Thursday, December 26, 2019

The Eye Of The Needle - 1280 Words

The Eye of the Needle The Eye of the Needle was always an iconic place along the Missouri until May 1997 when it collapsed under suspicious circumstances. On the expedition of Lewis and Clark, the White Cliffs of Montana was a signature site described by Lewis. One of the extraordinary landmarks was the Eye of the Needle, which Meriwether Lewis first described its scenery by comparing its magnificent rock formations to â€Å"elegant ranges of lofting freestone buildings, having their parapets well stocked with statuary† (Burns, 1997). This was 1800’s talk, which doesn’t make sense to most people nowadays. Looking at an old picture of the Eye of the Needle that my grandfather took while rafting the Missouri, I can see the beauty that people raved about. The rock structure is so perplexing. The arch made up of multiple boulders doesn’t look like anything that nature could ever make naturally. It defies gravity standing on the very top of the rock wall lining the rushing Missouri. The light grey structure has thousands of crevices that formed themselves from natural wear-and-tear over time. 200 feet up, it towers over the Missouri River keeping a watchful eye on all of the wildlife. When blogger Chris describes this beautiful place he said, â€Å"The Eye of the Needle could be seen a few miles upstream while floating the Missouri River, and from a distance it appeared to be just that – a tiny window allowing some of the sky to shine through. The structure was only about 11 feet high,Show MoreRelatedCataract has been known to mankind for many centuries, and cataract surgery for many years has800 Words   |  4 Pagescloudiness or opacity in the normally transparent crystalline lens of the eye. This cloudiness can cause a decrease in vision and may lead to eventual blindness. The word cataract has been derived from Greek origin which means waterfall. The original name was of Latin medicine but was lost in translation of Arabic writing s which was suffusio which was a short hand to expressing the condition; humours that flowed down into the eye. In the 6th century BC the first case of cataract surgery that was reportedRead MoreBiopsy936 Words   |  4 Pagessample of tissue or fluid is removed with a needle in such a way that cells are removed without preserving the histological architecture of the tissue cells, the procedure is called a needle aspiration biopsy. Biopsies are most commonly performed for insight into possible cancerous and inflammatory conditions. II. Materials/ Equipment Needed: Clean Gloves Anesthesia (surgical biopsy) Mdication (antianxiety) Sterile eye dressing (pad), as needed, and paper eye tape to secure it Clean Gloves AnesthesiaRead MoreMeth Is A Normal Piece Of News1258 Words   |  6 Pagesno greater capacity. issues such as dirty needles, child inhalation, and burns are intensive and require immediate attention, draining resources from the hospitals. A study was done by Averting HIV and AIDS (AVERT) where they passed out clean needles to drug addicts to reduce the diseases passed though used needles A small solution such as this could cause a huge change in problems by reducing the amount of drug users in the hospital from shared needle infections, which would also reduce the crimeRead MoreEssay on The Eyes of the Dragon1023 Words   |  5 Pagescame in and killed Roland by offering him a second glass of wine that was poison. Peter was found guilty of the murder, as Flagg had planned, and was sentenced to life imprisonment atop a tower called the Needle by Anders Peyna, the Judge-General. Peter would spend a good five years in the Needle until he decides to make a successful escape, only to encounter Flagg for a final confrontation. nbsp;nbsp;nbsp;nbsp;nbsp;Thomas, one of the main characters, is a particularly interesting character forRead MoreNeedle in the Hay Song Analysis1089 Words   |  5 Pagesâ€Å"Needle in the Hay† by Elliott Smith Your hand on his arm The haystack charm Around your neck Strung out and thin Calling some friend Trying to cash some check Hes acting dumb Thats what youve come To expect (Chorus) Needle in the hay Needle in the hay Needle in the hay Needle in the hay Hes wearing your clothes Head down to toes A reaction to you You say you know what he did But you idiot kid You dont have a clue Sometimes they just Get caught in theRead MoreEssay about The Art of Knitting and Crocheting888 Words   |  4 Pagesthose two needles into your hands and casting on the yarn to create a wonderful piece of fabric. Just think with only two stitches, the knit stitch and the purl stitch you can create a variety of patterns, magically right before your eyes. Knitting needles are typically made from aluminum, plastic, bamboo, or wood. Sizes range from 2 mm in diameter to 25 mm in diameter. (Craft Yarn Council of America) Depending on the gauge you seek for your fabric will determine the size of the needles you willRead MorePercutaneous Medical Image And Ultrasound Image1043 Words   |  5 Pages(Gray 2006). However, poor needle tip localization needs to be solved. Also, localize the needle tip in deep locations (`Cheung Rohling 2004) and slope insertion angles (Edgombe Hocking 2010). Enhancing the needle visibility will lead to decrease procedures’ failure. Mohammad mentioned that in his studies in 2013, an ultrasound actuated needle with a transducer can be visualized under ultrasound colour Doppler-mode, which also, can reduce the force during needle penetration process. HoweverRead MoreThe Key Of A Play981 Words   |  4 PagesJames’ Doe, 25 year old southern man that travels through time Needle, James’s addiction Katie, James’s new girlfriend Setting insane asylum. present. Lights up to reveal JAMES sitting on his couch with a needle sitting in front of him on the table JAMES SHUT UP. Just stop talking to me! NEEDLE I’m here to help you James. It’s okay to be afraid but I promise I won’t hurt you. (JAMES paces back and forth in front of the NEEDLE.) JAMES NO†¦ NOO I can’t do it! I don t want your help, I don tRead MoreExpository Essay - Ancient Egyptians1575 Words   |  7 PagesDesigns, para 4). He also explains a symbol used called the eye. Madhura (2010), â€Å"The Ankh or the eye is a widely identified and used symbol of Egyptian culture. In the ancient times, it represented life and was hence one of the respected symbols. Among the different designs of the Ankh, the eye of the Horus is more popular as it stands for the good luck. The eye of Horus, also known as the eye of the Ra, is believed to be the all-seeing eye that was also used in amulets worn by the ancient EgyptiansRead MoreThe Center For Disease Control And Prevention1218 Words   |  5 PagesGuidelines The Center for Disease Control and Prevention (2011, para. 2) defines a sharps injury as, â€Å"a penetrating stab wound from a needle, scalpel, or other sharp object that may result in exposure to blood or other body fluids.† Different types of sharps include intravenous cannulas, butterfly needles, hypodermic needles, phlebotomy needles, lancets, scalpels, suture needles, razors, scissors, tissues, and fragments of bone (Weston, 2013, p.208). Sharps injuries affect a great number of health care professionals

Monday, December 9, 2019

Childhood Dreams Essay Example For Students

Childhood Dreams Essay For my independent study topic I researched dreams. There are many differentapproaches philosophers have taken to explain dreams and what they mean. I willgo through a couple of them. Many of you may be asking yourself why do Idream?, there are several answers to that question. The first in thephysiological set. We dream in order to exercise our brains. When youreawake, messages are constantly speeding among all your billions of brain cellsto keep you moving and thinking and digesting an so on. So the idea is that whenyoure asleep, dreams exercise the pathways between brains cells. Acouple of ideas that might help this make sense are; the first couple of yearsof your life are the most intense for learning which is also when you have thegreatest amount of REM sleepwhich means your dreaming a lot. Another thing isyour brain waves during REM sleep look about the same as your brain waves whileyour awake. During other parts of sleep, the brain waves look very different (alot slower) There is also a psychological set of ideas about why we dream. Sincepsychology has to do with your thoughts and emotions it has been said dreams areactually about immediate concerns in our lives. In the bible and within a lot ofcultures dreams are thought to be prophetic, which means they can predict thefuture. Sigmund Freud a famous philosopher gave us a lot of ideas on how ourminds work and was very interested in interpreting dreams. He thought dreamscontained symbols hidden deep within our minds and memories.

Monday, December 2, 2019

The Tortuous Path Of Early Programming. Essays - Konrad Zuse

The Tortuous Path of Early Programming. In the perpetual darkness more than two miles below the surface of the North Atlantic, a submersible sled slowly traced the alpine contours of the ocean bottom in the summer of 1985. Named the Argo after the ship in which the legendary Greek Hero Jason sought the Golden Fleece, the 16-foot-long craft resembled a section of scaffolding flung on its side and stuffed with equipment, Powerful lights, sonar, Video cameras. Far above, arrayed in front of a video screen in the control room of the U.S. Navy research vessel Knorr, Members of a joint French-American scientific expedition intently watched the images transmitted by the submersible as it was towed above a desolate landscape of canyons and mud slides. After 16 days of patient search, A scattering of metallic debris appeared on the screen, followed by the unmistakable outline of a ship's boiler. A jubilant cry arose from the scientists. The ocean liner Titanic sunk 73 years earlier with more than 1,500 of its 2,200 passengers on board had finally been found. The quest for the remains of the Titanic in the crushing depths of the sea was a remarkable application of computer technology, as exotic in its means as in its venue. Not least of the keys to the successful outcome was the agility of modern computer programming. Argos's ensemble of sonar, lights and cameras was orchestrated by an array of computers that each programmed in a different computer language. The computer on the unmanned Argo itself was programmed in FORTH, a concise but versatile language originally designed to regulate movement of telescopes and also used to control devices and processes ranging from heart monitors to special-effects video cameras. The computer on the Knorr was programmed in C, a powerful but rather cryptic language capable of precisely specifying computer operations. The telemetry System at either end of the finger thick Co-ax cable connecting the vessels, which in effect enabled their computers to talk to each other, was programmed in a third, rudimentary tongue known as assembly language. Programming languages are the carefully and Ingeniously conceived sequences of words, letters, numerals and abbreviated mnemonics used by people to communicate with their computers. Without them, computers and their allied equipment would be useless hardware. Its own grammar and syntax regulate each language. A programming language that approximates human language and can generate more than one instruction with a single statement is deemed to be high-level. But computer languages tend to be much more sober and precise than human languages. They do not indulge in multiple meanings, inflections or twists of iron. Like computers themselves, computer languages have no sense of humour. Today there are several hundred such languages, considerably more than a thousand if their variations, called Dialects, are counted. They enable their users to achieve a multitude of purposes, from solving complex mathematical problems and manipulating (or crunching) business statistics to creating musical scores and computer graphics. No existing Language is perfect for every situation. One or more of three factors usually determines the choice among them: The language is convenient to the programmer; it is useable on the available computer; it is well suited to the problem at hand. The multiple tongues employed on the Titanic expedition are a case in point. For the computers aboard the surface ship Knorr, C was the preferred language because it provided more direct control of the computerised hardware. FORTH was the only high-level language that could be used on the submersible Argo's computer. And the precise timing required timing required of the signals passed by cable between t he two vessels was best accomplished by rigid assembly language. As varied languages have become the all build on a common base. At their most fundamental level, Computers respond to only a single language, The high and low of electric voltages representing the ones and zeros of binary code. Depending on how these signals are fed into a computer's memory. Another might be a piece of data yet to be processed. Yet another collection of binary digits, or bits, might command the machine to perform a certain action, such as adding to numbers. The circuitry of each type of computer is designed to respond to a specific and finite

Wednesday, November 27, 2019

Free Essays on Issues In Platos Republic

Plato’s analysis of the truth through "The Parable of the Cave" is an effective, valid tool to help us analyze our own life and ultimately find the truth. He did this by first analyzing his own life and the fetters and bearers who used shadows to keep him from reaching the roadway to wisdom. It has proved to be an effective assessment not only when he was alive but even up until today. The parable symbolizes man’s struggle to reach understanding and enlightenment and is a universal and everlasting concept. Plato used the bearers in his parable to symbolize people who control what we see and do, people who hold us back from using our full potential to decide what we want to see for ourselves. An example from modern society would be TV producers or record label executives, ultimately they decide what songs we will sing tomorrow and what shows we will watch. They limit us by allowing only what they want to reach us and penetrate our minds and lives. The fetters were what kept the escaped prisoner in the parable from turning his head and seeking his own truth, as well and new things. They kept him from being able to control what he saw for himself. The naming of objects was another hindrance, because it only caused prejudging and encouraged a closed mind. The fetters, bearers, and naming of objects make it harder to find our own truth, although it is not impossible. As Plato knew then, they exist in everyone’s lives. Humans have to travel from the visible realm of image making and object naming to the intelligible, invisible realm of reasoning and understanding. The "Parable of the Cave" symbolizes this trek and how it would look to those still in a lower realm. The things our senses perceive as real are just shadows on a wall. Just as the escaped prisoner ascends into the light of sun, as we amass knowledge, we ascend into the light of true reality: ideas in the mind. Yet if someone goes into the light of sun and embra... Free Essays on Issues In Plato's Republic Free Essays on Issues In Plato's Republic Plato’s analysis of the truth through "The Parable of the Cave" is an effective, valid tool to help us analyze our own life and ultimately find the truth. He did this by first analyzing his own life and the fetters and bearers who used shadows to keep him from reaching the roadway to wisdom. It has proved to be an effective assessment not only when he was alive but even up until today. The parable symbolizes man’s struggle to reach understanding and enlightenment and is a universal and everlasting concept. Plato used the bearers in his parable to symbolize people who control what we see and do, people who hold us back from using our full potential to decide what we want to see for ourselves. An example from modern society would be TV producers or record label executives, ultimately they decide what songs we will sing tomorrow and what shows we will watch. They limit us by allowing only what they want to reach us and penetrate our minds and lives. The fetters were what kept the escaped prisoner in the parable from turning his head and seeking his own truth, as well and new things. They kept him from being able to control what he saw for himself. The naming of objects was another hindrance, because it only caused prejudging and encouraged a closed mind. The fetters, bearers, and naming of objects make it harder to find our own truth, although it is not impossible. As Plato knew then, they exist in everyone’s lives. Humans have to travel from the visible realm of image making and object naming to the intelligible, invisible realm of reasoning and understanding. The "Parable of the Cave" symbolizes this trek and how it would look to those still in a lower realm. The things our senses perceive as real are just shadows on a wall. Just as the escaped prisoner ascends into the light of sun, as we amass knowledge, we ascend into the light of true reality: ideas in the mind. Yet if someone goes into the light of sun and embra... Free Essays on Issues In Plato's Republic Plato’s analysis of the truth through "The Parable of the Cave" is an effective, valid tool to help us analyze our own life and ultimately find the truth. He did this by first analyzing his own life and the fetters and bearers who used shadows to keep him from reaching the roadway to wisdom. It has proved to be an effective assessment not only when he was alive but even up until today. The parable symbolizes man’s struggle to reach understanding and enlightenment and is a universal and everlasting concept. Plato used the bearers in his parable to symbolize people who control what we see and do, people who hold us back from using our full potential to decide what we want to see for ourselves. An example from modern society would be TV producers or record label executives, ultimately they decide what songs we will sing tomorrow and what shows we will watch. They limit us by allowing only what they want to reach us and penetrate our minds and lives. The fetters were what kept the escaped prisoner in the parable from turning his head and seeking his own truth, as well and new things. They kept him from being able to control what he saw for himself. The naming of objects was another hindrance, because it only caused prejudging and encouraged a closed mind. The fetters, bearers, and naming of objects make it harder to find our own truth, although it is not impossible. As Plato knew then, they exist in everyone’s lives. Humans have to travel from the visible realm of image making and object naming to the intelligible, invisible realm of reasoning and understanding. The "Parable of the Cave" symbolizes this trek and how it would look to those still in a lower realm. The things our senses perceive as real are just shadows on a wall. Just as the escaped prisoner ascends into the light of sun, as we amass knowledge, we ascend into the light of true reality: ideas in the mind. Yet if someone goes into the light of sun and embra...

Saturday, November 23, 2019

What are You Doing to Prepare for College Applications

What are You Doing to Prepare for College Applications CC image courtesy of V-LUX 4 on pxhere. Are you are heading toward your senior year of high school? If so, do you want to be totally stressed out as admissions deadlines approach, or would you rather get some work done ahead of time to make things easier three months from now? Summer is the best time to prepare for college applications. Your senior year will be busy. You will probably be visiting college campuses, formulating your list of schools and taking   SAT subject tests, in addition to balancing your regular plate of schoolwork and activities. So it’s important to do anything you can do for your college applications now. If you want to avoid last minute panic, follow these suggestions and get a jump start on your college applications: 1. Prepare for college applications by reading and contemplating the Common Application Questions for 2018-19. Here they are: 2018-2019 Common Application Essay Prompts Some students have a background, identity, interest, or talent that is so meaningful they believe their application would be incomplete without it. If this sounds like you, then please share your story. The lessons we take from  obstacles we encounter  can be fundamental to later success. Recount a time when you faced a  challenge, setback, or failure.  How did it affect you, and what did you learn from the experience? Reflect on a time when you  questioned  or challenged a belief or idea. What prompted your  thinking? What  was the outcome? Describe a problem youve solved or a problem youd like to solve. It can be an intellectual challenge, a research query, an ethical dilemma anything that is of personal importance, no matter the scale. Explain its significance to you and what steps you took or could be taken to identify a solution. Discuss an accomplishment, event, or  realization  that  sparked a period of personal growth and a new understanding of yourself or others. Describe a topic, idea, or concept you find so engaging that it makes you lose all track of time. Why does it captivate you? What or who do you turn to when you want to learn more? Share an essay on any topic of your choice. It can be one youve already written, one that responds to a different prompt, or one of your own design. 2. Take notes. If you are having essay-worthy experiences this summer, don’t trust that your memory will recall all the details of those experiences. Write them down!! Trust me, it will make the essay writing process SO much easier than it would be with just your memory to rely on. 3. Reflect. If you’re not engaged in some interesting activities and adventures this summer, do some self-reflection and find something to jump into. It doesn’t have to be glamorous – you could get a job in a bakery or video store and make an essay out of it. A great essay is more about who you are and how you experience your life than about the actual things you do. 4. Start gathering Letters of Recommendation. If you haven’t already, ask your teachers NOW for letters of recommendation. They will appreciate having the extra time to think and write. See my article High School Seniors: Start Now on Your Letters of Recommendation (LORs)! 5. Write an essay draft. It doesn’t have to be perfect. Just get something down on paper. It will get your ideas flowing and take off some of the pressure you might otherwise experience in the fall. 6. Talk to your parents and friends about your ideas. And if you do write an essay draft, share it with others. They might have insights into your experiences and growth that you don’t have. After all, you only have one brain and it can only recognize so much about itself! 7. Download the Common Application Form. You can prepare for college applications by filling out all the generic information you can (name, address, etc.). Get those details out of the way so they don’t clutter your brain and you can focus on writing your essays. Follow these six suggestions and you will have much more peace and brain space so you can focus on your other senior year activities – and you’ll have more FUN too!! Stuck on what to write for your college essay or personal statement? The Essay Expert can help! We offer both flat rate and hourly  College Admissions Services.

Thursday, November 21, 2019

MHE503 Survey of Emergency and Disaster Mgt Module 2 Case Essay

MHE503 Survey of Emergency and Disaster Mgt Module 2 Case - Essay Example FBI: months before the actual attack, there had been a reported suspicion on two Middle Eastern Men training in one of the US flight schools. It has been observed that they're being too much concern about fast learning procedures had been a practical reason for the suspicion of the agency.2 Then again, this call has not been well recognized by the government as a possible threat to the nation's security. These particular calls for possible alarm appeared to have no specific and strong evidences of being true, taking them into consideration could have been a better choice for the government as putting the little suspicions together was practically a good reason for them to search through the individuals were suspected to have connections with Al Qaeda and Osama Bin Laden. The reports after the attack noted that there were possible calls and secret movements within the government agencies during the pre-attack dates. ... One particular truth that might have enveloped the lack of concentration and attention that the government had on the possible case of an arising attack against the safety of US may have not been given careful concern practically because of the compartmentalization of the major agencies governing the safety of the country.4 Likely, even though the government administration of US poses to be centralized and mainly controlled by a main unit, it could be noted that only a few are really interconnected towards each other. Here are some other considerations that could have been given attention to: Many agents in both CIA and FBI do not have an idea about each other. Hence, even though they are interconnected by a particular system, there is no personal linkage that served their agencies. Because of this, it is quite hard to deal with the increased emergence of possible suspected matters that are noted to have a great imposing threat to the nation's security and protection. 5Because of this, it could be noted that getting to the people who know something about the situation was not that easy to accomplish between the different teams within the agencies working within a certain case. Besides that, being naive over the major things that happened before the attack may be correlated to the self belief that Americans have that the Al Qaeda would not take the risk to attack the nation since they though these Middle Eastern individuals believe that the nation's security is established well and that they would be feared by it. No matter, the surprise attack made a good fulfilment of the plan. 6Apparently, the American government failed to recognize the fact that these Middle Eastern Individuals are known for their commitment to their

Tuesday, November 19, 2019

Management information system (IT) case studies assignment Essay

Management information system (IT) case studies assignment - Essay Example They have a competitive edge because the web based program accurately predicts consumer buying pattern and accordingly, the company can facilitate the changes in its products and services, to meet the changing demands of its customers. Harrah’s approach to determining and rewarding customer loyalty has significantly increased the number of committed customers and opened scope for targeted marketing for customers with similar profiles. CDW and Harrah can considerably increase the number of products and services by efficiently analyzing customer buying behaviour and also introduce interactive and custom based products and services,at little extra cost. The purpose and business value of Web services is to provide a large platform for its users to improve their e-commerce activities and generate huge revenue. The ‘programmable website’ of Amazon has given its customers a readymade website of their own which can be customized as per their requirements. The benefits of Web services to Amazon, eBay, and their developer partners are extensive in the form of exposure to a whole new world of creative output, whose scope is unlimited with ever increasing customer base. The business benefits to Amazon and eBay of opening up some of their databases to developers and entrepreneurs are extensive in scope and revenue because each new developer brings many more new surfers in its ambit, each of which translates into revenue for Amazon and eBay. Google has been hesitant in opening its database to its users mainly because it thought that it may lose control over its core operations and gradual opening of its web based business areas would help it to better organize its activities to facilitate emerging opportunities. The other companies should follow Amazon and eBay’s lead and open up some of their databases to developers and

Sunday, November 17, 2019

School Life Essay Example for Free

School Life Essay It’s a normal day 6:30 in the morning just as any other. Then BOOM my alarm clock goes off to wake my brother and I up to get ready for school, but this was all put to the side by our mother coming in to the room telling us that she would have to work a few extra hours. Wake your but up! Is what I yelled to my brother as I had always did he consistently showed himself to be the lazy one who would just breeze through life without a care in the world. He replied back with the bad morning breath, â€Å"Leave, me, alone its only 6:30 school doesn’t start until 7:30. † Me as usual I got up pulled him out of bed until he hit the floor then started my routine to get ready for the day’s events. Oh yeah my name is Gerard by the way. I carried myself across the dimly lit hall towards the bathroom. As I flicked on the light switch, I first noticed this hair pick still stuck in the side of my head. I immediately grabbed it and started to fix my hair. As I stand in front of the mirror looking back at my own reflection, wondering why, does school start this early in the morning, I grabbed the toothbrush and toothpaste and began to a make it happen. My brother’s name is Joel, and he could care less of his appearance, because he always thought that he was God’s gift to the ladies. Most of his attire consisted of whatever he felt like grabbing out of the closet or the first thing he could get his hands on. He didn’t care if he was all wrinkled, his excuse was that they’ll be gone throughout the day plus now one would notice them anyway because that’s how he rolled. You would have thought that he just came from summer camp playing rugby with a few of his friends before school started. As he came into the bathroom besides me to wash up and get ready, I could always here him saying thanks for getting me up too, knowing that being the older sibling I couldn’t just let him be late for school besides our mother would have killed me. As I look at the clock I notice that we are right on schedule, its 7:00 and time to wake my sister Latoya, she’s in middle school and does not experience the rush that my brother and I go thru being that the two of us share a room and sometimes wrestle to get around to what we need to be done. The time is now 7:10, and it’s time for us to leave the house headed for school since we live only a quarter of a mile away from the school we can pretty much toss a couple of rocks a few times and we’re there. The only downside is that sometimes we get too complacent living so close to the school that we end up thinking there’s more time and end up cutting it close to getting to class on time or worse being late and end up with detention. As we get to school they are still selling breakfast its usually something simple like garlic cheesy bread or the cinnamon sugar rolls that are so delicious. But we cannot stand in line and enjoy them today because the first school bell rings and that signifies things need to get closed out and you need to put your thinking caps on. As we exited the cafeteria it was 7:25 and the start of the school day and the final bell rings at 1:50. Joel and I always knew that we would see each other at our lunch period odd as it seems I was a senior and he was a sophomore, but hey, that’s how the schedules came out. We couldn’t control the outcomes of what we wanted to do we could always find some sort of time to throw a wise crack at one another.

Thursday, November 14, 2019

Uncertain Reconciliation between Indigenous and Non-Indigenous people o

Reconciliation between Aboriginal People and Non-Aboriginal people to some extent is important towards Australia’s future. Given the past injustices involving land rights, the stolen generation and Government Policies, it illustrates that Australia has some way to go ahead of the full reconciliation between Indigenous and Non-Indigenous Australians and that without reconciliation our future is uncertain. The Aboriginals were denied their land rights when European settlement occurred in Australia. As the Aboriginals were nomadic, the land that they lived on and moved around on soon became occupied by the Europeans. This disenabled the Aboriginals to sustain their ceremonial and cultural links with the land. Efforts to win Indigenous land back involved government policies and court acts. In 1976 Gough Whitlam introduced a Land Rights Act which made governments more aware of the issues of Aboriginal Cultural Land. With the aid of this policy Eddie Mabo was able to lead a case that was known as the Native Title. This was one of the most famous cases, the Mabo v Commonwealth, and it wa...

Tuesday, November 12, 2019

Van Gogh Starry Night

Starry, Starry Night â€Å"Starry, starry night, paint your palette blue and grey, look out on a summer's day, with eyes that know the darkness in my soul. † (Don MacLean) I chose to write about the painting, The Starry Night by Dutch artist Vincent van Gogh. Van Gogh painted the view outside his sanitarium room window located in southern France at night. But Van Gogh painted it from memory during the day. I feel that this painting has Asymmetrical Balance. From our handouts – â€Å"In this case balance is achieved with dissimilar objects that have equal visual weight or equal eye attraction. The Starry Night is a picture of the night sky with stars and trees and the moon. We read that Nature is not symmetrical. Even the stars are different sizes and give off different light. â€Å"Shape and Texture also attracts our attention and is used in Asymmetrical Balance. † The Rhythm of this painting appears to be Legato Rhythm. The handout says â€Å"some rhythms are called legato, meaning connecting and slowing. This work gives a feeling of relaxing and calm. † The stars make up most of the painting – they are different in brightness, along with the moon.When we look at the stars, they are all yellow and round, vary in size and placement, and they have halo like light encircling them. â€Å"Sketch the trees and the daffodils, Catch the breeze and the winter chills. † (DL) The breeze and the winter chills give off a Legato rhythm flowing with the swirling wind and the round brush strokes throughout the painting. The Lines in this painting show movement in the sky as well as distance. The cypress tree in front is a thicker stroke as to the trees and bushes in the background.The lines that make up the buildings get thinner as your eye looks further and deeper into the painting. The vertical lines such as the green cypress tree and church tower softly break up the composition, but keep your eyes moving around them. Van Gogh used â€Å"dot-to-dot† lines to depict the wind movement and accentuate the light the stars and moon were giving off. I read that Van Gogh was concerned with the unity of his paintings. In Starry Night, the swirling brush strokes and use of cool colors seems to unify the pieces of the painting and create the feeling that everything belongs together.Van Gogh used a painting technique called impasto. This is a thick application of paint that makes no attempt to look smooth. This technique is textured, and shows off brush and palette knife marks. â€Å"Colors changing hue, morning fields of amber grain,† as much as I don’t want to disagree with Don McLean, but a color cannot change a hue, it is in fact the other way around. Van Gogh chose vibrant hues such as violet, blue, yellow, and green. Since the painting is bright stars and moons in the dead of the night, shows how he used the Value of the colors.He also used white and yellow to create a spiral effect and draws a ttention to the sky. The Tint was this use of white around the stars to make them appear to light up the town even in the dark of night where he uses Shade to darken the rest of the sky. The buildings in the middle of the painting are small blocks of different yellows, oranges, and greens with a dash of red to the left of the church. The dominant color of blue is balanced by the orange of the night sky. He used intensity to make the stars light up the dark blue sky.Van Gogh chose to paint with an analogous color scheme, meaning he stayed close to a certain color, blue in this case, on the color wheel, and ventured left and right to the violets and greens. He painted with rich colors of the night and uses these colors to suggest feeling and emotion. Emotion that he truly had which Don McLean let the world know with his chorus in his song, Vincent. â€Å"For they could not love you, but still your love was true. And when no hope was left in sight, on that starry, starry night. You to ok your life as lovers often do. But I could have told you, Vincent, this world was never meant for one as beautiful as you. †

Sunday, November 10, 2019

Personal or Narrative Essay: My Environmental Practices Essay

Now it’s your turn to write a personal or narrative essay. For this kind of personal writing, you are using the first person perspective. Keep your writing informal. You can make connections to your readings, referring to specific relevant details from the â€Å"Ten Things† article, or anything else you have read on how to reduce your negative impact on the environment. In your composition, feel free to share how you feel now about your own environmental practices, any insights you have gained, and ideas you have for the future. Write a five paragraph personal essay or narrative about the connection between your lifestyle choices and how they impact the broader environment. There are three steps to this assignment: Step A: In the first hour after waking up in the morning, make note of everything you use, and the country where it was made. Makes notes also on your connection to these places, and the people in these places, through the things you use. Step B: Make notes on what your best environmental practice might look like, related to the use of these items. In your opinion, is what you are doing right now enough? How might you do more? What is stopping you? For ideas on what else you could be doing to improve your own environmental practices, refer to your answers from Lesson A: Activity 1: â€Å"Ten Things You Can Do. † Step C: Choose to write either a personal essay, or a narrative. Note that personal essays almost always involve some form of narrative, while narrative essays, often written in first person, tell a story from beginning to end; though this does not mean they merely entertain—they explain something to the reader as well. Recall the following characteristics of the narrative and personal essay: Narrative Essay: A narrative essay is a story that describes a sequence of events, in this case, nonfiction. Remember the following elements of narrative essays: makes a point, introduced in the first paragraph has a beginning, middle, and end events are chosen to support the essay’s point includes the devices of story: plot, character, setting, climax, and ending has a consistent point of view (the authors’ –i. e. yours! ) includes feelings about events starts as close to the inciting incident (the event that begins the story) as possible includes only what is necessary to advance the action Personal Essay: The personal essay constitutes a struggle for emotional and intellectual honesty. In writing a personal essay, you show a vulnerability and the courage to admit self-contradictions in the search for truth. Remember the following elements of the personal essay: almost always written in first person makes a point, introduced in the first paragraph, expressed in a thesis statement almost always some autobiographical content or component constructed of personal opinions, hopes, beliefs, doubts, confusions intimate, personal tone—admit the reader into your inner thoughts, musings—as if your reader is â€Å"eavesdropping on a mind in solitude† voice is conversational in style and tone, as though you are addressing a small audience approach is contemplative, but can be humourous, not of very strong emotions, such as rage or bitterness returns to the point in the concluding paragraph with a new perspective Personal/Narrative Essay Checklist: 1. Have you chosen a topic you can be sincere about? Manufactured sincerity doesn’t fly in a personal essay or first person narrative. 2. Have you included some autobiographical component? 3. Are you seeking out a truth in your essay? 4. Do you contemplate more than one answer? This is useful in a personal essay. 5. Did you write in the first person, with a conversational tone? 6. Is your essay of sufficient length to pursue your question? For the purposes of this assignment, you need to include: an introductory paragraph

Thursday, November 7, 2019

cyber laws essays

cyber laws essays The concept idea of cyber terrorism has always been a great treat for computer technology since the first computer was invented in the late fifties; and grown up with the technology that has developed extremely. The use of the computers within the business and government sector have rapidly increased; this therefore provides a whole new prospect for a distinctive criminal to prosper in most cases. The advances in the computer technology has brought a new methodology in crime. Electronic crime has been responsible for some of the most financially devastating victimizations in society. In the recent past, society has seen different kinds of unauthorized access into classified government computer files, phone card and credit card, and electronic emails. All these crimes are committed in the name of "free speech." These new breed of criminals claim that information should not be suppressed or protected and the information should be freed. They think that the crimes they commit are really not crimes at all. Noone can deny that the internet is the most useful tool for computer abusing. There are many forms of computer abuse and yet they have not come to any solution. Computer crime appears in a number of forms; malicious damage, unlawful trespass and use (theft of computer time), theft of information, unauthorised information, imposturing by computer and pirating computer software, hacking and creating viruses to destroy information systems and hard drives, child pornography, cyber porn, theft of software and copyrights. The computer systems are under attack from a multitude of sources. These varies from viruses and worms, to human threats, such as hackers. These attacks target different characteristics of a system. Viruses and worms attack a system in one of two ways, either internally or externally that both share the primary objective of replication. However, they are different according to techniques they use and their system r...

Tuesday, November 5, 2019

List of Government Shutdowns

List of Government Shutdowns In United States politics, â€Å"government shutdowns† occur whenever Congress fails to pass or the President of the United States refuses to sign or vetoes legislation funding the operation of some or all government agencies. Under the Antideficiency Act of 1982, the federal government must â€Å"shutdown† the affected agencies by both furloughing non-essential personnel and curtailing agency activities and services that do not directly relate to national security. Key Takeaways Government shutdowns happen when legislation to allocate money needed for the operation of the government agencies fails to be enacted.By law, most government agencies must furlough their non-essential personnel and stop or limit their activities during a government shutdown.While few last very long, all government shutdowns result in increased costs of government and inconvenience for many citizens.   While most government shutdowns are of relatively short duration, they all result in the disruption to government services and increased costs to the government- and thus taxpayers- due to lost labor. According to the financial rating agency Standard Poors, the 16-day shutdown from October 1, to October 17, 2013, had â€Å"taken $24 billion out of the economy,† and â€Å"shaved at least 0.6 percent off annualized fourth-quarter 2013 GDP growth.† The many  government shutdowns have done little to help Congress abysmal approval ratings. There were six shutdowns ranging from eight to 17 days in the late 1970s, but the duration of government shutdowns shrank dramatically beginning in the 1980s. And then there was the government shutdown in late 1995; that lasted three weeks and sent nearly 300,000 government workers home without paychecks. The gridlock came during President Bill Clintons administration. The dispute between the Democrats and the Republicans was over disparate economic forecasts and whether the Clinton White House budget would result in a deficit or not.   Weaponized Shutdowns Occasionally, both Congress and presidents use government shutdowns as a way of accomplishing political goals not directly related to larger budgetary concerns like reducing the national debt or deficit. For example, in 2013, the Republican majority in the House of Representatives forced a lengthy shutdown in an unsuccessful attempt to get Democratic President Barack Obama to repeal the Affordable Care Act. The Border Wall Shutdown of 2019 The third shutdown during the Donald Trump presidency began at midnight on December 22, 2018, when funding for nearly a quarter of the federal government ran out. The shutdown was triggered when Congress and President Trump were unable to agree on the inclusion in the spending bill of some $5.7 billion requested by President Trump for the construction of an additional section of immigration security wall or fencing along the U.S. border with Mexico. According to the White House’s Office of Management and Budget, the $5.7 billion requested by President Trump would allow for the addition of about 234 miles of steel fencing to 580 miles already in place, leaving about 1,140 miles of the 1,954-mile long border still not fenced. In a televised address to the nation on January 8, 2019, President Trump warned that unless Congress agreed to include the funding, he would declare a national emergency allowing him to bypass Congress by diverting existing funds intended for other purposes to build the wall. However, after a meeting between Trump and House and Senate Democratic leaders on January 9 failed to reach a compromise, the shutdown continued. At midnight on Saturday, January 12, 2019, the 22-day-long shutdown became the longest in U.S. history. An estimated 800,000 federal employees- including Border Patrol officers, TSA agents, and air traffic controllers- were either working without pay or had been sent home on unpaid furlough. Though Congress had passed a bill on January 11 ensuring that unpaid employees would receive full back pay after the shutdown ended, that end remained nowhere in sight. On January 19, the 29th day of the shutdown, President Trump offered Democrats a deal to end it. In return for congressional approval of a $7 billion border security package, including $5.7 billion for the border wall, the president offered to extend for three years the DACA- Deferred Action for Childhood Arrivals policy. DACA is an expired Obama-era policy allowing eligible persons who entered the United States illegally as children to receive a renewable two-year period of deferred action from deportation and become eligible for a work permit in the U.S.   Democrats quickly rejected the proposal, arguing that it did not offer a permanent renewal of the DACA program and still included funding for the border wall. Democrats again refused to further talks until President Trump ended the government shutdown. By January 24, the then 34-day-long partial government was costing U.S. taxpayers more than $86 million a day in back pay promised to more than 800,000 furloughed workers, according to Government Executive magazine, based on salary data from the U.S. Office of Personnel Management (OPM). Agreement Temporarily Reopens Government In at least a temporary solution, President Trump, on January 25, announced that he had struck a deal with Democratic leaders in Congress to allow the government to reopen until February 15 without including funding for the construction of any additional border barrier. Negotiations of border wall funding were to continue during the three-week period. The President stressed that a border wall remained a necessity for national security and that if Congress did not agree to fund it by the February 15 deadline, he either reinstate the government shutdown or declare a national emergency allowing existing funds to be used for the purpose. Shutdown Averted, but National Emergency Declared On February 15, 2019, President Trump signed a compromise Homeland Security spending bill averting another shutdown However, the bill provided only $1.375 billion for 55 miles of new border fencing, far short of the $5.7 billion he had requested for 234 miles of new solid steel walls. At the same time, the president declared a national emergency redirecting $3.5 billion from the Defense Department’s military construction budget to the construction of new border wall, and signed executive orders redirecting $600 million from the Treasury Departments drug forfeiture fund, and $2.5 billion from the Defense Department’s drug interdiction program for the same purpose.   A Fourth Trump Wall Shutdown Loomed On March 11, 2019, President Trump sent Congress a $4.7 trillion spending proposal for the government’s 2020 budget that included another $8.6 billion for U.S.-Mexico border wall construction. Bringing the threat of a fourth government shutdown of the Trump presidency, Democratic lawmakers immediately vowed to block further border wall funding. In a joint statement, Speaker of the House Nancy Pelosi and Senate Minority Leader Chuck Schumer reminded the president of the â€Å"widespread chaos† that had â€Å"hurt millions of Americans† during the 34-day border wall shutdown from December 22, 2018, to January 24, 2019. â€Å"The same thing will repeat itself if he tries this again. We hope he learned his lesson,† wrote Pelosi and Schumer. By law, Congress had until October 1, 2019, to approve the 2020 budget.   More  Recent Major Government Shutdowns The most recent government major shutdowns before 2018 came in the 1996 fiscal year, during the Clinton administration. The first government shutdown of the Clinton administration lasted five full days from Nov. 13 through Nov. 19, 1995, according to the Congressional Research Service. Some 800,000 federal workers were furloughed during that shutdown.The second government shutdown was the longest government shutdown lasted 21 full days from Dec. 15, 1995, to Jan. 6, 1996. Some 284,000 government workers were furloughed and another 475,000 worked without pay, according to the Congressional Research Service. List of All Government Shutdowns and their Duration This list of government shutdowns in the past was drawn from Congressional Research Service reports: 2018-2019 (President Donald Trump): December 22, 2018 to January 25, 2019 - 34 days2018 (President Donald Trump): January 20 to January 23 - 3 days2018 (President Donald Trump): February 9 – 1 day.2013 (President Barack Obama): October 1 to  October. 17 - 16 days1995-1996 (President Bill Clinton): December 16, 1995, to January 6, 1996, - 21 days1995 (President Bill Clinton): Nov. 14 to 19 - 5 days1990 (President George H.W. Bush): October 5 to 9 - 3 days1987 (President Ronald Reagan): December 18 to December 20 - 1 day1986 (President Ronald Reagan): October 16 to October 18 - 1 day1984 (President Ronald Reagan): October 3 to October 5 - 1 day1984 (President Ronald Reagan): September 30 to October 3 - 2 days1983 (President Ronald Reagan): November 10 to November 14 - 3 days1982 (President Ronald Reagan): December 17 to December 21 - 3 days1982 (President Ronald Reagan): September 30 to October 2 - 1 day1981 (President Ronald Reagan): November 20 to November 23 - 2 days1979 (P resident Jimmy Carter): September 30 to October 12 - 11 days 1978 (President Jimmy Carter): September 30 to October 18 18 days1977 (President Jimmy Carter): November 30 to December 9 - 8 days1977 (President Jimmy Carter): October 31 to November 9 - 8 days1977 (President Jimmy Carter): September 30 to October 13 - 12 days1976 (President Gerald Ford): September 30 to October 11 - 10 days Updated by Robert Longley

Sunday, November 3, 2019

Rights and Freedom Essay Example | Topics and Well Written Essays - 750 words

Rights and Freedom - Essay Example The Bill of Rights guarantees the privacy of citizens and grants them the right to a fair judicial trial process. There are two procedures of amending the US constitution is not fair since it entails a lot of lobbying and scrutiny all the States and houses of the legislature. Rights and freedom Introduction The First Amendment of the US constitution prohibits the Congress from making any law that may prohibit the right and freedom of worship, the right and freedom of peaceful assembly, the freedom of petition, the freedom of the press and the freedom of speech. The First Amendment is an important aspect of US constitution since protestors could be silenced by the federal government and press could not criticize the government without fear of reprisal. In addition, the citizens could have been constrained in petitioning the government in agitation of social change through peaceful assembly. Without the First Amendment, religious minority groups could be prosecuted since the government could have the powers to establish a state religion. Personally, I believe that the freedom of speech is the most important freedom that is guaranteed by the First Amendment of the US constitution. The freedom of speech includes both words and symbolic speech that is safeguarded by the 1st Amendment. The freedom of speech is a freedom of expression that allows citizens to express themselves without any government interference. The US Supreme Court requires the government to make substantive explanation and justification in all attempts that aim at regulating the contents of the speech. Although the freedom of speech is guaranteed, this excludes any speech that is aimed at causing violence or propagating illegal activities. I have realized that the level of protection that the speech will attract will depend on the forum in which the speech takes place. Some types of speeches are either unprotected or less protected and include commercial speech, advocacy of illegal activities, figh ting words, and obscenity. In the case of Meyer v. Grant, 486 U.S 414, 108S. Ct. 1886, the Supreme court clarified that political speech entails any interactive communication that concerns political change while Buckley V. Valeo, 424 U.S 1, 96 1976, asserted that circulating petitions, placards, making speeches and orations was a safeguarded political speech. Speeches that incite illegal activities are prohibited if they aim at directly inciting or producing lawless action. However, the government can not punish anti-war protestors who oppose the government actions through speech. Fighting words such as derogatory messages receive lower protection while obscenity and pornographic speech is controlled by the government. The First Amendment also safeguards some symbolic expressions which are likely to be understood by the audience unless the symbolic expression is against societal interests. Advertising speech is also safeguarded than fighting words due to consumers’ need of ma rket information. However, political speech is granted the utmost protection by the constitution. The Bill of Rights and subsequent notable amendments to U.S constitution democracy are of significant importance. The Bill of Rights consists of first 10 amendments of US constitutions and safeguards the freedom of religion, and freedom of expres

Friday, November 1, 2019

Corporate Governance Research Paper Example | Topics and Well Written Essays - 2250 words

Corporate Governance - Research Paper Example Introduction The term corporate governance is employed to refer to the systems through which companies are controlled and directed. This is through the involvement of the market and regulatory mechanisms. It also encompasses the relationship that exists between the board, the management of the organization, stakeholders and shareholders that are involved with the organization. Corporate governance also involves the goals through which the company is governed (Jo & Harjoto, 2012, 58). One of the key interests of corporate governance includes the mitigation of conflicts that may arise among the stakeholders in the company. This involves ensuring that there is no disagreement in the agenda of the stakeholders in regards to policies, processes, laws, customs and institutions that have influence over how the company is managed. Corporate governance has been necessitated in recent times, with the wake of a number of high profile company collapses, with the principal cause being attributed to accounting fraud. This, therefore, made it necessary for corporate to come up with to avoid such occurrences. Principles of Corporate governance For corporate governance to be effectual, some principles were agreed upon as a framework for the practice. One of the principles is in regards to the treatment of shareholders. Corporate realized that how they treat their shareholders has a significant impact on their operations. Therefore, it is imperative for organizations to respect the shareholders liberties and assist them in employing those liberties (Norwani, Mohamad & Chek 2011, 210). This can be achieved by encouraging the shareholders to be proactive in the general summits, and through the establishment of a communication that is open and effective. Another principle includes organizations ensuring that the other stakeholders’ interests are addressed. This is because; it is the obligation of the corporate to ensure that the interests of these parties are addressed. Stak eholders may include employees, investors, the community, creditors, customers, suppliers and policy makers. Among the principles, the board’s roles and responsibilities are also stipulated (Johnson, Moorman & Sorescu, 2009, 4755). The board has a critical function, which requires them to have sufficient skills that are essential in addressing challenges that may affect the corporate in its operations. Corporate governance ensures that the board is aware of their mandate. The board needs to be autonomous, committed and of an adequate size, to handle its mandate capably. It is crucial for the corporate management of an institution to be triumphant; there ought to be transparency in the Corporation. This is through the making public of the mandate of the board and the general management. This disclosure will ensure that there is accountability on the part of management, and the board to the stakeholders of the Corporation. I this case, procedures should be implemented to ensure the corporation safeguards the veracity in its finance reporting. It is also fundamental to make certain that there is an accurate and timely disclosure, to give the stakeholders a vivid representation of information regarding the corporate. These principles were formulated to ensure that

Wednesday, October 30, 2019

Multilingual learners in Primary classrooms Essay

Multilingual learners in Primary classrooms - Essay Example The result is one which creates a disadvantage to students that are bilingual and in a specific environmental setting. Analyzing the policies, practices and educational needs of students that are in a bilingual setting helps to establish a stronger relationship to what it takes to work within this setting. Observations of the Bilingual Classroom The first concept approached is one which comes from observations of the classroom and the way in which students interact in a bilingual setting. When observing the classroom, I found that there were welcome signs and procedures used to guide students. These were in different languages, which showed a specific level of assistance and ability to embrace diversity. The signs extended to different learning materials, such as body parts and days of the week, all which were established in different languages. The next representation was of the teachers and staff. There was no background languages of staff employed outside of English. The first lan guage was used all of the time in all instances. It was also noted that there were not books in other languages, with the expectation that students should be able to read in English. To try to keep with the diversity of the classroom, students were placed in groups named by planets, all which were based on the evaluation of learning. This allowed students who did not speak English as a first language to have he ability to work at their own pace. This shows that there is an embracing of diversity and culture in the classroom. However, the teacher competence and ability to meet the needs is one that is currently not being met. Policies for Bilingual Children The diversity in classrooms follows with policies which are expected for bilingual children. The policies that have been used for the education of bilingual children are based on the observations created through meeting standards and statistics which have been observed within this. Through a recent analysis, it was noted that bili ngual children who had already advanced in the language had stronger results and improvements than other children. More important, schools which were advancing into higher numbers in terms of performance were able to meet more of the needs of bilingual children while creating mainstream results within the needs for students. The study conducted by the Department of Education also indicated that the gap with bilingual students came from the ability for teachers to have a sense of confidence and expertise with the students. This particular aspect would begin to close the gaps of learning while creating more possibilities with the learning initiatives for bilingual learners. Similar to observations in the classroom, this shows that the gap is with teacher diversity, lack of learning materials and substitute materials that lead to the learning gaps (Department of Education, 2007). The creation under the Primary National Strategy in 2004 has tried to alter the gaps with policies and prog rams which are required by region. The strategies have combined with finding different ways to work with teachers while offering new programs for students who are bilingual to learn the needed materials. The policies are based on strategically finding new solutions that don’t allow children to be left behind within the school system while setting standards and requirements for children of diverse backgrounds to have the same achievements. The concept used is based on

Sunday, October 27, 2019

Side Effects of Chemical Based Beauty Products

Side Effects of Chemical Based Beauty Products A growing concern over side effects of chemical-based products for enhancing ones’ beauty has resulted in the consumers’ shift to ayurvedic beauty products. Many companies have entered the beauty segment with branded products in categories such as skin care, hair care, soaps and essential oils. India is capturing the mainstream cosmetics industry and capitalizing on Ayurveda. Itincludes various high end brands creating makeup shades (based on the country’s bright colors) to skin- and hair-care segments. Indian herbs and Ayurveda products are being sourced and tested for use in the cosmetics industry and beauty parlours. Ayurvedic natural cosmetics business of India is growing at the rate of 15-20% per year- much higher than India’s overall cosmetics business that has a growth rate of 7-8%. Yoga is a mind and body practice with historical origins in ancient Indian philosophy. Various styles of yoga typically combine physical postures, breathing techniques, and meditation or relaxation.Practicing yoga might improve quality of life; reduce stress and hence improve overall physical fitness and appearance. Naturopathy includes a range of therapies based on exposure to natural elements such as sunshine, fresh air, heat, or cold, nutrition. The treatment modalities include nutrition and dietary changes (eating more whole and unprocessed foods) and use of vitamins, minerals, dietary supplements, herbal medicines. Hydrotherapy, physical medicine (therapeutic massage and joint manipulation), exercise therapy and lifestyle counseling are other aspects of naturopathy Unani and Sidha are traditional Indian medicinal systems and chiefly use herbal remedies, dietary and lifestyle modifications. There are few indexed studies demonstrating efficacy of polyherbal Unani formulations in acne vulgaris. Homeopathy was developed by Samuel Hahnemann, a German physician. It is based on the law of similars and the law of infinitesimals. The first doctrine is simili similibus curenti that is the symptoms caused by a drug in healthy person, will cure similar symptoms. The second doctrine is that the appropriate drug has to be given in high dilutions, and that the higher the dilution, the greater the effect; and is termed as potentiation. Modern physics and chemistry have shown that some of the dilutions used in homeopathy may be so high that no molecule of the original substance will remain in the preparation. However, the â€Å"essence† of the original substance is considered to remain in the preparation and a â€Å"memory of water† has been postulated. Homeopathic remedies include substances derived from plants, minerals, or animals. Examples are red onion, arnica (mountain herb), crushed whole bees, white arsenic, poison ivy, belladonna and stinging nettle. The remedies are formulated as sugar pellets to be placed under the tongue; other forms, such as ointments, gels, drops, creams, and tablets are also available. Homeopaths generally begin with detailed examinations of their patients histories, including questions regarding their physical, mental and emotional states, their life circumstances and any physical or emotional illnesses. The homeopath then attempts to translate this information into a complex formula of mental and physical symptoms, including likes, dislikes, innate predispositions and even body type. There is no specific drug for disease as in case of modern medicine but collective understanding of patient’s symptom complex and the selection of drug from material medica. There are various â€Å"miASMS’ envisaged and understanding them and, the defect in constitution ultimately leads to the selection of remedy. Themiasms are as follows Psoric, sycotic, syphilitic and tubercular. The homeopathy practitioner chooses how to treat the patient based on the inner physical and mental stress, personality, the symptoms, miasms, individual constitution, personal and family hi story. Homeopathy is being used in various dermatological diseases including infections such as warts, abscesses; chronic conditions such as acne, psoriasis, rosacea, various forms of eczema, etc. Though homeopathy claims to be beneficial in a variety of chronic cutaneous diseases, a review of various trials of homeopathic treatment did not find evidence for any single dermatological condition. The outcome of a therapeutic measure may be due to a placebo effect, the medical intervention or by the natural course of the disease resulting in recovery by the patient. In cosmetic dermatology, homeopathy attempts to alter the patients’ mindset towards changes in beauty and appearance and its perception. In any disfigurement perceived, the cosmetic enhancement needed will be balanced by homeopathic principle of correcting mental and physical disturbances and correcting the miasms which are responsible for various cosmetic problems such as pigmentation, acne, aging, hair loss or exce ss body hair. Homeopathy may be considered as an effective method of communication and counseling for various chronic diseases. Traditional Chinese medicine practitioners use herbal medicines and various mind and body practices (tai chi and qi gong), and acupuncture. The fundamental treatment techniques in acupuncture are either needling, heat, moxibustion, suction or cupping, and pressure (acupressure). Acupuncture techniques have been used in various dermatological conditions including acne and melasma. Its use in cosmetology is now gaining popularity.Facial cosmetic acupuncture is applied to the head, face, and neck and showed improvement in facial elasticity in a pilot study. Aromatherapy is a subset of the  biological  or nature-based  therapies. It consists of therapeutic use of volatile, aromatic essential oils extracted from plants. It has similarities to other forms of herbal medicines; the major difference between them is that, in the former, essential oils are extra cted from parts of the plant, whereas the whole plant is used in herbal medicines. Aromatic forms of medicine have been used traditionally for spiritual, medicinal, social, and beauty purposes. The effects of aromatherapy are believed to result from the binding of chemical components in the essential oil to receptors in the olfactory bulb, impacting the brain’s emotional center, the limbic system. Topical application of aromatic oils may exert antibacterial, anti-inflammatory, and analgesic effects. The essential oils are usually diluted in carrier oils. The essential oils may be extracted from different part of plants such as the leaves (eucalyptus, peppermint), flowers (lavender, rose), twigs (juniper), wood (sandalwood), roots (vetivert, calamus), sap (benzoin, frankincense), and grasses (palmarosa grass, lemongrass). The major chemical components of essential oils include terpenes, esters, aldehydes, ketones, alcohols, phenols, and oxides. Oils high in ketones are known for their wound-healing properties, such as Helichrysmitalicum (everlasting flower) whereas oils high in alcohols are renowned for their antimicrobial and anti-infectious properties (e.g., Melaleucaalternifolia terpinen-4-ol, tea tree). Two lavenders, Lavandula angustifoliaand Lavandula latifolia are high in alcohols, terpenes, and oxides and are noted for their effects in the rapid healing of burns, without scarring or infections. The carrier oils, such as avocado oil, wheat germ oil, sweet almond oil, evening primrose oil, and coconut oil, also have some pharmac ologic activities. The oils may be applied externally in the following ways: therapeutic massage, mixed with a plain vegetable oil, via a compress , as a topical wound dressing, mixed in a gel or paste , as a spray , in a bath , or as an inhalation therapy. Essential oil may be ingredient of gargles and mouthwashes. The internal use of essential oils is very rare. The cosmetic and perfume industry are the largest users of essential oils. Although high-quality evidence of effectiveness and safety for aromatherapy in the cosmetic dermatology field is lacking, few studies are now being reported. Plant-derived essential oils may be a biologically plausible treatment for acne and is being researched. Lavender aromatherapy’s potential to ease anxiety in patients undergoing minimally invasive facial cosmetic procedures has been demonstrated. Positive biologic effect on hair loss and hair regrowth of a pulsed electromagnetic field in combination with essential oils in cases of androg enic alopecia has been demonstrated. Skin appearance affects the self-image via the central nervous system, whereas autonomic, psychoneuro-immunologic, and behavioral factors interact to affect the skin appearance. Psychological counseling and various techniques such as meditation, relaxation, hypnosis, biofeedback and other methods of stress management benefit cosmetic problems such as hair loss, rosacea, aging signs and acne. These techniques also help to reduce anxiety, needle phobia, and pain during various cosmetic and dermatosurgical procedures. The medical spa concept is new and gradually capturing the beauty and wellness market in India. In a medical or dermatology spa (spa environment within a cosmetic set up), the clients avail of treatments and services which have medicinal value and long lasting aesthetic benefits. It can be considered as a blend of medical and aesthetic services offered at a one stop shopping environment. CAM practices such as nutrition/ dietary supplem ents, massage therapy, aromatherapy are employed for skin rejuvenation and integrated within a cosmetic dermatology set up. Though CAM methods are considered safe and free from side- effects, these can cause adverse reactions. As there are no molecular targets available for most of the traditional medicine, it is difficult to assure their safety. The alternate or traditional medicines may contain heavy metals, toxins, allergens which can cause damage to the skin and/or internal organs.Oral herbal medications may be adulterated with steroids, heavy metals, nonsteroidal anti-inflammatory drugs, antihistamines, diuretics, etc. Chinese herbal creams may be adulterated with corticosteroids. Allergic contact dermatitis and photosensitization are common. Both type I and Type IV hypersensitivity reactions have been documented with Ayurvedic oil (Dhanwantaratailam) application. Hepatotoxicity may be seen with commonly used herbal products, such as Ayurvedic and Chinese herbs, green tea, etc. There is a high use of CAM among cosmetic surgery patients along with increasing reports of hematomas associated with herbal and homeopathic medicines. The most common adverse effects with homeopathy were allergic reactions and intoxications. Heavy metals such as arsenic, cadmium, mercury and iron which are used in homeopathy can be toxic. Rhus toxidendron was a frequent cause of adverse reactions. Essential oils used in aromatherapy may be toxic if used inappropriately in the hands of unqualified personnel. Potential hazards from essential oils exist due to their chemical constituents. High proportions of aldehydes and phenols can cause irritant dermatitis; ketones can cause neurotoxicity; potentially carcinogenic components include safrole in sas safras oil or beta-asarone in calamus oil. Phototoxicity, allergic contact dermatitis and airborne contact dermatitis have been reported with aromatherapy. Adulteration in oils can cause dermocaustic reactions, neurotoxicity or have an abortive potential. In the field of CAM, it is difficult for science to catch up to practice due to the lack of funding for appropriate studies. In contrast, it also becomes difficult for practice to catch up to science as new information is discovered. It is also difficult to conduct randomized control trials to demonstrate the efficacy since most CAM therapies are individualized. However, qualitative research is gaining momentum in the field of CAM. The scientific evidence for a CAM product or practice (with respect to safety and efficacy) can be accessed by the literature reviews published in last 5 years in the form of systematic reviews or meta-analysis or randomized controlled trials; and has been made accessible by NCCAM. The Department of Heal th Research, Government of India has also developed a policy for studies on Ayurveda and other traditional medicines. CAM methods are commonly used in our population. Herbal medicines and natural products are an integral part of CAM and the use of botanicals, nutraceuticals and cosmeceuticals are an integral part of cosmetic dermatology practice. Thus a cosmetic dermatologist can be inclined to incorporate CAM in clinical practice to address the patient care needs. However, he/she should have a proper knowledge and experience with specific CAM treatments. In addition, further research into the efficacy, benefits, and risks of CAM methods should be undertaken for a better insight. CAM methods are popular and are commonly used by aesthetic patients to enhance their skin health, beauty and youth. Hence a cosmetic dermatologist needs to be aware of the various CAM practices.The major traditional Indian healthcare system includes AYUSH (Ayurveda, Yoga and Naturopathy, Unani, Siddha and H omoeopathy).

Friday, October 25, 2019

Steak and E- Love :: Journalism Journal Essays

â€Å"Steak and E- Love† I take the heels off my aching feet and remove my eyeliner; sometimes I wonder why I ever take this job. Even though I have a place in Manhattan Park Apartments with a great view of the city and of course my Persian cat, Delta, writing a weekly article for the NY Times can be trying and hectic, especially when you are writing on some pretty controversial stuff. I'm mean, I'm talking about everything from violence in the media to this week's "E- Love", about singles finding love through Websites online. My boss is a fast pace man with an eye for great articles, and those that are a product of me are no exception. I came to him last week with the idea of doing this story. I had already found three very different websites; each containing contrasting thoughts and ideas of what these sites should consist of. "Mr. Lance, I have an idea..." He was astounded, this was exciting because I'm really trying to move my way up the corporate latter and every little bit helps. Making the boss happy is at the top of my priority list. "Ms. Nash, I think that is a great idea, good work," he said with a relieving smile. I could feel my day perk up, I better start making some phone calls and get some good quotes. I walked out of his office with an undeniable glow. Then the suggestion came that shot down the cloud that I was riding on. "Hey Nash, one more thing, maybe you should have dinner with all of them at the same time, it should add some appeal to your article." Before I could even repl y, the door shut and that was that. So, where do you take three totally different people to dinner? Then it came to me. The Waldorf . Yes, dinner would be beautiful with a striking view of the city, and delectable food on the paper's tab. I made reservations for seven- thirty and made the phone calls to my prospective guests. Of course, all could come and so it was set. If the night turned out to be a total disaster, at least they would get a great meal at a world- renowned place.

Thursday, October 24, 2019

Consider carefully which of Bathsheba Essay

TASK: Consider carefully which of Bathsheba’s three suitors, Boldwood, Troy or Oak possessed the qualities most likely to make Bathsheba a good husband. In the book, ‘Far from the Madding Crowd’ by Thomas Hardy, there are three suitors for the novels protagonist, Bathsheba Everdene. Unfortunately because she is a very capricious lady, one suitor is murdered by another, who was consequently sentenced to life imprisonment. This essay will discuss which suitor would have been the most compatible to Bathsheba in marriage. In the novel, Bathsheba is the second character we are introduced to, and Thomas Hardy portrays her as a very beautiful but penniless woman. She is the protagonist of the novel, and her interaction with her various suitors propels the plot. As the story unfolds, her character is developed, but it is very clear in the beginning she is a very vain woman. This is firstly shown when Gabriel sees her sitting on top of a carriage full of furniture. It is obvious her beauty entrapped him and he, ‘followed the vehicle to the turnpike gate some way beyond the bottom of the hill, where the object of his contemplation now halted for the payment of the toll. ‘ Bathsheba’s vanity was evident where she refused to pay the turnpike keeper the extra two pence he wanted. Subsequently, Gabriel paid it and she was neither pleased nor dismissive because she had lost her point, she was just a little disgruntled. In addition to this, shortly after she is seen looking into her mirror, admiring herself. Further reference to Bathsheba’s vanity is later in the story when she has just inherited the farm and she throws all of her existing clothes away because she feels she has moved up a class, and her old ones were inferior. The last evidence of her vanity occurred after she had encountered Troy for the first time, when she was in front of her dressing table mirror and she repeated a sentence he had whispered to her, ‘Hello gorgeous’. Despite this flaw in her character, she showed independence in both financial and spirited terms. She was able to run the farm she had inherited by herself, and after finding her bailiff stealing grain, she fired him and took on that job as well. Furthermore, having moved up a social class didn’t seem to effect this self-reliance as she still travelled to Bath on her own not asking for a chauffeur to ride the cart for her, as most rich people would have because of their status. She wasn’t accompanied by anyone when she went out horse riding either. This shows both independence and that she likes to be alone sometimes, not in the eye of her employees. There are many other of her characteristics which are described in the novel, including bravery which is highlighted on three occasions: in the beginning of the novel where she saves Gabriel from gas poisoning in his hut; when she helps Gabriel to secure the hayricks in the storm and the way she dealt with the numerous disasters on her farm. One of those disasters was bought on by her impetuousness as she fired Gabriel because he rebukes her, saying ‘I cannot allow any man to – to criticize my private conduct!†¦ Nor will I for a minute. So you’ll leave the farm at the end of the week! ‘ From this it is obvious she is intolerant towards gossip and people’s views. Unfortunately, shortly after Oak leaves, a disaster happens, whereby the sheep all get a disease, which only Oak knows how to treat. Subsequently she has to swallow her pride to save her sheep. A further example of her impetuous character was a little later on in the novel, when she visited Bath and married Troy so that his attentions would only be focused on her, and not any other women. This also shows immaturity in her, not just the rash decision of marriage, but also the quick dismissal of Oak because she couldn’t take criticism. Contrary to this though, when Fanny went missing, she was responsible enough to send out a search party, so despite being volatile and distant from her workforce, she was still interested in their well being, even though she was an x-employee. No later than Troy goes missing, she turns to Boldwood who she had previously sent a valentine to, admittedly quite reluctantly, but she does, and this highlights the capriciousness and flirtatious side of her character. This isn’t a good thing for a relationship, especially in a vain woman like Bathsheba, who would be easily convinced to see other men, so a compatible partner for her would have to be stern with her, but in a loving manner. Therefore, the best suitor for Bathsheba needs to be able to cope with the characteristics I have highlighted above, being similar to some of her characteristics, and the opposite to others. The best person for her would be a handsome and romantic farmer who was financially secure. Mr Boldwood is the wealthiest of the three suitors whom Bathsheba could have chosen, owning a neighbouring farm. As his name suggests, he is quite a wooden man. By this I mean he doesn’t reveal his true emotions until he is sent the valentines letter on a whim when he suddenly develops feelings for her. From this point onwards, he loses his self-control and pursues her with a single-minded passion to make her his wife. Unfortunately, because his love becomes so all-compassing and single mindedness, it leads him to neglect his farm losing all of his crop one stormy night. He is also quite a personal and reserved man who, despite many women finding him attractive, lives a quiet life on his neighbouring farm. His high status in society is indicated on numerous occasions, but the most obvious occurrence was when Bathsheba invited Mr Boldwood over to join in the celebratory dinner after the successful harvest. At first Gabriel Oak, Bathsheba’s main shepherd was sitting at the head of the table, but when Mr Boldwood appeared a little later, Gabriel was asked to move from the head of the table so Mr Boldwood could be seated. It is obvious from the moment Mr Boldwood starts to develop feelings for Bathsheba that he is a caring man, always checking up on her, but it is later on in the story when Mr Boldwood’s chivalrous side is shown to its full extent. Bathsheba had been seeing Troy for a little while, and they were having relations outside of marriage, which for the novels time was not allowed. Therefore Mr Boldwood offered Troy money to marry her, in order for her name to be respected. This was obviously a very hard act to come to do, especially as he loved her so dearly. When Troy went missing, believed drowned, Bathsheba was in mourning for a little while, but because no body was found, she had to wait seven years before she could marry again. Mr Boldwood made his feelings clear to her again a little later, and she agreed upon marriage if Troy didn’t reappear after seven years had passed. This showed a very patient side of Boldwood, different to the very persistent side of him seen earlier in the book. Unfortunately, after seven years had passed, on the night Bathsheba had promised to accept Boldwood’s proposal, Troy burst into the party, insisting on regaining his half of her farm, which came with the marriage. At first Boldwood was deeply upset, but knew there was nothing he could do about it and accepted it, but Bathsheba refused to go at first, and Troy rough handled her. Boldwood, did not like, or accept this, especially because he was so protective and obsessed with her. A mixture of jealousy and over protectiveness then took hold of him, and he shot Troy, killing him almost instantly. Boldwood was then sentenced to death, but because of his high status, because he was a well-respected gentleman and finally because it was argued he was mentally unstable, the sentence was changed to life imprisonment. After the sentence was passed, his obsession with Bathsheba was revealed to its full extent, as items of clothing and jewellery were all found in Boldwood’s house, all gift wrapped and with a label saying ‘Bathsheba Boldwood’. Sergeant Troy is the second of Bathsheba’s possible suitors. Troy is the novels antagonist, and is the less responsible male equivalent of Bathsheba, and his description is the complete opposite of Gabriel Oak’s. His irresponsibility is shown on the night of the ‘after harvest celebratory meal’ when he decides to get drunk, knowing there is a storm which could destroy all the hayricks which they had just harvested. Unfortunately, because he was devastatingly attractive, had a dashing manner, continually flattered Bathsheba and was skilled in swordsmanship, she fell for him. This was mainly because of her vanity; he said what she wanted to hear. And furthermore, it was his vanity which made him say such things as, ‘Thank you for the sight of such a beautiful face’ and ‘Ah, beauty; good-bye! ‘ This first impression of Troy gives him the appearance of having some strength of character, such as helpfulness when he offers to help in the haymaking when he bumps into Bathsheba one night. Unfortunately, this strength in his character is quickly shown to be limited, for example, he initially gave the impression of being frank, letting his thoughts be heard, but this is quickly offset by his lies. Troy lied on numerous occasions, such as when Bathsheba saw a lock of golden hair in Troy’s pocket watch, when he said he went to church regularly through the back door, which when investigated by Gabriel was found to have not been opened for a very long time and thirdly when he said he didn’t know the tramp on the road. It was in fact Fanny Robin who he was engaged to, but neglected after they miscommunicated about which church they were due to have their marriage in. She was actually Troy’s true love and the lock of hair in his pocket watch belonged to her. Another act, which showed Troy’s character to be limited, was the way he acted and cruelly abused her after they were married. This really shows that Troy was quite capricious in a way because no later than Troy has left Fanny, he seduces Bathsheba. Troy was an unstable character, mainly because when his parents died when he was only small, he was sent off to be a soldier. This environment, which he grew up in, therefore influenced his character, and he became a mercenary, working only because he wanted to spend money at the races. Unfortunately, not being trustful, he left Fanny gambling debts, and he used a lot of Bathsheba’s money up as well. Another quality of Troy’s was his cunningness and deviousness. This is shown near the end when, after seven years of being missing, presumed dead, he returns, not for Bathsheba, but for the money which he was entitled to, namely half Bathsheba’s assets (farm and contents) which came with getting married. That was what triggered Boldwood to kill Troy in the end, the way he was only interested money, and the way he mishandled her. The third and final suitor was Gabriel Oak. He was in fact the first of the three men whom Bathsheba met in the novel when he generously paid the two pence toll for her because she felt she had already paid enough. The novel starts describing Gabriel; ‘When Farmer Oak smiled, the corners of his mouth spread till they were within an unimportant distance of his ears†¦ ‘ He isn’t the best looking of men, and is only a shepherd, but has a very strong, good character, which is developed throughout the novel. Being a shepherd, he has exceptional skill with animals, and is hardworking. He knows the trade so well that he can tell when it is going to be bad whether and acts accordingly. An example of this was when the storm came after the hayricks had been harvested and, knowing a storm was on its way, Oak tried to alert the others for help, but after realising they weren’t interested, he started tying them down on his own. This shows determination, responsibility and reliability. Whenever Bathsheba needed help, he would be there, even after he had been dismissed for criticizing her judgement, he forgave her and came back to save the sheep from a deadly disease. Another example of his responsibility was when Joseph Poorgrass stopped off at the Buck’s Head Inn for a drink, rather than taking Fanny’s coffin to the church. It was Gabriel who went to the inn and too the coffin to the church, and then on to Bathsheba’s house because Joseph had delayed them so much. When he saw Fanny’s coffin, he was generous in spirit, because he rubbed off ‘and baby’ after Fanny’s name because he wanted to spare Bathsheba’s feelings, especially as it was Troy’s baby. The reason Bathsheba said that she would not marry him when he asked was because he wasn’t that rich and he was unromantic, which is a characteristic in Oak which Bathsheba would have wanted from her husband. Shortly after, he unluckily lost all of his sheep, but instead of reverting to alcohol, or committing suicide, he put it behind him, paid off his debts with what he had left, and went to the market to look for a job. While this is all occurring, he is still steadfast, wanting to marry Bathsheba, and he is loyal, not going after any other women. Instead he just concentrates on his work, and is as hardworking as ever, in a sense he is quite boring because he doesn’t ease up on his work. Even when she marries Troy, he is thoughtful, sparing her feelings, as she is not aware of all the truth. His loyalty, whether standing up for Bathsheba when the workers gossip, or just by being there for her, is repaid later when Bathsheba finally gives him the job of Bailiff. It is mainly because of his organised nature, and because he has a very good knowledge of the farm. In conclusion, I have to answer the original question, ‘Consider carefully which of Bathsheba’s three suitors, Boldwood, Troy or Oak possessed the qualities most likely to make Bathsheba a good husband. ‘ After analysing each of their characters, I feel she would really be best off with a person who had parts of each of the suitors: Boldwood’s money and devotion, Troy’s handsome appearance and Gabriel’s knowledge of farming. Unfortunately this is impossible, therefore I have chosen Gabriel Oak as whom I feel would be the best suitor for Bathsheba Everdene. I think that despite Boldwood saying that she would never have to work again, she is a very independent woman, and I’m not sure she would appreciate that. Troy is like the male equivalent of Bathsheba, and I don’t think that she would last that long with him, as problems would arise. Furthermore, he mishandles her, and I think their marriage would be over very quickly. Gabriel is quite different to Bathsheba, and I think that he would be devoted to her, especially after analysing his character, but wouldn’t smother her, still giving her her independence. Furthermore, his knowledge of farming would be helpful on the farm. Marriages last if the couple can communicate, and come to a conclusion about situations, and I feel Boldwood would just do whatever she wanted to do, Troy would only do what he wanted to do, but Oak would do whatever was best and fair. Gabriel’s character is opposite to Bathsheba’s, but in this case I think the marriage would work really well.

Wednesday, October 23, 2019

Is the U.S. prepared for another terrorist attack? Essay

In the aftermath of the terrorist attacks of 9/11, securing the country has become a national priority. The events of 9/11 were the first attacks on the United States (U.S.) since Pearl Harbor which catapulted the U.S. into World War II. As of the writing of this paper, the U.S. has been engaged in the War on Terrorism for 13 years. During this period of time the U.S. has been kept free from terrorist attacks by changes to laws, technology, and investigative methods to combat terrorism internationally. Although there have been a number of changes to U.S. law and American citizens have been kept safe, the threat of terrorism has not abated. With the continued threat of terrorism to the U.S. and its citizens, there is a high probability that the U.S. will suffer another 9/11 type of event. The U.S. has shown its resolve in recovering from 9/11 and the many natural disasters that have occurred since and is preparing for incidents in the future. There is a plethora of information and stu dies conducted after 9/11 that, in great detail, informed us to the extent we failed to prevent the events of 9/11. Ironically, in the years after the creation of the Department of Homeland Security (DHS) many academics feel we are no safer now than we were prior to 9/11. In a historical context, the U.S. has been reactive in nature to every major catastrophe it has endured. The cycle of disaster events has repeated itself over and over throughout our history. The U.S. experiences a major response event, fails in the initial response and recovery efforts, endures congressional investigations, obtains funding to  fix the failures, execute the recovery effort, and return to a complacency mentality until another major event occurs. The purpose of this paper is to address the question of the U.S. readiness in the event there is another terrorist attack. I plan to focus on the aspect of preparation, reforms, and interagency coordination before and after the next terrorist attack. This paper will argue that the preparation for a terrorist attack is required; it’s not a question of how an attack is orchestrated. The question is the U.S. prepared for another terrorist attack and recovery? Literature Review In Perry’s (2001) analysis he explains the actions that the U.S. needs to take in preparation for the next attack. The articles’ publication is under the premise of a worst case scenario as it pertained to terrorism in 2001. The primary focus of the article was the U.S. preparation for any delivery method terrorist organizations could provide. There was a concern that terrorist organizations could/would buy nuclear weapon platforms from rogue Soviet BLOC nations. The only way these attacks could be thwarted was by the mix of three strategies: deterrence, prevention, and defense. The ability for the U.S. to use conventional forces to deter enemies needed to be maintained as well as the intelligence community with an aggressive campaign against nations that sponsor terrorism. In the article, The Next Attack, Flynn (2007) provides a framework in which terrorist organization detonates a bomb at an oil refinery, near Philadelphia’s Citizen Bank Park, that results in the release of a chemical cloud comprised of chemicals used in the refinery process. The cloud kills thousands over a ten day period as a result of breathing the fumes. In the aftermath of 9/11 the U.S. government concluded there was no way they could protect every essential asset and chose to specifically defend critical infrastructure networks. It was believed that terrorists would only attack large targets that they could get the biggest return on investment. Flynn took a very critical view of the U.S. government’s response to compiling a list of high value targets that needed protection, â€Å"It wasn’t rocket science to figure that out, and it took five years to complete.†Ã‚  Flynn further explained a need for manufacturing industries to utilize safer production methods known inherently as safer technology. The technology has a higher cost, but Flynn does an impressive cost comparison that the change-over could cost nationwide for around $250 million, which is what was being spent daily on the war in Iraq. In Interagency Coordination in Response to Terrorism: Promising Practices and Barriers Identified in Four Countries (Strom and Eyerman 2007) is an article that examines our nation’s ability to prepare, respond, and recover from terrorism hinging on multiagency coordination. The focal point of the article is the explanation of the problems that existed pre-9/11 and the progress law enforcement agencies and public health agencies have in coordination with each other across multiple jurisdictions and countries. The article explains in detail the coordination problems that occur when two or more agencies are involved in the same incident. There is a competition for command and control, funding, redundant system and processes across multiple agencies. Two primary problems that were noted were the inability for all agencies to achieve an interoperable communications system to aid in interagency cooperation. The second problem is barriers to communication ranging from coordination and cultural barriers and the lack of proactive information sharing among multiple agencies. The authors noted several changes that needed to occur in order to be successful. The primary focus falling on ceasing interagency competition for funding as this has created fraud, waste, and abuse across multiple U.S. agencies. The second focus was fostering a liaison model and incorporating public-private partnerships as individual companies have systematically been delegated the responsibility of protecting their own businesses. Methodology and Research Strategy The literature review has produced some excellent talking points that may show the U.S. government is not prepared for another 9/11 terrorist attack. This paper will review the readiness of the U.S. in preparation for the next terrorist attack and the ability to respond to that attack. My research will be qualitative in method and analysis in an attempt to produce a  respectable projection of the U.S. readiness for the next terrorist attack. After reviewing twelve Scholarly articles or books the following question is presented. Is the U.S. prepared for another 9/11 terrorist attack? Findings  In the pre-9/11 article: CatastrophicTerrorism: Elements of a National Policy, Carter explained that the U.S. was not taking the threat of terrorism, as they had known in that generation, seriously (Carter, Deutch and Zelikow 1998). In the aftermath of the embassy attacks in Kenya and Tanzania which killed hundreds Carter did not feel that the U.S. government was committed to address terrori stic threats nor was it suitably prepared for a catastrophic terrorist event. Carter gave a prophetic warning that a catastrophic event was plausible in 1998. Terrorist networks were no longer hiding in the shadow as they did during the Cold War. The Preventive Defense strategy, at that time, was outdated. Terrorist networks were embracing change, embedding with organized crime syndicates, drug and human traffickers, and money laundering which created the basic infrastructure of a terrorist organization. During this same time frame we saw the effects of globalization in the Sub-Sahara Africa as it folded in on its self and created lawless safe havens for terrorist organizations to freely operate. Carter predicted a catastrophic terror event would be a watershed event in U.S. history that would change law, challenge personal liberties, and ultimately make terrorism the focus of our national defense strategy (6). Carter and his team were virtually ignored until 9/11. In the aftermath of 9/11 Zelikow sat on the 9/11 Commission. Many of the findings that the 9/11 Commission determined came from the 1998 article. Ultimately, the Department of Homeland Security (DHS) creation was in response to the large number of listed intelligence and operational failures among U.S. governmental agencies. These failures were over classification of intelligence, lack of information sharing, interagency competition in investigations, and multiple agencies conducting the same redundant tasks to name few. During DHS’s inception twenty- two federal agencies and 170,000 employees, which specialized in various disciplines ranging from law enforcement to disaster mitigation, were pulled under the control of DHS in order to streamline information sharing and overall interagency cooperation. In the years that followed many studies and reports to congress on the DHS suggest that the organization needed to be reformed due to over-all mismanagement and lack of any institutional control over the multiple agencies. The primary reason for concern is the organizations layer of bureaucratic red tape and political appointees who lack the ability and structural knowledge are hampering the Secretary of Homeland Defenses ability to lead U.S. security efforts (Carafano and Heyman, DHS 2.0: Rethinking the Department of Homeland Security 2004). The DHS has a leviathan sized mission as it pertains to keeping the U.S. safe from terrorist activity. In 2003 report, Major Management Challenges and Program Risks: Department of Homeland Security, the Government Accounting Office (GAO) reported the DHS was a high risk organization for three reasons. First, the organization is too large to manage efficiently. The DHS creation is in response to the events of 9/11 without having a command structure properly planned. Second, among the 22 agencies under the DHS umbrella, there was a large amount of discord, strife, and competition before the merger. The merger did not quell the conflict, it actually added to the competition for funding and resources. Third, these failures expose the U.S. to other possibilities in regards to terrorism (Governement Accounting Office 2003). The GAO further outlines what DHS needs to do to alleviate some of the existing challenges they face now and in the future. DHS must effectively integrate discording agencies in order to foster an environment of partnerships and working environments. DHS must adopt and use public and private partnership business methods, as most of the protection Flynn mentioned earlier has fallen on the private sector and the dependency of first responders. â€Å"The private sector controls 85 % of the critical infrastructure in the nation. Indeed, unless a terrorist’s target is a military or other secure government facility, the first responders will almost certainly be civilians† (9/11 Commission 2004). Finally, the DHS infrastructure must incorporate the maximum use of its brightest and best individuals and must foster interagency cooperation among multiple organizations and countries simultaneously (pg. 1). Since 9/11 the U.S. has not experienced another 9/11 terrorist event, one could assume the DHS and the U.S. War on Terror is having a significant impact on terrorist activity. In 2011, The Heritage Foundation reported 40 terrorist plots had been thwarted since 9/11due to the efforts of DHS employees and power granted under the PATRIOT Act (Carafano and Zuckerman, War on Terrorism: 40 Terrorists Attacks Foiled Since 9/11 2011). Although the PATRIOT Act granted law enforcement agencies nationwide powers and abilities they did not have pre 9/11, the agency has stonewalled terror attacks on U.S. soil, and it is still failing at multiple levels. At this point, it would not be wise to assume the U.S. is 100 percent safe from terror attacks or more importantly the ability or readiness to respond to one. The DHS track record for responding to natural disasters in the U.S. is poor, at best. One example is the DHS response to Hurricane Katrina. By the time Hurricane Katrina had made landfall the DHS had not established the roles and responsibilities that the public and private sectors would play in the survival and recovery of New Orleans, even though the energy and shipping facilities had been considered, â€Å"national critical infrastructure for which the U.S. government should take substantial responsibility in the event of a disaster† (Military Technology 2005). This is where Flynn related this wasn’t rocket science; it just was not completed in a timely manner. There have been a number of theories for the dysfunction of the DHS as it pertains to disaster response. One primary theory is DHS does not have its priorities straight. DHS creation in response to the attacks of 9/11, with its primary focus being on prevention of future attacks. DHS thought process can be seen as one sided as 75 percent of the 3.35 billion in Federal grants were designated for counter-terrorism activities (pg. 104). Additionally, DHS was charged with not fully notifying local and state  leaders about the magnitude of the event and many mass-causality centers were diverted to Iraq and Afghanistan leaving the homeland under sourced. Of the 22 agencies that fall under DHS the Federal Emergency Management Agency (FEMA) has borne the brunt of the fallout in responding to disaster events. Prior to 9/11 FEMA held a cabinet level position within the Presidential Cabinet and responded to incidents with competence, ability, and utilized lessons learned to prevent the same mistakes in the future. Under the authority of DHS, FEMA lost its cabinet level position, lost independent funding, and FEMA’s competency and performance decreased significantly. Further adding to the dysfunction within the DHS and FEMA’s ability to respond to incidents are the political ramifications of power sharing between the Federal government and state agencies. In response to Hurricane Katrina, the Federal government to include the Department of Defense, the Department of Justice, and the White House could not determine if utilizing Active Duty would violate the Posse Comitatus Act. The DHS and White House did not want to take Constitutional rights away from the states. This delay furthered much needed assistance to the hardest hit areas of the Gulf Coast. WAL-MART had a quicker response time of getting much need supplies into New Orleans but was unable to do enter and provide assistance due to the bureaucratic boondoggle in Washington (Abouo-Bakr 2013). In 2007 and 2009, â€Å"FEMA participated in a national-level exercise aimed at assessing U.S. capacity to prevent, prepare for, respond to, and recover from a large-scale disaster† (Busch 2012). In the following months after these training exercises it was reported FEMA did not effectively manage, track, or maintain and failed to complete less than 40 percent of corrective actions noted (pg. 18). FEMA also failed to provide a training outline to address the corrective actions to ensure the mistakes made and lessons learned could be used at future training events in preparation for real life responses to disasters. Conclusion The U.S. has thwarted terrorist attacks on the U.S., on both foreign and  domestic fronts, since the historic events of 9/11. The additional powers granted to the DHS under the PATRIOT Act have aided law enforcement agencies and anti-terrorism activities in the War on Terrorism. The question is not how well the DHS prevents future attacks; it is a question of when the next attack will happen and how will the U.S. respond. In order for the DHS to become successful the Secretary of Homeland Defense must coordinate organizational and logistical support across all 22 agencies. The monetary focus of the DHS must be distributed equally along the other agencies supporting the relief efforts in the event another terrorist event occurs on U.S. soil. The DHS must foster an environment that encourages employees to create Private Public Partnerships (PPP). These partnerships must have a clear and concise plan and all players involved must have a clear understanding of their roles and responsibilities as it pertains to information and resource sharing during a response to a terror event. The relationship between the DHS and PPP must foster long-term projects and must initially come from within the DHS. FEMA should be removed the organizational tree of DHS and have its cabinet level position re-established and given the ability to meet directly with the President of the United States and all emergency response assets nationwide. FEMAs ability must be restored to pre-9/11 levels in order to meet all future natural disasters or terrorist attacks. The USG must network with the private sector and ensure the plans created do not hamper their bottom line and ensure the cost/risk ratio is sufficient to stock holders in the private sector. The DHS and FEMA have applied some of the lessons learned in past response efforts and Congress has turned some of them into law. The two most important laws will assist FEMA in emergency management. First, the head of FEMA must be an emergency management professional and have least five years executive experience. Second, during a disaster, the lines of communication between the President and FEMA are open without interruption from the DHS (King, et al. 2009). The changes to law were a small step for FEMA but now allow them to coordinate with all organizations along the National Incident Management System and the National Response Framework. Both of the programs describe how multiple players from the lowest level to the Director of FEMA how they should work together in response to an incident. Both of these programs are balance to react to an incident whether it is a terrorist event or a natural disaster, but they still have a long way to go. The DHS prevents attacks well but at times fails miserably in response efforts due to interagency shortfalls. Until there is a balance between the efforts carried out in the War on Terror and the response efforts after an event the U.S. will not be prepared for the next attack. References 9/11 Commission. The 9/11 Comission Report. July 26, 2004. www.9-11commission.gov/report/911Report.pdf (accessed 12 29, 2013). Abouo-Bakr, C. Managing Disasters through Public-Private Partnerships. Washington, DC: Georgetown University Press, 2013. Busch, Jason. â€Å"FEMA Falters in Self-Improvement.† News Network, November 2012: 18. Carafano, James, and David Heyman. DHS 2.0: Rethinking the Department of Homeland Security. Special Report SR-02, Washington: The Heritage Foundation, 2004. Carafano, James, and Jessica Zuckerman. War on Terrorism: 40 Terrorists Attacks Foiled Since 9/11 . September 7, 2011. http://www.heritage.org/research/reports/2011/09/40-terror-plots-foiled-since-9-11-combating-complacency-in-the-long-war-on-terror (accessed 12 24, 2013). Carter, Ashton B,, John M. Deutch, and Philip D. Zelikow. Catasrophic Terrorism: Elements of a National Policy. Visions of Governance for the Twenty-First Century, John F. Kennedy School of Government, 1998. Flynn, Stephen. â€Å"The Next Attack.† The Washington Monthly, March 2007: 31-37. Governement Accounting Office. Major Management Challenges and Program Risks: Department of Hoeland Security. Series Report, Washington: United States General Accounting Office, 2003. King, Peter, et al. â€Å"Keep FEMA within Homeland Security.† January 14, 2009. http://search.ebscohost.com.ezproxy2.apus.edu/login.aspx?direct=true&db=bwh&a