wit include: â€Å"the keen perception and cleverly apt expression of those connections between ideas that awaken amusement and pleasure† (Dictionary.com 2014) and â€Å"understanding, intelligence, or sagacity, astuteness† (Dictionary.com 2014). In this paper I will unpack the main features of metaphysical poetry and explore the relevance of wit and conceit in relation to John Donne’s works. Furthermore, I willRead MoreEssay about Donnes Persuasion of Love1269 Words   |  6 PagesJohn Donne, a famous poet in the 17th century, was well known for writing love poems. In his early years, Donne was a Catholic Priest who in his later converted to church of England and became an Anglican Priest. During this period, he wrote poems that reflected his religious views and his love for his wife Ann. In one of his poems, John Donne uses the word Canonization to confuse his readers to believing that the poem is about religious views. However, he actually uses the word ‘Canonization’Read MoreJohn Donne Love Poetry1442 Words   |  6 Pagesin his prose book â€Å"The Dyers Hand and Other Essays† suggests â€Å"What makes it difficult for a poet not to tell lies is that, in poetry, all facts and all beliefs c ease to be true or false and become interesting possibilities†¦It may not, perhaps, be absolutely necessary that he believe it, but it is certainly necessary that his emotions be deeply involved, and this they can never be unless, as a man, he takes it more seriously than as a mere poetic convenience.† It is Donne’s sensibility and his personalRead MoreThe Flea By John Donne1558 Words   |  7 Pagesâ€Å"The Flea† Essay â€Å"The Flea† by John Donne when looked at briefly is simply a poem about a man trying to seduce a woman into participating in pre-material sexual relationship with him. However, â€Å"The Flea† constructs many more important arguments than simply that one. The poem touches on religion, love, and sex in a non-romanticized way, contrasting the normal glamorized stance seen in most of poetry. Most of John Donne’s poems have either romantic themes or religious themes; â€Å"The Flea† has both. ItRead MoreMetaphysical Poetry By John Donne1590 Words   |  7 Pages however according to poetry is†¦. Many poets got involved in metaphysical poetry like: Samuel Johnson who wrote his book which is known as ‘’Lives of the Most Eminent English Poets’’, Henry Vaughan, Andrew Marvel, Richard Crashaw, George Herbert and finally who was the main founder, John Donne. John Donne (1572 - 1631), the founder of the Metaphysical school of poetry, lived and wrote during the succeeding reigns of Elizabeth I, James 1 and Charles I. His early life was passed in dissipation andRead MoreJohn Donne And George Herbert942 Words   |  4 PagesJohn Donne and George Herbert are two metaphysical poets that lived in the United Kingdom around the 17th century. Although they are almost a generation apart in age, both poets showcase an unbelievable amount of comparison in their poems. Each of these poets has written about their life experiences from troubling times to love and compassion. Though they share similar backgrounds, each poet has a unique style that shows a great amount of symbolism, irony and spirituality. The poems EasterRead More John Donnes Use of Wit Language and Metaphor in Poetry Essay754 Words   |  4 PagesJohn Donnes Use of Wit Language and Metaphor in Poetry As discussed on a previous short essay question, John Donne is considered to be one of the greatest metaphysical poets of our time, even though he published only a small number of poems in his lifetime. The poems he did write were metaphorical and often humorus poems telling the tale of religious love and sex. Being a metaphysical poet he exhibited many characteristics of the metaphysical poets. He wrote with metaphysical wit, metaphysicalRead MoreMetaphysical Poems792 Words   |  4 PagesMetaphysical Poets John Donne and Andrew Marvell were considered metaphysical poets based on their use of conceit and wit in depicting similar situations through different metaphors. They would use original analogies to create fitting and insightful comparisons, usually to persuade. John Donne and Andrew Marvell have been called metaphysical poets. This is a,† name given to a group of English lyric poets of the 17th century† (Metaphysical poets)† The term metaphysical poets came to be used almostRead MoreThe Flea By John Donne1314 Words   |  6 Pagesthe poetry written in that time period. Most including, and wearing out common cliches about love such as, cheeks like roses or, hearts pierced by the arrows of love.. John Donne, a well known poet of that time period writes many poems about love, but none using all those tired, worn out cliches. Donne brings his poems to life using vivid imagery and elaborately sustained metaphors known as conceits. (The Norton Anthology of English Literature, Vol. B 1260). In Donne s poem The Flea the readerRead MoreFigure of Speech in A Valediction: Forbidding Mourning by John Donne1625 Words   |  7 PagesJohn Donnes A Valediction: Forbidding Mourning is an amazing love poem with beautiful figurative langua ge, a farewell to Donnes wife before their long partition. The writer assures his loved the parting will do no harm and praises on their endless love. With his competent writing style using extended metaphors, comparisons along with connotation and denotation throughout the poem, Donne expresses his belief in the strength of their angelic love to get through the physical separation. In 1611

Sunday, December 22, 2019

Effluents from many food processing industries,...

Effluents from many food processing industries, slaughterhouses, edible oil processing industries, and dairy product industries contain high lipid. These lipid-rich wastes content lipids as a main ingredient and causes problems during the anaerobic treatment of waste. One of the operational problems associated with lipid is clogging. Besides clogging, it also causes the mass transfer limitation forming a layer on the surface of granules by absorbtion. Due to adhesion of fat, biomass wash out is another problem in anaerobic reactors treating any lipid-based wastewater (Cirne et al., 2007). All these operational problems restrain the efficiency of anaerobic reactors. To overcome these operational problems, generally the lipid content in†¦show more content†¦Liquefaction of lipid was indicated as the process-controlling factor due to their low bioavailability in the presence of high amounts of suspended solids (Petruy and Lettinga, 1998; Sayed, 1988). LCFA exert an acute inhibitory effect on acetoclastic and hydrogenotrophic methanogens, acetogens, and to the ÃŽ ²-oxidation itself (Kim et al., 2004; Lalman and Bagley 2000, 2001, 2002; Templer et al., 2006). Moreover, LCFA degrading bacteria have a very slow growth rate (Mackie et al., 1991). As a consequence, during anaerobic digestion of lipid-rich wastes, accumulation of LCFA is most likely phenomenon and subsequently, inhibition of the biomethanation occurs. Oleic acid is the major LCFA in various kinds of industrial and domestic lipid-rich wastewaters (Pereira et al., 2002). It was also reported as the most toxic LCFA (Cirne et al., 2007). Adsorption of LCFA to the cell wall (Koster and Cramer, 1987), and binding of LCFA to cell membranes, changing their surface property with interference in transport functions (Hook et al., 2010), have been suggested as potential mechanisms underlying inhibition by LCFA. Nevertheless, Pereira et al. (2004, 2005) observed mineralizati on of biomass-associated LCFA up to 5 g COD-LCFA g-1 volatile solids, and concluded that LCFA inhibition is reversible which is primarily caused by physical transportShow MoreRelatedPeer Review825 Words   |  4 PagesENGL112 Peer Review Worksheet INSTRUCTIONS: Peer Reviews will be conducted in class discussion forums during Week 7. Be sure to review the Lecture and the Discussion area for additional details and guidance. Please complete the following steps below, returning a separate peer review worksheet for each of the two classmates whose papers you review. This assignment is worth 50 points. * You will receive 10 points for submitting your draft by the required deadline. * You will receive 20 pointsRead MoreTypes Of Peer Review : Review1158 Words   |  5 PagesTypes of peer review There are different journals which follow different types of peer review, based on the kind of research they publish as well as their journal management style. The single and double-blinded peer reviews are the most commonly adopted by many journals. In the single-blind review, the reviewer is aware of the author’s identity, but not vice versa. In the double-blind review, both the author and reviewer are not aware of the other’s identity. In the recent time, some academic journalsRead MoreTried And Tested:. The Impact Of Online Hotel Reviews On1028 Words   |  5 PagesTried and tested: The impact of online hotel reviews on consumer consideration Presented by Jinyue Wang 1000042488 Catalogue Introduction Literature review Methodology Findings Managerial Implication Supported Example 1 Introduction  · Research Gap Impacts of online reviews Researches on electronic word-of-mouth Relationships between users and contributors of review sites  · Research aim Find out the impact of online reviews to hotels’ potential consumers. i.e., their purchase decisions  · ResearchRead MoreJudicial Review2674 Words   |  11 PagesIntroduction The controversy of judicial review which at extreme points, is called judicial activism, is a concept new to India. Judicial review can be defined as the judiciary, in the exercise of its own independence, checking and cross checking the working of the other organs of the government, while trying to uphold the ideal of ‘the rule of law’. Judicial activism more reformist in character is often confused with judicial review. According to Black’s Law Dictionary, judicial activismRead MoreEmployee Performance Reviews Essay1296 Words   |  6 PagesPerformance reviews are designed to both evaluate general performance and measure progress around specific goals. Both negative and positive aspects are incorporated in these reviews as they should serve as a point of reference to both look back in evaluation and ahead in anticipation. Pulling back from daily demands in order to assess and review employee performance allows managers to focus their attention on specific departments and clarify what is high priority to their company. Performance reviews alsoRead MoreOnline Teen Forum Review Essay670 Words   |  3 Pagesindividuals, presumably teens, asking for book recommendations. Other users or staff members of the site give their opinion on what book would best fit the request that the user has made. Occasionally a user will offer their opinion in the form of a book review, although it is informal and still often takes the form of a recommendation. Perhaps the best example is a post from November of last year concerning The Faults in Our Stars. In the post, the author comments on how much she enjoys the writing ofRead MoreWhat Is Peer Review?960 Words   |  4 PagesThe literature review What is peer review? Peer review is the evaluation of scholarly and academic articles by other researchers or scientists who are expert in the field and qualified enough to perform a reasonably neutral review. It is an indispensable part of the process of the scholarly publication. Most academic journals rely on scholarly peer review, or refereeing, to help editors evaluate the quality of articles submitted to their journals. The review process is a skill, which is learnedRead MoreEssay Literature Review1001 Words   |  5 PagesLiterature Review The purpose of this research project is for you to create a scholarly piece of graduate-level research and writing, which conforms to APA format. Competency in the APA format is required of all Business graduates of Liberty University, as set forth by policy of both the Graduate Faculty and the administration. You will research and write a literature review on a topic relevant to our course. What is a Literature Review? â€Å"A literature review discusses published informationRead MoreCRITICAL APPRAISAL OF A SYSTEMATIC REVIEW AND NARRATIVE REVIEW3844 Words   |  13 Pagesï » ¿CRITICAL APPRAISAL OF A SYSTEMATIC REVIEW AND NARRATIVE REVIEW RELATED TO COMPUTERISED PHYSICIAN ORDER ENTRY SYSTEM The author of this paper is a nurse educator working in an Intensive Care Unit (ICU) within the north-west region of England. For the purpose of this paper, the author has chosen a systematic review (SR) and a narrative review (NR) and aims to critically analyse these reviews using the Critical Appraisal Skills Programme (CASP) tool. The CASP tool has been developed by the SolutionsRead MoreA Review On Business Promotion860 Words   |  4 Pages Yelp! I. Introduction We (and the rest of the internet for the past decade) have already become familiar with online review sites which are so important for business promotion. Suppose you run a business, wouldn’t it be great if you could get every buyer that walks into your small business to give you a recommendation? Customer endorsements are a strong kind of marketing and give a great return on marketing investment. A recommendation is more effective and highly potential to bring in

Saturday, December 14, 2019

Design And Construction Fundamentals Of Earth Engineering Essay Free Essays

string(47) " for homogeneous stuff with low permeableness\." Abstraction: This paper focuses on Earth dikes, one of the oldest dike in the universe. Forming service reservoir for domestic H2O supply and irrigation intent, Earth dams comprise the most legion category. The design and building of Earth dikes is complex because of the nature of the changing foundation conditions and the different belongingss of the stuffs available for the building of the embankment. We will write a custom essay sample on Design And Construction Fundamentals Of Earth Engineering Essay or any similar topic only for you Order Now Careful choice of site and types of stuffs used in the building every bit good as a site probe are critical. Last but non least, an apprehension of the possible failure of Earth dikes is of import in the design and building procedure of the Earth dikes. 1. Introduction Earth dikes, besides called Earthen or Earth-filled dikes are by and large built in or near drainage line which has assortment of intents including domestic H2O supplies, agricultural irrigation, H2O for landscape betterment and others. One advantage of the Earth dike is that it can accommodate to a weak foundation provided proper consideration is given to the foundation and design of the Earth dikes. However, failure of any of import portion of the Earth dikes such as ooze, structural and foundation will take to the prostration of the whole dike. Types of Earth Dams Constructed as a simple homogeneous embankment of good compacted Earth, Earth dikes are classified as Homogenous Earth Dams, Zoned Earth Dams and Diaphragm Dams. A brief treatment of the types of dike is as follow: Homogeneous Earth Dam is a sort of common Earth dikes which consist of two chief constituents ; the imperviable to semi-pervious construction and the toe filter and the drain. The intent of the filter and the drain is to supply a done manner for ooze to go out the dike construction without doing eroding. This type of dike is normally built on an imperviable foundation such as solid stone or clay. The following type of Earth dike is Diaphragm Dam. A stop dike, can be used when there is no imperviable bed below the dike and alteration of the dike can be made to accommodate at an imperviable bed. Besides, this type of dike is limited to a tallness of 8.0m in order to maintain ooze forces at a safe degree. Last type of Earth Dam is Zoned Dam. A Zoned Dam is known to be the most efficient usage of dirt as each stuff is used to its greatest potency. The incline protection protects the shoulder from eroding and beckon action, the nucleus retains the H2O and the shoulders stabilize the nucleus. Last, Figure 1 shows the 3 types of Earth dikes. Figure 1. Cross subdivision of Homogenous Earth dike, Zoned Earth Dam and Diaphragm Dams ( Stone, 2003 ) . 2. Design OF EARTH DAM Earth dike is built for the intent of hive awaying H2O and is made of compacted Earth. It is normally more convenient when concrete is expensive and timber beginning is scarce. 2.1 Foundation A site probe should be conducted anterior to building so as to look into the nature of the foundation. By cognizing the existent foundation status at site, the Earth dike can so be designed harmonizing to it. A dike foundation is said to be equal if it is capable of supplying a stable support for the embankment under all status of impregnation and burden and that it supply adequate opposition to seepage to avoid inordinate loss of H2O ( Bureau of Reclamation 1987 ) . Harmonizing to Bureau of Reclamation ( 1987 ) , dam foundation can be by and large classified into three types viz. foundation of stone, foundation of farinaceous stuff and foundation of powdered stuff. These foundations may necessitate to be treated to stabilise any failing every bit good as to cut down ooze. For case, farinaceous, pervious foundations present no troubles in the affair of colony or stableness whereas a powdered, weak foundation is capable to colony or supplanting normally present no job in ooze. Rock foundation on the other manus must be checked for erosive escape and inordinate uplift force per unit area. If such conditions exist, grouting to the foundation must be considered. 2.2 Dirt Earth dike is normally built with clay, sand and crushed rock and hence is besides known as Earth make full dike. The type of dirt used in the building of an Earth dike must be suited to let for optimal compression every bit good to cut down ooze. Soil permeableness is one of of import standards to be considered in dam design, seepage-confinement units, drainage and other structural elements ( Goldin, AL A ; Rasskazov, LN 1992 ) . Higher frictional opposition and greater permeableness in farinaceous dirts is the ground for its greater stableness as compared to cohesive dirts. Greater permeableness permits rapid dissipation of pore H2O force per unit areas ensuing from compressive forces. 2.3 Embankment In finding the tallness of the embankment, it is necessary to apportion for a colony between 5 to 10 per centum. This is to forestall its tallness from going lower than the wasteweir tallness ( Figure 2 ) since colony is ineluctable despite holding a good compression due to the fact that air and H2O are being forced out of the nothingnesss by the weight of the dike, therefore doing consolidation ( Shaw, R A ; Smout, I 2009 ) . During compression, equal attempt should be applied throughout the dike to forestall differential colony. The minimal compression attempt should non be less than 95 % of the Standard Maximum Dry Density ( Department of Primary Industries and Water 2008 ) . The stableness of the embankment depends mostly on its ability to defy shear emphasis which comes from internally applied tonss such as the weight of the dirt and the embankment inclines, and externally applied tonss such as reservoir and Earthquake tonss. As mentioned earlier, steeper inclines can be adopted for farinaceous dirts since they are more stable. In contrast, a gentler incline needs to be applied for homogeneous stuff with low permeableness. You read "Design And Construction Fundamentals Of Earth Engineering Essay" in category "Essay examples" Figure 2. Cross subdivision of an Earth dike 2.4 Spillway Spillway plays an of import function in Earth dike since it allows inordinate H2O to flux without dominating the dike wall. There are two types of wasteweir viz. the cut wasteweir ( Figure 3 ) and natural wasteweir. Figure 3. The place of a cut wasteweir In order to cut down H2O speed and later minimise eroding, a soft incline for wasteweir must be provided. However, for steep incline, loose rocks or geotextile can be provided to cut down eroding. Apart from that, equal capacity for the wasteweir must be provided to forestall dominating and to enable the wasteweir to efficaciously manage run-off. 3. Construction ON EARTH DAMS 3.1 Depriving Organic dirt and flora must be removed from the country that will be covered by the dam base. The removed organic dirt are stockpiled and used on the downstream incline of the fill. 3.2 Key trench Key trench which is besides known as cutoff trench is excavated below the base of the fill to a lower limit of three pess deep for dike with 10 to 12 pess height. The cardinal trench is included in the dike design to procure the dike to the base stuff and to forestall ooze under the fill. 3.3 Diversion tunnel Diversion channels are excavated before the dike can be constructed. This tunnel is frequently lined with concrete. The tunnel is built around the dike building country at one side of the vale. In the drill holes, explosive stuffs are placed and blaring will takes topographic point. The dirt or broken stone is so removed. The stairss are repeated until the tunnel is completed. Figure 4. Constructing a recreation channel ( hypertext transfer protocol: //www.hydro.com.au/handson/students/images/damb1.gif ) In Figure 5, after the dike building is completed, the recreation channel is closed o let the lake to get down make fulling. Figure 5. Closing of recreation tunnel ( hypertext transfer protocol: //www.hydro.com.au/handson/students/images/damb4.gif ) 3.4 Cofferdam In summer, the building on deviating the river starts when the river degrees are low. At the upstream of the upstream of the chief dike building country, little dike which is besides called as caisson are built. It is built utilizing Earth-moving equipment. The caisson will move as a barrier to the river and the H2O will flux to the recreation tunnels. The 2nd caisson will be built downstream of the chief dike building country. At this country, the caisson will forestall the river flow to flux back into the building country. Figure 6. Cofferdams act as barriers to the river ( hypertext transfer protocol: //www.hydro.com.au/handson/students/images/damb2.gif ) 3.5 Foundation Grouting Grouting consists of lines or a line of holes which are drilled into the dike foundation. The two types of foundation grouting are drape and consolidation grouting. 3.6 Curtain grouting Curtain grouting consists of a individual row of urarthritis holes which are drilled and grouted in sequence by bagger proving to the base of the permeable stone or to a deepness that acceptable hydraulic gradients are achieved ( Fell et al 2005 ) . Based on Figure 7, primary holes are drilled foremost. The last hole spacing will usually be 1.5m or 4m, but besides may be every bit close as 0.5m ( Fell et al 2005 ) . This attack allows control over the efficiency of the drape grouting. Figure 7. Curtain and consolidation grouting ( Fell et al, 2005 ) Figure 8. Grouting downstage with bagger ( WRC, 1981 ) 3.7 Fill building Earth dike is normally constructed from imperviable stuff which is clay or clay-based stuff. The building stuffs, taken from the environing country have to be placed and compacted horizontally in the fill. Dry dirts are normally added with wet and compression equipment such as a sheepsfoot bagger is used to obtain the proper compression. The building started by make fulling the cutoff trench with well-compacted stuff and six inch beds is added until the maximal tallness is obtained. The top of the dike at the centre of the draw is normally built 10 per cent higher than the design to let colony of the fill. Based on Figure 9, a riparian pipe is placed through the underside of the fill and a frost-free valve is placed on the riparian pipe. This pipe and valve system map is to let H2O to be released downstream to other H2O storage installations during H2O deficits. Figure 9. Elevation position of dike ( hypertext transfer protocol: //www1.agric.gov.ab.ca/ $ department/deptdocs.nsf/all/agdex4613 ) 4. POTENTIAL FAILURES OF EARTH DAMS Potential failures of dikes have ever been great importance and much attending has been given to safety rating and research due to their black effects. Harmonizing to Fell, MacGregor, Stapledon and Bell ( 2005 ) , 79 % of Earth dikes with less than 30m high suffer more failures than higher dike. This may reflect better design, monitoring and surveillance of larger dike. Potential failures of Earth dike can be grouped into three classs: Fluid mechanicss failure, ooze failure and structural failures. A detail treatment of the types of possible failure of Earth dike is as follow: 4.1 Fluid mechanicss Failure Fluid mechanicss failure occurs by the surface eroding of the dike by H2O. Fluid mechanicss failure is due to several grounds. One of fluid mechanicss failure is dominating of dikes. Dominating failure occurs when the degree of the reservoir exceeds the capacity of the dike. Harmonizing to Fell, MacGregor, Stapledon and Bell ( 2005 ) , over-topping is one of the chief causes of failure in Earth dikes. Overtopping may besides be caused by deficient freeboard provided. Figure 10 shows the overtopping of Earth dike. Following, eroding of upstream face ( Figure 11 ) due to uninterrupted wave action caused eroding of the dike. However, this can be avoided if the surface is protected by rock rip-rap and filter. The following ground is due to eroding of downstream incline by rain H2O. Although the downstream face of the embankment is non affected by reservoir H2O, it may acquire eroded by heavy rain fluxing down the face of the dike, doing the formation of gullies and eventually prostration of the whole dike. An Example of failure of Earth dikes due to dominating is South Fork Dam which is built across Conemaugh River, Pennsylvania. The intent of the dike was to provide H2O to a navigable canal from Johnstown to Pittsburg. The dike was about 2.5m high and during a heavy rainstorm on 30th May 1889, big sum of dust was washed into the reservoir and blocked the wasteweir. Finally the dike was overtopped and failed by eroding let go ofing a inundation moving ridge about 1.2m high. Figure 10. Overtopping of dike ensuing in washout ( Bassell, 1999 ) . Figure 11. Erosion of upstream face by moving ridges interrupting on the surface ( Bassell, 1999 ) . 4.2 Seepage failure Seepage failure is besides known as piping failure. Seepage failures are by and large caused by pervious foundation, escape through embankments, conduit escape and shedding. All dikes have seepage as the impounded H2O seeks way of least opposition through the dike construction and its foundation. If the surface ooze intersects the upstream face of the dike, eroding may happen which will take to possible failure of the dike. Typical method used to command the measure of ooze is rock fills installed at the downstream toe or gravel covers to cross the line of ooze before it reaches downstream toe as shown in Figure12. Figure 12. Seepage through a dike or embankment with stone toe or crushed rock cover. ( Stone, 2003 ) 4.3 Structural Failure Structural failure includes failure of the upstream, downstream inclines of the Earth dike, foundation every bit good as checking distortion and colony ( Figure 13 ) of the dike construction that may take to dominating or seepage failure. Slides in embankment occur when the inclines are excessively steep ( Figure 14 ) for the shear strength of the embankment stuff to defy the emphasiss imposed. Failure of this type normally cause by defective design and building. As for foundation failure, it occurs because of inordinate pore H2O force per unit area which reduces the strength of the dirt which it may non be able to defy the shear emphasiss induced by the embankment. Furthermore, harm caused by tunneling animate beings lead to structural failure. This causes seepage H2O to flux out rapidly, transporting all right stuffs along which accordingly leads to shrieking failure within the construction of the dike and eventually take to a complete prostration of the dike. Figure 13. Excessive colony of dike and foundation ( Bassell, 1999 ) . Figure 14. Downstream face excessively steep unable to be resisted by dirt shear strength ( Bassell, 1999 ) . 5. Decision Earth dike, besides known as Earth filled dike, is built for the intent of hive awaying H2O. It can be classified into three different types which vary in their designs. A site probe must be conducted prior to plan and building to find the appropriate design that suits the foundation of the dike. The type of dirt used in the building of the Earth dike must let for optimal compression. The stableness of the dirt will so act upon the incline design of the embankment. During building, flora and organic dirt will be removed from the dam country. Water will be diverted to let for building. In add-on, grouting is besides done to assist better the foundation. When planing and building an Earth dike, it is besides critical to see possible dike failures so as to take considerations to forestall it. How to cite Design And Construction Fundamentals Of Earth Engineering Essay, Essay examples

Friday, December 6, 2019

nEGRO mOTHER Essay Example For Students

nEGRO mOTHER Essay Three hundred years in the deepest South: But God put a song and a prayer in my mouth . God put a dream like steel in my soul. Now, through my children, Im reaching the goal. Now, through my children, young and free, I realized the blessing deed to me. I couldnt read then. I couldnt write. I had nothing, back there in the night. Sometimes, the valley was filled with tears, But I kept trudging on through the lonely years. Sometimes, the road was hot with the sun, But I had to keep on till my work was done: I had to keep on! No stopping for me- I was the seed of the coming Free. I nourished the dream that nothing could smother Deep in my breast- the Negro mother. I had only hope then , but now through you, Dark ones of today, my dreams must come true: All you dark children in the world out there, Remember my sweat, my pain, my despair. Remember my years, heavy with sorrow- And make of those years a torch for tomorrow. Make of my pass a road to the light Out of the darkness, the ignorance, the night. Lift high my banner out of the dust. Stand like free men supporting my trust. Believe in the right, let none push you back. Remember the whip and the slavers track. Remember how the strong in struggle and strife Still bar you the way, and deny you life- But march ever forward, breaking down bars. Look ever upward at the sun and the stars. Oh, my dark children, may my dreams and my prayers Impel you forever up the great stairs- For I will be with you till no white brother Dares keep down the children of the Negro Mother.

Thursday, November 28, 2019

Unmet Needs of Generation Y Essay Example

Unmet Needs of Generation Y Essay Introduction Born in the mid-1980s and later, Generation Y employees are in their 20s and are just entering the workforce. With numbers estimated as high as 70 million, Generation Y (also known as the Millennials) is the fastest growing segment of today’s workforce. As companies and firms compete for available talent, employers cannot ignore the needs, desires and attitudes of this vast generation. We have identified five different unmet needs faced by Generation Y after many interviews. They are mainly materialism, the inability to approach supervisors easily, inflexible working hours, presence of a communication barrier between older and younger generation and no sense of belonging. Our interview questions was carefully constructed using the SPICE framework and as a result, have garnered ideal results. After conducting the interviews, we researched the different needs and found solutions. Our next step was to link the solutions to the POEMS framework. Lastly, we have identified the HR functions that can be used in a company to solve the unmet needs. Interview Questions 1. What is your age? (Identity) 2. Are you working? (Social) 3. If yes, describe your job and what attracts you to work there? (Identity) 4. If no, what did you work as previously? And what is your reason for leaving? (Identity) 5. If you could change one aspect of your job, what would it be? E. g Increase pay, more benefits etc. (Emotional and Physical) 6. How did you get the job? (Physical) 7. Does your job allow you enough time with family/friends? (Social) 8. Do you use technology in your workplace? E. g. laptops , softwares, machinery etc. (Physical) 9. Do you feel a sense of belonging in your company? Identity) 10. Do you bond well with your colleagues? (Communication) 11. Are you able to approach your supervisor/manager easily? (Communication) 12. Do you feel stressed when you are working? (Emotional) 13. If yes, do you have anyone to talk to about this in your workplace? (Emotional) 1) Materialism in Gen Y Our first identified unmet need is materialism in Gen Y. Materialism is c ommonly defined as a preoccupation with or stress upon material rather than intellectual or spiritual things. This is a phenomenon that has exploded with the coming of the Gen Y population. We will write a custom essay sample on Unmet Needs of Generation Y specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Unmet Needs of Generation Y specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Unmet Needs of Generation Y specifically for you FOR ONLY $16.38 $13.9/page Hire Writer This is not to say that materialism was never present before Gen Y but has instead increased due to various reasons. One reason why Gen Y is so steeped in materialistic tendencies is due to consumerism. Nowadays, marketing efforts are being aimed at kids to make them more materialistic in order to bring in more sales. Results from various studies suggest marketing efforts aimed at youngsters may indeed be robbing children of their childhood and making kids more materialistic, and it can have long-term negative consequences on shaping values. Another reason why Gen Y is becoming increasingly materialistic is due to a lack of self-esteem. Recent studies have shown a direct link in materialism in Gen Y and a direct correlation to their self-esteem. Between the ages of 12 and 13 children try to compensate for low self-esteem through material goods that they think will make themselves feel better, or that they think will raise their status among their peers. This reason is further compounded by itself, as many problems may arise and often do when young people embrace this culture of materialism. Lacking the means to acquire the much-valued material things, some individuals develop low self-esteem. This is particularly true of those of younger age. Research indicates that there is a direct correlation between low self-esteem and materialism: as self-esteem decreases, materialism increases. Additionally, there are those who, also lacking the means to acquire the desired material belongings, turn to illegal activities to procure the funds to satisfy their unhealthy materialistic tendencies. The unhealthy desire for material possessions and the illicit activities it inspires has landed an exorbitant number of black youth in prisons both in Canada and in America. These possibilities are just two of the potential negative effects of materialism. In order to instill positive values in their children, parents have to be cognizant of the negative influences that pervade our society, especially media influence. When they learn to understand the extent to which the mainstream media bombards the youth with enticements, parents will be better able to help them stave off the constant pressures they face on a daily basis. Recent research also suggests that young people of today are much more materialistic than their counterparts of the past were. All too common, among black youth, there is a palpable materialistic obsession the roots of which anyone can trace back to a popular music video—be it a new designer label or a new blackberry phone. Among many young people, the sense of self-worth is contingent on their possession of the aforementioned material objects. Such is the extent of influence that the media often has on young minds. It is very easy for a young person to become impressed by the constant exposure to the glorification of material belongings. The mainstream media is incessant in its parade of materialistic conceits. Young people are constantly being told that they need to have those designer jeans or that new must-have cell phone model in order to gain the respect of their peers. Whether it is a music video or a reality show, the materialistic culture prevails. It is, then, little wonder that many of them tend to view the world through a materialistic paradigm. To solve this problem, the human resource department identified is the Compensation and Benefits department. First thing Comp has to do is to understand the Gen Y demographic. They have to understand their needs and their wants to be able to manage and retain them. For example, staff in the Comp department can make the benefits and wages more attractive to Gen Y employees specifically. Also, they could appeal to Gen Y employees by giving them perks and benefits such as company cars and discounts at company-sponsored stores. 2) Unable to approach supervisors Another unmet need we have identified is Gen Y’s problem with approaching supervisors. It is known that Generation Y is the youngest group to exist in the workplace environment. Therefore, being underdogs taking roles often at the bottom of the work chain, they often have problems communicating effectively with their superiors. Since they reside at the bottom of the chain, they fear confrontations as they are afraid that they may unintentionally, through one way or another make blunders, which may threaten their immediate future. Some examples of such blunders are over asking, asking poorly, saying the wrong things and breaking the status quo. Over asking is that problem of repeatedly asking the same or similar questions in the workplace. This may cause problems in the future when working together as it may leave a negative impression. When an underling asks a superior the same question repeatedly over a short period of time, the superior may feel flustered and frustrated at the asker, leaving a negative impression of said asker on the answerer. Generation Y, with being at the bottom, feels that leaving such at impression maybe detrimental and hence, fears confrontations in this aspect. Asking poorly is also a cause of concern to this issue. Asking poorly refers to asking questions that the answerer may feel is ‘common sense’. By asking such questions, superiors may feel irritated with the Gen Y worker. They may then even come to resent giving them opportunities. This is a very common among Gen Y as since majority of them are new to the job, they have yet to know the regular customs at the workplace and hence, may not know the ‘common sensual’ course of action and as a result, come across as ignorant and poorly educated rather than inexperienced which they are. With them fearing such an event occurring, the Gen Y workers as a result, fear approaching their supervisors. Another problem of fearing confrontation would be causing misunderstandings at the workplace by saying incorrect or even inappropriate things at the work place. Example of such things can range from making rude or snide remarks unknowingly or providing incorrect input for work related items. At times, as Gen Y, being inexperienced at workplace politics, they may make inappropriate remarks at other people without knowing it. The reason for such is due to the fact that, different years may have different lingo and other people from other generation may feel insulted by what may be a regular passing comment from another colleague. For example, the word ‘gay’ has changed over many generations. Decades ago, the word meant happy, years ago, the word meant to not be in the social norm, whereas, now, it has homosexual meanings in context. So when they break the barrier down to speak, they are afraid of causing such tension. Finally, breaking the status quo is another problem that they may potentially face that also contributes to the fear of confrontation. In office politics, there is a certain order in the hierarchy or a chain of command. This means that there is a certain order in which, information can pass through. For example, with three levels, being the Gen Y lowly employee, his boss and his boss’s boss, the employee must observe the chain of command and is not able to talk to his boss’s boss without first going through his boss. Based on the unmet need of confrontation, the problem should be taken in and solved by the human resource function of welfare and compensation benefit. On the poems structure, this tends to be more on the people side as it is a form of inter-personal interactivity that is unachieved. To help with this problem, human resource needs to firstly, be more observant on the newer and younger employees to ensure that they are able to get along and speak comfortably with fellow employees in the office regardless of age gap. Human resources can also take a more forward approach in organising perhaps bonding activities in which, perhaps the hierarchy is temporarily reversed and they are at the top. Even a buddy system can be introduced where maybe an older and younger worker are paired up and given time to bond to allow easier interaction between the workers from different generations. Better interaction policies can also be given. For example, ideas could perhaps be introduced through an online portal where the new gen y workers can be given a chance to submit ideas without the fear of being criticised. An open door policy can also be implemented where maybe, at a certain time of day, a manager would set aside time to allow workers to speak to him about work or non-work related matters. A portal can also be introduced, this one being in the sense that common work protocols are stated clearly and give the new gen y workers some reference to the procedures that they are required to follow to prevent overstepping certain boundaries. ) Flexible working hours Thirdly, workplaces are more demanding than ever in terms of hours and performance. Thats creating a rising tide of resentment among the Gen Ys flooding into the workforce. Gen Ys know what they want — and its not the all-work-and-no-life dynamic of their Boomer parents. We have watched our parents waste away in drab cubicles and count the days to retir ement, Call me idealistic but isnt work supposed to be part of life? Do I have to accept the idea that real life begins when I punch out at 8 p. . each day? Gen Ys want a rewards remix, according to Bookend Generations, a study from the Center for Work-Life Policy. Instead of the traditional plums of prestigious title, powerful position, and concomitant compensation, they value challenging and diverse job opportunities, stimulating colleagues, a well-designed communal workspace, and flexible work options, with 89% of Ys saying flexible work options are important consideration in choosing an employer. One successful flextime approach is Citis Work Strategies. This program started as a model for tomorrows green, cost-effective, and employee-friendly workplace but soon turned beneficial to many interested in flexible work arrangements. Realizing that in some instances Citi was wasting resources on office space that no one was using, the division suggested using office-sharing, hoteling at satellite offices, and work-from-home arrangements to reduce the organizations real estate portfolio while offering a new type of workspace arrangement. The program has since evolved to encompass part-time schedules, remote work, flexible start-and-stop times, compressed schedules, and job sharing. Employees apply through a formal process that requires them to fill out a work plan describing how they will do their job in its new flexible format, the potential impact on clients and team members, and the technology they need — such as webcams, instant messaging, and teleconferencing — to support their new approach. At the same time, managers are training to lead and supervise remote teams. Citis annual employee surveys show that the flex-work participants are consistently more engaged, more likely to stay, and more likely to recommend Citi as a great place to work. For these new 20-something workers, the line between work and home doesnt really exist. They just want to spend their time in meaningful and useful ways, no matter where they are. Generation Y is forcing companies to think more creatively about work-life balance. The employers who do are winning in the war for young talent. Research reveals that job hopping is not an end in itself but something young workers do when they see no other choiceOld assumptions about what employees value in the workplace dont always apply with Gen Y. Friendship is such a strong motivator for them that Gen Y workers will choose a job just to be with their friends. It feels normal for Gen Y employees to check in by BlackBerry all weekend as long as they have flexibility during the week. Today more than half of Suns employees work remotely from anywhere but the office. Understanding Generation Y is important not just for employers. Older workersthat is, anyone over 30need to know how to adapt to the values and demands of their newest colleagues. Here is a summary of the key findings: Gen Y represents approximately 20% of the economically active population of Singapore. Gen Ys in Singapore are confident, restless, tech-savvy and prefer an unconventional approach. Gen Y’s biggest fear is losing their family while their bosses and colleagues feel Gen Y’s biggest fear is to lose their job. Statistics show that 27% of Gen Y respondents have yet to identify their profession of choice, 57% of Gen Y respondents earn less than SGD 1500 and spend less than SGD 500, tobacco/alcohol, mobile phone and food are listed as top three items that Gen Y prefer to spend the most and that 45% of Gen Y respondents would prefer a Gen X supervisor. Also, Gen Y’s are mostly intrinsically motivated and Gen Ys score low in the General Role Stress index. Parents, non-Gen Y colleagues and bosses have conflicting perceptions about Gen Y than Gen Y themselves, which could be a threat! In summary, Singapore Gen Ys or the millennials make up 22% of our resident population, working out to 833, 300, with the female gender, topping the male cohort by about 20,000. They are wired, connected to virtual social sites, salivate for information, empowered, able to multi task, independent and the lists goes on and on. These are functional behaviours that will excite any HR recruiter. They too, carry a â€Å"dark side†. They can be easily bored, and demand instant gratification. ) No sense of belonging Next, a good manager must be fully identified with their sense of belonging in the company, institution, which provides service, as well as all its human resource integration, by achieving this, empathy, trust, achievement is required. However, there are many managers who have no sense of belonging with the company where they work and the organ ization is seriously affected, since it has not been built that trust is expected to manifest in development of the company, its development, where it is envisioned that all staff are fully committed to the organization. It is written that there is a degree of willingness that everyone has to follow the logic of coexistence or common sense, the more secure you feel that person within a group, the higher your sense of community and so Therefore the person will be more willing to follow rules. The sense of belonging is not only the assurance that the person gets when they feel that occupies a place within a group. In some cases, to feel a sense of belonging as Patricia Oliveira comment, this is taken into account, that human societies are always ongoing relationship with other neighbouring or rival, or integrated into larger ones. Also in most of them can set different smaller factions that are integrated within it with different interests subordinated to the common goal while in some associations, having achieved its initial objective is necessary to establish new goals and objectives that give meaning to their existence. The natural tendency towards disorder that produces human associations for retention must be a certain degree of sense of belonging to the same except for those who are not members. The same occurs in companies where there should be well-defined group cohesion, each member who integrates this fully identified with a sense of belonging. Oliveira notes that the pride of belonging to an association, a club, a business, a group of friends or family are what make these are not diluted. Another feature that ensures the health of a human organization is the existence of good communication, fast and fluid within it. A crucial piece in any society is the leader. In many cases this person represents the best and the worst of the organization you represent. Where you lead, manager, in our case, must show their membership, commitment, identification with the group. The leader holds the key to sense of belonging follow by members. Of course, to do so, this will be assessed all aspects that have generated confidence, security, respect, union commitment, responsibility. Aspects, which said the group and they have respected and are part of it, reaffirming their sense of belonging and permanence. Furthermore, Ana Tania Vargas comment, the strength of the sense of belonging in many cases remains, as a latent emotional, related to those features of collective identity that still maintain the leader sense for the subject. Therefore, the sense of belonging is a primary element of belonging and personal identification, collective and productivity in a company, group, friends, etc. Is a concrete expression of commitment to specific traits and characteristics of the culture that synthesize profiles of cultural identity in particular ways, for what is important in strategies for development promotive role. It should be added that the study of the processes of identity and sense of belonging, it is necessary to consider the many possibilities of organizing and sorting generated in these processes, that form intra-and out group practices, clearly sets and define the possibilities of collective action and the complexity of delimitation and structuring of the universe of their own cultural elements, ensuring for themselves the existence of the group, giving passes to the innovation process, appropriation, alienation to suppression of the brand values from out group. In the case of the Venezuelan reality, which manifests a number of external factors, including the impact of the state through its policies, regulations, laws, has influenced a determinant in the company and this has been the reality test ownership of management to the organization where they work, considering the reaction of many owners, managers, who have given way to insecurity, fear, no sense of belonging with actions that have undermined confidence and this has affected the way membership, both by management, as all members of the company. In other terms, this situation has reduced the many; sense of belonging that must be rescued all depends as has been consolidating the organizational culture at the time. DFID Project Colombia listed that the sense of belonging or membership is the personal satisfaction of each individual in the organization, its recognition as a human being, respect for dignity, fair compensation, recognition, development opportunities , teamwork and fair assessment, not only are components of organizational climate, it represents permanent elements of organizational culture. In order to provide or create a sense of belonging, companies must offer training opportunities, encourage creativity within job scope and provide both local and overseas exposure. To retain staff, all SYSTEMS Save Yourself Time, Effort, Money, and Stress must be in place. And there must be constant innovation so a company is assured of scalability and growth. Attainable short, medium and long-term targets should be set so there is no doubt as to direction. And there must always be a target to strive for. CONTINUOUS learning and skills upgrading must be part of a companys policy to retain employees. Every persons demands and expectations are different and change over time. SMEs have an advantage that some MNCs cannot offer a challenge and work experience that can motivate. Besides career advancement, staff welfare and the working environment must be priorities. SMEs should also try to offer a good lifestyle/work-life balance to retain talent on a long-term basis. For example, Grand Teams strategy to keep talent includes a shareholding scheme. To make employees feel they are working for their own future and career development, we let them own a portion of the company. 5) Communication barrier Lastly, the presence of a communication barrier between generations. In order to be an effective communicator we not only need to know how to adapt to different personality types, but we also need to understand the different generational issues that can create conflict in the workplace. The dynamics we experience today are unique to our era: younger generations have made a dramatic shift in work values leading to harsh judgments and criticisms within the work environment. Ultimately, this conflict of generational values hinders performance of individuals and weakens overall team success. We need to begin first by seeking to understand. If we can begin to understand what is important to each generation, we can then learn to see things in a wider perspective and begin to build bridges of communication between the gaps. With better understanding comes better communication, which leads to heightened tolerance and ultimately to successful collaboration between the generations. There are four groups in all. Firstly, the Veteran age group is generally comprised of those who are 55 and older. This generation is post-war and their nature is to be loyal to a single employer for a lifetime and in turn, they expect the same degree of loyalty back. Because this generation did not grow up with material wealth, in most cases, they tend to be frugal and do not understand the need to use debt to build business or the need for anyone to have debt at all. In the workplace, they show up on time and they take orders well they do as they are told because they respect their boss, as well as their elders. Secondly, the Baby Boomer age group is comprised of generally the ages 35 to 54 and is the children of the Veterans. This group grew up with little in the way of toys or nice clothes and vowed to give their children everything they couldnt have as children. In most cases, baby boomers grew up earning an allowance and understood the principle of working hard to earn a living. In general, they left home at the age of 18 and survival was a real issue. If a baby boomer was told to do something at work or else be fired he or she would do it because they were afraid of not being able to pay the bills. In the workplace they have a mentality of work, work, work, and then you ie. Lastly, Generation Y is divided into two groups. The first comprises of people 22 and younger. They are likely called generation Y because that is the question they ask most, Why? These are also the children of baby boomers and so far, are one of the most creative generations we have seen in a long time. Generation Y want to work where they are allowed creative expression, a flexible approach and control over their own hours. In the workplace, they show little loyalty because they already know they will have about 10 careers in their lifetime. They get bored very quickly and need more incentive to work than just a paycheck. Another group of Generation Y comprises of the ages 23 to 34 and are also the children of the baby boomers. A majority of this group grew up with both parents working and saw their baby boomer parents get laid off or witnessed them being miserable in their jobs. This helped shape their current value system, which is, I am going to have a life first and work will come second. This group is pushing for flex hours, 4-day workweeks, paid sabbaticals for education and paid parental leave for both fathers and mothers. In the workplace, you cannot threaten them to do something or they will get fired because they dont care. Most of them live at home until the age of 26 and do not experience the same survival issues as those of their baby boomer parents. Their main goal is to have fun at work, make a buck, and have a life. So why should employers care if employees in the different generations respect and understand each other? In a word: Retention. The costs associated with employee turnover are enormous (e. g. training, loss of employee morale, advertising for applicants, interviewing, productivity, etc. . Gravett and Throckmorton estimate that costs to replace an employee may total up to 150% of the employees annual salary, depending on skill level. In addition, the knowledge and talent that will be lost due to the retirement of the older generations without appropriate transition among generations could be financially devastating to companies. The employees coming into the labor force (Generation Y) are powerful in numbers and will be needed to make up for the shortage due to the retirement of the Radio Babies and the Baby Boomers. If employers dont help breakdown communication barriers now, they will find themselves short of talented workers when they are really needed. So what are the obstacles to bringing employees from the older generations together with employees from the younger generations for knowledge sharing? Competing personal desires that differ by generation, coupled with a lack of trust are difficult barriers to overcome to allow for knowledge sharing to take place. For example, Radio Babies (born 1930-1945) are ready for retirement and need to be provided an incentive to stay. Whereas, Generation Y (a very large generation) is not afraid of change and in fact, enjoy variety. A lack of fear regarding change and an enjoyment of variety, are important personal desires that employers must recognize. Identifying the driving personal wants of the generations is the first step to help foster knowledge sharing. Once the personal desires of the different generations are recognized and addressed accordingly (e. g. flexible work schedules for individuals ready to retire, creating a rotational job change for young professionals, etc. ), the focus should shift to identifying communication barriers. Individuals from the younger generations often feel that older generations do not respect or trust their ideas and therefore, leave the younger generation workers feeling undervalued. The older generation frequently perceives that the younger generation lack work ethic, and respect for authority and institutional practices. These perceptions (whether true or not) will lead to an inability to communicate. It is essential for an employer to identify the cause of the mistrust (which is almost always the root of any lack of communication) and work to build trust. We feel that this unmet need falls under the jurisdiction of Training and Development. This HR function will allow the workers to undergo training through either outside or inside sources and this will develop Gen Y and the older generation’s communication skills. Next, using the POEMS framework, we also have come out with several solutions to the respective letters. Under People, we feel that both generations should try to overcome this barrier together. As the saying goes, ‘it takes two hands to clap’. Not only Gen Y but also the older generations should try and overcome this barrier. With both sides working together, it will be much easier overcoming this barrier. Moving on, for Environment, having a conducive environment will make the people be more willing to put in more effort into trying to overcome this barrier. It has been proven that a more joyous and happy environment will lead to people being more willing to work together in harmony to a common goal. For Media, we can use it to increase awareness of this problem and as a result, will help solve this problem. How does this work? By raising awareness, people will be more inclined to try and solve the problem if it is at hand or do preventive measures to make sure that it does not occur in the future. Lastly, companies may send some employees to attend classes outside to improve communication skills as part of Services. Reflections Setting up a time slot for the interview was not an easy task. With the Gen Y interviewees busy work schedule, it was a hassle to even get a time slot with them. When it came down to doing the actual interview, the process was much more difficult to carry out. The interviewees, despite earlier agreements, showed to be quite reluctant in giving the interview. During the assessment, the interviewees showed many signs of disinterest unconsciously, examples include yawning, stretching and being disoriented. The interviewee also answered in short brief answers, giving answer that is very short, and a sign of impatience. `they were generally helpful, clarifying when needed but only when asked to. Overall, the experience was relatively fresh and enjoyable.

Monday, November 25, 2019

The History of Internet and Internet Security

The History of Internet and Internet Security Introduction The internet has turn out to be part of our lives that is easy to forget the inventors who had a vision of what worldwide networking could grow to be and toiled to make it ensue. According to a research done, the internet, which started as a minuscule and restricted community, is now diverse and accessible from all parts of the universe.Advertising We will write a custom research paper sample on The History of Internet and Internet Security specifically for you for only $16.05 $11/page Learn More As a result, the issue of internet security is a serious matter because a local problem can be a worldwide incident within a second. Therefore, an understanding of the internet and security is imperative for the development of protective measures that ensure confidentiality, integrity as well as availability of information. The history of internet According to Vacca (2009), the development of computers at approximately 1950 was the genesis of the histor y of the internet. At around 1970, the internet began as ARPANET and it was a project funded by Advanced Research Project Agency (ARPA). The broad objective of the project was creation of a network that will not cease to function even if one of its components failed. Therefore, the creation of the internet was in such a way that it had a capacity to resist attacks like viruses, intrusions and incidents. Additionally, the main aim of the internet was openness, flexibility, and not security because people needed to share information hence there were no restrictions. The ARPANET led to development of internetworking which involved amalgamation of different networks to form a system (Speed, Juanita and Korper, 2010). As more sites linked with ARPANET, the significance of the internet increased. For instance, ARPANET was initially a government and university site but at around 1970 it became public and many people could access and use it for research. As a result, the incidence of securi ty violations increased but people did not consider it as an attack because they trusted each other. In the year, 1982 access to ARPANET expanded with the development of Computer Science Network (CSNET). Besides, at around 1987, there was emergence of commercial Internet Service Providers (ISPs). Therefore, Speed and Juanita (2009) state that the ARPANET came to a halt at around 1994 due to commercialization of the internet. The commercialization permitted people to carry out commercial traffics on the internet.Advertising Looking for research paper on it? Let's see if we can help you! Get your first paper with 15% OFF Learn More Since 1994, the internet has had a significant impact on the people’s lifestyle (Shoniregun, 2010). For instance, people use the internet to send text messages, make phone calls, shop and watch movies. In a recent research, Rhee (2010) states that people use the internet to find information. Additionally, most of the researche rs and educationists belong to an online discussion forum where they share information with people from different parts of the world. Therefore, the internet keeps on developing because of the relevant information that it contain. In a survey done, Poole (2008) states that in 1994, the internet carried approximately one percent of information flowing in a two-way telecommunication and by the year 2000 the percentage had risen to ninety-eight. This led to an increase in internet insecurity. For example, Cliff Stoll identified an internet incident and it motivated him to publish a book that created awareness on the existence of destructive use of the internet. The history of internet security Garfinkel, Spafford and Shwartz (2008) state that a virus called vienna was detected in 1987. After the detection, a man named Ralph Burger dissembled it and published the result in a book. The published information led to creation of many viruses. In 1988, many of the research centers internet c onnections in the United States were under attacks. For instance, Ferguson, (2009) states that a virus which was intended to infect computers in order to determine the number of connections ended up exploiting the UNIX vulnerability. Therefore, the virus spread swiftly infecting many computers thus making them unusable. In a research done in 1988, Einar (2008) explain that the WANK worm attacked the VMS system of the internet leading to exploitation of vulnerabilities of the programs that assist in sending and receiving of mails. Additionally, in 1994, an intrusion tool that interfered with the user name and password came out. This interrupted the security of data saved in the internet. For example, a person could log into any internet system and tamper with information.Advertising We will write a custom research paper sample on The History of Internet and Internet Security specifically for you for only $16.05 $11/page Learn More Additionally, in 1995, Citi bank detected a virus that made them loose four hundred thousand dollars to a man called Levin (Cheswick and Bellovin, 2009). Since then, people have detected many viruses that cause great harm to computers and organizations. They include, amoeba, boza and strange view viruses. In 2007, information technology specialists identified a storm worm that spread as an email attachment. Once a person opens a received email, he or she became part of the infected computers and spread the infection to others. As a result, many computers lost their functions. Therefore, computers are susceptible to attacks and people need to have information about internet security. The principles of information protection The three principles of information protection are confidentiality, veracity as well as accessibility. Cheswick and Bellovin (2009) state that information loose confidentiality when unauthorized person read and copy it. Some information like medical records and research data are vital and th ey require privacy. Therefore, it is the obligation of the organizations to ensure that client information is confidential. In the event that someone alters information in a way that is not supposed to be, there is loss of veracity. This is common in networks that are not secure. For instance, Einar (2008) states that integrity is lost when there is intentional or accidental interference with information. Since veracity is imperative for financial as well as critical safety data, people should ensure that they institute information protective measures. Lastly, loss of accessibility occurs when authorized people cannot access information (Ferguson, 2009). This lead to a situation called denial of service because people cannot get relevant information that facilitates the running of the organizations or businesses. For that reason, many organizations authenticate and authorize their information so that it is available to those who require. Authentication is a recognition process that allows specific people to use the internet. It involves the use of password, fingerprints or smart cards. On the contrary, authorization is a procedure that helps to establish if a system can execute a certain task. As a result, authentication and authorization allow authorized people to perform certain computer activities hence reducing the prevalence of cyber attacks. The significance of internet security According to a recent research, it is easy for unauthorized people to access information if the network environment is insecure (Garfinkel, Spafford and Shwartz, 2008). Additionally, it is very hard to determine the attackers. In a situation where the internet users do not have important data stored in the system, the attacked computer become useless.Advertising Looking for research paper on it? Let's see if we can help you! Get your first paper with 15% OFF Learn More Besides, it act as a source of infection transmitting viruses to other computers while permitting unauthorized people to access the organization information. The free access leads to loss of integrity and confidentiality of information because it becomes easy for people to alter the organization data. Moreover, Poole (2008) states that network attacks put the computer system at a compromise. For example, information concerning the computer hardware, network connections, software, configuration and authentication are valuable for the attackers. This is because it enables them to access the files as well as the programs hence decreasing the security of the system. Additionally, attackers who access the password of an organization network always alter the important files leading to loss of integrity and availability. Furthermore, all computers with internet connections are vulnerable to attacks like viruses, intrusions and incidents (Rhee, 2010). The organizations that are mostly affec ted include banks, insurance, universities, brokerage houses, hospitals and the government. Besides, the attack interferes with the running of an organization in a number of ways. To begin with, the organization loses a lot of time trying to repair the damage as well as recovering from the effects of the lost data. This lead to decrease in production, increase in expenditure and a loss of market opportunity as the organization can no longer fit in the competitive business environment. Therefore, computer users need to understand internet security incidents. Internet security incidents Incidents are activities related to the internet that have negative implication on the security. This is because they violate the internet security policies. Shoniregun (2010) states that internet security incidents vary in shapes and sizes and they come from any site although some originate from a specific system. Additionally, they spread fast resulting to massive destruction of systems within a shor t spell of time. Furthermore, it is hard to determine the source of the internet security incident because anyone can cause an intrusion accidentally or intentionally. For instance, Speed and Juanita (2009) explain that a student who has created software, a person with an evil intention or someone who want to search for information about a particular company can cause an intrusion. Additionally, an incident can also come from a fired employee or a consultant who accessed the information of an organization. Most of the times the intruder may want to seek political attention, logical challenge, entertainment as well as fiscal gain. According to a research done in various parts of the world, it is possible to classify the different types of incidents into several kinds. Speed, Juanita and Korper (2010) explain that probe is a type of incident that usually occurs when one tries to access a system of find information about it. For instance, probing is trying to log into an account that i s not functioning. Although probing may be due to inquisitiveness or misunderstanding, it can cause a vital security event. On the other hand, a scan is a type of probing that one accomplishes using a programmed tool (Vacca, 2009). A scan can be due to an error but most of the time it is an attack of a vulnerable system by an intruder. Additionally, account compromise is a type of incident where unauthorized person gain access in to someone else information. This can lead to data loss or theft of computer services. On the contrary, Vacca (2009) states that root compromise is a type of incident that is similar to account compromise. The only difference is that in root compromise the intruder is able to change the look of the system as well as hide the track of their intrusion. As a result, it becomes hard for the owner to trace the source of the intrusion. Moreover, a root compromise can lead to development of a packet sniffer, which is a program that enable an intruder to access dat a as it move over the internet. For instance, a packet sniffer can capture the user name or password of a person as information move around the internet connectivity. Speed, Juanita and Korper (2010) state that Denial of Service (DoS) attack is a kind of incident in which the intruder try to make the internet functions unavailable to the intended customers. The intruder achieves this incident by disrupting the network or manipulating the data. Furthermore, other types of incidents include trust exploitation, malicious code and attacks of the internet infrastructures. The development of the internet security incidents As technology continues to advance, internet intruders gain more information about attacks resulting to an increase in the number of incidents (Shoniregun, 2010). For example instead of attacking a vulnerable system, they examine the source of the code to determine the weaknesses found on computer programs. The source can be unprotected internet programs. Once in posses sion of the code, the intruders use it to determine the weaknesses of the programs. As a result, they can target the network infrastructures like the routers and the firewalls and conceal their functions. For example, an intruder can log into a system and the site owner does not detect due to lack of reflection of his activities on the system logs. This is because they use Trojan horses to mask their activities from the network owner. As a result, no one can trace the cause of the altered information. In a survey done, Rhee (2010) states that, intruders keep on identifying new and complex ways of attacking the internet as they become more stylish. For instance, intruders have a technique of determining a new connection to the internet thus making it susceptible to cyber attacks. Additionally, they use intrusions like packet sniffer to capture all information circulating in the internet thus confidentiality and integrity of data is lost. According to the survey, the percentage of the attack keeps on rising as the years go by. Besides, in 1996 approximately thirty three percent of the computers had a root compromise attack. This shows that intruders keep on attacking the internet because they have diverse knowledge about it. Additionally, any person regardless of his or her knowledge on computer system and the internet can use the software to accomplish the attack (Speed and Juanita, 2009). This means that any person with a burning desire can attack a system even if he or she does not possess technical skills. It is unfortunate that the intruders use the systems used to assess the vulnerability of a program to attack a system. As a result, the intruders can use minimum effort and time to identify weaknesses, alter information or attack a system. Therefore, many companies have developed software packages that assist in exploitation of vulnerabilities. The package include network scanners, tools for cracking passwords, modifying configured files, reporting check s ums, concealing activities and amending the logs into systems. The vulnerabilities of the internet to attacks Poole (2008) states that internet is vulnerable to attacks because the designers did not consider security. Hence, it is difficult to defend the network. Moreover, the extensive use of the internet for research and communication complicate the protective measures. For example, an attacker needs not to be present at a particular area for him or her to accomplish his or her mission. This means that one can compromise the integrity, confidentiality and availability of information from any part of the world and within the shortest time possible. Many people place a lot of trust in the internet without being aware of the risk. This is because they do not know what can happen to their information as well as their systems. Besides, they have a strong believe that they have sufficient protective measures. As the technology keep on changing, attackers also develop new ways of attacki ng the internet (Garfinkel, Spafford and Shwartz, 2008). As a result, it is vanity to believe that protective measures are always effective. Besides, the achievement of confidentiality as well as integrity is difficult because an internet may have a security compromise whose origin is a site that the organization has no control over. For example, a packet sniffer may be in a specific country but the attacker can access information found in different parts of the world. The fast growth as well as widespread internet use contributes to the vulnerability of the internet to attacks. This is because many people use complex services yet they do not safely design, configure, or maintain them (Ferguson, 2009). For example, as people hurry to procure new products through the internet, the system designers do not make sure that the network is free from vulnerabilities. Hence, intruders gain quick access into the system and interfere with the procurement and selling processes. Lastly, the grow th of the internet has led to an increase in demand of information technology specialists and engineers. Due to shortage of these people, inexperienced people address the maters of internet security resulting to an increase of vulnerability to attacks. Types of internet vulnerabilities Einar (2008) states that a fault in the computer software or the design of the protocol renderers a system vulnerable. Protocols are procedures that facilitate communication between computers. In the event that a fault exists, the computer is vulnerable to intrusion. For instance, intrudes usually target the Network File System because it lacks authentication. Additionally, designers usually leave out security component during the development of software. Therefore, the integration of security into the software takes place later after its procurement. Since the added security was not part of the initial software, it interferes with its function leading to an increase in vulnerability. Moreover, a faul t in the implementation of protocol as well as the software increases the vulnerability of the computer system (Cheswick and Bellovin, 2009). For example, the implementation of the protocol for sending messages may be in such a way that allows attackers to alter the internet and permit the system to perform unintended tasks. This attack leads to exploitation of the system as well as the software. Besides, Einar (2008) states that any fault in network configurations increases vulnerability of the computer system. For instance, a network configuration may require that people separate password from the rest of the system. In case the separation does not take place; an attacker can access authentication information and intrude the computer. The improvement of internet security Two ways are imperative in improving the security of the internet and according to Ferguson (2009); they deal with policies and procedures as well as the technology. To begin with, procedures involve the measures that people should take to prevent an attack. On the other hand, policies help in the decision making process. For example, it helps people to determine the type of defense program to use as well as the internet configuration process. Therefore, policy entails the description of a secure information environment and guidelines for reacting to an internet threat. On the other hand, security technology assists people to secure their systems as well as information from the attackers. Security technology focuses on different areas but the most common are operational and cryptography (Garfinkel, Spafford and Shwartz, 2008). Operational technology ensures that the available data is secure. On the other hand, cryptography facilitates privacy, integrity and originality of information. Cryptography is a system that prevents attackers from using the captured information (Poole, 2008). This is because attackers can modify the information of an organization and cause havoc. Therefore, encryption and decryption processes are imperative in enhancing the privacy, integrity and originality of information. For instance, a sender can encrypt a message with a password that the receiver knows. The receiver will then use a similar password to decrypt the message. This process ensures that there is maintenance of confidentiality of the message because without the corresponding decryption password, one cannot read it. Operational technology involves the use of passwords, firewalls and tools for monitoring and performing security analysis (Rhee, 2010). To begin with, the use of password prevents unauthorized people from gaining access into the internet. Secondly, firewalls ensure that people who do not attain the security criteria of an organization do not access the network. Thirdly, monitoring tools facilitate continuous monitoring and evaluation of the internet to ensure that people are confident about the security. For example, the monitoring tool can destroy viruses and malicious programs that can create harm to the computer. Finally, tools for analyzing security are significant in determining the vulnerabilities of the systems. The way forward In order to improve the internet security, research is of great importance because it will ensure availability, authenticity as well as integrity of information. As a result research need to be done about the internet protocol, detection of intrusion, engineering of software, computer system survival, web programs and computing paradigms (Vacca, 2009). This research will assist in detection of the current internet security problems and recommend the way forward. To begin with, Speed, Juanita and Korper (2010) state that there is little change in the internet protocol, therefore, people need to address the weaknesses of the computer in order to develop sophisticated procedures. The weaknesses include, lack of confidentiality, authenticity and integrity. Therefore, designers need to develop protocols that facilitate pr otection of information from unauthorized people. An example of such protocol is the use of cryptography to prevent intruders from accessing information. Additionally, research about intrusion detection is imperative because it will help people to know when the internet systems are under attack (Speed and Juanita, 2009). Therefore, researches need to focus on extensive analysis of the detection of anomaly as well as recognition of pattern. The detection of anomaly involves recognition of the usual behavior of the internet followed by determination of the abnormal characteristics. This is achieved through collection of data for a long period of time and it assist in the development of an intrusion detection device. On the other hand, recognition of pattern entail determination of network activity that is similar to an intrusion attack. Although this method is useful for the detection of future intrusions, it does not apply to new attacks. Therefore, information technology specialists require developing detection tools that can function at present and in future. This mean that extensive research on intrusion detection processes is imperative. In a recent research, Shoniregun (2010) explains that many designers develop software systems that lack security measures. In the event of integrating security measures to the software, weaknesses develop and the system becomes vulnerable to attacks. This is because breaching of systems becomes simple despite the efforts of rendering them invulnerable. Therefore, the concept of internet security should be present during the software development process. Moreover, computer system survival is the ability of a machine to function during an attack (Rhee, 2010). This mean that computer designers need to develop machines that are reliable. Therefore, researchers need to undertake research about software engineering. The research should involve testing dependability as well as fault tolerance of the machine. This will assist in th e detection of weaknesses of the current machines and development of sophisticated computers that withstand intrusions. As a result, computers will be in a position of detecting threats while still performing the normal functions. This mean that people will not suffer from the consequences of lost data. Additionally, Poole (2008) states that downloading information from the internet put ones computer at risk of an attack. This is because most of the internet programs do not have security measures. Furthermore, attackers usually target internet programs like entertainment and tamper them. When one downloads it to his or her computer, the machine gets an attack and stops its normal function. In order to prevent this problem, web designers need to develop programs with security functions. This will ensure that the downloaded information is safe for use. For instance, some internet programs like java have security measures. Therefore, internet users need to have knowledge on secure inte rnet programs. Conclusion In conclusion, an understanding of the internet and security is imperative for the development of protective measures that ensure confidentiality, integrity as well as availability of information. This is because knowledge about the concept of internet security as well as the different types of intrusions is imperative for the development of a sophisticated protective measure. Therefore, information technology specialists should strive to understand the history of internet and internet security as it would help them curb the current problem of insecurity. References Cheswick, R., Bellovin, D. (2009). Firewalls and Internet Security: Repelling the Wily Hacker. New York: Springer. Einar, E. (2008). Internet Security: Hacking, Counterhacking and Society. London: Jones and Barlett Learning. Ferguson, R. (2009). Internet. Oxford: Oxford Publisher. Garfinkel, S., Spafford, G., Schwartz, A. (2008). Practical UNIX and Internet Security. USA: Oreilly and Associate s Inc. Poole, H. (2008). The Internet: A Historical Encyclopedia. London: Academic Press. Rhee, M. (2010). Internet Security: Crytographic Principles, Algorithms and Protocols. New Jersey: John Willey and Sons. Shoniregun, C. (2010). Synchronising Internet Protocol Security. New York: Springer. Speed, T., Juanita, E. (2009). Internet Security: A Jumpstart for Systems Adminstrators and IT Managers. New York: Digital Press. Speed, T., Juanita, E., Korper, S. (2010). The Personal Internet Security Guidebook: Keeping Hackers and Crackers Out. New York: Digital Press. Vacca, J. (2009). Practical Internet Security. New York: Springer.

Thursday, November 21, 2019

Technology and Innovation management Essay Example | Topics and Well Written Essays - 500 words

Technology and Innovation management - Essay Example The best example for the creation and disappearance of industries due to the emergence of new technologies is manifestation of the many technological changes in the music industry. The topic also defines strategic management as an ongoing process upon which an organization aligns itself to meeting the challenges brought out by the changing environment. I have learnt that this part of the topic is much related to IT networking administrator, my place of work. As an IT networking administrator, I see the dynamic nature of technology and innovation as something that will require me to constantly keep in touch with it. Consistent with the tenets of strategic management, as an IT networking administrator must implement policies that will lead to meeting the objectives of the group. Part II of the topic is concerned with how firms create new technology, processes or products to meet their internal objectives. The topic asserts that though process innovation is difficult to implement, firms should strive to develop or make improvements in their systems and process to make it a reality. Further, the topic points out that leadership, engagement, and extension are the main elements necessary for effective implementation of an innovation. As noted by Ashton, Metzler & Associates (n.d) an IT networking administrator need to be in a position that is up to date with the current innovation. As an IT networking administrator, I see myself as a leader who needs to integrate leadership qualities, engagement and extension into my day-to-day operations for my career to be successful. This part of the topic asserts that planning process is normally affected by the external method used by a given business. In addition, the topic points out that for proper implementation of an innovation, a firm requires to address the four primary elements, which include execution, leadership, integration and

Wednesday, November 20, 2019

Things about me that might surprise people Essay

Things about me that might surprise people - Essay Example Going out with my friends is indeed a pleasure for me so that I try my best to join them in every activity they invite me in. I love shopping with my friends, going to the mall, checking the latest fashion there is in store for us. I also love to watch movies with them which we practically do almost every time we meet. This gives us much time to know each other more as we talk about our favorite movies, actors and other things we enjoy. Spending much time with my friends allowed me to discover that we have so much in common, our likes and dislikes as well as people we would like to meet. People usually see me as outgoing and indefatigable because of this so, I guess they would be surprised to know that I am the extreme opposite of what they see in me. I usually easily get tired so that I sleep a lot to get my energy back. Whenever I get the chance to take a little rest, even a ten minute nap would be much appreciated and often times welcomed. I believe that people are a treasure that I need to keep so I consider myself sentimental in many ways. I value time spent with friends, I keep their gifts in a rather special place which I call my treasure box. In a world where friends come and go, life is fast-paced and yesterday usually seems to be a thing to be forgotten once you are in a day called today, I guess people will be surprised to find a person like me, still exists. I am basically a simple person whose sentiments are more on things that are considered back numbered.

Monday, November 18, 2019

Privacy Laws related to Information Technology use Research Paper

Privacy Laws related to Information Technology use - Research Paper Example In this regard, it is arguable that the privacy of individual data depends on the ability of organizations to employ security measures for the protection of individual information and private data (Kerr, 2004). The various online companies and websites such as Facebook, Google, LimkedIn, Yahoo and Skype are mandated by the law to protect the privacy of individuals. Regardless of the provisions of the law, it is notable that many online organizations and companies have disclosed private information to third parties such as advertisers who use it without the consent of the holders of the information. Sensitive information such as financial records, bank and credit card details are also protected by the legal framework. This is due to the need for the security of personal data and the consequent prevention of possible fraud (Gillmor, 1998). The modern computing and transactional environments are characterized by online shopping and banking. This means that the users of the online bankin g services are predisposed to the risk of disclosure of their private information to organizations (Messmer, 2001). Additionally, digital records of employees within various organization is at a risk f unauthorized access and use. ... that organizations and individuals are protected from unauthorized use of private information by internal or external intruders to information systems (Miller and Tucker, 2007). The law also protects individual information from misuse by government agencies and the media (Sullivan, 2005). According to the fourth amendment, individual data and information must be kept private and free from unauthorized access and use (Lock, Conger and Oz, 1998). This illustrates the role of the law in ensuring that organizations keep the information on their employees and clients as private as necessary (OConnor and Matthews, 2011). Infringement of the privacy of individual information is thus a legal felony (Thibodeau, 2001). Sometimes governing authorities such as the police perform thorough surveillance of a suspect’s private information and activities. Regardless of the justification that the governing authorities give for the infringement of individual privacy, such actions are legally wro ng (Lock, Conger and Oz, 1998). The emergency of creative, innovative and up to date technological tools represents the challenge which many individuals and organizations face in trying to achieve adherence to information privacy laws. Nonetheless, the application of information systems within organizations and institutions is attributed to the increased challenge of securing private information (Canoni, 2004). However, organizations have laid security policies which are geared at promoting the enforcement of legal framework on the privacy of private information (Bernstein, 2007). Information security policies play a significant role in defining the procedure of access, retrieval, modification and use of private information with a view of ensuring preservation of individual rights to privacy

Friday, November 15, 2019

Vegetarian vs Meat Eater Comparison Contract

Vegetarian vs Meat Eater Comparison Contract Diet plays an important role for our body health. Choosing the right, healthy and balance in diet is very important for everyone. One way to stay healthy is by adopting a vegetarian diet. A vegan diet is a plant-based diet that includes only natural foods and does not include meat at all. It can also be considered as a cruelty-free act to the nature because by switching and adopting a vegetarian diet, human societies will be able to alleviate the needless suffering and deaths of countless animals. The average American meat-eater is responsible for the abuse and death of about 90 animals per year. Human beings do not need to eat meat in order to maintain a good health. This is because they can also get all the nutrition and their food needs from meatless product. Vegetarian diet is currently increasing in popularity and the number of vegetarian is rising so quickly because they have seen many significant effects that contribute to a better health. According to a 2006 Mintel survey, 6% of the population, which is about 3.6 million people, is vegetarians, and 10% eat no red meat which somehow showed that UK has the largest proportion of vegetarian in its population among the European country. (The Number of Vegetarian, n.d.) As whole, over half of the world population is vegetarian. They start to care about animals and stand up for the animals right. In fact, a vegetarian diet offers many benefits to human beings that are guards against disease, physical benefits, conserve natural resources, nutritional benefits, and improve the environment. A vegetarian diet is considered as healthy as it has shown to guards against diseases. According to new medical research, a person who adopts plant-based diet is one third less likely to suffer from diabetes and cardiovascular diseases such as heart diseases and stroke. People tend to stand a better chance of not developing the high blood pressure and bad cholesterol that might affect their health problem. According to a study from German Cancer Research Center in Heidelberg, vegetarians have more effective and strong immune systems to kill tumor cells in the body compared to meat eaters. (Dworkin 1999). There are several risk factors of metabolic syndrome, which are high blood pressure, high glucose levels, high triglycerides which are fat levels in the body, and having a big waistband. Dr Rebecca Reynolds, a reader in endocrinology and diabetes at University of Edinburgh Centre for Cardiovascular Sciences, said: Metabolic syndrome is very prevalent in Scotland because it linked in with obesity and Scotland has some of the highest obesity rates in Europe. Studies have shown that Mediterranean style diet is also beneficial to our body health because people who are vegetarian consume more fruit, vegetables and olive oil. (Newbury 2011). Improvement of cardiovascular health can be done by the consumption of nuts and wholegrain, at the same time; it can also eliminate the consumption of meat and dairy products. A British study indicates that a vegan diet reduces the risk for the biggest killer heart disease and Type 2 diabetes. On the other hand, according to the American Dietetic Association, vegetarians tend to have a lower risk of getting obesity, breast cancer, and prostate cancer other than cardiovascular disease and diabetes. Obesity is very common especially in America. According to former Surgeon General C. Everett Koop, 70% of all Americans are dying from different types of diseases which directly tied to their eating habits. (Dworkin 1999). This is beca use in the American diet, there are too much of carbohydrates, proteins, oils, fats, and sugar. A very clear and obvious example is their morning breakfast that includes of sausages, chicken ham, french fries, fried eggs, and accompanied by milk or orange juice. Sausages and chicken ham are processed food which made from animal meat. As we know, processed foods are extremely bad for our health because it contains of preservatives, toxins, and unnatural fillers that will cause kidney failures if we over consume it. Studies have shown that a diet high in animal products and dairy products which contain huge amount of hormones and saturated fat can cause breast cancer. However, theres a huge connection and relationship between vegetarian diet and breast cancer. A vegetarian diet can help prevent and even reverse it, which is taking a diet low in sugar, dairy products, and meat but high in leafy greens, fruits and vitamin D. Vitamin D is an immune system booster that has the special abi lity to attack breast cancer cells by preventing the cancer cells from multiplying to more and more cancer cells in the body. Vitamin D is a key component in helping the body responds to many different kinds of assaults and stimuli, says Robert Heaney, Ph.D., professor of medicine at Creighton University. (Biggar 2009). Vitamin D can be obtained from natural foods such as mushrooms, soy milk, and dark leafy green vegetables. Research found that consumption of isoflavone containing soy products such as tofu during childhood and adolescence protects women against the risk of breast cancer later in life. (Am Clin 2009). Vegetables and fruits also contain phytochemicals that help destroy tumour in the body. (Biggar 2009). A Harvard Medical School study of more than 90,000 women revealed that the women who often consume meat everyday are twice as likely to develop breast cancer as those who did not often consume meat. (Sloan 2008). Too much of meat consumption will also lead to certain degenerative diseases such as Parkinsons, Huntingtons, and Alzheimers disease when human being start to get older. As the famous saying goes like this, you are what you eat. Subsequently, vegetarian diets can reduce the risk of getting diseases that can affect body health and cause death. Vegetarian diet is much better than diet that contains meat because of physical benefits. Several population studies showed that people who adopt a vegetarian diet tend to have lower body mass index (BMI), which is the indicator of weight and fat of the body. This is normally associated with high intake of fibre and low intake of animal fat. Vegetarians may also have a higher metabolic rate compared to meat eaters. In a study of lacto-ovo vegetarians, one of the types of diet, resting metabolic rate (RMR) was 11% higher in vegetarian compared to meat eaters. This was partly due to a higher level of plasma norepinephrine which results from higher intake of carbohydrate and lower fat intake of vegetarians. (Mangels, Messina Messina 2004). Vegetarians will usually have better and good-looking skin textures. For instance, nuts such as almond, pumpkin seed, sesame seed, sunflower seed, vegetables that contain vitamin A and E play a big role for this part. A remarkable reduction in blemis hes and improvement in the skin texture can be seen once a meat eater changes to a vegetarian diet. Vitamin A and E are actually effective and strong antioxidants that can help neutralize free radicals in our body. A vegetarian diet is especially beneficial to female or woman who wants to look younger and live a healthier lifestyle because it prevents the aging and damage of the skin. Fruits that could improve the skin condition are tomatoes, watermelon, cucumber, apples, and papaya. Tomatoes are rich in vitamins A and contain iron. It is a strong antioxidant that helps fight cancer as well. Cucumber is a natural cooling and brightening agent of the skin. You can simply consume it or slice it into pieces and put it on to the face. Apples and papaya contains vitamins and high in fibers. These fruits are very useful for people who have constipation problem and high cholesterol. In addition, several studies indicate that people who adopt vegetarian lifestyle live an average of 3 to 6 y ears longer than those who do not. According to a study from Loma Linda University, vegetarians live about 7 to 15 years longer than people who are not vegetarian. (Dworkin 1999). This can be proven with the example of monk. Buddhist monks are vegetarian and they do not consume meat at all. This is because in their belief and religion, killing and eating the animal is a sin and its cruel. It will also go against their beliefs and religion. Therefore, there is no doubt that monk who adopts vegetarian diet for the rest of their life would normally live longer than normal people. Some monks are even as old as 100 years above. Besides, nail health is considered as an indicator of a persons body health. You can see the persons health by looking at their fingernails. People who are vegetarian tend to have a healthier and longer nails, which indicates that they are healthy. People who normally consume meat and have lesser intake of vegetables tend to have a shorter and yellowish nails. Thi s indicates that their health is at risk. Research showed that vegan diet helps reduce the suffering from Premenstrual Syndrome (PMS) for female. The diet includes reduction of meat consumption but increase in consumption of complex carbohydrates, leafy green vegetables, fruit, cereals and whole grains. (Cornforth 2009). A vegetarian diet also helps to stop allergies for a certain people. Researchers found that people report lesser personal problems such as runny nose and asthma when they switched to a vegetarian diet. This is basically due to the reduction of common food trigger that contains hormones and toxins such as meat, dairy and eggs. As a matter of fact, a vegetarian tend to be thinner than meat eater. Harvards long-term Nurses Health found that thin people have only one-third the risk of getting asthma compared to meat eaters. (Barnard, n.d.) For instance, if overweight people adopt a vegetarian diet, they are more likely to lose their weight and alleviate asthma because p eople who are thin normally do not have asthma problem. All of these are the results and physical benefits that can be gained from a vegetarian diet. Furthermore, a vegetarian diet does not only beneficial to human beings in terms of health; it also contributes to conserve natural resources. The meat industry is very wasteful of natural resources. Approximately 10 pounds of plants are needed to be fed to the animals in order to produce one pound of meat, which is also one of the inherent problem of eating meat. (Bronk Su 2006). Thus, 70% of grain grown is almost used to feed the animals in America, which means much more food is being consumed to support the animals than would be needed if more people were vegetarians. (Bronk Su 2006). Due to the extreme and increasing growth of animals feed, the meat industry require a huge amount of water in order to grow the grain and feed the animals. Vegetarian author John Robbins calculates that it takes 168, and 229 pounds of water to produce one pound of maize and rice respectively. (Vidal 2010). On the other hand, a pound of beef requires approximately 8000-9,000 litres of water. Pigs ar e one of the thirstiest animals in the world. An average-sized of pig farm in North America with about 80,000 pigs requires nearly 75 million gallons of fresh water to feed the pig in a year. (Vidal 2010). In contrast, a large sized of pig farm with more than millions of pigs may requires the water as much as a city. When the demand for meat increases, the uses of water in the meat industry and farming land will rise as well. Consequently, there will be lesser source of water available for the crops and also drinking for human beings. (Bronk Su 2006) say that almost half of the water that is consumed in the America is mostly being used by the meat industry and the groundwater is being withdrawn 25% faster than it is being replenished. In order to conserve energy in terms of water resources, the best choice and option is to adopt a vegetarian diet. This is because when people start by vegetarian diets, they will consume lesser meat in their daily diets. As a result, lesser amount of water will be used to grow the grains and the number of animals to be fed by the meat industry will greatly be reduced. This can also be said to conserve water resources because there will be a sufficient amount of water to provide to both human beings and animals in the world. Other than that, vegetarian can also conserve energy in terms of oil. Oil crisis is one of the major problems faced by human beings in the world currently. (Bronk Su 2006) also say that 8 times as much fossil fuel energy is being used in the production of animal protein as is used in the plant protein production. There are actually some reasons for this. In fact, fuel is needed for manufacturing pesticides and fertilizers to grow grains and crops for animal feed. Besides, fuel is needed for transportation in the meat industry and also the operation of machinery in the farming industries. In this case, it is said that about 400 gallons of fossil fuels are being used in order to produce foods for the average meat-eating for the American each year. (Bronk Su 2006). Therefore, it is the truth that vegetarian diet can actually help to conserve natural resources in terms of water and fuel. Critics of vegetarianism claim that being a vegetarian is not good for our body because a vegetarian diet is lack of animal fat, protein, each of the 9 amino acids, iron and calcium, which scientific evidence showed that human need these nutrients for an optimum health. It is true that vegetarian diet could not afford to provide animal fats and other essential nutrients that our body somehow needs it. Yet, a vegetarian diet offers much more other extra nutritional benefits to our body compared to a diet containing meat. It does not mean that you need to consume meat in order to achieve an optimum health level. A carefully planned vegetarian diet can still provide an optimal health for everyone. There is always another alternative ways to get it. For example, vegetarian foods such as nuts, seeds, and dark leafy greens provide magnesium that aids the absorption of calcium. Nuts such as almonds are a great source of protein for vegetarian other than providing vitamin E, calcium, magnesi um and zinc. In addition, almond can helps lower the cholesterol level especially for the elders. According to a study from Health Research and Studies Centre, they found out that almonds are even better than olive oil in lowering LDL cholesterol. (Top ten vegan super foods 2009). Other than that, seeds such as pumpkin seeds contains high amount of amino acids, calcium, potassium, magnesium and tryptophan. Tryptophan is one of the essential amino acids that aids in the production of serotonin in our body. Serotonin is actually one kind of hormone that can make us feel happier and lively. It is considered as happiness hormone despite it is not really a hormone. This is because it sort of activates our brains and able to makes us to be more lively and energetic than normal. Several studies has shown that pumpkin seeds contain one kind of special compound called phytosterol that helps enhance and improve the bodys immune system. (Top ten vegan super foods 2009). By adding pumpkin seeds into our daily diets, it can also help to reduce the inflammation on our body. We can also get the source of protein from several vegetarian foods such as beans, tofu and other soy products. In order to gain a classic combination that provides complete protein, a vegetarian is advised to eat beans and grains together to get the optimum result. This is because beans actually do not contain the complete amount of protein in it. Certain brand of tofu or soy milk is fortified with extra beneficial nutrients such as calcium and potassium for the need of a vegetarian. Soy protein has been shown to have as much proteins as in meat. (American Heart Association, n.d.). Food type Total Kcal/100g* Protein (g)* Kcal from protein Beef 310 22.5 90 (29% from protein) Wheat(flour wholemeal) 310 12.7 51 (16% from protein) Source: Collins Gems Calorie Counter (averaged for raw meat) (Patel, n.d.) showed the amount of daily requirement for energy in terms of calories and protein based on the table as shown above. An assumption of calorie requirement for normal active lifestyle is made, which is 2400 Kcal every day. Experts say that 10% of calorie should come from the source of protein. As 1g of protein generates 4 Kcal, it is said that human being requires 60g of protein every day. (Patel, n.d.) Based on the table above, wheat provides 51 Kcal of calorie from protein which somehow reached the amount of daily requirement for energy. In contrast, the calorie in beef is much higher than that, which is 90 Kcal. This is considered as too much of calorie for a normal healthy diet. Moreover, a vegetarian have a higher risk of having iron deficiency compared to a meat eater. For meat eaters, iron can be found in meat products such as red meat, liver and egg yolk. However, we can also get it from the plant sources such as dried beans and spinach. Hence, it is not necessar y to consume meat in order to get iron. Plant-based diet alone can already provide as much nutrient as what meat can provide to us. It is also not a healthy way to get protein just by eating meat alone. You will get surprise when you get older because all those symptoms of diseases would appear due to a long-term of meat consumption. One of the arguments put forward to support the view that vegetarian diet could not contribute much towards saving the environment. Although this statement may be true, but there is no doubt that a vegetarian diet can actually save the environment and make the world a better place to live in. A vegetarian helps to reduce the destruction of rainforest and save the wildlife habitat. Malaysia is a clear example of country that has rainforest. Rainforest is very important in the world. This is due to several reasons such as regulating the global climates; regulate the cycle of water, and the absorption of carbon dioxide from the atmosphere. The environmental community has recognizes global warming as one of the gravest threats to the planet. (Mohr, n.d.). Unfortunately, mankind in this century have become more and more obsessed with the earning of maximum profits. People only think of earning as much as they could. As a result, rainforest is being cut down and enormous of fires are used to burn down these forests in order to have more space to raise the cattle before the meats, typically found in hamburgers and processed meat, are being sold out in the market. Approximately a football field of rainforest is being destroyed in order to produce 257 hamburgers for the population every second! (Animal rights and Vegetarianism, n.d.). By switching to a vegetarian diet, we can actually save a lot of animals and also their habitat. Hundreds of thousands of animals are innocently being killed by human every year. Some corporations even inject certain chemicals, hormones, or veterinary drugs into the body of the animals so that they could grow faster and reproduce more. This is to enhance their production and gain more profits. For examples, chicken and beef cattle are injected with growing hormones. What goes beyond the doors of the corporations and industries are extremely terrible and insane. Animals are regularly being butchered alive on speeded-up conveyor lines. These innocent living things are forced to be killed for human use and purposes, where in fact human have no right to do that at all. If people still continue to kill huge number of animals just to feed the human beings, one day, these animals will extinct forever and our next generation will have to pay the price for what human being are doing right now. Like the quote that says, When the buying stops, the killing stops. A vegetarian diet also reduces water pollution and land pollution. In the modern and high technology society, a large amount of grains are sprayed with different types of fertilisers such as herbicides and pesticides by factories in order to feed the cattle. These two chemicals are very harmful and acidic. Extreme amount of acidic chemical will destroy the top soil and leak into rivers and grounds. Over 4 million acres of cropland are lost to erosion in the US every year due to plundering farmlands to fatten animals. (Animal rights and Vegetarianism, n.d.) When these ch emicals flow into the oceans and seas through the river, this causes the deaths of millions of fishes. Other than that, meat industry contributes significantly to global warming as well. For example, methane that is released by bacteria in the rumens of cattle worsens global warming. This is because methane is a relatively potent greenhouse gas that will raises global temperature. Burning down of forest will also release carbon dioxide gas into the atmosphere. As a result, this would cause the temperature to rise and global warming worsens from day to day. Thus, a vegetarian diet can reduces the production of carbon dioxide into the atmosphere. The damage to the environment does not stop at cattle or chicken, the fishing industry also somehow contributes to the degradation of environment. What does this means? It actually means that many different species of fishes are being caught away by fisherman faster than they can reproduce. (Bronk Su 2006). This damaged the ecosystem of the oceans and sea, which in turn, affect the whole environment and worsen global warming. Approximately 300,000 different types of sea animals such as whales, dolphins and porpoises are being killed every year before their meats are being sold in the supermarket. (Bronk Su 2006). Thus, by switching to a simple and easy vegetarian diet, we can actually conserve the environment and preserve the natures biodiversity without spending too much money or figure out the other alternative ways. All in all, a vegetarian diet contributes a lot to humans lifestyle, eating habits and the environment and there are numerous of benefits of it. Basically, animals and human can actually get the nutrients required for the body from plants, and not by animals itself. Human are actually getting the nutrients from second-hand sources if they eat meat. If they eat the animals, all the toxins, hormones and chemical will automatically go into the stomach which is hard to be expelled and removed from the body. The truth is that a vegetarian diet even contains sufficient beneficial nutrients for the body which they have been mistakenly claimed to be lacking in, especially protein. (Health Benefits, n.d). As a matter of fact, the anatomies of herbivores, carnivores and human are compared which shows that man is actually vegetarian by nature. (Doshi, n.d.). The comparison can be shown in the table below. Carnivores (meat-eating) Have claws for killing Sharp front teeth for tearing meat Stomach acid is twenty times strong Perspire through tongue Herbivores (plant-eating) Have no claws No sharp front teeth Weak acid in stomach Perspire through skin Humans Have no claws No sharp teeth Weak acid in stomach Perspire through skin The above table has clearly shown that human beings are naturally a vegetarian and should not be a meat eater. This has strongly support the fact that vegetarian diets is much better and healthier than a diet that contains meat. In order to produce meat for meat eaters, human need to kill billions of animals to fulfil the need of population in the world. However, human do not need to kill a plant to obtain vegetarian food. This is not only an act of kindness to the animal, which is a living like human being; it also shows the appreciation to the nature and conserves the environment.