Wednesday, October 30, 2019

The Legal Liability of Air Traffic Controllers Essay

The Legal Liability of Air Traffic Controllers - Essay Example To determine this, they used black box information, traffic cams, computer simulations and the voice of the pilot himself, who died in the crash attributed the accident to such diverse causes and engine failure, flaws in composite materials and terrorism.[2] After 3 years of investigation the NTSB attributed the catastrophe to structural damage caused or exacerbated by wake turbulence with black box information and the voice of the pilot himself, who died in the crash, confirming this. The first statement made on the cockpit voice recorder ,disclosed by the FTSB, was a reference by the pilot to the distance between him and the plane in front of him, a Japan Airlines Boeing747 which had taken off less than 2 minutes before him, responding to the air traffic controllers concerns about wake turbulence. Lift is generated by a difference of pressure over the surface of the wing. The lower pressure happens above the wing surface while the higher pressure is underneath. This differential causes the air to roll off the wings and trail down from the tips, forming two vortices like tornadoes, rotating out in different directions. Like the wake of a ship, two vessels that pass each other have observable wave action. Boats do it, and so do planes. When one plane passes too closely to another it encounters the wake of air waves. You can't see it, but you feel it. A plane with a lesser wing span looses it mirrored directions, like the wake of a ship. Two vessels that pass each other have observable wave action. Boats do it, and so do planes. When one plane passes too closely to another it encounters the wake of air waves. You can't see it, but you feel it. A plane with a lesser wing span loses its righting moment. Displaced air has some semblance of predictable movement, however; like water, that motion is highly fluid, being influenced by many factors. Such turbulence compromises the ability of pilots to control aircraft, navigators to direct it and the safety of passengers in planes. The range of an airborne wake from a large plane is less than 5 miles.[4] The pilot acknowledged the concern of the ATCO on the radio. It states in the Federal Aviation Regulations Sec. 91.3a - Responsibility and authority of the pilot in command. "The pilot in command of an aircraft is directly responsible for, and is the final authority as to, the operation of that aircraft." According to the pilot's CVR statement there was going be a lot of time between him and that Boeing 747 out in front. He wasn't doing anything wrong. He was just a little closer to the scheduled time of departure. In the immediate post 9/11 context, with altered airport security procedures, this was relevant. The full text of the CVR was not published judgment there was going be a lot of time between him and that Boeing 747 out in front. He wasn't doing anything wrong. He was just a little closer to the scheduled time of departure. Two minutes later he was dead. While specific aircraft regulations can hold blameless the owners of aircraft, (see49 USC 44112 (formerly 49 USC 1404)), the law of torts still allows for the suit of companies on the basis of negligence. AFCO's are responsible for the safe routing of planes within their district during their scheduled assignments, they are not responsible for t

Monday, October 28, 2019

Company background Essay Example for Free

Company background Essay BMW (www. bmw. com) continue maintaining their strong position as one of world’s leader in premium vehicle market besides Daimler-Chrysler, Lexus, and many others. The company established in March 7, 1916 when Bayerische Flugzeug-Werke (BFW) founded. One year later, BFW was renamed to Bayerische Motoren Werke GmbH (BMW) that focused on producing cars and military aircraft at that time. Within several decades in the 20th century, the company performed several acquisitions on Rover and MINI, to name a few. However, the intense competition in automobile industry that becomes more segmented has driven BMW to focus on few brands. Under such circumstances, BMW decided to sell Rover Group in 2000 but still retaining MINI brands in the BMW Group. Therefore, BMW group (www. bmwgroup. com) now has three major brands: BMW, MINI, and Rolls-Royce Motor Cars. The three segments are all in premium cars segment, thus lessen the company’s effort in building brand awareness for their products. Figure 1 BMW Group Website Source: www. bmwgroup. com 1. Business Analysis The Automobile industry is one of the most competitive global industries in the world. This is because automobile companies are generally multinational in nature because they have the need to achieve economies of scale in their production. The automobile industry represents significant portion of GDP in US and Europe. They are considered of significant importance because their existence enables other industries to work. Most automobile markets bring possess significant influence whether in their domestic as well as global markets. Moreover, there is an indication that commencing the end of the 20th century, most of the markets in modern countries are saturated and the new trend of the industry is to find new and developing markets where they can deploy their products. Similarly, automobile manufacturers are tired of facing the cutthroat competition in their markets. The situation drives them to expand their services into Asia-Pacific regions, South East Asia and other developing regions. This strategy becomes the latest trend within the global automobile industry. This generates new trends in automobile designs and their tendencies. Cheaper and fuel-efficient cars are the design of this decade. Concerning the many facets of automobile industry, below is several business analysis tools that assess how the market behave, especially relates to development of premium markets where BMW serves. 3. 1 Strategic group: BCG Matrix As mentioned previously, BMW (Bayerische Motoren Werke) maintains three major brands in their portfolio. Each of them has somewhat similar markets, the premium cars, but the company further determines particular markets that each of the product portfolio serve. This strategy is carried out to avoid unnecessary cannibalism among their products. In order to analyze the performance of each product portfolio in BMW group, we can use BCG Matrix. The matrix is named after the founder, Boston Consulting Group, a well-known global business consulting firm. The basic philosophy of Boston Consulting Group (BCG) Matrix is to assess various Strategic Business Units (SBUs) in a company portfolio. By definition, an SBU is a business unit in a company that has its own missions and objectives. It could be departments, divisions, or subsidiaries. In case of BMW group, the SBUs can be BMW product lines such as BMW 3, 5, 7 series, MINI, and Rolls-Royce Motor Cars. The BCG Growth-Share matrix composes of four quadrants that each describe BMW product lines in relation to market share and market growth rate. The BCG matrix helps BMW to understand each of their product’s life cycle and position in the market better by charting each product in one of the four quadrants. Figure 1 shows the BCG Matrix of an organization: Figure 1 BCG Matrix Source: Tutor2U, 2007 The upper left quadrants in the matrix are stars. Stars are business units or product lines within BMW Group that undergo high growth or have strong position in the market. In other words, stars are business units that have large market shares in a fast growing industry (‘Boston Consulting Box’, 2005). The characteristics of stars are they generate cash and thus revenue for a company. However, as the market for the products grows rapidly, they require extensive investment to maintain their lead. If the strategy is successful, a star will soon become a cash cow when its industry matures. In case of BMW, the stars are their USA division since the marker experience fast growth. In 2003 alone, the USA division records a history since it become the Group’s strongest market with 8. 0% growth or represents the sales of 277,037 units in the 2003. In terms of product line, the stars are BMW 7 series as they continue achieving a growing pattern of sales. In 2003, the sales of BMW 7 series rose 8. 2% compared to previous year. Another star is BMW X5 that record a 4. 6% of growth or represents the sales of 105,554 units. The second quadrant in the lower left is cash cows. It is similar to main sources of revenues/income for a company where it represents a product line(s) that continue exhibiting low-growth businesses or they have a relatively high market share (‘Boston Consulting Box’, 2005). Cash Cow is a business unit that has a large market share in a mature, slow growing industry. Due to the slowing down of market growth, cash cows only need little investment and generate cash that can be used to invest in other business units. In BMW case, the cash cow is the home market, Germany. In the home country, BMW experiences declining trend in which in 2003, it recorded -0. 9% of growth compared to the previous year. Meanwhile, concerning the product lines, the cash cows are BMW 3 series and 5 series. The BMW 3 series, for example, have many models that all of them continue showing declining sales volume. The sales of BMW 3 series Limousine, for instances, decline by 5. 9% compared to 2002. Similarly, the sales of BMW 5 series also plummets by -23. 5% compared to the previous year sales volume. In the upper right of the matrix lie question marks. It represents BMW product line(s) that exhibit low market share but operate in higher growth markets (‘Boston Consulting Box’, 2005). These business units require resources to grow market share, but whether they will succeed and become stars is unknown or potentially less likely. The last quadrant is Dogs. They are BMW’s products lines that have low relative market share in unattractive, low-growth markets (‘Boston Consulting Box’, 2005). It means that dog is a business unit that has a small market shares in a matured industry. A dog may not require substantial cash, but it ties up capital that could better be deployed elsewhere. If a dog has no other strategic purpose, it had better to liquidate the product lines since the product lines have little opportunities to gain market share. Based on the above analysis, we can decide which BMW brands belongs to quadrants in BCG Matrix as following.

Saturday, October 26, 2019

Suez Crisis :: Middle East History

Suez Crisis The Suez Crisis marks major shift in the power relations of western Europe, signalling the rising importance of cold war politics in international crises, The Crisis has a big impact on Canada and our peace keeping ability's.Lester Pearson's idea to stop the crisis hepls show that we are a peacefull nation. Firstly, The Suez Crisis began on 26 July 1956, when United States' decision to withdraw its offer of a grant to aid the construction of Egypt's Aswan High Dam, Egyptian President Gamal Abdel Nasser nationalized the Suez Canal.(1) The governments of Britain and France secretly began planning for an invasion of Egypt. Israel soon was doing its own invasion planning, completing its final plan on 5 October. After several international mediation efforts had failed, Britain and France agreed in mid-October 1956 to undertake a joint intervention in Egypt. Aware of the upcoming Israeli plan to invade the Sinai, French officials suggested that a France-British force could enter Egypt and separate the combatants, while actually seizing control of the entire Suez waterway.(2) On 26 October, the United States learned of Israel's military mobilization, and President Dwight Eisenhower sent the first of two personal messages to Israeli Prime Minister Ben Gurion asking that Israel do nothing to end anger the peace. In the Mediterranean on the 28th, the U.S. Sixth Fleet was placed on alert.(3) Undeterred by U.S. diplomatic maneuvering, Israeli forces began attacks in Egypt on 29 October.The canal had many useful reason like trading, and to to have Nassar take control of stopped any other country from trading with country's like Isreal and this also stopped isreal from exporting their goods. No one predicted Nasser's nationalization of the Suez Canal on July 26,1956.(4) Four interconnected events prepared the way for Nasser's greatest moment: the Evacuation Treaty of 1954, the Baghdad Pact, the Czech arms deal, and the Aswan Dam negotiations. Nasser began a diplomatic campaign to restore Egyptian dignity and get the British out of Egypt. The British planned to create a Middle Eastern collective security organization similar to that of NATO and SEATO to protect their interests in the region. The US supported the idea but would not consider joining any such agreement. The Presiden t traveled to Egypt in 1953, because be believed Britain should consider Egypt for the base of the organization.(5) He quickly realized that neither Nasser nor his people would ever consent to such a deal. Suez Crisis :: Middle East History Suez Crisis The Suez Crisis marks major shift in the power relations of western Europe, signalling the rising importance of cold war politics in international crises, The Crisis has a big impact on Canada and our peace keeping ability's.Lester Pearson's idea to stop the crisis hepls show that we are a peacefull nation. Firstly, The Suez Crisis began on 26 July 1956, when United States' decision to withdraw its offer of a grant to aid the construction of Egypt's Aswan High Dam, Egyptian President Gamal Abdel Nasser nationalized the Suez Canal.(1) The governments of Britain and France secretly began planning for an invasion of Egypt. Israel soon was doing its own invasion planning, completing its final plan on 5 October. After several international mediation efforts had failed, Britain and France agreed in mid-October 1956 to undertake a joint intervention in Egypt. Aware of the upcoming Israeli plan to invade the Sinai, French officials suggested that a France-British force could enter Egypt and separate the combatants, while actually seizing control of the entire Suez waterway.(2) On 26 October, the United States learned of Israel's military mobilization, and President Dwight Eisenhower sent the first of two personal messages to Israeli Prime Minister Ben Gurion asking that Israel do nothing to end anger the peace. In the Mediterranean on the 28th, the U.S. Sixth Fleet was placed on alert.(3) Undeterred by U.S. diplomatic maneuvering, Israeli forces began attacks in Egypt on 29 October.The canal had many useful reason like trading, and to to have Nassar take control of stopped any other country from trading with country's like Isreal and this also stopped isreal from exporting their goods. No one predicted Nasser's nationalization of the Suez Canal on July 26,1956.(4) Four interconnected events prepared the way for Nasser's greatest moment: the Evacuation Treaty of 1954, the Baghdad Pact, the Czech arms deal, and the Aswan Dam negotiations. Nasser began a diplomatic campaign to restore Egyptian dignity and get the British out of Egypt. The British planned to create a Middle Eastern collective security organization similar to that of NATO and SEATO to protect their interests in the region. The US supported the idea but would not consider joining any such agreement. The Presiden t traveled to Egypt in 1953, because be believed Britain should consider Egypt for the base of the organization.(5) He quickly realized that neither Nasser nor his people would ever consent to such a deal.

Thursday, October 24, 2019

Comparing the Human Condition in Rosencrantz and Guildenstern are Dead and Waiting for Godot :: comparison compare contrast essays

Comparing the Human Condition in Rosencrantz and Guildenstern are Dead and Waiting for Godot  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚      Inspired by Beckett’s literary style, particularly in ‘Waiting for Godot’, Stoppard wrote ‘Rosencrantz and Guildenstern are Dead’.   As a result of this, many comparisons can be drawn between these two plays.   Stoppard’s writing was also influenced by Shakespeare’s ‘Hamlet’.   Rosencrantz and Guildenstern as minor characters exist within Shakespeare’s world providing Stoppard with his protagonists.   However, the play is not an attempt to rewrite ‘Waiting for Godot’ in a framework of Shakespeare’s drama.     In studying these texts, the reader is provoked into analysing, comparing and contrasting them.   In particular the characters in ‘Rosencrantz and Guildenstern are Dead’ provide intriguing material to consider the human condition.   The characters, their personality traits and responses to stimuli, as well as what directs and motivates them, is worthy of discussion.     Stoppard gives Rosencrantz and Guildenstern an existence outside ‘Hamlet’, although it is one of little significance and they idle away their time only having a purpose to their lives when the play rejoins the ‘Hamlet’ plot, after they have been called by the King’s messenger: â€Å"There was a messenger...that’s right.   We were sent for.†Ã‚   Their lives end tragically due to this connection with ‘Hamlet’, predetermined by the title, but the role provided them with a purpose to their otherwise futile lives, making them bearable.   Their deaths evoke sadness and sympathy leaving the reader grieving for them.   In contrast to Stoppard’s play ‘Waiting for Godot’ is much bleaker in the respect that Vladimir and Estragon seem to have no purpose or direction in their lives.   Their only hope rests on the mysterious Godot who never comes, however they do remain alive at the end.   This leads the reader to question which pair of characters are the most unfortunate.   Rosencrantz and Guildensten may not have been saved from death but they have been saved from the futility of life which Vladimir and Estragon exclaim:   â€Å"We can’t go on like this† yet ironically they are left to do so.     In ‘Waiting for Godot’, we know little concerning the protagonists, indeed from their comments they appear to know little about themselves and seem bewildered and confused as to the extent of their existence.   Their situation is obscure and Vladimir and Estragon spend the day (representative of their lives) waiting for the mysterious Godot, interacting with each other with quick and short speech. Comparing the Human Condition in Rosencrantz and Guildenstern are Dead and Waiting for Godot :: comparison compare contrast essays Comparing the Human Condition in Rosencrantz and Guildenstern are Dead and Waiting for Godot  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚      Inspired by Beckett’s literary style, particularly in ‘Waiting for Godot’, Stoppard wrote ‘Rosencrantz and Guildenstern are Dead’.   As a result of this, many comparisons can be drawn between these two plays.   Stoppard’s writing was also influenced by Shakespeare’s ‘Hamlet’.   Rosencrantz and Guildenstern as minor characters exist within Shakespeare’s world providing Stoppard with his protagonists.   However, the play is not an attempt to rewrite ‘Waiting for Godot’ in a framework of Shakespeare’s drama.     In studying these texts, the reader is provoked into analysing, comparing and contrasting them.   In particular the characters in ‘Rosencrantz and Guildenstern are Dead’ provide intriguing material to consider the human condition.   The characters, their personality traits and responses to stimuli, as well as what directs and motivates them, is worthy of discussion.     Stoppard gives Rosencrantz and Guildenstern an existence outside ‘Hamlet’, although it is one of little significance and they idle away their time only having a purpose to their lives when the play rejoins the ‘Hamlet’ plot, after they have been called by the King’s messenger: â€Å"There was a messenger...that’s right.   We were sent for.†Ã‚   Their lives end tragically due to this connection with ‘Hamlet’, predetermined by the title, but the role provided them with a purpose to their otherwise futile lives, making them bearable.   Their deaths evoke sadness and sympathy leaving the reader grieving for them.   In contrast to Stoppard’s play ‘Waiting for Godot’ is much bleaker in the respect that Vladimir and Estragon seem to have no purpose or direction in their lives.   Their only hope rests on the mysterious Godot who never comes, however they do remain alive at the end.   This leads the reader to question which pair of characters are the most unfortunate.   Rosencrantz and Guildensten may not have been saved from death but they have been saved from the futility of life which Vladimir and Estragon exclaim:   â€Å"We can’t go on like this† yet ironically they are left to do so.     In ‘Waiting for Godot’, we know little concerning the protagonists, indeed from their comments they appear to know little about themselves and seem bewildered and confused as to the extent of their existence.   Their situation is obscure and Vladimir and Estragon spend the day (representative of their lives) waiting for the mysterious Godot, interacting with each other with quick and short speech.

Wednesday, October 23, 2019

Two Gentlemen in Verona

The Abasement of The Upper Class Most people have a predetermined idea of the levels of a social hierarchy. They presume that the upper class is noble, proper and educated while the lower class is of the opposite; the lower class work for the upper class and thus cannot possibly exceed the caliber of the upper class. Shakespeare upends this predetermined notion by utilizing the characters to convey a strong sense of role reversal throughout The Two Gentlemen of Verona.This role reversal upsets the stereotypical social hierarchy and strongly suggests that the upper class may not be as highly esteemed as they are perceived to be. Loyalty is an underlying theme throughout the play. Symbols of loyalty prompt the reader to not only compare the loyalty of a servant’s relationship with an upperclassman’s relationship but also conclude that this comparison often leads to the degradation of the upper class characters. Proteus refers to himself as â€Å"spaniel-like† (4. 2 . 4) in Act 4; however his actions show that he is the direct opposite of what a spaniel, or a dog, should be like. Judging from his fickle actions of suddenly falling in love with Silvia after swearing to remain faithful to Julia, Proteus is unable to have nearly as much loyalty as a spaniel should have. Thus one can conclude that Proteus is not nearly as loyal as a dog. His condemnable actions lead to an abasement of the upper class and gives way to the idea that the aristocratic aren’t as respectable as they seem to be.The relationship between Lance and Crab can be compared to Proteus and Julia. Lance, the servant has an unusually loyal and selfless relationship with his dog, Crab. It is interesting to note that Lance seems to be more loyal or devoted to Crab, than his dog is to him. In fact, Lance even takes the blame and beating for his dog when Crab his caught â€Å"a pissing† (4. 4. 1) under the table. This loyalty can be compared to Proteus and Julia in that La nce’s selflessly devoted relationship with Crab is a parody of the despicably unfaithful relationship Proteus has with Julia.The â€Å"reversed† relationship between Lance and Crab also gives way to a new and important idea for the rest of the play. Upon closer inspection, one can see that the master, in this case Lance resembles the characteristics of a loyal servant, which should be the role played by Lance’s dog, Crab. The unusual reversal of roles that this master and its dog should have, gives way to a recurring idea – prominent throughout the rest of the play, that the characteristics of the lower class and upper class are interchanged.Speed and Lance are two servants who happen to be servants of two deeply in-love masters. In Act 3 Scene 1, Lance claims that he too, is in love and reveals a list of which he has written down the merits of his lady. Typically, one should assume that this list – coming from an uneducated servant, should not exh ibit a great amount of depth or critical thinking; however this list surprises the reader in its logicality and wittiness, and in addition, reinforces the idea of the switching of hierarchal roles. Items on Lance’s list exhibit great practicality such as â€Å"She can sew† (3. . 298) and â€Å"She can wash and scour† (3. 1. 329). Lance also cleverly transforms flaws into virtues when he describes that â€Å"She hath more hair than wit,† or that she is younger than she is intelligent and â€Å"more fault than hairs,† or more flaws than she is young and â€Å"more wealth than faults† (3. 3. 3) which amalgamates to that she is wealthier than flawed since â€Å"that word (wealth) makes the faults gracious† because Lance understands that in real life, level of wealth is a highly influential, and possibly ultimate deciding factor in marriage or a relationship.The realistic and practical nature of the list shows the maturity and intelligence of Lance, which begs to question the nature of the picturesque but fickle and unsustainable nature of the love affairs of the masters, Valentine and Proteus. This once again reiterates the role reversal of social hierarchy and through the sensibleness of Lance and shows that the upper class may not be as intellectual as they are perceived to be. There are also other smaller remarks in scenes that support the notion that a role reversal suggests the idea that aristocrats may not be as intellectual as them seem to be.For example, in Act 2 Scene 1, when Valentine is reunited with his love, Silvia – Speed provides several asides in which he mockingly says â€Å"a million of manners! † (2. 1. 95) in response to Valentine greeting Silvia with â€Å"a thousand good morrows† (2. 1. 93-4). In this series of asides, the audience can see that the servant is sensibly belittling the absurdity of his master’s love for Silvia. An encounter in Act 3 Scene 1 between the Duke and Valentine also pokes at a role reversal when the Duke, perhaps the character with the highest social class throughout the novel, seeks advice on how to â€Å"court† (3. . 85) his lover, from Valentine: a relatively subordinate character. It is arguable that the Duke only asked Valentine for advice as a part of his scheme to figure out how Valentine has been courting his own daughter, Silvia. However, if one looks at the scene and context secluded from the ulterior intentions, the mere act of a superior asking an inferior for advice heavily suggests that the role reversal of characters in The Two Gentlemen of Verona and ultimately, that the aristocratic, or Duke, is not as almighty and wise as he is assumed to be.Finally, perhaps the most prominent manifestation of role reversal and the abasement of aristocrats lies in the exchange between Valentine and Speed. Throughout the beginning half of the play, Valentine disapproves Proteus’s love for Julia and claims t hat by staying at home with Julia, Proteus will have â€Å"homely wits† (1. 1. 2) and wear out his â€Å"youth with shapeless idleness† (1. 1. 8). However during Act 2 Scene 1, Valentine is criticized by Speed, for the negative effects that he has brought upon himself as a result of his love for Silvia.Speed not only brings attention to the fact that only recently did Valentine â€Å"chid[e] at Sir Proteus for going ungartered† (2. 1. 70) but also has somewhat become blinded by love. During Speed’s observation of Valentine’s state in Act 2 Scene 1, Speed condemns Valentine who now â€Å"walk[s] alone like one that had the pestilence† (2. 1. 21) as a result of being in love with Silvia, when Valentine used to â€Å"walk like one of the lions† (2. 1. 27). As a result of being â€Å"metamorphosed with a mistress† (2. 1. 29-30), when Speed â€Å"look on you [Valentine], I [Speed] can hardly think you my master† (2. . 30-1). This exchange radiates the idea that Speed sees things that Valentine is unable to as well as the idea that Speed is wiser and more intellectual than his superior, Valentine. The latter part of the scene where Speed claims that Valentine’s lover, Silvia, is actually â€Å"not so fair†(2. 1. 51) accentuates both Speed’s expert and knowledgeable as well as Valentine’s increasingly dull and inferior characters. When Valentine questions Speed’s observation of Silvia’s beauty, Speed cleverly notes that â€Å"Because Love is blind† (2. 1. 8), Valentine is unable to see the ugliness of Silvia. In this brief exchange, Valentine and Speed play instead, the inferior and superior roles respectively as Speed lectures Valentine on this love-blind issue. Valentine’s aristocratic character is degraded as Speed didactically enlightens Valentine on the effects of love that he is unable to see. It is questionable that because a big portion of Sh akespeare’s audience was of middle and lower class, he conveyed a sense of abasement of the upper class in The Two Gentlemen of Verona.Thus it can be argued that he utilized this theme as a way to provide pleasure for the audience of his work. Nonetheless, through the various exchanges between master and servant, and servant to servant, one can see that the stereotypical roles of the characters are not congruent with their actual characteristics. Lance’s relationship with his dog both parodies Proteus and Julia and allows the theme of role reversal to manifest itself in their unusual relationship.Lance’s practical list of merits provides a sense of integrity and high intellectual capability for other members of the lower class. The Duke and Valentine suggests a role reversal and finally, Speed’s didactic observation of Valentine’s chronic â€Å"love blindness† allows the audience to see the dullness of the upper class and quick wit of lower class. All these examples amalgamate to a reinforced idea that the roles of the upper class and lower class may be reversed and that the upper class are not nearly as intelligent and esteemed as they are perceived to be.

Tuesday, October 22, 2019

Sofa Wars Essays - Patent Medicines, Coca-Cola, Kosher Food, Pepsi

Sofa Wars Essays - Patent Medicines, Coca-Cola, Kosher Food, Pepsi Sofa Wars The soft-drink battleground has now turned toward new overseas markets. While once the United States, Australia, Japan, and Western Europe were the dominant soft-drink markets, the growth has slowed down dramatically, but they are still important markets for Coca-Cola and Pepsi. Globalization has become an important word in the 90?s and Eastern Europe, Mexico, China, Saudi Arabia, and India have become the new "hot spots." Both Coca-Cola and Pepsi are forming joint bottling ventures in these nations and in other areas where they see growth potential. As we have seen in the Japanese video dealing with Coke?s business in class, international marketing can be very complex. As I begin to examine the international soda wars this will become very evident. The domestic cola war between Coca-Cola and Pepsi is still raging, as we clearly know. However, these two soft-drink giants also recognize the opportunities for globalization in many of the international markets. Both! Coca-Cola, which sold 10 billion cases of soft-drinks in 1992, and Pepsi now find themselves asking, "Where will sales of the next 10 billion cases come from?" The answer lies overseas, where income levels and appetites for Western products are at an all time high. Often, the company that gets into a foreign market first usually dominates that country's market. Coke patriarch Robert Woodruff realized this 50 years ago and unleashed a brilliant ploy or in a way a very simple global strategyto make Coke the early bird in many of the major foreign markets. At the height of World War II, Woodruff proclaimed that ?Wherever American boys were fighting, they'd be able to get a [emailprotected] By the time Pepsi tried to make its first international pitch in the 50s, Coke had already established its brand name and a powerful distribution network. During the last 40 years, many new markets have emerged. In order to profit from these markets, both Coke and Pepsi need to find ways to cut through all of the red tape that initially prevents them from conducting business in these markets. One key movement for the soda wars occurd in Europe in 1972, Pepsi signed an agreement with the Soviet Union which made it the first Western product to be sold to consumers in Russia. This landmark agreement gave Pepsi the first advantage. Presently, Pepsi has 23 plants in the former Soviet Union and is the leader in the soft-drink industry in Russia. Pepsi outsells Coca-Cola by 6 to 1 and is seen as a local brand, similar to Coke?s reputation in Japan. However, Pepsi has also had some problems. There has not been an increase in brand loyalty for Pepsi since its advertising blitz in Russia, even though it has produced commercials tailored to the Russian market and has sponsored television concerts. On the positive side, Pepsi may be leading Coca-Cola due to the big difference in price between the two colas. While Pepsi sells for Rb250 (25 cents) a bottle, Coca-Cola sells for Rb450. For the economy size, Pepsi sells 2 liters for Rb1,300, but Coca-Cola sells 1.5 liters fo! r Rb1,800. Coca-Cola, on the other hand, only moved into Russia 2 years ago and is manufactured locally in Moscow and St. Petersburg under a license. Despite investing $85 million in these two bottling plants, they do not perceive Coca-Cola as a premium brand in the Russian market. Moreover, they see it as a "foreign" brand in Russia. Lastly, while Coca-Cola's bottle and label give it a high-class image, it is unable to capture market share. Another country in the hot battleground for Coca-Cola and Pepsi is Romania. When Pepsi established a bottling plant in Romania in 1965, it became the first US product produced and sold in the region. Pepsi began producing locally during the communist period and has recently decided to reformat its organization structure and retrain its local staff. Pepsi entered into a joint venture with a local firm, Flora and Quadrant, for its Bucharest plant, and has 5 other factories in Romania. Quadrant leases Pepsi the equipment and handles Pepsi's distribution. In addition, Pepsi bought 500 Romanian trucks which are also used for distribution in other countries. Moreover, Pepsi produces its bottles locally through an investment in the glass

Monday, October 21, 2019

Charles Lamb “Thoughtless Cruelty” Essay Essays

Charles Lamb â€Å"Thoughtless Cruelty† Essay Essays Charles Lamb â€Å"Thoughtless Cruelty† Essay Paper Charles Lamb â€Å"Thoughtless Cruelty† Essay Paper Most people. at some point of their lives. have tortured inferior insects whether it be drawing the wings off a fly or oppressing an emmet. In the verse form â€Å"Thoughtless Cruelty† by Charles Lamb the reader can see that the writer is so angry about such a thing. The writer uses the poetic devices such as enunciation. rime. and item to depict his attitude toward those who perform such â€Å"Thoughtless Cruelty† . The writer first directs his attending to â€Å"Robert† that has â€Å"kill’d that fly† . The writer so says the adult male was â€Å"devoid Of idea and sense† to hold killed the fly. Here. the writer is connoting that â€Å"Robert† must hold been stupid for killing the guiltless animal. The writer goes on speaking about natural decease as a bird â€Å"devours† it or a â€Å"cold blast in the night† will take its life. By depicting the natural causes of the insect’s decease. Lamb sympathizes for the animal because of its unnatural decease. Lamb continues discoursing that hurting exists in even â€Å"The greatest being† . and even the â€Å"smallest 1s possess† the feeling of decease and hurting experienced before. The writer goes on with more item in the piece about the petroleum wit in the creature’s atrocious decease. Lamb explains. â€Å"The life you’ve taken to provide. You could non make it† that the life â€Å"Robert† has taken can non be restored. no affair how hard he tries. The writer tries to do â€Å"Robert† experience guilty by edifying him. â€Å"A thing which no manner you annoy’d – You’ll one twenty-four hours repent it† . proposing that one twenty-four hours he will recognize his inhuman treatment and morn the decease of the fly. â€Å"The bird but seeks his proper food†¦ May merely take [ its life ] † . Here Lamb goes into more item about the natural decease the fly may hold experienced. â€Å"A life by Nature made so short. Less ground is that you for athletics Should shorter do it. † Lamb once more tries to weigh more guilt upon â€Å"Robert† . â€Å"Although their frame and construction less Escape our seeing. † they still experience hurting and its horrors. Though the rhyme strategy of AAAB. Charles Lamb starts to utilize the poetic device of rime to besides show his attitude. In the first stanza. he talks about how â€Å"Robert. killed that â€Å"fly† . but non count how difficult he may â€Å"try† to â€Å"supply† the life he has taken. he could neer â€Å"do it† . In the 2nd stanza Lamb writes that â€Å"Robert† must hold been â€Å"devoid† of believing to hold â€Å"destroy’d† the fly that he neer â€Å"annoy’d† . and will one twenty-four hours â€Å"rue it† . showing negativeness by sympathising for the guiltless animal. The writer so goes into the natural decease by exemplifying the bird seeking its â€Å"food† . that destiny whose power â€Å"endu’d† the fly thinks the clip is â€Å"good† will take â€Å"it† . Finally. the writer to the full expresses himself when he explains the hurting â€Å"The greatest being† can hold with its â€Å"flesh† that even the fly may â€Å"possess† . little and construction â€Å"less† may get away our â€Å"seeing† . All in all. the writer uses many poetic devices such as enunciation. item. and rime to show his attitude toward. what seems tragic to the writer. event. Even the rubric â€Å"Thoughtless Cruelty† expresses the writers feelings. Thingss may be different now. when you see a fly. drawing the wings off a fly may non look the same.

Sunday, October 20, 2019

Catalase Lab Report

Catalase Lab Report IntroductionCatalase is an enzyme that speeds up organic reactions. (Starr Taggart, 2004, pg. 107). It is important because it promotes the decomposition of hydrogen peroxide, H2O2 (Starr Taggart, pg. 107). Hydrogen peroxide is a byproduct of cell metabolism that is toxic to cells. (Starr Taggart, 2004, pg. 96-97) This reaction can be written as: 2H2O2 2H2O + 02 (Starr Taggart, pg. 96). Oxygen gas (02) is a product of this reaction. The rate of oxygen production will help indicate the speed of the reaction. The purpose of this experiment is to find out how temperature, pH, and concentration affect the rate of oxygen production. The experimental hypotheses are: as the catalase concentration increases, the rate of oxygen production will increase, as temperature increases, the rate of oxygen production will increase, and as the pH increases, the rate of oxygen production will increase. Therefore, the null hypotheses are: the change in the temperature, concentration, or pH will not h ave a statistically significant effect on the rate of oxygen production from the breakdown of hydrogen peroxide by catalase.Hydrogen peroxideIn this experiment, the independent variables are the concentration of catalase, the temperature, and the pH of the reaction. The levels of concentration are 25%, 50%, 75%, and 100%. Five trials were conducted for 25% and 50% concentrations and four trials were done for 75% concentration. The control level, 100% was conducted eighteen times. The levels of temperature are 10o, 22o, and 37o centigrade. Four trials were conducted for 10 and 37 degrease centigrade. The control level, 22o, was conducted eighteen times. The levels of pH are 4, 7 and 10. Four trials were conducted for 4 and 10 pH. The control level, pH 7, was conducted eighteen times.The dependent variable is the rate of oxygen production measured...

Saturday, October 19, 2019

Private Prisons in Texas Research Paper Example | Topics and Well Written Essays - 3000 words

Private Prisons in Texas - Research Paper Example The aim of the creation of private prisons has been for the purpose of making a profit by private entities through the taking over the tasks of convict rehabilitation that were conducted by the government. While this has been the case, the fact remains that there has been a lot of concern about the shifting of legal punishment from the public to the private sector, the logic being that governments, being accountable to the public, are more concerned about the welfare of those imprisoned than private institutions, which have no real interests in the inmates except for the economic benefits that they receive. Therefore, the concerns raised are based on the fact that private prisons may be lax in their establishment of a corrections system that is effective as compared to government held prisons, which have such guarantees. Private prisons in the state of Texas have been criticized to be business institutions whose main aim is to ensure that they maximize their profits, since their driv ing incentive is to make as much money as possible. Plenty of skepticism in such prisons have been raised because of the fact that prisons have now become profit yielding institutions through the imprisoning of individuals caught committing crimes and sentenced. Despite the concerns that have been raised above about the establishment of private prisons, the government of Texas has continued to be adamant that private corporations can run prisons as well as the government itself and that there is no need to worry about these institutions’ doing a bad job. The state of Texas has attempted to delegate the functions of punishment to private companies with the intention of relieving itself of the burden, but also ensuring that these companies remain accountable to the public. While this has been the case, there has developed the need to ensure that these private entities are indeed performing the functions that have been delegated to them with as much diligence as would have the g overnment.1 This has created a situation where studies have to be conducted so that it can be established how the contractual relationship between private prisons and the government, relating to how the formation, maintenance and other aspects of the prisons are worked out between them. When dealing with the formation, the expectations of the private institution as well as those of the government concerning what the prison’s management will require are considered so that it is known how the prison will be developed as well as how it will be staffed. The maintenance of the prison has been outlined as the affairs which will be involved in the daily running of the prison as well as the establishment of the definitions of how the prisoners will relate to each other as well as how they will relate with the members of the prison staff.2 When one considers liability in private prisons, it basically deals with the failure of the parties involved, either the government or the private entity, to fulfill their obligations as stated in the contract between them and the consequences that are likely to follow. Through the insistence of these obligations, it becomes an obligation for both the government and the private entities running the prison to ensure that there is accountability to the public in the process. Thus, accountability can be enforced, whereby there is the protection of the various social groups within the

Friday, October 18, 2019

Specific ways in which the internet has changed the way businesses Essay - 5

Specific ways in which the internet has changed the way businesses operate in the global marketplace - Essay Example Without a doubt, like any other technology tools or applications, this technology is just a technology and it depends on a firm how effectively they make use of this technology. In fact, if this technology is used effectively it can bring a large number of opportunities for the business organizations. For instance, the use of the Internet allows business organizations to catch attention of new customers, retain business relationships with old customers and suppliers, deliver its products and services in a better way, communicate with customers and other stakeholders through more efficient and professional ways, gather data about customers, preferences and retrieve it speedily, and buy and sell more products. In addition, a large number of firms have attempted to make use of the Internet as extraordinary much more than it is (Ray 269). The majority of business organizations as well as individuals are moving their businesses from traditional business infrastructures to web based business environments, believing that by some means this would differentiate them from other business organizations. Without a doubt, a business organization can make use of this wonderful technology in a number of ways and in every application of the Internet brings a wide variety of benefits. In each for, Internet technology offers a number of capabilities. For instance, the Internet plays the role of a bridge for the communication of data. In addition, the Internet is a system that establishes and retains connections with any computer connected to it. In fact, if a company puts its full efforts to have control over these two rules or facilities, it can make use of this technology with greatest aptitude to improve the business (Ray 269). Moreover, the Internet minimizes the gap between the organizations and their customers as it allows business organizations to get access to global markets and reach broad categories of people at the

Multicultural Issues in Human Communication Essay

Multicultural Issues in Human Communication - Essay Example The fact is that many African American students are facing academic problems due to their inability to speak and fully comprehend standard English and, therefore, the use of AAVE as a language of instruction during the transitional stage towards learning standard English, will improve the academic performance of these students and teach them standard English fluency. There are several dialect within American English. As Pei (1958) explains, the coexistance of two or more languages, each fulfilling different purposes, or the same one, is as old as language itself. According to Pei (1958), AAVE is the most widely spoken of these dialects in the United States and its use, as a tool in language instruction, will not threaten Standard English. Indeed, the use of Ebonics as a language of instruction in the transitional stage towards teaching African American students fluency in Standard English, will strengthen, and not threaten, the linguistic unity in the United States. ... The implication here is that the adoption of AAVE will not threaten standard English but can positively contribute to the acquisition of fluency in it. The academic performance of African American students illustrates that there is linguistic disunity in the United States. This can be solved through the use of AAVE as a tool for eliminating the language barriers that exist between blacks and whites. AAVE will not only improve the Standard English linguistic skills of African American students, leading to better academic performance but, will give white teachers the ability to understand their black students as students and not as black students, distinguished from the whites by more than colour. The social psychologists, Williams and Whitehead (1973) have observed that African American children are stereotyped according to whether they speak AAVE or Standard English, creating a communication problem between the student and the teacher. The teacher is unable to objectively evaluate the child and the child becomes nonresponsive to the teacher. As Williams and Whitehead (1973) report subjects listened to dialogues spoken in different d ialects and described the personality of the speaker accordingly. Non-English, or non-standard English speakers were given negative personality characteristics. The authors argue that it is, therefore, important to teach teachers what AAVE is and to help them understand it as a valid dialect and not jump to the conclusion that those who speak it are of poor intelligence, come from poor backgrounds, live in violent neighborhoods and are not very interested in school. Williams and Whitehead (1973) also point out that this attitude is clearly communicated to the African American students and becomes an obstacle to academic

Thursday, October 17, 2019

Vision of the Purpose and Structure of Schools of the Future Essay - 1

Vision of the Purpose and Structure of Schools of the Future - Essay Example This essay stresses that there are some basic assumptions in the views and approaches described in this work towards multiculturalism. The main assumption is that the minority cultures are similar in their differences from the majority culture. The vision assumes that all immigrants have equal access to technology and the necessary know-how. This paper makes a conclusion that the various cultures are so diverse among themselves that there is no single general rule that can handle all these differences at once collectively in order to integrate these cultures with the culture of the majority. The vision does not consider the possibility of any communication gap between the teacher and the immigrant students while communicating or learning online. It would be difficult to find teachers who are experts in both subjects and arts. Employing art teachers for interpreting subject classes will end up with the school having as many art teachers as school teachers. The languages are, in reality, extremely different in their writing systems, structure and interpretation. While some of the languages can be dealt with collectively, some will have to be taken into account separately. Handling these differences would be a Herculean task. Assigning teachers from various cultural backgrounds would likely leave the schools with more hands than they totally need. Furthermore, ensuring a balanced mix of minority and majority teachers would sometimes mean sacrificing or overlooking the abilities and skills of an efficient teacher for the purpose of maintaining the mix.

The Impact of Mobile Computing Technology on Traditional Mobile Dissertation

The Impact of Mobile Computing Technology on Traditional Mobile Telephony - Dissertation Example The researcher would like to thank his supervisor for guiding him at every step along with supporting him in the due process. The support and guidance of all professors has been phenomenal and commendable that enhanced the overall appeal of the research in a great manner. The researcher would also like to thank his University for offering great support in accessing the library and other electronic sources. All these helps proved to be beneficial in enhancing the overall beauty of the research. The researcher would also like to thank his family for all the support, care, cooperation that made it possible to put extra hours in order to come up with a desired piece of splendid research work. They acted as a source of motivation and pillar of strength that added value to the research. The help and support of friends in terms of sharing views and opinions broadened the overall mindset of the researcher along with thinking from different point of views. Overall, the researcher is thankful to everyone who played a direct and indirect role in enhancing the overall purpose of the research along with adding value to it through compassionate support and guidance. The researcher is full with gratitude towards them and wishes them all the best in their life. TABLE OF CONTENTS ABSTRACT 4 Chapter 1.Introduction 5 1.1Reserach Aim 8 1.2 Research Objectives 8 1.3 Research Questions 8 1.4 Rational for the Research Topic 9 1.5 Scope of the Research 10 1.6 Structure of the Research 11 1.7: Summary 13 Chapter 2.0 Literature Review 14 2.1 Introduction 14 2.2 Mobile Computing Technology 14 2.3 Expanding Networks and Opportunities 16 2.4 Mobile Computing Technology in the Modern World 17 2.5 Dawn of Mobile Computing Technology 19 2.6 Benefits of Mobile Computing Technology 21 2.7 Limitations of Mobile Computing Technology 22 2.8 future of Mobile Computing Technology 23 2.9 Summary 23 Chapter 3.0 Comparative Analysis of Nokia and Apple 24 3.1 Introduction 24 3.2 An Overview of Nokia 25 3.3 An Overview of Apple 26 3.4 Comparative Analysis of Nokia and Apple 27 3.5 An Analysis of iPhone and Nokia Lumia 34 3.6 Future Analysis of Nokia and Apple 35 3.7. Future Trends 36 3.8: Summary 37 Chapter 4.0 Research Methodology 38 4.1 Introduction 38 4.2 Research Philosophy 38 4.3 Research Approach 39 4.4 Research Strategy 40 4.5 Data Collection 40 4.6 Sampling 41 4.7 Sample Distribution 42 4.8 Questionnaire 43 4.9 Data Analysis 43 4.10 Ethical Considerations 43 4.11 Strengths of the Methodology 44 4.12 Limitations of the Methodology 44 4.13 Summary 45 Chapter 5 Findings and Analysis 46 5.1 Introduction 46 5.2 Questionnaire Analysis 46 5.3: Critical Analysis 56 Chapter 6 Discussion 58 6.1 Introduction 58 6.2 Summary 65 Chapter 7 Conclusion and Recommendations 66 7.1 Introduction 66 7.2 General Conclusions 66 7.3 Recommendations for Future Research 72 7.4 Recommendations for Apple and Nokia 74 7.5 Final Conclusion 76 References 77 Appendices 80 A: Questionnaire 80 B. Consent For m 82 ABSTRACT The importance of mobile computing technology in the success and development of mobile manufacturing organsiations is not a hidden fact. The research presents a thorough analysis of impact and influence of mobile computing technology on the success and development of organsiations like Apple and Nokia along with conducting a comparative analysis over their hardware and software

Wednesday, October 16, 2019

Vision of the Purpose and Structure of Schools of the Future Essay - 1

Vision of the Purpose and Structure of Schools of the Future - Essay Example This essay stresses that there are some basic assumptions in the views and approaches described in this work towards multiculturalism. The main assumption is that the minority cultures are similar in their differences from the majority culture. The vision assumes that all immigrants have equal access to technology and the necessary know-how. This paper makes a conclusion that the various cultures are so diverse among themselves that there is no single general rule that can handle all these differences at once collectively in order to integrate these cultures with the culture of the majority. The vision does not consider the possibility of any communication gap between the teacher and the immigrant students while communicating or learning online. It would be difficult to find teachers who are experts in both subjects and arts. Employing art teachers for interpreting subject classes will end up with the school having as many art teachers as school teachers. The languages are, in reality, extremely different in their writing systems, structure and interpretation. While some of the languages can be dealt with collectively, some will have to be taken into account separately. Handling these differences would be a Herculean task. Assigning teachers from various cultural backgrounds would likely leave the schools with more hands than they totally need. Furthermore, ensuring a balanced mix of minority and majority teachers would sometimes mean sacrificing or overlooking the abilities and skills of an efficient teacher for the purpose of maintaining the mix.

Tuesday, October 15, 2019

Why Radical Islam Fears Bollywood Pop Culture Essay

Why Radical Islam Fears Bollywood Pop Culture - Essay Example It is evidently clear from the discussion that Islam serves as the third and final religion in the list of the three Abrahamic faiths with Judaism and Christianity as its predecessor beliefs. All these three religions cite their Scriptures not only to preach the teachings, but also exploit the same for their political, social and economic gains. It is therefore the famous maxim was invented that even the devil can cite Scriptures for his own purpose. The same could be applied on the purported extremist organizations including Al Qaeda and Taliban etc, and their satanic-minded leaders Osama bin Laden and his evil companions. By looking into the history of initial years of Islam, it becomes crystal clear that the faith has always been a religion of peace, kindness and compassion, which has treated even its worst enemies on the noblest principles of sympathy and humanity. However, like Judaism and Christianity, its reins and bridles came under the sway and control of the harsh and stone -hearted opportunists, who started exploiting the faith for their personal gains. The same is applied to Al Qaeda, which appears to be determined to create chaos, anarchy and disorder all over the world in the sacred name of Islam. Although the religious-minded people are justified in declaring semi-nude bodies, sexy poses and enticing gestures of women as strictly against the teachings of Islam, which are profoundly being exhibited through the platform of the Bollywood film industry. The Holy Scripture of Islam i.e. the Holy Qur’an asserts: â€Å"And say to the believing women that they should lower their gaze and guard their modesty; that they should not display their zeenah (adornment/make-up) except what must ordinarily appear thereof; that they should draw their khimar (or piece of veil) over their bosoms and not display their zeenah except to their husbands, their fathers.† (24:31-32) Thus, the Muslim Scripture commands the women to observe chastity and veil in o rder to escape the evil and ignoble staring of the licentious people. Somehow, inclusion of the actors from the Muslim community in bulk serves as a certain impediment for declaring singing and dance as vehemently opposite to the true Islamic culture and civilization. For instance, the so-called Muslim actresses of Bollywood including Saira bano, Madho Bala, Nargis, Zeenath Aman, Parveen Boby, Shabana Aazmi, Tabbu, Soha Khan, Katrina Kaif and others have performed very bold and semi-nude roles in the Indian films; while the industry is also abundant in the Muslim heroes including Daleep Kumar, Shahrukh Khan, Naseer-ud-Din Shah, Salman Khan, Fardeen Khan, which also play(ed) the romantic and exotic roles that are against the Islamic teachings. Similarly, the Muslim lyricists, script-writers, directors and choreographers etc including Kaifi Aazmi, Javed Akhtar, Farah Khan and many others have also played their decisive part in the projection and promotion of Indian music, dance and ac ting sectors at large. The analyst Shikha Dalmia is of the opinion that the Indian films are very popular in all Muslim countries, and playing romantic and exotic roles through the Muslim actors and actresses particularly reveal different aspects of the contemporary Muslim showbiz personnel in modern life, participation of which is destroying the Al Qaeda efforts

E-Banking in the Selected Private Commercial Banks Essay Example for Free

E-Banking in the Selected Private Commercial Banks Essay E-Banking is the waves of the future. It provides enormous benefits to consumers in terms of case and cost of transactions, either through internet, telephone or other electronic delivery channels. For many consumers, electronic banking means 24-hours’ access to cash through an Automated Teller Machine ATM or Direct Deposit of paychecks into checking or savings accounts. E-banking is a form of banking where funds are transferred through an exchange of electronic signal between financial institution, rather than exchange of cash, cheeks or other negotiable instruments. The banking industry as a whole, except for the four specialized banks (SBs) rushed to offer technology based baking services during the middle of the current decade. The existing form of e-banking that satisfies customer demand in banking activities electronically throughout the world are PC banking or PC home banking that include online banking, Internet banking, mobile banking and tele banking. The existing modern and innovative technology driven products and services offered by the banking system in Bangladesh includes debit card, credit card, automated teller machine (ATM) cards such as Master Card, Visa Card, Q-cash Card, Point of sales (POS), on line service, tele banking, internet banking, society for worldwide inter bank financial telecommunication (SWIFT), and Reuter. In most of the modern ATMs, the customer is identified by inserting a plastic card which is known as ATM card with a magnetic stripe or a plastics smart card with a chip, that contains a unique card number and some security information such as an expiration date etc. Authentication is provided by the customer entering a personal identification number (PIN). The government’s emphasis on building a digital Bangladesh, setting up ICT park, raising allocation for developing ICT infrastructure, waiving taxes on computer peripherals and other measures including the automation program of banking sector led by the Bangladesh Bank and competition among the scheduled banks in improving customer services have accelerated the prospects of e-banking in Bangladesh. Introduction: There is no official definition of this term, but it generally implies a service that allows customers to use some form of computer to access account-specific information and possibly conduct transactions from a remote location such as at home or at the workplace. Online or internet banking is the next stage in the development of banking services in Bangladesh. The banking system in the country was known for their stability and also stubbornness. The public banks in the country always resisted to any kind of change in their working styles through strikes and walk outs. But after some vigorous training and negotiations the concept of online banking was bought into mainstream banking in Bangladesh. This was already popular in other more developed countries and with the opening up of the banking market to foreign players in Bangladesh it was begging to be implemented in our mainstream commercial banking systems. Internet banking has been so popular in the countries; it has been implemented in so far due to certain reasons. Online Banking makes the regular transactions for a client speedy and time efficient with little or no paperwork involved. There is no need for standing in long ques any more for making a deposit or getting a withdrawal. Banking has turned into a 24/7 service with the bank always available to their client. This especially helps the various businessmen who need the best services at any time day or night. Online banking is the need of the new professional in this modern age who is always on the move and working and trying to succeed in a constantly changing and dynamic environment. There are advantages involved for the bank here as well. Through online banking the bank can attract the more sophisticated clients whose needs can now be met through banking through the internet. Also this makes the banks competitive in the international market and against the best banks in the world. Online banking has positively affected the banks in increasing their customer diversity and improved the quality of clients as well. Objectives of the study: The major objectives of the study are to analyze the present status of e-banking, its various forms, their characteristics, benefits and constraints in Bangladesh. Methodology of the study: The study is based on review of related studies done earlier and secondary information collected through library work. Justification of the study: E-Banking can conveniently manage all our banking needs 24 hours a day, 7 days a week with online banking. This Internet-based solution allows us to manage our company’s finances from any computer with internet access. Online banking application addresses the needs of small, individual and corporate account holders of the bank. This application provides a comprehensive range of banking services that enable the customer to meet most of their banking requirements over the net. Many people find that internet banking is very convenient as the advantages far outweigh any disadvantages. There are many different positive aspects to banking online. One of them is that we can do our banking from home, without having to waste gas driving to the bank or waste time waiting in line. Most banks are eager to get us to try online banking. Check out our banking terms with regard to this option offered by most banks. The history of banking online has always stressed convenience for the customer as well as security. Today, we can not only enjoy secure banking transactions online, but we can have our paycheck automatically deposited into our bank account and have it available that day, instead of waiting until the check clears. In addition to getting automatic deposits, online banking transactions also include automatic bill paying. Instead of having to write a check to pay our bills, we can have the bills that we pay each month automatically deducted from our banking account each month. Internet banking is not just concentrated on our checking account. We can also use internet banking to get a loan. There are some online banks that will offer us every service that a land bank will offer only they exist only online. Our own bank also, most likely, encourages online banking and offers free features such as checking to savings account deposits, automatic bill paying, automatic deposit and home equity loans all with the click of a mouse! Debt management is essential when structuring your finances. Internet banking is the way of the future. Years ago, we had to go to the bank when they were open and wait in a long line to perform a transaction. Today, we can bank from our home without having to wait a second and best of all, online banking is free. With the rapid development of internet, E-commerce and E-Banking are ready to play a significant function in the near future in Bangladesh. The innovative opportunities should be reachable by both large and small companies. But the right commercial and legal system is vital for the constructive augmentation of E-commerce in our country, which is the immaturity level. To ensure optimistic impact of E-banking, information structure, cyber laws and skilled manpower along with environmental facilities are immediately needed. Now-a-days e-banking is a topic of paramount importance. Exploring the available literature it has been found that no in-depth work has been done on the topic till now. But there is a vital nexus between e- banking and economic development in the present era of globalization. So working on the topic is essential for the greater interest of people. In fact, the work has enormous justification from theoretical and practical view points. Review of related literature: Mr.  Mizanur Rahman finds that in Bangladesh, the expansion of e-banking is beset with several infrastructural, institutional, and regulatory constraints such as inadequate availability of reliable and secure telecommunication infrastructure, absence of a backbone network connecting the whole country, poor ICT penetration in the banking sector, lack of skilled manpower and training facilities, absence of supportive policies, guidelines, rules and regulations relating to e-transactions and the like. Despite the constraints, efforts by the Bangladesh Bank in modernizing the country’s payment system and commitment by the government in building Digital Bangladesh’ have brought competition among the scheduled banks to improve banking services and rapidly adopt e-banking on a wider scale. This note provides a critical overview on development of e-banking in Bangladesh and future prospects for better understanding the issue that includes concept of e-banking, present status of scheduled banks in adopting e-banking services, and prospects of e-banking in Bangladesh on the basis of current trend in developing the ICT infrastructure in the country as well as ICT penetration in the banking sector that follows some policy suggestions for BB, Govt. f Bangladesh and scheduled banks so that optimum benefit through c-banking may be obtained. A well functioning e-banking network dependant on availability of a backbone network is connecting the whole country reliable and secure information infrastructure including telecommunication infrastructure; ICT penetration in the banking sector; skilled operational personnel; and legal and regulatory framework. The government, Bangladesh Bank and scheduled banks are related to these issues. Therefore, both individual and joint efforts are needed to overcome the constraints in promoting e-banking in the country. Syed Abdulla Al Mamun and Mst. Nusrat Sharmin had a study on Management Information Systems (MIS) of a Bank. They said that an effective management information system provides users with accurate, timely and relevant information to support organization functions, decision making, communication, coordination, control, analysis and visualization. Thus it provides tremendous economic values of the various industries, particularly banking industry. SCB is a multinational bank. It plays a crucial role in the banking industry in Bangladesh. This paper is a modest attempt to find out the overall management and operational areas of SCB and the role of Management Information Systems (MIS) in its different functional areas. The study shows that SCB uses computer based MIS in every sphere of its management and operation. It continuously up-to-date its information systems installing real time technology to enhance its operational effectiveness as well as to meet the ever changing customer needs. The modem computer based management information system of SCB significantly contributes to its tremendous business performance ensuring real time ommunication in every step of its operation. As a result, SCB, a successful multinational bank operating in Bangladesh, countries to find new and better ways to put technology to its operation and customers’ best use. Moreover, it manages the business risks associated with its technology and investment properly. So the findings of the study can be a good lesson for the local banks and other financial institutions to adopt and manage the modem computer based management information systems. Shihab Uddin Khan wrote an article on security aspects of E-banking: Biometric Technology. He found that an appreciation of the factors that securities encompass is important to understand security for Electronic Banking and related applications. For example, take a simple illustration of Bank Vault, as most would consider a bank vault highly secure. It draws its security from number of factors. The vault is built of strong material and is located in a secure building that offers considerable physical security. Access to the vault is controlled by a sophisticated door and locking mechanism that would require special technical skills and expensive equipment and reasonable time to breach. The physical and technical characteristics of the vault mean that it would take considerable time and resources to breach it. Since both building and vault are protected through automated alarms, attempting to breach the vault carries significant risk of being caught. The likelihood of an attempt on vault is very low. Further, any deposits held in the bank are not actually in the vault so that even if a robbery occurs, there is no loss of the deposits. Thus, the vault has low expected loss. Despite all these factors, from time to time, a bank vault is breached, even then they are widely considered to be secure. Credit card is another such example as most consumers use credit cards and are reasonably comfortable in using these plastic cards. These are considered acceptably secured. The cards and card numbers contain some elements of technical and physical security and few cards contain a picture of the legitimate credit card holder and bear the holder’s signature. Credit card companies deploy sophisticated mechanisms such as analyzing spending patterns to detect fraud. While forging a single credit card may not require much of the organization’s resources, forging and using many cards which may generate a large loss require considerable resources. The credit card holder is protected from loss by laws which limit the holder’s financial obligation losses. Credit card fraud is widespread and a card issuer is certain to encounter fraud, even though the instance of fraud is low compared to the total number of transactions. From a user’s perspective, there are so many cards with widespread use that the likelihood of an individual encountering a problem is very small. Further, the lack of data and message security on the Internet has also become a serious problem due to the increasing number of merchants trying to spur commerce on the global network. For instance, credit card numbers in their plain text form, create a risk when transmitted across the Internet where the possibility of the number falling into the wrong hands is relatively high. Just the thought of â€Å"sniffer† programs which collect credit card numbers, en masse, is enough to keep merchants away from on-line shopping. In short, the lack of business transaction security is widely acknowledged as a major impediment to spread E-commerce. Historically, computer security was provided by the use of account passwords and limited physical access to a facility to bonafide users. As users began to dial in from their PCs and terminals at home, these measures are being considered insufficient. With the advent of remote users on inter-networks for conducting commercial transactions on mobile computers and through wireless technologies, simple password schemes are not sufficient to prevent attacks from sophisticated hackers. However, there are certain peculiarities to the issue of security. The first issue is that security is never absolute. The bank vault though can be breached but is still considered secured. The second peculiarity of security is that there is an economic trade-off among the cost of security, expectation of loss, and the cost of breaching security. From the perspective of an organization, a rupee spent on security is justified when it reduces the expected loss by more than a rupee. When security spending reaches the point where the cost of additional security exceeds the incremental loss reduction, then it offers no more value protection and security is considered adequate. From other perspective, security is adequate when the expected yield is less than the cost of breaching security. For rational asset holders and opponents, the notions are equivalent. The characteristics that define security are two viz. securities are never absolute and security adequacy is an economic decision.

Monday, October 14, 2019

Sql Injection Attacks Pose Computer Science Essay

Sql Injection Attacks Pose Computer Science Essay In recent years, SQL injection attacks pose a common and serious security threat to web applications: they allow attackers to obtain unrestricted access to the database underlying the applications and to the potentially sensitive information these database contain, and it is becoming significantly more popular amongst hackers. According to recent data, between Q1 2012 and Q2 2012, there has been an estimated 69 percent increase of this attack type. [1][2] As you can imagine, a hacker gaining administrator access to your server means that you will have effectively lost all of the data on that server to the invader. Worse yet there is now a beachhead behind your firewall from which attacks on other server and services can now be made. In this way SQL injection can provide access to all company or personal data. In the web environment, end -user privacy is one of the most controversial legal issues, therefore, all types of SQL injections which are dangerous for the components of the web application must be prevented. This article introduces the SQL injection in the first section then provides some techniques for defecting and preventing this kind of attack in the second section. Section 1: Introduction of SQL injection attack SQL injection is an attack technique which can be used by the attacker to exploit the web application; as a result the attacker may gain unauthorized access to a database or to retrieve information directly from the database. Attacker can exploit SQL injection vulnerabilities remotely without any database or application authentication. SQL injection attackers are straightforward in nature an attacker just passes malicious string as an input to an application for stealing confidential information. There are four main kinds of SQL Injection attacks [3]: SQL manipulation, Code injection, Function call injection and Buffer overflows. SQL manipulating usually involves modifying the SQL query through altering the WHERE clause. In this class of attack, amend the WHERE clause of the statement so the WHERE clause constantly results in TRUE [4]. In the case of code injection an attacker introduces new SQL statements into the input field instead of valid input. The classic code or statement appends a SQL server command to make SQL statement vulnerable. Code injection only works when multiple SQL statements per database request are supported or keywords like AND, OR are supported by the database. Function call injection is the addition of database functions or user defined functions into a vulnerable SQL queries. These function calls can be used to make internal calls or modify data in the database that can be harmful to the users. SQL injection of buffer overflows is a subset of function call injection. In several commercial and open-source databases, vulnerabilities exist in a few database functions that may result in a buffer overflow. Once an attacker realizes that a system is vulnerable to SQL injection, he is able to execute any SQL command including DROP TABLE to the database; hence the attack must be prevented. Protection Methods for SQL Injection attacks: To build secure applications, security and privacy must be carefully considered, and developer must be aware about it. The main goals of information security are Confidentiality, Integrity and availability. A single unprotected query can be harmful for the application, data, or database server; hence the SQL injection must be prevented. SQL injection attacks can be protected with simple changes in server site programming as well as client side programming. Developers must be aware of all types of attacks and take care for all possible attacks. Developers should authenticate user input against rules; ensure users with the permission to access the database have the least privileges; also do not leak any critical info in error log files. Taking user input from predefined choices: In this way the web application can be secured from malicious attacks. The attacker cannot insert custom queries or any type of harmful script which can disturb the integrity of the database. This is a simple yet effective way to curb web application attacks. This can be established by making simple changes into the server site code. Bind variables mechanism: Bind variable is another technique to control SQL injection attacks. Using bind variables helps in improving web application performance. The web application developer should use bind variables in all SQL statements. In Java language there is a mechanism called prepared statement, this implements the concept of bind variables mechanism. Input validation: This is the simplest method for defense against SQL injection attacks. User input should always be treated with care and there a number of reasons to validate all of the user input before further processing. Every passed string parameter ought to be validated. Many web applications use hidden fields and other techniques, which also must be validated. If a bind variable is not being used, special database characters must be removed or escaped. In most databases the single quote character and other special characters are a big issue, the simplest method to avoid them is to escape all single quotes. This can be established by using client side scripting language. Validation code can help to avoid wasting server resources by restricting requests that would not return useful results and they can provide much more helpful messages to the user than a SQL error message or empty result set would likely provide. Also, they can help stop SQL injection by rejecting, outright, any forms of input that could be used to perform a SQL injection. With the benefits that validation can bring, it is generally wise to validate all user input, even when fully parameterized database calls and uses and uses an account with limited permissions. Use only stored procedures The greatest value for using stored procedures in preventing SQL injection is that the DBA can set permissions for the application account so that its only way to interact with the SQL server is through stored procedures. This would mean that most SQL injection attacks would fail due to lack of permissions even if the calling program did not parameterize. This of course still leaves open the possibility of SQL injection working through dynamic SQL inside the stored procedures, but the stored procedures can be given an execute as clause which limits their permission to only those needed by the procedure. It is generally easier to verify that all stored procedures are written to guard against SQL injection then it is to check every place where the application interacts with SQL server. Limit permission The most important thing is that we should never user admin rights for web based application. The safe way is to give the user as little rights as possible in other word user rights should allow him to do only what is necessary and nothing more. If the account does not have permission to drop a table, then it will not be dropped even if the command is slipped to SQL server. Similarly, if the account has only read access, although the attack my have right to gain some information, he/she will be not able to modify or destroy the data, which is frequently worse. Even the read permission should be strictly limited by database, to limit which tables can be viewed. And if the application only needs selected columns from a table, then read permission on the view can be granted rather than the full table. Conceal error messages: Injection attacks often depend on the attacker at least some information about the database schema. [4] One common way for hackers to spot code vulnerable to SQL injection is by using the developers own tools against them. For example, to simplify debugging of failed SQL queries, many developers echo the failed query and the database error to the log files and terminate the script. In this case, error messages are useful to an attacker because they give additional information about the database that might not otherwise be available. It is often thought of as being helpful for the application to return an error message to the user if something goes wrong so that if the problem persists they have some useful information to tell the technical support team. Hence, the generated error becomes a literal guideline to devising more tricky queries. For example, applications will often have some code that looks like this: try { } catch (Exception exception) { MessageBox.Show(log on failed, exception.Message); } A better solution that does not compromise security would be to display a generic error message that simply states an error has occurred with a unique ID. The unique ID means nothing to the user, but it will be logged along with the actual error diagnostics on the server which the technical support team has access to. The code above would change to something like this instead: try { } catch (Exception exception) { int id = GetIdFromException(exception); MessageBox.Show(log on failed, id.ToString()); } Code review: Code review can be incredibly difficult to implement, especially in a team of old-timers who are not used to it. But once done, it will not only decrease the number of defects in your code, it will also increase the collaboration and help team building, improve brotherhood amongst developers and will propagate best practices and improvement of skill across an entire team or department. Use automated test tools: Even if developers follow the coding rules and do their best to avoid dynamic queries with unsafe user input, we still need to have a procedure to confirm this compliance. There are automated test tools to check for SQL injections and there is no excuse for not using them to check all the code of your database applications. To make a summary: Encrypt sensitive data Access the database using an account with the least privileges necessary Install the database using an account with the least privileges necessary Ensure that data is valid Do a code review to check for the possibility of second-order attacks Use parameterized queries Use stored procedures Re-validate data in stored procedures Ensure that error messages give nothing away about the internal architecture of the application or the database Conclusion SQL injection is one of the more common and more effective forms of attack on a system. Controlling the malicious SQL code/script on the web application and maintaining the end privacy is still a key challenge for the web developer. These issues must be considered seriously by the web developers involved in developing websites using databases.

Sunday, October 13, 2019

einstein Essay -- essays research papers

He was the embodiment of pure intellect, the bumbling professor with the German accent, a comic clichà © in a thousand films. Instantly recognizable, like Charlie Chaplin's Little Tramp, Albert Einstein's shaggy-haired visage was as familiar to ordinary people as to the matrons who fluttered about him in salons from Berlin to Hollywood. Yet he was unfathomably profound — the genius among geniuses who discovered, merely by thinking about it, that the universe was not as it seemed. Even now scientists marvel at the daring of general relativity ("I still can't see how he thought of it," said the late Richard Feynman, no slouch himself). But the great physicist was also engagingly simple, trading ties and socks for mothy sweaters and sweatshirts. He tossed off pithy aphorisms ("Science is a wonderful thing if one does not have to earn one's living at it") and playful doggerel as easily as equations. Viewing the hoopla over him with humorous detachment, he variously referred to himself as the Jewish saint or artist's model. He was a cartoonist's dream come true. Much to his surprise, his ideas, like Darwin's, reverberated beyond science, influencing modern culture from painting to poetry. At first even many scientists didn't really grasp relativity, prompting Arthur Eddington's celebrated wisecrack (asked if it was true that only three people understood relativity, the witty British astrophysicist paused, then said, "I am trying to think who the third p... einstein Essay -- essays research papers He was the embodiment of pure intellect, the bumbling professor with the German accent, a comic clichà © in a thousand films. Instantly recognizable, like Charlie Chaplin's Little Tramp, Albert Einstein's shaggy-haired visage was as familiar to ordinary people as to the matrons who fluttered about him in salons from Berlin to Hollywood. Yet he was unfathomably profound — the genius among geniuses who discovered, merely by thinking about it, that the universe was not as it seemed. Even now scientists marvel at the daring of general relativity ("I still can't see how he thought of it," said the late Richard Feynman, no slouch himself). But the great physicist was also engagingly simple, trading ties and socks for mothy sweaters and sweatshirts. He tossed off pithy aphorisms ("Science is a wonderful thing if one does not have to earn one's living at it") and playful doggerel as easily as equations. Viewing the hoopla over him with humorous detachment, he variously referred to himself as the Jewish saint or artist's model. He was a cartoonist's dream come true. Much to his surprise, his ideas, like Darwin's, reverberated beyond science, influencing modern culture from painting to poetry. At first even many scientists didn't really grasp relativity, prompting Arthur Eddington's celebrated wisecrack (asked if it was true that only three people understood relativity, the witty British astrophysicist paused, then said, "I am trying to think who the third p...

Saturday, October 12, 2019

Free Essays - Understanding The Things They Carried :: Things They Carried Essays

The Things They Carried – An Analysis  Ã‚      The Vietnam War was the most technologically advanced war of its time. The combat was more horrific and terrifying in the Vietnam War. There was no front line and no clear way of identifying the enemy because civilians would attack the soldiers as well as the North Vietnamese army. It was an every-man-for-himself, guerrilla war. Because of advances in medicine, more soldiers were able to recover from wounds caused by shrapnel grenades, land mines, concussion grenades, and other weapons. A person could step on a mine and suffer only an amputation of a limb instead of dying. Tim O'Brien survives two gunshot wounds and an infection, which was almost gangrene. In wars past, if gunshot wounds did not kill a person, the infection almost certainly would. The soldiers in The Things They Carried had the task of fighting two Vietnam wars, an internal war and an external war. Externally, the men were fighting the North Vietnamese and the Viet Cong. Internally, the men were fighting maturity and adulthood. They were desperately trying to remain young through a war that forced them to grow up. Each soldier carried various "weapons" with which to fight the wars. For example, Dave Jensen carried a rabbit's foot, while Jimmy Cross carried a pebble from Martha found "where things came together but also separated." (O'Brien, 9). Lee Strunk carried a slingshot. Henry Dobbins, however, carried two weapons in addition to the regulation army weapons. He carried the nursery rhyme, "A tisket, a tasket, a green and yellow basket, I wrote a letter to my love and on the way I dropped it†¦" which he would sing while sewing stripes on his uniform. He also carried a pair of his girlfriends' pantyhose, which he would wrap around his neck for protection . "He liked putting his nose into the nylon and breathing in the scent of his girlfriend's body; he liked the memories this inspired; he sometimes slept with the stockings up against his face, the way an infant sleeps with a flannel blanket, secure and peaceful." (O'Brien, 129). These weapons allowed these men to dodge Bouncing Betties and gunfire, while enabling them to crawl through dark tunnels and watch friends die everyday. They were able to combat the North Vietnamese, the Viet Cong, leeches, mosquitoes, ringworm, dysentery, gangrene, and wounds from land mines and guns only to wake up the next morning and fight the same enemies day after day. Free Essays - Understanding The Things They Carried :: Things They Carried Essays The Things They Carried – An Analysis  Ã‚      The Vietnam War was the most technologically advanced war of its time. The combat was more horrific and terrifying in the Vietnam War. There was no front line and no clear way of identifying the enemy because civilians would attack the soldiers as well as the North Vietnamese army. It was an every-man-for-himself, guerrilla war. Because of advances in medicine, more soldiers were able to recover from wounds caused by shrapnel grenades, land mines, concussion grenades, and other weapons. A person could step on a mine and suffer only an amputation of a limb instead of dying. Tim O'Brien survives two gunshot wounds and an infection, which was almost gangrene. In wars past, if gunshot wounds did not kill a person, the infection almost certainly would. The soldiers in The Things They Carried had the task of fighting two Vietnam wars, an internal war and an external war. Externally, the men were fighting the North Vietnamese and the Viet Cong. Internally, the men were fighting maturity and adulthood. They were desperately trying to remain young through a war that forced them to grow up. Each soldier carried various "weapons" with which to fight the wars. For example, Dave Jensen carried a rabbit's foot, while Jimmy Cross carried a pebble from Martha found "where things came together but also separated." (O'Brien, 9). Lee Strunk carried a slingshot. Henry Dobbins, however, carried two weapons in addition to the regulation army weapons. He carried the nursery rhyme, "A tisket, a tasket, a green and yellow basket, I wrote a letter to my love and on the way I dropped it†¦" which he would sing while sewing stripes on his uniform. He also carried a pair of his girlfriends' pantyhose, which he would wrap around his neck for protection . "He liked putting his nose into the nylon and breathing in the scent of his girlfriend's body; he liked the memories this inspired; he sometimes slept with the stockings up against his face, the way an infant sleeps with a flannel blanket, secure and peaceful." (O'Brien, 129). These weapons allowed these men to dodge Bouncing Betties and gunfire, while enabling them to crawl through dark tunnels and watch friends die everyday. They were able to combat the North Vietnamese, the Viet Cong, leeches, mosquitoes, ringworm, dysentery, gangrene, and wounds from land mines and guns only to wake up the next morning and fight the same enemies day after day.

Friday, October 11, 2019

Glass Castle Essay Essay

The novel The Glass Castle, by Jeannette Walls, addresses many social issues that we deal with every day. The most important social issues disputed on a daily basis are the kind of parents we want to be and what we want to teach our children for their future. In this memoir we are able to see how Rex and Rosemary Walls choose to educate their children to see the better side of their daily troubles. The Walls teach their children that no matter what nature throws at them, that they can handle it. Rex and Rosemary Walls may not have been the best parents, or even good parents for that matter, however they were able to turn their children into well-educated and better off adults. They were able to accomplish this by finding creative ways to teach them important life lessons. Like to learn how to face your fears and what doesn’t kill you will make you stronger. Although many people would not necessarily agree with the manner these parents educated their children, we can certainly accept the fact that most of the children gained exceptional values that otherwise may have not been learned. The positive effects of the Walls parents parenting skills were mainly that their children learned important values, that they learned what it means to stand by each other, and that they gained the importance of having something to inspire them to a great future. The Walls children learned important values like humility, loyalty, forgiveness and appreciation. These young children had to endure many hardships to learn the true meaning of being a family. They had to endure the poverty they lived in and the stubbornness of their mother who always wanted something better. They had to struggle between nature versus nurture and the struggle within themselves. The primary characters Jeannette Walls, Lori Walls, Brian Walls, Maureen Walls, Rosemary Walls, and Rex S. Walls together are able to define what a family is. Jeannette Walls is a bright young girl who has faith in her father to keep his promises. She learned to have hope for a brighter future. Early in the memoir Jeannette’s father teaches her an important life lesson. The lesson to always face your fears no matter what they are. In his words â€Å"†¦ but you can’t cling to the side your whole life, that one lesson every parent needs to teach a child is ‘If you don’t want to sink, you better figure out how to swim†¦Ã¢â‚¬  (66) This example is of when Jeannette is beginning to learn how to swim. Her father pushes her to keep trying until she finally is able to swim without drowning herself. Another significant life lesson Jeanette’s mother demonstrates is at the beginning when Jeannette burns herself and learns to not fear fire, but face it and eventually becomes fascinated by it. As she states in the following sentence â€Å"Good for you, Mom said when she saw me cooking. ‘You’ve got to get right back in the saddle. You can’t live in fear of something as basic as fire.’ I didn’t. Instead, I became fascinated with it. Dad also thought I should face down my enemy, and he showed me how to pass my finger through a candle flame†¦Ã¢â‚¬  (15). Lori Walls, Brian Walls, and Maureen Walls are Jeannette’s siblings with whom she is very close with and together make their dream of escaping their dysfunctional lifestyle a reality. Together they learn how to be loyal to each other. They always stand by each other and sometimes even acting more like parents than their own parents do. The children stand together so they could stand up to those who tried to hurt them. The Wall’s siblings show loyalty to one another because they are always together and support each other no matter what. While the parents unconventional method of parenting eventually works out, many events suggest that even though the children gained all these virtues, the parent’s manner in achieving them wasn’t totally appropriate for them. An example of this is when Jeannette’s father takes her to a bar and doesn’t care if an older man abuses her sexually. He just assumes that Jeannette is tough girl who knows what she is doing and can take care of herself just fine even though she is only twelve at the time. â€Å"†¦Aw, come on,’ he said and shouted at Dad, ‘I’m going to take your girl upstairs.’ ‘Sure’ ‘Just don’t do anything I wouldn’t do.’ He pointed his pool cue at me. ‘Holler if you need me,’ he said and winked at me as if to say he knew I could take care of myself, that this was just a part of my job.† (212) However, her father never meant for his daughter to get hurt so this is why he said to call him if she need it, but he wanted her to learn how to defend herself. In the end she did defend herself and faced her fear like her father had taught her. Another part where we can see Jeannette’s father in lack of responsibility is when he is so careless during one Christmas and ends up destroying Christmas for his children. This Christmas incident is a significant example of how alcohol can change a parent and the effect it can have on them because it shows the change from how Jeannette’s father goes from being a loving, caring, and responsible parent to an alcoholic father. It shows how Jeannette begins to see how her father really is. Like the Christmas incident and how he came home from bars and would get into fights with his wife. This made Jeannette start to not believe in her father as much as she did before. However, this experience served to teach Jeannette and her siblings that it wasn’t good to let yourself fall in any bad habits like alcoholism and betting. Another scene where the mother; Rosemary isn’t portrayed as a good parents is when she doesn’t do anything to protect Jeannette from her uncle Stanley and instead makes a silly remark that he is so lonely. â€Å" Mom, Uncle Stanley is behaving inappropriately,’ I said. ‘Oh, you’re probably imagining it.’ She said. ‘He groped me! And he’s wanking off!’ Mom cocked her head and looked concerned. ‘Poor Stanley,’ she said. ‘He’s so lonely†¦Ã¢â‚¬  (184) Nevertheless Jeannette’s mother actually taught her a harsh lesson about life through this; she showed her that many of these situations happened to young girls and nothing is done to prevent it from happening again instead people turn to look the other way. Overall the Walls parents Rex and Rosemary may not have been the best parents, but they did the absolute best to help their children become great human beings and not have any trouble in confronting their problems. Yes, they probably didn’t resort to having taught them in the best circumstances, yet they did the best they could due to their economic struggle. On the other hand the Walls children had a better chance to put those lesson and skills they learned to the use.