Tuesday, December 31, 2019

The Cotton Gin And The Assembly Line - 1494 Words

The cotton gin and the assembly line may seem at first glance like they are not that important but their lasting effects explain why things like manufacturing operate the way they do today. The cotton gin is a simple box. It has gears and a screen that with a crank on it that, when turned, is used to separate the cotton seeds from the cotton. The assembly line involves a pathway where a car or other item moves from station to station. A specially trained worker at each station will work on one specific area of the car or item before passing it along to the next station. The cotton gin and the assembly line affected history through the wars that both influenced and the industries, such as modern factories and fashion, that they contributed†¦show more content†¦The inventor of the cotton gin Eli Whitney almost went broke because as a result of his invention. He was fighting almost 60 lawsuits over the patent of his cotton gin. #1 â€Å"An invention can be be so valuable as t o be worthless to the inventor.†- Eli Whitney. With the invention of the cotton gin, America supplied three quarters of the world with cotton during the 1800s While the cotton gin did do well in supplying the world with cotton it increased slavery. #1 In 1790, there were 657,000 slaves in the south and after the invention of the cotton gin In 1810, there are 1.3 million slaves in the south. In 1793, Whitney patented the gin and at the time, 188,000 pounds of cotton are produced. In 1810, there are 1.3 million slaves and 93 million pounds of cotton are produced each year. As a result of the increase in slaves, more than 600,000 US citizens died on the Civil War battlefields.The Civil War can be attributed in some ways to the invention of the cotton gin.#9 The cotton gin was a very important The Ford assembly line is a system used to make manufacturing and putting together items in a quicker and more efficient manner. To put together it took eighty four separate steps to assemble the Model T car.#7 Henry Ford is credited as inventor of the assembly line. Henry Ford was born in 1863 on a farm in Springfield Township, Michigan, about ten milesShow MoreRelatedEssay on The Industrial Revolution1366 Words   |  6 Pagesand mans way of looking at life all changed during this period. Two revolutions took place. The first Industrial Revolution was based upon the cotton industry. Most of the inventions made during that period were mainly for manufacturing and producing cotton. John Kay, an English weaver invented the flying shuttle, a product that could cut cotton twice as fast. When other inventors saw what Kay had made, they wanted to do the same. One problem still remained. Yarn was not being fed fastRead MoreWhy Whitney Never Made It For All Things Mechanical1443 Words   |  6 Pagescontact with the first cotton ball he had ever seen, and it was also on this estate that he learned the hardship of dealing with cotton. Whitney noticed that the process of extracting the seed from the cotton ball is extremely time consuming and very inefficient. Though cotton gins existed to help ease this labor, they were roller type gins. These mechanisms utilized two large rollers that squeezed the cotton seeds out of the finished product. Unfortunately these types of gins were not overly effectiveRead MoreThe Invention Of Inventors : Inventing Solutions Essay1338 Words   |  6 Pagesclothing. The common cloth used today started out as cotton. Cotton strands are separated from the seeds of a cotton plant and those fibres are used to make fabrics and clothing. Separating the cotton strands and seeds was done mostly by hand or spinning machines called a cotton gin, until a man came along and improved these cotton gins in 1973 (Thompson, 2012). This man was Eli Whitney and his improved cotton gin allowed a faster production of cotton strands, thus making clothing production faster.Read MoreAmerican Revolutionary W ar : The Battle Of The War1331 Words   |  6 Pagesamendment revoked prohibition. Inventions Air plane The Wright Brothers invented the modern airplane and flew it over Kitty Hawk in 1900. The airplane was first used as a weapon in World War I. Moving Assembly Line Henry Ford invented the moving assembly line to create his cars in 1913. The moving assembly creates a finished product piece by piece rather than all at once. This invention is used to make the majority of products sold today. Transistor Bell Labs invented the transistor in 1945. The transistorRead MoreThe Slavery Of The Cotton Gin By Eli Whitney1586 Words   |  7 Pages In the 1790’s the invention of the cotton gin by Eli Whitney sparked an increase in cotton production in the South. The cotton gin decreased the labor time it took to pick seeds from the cotton. Slave owners moved or sold their slaves to deep Southern states where cotton was becoming increasingly profitable. The United States doubled in size due to President Thomas Jefferson’s Louisiana Purchase. Within this territory the Cotton Kingdom led in cotton production. Slaves were chained togetherRead MoreEssay on Industrialization in America 1117 Words   |  5 Pageswhere he was able to recreate the loom from memory of his apprenticeship with Richard Arkwright, a British inventor. Slater went on to launch the country’s mechanized cotton-spinning factory. His â€Å"Slater mills† were built along New England Rivers and they were wildly successful due to the inexpensiveness and speed of the production of cotton they made. The mills were very efficient and r equired many employees which gave jobs to thousands of Americans which fueled the American economy and introduced anRead MoreManufacturing anf Operation Management2248 Words   |  9 Pagesefficiency, some factories have to run their production line for 24/7. Due to the constant evolving of science and technology sector, some of the production requires very high precision and the working environment had become hazardous. Therefore, running the production line barely on man power is dangerous not suitable anymore. In order to maximize the revenues, industries started to import the automotive technology into their production line. Nowadays, automation infiltrated many aspectRead MoreThe Heritage of Operations Management2336 Words   |  10 PagesSpecialization (Smith and Babbage), Standarized Parts (Whitney) -Scientific Management Era (1880-1910): Gantt Charts (Gant), Motion Time Studies (Gilbreth), Process Analysis(Taylor), Queuing Theory (Erlang). -Mass Production Era (1910-1980): Moving Assembly Line (Ford/ Sorensen), Statiscal Smpling (Shewart), Economic Orden Quantity (Harris), Linear Programming, PERT/CPM (DuPont), Material Requirements Planning. The originators of these concepts were: During the 1910s: Frederick W. Taylor (from the UnitedRead MoreIndustrial Revolution DBQ Essay747 Words   |  3 Pagesresources, advanced technology and inventions, and political freedom. To start off, England had all the natural resources needed to industrialize. England had a natural supply of wool, cotton, coal, iron, lead, and tin (doc 1). These are all resources that are needed and helpful when industrializing. Wool and cotton are especially good for the textile industry, whereas iron was great for making tools and machinery. Along with these resources, England’s location enabled trading due to it’s many waterwaysRead More Industrial Revolution Essay1774 Words   |  8 Pages19th century, times went from separating the cotton from its seed to using an automated cotton gin made by an American inventor Eli Whitney. This allowed for the lower class citizens to be able to have the important goods such as medication and clothing. Before the American Industrial Revolution, people were mostly farmers and life went by slowly and tedious work was required for simple tasks. But with inventions like the cotton gin, and the assembly line, mass production evol ved. The United States

Monday, December 23, 2019

Violence and The Views of Malcolm X - 928 Words

â€Å"Peace cannot be achieved through violence, it can only be attained through understanding†. One of my favorite quotes by Ralph Waldo Emerson, the leading figure in the transcendentalism. Going by what the quote states, one can ask what role does violence even play in life? More specifically what role did it play in the Civil Rights struggle in the South? It’s evident that violence’s purpose in the struggle wasn’t for peace but for something else. Well that’s what it was for Malcolm X, a center figure in the Civil Rights struggle. For Malcolm X, violence was more of a response that anything else. It was a form of self-defense that he could no longer avoid. For Martin Luther King Jr. another center figure just like Malcolm X, violence was something else. For him violence was unnecessary. Violence in the Civil Rights struggle was inevitable for some not only because the segregationist whites were using such methods to assault the black people as w ell as their homes, but also at that time nonviolence was just another philosophy that some did and others didn’t. Even so violence did play an important role in this movement. Not the violence used by the blacks but instead the methods of violence used by the whites. Malcom X wasn’t necessarily for violence. He wanted freedom and equality over all else just as any other Civil Rights leader. He believed that self-defense, the protection of one’s person and or property though the use of physical force, was the only form of violenceShow MoreRelatedRhetoric Of Malcolm X865 Words   |  4 Pagesof The Autobiography of Malcolm X: As Told to Alex Haley, Malcolm X describes his recent return from his pilgrimage to the Holy City, Mecca. Throughout this passage, Malcolm X discusses claims made against him by the white press over violence and revolution during the long, hot summer of 1964. X is blamed for causing many of the riots and uprisings that occur during this summer because of his outspoken nature and views on the principle of â€Å"justice at all costs.† Malcolm X refutes these false claimsRead MoreThe Montgomery Boycott And Martin Luther King And The Civil Rights Movement1019 Words   |  5 Pagesoppression and race-inspired violence and laws, such as the Jim Crow Laws. After African-Americans obtained their end of slavery and earned their citizenship, Jim Crow Laws were placed, adding the â€Å"Separate but equal† which separated Africans to whites in public places, such as schools. In the year of 1954, the Supreme Court abolished the statement, â€Å"Separate but equal† as it was unconstitutional. Many people were still against the abolishment and acted toward violence. On the other hand, African-AmericansRead MoreMartin Luther King J. And Malcolm X Essay1103 Words   |  5 PagesLuther King Jr. and Malcolm X. They were both influential leaders of the civil rights movement who strove for a common goal, which w as to create equality for African Americans. Although Martin Luther King Jr. and Malcolm X were both authoritative figures in the African-American civil rights movement, they differed significantly in their social backgrounds, religious beliefs, and ideologies, which affected their philosophies. The differences in Martin Luther King Jr. and Malcolm X’s family backgroundsRead MoreMalcolm X vs. Martin Luther King Jr.1723 Words   |  7 PagesMartin Luther King Jr. and Malcolm X it was the black community that needed to rise up in hopes of achieving equal rights and voting rights for the blacks. Dr. Martin Luther King Jr. and Malcolm X were two of the most prominent leaders and orators at the heart of the Civil Rights Movement. Although both leaders possessed the same objectives, their outlooks and perspectives differed immensely. The main primary difference focused on their willingness to employ violence to achieve their end goalsRead MoreMalcolm X Vs. Martin Luther King Jr. Essay1717 Words   |  7 PagesMartin Luther King Jr. and Malcolm X it was the black community that needed to rise up in hopes of achieving equal rights and voting rights for the blacks. Dr. Martin Luther King Jr. and Malcolm X were two of the most prominent leaders and orators at the heart of the Civil Rights Movement. Although both leaders possessed the same objectives, their outlooks and perspectives differed immensely. The main primary difference focused on their willingness to employ violence to achieve their end goalsRead MoreEssay Malcom X and Non-violence1008 Words   |  5 PagesMy life has always been one of changes (436). Malcolm X, throughout his life, was one of the most influential, and quite possibly the most effective, civil rights activists of the twentieth century. His radical ideas and views were widely sought after from the oppressed African-American population in the 1950s and 60s. The changes he underwent throughout his life affected his views of a racist America and inspired him to lead a dedicated life preaching, what he thought to be, the only methodRead More Differences Between Martin Luther King and Malcolm X Essays1146 Words   |  5 Pagestowards the white run American society in which they lived. Malcolm X, James Baldwin, Martin Luther King, and Stokely Carmichael all blamed the whites for the racism which existed. However, they agreed that it was up to the black society to end this problem. Using the black society, each of the authors had their own idea of how racism could be stopped. Unfortunately, for some, such as Malcolm X, this involved the use of violence, while others, such as King, favored the non-violent approachRead MoreThe Differing Methods And Aims Of Malcolm X And Martin Luther King602 Words   |  3 PagesThe Differing Methods And Aims Of Malcolm X And Martin Luther King The methods of Malcolm X and martin Luther King were very different but they shared the same basic aim, to improve the lives of black Americans. Possibly these differences in both aims and methods comes from the differences in the way they were raised, Malcolm X was born Marcus Little in Omah, Nebr. Malcolm Xs father was a follower of Marcus Garvey (Garvey believed that Black Americans should go back to Read MoreMartin Luther King vs. Malcolm X Essay825 Words   |  4 PagesTwo of the greatest know civil rights speakers in the United States was Martin Luther King Jr. and Malcolm x. Both of these men had two very different views on what they thought would be the best way for blacks to get equality. Martin Luther King Jr. believed in his main philosophy which was non violent resistance. Martin used the teachings from Ghandi to teach African Americans how to use non violent resistance as a way to earn equality. He also believed that blacks should try to find commonRead MoreFighting is not always the right way to go, and you should pick and choose your battles because,600 Words   |  3 Pagesare not going to win every fight, and there is always going to be someone bigger and better than you, but Malcolm X proved that sometimes it is ok fighting for what you believe is right. He fought for what he believed in , and that was full freedom and equal rights for African Americans. Malcolm X went from humiliation to admiration for fighting for what he believed was right to him. Malcolm X sacrificed his life for the most worthy cause of the 20th Century because he fought for equal rights African

Sunday, December 15, 2019

Shakespearean Sonnet Explication Sonnet 146 Free Essays

SONNET 146 Poor soul, the center of my sinful earth, Lord of these rebel powers that thee array, Why dost thou pine within and suffer dearth, Painting thy outward walls so costly gay? Why so large cost, having so short a lease, Dost thou upon thy fading mansion spend? Shall worms, inheritors of this excess, Eat up thy charge? is this thy body’s end? Then soul, live thou upon thy servant’s loss, And let that pine to aggravate thy store; Buy terms divine in selling hours of dross; Within be fed, without be rich no more. So shalt thou feed on death, that feeds on men, And death once dead, there’s no more dying then. Sonnet 146, as in all Shakespearean sonnets, exemplifies the importance of poem structure. We will write a custom essay sample on Shakespearean Sonnet Explication Sonnet 146 or any similar topic only for you Order Now Following the rhyme scheme ABAB CDCD EFEF GG, this English sonnet (now called Shakespearean), distinguishes its author by the format in which it follows. Consisting of a total of fourteen lines, this body of this poem contains three quatrains and ends with a rhyming couplet. Not only does Sonnet 146 encompass all the necessities of a Shakespearean sonnet, it also displays William Shakespeare’s mastery in his use of control of language, tone, and meaning that is portrayed to the reader. In the opening of the poem, in quatrain one, we see the speaker as he wrestles with his own personal conflict between the spiritual and material state that he has found himself in. For here in this Shakespearean sonnet, the speaker addresses not a friend, lover, or mistress – only his own â€Å"poor soul† that has suddenly been placed at the center of his â€Å"sinful earth† (line 1). The speaker reprimands his soul for spending so much on its â€Å"outward walls† (line 4). In quatrain two, the poet asks the question of why so much effort is put into the investing of the things that are temporary: â€Å"Why so large cost, having so short a lease† (line 5). For at death, only worms will inherit the costly excesses. In quatrain three, the speaker concludes his argument by warning his soul to use the body as â€Å"thy servant† (line 9). Let the outside wither -â€Å"pine†- so that the inner soul can prosper -â€Å"aggravate thy store† (line 10). In conclusion, the rhyming couplet shows us the speaker’s only solution to this inevitable fact of life – death. The soul needs to prepare itself for when the time comes and it must face death. For the soul can outlive the body, and even conquer death, as we see in line 13 and 14: â€Å"So shalt thou feed on Death, that feeds on men / And Death once dead, there’s no more dying then. â€Å" This sonnet is one of few written by Shakespeare that reflects a more religious tone, as the words sinful, divine, and soul are present. What an interesting insight this provides to the reader about the writer’s own potential internal struggle with morality. For just as the speaker asserts here in this poem, so too us true for us in our own Christian faith – that when we focus on the body (the temporary) by allowing ourselves to worry over the adorning of it, then we do so at the expense of our soul (the eternal). How to cite Shakespearean Sonnet Explication Sonnet 146, Essay examples

Saturday, December 7, 2019

Computer Network and Networking Essentials free essay sample

This foundational course covers local area network topics including rationale for networking, the open systems interconnection (OSI) model, common network topologies and architecture, client/server concepts, basic hardware devices and usage, and basic networking security concepts. Policies Faculty and students will be held responsible for understanding and adhering to all policies contained within the following two documents: University policies: You must be logged into the student website to view this document. Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Stallings, W. (2009). Business data communications (6th ed. ). Upper Saddle River, NJ: Pearson/Prentice Hall. Tomsho, G. (2011). Guide to networking essentials (6th ed. ). Clifton Park, NY: Course Technology, Cengage Learning. All electronic materials are available on the student website. Week One, Mar 3, 2014: Local Area Networks Details Due Points Objectives Explain the purpose of a LAN and the benefits it can provide to its users. 1. 2 Differentiate between types of networks. 1. 3 Define basic LAN terminology. 1. 4 Explain how LAN operating systems work. Course Preparation Read the course description and objectives. Read the instructor’s biography and post your own. Reading Read Appendix A. Reading Read Ch. 2, â€Å"Network Hardware Essentials,† of Guide to Networking Essentials. Reading Read Ch. 3, â€Å"Network Topologies and Technologies,† of Guide to Networking Essentials. Reading Read Ch. 6, â€Å"Network Reference Models and Standards,† of Guide to Networking Essentials. Participation Participate in class discussion. All Week 10 Discussion Questions Respond to weekly discussion questions. DQ1- Day 2 DQ2- Day 4 10 CheckPoint LAN Operating Systems Scenarios Read the three scenarios in Appendix B. Answer the questions following each scenario for a total of 200 to 300 words. Day 5 30 Week Two, Mar 10, 2014: The OSI Model and Topologies Details Due Points Objectives 2 2. 1 Define key terms related to the OSI model. 2. 2 Describe the functions of hardware connectivity devices and tools. 2. 3 Illustrate different LAN topologies. CheckPoint OSI Model Key Terms Table Use the table in Appendix C to define the key terms related to the OSI model. Describe the functions of any hardware connectivity devices and tools listed. Post Appendix C as an attachment. Day 4 30 Individual LAN Topologies Read Case Projects 3-1, 3-2, 3-3 of the Guide to Networking Essentials. Determine what type of physical and logical topology will be used for each scenario. Substantively explain the reasoning for your answer. Create a visual representation of each chosen topology by copying and pasting the shapes provided in Appendix D—such as a bus, ring, star, or mesh—into a Microsoft ® Word document. Note that you will need to use the Draw feature in Microsoft ® Word to create lines between the shapes, and you may have to use some shapes more than once. Refer to the Figures 3-1 through 3-4 of Guide to Networking Essentials for examples. Post your assignment as an attachment. Day 7 100 Week Three, Mar 17, 2014: Technology Types Details Due Points Objectives 3 3. 1 Differentiate between types of Internet connectivity. 3. 2 Compare and contrast fat client and thin client concepts. 3. 3 Plan an Ethernet LAN. Reading Read the â€Å"Fiber Distributed Data Interface Technology† section through the end of the chapter in Ch. Network Topologies and Technologies,† of Guide to Networking Essentials. Reading Read Ch. 5, â€Å"Network Protocols,† of Guide to Networking Essentials Participation Participate in class discussion. All Week 10 Discussion Questions Respond to weekly discussion questions. DQ1 – Day 1 DQ2 – Day 4 10 CheckPoint Network Consultant Scenarios Complete Case Projects 3-1, 3-2, 3-3 of Guide to Networking Essentials. After determining if a client-based or client/server model will be used, substantively justify your choice in 200 to 300 words. Day 5 30 Week Four, Mar 24, 2014: Introduction to TCP/IP Details Due Points Objectives 4 4. 1 Describe how to troubleshoot the TCP/IP network. 4. 2 Explain TCP/IP and the concept of addressing and allocation. 4. 3 Distinguish between various networking protocols. 4. 4 Plan a TCP/IP LAN. CheckPoint TCP/IP LAN Plan Practice planning a network by completing questions 1, 2, 4, 11, 14, 15, 16, 20 in Ch. 5 of Guide to Networking Essentials. Select and explain each answer in a total of 200 to 300 words. Day 5 30 Exercise Toolwire Lab: Planning a TCP/IP Physical and Logical Network Log in to the student website. Click Week 4 and then click the link to the Toolwire Lab. A new window opens containing a description of the lab. Scroll to the bottom of the page and click Lab Access to begin the lab. Complete the lab assignment as indicated. Take a screenshot of the completed Toolwire Lab activity and paste it into the body of a new post. To do this, press the Print Screen or Prt Scr key on the upper right-hand corner of your keyboard. Open a new post and press Ctrl + V. Your screenshot should paste directly into the body of your post. If your screenshot does not post, you may paste your screenshot into the body of a Microsoft ® Word document and submit it as an attachment. Post your message. Day 4 15 Individual TCP/IP Network Troubleshooting Use Appendix E1 Network Diagram. Identify the problems with the TCP/IP network configuration and explain how they should be fixed. Complete the table in Appendix E. Explain your answer for each problem found. Post Appendix E as an attachment. Day 7 100 Week Five, Mar 31, 2014: Protocols and Services Details Due Points Objectives 5 5. 1 Discuss the concept of domain/addressing and dynamic DNS and DNS. 5. 2 Outline simple network management protocol and how it is used. 5. 3 Differentiate between web pages, web servers, and web access. Reading Read the â€Å"Storage Area Network† section through the â€Å"DNS Server† section in Ch. 8, â€Å"Network Operating System Fundamentals,† of Guide to Networking Essentials. Reading Read the â€Å"Managing User and Group Accounts† section through â€Å"User Profiles,† section in Ch. 9, â€Å"Server Management and Administration,† of Guide to Networking Essentials. Reading Read Ch. 4, â€Å"The Internet,† of Business Data Communications. Reading Read section 20. 3 in Ch. 20, â€Å"Network Management,† of Business Data Communications. Participation Participate in class discussion. All Week 10 Discussion Questions Respond to weekly discussion questions. DQ1 – Day 2 DQ2 – Day 4 10 CheckPoint Domain Name Assume the role of an IT consultant to a new nonprofit organization, Free Flu, which provides flu shots to the elderly. The organization needs a domain name. Utilize Internet resources to determine which domain name is available to the company. Judge whether you would use . com, . org, or . net for the web address. Differentiate between any web pages or web servers you would use for this task. Describe your findings and reasoning in 200 to 300 words. Day 5 30 Week Six, April 7, 2014: Networking with Microsoft ® Windows ® Details Due Points Objectives 6 6. 1 Define the various network services in Microsoft ® Windows ®. 6. 2 Describe how to establish user rights and permissions. 6. 3 Explain how to assign work groups. CheckPoint Vocabulary Table Define five key terms listed in the Vocabulary Table in Appendix F. Post Appendix F as an attachment. Day 4 30 Exercise Toolwire Lab: Designing a Site Infrastructure Log in to the student website. Click Week 6 and then click the link to the Toolwire lab. A new window opens containing a description of the lab. Scroll to the bottom of the page and click Lab Access to begin the lab. Complete the lab assignment as indicated. Take a screenshot of the completed Toolwire Lab activity from your computer screen and paste it into the body of a new post. Post your message. Day 5 15 Individual Work Group Scenarios Read the following scenario: Your Microsoft ® Windows ® 2000-based office network has three domains: ALPHA, BETA, and OMEGA, all in the same Active Directory tree. Required result: You must provide access to some users with accounts in the ALPHA domain to some resources in the OMEGA domain, but users in the OMEGA domain should not have access to resources in the ALPHA domain. Optional result: If possible, changes to the ALPHA users’ accounts should be reflected in the accounts they use to access OMEGA resources. Proposed solution: Add the ALPHA users to a global group in ALPHA, and add that group to a local OMEGA group that has permissions to the required resources. Based on your goals and your actions, determine which of the following statements is true and explain: You accomplished both your required result and your optional result. You accomplished your required result, but not your optional result. Post your assignment as a Microsoft ® Word attachment. Day 7 100 Week Seven, April 14, 2014: Network Security Details Due Points Objectives 7 7. 1 Provide examples of threats, vulnerabilities, and exploits to networks and how they relate to each other. 7. 2 Explain the importance of maintaining security on a LAN. Reading Read the â€Å"Backup and Fault Tolerance† section through the end of the chapter in Ch. 9, â€Å"Server Management and Administration,† of Guide to Networking Essentials. Reading Read section 5. 5 in Ch. 5, â€Å"TCP/IP and OSI,† of Business Data Communications. Reading Read Ch. 18, â€Å"Computer and Network Security Threats,† of Business Data Communications. Participation Participate in class discussion. All Week 10 Discussion Questions Respond to weekly discussion questions. DQ1 – Day 2 DQ2 – Day 4 10 Week Eight, April 21, 2014: Network Maintenance: Prevention and Recovery Details Due Points Objectives 8 8. 1 Categorize and describe the components of various types of computer viruses 8. 2 Discuss the relevance of system backup for data protection. 8. 3 Explain the RAID system of data protection. 8. 4 Create a disaster plan for the purpose of network preservation CheckPoint Threat Categorization Define each of the following terms in your own words: Boot sector File virus Multipartite virus Macro virus Trojan horse E-mail worms Instant messaging worms IRC worms File-sharing networks worms Internet worms Explain how each virus or worm functions and spreads. Determine in which category the threat you researched in Week Seven belongs. Your response must be between 200 and 300 words. Day 5 30 Individual Disaster Plan Read the company descriptions in Appendix G and select one. Create a disaster plan for your selected organization that includes how you would recommend the company back up and protect its network data. Your plan must be 1,250 to 1,500 words in length, and your recommendations must be based on the RAID system of data protection. Your plan must also address how the company should protect against natural disasters that might occur in the company’s geographic location. Include any charts, graphs, or visual components that are helpful in illustrating your plan. Format your plan consistent with APA guidelines. Post your plan as a Microsoft ® Word attachment. Day 7 100 Week Nine, April 28, 2014: Network Performance Details Due Points Objectives 9 9. 1 Develop a plan for a local area network. Participation Participate in class discussion. All Week 10 Capstone Discussion Question Respond to the capstone discussion question. Considering what you have learned throughout this course, would you feel comfortable setting up a local area network? Why or why not? Day 3 10 Final Project LAN Consulting Plan Read Appendix A. Develop a plan to set up a local area network based on the scenario presented in Appendix A. Create a 10- to 12-slide, boardroom-quality Microsoft ® PowerPoint ® presentation detailing your plan. Post your presentation as a Microsoft ® PowerPoint ® attachment. Day 7 260 Optional Discussion Questions Week One Discussion Questions Explain what kind of network you are on at work or home. If you do not have access to a network, ask a friend or family member to explain the type of network he or she has access to. What benefits does the network provide to its users? How does it help increase productivity? Read one of your classmates’ network descriptions. Respond to his or her post and identify whether the network he or she described is a client/server network or a peer-to-peer network, and whether it is a LAN, MAN, or WAN. Ask questions if you find that additional information is needed to determine the network’s characteristics. Which four terms relate to networking? Define them in your own words. Week Three Discussion Questions What are the various types of Internet connectivity available today? How do they differ? Explain your answers. Compare fat client and thin client concepts. What are the pros and cons of each? Provide examples to support your answers. Week Five Discussion Questions What is DNS? How do users benefit from it? Provide a brief description of the DNS process to resolve a URL to its IP address. SNMP is a protocol for network management. What are the basic components of SNMP? What are the benefits of the functions provided by SNMP? SNMP uses the UDP protocol for transport. Why was UDP chosen over TCP? Week Seven Discussion Questions What are some current computer threats? Describe the nature of the threat and the potential repercussions it could have for a network. The following are some suggested sites to begin your search: http://www. mcafee. com/us/ http://www. microsoft. com http://www. cnet. com What roles do firewalls and proxy servers play in network security? What is the importance of maintaining security on a LAN? Provide examples to support your answer. Copyright University of Phoenix ® is a registered trademark of Apollo Group, Inc. in the United States and/or other countries. Microsoft ®, Windows ®, and Windows NT ® are registered trademarks of Microsoft Corporation in the United States and/or other countries. All other company and product names are trademarks or registered trademarks of their respective companies. Use of these marks is not intended to imply endorsement, sponsorship, or affiliation. Edited in accordance with University of Phoenix ® editorial standards and practices.

Friday, November 29, 2019

The Legend of Romulus and Remus Essay Example

The Legend of Romulus and Remus Paper Romulus and Remus were twin brothers. Their father was Mars, the God of War; their mother was Rhea Silvia, a vestal virgin and daughter of the King, Numitor. Numitors brother, Amulius, had taken the throne from him and had forced Rhea Silvia to become a vestal virgin so that she would not have any children who might try to take back the throne. When the boys were born, Amulius seized them, put them into a basket and threw them into the river Tiber. He hoped that they would drown. However, the boys were rescued by a she-wolf who fed the babies with her own milk and cared for them. A shepherd called Faustulus saw the wolf with the baby boys. He took them home to his wife. They called the boys Romulus and Remus. When they grew up the boys became shepherds like Faustulus. One day they had a fight with another group of shepherds. Remus was arrested and sent to Numitor as a prisoner. When Numitor heard the story he realised that Remus was his grandson! He told Romulus and Remus what had happened to him and their mother. For revenge, Romulus and Remus attacked their Uncle Amulius and killed him. After that, Romulus and Remus went to live with their grandfather in Alba Longa, but they got bored and missed the countryside where they grew up. We will write a custom essay sample on The Legend of Romulus and Remus specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on The Legend of Romulus and Remus specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on The Legend of Romulus and Remus specifically for you FOR ONLY $16.38 $13.9/page Hire Writer They decided to move back to River Tiber where Faustulus had found them and build their own city but the twins argued over where the city should be built. Romulus wanted to build it on the Palatine Hill and Remus wanted to build it on the Capitoline Hill. In the end they built two cities. Unfortunately, the arguing did not stop. They kept teasing each other about their cities. Remus teased his brother about the height of his city walls, saying they were too low. In the end the two cities went to war and Romulus won. Romulus became king of his new city which was called Rome in his honour.

Monday, November 25, 2019

Roberts v. Texaco †Management Research Paper

Roberts v. Texaco – Management Research Paper Free Online Research Papers Roberts v. Texaco Management Research Paper The case of Roberts v. Texaco covers many of the items we have gone over in class. It talks about the EEOC, mediation, racial discrimination, Tittle VII and settlements. A suit was filed on March 23, 1994 by Bari-Ellen Roberts and four other African-American Texaco employees on behalf of more than 1400 Texaco employees. Roberts worked for Texaco as their Senior Financial Analyst from 1990 to 1997. The basis of their suit was that Texaco had been practicing hiring and promotion practices based off race and not qualifications. At the time of the suit, there were 873 executive that were earning more than $106 thousand dollars a year and only six were African-American. Ms. Roberts was called uppity and a smart-mouth little colored girl. For three years the case worked its way throught the judicial system until it finally made a breakthrough. On November 3, 1996, the New York Times reported that they had evidence of several upper level employees at Texaco being recorded on audio tape using repeated racial slurs and using demeaning terms to describe African-Americans. They had also been told that this evidence was ordered to be destroyed by Texaco. Immediately the EEOC launched a probe to determine what pieces of evidence the company had that would corroborate the claim. While Texaco had settled in for the long haul in this legal battle, it came to a quick conclusion. After the tapes were uncovered, Texaco started looking to settle the case as quick as possible. The public relations issues that would arise the longer the case drew out could seriously hurt the company more than was already done. Within one month on November 17, 1996, the EEOC and the plaintiffs announced that an agreement had been made for a $176.1 million dollar class-action settlement. The suit was declared moot on January 27, 1997. The settlement included the following: Provide a payment to the plaintiff-class in the amount of $115 million, along with a one-time salary increase of about 11 percent for current employees of the plaintiff-class, effective January 1, 1997; Create an Equality and Tolerance Task Force which will be charged with determining potential improvements to Texaco’s human resources programs, as well as helping to monitor the progress being made in those programs (three members of the Task Force to be appointed by the plaintiffs, three members by Texaco and a mutually agreed-upon chairperson); Adopt and implement company-wide diversity and sensitivity, mentoring, and ombuds programs; Consider nationwide job posting of more senior positions than are currently posted; and Monitor its performance on the programs and initiatives provided for under the settlement agreement. A study that was conducted showed that the suit will end up costing Texaco about $500 million dollars. The statute that was relevant was Title VII of the Civil Rights Act of 1964. The point of contention was discrimination because of race. This discrimination was shown in the form of hiring practices that didn’t accurately represent the community as well as promotions that were biased. The interesting thing about this case is that the EEOC didn’t get involved until there were allegations made by a major publisher and they knew what to look for; three ninety minute audio tapes. Once this came out, the EEOC filed their claim on behalf of the plaintiffs. These audio tapes were very explicit in the terms they used to describe the executives feelings toward minorities. Texaco hired a retired U.S. Attorney to investigate the tapes to find out how damaging they were before they agreed to a settlement. The attorneys investigation is extremely interesting to read as he tries to spin certain parts of the tapes as non damaging. At one point in the tapes, an executives ref ers to black jellybeans and how they always end up at the bottom of the bag. The attorney advises that this comment was not racially motivated but none of the conversation prior was about candy. No matter the spin, he couldn’t avoid the language used and discriminatory remarks. After seeing his report was when Texaco decided to settle, knowing that the evidence was much too damaging for their company to overcome in a lawsuit. The employment environment since this case has been drastically changed at Texaco. The task force that was put in place as part of the settlement had authority for five years to determine the policies that needed to be put in place to meet the objectives of the agreement. This task force met for two days a week and was composed of seven people; three appointed by Texaco, three appointed by the plaintiffs, and one independent who served as a chairperson. Even though the settlement was agreed to, this task force seemed to use mediation to arrive at policies both sides could live with. I think this made for a much less hostile environment when putting the policies in effect. The task force’s goals were set high. Within the first six months, Texaco was charged with implementing a diversity and training program for the entire company as well as a mentoring program. They also had to begin posting jobs at a certain paygrade or above nationally. An extremely important objective that they had to meet during this time was to develop a way for there to be no fear of retaliation for employees with complaints of discrimination. This is similar to the whistleblower statutes that we studied. A policy such as this would keep the employer from commiting unlawfull acts such as discrimination while keeping employees from feeling like they might lose their job if they took an injustice to the authorities. The fallout from the case included the firing of one executive, suspension of another, and two executives that had retirement benefits taken away. This case clearly shows the power and importance of Tittle VII of the Civil Rights Act of 1964. It also demonstrates the effect of good mediation as well as what happens when the EEOC gets involved in a case. References Pruitt, Stephen W., The Texaco racial discrimination case and shareholder wealth. (2002) Retrieved from InfoTrac on August 7, 2005. Exhibit 1, Pragmmatic Relief. Retrieved from CourtTV.com on August 7, 2005. Texaco fires executive, Disciplines three others. January 9, 1997, Los Angeles Times. Research Papers on Roberts v. Texaco - Management Research PaperAnalysis of Ebay Expanding into Asia19 Century Society: A Deeply Divided EraMind TravelHip-Hop is ArtCapital PunishmentEffects of Television Violence on ChildrenMarketing of Lifeboy Soap A Unilever ProductTwilight of the UAWDefinition of Export QuotasThe Project Managment Office System

Friday, November 22, 2019

Citing particular examples, discuss how far pop music can be Essay

Citing particular examples, discuss how far pop music can be considered textual poachers (Henry jerkins) - Essay Example Apparently, a topic that attempts to capture the dynamics of any culture within the context of social icons and the mentality of their followers, could not adequately incorporate and interact with the controversies thereon as textual poachers does with pop music. Originally, Henry Jerkins did a lot of studies surrounding television entertainment with shows and movie series as the centre of interest for many fans. The provocative interaction that the television fan base makes with the ideal universe created by the shows that they faithfully follow blind them such that they fail to conceptualize the idealism involved in the productions. The author states that this creates a culture that tries to fit in the idealism provoked by the entertainment culture (Jenkins, 1992, p277). In a similar manner, the pop music industry can be assessed for a possibility of a similar idealism generated within the music setting and consequential spilling over to the real life of the fans to the extent that they â€Å"live† the idealism. In an attempt to explain the role of fans in the generation of new idealistic cultures, Jenkins (1992, p23) reports that fans find it fashionable and defensive to relate to a certain mass following of an entertainment platform. Further in the description of the behaviour of the fan group, the author reports that the identity and associating with the common following accords the group a manipulative force that enables it to form a culture. Producers of the original text from which the apparent poaching happens voice their displeasure by referring to the fans as cultural dupes or even senseless customers of the literary piece. Works of art that are presented to the audience commonly through the media are initially meant to be just entertainment content; but the audience blow off the balance between the text intention and imaginations not intended by the producer. There is an eventual loss of the art intention

Wednesday, November 20, 2019

Animal Human Cultures Essay Example | Topics and Well Written Essays - 2000 words

Animal Human Cultures - Essay Example The proponent tries to elaborate this by pointing that humans could actually take advantage of whatever benefits they could substantially exploit from their pets. Keywords: pet keeping, animal companionship, pet, animals â€Å"The keeping of animal companions in the contemporary West is undoubtedly an exercise of domination. Despite this, different kinds of relations are possible† (Cudworth, 144). Discuss. Introduction The keeping of animal companion is a form of domination because humans are superior to any other life forms on earth with respect to different aspects. There is a significant gap, or indifference between humans and animals as agreed by Le Guin (1986). When it comes to intelligence, humans are capable of doing substantial number of great things compared to its other animal counterparts. Cudworth (2011) strongly emphasises this point by mentioning how humans could be capable of altering different breeds of pets. For instance, substantial breeds of pets are remarka ble at present. Based on the idea of Franklin (1999), the reason why this could be so it is because having companionship with pets would bring some substantial benefits for humans. In other words, genetic modifications which led to animals to become diversified in their breeds points to the fact that they are not humans in the first place. In other words, humans can take control over them and there could also be many things that they can possibly do with them. Cudworth emphasises that pets are loved because they are not humans in the first place. However, the definition of this love might be a bit problematic because this argument simply has remarkable implications in proving some important relationships existing between humans and animals. Furthermore, this argument proves that affection and love may not be synonymous after all as there must considerations of different contexts in this issue. However, it is obvious that there must be substantial form of relationships existing betwe en humans and animals in the issue of animal companionship. The proponent tries to elaborate this point clearly as possible by applying the arguments of Franklin and Cudworth in line with the issue of animal companionships. Background issue The domestication of animals provides many important things. In fact, this is the point in which humans can maximise everything out of domesticating or taking control over animals. For Cudworth this could involve having affection with them despite the very presence of domination. However, Franklin tries to include the point in which this specific affection addresses ontological insecurity. This ontological insecurity comes after the loss of paternal welfare due to market individualism in 1960s (Franklin, 1999). The keeping of animal companions boils down to the fact that humans could take care of their pets with them due to some elemental reasons. So it could be that the domestication itself is a way to orchestrate better interaction between huma ns and animals for the benefit of the former. It is true that the keeping of animals in the contemporary West is a form of domination but according to Cudworth (2011), there is affection involved in it. It is important to consider in great detail what this affection particularly means. As for the argument of Franklin, there could be essential relationship that exists in keeping animals as companions. However, his entire argument includes the major points about the benefits

Monday, November 18, 2019

Relationship between Film Form and Meaning Essay

Relationship between Film Form and Meaning - Essay Example The meaning of a film lies in the interpretation that  film  evokes as well as the magnitude of the nature of these interpretations, which can be derived from the  underlying  photographic effects that the film portrays. In most incidences, the  meaning  of films has  frequently  stirred a lot of concerns. Sometimes, some films tend to have an  obvious  meaning owing to their instant accessibility to a wide audience without any difficulty. On the contrary, some films have deeper meanings that are not easy to understand, and  are intended  for a special  group  of  enlightened  audience. Maya (1999) present that the most  crucial  issue in  film  depends on how the films  are meant  to be understood plus the  procedure  by which they  are understood. This issue is often  important  for  film  makers especially when they are intending to  introduce  an  unusual  element  in their product without  being noticed  by the viewers. ... mages in a film may be, if the form of the film does not  stretch  beyond the conventional approach, a film’s  meaning  cannot be easily understood. The form of a film  is usually interceded  through the use of various formal elements, which the film makers  employ  in order to  stimulate  a  certain  effect in the audiences. For instance, in a typical Hollywood  film, film makers tend to combine certain scenes in their films with flashbacks or even at times crosscutting the scenes so as to provide additional information. This way, an audience may be able to predict what  might possibly  happen. Therefore, this shows just how the  form  of a film can  influence  the  meaning  or understanding of a film. Similarly, to  enhance  the  form  of a film, the actions of a film can be shot from different angles thereby providing the viewers with  various  points of view.  Most films  are usually made  of  numerous  shots of different lengths, which  are edited  to  create  the rhythm and  meaning  of a particular scene. One the same  note  the  form  also helps to  distinguish  a  film  from  simple  random footage by incorporating certain stylistic elements such as narratives, sound, which  create  a given  logical  pattern  in a film. In turn, this logical pattern poses a significant impact on the audiences’ feelings,  expectation  as well as their perceived  meaning  of the film. Quite often, Maya (1999)  presents  that it is the  nature  of a film that  normally  leads the audience to have certain expectations that are likely to  follow.  This in turn breeds curiosity, which has quite often been described as the ultimate reason as to why people find themselves immersed and drawn into a film after a few minutes.  This  is sometimes bound  to  occur  even if

Saturday, November 16, 2019

Medical Card System Data Warehouse

Medical Card System Data Warehouse Muhammad Nadeem   S.No Title P.No 1 Introduction (What project is about) 3-4 2 System Overview, Data architecture and storage, 5-6 3 ER-Diagram, OLTP-Architecture,Master / Slave Medical Card System 6-10 4 MCS OLTP, MCS data, storage,MCS Business Module or Services process: 11-14 5 Request Flow, Data repository, MySQL 15-19 6 Data warehousing 19-27 7 Service improvement 28 8 Statistical Analysis 29-30 9 Summary, conclusion, Learned 31-35 10 Appendix 36 Introduction: A Medical Card is a plastic card, about the span of a Visa, issued by the HSE. Individuals who hold a Medical Card are qualified for a scope of Health Services for nothing out of pocket. Sometime recently, 2009. Therapeutic card framework was a decentralized and comprising littler wellbeing sheets. Since, they are isolated to each others, It was making taking after oddities. Duplicate Medical cards. GHOST Medical cards System deficiency Increasing Complexity Budget deficit in health budget Lack of staffing and System expertise To determine these issues the HSE, choose to incorporated Medical card framework. They gather master from every wellbeing board and accumulate in Dublin. On framework level, it was a major perplexity mass before centralization. The reason was every wellbeing board has their own medicinal card framework on a few innovations like prophet, SQL server and so forth. A Single Medical card framework was running on ORACLE, SQL, MYSQL and MUMS thus on rely on upon the decision of wellbeing board. There were loads of reports and Hauge paper works was included and it was night horse to handle it. To, determine this issue The HSE made a system to gap information into three databases, for example, ORACLE, MongoDB. Each of the database has there on noteworthiness. The HSE additionally choose to making and dealing with their own information distribution center. There was an alternative accessible for cloud benefits but since of the way of information. The HSE fabricate their own information product house. The HSE utilized Mongo DB since it is a record situated database and what it does, it is intended for even versatility. Because this, if your database develops, you can basically include more equipment or more assets from the cloud. 2.1 MCS System Overview: The Medical card system data were divided into following: The data from new medical card forms was divided in 3 parts. First data was Manual filled application which was later typed in the system. The data come from Legacy system and loaded into new system. That sort of data required big ETL. Third was supporting documents. The size of data was 2 tetra bytes per month 2.2 MCS Data Storage: The data was storing in following technologies: MongoDB Neo4j ORACLE MYSQL hybrid system (HyPer) MongoDB MySQL Oracle Neo4j Document-oriented Cross-platform support Reliable database OLTP Supports JSON format. Stored procedures Advanced Index Compression JSON and XLS format No DBA SQL/PSM Approximate Count Distinct Indexes by using Apache Lucence Flexible replication for shading across nodes. Triggers. Attribute Clustering supports full ACID Multi-version concurrency Cursors Automatic Big Table Caching UI for CQL consistency in complex transactions Updatable views FDA Support for CDBs Native GPE(Graph Processing Engine). Dynamic queries and powerful aggregates. Online DDL Full Database Caching (CRUD) operation Index support and ap/reduce functions Information schema In-Memory Aggregation Access by Java, Spring, Scala 3.1 MCS Database Architecture 3.2 MCS OLTP Architecture   Ã‚   Master / Slave Medical Card System One index per city Growth by shredding into 2 and 3 Master build index every 10 minutes Use indexes and pearl code for to generate XML Build versioning and rollback segment Slave pull the indexes via resync and reload Use pre-forking config Hardware was dual proc, dual core AMD opterons with 32 GB RAM 3.3 MCS OLTP: Medical card OLTP systems are used for order new application, Medical card transactions, customer relationship management (CRM) etc. Such systems have many users who conduct short transactions. Database queries are usually simple, require sub-second response times and return relatively few records. An important attribute of medical card OLTP system is its ability to maintain concurrency. To avoid single points of failure, MCS OLTP systems is decentralized. MCS data-model-self-governing and planned to professionally handle accidental, ad hoc queries in an analytical system environment. We are using Mango DB, Neo4j, Oracle, MySQL along with legacy System like MUMS. The Size of the data per week is 1 tetra byte. We have Online replication. HSE have hot backup and full disaster recovery model implemented. HSE have one cold server run in Waterford region which they used as cold backup. HSE policy to store data in multi places so in case of disaster recovery will be easy. 3.4 MCS Data: It consists on the following: Client personnel and Medical History such as Client name, address, ppsno and GP information GP registered within certain county Hospital information such as OPD, ANE etc. CWO in each area Pharmacies and registered Pharmacies HSE Local offices 3.5 MCS Data storage: MCS data store on different devices and system as following: Quantum StorNext scale-out file system. NetBackup product. NetBackup is integrated with copy data management, Veritas Resiliency Platform and Veritas Information Map. MySQL MangoDB Neo4j Oracle 4.1 MCS Business Module or Services process: FOR NEW APPLICATION FOR RENEWAL APPLICATION 4.2 MCS Request Flow 4.3 MCS Flow 4.4 MCS Data Repositories 4.5 MCS My SQL 5.1 MCS Data Warehousing: Relationships between DSS/BI, database, data management DSS/BI: transforming data into info to support decision making MCS (Medical Card System) operational data and DSS/BI data differ What a data MCS (Medical Card System) warehouse is, how data for it are prepared, and how it is implemented Multidimensional database Database technology for BI: OLAP, OLTP Examples of applications in healthcare 5.2 MCS BI: Extraction of Knowledge from Data 5.3 MCS DSS/BI Architecture: Learning and Predicting 5.4 MCS DSS/BI DSS/BI are technologies designed to extract information from data and to use such information as a basis for decision making Decision support system (DSS) Arrangement of computerized tools used to assist managerial decision making within business Usually requires extensive data massaging to produce information Used at all levels within organization Often tailored to focus on specific business areas Provides ad hoc query tools to retrieve data and to display data in different formats 5.5 MCS DSS/BI Components Data store component Basically, a DSS database Data extraction and data filtering component Used to extract and validate data taken from operational database and external data sources End-user query tool Used to create queries that access database End-user presentation tool Used to organize and present data 5.6 MCS Main Components of A DSS/BI 5.7 MCS DSS/BI: Needs a different type of database A specialized DBMS tailored to provide fast answers to complex queries. Database schema Must support complex data representations Must contain aggregated and summarized data Queries must be able to extract multidimensional time slices Database size: DBMS must support very large databases (VLDBs), Wal-Mart data warehouses is measured in petabyte (1,000 terabyte) Technology: Data warehouse and OLAP emphasize speed, security, flexibility, reduce redundancy and abnormalities. 5.8 MCS Operational vs DSS Data 6.1 MCS Data Warehouse The Data Warehouse is an integrated, subject-oriented, time-variant, non-volatile database that provides support for decision making. Usually a read-only database optimized for data analysis and query processing centralized, consolidated database periodically updated, never removed Requires time, money, and considerable managerial effort to create 6.2 MCS OLAP (Online Analytical Processing) Advanced data analysis environment that supports decision making, business modeling, and operations research engine or platform for DSS or Data Warehouse OLAP systems share four main characteristics: Use multidimensional data analysis techniques Provide advanced database support Provide easy-to-use end-user interfaces Support client/server architecture 6.3 MCS OLAP vs OLTP: Online Transactional Processing (OLTP) emphasize speed, security, flexibility, reduce redundancy and abnormalities. Online Analytical Processing (OLAP) multi-dimensional data analysis advanced database support easy-to-use user interface support client/server architecture 6.4 MCS Multidimensional Data Analysis Goal: analyze data from different dimensions and different levels of aggregation 6.7 MCS Multidimensional Data Analysis Techniques Data are processed and viewed as part of a multidimensional structure Particularly attractive to business decision makers Augmented by following functions: Advanced data presentation functions Advanced data aggregation, consolidation and classification functions Advanced computational functions Advanced data modeling functions 6.8 MCS integration OLAP with Spreadsheet 6.9 MCS easy-to-Use End-User Interface Many of interface features are borrowed from previous generations of data analysis tools that are already familiar to end users Makes OLAP easily accepted and readily used 6.10 MCS Client/Server Architecture Provides framework within which new systems can be designed, developed, and implemented Enables OLAP system to be divided into several components that define its architecture OLAP is designed to meet ease-of-use as well as system flexibility requirements 6.11 MCS OLAP Architecture Designed to use both operational and data warehouse data Defined as an advanced data analysis environment that supports decision making, business modeling, and an operations research activities In most implementations, data warehouse and OLAP are interrelated and complementary environments 6.12 MCS Facts Numeric measurements (values) that represent specific business aspect or activity Normally stored in fact table that is center of star schema Fact table contains facts that are linked through their dimensions Metrics are facts computed or derived at run time 6.13 MCS Dimensions: simple star schema 6.14 MCS Attribute Hierarchies in multidimensional analysis 6.15 MCS Star Schema Representation 6.17 MCS Multi-dimensional database 6.18 MCS Star Schema 6.19 Snowflake schema 7.1 Service improvement MCS Outcome Database Center for Medical Service More than fifty community health centers contributed to this database. 547,719 transactions 13 Outcome indicators, 72,541 episodes of treatment, 17,205 patients, 108 therapists, 48 institution 8.1 Statistical Analysis MCS Difference in Clinical Services Improvement: Young and Old patients 8.2 Compare Cancer Incidence of Dublin County to Carlow County from 1996-2000 9.1 Conclusion: A Medical Card is a plastic card, about the size of a credit card, issued by the HSE. People who hold a Medical Card are entitled to a range of Health Services free of charge. In this project, we have seen a change of centralized medical card system with the help of NOSQL and RDBMS changed the service outcome. HSE have Mongo DB which make it suitable for this kind of project is it is Schema-less. A document can have any number of key/value pairs. Instead of using a schema, documents of the same time (for example, documents representing blog posts) all have a similar set of key/value pairs. Second, a database which HSE have here is Neo4j graph database. The reason why they have used Neo4j because it provides OLTP and supports Jason and XLS format. Another reason to use Neo4j is it is Create, Read, Update and Delete (CRUD) operations working on a graph data model. MCS data-model-self-governing and planned to professionally handle accidental, ad hoc queries in an analytical system environment. We are using Mango DB, Neo4j, Oracle, MySQL along with legacy System like MUMS. The Size of the data per week is 1 tetra byte. We have Online replication. HSE have hot backup and full disaster recovery model implemented. HSE have one cold server run in Waterford region which they used as cold backup. HSE policy to store data in multi places so in case of disaster recovery will be easy. The MCS Data Warehouse is an integrated, subject-oriented, time-variant, non-volatile database that provides support for decision making. Usually a read-only database optimized for data analysis and query processing. centralized, consolidated database, periodically updated, never removed. It is Requires time, money, and considerable managerial effort to create. Relationships between DSS/BI was studied in detail along with, database, data management. We have explored the DSS/BI: transforming data into info to support decision making. The MCS (Medical Card System) operational data and DSS/BI data differ from which we have used to test the system. We have explored what data MCS (Medical Card System) warehouse is, how data for it are prepared, and how it is implemented Multidimensional database. The Database technology for BI: OLAP, OLTP. Examples of applications in healthcare. During this project, we were Combining Data Warehouse (OLAP) and GIS.OLAP: handles large data, fast retrieval multidimensional, multilevel aggregation, analyses/data mining on huge complex databases. IS: visualization and spatial analyses. Visualization and Analysis: Charts and Maps + Statistical Analysis. The outcome we have from the MCS Database is we have center for Medical Service More than fifty community health centers contributed to this database. The transaction span to 547,719 transactions. WE have 13 Outcome indicators, 72,541 episodes of treatment, 17,205 patients, 108 therapists, 48 institutions. 9.2 Learned: During completing this project, I have learned following: NOSQL MongoDB, Neo4j Installation and deployment OLTP in detail I have studied Data Warehouse comprehensively I have Learned about Data Analysis such as Statistical Analysis NoSQL and SQL have both their significance depend on what you want to do. It was a great learning curve and extend my horizon about technology There is a lot to learn the especially field in IT things a rapidly changing. RDBMS are good to work but they will not answer for all your IT needs. MongoDB and Neo4j are emerging technologies and best fit for the system like the medical card. During, my lab I have come across the term like horizontal scalability It is the capability of a system, network, or process to cover a rising sum of work, or it is potential to be magnified in rank to accommodate that increase. For object lesson, it can refer to the capability of a system to increase its total output under an increased load when resources (typically hardware) are added. Another, an inserting term I have discovered is a document database. Although it was covered in a lecture but not so clear. Hereafter working and installing it make quite a sense. 9.3 Problems/Issues For MongoDB, it is hard to work on command prompt Download inteleJ IDEA and configured and that will make the job easier. Available online: https://www.jetbrains.com/idea/download/#section=windows I have tried to install Oracle NOSQL and there were no windows version All process required extra expertise in Linux and Unix and one point I gave up Installing/configuring process in case of MongoDB and Neo4j is very simple and straight forward. Neo4j is quite straight forward to install and work. Once installed the Neo4j you need to look around how to run Neo4j. it is almost hard to run Neo4j on http://127.0.0.1 instead if you run it on http://localhost:7474/browser/ on your browser window. Command structure not so great, as long your system gets complex, the query process of Neo4j is getting complex as well. IT required previous Knowledge of Jason. If there is a problem in query design, Neo4j prompt for the mistake, but if you have query structure problem or logical error there is no error message. Like all technology, you need to memories a lot. There is no toll-like workbench for help. If you have previously worked with RDBMS like oracle or MySQL it will take a while to get a hand on Neo4j. 10.1 Appendix: http://www2.seas.gwu.edu/~bell/csci243/lectures/data_warehousing.pdf http://www.hse.ie/eng/services/list/1/schemes/mc/ http://www.hse.ie/eng/ http://www.businessdictionary.com/definition/data-analysis.html https://www.linkedin.com/pulse/20140728161327-51272350-what-is-collection-in-nosql-databases-specifically-in-mongodb https://Neo4j .com/why-graph-databases/ http://www.w3resource.com/mongodb/nosql.php http://www.tutorialspoint.com/Neo4j /Neo4j _features_advantages.htm http://www.itbusinessedge.com/slideshows/top-five-nosql-databases-and-when-to-use-them.html https://www.youtube.com/watch?v=1uFY60CESlMlist=PL6gx4Cwl9DGDQ5DrbIl20Zu9hx1IjeVhO https://www.youtube.com/watch?v=eE6G5BX8GG0list=PL1zjgLKnHOtga1W4cdyjxRbliw4-n84hR http://dist.Neo4j .org/Neo4j -manual-1.4.M03.pdf https://www.youtube.com/watch?v=eE6G5BX8GG0list=PL1zjgLKnHOtga1W4cdyjxRbliw4-n84hR

Wednesday, November 13, 2019

The Use of Symbols in Adrienne Richs Poem, Aunt Jennifers Tigers Essa

The Use of Symbols in Adrienne Rich's Poem, Aunt Jennifer's Tigers Freedom has always been an important value in the United States that most people are not willing to give up. Ralph Waldo Emerson, a writer who lived in the 1800s, reminded Americans of their rights of liberty at a time when many people started to conform to established norms. He voiced his opinions about the loss of freedom and invited society to realize that they were relinquishing their rights. Years later, his views still had an impact on citizens. Adrienne Rich, a poet of the mid-1900s, also found her autonomy a necessity in life. She wrote a poem in 1951 called "Aunt Jennifer's Tigers," which exhibited her opinions about living a life of reliance on others. The poem illustrates a woman sewing a scene of tigers roaming through a field, whose hands are weighed down by the heavy wedding band that she wears. Rich uses the symbols of the ring and the tigers to convey her belief in Emerson's ideas of self-reliance. An Emerson-influenced world would be one without interdependence, as his principles of self-reliance would be employed. In the 1800s, the American "government and literary movement . . . were calling for conformity" (Loving). During this time, Ralph Waldo Emerson decided to express his disagreement with the movement by publishing "Self Reliance" in 1841, which explained his ideas of the importance of personal independence. He states, "Nothing can bring you peace but yourself," illustrating his negative view of relying on others (Loving). His audience, the Americans, grew to agree with his individualistic concepts, leading focus from conformity in society. Throughout her life, Rich's experiences led her to wish for more independence. In her marr... ...ctly what Rich discovered through her experiences, primarily from her marriage. The freedom of each person to live as they wish to live is a common value between the two writers. Rich uses the two different symbols in order to express her negative feelings about dependence. By showing her dislike toward the control that one may have over another, she implies her agreement with Emerson's established principles of self-sufficiency. Works Cited Litlinks. www.smpcollege.com/litlinks/poetry/rich.htm. Bedford/St.Martin's. March 28, 2000. Loving, Tim. "What If Aunt Jennifer Had Listened?: Responding With Consequence". www.cwrl.utexas.edu/~nick/evans/firstpapers/tlovingpaper.html. March 28, 2000. Rich, Adrienne. "Aunt Jennifer's Tigers". Discovering Literature Stories, Poems, Plays. 2nd ed. Hans P. Guth and Gabriele L. Rico. Upper Saddle River: Blair. 1997. 590

Monday, November 11, 2019

Determination Of Vitamin C Content Of Tablet Essay

ABSTRACT In this experiment, the vitamin C content of a commercial tablet is determined and compared with the manufacturers’ specification. Vitamin C is water-soluble and is an enantiomer of ascorbic acid. (Commercial vitamin C is often a mixture of ascorbic acid and other ascorbates.) Ascorbic acid, C6H8O6, is a reducing agent that reacts rapidly with iodine (I2). As the iodine is added during the titration, the ascorbic acid is oxidized to dehydroascorbic acid, while the iodine is reduced to iodide ions as shown in the following equation. Ascorbic acid + I2 (aq) ———–> 2I- (aq) + dehydroascorbic acid Due to this reaction, the iodine formed is immediately reduced to iodide as long as there is any ascorbic acid present. The amount of ascorbic acid is determined by the stoichiometry of the equations and the difference between the total amount of iodine present and the amount that reacts with the thiosulphate. This method is suitable for use with vitamin C tablets, fresh or packaged fruit juices and solid fruits and vegetables. INTRODUCTION Vitamins are a group of small molecular compounds that are essential nutrients in many multi-cellular organisms, and humans in particular. L-Ascorbic acid was first isolated as a pure substance by Albert Azent-Gyorgi and Charles Kingin 1928 (Pauling, 1970), an anti-oxidant and free radical scavenger, is found ubiquitously in fruit and vegetables such as citrus fruits (oranges, lemons, limes, tangerines etc.), melons, tomatoes, peppers, broccoli, green leafy vegetables such as spinach, potatoes and turnips, its quantitative determination is especially important in the production of wine, beer, milk, soft drinks and fruit juices, where it can be a quality indicator (Gerrior & Zizza, 1994)] .Given the essential role played in the human diet and necessary to growth and repair of tissues in all parts of human body .It is necessary to form collagen an important skin proteins ,scar tissue ,tendons, ligaments, and blood vessels. Vitamin C  is essential for the healing of wounds, and for th e repair and maintenance of cartilage, bones and teeth (Mcevoy, 1993) one of the several ways of determining the ascorbic acid content of a solution is by titration. Figure structure of vitamin c (ascorbic acid) Titration is a volumetric analysis and is one of the basic analytical techniques in chemistry which enables one to quantitatively determine how much of a specific substance is contained in a given sample. This technique is involved in almost every aspects of our daily living such as life sciences, clinical chemistry, water pollution, industrial analyses etc. In order to make meaningful titration analysis, one has to understand and learn the principles involved. Several types of titration techniques are now available but, two general types which are still in much use are acid-base and reduction-oxidation (Redox). Acid-base titration involves the neutralization reaction and the products are generally salt and water. Redox titrations involve the titration of an oxidizing agent (or oxidant) with a reducing agent (or reductant) or vice versa. Oxidation process involves loss of electrons while reduction process involves gain of electrons. Thus an oxidizing agent is one which accepts electr ons while a reducing agent is one which loses the electrons. There must be a sufficiently large difference between the oxidizing and reducing capabilities of these agents for the reaction to undergo completion with a sharp end point. MATERIALS AND METHOD 250-mL conical flask Vitamin C tablets 400-mL beaker KBrO2 solution 50-mL, 25ml and 10ml measuring cylinder 10% KI solution 50-mL burette with stand 2.0 M H2SO4 solution Glass stirring rod Starch indicator Analytical balance A. STANDARDIZATION OF SODIUM THIOSULPHATE 1. A standard titration setup was framed up using a stand, a burette clamp and a white tile Figure 2 setup for titration (Courtesy of http://www.chemteach.ac.nz) 2. A burette was rinsed with distilled water and then with the given sodium thiosulphate solution. 3. With the stopcock closed, the rinsed burette was fully filled up with the sodium thiosulphate solution and then the stopcock was opened so that the tip of the burette was also allowed to be filled up. The initial burette volume was recorded to an accuracy of 2 decimal places 4. A 25.00cm3 pipette was rinsed with distilled water, and then with KBrO3 solution. 5. 25.00cm3 of standard solution of KBrO3 was transferred to a clean conical flask using the rinsed pipette. 6. Using a 25cm3 measuring cylinder, 25ml of 2M H2SO4 was transferred into the conical flask containing the KBrO3 solution. 7. Using a 10ml measuring cylinder, 5ml of 10% KI solution was also added to the conical flask containing the KBrO3 solution. 8. Immediately, the reaction mixture in the conical flask was titrated with the sodium thiosulphate solution until a pale yellow solution was observed. 9. A few drops of starch solution were added to the pale yellow solution in the conical flask. 10. Titration of the mixture was continued until the solution changed from dark blue to colorless. The final burette reading, accurate to 2 decimal places, was recorded. the volume of the sodium thiosulphate solution added was calculated 11. Apart from the first trial, 2 more successive titrations were carried out. The burette was refilled in between runs when the volume remaining was not enough for a complete titration. B. ANALYSIS OF VITAMIN C TABLETS Figure 3 vitamin c tablets (Courtesy of lule.blogspot.com) 1. A tablet of vitamin c was transferred into a 250ml conical flask and  approximately 40cm3 of 2M H2SO4 was added. The tablet was then crushed to dissolve until a solution formed. 2. Using a measuring cylinder, 10cm3 of 10% KI solution was added to the tablet solution and 25cm3 of standard KIO3 solution was pipetted in to the flask. 3. The solution was then immediately titrated with standard thiosulphate solution in the burette until the dark color changed to the original color of the tablet. 4. This procedure was repeated with 2 more samples of the tablet. 5. The volume of sodium thiosulphate used in each titration was recorded and the average volume was calculated. RESULTS AND CALCULATIONS TRIALS INITIAL READINGS FINAL READINGS TITRE VOLUME AVERAGE TITER 1 0.85 33.60 32.75 32.33 2 0.80 33.10 32.30 3 14.85 46.80 31.95 Table results from standardization of sodium thiosulphate (A) Number of moles of KBrO3 in 25cm3 solution = [this formula is used because the molarity of the solution is given and the volume is known]  0.00964Ãâ€"0.025=0.000241mol Mass of KBrO3 solution used= [this formula is used in deriving the mass of a substance when the no. of moles is given (or derived)]=0.000241molÃâ€"167g/mol=0.040247g= 40.25mg Concentration of KBrO3 = No. of moles of Na2S2O3 required for one titration = 0.00241molÃâ€"6= 0.01446mol Moles of I2 liberated = 2.41Ãâ€"10-4 moles Concentration of Na2S2O3= 0.298mol/dm3 TRIALS INITIAL READINGS FINAL READINGS TITRE VOLUME AVERAGE TITER 1 8.80 11.70 2.90 3.43 2 11.70 15.20 3.50 3 15.20 19.10 3.90 Table 2 results from vitamin C analysis (B) Brand of vitamin C: Cenovis Manufacturer’s specification of vitamin c tablet: 1000mg of vitamin c per tablet Molar mass of vitamin C (C6H8O6) = 12Ãâ€"6+1Ãâ€"8+16Ãâ€"6=176g/mol Balanced Equation for reaction = KIO3+5KI+3H2SO4→ 3I2+3H2O+3K2SO4 Number of moles of KIO3 in 25cm3 solution = 0.00100 mol Moles of I2 produced by 25cm3 of KIO3= 0.00100Ãâ€"3= 0.003 moles No of moles of Na2S2O3 needed to react with excess I2 Moles of I2 that reacted with sodium thiosulphate No. of mole of Na2S2O3 = No. of mole of original I2 – no. of mole of excess I2 =0.000723- 0.0005=0.000223mol No. of mole of I2 that reacted with ascorbic acid = 0.006-0.0005 = 0.0055 Mass of ascorbic acid = 176Ãâ€"0.0055= 0.92g =920mg CONCLUSION The experiment was successfully carried out and the results were encouraging. The analysis of the vitamin c content of the Cenovis tablet was carried out using titration. The vitamin c tablet was crushed into a conical flask and specific amounts of KI and KIO3 were added. The solution was then titrated with standard thiosulphate solution until the required color was derived. The results were recorded and calculations to determine the amount of ascorbic acid in each tablet was also successfully done. However the results  from the experiment showed different values from the manufacturer’s specifications. The manufacturer (Cenovis) claims that each vitamin c tablet contains 1000mg of ascorbic acid while this experiment shows otherwise. After calculations were done, the experiment found each vitamin c tablet to be containing about 920mg of ascorbic acid which is below the manufacturer’s specification. However this error could be as a result of different factors; 1. The ma nufacturer of the tablet made wrong analysis of the tablet. 2. This experiment contained errors which arose from wrong reading of instruments, wrong calibration of instruments, or errors in uncertainty. Works Cited Gerrior, S., & Zizza, C. (1994). Nutrient content of the U.S food supply, 1909-1990. Washington D.C: U.S department of Agriculture. Mcevoy, G. (1993). Drug information the american hospital formulary service. American society of health-system pharmacist. Pauling, l. (1970). vitamin c and the common cold. studymode.js. (2010). commercial vitamin c tablet analysis. Retrieved from studymode: http://www.studymode.com/essays/Commercial-Vitamin-c-Tablets-Analysis-470526.html

Saturday, November 9, 2019

The Four Planes of Development

â€Å"Development is a series of re-births. There comes a time when one psychic personality ends and another begins†Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ â€Å"Our work as adults does not consist teaching, but in helping the infant mind in its work of development† (Dr Montessori, The Absorbent Mind, Chap 3) What did Dr Montessori mean by the four planes of development? Describe each plane of development. Explain how we use this knowledge about the child in the Montessori classroom, with the main focus at the age group of 0-6 years. THE FOUR PLANES OF DEVELOPMENTThe life of the child that will become tomorrow’s adult is basically divided into four planes or stages. Each plane consists of a period of six years. Within these stages the development of the child is quite intense at the beginning, then it consolidates and finally trickles into the next. The first & third planes of development are periods of intense creation, whereas the second & fourth planes of development are the ca lm periods of consolidation. First plane of development (0-6years) â€Å"Development is a series of re-births.There comes a time when one psychic personality ends and another begins. The first of these periods goes from birth to six years of age and the child’s mentality basically remains the same. It includes two sub-phases, from birth to three years and three to six years. In the first of these, the child has a type of mind that adults cannot exert upon to influence. In the second sub-phase (3-6years), they are still mentally the same but the child becomes susceptible to adult influence and their personality undergoes great changes. † (The Absorbent Mind, chapter 3, Pg 17).The first plane of development (0 – 6 years) is a period of intense creation. This period is of very great fundamental importance for the formation of the child or the foundation of the personality of the child. This is the period of transformation. This plane of development is further divid ed in to two sub phases, (0 – 3) and (3 – 6) years. The first sub plane is known as ‘The unconscious absorbent mind’. The infant during this period is also identified as a ‘spiritual embryo’ as the infant has within himself the potentialities which determine his future development.The child can learn subconsciously, and effortlessly, through observations and explorations. The child is a sensorial explorer at this stage, that is, the child basically learns through his senses. During the absorbent mind stage, the sensitive periods are at their strongest and help the child’s learning process as well as the child’s initial adaptation. During this first plane of development various physical abilities develop in the young child. Physically the body develops from head to toe. Between the age of zero to three years, these abilities develop separately and independently of each other.Hand and leg movements are not guided by the mind. At th is stage, the child needs to create himself. It is a period of rapid development for the child and the child develops physically, mentally, socially as well as emotionally. As his physical body becomes more defined, he learns both consciously and unconsciously as his mind easily absorbs his environment. He becomes more sensitive to things adult take for granted and learning for him is easy and fast. At this stage, he also learns to care for himself, dress himself, feed himself etc.

Wednesday, November 6, 2019

Limitations of International law in protecting human rights essays

Limitations of International law in protecting human rights essays The term International Law refers to the principles and rules of conduct that nations regard as binding and, therefore, are expected to and usually do conform to, in their relations with one another and their conduct toward their own people. The chief rights recognized in international law correlate to human rights. Fundamental Human rights include: protection against slavery, the right to self-determination (determining your own fate), freedom from torture, freedom of thought, and the right to be presumed innocent until proven otherwise. Now many human rights are protected by international law, but the question of how effective it is, is itself questionable. While nations choose to participate in international law, it is extremely effective. However, the second when a nation feels it neednt adopt an international agreement, such as when Israel failed to ratify the U.N Convention for the Ban on Torture, then very little can be done. Even when a nation has signed an agreement (which she is under no obligation to do) there is virtually no way the international community can ensure that it abides by the agreement. An international judicial organ exists (International Court of Justice), but its powers are limited by the concept of state sovereignty. Which is to say a nation has the authority of being independent and in charge of the conditions in which it choose to live. In this case, the sovereign right not to part take in a court case which would potentially deem it guilty of refusing rights to its citizens, however, even then there is no way to force the verdict on the guilty party. In addition, the formal process for regular review of human rights in states is a self-reporting system in which the state in expected to disclose all abuses. However, as one can imagine no nation would want to incriminate themselves, and taint their image in the international community by doing so. Consequently, most abuses go unreported an ...

Monday, November 4, 2019

Types of crimes Essay Example | Topics and Well Written Essays - 250 words

Types of crimes - Essay Example UCR measures this crime using National Incident-Based Reporting System. Offenders of this crime include enemies of politicians and other famous personalities whereas victims of this crime include government employees, police officers, and service workers. Offenders commit this crime wherever and whenever they find some opportunity to kill. This crime is also on rise in the United States. I think that reporting system of this crime is good as news channels are doing their job perfectly in reporting these incidents. Vehicle Theft Vehicle theft refers to the act of taking another person’s vehicle without informing that person. The intention of the offender is to keep that vehicle permanently. UCR measures this crime by analyzing the number of cases reported to the police by the victims. Offenders of this crime include thieves whereas victims include any person who posses some vehicle of value. Thieves usually steal vehicles from car garages present in the houses and from streets. This crime seems to be on decline because of effective law enforcement from police and law enforcement agencies. Police reporting system and National Incident-Based Reporting System are working well for this crime so nothing needs to be changed.

Saturday, November 2, 2019

Evaluate the role of religion in the perpetuation and resolution of Research Paper

Evaluate the role of religion in the perpetuation and resolution of conflict - Research Paper Example ry religion has been a major engine to war, bloodshed, hatred and intolerance, in most case we have seen religion acting as an arbitrator between the conflicting parties. Therefore, to resolve conflicts between conflicting parties, religion has used empathy, openness to and even encouraged love for strangers, the suppression of unbridled ego and acquisitiveness, the communicative of human rights, unilateral gestures of forgiveness and humility, interpersonal repentance and acceptance of responsibility in past errors as a means of reconciliation and the drive of social justice. Religion has emphasized that people should view life as sacred and a gift offered to humankind by God. Therefore, each person should value others life by avoiding hurting the inner feeling either by messing with ones peace of heart by conflict or by murder. Many religion has encourage to practice the virtue of love to each other by practicing forgiveness in case one wrong the other instead of engaging themselves in a tug of war as a means of conflict resolution. Therefore, the sanctity of life should be observed at personal, social and political level. Religion has practiced the aspect of interiority by observing disciplines even in societies that are quite communally oriented. Through prayer, meditation, the experience of divine love, ecstasy, guilt and repentance all reflect the central importance of inner life of a person. When religion influences all these virtues in inner life of people it encourages people to have conflict resolution techniques. Conflicting parties through application of religious virtues are able to have self-control of their ego through the practice of love and kindness to each other. The role of empathy in western religion and traditions is critically essential. Religion has impacted the experience of empathy in terms of religious contexts to people either in terms of advocacy and long-term education or more directly in the workshop setting. For example, there is

Thursday, October 31, 2019

10 Legal Case briefs Study Example | Topics and Well Written Essays - 2500 words

10 Legal briefs - Case Study Example 2. Procedural History: The case was first heard in a Chicago court, before being appealed in the Illinois appellate court and later the Illinois Supreme Court. The case was passed further to US Supreme Court for a final determination. 3. Facts: Terminiello, a suspended catholic priest made a speech that was injurious to the personality of certain racial groups in an auditorium if the state of Chicago. this caused a public disturbance which forced the police to arrest him and present him to court. 5. Reasoning: The reasoning applied under this case is that inflammatory speeches and fight words are against the provisions of the first amendment of the US constitution. Therefore, the law does not protect the right of speech which creates anger and dispute. Additionally, the provisions of the amendment are against any speech or words that cause public unrests and disputes. 6. Rule: The trial court ruled that Terminiello was guilty of a breach of peace, because his conduct entailed a breach of public peace and decorum. The both the Appellate and the Supreme courts of Illinois affirmed the ruling. The US Supreme Court ruled that the statute used to charge him was unconstitutional. 7. Holding: the Supreme Court held that the speech made by Terminiello was protected under the first amendment of the US constitution. It also held that the statute applied to convict him by the Chicago trial court was unconstitutional. 8. Dissent: Chief justice Vinson opposed the opinion, observing that the statute applied was suitable for punishing fight words. The same sentiments was echoed by justices Frankfurter and Jackson, who observed that reversing the ruling granted by the trial court and affirmed by both the appellate and the supreme courts of Illinois was a breach of balance of power of the state and the federal courts. 2. Procedural History: The case was first held in a California trial court. The appeal was presented to the

Tuesday, October 29, 2019

Corporate Social Responsibility Essay Example for Free

Corporate Social Responsibility Essay Corporate Social Responsibility (CSR) means that a corporation should be held accountable for any of its actions that affect people, their communities, and their environment. Actually, MTR has been implementation of CSR. Since 1993, MTR staff will use their spare time to contribute to society, spontaneously organize and participate in volunteer activities. In 2005, MTR has also set up a volunteer program, to provide support for employees. The the MTR at â€Å"railway people, railway Heart† volunteers plan to participate in 86 community projects and participate in volunteer up to 1,800 people and 12,000 recipients. The target includes the elderly, low-income families, the physically disabled, mentally retarded persons and other people in need. MTR not only set up a volunteer program, but also provide free rides promotions for elderly. Moreover, MTR organized 17 work-life balance seminars and 8 value creation seminars. In addition, MTR in 2005 to help establish the first Charter of Corporate Social Responsibility (CSR Charter), served as one of its founder members. It formulates the first MTR corporate social responsibility guidelines, as well as the establishment of sustainable development and corporate social responsibility policy Steering Committee. You can see that, MTR held accountable for Hong Kongers of its actions. The vision of MTR is that care services, linking and building community to become an internationally recognized business pioneer. And, we think MTR been efforts to implement. However, MTR can do it better. Some of peoples said that MTR held accountable for Hong Kongers of its actions is insufficiency. Although MTR is Limited Corporation, the largest shareholder still is government. Thus, MTR belong public goods, it must be emphasized that the public welfare at first. Because of it, parts of public think that MTR should do more to maintain or improve our public welfare. The most people displeasure MTR is the fare should decrease or reduce to provide cheaper ticket for public as MTR earn much money each year. It should give some feedback to public. MTR owns along the real estate development projects, the total assets more than three hundred billion dollar. MTR offer concessions to passengers, such as short-term fare concessions ten get one free, but this small favors obviously not been accepted by the public. We think that MTR should think more about public and to listen to the views of the public, and make the appropriate action or respond. MTR is a large public company; it should not just focus on economic profit and ought to look out the needs of public. If not, public will procession to express their dissatisfaction because MTR do not held accountable for Hong Kongers of its actions. The impact of CSR on the company’s economic profit is very small, or not even. The most popular debate of CSR is that CSR will make the company lowers economic efficiency and profit as the business need to use extra resources for social purposes. But, it is not be applicable on MTR. It is because MTR not only provide transport services, it also have other business, such as investment in housing. Therefore, the profit of MTR is very large. Even though it use some resource to implement CSR, it will not affect its profit. Conversely, it will aroused public discontent if MTR have not implement its CSR as MTR is a big company and earn a lot of money from public, it should do something for public. On the other hand, it may affect its image as public think that MTR just focus on economic profit without their public welfare. Although MTR always build its image via TV, but parts of people think that it is not enough. They do not just want the promotion and they want the real action, like decrease the fare. People are not easy to deceive. If MTR not listen and ameliorate its actions, plan or behavior, it will increase the displeasure of public and affect its image. People will adopt a more radical behavior to express their dissatisfaction when it does not have any improve. And, it will affect its reputation.

Sunday, October 27, 2019

Research into Cancer Stem Cells

Research into Cancer Stem Cells Cancers are composed of a heterogeneous mix of cells with varying differentiation, proliferation and tumourigenic properties. In vivo studies have demonstrated that within a cancer population, only percentage of cells are able to initiate tumour development [1]. It is widely believed that the heterogeneous groups of cells include a small population of cancer cells with stem cell properties: the cancer stem cell (CSC). These cells have the capacity to self-renew and differentiate asymmetrically and give rise to bulk populations of nontumourigenic cancer cells. Current cancer treatments may eradicate the tumour bulk but spare the populations of stem cells which are able to restore tumour tissue causing recurrence of the cancer. This may explain why initial tumour regression does not necessarily translate to improved patient survival in many clinical trials. Identification and characterisation of these stem cells may offer means of targeting cancer at its root. Cancer Stem Cell Definition The AACr workshop in 2006 defined a cancer stem cell as: A cell within a tumour that possesses the capacity to self-renew and to cause the heterogeneous lineages of cancer cells that comprise the tumour. Cancer stem cells can thus only be defined experimentally by their ability to recapitulate the generation of a continuously growing tumour.[2] Therefore the stem cell definition requires that cell possess 2 fundamental properties. Self renewal, the process whereby at least one daughter cell of a dividing stem cell retains stem cell properties Potency, the ability of cells to differentiate into diverse cells that comprise the tumour. [3]. It was agreed that defined CSCs may not necessarily derive from normal tissue stem cells, indeed one important and unanswered question is whether tumours derive from organ stem cells that retain self renewal properties or whether tumour stem cells are proliferative progenitors that acquire self-renewal capacity [2]. Normal Tissue Heterogeneity The continuous replacement of differentiated, functional cells by proliferation of more primitive cells in human tissue is a normal homeostatic process. Organs are composed of collections of differentiated cells that perform discrete functions [4]. The total cell population is regarded as constituting a cell division hierarchy [5]. The stem cell is central in the renewal hierarchy and has two functions within this model. It can act as the initiating cell in a cell division and differentiation process, producing a large family of differentiated descendants, a process known clonal expansion. Another function is for the cells to undergo division to produce two stem cell daughters identical to the initial stem cell and to replace the stem cells used in clonal expansion. This process is called self-renewal [6] and is shown diagrammatically in Figure 1. As cells move down the hierarchy they acquire the differentiated features associated with tissue function and the proportion of differenti ated cells increases. In this way the stem cell has the ability to maintain organ life [4]. This concept predicts the existence of three categories of cell within the population: Proliferating, self renewing stem cells; Proliferating non-renewing transitional cells (transit amplifying); Non-proliferating, differentiated end cells. Following division the stem cell can give rise to a transit amplifying cell that will undergo further rapid proliferation to produce offspring which expand the populations of cells arising from the initial division and progressively commit irreversibly to differentiation along one or several lineages[4]. An important feature of a stem cell is their ability to undergo asymmetric cell division giving rise to a progenitor cell and to a new stem cell. Somatic SCs reside in confined tissue compartments referred to as the niche. Here the microenvironment suppresses SC proliferation, resulting in a quiescent SC population. This population maybe triggered to proli ferate and differentiate in response to injury (Ghotra, 2009). Seven common and distinguishing features of stem cells have been described [4]: Stem cells comprise a small subpopulation of a given tissue. Stem cells are ultra-structurally unspecialized, with a large nuclear-to-cytoplasmic ratio and few organelles Stem cells can be pluripotent Stem cells are slow cycling but may be induced to proliferate more rapidly in response to certain stimuli Stem cells have a proliferatve reserve that exceeds an individuals lifetime An intermendiate group of transit amplifying cells exists The microenvironment plays a critical role in the homeostasis of the stem cell and the differentiation of its progeny. The stem cell is capable of division and clonal expansion. As cells differentiate they lose their proliferative potential. The stem cell can self renewal or divide to produce proliferative transitional cells. Tumour Heterogeneity It has been recognised for many years that tumours exhibit morphologic heterogeneity but they are also functionally heterogeneous in terms of cell proliferation and tumour forming capacity based on transplantation assays [7]. Heterogeneity within tumours is seen within individual tumours in terms of morphology, cell surface markers, cell proliferation kinetics and response to therapy. In vitro and in vivo observations suggest that most cancer cells do not proliferate and that loss of capacity to divide is a feature of the tumour. Only a small proportion of cells have the ability to form tumours in vivo, referred to as tumourgenicity. The cancer stem cell theory posits that neoplasms, like physiological tissue can be hierarchically organised, and that CSCs at the apex of this of this cellular hierarchy and seem to comprise of only a subpopulation of tumour cells are essential for its initiation [8, 9]. Two models have been proposed to explain tumours heterogeneity Stochastic and Hiera rchy, summarised in Figure 2. Both models account for the existence of a cell with stem cell properties, but only the hierarchy model predicts the existence of a stem cell at the top of a hierarchy, which the potential to produce all other cell types within the tumour. Stochastic Model The stochastic model predicts that a tumour is biologically homogeneous and the behaviour of the cancer cells is influenced by intrinsic (eg signalling pathways, levels of transcription factors) or extrinsic factors (eg host factors, immune response, and microenvironment). It is suggested that the randomness and unpredictability of these factors result in heterogeneity in many aspects of marker expression and tumours initiation capacity [10]. A key requirement of the stochastic model is that all cells are equally sensitive to such influences and that the cells can revert from one state to another. For this model to be functional all tumour cells are not permanently affected and all have equal capacity to be induced to one state or another and the changes upon the cell are not permanent [11]. A growth fraction of Hierarchy Model The second model is the hierarchy model which predicts that the tumour is a caricature of normal tissue development and a hierarchy where the stem cell is at the tops is maintained (Pierce) [7]. The cancer stem cell maintains itself and its clones by self-renewal. The cells also mature to produce differentiated offspring which form the bulk of the tumour and lack stem cell properties. As in normal tissue only a small percentage of the tumour population maintain the capacity for long term proliferation while most cells proceed forward down the differentiation pathway resulting in aberrant terminal differentiation [4]. Due to differences in characteristics, stem cells can be selected and enriched for. Variations in tumour growth rates may be due the effects of normal homeostatic mechanisms that regulate stem cells and transit amplifying cell reproduction or alterations of the stem cell niche microenvironment [4]. Much of the evidence for this comes from clonogenic and tumourgenic assay s, which will be discussed further. Hierarchy model contains cells that are composed of biologically distinct cells including cancer stem cells which are all have different functional properties. The stochastic model predicts that all cells are equal the cell heterogeneity is due to intrinsic and extrinsic influences upon the cells which result in heterogeneity of cell function. Experimental Evidence Early Work The first evidence for the existence of cancer stem cells came from functional cell proliferation studies in the1940s 1960s. Radiolabelling cells and autoradiography enabled measurements into the proliferation, lifespan and hierarchical relationships in normal and neoplastic tissues [10, 12]. From these studies came the proposal that tumours are caricatures of normal development including the existence of stem cells [7]. Much early work was on the cancer of the haematopoietic system. In the 1970s Clarkson and other groups carried out pioneering studies that established cancers exhibited functional heterogeneity [10, 13]. These include cytokinetic studies carried out in cell lines, murine models of the acute leukaemias and in vivo examination of leukaemia blast proliferation kinetics in human AML and ALL patients. The data showed that the majority of leukemic blasts were post mitotic and needed to be continuously replenished from a relatively small proliferative fraction. Only a smal l number of leukemic blast cells were cycling in vivo and of these two proliferative fractions were observed: a larger, fast cycling subset with a 24 hour cell cycle time and a smaller, slow cycling, with a dormancy of weeks to months. From this data it was suggested that the slow cycling fraction was generating the fast cycling fraction thought to be the leukemic stem cell population because they had similar kinetic properties to those observed for normal haematopoietic stem cells. This was a clear suggestion that tumours exhibit functional heterogeneity in terms of proliferative potential. Following the identification of these slow cycling cells it was predicted the inability to kill the leukaemic stem cells (LSCs) was the cause of relapse and failure of chemotherapeutic therapies. Whilst combining treatment with in vivo cytokinetic studies, investigators observed that LSCs respond to the depletion of the of the leukemic cell mass by go into cycle after chemotherapy. It was sugges ted the way to eliminate dormant LSCs was to find the window when they are cycling. Identifying and assaying the potential LSCs was a major stumbling block and characterising them was impossible. This was when attention focused on the clonogenic assay was adapted by several groups to assay AML which identified phenotype of AML cultures in vitro with differing proliferative potential, providing the further proof for hierarchy in AML [14-16]. Clonogenicity Definition of a clone A clone is an operationally defined as a group of cells derived from a single ancestor cell. Clonogenicity is the ability of a given cell population, when plated as single cells, to produce one or more clones. This can be measured by the clonogenic assay which can quantify the proportion of colony forming cells, as a percentage of plated population, referred to as colony forming efficiency (CFE). It has been suggested that colony-forming cells possess two fundamental properties of progenitor cells: the ability to give rise to differentiated descendents and the capacity for self-perpetuation [17]. Therefore the ability to measure the capacity of cells to form clones is a useful tool in the study of the cancer stem cell concept. Quantitative measurement of clonogenicity Development of the clonogenic assay. Puck and Marcus The first clonogenic assay In 1956 Puck and Marcus published a paper describing a cell culture technique for assessment of colony forming ability of single mammalian cells [18]. Plated in culture dishes with a suitable medium human cervical carcinoma cells (HeLa) were supplemented with a large number of irradiated feeder cells and the number of colonies formed was counted. Their technique was a simple rapid method for growing single mammalian cells into macroscopic colonies with a colony forming efficiency of 80 100% . The authors developed this assay further to enable quantification of the effects of high energy radiation on cell populations in vitro [18-20]. They plated HeLa cells and measured their response to x-rays, producing the first in vitro radiation cell survival curve [21]. This assay has since been used for a wide variety of studies with many cell types using improved culture conditions, and for the testing of many potential chemotherapeutic agents. Till and McCulloch Following the work of Puck and Marcus, Till and McCulloch generated the first in vivo survival curves [22, 23]. They showed that when mouse bone marrow cells were injected into recipient mice that had been given total body irradiation to suppress endogenous haematopoiesis, visible colonies developed in the spleens that derived from cells in the graft. This work demonstrated that the cells injected into the mice were capable of self-renewal and it was speculated that these cells were stem cells. The evidence for this conclusion was that the curve from the number of marrow cells transplanted proportional to the number of colonies developed within the spleen. In addition, the radiation survival curve of cells that form colonies closely resembled survival curves developed by Puck and Marcus for in vitro cells [21]. This, however, was only indirect evidence and did not prove that the colonies originated from single cells, so the group carried out further experiments to determine the singl e cell origin on the colonies within the spleens [24]. Heavily irradiated bone marrow was transplanted into heavily irradiated recipient mice. The idea was that some cells containing genetic abnormalities caused by irradiation in the donor bone marrow cells would retain the ability to proliferate and produce clones containing this abnormality [24]. This worked to some extent, with a small number of colonies containing cells which all showed the same chromosome abnormality within that colony. It was hypothesised that if the capacity to form colonies is to be considered as a criterion to identify stem cells, then cells must lose this capacity upon undergoing differentiation. This hypothesis was tested by applying hypoxia as a differentiating pressure to mouse bone marrow, which resulted in a reduction in colony formation in the spleens of hypoxic mice [17]. They described how the number of colonies form in the spleens of mice in hypoxic conditions is reduced. This was thought to be du e to hypoxia stimulating erythropoiesis which stimulates erythropoietin, indicating that erythropoietin reducing colony forming production in the spleen. This data suggested that an increased demand for differentiated cells reduces the number of stem cells, resulting in the reduction of colony forming ability. Later Developments Since its development, the in vitro clonogenic assay has become a valuable tool in the study of cell growth and differentiation. [25]. Several adaptations to the original method have been made including immobilising cells in a top layer of 0.3% agar to avoid formation of tumor cell aggregates by random movement which might be confused with colony growth [26]. Agar has also been replaced by some groups with agarose, which is easier to handle (Laboise 1981) or methylcellulose which allows better recovery of the colony for replating. Others have simplified the culture medium and omitted the need for feeder cells. The exact protocol depends largely on cell type, but the basic system remains the same. The development of a protocol for secondary plating efficiency has proved a useful tool for the measurement of self-renewal and has the advantage of being able to identify cells that are able to undergo a large number of cell divisions [26]. This involves selecting specific colonies to deter mine their proliferative potential over a number of passages. Clonogenicity and Cell Renewal Hierarchy Clonogenic assays have been used to identify and morphologically characterise the three cell types above. Barrandon and Greens [27] work identified the clonal types of keratinocytes and linked this to their capacity for multiplication. They defined colonies as Holoclone, Meroclone or Paraclone. The Holoclone was described as a colony with a larger smooth nearly circular perimeter containing many small cells, which it has been suggested that these cells represent the proliferating self renewing stem cells. Paraclones were described as differentiated end cells which are more elongated and flattened in appearance, however paraclones can divide quite rapidly therefore classification of clonal type cannot be deduced form the study of growth rates alone or morphology alone. Meroclones were described as a combination of holoclones and paraclones. Relating morphology and colony size to clonogenicity can be used to further identify potential stem cells within the clonogenic assay and give mor e detail to the fate of their descendents. The differences in growth unit size may reflect several properties including different proliferative capacities and clonogenic cell kinetics. However, clonogenicity in vitro alone, does not define a stem cell, and other subpopulations, such as transit amplifying cells may also be able to produce a colony size of 32 or more cells. Although ability of a cell to form a colony implies substantial proliferative capacity, this does not unambiguously identify a stem cell [28]. Tumor Cell Heterogeneity and Hierarchy Certain characteristics have emerged from clonogenic studies on cells derived from human tumors. It was noticed that a few cells in each tumor were able to give rise to colonies in culture, whilst some colonies contained transit amplyifing cells undergoing a limited number of terminal divisions. Other cells (usually the majority) were non-proliferating stem cells. Looking at CFE and colony size of human tumors and replating experiments has demonstrated the heterogeneity of a wide range of tumor types including neoplastic human urothelium [29], melanoma [30, 31] and squamous carcinoma [32]. This supports the idea that cells within solid tumors consist of cellular hierarchies, which will be discussed further. The cancer stem cell model accounts for heterogeneity within a primary cancer by proposing that each cancer consists of a small population of cancer stem cells and a much larger population of cells which have lost their self-renewal capacity [5]. The clonogenic assay has been used explore this cellular heterogeneity present in human tumors, lending support to the stem cell model of tumor growth. Multiple myeloma has served as a valuable model in early clonogenic assay development. This was studied by Hamburger and Salmon in 1977 [33], who created an essentially selective system which restrict proliferation to cells capable of anchorage independent growth, thought to be a characteristic of stem cells [34]. They described an in vitro bioassay for human myeloma colony-forming units in culture which was applied to the study of patients with multiple myeloma and related monoclonal bone marrow derived B cell neoplasm. Bone marrow samples from patients with multiple myeloma and normal volun teers were cultured in the presence of an agar feeder layer prepared by either human type O+ washed erythrocytes or adherent spleen cells of BALB/c mice. They found a linear relationship between colony formation and the number of nucleated bone marrow cells plated. Multiple myeloma patients exhibited much higher numbers of colonies formed compared to normal volunteers. It was shown that the number of colonies was proportional to the number of colonies plated, suggesting that colonies were derived from single myeloma stem cells. This was the development of the human tumor stem cells assay. The Human Tumor Stem Cell Assay clonogenicity and cancer stem cells The ability to grow human solid tumors in two-layer soft agar culture was developed for the clinical application of testing in vitro tumor sensitivity or resistance to chemotherapeutic agents. It is a possible means by which anticancer drugs can be selected for activity against tumor cells from a patient [35] as a way of tailoring chemotherapeutic regimes to individual patients and of testing new cytostatic agents [36]. The assay assesses treatment effects of stem cells by a testing their ability to reproduce and form a colonies of cells. Using semi-solid agar with enriched medium supports colony growth from cell suspensions from a variety of human tumors. A semi-solid medium suppresses the growth of most normal cells and there is evidence of the malignant nature of these colonies [33] . An important consideration is the relationship between the response of clonogenic cells to drugs in vitro and the response of the tumor to the same drug in the patient [10]. The stem cell model of human cancer suggests that cure or duration of remission after clinical treatment should correlate only with killing of stem cells. Assessment of treatment effects on an unselected cell population (eg on the basis or morphological criteria) is therefore likely to be misleading since the effects on a small population of stem cells will be masked by those on the large population of stem cells. Human tumors of a single histological type appear to have a pattern of response in vitro that is similar to their clinical behaviour. Within a histological type, tumours are heterogeneous in response both in vitro and in vivo. Studies directly comparing the response in vitro with the subsequent clinical response have shown important correlations. The proportion of human tumors that grow with a plating efficiency sufficient for assessment of drug activity (à ¢Ã¢â‚¬ °Ã‚ ¥30 colonies per 500,000 cells plated is frequently less that 50%. Usually only a proportion of these tumors will manifest in vitro sensitivity [37]. There have been a wide range of predictive value positives reported for the human clonogenic tumour cell assay when applied to a patient population with an expected clinical response rate of 15-49% [38]. This value could be misleading and in practice may only be workable for cytotoxicity testing for only one third of specimens tested. The limitation exits that not all sam ples will produce clones in vitro so those that do may exhibit a treatment bias [35]. Other problems with the use and interpretation of human tumor clonogenic assays include low plating efficiency and small proportion of tumors available for testing; difficulty in preparing single cell suspensions, production of only small quantities of data, and problems defining drug sensitivity and response criteria [35]. Factors influencing size of sub-populations It has been proposed that as in normal cell populations, human tumor cell populations are also heterogeneous and comprise stem cells, non-stem transitional cells with limited proliferative capacity and end cells [6]. MacKillop suggested that four factors may influence the relative size of these subpopulations: The probability of self-renewal (Psr) of stem cells (producing two daughter stem cells). The distribution of cells within the system can be treated mathematically by assuming probability functions. The potential of the transitional cells for further cell division, as defined by clonal expansion number (n=number of generations between the first generation non-stem cells and the end cells.) The relative effect of cell loss on each subpopulation (Stem cells, transit amplifying, end cells) as described by cell loss factors (ÃŽÂ ¦s, ÃŽÂ ¦t ÃŽÂ ¦ ec). The number of generations of cell proliferation following initiation of the tumor cell population for individual stem cell. Stem cell division in normal tissue must provide a supply of differentiated functional cells to compensate for physiological losses and at the same time maintain a constant stem cell population. A probability of self-renewal in which two stem cells daughters Psr =0.5, would yield a steady state [28]. If no cell loss occurs, it has been modelled that the number of stem cells will increase exponentially with Psr > 0.5 [6]. For the simplest case in which all non-stem cells are end cells (n=0) the proportion of stem cells increases linearly with increasing Psr. and the proportion of stem cells in a tumor decreases as the extent of multiplication of the transitional cell compartment. This results in the stem cell being the less common cell type numerically than transit amplifying and differentiated end cells. These scenarios are affected by cell loss which may occur through necrosis, migration or differentiation, of which only differentiation is selective of cell type. A selective loss th rough differentiation increases the population of stem cells. The modelling of tumor cell growth has implications for the use of clonogenic assays as predictors of the stem cell fraction on human tumors, especially in regards to cut-off points in terms of colony size and determining which cells represent the stem cell fraction [6]. Between studies there are differences between how colonies are scored morphologically and numerically and how long cells are allowed to grow [31] and considering this evidence may be an important issue when comparing data between different studies. Clonogenicity in cell lines and stem cells in cell lines Clonogenicity has recently been used to identify stem cell properties of cells in long term culture cancer cell lines. The colony forming efficiency and secondary plating efficiency of carcinoma derived cell lines including head and neck squamous, breast [39] and prostate [39-42] were investigated and considered to contain potential stem cells. These studies show that cell lines show clear differences between clonal types (holoclone, meroclone, paraclone) and have similar properties in this respect to normal epithelial cells [39]. The proportions of clonal types between the carcinoma cell lines vary greatly. DU145 colonies were evenly spread in number between the clonal types, whereas PC3 cells produced mainly meroclones and LNCaP cells produced mainly paraclones [41], all based on colony morphology. These studies have also looked at the relationship between potential cancer stem cell markers and clonogenicity. CD133 enriched DU145 cells were assayed for clonogenicity, but no difference was found between the positive and negative cells [41], but when isolated CD44+ integrin ÃŽÂ ±2ÃŽÂ ²1+ CD133+ sorted cells were compared against CD44+ integrin ÃŽÂ ±2ÃŽÂ ²1low CD133low a higher CFE was observed in conjunction with a marked difference in morphology to CD44+ integrin ÃŽÂ ±2ÃŽÂ ²1-/low CD133- in DU145 MACS sorted cells [40]. Immunocytochemistry demonstrated that different clonal types showed varying levels of expression of CD44, ÃŽÂ ±2ÃŽÂ ²1 integrin and ÃŽÂ ²-catenin in PC-3 [42] and DU145 clones [39]. There is further evidence to suggest the presence of cells with stem cell behaviour such as dye-exclusion and higher clonogenicity, in several human epithelial cell lines [39, 43-45], which further supports the idea that cell lines contain stem cells. The ad vantage of cancer cell lines that contain cells displaying stem cell characteristics would facilitate the study of molecular pathways and the properties that define the cancer stem cells in vitro. Recent Developments Much progress has been made in the modelling of the leukemic diseases, where the level of heterogeneity was first and most thoroughly explored. Human cells fulfilling the properties expected of drug resistant cancer stem cells were initially isolated from blood cancers [2]. Improvements in the genetics of recipient mice have led to the definition SCID-repopulating cell (SRC). Many improvements to the NOD/SCID murine model continue to be made by using recipient mice that are engineered to be deficient in natural killer (NK) and macrophage activity; part of that innate immune system. It has been demonstrated that a small subpopulation of acute myeloid leukaemia cells with an immature immunophenotype possess the ability colonise immune deficient NOD/SCID mice to give rise to more differentiated leukaemia cells and to recapitulate the heterogeneous phenotype of the bulk tumour [46]. The phenotypically more mature cells failed to engraft in mice, suggesting the presence of an identifiable tumour cell hierarchy. These cells are referred to as tumour initiating cells. Cancer Stem Cell Identification CSCs have been defined on the basis of their ability to seed tumours in animal hosts, to self renew and to spawn differentiated progeny (non-CSCs)[47]. Pioneering work in this area originated from studies on leukaemia stem cells and later included demonstrations of CSCs in solid tumours, particularly breast and brain cancers. However, work in solid tumours has proved challenging. The frequency of CSCs in solid tumours is highly variable [48]. Difficulties with tumour CSC identification Evidence for the existence of cancer stem cells in solid tumours has been more difficult than in the haematopoietic system to obtain for several reasons: 1) The cells within the tumour are less accessible. Tissue has to undergo mechanical or enzymatic digestion to obtain a single cell suspension which can be analysed. 2) There is a lack of functional assays suitable for detecting and quantifying normal stem cells from many organs. 3) Only a few cell surface markers have been identified and characterised. Of these there is no one marker which is specific for a stem cell or cancer stem cells and for selection they often have to be used in combination. Cancer Stem Cell Markers Stem cells are most commonly identified by staining for cell surface markers, exclusion of fluorescent dyes or labelling with tritiated thymidine [3] . The technology to develop monoclonal antibodies to specific molecules and flow-cytometery based sorting and analysis has been a big driving force in recent CSC developments. Much work has been done to define cell surface markers. It has been shown that two distinct subpopulations can be separated from a single tumour that differ in their cell surface markers and their ability to seed new tumours in vivo. Most of the currently used markers do not recognise functional stem cell activity. By using combinations of cell surface markers, the homogenous purification of stem cells can be obtained [3]. Table 1 below reviews the current suggested markers for some tumour types. The use of animal models has allowed identification and assessment of markers that are expressed by cancer stem cells. The most convincing demonstration of identity CSC s elected by biomarkers comes from serial transplantation of cellular populations into animal models. The CSC containing fraction should re-establish the phenotypic characteristics of the original tumour [48]. In 1997 Bonnet et al showed that the ability to transfer human leukaemias into NOD/SCID mice was retained by a small proportion of cells with the CD34+, CD38- phenotype [46]. The CD44 and CD133 markers have emerged as potential markers of immature epithelial cells for isolating CSCs in several tissue types including brain and prostate. Cells have been isolated from several tumour types and serially transplanted in xenograft models: Breast CD44+ CD24-/low established tumours in recipient mice. Brain CD133+ enriched cells. Prostate Side population CD44+ enriched. In these experiments small numbers of selected cells produced tumours in recipient mice. In this instance CSCs can on