Wednesday, October 30, 2019

Consumer and Buyer Behavior; An investigation into UK Mobile Phone Essay

Consumer and Buyer Behavior; An investigation into UK Mobile Phone network providers - Essay Example Current study focuses on the examination of buyer and consumer behaviour in British market regarding a particular industrial sector, this of mobile phones; the specific part of the industry under analysis is that of the mobile network providers. In Britain there are no many mobile network providers: they are approximately five: Orange, Vodafone, T-mobile, O2 and 3G. These network providers also serve as ‘hosts’ for other – limited – networks like Virgin and OneTel. The research made on the various aspects of activities of these firms within the British market proved that they all have significant advantages and weaknesses. The empirical research (survey) that was conducted for this study led to the conclusion that British industry of mobile network providers is divided in 5 major parts responding to the firms named above; the entrance of a new firm in the specific market would be a challenging initiative; however it is necessary that existing infrastructure and services are updated in order to ensure the competitiveness of these firms in the long term. The development of mobile networks providers industry in Britain has been gradual. Vodafone and O2 has been in the specific sector of British market for quite a long while the other firms, Vodafone, Orange and 3G followed later. In fact, 3G is a quite recent firm in the specific industrial sector; the firm entered this sector in 2003; it is the first firm operating in this industry that offered to its clients the third generation technology. It should be noticed that the competition in this industry remains high despite the fact that no new (after 2003 and the entrance of 3G) firms have entered the specific industry. The increase of competition in all commercial areas is a phenomenon that has been extensively analyzed in the literature and the empirical research. In accordance with Douglas et al. (1989, 437) ‘recent years have witnessed

Monday, October 28, 2019

Cable TV Vs Network TV Essay Example for Free

Cable TV Vs Network TV Essay In addition, consumer trend have changed from dish network, to cable network and direct network. First, consumer had access to only dish networks which provided a limited variety of channels through a satellite receiver and dish antenna. The antenna had to revolve at specific angle in order to capture different channels, nut then, cable television came into play which entirely changed the concept of watching television. With hundreds of channels through a single wire, people had access to more information then ever before. Concept of couch potatoes also came onto stage according to which there were viewers who actually switched between channels the entire day as they had a large variety of channels . The largest impact of such advancement was seen in the developing countries which actually came to know what was happening in the world outside at a larger scale. Due to a variety of channels covering all sectors of daily life, many cultures started to adopt the western culture because of the fact that most of the channels on cable at that time belonged to the west. This was the time when new TV channels came on air even more rapidly then the news. Globalization and the concept of westernization in different cultures was seen as the west projected its media all over there world. However, today, the concept of direct TV and network TV are on their boom rather then cable TV because of the fact that consumer preferences have an addition of high quality resolutions rather then just the variety which only the direct TV networks provide. Customer satisfaction and high resolutions were met through which customers paid for only those channels which they wanted to watch rather then subscribing to all of the channels and then switching between them. Viewers want quality entertainment more then they want bulk entertainment. Almost all news channels tell the same story with different perspectives, but, viewers what to see what is right, what is in accordance to their perspective and stance on specific issues, what is in line with their tastes, what attracts them the most, what tells the truth and what is more attractive. Thus, as direct network TV offers high quality resolution, high quality services and broadcasting along with selection of the channels, the viewers are moving towards this type of media rather than the booming cable network industry.

Saturday, October 26, 2019

First World War Poetry Essays -- The Great War Poems Poetry Literature

First World War Poetry ".......Above all I am not concerned with poetry. My subject is war, and the pity of war. The poetry is in the pity." -Wilfred Owen. The First World War, or The Great War, was fought over the period August 1914 to November 1918. Although this was fought in many locations, and on a number of continents, the Western Front was the scene of some of the most important and bloodiest battles of the War. The Western Front was a series of trenches running through Belgium and France that formed the front line between the Allied and German forces. Many of the WW1 poets saw action on the Western Front. The War was dehumanising and it brought home how quickly and easily mankind could be reduced to a state lower than animals. The First World War, with its mass volunteers and conscription of educated, non-professional soldiers, saw the appearance of a new phenomenon - the soldier-poet. For the first time, war poetry appeared designed to educate its audience to the horrors of war. The First World War provides a unique moment in the twentieth-century in which literate soldiers, plunged into inhuman conditions, reacted to their surroundings by writing poetry. In fact, as subsequent years have proved, those poems have gone on to give a vision of this historical event to the public which otherwise would probably have gone unknown since it was a period of time when there was no reporting as we know it, in terms of front line war correspondents for newspapers, radio or television. Rupert Brooke Brooke was born in 1887 at Rugby where his father was a housemaster. One of the many ironies of the war is that Rupert Brooke is remembered as a war poet because his actual war experience consis... ...because it only addresses the poet’s feelings of personal loss. It has similarities in tone to both The Soldier and In Flanders Fields because of its romantic nature. It is not at all alike Dulce et Decorum Est since that is purely relating to the horrors of War and Vera Brittain doesn’t directly discuss the issue of war in her poem at all and unless the reader knew she had lost someone in WW1 she might have been writing about the loss of anyone close to her who had died under any circumstance. My Favourite Poem I prefer Perhaps of all the poems because it is beautifully written and is very touching. When I read the poem for the first time I was genuinely affected by what she said and the way she said it. I could see the imagery in her words and feel her pain at the loss of her fiancà ©e. It is a sad poem but the words themselves are very beautiful. First World War Poetry Essays -- The Great War Poems Poetry Literature First World War Poetry ".......Above all I am not concerned with poetry. My subject is war, and the pity of war. The poetry is in the pity." -Wilfred Owen. The First World War, or The Great War, was fought over the period August 1914 to November 1918. Although this was fought in many locations, and on a number of continents, the Western Front was the scene of some of the most important and bloodiest battles of the War. The Western Front was a series of trenches running through Belgium and France that formed the front line between the Allied and German forces. Many of the WW1 poets saw action on the Western Front. The War was dehumanising and it brought home how quickly and easily mankind could be reduced to a state lower than animals. The First World War, with its mass volunteers and conscription of educated, non-professional soldiers, saw the appearance of a new phenomenon - the soldier-poet. For the first time, war poetry appeared designed to educate its audience to the horrors of war. The First World War provides a unique moment in the twentieth-century in which literate soldiers, plunged into inhuman conditions, reacted to their surroundings by writing poetry. In fact, as subsequent years have proved, those poems have gone on to give a vision of this historical event to the public which otherwise would probably have gone unknown since it was a period of time when there was no reporting as we know it, in terms of front line war correspondents for newspapers, radio or television. Rupert Brooke Brooke was born in 1887 at Rugby where his father was a housemaster. One of the many ironies of the war is that Rupert Brooke is remembered as a war poet because his actual war experience consis... ...because it only addresses the poet’s feelings of personal loss. It has similarities in tone to both The Soldier and In Flanders Fields because of its romantic nature. It is not at all alike Dulce et Decorum Est since that is purely relating to the horrors of War and Vera Brittain doesn’t directly discuss the issue of war in her poem at all and unless the reader knew she had lost someone in WW1 she might have been writing about the loss of anyone close to her who had died under any circumstance. My Favourite Poem I prefer Perhaps of all the poems because it is beautifully written and is very touching. When I read the poem for the first time I was genuinely affected by what she said and the way she said it. I could see the imagery in her words and feel her pain at the loss of her fiancà ©e. It is a sad poem but the words themselves are very beautiful.

Thursday, October 24, 2019

Hunting and mindset Essay

I believe if you have a fixed mindset it’s never too late to change and adapt to a growth mindset. The growth mindset will lead you to try new things but a fixed mindset will stop you in your tracks causing you only to fail. The type of mindset you have is very important because it will influence your life in many ways. What is the difference between a growth and fixed mindset? Well a growth or positive mindset leads to a desire to learn and therefore a tendency to embrace challenges, persist in the face of setbacks, see effort as the path to mastery, and learn from criticism, and find lessons in the success of others. As a result you will reach even higher levels of achievement. A fixed or negative mindset leads to a tendency to look smart at any cost. Therefore a tendency to avoid challenges, give up easily, see effort as fruitless or worse, ignore useful negative feedback, and feel threatened by the success of others. As a result you will plateau early and achieve less than your full potential. Some of the ways a positive mind set affected my life happened early in my life. For example when I was ten years old I went to camp seven hills and took on archery. It was really hard but I learned it very quickly and never gave up. When I got home from camp I asked my dad if I could go hunting with him once I was old enough and he told me girls cant hunt we are too weak. Because I had a growth mindset I never gave up I practiced without my father every day for three years. I got my hunting license when I was thirteen and went with my friend mike and his parents to their cabin in Olean NY. It was really cold out that day I remember shaking while perched up in my tree I wanted to give up so bad but I wanted to prove my dad wrong and show him that girls can hunt. Finally a 8 point buck walks in my range I got my bow ready and breathing slowly I pull back the arrow aim for the kill spot let go WAMM right threw his lungs. I was so excited knowing I just proved to my father that I can do anything I put my mind to. After I turned fifteen I started to develop more of a fixed mindset towards school which affected my life in many ways. It all started with failing one test and my life spiraled downhill from there. It was 2003 and I thought I was on top of the world I could pass any test without studying and I thought I knew everything, but what I didn’t know is how this stuck up attitude was going to change my life in a huge way. I walked into my class head in the clouds sad down and looked at my test â€Å"spelling ha this is going to be easy† I muttered. I flew through the test handed it in and walked out. The next day I got to class and my teacher handed me my test my jaw dropped â€Å"this has to be a mistake I couldn’t of got only a 63% on my test you had to grade it wrong† I yelled to the teacher. She gave me detention for yelling at her in class but I didn’t bother going I was so mad. I started skipping school and going to parties because at this point I started not to care anymore. When I got home one day my dad grounded me because the school called him and mentioned my behavior to him. I was so mad I ran away from home and started drinking and doing drugs. This caused me to get put in a detention center when I was sixteen and when I got out I moved in with my mother because she didn’t care what I did. Now twenty-three I have started to work at getting back into a positive mindset so I can be a good role model for my daughter. In order for someone to adopt a growth mindset, they would have to care about what their mindset is, understand why they act the way they do, and understand that they can change, and the reason for change, which would be to become a better person, which they would also have to care about. Our mindset will affect us in many ways and it can also affect the people around us which are why we should try to keep a growth mindset.

Wednesday, October 23, 2019

The American Dream Reasearch Paper

Zac Duncan Mrs. Hill English 6th February 3, 2013 Many people believe the American Dream today has faded. It is no longer achieved as often as in the past. Although obtaining the Dream has become difficult, people still haven’t stopped pursuing it. Despite the obstacles, the American Dream is still full of hope and enlightenment both financially and emotionally. The American Dream is known for its positive connotation, but there are many obstacles surrounding it. According to, â€Å"Obstacles to the American Dream†, by Eddy Isango, the Dream is toughest for immigrants.Many immigrants have problems learning the English language. When they arrive it is as if they have to start all over. Immigrants also don’t receive state benefits such as health care and food stamps. They have to find jobs that provide these for them, which is tough with the lack of job opportunity and rising cost of living in America. Financial obstacles of the American Dream can be overcome. Riev a Lesonsky encourages people to get over these hills by saying, â€Å"Acknowledge the hard times† (Lesonsky 1). People believe the Dream is changing. â€Å"Today, they say, the ‘dream’ is more likely about making money†, (Lesonsky 1).People have moved towards opening small businesses to achieve their financial dreams. These businesses, over time, increase the revenue of the people. The American Dream is still filling the emotional needs of people. Jeremy Pratt has dealt with a learning disability his whole life, but doesn’t let this stop him from achieving his dream as he says: ‘I’ve always had to work a bit harder than my friends without disabilities,’ says the 28-year-old. ‘But I finally feel like I’m on the way to having what everyone dreams of. ’ Pratt’s diligence in saving money is paying off; he plans to start house hunting as early as 2013. Blatt 1) Jeremy is achieving his life-long goal of buyin g a house filled with his art. He fought through his disability and obtained what he wanted. The American Dream still has appeal to Americans today. People still strive for a better life for themselves and their families. The freedoms of America allow for people to obtain their financial and emotional dreams that they have longed for. Works Cited Blatt, Burton, Jeremy Pratt. Achieving the American Dream. February 5, 2013 Isango, Eddy. Obstacles to the American Dream. February 3, 2013 Lesonsky, Rieva. The American Dream is Alive and Well-and Transformed. February 3,2013

Tuesday, October 22, 2019

What does the Handmaids Tale contribute to the debate over essays

What does the Handmaids Tale contribute to the debate over essays What does the Handmaids Tale contribute to the debate over womens positions in society today? Throughout the Handmaids Tale there is a connection between womens roles in our society today and that of how they are perceived in the novel. All of the different roles in society are shown for example housewife, mother, prostitute, feminist in the novel but are more emphasised and instead of the multi-roles that many women take on today mostly by choice, the women in Gilead have theirs forced upon them and that is the single role that they must stay in. The Marthas in the Handmaids Tale are the stereotypical housewife; they do the Commanders cooking, shopping and even bath Offred. They are in contrast with a typical 1950s housewife who stayed at home and looked after the children which is also a job of the Martha when a child is born she wants a little child so spoil in the kitchen, to iron clothes for, to slip cookies into. The wives seem to be just for show; there is no pacific reason for their role apart from the fact that they are simply the wives of the commander Or knitting scarves.... maybe its just something to keep the Wives busy, to give them a sense of purpose. They mostly seem to be middle-aged because of her arthritis and unable to breed, hence the handmaids. This could seem to be a comparison to modern day trophy wives usually attractive young women whose husbands marry purely based on their appearance therefore basically to show them off. The Handmaids are basically there for breeding only. Their identity has been stripped as they take on the name of their commander e.g. Offred, Ofglen, Ofwarren. This is also a tradition in modern society however as when a woman marries she usually takes upon the surname of her husband and loses her own, family name. The Han...

Monday, October 21, 2019

The Winslow Boy

The Winslow Boy Free Online Research Papers The Winslow Boy Theatre Essay Recently, I have been studying a play written by Terence Rattigan, titled â€Å"The Winslow Boy†. It is based on a true story during the depression building up to World War 1. The main theme that I have noticed throughout the book is the principle and concept of the phrase â€Å"Let right be done†. The second theme, which I find is almost equally as important, is that the ideology of a country, responsible for rights and justice, should never be looked past, even in times of war and International instability. Finally I am going to state and capture the philosophical differences between right and justice. Also discussing whether achieving justice also achieves right. The play itself, documents the struggle of Ronnie Winslow’s father, Arthur Winslow, as he tries to achieve what is right for his son. Ronnie had been expelled from his Naval College, without trial, for the theft of a 5-shilling postal order. There was no solid evidence that it was Ronnie that stole the postal order, but the Naval College took all of the circumstantial evidence into hand, considering the time periods of which Ronnie had the opportunity. Arthur, throughout the psychological massacre, sacrifices his health, his money, his dignity, and his closest characteristic, his pride. He keeps the case running, and keeps Sir Robert Morton, the highest regarded attorney of law in Britain at the time, on the case while slowly deteriorating, physically, emotionally and mentally. Many Interruptions during the case cause Arthur to have second thoughts, but he just keeps breaking through and going on with the case. Until Catherine’s marriage plans are threatened, by her groom’s father. And Arthur passes unto Catherine the power to halt the case. Catherine ends up giving the ongoing case the green light to go on even more. Until, in the end, the case is won. A rather ironic victory, resulting in huge material losses, but pride and dignity were regained. There are several key incidents, included in the plot, that show that the main theme of the entire play is the coveted phrase â€Å"Let Right Be Done†. The first incident, in which the concept of â€Å"Let Right Be Done† is sewn into the story, is during the scene that Arthur Winslow has to break the news to his eldest son, that he can longer attend Oxford University. Arthur Felt that paying the fees and funding for Dickie, his eldest son, to continue going to university every year was a huge gamble, and the â€Å"odds† of Dickie getting a degree at the end of the year were exceedingly low. Arthur felt that, the chances of Dickie getting a degree, compared to the annual tuition fees made it clear that he was paying for a lost cause, but Arthur needed all the money he could get to keep the case running. That scene, one of the first to truly express the principle, shows that Arthur will make many sacrifices and go through a lot of emotional pain to prevent ending the case. Arthur makes it clear that serious about Ronnie getting the essential rights and proving to the government that even during war, a time where everyone must make huge sacrifices, the law, still, may not overlook right. That is why it is a prime example, in which the concept of â€Å"Let Right Be Done† is included. The Second scene that frames the concept of â€Å"Let Right Be Done† is when Arthur hears news that Catherine’s fiancà ©Ã¢â‚¬â„¢s father refuses to support his son, John, is he continues on to marry Catherine. John’s father does not want him to marry Catherine, because her family are currently in the media, obviously in the lawsuit against the navy. John’s father does not like this because he is a former Navy General. Arthur, After he finds out about John’s father, then caves to the pressure and since Catherine was clearly the favourite of Arthur he passes on the power to carry on, or end, the case to his daughter, Catherine, whom her marriage is threatened if the case goes on. Catherine then, patriotically, continues the case, through her marriage being in jeopardy, with the eternal line â€Å"Let Right Be Done†. The final scene, in which, I find strips off and unveils the bare anatomy of â€Å"Let Right Be Done† is post-case. Arthur and Ronnie emerging with a, rather, down victory. Sir Robert Morton arrives at the Winslow house, begins talking to Catherine, and announces â€Å"I wept today because right had been done† and Catherine replies â€Å"Not Justice?† Then Sir Robert speaks one of the most eternal lines throughout the play, â€Å"No. Not justice. Right. It is not hard to do justice-very hard to do right. Unfortunately, while the appeal of justice is intellectual, the appeal of right appears, for some odd reason, to induce tears in court. That is my answer and my excuse. And now, may I leave the witness box?† To understand the philosophical differences between â€Å"Right† and â€Å"Justice†, you must first understand the singular meanings for the words. Right is correct in judgment, opinion, or action. Right is also in conformity with fact. Yet justice is in conformity with the law, and what is politically right. Surely what is politically correct must succumb to what is morally correct in the world. Incontrovertibly the differences between right and justice are that justice, which is easily achieved, can be done by going through the law, which is continuously run in the country. But ‘Right’, which is much harder to obtain, has to be achieved through all of the correct morals and civil liberties. Right should be unalienable even if in collision with justice. The story of â€Å"The Winslow Boy† is made truly interesting by the complex and in-depth personas of the characters. But the most outstanding and intriguing character throughout the story, in my opinion, is undoubtedly Sir Robert Morton, the lawyer that defends the Winslow family. Sir Robert Morton is unpredictable, flamboyant and mysterious, to name only a few of his qualities. He is a psychological surgeon that cerebrally dissects all of his subjects that stand between him and justice, in this case justice and right. He is a young man, around the age of 35, and he is at the peak of his career. Sir Robert Morton, I feel, takes on the Winslow case because he sees it as a challenge; he sees it as a chance to prove right, when formerly he could only do justice. He takes the case because he believes in Ronnie. Clearly, Sir Robert Morton could do justice and win almost every case that he is employed to, but he was acting as an unscrupulous, justice-achieving machine and had not yet believed in a case to such an extent that it induced his tears in the courtroom, let alone achieving right. Into a more personal side of Sir Robert’s life, there is evidence to support the theory that Sir Robert could have possibly had sentimental feelings towards Catherine. Towards the end of the play, mid-case and post-case, Sir Robert’s way with words changes with low lucidity yet it can be significant if noticed. Sir Robert begins to put himself down while around Catherine. He begins to try and make Catherine feel higher. Evidence of this is when Sir Robert is talking to Catherine (Ref. p86) on the subject of Sir Robert’s stubbornness. Sir Robert says â€Å"Ah. That is perhaps the only quality I was born with-the ability to make myself a confounded nuisance.† I think that, like Catherine, Sir Robert is rather insecure about his emotions. He is very kept to himself. He hides behind a seemingly cold-blooded, dispassionate guise, which I would assume would assist in his career as a lawyer, but would not put him any place of happiness. He is so used to the use of his ‘poker-face’ that it has become his ongoing personality. Sir Robert also seems to think in such a way that career, justice and right must always come before such ‘evanescent’, ‘inconsequential’ emotions such as love. He feels that he must continue on as the loner he has always been on the inside. He supports others in achieving justice and happiness yet he has not gained support for himself. A seemingly insignificant trait of his personality makes it seem unlikely that he will be able to settle down and form a family, something about his character gives me idea that his life will continue hollow. He is an incredibly strong character that would be able to live out his life without a partner. Yet life without love can barely be called life. His life will most likely go on with a sentimental vacancy, and will always be slightly emptier than he would hope. Most of my above opinions derived from the scene right at the end of play where Sir Robert leaves the Winslow House, never to return. It was the opportune moment for either Catherine or Sir Robert to break the ice, for their obvious feelings towards each other, yet nothing happens. It is an anti-climax that truly made me think that the souls of Sir Robert and Catherine will continue on, in desolation and apathy. The scene almost sickened me that neither Catherine nor Sir Robert took action. Why would a beautifully growing flower refuse to bloom? Maybe afterwards they realised that they should have made their feelings known to each other, yet it was too late for their lonely hearts. And those hearts would continue on lonely. When I first began reading the play, I found it rather boring. But as it went on and I realised the principles and morals of the story I began to grow attached to the story. I thought the relationship between Catherine and Sir Robert was the most interesting issue, I was very interested in which direction the ‘romance’ between the two was going to go. I enjoyed adding my strong opinions on the anti-climax of Sir Robert and Catherine’s feelings for each other. I also took pleasure in writing about the extensive use of the concept â€Å"Let Right Be Done†. I enjoyed finding the philosophical differenced and adding my own thoughts on the battle between ‘Right’ and ‘Justice’. All in all I enjoyed this book, because it failed to stay within the cover, the story sprung into real-life as I compared the sentimental and political issues to the world nowadays. Research Papers on The Winslow BoyCapital PunishmentThe Masque of the Red Death Room meaningsWhere Wild and West MeetTrailblazing by Eric AndersonEffects of Television Violence on ChildrenMind TravelThe Fifth HorsemanAppeasement Policy Towards the Outbreak of World War 2Honest Iagos Truth through DeceptionComparison: Letter from Birmingham and Crito

Sunday, October 20, 2019

How to Make a Rainbow Rose (and How It Works)

How to Make a Rainbow Rose (and How It Works) Have you seen a rainbow rose? Its a real rose, grown to produce petals in rainbow colors. The colors are so vivid, you may think pictures of the roses are digitally enhanced, but the flowers really are that bright! So, you may be wondering how the colors are made and whether the rose bushes that produce these flowers always bloom in vibrant colors. Heres how it works and how you can make a rainbow rose yourself. How Real Rainbow Roses Work The rainbow rose was developed by  Peter van de Werken, the owner of a Dutch flower company. While special roses are used, the plants are not bred to produce the rich colors. Actually, the rose bush would ordinarily produce white roses, but the stems of the flowers are injected over time with dyes so that petals form in bright single colors. If the flower isnt treated as it is growing, the blooms are white, not ​rainbow. While the rainbow is a special version of the technique, other color patterns are also possible. Its not a science trick you can achieve quite so well with your home rose bush, at least not without a lot of experimentation and expense, because most pigment molecules are either too large to migrate into the petals or else too toxic for the rose to flower. Special proprietary organic dyes said to be made from plant extracts are used to color the roses. Making Rainbow Roses at Home While you cant duplicate the exact effect, you can get a lighter version of a rainbow using a white rose and food coloring.  The rainbow effect is much easier to achieve with white or light-colored flowers that arent as woody as a rose. Good examples to try at home include carnations and daisies. If it has to be a rose, you can do the same project, but expect it to take longer. Start with a white rose. Its best if it is a rosebud because the effect relies on capillary action, transpiration, and diffusion in the flower, which takes some time.Trim the stem of the rose so that it is not extremely long. It takes more time for color to travel up a longer stem.Carefully split the base of the stem into three sections. Make the cuts lengthwise up the stem 1-3 inches. Why three sections? The cut stem is fragile and likely to break if you cut it into more parts. You can use color science to achieve the full rainbow using three colors - red, blue, yellow or yellow, cyan, magenta - depending what dyes you have available.Carefully bend the cut sections slightly away from each other. Now, one way to apply the dyes would be to bend the stems into three contains (e.g., shot glasses), each containing a single color of dye and a bit of water, but this is hard to accomplish without breaking the stems. An easier method is to use 3 small plastic baggies, 3 rubber bands, and o ne tall glass to hold the flower upright. Into each bag, add a small amount of water and several (10-20) drops of one color of dye. Ease a section of the stem into the bag so that it is immersed in the dyed water, and secure the bag around the stem with a rubber band. Repeat the process with the other two bags and colors. Stand the flower in a glass. Check to make sure each stem section is immersed in the liquid since the flower needs water to live.You may start to see color in the petals as quickly as half an hour, but expect to let the rose soak up dye overnight or possibly for a couple of days. The petals will be the three colors, plus the mixed colors, for petals receiving water from two parts of the stem at once. This way, youll get the whole rainbow.Once the flower is colored, you can trim off the cut section of stem and keep it in fresh water or a homemade flower food solution. Helpful Tips Flowers take up warm water more quickly than cold water.Keep the rose away from light and heat, since these can cause it to wilt and die too quickly.If you want to try injecting flowers with natural colors, learn about natural pigments you can use.

Saturday, October 19, 2019

Manage Personal Work Priorities and Professional Development Essay

Manage Personal Work Priorities and Professional Development - Essay Example As such it is an important unit for most managers, particularly as managers serve as role models and have a significant influence on the work culture and patterns of behaviour. Elements of Competency Unit code: BSBWOR501A: Unit title: Manage Personal Work Priorities and Professional Development Element Performance Criteria 1. Establish personal work goals 1.1 Serve as a positive role model in the workplace through personal work planning and organisation 1.2 Ensure personal work goals, plans and activities reflect the organisation's plans, and own responsibilities and accountabilities 1.3 Measure and maintain personal performance in varying work conditions, work contexts and contingencies 2. Set and meet own work priorities 2.1 Take initiative to prioritise and facilitate competing demands to achieve personal, team and organisational goals and objectives 2.2 Use technology efficiently and effectively to manage work priorities and commitments 2.3 Maintain appropriate work-life balance, and ensure stress is effectively managed and health is attended to 3. Develop and maintain professional competence 3.1 Assess personal knowledge and skills against competency standards to determine development needs, priorities and plans 3.2 Seek feedback from employees, clients and colleagues and use this feedback to identify and develop ways to improve competence 3.3 Identify, evaluate, select and use development opportunities suitable to personal learning style/s to develop competence 3.4 Undertake participation in networks to enhance personal knowledge, skills and work relationships 3.5 Identify and develop new skills to achieve and maintain a competitive edge Skills and Knowledge Required skills communication skills to receive, analyse and report on feedback literacy skills to interpret written and verbal information about workplace requirements organisational skills to set and achieve priorities. Required knowledge principles and techniques involved in the management and orga nisation of: performance measurement personal behaviour, self-awareness and personality traits identification personal development plan personal goal setting time management management development opportunities and options for self organisation's policies, plans and procedures types of learning style/s and how they relate to the individual types of work methods and practices that can improve personal performance. Range statement The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included. Own responsibilities and accountabilities may include: expectations of workplace performance as expres sed in a performance plan outputs as expressed in position descriptions or duty statements statement of conduct outlining an individual's responsibilities/actions/performance Technology may include: computerised systems and software, databases, project management and word processing electronic diary personal digital assistant (PDA) Competency standards

Death penalty Research Paper Example | Topics and Well Written Essays - 1500 words

Death penalty - Research Paper Example However, death penalty is given for heinous crimes and should not be wholly abolished as it will exempt the fear from the heart of criminal minded people and they will be prone to enjoy liberty in doing crimes. This paper will analyse death penalty in relation to minorities related to different class structures and races, and women on death row. Further, we will also talk about abolition of death penalty. The system of death penalty in many countries around the world is somewhat flawed as the people who are allocated to die for their crime are selected not through justice for all, but through racist motives. The people who usually get the death penalty or are placed on death row belong mostly to the minorities or poor classes of a society. In US, the African Americans and poor people usually face death penalty (Guernsey 7). The criminals who are sentenced to death are kept in special facilities called death row. These death rows are separated from the rest of the prisons (Guernsey 24). Many analysts support death penalty while others deny it altogether. The supporters find the system not racist while others regard it racist. The death penalty cases involving African American defendants are decided by white juries and attorneys who show their belief in death penalty. However, when the cases of white defendants are decided, they usually get less than death penalty. This is not the case always, but mostly the system papers racist (Guernsey 83). White population in US is the minority in terms of being punished with death penalty, however, African Americans form the greatest total of those receiving death penalty after the 17th century (Allen, et al 15). In case of analysis of gender in getting death penalty, it is quite clear that women faced lesser chances of getting death penalty than men. Prior to 1945, women out of those given death penalty were

Friday, October 18, 2019

Write an essay that identifies and discusses the many selective

Write an that identifies and discusses the many selective pressures leading to bipedalism in our ancestors and us - Essay Example While habitual bipedalism does not seem like the most effective and fastest form of walking and running, it portends various advantages for hominids over specific specialized quadrupedal forms. Although the reason why early hominins took a bipedal stance is not entirely clear, majority of these hypotheses propose the importance of selection pressures based on the environment in driving bipedal evolution (Sarmiento 62). As climatic conditions resulted in the recession of forests, hominins started to move out of the forests into the grassland savannas where it was essential to assume bipedalism to aid in survival. The postural feeding hypothesis seeks to assert the fact that a shared postural specialization and adaptation of apes, as well as the arboreal postures of food gathering involving vertical climbing and arm-hanging, are adequate enough to have been a selective pressure encouraging bipedalism in hominids (Sarmiento 63). The anatomy of both the australopithecine and the behavior of chimpanzees are the major points that inform this model of selective pressures towards bipedalism. For instance, at least 80% of the time that chimpanzees spend in a bipedal stance is when they are feeding, of which they use arm hanging to stabilize their posture at least 90% of the time in terminal branches of the trees, while 52% of arm-hanging occurs in the trees’ central parts (Sarmiento 63). For australopithecines, their torso form has adaptations to arm-hanging, which may infer that australopithecines adapted to selective pressures requiring arboreal fruit gathering. This specialized and early m ode of bipedalism evolved to become habitually bipedal much later. On the other hand, the behavioral model as an explanation for selection pressures resulting in hominid bipedalism concentrates on mechanisms of social behavior that influenced birthrate and survivorship. Human

Website Interface Re-design 3 (Evaluation Report) Research Paper

Website Interface Re-design 3 (Evaluation Report) - Research Paper Example This critically looks into the extent of how easy it is to learn its use, apply it effectively, re-familiarize with its functions, and its level of flexibility as discussed below. This prototype provides a very distinct level of learn ability due to the appropriate use of Gestalt principles of proximity and similarity. The five colorful circle-shaped buttons in the home page provides quick and direct links to other web pages. Web prototype under evaluation is established with the understanding of both experienced and inexperienced end users of Web-site applications. For instance, various navigation options (on the drop-down menu and active links) are provided for use to similar pages. However a little more should be done to ensure that this application can also be accessed through simple gadgets such as smart phones for maximum usability and accessibility. Usefulness level of a website is determined by its main objectives and purposes for which it was developed, compared to its provisions. If the two contradicts, then it is irrelevant and not useful to either of the parties using such an application. Our case study is considered very relevant since its provisions are within its set mandates and priorities. E-commerce websites have all sorts of visitors. The groups of visitors include serious buyers, those who just browse through web pages and friends who wish just to chart on the website platform. Clear, concise, descriptive and easily understandable language should hence be used for efficiency and effectiveness. A standard website should support quick and complete loads (upload and download) with a consistent look on all browsers. Well organized home page with concise contents, consistent navigation choices, a site map and search engines. Good and highly competitive e-commerce websites must have easy-to-access product catalogues from home page with product categories being easy to understand and navigate through. Additionally, all catalog info and

Thursday, October 17, 2019

Sociology of Deviance Essay Example | Topics and Well Written Essays - 1750 words

Sociology of Deviance - Essay Example As such, being a victim of these petty and big crimes can be truly devastating and traumatizing as well. On the other hand, if one tries to set aside angry feelings and desires to get back at the enemy, then he may start to wonder how such a person can do harm to another. The first thing that may come to mind is that the perpetrator is simply a selfish person who will do anything to satisfy himself at the expense of the victim. For people who can go deeper than this thinking, they will start to reflect on the person and what factors could have made him do such a terrible thing. It is always possible that the person may have some form of psychological illness that he is unable to resolve and thus have resulted in a behavior void of any form of guilt or remorse. Aside from this, one may have the thinking that the perpetrator could have experienced some really painful events in his life to make him really angry at the world and does everything to destroy the same environment in order to get back at it. Whatever the reason is behind the deviance is a concept that is very interesting to explore. This time however, the focus will not be in sympathizing with the victim but in trying to get to know the aggressor more deeply and see what is behind the hostility that has driven him to become the person that he probably could not imagine to develop or become. This paper intends to present the hypothesis that deviance is a result of environmental factors that have a major influence in the formation of one’s attitude towards the society but the individual still has the power to imbibe this influence or not. Those who get involved in deviant behavior have done so because it was the society that has taught them to act in this manner in the first place. Each child is born in this world armed with his genetic structure. However, it is not only genetics that plays a major role in this phenomenon.

Internet Marketing Project Essay Example | Topics and Well Written Essays - 5250 words

Internet Marketing Project - Essay Example In the onset of advanced information technology, internet marketing has become an integral part of its existence. Marketers use this as an opportunity to market their products and service offerings. The purpose of this report aims to create a comprehensive web traffic and marketing plan to promote and develop the Facebook group website--MarketNet. The information and ideas used in this report are coming from reliable journal articles and relevant textbooks. All ideas especially in the section of web market plan include important marketing concepts that are practically obtained from various marketing studies. Central Queensland students are increasing in number and they are coming from local and international. The increase of students ensures increase of website traffic at Alexa, the Central Queensland University website. It is found that from demographics, psychographic, geographic and behavioral analysis, students tend to appreciate the value of website for them to use relevant information based on their needs. The Web Traffic Plan is a comprehensive strategic move to ensure successful implementation of marketing objectives prior to increase web traffic for MarketNet. The plan started with different marketing objectives then followed by strategic moves based on the principles of extended marketing mix. Finally, the proponent tries to indicate important activity measures that will help ensure that the marketing objectives are remarkably achieved. ... in traditional approach of sharing information about their product or service offerings, but specifically on employing the best strategies by using the full potential of internet. Today, marketing finds its way through social network sites. It tries to implement this by ensuring remarkable traffic. However, social network sites need also to promote themselves. In the case of Facebook, competition is very tough. There are various social network sites that try to compete in order to become a cut above the other. Thus, the goal for each of them especially for Facebook is to market this site. One way of doing this is to ensure high traffic and substantial marketing plan. 1.2 Aims This report aims to create a comprehensive web traffic and marketing plan to promote and develop the Facebook group website--MarketNet. 1.3 Scope This report includes the following: target audience analysis of the marketing students at Central Queensland University, and web traffic plan for the promotion and dev elopment of Facebook group website MarketNet. The information and ideas used in this report are coming from reliable journal articles and relevant textbooks. All ideas especially in the section of web market plan includes important marketing concepts that are practically obtained from various marketing studies. 2.0 Target audience analysis (Central Queensland University marketing students ) In order to help analyze this part, the proponent uses database graph from Alexa which can be found from the following website: http://www.alexa.com/siteinfo/cqu.edu.au. In the following subsections, parts of the target audience analysis include discussions in line with demographics, psychographics, geographic and behavioral. 2.1 Demographics Table 1. Search Traffic of Central Queensland University’s

Wednesday, October 16, 2019

Sociology of Deviance Essay Example | Topics and Well Written Essays - 1750 words

Sociology of Deviance - Essay Example As such, being a victim of these petty and big crimes can be truly devastating and traumatizing as well. On the other hand, if one tries to set aside angry feelings and desires to get back at the enemy, then he may start to wonder how such a person can do harm to another. The first thing that may come to mind is that the perpetrator is simply a selfish person who will do anything to satisfy himself at the expense of the victim. For people who can go deeper than this thinking, they will start to reflect on the person and what factors could have made him do such a terrible thing. It is always possible that the person may have some form of psychological illness that he is unable to resolve and thus have resulted in a behavior void of any form of guilt or remorse. Aside from this, one may have the thinking that the perpetrator could have experienced some really painful events in his life to make him really angry at the world and does everything to destroy the same environment in order to get back at it. Whatever the reason is behind the deviance is a concept that is very interesting to explore. This time however, the focus will not be in sympathizing with the victim but in trying to get to know the aggressor more deeply and see what is behind the hostility that has driven him to become the person that he probably could not imagine to develop or become. This paper intends to present the hypothesis that deviance is a result of environmental factors that have a major influence in the formation of one’s attitude towards the society but the individual still has the power to imbibe this influence or not. Those who get involved in deviant behavior have done so because it was the society that has taught them to act in this manner in the first place. Each child is born in this world armed with his genetic structure. However, it is not only genetics that plays a major role in this phenomenon.

Tuesday, October 15, 2019

Discuss the reasons why Aung San Suu Kyis struggle for democracy in Essay

Discuss the reasons why Aung San Suu Kyis struggle for democracy in Myanmar (Burma) has been unsuccessful so far. Identify what you consider to be the most important reason - Essay Example The current rule in Myanmar is considered to be one of the most offensive and repressive reign of the world at present. Many laid their lives, properties and careers’ trying to rise against this injustice but the struggle never seemed to meet its political and poetic end. Minorities fled from the country for the fear of being dealt with biasness. People of Burma finally rose against the prevalent violence and economic mismanagement in 1988 but perhaps God had to test them a bit more. The demonstrators were targeted, dealt with brutality and even killed. Hundreds of families lost their men only to witness the ruling military junta further strengthen itself. In the sea of miseries when the sun of a new day had totally been eclipsed, one ray of hope emerged from the darkness- Aung San suu Kyi. The world’s one and only imprisoned noble peace prize winner, Ms. Suu Kyi was perhaps leading a contented life with her family, when she realized her duty to her country and its people. Ambassador of Burma in D.C called her as â€Å"ordinary housewife† but she proved herself extraordinary, the way she compromised her family and twenty years of her life for democracy in Myanmar. The walk to democracy might not have been so long, had the military junta accepted the result of 1990 general election and let the winning National League for Democracy and its secretary Suu Kyi assume the office. Instead she was put under house arrest. Fourteen out of the last twenty years of her life has been spent under house arrest where no visitation by the family members or party people has been allowed. Yet, despite being the most popular political leader in Myanmar, she had to put in much more than the required efforts. Problems faced in the way of democracy: It’s difficult to comprehend the reasons of NLD’s constant failure in its efforts to restore democracy after it had nearly cleanly swept its opposition in the general elections. In

Monday, October 14, 2019

Introduction for Currys Essay Example for Free

Introduction for Currys Essay For this assignment I am investigating Currys and I will be getting information about my investigation from the customer service of Currys, but to do this I will need to know also a little bit about the customers profiles and what the customers think about Currys products and services that they provide. Background: Currys is the leading choice for families buying electrical devices for the home and other businesses. Currys also delivers their goods to their customers seven days a week to households and businesses throughout the UK. While delivering new products the Group collects 750,000 ends of life white goods appliances, fridges, freezers, cookers, computers, printers, radios, televisions, phones and washing machines, from customers homes each year, of which, until November, approximately 300,000 were fridges. Until November 2001 these were recycled or refurbished by a network of contractors, relieving Local Authorities, who would otherwise be obliged to collect or receive these products, of a significant burden. Many units were refurbished and resold at low cost, providing cheap products for families on low income (including through create, a Dixons supported project to re-train long term unemployed people as engineers). Others were exported for further use and the remainder recycled and disposed of following CFC gas extraction meeting environmental standards. In effect Dixons Group provided a cost-free channel for the disposal of this domestic waste and one which minimised the generation of extra journeys by householders or local authority collectors and is thus more environmentally acceptable. This shows how much Dixons group has been acting ethically. Services that Currys provides and competitive background: For my assignment, it is important to understand why retailers offer such services. Electrical retailing is highly competitive, like: Currys, Comet, John Lewis, Debenhams, House of Fraser, Argos, Powerhouse, Dixons and many thousands of small independent retailers all compete for trade in what many customers view as a product market. Low margins demonstrate the offer and that is the competitive nature of the industry. Because this is a competitive market, price pressure is intense and retailers will normally try to offer the lowest price in the market. So the customer gets used to the idea that prices will be similar in most outlets. Therefore there is a strict pressure to make different either by offering exclusive products or by excelling on service. That is why all retailers will offer competitive service offers including suitable delivery and after sales. No retailer will want to risk for too long a competitor being able to offer a new service recognized. As yet the leaving of take-back has had incomplete things on sales; however one of the two main peaks for sales, the hot summer months and this is the period of sales and a period that businesses look to maximise their sales. Customers profile: Most of customers of Currys are from a mixed group of age, gender and races. Most of customers that I personally see coming to the store of Currys in Chadwel heath are parents or just adults who are able to purchase products by credit cards or any other ways of payments. There are also other customers of Currys who are of an average age like teenagers who are able to pay musical items or games. Currys does not have any geographical customers because their customers are most of the time locally. Some customers have their information stored into Currys system due to their customers loyalty and due to Currys market researches. Currys gives to its customers a guarantee of purchasing items from their stores in case that the customer is not satisfied with the products or services that Currys provides to them, then the customer can take the products back and get a replacement or if possible get the customer can get his/her money back but this depends with the case. Some times if Currys cannot sort out the problem that the customer has with the products, they usually give to the customer the phone number of the company or the manufacturer of that particular product for further information or instructions about the usage of the product.

Sunday, October 13, 2019

Trusted Platform Module (TPM)

Trusted Platform Module (TPM) Trusted Platform Module (TPM) is a term used to define a chip or microcontroller. This chip or microcontroller can be placed into a motherboard configuration such as devices like mobile devices, or a personal computer (PCs). The requirements and application was presented and established by the Trusted Computing Group (TCG), to deliver a solution where a reliable and genuine relationship exists amongst hardware and software configurations. This facility was executed through cryptographic and hashing algorithms. Additional, TPM offers remote confirmation, a verification and authentication process for other third party software. TPM is a global standard for a protected crypto processor, which is a devoted microcontroller or chip intended to protect hardware by joining cryptographic keys into devices. TPMs technical requirements were established and written by TCG and launched in 2003. TCG was created as a nonprofit from inception and known to have brands like Microsoft, IBM, Intel, and Hewlett-Packard as clients. TPM just as well as others has flaws, and suffers from attacks. These attacks include offline dictionary and OIAP attacks; nevertheless, when joined with other endpoint control systems like multifactor authentication, network access control, and malware detection, TPMs contribution to a sound security platform is valid. (Sparks, 2007) This survey is a complete review of research conducted on TPM, its components, mechanisms, application, and authorization protocols. Furthermore, a description of some common attacks to which TPM has been a victim will be presented. Finally, more recent and future implementations will be discussed, such as the incorporation of TPM within mobile and smart devices and even within cloud computing. First, it is important to start with an overview of the TPM specification, its components, and its purpose. The TPM background section discusses in some detail an overarching summary of TPM. This will include what the motivations and advantages are to using TPM as well as how the different types of keys function. Also discussed is the evolution of TPM over time in how it functions in both its hardware encryption but also its capabilities. 2.1 TPM Summary A Trusted Platform Module (TPM) is a cryptographic coprocessor that replaced smart cards in the 1990s and then became present on most commercial personal computer (PCs) and servers. TPMs are almost ubiquitous in computer hardware and typically not seen by users because of the lack of compelling applications that use them. However, this situation has changed effective with TPM version 1.16 by adding the Federal Information Processing Standards (FIPS) bit which is a static flag that verifies if the device or firmware the TPM is attached to is FIPS 140-2 cryptographic module compliant. This compliance is then registered by the consolidated validation certificates granted when FIPS 140-2 is validated and are then registered and published at NIST as public record listed alphabetically by vendor located at http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/1401vend.htm. (TCG FIPS 140-2 Guidance for TPM 2.0, ver 1, rev.8, 2016) Therefore, the line of thinking of TPM has increasingly becom e one of importance and an essential ingredient to cryptographic defense community whom are required to prove their FIPS 140-2 compliance. However, this was not always the case since security was not a mainstream issue in the early years of the Internet. 2.2 Motivation to use TPM The motivation for TPM began decades after the advent of what is known as the Internet. From the creation of Advanced Research Projects Agency (ARPA) in 1969 it took almost nineteen (19) years for us to become aware of the first known exploit called the Internet Worm in 1988. (Pearson Education, Inc., 2014) Until this time the focus had always been on the development of the computer with no security hardware and software that was easy to use. There was a real concept of information security threats. However, in the 1990s there was the concept of the potential of commerce the Internet would have and the need to secure the PCs that would exchange with that commerce. This prompted many computer engineers to convene and form and develop the first TPMs which became known to be as the Trusted Computing Group (TPM: A Brief Introduction, 2015). A main objective of this group was a cost effective approach to create a hardware anchor for PC system security on which secure systems could be buil t. This first resulted in a TPM chip that was required to be attached to a motherboard and the TPM command set was architected to provide all functions necessary for its security use cases. 2.2.1.Evolution TPM has evolved considerably over the years to become the trusted platform it is today. The earlier TPM 1.2 standard was incorporated into billions of PCs, servers, embedded systems, network gear and other devices, the evolving Internet of Things and increasing demand for security beyond traditional PC environment led TCG to develop a new TPM specification, which recently was adopted as an international standard ISO/IEC 11889:2015. For more flexibility of application and to enable more widespread use of the specification, TCG created TPM 2.0 with a library approach. This allows users to choose applicable aspects of TPM functionality for different implementation levels and levels of security. Also, new features and functions were added, such as algorithm agility, the ability to implement new cryptographic algorithms as needed (Trusted Platform Module (TPM): A Brief Introduction, 2015). ISO/IEC 11889-1:2015 ISO/IEC 11889-1:2015 defines the architectural elements of the Trusted Platform Module (TPM), a device which enables trust in computing platforms in general. Some TPM concepts are explained adequately in the context of the TPM itself. Other TPM concepts are explained in the context of how a TPM helps establish trust in a computing platform. When describing how a TPM helps establish trust in a computing platform, ISO/IEC 11889-1:2015 provides some guidance for platform requirements. However, the scope of ISO/IEC 11889 is limited to TPM requirements (Trusted Platform Module (TPM) Summary, 2008). 2.3 TPM Working Functionality The TPM (Trusted Platform Module) is a computer chip (microcontroller) that can securely store artifacts used to authenticate the platform on a PC or laptop. These artifacts can include passwords, certificates, or encryption keys. A TPM can also be used to store platform measurements that help ensure that the platform remains trustworthy. This is critical because Authentication and attestation are necessary to ensure safer computing in all environments. Trusted modules can be used in computing devices other than PCs, such as mobile phones or network equipment (Trusted Platform Module (TPM) Summary, 2008). . Figure 1: Components of a TPM 2.3.1 Hardware-based cryptography This cryptography makes certain that the data stored in hardware is guarded against malicious threats such as external software attacks. Also, many types of applications storing secrets on a TPM can be developed to strengthen security by increasing the difficulty of access without proper authorization. If the configuration of the platform has been altered as a result of unauthorized activities, access to data and secrets can be denied and sealed off using these applications. TPM is not responsible for control of other proprietary or vendor software running on a computer. However, TPM can store pre-run time configuration parameters, but it is other applications that determine and implement policies associated with this information. Also, processes can be made secure and applications such as email or secure document management. For example, if at boot time it is determined that a PC is not trustworthy because of unexpected changes in configuration, access to highly secure applications can be blocked until the issue is remedied. With a TPM, one can be more certain that artifacts necessary to sign secure email messages have not been affected by software attacks. And, with the use of remote attestation, other platforms in the trusted network can make a determination, to which extent they can trust information from another PC. Attestation or any other TPM functions do not transmit personal information of the user of the platform. 2.3.2 Capabilities TPM can improve security in many areas of computing, including e-commerce, citizen-to-government applications, online banking, confidential government communications and many other fields where greater security is required. Hardware-based security can improve protection for VPN, wireless networks, file encryption (as in Microsofts BitLocker) and password/PIN/credentials management. TPM specification is OS-agnostic, and software stacks exist for several Operating Systems. 2.4TPM Components Trusted Platform Module (TPM) is the core component of trusted computing. TPM is implemented as a secure hardware chip and provides the hardware Root of Trust. TPM has been designed to provide trusted computing based on Trusted Computing Group (TCG) specifications. TPM functions can be implemented either in hardware or software. A secure cryptographic chip (Figure 2) can be integrated on the motherboard of a computing device according to TPM 1.2 specifications (Angela, Renu Mary, Vinodh Ewards, 2013). Figure 2: A TPM 1.2 Chip (Source http://www.infineon.com) A logical layout of the TPM is represented below (Figure 3) along with the TPM components. Figure 3: TPM Component Diagram (Zimmer, Dasari, Brogam, 2009) Information flow is managed by the I/O component through the communication bus. The I/O component handles routing of messages to various components within the TPM and establishes access control for TPM functions and the Opt-in component. The non-volatile memory in the TPM is a repository for storing the Endorsement Key (EK) and the Storage Root Key (SRK). These long-term keys are the basis of key hierarchy. Owners authorization data such as password and persistent flags are also stored in the non-volatile memory (Trusted Computing Group, 2007). Platform Configuration Registers (PCR) are reset during power-offs and system restarts and can be stored in volatile or non-volatile region. In TPM v 1.1, minimum number of registers that can be implemented is 16. Registers 0-7 are allocated for TPM usage leaving the remaining registers (8-15) to be used by operating system and applications (Angela, Renu Mary, Vinodh Ewards, 2013). In TPM v 1.2, number of registers can be 24 or more and categorized as static PCRs (0-16) and dynamic PCRs (17-22). The Program Code, also known as Core Root of Trust for Measurement (CRTM) is the authoritative source for integrity measurements. Execution engine is responsible for initializing TPM and taking measurements. The execution engine is the driver behind the program code. RNG (Random Number Generator) is used for generating keys, nonce creation and to fortify passphrase entropy. The SHA-1 engine plays a key role in creating key Blobs and hashing large blocks of data. TPM modules can be shipped with various states ranging from disabled, and deactivated to fully enabled. The Opt-in component ensures the state of TPM modules during shipping. The RSA engine can be used for a variety purposes including key signing, encryption/decryption using storage keys and decryption using EK. The AIK (Attestation Identity Key) is an asymmetric key pair typically linked to the platform module that can be used to vouch for the validity of the platforms identity and configuration. The RSA key generation engine are used for creating symmetric keys of up to 2048 bits. 2.5 TPM Keys TCG keys can be categorized as signing or storage keys. Other key types defined by TCG are Platform, Identity, Binding, General and Legacy keys (Trusted Computing Group, 2007). Signing keys can be classified as general purpose keys and are asymmetric in nature. Application data and messages can be signed by the TPM using signing keys. Signing keys can be moved between TPM devices based on restrictions in place. Storage keys are asymmetric keys and primarily used for encrypting data and other keys as well as for wrapping keys. Attestation Identity Keys (AIK) are used for signing data pertaining to the TPM such as PCR register values. AIK are signing keys that cannot be exported. Endorsement Key (EK) is used for decrypting the owner authorization credentials as well as cryptic messages created by AIK. EK is not used for encryption or signing and cannot be exported. Bind keys (symmetric keys) come in handy to encrypt data on one platform and decrypt it on a different platform. Legacy keys can be imported from outside the TPM and used for signing and encrypting data. Authentication keys are responsible for securing the transport sessions related to TPM and are symmetric in nature. Endorsement Key (EK) in the TPM plays a critical role to maintain system security. TPM uses a private key EK to generate other keys which are bound to a specific EK. EK should be secured and protected from being compromised. A 160-bit AIK authentication value is necessary to use the AIK by TPM (Sparks, 2007). The parent key used for generating other keys should be loaded first and authenticated by users before TPM can load all other keys. The EK is unique to the TPM and embedded within the tamper resistant non-volatile memory (Angela, Renu Mary, Vinodh Ewards, 2013). Public EK is used for creating AIK certificates and during the process of encrypting data within the TPM. The private key pair of EK is not touched when generating signatures. Multiple AIKs can be stored within a TPM to ensure anonymity between various service providers requiring proof of identity. AIK keys should be stored in secure external storage (outside the TPM) to make them persistent. AIKs can be loaded on to th e volatile memory in the TPM when in use. TPM has a Storage Root Key which stays persistent. Keys are not stored permanently in TPM due to limited storage space. A brief description of the process involved in key generation, encryption, and decryption in TPM is outlined below (Osborn Challener, 2013). A new RSA key is generated by the TPM when a key creation request is initiated by a software. TPM concatenates a value to the RSA key, appends authorization data and then the data is encrypted using the public section of the Storage Root Key and sends an encrypted blob to the requested software. A request is sent for the key to be retrieved from the blob storage when requested by the software program. TPM uses the Storage Root Key for decryption and validates the proof value and password before loading the key into TPM memory. This loaded key is referred to as the parent key and can be used for subsequent key creation forming key hierarchies. The TMP security section discusses in some detail the various ways in which security is implemented and vulnerable. TPM authorization protocols in both version 1.2 and version 2.0 are addressed. Several examples of different types of TPM vulnerabilities are outlined as well as ways to verify the integrity of the system to protect against this vulnerabilities and what the future holds for TPM. 3.1 TPM Authorization Protocols TPM 1.2 Authorization The basic definition of TPM authorization is the process of verifying that software is allowed to use a TPM key. For TPM 1.2 this process is accomplished by utilizing a couple basic commands in an authorization session; typically using passwords or values stored in the Platform Configuration Registers (PCRs) which are referred to as authorization data. The three types of authorization sessions for TPM 1.2 are: Object Independent Authorization Protocol (OIAP), which creates a session that allows access to multiple objects, but works only for certain commands; Object Specific Authorization Protocol (OSAP), which creates a session that can manipulate only a single object, but allows for new authorization transfer; and Delegate-Specific Authorization Protocol (DSAP), which delegates access to an object without disclosing the authorization data (Nyman, Ekberg, Asokan, 2014). Commands are then used to manipulate the keys within an authorization session. Software can prove that it is trusted by sending a command which includes the password hash to verify it has knowledge of the password. Also the locking of non-volatile random-access memory (NVRAM) to PCRs and particular localities is utilized for two different authorizations; one for reading and one for writing. While effective, these authorization mechanisms created a relatively rigid authorization system which make it difficult to administrate the sharing of TPM keys and data (Osborn Chaneller, 2013). 3.1.2 TPM 2.0 Authorization The implementation of TPM 2.0 on the other hand, takes a couple different approaches by introducing enhanced authorization (EA). EA takes methods from the TPM 1.2 authorization methods and improves upon them by incorporating features mentioned in Table 1 below. Table 1. TPM 2.0 Authorization Feature Description Passwords in the clear Reduces overhead in environments where the security of hash message authentication (HMAC) may not be feasible due to its extra cost and complexity HMAC key In some cases when the software talking to the TPM is trusted but the OS is untrusted (like in a remote system), it could be useful to use HMAC for authorization the same way as used in TPM 1.2 Signature methods Allows IT employees to perform maintenance on a TPM by authenticating using a smart card or additional data such as a biometric fingerprint or GPS location. This ensures that passwords cant be shared or compromised by unauthorized users and that an additional verification check is conducted PCR values as a proxy for system boot state If the system management module software has been compromised, this prevents the release of the full-disk encryption key Locality as a proxy for command origins Can be used to indicate whether a command originated from the CPU in response to a special request. Time Can limit the use of a key to certain times of the day Internal counter values Limits the use of an object so that a key can only be used a certain number of times indicated by an internal counter Value in a non-volatile (NV) index Use of a key is restricted to when certain bits are set to 1 or 0 NV index Authorization is based on whether the NV index has been written Physical presence Requires proof that the user is physically in possession of the platform (Table created with information from (Arthur, Challener, Goldman, 2015)) These features can be combined to create more complex policies by using the logical operators AND or OR which allows for the creation of policies to include multifactor/multiuser authentication of resources, limited time constraints for resources, and/or revocation of resources. (Arthur, Challener, Goldman, 2015). 3.2TPM Vulnerabilities When ranked against other standards, TPM comes in as highly secure but that isnt to say that it is immune to all attacks. There are several vulnerabilities that can allow an attacker to circumvent TPMs level of security. The sections below explain a few vulnerabilities that attackers can use to exploit TPM, and the mitigation techniques one could deploy to manage the risk. Dictionary Attack TPM authorization relies on a 20-byte authorization code that is sent by the requestor which if not properly locked down can result in an attacker guessing their way past the authorization. TPM issues guidance on how best to mitigate and prevent these attacks; however, the guidance is not very detailed and rather leaves the specifics up to the implementer. For example, one could implement a design that has TPM disable further input whenever it encounters more than 3 failed attempts. This would effectively prevent online dictionary attacks and has the added benefit of also preventing Denial-of-Service attacks. Weve spoken about preventing online dictionary attacks but where the threat truly comes into play is with an offline-based attack. This vulnerability comes into play when the authorization code is easily guessable, or in other words, poorly implemented. An attacker could observe a given command, the associated Key-Hash Message Authentication Code (HMAC) sent by the requestor and finally, the TPM response back. Since the HMAC is created from the authorization code, session handle and nonces; an attacker can utilize a dictionary attack to try different nonces and authorization codes with the given HMAC algorithm. A match would then provide the attacker with the correct authorization code. This offline attack bypasses TPMs lockout policy and though the attacker but sift through the random nonces and authorization codes, the method is a viable means of attack because it can be reasonably executed given the availability of time and computing resources. The mitigation for this comes down t o proper configuration and ensuring that the authorization code is not easily guessable. DRAM Attack Though this attack is not directly against TPM, it is worth mentioning as it is a viable way to circumvent TPMs security authorization protocols. TPM maintains its keys within non-volatile memory within the TPM component; however, when these keys are pulled by a requestor or requesting application, they are stored within Dynamic Random Access Memory (DRAM). It is well known that one can easily exploit DRAM to extract valuable information (keys, passcodes, etc) with this even being demonstrated against Microsofts BitLocker encryption utility. During reboot, Windows would load the encryption keys stored within TPM into DRAM, prior to even prompting the user. Given this, an attacker could go in and dump the raw memory to an external device, obtain the keys, then utilize those keys to decrypt the disk. This flaw enabled attackers to gain access to data on stolen laptops, even with full disk encryption. This hits on how a system is designed and ensuring that every detail is accounted for. Even if your system has a TPM, it is only going to be as secure as the weakest component within the overall system. OIAP Replay Attack Replay attacks are a method used by many attackers across a multitude of systems. TPM is no exception and is vulnerable to replay attacks based on several characteristics. First, a TPM Object-Independent Authorization Protocol (OIAP) session can be left open for an indefinite period. The authorized session is only closed by the requestor whenever an abnormal message is received and finally, the HMAC that wraps the message can detect alterations to the message but cannot distinguish between a deliberate alteration and a simple network error. For example, an attacker would first capture a requestors authorized command for later use. The attacker then sends an abnormal message to the requestor which then fools it into resetting the session. The requestor is unable to distinguish between the abnormal message and a network error so no concern is raised. Since there is no concern, the TPM keeps the authorized session open, allowing the attacker the ability to replay the previously captured command through the open session. This could lead to the attacker being able to corrupt or even overwrite a subsequent command issued by the requestor. The TPM would not be able to notice this type of attack which is truly concerning based upon the foundational principles of TPM and its assurance of being able to detect unauthorized modifications to data. 3.3TPM Attestations Attestation is the method a platform uses to prove to another platform that it is in a particular configuration by using a digitally signed set of cryptographic hash values which creates a trust between platforms (Fisher, McCune, Andrews, 2011). The network server first creates a cryptographic random value (used to prevent replay attacks) called a nonce, which is then sent to the client. Software on the client then sends the nonce to the TPM and specifies an identity key. The TPM hashes the PCR values along with the nonce and then signs the hash with a private key. The client software sends this back to the server which then verifies the platform configuration by comparing the public portion of the identity key. This process provides hardware-based assurance that software on these platforms has not been modified. (Osborn Chaneller, 2013). Figure 5 provides a visual representation of attestation as provided by (Osborn Chaneller, 2013) Figure 5: Attestation In order for the attestation process to be valid however, it must be able to be proven that the TPM values from the client are not being spoofed. This can be accomplished using a couple of key components: attestation identity keys (AIK), which are created by the TPM and securely stored on disk before being reloaded into volatile TPM memory; endorsement keys (EK), which are hardcoded by the manufacturer into the TPM chip; and a privacy certificate authority (CA), which is a third-party validation entity. The first step of this process occurs when the public half of the AIK and EK is sent to the CA. The CA then uses the public EK certificate to verify that the request comes from a valid TPM by comparing it to a list of all valid TPM manufacturers public keys. The CA then puts the public AIK in a certificate and encrypts it with the public EK. This ensures that the only party that can decrypt it is the computer with the AIK of the corresponding TPM, thus confirming that the TPM from the requesting platform is trusted, and therefore, the attestation method is trusted as well. (Uppal Brandon, 2011). 3.4Application of TPM With the ever-evolving landscape of technology, there is an increased need for faster, more reliable and more secure methods of protecting private and personal data. TPM is a product of those evolving requirements and has thus been incorporated into many different sets of applications. This section will expand upon those sets of applications and delve into how TPM is utilized within the industry today. Encryption One of the most popular uses of TPM is to ensure the confidentiality of user data by providing full encryption capabilities for disks and file systems. The full disk encryption utilizes symmetric encryption with a key created from the users supplied passcode and used during the initial configuration and system boot. This protects against the loss of the disk drive and serves to facilitate disposal or repurposing of the drive since deleting the keys will result in the drive being wiped. The same method is utilized for the encryption of file systems and can be done so to protect specific nodes. Policy Enforcement With Bring-Your-Own-Device (BYOD) policies becoming more and more prevalent within the commercial businesses, TPM has found a use as a policy enforcement mechanism for remote access. TPM can be used to establish trust and verify a devices integrity before allowing remote connection to an organizations intranet. This utilization of TPM is comprised of a series of hashes that measure the predefined sequence of code loads, starting with the boot of the BIOS through the loading of the applications. The chain of hash measures are then compared to the stored value in order to validate the systems integrity. This is very useful for establishing the base operating environment and developing a baseline with which access control policies can be developed. Password Protection TPM protected storage provides a method of storing encryption/decryption keys as well as providing utility management of user passwords. Typically, the password manager retrieves the then encrypted password from TPM, decrypts it, and then sends it to the client application for validation. Since the passwords are usually sent to the client applications over plain-text, this is a serious vulnerability in which TPM can provide a solution for. Using the 20-byte authorization code, a TPM object is created for each user password with this then being saved in the objects authorization field. To verify a password, an application would need to send an OIAP request to access the TPM object. TPMs response to this request would indicated whether the password was correct or not. As a plus, this serves as both password storage and verification with the password never being sent to the application thus eliminating the vulnerability associated with plain-text. 3.5TPM Future TPM is compatible with many hardware and software platforms in use in todays commercial markets and is already in use by several major business functions, to include: Banking, E-Commerce, Biometrics and even Antivirus applications. Looking forward, TPM will play an even bigger role in the evolving mobile market, providing more enhanced security for cell phones, GPS tracking systems, tablets and more. TPM can be used to secure the Mobile Operating System (OS) from being modified by attackers and can be used to further secure authorized access by implementing a hard-coded digital signature solution. For GPS devices, TPM can be used to protect against the modification of system defined location parameters, thus preventing an attacker from adjusting those parameters to satisfy their ends. The biggest constraint facing TPMs implementation within the mobile realm is the space and power constraints on mobile devices. Research is being done on whether a mobile instantiation of TPM should be based on firmware, software or even hardware. A hardware implementation would be the most secure; however, the firmware-based option will likely prove to be the best approach as it will balance the security of the device with the size limitations. TPM is also being looked at with regards to providing security enhancements for cloud-based services. Cloud computing has migrated most of the standard desktop to a virtual and remotely

Saturday, October 12, 2019

Urinary Tract Infection: Epidemiology, Pathophysiology, Diagnosis and T

Introduction The urinary tract makes and stores urine, which is one of the waste products of the body. Urine is made in the kidneys and travels down the ureters to the bladder. The urethra in a male is about 8 inches (20cm) long and opens at the end of the penis. The urethra provides an exit for urine as well as semen during ejaculation (Urology Health, 2014). Normal urine is sterile and contains no bacteria. However, bacteria may get into the urine from the urethra and travel into the bladder, causing an infection. A bladder infection is known as cystitis and a kidney infection is known as pyelonephritis (Elsevier, 2010). The focus of this paper is to present Mr. Lane’s case study of Urinary tract infection; mention pertinent labs, diagnostic tests that were done to obtain the diagnosis and the outcome. There are various factors that cause Urinary tract infection. The factors that lead to the development of the infection will be discussed. This paper will describe the epidemiology, pathophysiology, and the treatment options that were considered to manage the infection. Epidemiology/ Demographics Urinary tract infections (UTIs) are responsible for more than 8.1 million visits to physicians' offices per year and about five percent of all visits to primary care physicians. Approximately 40 percent of women and 12 percent of men will experience at least one symptomatic urinary tract infection during their lifetime (Sanchez, Gupta, & Hitler, 2012). Urology Health (2014) reveals that among persons over age 65, bacteriuria affects men and women roughly equally (approximately 40%), with the majority of infections being asymptomatic. Routine screening and treatment has not been found to decrease morbidity or mortality in this... ... Journal of Adult Nephrology 15(11), 862-868. McPhee, S., & Papadakis, M. (2013). Current Medical Diagnosis & Treatment. San Francisco, California, United States of America: McGraw Hill & Lange. Rahn, D.D. (2010). Assessment and Management of patients with Urinary tract infections: contemporary management. Urologic Nursing, 28(5), 333-341. Sanchez, G.G., Gupta, K., & Hiller S. (2012). Managing Uncomplicated Urinary Tract infection: A Multidisciplinary approach for uncomplicated cases. Infectious disease of America. 70(1), 3-10. Urology Health (2014). Urinary Tract infection. Retrieved Tuesday, April 29, 2014 from http://www.urologyhealth.org/urology/index.cfm?article=47 Williams, L. (2013). Urinalysis: New Technologies, New potential. Retrieved April 29, 2014 from http://www.mlo-online.com/articles/urinalysis-newtechnologies-new- potential.php

Friday, October 11, 2019

Pros of British Imperialism in Africa Essay

The British colonized Africa from Egypt in the north to South Africa. Extension of a nation’s power through conquering overseas territory, know as imperialism had several motivations. Nationalism urged the nations of Europe to conquer land overseas. Having colonies was seen as a matter on national prestige, it was a symbol of the nation’s greatness. Lands in Africa, rich in raw materials and markets, were seen as economic opportunities for the European nations. Along with the rest of Europe Britain participated in the Scramble for Africa. The biggest urge to colonize was brought on by the economic benefits that the colonies would bring. Africa was seen as a major source of possible income, with its’ raw materials and markets for European manufactured goods. Around the 19th century, as the interest in slave trade declined other forms of trade became increasingly interesting, European powers continued to seek income. The Westerners had a keen interest in Africaâ₠¬â„¢s natural resources such as animal hides, palm oil, peanuts, rubber, timber, and tin. The growing European presence led to increasing tensions in the region. British colonization of Africa began in 1874. British imperialism started with the annexing of the west costal states (which became the Gold Coast colony) and establishing a protectorate in Nigeria. Around 1914, the Scramble for Africa had ended; Britain was in charge of a huge part of the continent. Britain controlled Anglo-Egyptian Sudan, Bechuanaland, British East Africa, British Somalia, Egypt, Gambia, Gold Coast, Nigeria, Northern Rhodesia, Nyasaland, Pemba, Seychelles, Sierra Leone, Southern Rhodesia, Uganda, Union of South Africa, Walvis Bay, and Zanzibar. The size of the British reign over Africa was greater than that of any other nations. An aspiration of the British was to stretch a telegraph line from their northern colonies to their southernmost ones. Cecil Rhodes, a successful British businessman, can be credited for the vastness of the British control in Africa. One of his ambitions was to create a series of British colonies from Cape Town to Cairo, all connected by a railroad. In fact, Cecil Rhodes was partially responsible for sparking the Boer War which lasted from 1899 to 1902. Soon after, the British government made Rhodes to resign from his post as head of Cape Colony. Ultimately, his goal was to gain as much territory in Africa as possible for the British. Not only did imperialism provide the colonizing country with profit, the colonized lands and people also benefited from it. Western nations brought useful innovations and improvements to the people’s lives. Some of the technological advances were telegraphs, railroads, and telephones. More importantly, stable government systems, Western education, hospitals, were introduced to the colonized lands to improve the overall living standards. The British were able to bring these innovations to the continent of Africa and help the nations under their imperialistic rule. Imperialism is the extension of a nation’s power over other lands. A nation with colonies was viewed as superior to those without; it was able to sustain its’ place amongst the leading powers. Imperialism allowed a country to control faraway lands, rich in natural resources and local markets, and profit economically. Imperialism was beneficial not only to the imperialistic nation, but the colony as well.

Thursday, October 10, 2019

Environmental Degradation – Air Pollution

The environmental degradation is the deterioration of environment through depletion of resources, such as soil, water and air. When natural habitats destroyed or natural resources depleted, the environment are degraded. Here's, one example of air pollution which lead to environment degraded in London. London in SE England had the reputation of one of the most polluted cities in Europe in the 1950s. Air pollution had reached such a serious stage that it caused the London Smog in 1952 that caused 4000 deaths and a host of other related ailments among the Londoners. One of the main causes of the serious air pollution was the burning of fossil fuels by the many manufacturing industries producing iron and steel, automobiles, machinery, textiles and food. Coal and Oil were the main sources of fuel for the factories which resulted in the release of carbon dioxide, sulphur dioxide, smoke, soot and other particulates. Inefficient machinery and obsolete techniques coupled with the improper monitoring worsened the air pollution. the severe air pollution was causing acid rain, smog and health problems. London being the capital city has a very population density and a large volume to transport vehicles such as aircrafts landing and taking off at the Heathrow airport, lorries and buses on the streets, steamships and boats along the Themes River and private cars; all which were burning up coal, petrol and diesel in large quantities. This led to additional pollutants such as carbon monoxide, lead and carbon being released into the air. Fossil fuel combustion was also prevalent in the domestic households. Even fuel wood was burned to provide heating for homes. Inefficient combustion techniques and building construction led to incomplete burning and excessive release of air pollutants such as gases, smokes and particulates. Thermal electricity generation using fossil fuels further contributed to the worsening of the air quality. n addition, ignorance on the part of individuals and the authorities as regards the burning of garbage, accidental fires and burning of forests aggravated the air pollution. The lack of proper monitoring, legislation and implementation of environmental quality laws did little to alleviate the situation, thus leading to serious degradation of air quality with its heavy toll on human life, livestock, fish and vegetation.

How does a government budget deficit affect the economy Essay

Identify two periods in recent history in which the United States has run budget deficits. What were the reasons for the deficits during those time periods? A government budget deficit occurs when the governments expenses exceeds its revenues. Because of this spending the government has to find alternatives to finance this added expense through borrowing. A government deficit in the long-run can reduce savings, growth, and income. In the short-run if the economy is performing below its output potential deficits are good because it increases expenditures moving output closer to potential. Two periods in recent history when the U. S. was running on a deficit were 2000-2008 and 2008-present. Within the two time periods the country went to war adding roughly $1. 1 trillion to the national debt we also had a significant tax cut that also added to the debt by $2 trillion. There also was a recession that caused the unemployment rates to go up increasing the government spending to cover unemployment insurance. The financial crisis of 2007-2008 was also played an important part in deficits. During this time there was a threat of collapse of large financial institutions and decline in the stock market Dow Jones lost 33. 8% of its value in 2008. The housing and auto industries suffered many companies that relied heavily on credit also suffered. Banks simply stopped trusting people to pay them back so they stopped making loans that most businesses needed to regulate their cash flows. Unfortunately this recession was not only felt in the U. S. but it also had a damaging affect too many foreign countries.

Wednesday, October 9, 2019

Media Communication of Scientific and Environmental Information Essay

Media Communication of Scientific and Environmental Information - Essay Example This does not auger well with society needs, as there is nothing like general audience. News reporting should enable decision makers to do their job effectively and at the same time, it should make sense to experts in the field. Thesis Statement. The objective of this review paper is to discuss how unethical partial or wrong reporting of scientific information is. In this context, I will illustrate how partial reporting of scientific views ends up harming the exact masses the media aims to protect. EFFECTS OF SCIENCE AND MEDIA IN DAILY LIFE Economic Ramifications. Scientific claims are usually beneficial to the society in curbing or at least reducing the adverse effect of natural or artificial phenomena to the environment and human life. For instance, the US government had spent millions of dollars to remove asbestos roofing to avoid its effects on human health. In this case, the general population received suppressed information and scientific views that had opposed it ignored. Late r, scientists figured out that the process of removing asbestos produced toxic gases that were more harmful than letting them be (â€Å"New View† 1993; cited in Roll-Hansen 104). The media played a key role in suppressing the information from one side since it had biased opinions towards supporting the government project. This is grossly unethical and goes against the requirement that the media be impartial in their reporting. More research needed to take placed if they had reported the findings of those scientists thereby conserving resources. Finally, there is the need for a good relationship between the media and scientists to ensure that reporting of findings is as accurate and timely as possible. Norwegian Tree Deaths. In Norway, tree death was intense at the beginning of 1980s. This situation was not unique to Norway since it also existed in Germany among other countries and it affected many tree species. Reports focussed on fir and spruce since their deaths were more d ramatic with needle loss and thinning of tree crown before death (Roll-Hansen 105). Though there were many causes of tree death, the most reported cause was acid rain probably because the rest of the causes were boring scientific explanations that would not adequately serve the media’s main profiteering agenda. For the media to make it in the highly competitive environment, the headlines have to be sensational and eye catching. Scientists maintained that the situation was not as damaging as portrayed by the media and the government. They advanced that there should not be a comparison with Germany since the two countries had different dynamics in respect to pollutants and ways of handling it (Roll-Hansen 104). During this time, the Norwegian institute of forest reserve (NISK) organized a conference on the matter. The media was quite disappointed that there was nothing to report showing that the media only had interest in reporting one side of the story and not the other. This was another way of saying that scientific conferences are not sensational or newsworthy enough to generate enough sales in the highly competitive environment. The media criticized the NISK for denying the role of acid in tree death and at the same time ignoring the other causes of tree death proposed by the NISK (Roll-Hansen 106). Though the media criticized scientists for their attitude on the acid rain and forest death, they agreed with scientific reports that acid rain was the