Featured Post

The Great Gatsby2 essays

The Great Gatsby2 articles The Great Gatsby, a novel by F. Scott Fitsgerald, is about the American Dream, and the destruction of the indi...

Friday, November 29, 2019

Communicable Diseases H. I. V. and A.I.D.s

Introduction A communicable disease is a disease transmitted through people, animals, and surfaces and is carried by micro organisms. They are transmitted through blood contact, close contact with an infected person or through body fluid contact of an infected to a healthy person. These diseases include Malaria, HIV-AIDS helps, whooping cough, and Mumps among others (Lengauer, Altmann, Thielen Kaiser, 2010).Advertising We will write a custom research paper sample on Communicable Diseases: H. I. V. and A.I.D.s specifically for you for only $16.05 $11/page Learn More This paper concentrates on HIV-AIDS; it will evaluate what measures are in place as well as the effects that the disease has on human life. H. I. V. and A.I.D.s H. I. V. is the virus that is responsible for causing A.I.D.S, a person who has the virus is at the risk of developing A.I.D.S. The virus is transmitted when body fluids of an invested person come into contact with those of an uninfec ted person. Once the virus gets into the body, it manifests and multiplies itself when hiding in the blood cells. The cell in the body that it attach itself to is the white blood cell. Before the virus can be detected in the body system, it stays for at least three months. A.I.D.S on the hand is the final stages of H.I.V. When the virus has â€Å"blown out† and having affected the white blood cells to a point that they can’t protect the body any more, optimistic diseases take advantage and affect the person; these optimistic diseases may be tuberculosis or pneumonia, they infect the body and since the body immune system is weak, it cannot fight the infections and the most probable resultant is death (Bebea, 2006). Data Findings, Evidence-Based Intervention, and a Plan to Ensure Quality Health According to 2008 UNAIDS statistics, there were 33.4 million infected people in the world with Africa having the majority. It goes further to say that since 1981; the disease has killed over 25 million people and created over 14 million orphans (See appendix for the statistic). Treatment and Care Currently there are no drugs that cure HIV. However, there have been drugs that have been developed to boost the immune system of the body and thus assist the body in fighting the disease. They are called ARVs, antiviral drugs. Their aim is to help the body fight the diseases that come as optimistic to the body weak system. Other than those drugs, the diseases that attack the body are cured in the normal way like in the case of a healthy person. Physicians are developing immunization medicines but not much success has been achieved. The second approach to take care of the disease is by creating a massive public awareness. This will assist the public to take preventive measure which include, abstaining from having sex, being faithful to one spouse, and finally use of condoms when having sex as a preventive measure (Brown Qaqish, 2006).Advertising Looking for re search paper on health medicine? Let's see if we can help you! Get your first paper with 15% OFF Learn More The Environmental Factors Related to the Disease Sexual intercourse; there are different modes of sexual intercourse that human beings interact in; they are heterosexual, homosexual, and lesbianism. In all the above sexual intercourse, there involves the mixing of body fluids of the concerned parties. If one of them is having the virus it is transmitted to the other one during this process. Blood transmission – in case of blood transmission, the blood of one person is given to another, this is in medical situations, and there have been circumstances where blood that is already invested with the disease is given to a patient, though this is a rare case, it spreads the virus. Parental transmission – this is when the child gets the virus from the parent when breast feeding. Usage of contaminated instruments or syringes- this happens when one uses instrumen ts that have already been used by a person who has the virus, this is common in drug users when they inject themselves the drugs that they are using; if one of them is contaminated he/she can transmit the virus to the others during this period (Turner, D. et al, 2005). The Influence of Lifestyles, Socioeconomic Status, and Disease Management The disease makes an individual weak to a point that he cannot be productive person in his country. It is a disease that requires management in terms of medicine and a special diet. When a person is infected most are the times that he faces negative discrimination and thus he is not able to fully participate in nation development. His social economic status depletes. When managing the disease it takes the efforts of the government and peoples concerned to manage the disease. This calls for government resources being directed to such programs like awareness campaigns and drug development/purchasing (Basavapathruni Anderson). Gaps and Methods for Linking To Other Resources to Meet Needs That Are Not Locally Available For the Population People have not fully understood the fact that the disease can be managed and the person suffering from it need not be discriminated. In places like jobs and public offices there should be no discrimination since when one manages his condition well, he can stay a healthy life like any other person (Turner, 2005). Recommendations to Expand Communities’ Programs When HIV-AIDS was first recorded in the world, the campaigners portrayed it as a killer disease. This shaped the minds of the people to believe that when one is sick, the next step is death. This is not true as it can be managed. What can be done is to erode that belief through more campaigns to enlighten people (Bebea, 2006).Advertising We will write a custom research paper sample on Communicable Diseases: H. I. V. and A.I.D.s specifically for you for only $16.05 $11/page Learn More Conclusion HIV-A IDS is an ailment (communicable) that is spread through body fluids from infected individuals. The disease has no cure but can be managed using immune boosting medicines. The infected have a weak body and undergo stigmatization that hinders their productivity. As medicine and immunization are developed, more awareness need to be done to reduce its spread. Reference List Basavapathruni, A and Anderson, K. (December 2007). â€Å"Reverse transcription of the HIV-1 pandemic†.  The FASEB Journal  21  (14): 3795–3808 Bebea, I. (2006). Fighting H.I.V./AIDS; The Balm in Gilead challenges clerics. Network Journal, 13(4), 10. Retrieved from Ethnic NewsWatch (ENW). (Document ID: 1007376031) Brown, T. and Qaqish, R. (2006). Antiretroviral therapy and the prevalence of osteopenia and osteoporosis: a meta-analytic review.  AIDS (London, England)  20  (17): 2165–2174. Lengauer, T., Altmann, A., Thielen, A. and Kaiser, A. (2010). â€Å"Chasing the AIDS virus† .  Communications of the ACM  53  (3): 66.  doi:10.1145/1666420.1666440 Turner, D. et al. (2005). â€Å"Substitutions in the Reverse Transcriptase and Protease Genes of HIV-1 Subtype B in Untreated Individuals and Patients Treated With Antiretroviral Drugs.† Journal of the International AIDS Society 7 (2005): 69. Academic OneFile. Web. UNAIDS. (2008). Worldwide HIV AIDS Statistic, end of 2008. Retrieved from https://www.avert.org/global-hiv-and-aids-statisticsAdvertising Looking for research paper on health medicine? Let's see if we can help you! Get your first paper with 15% OFF Learn More Appendix Global HIV/AIDS estimates, end of 2008 The latest statistics of the global  HIV and AIDS  were published by UNAIDS in November 2009, and refer to the end of 2008. Estimate Range People living with HIV/AIDS in 2008 33.4 million 31.1-35.8 million Adults living with HIV/AIDS in 2008 31.3 million 29.2-33.7 million Women living with HIV/AIDS in 2008 15.7 million 14.2-17.2 million Children living with HIV/AIDS in 2008 2.1 million 1.2-2.9 million People newly infected with HIV in 2008 2.7 million 2.4-3.0 million Children newly infected with HIV in 2008 0.43 million 0.24-0.61 million AIDS deaths in 2008 2.0 million 1.7-2.4 million Child AIDS deaths in 2008 0.28 million 0.15-0.41 million More than  25 million  people have died of AIDS since 1981. Africa has over  14 million  AIDS orphans. At the end of 2008, women accounted for  50%  of all adults living with HIV worldwide In developing and transitional countries,  9.5 million  people are i n immediate need of life-saving AIDS drugs; of these, only  4 million  (42%) are receiving the drugs. Source: http://www.avert.org/worldstats.htm This research paper on Communicable Diseases: H. I. V. and A.I.D.s was written and submitted by user Jaxton Hinton to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Monday, November 25, 2019

Covering Letter Example

Covering Letter Example Covering Letter – Coursework Example Covering letter Insert Insert (Insert (Insert address) (Insert (Insert    To The Human Resource Manager, Hellmann Worldwide Logistics Company,Insert address,CityDear Sir/Madam,RE: COVERING LETTERI am writing to apply to the job position as a supplies manager noting that my education and background is an excellent match to the job description. As an intern supplies manager at (Insert company), I was exposed to coordination of the shipment process dispatch tools, routing, and scheduling with respect to clients demands. Through included designing, handling and implementing supply and bookkeeping involving records. To reflect, I led a team of 15 workers whom I did not accomplished task to the satisfaction of the company. It involved facilitating and collaborating.Having achieved a training session within the company under the counsel of able managers, I hereby feel privileged to undertake the leadership with sober mind and in a position to take up a bigger role with confidence. I am co mpetent in computer skills that include using microsoft suite, Lotus notes and the internet. I have learned adeptness in developing operation dispatch, process planning, logistic analysis, purchasing and production, and routing. In addition, I now handle carriers, vendors, packing facilities and trucking companies with the keenness it requires. I have learned the art of effectively accomplishing transportation associated activities, storage, and distribution endeavors including the delivery of IATA and CASS reports.I learned confidence as a facet to my abilities in handling multiple tasks efficiently, and maintaining confidentiality of highly sensitive codes of information. Moreover, issues that deal with certification and legalization. Rate requests and preparation is what I do best and I have a feeling in line with bringing this expertise to your organization and through delivery and execution of my logical and analytical skills, professionalism and excellent organizational skills consistent with ISO 9001:2008 certification. I will together with teamwork increase customers’ satisfaction and drive economic and regional growth that is achieved by quick and efficient delivery of service.I promise to work towards meeting your institutioal mission by delivering customer needs, through effective communication with clients, managers and fellow workers. Thank you for your review and consideration.Yours faithfully,Insert nameReferencesBly, R. (2004). Websters New World letter writing handbook. Indianapolis: Wiley.Brice, J., & Bligh, J. (2005). Dear Editor ...: advice on writing a covering letter. Med Educ, 39(9), 876-876. doi:10.1111/j.1365-2929.2005.02255.xDonovan, S. (2004). Writing Successful Covering Letters for Unsolicited Submissions to Academic Journals: Comment. Journal Of Scholarly Publishing, 35(4), 221-222. doi:10.3138/jsp.35.4.221Loewen, N., & Lyles, C. (2009). Sincerely yours. Minneapolis, Minn.: Picture Window Books.Payne, M. (2011). Grant writin g demystified. Dubuque, Iowa: McGraw-Hill.

Thursday, November 21, 2019

Copyright Essay Example | Topics and Well Written Essays - 500 words - 1

Copyright - Essay Example This system allows the potential sharing of copyrighted materials, which can give rise to copyright infringement. Copyright infringement, under the US laws, is the copying or substantial reproduction of materials that are protected by the copyright law (Miller & Jentz 2007 155). A group of music companies led by A&M Records, Inc. brought an action against Napster for copyright violation, with preliminary injunction, in the District Court for the Northern District of California. In 2000, Judge Marilyn Patel accordingly issued a preliminary injunction against Napster enjoining the latter from â€Å"engaging in or facilitating others in copying, downloading, uploading, transmitting or distributing plaintiff’s copyrighted† (A&M Records, Inc. v Napster, Inc. 2000 114 F Supp. 2d 896) materials. The order was appealed by Napster to the Ninth Circuit, which however, sustained the order but remanding it to the lower court for refinement noting that it was too broad. In reaching its decision, the Ninth Circuit had to decide on the merits of the arguments of the defendants, in defense of itself and its users. The arguments of defendant Napster centered on the implied immunity granted under the Audio Home Recording Act of 1992 (AHRA) and the exception provided under the fair use doctrine.

Wednesday, November 20, 2019

Assesment, evaluation and feedback Essay Example | Topics and Well Written Essays - 3000 words

Assesment, evaluation and feedback - Essay Example The essay process can be quiet expensive on time but fulfils all the functions of assessment, on the other hand, seminar presentation is time saving and can fulfill the key functions of assessment even though they do not determine the student’s final grades. There is always the possibility that the assessments do not achieve their purpose, or the suitable method for assessment is being disregarded. Exercise 1 Assessment vs. Evaluation Assessment and evaluation are two terms that in majority cases are used interchangeably to mean the same thing, but in reality both terms do not seriously mean the same thing. Assessment is a classroom inquiry procedure to supply useful feedback in development better teaching and learning. Evaluation on the other hand, is concerned with grading and evaluating students’ degree of understanding, by using various methods and measures. The main difference is the direction of feedback; for assessment feedback is from students to instructor whil e in evaluation, the feedback is from the instructor to students. Assessment has four basic principles; Reliability, Validity, Relevance & transferability, and Criterion vs. Norm referenced assessment. These principles are usually used in various practices/classes of assessment. Assessment is grouped into six classes namely: informal and formal, formal usually involves written documents while informal is more of casual and may include portfolio assessment, rubrics and observations. External and internal, internal usually set and marked by the teachers of the school while external is set by a governing body and marked by unbiased professionals, Traditional assessment, Authentic, Standardized and finally ongoing assessment. Evaluation mainly deals with combined results for the reason of grading appraising and judging. Donald Kirkpatrick is a writer that has with several books talking about training and evaluation. One of his books published in 1959 Evaluating training Programs is bein g used widely across the world. The book’s theory was later updated into the four levels of evaluation (1998). These four essential levels in an evaluation model measure; the students’ reaction towards the training, the learning in terms of capability and knowledge acquired improvement in behavior, and finally the impact of the trainee’s performance on the business. As much as these two techniques; evaluation and assessment, possess different characteristics in the normal setting it would be hard to differentiate them. Exercise 2 There are quite a number of evaluation approaches just to mention a few; public relations, experimental research, testing programs, client centered, content analysis, policy studies, connoisseur and many others. In Aesthetics, we deal with nature and appreciation of art, beauty and taste. The best approach to conduct evaluations in this field is through connoisseur as this approach is characterized by conducting vastly developed profici ency on the subject of interest. It also works towards appraising, decisively describe and illuminate an object. Another appropriate approach in this field is the client centered because in this approach, the students are encouraged to carry their own evaluations. Assessment techniques Classroom

Monday, November 18, 2019

Effects of Green and Blue Light on the Rate of Photosynthesis Lab Report

Effects of Green and Blue Light on the Rate of Photosynthesis - Lab Report Example This essay stresses that since photosynthesis and respiration occur simultaneously, the amount of oxygen generated by the former is cut back by the amount the former consumes. The difference between gross photosynthesis and the amount of oxygen consumed during respiration is referred to as net photosynthesis. This experiment aims to establish the dependence of net photosynthesis on light levels. This paper declares that the first experiment was conducted using the following procedure: Each group cut 10–12 leaf disks from the English Ivy leaves using the paper punch over the weighing paper. This was done to ensure that all the disks are of uniform size. Only those with no tissue damage (jagged edges) were used in the experiment. The next step involved using the syringes to drive out air from the leaf disks. This was done removing the plunger and inserting the disks in the syringe. After this the infiltration solution was added into the syringe up to the 6 ml mark, and the plunger inserted and depressed to remove air. We then covered the tip of the syringe with thumbs and drew the plunger back to create a vacuum for five seconds. The thumb was removed, and the plunger depressed severally until the leaf disks sank. This procedure was repeated to produce four sets of leaf disks for the four replicas of the experiment, hence bringing the sample size to 80. In conducting th e actual experiment, each group added 50 ml of bicarbonate buffer solution into the cylinder and then emptied the infiltration solution and leaf disks from one syringe into the beaker. ... Experiment 1 Materials The materials used in the first experiment were: Leaves (English Ivy) Paper punch Blunt probe Eight 100 ml beakers Bicarbonate solution Infiltration solution 10 ml syringes Cheese cloth Source of light (normal) Stop watches Ruler Calculator Ice bath Blue and green color filters (four of each) Refrigerator Graduate cylinder Weighing paper Method The first experiment was conducted using the following procedure: Each group cut 10–12 leaf disks from the English Ivy leaves using the paper punch over the weighing paper. This was done to ensure that all the disks are of uniform size. Only those with no tissue damage (jagged edges) were used in the experiment. The next step involved using the syringes to drive out air from the leaf disks. This was done removing the plunger and inserting the disks in the syringe. After this the infiltration solution was added into the syringe up to the 6 ml mark, and the plunger inserted and depressed to remove air. We then cover ed the tip of the syringe with thumbs and drew the plunger back to create a vacuum for five seconds. The thumb was removed, and the plunger depressed severally until the leaf disks sank. This procedure was repeated to produce four sets of leaf disks for the four replicas of the experiment, hence bringing the sample size to 80. In conducting the actual experiment, each group added 50 ml of bicarbonate buffer solution into the cylinder and then emptied the infiltration solution and leaf disks from one syringe into the beaker. We then added the rest of the bicarbonate solution into the reaction beaker, discarding leaf disks that did not sink. This was done using 8 beakers, each containing 10

Saturday, November 16, 2019

History Of The Virtual Private Network

History Of The Virtual Private Network A VPN supplies virtual network connectivity over a possibly long physical distance. The key feature of a VPN, however, is its ability to use public networks like the Internet rather than rely on private leased lines which consume valuable recourse and extra cost . VPN technologies implement restricted-access networks that utilize the same cabling and routers as a public network, and they do so without sacrificing features or basic security , a simple cooperation office and remote branched VPN shown in below diagram . Sonicwall_Vpn A VPN supports at least three different modes of use as shown above: Remote access client connections. LAN-to-LAN internetworking . Controlled access within an intranet . A several network protocols have become popular as a result of VPN developments state as following : PPTP L2TP IPsec These protocols emphasize authentication and encryption in VPNs. Authentication allows VPN clients and servers to correctly establish the identity of people on the network. Encryption allows potentially sensitive data to be hidden from the general public. Many vendors have developed VPN hardware and/or software products. Unfortunately, immature VPN standards mean that some of these products remain incompatible with each other till now. Virtual private networks have grown in popularity as businesses to save money on remote network access for employees. Many corporations have also adopted VPNs as a security solution for private Wi-Fi wireless networks. Expect a continued gradual expansion in use of VPN technology to continue in the coming years. Objectives:- A virtual private network can resolve many of the issues associated with todays private networks. Cost: The cost of such links is high especially when they involve international locations. Even when VPNs are implemented on a provider private network, it would still be less expensive. Mobility of workforce: Many companies are encouraging telecommunications to reduce their investment in real estate, reduce traffic, and reduce pollution from automobile E-commerce applications: However, in traditional private networks, this kind of special access provision is difficult to incorporate because it is not easy to install dedicated link to all suppliers and business partners, nor it is flexible because a change in the supplier would require de-installing the link and installing another one to the new vendor. Advantages of VPN VPNs promise two main advantages over competing approaches cost savings, and scalability (that is really just a different form of cost savings). The Low Cost of a VPN One way a VPN lowers costs is by eliminating the need for expensive long-distance leased lines. With VPNs, an organization needs only a relatively short dedicated connection to the service provider. This connection could be a local leased line (much less expensive than a long-distance one), or it could be a local broadband connection such as DSL service. Another way VPNs reduce costs is by lessening the need for long-distance telephone charges for remote access. Recall that to provide remote access service, VPN clients need only call into the nearest service providers access point. In some cases this may require a long distance call, but in many cases a local call will suffice. A third, more subtle way that VPNs may lower costs is through offloading of the support burden. With VPNs, the service provider rather than the organization must support dial-up access for example. Service providers can in theory charge much less for their support than it costs a company internally because the public providers cost is shared amongst potentially thousands of customers. Scalability and VPNs The cost to an organization of traditional leased lines may be reasonable at first but can increase exponentially as the organization grows. A company with two branch offices, for example, can deploy just one dedicated line to connect the two locations. If a third branch office needs to come online, just two additional lines will be required to directly connect that location to the other two. However, as an organization grows and more companies must be added to the network, the number of leased lines required increases dramatically. Four branch offices require six lines for full connectivity, five offices require ten lines, and so on. Mathematicans call this phenomenon a combinatorial explosion, and in a traditional WAN this explosion limits the flexibility for growth. VPNs that utilize the Internet avoid this problem by simply tapping into the geographically-distributed access already available. Disadvantages of VPNs With the hype that has surrounded VPNs historically, the potential pitfalls or weak spots in the VPN model can be easy to forget. These four concerns with VPN solutions are often raised. 1. VPNs require an in-depth understanding of public network security issues and proper deployment of precautions. 2. The availability and performance of an organizations wide-area VPN (over the Internet in particular) depends on factors largely outside of their control. 3. VPN technologies from different vendors may not work well together due to immature standards. 4. VPNs need to accomodate protocols other than IP and existing internal network technology. Generally speaking, these four factors comprise the hidden costs of a VPN solution. Whereas VPN advocates tout cost savings as the primary advantage of this technology, detractors cite hidden costs as the primary disadvantage of VPNs INTERNET VPNS FOR REMOTE ACCESS In recent years, many organizations have increased the mobility of their workers by allowing more employees to telecommute. Employees also continue to travel and face a growing need to stay connected to their company networks. A VPN can be set up to support remote, protected access to the corporate home offices over the Internet. An Internet VPN solution uses a client/server design works as follows: 1. A remote host (client) wanting to log into the company network first connects to any public Internet Service Provider (ISP). 2. Next, the host initiates a VPN connection to the company VPN server. This connection is made via a VPN client installed on the remote host. 3. Once the connection has been established, the remote client can communicate with the internal company systems over the Internet just as if it were a local host. Before VPNs, remote workers accessed company networks over private leased lines or through dialup remote access servers. While VPN clients and servers careful require installation of hardware and software, an Internet VPN is a superior solution in many situations. VPNS FOR INTERNETWORKING Besides using virtual private networks for remote access, a VPN can also bridge two networks together. In this mode of operation, an entire remote network (rather than just a single remote client) can join to a different company network to form an extended intranet. This solution uses a VPN server to VPN server connection. Through the use of dedicated equipment and large-scale encryption, a company can connect multiple fixed sites over a public network such as the Internet. Site-to-site VPNs can be one of two types: Intranet-based If a company has one or more remote locations that they wish to join in a single private network, they can create an intranet VPN to connect LAN to LAN. Extranet-based When a company has a close relationship with another company (for example, a partner, supplier or customer), they can build an extranet VPN that connects LAN to LAN, and that allows all of the various companies to work in a shared environment. vpn-type INTRANET / LOCAL NETWORK VPNS Internal networks may also utilize VPN technology to implement controlled access to individual subnets within a private network. In this mode of operation, VPN clients connect to a VPN server that acts as the network gateway. This type of VPN use does not involve an Internet Service Provider (ISP) or public network cabling. However, it allows the security benefits of VPN to be deployed inside an organization. This approach has become especially popular as a way for businesses to protect their WiFi local networks. TUNNELING: SITE-TO-SITE In a site-to-site VPN, GRE (generic routing encapsulation) is normally the encapsulating protocol that provides the framework for how to package the passenger protocol for transport over the carrier protocol, which is typically IP-based. This includes information on what type of packet you are encapsulating and information about the connection between the client and server. Instead of GRE, IPSec in tunnel mode is sometimes used as the encapsulating protocol. IPSec works well on both remote-access and site-to-site VPNs. IPSec must be supported at both tunnel interfaces to use. TUNNELING Most VPNs rely on tunneling to create a private network that reaches across the Internet. Essentially, tunneling is the process of placing an entire packet within another packet and sending it over a network. The protocol of the outer packet is understood by the network and both points, called tunnel interfaces, where the packet enters and exits the network. Tunneling requires three different protocols: Carrier protocol The protocol used by the network that the information is traveling over Encapsulating protocol The protocol (GRE, IPSec, L2F, PPTP, L2TP) that is wrapped around the original data Passenger protocol The original data (IPX, NetBeui, IP) being carried Tunneling has amazing implications for VPNs. For example, you can place a packet that uses a protocol not supported on the Internet (such as NetBeui) inside an IP packet and send it safely over the Internet. Or you could put a packet that uses a private (non-routable) IP address inside a packet that uses a globally unique IP address to extend a private network over the Internet. COST SAVINGS WITH A VPN A VPN can save an organization money in several situations: Eliminating the need for expensive long-distance leased lines Reducing long-distance telephone charges Offloading support costs VPNS VS LEASED LINES Organizations historically needed to rent network capacity such as T1 lines to achieve full, secured connectivity between their office locations. With a VPN, you use public network infrastructure including the Internet to make these connections and tap into that virtual network through much cheaper local leased lines or even just broadband connections to a nearby Internet Service Provider (ISP). LONG DISTANCE PHONE CHARGES A VPN also can replace remote access servers and long-distance dialup network connections commonly used in the past by business travelers needing to access to their company intranet. For example, with an Internet VPN, clients need only connect to the nearest service providers access point that is usually local. SUPPORT COSTS With VPNs, the cost of maintaining servers tends to be less than other approaches because organizations can outsource the needed support from professional third-party service providers. These provides enjoy a much lower cost structure through economy of scale by servicing many business clients. VPN NETWORK SCALABILITY The cost to an organization of building a dedicated private network may be reasonable at first but increases exponentially as the organization grows. A company with two branch offices, for example, can deploy just one dedicated line to connect the two locations, but 4 branch offices require 6 lines to directly connect them to each other, 6 branch offices need 15 lines, and so on. Internet based VPNs avoid this scalability problem by simply tapping into the public lines and network capability readily available. Particularly for remote and international locations, an Internet VPN offers superior reach and quality of service. USING A VPN To use a VPN, each client must possess the appropriate networking software or hardware support on their local network and computers. When set up properly, VPN solutions are easy to use and sometimes can be made to work automatically as part of network sign on. VPN technology also works well with WiFi local area networking. Some organizations use VPNs to secure wireless connections to their local access points when working inside the office. These solutions provide strong protection without affecting performance excessively. VPN SECURITY: IPSEC Internet Protocol Security Protocol (IPSec) provides enhanced security features such as better encryption algorithms and more comprehensive authentication. vpn-diagram2 Photo courtesy Cisco Systems, Inc. A remote-access VPN utilizing IPSec IPSec has two encryption modes: tunnel and transport. Tunnel encrypts the header and the payload of each packet while transport only encrypts the payload. Only systems that are IPSec compliant can take advantage of this protocol. Also, all devices must use a common key and the firewalls of each network must have very similar security policies set up. IPSec can encrypt data between various devices, such as: Router to router Firewall to router PC to router PC to server LIMITATIONS OF A VPN Despite their popularity, VPNs are not perfect and limitations exist as is true for any technology. Organizations should consider issues like the below when deploying and using virtual private networks in their operations: VPNs require detailed understanding of network security issues and careful installation / configuration to ensure sufficient protection on a public network like the Internet. The reliability and performance of an Internet-based VPN is not under an organizations direct control. Instead, the solution relies on an ISP and their quality of service. Historically, VPN products and solutions from different vendors have not always been compatible due to issues with VPN technology standards. Attempting to mix and match equipment may cause technical problems, and using equipment from one provider may not give as great a cost savings. TYPES OF VPN TUNNELING VPN supports two types of tunneling voluntary and compulsory. Both types of tunneling are commonly used. In voluntary tunneling, the VPN client manages connection setup. The client first makes a connection to the carrier network provider (an ISP in the case of Internet VPNs). Then, the VPN client application creates the tunnel to a VPN server over this live connection. In compulsory tunneling, the carrier network provider manages VPN connection setup. When the client first makes an ordinary connection to the carrier, the carrier in turn immediately brokers a VPN connection between that client and a VPN server. From the client point of view, VPN connections are set up in just one step compared to the two-step procedure required for voluntary tunnels. Compulsory VPN tunneling authenticates clients and associates them with specific VPN servers using logic built into the broker device. This network device is sometimes called the VPN Front End Processor (FEP), Network Access Server (NAS) or Point of Presence Server (POS). Compulsory tunneling hides the details of VPN server connectivity from the VPN clients and effectively transfers management control over the tunnels from clients to the ISP. In return, service providers must take on the additional burden of installing and maintaining FEP devices. VPN TUNNELING PROTOCOLS Several computer network protocols have been implemented specifically for use with VPN tunnels. The three most popular VPN tunneling protocols listed below continue to compete with each other for acceptance in the industry. These protocols are generally incompatible with each other. POINT-TO-POINT TUNNELING PROTOCOL (PPTP) Several corporations worked together to create the PPTP specification. People generally associate PPTP with Microsoft because nearly all flavors of Windows include built-in client support for this protocol. The initial releases of PPTP for Windows by Microsoft contained security features that some experts claimed were too weak for serious use. Microsoft continues to improve its PPTP support, though. LAYER TWO TUNNELING PROTOCOL (L2TP) The original competitor to PPTP for VPN tunneling was L2F, a protocol implemented primarily in Cisco products. In an attempt to improve on L2F, the best features of it and PPTP were combined to create new standard called L2TP. Like PPTP, L2TP exists at the data link layer (Layer Two) in the OSI model thus the origin of its name. INTERNET PROTOCOL SECURITY (IPSEC) IPsec is actually a collection of multiple related protocols. It can be used as a complete VPN protocol solution, or it can used simply as the encryption scheme within L2TP or PPTP. IPsec exists at the network layer (Layer Three) of the OSI model. Using PPTP PPTP packages data within PPP packets, then encapsulates the PPP packets within IP packets (datagrams) for transmission through an Internet-based VPN tunnel. PPTP supports data encryption and compression of these packets. PPTP also uses a form of General Routing Encapsulation (GRE) to get data to and from its final destination. PPTP-based Internet remote access VPNs are by far the most common form of PPTP VPN. In this environment, VPN tunnels are created via the following two-step process: The PPTP client connects to their ISP using PPP dial-up networking (traditional modem or ISDN). Via the broker device (described earlier), PPTP creates a TCP control connection between the VPN client and VPN server to establish a tunnel. PPTP uses TCP port 1723 for these connections. PPTP also supports VPN connectivity via a LAN. ISP connections are not required in this case, so tunnels can be created directly as in Step 2 above. Once the VPN tunnel is established, PPTP supports two types of information flow: Control messages for managing and eventually tearing down the VPN connection. Control messages pass directly between VPN client and server. Data packets that pass through the tunnel, to or from the VPN client PPTP CONTROL CONNECTION Once the TCP connection is established in Step 2 above, PPTP utliizes a series of control messages to maintain VPN connections. These messages are listed below. No. Name Description 1 StartControlConnectionRequest Initiates setup of the VPN session; can be sent by either client or server. 2 StartControlConnectionReply Sent in reply to the start connection request (1); contains result code indicating success or failure of the setup operation, and also the protocol version number. 3 StopControlConnectionRequest Request to close the control connection. 4 StopControlConnectionReply Sent in reply to the stop connection request (3); contains result code indicating success or failure of the close operation. 5 EchoRequest Sent periodically by either client or server to ping the connection (keep alive). 6 EchoReply Sent in response to the echo request (5) to keep the connection active. 7 OutgoingCallRequest Request to create a VPN tunnel sent by the client. 8 OutgoingCallReply Response to the call request (7); contains a unique identifier for that tunnel. 9 IncomingCallRequest Request from a VPN client to receive an incoming call from the server. 10 IncomingCallReply Response to the incoming call request (9), indicating whether the incoming call should be answered. 11 IncomingCallConnected Response to the incoming call reply (10); provides additional call parameters to the VPN server. 12 CallClearRequest Request to disconnect either an incoming or outgoing call, sent from the server to a client. 13 CallDisconnectNotify Response to the disconnect request (12); sent back to the server. 14 WANErrorNotify Notification periodically sent to the server of CRC, framing, hardware and buffer overruns, timeout and byte alignment errors. 15 SetLinkInfo Notification of changes in the underlying PPP options. With control messages, PPTP utlizes a so-called magic cookie. The PPTP magic cookie is hardwired to the hexadecimal number 0x1A2B3C4D. The purpose of this cookie is to ensure the receiver interprets the incoming data on the correct byte boundaries. PPTP SECURITY PPTP supports authentication, encryption, and packet filtering. PPTP authentication uses PPP-based protocols like EAP, CHAP, and PAP. PPTP supports packet filtering on VPN servers. Intermediate routers and other firewalls can also be configured to selectively filter PPTP traffic. PPTP AND PPP In general, PPTP relies on the functionality of PPP for these aspects of virtual private networking. authenticating users and maintaining the remote dial-up connection encapsulating and encrypting IP, IPX, or NetBEUI packets PPTP directly handles maintaining the VPN tunnel and transmitting data through the tunnel. PPTP also supports some additional security features for VPN data beyond what PPP provides. PPTP PROS AND CONS PPTP remains a popular choice for VPNs thanks to Microsoft. PPTP clients are freely available in all popular versions of Microsoft Windows. Windows servers also can function as PPTP-based VPN servers. One drawback of PPTP is its failure to choose a single standard for authentication and encryption. Two products that both fully comply with the PPTP specification may be totally incompatible with each other if they encrypt data differently, for example. Concerns also persist over the questionable level of security PPTP provides compared to alternatives. Routing Tunneling protocols can be used in a point-to-point topology that would generally not be considered a VPN, because a VPN is expected to support arbitrary and changing sets of network nodes. Since most router implementations support software-defined tunnel interface, customer-provisioned VPNs often comprise simply a set of tunnels over which conventional routing protocols run. PPVPNs, however, need to support the coexistence of multiple VPNs, hidden from one another, but operated by the same service provider. Building blocks Depending on whether the PPVPN runs in layer 2 or layer 3, the building blocks described below may be L2 only, L3 only, or combinations of the two. Multiprotocol Label Switching (MPLS) functionality blurs the L2-L3 identity. While RFC 4026 generalized these terms to cover L2 and L3 VPNs, they were introduced in RFC 2547. Customer edge device. (CE) In general, a CE is a device, physically at the customer premises, that provides access to the PPVPN service. Some implementations treat it purely as a demarcation point between provider and customer responsibility, while others allow customers to configure it. Provider edge device (PE) A PE is a device or set of devices, at the edge of the provider network, which provides the providers view of the customer site. PEs are aware of the VPNs that connect through them, and which maintain VPN state. Provider device (P) A P device operates inside the providers core network, and does not directly interface to any customer endpoint. It might, for example, provide routing for many provider-operated tunnels that belong to different customers PPVPNs. While the P device is a key part of implementing PPVPNs, it is not itself VPN-aware and does not maintain VPN state. Its principal role is allowing the service provider to scale its PPVPN offerings, as, for example, by acting as an aggregation point for multiple PEs. P-to-P connections, in such a role, often are high-capacity optical links between major locations of provider. Categorizing VPN security models From the security standpoint, VPNs either trust the underlying delivery network, or must enforce security with mechanisms in the VPN itself. Unless the trusted delivery network runs only among physically secure sites, both trusted and secure models need an authentication mechanism for users to gain access to the VPN. Some Internet service providers as of 2009[update] offer managed VPN service for business customers who want the security and convenience of a VPN but prefer not to undertake administering a VPN server themselves. Managed VPNs go beyond PPVPN scope, and are a contracted security solution that can reach into hosts. In addition to providing remote workers with secure access to their employers internal network, other security and management services are sometimes included as part of the package. Examples include keeping anti-virus and anti-spyware programs updated on each clients computer. Authentication before VPN connection A known trusted user, sometimes only when using trusted devices, can be provided with appropriate security privileges to access resources not available to general users. Servers may also need to authenticate themselves to join the VPN. A wide variety of authentication mechanisms exist. VPNs may implement authentication in devices including firewalls, access gateways, and others. They may use passwords, biometrics, or cryptographic methods. Strong authentication involves combining cryptography with another authentication mechanism. The authentication mechanism may require explicit user action, or may be embedded in the VPN client or the workstation. Trusted delivery networks Trusted VPNs do not use cryptographic tunneling, and instead rely on the security of a single providers network to protect the traffic. In a sense, they elaborate on traditional network- and system-administration work. Multi-Protocol Label Switching (MPLS) is often used to overlay VPNs, often with quality-of-service control over a trusted delivery network. Layer 2 Tunneling Protocol (L2TP) which is a standards-based replacement, and a compromise taking the good features from each, for two proprietary VPN protocols: Ciscos Layer 2 Forwarding (L2F) (obsolete as of 2009[update]) and Microsofts Point-to-Point Tunneling Protocol (PPTP). Security mechanisms Secure VPNs use cryptographic tunneling protocols to provide the intended confidentiality (blocking intercept and thus packet sniffing), sender authentication (blocking identity spoofing), and message integrity (blocking message alteration) to achieve privacy. Secure VPN protocols include the following: IPsec (Internet Protocol Security) A standards-based security protocol developed originally for IPv6, where support is mandatory, but also widely used with IPv4. Transport Layer Security (SSL/TLS) is used either for tunneling an entire networks traffic (SSL VPN), as in the OpenVPN project, or for securing individual connection. SSL has been the foundation by a number of vendors to provide remote access VPN capabilities. A practical advantage of an SSL VPN is that it can be accessed from locations that restrict external access to SSL-based e-commerce websites without IPsec implementations. SSL-based VPNs may be vulnerable to Denial of Service attacks mounted against their TCP connections because latter are inherently unauthenticated. DTLS, used by Cisco for a next generation VPN product called Cisco AnyConnect VPN. DTLS solves the issues found when tunneling TCP over TCP as is the case with SSL/TLS Secure Socket Tunneling Protocol (SSTP) by Microsoft introduced in Windows Server 2008 and Windows Vista Service Pack 1. SSTP tunnels Point-to-Point Protocol (PPP) or L2TP traffic through an SSL 3.0 channel. L2TPv3 (Layer 2 Tunneling Protocol version 3), a new[update] release. MPVPN (Multi Path Virtual Private Network). Ragula Systems Development Company owns the registered trademark MPVPN. Cisco VPN, a proprietary VPN used by many Cisco hardware devices. Proprietary clients exist for all platforms; open-source clients also exist. SSH VPN OpenSSH offers VPN tunneling to secure remote connections to a network (or inter-network links). This feature (option -w) should not be confused with port forwarding (option -L). OpenSSH server provides limited number of concurrent tunnels and the VPN feature itself does not support personal authentication. VPNs in mobile environments Mobile VPNs handle the special circumstances when one endpoint of the VPN is not fixed to a single IP address, but instead roams across various networks such as data networks from cellular carriers or between multiple Wi-Fi access points. Mobile VPNs have been widely used in public safety, where they give law enforcement officers access to mission-critical applications, such as computer-assisted dispatch and criminal databases, as they travel between different subnets of a mobile network. They are also used in field service management and by healthcare organizations, among other industries. Increasingly, Mobile VPNs are being adopted by mobile professionals and white-collar workers who need reliable connections. They allow users to roam seamlessly across networks and in and out of wireless-coverage areas without losing application sessions or dropping the secure VPN session. A conventional VPN cannot survive such events because the network tunnel is disrupted, causing applications to disconnect, time out, fail, or even the computing device itself to crash. Instead of logically tying the endpoint of the network tunnel to the physical IP address, each tunnel is bound to a virtual IP address that stays with the device. The Mobile VPN software handles the necessary network logins and maintains the application sessions in a manner transparent to the user. The Host Identity Protocol (HIP), under study by the Internet Engineering Task Force, is designed to support mobility of hosts by separating the role of IP addresses for host identification from their locator functionality in an IP network. With HIP a mobile host maintains its logical connections established via the host identity identifier while associating with different IP addresses when roaming between access networks. Conclusion: So what is a Virtual Private Network? As we have discussed, a VPN can take several forms. A VPN can be between two end-systems, or it can be between two or more networks. A VPN can be built using tunnels or encryption (at essentially any layer of the protocol stack), or both, or alternatively constructed using MPLS or one of the virtual router methods. A VPN can consist of networks connected to a service providers network by leased lines, Frame Relay, or ATM, or a VPN can consist of dial-up subscribers connecting to central

Wednesday, November 13, 2019

The Germanic and Celtic Tradition by George MacDonald :: Germanic Celtin Macdonald Fairytales Essays

The Germanic and Celtic Tradition by George MacDonald One of the most interesting things about fairytales is how the author has borrowed ideas from ancient myths and legends and kept them alive in their writings. The Princess and the Goblin is one of these fairytales. In writing this novel, George MacDonald has incorporated much of the folk tradition in his characters and plot. Specifically, his concept of goblins seem to be drawn from the tradition of dwarfs, gnomes, and kobolds of Germanic myth and the fairies, or elves, of Celtic myth. In accordance with the Celtic and Germanic traditions, the goblins of The Princess and the Goblin dwell inside mountains, away from sunlight and especially away from those who live on the earth's surface. The Celtic story of the Green Children tells of two children who, after accidentally wandering up to the surface, had fainted under the sheer brightness of the sunlight (Curran, 129). The Germanic dwarfs only dared to venture out to the surface after nightfall, because the sunlight would turn them into stone (Kafton-Minkel, 34). Although MacDonald's goblins would not encounter the same fate as the Germanic dwarfs if they were to surface during the day, they do detest the brightness of the sun, and prefer to remain underground, surfacing infrequently and only at night (4, 61). The goblins' irregular, grotesque features are most likely a consequence of their subterranean habitat. The once humans "had greatly altered in the course of generations" (MacDonald, 4) and very much resemble t he dwarfs and other mine spirits of the folk tradition. Due to the lack of sunshine and unbalanced diet, MacDonald's goblins are short and "ludicrously grotesque in face and form" (4). Their long arms, nail-less hands, and toeless feet are only some examples of their deformations. However, because of their work, digging out precious stones, tunnelling through the mountainous rock, and living hard lives in their rough and crude cavern homes (Kafton-Minkel, 35), dwarfs and goblins are not weak, but broad, stocky, and unbelievably strong. Dwarfs are known to be "stronger, craftier, and more skilful than humans" (Kafton-Minkel, 34), and this characteristic is also attributed to the goblins in The Princess and the Goblin; although the goblin queen was surrounded by "such skilful workmen" (MacDonald, 207), she still hadn't had a replacement shoe made. Those are not the only similarities between MacDonald's goblins and the subterranean creatures of the folk tradition.

Monday, November 11, 2019

Behavioral scientists Essay

Gang violence is a social phenomenon that has caught the interests of behavioral scientists, psychologists and other related fields. At the forefront is the fact that gangs are social groups that have exclusive rules and strict codes of brotherhood which can actually provide the need for belongingness and affiliation as well as security in the harsh life in the city streets. Surprisingly, gangs have been associated with violence for the longest time, the term gang is already perceived as negative and that at present, gang is synonymous to violence, criminal acts and substance abuse. People join gangs for various reasons but it has been found that adolescents who have been victims of abuse, have dysfunctional family systems, school drop-outs and those in foster care generally join gangs more than the normal teenager. Thus, the final project is geared towards bringing about behavior change for adolescents at risk of joining gangs and or has a tendency for violence. Before drawing up a concrete behavior change program, it is important to examine how this could be brought about by factors like motivation and cultural awareness. Motivating people to change is not an easy feat, generally, if a person is set in his/her ways, then asking them to change something that they do not perceive to be evil or negative is a futile act. Central to the concept of motivation is that the goal offered to the individual must be meaningful to him/her, one that is personally desired and can be owned as a personal decision. This is where choice comes in, when a person is confronted with a choice; his/her reaction to it depends on their circumstances and present state of mind (Iyengar & Lepper, 1999). In this context, choosing to change their behavior should come from their internal desire to change, to become better and to be removed from their present difficulties. For example, if the behavior that is targeted to be modified is expressions of anger, it makes sense to the person to change this if he/she can realize that his/her actions hurt other people and that it also causes people to avoid them and hence lead to feelings of isolation and loneliness. Gangs are often formed around cultural groups, that is one gang can be comprised of Latinos, others are blacks, and others Asians and or whites. Thus, a program for behavior change should also consider the different cultural underpinnings of the gang and its members, if the gang is made up of black Americans, then asking them to join a program geared towards changing them, might be construed as culturally motivated, they have to be changed because they are blacks. There is much emotionality when it comes to culturally specific gangs and it cannot be denied that emotion may get in the way of participating in a program that is designed to change them (Markus & Kitayama, 1991) Motivation is also said to be affected by culture, one has to be able to correctly identify the cultural background of the gang or the participants of the project so as to provide a more culturally relevant and sensitive program. Lastly, motivation can be defined as extrinsic and intrinsic, it has been generally accepted that intrinsic motivation is more positive, more important and influential than extrinsic motivation thus the behavior change program should appeal to the intrinsic motivation of the participants. Intrinsic motivation is the feelings and behavior that drives the person to act in a certain way or to commit to a behavior change program. Internal means that it is something personal and valued by the person, it can be the desire for self-awareness, confidence and achievement, whereas extrinsic motivations are physical and tangible like prestige, money and awards (Sansone & Harackiewicz, 2000). The behavior change program should be designed to spark the intrinsic motivation of the participants, thus conducting an orientation seminar will introduce the participant to the program and letting them experience how good it is to be able to know who they are, to know that they mattered and someone cared for them would facilitate rapport and trust between the researcher and the participant. If the concepts of choice, culture and motivation will be adequately examined and integrated into the planned program, then surely the project would be a success. References Iyengar, S. & Lepper, M. (1999). Rethinking the role of choice: A cultural perspective on intrinsic motivation. Journal of Personality and Social Psychology, 76, 349-366. Markus, H. & Kitayama, S. (1991). Culture and self: Implications for cognition, emotion, and motivation. Psychological Review, 98, 224-253. Sansone, C. & Harackiewicz, J. (2000). Intrinsic and extrinsic motivation: The search for optimal motivation and performance. San Diego: Academic Press.

Saturday, November 9, 2019

AP Biology Essays

AP Biology Essays AP Biology Essays AP Biology Essays While AP biology essays writing is different from other academic assignments; there are several rules common for all essays.   For example, AP biology essays should follow the standard format including abstract, outline, introduction, background, analysis, discussion, and conclusion.   Read the following short sample of AP biology essay and pay attention to the structure of paragraphs. More samples can be read in our free writing guide. If you need help with writing your AP biology essays, do not hesitate to request our writing assistance. writers will write a perfect AP biology essay for you from scratch and in accordance to the instructions. AP Biology Essay Sample Any investigation relating to natural beings needs some way of distinguishing each one of them in such a manner as to avoid confusion with the countless others which Dame Nature brings to our notice. Natural History ought therefore to possess as a basic tool some "Natural System" or comprehensive list containing an agreed name for every single being, thus enabling it to be identified by reference to its distinctive features. As no living organism is entirely simple in its character, it is insufficient to try to distinguish it merely by one single feature of its make-up. We must therefore, nearly always, rely on a combination of several distinct features if we wish to differentiate any particular individual from its fellows, which latter may in part, if not entirely, through their very similarity show traits pertaining to the first specimen. In a like manner, such original sample may present characters common to itself as well as to all the others and will then be distinguishable only through those features not possessed by the remainder. Some beings are very closely related to one another in the biological sense and possess many characters in common, whilst others show far less a degree of similarity in detail. The larger the quantity of beings requiring identification, the greater the number of characters will it be necessary to take into consideration, even perhaps down to the point of making a complete and exhaustive specification of every single detail of the living form. This state of affairs necessitates the setting-up of divisions and subdivisions. As mentioned above, some individuals will show a large number of features in common, and may then be grouped together as a genus, wherein differences in detail are slight. The genera will then have to be classified and, repeating the operation, closely related genera will be combined to form an order. Similarly, orders related in rank will form a class. All this implies some framework and method, and nothing could be more suitable than the "Natural Method," that is to say, an arrangement showing us how individual members of one particular genus are more like each other than to members of other genera, and how the genera of a particular order are more alike to each other than to those of other orders, and so on. This is the system towards which Natural History must necessarily tend, since obviously if an exact system of classification can be attained, the complete portrayal of Nature will have been achieved. AP Biology Essay Writing Service Writing AP biology essays is not easy because you have to be able to put your thoughts on the paper and possess sufficient understanding of the topic. Biology is a science and, therefore, you should adapt scientific approach to writing AP biology essays.   If you do not want to spend hours researching and reading, you have a perfect opportunity to get a custom written AP biology essay.   Contact us and we will write your AP biology essay within any deadline of your choice! No plagiarism! Custom written essays and papers are free of plagiarism and meet your requirements.

Wednesday, November 6, 2019

buy custom Health Care Issues and Cultural Effects essay

buy custom Health Care Issues and Cultural Effects essay Research on to the health disparities has shown that, patients who receive culturally sensitive care show an increased adherence to medical advice and report higher satisfaction with the services. Therefore, with the increased growth in the cultural diversity and related health disparities in society, the rise in academic interest in examining the interrelationship between health and culture has also increased. This has led to the realization of the benefits of cultural competency program. The cultural competency training program produces measurable changes in the knowledge and skills of the health practitioners (Khanna, Cheyney, Engle, 2009, p. 886). Although the debate still continues on its effectiveness, a general agreement among the scholars is that, it improves the patient-provider communication, and in the long term, it improves on the patient satisfaction and compliance. This has led to many health care organizations, medical schools and providers integrating the cultural competency training into their training programs or curricula. In one study conducted on the 43 healthcare professionals, participants indicated an enhanced understanding of the healthcare experiences of patients with diverse backgrounds. This study involved health care providers and health administrators for a four (4) hour cultural competency workshop. In addition to the enhanced understanding of health care experiences these health care professionals, reported improvement in their cross-cu ltural working skills (Khanna, Cheyney, Engle, 2009, p. 886). According to them, the post then pre method of evaluation used is reliable, innovative, and time-saving. According to them, these training programs should be implemented so as to inform the health care providers on the role of culture in service delivery. Factors like, ethnic medical belefs, use of folk medicine, health beliefs and worldview, cultural values and norms influence the offering and perception of the services. In addition, gender and religion also play a vital role. The Health Resources and Services Administration (HRSA) advocates for the inclusion of the cultural and linguistic competency training and assessment protocols in health care systems (Khanna, Cheyney, Engle, 2009, p. 887). The Office of Minority Health has been on the forefront in advocating for the National Standards for culturally and Linguistically Appropriate Services (CLAS) in the Health Care Systems. These standards take into account the social context and interaction and thus, form the benchmarks in the provision of the competent services to patients from all cultural backgrounds. This arises from the fac t that, the cultural characteristics of the patient and the health care provider influences the manner in which different people seek, access, and utilize these services (Khanna, Cheyney, Engle, 2009, pp. 887-888). The study used post then pre method to evaluate the outcomes of the training. In a typical pre then post evaluation, participants subject themselves to a set of questions before and after the training program. Post then pre method helps in controlling response shift bias got in the traditional pre then post method. In the post then pre method, gauging of the respondents perceptions occur at the end of training. This reduces the respondents perspective on the construct measured between pre-test and post-test situation. In addition, use of the post then pre reduces the problems of over and ideal reporting associated with pre then post reporting (Khanna, Cheyney, Engle, 2009, p. 889). The limitation of this evaluation method is the inability recall knowledge and skills before the instruction accurately. The social desire of the respondents to fulffill the expectations of the training programs also manifests itself among the respondents. At the end of training, all participants had a ch oice of completing a 29-item Cultural Competency Assessment (CCA). Of the sixty that had originally joined the training, only forty-three (n=43) completed the test without errors. The CCA developed reflected on intercultural and intra-cultural diversity. It involved 3 parts- demographic data (5 items), knowledge (19 items) and skills (5 items). The results indicated that the participants indicated a positive change in their knowledge and skills in the cross-cultural provision of health care. They acquired a more nuanced understanding of individual terms associated with culture, race and ethnicity. They also self-reported improvements in the role of cultural factors in the patient-provider communication, and importance of nonverbal clues in patient-provider interaction. These results indicated the need to raise awareness regarding the importance of cultural learning. The health beliefs and cultural healing practices involvement in the collection of the case histories are essential. This helps in the conducting of the clinical examinations and development of culturally based care plans with the patients from diverse cultural backgrounds (Khanna, Cheyney, Engle, 2009, p. 890). This study indicated that, for cultural competency to be successful, it needs to go beyond the racial and ethnic differences. It should incorporate issues pertaining to sexual orientation, socioeconomic status, health insurance status and type/ timing of care in the provision of health care services. It is also a dynamic process rather than 1-time, structured training endeavor lending itself to rigorous, quantitative analysis. It should be expanded to include multiple markers of differences (Khanna, Cheyney, Engle, 2009, p. 891). Buy custom Health Care Issues and Cultural Effects essay

Monday, November 4, 2019

Printmaking Essay Example | Topics and Well Written Essays - 500 words - 1

Printmaking - Essay Example This painting shows a variety of things and affects the reader’s emotion in a variety of ways. The ability of the painter to incorporate simplicity and complexity all at once, or peace and hostility simultaneously, movement and stillness in the same piece make this piece highly admirable and equally impressive.The painter merely used paper and charcoal as opposed to using other preferable and durable media. Thirdly, the piece is also highly inspirational since it connects the audience with the emotions of the painter. Viewing such a painting, one would argue that the painter was in a state of emotional confusion, or experience mixed feelings with a deep urge to be at peace. As such, the depiction of the painting using diverse emotions and a key purpose in mind presented just the perfect piece of work. As such, the most intriguing aspect of the printmaking project by Nelligan is the fact that the painting is a metaphorical oxymoron. The depiction of two sides of an emotion in t he same picture, two opposing themes and two opposing features of a painting is the key reason that this painting is the perfect selection. The simplicity holds in it, from the media to the subject or overall theme of the painting is also admirable. The painter focused on a set of values and this thus shows a significant aspect about the exceptionality of the painter, a feature that any printmaker or painter would love to possess as a skill set. As such, the selection of this piece is based on one main conclusion; it is spectacular.

Saturday, November 2, 2019

Debate outline Research Paper Example | Topics and Well Written Essays - 500 words

Debate outline - Research Paper Example The ethical dilemma for the medical profession and the family of the afflicted individual give rise to ongoing debates. Both sides present strong arguments for their side. II. Facts for Pro and Con side a. Pro side-Seven facts to support the Pro side of the debate In more ways, the aging group is more susceptible to developing clinical conditions that require extensive hospitalization, as most present protracted medical status; however, the exact pathophysiological path towards worsening condition remained indefinable (Kaufman, 2009). As such, clinical practitioners may try a number of treatment procedures with vague clinical presentation, possibly even during critical times in patient status, but these measures may remain in futile attempts as they do not target the exact cause of geriatric condition. In most cases, the education and vast clinical experiences that health professionals have acquired in academic and clinical settings do not assure that they are no longer liable to mak e clinical errors, especially on the side of the â€Å"omnipotent† physicians in predicting the outcomes of patients’ condition and course of disease process.