Saturday, November 9, 2019
Itt221 Week 1 Research Assignment Part 1
Research Assignment, Part One Brandon Kelly IT221 ââ¬â E-2 Fall 2011 Instructor: Stephen Todd 12-17-2011 Question 1 ââ¬â Why does Windows Server 2008 come in different versions? What is the significance of each version? Most editions of Windows Server 2008 are available in x86-64 and IA-32 versions. Windows Server 2008 for Itanium-based Systems supports IA-64 processors. Microsoft has optimized the IA-64 version for high-workload scenarios like database servers and Line of Business (LOB) applications. As such it is not optimized for use as a file server or media server. Microsoft has announced that Windows Server 2008 is the last 32-bit Windows server operating system. Windows Server 2008 is available in the editions listed below, similar to Windows Server 2003. â⬠¢ Windows Server 2008 Standard (IA-32 and x86-64) Windows Server 2008 Standard is one of Microsoft's entry level server offerings (alongside Windows Web Server 2008) and is one of the least expensive of the various editions available. Both 32-bit and 64-bit versions are available, and in terms of hardware Standard Edition supports up to 4GB of RAM and 4 processors. Windows Server 2008 is primarily targeted and small and mid-sized businesses (SMBs) and is ideal for providing domain, web, DNS, remote access, print, file and application services. Support for clustering, however, is notably absent from this edition. An upgrade path to Windows Server 2008 Standard is available from Windows 2000 Server and Windows Server 2003 Standard Edition. â⬠¢ Windows Server 2008 Enterprise (IA-32 and x86-64) Windows Server 2008 Enterprise Edition provides greater functionality and scalability than the Standard Edition. As with Standard Edition both 32-bit and 64-bit versions are available. Enhancements include support for as many as 8 processors and up to 64GB of RAM on 32-bit systems and 2TB of RAM on 64-bit systems. Additional features of the Enterprise edition include support for clusters of up to 8 nodes and Active Directory Federated Services (AD FS). Windows Server 2000, Windows 2000 Advanced Server, Windows Server 2003 Standard Edition and Windows Server 2003 Enterprise Edition may all be upgraded to Windows Server 2008 Enterprise Edition. â⬠¢ Windows Server 2008 Datacenter (IA-32 and x86-64) The Datacenter edition represents the top end of the Windows Server 2008 product range and is targeted at mission critical enterprises requiring stability and high uptime levels. Windows Server 2008 Datacenter edition is tied closely to the underlying hardware through the implementation of custom Hardware Abstraction Layers (HAL). As such, it is currently only possible to obtain Datacenter edition as part of a hardware purchase. As with other versions, the Datacenter edition is available in 32-bit and 64-bit versions and supports 64GB of RAM on 32-bit systems and up to 2TB of RAM on 64-bit systems. In addition, this edition supports a minimum of 8 processors up to a maximum of 64. Upgrade paths to Windows Server 2008 Datacenter Edition are available from the Datacenter editions of Windows 2000 and 2003. â⬠¢ Windows HPC Server 2008 (Codenamed ââ¬Å"Socratesâ⬠) (replacing Windows Compute Cluster Server 2003) Windows HPC Server 2008 R2, the Microsoft third-generation HPC solution, provides a comprehensive and cost-effective solution for harnessing the power of high-performance computing. Out-of-the-box, world-class performance, and scalability enable organizations of all sizes to rapidly deploy solutions ranging from personal HPC workstations to large clusters spanning thousands of nodes. Customers can lower both their operating and capital costs. Windows HPC Server 2008 R2 integrates easily with existing IT infrastructure to enable end users to access HPC resources using familiar Windows-based technologies. With a tightly integrated set of dedicated cluster and parallel development tools, anchored around Visual Studio 2010, developers can build robust and scalable HPC applications easily and quickly. Windows HPC Server 2008 R2 is complemented by a rich ecosystem of SI, ISV, and OEM partners to ensure that customers have access to the applications of their choice and the resources required to successfully run them. â⬠¢ Windows Web Server 2008 (IA-32 and x86-64) Windows Web Server 2008 is essentially a version of Windows Server 2008 designed primarily for the purpose of providing web services. It includes Internet Information Services (IIS) 7. 0 along with associated services such as Simple Mail Transfer Protocol (SMTP) and Telnet. It is available in 32-bit and 64-bit versions and supports up to 4 processors. RAM is limited to 4GB and 32GB on 32-bit and 64-bit systems respectively. Windows Web Server 2008 lacks many of the features present in other editions such as clustering, BitLocker drive encryption, multipath I/O, Windows Internet Naming Service (WINS), Removable Storage Management and SAN Management â⬠¢ Windows Storage Server 2008 (Codenamed ââ¬Å"Magniâ⬠) (IA-32 and x86-64) Minimal information found. â⬠¢ Windows Small Business Server 2008 (Codenamed ââ¬Å"Cougarâ⬠) (x86-64) for small businesses Minimal information found. Windows Server 2008 for Itanium-based Systems Windows Server 2008 R2 for Itanium-Based Systems delivers an enterprise-class platform for deploying business-critical applications. Scale database, line-of-business, and custom applications to meet growing business needs. Windows Server 2008 R2, SQL Server 2008 R2 and the current 2010 line-up of our Developer Tools, plus associated . NET frameworks, will be the last iterations in each product line t o support the Intel Itanium processor and associated OEM server platforms. Windows Server 2008 Foundation (Codenamed ââ¬Å"Limaâ⬠) Windows Server 2008 R2 Foundation is a cost-effective, entry-level technology foundation targeted at small business owners and IT generalists supporting small businesses. Foundation is an inexpensive, easy-to-deploy, proven, and reliable technology that provides organizations with the foundation to run the most prevalent business applications as well as share information and resources. Server Core is available in the Web, Standard, Enterprise and Datacenter editions. It is not available in the Itanium edition. Server Core is simply an alternate installation option supported by some of the editions, and not a separate edition by itself. Each architecture has a separate installation DVD. The 32-bit version of Windows Server 2008 Standard Edition is available to verified students for free through Microsoft's DreamSpark program. Question 2 ââ¬â What are the new features or enhancements made to Windows Server 2008? How is Windows Server 2008 different from Windows Server 2003? Core OS improvements â⬠¢ Fully multi-componentized operating system. â⬠¢ Improved hot patching, a feature that allows non-kernel patches to occur without the need for a reboot. Support for being booted from Extensible Firmware Interface (EFI)-compliant firmware on x86-64 systems. â⬠¢ Dynamic Hardware Partitioning o Support for the hot-addition or replacement of processors and memory, on capable hardware. Active Directory improvements â⬠¢ Read-only domain controllers (RODCs) in Active Directory, intende d for use in branch office or other scenarios where a domain controller may reside in a low physical security environment. The RODC holds a non-writeable copy of Active Directory, and redirects all write attempts to a Full Domain Controller. It replicates all accounts except sensitive ones. citation needed][clarification needed] In RODC mode, credentials are not cached by default. Moreover, only the replication partner of the RODC needs to run Windows Server 2008. [clarification needed] Also, local administrators can log on to the machine to perform maintenance tasks without requiring administrative rights on the domain. â⬠¢ Restartable Active Directory allows ADDS to be stopped and restarted from the Management Console or the command-line without rebooting the domain controller. This reduces downtime for offline operations and reduces overall DC servicing requirements with Server Core. ADDS is implemented as a Domain Controller Service in Windows Server 2008. Policy related improvements â⬠¢ All of the Group Policy improvements from Windows Vista are included. Group Policy Management Console (GPMC) is built-in. The Group Policy objects are indexed for search and can be commented on. â⬠¢ Policy-based networking with Network Access Protection, improved branch management and enhanced end user collaboration. Policies can be created to ensure greater Quality of Service for certain applications or services that require prioritization of network bandwidth between client and server. Granular password settings within a single domain ââ¬â ability to implement different password policies for administrative accounts on a ââ¬Å"groupâ⬠and ââ¬Å"userâ⬠basis, instead of a single set of password settings to the whole domain. Disk management and file storage improvements â⬠¢ The ability to resize hard disk partitions without stopping the server, even th e system partition. This applies only to simple and spanned volumes, not to striped volumes. â⬠¢ Shadow Copy based block-level backup which supports optical media, network shares and Windows Recovery Environment. DFS enhancements ââ¬â SYSVOL on DFS-R, Read-only Folder Replication Member. There is also support for domain-based DFS namespaces that exceed the previous size recommendation of 5,000 folders with targets in a namespace. â⬠¢ Several improvements to Failover Clustering (High-availability clusters). â⬠¢ Internet Storage Naming Server (iSNS) enables central registration, deregistration and queries for iSCSI hard drives. Protocol and cryptography improvements â⬠¢ Support for 128- and 256-bit AES encryption for the Kerberos authentication protocol. New cryptography (CNG) API which supports elliptic curve cryptography and improved certificate management. â⬠¢ Secure Socket Tunneling Protocol, a new Microsoft proprietary VPN protocol. â⬠¢ AuthIP, a Micro soft proprietary extension of the IKE cryptographic protocol used in IPsec VPN networks. â⬠¢ Server Message Block 2. 0 protocol in the new TCP/IP stack provides a number of communication enhancements, including greater performance when connecting to file shares over high-latency links and better security through the use of mutual authentication and message signing. Miscellaneous improvements Windows Deployment Services replacing Automated Deployment Services and Remote Installation Services. Windows Deployment Services (WDS) support an enhanced multicast feature when deploying operating system images. â⬠¢ Internet Information Services 7 ââ¬â Increased security, Robocopy deployment, improved diagnostic tools, delegated administration. â⬠¢ Windows Internal Database, a variant of SQL Server Express 2005, which serves as a common storage back-end for several other components such as Windows System Resource Manager, Windows SharePoint Services and Windows Server Update Se rvices. It is not intended to be used by third-party applications. â⬠¢ An optional ââ¬Å"Desktop Experienceâ⬠component provides the same Windows Aero user interface as Windows Vista, both for local users, as well as remote users connecting through Remote Desktop. Question 3 ââ¬â Why is 64-bit architecture an advantage? Advantages of 64-bit hardware and software Memory addressability Physical memory A 32-bit system architecture can directly address only a 4-GB address space. A 64-bit system architecture that is running a 64-bit edition of Windows Server can support up to 1,024 GB of both physical and addressable memory. Virtual memory The 64-bit editions of Windows Server can address 16 terabytes of virtual memory by using a flat addressing model. Virtual memory is divided equally between virtual address space for applications and the operating system. Even 32-bit applications can benefit from increased virtual memory address space when they are running in a 64-bit environment. For example, although a 32-bit application is still restricted to 4 GB of virtual memory, it no longer has to share that memory space with the operating system. As a result, it receives an effective increase in available virtual memory. Continuous memory Poor performance in 32-bit systems is often not the result of a lack of available memory, but the unavailability of large enough blocks of continuous memory. In a typical Windows SharePoint Services 3. 0 deployment, Windows, Internet Information Services (IIS), common language runtime (CLR), ASP. NET, SharePoint Products and Technologies, SSPs, and MDACs can all claim a portion of a serverââ¬â¢s available virtual memory and can leave a 32-bit address space quite fragmented. When the CLR or SharePoint services request new memory blocks, it can be difficult to find a 64-MB segment in the crowded 32-bit address space. A 64-bit system offers practically unlimited address space for user mode processes. Better parallel processing A server that is using 32-bit architecture is limited to 32 CPUs. Improvements in parallel processing and bus architectures enable 64-bit environments to support as many as 64 processors and provide almost linear scalability with each additional processor. Faster bus architecture A 64-bit architecture provides more and wider general-purpose registers, which contribute to greater overall application speed. When there are more registers, there is less need to write persistent data to memory and then have to read it back just a few instructions later. Function calls are also faster in a 64-bit environment because as many as four arguments at a time can be passed in registers to a function. More secure The 64-bit editions of Windows Server offer the following enhanced security features: Buffer overflow protection A buffer overflow occurs when a data buffer is congested with more data than it is designed to handle. In 64-bit editions of Windows Server, the first parameters of a procedure call are passed in registers. As a result, it is less likely that the buffer will overflow, because the correct values have to be set up in registers and the variables and addresses have to be aligned on the stack. Data execution protection The 64-bit processors made by AMD and Intel include hardware support for data execution prevention (DEP). Windows Server uses DEP to prevent malicious code from being able to execute, even when a buffer overrun occurs. Even without a processor that supports DEP, Windows Server can detect code that is running in memory locations where it should not be. Patch Guard Microsoft Patch Guard technology prevents non-Microsoft programs from patching the Windows kernel. This technology prevents kernel mode drivers from extending or replacing kernel services, including system service dispatch tables, the interrupt descriptor table (IDT), and the global descriptor table (GDT). Third-party software is also prevented from allocating kernel stacks or patching any part of the kernel. Better scalability In a 64-bit environment, not only can database servers gain nearly unlimited virtual memory address space, but they also gain support for more physical memory. It is possible for a 64-bit server that is running 64-bit editions of Windows Server and SQL Server to get very large working data sets entirely into RAM, thereby improving performance and scalability. In addition, the number of application servers that are required to support a given user base can be substantially reduced because a 64-bit environment does not require worker processes to cycle as often. This reduced cycling results in fewer lost connections, improved I/O handling, and a better user experience. Lower total cost of ownership All the benefits of 64-bit operation that are listed in the previous sections enable you to do more with less. A 64-bit environment allows you to manage more data, serve more users, and run more applications while using less hardware. By reducing hardware, you are also able to reduce license, operations, and infrastructure costs. It takes up less floor space in your data center and costs less to maintain. Finally, because a Windows SharePoint Services 3. 0 farm that uses 64-bit hardware and software provides more room for growth, you can spend less over time on equipment because the life cycle of your equipment is likely to be longer. Question 4 ââ¬â Explain the new features of Windows Server 2008, such as Server Core, Virtualization, and PowerShell. What is the role of these features and how will they improve efficiency in administering Windows? Server Core Windows Server 2008 includes a variation of installation called Server Core. Server Core is a significantly scaled-back installation where no Windows Explorer shell is installed. All configuration and maintenance is done entirely through command line interface windows, or by connecting to the machine remotely using Microsoft Management Console. However, Notepad and some control panel applets, such as Regional Settings, are available. Server Core does not include the . NET Framework, Internet Explorer, Windows PowerShell or many other features not related to core server features. A Server Core machine can be configured for several basic roles: Domain controller/Active Directory Domain Services, ADLDS (ADAM), DNS Server, DHCP Server, file server, print server, Windows Media Server, IIS 7 Web server and Hyper-V virtual server. Server Core can also be used to create a cluster with high availability using failover clustering or network load balancing. Andrew Mason, a program manager on the Windows Server team, noted that a primary motivation for producing a Server Core variant of Windows Server 2008 was to reduce the attack surface of the operating system, and that about 70% of the security vulnerabilities in Microsoft Windows from the prior five years would not have affected Server Core. Hyper-V Hyper-V is hypervisor-based virtualization software, forming a core part of Microsoft's virtualization strategy. It virtualizes servers on an operating system's kernel layer. It can be thought of as partitioning a single physical server into multiple small computational partitions. Hyper-V includes the ability to act as a Xen virtualization hypervisor host allowing Xen-enabled guest operating systems to run virtualized. A beta version of Hyper-V shipped with certain x86-64 editions of Windows Server 2008, prior to Microsoft's release of the final version of Hyper-V on 26 June 2008 as a free download. Also, a standalone version of Hyper-V exists; this version only supports the x86-64 architecture. While the IA-32 editions of Windows Server 2008 cannot run or install Hyper-V, they can run the MMC snap-in for managing Hyper-V. Server Manager Server Manager is a new roles-based management tool for Windows Server 2008. It is a combination of Manage Your Server and Security Configuration Wizard from Windows Server 2003. Server Manager is an improvement of the Configure my server dialog that launches by default on Windows Server 2003 machines. However, rather than serve only as a starting point to configuring new roles, Server Manager gathers together all of the operations users would want to conduct on the server, such as, getting a remote deployment method set up, adding more server roles etc. , and provides a consolidated, portal-like view about the status of each role. Windows Powershell Windows PowerShell is Microsoft's task automation framework, consisting of a command-line shell and associated scripting language built on top of, and integrated with the . NET Framework. PowerShell provides full access to COM and WMI, enabling administrators to perform administrative tasks on both local and remote Windows systems. Question 5 ââ¬â What is a Read Only Domain Controller (RODC) and what are its advantages? What are the security and administrative issues addressed by a RODC? A read-only domain controller (RODC) is a new type of domain controller in the Windowsà Serverà 2008 operating system. With an RODC, organizations can easily deploy a domain controller in locations where physical security cannot be guaranteed. An RODC hosts read-only partitions of the Activeà Directoryà Domainà Services (ADà DS) database. Before the release of Windows Serverà 2008, if users had to authenticate with a domain controller over a wide area network (WAN), there was no real alternative. In many cases, this was not an efficient solution. Branch offices often cannot provide the adequate physical security that is required for a writable domain controller. Furthermore, branch offices often have poor network bandwidth when they are connected to a hub site. This can increase the amount of time that is required to log on. It can also hamper access to network resources. Beginning with Windows Serverà 2008, an organization can deploy an RODC to address these problems. As a result, users in this situation can receive the following benefits: â⬠¢ Improved security â⬠¢ Faster logon times â⬠¢ More efficient access to resources on the network Inadequate physical security is the most common reason to consider deploying an RODC. An RODC provides a way to deploy a domain controller more securely in locations that require fast and reliable authentication services but cannot ensure physical security for a writable domain controller. However, your organization may also choose to deploy an RODC for special administrative requirements. For example, a line-of-business (LOB) application may run successfully only if it is installed on a domain controller. Or, the domain controller might be the only server in the branch office, and it may have to host server applications. In such cases, the LOB application owner must often log on to the domain controller interactively or use Terminal Services to configure and manage the application. This situation creates a security risk that may be unacceptable on a writable domain controller. An RODC provides a more secure mechanism for deploying a domain controller in this scenario. You can grant a non-administrative domain user the right to log on to an RODC while minimizing the security risk to the Activeà Directory forest. You might also deploy an RODC in other scenarios where local storage of all domain user passwords is a primary threat, for example, in an extranet or application-facing role. References ââ¬â Works Cited ââ¬Å"AD DS: Read-Only Domain Controllers. â⬠Microsoft TechNet: Resources for IT Professionals. Web. 7 Dec. 2011. ââ¬Å"Windows Server 2008. â⬠Wikipedia, the Free Encyclopedia. Web. 12 Dec. 2011. Ward10/08/2007, Keith. ââ¬Å"Top 10 Overlooked Windows Server 2008 Features, Part 2 ââ¬â Redmond Developer News. â⬠Powering the Windows Software Revolution ââ¬â Redmond Developer News. Web. 03 Jan. 2012 ââ¬Å"Windows Server 2008 Editions and System Requirements ââ¬â Techotopia. â⬠Main Page ââ¬â Techotopia. We b. 05 Jan. 2012. ââ¬Å"Microsoft Windows Server 2008 R2 Editions. â⬠Web. 03 Jan. 2012. ââ¬Å"Windows PowerShell. â⬠Wikipedia, the Free Encyclopedia. Web. 01 Jan. 2012.
Wednesday, November 6, 2019
Fantasys Integral Role In Creation Of A Monster Essays - Free Essays
Fantasys Integral Role In Creation Of A Monster Essays - Free Essays Fantasys Integral Role In Creation Of A Monster Fantasy's integral role in the creation of a monster In the past decade, the elusive creature known as the serial killer has captured the attention of American culture. With the popular press churning out dozens of books and movies centered around the serial killer each year, the term has almost become a catch-phrase, replacing earlier terms such as 'homicidal maniac.' Fiction writers and the movie industry use 'serial killer' in a much more casual manner than can be allowed in a systematic study. Therefore, for a proper definition of what constitutes a serial killer, pop culture cannot be used as a source. It cannot be denied that the serial killer kills. Killing, however, integrates a variety of meanings. A mere slip of the hand on the steering wheel can turn a normal person into a killer. And it is conceivable that a second such happening could turn an otherwise normal person into a serial killer of sorts. The FBI's Uniform Crime Reports define murder as the willful, nonnegligent, killing of one human being by another (Holmes & De Burger, 1988). The serial murderer, then, is what has fascinated American culture, and captured the attention of the law enforcement world. For the purposes of this paper, serial killer and serial murderer will be used as interchangeable terms. Narrowing the definition to intentional homicide does not, however, limit the category sufficiently. Under the heading of intentional homicide falls the work of hired assassins, mercenaries, and the guerrilla warrior. These types of people are not of great interest, at least not in this context. The three above types of murderer work for obvious, understandable goals. The hired assassin and mercenary work for one of the most obvious motivations, money, while the guerrilla fighter kills for some ideal. The serial killers of the popular media, and of this paper do not work for such external, obvious goals. Instead, they are driven from within, living and dying for that which appeals only to them. The nature of this drive has been heavily debated, but there is a consensus on some points. Sexual undertones in the murder have been noted by many researchers. This point was first espoused two decades ago, by David Abrahamson (1973), who said simply, sexual elements are always involved... (p.11) in murder. More recently, this was qualified by Albert Drukteinis (1992) , who recognized that the sexual element of the crime varies depending on its meaning to the offender (p.533). In other words, that which signifies womanhood may differ radically between killers. At the same time, similarities in the acts and thoughts of serial killers cannot be denied. These sexual undertones are one of the more prominent difference, and have inspired several researchers to refer to the self-motivated serial murderer as a serial sexual murder (Ressler, 1988). One of the other common points concerning the serial killer is the presence of free will. It cannot be denied that there are a great deal of unconscious drives present in the actions of the serial killer, and that these drives are still shrouded in darkness. At the same time, there is a great deal of evidence that the serial killer acts from a conscious perspective (Holmes & De Burger, 1988, p.98). Simply put, the serial killer decides to kill. These two points make the serial killer simply fascinating for a sizable portion of American culture, as evidenced by the continuing production of serial-killer based works. And these two points make serial killers similar enough to be put in one category, but different enough to make them difficult to study. Indeed, Albert Drukteinis (1992) argues that the mere existence of common characteristics among serial killers does not constitute a distinct psychological phenomenon. Contrary to Drukteinis' statement, however, the serial killer is indeed a distinct psychological phenomenon. If one group was to be labeled as the leading authority on serial killers, it would have to be the FBI, the United States Federal Bureau of Investigation. The FBI has studied serial killer methodically for over a decade (Ressler, 1988), and has compiled vast amounts of information concerning the killers themselves, their methods, and their motivations. Still, they have not developed a
Monday, November 4, 2019
To identify and analysis the financing problem within small and medium Dissertation
To identify and analysis the financing problem within small and medium enterprise in the UK, and with the solutions of it - Dissertation Example Alternatively, Harper (1988, p.17) also observed that once small businesses have expanded and grown enormously into mega businesses over the time span of last twenty years and it has also eradicated the hindrance of traditional obstacles in way of the businesses and turning it into a significant contribution to employment power and economical development. The boom of SMEs have integrated the vital portions of businesses sectors and have not only flourish different businesses at national level but have also contributed to highly skilled labor and creative ideas regardless of its business operations or services it caters. To grow and nourish any business, there has to be sufficient funds available for its going concern status and its stability to adhere economical turndowns especially any inflated market. According to Hussain and Matlay (2007, 1-5), a significant number of small firms and businesses milk their financial needs by family and friends loans, personal savings and belongings despite of structure and size, number of employees or the nature of business activity. This has also regarded as a safe and easy source of finance to cater the first building block of any business. The another striking feature identified by Mason and Harrison (2000, pp. 221-239), was the reliance of stable and potential growth fostering SMEs to fund their operations and businesses through medium or long term finances by financial loans, convertible bonds from bank, microfinance intermediaries, venture capitalist or angle financing etc. Manigart and Sapienza (2000, pp. 240-258) also highlighted that when the cost associated with the going concern status of the firm increased to significant heights to mark the survival of the businesses that the funding of the financial resources become a hardcore factor and is solely dependent on external finances or retained earnings of the businessââ¬â¢s profits. The SMEs market in UK has flourished over decades and has an immense contribution to wealth maximization, employment turnover, and businesses transforming into mega giants with development of different sectors of businesses as a cash cow or moneymaker to the economy. Storey (1994), depicted that innovation and creativity, re engineering of the infrastructure and business operations in the SMEs have outward the economic turndown with stable growth and employment opportunities in public and private sector of UK economy. Poutziouris (2003, pp.185-214) found out that SMEs foreign and national level operations and trade have matured the economic market and have urged the government to intervene in the public sector SMEs specifically and foster their policies and interest to cater the important role of economic development. The results can be devastating noted by Deakins et al., (2000) that the government policies and agenda could not fulfill the demands and development opportunities for the SMEs in long run. It could further result in an adverse impact on the economic and social sectors as well as the competitive advantage of the country enjoyed over the number of years. Chami (2001) noted that adverse behavior in market for insufficient sources of finance for the SMEs have an interrelationship within different factors for not only the availability of the capital but also it is affected by the traditional trade practices, international business ventures and the significant contribution of e- businesses
Saturday, November 2, 2019
The Influence of the Bible on Contemporary Music Research Paper
The Influence of the Bible on Contemporary Music - Research Paper Example Music is influenced by the nature of the culture from which the artists have developed their aesthetic point of view. Music expresses emotional connections which are enhanced by the literary value of the lyrics that are written to define the subject matter. One of the most influential pieces of literature of the past two thousand years has been the Bible, the rise of Christianity forming culture and transforming the nature of life. Music and lyrics, as art forms, naturally reflect the cultural influence that the Bible has had on Western society. The Bible has influenced modern music, both in positive and negative venues, the Judeo-Christian foundation of society evolving in a wide variety of formats and belief systems. While some artists express joy from this perspective, others express anger and resentments. From either point of view, the Bible has been a strong influence on culture with the arts, including modern music, reflecting that influence. Schippe and Stetson explore the many ways in which the Bible has influenced society. Literature, the newspaper, rock musicians, screen writers, television producers, and advertisers, all frequently use the Bible for inspiration for their work. Fine artists and commercial artists use the Bible in order to gain inspiration for their work as well (1). The Bible is a double edged sword in regard to the influence it brings to society. The moral and ethical structure that Western society is based upon is derived from the Bible, thus much of the positive imagery found in the arts can be attributed to the Bible. However, there is a darker side of the Judeo-Christian heritage that often finds its way into the arts. ... Her greatest hits album at the end of 1990 was titled The Immaculate Collection, a tongue in cheek take on the concept of the immaculate conception story in the Bible. Christian images are even more prevalent in her video interpretations of her music than even in the music itself (Taraborelli 203). In her song Like a Prayer, the visual imagery is specific to the crucifixion and to the embodiment of a deified male character who is associated with Christ. According to Campbell, the message of the song is that we are all brothers and sisters under Christ, that racism diminishes humanity. Her video emphasizes the spiritual nature of the music even though the music provides no straight narrative to the visual imagery (299). The band Devo used the influence of the Bible as a starting point from which to define some of the music that they created. They saw the Bible as a mythology, a set of beliefs from which society defined its place in the universe and Devo saw that hubris as humanity pla cing itself at the center of the universe. The name of their band, Devo, was constructed from the concept of de-evolution. In creating music that was contradictory in nature to the influence of the mythology of the bible, they were ââ¬Å"attacking ideas that people have that theyââ¬â¢re at the center of the universeâ⬠(Crisafulli 65). In naming their band by a name that came into conflict with creationism and evolutionism, Devo was making a comment on the pride with which religion elevates human beings above a place in which they lose their awe for all of nature. The music of politically inspired musicians often also include music that is inspired by the Bible. Sinead Oââ¬â¢Conner, greatly influenced by the politicized,
Thursday, October 31, 2019
The Paths of Art and Science Essay Example | Topics and Well Written Essays - 500 words
The Paths of Art and Science - Essay Example Science needs art to illustrate the concepts and discoveries in a way that can be conceptualized by a viewer. Microbiology, deep space, sub atomic physics, and light beyond the visual spectrum all require an artist's rendition. As art strives to tell us more about who we are and describe the world around us, the artist relies on science to discover what that world is. Music and perspective require extensive math, while artists demand a better understanding of nature and the nature of life. Beauty in art is a perceived notion based in the observer's experience and comprehension of the art. The beauty in science is only evident to those who have a deep enough understanding of the subject to appreciate its truth. Yet, both are concerned with describing our universe in a way that is accurate, intuitive, and leaves us with a deeper understanding of who we are and what it means to be a part of the universe. Today's art depends on many scientific and technological advancements as new mediums and methods become available. The cinema, with special effects, is filled with technology. New methods of creation and the effects of widespread distribution impact music, sculpture, and literature. Science education benefits from the use of artistry in the classroom. Literature often relies on science to tell an accurate story, while science depends on the writer to craft the words to make the
Tuesday, October 29, 2019
DNA - Genetically modified food Essay Example for Free
DNA Genetically modified food Essay Virtually every crop we eat have undergone hundreds of years of genetic modification by farmers and scientist in search of desirable traits. Selective breeding and hybrid strains have contributed immeasurably to farm productivity during this time. Over the past 30 years however, genetic engineering has been revolutionized. While before, a farmer wanting to develop a frost resistant tomato would be able to breed towards one only if the necessary genes were available somewhere in tomatoes or a near relative to tomatoes, modern biological engineering techniques overcome such restrictions. Genetic traits from outside a species gene pool, in the tomatos case from an arctic fish, can be spliced into the organism to create an entirely different species, a transgenic organism with the typical traits of a tomato and frost resistance from a fish. The most widely used method of gene splicing, recombinant DNA, uses biochemical scissors called restriction enzymes to cut the strings of DNA, selecting required genes. These are then ferried by a virus or a bacterium that infects the host, smuggling the gene into the plants DNA. In this way scientists have been able to create slow ripening and seedless fruit, crops that grow in unfavourable conditions and are resistant to disease or herbicides and milk from cows given a genetically engineered growth hormone. The benefits of gene technology in terms of food production are enormous. The most common genetically engineered crops contain modifications that make the plants resistant to certain diseases and herbicides, or allow them to produce their own pesticides, thereby eliminating or reducing the need to spray. So-called Bt corn, for example, contains a gene resistant to the harmful mycotoxin fungus and herbicide producers, Monsanto have created a strain of soybeans genetically modified to be unaffected by their product Roundup. The soybean farmer therefore can avoid targeting specific weeds and require just one application of a general weed-killer, reducing costs and agricultural waste run-off. Genetically modified crops are also being adapted to grow in salty, dry or frosty environments, contain edible vaccines, have a longer shelf life and be more nutritious. A group of Swiss and German scientists recently developed a strain of GM rice know as ? golden rice due to its altered colour. Containing genes that produce a unusually high amount of beta-carotene (vitamin A), this rice could be a solution to the thousands of poor children in Asia who eat little but rice and go blind or die from lack of vitamin A Public reaction to the use of recombinant DNA in genetic engineering however has been mixed. Sliding US export commodities such as genetically modified soybeans and corn have highlighted hardened public opinion and widespread resistance to biotech crops, especially in the European Union. Concerns about GM foods fall into three categories: economics, environmental hazards and human health risks. The latter two have been the subject of hot debate, both in Australia and overseas. Environmental damage from GM crops can be caused through various channels. One of the main concerns has been the possibility of gene transfer to a non-target species, that is crops engineered for herbicide tolerance and weeds cross-breeding, resulting in the transfer of the herbicide resistance to create ? superweeds. In addition, environmentalists fear that transgenic plants may proliferate rapidly, pollinating natural plants in their surroundings eliminating existing species. Further environmental suspicions include those of unintended harm to other organisms (especially non-target insects) and of the reduced effectiveness of pesticides once insects become tolerant to a crops natural pesticide. Questions have also been raised on the human impact of genetically modified organisms. Critics of recombinant DNA fear that the pathogenic, or disease-producing organisms used in some recombinant DNA experiments might develop extremely infectious forms that could cause worldwide epidemics. Likewise, the unknown effect of foreign genes introduced into GM food crops in terms of human health also presents a controversial issue. Furthermore, there is a possibility that introducing a gene into a plant may create a new allergen or cause an allergic reaction in susceptible individuals. A proposal to incorporate a gene from Brazil nuts into soybeans in order to increase their nutritional value was abandoned when it was found that the genetically engineered soybeans caused an allergic reaction in people sensitive to Brazil nuts. For these reasons, extensive testing and labelling of GM foods may be required to avoid the possibility of harm to consumers with food allergies. Biotechnology has started to revolutionise food production, with fantastic results. With the world population of 6 billion expected to double in the next 50 years and an adequate food supply becoming a major challenge it will no doubt continue to do so in the future.
Sunday, October 27, 2019
Aspirin: History, Effects and Synthesis
Aspirin: History, Effects and Synthesis Introduction Aspirin is a drug which is widely used today to deal with the symptoms of many minor illnesses ranging from general relief from aches and pain; muscle, tooth, headaches, and arthritis; to prevent blood clotting and reduce the risk of stroke and heart attack; lower fever and potentially prevent certain cancers. History of Discovery Aspirin has a great history of development which could be considered to have begun in the 3000BC where it was recorded that remedies from the willow tree were the most useful for the treatment of many ailments. Though it was not for another 1500 years that it was more specifically noted in the Elbers papyrus for its usage for pain relief and inflammation. For the next few thousands of year the willow tree bark was used for in much the same way, although it would not be until 1828, 4800 years after the discovery of its usefulness, that the active ingredient of willow bark was isolated by the German chemist Joseph Buchner who managed to obtain salicin, from the latin Salix, crystals. At the time the crystals were considered fairly pure but Henri Leroux, of France, managed to obtain them in purer forms a year later. Several other chemists/pharmacists made discoveries in the years following, all of which we now know contained Salicylic Acid. It was the Italian Chemist Raffaele Piria who managed to devise a method of containing a more concentrated acid form of salicin from the willow extract, which he named Salicylic Acid (SA). After these discoveries the usage of Salicylates, esters and salts of salicylic acid, became more widespread by doctors for treating pain, fever and inflammation but with limited success due to adverse side effects such as gastric irritation to the lining of the mouth and stomach. It was not until around 1897 that Felix Hoffmann of Bayer Pharmaceuticals developed a method of synthesising acetyl salicylic acid after he had be tasked to find a substitute to SA, that did not cause gastric irritation, 4 years earlier; by Eichengrunalong with Dreser(the pharmacist who developed heroin). Early clinical trials found aspirin to be a potent treatment and today it is the best known and most widely use medicine in the world where it is estimated that over 100 billion tablets or 40,000 tonnes are consumed each year. Unsurprisingly shortly after clinical trials finished acetyl salicylic acid (ASA) became the over the counter drug under the name of Aspirin, though in some countries Aspirin is no-longer holds trademark and has become a generic term for ASA. Synthesis The method of synthesis today involves the reaction of salicylic acid and acetic anhydride in the presence of an acid catalyst such as sulphuric acid or phosphoric acid to give the products ASA and acetic acid. The process is a form of esterification reaction and thus is reversible. (Columbia.edu, n.d.) Method Salicylic acid is placed into a conical flask along with acetic anhydride while inside a fume hood wearing goggles and gloves as acetic anhydride is an irritant and the vapour is harmful is inhaled or reaches the eyes. The acid should then be added in a small quantity and the flask should be swirled to mix thoroughly. The mixture should then be warmed in a beaker of water for around 10 minutes to increase the rate of reaction. Alternatively the mixture could be refluxed over heat. The mixture can then be left to cool, and dried leaving an impure sample of ASA which can be purified. (Continue to Purification) Reaction Mechanism The oxygen atom of the phenol group initiates a nucleophilic attack on a carbon in a carbonyl bond of the acetic anhydride. As a result the oxygen of the phenol group becomes positively charged and the electrons forming the carbonyl bond in the acetic anhydride are pushed onto the oxygen of the bond and thus becomes negative. The bond between the hydrogen and oxygen in the phenol group breaks where the oxygen takes both electrons and becomes stable. The proton is ejected from the structure and the carbonyl bond then reforms as the oxygen delocalises the electrons it gained previously and becomes stable. (Carman, 2008) Purification The process of purification is relatively simple and is done by the process of hot and cold filtering. Distilled water should be added to the impure ASA crystals. Using the properties of ASA and the fact that it is soluble in hot water but virtually insoluble in cold water, any insoluble impurities can be removed by heating the mixture of water and ASA crystals to the point that the ASA crystals are just dissolved in the solution. This hot solution should then be filtered into a clean beaker. Any impurities which are insoluble are caught by the filter paper but the ASA which is soluble passes though. The hot filtered mixture should then be put into an ice bath to recrystallize it. When cold, using a Hirsch funnel, filter paper, a side arm flash, and a vacuum pump the mixture can be filtered once again. As the ASA will be crystalline it will be stopped by the filter paper and thus any soluble impurities are removed. What is left in the filter paper can be washed with distilled water and then dried. Providing the synthesising reaction was done to completion, the dried crystals should be a pure form of ASA or Aspirin. Method of Action of ASA As with many drugs which were developed early in the 20 century, the actual method that the drugs worked inside the body was not known. In the 1970ââ¬â¢s a British Scientist Professor John Vane discovered that it blocked the enzyme Cyclooxygenase which is needed for the production of hormones related to the bodyââ¬â¢s natural inflammatory and pain responses. Vane won the Nobel Prize for Medicine for this work. (Aspirin-foundation.com, n.d.) One enzyme involved in inflammation is cyclooxygenase (COX). COX is responsible for the formation of a group of inflammatory mediators known as prostaglandins. COX activates a chemical known as thromboxane A2 that causes platelets to stick together to form a plug over the damaged area. The aggregation of platelets (plug), in concert with the clotting process, results in a fibrin clot which stops bleeding and aids repair of the blood vessel. Aspirin inhibits COX, in turn stopping the formation of prostaglandins; hence aspirin acts as an anti-inflammatory agent in this process. [In regards to thromboxane A2] thereby reducing the ability of platelets to aggregate. This is why aspirin is known as a ââ¬Ëblood thinnerââ¬â¢ or anti-platelet agent. (Aspree.org, n.d.) Side Effects As previously stated Aspirin inhibits COX which inhibits prostaglandins. Prostaglandins are produced by cells in the lining of the stomach and form majority of the barrier that protect the stomach wall from the concentrated Hydrochloric acid it contains. As a result ASA can result in stomach ulcers. Other side effects would likely to be irritation of the gut, indigestion and nausea. References Arias, J. (2014).Aspirin Synthesis. 1st ed. [eBook] pp.2-4. Available at: http://www.lahc.edu/classes/chemistry/arias/Exp 5 AspirinF11.pdf [Accessed 5 Jul. 2014]. Aspirin-foundation.com, (n.d.).Aspirin Foundation What is Aspirin 100 Years of Aspirin. [Online] Available at: http://www.aspirin-foundation.com/what/100.html [Accessed 5 Jul. 2014]. Aspree.org, (n.d.).How aspirin works. [Online] Available at: http://www.aspree.org/AUS/aspree-content/aspirin/how-aspirin-works.aspx [Accessed 5 Jul. 2014]. Awtry, E. and Loscalzo, J. (2000). Aspirin.Circulation, [Online] 101(10), pp.1206-1218. Available at: http://circ.ahajournals.org/content/101/10/1206.full [Accessed 5 Jul. 2014]. Badd, C. and Perona, M. (1999).Synthesis of Aspirin. [Online] Wwwchem.csustan.edu. Available at: http://wwwchem.csustan.edu/consumer/aspirincons/aspirincons.htm [Accessed 5 Jul. 2014]. Carman, S. (2008).Esterification: The Synthesis of Aspirin (ASA). 1st ed. [eBook] Available at: http://www.drcarman.info/kem220lb/01lab220.pdf [Accessed 5 Jul. 2014]. Columbia.edu, (n.d.).Synthesis of Aspirin. [Online] Available at: http://www.columbia.edu/itc/chemistry/chem-c2507/navbar/Aspirin.ppt [Accessed 5 Jul. 2014]. Nordqvist, C. (2009).What Is Aspirin? What Is Aspirin For? [Online] Medical News Today. Available at: http://www.medicalnewstoday.com/articles/161255.php [Accessed 5 Jul. 2014]. Scribd.com, (2009).Aspirin Synthesis and Analysis. [Online] Available at: http://www.scribd.com/doc/13771504/Aspirin-Synthesis-and-Analysis [Accessed 5 Jul. 2014]. Telow, S. (n.d.).Acetylsalicylic Acid (Aspirin) Synthesis. [Online] Academia.edu. Available at: http://www.academia.edu/4728996/Acetylsalicylic_Acid_Aspirin_Synthesis [Accessed 5 Jul. 2014]. Theuplbcollegestudent.blogspot.co.uk, (2011).College: Full Report: Synthesis of Aspirin. [Online] Available at: http://theuplbcollegestudent.blogspot.co.uk/2011/05/full-report-synthesis-of-aspirin.html [Accessed 5 Jul. 2014].
Subscribe to:
Posts (Atom)