Sunday, April 5, 2020
World War II Innovations
Introduction The period following the end of World War II was characterized with a great deal of technological development, probably as a consequence of the victories achieved by the Allied forces. The aftermath of World War II set in motion a wave of innovations that proved to be greatly beneficial in improving the living standards of the global population.Advertising We will write a custom essay sample on World War II Innovations specifically for you for only $16.05 $11/page Learn More Such advancements in technology were a direct consequence of the experiences gained during the several years of the War. An urgent need was felt to innovate in order to have more technologically advanced weaponry that would allow having the much required edge in winning the war. The potential for technological development had been thus created during the Second World War itself. After it ended in 1945, the available resources and technology could be gainfully used in the development of consumer goods that led to improved standards of living on a global basis. The technological innovations in this regard were made in several fields such as Linguistics, Medicine, Weaponry, Intelligence and Communication in addition to the technological progress made in manufacturing and service industries (Castells 45). The rapid advancement in technology during World War II was primarily inspired by the propensity to research and devise military strategies that would allow penetration and sabotage of enemy forces and supply lines respectively. In addition, innovation in technology was also inspired by the enhanced ability of the military to use technology in gathering intelligence, which was gainfully used in obtaining the much needed information about military capabilities and movement of enemy forces. After the World War II ended, the technology developed till that time could be further innovated in creating a virtual technological revolution that transformed the lives of humanity in the coming decades (Gray 36). World War II heralded noteworthy technological innovations in the areas of nuclear technology and information technology that revolutionized ways of living in the 21st century. Nuclear Technology Invention of Nuclear Reactor The invention of the atomic bomb by the United States and its allies eclipses any other innovation made during World War II. Named as the Manhattan Project during World War II, the nuclear program of the Allies led to catastrophic consequences for the Axis forces, particularly in the context of the bombings on Hiroshima and Nagasaki, which led to the death of millions of people.Advertising Looking for essay on history? Let's see if we can help you! Get your first paper with 15% OFF Learn More Although the initial objective of the Manhattan Project was to use nuclear technology in establishing reactors for the generation of electricity under the auspicious leadership of Italian physicist Enrico Fern i, the need to annihilate German, Italian and Japanese forces during World War II made the Allied leadership to focus on developing the first atomic bomb. It was under the leadership of Enrico Fermi, who is recognized as the father of the atomic bomb because of his exhaustive research and positive outcomes in developing nuclear power, that the US made use his technology in establishing several nuclear power plants across the entire country (Russell 93). Further innovations in nuclear technology were made by Enrico Fermi after the end of World War II, leading to major breakthroughs in reducing dependence on electricity generated through coal fuel and hydro power. This was made possible because of the innovation that led to the availability of cheaper, environmentally friendly and reliable nuclear generated electric power. Innovation of Radiology Medicine Besides its significant role in leading the green revolution through generation of environmentally clean energy, innovation in nucl ear technology during World War II allowed wider application in medicine, especially in radiology therapy and imaging. The use of nuclear technology in medicine can be traced back to the campaign initiated by the Polish Physics and Chemistry Nobel Prize laureate Marie Curie just before the beginning of World War II. Marie Curie embarked on a campaign to collect radium for use in radiology medicine. She is credited with the establishment of globally recognized research institutes of radiology medicine, including the Curie Institutes in Paris and Warsaw. Nuclear medicine finds wide application in radiology treatment of different cancerous malignancies with the use of techniques such as neoplasm and radiology imaging. Radar Technology The innovations in radar technology during World War II helped in making improvements in the aviation industry and its associate role of uplifting the living standards of the global population. Such innovations also helped in enhancing national security from the perspective of external and internal aggression. Radar technology involves the use of radio waves in the detection of far-off objects.Advertising We will write a custom essay sample on World War II Innovations specifically for you for only $16.05 $11/page Learn More Such objects may include ships, aircrafts, submarines and a wide-range of missiles and rocket weaponry. Innovation of radar technology during World War II led to improvement in bombsights and radar capabilities, which were inspired by their increased use in World War II. Radar technology is even regarded as the defining innovation that tilted the balance in favor of the allied forces during World War II. Later, it also heralded the revolution in both military and civil aviation in the contemporary world. Radar technology was invented immediately after World War II began, but significant improvements in the technology were made during the war through research and development, mainly for military purposes. This new technology allowed the use of applications with which approaching enemy aircraft and ships could be detected. Vaccines Collaborative arrangements were made between the military and academia in efforts to prevent war-exacerbated diseases, particularly pneumococcal pneumonia and influenza and such initiatives led to the innovation of disease prevention vaccines. Wartime research programs on preventable disease are recognized for having led to the improvement and innovation of 10 new vaccines for treatment of a series of virulent preventable diseases (Godin 121). Besides, wartime research in health and medicine science and technology led to innovations relative to substitute blood samples such as plasma, antibiotics such as penicillin and insecticides such as DDT. Nevertheless, the innovation of vaccines stands out as the most important achievement in the area of medical and health technology during World War II. Such vaccines involved development of hig hly effective, safe and licensed antibiotics and microbial preventative therapy for immunization against several diseases, which did not exist before the War began. Electrolysis Chemistry, Digital Technology Military Technology Other notable innovations during World War II having significant impact on the lives of human beings in the 21st century include the demagnetization of ships to prevent them from torpedo and mines attacks. This technique also helps in detection of submarines. Demagnetization technology was developed during World War II and is particularly useful in exploration of mineral and ore deposits.Advertising Looking for essay on history? Let's see if we can help you! Get your first paper with 15% OFF Learn More Research is currently underway to come up with innovations that will help the ship building industry to use corrosion free material that prevents ships from the harmful impacts of corrosive sea water. This is possible through the application of cathode electrolysis technology, which was developed during World War II. World War II also spearheaded the digital revolution of the late 20th century and early 21 century through robust research in information transmission, electronics and intelligence. Amongst these was the development of the encryption machine by Germans, which heralded the large scale application of digital encryption in information technology. Conclusion It is apparent that in contrast with World War I, the Second World War featured both military and scientific methods of warfare as the two opposite camps tried to outmaneuver each other through the use of technologically advanced, updated and state-of-the-art military equipment and techniques, which could not have been made possible without the support of science and technology. Innovations in both military combat weapons and military technology have led to the improvement of standards of living in the 21st century. People feel more secure now because there are lesser risks of aggression and the military is very well equipped with the latest technology in doing away with security threats. This has been made possible because of the use of science and technology, which has led to innovations that have improved defense capabilities as also the living standards of people. Many hold that the innovations in nuclear technology have enhanced fears of another world war, which will lead to the destruction of the world. However, such fears do not have a strong basis because the global community understands the consequences of a nuclear war and recognizes that nuclear technology is best used for the welfare of human societies. Works Cited Castells, Manuel. Technopoles of the World The Making of 21st Century I ndustrial Complexes. Hoboken: Taylor and Francis, 2014. Print. Godin, Benoit. Measurement and statistics on science and technology 1920 to the present. New York: Routledge, 2005. Print. Gray, John. Reconstructions of secondary education: theory, myth and practice since the second world war.. S.l.: Routledge, 2012. Print. Russell, James. Innovation, Transformation, and War Counterinsurgency Operations in Anbar and Ninewa Provinces, Iraq, 2005-2007. Palo Alto: Stanford University Press, 2010. Print. This essay on World War II Innovations was written and submitted by user Mar1a to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.
Sunday, March 8, 2020
3 Examples of Proper Attribution of Quotations
3 Examples of Proper Attribution of Quotations 3 Examples of Proper Attribution of Quotations 3 Examples of Proper Attribution of Quotations By Mark Nichol 1. ââ¬Å"ââ¬ËOf the 230 companies we inventoried in 1984, 54 had gone out of business or been taken over by 1987. From 1981 to 1994, we lost 84 percent,ââ¬â¢ said Smith.â⬠Interrupt a quotation of more than one sentence with an attribution following the first sentence to avoid a delay in identifying the speaker or writer: ââ¬Å"ââ¬â¢Of the 230 companies we inventoried in 1984, 54 had gone out of business or been taken over by 1987,ââ¬â¢ said Smith. ââ¬ËFrom 1981 to 1994, we lost 84 percent.ââ¬â¢Ã¢â¬ 2. ââ¬Å"Echoing the thoughts of his fellow players, Jones perhaps said it best, ââ¬ËWe never wanted to disappoint him under any circumstances.ââ¬â¢Ã¢â¬ When an attribution consists of a complete thought that sets up the quotation that follows, use a colon rather than a comma, to set the attribution off from the quotation: ââ¬Å"Echoing the thoughts of his fellow players, Jones perhaps said it best: ââ¬ËWe never wanted to disappoint him under any circumstances.ââ¬â¢Ã¢â¬ 3. ââ¬Å"And while bin Ladenââ¬â¢s killing has dealt a crippling blow to his terrorist organization, she said, ââ¬ËNobody should believe individual al Qaeda leaders cannot be replaced.ââ¬â¢Ã¢â¬ To provide context for the quotation, the writer has added the paraphrased dependent clause preceding the attribution, uniting the clause and the quotation into an extended sentence. Because this sentence no longer begins with nobody, the word is no longer capitalized: ââ¬Å"And while bin Ladenââ¬â¢s killing has dealt a crippling blow to his terrorist organization, she said, ââ¬Ënobody should believe individual al Qaeda leaders cannot be replaced.ââ¬â¢Ã¢â¬ Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Punctuation category, check our popular posts, or choose a related post below:50 Redundant Phrases to AvoidAbstract Nouns from Adjectives15 English Words of Indian Origin
Friday, February 21, 2020
Law of evidence Essay Example | Topics and Well Written Essays - 750 words
Law of evidence - Essay Example In this regard, different case laws are implied in the provided case with the aim of having effective evidences in accordance with the law. By reviewing the case study, it has been observed that there are two individuals named Albert and Bart, who were involved in the incident of a burglary in a bookstore. It has been expected that the burglary has taken place on 15th December 2013 at 10 pm. A witness named Mr. Bird gave the statement regarding this incident of robbery. The incident has taken place in a bookshop where the thieves have stolen 500 law books. The witness has also provided a description of one of the burglar. By this statement of the witness, police has been able to recognise a suspect who is expected to be a prime guilty of this robbery incident in the bookshop. After arresting the first suspect, police has started interrogating him by marinating the law and regulation. The first suspect Albert has been arrested from the nearest clinic where he has been having treatment of his wound caused during the incident or robbery. During the interrogation, DC Tracy has put the effort to confess the guilt from Albert, but he refused to do the same. In this context, the suspect has been urged for receiving the solicitor, but DC Tracy did not provide him the minimum chances to receive the facilities of a lawyer. After sometime, Albert confessed his involvement in this burglary incident and mentioned the name of the involvement of another person. Albert also agreed to disclose all the confidential evidence of his prior group in terms of getting the concession in his punishment from the court. However, DC Tracy has denied his request and become able to confess guilt, but suggested that his cooperation will be taken into account in the court at the time of sentencing. As per the theft act (Northern Ireland) 1969, the guilty of burglary needed to be
Wednesday, February 5, 2020
Religious Freedom and Human Rights Essay Example | Topics and Well Written Essays - 1500 words
Religious Freedom and Human Rights - Essay Example e of the International Covenant on Civil and Political Rights which guarantees and protects fundamental human freedoms, there are a lot of cases of their brutal violation. According to the International Religious Freedom Report for 2013, around 400 Shiite and 80 Christians were murdered during the attack of sectarians in Pakistan and are exposed to serious danger in Egypt, Saudi Arabia and Iran. Different religious minorities, including Hindus, are subjected to oppression and physical abuse in Bangladesh due to political instability in the country. Buddhist groups demolished churches and mosques in Shri Lanka. Falun Gong followers and Catholic clergymen were incarcerated and tormented in China (ââ¬Å"International Religious Freedom Report,â⬠2013, p. 2). So, several questions arise: do people really have the freedom of faith and where lies the difference between religious liberty and religious extremism? The purpose of the paper is to define the concept of ââ¬Å"religious freedomâ⬠. Further, it will analyze the impact of this notion on human rights. Also, it will evaluate the importance of religious freedom for the functioning of international system. Though it is popularly believed that religious freedom originated in Western culture, there is persuasive evidence indicating that this concept came from ancient Persia, Sumeria, Africa and China. In conformity with Persian Documentation and Hebrew Scriptures, around 2,600 years ago Cyrus the Great implemented the policy of adopting tolerant attitude towards people of different religions. This regime restored Jewish outcastââ¬â¢s right of returning to their fatherland. Other holy texts pointed out that there must not be any coercion in religious beliefs (Hertzke, 2012, p. 109). Freedom of religion is universally acknowledged to be one of the fundamental human rights. It is stated in different declarations of the United Nations Organization, international agreements and national legislation. Article 18 of the
Tuesday, January 28, 2020
What Is Decision Support System?
What Is Decision Support System? DSS can be defined as use of computer application that can help managers, staff members, or people who interact within the organization to make decisions and identify problems by using available data and communication technology. Origin Of DSS In 1960 J. C. R. Licklider wrote a paper on his observation of how the interaction between man and computer can improve the quality and competency in recognising and problem solving. His paper proved to be like a guide to many future researches on DSS. In 1962 with use of hypertext online system helped in storage and retrieval of documents and creation of digital libraries. SAGE (Semi Automatic Ground Environment) built by Forrester is probably the first data driven computerised DSS. In 1964 Scott Morton built up an interactive model driven management decision system which could help managers make important management decisions. In 1970 John D.C. Little noted that the requirement for designing models and system to make a management decision was completeness to data, simplicity, ease of control and robustness, which till date are relevant in improving and evaluating modern DSSs. By 1975 he built up a DSS called Brandaid which could support promotion, advertising, pricing and product r elated decisions. In 1974 the focus was on giving managers with information which was from accounting and transaction processing system with use if MIS(Management Information Systems) but MIS was found to not helping out managers with making key decisions. Hence in 1979 Scott Morton and Gorry argued that MIS just primarily focused on structured decisions and hence the system which also supports unstructured and semi-structured decision should be termed as Decision support systems. In s nutshell developments:- 1960Ãâà Building model-driven DSS 1970 Ãâà Theory developments Mid 80s Ãâà Implementation of financial planning systems, spreadsheet DSS and Group DSS. Early 90s Ãâà Evolving of Data warehouses, Executive Information Systems, OLAP and Business Intelligence. Mid 90s Ãâà Knowledge-driven DSS and the implementation of Web-based DSS Types Of DSS: Model Driven DSS `Quantitative models provide the most basic level of functionality. Model driven DSSs use small data and parameters provided by the DSSs users usually managers to help them in analysing a problem and generate statistical, financial report and simulation model to help the decision makers. Model driven DSSs question can help organisational processes to answer the WHAT IF question and thus help them forecast the effects of changes in business process. Ferguson and Jones production scheduling application was also a model-driven DSS but Scott-Mortons in 1971, production planning management decision system was the first widely discussed model-driven DSS. Data Driven DSS Data driven DSS are systems which makes use of companys mostly internal data and sometimes external and real time data to help organisations make decisions. Usually the data comes in form of databases or data warehouse which allows queries and data retrieval tools and analysis to make decisions. Richard Klaas and Charles Weiss at American Airlines developed one of the first data-driven DSS. An example of data driven DSS can be use of digital maps or the GIS( Geographic Information System). Communication Driven DSS Communication Driven DSS helps in decision making to internal group of people by sharing of information and enabling communication between them. Most basic example can be the threaded email between a group and complex example can be video conferencing. In communication driven DSS communication technologies is most important component of its working architecture. In recent years internet provided vast possibilities to communication driven DSS. Groupware bulletin video and audio conferencing are few of the technologies used for communication Driven DSS. Document Driven DSS Document driven DSS uses the organisations documents such as policies, procedures, processes, specifications, historical, stored documents and processing technologies to give documental analysis and enhance decision making. This type is system is usually targeted at larger base of users. Internet greatly increases the availability of all required documents and hence helps in development of document driven DSS. Knowledge Driven DSS Knowledge Driven DSS are used usually by managers to help them with management advice or to choose products or services. These DSSs can be just a standalone computers with applications which are expert in particular domain along with its understanding so as to solve the problems of that particular domain. Artificial intelligence is vastly used by such application to help Knowledge driven DSSs. Now a days Knowledge Driven DSS coupled with intelligence systems are used at medical diagnostic centres, fraud detection and scheduling manufacturing operations. Web-based DSS Computerized DSSs capabilities were extended with emergence of internet and world-wide web. With passing time HTML developed and TAGS and tables further helped in enhancing Web-based DSS. With all these developments web-based DSS became main platform for all types of DSS to develop. Corporate have started using intranet for knowledge management and support information exchange between various departments. The server that is having the DSS application is connected to the computer by a network through the TCP/IP protocol. Recently application service providers introduced enterprise knowledge portals that combined information portals, knowledge management, business intelligence and communications-driven DSS in an integrated Web environment. Benefits of DSS Improves efficiency Helps in faster problem solving Helps in interpersonal communication Promotes learning Increases organizational control Provides new evidence in support of a decision Creates a competitive advantage over competition Encourages exploration and discovery on the part of the decision maker Reveals new approaches to thinking about the problem space Helps automate the managerial processes. Cost reduction and enhance profit. Disadvantages of DSS Over dependency for Decision making Assuming it to be correct. Unanticipated effects Deflect personal responsibilities Information overload. Conclusion DSS is still and evolving technology. The types of DSS mentioned are just few of the many DSS which are around and help organization in decision making. Many of the types of DSS are subsets of previously researched and created DSS with added functionality and/or requirements. A very brief span of historical data has been used to portray DSS evolution and growth in early years. All the scientists, researchers and professors then set up a base for future DSS to develop and build upon to enhance and simplify decision making. By understanding how DSS evolved over the period of time and how its still being developed helps us in understanding how and where the future DSSs are heading and what to expect next in this fast emerging technology. Of the types discussed Web based is the most rapidly growing and improving DSS. Recent developments in internet, computers and communication devices are helping Web-based DSS application to divulge into various other fields. DSS and DSS application continues to take advantage of any and all emerging technologies in artificial intelligence, databases, data warehouses, human interaction with computers which can help improve it more and simplify decision making. Sources/References:: http://www.bestpricecomputers.co.uk/glossary/decision-support-systems.htm http://searchcio.techtarget.com/definition/decision-support-system http://en.wikipedia.org/wiki/Decision_support_system http://dssresources.com/history/dsshistory.html Vitamin E: Functions and Metabolism Vitamin E: Functions and Metabolism Vitamin E is one of 4 fat-soluble vitamins. The vitamin is formed by plants, and has eight unlike isoforms separated into two classes of four vitamins each. The compounds include of a 6-chromanol ring and an isoprenoid side chain.The group bond to the R1, R2 and R3 position on the 6-chromanol ring verify whether the vitamin is acknowledged as alpha, beta, gamma, or delta.(www.exrx.nt, 2011) A large body of the study now focuses on the alpha tocopherol form of vitamin E, which is the most biologically active (Tiidus, P. M., and M. E. Houston, 1995, Traber, M.G., 1999). Recently gamma tocopherol has been a subject of importance by countless researchers. Vitamins are a vital source of life. Vitamins are any organic that is essential for many living things to obtain a normal healthy living. (Dorling Kindersley, 1998) Dietary Function Vitamin E is an essential part of cellular membranes whose main role is to protect the cell alongside to oxidation, Within cells and organelles vitamin E is the first line of defence against lipid per oxidation. The vitamin also acts as a very important function in providing elasticity to red blood cells as they travel through the arterial system. Artificial vitamin E nominates dl-alpha-tocopherol, is less expensive from the naturally occurring form, d-alpha tocopherol. The expected/natural form of the vitamin is synthesised only by vegetation and is found mostly in plant oils. Vitamin E is also present in large numbers in the chloroplast and as a result the leaf of most plants.The fat-soluble property of vitamin E allows it to be stored within the fatty tissues of humans and animals. Therefore a diet that includes meat supplies additional vitamin E. However, the amount of vitamin E obtained in a high protein meat complete diet is less than the quantity supplied by a plant source. Metabolism Absorption and Bioavaliability Absorption of vitamin E is highly reliant on the same process that develop during fatty acid digestion and metabolism. A lack of any component of these transporters will reduce carrier structure and in turn vitamin E absorption. vitriol acids are a measured essential for vitamin E absorption and micelle formation. Once formed, the micelle is then able to cross the undiluted water layer and discharge its contents into the enterocyte. A contemplation of the flow pressure of vitamin E through the enterocyte has been elusive to researchers (Traber, M.G., 1999). The ingested Vitamin E is quickly vacant from the bloodstream, into tissues as blood concentrations of vitamin E in humans and animals have minute relation to the quantity within the body. Vitamin E is fat soluble; food intake could potentially persuade its bioavailability, it is claimed that the alpha-tocopherol has the highest bioavailability. The lower bioavailability of Vitamin E is form a typical vitamin E supplement, and the changeability which is experimented when consumed, this suggest that vitamin e is poorly absorbed through the body with low-fat meals. Vitamin E can be improved by food reinforcement makes Vitamin E more bio-available .Bioavailability of vitamin E, is influenced by the increase of risk in coronary heart disease. Vitamin E is an antioxidant that is vital for our bodies, to preserve optimum health and in people diets. Vitamin E is extensive and in all kinds of foods. Most vitamin E comes from vegetable oil and products made from them like margarine and salad dressings. It is important for youth,in order to maintain their health. It aids in protecting red blood cells, defends the body against oxidative damage and helps avoid damage of both vitamins A C. Having vitamin E as part of a well balanced diet can reduce the risk of heart disease and cancer, also slows down the effect of Alzheimers disease when consumed in high dosage Once in the blood 15 to 45% of the total vitamin E intake can be absorbed by the cells. Transport Upon reaching the bicollateral exterior of the enterocyte vitamin E is packed into chylomicrons and then elated throughout the body via the movement. Within five minutes of arrangement chylomicrons are broken down by lipoprotein lipase and the contents are isolated towards a range of paths. The vitamin E in the chylomicron equilibrates both with (HDLS) and (LDLS) ( Groff, J.L., Gropper S.S., and Hunt S.M 1995). HDLS all circulate lipoproteins which eventually receive vitamin E, as HDL fervently relocates the compound to the lipoproteins at a rate equivalent to 10% of the plasma vitamin E per hour (Traber, M.G., 1999). The vitamin E remaining in the chylomicron becomes a chylomicron remnant and travels back to the liver for re-uptake in a process that has garnered much research, but so far is poorly understood. Once in the liver the vitamin E is packaged into Very Low Density Lipoproteins (VLDL) and excreted back into the circulation. Being the most biologically active of the eight vi tamers, (Groff, J.L., Gropper S.S., and Hunt S.M 1995, Kanter, M.M. 1998, National Academy of Sciences. 2000, Traber, M.G., 1999, www.exrx.nt), alpha tocopherol is sequestered by the liver and constitutes over 80% of the total vitamin E packaged into the VLDL and secreted by the liver (Traber, M.G., 1999, www.exrx.nt). The predominant transfer of the alpha vitamer is performed by alpha tocopherol transfer protein (ATTP). As the VLDL are broken down by lipoprotein lipase, Low Density Lipoproteins (LDL) are formed and from these lipoproteins the vitamin E is transferred to HDL and eventually incorporated into either circulating lipoproteins or peripheral tissue. Any of the previously mentioned lipoproteins have the ability to transfer vitamin E to the tissue as needed (Groff, J.L., Gropper S.S., and Hunt S.M 1995, Traber, M.G., 1999, www.exrx.nt). A final mechanism for vitamin E is uptake by the peripheral tissue from the chylomicron via lipoprotein lipase activity. Unlike re-uptake o f vitamin E by the chylomicron remnant, uptake of the vitamer by peripheral tissue is better understood. After vitamin E has been transferred to the LDL from the chylomicron two receptors (LDL dependent receptor and LDL independent receptor) within the tissue play a key role in the uptake of vitamin E into the cell (Traber, M.G., 1999, www.exrx.nt). Storage Vitamin E is a lipid soluble vitamin and therefore over 90% of total body vitamin E is found in the adipose tissue (National Academy of Sciences, 2000, Traber, M.G., 1999, www.exrx.nt). Over 90% of these pools are found as a part of an adipocyte fat droplet whereas the remaining amount is found mainly in adipocyte cellular membrane. The storage ratios of vitamin E are also very difficult to alter. It takes over two years to alter the ratio of alpha to gamma isoforms. Previous studies have shown that the ratio is altered as the alpha vitamin replaces the gamma vitamin, which is reduced by 70% (Tiidus, P. M., and M. E. Houston, 1995, www.exrx.nt). Concentrations of vitamin E cover a wide range in body tissues. In the plasma the concentration of vitamin E is approximately 27 umol/l. Within skeletal muscle protein the vitamin E concentration varies considerably depending upon the type of muscle (National Academy of Sciences, 2000). Although a large majority of vitamin E is found in adipo se tissue (230 nmol/g wet weight) (National Academy of Sciences, 2000) there isnt an organ that function to store and discharge vitamin E. The actual means regarding vitamin E release from the tissue is unknown at this time. While it seems likely that vitamin E is released during lipolysis associated with exercise this may not be true. Research has shown that even during times of weight reduction vitamin E is not released from the adipose cells (Traber, M.G., 1999). Therefore, the factors that regulate bioavliability of vitamin E from adipose tissue are not known. Requirements As it is unknown how much vitamin E should be consumed by adults, it is aid that according to the (RDA) that men whould have a Vitamin E intake of 15 mgs and 10 mgs for females.(S.Frances,2006) Only natural alpha-tocopherol can typically provide supplements of Vitamin E, and only existing one stereo-isometric form. The need for vitamin E increases as people diet consist of more polyunsaturated fats and oils as the oils in Vitamin E needs a source of antioxidants to help absorption/and protection. Vitamin E is largely contained in raw oils. In 1968 the RDA for vitamin E was established at 300 IU (300 mg) for a 65 kg adult male ( National Academy of Sciences. 2001).The detailed RDA is listed in table 1 and table 2. This daily level is difficult to reach unless a diet high in polyunsaturated fatty acids was consumed ( Tiidus, P. M., and M. E. Houston1995)From 1 mg of vitamin E approximately .3 ( Traber, M.G., 1999) to .5 is in the alpha vitamin form and therefore readily absorbed. The o ther vitamers are not stored as efficiently and usually excreted ( Tiidus, P. M., and M. E. Houston1995, Traber, M.G., 1999). Therefore a new RDA was set based on the alpha-tocopherol form of the vitamin. In 1989 the RDA for Vitamin E was set at 10 mg alpha tocopherol for men and 8 mg of alpha-tocopherol for women (Traber, M.G., 1999, www.exrx.nt). In the year 2000 all RDA values were in the process of being replaced by Dietary Reference Intakes (DRI). The DRI has been established at 15 IU of alpha-tocopherol. The revised DRI levels are the same for both men and women ( Packer, L.1997, www.exrx.nt). Recommended Dietary Allowance (RDA) In 1968, the recommended dietary allowance for vitamin E was established at 300 IU (300 mg) for a 65 kg adult male ( National Academy of Sciences. 2001. The other vitamins are not stored as efficiently and usually excreted (Tiidus, P. M., and M. E. Houston1995, Traber, M.G., 1999). In accordance to information resourced from Traber, M.G. in 1999 , there was a new recommended dietary allowance which was set based on the alpha-tocopherol form of the vitamin. In 1989 the RDA for Vitamin E was set at 10 mg alpha tocopherol for men and 8 mg of alpha-tocopherol for women. Deficiency Anaemia, muscle necrosis, and foetal death have been observed in over fifteen different vitamin-E-deficient animal species.(www.exrx.nt) .Humans who have fat mal-absorption suffer from the same symptoms shown in rats, but to a lesser degree. These manifestations are exhibited early in childhood. Some of the symptoms include decreased sensory perception, muscle weakness, scoliosis, and muscle structural abnormalities. These symptoms can usually be reversed using vitamin E supplementation ( Tiidus, P. M., and M. E. Houston1995, www.exrx.nt)) Vitamin E deficient diets fed to adult humans have resulted in the formation of very few deficiency symptoms. (Bunnell R.H., E. De Ritter, S.H. Rubin 1975, www.exrx.nt) has shown that prisoners performing strenuous physical labour while fed a vitamin-E deficient diet for 13 months exhibited no deficiency symptoms. A diet full of vitamin E may lower the risk of cancer and the likely hood of death, in part through oxidation and inflammation. Lacking vitamin E concentrations in the blood; people die more often and than people with a high blood concentration (s.Frances, 2006).Through research and development of vitamin E has an effect on helping slowing down the loss of function that occurs in Alzheimers disease when taken in excessive dosages. Toxicity Vitamin E toxicity has not often been acknowledged in humans. Doses up to 1600 I.U. have been usually administered in study with no clear unpleasant side effects. Toxicity may be complex since there is a wide variant in daily blood vitamin E levels. Increasing vitamin E levels in muscle tissue is especially difficult to attain and therefore toxic levels are difficult to achieve. Meydani et al. ( Karlsson J.,1997, www.exrx.nt) given 800 I.U. of vitamin E to subjects for a period of 48 days and only saw a 37% increase in plasma alpha tocopherol levels (www.exrx.nt). The tocopherol binding protein is most commonly said to manage the quantity of vitamin E that can be physiologically stored. High levels of vitamin E are likely excreted by the body. Conclusion In conclusion vitamin E may help reduce oxidative stress and lipid per oxidation of cellular membranes. The current Dietary Recommended Intake for vitamin E meets the needs of most individuals can be achieved through a healthy diet, and eating plan. In April 2000 The National Academy of Sciences according to Packer, L. In 1997 established an intake maximum of 1100 I.U for synthetic and 1500 I.U. for natural vitamin E. These maximum levels are approximately one hundred times the Dietary Recommended Intake. Vitamin E supplementation by both active and non active individuals is widely employed. The choice to supplement or not supplement a diet with vitamin E is an option. REFERENCE LIST Bunnell R.H., E. De Ritter, S.H. Rubin. Effect of feeidng polyunsaturated fatty acids with a low vitamin E diet on blood levels of tocopherol in men peroforming hard physical labour. Am. J. Clin. Nutr. 28:706-711, 1975. Clarkson P. M. Antioxidants and physical performance. Crit. Rev. Food Sci. Nutr 35: 131-141, 1995. Class notes on vitamins and minerals. Dr. Mariam Farhad, 2011 Groff, J.L., Gropper S.S., and Hunt S.M. The Fat Soluble Vitamins. In: Advanced Nutrition and Human Metabolism. Minneapolis: West Publishing Company, 1995, p. 284-324. Hartman, A., A.M. Neiss, M. Grunert-Fuchs, B. Poch, and G. Speit. Vitamin E prevents exercise-induced DNA damage. Mutat. Res. 346: 195-202, 1995. http://consumerlab.com/RDAS viewed 15.05.2011 http://ods.od.nih.gov/factsheets/VitaminE.asp viewed 13.05.2011 http://www.exrx.nt/nutrition/antixidants/vitaminE.html viewed 15.05.2011 Karlsson J. Exercise, muscle metabolism and the antioxidant defense. World Rev. Nutr. Diet. 82:81-100, 1997. Packer L. Protective role of vitamin E in biological systems. Am. J. Clin. Nutr. 53:1050S-1055S, 1991. Rokitski, L., E. Logemann, A.N. Sagredos, M. Murphy, W. Wetzel-Roth, and J. Keul. Lipid peroxidation and antioxidative vitamins under extreme stress. Acta. Physiol. Scand. 151: 149-158, 1994 Traber, M.G., 1999. Vitamin E. In: Modern Nutrition in Health and Disease. Ninth Edition. Edited by Maurice Shils, James Olson, Moshe Shike, and A. Catharine Ross. Baltimore: Williams Wilkins, 1999 p. 347-362. Watt, T., T.T. Romet, I. McFalane, D. McGuey, C. Allen, and R. C. Goode. Vitamin E and oxygen consumption. Lancet. 2: 354-358, 1974. T., T.T. Romet, I. McFalane, D. McGuey, C. Allen, and R. C. Goode. Vitamin E and oxygen consumption. Lancet. 2: 354-358, 1974.
Sunday, January 19, 2020
The Dignity of Cloning :: essays research papers
The Dignity of Cloning à à à à à Cloning is just one of the new ways that modern medicine is pushing the boundaries into uncharted moral waters. Cloning can be divided into two main groups by its purpose; therapeutic, which looks into the generation of body parts for transplants, and reproductive, which is cloning for the sake of replicating an entire organism. The main method of cloning mammals is called somatic cell nuclear transfer, where the DNA from a cell of an existing organism is put into a donor egg whose nucleus has been taken out. The major question that surrounds this process and the idea of replicating an organism is whether or not it detracts from human dignity. à à à à à According to the Catholic Church, cloning is immoral on many bases. Firstly, even the experimentation of cloning is seen as immoral, since, in the process of creating a viable clone, hundreds of embryos simply do not work. In the case of Dolly, the first successfully cloned sheep, she was the only survivor of 277 attempts. Statistics like this show how scientists are playing ââ¬Å"fast and looseâ⬠with living embryos, which is unacceptable for Catholic teaching. The Catholic Church is also against the fact that, in therapeutic cloning, only a part of the new organism is ââ¬Å"harvestedâ⬠, and the remaining parts are destroyed. This raises Catholic objections on the grounds of playing God by creating and destroying life. This goes back to one of the temptations presented to Adam and Eve, ââ¬Å"You will be like godsâ⬠(Genesis 3:5). à à à à à On the account of reproductive cloning, the Catholic Church has a whole new set of reasons relating to how it is immoral. With the advancements in cloning it is said by some that it will be possible to engineer a genetically superior human being. The problems with this are evident in the fact that an engineered child would have been created in our image, instead of the image of God. It is therefore arrogant of us to say that we can direct the evolution of humanity better than God. à à à à à Proponents of cloning raise many points in how, specifically therapeutic cloning, can advance knowledge and even lead to cures for some diseases. For example, theoretically, a liver cell could be used to grow a new, healthy liver for a transplant. The same could be said for kidneys, or organs that are not currently transplantable. Genetic diseases, such as cystic fibrosis can be better handled with answers to the genetic puzzle that cloning could provide. The Dignity of Cloning :: essays research papers The Dignity of Cloning à à à à à Cloning is just one of the new ways that modern medicine is pushing the boundaries into uncharted moral waters. Cloning can be divided into two main groups by its purpose; therapeutic, which looks into the generation of body parts for transplants, and reproductive, which is cloning for the sake of replicating an entire organism. The main method of cloning mammals is called somatic cell nuclear transfer, where the DNA from a cell of an existing organism is put into a donor egg whose nucleus has been taken out. The major question that surrounds this process and the idea of replicating an organism is whether or not it detracts from human dignity. à à à à à According to the Catholic Church, cloning is immoral on many bases. Firstly, even the experimentation of cloning is seen as immoral, since, in the process of creating a viable clone, hundreds of embryos simply do not work. In the case of Dolly, the first successfully cloned sheep, she was the only survivor of 277 attempts. Statistics like this show how scientists are playing ââ¬Å"fast and looseâ⬠with living embryos, which is unacceptable for Catholic teaching. The Catholic Church is also against the fact that, in therapeutic cloning, only a part of the new organism is ââ¬Å"harvestedâ⬠, and the remaining parts are destroyed. This raises Catholic objections on the grounds of playing God by creating and destroying life. This goes back to one of the temptations presented to Adam and Eve, ââ¬Å"You will be like godsâ⬠(Genesis 3:5). à à à à à On the account of reproductive cloning, the Catholic Church has a whole new set of reasons relating to how it is immoral. With the advancements in cloning it is said by some that it will be possible to engineer a genetically superior human being. The problems with this are evident in the fact that an engineered child would have been created in our image, instead of the image of God. It is therefore arrogant of us to say that we can direct the evolution of humanity better than God. à à à à à Proponents of cloning raise many points in how, specifically therapeutic cloning, can advance knowledge and even lead to cures for some diseases. For example, theoretically, a liver cell could be used to grow a new, healthy liver for a transplant. The same could be said for kidneys, or organs that are not currently transplantable. Genetic diseases, such as cystic fibrosis can be better handled with answers to the genetic puzzle that cloning could provide.
Saturday, January 11, 2020
Network Design Project It/230 Final Paper
Network Design Project Art Meyer IT/230 Pernell Curtis 11/27/2011 Executive Summary The Tri-Corp company is need of a complete networking solution. Tri-Corp has two offices, one in Phoenix, and the other in Tucson. The main office in Phoenix is a large 4-story building with 50 workstations and 10 network printers. The Tucson office has five separate workstations and three network capable printers. The clients use Outlook exchange web server for their email communications; both offices require data transfer on a daily basis. Each user requires access to the internet and the shared data stored on the nine clients workstations.DSL, cable, and T3 network solutions are available to the clients. The Tucson clients have a cable internet connection with 8mbps max upload and download limit. The physical layout of the Tucson office is a single story design where the workstations are located in five separate offices in a large building; an unused storage closet is located in a central point in between the offices of that building. Tri-Corps needs a reliable network, with a VPN service to accommodate the needs of traveling executives, upper management, and a growing workforce.Company executives at Tri-Corp have requested a remote access solution as part of their systems upgrade. The company desires its employees to have access to the network from their home PCââ¬â¢s and laptops as a method to help improve productivity and eliminate unnecessary travel and paperwork. In order to function more efficiently, many companies across the globe require remote access to their server systems. A remote access solution will provide Tri-Corp with a proven method to retrieve data from remote locations and them with the opportunity for their executives to complete necessary tasks on the go.However, remote access may provide intruders a method to access Tri-Corps secure data. These vulnerabilities may expose the risk of exploitation and have caused irreparable damage to other companies i n the past. Successfully implementing Tri-Corps remote access solution requires careful planning to protect their data and avoid unwanted attacks by unauthorized users. In addition to the Enterprise system upgrades, Tri-Corp needs to design and implement a disaster recovery plan and review system security policies.While some disasters are unavoidable and vary in type and magnitude, system security attacks are avoidable when companies enforce their information policies and protect their resources. Tri-Corps offices may contain vulnerabilities because they offer remote access to company data to many employees in both locations. Cabling Specifications The shield twisted pair (STP) or unshielded twisted pair (UTP) cable are what connects computers to the switch on the Star Topology network10Base-T is one of the Ethernet standards for cabling in a network environment. 10BaseT uses a twisted pair cable with a maximum length of 100 meters.Standard 10BaseT operates at 10 Mbps. It is commonl y used in a star topology. Gigabit Ethernet (CAT6) over twisted pair copper wires is the preferred cabling specification for high speed data transmissions. Transmission rates in this cabling specification may reach speeds of up to 1000 Mbps. CAT5 T/100 base cables will provide adequate data transfer for most other applications. Local Area Network (LAN) Topologies In the star topology, instead of having a direct connection to each other, the systems are connected to a central device, such as a network switch or a router.One definite advantage the star topology provides is network stability. For example, in the star topology, when one system goes down, it does not bring the rest of the network down with it as it does in the bus or ring topologies. The star topology is the most prevalent topology in use today. The physical topology of the star network contains six different classifications; namely point-to-point network, ring network, mesh network, bus network, tree network and star ne twork. Of these six, the star network is one of the most commonly utilized network topologies.According to definition, the term ââ¬Ëstar topologyââ¬Ë, refers to a network wherein all the nodes are connected individually to one common hub (Naik, 2011). Simply stated, the stat topology is a network topology wherein transmission stations connect to the central node in a configuration where the design of the network stations resembles the shape of a star. Essentially, the star topology design may be likened to the spokes on a wheel, all connected to the central hub. In this network configuration, the exchange of date is only possible through an indirect connection to the central node; this connects all other nodes to the network.As with various other types of network topologies, the star topology has its own set of particular advantages and disadvantages. These factors require careful consideration in regards to the feasibility of the network setup. When evaluating this topology, careful comparison to other network solutions and consideration of all available options helped to discover which solution would provide Tri-Corp with the best answer to meet their needs. It is very easy to install and manage star network topology because its functionality is the simplest among the topologies.Because all computers rely on the central hub, troubleshooting a star topology network is much easier, therefore, any problem, which leaves the network inoperable, leaves a direct path to the central hub. This feature simplifies troubleshooting by offering a particular spot for error connection and at the same time, the reliance is very high on that single point. In star topology, the data packets do not have to make their way through various nodes; this ensures that the data transfer is fast.Consequently, the fact that the data packets only make it through three different points also guarantees that the data is safe. Because the nodes do not connect to each other, problems in one node do not affect the routine of other nodes in the network. Since all the computers on the network have independent control of their networks and are only dependant on the central hub computer, failures in transmitting data and other possible problems in this area are less likely to occur. In addition, if the hub is safe then every computer in the network is safe.This type of network provides more privacy than any other network. Additions, such as new machines or replacing older units are much easier in the star network topology, since the network will not experience any disruption to facilitate changes. The primary problem with star network topology is the fact that it is highly dependent on the central hub functioning properly. Additionally, network size is dependent on the number of connections available on the hub. This network type requires more cable when compared to other topologies, such as linear bus topology.Therefore, the cost and expense of a star topology runs hig her and the expenses incurred are relatively high. Since the performance of the total network depends on the performance of the hub, a slow server will cause the entire network to slow down. As mentioned earlier, the star network topology requires more cable to connect the network together than the usual Bus topology. For this particular network setup, the recommendation is to use is the RJ45 or the Ethernet cables. To be specific, this network setup requires a gigabit 48-port switch and CAT6 base T/1000 Ethernet cabling to both the IT and the graphic design department.The other departments will use CAT5 base T/100 cabling. In a Star Network the entire network is dependent on the hub so if the entire network is not working then there could be a problem with the hub. Since all the computers on the network have independent control of their networks and only dependant on the central hub computer, the failures in transmission and other possible problems in this area are less likely. In addition, if the hub is safe then every computer in the network is safe. This type of network also offers more privacy than any other network.A Star Network Topology is best suited for smaller networks like Tri-Corps and works best when there is limited number of nodes. The primary objective is to ensure that Tri-Corps hub or the central node is always functioning and that all extra security features are added to the hub because it s the heart of the network and the stability of the network relies directly on the stability of the central hub. Wide Area Network (WAN) Design Tri-Corps two offices, one in Phoenix and the other in Tucson require a WAN network to effectively communicate and share data and resources.The main office in Phoenix is a large 4-story building with 50 workstations and 10 network printers. The Tucson office has five separate workstations and three network capable printers. The clients use Outlook exchange web server for their email communications and require mini mal amounts of data transfers between the offices. Each user requires access to the internet and the shared data stored on the nine clients workstations. Both DSL and cable internet service are available to the clients. The Tucson clients have a cable internet connection with 8mbps max upload and download limit.The physical layout of the Tucson office is a single story design where the workstations are located in five separate offices in a large building; an unused storage closet is located in a central point in between the offices of that building. The current system in the Tucson office uses a non-commercial five-port router; each computer connects to the router through a Cat5 Ethernet connection. The first step is to discover the bandwidth needs and average user loads. Data from Cisco (Boda, 2009) suggests the average broadband connection generates approximately 11. gigabytes of Internet traffic per month. We will use this figure to calculate the bandwidth needs of this company. Calculating with 10 users and a five-day, forty-hour workweek as our model for the Tucson office, we can calculate average daily consumption to be approximately 5. 7 gigabytes per day of bandwidth consumption. The current cable internet allows for 28 gigabytes during an eight-hour period (multiply 8mbps x 3600, the number of seconds in an eight, hour period, and divide by 1024) should provide a stable connection throughout the day as all ten users are rarely on the network at once.The setup of the Phoenix offices is more complex; they require a T3 connection to accommodate the IT and the Graphic Design departments. The third floor houses the IT department, the first floor houses the reception staff, along with lower level management, the second floor houses the graphic design department, and the fourth floor houses the operations staff while the fifth floor houses upper management. The current system in the Phoenix offices uses a network hub and repeaters. Both the IT and graphic de sign department complain they do not have sufficient bandwidth to meet their needs.Upper management complains that the system on their floor is too slow. The Tucson offices complain they experience difficulty sending and receiving data and email from the Phoenix offices, and connections time out frequently. The current system in the Tucson offices lacks design and will not allow for additional users or adding network printers. Additionally, aside from the firewall provided by the router, no real network security is in place and the workstations cannot communicate with each other in either location. The Phoenix offices need increased speed and greater bandwidth. Both offices require better communications etween the workstations to increase efficiency. The recommendation for the Tucson offices is to install a server system using Windows server 2003, and a VPN; this office will utilize the star topology, thus allowing for growth and easier diagnostics. In addition, failure of one works tation will not affect the entire network and the speed will be optimal. The server software provides several benefits. Multiple applications are available to run in the Server 2003 environment, including financial apps, database programs, and e-mail exchange operations as well as web server and Internet programs.Domain operations are included in the software, something that will become an important resource by adding security and the ability to the local and group policies of the network. Additionally, if Server 2003 is not utilized as a domain controller, then it can run simple network operations using peer-to-peer structures (Garza, 2010). An extensive amount of shielded twisted pair Cat5 cables will be necessary to connect each workstation and the network capable printers. The VPN system will allow the users to connect remotely to their workstations and the company intranet. The Tucson office will utilize the central closet as a server room.The server will handle all application s and house the data storage. The server will have a connection to a primary switch; this switch will also handle the data transfer between the local PCs of each office. The switch accomplishes two tasks; since connections from one port to another are made on an as needed basis (Axia College, 2005), this will eliminate traffic collisions and create faster point to point connections. The switch will be connected to ports on the private network switch allowing for access to the application and data servers, along with the DNS and Active Directory server.Since the data transfer needs are minimal, the switch does not need Cat6 cabling; Cat5 STP will work, gigabit switches will not be necessary. Security from outside traffic will be enforced by closing the ports to outside traffic. Users will access the internet via an Internet Security and Acceleration (ISA) server, which will be connected to the public network. The recommendation for the Phoenix office will also include a new server an d the Windows server 2003 platform. Both offices will use the same VPN, however, in the Phoenix offices, only upper management will have access to the VPN from outside the building.The existing network hub will be replaced by T/1000 switches connected to gigabit LAN network interface cards on each of the workstations in the graphic design department as well as those in the IT and upper management. Gigabit LAN adaptors are required on the servers to accommodate the high bandwidth needs of these departments. The reception area, lower management, and Operations will connect to standard switches using a T/100 base, thus eliminating the problem of network congestion in the departments where more bandwidth is required, and limiting the bandwidth where it is not necessary.Cat6 cabling will be utilized on the second, third, and fifth floors to accommodate the bandwidth needs of the high end users. CAT5 cabling will be used throughout the rest of the system and should easily meet the needs o f the end users in the other departments. The primary cost of upgrading both systems will be in the cabling; both offices will require an extensive amount of CAT5 and CAT6 networking cables.The server systems and switches will incur the second highest cost; both upgrades are necessary to provide the company with greater ease of use and transitional growth opportunities Updating the current systems and switching to Windows server 2003 will provide both offices with greater stability, efficiency, and increased security. Updating the Phoenix offices from hubs to switches will increase the flow of network traffic and allow for greater communications between both offices and all workstations.The Tucson offices will benefit from less frequent connection time outs and rapid data transfer to and from the Phoenix offices. Additionally, both offices will be more prepared for rapid growth. The Tucson offices will show increased productivity by networking all of the printers. The Phoenix office s will benefit from as the IT department and graphic design will have the necessary bandwidth to meet their needs, while upper management will spend less time waiting on reports and data necessary to make day to day decisions that will affect the companyââ¬â¢s long-term growth strategies.Upgrading the current systems is not only a wise decision, it is the only logical decision for a company that is primed to move ahead and take control of the market in its area and expand into more profitable markets in other cities as well. Network Protocols VPN users gain remote access to their LAN through the internet. VPNââ¬â¢s are network links formed by connecting to an ISP and the company LAN. These connections use technologies such as sophisticated packet encryption to secure the data link. This is especially important, as the information is travels across a public network.The advantage of using a public network versus dedicated connections is the cost; many companies take advantage of VPN technology to provide remote access without compromising security. Dial-up networking is the simplest way to connect to the Internet. Computers connect over the phone line using a modem. Users must pay for a subscription to an ISP like AOL. Dial-up connections are much slower than broadband and the speed maxes out at 33. 6 Kbps. Some applications will work with satisfactory results; more and more applications require greater connection speeds even when performing simple tasks such as transferring files.Both applications require user name and password login information; that however, is where the similarities end. VPN users benefit from a secure, encrypted connection that is firewalled from intruders and typically monitored by a network administrator to ensure the privacy of the connection is not compromised. Dial up users connect to a public network and may be susceptible to outside attacks. Network Remote Access Company executives at Tri-Corp have requested a remote access sol ution as part of their systems upgrade.The company desires its employees to have access to the network from their home PCââ¬â¢s and laptops as a method to help improve productivity and eliminate unnecessary travel and paperwork. The company requests that all upper management be granted unlimited access to all files and network resources and permissions. Additionally, they wish to grant access to all mid-level managers, the operations manager, and the entire graphic design department. Support staff and non-salaried associates desire access to the company site for employee benefits and access to daily reports.Tri-Corps enterprise system runs two servers, one in the main branch located in Phoenix; the other in the support branch located in Tucson. Both branches utilize Microsoft Server 2003 software, and a star topology. Outlook is among the programs that are most widely used by the executive branch, Publisher and Adobe Illustrator top the list among the graphic design department. O perations use a simple data storage program that breaks down cost and projects business forecasts. Tri-Corp believes their company will function more efficiently by granting its employees remote access to their server systems.Whereas it is true remote access does provide many companies with a proven method to retrieve data from remote locations and offers their users a chance to complete necessary tasks on the go, Tri-Corp will be at risk; remote access also offers intruders a way in to Tri-Corps secure data. If these vulnerabilities expose the company to exploitation, the damage may prove to be irreparable. Companies who plan to use a remote access solution need careful planning to protect their data and avoid unwanted attacks by unauthorized users.Therefore, the question lays, ââ¬Å"Should Tri-Corp use Dial-Up or VPN to complete their remote access solution? The first step is user control; it is imperative to control which users can access the network from outside the company. Ne twork access should be granted only for users who need it; the likelihood is that not everyone is likely to need network access from outside the company. Whether Tri-Corp decides to use Dial-Up or VPN they must set up remote access accounts for remote users that are separate from their normal accounts, and make these accounts more restrictive than their normal LAN accounts (Axia, 2006).The company executives may believe this security measure to be impractical; however, this strategy is vital, particularly for users who normally have broad security clearance (Axia, 2006). The advantage of using Dial-Up is the Dial-back feature. Dial-back is a feature whereby you securely enter the phone number of the system from which users are calling (Axia, 2006). Users requesting remote access from a fixed location such as a private residence are ideally suited for a Dial-Up remote access connection with the dial-back feature.Once these users connect, they dial the system, request access, and then the remote access system terminates the connection and dials the preprogrammed phone number to make the real connection (Axia, 2006). The home based computer then answers the call and proceeds to a normal connection. This service offers greater security for home based users because any other user who may attempt to gain access will not be allowed access with this feature enabled. One more key advantage of a dial-up remote access server (RAS); RAS solutions require employees to onnect to the corporate network via a direct telephone call to modem banks installed at the network edge (ââ¬Å"Remote Access Vpn Solutionsâ⬠,à 2000). Three key differences separate dial-up and VPN architectures; the first being that direct dial-up does not utilize the internet to avoid incurring long distance phone charges. Next, the corporation setting up the dial-up connection is responsible for providing modem banks (modem banks are similar to network hubs or switches). Finally, encryption technol ogies are not required because the network traffic passes through non-shared links.Undoubtedly, granting remote access may increase productivity and effectiveness by giving employees direct access to information from anywhere in the world. One primary example is email access; this factor alone makes a big difference for employees that are constantly on the go and rely on email to communicate from remote locations. The business benefits of using a VPN delivers several advantages versus RAS solutions. VPNs offer two distinct cost advantages; first, Internet connections, which are typically local calls, are much less expensive than toll free or long distance dial-up connections.This consideration typically is what convinces most organizations to apply a VPN rather than an RAS solution. Secondly, the equipment cost of purchasing and maintaining a VPN is much more cost effective than standard RAS equipment. Installation and use of VPNââ¬â¢s may yield a cost savings of up to 70 percent over a standard RAS system. Comparatively, most companies discover that remote access VPNs pay for themselves in cost savings in a relatively short period. By way o f contrast, RAS systems only incur greater cost throughout the course of time, especially if upgrades or adding more users is necessary.The amount of access available is dependent on the scaling system and how the VPN distributes the clientââ¬â¢s software. Scaling a remote access may also necessitate increased bandwidth of the companyââ¬â¢s Internet connection. As soon as the VPN gateway is operational, the company may change the scaling system to support anywhere from a few hundred to tens of thousands of users. The option of scaling for RAS solutions is not as trouble-free and requires the use of additional hardware and adding phone lines.The widespread use of broadband Internet service now offers VPN clients an inexpensive solution to connect corporate networks by utilizing the World Wide Web to connect from ou tside the company walls without losing speed and compromising security. This is a very attractive option for mobile users in particular. Dial-up solutions do not always provide the same security and ease of use as this option. In some cases dial-up solutions may very well remain the best solution; many companyââ¬â¢s still employ this solution as part of their remote access services for their fixed locations.With proper maintenance, this solution will still serve the needs of a smaller client base. However, if the client base grows rapidly and significantly, they may soon overload the RAS system and discover they need to move on to a different solution. The recommendation for Tri-Corp is to utilize a VPN solution. However, the executive branch will utilize the dial-up service from their fixed locations, such as their place of residence. This will offer greater security by using the dial-back feature to ensure the user is not an unauthorized intruder.This will also remain cost effe ctive as the executive staff numbers only eight individuals. Graphic design, operations, and the rest of the support staff will gain access through the VPN software in Microsoftââ¬â¢s Server 2003 package. However, each department will only have access to the resources that are consistent with their job requirements. Operations will have access to the database and Outlook; the graphic design department will have access to their saved projects files and Outlook. The support staff will only have access to the company human resources sites and limited access to non-confidential company information.The key elements of a successful remote access implementation will include security, performance, high availability, and client management. A meeting with the Tri-Corp company will outline and clearly define their specific requirements in each key area to discover the solution that will serve the companyââ¬â¢s needs. Utilizing both dial-up and VPN solutions will offer this company the be st of both worlds; security and performance as well as greater productivity and performance without the need for incurring greater cost. Network Business ApplicationsThe recommended applications for Tri-Corp will include Microsoftââ¬â¢s Office Professional suite and the Microsoft Server 2003 software for the local servers. Outlook will replace the exchange server provided by Microsoft. This will provide Tri-Corp with more flexibility and aid in the ease of adding new email user accounts. POP3 and SMPT will require proper configuration to enable this service. In addition to the Enterprise system upgrades, Tri-Corp needs to design and implement a disaster recovery plan and review system security policies.While some disasters are unavoidable and vary in type and magnitude, system security attacks are avoidable when companies enforce their information policies and protect their resources. Tri-Corps offices may contain vulnerabilities because they offer remote access to company data t o many employees in both locations. Network Security We will first address the issue of Enterprise Security and best practices. Microsoft has developed a four-part checklist, which focuses on the following key points: Assessing the environment, protecting the network, protecting servers and clients, and finally, monitoring the environment (Microsoft 2011).Using this guide will help increase Tri-Corps security and reduce the risk of outside attacks. Assessing the environment requires learning all of the components within the infrastructure. Tri-Corp needs to identify all assets and security issues while continually monitoring the quality of the security program (Microsoft 2011). Their first step will be to partner upper management with the IT staff so they may both focus on establishing an ongoing process to classify and examine all security risks. Failure to establish this vital communication will absolutely place the company at risk with the largest security problems.Next, protecti ng the network; Tri-Corps server system will utilize both Secure Socket Layer (SSL) encryption, and a Public Key Infrastructure (PKI) to aid in maintaining network security. Secure Sockets Layer (SSL) encryption is one of the leading technologies used today to secure web sites, intranets, extranets, and other server-based applications (IT Observer, 2009). Using SSL along with special server digital certificates will provide the security handshake and the data encryption to prevent eavesdropping and secure the integrity of data transmissions (IT Observer, 2009).Although SSL and PKI will help provide network security, additional security measures are necessary to protect the servers and clients. Tri-Corps server will utilize a software firewall such as Zone-Alarm, and must maintain up to date anti-virus and Trojan protection software such as Kasperksy, Norton, or McAfee. Next, the IT department must ensure every security patch for all operating systems and applications are applied as soon as they become available. The final focus point in network security, monitoring the environment, entails the weakest link in all network security, people.Monitoring the environment is more than watching and reacting; Tri-Corp must establish a proactive strategy to audit the network and discover poor practices and configurations. Password rules are a primary example; passwords must contain both upper and lowercase characters and one symbol. Only secure messaging through company provided and monitored email accounts will be allowed, no instant messaging or chat rooms; all emails must pass a virus scan before the recipient will be granted access to view the message.With a detailed information policy in place, proper training, consistent, proactive monitoring, Tri-Corp will protect its data and avoid the mess and disruption of security leaks. Once this policy is in place, Tri-Corp will need to move on to its disaster recovery plan. Tri-Corps needs to have a disaster recovery plan i n place, to return to normal after disaster has struck. Defining disaster means an abrupt disruption of all or part of its business operations, which may directly result in revenue loss (Cisco, 2008).To reduce disaster losses, it is imperative to have a first-rate disaster recovery plan for every business subsystem and operation within Tri-Corps walls. Backup and Disaster Recovery Every time a business encounters a disaster, the company always points to one or more causes and effects. The causes may be anticipated, or a result of human, or mechanical origin, and can range from events as miniscule as a minor hardware or software components malfunctioning to commonly recognized events such as earthquakes, fire, and flood (Cisco, 2009).These disasters may cause small interruptions or may lead to total business shutdown for days or months. Occasionally, these disasters have proven to be fatal to unprepared businesses. Forming a disaster recovery plan begins by recognizing the root cause and effect, followed by a detailed analysis of probability and severity, and ranking them in terms of their business priority. The outcome is an official evaluation of threat and a disaster recovery plan that takes into account all available recovery means.In simpler terms, Tri-Corps IT staff needs to determine what types of disasters are most likely to occur and rank them in order of probability. Afterwards, Tri-Corp must create an action plan that encompasses detailed steps to return business to a state of normalcy in the event of the given disaster. Finally, Tri-Corp must form a Disaster Recovery Committee to assume responsibility for rehearsing, carrying out, and improving the disaster recovery plan on a continual basis. Tri-Corps disaster recovery plan must include a data backup plan in the event the companyââ¬â¢s database is compromised. The recommendation is to use IBMââ¬â¢s Tivoli software.IBMââ¬â¢s backup and recovery service provides companies with a backup and d isaster recovery solution that includes cloud backup, remote office, unified recovery, and virtual server protection. Their Tivoli Storage Manager received the 2011 CRN Channel Champions Award because of the quality, reliability, support, and scalability of their solution. Many other companies offer backup and disaster recovery solutions, however, based on my research IBM offers the most complete and reliable solution. IBMââ¬â¢s backup and recovery service provides companies with a proven solution for managing their storage needs with a central backup solution.This service uses smart data movement and smart data store technology; together, these technologies complete backups and restores quickly and efficiently while still providing the client with the flexibility to change and adapt. Additionally, the IBM Tivoli suite of storage products supports more than a dozen OS platforms, along with several network connectors, and more than 500 storage devices. (Art W Meyer,à 2011,à pa ra. 2,4) Using these two key components will ensure Tri-Corp will complete the necessary preparation to survive disaster and avoid external attacks.Additionally, this plan will ensure that the resources required to keep the business going are available to key personnel. The questions regarding what to do, how to do it, and the ever- present need for communication to critical data is a key component in maintaining Tri-Corps success. However, no amount of planning provides the desired effect without a thorough understanding of the organization and its inner workings. Tri-Corp must incorporate its processes, people, and systems with precise, exacting detail to aid in a seamless transition.Following the preceding recommendations will help assure Tri-Corp does not fail because of ignorance. This recommendation will protect Tri-Corps valuable data assets and help the company to keep moving forward.References . Axia College. (2005). Networking, a Beginners Guide, Fourth Edition. Retrieved from Axia College, IT/230 website Axia College. (2005). Networking, a Beginners Guide, Fourth Edition. Retrieved from Axia College, IT/230 website Agility Recovery Solutions. (2009). Retrieved from http://blog. agilityrecovery. com/disaster-recovery? à k=disaster%20recovery%20solutions&_kt=b63adcc1-e0cf-4e52-b042-bbffd8dddc96 Art W Meyer. (2011). Backup and Disaster Recovery. Retrieved from Art W Meyer, IT/230 website Backup and Recovery. (ND). Retrieved from http://www-01. ibm. com/software/tivoli/solutions/backup/ Backup & Recovery. (2011). Retrieved from http://www. sonicwall. com/us/products/Backup_Recovery. html Boda, K. (2009). Forums > Cisco: Average Connection Consumes 11. 4 GB Per Month. Retrieved from http://www. dslreports. com/shownews/Cisco-Average-Connection-Consumes-114-GB-Per-Month-105086 Cisco. (2008). Disaster Recovery: Best Practices. Retrieved
Subscribe to:
Posts (Atom)