Tuesday, December 31, 2019

Biography of Abraham Lincoln, 16th U.S. President

Abraham Lincoln (February 12, 1809–April 15, 1865) was the 16th president of the United States, serving from 1861 to 1865. During his time in office, the nation fought the Civil War, which claimed hundreds of thousands of lives. One of Lincolns greatest accomplishments was the abolition of slavery in 1864. Fast Facts: Abraham Lincoln Known For: U.S. president from March 4, 1861–March 3, 1865; issued  Emancipation Proclamation in 1862, freeing slaves in the southern United StatesAlso Known As: Honest AbeBorn: February 12, 1809 in Sinking Spring Farm, KentuckyDied: April 15, 1865 in Washington, D.C.Spouse: Mary Todd Lincoln (m. 1842–1865)Children: Robert, Edward, Willie, TadNotable Quote: Whenever I hear anyone arguing for slavery, I feel a strong impulse to see it tried on him personally. Early Life Abraham Lincoln was born in Hardin County, Kentucky, on February 12, 1809. He moved to Indiana in 1816 and lived there the rest of his youth. His mother died when he was 9 but he was very close to his stepmother, who urged him to read. Lincoln himself stated that he had about one year of formal education. However, he was taught by many different individuals. He loved to read and learn from any books he could get his hands on. On November 4,  1842, Lincoln married  Mary Todd. She had grown up in relative wealth. Many historians believe that Todd was mentally unbalanced; she struggled with mental health issues throughout her life and may have suffered from bipolar disorder. The Lincolns had four children, all but one of whom died young. Edward died at age 3 in 1850. Robert Todd grew up to be a politician,  lawyer, and diplomat. William Wallace died at the age of 12. He was the presidents only child to die in the White House. Thomas Tad died at 18. Military Career In 1832, Lincoln enlisted to fight in the Black Hawk War. He was quickly elected captain of a company of volunteers. His company joined regulars under Colonel Zachary Taylor. Lincoln only served 30 days in this capacity and then signed on as a private in the Mounted Rangers. He then joined the Independent Spy Corps. He saw no real action during his short stint in the military. Political Career Lincoln worked as a clerk before joining the military. He ran for the Illinois state legislature and lost in 1832. He was appointed as postmaster of New Salem, Illinois by Andrew Jackson and later elected as a Whig to the state legislature, where he served from 1834 to 1842. Lincoln studied law and was admitted to the bar in 1836. From 1847 to 1849 he served as a U.S. Representative in Congress. He was elected to the state legislature in 1854 but resigned to run for the U.S. Senate. He gave his famous house divided speech after being nominated. Lincoln-Douglas Debates Lincoln debated his opponent for the Senate seat, Stephen Douglas, seven times in what became known as the Lincoln-Douglas Debates. While they agreed on many issues, the two disagreed over the morality of slavery. Lincoln did not believe that slavery should spread any further through the United States, while Douglas argued for popular sovereignty. Lincoln explained that while he was not asking for equality, he believed African-Americans should receive the rights granted to all Americans in the Declaration of Independence: life, liberty, and the pursuit of happiness. Lincoln lost the election to Douglas. Presidential Election In 1860, Lincoln was nominated for the presidency by the Republican Party with Hannibal Hamlin as his running mate. He ran on a platform denouncing disunion and calling for an end to slavery in the territories. The Democrats were divided, with Stephen Douglas representing the Democrats and John Breckinridge the National (Southern) Democrats nominee. John Bell ran for the Constitutional Union Party, which took away votes from Douglas. In the end, Lincoln won 40 percent of the popular vote and 180 of the 303 electoral college votes. Since he was in a four-way race, this was enough to ensure his victory. First Presidential Term The main event of Lincolns presidency was the  Civil War,  which lasted from 1861 to 1865.  Eleven states seceded from the Union, and Lincoln firmly believed in the importance of not only defeating the Confederacy but also reuniting North and South to preserve the Union. In September 1862, Lincoln issued the  Emancipation Proclamation. This declaration freed the slaves in all of the Southern states. In 1864, Lincoln promoted  Ulysses S. Grant  to commander of all Union forces. Reelection The Republicans, at this point called the National Union Party, had some concern that Lincoln wouldnt win but still renominated him for a second term with Andrew Johnson as his vice president. Their platform demanded unconditional surrender and an official end to slavery. Challenger George McClellan had been relieved as the head of the Union armies by Lincoln. His platform was that the war was a failure, and Lincoln had taken away too many civil liberties. Lincoln won reelection after the war turned in the Norths favor. In April 1865, Richmond fell and  Confederate General Robert E. Lee  surrendered at  Appomattox Courthouse. In the end, the war was the most costly  in American history and also the bloodiest, with hundreds of thousands of casualties. Slavery was forever ended with the passage of the  Thirteenth Amendment. Death On April 14, 1865, Lincoln was assassinated while attending a play at Fords Theater in Washington, D.C. Actor John Wilkes Booth shot him in the back of the head before jumping onto the stage and escaping to Maryland. Lincoln died on April 15 and was buried in Springfield, Illinois. John Parrot / Stocktrek Images / Getty Images On April 26, Booth was found hiding in a barn, which was set on fire. He was then shot and killed. Eight conspirators were punished for their roles in the plot to kill the president. Legacy Lincoln is considered by many scholars to be one of the most accomplished and successful presidents in United States history. He is credited with holding the Union together and leading the North to victory in the Civil War. Furthermore, his actions led to the emancipation of African-Americans from the bonds of slavery. Sources Donald, David Herbert.  Lincoln. Niagara, 1996.Gienapp, William E.  Abraham Lincoln and Civil War America: a Biography. Oxford University Press, 2002.

Monday, December 23, 2019

The Observations Of Albert Einstein s Theory Of Relativity

The most recent confirmation of Albert Einstein’s theory of relativity was the detection of gravitational waves. This discovery revolutionised our understanding of science and the universe. It has also unlocked the potential for future scientific endeavours especially in the field of gravitational wave astronomy. Spacetime is the union of the three spatial dimensions and the one time dimension into a continuum1. According to general relativity, gravity is the curvature of this spacetime due to the presence of mass. The greater the present mass the greater the curvature. Extremely large changes in spacetime curvature create wave like ripples in spacetime that propagate at light speed.2 These extremely large changes can occur due to black holes merging together. These ripples are gravitational waves, and can be detected. In 1916 gravitational waves were predicted by Albert Einstein in his theory of general relativity.1 Gravitational waves were first detected on 14 September 2015 by the Laser Interferometer Gravitational-Wave Observatory (LIGO).3 This observatory consists of two installations, one in Hanford and one in Livingston, America. The waves detected were caused when two black holes of 36 and 29 solar masses merged. LIGO splits a laser beam down 2 perpendicular 4 kilometre tunnels, that are reflected back to their origin where they recombine at a detector. The two light beams travel the same distance, so normally when they recombine they cancel each other out. In theShow MoreRelated Einsteins Theory of Relativity Essay3227 Words   |  13 Pagesall time until the early 1900s, when a new champion of physics set the world ablaze with dreams of time travel, black holes, and a mysterious phenomenon dubbed â€Å"Relativity.† Albert Einstein’s ideas revolutionized science and technology and opened a new field of theoretical physics concerned with the origins and behavior of the universe as a whole. Many believe that only a person of Einstein’s mental caliber could possibly comprehend The Theory of Relativity, but this is far from true.Read MoreAn Influential Physicist Of The 20th Century1906 Words   |  8 PagesAlbert Einstein was a German-born physicist who developed the general theory of relativity, among other feats. He is considered the most influential physicist of the 20th century. Synopsis Born in Ulm, Wà ¼rttemberg, Germany in 1879, Albert Einstein had a passion for inquiry that eventually led him to develop the special and general theories of relativity. In 1921, he won the Nobel Prize for physics for his explanation of the photoelectric effect and immigrated to the U.S. in the following decade afterRead MoreSalvador Dali and Science Essay1747 Words   |  7 Pages Within the realm of Surrealism, more specifically the surrealist group, they contain works that are overly subjective and involve definite notions to scientific observation of nature, as well as the interpretations of dreams. Encapsulating the former ideas of Albert Einstein, there is a close resemblance to theories that are at the very base of quantum mechanics. Upon further inspection, Salvador Dali’s artistic imagery and methodology, as well as Andrà © Breton’s, could be seen as expressions ofRead MoreThe Development Of The Big Bang Theory2081 Words   |  9 PagesBig Bang Theory Arby D Dickert Western Governors University The Development of the Big Bang Theory Abstract The big bang theory is the result of work by Albert Einstein and Edwin Hubble. Arno Penzias and Reno Wilson stumbled upon background noise emanating from space. Collaboration with Robert Dicke resulted in a paper providing evidence for the big bang. Science research relies on cooperation and serendipity. Keywords: big bang theory, universe, scientific, noise, space, relativity, scienceRead MoreThe Science Of Science Or Forensic Science947 Words   |  4 Pagesthe future, and discovering Earth s hidden secrets. There are various categories of science, each with extensive scientific knowledge, and the use of the scientific method. People can only become true scientists after attending college, gaining knowledge about a certain field and it’s previous scientists, learning from them, and implementing the Scientific Method in the work that they do. Foremost, to become a scientist, going to college is a must. A bachelor s degree in natural science or forensicRead MoreThe View Of The Leaning Process771 Words   |  4 Pagespioneering observations that laid the foundation for modern physics and astronomy and ; Albert Einstein was a German-born physicist who developed the general theory of relativity, among other feats. He is considered the most influential physicist of the 20th century. These scientists are the inspiration to my philosophy. The importance of credibility The knowledge base of a person can be corrupted by an outside influential(s) that could hinder the knowledge material transmittable to other(s). ThisRead MoreEssay about Rene Descartes Impact on the Scientific Method923 Words   |  4 Pagesquestion observations the same way as Descartes sets out to, though to a lesser degree. The scientific method holds that a reliable explanation of phenomena can be achieved through experiment, observation, deduction, and prediction (Holiday, Resnick, et al. 8). If either one of these elements, for example observation, seems wrong, all four must be questioned. Such disagreements fuel the progress of science. An example is the proposal of the theory of general relativity by Albert Einstein in 1915.Read MoreThe s Falsification Principle For Demarcating Science From Non Science1906 Words   |  8 Pages16 May 2015 Against Popper’s Falsificationism In the following pages I will argue that Karl Popper’s falsification principle, when used as the criterion for demarcating science from non-science, cannot in all cases establish definitively whether a theory is scientific, and thus at the very least cannot be the sole method of distinguishing science from non-science. My argument is as follows: For any criterion to serve as the principle of demarkation, it must describe how, for any given hypothesis,Read MorePhilosopher Karl Popper And Empirical Falsification929 Words   |  4 Pagesfrom observation, and also his support of empirical falsification, the idea that scientific theories cannot be proven correct, but they can be proven false. In other words, empirical falsification means that theories can and should be closely and thoroughly examined by decisive experiments. In Popper’s view, a claim must be falsifiable, or testable, in order for it to be scientifically true; if a hypothesis cannot be refuted, then it is no t a scientific claim. Untestable ideas and theories withinRead MoreThe Theory of General Relativity and The Expansion of the Universe: Albert Einstein and Edwin Hubble894 Words   |  4 Pagescontroversy over the ultimate fate of the universe. It began in the early 1900’s with Albert Einstein’s theory that General relativity could be used to inform us about the universe which would also inform us on how the universe would end. Russian Physicist, Alexander Friedman, was the first to believe that universe was expanding from initial singularity which is also known as the Big Bang. After Edwin Hubble stated his observation on the universe’s expansion in 1931, the end of the universe has been a

Saturday, December 14, 2019

Literary Response Free Essays

In May, the author tells of his/her chance encounter with a copperhead on the road one night as it lay â€Å"golden under the street lamp,† silent and tense and fearless. Having long wanted to see one, he/she kneels down transfixed, fascinated by its lethal grace, its being unlike the common black and green and garter snakes that evince only shyness; here is a real death striker within arm’s reach. The author remembers not its distinct markings or size or other physical characterstic other than the fact that its head is â€Å"wedge-shaped and fell back to the unexpected slimness of a neck,† its body â€Å"thick, tense and electric. We will write a custom essay sample on Literary Response or any similar topic only for you Order Now † He/she moves a little, catching the creature’s attention; it jerks as if to attack, and he/she jumps back.   The snake flows â€Å"on across the road and down into the dark,† leaving him/her alone to contemplate the woods and the stars. Only a reptile, but what feelings it does evoke! Meeting the copperhead is an exciting experience that leaves one more capable of appreciating life. â€Å"I hope to see everything in this world before I die,† says the author, speaking of a hope that is uniquely human. The poem captures an impression, a feeling, and by so doing prints an image of the poet as well: curious, contemplative, daring, desirous to embark on a quest to discover everything that life has to offer. Almost everyone shares the author’s wish to â€Å"see everything in this world† before he/she dies, like the boy in Van Dyke’s The Blue Flower who, seeing his own burial lot already allotted to him, becomes terribly restless, â€Å"longing to see the world and to taste happiness† before his time comes to sleep beneath the elm tree where his future graveyard lies. Such, to my mind, is the author’s yearning: she is drawn to the copperhead as a moth is drawn to a flame, or a soldier lured to the battlefield, not by dreams of glory and honor, but by some vague notion that a face-to-face confrontation with death would make him better appreciate the joy of living. But why does one have to look for excitement in things as wild, as unpredictable, as deadly as a copperhead? Perhaps, humans are drawn to the snake by the realization that they have a thing in common: a vulnerability without the fang. Remove man’s weapons, and he is but a feeble animal.   Of course, one can learn everything about snakes through books or the Internet or the science lab.   The author, if he/she wants to, can view the copperhead in its glass cage as it sleeps, coiled and undisturbed.   But a snake in the open, especially in one’s yard, always strikes terror. Like the serpent in the garden of Eden, it suggests cunning, mystery, power. Gliding and winding and recoiling, it has a beauty that seduces and mesmerizes. One must see a real snake up close and personal to have a glimpse of the real world. In this regard, â€Å"to see everything† does not simply amount to viewing things through a microscope, or watching a lion in its kingdom in the veldt from the safety of a car. It is akin to courting danger for the love of being scared, to feel one’s blood pulsing upon coming face to face with real-life demons. It is not seeing the world the way a tourist normally does, nor as a nature lover admires butterflies.   Nor is it a foolhardy man’s courtship of danger. The author does not go out of his/her way to meet the snake; it happens by chance. His/her wish â€Å"to see everything in this world† does not necessarily refer to making a solo voyage across the ocean, or free-falling from a cliff, or climbing the Himalayas â€Å"because it’s there.† It is not seeking danger for its sake, but finding comfort in deliverance when real danger comes along. The author’s desire â€Å"to see everything in this world† before dying echoes Thoreau’s self-admonition on his quest, living by himself in the woods, â€Å"to live deep and suck out all the marrow of life . . . to drive life into a corner, and reduce it to its lowest terms† (Walden). May’s author may not have gone to the extent of exploring the earth’s frontiers, at least not that we know of, to see everything in this planet: his/hers is only a hope, perhaps a childish one, for nobody can ever hope to see everything in a multiple of lifetimes. It is a powerful voice, nonetheless, emanating from within, that is always heard above the din of humanity. In a sense,   May is Rubaiyat-like in its simplicity: â€Å"make the most of what we may yet spend,/ Before we too into the Dust Descend.†   Of course, May never tells us to indulge before we die, nor does it preach or call our attention to the plight of endangered species. But it gives an impression of urgency: life is too short to be squandered on trivial pursuits. The author sees the copperhead not in some desert but in an inhabited town, perhaps a city fringed by woods, illumined not by the sun or moon but by a street lamp. Perhaps it is a reminder of our affinity with the wild.   Maybe it is one way of telling us that material comforts and soft living have deprived us of the age-old need to go out and face our monsters. After the copperhead has flown â€Å"across the road and down into the dark,† the author â€Å"stood a while, listening to the small sounds of the woods and looking at the stars.† He/she notes that â€Å"after excitement we are so restful† and that â€Å"when the thumb of fear lifts, we are so alive.† Restfulness and vivacity are the aftermath of excitement and fear. But is it possible to become restful and alive at the same time? Meditative, or thoughtful, would be more apt. One can be brimming with life and excitement even when confined to a sickbed. The encounter with the copperhead heightens the author’s appreciation of nature’s other gifts, such as the small sounds of the woods and a view of the stars. At night, one can hear faint stirrings in the forest as predator and prey make their nocturnal rounds: a squirrel being caught in a coyote’s jaws, a rat being snatched by an owl on the wing. Yet humans do not really know, cannot really comprehend the life-and-death struggles that occur in their midst unless they too assume the role of predator or prey, killer or victim. The former is excited by the fact that it has power over the weak; the latter by the fact that it can outrun, even outwit, its pursuer. Has this not been the lot of all creatures since time began? In meeting the copperhead, the author unexpectedly catches a glimpse of what life really consisted of before civilization. By listening to the woods, one can hear the coming and going of life. By looking at the stars, one can wish life would go on f orever. Every human at some point early in life feels an itch to set out and conquer the world, like the frog in the parable of the well, or like the pioneers in the old West who could not settle down despite the abundance of game and the rich land of the frontier; they always wanted to move on, to find out what lay over the horizon all the way to the Pacific. That is man’s nature, and nothing has stopped him – not if it took all the copperheads in the world – to go and see what there is to find, even if it would only lead to frustration and despair. Every person yearns to find his/her El Dorado. May suggests endless possibilities, once-in-a-lifetime chances, secrets waiting to be discovered, if only we are willing to face them. Day after day we meet common people that do not impress us by their shyness, ordinary people, boring people. The daily routine becomes a blur and before we know it we are old, confined to a wheelchair, unsure of whether or not we had ever lived at all.   But once in a rare while we come across a deadly copperhead. May is all about someone’s feelings after a brush with a poisonous snake. Maybe it is not about crossing the Sahara or climbing Mount Everest after all, but simply a matter of having to confront our own copperheads as we chance upon them in our everyday lives. WORKS CITED Dyke/The_Blue_Flower/ Khayyam, Omar. The Rubaiyat. 31 May 2007.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   http://www.okonlife.com/poems/page2.htm How to cite Literary Response, Essay examples

Friday, December 6, 2019

Budget Project Adopting Automated Workflow â€Myassignmenthelp.Com

Question: Discuss About The Budget Project Adopting Automated Workflow? Answer: Introducation The Pico PCs Manufacturing Company is used for the case study in the following essay. The main business of the company is the development of very small scale microprocessors. The sole requirements of the developments of the micro-chips require the development of 64 gold wires which are very much finer in dimensions as compared to the human hair (Case Study 11 Pico PCs Manufacturing Company, 2017). These have to be soldered in the pins of the microprocessor for their working. Consequences The major consequences of the decisions taken by the CEO are supposed to create a vast impact on the health of the workers. It also includes permanent blindness and eye defects on the workers. Moreover, the decision taken by the CEO for outsourcing their operations to the Pacific islands will also damage the social and physical well-being. This in turn will violate the global health ethics of the World Health Organization (WHO) (World Health Organization, 2017). Analysis of the actions This section discusses about the actions that is being considered and the ethical and legal aspects of them. Issues relating to the ACS Code of Ethics: The Pico PCs Manufacturing Company does not comprehend the ACS Code of Ethics which can be seen from the motives of the CEO. The company has violated the second, third and fifth values in the code of ethics (ACS Code of Ethics, 2017). 1) According to the second value of the code, enhancement of quality life is to be followed by the CEO. This value requires businesses to enhance the quality of the people surrounding the workplace. 2) The third value in the code represents honesty in businesses. As the main considerations of the CEO is to increase the profits made from the Pacific islands, the honesty in business is neglected by the rejection of the health related problems of such actions. 3) The fifth value of the Code of Ethics depicts the professional developments. The company has clearly neglected their own as well as the professional development of the workers. Issues relating to the ACS Code of Professional Conduct: The violation of the various clauses of the Code of Professional Conduct is depicted in this section (ACS Code of Professional Conduct, 2017). The CEO of the company needs to reconsider their thoughts. According to the clause 1.2.1.a, the company has violated the interests of the stakeholders by not thinking about the physical health of the workers in the Pacific islands. In accordance to the clause 1.2.2.b, the company has made a violation in not considering the protection of the workers around them. The clause 1.2.3.c depicts that business must distinguish between the professional and personal choices. This in turn is a violation in the companys activities. With respect to 1.2.4.c, the company has violated this act by not considering the global health standards of the WHO. Lastly, in accordance to the clause 1.2.4.g, business must consider the advices of the professional people. The CEO has clearly violated the expertise solutions of the doctors who have advised regarding the health implications of the project. Recommendations and decisions Mr. Kushlani is advised to not comply with the considerations made by the CEO of the company. Moreover, the company is advised to increase the budget of the project for adopting automated workflow. In addition, the company is also recommended to increase their sales to make up for the expenditures for robotic workforces. References: ACS Code of Ethics. (2017). [ebook] AUSTRALIAN COMPUTER SOCIETY. Available at: https://www.acs.org.au/content/dam/acs/acs-documents/Code-of-Ethics.pdf [Accessed 27 Sep. 2017]. ACS Code of Professional Conduct. (2017). [ebook] Professional Standards Board Australian Computer Society. Available at: https://www.acs.org.au/content/dam/acs/acs-documents/ACS%20Code-of-Professional-Conduct_v2.1.pdf [Accessed 27 Sep. 2017]. Case Study 11 Pico PCs Manufacturing Company. (2017). [ebook] AUSTRALIAN COMPUTER SOCIETY. Available at: https://1712973_871073256_PEAssSetAa%20(1).pdf [Accessed 27 Sep. 2017]. World Health Organization. (2017).Global Health Ethics. [online] Available at: https://www.who.int/ethics/en/ [Accessed 27 Sep. 2017].

Monday, November 25, 2019

Emperor Penguin Facts (Aptenodytes forsteri)

Emperor Penguin Facts (Aptenodytes forsteri) The emperor penguin (Aptenodytes forsteri) is the largest type of penguin. The bird is adapted to living its entire life in the cold of the Antarctic coast. The generic name Aptenodytes means diver without wings in Ancient Greek. Like other penguins, the emperor does have wings, but it cannot fly. Its stiff wings act as flippers to help the bird swim gracefully. Fast Facts: Emperor Penguin Scientific Name: Aptenodytes forsteriCommon Name: Emperor penguinBasic Animal Group: BirdSize: 43-51 inchesWeight: 50-100 poundsLifespan: 20 yearsDiet: CarnivoreHabitat: Antarctic coastPopulation: Fewer than 600,000Conservation Status: Near Threatened Description Adult emperor penguins stand between 43 and 51 inches tall and weigh between 50 and 100 pounds. Weight depends on sex and season. Overall, males weigh more than females, but both males and females lose weight when incubating eggs and raising hatchlings. After the breeding seasons, both sexes weigh around 51 pounds. Males enter the season between 84 and 100 pounds, while females average around 65 pounds. Adults have black dorsal plumage, white feathers under their wings and on their bellies, and yellow ear patches and upper breast feathers. The upper part of the bill is black, while the lower mandible may be orange, pink, or lavender. Adult plumage fades to brown before molting each year in summer. Chicks have black heads, white masks, and gray down. Emperor penguins have bodies streamlined for swimming, flipper-like wings, and black feet. Their tongues are coated with rear-facing barbs that help prevent prey from escaping. Penguin bones are solid rather than hollow to help the birds survive the pressure of deep water. Their hemoglobin and myoglobin help them survive at the low blood oxygen levels associated with diving. On land, emperor penguins either waddle or slide on their bellies. Sian Seabrook, Getty Images Habitat and Distribution Emperor penguins live along the coast of Antarctica between 66Â ° and 77Â ° south latitudes. Colonies live on land, shelf ice, and sea ice. Breeding occurs on pack ice as far as 11 miles offshore. Diet Penguins are carnivores that prey upon fish, crustaceans, and cephalopods. They are social birds that often hunt together. They can dive to 1,500 feet, spend up to 20 minutes underwater, and forage over 300 miles from their colony. Chicks are hunted by Southern giant petrel and south polar skuas. Adults are only preyed upon by leopard seals and orcas. Behavior Penguins live in colonies ranging from 10 to hundreds of birds. When temperatures drop, penguins huddle in a rough circle around juveniles, slowly shuffling around so each adult gets a chance to shelter from the wind and cold. Emperor penguins use vocal calls to identify each other and communicate. Adults can call at two frequencies simultaneously. Chicks modulate the frequency of their whistle to call parents and indicate hunger. Reproduction and Offspring Although sexually mature at three years of age, most emperors dont start breeding until they are four to six years old. In March and April, adults begin courtship and walk 35 to 75 miles inland to nesting areas. The birds take one mate each year. In May or June, the female lays a single greenish-white egg, which weighs about one pound. She passes the egg to male and leaves him for two months to return to the sea to hunt. The male incubates the egg, balancing it on his feet to keep it off the ice. He fasts about 115 days until the egg hatches and his mate returns. For the first week, the male feeds the hatchling crop milk from a special gland in his esophagus. When the female returns, she feeds the chick regurgitated food, while the male leaves to hunt. The parents take turns hunting and feeding the chick. The chicks molt into adult plumage in November. In December and January all of the birds return to the sea to feed. Less than 20% of chicks survive the first year, as a parent must abandon a chick if its mate doesnt return before the guardians energy reserves are depleted. The adult survival rate from year to year is about 95%. The average lifespan of an emperor penguin is around 20 years, but a few birds may live as long as 50 years. Males keep chicks warm by resting them on their feet and snuggling them in an area of feathers called the brood patch.. Sylvain Cordier, Getty Images Conservation Status The IUCN updated the conservation classification status of the emperor penguin from least concern to near threatened in 2012. A 2009 survey estimated the number of emperor penguins to be about 595,000 individuals. The population trend is unknown, but suspected to be decreasing, with a risk of extinction by the year 2100. Emperor penguins are highly sensitive to climate change. Adults die when temperatures rise high enough to reduce sea ice coverage, while low temperatures and and too much sea ice increases chick deaths. Melting sea ice from global warming not only affects the penguin habitat, but also the species food supply. Krill numbers, in particular, fall when sea ice melts. Emperor Penguins and Humans Emperor penguins also face threats from humans. Commercial fishing has reduced food availability and tourism disrupts breeding colonies. Emperor penguins have been kept in captivity since the 1930s, but only successfully bred since the 1980s. In at least one case, an injured emperor penguin was rescued and released back into the wild. Sources BirdLife International 2018. Aptenodytes forsteri. The IUCN Red List of Threatened Species 2018: e.T22697752A132600320. doi:10.2305/IUCN.UK.2018-2.RLTS.T22697752A132600320.enBurnie, D. and D.E. Wilson (Eds.). Animal: The Definitive Visual Guide to the Worlds Wildlife. DK Adult, 2005. ISBN 0-7894-7764-5.Jenouvrier, S.; Caswell, H.; Barbraud, C.; Holland, M.; Str Ve, J.; Weimerskirch, H. Demographic models and IPCC climate projections predict the decline of an emperor penguin population. Proceedings of the National Academy of Sciences. 106 (6): 1844–1847, 2009. doi:10.1073/pnas.0806638106Williams, Tony D. The Penguins. Oxford, England: Oxford University Press, 1995. ISBN 978-0-19-854667-2.Wood, Gerald. The Guinness Book of Animal Facts and Feats. 1983. ISBN 978-0-85112-235-9.

Thursday, November 21, 2019

Security in New Generation Cell Phones Research Paper

Security in New Generation Cell Phones - Research Paper Example Technology in every new generation provides major improvements from the previous generations. In the cellular communications, there was first the 1G and 2G generations. These generations contributed to the provision of the internet for the mobile phones through the 3G dominated the scene. The third generation cell phone internet had advancements that made it stand up from the earlier versions of 1G and 2G. The 3G had the capacity to converge voice and the data with the wireless internet. This makes it suitable for transmitting data in high quantities. Additionally, migration towards the 4G technology has been witnessed. Regardless of these processes and developments, the security of cell phone remains paramount. Ensuring the security of the cell phones The continuity in the manufacturing and distribution of cell phones leads to the rise in the security risks in different ways. Users of electronic gadgets like cell phones should be more concerned about their safety. Lately, electronic devices such as the Apple’s iPhone latest version and the Google’s Android have committed themselves to the manufacturing and development of cell phones with 3G networks so that they possess the same features and functions of computers. Although this promotes great conveniences, it also comes with severe security risks. Both the new and future generations of cell phones require the setting up and update of security software. This software includes firewalls, anti-virus software, operating system patches, anti-spam software, file encryption, and the anti-spyware software. This requires the observance of the basic home computer internet safety and guidelines. The revolution in the field of information technology has enabled most financial institutions to adopt mobile banking technologies to enlarge their customer bases. Cell phones users are required to conduct their business and financial transactions online. As a result, they will need to store their login passwords w ith the information pertaining to their credit card and personal details. With this trend, there will be more cases of online fraud, identity theft, more spam, digital forgery, data theft, and any other cyber crimes. Besides, it can also lead to the denial of disseminated service attack. This has the risk of disabling the network service supplier. Additionally, cell phones are prone to theft based on their portability compared to desktop computers. Since most theft cases occur unexpectedly, a cell phone user can lose a lot of information and data stored in the mobile device. In the event that the mobile device contains business and financial information of the user, the thief can use it to defraud the user of his or her finances. This is a major security concern. Additionally, the new generation cell phones come with applications that display the user’s location and movements. One such application is the opt-in text advertisements that give information on the whereabouts of t he user round the clock. Hacker stalkers can use this information to trail their victims and even do felony acts to them.

Wednesday, November 20, 2019

Folic acid food fortification is associated with a decline in Essay

Folic acid food fortification is associated with a decline in neuroblastoma - Essay Example Neuroblastoma is one of the most common cancers affecting children today, forming 8%-10% of the total seen from birth through age 14 years.   It affects one in every 6,000 to 7,000 children in North America (Nutra ingredients.com, 2003). It is a disease in which cancer cells are found in certain nerve cells within the body. Neuroblastoma typically begins in the abdominal area either in the adrenal gland (located just above the kidney) or around the spinal cord in the neck, chest, or pelvis (Pressinger & Sinclair, N.D.). Studies show that folic acid food fortification has more than halved the incidence in Canada of the deadly childhood cancer neuroblastoma. Chemically Folic acid has the molecular formula C19H19N7O6 with a molecular weight of 441.40. The scientific name of folic acid is N-[p-[2-Amino-4-hydroxy-6-pteridinyl) methyl] amino] benzoyl]-L-glutamic acid. It is a complex organic compound present in liver, yeast, and natural sources; it also may be prepared synthetically (RxList, 2004). Metabolically, folic acid is converted to coenzyme forms required in numerous one-carbon transfer reactions involved in the synthesis, interconversion and modification of nucleotides, amino acids and other essential structural and regulatory compounds (Bailey, et al, 2003). As an essential cofactor for the de novo biosynthesis of purines and thymidylate, folate plays an important role in DNA synthesis, stability and integrity, and repair, aberrations of which have been implicated in colorectal carcinogenesis. Folate may also modulate DNA methylation, which is an important epigenetic determinant in gene expression, maintenance of DNA integrity and stability, chromosomal modifications, and the development of mutations. (Kim, 2004). Daily ingestion of 400  µg of folic acid alone during the preconception period reduced a womans risk of having a fetus or infant with a neural-tube defect. The

Monday, November 18, 2019

Nike Research Paper Example | Topics and Well Written Essays - 500 words - 1

Nike - Research Paper Example In the year 2012, Nike paid Indonesian workers 1 million US dollars after it emerged that the workers had worked an overtime of 600,000hrs for two years without pay (The Guardian, 2012). In the year, 1987, Nike was sued by capitol record for using a beatles song in their advertisement, the paid capitol records $250,000 who had the rights for the song at that time. In late June 2005, a case against Nike by Minor threat of them using their cover photo in their album also led to out of the court settlement where Nike apologized to the band and settled them (Brian, 2002).. Nike like most of the multinational companies has huge stash of profits offshore that it hasn’t paid U.S taxes on. It’s also known that they have paid little or no taxes in these foreign countries. Nike reportedly said that its cache of â€Å"permanently reinvested offshore profits† ballooned from $5.5 billion to $6.7 billion in the past year — this means that the corporation moved up by $1.2 billion of its profits offshore. It also reveals that if it were to pay the U.S taxes on its offshore stash profits, it would be approximately $2.2 billion, which is a tax rate just under 33 percent. The federal income tax is usually known to be 35% deducting any taxes corporations have paid to foreign jurisdictions (CTJ, 2013). With this information it’s easy to reach a conclusion that Nike has paid no tax on its offshore profit stash. Nike has a long list of various offshore subsidiaries others with different names while others bear Nike’s own shoes b rand. In the year 2012, Nike signed a deal with the state of Oregon where its headquarter is based, to enable it pay its current tax for the next 40 years as long as it invests more than 150 million dollars within the state and be able to create 500 jobs within a five-year term (Brian, 2002).. This is a good gesture for Nike by

Saturday, November 16, 2019

Process of Meiosis | Experiment

Process of Meiosis | Experiment In this experiment we observed the process of meiosis by looking at different slides. Meiosis is a process in which a diploid (2n) parent cell is divided into four haploid (n) daughter cells. The daughter cells have half the number of chromosomes as the parent cell. Meiosis mainly occurs in sex cells (gametes) of humans through the process of spermatogenesis (males) or oogenesis (females). It is essential for sexual reproduction, and thus is seen in all eukaryotes that reproduce sexually. Before the cell undergoes meiosis, it first replicates its DNA. Meiosis includes 2 cycles of division- meiosis I and meiosis II. After meiosis I is completed, DNA is not replicated, which leads to the final daughter cells being haploid (n). The first step of meiosis I is prophase I. During prophase I, DNA can be exchanged between homologous chromosomes by tetrads crossing over, a process referred to as recombination. The new combination of DNA provides for genetic variation for the daughter cells. I n addition, in prophase I, the nuclear envelope disintegrates, and the two centrioles move to opposite ends of the cell. In metaphase I, homologous chromosomes are aligned at the metaphase plate (site where the cell will divide) in pairs. The side at which homologous pairs will lineup is random and further improves the chances for genetic variation. The centrioles attach kinetochore microtubules to the chromosomes, so that they can be pulled apart to the different ends as the cell divides. In anaphase I, the microtubules shorten, pulling the pairs of homologous chromosomes apart from one another. In telophase I, the chromosomes arrive at their respective ends and the cell divides to form two haploid cells. The nuclear membrane is reformed, and the microtubules disappear. The chromosomes uncoil back into chromatin. Note, that even though the first meiotic division led to two haploid cells, each chromosome still contains a pair of sister chromatids. Thus, meiosis II begins without DNA replicating beforehand. The steps in meiosis II are very similar to the ones in meiosis I. In prophase II, the nuclear envelope disintegrates, the centrioles move to the opposite end of the pole, the chromosomes condense and prepare for the second division. In metaphase II, the chromosomes again line up randomly at the plate, but this time independently, not in pairs. The spindle network is formed is also formed. In anaphase II, the sister chromatids are pulled apart and move toward the opposite ends of the pole. Lastly, in telophase II, the cells are cleaved and the nuclear envelope reappears. The chromosomes uncoil and the end result is 4 haploid daughter cells. In spermatogenesis, the 4 daughter cells are the spermatids. However, in oogenesis, even though 4 haploid daughter cells are created, 3 are polar bodies, while the last is an ootid (egg), which might be fertilized by a spermatid. During fertilization (when the spermatid and ootid join), the number of chromosomes reverts b ack to 2n (diploid). The random alignment and crossing over are very important to the process of meiosis because they provide for greater genotypic diversity. However, if the chromosomes are not able to separate, several errors can arise. Klinefelter and Turner syndromes are due to nondisjunction, during which there is an extra X chromosome present in males, or missing an X chromosome in females, respectively (Russell, 346-349). We also observed the life cycle of the insect drosophila. We will be experimenting on them in the coming weeks. This insect serves as a great experimental organism in the field of genetics due to its short, unique life cycle, and since Mendels laws of inheritance (law of segregation, law of independent assortment) are clearly visible when they mate. The law of segregation states that when any individual produces gametes, the copies of a gene separate so that each gamete receives only one copy. The law of independent assortment states that alleles of differen t genes assort independently from each other during gamete formation. The purpose of this experiment was to familiarize ourselves with the process of meiosis and the insect drosophila, as we will be working with them in future experiments. We used slides from human testis, rat testis, and chorthippus testis, to compare the process of meiosis in different eukaryotes. I predict that I will be able to see the stages of prophase, metaphase, anaphase and telophase in the slides. Hypothesis: I believe that the process of meiosis will be the same in all three eukaryotes, and I will be able to view the cells differentiating. I should be able to see the different structures of the insects and be able to distinguish male and female drosophilas based on their appearance. I believe that I will be able to witness the different stages of meiosis in the slides. Methods: Obtain the slides and the compound light microscope from the instructor. Place the first slide on the stage of the microscope (the microscope should be on the lowest power- 40x) and use the coarse adjustment knob to focus the slide. Turn to the next highest power (100x), and this time, use only the fine adjustment knob to bring the slide into focus. Turn the microscope to the 400x power, and again focus the slide. Sketch what you see on a separate sheet of paper and label the different structures. Before moving on to the oil immersion power, put a little drop of oil in the middle of the slide. Focus the image under oil immersion and sketch the results once again. After youre done sketching the slide, lower the stage and put the microscope back to the lowest power (CAUTION: be careful not to get oil on the 400x power when turning the objectives as this will ruin the lens). Repeat these steps for the rest of the slides (NOTE: for the drosophila male and female slide, the lowest power, 40x, is good enough to get a good overview). The slides we viewed were: chorthippus testis, generalized animal cell, human chromosome (metaphase state), turtle liver mitochondria, drosophila chromosome, drosophila (male and female), rat testis, and human testis. At the end of the experiment, clean all the slides that have oil on them, wipe the oil immersion lens, and return the materials to the instructor. Results: Questions: 1. What major chromosomal event occurs between leptonema and zygonema? Between leptonema and zygonema, the major chromosomal event that occurs is the pairing of the homologous chromosomes. 2. Do any of the chromosomes at zygonema appear to consist of two parallel parts? How do you account for this appearance? Yes, chromosomes at zygonema appear to consist of two parallel parts, which is probably due to the paired homologues. 3. Consult your textbook for a definition of the term chromomere. Can you detect chromomeres in any of the meiotic cells you are examining? At what substages of prophase I are chromomeres evident? Chromomeres are dark regions of chromatin condensation. Yes, you can detect chromomeres in meitotic cells; they are usually seen in zygonema of prophase I. 4. Do you observe a large, darkly staining structure in the nucleus during leptonema and zygonema? This body represents an already highly condensed (heterochromatic) X chromosome. Can you follow the fate of this chromosome through the rest of the substages of prophase I and metaphase I? Yes, it should be possible to follow the fate of this chromosome through the rest of the substages of prophase I and metaphase I. This X chromosome will not align with the rest of the chromosomes at the metaphase plate and will be near one end of the splitting cell or the other. 5. Briefly list major differences between zygonema and pachynema. At zygonema, the chromosomes are much less condensed than those at pachynema. Crossing over occurs at pachynema. The number of chromosomes can be determined at pachynema, but not at zygonema. 6. Locate cells in diplonema. Can you observe a) the two homologous chromosomes in a pair? b) individual chromatids in a chromosome? c) chiasmata? a) Yes, the homologous chromosomes in pairs are visible. b) Yes, the chromatids are also visible, since the chromosomes at this stage are much coiled. c) Yes, the chiasmata is visible, it is the point where the pair of homologous chromosomes exchange genetic material. 7. Because of the degree of condensation of the chromosomes, diakinesis is an ideal stage at which to determine the chromosome number. Count the chromosomes in a grasshopper cell at diakinesis. Record the number here. Does this represent the diploid number? Justify your answer. Note that sex in grasshoppers is determined by an XO mechanism in which the female is XX, but the male has a single X chromosome. Therefore, the X chromosome that you observe in diakinesis is not a tetrad. What is the significance of this information for determining chromosome number in grasshopper males versus females? Since grasshopper males are missing an X chromosome, to find their diploid number of chromosomes, one would have to count the haploid number (n), double it (2n), but then subtract 1, since it is missing an X chromosome. In females, the subtraction will not be necessary; they will always have double their haploid number of chromosomes (example- if haploid number equals 14 chromosomes, male diploid number will equal (2n-1 = 28-1) 27 chromosomes, while the females will have 28 chromosomes in a diploid cell). 8. Observe several cells in metaphase I. Do you notice a chromosome in an unusual position with respect to the other chromosomes in the cell? What chromosome might this be? Yes, this chromosome could be the X or Y chromosome. 9. Can you find cells in other stages of meiosis or sperm differentiation? If so, briefly describe their appearance and state what stages you think they might be. Yes, it is possible to find other stages of meiosis. In metaphase, the chromosomes are lined up at the metaphase plate. In anaphase, the chromosomes are being pulled apart, and in telophase the cells should be separating via cytokinesis. Conclusion: The process of meiosis is very complicated, but is necessary for sexual reproduction. There are five substages of prophase I in meiosis. Prophase I is the most important stage in meiosis, since this is the stage where crossing over occurs between homologous pairs of chromosomes, which is essential for genetic variation. The first substage is leptonema where chromosomes begin to condense into long strands and begin to look for their homologous pair. In the second substage, zygonema, the chromosomes have found their pairs. The third substage, pachynema, is where crossing over occurs. In addition, the chromosomes are condensed enough so that one can count the number of chromosomes. In the fourth substage, diplonema, portions of the chromosome begin to separate, and the chiasmata (the site where crossing over takes place) is made visible. The last stage, diakenisis, is where the nucleoli disappears, the nuclear membrane disintegrates, and the four tetrads of a pair of homologous chromoso mes are clearly visible (the chromosomes are fully condensed) (Meiosis Prophase I). When looking at the drosophilas, males were easily distinguishable from females. Males were smaller in size compared to the females. The end of the male was more rounded, while the female was pointier. Females had more of a striped pattern on their ends, while males have black as the dominant color. Lastly, males have a sex comb at the joint of each front leg (males also have a penis) (Hammersmith Mertens, 5). In the generalized animal cell, I was able to identify the nucleus and the nuclear envelope. In the human chromosome slide of metaphase, the chromosomes were lined up, which means they were about to be separated. In the human, rat and chorthippus testis, I had a difficult time identifying the different cell types, or cells in different phases of meiosis. Meiosis is an essential process, and if an error occurs, the consequences could be lethal.

Wednesday, November 13, 2019

Anne Sexton : Life into Art :: Literature Poetry Papers

Anne Sexton : Life into Art A story, a story! (Let it go. Let it come.) I was stamped out like a Plymouth fender into this world. First came the crib with its glacial bars. Then dolls and the devotion to their plastic mouths. Then there was school, the little straight rows of chairs, blotting my name over and over, but undersea all the time, a stranger whose elbows wouldn't work. Then there was life with its cruel houses and people who seldom touched - though touch is all- but I grew, like a pig in a trenchcoat I grew, and then there were many strange apparitions, the nagging rain, the sun turning into poison and all of that, saws working through my heart, but I grew, I grew, and God was there like an island I had not rowed to, still ignorant of Him, my arms and my legs worked, and I grew, I grew, I wore rubies and bought tomatoes and now, in my middle age, about nineteen in the head I'd say, I am rowing, I am rowing though the oarlocks stick and are rusty and the sea blinks and rolls like a worried eyeball, but I am rowing, I am rowing, though the wind pushes me back and I know that that island will not be perfect, it will have the flaws of life, the absurdities of the dinner table, but there will be a door and I will open it and I will get rid of the rat inside of me, the gnawing pestilential rat. God will take it was his two hands and embrace it. As the African says: This is my tale which I have told, if it be sweet, if it be not sweet, take somewhere else and let some return to me. This story ends with me still rowing. - "Rowing" by Anne Sexton, from The Awful Rowing Towards God Introduction I chose to start this paper by quoting an entire poem of Anne Sexton's. Why? Because no one told the story of Anne Sexton's life as often or as well as Anne Sexton herself. Over and over she wrote, recounted, and recast her struggles with madness, her love affairs, her joys and griefs in parenting, and her religious quests. For example, "Rowing" touches upon the need for Anne to tell stories about herself, her longing for connection with others, her mental problems, and her searching for God - one could not ask for a better introduction to the world of Anne Sexton. Sexton was a pioneer. As member of the "confessional school" of poetry that arose in America in the early '60s, she helped put an emphasis in American culture on revelation that continues today.

Monday, November 11, 2019

Background Study of the Effect of Study Habit

Background Study of the Effect of Study Habit on the Academic Performances of 3rd Year H. S Students S. Y 2012 – 2013 Study habit is a technique or a strategy used every time a person is studying. Some students would have the same study habit or may have a different one. It depends on whether a specific study habit is effective for them. The stress on good study habits will undoubtedly improved the students’ level of performance. Study habits are important on the part of the students so that it can make use of their time effectively and purposely instead of wasting their time with insufficient study accomplishments.It is a common knowledge that many students fail in studying; even those who work hard often study in ways considered unproductive. Several others are just contented with barely passing grades, never developing their skills and abilities to the highest level attainable. What to study, where to study and how to study are indispensable to every student in class . In fact, proper study habits are the tool for acquiring deeper understanding in different subjects.Good study habits largely influence the level of performance of the student on the subject. In view of this, the researcher proposes to conduct their study on the study habits of students to help the teachers raise the level of performance of their students through the development of proper study habits. The growing number of low performers on the subject point to the need for the redirection and development of students study attitudes and practices in the teaching learning process. The research work is an attempt to address to this need.

Saturday, November 9, 2019

Attacks Used to Hack Email Accounts and Their Preventive Measures Essays

Attacks Used to Hack Email Accounts and Their Preventive Measures Essays Attacks Used to Hack Email Accounts and Their Preventive Measures Essay Attacks Used to Hack Email Accounts and Their Preventive Measures Essay The present-day network threat scenario is unprecedented in both scale and impact. CYBER CRIMINALS has become increasingly confident in their own abilities because of good organization skills and years of experience in evading law enforcement. Armed with sophisticated technical knowledge, a whole bunch of tools and operating systems with exploits, their sole objective today is to cause irreparable damage to the security and business interests of organizations. The biggest brand name between all terrorist groups across the world The Al-Qaeda, Islamic militant group Tehrik-I-Taliban Pakistan and many more terrorist organizations perform cyber terrorism i. e. , disrupt attacks against information systems for the primary purpose of stealing confidential information regarding the nation’s security issues and secondary purpose is creating alarm and panic among the cyber army of the nation. This can include use of information technology to organize and execute attacks against networks, computer systems and telecommunications infrastructures, or for exchanging information or making threats electronically.Therefore there is a huge requirement for each and every one of us to know the minimum preventive measures so as to avoid the exploitation of a hacker as he may use our computer as a shield to hide his identity. Our paper discusses on the types on hackers and the main motto behind these people performing these attacks in an attempt to compromise any computer system. Our paper emphasizes on various methods by which passwords can be stolen and then used for personal purpose. A live performance on how an account can be hacked (say facebook) will be demonstrated by using the phishing attack.All the preventive measures that needs to be taken to overcomes these problems and stay safe from this cyber world attackers will be briefly explained so as to make everyone technically strong and preventing their computers getting exploited†¦ Let’s build a stronger nation†¦. JAI HIND†¦ Vamshi Krishna Gudipati A. K. A h4x0r le610n, 4th year b. tech, COMPUTER SCIENCE AND ENGINEERING, WARANGAL INSTITUTE OF TECHNOLOGY AND SCIENCE. Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.The terms information security, computer security and information assurance are frequently used interchangeably. These fields are interrelated often and share the common goals of protecting the confidentiality, integrity and availability of information; however, there are some subtle differences between them. These differences lie primarily in the approach to the subject, the methodologies used, and the areas of concentration. Information security is concerned with the confidentiality, integrity and availability of data regardless of the form the data may take: electronic, print, or other forms.Computer security can focus on ensuring the availability and correct operation of a computer system without concern for the information stored or processed by the computer. Information assurance focuses on the reasons for assurance that information is protected, and is thus reasoning about information security. Governments, military, corporations , hospitals, and private businesses amass a great deal of confidential information about their employees, customers, products, research, and financial status.Most of this information is now collected, processed and stored on electronic computers and transmitted across networks to other computers. WHAT IS HACKING? Unlike most computer crime / misuse areas which are clear cut in terms of actions and legalities (e. g. software piracy), computer hacking is more difficult to define. Computer hacking always involves some degree of infringement on the privacy of others or damage to computer-based property such as files, web pages or software. The impact of computer hacking varies from simply being simply invasive and annoying to illegal.There is an aura of mystery that surrounds hacking, and a prestige that accompanies being part of a relatively elite group of individuals who possess technological savvy and are willing to take the risks required to become a true hacker. An interesting alternative view of how hackers positively impact areas such as software development and hacker ideology is presented in Technology and Pleasure: Considering Hacking Constructive. WHO IS A HACKER? In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer or computer network.Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge. The subculture that has evolved around hackers is often referred to as the computer underground but it is now an open community. While other uses of the word hacker exist that are not related to computer security, such as referring to someone with an advanced understanding of computers and computer networks, they are rarely used in mainstream context. They are subject to the long standing hacker definition controversy about the true meaning of the term hacker. KINDS OF HACKERS White HatA white hat hacker breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software. The term white hat in Internet slang refers to an ethical hacker. This classification also includes individuals who perform penetration tests and vulnerability assessments within a contractual agreement. The EC-Council, also known as the International Council of Electronic Commerce Consultants, is one of those organizations that have developed certifications, courseware, classes, and online training overing the diverse arena of Ethical Hacking. Black Hat A black hat hacker is a hacker who violates computer security for little reason beyond maliciousness or for personal gain (Moore, 2005). Black hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are the epitome of all that the public fears in a computer criminal Black hat hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network.They choose their targets using a two-pronged process known as the pre-hacking stage. Part 1: Targeting The hacker determines what network to break into during this phase. The target may be of particular interest to the hacker, either politically or personally, or it may be picked at random. Next, they will port scan a network to determine if it is vulnerable to attacks, which is just testing all ports on a host machine for a response. Open ports- those that do respond- will allow a hacker to access the system. Part 2: Research and Information GatheringIt is in this stage that the hacker will visit or contact the target in some way in hopes of finding out vital information that will help them access the system. The main way that hackers get desired results from this stage is from social engineering, which will be explained below. Aside from social engineering, hackers can also use a technique called dumpster diving. Dumpster diving is when a hacker will literally search through users garbage in hopes of finding documents that have been thrown away, which may contain information a hacker can use directly or indirectly, to help them gain access to a network.Part 3: Finishing The Attack This is the stage when the hacker will invade the preliminary target that he/she was planning to attack or steal. Many hackers will be caught after this point, lured in or grabbed by any data also known as a honeypot (a trap set up by computer security personnel). Grey Hat A grey hat hacker is a combination of a Black Hat and a White Hat Hacker. A Grey Hat Hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has been hacked, for example.Then they may offer to repair their system for a small fee. Hacktivists Some hacker activists are motivated by politics or religion, while others may wish to expose wrongdoing, or exact revenge, or simply harass their target for their own entertainment. State Sponsored Hackers Governments around the globe realize that it serves their military objectives to be well positioned online. The saying used to be, He who controls the seas controls the world, and then it was, He who controls the air controls the world. Now it’s all about controlling cyberspace.State sponsored hackers have limitless time and funding to target civilians, corporations, and governments. Spy Hackers Corporations hire hackers to infiltrate the competition and steal trade secrets. They may hack in from the outside or gain employment in order to act as a mole. Spy hackers may use similar tactics as hacktivists, but their only agenda is to serve their client’s goals and get paid. Cyber Terrorists These hackers, generally motivated by religious or political beliefs, attempt to create fear and chaos by disrupting critical infrastructures.Cyber terrorists are by far the most dangerous, with a wide range of skills and goals. Cyber Terrorists ultimate motivation is to spread fear, terror and commit murder. VARIOUS ATTACKS USED BY A HACKER PHISHING Phishing is a way of attempting to acquire information such as usernames,passwords, and credit card details by masquerading as a trustworthy entity in anelectronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public.Phishing is typically carried out by e-mailspoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures. A phishing technique was described in detail in 1987, and the first recorded use of the term phishing was made in 1996.The term is a variant of fishing, probably influenced by phreaking, and alludes to baits used in hopes that the potential victim will bite by clicking a malicious link or opening a malicious attac hment, in which case their financial information and passwords may then be stolen. KEY LOGGING These are software programs designed to work on the target computer’s operating system. From a technical perspective there are five categories: * Hypervisor-based: The keylogger can theoretically reside in a malware hypervisor running underneath the operating system, which remains untouched.It effectively becomes a virtual machine. Blue Pill is a conceptual example. * Kernel-based: This method is difficult both to write and to combat. Such keyloggers reside at the kernel level and are thus difficult to detect, especially for user-mode applications. They are frequently implemented as rootkits that subvert the operating system kernel and gain unauthorized access to the hardware, making them very powerful. A keylogger using this method can act as a keyboard device driver for example, and thus gain access to any information typed on the keyboard as it goes to the operating system. API-b ased: These keyloggers hook keyboard APIs; the operating system then notifies the keylogger each time a key is pressed and the keylogger simply records it. Windows APIs on such as GetAsyncKeyState(), GetForegroundWindow(), etc. are used to poll the state of the keyboard or to subscribe to keyboard events. [1] These types of keyloggers are the easiest to write, but where constant polling of each key is required, they can cause a noticeable increase in CPU usage, and can also miss the occasional key.A more recent example simply polls the BIOS for pre-boot authentication PINs that have not been cleared from memory. * Form grabbing based: Form grabbing-based keyloggers log web form submissions by recording the web browsing onsubmit event functions. This records form data before it is passed over the Internet and bypasses HTTPS encryption. * Packet analyzers: This involves capturing network traffic associated with HTTP POST events to retrieve unencrypted passwords. Remote access software keyloggersThese are local software keyloggers with an added feature that allows access to the locally recorded data from a remote location. Remote communication may be achieved using one of these methods: * Data is uploaded to a website, database or an FTP server. * Data is periodically emailed to a pre-defined email address. * Data is wirelessly transmitted by means of an attached hardware system. * The software enables a remote login to the local machine from the Internet or the local network, for data logs stored on the target machine to be accessed.Related features Software Keyloggers may be augmented with features that capture user information without relying on keyboard key presses as the sole input. Some of these features include: * Clipboard logging. Anything that has been copied to the clipboard can be captured by the program. * Screen logging. Screenshots are taken in order to capture graphics-based information. Applications with screen logging abilities may take screensh ots of the whole screen, just one application or even just around the mouse cursor.They may take these screenshots periodically or in response to user behaviours (for example, when a user has clicked the mouse). A practical application used by some keyloggers with this screen logging ability is to take small screenshots around where a mouse has just clicked; these defeat web-based keyboards (for example, the web-based screen keyboards that are often used by banks) and any web-based on-screen keyboard without screenshot protection. * Programmatically capturing the text in a control. The Microsoft Windows API allows programs to request the text value in some controls.This means that some passwords may be captured, even if they are hidden behind password masks (usually asterisks). * The recording of every program/folder/window opened including a screenshot of each and every website visited, also including a screenshot of each. REMOTE ADMINSTRATIVE TOOL(RAT) A remote administration tool (a RAT) is a piece of software that allows a remote operator to control a system as if he has physical access to that system. While desktop sharing and remote administration have many legal uses, RAT software is usually associated with criminal or malicious activity.Malicious RAT software is typically installed without the victims knowledge, often as payload of a Trojan horse, and will try to hide its operation from the victim and from security software. The operator controls the RAT through a network connection. Such tools provide an operator the following capabilities: * Screen/camera capture or image control * File management (download/upload/execute/etc. ) * Shell control (from command prompt) * Computer control (power off/on/log off if remote feature is supported) * Registry management (query/add/delete/modify) Other software product-specific functions Its primary function is for one computer operator to gain access to remote PCs. One computer will run the client software appl ication, while the other computer(s) operate as the host(s). CLICK-JACKING Clickjacking is possible because seemingly harmless features of HTML web pages can be employed to perform unexpected actions. A clickjacked page tricks a user into performing undesired actions by clicking on a concealed link. On a clickjacked page, the attackers load another page over it in a transparent layer.The users think that they are clicking visible buttons, while they are actually performing actions on the hidden page. The hidden page may be an authentic page, therefore the attackers can trick users into performing actions which the users never intended. There is no way of tracing such actions to the attackers later, as the users would have been genuinely authenticated on the hidden page. Clickjacking is possible because seemingly harmless features of HTML web pages can be employed to perform unexpected actions.A clickjacked page tricks a user into performing undesired actions by clicking on a conceal ed link. On a clickjacked page, the attackers load another page over it in a transparent layer. The users think that they are clicking visible buttons, while they are actually performing actions on the hidden page. The hidden page may be an authentic page, therefore the attackers can trick users into performing actions which the users never intended. There is no way of tracing such actions to the attackers later, as the users would have been genuinely authenticated on the hidden page.Examples A user might receive an email with a link to a video about a news item, but another valid page, say a product page on amazon. com, can be hidden on top or underneath the PLAY button of the news video. The user tries to play the video but actually buys the product from Amazon. Other known exploits include: * tricking users into enabling their webcam and microphone through Flash (which has since been corrected by Adobe); * tricking users into making their social networking profile information pub lic; * making users follow someone on Twitter; share links on Facebook SPAMS Email spam, also known as junk email or unsolicited bulk email (UBE), is a subset of electronic spam involving nearly identical messages sent to numerous recipients by email. Definitions of spam usually include the aspects that email is unsolicited and sent in bulk. One subset of UBE is UCE (unsolicited commercial email). The opposite of spam, email which one wants, is called ham, usually when referring to a messages automated analysis (such as Bayesian filtering). Email spam has steadily grown since the early 1990s.Botnets, networks of virus-infected computers, are used to send about 80% of spam. Since the expense of the spam is borne mostly by the recipient, it is effectively postage due advertising. The legal status of spam varies from one jurisdiction to another. In the United States, spam was declared to be legal by the CAN-SPAM Act of 2003 provided the message adheres to certain specifications. ISPs h ave attempted to recover the cost of spam through lawsuits against spammers, although they have been mostly unsuccessful in collecting damages despite winning in court.Spammers collect email addresses from chatrooms, websites, customer lists, newsgroups, and viruses which harvest users address books, and are sold to other spammers. They also use a practice known as email appending or epending in which they use known information about their target (such as a postal address) to search for the targets email address. According to the Message Anti-Abuse Working Group, the amount of spam email was between 88–92% of email messages sent in the first half of 2010. PREVENTIVE MEASURES TO OVERCOME THE ATTACKS OF HACKERS KEYLOGGERSSCAN THE FILE WITH DR. WEB LINK CHECKERBEFORE DOWNLOADING. SCAN THE FILE WITH ONLINE MULTIPLE ANTI-VIRUS ENGINE IE. , www . novirusthanks org USE ANTI KEYLOGGERS LIKE ZEMANA,KEYSCRAMBERS ETC.. RATS STRICTLY FOLLOW THE INSTRUCTIONS OF THE ANTI-VIRUS.. ALWAYS USE AN UPDATED ANTI-VIRUS. DONT DOWNLOAD ANY FILE FROM AN ANONYMOUS WEBSITE. PHISHING ALWAYS TYPE THE COMPLETE URL OF THE INTENDED WEBPAGE FOR LOGIN. USE ANTI-VIRUS WHICH HAS WEB BROWSER INTERGRATION FACILITY TO COMBAT PHISHING LIKE KASPERSKY ETC.. NEVER LOGIN IN ANY LINK WITHOUT VERIFING ITS AUTHENTICATION. SPAMSome Facebook users were fooled into verifying’ their account. Many Facebook walls were flooded with verify your/my account’ spam messages/wall posts. My advice to all Facebook users. To get rid of FB spams, do not click the link. As simple as that. Clicking the link will just cause you to become one of the spam victims. It will automatically post the same spam messages on different Facebook walls. CONCLUSION * Data Security is the means of ensuring that data is kept safe from corruption and that access to it is suitably controlled. * . The Internet is a scary place.Criminals have the ability to hide behind their computers, or even other people’s computers ,they attempt to break into computer to steal personal information or to use it for their own purposes. * So to protect your Data with a firewall so that you are not an easy target to hackers and viruses in the future * When you leave your house, you lock your doors to prevent robbery, why not use a firewall to put a lock on your computer. AUTHORS: G. VAMSHI KRISHNA A. K. A h4x0r le610n, Computer Science amp; Engineering, 4nd year B. Tech, WARANGAL INSTITUTE OF TECHNOLOGY amp; SCIENCE.

Wednesday, November 6, 2019

Ocean Dumping Essays - Waste, Aquatic Ecology, Marine Debris

Ocean Dumping Essays - Waste, Aquatic Ecology, Marine Debris Ocean Dumping Ocean Dumping The practice of ocean dumping should be banned. Marine pollution is at the heart of interest in todays search for a clean environment. Not only does ocean dumping add to the unsightliness of the once beautiful and pristine waters; it also kills the marine life which inhabits those waters. Pollution on a grand-scale is wreaking havoc on the Earth. The ocean is not an exception. In 1996, a bill, which would ban the dumping of dredge spoils in the Long Island Sound, was submitted in congress by Michael Forbes (Freedman). At that time, Congressman Forbes predicted that all dumping in the United States would end in the foreseeable future. He sees ocean dumping ending in the 21st century (Freeman). Unfortunately, ocean dumping is the least expensive way to dispose of dredged materials and other pollutants (Freeman). Although an uphill battle, ocean dumping should be outlawed altogether. In New York City, proposed building of treatment plants was conceptualized (Murphy). This allowed an alternative to ocean dumping; since ocean court decisions and legislation (Murphy) had banned dumping. The sludge may be transported to other states for use as fertilizer (Murphy). Treatment plants are less of an eyesore than pollutants in the ocean. Unfortunately, no one wants a treatment facility in his back yard. Many miles of beaches have been closed over the years, due to ocean dumping. For communities where beaches are tourist attractions, this causes devastating economic consequences. At one point, medical debris washed ashore (Bauman). Congress passed a law at that time that banned the dumping of sewage into the ocean (Bauman). In 1987, an international agreement was signed and a national law was enacted to prevent ocean dumping (Miller). As late as 1995, ocean dumping continued to remain a serious threat (Miller). Tons of trash continued to pollute the nations beaches. The trash not only threatens marine life; it also threatens the lives of humans (Miller). There was no national plan for managing vessel waste. Enforcement powers for ocean dumping is spread among several agencies. This severely hampered the situation. The Marie Conservation Volunteers scoured more than 95,000 miles of United States coastlines on September 16, 1995 (Miller). More than 140,000 volunteers were involved in this campaign (Miller). In 1994, over 2.8 million pounds of trash were picked up off of lakes, estuaries, and ocean beaches (Miller). This shows that the problem of ocean dumping is not a small one. This is a huge environmental problem. The Environmental Protection Agency should require ocean waste-management plans, in addition to those that have been created for land (Miller). Plastic particles, particularly six-pack rings, are damaging to marine animals. When ingested, plastic is harmful to marine animals. Discarded fishing gear leads to a high mortality rate among birds, fish, turtles, whales, and dolphins (Miller). Unfortunately, humans are also at risk fr om this form of pollution, due to the fact that trash, which surfaces on the beach, can easily be stepped on. This garbage could (and does) contain such contaminates as syringes (Miller). In 1996, a dispute halted the dredging of shipping channels in New York and New Jersey. This allowed silt to pass into the channels and made them too small for large ships. One hundred eighty thousand jobs were threatened, as well as $20 billion in freight business (Bauman). The collapse of ocean fisheries is a major environmental problem. Environmental issues such as ocean dumping are a public concern. Ocean dumping is not only an issue of concern for America. The entire world must take a stand. International cooperation is vital for the preservation of marine life. Environmental concerns are evidenced to shape international treaties. The Montreal Protocol; the UN Summit on the Environment; agreements to the North American Free Trade Agreement (NAFTA) and the World Trade Organization (WTO) attest to this fact (Burnett). There is a commonality in most global problems. This commonality occurs when

Monday, November 4, 2019

Abortion, Right and Wrong Essay Example | Topics and Well Written Essays - 500 words

Abortion, Right and Wrong - Essay Example The wealthy were able to travel abroad or pay high fees to a local doctor willing to perform the procedure, but a poor woman was required to resort to less safe options. Prohibiting abortions does not and has never stopped them from occurring; it just acts to harm women. Those opposed to Roe also argue that if the Constitution does not directly address an issue, then the Congress, not the courts should decide matters such as this which have weighty moral implications. The Roe decision essentially addressed this question by asserting the government’s concern for the life of the unborn does not outweigh the constitutional rights of the born and thus their decision to allow pregnancy terminations. The Court did draw a line distinguishing what is considered murder of a child. On this issue, those that oppose abortion rights do have legal justification for debate. Viability seems to be an appropriate benchmark because in the early weeks following conception, the fetus is not a conscious being although those of religious conviction argue that it does have a soul. Viability is somewhat scientifically determined while the presence of a soul is not. Therefore, the line can only be drawn at the viability of the unborn as any other method by which to de termine when abortions are considered murder is unclear (Dorf, 2003). Those opposed to abortion claim that the fetus, viable or not, is a living being much the same as a child or adult. Mothers who have had abortions certainly cannot believe she is killing a living child or the practice would be a rare procedure. â€Å"I don’t think, in most cases, that the woman who aborts her child, consciously believes she is killing a person. As philosopher Francis Beckwith points out, â€Å"why do women only kill their fetuses when confronted with practical difficulties, rather than their already born children, if they truly believe their fetuses are fully human?† (cited in Smith,

Saturday, November 2, 2019

Planning of Instruction in a Systematic Way Assignment

Planning of Instruction in a Systematic Way - Assignment Example To guide them through the college application process and how the needy students can apply for aid. The supervisors must oversee this guidance and counselling process. After reviewing the learning objectives stated above, I have come to the conclusion that they are sound. This is because I am aiming to achieve specific objectives such as the learner acquiring skills and knowledge in writing college application letters and essays. The first objective, however, sounds a little subjective. After thinking about it critically, I have decided to change it from â€Å"Demonstrate knowledge of high school courses that prepare them for college† to â€Å"List at least five high school courses that prepare them for college.† I have arrived at this conclusion realizing that a learning objective should be measurable. When the students are asked to actually list those specific courses then the supervisors will be able to determine whether or not the learning objectives have been met. A colleague commented that my objectives are too few. Even though I am looking to have a full day’s training, I intend to have breaks in between (it is important that learners get time to have lunch and to interact with one another). In my experience as a teacher, I have learnt that students learn better when they get time to interact and discuss issues taught in class. I will also make a PowerPoint presentation in class. I will also show the students a video in class to further clarify the points presented in class. This is because students learn better when they get a chance to view real-life situations on video. It is important for me to establish whether or not the content taught in the classroom is effective. I would want those admitting these students to college to actually report that the students are able to enrol better after the guidance and counselling sessions. I am of the opinion that the best way to determine whether or not the sessions are successful is by conducting random interviews on campus to establish the level of success of these sessions.  Ã‚  

Thursday, October 31, 2019

Planetary volcanism Essay Example | Topics and Well Written Essays - 500 words

Planetary volcanism - Essay Example Because of very high temperature in the inner core of the earth, the interior material is usually in molten state (Greeley, 2013). When two plates move further apart, the earth’s interior materials progressively rise up and occupy the vents created by plate movement. Magma chambers may also form in cases where plate move over each other. Despite the fact that volcanism on earth usually takes place at boundaries between plates, it can also happen at the hotspots within the plates’ interiors. Very high temperature of the earth’s interior causes materials within the inner part to melt. This molten material is then ejected to the earth’s surface under high pressure. When magma reaches the surface of the earth, it solidifies into thick lava, which eventually forms volcanic rocks. Volcanoes on earth are mainly categorized into two: shield and composite volcanoes (Greeley, 2013). Evidences of volcanism have also been noticed in the Earth’s moon. The moon is characterized by small volcanoes, crevices as well as widespread basalt lava flows (Greeley, 2013). The moon’s large and dark basins, often called the mare, are flows of lava. However, there exist no sign of active volcano on the moon’s surface and all the evidences of volcanoes are archaic. Volcano in the planet moon, occurred millions of years ago and no recent volcanic activity has been observed in the recent past. Mars also has exhibits of volcanism. The planet has volcanic features that are akin to those on Earth, but a bit larger. Mars has shield volcanoes with Olympus Mons (22 kilometers) being the solar system’s tallest volcano. The Tharsis region hosts most volcanoes in Mars (Kusky, 2005). Similar to volcanoes on Earth, the volcanoes in Mars are believed to have formed from materials ejected from the deep and hot interior of the planet. Unlike the Moon, many scientists believe Mars has active volcanoes. Basalt meteorites are perfect

Tuesday, October 29, 2019

How to fix Run On Sentences Essay Example for Free

How to fix Run On Sentences Essay Obligation to make the Correct Assessment Change is a petrifying subject to encounter when in dire situations. The feelings we contract, and the ambient emotions we experience, all intertwine with our day-to-day lives. In the event of an immediate decision, your decision, yourself is then and there obligated to make a verdict that could change the rest of your life. Throughout my lifetime I will have to make many decisions that could possibly change the rest of my life. In the near future I would like to work for a fortune 500 Business as a Chief Financial Officer (CFO). As a CFO I am going to have to make certain financial decisions for the company, that could either put us in the hole, or up in the air on a economic scale. For example the DOW indicator for businesses has a lot to do with the CFO’s job. I will have to make minute-to minute obligations some more important than others. For the corporation I will be morally and legally bound to them and obligated to make the business prosper. If sales and profit are up, along with those buying the stock the company will prosper, and so will my position in the company. So by grasping these few concepts about obligations as workers, we can contribute better to our place of work and therefore we can also sustain a better life-style. As a people if we are not legally and morally bound to our obligations, we have no purpose in the work force. Whether you’re a Chief Financial Officer or an employee that works at McDonalds; you will have to make decisions that are obligated to you if it’s for better or worse. Obligations are decisions are the legal and moral commitments made in order to sustain the value of existence. These choices must be made from time- to –time that will ensure the sustainability of the task or problem at hand.

Sunday, October 27, 2019

Art in the Urban Environment: Case Study Analysis

Art in the Urban Environment: Case Study Analysis Historical Context In the late eighteenth century, the establishment of the museum revolutionised the notion that art had to be exclusive. Paintings and sculptures, objects previously housed in private collections and viewed by a typically bourgeois audience, were propelled into the wider public arena. Although originating as national institutions, as popularity for this new cultural attraction grew, further art museums were required on a regional and local basis and over the centuries this trend culminated in the formation of the contemporary art gallery. The technological revolution of the 1960s, then, brought with it an increase in available leisure time for the general public, spurring a continued and unprecedented growth in the rate at which art galleries were built. Alongside the introduction of modern media techniques, this combination once again succeeded in bringing art to an increasingly large and diverse audience. This progression, however, brought about a fundamental change in the actual production, format and display of the art pieces themselves. Artists and curators alike, were required to respond to the changing perceptions of a broader, multi-cultural and modern day audience. To retain an appeal, more experimental forms of art and methods of display were introduced. Art was no longer restricted to being hung on a wall, mounted on a plinth or designed to suit a neutral backdrop. The role of the spectator no longer had to be purely passive. Over the past fifty years, the practice of art and its reliance on the modern gallery setting, that of the conventional white cube, which seeks to transcend specificity of time and location (Ault, J., 2003, in Dernie, 2006, p.9) has been confronted. One outcome is that we have witnessed emerging practices of art that extend past the architectural confines of the traditional gallery space and into the external urban fabric. Public art in the urban context, in its broadest definition, is not new in concept. As a work of art or design that is created by an artist specifically to be sited in a public space, (The Newport News Public Art Foundation) monuments, memorials and architectural ornamentation are all valid examples. It was again in the 1960s, however, that public art became a discipline in its own right, forming new sub-genres including environmental, land, site-specific, community-based and street art. By testing ideas of display through actively engaging the public in a more natural environment, art has formed a much greater part in everyday life. That is not to say, that public art need be mutually exclusive of the contemporary art gallery. Historically art forms more closely linked to areas of everyday life have been marginalized by the art establishments as lacking aesthetic quality. (Gastil, 1997, p.85) With its gradual acceptance as a compelling art form, however, there are now many examples where an exhibition of public art, has been divided between both the urban environment and the interior gallery setting. In some cases, the works of art in the urban context, are physically linked to a gallery or merely act as an extension to the main internal exhibition. In other examples, the gallery takes a lesser role, providing a framework of background knowledge, acting as an interpretive voice or a financial benefactor for a display primarily located elsewhere. The internal and external events may run in parallel, or the gallery exhibition may precede or follow the external display by a few days, weeks or even years. Public Art in the 21st Century In the first decade of the 21st century, there is a greater demand for art in the urban context, but the popularity and proliferation of this public art, has in turn, led to the danger of it becoming generic/gentrified and having a lesser impact. Now no longer a novel concept, artists in their desire to attract an audience, once again have to strive much harder. In the urban environment, unlike the contained gallery setting, there is not always an expectant observer, here there is a much larger audience that simply happens upon the scene/location and they need to be engaged if the work is to be received successfully. Works of contemporary art in public spaces are encountered by diverse publics who have, to a large extent, no contact with art in galleries, though they may be adept at reading the codes of mass culture. (Gastil, 1997, p.14) More problematically, art in general, also needs to compete with a vigorous leisure industry and an overly cinematic modern world. The built environment has become increasingly globalised and homogenous. As a society already bombarded with spectacular imagery and simulated environments (Dernie, 2006, p.14) through the daily onslaught of visual stimulation, (advertisements, graphics and digital media) we also require added stimulation of our other senses, to engage with our surroundings and create a rich, memorable experience. Within the contemporary art gallery it is apparent what is now fundamental to contemporary exhibition design is the creation of an experience that is engaging, multi-sensorial and rewarding. (ibid., p.13) This experience relies on a mixture of digital technology, graphical design, sound, performance and virtual reality, to build up the blank canvas of the internal space and create an immersive environment. In contrast, back within the external context, this diverse layering of attributes is a pre-defined condition. The built environment provides the experience, the context, sights, sounds, and smells that are only ever fabricated within the purpose built gallery. Naturally occurring phenomena, the layering of human activity and habitation, social, economic and political factors, environmental factors, historical and cultural backgrounds, all combine organically to form a stimulating environment. It is interesting therefore that, often, it is the everyday environment that is overlooked. Many people appear so oblivious to their surroundings, or so insulated from the incursions of modern life, that they really do need someone to stand in front of them, signaling wildly, before they raise their eyes and look up. (Searle, 2007) In the current climate, it is evident that for public art to succeed in such a hostile environment, it needs to have either an impact or a resonance, to make a lasting impression. Exploration through Example To look at how some artists have tackled this idea, this paper focuses on three specific projects of external public art, that not only note-worthy for their innovative approach, have also have risen to the challenges of a modern society, and are projects that deliberately provoke exploration of public spaces eliciting fresh thinking about familiar sites and contexts. (Gastil, 2004, p.99) These are projects that due either to their scale, spontaneity or purpose, could not have occurred within the confines of an art gallery. It is important to note, however, each case study did have a direct link with the conventional gallery setting, showing an interesting interdependence. This relationship can be seen to differ between the examples, dependent on the requirements of the specific project. In examining the three case studies, I intend to explore more specifically the differing methods employed by the artists to engage the viewer; the context of urban art and how it affects its purpose, meaning, and value, and whether the relationship these projects had with conventional art gallery, strengthened the work itself. Gormley The first project, Event Horizon, was a large-scale sculpture project by Antony Gormley, centered around the Hayward Gallery on the south bank of the Thames in 2007. As one of Londons most ambitious public art commissions, 31 life size replicas of the artists naked body were scattered within a two kilometer proximity of this central London site. 4 of these 31 statues were made from cast iron and located at street level. By temporarily placing them in the direct pathway of the public, tangibly interrupting the course of daily life, (www.antonygormley.com, 2009), the artist orchestrated an engagement through a series of confrontations. The unsuspecting passer-by was challenged to make a decision. Whether tourist, resident or daily commuter, the passer-by was forced to choose either to walk by head down, to pause to take in the sight, or to stop and reach out to touch this alien figure. The remaining 27 figures, were alternatively placed overhead, on the rooftops of prominent buildings. The unexpected sighting of a human silhouette inhabiting the skyline, evoked intrigue and astonishment (and in some more controversial instances, a phone call to the emergency services). In either encounter, the installation achieved its preliminary goal in forming an initial dialogue between itself and the passer-by. Despite being extended over this two kilometer site, the considered placement of the statues, ensured that more than one would always be apparent in the peripheral vision of the spectator, widening the scale of the work. Whilst some were clearly visible and others a mere speck on the horizon, there became an ambiguity to how many more of these figures there were placed around the city. The work connects the palpable, perceptual and conceptual, and implicates the viewer in a field condition. (www.antonygormley.com, 2009) Through an implied interrelationship between the figures and their various locations, the existing built environment became the larger stage on which the display was set. The spectator was distanced from the works on the horizon, but the implication was that they themselves, by standing within this stage, could also be an additional figure in the landscape. At street level, the contrasting proximity of the statues further increased this active participation of the spectator / passer-by, by permitting closer examination. The tactile quality and scale of the figures, their material response to environmental factors such as the appearance of rust and the shadows cast from them by the sun, could all be observed and assessed first hand, making the project more memorable. By integrating this temporary installation into the familiar urban landscape, Gormley does not only try to encourage the spectator to look at the individual statues, but to look afresh at their surroundings. In this case the eye is drawn to aspects of the skyline that are frequently overlooked and spectators are encouraged to consider their relationship as individuals to the city and other inhabitants. Event Horizon gives one a terrific sense of the citys scale, of the relative size of the human in relation to the architecture, of the distances and proximities of the citys jumbled elevations. (Searle, 2007) Event Horizon ran in parallel with an exhibition of Gormleys earlier sculptures, prints, drawings and photographs, located within the Hayward Gallery itself. These works were seminal in their own right, but the curiosity developed by placing the figures within the urban context, encouraged a far larger number of visitors to the exhibition. Each of the 31 external statues had been rotated to face the external viewing balcony of the Hayward making this the focal point of attraction. Visitors flooded into the gallery to this observation deck, to stand and look back out at the city. Deliberately no figures were placed on the balcony itself, in a reversal of the normal relationship between viewer and art object, (Gormley in Vidler, 2007, p.47) those observing from the gallery, were encouraged to watch the array of interactions with the art in the street. Once in the gallery setting, visitors could then observe similar statues within a different context. The gallery provided an alternative insight to the work, and ultimately this relationship further enhanced the overall experience. Christo and Jeanne-Claude The highly publicised installation Wrapped Reichstag, by Christo and Jeanne-Claude provides the second case study. In 1995 The Reichstag in Berlin, a symbol of democracy for Germany, was wrapped for 14 days in 100,000 square meters of thick woven polypropylene fabric. A steel framework was temporarily installed to the facades and roof of the building, altering the original proportions and allowing the fabric to cascade to the ground. First conceived in 1971, it took 24 years of public forums, parliamentary debates, press conferences and design trials, before approval for the project was granted and as such the considerable activity that preceded the wrapping, became as much a part of the work as the actual installation. As a building of huge historical significance, the image of The Reichstag was a familiar one and therefore the initial encounter of the viewer to the installation tended to be one of awe. Both spectacular in scale and drama, this display showcased how projects could be strengthened by their interaction with the outside world. The draped fabric took on a dynamic quality by being free to ripple in the wind, whilst the aluminum coating reflected the sun during the day and became muted in the evening. Even the sheer amount of people who went to see the transformation, provided a spectacle in itself. By being deliberately temporary, the work was enhanced in intensity and value. Described as a revelation through concealment, (Bourdon, 1971) by transforming the appearance it drew on peoples memory to remember the original proportions, the materiality and the solidarity of the building hidden beneath. When the installation was then dismantled and the site returned to its original state, this too provoked a further re-evaluation that continued long after the project was dismantled. In 1995, it was seen by five million people and has retained its power through documentation and memory long after it was removed. (Gastil, 1997, p.102) In this instance the relationship of the gallery was based around two parts. Prior to the two-week installation, the role of the galley was one of promotion. Due to the sheer logistics of wrapping such a significant icon of German history, drawings, collages and scale models were, over a period of years, displayed within a multitude of galleries. Beginning at the Annely Juda Gallery in London and then moving to galleries in Cologne and finally Berlin, the artists sought an international awareness of the project, to raise both the public support and the finances required to undertake the task. After the event, photographs taken during the installation, were then exhibited alongside the original drawings as a record of the event. The wrapping of The Reichstag also raised several political and historical issues, which were again documented within these further exhibitions, to expand the background knowledge of the visitor. The spectacle was executed within the urban environment, but for those who perhaps could not attend, those that had heard about the event only afterwards through the media, or those that simply wanted to learn more, the contemporary art gallery provided this forum and subsequently extended the life of the installation. Slinkachu The third example is far subtler in nature. Produced by artist Slinkachu in 2006, a series of one-inch mini-installations were created for, and placed in, the streets of London. In modifying small, shop bought plastic figurines and placing them within a real urban context, Slinkachu curated everyday human scenarios, in miniature, whether it be reading the newspaper, shopping, sight-seeing or engaged in more criminal activities. Unlike the two previous examples, the art works of Slinkachu, did not rely on being at odds with their urban surroundings. Left to be discovered by passers-by, the orchestrated scenes invited exploration through curiosity and intrigue. Like Gormleys statues, these miniature figures were designed to engage the audience emotively through personal resonance. Even when you know they are just hand-painted figurines, you cant help but feel that their plights convey something of our own fears about being lost and vulnerable. (The Times, 2006) In the urban context, by the very nature of the size of the installation, even the trained eye could pass over the work unnoticed and the pieces were only likely to attract the attention of a very small number of people. To ensure the engagement of a wider audience, Slinkachu captured these interventions through photographic images that appeared, in tandem, on advertisement boards throughout the city. For each miniature scene, photographs were taken from distances both far away and up close, yet the advertisement boards showed only one image of the set, deliberately puzzling the passer-by and encouraging a second glance. In the wider scene it was not immediately obvious where the work was, whilst at the macro scale, the figurines appeared to adopt human proportions. The artist also relied on the traditional gallery space to provide an interpretive voice. Exhibiting at the Cosh Gallery, the two photographs of each installation could be placed adjacent to one another alongside recreated scenes of the original context, revealing the distortion of scale, to the viewer, in a witty manner. The gallery in this instance provided recognition of the artist and of his installations that outside of the gallery setting, were not necessarily obvious as a pieces of art. If the audience had been unsuccessful in finding the installations in the urban environment or, alternatively once engaged, simply wanted to learn more, the gallery provided a space to summarise the events that occurred externally. In a reversal of roles, for some the gallery even became the starting point. On noting the separate scenarios and their locations within the city, visitors would often be encouraged to then go back outside and search for the work, which by then however, may have been washed away by rain, discarded as rubbish or rescued as a treasure. Conclusion Whilst each individual will observe or experience a situation differently, dependent on their own preconceptions, by engineering encounters, storylines and multi-sensorial experiences, in each case study, the artists have been successful in encouraging an audience to raise their eyes and look up (Searle, 2007) from their everyday lives. As demonstrated, if works of art can evoke an emotive response from the spectator, such as shock, awe, curiosity or empathy, it can contribute to a lasting impression. Also by being temporary in nature there is an element of spontaneity to these places and events that is memorable. One doesnt actually expect the experience you arrive at. (Gastil, 1997, p.18) In the example of Event Horizon, even the most unsuspecting of passers-by, can become active participants in the drama unfolding around them. It is evident that each case study also became strengthened by the richness of its surrounding location. By being placed alongside attributes identifiable in everyday life, the spectator could draw upon a deeper social and cultural framework, to form their own opinion of the art. In turn, as new interventions within familiar landscapes, these projects heightened the awareness of the spectator and encouraged them, even if only subliminally, to reassess the urban environment around them. The value of urban art is therefore, not judged solely on its own intrinsic merits as an individual piece or installation, but instead its value is in the dialogue it can generate between itself, the spectator and the surrounding context. The purpose of this paper is not to suggest that displays in the urban environment are ever likely to replace or take precedence over those in the typical gallery space, but that by being more experimental in nature, they act as a catalyst to test the perceptions of a developing audience. For many of us the designed air of the modern art gallery or museum still represents a kind of elitism, (Dernie, 2006, p.9) Alternatively the unpredictable and unregulated external environment, offers familiarity, an opportunity for spontaneity, and a larger stage on which to exhibit. Urban installations bring works of art to a mass audience; to those who may not be actively seeking it, but might well become engaged by it and find enjoyment from it. They can motivate people to seek further understanding in entering a gallery they would perhaps not visit otherwise. The contemporary art gallery in linking with these urban installations has adapted and taken on a new supporting role, providing a level of education, a longer lasting memory, financial incentives, recognition and ultimately a voice between the artist and general public. The advantage of combining these two environments, as indicated in the three case studies, is that this relationship can be of mutual benefit, it can provide added value and impact and prove fruitful in engaging a wider diverse audience, or as in the case of Slinkachu, even lead to a cult following. Related bibliography Books: Baal-Teshuva, J. (2001), Christo and Jeanne-Claude, Taschen Bourdon, D. (1971), Christo, Harry N. Abrams Publishers, New York Chernow, B. (2000), Christo and Jeanne-Claude A Biography, St Martins Press, New York Dernie, D. (2006), Exhibition Design, Laurence King, London Gastil, W., Ryan, Z. (2004), Open: New Designs for Public Space, Princeton Architectural Press Holl, S. (2007), Questions of Perception: Phenomenology of Architecture (2nd Edition), William K Stout Publishers Lynch, K. (1972), What Time is This Place, MIT Press, Cambridge, MA Miles, M. (1997), Art, Space and the City: Public Art and Urban Futures, Routledge ODoherty, B. (2000), Inside the White Cube: The Ideology of the Gallery Space, University of California Press, California Pallasmaa, J. (2005) The Eyes of the Skin: Architecture and the Senses (2nd Edition), John Wiley Sons Psarra, S. (2009), Architecture and Narrative: The formation of space and cultural meaning, Routledge, Oxford Self, W. (2008), Little People in the City: The street art of Slinkachu, Boxtree, Oxford Vidler, A., Stewart, S. and Mitchell, W. (2007), Anthony Gormley Blind Light, Hayward Gallery Publishing, London Zardini, M. (2005) Sense of the City: An Alternative Approach to Urbanism, Lars Muller Publishers, Toronto Press Articles: Searle, A., (2007), Antonys Army, The Guardian, May 15th Websites: (Accessed 04/01/10) The Newport News Public Art Foundation, What is Public Art, Available from: (Accessed 03/01/10) The Times, (2006), The Blog of the Week, October 28th, Available from: (Accessed 29/12/09) Picture Credits: Photograph by Miller, D. (2005) The White Cube Gallery, Available from: Photograph by Hopper, D. (1967) Fluids by Allan Kaprow, Los Angeles, Available from: Running Fence by Christo and Jeanne-Claude, California, (1972) in Baal-Teshuva, J. (2001), Christo and Jeanne-Claude, Taschen Photograph by Aschkenas, D. (1985) Tilted Arc by Richard Serra, Available from: Famous advertisement boards on Piccadilly Circus, London, (2005) Available from: Interactive Displays, London Underground, (2007) Available from: Nikon Interactive Lightbox, Subway Station Seoul, (2009) Available from: Photograph by White, S. (2007) Event Horizon, in Vidler, A., Stewart, S. and Mitchell, W. (2007) Anthony Gormley Blind Light, Hayward Gallery Publishing, London Event Horizon (2007) Available from: Photograph by White, S. (2007) Event Horizon, in Vidler, A., Stewart, S. and Mitchell, W. (2007) Anthony Gormley Blind Light, Hayward Gallery Publishing, London Photograph by Harrison, C. (2007) Event Horizon By Antony Gormle ­Ã‚ ­Ã‚ ­Ã‚ ­y, Waterloo Bridge, London, Available from: Wrapped Reichstag (1995) in Baal-Teshuva, J. (2001), Christo and Jeanne-Claude, Taschen Photograph by Manzanares, R. (2009) Christo and Jeanne-Claude with a model of Wrapped Reichstag, Available from: Preliminary Drawings, Wrapped Reichstag in Baal-Teshuva, J. (2001), Christo and Jeanne-Claude, Taschen Photograph by Hecht, H. (1995) Wrapped Reichstag, Available from: Photograph by Hecht, H. (1995) Wrapped Reichstag at Night, Available from: Slinkachu, (2008) Ground Zero Solo Show, Cosh Gallery, London, Available from:> Slinkachu, (2008) Ground Zero Solo Show, Cosh Gallery, London, Available from: Slinkachu, (2007) I Cant Actually Graffiti, Festival Hall, London, Available from: Slinkachu, (2007) I Cant Actually Graffiti, Festival Hall, London, Available from: Slinkachu, (2009) Small Victory, Billingsgate, London, Available from: Slinkachu, (2009) Small Victory, Billingsgate, London, Available from: