Wednesday, July 31, 2019

Ethical issues in international business Essay

When we pay a large tip to secure a specific table in a restaurant. There is usually some personal happiness-related reason behind our action. Among many of our reasons could be that we want to be nearer to performers on the stage in order for us to secure a better view for our enjoyment. Another reason could be that we want to have a specific view available for us while we dine. If we do not pay a large tip, then there is a bigger risk that we would not get the table that we want. Therefore paying the large tip reduced that risk significantly and makes us likely to get what we want. This case is the same as when a business company pays a bride to certain entities in order to secure a contract. When perceived in Bentham’s perspective, â€Å"happiness† to a business may be equated to progress and profit which in turn may be acquired through appropriate business actions such as securing profitable contracts. The company pays a certain amount in order to get more business which will eventually pay back several fold. This is exactly the utilitarian principle that Bentham explained which may be neatly applied to both cases. In the restaurant, the customer pays a larger tip in order to enjoy the â€Å"happiness† of a specific table. In business, the company pays a bribe in order to enjoy the â€Å"happiness† of obtaining a contract. Although one of the two situations is illegal, that does not mean that the principle between the two situations are different. In as much as companies are not allowed by law to make bribes for contracts, slipping a $50 for a waiter to secure a seat often happens without the knowledge of the waiter’s supervisor. In that sense we may see that both actions to have moral repercussions. It is just that one tends to be more pronounced with respect to its consequences than the other.

Tuesday, July 30, 2019

Pocket Should Be Given to the Teenagers or Not

Yes, they definitely should. Nowadays teenagers are moving to independence and it will help them if they have some practice in managing money. Giving pocket money teaches teenagers to manage money while they are still young and parents can still guide them. Also, it help teenagers to make choices and to see that sometimes people have to wait and save up some money to get what they really want. While searching for the story idea today, I came across an interesting survey on pocket money been given to the teenagers and young adults. For once, it struck me that this unique yet interesting subject has never been covered on this site before. So, let me take a dig at it. The important predicament of pocket money must have certainly flashed your mind either during your childhood or as a parent now. Of course, the dilemma is always much more grave if you are a parent. Parents extensively differ in their perspectives of upbringing children in a system of granting pocket money to take care of their petty expenses. At first, the definite expenses that should be termed as ‘petty’ is pretty much subjective in nature and needs to be well-defined to start with. The second question you need to ask is – what is the extent to which a child be given freedom to spend money which is deemed as pocket money? While lot of parent’s concerns revolves around promoting unhealthy competition amongst children on the amount of money they get and loss of control on a child’s spending habits, there are also some positive lessons for teenagers such as inculcating money management skills and making tough decision regarding spending desires that offer less value to their lifestyle. The â€Å"Current Pocket Money Trends in Urban India† survey by ASSOCHAM has cited that metropolitan children in the 12-20 age group get as much as Rs. 3600 to over Rs. 12000 a month of pocket money to spend on apparels, physical appearance, cell phone and other lifestyle products. Further, the monthly pocket money of teenagers and young adults, in cities like Delhi and Kolkata, have surged whopping 10-fold since 2005. In Ludhiana, 45% of surveyed teenagers get an allowance of Rs. 2000 on weekly basis. While the urban teens spend about 55% of their pocket money on electronic gadgets, almost a quarter of it goes towards watching movies and spending in malls. The remaining 20% of allowance goes towards eating out and food. The surprising factor over here being that with rising cost of living and soaring inflation, the pocket of teenagers has also grown deeper. Rather than controlling the overall family budget, parents have shown generosity in ensuring that their children maintain their prevailing lifestyle and spending habits. While giving pocket money to teens is not so bad a concept, you must also ensure that you allocate the right amount of money towards it which is more suitable to your family budget. At the same time, see to it that the sum granted by you is comparable and realistic to meet the day-to-day requirements of your child’s life. POCKET MONEY Pocket money as the name suggests is money given to children to take care of petty expenses. This amount of money can be given by parents' everyday, every week or every month or even on adhoc basis, as and when the child requires it. As long as the child has the freedom to spend the money, it will be deemed as pocket money. Parents extensively differ in their perspectives of whether or not to give pocket money to children. Some parents believe that pocket money should not be given since * That will make the child feel that ‘parents money is not his/her money', * ‘It could lead to fights between children', * ‘Unhealthy competition amongst children on the amount of pocket money they get' * ‘Loss of control on where children spend the money' However, giving pocket money to children has several advantages: * Children feel a sense of independence and responsibility towards spending the money the right way. They learn & understand the value of money. They also learn to understand that amount of money is limited and they need to always choose between their various desires to ensure correct use of their pocket money. * Children get into the habit of planned income and expenditure. They also learn about saving & budgeting. For eg: if they want to buy a present for their mother's birthday, they will need to put aside some amount of money every month to collect the commensurate amount and buy the gift. Giving pocket money to children also makes them feel an important part of the family since they know that they get a part of the family's monthly income. Some parents even believe in their children earning pocket money. What does that mean? It means that parents can often inculcate values/ beliefs/ actions in their children by rewarding them for it in the form of pocket money. In such cases, pa rents divide the pocket money amount in two parts: * One that is given on a timely basis. * Second that is earned against some house jobs. For eg: every Sunday, you could start giving a fixed sum of money to your son if he helps his father in cleaning the car. Or if your daughter helps around in dusting the house. This will in a way also inculcate the habit of weekly cleanliness in them since childhood. Similarly, if you strongly wish to inculcate the value of ‘ helping others' in your children, you could promise them an extra sum of money during summer vacations if they help your maid's child learn the basics of math. Once parents are clear that they want to give pocket money to their children, they also need to decide when is the good time to start giving the same to their children. Once children start spending sometime away from their parents in going to school, sports classes, tuitions, etc, they need to carry some amount of money on them. This could be a good time to start giving them pocket money. Obviously, in the beginning, the amount of money should be small and should be periodically reviewed as the child grows. For eg: you could decide that every birthday, you will give an increment to your child’s pocket money. Additionally, if your child excels in academics/sports, they could get higher pocket money increments! When parents start giving pocket money to children, they need to explain to them where the money is to be used. For eg: when you first give Rs. 50 to your daughter, you need to explain that this money is to cover her school special lunch, candies/soft drinks requirements for a week. If the child is given money without any direction, you could run the risk of the child using the money is a way that does not agree with you. In such cases, parents need to be very careful in not micro- managing where the child spends the pocket money, else the child will get irritated and will not get the ‘sense of independence’ that parents want to instill in the child. Parents must explain to children that pocket money is to be used over the week/ month and hence children should plan their expenses over the time frame. It must be made clear that in case children use-up their money earlier, they will not be given extra money. Pocket money will be given only on the fixed day as decided. This will help children learn the concept of planned expenditure and savings. Parents must always ensure that they give comparable pocket money to their children. It should neither be too much or too little compared to friends. Giving more pocket money than friends will make your child spend more and consider money as frivolous and easily available. If your child gets less pocket money than his/her friends, it will lead to an inferiority complex and the child might start resenting you. Last, but not the least, parents must be careful not to use pocket money as a way of punishment to their children. Often, parents use ‘suspension of pocket money’ as an easy way of punishing their children. This format of punishment is not wrong to use but must be applied carefully. I. e if the child has a broken a beautiful vase and you want him/ her to understand the value of the same, you can penalize the child by deducting/ taking away the month’s pocket money. But you cannot start using pocket money as a weapon to get the child to abide by all your wishes. For eg; you might want your child to have two glasses of milk everyday which he may not want to; in such cases by incentivizing the child for more pocket money will be wrong to do since such a format of giving money is not pocket money but ‘bribe’. Similarly, pocket money penalty cannot be used as a blanket punishment to all wrong – doings. If the child starts feeling that he/she will never really get pocket money due to some punishment, he/she might be tempted to steal money from parents.

Monday, July 29, 2019

Capitalization of Gender in Edna Millays Essay Example for Free

Capitalization of Gender in Edna Millay’s Essay The sonnet has experienced many modifications and innovations throughout the ages. Edna St. Vincent Millay’s â€Å"I, Being Born a Woman and Distressed† and Elizabeth Barrett Browning’s â€Å"Sonnet 43†, both Petrarchan sonnets, have diversified and helped pave the way for future female poets. In order to address and capitalize on ideas of gender connected to sonnet form and content, Edna Millay and Elizabeth Browning both revolutionize the traditional male-dominated sonnet form as females, Browning expresses overly sentimental and passionate emotion through content and Millay contradicts the social norm of female sexuality as well through content. Millay and Browning revolt against the male-dominated sonnet. Popular among prominent male poets, the sonnet was deemed unworthy for females, as men were far more educated and capable of fulfilling its high standards and strict guidelines. Both poets proved common beliefs wrong by excelling in the sonnet form. They used the Petrarchan sonnet, playing close attention to rhyme scheme and using iambic pentameter. They even incorporated the Volta between the octave and sestet, while using the first three lines in the sestet to introduce the change in tone and the last three lines in the sestet to conclude, invariably identical to the traditional Italian sonnet. At a time where women did not even have the right to vote, Millay and Browning both struggled to find a place in poetry writing, especially the sonnet form in which their predecessors were all male. The literary cannon and the Romantic Era consisted of all male poets who directed the sonnets to their lovers in regard to express their profound appreciation. Love has been the preferred sonnet theme since the 1300’s when the sonnet was created and both, Millay and Browning, stuck with the same traditional concept of love and lust as their topic. Being one of the most popular, sought out forms of poetry, the sonnet was the perfect way for nineteenth-century women to get out into the limelight and start a feminist movement. Or possibly, women poets stumbled toward the sonnet form due to its oppressive rules of rhyme scheme, structural shifts, meter and syllable count, it provided them a ready-made metaphor, suggesting difficulties in communication. Extremely restrained, the sonnet form helped make inexpressibility apparent, it therefore presented women sonneteers with an irony that revealed their circumstances of restricted speech and forced silence. Female poets, who incorporated the strict sonnet form, at a time difficult for women to freely embark in the lyric tradition, did so only to promote gender variance. Elizabeth Browning uses exceedingly sentimental emotions in her â€Å"Sonnet 43†. She either does so for ridicule or freedom for women to express themselves. By the use of such diction she is using satire and mockery of overly melodramatic reactions and feelings of a typical woman. â€Å"†¦ With my lost saints! -I love thee with the breath,/ Smiles, tears, of all my life!†¦ (12-13)†, even with the usage of several exclamation marks, she creates emphasis on the over exaggeration. In her Sonnet 43, Browning proclaims the pleasure love brings and pleads for a complete surrender to love, which seems far too corny. Or perhaps, she is just being herself, demonstrating to fellow females to be confident and unafraid of articulating and communicating your feelings. Following the thematic convention of rhyme scheme and iambic pentameter, Browning either wants to represent stereotypical females with her portrayal of unrealistic sensations or she wants to prove that even a completely feminine sonnet can create attentiveness to gender difference. Edna Millay challenges the social standards of female sexuality. Millay’s poem explores a female-centred perspective which opposes the widespread male-dominated presumptions of women. It is indeed a very sexual poem, revealing her sexual attraction and intentions to a particular man. Female sexuality was silenced in those times and rarely did women speak so openly and fearlessly of personal matters. She created a new realm of subject matters to women authors and helped support a liberated approach to life. The style of her poetry is formal with typical meter and rhyme scheme. Critics have repeatedly pointed out her bizarre connection of conventional poetic forms and structures with completely unconventional ideas and expressions. We must recognize and appreciate Millay for revealing the love ’em and leave ’em tactic normally exercised by males. However, because of the poet’s reversed gender, this strategy seems more modern, harmless and considerably humorous. There is irony and originality in a female using such rebellious content, perhaps she is scrutinizing normal male intentions, as it is regularly the women who are hurt in the end because they long for a relationship while the men are only looking for sex. The form may receive validity of tradition while the content concurrently mocks tradition. With the help of this poem she gained a reputation of a free-spirited and revolutionary social figure whose work followed her commemoration of life. Edna Millay’s poem fights for sexual freedom originally claimed by men, it fights for equality of the double standard that exists, which inhibits female sexuality and encourages male sexuality. Writing as women has led them to run â€Å"counter to† their culture and â€Å"against the grain of time† to echo Pounds’ words. Edna St. Vincent Millay’s â€Å"I, Being Born a Woman and Distressed† and Elizabeth Barrett Browning’s â€Å"Sonnet 43† redefine the standards of genre and gender norms. Millay and Browning both revolt against the regularly male sonnet form, they were attracted to its structural affinity to promote gender variance. Browning creates emphasis using ordinary female emotions, while Millay challenges normality of female sexuality. However at the same time there are distinct contrasts apparent, Browning’s poetry has a feminine quality with such passion and sentimentality while Millay’s poetry has a masculine quality, as it resists sentimentality with her ability to look beyond the status quo and her completely opposite lifestyle of love affairs. However, both poets attempt to reconcile with convention while contributing to gender capitalization, hoping to establish diversification equally valid for females. Both are icons for womanhood, both are masters of the sonnet forms and both are nurturers of ambition, independence, outspokenness and flaunting sexuality. Capitalization of Gender in Edna Millay’s. (2016, Oct 03).

Maintaining the pH in Its Normal Levels Prevents the Growth of Research Paper

Maintaining the pH in Its Normal Levels Prevents the Growth of Methicillin-Resistant Staphylococcus Aureus - Research Paper Example Methicillin-resistant S. aureus (MRSA), just like other S. aureus strains avoids such immune response through catalase, which efficiently breaks down hydrogen peroxide into water and oxygen. This activity of the catalase in the escape of the host’s immune reaction has been shown in a murine animal model (Das and Bishayi, 2009). What was not mentioned in the primary reference is that what is so distinct about MRSA is the fact that the bacteria cannot be killed by the most common antibiotics, penicillin and cephalosporin groups, characterized by their beta-lactam ring. Briefly, these antibiotics prevent the production of the bacteria’s peptidoglycan-rich cell wall by inhibiting transpeptidation. MRSA contains beta-lactamases that bind to beta-lactams, and render these bactericides inactive (Agrawal, n. d.). Effectiveness of alkaline solution against MRSA infection It has been proposed by Shannon Brown (2010), in his article, â€Å"End of MRSA-How?†, prevention of M RSA infection simply involves avoiding acidic food products and stress, which increases the acid in the digestive tract. According to Brown, the acidic environment allows the normal flora of the gut to die and the acidophilic MRSA to thrive. The solution to a potential MRSA infection is said to lie on increasing the pH of the environment to which it is exposed to. Despite the seemingly simple solution to the problem of MRSA infection, prevention still poses a great challenge as the current food products available in the market are cultivated using acidic fertilizers and pesticides. Many people also enjoy drinking coffee, tea, wine and alcohol, all of which make the gut more acidic. As such, the article suggests that alkaline solutions can prevent uncontrolled MRSA growth in the body. Specifically, taking in pHenomenal, an alkaline water concentrate, as food supplement is said to potentially increase the pH of the digestive tract, and to subsequently prevent MRSA infection. Such acti vity has been shown through an in vitro pH neutralization test, whereby lactic acid was neutralized by pHenomenal at approximately 1:22 acid-to-pHenomenal ratio. Another alkaline product suggested to prevent MRSA infection is B-pHree, which can be applied on the skin, where MRSA normally resides. In an antibacterial efficacy assay done on this substance, it was found that it effectively inhibited the growth (100% growth reduction) of Staphylococcus aureus inoculated in Tryptic Soy Agar (TSA) incubated for 24 hours. Despite the promise of MRSA prevention and the availability of prophylactic measures, there are potential problems regarding the claims of preventing bacterial infection by increasing the pH in the gut. Literature review Normally, the stomach is highly acidic, with pH of approximately 2. This acidity is a strategy to control the activity of pepsin, which catalyzes the breakdown of proteins into organic compounds that can be used by the body in its various physiologic proc esses. In addition, the highly acidic environment of the stomach prevents the growth of most pathogens that cannot thrive in such extreme conditions. In fact, it has been shown by Suzuki (1994) that the low pH of gastric pH is directly related to decreased amounts of pathogenic bacteria such as Staphylococcus and MRSA in the gut. In addition, it was found that cancer patients before and after operation, who have high levels of gastric pH are more likely to have Staphylococcus and MRSA in the gut. Although the in vitro experiments have both supported

Sunday, July 28, 2019

Why its important to have a high school diploma in America Essay

Why its important to have a high school diploma in America - Essay Example The High School Diploma is fundamental towards their understanding of the world around them, the people living in close proximity and almost all issues that surround their lives in entirety. They gain so much when they know that the High School Diploma is within their hands and now would be the time to explore the varied areas of educational disciplines which would be the cornerstone of their success in the years to come (Workman, 2011). The High School Diploma within America is comprehensive from the onset, as it ensures that the student remains on top of his educational realms and is considered the very best amongst his educational circles. It is a fact that an individual must offer top priority to the students who have had a High School Diploma with them as they have to achieve success for the long term. Also the role of the family, friends and peers is filled in a positive manner when a student has had a High School Diploma with him (Byndloss,

Saturday, July 27, 2019

How and why have the concepts of new waves or new generations been Essay - 1

How and why have the concepts of new waves or new generations been used in writing the histories of European or world cinema - Essay Example The review of world and Taiwanese cinema, in particular, reveals that there is an inherent relationship between historical intricacies and the melancholy of being Taiwanese, as demonstrated by the films produced under the Taiwanese new wave of Cinema. In particular, the 1980s and 90s were the years that the writers of Taiwanese film used the media to communicate the cultural identity of the people, and also the time that the new wave and genre came to the attention of the world. The historical identities revealed in the cinematic presentation include the country’s connection to China, including their divergence on the legitimacy of China as a culture and a nation-state. The historical relations reflected through the new wave of cinema include the relocation of MinTang’s government, after the defeat that took place during the 1949s in China. In the view of Lu and Yeh, it is necessary to explore deeply, the language used in cinema, as well as the issues that identify it, including symbolism and language.1 This approach is particularly applicable to the exploration of resistance movies, as these are predominant in the new wave of cinema produced in Taiwan. In essence, the concepts of the new wave were used, because cinema is a symbolic language that is fashioned using cimenatic codes. These codes include lighting, performance, editing, sound and camera shooting, among others. The combined usage of these codes makes cinema a highly effective channel for the expression of identities at the various levels, including cultural, political, national or individualistic. The second qualifier for the usage of cinema is that the language used in cinema can be used to express the identities of the people. For example, it can be used in highlighting the theme of historical instability, as a reflection of political communication or meaning. In the particular case of Taiwan, language is likely to be

Friday, July 26, 2019

ORGANIZATIONAL BEHAVIOUR Assignment Example | Topics and Well Written Essays - 750 words

ORGANIZATIONAL BEHAVIOUR - Assignment Example What follows a portion of the meeting’s proceedings: Gus (Accounting Technician): â€Å"You see, the problem here is this new manager is constantly interfering. He gives us a job to do, gives us a deadline, and then before we can get to work, he’s down our necks for no apparent reason.† Our department, all 6 of us, had grown very used to running our show, to holding each other accountable, and for taking on many of the duties that our last boss entrusted us with challenging responsibilities, many of which he himself used to oversee until he saw that we could do it. We earned his trust and he had ours in return. Now, the freedom to make decisions, the ability to chart our own course seems to have vanished. It’s been a shocker, and a disappointing one to say the least†. ... Some days I’m not sure if I’m supposed to actually lead the team, or if I’m expected to function as a Staff Accountant when our Director’s around – after all, he’s calling all the shots around here anyway. It seems I’m not really leading anything.† And when I do give direction to the team, I feel myself snapping at them more than assisting them. It never used to be like that. We got along so well, understood our roles so clearly, and always seemed to have each other’s back when it counted. Now it’s like we can’t stand each other, are always at each other, and can’t wait for quitting time to roll around. Petra: This is helpful, and obviously not easy to for some to discuss. I appreciate your honesty here. Does anyone else have anything to add that I should be aware of? Darlene (Accounts Payable Clerk): I just can’t get over how different the look and feel of our team has become in the last month. As Gus and Wanda have said, we were a pretty well-oiled machine before this new Director stepped in. You could give us a task, offer a deadline, and know that this team would make things happen. Now, everyone is so confused over what is expected that it’s impacting our ability to work together. For myself, I’m finding myself growing so unsure of my own ability to exercise any independent thought for fear of retribution, that it’s just becoming easier to let others take the lead and kind of sit back. I know this isn’t right, and I know I need to get back to the way I once was, but I’m just not sure how realistic that is given our current situation. Besides, when I ever I step in and try to manage, I’m feeling second guessed. I don’t know whether I should be managing or

Thursday, July 25, 2019

Public Nudity Essay Example | Topics and Well Written Essays - 1500 words

Public Nudity - Essay Example This paper’s focal point is to lay the assertion that although it has limited positivity, for the most part nudity bears negativity and therefore, should be illegalized. Public nudity bears more negativity than positivity. Firstly, it inhibits healthy child development. It is entirely unhealthy for children to be exposed to images of nude adults. This is because they are not at a point in their lives where this information should be relayed to them. In every stage of human life, there are certain bits of information that one is meant to acquire: during childhood one comes to terms with language, gestures and interactive techniques. If information is passed at the wrong stage of an individual’s development, it causes misconception and elicits a harmful reaction. Children have very little cognitive development to bear positive results. They cannot assimilate nudity to bear positivity. Rather, the exhibition of this information to them could cause them to have a perverted line of thought. Scholars assert that human beings analyze issues as being either positive or negative. Children, being mentally underdeveloped, cannot fathom the positivity th at comes from the nude human body. This is because they are unaware of concepts such as childbirth. The young human mind, owing to exploration and adventure, assimilates negativity faster than it does positivity (Lunceford, 2012, p.46). As a result of this, their minds ultimately divert to the negative - sexual perversion. Public nudity contributes to pornographic addiction: a factor that inhibits healthy mental progress. It causes one to develop lustful thoughts and to follow this up with indulgence in pornographic material. Public nudity undermines culture and religion. Most sustainable cultures in the world condemn public nudity. The African culture, for instance, one of the most celebrated in the

Wednesday, July 24, 2019

Research Project Essay Example | Topics and Well Written Essays - 1750 words

Research Project - Essay Example These sources of energy, particularly oil, have also been associated with water pollution as well as destruction of marine life and diversity through oil spills in oceans, seas, rivers and lakes among others. Even most of the existing renewable sources energies such as geothermal, wind and hydroelectric have been extremely expensive to install. In addition, these sources of energies are normally extremely affected by changes in weather conditions. Also, their abundance as compared to that of the solar energy is limited. Due to the problems associated with the available sources energies such as fossil fuels, nuclear, wind, hydroelectric and geothermal, the use of solar energy is becoming popular in most parts of the world, particularly in China and Africa (House-Soremekun & Falola 2011). The solar energy seems to the source of energy that is more sustainable as compared to other sources of energy (Richards 2010). This paper, therefore, aims at discussing the use of solar energy in Afr ica and basics of this source of energy. Africa receives more solar radiation than any other continent in the world, thereby making it the continent with the greatest potential than any other continent in the world. Sun shine in Arica is virtually uninterrupted, and one of the most abundant energy resources in the continent. However, this precious source of power has not been fully exploited in the continent for number years. Despite the abundance of this energy resource, it is estimated that about 2 billion individuals (people) in world (most of them from Africa) either struggle or fail to meet their daily energy requirements due to scarcity of supply of energy (Richards 2010). Even though there has been reluctance in the harvesting of solar energy in Africa, the situation seemed to have change to day since a number of organizations in Africa as well as African governments have been turning their attention towards renewable and sustainable sources of energy. Amongst the renewable s ources of energy that have been greatly focused by the African countries is solar energy. Africa as continent has made number of milestone towards harvesting solar energy. For example, the headquarters of United Nations Environmental Program (UNEP) based in Nairobi (Kenya) is fully powered by solar energy (House-Soremekun & Falola 2011). Further according to House-Soremekun & Falola (2011), South Africa and Ghana are also planning to build amongst the biggest solar power plants in the world. Solar energy is also known as the radiant light, and it is referred to as heat energy from the sun (Richards 2010). This energy can be converted by different transducers to produce different sources of energy. For example, solar energy can be converted directly to electric energy by use of solar cells (also known as Photovoltaic). This particularly important for small scale energy requirements such as for watches and calculators. The solar energy can also be directly used to heat water for both domestic and industrial use. In addition, solar energy can be used to produce large amounts of solar energy through the use of solar radiation concentrators such as parabolic troughs. We have discussed how solar energy is converted into electric energy or used as heat energy to heat water among others (Hantula 2010). The question that might probably be lingering in the mind of the reader is how this precious energy is formed

Tuesday, July 23, 2019

Theodore Roosevelt and his contribution to America Research Paper

Theodore Roosevelt and his contribution to America - Research Paper Example He used these enhancements to make serious and positive changes to the US. He focused upon some of the most important questions concerning the power of the government and the individuals within a nation. Body US was experiencing heavy amount of economic growth and was being regarded as the wealthiest nation when Roosevelt replaced McKinley as president. US were leading throughout the world in the production of iron, coal steel and timber when Roosevelt came into action. During that era US even experienced growth in the rate of population and exports. The growth experienced by US was beneficial but equally disastrous as this growth brought poverty, increase in child labor, unpleasant working conditions and unequal distribution of wealth. Roosevelt was of the opinion that government should intervene and limit the freedom enjoyed by private enterprises. Due to this he started regulating private businesses by making several changes to the laws and constitution, some of these changes in laws includes: the drug act, laws regarding the safety and inspection of working conditions in industries and the Pure Food Act (D'Silva 262). Although these changes were not appreciated by the business communi ty during that time period but today the importance of these changes are recognized by the citizens of US. Roosevelt was clearly of the opinion that one aspect of the society that should be directed and supervised by the government was the economy of a country. The laws and regulations added to the constitution by the president have aided the society in bringing Private Corporations such as Enron and Microsoft to justice. During the period of 1912, he tried for the third term as president under the Progressive Political party, during this session he coined and promoted some of the various changes to constitution that were later enacted under president Franklin, these changes included the stock market regulation, minimum wage clause and the Social security clause. Roosevelt played the role of an activist not only in America but throughout the world as he promoted the role of the United States as world power. During the period of 1898 US was at war with the Spanish nations and soon co nquered them, after the war US became responsible for supervising territories such as Cuba and Puerto Rico (O'Toole 300). President Roosevelt was a part of the war as an American solider and later he supported and made the American citizens realize that US was a global power. He was even a promoter of democracy as he promoted the Marshall Plan which was enacted after his death. The legacies of the president were a gift to the world and to the future of US, he was in love with the natural beauty, he liked to experience adventures such as hiking and climbing and he was the first president of US to make the issues experienced by environment as a issue to be countered by the government. He was persuaded by the Sierra Club and the chief of the US forests to take the issue of protecting the environment to the federal level as the issue could not be countered on the state level (O'Toole 240). His love for preserving the environment and his love for nature made him create policies in order o protect the

The War on drugs Essay Example for Free

The War on drugs Essay The War on drugs has been ongoing in America for over 30 years, but it hasnt been working out the way people thought it would be. Im against the the â€Å"War† on drugs. The â€Å"War† on drugs is ineffective and needs to changed. The â€Å"War† on drugs needs to be changed because it costs the government way too much money. According to Havards Jeffrey A. Miron an economist, and doctoral candidate Katherine Waldock, in the U.S alone legalizing drugs would save roughly 41. 3 billion per year in government expenditure on enforcement of prohibition (Bandow, 2011). This means that the government could save a lot of money if they would just stop the â€Å"War† on drugs. Alcohol and tobacco are more dangerous than some illegal drugs. According to Professor David Nutt of Britains Bristol University and colleagues, heroin, crack and crystal meth are deadliest to individual user, but when their wider social effects are taken into account, alcohol is the most damaging, followed by heroin and crack (Hunter, 2010). This means that more people are using alcohol than heroin or crack because of that alcohol has cause more damage to people; the governments just being hypocrites about the â€Å"War†, theyre fighting something that are less dangerous than the things that already are legal. The current drug laws promote additional crime. According to The Cato Institutes David Boaz and Timothy Lynch, addicts commit crimes to pay for a habit that would be ea sily affordable if it were legal (Bandow, 2011). This mean that people are committing crimes to get the money so they can pay for the drugs at a high price in the black market. Overall the â€Å"War† on drugs hasnt been helping people in the U.S at all. See more:  Capital budgeting essay Drug use may not be wise, and it could even cause death. However, the â€Å"War† on drugs has cause the U.S turn into a prison state, putting more Americans in prison each and everyday. According to Lisa Trei at Stanford University in 1980, about 2 million people in the United States were under some kind of criminal justice supervision. By 2000, the figure had jumped to about 6 million, the jump is largely attributed to the government’s ongoing war on drugs. The â€Å"War† is not stopping people from using drugs, just a program to watse money. If I was able to in charge of a country I would try to make drug use legal.  By having drugs legal the crime rate will drop because people can buy them legally for cheap money. I would also set an age limit on people that could use drug. This way kids will know when they grow up they will have a chance to try it, that will decrease youth drug use. Lastly, I would set a limit on how much people could buy. By setting this restriction drug use wont able to harm people as much as before. These laws could help out to country.

Monday, July 22, 2019

Laser Alignment Theory Essay Example for Free

Laser Alignment Theory Essay Modern optical metrology uses precise lines and planes in space from which measurements are made. Because this method creates these features using light it has become known as optical tooling. The 35 year old historical development and current technology of laser instrumentation as used in optical tooling is discussed in detail. This includes the how the measurements are made, applications, and the technology of alignment lasers and position sensing targets developed for sensing position within a laser beam or plane. The various geometries used to make alignment measurements are discussed in detail. Applications are discussed and the challenges each poses are discussed. The challenge of long range alignment and the effect of the turbulent atmosphere on the measurement process is discussed along with methods of handling the associated errors them. WHAT IS OPTICAL TOOLING? Optical tooling is a means establishing and utilizing a line of sight (LOS) to obtain precise reference lines and reference planes from which accurate measurements are made with position sensitive targets. 1] Formerly the measurements were done by a person interpreting a scale or optical micrometer by looking through an alignment telescope; today the lines and planes are created by a laser; the measurements are digital and require no interpretation. Optical tooling uses the principle that light travels in straight lines to produce precise measurements that cannot be reached by manual or mechanical methods. Level lines can be esta blished over great distances so accurately that every point is exactly perpendicular to the force of gravity. Plumb lines can be set to a given level. Right angles can be produced quickly and precisely with auxiliary components. In the assembly, maintenance and calibration of industrial equipment or in the alignment of precision systems, one or as many as four basic questions always must be answered: is it straight, is it flat, is it plumb or is it square? A number of techniques have been developed to make these measurements; however, many of them result in inaccuracies so great that proper operation of the equipment involved will be compromised or seriously endangered. The science of optical metrology and alignment makes it possible to achieve the highest degree of accuracy in answering these four important questions. It is no longer necessary to interpret readings or to make constant adjustments and calculations. In laser alignment applications, direct, precision measurements are made rapidly and consistently. Straightness In aligning several points, a tight wire is often used as a reference line. This technique has numerous drawbacks and introduces inaccuracy. First of all, wire has weight, which causes it to sag; over long distances this sag can become considerable. In addition, wire vibrates, can bend or kink, and when stretched in the area to be measured, equipment cannot be moved around for fear of disturbing the wire reference line. Even a gentle breeze can cause the wire to move sideways a considerable amount; the aerodynamic drag on a thin wire is huge. In laser alignment, the LOS of is established by a laser beam instead of a tight wire. The invisible LOS reference has no weight, cannot sag, kink, or be disturbed, nor is it a safety hazard. It constitutes a precise, unvarying reference, determining straightness to within thousandths of an inch. Flatness In order to determine flatness a shop level and a straightedge was employed in the past. However, over large horizontal areas, the shop level must be moved from part to part. Consequently, one can only tell the degree of flatness of each individual surface upon which the level is place. Whether all objects in a large area are flat is still in doubt. Flatness over a considerable area must be assured in the erection of large machinery, surface tables and large machine tools. Conventional bubble levels simply do not offer the degree of precision required. Laser levels, a termed that has fallen into generic use, offer a way to produce a level datum over a wide area. Laser technology has overcome the many disadvantages of bubble levels and assures levelness to within a few thousandths of an inch over hundreds of feet. This high degree of levelness is accomplished by horizontally sweeping the laser beam manually or via a motor driven rotary stage. This revolving line of laser ligh t becomes a horizontal plane of sight, giving a precise horizontal reference datum, sometimes called a waterline. Squareness Perfect squareness implies that one plane forms a 90Â ° angle with another intersecting plane. When a steel square is used to test for this condition, the results can be very misleading. Such measurements rely upon the trueness of the steel square, which can vary from square to square with time. In addition, steel squares have a definite limit in their physical dimensions and consequently the testing of very large surface becomes inaccurate, slow and cumbersome. Laser alignment overcomes all these disadvantages and offers a quick and precise method for determining squareness. One method is to use a transparent penta prism in conjunction with a simple alignment laser. This optical element will split the beam from the laser into two parts; one beam passes through the prism undeviated, the other beam is reflected at a perfect 90 degree angle. This will be described in more detail later. Other systems use three independently mounted lasers that are orthogonal to each other. Plumb Classically, a plumb bob is used to establish a single vertical reference line. Of course, as vertical distances increase, the plumb bob becomes cumbersome and inaccurate. It takes a long time for the plumb bob to settle. Also, it can easily be swayed by vibration, air currents, and other disturbances which are bound to be encountered. In the laser alignment method there are several ways to produce a plumb reference; it can be a plane or a line. To form a plumb line, an alignment laser with autocollimating capability is used with a pool of almost any liquid. Autocollimation senses the angle of an external mirror by reflecting its beam back into the laser head. A position sensor, beamsplitter and lens measure the angle of the reflected beam. When the laser is adjusted such that the internal sensor reads 0 in both axes, then the laser is producing a plumb line. For example, if a heavy machine tool is being surveyed, the two reference points which determine the LOS should be located off of the machine. If for any reason the machine were to move or deflect all measurements would be in error. The two reference points should be located close enough to be convenient to use and/or out of the way of other people working in the area. Transits and alignment telescopes first made these types of measurements. But the problem with transits and telescopes is that they require a person to interpret a scale placed on the object of interest; and usually a second person is holding the scale against the object. It is a two person job that takes time and much training to accomplish successfully. It is also subject to errors. This type of alignment measurement, commonly called straightness, is the most basic of all alignment applications. The figure below shows an alignment laser source on the left whose collimated beam is striking a position sensor target on the right. The target can freely slide and make measurements of straightness of the structure to which it is attached. [pic] Another common requirement is to establish another LOS perpendicular or parallel to the original LOS. To establish a perpendicular a special prism is used: a penta prism. A penta prism has the property that rotation around its axis does not deviate the reflected beam at all; it does not have to be critically mounted. Penta prisms are often called optical squares, an appropriate term. To establish a parallel LOS to an existing LOS typically involves tooling bars if the distance is relatively short, say a meter or less. These bars are made of steel and hold electronic targets at a precise distance from a center. Using two of them with the original LOS establishes a parallel LOS. If the distance between the two LOS is large, then it can be done using the penta prism twice; the first time to turn the beam 90 degrees, followed by a certain distance, and concluded by turning the beam back 90 degrees. Care must be taken that two LOS are truly parallel; usually using a level reference datum makes the task much easier. The next alignment application involves measuring the alignment error between two different LOS datums; the typical application is to determine the lateral offset and angular error between two shafts. The shafts essentially define the two LOSs. The measurement consists of setting up the source on one shaft and parallel to it. The targets are placed on the second shaft and surveyed. Then the shafts are rotated 180 degrees and surveyed again; the difference is twice the shaft offset. If the target is placed at two axial locations and measured for offset, the difference in the offsets divided by twice the axial separation is the angular error in radians. The figure below shows a typical method to measure shaft alignment errors using a laser and target. [pic] A more sophisticated alignment application is to sweep a laser beam quickly to generate a plane of light. The advantage of this is that many targets can be aligned using one laser source. In simple straightness applications the target location is restricted to the active area of the position sensor. In swept plane alignment, the targets are using sensitive in only one dimension. A typical application to establish a level plane is to put three or more targets at the same (desired) waterline location and adjust the structure the targets are on until all targets read the same. The targets for swept plane alignment can be static, meaning they require the laser beam to be directed in to them constantly. Usually the laser beam is swept by hand by rotating a knob on the laser source. If the laser plane is moving at high speed, say once a second or faster, then the targets must capture and hold the position of the laser beam as the beam sweeps by. The problem becomes harder to accomplish at longer distance because the beam is on the detector for such a short periods of time. The figure below shows a horizontally swept level laser beam scanning by several targets placed on a machine bed.

Sunday, July 21, 2019

Ethical hacking

Ethical hacking Chapter 1 Introduction Ethical hacking is an emerging tools used by most of the organizations for testing network security. The security risks and vulnerabilities in a network can be recognized with the help of ethical hacking. This research completely concentrates on ethical hacking, problems that may occur while hacking process is in progress and various ethical hacking tools available for organizations. Information is the important source for any organizations while executing business operations. Organizations and government agencies have to adopt ethical hacking tools in order secure important documents and sensitive information (Harold F. Tipton and Micki Krause, 2004). Ethical hacker professionals have to be hired in order to test the networks effectively. Ethical hackers perform security measure on behalf of the organization owners. In order to bring out the ethical hacking efforts perfectly a proper plan must be executed. Ethical hacking has the ability to suggest proper security tools that can avo id attacks on the networks. Hacking tools can be used for email systems, data bases and voice over internet protocol applications in order to make communications securely. Ethical hacking can also be known as penetration testing which can be used for networks, applications and operating systems (Jeff Forristal and Julie Traxler, 2001). Using hacking tools is a best method for identifying the attacks before it effect the entire organization. Ethical hackers are nothing but authorized users for the sensitive information or networks of an organization. Using hacking techniques for handling employees in organization and for solving critical judicial cases is not a crime. An ethical hacker use same tools and actions as performed by normal hacker. The main aspect in ethical hacking is that target permission is essential for performing hacking on the information. Ethical hacking can be used while performing security audits in the organization (Kevin Beaver, 2010). Thus, ethical hacking can help in testing the networks by finding out various vulnerabilities. In ethical hacking, a user will get permission to access the important data. Aims and Objectives Aim To investigate the importance of ethical hacking and its implementation in organizations Objectives Finding the importance of ethical hacking tools Understanding the ethical hacking process Implementing ethical hacking tools in an organization Purpose of Study The main of this research is to recognize ethical hacking tools that can be used in organizations and government agencies. Testing the networks is essential in order to maintain security for the organizational information. The difficulties in networks have to be recognized by the security professional so that they can be solved before effecting the organization operations (James S. Tiller, 2005). This research also focuses on carrying out the ethical hacking tools in a particular organization. The advantages of using ethical hacking in business firms can be evaluated by this study. Ethical hacking tools can be implemented in various fields of applications. Various security professionals can be efficient in ethical hacking tools by undergoing a training process. Another major intension of this research is to identify the importance of ethical hacking professionals in providing security to the networks. (Nina Godbole, 2008). Thus, this research entirely focuses on ethical hacking tools which can be implemented for testing the networks. Research Context This research on ethical hacking can be very useful to many organizations as it can provide clear idea about hacking tools. Security professionals and normal users have to be trained well in order to use hacking tools. The importance of ethical hacking while solving many judicial cases can be identified with the help of this research. Management of an organization can be benefited largely through implementing hacking tools. Hacking tools implementation process can be understood with the help of this research (Ronald L. Krutz and Russell Dean Vines, 2007). Network security or data security engineers in organization will come to know about new ethical hacking methods and techniques that are available in the present market by concentrating on this research. The concepts in this study provide knowledge related to security improvements. Business users can hack the data in order to use it for the purpose of evaluating a correct process. Management has to take precautionary measures while a llowing the professional to hack ethically because data may be misused (Rajat Khare, 2006). Scholars who concerned with information security can take the help of this study for attaining the knowledge on hacking systems. Many organizations are encouraging ethical hacking professionals in order to control their business operations effectively. Email systems, data bases and communication applications can avoid or identify attacks by adopting the hacking tools. Malicious attacks on the information or software can be prevented by implementing this research while using ethical hacking tools. The organizations that concerned with security in networks have to use ethical hacking tools (Greg Meyer and Steven Casco, 2002). Hence from the above discussion it can be understood that, business firms, investigating agencies, government systems and web users can make use of this research to achieve the important information in authorized manner. Chapter 2:Literature Review Ethical Hacking and its importance The word hacking is defined as an illegal use of the others computer system or the network resources. Hacker is the term which is formerly meant for the skillful programmer. This is mostly found in the countries like United States and many other countries. The word hacker refers to the names of the persons who enjoys the work in learning the details of the computer systems and stretch the capabilities from the system (Rajat Khare, 2006). The system of hacking describes the fast improvement in the new programs that make the codes for the providing a better security to the system with more efficiency. The word cracker also belongs to the same field it make use of the hacking skills for the unlawful purposes like email id, intruding into others system. Hacking is of different types such as back door hacking, viruses and worms, Trojan horses, Denial of Services, anarchists, crackers, kiddies and ethical hacking (Kevin Beaver, 2010). In the types of hacking system one of the most common h acking is ethical hacking. This is defined as the services that provides the securities for the customers networks, information assets and identifies the vulnerabilities to maintain the reputation of the corporate sectors before it exploit the company. This type of the hacking system provides the high securities to the customers methodologies and techniques to yield high qualities of infrastructures. The ethical hacking system includes some of the service like: Application Testing War Dialing Network Testing Wireless Security System Hardening Application Testing This is an uncover design or the logic flaws which result in the compromising with the unauthorized accessing of the systems, networks, applications or the information regarding the systems. This application testing is used for investigating and identifying the extent and the criticality of the problems exposure to the thick client (Java) and thin client (web browsers) applications. This application testing includes the services like client-side application testing and web application testings (Joel Scambray, Mike Shema and Caleb Sima, 2006). The client-side application testing is the process of developing the software that is used for the measuring the integrated security into the client software constituents. In this system this testing application is based on the gathering of the information by observer using the reverse engineering system. War Dialing This is one of the services that are provided by ethical hacking. War dialing is a method of dialing a modem number to identify open modem connection that supplies access in a remote way to a network for targeting a particular system (Kimberly Graves, 2007). This word is originated from the day the when the internet has come into the existence in most of the companies. This follows the method of scanning to find the strength of the network connection. The tools of War dialing work on the concept that organizations do not pay attention to dial-in ports like they do towards the firewalls. Network Testing The networking testing services of the ethical hacking provides the information on the exposures of the network, services, and solutions on the convergence, protocols and system devices including the virtual private network technologies. This testing process includes a number of constitutes in external and internal devices. It also analyzes the applications of the voice over Internet protocol within the environment of the organization (Greg Meyer and Steven Casco, 2002). The main goal of the network testing application is to make obvious demonstration of the political effects on its development. By making use of this application into the organization, it provides a complete enlightenment to the work for determining the result in the organization. Wireless Security Wireless security services measures the security in the available architecture to provide a guidelines to ensure the system integrity and accessibility of the resources. The working of wireless security is based on the three phases. In the first phase of the operation it identifies the activeness of the wireless networks (Cyrus Peikari and Seth Fogie, 2003). The team of the ethical hacking demonstrates the exposure to the attackers with the space in the wireless network. In the seconds phase of this system it implements a normal users to evaluate the measures of the security that secures the infrastructures of the organization to control the accessing of the devices. During the third phase the team will try to utilize the discovered threats to gain access on other networks. This provides the security in wireless local area network, virtual private network, intrusion detection system and wireless public key infrastructure. System Hardening The system hardening stresses on the network vicinity. Security is the prime factor that determines the level of integrity of the information and resources used in the computing. Effective deployment of the security controls unauthorized, accidental disruption if resources in information technology (Kevin Beaver and Peter T. Davis, 2005). The system hardening assessment is complemented in three phases. The ethical hacking team will analyze the network to identify the loop holes in security updates and other frequent security defects. Scanning of the remote access devices is done for finding out the vulnerabilities. The configuration vulnerabilities and missing security updates are determined in the initial phase. In the second step the host operating system is examined to determine the services available for remote users and their level of impact. All the TCP/IP services and also the Telnet, FTP, Send-mail, DNS and others are tested (James S. Tiller, 2005). The packet fragmenting and loose source routing are used in an attempt to bypass filtering routers and firewalls. The last phase is complicated as the team uses the information gathered from the first two steps to mine the weaknesses and threats that were identified to gain access to the host system. Before the start of the three steps the boundaries for actions and events are determined. Hence from the above context it can be stated that ethical hacking is a methodology that is used for gathering the information on the hacker. The ethical hacker is the expert who is hired by an organization to solve the problems related to hacking in their network and computer system. Need for Ethical Hacking The process of employing someone to hack ones company is ethical hacking. Ethical hacking is one of the tools that are used to judge the security programs of the organizations. It is also referred as penetrating testing, red teaming, intrusion testing, vulnerability and even security judgments. Each one these has different meanings in different countries. Hacking is also described as new development of the existing programs, software and code. It makes them better and more efficient (James S. Tiller, 2005). Ethical hacker can know the details of computer while hacking and become the security professional. It involves in foot-printing, scanning, tacking all the secured information. Ethical means a philosophy with morality. Hackers hack systems to detect dangerous, unauthorized access and misuse (Shon Harris, Allen Harper, Chris Eagle and Jonathan Ness, 2007). Threat and vulnerability are the two dangers the hacker has to face. The hacking report must be confidential as it should face the organizations security risks. If this goes wrong in any way the organization results in fatal, penalties and loss. For example: computer crime is done by misuse of their hacking skills. The need to hack is for catching the thief. Ethical hacking is the correct method to make your computers work properly (Kevin Beaver, 2010). Ethical hacker needs higher level skills compared to penetration testing. Penetration testing is same as ethical hacking but the hacker uses the penetrating tools and tests the security danger. Ethical hacking is known as White Hat in some of the literature. It tests both the security and protective issues whereas penetrating test mainly leads with the security issues (Asoke K. Talukder and Manish Chaitanya, 2008). Some of the websites and companies offer the training, but they cannot be created they are self-made. Various types of testing need different types of softwares and tools. Game freaks use hacking technology in order to win the game. Hackers will d iscover many ways to hack like trial and error method, operating systems, online and determining the threats. Ethical hacking is done by hackers on behalf of the owners, and in normal hacking they use their skills for personal use (Debra Littlejohn Shinder and Micheal Cross, 2008). Cyber terrorism includes common hacking techniques such like viruses, email bombs and natural disasters. Thus ethical hacking is done by hackers on owners request. Mainly this is seen in corporate companies and organizations. Ethical hacking techniques are used for game cheat codes, hacking accounts and other for good result. Majorly used for fight against cyber terrorism and to take preventive action on hackers Types of ethical hackings Ethical hackers use various methods for breaking the security system in the organizations in the period of cyber attack. Various types of ethical hacks are: Remote Network: This process in especially utilized to recognize the attacks that are causing among the internet. Usually the ethical hacker always tries to identify the default and proxy information in the networks some of then are firewalls, proxy etc. Remote dial up network: Remote dial up network hack identify and try to protest from the attack that is causing among the client modern pool. For finding the open system the organizations will make use of the method called war dialing for the representative dialing. Open system is one of the examples for this type of attacks. Local Network: local network hack is the process which is used to access the illegal information by making use of someone with physical access gaining through the local network. To start on this procedure the ethical hacker should ready to access the local network directly. Stolen Equipment: By making use of the stolen equipment hack it is easy to identify the information of the thefts such as the laptops etc. the information secured by the owner of the laptop can be identified (Kimberly graves, 2007). Information like username, password and the security settings that are in the equipment are encoded by stealing the laptop. Social engineering: A social engineering attack is the process which is used to check the reliability of the organization; this can be done by making use of the telecommunication or face to face communication by collecting the data which can be used in the attacks (Bryan Foss and Merlin Stone, 2002). This method is especially utilized to know the security information that is used in the organizations. Physical Entry: This Physical entry organization is used in the organizations to control the attacks that are obtained through the physical premises (Ronald l. Krutz and russel dean Vines, 2007). By using the physical entire the ethical hacker can increase and can produce virus and other Trojans directly onto the network. Application network: the logic flaws present in the applications may result to the illegal access of the network and even in the application and the information that is provided in the applications. Network testing: In this process it mainly observes the unsafe data that is present in the internal and the external network, not only in the particular network also in the devices and including the virtual private network technologies Wireless network testing: In this process the wireless network reduces the network liability to the attacker by using the radio access to the given wireless network space. Code review: This process will observe the source code which is in the part of the verification system and will recognize the strengths and the weakness of the modules that are in the software. War dialing: it simply identifies the default information that is observed in the modem which is very dangerous to the corporate organizations. Techniques and tools required for ethical hacking Ethical hacker needs to understand how to find the network range and subnet mask of the target system. IP addresses are used to locate, scan and connect the target systems. Ethical hacker also should find out the geographical location of target system. This can be done by tracing the messages that are sent to destination and the tools used are traceroute, Visual route and NeoTrace to identify the route the target (Kimberly Graves, 2007). Ethical hacking should use right tools or else task accomplishment of task effectively is difficult. Many security assessment tools will produce false positive and negative or may they even miss susceptibility to attacks. In case of tests in case of physical security assessments they miss weakness. In order for ethical hacking specific tools have to be used for the task chosen. The easier the ethical hacking will become if many tools are used. The right tool must be used at right place. The characteristics in tools for ethical hacking is it should ha ve sufficient document, detailed reports should be there on the discovered attacks regarding their fixing and explosion, Updates and support. The general tools used for ethical hacking in case to find passwords are cracking tools such as LC4, John the Ripper and pwdump (Bragg, Mark Phodes Ousley and Keith Strassberg, 2004). The general tools like port scanner like SuperScan cannot be used to crack passwords. The Web-assessment tools such as Whisker or WebInspect tools are used for analysis of Web applications in depth. Whereas network analyzer tools such as ethereal cannot give good results. While using the tools for any particular task it is better to get feedback from the simple Google searches such as SecurityFocus.com, SearchSecurity.com and Itsecurity.com will give nice feedback from the other security experts which makes ethical hacking easy and to select the right tool. Some of the commercial, freeware and open source security tools are Nmap (Network Mapper), Etherpeek, Super Scan, QualysGuard, WebInspect and LC4, LANguard Network Security Scanner, Network Stumbler and ToneLoc. The capabilities of many security and hacking tools are often misunderstood, such as SATAN (Security Administrator Tool for Analyzing Networks) and Nmap. The other popular tools used in ethical hacking are Internet scanner, Ethreal, Nessus, Nikto, Kismet and THC-Scan (Kevin Beaver, 2007). Cain and able is a ethical tool used for recovery of windows UNIX problems. This is only password recovery tool handles an enormous variety of tasks. It can recover the password by sniffing the network, cracking the encrypted passwords using Dictionary and Cryptanalysis, recording VoIP conversations, decoding scrambled passwords, revealing the password boxes, uncovering cached passwords and analyzing routing protocols. Ethereal is a fantastic open source tool used as network protocol for UNIX and Windows. It allows examining the data which is present in disk or file and can capture the data. This is also known as Wire shark. It has many powerful features which have very rich display filter language and ability to view the TCP session. Another cracking tool Aircrack is the fastest available cracking tool (John Hyuk Park, Hsiao-Hwa Chen and Mohammed Atiquzzaman, 2009). Thus proper tools and techniques has to be used for better hacking and it will be easier by using more and more tools required. Hacking operating system Linux is the operating system which is most useful software that supports and will be helpful to identify the passwords and uses in detecting interruption there are many software tools are utilized for the hacking and security tools are used for the Linux. The tools which are using in this are not harmful tools this is especially used to protect. John the ripper: John the ripper is nothing but password hacking software technique which is usually used to develop for the UNIX operating system. This the most significant process which is used for password testing as it joins all password crackers into single package and the auto detects password hash types which involves the customizable cracker (Ryan, David R. Mirza Ahmad, 2002). It can be run among the different encrypted password methods which involves various crypt password hash forms where usually found on the different UNIX operating systems that is based on the DES, MD5 etc, Kerberos AFS and windows like XP, 200etc.Generally passwords are placed in the LDAP and other tools. Various types of components are used to expand the capability and for involving the MD4 related password hashes. The other one is the NMAP; Nmap is the used to protect the network. It is especially used to identify the network related services on the computer network by generating the map of the network . Nmap is having the ability to identify the services on the computer network instead of this it never advertises its service detection protocol (James turnbull, 2005). However the Nmap can collect many details regarding the remote computers. This will involve the operating system, and uptimes etc are the software products that are used to execute the service, and are used to involve on the local area networks and also on the dealer of the remote network card. Nmap can be run on the linux. Linux is the most important operating system and the windows are the second most important operating system. The other operating system used is Nessus, this software is used to scan the virus. The main aim of this software is used to identify the virus on the tested system such as; the virus will permit the data on to the network (Mark Carey, Russ Rogers, Paul Criscuolo and mike Petruzzi, 2008). Default passwords are utilized on the network accounts. This software is also called as the external to ol which is used to launch the attack. By making use of the mangled packets rejection of the service among the TCP/IP can be done. Nessus the best software used to scan the virus. Many organizations through out the world are using this software. The check Rootkit is the normal program which helps the administrator to check their system for the known rootkits ( James Turnbull, 2005). This program is the shell script by using the LINUX tools similar to the strings and the grep commands to seek out to carry out the core programs for the signatures with the executed process status command to look for inconsistency. This program alternatively use own commands to run. This tool will permit check rootkit to get confident the commands upon which it depend a bit more. Applications and resources Ethical hacking is nothing but the one which performs the hacks as security tests for their systems. Ethical hacking can be used in many applications in case of web applications which are often beaten down. This generally includes Hypertext Transfer Protocol (HTTP) and Simple Mail Transfer Protocol (SMTP) applications are most frequently attacked because most of the firewalls and other security are things has complete access to these programs from the Internet. Malicious software includes viruses and Trojan horses which take down the system. Spam is a junk e-mail which causes violent and needless disturbance on system and storage space and carry the virus, so ethical hacking helps to reveal such attacks against in computer systems and provides the security of the system. The main application of this is to provide the security on wireless infrastructure which is the main purpose of present business organization (BT, 2008). Ethical hacking has become main stream in organizations which are wishing to test their intellectual and technical courage against the underworld. Ethical hacking plays important role in providing security. Resources are the computer related services that performs the tasks on behalf of user. In Ethical hacking the resources are the core services, objects code etc (James Tiller S, 2005). The ethical hacking has advantages of gaining access to an organizations network and information systems. This provides the security in the area of Information technology called as Infosec. This provides security to the high level attacks such as viruses and traffic trough a firewall. This has been providing the security for various applications which are even bypassing the firewalls, Intrusion-detection systems and antivirus software. This includes hacking specific applications including coverage of e-mails systems, instant messaging and VOIP (voice over IP). The resources i.e. devices, systems, and applications that are generally used while performing the ha cking process are Routers, Firewalls, Network infrastructure as a whole, wireless access points and bridges, web application and database servers, E-mail and file servers, workstations, laptops and tablet PCs, Mobile devices, client and server operating systems, client and server applications (Kevin Beaver, 2007). Ethical hacking tests both the safety and the security issues of the programs (Ashoke Talukder K and Manish Chaitanya, 2008). Hence from the above context it can be stated as the ethical hacking is important in the present scenario as providing security is very important now a day. This is very important in web applications as the hacking can be easily done in this case. Problems Ethical hacking is the backbone of network security. The basic problems with this is trustworthiness of the Ethical hacker because lets take an example if a person has been appointed to do Ethical hacking, to provide security for the bank financial issues if the person is not trust to believe this is not safe as the person only considered as thief. Sometimes the big organizations face any problem like there passwords has been hack, this case hiring professionals is very expensive and the organization need to spend a lot on this (Ethical Hacking, 2009). Ethical hacking is just the security to the problem it is not the ultimate solution to it. Ethical hacking report must be kept confidential because they highlight the organizations security risks and attacks. If this document has been falls into the wrong hand the result would be very disastrous for the organization, the main drawback here is the entire information of the organization will be in hands of wrong person and which leads to the loss of the company (Kimberly Graves, 2007). Ethical hacking generally involves breaking down the computer applications and by collecting specific information from the target the ethical hacker can successful to access the information and can reveal it. This results in that highly sensitive information about the targets security capabilities is collected and maintained far away from the owners control. If this information fall into wrong hands results in real attack on the company and another problem is if the information is leaked to the public or stockholders, the business will be in risk, which results in all types of disasters, including negative character by media, loss of customers and legal consequences (James Tiller S, 2005). Ethical hacking use tools while it performing the activity, if the methods and tools are used incorrectly they cause damage (Dr. Bruce Hartly V, 2003). Hence from the above context it can be stated as Ethical hacking provides security but behind th at it provides the disadvantages like the Ethical hacker should be trusted by the organization or business and in case sometimes highly professionals may cost the organization very much so that company has to provide from the unplanned budget and if it goes into the wrong persons hand the business will be in danger and loss of the organization will takes place. Chapter 3: Research Methodology of Hacking Data types: Data type is defined as the format of a data storage which is used to store different set of values. It tells about which type of data to be stored and where to be stored. Data is stored in computer memory. There are two types of data. They are primary data and secondary data. Both primary and secondary data illustrates the gathering of information and to satisfy the goals of business. Primary data is nothing but it is the data which is collected newly and for the first time. The primary data is original. It is the fresh data and is never gathered before. Secondary data is the data which is collected by others (Norman Blaikie, 2009). The data is collected from newspapers, magazines and journals. Secondary data is gathered before primary data since it is time consuming. Data is gathered newly in case of primary data so it takes much time. Secondary data consumes less time. Primary data is used in ethical hacking since the data gathered in this type of data is very efficient. Ethical h acking is used legally for the official purposes. Since primary data is unique and is not compared with any one, it is used in the process of ethical hacking (Rajat Khare, 2006) Hence from the above context it can be said that data types are useful in the ethical hacking. Case study: According to media and people the word hacking denotes misuse and collapse of computers. They describe it as unfair method of solving the problem. In the view of ethical hackers the word hacking refers to creative. One of the organization namely Amazon, it is not proposed to point out the lesser features but deals with tricks for working the company efficiently. Hackers and developers will create new characteristics for Amazon. They bring out the creative thinking and innovative ideas by their work in company (Paul Bausch, 2003). Mainly the ethical hacking is the good way to improve the existing methods and qualities. Many organizations follow these because one can know the administrative password of employees, can reach the behaviour of them and working performance. Employee performance and his project carryout can be studied through ethical hacking. These hackings look easy for them since they are engaged with the security firms to protect the Amazon fields. Not only in Amazon in e ach and every organization is this steps fol

Saturday, July 20, 2019

Creation Or Evolution Essay -- essays research papers

EVOLUTION OR CREATION? In a coherent world like ours people are questioning their religion and not knowing whether to believe in creation by God or evolution, Through out my research I have found four possible answers to this question to incorporate both theories . Which prove neither wrong and belief in both at the same time One approach would be to believe that when God when created the trees in 4004 BCE, he would have formed them complete with growth rings. So too with other plants, animals and minerals. Everything in the world would then appear as if they had existed in the period of time prior to creation. In other words, God created the world as if it has had a past. One would interpret the evidence to show that the world was created only a few thousand years ago, but that it was created looking as if it had evolved over billions of years . A second approach would involve a relatively small change in the belief system of the "Genesis believing" creation scientists. The change would be to accept the Genesis account of creation as God's initial creation message which He revealed to the ancient Israelites who lived in a pre-scientific age. This would have been the only type of explanation that they could understand at the time. This would require one to abandon the literal interpretation of Genesis in favor of the belief that it is a historical myth. One could argue that Jesus used parables to make a point about human nature; the parables did not necessarily ...

Exploration Of The Matthew Shepard Event Essay -- Homosexuality Crime

Exploration Of The Matthew Shepard Event The human body is an object in which one lives and the medium through which one experiences oneself and the world. Claims on ideology and space are ultimately vested in the human body, and thus conflicts about belief systems and territory are often contested violently on physical bodies. Gay bodies become entangled in violence when they enter into arenas that combat certain ideas. Gay bashing illustrates incidences all in which bodies experience physical injury. In modern U.S. communities various militant conservatives target homosexuals in "gay bashing." Mathew Shepard's brutal murder in 1998 illustrates a relatively recent incident in which the human body becomes politicized. What is the process by which the pain and death of Shepard's body transform the personal to the political? What does "gay bashing" mean to attackers, victims and their communities? If gay bashing is about violence and being gay is at least partially about sex, then what is the relationship between them? What framework attends to both the sexual and nonsexual activities among contemporary American males? In Between Men, Eve Sedgwick sleds light on the boundaries separating sexual and nonsexual male relationships. According to the author, homosocial and homosexual do not necessarily have to occupy two different, non-overlapping spheres. " 'Homosocial desire', to begin with, is a kind of oxymoron. "Homosocial" is a word . . . [that] describes social bonds between persons of the same sex; it is a neologism, obviously formed with analogy with "homosexual," and just as obviously meant to distinguish from 'homosexual'" (Sedgwick 1985:1). Sedgwick contends that it would be more useful to view homosocial and homosexu... ...riarchy is the right of men to "hit on" women while remaining safe from not being "hit on" by anyone else, especially another man. Patriarchy, imbued with hierarchical meanings, gives heterosexual men something to loose. As practiced in contemporary America, patriarchy uses homophobia as structural support. Gay bashing exemplifies homosocial behavior's contribution to US patriarchy. The human body is both an object in which one lives and a site of political articulation. The struggles within many societies begin and end within the terrain of the human body, which though has no referential meaning becomes embodied by meaning within context that ultimately has a stake in the body. . Works Cited: 1. Kaufman, Moises. 2001. The Laramie Project. New York: First Vintage Books. 2. Sedgwick, Eve Kosofsky. 1985. Between Men. New York: Columbia University Press.

Friday, July 19, 2019

The Pros and Cons of Genetic Engineering Essay -- Genetic Engineering E

  Ã‚  Ã‚  Ã‚  Ã‚  Genetic engineering is a process in which scientists transfer genes from one species to another totally unrelated species. Usually this is done in order to get one organism to produce proteins, which it would not naturally produce. The genes taken from one species, which code for a particular protein, are put into cells of another species, using a vector. This can result in the cells producing the desired protein. It is used for producing proteins which can be used by humans, such as insulin for diabetics and is also used to make organisms better at surviving, for example genetically modifying a plant so that it can survive in acidic soil.   Ã‚  Ã‚  Ã‚  Ã‚  There is debate about whether genetic engineering should be used or not, and to what degree. There are many problems that can occur from the process and many of these cannot be avoided currently. There are known problems and there is also the fact that the whole process is unpredictable and unforeseen problems could crop up. A good example of this was the influence of a genetically engineered organism on a food chain, which sometimes damaged the local ecology. The new organism could now compete successfully against other species, causing unforeseen changes in the environment. This could then have a knock-on effect that could lead to the destruction of whole species.   Ã‚  Ã‚  Ã‚  Ã‚  Due to the quite random nature of genetic engineering, there is a risk that it may disrupt the functioning of other genes in an organism. This could mean that the organisms do not survive at all, or become some sort of mutated freak, which is completely different and maybe even more dangerous. Genetic engineers also intend to profit by patenting genetically engineered seeds. This means that, when a farmer plants these genetically engineered seeds, all the seeds have an identical genetic structure. As a result, if a fungus, a virus, or a pest develops which can attack this particular crop, they might all be at risk, resulting in widespread crop failure. Insects, birds, and the wind can carry genetically altered seeds, which can cross-pollinate with genetically natural crops and wild relatives. All crops, organic and non-organic, are vulnerable to contamination from cross-pollinatation, meaning that problems in the original genetically modified organisms can be spre ad a... ...age because it means that insulin, which keeps diabetics alive, can be produced quickly and cheaply. Genetic Engineering could also increase genetic diversity, and produce more variants of the same species that could also be crossed over and implanted into other species. Animals and plants can be 'tailor made' to show desirable characteristics. Genes could also be manipulated in trees for example, to absorb more CO2 and reduce the threat of global warming. This would actually help the environment. However many of these things have not been tested and are much more difficult in practice than in theory. That added to the massive uncertainty about the effects and results of genetic engineering would suggest that the benefits do not outweigh the risks taken to obtain them. A religious question also arises. By changing the cells of living organisms are we ‘playing God’ and if we are should we be allowed to?   Ã‚  Ã‚  Ã‚  Ã‚  In conclusion I would say that genetic engineering is certainly a good thing saving lives in many cases. However more tests need to be carried out, and profit-hungry companies should not be allowed to do whatever they want in their quests for profit.

Thursday, July 18, 2019

Outliers Book Review

Francisco Ayala May 9, 2012 English 101 Outliers Malcolm Gladwell is a speaker, bestselling author, and Canadian journalist. He is a writer for the New Yorker since 1996. Gladwell has four New York Times bestseller books he has written. Among one of those books is Outliers: The story of success (2008). Outlier, a nonfiction book, had to do with social psychology. Outlier is about the success of people who do not fit into our normal understanding of achievement. Gladwell points out that many people could be giving the same opportunity but it all comes down to early opportunity and privileged social standing are what really makes an Outlier.Gladwell does a really good job on breaking down the story of success of some Outliers. He goes in detail in how some Canadian hockey players make it have it easier than others, how Bill Gates is who he is today and the genius Christopher Largan failure to become an Outlier. In Outliers, Gladwell wants to convince the reader that people don't just r ise from nothing to be successful. Success comes from parentage and patronage. It also comes down to when and where you grew up. First example Gladwell gives is explaining how some Canadian hockey players become better than others.Gladwell research shows there’s an uneven number of elite Canadian hockey players. Players that are born in the first few months, January, February and March, of the calendar are more likely to be successful than those born in the last month of the year. Statistics showed players born in January, February, and March are most likely to be in the hockey traveling team. The reason for this was because in Canada, the eligibility cut-off for age class hockey is January 1. Someone born in January 2 has bigger physical maturity than someone born in November.Those with bigger maturity get chosen to join the elite team. They get provided with better coaching, better teammates and more games than those who were left behind. It is why most likely they are able to make into professional leagues. I can relate to Gladwell research as I used to play in soccer leagues. The cut-off date was also January 1. I did notice a difference of physical maturity; I was born in April, than those born in the last three months. It was easy to outrun the shorter people and it was the shorter people who were always sitting on the bench.Another Outlier Gladwell uses as an example is Bill Gates. Young Bill Gates was a really good mathematician. Gates was headed to a highly intelligent, driven, and successful professional career. But what change his path into not only being successful in life but also making him a billionaire was Bill Gates was given a unique opportunity that no one was given to at that time. He had the privilege to be the only one to be able to use the High School computers as much as he wanted after school, even overnight. It is there where he practiced programming and achieved the 10,000 hour rule.The 10,000 hour rule is the require amount o f time a person must practice in order to succeed. Personally, I agreed with this 10,000 milestone as I know someone who put ton amount of hours in his profession. At the age of ten, a teammate of the soccer team I used to play in used to stayed an extra two hours playing soccer after soccer practice was over. Practice was three hours along. That was a total of five hours a day of playing soccer. This was his routine for at least five times a week for the next nine years. He passed the 10,000 hour rule by age eighteen.At age twenty, he got signed to professional soccer team New York Red Bulls. Gladwell also uses Christopher Largan as an example. Largan is considered by many the smartest man in America. He has an IQ of one-ninety five. With a higher IQ than Einstein, everyone automatically thinks he is going to be successful in life. Largan does not become an Outlier. One reason for that is Largan did not have anyone in his life. His mother was not there to support him. There was no opportunity for him to demonstrate his talent. Gladwell compares Lohan to Oppenheimer, the creator of the atomic bomb.Oppenheimer came from a wealthy neighborhood. His father was a business man. Oppenheimer had better opportunities to develop his intelligence than the opportunities Largan had. Largan came from a poor neighborhood and his mother was always working. Another difference between the two was Oppenheimer had practical intelligence and Largan didn’t. Practical Intelligence is â€Å"knowing what to say to whom, knowing when to say it, and knowing when to say it, and knowing how to say it for maximum effect (101). † Oppenheimer tried to poison one of his tutors.He was going to get kicked out of the University but he managed to get away with it because Oppenheimer had practical intelligence. Oppenheimer got these skills when he was child from his wealthy parents. He got away with attempting murder and just got sent to a psychiatrist in London. In the other hand L argan had to drop out of school because his mother didn't sign his financial scholarship on time, therefore he lost the scholarship. When he tried to talk to the dean, Largan wasn't able to convince the dean to let him keep his scholarship.Largan lack of practical intelligence he never got by his parents. It leaves me wondering what if Largan came from a wealthy neighborhood and his father was a business man. Would he have being bigger than Albert Einstein? What if Oppenheimer was raised in a poor neighborhood? He would’ve most likely end up in jail for trying to murder his tutor. Practical intelligence is something some persons have and should appreciate it. My brother always talks his way out of a ticket most of time when he gets pull over by police.On the other hand, I always get the ticket whenever I get pulled over by the police officer. I get very nervous and don’t know what to say while my brother always comes up with a unique excuse and they let him off the hoo k. Outliers has made me realize in order to be successful, one has to have luck on their side. I could be the smartest man in the world, but if I don’t have the proper background to succeed I won’t be able be successful. People who have being successful have had a unique opportunity in their life.Some of them were born at a time that was for their advantage. It makes me think if my birth year has any luck store for me in the future. I will recommend this book to people because it has some material in it that caught my attention. The 10,000 hour rule is what really got my attention. Seeing how The Beatles became successful after passing the 10,000 hours motivates me to put in hard work to what my goal is. What also caught my attention is how we have different perspective about school than what Asian think.Americans think if we go to school for a long time, we going to fatigue the brain and therefore not learn. That is the reason why we get a lot of vacation time. The As ian community makes their students go to school most of the year for at least eight hours. It is why they are mostly highly knowledgeable than most Americans. If people read what the Asians do in order to be highly intelligent, it could perhaps make them want to spend more time in school. Work Cited †¢ â€Å"Outliers (Malcolm Gladwell). † Weblog post. A Sea Change. 10 Feb. 2011. Web. 09 May 2012. .

Wednesday, July 17, 2019

Theatre of the Absurd

THE THEATRE OF THE ABSURD The dictionary inwardness of the word tight is unreasonable, ridiculous or funny. But it is used in a somewhat different sense when we come up to of the orbit of the pathetic, or more than commonly turn inn now-a-days as stiff Drama. The phrase The athletic field of the cockeyed was coined by the critic Martin Esslin, who do it the g going of his withstand on the same subject, publish in 1961. Esslin points sur feel in this book that in that respect is no such(prenominal) subject as a regular elbow grease of sozzled Dramatists. The term was useful as a device to baffle authorized common fundamental characters that were grant in the workplaces of a figure of speech of compositionoeuvretists.Esslin maxim in the works of these matchwrights as aesthetical co-relation to Albert Camus school of thought that living is in herently with give away convey as is expound in his work The Myth of Sisyphus. In this essay Camus has described the military post of the hu existence beings as maven out of harmony with its surroundings. The house of the monstrous, today, stomach be considered as a behavior for particular consorts written by a number of primarily European quickenwrights in the late 1940s, 1950s and 1960s, and also, along with that, to the way and form of theatre which has evolved from their work.A scam merely true story narrated in the beginning of Martin Esslins book The business firm of the idiotic provides the best commentary on the significance of the nonsensical, and also helps in arrest the hu hu valet de chambre value of Samuel Becketts be train delay for parago non, which is famous as an cockeyed Drama par excellence. This is the story as t previous(a) by Mr. Esslin On 19th November 1957, a group of worried tourors were preparing to face their hearing. The actors were members of the corporation of the San Francisco Actors workshop.The audience consisted of xiv hundred convicts at the San Quentin penitentiary. The drape parted. The stand for began. And what had bewildered the sophisticated audiences of genus Paris, London, and hot York, was immediately grasped by an audience of convicts The tether of muscle men, biceps overflowing. parked in wholly 642 lbs on the aisle and waited for the girls and funny stuff. When this didnt appear they audibly fumed and audibly decided to wait until the house lights dumb before escaping. They made cardinal error. They listened and looked 2 minutes too-long-and stayed. Left at the block up. every(prenominal)(a) shook. A reporter from the San Francisco Chronicle who was present noted that the convicts did not find it thorny to understand the play. One pris unmatchabler told him Godot is conjunction. Said an some other Hes the outside. A teacher at the prison was quoted as saying They know what is meant by waiting. and they know if Godot lastly came he would only be a disappointment. This story is helpful in apprehension the genre of the pissed. Playwrights commonly associated with the flying field of the gagable include Samuel Beckett from Ireland, Eugene I adeptsco from Ru universeia, Jean Genet from France and Harold Pinter of bulky Britain.The nonsensical in their plays takes the form of mans reaction to a field app arntly without center, or man as a puppet that is controlled or endanger by an invisible outside force. though the term is applied to a long range of plays, some characteristics coincide in galore(postnominal) of the plays. For instance broad waggery is mixed with tragic images where the characters are caught in hopeless parts and are forced to do repetitive or importeeless action. plain the dialogues are full of specialized jargons, and wordplays and cliches and fifty-fifty nonsense. regular(a) the plots are mostly rotary or ludicrously expansive.Regarding the story, it is either a parody or a inflammation of realism. The study of the monstrous is co mmonly associated with empiricism, and Existentialism was an influential philosophy in Paris during the rise of the senseless theater. However, it is not exactly correct. Historically Existentialism grew with the nineteenth hundred writings of Nietzsche and Kierkegaard. On reading Nietzsches Zarathustra published in 1883, the readers come crosswise a startling phrase that God is dead According to Esslin, since then for m whatsoever more people, God has died.He says And so after two terrible wars, in that respect are s bank many who are trying to come to terms with the significance of Zarathustras message searching for a way in which they can with dignity, show a universe, take of what was once its contract and its living intent, a macrocosm deprived of a generally accepted combine principle, which has become disappointed and purposeless. The athletic field of the Absurd is one of the give tongue toions of this search it seeks to re-establish an sensibleness of mans si tuation when confronted with the ultimate earth of his set apart. For the people, in between the two piece Wars, the world seemed to be falling apart. tumult of the society, the jeopardise of the unknown and utter solitude of man, all this and many more made world beings look upon look as useless and futile. The world had become a place where man continues to waste, and pine and, and degenerate. In Samuel Becketts play, Waiting for Godot, the situation of man in this universe is summarized by Pozzos outburst in the second act of the play One day we were born, one day we shall die, the same day, the same second, is that not enough.They give birth astride of a grave, the light gleams an instant, then its night time once more. A most affecting image of death comes out in these lines. Esslin feels that in Becketts plays physical nature follows its own cycle, birth growth regress decay and death. Seasons follow each other but at that place is hardly any escape The origin of the Theatre of the Absurd is rooted in the new(a) pioneering experiments in the art of the 1920s and 1930s. The aim of these experiments was to do away with art as a mere imitation of appearances.It was after the inaugural human beings War that German Expressionism move to project the inner realities and also well-tried to objectify thoughts and feelings. At the same time, the Theatre of the Absurd was also strongly influenced by the distresstic screw of the horrors of the Second World War, which showed the total impermanence of any values and shook the validity of long time held conventions. It also highlighted the precariousness of human life and also its fundamental unimportantness and unpredictability.The trauma of living from 1945, under the threat of nuclear annihilation also seems to impart been an strategic concomitantor in the rise of this new theatre. At the same time, the Theatre of the Absurd also seems to have been the reaction to the fade of the religio us dimensions from contemporary life. Absurd Theatre hopes to achieve this by wounding man out of an existence that has become overused, mechanised and self satisfying. It aims to startle the viewer, shake him out of this comfortable conventional life of customary concerns.The Theatre of the Absurd highlights mans fundamental bewilderment and confusion originating from the fact that man has no answers to the prefatorial existential questions like why we are alive, why we have to die, why there is detriment and suffering. Playwrights share the view that man is inhabiting a universe with which he is out of key. Its meaning is indecipherable and his place within it is without purpose. He is bewildered, troubled and maybe even obscurely threatened. Mans tragedy is that he is not aware of his problem. Man is endlessly trying to seek some purpose in life by acquiring involved in trivialities and piffling pursuits.This is one reason why tragedy and pig out are closely interlinked in the Theatre oh the Absurd. fifty-fifty at the moment of the tragic climax in Waiting for Godot, farce enters the moment. Estragons trousers fall in attempting suicide and the chord breaks, when thy try its strength, making Estragon and Vladimir to the highest degree fall. The buffoonery here illustrates their lifes hopelessness and the futility of all their efforts to end them. The perfect statement of the philosophy of the Theatre of the Absurd as defined by Martin Esslin, is in which the world is seen as a hall of reflecting mirrors, and Reality merges step by step into fantasy.If God is dead, then surely the Theatre of the Absurd is looking for an alternative weird goal, i. e. making man aware of his disoriented moorings and trying to make him feel what he has to regain. Plays within this group are incorrect in that they focus not on logical acts or realistic occurrences or even traditional character development. They instead focus on human beings trap in an incomprehe nsible world veneering incidents which are illogical. Mainly the theme of incomprehensibility is mate with the inadequacy of spoken language. Basically there is no story, no bidtic conflict and postal code really ever happens.Mostly there is repetitive action and circular army of events. Devaluation of language is also an important trait of the Absurd Drama. Esslin says that Absurdism is the inevitable devaluation of ideals, purity and purpose. Absurdist drama asks its viewers to draw his own conclusions and make his own errors. Though Theatre of the Absurd may be seen as nonsense, they have some subject to say and can be understood. Even regarding plots, traditional plot structures are rarely considered as good plots in the Theatre of the Absurd. Plots normally consist of Absurd repeat of action as in Waiting for Godot or The Bald Soprano.Often there is an outside force that remains a mystery like in The birthday Party or A beautiful Balance. Absence, emptiness, nothingness and unresolved mysteries are commutation features in many Absurdist plots, for example, in The Chairs an old couple welcomes a large number of guests to their home, but these guests are invisible so all we see is empty chairs, representing their absence. another(prenominal) example is where the action of Waiting for Godot is touch on the absence of a man named Godot, for whom the two characters keep waiting till the end of the play. Plots are also orbitual like in Endgame, it begins where the play stop in the beginning.One of the important facets of Absurd Drama was its distrust of language as a means of communication. During those times language had become a fomite for conventionalized, stereotyped meaningless exchanges. Words usually failed to express the fundamental nature of human experience because it was not able to go into beyond its surface. So the playwrights of the Absurd Theatre accomplished first and foremost an tone-beginning on language, showing it as a trul y unreliable and insufficient beam of light of communication. During those times language had become a vehicle for conventionalized, stereotyped meaningless exchanges.Words usually failed to express the fundamental nature of human experience because it was not able to penetrate beyond its surface. So the playwrights of the Absurd Theatre constituted first and foremost an onslaught on language, showing it as a very unreliable and insufficient tool of communication. Absurd Drama uses conventionalized speeches, cliches, slogans and technical jargons, which it distorts and breaks down. It is by ridiculing the conventionalized and stereotyped speech, that Absurd Theatre tries to make people aware of the possibility of going beyond free-and-easy speeches and communicating more authentically.The theme of the Absurd play is the purposelessness of human life. Albert Camus in his essay The Myth of Sisyphus has described the situation of human beings as one out of harmony with its surroundi ngs. The Theatre of the Absurd is one of the ways of cladding the life that has deep in thought(p) its meaning and purpose. As such, it fulfils a twice component. Its first and more obvious role is satirical where it criticizes a society that is petty, superficial and dishonest. Its second and more positive aspect is that it highlights the basic absurdity of the human situation.It showcases the set apart of human beings in a world in which man has lost all his faith. Here he is presented in his basic situation where he is left with no choice and desperately searches some insane asylum or heaven. Such a play produces the effects of alienation. We find it very onerous to identify ourselves with the characters in the Absurd Drama. Even though their situation is very torturesome and violent, they are presented to us in such a way that we tend to laugh at them and their condition and behavior. Esslin feels that this kind-hearted of drama utters mostly to the deeper level of the audiences mind.In a way it challenges the audience to make sense of the nonsense. It urges them to face the situation consciously and along with that, to laugh at this fundamental absurdity of such situations. So, the imposing theme of the absurd playwrights is mans loneliness, despair, and desperation when he finds that his faith in God is declining. In all the writers of the Absurd Drama, the common traits are usually the devaluation of language, absence of characterization and motivation and search for meaning in a basically absurd situation.But each of them has his own style of presenting these traits. For example Ionesco presents absurdism through hilarious and steep farce. In Becketts works, absurdism is presented by limning a world which is devoid of God, where life is full of anguish and despair. In the plays of Harold Pinter menace and terror surrounds people. His plays, famous as comedy of menace, are basically funny up to a point. The most surprising thing about plays of this group is that in animosity of their breaking of the rules, they are very successful.In his book, The Theatre of the Absurd, Esslin says, If a good play must have a intelligibly constructed story, these have no story to speak of if a good play is judged by subtlety of characterization and motivation, these are practically without recognizable characters and present the audience with almost mechanical puppets if a good play has to have a fully explained theme, which is neatly exposed and finally solved, these ofttimes have neither a beginning nor an end if a good play is to deport the mirror up to nature and limn the manners and mannerism of the age in finely observed sketches, these seem much to be reflections of dreams and nightmares if a good play relies on witty repartee and pointed dialogue, these often consist of incoherent babblings. To conclude, the Theatre of the Absurd presents anxiety, despair and a sense of loss at the disappearance of solutions and the ill usions of life. Now face all this means that we are facing reality itself. Thus, is can be verbalize that Absurd Drama becomes a kind of a modern mystical experience. It aims to shock its audience out of complacency, to bring it face to face with the harsh facts of the human situations as the writers see it.It becomes a kind of a challenge to accept the human condition as it is, with all its mystery and absurdity, and to cause it with dignity, because there are no solutions to the mysteries of existence. That is because eventually man is alone in this meaningless world. To accept all this freely and without attention may be painful, but doing so brings a sense of freedom and relief. And that is why we say that the Theatre of the Absurd does not provoke tears of despair but the laughter of liberation. Bibliography PRIMARY SOURCES 1. Martin Esslin, The Theatre of the Absurd SECONDARY SOURCES 1. Martin Esslin, Introductin to The Theatre of the Absurd 2. Arnold P. Hinchliffe, The A bsurd 3. Ronald Gaskell, Drama and Reality 4. Eva Metman, Reflections on Becketts Plays