Wednesday, December 25, 2019

Analysis of Satans Speech in in John Miltons Paradise Lost

Analysis of Satans Speech in Miltons Paradise Lost John Miltons Paradise Lost is a work of enduring charm and value because of its theological conceptions, its beautiful language, and its updating of the epic to the modern worlds values. Book II of this epic poem opens with Satans speech to his minions in hell, proposing war on Heaven itself. In these first 44 lines, Satan is clearly established as epic hero, but at the same time is theologically/morally denounced by the speaker. This section of the poem opens by establishing Satans position of power and prestige: High on a throne of royal state, which far Outshone the wealth of Ormus and of Ind, Or where the gorgeous East with†¦show more content†¦Satan proceeds to address his gathered host of followers who with him were thrown out of heaven. He addresses them as Powers and Dominions, deities of Heaven, (II. 11), appeasing their egos and appealing to their desire for power and control. He justifies this, despite their recent loss, for since no deep within her gulf can hold/Immortal vigor, though oppressed and falln/I give not Heavn for lost, (II. 12-14). Because of the strength and power of those doomed to hell for all eternity, they will be able to re-conquer Heaven despite what God did to them. He proceeds to say that, From this descent/Celestial Virtues rising, will appear/More glorious and more dread than from no fall, (II. 14-16) because the struggles of living in Hell will increase the power and glory of the gifts of each of the fallen. As a result of these assertions of the power and might of the denizens of hell, Satan asserts that they, trust the mselves to fear no second fate. (II. 17) Satan follows this speech appeasing the egos of his followers by commenting on his own prowess and virtues. Me though just right, and the fixed laws of Heavn Did first create your leader, next, free choice, With what besides, in counsel or in fight,Show MoreRelatedAnalysis Of John Milton s Paradise Lost 1852 Words   |  8 Pagesliterary merit. Do not merely summarize the plot. (2010 AP Literature and Composition) Disobedience and Exile an Analysis of Satan from Milton’s Paradise Lost John Milton’s epic poem, Paradise Lost, has been the subject of criticism and interpretation through many years; these interpretations concur in that Adam and Eve are the sufferers of the poem, and it is their blight to lose Paradise because of their disobedience; however, their exile is merely a plight brought by Satan, and it is he who suffersRead More A Comparison of God and Satan in Paradise Lost Essay1571 Words   |  7 PagesComparison of God and Satan in Paradise Lost      Ã‚   In this essay I shall be focusing on the characters of G-d and Satan from Paradise Lost by John Milton.   Within the essay I shall be attempting to elucidate on the themes of ambiguity of the two characters as well as the uncertainty of moral integrity of each, characterized by Johns Miltons use of sentence structure, private thoughts and symbolism.    Foremost I would like to look at the way the way in which Milton characterizes theRead MoreFall from Grace: Satan as a Spiritually Corrupt Hero in Miltons Paradise Lost2859 Words   |  12 PagesFall From Grace: Satan as a Spiritually Corrupt Hero in Miltons Paradise Lost Can Satan -- a being, so evil that even as an Ethereal being of Heaven, who was cast out of Gods grace - be a hero? John Miltons Satan in Paradise Lost is very much a romanticized character within the epic poem, and there has been much debate since the poems publishing in 1667 over Miltons sentiments and whether Satan is the protagonist or a hero. As an angel in God the Fathers Heaven, Satan rose up with a groupRead MoreJohn Milton Opens Paradise Lost Essay2170 Words   |  9 Pages As John Milton opens Paradise lost with a brief explanation of his intent, he makes a very ambitious statement of his goal, claiming that his book would be sufficient means by which â€Å"[He might] assert Eternal Providence, / And justify the ways of God to men† (Paradise Lost 1.25-26). So the reader should treat his epic poem as the attempted justification that it is, and ask themselves this: does this argument successfully justify God’s ways? A key—perhaps even the key—par t of Milton’s book, and thereforeRead More An Analysis of Satans Final Speech in Milton’s Paradise Lost1782 Words   |  8 PagesAn Analysis of Satans Final Speech in Milton’s Paradise Lost Satans final speech to Eve, 11. 679-732, Book IX, in Miltons Paradise Lost, is a persuasive masterpiece carefully structured to appeal to her ambitious tendencies and to expand her already existing doubts (which Satan has implanted) as to the perfect nature of God. Satan begins by worshipping the Tree of Knowledge of Good and Evil, as Eve will do after she has made her choice. Throughout the remainder of the speech, he attempts

Monday, December 16, 2019

The Confidential Secrets of James Thurber Catbird Seat Essay Topics Revealed

The Confidential Secrets of James Thurber Catbird Seat Essay Topics Revealed Teenage mothers are more inclined to deliver a baby with a very low birth. Secondary college understudies decide their companions for assorted reasons, and a few of their decisions could lead to constructive and unfavourable impacts. Teenage pregnancy is certainly one of such topics that is very. In the united kingdom, teenage pregnancy is widely deemed to be an issue and negative. The Southbury Training School was thought of as a model for care of this kind, with its decentralized residential strategy. The intention of this study was to figure out the relationship of self-esteem. Such a terrific and intimate experience. He's figured out another program. They also proactively look for favorable changes in government policy for their customers. For some individuals in this way in Connecticut, it's their parents, often aging and increasingly hopeless, that are made to take care of them. There's a community here, and it's well worth cultivating. He's talking about specific rules which should be followed. That arbitrary prohibition ought to be lifted. No, on account of the law which requires faith. The Inclusion movement claims that each and every person who has a disability can function locally. James Thurber Catbird Seat Essay Topics Features On the surface the dream is saying that I haven't any present method of transportation and it'll take me considerably more time to get to the next place I wish to go. After all, there's a reason our brains store memories. It is all up to him to acquire his menthrough the turmoil safely. An incredible listing of completely free essays is a fantastic bonus of this internet site. This expert-written article supplies a selection of impressive research undertaking. Because of the transient character of Internet sites, these links are updated regularly. In case the content is passable, then you may use the entire essay. James Thurber Catbird Seat Essay Topics - the Conspiracy While I didn't adore each bite of each and every dish, I did love the whole experience. The thing that struck me about the entire night was, regardless of the high amount of pretension of a number of the food and plateware choices, the entire thing was really chill. They paid and left without eating the remaining portion of the meal. The blood sausage on the opposite hand. The entire dining experience is incredible. Allow me to say, all chips ought to be dipped inside this stuff. I also really liked the different varieties of plates which were used, especially the pottery utilized for the saki tasting. The experience for a whole is wonderful. Essay writing is our key specialization. Rules alone haven't been adequate for quite a while. Reading example essays works precisely the same way! Historical context is critical. The author utilizes a creative writing style to try to catch his audience's attention throughout the full essay. I am able to testify to the experiences and the so-called accommodations the writer is writing about. From one's very first nursery rhyme book to someone's later fictional novel, it is rather simple to say that everybody has arrived across many characters among their years. The writer is disabled himself. New Questions About James Thurber Catbird Seat Essay Topics On the way from the arena, I realized this would be my very last time experiencing a hockey game for the very first time. You're treated like you're definitely the most important person in the room no matter the other 20 people sitting there. I hope your students are not that scared to finish this assignment. It books up fast, so attempt to earn your reservation a minimum of 30 days beforehand. It's a different type of experience which you wouldn't want daily. Every individual has opinions about how to enhance the Earth, though nobody wishes to practice kindness in their very own backyard. I would like to have a relationship with the men and women that are coming to my show. Getting the Best James Thurber Catbird Seat Essay Topics Johnny Bear and Mr. Martin also conduct something harmful to some other character. He replies that he has no idea what she is going on about. He believes she is threatening the existence of the firm. Furthermore, he is not merely the nerdy, precise man he is perceived as. The organic world has ever existed, whether or not you're paying attention. It supplies the kitchen an additional opportunity to shine. Anybody coming in will truly feel a feeling of community. I used ton't understand what I wished to do I just knew that I wished to attend a terrific college and figured I would figure it out there and I did.

Sunday, December 8, 2019

Cyber Forensic Or Computer Forensic †Myassignmenthelp.com

Question: Describe about Cyber forensic or computer forensic? Answer: 1.0 Introduction Cyber forensic or computer forensic or digital forensic is an practice where scientifically proven methods are applied for gathering, processing, interpreting and using digital information as evidences in laws and cyber- crimes. Also, there are cases when in other crime activities where digital information and evidences are involved, use cyber forensic. There are support from legislation to use digital data as evidences in different crime investigation processes. Currently, cyber forensic has become a term that encompasses information technology, laws and legislation etc. This is being researched heavily. There are some fine differences between digital forensic and cyber forensic. Some scholars consider, digital forensic as the wider area and cyber forensic being a part of that. Cyber forensic is more inclined to finding evidences from digital storage devices and computers. The objective and goal of cyber forensic is checking and reviewing digital media thoroughly and forensically to identify, preserve, recover, analyze and present the facts and results from the digital data. There are techniques like data recovery etc. these techniques can also be used as a part of legal audit trail. The subject of cyber forensic investigation to about following the same practice and guidelines for the digital evidences. Gradually, computer forensic is becoming a part of government and legislation in different countries. 2.0 Digital Evidence In cyber forensic, an important part is electronic or digital evidences. These are probative information that are being transmitted or stored in digital form. These evidences can be used in court trials. Before acceptance of digital evidence at court, those are needed to be verified, authenticated and the relevancy will be checked. Sometimes, copy of evidences is needed to prove such features. (Casey, 2004) During last few years, the number of digital evidences in different types of legal cases, have been increased. Following types of digital data can be used as digital evidences. Emails Logs of ETM transactions. Digital video, photographs, Word documents Histories of instant messaging Spreadsheets Accounting and financial information and statements generated from different information systems Histories of Internet browsing Contents from storage and computer memory, backups of data Tracking information from GPS or global positioning system, Logs from automatic door locks at hotel rooms etc. Audio files and recordings. In some countries, these evidences are considered to have equal importance as traditional evidences. However, the volumes of data from these digital evidences is a consideration. These information are hard to destroy, copy etc. and there are more scope to derive conclusion from these information as these are more expressive by nature. But storage of these evidences should be done in a suitable way. However, authenticity and admissibility of these evidences are sometime questionable as these can be modified and tampered. But still, these can also be countered with more detailed information. (Casey, 2004) 2.1 Admissibility An issue with digital evidences is admissibility. This is stemmed from the reason that, the evidence does not have authentication. Thus admissibility and authentication are closely related. In most of the jurisdiction systems, it needs to have a properly seized and investigated digital evidence. There are chances that while investigating for some warrant, it found evidences for some other crime. In that case the second one needs warrant for investigation. 2.2 Authentication Just like any other kind of evidences, digital evidences also needs to have proper foundation. The evidences needs to have certain degree of reliability. There are still some questionable areas in case of usage of digital evidences. For example, it is possible to alter digital media easily. Thus it needs to establish the reliability of the digital devices and there should be certain degree of accuracy while entering the data. (Casey, 2004) There is some software and information technology based solutions that have been designed for preserving the digital evidences in the original form, thus it authenticates the admissibility of the evidences. For example, there is a digital authentication technology called OnLock Digital Authentication. This is a SaaS or Software as a Service based solution for authenticating and preserving digital evidences in some non editable format. Use and development of such applications are maximizing the applicability and importance of digital evidences at legal trials. 2.3 Rule of the best evidence The formats of the digital evidences are not human readable. Thus is needs additional steps to make those human readable before use as evidences. For example, the findings from some analysis of some digital evidence may need to be printed before use. There are arguments, that the changes of the format does not confirm to the best evidence rule and such digital documents does not qualify as digital evidences. But the counter argument with legal support says that if the data of the evidence has been acquired from some computer or other digital devices, then the print out or changes to other human readable format will be considered as a valid digital evidence reflecting the accuracy of data similar to original data. 3.0 Key Principles of Cyber Forensics The key principles of cyber forensic are, Computer Based Investigation Data Examination Analysis of evidences 3.1 Computer Based Investigation Computer based investigation processes are becoming more and more popular not in the cyber- crimes, but also from other types of crimes like from terrorism to burglaries. As technology has become an integral part of our lives, thus these kinds of crimes are also using technologies. As a result computer based investigation is becoming more essential in crime investigations around the world. Computers and information technology now plays roles in commission of crimes, for obtaining evidences of the same, even it can become the target of crimes. For computer based investigations, it is needed to understand the roles and types of the digital evidences, processing of crime scenes, urgency of responding to such crimes and analysis of evidences. Recognizing, collecting and preserving of the electronic evidences from computer based evidences in different scenarios of crimes. The responders should have clear understanding of the fragileness of the electronic evidences from computer based evidences, the associated procedures and principles to the collection and preservation of the evidences. In case of computer based investigations, evidences are the data about the results from some investigation. These data can be stored or transmitted through some computer. For example, in several cases DNA or fingerprints are considered as evidences. But the raw format of a fingerprint or DNA will not make any sense to us. We need the information about those. There are software and systems that are used to provide those information from those evidences. By nature, computer based evidences are fragile as those can be damaged or altered easily. Thus handling and preserving of these evidences is very important. Otherwise the rendering can become unusable or the results of the analysis will be erroneous. Preserving integrity of the computer based evidences is also very important. (Albert J. Marcella Guillossou, 2012) 3.2 Data Examination Examination of the data from the digital evidences follows the principles of data examination from the traditional evidences. It needs varied types of media and cases to deal with different types of data examination methods. In all possible cases, the examinations of digital forensic are carried out on copied evidences not on the original evidences. Data examination is the process of extracting digital evidences from different types of media and analysis or interpretation of the same. Here extraction refers to the process of recovery of data then analysis of the recovered data, finally placing it in a coherent, logical and usable format. The concepts, tools and techniques used in this process, are intended to help an examiner to going through these steps smoothly. The data examiner(s) will structure the evidences first then will examine the data from those evidences. An examiner can use any set of tools and techniques for examination however, the chosen ones should be useful for the examination process. (Albert J. Marcella Guillossou, 2012) Data examination process has following steps to follow, 3.2.1 Preparation In this step the files and data of the evidences are separated and stored onto different files, directories and media. All the required set up in this context are prepared. 3.2.2 Extraction There are two types of extraction process to extract data from the evidences. In the extraction step, data is identified and recovered from the physical drives without regarding to the file system. File system is the logical structure and it is required in the logical data extraction phase. During that phase, again data is identified and recovered from different file systems, operating systems and applications. During physical data extraction phase, data is extracted from the physical drives without any consideration of the file system. The techniques used in this step are, file carving, keyword searching extracting and storing the unused space and partition table on the physical drive. File carving is the technique that can assist in data recovery and extraction from the unused data across the physical drive. The data may not be accounted by the file system and operating system. Keyword search technique also does similar job across the physical drive. An examination of the structure of partition of some physical disk will help to understand the file systems. It will be easier to determine the physical size of the entire storage media under consideration. During logical data extraction phase, it considers the file system of the storage media first. Then it includes different types of files and data from the files system into consideration. For example, there are file stack, deleted files, active files and unallocated space on the storage media. One by one, the extraction phase can extract file system information like structure of the directory, file names, file attributes, data and timestamps, file location, file size etc. Then data reduction helps in identifying and eliminating known files by comparing the authenticated and calculated hash values. File extraction process may include techniques based on file header, file name and extension, file content, file location on the media etc. There may be recovery of deleted files, extraction of encrypted or password protected data etc. 3.2.3 Analysis of extracted data Analysis of extracted data helps to discover the significance of data. There may be some pre-defined time frame for analysis in some cases. The techniques used in analysis, include data hiding, time frame analysis, ownership and possession, review, investigation leads, searching, analytical leads etc. Time frame analysis helps to understand the timings of the events occurring in the computer. It also may help in understand the use of the computer. There are two methods to follow, during time frame analysis, those are, Examining the metadata of file system for date and time stamps. It helps to link the relevancy of the time frames to the files. Review of the application and system logs. There also may be other types of logs, such as security logs, installation logs, error logs, connection logs etc. Data hiding analysis helped to uncover the concealed data into the media. It helps in detection and recovery of knowledge, intent, ownership etc. of hidden data. The techniques used in data hiding analysis includes, Correlation of the file extensions and headers for identifying the mismatches in those. A mismatch indicates that there is an attempt of hiding. Steganography HPA or host protected area supports the fact that there were some attempt to hide some data. Gaining access to such areas uncover these attempts. Accessing the compressed, password protected files. Ownership and possession analysis helps to understand information like who is the creator of the file, who has accessed the file etc. The data and timestamp of the file may help to understand the ownership of the file, files stored in some non-default location, file naming process etc. also helps in this context. Information about the passwords, hidden data etc. helps to understand attempts of hiding. (Carrier Spafford, 2003) 4.0 Cyber Forensics Examination/Investigation Process Cyber forensic investigation process follows the following sub processes or phases. 4.1 Preserving the Evidence According to local exchange principle, . . . when two objects come into contact, a mutual exchange of matter will take place between them". Thus the evidences will be preserved in a crime scene (Carrier Spafford, 2003). Investigating a crime scene in case of cyber forensic will include some computer itself as crime scene. From this computer, the clues and evidences about some crime are to be found. The investigator is also supposed to meet the obstacles here. In case of cyber-crime, the usual case is, there will be very few clues to start with the investigation. Also there are chance of transgression and without any obvious signs of clues or crime. (Stephenson, 2000) In a digital forensic investigation, the process should be very systematic, legal and formalized. The admissibility of the evidences is very much necessary. The integrity of the evidences and the investigation process should be there. During the system preservation phase, it includes following activities, Stabilization of the digital crime scene. Preventing data loss. That is minimizing the chances of data being damaged or overwritten. Isolating the system or the digital crime scene, from network Collection of volatile data. There are chances that these data will be lost after switching off the system. Identification of the suspicious processes running into the system. After collecting the evidences from the crime scene, these are to be transported to some safe and secure location. In future, further experiments with those evidences will take data from that location. One common approach is to physically transfer the seized crime scene or the computer to the safe and secure location. Or another approach is to transfer data to such location through some network. However, in any case, it should be ensured that the validity of the evidences are retained after getting transported and the integrity is not affected. ( Ciardhuin, 2004) After getting transported to some safe and secure location, these evidences and data are needed to be stored. As it has ben already said that, in most of the cases, examination are carried out on copied set of evidences. Also, there are chances that investigation will not start immediately on those data. Again there should be proper storage that retains the integrity of the evidences. ( Ciardhuin, 2004) There are chances, that cyber forensic evidences can be altered or damaged easily. As digital evidences are highly interconnected in nature, so, damage can easily propagate through and may affect all evidences. Thus, integrity of the evidences are supposed to preserved in the following ways, The structure of the evidences At bit level or physical level The application that are being used to open or view the evidences. During system preservation phase, the logged in users to the system are suspected and are highlighted. The log files from the system are copied before those are lost. If possible then the entire environment should be preserved. This is possible to create a complete backup image of the system. This is an advantage over physical world forensic. In general, the hard disks are used as main evidence but, if the network is involved with the crime scene, then the state of the network is also needed to be preserved. There are various system preservation techniques. Those are, Dead acquisition technique, that considers the processes are stopped when the system is switched off. Hence, duplicate copies are made. Also it may use write blockers so that the evidences are nor overwritten. Live acquisition technique that may kill the suspected processes, re-connect to the network, retain the network log from being dead by connecting the system to some switch or hub. It may use network filters for preventing the suspects from deleting the data from remote connections. The best practices to be followed in preserving the evidences are, Making copies of important data. Keeping the original copy in some safe and secure place. Doing all analysis on copied data sets. Use write blocking techniques. Minimize the number of creation of new files while live analysis is going on. Opening the files carefully during live analysis. It should not modify existing data. 4.2 Locating the Evidence In this phase, an investigator locates the evidences from the preserved crime scenes. There are various options for an investigator for carrying out the process. Following techniques can be followed in this process. Analysis of computer registry to carry out dead or live analysis. The data sets may be volatile or non-volatile. A live analysis will collect information from all these data sets. In the evidence searching phase, usually replica images of the digital crime scenes are considered. There may be repetition of the result in multiple instances. When evidence locating is carried out on live system then forensic images are taken. Field searching is the process of booting the computer into some trusted environment and searching for evidence into it. Network traffic analysis during the live analysis phase will analyze network traffic during the incident time frame. It may rule out some hosts and ports. If needed, the analysis may be extended to executable analysis, contact encryption, data recovery etc. In a nutshell, the process searches for an object with some characteristic in the collection of data. The process start from known locations like web browsers bookmarks, history files etc. In Linux environment, it may search for some rootkit, intrusion, new accounts etc. As the investigation will proceed, hypothesis will be developed. It is important to search for hypothesis for refuting it. 4.3 Selecting the Evidence Selection of evidence in the process of finding the piece of meaningful information from the evidences located. An investigator can use various analysis process to select the right evidence. For example there is file system analysis. Other types of analysis are, Application analysis Database analysis Memory analysis Volume analysis Network analysis Swap space analysis Physical storage media analysis File system analysis is an application level analysis process that examines a partition or data volume of a disk that is interpreted as a file system. The results may be list of directories, recovery of deleted file, display of content of the file system etc. There are different categories of data from file system. Some of the categories are file system category, content category, metadata category, file name category etc. 4.4 Analyzing the Evidence After selecting the evidences those are needed to be analyzed to understand the information from the analysis. There are several mathematical method, tools and techniques to analyze the digital evidences. From the initial larger information base, it is needed to reduce the information space to the most meaningful and optimized one. The information space includes the evidences like files etc. and the metadata information about those files. During the analysis phase, investigators process more amount of information than the evidences and image cases. While filtering the relevant data from this huge information base, care is very important to be taken. There will be iterative processes to filter out most important information, generation of additional data for the cases, and reducing the size of overall information base. The information- investigation curve takes shape depending on the following factors, Investigator The investigation tool selection and use. Quality and type of data generated during each iteration. Also there are additional variable factors like the forensic examiners, victims, offenders, secondary transfer, data rot, witness etc. Various analysis processes are, Inferential analysis Associational Analysis Social Network Analysis Network Analysis Etc. 4.5 Validating the Evidence Digital evidences are very fragile in nature. Thus it needs to be validated to ensure its integrity. But due to the difference of the digital evidences from the same of the traditional evidences, the laws and rules for validating digital elements will be a bit difference. The best practice followed while validation of computer are, To become in a safe side and without loss of generality, it is assumed that every computer is modified for destroying evidences. Delay the investigation of a suspected computer until the back of the entire system his taken. Become aware of the OS related issue of the victim computer. Typical storage areas, like database, office suite files etc. contains most of the evidences. Also there are chances of hiding evidences in some slack, removed files etc. In spite of the use of technology in the business processes, people generally do not trust computers. Also there are various security risks as, computers belongs to the interaction of physical and logical spaces. That is the information of the computer will be in digital format but the users are human beings. In laws, there is something called Daubert tests. This is a pre hearing test for the digital evidences of a case. It checks the integrity and admissibility of the digital evidences. In the validation phase, an evidence is needed to be tested for its validity. The assertions from the digital evidence are verified during this stage. It ensures that the evidence has not been altered or deleted by the user or system processes. The security measurements of some host computer are used for auditing and monitoring for the integrity of the information in that system. The whole process is iterative in nature. The examiner or investigator may need to revisit the crime scene, locate and select evidences then validate those. A series of prompt used in the candidate validation process. The questions in the validation process includes questions about the abilities to link the computer and the suspect, the events of the crime and the time frame of use of the computer etc. An incompetence scrutiny is carried out to validate the evidences during different points of time of the investigation process. The problem and prosecution cases become more complex with the increasing complexity of digital domain and challenges. The errors in any analysis method is a serious case to consider each time. There are different factors that influence the validation process of some digital evidence. The factors are, The collection tools may be missing while analysis critical digital evidence. The prosecution or the plaintiff may fail during reporting of the exculpatory data. There may be false or misleading evidences. It may fail to identify more relevant evidence. (Cohen, 2006), (Palmer, 2002) Hence, it needs some standardization and more scrutiny. Forensic readiness program also can help to some extent. (Rowlingson, 2004) 4.6 Presenting the Evidence Presentation of evidences in the human understandable format or documentation of the analysis and validation results is the final and important step. It helps to repeat the whole examination process even if the court challenge the evidences. Crime scene reconstruction is a part of presenting the evidences. Based on the law and policies for different setting, the presentation phase, presents all evidences, conclusions etc. derived from the investigation. There may be different classes of audience based on the type of cases. For example, general counsel is the audience for corporate cases. The corporate policies and privacy laws are the dictators of the presentation. In usual legal setting, the judge or jury is the audience. Thus, validation of the evidences is required. The outcome of the examination of the evidences determine the construction of hypothesis based on the evidences. Also, depending on the type of investigation, the degree of formality of the presentation is decided. The hypothesis is intended for the persons rather than the investigators. There are two types of testimony to be used in a trial. An investigator can choose the more suitable one. The testimonies are technical or scientific witness and expert witness. Chain of custody and the timelines for those events, helps to uncover the crime and reach to conclusion. Also there are chain of evidences methods. 5.0 Importance of Crime Reconstruction Hypotheses and Alternative Hypotheses The importance of crime reconstruction hypothesis and alternative hypothesis are given as, 5.1 Crime Reconstruction Hypotheses (CRH) CRH or Crime Reconstruction Hypotheses are the results from an observation of the actions. Then the postulate of the causes behind the result are considered. During this process a theory or hypothesis about the crime is formed. Then the theory or hypothesis is tested against all environmental evidences from the crime scene. There will be extensive testing process. If there is some contradiction between the theory and the evidences from the crime scene then the hypothesis or the theory is abandoned and a new one is adopted. The process continues until a suitable hypothesis is found that is coherent to the evidences. 5.2 Crime Reconstruction Alternative Hypotheses (CRAH) In case of CRH, the investigator may overlook new evidences and the hypothesis may be found as only one possibility and that may be misleading. To check the hypotheses against a wider range of evidences, Crime Reconstruction Alternative Hypotheses or CRAH can be used. It helps to uncover several alternative hypothesis and the result is more conclusive. It covers evidences from different aspects of the crime scene. 5.3 Importance of CRH and CRAH Crime scene reconstruction helps to understand the circumstances and the root of the crime. Thus it helps in better judgment. Also the process of crime reconstruction opens up new viewpoints towards the crime scene and covers different possibilities behind the crime. 6.0 Conclusion In this report, cyber forensic has been discussed in details. There are details about the concept of cyber forensic, the principles of cyber forensic, the details and phases of cyber forensic examination, the crime reconstruction process and its importance. 6.1 Self-reflection on Assignment 1 This assignment has helped to understand and study cyber forensic. The subject is vast and it was very difficult to put it down in this report. There are various aspects of cyber forensic. The field is very dynamic. Other than technology there are applications of statistics, mathematics, forensic science etc. The assignment has given an in depth idea about the topic. References Albert J. Marcella, J., Guillossou, F. (2012). Cyber Forensics. John Wiley Sons. Ashcroft, J. (2001). Electronic crime scene investigation: A guide for first responders. Washington: U.S. Department of Justice. Bejtlich, R. (2005) The Tao of network security: monitoring: beyond intrusion detection.Boston: Addison Wesley. Berk, R. A. (1983). An introduction to sample selection bias in sociological data. American Sociological Review, 48, 386 - 398. Burdach, M. (2006). Finding digital evidence In physical memory. Paper presented at the Black Hat Briefings, Arlington, Virginia. Carrier, B., Spafford, E. H. (2003). Getting physical with the digital investigation process. International Journal of Digital Evidence. Caloyannides, M. A. (2004). Privacy protection and computer forensics (2nd ed.). Boston: Artech House. Carrier, B. (2005). File System Forensic Analysis. Upper Saddle River, New Jersey: Addison-Wesley. Casey, E. (2004). Digital evidence and computer crime. London: Academic Press. Cohen, F. (2006). Challenges to digital forensic evidence. Retrieved February 8, 2015, from https://all.net/Talks/CyberCrimeSummit06.pdf Enfinger, F., Nelson, B., Phillips, A., and Steuart, C. (2006). Guide to computer forensics and investigations (2nd. ed.). Boston, Massachusetts: Course Technology. Jones, K. J., Bejtlich, R., and Rose, C. W. . (2006). Real digital forensics: Computer security and incident response. Upper Saddle River, New Jersey: Addison-Wesley. Kruse, W and Heiser, J. (2002). Computer forensics. Boston: Addison Wesley. Leiwo, J. (1999). Observations on information security crisis. Bangkok: King Mongkut's Institute of Technology. Mocas, S. (2004). Building theoretical underpinnings for digital forensics research. Digital Investigation, 1(1), 61 - 68. Ciardhuin, S. (2004). An extended model of cybercrime investigations. International Journal of Digital Evidence. Palmer, G. L. (2002). Forensic analysis in the digital world. International Journal of Digital Evidence, 1(1). Rowlingson, R. (2004). A ten step process for forensic readiness. International Journal of Digital Evidence, 2(3). Stephenson, P. (2000). Investigating computer-related crime. Boca Raton: CRC PRESS. Yadav, Seema. (2011). Analysis of Digital Forensic and Investigation. VSRD International Journal of CS IT Vol. 1 (3).

Sunday, December 1, 2019

Old Girls Twitter Essay Example

Old Girls Twitter Paper To Tweet, or Not to Tweet My sixty-two year old father asked me about â€Å"tweeting† several weeks ago. Naturally, I thought to myself, what the hell is my father doing asking me about twitter, he doesn’t even own a computer. I assumed that he had seen a newspaper article about it or heard it on the news. I stood correct. Twitter has become new media phenomenon and let’s be honest- who doesn’t have a Twitter account these days? In defense of Twitter by Caroline McCarthy and Do I Really Have To Join Twitter? By Farhad Manjoo were two articles that struck me as captivating. Personally, I’ve never found twitter all that appealing, and yet I still have an account. However, I am happy to report I’ve only â€Å"tweeted† twice in the past year. As soon as I created my account, I immediately regretted it. I wasn’t too fond of the idea that people were going to be â€Å"following† my tweets and they would be updated with unnecessary complaints or food choices of the day. Farhad Manjoo seems to share similar thoughts on the subject. Commited Twitterers argue that the 140-character-or-less tweet represents the next great mode of human communication†¦Wait a minute-you want me to keep a perpetual log of my boring life for all of the world to see? † I agree. Twitter allows complete strangers to stalk your ideas and involve themselves in learing about your personal life. We will write a custom essay sample on Old Girls Twitter specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Old Girls Twitter specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Old Girls Twitter specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Creepy? Just a little. Manjoo argues whether or not there is a point to Twitter, needless to say, not one valid point was made. Manjoo’s article made a second compelling point. It is an alien form of communication. Micro-blogging mixes up features of e-mail, IM, blogs, and social networks to create something not just novel but also confusing, an doing it well takes some time and patience. † I’ve seen my friends on their Twitter accounts, and they will sit in front of their computer for ten minutes or so, just to write a three sentence statement about their life, trying to make themselves sound a lot more intriguing to their â€Å"followers†. In their defense, I can recognize why they wouldn’t want to sound tedious or dull, but there are certainly better things they could be doing with that ten minutes of their time. When I read over the article In Defense of Twitter I couldn’t help but laugh because although my mind generally doesn’t accept the idea of Twitter, everything in the article seemed to make valid points, while they may seem contradictive to the previous article. â€Å"The beauty of Twitter is that, unlike a full-out blog, there’s no obligation to be philosophical, thought-provoking or grammatically sound. Because it doesn’t require that kind of extra effort, it’s great for people like me who want to jump on the social-media bandwagon but don’t have the time to set up something elaborate on WordPress. I can understand this to an extent. Some people enjoy blogging in general, and since there are â€Å"apps† for Twitter, you can do it straight from your phone. For people who lead a chaotic, busy schedule filled with kids, jobs and extracurricular activities, I can see why Twitter would be an escape or even fun for that matter. McCarthy do es argue however, that people reveal sensitive information that doesn’t need to be broadcasted to the whole social networking system. Childrens’ names and exact locations for example, should not be included in the 140 character long tweet. I totally agree with her points, in my opinion personal information and personal emotions for that matter should be kept outside of the blogging world. A couple months ago, I accidentally, (I guess it was more of me being nosey than being accidental) stumbled upon a Twitter page that wasn’t private, and I didn’t happen to like the user of the page all that much for personal matters. Within two minutes of reading this nine-teen year old girls Twitter, I found out that she smoked marijuana around her seven month old baby, she needed a babysitter to go to a party that night, and she had a six pack of Twisted Tea in her trunk. I’ve never actually met this girl, unfortunately I just know of her from mutual friends. Good first impression? I don’t think so. People also forget the fact that many employers are involved in social networking sites. If you’re going to be putting inappropriate tweets, you might want to think about adjusting the privacy settings- just a thought. Facebook, MySpace, Live Journal, Skype, AIM, and Twitter included are not for everyone. â€Å"I’m of the opinion that no piece of social-media software is for everyone, and Twitter is no exception. I have friends who are so frustrated by Twitter’s lack of functionality and frequent site outrages that they’ve given up on it altogether. † Certain people aren’t comfortable with sharing there thoughts with their close friends, let alone the whole realm of Twitter. I suppose it all depends on the individual, but let’s be honest; no one needs to know that your new conditioner smells like apples. All in all, I think twitter is pointless. However, I understand why people enjoy the concept. I think an unbelievable, unnecessary portion of society is wasting their time with pointless social blogging, but who am I to say it’s right or wrong. I enjoyed the two articles’ distinction, and reading other peoples opinions and reasoning’s is a good way to acquire a better understanding as to why society is so obsessed with the idea of micro-blogging. There’s tweeting now, what will come next?

Tuesday, November 26, 2019

FAQs About Purchasing and Maintaining a Chainsaw

FAQs About Purchasing and Maintaining a Chainsaw Small chainsaws  are commonly purchased by rural property owners, tree and timber owners, firewood users and farmers. Often, a new chainsaw owner can become frustrated at the learning curve associated with chainsaw ownership. Here are answers to many questions asked by people planning to buy and operate a chainsaw. This Frequently Asked Questions page is for the new chainsaw owner and addresses the most common concerns about purchasing and maintaining a chainsaw. How to Select a New Chainsaw You should buy only the chainsaw you feel comfortable with. Chainsaw manufacturers are using newer  and lighter materials to build more powerful but durable machines.   Where to Purchase Most foresters and loggers agree and suggest purchasing chainsaws like Stihl, Jonsered or Husqvarna with strong local dealers.  Any reputable brand of chainsaw you purchase with a local dealership servicing that brand can last a long time. How to Learn Operating One There are many great resources on the Internet that can help you operate your saw. The best way is  to place it on flat ground, pull the start control to the on position, and hold the front handle with your left hand as you place your right foot on the rear handle. Make sure to safely review hazards before operating a chainsaw. According to saw expert Carl Smith: If you place your hands on a chainsaw, you must keep in mind that it is like grabbing  a hand grenade without a pin in it. It is very likely to go off in your face. From the moment that you take it out of storage to the time that it goes back to the same place, you can be hurt by either it, or by whatever you will be cutting. Chainsaw Kickbacks and Prevention One in every 12 timbering accidents is caused by chainsaw kickback. If a professional tree feller is at risk, it can definitely happen to a less experienced chainsaw user.  The main focus is to be aware and alert and always wear chainsaw safety clothing. Notice the position of the chainsaw bars nose and chains. Chainsaw Protection Equipment Wearing the proper clothing is one of the best safeguards for you to reduce the possibility of serious injury. Wear sturdy, snug-fitting clothing that gives you complete freedom of movement. The Most Important Parts of a Chainsaw OSHA requires you to have  10 parts on a chainsaw including the chain catcher, flywheel, and the clutch. It is also wise to not buy a  chainsaw bar  thats too short for your average trunk or limb diameter. Mixing Oil With Gas All 2-cycle engines require gas to be mixed with oil. The oil tank is for bar and chain lubricant. Additionally, you really do need to use a quality bar oil as your chainsaw bar oil rather than regular motor oil. This is because the bar and chain oil have a high-tack additive that prevents it from slinging off the chain as it travels. Chainsaw Chipper Vs. Chisel Chain A chipper is a round tooth, round filled chain. It maintains its edge better in dirty cutting. The chisel chain is a square tooth, often ground round and older in design. Filing a Chain When the chips it cuts are no longer chips but dust, or when you have to physically push or force it to cut, you need to sharpen your chain. Depth Gauge Depth gauges are the metal point in front of each tooth on a chainsaw chain. They determine how large a chip the tooth can be taken by the cutter.

Friday, November 22, 2019

M. Carey Thomas

M. Carey Thomas M. Carey Thomas Facts: Known for: M. Carey Thomas is considered a pioneer in womens education, for her commitment and work in building Bryn Mawr as an institution of excellence in learning, as well as for her very life which served as a model for other women. Occupation: educator, president of Bryn Mawr college, pioneer in womens higher education, feministDates: January 2, 1857 - December 2, 1935Also known as: Martha Carey Thomas, Carey Thomas M. Carey Thomas Biography: Martha Carey Thomas, who preferred to be called Carey Thomas and was known in her childhood as Minnie, was born in Baltimore to a Quaker family and educated in Quaker schools. Her father, James Carey Thomas, was a physician. Her mother, Mary Whitall Thomas, and her mothers sister, Hannah Whitall Smith, were active in the Womens Christian Temperance Union (WCTU). From her early years, Minnie was strong-willed and, after a childhood accident with a lamp and the subsequent convalescence, a constant reader. Her interest in womens rights began early, encouraged by her mother and aunt and increasingly opposed by her father. Her father, a trustee of Johns Hopkins University, opposed her wish to enroll at Cornell University, but Minnie, supported by her mother, prevailed. She earned a bachelors degree in 1877. Pursuing post-graduate studies, Carey Thomas was allowed private tutoring but no formal classes in Greek at the all-male Johns Hopkins. She then enrolled, with her fathers reluctant permission, at the University of Leipzig. She transferred to the University of Zurich because the University of Leipzig would not award a Ph.D. to a woman, and forced her to sit behind a screen during classes so as not to distract male students. She graduated at Zurich summa cum laude, a first for both a woman and a foreigner. Bryn Mawr While Carey was in Europe, her father became one of the trustees of the newly created Quaker womens college, Bryn Mawr. When Thomas graduated, she wrote to the trustees and proposed that she become the president of Bryn Mawr. Understandably skeptical, the trustees appointed her as professor of English and as dean, and James E. Rhoads was appointed president. By the time Rhoads retired in 1894, M. Carey Thomas was essentially performing all the duties of president. By a narrow margin (one vote) the trustees gave M. Carey Thomas the presidency of Bryn Mawr. She served in that capacity until 1922, serving also as dean until 1908. She stopped teaching when she became President, and focused on the administrative side of education. M. Carey Thomas demanded a high standard of education from Bryn Mawr and its students, influence by the German system, with its high standards but less freedom for students. Her strong ideas directed the curriculum. So, while other womens institutions offered many electives, Bryn Mawr under Thomas offered educational tracks that offered few individual choices. Thomas was willing to be more experimental with the colleges Phoebe Anna Thorpe school, where John Deweys educational ideas were the basis for the curriculum. Womens Rights M. Carey Thomas maintained a strong interest in womens rights (including work for the National American Woman Suffrage Association), supported the Progressive Party in 1912, and was a strong advocate for peace. She believed that many women ought not to get married and that married women ought to continue careers. Thomas was also an elitist and a supporter of the eugenics movement. She endorsed strict immigration quotas, and believed in the intellectual supremacy of the white race. In 1889, Carey Thomas joined with Mary Gwinn, Mary Garrett, and other women in offering a large gift to the Johns Hopkins University Medical School in exchange for ensuring that women would be admitted on an equal basis with men. Companions Mary Gwinn (known as Mamie) was a long-time companion of Carey Thomas. They spent time together at the University of Leipzig, and maintained a long and close friendship. While they kept details of their relationship private, it is often described, though the term wasnt used much at the time, as a lesbian relationship. Mamie Gwinn married in 1904 (the triangle was used by Gertrude Stein in a novels plot), and later Carey Thomas and Mary Garrett shared a house on campus. The wealthy Mary Garrett, when she died in 1915, left her fortune to M. Carey Thomas. Despite her Quaker heritage and childhood emphasizing simple living, Thomas enjoyed the luxury now possible. She traveled, taking 35 trunks to India, spending time in French villas, and living in a hotel suite during the Great Depression. She died in 1935 in Philadelphia, where she was living alone. Bibliography: Horowitz, Helen Lefkowitz. The Power and Passion of M. Carey Thomas. 1999.

Thursday, November 21, 2019

Causes for adoption of Chinas early modern period trading policies Essay

Causes for adoption of Chinas early modern period trading policies - Essay Example In order to find a probable explanation, the study of the economic history and the trading policies of China in the early modern period are very important to establish a relation with the present trading policies of the country and the causes for adoption of the same. The economic history of China ranges over the last two millennia. Although the Chinese economy was the largest for a major part of the history consisting of the pre-imperial, early imperial and the late imperial era, the wealth of the Chinese economy remained average due to the intermediate periods of prosperity and downfall. The late imperial period has been referred to as the early modern period that ranges from 1368-1911. This period was under the rule of the Ming Dynasty (1368-1644) followed by the Qing dynasty (1644-1911). Causes for adoption of China’s early modern period trading policies The collapse of the feudal system in China towards the end of imperial period led to the rise of merchant class in the e arly modern period in China. The rise of the merchant class led to the increase in trading. The introduction of paper money, technological advancements led to widespread economic transactions and the increase in trade. The state’s control over the Chinese economy diminished and this allowed the merchant class to engage into higher scale of investment in their zeal to attain higher profits. The Ming dynasty under Zhu Yuanzhang that ruled from 1368-1644 in the early modern period in China is considered to be the most prosperous periods and one of the Golden periods in the economy history of China. After leading the rebellion against the Mongol rule, Zhu Yuanzhang set up the Ming dynasty in the early modern period that encouraged the growth of private industries and replaced the state owned enterprises. The trade policies adopted by the Ming dynasty led to the increase in foreign trade supported by privatization policies. This led to increased trading between the East and the We st. This resulted in the growth of Chinese economy and GDP due to the trade policies that were adopted. Trade contacts were developed initially with India and Africa with state regulations. Slowly and gradually, the restrictions on foreign trade were removed. The Europeans, Japanese importers started to pay for the Chinese goods in exchange of silver which helped in monetizing the Chinese economy (Stearns 68). The end of the Ming dynasty saw the rise of the Qing dynasty towards the end of the early modern period. The Qing dynasty believed that their country is rich with resources and there was no need of foreign trade. This brought about stagnancy in the economy. After the warfare ended, the prohibition on foreign trade was lifted in 1684. This led to massive increase in foreign trade mainly with the European countries. This trade policy led to the development of the economy which in turn raised domestic demands in the early modern period. The prosperity of the Chinese economy, the rise in domestic demand, increase in gross domestic product observed in the early modern period due to the trade policies of increasing foreign trade backed by privatization are the major causes that led to the adoption of those trade policies that prevailed in the early modern period. Conclusion The probable explanation for the adoption of trade policies of the early modern period of China has been the effective decision making of the government to bring back the Golden days in the Chinese economy. After the People’s Republic of China was founded in 1949, the trading policies have not been much effective due to the excessive control of the state. In order to modernize the economy and bring sustainable

Tuesday, November 19, 2019

Destination Report & Presentation Assignment Example | Topics and Well Written Essays - 1750 words

Destination Report & Presentation - Assignment Example The paper intends to make a comparison between two popular tourist destinations of the country and finally make a few important recommendations for the policy maker associated with the tourism industry of the nation. Overview The world of the 21st century is moving at a fast pace. The fast pace of advancement of the modern day world is happening more on the lines of rapid change and tremendous development. It is of high importance to mention that the evolution of the telecommunication technology along with the process of emergence of high speed internet and various kinds of technology enabled gadgets has resulted in the process of playing a tremendous amount of influence in the lives of the masses around the world. It needs to be mentioned that because of the lines of emergence of high speed internet connectivity, the network of communication channels has improved in a drastic manner all over the world. Because of this technology powered transformation of the world around us, there h as always been a steady evolution of various kinds of trends associated with the factor of globalization. The trends of globalization, is resulting in the process of evolution of various kinds of new types of consumer demands. These new consumer demands are increasingly paving the way for a significant amount of business opportunity. Because of the rise of business opportunities, many firms located in different global markets are increasingly entering new markets. This is automatically triggering an increase in competition in the market. For the purpose of sustaining themselves, while retaining their competitive edge, the companies are increasing the pressure of performance on the employees. As a result of increasing stress in the workplaces, the people around the world are increasingly looking forward to relax by taking some highly enjoying vacations. The focus of this project is to compare and contrast two different tourism locations of Canada while judging them on the basis of fa ctors like tourism planning environments, destination components as well as relative position in regards to tourism destination cycle. The two popular tourist destinations that have been chosen in this case are Harbourfront Centre as well as Banff National Park of Canada. Comparison of Harbourfront Centre and Banff National Park Harbourfront Centre Brief Overview The Harbour Front Centre is a neighbourhood located on the north shore of Lake Ontario, within the premises of city of Toronto of Canada. The history of the region highlights that the harbour of Toronto has been using since the days of founding of Toronto for industrial as well as shipping purposes. However, the Harbourfront Centre was formed on the first day of the year 1991 as a non profit organization dedicated towards charity. It has a mandate to organize as well as present public events over a regional spread of around 94 acres. As of the current times, the Harbourfront Centre was transformed into a popular all year ro und tourist destination. The offering of the tourist site comprises of a sizzling blend of culture, arts, recreation along with indoor cafe and outdoor patio. Various events of

Saturday, November 16, 2019

The Supernatural and the witches Essay Example for Free

The Supernatural and the witches Essay The story of Macbeth, like most of Shakespeares plays, tells a story that has a moral lesson attached to it. Macbeth was essentially a man who craved power but even when a prophecy was revealed that he would gain, Macbeth still wasnt truly satisfied. Instead, he went to great lengths to ensure that his power lasted longer than it should have. He submitted to the evil whims and plans of his wife, Lady Macbeth, and put himself in a position that destroyed his self respect, ruined his pride, degraded his honour, and spoiled his integrity. For my essay I have decided to base it on the witches and the super natural things, which take part in the book Macbeth One will always notice the many influences that Macbeth encounters before his downfall. Each one of these may have had some bit of impact on the final outcome. The three most popular causes of the tragedy of Macbeth are the main characters ambition, the witches prophecies, and Lady Macbeths influence over Macbeth. in this case, it is obvious that there was some other force behind him that helped him to change from a respectable, trustworthy man, to a deceiving murderer. In his encounters with the witches, Mabeth was introduced to that fact that he could have more power, and in hearing what he had to do to earn it, he was scared. However, with the witches making this power sound so grand, he was eventually convinced that his dignity was no longer essential. The witches, therefore, were what caused the legacy of Macbeth as a heroic individual to lead to his ultimate death and destruction. At the very beginning of the play it clearly shows that the three witches can foretell the future. They come into the play in the first scene during a horrendous storm and they have foreseen the visit that Macbeth is going to pay them. During Macbeths visit all three witches spoke in rhyme as if they were putting some sort of spell on him for example When the hurly-burlys done, when the battles lost and won They also give Macbeth a prediction, they did this because they knew it would encourage Macbeth to kill because they knew how ambitious he was and what lengths he would go to become king. At the end of the first scene it tells me that the witches have opposite values to us fair is foul and fouls is fair meaning good is bad and bad is good. The witches are very evil and vengeful. I know this because they send a sailor out to sea in a constant thunderstorm for several months. They do this because the sailors wife would not give them one of her many chestnuts. A sailors wife had chestnuts in her lap, and munched, and munched, and munched, and munched. Give me quoth I: Aroint thee, witch! the rump-fed ronyon cries. Her husbands to Aleppo gone, master O the tiger: But in a sieve Ill thither sail, and, like, a rat without a tail Ill do, Ill do, and Ill do. The quote explains why and how the witches gave such a terrible punishment. The witches are described as not looking like typical women. They are very ugly, old and they have beards. Obviously your typical woman would not have a beard. I know this due to the fact Banquo said to the witches live you? Or are you aught? This tells me that the witches are very old. Banquo said to the witches you should be women, and yet your beards forbid me to interpret that you are so Clearly this shows that the witches have beards The witches prediction was correct; Macbeth did ultimately murder Duncan and his guards. He murdered the guards just incase they saw something and they were to people about it. Lady Macbeth helped Macbeth murder the guards by putting something in their drinks so they would sleep. Personally I think that Macbeth cannot be held totally responsible for the killing of Duncan and the guards. I think this because other characters did motivate him to murder them such as Lady Macbeth and the witches. So far in the play Macbeth has become Thane of Cawdar by winning the battle against the Norwegians and Macdonald. The witches give Macbeth three Prophecies, which are Thane of Glamis (which Macbeth already is) Thane of Cawdar and the last prophecy that the witches gave to Macbeth is King of Hereafter All hail, Macbeth! That shalt be king here after The witches prophecies have already taken a big influence over Macbeths life. Glamis and thane of Cawder: The greatest is behind This meaning for Macbeth the next step is even better than the one before. Macbeth wants to become king but Banquo doesnt trust the witches he refers to them as the devil can the devil speak true Banquo believes that evil spirit would not tell them the truth. Banquo then said to win us to our harm meaning the witches are going to lead Macbeth and Banquo to their own destruction. Banquo was becoming suspicious of the death of Duncan. Macbeth Realises that Banquo heard the witches three prophecies he doesnt like Banqos suspicion so he arranges for him and his son Fleance to be killed. Macbeth wants his son murdered as well as Banquo because the witches have told him that they were the future King. Unfortunately for Macbeth there was a mistake in the killings of Banquo and his son. Although the killing of Banquo was very successful it was very brutal murder it consisted of 20 gashes to his head. His son escaped. That night Macbeth held a big celebrity banquet. This is the scene, which Banquos ghost appears. Macbeth being the only person, who can see him, turned and said to him Thou canst not say I did it. Never shake thy gory locks at me Obviously he does not react well to seeing a ghost at the feast. He denies having anything to do with the murder. When Banquos ghost reappears Macbeth begins to go mad and said to himself Avaunt! And quit my sight! Let earth hide thee Lady Macbeth makes excuses for Macbeth to cover up for his behaviour My lord is often thus, and hath been from his youth: pray you, keep seat; the fit is momentary In the quote lady Macbeth is trying to say that her husband is ill and that the Banquet must come to an end due to this. Macbeth again visits the witches for one last final time. Whilst he was there he mentioned that he had gone so far into his murders that he might as well carry on I am in blood stepped so far, that, should I wade no more Also during his visit, the witches are joined by Hecate, who is the queen of witchcraft. This shows the importance Macbeth had in the forces of evil. Not long into Macbeth visit the witches start listing ingredients for some sort of potion, which contains guts, a toad toe, snake, eye of newt, a frog, bats fur, dogs tongue, a humans lips, nose and liver, a wolf tooth, and a finger of a prostitutes baby strangled at birth Fillet of a fenny snake, in the cauldron boil and bake; eye of newt, and toe of frog, wool of bat and tongue of dog, adders fork, and blind-worms sting, lizards leg, and howlets wing, for a charm of powerful trouble, like a hell-broth boil and bubble The witches put all these ingredients into a cauldron to make a potion, which is made for Macbeth to drink. Once Macbeth had drunk the potion he begun to have apparitions. He saw an image of a head with a helmet this symbolised Malcolm coming towards the castle. I think the bloody child represented Macduff being born by a caesarean, the child with a crown on its head holding a branch I think represented Macduff becoming King as he was the only person who could kill Macbeth due to the fact that he was born by caesarean and not by a natural birth and the branch represented Macduffs army approaching Macbeths castle camouflaged into the woods hence the witches prophecy Macbeth shall never vanquished be until Great Birnham Wood to high Dunsinane Hill shall come against him and Banquo holding a mirror represented Banquo beginning a dynasty of royals. Due to Macbeths previous visit to the witches he proceeds to burn Macduffs castle to kill all his family but he fails to kill Macduff because he had gone away to rally an army somewhere in England. The castle of Macduff I will surprise, seize upon fife; give to th edge o th sword his wife, his babes, and all unfortunate souls that trace him in his line. No boasting, like a fool; this deed Ill do, before this purpose cool. When Macduff found out about the tragic, and brutal murders of his family he and his army returned to Scotland to kill Macbeth. Each person was carrying a branch from a tree, to form an illusion that they were a moving forest. Just as the witches prophecy said. As I said earlier Macduff was the only person able to kill Macbeth because he was born not of a woman, a lot of the army members have trouble trying to kill Macbeth but eventually Macduff killed Macbeth. Even in his final uttered words before his death, Macbeth refers to two of the witchs apparitions, these being the second and third apparition concerning the Great Birnam wood knocking at his door and his inevitability to anyone born of a woman:

Thursday, November 14, 2019

Atherosclerosis and High Fad Diets Essay -- Health

Atherosclerosis Atherosclerosis, which is a chronic inflammatory disease amongst the arteries of the human body, remains the principal cause of cardiovascular related disease (Gets, 2011). Atherosclerosis results from a complicated relationship between different factors such as lipid metabolism, blood coagulation elements, cytokines, hemodynamic stress, and behavioral risk factors. (Singla et al., 2011) The pathogenesis of atherosclerosis involves oxidative stress, endothelial dysfunction and chronic inflammation, which are initiated in response to high plasma lipid levels, especially Low Density Lipoproteins. (Yu et al., Getz., 2011) Atherosclerosis is a benefactor to the pathogenesis of myocardial and cerebral infarctions, gangrene and loss of function in the limbs, which results from an inconsistent inflammatory-fibro proliferative reactions to destruction of the endothelium and smooth muscle of the arterial walls (Morenoa et al., 1992). Researches have found that free radicals and reactive oxy gen species have been suggested to be part of this pathophysiology (Calderon et al., 2008). As atherosclerosis progresses over the decades, there seems to be lesion growth that are mostly facilitated by cellular adhesion molecules, which are expressed on the vascular endothelium and on circulating leukocytes in reaction to inflammatory stimuli; this is largely due to the recruitment of inflammatory cells from the circulation and their trans-endothelial movements. (Blankenberga et al., 2003) furthermore, there is now an agreement that atherosclerosis characterizes a state of heightened oxidative stress characterized by lipid and protein in the vascular wall (Singla et al., 2011). Over several decades Atherosclerotic plaque matures a... ...: 24–38. doi: 10.1373/clinchem.2007.097360 10) Bayes-Genis A, Conover CA, Schwartz RS. The insulin-like growth factor axis: a review of atherosclerosis and restenosis Circ Res 2000;86:125-130. 11) Blankenhorn DH. Prevention or reversal of atherosclerosis: review of current evidence. Am J Cardiol.. 1989;63:38H-41H 12) Pearson,TA, Blair,SN, Daniels,SR, Eckel,RH, Fair,JM, Fortmann,SP, Franklin,BA, Goldstein,LB, Greenland,P, Grundy,SM, Hong,Y, Miller,NH, Lauer,RM, Ockene,IS, Sacco,RL, Sallis,JF, Jr., Smith,SC, Jr., Stone,NJ, Taubert,KA: AHA Guidelines for Primary Prevention of Cardiovascular Disease and Stroke: 2002 Update: Consensus Panel Guide to Comprehensive Risk Reduction for Adult Patients Without Coronary or Other Atherosclerotic Vascular Diseases. American Heart Association Science Advisory and Coordinating Committee. Circulation 106:388-391, 2002

Tuesday, November 12, 2019

An Analysis on “American Gothic” by Grant Wood Essay

â€Å"Without atmosphere a painting is nothing.† This is a quote by Dutch painter and Etcher. There have been several painters who focused on the atmosphere of the locations or spots that they chose to draw on their canvas. However, some of the painters founded themselves mysteriously involved into the environments of places that they visited. One of those painters is Grand Wood, who painted the American Gothic. Wood made certain atmosphere the bases of his painting and through his unique style of painting impressed everyone who liked good artwork. As a result, the painting stands amongst the likes of Mona Lisa and other highly famous paintings today. American Gothic by Grant Wood American Gothic by Grant Wood is one of the most famous painting in the history of arts. The Art Gallery of Chicago is the place where American Gothic was displayed for the very first time and it is the very gallery that still keeps the painting. In search of visiting a fine piece of art, in person, I visited the Art Gallery of Chicago. There, along with many other paintings, American Gothic was also displayed for the visitors to see. Experiencing American Gothic through Computer VS in Person When I visited the gallery 263 and finally looked at the American Gothic painting by myself, I realized the importance of seeing an artwork by one’s own eyes instead of looking at in on a computer or in books. The painting made that was oil painted on Beaver Board was 78 x 65.3 cm in size and there was the signature of Grant Wood on the lower right corner on the canvas along with the year 1930. Since I was there just to see and analyze the American Gothic, I stayed in front of the painting after other visitors moved towards other paintings. Masterpiece Turned Into Senseless Parodies As we all know there have been countless parodies of the American Gothic out there, some of which are harmless parodies while many of them are totally absurd attempts. After looking at the painting for several minutes I got a bit uncomfortable because I found the two characters (Painter’s sister and his dentist) a bit creepy. The way the lady is looking at her father, who  seems to be a hardworking farmer, and way the farmer is looking at us holding a pitchfork in his hand is what gives the painting another meaning than just two individuals standing in front of a farmhouse made using Carpet Gothic style. However, creating parody after parody by different people is what I find disrespectful to the legendary art such as this one. If you praise something, you should respect it and not make fun of it or use it is a source of humor because I found everything in the American Gothic but humor. Existence of Conflict in Concern with the Expectations of Society Earlier we have discussed themes and roles of the artist that conflicted within the expectations of society. If we talk about whether or not the American Gothic had elements that conflicted within the expectations of society, we would have to say yes. For the reason that not everyone sees a particular thing in the same way, various people perceive certain things in different manners. Same is the case with American Gothic as Lunday, in one of her most interesting articles said that; â€Å"Some perceived the work as a scathing parody of the Midwest—one outraged farm wife even threatened to bite off Wood’s ear.† (Lunday, 2012) The Fame and Acceptance Earned By the Artwork There is a complicit that American Gothic holds within the expectations of society. However, the amount of praise this painting has received completely outweighs the negative remarks or reviews that it received. As Lunday mentions in the very article ‘Honest and Creepy, Satire and Homage: Grant Wood’s American Gothic’: â€Å"Meanwhile, Gertrude Stein and other critics praised the painting as a cutting small-town satire, the visual equivalent of Sinclair Lewis’s Main Street. Still others saw the painting as honoring the Midwest and its strong values.† She furthermore said; â€Å"During the Great Depression, the masterpiece gave hope to a desperate nation, and it helped shape the notion of the Midwest as a land of hard work and honest values. Today, the painting is firmly embedded in our cultural vocabulary.† (Lunday, 2012) Without Atmosphere a Painting Is Nothing It is apparent that Wood believed that the environment of a painting is the most important element of a painting. This particular painting proves this point as the painter chose his dentist and his sister as his subjects just because there was no other model available to pose for the painting in front of the wood farmhouse. Wood took help of his mother in making his paintings as she would agree to become the subject for many of Wood’s paintings. However, while Wood decided to paint the American Gothic, he realized that his mother won’t be able to stand in the field for that long while he paints, so he chose his sister instead. Wood chose his dentist and his sister because he couldn’t afford to lose the opportunity of painting the Carpenter Gothic style farmhouse that he came across while visiting the small town of Eldon in his native Iowa. This reminds me of a quote by Rembrandt Harmenszoon Van Rijn, which seems completely fitting to what Grant Wood was all about : â€Å"Without atmosphere a painting is nothing.† ― Rembrandt Harmenszoon Van Rijn Wood’s imagination was wide-ranging. He foresaw the fame and acceptance that this particular painting will get by analyzing the environs around the wood farmhouse. When he saw the house’s strange yet compelling arched window in the Carpenter Gothic style, the first thing that came to his mind was to find out what sort of people lived there. However, instead of knocking on the door, the painter decided to capture the farmhouse in paint and tease out the story for himself in effort to sort through the puzzle, piece by piece. (Lunday) â€Å"I imagined American Gothic people with their faces stretched out long to go with this American Gothic house. – Grant Wood. Final Words American Gothic doesn’t fall in the category of Primitive art as the elements it holds are usually found in such paintings and artworks that are related to modernism. Though countless individuals made parodies of American Gothic but actually the real artwork cannot be copied or reproduced to give another painter fame and fortune. The idea of anchoring a painting on the environs of a farm field and a farmhouse was the creativity of Grand Wood which cannot be repeated again in the history of arts. However, if one bases his art practices around the quote â€Å"Without atmosphere a painting is nothing.†Ã‚  there would be minor chances that we might see another painting somewhat as good as American Gothic.

Saturday, November 9, 2019

Rome’s Decline

Test Essay October 3, 2012 Question: â€Å"What were the main factors in Rome’s decline? Which do you judge as the most important? Why? † When we hear the word â€Å"Rome,† a very definite picture comes to mind. We see a strong military conquering a vast majority of the ancient Mediterranean world, Julius Caesar sitting on his throne, leading Rome to newer heights each day, and the highest, most innovative new technology being put to use as Rome grows stronger and stronger. Rome was a very successful civilization, as it lasted from 100 BC to 476 AD.For a 200 year span, called the Pax Romana, trade, entertainment, the economy, and overall satisfaction increased. This was a time of peace. Unfortunately, because of numerous misfortunes such as power struggles, inflation, military rebellions, and foreign invasions, even the mighty Roman civilization came to an end. Power struggle was a major conflict of Rome. After the Pax Romana, whose last king was Marcus Aurelius, emperors were continuously overthrown and killed.This was such an issue, that during one fifty year period, 26 emperors ruled and either resigned or were murdered. Out of those 26, only one died of a natural death. Because of the constant change of rulers, the kings lost the support of the citizens, since the emperors they were loyal to did not remain in power. The collapse in politics was the first step to the fall of Rome. The economic decline was the second step to the fall of Rome. Large taxes were put in place to support and fund the military due to corruptness.Because of this, a heavy burden was placed upon businessmen and farmers. With the majority of their income going to the large taxes, farmers were financially struggling. They could no longer afford their land, so they were forced to leave and work for large landowners. Money gradually started losing its value, and inflation occurred. The third step in the Roman decline was the military rebellions. Because of the constan t change in emperors, different groups in the military felt loyal to different rulers.This caused the military split and often rebel against each other. The military became so weakened and disorderly that emperors began to hire mercenaries. The final step in Rome’s decline was the foreign invasions from Germanic Tribes. Great Britain, Spain, and France were the first of the Roman territories to be surrendered. Rome itself was shortly after, and it was apparent that the largest and most powerful empire in the world at the time had come to an end. Rome was no more.

Thursday, November 7, 2019

Relevance of Philosophy Essays

Relevance of Philosophy Essays Relevance of Philosophy Essay Relevance of Philosophy Essay In this essay the challenge is to shown the relevance of philosophy to 21st century manufacturing. As philosophy is not a new concept there is a wide and defervesce range of ideas (on everything that existed and does not yet exist). The people who study philosophy and deal with such matters must have at one stage put forward some thoughts on manufacturing and even engineering in general. Philosophy comes from the Greek for love of wisdom, giving us two important starting points: love (or passion) and wisdom (knowledge, understanding). Philosophy sometimes seems to be pursued without passion as if it were a technical subject like mathematics. Philosophy must come from some passion for the ultimate goal to be achieved: a reliable, accurate understanding ourselves and our world. Many think philosophy an idle, academic pursuit, never amounting to anything of practical value. The works of ancient Greek philosophers, ask the same questions which philosophers ask today. Doesnt this mean that philosophy never gets anywhere and never accomplishes anything? Philosophy is relevant as it makes us think about where we have come from, where we are at present and where we are going to in the future. The study of philosophy is usually conducted in one of two different ways: the systematic/ topical method and the historical/ biographical method. Both of these have their strengths and weaknesses and it is often easier to avoid focusing on one to the exclusions of the other, at least whenever possible. There are many different areas of philosophy which have relevance to manufacturing and will have relevance in the future. Philosophy is the study of the fundamental  nature of existence, of man, and of mans relationship to existence. Some areas of study in philosophy are logic, ethics and epistemology (knowledge, ways of knowing) to name but a few important that are relevant to manufacturing. In this essay I hope to discover the link and the importance of philosophy in relation to manufacturing in the 21st century. Main body The main areas in which manufacturing are influenced by philosophy is ethics, logic and epistemology. Logic  is the study of  reasoning. Logic is used in most intellectual activities, but is studied primarily in the disciplines of philosophy,  mathematics engineering, and  computer science. Logic examines general forms which  arguments  may take which forms are valid, and which are fallacies. It is a type of  critical thinking. The field of ethics (or moral philosophy) involves systematizing, defending, and recommending concepts of right and wrong behaviour. Philosophers today usually divide ethical theories into three general subject areas: met ethics, normative ethics, and applied ethics Knowledge is about how things work and why they work and that’s what engineering and the sciences set out to do. Manufacturing is a by product of knowledge. These areas can be viewed from many philosophical points. And the different areas which have relevance to manufacturing can be put into three main branches and several sub branches. These main three are Epistemology, Logic and Ethics and some sub branches of the three main relevant branches to manufacturing, economic, technological mathematic, social and rational argument. The relevance of philosophy to manufacturing goes back long before the industrial revolution and even further back then the roman’s but to the first philosopher Pythagoras. These topics will be discussed in more detail later. Ethics or moral philosophy This is the branch of philosophy which seeks to address questions about morality that is, about concepts such as good and bad, right and wrong, justice and virtue. Anyone who has read Aristotle’s Ethics and has read modern moral philosophy must realise the great contrasts between them. The concepts which are prominent among the moderns seem to be lacking, far in the background, in Aristotle. Most noticeably, the term ‘moral’ itself, which we have by direct inheritance from Aristotle, just doesn’t seem to fit in its modern sense into an account of Aristotelian ethics. Aristotle distinguishes virtues as moral and intellectual. This area of philosophy is a broad area of study and is very relevant to everybody in normal day life. We take for granted the morals we live by and the morals of others, this too can be true for ethical practices that take place in manufacturing. Ethics are used by every company and business as bases for running their organisation such as fair trade, quality of product and quality of working environment. Some examples of ethics that show how important it is to consumers that companies have morals include: Fair Trade In the case of fair trade ethics has changed the way trade is done and the way people are treated in the process. In the past number of years important social changes have occurred with ethics an example of simple ethic in fair trade would be the production of coffee beans. Companies in recent years have begun to buy fairly bought produce where the producers benefit. As most of the producers are poor farmers. But because of the moral changes that have taken place in the past twenty years things have improved before the change in attitude the companies bought the product at low prices for big plantation owners and the poor suffered because of it. Quality of Product The role of ethics in quality of product we can take a very recent example and it is very much manufacturing example that of Toyota with the stricken of the accelerator pedal. The company is calling back thousands of cars for repair; this will cost a lot of money. And why its being done well the company has a moral obligation to produce a product fit for use. The ethics behind leaving defective products in us by consumers it could cause many incidences and maybe fatalities. The ethics that Toyota will abide by. Will cost the company a lot of money but may save the company on the long run. Companies who didn’t solve their problems. i. e. the car company Lancia who had a rust problem, which crippled the company in the end. And Toyota could fall a similar fate and begun bankrupt if not carful. It can be said that it is not ethics that is making Toyota recall all these cars but money. That unfortunately that is a pessimistic view and one would hope that Toyota is doing it for the right reasons over the value of reputation and money. Quality of Working Environment Quality of working environment is the final scenario. There have been many changes in the way people work and the place in which they work in as most working environment can be very dangerous places. Since the start of the industrial revolution high fatalities have occured due to machines with little or no safety aspects, have been recorded and it was due to companies disregarding safety of workers to make high profits. It may not be as big an issue today in the western world but to poorer more undeveloped countries where workers are still being neglected-ethics will play a role to improve he working environment and show manufacturing in a better light, now and in the future. Ethics is the bases of why good judgment is made so as to maintain and improve society. In a manufacturing sense morals can be a corner stone in changing work practices in industry. It can be a tool for progress in the future. The moral obligation to all is to be just and right, the phrase â€Å"Do no harm† can be an important to manufacturing and life in ge neral. Thomas Hobbes had stresses the importance of peace and security. With ethics in mind he said; there is no place for industry, because the fruit thereof is uncertain: and consequently no culture of the earth; no navigation, nor use of the commodities that may be imported by sea; no commodious building; no instruments of moving and removing such things as require much force; no knowledge of the face of the earth; no account of time; no arts; no letters; no society† And then follows the description of life under such conditions made so by repeated quotation that I refrain from quoting it still again. Where morals prevail peace can be seen. Peace and security, however, including secure property rights and the attendant opportunities to create and accumulate wealth, permit â€Å"commodious living†, which is Hobbes’s term for economic development. In the three examples it can be seen where ethics has played a part in changing the mind set of people and companies in the past few decades. It may not be ethics which was the catalyst for these changes but it is the way things are changing for the better. Hobbes had a point even if it was a bit extreme; there is room for good if people give it a chance and do the right thing. Logic Logic is the study of reasoning. And reasoning typically focuses on what makes reasoning efficient or inefficient, appropriate or inappropriate. Logic is the corner stone of science and mathematics which in turn play a vital role in engineering. It is one of the oldest areas of philosophy going back to Aristotle. Along with Aristotle some key figures in the study of logic were Bertrand Russell, Charles Sanders Peirce and Immanuel Kant. These men made many points on the area of logic As like ethics, logic is a wide area of study. This is important to us in our every day existence. Logic is what we use to solve from our most basic problems to the kind of problems that change the world socially, economically, technologically and mathematically to name but a few ways. Logic can be broken down into two parts inductive reasoning and deductive reasoning. Inductive reasoning is where a set of facts are given and from those facts a conclusion can be got from it an example of this in is a jigsaw puzzle all the parts are there but the pieces must be put together to see the full picture. On the other hand deductive reasoning is quiet different while inductive reasoning all the pieces are to be seen at once deductive reasoning gets it answer on a logical sequence of events, example of deductive reasoning is where a problem is set out but there is only one piece of information to work on and from that another piece of information is discovered until a logical sequence is established and an answer is reached like a detective solves a crime. Logic is the tool to solve any problem or argument which may arise by using the types of reasoning. And with this in mind logic will play a part in the future of manufacturing because without the use of logic the problems of the future won’t be solved and manufacturing will not progress. Epistemology Philosophy is largely based on known knowledge and epistemology is a study of knowledge. Descartes defines knowledge in terms of doubt. While distinguishing rigorous knowledge and lesser grades of conviction, Descartes writes: â€Å"I distinguish the two as follows: there is conviction when there remains some reason which might lead us to doubt, but knowledge is conviction based on a reason so strong that it can never be shaken by any stronger reason. † [Stanford, 2010] According to Bertrand Russell in regards to Epistemology, he says â€Å"we could be familiar with objects in two ways: knowledge by acquaintance and knowledge by description. He also thought that we could only be acquainted with our own sense data and that everything else we had to know through reasoning. It set out to answer â€Å"what distinguishes true (adequate)  knowledge  from false (inadequate) knowledge? This question translates into issues of scientific methodology: how can one develop theories or models that are better than competing theories. There is many areas which knowledge can be broken down into these main areas are Ratio nalism, Scepticism Rational Knowledge Rationalism Mathematics and geometry are examples of abstract truths which are known with certainty, even though the physical illustrations of these truths may vary. An early example was the Greek philosopher Plato who stated that ideas have an existence independent of human minds. These independently-existing ideas are the only reality in the universe since they are absolute and unchanging. Valid knowledge comes then when the mind grasps these ideas. Another famous philosopher was the Frenchman Rene Descartes who went through a period of scepticism in his life and then came to the conclusion that only ideas which were clear and distinct to the mind represented valid knowledge â€Å"Objections to Rationalism: . There is no agreement among philosophers or cultures about so-called self-evident ideas. Supposedly self-evident ideas have often been rejected at later times in history. 2. Self-evident ideas provide no knowledge about the world. Though sense experience may not be certain, it provides us with information which is as reliable as we need. The fact that a belief is not absolutely certain should not disqualify it for knowledge. Why not say t hat something is  known  as long as there is no good reason to doubt it? Of course, that might mean that occasionally we would have to admit that what we thought we knew was something that we really didnt know. So what? † [tamu, 2010] Scepticism This is the view that questions whether valid or reliable knowledge is ever attainable by a human being. Some sceptics stated that nothing can be known. Other sceptics stated that they did not know whether knowledge was possible; they suspended judgment on the issue. Some of the common examples used by sceptics are the illusions and deceptions of our senses. Others point to the complexity of any experience and ask how you can know what is the essence or real nature of the things you are experiencing. Empiricism This is the view that valid knowledge comes only through the five senses. Aristotle held the view that whatever was in the mind was first in the senses. Rene Descartes  (1596-1650) He claims, unless we know first whether our belief itself is justified. To determine whether our beliefs are justified, we have to be able to trace them back to a statement, belief, or proposition that cannot be doubted. Such a proposition could provide the firm foundation on which all subsequent beliefs could be grounded; it would guarantee that all subsequent claims based on it would be true. In order to identify an ultimate principle of truth on which all other knowledge can be based, Descartes develops a method that suspends our confidence in what we have been taught, what our senses tell us, what we think is obviousin short, in regard to everything we know. In order to determine whether there is anything we can know with certainty, he says that we first have to doubt everything we know. Such a radical doubt might not seem reasonable, and Descartes certainly does not mean that we  really  should doubt everything. What he suggests is that, in order to see if there is some belief that cannot be doubted, we should temporarily pretend that everything we know is questionable. Since sense experience is sometimes deceiving, it is obvious to Descartes that  a posteriori  claims (e. g. , that this milk tastes sour or that suit is dark blue) cannot be the basis for claims of knowledge. We do not know that what we experience through our senses is true; at least, we are not certain of it. So the best thing to do is to doubt our senses. Likewise, we cannot be sure that we really have bodies or that our experience of the world in general can be trusted; after all, we might be dreaming the whole thing. Next, we cannot even be sure that mathematical propositions such as 2+3=5 or that triangles always have three sides are true because some evil power might be deceiving us to think such things, when it is possible that even propositions that seem evident to us as true might themselves be really false. But even if an evil genie deceives us about all other beliefs, there is one belief that we cannot be mistaken about, and that is that we are thinking. Even to doubt this is to affirm it. Thinking proves that we exist (at least as minds or thinking things, regardless of whether we have bodies). The body is not an essential part of the self because we can doubt its existence in a way that we cannot doubt the existence of the mind. We have a great inclination to believe that there are physical objects that are external to the mind. But since only those objects known in terms of mathematical propertiesnot those imagined by use of the sensescan be known clearly and distinctly, the only knowledge we can have of such objects is in terms of mathematical, quantifiable physics. The only real knowledge we can have, then, is of things understood as functions of laws of physics. The objects we  see  are not the objects we  know, because what we know is intelligible only in terms of the clarity and precision of the formulae of physics. Information provided by the senses cannot therefore be the basis of knowledge. [tamu, 2010] Kant Immanuel Kant (1724-1804) was a German philosopher who attempted to combine rationalism and empiricism. It is called the form and matter epistemology. A statue can have a form such as Abraham Lincoln and a matter such as marble; you need both a form and a matter to have a statue. So in knowledge you need a form, which are categories of the mind,  and matter which are the data of sensatio ns. You need both of these to have knowledge. It is similar to wearing rose-colored glasses. You have visual sensations and they are coloured by the glasses. Of course with the mind you cannot take of your glasses. Knowledge is an incredibility powerful tool which has created great nations and pushed the boundaries of science and technology to new areas. The quotation from Sir Francis Bacon (1561-1626) said that â€Å"knowledge is power† and that has always been the case since the dawn of civilisation, knowledge has been a part of every major advancement. Knowledge has a big part to play in manufacturing, it is an integral part of all advancement without the constant need for knowledge through research and other means it would be impossible to make major achievement. The different areas which have been discussed can be seen as different way we can go about solving difficult situation and problems. Manufacturing will need to conform to these different methods of thinking in the future. Conclusion Philosophy can be shown to have many areas some of which have been covered throughout this essay. The areas which have been covered are relevant to manufacturing in ways that show philosophy as a key component to running a lucrative and sustainable operating line. Philosophy has a lot of points to make; its relevance to manufacturing can be used as a tool for advancement in the future in areas such as Ethics * Companies treatment of small producers * Quality of products produced for consumers * The working environment Ethics has a role to play in changing these for the better and will have a maintaining a standard in future productions, especially in third world countries where companies have taken advantage of their workers yet do not pay a moral price. Logic The study of reasoning logic can be found at the core of engineering and manufacturing in general. It is a corner stone in which there are couple of ways of resolving a problem. The two main types are * Inductive * Deductive These two methods of solving apply to certain manufacturing dilemmas depending on the individual situation. A logical sequence of steps to gain the solution in which a process i. e. a production line is established by taking the correct logical sequence for the line to work effectively. Logic has a vital role in the way manufacturing process are carried out, without which there would be ciaos, void of efficiency, continuity and general order. Epistemology Epistemology is the study of knowledge and the ways of knowing. It schools of thought from which theories have sprung can be divided in the categories. * Rationalism The view of using absolute truth which is known with certainty is rationalism. Breaking knowledge down into its simplified core elements to revel the truth. * Scepticism This is seen where a theory is put forward and is then questioned. Many theorists maintain that some knowledge can never been known in its entirety or factually. It is questioning until a hypothesis or theory is validated to their satisfaction. * Empiricism Using the five senses to gain knowledge, most natural form of collection of information as we do it every day unknowingly. In the future the ideas and views of philosophy will have a significant part to play in manufacturing and engineering in general. As it has had an important role to play in the past. Manufacturing can be broken down into many different areas and this is due to philosophy and the thinking required by the different schools of thought in the related areas. As all area have a knock on effect on each other, i. e. logic can change the methodology significantly. We now realise the importance of philosophy in every day manufacturing although it might not appear obvious but under the surface of manufacturing processes is detrimental to efficient, cost effective, and ethic practices in the work place. References [Stanford, 2010] http://plato. stanford. edu/entries/descartes-epistemology/ [tamu, 2010] http://philosophy. tamu. edu/~sdaniel/Notes/96class15. html