Wednesday, July 31, 2019

Mindless of Society Essay

One theme Ray Bradbury developed in the novel Fahrenheit 451 is â€Å"mindless of mass culture†. In the novel is a city where no emotion exists, and where the society is happy, but realizing that the society is actually miserable. People are antisocial and are mindless zombies. Individuals can just enter your house without telling any details on what there are doing. Ray Bradbury had shown the theme mindlessness of mass culture is using metaphors, similes, and foreshadowing. Ray Bradbury has created a character names Beatty, who is the chief of the fire department, states a metaphor of mindlessness of mass culture. Beatty tells Montag. â€Å"If you don’t want a house built, hide the nails and wood. If you don’t want a man happy politically, don’t give him two sides of a question to worry him; give him one. Better yet, give him none. † This quote is saying to not give humans an answer to think of. If a person has the answer to a question, someone else could possibly argue with their opinion and cause a commotion. That is why in Fahrenheit 541, that society is a place not to think and react. Another way Ray Bradbury has shown the mindless mass culture is though the character Faber. Faber is an old man and a friend to Montag, He compares how book are almost the same as society. How books need quality, able to understand and those are something that you need to find in people. Faber tell Montag, â€Å"Number one: Books have to have to have quality. Number two: One needs leisure to digest it. Number three: One needs the right to carry out actions based on what they have learned from the first and second lesson. † Books are compared to how people are in the present and how books are not needed because the current technology which the society has will start replacing books. Eventually books will not be need is in life. Another way the mindless of mass culture is shown in Fahrenheit 451 is when Clarisse had died. Clarisse is a 17 year old girl, who is different from everyone in the society in Fahrenheit 451. She was a person who liked to question things in society or anything that goes around her. She was a very intelligent person, but a tragic event happened. She died and no one knows if she had committed suicide or if someone had killed her. Milderd the wife of Montag tells him, â€Å"Whole family moved out somewhere, but she gone for good, I think she is dead. No, the same girl, McClellan McClellan. Run over by a car. Four days ago. I’m not sure. But I think she dead. The family moved out anyways. I don’t know. But I think she’s dead. † How this relates to the mindless of mass culture sense nobody cares if something important had been taken away, such as loved for one. The society just forgets about everything they used to have. It shows how the society foreshadows everything that they do. The theme mindless of mass culture was expressed by characters in the book; the theme had a very big impact on everyone in the society. This theme has affected each one mind and making every person in society to be like a robot which no emotions at all.

Tuesday, July 30, 2019

Movie Review on Crash

The movie started with Don Cheadle, who played a Los Angeles detective, commenting about how people interact with each other. He said that the act of touching is prevented by the existence of artificial elements such as metal and glass. Because of this, people have the tendency to crash with one another in order to feel each other. This thought provoking line summarizes the entire plot of the movie which revolved around racism and stereotyping. The term â€Å"crash† described the many conflicting events among the main characters that transpired in the movie. It defined the multifaceted relationships of people from different cultural backgrounds, colors of the skin and socio-economic status. There were many concepts in the movie that emphasized differences in race and gender that manifested the following power, discrimination, hate crime, racism, wealth, sexual harassment, ethnicity, minority, prejudice, stereotype, segregation, pluralism, assimilation, scapegoat, crime against property and gender stratification. Power was seen in the scene where the District Attorney played by Brendan Fraser got prioritized by the LAPD when his vehicle was stolen. He used his stature as a government official in order for the police force to immediately handle and resolve his case. Meanwhile, I saw a form of discrimination when Matt Dillon who played a white racist cop, called the hospital to inquire about the medical treatment needed by his father. Throughout their conversation, he was very unsatisfied so when he asked who was he talking to, the person at the other end of the line, gave a name that was a typical Black name and Dillon immediately assumed that the reason behind the unsatisfactory service was because he was dealing with a Black person. An example of hate crime was also depicted in the movie. When the Persian store owner assumed that the Hispanic locksmith was behind the damaging of his property because the locksmith looked like a typical gangster or criminal, he tried to kill him by shooting him in front of his home. Luckily, the locksmith was unharmed from the incident. In relation with this, prior to this incident, the Persian tried to buy a gun for him and his family's protection from an American-owned gun store. The American owner refused to sell a gun to the Persian because the owner associated the Persian with the Arab Muslims who were responsible for the 9/11 terrorist attack. This was a form of racism that showed intolerance for another social or racial group. On the other hand, wealth was evident with the characters of Bullock and Fraser who played a rich white couple while Howard and Newton's characters who were the well to do black couple. These characters symbolized that fame and fortune can be attained and enjoyed irregardless of the color of the skin. In another scene in the movie, I saw an act of sexual harassment between a black woman who was the victim and the white man who was the harasser. It is the scene where the character of Dillon pulled over a vehicle of a black couple and interrogated them. During the interrogation, Dillon physically searched the character of Newton who played the rich black wife of Terrence Howard, a big shot black producer. Dillon inappropriately touched the body of Newton which implied an unwelcome sexual advance. On another note, at the beginning of the movie, several cultural identities were presented. A black man, a Hispanic woman and an Asian woman were convened together in one place because of a car crash. This scene portrayed the fusion of different ethnic groups in one area wherein their different languages, beliefs and culture signifying the existence of various ethnicity in LA. However, multiculturalism also entails having minority groups. In the movie, Chinese illegal immigrants were being sold as slaves by Americans in downtown Los Angeles. This scene illustrated that the Chinese are still considered as a minority or a subordinate group in an American dominated city where they are deprived of their basic needs. Meanwhile, prejudice was seen when the character of Bullock clutched the arms of her husband upon seeing two African-American males walking on the same sidewalk as they are. Bullock's action showed her hasty judgment of the two blacks. She assumed that they were gangsters or robbers so she made a gesture seeking protection from her husband. In a similar scenario, Bullock stereotyped a Hispanic locksmith with a gangster because of his shaved head and tattoos. This is a form of stereotyping wherein one generalizes a specific concept to anyone who typifies that concept. Meanwhile, segregation is apparent in the scene where people of Mexican or Hispanic origin are usually typecast in blue collar jobs such as domestic works or construction. In the movie, the housekeeper of Bullock and Fraser was a Hispanic woman. Because of the housekeeper's nationality and the nature of her job, Bullock constantly looked down on the capability and intelligence of the Hispanic woman. Moreover, pluralism was shown by demonstrating Los Angeles as a pluralist city. LA was seen as a place where Black and White Americans, Asians and Hispanics have preserved their respective cultural identities amid the diversity. Meanwhile, Terrence Howard played the character of Cameron Thayer who was a successful black television producer. The TV industry was dominated by whites. Howard managed to be assimilated to the dominant group by succumbing to the demands and wants of the whites at the expense of disregarding his own wants and opinions. This is a clear example of cultural assimilation. Meanwhile, in the scene where Detective Graham Waters played by Don Cheadles was investigating a shooting scene between a black man and a white LAPD officer, he learned that the police officer was guilty of doing illegal activities. In order to preserve the good image and integrity of the LAPD, the black man was used as an scapegoat by pinpointing him as the instigator of the crime. On the other hand, crime against property was illustrated when the store of the Persian was thrashed. They were subjected to such offensive behavior because of their similar physical appearance with the Arabs who were highly discriminated in the U.S. because of the 9/11 attack. Last but not the least, gender stratification was demonstrated in the movie through the scene where the Persian woman was urging the American gun store owner to sell them a hand gun. Instead the owner verbally harassed the Persian woman indicating the status of women in a male-dominated society. Generally, women are perceived as sex objects or domesticated beings. References Cheadle, D., Haggis, P., Moresco, R., Schulman, C., & Yari, B. (Producers) & Haggis, P.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   (Director).(2004). Crash [Motion Picture]. U.S.A.: Lion Gate Films.

Why trains are the best way to travel Essay

WHEN you travel long term you have plenty of time to ponder the big questions. Maybe that’s why philosophy and travel go so well together. You finally have the time to really think about what the hell Confucius and Plato were trying to get at†¦ Maybe that’s why I also love to travel by rail. Above all other forms of long distance transport, trains are my favourite. I’m comfortably sitting, watching a frozen landscape of farmland, forests and tiny villages fly by my window. Drifts of snow rise and fall like endless frozen waves as skeletal trees scratch at the sky across the distance, disappearing over the horizon, as the sun sets in a radiant arc of crimson fire. The world is bare, open and, above all else, interesting and full of wonder. This is what should make train rides important to travellers. Modern conveniences like email, smartphones and supermarkets have made life more efficient than ever before but in doing so something’s been lost. Don’t get me wrong, 2013 is the best time to be alive (ever!), but I do think we all could learn to appreciate ‘the journey’ a little more than we do. In modern life the journey has taken a definitive backseat to the destination. I put long distance train travel in roughly the same category as calligraphy, wax seals, orchestras and Shakespearean English. There may be more efficient, easier and faster ways to accomplish writing, making music or talking but the ‘romance of the journey’ makes these endeavours both interesting and valuable. The difference is not taking the journey for an inconvenience that’s in the way of getting somewhere, but rather in enjoying the journey for what it is. Flying is obviously more efficient in regards to time, but it lacks in journey aesthetics. Taking a commercial flight really doesn’t allow for much appreciation for a country’s’ aesthetics (unless you count Virgin’s flight attendants) . Another downside to flying is that planes are cramped, much like being a sardine in a can (only with less vegetable oil). There’s also the fact that you’re hurtling through the open sky at 800km/h in a hulking 500 tonne machine made of metal and plastic – maybe you can tell that I’m not a fan of flying. What about buses? Buses unfortunately are a necessary evil in the same way that McDonalds is a necessary evil at 3am on a Sunday morning. Buses, while often cheap offer neither efficiency or the journey experience and come a very distant third choice. Railroads are quite often cut through remote  wilderness far from highways and roads, giving you a sense of remoteness that’s hard to match with other forms of transportation, perfect for moments of quiet contemplation and reflection and often amplified by the beautiful scenery. There’s also the comfort factor to consider. If you’re the butt of beanstalk jokes, journeying by rail allows for more leg and shoulder room than a bus and a flight combined.

Monday, July 29, 2019

The Social Environment and Health Assignment Example | Topics and Well Written Essays - 250 words

The Social Environment and Health - Assignment Example On the other hand aging and obesity are biological factors. As Hillier and Barrow (2014) state, hypertension exists in about 31% of individuals above the age of 65 and only in 22% of those between 45 and 64 years. Chen, Lo, Chang, and Kuo (2014) note that obesity indices are substantially associated with the risk of hypertension across age and gender. Approaches geared towards enhancing health when biological and social factors are considered differ. If considering the physical fitness, it is easier to undertake physical exercises that will lead to improved health. In the case of dieting, it requires the intervention of a nutritionist who advises on what foods to and not to take. Also, the results of dieting may not be physically observable as those of physical exercise. For example, reducing dietary sodium salt intake to the recommended standard of around a 1,500 mg a day (Cavanaugh & Blanchard-Fields, 2014), it is not physically expressed. Chen, S. C., Lo, T. C., Chang, J. H., & Kuo, H. W. (2014). Variations in Aging, Gender, Menopause, and Obesity and Their Effects on Hypertension in Taiwan. International Journal of Hypertension, 2014,

Sunday, July 28, 2019

Compare and Contrast Essay Example | Topics and Well Written Essays - 1000 words

Compare and Contrast - Essay Example Does it remind you of something or seem entirely new? Do you notice if the band is playing 12-bar blues, AABA tunes, or something else? Are they playing from written music? Does the arrangement seem formalized or more like a â€Å"head† arrangement? ?3. The performance venue and audience: What kind of space does the event take place in? How big is the audience? Do you note anything about their ethnic backgrounds, age or gender? What are they doing? Listening? Talking? Dancing? ?4. Your general impressions of the event: Did you have a good time? Why or why not? ?5. Any ways in which the performance relates to issues we have discussed in class: Think particularly about the dualities we started off with: spontaneity vs. planning, and individuality vs. collectivity. ? I. Introduction Jazz, ever since having been introduced in the early 20th century, has become a staple of the music industry. Two jazz performances will be compared and contrasted with regard to the following: the pe rsonnel and instrumentation of the groups; the general style(s) of the groups and their repertories; the performance venues and audiences; my general impressions of the events; and a discussion about any ways in which the performances relate to issues that have been discussed in class. The two 2011 jazz performances that were attended were: a band named Klang, which had just recently released a CD entitled â€Å"Tea Music,† as well as the band Klang’s performance for their newest recently-released CD â€Å"Other Doors.† II. Personnel and Instrumentation of the Groups You might first note the presence or absence of a rhythm section. If there is one, which instruments are used and what are their roles? How big is the entire group? How do the various instruments relate to one another? Does one soloist stand out for you? Why? In both performances, there was a rhythm section. One person was on drums, while another person was intermittently doing percussion of various types including a xylophone. The other types of percussion besides the drums and the xylophone are not immediately known. The entire group is only composed of four people total in the band at one time. The other instruments that I remember included the main musician who was featured, who was on a clarinet. Two other members of the group play the vibraphone, the cello, and other various instruments—while the fourth musician plays drums only. The one soloist who stands out is the clarinetist, because he is the person who basically holds the band together. He’s also the focal point of all the action onstage. Basically, it’s his group, but everyone contributes somehow. III. The General Style(s) of the Groups and Their Repertories Can you identify the general style based on our class discussions? Does it remind you of something or seem entirely new? Do you notice if the band is playing 12-bar blues, AABA tunes, or something else? Are they playing from written music? Does the arrangement seem formalized or more like a â€Å"head† arrangement? The general style of the jazz presented, in both concerts, was very difficult to discern. This is because Klang is not a traditional jazz band in every sense of the word, even though they play some standards occasionally. However, for the most part both of their concerts focused on instrumentalism and attention to musical detail which really can’

Saturday, July 27, 2019

Conflict of Interests Term Paper Example | Topics and Well Written Essays - 2000 words

Conflict of Interests - Term Paper Example This is because its consequences have the potential of adversely affecting the corporate image of an organization or public office. In addition, conflict of interest is considered unethical in the sense that it leads to biased considerations and ways of doing business that may lead to a downfall of an organization. As a result, it is always considered imperative for any organization or public office to put in place measures aimed at mitigating or preventing altogether circumstances that might give room for conflict of interest. This is particularly done by instituting ethical code of conducts among other strategies as will be elaborated in the paper. Conflict of Interests Introduction Conflict of interest is a common word, widely used in the world today. Nevertheless, many still does not understand well its full significance. What is certain is that the term is not complex as some may think. This is because conflict of interest illustrates situations that a majority of us find themse lves into particularly when we are confronted with ethical decisions regarding duties conferred upon us. However, what is acknowledged is that, conflict of interest is unethical and must be avoided by all means. This can be traced back to the biblical teachings, which says, â€Å"thou shall not serve two masters† (Gordon, 2005, p.16).... What is noted is that conflict of interest knows no boundary in an organization as can be witnessed among top chief executives, board of directors, managers, as well as employees. This paper will explore ‘conflict of interest as a major ethical issue in the world today. What is conflict of interest? To begin with, conflict of interest arises when an individual, particularly an employee has multiple interests with the potential of clashing against each other. In the workplace, self-interest usually arises when an employee pursues other interests other than the professional or public interests which he or she is expected to pursue. Conflict of interest is usually considered unethical under the company’s code of conduct because it affects the general performance of an organization since it causes an individual to diverge from the interests of an organization to personal interest (Lewis, 1997). Situations that constitute conflicts of interest There are a number of situations that constitute conflict of interest in the workplace that is likely to jeopardize the effective running of an organization. One such is a situation where a male manager happens to date a female employee who is directly answerable to him or where a female manager dates a male employee who reports directly to her. In such a situation, a conflict of interest arises because the relationship between the employee and the manager affects the effective management of the company, as the manager will in most cases tend to appear lenient to the employee even if the employee whom he is in a relationship with happens to have made a problem. For instance, the employee who is in a relationship with the manager may

Friday, July 26, 2019

Hezbollah Term Paper Example | Topics and Well Written Essays - 500 words

Hezbollah - Term Paper Example ah has continued to engage in terrorist activities throughout the Middle East and currently has a militant wing of the organization that is understood as larger than that of the standing national army of Lebanon. Yet, Hezbollah cannot be understood as a native insurgency that developed within Lebanon. Instead, it was initially begun as a response to the Israeli invasion of Lebanon in 1982. Seeing this as an opportunity to further its influence throughout the globe, Iran developed and funded this group as a means of taking the battle directly to the Jewish state. With Iranian backing and financing, the group developed rapidly and came to serve as a fundamental voice within Lebanon and throughout the region. Hezbollah has been linked to over 36 suicide attacks and terrorist bombings since 1982 (Hamdar, 2014). Moreover, the number of targeted assassinations that Hezbollah is responsible for is something that is up for much debate; estimated to be within the hundreds or thousands. Whereas enemies for Hezbollah have come and gone (for instance the American, French, and British interests have been listed at one time or another as targets for the group), its animosity and hatred for Israel has been the one mainstay that has helped to continue to define the gropu throughout the years. As such, at each and every point in which Israel has come in direct conflict with Lebanon, Hezbollah has used this as an opportunity to drastically swell its ranks and engage in pitched and indirect warfare with Israeli forces or target Israeli interests throughout Lebanon and the greater Middle East. More recently, the tug of war between Russia, Iran, Israel, and others over Syria has meant that Hezbollah has come to serve as a powerful supporter of Bashar al Assad. As a function of this and subsequent indirect support from both Russia and Iran, Hezbollah has been one of the primary foreign forces that have served to bolster to strength of the Syrian regime; as it lies virtually

Thursday, July 25, 2019

How institutional and cultural issues impact International HRM Essay

How institutional and cultural issues impact International HRM - Essay Example This essay will provide an analysis on the literature available on International Human Resource Management and how companies deal with the challenges of globalisation and of managing employees of different culture. International human resource management is an important emerging phenomenon in international business. There is a sudden growth of interest over this due to the rapid growth of industrialisation and globalisation. Globalisation has revolutionized the way organisations function; it has been enhanced by continuous technological advancement, the Internet and Information Technology. Organisations have to expand both as an organisation and as a business. Businesses, which have been internationalized because of intense globalisation, have to introduce more new products and services. Competition dictates these companies to be always changing and innovative. The importance of borders between different countries is reduced, and similar events and phenomena in countries throughout t he world are more easily linked. The identities of cross-border structures are strengthened, and the power of organisations operating only within the nation state is weakened. International human resource management has its origin in the 1980s, as a reaction against the more functional approach embodied in personnel management. McKern stated that during the early years of the post-war development of the modern international corporation, organisational structures evolved slowly in response to geographical and market diversity. It was easy for management to change structures incrementally. But now changes in the organisation are based on complex environmental factors. International HRM was born. Guest (1990 as cited in Cray and Mallory, 1998) says that ‘the apparent novelty of HRM lies in the claim that by making full use of its human resources a firm will gain competitive advantage’. HRM Paradigms Human resource management is the strategic and coherent approach to the ma nagement of an organisation’s most valued asset – the people. Due to the emergence of various forces in globalisation, organisations and businesses have become global as a result of technological innovations, and the introduction of more development in communications and transportation. There are two paradigms focusing on HRM. The universalist paradigm, which is dominant in the United States and widely used elsewhere, assumes that the purpose of the study of HRM is to improve the way human resources are managed strategically within organisations (Harris et al., 2003). In contrast, the contextual paradigm searches for an overall understanding of what is contextually unique and why. Many management researchers find the universalist paradigm ironically excluding much of the work of HR specialists in such areas as compliance, equal opportunities, trade union relationships and dealing with local government. This paradigm is not helpful in regions like Europe, where signific ant HR legislation and policy is enacted at European Union level (e.g. freedom of movement, employment and remuneration, equal treatment) as well as those of particular countries or sectors (Brewster et al, 1996, qtd. in Harris et al, 2003). HRM is now considered the determinant factor in the success or failure of international business. The success of global business depends most importantly on the quality of management in an organisation. There is a shortage of international management talent that constrains implementation of global strategies (Scullion and Paauwe, 2004). There is a lot of challenge placed on the manager in managing an organisation of different culture. Along this line of thought is the concept on comparative human resource mana

Wednesday, July 24, 2019

What a women looks like Assignment Example | Topics and Well Written Essays - 1250 words

What a women looks like - Assignment Example The main essence lies in the exploring of how the country persistently follows the formula of tracing and evaluating an individuals’ characters according to their looks and attires. â€Å"In a highly mobile society, where first impressions are important and where selling oneself is the most highly cultivated â€Å"skill,† the construction of appearances becomes more and more imperative.† (Ewen, 1988: 85). Throughout the past and in the present as well, America’s view for women and men based on their appearance and dress remains unchanged. This can be best established through Douglas Bradley Smith’s question in his Quarterly Journal of Speech which asks: (1977: 215) Why has no communication scholar bothered to decode the specific meanings of the American wardrobe? While total absorption in such details might reduce us to public relations consultants, to ignore such details is to deny the global nature of human interaction. Clothing persuades. According to Susan S. Gilpin, an Assistant Professor at Marshall University, the matter has still not been explored in a deeper level by communication scholars (Gilpin, 2009). Her remark, â€Å"The workplace inequalities legitimated by contemporary dress for success rhetoric still requires scholarly investigation and critique†, (Gilpin, 2009) lucidly confirms the America still judges individuals as per their looks and attire. Despite the prevailing trend of judging men and women on the basis of their appearance and dress, a different school of thoughts still claims that America’s views in this regard has changed considerably. According to these opinions the country now perceives an individual by his or her potentials and qualities rather than the artificial facades. The best examples for them are Michale Jackson, who has rocked the world despite being not white and Barrack Obama, a black president

Ecological Footprint and Personal Environmental History Essay

Ecological Footprint and Personal Environmental History - Essay Example However, the scientists have not been successful till this point of time to locate other planets similar to this one. In comparison with the country average, my carbon and food footprint are more, indicating that I am taking those activities that are generating more carbon and I am consuming more food items that are providing more food footprint than the average rate. In addition to that, my footprint share by BIOME is largely contributed by the forestland footprint, which is around 40 percent of my total footprint share by BIOME. I am astonished to see the impact of my footprint over the ecological system of the planet. I feel that I am the person who is contributing more in the ecological footprint than any other person. And, it is largely contributed by my current lifestyle and activities that I routinely carry on. For example, I use vehicles; consume excessive water, I do not retune my vehicle’s engine on time. My current lifestyle has little chances of being sustainable. I consider that the only way to improve and enhance the sustainability in the lifestyle can only be achieved if I start thinking like a person who lives ethically, socially and personally responsible by reducing every that activity creating or enhancing the ecological footprint. I should retune my vehicle’s engine on time; if I and my father are going in the morning, instead of using two vehicles, we should use one. While consuming water, I should not waste any single drop of water and so on. To be honest, I have never thought about my relationship with the earth. As a result, my relationship with the earth has been a stranger. A person who does not know about the earth, which has everything that is indispensable for my existence on this planet; the earth has been made in a way that is filled with a number of elements and members. Each element and member has individual role to play; for example, with the presence of air, we breathe

Tuesday, July 23, 2019

Social Work with the Elderly Essay Example | Topics and Well Written Essays - 1500 words

Social Work with the Elderly - Essay Example A challenge is a fact that it is common for the social workers’ clients to be afflicted with different kinds of diseases and disabilities: physically, mentally, or emotionally. This paper aims to give an in-depth discussion of the challenges involved in working with the elderly, and how the clients’ identity issues affect their relationship dynamics with the worker. First, let us explore the clients’ perspectives and situations from the beginning of things – as they enter the residential home for the elderly. Some have existing and financially capable relatives by they themselves choose to stay in a residential facility so as not to burden their family members with their needs. It could due to reasons of pride, or perhaps a deeply ingrained sense of independence that spurs them to instead opt for professional and paid help. It could be a defense against possible future rejection and the hurt that would succumb from it. Others would have preferred to stay with their children and/or grandchildren, as is in most cases in Asian countries for example, but the family members are either too poor, too disgusted at the prospect of being solely responsible of taking care of an elderly person, or too concerned with having their own lifestyles cramped. Many times the older persons in these cases are admitted to residential homes despite wanting to stay with their families or remain in their own homes. They perhaps just weren’t given a choice. The majority of the elderly have been placed in residential homes because of a physical or mental disability and/or because they do not have anyone around to take care of them anymore. These factors, one way or another, have a crucial impact on the clients’ psychological state and invariably affect their responsiveness and cooperation during the course of case management. As each and every human being has unique identities and personalities, the dynamics of an elderly person and his or her identity is profoundly affected.

Monday, July 22, 2019

Microsoft Powerpoint Presentation Essay Example for Free

Microsoft Powerpoint Presentation Essay a) Answer online Week 7 Forum Question: (2%) i. Research a few of the proposed changes to SMTP and DNS that are designed to reduce or eliminate SPAM. Simple Mail Transfer Protocol (SMTP) is responsible solely for sending e-mail messages. In Linux/UNIX, the send mail program activates in response to a command and sends the requested message.DNS servers, also called name servers, contain the server application that supports name-to-address translation. I was introduced to DNS servers earlier in the.Typically, the system on which the name server resides is called the name server system. DNS is a decentralized system: It does not depend on one source for updates, and one server does not store all the data. Instead, DNS is a distributed database that exists on name servers across the Internet. Microsoft Outlook, a popular email application often used in conjunction with Microsoft Office, comes with many Windows operating systems as a standard feature. Like other email programs, Outlook is vulnerable to spam, or junk emails. Spam emails sometimes carry viruses and can fill your inbox with junk, obscenity and advertisements. But you can stop spam in Outlook by altering the level of spam protection on the program. One of the most dramatic changes of the next 10 years will be the emergence of everyday robots and computer intelligences in our economy and everyday lives. And since the real estate industry is, at its core, a knowledge industry, the emergence of computer intelligences is going to affect all the players in the industry in a variety of ways. Richard Worzel is not only a Chartered Financial Analyst and best-selling author, but is Canada’s leading futurist. In this presentation, he provides an overview of how these developments, plus other tech-related matters, will change the industry and the way things are done, including: Crowd sourcing – The rating of houses, real estate companies, and legal services will move even more quickly in the directions pioneered by tripadvisor in travel, and Amazon in customer-rated books. This will include comments on neigh bourhoods, brokers and agents, and home-builders, as well as alternative service providers and even times of the year when sellers can achieve the greatest success. Artificial intelligence – Computer intelligences will become power aids to those in the real estate industry, as well as potential threats to some. Such intelligences will be able to quickly assess industry, national, regional, and neighbour data to reveal trends not immediately apparent, gauge the strength of economic activity with special emphasis on shifts in sentiment and interest rates, and read body language to assess the seriousness or excitement of specific individuals about either buying or selling. Meanwhile, routine work, such as legal documentation, will increasingly be done by ever-more sophisticated computer software. Its clear that technology is advancing with unprecedented speed, but what is less clear is what effects these advances will have on business, government, consumers, and society. Yet the downstream effects the secondary, tertiary, quaternary effects and beyond of technological developments are almost always more significant than the immediate impact of the technology itself. For instance, refrigeration extended life expectancy; the invention of air travel revolutionized warfare, helped produce McLuhans Global Village, spread new diseases with unprecedented speed, and boosted global terrorism; computer games lead to childhood obesity and health problems and may be eroding the socialization skills the allow society to function; and the Internet is redefining the way business is conducted as well as revolutionizing politics. Respond to at least 2 students. b) Complete and submit the class Project Paper and Presentation – see details below (15%) Lessons: View the video for Lesson 7 Project Paper and Presentation: (Post them under Week 7 Assignment area as a Microsoft Word document (10%) and a Microsoft PowerPoint Presentation (5%). You must include at least ten references. Details of the Project: Research and select a current trend in the area of telecommunications. Prepare a 10-15 page paper in Microsoft Word (counts as 10% of the final grade) AMU approved APA format (see writing expectations in the Policies section) (350 words per page). At a minimum include the following: †¢ Detailed description of the area researched †¢ Technology involved in the area. We provide both point and end-to-end solutions that leverage industry best practices and technology to deliver world-class logistics and supply chain performance. Our approach helps companies create competitive advantages by reducing costs while increasing service, visibility, responsiveness and customer satisfaction through enhanced supply chain performance. Technology The technology utilizes robust, innovative technology to optimize transportation assets and shipments, reduce empty miles, and provide our clients with succinct, actionable management information. Our web-enabled transportation management system provides clients with real-time visibility into transportation status and information anywhere in the world. Complementing this technology is our team of dedicated front-line logistics managers and staff. With decades of experience improving the flow of goods through every step in the supply chain, the team is committed to supply chain excellence and to accelerating time to results. The comprehensive supply chain assessments and analyses enable clients to capitalize on opportunities to shorten order-to-cash cycles, and reduce transportation expenses, optimize production processes, and improve customer service, No matter what your logistics challenges, The company’ solutions pave the way to operational efficiency and competitive advantage. †¢ Future trends in the area. The top business trends event providing you with the visionary views and practical applications that make you more valuable as a person and more effective as a professional. Polling from the United States and major countries in Latin America, Asia and Europe, the survey reported that 60 percent of employees use a mobile device for work, with an anticipated increase in number of devices per employee. Whether it’s multiple laptops, smart phones or tablet computers, the number of devices will rise from 2.3 per employee in 2012 to 2.8 in 2014. This is the next in a series that Ive been writing called Future Trends. In this series Ive been steadily looking at various states across the country, analyzing where trends are going. The last installment that I wrote was about the FL Panhandle. In this post I focus on the Jacksonville Area. Before I continue, though, here are previous installments: Overall the trend in the area is clear growth. St. Johns seems to be growing the fastest, although Clay isnt that far behind. Duval seems to have added the largest amounts of people. Baker and Nassau, while growing, dont seem to have been as significant as those other counties. Although these numbers dont include 2008, which doesnt include the drop-off in FL growth that might have happened due to the housing crisis, Jacksonville continues to attract people. It is a growing part of the state. †¢ Example companies involved in the area. Food Technology Service| Medical Service Companies| Information Technology Services Stocks| Funds Holding Matrix Service Company| Information Technology Services Shares| Communications Services Companies| Food Service Companies| Transportation Services Companies| Financial Services Companies| Energy Service Companies| Services Companies| Marketing Services Companies| †¢ Regulatory issues surrounding the area. Regulatory issues are those issues that result due to error on behalf of the accused. For example, when you walk into a business where someone is mopping, you tend to see that there are signs visible that say things like caution:wet floor or slippery when wet during the snow seasons. This is due to the regulations a business must adhere to. If these signs were not posted and a persons slipped, fell, and broke their leg, they would be able to to sue the business. This would create a regulatory issue. | Application Performance Management Solutions * Application Performance Management * Server Performance Management * System Management Server Application Free Tools * Help Desk Management * Active Directory Solutions * Desktop Management Software * Log Management and IT Compliance * Integrated IT Management * Virtualization Enterprise Management Security Products * Active Directory Management * Active Directory Auditing * Application Monitoring * Asset Management * Bandwidth Monitoring Traffic Analysis * Customer Support Software * Desktop Management * Exchange Reporting Tool * Firewall Configuration Log Management * Help Desk Software * Integrated IT Management (IT360) * IP Address Management (IPAM) Software * Log Management SIEM * MSP Desktop Management * MSP Help Desk Software * MSP Network Management Platform * Network Configuration Management * Network Monitoring Software * Network Security Scanner with Patch Management * OS Deployment * Password Management * Self-Service Password Management * Storage Management Software * SQL Server Management * Website Monitoring Server Monitoring (On-Demand) Social IT ManageEngine Free Tools †¢ Global implications for the area: Five Global Problems and How Canada Can Solve Them Maybe its that were not looking at the big picture. Or maybe it would just be too overwhelming if we did, but some of the solutions currently being applied to national issues have greater, global application and relevance. Most global problems are dealt with on a country-by-country basis. Sure, we have the Hague and Kyoto and Maastricht, but when you begin counting the meaningful international treaties, you almost run out of names before you run out of fingers. Its too easy to view issues on a regional level and miss the fact that most problems have global implications. So too, we tend to view the solutions on a regional level without considering that a local solution may have global benefit. Canadians have come up with creative solutions to problems that are not unique to Canada, but rather stretch well beyond our borders, and have the potential for worldwide application. Lets look at the some of the global issues that Canadians have attempted to solve on a regional level: Fisheries Depletion For over twenty percent of the worlds people, fishing is more than a pastime – its a means of survival. The international trade in fish and fish products exceeds $50 billion a year. With demand high and resources finite, the resultant shortfall has global implication. According to the World Wildlife Federation, a full 50 percent of marine fisheries are fully exploited, twenty percent are over-exploited, and the rest are being harvested in an unsustainable manner. Among the major marine fish stocks, such as cod and tuna, three out of four are being fished beyond their biological limits. To counter the shortages, many governments, including Canada, have encouraged the rapid growth of aquaculture. As a result, farmed fish now account for one-third of the worlds fish production. While this has countered the sustainability concerns, other problems have developed as a result. In Canada, particularly the West Coast, fish farms generate considerable amounts of pollution and waste. The close proximity of the confined fish increases the propagation of sea lice, and escaped farmed fish spread lice and disease to wild stocks. Just last year, as the British Columbia government lifted a seven-year moratorium on new fish farms, one of Vancouver Islands most significant pink salmon runs had already collapsed, and more than three million salmon failed to return to spawning rivers. Making the international fishing industry sustainable would require some large-scale initiatives, including massive reductions in fishing fleets, concerted effort in controlling illegal fishing and fishing practices, and strictly enforcing limits on the number of fish harvested in a given area. The fish farm industry would also need careful review to ensure that in attempting to meet demand for fish, wild stocks are not completely wiped out in the process. The solution, some argue, is even simpler: if fishing is banned in a given area for several years, the rebound in stock is significant, the overall catch is increased, and the industry becomes sustainable. Last fall the Economist reported a study which discovered that in some 100 areas where such bans occurred, the number of fish increased 90 percent within a few years, their size increased 30 percent, and the number of species by 20 percent. These effects, the researchers contended, seemed to spill over into adjacent areas where fishing remains permitted. As the Canadian experience can attest, it is not as easy as all that. Quota regulation of the Atlantic cod stocks was introduced in 1973. Labeled as the Total Allowable Catch (TAC), the policy was ineffective, due to the restrictions being set too high too quickly, and partly because enforcement was not effective. In 1992, Canadas Department of Fisheries and Oceans took one step further, imposing a moratorium on cod fishing off the coast of Newfoundland, after scientists determined that mature cod stock had dropped by 99 percent from the numbers recorded in the 1980s. Despite these measures, cod stocks really have not seen much of a rebound. It is now time for us to take a different approach. Stopping the commercial cod fishery alone will not work, argues Fred Woodman, chairman of the Fisheries Resource Conservation Council, an arms length body that advises the Federal Fisheries Ministry. He recommends that the government make a long-term commitment to rebuilding the stocks, establishing community councils to make recommendations about the local fishery, and amending the moratorium to provide protection for the most vulnerable areas and allow fishing in those areas where there has been some growth. The lessons Canada has learned from the moratorium in Newfoundland, the fish farms in the Pacific, and the Atlantic cod industry quotas are ones that need to be shared with other nations facing similar problems. Water Depletion One of the less-publicized, yet globally significant, side effects of climate change is global water depletion. Many of the worlds inland seas, such as the Black Sea, Aral Sea, and Lake Chad, have shrunk to a fraction of their size forty years ago. It is estimated that 1.5 billion people do not have access to adequate supplies of safe drinking water, and by 2020, up to 3 billion people could face acute water shortages. Water scarcity is caused mainly by increased demand and pollution, and is aggravated by global warming. Water deficits also occur from the demands of irrigation and industry, which account for almost three-quarters of the worlds demand for water. More than half of the water entering irrigation systems never actually make it to the crops, due to faulty irrigation equipment, leaks, or wasteful practice. Excess irrigation, on the other hand, does irreparable damage to rivers and marshes, by changing local ecosystems patterns and by carrying chemicals, fertilizers and pesticides back into the water supply. Water deficits have the potential to become a major global challenge. Control of water could become a major cause of international conflict, particularly where one country has the ability to restrict or control the flow of crucial waterways. Desalination of sea water is the most logical alternative to freshwater irrigation and drinking water. The process, however, is still prohibitively expensive. Greater effort, however, should be put toward this initiative. Canada actively supports desalination research and has provided federal subsidies to a number of Canadian companies like Candesal, which develops affordable desalination techniques such as using the excess heat generated by power stations. Water, labeled the new gold by some, has not quite matched its counterpart in price, supply or distribution. What we dont value, we wont conserve, contends Ducks Unlimited, an organization committed to preserving Canadas wetlands. One of the major causes of water scarcity and damage to freshwater ecosystems, the organization contends, is the gross under-valuation of water. By failing to acknowledge its importance to survival, we may unwittingly deplete the earths water supply. $75 billion per year is invested in water infrastructure and management in developing countries, almost one third of this coming from Canada alone. As well, Canada has played a significant role in desalination efforts and is a key player in supporting the development of desalination units. These efforts, however, must be sustained over the long term to make any meaningful impact. Canada, a country which possesses the greatest amount of freshwater in the world, can to use this position to raise awareness of worldwide water deficits, and the need to actively deal with the shortage. †¢ References (minimum of 10) i. Prepare a 10-12 slide Microsoft PowerPoint highlighting the content from the paper. Use Camtasia’s world-class screen recording technology to record your PowerPoint slides, onscreen activity, voice, and webcam video. Easily turn your PowerPoint presentations into reusable, HD-quality videos that your viewers can access anytime, anywhere (Counts as 5% of the final grade) ii. Use Camtasia’s world-class screen recording technology to record your PowerPoint slides, onscreen activity, voice, and webcam video. Easily turn your PowerPoint presentations into reusable, HD-quality videos that your viewers can access anytime, anywhere. Open a new document in Microsoft PowerPoint. When you first open the program, the workspace is divided into parts. The main window is the Slide pane, where you add new content to individual slides. On the left side is the Slides tab, which has thumbnails of each slide. You can use this tab to add, delete or rearrange slides, and select which slide you want to work on. i. ii. ii. You are only required to submit a final paper and presentation. However, during the previous six weeks, you will be assembling the research paper and presentation. Feel free to post questions or portions of the paper for review at any time as an email to your professor. iii. You may use esources from the APUS Online Library, any library, government library, or any peer-reviewed reference (Wikipedia and any other publicly-reviewed source is not accepted). The paper must by at least 10 pages double-spaced, 1† margin all around, black12 point fonts (Times New Roman, Arial, or Courier) with correct citations of all utilized references/sources, (pictures, graphics, etc are extra allowed but extra for the minimum page count). The title page and references are also required but don’t count in the minimum page count. The PowerPoint of 10-12 slides is a summary of this paper. No new topics, ideas or concepts are introduced in the PowerPoint that is not included in the paper. A minimum of 10 references are needed. The paper will be subjected to checking against plagiarism. iv. The required number of pages do not include title or references pages – although these must be included.

Sunday, July 21, 2019

Calculating Free Fall Acceleration

Calculating Free Fall Acceleration Introduction A research by Heckert (2010) shows in 1600s, the famous physicist Galileo . Galilei found the swinging motion of a large chandelier in the Pisa cathedral. He began to seriously analyse the chandelier, and recorded the time the light took to swing. In the 16th century, there was no stopwatch so that Galileo timed the swing by pulse. In addition, he was the first European to really study this phenomenon and he discovered that their regularity could be used for calculate the local gravity. For Galileo his pendulum was the light but generally speaking a pendulum can be defined as a body suspended from a fixed point which swing freely by the motion of gravity and momentum. It is used to regulate the movements of clockwork and other machinery. In its simplest form and avoiding the math there are three parts to the basic laws of a pendulum. First the time for each oscillation is depending on the length of the strings. In addition, mass of the bob does not affect the motion at all. Second, a pendulums horizontal speed is the same as the vertical speed would be, if the bob had fallen from its highest point. Thirdly, the square of period of the bob is inversely proportional to free fall acceleration and the square of period of the body is proportional to length of the pendulum The background definition and the laws of a pendulum can be used to calculate the free fall acceleration. Using a simple gravity pendulum like Galileos Pendulum System, I would like to show how to find the best ways in order to test free fall acceleration. Methods 1. Experiment equipment: Protractor Steel Bob Stopwatch Vernier Caliper Iron Support Stand Meter Ruler Inelastic String 2. Apparatus setup Figure1-1 Figure1-1 shows that iron support stand was put beside edge of test desk in case the height of stand was shorter than the length of test string. Next, the steel ball was hung by an inelastic string and the iron support stand was used to support the weight of steel ball. Last, the clip was clamped to the string in order to keep a constant length. At the same time, the bob swing in a vertical surface which parallels the stand. 3. Procedures First of all, the simple pendulum was made up by hanging a bob from the top of stand and the bob was released in a constant height, then protractor was used to control the degree between 5 and 15 to normal line. Secondly, pendulum would begin to oscillate in vertical surface in a regular action, and then the stop watch was used to record the time of each swing. Finally the most important data which describes this oscillation is period and we did different types of test by different length of string, like 30cm, 45 cm, 60 cm, 75 cm, 90cm, 105 cm, and 120 cm. Results Table of result Experiment times Length of string (cm) Trials: 1 Trials: 2 Total Average period Oscillationtimes Average period of each swing T2 (second square) Time taken for one complete Oscillation(seconds) 1 30cm 56.60s 56.50s 56.55s 50 times 1.13s 1.28s2 2 45 cm 68.60s 68.50s 68.55s 50 times 1.37s 1.88 s2 3 60 cm 79.00s 78.90s 79.00s 50 times 1.58s 2.50 s2 4 75 cm 87.60s 87.90s 87.75s 50 times 1.76s 3.08 s2 5 90 cm 96.05s 96.00s 96.05s 50 times 1.92s 3.69 s2 6 105 cm 104.00s 104.00s 104.00s 50 times 2.08s 4.33 s2 7 120 cm 110.50s 111.00s 110.75s 50 times 2.22s 4.91 s2 Table-1.1 Table-1.1 shows the data of 7 experiments using different length of string and how the data changed, as the length of string was increased; the period of each oscillation was increase as well. L is the distance from the frame of the stand to the center of the mass; the length includes the radius of ball. The period of oscillation is the time required for the pendulum to complete one swing. For one complete swing, the steel ball must move from the left to the right and back to the left. T2 can be understood as the square of the period of oscillation, the equation below shows how T2 was calculated. Square both sides: T2= 4 Ãâ€" Ï€2 Ãâ€" (L/g) T2 = L Ãâ€" (4 Ãâ€" Ï€2 à · g) Multiply both sides by g g Ãâ€" T2 = 4 Ãâ€" Ï€2 Ãâ€" L Divide both sides by T2 Discussion and Analysis The results of experiment show the relation between T2 and length of string. To turn to discuss the results it is important to understand some key ideas, there are controlled variable, experimental variable, error and uncertainty. Firstly, according to Science Buddies(2009) said that a controlled variable can be defined as the factor which is unchanged or kept constant to prevent its effects or error on the outcome. It was verified the behavior of the relationship between independent and dependent variables. The factors which can be regarded as controlled variable were steel ball, oscillation times; the angle of each swing and the height when the steel ball was released. An answer from wiki (2009) the definition of experimental variables is the variable whose values are independent of changes in the values of other variables. Experimental variable in this experiment is the length of string. According to dictionary the error can be defined as a deviation from accuracy or correctness. And the uncertainty means that the lack of certainty, a state of having limited knowledge so that it is impossible to exactly describe existing phenomenon or future outcome confidently.Errors were caused by any individual who could be affected by many factors. Such as before we measure the length of string, we need to measure the radius of ball by vernier caliper in case the string is shorter than actual length. Secondly, we need to take care of how much oscillation times we did. Thirdly, we need to keep the pendulum swing in a same surface in case the extra energy was wasted. At last, taking more time measurements of experimental variable which is length of string may be more accurate average for each trial. Find two point from the graph A(x1, y1) B(x2, y2), use the formula (y2-y1)/(x2-x1) the result of gradient is 4.03. The table shows the results of free fall acceleration Gradient(T2/L) 4.03 Calculate data in using formula G 9.79ms-2 Confines of Error 0.22% Table2-1 To summarize the weakness that is error and uncertainty and calculating the acceleration of gravity to within 5%, and table 2-1 shows that the experiment obeys the allowable confines. Confines of Error were calculated by the difference between actual gravity and what I got, and the values were divided by the actual values. Conclusion To sum up, the calculation of Galileo that free fall acceleration from the formula, this can infer the result of free fall acceleration. I need to compare the calculation of Galileo which free fall acceleration should be 9.81ms-2. In fact, a gravity pendulum is a complex machine, depending on a number of variables for which we are ready to adjust. In addition, firstly we try to understand the method that Galileo did in 1600s, and making a plan to have a complete the system. Then form the data I found some different values about gravity, and the factor to influence the values. The main factor is that the different length of string influence the period instead free fall acceleration, the period square and length have a constant ratio to calculated the acceleration. Turning to Dohrman, P (2009) it can be argued that the factors which influence the fact are length of the string, period of each cycle by using those two factors we can get the local gravity. All above those factors can influence the values of free fall acceleration, and we got the less number than actual values. I need to take care of them and have an improvement. For instance, first difficulty is that measuring the length is deciding where the centre of the bob is. The uncertainty in determining this measurement is probably about 1 mm. Secondly, the stopwatch measures to 50 of oscillation although the overall accuracy of the time measurements may be not certain. According toDohrman (2009) the human reaction time to start and stop the watch has a maximum range of 0.13 seconds and the average is0.7. Finally, 9.79ms-2 was calculated by the gradient and the formula in part of result.

Wireless networks: Security

Wireless networks: Security WIRELESS networks ,due to ease of installation ,cost benefits and the capability of connectivity , hence communication anywhere ,has made it the most popular way of network setup in this 21st century. With increase in the need of mobile systems, the current electronic market has also been flooding with laptops, pdas, RFID devices, healthcare devices and wireless VOIP (Voice over IP) which are WIFI (Wireless Fidelity) enabled. With the 3G (Third Generation) and 4G (Fourth Generation) cellular wireless standards, mobiles phones are also WIFI enabled with very high speed being provided for data upload and download .Nowadays a malls and public areas not mention even cities are WIFI capable, enabling a person to access the internet or even contact a remote server in his office from anywhere in that city or even from his mobile phone while just strolling down the road. But as every good technology has its own drawbacks so does the wireless networks .Just as in the case of wired networks they are also prone to intruder attacks or more commonly known as Wireless hacking thus compromising the networks , security, integrity and privacy. The basic reason for this is when the wireless network was first introduced, it was considered to have security and privacy built into the system while transmitting data. This misconception had basically arisen because wireless system transmitters and receivers used spread spectrum systems which have signals in the wide transmission band. Since the RF(Radio Frequency ) receivers which at that time could only intercept signal in the narrow transmission band these wireless signals were potentially considered in the safe zone .But it did not take long to invent devices that could intercept these wireless signals as well .Hence the integrity of data send over wireless networks could be easily compromised .With the developme nt of technology so has the methods and ways in which a network can be attacked become more vicious . Fig-1: WLAN (Wireless Local Area Network) Security of wireless networks against such vicious attacks is hence the become the priority for the network industry. This is because not all networks are equally secure .The security depends on where this network is used. For example, if the requirement of the wireless is to provide a wireless hotspot in a shopping mall then then the security of this is never concerned with but if its for a corporate they have their own security authentication and user access control implemented in the network. II. WHY WIRELESS networks are prone to attacks? There are number of reasons why wireless networks are prone to malicious attacks .These are the most challenging aspects to eb considered when a secure wireless network has to be established. a) Wireless network are open networks: The reason for this is that there is no physical media protecting these networks .Any packet transmitted and received can be intercepted if the receiver has the same frequency as the transmitter receiver used by h wireless network .There is also a common misconception that if the authentication and encryption are properly used the network will not be compromised .But what about the messages send back and forth before the authentication and encryption comes into play ? b) Distance and Location: The attacker can attack from any distance and location and is only limited by the power of the transmitter .Special devices have been designed which can attack even short distance networks such the Bluetooth c) Identity of the Attacker: Attacker can always remain unidentified because he uses a series of antennas or other compromised networks before reaching the actual target. This makes wireless network attackers very difficult to track. Some of the reasons why such attacks are so common is because of the easy availability of information from none other than the Internet, easy to use cheap technology and of course the motivation to hack . III. wireless hacking step by step To understand the security protocols for wireless networks currently in use, first it is important to understand the methods through which a weak network is attacked by a hacker .These are also known as wireless intrusion methods . A. Enumeration: Also know as network Enumeration, the first and foremost step to hacking which is finding the wireless network. The wireless network could be any specific target or even a random weak network which can be compromised and used to attack other end systems or networks .This feat is achieved by using a network discovery software which are now a days available online in plenty, to name a few are Kismet and Network stumbler . In order to have more information about the network, the packets that are send and received by the network can sniffed using network analyzers also known as sniffers .A large number of information can be obtained by using this including IP address, SSID numbers even sensitive information such as MAC address , type of information and also the other networks that this compromised end system. Yet another problem faced is the use of network mappers which can be used to find he servers that run these compromised networks hence also attacking these servers which could then affect proper functioning and information transfer between these servers and to other networks connected to it . B. Vulnerability Assesment: This is mainly done by the hacker y using a vulnerability scanner .After the hacker has found the network he want to attack he uses this program in order to detect the weakness of the computer , computer systems networks or even applications. After this the intruder decided on the most possible means of entry into the network. C. Means of Entry: IV. TYPES OF THREATS ATTACKS A. Eaves Dropping and Traffic Analysis: This is the form of attack that makes use of the weak encryption of the network .This always compromises the integrity and security of the network .All attacks such as war driving , war chalking ,packet sniffing traffic analysis all fall under this category B. Message Modification: These attacks are mainly used to modify the data that is send across a network .The modification might be giving wrong information or also adding malicious content to the data packet send form one station to another .This compromises the integrity and privacy of the Data . C. Rogue Devices: Theses could be devices such as APS , application software programs which has been compromised by the intruder and made to function according to him/her. Such devices can compromise the integrity of the network as well as the data send across it .These devices can also launch reply attacks and also make the network associated to malicious content websites or information. D. Session Hijacking: This attack occurs after a valid session has been established between two nodes to through the AP.In the attacker poses as a valid AP to the node trying to establish connection and a valid node to the AP .The attacker can then send malicious or false information to the node that the connection has already been established with .The legitimate node believe that the AP has terminated he connection with it . The hacker can then use this connection to get sensitive information from the network or the node . E. Man In the Middle Attacks: This is similar to that of a session hijacking attack but in this case it is a rogue AP that acts as valid client to the legitimate AP and valid AP to the legitimate client .Once this has been established the rogue AP can access all information from the , intercept communication , send malicious information to other clients through this . These are just few of the security threats and attacks in wireless environments .With the advancing technologies there many more possible security threats that can be faced by these networks in the future. V. BASIC REQUIREMENTS IN WIRELESS NETWORK SECURITY With the vulnerability of wireless networks ,security and countering o such malicious attacks have become one of the top priorities addressed by enterprises ,corporate as well as research fields in IT .There are many pints to be considered when the security of a network is concerned the most important f which are : authentication, accountability and encryption . A. Authentication: This is very familiar to anyone using a network in his or her work place or even accessing he email on the internet and the very first step in promoting a secure wireless network . .There many different ways of authentication and many different tools and methods have been used over the years in order.. make the primary process, more reliable and fool prof.Some of the most widely used methods are : a) User name and Password combinations generally defined as something that a person knows. b) Smart Card, RFIDs and Token technologies also known as something that a person has c) Biometric Solutions such as finger printing , retina scanning which can be generally defined as something that a person is or are. Now the reliability of each one of these methods can vary depending on the level on which it has been implemented .In the case very low level authentication s only one kind of method I used to secure the network .One of the weakest forms of authentication can be considered as the use of only ID card or token technologies as if a person looses this , he can compromise the security of the network .Even in the case of username and password the strength of the authentication is only as good as the complexity of the information used as username or even password .People generally prefer to use passwords that are easy to remember but also known to many other people in that organization or even outside One of the much better ways of securing a network through authentication is to use biometric solutions such as fingerprinting or retina scanning .But of course technology has advanced to the extend that even fingerprints or even retinas can be forged .Nowadays a number of methods of combinatio nal methods are used as authentication with high security premises or networks guarded by more than two or three kinds of authentications . B. Accountability After a user has been authenticated to use the network it is important to have t able to track the computer usage of each person using the network so that incase of any foul play the person responsible can be held responsible .When the networks were very small it was very easy f a network administrator to track the usage of each person on a network .But with huge networks, remote access facilities and of course the wireless networks it has become quite a difficult task .AS mentioned earlier , there are many ways in which a hacker can make himself difficult to track down .Many softwares and firmwares have been created which is used in conjecture with the authentication protocols inoder to make the wireless network more secure and robust . C. Encryption: This is the most important step in building and securing a strong wireless network infrastructure .he steps generally followed for this are : a) Methods based on public key infrastructure (PKI) b) Using high bit encryption scheme c) Algorithm used for encryption must be well known and proven to be very unbreakable. Current wireless network security solutions can be classified into three broad categories: a) unencrypted solutions b)encrypted solutions c) combination. In this paper with emphasis as explained in the abstract will eb on encrypted solutions for wireless security. A brief discussion on the unencrypted methods has still been given for basic understanding. I n the case of encryption based security protocols ,a details description is given about the ones that are commonly used in wireless LANS in this paper .After which the latest and developing technologies will be discussed .The three major generations of security as existing today and also cited in many papers ,journals and magazines are as follows : 1) WEP (Wired Equivalent Privacy) 2) WPA (Wi-Fi Protected Access) 3) WPA2 The image below shows the layer in which the wireless network security protocols come into play which is of course the link layer: Fig-1: 802.11 AND OSI MODEL VI. WIRELESS SECURITY UNENCRYPTED A. MAC Registration: This is one of the weakest methods network security..MAC registration was basically used to secure university residential networks as college apartments or dorm rooms. The basic way of doing this is to configure DHCP (Dynamic Host Configuration Protocol) to lease IP address to only a know set of MAC address which can be obtained manually by running automated scripts on a network server so basically any person with a valid registration can enter into the network .Session logs also cannot be generated because of which accounting of the logs become impossible. Last but not the least since this method of securing was basically used for switched and wired networks encryption was never included. B. Firewalls: In this method, network authentication is one through either HTTP( Hyper text Transfer Protocol),HTTPS or telnet .When an authentication requirement is received by the network it is directed to the authentication server .On validating the authentication the firewalls add rules to the IP address provided to that user , This IP address also has timer attached to it in order to indicate the rule time out of this IP address. When executed through HTTPS it is basically a session based as well as a secure process .But any other process which is adapted from a switched wired network firewalls does not provided encryption. C. Wireless Firewall Gateways : One of the most latest as well as considerably fool proof method in unencrypted solutions in Wireless Firewall Gateways or WFGs.This is a single wireless gate way is integrated with firewall, router, web server and DHCP server and its because of all these being in one system that makes WFGS a very secure wireless security solution. When a user connects to the WFG, he/she receives a IP address form the DHCP serve .Then the web server ( HTTPS) asks for a user name and password and this is executed by the PHP ( Hypertext Preprocessor).Address spoofing and unauthorized networks are avoided by PHP as the DHCP logs are constantly compare with the current updated ARP(Address Resolution Protocol).This verifies that the computer that is connect to the network is using he the IP address that has been leased to it by the DHCP server .Then this information is passed on to the authentication server which in turn adds rules to this IP address .Up ne the expiration of the DHCP lease the sessions ar e terminated . The WFGS hence make the authentication and accountably pat f the network more reliable ,But as this is also an unencrypted method it lacks the most important accept of security. VII. WEP-WIRED EQUIVALENT PRIVACY This protocol was written in accordance with the security requirements required for IEE 802.11 wireless LAN protocol .IT is adapted from the wired LAN system and hence the security and privacy provided by it is also equivalent to the security and privacy provided a wired LAN. Through its an optional part of wireless network security, it will give a considerably secure networking environment. The algorithm used in WEP is known as the RC4(Rivest Cipher 4) .In this method a pseudo random number is generated using encryption keys of random lengths .This is then bound with the data bits using a OR(XOR) functionality in order t generate an encrypted data that is then send .Too look at in more in detail : A. Sender Side: The pseudo random number is generated using the 24 bit IV(initialization Vector ) given by the administrator network and also a 40 r 104 bit secret key or WEP key given by the wireless device itself. Which is then added together and passed on to theWEP PRNG (Pseudo Random Number Generator).At the same time the plain text along with an integrity algorithms combined together to form ICV (integrity check value) .The pseudo number and the ICV are then combined together to form a cipher text by sending them through an RC4.This cipher text is then again combined with IV to form the final encrypted message which is then send. Fig-2: WEP SENDER SIDE B. Receiver Side: In the receiver side the message is decrypted in five steps .Firs the preshared key and the encrypted message are added together .The result is then passed through yet another PRNG .The resulting number is passed through an CR4 algorithm and this resulting in retrieving the plain text .This again combines with another integrity algorithm to form a new ICV which is then compared with the previous ICV t check for integrity. Fig-3: WEP RECIEVER SIDE C. Brief Descriptions: a) Initialization Vector : are basically random bit the size f which is generally 24 bits but it also depends on the encryption algorithm .This IV is also send to the receiver side as it is required for decrypting the data send . b) Preshared Key: is more or less like a password .This is basically provided by the network administrator and is shared between the access point and all network users c) Pseudo Random Number Generator: This basically creating a unique secret key for each packet sends through the network. This is done by using some 5 to at most 13 characters in preshared key and also by using randomly taken characters from IV. d) ICV and Integrated Algorithm: This is used to encrypt the plain text or data and also to create a check value which can be then compared y the receiver side when it generates its own ICV .This is done using CRC (Cyclic Redundancy Code) technique to create a checksum .For WEP, the CRC-32 of the CRC family is used. D. RC4 Algorithm: RC$ algorithm is not only proprietary to WEP .IT can also be called a random generator, stream cipher etc .Developed in RSA laboratories in 1987 , this algorithm uses logical functions to be specific XOR to add the key to the data . Figure 5: RC4 Algorithm E. Drawbacks of WEP: There are many drawbacks associated with the WEP encryptions. There are also programs now available in the market which can easily hack through these encryption leaving the network using WEP vulnerable to malicious attacks: Some of the problems faced by WEP: WEP does not prevent forgery of packets. WEP does not prevent replay attacks. An attacker cans simply record and replay packets as desired and they will be accepted as legitimate WEP uses RC4 improperly. The keys used are very weak, and can be brute-forced on standard computers in hours to minutes, using freely available software. WEP reuses initialization vectors. A variety of available Cryptanalytic methods can decrypt data without knowing the encryption key WEP allows an attacker to undetectably modify a message without knowing the encryption key. Key management is lack and updating is poor Problem in the RC-4 algorithm. Easy forging of authentication messages. VIII. WPA -WIFI PROTECTED ACCESS WPA was developed by the WI-FI alliance to overcome most of the disadvantages of WEP. The advantage for the use is that they do not have t change the hardware when making the change from WEP to WPA. WPA protocol gives a more complex encryption when compared to TKIP and also with the MC in this it also helps to counter against bit flipping which are used by hackers in WEP by using a method known as hashing .The figure below shows the method WPA encryption. Figure 6: WAP Encryption Algorithm (TKIP) As seen it is almost as same as the WEP technique which has been enhanced by using TKIP but a hash is also added before using the RC4 algorithm to generate the PRNG. This duplicates the IV and a copy this is send to the next step .Also the copy is added with the base key in order to generate another special key .This along with the hashed IV is used to generate the sequential key by the RC4.Then this also added to the data or plan text by using the XOR functionality .Then the final message is send and it is decrypted by using the inverse of this process. A. TKIP (Temporal Key Integrity Protocol): The confidentiality and integrity of the network is maintained in WPA by using improved data encryption using TKIP. This is achieved by using a hashing function algorithm and also an additional integrity feature to make sure that the message has not been tampered with The TKIP has about four new algorithms that do various security functions: a) MIC or Micheal: This is a coding system which improves the integrity of the data transfer via WPA .MIC integrity code is basically 64bits long but is divided into 32 bits of little Endean words or least significant bits for example let it be (K0 , K1) .This method is basically used to make that the data does not get forged . b) Countering Replay: There is one particular kind of forgery that cannot me detected by MIC and this is called a replayed packet .Hackers do this by forging a particular packet and then sending it back at another instance of time .In this method each packet send by the network or system will have a sequence number attached to it .This is achieved by reusing the IV field .If the packet received at the receiver has an out of order or a smaller sequencing number as the packet received before this , it is considered as a reply and the packet is hence discarded by the system . c) Key mixing: In WEP a secure key is generated by connecting end to end the base layer which is a 40 bit or 104 bit sequence obtained for the wireless device with the 24 bit IV number obtained from the administrator or the network. In the case of TKIP, the 24 bit base key is replaced by a temporary key which has a limited life time .It changes from one destination to another. This is can be explained in Phase one of the two phases in key mixing. In Phase I, the MAC address of the end system or the wireless router is mixed with the temporary base key .The temporary key hence keeps changing as the packet moves from one destination to another as MAC address for any router gateway or destination will be unique. In Phase II, the per packet sequence key is also encrypted by adding a small cipher using RC4 to it. This keeps the hacker from deciphering the IV or the per packet sequence number. d) Countering Key Collision Attacks or Rekeying : This is basically providing fresh sequence of keys which can then be used by the TKIP algorithm .Temporal keys have already been mentioned which has a limited life time .The other two types f keys provided are the encryption keys and the master keys .The temporal keys are the ones which are used by the TKIP privacy and authentication algorithms . B. Advantages of WPA: The advantage of WPA over WEP can be clearly understood from the above descriptions .Summarising a few: a) Forgeries to the data are avoided by using MIC b) WPA can actively avoid packet replay by the hacker by providing unique sequence number to each packets. c) Key mixing which generates temporal keys that change at every station and also per packet sequence key encryption. d) Rekeying which provides unique keys for that consumed by the various TKIP algorithms. IX. WPA2-WIFI PROTECTED ACCESS 2 WPA 2 is the as the name suggests is a modified version of WPA in which Micheal has be replaced with AES based algorithm known as CCMP instead of TKIP .WPA can operate in two modes: one is the home mode and he enterprise mode .In the home mode all he users are requires to use a 64 bit pass phrase when accessing the network. This is the sort encryption used in wireless routers used at home or even in very small offices. The home version has the same problems which are faced by users of WEP and the original WPA security protocol. The enterprise version is of course for used by larger organisation where security of the network is too valuable to be compromised .This is based on 802.1X wireless architecture , authentication framework know as RADIUS and the another authentication protocol from the EAP ( Extensible Authentication Protocol ) Family which is EAP-TLS and also a secure key . A. 802.1X: Figure 7: 802.1X Authentication Protocol In order to understand the security protocols used in WPA2 it is important know a little bit about the 802.1X architecture for authentication. This was developed in order to overcome many security issues in 802.11b protocol. It provides much better security for transmission of data and its key strength is of course authentication There are three important entities in 802.1x protocol which is the client, authenticator and authentication. a) Client : is the STA(station) in a wireless area network which is trying to access the network ,This station could be fixed , portable or even mobile. It of course requires client software which helps it connect to the network. b) Authenticator: This is yet another name given to an AP (Access Point).This AP receives the signal from the client and send it over to the network which the client requires connection from There are two parts to the AP i.e. the non control port and the control port which is more of a logical partitioning than an actual partition..The non control port receives the signal and check its authentication to see if the particular client is allowed to connect to the network .If the authentication is approved the control port of the AP is opened for the client to connect with the network. c) Authentication: RADIUS (Remote Authentication Dial in User Service) server .This has its own user database table which gives the user that has access to the he network, this makes it easier for the APs as user information database need not be stored in the AP .The authentication in RADIUS is more user based than device based .RADIUS makes the security system more scalable and manageable. Figure 8: EAP/RADIUS Message Exchange B. EAP (Extended Authentication Protocol): The key management protocol used in WAP2 is the EAP (Extended Authentication Protocol).It can also be called as EAPOW (EAP over wireless).Since there are many versions of this protocols in the EAP family it will advisable to choose the EAP protocol which is very best suited for that particular network .The diagram and the steps following it will describe how a suitable EAP can be selected for that network : a) Step1: By checking the previous communication records of the node using a network analyser program, it can be easily detected if any malicious or considerably compromising packets has been send to other nodes or received from to her nodes to this node . b) Step 2: By checking the previous logs for the authentication protocols used, the most commonly used authentication protocol used and the most successful authentication protocol can be understood. Figure 9: EAP Authentication with Method Selection Mechanism c) Step 3: The specifications of the node itself have to be understood such as the operating system used the hardware software even the certificate availability of the node. After all this has been examined the following steps can be run in order to determine and execute the most suitable EAP authentication protocol: 1. Start 2. if (communication_record available) then read communication_record; if(any_suspicious_packets_from_the_other_node) then abort authentication; go to 5; else if (authentication record available) then read authentication record; if (successful authentication available) then read current_node_resources; if (current_node_resources comply with last_successful_method) then method = last_successful_method; go to 4; else if (current_node_resources comply with most_successful_method) then method = most_successful_method; go to 4; else go to 3; else go to 3; else go to 3; else go to 3; 3. read current_node_resources; execute method_selection(current_node_resources); 4. execute authentication_process; 5.End X. RSN-ROBUST SECURITY NETWORKS RSN was developed with reference to IEEE 802.11i wireless protocol .This connection can provide security from very moderate level to high level encryption schemes .The main entities of a 802.11i is same as that of 802.1x protocol which is the STA (Client), AP and the AS (authentication server).RSN uses TKIP or CCMP is used for confidentiality and integrity protection of the data while EAP is used as the authentication protocol. RSN is a link layer security i.e it provides encryption from one wireless station to its AP to from one wireless station to another..It does not provided end to end security IT can only be used for wireless networks and in the case of hybrid networks only the wireless part of the network . The following are the features of secure network that are supported by RSN ( WRITE REFERENCE NUMBER HERE) : a) Enhanced user authentication mechanisms b) Cryptographic key management c) Data Confidentiality d) Data Origin and Authentication Integrity e) Replay Protection. A. Phases of RSN: RSN protocol functioning can be divided in the five distinct phases .The figure as well as the steps will describe the phases in brief: a) Discovery Phase: This can also be called as Network and Security Capability discovery of the AP.In this phase the AP advertises that it uses IEE 802.11i security policy .An STA which wishes to communicate to a WLAN using this protocol will up n receiving this advertisement communicate with the AP .The AP gives an option to the STA on the cipher suite and authentication mechanism it wishes to use during the communication with the wireless network. Figure 9: Security States of RSN b) Authentication Phase: Also known as Authentication and Association Phase .In the authentication phase, the AP uses its non control part to check the authentication proved by the STA with the AS .Any other data other than the authentication data is blocked by the AP until the AS return with the message that the authentication provided by the STA is valid .During this phase the client has no direct connection with the RADIUS server . c) Key Generation and Distribution: During this phase cryptographic keys are generated by both the AP and the STA. Communication only takes place between the AP and STA during this phase. d) Protected Data Transfer Phase: This phase as the name suggest is during which data is transferred through and from the STA that initiated .the connection through the AP to the STA on the other end of the network. e) Connection Termination Phase: Again as the name suggests the data exchanged is purely between the AP and the STA to tear down the connection

Saturday, July 20, 2019

A Technophobic Confession :: Personal Narrative Computers Papers

A Technophobic Confession I am a technophobe. There, I admitted it. The Unabomber, George Orwell, my hardheaded grandfather and I are all members of the same fraternity. I am in the closet no longer. Just because I don't blow up buildings doesn't mean I'm not afraid of the unrelenting onslaught of technology. I went to high school in a small town in rural Illinois, and until the age of sixteen, I was able to survive without touching a computer. In fact, the only one I remember seeing on a regular basis was the one in the corner of the public library. Up until my junior year in high school, that computer was just about the loneliest thing in the world. Most of the people in town used a computer for one of two things: word processing or playing video games, and anybody who really had any desire to do either of these owned a computer or had access to one at work. The librarian's daughter used to set books on top of that computer when she was sorting them out to be reshelved. I always thought of the computer as just that, an overglorified bookrack. I laughed to see a tall, precariously balanced pile of books on top of the monitor, which was all but hidden by its dust cover body bag. I laughed because I am a technophobe, and to see it being used in this manner reassured me that computers were, quite obviously, a waste of time and money. Then the e-mail epidemic began cropping up in cities across the nation, and it spread quickly. Like all innovations, it eventually made its way to the Middle West. The outbreak in my hometown started where I least expected it: in that eternally slumbering computer sitting underneath the stack of book returns. It happened overnight. The computer was wired to the Internet. The small weekly local paper pushed the Knights of Columbus hall off the front page to run a story about the Information Superhighway. Clouds brooded on the horizon and little children tossed uneasily in their sleep. I was good friends with the librarian’s daughter. We went to the same high school. She was in my circle of friends. We were juniors. She was the first to get an email address.

Friday, July 19, 2019

Rabies Prevention :: Biology Medical Biomedical Disease

Rabies Prevention This writing is mainly about the vaccines or the products that can be used to prevent Rabies. Its states the names of a couple of vaccines such as preexposure phophylaxis and Rabies immune globulin. And it explain how each of them work or what they do. It names some kinds of people who are at daily exposure or at risk of obtaining Rabies. It also says who long the Rabies immune globulin has effect. Rabies is a very dangerous thing once you get it, because once you get the symptoms for Rabies there is nothing anyone can do about it. There just isn’t any treatment after the symptoms have shown. But just a couple of years ago scientists made a vaccine that can cause immunity after it is given to the patients. There is two different periods it can be used. One is used before the person gets Rabies and the other is used while the person already has Rabies. The one that is used before the person has Rabies is called Preexposure prophylaxis. And the one that is used while the person has Rabies is called Postexposure prophylaxis. Even though Rabies are rare to humans it is estimated that 18,000 people are vaccinated with Preexposure prophylaxis and 40,000 people are vaccinated for Postexposure prophylaxis in a yearly basis. Preexposure prophylaxis is usually given to people in daily risk of obtaining Rabies such as animal handlers, veterinarians and some laboratory workers. It could maybe even be given to a person who comes across or in contact withan infested animal and people who study Rabies or the vaccines for Rabies. People who have been vaccinated for rabies in a period of six months must get a, (serum), blood test for antibody and receive a bit more vaccine. Even though some people feel secure after receiving the preexposure vaccination, its good for them to know that bu using this vaccination it doesn’t eliminate the need fore different medication but it helps by eliminating the need for Rabies immune globulin reducing the doses needed of this vaccination. The vaccines can help by causing immunity in a person whose postexposure might be delayed. And by providing protection from exposure to Rabies. In the United States there is two types of immunizing product against Rabies. One of them is the rabies vaccines which gives the body an active response that produces neutralizing antibodies. And the other is Rabies immune globuling (RIG) which even though it provides a quick immunizing result it is estimated to last 19-21 days which is a very short period of time with the effect. Rabies Prevention :: Biology Medical Biomedical Disease Rabies Prevention This writing is mainly about the vaccines or the products that can be used to prevent Rabies. Its states the names of a couple of vaccines such as preexposure phophylaxis and Rabies immune globulin. And it explain how each of them work or what they do. It names some kinds of people who are at daily exposure or at risk of obtaining Rabies. It also says who long the Rabies immune globulin has effect. Rabies is a very dangerous thing once you get it, because once you get the symptoms for Rabies there is nothing anyone can do about it. There just isn’t any treatment after the symptoms have shown. But just a couple of years ago scientists made a vaccine that can cause immunity after it is given to the patients. There is two different periods it can be used. One is used before the person gets Rabies and the other is used while the person already has Rabies. The one that is used before the person has Rabies is called Preexposure prophylaxis. And the one that is used while the person has Rabies is called Postexposure prophylaxis. Even though Rabies are rare to humans it is estimated that 18,000 people are vaccinated with Preexposure prophylaxis and 40,000 people are vaccinated for Postexposure prophylaxis in a yearly basis. Preexposure prophylaxis is usually given to people in daily risk of obtaining Rabies such as animal handlers, veterinarians and some laboratory workers. It could maybe even be given to a person who comes across or in contact withan infested animal and people who study Rabies or the vaccines for Rabies. People who have been vaccinated for rabies in a period of six months must get a, (serum), blood test for antibody and receive a bit more vaccine. Even though some people feel secure after receiving the preexposure vaccination, its good for them to know that bu using this vaccination it doesn’t eliminate the need fore different medication but it helps by eliminating the need for Rabies immune globulin reducing the doses needed of this vaccination. The vaccines can help by causing immunity in a person whose postexposure might be delayed. And by providing protection from exposure to Rabies. In the United States there is two types of immunizing product against Rabies. One of them is the rabies vaccines which gives the body an active response that produces neutralizing antibodies. And the other is Rabies immune globuling (RIG) which even though it provides a quick immunizing result it is estimated to last 19-21 days which is a very short period of time with the effect.

Thursday, July 18, 2019

History of Electricity Essay

Electricity is one of the greatest discoveries of man, this is simply because it brings light and it has open door to so many other discoveries and invention. Men of today actually depend on this form of energy to live and perform his or her basic duties. Machine of today depend mostly on electricity to function properly. Magnetism, which is an aspect of electromagnetism, is considered one of the fundamental forces of nature (Blume, 2007). Those forces are usually produced by the movements of the charges and this has greatly show the influence of electricity on magnetism or vice versa (that is there is a close relationship between the electricity and the magnetism). Since the forces that hold molecules are considered as electrical force hence there is a great relationship between magnetism and electricity. Most discoveries sorrounding electricity is one way or other linked to the influence or the role of magnetism in electricity. Hence the history of electricity can not be fully describe without greatly considering the history of magnetism because they work together. Electricity is also found in human body as a form of very weak electrical signal that help transmit neural impulses from one part of the body to the other. Electricity can be generated and transmited (as indicated in the above scenario) or it can also be converted into other forms of energy such as heat, light, motion, radiation and even different waves such as radioactive wave, sound waves through different natural means or infrastructure or equiptment constructed by man, hence making this form of energy to be versatile. The versatility of electricity can be seen in these perspective in that it can be stored, hence it has been the stronghold of many appliaces and luxuries people cherish. History of electricity The history of electricity dated back to antiquity when the ancient greeks observed the influence of amber whenever it is rubbed, then, it was found to attract small, light objects. These discoveries never really made any impact or meaning to this generation of greeks until about 600 BC when Greek philosopher Thales of Miletus held that amber had a soul within it which is responsible for the attraction that existed between it and the small, light objects. Hence this claims was later documented and even after about 2000 year of that claims and documentation, only little progress was made about the study of the electricity and magnetism. The real study of magnetism and electricity came into limelight about 1600 with the documentation and publication by William Gilbert someone considered as the father of electricity( Bellis, 2008). He then claim to have discover different material having this potential of attracting one another when rubbed together even apart from the magnetism of amber. William Gilbert(1544-1603), is an English physician and physicist who studied at Saint John’s College, University of Cambrige. He was a physician to the queen of Englan. He is known primarily for his discoveries and experiment in the field of electricity and magnetism. During his lifetime he discover various materials that posses the ability to attract, he first use the term electric to describe the phenomenon of attraction that existed between those materials and coined the word electricity, meaning amber in Latin. He first use the following terms; electric force, electric attraction, and magnetic pole ( Microsoft Encarta, 2008). Another important aspect of his great work was the explanation of the term magnetic compass. Before his description of the magnetic compass, Britain sailors depend on the use of the compass to direct their ship to their destination without the understanding of how the compass works. Some even thought then that garlic odour had an effect on the functioning of the compass, Columbus even thought functioning depend on the attraction of the compass by the pole star ( Bellis, 2008). He’s s greatest contribution has been attributed to his study and demonstration on the magnetic nature of the earth. His works was written as â€Å"Of Magnets, Magnetic Bodies, and the Great Magnet of the Earth†, a scientific work that was considered as the first scientific work written in England (Microsoft Encarta, 2008). Rene Descarte’s in the year 1638, discover the fundamental law of reflection which states that â€Å"the angle of incidence is equal to the angle of reflection†, he also tried to discover the theory of light by describing light as a pressure in a solid medium. Robert Hooke in 1667 disvover what is now called the Newton’s rings by placing two glass plates together and observing the layer of air between them. He discover that there is formation of a ring of lights, and with this same work he define the matching-wave-front derivation of reflection and refraction. He also develp a theory of color where he describe white light as a simple disturbance and colors as a complex distortion of the basic simple white form. In 1672, the electrical conductivity substance was discovered by the German Physicist Otto von Guer, he also describe the first machine that was capable of producing electric charges. However the conductivity of substances was fully established by the experiments conducted by Stephen Gray about 1729. He also establish the facts that there are conductors and insulators. In 1752, Benjamin Franklin, one of the foremost English Inventors began his experiments with a simple apparatus he recieved from his friends (Microsoft Encarta, 2008). He proposed the notion of positive and negative electrical charges. He suggested the experiments that connect the relationship between lightning and electricity. He also suggest that an erect iron can be placed on a building to draw electricity during storm. The experiments and proposal was published in London and carried out in England and France (Microsoft Encarta, 2008). In 1880, Alessandro Volta of Italy is another major contributor to the development of electricity. His contributions was the develepment of alternating discs made up of zinc and copper element, with pieces of cardboard that was soaked in brine between the metals. The construction generate electricity. This invention made him the first person to build an equipment that can generate electricity practically. his invention was the first battery to be made to generate electric which was later constructed to long distance, in a steady and reliable state. He studied what is termed static spark by experimenting with the atmospheric electricity. He also disprove the theory that electricity came from the animal tissue, but made it known with his experiments that electricity can only be generated by contact of different metals in a fluid enviroment. The unit of electromotive force was named after him â€Å"volt† In 1826, Georg Ohm released two papers stating the mathematical description of electrical conduction in circuits. The thesis was based or modeled of Fourier’s study of heat conduction ( Dept of Energy, 2008). The second thesis propose laws meant to guide or explain results achieved while working with galvanic electricity, one of which was the ohm’s law: a law describing the relationship between voltage, current and resistance. He gave the equation of I=V/R. The law states that â€Å"the amount of steady current through a material is directly proportional to the voltage across the material divided by the electrical resistance of the material† ( Dept of Energy, 2008). Micheal Faraday, lived between 1791-1867. He was a physicist and a chemist. He is besk known for his famous discoveries which include the discovery of electromagnetic induction and the laws of electrolysis while the greatest of all his inventions was that of electric motor. He also describe and establish the principle sorrounding the dielectric substances indicating that those materials have different and specific inductive capacities. His role in the electromagnetism is one of the most important because induction can be made to generate electricity. That indicate the clear dependency between magnetism and electricity. The discovery was all about the generation of electricity in a wire by means of magnetism of another wire. He design and created the first electric transformer by the use of the induction ring. These creations led to the design of modern electric motor, electric generator and transformers. His researches also extend to the discovery of the fact that plane polarized light passing through some kind of glass can be made to rotate by the influence of magnetic field. He also proved and established that electricity induced from a magnets while voltaic electricity can be produced by a battery and static electricity are all the same ( Bellis, 2008). Charles Brush who lived between 1849 and 1929 made some contributions to the electromagnetic world. He’s an American and also a great industrialist. He produced the first commercially successful arc lamp, the influence of which was attributed to be a driving force behind the growth of electric lighting industry in America. He further experiment with magnets and invent dynamo, a machine that works on energy conversion principle by converting mechanical energy of motion to electrical energy. He demonstrated the first street lighting and also pioneer the production of modern generator. Thomas Alva Edison invented lightbuld in the year 1879. He is considered as one of the greatest inventors of all time because he invented different machines and equiptment ranging from electric bulb to phonograph and motion picture camera. He also created incandescent light based on the principle of energy conversion. As a result of his role in the electricity discoveries and invention, he seek to create an efficient and modern way of electricity distribution to various homes and offices. George Westinghouse made a perfection of the automatic electric block signal and help developed the first alternating current. He also identified the efficient method of transmitting clean natural gas to each homes. He’s contribution came about the year 1885. Conclusion After the 19 century discoveries, there has been great and tremendous discoveries in the electromagnetic world. The use of electricity has remain inevitable to our lives and this dependency was as a result of the various discoveries that had existed for years. Our future as man will continue to depend on the electricity, even as new discoveries are being made by scientists and researchers. The recent trend of discoveries being the use of solar energy to power up all our daily need. No matter how advancements technology is going to be in the future we and our enviroment will still depend on the influence of electromagnetism as the power behind our back.