Wednesday, October 30, 2019

Genetics modification and domestications animals Essay

Genetics modification and domestications animals - Essay Example This experiment was later on repeated by Trut and his team and they found out that the hypothesis was true. However, these efforts at domestication were not without disadvantages. The changes that both Belyaev’s and the Farm Fox Experiment have brought about are very disadvantageous to the original wild fox species as well as to the tamed generations of foxes. One advantage of taming the fox species is that the physiological changes that generations of fox species undergo while being domesticated might lead to the extinction of the originally wild species of foxes. Domestication of the wild fox species does not only make the animal tamed but also causes various physiological changes in it like changes in body size, proportion, pigmentation, tail and ears (31). Although these may just seem to be minor changes as of this moment in history, such changes might prove to be less resistant to diseases and environmental conditions. Moreover, such efforts at domestication might eventua lly cause permanent changes in the fox species until such a point where all the original wild foxes were wiped out. This is not the same as evolution because there is human manipulation of the species. There must be a reason why some animals are wild and defying nature might result in the extinction of the original species. ... Moreover, new diseases might be brought along with the domesticated species as disease genes made dormant by a wild nature may eventually show up when the animal is tamed. Thus, the new domesticated species, although numerous, may not be able to survive very long. The idea that domestication brings along with it the fact that the fear response develops much later, which is 9 weeks or later instead of 6 weeks for the wild species, implies that there is a relatively longer time for the fox offspring to remain vulnerable to danger due to the absence of fear (33). The earlier fear develops in the fox species and in any other animal species, the earlier it may be able to learn to protect itself from danger. Thus, domesticated foxes tend to be more trusting of people and other animals that might cause them great harm or even death. Although the purpose of domestication is to delay the development of fear or even to get rid of it completely, fear has a great role in the survival of the anim al species. One final disadvantage of domestication of foxes is, as stated by Trut herself, â€Å"Anything that tampers with [polygenes] runs the risk of upsetting other parts of an organism’s genetic machinery† (35). As previously stated, the domestication experiment on foxes is not the same as natural evolution because there is deliberate human intervention in the manipulation of the polygenes. Any such manipulation may result in the alteration of what nature has intelligently created. The reverberations of such manipulation might result in destructive physiological changes in the fox species like immunity problems and thus eventually cause its extinction. The

Monday, October 28, 2019

Sects Cults and Catholic Church Essay Example for Free

Sects Cults and Catholic Church Essay The Seventh Day Adventists A sect is a religious group with controversial beliefs, they are groups that break away from a main group/religion and form their own set of beliefs, which differ from the teachings of their parent group. Sects also reject the authority of their parent group. The Seventh Day Adventists is an example of a group that broke away from their parent religions of Millerite Movement and Christianity, to become a sect. New York was the home of the 1840s Millerite movement; Millerites were followers of he teachings of William Miller who prophesied the second coming of Jesus Christ to Earth on the 22nd October 1844. When Jesus did not appear on this day the Millerites dissolved, however from the ashes of one movement came the next as the Seventh Day Adventists arose from the disbanded Millerites. The Seventh Day Adventist Church was officially founded in 1863 and the four founding fgures were Joseph Bates, James White, Ellen G. White and J. N. Andrews. The Church quickly became popular and began to spread worldwide, reaching the shores of New Zealand in the 1880s only shortly after its official establishment back in the States. Today the Seventh Day Adventist Church boasts over 16 million members globally and is the twelfth largest religious body in the world.

Saturday, October 26, 2019

Society’s Expectations of a Female’s Body Image Essay -- Media Health

Society’s Expectations of a Female’s Body Image Society plays many roles in peoples’ lives. The biggest role that society plays with females is how they should appear. All over the television, movies, and different magazine covers, females come into view as looking very thin and beautiful. People that see these famous females begin to idealize that body image. The male gender also visualizes these famous females and thinks that all females should have this slender appearance. As the year 2000 rolled in, actresses and models’ body weight decreased, and their waiflike bodies became more noticeable in the public’s eyes. Many little girls grow up idealizing the people in the public eye, giving them the idea that they must look a certain way, which is not a healthy way. These little girls grow up to become teenagers and then discover adulthood. The image that they grew up visualizing only worsens when they hit puberty and their bodies go through drastic changes, which makes them realize their bodies do not look like the people they grew up bearing in mind. When females realize they will not be able to accomplish the same body that the famous acquire, they become very self-conscious and some even develop eating disorders. The media’s role in self-images has greatly affected the way people perceive themselves in today’s society. In this paper, I will discuss the different rhetorical techniques that six diverse authors use to get their point across to the reader. All of the articles that I had analyzed used pathos as a technique. There were two of the six articles that used ethos as a method. These two articles were Slim Pickings by David Butler and Do You Have a Body Image Problem? by Dr. Katharine A... ...beartoe.com/Brandi/Essay.htm>. â€Å"Expectation of a Fashion Model† discusses the aspects of how a model must look in order to get hired and how it plays a role in society’s aspects of how a female should look. The author mainly uses the social side of the pathos appeal. She discusses the social aspects of being thin. This article will play a role in my paper because it gives another social appeal to this topic. Thompson, Colleen. "Society and Eating Disorders." Mirror-Mirror. February 15, 2000. <http://www.mirror-mirror.org/society.htm. Thompson’s article discusses how society instills the image that females must look a certain way and it then leads to an eating disorder. The author also uses pathos to get her point across to the reader. This article will help by also discussing different eating disorders and how people end up having them.

Thursday, October 24, 2019

Asahi Glass

TABLE OF CONTENTS Executive Summary3 Recognizing Opportunities4 Company Structure 5 Issues Facing Asahi Glass5 Questions to Answer6 Conclusion6 Recommendations6 Executive Summary Asahi Glass Company was founded in the early 1900’s to relieve Japan’s dependence on foreign imports. It was the first successful endeavor into the flat glass industry. The company was able to continue to succeed through mergers, acquisitions, and organic growth. The company’s core businesses are: 1. Glass and related products, 2. Chemical products, 3. Ceramics and refractory products, 4. Electronic products, and 5. All other miscellaneous products The synergies that were created by combining management’s expertise with the company’s knowledge, resources, and technologies have contributed to the success of Asahi Glass Company throughout the years. The organizational structure of Asahi Glass’ domestic productions are effective for their business’. There is a top down management system, with each division having its own managers and balance sheet. However, globalization efforts have been depleting company resources in past years. Management has yet to be able to perfect their foreign operating organization. The company is unable to establish mutual trusting relationship with several overseas joint ventures. ? Asahi Glass Company was founded in 1907, by Toshiya Iwasaki, a nephew of one of the founders of the Mitsubishi business group. Iwasaki wanted to ease Japan’s dependence on imports, by establishing a flat glass industry. It took three years after production started in 1909 to make a profit, but the endeavor was well worth it; Asahi Glass Company established themselves as the dominate player in the market and has remained that way ever since. Throughout Asahi Glass’ existence, their decisions and objectives have been focused on growth. They achieve this by exploring new technologies and growing organically, as well as acquiring companies, and merging with others. Their management style is also a key factor to their success. Recognizing Opportunities During the First World War, Asahi Glass was having trouble importing the soda ash they needed for manufacturing, so they started producing it themselves. This led the company into the exploitation of the raw-materials scope economies. They soon developed technological expertise in ceramics and alkali chemicals, which became two of the three core business â€Å"pillars. † After World War II, management made a sensible strategic decision to license a new float glass process from the Pilkington Brothers in order to maintain their market position. In the 1960s, Asahi Glass took advantage of growing TV and auto industries, and moved into them, becoming a domestic leader in both industries. Soon after, they progressed into producing construction materials. When the chemical industry took off in Japan, Asahi Glass merged in with their alkalis, halogen, and other petrochemical additives. They were market leaders in every industry they infiltrated. Asahi Glass created new, unique markets and took the lead in many specialty markets. In the 1970s, the current president, Takeo Sakabe, took the initiative to introduce a fourth â€Å"pillar† to the company’s core businesses: electronics. He chose electronics because management had some expertise in it and the industry had room for growth. Asahi Glass began penetrating the global market in 1956, when they built a plant in India. Then, the company entered into joint ventures in Thailand and Indonesia in 1964 and 1972 respectively. Not long after establishing their presence in those markets for glass, Asahi Glass’ chemical business followed into the areas. Once the company began to expand, they accelerated their efforts through the 1990s. Company Structure Asahi Glass had â€Å"a matrix style organization structure. † Each of the six general divisions and the five individual divisions had their own managers and kept their own balance sheet. Asahi Glass had an International General Division, which communicated with domestic product divisions, and monitored the subsidiaries and affiliates who were abroad, as well as help formulate business plans. The company tried to localize their oversea activities, and let them manage day-to-day operations and only held executive meetings about once every four months. Issues Facing Asahi Glass In 1993, Asahi Glass’s domestic glass business was declining due to the Japanese economy. The answer for the company was to continue globalization efforts. However, the company’s quick response and accelerated efforts caused the company to lose focus of their traditional international practices. The company’s domestic operational structure was not the same as their international operating structure. Because many of the international were joint ventures, and still relatively fresh, the two companies still lacked trust and coordination. Asahi Glass was still realizing that moving into foreign markets took more integration and stronger efforts than operating domestically. Questions to Answer In 1993, president Seya was faced with a decision for the electronics department. He was analyzing a report of long term strategy for the business, and the position of its major products. The report offered proposals ranging from intense divesting, to rigorous investing. Mr. Seya needed to decide if investing the capital needed to ascertain a dominant position in the electronics business was worth the risk. His decision would be the foundation of the business’ strategic direction and he felt that direction should be aligned with Asahi Glass’ other divisions, and their overall objectives for the years to come. Conclusion Asahi Glass Company has always been an aggressive, dominant company. They exhort their knowledge, expertise, and technology in order to gain a leading position in whatever industry or market they endeavor. In the latest years, it seems that the company is trying to spread themselves too thin by globalizing. Until Asahi Glass finds a better way to organize and operate their foreign affairs, they should focus on domestic mergers, acquisitions, and internal growth. Recommendations I believe that Asahi Glass has had an excellent history of creating successful synergies that have propelled the company to success. From its beginnings in the early 1900s, the company’s management has recognized opportunities to expand their core businesses and grow organically. As their core businesses expanded, so did the company’s knowledge, experience, and technology. As these assets have interacted over the years, they have combined to make synergies that allowed the company to expand into new markets, products, and industries. Asahi Glass has an excellent foundation in the way of management as well as financial prosperity. I recommend that Asahi Glass invest in the establishment of the electronic business as a dominant position. Looking at the electronics business’ history shows that the division is among the top three in relative market position already, despite that they have a low share in the market (exhibit 10). They are also already well established, having joint ventures with at least five companies, three of which are in the top six market positions (exhibit 10). The electronic division contributed 5. 6% to sales in 1992; compared to ceramics contribution of 2. 4% (exhibit 6).

Wednesday, October 23, 2019

Marketing Report – Baskin-Robbins

The purpose of this report is to investigate the possible approach of a new market segment with a new offer by the American ice cream manufacturer Baskin-Robbins. 1. 2. Scope The report will refer both to the characteristics of the targeted market segment, as well as to the features of the new product that will make him accepted by the target clients.1. 3. Methodology Secondary research was used in order to build the information base necessary for the development of the present report. Various academic studies, newspaper articles, company reports and websites have been explored.In order to develop the marketing proposal, both analysis of available information, as well as creative use of observed market patterns were the other methods used in writing the paper. 1. 4. Limitations Due to limited access to well developed ice cream market studies (that might amount up to $3000) the information used as base for analysis on are rather basic. Also, the present report is limited by its word c ount of +/-2200 and is written individually. 1. 5. Assumptions It is assumed that the information found during secondary research is accurate. 1. 6. BackgroundThe present report will firstly focus on defining the targeted market segment and motivating why it should be taken into consideration. Following, the characteristics of the new product will be presented and recommendations on its introduction on the market will be given. The 4P marketing model is used in constructing the image of the new product. 2. NEW PRODUCT DEVELOPMENT 2. 1. Market segment characteristics Ice cream is a product that makes no discrimination. Everybody loves it and it can be found in more than 93% of American households (Geisler, p. 1).Historically, ice cream’s constant consumers are children, and for years they have been the main target of manufacturers (Barrette, p. 1). Households with children sum up to 34% of total ice cream consumption, as compared to the lower 20% level reached by the household without children consumption. Nevertheless, U. S. Census Bureau predicts a declining trend in youth population for the next years, which will make producers upgrade their strategies in order to start reaching more intensively the adult consumers. There are different patterns of ice cream consumption between children and adults.As commented by Marty Hogan, director of brand management, Ben & Jerry’s Homemade Inc. , South Burlington, Vt. , â€Å"parents know that children will be perfectly satisfied with a big gallon tub of air-whipped ice cream, but mom and dad are also sneaking that Ben & Jerry’s [premium and super-premium ice cream] and putting it in the back of the freezer for themselves†. Laura Hindulak, director of marketing with Pierre’s French Ice Cream Co. , Cleveland, Ohio, seems to agree with the same statement, when she ads that â€Å"the majority of [adult] consumers are looking for truly rich and indulgent premium and super premium ice cream s.[†¦] When the choice is for full-fat, regular ice cream, consumers are willing to forgo calorie-counting and enjoy the rich, great taste that the higher butterfat flavors offer† (Cook, p. 1-2). The American ice-cream market knew sales of slightly more than $21. 6 Billion in 2005 and it is forecasted to reach about $24 Billion by 2008, after it knew a 24% growth between 1998 and 2003 (Rea, p. 1). The ice cream market is led mainly by four manufacturers, summing a little over 40% of its sales. These companies are: Unilever, Ice Cream Partners USA, Dreyers Ice Cream and Blue Bell Creameries.About 18% of sales are represented by the private label products, regional and local companies summing up to the remaining 40% of sales. (Geisler, p. 2) Divided by states, California leads the way in ice cream and frozen dessert production, Indiana, Pennsylvania, Texas, Ohio, New York and Minnesota being the other leading producing states. (Geisler, p. 2) The target market segment chous ed in this paper is represented by the Hispanic young adult population, especially between 21 and 35 years. The choice of this specific segment is due to some very important demographic and consumption data:— As of July 1, 2005, the population of Hispanics within the USA is estimated at 42. 7 million (US. Census Bureau), meaning an important market in possible consumers, that is already taken seriously into account by American producers. — Hispanics are also the fastest-growing minority group in the U. S. Between July 1, 2004 and July 1, 2005 a 3. 3% growth rate has been registered within the Hispanic population by the US. Census Bureau. This offers a sure future distribution market for the products created especially to respond to their needs.— Siboney USA, a New York-based advertising agency comments that about 70% of the entire American Hispanic population resides in six states. This can make the task of better targeting and reaching the segment a lot easier. The graph hereby presents this division of Hispanics into states. — Median age of Hispanics was 27. 2 years vs. 36. 2 years for the population as a whole in 2005 (US Census Bureau), meaning: a young population opened to new products and ideas. — Hispanics tend to consume more soft ice cream compared to the other non-Hispanics: 44 vs.37% (Banerjee A, p. 1), meaning that the rate of per capita ice cream consumption within Hispanic population is higher than for non-Hispanics. Consequently, if a product will respond to the needs of this category, it would register higher sales volumes than one that would respond to the needs of non-Hispanic population. — Hispanics tend to prefer Latino flavors: as commented by Haagen-Dazs General Manager of company’s Minneapolis location, Dawn Uremovich, the â€Å"Dulce de leche† flavor is the second most popular of the company, after vanilla.â€Å"This came from our South American market, where dulce de leche is a p opular dessert† he comments. (Hall, p. 1). This might be just the needed precedent showing that products that bring that homely feeling to the Latino population, register higher sales volume within it. 2. 2. The new product 2. 2. 1. Product Based on the demographic and consumption related information presented above, we will recommend the development and introduction on the market of a Hispanic flavored ice cream – â€Å"Sabor latino†, that will for sure interest its target segment: ice cream containing a center of Latin-traditional alcohol.The ice cream base should be vanilla or chocolate – as they continue to be the two most sold flavors in the USA (Phillips, p. 1) – already flavored with the specific alcohol. Taking into consideration the most important origins of Hispanics, drinks from their respective countries should be taken into consideration: tequila (directed especially to the Mexican origin population that sums up to 64% of total Hispanic origin population in the US – see Graph above), and rum (mainly for the Puerto Rican and Cuban population).Depending on how well received by the market the product will prove to be, future flavors like Brazilian Caipirinha and Cuban Mojito might enter on the market. 2. 2. 2. Promotion Studies show that product names and advertising in Spanish are more appealing to the Hispanic population (Accetta Smith, p. 1-2). This is also the motivation for choosing the name of the brand â€Å"Sabor latino† – â€Å"Latin flavor† that would come (at least at the beginning) with the two options – tequila and rum.The regular channels of promotions should be used, with a higher focus on the regions highly inhabited by Hispanics. As well, advertising, television, in-store point-of-purchase displays should be at least bilingual. Studies show also that Hispanic TV seems to be â€Å"twice as effective and three times more efficient than general market TV at driving Hi spanic sales† (Accetta Smith, p. 1). Therefore, a focus should be established on TV promotion within Hispanic TV channels. 2. 2. 3. PriceAccordingly to US Census Bureau and own analysis, median earnings of full-time, year-round Hispanic workers was lower than for non-Hispanic workers (about 40% lower for Hispanic males and 30% lower for Hispanic women). This is one of the main reasons that it would be recommended for Baskin-Robbins to set a conveniently lower price for this product, as to make it affordable by its target market segment. Even if the product should be design as premium or super-premium, it must be taken into consideration the lower incomes of its targeted market segment, and thus fix a lower price for it, as long as total costs allow it.2. 2. 4. Placement The first destination of the product should be the six American states that concentrate 70% of the Hispanic population presented in the first graphic of the project, using the classical channels of distribution . In a second step, other states that have high percentages of Hispanic population should be reached. 3. RECOMMENDATIONS A necessary step in the introduction of â€Å"Sabor latino† will be to develop various market study and focus groups in order to decide the best concentration of alcohol both in the body of the ice cream and in its liquid center.It must be remembered that features of the product must define it as a premium or super-premium product, in order to easily reach the young adult and adult target population. As presented by the U. S. Dairy Export Council, â€Å"super-premium ice cream tends to contain 16 to 18% milk fat and low overrun (20-50% range), making it a very dense, and ultra-rich quality dessert†. A recommended future destination for the product would be the Mexican market, as well as the other Latin American countries.At is it specified in various articles, Mexico is one of the favorite importers of American ice cream. And for sure, if one product will be designed to reach to their needs, there will be no reason for a successful exporting activity of this new Baskin-Robbins brand: â€Å"Sabor Latino†. The present exports situation is described in the table below. . REFERENCE LIST 1. Terrie Hall (2005) â€Å"Haagen Dazs franchise profile†, Merger Place 2. Koppenhoefer, Katie; Pupillo, Marti (2005) â€Å"Just the facts: ice cream sales and trends†, IDFA 3.Cook, Julie, (2002) â€Å"Adult appeal†, Stagnito Publishing 4. Banerjee, A (2000-2001) â€Å"Characterization of high risk food consumption Practices among the Hispanic population†, FoodNet 5. Rea, Amy C. (2004) â€Å"Screaming for ice cream: a rapidly growing market, ice cream nevertheless faces its share of possible demons. What will be the effect of changing demographics on the frozen treat, and how will manufacturers respond? †, Prepared Foods 6. David Phillips (2002) â€Å"Frozen favorites: Twenty five favored flavors in ice cr eam – Industry Overview†, Dairy Foods7. Sarah Barrette (2004) â€Å"Ice Cream Parlor†, SBDCNet San Antonio 8. Accetta Smith, Pamela (2004) â€Å"Cultural Demand†, Dairy Foods 9. Geisler, Malinda (2006) â€Å"Dairy Products Profile†, AgMRC, Iowa State University 10. U. S. Census Bureau (2004) â€Å"Selected Summary Measures of Age and Income by Hispanic Origin and Race: ASEC, 2004† 11. U. S. Census Bureau, Current Population Survey, â€Å"2004 Annual Social and Economic Supplement† 12. â€Å"Hispanic Americans by the numbers†, by U. S. Census Bureau, Fact Monster – www. factmonster. com/spot/hhmcensus1. html

Tuesday, October 22, 2019

How Sociologists Define Social Control

How Sociologists Define Social Control Social control, within sociology, refers to the many ways in which our behavior, thoughts, and appearance are regulated by the norms, rules, laws, and social structures of society. Social control is a necessary component of social order, for society could not exist without it. Overview of the Concept Social control is achieved through a variety of means, including through social norms, rules, laws, and social, economic, and institutional structures. In fact, there would be no  society without social control, because society cannot function without an agreed upon and enforced social order that makes daily life and a complex division of labor possible. Without it, chaos and confusion would reign. The primary way through which social order is produced is through the ongoing, lifelong process of socialization that each person experiences. Through this process, we are taught from birth the norms, rules, and behavioral and interactional expectations that are common to our family, peer groups, community, and greater society. Socialization teaches us how to think and behave in accepted ways, and in doing so, effectively controls us our participation in society. The physical organization of society is also a part of social control. For example, paved streets and traffic signals control, at least in theory, the behavior of people when they drive vehicles. Sidewalks and crosswalks control foot traffic, for the most part, and aisles in grocery stores control how we move through the space. When we fail to conform to norms, rules, and social expectations, we suffer sanctions that remind us of their social importance, and that serve to control our behavior. These sanctions take many forms, from confused and disapproving looks to conversations with family, peers, and authority figures, to social ostracization, among others. The Two Types of Social Control Social control tends to take one of two different forms: informal or formal. Informal social control refers to our  conformity to the norms and values of the society, and adoption of a particular belief system, which we learn through the process of socialization. This form of social control is enforced by family, primary caregivers, peers, other authority figures like coaches and teachers, and by colleagues. EyesWideOpen/Getty Images Informal social control is enforced by rewards and sanctions. Reward often takes the form of praise or compliments, but also takes other common forms, like high marks on school work, promotions at work, and social popularity. Sanctions used to enforce informal social control, like those discussed above, tend to be social in form and consist mainly in communication or lack thereof, but can also take the form of the ending of a relationship, teasing or ridicule, poor marks in school, or being fired from work, among others. Formal social control is that which is produced and enforced by the state (government) and representatives of the state that enforce its laws like police, military, and other city, state, and federal agencies. In many cases, a simple police presence is enough to create formal social control. In others, police might intervene in a situation that involves unlawful or dangerous behavior in order to stop itto arrest literally means to stopin order to ensure that social control is maintained.   Alex Livesey/Getty Images Other government agencies enforce formal social control as well, like those that regulate which substances or foods can be legally sold, and those that enforce building codes, among others. It is up to formal bodies like the judiciary and the penal system to dole out sanctions when someone fails to comply with the laws that define formal social control. Updated  by Nicki Lisa Cole, Ph.D.

Monday, October 21, 2019

Kobe Earthquake Essays - Seismology, Great Hanshin Earthquake

Kobe Earthquake Essays - Seismology, Great Hanshin Earthquake Kobe Earthquake An earthquake is defined as a shaking or trembling of the earth that is volcanic or tectonic in origin. In the case of the Great Hyogo (Hanshin) earthquake of Kobe, Japan it is tectonic in origin. This devastating earthquake which occurred on the 17th of January at 5:46 a.m measured at a whopping 7 (7.2) on the Richter scale. This was the largest recorded earthquake to ever hit Japan. According to the Japan Meteorological its epicentre was in 34.6 north and 135.0 east in the northern tip of Awaji Island with a focal depth of 14 km. According to the results of the recorded in 24 observation centre, the fracture which triggered the earthquake was happened inside the Nojima Fault. Also investigation in the sea bed by the Ocean observatory Centre shows that the cracks occurred in Nojima Fault. This fault forms a part of a group of faults known as the Rokko Fault', which extends from Awaji Island through Kobe City to the foot of Mount Rokko. The movement of the fault can be explained by the Tectonic characteristic of west Japan. The main reason for the big earthquakes in west part of Japan are the tectonic activities of the Eurasian, the Pacific, the North America and the Philippine plates. The collision between these plates in the central part of Honshu (Japan main island) is the main source of strain accumulation in the crust of western part of Japan. Casualty figures quickly mounted by the hour and when it was all said and done 5,472 people had lost their lives and 415,000 people were left injured. By the fourth day after the earthquake about 310,000 residents spent the night at 1,077 refugee centres. More than 350 fires broke out wiping out around 100 hectares of densely populated area. Fire fighting was virtually ineffective due to an inadequate water supply and access to fires. Lifeline facilities were severely damaged over a large area and following the earthquake, 900,000 households were left without electricity, 850,000 households were without gas, and water supply cuts affected about 2.5 million people. Nippon Telegraph and Telephone (NTT) Corp.'s 160,000 lines out of 800,000 lines were out of order. The damage to major infrastructure, especially to the elevated expressway and shinkansen (bullet train) tracks, shocked engineers, planners and the general public. According to news reports its tracks were damaged at 42 locations. The first Shinkansen train was to run 30 minutes after the time of the earthquake. Had the disaster occurred few hours later, with an average capacity of about 1,600 passengers/train, casualty rate could have been much higher. Sections of elevated Hanshin expressway toppled virtually cutting off major transport lines to the affected areas. A contiguous section supported by eighteen single columns had fallen sideways in Higashi Nada-ku. Modern buildings and structures retrofitted with up-to-date engineering techniques fared well in the Great Hyogo quake. Much of the damage occurred in traditionally built older homes and in areas near the coast where liquefaction of the soil caused instability in structures. A large number of reinforced concrete structures were completely devastated. The economic damage estimates vary from around 100 - 150 billion dollars US. The most extensively and severely damaged structures were smaller commercial buildings (often with residences upstairs) constructed with limited engineering design and traditional homes. The smaller commercial and mixed occupancy buildings are typically framed with wood or light steel and have walls of stucco over wood slats. Many of these buildings have a large shop window in the front and lack interior walls, factors which weaken the first floor. Traditional homes, typically those built before the 1970s, have heavy tile roofs with tiles set in a thick clay and mud mortar, few partitions, and are not waterproofed which causes widespread dry rot and water damage. Little nailing is used; wood joinery is more common. Many casualties were found in damaged and collapsed traditional homes. The heavy tile roofs stressed the walls, which cracked, crumbled and often collapsed, triggering fires from broken gas pipes. The Kobe earthquake exposed more modern and engineered buildings to stronger forces than any previous earthquake. The preliminary report indicates more studies are needed to evaluate seismic codes, design practice and construction

Sunday, October 20, 2019

AP English Language and Composition Exam Key Terms

AP English Language and Composition Exam Key Terms On this page, youll find brief definitions of grammatical, literary, and rhetorical terms that have appeared on the multiple-choice and essay portions of the AP* English Language and Composition exam. For examples and more detailed explanations of the terms, follow the links to expanded articles. *AP is a registered trademark of the College Board, which neither sponsors nor endorses this glossary. Ad Hominem:  An argument based on the failings of an adversary rather than on the merits of the case; a logical fallacy that involves a personal attack.Adjective:  The part of speech (or word class) that modifies a noun or a pronoun.Adverb:  The part of speech (or word class) that modifies a verb, adjective, or another adverb.Allegory:  Extending a metaphor so that objects, persons, and actions in a text are equated with meanings that lie outside the text.Alliteration:  The repetition of an initial consonant sound.Allusion:  A brief, usually indirect reference to a person, place, or event- real or fictional.Ambiguity:  The presence of two or more possible meanings in any passage.Analogy:  Reasoning or arguing from parallel cases.Anaphora:  The repetition of the same word or phrase at the beginning of successive clauses or verses.Antecedent:  The noun or noun phrase referred to by a pronoun.Antithesis:  The juxtaposition of contrasting ideas in balanced phrases.A phorism:  (1) A tersely phrased statement of a truth or opinion. (2) A brief statement of a principle. Apostrophe:  A rhetorical term for breaking off discourse to address some absent person or thing.Appeal to Authority:  A fallacy in which a speaker or writer seeks to persuade not by giving evidence but by appealing to the respect people have for a famous person or institution.Appeal to Ignorance:  A fallacy that uses an opponents inability to disprove a conclusion as proof of the conclusions correctness.Argument:  A course of reasoning aimed at demonstrating truth or falsehood.Assonance:  The identity or similarity in sound between internal vowels in neighboring words.Asyndeton:  The omission of conjunctions between words, phrases, or clauses (opposite of polysyndeton).Character:  An individual (usually a person) in a narrative (usually a work of fiction or creative nonfiction).Chiasmus:  A verbal pattern in which the second half of an expression is balanced against the first but with the parts reversed.Circular Argument:  An argument that commits the logical falla cy of assuming what it is attempting to prove. Claim:  An arguable statement, which may be a claim of fact, value, or policy.Clause:  A group of words that contains a subject and a predicate.Climax:  Mounting by degrees through words or sentences of increasing weight and in parallel construction with an emphasis on the high point or culmination of a series of events.Colloquial:  Characteristic of writing that seeks the effect of informal spoken language as distinct from formal or literary English.Comparison:  A rhetorical strategy in which a writer examines similarities and/or differences between two people, places, ideas, or objects.Complement:  A word or word group that completes the predicate in a sentence.Concession:  An argumentative strategy by which a speaker or writer acknowledges the validity of an opponents point.Confirmation:  The main part of a text in which logical arguments in support of a position are elaborated.Conjunction:  The part of speech (or word class) that serves to connect words, phrases , clauses, or sentences.Connotation:  The emotional implications and associations that a word may carry. Coordination:  The grammatical connection of two or more ideas to give them equal emphasis and importance. Contrast with subordination.Deduction:  A method of reasoning in which a conclusion follows necessarily from the stated premises.Denotation:  The direct or dictionary meaning of a word, in contrast to its figurative or associated meanings.Dialect:  A regional or social variety of a language distinguished by pronunciation, grammar, and/or vocabulary.Diction:  (1) The choice and use of words in speech or writing. (2) A way of speaking  usually assessed in terms of prevailing standards of pronunciation and elocution.Didactic:  Intended or inclined to teach or instruct, often excessively.Encomium:  A tribute or eulogy in prose or verse glorifying people, objects, ideas, or events.Epiphora:  The repetition of a word or phrase at the end of several clauses. (Also known as epistrophe.)Epitaph:  (1) A short inscription in prose or verse on a tombstone or monument. (2 ) A statement or speech commemorating someone who has died: a funeral oration. Ethos:  A persuasive appeal based on the projected character of the speaker or narrator.Eulogy:  A formal expression of praise for someone who has recently died.Euphemism:  The substitution of an inoffensive term for one considered offensively explicit.Exposition:  A statement or type of composition intended to give information about (or an explanation of) an issue, subject, method, or idea.Extended Metaphor:  A comparison between two unlike things that continues throughout a series of sentences in a paragraph or lines in a poem.Fallacy:  An error in reasoning that renders an argument invalid.False Dilemma:  A fallacy of oversimplification that offers a limited number of options (usually two) when, in fact, more options are available.Figurative Language:  Language in which figures of speech (such as metaphors, similes, and hyperbole) freely occur.Figures of Speech:  The various uses of language that depart from customary construction, order, or significance.Flashbac k:  A shift in a narrative to an earlier event that interrupts the normal chronological development of a story. Genre:  A category of artistic composition, as in film or literature, marked by a distinctive style, form, or content.Hasty Generalization:  A fallacy in which a conclusion is not logically justified by sufficient or unbiased evidence.Hyperbole:  A figure of speech in which exaggeration is used for emphasis or effect; an extravagant statement.Imagery:  Vivid descriptive language that appeals to one or more of the senses.Induction:  A method of reasoning by which a rhetor collects a number of instances and forms a generalization that is meant to apply to all instances.Invective:  Denunciatory or abusive language;  discourse  that casts blame on somebody or something.Irony:  The use of words to convey the opposite of their literal meaning. A statement or situation where the meaning is directly contradicted by the appearance or presentation of the idea.Isocolon:  A succession of phrases of approximately equal length and corresponding structure.Jargon:  The speciali zed language of a professional, occupational, or other group, often meaningless to outsiders. Litotes:  A figure of speech consisting of an understatement in which an affirmative is expressed by negating its opposite.Loose Sentence:  A sentence structure in which a main clause is followed by subordinate phrases and clauses. Contrast with  periodic  sentence.Metaphor:  A figure of speech in which an implied comparison is made between  two  unlike things that actually have something important in common.Metonymy:  A figure of speech in which one word or phrase is substituted for another with which it is closely associated (such as crown for royalty).Mode of Discourse:  The way in which information is presented in a text. The four traditional modes are narration, description, exposition, and argument.Mood:  (1) The quality of a verb that conveys the writers attitude toward a subject. (2) The emotion evoked by a text.Narrative:  A rhetorical strategy that recounts a sequence of events, usually in chronological order.Noun:  The part of speech (or word class) that is used to name a person, place, thing, quality, or action. Onomatopoeia:  The formation or use of words that imitate the sounds associated with the objects or actions they refer to.Oxymoron:  A figure of speech in which incongruous or contradictory terms appear side by side.Paradox:  A statement that appears to contradict itself.Parallelism:  The similarity of structure in a pair or series of related words, phrases, or clauses.Parody:  A literary or artistic work that imitates the characteristic style of an author or a work for comic effect or ridicule.Pathos:  The means of persuasion that appeals to the audiences emotions.Periodic Sentence:  A long and frequently involved sentence, marked by suspended syntax, in which the sense is not completed until the final wordusually with an emphatic climax.Personification:  A figure of speech in which an inanimate object or abstraction is endowed with human qualities or abilities.Point of View:  The perspective from which a speaker or writer tells a story or presents information.Pred icate:  One of the two main parts of a sentence or clause, modifying the subject and including the verb, objects, or phrases governed by the verb. Pronoun:  A word (a part of speech or word class) that takes the place of a noun.Prose:  Ordinary writing (both fiction and nonfiction) as distinguished from  verse.Refutation:  The part of an argument wherein a speaker or writer anticipates and counters opposing points of view.Repetition:  An instance of using a word, phrase, or clause more than once in a short passagedwelling on a point.Rhetoric:  The study and practice of effective communication.Rhetorical Question:  A question asked merely for effect with no answer expected.Running Style:  Sentence style that appears to follow the mind as it worries a problem through, mimicking the rambling, associative syntax of conversation- the opposite of periodic sentence style.Sarcasm:  A mocking, often ironic or satirical remark.Satire:  A text or performance that uses irony, derision, or wit to expose or attack human vice, foolishness, or stupidity.Simile:  A figure of speech in which two fundamentally unlike things are explicitly compared, usually in a phrase introduced by like or as Style:  Narrowly interpreted as those figures that ornament speech or writing; broadly, as representing a manifestation of the person speaking or writing.Subject:  The part of a sentence or clause that indicates what it is about.Syllogism:  A form of deductive reasoning consisting of a major premise, a minor premise, and a conclusion.Subordination:  Words, phrases, and clauses that make one element of a sentence dependent on (or  subordinate  to) another. Contrast with coordination.Symbol:  A person, place, action, or thing that (by association, resemblance, or convention) represents something other than itself.Synecdoche:  A figure of speech in which a part is used to represent the whole or the whole for a part.Syntax:  (1) The study of the rules that govern the way words combine to form phrases, clauses, and sentences. (2) The arrangement of words in a sentence.Thesis:  The main idea of an essay or report, often written as a single declarative sentence.Tone:   A writers attitude toward the subject and audience. Tone is primarily conveyed through diction,  point  of view, syntax, and level of formality. Transition:  The connection between two parts of a piece of writing, contributing to coherence.Understatement:  A figure of speech in which a writer deliberately makes a situation seem less important or serious than it is.Verb:  The part of speech (or word class) that describes an action or occurrence or indicates a state of being.Voice:  (1) The quality of a verb that indicates whether its subject acts (active voice) or is acted upon (passive voice). (2) The distinctive style or manner of expression of an author or narrator.Zeugma:  The use of a word to modify or govern two or more words, although its use may be grammatically or logically correct with only one.

Saturday, October 19, 2019

Engineering Management Assignment Example | Topics and Well Written Essays - 1750 words

Engineering Management - Assignment Example (Marnay, 2006) Research has proved that Micro grid systems can be used to produce electricity. During the recent years, the focus of battery technologies has called for the introduction of independent micro grid systems, which appears to be realistic than the former. Research has also proved that most of the independent Micro grid is often feasible from the lightning as it does not require more voltage compared to the convectional major appliances during the past. There is the recorded upsurge in the efficiency of the PV panels as the cost decreases. Beside, the advance in battery technology has facilitated the provision of greater efficiency as it extends the life of the product being focused. It is also stated that the advanced batteries will play an important role in increasing efficiency in the Micro grid systems. There are also a number of opportunities existing to help eliminate inefficiencies in the AC-AD adapters and help in the incorporation of smart technologies, which is done through th e proper implementation of sensors into specific respective case scenarios. It is important to notice that efficiency in any given level of technology can only be advanced if the organization adopts proper and relevant technology. (Galvin ,Yeager, & Stuller, 2009) In the current times, there are numerous opportunities which are available to help in the testing on the economic viability of the specific kind of the energy system. A number of the non-industrialized world does not have any access to any given type of the electricity. There is the estimation that 79% of the persons who are living in the most of the developing countries do not have any access to electricity. Most of these people still depend on the use of natural energy especially from the sun to help in meeting of their daily needs. This has appeared to be expensive to most of them. It has been realized that even cooking and most of the industrial

Friday, October 18, 2019

Plato and Solomon Essay Example | Topics and Well Written Essays - 1500 words

Plato and Solomon - Essay Example In contrast, Solomon is of the view that that love is rather a convergence of various desires i.e. sexual, ethical or other practical emotions which makes love a matter of rational choice based on human`s subjective understanding of phenomena. Thus, it is clear that on one hand where Plato treats love as a philosophical entity, on the other hand Solomon takes love as reciprocity of emotions based on one`s past experiences. To further elaborate, it is crucial to discuss in detail separately how Plato and Solomon perceived the concept of love. In one of his speeches, Plato clearly reinstated the idea that seeking love is parallel to seeking wisdom. In other words, there is no wisdom in suppressing one`s sexual desires or other similar emotions, rather wisdom lies in training and refining these desires to acquire higher levels of wisdom (Plato 84-85). One of the speeches where Plato presented his idea of love was at a symposium which was central to the social life of Athens, during a discussion on the concept of love. During the speech, the central argument of Plato was to prove that love surrounds the concept of philosophy always, and can`t be understood otherwise. More so, he treats philosophy as the highest of the expressions that love may acquire and further prompts that this philosophy drives us in our everyday affairs (Santas 33). This could further be augmented by the fact that humans develop a se nse of attraction and appeal to beautiful people or aesthetic music as a direct appeal for ‘beauty’ and philosophy is what directs one to desire what is considered to be beautiful. This concept can be related to Aristophanian view of love, alongside Socratian analysis of the conception of love. Aristophanes understands love as one of the forms of some myth. He presents his myth as the genesis of human race, where they had four legs and four arms, also two heads where a few were males and other were females, and yet a few hermaphrodites. Thus, we were

Movie Review of Julie and Julia(2009, Ephron, USA) Coursework

Movie Review of Julie and Julia(2009, Ephron, USA) - Coursework Example She thus develops a simple story line that touches on themes that typically everyone is familiar of. She makes the humorous natures of her story line appear more natural and free flowing. The planning and the design of the comedy drama are simple but funny in its own right. The lead character, Adam, is obsessed by food and cooking. She sets out to cook over five hundred recipes in the three hundred and sixty days in a year which is logically impossible. Adams is employed in a very busy firm where she serves at the call center; possibly she is free on the weekends. This is coupled to the fact that some of the recipes she intends to prepare are very complex and will require a lot of time to complete (Penz and Andong 210). This way, Ephron easily develops a conflict from things that people have and still consider hobbies. Adam gets literally torn apart by the amounting pressure. The recipes are expensive and eat into her finances. The pressure from work coupled with her funny social lif e does not let her settle down to follow the recipes properly. She thus ends up spoiling most of them which is really a waste given the fact that she invested in them. She wines and complains most of the time, a feature that Ephron further uses to create humor. She is a fully-grown adult but the voice she posses can easily pass for a twelve year old. Ephron further uses the structure of the society to add to the humor; marriage is a very sacred institution in which religious adherents believe is ordained by God. Everyone is therefore aware of the institution’ existence and understands how basic it is in the creation of a peaceful and cohesive unity in the society. However, despite the peace that the bible and other holy books preach, families have structural problems some of which are humorous. The play addresses some of the rib cracking decisions that people make in life and how they are later humorously solved. Adam’s obsession with her cookery irritates her husband who tries so much to appear supportive. In a show of love and unity within their marriage, Adam and her husband visit a book fair in Paris where she meets food enthusiasts. The two shares a number of things which makes them develop quite a strong bond. The friendship between the women goes to the men who could have otherwise never noticed each other and they too became close. When Adam’s love for cooking turns into what her husbands calls an obsession, he leaves her. This has been the trend in very many families; when one partner irritates the other, the easiest way is normally to avoid them by possibly walking out of the marriage. Very few people sit down and address the issues in their marriages because boredom sets in among the married very fast. Powell’s husbands considers himself very enduring for the time he spends with Her despite her wining attitude and her little obsessions that deny them time together. Left alone, the lady concentrates on her cooking and her new friend, they write books and try out new recipes and before long, they receive recognition and are about to become famous. In a very interesting twist, the husband who had deliberately left shows up again and Adam accepts him. The society is structured funnily and nobody takes notice of these every quite often. This is the rationale of

Thursday, October 17, 2019

AIDS Essay Example | Topics and Well Written Essays - 500 words

AIDS - Essay Example This essay would further point out the issue of ethics for the research that took place. The children included in the study of AIDS should not have been taken as subjects because it was unjust for them. These children were under the care of foster parents and no real parents would have allowed the research to take place on them considering the side effects of the drugs. Their rights were violated by the medical institutes because they did not appoint an advocate for the whole process. In a research like this it is necessary that a neutral advocate is kept in between so that he can watch over the children and find out if anything wrong goes around. Foster children were chosen as the subjects of the research although these children are not mature enough to decide about their good and bad. Children should never be asked for permission in this matter and the state should have taken up the matter to not allow the research on these children. The family of the children was informed about th e process and side effects that the drug may have on the children. The medical institutes also provided a helpline number along with the possible problems that the child may have to face to the family.

Communicative Disorders Essay Example | Topics and Well Written Essays - 250 words

Communicative Disorders - Essay Example 14). Students with a mild hearing loss might either have a hearing aid, or the teacher might be able to speak louder to him or her than to other students. For a child with moderate hearing loss, one might use a louder voice in addition to flash cards or other manipulatables and visuals to assist in the lesson. According to Gargiulo (2010), â€Å"Pupils with a hearing loss need visual information to learn. Acting out experience-based language lessons or stories is helpful. Using environmental labels around the classroom can start such children on the road to learning language†¦Ã¢â‚¬  (pp. 426). Additionally, teachers teaching students with severe hearing loss should be well-versed in American Sign Language (ASL). If they are not familiar with sign language, they should start learning it so they can communicate with their students whose hearing is nonexistent or very poor. It’s the teacher’s job to make sure that these interventions wouldn’t interfere with n ormal classroom routines by making these interventions part of the routine. Parents cannot be left out of the equation, either. According to Otto (2010), parents are a key component in ensuring that a child has all the support he or she needs to succeed (pp. 3). Parents’ concerns must be addressed. Teachers should share any relevant information with the parents and support them in the education of their

Wednesday, October 16, 2019

AIDS Essay Example | Topics and Well Written Essays - 500 words

AIDS - Essay Example This essay would further point out the issue of ethics for the research that took place. The children included in the study of AIDS should not have been taken as subjects because it was unjust for them. These children were under the care of foster parents and no real parents would have allowed the research to take place on them considering the side effects of the drugs. Their rights were violated by the medical institutes because they did not appoint an advocate for the whole process. In a research like this it is necessary that a neutral advocate is kept in between so that he can watch over the children and find out if anything wrong goes around. Foster children were chosen as the subjects of the research although these children are not mature enough to decide about their good and bad. Children should never be asked for permission in this matter and the state should have taken up the matter to not allow the research on these children. The family of the children was informed about th e process and side effects that the drug may have on the children. The medical institutes also provided a helpline number along with the possible problems that the child may have to face to the family.

Tuesday, October 15, 2019

Untittled Essay Example | Topics and Well Written Essays - 250 words

Untittled - Essay Example The artistic objectives intended by the artist are brought out clearly and excellently in the choice of color. Mentioning an overall black colored sculpture immediately registers in the mind that it was a dull item. The artist, however, made an overall coloring that is rich, bright, vibrant, engaging and that creates visual interest. There is a well-calculated color harmony on the sculpture accompanied by excellent color context between the black color and vivid red. The sculpture is a 3dimension figure with a height, width, and depth made from a solid to a hollow. The method used in designing the sculpture is subtractive, this is where an artist creates an item by carving and removing the extra material used to attain a desired shape. Considering that the sculptures have a small size and almost similar to a vase, implies the artist did not experience a very difficult time building most of it. The bottom part takes a cylindrical shape up to halfway up; the top has a pyramid-like shape designed with simultaneous curves and a small circular opening sinking into the interior. This sculpture is a clear indication of innovative and excellent artistic work carried out carefully. The color choice was excellent, perfect texture, a suitable size for an intimate relationship and focal areas attained their importance of bringing out areas of

Monday, October 14, 2019

Impact of Mass Media Essay Example for Free

Impact of Mass Media Essay Enculturation has undeniably been influenced by mass media. Meanwhile, enculturation is defined as â€Å"the gradual acceptance by a person or group of the standards and practices of another person or culture† (MSN Encarta Encyclopedia Online, 2009). Mass media, on the other hand, is the â€Å"technological means of sending information, ideas, opinion, etc. through the mass commuinication device to a diverse audience† (National Institute of Open Schooling, 2009). In changing and molding the culture, mass media has become an essential factor. Due to the important influence of mass media in enculturation, both has inevitably become inseparable. Through mass media, communication and information dissemination has become more effective and swift. The information about one country is immediately transmitted to another place which will eventually influence that place. The influence of mass media, however, can be good or bad to young people. For example, the young people has also been assaulted with a series of conflicting messages that has relation to human decency, respect for others, and peaceful co-existence in one place through the power of mass media (Deci and Ryan). It is also noteworthy that an artist can easily influence the culture of young people through the power of mass media. Britney Spears, for example, has been an icon in some other parts of the world. Her styles and songs were inculcated in the minds of young people and made others emulate her entirely. Furthermore, the impact on enculturation by the mass media have become stronger because of the techological innovations like the internet. People from other parts of the world has come to understand the lifestyles of others. It has effectively eliminated physical, philosophical, religious, and political boundaries among nations. It can be noted that during the 9/11 attack, the worlds view about terrorists and terrorism have changed. Ramarkably, peaceful talks has also been possible among nations having different religious beliefs and government. Hence, mass media has been an effective means in shaping ones own culture and the acceptance of other peoples culture.

Sunday, October 13, 2019

The Basics Of Trapdoor Hacking Information Technology Essay

The Basics Of Trapdoor Hacking Information Technology Essay For a programmer, trap doors make sense. If the programmer needs to modify the program sometime in the future, he can use the trap door instead of having to go through all of the normal, customer-directed protocols just to make the change. Trap doors should be closed or eliminated in the final version of the program after all testing is complete, but, intentionally or unintentionally, some are left in place. Other trap doors may be introduced by error and only later discovered by crackers who are roaming around, looking for a way into system programs and files. Typical trap doors use such system features as debugging tools, program exits that transfer control to privileged areas of memory, undocumented application calls and parameters, and many others. Trap doors make obvious sense to expert computer criminals as well, whether they are malicious programmers or crackers. Trap doors are an easy way to get into a system or to gain access to privileged information or to introduce viruses or other unauthorized programs into the system. Cases In 1993 and 1994, an unknown group of computer criminals repetitively broke into systems on the Internet using passwords captured by password sniffers. Once on the system, they exploited software flaws to gain privileged access. They installed modified login and network programs that allowed them reentry even if the original passwords were changed. In 1996, Philip Myers described the insertion and exploitation of back doors as subversion in his MSc thesis at the Naval Postgraduate School.   He pointed out that subversion, unlike penetration attacks, can begin at any phase of the system development life cycle, including design, implementation, distribution, installation and production. Donn B. Parker described interesting back-door cases in some papers (no longer available) from the 1990s.   For example, a programmer discovered a back door left in a FORTRAN compiler by the writers of the compiler. This section of code allowed execution to jump from a regular program file to code stored in a data file. The criminal used the back door to steal computer processing time from a service bureau so he could execute his own code at other users expense.   In another case, remote users from Detroit used back doors in the operating system of a Florida timesharing service to find passwords that allowed unauthorized and unpaid access to proprietary data and programs. Even the US government has attempted to insert back doors in code. In September 1997, Congress proposed legislation to ban domestic US encryption unless the algorithm included a back door allowing decryption on demand by law enforcement authorities moved famed Ron Rivest to satire.   The famed co-inventor of the Public Key Cryptosystem and founder of RSA Data Security Inc. pointed out that some people believe the Bible contains secret messages and codes, so the proposed law would ban the Bible. More recently, devices using the Palm operating system (PalmOS) were discovered to have no effective security despite the password function.   Apparently developer tools supplied by Palm allow a back-door conduit into the supposedly locked data. Dumpster Diving What is Dumpster Diving? Dumpster diving is a name given to a very simple type of security attack, which is scavenging through materials that have been thrown away, as shown below. This type of attack isnt illegal in any obvious way. If papers are thrown away, it means that nobody wants them, right? Dumpster diving also isnt unique only to computer facilities. All kinds of sensitive information ends up in the trash, and industrial spies through the years have used this method to get information about their competitors. http://oreilly.com/catalog/crime/chapter/f_02_01.gif Dumpster Diving in Process There is another type of computer-related trash that we might not consider. In the system itself are files that have been deleted, but that havent actually been erased from the system. Computers and users used only to save data, not destroying it, and sometimes some data is saved that shouldnt be saved. Electronic trashing is easy because of the way that systems typically delete data. Usually, deleting a file, a disk, or a tape doesnt actually delete data, but simply rewrites a header record. Using MS-DOS, for example, a file can be deleted via the DEL command, however, someone else can retrieve the contents of the file simply by running UNDELETE. System utilities are available that make it easy to retrieve files that may seem to be completely gone. Although there are methods for truly erasing files and magnetic media, most users who work on large systems do not take the time to erase disks and tapes when they are finished with them. They may discard old disks and tapes with data still on them. They simply write the new data over the old data already on the tape. Because the new data may not be the same length as the old, there may be sensitive data left for those skilled enough to find it. It is far safer to explicitly write over storage media and memory contents with random data and to degauss magnetic tapes. Cases One computer company in Texas that does business with a number of oil companies noticed that whenever a certain company asked them to mount a temporary storage (scratch) tape on the tape drive, the read-tape light would always come on before the write-tape light. The ingenious oil company was scavenging the tape for information that might have been put on it by competitors that used the tape before them. Trashing can have deadly consequences. When some old Department of Justice computers were sold off, they had on their disks information on the whereabouts of witnesses in the Federal Witness Protection Program. Although the data had been deleted, it had not been completely erased from the disk. The DOJ was able to get back some of the computers, but not all, and was forced to relocate the compromised families as a result. In 1991, spies posed as garbage collectors outside of a U.S. defense contractor executives home, dug through trash cans looking for information. One of the collectors was actually Frances consul general and claimed he was collecting fill for a hole in his yard. Upon investigation, the FBI determined that this operation was part of a French secret-searching mission, aimed at finding U.S. military or scientific information. Then in 1999, two key members of a group called the Phonemasters were convicted of theft and possession of unauthorized access devices and unauthorized access to a federal interest computer. This international group of cyber criminals had allegedly penetrated the computer systems of MCI, Sprint, ATT, Equifax and the National Crime Information Center. The Phonemasters skills had enabled them to download hundreds of calling card numbers and distribute them to organized crime groups around the world. Part of their method included dumpster diving and collecting old phone books and system manuals. These tools, combined with social engineering, led to the attacks on the mentioned systems. In 2000, in a widely publicized case, the CEO of Oracle, Larry Ellison, hired private investigators to dig through corporate dumpsters at Microsoft. This was an effort aimed at finding information about Microsofts possible development of grassroots organizations to support its side in an anti-trust lawsuit. One of the investigators unsuccessfully tried to pay off a member of the janitorial service in exchange for the garbage of one of these organizations. Ellison held that his actions were a civic duty, to uncover Microsofts secret funding of such groups, but his opponents assert that the incident was distasteful and scandalous. Microsoft complained that various organizations allied to it have been victimized by industrial espionage agents who attempted to steal documents from trash bins. The organizations include the Association for Competitive Technology in Washington, D.C., the Independent Institute in Oakland, California, and Citizens for a Sound Economy, another Washington D.C. based entity. Microsoft said, We have sort of always known that our competitors have been actively engaged in trying to define us, and sort of attack us. But these revelations are particularly concerning and really show the lengths to which theyre willing to go to attack Microsoft. Saying he was exercising a civic duty, Oracle chairman and founder Lawrence J. Ellison defended his company of suggestions that Oracles behavior was Nixonian when it hired private detectives to scrutinize organizations that supported Microsofts side in the antitrust suit brought against it by the government. The investigators went through trash from those organizations in attempts to find information that would show that the organizations were controlled by Microsoft. Ellison, who, like his nemesis Bill Gates at Microsoft, is a billionaire, said, All we did was to try to take information that was hidden and bring it into the light, and added: We will ship our garbage to Microsoft, and they can go through it. We believe in full disclosure. The only thing more disturbing than Oracles behavior is their ongoing attempt to justify these actions, Microsoft said in a statement. Mr. Ellison now appears to acknowledge that he was personally aware of and personally authorized the broad overall strategy of a covert operation against a variety of trade associations. During the year 2001, industrial espionage came to light concerning the shampoo market between fierce competitors Proctor Gamble and Unilever. Private Investigators hired by Proctor Gamble sifted through garbage bins outside of the Unilever corporation, succeeding in gathering viable information about market analysis, predictions and future products.[16] Upon legal action by Unilever, the two corporations settled out-of-court, because these actions broke Proctor Gambles internal policy on information gathering. Logic Bombs What is a Logic Bomb? Logic bombs are small programs or sections of a program triggered by some event such as a certain date or time, a certain percentage of disk space filled, the removal of a file, and so on. For example, a programmer could establish a logic bomb to delete critical sections of code if she is terminated from the company. Logic bombs are most commonly installed by insiders with access to the system. Logic bombs are a malicious programming code that is inserted into a network system or a single computer for the purpose of deleting data or creating other malicious acts on a specified date. A logic bomb works similar to a time bomb because it can be set to go off at a specific date. A logic bomb does not distribute malicious codes until the specified date is reached. How Logic Bombs Work Logic bombs are created by criminals who are well-versed in computer programming and are generally used to perform acts with malicious intent that threaten network security. The criminal acts include setting a virus to be released into a network system or PC at a specified date or other actions such as deleting or corrupting data and completely reformatting a computer hard drive. A logic bomb works through a code that is inserted into existing software on a network or in a computer where it will lie dormant until a specific event occurs such as a date or time or other command from the computer programmer. When the bomb finally releases the code it can delete files, send confidential information to unauthorized parties, wipe out databases, and disable a network for a period of days. Why a Logic Bomb is Used A logic bomb can be used by a disgruntled employee or other IT personnel that has the knowledge of how to program a logic bomb to threaten network security. Other than targeting a specific computer or network system, a logic bomb can also be used to demand money for software by creating a code that makes the software application into a trial version. After a specific period of time the user must pay a specified sum of money to continue to use the software. Logic bombs can also be used for blackmail and if the demand is not met, the logic bomb will detonate into a computer system or network to destroy data and perform other malicious acts that are included in the command codes. Logic bombs are fairly easy to create if you have a lot of knowledge in computer programming and they do not replicate like other malicious programs. For this reason, logic bombs are usually targeted to specific victims and will not spread to unintended victims. A logic bomb can be rather difficult to detect, however you can take security measures such as constantly monitoring the network system for any suspicious activity, using antivirus applications and other scanning programs that can detect any new activity in the data on a network system. The scanning systems should also monitor the entire network and the individual computers connected to the network. Cases A former system administrator for UBS PaineWebber, Roger Duronio, was charged in a New Jersey federal court on charges of sabotaging two-thirds of the companys computer systems. His alleged motive was to undermine the companys stock price and make a bunch of money in the process. He is alleged to have shorted over 30,000 shares of UBS stock prior to unleashing his attack which means the potential was there to make 30,000 times the amount by which the stock dropped when the media got wind of the attacks. In a recent stock manipulation case involving Emulex, shares fell 50 percent. Based on the trading range of UBS PaineWebber stock at the time of Duronios alleged attack, it is reasonable to say his profits could have exceeded half a million dollars. The flaw in Duronios alleged scheme was the obviously unexpected ability of UBS PaineWebber to prevent news of the attack getting out. This was quite a feat on the companys part because the logic bombs activated on about 1,000 of its nearly 1,500 computers and the malicious programs did actually delete files. Indeed, the company says attack cost it $3 million. In the end, the federal grand jury charged Duronio with one count of securities fraud and one count of violating the Computer Fraud and Abuse Act. Duronio was hit with up to 20 years in prison and fines of more than $1.25 million. In September 1990, Donald Burleson, a programmer at the Fort Worth-based insurance company, USPA, was fired for allegedly being quarrelsome and difficult to work with. Two days later, approximately 168,000 vital records erased themselves from the companys computers. Burleson was caught after investigators went back through several years worth of system files and found that, two years before he was fired, Burleson had planted a logic bomb that lay dormant until he triggered it on the day of his dismissal. Burleson became the first person in America to be convicted of harmful access to a computer. In early 2009, Timothy Allen Lloyd was sentenced to 41 months in prison for leaving behind malicious programs that deleted critical data from the servers of Omega Engineering, a high-tech measurement company that claimed the cost of the attack was $10 million. According to a report in the National Computer Security Association section on CompuServe, the Orlando Sentinel reported in January 1992 that a computer programmer was fined $5,000 for leaving a logic bomb at General Dynamics. His intention was to return after his program had erased critical data and get paid lots of money to fix the problem. In 1995, a disgruntled computer security officer at an insurance brokerage firm in Texas set up a complex series of Job Control Language (JCL) and RPG programs described later as trip wires and time bombs. For example, a routine data retrieval function was modified to cause the IBM System/38 midrange computer to power down. Another routine was programmed to erase random sections of main memory, change its own name, and reset itself to execute a month later.

Saturday, October 12, 2019

If This World Were Mine, by E. Lynn Harris :: Essays Papers

If This World Were Mine, by E. Lynn Harris In the hilarious â€Å"just keepin’ it real† style novel, If This World Were Mine, by E. Lynn Harris, a group of friends decide to start a journal club, like they did back in their college English class. This story is told by each and all takes place in the 90's around the Thanksgiving and Christmas holidays. Sometimes it is easier to put your thoughts on paper rather than express them out loud. A group of college friends decides to restart their journal club called, If This World Were Mine. The group includes Yolanda, single, independent, and not looking for a man. She was once married, but her husband wanted to travel, while she was ready to be stable. Then there’s Dr. Leland Thompson, gay and single. Riley Woodson, the epidimy of beauty. She’s married to her college sweetheart Selwyn, who is also a member of the journal club, and they have a set of twins’, Ryan and Reginald. Dwight Leon Scott is also a member he is divorced and mad at the world. He was married to Kelli, a former member of the group. She left because Dwight wouldn’t. The group has monthly meetings where they eat, drink, and read and discuss their journals. Each member of the group always brings something to read to the meeting, but they never read what is really going on in their lives. Th ey all feel like they have to impress the other members, which defeats the whole purpose of the journal club. The climax of the story begins when Leland’s client, Taylor Wilson called and asked to have an emergency meeting. After Leland’s secretary scheduled the meeting and Taylor made it to the office, he began to tell Leland what was going on. At the same time Yolanda was in New York handling some business and also visiting John, her new guy friend. One day she went to John’s apartment on surprise and got a bigger surprise than she expected. While back in Chicago, Taylor was still talking with Leland about the man he saw that he had met back in the days when he was a family court judge. They had an affair and caused him to divorce his wife and leave his kids and career. Taylor told Leland about the man’s gray eyes which made Leland think about Yolanda’s new guy friend.

Friday, October 11, 2019

Unplugged: Mobile Phone and Portable Music Player

Unplugged The world is full of technology; Almost everywhere you look you will see some form of technology, from a cellphone that can speak to you, to a computer that can run anything your heart desires. As Martin Lindstorm writes in his article â€Å"Friends who have accidentally left home without their iPhones tell me they feel stressed-out, cut off and somehow un-whole. † (Lindstorm). People tend to be overly attached to their phones, as if they were people capable of loving them back.I see how this could be possible because your phone does connect you to the people that you care about and when you can’t contact them life is a little bit more difficult. The people of this country seem to always need the fastest and newest piece of technology, often because it is viewed as a part of one’s social status. For this assignment I was tasked with going a full 24 hours without using technology. Since, society is so connected, I found this project to be very interestin g, and relevant to the present day.This seemed like it would be an easy task that would not take much effort or thought; however a simple 24 hours unplugged from technology subsequently unplugged me from the world. I have never seen myself as someone who needs their devices so much; however we often learn new things about ourselves. Once I began tracking my usage I noticed for the first time how much I use technology. I thought that I only used my phone and other technology when the situation required it as well as a little bit of recreational use. In my usage log I recorded mostly a few texts, my laptop usage and the movie I watched on my Xbox.I did more in my trial period then my log shows. I texted more then it displays; I really texted people once or twice to set up plans with them to hang out later in the day. I also did not record every time I checked my phone for the time; I forgot at the start and then realized that my phone is really just a rectangular clock. I realized tha t I use my phone mostly just to see what time it is because I always have it on me so it is always the first place I look for the time, instead of running around trying to find a clock.It opened my eyes to my frequent usage and excellently foreshadows my experiences the next week. Getting away from technology is a difficult task today. I found my hardest task was not stopping myself from using technology but instead distracting myself from those who were using it. In an article for Time magazine, Dalton Conley writes, â€Å"children ages 8 to 18 spend 7 hours and 38 min. a day using entertainment media† (Conley). People are using their technology all the time, making difficult to avoid.For example, my roommate loves his music and it was impossible for me to be in my room without listening to it so in this aspect I failed to go the full 24 hours. Still, I made it through most of the day without technology but I was left thinking that the only true way to be able to successfull y complete this assignment is to stop everyone from using technology. Today everyone has some kind of a phone, portable music player or handheld game. This is why this assignment is so difficult, because even though you are not allowed to use technology everyone else is.Every junction yields a reminder that the use of technology is restricted; a reminder of what you cannot do which then provokes you to break the rules. My experience was not difficult because of my deprivation but because everyone else still could. We rely so much on technology and to be the only one not using it makes the world just seem to pass by. Time seems to slow down, and the more I think about it, is not because I couldn’t use technology to pass the time but because everyone else still was. My 24 hours unplugged were spent doing almost nothing.I decided to go from 6pm on Friday to 6pm on Saturday, not that smartest idea. I started hanging out with my friends about 15 minutes before 6, which was good so that I could hang out with them without having to use technology to make plans. But the next morning was a different story. I didn’t plan for the morning because I wasn’t thinking of the fact that I wouldn’t be able to use technology. So I wound up just sleeping until about noon and then didn’t really do much for the rest of the time. I tried to study some chemistry but to no avail to do to the fact that I needed to look something up but I couldn’t.Experiences can change us. We can look at the world completely differently because of one small adjustment to our routine. This assignment has changed my perception of myself. I started out thinking that I didn’t really use technology much and that it didn’t completely run my life and that I could live without it. However; now that I have grown used to my phone in my pocket and my laptop on my desk, they are comfortable parts of my life and are hard to do without. I don’t know if I could go longer than 24 hours but I think I would be willing to try this again with a different view and a etter plan of attack; a view that technology is important in my life and a better understanding of how I use it. Admittedly I had a bit of trouble finishing this assignment but I think it is because I could not escape technology, it was everywhere I turned. In an article by Tamar Lewin, the author noted â€Å"The average young American now spends practically every waking minute — except for the time in school — using a smart phone, computer, television or other electronic device, according to a new study from the Kaiser Family Foundation. (Lewin). Most of society is wrapped around their technology unable of putting it down. I now acknowledge that I need technology to stay connected to the world and up to date with my homework. It is a vital part of my life that previously I did not think was essential to my day to day life. I saw technology as a toy to be enjoyed but now I see it as a very important tool to accomplish the task at hand.

Thursday, October 10, 2019

Organizational Behaviour Learnings

Organizational Behaviour Learnings: OB course has given me a better understanding of the behavioural processes in an organization and provided me with a guideline for tackling various situations that I am likely to come across and be better equipped to function as a future manager within any stage of my work-life. During my work life at TCS,I have come across various kind of people. Some of them being arrogant,stern,unapproachable vis-a-vis others who were friendly, helpful and always in high spirits. Initial days the question I kept asking to myself was to do all the work assigned to me by myself or should I seek help from my colleagues. It was the initial steps I was taking into an unknown corporate jungle and I was full of doubts. One of the learning’s I had was how to balance work and life. There were periods of long working hours when we will have to work extra hours and come to office during the weekends. Along with this there was continuous phone calls asking for updates and the likes during the few hours I got to spend away from work. As a beginner I was eager to do more work and take on the added responsibility. But as the pressure mounted it was affecting my physical and mental self. OB gives us an insight into such a situation upfront and offers on how to tackle them to have a balanced work-life. One other key things one has to learn is to say NO to things. Even if you are the smartest and most hardworking employee on the planet ,it is impossible to do everything by yourself. We must learn to turn down the tasks which we logically could conclude that we wont be able to finish within the timeline and also learn to delegate and share work. Pursuit of career growth is only one facet of life and we must learn to juggle between the various other roles of life also. As I took up the role of leading a team of 20 people, the various uncertainties such as whom to assign what work, how to manage deadlines coming from superiors, learning the art of allocating time between meetings and dealing with various team dynamics as a manager came to life. Task allocation had to be done judiciously, prioritizing the work at hand and assigning it to the right people. I soon had 3-4 team members who were very enthusiastic and ready to take upon more challenging tasks and on the other hand a few who were very laid back and didn’t take work seriously. The trick was in assigning the high priority challenging tasks to the first kind and the mundane tasks to the other. Alongside this I used to talk to all my team members if they were dissatisfied with what they did and how I could make work-life better for them. As we fill into the shoes of a manager, we move from an individual perspective to managing a team wherein each of the team member has to be understood and also the team dynamics. OB learning comes in handy as it teaches us about how the team dynamics differs from an individualistic point of view. I handled multiple tasks within the project and hence had to work under different people, each having his/her own take on their subordinates and they treated them differently. We should understand the nature of the people we work under and modify the way we present ourselves to them as each one’s expectations will be different. This is where Interpersonal communication and relations that we learn in OB helps us to evolve with our Boss. OB also teaches us about how to handle emotions and personality in a work environment. There were many situations where I got frustrated with my Boss or with my team mates. This naturally happens as we are working on stringent timelines and clash of ideas are likely to happen. Maintaining composure and dealing with such emotionally challenging situations can define your personality among your colleagues. Another vital factor is the motivation we expect from the work – life. Personally I always was focussed on climbing up the corporate ladder and looked forward to new challenges. During initial phases I was subjected to monotonous, time consuming work. I was going off-course and there wasn’t any motivation in me to work. My manager noticed this and after a brief talk, she understood the negative effect it was having on me and further gave me different role and responsibility which instilled new life in me to work and bought back the urge in me to perform. Understanding what you want, your hygiene and motivating factor early will enable you to enjoy your work and hence have a positive effect overall. Also the lure of an onsite was an added motivation that many employees shared in hope of earning big bucks and spending time overseas. Organizational politics is an unavoidable part for any employee . Its a social work group where biases, favouritism’s and down-play rules. I also got entangled and initially caught unaware on which side to take. There are multiple teams in parallel and taking side with one senior or group will irk the other. Here is where tactfulness and being smart counts and here we must also learn to utilise the art of persuasion. A persuader must match his emotional fervour to the audience’s ability to receive the message and use the smarter way of negotiation. Many a times during my work life I had to convince the team members about the importance of work they are doing and the impact it carries within the project. Also as a team lead I had to persuade and convince the project manager of the additional resources I needed or for extending the timelines. Another aspect that forms the crux of OB is the way of communicating yourself and making yourself being heard. In a MNC with the large work group and complex hierarchies, one must really put in the extra effort to be heard amongst the crowd. For me, I learnt the secret lies in persistence and not giving up when you are ignored. If you give up no one is going to care about what you told and its brushed aside. On the other hand if you can reason yourself and understand whom to communicate it to within the hierarchy it makes all the difference. Working as a part of an Agile team we used to have daily stand-up meetings with the onsite where each days performance was analysed and commented upon. A manager has to be prompt in explaining his team’s daily activities and resolve any conflict that occurs due to clash of ideas. A team goal is defined at the start and objectives are laid which are pursued by the team. Whilst the manager has to deal with the complexities occurring in the work place, a leader is one who has to deal with the change. We had a leader who kept a watch on the proceedings and kept looking for other alternatives, technology advancements, client requirement changes etc and incorporated some breakthrough changes which redefined the goals and objectives that was set in initial stages. The drawbacks I found in OB learning was the extend up to which these theoretical learning’s could be taken over and practically applied to the ever changing and fast paced workspace. The theories and case studies are rational and very relevant to the current organizational scenario. But the effectiveness it can deliver as a pure theory subject is what raises my concern. Unless we learn these behavioural norms in an active way like learn it while experiencing it ,these theories will remain just as a dormant learning within us. The effectiveness could be brought in by giving more role plays and real life case studies which can be solved by us by creating a virtual organizational simulation inside the four walls of a classroom.

The Battle of Vicksburg

The object of contention in the Vicksburg campaign was the Mississippi River, which bore the same relation to the seceding Southern States that the Hudson bore to the rebellious Thirteen Colonies in the Revolutionary War; it divided them into two parts (Ballard(1) 3-5). If the Union forces could get control of this river they would split the Confederacy in two, and stop the passage of supplies and men to the Confederate armies in the east from Arkansas, Louisiana, and Texas (Ballard(1) 72). This was a purely military consideration, but there was also a political and commercial consideration.The Mississippi was the great highway of trade between the Northwestern States and the outside world; so long as any part of it was controlled by Confederate batteries the highway was closed (Ballard(1) 8). The Confederates in the first year of the war controlled the middle portion of the river by the forts at Columbus, New Madrid and Island No. 10, Fort Pillow and Fort Randolph (Ballard(1) 18). C olumbus was evacuated a short while after the fall of Forts Henry and Donelson (Ballard(1) 27). General Pope, with the help of Foote's fleet, captured New Madrid and Island No. 10, in April, 1862.The victory at Shiloh (April 6 and 7, 1862) advanced the Union line southward to the Memphis and Charleston Railway, Fort Pillow was abandoned by the Confederates on the 4th of June, and Fort Randolph the next day (Ballard(1) 42-43). At this time the Federals and the Confederates both had fleets on the river. Foote's fleet, now commanded by Commodore Davis, Foote being still disabled by the wound he received at Donelson, pushed on down the river, as one Confederate post after another was evacuated or taken. On May 10, 1862, the Confederate flotilla had attacked the Union fleet at Fort Pillow and been defeated (Shea and Winschel 10).On June 7 the Union squadron attacked the Confederate fleet at Memphis, destroying three of its vessels, damaging others, and driving the fleet southward. The Ma yor of Memphis immediately surrendered the town to Davis. The river was now open southward as far as Vicksburg (Shea and Winschel 11-12). On the 25th of April, 1862, Farragut's fleet had arrived at New Orleans and taken possession of that city; in May the fleet moved up the river and took Baton Rouge and Natchez, and, with the assistance of a small detachment of land troops, tried to take Vicksburg, but failed (Shea and Winschel 35-37).The Confederate authorities, now appreciating the importance and the peril of Vicksburg, had it strongly garrisoned and provided with batteries to command the river. By direction of the authorities at Washington, Farragut, with his fleet of ships and gunboats, and General Williams, with a small force of artillery and infantry, made another unsuccessful effort against Vicksburg, toward the end of June, 1862 (Ballard(2) 16-17).Vicksburg was now the only point of the river held by the Confederates, but in August General Breckinridge garrisoned Port Hudso n, two hundred miles below Vicksburg, and began setting up heavy batteries there to command the river. Thenceforward this point, also, was occupied by the Confederates until after the fall of Vicksburg. The Confederates also regained control of the river as far northward as Helena, Arkansas. (Ballard (2) 45-47). Such was the situation along the Mississippi in September, 1862.Halleck, having captured Corinth and dispersed his army, had gone to Washington to assume the office of Generalin-Chief, leaving Grant â€Å"in command of all troops in the vicinity of Memphis and Corinth and as far back as Columbus, Ky† (Ropes 35). Buell and Bragg were in their race for Kentucky, and Grant's forces had been drawn upon to reinforce Buell's; Grant now had only about 42,000 men. With these he was required by Halleck to guard the railway from Memphis to Decatur, two hundred miles, and keep open communication with Buell. This constrained him to a passive defensive attitude for the time (Balla rd (2) 186-87).The Confederate troops in Mississippi composed two independent commands, each about 16,000 strong. One force under Van Dorn; the other under Sterling Price. On the 2nd of September Price received word from Bragg that Rosecrans, whose â€Å"Army of the Mississippi† formed the left of Grant's line, was about to march to Tennessee in order to join Buell. Bragg asked Price to prevent this movement. Accordingly, Price asked Van Dorn to join forces with him to attack Rosecrans. Van Dorn agreed to join him, but replied that he should not be able to assemble his scattered forces before the 12th of the month.Fearing that this would not be early enough to catch Rosecrans, Price moved out without waiting for Van Dorn. On the 14th he occupied Iuka. About the 18th Price and Van Dorn arranged to join their forces at Rienzi for an advance against Corinth (Shea and Hess 303-113). Meantime Grant had been watching the movements of Price and Van Dorn, and had resolved to attack P rice at Iuka, before he and Van Dorn could unite their forces. To this end he assembled Rosecrans's command and Ord's division at Corinth, and started them toward Iuka.Rosecrans took the roads by way of Rienzi and Jacinto, and was to approach Iuka from the direction of the south. Ord marched by way of the railway, and was to attack at the same time from the north and west. The combined attack was to drive Price against the Tennessee River. As usually happens with marches of concentration, this one miscarried. The upshot was, Rosecrans approached by one road only from the south, and attacked the Confederates without Ord. Darkness ended the combat, and during the night Price slipped out by the other road [the Fulton road] to the south (Ballard (1) 75-77) .Rosecrans and Ord returned to Corinth. Van Dorn and Price met at Ripley on the 28th of September, and Van Dorn took command of their combined force by virtue of his rank. Van Dorn marched the united force by way of Pocahontas and Che walla, and formed line of battle to the northwest of Rosecrans's position, near intrenchments at Corinth, on the morning of October the 3rd. The Confederates attacked, and by sunset had driven the Federals into the redoubts at the edge of the town. The next morning Van Dorn renewed the assault.The combat was ferocious; but by noon it was over, and the Confederates were retreating from the field. Rosecrans made no pursuit until the next day. Van Dorn made good his retreat to Holly Springs. Rosecrans and Hurlbut pursued to Ripley and were then recalled by Grant to Corinth and Bolivar. General Pemberton was now sent to Mississippi to take command of all the Confederate forces in the State; Rosecrans was called from Grant's army to relieve Buell of the command of the Army of the Ohio. Grant was promised by Halleck a â€Å"large body of new levies,† and he purposed taking the offensive without delay (Reed 88).Meantime McClernand was in Washington working out a secret scheme with t he President and the Secretary of War, by which he was to raise a volunteer army in Indiana, Illinois, and Iowa, and lead it down the Mississippi to capture Vicksburg. No intimation of this project was given to General Grant, but Halleck, of course, was informed of it. The result was that when Grant first wrote to Halleck (October 26) asking leave to move against Vicksburg, he received no reply to his letter. Then followed several contradictory and vague dispatches from Halleck, which kept Grant for some time guessing what he was expected to do.At last, however, it was arranged that Grant should move with the main army from Grand Junction to Holly Springs, and be joined by Sherman with the troops from Memphis, on the Tallahatchie River. A force from Helena was to move across the Mississippi and threaten the Confederate rear at Grenada (Reed 92-95). At this time Van Dorn commanded the Confederate forces about Holly Springs-some 24,000 men, formed in two divisions, under Price and Lov ell. Vicksburg was garrisoned by 6,000 Confederates, and Port Hudson by 5,500. Pemberton had his headquarters at Jackson.By the 5th of November Grant had reached Oxford with the main body, and Sherman was at College Hill, a few miles northwest of that place. The force from Helena had carried out its part of the plan and had returned to Helena. Van Dorn had fallen back, before Grant's advance, to Grenada. Up to this time Grant had advanced with no very definite plan, except to attack the enemy if he overtook him. But Van Dorn, by Pemberton's order, had kept falling back. As Grant's line of communication was now more than 200 miles long-a single-track railway back to Columbus, Kentucky,-Grant established a secondary base at Holly Springs.After considerable correspondence with Halleck, and the discussion of several plans with Sherman for the capture of Vicksburg, it was finally arranged, with Halleck's approval, that Sherman should return to Memphis with one division. There he was to p ick up all the newly arrived troops, and, with the troops under Steele from Helena, he was to organize an expedition to move by transports, under escort of Porter's fleet of gunboats, to Vicksburg, while Grant marched his army along the left bank of the Yazoo against the same objective. Sherman was back at Memphis by the 12th of December, and set out for Vicksburg on the 20th (Reed 104-106).But events occurred which prevented Grant from carrying out his part of the plan. As a consequence of raids Grant was forced to place his army on short rations, fall back to the Memphis and Charleston Railway, and open communications with Memphis. No supplies were to be had in the country; it had been stripped. Sherman, in the meanwhile, had gone down the Mississippi. He had a force of 32,000 men and sixty guns, which he organized into four divisions. His division commanders were M. L. Smith, A. J. Smith, G. W. Morgan, and Fred Steele.The expedition reached Miliken's Bend, twenty-five miles above Vicksburg, before daylight on Christmas day (Simon and Grant 98-100). Vicksburg stood 250 feet above the waters of the Mississippi, and from there a line of cliffs, known as Chickasaw Bluffs, ran northward twelve miles, to Haynes's Bluff on the Yazoo River. The space between the base of the bluffs and the rivers was a wooded swamp cut up by bayous and creeks (Ropes 71). Pemberton had learned of Sherman's expedition, and had hurried reinforcements to Vicksburg; so that 12,000 Confederates were now intrenched upon the bluffs, awaiting Sherman's attack.This expedition was also to have received the cooperation of an expedition under Banks from New Orleans. Banks, however, got no farther than Baton Rouge Sherman landed his troops, on the 26th of December, at Johnson's plantation, and his columns, on the 27th and 28th, meandered across the swamps and bayous toward the foot of the bluffs. Only one of the columns had a bridgetrain. On the 29th Sherman assaulted the Confederate position, bu t was unable to carry it. He remained in position two or three days, vainly trying to find some way by which to dislodge the Confederates.On the 2nd of January he reembarked his men, and, without opposition, returned to the mouth of the Yazoo. Here he was met by McClernand, with an order assigning that general to command the expedition. The order was dated about the 17th of December (Ropes 74-76). Thus ended in failure the project of a combined movement against Vicksburg by land and water. Works Cited Ballard, Michael B. (1) Vicksburg: The Campaign That Opened the Mississippi. University of North Carolina Press, 2004. Ballard, Michael B. (2) Civil War Mississippi: A Guide. University Press of Mississippi, 2000. Shea, William L. and Hess, Earl J.Pea Ridge: Civil War Campaign in the West. University of North Carolina Press, 1992. Shea, William L. and Winschel, Terrence J. Vicksburg Is the Key: The Struggle for the Mississippi River. University of Nebraska Press, 2003. Simon, John Y. a nd Grant, Ulysses S. The Papers of Ulysses S. Grant: April 1 – July 6, 1863 Vol. 8. Southern Illinois University Press, 1979. Reed, Samuel R. The Vicksburg Campaign, and the Battles about Chattanooga under the Command of General U. S. Grant in 1862-63; a Historical Review. Cincinnati: R. Clarke, 1882. Ropes, John Codman. The Army in the Civil War. Charles Scribner's Sons, 1881.