Thursday, November 28, 2019

Dialogue Between Hamlet And Ophelia Essays - Characters In Hamlet

Dialogue Between Hamlet And Ophelia Ophelia to Polonius: Oph: He hath my lord, made many tenders of his affections to me. My lord, he hath importu`ned me with love in honourable fashion. And hath given countenance to his speech my lord, with almost all the holy vows of heaven. Letters from Hamlet to Ophelia: Ham: To the celestial, and my soul's idol, the most beautified Ophelia, in her excellent white bosom, these, &c Doubt thou the stars are fire; Doubt that the sun doth move; Doubt truth to be a liar; But never doubt I love. O dear Ophelia, I am ill at these numbers, I ahve not art to reckon my groans; but that I love thee best, O most best, believe it. Adieu. Thine evermore, most dear lady, whilst this machine is to him, Hamlet Ophelia to Hamlet: Oph: My lord, I ave rememberances of that I have long longed to re-deliver, I pray you now recieve them. Ham: No, not I; I never gave them to you aught. ... Ham: ...I did love you once. Oph: Indeed my lord, you made me believe so. Ham: You should not have believed me; for virtue cannot so inoculate your old stock but we shall relish of it; I loved you not. Oph: I was the more decieved. ... Ham: If thou dost marry, I'll give thee this plague for thy dowry,--be thou chaste as ice, as pure as snow, thou shalt not escape calumny. Get thee to a nunnery, go; farewell: Or, if thou wilt needs marry, marry a fool; for wise men know well enough what monsters you make of them. To a nunnery, go; and quickly too. Farewell Prologue of Hamlet's play: Pro: For us and for our tragedy, Here stooping to your clemency, we beg you hearing patiently. Ham: Is this a prologue, or the posy of a ring? Oph: Tis brief my lord. Ham: As woman's love. Ophelia's Funeral: Ham: What, the fair Ophelia? ... (Laertes leaps into Ophelia's grave) Ham: What is he whose grief bears such an emphasis? whose phrase of sorrow conjures the wandering stars, and makes like wonder-wounded hearers? this is I Hamlet, the Dane. ... (Hamlet leaps into the grave) Ham: I lov'd Ophelia; forty thousand brothers could not, with all their quantity of love, make up my sum. What wilt thou do for her? Shakespeare Essays

Sunday, November 24, 2019

Backlash has been described as a complicated struggle over normativity The WritePass Journal

Backlash has been described as a complicated struggle over normativity Abstract Backlash has been described as a complicated struggle over normativity Abstract1. Introduction2. The Concept of Backlash3. Backlash and the Contemporary Positions of Men and Women in Organisations4. ConclusionReferencesRelated Title: Backlash has been described as a complicated struggle over normativity (Robinson, 2000). What does this mean? How can the concept of backlash help us understand the relative positioning of men and women in organizations? Abstract Men have historically occupied an invisible, gendered space within the work environment. Their privileges compared to women, and their power compared with women, have gone unnoticed through this invisibility.  Ã‚   Through feminism, there has gradually arisen an awareness of these hidden inequalities, and the ways in which men have been prioritised as the ‘neutral’, over-riding voice in the workplace. This awareness has led to some redistribution of power, as women take on greater responsibility, more powerful roles, and obtain better pay. However, the consequences of this have been that men have, in some instances, started to see themselves as victims of women’s growth in the workplace through the phenomenon of backlash. Although seemingly a simple concept, backlash is complex and tricky to measure, and has a number of consequences for both men and women.  Ã‚   The notion of normativity helps us understand the ways in which victimhood has been appropriated by some men to reclaim the power they feel they have lost.  Ã‚   Ideas around backlash and normativity have had a number of repercussions for the workplace and organisational politics, some detrimental to women’s position, although there are suggestions that the right approach to equality can overcome these issues. 1. Introduction The following essay will look at the concept of ‘backlash’, the notion that people are resisting structured organisational attempts to ensure that marginalised workers are employed and given opportunities for promotion. While the concept embraces a number of marginalised workers, for example people of colour and people with disabilities (Burke and Black 1997), this essay will consider only the case of ‘backlash’ for men against women employees.  Ã‚   Male ‘backlash’, it has been claimed, has existed for some considerable time, and is stronger now than in the past (Faludi 1991).   Backlash can be unconscious: men may be unaware that they hold the attitudes they do towards women (Burke and Black 1997). First, the notion of ‘backlash’ will be discussed, and the ideas that it presents â€Å"a complicated struggle over normativity† (Robinson, 2000) analysed. Next, the essay will consider how the notion of backlash is useful for understanding the hierarchical relationships between men and women in organisations. 2. The Concept of Backlash In order to understand the concept of backlash, it is first necessary to look more closely at men’s position within organisations.  Ã‚   It has been argued that men’s status as gendered goes unnoticed by themselves and by others within the organisation.  Ã‚   Men are assumed to be the norm, and to speak for the whole of human kind (Nelson 2006).   Typically, men in organisations are unaware of themselves as men, with â€Å"self-knowledge as gendered subjects †¦ noticeably absent† (Whitehead 2001, p. 309).  Ã‚  Ã‚   However, the state of being a man means occupying one of (at least) two possible gendered positions.   While gender is a visible ‘fact’, with most (but not all) men and women being visually distinguished as such, behind this ‘fact’ â€Å"gender is enacted, and society has a pattern of practices and expectations that make this enactment visible† (Bilimoria and Kristin, 2007, p. 38).   Ã‚  Ã‚  While often seen as a genderless, cerebral environment, the workplace, no less than other cultural and social contexts, is one in which organisational decisions are made in an embodied, gendered context (Whitehead and Moodley 1999).   Within the workplace, gender differences exist both visibly and invisibly, and at a number of different levels.   One of the most important of these levels is the symbolic: the ways in which language, clothing, physical symbols, printed media and similar function to express positions about gender. Ideas, attitudes and perceptions also contribute to the complex mix of engenderment in the organisation. The social and political structures of an organisation might appear neutral, however it is likely to be based upon invisible engenderment at deeper levels (Blanpain et al 2008). It should be noted, however, that recognition of the gendered nature of the workplace should not be taken as a simple binary between male and female: â€Å"transgender identities further complicate notions of the gendered subject†. Additionally, invisibilities of sexuality further complicate the matter: the relationship of lesbian to womanhood, and the gay man to masculine identities, needs also to be considered   (Melzer 2006). There is an unfair balance of power between men and women in the workplace, with men generally getting better pay, conditions and holding higher positions within organisations. Women’s abilities as leaders often go unnoticed or are ignored, and the phenomenon of the ‘glass ceiling’ is well-documented (Haslett et al 1992).   This unfair balance seems to be a function of men’s invisibility as gendered subjects: if men are perceived unconsciously to be the norm, then women are by definition outside the norm, and are consequently subject to poorer work conditions including pay and promotion. One reaction to this is for the oppressed groups to act to make people aware of men’s privileges and bring to light their hidden engenderment.   This opens the possibility of making the inequalities between men and women visible to all.   Mutua (2006) describes â€Å"unearned benefits† which men possess, just by being born men, and suggests that rather than seeing the inequalities between men and women in the workplace in terms of how poorly women are treated, we reverse this and look at, for example, how much more men earn on average than do women (Mutua 2006). In general, there has been a concerted effort in many countries to make gender inequalities in the workplace more visible (Kabeer et al 2008). This can, however, make the privileged group – men – defensive and angry.   By making people more aware of male engenderedness, and by   bringing   the inequalities that this hides to light, ‘backlash’ can result, as men start to see themselves as victims.  Ã‚   As such, they begin to occupy an ambivalent position, both invisible and visible. There are reasons for men to claim both these states. Robinson suggests that men have good reason to want to be invisible, as invisibility allows them to continue to enjoy benefits that women cannot access.   However, they can also gain from being visible, and visible as an oppressed group, a victim of female power (Robinson 2000).   Faludi (1991) made the concept of ‘backlash’ popular.   While, she suggested, anti-feminist feeling has always played a part in modern America, there have been particular incidences of backlash in recent history, particularly when â€Å"women are poised to make real gains in social and political life† (Boyd 2007, p. 5).   For Faludi (1991) backlash works by presenting an opposite position as the truth, and by blaming women for wider social difficulties, that is, blaming feminism for creating problems for women, rather than offering a solution to such problems (Walby 1997) The notion of ‘backlash’ is often presented as a simple reaction by men against a growth in women’s rights. However, the idea is more complex than this suggests. For example, it can cover different types of male resistance to attempts to redress inequalities between the sexes: men who may once have approved of this in principle, but now no longer do so, and those who have never approved of equality for women (Goode 1982). Backlash has also changed over time, with Faludi (1991) arguing that it is more common now than in the past. This increase may be down to a number of reasons including increased competition in organisations for pay and position, the growth of political correctness in the workplace, and increased media coverage of gender inequalities. Men are also increasingly aware of how the workplace is changing, with women gradually gaining more power and taking on roles that used to be the sole preserve of men (Burke and Black 1997).   Backlash can also be seen as a function of male insecurity over a changing world, as men blame women’s increased power for ills which befall them.  Ã‚   These feelings are fuelled by a predominantly right-wing media and corporate culture (Kimmel 2004). Estimates vary regarding the prevalence of backlash. Early studies (Astrachan 1986; AMOI 1988) suggested that up to 90% of men were in favour of women maintaining a traditional role.   While backlash in organisations seems to have been clearly identified, there are relatively few empirical studies assessing its prevalence, and a lack of clarity about the best ways of measuring it. Many researchers use the Implicit Association Test, a wider social psychology test designed to measure automatic associations between mental concepts in memory as a way of quantifying implicit stereotypes about gender (Rudman and Glick 2001) There are also different understandings of the impact of backlash on the wider workplace: backlash can increase tension between men and women, makes bonds between men stronger, and can fracture relationships between women to the extent that women have carved a role within the male environment or not (Burke and Black 1997). Backlash is sometimes known as ‘competing victim syndrome’, a term used by Cox (1995) to describe the ways in which, in education, boys interest groups tried to define a position of victims of feminism (Mills 2001). There are several factors which can exacerbate backlash.     If an organisation lacks effective communication both about the phenomenon of backlash and measures that can be taken to combat it, men are likely to be suspicious of any changes. If a clear case is made for proactive measures for women, backlash is less likely (Gandossy et al 2006).   If men are excluded from equality planning, or if they are not seen as part of the solution to inequalities, then this can also make backlash feel worse.   Organisations can take practical steps to including men in such planning, for example identifying a core group of men who are committed to women’s rights and ensuring support from senior management (Ruxton 2004).  Ã‚   Certain organisational structures can also make backlash more intense. For example, where a culture of blame is fostered, with men seen as the causes of women’s disadvantage, men are more likely to react negatively against any perception that womenâ⠂¬â„¢s situation in the workplace is improving.   Equally, if the organisational culture has prioritised men and masculinity, perhaps unconsciously, men may react more strongly against women’s improving situation (Angus 1993). It is also possible that backlash is stronger in organisations where a higher number of minority employees have been taken onto the workforce. As we have seen, the concept of backlash is not as simple as it has sometimes been portrayed in the media (for example, a recent daily mail article appeared to blame feminism for crises in the National Health Service (Phillips 2011)), but rather, as Robinson suggested, it may rather be a complicated struggle over normativity. That is, it concerns a wider debate about the concept of the ‘norm’ and what is considered the ‘normal’ in society today.  Ã‚   The notion of the norm can be seen as rooted in concepts of the natural, and what is inherent or given in human nature, rather than a social, political or cultural construct.   By recognising that the ‘norm’ is, in fact, a construct, we open ourselves to the possibility that the given can be changed.   Feminism in general can be seen as a struggle against the notion that femininity and masculinity as they are experienced in today’s society are fixed. This notion that the female (or mal e) is a given is supported by much of contemporary science (Cameron 1995).  Ã‚   Robinson suggests, in this context, that seeing men as victims of feminism is not as straightforward as a reversal of positive discrimination, but is part of a larger debate about the ways in which normality is defined, and hence as part of a debate about normativity (Robinson 2000).   As Robinson (2000) points out, the notion of masculinity, and the understanding of what it means to be male, is open to debate, can be challenged, and may change.   He also emphasises that the debate over normativity is one about power; who holds power in society, and whether they rightfully do so. Seen in this context, the move by which men have presented themselves as victims is not simply one which happened by chance. Instead, men have been able to take on board the power that is currently vested in the ‘victim’: portraying themselves as oppressed (Bekerman and Zembylas 2011).   Backlash, under these terms, becomes a complex struggle for control over scarce resources and power over the symbolic languages in which notions of masculinity and femininity are normalised.   Men use backlash as a means of making themselves visible as men   and as victims, to accrue the benefits which come with being seen as the disadvantaged partner (Robinson 2000).   Consequently, by claiming the status of victims, men are able to maintain their position as those in power and control, with the added respect and material gains that goes along with this. Privileges are masked by the guise of victimhood which men have decided to wear.  Ã‚   It should be noted, however, this iss ue is made more complex by debates about the notion of power. Some suggest that power relationships are a myth, while there is an illusion that power is vested in the hands of a minority, in fact all groups in society are oppressed: â€Å"power is actually a form of a myth which subjugates all people† (Bad Subjects 1998, p. 55). 3. Backlash and the Contemporary Positions of Men and Women in Organisations The above suggests that backlash is a complex concept which underpins recent developments in contemporary awareness of feminism and women’s rights. But what repercussions does this have for understanding the positions of both men and women within organisations? There are signs that backlash is thriving in business and business organisations. Writing of the USA in the early years of the 21st Century, Bilimora and Piderit suggest that women were increasingly ‘opting out’ of the business world, for example moving on to start their own businesses, partly as a result of a backlash against the notion that women can ‘have it all’ and successfully juggle home and work (Bilimora and Piderit 2007).   This move to self-employment and starting one’s own business as a way of stepping outside the hostility of the male-dominated business environment has been reported elsewhere, for example The United States Small Business Association reported a 58% growth i n women running businesses (SBA 1993), while Carey and Bryant (1995) suggested that women-run businesses were expanding into previously male-dominated areas (Carey and Bryant 1995).   It has also been reported that women can experience hostility as result of special initiatives designed to promote equality, can become over insular as they bond together in women-only networks, thus ruling out the possibility of a further assault on male power structures, and open to charges of elitism (McCarthy 2004). However, some organisations have found that promoting equality measures in the right way can avoid backlash. Wittenberg-Cox and Maitland (2009) describe the case study of Nestle, who sought to prioritise gender equality within the workplace. They rejected the diversity approach popular in the USA in favour of promoting gender balance. Their approach was to involve men, and particularly male leaders, from the outset, with gender awareness workshops for leaders and executives. They found that this approach saw men committed to and leading organisational change, and the company thus â€Å"avoided the backlash that is common in companies that launch â€Å"women’s† initiatives† (Wittenberg-Cox and Maitland 2009). 4. Conclusion To summarise, men have historically occupied an invisible, gendered space within the work environment. Their privileges compared to women, and their power compared with women, have gone unnoticed through this invisibility.  Ã‚   Through feminism, there has gradually arisen an awareness of these hidden inequalities, and the ways in which men have been prioritised as the ‘neutral’, over-riding voice in the workplace. This awareness has led to some redistribution of power, as women take on greater responsibility, more powerful roles, and obtain better pay. However, the consequences of this have been that men have, in some instances, started to see themselves as victims of women’s growth in the workplace through the phenomenon of backlash. Although seemingly a simple concept, backlash is complex and tricky to measure, and has a number of consequences for both men and women.   Ã‚  The notion of normativity helps us understand the ways in which victimhood has been a ppropriated by some men to reclaim the power they feel they have lost.  Ã‚   Ideas around backlash and normativity have had a number of repercussions for the workplace and organisational politics, some detrimental to women’s position, although there are suggestions that the right approach to equality can overcome these issues.    References AMOI (1988) ‘American Male Opinion Index’, Conde Nast, New York Angus, L B (1993) Education, inequality, and social identity, Routledge, USA/ UK Astrachan, A (1986) How Men Feel: Their responses to Women’s Demands for Equality and Power,   Anchor, New York. Bad Subjects Production Team (1998) Bad subjects: political education for everyday life, NYU Press, USA. Bekerman, Z and Zembylas, M (2011) Teaching Contested Narratives: Identity, Memory and Reconciliation in Peace Education and BeyondAuthorsZvi Bekerman, Michalinos ZembylasPublisherCambridge University Press, 2011 Bilimora, D and Piderit, S K (2007) Handbook on women in business and management,   Edward Elgar Publishing, 2007 Cheltenham Glos. Blanpain, R, Dickens, L and Kaj, S (2008) Challenges of European employment relations: employment regulation, trade union organization, equality, flexicurity, training and new approaches to pay, Kluwer Law International, The Netherlands. Boyd, S B (2007) Reaction and resistance: feminism, law, and social change, UBC Press, USA Burke, R J and Black, S (1997), ‘Save the Males: Backlash in Organisations’, Journal of Business Ethics, 16, 933-942. Cameron, D (1995) Verbal hygiene: The politics of language, Routledge, UK Carey, A, and Bryant, B (1995)   Women-owned business growth, USA Today, USA Faludi, S (1991) Backlash: The Undeclared War Against Women, Random House, London Gandossy, R P, Tucker, E and Verma, N (2006) Workforce wake-up call: your workforce is changing, are you?, John Wiley and Sons, USA Goode, W J (1982) ‘Why Men Resist’, in B Thorn and M Yalom (eds.) Rethinking the Family: Some Feminist Questions, Longman Inc. New York Greenwald, A. G., McGhee, D. E., Schwartz, J. K. L. (1998) ‘Measuring individual differences in implicit cognition: The Implicit Association Test’, Journal of Personality and Social Psychology, 74, 1464-1480. Haslett, B, Geis, FL and Carter, M R (1992) The Organizational Woman: Power and Paradox, Greenwood Publishing Group, USA Kabeer, N, Stark, A and Magnus E (2008) Global perspectives on gender equality: reversing the gaze, Routledge, New York /   Oxford Kimmel, M (2004) Men and masculinities, ABC-CLIO, USA Melzer, P (2006) Alien constructions: science fiction and feminist thought, University of Texas Press, USA Mills, M (2001) Challenging violence in schools: an issue of masculinities, Open University Press, UK Mutua, A D (2006) Progressive Black masculinities, CRC Press, USA Nelson, S M (2006) Handbook of gender in archaeology, Rowman Altamira, Lanham Phillips, M (2011) ‘The real reason our hospitals are a disgrace’, Daily Mail, 17th October 2011, London. Robinson, S. 2000 ‘Introduction: Visibility, Crisis and the Wounded White Male Body’, in Marked Men: White Masculinity in Crisis, Columbia University Press, New York Rudman, L A and Glick, P (2001) ‘Prescriptive Gender Stereotypes and Backlash Towards Agentic Women’,   Journal of Social Issues, 57:4, 743-762 Ruxton, S (2004) Gender equality and men: learning from practice, Oxfam, UK United States Small Business Administration (1993) Women Business Owners, SBA, Washington DC Walby, S (1997) Gender transformations, Routledge, UK. Whitehead, S M (2001) The masculinities reader, Wiley-Blackwell, Cambridge. Whitehead, S M and Moodley, R (1999) Transforming managers: gendering change in the public sector, Routledge, London. Wittenberg-Cox, A and   Maitland, A (2009)   Why Women Mean Business, John Wiley Sons, USA

Thursday, November 21, 2019

International Project-Brazil Essay Example | Topics and Well Written Essays - 750 words

International Project-Brazil - Essay Example There has been large variations and inequalities in income in the recent past owing to inflation, but have overcome these economic complexities. It is one of the fastest growing economies in the world with GDP growth of 5%. The Brazil economy ranks the eighth largest economy in terms of nominal GDP and ninth largest in terms of purchasing power. The service industry is the largest contributor of GDP at 66% which is followed by the industry and agriculture sectors. Brazil has the 2nd biggest industrial sector in the Americas having diverse industries such as automobiles, steel, consumer products, computers to aircrafts. The Brazilian government has also introduced many programs to accelerate the growth and development of the economy. (Economy of Brazil, n.d) Brazil has developed drastically in the recent past in agricultural, mining, manufacturing and service related sectors. It is considered as one of the fastest growing economies in the world. The growth cycle in Brazil has been con sistent and ongoing since 1970. Given below the per GDP average from 1981-2008. The legal system in Brazil is based on codes and legislation which are controlled at the federal, municipal and state level which are based on Roman- Germanic traditions. Municipalities and federal districts have laws which do not contradict the federal constitution. The legal system is based on the civil law tradition and the country is ruled by the federal constitution. The highest court in Brazil is the supreme tribunal. There are a specialized court for military and labor and the usually the jurisdictions are handled and administered by judiciary entities. Brazil is a federal district and federal republic with 26 states. It is made of Executive, legislative and judicial branches and usually the president of the country can hold up the position for 4 consecutive years and can have his own cabinet ministers. The current

Wednesday, November 20, 2019

Hrm issues Essay Example | Topics and Well Written Essays - 2000 words

Hrm issues - Essay Example Therefore, even though hiring such people might be more expensive for the company, the business will win in the long run since a team of professionals in their function is more likely to help in avoiding compensation payments following tribunal decisions than promoted and untrained people from within the company. As the working team is created it is the time to start the design of a strategic business development plan, which would address such issues as resourcing, training and rewarding employees. However, all these functions should be incorporated into a larger-scale plan for developing and maintaining such aspects of business behaviour as leadership, performance management and organizational culture, among others. The most immediate issues to solve are related to employees’ resourcing, training and reward systems. Resourcing System Armstrong (2000) outlines that among the major objectives of employee resourcing strategy are finding and hiring employees with the needed skill s, knowledge and training potential. These initial requirements to the choice of potential employees are, then, to become the basis for further development and motivation of the staff. However, since most of the company’s employees are unskilled, part- time or agency workers, it is worth to pay more attention to the attitudinal and behavioural characteristics of the potential employees (Townley, 1989). The employees should not view the company as a temporary place to work at. On the contrary, the organization should be perceived as a stable and developing company that provides a good long-term employment opportunity. To become such, the company has to modify its resourcing system. In the first place it is suggested to minimize the number of part-time and agency workers and use their services on an as needed basis. Though employing part-time employees provides higher levels of scheduling flexibility and reduces the wage and benefit costs (Conway and Briner, 2002), using their service should be limited to the busiest periods of business operations. This suggestion can be justified by the fact that, according the research conducted by Conway and Briner (2002), part-time employees have lower commitment, trust and loyalty levels in comparison to those of full-time employees. Therefore, employing people on a full-time basis will help, in the long run, to shape such, directly related to performance, aspects of employees’ behaviour as job satisfaction, organizational citizenship behaviour, loyalty and, therefore, efficiency. Furthermore, full-time employment will help people to develop organizational commitment and trust and, as a result, will reduce turnover. At the same time, effectively designed training and rewards systems are the other elements of business operations that are to have a significant impact on the reduction of turnover. Another important aspect to deal with is hiring supervisors to manage the work of the production staff. Currently the production director of the company chooses and draws supervisors from the production st

Monday, November 18, 2019

Correlation between ESL students Research Paper

Correlation between ESL students - Research Paper Example Two studies were done in regards to preparing instructors to teach critical languages particularly Chinese and Arabic before joining US schools. The examination was geared towards illuminating the effects of on-going professional opportunities and pedagogical training. The need to train the teachers was informed by lack of background on different religious practices, cultures and ethnicities by pre-service teachers. Lack of exposure to diverse cultures by most of the foreign teachers impacted on their teaching since they relied mostly on myths and stereotypical misconceptions. The ultimate result was poor performance for ESL students not exposed to American culture in IETLS. Millennial learners are racially diverse. They have exhibit varying ethnic, religious, educational, cultural behaviors and characteristics leading to differences in the ability and capacity to adapt new languages, particularly English. According to Ota, millennial learners vary across regions as per socio-economi c conditions. It is more dependent on familiarity and use of digital technologies, media and communications. There is a gap between efforts students have in the classroom and what they finally score in IELTS leading to a need to carry out a qualitative analysis on more than 100 participants particularly millennial learners to establish whether narratives on ESL and IELTS especially in regards to bridging the gap between the two.  The major issue faced by Saudi students being taught IELTS in U.S.  Ã‚  

Friday, November 15, 2019

Security information and event management

Security information and event management Introduction: Security Information and Event Management (SIEM) automates incident identification and resolution based on built in business rules to help improve compliance and alert staff to critical intrusions. IT audits, standards and regulatory requirements have now become an important part of most enterprises day-to-day responsibilities. As part of that burden, organizations are spending significant time and energy scrutinizing their security and event logs to track which systems have been accessed, by whom, what activity took place and whether it was appropriate. Organizations are increasingly looking towards data-driven automation to help ease the burden. As a result, the SIEM has taken form and has provided focused solutions to the problem. The security information and event management market is driven by an extremely increasing need for customers to meet compliance requirements as well as continued need for real-time awareness of external and internal threats. Customers need to analyze sec urity event data in real time (for threat management) and to analyze and report on log data and primarily this has made security information and event management market more demanding. The market remains fragmented, with no dominant vendor. This report entitled Security Information and Event Management (SIEM) Solutions gives a clear view of the SIEM solutions and whether they can help to improve intrusion detection and response. Following this introduction is the background section which deeply analyzes the evolution of the SIEM, its architecture, its relationship with the log management and the need for SIEM products. In the analysis section, I have analyzed the SIEM functions in detail along with real world examples. Finally the conclusion section summarizes the paper. Background: What is SIEM? Security Information and Event Management solutions are a combination of two different products namely, SIM (security information management) and SEM (security event management). SIEM technology provides real-time analysis of security alerts generated by network hardware and applications. The objective of SIEM is to help companies respond to attacks faster and to organize mountains of log data. SIEM solutions come as software, appliances or managed services. Increasingly, SIEM solutions are being used to log security data and generate reports for compliance purposes. Though Security Information and Event Management and log management tools have been complementary for years, the technologies are expected to merge. Evolution of SIEM: SIEM emerged as companies found themselves spending a lot of money on intrusion detection/prevention systems (IDS/IPS). These systems were helpful in detecting external attacks, but because of the reliance on signature-based engines, a large number of false positives were generated. The first-generation SIEM technology was designed to reduce this signal-to-noise ratio and helped to capture the most critical external threats. Using rule-based correlation, SIEM helped IT detect real attacks by focusing on a subset of firewall and IDS/IPS events that were in violation of policy. Traditionally, SIEM solutions have been expensive and time-intensive to maintain and tweak, but they solve the big headache of sorting through excessive false alerts and they effectively protect companies from external threats. While that was a step in the right direction, the world got more complicated when new regulations such as the Sarbanes-Oxley Act and the Payment Card Industry Data Security Standard follo wed much stricter internal IT controls and assessment. To satisfy these requirements, organizations are required to collect, analyze, report on and archive all logs to monitor activities inside their IT infrastructures. The idea is not only to detect external threats, but also to provide periodic reports of user activities and create forensics reports surrounding a given incident. Though SIEM technologies collect logs, they process only a subset of data related to security breaches. They werent designed to handle the sheer volume of log data generated from all IT components, such as applications, switches, routers, databases, firewalls, operating systems, IDS/IPS and Web proxies. With an idea to monitor user activities rather than external threats, log management entered the market as a technology with architecture to handle much larger volumes of data and with the ability to extend to meet the demands of the largest enterprises. Companies implement log management and SIEM solutions to satisfy different business requirements, and they have also find out that the two technologies work well together. Log management tools are designed to collect report and archive a large volume and breadth of log data , whereas SIEM solutions are designed to correlate a subset of log data to point out the most critical security events. On looking at an enterprise IT arsenal, it is likely to see both log management and SIEM. Log management tools often assume the role of a log data warehouse that filters and forwards the necessary log data to SIEM solutions for correlation. This combination helps in optimizing the return on investment while also reducing the cost for implementing SIEM. In these tough economic times it is likely to see IT trying to stretch its logging technologies to solve even more problems. It will expect its log management and SIEM technologies to work closer together and reduce overlapping functionalities. Relation between SIEM and log management: Like many things in the IT industry, theres a lot of market positioning and buzz coming around regarding how the original term of SIM (Security Information Management), the subsequent marketing term SEM (Security Event Management), the newer combined term of SIEM (Security Information and Event Management) relate to the long standing process of log management. The basics of log management are not new. Operating systems, devices and applications all generate logs of some sort that contain system-specific events and notifications. The information in logs may vary in overall usefulness, but before one can derive much value out of them, they first need to be enabled, then transported and eventually stored. Therefore the way that one does gather this data from an often distributed range of systems and get it into a centralized (or at least semi-centralized) location is the first challenge of log management that counts. There are varying techniques to accomplish centralization, ranging from standardizing on the syslog mechanism and then deploying centralized syslog servers, to using commercial products to address the log data acquisition, transport and storage issues. Some of the other issues in log management include working around network bottlenecks, establishing reliable event transport (such as syslog over UDP), setting requirements around encryption, and managing the raw data storage issues. So the first steps in this process are figuring out what type of log and event information is in need to gather, how to transport it, and where to store it. But that leads to another major consideration about what should one person want to do with all those data. It is at this point where the basic log management ends and the higher-level functions associated with SIEM begins. SIEM products typically provide many of the features that remain essential for log management but add event-reduction, alerting and real-time analysis capabilities. They provide the layer of technology that allows one to say with confidence that not only are logs being gathered but they are also being reviewed. SIEM also allows for the importation of data that isnt necessarily even t-driven (such as vulnerability scanning reports) and it is known as the Information portion of SIEM. SIEM architecture: Long term log management and forensic queries need a database built for capacity, with file management and compression tools. Short term threat analysis and correlation need real time data, CPU and RAM. The solution for this is as follows: >Split the feeds to two concurrent engines. >Optimize one for real time and storage up to 30 days of data. (100-300GB) >Optimize the second for log compression, retention, and query functions. (1TB+) The block diagram showing the architecture of the SIEM is as follows: [Source: Reference 2] A collector is a process that gathers data. Collectors are produced in many shapes and sizes from agents that run on the monitored device, to centralized logging devices with pre-processors to split stream the data. These can be simple REGEX file parsing applications, or complex agents for OPSEC, LEA, for .Net/WMI, SDEE/RDEP, or ODBC/SQL queries. Not all security devices are kind enough to forward data, and multiple input methods, including active pull capabilities, are very essential. Also, since SYSLOG data is not encrypted, it may need a collector to provide encrypted transport. A threat analysis engine will need to run in real time, continuously processing and correlating events of interest passed to it by the collector, and reporting to a console or presentation layer application about the threats found. Typically reporting events that has happened for 30 days are sufficient for operational considerations. A log manager will need to store a great deal of data, and may take either raw logs or filtered events of interest, and need to compress store and index the data for long term forensic analysis and compliance reporting. Capacity for 18 months or more of data is likely to be required. Year end closing of books and the arrival of the auditors often necessitate the need for 12 months of historic data plus padding of several months while books are finalized and an audit to be completed. At the presentation layer a console will present the events to the security staff and managers. This is the primary interface to the system for day to day operations, and should efficiently prioritize and present the events with a full history and correlation rationale. SIEM functions: With some subtle differences, there are four major functions of SIEM solutions. They are as follows: 1. Log Consolidation centralized logging to a server 2. Threat Correlation the artificial intelligence used to sort through multiple logs and log entries to identify attackers 3. Incident Management workflow What happens once a threat is identified? (link from identification to containment and eradication). Notification email, pagers, informs to enterprise managers (MOM, HP Openview) Trouble Ticket Creation Automated responses execution of scripts (instrumentation) Response and Remediation logging 4. Reporting Operational Efficiency/Effectiveness Compliance / SOX, HIPPA, FISMA. Ad Hoc / Forensic Investigations Coming to the business case for SIEM, all engineers are perpetually drawn to new technology, but purchasing decisions should by necessity be based on need and practicality. Even though the functions provided by SIEM are impressive they must be chosen only if they fit an enterprises needs. Why use a SIEM? There are two branches on the SIEM tree namely, operational efficiency and effectiveness, and log management/compliance. Both are achievable with a good SIEM tool. However since there is a large body of work on log management, and compliance has multiple branches, this coursework will focus only on using a SIEM tool effectively to point out the real attackers, and the worst threats to improve security operations efficiency and effectiveness. It can be believed that the most compelling reason for a SIEM tool from an operational perspective is to reduce the number of security events on any given day to a manageable, actionable list, and to automate analysis such that real attacks and intruders can be discerned. As a whole, the number of IT professionals, and security focused individuals at any given company has decreased relative to the complexity and capabilities demanded by an increasingly inter networked web. While one solution may have dozens of highly skilled security engineers on staff pouring through individual event logs to identify threats, SIEM attempts to automate that process and can achieve a legitimate reduction of 99.9+% of security event data while it actually increases the effective detection over traditional human driven monitoring. This is why SIEM is preferred by most of the companies. Reasons to use a SIEM: To know the need for a SIEM tool in an organization is very important. A defense in depth strategy (industry best practice) utilizes multiple devices: Firewalls, IDS, AV, AAA, VPN, User Events LDAP/NDS/NIS/X.500, Operating System Logs which can easily generate hundreds of thousands of events per day, in some cases, even millions. No matter how good a security engineer is, about 1,000 events per day is a practical maximum that a security engineer is about to deal with. So if the security team is to remain small they will need to be equipped with a good SIEM tool. No matter how good an individual device is, if not monitored and correlated, each device can be bypassed individually, and the total security capabilities of a system will not exceed its weakest link. When monitored as a whole, with cross device correlation, each device will signal an alert as it is attacked raising awareness and threat indications at each point allowing for additional defences to be brought into play, and i ncident response proportional to the total threat. Even some of the small and medium businesses with just a few devices are seeing over 100,000 events per day. This has become usual in most of the companies says the internet. Real world examples: Below are event and threat alert numbers from two different sites currently running with 99.xx% correlation efficiency on over 100,000 events per day, among which one industry expert referred to as amateur level, stating that 99.99 or 99.999+% efficiency on well in excess of 1,000,000 events per day is more common. Manufacturing Company Central USA 24 hour average, un-tuned SIEM day of deployment Alarms Generated 3722 Correlation Efficiency 99.06% Critical / Major Level Alerts 170 Effective Efficiency 99.96% [Source: Reference 2] In this case, using a SIEM allows the companys security team (2 people in an IT staff of 5), to respond to 170 critical and major alerts per day (likely to decrease as the worst offenders are firewalled out, and the worst offenses dealt with), rather than nearly 400,000. Financial Services Organization 94,600 events 153 actionable alerts 99.83% reduction. [Source: Reference 2] The company above deals with a very large volume of financial transactions, and a missed threat can mean real monetary losses. With respect to the Business Case, a good SIEM tool can provide the analytics, and the knowledge of a good security engineer can be automated and repeated against a mountain of events from a range of devices. Instead of 1,000 events per day, an engineer with a SIEM tool can handle 100,000 events per day (or more). And a SIEM does not leave at night, find another job, take a break or take vacations. It will be working always. SIEM Selection Criteria: The first thing one should look at is the goal. (i.e.) what should the SIEM do for them. If you just need log management then make the vendor can import data from ALL of the available log sources. Not all events are sent via SYSLOG. Some may be sent through: Checkpoint LEA Cisco IDS RDEP/SDEE encryption Vulnerability Scanner Databases Nessus, Eeye, ISS AS/400 Mainframes flat files Databases ODBC/SQL queries Microsoft .Net/WMI Consider a product that has a defined data collection process that can pull data (queries, retrieve files, WMI api calls), as well as accept input sent to it. And it is essential to be aware that logs, standards, and formats change, several (but not all), vendors can adapt by parsing files with REGEX and importing if one can get them a file. However log management itself is not usually an end goal. It matters about for what purpose these logs are used for. They may be used for threat identification, compliance reporting or forensics. It is also essential to know whether the data captured is in real-time. If threat identification is the primary goal, 99+% correlation/consolidation/aggregation is easily achievable, and when properly tuned, 99.99+% efficiency is within reach (1-10 actionable threat alerts / 100,000 events). If compliance reporting is the primary goal, then consider what regulations one is subject to. Frequently a company is subject to multiple compliance requirements. Consider a fortune 500 company like General Electrics. As a publicly traded company GE is subject to SOX, as a vendor of medical equipment and software they are subject to HIPPA, as a vendor to the Department of Defense, they are subject to FISMA. In point of fact, GE must produce compliance reports for at least one corporate division for nearly each and every regulation. Two brief notes on compliance, and one should look at architecture: Beware of vendors with canned reports. While they may be very appealing, and sound like a solution, valid compliance and auditing is about matching output to ones stated policies, and must be customized to match each companys published policies. Any SIEM that can collect all of the required data, meet ISO 177999, and provide timely monitoring can be used to aid in compliance. Compliance i s a complex issue with many management, and financial process requirements, it is not just a function or report IT can provide. Advanced SIEM Topics: Risk Based Correlation / Risk Profiling Correlation based on risk can dramatically reduce the number of rules required for effective threat identification. The threat and target profiles do most of the work. If the attacks are risk profiled, three relatively simple correlation rules can identify 99%+ of the attacks. They are as follows: IP Attacker repeat offenders IP Target repeat targets Vulnerability Scan + IDS Signature match Single Packet of Doom Risk Based Threat Identification is one of the more effective and interesting correlation methods, but has several requirements: >A Metabase of Signatures Cisco calls the attack X, ISS calls it Y, Snort calls it Z Cross Reference the data >Requires automated method to keep up to date. >Threats must be compiled and threat weightings applied to each signature/event. Reconnaissance events are low weighting but aggregate and report on the persistent (low and slow) attacker Finger Printing a bit more specific, a bit higher weighting Failed User Login events a medium weighting, could be an unauthorized attempt to access a resource, or a forgotten password. Buffer Overflows, Worms and Viruses -high weighting -potentially destructive events one need to respond to unless one has already patched/protected the system. >The ability to learn or adjust to ones network Input or auto-discover which systems, are business critical vs. which are peripherals, desktops, and non-essential >Risk Profiling: Proper application of trust weightings to reporting devices (NIST 800-42 best practice), can also help to lower cry wolf issues with current security management Next-generation SIEM and log management: One area where the tools can provide the most needed help is in compliance. Corporations increasingly face the challenge of staying accountable to customers, employees and shareholders, and that means protecting IT infrastructure, customer and corporate data, and complying with rules and regulations as defined by the government and industry. Regulatory compliance is here to stay, and under the Obama administration, corporate accountability requirements are likely to grow. Log management and SIEM correlation technologies can work together to provide more comprehensive views to help companies satisfy their regulatory compliance requirements, make their IT and business processes more efficient and reduce management and technology costs in the process. IT organizations also will expect log management and intelligence technologies to provide more value to business activity monitoring and business intelligence. Though SIEM will continue to capture security-related data, its correlation engine can be re-appropriated to correlate business processes and monitor internal events related to performance, uptime, capability utilization and service-level management. We will see the combined solutions provide deeper insight into not just IT operations but also business processes. For example, we can monitor business processes from step A to Z and, if a step gets missed, well see where and when. In short, by integrating SIEM and log management, it is easy to see how companies can save by de-duplicating efforts and functionality. The functions of collecting, archiving, indexing and correlating log data can be collapsed. That will also lead to savings in the resources required and in the maintenance of the tools. CONCLUSION: SIEM is a complex technology, and the market segment remains in flux. SIEM solutions require a high level of technical expertise and SIEM vendors require extensive partner training and certification. SIEM gets more exciting when one can apply log-based activity data and security-event-inspired correlation to other business problems. Regulatory compliance, business activity monitoring and business intelligence are just the tip of the iceberg. Leading-edge customers are already using the tools to increase visibility and the security of composite Web 2.0 applications, cloud-based services and mobile devices. The key is to start with a central record of user and system activity and build an open architecture that lets different business users access the information to solve different business problems. So there is no doubt in SIEM solutions helping the intrusion detection and response to improve. References: 1. Nicolett.M., Williams.A.T., Proctor.P.E. (2006) Magic Quadrant for Security Information and Event Management, 1H06 RA3 1192006. 2. Swift.D. (2006) A Practical Application of SIM/SEM/SIEM Automating Threat Identification 3. SIEM: A Market Snapshot (2007) from http://www.crn.com/security/197002909;jsessionid=BVQXTH11HH14JQE1GHPSKH4ATMY32JVN [Date Accessed: 20th November,2009]. 4. WHAT IS SIEM (2008) from http://www.exploresiem.com/resource-center.html [Date Accessed: 24th November, 2009]. 5. Securing and Managing Your Enterprise: An Integrated Approach (2008) from http://www.exploresiem.com/images/WP-Securing-and-Managing-Your-Enterprise.pdf [Date Accessed: 25th November, 2009]. 6. Shipley .G.(2008) Are SIEM and log management the same thing? from http://www.networkworld.com/reviews/2008/063008-test-siem-log-integration.html [Date Accessed: 26th November, 2009] 7. Levin.D. (2009) The convergence of SIEM and log management from http://www.networkworld.com/news/tech/2009/031909-tech-update.html [Date Accessed: 26th November, 2009]

Wednesday, November 13, 2019

Hades vs. Demons :: Ancient Greece Greek History

Hades vs. Demons Greek Mythology and Religion Mythology is the study and explanation of myth of a particular culture. Myth, is a cultural phenomenon that can have many different point of views. Mythology and religion in the past still influence today. It is difficult to imagine that ancient myth and history has had a tremendous impact not only in today's culture but also in lifestyle and religious beliefs. To some extend, people rather believe that there is no consequence in your sins in the afterlife. Mythic stories, for example, show how the world began, how humans and animals were created, and how certain manners, and specific human activities originated. Ancient Greek religion has been the main stream of investigation and research from classic times to the modern day. In Greek mythology, Hades, also known as Pluto, is the god and ruler of the underworld, which is the kingdom of the dead. He is an egotistic god, who is greatly concerned with expanding his society. Often Hades is severely cautious and selective on permitting any of his people to leave. It's unquestionable that even the commander of the underworld had fallen in love with Persephone. Although the relationship between Hades and Persephone appears to have established badly, their union was peaceful. For most, life in the underworld was not enjoyable. It's more like a tormented and miserable dream, full of shadows, without sunlight or hope, a joyless place where the dead slowly fade into nonexistence. It's a realm not only for the sinners but also for the saints. When we speak of demons we immediatelymagine of a red evil spirit with an extended pointy tail. But many of us ask ourselves, Demons? Where and how did demons come about? The word demon is derived from the Greek daimon, which in ancient times signified various kinds of spirits or semi-gods, which particularly weren't evil. The term "demons" was not always understood to have the absolutely negative indication that it does today. Our current use of the term "Demon" is a malignant spirit, which usually from the New Testament. However there is still great indecision as to whether or not demons are considered to be distinct and separate from the devil and his fallen angels. It is mentioned in the New Testament, chapter 5, verse 12, by Josepheus a method of exorcism which is prescribed by Solomon. "Prevailed or succeeded greatly among them down to the present time" .

Sunday, November 10, 2019

Pygmalion: the Play and Higgins Essay

Pygmalion is a primarily Shavian reworking of Ovid’s Metamorphoses with undertones of Cinderella. Romance and satire dominate both the play’s plot as well as style. Shaw takes a strong central situation–the transformation of a common flower girl into a lady–and surrounds it with superficial trimmings. There is technical innovation in the plot structure since Shaw, under the influence of Ibsen, replaces the stock Victorian formula of exposition, situation and unraveling with exposition, situation and discussion. The plot thus has three distinct stages of development. In the first stage Professor Henry Higgins, who is an expert in phonetics, transforms a common flower girl into an artificial replica of a lady by teaching her how to speak correctly. Prior to this Eliza’s life has been miserable. As a poor flower girl she coaxes money out of prospective customers and is thrilled when she suddenly receives a handful of coins that Higgins throws into her basket. She lacks the capacity to express her feelings articulately and an indiscriminate sound of vowels â€Å"Ah – ah – ow – ow – oo† serves to connote a multitude of emotions ranging from pain, wonder, and fear to delight. However she is not entirely depraved and is at least self-reliant enough to earn her own livelihood by selling flowers. In Act Two Eliza arrives at Higgins’ laboratory at Wimpole Street and haughtily demands that Higgins teach her to speak correctly so that she can become a lady in a flower shop. This desire for financial security and social respectability constitutes a step forward in her larger quest for self- realization. For Higgins Eliza is simply a phonetic experiment, a view that dehumanizes her and results in the creation of an artificial automaton-like replica of a lady. In the second stage of the play the audience encounters an Eliza who has become an artificial duchess. She is no longer a flower girl but is not quite a lady. During Mrs. Higgins’ at-home she proceeds to deliver Lisson Grove gossip with an upper class accent. She is nothing more than a live doll and there is an element of crudity in her parrot-like conversation. The mask of gentility that she wears only partially hides her low class background. Shaw demonstrates here that having fine clothes and the right accent are not enough to make a lady. The fact that the Eynsford-Hills fail to see through her facade implies that they too do not possess true gentility. By the time that Eliza returns after her triumphant society appearance at the Ambassador’s ball, she no longer exhibits this element of crudity. She has benefited from Higgins’s lessons in achieving social poise and has acquired the ability to articulate her thoughts and feelings. She has begun to think for herself and is capable of manipulating any situation to her advantage. The play enters into the third phase of development in Act Four. Eliza now encounters the great moment of truth and reality of her situation. Her education has created in her an intense dissatisfaction with the old way of life and she is not exactly pleased about the avenues open to her as a lady. She realizes that her social acquisitions do not enable her to fulfill her aspirations or even earn a living. She becomes aware of the wide disparity between her desires and the inadequacy of the means for fulfilling them. She repudiates Higgins’ suggestion that she could marry a wealthy husband and wryly comments that earlier â€Å"I sold flowers, I didn’t sell myself† while now that she has been made a lady she isn’t fit to sell anything. She has thrown away her mask and reveals a newfound maturity. She throws Higgins’ slippers at him and thereby breaks free from a life of subjugation and dependence. Critics feel that at this point the play enters into a period of calm and the main impetus of the action dissipates. Eliza’s society appearance has been a tremendous success and after the climatic encounter between Higgins and Eliza in Act Four the dramatic tension disappears. Eliza runs away to Mrs. Higgins and the only issue left is the resolution of her relationship with Higgins. The readers have to agree that the main impetus of the action has disappeared since all the preceding acts had been gearing up for the crucial moment of Eliza’s test. Now Alfred Doolittle’s strategic second appearance performs a resuscitating act for the play in its dying stage. Doolittle’s transformation from a dustman to a gentleman also provides an ironic comment on Eliza’s metamorphosis. After this brief spirit of energy the action returns to the issue at hand – the relationship between Eliza and Higgins. Eliza has developed into a self-sufficient woman and has become a perfect match for Higgins. She has garnered the requisite strength of character and maturity of thought to face life courageously. Gentility has become an integral aspect of her personality. No longer afraid of Higgins, she treats him as an equal. She negates his role in her transformation and insists that it was the Colonel’s generosity and courteous behavior, which truly made her a lady. She rejects Higgins’ proposal that he, she and Pickering live together like old bachelor friends and astounds him by announcing that she will marry Freddy instead and support him by offering herself as an assistant to Nepommuck. Higgins, although hurt at Eliza’s suggestion of assisting the detestable Nepommuck, is nevertheless happy that Eliza is no longer a whining helpless creature but a tower of strength and a woman at last. The play concludes on an uncertain note and the readers do not know whether she might indeed marry Higgins. This reflects Shaw’s inherent distaste for finality. In the majority of his plays the issues and conflicts they deal with are never quite resolved and the audience is left wondering about what will happen after the curtain falls. However Shaw realizing the importance of an ending does provide a resolution in the epilogue. The dramalies neither in the conflict, nor in the discussion or the exposition. The conflict itself arises over the issue of the resolution of the problem. Unless there is a resolution, there is no drama, for the action remains incomplete. Action always has to be completed either comically or tragically. Hence in the epilogue, Shaw resolves the issue by making Eliza marry Freddy Hill. It was typical of Shaw to have provided such an anti-romantic conclusion to the play. Many commentators accuse Shaw of deliberately twisting the natural end of Pygmalion merely to make the play unromantic. But critics would do well to remember that the actual point of ending is not the issue of Eliza’s marriage but her achievement of liberty. While throughout the play Higgins boasts of having transformed a common flower girl into a duchess, after Eliza’s climactic assertion of independence from his domination he remarks, â€Å"I said I’d make a woman of you; and I have. † In this perspective the original ambiguous ending seems preferable to the neat resolution given in the epilogue.

Friday, November 8, 2019

Antibiotic Sensitivity In Microorganisms Biology Essay Essay Example

Antibiotic Sensitivity In Microorganisms Biology Essay Essay Example Antibiotic Sensitivity In Microorganisms Biology Essay Essay Antibiotic Sensitivity In Microorganisms Biology Essay Essay Antibiotics are compounds that putting to death or inhibit micro-organisms from turning. Antibiotics can be made from natural merchandises, such as bacteriums and Fungis, or man-made chemicals. Individual antibiotics are effectual against specific bacteriums by selectively aiming or modulating some important procedure in the microbic cells. Bacterias that produce antibiotics to modulate the growing of their neighbours need to develop opposition for self-defense. Antibiotics work by suppressing the needed synthesis and tracts, such as cell wall synthesis, production of proteins required for reproduction, written text, and interlingual rendition, and disrupting phospholipid bilayers to increase cell permeableness ( Walsh, 2003 ) . Their short coevals times may take to the development of mutants that would perchance give them resistance to different antibiotics. Once a cistron has been found to let a bacteria to go immune to an antibiotic, the bacteria will be selected for survival adva ntage. Antibiotic opposition can be obtained through geting an R ( opposition ) plasmid, an excess chromosomal Deoxyribonucleic acid that carries an antibiotic opposition cistron ( Woolfolk et al. , 2004 ) . Some bacteriums are even immune to multiple antibiotics. The impairment in societal conditions has besides shown to increase the spread of infective diseases ( Walsh, 2003 ) . As medical specialty progresss, antibiotic opposition additions because over clip bacteriums can germinate and develop opposition. Antibiotics have been overprescribed and used falsely, such as non following the dose instructions given by the physician. Antibiotics are besides unsuitably prescribed for virus infections, which would non hold any consequence. Continuous over-dosage of antibiotics can besides kill the normal vegetations that protects us from some pathogens and toxins. Even with all the antibiotics and vaccinums that have been discovered up until today, there will neer be adequate antibiotics. There will ever be an antibiotic opposition job. New antibiotics are needed to battle new strains of bacteriums that arise from antimicrobic opposition. The Kirby-Bauer method is one of the common techniques used in clinical research labs to prove susceptibleness of different strains of bacteriums to an array of antibiotics ( Woolfolk et al. , 2004 ) . This technique allows us to detect the minimal repressive concentration ( MIC ) of antimicrobic activity. The MIC is the smallest concentration of the antibiotic that will halt the growing of bacteriums. The process works by insulating a pure strain of bacteriums from a beginning and is uniformly dispersed onto Mueller-Hinton agar. Small filter paper phonograph record that contain different antibiotics are suspended onto the surface of the agar home base. The antibiotic will spread into the Mueller-Hinton agar home base and this will bring forth a glade around the phonograph record that will suppress bacterial growing if the bacteriums do non hold a opposition cistron for the antibiotic. Susceptibility can be determined by mensurating the diameter of the zone of growing suppression tha t is produced around the antibiotic paper phonograph record. The aim of the antimicrobic susceptibleness testing is to compare the antimicrobic capablenesss of Gram-negative bacteriums and Gram-positive bacteriums from Enterobacter spp. and Staphylococcus aureus, severally. The consequences from the Kirby-Bauer method are so compared to the standard consequences in the CLSI Document M100-S17 ( M2 ) : Disk Diffusion Supplemental Tables, Performance Standards for Antimicrobial Susceptibility Testing ( Woolfolk et al. , 2004 ) . Consequences Genus name: Gram positive isolate Gram negative isolate Staphylococcus aureus Enterobacter spp. Antibiotic Zone of suppression ( millimeter ) Recorded sensitiveness Expected sensitiveness Zone of suppression ( millimeter ) Recorded sensitiveness AMOXICILLIN/ Clavulanic Acid 38 Susceptible Susceptible 40 Susceptible Azithromycin 30 Susceptible Susceptible 31 Susceptible Cephalothin 40 Susceptible Susceptible 34 Susceptible Ciprofloxacin 40 Susceptible Susceptible 39 Susceptible Gentamicin 30 Susceptible Susceptible 24 Susceptible PENICILLIN G 27 Intermediate Susceptible 21 Immune Piperacillin 28 Susceptible Susceptible 24 Susceptible POLYMYXIN B 18 Susceptible Immune 9 Intermediate Rifampin 44 Susceptible Susceptible 35 Susceptible Sulfadiazine 0 Immune Susceptible 0 Immune Tetracycline 35 Susceptible Susceptible 30 Susceptible Vancomycin 22 Susceptible Susceptible 14 Immune The above chart includes the diameter ( zone of suppression ) that was measured for each ascertained round glade of each antibiotic for S. aureus and Enterobacter spp. From the zone of suppression, the sensitiveness of the bacterium was determined and compared to the expected sensitiveness. The S. aureus isolate is immune to sulfadiazine, intercede to penicillin G, and susceptible to all of the other antibiotics. The Enterobacter spp. isolate is immune to penicillin G, sulfadiazine, intermediate to polymyxin B, and susceptible to all of the other antibiotics. Discussion The interpretative criterions for the Kirby-Bauer technique was used to find whether the bacteriums are susceptible, intermediate, or resistant to the antibiotic ( Woolfolk et al. , 2004 ) . After 48 hours in incubation at 37 A ; deg ; C, each home base is examined. If the bacterium run was done decently, there should be a lawn of bacteriums growing. Improper streaking ( e.g. extremely diluted sample, light streaking ) will take to the presence of single settlements. If bacterial growing is inhibited by the MIC at the site of infection, the being is considered to be susceptible. The intermediate class means that bacterial growing is still observed within the expected perimeter of the expected handbill glade, but non every bit much as susceptible bacteriums. If bacterial growing is still observed in the presence of the antibiotic, the being is considered to be immune to the antibiotic. Not all of the isolates conform to the form of antibiotic opposition sensitiveness. The unexpected opposition of these bacteriums may be due to the fact that I was antecedently exposed to ampicillin and kanamycin in a research lab. The Enterobacter spp. isolate was out of the blue susceptible to azithromycin and rifampin. Azithromycin and Rifadin are non supposed to suppress the growing of Gram-negative bacteriums. In an agar dilution method carried out by Chayani et Al. ( 2009 ) , Enterobacter spp. isolates were found to hold a 0 % susceptibleness to azithromycin with an MIC A ; lt ; 8Â µg/mL and 100 % opposition to azithromycin with an MIC A ; gt ; 8Â µg/mL, and 33.33 % susceptibleness to azithromycin by the usage of the disc diffusion method. Azithromycin is a broad-spectrum antibiotic that inhibits protein synthesis by adhering to the 50S rRNA. The 50S fractional monetary unit is common in all procaryotes ; therefore it is possible that Zithromax can aim the 50S fractional mo netary unit in the Enterobacter spp. isolate. Rifampin is a broad-spectrum antibiotic and is chiefly active against Gram-positive bacteriums and can hold minimum consequence on Gram-negative bacteriums. The antibiotic specifically acts on DNA-dependent RNA polymerase, which blocks messenger RNA synthesis and interferes with nucleic acerb metamorphosis. In Kerry et Al. s survey ( 1975 ) , Rifadin was shown to hold an consequence against all strains of Enterobacter spp. Enterobacter spp. s opposition to penicillin G was expected, but its opposition towards sulfadiazine does non conform to the criterion of antibiotic opposition sensitiveness. Sulfadiazine is portion of the household of sulfonamide antibiotics. Bacterial opposition to one sulfa drug antibiotic can take to resistance to all antibiotics within the sulfonamide household ( Rosenkranz et al. , 1974 ) . Sulfadiazine has a broad spectrum that works on both Gram-negative and Gram-positive bacteriums, which could explicate why Enterobacter spp. and S. aureus isolates were both immune to sulfadiazine. Sulfadiazine interferes with the production of folic acid, which is required for bacterial growing. Sulfadiazine inhibits p-aminobenzoic acid ( PABA ) , which interferes with the folic acerb metamorphosis rhythm because PABA is usually converted to folic acid by the bacteriums ( Rosenkranz et al. , 1974 ) . A possible ground to how both Enterobacter spp. and S. aureus became immune to sulfadiazine is because both isolates were taken after exposure to the Kantrex antibiotic. In a survey done by Rosenkranz et Al. ( 1974 ) , they noticed that isolates of Enterobacter cloa cae that were immune to sulfadiazine are besides immune to carbenicillin and kanamycin. The opposition to carbenicillin and kanamycin suggested the possibility that there is a presence of an R plasmid which would transport the determiners for carbenicillin and Kantrex opposition. Strains with an R plasmid displayed an enhanced opposition to sulfadiazine. R plasmids carry the opposition cistron that encodes proteins to undergo assorted mechanisms to short-circuit the antibiotic, such as demobilizing antibiotics via chemical alteration, barricading the antibiotic from acquiring into the cell and taking the antibiotic if it does acquire into the cell, making a replacement mark for the antibiotic, or have alternate tracts that are non sensitive to the antibiotic ( Woolfolk et al. , 2004 ) . The S. aureus isolate was out of the blue susceptible to polymyxin B and resistant to sulfadiazine. Polymyxin B inhibits the growing of Gram-negative bacteriums by interfering with the phospholipids, hence increasing cell permeableness. This antibiotic does non hold much consequence on Gram-positive bacteriums because the cell wall is excessively thick for the antibiotic to acquire entree to the membrane. It is possible that the concentration of the polymyxin B was much greater than the S. aureus isolate denseness, leting the antibiotic to be more effectual and efficient to killing Gram-positive bacteriums. Polymyxin B was found to hold small consequence on different strains of S. aureus, but however there was still some consequence against Gram-positive bacteriums ( Scott et al. , 1999 ) . Lipoteichoic acid ( LPA ) is a big constituent of the cell wall of Gram-positive bacteriums. Polymyxin B contains a cationic construction that would interact with the LPA of Gram-positive bacteriu ms because the construction of LPA contains an overall negative charge. Some attacks, such as new trial methods, different micro-organisms, and fluctuation of civilization conditions, have been used to better the opportunities of happening new substances. Microbiologists are now analyzing conserved unfastened reading frames that are alone to procaryotes and non eucaryotes. Old marks, such as cell wall biogenesis, protein biogenesis, and DNA reproduction and fix, are being studied more exhaustively to develop new and more effectual antibiotics. There have besides been new marks, such as bacterial fatty acid, isoprenoid, isocitrate lyase, and lipid A in Gram-negative bacteriums, which are speculated to be susceptible to new antibiotics ( Walsh, 2003 ) . New antibiotics are being developed as we increase our cognition of bacterial mechanisms and physiology, but in order for antibiotics to stay effectual against bacterial infections antibiotics must be prescribed and taken in right dose and in relevant infections.

Wednesday, November 6, 2019

Gothic Art and Architecture Essay Example

Gothic Art and Architecture Essay Example Gothic Art and Architecture Paper Gothic Art and Architecture Paper Gothic art and architecture played a very important role in the appearance of medieval times. The approximate time frame of the Gothic stage began in 1125, preceding the Romanesque period. Gothic art was first considered very ugly and was believed that barbarians were only capable of making such pieces. So, the name gothic meaning ghost was given to this time period. Now in the 20th century people think Gothic art is beautiful and admire It greatly. The First Methodist church In Notate by Red Barrel is a Gothic church. While looking at the church you take note of the pointed arches. This Is a feature that began in the Gothic time period, and replaced rounded arches of the Romanesque period. Pointed arches are on every window and on the frame of the door. Inside you can see a simple barrel vaulting system. Another feature of Gothic art that The First Methodist Church has Is the wonderful stain glass windows. They were very long and told a religious story. The stain glass allows the walls to be thinner and let a nice color filled light In. This light fills the church, and back then would be one of the only systems of light. The most dominant feature of Gothic architecture is the size, or height of the church. They believed that the higher the church the better, because they were closer to heaven. Some even contained towers so they could be closer to heaven. The one in Notate is very tall and has a very high ceiling. The ground plan for the church is in a cross, just like medieval times. Inside the church is very complex along with the high ceilings. : There are no painting, but the columns are highly decorated and complex. The First Methodist Church in Notate has many Gothic features, but is missing some characteristics. It does not have flying buttresses, or a rose window, which were strong Gothic traits. Also there were no windows on the east end where the sun rises. Alters were mainly put on the eat end, so when the sun rose it would fill the alter with light. Gothic architecture is very beautiful, and the town of Notate is very lucky to have such a marvelous Gothic church in its town.

Monday, November 4, 2019

International Finance - currency Essay Example | Topics and Well Written Essays - 2250 words

International Finance - currency - Essay Example Same method is applied for obtaining the values mentioned at other places and tables elsewhere also in this paper. FOREX experts thought that the pound would begin the year 2003 on an optimistic note but unfortunately for the pound, that year also began with a downward trend against the Euro and continued till the year end. The first quarter saw the pound value against euro drip by 5.8% from 1.539429 to 1.449098. It further continued the downward journey to 1.438329 by the end of second quarter reaching its lowest of the year at 1.397857 on May 30. The decline in the second quarter was 0 .7 % and negligible when compared to the first quarter decline. On the whole, the pound dripped by 6.56 % during the first half of the year which had seen the euro rise against the pound from 0.649591to 0.695251. The following table and the subsequent graph show the decline of the pound against the Euro as explained earlier in the first half of the year 2003. The European Central Bank (ECB) has continued with a policy of consistency in bank rates boosting up the morale of the Euro in FOREX markets. In January and February, 2003, the Governing Council of ECB decided to continue with existing rates of 3.75% and 1.75 % for marginal lending and deposit facilities respectively. The minimum bid rate on main refinancing operations also continued to be at 3.75% putting at rest all the rumours. This was followed by a report, released on February 24, 2003, that claimed that the solvency levels of EU banks also continued to be even stronger. The regulatory capital ratio for EU banking system stood at 12% as against the minimum requirement of 8% in the preceding two years of 2001 and 2002, according to this report (Press release, 24 February 2003-EU Banking sector stability, The banking sector has remained stable). While these decisions helped the Euro maintain its stability and uptrend against the pound, some unfavourable trends persisted on the home ground for the latter currency adding fuel to the fire. No doubt, the British economy had recorded maximum growth rate in the third quarter of 2002 due to buoyancy in consumer spending and rising of prices while the GDP rose by 0.94 % in comparison with the previous quarter. But the inflation rate had crossed the Bank of England's (BOE) expected target of 2.5% reaching almost 2.8% in the last quarter (Released on 1/9/03 For 4 Jan 2003 ). The BOE defended the inflation rate arguing that the tendency was temporary and had its sources in the rising prices of oil and housing. With a view to reverse the inflation trend, the BOE had reduced the interest rate to 3.75 percent from 4%. This was the lowest level borrowing rate in the country since 1955 (Released on 2/6/03 For Feb 2003) and it naturally made the public and FOREX traders lose interest on the pound leading to its continuous downtrend against the Euro. The following table shows how it went down further in the second half of the year 2003. Date / Month

Friday, November 1, 2019

Read Case 7.2 titled Poverty and Pollution, prior to starting this Essay

Read Case 7.2 titled Poverty and Pollution, prior to starting this assignment - Essay Example In many third world countries, large volumes of the population live in poverty conditions due to lack of quality infrastructure, lack of taxation revenues for government improvements, or even warring regimes attempting to seize power as a primary goal that depletes national resources. This is why businesses that conduct their operations in poor nations disregard pollution control standards: Because they can easily get away with these actions with little to no consequence. Thoroughly assessed the connections between economic progress and development, on the one hand, and pollution controls and environmental protection, on the other. Thoroughly suggested the reasons a business may conduct operations in a third world country and disregard any standards of pollution control. Many third world nations, since government is unable to stimulate economic growth internally, rely on foreign direct investment as a means of trying to stimulate the national economy. Many will provide taxation incen tives or even removal of tariffs as a means to foster foreign investment, which provides an ample incentive to move operations from developed nations to the third world country. For example, in Yemen, there are viable opportunities for water-based transport industry leaders to invest in the nation. The Yemen currency is substantially below that of major nations such as the United States, the United Kingdom and Saudi Arabia, therefore companies attempt to exploit these opportunities for substantial profitability when local investments require very little start-up or asset procurement capital. Between 2009 and 2011, transport and shipping projects were estimated to be valued at $9 billion, with much of this foreign investment being recruited by the country’s Council of Ministers (United Nations, 2009). Using Yemen as the relevant example, companies will establish operations in this country due to the political problems currently plaguing the nation. Powerful militant groups in this country took over the majority of government oversight, forcing the nation to consider a complete rewrite of its constitution. Instability in this country politically defies opportunities for the business to devote resources to attempt to impose sanctions on businesses that pollute, therefore it becomes simplistic business practice to simply dump its unwanted waste in the country and in its waters without concern of local government backlash, fines, or complete dejection from the nation. Yemen is a member of the United Nations, however the UN only maintains jurisdiction in partnership with the legal systems abiding in the country. By the time nations such as Yemen with difficult political environments make legally-supported appeals to the UN to curb pollution by foreign companies, the ensuing process is so elongated that the business is able to exploit foreign nation resources and simply move to another, less developed third world country. Are the aforementioned practices of bu siness polluting in other nations due to lack of authority over government or UN-supported legalities ethical? Any reasonable individual that believes in corporate social responsibility and many global standards of human rights would absolutely indicate that this is highly unethical. However, at the same time, a person considering the ethical responsibility of foreign businesses must consider the theory of ethical relativism before making a determination. Those in global society that are strong supporters of ethical relati