Thursday, October 31, 2019

What were the major factors in the establishment of the American Research Paper - 1

What were the major factors in the establishment of the American colonies - Research Paper Example World history has seen a lot of timelines. The prominence of some of the timelines made it extremely difficult for anyone to believe that such moments in world history would ever pass away but eventually, these moments of great history passed. The same phenomenon about world history makes the future of the social world quite unpredictable. For instance it is quite difficult to predict whether technology would eventually fade off to give room for a new kind of world and social history. One prominent moment in history is undeniably the formation of colonies. According to People Hofstra (2001), an 18th century definition of a colony has been given as â€Å"a settlement in a new territory under the political and economic control of its parent country. Usually the settlers conquered and either dominated or replaced local peoples.†1 Most commonly, colonies were established as a means of expanding the territorial powers of kingdoms and nations. It was not surprising therefore that ma jor nations of the world would in the 1700s go every extent and to every length of the world to capture weaker components of the world and lord themselves over as colonial masters. One of such prominent colonization was the colonization of America by the English2. Events leading to this all important moment in world history have left historians with a lot of studies into what the probable factors that accounted for the establishment of the American colonies were. Historians also discuss the relevance of these factors and how they eventually imparted on the eventual colonies that came into existence.3 The essence of this essay therefore is to review such factors that led to the establishment or formation of the American colonies. Background to the American Colonies At the beginning of the 17th century, several countries and nations made attempts to colonize North America. These different colonies came with different mission statements and at different times. Primarily however, they w ere present in North America to have an opportunity to possess the land and colonize it. Some of the early countries that made progress in settling in North America include Spain, France, Sweden, Holland, and England. According to Horvath (1972, 45-57), â€Å"the literature on colonization would appear to have no end; and understandably for colonization has been one of man’s preoccupations.†4 Although colonization ranks with the most influential processes in man’s history, western scholars have not fully come to grips with the phenomenon. This assertion of uncertainty on the definition of colonization is being made because of the seemingly different forms that colonization takes. This is indeed not different with what happened in the instance of the establishment of the American colonies. The first nations namely Spain, France, Sweden and Holland landed in North America in different fashions but all left the scene in no time. Basically, these nations could not s tay because the North American settlers were hostile to their dreams. Unlike these attempted colonial masters perceived, they were not going to pick gold from the ground but were supposed to go through very hard times to have their aspirations of making wealth fulfilled. England however took a bolder step apart from the first four nations. Though Britain went through ostensibly difficult times even at the beginning, they persevered and eventually became the only nation that remained. By the year 1607, England had established herself as the colonial master of North America. It took England one hundred and six more years to complete establishing what came to be known as the thirteen colonies of America5. This means that the formation or establishment of the thirteen colonies of America spanned from the period of 1607 to 1733; by which time Delaware, Pennsylvania, New Jersey, Georgia, Connecticut, Massachusetts Bay, Maryland, South Carolina, New Hampshire, Virginia, New York, North Car olina, and Rhode Island and

Tuesday, October 29, 2019

Hot IPOs Can Damage your Long-Run Wealth! Essay Example for Free

Hot IPOs Can Damage your Long-Run Wealth! Essay This paper investigates the links between hot markets, long run underperformance and venture capital in the UK using a unique sample of 593 IPOs for the 1985-2003 period. It finds no evidence for long run underperformance for the full sample but does find robust support for significant underperformance during hot markets. The significant hot market return differential relative to the first day trading is consistent with investor sentiment and market timing. The differential relative to the offer price is also statistically significant thereby confirming Ljungqvist et al. ’s (2006) first prediction and providing further support for long run underperformance by hot market IPOs. The evidence does not support certification hypotheses. Hot-market, venture-backed IPOs underperform very significantly while their non-venture counterparts suffer substantial negative returns for only three years post-IPO. Similarly, the significantly negative relationship between underpricing and long-term returns for venture-backed IPOs during hot markets furnishes evidence of market timing. Industry analysis reveals that the return differential is significant for the high-technology sector both for the full sample and separately for venture-backed and non-venture IPOs. Indeed a majority of high-technology firms in the sample went public during hot markets. Cross-sectional regressions provide additional support for significant underperformance by high-technology firms in hot markets for the whole sample and non-venture IPOs. Finally, IPOs in general and venture-backed IPOs in particular with strong pre-IPO earnings growth generated significantly superior performance in all periods. The impact was most marked during hot markets, suggesting a role for robust pre-IPO operating results in determining the likelihood of long-term performance. 1. Introduction Loughran and Ritter (1995) find for a sample of almost 5000 US IPOs 1970-1990 that investors receive annual returns of just 7% on average in the five post-issue years. To place this underperformance in context, investors would have had to invest a staggering 44% more in issuers than in similar-sized non-issuers to achieve the same terminal wealth. Their graphic conclusion is that â€Å"Investing in firms issuing stock is hazardous for your wealth† (Ibid. p. 46). Long run underperformance has puzzled researchers in financial economics ever since and is identified by Ritter and Welch (2002) as possibly the most controversial area of IPO research. This paper has three objectives. The first is empirically to test hypotheses related to hot markets and especially some of those proposed by Ljungqvist, Nanda and Singh (2006). To our knowledge the latter has not been done to date. Ljungqvist et al. argue that investor sentiment is the underlying cause of the IPO underperformance anomaly. They propose that a test of underperformance in hot markets relative to the offer price rather than the first day trading price provides a tougher hurdle. We adduce empirical support for significant underperformance in hot markets relative to both the first day trading price and to the offer price. These are in line with those of Ritter (1991), Cook, Jarrell and Kieschnick (2003) and Helwege and Liang (2004) and Derrien (2005) who link investor sentiment to hot markets. Our results are in agreement with recent findings for IPO markets in other countries. Helwege and Liang (2004) compare US firms going public in hot and cold markets during 1975-2000 and examine their performance over the following five years. Both hot and cold market IPOs are found in the same narrow set of industries and hot markets occur at the same time for many industries. Their results suggest that hot markets reflect greater investor optimism rather than other factors. Cook et al. (2003) also find that US IPOs during hot markets have lower long-term returns than IPOs during cold markets due to sentiment investors driving prices beyond their fair value. Derrien (2005) is one of the few hot market studies to focus on a non-US market. His findings support the view that IPOs occurring during bullish market conditions in France are overpriced. The second objective is to explore the links between long run underperformance and hot markets for a sample of UK IPOs. In this context it is the first attempt to investigate such links in the UK which boasts one of the largest and most developed capital markets outside the United States. Ibbotson and Jaffe (1975) and Ritter (1984) pioneered the hot markets concept. They documented the existence of hot periods of high IPO volume (underpricing) where subsequent underperformance tends to be more dramatic. The implication is that market timing is uppermost in issuers’ minds when taking advantage of market sentiment in such periods. Our UK sample comprises of a set of 593 venture-backed and non-venture IPOs on the Official List of the London Stock Exchange over the period from 1985 up to 2003. The advantages of this sample are twofold. On one hand, it is a relatively large sample according to the definition of Ritter (2003) who points out that Japan and the UK are the only countries other than the US that can muster IPO samples in excess of 500. On the other hand and more importantly, our UK IPO sample differs in one fundamental aspect from US samples. The latter contain a large proportion of high-technology firms while our UK sample is more evenly distributed by industry. Thus our data should provide a basis for robust hypothesis testing of aspects of long run underperformance. The third objective of the paper is to explore the conjecture first postulated by Brav and Gompers (1997) that venture capitalists play an important role in explaining the underperformance puzzle. They show that US venture-backed IPOs outperform non-venture IPOs five years after the offer date and conclude that underperformance primarily resides in small non-venture IPOs which are the most likely to be influenced by investor sentiment. However, our sample shows no significant difference in returns between venture-backed and non-venture IPOs in contrast to the Brav and Gompers (1997) findings. The return differential between hot and normal markets is highly significant for venture-backed IPOs although it is only marginally significant for non-venture firms. Industry analysis reveals that this return differential is significant for the high-technology sector for both the full sample and separately for venture-backed and non-venture IPOs. We find some evidence of venture capitalists exploiting investor sentiment during hot markets which is confirmed by a significantly negative relationship between underpricing and long-term returns for venture-backed IPOs during hot markets. This latter finding contrasts with that of Helwege and Liang (2004) who find no significant role for venture capital presence during either hot or cold markets in the US. The remainder of this paper is organised as follows. In section 2 the literature on long run IPO performance, venture capital involvement and investor sentiment is reviewed. Section 3 describes the data and methodology related to performance measurement. Section 4 discusses the empirical results of univariate sorts and cross-sectional regressions. A final section concludes. 2. Hot Markets and Long-run IPO Underperformance 2. 1 The underperformance anomaly While long run underperformance is well documented for the USA, results for other countries such as the UK are rather limited. Levis (1993) used a sample of 712 UK IPOs 1980-1988 to document significant long-term IPO underperformance 36 months after the first trading day. Espenlaub, Gregory and Tonks (2000) re-examine the evidence on the long-term returns of IPOs for a sample of 588 UK IPOs 1985-1992. Using an event-time framework, they find substantial negative abnormal returns after the first three years irrespective of the benchmark used. Although some researchers underline the role of hot IPO markets, only a few empirical studies have so far compared long-run performance in hot and cold (normal) markets. Helwege and Liang (2004) study a US sample of 3,698 IPOs between 1975 and 2000. Distinguishing between hot, cold and neutral markets they find both hot and neutral market IPOs tend to underperform while cold market IPOs tend to outperform a variety of benchmarks. After adjusting for economic conditions, they find little evidence for cross-sectional differences between the characteristics of hot and cold market IPOs and no significant difference between their post-issue operating performances. These findings lead the authors to conclude that hot markets are primarily driven by investor optimism. Similarly, Cook et al. (2003), using 6,080 US IPOs between 1980 and 2002, show that IPOs during hot markets tend to perform more poorly than IPOs during cold markets. They find that IPOs trade at higher valuations and their offer sizes are larger during hot markets and that these firms are less likely to survive. They conclude that investor sentiment is a more important feature of IPO markets then hitherto recognised. Non-US studies are rare but Derrien (2005) is a notable exception. He develops a model in which bullish noise trader sentiment during hot markets leads to overpriced IPO shares relative to their long-run intrinsic value. Using a sample of 62 IPOs on the French stock exchange for the hot period of 1999 till 2001, he empirically shows that the long-run stock price performance of IPO shares is negatively impacted by investor sentiment. Ljungqvist, Nanda and Singh (2006) build a theoretical model in which the presence of irrational investors leads to hot markets and the associated long-run underperformance. In their model, sentiment investors purchase stock from institutional investors at inflated prices. Underwriters allocate new issues to their institutional client base if there is insufficient sentiment demand, perhaps due to a hot IPO market and many issuers trying to tap the capital markets. These institutional investors then sell off their holdings at increased prices to exuberant investors post-IPO who are driven by market fads. The sentiment driven prices, on the other hand, deflate over time, leading to negative returns. Below we extend the existing hot market studies by empirically testing some of the hypotheses proposed by Ljungqvist et al. (2006). 2. 2 Venture capitalists and investor sentiment While much of this literature stresses asymmetric information and the certification role of venture capitalists, a part of it also ascribes a role to investor sentiment. Brav and Gompers (1997) were the first to test the long-run performance of a sample of new issues disaggregated into venture-backed and non-venture IPOs. They use a sample of 934 venture capital backed IPOs and 3,407 non-venture IPOs in the United States from 1972 through 1992 and show that venture-backed IPOs outperform non-venture IPOs over a five-year period. They conduct an asset pricing analysis and find that venture-backed IPOs do not underperform while non-venture IPOs indicate severe underperformance. Partitioning the non-venture IPOs on the basis of size shows that underperformance resides primarily in small non-venture IPOs. Brav and Gompers (1997) argue that bouts of investor sentiment are a possible explanation for the severe underperformance of small non-venture IPOs because the latter are more likely to be held by individuals. Along similar lines, Megginson and Weiss (1991) show that institutional ownership of IPOs is substantially higher for venture-backed than for non-venture IPOs. They report that institutions hold, on average, 42. 3% of the offer in venture-backed firms as compared to 22. 2% of the amount offered in non-venture backed firms. We employ the hot market concept to shed new light on the role and performance of venture versus non-venture backed firms 3. Data and Methodology 3. 1 Data A unique sample was selected from the IPOs listed on the London Stock Exchange for the period from January 1985 to December 2003. IPOs of investment trusts, financial companies, building societies, privatisation issues, foreign-incorporated companies, unit offerings and spin-offs are excluded. The filtering process also excludes share issues at the time of a relisting after a firm is temporarily suspended or transfers from lower tier markets such as the now defunct Unlisted Securities Market and the Alternative Investment Market. We exclude the latter IPO market established in 1995 since it has no minimum market capitalization and would likely lead to a small company bias. The final sample consists of 593 IPOs of ordinary shares by domestic operating companies on the Official List of the London Stock Exchange with listing methods comprising placements or offers for sale at a fixed price. This is the result of the filters applied to a total of 2,489 IPOs that listed on the Official List of the London Stock Exchange for the period 1985-2003. The sample include some 317 venture-backed and 276 non-venture IPOs. The data sources include Datastream, the London Stock Exchange Quality of Markets Quarterly Reviews, Primary Market Fact Sheets and Yearbooks, IPO prospectuses, Extel Financial microfiches and Thomson Financial Global Access Database.

Saturday, October 26, 2019

Analysis of Data Leakage Prevention Solution

Analysis of Data Leakage Prevention Solution Anuja Vasant Kale, Vishwajeet Bajpayee, Shyam P Dubey ABSTRACT: In any organization or institution we have to deal with lots of data. Those data may contain confidential information about the customer, project related data, employee personal data etc. If such type of confidential data is leaked from the organization then it may affect on the organization health. Hence we have to enforce some policies in order to prevent data leakage. Data leakage is a loss of data which can be occurred on any storage device where the data is stored. There are two ways in which data can be leaked; if the system is hacked or if the internal resources intentionally or unintentionally make the data public. If the system is hacked then we have some existing technologies like antivirus, firewall etc which can prevent data from leakage. We will discuss here the second scenario where we provide data leakage prevention solutions. We make the use of a bayesian theorem for maintaining confidentiality of data in an organization. KEYWORDS: sensitive data, data leakage, internal attack, external attack, data leakage prevention, bayesian approach. Introduction Nowadays, Information Security became a vital and a major subject, especially with the spreading of information sharing among private and public networks for all organizations across different industrial sectors (e.g. telecom, banking, education all over the world). The importance of securing information is playing a significant role especially when sharing, distributing, accessing and publishing any information that had been classified as a sensitive, either for the organization itself or the clients who sharing their private information with the organization, such as information stored, shared, distributed and viewed through the electronic documents systems and/or images of paper documents systems widely used by a lot of organizations. Many of organizations have given a great deal of attention has been given to protecting their sensitive data from the outside threats by using a set of security countermeasures like: intrusion prevention systems, firewalls, and management of the vulnerability points inside them. So, organizations must now turn their attention to an equally critical situation that forms -for them- a great challenge today, that is: the problem of data leaking or loss from the inside. In fact, in many organizations there’s a gaping hole in controlling, monitoring, and protecting its business environment and electronic data assets from leaking or loss to the wrong individuals or groups intentionally or accidentally. This hole is the now ubiquitous in businesses, health, education organizations and individuals who need needed to communicate with each other over the Internet network. In our days, many of the electronic communications heavily used inside any organization for many purposes, for instance: local mail, instant messaging, web mail, data files transferring, and also organization website still go largely to different destinations without any limitations, monitoring, and controlling on its movements from the organization. Thus, the expected result for this issue is there is a big potential for the organization confidential information be falling into the wrong hands. Surely, from this significant point, the organization sensitive data should be protected very well, otherwise will be facing tragic results like: business loss, damaged reputation, bad publicity, loss of strategic customers, and loss of competitiveness with the other organizations. As a result, any organization using similar electronic document system must keep a close eye to secure sensitive data that had gone forth/back through this system or application to maintain reputation and business continuous, and ensure regulations, laws compliance, along with being different from others. One of the recent methodologies and technical solution has been raised to top is the Data Leakage Prevention (DLP) solution, which is basically protecting sensitive data of an organization from being viewed by wrong individuals, whether from outside or even inside the organization. This basically means that specific data can be viewed by only a specific set of an authorized individuals or groups for them. Related work As organizations progress into a more technological environment, the amount of digitally stored data increases dramatically. As a consequence, keeping track of where it is stored is no longer as easy as before. The modern workforce naturally creates and uses data sensitive to the organization to do their job. This data is then used across services such as email, business applications and cloud-services, as well as being accessed from multiple devices, including laptops and mobile phones. In many cases it is even hard for the users to manage the amount of data they deal with themselves, and the (ir) responsibility doesn’t end there. In addition, a user also needs to keep track of how sensitive data is and who should be allowed to access it. DLP is a recent type of security technology that works toward securing sensitive data in an automated and non-intrusive fashion. Through policies a DLP system automatically makes sure no sensitive data is stored, sent or accessed where it shouldn’t be, while still allowing users to use the tools and services they choose and need to fulfil their tasks. Unlike traditional white- and blacklisting, the DLP only blocks the actions where sensitive data is involved, e.g. sending e-mails is perfectly acceptable, but not if they contain sensitive data. DLP can also be set to handle different levels of sensitivity and document access control. To quote George Lawton: â€Å"DLP systems keep people from deliberately or inadvertently sending out sensitive material without authorization† [9]. In addition to protecting sensitive data, a modern DLP should be adaptive, mobile and as minimally intrusive as possible [7]. Adaptive means that it can work in different environments and be configured to meet the needs of a wide range of different businesses. Mobile means that it can still protect the data, even when the device is used outside the company network. The products today only fulfil this to a certain degree. DLP is still maturing, but unlike a few years ago, most vendors have standardized on the core functionality that defines a modern DLP solution. Proposed System In Today’s business world, many organizations use Information Systems to manage their sensitive and business critical information. The need to protect such a key component of the organization cannot be over emphasized. Data Loss/Leakage Prevention has been found to be one of the effective ways of preventing Data Loss. DLP solutions detect and prevent unauthorized attempts to copy or send sensitive data, both intentionally or/and unintentionally, without authorization, by people who are authorized to access the sensitive information.DLP is designed to detect potential data breach incidents in timely manner and this happens by monitoring data. Data Loss Prevention is found to be the data leakage/loss control mechanism that fits naturally with the organizational structure of businesses. It not only helps the organization protect structured data but it also helps protection and leakage prevention of unstructured data. In any organization or institution we have to maintain lots of sensitive data or confidential data. These data may contain the confidential information regarding the projects; customer privileged data or employee personal data; if such type of confidential data is leaked from the organization then it may affect on the organization health. Data leakage is a loss of data that occur on any device that stores data. It is a problem for anyone that uses a computer. Data loss happens when data may be physically or logically removed from the organization either intentionally or unintentionally. A data stored on any storage device can be leaked in two ways; if the system is hacked or if the internal resources intentionally or unintentionally make the data public. Hacking can be prevented by carefully configuring your Firewalls and other security devices. We will be discussing the second scenario i.e. if an internal resource makes the sensitive data public. Consider the possibility of an employee leaking the sensitive data. Now there are various ways in which data can leave the organization via internet, Email, webmail, FTP etc. Consider the possibility that an employee needs to forward the confidential data through Email or and uploading those files on to a server which can be accessed by outside world. Before reaching that confidential data to the unauthorized person we need to enforce some policies in order to avoid the violation of the organization health. To achieve the primary requirement is to scan the whole outbound traffic. We will maintain the DLP (data link prevention) server, which would scan the complete attachment to match the patterns. In case the patter matches, the attachment will be corrupted with the User designed message and an automated response E-mail will be sent out. This mechanism is shown in the figure below. Figure 3: The process of Data Leakage Prevention (DLP) mechanism. As shown in the above figure, there is an internal employee of the organization who is trying to send the confidential data via email. Now, before reaching that confidential data to the unauthorized person we need to enforce some policies. For that we are using the Data Leakage Prevention (DLP) Server. 3.1 Data Leakage Prevention (DLP) Server Data Leakage Prevention (DLP) is a computer security term which is used to identify, monitor, and protect data in use, data in motion, and data at rest [1]. DLP is used to identify sensitive content by using deep content analysis to per inside files and with the use if network communications. DLP is mainly designed to protect information assets in minimal interference in business processes. It also enforces protective controls to prevent unwanted incidents. DLP can also be used to reduce risk, and to improve data management practices and even lower compliance cost. DLP solution prevents confidential data loss by monitoring communications which goes outside of the organization, encrypting emails which contain confidential information. We are enabling conformity with global privacy and data security in securing outsourcing and partner communication. To check whether an email contains confidential data or not, DLP server makes the use of a Naive Bayes spam filtering. 3.2 Naive Bayes Algorithm Naà ¯ve Bayesian method is used for the learning process. Analyze a mail to calculate its probability of being a Spam using individual characteristic of words in the mail. For each word in the mail, calculate the following: S (w) = (number of Spam emails containing the word)/(total number of Spam emails) H (w) = (number of Ham emails containing the word)/(total number of Ham emails) P (w) = S(w)/(S(w)+H(w)) P (w) can be interpreted as the probability that a randomly chosen email containing the word w is Spam. Exceptions Say a word w =â€Å"success† appears only once and it is a Spam email. Then the above formula calculates P (w)=1. This doesn’t mean that all future mails containing this word will be considered as Spam. It will rather depend upon its degree of belief. The Bayesian method allows us to combine our intuitive background information with this collected data. Degree of belief f(w)= [(s*x)+(n*p(w))]/(s + n) s=Assumed strength of the background information. x= Assumed probability of the background information. n= no of emails received containing word w. Combining the probabilities Each email is represented by a set of probabilities. Combining these individual probabilities gives the overall indicator of spamminess. Fisher’s Method: H= Chi_inverse (-2*ln(Product of all(f(w)), 2*n) S= Chi_inverse (-2*ln(Product of all(1-f(w)), 2*n) I= [1+H-S]/2 Here, I is the Indicator of Spamminess. A Genetic Algorithm A mail can be divided into three parts: Body From Subject Genetic Algorithm can be used to get an appropriate weight say ÃŽ ±, ÃŽ ² and ÃŽ ³ for â€Å"body† part, â€Å"from† part and â€Å"subject† part. IFinal= ÃŽ ±*IBody+ ÃŽ ²*IFrom+ ÃŽ ³*ISubject The overall accuracy is a function of ÃŽ ±, ÃŽ ² and ÃŽ ³. Genetic Algorithm maximize the above function. Advantages of Bayesian Method Bayesian approach is self adapting. It keeps learning from the new spams. Bayesian method takes whole message into account. Bayesian method is easy to use and very accurate (Claimed Accuracy Percentage is 97). Bayesian approach is multi-lingual. Reduces the number of false positives. Conclusion Sensitive Data leaking prevention became one of the most pressing security issues facing Organizations today. The most effective solution to the problem is to see Data Leakage Prevention solution (DLP) as a part of your overall security problem. This solution can be fully integrated with other security tools within organization, to form a comprehensive security strategy plan to protect these data properly. Data Leakage Prevention (DLP) solution can be used effectively in reducing intentional sensitive data leakage actions, through monitoring user’s actions and protecting three groups of organizations data: data at rest, data in use, and data in motion. This solution can be regarded as â€Å"integrated† through achieving two main phases [two layers of defence]: protecting sensitive data and securing sensitive data of organization alike. The organization also needs to create an Acceptable Use Policy (AUP) for users, and at the same time ensuring both are compliant with or ganization policies. To avoid getting broad sided by a data leakage, organizations must evaluate their vulnerabilities and respond appropriately by many ways like: Endpoints protection, Gateway protection, and encryption data. References. [1]RichardE.Mackey,Available:http://viewer.media.bitpipe.com/1240246133_118/1258558418_168/sCompliance_sSecurity_Data- Protection_final.pdf [2] Bradley R. Hunter, Available: http://www.ironport.com/pdf/ironport_dlp_booklet.pdf [3]Webspy,Available:http://www.webspy.com/resources/whitepapers/2008 WebSpy Ltd Information Security and Data Loss Prevention.pdf [4] Data loss problems, Available: http://www.webspy.com/reso urces/whitepapers/2009WebSpy Ltd-Information Security and Data Loss Prevention.pdf [5] Report, the Office of the U.S. Trade Representative, Available: http://www.ustr.gov/about -us/press- office/reports-and-publications/archive [6] Lubich, H.P; â€Å"The changing roel of IT security in an Internet world, a business perspective†; Available: http://www.terena.nl/conference/archieve/tnc2000/proceedings/2A/2a2.html [7]Sithirasenan, E.;Muthukkumarasamy, V., â€Å"Word N-Gram Based Classification for Data Leakage Prevention†, Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on 16-18 July 2013, 578 – 585, Melbourne, VIC, 13971211, 10.1109/TrustCom.2013.71. [8]Pham, D.V. Threat analysis of portable hack tools from USB storage devices and protection solutions, IEEE ISBN: 978-1-4244-8001-2 [9] http://en.wikipedia.org/wiki/Data_loss_prevention_software [10]http://www.cisco.com/c/en/us/solutions/enterprise-networks/data-loss-prevention/index .html [11] Bai Xiaoping; Wei Yuanfeng; , Study on the signal detection and simulation of universal serial bus 2.0 IP core circuit system, SoutheastCon, 2007. Proceedings. IEEE , vol., no., pp.59-62, 22-25 March 2007 [12] S. Jithesh and U. Naveen, Improved key management methodology for enhanced media security in IMS networks, New York, US: Institute of Electrical and Electronics Engineers Inc., 2007, pp. 903-907. [13] AK. Gupta, U. Chandrashekhar, S.V. Sabnis and F.A, Building secure products and solutions, Bell Labs Technical Journal, Hoboken, US: John Wiley and Sons Inc., 2007.3, pp. 21-38 [14] R.A. Shaikh, S. Rajput, S.M.H. Zaidi and K. Sharif, Comparative analysis and design philosophy of next generation unified enterprise application security, Piscataway, US: Institute of Electrical and Electronics Engineers Computer Society, 2005, pp. 517-524. [15] Data Leakage Prevention A newsletter for IT Professionals Issue 5. [16] Data Leakage Detection SandipA.Kale1, Prof. S.V.Kulkarni2 Department Of CSE, MIT College of Engg, Aurangabad, Dr.B.A.M.University, Aurangabad (M.S), India1, [17] Journal Of Information, Knowledge And Research In Computer Engineering Issn: 0975 – 6760| Nov 12 To Oct 13 | Volume – 02, Issue – 02| Page 534 Data Leakage Detection Nikhil Chaware 1,Prachi Bapat 2, Rituja Kad 3, Archana Jadhav 4, Prof.S.M.Sangve Copyright to IJIRCCE www.ijircce.com 1

Friday, October 25, 2019

World War II Essay -- History, War, Normandy Beaches

Starting with the hedgerows of the Normandy Beaches to the Bulge to the Surrender of Germany on June 7, 1944 to May 7, 1945 Ambrose tells an authentic story of World War II from the point of view of the men who battled in the war. The author explains the narrative of the â€Å"GIs, junior officers and enlisted men â€Å" (Ambrose 14), proved Hitler wrong by driving his Wehrmacht back from the beached of Normandy back to Germany. One of the greatest lessons that the reader can learn from reading the book, Citizen Soldiers is that the success of war is heavily relied upon by the junior officers and non-commissioned officers on the front lines. As the title suggests, Citizen Soldiers is not so much a study on tactical moves as it is on the citizen soldier from all parts of the United States. The book concentrates on the American GI Joe and not the Allies as a whole. The Gis were all American boys who believed in their cause, they drafted or had enlisted voluntarily, but only a few wanted to be at war, and Ambrose stated, Citizen Soldiers is not about â€Å"the generals, it’s about the junior officers and enlisted men of ETO---who they were, how they fought, why they fought, what they endured, [and] how they triumphed† (Ambrose 13). The epic drama of the European Theater of Operation (ETO) is told by Ambrose by following, almost step by step, various individuals and outfits among the tens of thousands of young Allied soldiers who broke away from the deadly beaches of Normandy and swept across France to Ardennes, fought the Battle of the Bulge, captured the bridge at Remagen, and crossed the Rhine to final victo ry in Europe. Ambrose notices that the U.S. ruined the Nazi war machine with considerable aerial bombing, artillery, and the great mob... ...that Germany was on the defensive side of the Western Front, reinforcements became ever more important. Yet as Ambrose explains the Germans could just not tactically keep the Allies in check with reinforcements. Resulting into withdrawal after withdrawal, which lead into another German tactic. The German technique of departure was that of being unhurried and expensive. They left little to the Allies and damaged everything in their withdraw trail. They also used malicious methods to dismember Allied troops such as mines and other nasty surprises. By portraying several German surrenders, Ambrose paints the picture that Germany had lost its compassion and need for traditional warfare. In since they had had enough and as Ambrose tells they were quick in many circumstances even humorous to some extent, to surrender, which would ultimately be Germany's last war tactic.

Wednesday, October 23, 2019

Business Administration Level 2 NVQ Unit 1 Questions & Answers Essay

1.1 One of the key codes of practice, guidelines and procedures that are relevant to ones work is proper communication. Others are accepting responsibility for one’s own work and its delivery. Basically one should develop his/her own performance and act in a way that encourages effective working. 1.2 If you are an employee you are accountable to your employer. They have a right to see that your work is up to standard. You may also have a plan to fill in your working day. Companies have to work out costs, and one way to do this is too plan what work the employees will do. There is nothing wrong with this. Companies will charge out your time for each job. This is the norm for garages, engineers or any firm that has a contract rate for work. 1.3 If both sides agree then both sides are happy to fulfil their commitments. It also ensures that both sides understand the situation and what their targets are. 1.4 The targets must be realistic, so that the employee has a good chance of attaining them.  This lets him feel good about himself and allows him to work without stress.  If the targets are set too high, the employee will always be under pressure to do the impossible, will feel a failure and have a dissatisfied boss. 1.5 The first thing to do is to prioritize your work. That is, place the most important job at the top; the least, at the bottom. When judging priorities, you need to do several things: (1) you need to determine what is required. This is the number of jobs that need to be done. (2) You need to figure out what is required 1.6 It is important to keep other people informed about progress because it will helps them know the targets already achieved and what they are to  achieve. This will helps them set up their objectives in order to meet their targets. Furthermore, it avoids duplication of tasks and also promotes motivation among the team players. 1.7 Allows people to be better prepared for work, mentally, physically and tools-wise. It is respectful of the other person’s time to give him or her a good idea of what and how you want them to do something and when they need to start. If these plans change, respect demands that you inform others involved of the changes to these plans. 1.8 The types of problems that may occur during your work are: – computer crashing – work not getting saved – power cuts – photocopier runs out of toner – photocopier runs out paper. 1.9 The ways of seeking assistance with getting help to resolve problems is speaking to someone understanding e.g. Supervisor/Manager and explaining the situation to them in a polite and calm manor and finding a solution to the problem. 1.10 The purpose and benefits of recognising and learning from mistakes is realising in order not to make the same mistake again, taking the advice given as a learning curve and developing knowledge about something new and different.

Tuesday, October 22, 2019

Growing Up by Russell Baker essays

Growing Up by Russell Baker essays Russell Bakers Growing Up is an educational book filled with various information that I have previously studied. The rest of this essay connects Bakers life to the information we have studied in class about the 1920s, The Depression, and World War 2. The above three are the three most important topics that shaped and made the modern present America. Russell Baker was born in 1925 and still lives today. His has a unique style of writing which charms his readers and which makes him so attractive to so many of his fans. He received his first Pulitzer Prize in 1979 for his "Observer" column and Growing Up was his second. The general summary of this book would be that Baker talks about him and his family and their struggles faced during the Depression, World War 2 and other things. Many bad things happened because of the Depression for Baker. Bakers mother, Elizabeth, lost her boyfriend Oluf, along with the depression. At first he was determined to find a job and marry Elizabeth; as the time went on, Oluf couldnt find a job and told Elizabeth to forget about him. The Great Depression lasted from October 24, 1929 until the economic recovery of the 1940s. On October 29, Black Thursday, the stock market crashed heavily, and continued to fall sharply throughout the coming weeks. As a result, the United States and the world were thrown into a decade of poverty and unemployment. The depression affected all sectors of the economy. Farm owners and agricultural workers suffered from falling crop prices. Businesses failed from a lack of investment support and a decline in the ability of the masses to afford their products. Banks closed their doors as the nation's citizens hoarded their money and defaulted on loan payments. Unemployment and hopeless poverty e nveloped the nation. When Russells mother, Elizabeth, had become sixteen, she joined her 1913 high school debate, arguing the case ...

Monday, October 21, 2019

The Godfather essays

The Godfather essays "The Godfather" is the beginning and ending of a mafia novel. Its not the only wonderful book about organized crime, but its the richest and grandest. It looks inside a family of organized crime so deeply, that we dont think of them as bad guys per say. They have respect and are behaved in a way that is very elegant. But there is also a bad part of their behavior in which they act to take actions upon them selves even if it is against the law. It is a highly known fact that the main focus of a stereotypical Mafia family should center around the use of violence. The Godfather as well as The Last Don are two novels which hold true to this focus and are interestingly enough both written by the same author: the late Mario Puzo. Although being written more than twenty-five years apart, the two novels almost mirror each other throughout. For instance, near the beginning of each book the only daughter of each family gets married. Aside from that we also see one son die in each novel as well as the husband of the familys only daughter to be killed by the family. Throughout all these instances the only thing dissimilar regarding the two Mafia families is their reasons for violence. A familys use of violence is determined by how much power they hold. In The Godfather, the main purpose behind all killing and violence can be directly related to attaining power. There are many different ways in which an author expresses himself in the creation of his novel. When a novel becomes a great seller it is usually a target for a great movie. The most important thing is to create the characters and bring them to life. When reading the novel The Godfather, a vision of how the characters look is formed, the role they play and their surroundings. It captures your imagination and takes you deep into the novel, almost making you a part of what you are reading. In this essay ...

Sunday, October 20, 2019

Alphonse Capone essays

Alphonse Capone essays Alphonse Capone a.k.a. Al Capone was born on January 17, 1899 in Brooklyn, New York. Alphonse Capone which parents were baptizes grew up in a rough district and he was a member of two kid gangs, the Brooklyn Rippers and the Forty Thieves Juniors. Although Al Capone was a bright young man, he quit school in the sixth grade at age fourteen. Although Al Capone was a criminal he had normal jobs on the side e.g. he was a clerk in a candy store, an assistant in a bowling alley and a cutter in a book bindery. Soon he became part of the notorious Five Points gang in Manhattan and now he worked in gangster Frankie Yales Brooklyn dive, Harvard In, which was an illegal gambling den. While working here he received his famous facial scars which resulted in the nickname Scarface. He had insulted a costumer and was attacked by her brother with a glass. In 1918 Capone met an Irish girl named Mary Mae Coughlin at a dance. On December 4, 1918 Mae gave birth to their son, Albert Sonny Francis. Capone a nd Mae married later that year on December 30. Capone was arrested for the first time while he was working for Yale because of a disorderly Conduct. He also murdered two men in his first years as a gangster, but nobody wanted to testimony against him, because they were either his friends or afraid of him. After Capone had sent a gang member from an Irish gang called Finnegan on the hospital, Yale sent him to Chicago because the Irish gangs where furious and threatened to kill him. So Capone now moved to Chicago with his family, were they moved into a house at 7244 South Prairie Avenue. After Capones move to Chicago he became member of the Four Deuces, a gang which were lead by his old friend from New York, John Torrio. The Year was now 1919 and a new kind of underground crime/business, illegal distribution of liquor was becoming attractive for the gangsters because...

Saturday, October 19, 2019

Research in Politics Essay Example | Topics and Well Written Essays - 3500 words

Research in Politics - Essay Example However, according to Toulmin (2003, Pp. 3 – 8), only logically correct and sound argument that is well presented will lead to the right inference and impression. Toulmin (2003, Pp. 8 – 10) goes further to state that a sound argument and a well-grounded and firmly backed claim should be able to stand against criticism, one for which a case can be presented coming up to the standard required if it is to deserve a favourable consideration. Thus, it makes sense for political scientists and other intellectuals to know how to present sound arguments and to examine rigorously the soundness of arguments that interest them. Baggini and Fosl (2010, Pp. 1 – 58) present a discussion about the basic tools for argument, including deduction, induction, validity and soundness, fallacies, etc., which enable individuals to recognise the worth of an argument and to present sound arguments that appeal to reason. However, although the previously mentioned authors have presented a discussion that introduces readers to the most basic tools or ideas that help with arguments, the term ‘relevance’ merits only a brief mention in the whole reading, even though according to Walton (2004, Chapters 1 and 2), relevance in arguments is of profound significance. Thus, it is clear that despite the excellent arguments and the logic of the discussion presented by Baggini and Fosl (2010, Pp. 1 – 58), it is possible to examine this discussion more critically. The discussion presented herein is a thorough, but critical, analysis of the ideas presented by Baggini and Fosl (2010, Pp. 1 – 58) in their discussion about arguments, which should appeal to all those with an interest in politics, philosophy, logic and the force in arguments. Baggini and Fosl (2010, Pp. 1 – 5) commence their discussion by emphasising the worth of philosophy and philosophers as being seriously concerned

Friday, October 18, 2019

Teacher Leaders and School Management Essay Example | Topics and Well Written Essays - 1500 words

Teacher Leaders and School Management - Essay Example As a result, our school has created a team to probe further on Du's case study. The task of the team is to submit a research proposal to the Dean of the Education Department for approval for funding with the aim of determining the functional roles assumed by our teacher leaders and their influence in the performance and development of work groups in our school. This paper is part of the intended research proposal. It will present a detailed discussion of the methodology to be used in the study, particularly the research design, the sampling, the data collection techniques and instruments, the data analysis method and proposed time frame for the conduct of the research. Functional roles as the main variable for the first question, will be classified according to the four (4) common work group functions (L.A.I.G.) essential to a successful group, as developed by Parson (1961) cited in Hare (1992) and as referenced by Du (2007). These are Latent pattern maintenance, Adaptation, Integration and Goal attainment. The teacher leader assumes varied and observable roles and these will be categorized in any of the above-stated common workgroup functions. The main variable for the second question, the teacher leadership, will be based on the factors, leadership attainment, group size and stability, characteristic of group leaders and members and school environment. These factors will be the basis for determining how the teacher leadership affects the performance and development of the workgroup. Methodology Research Design The research design is the main plan of action that will be used in the conduct of this research. Different designs have different applicability depending on the objective of the research and the problems presented. Other factors are also considered such as resource and time. (Ardales 1992) This paper considers the critical analysis on Du's case study prepared by our colleagues which recommends Case Study as the appropriate design for this research. According to Ardales (1992), "when the aim of the study is to have a deeper, more thorough and more comprehensive understanding of an individual or group" then case study is the appropriate design to use. It is also true especially when the researcher wants to "capture the processes which explain the characteristics and behavior of a person, group or institution under investigation". (p. 42-43) The expected responses that will be generated are very valuable inputs to this research. The use of other research designs like survey or correlat ional studies, have stricter procedures in statistical handling, which may limit the desired results. I intend take note of the observations, feeling, hesitations and other remarks that the respondents will provide; all these will be treated as very important in the analysis of this study. Research Site It is I deep loyalty that I decided to choose our school as the site for this research. The results of the research will benefit not only our school and our community. It will also benefit me, personally, as a teacher and a workgroup leader myself. Our school, a suburban elementary school geographically located in the southeastern United States, is noted for academic and management excellence. It is one of the flagship

Medias Perception of Paris Hiltons Imprisonment Essay

Medias Perception of Paris Hiltons Imprisonment - Essay Example The unit of measure was established by reference to key words for searches. Media's reaction in the pre-serving period is referenced to: blacklash, her image, get rid of her & feeling sorry for her and post era referenced to exclusive story, interviews, appearances & celebrity status. Media channels, databases and key words which will be used for searches are presented in Table 1 Table 1 Media Type Examples of Media monitored Monitoring mechanism Keywords/Topics used for search Television National News programs Topic searched ABC News NBC News Pre-serving period: blacklash, her image, get rid of her & feeling sorry for her NationalMorning Programs Good Morning America Post era - exclusive story, interviews, appearances & celebrity status Magazines National Magazines Cosmopolitan Newsweek Databases Hilton files Media citations will be reviewed to determine that each broadcast or article has affected the perception of Paris Hilton positively has affected the perception of Paris Hilton negatively has not affected the perception of Paris Hilton A mass media log needs to be complied to establish the number of times each specific keyword was covered the total number of broadcasts or articles that appeared in May, June & July 2007 the content and characteristic of the media coverage as they related to the topics Findings During the 66 day monitoring period, number of media coverage exposures will need to be assessed. Of these exposures, the number of times each topics under references was covered will be established - from television, newspapers and databases. The analysis could be presented in a...As an actress, she has appeared in several minor roles, most notably in the horror film House of Wax (2005). Some of her more recognizable screen work has been alongside friend Nicole Richie in The Simple Life. In 2006, she released her debut self-titled album Paris. Hilton has since garnered notoriety as a result of several legal incidents, the repercussions of which have caused Hilton to serve time in a correctional institution in 2007 (Web Site: Wikipedia, the free encyclopedia). Mass media content analysis is to be conducted in the periods from the day of announcement of her sentence until commencement of term and the post sentence period of further one month. There are 66 days in the study period. The unit of measure was established by reference to key words for searches. Media's reaction in the pre-serving period is referenced to: blacklash, her image, get rid of her & feeling sorry for her and post era referenced to exclusive story, interviews, appearances & celebrity status. During the 66 day monitoring period, number of media coverage exposures will need to be assessed. Of these exposures, the number of times each topics under references was covered will be established - from television, newspapers and databases. ANALYZING MEDIA MESSAGES Using Quantitative Content Analysis in Research Daniel Riffe Ohio University, Stephe

Internet Marketing Essay Example | Topics and Well Written Essays - 250 words - 1

Internet Marketing - Essay Example Customer today has a varying need with some needing more human interaction for customer interaction while others may value price and variety of selection. The gap in customer experience is more likely to be a result of technology bumps. You see, no matter how good and efficient technology is in facilitating transaction and even lowering cost, it cannot replace human interaction. Human interaction is the bedrock of most customer experience where the customer comes face to face with another human being who attends to his or her need as a customer. In a technology base business, it is often assumed that customer has already a working knowledge of what he or she needs or wants because there is little if any human interaction that will be extended to assist him or her in the purchase. This may be inimical to customers who need assistance to what they will buy. Customers who know what to buy and are familiar with the product, will be less affected by the absence of customer experience as long as the product that he or she need is available at a price that is

Thursday, October 17, 2019

Geomorphology Lab Report Example | Topics and Well Written Essays - 1500 words

Geomorphology - Lab Report Example This paper explores the process of geomorphology. The processes of the surface are made up of wind, water, fire, ice, and living things on the earth surface. The chemical reactions forming soils and altering the stability, material, and topographical rate of change under gravitational force are some of the surface processes. These factors are strongly affected by climate. The geological processes are the mountain range uplift, volcanic growth, isostatic changes in the elevation of land surfaces, sedimentary basins formation are also surface processes. The surface of the earth together with the topography form an intersection of climatic, biologic, and hydrologic action with the processes of geology. The huge topographies found on Earth display the surface intersection and the action of the subsurface. The belts of the mountains are always uplifted because of the geological processes. In the regions that are uplifted high, denudation produces the sediment that is deposited and transported elsewhere within the coastal landscape. In this case, The similar ideas may apply in cases where the individual landforms are evolving as a result of the subtractive and additive balance of processes. These processes may directly influence each other. The water, ice sheets together with sediments are the loads that may alter the topography via flexural isostasy. In many cases, the local climate of a certain place may be modified, which would in turn modify the topography by altering the hydraulic regimes of the evolution. Different geomorphologists are specifically interested in the feedback potential of tectonically and climate mediated through the geomorphic processes. The geomorphologists addresses the issues considered being more specific. They investigate the glacial deposits like eskers, moraines, and the proglacial lakes together with the glacial erosion traits that establishes the chronologies of all the

Mature market Essay Example | Topics and Well Written Essays - 1250 words

Mature market - Essay Example The customers in this mature caterpillar industry(Neson, 1999) are commercial construction companies, equipment rental and leasing companies, general construction firms and includes the mining, agricultural, waste management, industrial and forestry companies. The commercial construction companies are the lion's share of this saturated mature market because the commercial companies have more money to spend, the greatest need for machineries and the greatest need for precision controlled equipment. All market situations contain risks.(Harringon,1999) Although the small construction companies market is now growing, there will be a small income opportunity here because of the small capital investments that the customers will shell out. The machineries market,(Meyer,1983) as is the case with other industries, is affected by the economic situation. In fact Caterpillar and its competitor Komatsu could not help but watch their annual sales go down to the slowing down of the global economy. The Consumer's confidence in the product is another factor in studying the downturn in sales volume which has been long lasting. The weakening of the global economy has contributed much to the saturation or maturity of the machineries market. It is now very difficult to get a new sales orders from construction and commercial companies that need the Caterpillar products. ... Presently there are fifty five major players in the machineries business. Caterpillar occupies the number one spot because it has been in operation for the past forty years. Caterpillar equipments are in demand worldwide because it has gained the trust and confidence of its many clients. Caterpillar is known for products that are of quality and durability but also versatile. The sales people of Caterpillar are very adept at product demonstrations of their machineries and this is another big contributory factor to the success of Caterpillar. (www.bplans.com) According to Daniels, a strategic planning group, a mature company, like Caterpillar, is placed in a situation where there is very sales growth resulting to stagnant, decreasing or even break even sales. Since there are many competitors to fill the needs of only a few markets, then the selling prices will most likely not increase. Companies in the mature market economy like Caterpillar are mostly using more aggressive price, service and quality that is in tune with the customers' wishes. Since the market is tight, there is lesser elbow room to move up in terms of sales and quality services. For mature companies like Caterpillar(Sussland,2000) to grow more, growth opportunities have to be continuously discovered and implemented. This can be done thru surveys, and research and development. Another strategy is to develop an organizational structure that will fit the ever changing marketing environment. This means that there will be a ready flexible support team that Caterpillar is well known for in order to help the Caterpillar clients in every problem situation. Another strategy is revise the internal costing procedures in order to minimize costs and expenses. When expenses are lessened, then net income

Wednesday, October 16, 2019

Internet Marketing Essay Example | Topics and Well Written Essays - 250 words - 1

Internet Marketing - Essay Example Customer today has a varying need with some needing more human interaction for customer interaction while others may value price and variety of selection. The gap in customer experience is more likely to be a result of technology bumps. You see, no matter how good and efficient technology is in facilitating transaction and even lowering cost, it cannot replace human interaction. Human interaction is the bedrock of most customer experience where the customer comes face to face with another human being who attends to his or her need as a customer. In a technology base business, it is often assumed that customer has already a working knowledge of what he or she needs or wants because there is little if any human interaction that will be extended to assist him or her in the purchase. This may be inimical to customers who need assistance to what they will buy. Customers who know what to buy and are familiar with the product, will be less affected by the absence of customer experience as long as the product that he or she need is available at a price that is

Tuesday, October 15, 2019

Mature market Essay Example | Topics and Well Written Essays - 1250 words

Mature market - Essay Example The customers in this mature caterpillar industry(Neson, 1999) are commercial construction companies, equipment rental and leasing companies, general construction firms and includes the mining, agricultural, waste management, industrial and forestry companies. The commercial construction companies are the lion's share of this saturated mature market because the commercial companies have more money to spend, the greatest need for machineries and the greatest need for precision controlled equipment. All market situations contain risks.(Harringon,1999) Although the small construction companies market is now growing, there will be a small income opportunity here because of the small capital investments that the customers will shell out. The machineries market,(Meyer,1983) as is the case with other industries, is affected by the economic situation. In fact Caterpillar and its competitor Komatsu could not help but watch their annual sales go down to the slowing down of the global economy. The Consumer's confidence in the product is another factor in studying the downturn in sales volume which has been long lasting. The weakening of the global economy has contributed much to the saturation or maturity of the machineries market. It is now very difficult to get a new sales orders from construction and commercial companies that need the Caterpillar products. ... Presently there are fifty five major players in the machineries business. Caterpillar occupies the number one spot because it has been in operation for the past forty years. Caterpillar equipments are in demand worldwide because it has gained the trust and confidence of its many clients. Caterpillar is known for products that are of quality and durability but also versatile. The sales people of Caterpillar are very adept at product demonstrations of their machineries and this is another big contributory factor to the success of Caterpillar. (www.bplans.com) According to Daniels, a strategic planning group, a mature company, like Caterpillar, is placed in a situation where there is very sales growth resulting to stagnant, decreasing or even break even sales. Since there are many competitors to fill the needs of only a few markets, then the selling prices will most likely not increase. Companies in the mature market economy like Caterpillar are mostly using more aggressive price, service and quality that is in tune with the customers' wishes. Since the market is tight, there is lesser elbow room to move up in terms of sales and quality services. For mature companies like Caterpillar(Sussland,2000) to grow more, growth opportunities have to be continuously discovered and implemented. This can be done thru surveys, and research and development. Another strategy is to develop an organizational structure that will fit the ever changing marketing environment. This means that there will be a ready flexible support team that Caterpillar is well known for in order to help the Caterpillar clients in every problem situation. Another strategy is revise the internal costing procedures in order to minimize costs and expenses. When expenses are lessened, then net income

Systems Case Study Essay Example for Free

Systems Case Study Essay The subway network can be split into 4 main sub systems, those being design, manufacturing and maintenance, operation and customers. The design process initially involves designing the desired rail network, however once the entire system in in operation the design sub system involves the constant re design of features and parts caused by arising issues as well as updating the system to use newer technologies. This subsystem requires many disciplines of engineering including electrical which designs many of the electrical features including the main power system responsible in powering  of the overall system [1], civil which designs structures such as stations, bridges and tunnels underneath the city [2] and mechanical which is involved in the design of railway vehicles [3]. The manufacturing and maintenance subsystem involves the building of everything required for the system to function from manufacturing the trains themselves to constructing the network of rails, tunnels and stations they travel through. This is all continuously maintained to assure it is reliable and fully functioning to allow for the system to be operated. One important engineering discipline involved in the manufacturing subsystem is manufacturing engineering which with the aid of many other engineering disciplines is able to turn raw materials into new products such as train carts, railway tracks etc [4]. The operation process is the subsystem that the customers or users of this system rely heavily upon. The operation of this system involves using all the parts of this system in order to fulfil its function of transporting its users. The operation process involves constant monitoring of the system in order to allow for a schedule as well as maintain safety and assure the system is functioning correctly. This all requires many operators such as traffic controllers, drivers and conductors. Software Engineering is a very important part of the operation process as it is responsible for developing software to track rail carts, display arrival times and operate automated train supervision [5]. The final subsystem of this system is the customers or the users. This system includes all the users of the rail system and as the main purpose this system is to provide customers with transportation this subsystem like every other relies heavily upon all the other subsystems in order to allow the rail system to function. The main subsystems or the systems key elements interact strongly with each other and rely heavily upon each other in order for the system to function. The whole purpose of the rail transportation system is to create a more efficient, convenient and more simple way for people to travel to and from a desired location. A high level of intelligent communication and interactions between the subsystems allows the system to meet its desired outcomes. As transportation is the users need there is a strong interaction between the customers and the operation subsystems. In order to meet customers’ needs the operation of this system needs to be working efficiently, this requires all the parts involved in this subsystem to be running proficiently as any dilemmas within this subsystem can impact the customers causing problems such as delays and accidents which can lead to many complications with the system as a whole [6]. In order to meet customers needs there is a strong interaction between the operation and the manufacturing and maintainance subsystems. In order to operate the system there initially needs to be parts that have been manufactured such as tracks, stations and trains. However once the system is running constant maintenance on parts as well as the manufacturing of new parts are needed in order to allow to allow for the operation of the system to run efficiently [4]. Problems in the manufacturing and mainanace system can furthur lead to operation issues that can have a devastating impact on the customers. To assure that apropriate parts are made the manufacturing and maintainance subsystem relies on the design subsystem. This subsystem is extremely important in assuring that features of the system are designed  apropriatly eliminating any potential risks during the manufacturing and operating stages [7]. Finally the customer subsystem has strong interaction between all the other main susbystems. Actions and the behaviours of the customers infuluences and changes the ways all the subsystems interact. More users require more operation which leads to the need of more manufacturing, maintainence and design. Less users can potentially reverse this effect. In order to create a sustainable system the key elements need to rely heavily upon each other [8].

Monday, October 14, 2019

Impact of Volcanic Eruptions on Iceland

Impact of Volcanic Eruptions on Iceland Massimo Fanara Describe the three different types of volcanic eruptions that have given rise to rise to Iceland’s volcanic landforms. There are three different types of volcanic eruptions based on the lava texture. These are; Effusive: eruptions in which lava with low viscosity and settles on the side of the volcano forming gentle slopes. In this type of eruption, gases escape easily and thus there is no explosions due to the build-up of pressure (The Geological Society, 2014). Explosive: occur when gas pressure builds up in the volcano until it is released catastrophically. The highlyviscousmagma magma is trapped in the volcano by a blockage, which prevents gases from escaping. As the magma rises towards the surface, pressure increases until a weak point in the blocked crater is found. At this point all the pressure is released in a massive explosion of pyroclastics, volcanic gases and lava (The Geological Society,2014). Mixed: Eruptions involving explosions and magma flows Describe the characteristics of a thuya. How does this acquire its distinctive shape? Tuyas are eruptions occurring underneath ice sheets resulting in a layer-cake structure with a flat-top and steep-sidedvolcano. This steep sided layer-cake shape results from the rapid cooling of lava which does not travel far from the vent and thus piles up into a steep-sided mount. When the eruption is long enough that melts all the ice, a flat cap of basaltic rock on top of the hill is formed. Definethe term jà ¶kulhlaup and explain its significance to Iceland. Jà ¶kulhlaups: refers to an outburst flood event of glacial origin. Jà ¶kulhlaups erode, deposit, and re-work sediment simultaneously; they usually cause significant glaciological and sedimentological impacts creating large canyons and transport sediment and icebergs over vast outwash plains and sandur deltas (Russell, Roberts, et al., 2005). Another important aspect of jokulhlaups is the significant heat exchange between the magma and glacier, which result in subglacial eruprions and formation of hyaloclastite ridges and tuyas (Bjà ¶rnsson, 2010). What are the origins of Icelandic river waters? Describe the relevant main characteristics. Most of the Icelandic river waters originate from abundant glacier melting. This result in distinctive characteristics including; Huge amount of debris High turbidity Usually yellowish-brown in colour. The maximum discharge usually occurs in July or early August. Most of the rivers are unnavigable. Explain  the following terms: (i) tephrachronology, (ii) crytotephra,and (iii) isopachs. Tephrochronology: is a method for relating and dating geological, palaeoecological, palaeoclimatic, or archaeological sequences or events (Lowe, 2011). Crytotephra: It involves the use of volcanic ash which travelled long distances and which may have formed distinct but invisible layers within a sites stratigraphy (Lane, Cullen, et al., 2014). Isopachs: Isopachs are line drawn on a map connecting all points of equal thickness of a particular geologic formation. These allow the user to create isopach mapsillustrating variations in thickness within a layer orstratum. Isopach maps are used are utilized inhydrographic survey,stratigraphy,sedimentology,structuralgeology,petroleum geologyandvolcanology. One measure used totackle the problem ofsoil erosion is re-seeding with appropriate floral species. What characteristics of a plant would make it suitable for such a purpose? Roots are important structures not only for the plant but also for the underlying terrain. Plant roots; Describe one method that could be used to measure the profile of a beach. Beach profiling can be carried out by the use of a clinometer. This method consist of first, finding two points to use as reference points which define the line to follow when measuring a beach profile. The instruments needed are a clinometer, a compass, GPS (for the starting point coordinates), a measuring tape and a piece of wood (to place the clinometer on it when taking the readings). Measurements of the beach surface are taken by the use of a clinometer which measures the angle of the slope. This is done at different intervals between the two reference points until the sea is reached. Explain the following: (i) lateral moraine, (ii) kettle lake, and (iii) outwash plain. Lateral moraine: Unconsolidated material deposited on the sides of an alpine glacier. Most of the material deposited results from the freeze-thaw weathering of alpine valley walls (Lemke, 2010). Kettle lake: Kettles arefluvioglacial landforms created when depressions left behind by the melting of partially-buried ice blocks are filled with water (Schaetzl, n.d.). Outwash plain: Outwash plains areplainsformed fromglacialsediments such as gravel, sand and claydeposited by meltwater outwash at the terminus of aglacier (The Geography Site, 2006). Explain the presence of wave-cut platforms in areas ofIceland presently distant from the coast. Studies were carried out on the lithostratigraphy and biostratigraphy in the northern coast of Iceland in the attempt of reconstructing deglaciations relative sea level changes. According to these studies sea level felt by approximately 45m between 11300 and 9100 BP. This corresponds to an isostatic rebound of 77m. Therefore, this change in sea level explains the presence of wave-cut platforms distant from the coast (Rundgren, Ingolfsson, 1997) Distinguish between mafic and felsic lava. Mafic lava: is less viscous than felsic lava due to lower silica content. This causes non-violent eruptions where lava moves slower. Mafic lava tends to be associated more with interplate volcanism and mid-ocean ridges and produces basaltic type rock. Felsic lava: found mainly at convergent zones. This type of lava has a high silica and water content, causing the lava to be highly viscous and causes very violent eruptions. This lava produces rhyolite and andesitic rocks. What is the nominal fix accuracy of a GPS? Why can a DGPS improve this nominal accuracy? Nominal fix accuracy of a GPS is how accurate a GPS can be. There are several factors affecting the accuracy such as atmospheric effects, sky blockage, and receiver quality. A higher accuracy is attained when using GPS in combination with augmentation system. These enable real-time positioning to within a few centimeters (National Coordination Office for Space-Based Positioning, Navigation, and Timing, 2014). A Differential Global Positioning System(DGPS) is an enhancement toGlobal Positioning Systemthat provides improved location accuracy, from the 15-meter nominal GPS accuracy to about 10 cm in case of the best implementations. The DGPS is a combination of local land stations connected with satellites for more accurate data. In cartographic terms, explain why the datum used by a GPS navigation set must be the same as for the reference chart being used. A datum is any numerical or geometrical quantity serving as a reference point from which to measure other quantities. With regard to chart datums, these are also used in plotting GPS positions or transferring positions from one chart to another. When plotting and transferring points from one chart to another GPS positions must be on the same datum as the chart being used in order to prevent any inconvenience regarding with hazards and safe distances. References Bjà ¶rnsson, H. (2010). Jà ¶kulhlaups in Iceland: Sources, release and drainage [Abstract]. CRITSITE. (2014). Root structure characteristics. Retrieved, 2014, Retrieved from http://www.critsite.com/index.cfm/fuseaction/plants.rootStructures/index.htm Hofmann-Wellenhof, B., Lichtenegger, H., Wasle, E. (2007). GNSS–global navigation satellite systems: GPS, GLONASS, galileo, and more Springer. Lemke. (2010). Lateral moraine. Retrieved, 2014, Retrieved from http://www4.uwsp.edu/geo/faculty/lemke/alpine_glacial_glossary/landforms/lateralmoraine.html Lane, C. S., Cullen, V., White, D., Bramham-Law, C., Smith, V. (2014). Cryptotephra as a dating and correlation tool in archaeology. Journal of Archaeological Science, 42, 42-50. Lowe, D. J. (2011). Tephrochronology and its application: A review. Quaternary Geochronology, 6(2), 107-153. National Coordination Office for Space-Based Positioning, Navigation, and Timing. (2014). GPS accuracy. Retrieved, 2014, Retrieved from http://www.gps.gov/systems/gps/performance/accuracy/ Schaetzl. (n.d.). Kettle lakes. Retrieved, 2014, Retrieved from http://web2.geo.msu.edu/geogmich/kettle_lakes.html RUNDGREN, M., INGÓLFSSON, Ó., BJÃâ€"RCK, S., Jiang, H., Haflidason, H. (1997). Dynamic seaà ¢Ã¢â€š ¬Ã‚ level change during the last deglaciation of northern Iceland. Boreas, 26(3), 201-215. Russell AJ, Roberts MJ, Fay H, Marren PM, Cassidy NJ, Tweed FS, Harris T. (2005). Icelandic jà ¶kulhlaup impacts: Implications for ice-sheet hydrology, sediment transfer and geomorphology. Geomorphology, 75(12), 33-36. doi:10.1016/j.geomorph.2005.05.018 The Geography Site. (2006). Outwash plains. Retrieved, 2014, Retrieved from http://www.geography-site.co.uk/pages/physical/glaciers/outw.html The Geological Society. (2014). Effusive explosive eruptions. Retrieved, 2014, Retrieved from http://www.geolsoc.org.uk/ks3/gsl/education/resources/rockcycle/page3599.html

Sunday, October 13, 2019

Comparing Amy Tans The Joy Luck Club and The Woman Warrior Essay

Comparing The Joy Luck Club and The Woman Warrior  Ã‚     Ã‚  Ã‚   Amy Tan's immensely popular novel, The Joy Luck Club explores the issues faced by first and second generation Chinese immigrants, particularly mothers and daughters. Although Tan's book is a work of fiction, many of the struggles it describes are echoed in Maxine Hong Kingston's autobiographical work, The Woman Warrior: Memoirs of a Girlhood Among Ghosts. The pairs of mothers and daughters in both of these books find themselves separated along both cultural and generational lines. Among the barriers that must be overcome are those of language, beliefs and customs, and geographic loyalty. The gulf between these women is sadly acknowledged by Ying-ying St. Clair when she says of her daughter, Lena, "'All her life, I have watched her as though from another shore'" (Tan 242). Ultimately, it falls to the daughters, the second, divided generation, to bridge the gap of understanding and reconnect with their old world mothers. The Joy Luck Club begins with a fable that immediately highlights the importance of language in the immigrant story. It is the tale of a hopeful young woman traveling from China to America to begin a new life. She carries with her a swan, which she hopes to present to her American daughter someday. The language barrier is exposed when the woman's good wishes for her future child are defined by the idea that this daughter of an immigrant will never know the hardships endured by her mother because she will be born in America and will "speak only perfect American English" (Tan 18). However, things do not turn out exactly as planned for the young woman. Her lovely swan is confiscated by customs officials, and her treasured daughter, now an adult, does in... ...Strategies of Authorship in Asian America. Durham, NC: Duke University Press, 2000. Huntley, E. D. Amy Tan : A Critical Companion. Westport, CT: Greenwood Press, 1998. Kingston, Maxine Hong. The Woman Warrior: Memoirs of a Girlhood Among Ghosts. New York: Vintage International, 1976. Soderstrom, Christina. "Maxine Hong Kingston." Voices From the Gaps: Women Writers of Color. University of Minnesota. 11 Apr. 2001 <http://voices.cla.umn.edu/authors/MaxineHongKingston.html>. Tan, Amy. The Joy Luck Club. New York: Vintage, 1991. Tavernise, Peter. "Fasting of the Heart: Mother-Tradition and Sacred Systems in Amy Tan's The Joy Luck Club." The Joy Luck Club Page. 1994 Home page. 11 Apr. 2001 <http://mindspring.com/~petert/tan.htm>. Verschuur-Basse, Denyse. Chinese Women Speak. Trans. Elizabeth Rauch-Nolan. Westport, CT: Praeger, 1996   

Saturday, October 12, 2019

The Securities And Exchange Commission :: essays research papers

The Securities and Exchange Commission In 1934 the Securities Exchange Act created the SEC (Securities and Exchange Commission) in response to the stock market crash of 1929 and the Great Depression of the 1930s. It was created to protect U.S. investors against malpractice in securities and financial markets. The purpose of the SEC was and still is to carry out the mandates of the Securities Act of 1933: To protect investors and maintain the integrity of the securities market by amending the current laws, creating new laws and seeing to it that those laws are enforced. During the 1920s, approximately 20 million Americans took advantage of post-war prosperity by purchasing shares of stock in various securities exchanges. When the stock market crashed in 1929, the fortunes of many investors were lost. In addition, banks lost great sums of money in the Crash because they had invested heavily in the markets. When people feared their banks might not be able to pay back the money that depositors had in their accounts, a â€Å"run† on the banking system caused many bank failures. After the crash, public confidence in the market and the economy fell sharply. In response, Congress held hearings to identify the problems and look for solutions; the answer was found in the new SEC. The Commission was established in 1934 to enforce new securities laws that were passed with the Securities Act of 1933 and the Securities Exchange Act of 1934. The two new laws stated that â€Å"Companies publicly offering securities must tell the public the truth about thei r businesses, the securities they are selling and the risks involved in the investing.† Secondly, â€Å"People who sell and trade securities must treat investors fairly and honestly, putting investors’ interests first.†2   Ã‚  Ã‚  Ã‚  Ã‚  Franklin Delano Roosevelt defeated Herbert Hoover in a landslide in the 1932 election and began to work on his â€Å"New Deal†. In the New Deal four key regulatory bodies were established: The National Labor Relations Board, Civil Aeronautics Authority, Federal Communications Commission, and the Securities and Exchange Commission. Wall Street was not enamored with the coming regulation, but Congress was confident that the Street was seen as an easy target for the Crash and the Depression that followed. In response, the SEC was created by Congress on June 6, 1934 for the purpose of protecting the public and the individual investors against malpractice in the financial markets. Commenting on the creation of the SEC, Texas Congressman and future Speaker Sam Rayburn admitted3 â€Å"he didn’t know whether the legislation passed so readily because it was so good or so incomprehensible.

Friday, October 11, 2019

Middle Class Dillusionment Essay

In 1958, a man named George Mowry explains s economic, social, and political divisions of the progressivism movement. The progressivism movement ties in a lot with our society today and shows how history does indeed repeat itself. Mowry describes the good, and bad of progressivism, but emphasizes the bad. Mowry is really trying to exhibit the differences between capitalism and socialism in his essay and explain why progressivism is not good for the well being and future of America, which can be proven today but our economic instability and division as a nation. More importantly however Mowry displays how progressives try to create, â€Å"heaven on earth† by their moral actions. Mowry first describes the type of people who are involved in progressivism. People who were involved in progressivism were the solid middle class, who were intellectual and ethical climate of age, a significant cluster of prejudices and biases, and people who created great inventions, beautiful pictures, and the law. The people of the solid middle class were lawyers, newspaper, publishing, independent manufacturers, merchants, medicine, banking, and real-estate. The progressive leaders included the Chicago tribune family, and Charles Evan Hughes, â€Å"if names mean anything, an overwhelming proportion of this reform group came from old American stock with British origins consistently indicated. † More dangerous than rich people who inherited money from their ancestors was their rich youth, â€Å"Obviously this was a period, like the ones after the war of 1812 and 1850’s, when energetic and incautious youth took command. † This is ironic because all of their ancestors earned their money through capitalism and that’s what progressives are trying to take away now. Religious affiliations of the progressivism movement were the woman of the Quaker faith, and Jewish faith. Overall the progressives hated the economic system of capitalism, believed that the wealthy are bad people who we must take away money from and give it to the masses, and most of these people are young. Joseph Medill Patterson, whose godfather founded the Tribune resigned from the Chicago commissions of public works to become a socialist. Patterson believed it was impossible to reform a city under capitalism, â€Å" he announced , it was impossible to reform the city and country under capitalism. Patterson was exemplifying capitalism vs. socialism. Capitalism is the idea that Capital is owned, operated, and traded for the purpose of generating profits for private owners or shareholders. Emphasis on individual profit rather than on workers or society as a whole. On the other hand socialism is according to his/her ability, to each according to his contribution. Emphasis on profit being distributed among the society or workforce in addition to receiving a wage. Today we can see many links between capitalism and socialism. Our government today is run on progressivism/ socialist ideals. President Barack Obama has several plans and ideas to help the poor by giving them the money of the rich people, and supplying them with health care (obamacare) and so on. Progressives wanted to help people, they wanted to help the poor, this was not morally wrong but many other people saw that this was hurting our economy. Our government is socialist/ progressive because they want to have government control over other money and they want to have the ability to decide where that money goes. But you can’t just do that. If those people earned their wealth they should have every right to keep it, they should not be entitled to try to help the poor. Furthermore during this time of the progressivism movement there were many Democrat-republicans who supported the idea of progressivism. Some of those commonly known leaders are Theodore Roosevelt, Robert La Follete, Lincoln Steffens, Willam Allen White, Woodrow Wilson, John Johnson, and Hooke Smith of Georgia. Another group of people who were making a movement was populism. Populism were a group of people who were economically secured, well educated, middle class group who arose from farmer distress in a period of acute depression. â€Å" According to William Allen White, populism had ‘shaved its whiskers, washed its shirt, put on a derby, and moved up into the middle class†¦ populism arose from a farmer distress in a period of acute depression. Its reforms were belly reforms. The movement was led by angry men and woman not too far removed from the Grange hall. The motivation of these farmers was heart. They believed its not fair to take farm land and stick a bunch of windmills on there, not only was it not fair but it also made the agriculture business lose money. In a specific case California lost money for putting up windmills in farmer land and turning the production of agriculture into a nominal size. This idea of motivation of heart also relates to today because our motivation for supplying all of this aid comes from heart, because we believe it isn’t fair that one shouldn’t have medical care, or food etc. However there are just some gray areas to this plan that need to be filled and that is what in term ends up costing us millions. Another important point that Mowry discusses is the rise of industrial and commercial cities. The positive things about the rise of these cities are that it was, â€Å" a refuge from an ugly country side and hostile natural environment†, and it also provided a place of excitement and opportunities. In contrast to the positive things were the negative things. The negative things about the rise of industrial and commercial cities is that its, â€Å"Devils berg of crimes†, successful= financial workers and failures if they remained family workers. It also created an anti-urban feeling which romanticized pioneer past and agrarian background, involved western stories and virtues of the countryside. Miss. Glasgow believed, â€Å"Country was the world as God has planned it, the city as man had made it. † There was definitely some mixed feelings between the citizens about urban and a city lifestyle. Mowry described the income people had into three categories. The first category was the upper-class which we defined as, â€Å"people who had more money than was good for them†. The middle class were those who had just enough and the lower class were those who had much less than was morally good for them. In regards to these three categories each community made artificial arrangements by property, classical economic laws repeatedly described in the past as natural had become artificial and progressives had destroyed the popular sanction behind the laws of rent, prices and wages. In response to the actions of the progressives came the enforcement and rise of labor unions. Mowry viewed the labor unions as a menace not only to the employer but to the entire community, the small employer and many middle class professional unions gave the same results of industrial monopoly. The labor unions made a steady decrease in opportunities for the individual operating as an individual, thus putting an end to open society, and putting the burden of the industrial revolution upon the middle class. In an attempt to rebuttal the vicious attack of the labor union on progressives the progressives created a co operation of progressive and organized labor. This operation left only the progressives to lead. The captain of industry and labor boss was standard. Monopolistic closed shop was an abomination not to be tolerated with or without the government and progressives became a majority. The progressives were motivated by fear and confidence to exceed any other group. They believed that they were â€Å"The good men†, â€Å"The better element†, â€Å"The moral crowd† because of the fact that they believed in helping people. The progressives planned to increase the number of â€Å"large hearted men† to counteract the class organization of both capital and labor. The progressives believed that gaining more support from others would make them the majority and be favored, loved, and even looked up too. The progressives wanted to eliminate capitalism and labor unions. The progressives were strong for fighting back against the mass numbers of capitalists and labor unions, but fight they did and they did not back down. Although the intentions of progressives were morally correct it was not economically correct for the success and future of America. Our government and administrators today might believe that what they are doing is right for the people but they have to also consider what is right for our nation. The way Mowry described the mentality of progressives can be used to describe the mentality of some of our administrators today, â€Å"Reactionary and reform impulse, a desire to create heaven on earth, moral superiority is greater than our economy, and lastly individualism dynamism and leadership. † These are the characteristics of progressives today and of 1958. It is true that history repeats itself.

Thursday, October 10, 2019

A critical appreciation of Keats’ “Ode to a Nightingale” Essay

John Keats, a poet of the romantic era, composed this poem in the spring of 1819. Being a poet of the Romantic era, he was a Nature lover, but instead of looking at Nature as a guide or teacher, he was in pursuit of beauty within Nature. The romantic poets emphasized on emotions, they believed in the power of imagination and experimented with new ideas and concepts. Keats is generally considered the most tragic of the Romantic poets as he was faced by a series of sad experiences in his life. The poem was written a few months after the death of the poet’s brother. Ode to a Nightingale is one of the five â€Å"spring ode’s † composed by Keats. He emphasized on sensuousness, that is, his works appealed to all the five senses of sight, sound, touch, smell and taste. An ode is a lyric, which is lofty in style and is usually addressed formally to its subject. Greek and Roman mythology were inspiration for his poetry. Medieval elements and romances and Arthurian legends were incorporated into his poetry. He had the gift of a vivid and picturesque imagination that fills his poetry with a brilliant sense of imagery. The poet begins by explaining the nature and cause of the sadness he is experiencing. This sadness is converted into physical ache and â€Å"drowsy numbness†. He feels as if he might have consumed some sort of drug to ease his pain, this resembles the qualities of the Lethe, a river in Hades, the underworld, where the dead drank and went into total oblivion and lost all senses. The feeling is a result of the deep awareness of happiness of the nightingale he hears singing; his resulting pleasure is so intense it has become painful. The nightingale is referred to the â€Å"light winged Drayad of the trees†, implying that it is a tree nymph. Dwelling amidst the darkness of the trees in a forest, it sings unconstrained. The poem shows the contrast between the poet, who is earthbound and the nightingale, which is free and possesses seemingly ethereal qualities. The poet uses alliterative sounds produced by the repetition of ‘d’ (‘drowsy’, ‘dull’, ‘drunk’ and ‘drains’), ‘m’ (‘my, ‘dumb’, ‘hemlock and ‘minute’) and ‘p’ (‘pains’, ’emptied’, ‘opiate’, ‘past’). In the second stanza, Keats longs for some intoxicant, â€Å"a draught of vintage†, which will help him to achieve a union with the nightingale, allowing him to forget his suffering and despair which will take him out of the mutability of all experiences in the mortal world. To him, a glass of this wine will transport him into that joyous world of the nightingale. He says that this red wine, will inspire him more than the colourless waters of the Hippocrene, which is the fountain of the muses, a source of poetic inspiration. He desires to be completely absorbed in the bird’s song. He wants to â€Å"fade away† with the nightingale, to drown all his sorrows and miseries and forget the unhappiness, the unhappiness that the nightingale has never experienced. The nightingale, according to the poet has not been tainted by the ‘ weariness’ ‘the fever ‘ and ‘ the fret’ and therefore would not be accustomed to human suffering or unhappiness. In the line â€Å"to think is to be full of sorrow†, Keats seems to imply that if a being has any perception of itself or its surroundings, then it would certainly be habituated to misery. Keats then goes on to explain another cause of sadness that beauty is transient and it gradually loses its lustre. He also explains that separation is inevitable and one will invariably have to be separated from his or her loved ones. His desire to die is not because he wanted to be extinct but that he wanted to be in a world that is closed by contentment, that is, the bird’s world. Keats decides against relying on Bacchus, the Greek god of wine and instead hopes to rely on the â€Å"viewless wings of Poesy’. This shows that he still wants to escape from the misery but instead of drinking he would rather escape through the world of fantasy and imagination. For him, the outlet to his pent up emotions is poetry. He says that whatever light or happiness that penetrates through the thick foliage in the forest, he will bask in its glory and accept with all humility. The fifth stanza continues with paradoxical ideas, although the natural beauty of his environment is physically denied from him, it is not withheld from his mind’s eye. The â€Å"embalmed darkness† signifies that darkness is  soothing when one does not want to be disturbed and wishes peace. He says that the vegetation is so thick and he cannot see, but he is still able to describe the â€Å"grass†, â€Å"the thicket† and the â€Å"fruit-tree wild† as if they were commonly found in the material world. He says that the smell of the flowers was so sweet and so invigorating that the flies were intoxicated by their fragrance. Keats refers to the nightingale as a â€Å"darkling † this signifies the dark and sad feeling represented by the nightingale. The poet realises that the ultimate form of escape from the troubles of life would be death. He realises that death will take away his pain and put and end to all his tribulations. He calls to death like a lover as he says, â€Å"I have been half in love with easeful death†. Death at such a moment, listening to the nightingale pouring forth its soul in ecstasy, would be an ultimate ending to his life. Keats, being a master of paradox, speaks of the natural art of the bird’s song which is associated with the high requiem which indicates mortality and the plaintive anthem is associated with mortality. In stanza seven, he says that although all humans must die, the nightingale is in a sense eternal through its song. He says that human life dies, but the beauty of something as special as the nightingale’s song will live forever. Keats thinks about the classical world of emperors and of Ruth, and considers how the song has been heard for many centuries. Keats also talks of â€Å"Charm’d magic casements, opening on the foam/ of perilous seas, in faery lands forlorn†. This signifies that the song, a thing of beauty lasts forever and perhaps possesses the power of introducing one to a world of fantasy. With the use of the word â€Å"forlorn â€Å", the poet is transported back into the world of reality. The phrase â€Å"the fancy cannot cheat so well/ as she is famed to do, deceiving elf† shows that the power of perception and imagination stimulated by the bird has cheated him and that it cannot take him away from the world that he is a part of. The same music, which instigated him to take his own life, now brings him back to the realm of reality. The song gradually fades out and is now â€Å"buried deep /In the next  valley -glades†. Keats is unable to decipher the real world from the illusionary and wonders if the song was a â€Å"vision† or a â€Å"waking dream†. The monotonous song is not a part of his world any longer and he is away from that world of stupor. The ode to a nightingale according to me is an amalgamation of an attempt to escape from the sorrows of life and an acceptance of the human conditions accompanied by human suffering. It showcases Keats’s path to realisation and his transition beyond the mundane world which is full of â€Å"sorrow / And leaden-eyed despairs† to the mystical universe of Nature.