Monday, September 30, 2019

Manila

Another thing that can be seen n the profile is that their number of SK and Kagawad is not that numerous. Half of the entire population of barangay is not registered voters, thus, unable them to fully benefit their right to choose leaders that would change the country. As our group interviewed and surveyed citizens there in the barangay, almost all of them agreed that the major problem of their community is the uncontrollable flood that theyVe been experience for so many years.Another problem that is relevant to their place is the gang wars and street fights that is happening during night-time hat can be dangerous to the innocent civilians of the place. II. Mandates, Function, Programs, Resources of Relevant Organizations The barangay knows exactly what problems does exist on their barangay. They provided some solutions to solve these problems, however, it is not enough to thoroughly solve them. One of their solution in case of the flooding of their place is to clean their canal regu larly with the help of MMDA (Metropolitan Manila Development Authority) and DPWH (Department of Public Works and Highways).Although these two government institutions Joined hands together to solve the problem of flooding, it is not enough to get rid of the problem. As other places surrounding the barangay raise their lands to avoid flood, the barangay becomes a catch basin of all flood that comes from these high-rise places. Gang wars and street fghts is inevitable to places that is full of out- of-school youth. Even if they are going to school, some of the students tend to Join to groups and gangs that would eventually lead to the destruction of their lives.These ghts are not resolved easily, and the members of each gang or group are composed of people who are below 18, thus, preventing these people to be imprisoned. However, by the Pangilinan law, these people involve in such cases are turned over to the DSWD (Department of Social Welfare and Development). Street fghts cannot also be controlled fully because of the lack of tanods, so the barangay recruited more tanods to watch and roam around the vicinity when nighttime comes. I Policy Recommendations and Action Plan For the policies that we gave, the first policy was about waste management.We proposed that there should be weekly cleanups to help maintain the cleanliness of the canals and the barangay itself. Our next policy was about the gang war in the barangay, we proposed that a curfew must be implemented to keep all the residence safe especially in our chosen barangay since most residents there are from opposing fraternities. We also suggested that they should add more tanods to help protect the barangay. There should also be at least a medical doctor and/or nurse to stand by in the barangay Just in case of accidents.Waste management is a solution that is simple yet difficult to fulfill and to do regularly as people are lazy to do such things like this but when in comes to littering the place, it is eas y for them to do. Discipline is important so by implementing waste management, people will get to learn about the proper decorum of throwing garbage. The people of the barangay must learn how to segregate different wastes and knows where to put these wastes. By knowing these things, less garbage maybe expected, and flood will not be expected anymore.Weekly cleanups of canals and the barangay itself is a must in order to maintain cleanliness of the place. This may be beneficial for everyone as they will not be exposed anymore to such sickness like dengue, malaria, and others. It is a step towards a green and eco-friendly environment. Also by this cleanup, wastes will not be clogging the canals anymore so that flood will be flowing smoothly. Curfew is implemented in every barangay in the Philippines, but this regulation does not fully monitor the people on the street when nighttime comes.Some of the eople who are going outside is under the age limit of the curfew, thus, the youth is i nvolved. By implementing stricter curfew, people of this barangay will be expected to their respective houses before 10:00 pm. The age limit of the stricter curfew is applicable to all ages, exception to this is when there is an emergency situation. To further monitor that the curfew will be successful, the barangay must deploy several tanods in every corner of the streets of the barangay.In case of emergency, it is essential and a must to have medical doctor or nurse to e in the barangay hall or hiring a resident doctor so that whenever there will be an emergency that needs medical attention, the resident doctor or nurse will respond immediately without going far.

Sunday, September 29, 2019

An in-depth view on Alcohol

AbstractionThis research survey will look into and analyse farther on how intoxicant in gargles is involved in the development of unwritten malignant neoplastic disease and will reexamine some related literature which has linked the development of unwritten malignant neoplastic disease and alcohol-containing gargles. This survey purpose to bring forth relevant informations, proper intercessions and proposal to modulate the production of these merchandises depending on the analysis and consequence. The Dental Association claims that a nexus between intoxicant incorporating gargles and malignant neoplastic disease development has been established and concluded that there is a possible nexus with multiple long term utilizations of intoxicant incorporating gargles but more research and survey is required before this can be decidedly said to be. Thus this survey will function as an instrument to clear up the relationship of malignant neoplastic disease development and intoxicant containin g gargles. The mark of this survey are the commercialised intoxicant incorporating gargles that will be subjected to sensitive survey and analysis utilizing the proper engineering and chemical science to get in a more complex and choice research merchandise.Introduction:Datas based from epidemiological surveies provide small background and penetration on how intoxicant increases the possibility or hazard for the development of assorted malignant neoplastic diseases. In some malignant neoplastic diseases, intoxicant is believed to play a critical causal function. For others a malignant neoplastic disease, such as chest and liver malignant neoplastic diseases, alcohol believed to play an indirect causal function by mechanisms sweetening that causes malignant neoplastic disease. Researches analyzing at these mechanisms through direct and indirect causal consequence may cast visible radiation on function of intoxicant in the development of malignant neoplastic diseases. Carcinogenic consequence of intoxicant is now linked in the development of unwritten malignant neoplastic diseases. Chiefly this alcohols thought to be found in gargle which is intoxicant based. This phenomenon may be explained by its interaction with enzymes. These assorted enzymes that usually assist our organic structure to detoxicate the substances that enter our systems can besides increase the hazard of toxicity degree in some carcinogens.The Problem This survey will seek reply and clear up the effects of intoxicant based gargle and its contributory factor for the development of unwritten malignant neoplastic disease. Specifically, reply the inquiry â€Å"Is there a important consequence of utilizing intoxicant based gargle in the development of unwritten malignant neoplastic disease? †Background of the ProblemThe job statement of this research is indispensable to clear up the old surveies and other contradictions about the topic of involvement. Through this survey, issues refering the consequence of ethanal incorporating gargles will be clarify and will bring forth relevant information in the development of medical intercession specially oncological scientific discipline. There are research surveies that have been established the relationship between intoxicant usage and malignant neoplastic disease. This hazard is due to alcohol constituent depending on the sort of malignant neoplastic disease. The strongest associations between malignant neoplastic disease intoxicant utilizations are with oral cavity, esophageal, laryngeal, chest, guttural, and liver malignant neoplastic diseases. A survey conducted by Dental Professor Laurence Walsh, MD, the caput of the University of Queensland ‘s School of Dentistry, says that there are a figure of grounds why some gargles would really cut down the hazard of malignant neoplastic disease development because their primary mechanism will impairs the molecules production like ethanal that which is considered as a carcinogenesis. Dr. Walsh assumes that there is grounds and literature which has support from local and international research organisations that alcohol incorporating gargles used to cut down bacteriums which produce ethanals are non linked to malignant neoplastic disease. Contrary to the survey conducted by Dr. Walsh, ethanal, harmonizing to Dr. McCullough have is a toxic byproduct of intoxicant and suspected to be carcinogenic that will lend to unwritten malignant neoplastic disease development. He besides said that these by merchandises may remain and may be accumulate in the oropharyngeal pit when these alcohol incorporating gargles is being used and he says that there is no grounds demoing the these chemical component or molecule could either prevent or stamp down the development of malignant neoplastic disease. Experts on malignant neoplastic disease development recommends that there may be increased on the possible hazard in utilizing gargles incorporating intoxicant and recommends to be more cautious against the usage of these strong alcohol-based oral cavity rinse particularly among coffin nails tobacco users to cover up the odor of coffin nail fume – they say more surveies and researches is required into such merchandises to set up the facts. In responses to the old surveies and researches, this research proposal will seek to garner the most accurate and recent informations to carry through the necessary factor in set uping facts related to alcoholic based gargle and the malignant neoplastic disease development.Review of Related Literature: Researches is begins to concentrate their surveies on the mechanisms by which intoxicant induces or potentates the development of malignant neoplastic diseases in human and, hence, develop intercession on how to forestall it. Scientists are besides making researches to find the impact of these merchandises in the phases of malignant neoplastic disease development ( Rothman,1999 ) .Surveies:Some initial surveies show that intoxicant may impact development of malignant neoplastic disease, at the degree of familial by transforming genes mannerism in the publicity and induction phases of malignant neoplastic disease. It has already been suggested that, a merchandise of intoxicant metamorphosis which is acetaldehyde alters cell ‘s natural ability to retrace or mend its DNA that consequences in a greater likeliness that cause mutants induction in the development of malignant neoplastic disease ( Espina, et Al, 1988 ) . It has late been suggested that intoxicant exposure may ensue in over look of certain transforming genes in human cells and, thereby, trigger malignant neoplastic disease publicity ( Kharbanda, et Al, 1993 ) Although there is less grounds that intoxicant itself is a carcinogen, which will be the chief focal point of this survey, by sweetening of the carcinogenic effects of other substances and chemicals, intoxicant may move as cocarcinogen. Some surveies indicate for case that intoxicant enhances ability of baccy to additions and stimulate formation of tumour in rats ( Garro, et Al, 1990 ) . â€Å"In worlds, the hazard for oral cavity, esophageal and tracheal malignant neoplastic disease is 35 times greater for persons who smoke and drink at the same clip than for people who neither fume nor drink, this imply the of import interaction of cocarcenogenesis between intoxicant and tobacco-related carcinogens† ( Blot, et al,1988 ) . Acetaldehyde is one of the by merchandise of intoxicant. This chemical compound anticipated to be a human carcinogen based on experimental done on animate beings suggests sufficient grounds of carcinogenicity ( IARC 1985, 1987, 1999 ) . When this compound was administered by inspiration, this will increased the incidence of glandular cancer and squamous and epithelial cell carcinomas in the rhinal mucous membrane in mice of both sexes. The same determination was concluded in laryngeal carcinomas in hamsters of both sexes. In another survey utilizing inspiration, in a lower degree of exposure and in survey utilizing intratracheal instillment, there is no increased incidence of tumours in soecimens was observed. A research conducted in an aldehyde works reported nine instances of malignant neoplastic disease, including two instances of carcinomas of the unwritten pit and ?ve instances of bronchial tumours. This research survey was considered to be rating unequal because of assorted exposure, the little figure of instances, and the hapless population specifying. Among these instances, three surveies utilizing instance control investigated the hazard of unwritten, pharynx, and esophageal malignant neoplastic diseases following heavy intoxicants intake. â€Å"These surveies systematically showed an increased hazard of this malignant neoplastic disease in persons with familial polymorphisms in enzymes involved in the metamorphosis of ethanal ; these polymorphisms were associated with higher blood concentration of ethanal following intoxicant intake† ( IARC 1985, 1987, 1999 ) .Research Design Epidemiologic and experimental research method will be the suggested research design which may include cohort and case-control surveies. Cohort surveies can be either prospective or historical ( Breslow and Day, 1980 ) .The medical history of a cohort of topics is built in the historical cohort survey to see the specifying cohort of those who were exposed to a hazard factor. The incidence rate of those persons who exhibit the manifestations or disease among capable who had been exposed is compared with the incidence rate of manifestations or disease among an group which is non exposed. In this survey, the footing of comparing is population rate. In the simplest type of this survey design two groups ( cohorts ) of topics would be identified, one of which will be exposed to a specific intercession related to the survey, an wellness hazard factor, and the other group will non. The rate at which individuals without the disease ( known as noncases ) are transformed into individuals with the disease ( designated as instances ) is referred to as incidence rate. These two groups of people will be followed over a specific period of clip. One group will be exposed to a hazard factor and the other group will non. â€Å"The exposure of the individual over clip, called individual clip, is measured uniformly in hours, yearss, months or old ages from the clip of the beginning of the exposure to the end point of the exposure under study† ( Breslow, N. E. & A ; Day ) .The measuring of the individual clip per group is by the amount of the exposure times for every members in the group. In incidence rate surveies, the proportion of instances per cumulative person-time, for those in the open group, is compared to that in the unexposed group ( Breslow, N. E. & A ; Day ) . The magnitude of the comparative hazard indicates the strength of the relationship between incidence and exposure. A comparative hazard of integrity indicates that there is no common difference between the incidence hazards from the group exposed than that from the group being. Statistical intervention and other method of analysis will be discussed in the existent presentation to incorporate all the constructs and thoughts applied in this research survey.Expected Consequences The consequence of this survey will be subjected to statistical analysis based on epidemiological surveies to make critical consciousness and systematic apprehension of the topic being studied. The information and analysis will help the research workers in doing generalisations, supporting averments, and analyzing possible result options to build a plausible statement. The research worker will anticipate more accurate consequence with valid and believable informations to develop theoretical apprehension in the development of intercession and betterment medical pattern in oncology and familial biological scienceMentionsBlot, W.J. ; McLaughlin, J.K. ; Winn, D.M. ; Austin, D.F. ; Greenberg, R.S. ; Preston-Martin, S. ; Bernstein, L. ; Schoenberg, J.B. ; Stemhagen, A. ; and Fraumeni, J.F.Smoke and imbibing in relation to unwritten and pharyngeal malignant neoplastic disease. Cancer Research48 ( 11 ) :3282-3287, 1988. Breslow, N. E. & A ; Day, N.E. ( 1980 ) . Statistical Methods in Cancer Research: Vol 1-The Analysis of Case-Control Studies, International Agency for Research on Cancer:Lyon, pp. 1-40, 73-78, 84-115, 122-157, 280-289, 349-351. Breslow, N. E. & A ; Day, N.E. ( 1987 ) . Statistical Methods in Cancer Research: Vol II-The Design and Analysis of Cohort Studies. International Agency for Research on Cancer: Lyon, pp.21, 65, 108-109, 336-344, 363-365. Department of Health and Human Services, Food and Drug Administration. E8 General Considerations for Clinical Trials.Federal Registervol. 62, no. 242, 12/17/1997, 6613-6619. Espina, N. ; Lima, V. ; Lieber, C.S. ; and Garro, A.J. In vitro and in vivo repressive consequence of ethyl alcohol and ethanal on 06methylguanine transferase.Carcinogenesis9 ( 5 ) :761-766, 1988. Garro, A.J. , and Lieber, C.S. Alcohol and malignant neoplastic disease.Annual Review of Pharmacology and Toxicology 30:219-249, 1990. IARC. 1985. Allyl Compounds, Aldehydes, Epoxides, and Peroxides. IARC Monographs on the Evaluation of Carcinogenic Risk of Chemicals to Humans, vol. 36. Lyon, France:International Agency for Research on Cancer. 369 pp. IARC. 1987. Overall Evaluations of Carcinogenicity. IARC Monographs on the Evaluation of Carcinogenic Risk of Chemicals to Humans, Supplement 7. Lyon, France:International Agency for Research on Cancer. 440 pp. IARC. 1999. Re-evaluation of Some Organic Chemicals, Hydrazine, and Hydrogen Peroxide. IARC Kharbanda, S. ; Nakamura, T. ; and Kufe, D. Induction of the c-jun proto-oncogene by a protein kinase C-dependent mechanism during exposure of human cuticular keratinocytes to ethanol.Biochemical Pharmacology45 ( 3 ) :675-681, 1993. McCullough, M. D. ( 2007 ) Australian Dental Journal.Oral Medicine, Rothman, K.J. The proportion of malignant neoplastic disease attributable to alcohol ingestion.Preventive Medicine9 ( 2 ) :174-179, 1999.

Saturday, September 28, 2019

Cybersecurity Vulnerabilities Facing IT Managers Essay

Cyber-security demands are ever increasing in the field of Information Technology with the globalization of the internet. Disruptions due to cyber-attacks are affecting the economy, costing companies billions of dollars each year in lost revenue. To counter this problem corporations are spending more and more on infrastructure and investing to secure the cyber security vulnerabilities which range anywhere from software to hardware to networks and people that use them. Due to the complexity of information systems that interact with each other and their counter parts, the requirement to meet specific cyber security compliances have become a challenging issues for security professionals worldwide. To help with these issues, security professionals have created different standards and frameworks over the years for addressing this growing concern of vulnerabilities within enterprise systems and the critical information they hold (â€Å"Critical Security Controls,† n.d.). Before we get into the details let first examine what exactly is a security vulnerability. By definition a security vulnerability can be flaws in hardware, software, networks or the employees that use them which in turn can allow hackers to compromise the confidentiality, integrity and availability of the information system (â€Å"Common Cybersecurity,† 2011). To thoroughly discuss this topic in more detail I will first discuss Confidentiality as it is one of the three main goals of IT Security. Confidentiality is as simple as it sounds, limiting access to resources for only those that need it. Confidentiality vulnerabilities occur when hackers try to exploits some weakness or flaw  within information system and view information that they are not normally allowed to. In this case the confidentiality of the documents have been compromised. The second goal of IT security which can also be affected if security vulnerabilities are present is Integrity. Integrity by definition can mean many different things for different topics but for the IT world it solely relates to the trustworthiness of a document or resource. This means that the document or file has been unhindered or changed and is still in its original form. This is very important because if data has been hindered or changed it can cause substantial damage to corporations due to the possible wrong decisions being made like investments or unintended publications or even trouble with the law if tax audits are not adding up properly which would all result in a net loss. The last goal of IT security which can be compromised if security vulnerabilities exist is Availability of the information system. Availability refers to the idea that a resource is accessible by those that need it, whenever they need it. In my personal opinion I believe availability is probably the most important out of the three security goals. I say this simply because there are many mission critical applications out there that need to be online 24/7 and any downturn can result in catastrophic results. One prime example of this is the air traffic control towers at LAX; they were having problems with the system a few months back due to the U-2 spy plane flying over their airspace. This caused major panic which grounded taxied planes that were ready to take off and forced the manual tracking of planes already in air (Ahlers, 2014). Throughout this the paper I intend to report on the many different types of cyber-security vulnerabilities available and their effects. I will also describe in detail the vulnerability I feel is the most important facing IT managers today, its impact on organizations and the solution. As I stated before there are many different types of security vulnerabilities out there which can affect the integrity, availability and confidentiality of a resource. So the question still remains what exactly are t hese types of vulnerabilities? Especially since they range from software, hardware, networks and the people that use them. Firstly I will discuss the software vulnerabilities, more specifically in terms of web applications. This is because more than half of the current  computer security threats and vulnerabilities today affect web applications and that number is ever increasing. (Fonseca, Seixas, Vieira, Madeira, 2014). When considering the programming language used to develop web applications you have PHP which is considered a weak language, on the other hand you have Java, C# and Visual Basic which are considered strong languages. It is important to note that the language used to develop the web applications is very important because although the different programming languages are similar overall, each one has different rules of how data is stored, retrieved, the execution methods, tables and so on. For example when I say how data is stored and retrieve, I am basically regarding to data types and data structures and how the programming language that is being used maps their values into type fields like strings for names, Int for numbers, or even Boolean for true and false statements. Overall though even if you are using a strong typed language like Java, it does not always guarantee itself free from defects because the language itself may not be the root cause of the vulnerability but possibly the implementation methods used or even insufficient testing (Fonseca, Seixas, Vieira, Madeira, 2014). Vulnerabilities in web applications invite XSS exploits and SQL injection which are the most common types. Below you can see in the image the evolution of reports caused by SQL injection and XSS exploits over the years. This next section we will discuss some more types of security vulnerabilities, more specifically vulnerabilities with regards to hardware. Many people assume that hardware vulnerabilities have the lowest security concern compared to other types of vulnerabilities like software, networks and people that use them simply because they can be stored up in secure environments. The truth is even hardware vulnerabilities can be easily susceptible to attacks. Hardware in general have a longer lifespan than software because simply with software you can upgrade it and install new patches/builds even after deployment. With hardware you once you purchase it, you are most likely going to keep it for a while. When it does become obsolete and ready to be disposed a lot of organizations make the simple mistake of not securely disposing the old hardware properly which in turn opens up the door for intruders. Old hardware have software programs installed on them and other things like IC transistors whi ch can help  hackers learn a lot more about the organization and help lead to future attacks (Bloom, Leontie, Narahari, Simha, 2012). The most recent example of hardware vulnerability which caused one of the biggest Cybersecurity breaches in history was most recently with Target. 40 million credit and debit cards with customer information was stolen simply because a malware was introduced to the point of sale system through a hardware encryption vulnerability (Russon, 2014). Although hardware vulnerabilities are not normally the root cause for majority of the exploits and breaches out there, it is always still good to follow best practices. Network vulnerabilities will be the next topic of discussion and my personal favorite. Vulnerabilities through network systems are very common especially with the all the resources available to hackers today. There are many open source software programs on the market which can help intruders learn critical information about an organization. Just to name a few of the most popular and commonly used ones include Nmap security scanner and Wireshark. Nmap security scanner was originally developed to be used for security and system administration purposes only, like mapping the network for vulnerabilities. Today it most commonly used for black hat hacking (Weston, 2013). Hackers use it to scan open unused ports and other vulnerabilities which in turn helps them gain unauthorized access to the network. Wireshark on the other hand is also similar to Nmap as it was originally developed for network analysis and troubleshooting. It allows administrators to view and capture all packet resources that passes through a particular interface. Over the years hackers have started using Wireshark to exploit unsecured networks and gain unauthorized access (Shaffer, 2009). Although scanning unused open ports and capturing packets are a great way for intruders to gain access to a network, the most popular method by far to breach a network is USB thumb devices. Most enterprise networks are very secure in the sense that they use a DMZ (De-militarized zone) and outside penetration becomes very difficult. In a de-militarized zone outside network traffic must go pass through two different firewalls to get to the intranet of the organization. The first firewall includes all the commonly used servers like FTP, SMTP and all other resources that can be accessible by the public. The second firewall has the actual intranet of the organization which includes all private resources (Rouse, 2007). Below is the diagram of a DMZ. So the question still remains, since most enterprise organizations use DMZ which in turn helps prevent port scanning or packet analyzing, why is USB thumb devices the most popular network vulnerability? (Markel, 2013) The answer is very simple â€Å"Social engineering†. We as human beings, through social conditioning do not stop and ask questions when were not familiar with someone, which in turn has become one of the major causes for the cybersecurity breaches that occur today. Just to give one example from my own personal experiences at work, each floor has an authentication swipe policy to gain entry. Every time I enter the office area, there are a few people with me and only one person in the group usually swipes his/her badge to open the door. This is a huge security vulnerability because anyone can just follow the group and gain access to the entire intranet of the organization. In my case in particular I work for United Airlines headquarters in Chicago at the Willis tower which is more than 100 stories high and the fact that the entire building is not ours alone, this becomes a huge security concern. While I have briefly explained the vulnerabilities in software, hardware, networks and the people that use them, the question still remains, what is the most important security vulnerability facing IT managers today?. This answer to this questions differs person to person, and one must take into consideration the actual vulnerability, its threat source and the outcomes. A person with a small home business might only be concerned with denial of service attacks, since they may not have enough cash flow to properly secure their network. On the other hand an enterprise organization with large cash flow might have a different prospective and probably does not concern itself with denial of service attacks but instead is focuses on making sure all the systems are upda te using windows server update services. In my personal opinion though, you might have guessed it but it’s definitely us human beings because we have the tendency to fall victims and contribute to the successful security breaches that occur in today’s society. Mateti in his essay â€Å"TCP/IP Suite† stated that vulnerabilities occur because of human error. A study by Symantec and the Ponemon institute showed that 64 percent of data breaches in 2012 were resulted due to human mistakes (Olavsrud, 2013). Larry Ponemon the founder of security research at Ponemon Institute and chairman stated that â€Å"Eight  years of research on data breach costs has shown employees behavior to be one of the most pressing issues facing organizations today†, up by twenty two percent since the first survey† (Olvasrud, 2013). A prime example of this is when I stated earlier about how anyone can just enter my office area without swiping their card, just by simply following the group. This is a form of human erro r when employees are too intimidated to ask questions and request authorization from someone they believe does not work for the organization. The intruder can just walk in the front door pretending to be a salesperson, repairman or even a white collar businessman and may look like someone legitimate but in fact they are not. This intruder now has direct access to the intranet and can install malicious malware on to the computers to disrupt daily operations or even steal sensitive data like confidential project information, release dates, trade secrets and many more. A very good example of this is the Stuxnet worm which infect the Iranian nuclear facilities and caused a lot of damage internally which in turn delayed Iran’s nuclear development. All of the security measures that were put in place by Iran’s cyber defense team were circumvented simply by just one employee because the worm was introduced through an infected USB drive. This simply shows how the direct access from unauthorized users due to employee negligence can cause such tremendous damage and that all the perimeter defense become completely useles s. Another prime example of human errors was the RSA breach in 2011 where cybercriminals thought instead of just sending millions of phishing emails to different random mailboxes, let’s send personalized emails to specific employees. The employees at RSA thinking since it’s a personalized message its â€Å"safe† and clicked on the links unknowingly which in turn caused the malware to be downloaded on to the network. To counter this problem firstly IT managers need to properly train employees and give them specific guidelines to follow. Symantec has issued a press releases with the guidelines on how to properly secure sensitive data which includes information on how to train employees for these types of intrusions. Human error is not just limited to intimation or foolishness, it also expands too many different areas because after all it is us humans who manage the cyberspace, grant physical access to the terminals and systems that are connected to the internetwork. We setup the protocols used for communication, set the security policies and procedures,  code backend server software, create passwords used to access sensitive information, maintain updates on computers and so on (â€Å"Security 2011, † 2011 ). The human element matters very much possibly more than the software, hardware or the network systems especially when it comes to properly securing an internetwork from data breaches. The impact on the organization always depends on what type of business it is and what it is engaged in. For example if an organization is very popular and has bigger presence in the online commerce (Amazon and New Egg) compared to one that does not use the internet quiet often will be more concerned with web based attacks and vulnerabilities. The impact though regardless of the type of organization will always be tremendous. Once a breach occurs not only are you spending on recovering from its effects but you are also spending on beefing up your current security measures by installing new devices, hiring new employees so the same occurrence does not occur again (Hobson, 2008) Sometimes at the end of the day some of the cost are not even recoverable like sensitive data, trade secrets, personnel information or even customer information. Another major cost and headache that occurs once an organization becomes a victim of cybercrime is lawsuits. Many customers who feel that the organization could not protect their confidentiality will sue the corporation for millions of dollars which in turn can cause major loss. IT managers can do many things to help prevent breaches due to human errors. The first thing they can do is properly train the employees as stated above on a periodical basis and use current guidelines like Symantec to properly secure their intranet from any type of intrusion. IT managers can also establish a safe harbor in the sense that they can force employees to periodically change their passwords and establish rules so the password must be certain characters long and must include other types of characters besides just the typical alphanumerical ones. Employee negligence also due to bad habits like sending sensitive data over an unsecured email and IT managers must ensure that they continually educate their employees. There are many different types of security vulnerabilities out there in today’s world that are affecting organizations. In my personal opinion I believe human error is the one vulnerability that affects IT managers the most simply because we as humans make mistakes. It is in our nature and no matter how hard we try we will always be susceptible to deception either through social engineering tactics or clicking dangerous  links because it â€Å"looks safe† or even being negligent by not reporting something unusual. Employees need to realize that their actions can bring terrible consequences for both them and the organization as a whole. References Fonseca, J., Seixas, N., Viera, M., & Madeira, H. (2014). Analysis of Field Data on Web Security Vulnerabilities. IEEE Transaction on Dependable & Secure Computing, 11(2), 89-100 doi:10.1109/TDSC.2013.37 Russon, M. (2014, June 10). Forget Software Vulnerabilities, Hardware Security Must Improve Before It’s Too Late. International Business Times RSS. Retrieved July 12, 2014, from http://www.ibtimes.co.uk/forget-software-vulnerabilities-hardware-security-must-improve-before-its-too-late-1451912 Bloom, G., Leontie, E., Narahari, B., & Simha, R. (2012, January 1). Hardware and Security: Vulnerabilities and Solutions. . Retrieved July 12, 2014, from http://www.seas.gwu.edu/~simha/research/HWSecBookChapter12.pdf Common Cyber Security Vulnerabilities in Industrial Control Systems. (2011, January 1). . Retrieved July 12, 2014, from https://ics-cert.us-cert.gov/sites/default/files/documents/DHS_Common_Cybersecurity_Vulnerabilities_ICS_2010.pdf Critical Security Controls. (n.d.). SANS I nstitute -. Retrieved July 12, 2014, from http://www.sans.org/critical-security-controls Ahlers, M. (2014, May 6). FAA computer vexed by U-2 spy plane over LA. CNN. Retrieved July 13, 2014, from http://www.cnn.com/2014/05/05/us/california-ground-stop-spy-plane-computer/ Most Important Cybersecurity Vulnerability Facing It Managers. (n.d.). . Retrieved July 13, 2014, from http://www.ukessays.com/essays/computer-science/most-important-cybersecurity-vulnerability-facing-it-managers-computer-science-essay.php Security 2011: Attack Of The Human Errors – Network Computing. (2011, December 22).Network Computing. Retrieved July 13, 2014, from http://www.networkcomputing.com/networking/security-2011-attack-of-the-human-errors/d/d-id/1233294? Hobson, D. (2008, August 8). The real cost of a security breach. SC Magazine. Retrieved July 13, 2014, from http://www.scmagazine.com/the-real-cost-of-a-security-breach/article/113717/ Direct, M. (2013, December 20). Human error is the root cause of most data

Friday, September 27, 2019

Succession Planning for a CEO Essay Example | Topics and Well Written Essays - 500 words

Succession Planning for a CEO - Essay Example One of the ways of identifying and recruiting other internal candidates is by considering their experience and qualifications. Even though majority of the board members are well conversant with the banking operations, individual with a bias in the fields of commerce, finance, business administration and economics are in a better position to deal with Lone Star financial problems. The achievement of the board members is another factor that should be considered. Board members who have attained significant achievements during their tenure should be given a priority. Internal recruitment process should be undertaken by the company directors, the current CEO as well as a renowned auditing firm such as the Pricewaterhousecoopers. In this way, the recruitment process will be fair to all candidates. Question3 Lone Star should have a succession plan for the CEO position. Based on the significant nature of the CEO position, the board should ensure that a board member with many years of experience in the bank or any other large financial institution is given a priority.

Thursday, September 26, 2019

Corporate Financial Management Assignment Example | Topics and Well Written Essays - 250 words

Corporate Financial Management - Assignment Example For example a few years ago Starbucks Cafe implemented a practice of donating five cents from every sale of certain beverage products towards the AIDS/HIV cause. Organizations can also improve their character by implementing a code of conduct. The use of ethical audits can help companies improve the company’s process to show greater character. The employees of corporations should also support practices that promote character. To improve their character employees can realize actions such coming to work on time everyday. Character is also developed by employees by giving the maximum effort everyday at work. Teamwork and cooperation are two attributes that show character in the workplace. Taking continued educational courses or enrolling in a graduate program is a great way for employees to promote character. The customers in the marketplace should also promote character in their interaction with businesses. Supporting companies that are socially responsible is way to show character. Customers can also promote character in the business environment by not performing actions such as stealing goods from retail stores. Another way customers can promote character is by boycotting companies that violate environmental and labor

Should Military be mandatory after high school in the U.S Essay

Should Military be mandatory after high school in the U.S - Essay Example In the age of globalization and quick growth in professional management, America demands efficiency and professionalism from the young professionals. Above all, The U.S Military Selective Service Act (War Resisters International) addresses the need of mandatory military service for citizen. So, controversial discussions about the implementation of mandatory military service have caught the attention of public and media in recent years. Generally, people expects proper enrichment in patriotism, proper awareness about rights, duties and responsibilities of a civilian, training, mental and physical fitness among their after high school education. One can find a number of factors which hold up mandatory military service for young people after their high school education. At the initial stage we can see that the country faces severe challenges from international terrorism and economic depression. International community observes the political, cultural and socio-economic changes which happened in the United States. In this juncture, government needs or look forward strong citizens having patriotism and professional skills. Most of the countries have followed either conscription model or universal military training as a part of their national security. Paul Ruschmann rightly informs that; â€Å"America’s twentieth century drafts have followed the conscription model† (Ruschmann 22). Here, selected young men from a special category of those who are eligible and selected to serve the nation. However, young people can use this opportunity to hand round the nation after their high school education. Military service helps the people to comprehend the actual rights and responsibilities of a civilian towards his nation. It offers a precious opportunity for youth to be a part of the process of constructing a nation. At present, people are not aware of their rights and responsibilities towards the

Wednesday, September 25, 2019

Sir Walliam Ramsay Essay Example | Topics and Well Written Essays - 1000 words

Sir Walliam Ramsay - Essay Example Till 1870, he imparted his early education in his native place. He spent his time at Fitting’s laboratory located at Tubingen at the time of preparing thesis on orthotoluic acid and its derivatives succeed him in having the doctorate degree (Tilden & Ramsay 2010, p. 28). Thereafter, Ramsay became the Anderson associate at the Anderson College. In the year 1879, he got inducted as Professor of Chemistry at the University College of Bristol (Tilden & Ramsay 2010, p. 30). Merry moments came in the life of Ramsay when he got married to Margaret, the daughter of George Stevenson Buchanan. They left behind them one son and a daughter. His passion was traveling and learning of different languages (Kauffman 2004, p. 378). When he came to Scotland in the year 1872, he joined as assistant in the chemistry department at Anderson College in Glasgow. Two years after, he acquired similar status at the University. In the year 1880, he assumed the office of Principal and Professor of Chemistry at University College, Bristol. In the year 1887, he joined the Chair of Inorganic Chemistry at University College, London, a coveted position where he took his retirement in 1913 (Tilden & Ramsay 2010, p. 32). The initial work of Ramsay was in the field of organic chemistry. During the period of his doctoral assignments, he published his work on picoline with the connivance of Dobbie with regard to the product of the quinine alkaloids during the tenure of 1878 to 1879 (Thomas 2004, p. 6419). He had written number of articles on picoline and on the decomposed products of the quinine alkaloids. From the inception of eighties, he was actively involved in physical chemistry. His contributions towards chemistry, being the most rewarding contribution in terms of stoichiometry and thermodynamics are considered marvellous. It has helped him a lot for the investigations carried out with Sidney Young on the subject of evaporation and dissociation

Tuesday, September 24, 2019

Differences of Perceptions of the Amount of School Bullying Between Research Paper

Differences of Perceptions of the Amount of School Bullying Between Students and Staff - Research Paper Example The results of the study were illustrated by the answers to the following questions provided by 129 respondents from students and 32 respondents from school staff. The range of questions illustrated different representations of the issues connected with bullying, its prevention and post-reactions for it. In the result of the survey, both teachers and students reflected the presence of bullying at school. First of all, both male and female students confirmed that there were possible fights at school. The students were often arguing among each other. The most interesting fact was that some students were often beaten up by other students or are teased more often than other students. Therefore, it could be seen that both male and female students underlined the presence of a special group or victims of bullying. Moreover, the girls confirmed the presence of arguments or fights more readily than males do. What was important to note was that both males and females felt safe on the playgroun ds and in cafeterias, hallways and school bathrooms, classrooms (more than 70%). Therefore, it can be seen that there were cases of bullying, but students feel safe at school in general. The students were aware of behavior they were expected to show (more than 70%). Fortunately, the students showed a lot of trust for their teachers and principals concerning the issue of school safety. The principles were too severe and strict in their rules of order and teachers were reliable to keep the order at school (69% and 18, 6% respectively). The next set of questions concerned verbal threats at school or cases of physical violence. There were no cases of verbal or physical violence at the school. No alcohol or drug consumption. But there were cases when students... This essay approves that the divergence between the students’ and teachers’ perceptions of bullying was evident. It should be noted that despite the limitations this study might have, it provided new information regarding teachers’ and students’ perceptions of bullying. Both teachers and students agreed upon the presence of bullying at school. It should be noted that teachers were more concerned on evident types of bullying, while students were more aware of concealed forms of bullying. It is possible to underline the necessity of school based interventions for bullying in order to prevent social and emotional problems among students and teachers. This report makes a conclusion that the implementation of anti-bullying programs means determination of the engagement level of interest among students and teachers concerning bullying. Therefore, it is relevant to develop anti-bullying programs at schools and promote intervention policies directed on elimination of bullying practices. Prevention practices are more effective than post-bullying negative outcomes experienced both by the teachers and the students. With the help of this research it is possible to bridge the gap between students and teachers perceptions of bullying by implementation of informing strategies directed on bullying prevention. Practical implications of the study in relation to the recent developments in the research of bullying at school are a perfect basis for logical developments and inventions in this field.

Monday, September 23, 2019

Industry Analysis Research Paper Example | Topics and Well Written Essays - 1000 words

Industry Analysis - Research Paper Example This paper will analyze the competitiveness of Apple Inc in the industry. Application software industry analysis Introduction Apple Inc was established in Cupertino, California back in April 1976. Apple manufactures the Mac OS X operating system, the iWork suite of productivity software and iTunes media browser. Some innovative products include the Final cut Studio that includes professional audio and film industry software. The company has earned a good reputation due to its philosophy of innovation, aesthetic product design and distinctive marketing efforts. In the year 2009, the global sales turnover was $ 42.91 billion (Hoovers 2012). Mac OS X, based on NeXTs OPENSTEP and BSD Unix was launched in 2001 after several years of research and development. Mac OS X combines reliability, security of Unix and ease of the user interface. In the same year, iPod digital audio player was introduced while the iTunes store that offers online music was introduced in 2003. More than 5 billion mus ic downloads had been sold by the year 2008 (Henry, 2008). Microsoft Corporation has its headquarters in Washington that develops licenses and manufacturers different computing products. Some of the product divisions include servers and tools, entertainment, windows and windows live division, and Microsoft business division. Microsoft has not only focused on its software division but also consumer electronics, digital distribution, video games, hardware and online advertising (Hoovers 2012). The mission of the company is to help businesses around the globe to realize their full potential (Ungson & Wong, 2007). Apple Inc has various strengths that make the company competitive in the application software industry. Apple has a considerable market share due to its reputation of innovation. Apple has a competitive pricing strategy and maintains the operating costs lower than Microsoft. Apple has consistently differentiated its products and like the communications and media products. Appl e has achieved customer loyalty due to high quality software than Microsoft software (Hoovers 2012). Unlike Microsoft, Apple Inc has a strong online presence which has enabled the company to attain market leadership in the online sales (Ungson & Wong, 2007). STEEP Analysis Steep analysis refers to the social, technological economic, environmental and political factors that determine the competitive capabilities of the businesses in a particular industry. These external factors influence the competitive strategies that firms in the industry must implement (Hill & Jones, 2009). Social environment The social environment is conducive for Apple Inc business. The world population growth rate is currently high where the youth comprise majority of the population. The level of literacy is high since most of the countries have compulsory education laws thus the demand for application software will remain high. Generally, the US citizens have positive attitudes towards work and use of software products to facilitate the efficiency of work. US citizens desire quality and innovative products thus the demand for Apple’s application software and other media products will remain high (Ungson & Wong, 2007). Technological environment The recent advances in computing and use of the internet to market application software will enhance the market share for Apple (Hoovers 2012). Apple utilizes modern technology in the design and manufacture of its products like the iPhone. Unlike Microsoft

Sunday, September 22, 2019

Why Philosophy Essay Example for Free

Why Philosophy Essay This paper is about the six questions in Philosophy I gave my reasons and belief’s one why I feel a certain way on each of the questions and after reading I hope you have a better take on Why Philosophy 1. Metaphysics: what is real? Well a lot of people would say that real is anything that could be touched, seen, smelled, or tasted using one of the five senses. But as a Christian I have to disagree I believe that you have to have faith in the fact that something’s are real weather or not you can sense them with the five senses. Take heaven and hell I believe that these are very real tangible places although I never seen touch smelled or tasted either one. So how do I know it is real well faith. I have never been to the Grand Canyon but I know that it is real with that being said how we know that heaven and hell is not real. 2. Epistemology: what is the relationship between faith and reason? Reason is to believe what can be proven math and science laws of gravity and physics nothing left to the imagination if you have reason then there is no need for faith. Whereas faith is the belief in things unseen there is a lot of issue with these two and the fact that if you’re a person of reason there is no room for faith the problem with that is that science does not explain everything so there has to be room for faith I without faith life is useless and you don’t have anything to live for. 3. Ethics: Is morality culturally based individually based or is there a universal morality? I have to say that this was a tough one to answer because really the answer is all three. Culturally based morality is learned through the interactions with the people with in your culture usually starting with the parent or guardian. There is also church or the village chieftain. Then there is the individual morality this take place after you been taught and raised and then you choose what to become or what your moral code will be will you protect your fellow man or will you choose to laws of the street. You then have the most unique morality term and that is the universal morality I call this unique because it is not chosen or learn or gained through life experiences it is automatically instilled in all people. Right and wrong which universal to all the most primitive civilizations understand that it wrong to steal or to murder without ever being taught even criminals know this is wrong they choose to do the wrong and willing to except that the consequences. 4. Aesthetic: is beauty truly in the eye of the beholder, or are there some things that all cultures find beautiful? Yes Beauty is in the eye of the beholder everyone one has there on mind when it comes to what is beautiful and what is not some like roses some tulips and so own this is evident in the people we choose to marry. If everyone agreed on what was beautiful then everyone would look the same or strive to be the same people find different things that they find to beautiful. That is not to say that there are things that a culture find beautiful. Let’s take our culture for example people believe that thin woman is what the population of men find beautiful so companies use this fact to exploit that beauty putting them on TVs and billboards. 5. Political Philosophy: How much power should the government have? The government should have a minimal impact on our lives. It is not supposed to bail out private businesses increasing the national debt. The government is not supposed to control the populace it is the populace that control the government. It is not the job of the government to make the decisions for the people. That is the problem with the government today they have too much power. 6. Social Philosophy: How should humans behave in a society? Humans in most cases depend on society to live and in order to function in a society there are certain rules that apply one being laws. Also respect for the others in that particular society. Freedom of speech and some other rights are lessened due to the infringement of other people’s rights. The rules are followed because of the convenience of living in a society. Such as supper markets gas station and things like these. Now if one was to live in the wilderness most of these rules would not apply for there would be no one’s rights to intrude on allowing them to do as they please but some rights have to be given up for the sake of the better good in a society.

Saturday, September 21, 2019

Planning And Strategic Management Management Essay

Planning And Strategic Management Management Essay Nestle is the worlds leading nutrition, health, wellness company. The headquarter of Nestle company is located in Vevey, Switzerland. That is in 1866, there was a first European condensed milk factory opened in Cham, Switzerland. The name of the company is Anglo-Swiss Condensed Milk Company which established by brothers George Page and Chatles Page. After that year, the founder of Nestle, Henri Nestle, a German pharmacist, developed a combination of cows milk, wheat flour and sugar, which name as Farine Lactee. The launched of Farine Lactee had become the largest competitor of Anglo-Swiss Condensed Milk Company. In 1905, Nestle merged with Anglo-Swiss Condensed Milk Company after a couple of decades as fierce competitors to form the Nestle and Anglo-Swiss Condensed Milk Company. In 1929, the chocolate company Peter, Cailler , Kohler Chocolats Suisses S.A. joined Nestle. And in 1947, Nestle change its name to Nestle Alimentana S.A after merged with Maggi, a well-known manufacturer of seasonings and soups. In 1974, Nestle for the first time diversified outside the food industry and they become a major shareholder in LOreal, one of the worlds leading maker of cosmetic products. And then finally, the last name change that the company would endure was in 1977, where it adopted the name Nestle S.A. The first product that launched by Nestle is Farine Lactee Nestle, a combination of cows milk, wheat flour and sugar. Farine Lactee was launched by Henri Nestle in 1867 and it was supported by the public. After that, Nestle also launched Milo in 1934. Milo is a chocolate and malt powder which is mixed with hot or cold water to produce a beverage and it is developed by Thomas Mayne in Sdyney, Australia. After the launched of Milo, another product launched by Nestle that famous among the world which is Nescafe. Nescafe is a powdered coffee that was introduced in Switzerland on April 1, 1938 after being developed for seven or eight years by Max Morgenthaler and Vernon Chapman. Another product that pull Nestle toward success is Nestle Pure Life, a bottled mineral water that launched in 1998. The smart strategy of Nestle had bring them toward the road of success. In 2012, Nestle has around 8,000 brands on the market included coffee, bottled water, milkshakes and other beverages, breakfast cereals, infant foods, performance and healthcare nutrition, seasonings, soups and sauces, frozen and refrigerated foods, and pet food. Organizational chart Chairman P.Brabeck-Letmathe Chief Executive Officer Nestle Health Science P.Bulcke L.Cantarell Corporate Governance Compliance Corporate Human Corporate Services Communication Resources D.P.Frick R.Ramsauer J.M. Duvoisin Operations Finance Strategic, Business Units, Innovation Technology and RD Control Marketing and Sales J.Lopez W.L. Martello P.Bula W.Bauer Nestle Waters Nestle Nutrition Nestle Professional J.J. Harris K.Schmidt M.Caira Zone EUR: Zone AOA: Zone AMS: Europe Asia/Oceana/Africas Americas L.Freixe N.Nandkishorr C.Johnson The organizational chart of Nestle showed that it is a hybrid structure. Hybrid structure is the combination of functional structure and divisional structure. A functional structure is a structure that make grouping by similar work specialties. This structure group people together because they hold similar positions in an organization, perform a similar set of tasks, or use the same kind of skills. The functional structure in the organization chart of Nestle was shown in the upper part that is from the chairman until the level of the Operations, Finance Control, Strategic, Business Units, Marketing and Sales as well as Innovation Technology and RD. A divisional structure is a structure that make grouping by similarity of purpose. This structure group departments according to organizational outputs such as by product type, customer, or geography. The divisional structure in the organization chart of Nestle was shown in the lower part. There are product divisional structure that is Nestle Waters, Nestle Nutrition, and Nestle Professional. After that, it continues with the geographic divisional structure that is Zone EUR: Europe, Zone AOA: Asia/Oceana/Africas and Zone AMS: Americas. The hybrid structure of Nestle consists all the advantages of functional structure and divisional structure. This structure helps to creates unity among the staff members which is very important for all the large-scale business as well as Nestle. This structure also make the management more flexible as the senior management can communicate with the junior employees easily and maintain good relationship between each other. Besides that, the resources can be allocated and used efficiently. Therefore, wastage of time and resources can be avoided. Planning and Strategic Management Basic strategies used to respond to uncertainty Nestle is a company that mainly act as a prospector while responding to uncertainty. Prospectors focus on developing new products or services and in seeking out new markets, rather than waiting for things to happen. Nestle had create many brands and many different types of products to satisfy consumers needs and wants. The table below showed the list of product of Nestle. Types of Products Brand Baby foods Cerelac, Gerber, Gerber Graduates, NaturNes, Nestum Bottled water Nestle Pure Life, Perrier, Poland Spring, S.Pellegrino Cereals Chocapic, Cini Minis, Cookie Crisp, Estrelitas, Fitness, Nesquik Cereal Chocolate confectionery Aero, Butterfinger, Cailler, Crunch, Kit Kat, Orion, Smarties, Wonka Coffee Nescafe, Nescafe 3 in 1, Nescafe Cappuccino, Nescafe Classic, Nescafe Decaff, Nescafe Dolce Gusto, Nescafe Gold, Nespresso Culinary, chilled and frozen food Buitoni, Herta, Hot Pockets, Lean Cuisine, Maggi, Stouffers, Thomy Dairy Carnation, Coffee-Mate, La Laitià ¨re, Nido Drinks Juicy Juice, Milo, Nesquik, Nestea Food service Chef, Chef-Mate, Maggi, Milo, Minors, Nescafe, Nestea, Sjora, Lean Cuisine, Stouffers Healthcare nutrition Boost, Nutren Junior, Peptamen, Resource Ice cream Dreyers, Extrà ªme, Hà ¤agen-Dazs, Mà ¶venpick, Nestle Ice Cream Petcare Alpo, Bakers Complete, Beneful, Cat Chow, Chef Michaels Canine Creations, Dog Chow, Fancy Feast, Felix, Friskies, Gourmet, Purina, Purina ONE, Pro Plan Sports Nutrition PowerBar Weight management Jenny Craig In the effort of seeking out new markets, Nestle had employed around 330 000 people in over 150 countries and have 461 factories or operations in 83 countries. Nestle also becomes one of the sponsors in many events. For example, on 27 January 2012, the International Association of Athletics Federations (IAAF) announced that Nestle will be the main sponsor for the further development of IAAFs Kids Athletics Program for the consecutive of 5 years starting from January 2012. This is one of the biggest grassroots development programs in the world of sports. In the year 2012, Nestle expect that it will be a challenging year as they will face many uncertainties in the global economy and. However, as a prospector, the company had made specific plans to overcome the uncertainties. They believe that they have good fundamentals and can will be able to diversify the global uncertainties. Nestle aim to continue the innovation and renovation of their products as well as launching further promotion of nutritional diets and healthy lifestyles Nestle will remain vigilant and will take all necessary method to soften any impact on their business due to the volatile commodity prices that were expected to continue in 2012. Besides that, Nestle company can also be consider as an analyzer. Analyzers let other organizations take the risks of product development and marketing and then imitate or perhaps slightly improve on what seems to work best. For example, Nestle was Gail Bordens most successful imitators in the production of milk. Nestle imitate and make changes based on the condensed milk manufactured by Bordens first canned milk factory. Nestle invented a powdered milk food that primarily composed of cows milk and then mixed with water. By 1868, this product was being sold in Switzerland, Germany, France and England. After five year, the product was available throughout Europe. Eventually, Pet Milk and Carnation Milk were produced and sold in United States. In the 21th century, humans wants are unlimited. Therefore, Nestle create new brands on the products that already exist in the market and are needed for the consumers to widen their choice. Mission and Vision Nestles mission is to be the recognized leader in Nutrition, Health and Wellness and the industry reference for financial performance. Good Food, Good Life is the promise they commit to everyday, everywhere to enhance lives, throughout life, with good food and beverages. Nestles vision is As the leading Nutrition, Health and Wellness Company we enhance lives by offering tastier and healthier food and beverage choices at all stages of life and at any time of the day, helping consumers care for themselves and their families. This is the foundation of our promise of Good Food, Good Life and puts nutrition at the heart of everything we do. It is our firm belief that, for a company to be successful over time and create value for its shareholders, it must also create value for society. We call this Creating Shared Value. Built on strong foundations of compliance and sustainable business practices, this is our way to do business and to be the trusted leader in Nutrition, Health and Wellness. SWOT analysis Grand Strategy Grand strategy is a systematic, comprehensive, long-term plan of all the company use to achieve their goals. Market, product, and organization development is the main element of this strategy. There are three types of strategy such as growth strategy, stability strategy and defensive strategy. Growth strategy involves the expansion of a company. Stability strategy is a strategy there are no-change strategy or little change strategy. Defensive strategy is a control to reduce the probability of loss. Nestle is a company that apply growth strategy. Nestle started the business in the year 1866 with the first European condensed milk factory and today becomes the worlds biggest food producer. The products of Nestle such as milk, beverages, coffee, ice-cream, confectionery and chocolate as well as junior food, has make a sales of CHF 44.1 billion in 2012 from CHF 74,660 million at 1999. The net profit increased by 8% to CHF 9.5 billion with the latest update on 9 August 2012. Now, Nestle had employed around 330,000 people in over 150 countries and have many operations or factories in the world compare to the number of employees in 1998 that only have 299,800 people. Besides that, Nestle is increasing the size of their company year by year. One of the strategies is organizing many different types of promotion. They give discounts to customers by using coupons. For example, Nestle Toll House Birthday Sugar Cookies can save 55$ if we print out the coupons to buy it. In addition, Nestle also provide food samples to customers during promotion. For instance, free samples of Maggi MeeGoreng were given out on 2nd  July 2012 to 2nd  August 2012. These were the successful strategy of Nestle nowadays. Nestle begin the business in 1866 with the combination of cows milk, wheat flour and sugar. After 1 year, infant cereal developed for a whole new world to babies. Next, Milo, Nescafe, Nestea, Nestle Pure Life, and Power Bar were launched in the years after 1929. Although these products launched, they merged with another company such as Maggi merged with Ursina-Franck. Nestle took the high risk of investment in the following year such as joint venture with LOreal, General Mills, Coca-Cola and Fonterra. In conclusion, Nestle is trying their best in the sales of products. they have smart plans to overcome the uncertainties. Growth strategy was used to increase their capital and Nestle will invest new products and new markets in the future. Competitive Strategies Nestle mainly focused on differentiation strategy. Nestle is a quality focused company. They differentiate their products with their competitors by giving them better customer satisfaction and quality with in an acceptable price limit. All their market is based on quality products and customer satisfaction. The main factor that motivates a customer is to buy their goods is the nutritional content in their products. They also focused on creating a strong brand by creating brand equity. In order to have a better quality on their products, Nestle had created Nestle Nutrition, which is a global business organization designed to strengthen the focus on their core nutrition business. They believe that strengthening their leadership in this market is the key element of their corporate strategy. In order to reinforce their competitive advantage in this area, Nestle created Nestle Nutrition as an autonomous global business unit within the organization, and charged it with the operational and profit and loss responsibility for the claim-based business of Infant Nutrition, HealthCare Nutrition, and Performance Nutrition. This unit aims to deliver superior business performance by offering consumers trusted, science based nutrition products and services. In order to produce a better quality product, Nestle had made an effort on research and development. Research and development is a key of competitive advantage for Nestle. Without research and development, Nestle could not have become the leader in food and beverage industries. With 29 research, development and technology facilities worldwide, Nestle has the largest research and development network compare with other food company. Based on the research and development done by Nestle, they are able to produce many products that have a high quality in nutrition, wellness, taste, health, texture or convenience. Besides that, Nestle also use cost-leadership strategy for minor products. Nestle had used a new strategy called Nestles Popularly Positioned Products (PPPs) strategy that provide consumers with high-quality, nutritious products, regardless of where they sell them and the price point at which they sell them. PPPs focuses on the specific needs of 3 billion lower-income consumers worldwide. PPPs offer these consumers the opportunity to consume high-quality food products that provide nutritional value at an affordable cost and appropriate format. With a range of locally adapted distribution methods, including street markets, mobile street vendors and door to door distributors, PPPs are a source of income for street traders and individual distributors and contribute to the creation of local jobs. Recommendation Utilizing the identified strengths and opportunities Overcome the identified strengths and opportunities Conclusion Overall achievement Firstly, on 21 May 2012, Nestle was in the rank of No. 18 in The Gartner Supply Chain Top 25. The Gartner Supply Chain Top 25 is about leadership. Nestle has created a successful supply chain segment for its popular Nespresso line. Nestle is also highly advanced and integrated in its raw material sourcing strategies, and has invested significantly in supply development and innovation. Moreover, on 12 April 2012, Nestle becomes the first food and beverage company that receives A+ rating, which is the highest standard in Global Reporting Initiative (GRI) for Creating Shared Value report. This shows that Nestle do take seriously their responsibility to create shared value and conduct their business in a sustainable way. Next, Nestle won the ACCA Malaysia Sustainability Reporting Award 2011. This was because Nestle use Sustainability Reporting to communicate to stakeholders regarding the progress of their Creating Shared Value strategy, which is to create value simultaneously for society and their shareholders while carrying out our business activities. On 19 May 2011, Nestle receives top environment award which is the 27th World Environment Center (WEC) Gold Medal award for its commitment to environmental sustainability. This shows that Nestle was recognized as a global company that has demonstrated an example of sustainability in business practice. Furthermore, on 7 June 2011, Nestle became winner of the Stockholm Industry Water Award for its leadership and performance to improve water management in its internal operations and throughout its supply chain. Nestle also has a leading role in the 2030 Water Resources Group. Besides that, in July 2010, Nestle Malaysia was crowned as a winner of the Asia Responsible Entrepreneurship Awards 2010 (AREA). This awards show that Nestle was recognized as an organization that have shown a lot of efforts, perseverance and courage in corporate social responsibility initiatives. Last but not least, Nestle won the StarBiz-ICR Malaysia CR Awards in the year 2009. Nestle was one of the seven public-listed companies which were recognized and honoured for their outstanding Corporate Responsibility practices at the StarBiz-ICR Malaysia CR Awards 2009 presentation ceremony. (Management, 2012) (Brands, 2012) (Nestle is, 2012) (Nestle becomes main sponsor of IAAF Kids Athletics programme, 2012) (Message to Shareholders (Annual Report 2011), 2012) (Reports Downloads, 2011) (Nestle is, 2011) (The Gartner Supply Chain Top 25 for 2012, 2012) (Insight: The challenges of achieving greater transparency, 2012) (Nestle Wins ACCA Malaysia Sustainabiliti Reporting Award 2011, 2011) (Nestle receives top environment award, 2012) (Nestle Wins the Stockholm Industry Water Award, 2012) (Awards and Recognition, 2012) References and Appendixes

Friday, September 20, 2019

The Spanish American War :: essays research papers

  Ã‚  Ã‚  Ã‚  Ã‚  Most may think that the Spanish-American War was a war between the Americans and the Spanish. Most are right, but only to a point, because the Spanish-American War also included wars between the Americans and the Filipinos, as well as between the Americans and Puerto-Ricans. Reasons for these wars occurring are obvious to the history connoisseur, but to the normal individual, they may not be so distinct.   Ã‚  Ã‚  Ã‚  Ã‚  America has been a country of great power for years, and that power has come not only from years of hard work and fighting, but also from years of audacity. About one hundred fifty years ago, the United States began sending armed forces to foreign countries in an effort to attain each individual country’s opulent resources. This commanding attitude taken by the United States government spread into the American people as well, with corporate giants such as Rockefeller and Morgan, who controlled large parts of American business with monopolies over the railroads and oil industry. Events such as the Spanish﷓American War and interference in the Philippines marked the indisputable beginning of American imperialism. Invasions such as these propelled United States capitalist expansion and produced the ideas of economic expansion in government as well as in homes.   Ã‚  Ã‚  Ã‚  Ã‚  The Philippines played a larger part in the Spanish-American War than most may like to believe. The Philippine-American War as it could be called is forgotten to most everyone in all of United States Military history. The events that occurred in the Philippines could be mildly compared to the events that occurred nearly seventy years later in Vietnam. The reasons for the war occurring at all are directly related to the Filipino’s attempts to gain independence from Spain. Lead by Emilio Aguinaldo, the Filipino people fought for one year for independence from Spain with a shortage of weapons, ammunition and food. A treaty with the Spanish Authorities was forced in 1897, and Aguinaldo and his government were forced into exile with payment of four hundred thousand pesos. American Consuls residing in many Asian countries, as well as Hong Kong, where Aguinaldo was exiled to, agreed with Aguinaldo to give the Philippines independence, as long as they helped the Un ited States defeat the Spanish. Commodore George Dewey of the United States Navy was to lead Aguinaldo back to the Philippines. He only brought Aguinaldo back to Luzon, the northern-most island of the Philippines. Dewey continued to refuse to support Aguinaldo now though, and Aguinaldo once again controlled the Philippines, which was still under attack by Spanish forces.

Thursday, September 19, 2019

The Factor of Consolidation of the Mankind :: Philosophy Philosophical Papers

The Factor of Consolidation of the Mankind Works Cited Missing ABSTRACT: The aspiration of people almost everywhere to construct a public life on the basis of justice is the predominant tendency in the historical development of humankind. The natural world in which we dwell is, from the standpoint of our using its resources to satisfy our vital needs, one and indivisible. Thus, the public conditions of human activity in the economic, social, and political spheres should be brought into harmony with nature's conditions. This requires the consolidation of the efforts of nations and peoples-their mutual integration. The significance of spiritual and philosophical preconditions of this process is crucial, as the transformation of society on the principles of justice, from the standpoint both of history and of present-day reality, is possible only on the basis of knowledge of the foundations of human vital activity. I discuss efforts being made toward this end in the young, independent nation of Uzbekistan, there are certain. In our epoch the alarm is being heard: it is reminding peoples, countries, states and governments that mankind, in it's historical development, for a long time has approached that responsible boundary, where the problem of the universal construction of public life on the basis of justice assumes the role of a certain categorical imperative. The present approach has been prepared historically, economically, technologically, socialogically, politically, and, above all, — spiritually. Everything: labour, morals, art, religion, family, ethnic and national communities, state formations, science and etc. have the purpose, directly or indirectly, of reaching the utmost generalized integrative purpose of all people of the Earth, — to have a happy life, worthy of a human . The way to acheive this goal was long and thorny. It wasn't easy to understand that fairness must become a reality for all, or it would not exist for anyone. I.e., it should not be reached for some at the expense of or infringement of the rights of others. Our planet, the Earth, is the home of all mankind. The human race is uniform. The natural resources allocation of the Earth, — the dwelling of mankind, — isn't proportional to frontiers. Hence, the economic, technological, social and political development of mankind should be also integrated, working together in unison and precise balance. By means of an ideologically contributing factor there can appear, first of all, spirituality, as a generic attribute of mankind, representing the profound, motivating, incentive substance of its vital activity.

Wednesday, September 18, 2019

Euthanasia Needs to be a Legal Option Essay -- Argumentative Persuasiv

Euthanasia Needs to be a Legal Option    "Warren Hauser is dying. Should the Supreme Court decide that terminally ill Americans have a constitutional right to commit suicide with a doctor's help, he would qualify. Emphysema and valvular heart disease have left him debilitated and physically dependent" (Byock). For terminally ill patients like Warren, where death is inevitable and would be less painful than living, euthanasia should be a legal option. Euthanasia is Greek for "easy or happy death" and implies measures deliberately taken by a physician to curtail pain and suffering. This concept has been enlarged to include such action in incurable diseases, especially those in which the patient must endure torment and extreme pain and/or is terminally ill ("Euthanasia"). Euthanasia is the intentional killing by act or omission of a dependent human being for their alleged benefit. If the death is not intended, it is not an act of euthanasia, so the key word is "intentional." Assisted suicide is when a person provides an individual with the information, guidance, and means to take their own life. When a doctor helps them take their life, it is labeled physician-assisted suicide. However, there is no euthanasia if what was or sometimes was not done does not intentionally cause the death. In some cases, medical actions are labeled "passive euthanasia" since the intention of taking life is lacking. Active euthanasia is intentionally cau sing a person's death by performing an action such as giving lethal injection ("Euthanasia Definitions"). Passive euthanasia can be more painful because neglecting care for a terminal patient puts them through more suffering and pain than active euthanasia, which speeds up death and avoids pain and s... ...bout/newsday.htm>    Hendin, M.D. Herbert. "Scared to Death of Dying." American Foundation for Suicide Prevention 8 Dec. 2002    Hippocrates. "The Oath." The Oath. 16 Dec. 2002    Humphry, Derek. "Prisoner of Conscience." Who's Who and What's What 10 Dec. 2002    Larue, Gerald A. "Patients Should Decide." Opposing Viewpoints. Neal Bernards. San Diego: Greenhaven Press, Inc 1989.    Moreland, J.P. Dr. "Active and Passive Euthanasia." Stand to Reason 10 Dec 2002    "Right to End Suffering Asserted." Facts on File News Services. 8 Dec 2002       "We can try to avoid making choices by doing nothing, but even that is a decision." -Gary Collins   

Tuesday, September 17, 2019

Write a detailed character study on Heathcliff, focusing on the theme of evil and the question of whether he might really be a demon

Heathcliff arrives in the summer of 1771, a small, withdrawn boy. The old Mr. Earnshaw found him in the streets of Liverpool, and feeling compassion for the dirty, ragged black-haired child, he took him back to Wuthering Heights. He becomes an adopted member of the Earnshaw family and as they know nothing about him background he is immediately labelled as a gypsy and destined to remain an outsider, in exile from society due to his actions and personality. Straight away, his actions begin to put him apart from other people. He is a â€Å"sullen, patient child; hardened perhaps, to ill treatment†. An example of this is when Hindley throws a rock at Heathcliff, and, instead of crying he receives the blow and gets up again. Hindley sees Heathcliff as a usurper of his father's affections, and he grows bitter because of this, referring to Heathlcliff as an â€Å"imp of Satan†. Heathcliff let each incident like this pass, and showed no outward emotion towards his abuser. Instead opting to ‘bottle it' and let his vengeance build up, e.g. â€Å"I'm trying to settle how I shall pay Hindley back. I don't care how long I wait, if I can only do it, at last. I hope he will not die before I do†. For Heathcliff, the world becomes an increasing trying place to be in – either to be shrunk back from, or lashed out at. To cope with the torrent of abuse directed at him from almost everyone he meets, he takes on a ‘devilish' character. After adopting this role, he uses it to get revenge by making everyone else's life as difficult as possible. While Heathcliff is pondering on how to get back at Hindley and the others, he becomes oblivious to any insults or hardship he comes across; allowing it only to stoke the fire of revenge and letting him be secure in the fact that they shall get what is due in time. For example when asked why he should not leave retribution to God, Heathcliff replies â€Å"No, God won't have the satisfaction that I shall. I only wish I knew the best way! Let me alone and I'll plan it out: while I'm thinking of that, I don't feel pain. Although at this point, Heathcliff could be called evil for making people's lives around him miserable, even Nelly, with her simplistic view of the situation decided that Hindley, because of Frances' death, had become so malicious that it â€Å"was enough to make a fiend of a saint†. This is not enough to let Heathcliff completely off the hook though as Hindley's actions are partly justified and Heathcliff interprets them differently, as he is quite young (all he sees is the abuse, not the reason why the abuse is given). In this way, Heathcliff's actions later in the novel are partly down to his naivety/ignorance when confronted with certain situations. Heathcliff is not especially bright (at least consciously). This means that he sometimes does not take all of the factors of a situation into account when he makes up his mind to do something. Something I think Heathcliff has extreme difficulty in interpreting other people's actions through their perspectives. For instance when Hindley threw a rock at Heathcliff when he was younger, Heathcliff only saw Hindley as the person who hurt him, not Hindley as an insecure boy who saw his father being taken away from him. Even Catherine did not see or help Heathcliff understand this, she only served as a catalyst that made Heathcliff want to look strong and think of better times when they would be together. As life at Wuthering Heights was continually wearing him down, Heathcliff's assumed character began to assert itself even more. The next paragraph illustrates this; â€Å"He had, by that time, lost the benefit of his early education: continual hard work, begun soon and concluded late, had extinguished any curiosity he once possessed in pursuit of knowledge, and any love for books or learning.† And also; â€Å"Personal appearance sympathised with mental deterioration; he acquired a slouching gate, and ignoble look† They serve to make evident that the hard physical labour, combined with the mental anguish Heathcliff is constantly suffering is taking its toll. Heathcliff loses all interest in bettering himself and conforming to established rules of etiquette and society. Instead he becomes withdrawn and so subdued that it seems as though he wakes up only to get the day over with. â€Å"He took a grim pleasure, apparently, in exciting aversion rather than the esteem of his few acquaintance†. When Heathcliff returns after running away, his character is more refined, cleaner and less confused. He no longer has mixed emotion and acts as if he has a plan to apply to life and steadily works on each waypoint towards the final goal. â€Å"A half-civilised ferocity lurked yet in the depressed brows, and eyes full of black fire, but it was subdued; and his manner was even dignified, quite divested of roughness though too stern for grace†. It shows how Heathcliff still has the strong, passionate outward shell. But inwardly he has learned to control how he reacts. The alternate ‘evil' side has completely taken over, leaving Heathcliff emotionally cold, yet bent on revenge. Only now he is equipped to carry it out using his head rather that his hands. He knows how he is to accomplish it and will stop at nothing to finish what has been started. It is noticeable that he does not try and hide what he is doing. Instead giving ‘deep' speeches to anyone who will stand to listen. His craving for revenge is so intense that it seems to ‘leak' as an aura around his body and disrupt the lives of those who come into contact with him. Has but to speak to cause tempers to flare, emotions to rise, and situations to go to excess. The realisation that Heathcliff has not changed in his attitude since going away is to late for action to be taken to stop it and the ‘groomed' version of Heathcliff is described as he was when he first arrived. â€Å"An unreclaimed creature, without refinement – without cultivation; an arid wilderness of furze and whinstone.† He bends people towards his will with ease, and before they know it he has coolly, calmly, and collectedly used them for his own purpose and then dropped them with nothing. Edgar sums up Heathcliff to a poignant sentence; â€Å"Your presence is a moral poison that would contaminate the most virtuous.† And, as Isabella writes after she has eloped with Heathcliff; â€Å"Is Mr Heathcliff a man? If so, is he mad? And if not, is he a devil?†. Isabella does not explain what Heathcliff has been doing, but to constitute the above questions, it cannot have been normal. Heathcliff's revenge plan begins to fall into place when he confronts Hindley in his house. Catherine again acts as a catalyst by confining the two to a room and Heathcliff manages to rile Hindley so much that he draws a gun and knife on him. Hindley realises that he has been duped out of his house, his money, and all his possessions and wants to kill Heathcliff for it. â€Å"Oh, damnation! I will have it back; and I'll have his gold too; and then his blood; and hell shall have his soul! It will be ten times blacker with that guest than it ever was before!†. Heathcliff must have been pleased to see that Hindley was now suffering in the same way that he had and also that he had mostly accomplished what he came for. Heathcliff's effect can also be illustrated by the change in appearance and character of Isabella. When she first eloped with Heathcliff, she was young, naà ¯Ã‚ ¿Ã‚ ½ve, and very outgoing. When she came back however; â€Å"she already partook of the pervading spirit of neglect which encompassed her. Her pretty face was wan and listless; her hair uncurled; some locks hanging lankly down, and some carelessly twisted round her head. Probably she had not touched her dress since yester evening.† A double side to Heathcliff begins to emerge when Catherine begins to get ill. Edgar hides in his books and studies as anything he does will not help her to recover, while Heathcliff continues his vendetta when he could help Catherine. The only thing stopping him is Catherine's love for Edgar. â€Å"The moment her regard ceased, I would have torn his heart out, and drank his blood! But, till then, I would have died by inches before I touched a single hair of his head!† This shows that although Heathcliff's ‘darker' side is plainly visible, he has a set of morals that he stands by. One of them being that any close friends of those who have no revenge due are out of the firing line as far as a vendetta goes. Heathcliff succeeds in gaining all the material possessions he wants but does not have ‘the icing on the cake'. Because of this, the intensity of his need for more revenge grows exponentially and he becomes even malevolent as he bottles even more anger. â€Å"I have no pity! I have no pity! The more the worms write, the more I yearn to crush out their entrails!† Catherine remains self-centred and, as a final example, drives Heathcliff insane by refusing him any pity. Heathcliff finally loses his drive for retribution and lets his true feelings be known. He loves Catherine, and she loves him, but settling both of their scores kept them sharing their final goal – being together. To conclude, I will decide that Heathcliff is indeed not the Devil, but has had all of the worst coincidences happen to him that lead to him being as unnatural as he is. An extremely bad childhood, combined with his lack of intelligence and empathy, finally amalgamated with the fact that he has very strong emotions anyway make Heathcliff's actions easy to understand, yet hard to forgive. A large number of headstrong characters, isolation, and two sets of conflicting values made distress highly unavoidable. Therefore Heathcliff is a product of circumstance and misfortune rather than the spawn of the Devil or a wild beast.

Monday, September 16, 2019

Lord of the Rings: the Ring’s Addiction Essay

â€Å"One ring to rule them all, One ring to find them/ One ring to bring them all and in the darkness blind them/ In the land of Mordor where the shadows lie.† (p. 8) This was said at the beginning of the story telling a brief summary of the ring of Sauron. The poem tells you how the ring will blind you to the point that the need that you will feel of it will be bigger than anything in the world. It will be so big that it becomes an addiction, worse than any drug in the word, because there is no cure for it, and the only way you can save yourself is by the destruction of this powerful ring. Addiction, this is what the ring symbolizes; a psychological need to have something. It changes everything in you. First, it wins you over and then, you will never be the same person. Addiction can change anyone from the best person you have ever known to the worst. It controls and blinds you to the point where you lose yourself. We see this addiction mostly in every character in the story; even the most powerful were tempted by it. In the book we see the addiction of the ring in many different ways throughout many different characters; three of these different ways are: the possession of it, the fear of losing it, and the wanting of it. We first see the change of the characters when they have in possession of it throughout Gollum and Bilbo, then throughout the story we begin to see it in Frodo, but it will grow stronger and stronger every second of every day. Gollum wasn’t always this repulsive creature, but he was a regular hobbit named Smeagol; he was just another victim of the ring. He possessed the ring for approximately five hundred years, and not much of a surprise this ring ruined him fiscally and emotionally. The fist terrible thing he did for the possession of the ring was to kill his brother; then he went to a cave and stood there all alone with only the company of â€Å"his precious†, the ring of Sauron. He turned from this hobbit to an old deformed nasty creature who was kept alive because of the ring, he became a cannibal, he only lived to see that ring every day, and since the first time he saw the ring he was just another slave, another addict to that â€Å"drug†. He now has two sides, Gollum and Smeagol. Gollum was his nasty evil side who was created by the ring and the possession of it for so long, and Smeagol was his still hobbit side which was innocent and in a way bullied and ruled by Gollum; he was a slave in him own body and he couldn’t control himself anymore, because he was loosing sense of who he was. Some may say Gollum is pure evil and deserved to die, like Frodo said at the beginning of the story. We see in the story that Tolkien never referred to Gollum as Smeagol because even though he may fool others and even himself Gollum had evil in him, and that would never change. We also see changes in Bilbo Baggins, but not as big as a change like we see in Smeagol, maybe because Smeagol had it for a longer time and was all alone in a cave for several years. Bilbo’s change wasn’t so big, he had to feel the ring close to him always but he didn’t lose himself as much as Smeagol. This doesn’t change the fact that he was obsessed by the ring. In â€Å"The Fellowship of the Ring† we see Bilbo’s change when Gandalf asks him to leave to ring to Bilbo as he has left everything else, and because of that Bilbo shouts to Gandalf, â€Å"Well, if you want the ring yourself say so! But you won’t get it. I won’t give my Precious away, I tell you.†(p. 34). This is when we see that hint of Gollum in Bilbo, when he calls the ring his Preci ous, a clear sign that he is transforming into Gollum one day at a time. Gandalf was very shocked and got very angry because he could not believe what he heard and how his old friend Bilbo believes he was convincing him to leave the ring for his own pleasure, when he was only trying to convince him so that he would not turn into Gollum or anything near him (but he almost did). He finally left the ring to his nephew, but with Frodo we don’t actually see a change in him throughout these two books but we do see how the ring is temping him to put it on so Sauron can find it, we also see how Frodo is very protective of the ring, such as Bilbo and Gollum, who thought that everyone was going to take it away from them (and sometimes, actually most of the time it was a true feeling). Another change we see because of this addiction is the fear of losing it. Like all Drug addicts, when you don’t have the drug, and you desperately need it you transform into another person who would do anything to have the â€Å"drug† (in this case the ring); again, the best example for this is Gollum who even after losing the ring always followed Frodo through the entire story with the hope of having the chance of taking the ring back so he can again be with â€Å"his preciousâ€Å". In the book we see that in many parts Frodo and others of the company like Gandalf and Strider see a shadow of a creature following them and in time Gandalf explained that it is actually Gollum. He will never accept the fact that the ring is with someone else because he needs it, he needs his drug. Finally the last type of addiction we see is the wanting of the ring. We see this addiction in many characters, even in people in the company of the ring especially in Boromir the general of Gondor. We see the this need of Boromir in taking the ring away from Frodo mostly at the end of the story when he transforms himself into this violent person because he wanted the ring from Frodo supposedly to save his people. Two of the most impressive changes we see in Gandalf and Galadriel, but their wills were strong enough to pass the test and succeed in denying the ring. In Gandalf we see it at the beginning of the story when Frodo was very scared and offers Gandalf this powerful ring. Even though he was very tempted by the ring in the book he said, â€Å"No! With that power I should have power too great and terrible. And over me the ring will gain a power still greater and more deadly† (p. 61). This showed how strong he really was and with this he passed the test. With Galadriel we see it later in the book when Frodo said to her, â€Å"You are wise and fearless and fair, Lady Galadriel. I will give you the one ring if you ask for it.† (p. 365). After this she explains that her heart desires the ring very much and now she is being offered it freely by Frodo and then she said, â€Å"†¦And I shall not be dark, but beautiful and terrible as the morning and the night! Fair as the sea and the sun and the snow upon the mountain! Dreadful as the storm and the lightning! Stronger than the foundations of the earth. All shall love me and despair.†(p. 365). She transformed herself as the ring was trying to control her, but she managed to control the urge of having the most powerful ring and passed the test. An addict can only save himself with the elimination of the drug and a strong will power to continue without it; this also applies to this powerful ring of Sauron; the only way to overcome this wanting is to have these qualities and much more. Because the ring is so powerful one person alone cannot succeed in destroying it, this is why the company of the ring was created. Throughout the story many people wanted Frodo to fail just so they could get the ring, this was how strong the addiction was, but there would always be those who their will power was strong enough to succeed, and those few are the ones who will accompany you to the end; these few are a need in adventures like this, because the ring is so powerful that one person alone cannot do the job. In this case it was Samwise Gamgee who told Frodo in the story when he was planning to leave, â€Å"†¦All alone and without me to help you? I couldn’t have a borne it, it’s have been the death of me.†(p.406). T he little hobbit demonstrated how friendship can overcome any addiction in the world and that with the help of a true friend we can overcome every struggle and every blinding need that we would ever have. References: Tolkien J.R.R. (2005). The Lord of the Rings (50th anniversary). Houghton Mifflin Harcourt