Thursday, October 31, 2019

Critical appraisal of a research article Essay Example | Topics and Well Written Essays - 2000 words

Critical appraisal of a research article - Essay Example to take a look at the relevance of the title of the article, whether its summary and abstract are relevant to the point and give enough information on the subject at hand or not, as well as a look at its introduction. Additionally, this paper will take a look at the literature review of the matter the article dwells on (Haberman 2005, p. 28). The title of the article is brief and to the point. Similarly, it is informative of the issue at hand, which is how to retain or keep teachers in challenging schools. Teachers consider the schools to be challenging due to the kind of student behaviors they experience, the difficulty in handling such students and the pressure to deliver results in terms of ensuring that the students perform well and so on, and so forth. When a title is given to a research article or research paper, authors must ensure that it is clear (Olson 2003, p 30). This is for the reason that readers should have the ability to explain what the article is all about without any problem, whatsoever. The wording of the article should be as few as possible; brevity is the target of the endeavor. It is only natural to say that John Brown and Bobbie Greenlee have succeeded in the endeavor. They have effectively given the idea of what the article is all about in the shortest way possible. The terms ‘Retainingâ₠¬â„¢ , ‘Teachers’, ‘Challenging’, and ‘Schools’, all fit this description pretty well (Peske 2006, p. 14). The summary of a research article should be clear and to the point just as the title does. The abstract should not be ambiguous in any way, or else the reader will be thrown off the subject matter. Additionally, the article’s summary should aim at brevity, while at the same time ensuring that the summary conveys as much as possible to the reader. The author of the article should ensure that superfluous words are not part of the summary because this is the point from which the readers need to understand more about the article (Don,

Tuesday, October 29, 2019

Disabled People and the Rights to Social Citizenship Essay

Disabled People and the Rights to Social Citizenship - Essay Example The British government has proffered different definitions of a citizen as components of the various solutions proposed in respect of the extent social, economic and political problems and these solutions have affected the rights of individuals (Young, 1985). The Conservative government under John Major introduced a Citizen’s Charter in order to subject public services to market forces. Accordingly, citizens obtained the right to choose. This development in conjunction with privatization was considered to be the panacea for the ills of the inefficient public services. Citizenship can be perceived either by the individualist approach in which the nature of citizenship is determined by individual choice or the structuralist approach in which the determining factors are social and economic in nature. Further, â€Å"Choice-based theories are exemplified in their purest form by economics†¦. In this world, individuals seek to maximize their utility by obtaining the highest ret urn at the minimum cost from any course of action which they undertake† (Pattie, Seyd, and Whiteley, 2004, pp 138-139).Consequently, â€Å"Citizenship is a status bestowed on those who are full members of a community. [and who] †¦are equal with respect to the rights and duties with which the status is endowed† (Marshall, 1950, p. 28). These rights are of three kinds civil, political or social. The Civil rights are, â€Å"liberty of the person, freedom of speech, thought and faith, the right to own property and to conclude valid contracts, and the right to justice† (Marshall, 1950, p. 10). Political rights comprise of â€Å"the right to participate in the exercise of political power† and social rights are â€Å"the whole range from the right to a modicum of economic welfare and security to the right to share to the full in the social heritage.

Sunday, October 27, 2019

The hydrogen bomb

The hydrogen bomb INTRODUCTION The Hydrogen bomb was first suggested by Edward Teller in 1942 but active work on it was pursued in the summer of 1942 by Oppenheimer,Teller,Los Alamos and others. The first thermonuclear bomb was exploded in 1952 atEnewetak by the United States, the second in 1953 by Russia (then the USSR). Great Britain, France, and China have also exploded thermonuclear bombs, and these five nations comprise the so-called nuclear club—nations that have the capability to produce nuclear weapons and admit to maintaining an inventory of them. Several other nations either have tested thermonuclear devices or claim to have the capability to produce them, but officially state that they do not maintain a stockpile of such weapons; among these are India, Israel, and Pakistan. South Africas apartheid regime built six nuclear bombs but dismantled them later. What is Hydrogen Bomb? Hydrogen bomb is based on nuclear fusion reaction and it deriving a large portion of its energy from the nuclear fusion of hydrogenisotopes. The hydrogen bomb functions by the fusion, or joining together, of lighter elements into heavier elements.The hydrogen bomb is also known as a thermonuclear bomb because extremely high temperatures are required in order to initiate fusion reactions. Hydrogen bomb is based on process called â€Å"Nuclear fusion†. Nuclear fusion is the process by which atomic nuclei join together to form a heavier nucleus. The fusion of two nuclei with lower mass thaniron generally releases energy while the fusion of nuclei heavier than iron absorbs energy. In the simplest case of hydrogen fusion, two protons have to be brought close enough for their mutual electric repulsion to be overcome by thenuclear forceand the subsequent release of energy. H2+H3⇒He4+n+Q Energy release Q=17.6 MeV Design of hydrogen bomb All thermonuclear weapons existing in the world today appear to be based on a scheme usually called the Teller-Ulam design†. It contain the Staged explosion of fission (primary) bomb and fusion (secondary bomb). The fusion bomb is triggered by rapid shock driven compression (Ulam) which is enhanced by radiation pressure (Teller) from released X-ray and ÃŽ ³-ray flux. Primary fision device contain :- core: U239 and U235 plus H2+H3 Booster shell: U238 Tamper High explosive lenses Secondary fusion device contain:- Radiation Channel U239 PU spark plug Li6 ,H2 ,H3 fusion cell U238 Tamper Design of modern Hydrogen-bomb Hydrogen bomb design is based on a bomb casing containing implosion fission bomb and a cylinder casing of U238 tamper). Within the tamper is the Li6 Deuteride fusion fuel and ahollow rod of Pu239 in the centre of the cylinder. Separating the cylinder from the implosion bomb is a shield of U238 and plastic foam that fills the remaining space in the bomb casing The detonation of the trigger bomb will cause the following sequence of events: The fission bomb implodes, emitting X-rays. X-rays heat the interior of the bomb and the tamper prevents premature detonation of the fuel. The heat causes the tamper to expand and burn away,exerting pressure inward against the lithium deuterate. The lithium deuterate is squeezed by about 30-fold. The compression shock waves initiates fission in the plutonium rod. The fission rod gives off radiation, heat and neutrons. The neutrons enter the lithium deuterate and generate tritium. The combination of high temperature and pressure is sufficient for tritium-deuterium and deuterium-deuterium fusion reactions to occur ,producing more heat, radiation and neutrons. The neutrons from the fusion reactions induced fission in the uranium 238 pieces from the tamper and shield. Fission of the tamper and shield pieces produced even more radiation and heat . The bomb explodes. USES AND APPLICATIONS Hydrogen bombs are used as weapons in many countries. Apart from their use as weapons,nuclear explosiveshave been also tested and used for variousnon-military uses. When long term health and clean-up costs were included, there was no economic advantage over conventional explosives. Synthetic elements such aseinsteiniumandfermium, created by neutron bombardment of uranium and plutonium during thermonuclear explosions, were discovered in the first thermonuclear bomb test. In 2008 the worldwide presence of new isotopes from atmospheric testing beginning in the 1950s was developed into a reliable way of detecting art forgeries, as all paintings created after that period contain traces ofcesium-137andstrontium-90, isotopes that did not exist in nature before 1945. An important aspect of fusion energy in contrast to many other energy sources is that the cost of production isinelastic. The cost of wind energy, for example, goes up as the optimal locations are developed first, while further generators must be sited in less ideal conditions. With fusion energy, the production cost will not increase much, even if large numbers of plants are built. It has been suggested that even 100 times the current energy consumption of the world is possible.Some problems which are expected to be an issue in this century such asfresh water shortagescan actually be regarded merely as problems of energy supply. For example, in desalinationplants,seawatercan be purified throughdistillationorreverse osmosis. However, these processes are energy intensive. Even if the first fusion plants are not competitive with alternative sources, fusion could still become competitive if large scale desalination requires more power than the alternatives are able to provide.Despite being technicallynon-renewable, fusion power has many of the benefits of long-term renewable energy sources as well as some of the benefits of the much more limited energy sources as hydrocarbons and nuclear fission. Like these c urrently dominant energy sources, fusion could provide very high power-generation density and uninterrupted power delivery. RESULT AND DISCUSSION In 1945 an atomic bomb was dropped on Hiroshima, it killed at least 70,000 Japanese and many were injured. It is assumed that the hydrogen bomb is 1000 times more powerful than an atomic bomb.[5] So if we use fusion power as source of energy rather than weapons then it should be more beneficial for us. Fusion power would provide much more energy for a given weight of fuel than any technology currently in use,and the fuel itself (primarilydeuterium) exists abundantly in the Earths ocean: about 1 in 6500 hydrogen atoms in seawater is deuterium.Although this may seem a low proportion (about 0.015%), because nuclear fusion reactions are so much more energetic than chemical combustion and seawater is easier to access and more plentiful than fossil fuels, some experts estimate that fusion could supply the worlds energy needs for millions of years. Therefore Hydrogen bomb has both advantages and disadvantages but if we use fusion power as energy source then it should be more beneficial for all of us.

Friday, October 25, 2019

Importance of the Monkey Garden in The House on Mango Street :: House Mango Street

Importance of the Monkey Garden in The House on Mango Street Life as a kid is effortless, where the only motive is to have fun. Some people never want to have responsibility and complexity that comes with being an adult as they realize they must take accountability sometime. Likewise in "The House on Mango Street" by Sandra Cisneros, Esperanza tries her best to avoid is renegade against the normal expectations of women on Mango Street. Esperanza's only way to avoid having to become part of the adult world around her, is by entering The Monkey Garden where she gets to be a kid. Esperanza's depiction of the serene and carefree descriptions of the garden contrast the confused and disturbed attitude Esperanza has towards Sally and the boys' game. As she finally realizes she cannot remain a kid forever, Esperanza feel alienated and alone. Esperanza's overwhelmed tone reveals her fear and doggedness to adversity when sally's game defiles the garden's innocence/purity, exposing Esperanza to the realization that she cannot remain a kid forever. Esperanza's syntax reveals that innocence is irrevocable. Reminiscing of the Monkey Garden Esperanza "suppose[s], the reason why [they] went there" was because it was "Far away from where [their] mothers could find [them]"Cisneros (95). In the garden the kids were able to play without any adults around. The garden became a place of rejuvenation for Esperanza, where only kids were allowed and the horrors of the adult world remain unnoticed. Esperanza observes, "Things had a way of disappearing in the garden, as if the garden itself ate them, or, as if with its old-man memory, it put them away and forgot them."(95). This shows that the garden was a place where things easily went unnoticed and it was not uncommon to loose things. For Esperanza, this represents the place where she is forced into her loss of childhood, and comparing this to a forgetful old man makes sense since when people mature they loose their innocence and childlike attributes. When the boys stole Sally's keys "they were all laughing" and "[Sally] was too" however, "It was a joke [Esperanza] didn't get"(96). The boys take advantage of Sally by stealing her keys so Sally seizes the opportunity to be able to flirt back with them.

Thursday, October 24, 2019

Basic Sentence Structures And Samples

Using the four basic sentence structures in a written work is very important, first as a means of clarity of expression, and second as a means of adding dimension and variety to a written work. For instance, using only simple sentences such as â€Å"The woman eats everything she sees. † will not give continuity to a written work, and will make the work sound and look like an enumeration of things, just a list of everything with nothing to link each of these together.On the outset, it will make the written work ambiguous or difficult to understand. There should be a variety of sentences in a written work, so noticeably, if for instance, the above sentence is followed by a compound sentence like, â€Å"She eats everything but she also chooses what to eat based on her mood. † the above simple sentence acquires another dimension and thus, more clarity.Now if to these two sentences another sentence is added, a complex sentence, like, â€Å"She opens her mouth every time som ething edible is in sight until the item is too big for her mouth. † the idea expressed in the first two sentences becomes even clearer, hence, the function of clarity; and with the introduction of new ideas in the third sentence, more variety is achieved. Finally, with the addition of a compound-complex sentence, such as, â€Å"When she is full, the woman’s stomach distends immensely, and she stops eating.† the ideas come full circle and maximum clarity is achieved. The above sentences may therefore be written as follows. â€Å"The woman eats everything she sees. She eats everything but she also chooses what to eat based on her mood. She opens her mouth every time something edible is in sight until the item is too big for her mouth. When she is full, the woman’s stomach distends immensely, and she stops eating. †

Wednesday, October 23, 2019

Coach Inc. Essay

Recommendations and Justification First, Lew Frankfort should continue to make new, high quality handbags that will impress customers. This will help Coach to continue to grow and prosper. New designs will help attract more customers to buy Coach products. The company can only benefit with new and unique products in the market. If Lew Frankfort can continue to do this Coach can be a leader in the market, which will help the company grow. Second, brand awareness should be increased. It can be increased through social media and e-commerce sites. This will help Coach be well known around the world. The more people know about the company and it’s products the more customers it will attract. Third, Coach should protect its products against counterfeiting. Coach can do this by making sure that no patterns or fabrics are stolen so that they can be made into fakes that look similar to the authentic products. It should also pursue knockoff sellers in Asia. Knockoffs can attract customers to the shops that sell them, wh ich will decrease the customers that shop at actual Coach shops. Fourth, Coach should continue to expand its market globally. It should increase its factory stores to help with the market. In the case it says that factory stores should be no closer than 50 miles from full price stores. This is important because it is a marketing strategy. All of this will continue to expand Coach. Finally, Coach should continue pursuing its plans to expand in Asia. Japan is an important market for luxury goods and China is suppose to become the world’s largest market for luxury goods. Coach needs to build a presence in important locations where competitors have yet to expand to. Dominant Economic Features (PESTEL) Total luxury market is $220 billion with an expected growth rate of about 7 to 8 percent annually through 2015 to get to $350 billion. Most of the growth will come from China and India, which are some of the countries that seem to be emerging. In the case, Coach’s specific target market is identified as being $24-$28 billion. Furthermore, the luxury handbag, leather goods and accessories market is at about $120 billion. It can be noted that the luxury brands are mainly targeted to wealthy customers who want a well-known luxury brand. This luxury brand market continues to prosper since many wealthy people want the status and value of owning these  luxury products. It can also be noted that the luxury market is worldwide. The United States owns 30 percent of the market and Europe also owns 30 percent of the market. Additionally, all of these luxury goods companies use unique strategies to try and create high differentiation. These differentiating factors can include all of the following: styling, reputation, quality, image, and customer service. The case also shows that there is a growing desire for luxury goods by middle class consumers. This could be since most middle class families want to reward themselves with some form of luxury goods. Most of the luxury goods manufacturers in the case were vertically integrated into the function of retail stores. Other designers were made under the supervision of the designer while products by Coach were made by low-cost contract manufacturers. Five Forces Model There is a strong rivalry amongst competitors in the market. Interfirm rivalry is the strongest competitive force in this market. These competitors try to make their products of the finest material and newest styles to compete with one another. Buyers have little leverage in negotiating with manufacturers of luxury goods. Consumers do not have the ability to negotiate the price of luxury goods when in retail stores. According to the case Coach Inc. and several other luxury goods makers continued to maintain the same price each year. The consumers and retailer buyers are weak competitive forces in the market. The bargaining power and leverage of suppliers is also a weak competitive force. There is a competition from substitutes in the market. For instance, there are many substitutes for luxury goods in almost every product category. Several consumers who do not want a luxury good will purchase a substitute product because it is most likely at a much lower cost. There is not a really a threat of a new entry. This can be considered a weak competitive force since it is quite difficult for a new luxury brand to enter the market. The majority of current luxury brands have strong reputations that were built years ago. Because of this they have a strong sense of loyalty from their customers. In summary, there is a small chance of their being a threat of a new entry to take over the market. Buyers and suppliers have almost no leverage when negotiating with sellers, and the rivalry in the industry  excludes price competition. Most consumers are brand loyal and want the actual luxury product, which shows that substitutes will not hurt the market much. Driving Forces As stated before Coach is looking to globalize by expanding in emerging markets in Asia. Coach will continue to expand through social media and e-commerce sites. There is a high preference for differentiated products. The more differentiated the better. Coach also wants to expand its market into Europe. Currently Coach is not very well known in Europe so it could drastically help the company with sales if they can get a growing market in Europe. Market Position of Rivals Coach’s rivals are not leaders of the market as Coach is; however, they do still compete. For example, Coach is not as popular as some of the other competitors in Europe. Each rival has some unique aspect that continues to drag in customers. This could be the fabric, design, or quality of the product being sold. Not only that, but other rivals can be in a less competitive environment in certain countries which can give that industry the upper hand. Key Success Factors for Future Competitive Success To continue to succeed Coach needs to be innovative with all future products. This tends to attract more customers to the market. Coach needs to keep up with rivals to see what is selling that they do not have. This will help Coach compete against its rivals. Industry Outlook Coach as an industry is doing extremely well in the market. It is currently the leader of the market because of its effective marketing strategies. Competitive forces are growing stronger since they have some markets in continents that Coach is not as popular in yet. Furthermore, some of the competitor’s branch out to male customers more that Coach does. The industry does have a sufficient competitive strength to defend against unattractive industry factors. The industry has a few problems here and there, but there is nothing severe. The industry still has plenty of room for growth. Coach can expand into Europe and into the men’s market to grow even larger. How Well the Company’s Present Strategy is Working Coach is currently targeting the lower part of the luxury products (the cheaper part). This market provides the opportunity for more customers than more expensive markets. Coach targets the top 20 percent of Americans by household income unlike other markets who target the top 5 percent. Coach has a multi-tiered retail strategy that has full-price retail sores, department stores, and factory outlets. Coach’s flagship stores carry all of the high priced products. Core stores have the widely demanded products. Having a discount factory outlet store allows Coach to maintain a year-round full price policy in its full price retail stores. Overall Coach has established a great competitive advantage. It’s profit growth performance and its high volume of sales has shown the effectiveness of Coach’s strategy. SWOT Analysis Coach has contracts that guarantee the company access to the highest quality leathers. Coach has negotiated offshore production contracts that helped deliver high product quality and low manufacturing costs. Coach has also leveraged existing brand names by adding various accessory lines. Additionally, Coach has built a multi-tiered retailing approach. They have also cultivated a strong brand awareness around the world. These are all of Coach’s strengths at the current time. Some of Coach’s weaknesses include: a small European presence. Coach is not very well known in Europe as it is in the United States and other parts of the world. Coach has a very small role in the men’s market. Some of Coach’s market opportunities are developing retail locations in Europe since it currently is not well known there. If Coach can do this it can open up a whole new market to increase its sales. Coach needs to develop new product lines that are geared towards men. Coach nee ds to expand into Asia in countries such as China, Japan, and India to help the growth of the company. Some external threats are as follows: weakened brand image and restricted sales outlook. Company’s Strength/Weakness compared to other Rivals One of Coach’s strengths is the industry’s strong customer loyalty. Coach has customers who will pay a lot of money for one of its deluxe products and  it has customers who have been fans of Coach product’s for a long time. One of Coach’s weaknesses compared to other rivals is the fact that it has very little European presence. Some of its rivals have a strong presence in Europe, but this is not the case with Coach. Not only that, but Coach has a very small portion in the men’s market. Some of Coach’s rivals have a strong presence in the men’s market. Furthermore, Coach’s penetration in ancillary markets is small when compared to some of its rivals. These are all of Coach’s strengths and weaknesses compared to other rivals.

Tuesday, October 22, 2019

buy custom DiGeorge Syndrome essay

buy custom DiGeorge Syndrome essay DiGeorge syndrome is a congenital disorder that is present at birth. Its major cause is a deletion within chromosome number 22q11.2 (Yamagishi, 2002). It occurs during embryo development (Molesky, 2011).There is no known cure for this disorder although the outlook for those stricken with this is not usually bad and can differ widely depending on the degree of defect and the affected organs. Babies with this defect usually lack a part of chromosome 22 and rarely defects in chromosomes 10 (Sullivan, 2002). There maybe no detectable chromosome abnormality in some cases. Medical community has found that this defect is rarely inherited with only 6% while 94% is associated with deletion of the chromosome. Babies born with the syndrome illustrate different characteristics including facial abnormalities, cleft palate, smaller parathyroid glands, increased white blood cells in thymus gland, learning disabilities and mental retardation, and symptomatic congenital heart defects (Bastian et al., 1989). Patients presenting to pediatric primary clinic show different symptoms with most common including hands and fingers that twitch or have cramp like spasms of the arms, failure to thrive poor weight gain, diaper rash, diarrhea, long face, among other (Yamagishi, 2002). HPI common include pneumonia, hypernasal, speech, and recurrent infections secondary to immune deficiency. PMH common include Tetrology of Fallot, pulmonary regurgitation as they get older, vascular anomalies of carotid arteries (Sullivan, 2002). Even though there is no cure for this syndrome, an advanced practice nurse may recommend a combination of blood test and chest X-ray if they suspect that a child is suffering from DiGeorge syndrome (Farrell et al, 1999). Initially, fluorescent in situ hybridization (FISH) was used for confirmation to detect 22q11.2 in conjunction with a standard chromosome analysis to detect chromosome arrangements and other abnormalities but array comparative genomic hybridization is used currently (Seroogy, 2012). Therapy depends on each individual patient and age of diagnosis (Bawle, 2010). These concepts have been summarized by Ernestine Wiedenbachs Prescriptive Theory which states that nursing primarily consists of identifying patients and their families needs for help and intervene if need and facilitating and/or implementing a medical plan of care based on the needs and desires of the patient and family (Molesky, 2011). In improving care, a nurse exercises a sound judgment through deliberative, practiced, and educated recognition of symptoms. APN use their clinical judgment to decide the possible implications of symptoms and create a list of differential diagnosis (Tomey Aligood, 2002). They use their skills to implement a diagnostic work-up as accurate as possible to create a diagnosis and implement a plan of care. They are also aware of their selves and appreciate how their personal perspectives affect the care given to the patient. Buy custom DiGeorge Syndrome essay

Monday, October 21, 2019

s In The Closet.

Free Essays on Skeleton\'s In The Closet. Skeletons in the closet It is the year 2112 and the incurable ‘kills all’ disease plagues the world. The disease attacks all forms of life and has spread at such a fast rate that nobody has been able to find a cure. Scientists attempting to find a cure for the disease are more susceptible to catching the disease; this has caused mass hysteria, especially in what remains of the United States of America. People are confined to sealed buildings and old bomb shelters, as the disease has not yet been reported to pass through solid walls. The disease however can pass through cracks in walls having a devastating effect, as it wipes out the large numbers of people that have packed into the building or shelter in a matter of minutes. Human, animal and plant numbers as halved since the outbreak a few days ago, and it seems that even if people keep hiding they will be avoiding the inevitable as at this rate the disease will wipe out human food resources in a matter of days. The wacky President of what was left of the United States of America, George Bush VIII, in light of the crisis promises a large reward to anyone who would free the world from this plague. As nobody can get near to finding a cure before meeting their untimely death since the President’s announcement, President George Bush VIII upped the stakes. The President announced that he would grant the Nobel Peace Prize, fame, fortune and marriage to Super-Galactic-Model Neptula Smith, (who had volunteered for the cause as part of her Charity for the Galaxy Appeal) to the person who would rid the world of the ‘kills all’ disease. Two brothers, Fred and Bob Jones, in the ruined state of Tennessee caught word of the rewards offered for the cure to the ‘kills all’ disease and decided, seeing as they were MAD scientists to start work on the project despite the daunting fact that there was a great possibility that they would die, as had other great scientists of the day. Fre...

Saturday, October 19, 2019

A Passage to India by Forster Essay Example for Free

‘A Passage to India’ by Forster Essay ? â€Å"By close analysis of the structure and language of chapter one discuss how Forster expresses his overall concerns within the novel as a whole via this initial description of the Indian landscape.† Through chapter one of ‘A Passage to India’ Forster does far more than introduce the small town of Chandrapore. In this initial section of the novel the construction of the text reflects the tiered Indian society that becomes the basis for Forster’s deeper exploration of mankind and human behaviour. In addition, the ominous significance of the Marabar Caves within the novel is prefigured via the mysterious imagery used to describe them. This is contrasted by the more optimistic language which is used to describe the ‘overarching sky’ that unifies all men and points towards a hope for the future of peaceful co-existence. At the beginning of the chapter the reader is first introduced to the Muslim aspect of Chandrapore, the lowest tier of the Indian society but perhaps the most resilient. Here what Adela will later refer to as the ‘Real India’ is depicted. Through vivid imagery the area appears akin to a wasteland devoid of any significance. Even the holy river Ganges is described as â€Å"Trailing for a couple of miles†¦scarcely distinguishable from the rubbish it deposits so freely.† It is negative language such as this that creates a compounding sense of desolation about the ‘Real India.’ This of course is entirely necessary in order for Forster to create and convey the contrast between the Indian and English cultures which he believes to be incompatible in this context. Graphic and harsh language permeates the whole of this first section of the chapter creating a highly effective image of the squalor in which the Mohammedan Indians are condemned to live by their English rulers. The streets are â€Å"Mean† the â€Å"Temples ineffective† and the â€Å"Filth† of alleyways deters all but the invited guest.† By describing their quarter in such a way Forster makes the Muslim Indian seem almost sub-human to his readers, this of course, is how they are viewed by the English. They are remarked upon as â€Å"Low† but also as â€Å"Indestructible.† Despite their apparent lack of sophistication, the way in which, â€Å"The general outline of the town persists† comes to reflect the similar way in which the Muslim culture, although suppressed by the English, is based upon strong foundations of religious devotion and an inextinguishable spirit. Forster describes them as â€Å"Swelling here†¦shrinking there† and by doing so creates a very evocative image which captures perfectly the way in which the Indian race move ‘en-mass’ and in harmony, united in their angst to recapture their homeland. As Forster remarks, â€Å"Inland the prospect alters† and the Eurasian, Anglo-India described in the second section of the passage could not present a more stark contrast to that of Islamic Chandrapore. Here the houses belonging to the Eurasians â€Å"Stand on high ground† an important symbol which reflects the way in which the English believe themselves to be above the Indian race both morally and intellectually. It is this attitude of ignorance and racial superiority which will be developed and scathingly criticised by Forster as the novel progresses. Indeed it could be argued that humanity’s unwillingness to understand one another is the underlying theme behind the whole text and that in reality Adela and Mrs. Moore’s passage to India is in fact a deeper analogy for a more complex passage of mankind towards understanding itself. On a second rise of land lies the â€Å"Little civil station.† As the focal point for Eurasian society it is remarked that, â€Å"From here†¦Chandrapore appears to be a totally different place.† This observation encapsulates the way in which the station and its social club both seem to be isolated from the rest of India. Immersed in a fantasy world of British high society the station itself is described as, â€Å"Provoking no emotion† and â€Å"Sensibly planned.† This epitomises the logical mindset of the English, which deeply contrasts that of the spiritual Indian and highlights how even at a simple level of human understanding harmony is not possible between the two cultures creating the â€Å"Muddle† which is colonial India. Britain’s attitude of imposing herself upon other nations, typical of this time period before partition, is something heavily attacked by Forster. Throughout the text he is seen to criticise England replicated in India because to him this is unnatural and false. During the entirety of this second section of the passage Forster adopts a tone of negativity towards the English. Their section of Chandrapore is described as, â€Å"Sharing nothing with the rest of the city except the overarching sky† conveying the way in which they consciously isolate themselves from the Indians. In the overall context of the novel this image becomes very important. As gradually relations between the two races come to deteriorate the sky comes to be the only unifying element between Indian and Englishman. Further more, the way in which the image is echoed throughout the text seems to suggest the existence of a more powerful presence beyond man both physically and in terms of significance within the universe. It is Forster’s belief that ultimately the petty quarrels of man are meaningless in such a vast entity. The final section of the chapter is used by Forster to expand on the concept of the overarching sky. It is described as having a â€Å"Persistent blue core† the stars â€Å"Hanging like lamps from the immense vault† which is the sky and it is elevated imagery such as this which comes to symbolise a hope for the future of mankind. In contrast to the â€Å"muddle† and â€Å"misunderstanding† which covers India and the rest of the earth, the sky instead represents an element which unifies all men. Its persistence represents a hope that one day all the problems of man explored within the novel will pale into insignificance. It could be argued the description of the sky evokes an atmosphere akin to that of the Hindu religion. Forster remarks, â€Å"The sky settles everything† and indeed to Godbole and his fellow Hindus this is to a certain degree true. The unanswerable questions, the answers to which are sought by both Muslim and Christian are left to be pondered by Godbole. He seeks to answer questions about his own spiritual existence and the natural world around him. As a result his passage within the novel becomes one of progression as opposed one to of retreat as is experienced by Aziz and Fielding. The Chapter ends with a final short image of the mysterious Marabar caves. All around â€Å"League after league the earth lies flat,† yet in the south, â€Å"A group of fists and fingers are thrust up through the soil.† These fingers are the ‘Marabar hills’ and seem to point mysteriously towards the heavens above. The way in which they seem to separate themselves from their earthly surroundings suggests an equally unearthly presence about them. This of course will be proved true by the supernatural and inexplicable violation which Adela experiences within their walls. Dark and devoid of humanity they represent an aspect of India that the logical English will never be able to conquer. Therefore it is possible to conclude that the first Chapter of ‘A Passage to India’ can be regarded as a template for the novel as a whole. Almost all of Forster’s overall concerns are indicated by its content and it is clear that the varied description of the Indian landscape comes to symbolise differences between those who inhabit the land. This disjointed construction of society will only increase as the novel progresses ultimately leading to the personal retreat of the novel’s two main characters, Aziz and Fielding whom are unable to stand out as individuals and trapped within the confines of their own cultures. It will be only the deeply spiritual Godbole who is shown to have made any real progress via his own ‘Passage to India’ and of course Mrs. Moore, who despite her death becomes a symbol for hope by the way in which she is revered as a Hindu Goddess. â€Å"A Passage to India† – E.M. Forster Classic notes – www.classicnotes.com ‘A Passage to India’ by Forster. (2017, Jul 10).

Friday, October 18, 2019

Dividend Policys of Companies Essay Example | Topics and Well Written Essays - 1250 words

Dividend Policys of Companies - Essay Example Companies which are in stages of growth or in initial stages normally have a sparing dividend policy because they reinvest or plow back much of their earnings into the company to experience growth and development (Financial Dictionary 2011). Established companies such as blue chips, Unilever and Wal-Mart being some of them, are inclined to relatively liberal dividend payout policies and grant dividends regularly on quarterly or half-yearly basis. For instance, Unilever (bearing a symbol of UL and listed on NYSE) pays a regular dividend every quarter; the most recent payout has been an amount of US$ 0.307 on November 8, 2011. Similarly, Wal-Mart paid a quarterly dividend of US$ 0.365 recently on December 07, 2011; a payment every quarter is being followed by the company. Dividends payment do assure shareholder satisfaction but some research, particularly Modigliani and Miller (MM)’s proposition on irrelevance depicts that a company’s performance and profitability is not affected by its dividend policy. Talking from the shareholder perspective, shareholders are more satisfied when they receive regular flows of dividends, even in small amounts but the factor of regularity ensures their confidence in the company. An irregular or erratic pattern of dividend payouts can lead to bad image for the company and thus an adverse effect on its share in the market. Considering potential investors and their attitude towards a company’s dividend payment patterns or dividend policy, people, according to their stage of investment that is their age, invest accordingly. In the case of stocks, younger or aggressive risk taker individuals invest in growth stocks or stocks that induce capital gains rather than a stream of dividends. Investors in retirement stages or in the later faction of their lives invest in less risky income stocks which payout dividends on a continuous basis forming a regular fixed income. Mini Case – Topic: Dividend Policy Company Na me: Wal-Mart Stores Inc. Description Wal-Mart was founded in the year 1962, with the inauguration of the first Wal-Mart discount store in Rogers, Ark. The company became public as Wal-Mart Stores Inc. on October 31, 1969 and its shares began trading on OTC (Over The Trading) markets in 1970 and were listed on NYSE (New York Stock Exchange) two years later in 1972. The first dividend was declared on March 26, 1974. Wal-Mart Stores Inc. is the 18th largest publicly listed company according to The Forbes 2010 list of Global 2000 big publicly listed companies (The Forbes 2011). The company caters to customers and members more than 200 million times weekly at retail units more than 9,880 under 60 different banners in more than 28 countries. With the world’s highest sales revenue of US$ 405 billion, it employs more than 2 million employees worldwide. Dividend Policy of Wal-Mart Stores Inc Before discussing about Wal-Mart’s dividend policy, its payout history has to be taken into account; the table below depicts the same: Dividend Payment History – Wal-Mart Stores Inc Year 2010 2009 2008 Dividend Per Share* (DPS) (In US$) 1.09 0.95 0.88 Total Dividend (In US$ million) 4,217 3,746 3,586 Dividend Yield (IN US$) 2.1% 1.9% 2.1% *These dividends are paid in four portions on a quarterly basis such as US$0.3025 paid on January 31, 2011. The above table depicts the

Land Power Versus Sea Power Essay Example | Topics and Well Written Essays - 750 words

Land Power Versus Sea Power - Essay Example This dichotomy has not been limited to the perspectives of the Anglo-Americans on hegemonic power. Alexander Dugin, the geopolitical theorist from Russia, argued that this was core to international conflict, contending that these positions are the basis of cultural differences that will be in conflict all the time. This paper aims to discuss the two concepts and show whether they are relevant or obsolete in international relations. Mahan’s idea contends that the potency of a nation is dependent on unobstructed access to the sea in order to conduct trade. His interpretation of sea power was the total of factors and forces, geographical circumstances and tools, operated to attain sea command and secure it from enemies (Gray, 2009). In Mahan’s formulation, sea power included colonies, shipping, and domestic production. America, he said, had to build and maintain a massive combat navy to be fuelled by coal stations in the colonies. His argument was on the basis that the Uni ted States should become internationally competitive for the protection of itself. Mahan articulated ideas on sea power importance and the desire to see an expansionist philosophy for the American nation. Mackinder, on the other hand, extended his land power theory. He said the land surface could be subdivided into various parts. One was the world island that included Africa, Asia, and Europe interlinked together. This combination was the richest, most populous, and largest of them all (Kennedy, 2004). Another part was the offshore islands which included the Japanese and British Islands. Finally, he identified the outlying islands such as Australia, South America, and North America. It was the heartland which he saw as lying at the centre of the island of the world, extending from the arctic to the Himalayas and from the Yangtze to the Volga. During his era, the heartland was that controlled by the empire of Russia, later by the Soviets without the Vladivostok and the area around it . Mackinder predicted that the rimlands, as he called them, would become less relevant as industrialization caught on in the heartlands and as the inland became more accessible by the railway system. This would make land an asset rather than a barrier to communication. Eventually, Russia would tap the massive natural resources and manpower it had and overshadow its fellow powers in the west. Mahan’s theory remains relevant to date especially as far as its logic goes. America’s power in the sea has now turned on the ability of the navy to preserve access to the Eastern part of Asia, as well as the Middle East, which are the theatres of American maritime operations. The strategic gaze of the Americans now lies on Asia as its maritime target. However, costs for such projects are increasing while budget acquisition becomes stagnant. This, in turn, has led to downward pressure on the fleet size of the American Navy. The ability of the Sea Services to carry out the maritime strategy of 2007 is now becoming a doubt. The Chinese Navy, on the other hand, is on a quite different trajectory (Gilboy & Higginbotham, 2012). It now has new aircraft, submarines, and new ships. While these assets may not be equal to the American assets, their fleet is more focused on Asia. With the US placing more focus on a global scale, they could not apply adequate force at a theatre. An ASBM under construction

Essay Example | Topics and Well Written Essays - 500 words - 35

Essay Example These early Christians beliefs are at par with the present day beliefs on the existence, holiness, faithfulness and the power of God. The views of the early Christian teachings on evil, the devil and sin based on the teachings of the three saints are obsolete. In religion, the problem lies with explaining the cause and proof of these ideologies. The saints attribute all evil and sin to the devil. St. Anthony states that he envies all what he considered good and holy (Porter and Prince Danforth, 472). He referred to him as the ‘opponent or the enemy’ who was associated with sins including fornication. They believed that the devil was the cause of all temptations and he targeted those who were staunch believers. According to the early teachings, discipleship was interpreted as living one’s life based on the teachings of Jesus Christ. The disciples were bestowed with the duty of preaching the gospel to many people in accordance to the teachings of Jesus and converting them to Christians through baptism. Discipleship required a lifestyle of selflessness, continuous hardships and in the case of St. Anthony he experienced physical torture (Russel and Amy, 51). These conditions for discipleship are harsh and not legalistic. In the 21st century there are diverse religious beliefs and early principles including discipleship, brotherhood and sisterhood are slowly fading away. The saints viewed the world as full of evil and attributed this to the devil. The saints were not successful in their mission to convert the world. The saints were not irresponsible by trying to withdraw from the world. They were trying to take responsibility for all the evil in the world by taking up the burden of fighting against the ‘enemy’ alone (Kelly, 146). They were just attempting to reinforce the already existing Christian values and not creating an alternative model. Though they managed to convert a few individuals through their discipleship

Thursday, October 17, 2019

Mechanistic Design for SEI Essay Example | Topics and Well Written Essays - 1750 words - 8

Mechanistic Design for SEI - Essay Example They do not have to arrange a meeting with a boss to discuss the internal problems in their teams to consult on the issues what team should they join now. As branches of a tree do not ask permission from a tree to grow in any direction they ‘consider’ appropriate, employees behave the same. Â  Secondly, employees are mobile in choosing the place of work. In traditional organizations with bureaucracy and mechanic approaches to organization design, usually, CEO or his executive vice-presidents are those responsible for changing roles and consequently places of work of employees. A change of a place from a typical ‘box-like’ office to a private office is considered a big success and cannot be achieved only by internal motives of an employee. However, SEI being involved in a kind of business where they have to compete by the power of brains of their employees understands that the better its employees perform the better performs SEI. So, if changing the physical place of work might stimulate the productivity of a particular worker, so be it. According to a case study, employees in SEI usually change the physical place of work up to two times a year (West, and Wind, 27). They do it themselves, without requesting permission, because management empowers them as if they were owners. The same we can find in nature. Bees, for example, have no directions from their queen where particularly should they pollinate flowers, so they ‘have their own ideas’ were to do it. However, they know and understand the ‘corporate’ rules and goals of the hive. Pollen should be delivered no matter from where. They are free to choose the location of their ‘work’ and the same could be said towards the employees in SEI (within reasonable limits, of course). Â  

Litature Essay Example | Topics and Well Written Essays - 1000 words

Litature - Essay Example American Revolution and the declaration of independence play a vital role in the process of identity formation and one can find the subterranean interrelation between American literature and American identity. Technologies and electronic developments affect the reading habit and it also influences the literature in America. American Renaissance is often considered as a hopeful movement that visualized America as the real descendant to the great western civilization. Renaissance which occurred in mid 19th century has paved the way for an overall change in American social as well as literary filed. During the periods of 1800 to 1870, most of the American masterpieces were produced. After a detailed analysis of the history of American literature one can see that after renaissance writers in America followed a new style or method of storytelling and versification. The expression of national spirit is another major characteristic of new American style. Current political and cultural sphere is filled with the evilness of terrorism and other types of crisis. One can feel that literature should illustrate or reflect the evilness and futility of terrorism and other regional polarizations. The exponents of transcendentalism have focused in a new culture based on native rudiments or ‘Americans’. American ideal of individual consciousness and actions is the most significant feature of American style. Ralph Waldo Emerson, one of the striking figures in Renaissance literature has given more emphasis on the philosophy of self reliance which represents the need for the individual to check most of all types of social customs and to change ideas by the commonly accepted standards and values of the community. Self- reliance, individualistic power, enthusiastic feelings about the fascination of power, superior human intelligence and the philosophy of action are visible in American writings during Renaissance period. All

Wednesday, October 16, 2019

Essay Example | Topics and Well Written Essays - 500 words - 35

Essay Example These early Christians beliefs are at par with the present day beliefs on the existence, holiness, faithfulness and the power of God. The views of the early Christian teachings on evil, the devil and sin based on the teachings of the three saints are obsolete. In religion, the problem lies with explaining the cause and proof of these ideologies. The saints attribute all evil and sin to the devil. St. Anthony states that he envies all what he considered good and holy (Porter and Prince Danforth, 472). He referred to him as the ‘opponent or the enemy’ who was associated with sins including fornication. They believed that the devil was the cause of all temptations and he targeted those who were staunch believers. According to the early teachings, discipleship was interpreted as living one’s life based on the teachings of Jesus Christ. The disciples were bestowed with the duty of preaching the gospel to many people in accordance to the teachings of Jesus and converting them to Christians through baptism. Discipleship required a lifestyle of selflessness, continuous hardships and in the case of St. Anthony he experienced physical torture (Russel and Amy, 51). These conditions for discipleship are harsh and not legalistic. In the 21st century there are diverse religious beliefs and early principles including discipleship, brotherhood and sisterhood are slowly fading away. The saints viewed the world as full of evil and attributed this to the devil. The saints were not successful in their mission to convert the world. The saints were not irresponsible by trying to withdraw from the world. They were trying to take responsibility for all the evil in the world by taking up the burden of fighting against the ‘enemy’ alone (Kelly, 146). They were just attempting to reinforce the already existing Christian values and not creating an alternative model. Though they managed to convert a few individuals through their discipleship

Litature Essay Example | Topics and Well Written Essays - 1000 words

Litature - Essay Example American Revolution and the declaration of independence play a vital role in the process of identity formation and one can find the subterranean interrelation between American literature and American identity. Technologies and electronic developments affect the reading habit and it also influences the literature in America. American Renaissance is often considered as a hopeful movement that visualized America as the real descendant to the great western civilization. Renaissance which occurred in mid 19th century has paved the way for an overall change in American social as well as literary filed. During the periods of 1800 to 1870, most of the American masterpieces were produced. After a detailed analysis of the history of American literature one can see that after renaissance writers in America followed a new style or method of storytelling and versification. The expression of national spirit is another major characteristic of new American style. Current political and cultural sphere is filled with the evilness of terrorism and other types of crisis. One can feel that literature should illustrate or reflect the evilness and futility of terrorism and other regional polarizations. The exponents of transcendentalism have focused in a new culture based on native rudiments or ‘Americans’. American ideal of individual consciousness and actions is the most significant feature of American style. Ralph Waldo Emerson, one of the striking figures in Renaissance literature has given more emphasis on the philosophy of self reliance which represents the need for the individual to check most of all types of social customs and to change ideas by the commonly accepted standards and values of the community. Self- reliance, individualistic power, enthusiastic feelings about the fascination of power, superior human intelligence and the philosophy of action are visible in American writings during Renaissance period. All

Tuesday, October 15, 2019

Home School vs. Public School Essay Example for Free

Home School vs. Public School Essay I prefer home schooling over public schooling; which one do you prefer? There are both pros and cons for both Home Schooling and Public Schooling. I am going to explain this all to you in my essay. I personally was home schooled for a few years during middle and high school. All of elementary school and part of middle school I went to a regular school. My reasoning for choosing to be home schooled is I have Agoraphobia which is an anxiety disorder caused by situations where people perceive the environment as being difficult to escape or get help. As soon as I would walk into a class room I would have a panic attack. One thing I liked about public school was being able to play volleyball. I loved playing it for the little bit of time that I was in middle school. Even though I wasn’t really all that great, So I didn’t play very much. That is one con of being home schooled. You cannot play sports affiliated with any school. A pro for public schooling is you have a group environment to learn in with others to help you. On the other hand with home schooling you are on your own. In home schooling you have less choices of curriculum as you would if you were going to public school. You also have more diversity in public school. When going to public school you have a higher student to teacher ratio, now with home schooling there is a small teacher to student ratio. In home schooling you are free to choose your schedule, as in public school your schedule is strict and chosen for you. Public school chooses the curriculum for you. Unlike in home schooling you can choose your own. There are now roughly millions of children being home schooled. Being home schooled teaches students to be independent in their learning choices. Sometimes home schooling can be more expensive than going to public school. Teachers are not always qualified to teach all subjects, and colleges sometimes have stricter admission policies concerning home schooled students. It is also harder to provide social interaction when being home schooled. Like I had stated before I prefer home schooling but everyone has their own opinions. This is the reason why I have enrolled myself into the University of Phoenix online. So that I can have the flexibility of my classes, this way I can work around my everyday life and not miss out when it comes to spending time with my boys. I hope that the information in my essay was helpful to you.

Monday, October 14, 2019

Phishing and Pharming Attacks

Phishing and Pharming Attacks In this report, it provides overview about phishing and pharming like what is phishing, what is pharming, what are the impacts that caused by phishing and pharming and what are the solutions can be apply to remediate or minimize the chance of being attack by phishing and pharming. Phishing are internet frauds or identity thefts that use to acquire or steal targeted victims sensitive information like personal identity data or financial account credentials. Phishing can be carried out by attackers using social engineering like sending email, through instant messaging (IM), peer to peer (P2P) networks, search engine and other techniques to redirect users to fraudulent website. Pharming is the new twist of internet fraud or identity theft. It is the evolutionary of phishing that used to achieve the same goal, but pharming is more sophisticated. Pharming can be carry out by using technical subterfuge such as DNS cache poisoning, domain hijacking and other techniques to redirect users to fraudulent website or proxy server to solicit users sensitive personal information. Phishing and pharming attack will cause financial impacts on the targeted victims or hard-hit to small organization. It will also cause the undermining of consumers confident in using internet over secure transaction or communication. Beside from this, phishing and pharming will also cause the law investigation become harder. Table of Content Summary2 Table of Content-3 Table of Tables and Figures4 Introduction-5 Method of Phishing Attack-6 2.1. Link Manipulation6 2.2 Filter Evasion7 2.3 Website Forgery7 2.4 Phone Phishing-8 2.5 Example of Phishing9 2.6 Phishing Report-10 Method of Pharming Attack13 How Pharming Works13 DNS cache poisoning16 Domain Hijacking16 Registration of similar sounding domains17 Impact caused by phishing / pharming18 Prevention of phishing and pharming20 Prevention: What to do?20 Prevention: What not to do?-21 Classic phishing defenses 21 Client-side21 Server-side22 Enterprise-22 Additional Pharming-Specific defenses23 Change Management, Monitoring and Alerting-23 Third-party Host Resolution Verification Services-24 DNS Server Patching, Updating and Configuration25 Search Engine Control-26 Conclusion-27 Recommendation29 Reference30 Bibliography31 Appendix32 Template 1.032 Template 2.034 TABLE OF TABLES AND FIGURES Figure 1-9 Figure 210 Figure 311 Figure 412 Figure 514 INTRODUCTION Phishing and Pharming are two of the most organized crimes of the 21st century requiring very little skill on the part of the fraudster. These result in identity theft and financial fraud when the fraudster tricks the online users into giving their confidential information like Passwords, Social Security Numbers, Credit Card Numbers, CVV Numbers, and personal information such as birthdates and mothers maiden names etc. This information is then either used by fraudsters for their own needs such as impersonate the victim to transfer funds from the victims account, purchase merchandise etc., or is sold in a variety of online brokering forums and chat channels for a profit. The Anti-Phishing Working Group (APWG) study indicates that 26,877 phishing attacks were reported in October 2006, a 21 percent increase over Septembers 22,136 attacks and an increase of 70% as compared to October 2005. Through these attacks the fraudsters hijacked 176 brands resulting in huge financial losses and loss of reputation to enterprises. The Gartner study reported that more than 2 million Americans have had their checking accounts raided by criminals in 2004, the average loss per incident being $1,2002. With phishers developing evermore sophisticated attacks, these numbers are bound to increase in the near future. Hence, battling these attacks has become a high priority for Governments and Industry Groups. METHOD OF PHISHING ATTACK Link Manipulation Most methods of phishing use some form of technical deception designed to make a link in an e-mail (and the spoofed website it leads to) appear to belong to the spoofed organization. Misspelled URLs or the use of sub domains are common tricks used by phishers, such as this example URL, http://www.yourbank.example.com/. Another common trick is to make the anchor text for a link appear to be valid, when the link actually goes to the phishers site, such as http://en.wikipedia.org/wiki/Genuine. An old method of spoofing used links containing the @ symbol, originally intended as a way to include a username and password (contrary to the standard). For example, the link http://[emailprotected]/ might deceive a casual observer into believing that it will open a page on www.google.com, whereas it actually directs the browser to a page on members.tripod.com, using a username of www.google.com: the page opens normally, regardless of the username supplied. Such URLs were disabled in Internet Explorer, while Mozilla and Opera present a warning message and give the option of continuing to the site or cancelling. A further problem with URLs has been found in the handling of Internationalized Domain Names (IDN) in web browsers, that might allow visually identical web addresses to lead to different, possibly malicious, websites. Despite the publicity surrounding the flaw, known as IDN spoofing or a homograph attack, no known phishing attacks have yet taken advantage of it.[citation needed] Phishers have taken advantage of a similar risk, using open URL redirectors on the websites of trusted organizations to disguise malicious URLs with a trusted domain. Filter Evasion Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing e-mails. 2.3 Website Forgery Once the victim visits the website the deception is not over. Some phishing scams use JavaScript commands in order to alter the address bar. This is done either by placing a picture of a legitimate URL over the address bar, or by closing the original address bar and opening a new one with the legitimate URL. An attacker can even use flaws in a trusted websites own scripts against the victim. These types of attacks (known as cross-site scripting) are particularly problematic, because they direct the user to sign in at their bank or services own web page, where everything from the web address to the security certificates appears correct. In reality, the link to the website is crafted to carry out the attack, although it is very difficult to spot without specialist knowledge. Just such a flaw was used in 2006 against PayPal. A Universal Man-in-the-middle Phishing Kit, discovered by RSA Security, provides a simple-to-use interface that allows a phisher to convincingly reproduce websites and capture log-in details entered at the fake site. To avoid anti-phishing techniques that scan websites for phishing-related text, phishers have begun to use Flash-based websites. These look much like the real website, but hide the text in a multimedia object. 2.4 Phone Phishing Not all phishing attacks require a fake website. Messages that claimed to be from a bank told users to dial a phone number regarding problems with their bank accounts. Once the phone number (owned by the phisher, and provided by a Voice over IP service) was dialed, prompts told users to enter their account numbers and PIN. Vishing (voice phishing) sometimes uses fake caller-ID data to give the appearance that calls come from a trusted organization. EXAMPLE OF PHISHING As scam artists become more sophisticated, so do their phishing e-mail messages and pop-up windows. They often include official-looking logos from real organizations and other identifying information taken directly from legitimate Web sites. The following is an example of what a phishing scam e-mail message might look like. Figure 1: Example of a phishing e-mail message, which includes a deceptive URL address that links to a scam Web site. To make these phishing e-mail messages look even more legitimate, the scam artists may place a link in them that appears to go to the legitimate Web site, but it actually takes you to a phony scam site or possibly a pop-up window that looks exactly like the official site. These copycat sites are also called spoofed Web sites. Once youre at one of these spoofed sites, you might unwittingly send personal information to the con artists. PHISHING REPORT Figure 2: The number of websites hosting key logging crime ware systems raise by over 1,100, reaching 3,362, the second highest number recorded in the preceding 12 months. Web sense Security Labs believes much of this increase is due to attackers increasing ability to co-opt sites to spread crime ware using automated tools. Figure 3: The number of unique key logger crime ware variants detected in January reached a new high of 364, an increase of 1.4% from the previous high in October, 2007. Figure 4: Anti-Phishing Working Group, Phishing Activity Trends Report, June 2005 Phishing undermines consumer confidence. Corporate websites of valid, well-respected companies are being cloned to sell nonexistent products, or to get consumers to participate in money-laundering activities while believing that they are dealing with a legitimate organization. The public relations consequences for the company that has had its website cloned can be as severe as the financial losses. 3.0 METHOD OF PHARMING ATTACK You must be well aware of phishing and its potential to cause damage. They bait bank customers with genuine looking emails and manage to usurp money or personal information from unsuspecting customers with reasonable success. You are also aware that responding to mails sent by your bank may not be a good idea because banks never require to send emails to get your credentials. They have more secure channels to get that information. However, pharming attacks do not require an attacker to send mails. By carrying out pharming attacks, a criminal can get access to a wider target than phishing emails and as quickly as possible. Hence the ph effect on the word farming. They are not fishing, they are farming for gullible people! By the way, pharming is a real dictionary word. HOW PHARMING WORKS Pharming attacks do not take advantage of any new technique. They use the well known DNS cache poisoning, domain spoofing and domain hijacking techniques that have been around for quite long. However, the motives of carrying out these attacks have changed. Earlier they were interested in just disrupting services and causing nuisance. But now, the game has become a matter of money than that of chest thumping. These techniques continue to exist because administrators and website owners dont care to secure and monitor their DNS servers while they have invested millions of dollars in application firewalls. How a typical pharming attack is carried out: Figure 5: 1. The attacker targets the DNS service used by the customer. This server can be a DNS server on the LAN or the DNS server hosted by an ISP for all users. The attacker, using various techniques, manages to change the IP address of www.nicebank.com to the IP address of a web server which contains a fake replica of nicebank.com. 2. User wants to go the website www.nicebank.com and types the address in the web browser. 3. Users computer queries the DNS server for the IP address of www.nicebank.com. 4. Since the DNS server has already been poisoned by the attacker, it returns the IP address of the fake website to the users computer. The users computer is tricked into thinking that the poisoned reply is the correct IP address of the website. The user has now been fooled into visiting fake website controlled by the attacker rather than the original www.nicebank.com website. Once the attacker has managed to get the user to visit the fake website, there are many ways in which the user can be tricked into revealing his / her credentials or giving out personal information. The beauty, or lets say, the notoriety of pharming over phishing is evident from the fact that one successful attempt in poisoning the DNS server can be potentially used to trick all the users of that DNS service. Much less effort and wider impact than phishing. DNS cache poisoning All DNS servers cache the queries that users have made for a certain period of time. This is done to speed up the responses to users for frequently used domains. This cache maintained by the DNS server can be poisoned by using malicious responses or taking advantage of vulnerabilities in the DNS software itself. Domain Hijacking This is an actual incident that took place a year ago. Panix, an ISP based in New York was the target of a domain hijack attack. All domains are typically registered with registrars which store information about the owner of a domain and location of the domains DNS servers. If any of this information is required to be changed, the approval of the domain owner is required. A domain owner can even switch registrars depending on costs and convenience. However, confirmation of the switch is required from all three parties, the domain owner, the old registrar and the new registrar. In case of Panix, a change was initiated by an unknown person in Australia. The person managed to skip confirmation from the old registrar and the domain owner. This was because the new registrar was not following the domain transfer process strictly. The result was, the unknown person managed to gain control over the panix.com domain completely. The person managed to divert all the web traffic of panix.com and customer emails to another server located in Canada. Domain hijacking has the widest impact because the attacker targets the domain registration information itself. Registration of similar sounding domains Similar sounding or similar looking domains are another source of security issues for internet users. An attacker can register a domain www.n1cebank.com and carry out pharming and phishing attacks on unsuspecting customers who dont notice the difference in the letter i being replaced by a 1. Also domain names created by typos on the original words (e.g. www.nicebqnk.com) manage to attract a lot of traffic. One such study on a popular domain cartoonnetwork.com shows that one in four people visiting the website incorrectly type a simple name like cartoonnetwork.com. So what about typo domains? One quick search in Google reveals that it is quite a big concern. An attacker can easily buy typo domains and setup his fake website on these domains to fool unsuspecting visitors. IMPACT CAUSED BY PHISHING AND PHARMING There are impacts that caused by rising of phishing and pharming. One of the impacts that caused by phishing and pharming is the lost of financial on both organizations and consumers. According to the InternetNews.com, there are about $1.2 Billion lost in financial of banks and credit card issuers at year 2003, while at year 2004, there is about  £12 Million lost in financial reported by the Association of Payment Clearing Services in United Kingdom. Due to the credit card association policies, the online merchants that accepted and approved transactions made by using credit card numbers which solicit through internet fraud may need to liable for the full amount of those transactions. This may cause hard-hit to those small organizations. Another impact that caused by phishing and pharming is the undermining of the consumers trust in the secured internet transaction or communication. This situation occurred because the internet fraud like phishing and pharming made consumer feel uncertain about the integrity of the financial and commercial websites although the web address display in the address is correct. Phishing and pharming also caused some impact on the Law investigation. It makes the law investigation become harder because the technique that used by attackers to perform phishing and pharming is more sophisticated. In nowadays, those attackers can perform all of the phishing and pharming attack at a location that provided with the internet connection. With the available of internet connection, they can make use of it to perform attacking activities. Those activities included the control of a computer located in one place to perform phishing and pharmings attack by using computer located at another place. The investigation become harder also because of the division of attacking tasks to several people located in different locations. PREVENTION OF PHISHING AND PHARMING Pharming attacks tend to be harder to defend against that traditional Phishing attacks due to the distributed nature of the attack focus and the use of resources not under the control of the victim organisation.   In addition, the manipulation of the DNS resolution process occurs at such a fundamental level that there are very few methods available to reliably detect any malicious changes. 5.1 PREVENTION WHAT TO DO? By using anti-virus software, spyware filters, e-mail filters and firewall programs and make sure that they are regular updated to protect your computer. Ensures that your Internet browser is up to date and security patches applied. Be suspicious of any e-mail with urgent requests for personal financial information or threats of termination of online account. Dont rely on links contained in e-mails, even if the web address appears to be correct, and use only channels that you know from independent sources are reliable (e.g., information on your bank card, hard copy correspondence, or montly account statement) when contacting your financial institution. When submitting credit card or other sensitive information via your Web browser, always ensure that youre using a secure website. Regularly log into your accounts. Regularly check your bank, credit and debit card statements to ensure that all transaction are legitimate. PREVENTION WHAT NOT TO DO? Dont assume that you can correctly identify a website as legitimate just by looking at its general appearance. Dont use the link in an e-mail to get to any web page, if you suspect the message might not be authentic. Avoid filling out forms in an e-mail messages or pop-up windows that ask for personal financial information. CLASSIC PHISHING DEFENCES Many of the defences used to thwart phishing attacks can be used to help prevent or limit the scope of future Pharming attacks. While readers are referred to the detailed coverage of these defence tactics explained in The Phishing Guide, a brief summary of these key defences is as follows: Client-Side Desktop protection technologies Utilisation of appropriate, less sophisticated, communication settings User application-level monitoring solutions Locking-down browser capabilities Digital signing and validation of email General security awareness 5.3.2 Server-Side Improving customer awareness Providing validation information for official communications Ensuring that the Internet web application is securely developed and doesnt include easily exploitable attack vectors Using strong token-based authentication systems Keeping naming systems simple and understandable 5.3.3 Enterprise Automatic validation of sending email server addresses, Digital signing of email services, Monitoring of corporate domains and notification of similar registrations, Perimeter or gateway protection agents, Third-party managed services. ADDITIONAL PHARMING-SPECIFIC DEFENCES While Phishing attacks typically use email as the attack delivery platform, Pharming attacks do not require any email obfuscation attacks to succeed therefore Phishing defences that rely upon email security play a lesser role. The defences that will be most successful in preventing Pharming attacks focus upon the following areas: Change management, monitoring and alerting Third-party host resolution verification DNS server patching, updating and configuration Search engine control 5.4.1 Change Management, Monitoring, and Alerting The potential for an administrator or other authoritative employee to maliciously modify DNS resolution information without detection is great.   As financial incentives increase, organisations and ISPs will need to ensure that adequate change control, monitoring and alerting mechanisms are in place and enforced. It is recommended that: Wherever editing is possible, access to DNS configuration files and caching data is limited to approved employees only. A change management process is used to log and monitor all changes to DNS configuration information. Auditing of DNS record changes is instigated by a team external to any DNS administrative personnel; with automatic alerting of changes conducted in real time. Regular audits and comparative analysis of secondary DNS and caching servers should be conducted. Third-party Host Resolution Verification Services Toolbars Many third-party developed plug-in toolbars originally designed to detect Phishing attacks are deceived by Pharming attacks.   Typically, these Phishing toolbars show the IP address and reverse lookup information for the host that the browser has connected to, so that customer can clearly see if he has reached a fake site.   Some managed toolbars (normally available through a subscription service) also compare the host name or URL of the current site to an updatable list (or real-time querying) of known phishing sites. Some toolbars now offer limited anti-pharming protection by maintaining a stored list of previously validated good IP addresses associated with a particular web address or host name.   Should the customer connect to an IP address not previously associated with the host name, a warning is raised.   However, problems can occur with organisations that change the IP addresses of their online services, or have large numbers of IP addresses associated with a particular host name. In addition, some toolbars provide IP address allocation information such as clearly stating the geographic region associated with a particular netblock.   This is useful for identifying possible fake Pharming sites that have been setup in Poland pretending to be for an Australian bank for instance. Server Certificates To help prevent pharming attacks, an additional layer can be added to the authentication process, such as getting the server to prove it is what it says it is.   This can be achieved through the use of server certificates. Most web browsers have the ability to read and validate server identification certificates.   The process would require the server host (or organisation) obtain a certificate from a trusted certificate authority, such as Verisign, and present it to the customers browser upon connection for validation. 5.4.3 DNS Server Patching, Updating and Configuration As with any Internet-based host, it is vial that all accessible services be configured in a secure manner and that all current security updates or patches be applied.   Failure to do so is likely to result in an exploitation of any security weaknesses, resulting in a loss of data integrity. Given the number of possible attacks that can be achieved by an attacker whom manages to compromise an organisations DNS servers, these hosts are frequently targeted by attackers.   Therefore it is vital that security patches and updates be applied as quickly as possible typically organisations should aim to apply fixes within hours of release. Similarly, it is important that organisations use up to date versions of the service wherever possible.   As we have already discussed in section 3.6, each new version of the DNS software usually contains substantial changes to protect against the latest attack vectors (e.g. randomising DNS IDs, randomising port numbers, etc.) 5.4.4 Search Engine Control Internet search engines are undergoing constant development.   Many of the methods used by attackers to increase their page ranking statistics are known of by the search engine developers, and a constant cycle of detection and refinement can be observed by both parties.   For instance, Google modified its search algorithm to reset the page rank statistics of web sites that had recently changed ownership this was to reduce the impact of instant backlinks and the weighting they attach to a ranking. Traditionally the emphasis on increasing a pages ranking has been for revenue or lead generation most closely associated with advertising.   However, the increasing pace at which customers are relying upon search engines to access key services (such as online banking) means that a Pharmer who can get his fake site ranked at the top is likely to acquire a high number of victims. Organisations should ensure that they regularly review keyword associations with their online services.   Ideally automated processes should be developed to constantly monitor all the popular search engines for key search words or phrases customers are likely to use to locate their key services.   It is also important that region-specific search engines also be monitored. CONCLUSION The term phishing is about the use of social engineering by performing online imitation of brands to send spoof email that contain of hyperlink to fraudulent website to solicit users sensitive personal information like credit card number, PIN, mothers maiden name and etc. Phishing can also be done through installing keylogger at users computer. Pharming use technical subterfuge like DNS cache poisoning, domain hijacking, routers setting or firmware malconfiguration to redirect users to a fraudulent website. Pharming may also perform by sending the targeted victims an email that contained of viruses or Trojan horse that will install small application that will redirect user to fraudulent website. There are impacts that caused by both phishing and pharming. Those impacts included the lost of financial, undermining of user confident in secured online transaction or communication, hard hit to small organizations and cause the law investigation harder. As a web developer, SSL certificate, switching of the recursion queries or DNS security extension should be apply because it can protect the DNS or website from phishing and pharming attack. Visual clues can also be use so that user can easily differentiate between authentic website and fraudulent website. Token based authentication also one of the technique that can be apply to protect the website or DNS server from phishing and pharming attack. Users are also responsible to protect their self from phishing and pharming attack by not opening email or download attachment from unknown sender or email that required user to respond by clicking on the hyperlink contained in the email. User should also double confirm the URL at the address bar when a warning message like SSL certificate do not match with the sites appear. User can also install security suite or firewall in the computer in order to protect user from phishing and pharming. User can also look for the lock or key icon at the bottom of the browser that lock the site they want to enter their sensitive personal information. As a user, we can also report the attack of phishing and pharming to the related agencies or company through internet or telephone to assist the work of minimize the attack. In addition, laws are also being introduced to against phisher and pharmer. RECOMMENDATION To prevent from becoming the victims of phishing and pharming, I suggest to users that must install security suite or firewall in their computer and the detection signature of the security suite should be up to date. Besides from this, I also suggest that users should beware in opening any email or attachment that they receive in order to prevent their self from becoming the victims of phishing and pharming. I also suggest to web developers that they should use SSL certificate, switch off the recursion queries, install DNS security extension in protect

Sunday, October 13, 2019

Toothbrushes and Tofu :: Short Story Papers

Toothbrushes and Tofu "Yay hyperchocolate hazelnut cake Yay apricot baklava Yay carrot cake and apple crisp Yay periwinkle dining room trim Yay co-ops" - Watermyn house journal, 1986 The co-op is on the corner of Waterman and Governor streets, hunkered there like an old man, into a dilapidated permanence. Two enormous cherry trees occupy the front yard; in the fall their golden leaves are left in peace to coat the lawn until they rot or blow away. A tangled cluster of bicycles clings to a metal sculpture that is perched like an insect under the largest tree. The front garden sprouts renegade tomato plants and Echinacea flowers, long taken over with weeds, and a tin sign hangs feebly from a piece of yellow pipe, its faded letters announcing, "Watermyn Co-op Garden." The newly built front porch smells of wet, cut wood and supports a ratty looking couch, a small mosaiced table, and half a dozen un-opened Wall Street Journals. The Watermyn kitchen never fails to be a stimulating experience. This Sunday night is no exception. Ian and Allison chop vegetables, and the counters swim in piles of mushrooms, carrots, spinach, bowls of crumbled tofu and pans spread with thick pizza dough. Liz Phair plays on the stereo, just loud enough to inhibit a normal decibel of conversation. Old crumpled newspapers litter the two couches beneath the stereo, and rows of red-capped spices, cereal boxes and other assorted dried goods line the racks above the counters. Clippings, sketches and posters plaster the refrigerator and walls. Broken kitchen appliances are stuck above the fridge with black electrical tape and someone has scrawled above them in black marker, "Kitchen appliance graveyard - where all good cooking tools come to die." Ian is tall, with a warm smile and a worn-in look, faded and comfortable like someone's favorite sneakers. He groans as he opens up rotting bags of spinach, "How long has this been in the fridge? I'm not going to use this. Do you think I should use this? No, no one will want to eat this." Allison doesn't offer any suggestions. She smiles unconcernedly and slides an assembled pizza into the oven, holding her long brown hair back with one hand. Dinner is served at 6:30 and in a few minutes co-opers will begin to wander into the kitchen and common rooms, lured by the smell of cooking dough and stir-fried garlic.

Saturday, October 12, 2019

Communism and its Unfortunate Flaw :: Exploratory Essays Research Papers

Communism and its Unfortunate Flaw Throughout the course of history, colonies, city-states, and countries alike have attempted different forms of government. From monarchies to anarchies, it has remained clear what manner of government works best, both for the economy and the people- a capitalist society. Capitalism breeds competition and individual accomplishments. Unfortunately Karl Marx did not feel this way when he published his short piece, The Communist Manifesto, a cry for all those in favor of a communist world to stand up and unite. According to Marx, the capitalist form of government "has torn away from the family its sentimental veil, and has reduced the family relation to a mere money relation" (82). He goes on to describe more of these crimes the government, notably the bourgeoisie, has inflicted upon the populace, the proletariat. Yet Marx proves to over-generalize himself on a majority of issues. Although communism is itself almost infallible theoretically, it simply cannot exist in the overwhelmingly competitive, capitalist world that exists today. George O rwell's Animal Farm is an exceptional example that illustrates the faults of communism. In this fictional tale similar to the Russian Revolution of the early 1900's, a group of farm animals overthrows its corrupt farmer and forms its own society. The parallels to communism become clear as all animals are made equal and work toward the same goal of building their farm. Unfortunately, human nature and competition sink in, as the intelligent pigs become the all-knowing leaders. This is not so much to say that competition is a negative aspect of the economy; on the contrary, it has been very much an overall positive influence. Communism also does not take into account that human nature has a tendency to create competition. People strive to do their best, for when they do they are most often rewarded. Communism does no such thing, and provides for one of the main flaws that attributes to its failure. In Marx's ideal communist world, the entire populace is equal, and shares everything. There is no competition, and no one is rewarded more or less based on his or her individual achievement. Yet with this newfound sense of a worldwide sharing, there, in theory, is no poverty or hunger.

Friday, October 11, 2019

A Psychiatric Disorder with a Biologic Basis: OCD

Obsessive-Compulsive Disorder (OCD) is a psychiatric disorder with a biologic basis. It includes intrusive thoughts (obsessions) and repetitive rituals (compulsions). The obsessions produce anxiety while the compulsions reduce anxiety. Anxiety is defined as a â€Å"hyperalert state causing excessive autonomic arousal and diminished coping† (1). The obsessions are repetitive thoughts the person cannot keep from having that can include ideas, urges to do something, or images. The compulsions can include excessive hand washing triggered by on obsessive concern about germs. Or, the person may feel constantly unsafe and have to repeatedly check their safety, such as repeatedly making sure that the doors are locked or that the stove has been turned off. The cause of OCD is a neurochemical imbalance in the brain, so medication can be an important part of treatment. It is the fourth most common psychiatric problem in America, occurring as frequently as schizophrenia. 5 million people in the United States have OCD, just about equally divided between males and females. Although OCD is sometimes treated lightly, it is a serious disorder. Up to 92% of people with it say it has interfered with important relationships, and nearly 60% report that it decreased either schoolwork or with their jobs. Daily patterns are affected by the repetitive nature of compulsions or because the person tries to avoid situations that trigger their OCD responses. Three different neurotransmitters have been implicated in OCD: nor epinephrine, serotonin, and dopamine. Because neurotransmitters are involved, medication can often help in the management of OCD. Diagnosis is based on the individual's symptoms and can include interview, observation, the use of questionnaires, and reports from family members regarding the person's difficulties. In addition to medication, education and brief counseling can help the individual understand his or her disorder. Cognitive therapy can help the individual use logic and rational thinking to combat the effects of OCD.

Thursday, October 10, 2019

Nitric Oxide Therapy in infants with pulmonary hypertension

The benefits of nitrogen oxide (NO) therapy as used in the treatment of infants with persistent pulmonary hypertension (PPHN) can be best appreciated if the reader is familiar with the pathophysiology of PPHN and the previous methods used in treating the disease. The function of NO has evolved in the minds of the scientific community from being a mere noxious gas emitted by vehicles to a wonder compound in the field of medicine. In the area of pulmonology, its vasodilatory effect in the blood vessels is now being used to assist PPHN patients in rerouting blood flow in infants whose blood circulation fails to shift from fetal to normal circulation.Such nature of the compound, being the main ingredient in NO therapy allows for a less invasive procedure which in effect reduces risks of complications during and after treatments, expected in previous treatment methods. This reduced risks account for the relatively more cost-effective character of NO therapy as a treatment method in PPHN p atients.There is not much use for the lungs during the fetal life. At such stage, the function of the lungs is carried out by the placenta through the umbilical cord. Fetal life is characterized by a high pulmonary vascular resistance (PVR) with pulmonary blood flow being restricted to a less than 10% lung-directed cardiac output. Blood vessels that connect the heart and the lungs are constricted, sending the circulating blood back to the heart through the ductus arteriosus, a blood vessel that functions only in fetuses. In other words, the lungs in the fetal stage are bypassed.At birth, when the lungs finally assume the function of gas exchange, the PVR decreases, allowing for an increase in pulmonary blood flow. The blood vessel that is previously constricted, favoring blood flow to the ductus arteriosus is now relaxed, simultaneously with the permanent closure of the ductus arteriosus. This happens as the lungs become ventilated and the alveolar oxygen tension is increased.Persis tent Pulmonary Hypertansion occurs when at birth, the lung circulation fails to achieve the normal drop in PVR, preventing the transition from fetal to newborn circulation. This failure results in the continuous functioning of the ductus arteriosus which impairs the flow of blood from the heart to the lungs and limits the amount of oxygen that can be picked up by the blood to be delivered to the different parts of the body. The blood that flows back to the heart remains in an unoxygenated state which could lead to the development of refractory hypoxemia, respiratory distress and acidosis.It is only in 1987 when nitric oxide (NO) was recognized as a key endothelial-derived vasodilator molecule. From then, research has been expanded to establish the role of NO throughout the body, and to discover its therapeutic potential.   To appreciate the effects of NO in alleviating pulmonary hypertension, it is important to gain understanding of its chemistry and mechanism of action.Nitric Oxi de is a gaseous compound that rapidly diffuses across membranes and has a single unpaired electron. This explains its high reactivity, especially to Hemoglobin (Hb) in the blood. This nature of the compound accounts for its noted biological significance. It has been discovered to function as stimulant in the release of hormones; as neurotransmitter; a significant participant in the magnification of synaptic actions and learning processes; and an inhibitor in platelet aggregation, which makes it a marvel in the field of cardiology. In the field of pulmonology, nitric oxide is valued for its vasodilatory effect in the blood vessels.This effect can be explained by the mechanism involving the compound's diffusion from the vascular endothelial cells to the subjacent smooth muscles of the pulmonary vessels. From here, NO activates the enzyme guanylate cyclase to change conformation to promote smooth muscle relaxation by converting GTP to cGMP.   This vasodilatory effect signals the mech anism to modulate blood flow and vascular tone.Given the mechanism of action, it is easy to surmise how NO can be utilized as a therapeutic agent in the management of blood-vessel-related diseases such as those related to the heart (hypertension), the reproductive system(erectile dysfunction) and in this case, the lungs (Persistent Pulmonary Hypertension in infants (PPHN)).Before NO, treatments used in infant PPHN are hyperventilation, continuous infusion of alkali, tube vasodilation and vasodilator drugs. A study on the effects of these various treatments was done by Ellington, Jr., et. al., (2001) showing no specific therapy clearly associated with the reduction in mortality in infants. In determining whether therapies were equivalent, the study showed that hyperventilation reduced the risk of extracorporeal membrane oxygenation (ECMO) with no oxygen increase at 28 days, while alkali infusion increased the use of ECMO as well as an increase in the use of oxygen at 28 days (Ellingt on, Jr., et. al., 2001). ECMO is a highly invasive procedure that requires major surgery, performed in serious cases of PPHN when patients fail to respond to treatments.It is only after post-lab studies were able to identify the role of NO-cGMP signaling in the regulation of lung circulation that NO therapy was developed for PPHN (Channick, R., et. al., 1994). Like previous treatment methods, NO therapy improves oxygenation as well as reduces the risk of ECMO in infants with PPHN (Oliveira, et. al., 2000). But because nitric oxide is capable of acting on its own upon inhalation to relax the blood vessels and improve circulation, it is considered as a less invasive procedure in the management of infants with PPHN compared to the previous treatments mentioned in the preceding paragraphs.The efficiency of the treatment procedure can be determined by observing its effect on the patient's ventilation and blood flow, which is a determinant of the efficiency of transpulmonary oxygenation a nd partial pressure of oxygen in the systemic arterial blood (Ichinose, et. al., 2004). NO therapy enhances the mechanism by which blood flow is redistributed toward regions in the lungs with better ventilation and higher intra-alveolar partial pressure of oxygen (Ichinose, et. al., 2004).Other treatments used in the management of PPHN such as tube ventilation, alkalosis and intravenous vasodilators were shown to be effective in ameliorating pulmonary hypertension in some infants, but in many instances, it does not, as ECMO almost always becomes a necessity in saving the life of the infants (Ichinose, et. al., 2004). A type of hyperventilation has been proven not to increase the risk of ECMO, but unlike NO-therapy (Ellington, Jr., et. al., 2001), it is invasive as to require a tube inserted inside the infant's trachea.In patients with moderate PPHN, there is an improvement in arterial p a O 2, reduced necessity of ventilator support and low risk of progression to severe PPHN (Sadiq, et. al., 2003) and this, without the risk of increasing the incidence of adverse outcomes when the age of 1 year is reached (Clark, et. al. 2003). Inhaled NO is able to rapidly increase the arterial oxygen tension and increase the blood flow in the lungs without causing systemic hypotension (Roberts, 1992; Kinsella, 1992). No apparent increase in morbidity has been shown after one year of treatment with NO (Aparna and Hoskote, 2008). For high-risk infants with PPHN, inhaled NO has been found to lessen the risk of pulmonary hypertensive crisis (PHTC) after congenital heart surgery (Miller, et. al. 2000).Studies on the role of NO in the management of PPHM show that while it is therapeutic, it also prevents the occurrence of chronic lung disease which affects morbidity. Vascular cell proliferation and pulmonary vascular disease have been shown to decrease with NO in the newborn (Roberts, et. al., 1995). In addition, while NO treatment can be more costly, it is the most cost-effective among other methods because of the reduced need for ECMO (Angus, et. al. 2003). For these reasons, it is understandable why NO therapy seems to have taken over in the area of PPHN treatment.ReferencesAngus DC, Clermont G, Watson RS, et al. (2003). Cost-effectiveness of inhaled nitric oxide in the treatment of neonatal respiratory failure in the United States. Pediatrics. 112, 1351–1360.Aparna U., Hoskote, MD., et. al. (2008). Airway function in infants treated with inhaled nitric oxide for persistent pulmonary hypertension. Pediatr Pulmonol. 43, 224-235.Channick R, Hoch R, Newhart J, et al. (1994). Improvement in pulmonary hypertension and hypoxemia during nitric oxide inhalation in a patient with end-stage pulmonary fibrosis. Am J Respir Crit Care Med. 149, 811-814Clark, RH., Huckaby, JL., et. al. (2003). Low-Dose Nitric Oxide Therapy for Persistent Pulmonary Hypertension: 1-Year Follow-up. Journal of Perinatology. 23, 300.  Ellington Jr, Marty, O'Reilly, et. al. (2001). C hild Health Status, Neurodevelopmental Outcome, and Parental Satisfaction in a Randomized, Controlled Trial of Nitric Oxide for Persistent Pulmonary Hypertension of the Newborn. Pediatrics,107.Ichinose F, Roberts JD, et.al. (2004). A Selective Pulmonary Vasodilator: Current Uses and Therapeutic Potential. Circulation. 109, 3106-3111. Kinsella JP, Neish SR, Shaffer E, et al. (1992). Low-dose inhalation nitric oxide in persistent pulmonary hypertension of the newborn. Lancet.   340, 819–820.Miller O, Tang SW, et. al. (2000) Inhaled nitric oxide and prevention of pulmonary hypertension after congenital heart surgery: A randomised double-blind study. The Lancet. 356: 9240, 1464.Oliveira cac, et. al. (2000). Inhaled Nitric oxide in the management of persistent pulmonary hypertension of the newborn: a meta-analysis. Rev. Hosp. Clin. Fac. Med. S., 55 (4): 145-154, 2000Roberts JD Jr, Polaner DM, Lang P, et al. (1992). Inhaled nitric oxide in persistent pulmonary hypertension of the newborn. Lancet. 340, 818–819.Roberts JD Jr, Roberts CT, Jones RC, et al. (1995). Continuous nitric oxide inhalation reduces pulmonary arterial structural changes, right ventricular hypertrophy, and growth retardation in the hypoxic newborn rat. Circ Res. 76, 215-222.  Sadiq HF, Mantych G, et. al. (2003). Inhaled Nitric Oxide in the Treatment of Moderate Persistent Pulmonary Hypertension of the Newborn: A Randomized Controlled, Multicenter Trial. Journal of Perinatology.   23, (2).98