Thursday, October 31, 2019

Isolated By The Internet Essay Example | Topics and Well Written Essays - 750 words

Isolated By The Internet - Essay Example The positive outcomes of the internet revolution are many. But there are negative aspects also. Stoll brings forth researched viewpoints of the psychologists and personal observations supported by documented studies in support of his stand. Stoll quotes facts from the research conducted by Carnegie Mellon University psychologists Robert Kraut and Vicki Lundmark. (393)Some top-ranking computer companies aided the research project but the outcome is not to their favor. The findings are â€Å"[a]fter following the study group, the psychologists found an average increase in depression by about 1 percent for every hour spent online per week.†(393)Another finding is, social relationships online develop at the cost of the individual to individual social involvement. Good and bad effects of internet In a well-written article, Stoll presents good and bad effects of internet and how people are isolated by it, by too much dependency. He mentions how â€Å"one friend tells how she found a support group for an obscure medical condition.†(392) It is a well-known fact that many youngsters have entered into wedlock by corresponding/chatting through the internet. Wired family members are able to keep in touch through email and such communications have become popular. Stoll admits without hesitation â€Å"the electronic virtual community is a positive social development† (393). Internet causes degrading communication skills according to psychologist Kimberly Young. (396)He also uses College and University reports to support his viewpoints. Stoll employs UCLA (University of California at Los Angeles) loneliness Scale for Epidemiologic Studies Depression Scale to show that on average depression increase 1 percent for every hour a person is online per week (393). This is an alarming finding. The limitations of the advantages of internet Stoll is an expert on computer security and is well-versed about the technical aspects of the use and impact of computers in t he day to day life of an individual. He makes clear the isolating factors and states that internet offers anonymity. To manage too many relationships demands time and energy and the chance of developing meaningful relationships are too little. Non-personal contacts within the information highway are fine for some time, video games offer a release from reality and a distraction from depression, but they are not long-term solutions for the betterment of the society. People make friendships with many through the internet, without knowing why for they are doing so. Every relationship should have a purpose, and with too many contacts, the purpose is lost. Thus, one addicted to the internet, one develops complications in personality. Control technology, otherwise it will control you Internet use has caused many new social and psychological conditions. The issue with us is we take the benefits of the technological progress and advantages of the internet revolution for granted. Technology c an be an important tool in providing plenty and prosperity to the life of an individual in monetary terms, but one must accept and adopt it in suitable increments, to get the real benefit. If your gain is at the cost of happiness of your family life, it is not good to chase such gains. Stoll urges people to consider the harms of internet use from the viewpoints of children and its overall impact on family life. It is causing dent in the family values, reducing the time of personal interactions, and distances one from the realities of life. Many office-goers bring their work home and have no time to interact with children. Their playtime is robbed by the office files and procedures and the

Tuesday, October 29, 2019

HISTORY From Poverty to Social Exclusion Essay Example | Topics and Well Written Essays - 500 words

HISTORY From Poverty to Social Exclusion - Essay Example (NEW YORK TIMES 1909) A wealthy businessman, Seebohm Rowntree is well known for his in depth analysis of poverty. When concentrating on this particular time period, he stated that in the 1890s, it was low wages that was the major cause of poverty in Great Britain (ROWNTREE 2008). The problem of unemployment was especially important in bringing about poverty in late nineteenth and early twentieth centuries. "More than one-quarter of the years from 1834 to 1911 were plagued by high levels of cyclical unemployment". If a worker was unemployed for more than a couple of weeks, he would find himself in economic distress, and would have to look for government support. (BOYER 2004) A very important factor that led to poverty was widowhood. In case of the death of a husband, women were generally left without any earning family member to support them. This problem arose because at the time, it was not as easy for women to get a job as it is today. The opportunity to get a job for women was easy in the textile centers of the country, but was negligible in the mining and industrial towns. In these areas, therefore, women became victims of acute poverty when left without husbands.

Sunday, October 27, 2019

Cyclo-oxygenase inhibitors of human diseases

Cyclo-oxygenase inhibitors of human diseases Historical background Cyclooxygenase (COX) inhibitors are a widely prescribed group of antipyretics and analgesics worldwide and are important component in the treatment of inflammatory conditions. Although first COX inhibitor was discovered more than a decade ago their origin dates back to ancient Mediterranean descent1. Back and other body pains where treated using extracts of poplar tree bark and leaves of myrtle. Use of willow bark emerged far more lately and its first appearance was reported in England in 17631. As was later discovered, the essence of the willow bark possessing anti-inflammatory and antipyretic properties was salicin. Further modification of its structural properties allowed generation of salicylic acid that eventually was developed via Kolbe reaction using phenol1,3. In 1899 Bayer company went ahead in synthesising more susceptible derivative of it, acetylsalicylic acid and named it aspirin. Following this phenylbutazone (1949) and indomethacin (1963) came along however the mystery of mechanism of their action in the body was not yet developed. It was not known until 8 years later when an idea surrounding the synthesis of prostaglandins within body was revealed and for which a Nobel Prize in physiology and medicine was awarded (1982)1. It was proposed that first non-steroidal anti-inflammatory drug (NSAID), aspirin, acted upon inhibition of an enzyme that played role in utilising unsaturated fatty acids into biochemical molecules exerting their action in conditions such as inflammation, pain, and fever and platelet synthesis. It was accepted that during changes occurring within stimulated cells and tissues prostaglandins synthesis was taking place 1,3. Structure of COX was isolated in 1976 and its second isoform was confirmed around 14 years later by few different laboratory investigations; investigations which greatly allowed appreciating the nature of first nonselective cox inhibitors NSAIDs in the treatment of human diseases1. 1.1 The pharmacology and chemistry of cyclooxygenase enzyme Cyclooxygenase (COX aka PGG2/H2 synthase) belongs to the family of enzymes known as myeloperoxidases and it is the crucial enzyme in the synthesis of prostaglandins, prostacyclin and tromboxane A2 resullting from the conversion of arachidonic acid (AA) 2,4. This heme-containing COX enzyme is a bifunctional biocatalyst with two interconnected active sites: cyclooxygenase and peroxidase which action involves generation of hydroperoxy endoperoxide PGG2 via cyclooxygenase cycle (Fig.1.) into its reduced form of hydroxy endoperoxide (PGH2) (Fig. 2.) 2,4. Both isoforms of COX enzyme are expressed in endothelial, monocytic and renal cells with COX-2 being more profound in inflammatory and cancer tissues. Both enzymes are characterised by signal peptide, endothelium growth like factor (EGF) region, membrane in-bound domain, catalytic part, interface between monomers and N-linked polysaccharides residues2. The signal peptide in COX-1 consists of 23 residues whereas COX-2 has only 17. The EGF like region constitutes a major part of the interface and is not found in other myeloperoxidases. It is involved in Cys-Cys cross linked bridges with lack of Cys9 in COX-1 and Cys512 in COX-2. The membrane in-bound domain accounts for 33% of overall similarity and 24% of identity within membranous face. This domain is described as consisting of 4 amphipathic a helices that surround the entry to the COX site. The catalytic part is known to be the largest part of the enzyme with remained homology between other myeloperoxidases. 180Â ° rotation between subunits is preserved with chemical interaction between polar, ionic and hydrophobic moieties. Differences in residue positioning prevent heterodimerization and dissociation from facial interaction inactivates the enzymes overall catalytic activity 1,2,3,4,5. Figure 1. Mechanism of COX cycle in cyclooxygenase active site showing free radicals formation denoted by ? prior to PGH2 synthesis in POX pathway (not shown) 2. Attraction of hydrogen atom from Tyr385 by peroxyl radical of PGG2 allows for the regeneration of the steps of the reaction in the COX cycle of prostanoid biosynthesis. The coloured boxes are to indicate the origin of oxygen atoms. PLA2 phospholipase A2, S secretory, C cytoplasmic. Figure 2. A diagram summarising changes made to AA in the distinct active sites of the PGG2/H2 synthase and products formed via action of each catalytic active site 2. 1.2 The nature of cyclooxygenase inhibition in the human body Inhibition of cyclooxygenase action is desired in the treatment of human diseases. Not only because it suppresses the inflammatory production of prostaglandins in the conditions such as: dysmenorrhoea, rheumatoid arthritis, osteoarthritis but also because it prevents platelet aggregation, suppresses tumour growth and prevents cancer5. Until 1994 it was not clear by which mode, mechanism or process inhibition of COX was carried out. Just complexation studies between COX and flurbiprofen allowed insight into molecular basis of COX inhibition. The investigation led by Garavito and his colleagues proposed such model of inhibition. In his model it was suggested that the enzyme in question possesses long hydrophobic path that originates from in-membrane bound moiety up to the heart of the dimer subunit. Blocking this channel stops the endogenous substrate (AA) from binding hence possible intervention in the process of prostaglandins biosynthesis5. 1.3 The types of cyclooxygenase inhibitors in the treatment of human diseases There are several types of COX inhibitors available in the treatment of human diseases. The very first one, aspirin, is known to act through non-selective and irreversible manner. As this manner suggests aspirin binds to both types of COX enzyme by acetylating Ser530 residue upon covalent modification. Consequently effects such as risk of excessive bleeding, ulcer formation or foetal deformation limit the use of aspirin in dealing with long term diseases. Nowadays it is mainly considered as the important component in the treatment of cardiovascular conditions due to its anti-platelet activity 1,3. Other types of non-selective NSAIDs such as piroxicam, ibuprofen or diclofenac, constitute majority of therapeutic agents being prescribed however due to harmful effects they are being considered less effective in the long term treatment. The damage to the gastrointestinal (GI) system is due to inhibition of COX-1 expressed in GI mucosa which results in formation of ulcers with associated bleeding. Therefore since the main target for choosing those drugs is found to be of inflammatory nature (inhibition of COX-2) they are nowadays preferred in topical dosage forms 1,3,5. The consequence of the undesired effects caused by non-selective COX inhibitors targeted new approach towards development of more specifically acting agents. The era began on discovery of the second isoform of cyclooxygenase and introduction of first COX-2 selective agent (1999) was introduced to the market within 10 years since its discovery with celecoxib and rofecoxib for the treatment of arthritis. The discovery proposed mechanism of actions of both enzymes within the body with COX-1 possessing more constitutive effects especially in GI tract. It was therefore suggested that COX-2 was an inducible form in conditions such as inflammation and pain, symptoms desired in treatment of human diseases associated with the effects of COX-2 isozyme 1,3. 2. ASPIRIN THE ORIGINAL COX INHIBITOR (Joyce) 2.1. Pharmacology and chemistry of Aspirin Plant ingredient salicin was discovered in the willow bark and leaves in the 17th century by a greek physician (Hippocrates) who prescribed it as an analgesic and antipyretic. Further into the 17th century a crude form of salicylic acid was made by a German scientist (Charles Frederic von Gerhardt). This was followed by production of a purer form of salicylic acid by another German chemist (Karl Johann Kraut). Finally in 1897 a German chemist Felix Hoffmann, who worked for the pharmaceutical company Bayer, was assigned the task to find a better derivative of salicylic acid. He also had his own personal reasons for wanting to find a better derivative. His father had been taking salicylic acid for his arthritis pain but could no longer take it without vomiting3,7. In 1889 Hoff man then found a way of acetylating the hydroxyl group on the benzene ring of salicylic acid to form acetylsalicylic acid. Hoffman father tried the new derivative and it was pronounced effective. The name ‘ASPIRIN was given to the drug by Bayer chief pharmacologist Henrich Dreser7. Aspirin was found to have antipyretic, analgesic and anti-inflammatory effects. It does this by inhibiting cyclo-oxygenase(COX) or prostaglandin endoperoxide synthase(PGHS) enzyme irreversibly. COX is responsible for cyclizing arachidonic acid and adds the 15-hydroperoxy group to form PGG2 which is the precursor to prostaglandins. An enzyme perioxidase is responsible for reducing the hydroperoxy group of PGG2 to the hydroxyl group of PGH2.(4)(See Figure 15- prostaglandins synthesis) Prostaglandins can be described as chemical mediators that produce a variety of strong physiological effects in the body. Most importantly they are responsible for the activation of the inflammatory response, production of pain, and fever. There are three isoforms of the COX enzyme of which aspirin has an effect on two which are COX-1 and COX-2. Aspirin binds covalently modifiying COX-1 through acetylation of its Ser-530 and COX-2 through acetylation of its serine 516 residue by placing a bulky constituent (acetyl) and this directly inhibits binding of arachidonic acid. Aspirins action is more potent against COX-1 than against COX-2. This difference in inhibition of the two COX enzymes by aspirin is due to the larger volume of the COX-2 active site produced by the Val-523 substitution at the side pocket. (1,7, 9) The difference in the size of the active site has been exploited by pharmaceutical companies to develop selective COX-2 inhibitors (section 4) COX-1 is an essential enzyme expressed in majority of tissues and also in platelets. It is responsible for prostaglandin production involved in homeostatic mechanisms e.g. platelet aggregation, gastric wall protection, regulation of renal blood flow and initiation of labour in childbirth. In contrast, COX-2, is an inducible form which becomes up regulated by inflammatory mediators such as cytokine (Interleukin and tumour necrosis factor). 2.2 The problems associated with aspirin(1, 10) a. Unwanted effects GASTRIC PROBLEMS The inhibition of COX 1 can produce gastric disturbances as an unwanted effect because the prostaglandin production in the GI tract is a homeostatic mechanism to protect the gastric mucosa. It causes inherent symptoms like heartburn; dyspepsia, nausea, and abdominal pain. (1, 10)This effect can cause Aspirin users to change or discontinue its use. Some of these inherent symptoms are quite common for most NSAIDs. Secondly it can also causes gastro duodenal mucosal lesions such as erosions and asymptomatic ulcers, which may or may not heal spontaneously; and finally more serious gastro ulcers with life-threatening complications like perforation, symptomatic ulcers, and bleeding ulcers. Symptoms of this could be black, bloody, or tar like stools or vomiting/coughing up blood REYES SYNDROME Reyes syndrome is a collection of symptoms consisting of altered consciousness, convulsions, low blood glucose, and enlargement of the liver associated with fatty infiltration of the liver. It is a deadly disease, which can strike any child, teenager, or adult without warning. All body organs are normally affected, but the liver and brain are antagonised the most. In 1965 it was stipulated that Reyess syndrome can be caused by the administration of aspirin in children under 16years of age. There is no discovered mechanism for the role of salicylate in this but it is thought that aspirin enhances the release of tumour necrosis factor which induces apoptosis of cells which can cause inflammation, viral replication e.t.c. SALICYLISM This is caused by the excessive ingestion of aspirin. There are two main pathways in the metabolism of aspirin. (10)Phase 1 reaction that involves the oxidation of aspirin to salicylic acid by a cytochrome P450 monooxygenase. By addition of a reactive group (OH) to get it ready for conjugation to a soluble component and hence aid excretion. This conjugation involves the attachment of small polar molecules glycine and gluconoride to salicylic acid. This results in further deactivation of the aspirin and the production of water-soluble metabolites that will be readily excreted in the urine or bile. The pathway conjugated with glycine, is the one that is easily overloaded in cases of toxicity. Thus elimination of salicylic acid slows down and accumulation leads to a variety of side effects. Below are the pathways showing oxidation and conjugation. This excess salicylate produces toxic effects include below. Ringing in ears Hyperventilation which causes increase in CO2- respiratory alkalosis, Dehydration: increased water loss due to hyperventilation Loss of carbonic acid metabolic acidosis. This in turn will reduce the blood pH, and make aspirin return to its non-ionised form allowing free aspirin in the blood stream. Hyperthermia. These pathways overload uncouples the energy producing processes (oxidative phosphorylation) of the mitochondria thus causing production of heat rather than ATP. Fatality especially in children Interactions with other drugs Reduced effect of aspirin if given with ibuprofen and avoid concomitant use of aspirin with NSAIDS due to increased side effects. Increase risk of bleeding when aspirin is given with coumarins, SSRIs, clopidogrel, illoprost, and sibutramine, Aspirin enhances effect of Heparins, Phenytoin, Valporate, Aspirin antagonises effect of Spirolactone, Sulfinpyrazone and Probenacid Rate of excretion of aspirin is increases by some antacids. The effect of aspirin on the gastrointestinal tract may be enhanced by the intake of alcohol and corticosteroids. 3. NON STEROIDAL ANTINFLAMMATORY DRUGS NON SELECTIVE COX INHIBITORS (Christina) 3.1 Isozymes of Cyclooxygenase Cyclooxygenase has various isozymes. The main isozymes are COX-1 and COX-2, however there is now evidence of a third form- COX-3. COX, originally known as prostaglandin H synthase is responsible for the oxidation of arachadonic acid to prostaglandin G2 and prostaglandin H2. It catalyses the reaction in which the arachadonic acid substrate and two molecules of O2 are converted to prostaglandin G2 and then in the perioxidase reaction Prostaglandin G2 is reduced to PGH2 by a 2 electron reduction. The COX isozymes are heme containing enzymes that are homodimers. Each monomer contains three main domains; A membrane binding domain, a N-terminal epidermal growth factor domain and a C-terminal catalytic domain. COX-1 is made up of 602 amino acids while COX-2 is comprised of 604.3 The catalytic reaction in COX takes place in a hydrophobic channel in the core of the enzyme while the peroxidise reaction takes place in the heme containing region near the surface of the enzyme. The membrane binding domain consists of four alpha helices with one helix that fuses with the catalytic domain. These helices congregate around an opening and through these openings fatty acids and NSAIDS are considered to enter the active site. The COX-1 isozyme is considered a constitutive enzyme. It is present in high volumes in most cells and tissues i.e. renal collecting tubules, monocytes, endothelium etc. However COX-2 is hardly noticeable in most cells, it is an inducible enzyme so it becomes more abundant in cells or tissues when macrophages are activated or by any other inflammation mediators e.g. TNF-a (tumor necrosis factor-alpha) or IL-1 (interleukin-1).5 Both COX-1 and COX-2 isozymes are attatched to the endoplasmic reticulum and nuclear envelope. The COX isozymes need to be N-linked glycosylated to enable them to be folded and attatched to the endoplasmic reticulum and nuclear envelope. The COX isozymes have very similar structures for their binding site, catalytic mechanisms and produce the same biosynthetic products3 COX-3 COX-3 a third isozyme was discovered in 2002 by Simmons and co-workers. They conducted a study on dogs and this resulted in them discovering a novel COX-1 splice variant termed COX-3 that was sensitive to acetaminophen (paracetamol). It was suspected for a while that acetaminophen worked by inhibiting a different specific isozyme due to the fact that it did not directly inhibit COX-1 and COX-2 very effectively at therapeutic concentrations but it generated prostanoids in neuronal systems. 3, 15 The Simmons and co-worker group showed that acetaminophen was the actual target for COX-3, and that it acted separately from COX-1 and COX-2. 3 Canine COX-3 is a membrane bound protein consisting of 613 amino acids with a molecular weight of ~65 kDa. It has a high expression in cells and tissues like COX-1 suggesting it may be a constitutive enzyme. However the question that needs to be asked is if generalisations can truly be made on the presence of COX-3 in humans based on Canine studies, so future experiments need to be designed to clarify whether a human COX-3 actually does exist that acts independently from COX-1 and COX-2 in vivo. 14 NSAIDs are known to inhibit COX in order for them to exhibit their anti-inflammatory actions, a structural NSAID binding study was carried out. The COX-1 active site contains a long hydrophobic channel that extends from the membrane binding domain to the core of the COX monomer. The tip of the COX active site houses Tyr385 that is located near the heme iron. Ser530 is positioned just below Tyr385 and that is the site for aspirin acetylation. Glu524 and Arg120 are positioned at the mouth of the COX-1 channel. A typical NSAID such as fluobriprofen, when introduced to the COX enzyme, its carboxylate moiety is usually directed towards the mouth of the COX-1 channel in order for it to be positioned in the most ideal place that will allow it to interact with the two polar residues Glu524 and Arg120. From these studies a better insight into the binding profiles of NSAIDs were observed. Non selective NSAIDs can bind in three different ways: Reversibly (e.g. Ibuprofen) Fast, low affinity reversible binding followed by a higher affinity, time dependant slowly reversible binding (e.g. fluobriprofen) Rapid, reversible binding followed by a covalent modification of the enzyme (e.g. Aspirin) 3 Arg120, Glu524, Tyr355 and His90 form a network of hydrogen bonds at the entrance of the COX channel acting like a gate to the binding site. NSAIDs generally bind between the upper portion of the COX channel near Tyr 385 and Arg 120 which is at the mouth of the COX channel. 3 Through the use of hydrogen bonding and electrostatic interactions, the carboxyl moiety of acidic NSAIDs like fluoribiprofen interact with Arg120 in both COX isozymes. The significant differences in the structure of the binding sites for both COX isozymes has been manipulated to enable the design of selective COX-2 inhibitors. In the COX-2 active site there is an extra accessible pocket due to the presence of a smaller valine amino acid residue at position 523 and a valine substitution at position 434, unlike COX-1, this difference increases the overall volume at the COX-2 active site by about 20%. 1 This means that due to reduced steric and ionic crowding at the mouth of the channel by Arg120, non acidic selective COX-2 inhibitors can show an enhanced and specific binding to the COX-2 enzyme. Another structural difference exists at the amino acid residue 513 where COX-1 has a histidine residue and COX-2 has an arginine moiety. 1 These small differences provides flexibility in the substrates that can be utilised in the COX-2 active site. 3.2 Problems Associated With Non Selective Non Steroidal Anti-Inflammatory Drugs NSAIDs are one group of drugs that are regularly used by the worlds population to relieve pain, reduce inflammation and lower temperature. They are COX inhibitors and act to inhibit the catalysation of arachadonic acid to PGH2. COX-1 is constitutively present in most cells while COX-2 is induced by chemical mediators of inflammation and activated macrophages.13 COX-1 and COX-2 as mentioned above have 2 specific roles. The 1st role gives PGG2 and the other role is in the peroxidise reaction that gives PGH2. Both COX-1 and COX-2 inhibitors work by inhibiting the 1st and main role i.e. inhibiting the conversion of arachadonic acid to PGG2. COX-1 and COX-2 possesses hydrophobic channels within their core. The classical NSAIDs exhibit their effects by blocking these enzymes halfway down the COX channel near Tyr385 and the Arg120 which is at the mouth of the COX channel by hydrogen bonding to the Arg120 residue. This results in the prohibition of any fatty acid substrates from entering the catalytic domain of the COX enzyme.3 In COX-1, these drugs tend to inhibit the enzyme quickly yet generally the inhibition is often reversible, however in COX-2 the inhibition is time dependant and often results in irreversible inhibition. As mentioned before, the COX-1 and COX-2 isozyme differ slightly. In the COX-2 active site there is an extra accessible side pocket due to the presence of a smaller valine amino acid residue at position 523 instead of isoleucin as in COX-1. This is important for understanding why some NSAIDs are selective for the COX-2 isozyme.13 There are a number of side effects associated with traditional NSAID therapy. NSAIDs can cause renal failure, liver damage/disorders, aseptic meningitis, skin reactions and bone marrow disturbances which can interfere with bone fracture healing. However amongst them all gastrointestinal (GI) toxicities is amongst the most common. These are believed to arise from the inhibition of COX-1 in the gastric mucosa.14 GI toxicities In humans and other species it has been shown that COX-1 not COX-2 is constitutively expressed throughout the GI tract.13 COX-1 is responsible for the synthesis of prostaglandins like PGE2 and PGI2 which are responsible for protecting the GI mucosa by reducing acid secretion in the stomach by the parietal cells, increasing blood flow in the mucosa and stimulating the release of viscous mucous. This leads to conditions of ulcers, dyspepsia, diarrhoea, nausea and vomiting and can even lead to gastric bleeding in some cases. These undesirable side effects have led to the development of COX-2 selective inhibitors. These drugs are effective anti-inflammatorys and reflect good analgesic effects. They have considerable less gastric damage due to the fact they selectively inhibit COX-2 with minimal action on COX-1. Unfortunately the use of COX-2 selective drugs has been associated with increased incidence of myocardial infarction and stroke.3 Renal effects Prostaglandins especially PGE2 and PGI2 are involved in regulating renal blood flow and vascular tone. Recent studies have shown that COX-2 is constitutively expressed in the macula densa, epithelia cells lining the ascending loop of henle and medullary interstitial cells of the renal papillae, while COX-1 is constitutively expressed in the collecting ducts, loop of henle and in the vasculature. The COX-2 enzyme is associated with normal renal function and inhibition of COX-2 results in NSAID-induced sodium retention while inhibition of COX-1 results in a disease in glomerular filtration rate.3 This conclusively tells us that both COX-1 and COX-2 are involved in the physiology of the kidneys. However therapeutic doses in patients with normal renal function are at little risk of renal complications. It is mostly neonates and the elderly who are more susceptible as well as patients with heart, liver or kidney disease. 4. SELECTIVE COX 2 INHIBITORS (Nadine) 4.1 Reasoning behind selective inhibition 4.2 Benefits and risks 5. MECHANISM OF ACTION OF COX INHIBITORS IN HUMAN DISEASES 5.1 Analgesic (Joyce) Pain can be defined as an unpleasant sensory and emotional experience associated with actual or potential tissue damage. Pain is a self protection mechanism which helps of forces us to identify danger and move away from it. It is one of the main symptoms used to identify a condition in medicine. Removing pain is very essential in terms of either eliminating the disease or condition or in fact suppressing its effect. This can be done by the use of medicines called analgesics. Pain receptors also called nociceptors are present on special nerve fibres that are sensitive to noxious of harmless stimuli. The stimulation of these receptors are on A-delta and C-fibers which are located in skin, connective tissue, viscera, muscle e.t.c. COX inhibitors act by blocking transmission to peripheral nerves. Pain associated with I. Arthritis Arthritis is the inflammation of joints. The inflammation and movement of the joints cause extreme pain in the sufferer. There are two major types a. Osteoarthritis(10) This is a chronic disease that features the breakdown of the joints cartilage. Cartilage is flexible connective tissue found in between joints that cushions or protects the ends of the bones and allows easy mobility of joints. This breakdown of cartilage causes the bones to rub against each other creating friction, causing joint tension, pain and loss of mobility in the joint. There are different types of arthritis of which osteoarthritis is most common; it can also be referred to a degenerative joint disease. There are two types of osteoarthritis, primary of which is associated with old age, general wear and tear of the cartilage. And secondary where it occurs where there is a cause example obesity, trauma, or hereditary. Treatment: Paracetamol may be considered as first line therapy for Osteoarthritis patients with mild to moderate pain. If the pain does not respond to paracetamol or patient has severe symptoms then other traditional NSAIDs like Ibuprofen, diclofenac or coxibs should be used. Coxibs have shown to produce reduced GI side effects. However they have the probability of increasing cardiovascular risk because they inhibit prostacyclin production in endothelial cells but not thromboxane in platelets, hence this can increase the chance of a thrombus formation. The choice of a coxib or a specific NSAID should be based on the patient characteristics and risk factors. b. Rheumatoid arthritis(12 ) This is an autoimmune disease of unknown origin whose major characteristic is the inflammation and erosion of the synovial membrane or synovium. This membrane lines and surrounds the joint and synovial cavity. The synovium secretes a slightly viscous, clear fluid known as synovial fluid, which lubricates cavity that lies between the cartilage and joint on the bone. In Rheumatoid arthritis accumulation of the synovial fluid builds up within the joint space and causes inflammation. This makes the joint look and feel swollen. Rubor occurs do to the increased blood flow to the area because of inflammation. In conditions of long-term RA, joint degeneration can occur causing mobility to be very painful and restricted. Treatment: Aspirin used to be used to treat RA but because of its GI toxicity. The use of aspirin as first line of therapy has been superceded by other NSAIDs. There are a large number of NSAIDs that have been invented since aspirin, but have similarities in toxicities e.g. Ibuprofen, naproxen meloxicam, etodolac selective COX-2 inhibitors have been invented to control inflammation. These drugs were designed to combat the gastrointestinal risk of NSAIDS, but there are concerns of increases in cardiovascular risk. II. Cancer (11) Can be defined as an abnormal growth of cells as when a group ofcellsdisplayuncontrolled division,invasion, and sometimesmetastasis. Cells become cancer cells because of its damaging effect to the DNA of the cell. A normal cell will try to repair damaged DNA but in a cancer cell it replicates with the damaged DNA. The cancer cell continues making new cells that the body does not require. The most common cause of cancer pain is infiltration of the tumour into bone. Bone metastases occur as a consequence of different types of cancer. Another mechanism of pain apart from bone metastasis is the secretion of Prostaglandins by carcinomas. For this reason, NSAIDs should be included in any regimen to control pain associated with bone metastasis. Because NSAIDs do not activate opioid receptors, they can provide additional pain relief when combined with an opioid analgesic. Thus, combining an NSAID with an opioid analgesic may provide adequate pain control with a clinically significant reduction in opioid dose. This opioid-sparing effect of NSAID therapy allows the clinician to diminish the side effects associated with opioid therapy without sacrificing pain control. Coxibs: Another Option for Cancer Pain Management(11) The recent introduction of the coxibs, on their use in cancer patients is still being studied. Oncologists are replacing NSAIDs, with the use of coxib, because of the improved safety profile compared to traditional agents. Surgical oncologists are exploring the use of coxibs both preoperatively and during the post-operative period to reduce opioid usage in order to speed the recovery process 5.2 Anti-pyretic (Nadine) 5.3 Anti-inflammatory (Christina) To date there are over 100 inflammatory diseases- each of which causes the degeneration of connective tissue in one or more parts of the body. These include: Rheumatoid Arthritis Osteoarthritis Atherosclerosis Irritable Bowel Disease Alzheimers and many more. Inflammation is characterised by dolor, rubor, calor and tubor, its one of the bodys ways of responding to harmful stimuli, pathogens, injury or disease. These usually initiate an acute or chronic inflammatory response. Arthritis is a general term used to characterise inflammation in the joints. Rheumatoid arthritis describes arthritis that occurs on both sides of the body i.e symmetrical. These usually occur in the wrists, hands and knees. It is not known what causes this disease many theories have been put forward but it happens when the immune system begins to attack the joints. A number of anti-inflammatory drugs are available worldwide and are widely used to relieve pain, swelling and inflammation associated with soft tissue inflammation. A number of these drugs act via the inhibition of COX. When you experience pain and inflammation from arthritis, an increase in microvascular permeability occurs selectively in post-capillary venules. The endothelial cells undergo conformational change leading to vascular leakage through gaps between the adjacent endothelial cells. At the site of injury phagocytes are attracted and move into the affected tissue along with plasma. The plasma causes the associated swelling observed in inflammation and the phagocytes engulf dead cells and bacteria. Prostanoic acids are

Friday, October 25, 2019

Chinese Occupation of Tibet Essay -- China Rights Invasion Papers

Chinese Occupation of Tibet In 1949, China entered Tibet using military force and has been occupying the country since. During China’s occupation of Tibet, countless human rights violations have been committed towards the Tibetan citizens. By killing off and forcing millions of Tibetans out of their country, destroying most of the Tibetan monasteries and forcing Communist beliefs on the Tibetans, China has succeeded in permanently altering the Tibetan culture. Tibet has received some support from the US and other countries in the UN but not enough to free them from China’s occupation. Many individual countries as well as the UN have given recognition to the human rights violations in Tibet but to date no countries have risked ruining their good relations with China to formally help Tibet. In order to prevent further suffering of the Tibetan citizens and destruction of their unique culture, foreign support must be given to Tibet. The US has a lot of influence in this matter and has the a bility to pass pro-Tibet legislation and put pressure on China to end human rights violations or completely withdraw from the country and recognize its independence. To make this bold move, the US would have to risk breaking positive relations with China. Tibet’s culture as we once knew it has been wiped out and if action is not taken to help Tibetan relations with China the human rights violations will continue. The Chinese government has considered Tibet as a part of their nation since 1890 when they attempted to open Tibet to trade with Britain. This trade agreement was met by Tibetan resistance and never became effective. China did no show persistence in its alleged sovereignty over Tibet until 1949 when China was... .... In Exile from the Land of Snows. HarperPerennial: New York, NY, 1997. Norbu, Dawa, China’s Tibet Policy. Curzon Press: Richmond, Surrey, 2001. Goldstein, Melvyn C., The Snow Lion and the Dragon: China, Tibet, and the Dalai Lama. University of California Press: Berkeley, CA, 1997. Xu, Guangqiu. â€Å"The United States and the Tibetan Issue.† Asian Survey 37.11 (1997): 1062-1077. Karmel, Solomon. â€Å"Ethnic Tension and the Struggle for Order: China’s Policies in Tibet.† Pacific Affairs 68.4 (1995-1996): 485-508. Norbu, Dawa. â€Å"China’s Dialogue With the Dalai Lama 1978-90: Prenegotiation State of Dead End?† Pacific Affairs 64.3 (1991): 351-372. Nathan, Andrew J. â€Å"Human Rights in Chinese Foreign Policy.† China Quarterly 0.139 (1994): 622-643. Rubin, Alffred P. â€Å"The Position of Tibet in International Law.† China Quarterly 0.35 (1968): 110-154.

Thursday, October 24, 2019

Essay on Star Wars

Essay on Star Wars â€Å"Aren’t you a little short for a storm trooper? † (Lucas New Hope 40). Rings a bell, doesn't it? This is one of the many quotes and a memorable one from Princess Leia in George Lucas’s saga Star Wars. Lucas had created an all American myth and was the first to do it. His movie saga used every archetype known to man and was inspired by the book The Hero with a Thousand Faces by Joseph Campbell. Campbell’s book also had every archetype known to man in it. It affected an innumerable amount of people around the world.Lucas’s Star Wars saga even went further than the big screen by inspiring comics, video games, toys, and other merchandise making Lucas a billionaire. His first three movies he made in the saga are New Hope, Empire Strikes Back, and Return of The Jedi. In this Star Wars trilogy, George Lucas illustrates that the hero must be wounded either physically or emotionally to be open to spiritual knowledge and transformation . Leia’s wounds open her to love, Luke’s wounds open him to becoming a Jedi Knight, and Anakin Skywalker’s wounds open him to redemption.These transformations are marked by physical and emotional wounds. In George Lucas’s Star Wars, Leia’s physical and emotional wounds open her up to love. First, Leia is wounded emotionally by the Death Star destroying her home planet of Alderaan. â€Å"A button is pressed which switches on a panel of lights. A hooded imperial soldier reaches overhead and pulls a lever. Another lever is pulled. Vader reaches for still another lever and a back of lights on a panel and wall light up. A huge beam of light emanates from within a cone-shaped area and converges into a single laser beam out toward Alderaan.The small green planet of Alderaan is blown into space dust† (Lucas New Hope 44). Princess Leia has been captured from the consoler’s ship and is being interrogated by General Tarkin. He is asking her abou t the whereabouts of the rebel base and if she doesn't comply he will destroy her home planet of Alderaan. She finally decides to lie so her home planet will be spared except they thank her for her cooperation, throw her in the detention level, and destroy Alderaan anyway. Leia is wounded emotionally by this because that was her home planet the Empire just destroyed using the Death Star.That means her family and all her friends and loved ones were on Alderaan and they all got completely destroyed. Everything that was her past and childhood memories was just destroyed right before her eyes. Lucas included this wounding because it is a very strong one. Leia just basically lost everything in one quick moment. He uses it also to show her strength in being able to control her emotions. Next, Leia is wounded emotionally by watching Han get frozen in the carbon freezing chamber. â€Å"Tears roll down Leia’s face as she watches the dashing pirate walk to the hydraulic platform† (Lucas Empire Strikes Back 70).Darth Vader uses Han as a sort of test dummy to test the carbon-freezing chamber on. He is testing to see if it will keep the person inside alive because Vader plans to use it on Luke later on. It is also a trap to attract Luke to Cloud City so Vader can capture him. This shows that Leia’s heart is completely open to love because she tells Han she loves him and even gets emotional when he gets ready to be frozen. Han responds with â€Å"I know† (Lucas Empire Strikes Back 70) showing the love between the two and without a doubt proving that Leia is now balanced between head and heart.Lucas has Han get frozen in carbon to reveal Leia’s true emotions and show that her heart is finally open to love. She shows it by telling him she loves him and tearing up about it. It shows that she does care and truly does love Han. Last, Leia is wounded physically by becoming a slave to Jabba the Hut. â€Å"Threepio is standing behind the grotesqu e gangster as he strokes Leia like a pet cat. Several of the guards, including Lando bring Luke from the other side of the room. Boba is standing behind Jabba† (Lucas Return of the Jedi 18).After trying to rescue Han from Jabba’s palace, Leia gets captured by Jabba and he uses her as his personal slave. He keeps her by him held by a chain. By becoming a slave to Jabba it opens Leia’s heart to even more emotions of love because her lover, Han, rescues her. Lucas has Leia get captured because it will drive Han even more to rescue her. This proves his love for Leia because he risks his own life by protecting her. By the end of all of these experiences, Leia’s heart is completely open to love showing her full emotions. In George Lucas’s trilogy Star Wars, Luke’s wounds open him to becoming a Jedi Knight.First, Luke is wounded emotionally by having his known family killed. â€Å"Luke stumbles around in a daze looking for his aunt and uncle. Sudde nly he comes upon their smoldering remains. He is stunned, and cannot speak. Hate replaces fear and a new resolve comes over him† (Lucas New Hope 19). Luke sees that the Imperial Troops have slaughtered the Jawas and then realized that they probably traced them back to Luke’s aunt and uncle’s house. He then speeds back to his house in his speeder and finds their remains and the remains of their dwelling.This greatly wounds Luke emotionally because the Empire has just destroyed his family and all he's ever had and known. Uncle Owen and Aunt Beru was the only family he thought he had left so this just devastated him emotionally. His fear is replaced by hate for the Empire. This also helps him make his decision on following Obi-Wan and training to become a Jedi Knight because he has no other options now that he has lost everything. Lucas had Luke's known family destroyed to place anger in him making him follow in his father’s footsteps unconsciously.It also h elps him make the decision to travel with Obi-Wan and train to be a Jedi Knight because now there is nothing left for him on Tatooine. Next, Luke is wounded physically by having his right hand cut off by Darth Vader. â€Å"Luke glances at the instrument complex floating away. At that instant, Vader's sword comes down across Luke's right forearm, cutting off his hand and sending his sword flying. In great pain, Luke squeezes his forearm under his left armpit and moves back along the gantry to its extreme end. Vader follows. The wind subsides. Luke holds on.There is nowhere else to go† (Lucas Empire Strikes Back 77). Luke is in Cloud City fighting Darth Vader after he escapes his carbon-freezing trap. Vader finally beats him down and cuts off Luke's right hand with his light saber. Luke is driven by anger and hate which in the end ultimately causes him to lose this battle. Vader cuts off Luke's right hand. That is the hand in which he wields his light saber. This represents his power hand and now he has no power because he has lost his right hand. This weakens Luke greatly. During this wounding he has the epiphany that Darth Vader is Anakin Skywalker, his father.During this wounding he is wounded both physically and emotionally. Physically because he loses his hand and emotionally because he learns that this evil man is indeed his father. Lucas had Vader cut off Luke's power hand showing now that Luke is weak and vulnerable. At this point Vader also tells Luke that he is his father because Luke cannot escape from the truth being physically wounded and defeated. Last, Luke is wounded emotionally by having his father die. â€Å"Darth Vader, Anakin Skywalker†¦Luke's father, dies† (Lucas Empire Strikes Back 88). Luke is on the Death Star to defeat the Emperor butDarth Vader gets in his way and starts fighting with Luke instead. Luke keeps backing down saying, â€Å"I will not fight you, father† (Lucas Empire Strikes Back 81). Luke then fina lly beats down Vader and cuts his hand off, just like Vader had done to him. The Emperor walks over to Luke and asks him to join the Dark Side but Luke refuses so the Emperor starts to electrocute him with his hands showing no mercy. â€Å"Vader grabs the Emperor from behind, fighting for control of the robed figure despite the Dark Lord’s weakened body and gravely weakened arm.The Emperor struggles in his embrace, his bolt-shooting hands now lifted high, away from Luke. Now the white lightning arcs back to strike at Vader. He stumbles with his load as the sparks rain off his helmet and flow down over his black cape. He holds his evil master high over his head and walks to the edge of the abyss at the central core of the throne room. With one final burst of his once awesome strength, Darth Vader hurls the Emperor’s body into the bottomless shaft† (Lucas Return of the Jedi 86). This emotionally wounds Luke because he finally has feelings of love towards his fathe r.His father, Anakin, just sacrificed himself for his son overcoming the evil within him letting his good side show. Luke feels sad and does not want to leave his father. His mother has already died so that was the last adult in his family and he finally felt that father to son connection. Sadly it only lasted a little bit because Anakin quickly dies. Lucas shows this as the final state of Luke becoming a true Jedi knight. This is shown by Luke saying, â€Å"Never! I’ll never turn to the dark side. You’ve failed, Your Highness. I am a Jedi, like my father before me† (Lucas Empire Strikes Back 84).In the trilogy Star Wars, by George Lucas, Anakin Skywalker’s wounds open him up to redemption. First, Anakin Skywalker gets emotionally wounded by the Sand People kill his mother. After the Sand People kill Shmi, Anakin's mother, he goes on a rage and kills an entire village of Tusken people including women and children. He does this out of anger. Anakin's mothe r Shmi gets captured by the Sand people. He then goes to free her and help her escape because of the love he has for his mother. As Anakin is walking her out of the village a Tusken raider shoots and kills Shmi.This puts Anakin in an outrage and he then massacres the entire village out of anger and hate with his light saber. This emotionally wounds Anakin greatly because the Sand people just killed his mother. Shmi was the woman he loved and cared about the most. He had always taken care of her and supported for her. Now that they just murdered her, it sent him on an unstoppable rage. Lucas has this happen to set Anakin on his course to becoming Darth Vader. All the hate and anger that came into him after this event turned him evil therefore setting him up for later redemption.Next, Anakin is physically wounded by falling into a burning lava pit. â€Å"Anakin's clothing blows into the lava river and ignites. Suddenly Anakin bursts into flames and starts screaming† (Lucas Reve nge of the Sith 89). Obi-Wan and Anakin are fighting on the volcanic planet of Mustafar. Obi-Wan cuts off Anakin's arm and greatly wounds him sending him falling close to the lava river in which his clothes ignite and his body is badly burned almost to the point of death. This greatly wounds Anakin and sets him on his way to being the mechanical more-machine-than-human Darth Vader.After he lies injured for a while he is finally spotted by Darth Sidious and what is left of him is put in a medical capsule. They then turn him into Darth Vader by replacing his injured parts with robotic parts making him more machine than human. Last, Anakin is wounded physically by saving his son Luke. â€Å"Vader grabs the Emperor from behind, fighting for control of the robed figure despite the Dark Lord’s weakened body and gravely weakened arm. The Emperor struggles in his embrace, his bolt-shooting hands now lifted high, away from Luke.Now the white lightning arcs back to strike at Vader. He stumbles with his load as the sparks rain off his helmet and flow down over his black cape. He holds his evil master high over his head and walks to the edge of the abyss at the central core of the throne room. With one final burst of his once awesome strength, Darth Vader hurls the Emperor’s body into the bottomless shaft† (Lucas Return of the Jedi 86). Then, â€Å"Vader's cape is whipped by the wind and he staggers, and collapses toward the bottomless hole.Luke crawls to his father’s side and pulls him away from the edge of the abyss to safety. Both the young Jedi and the giant warrior are too weak to move† (Lucas Return of the Jedi 86). In the Death Star, Anakin watches his son dying and then the good in him kicks in as Luke begs his father for help. Anakin steps in and sacrifices himself for his son. Anakin redeems himself here for all the evil he has done by sacrificing himself for the love of his son Luke. He just can’t bare it anymore to wat ch his son suffer so he acts on love and aves his son from the Emperor killing himself in the process. Lucas shows Anakin redeeming himself by sacrifice. He obtains redemption by giving into love and finding the good in him to save his son. In this Star Wars trilogy, George Lucas illustrates that the hero must be wounded either physically or emotionally to be open to spiritual knowledge and transformation. Leia’s wounds open her to love, Luke’s wounds open him to becoming a Jedi Knight, and Anakin Skywalker’s wounds open him to redemption. These transformations are marked by physical and emotional wounds.

Wednesday, October 23, 2019

Alternative Fuels

This assessment will focus primarily on the use of alternative fuel vehicles at Lotus Rental Car’s, discussing the advantages and disadvantages of alternative fuels and the impact it will have on the American public. With gas prices increasing daily, renting a vehicle is becoming a fast growing decision for families going on vacation and people who make their living traveling from place to place. Families can no longer afford to rent large RVs and pay outrageous prices for fuel. Salespersons and businessmen cannot either. Big companies are no longer willing to cover the whole cost of fuel, but rather a percentage which digs in the profit for these businessmen. Alternative Fuel Vehicles AFV,(alternative fuel vehicles), by design are intended to improve air quality by lowering ozone-depleting emissions and makes us less dependent on foreign oil products. The various types of AFVs, include hybrid and flexible fuel designs. Powered by electricity, compressed natural gas (CNG), liquid petroleum gas (LPG), propane, hydrogen, alcohol (in the form of methanol and denatured alcohol), and gasohol (which includes up to 85% alcohol), are the most common. Currently, only three types are readily available to the public; which are natural gas; flex fuel, and battery electric. Natural gas powers about 112,000 vehicles already in the United States and is a good choice for centrally fueled fleets that operate within a limited area. The domestic availability and widespread distribution infrastructure is a great advantage. Most NG vehicles use diesel for ignition and then natural gas for the rest. Hybrid vehicles use electricity which is drawn from an off board power source and then stored in batteries. There is also plug in vehicles that can be plugged directly into an electrical outlet when not in use. Flex fuel uses ethanol which is made from biomass material. It also requires no special fueling equipment and can be used in gasoline burning engines. Reasons to Incorporate AFVs Each vehicle emits more than 600 lbs. of pollutants per year, such as carbon monoxide, sulfur dioxide, and nitrogen dioxide; which contributes to smog. This leads to many health issues. The inability for blood to carry oxygen to vital organs, bronchitis, asthma and other respiratory tract problems has been reported. These pollutants also affect our eye sight. Bacteria and other chemicals get into our eye tissue; causing damage to our retina and the eye pressure, which can lead to cataracts even blindness. The use of alternate fuels will not see an end to pollutants but will certainly have an impact on the amount of pollutants which is emitted from our vehicles.

Tuesday, October 22, 2019

Shingles and the Affects It Would Have On My Career essays

Shingles and the Affects It Would Have On My Career essays Shingles and the Affects It Would Have On My Career Shingles is a reactivation of the herpes zoster virus, which causes chicken pox. When you get shingles the first thing you might notice is a tingling sensation or pain on one side of your body or face. After the tingling sensation painful skin blisters erupt on only one side of your face or body along the distribution of nerves on theskin. Shingles usually occurs along your chest, abdomen, back, or face. It may also affect your neck, limbs, or lower back. The infected area is very painful, itchy, and tender causing excruciating pain to its victim. After one or two weeks the blisters heal and form scabs, similar to the chicken pox, the pain often continues. The deep pain that follows after the infection has run its course is known as postherpetic neuralgia. Postherpetic neuralgia is nerve pain that occurs when a nerve is irritated or inflamed. The pain that is caused, spreads along neural pathways, tends to be chronic, and can range from mild to out right unbearable.T his can continue for months or even years, especially in older people. Shingles usually occurs only once, although it has been known to recurr in some people. Shingles arise from the virus that causes chicken pox. After overcoming a battle with chicken pox the virus becomes dormant in the spinal nerve cells, but can be reactivated years later at a time when a person's immune system is suppressed. The system can be suppressed by a physical, or emotional trauma, or a serious illness.Medical science doesn't understand why the virus becomes reactivated in some people and not in others. No treatment has yet been discovered to prevent or stop shingles, and although steps can be taken to shorten the duration, most of the time the virus must simply run its course. The pain following shingles is difficult to manage and can last months, or in rare cases years. The best approach is early and immediate t ...

Monday, October 21, 2019

Definition of Subject for Spanish Students

Definition of Subject for Spanish Students Traditionally, the subject is the part of the sentence that performs the action of the main verb of a sentence. Sometimes, subject is used to refer specifically to the noun or pronoun that performs the action of the verb. In Spanish (rarely in English except in commands), it is common also for the subject to be implied rather than directly stated. In the following sentences, the subject is in boldface. Examples El hombre canta bien. The man sings well. (The noun hombre is performing the action of the verb canta.)Los jugadores no estn con nosotros. The players arent with us. (The noun jugadores is performing the action of the verb estn.)Ellos no estn con nosotros. They arent with us. (The subject is a pronoun.)No estn con nosotros. They arent with us. (The subject here in the Spanish sentence is implied to be ellos but isnt directly stated. In translation, the pronoun here must be stated in English.) The subject of a verb can be contrasted with its object, which receives the action of the verb rather than performs it. The subject of the sentence sometimes is considered to include not just the noun, but all the words in the phrase that accompanies the noun. By this definition, el hombre in the first sample sentence can be considered the subject of the sentence. By this definition, the subject of a sentence can get quite complex. For example, in the sentence La chica que va al teatro no me conoce (the girl who is going to the theater doesnt know me), la chica que va al teatro can be considered the full subject. By this definition, the subject of a sentence can be contrasted with the predicate of a sentence, which includes the verb and often the object of the verb and related words. In Spanish, the subject and verb (or predicate) match in number. In other words, a singular subject must be accompanied by a verb that is conjugated in a singular form, and a plural subject takes a plural verb. Although the subject is usually thought of as the performer of a sentences action, in passive sentences this may not be the case. For example, in the sentence su tà ­o fue arrestado (her uncle was arrested), tà ­o is the subject of the sentence even though some unspecified person or persons are performing the verbs action. In Spanish, as in English, the subject typically comes before the verb except in questions. However, in Spanish, it is not extraordinary for the verb to come before the subject even in direct statements. For example, in the sentence me amaron mis padres (my parents loved me), padres (parents) is the subject of the verb amaron (loved). Sample Sentences Un planeta es un cuerpo celeste que orbita alrededor de una estrella. A planet is a heavenly body that orbits around a star.No comprendo la revuelta rabe. I dont understand the Arab revolt. (The subject in the Spanish sentence is implied.)Yo y tà º podemos hacer todo. You and I can do everything. (This is the use of a compound subject.)Me gustan las enchiladas. I like enchiladas. (In the Spanish sentence, the subject here comes after the verb. Note that in translation, the subject in English represents a different word.)Hoy empieza la revolucià ³n. The revolution begins today. (The subject comes after the verb. Although hoy is sometimes a noun, here it is an adverb.)Skype fue comprado por Microsoft. Skype was bought by Microsoft. (In this passive sentence, Skype is the subject even though it is not performing the verbs action.)

Sunday, October 20, 2019

Words For Transportation in Spanish

Words For Transportation in Spanish If youre visiting an area where Spanish is spoken, youll need a means of transportation. Here are some of the most common ones, along with a sample sentence for each. Common Spanish Words For Transportation Airplane: el avià ³n. (An airport is un aeropuerto.) Los bebà ©s pueden viajar en avià ³n desde los primeros dà ­as de vida. Babies can travel by plane from the first days of life. Bicycle: la bicicleta, la bici. Cuando la gasolina subià ³ a cuatro dà ³lares, comprà © mi bicicleta para ir al trabajo. When gasoline rose to four dollars, I bought my bicycle for going to work. Boat: el barco, la bota, la barca, el ferry, la lancha, la chalupa, la canoa, la piragua, el kayak. (Names vary with type of boat and sometimes region.) Usted puede viajar en barco de una isla a otra sin problemas. You can travel by boat from one island to the other without problems. Bus: el bus, el autobà ºs, el à ³mnibus, el camià ³n, la camioneta, la chiva, el pullman. (Names vary with region and type of bus, and there are also other names not listed here.) El bus de Barcelona es probablemente el ms conveniente. The Barcelona bus is probably the most convenient. Car: el coche, el carro, el automà ³vil, el auto. Los nià ±os viajarn con ms seguridad en el coche si usan las sillas homologadas. Children will travel more safely in the car if they use approved car seats. Foot: el pie. El hotel se encuentra a 7 minutos a pie de la estacià ³n de ferrocarril. The hotel is located seven minutes by foot from the train station. Helicopter: el helicà ³ptero. El helicà ³ptero es una aeronave propulsada por uno o ms rotores horizontales. The helicopter is an aircraft propelled by one or more horizontal rotors. Horse: el caballo. Hay dos paseos a caballo al dà ­a, uno en la maà ±ana y uno en la tarde. There are two horseback rides a day, one in the morning and one in the afternoon. Motorcycle: la motocicleta, la moto. Diarios de motocicleta es una pelà ­cula biogrfica basada en los diarios de viaje de Che Guevara y Alberto Granado. The Motorcycle Diaries is a biographical movie based on the trip diaries of Che Guevara and Alberto Granado. Subway: el metro, el subterrneo. El subterrneo de la Ciudad de Mà ©xico es uno de los ms modernos del mundo.  Mexico Citys subway is one of the most modern in the world. Taxi: taxi. Ofrecemos servicio de taxi seguro, rpido y confiable. We offer safe, fast and reliable taxi service. Train: el tren. (A high-speed train is often a tren de alta velocidad. An express train is known as a tren expreso, tren express or tren rpido. A sleeping car is usually known as a dormitorio. A railway is un ferrocarril.) Suiza es el paà ­s de los trenes de montaà ±a. Switzerland is the country of mountain trains. Truck: el camià ³n. (Other names are also used; a pickup truck is often known as una camioneta, un pickup or una pickup.) Busco trabajo de chofer de larga distancia en camiones. Im looking for work as a long-distance truck driver. Van: la furgoneta, la camioneta, la vagoneta, la buseta, el furgà ³n, el van. (Names vary with region and type of van.) La furgoneta Volkswagen fue popularizada por los hippies en Norteamà ©rica. The Volkswagen van was popularized by American hippies.

Saturday, October 19, 2019

The great gatsby- write about gatsby's personality Essay

The great gatsby- write about gatsby's personality - Essay Example To Nick, this quote dissects Gatsby’s personality and makes sense why the external world perceives him the way they do. Gatsby’s smile shows off his magnetic nature as well as giving the person receiving that smile the power of feeling special. Anyone who meets Gatsby cannot help to see only the good in him. What Gatsby does not realize is that his present life can never be fulfilled if he continues to live in his past. Gatsby puts overwhelming pressure on himself to live a certain way as a means to capture his true love’s heart, but ruins any chance of having a future in the meanwhile. A rags-to-riches story, Gatsby pulled himself out of the slums and now lives a life of luxury, throwing lavish parties in hopes to draw Daisy to one so that he can have a chance to win her love again. Anyone who is anyone knows of Gatsby’s lavish parties. He is notorious in New York as the man who has everything. Unfortunately, the means in which he was able to do it by was through bootlegging alcohol and other illegal activities, according to Tom, when he tells Daisy, â€Å"I picked him for a bootlegger the first time I saw him, and I wasn’t far wrong,† (Fitzgerald 282-290) as a desperate plea to convince her to stay with him. The truth is that Gatsby is a criminal. In fact, his real name is James Gatz. This criminal past trying to be erased by a new persona adds to the illusion that Gatsby lives a better life that he created for himself and also reinforces that it is one that can never lead to a lifetime of happiness. Gatsby’s â€Å"front† of bei ng this person that he is not has backfired. Even when Gatsby tells Tom that Daisy â€Å"never loved† him and only married Tom because he was â€Å"poor and tired of waiting† for him (Fitzgerald, 146) in front of Daisy, Daisy isn’t too quick to agree. Gatsby’s delusion that Daisy never loved anyone else but him goes to show that Gatsby could never live in reality. Gatsby’s misconception of

Friday, October 18, 2019

Magnetic Resonance Imaging Goes on the Road Essay

Magnetic Resonance Imaging Goes on the Road - Essay Example Pervious attempts at a portable design have met with limited success due to the sensitivity of the technology that is required. NMR technology works on the principle of identifying an atom's structure by measuring its resonance. As spinning nuclei in the atom are subjected to an intense magnetic field, they will line up with the lines of magnetism either opposing them or matching them. As another oscillating magnet is induced into the field, the nuclei begin to reverse the direction of their spin. When the spin reverses, energy is released as the nuclei go from a higher state to a lower state or vice versa. A coil can pick up this energy as electricity in the same way a magnet can induce an electric current through an electrical wire in a generator. The researcher is not looking only for electric current. The key to NMR is finding the frequency of the externally oscillating field where the nuclei give off the most energy. This is known as the frequency of resonance. By monitoring the electrical output over a range of frequencies, scientists look for the frequency where the output spikes. This is unique for every different element and by measuring this frequency, the element can be identified. By evaluating the mix of elements and their relative quantities, complex molecules can be identified. The article notes that while previous portabl

Case study for strategic management Example | Topics and Well Written Essays - 250 words

For strategic management - Case Study Example The main competitive advantage of the company is its network effect. The brand is well established in the international market with many clients across the globe as compared to its competitors. This has been effectively and efficiently supported by the company resources and assets. Pursuing Asia market was a failure as the company recently pulled out of Japan. However, the company has managed to survive in other areas by buying startups, especially in China. Further, it is developing strategies that will enable to compete in the Asian market. The latest challenge is the low entry barrier system into the market that allows both local and international firms to enter the market. Good examples of these companies are the Amazon and Yahoo, which are already established in the market. This poses a threat of a reduction of the entire market share, hence, of revenues and profits of the

Thursday, October 17, 2019

In Edith Wharton stories souls belated and Autre Temps Essay

In Edith Wharton stories souls belated and Autre Temps - Essay Example However Edith Wharton in her short stories ‘Soul Belated’ and ‘Auster Temps’ tries to rectify the situation and struggles to present an independent woman who is able to decide for herself and has the tendency and courage to strife for her freedom and happiness. Although the readers get a totally opposite impression as they observe the women protagonists trying to struggle in the pursuit of happiness yet they find themselves failing tremendously. Both the stories project two divorced women and the problems and insecurities they face because of the treatment to which society had subjected them to before and after their divorce. Mrs. Lidcote in Auster Temps’ deal with her insecurities regarding her daughter’s future and the disappointments she faces when she realizes that even after twenty years the society still shuns her. On the other Lydia in Soul Belated is observed to be trying to run away from the shackles of marriage again as she relishes h er new found freedom after her separation from her husband and the eminent divorce in the near future. In Mrs. Lidcote case the readers observe that the woman’s decision to return to states after twenty years to meet her daughter and try to face the cruel society matrons again is a proof of her courage and determination to deal with any sort of unpleasant conduct of the society for her daughter’s sake. However in her particular situation it is observed that she is a victim of society’s prejudices and such a harsh behavior not only effects her emotionally but also takes its toll on her relationship with her daughter and Franklin Ide which becomes quite strained as both the characters in their efforts to protect her from any sort of harm implicitly imply that she is still not accepted by the society matrons. Hence she feels as if she is alone in this world and her desolate state is not because of lack of inner strength to defy the strictures of society and live in dependently but because of the prejudices and impartiality of the society However Lydia from the beginning of the story is depicted in a manner that gives her an aura of vulnerability and projects her as an indecisive young woman as this is clearly apparent from her attempt to avoid discussing the divorce letter. Her attempt to escape from a major confrontation is symbolic of her lack of courage. Subsequently as the story unfolds for her the best solution to every trouble is to try to run away from it as also observed towards the end she again tries to turn her back and run away from Gannett’s offer of marriage. Though she is scared for her image in front of Lady Susan and the rest of her party but she does not makes any attempt to accept her reality and face them like Mrs. Lidcote. Instead she decides to cut herself free from Gannett. Then again in the end it is observed that she succumbs to marry Gannett and this particular action is a testimony against her lack of courage because even when she convinces herself to board the boat at the last moment she runs back because may be she is the conventional sort of the woman who accepts that her existence in this world without a man and a legitimate relationship is near to impossible. So she realizes that rather than fighting fate it is better to give in and face life as it comes rather than anticipating disappointments without taking the plunge. Hence it is observed th

Referring to academic theory and drawing on examples of practice Essay

Referring to academic theory and drawing on examples of practice provide a detailed discussion on Learning and and demonstrate how it relate to the context of entrepreneurship - Essay Example This paper will explain the theory based approaches to seek clarity of custom subject-object relation. The paper will also exhibit practical applications of agnosticism and a list of differences. The narrative based theory presents a structure where a given business individual’s perception is the entrepreneurship role. The theory’s practical application justifies that an individual’s perception transforms to a reality. Another approach of the same theory reveals that given experience and expertise is significant for identifying opportunities within a community to form ventures of beneficial influence. The third application focuses on the exchange of labor, ideologies and capital investments among individuals (Scheer, 2009). Other reflective entrepreneur fields view the learning process as platform to exercise individual learning to seize opportunity and employ the same for critical decision-making. The collective learning is also a fundamental pillar of entrepreneur learning. This involves generating certain behaviors to sensitize a given entrepreneur who later incorporates available resources within a network system. The general view is to implement ski lls and expertise within disposal to improve a business entity. Entrepreneur learning is a difficult field without embracing entrepreneurial identity. The area of study requires pragmatic engagements from the theoretical approach. This concept entails establishing businesses for the applicable concepts. Entrepreneur learning equips individuals by use of tactical approaches to sustain different organization or business entities. Entrepreneur learning requires investigational or reflective phases to build an individual’s attitude for effective change and management within a business premise. Team working emerges as a major pillar to incorporating entrepreneur pillars. The overall approach to entrepreneur learning originates from the individual perspective,

Wednesday, October 16, 2019

Argument same sex marriage Essay Example | Topics and Well Written Essays - 1000 words

Argument same sex marriage - Essay Example In this essay argument will be presented as to why same sex marriages should be allowed legally and socially. Religious arguments against Same Sex Marriages Religion is one of the first arguments of a person arguing against same sex marriages. Homosexuality is not sanctioned by religion simply because it is considered against God and nature. The way people define the term nature is the not correct. What is nature? Many years ago using medicines was considered unnatural. Tribes considered marriages outside the clan as unnatural. Surgeries were unnatural at first. Science was also termed as unnatural†¦ The point people miss here is the fact that any change is the society is not tolerated or accepted by its members. It is very difficult for the society to break away from the old practices. Basically as a whole we human beings want to preserve the status quo at all times. We cannot digest changes in the society very easily and this is why we are very quick to point anything ‘u nnatural’ simply because we think that it is not justified to break away from the social norms of the society. The issue here is that social norms are ever changing and they are evolving so how is it possible not to accept the change in these norms. Eventually all things we considered ‘unnatural’ like science, medicines, surgeries etc became a part of our life. So until this point we have established how society is quick to label things as unnatural simply because they are not in line with the social reality of the people. The idea that some things are ‘natural’ and others are ‘unnatural’ springs from our religious beliefs. Religion has a very influential role to play in our lives. Even if we are religious or not the effect of religion on our lives cannot be denied. The same religion feeds us with beliefs that some things are unnatural. Christianity for example considers homosexuality morally repulsive simply because it is against the wa y of the God. The church accepts that immoral acts can be committed in heterosexuality as well but at the same time dismisses homosexuality on religious grounds (Matthews, T. 1997). Any argument against homosexuality cannot be more superficial than this one. There are no rational justifications given against homosexuality but still people argue that it is immoral to be homosexuals on religious grounds. People may not believe in religion but still they forward religious argument because they have been made to think that change in the society which will result from same sex marriages would be disastrous. They are against same sex marriages for no rational reasons. They just have attitudes and beliefs for which they have no rational ground. We can easily reject this claim of the society that homosexuality and same sex marriages is unnatural and all arguments given on religious grounds can also be rejected because they hold no rational argument in it. Family System and Same Sex Marriage s Another argument against same sex marriages is that such practices will destroy the family system of the society. People argue that men and women are both important for the nourishment and upbringing of a child and absence of even one can destroy the life of a child. Especially two men are not considered good parents for their children (Gend, D. 2010). Because same sex partners cannot rear children in a good way same sex marriages should be banned according to these people. Here we can apply the utilitarian principle

Referring to academic theory and drawing on examples of practice Essay

Referring to academic theory and drawing on examples of practice provide a detailed discussion on Learning and and demonstrate how it relate to the context of entrepreneurship - Essay Example This paper will explain the theory based approaches to seek clarity of custom subject-object relation. The paper will also exhibit practical applications of agnosticism and a list of differences. The narrative based theory presents a structure where a given business individual’s perception is the entrepreneurship role. The theory’s practical application justifies that an individual’s perception transforms to a reality. Another approach of the same theory reveals that given experience and expertise is significant for identifying opportunities within a community to form ventures of beneficial influence. The third application focuses on the exchange of labor, ideologies and capital investments among individuals (Scheer, 2009). Other reflective entrepreneur fields view the learning process as platform to exercise individual learning to seize opportunity and employ the same for critical decision-making. The collective learning is also a fundamental pillar of entrepreneur learning. This involves generating certain behaviors to sensitize a given entrepreneur who later incorporates available resources within a network system. The general view is to implement ski lls and expertise within disposal to improve a business entity. Entrepreneur learning is a difficult field without embracing entrepreneurial identity. The area of study requires pragmatic engagements from the theoretical approach. This concept entails establishing businesses for the applicable concepts. Entrepreneur learning equips individuals by use of tactical approaches to sustain different organization or business entities. Entrepreneur learning requires investigational or reflective phases to build an individual’s attitude for effective change and management within a business premise. Team working emerges as a major pillar to incorporating entrepreneur pillars. The overall approach to entrepreneur learning originates from the individual perspective,

Tuesday, October 15, 2019

The Future of Criminology Essay Example for Free

The Future of Criminology Essay Over the past several years criminology has made leaps, bounds, and advances to enhance capturing criminals. Due to the increasing technology at the fingertips of criminals and terrorists law enforcement has been forced to step of their resources and intelligence. The government is constantly faced with new methods people have created to commit crime. Technology is infiltrating every aspect of the criminal justice system, from the investigation to the prosecution of crimes and even to attempts to predict them. What steps is law enforcement and the government taking to ensure our safety and to catch the criminals and terrorists? Biometrics After the attacks on 9/11 the government discovered America was not truly prepared for anything. America lacked the technology and resources to stop terrorist’s attacks. Suddenly, the United States government became acutely aware that it didn’t know exactly who was passing in and out of the country. After 9/11, the U.S. Congress decided we must have some way of securing our borders. What did the government do to try to protect the nation? They looked into security measures such as biometrics. â€Å"Biometric is the most secure and convenient authentication tool. It cannot be borrowed, stolen, or forgotten and forging one is practically impossible. Biometrics measure individuals unique physical or behavioral characteristics to recognize or authenticate their identity. Common physical biometrics include fingerprints, hand or palm geometry, retina, iris, and facial characteristics. Behavioral characters characteristics include signature, voice, keystroke pattern, and gait. Of this class of biometrics, technologies for signature and voice are the most developed† (Biometric Security Technology, n.d.). Today, our identities are verified almost exclusively by things that you carry with you and things you remember.  Driver’s licenses social security cards, birth certificates and passports are common documents people carry with them, and passwords and PINs are common security measures people remember. Physical identification is easy to fake, and passwords are easily cracked by hackers, who then have nearly unfettered access to our credit cards, bank accounts, and personal data. People make fake driver’s licenses, social security cards, birth certificates and even death certificates. Hackers only need limited information about a person to steal their identity. It is mind boggling to think what little data criminals need that can turn a person’s life upside down in a matter of seconds. Something needs to change and biometrics could be that change. Biometrics are a fundamental shift in the way people are identified. Unlike traditional identification which individuals must either remember or carry with them, biometrics is the individual, it is a part of who you are so to speak. Fingerprints, voice analysis, iris patterns, vein matching, gait analysis, and so on. Such traits are unique to an individual and often, though not always, incredibly difficult to fake. â€Å"United States government has poured money into research, development, and acquisition of biometric identification systems. The Department of Homeland Security has spent over $133 million on biometrics since 2003, and the Defense Department is predicted to spend $3.5 billion on the technology between 2007–2015. The Federal Bureau of Investigations has rapidly expanded its fingerprint database and is currently developing a more sophisticated system that will add iris scans, palm scans, and facial recognition to the mix† (De Chant, 2013). Just because biometrics cannot be lost or misplaced does not mean they cannot be misused. Privacy concerns loom large with biometrics. A biometric security measure by itself is not threatening, though they are easily linked to other, potentially sensitive information, and that’s when people grow uneasy. Biometrics are a part of person and not something that can easily be discarded like a Facebook page or a password. This causes a lot of anxiety for some people. The government would have part of everyone on file at their disposal and would it always be used correctly or will American’s become violated by this extra power the government would have? There is already a lot of mistrust in the government it would be difficult to get the American nation as a whole on board with the government having access to our fingerprints, retina’s, faces, and palms. There are people  even in our criminal justice system that abuse their power and give out information that should not be given to certain people, who is to say that same would not happen with should vital information as biometrics. Spyware As rates of cybercrime continue to increase exponentially, law enforcement agencies will have to enhance their cyber-defenses to effectively fight online attacks. New technologies promise to play an important role in this battle for cybersecurity. The war on cybercrime and cyberterrorism has given a major boost to the IT and security industries. In the coming years, the fields could experience even greater growth, possibly generating hundreds of billions of dollars in the US alone. Cyber criminals can be computer geeks looking for bragging rights, to businesses trying to gain an upper hand in the marketplace by hacking competitor websites, from rings of criminals wanting to steal your personal information and sell it on black markets and even spies and terrorists looking to rob our nation of vital information. In this day and age of advanced technology, we have become accustomed to all the benefits that computers give us in terms of convenience. While most of us would never want to g o back to doing things the old fashioned way, it is very important to be aware that anyone can become a victim of cybercrime. â€Å"To effectively detect and deter cyber criminals, it is vital for our law enforcement agencies and our legal community to look beyond our nation’s borders and work with their international colleagues in order to have a global framework of cybercrime statutes. One of the new devices to help detect cyber criminals is a Wi-Fi Investigator. The Wi-Fi Investigator is a tool designed to help law enforcement officials specify locations in order to apprehend suspect devices, including laptops and smartphones. Another featured gadget produces powerful magnetic pulses in order to instantly erase sensitive data in the event of a security breach† (Brown, 2010). Another useful tool for law enforcement is the Global Positioning System or GPS. This is used to help track criminals on probation and parole. This can also be useful in court to show a suspects whereabouts during trial or in tracking down a kidnapped victim. The GPS has become a vital part of an investigation and something that some investigators may even rely on. The same can be said for cellphones since most of them now days are equipped to tell your location as well. Tools and devices are not the only thing that is  used to try to deter cybercrimes, there are laws in place as well. Recently, President Obama calls for a new law for cybersecurity. â€Å"The new cybersecurity effort came a day after Mr. Obama called for legislation to force American companies to be more forthcoming when credit card data and other consumer information are lost in an online breach like the kind that hit Sony Pictures, Target and Home Depot last year. Concern about cybersecurity has increased after the hacking of Sony in December, which the United States government says was the work of the North Korean government. The president said that breach and an attack on the United States Central Command’s Twitter account proved the need for an overhaul† (Hirschfeld Davis, 2015). The cybersecurity measure Mr. Obama envisions would encourage companies to share threat information such as Internet Protocol addresses, date and time stamps, and routing information with the Department of Homeland Security, which would swiftly pass it on to other government agencies and industry groups voluntarily formed to share such material. Companies would get â€Å"targeted liability protection† for doing so, as long as they took steps to protect consumers’ personal information (Hirschfeld Davis, 2015). â€Å"President Obama also called for law enforcement tools to combat cybercrime, including to prosecute the sale of botnets, computer networks created to carry out cybercrime, and to give courts power to shut down those involved in denial of service attacks and other fraudulent activities† (Hirschfeld Davis, 2015). Fighting cybercrime is not just the responsibility of the government it is everyone’s responsibility. Anyone at any time can be attacked by a cybercriminal there is no limits when it comes to cybercrime. The government and law enforcement does their best to protect everyone but it is difficult to protect against someone you cannot see. There is still concerns that maybe technology is trying to take over good old fashion police work such as patrolling and even investigating itself. Is the government looking for the quick technological fix rather than to invest in what it takes to get communities to collaborate on their own safety? The problem is an over-reliance on technology with too little recognition that policing is primarily a people business. Law enforcement and local communities often see technology as a panacea to make communities safer without asking the hard questions. While technology is good to have and it does help to solve some cases it will never replace a police officer. People  find safety and security when they actually see someone protecting them. People need that reassurance. DNA Collection â€Å"The Federal Bureau of Investigations maintains a national DNA database known as the Combined DNA Indexing System or CODIS. The pilot program for what became CODIS started with fourteen state and local laboratories. Today, there are over 180 public law enforcement laboratories that use CODIS. The FBI Laboratorys CODIS program allows federal, state, and local crime laboratories to store, search, and share DNA profiles electronically† (The DNA Act, 2015). The practice of taking DNA samples from convicted criminals is now largely uncontroversial. The courts have routinely upheld laws that authorize DNA collection from both current and former convicts, and the resulting databases of DNA have become powerful tools to analyze forensic evidence collected from crime scenes. The databases help to clear innocent suspects and redirect law enforcement officials away from unproductive investigations. They also help to convict guilty criminals and clear the wrongfully convicted. A trend that is causing significant debate is gathering DNA samples from people who are arrested but not convicted (Berson, 2009). â€Å"About 20 states and the federal government have passed legislation that requires DNA collection upon arrest. This legislation has raised concerns that crime laboratories may be unable to manage an influx of samples from a new source and that preconviction DNA collection may violate Fourth Amendment privacy guarantees. Some people worry that collecting DNA creates the potential for abuse of genetic information stored in databases. Others point out that the federal and state privacy laws and penalties that apply to crime labs are stringent far more stringent than the rules governing private entities that collect blood and saliva for medical or insurance purposes† (Berson, 2009). Although some states limit preconviction DNA collection to violent offenses or sex crimes, other states include all felonies, and some extend the requirement to misdemeanors as well. States legislation requiring preconviction DNA collection varies. Variations include the types of crimes for which samples are collected, applicability of the law to juveniles and procedures for deleting profiles. Some state laws have faced Fourth Amendment challenges in court. â€Å"The Fourth Amendment ensures that [t]he right of the people to be secure in their  persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized† (The DNA Act, 2015). This is where the government will continue to have problems, most American’s live by the Amendments that the United States was founded upon. The Amendments were put in place to give the government limits and when it comes to mandating DNA the government appears to have reached its limits. Conclusion In conclusion, the government and law enforcement have many challenges to face and overcome in the new age of technology. Technology also makes it easier for criminals from around the globe to connect and partner with each other to pull off financial frauds, and the anonymity of the web can make it more challenging to locate and stop online perpetrators. There are legal obstacles as well as ethical obstacles that the government and law enforcement must overcome. At every corner there is a potential for a crime to happen whether it is a person’s credit card, a computer, a bank, a smart phone or even a car. Cybercrime is a growing field and one that is hard to combat with all the technology. The problem the government is facing is what is considered too invasive and what is going too far to protect our nation? References Berson, S. (2009). Debating DNA Collection. Retrieved from http://www.nij.gov/journals/264/pages/debating-DNA.aspx Biometric Security Technology. (n.d.). Retrieved from http://www.peterindia.net/BiometricsView.html Brown, K. (2010). The Future of Cybercrime Detection Prevention. Retrieved from http://www.pctools.com/security-news/future-cybercrime-prevention/ De Chant, T. (2013). The Boring and Exciting World of Biometrics. Retrieved from http://www.pbs.org/wgbh/nova/next/tech/biometrics-and-the-future-of-identification/ Hirschfeld Davis, J. (2015). Obama Calls for New Laws to Bolster Cybersecurity. Retrieved from http://www.nytimes.com/2015/01/14/us/obama-to-announce-new-cyberattack-protections.html?_r=0 The DNA Act. (2015). Retrieved from

Monday, October 14, 2019

Hotel Roles And Responsibilities

Hotel Roles And Responsibilities Classification of hotel facilities is not based on rigid standards. On marketplace forces, touchstones, location, mathematical function, and the definitions can change, depending and preference, but the definitions that follow are generally accepted and are the ones intended for these classifications throughout this textual matter, in some cases, personal. A hotel usually offers guests a full range of accommodations and services, which may include reservations, suites, public dining and banquet facilities, lounge and entertainment areas, room services valet, laundry, hair care, swimming pool, gym, sauna, spa and other recreational activities, gaming/casino operations, ground transportation to and from airport, and concierge services. Motels: Motels offer guests a limited range of services, which may include reservations, vending machines, swimming pools, and cable television. The size of these properties averages from 10 to 50 units. Motels are usually in suburban highway and airport locations. Guests typically stay overnight or a few days. Motels may be located near a freestanding restaurant. All suites: It may include reservations, living room and separate bedroom, kitchenette, optional public dining room and room service, cable television, videocassette players and recorders, specialty shops, personal services valet and laundry, swimming pool, and ground transportation to and from an airport. The size of the operation can range from 50 to more than 100 units. This type of property is usually found in centre-city, suburban, and airport locations. Limited-Service Hotels: The range of accommodations and services may include reservations, minimal public dining and meeting facilities, cable television, personal computers, personal services (valet and laundry), and ground transportation to and from an airport. They are usually located near restaurants for guest convenience. Guest stays can be overnight or long-term. These properties sometimes specialize in catering to the business traveller and offer special business technology centres. Extended-Stay Hotels: At Hiltons Homewood Suites, the following room amenities are included: king-size bed or two double beds in the bedroom and foldout sofa in the living room; two remote-controlled colour televisions; fully equipped kitchen with a microwave, refrigerator with ice maker, coffeemaker, twin-burner stove, and kitchen utensils; a spacious, well-lit dining area; and ceiling fans and iron and ironing board. Additional hotel services include a business centre, an exercise room, and a pool. 2 Roles and responsibilities of accommodation and reception staffs Hotel receptionists are responsible for making guests feel welcome, checking them in and out efficiently, and dealing professionally with enquiries, face to face and by phone, fax or email. They deal with general reservation enquiries, as well as answering guests questions and dealing with complaints. Duties will often include: allocating rooms to guests taking and passing on messages preparing bills, taking payment, and handling foreign exchange Helping guests with special requests such as storing valuables in the hotel safe or luggage area, ordering taxis or booking theatre tickets. Figure 1 Medium size full service hotel organisation chart Their main tasks are: changing the bed linen and making beds emptying bins, vacuuming floors, and washing glasses and cups replenishing stocks of guest supplies, such as tea, coffee and biscuits Tallying up items consumed from the mini-bar. 2.1 Identifying responsibilities of reception service staff Receptionists are usually the first people hotel guests encounter, particularly in those hotels where hall porters are not employed. They thus occupy a gatekeeper role, frequently bearing the responsibility for guests first impressions of the hotel. In fact, the responsibilities that receptionists bear for that image of the hotel arguably extend beyond first impressions. E.g. Receptionists of Hilton hotels regularly being involved in book-keeping, letter writing, inventory taking, typing, record keeping, answering queries, filing, taking reservations, dealing with mail and lost property, dealing with room changes, taking payments of customers bills, banking monies, holding responsibility for room keys and producing reports and statistics. 3 Legal and statutory requirements for rooms division operations The following legal and statutory requirements must be met by the Hotels in the UK: Duty to guests Employment Pension Environment Food/ Hygiene Health Safety Guest information Insurance Intellectual property Licensing tourism Local national tax Planning zoning Other (Bureau de change) 4. Front of house area effective management The Front of House Manager will be responsible for providing a high standard of customer service in order to maintain the customer loyalty from the general public and visiting companies, as well as to maximise revenue from Bar, Kiosk and Cafà ©, hotels the post holder will report to the Operations Manager, and work closely with the senior management team. He/she will be in the front line of customer liaison. Responsibilities: To maintain safe and friendly environment for all theatre visitors. To give strong and effective management To develop and encourage high standards of customer service. To control and report on costs (staff and stock control). To manage the Front of House sales facilities. 5. Planning for managing the front of house area A little planning on the front office managers part is required to ensure that the new employee meets the entire staff in the first few days. Saying a few words about the role of each employee during the introductions will not only make new hires feel more comfortable with their co-workers but also make each current staff member feel like a special part of the team. The current staff will also appreciate meeting the new addition to the staff. Very often, this procedure is overlooked, and new employees feel awkward for days or weeks. 6. Operational issues affecting management and business performance The front office team have the common goal of providing hospitality to the guest. Training, empowerment, and flexibility are necessary to make the team work. Forecasting, scheduling, developing a supervisory style, motivating personnel, balancing staff personalities, delegating tasks, training, and effectively communicating are only a few of the skills a good supervisor must master. It is a lifelong effort developed through continuing education and trial and error. 7. Importance of property interiors and design to effective management This is important to positioning the front desk to allow front office personnel a view of guests who enter the lobby from the street entrance and elevators. The guests first impression is enhanced by the ambience, physical appearance, and orderliness of the equipment and personnel. The front office manager must establish a balance between guest service and work processing to allow for efficiency. Figure 2 Front office layout 8. Aspects of planning and management of the accommodation service Planning is very important to delivering continuous quality service in hotels, as defined by the guest. Successful extension of hospitality starts with managements commitment to a service management program. Preparing a service strategy statement will focus the planning efforts of the owners, management, and employees. Principles of total quality management provide a manager with an opportunity to involve frontline employees in analyzing the components of delivery of service and methods to improve existing services. The development of the service management program requires the involvement of frontline employees, discussion of the guest cycle, moments of truth, employee buy-in concept, screening of potential employees prior to hiring, empowerment, training, evaluation of the service management program, follow-through, and interfacing with other departments in delivering hospitality. A long-term commitment to a successful service management program is necessary. 9. Operational issues affecting the management and performance of the accommodation service There are some issues affecting this sector such as: Environmental Social Legal Economical Technological Political etc. 10. Yield management techniques Achieving the best yield involves redefining the use of occupancy percentage and average daily rate. Although these concepts are important to the long-range potential financial picture, they take on a new meaning with yield management. Optimal occupancy, achieving 100 percent occupancy with room sales, which will yield the highest room rate, and optimal room rate, a room rate that approaches the rack rate, work together to produce the yield. 10.1 Yield management strategies E. Orkin offers a simple policy for developing strategies to implement yield management: when demand is high, maximize rates; when demand is low, maximize room sales. These concepts are portrayed in Table 1. Orkin also offers some specifics on developing strategies. He says that when demand is high, restrict or close availability of low-rate categories and packages to transients [guests], require minimum length of stays, and commit rooms only to groups willing to pay higher rates. When demand is low, provide reservation agents with special promotional rates to offer transients who balk at standard rates, solicit group business from organizations and segments that are characteristically rate sensitive, and promote limited-availability low-cost packages to local market. Restricting or closing availability was indeed a challenge because most front office managers were familiar with the sell out the house operating procedure and were unsure if this aggressive marketing tactic would work. Some hoteliers were setting reservation policies that required minimum length of stay during heavy demand periods. The procedure recommended for low demand (special promotional rates and soliciting group and local business) was the strategy used during any demand period. As yield management continues to be tried and tested in hotels, various combinations of maximizing room rates and room sales will continue to challenge hoteliers. Table 1 Yield Management Strategies Demand Strategy High Maximise rates, require minimum stays Low Maximise room sales, open all rate categories The following strategies can be taken to maximise occupancy and room revenue: Forecasting room sales, setting strategies to generate revenue Block-out Periods high demand periods require to block out certain days Systems Procedures using automated system that will process reservations, track demand, and block out room availability during certain time periods Feedback on decisions employed in yield management to set right strategies 11. Sales techniques that can use to promote and maximise revenue The objective of the sales incentive program for front office employees is to encourage the front office to promote products and services in various areas of the hotel, including the front office, the food and beverage department, the gift shop, and the health facilities. Each promotional area may be considered, or the front office manager might choose only a few areas, perhaps those that generate the most revenue, as incentive targets. A few examples follow: Upgrading a reservation during registration Selling a meal in the hotels restaurant Selling room service 11.1 Creative ideas When developing a program to increase front office sales activity, the front office manager, in conjunction with other department directors and employees, should identify as specifically as possible the hotel products and services to be promoted. In this case, the overall purpose of the program would be to maximize sales by the front office staff of front office, food and beverage department, gift shop, and health facilities products and services. The team must decide which area or areas would be most profitable. 12. Purpose of forecasting and statistical data within room division An important feature of yield management is forecasting room sales. Orkin suggests using a daily-decision orientation rather than a seasonal decision-making scheme in developing a particular strategy. Accurate forecasting of transient demand will assist hoteliers in developing strategies to maximize sales to this group. For example, if a hotel has group business reservations for 95 percent of available rooms, seeking transient business with special promotional packages during that time period would not be advisable. If the period following the group business is low, then advance knowledge of this information will allow time for marketing and sales to develop special promotional packages aimed at the transient and local markets. 12.1 Limitations of employing forecasting techniques Forecasting should be used to generate revenue by forecasting the volume of customers and allocating resources where it fits. Managers need to make sure that they have enough available rooms to control the guests flow. As we know more guests brings more revenue. 13. Performance indicators to measure the success of room sales A general manger who reviews the report of a recent five-day block-out period, as depicted in Table 2, would find that the period restricted for a five-day minimum length of stay worked well for May 1-3, but 178 room reservations were lost for May 4-5. The director of marketing and sales will have to research the contracts the hotel had with the various groups involved. Also, the front office manager should ask if the front desk clerks, bell staff, or cashiers heard any guest comments on why they checked out earlier than scheduled. The turn away business on May 3-5 might also indicate that the convention events scheduled on these days were more interesting or that the members of this group did not want to commit to a five-day stay and wanted reservations for only the last three days of the convention. Table 2 Turn away business report Date Yield % No. Rooms Turned away $ Lost @ $95 Rack Rate May 1 98 35 3,325 May 2 96 20 1,900 May 3 93 60 5,700 May 4 50 90 8,550 May 5 50 88 8,360 13.1 Considerable factors to review the performance of sales manager Were the anticipated profits outlined in the budget achieved? Use of a VIP Guest Card indicates to the restaurant manager that the guest was referred by the front desk clerk. Similar types of controls will enable management to pinpoint the origins of room reservations, gift shop purchases, and other sales. A recordkeeping system must be established to reflect the amount of money awarded to front office employees as incentives to increase sales in targeted areas and the directors should consider these costs in terms of generating revenues. The details of this recordkeeping system must be worked out with the various department directors and the controller. 13.2 Present and communicate appropriate findings of the Sales manager Front office management includes helping to promote the overall profitability of a hotel. Developing a point-of-sale front office involves developing a plan of action, which includes setting goals and objectives, brainstorming areas for promotion, evaluating alternatives, discussing supportive areas for consideration such as incentive programs and training programs, projecting anticipated revenues and related expenses in a budget, and preparing feedback mechanisms. This simple framework for planning will allow front office managers the opportunity to gain a larger perspective on the issue rather than pushing forward with desperate efforts to produce sales.