Thursday, October 31, 2019

Entreprenenuship Essay Example | Topics and Well Written Essays - 4000 words

Entreprenenuship - Essay Example However, the success rate associated with such business models depends on the business scope and strategic effectiveness of an entrepreneur. Specifically mentioning, the UK’s domestic market has currently emerged out of an economic recession. In this regard, it can be predicted about the difficulties faced for the success of the small and medium scale entrepreneurial businesses. Justification to this statement can be provided depending on the fact that within a stabilized economy, the existence of government restrains will be comparatively less and the scope of carrying out the business processes in an appropriate manner will be high (Trading Economics, 2014). Taking consideration of the aforementioned aspects, the discussion focuses towards understanding the significance of growing entrepreneurial business within an economically stabilizing nation such as the UK. In this context, different theories are considered with the aim of having a better understanding about entrepreneurial activity in the UK. Based on the above graph, it can be analysed that the UK economy has drastically entered into a state of instability between the periods of 2012 and 2013. However, the nation appears to have shown appreciable amount of economic growth between the 3rd quarter of 2013 and the final quarter of 2014. Thus, the nation has made consistent efforts towards attracting the attention of the young entrepreneurs who intended to establish their own business and contribute to the economic wellbeing of the UK. With stability within the economic growth pace, the chances of opportunity for entrepreneurship will be much higher in comparison to that of the necessity of entrepreneurship. Moreover, after the economic recession state, the UK government structure has also projected appreciable amount of flexibility within new business licensing and registration procedures in order to create the overall business establishment for new entrepreneurs as

Tuesday, October 29, 2019

Contemporary Ethics Essay Example | Topics and Well Written Essays - 1250 words

Contemporary Ethics - Essay Example Internet and cell phone communications have been cited as tools for Cyber bullying. According to Hopline, what appalls even more is that Cyber bullying occurs during kids’ class time. Hopline cites that cyber bullying has far reaching implications on kids, so that the victims (kids) of cyber bullying only feel safe when in their bedrooms. According to Hopline, it does not under all circumstances hold that cyber bullying causes physical harm. However, cyber bullying is mostly associated with causation of harmful emotional fallout which may cumulate to other gar reaching consequences. Hopeline cites an example of Megan Meier; the girl aged 13 who committed suicide after belittlement by a hacker (her mother’s friend) that posed on MySpace as a boy aged 16 years. Hopline acknowledges that peer to peer cyber bullying is the most rampant, but its implications are not so severe. Effective curbing of cyber bullying would entail instilling of ethical morals among the youth, whic h will help them suit to information technologies. Hopline argues that there can be no an over-reactive approach as parents barring their kids from accessing technology in attempt to curb cyber bullying. Hopline suggests that an appropriate ramification procedure would entail the parents convening to open meetings, where then the parents can share and appropriately advice their kids on cyber bullying. Parents should be tactical so to dispel rebellion from their kids. Parents should not ignore the fact that all have under high risks of cyber bullying; terms such as ‘some kids are immune’ should not exist since all are sensitive to belittlement. Other intervention techniques should encompass teaching the kids on the importance of respect. In the case where kids are cyber-bullied, appropriate intervention procedures should be followed before the situation gets out of hand. It is factual that

Sunday, October 27, 2019

Bell Helicopters: A Legacy of Global Innovation

Bell Helicopters: A Legacy of Global Innovation Abstract   Ã‚   Bell Helicopters began as an adventure of Lawrence Bell when he created Bell Aircraft Corporation. Through his admiration for aviation, a company grew that would help the allies, with the P-39 fighter and B-29 bomber, win the Second World War and conquer the demon of the sound barrier by reaching Mach 1 with the X-1 flown by Captain Chuck Yeager. When Larry Bell turned his passion to vertical flight, a new industry was born, the helicopter. Bell Aircraft would become the first company to mass produce the helicopter and produced such icons as the Bell Huey, Huey Cobra, and Bell Kiowa. These helicopters would redefine modern warfare and pave the way for civilian use of the machines. Bell Helicopters would emerge from the Bell Aircraft Corporation and produce helicopters for the world. The Model 206, Jet Ranger would see significant use in every corner of the globe in almost any helicopter job imaginable. Bell Helicopters would create alliances with companies such as Agusta, Boeing, and Air Methods Corporation and eventually merge with and become a subsidiary of the global Textron Corporation. Bell Helicopter continues to be an international leader in technologies and airframes with annual global revenue of $3.5 billion, and whose services and products, such as the Bell 505-X and the Bell 525 Relentless, will serve the global economy for the far-reaching future. Helicopters have played a vital role in aviation since their inception in the late 1930s. While airplanes travel specifically from point to point, helicopters provide the enroute services to the destination. The helicopter was born during the first half century of powered flight and several key inventors at the time stand out. This paper will follow one of them, Lawrence Bell, namesake of Bell Helicopters. During the early years of flight, airplanes were capturing the hearts of crowds everywhere with their ever-increasing speeds, distances, and capabilities. Larry Bell, an aircraft designer and manufacturer saw the potential for a closer to the earth, smaller, more personal airframe that would serve both military and civilian needs. Bell Aircraft Corporation, as Bell Helicopters was initially named, would begin by producing aircraft for the WWII effort and followed with vital X- programs in aircraft design. Their aircraft would provide the Axis powers with the equipment necessary to win the war and the development and realization of supersonic flight that followed. When Larry Bell realized the need for a civilian version of military helicopters, Bell Helicopters was established and has grown today into an international phenomenon that influences people all over the world. Almost all communities in the world are effected by the work that helicopters perform on a daily basis and a significant portion of those helicopters have been built by Bell Helicopters. This paper shares an insight into the history, formative years, programs, legacy, current and future products, mergers, international challenges and businesses, and future forecast for Bell Helicopters; a legacy of global innovation. Larry Bell: The Nucleus of the Innovation Lawrence Bell was born in a rural town in Indiana in 1894, but his love of aviation and airplanes began, like so many aviation enthusiast, after attending an airshow, when his family moved to California just before his 16th birthday. Bell never finished high school and dropped out to join his older brother, Grover, who had become an exhibition pilot, working with Lincoln Beachey and pioneer airplane builder Glenn L. Martin of the Martin Company. Larry Bell began to work as an aircraft mechanic but became a stockroom clerk after his brother was killed in an aircraft accident. Moving up the company, Bell rose to vice president and general manager in 1920, of the aircraft manufacturing and demonstration company. Nevertheless in 1925, after disagreements with Martin, Larry Bell left the Martin Company. It would be three years before he would return to the aircraft manufacturing business, and this time, Bell was promised guarantees of interest in the company. That company, Consolidated A ircraft, would give Bell the experience he needed to foster his own company, and when Consolidated moved to California from New York, Larry Bell and his general manager would stay behind and develop their own company. Bell Aircraft, opened its doors in July of 1935, by renting space in the former Consolidated Aircraft plant in New York (Lips, 2007). The company would build its first aircraft, the XFM-1 Airacuda, for the U.S. military, in 1937. Even though only thirteen airframes were built, it proved that Bell Aircraft Company could produce high quality, innovatively designed aircraft. The company was substantiated. Establishing a Legacy In 1938, Bell was sent to Europe with other leaders in the aviation industry to observe aviation capabilities at the time. While in Germany, Bell was enthralled by the German mass-production assembly lines as opposed to the workshop, single airframe production at home. He would write home Production methods here are far superior to anything in America or any other country, because theyre doing this on a large scale that lends itself to progressive production methods (Lips, 2007). During his tours of the German production factories, Larry Bell would see a craft that would profoundly impress him, a Focke Fa 61 helicopter. He would file this away for later when the aircraft would change him and his namesake company. On returning to Buffalo, N.Y., Bell would introduce the mass production he had observed in Germany. In 1938, he would begin design of an aircraft that would allow the company to go from producing only 13 aircraft in a year to assembling over 20 a day, innovating the mass production methods for aircraft assembly. This aircraft, the P-39 Airacobra, of which over 9,500 would be built was initially intended for the American and British military. Though design augmentations and changes would prove the aircraft undesirable for its original clients, the Soviets, through the Lend-Lease Act of 1941, would acquire the airframe and become Bells first international aircraft transactions. The Second Great War During World War II, Bell Aircraft would diversify and develop separate divisions to facilitate the production of other projects for the war effort. It would also create the Bell Modification Center, which during the war would modify aircraft and give valuable experience for the Bell employees when the time came to transition aircraft from military to fulfill civilian needs. The Bell Aircraft Company would continue its development of aircraft with the P-63 King Cobra, a modified and upgraded version of the P-39 Airacobra. The company would also open a plant in Marietta, GA that helped produce the famous B-29 bombers until 1946 when the production ceased. This plant, the first in the South would stand to be an economic boom for the region as most aircraft manufacturing was completed in the Northeast or West Coast of the U.S. (Superfortress,2017). The X Planes Americas first jet powered airplane, the XP-59 was developed by Bell Aircraft in secrecy during 1942. Although the aircraft would never see combat during the war, the technologies and designs produced in the development of the XP-59 would usher the Americans into the jet age. In 1944, Bell Aircraft realized the need for a high-speed research aircraft that could explore and test new speed frontiers (Lips, 2007). On October 14, 1947, using a Navy engine, the Bell X-1 piloted by Captain Charles Yeager, would become the first aircraft to break the impenetrable sound barrier by traveling faster than Mach 1.0. The X-1 program would set the pattern for all future X-craft programs and the X-1 project defined and solidified the post-war cooperation between U.S. military needs, civil industrial capabilities, and research facilities (NASA,2008). Bell would continue with the X-planes creating the X-5, which was the first aircraft to test the ability to change the sweep angle of its wings in flig ht, and the X-14 (Type 68), a long running test platform for vertical takeoff and landing (VTOL) that incorporated vectored thrust. Bell Aircraft would become a leader in the theory of tilt-rotor VTOL, first with the XV-3 then with the X-22, a quad-ducted fan tilt-rotor. The XV-15, a tri-bladed rotating wing-pod VTOL, would take the company into a new direction by providing the technology that would set the stage for the future of vertical takeoff and landing aircraft. No Runway Needed: the Age of the Rotorcraft When Lawrence Bell first became intrigued in Germany with the helicopter design witnessed, he may not have known the true impact it would have on his future. Bell had heard of a young inventor and philosophy student, Author Middleton, who had developed a working model of a helicopter, and in 1941 brought him onboard to lead a team to create and construct the first Bell helicopter. The team would set up shop in a newly acquired, former Chrysler dealership, in Gardenville, N.Y. Six months later the team had a helicopter made of plywood beams, magnesium, fir and balsa wood rotor blades, and powered by a 165-hp Franklin engine, the Bell Model 30, whos first flight was on December 29, 1942 (Bell Helicoters,2017). Production and design correction were made on the aircraft and in 1946 the renamed Model 47 was granted the first commercial type certificate for a rotorcraft. This would open the door for the increased research and development of further helicopters. Larry Bell, in response to m arketing research, directed the engineering team to begin construction on a larger aircraft of the future for the civilian market. The answer from the team was the Bell 42, a 4 passenger helicopter whose design would endure into modern day helicopters. Unfortunately, there was no potential large scale civilian market for the new technology at the time and only two prototypes were made, forcing the Bell Helicopter Division to concentrate on military style helicopters. Bell Helicopter Division would continue the development of the Model 47 throughout the 1940s, but with the war effort and its associated revenue gone, a group of dissident stockholders would attempt a failed hostile takeover of the company. The company would weather union strikes and see its wartime employee number of 50,000 drop to less than 3,000 full time employees (Scranton, 2001). The 1950s saw a change for the company and in 1951 the Bell Aircraft Corporation Helicopter Division was relocated to Hurst Texas to separate and concentrate on the helicopter production for the military. The Korean war had ignited a requirement for helicopters and by 1953 the 1000th Model 47 rolled off the assembly line. In 1954, a critical component of modern day helicopters was developed, the turbine engine. This would give helicopters a more dependable form of propulsion and move the helicopter from a novelty into a fully functional presents in aviation. In 1956, Lawrence Larry Bell, founder and visionary of Bell Aircraft Corporation, passed away. His dreams and salesmanship for his aircraft, and his helicopters in particular, would set the stage for the Bell Helicopter Corporation to be established as a wholly owned subsidiary of Bell Aircraft Corporation in 1957 (Bell, 2017). In 1956 Bell Helicopters, would produce a helicopter that would not only change the company but change the world, the Model 204. This was the first production helicopter to utilize the turbine engine and the timing of its development on the world stage could not come at a better period for Bell. The U.S. military was searching for a helicopter for its utility use and the Bell 204 was selected. Research and development and would continue into the 1960s when Bell would begin producing in mass, the now famous Huey helicopter, whose name was slang from the military designation HU-1, (helicopter, utility). The Vietnam War would see this aircraft, and the helicopter in general, go from an indulgence to a workhorse. The helicopter would play such a major role in the conflict that the war would become known as the Helicopter War. Over 16,000 airframes have been built by Bell and its licensees of the Model 204 and 205, making it the most successful military helicopter ever built (Bell 205, 20 17). This airframe would be the basis for helicopter models that are still being built and flown today. To assist the 204 in its wartime mission, the U.S. military would also require a more formidable aircraft, an attack helicopter, and Bell would answer with the Model 209. The 209 would be a slim, tandem pilot seated helicopter, thats sole mission was with the armament that it carried. This was the first time a helicopter would be utilized in this fashion and over 1600 of the original production models were manufactured. Bell realized the effectiveness of the aircraft for militaries and to date has exported the product to the militaries of Bahrain, Israel, Turkey, Thailand, Spain, South Korea, Pakistan, Jordan, and Japan. These militaries, around the globe, will continue to fly variants of the aircraft into the 2020s (Cobra, 2016). Although these two aircraft would become the mainstay of the military effort for the last half of the century, a smaller, lighter aircraft would be the true link between military and civilian rotorcraft usage for Bell; the Model 206. The 206 began life not as a military helicopter but as a civilian light helicopter in 1966 as 206A, but was soon transitioned to its military version for a lightweight observation helicopter, the OH-58A Kiowa. The helicopter would perform well for the military and models C and D would be flown by the U.S. military into the new century. Sales of the OH-58A/C and D to foreign nations would include to Australia, Austria, Canada, Taiwan, Mexico, Dominican Republic, Saudi Arabia, and the United Arab Emirates (Kiowa, 2016). But for Bell, the 206 would provide a tangent that would enter the company into a new era; the domination of the civilian helicopter market. The Bell 206 Jet Ranger would become the worlds most utilized light helicopter. It would continue i n production from the 1960s until 2010 when Bell delivered its last B206BIII Jet Ranger having built over 8,400 aircraft. The Jet Ranger continues to be the safest single engine aircraft ever built, with the lowest accident rate of any aircraft, fixed or rotary wing (Huber, 2010). Mergers and Ventures In 1952 the company began its first joint foreign venture with Agusta of Italy, whom it gave permission for the licensing of the popular Bell 47. Production on several versions and models would continue for over a half century with Agusta building Model 47s, 48s, and the Huey, model 204. (Agusta, 2017). The Bell-Agusta relationship would continue into the tilt rotor category and in 1998 the Bell Agusta Aerospace Company (BAAC) would be formed to produce a civilian version of the tilt rotor vertical takeoff and landing aircraft designated the BA609. The collaboration was dissolved when Agusta merged with another European company, Westland in 2011 and the new company was named the Agusta Westland Tilt Rotor Company. Agusta was just one of the joint ventures Bell Helicopter Company would enter into. During the World War II, Bell would collaborate with Boeing in production of the B-29 bomber, and from 1984 until 2000, would join in an alliance with Fuji of Japan to product that countries model 209 (AH-1) attack helicopter. In 1960 Bell Aircraft corporation was purchase and became a wholly owned subsidiary of Textron Corporation. This provided the financial umbrella for Bell to increase its long-term research and development involving helicopters and other specialty projects (Gale, 2006). More recently, in 2000, Bell Helicopters and Air Methods entered into a strategic alliance that will produce medical transport helicopter interiors for the Bell helicopters that service the Helicopter Emergency Medical Services (HEMS) industry. To the Future and Beyond      Ã‚   Bell Helicopters maintains the focus required for creating rotorcraft to suite all the customer needs for the near and far future. From small to large, and with the capabilities to fulfill the roles that customers worldwide will demand, Bell Helicopters will continue to provide quality products at marketable prices. Under development are the Bell 505 Jet Ranger X, the Bell 525 Relentless, the VTOL V280 Valor. The Bell 505 is a five-place light helicopter that will fill a void in the Bell production line. The light helicopter category is the fastest growing of all the categories and the 505X is well suited to make the most of the needs of the consumers. The 525 Relentless will provide the super-medium helicopter clients with the performance and styling necessary to support a variety of customer needs, from oil industry transport, to medical services, to ultra-luxury transport. The VTOL V280 Valor will provide the enriched capability of vertical takeoff and landing and enhance the adva ntages of high speed deployment for the military sector. These aircraft, and the service and support that accompanies them, will cultivate the companys future endeavors for decades to come. Challenges and Trials The demand for helicopter sales, like all aircraft, are cyclical and difficult to predict and forecast. These swings in demand for new helicopters, and the accompanying services, could have significantly varying degrees of success or be unanticipatedly less than prediction models for the future sales. As Bell Helicopters world-wide military sales and post-sales service are a significant part of its revenue base, at 59 percent in 2015 (Textron, 2016), congressional appropriations, international priorities for defense spending, and instability in global events can have a significant effect on the helicopter market. Changes in governmental regulations on the export of military hardware and services to certain countries also has an impact on the ability of Bell Helicopters to maintain its production predictions. Civilian markets are just as unpredictable with factors relating to usage and economic stability. As industries reach a financial drip in production and operations, as recently in the oil and gas industry, who utilize helicopters extensively, demand for newer or replacement helicopters is shelved or new orders temporarily halted until operations have increased. As Bell Helicopters are marketed in U.S. dollars, any volatility in the exchange rates for foreign nations currencies, or fluctuations in foreign economic or political stability can have a detrimental effect on sales revenues and the ability to operate for post-sales service. New foreign regulations and laws concerning environmental protection, and those relating to climate change, are impacting the cost of product design and manufacturing and could affect the ability of Bell to operate in certain localities. The restriction of the operation of helicopters due to noise and emissions contributions in specified areas will have an impact on the requirement for new and existing products in countries with restraining regulations. Bell continues to develop and design quieter and environmentally friendlier products for inclusion into restrictive markets. The International Partnerships Bell Helicopters partners with over 50 global companies to provide the service and support for its worldwide customers. With logistical supply and service centers in Amsterdam, Prague, Canada, and Singapore, Bell Helicopters has a world-wide presence necessary to give customers responsive and accurate support. The Prague center is a state-of-the-art customization and delivery service center that upgrades the helicopter interiors of Bells customers to fit their individual needs. In Amsterdam, Bell Helicopters provides regional distribution and support for over 200 customers, in 55 countries spread across Europe, the Middle East, and Africa. Since 1974, the facility at Schipol, has been serving the European community by increasing the customer service capabilities. In Singapore, in addition to the marketing and service support provided to the military and civilian helicopter transportation industry of Asia, Bell Helicopters has opened a training academy for regulatory maintenance class es with theory and practical training (Gale, 2016). Bells largest manufacturing outside of the U.S. is conducted at Maribel, Canada. In 2016, Bell announced their plans for Mirabel to be the location for the final assembly of the new Bell 505X. Quoting Bell CEO, Mitch Snyder Our operations in Canada have been, and will continue to be, a vital part of our commercial growth strategy and Maribel will remain a cornerstone of our global production, RD, engineering, and certification activities. The Landing Bell Helicopters continues to be a formidable force for the future of vertical lift. By maintaining production cost controls at or below governmental contracted rates and providing on-time delivery of products, Bell Helicopters maintains a leadership in the military procurement of contracts throughout the world. In the civilian side, the innovations of leading edge technologies, and providing outstanding support for the entire life cycle of their products, will allow Bell to grow their market share. Civilian tilt rotor transportation is in its infancy and Bell is positioned to take full advantage of its continued growth. By focusing on new opportunities that arise and pioneering innovative ways for meeting their customers needs, Bell Helicopters will flourish and continue the vision of its founder for the future of vertical lift flight. References: Lips, J. (2007), Larry Bell: Aviations Super Salesman, Retrieved from: http://airportjournals.com/larry-bell-aviations-super-salesman-2/ Picture of Lawrence Bell, Retrieved from: https://upload.wikimedia.org/wikipedia/ commons/d/d0/Larrybell.gif Wright, T. (2011), Lieutenant Ivan Baranovskys P-39 An airacobras journey to the eastern front and back, Retrieved from: http://www.airspacemag.com/military-aviation/lieutenant-ivan-baranovskys-p-39-41818469/ Darling, R. (2017), Bell P-39 Airacobra, Retrieved from: http://www.flying-tigers.co.uk/wp-content/uploads/2017/01/ai2-P-39-Airacobra.-American-made-and-supplied-to-the-Russians.jpg Goebel, G. (2015), The Bell P-39 Airacobra and P-63 Kingcobra, Picture Retrieved from: http://www.airvectors.net/avp39.html B-29 Superfortress, (2017), Retrieved from: http://www.boeing.com/history/products/b-29-superfortress.page NASA-Dryden History- Historic Aircraft X-1, (2008), Retrieved from: https://www.nasa.gov/centers/dryden/history/HistoricAircraft/X-1/index.html Pic Chrysler Dealership, 1942, Retrieved from: http://www.bellhelicopter.com/ company/history/1935-1949 The History of Bell Helicopters 1935-1949, (2017) Retrieved from: http://www.bellhelicopter.com/company/history/1935-1949 Scranton, P. (2001), The Second Wave: Southern Industrialization from the 1940ls to the 1970s, University of Georgia Press The History of Bell Helicopters 1950-1959, (2017), Retrieved from: http://www.bellhelicopter.com/company/history/1950-1959 Agusta, A Finmeocian Company, (2017), Retrieved from: http://www.helis.com/ timeline/agusta.php The Bell 205, (2017), Retrieved from: http://www.helis.com/database/model/9/ Bell AH-1 Huey Cobra, (2016), Retrieved from: http://www.militaryfactory.com/ aircraft/detail.asp?aircraft_id=13 Bell OH-58 Kiowa, (2016) Retrieved from: http://www.militaryfactory.com/ aircraft/detail.asp?aircraft_id=1 Agusta-Bell 206A Jet Ranger History and technical description, HAB,(2011), Retrieved from: http://www.heli-archive.ch/en/helicopters/in-depth-articles/agusta-bell-206a-jet-ranger/ Textron Annual Report and Proxy, (2016), Retrieved from: http://investor.textron.com/ investors/investor-resources/annual-report-and-proxy-materials/default.aspx Gale, T. (2006), Textron Inc., Retrieved from: http://www.encyclopedia.com/ social-sciences-and-law/economics-business-and-labor/businesses-and-occupations/textron-inc Huber, M. (2010), Bell Ceases Production of its 40-year old Jet Ranger, Retrieved from: http://www.ainonline.com/aviation-news/aviation-international-news/2010-09-21/bell-ceases-production-its-40-year-old-jetranger

Friday, October 25, 2019

A Comparison of Allen Ginsberg and Jack Kerouac :: comparison compare contrast essays

A Comparison of Allen Ginsberg and Jack Kerouac      Ã‚   Why. Excuse me. Why. Does. Excuse. Why me. I mean. Excuse me. Why. Does. It . Always end up this way. Like this. A performance. It's my best excuse. And. I'm on the wagon. Again. Why. Excuses. Sitting in the state of a daydream. No. Falling. A performance. Why what it comes down to. Poetry. And. My two main men. Allen Ginsberg and Jack Kerouac. Both use their individual voice to perform the buddhistic beat they feel is part of their poetry/ their beatific movement. Even though these two poets influenced each other. And. Their voices are significantly different. Each has a personal style one cannot deny. And. Each boy added his separate beat to the music they created as a generation. A beat generation. Jack's buddhistic jazz/ blues chorus poetry is domesticized/ tainted Christianity-wise. And. Allen's sound becomes zentific without Christianity/ hanging on a cross in the backbeat of his prose poetry. While each may have his own personal style/ both poets use the same techniqu e in sound. And. Rhythm to give their audience something to bugaloo to. Excuse me. What's. That. Poetry. Baby. A performance. So. Please brother. Take a chance. And. Dance. (She says that as she shh shh shivers.) "It's all gotta be non stop ad libbing within each chorus, or the gig is shot" (Kerouac, 1). And he meant every word of it. Jack's system of jazz/blues choruses work on/carry on harmonically as well as through certain words or phrases put together through sound. And also like jazz, his music, seemed to happen spontaneously, like nothing was planned.   In the '182nd Chorus', the ideas behind the phrase "The Essence of Existence is Buddhahood" is carried on into the '183rd Chorus' with the phrase "This is the real Buddha" (Allen, 171). It is like a bar of music in a jazz or blues riff. The idea and sound of one chord moves into the next, traveling, never knowing where it is going to end up. Just like the idea and sound of one line in one of Jack's choruses moves into the next, traveling, never knowing where it is going to end up. It sounds and looks spontaneous.    And because of this it is meant to be preformed out loud so it can be heard like a jazz or blues riff wailing.

Thursday, October 24, 2019

10 Major Agricultural Problems Of India Essay

Some of the major problems and their possible solutions have been discussed as follows. Indian agriculture is plagued by several problems; some of them are natural and some others are manmade. 1. Small and fragmented land-holdings: The seemingly abundance of net sown area of 141.2 million hectares and total cropped area of 189.7 million hectares (1999-2000) pales into insignificance when we see that it is divided into economically unviable small and scattered holdings. The average size of holdings was 2.28 hectares in 1970-71 which was reduced to 1.82 hectares in 1980-81 and 1.50 hectares in 1995-96. The size of the holdings will further decrease with the infinite Sub-division of the land holdings. See more: Sleep Deprivation Problem Solution Speech Essay The problem of small and fragmented holdings is more serious in densely populated and intensively cultivated states like Kerala, West Bengal, Bihar  and eastern part of Uttar Pradesh where the average size of land holdings is less than one hectare and in certain parts it is less than even 0.5 hectare. Rajasthan with vast sandy stretches and Nagaland with the prevailing ‘Jhoom’ (shifting agriculture) have larger average sized holdings of 4 and 7.15 hectares respectively. States having high percentage of net sown area like Punjab, Haryana, Maharashtra, Gujarat, Karnataka and Madhya Pradesh have holding size above the national average. Further it is shocking to note that a large proportion of 59 per cent holdings in 1990- 91 were marginal (below 1 hectare) accounting for 14.9 per cent of the total operated area. Another 19 per cent were small holdings (1-2 hectare) taking up 17.3 per cent of the total operated area. Large holdings (above 10 hectare) accounted for only 1.6 per cent of total holdings but covered 17.4 per cent of the operated area (Table 22.1). Hence, there is a wide gap between small farmers, medium farmers (peasant group) and big farmers (landlords). The main reason for this sad state of affairs is our inheritance laws. The land belonging to the father is equally distributed among his sons. This distribution of land does not entail a collection or consolidated one, but its nature is fragmented. Different tracts have different levels of fertility and are to be distributed accordingly. If there are four tracts which are to be distributed between two sons, both the sons will get smaller plots of each land tract. In this way the holdings become smaller and more fragmented with each passing generation. Sub-division and fragmentation of the holdings is one of the main causes of our low agricultural productivity and backward state of our agriculture. 1/2/2015 7:58 PM 10 Major Agricultural Problems of India and their Possible Solutions 3 of 16 http://www.yourarticlelibrary.com/agriculture/10-major-agricultural-pro†¦ A lot of time and labour is wasted in moving seeds, manure, implements and cattle from one piece of land to another.  Irrigation becomes difficult on such small and fragmented fields. Further, a lot of fertile agricultural land is wasted in providing boundaries. Under such circumstances, the farmer cannot concentrate on improvement. The only answer to this ticklish problem is the consolidation of holdings which means the reallocation of holdings which are fragmented, the creation of farms which comprise only one or a few parcels in place of multitude of patches formerly in the possession of each peasant. But unfortunately, this plan has not succeeded much. Although legislation for consolidation of holdings has been enacted by almost all the states, it has been implemented only in Punjab, Haryana and in some parts of Uttar Pradesh. Consolidation of about 45 million holdings has been done till 1990-91 in Punjab, Haryana and western Uttar Pradesh. The other solution to this problem is cooperative farming in which the farmers pool their resources and share the profit. 2. Seeds: Seed is a critical and basic input for attaining higher crop yields and sustained growth in agricultural production. Distribution of assured quality seed is as critical as the production of such seeds. Unfortunately, good quality seeds are out of reach of the majority of farmers, especially small and marginal farmers mainly because of exorbitant prices of better seeds. In order to solve this problem, the Government of India established the National Seeds Corporation (NSC) in 1963 and the State Farmers Corporation of India (SFCI) in 1969. Thirteen State Seed Corporations (SSCs) were also established to augment the supply of improved seeds to the farmers.  High Yielding Variety Programme (HYVP) was launched in 1966-67 as a major thrust plan to increase the production of food grains in the country. The Indian seed industry had exhibited impressive growth in the past and is expected to provide further potential for growth in agricultural production: The role of seed industry is not only to produce adequate quantity of quality seeds but also to achieve varietal diversity to suit various agro-climatic zones of the country. The policy statements are designed towards making available to the Indian farmer, adequate quantities of seed of superior quality at the appropriate time and place and at an affordable price so as to meet the country’s food and nutritional security goals. Indian seeds programme largely adheres to limited generation system for seed multiplication. The system recognises three kinds of generation, namely breeder, foundation and certified seeds. Breeder seed is the basic seed and first stage in seed production. Foundation seed is the second stage in seed production chain and is the progeny of breeder seed. Certified seed is the ultimate stage in seed production chain and is the progeny of foundation seed. Production of breeder and foundation seeds and certified seeds distribution have gone up at an annual average rate of 3.4 per cent, 7.5 per  cent and 9.5 per cent respectively, between 2001-02 and 2005-06). 3. Manures, Fertilizers and Biocides: Indian soils have been used for growing crops over thousands of years  without caring much for replenishing. This has led to depletion and exhaustion of soils resulting in their low productivity. The average yields of almost all the crops are among t e lowest in the world. This is a serious problem which can be solved by using more manures and fertilizers. Manures and fertilizers play the same role in relation to soils as good food in relation to body. Just as a well-nourished body is capable of doing any good job, a well nourished soil is capable of giving good yields. It has been estimated that about 70 per cent of growth in agricultural production can be attributed to increased fertilizer application. Thus increase in the consumption of fertilizers is a barometer of agricultural prosperity. However, there are practical difficulties in providing sufficient manures and fertilizers in all parts of a country of India’s dimensions inhabited by poor peasants. Cow dung provides the best manure to the soils. But its use as such is limited because much of cow dung is used as kitchen fuel in the shape of dung cakes. Reduction in the supply of fire wood and increasing demand for fuel in the rural areas due to increase in population has further complicated the problem. Chemical fertilizers are costly and are often beyond the reach of the poor farmers. The fertilizer problem is, therefore, both acute and complex. It has been felt that organic manures are essential for keeping the soil in good health. The country has a potential of 650 million tonnes of rural and 160 lakh tonnes of urban compost which is not fully utilized at present. The utilization of this potential will solve the twin problem of disposal of waste and providing manure to the soil. The government has given high incentive especially in the form of heavy subsidy for using chemical fertilizers. There was practically no use of chemical fertilizers at the time of Independence As a result of initiative by  the government and due to change in the attitude of some progressive farmers, the consumption of fertilizers increased tremendously. In order to maintain the quality of the fertilizers, 52 fertilizer quality control laboratories have been set up in different parts of the country. In addition, there is one Central Fertilizer Quality Control and Training Institute at Faridabad with its three regional centres at Mumbai, Kolkata and Chennai. Pests, germs and weeds cause heavy loss to crops which amounted to about one third of the total field produce at the time of Independence. Biocides (pesticides, herbicides and weedicides) are used to save the crops and to avoid losses. The increased use of these inputs has saved a lot of crops, especially the food crops from unnecessary wastage. But indiscriminate use of biocides has resulted in wide spread environmental pollution which takes its own toll. 4. Irrigation: Although India is the second largest irrigated country of the world after China, only one-third of the cropped area is under irrigation. Irrigation is the most important agricultural input in a tropical monsoon country like India where rainfall is uncertain, unreliable and erratic India cannot achieve sustained progress in agriculture unless and until more than half of the cropped area is brought under assured irrigation. This is testified by the success story of agricultural progress in Punjab Haryana and western part of Uttar Pradesh where over half of the cropped area is under irrigation! Large tracts still await irrigation to boost the agricultural output. However, care must be taken to safeguard against ill effects of over irrigation especially in areas irrigated by canals. Large tracts in Punjab  and Haryana have been rendered useless (areas affected by salinity, alkalinity and water-logging), due to faulty irrigation. In the Indira Gandhi Canal command area also intensive irrigation has led to sharp rise in sub-soil water level, leading to water-logging, soil salinity and alkalinity. 5. Lack of mechanisation: In spite of the large scale mechanisation of agriculture in some parts of the country, most of the agricultural operations in larger parts are carried on by human hand using simple and conventional tools and implements like wooden plough, sickle, etc. Little or no use of machines is made in ploughing, sowing, irrigating,  thinning and pruning, weeding, harvesting threshing and transporting the crops. This is specially the case with small and marginal farmers. It results in huge wastage of human labour and in low yields per capita labour force. There is urgent need to mechanise the agricultural operations so that wastage of labour force is avoided and farming is made convenient and efficient. Agricultural implements and machinery are a crucial input for efficient and timely agricultural operations, facilitating multiple cropping and thereby increasing production. Some progress has been made for mechanising agriculture in India after Independence. Need for mechanisation was specially felt with the advent of Green Revolution in 1960s. Strategies and programmes have been directed towards replacement of traditional and inefficient implements by improved ones, enabling the farmer to own tractors, power tillers, harvesters and other machines. A large industrial base for manufacturing of the agricultural machines has also been developed. Power availability for carrying out various  agricultural operations has been increased to reach a level of 14 kW per hectare in 2003-04 from only 0.3 kW per hectare in 1971-72. This increase was the result of increasing use of tractor, power tiller and combine harvesters, irrigation pumps and other power operated machines. The share of mechanical and electrical power has increased from 40 per cent in 1971 to 84 per cent in 2003-04. Uttar Pradesh recorded the highest average sales of tractors during the five  year period ending 2003-04 and/West Bengal recorded the highest average sales of power tillers during the same period.  Strenuous efforts are being made to encourage the farmers to adopt technically advanced agricultural equipments in order to carry farm operations timely and precisely and to economise the agricultural production process. 6. Soil erosion: Large tracts of fertile land suffer from soil erosion by wind and water. This area must be properly treated and restored to its original fertility. 7. Agricultural Marketing: Agricultural marketing still continues to be in a bad shape in rural India. In the absence of sound marketing facilities, the farmers have to depend upon local traders and middlemen for the disposal of their farm produce which is sold at throw-away price. In most cases, these farmers are forced, under socio-economic conditions, to carry on distress sale of their produce. In most of small villages, the farmers sell their produce to the money lender from whom they usually borrow money.  According to an estimate 85 per cent of wheat and 75 per cent of oil seeds in Uttar Pradesh, 90 per cent of Jute in West Bengal, 70 per cent of oilseeds and 35 per cent of cotton in Punjab is sold by farmers in the village itself. Such a situation arises due to the inability of the poor farmers to wait for long after harvesting their crops. In order to meet his commitments and pay his debt, the poor farmer is forced to sell the produce at whatever price is offered to him. The Rural Credit Survey Report rightly remarked that the producers in general sell their produce at an unfavourable place and at an unfavourable time and usually they get unfavourable terms. In the absence of an organised marketing structure, private traders and middlemen dominate the marketing and trading of agricultural produce. The remuneration of the services provided by the middlemen increases the load on the consumer, although the producer does not derive similar benefit. Many market surveys have revealed that middlemen take away about 48 per cent of the price of rice, 52 per cent of the price of grounduts and 60 per cent of the price of potatoes offered by consumers. In order to save the farmer from the clutches of the money lenders and the middle men, the government has come out with regulated markets. These markets generally introduce a system of competitive buying, help in eradicating malpractices, ensure the use of standardised weights and measures and evolve suitable machinery for settlement of disputes thereby ensuring that the producers are not subjected to exploitation and receive remunerative prices.

Wednesday, October 23, 2019

Mayan Culture

Modern Mayan culture has its roots in a very ancient culture. Ancient Mayan civilization spanned more than 3000 years and featured a written language, agriculture, a well-ordered social class system, a well-developed religious system, development of a calendar and trade. Much of the ancient tradition and culture has survived and been incorporated into the modern Mayan culture.ReligionMayan religion is a hybrid of Christianity and ancient Mayan beliefs and rituals. The sixteenth century church, a central institution in the process of conquest, set the tone of the future relationship by working to replace Mayan religion with Spanish Christianity and to Hispanicize Mayan culture in general. (Stoll, 2003)Although many of their Gods have been replaced with statues of Christianity, the stories barely resemble the Christian versions. Today, devout Maya worship at mountain and cave shrines, making offerings of chickens, candles and incense with a ritual alcoholic drink.The Maya are a very su perstitious people and have countless superstitions regarding events in mature which forewarn the observer of sickness, disaster, and death. Shaman/ daykeepers keep count of the 260 day ritual calendar and provide healing by identifying curses and offended ancestors, counting seeds and crystals in their divinations, and performing curando rituals.MarriageMayan marriage is not prearranged by the family, although in ancient times it was accepted practice. In the more traditional villages, the young man must still ask the father for his daughters hand in marriage and certain rituals are followed. There is a traditional engagement and wedding  ritual dance that many Maya use in their wedding ceremonies. Most young married couples will live with either set of parents until they can begin a household on their own.The average marriage age of Maya people is 16 for females and 19 for males. Very few Maya remain unmarried as family and children are very important to the Maya.FamilyFamily is a very important part of Maya culture. The average Maya family will have 6-8 children and most newlyweds have their first child within a year of marriage. In the domestic life of the Maya, family ties are strong, although outward displays of affection, such as kissing and embracing, are rare. Couples are considered affectionate if they carry out their respective duties faithfully. To their babies, however, the Maya are demonstrative and fondle and caress them, using baby talk as white parents do. It is evident that most parents are very fond of their children. Very rarely do fathers chastise their children physically and the mothers resort to harsh punishment only occasionally.  Ã‚   (Steggerda, 1941, p. 49)Food Production StrategiesMany of the Mayan still live much the way they did when the Europeans came, weaving, cultivating corn and beans and collecting firewood to cook and heat their adobe houses. Electricity and road access have not changed the local traditions. Corn, which was cultivated by the ancient Mayans, remains the main crop. Most farmers still use the slash and burn method of farming used by their ancestors.Other strategies are share cropping and renting land to grow corn crops. The Maya form groups of up to twenty men, usually kin, rent a large piece of land, and divide it among themselves. Although this arrangement is much preferred to wage labor on the plantations, it   requires a minimum amount of capital for transportation, food, tools, seed, and so on, and expertise in dealing with the Ladino world. Many lack these resources and are forced into the largest of the temporary migratory streams. (Early, 1982, p. 88)Outside ContactThe Maya, like most people who live in small and homogeneous groups where strong social controls operate, are conservative and unprogressive. Slow to take up new ideas, their attitudes and their material culture have been very little changed by modern trends and technological developments. Their pottery, weaving, and cross-stitch work have remained very much the same during the entire history of Yucatan. In general, they have not adopted the Spanish language but rather the Spaniards have adopted the Maya language.Their mode of dress has not changed appreciably for hundreds of years, and it is my belief that their daily life is very similar to that which their ancestors led. Only in the large Yucatan towns and cities, where social contacts are freer and where social controls cannot be maintained as strongly as in the smaller communities, are there signs of change. In such towns the European mode of dress is gradually being adopted, especially by the women, and cosmetics are commonly used. The people petition the government for radios, electric lights, and corn-grinding machines, and the idea of progress is gaining a hold in their minds. The cooperative movement and similar modern methods of economic organization are being tried. (Steggerda, 1941, p. 37)In Belize, the founding of the Maya Vil lage Indigenous Experience is attempting to change the limited outside contact of the Maya culture by exposing it to tourism. They hope to bring money to the communities and improve the quality of life in the villages. (Steinberg, 2004)Many other Mayan communities are following this example in an effort to become more modern but they maintain the ancient rituals and beliefs, much like modern day New Orleans.These five concepts show the history and persevering culture of the Mayan people. Traditions with religion and family provide a rich background to pass on to the next generation. While they are struggling to enter the modern age, many of the more traditional Maya see no problem with the lifestyle they currently possess.Living in the United States, technology is readily available and most people are adept at using it. Things we take for granted such as telephones, computers, television, and automobiles are slow to make their way into the more rural areas of the Maya culture but th ey live full lives without these things. This is a huge culture difference because most Americans do not believe they can live without technology.The family tradition is also vastly different. Americans live a much faster paced life and many things must be balanced: work, children, marriage. Mayan women are traditional homemakers and Mayan men do the heavy labor. American women do many of the heavy labor jobs and not many people can afford to stay home with the children full time.Both cultures have pro’s and con’s to their lifestyle and culture but both are ever changing and adapting to the world around them. Both realize the importance of religion within a culture and continuing the race through children. The United States, however, is not one culture but hundreds and this gives it a unique background. It is much more varied than the ancient Mayan history the modern Maya still cultivate.ReferencesEarly, J. D. (1982). The Demographic Structure and Evolution of a Peasan t System: The Guatemalan Population. Boca Raton, FL: University Presses of Florida.Steggerda, M. (1941). Maya Indians of Yucatan. Washington, DC: Carnegie Institution of Washington.Steinberg, M. K. (1994, Summer). Tourism Development and Indigenous People: The Maya Experience in Southern Belize. Focus, 44, 17+. Retrieved June 08, 2007, from Questia database: https://www.questia.com/read/1G1-19897117/tourism-development-and-indigenous-people-the-mayaStoll, D. (2003). Dow, James W. & Alan R. Sandstorm (Eds). Holy Saints and Fiery Preachers: The Anthropology of Protestantism in Mexico and Central America. Journal of the Royal Anthropological Institute, 9(3), 595+. Retrieved June 09, 2007

Tuesday, October 22, 2019

CTY SAT Score Requirements

CTY SAT Score Requirements SAT / ACT Prep Online Guides and Tips You’ve decided that you want to take part in the Center for Talented Youth (CTY)at Johns Hopkins University. Good for you!Having made this decision, however, you probably have some questions about test score requirements.Do you have to take the SAT to apply for CTY or its programs? What does taking the SAT qualify you for, and how well do you have to do on it? I’ll answer all these questions, and even manage to squeeze in an example from Shakespeare, if you’ll just read on.

Monday, October 21, 2019

Downloading Music essays

Downloading Music essays Downloading Music: Useful or Harmful? Napster, the original creator of free music shareware over the internet, developed a concept that changed the music industry and the consumption of music forever. Napster enabled users to download music from a certain artist in order for them to hear what the artist sounded like before purchasing the entire compact disc. However, people who downloaded a particular artists entire CD so they would not have to buy it abused this revolutionary concept. While this was not Napster's wish, there was very little they could do to monitor it. The music industry quickly discovered Napster's free distribution of copyrighted material and took them to court. While Napster fought for the relatively new way to obtain music over the internet, the music industry countered them claiming it was wrong to give away music for free and would inevitably cut into the entire music industries profits. How often does a person buy an entire CD just for one song? What is the harm of downloading just one song? Does downloading only one song from a CD even hurt the music industrys profits? These are the types of questions answered in Downloading Music: Who Gets Hurt? by Carlton Vogt, a columnist for the InfoWorld website, written on May 4, 2001. Vogt believes he holds a neutral position in the Napster debate due to "never purchasing music or downloading it off the internet." However, his article seems to support the Napster concept. Vogt states that Napster can actually benefit artists. Due to the fact that users can hear the song, decide if they like it, and then recommend it to friends or buy the artist's next CD themselves. Therefore, furthering album sales. This would not be possible without somehow first being introduced to an artist. Vogt deems that not purchasing a CD in a store because you are unfamiliar with the artist actually ...

Saturday, October 19, 2019

Causes of Prejudice

Prejudice is an opinion that is not based on actual evidence or experience. In â€Å"Causes of Prejudice,† Vincent Parillo describes the psychological and sociological reasons of prejudice. Among these causes, frustration is defined to produce a prejudicial attitude towards others. Parillo explains in his work that throughout history, minority groups have been used as scapegoats to take the blame for certain events. He clarifies that scapegoating is the act of blaming others for an incident that is not their fault. This idea is also visible in the novel To Kill a Mockingbird by Harper Lee, in the part where a lawyer named Atticus tries to prove an African American innocent who has been falsely charged with raping a white woman. Therefore, both Parillo’s â€Å"Causes of Prejudice† and Harper Lee’s To Kill a Mockingbird support that frustration is a cause of prejudice because of an increase in aggression towards a scapegoat. To begin with, frustration is caused by relative deprivation, which is the lack of resources in an individual’s environment when compared to others. This results in aggression towards a scapegoat in order to relieve this tension. â€Å"Frustrated people may easily strike out against the perceived cause of their frustration. However, this reaction may not be possible because the true source of the frustration is often too nebulous to be identified or too powerful to act against† (Parillo 583). His view is also seen in To Kill a Mockingbird, when Mayella Ewell claims Tom Robinson has raped her. Atticus tries to prove to the jury that Tom Robinson in fact did not rape Mayella and that she, a white woman, kissed Tom, a black man. Mayella is an Ewell; a very poor family in the town of Maycomb and therefore she has to live through tough conditions which include living behind the garbage dump, barely having any money to support her dad and seven siblings, as well as being beaten by her own father. Most importantly, she is frustrated that she always feels dissatisfied with her life since she was never able to experience any happiness by being isolated from the rest of the world. Therefore, she tries to at least kiss a black man to feel some sense of happiness. When she realizes it is condemned by society, her frustration increases partly because society is not allowing her to have a small amount of happiness, and so she shows her aggression by blaming Tom Robinson for raping her. In addition, aggression resulted from frustration is pinpointed towards scapegoats because they share similar characteristics of being vulnerable to blame. â€Å"The group must be (1) highly visible in physical appearance or observable customs and ac ¬tions; (2) not strong enough to strike back; (3) situated within easy access of the dominant group . . .† (Parillo 584). To Kill a Mockingbird takes place in southern Alabama in the 1930’s. This was the time period where prejudice against African Americans was present. Segregation was present because having white skin was seen to be better than having black skin. This simple difference in skin color resulted in an unfair treatment of African Americans. Separate bathrooms, drinking fountains, churches, and schools resulted for African Americans and whites. Also, since whites felt that the blacks were inferior to them, they tended to assume all blacks were unintelligent. When Mayella copes with her frustration of being isolated from the rest of the world by blaming Tom Robinson, the court looks at his skin color instead of the evidence given for this case. Even though Atticus provides plenty of evidence that proves that it was impossible for Tom to commit the rape of Mayella, Tom is still found guilty because even if Mayella is part of the lower class of Maycomb, she is still a white woman, making her superior to Tom Robinson. It is evident that frustration plays an important role in determining prejudicial attitudes. Both the novel To Kill a Mockingbird by Harper Lee and â€Å"Causes of Prejudice† by Vincent Parillo, agree that frustration is caused by relative deprivation and when aggression forms, the blame is placed on scapegoats. These scapegoats share similar characteristics which allow them to be vulnerable to the blame that falls upon them.

Friday, October 18, 2019

Writing about Construction Sequence of a Storage Ponds Research Paper

Writing about Construction Sequence of a Storage Ponds - Research Paper Example The stored water can be used for irrigation, and also fighting fire.But for the Forest Hills Metropolitan District Storage Pond Development, the new storage ponds would be used for â€Å"Water Augmentation purposes (releasing water from the ponds back into the Bear Creek watershed for use by water users downstream with senior in the event of a forest fire. It is however important that the basic procedure in the construction of a pond is followed so that the owner can come up with a top quality pond that is easy to maintain (Hyde & Perry 5). The first step in this process is finding a good location for the pond. This process is more important than the actual pond construction. Most sites are unsuitable for pond construction and whether the construction is inch perfect or not, the pond will fail if the site is not good enough. It is therefore important to analyze the safety of the area, topography, geological makeup, features of the drainage area and the water holding ability of the s oil in that particular area. Pond safety When planning for a pond, do not ignore the chances of the pond failing and in addition to the damage that can be caused by the rapidly released water. It is therefore important to locate the pond in an area where such a failure cannot cause damage to infrastructure or risk the lives of people or livestock. If it has to be in such an area, it is important to seek the services of an engineer who can come up with a design that is safe and fail proof. The site should not have any underground cables or pipelines as they can be broken or cause injury during excavation. This should also be the case to areas with electricity lines crossing above as they could be caught by a fishing line if they hang low. Water bodies attract different sorts of people from children to adults, this applies to ponds as well. It is therefore important to make the pond safe for activities like fishing. The pond owner should have any stumps removed so that boat riders sho uld not have any trouble when having fun in the pond (Hyde & Perry 7). Soils in the Pond The texture of soil can vary depending of the depth and might change strongly over a short distance. For the site to be appropriate for a pond, the soil has to be able to hold water. The soil layer should be thick in order to prevent excessive leaks, clay soil is recommended for pond construction since their texture is good and even better when it is a mixture of sand and clay. Sands with course textures do not hold water and are not recommended. A mixture of sand and gravel is even worse. In case a part of the pond has poor soil, it can be made impervious by adding betonies clay, this is however an expensive affair and it is advisable that an alternative pond site is chosen (Hyde & Perry 10).The profile of the soil beneath the damn should be studied as well because if it is not impervious, the water can seep away in the long run and therefore the foundation of the pond should be sealed using im pervious soil to make seepage impossible. Geology Building a pond in areas with limestone deposits is risky since the area might have invisible crevices which could make the pond to leak, such areas even have granular soils which leak even when wet. Such sites should have a thorough investigation done of them so that it is certain that they can hold water. Topography The cost of construction of a pond mainly depend on the lay of the land since if a pond with a high storage volume is needed, the site should have a low earth fill so that excavation work does not cost too much. A site with two ridges towering over either sides is good since it allows a large area to be flooded with ease. These areas also reduce the chances of some areas of the pond having shallow water. Excavated ponds are

Small Business Advise and Discussion Essay Example | Topics and Well Written Essays - 500 words

Small Business Advise and Discussion - Essay Example These ground works includes the following: 1. Proper Market Study: Analyzing the attractiveness of the industry, demand and supply analysis, customer, competitor analysis, SWOT analysis of the company, capital budgeting and financial planning for the business will help the business owner to understand all the small and big issues involved in the particular business. The target market should be identified and segmented. The small business owners face problems in raising the capital due to various reasons. These reasons can be risk, credibility of the business owner, market value of the projects, expected growth of the project or the business, customer base, business know-how of the owners, qualifications, experience and backup to support any kind of financial crisis. There are various alternative sources of finance available for the small investors. These are Boot Strap, Angel, Initial Public offering and private placement.1 In the Boot Strap funding the funds are raised with family, friends and others. In the case of Angel the investment is done by wealthy individuals. Private placements are done through banks and various other investments companies. Companies also access to the market through IPO to raise the capital. Boot Strap is a funding option available for all kind of business. Most of the companies start up with the investments like this. These kind of investments which are done with the h elp of various close circle members like family, friends, colleagues and sometimes good customers help small business owners for their initial stages of developments. Small business owners can effectively utilize these investments. The results produced like profitability, increased market value, customer base and demand of the products can attract investors for the further investments. These can be new investors, banks and other potential investors. This can help the small business owners to raise the funds in the expansion and growth phases of the

Organizational Processes, Human Resources and Ethics Needed to Be Assignment

Organizational Processes, Human Resources and Ethics Needed to Be Established in Kava - Assignment Example According to contingency theories, managers in most cases, design organizational structures that are most appropriate to the factors and circumstances surrounding the domain area of the organization itself. There are no set standards. One can’t tell which organizational structure is the best, as there are various ways to design an organization. For a particular organization, the rigid structure may be the best possible approach while for others a more flexible approach may be the right way out. Four factors are important determinants of the organizational structure or the organizing strategy a manager may opt for. These include the kind of organizational environment, the sort of business strategy the organization undertakes, the technology that has been applied in the organization and the characteristics of human resources within the organization. Kava is an island country, situated in the South Pacific. More than 50% of its population is 15 years of age. It is an ethnic mix of indigenous South Pacific tribes comprising of Asian, African, French, Spanish and a sizable number of Americans. There are a lot of languages spoken in the region comprising of English, Spanish and French and a couple of other indigenous languages. Its economy is agriculture oriented and thrives on petroleum, coffee, cocoa, spices, bananas, sugar, fishing tourism and natural gas. There is inexpensive quality labor available throughout. One of the biggest problems associated with this land is its vulnerability to natural disasters. These include threats like that of Tsunami, Hurricanes, Tornadoes, floods, fires, volcanic eruptions, earthquakes, HIV/AIDS, Petroleum spill, the High risk for avian flu and terrorism within and outside the country. There is a major lack of proper infrastructure in the region because KAVA is a region that has been affected by natural disaster.

Thursday, October 17, 2019

Monetary Policy of the U.S. Federal Reserve Essay

Monetary Policy of the U.S. Federal Reserve - Essay Example This paper discusses the U.S. Federal Reserve's monetary policy. Most simple put the attempt by the Federal Reserve to establish balanced national income and help spur economic growth by controlling the size of the money supply is termed as monetary policy. It is implemented with the help of policy tools which usually consist of open market operations, discount rates, and reserve requirements. Open market operations are the strongest monetary policy tool consisting of the purchase and sale of treasury and federal agency securities. The federal open market committee normally specifies all short-term objectives related to open market operations. These objectives normally identify reserve targets or the desired federal funds rate. It is interesting to note that there have been diverse objectives over the years ranging from federal funds rate targets in the eighties to policy changes in the nineties. No matter what the short term objective the long term objective has always been price st ability and sustainable economic growth. Another integral monetary policy tool is the discount rate which most simply put is the interest rate being charged to depository institutions including commercial banks on loans they receive from their regional discount window (Federal Reserve Bank's lending facility). These loans include primary, secondary and seasonal credit each one with its own respective interest rate. The primary credit program consists of very short term loans to sound financial institutions. Those not eligible for primary credit are allowed to apply for secondary credit whereas seasonal credit is provided to those depository institutions that have fluctuating funding requirements. It should be noted that the discount rates on all three lines of credit vary with the rate on primary credit being the lowest followed by a higher rate on secondary credit whereas the seasonal credit discount rate is an average of selected discount rates. Reserve requirements are another monetary tool that which as the name signif ies are the number of reserve funds that a depository institution must hold as a safeguard against deposit liabilities. These reserves are held in the form of physical cash or deposits with Federal Reserve Banks with the board of governors having lone authority over any changes in the reserve requirements. The reserve requirements are not erratic and are determined using Federal Reserve Board Regulations.All of the above help the government implant its monetary policy and eventually result in a stronger economic power. Proper use of monetary policy can have extremely positive results which were visible during the first half of 2006 when the US economy showed speedy growth. Any change in the federal funds rate triggers a chain of events that affect other short-term interest rates, foreign exchange rates, long-term interest rates, the amount of money and credit, and, ultimately, a range of economic variables, including employment, output, and prices of goods and services.

American History Assignment Example | Topics and Well Written Essays - 250 words - 13

American History - Assignment Example In fact, tribes such as Shoshones and Nez Perces had agreed to the pact and as a reward, they would receive guns and supplies for it. For Blackfeet Indians, giving guns to their enemies is a direct threat to their might. Soon enough, the discussion soon turned into a blooding fight with 2 Blackfeet warriors killed in the encounter. Since then, Western Indians became hostile towards representatives of the American government. The diary presents the richness and abundance of South Dakota when it comes to natural environment and animal life. In the diary, the Corps of Discovery members informed how they hunt animals such as elk, buffalo, deer, fox, birds, antelope and many more. The group also documented how they were able to encounter places and hills where Indians lived. Clark specifically pointed out that the reason why Indians believe that spirits dwell on the place was because various birds assemble on top of the hill. In the site, it was interesting to learn about Nez Perce Indians who were excellent horsemen. Like their Shoshone neighbors, the Nez Perce were without guns or ammunition. Clark and his troupes described them as â€Å"cheerful and sincere†. Another tribe which caught my interest is the Wala Wala in Washington whose chief welcomed the tribe warmly. Chief Yelleppit enjoyed the prestige of hosting his foreign visitors and sought to trade with them. Before their departure, the chief gave the troupe horses, food, and canoes. There were also celebration and dances before they left the

Wednesday, October 16, 2019

Organizational Processes, Human Resources and Ethics Needed to Be Assignment

Organizational Processes, Human Resources and Ethics Needed to Be Established in Kava - Assignment Example According to contingency theories, managers in most cases, design organizational structures that are most appropriate to the factors and circumstances surrounding the domain area of the organization itself. There are no set standards. One can’t tell which organizational structure is the best, as there are various ways to design an organization. For a particular organization, the rigid structure may be the best possible approach while for others a more flexible approach may be the right way out. Four factors are important determinants of the organizational structure or the organizing strategy a manager may opt for. These include the kind of organizational environment, the sort of business strategy the organization undertakes, the technology that has been applied in the organization and the characteristics of human resources within the organization. Kava is an island country, situated in the South Pacific. More than 50% of its population is 15 years of age. It is an ethnic mix of indigenous South Pacific tribes comprising of Asian, African, French, Spanish and a sizable number of Americans. There are a lot of languages spoken in the region comprising of English, Spanish and French and a couple of other indigenous languages. Its economy is agriculture oriented and thrives on petroleum, coffee, cocoa, spices, bananas, sugar, fishing tourism and natural gas. There is inexpensive quality labor available throughout. One of the biggest problems associated with this land is its vulnerability to natural disasters. These include threats like that of Tsunami, Hurricanes, Tornadoes, floods, fires, volcanic eruptions, earthquakes, HIV/AIDS, Petroleum spill, the High risk for avian flu and terrorism within and outside the country. There is a major lack of proper infrastructure in the region because KAVA is a region that has been affected by natural disaster.

American History Assignment Example | Topics and Well Written Essays - 250 words - 13

American History - Assignment Example In fact, tribes such as Shoshones and Nez Perces had agreed to the pact and as a reward, they would receive guns and supplies for it. For Blackfeet Indians, giving guns to their enemies is a direct threat to their might. Soon enough, the discussion soon turned into a blooding fight with 2 Blackfeet warriors killed in the encounter. Since then, Western Indians became hostile towards representatives of the American government. The diary presents the richness and abundance of South Dakota when it comes to natural environment and animal life. In the diary, the Corps of Discovery members informed how they hunt animals such as elk, buffalo, deer, fox, birds, antelope and many more. The group also documented how they were able to encounter places and hills where Indians lived. Clark specifically pointed out that the reason why Indians believe that spirits dwell on the place was because various birds assemble on top of the hill. In the site, it was interesting to learn about Nez Perce Indians who were excellent horsemen. Like their Shoshone neighbors, the Nez Perce were without guns or ammunition. Clark and his troupes described them as â€Å"cheerful and sincere†. Another tribe which caught my interest is the Wala Wala in Washington whose chief welcomed the tribe warmly. Chief Yelleppit enjoyed the prestige of hosting his foreign visitors and sought to trade with them. Before their departure, the chief gave the troupe horses, food, and canoes. There were also celebration and dances before they left the

Tuesday, October 15, 2019

Using Structure,Outcome, and Process in Evaluating Quality Medical Care Essay Example for Free

Using Structure,Outcome, and Process in Evaluating Quality Medical Care Essay Abstract   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Structure, process, and outcome are the common indicators used in evaluating the quality of medical care.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   This paper will delve on the meaning of structure, process, and outcome indicators as they relate to the assessment of quality medical care. Using Structure,Outcome, and Process in Evaluating Quality Medical Care   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Healthcare personnel and medical facilities are constantly demanded to provide a report about the outcome of their admission of treatment. Governments get in touch with hospitals to provide an accounting of their results so that they could come up with new health care structure, as well as to serve as a back-up for the establishment of new regulations in medical systems. Insurance companies show greater interest in the outcome of medical treatments in order that they can deliver cost-effective care and benchmarking (Van der Ent, 6-7). Providing quality assessment of medical care is important because financial departments of health care providers usually it helps them come up with an affordable price in terms of medical care. Newspapers and magazines usually compare the performance of hospitals as far as the safety and satisfaction of their patients are concerned. For patients, they have the right to be informed about which facility or doctor provides quality medical care (Van der Ent, 6-7). At present, there are various systems in place used in assessing the quality of medical care. In the United Kingdom, for example, the salary of general practitioners are based on how they performed in the Quality and Outcomes Framework 1. In order to be successful, the hospital or medical facility should establish a set of indicators (Van der Ent, 6-7). Structure, Process, and Outcome As Indicators Of Quality Medical Care   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The structure of the medical care serves as the background in the delivery of medical care to the patient. In administering cystic fibrosis, does the delivery of quality medical care involve other practitioners such as a pulmonist, physiotherapist, dietician, and social worker? (Van der Ent, 6-7)   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Process indicators, on the other hand, has something to do with how medical care is organized. This means that every procedure requires protocols and guidelines. For example, what is the usual protocol in measuring lung function? How are patients infected by staphylococcus aureus segregated from other patients? (Van der Ent, 6-7)   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Outcome indicators, meanwhile, is concerned with the result of medical care. It has something to do with statistics such as mortality rate, percentage of complications, number of patients who recover, and so on. The outcome of medical care usually helps in the determining whether care is insufficient as well as in pointing out the reason for the failure of medical care. In most healthcare systems, the basic requirement are the structure and process indicator instead of the outcome(Van der Ent, 6-7). The Advantage of Using Outcome In Assessing Quality Medical Care   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The outcome of medical care is most often used as the indicator of quality health care. Its reliability as a determinant of quality care cannot be doubted. Aside from that, it more or less provides an accurate assessment of medical care (Donabien, 691-729).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   However, there are some factors that limits the use of outcomes as an indicator of quality medical care. One of these factors is whether or not the outcome is indeed the relevant indicator. There are instances when outcomes becomes irrelevant especially in cases when the survival of the patient will not be critical but will cause them to be paralyzed or bring about serious complications (Donabien, 691-729). References C.K. van der Ent(2008). Quality Assessment: Is The Truth in the Outcome? European Respiratory Journal, 31, 6-7 Donabien, A(2005). Evaluating The Quality of Medical Care. The Milbank Quarterly, 83, 691 729

Monday, October 14, 2019

Espionage and Intrusion Technology in Russia

Espionage and Intrusion Technology in Russia Neil McGeever Spying and intrusion had been happening years before technology became involved. The increase in technology and the dependency on the internet has made espionage and intrusion simpler and more widespread. Various technology has been developed that allows different ways of collecting unlawful information and spying on enemies. Valuable data is being gathered and stored online, and will continue to increase with an emphasis on technology for performing tasks and operations over the internet. This data can be intercepted to provide priceless information. Spying on the public and hacking sensitive information is certainly breaching the law and new laws are being introduced to protect the government and organisations for partaking in these activities. The public have the right to civil and privacy protection from these actions and should be obeyed, however there are certain cases when this should be permitted, such as against terrorist groups and organisations. This paper will discuss the different technologies being used to collect private information and data. It will also explain the laws that it affects that exist to protect the public and the new laws being introduced to protect the government. Espionage, Intrusion, Technology, Legal, Russia. Russia, and previously the Soviet Union, has long been recognised as a country involved in spying and intrusion on rival countries and organisations since the early 1900s. The Soviet Union employed spies in the Cold War to collect information and secrets about the United States of America and were previously used in World War One. This continues today but very different, as specialised technology has been developed to hack and interfere with information, data and communications associated with their enemies. Different technology enables different ways of gathering and collecting this information and data. This revolutionary technology allows for quick and effective hacking and intrusion, which is nearly impossible to stop when it is happening and difficult to detect who is responsible. It can be performed hundreds and thousands of miles from the intended target so the offender, or offenders, cannot be caught nearby or close to the crime. Most of the technology used for these activities worldwide was developed in Russia, enabling the Russian government and organisations to easily obtain this technology without having to travel overseas. The Russian privacy law, the Personal Data Protection Act, is intended to protect the civil and privacy rights of the Russian people. This should be adhered to by the Russian government, but unfortunately it is not. Russia is a country that enjoys to spy on its own people and it has a mass surveillance system in operation to monitor its citizens every move and communications (Russias Spying Craze, 2013). The people of Russia are not happy with this as they should be given a right of privacy in their lives without having all their movements and phone calls monitored and recorded. This document will describe cyber-attacks performed by Russia on other nations, and their severity. Technology created and developed by Russian companies that are used by the Russian government and organisations to interfere and hack confidential and private information or data on other countries and its own people, will also be explained. The law to protect the privacy of Russian citizens will also be discussed and how it is side-stepped by the Russian government for their own convenience. Russia is regarded as one of the most active and prevalent nations involved in espionage and intrusion. Cyber-espionage is employed by Russia to hack and obtain secret information from top departmental government agencies and buildings for their own intelligence. They are supposedly responsible for hacking and leaking emails from the Democratic National Committee (DNC) to WikiLeaks in 2016 and to have violated the network at the White House and the State Department activity (Penn-Hall, 2016). The gains and ease of these cyber-attacks on other nations, and because it is difficult to identify who is involved or responsible for the attacks, allows them to continue with this. James Adams, the CEO and Co-Founder of Infrastructure Defense Inc. (iDefense), regards the Internet as a revolutionary system and declared that Cyberspace has become a new international battlefield (Constantine, 2012). The internet has no governing body or police force, which is perfect for executing such attacks and not be detected. Each country must stand on their own or with their allies, to strengthen their cyber security and defences, and continuously fear that another nation may make a significant breakthrough that poses additional threats to them (Interviews, 2001). This makes each country cautious of new and severe attacks that they may not be able to defend or protect from. Russia has been accused of organising cyber-attacks on many nations. Between 1998 and 2000, a succession of incidents and attacks on the US became known as the Moonlight Maze. This was an attack on hundreds of government databases such as the Pentagon, NASA and other agencies by a group of hackers that used specialised computer equipment (Constantine, 2012). The attacks were apparently traced to a mainframe located in Russia, however, they denied this and the perpetrators are supposedly still unknown. Russia has also been accused of a 3-week long cyber-attack on Estonia in 2008. These attacks started when Russia and Estonia were in dispute over Estonias plans to remove a Soviet Union war memorial in the countrys capital Tallinn. This encouraged Russia to target some of Estonias biggest organisations and corporations such as the president, government ministers, political parties, news organisations and the banks. Russia again denied involvement with Kremlin spokesman Dmitry Peskov sta ting that no way could the state be involved in terrorism (Thomas, 2009). Russia are not afraid to attack neighbouring countries, especially when they are much too powerful for lesser nations. More recently in March 2017, two Russian spies were charged with breaching Yahoo in 2014. This was performed with two other computer hackers and it affected over half a billion user accounts. It is regarded as one of the largest data breaches to occur in the United States of America. The Department of Justice have previously charged Russian hackers related to cyber-crime, however this is the first time that a criminal case has been brought against Russian government officials (US charges two Russian spies, 2017). Despite these charges, this will not deter Russian government officials and organisations to ending these activities. Many of the most common and most-used spy and intelligence technology employed today was developed in Russia. This technology was created from ideas the Soviet Union had to learn and uncover information and intelligence from other countries and from their own people. The Soviet Union wanted many ways of gathering knowledge and information in secrecy, so having various technologies to perform this, allowed to plan for every situation and scenario. One technology would be more useful than another in certain circumstances which prevented the attackers from being discovered and exposed. These technologies have only been developed from the late 1980s and upwards after the advancements in computers and other technology such as satellites and wired communication. The following will describe the technology used for collecting this information and data. Voice recognition technology was developed by the Speech Technology Centre (STC) in the city of Saint Petersburg. STCs beginnings started from a secret Soviet Union unit that had the backing of the Committee for State Security (KGB) and was developed during the Gulag system under Stalins rule. The roots of the company grew from a neighbouring prison that housed scientists and engineers, which was called the Sharashka Marfino. These scientists and engineers were forced to work to identify voices that were calling to foreign embassies in Moscow. Speech Technology Centre has also started to develop face recognition technologies along with voice recognition. STC announced in December 2012 that it installed the worlds first biometric identification platform, at a nation-wide level, that combines voice and face identification capabilities. This new system will allow authorities and governments to store images of suspects and criminals on a large database. STC has also claimed that it has invented algorithms that deliver reliable results even when facial characteristics have undergone physical changes, and the systems voice and face modalities can be used together or separately a voice sample or facial image alone is sufficient to make an identification. STC has publicly made it known that its surveillance technology is only used for utilitarianism uses, however they have been made available to strict and dictatorship government states such as Uzbekistan and Belarus. Most people will be unhappy with these developments as they fe ar that they will no longer have the right to privacy as their voice may be recorded without consent and that face recognition technology may mistakenly identify them for doing wrong. Another Russian firm have developed a facial recognition app. This involves submitting photos into the app and the app then searches through Vkontakte, the Russian social network version of Facebook, to find a match for the photo. The app is believed to have a 70% accuracy rate (Russian facial recognition, 2016). While some have no issues with the release of the app, others have concerns about privacy and the potential disclosure of personal information. The company do not have their own privacy policy but they have produced an acceptable use policy and licensing agreement to use on their American customers. The acceptable use policy states that the app can only be used for lawful purposes and the licensing agreement expects the licensee to establish their own privacy expectations (Chiel, 2016). Intercepting and interfering with private communications by the law has different procedures and standards in Russia compared to other countries. MFI-Soft is a Russian company that develops information security and telecommunications products for law enforcement agencies, voice over internet protocol (VoIP) carriers and internet service providers. The company has developed an interception technology capable of storing, detecting and analysing information that travels over the internet. The company also states that it develops products for national security and intelligence agencies and for the military. It is the largest Russian producer of telecommunications traffic interceptors and has developed a deep packet inspection filtering tool called Perimeter-F. Russia has recently implemented a new law that states that companies must store data associated with Russian citizens on Russian soil. This law is an attempt by Russia to gain control of the internet and to eliminate all the data stored on Russian people from other countries. The authorities want superior access to online data by domestic security services and to reduce the access to the data by other countries. Multi-national companies such as Facebook and Google are not happy with this law as they would have to move massive data to servers within Russia borders and to inform Roskomnadzor, the Russian internet watchdog, about their location (Walker, 2015). This is a massive operation for multi-national companies to accomplish as Russia is a huge country with a population of well over 100 million people. Russia has recently blocked LinkedIn because they didnt comply with the new laws and didnt store information about Russian people on servers inside Russia. Roskomnadzor had discovered that LinkedIn had broken their laws on storing data and acted accordingly. President Putins spokesman Peskov again said that the blockage is in strict accordance with the law and that the Kremlin will not intervene or interfere with the banning of LinkedIn (Matthew, 2016). Companies that do not adhere to Russian laws regarding data storage will be punished. The traditional way of listening in on private incoming phone calls is done by monitoring the telecom operator. Due to the massive and continuous increase in mobile phone usage over the years, it is much simpler and effective to intercept phone calls there and then on the spot. Discovery Telecom Technologies (DTT) was established in Moscow and have developed a system that makes this possible. The companys In-Between Interception System operates by imitating a mobile phone tower and draws in the signals that allows the devices operator to secretly listen and record the phone call. It claims to have the Kremlin and the Federal Security Service of the Russian Federation (FSB) as some of its clients. Some Russian people are evidently not happy with this surveillance. The Russian government were brought before the European Court of Human Rights because of their surveillance and interception of mobile phone communications in accordance with Article 8 of the European Convention on Human Rights (See Appendix A). Roman Zakharov, complained that Russian law did not sufficiently protect against uncertainty and abuse from authorities and that it breached his right to privacy (European Court, 2016). Although this system was aimed at protecting the public and preventing crime, it did not guarantee protecting against abuse. The Court suggested that there was high risk with a system that had direct access to all mobile phone communications. The Court also believed that Russian law did not meet the quality of law requirement and that it was not necessary in a democratic society (Soldatov Borogan, 2013). The Russian government has introduced new laws and amended the Constitution in recent years because of espionage and intrusion, to lessen and prevent these problems in the future. Article 15, paragragh 4 of the Constitution of the Russian Federation outlines that universally-recognized norms of international law, and international treaties and agreements of the Russian Federation shall be a component part of its legal system (Data Protection, 2016). This includes the ratification of the Strasbourg Convention for the Protection of Individuals regarding the Automatic Processing of Personal Data (ETS No. 108) by Russia in 2005. The right to privacy, which includes the privacy of telephone and other communications is recognised in Article 23 of the Constitution, and the collection, use and storage of information about a person without their consent is prohibited in Article 24. The laws and requirements of data protection and privacy are outlined in the Federal Law No. 149-FZ on Information, Information Technologies and Data Protection and the Federal Law No. 152-FZ on Personal Data actions (Data Protection, 2016). These laws and articles of the Constitution are implemented to protect the public from the illegal collection of data and intrusion on their life. Individuals have the right to privacy and to only agree to this by giving consent for those. The Russian government are happy to collect information and spy on the public and this was evident in 1995. The Law on Operative Search and Seizures was legalised that allowed the FSB to operate a legal interception system called SORM, which enabled authorities to receive information from internet providers and phone operators. This technology allowed the Russian Security Service to monitor emails, phone calls and internet searches. Without consent and with improper use, the Russian people could fight for their right to privacy if they feel they are being violated against. Other laws have been established and signed to protect against international intrusion and surveillance. The President of the Russian Federation, Vladimir Putin, signed the new Federal Law No. 374 on July 6, 2016, on Amending the Federal Law on Counter Terrorism and Select Legislative Acts of the Russian Federation Concerning the Creation of Additional Measures Aimed at Countering Terrorism and Protecting Public Safety. This recently adopted law contains several conditions that specifically outline the rights of intelligence and secret services when observing private electronic communications and allows law enforcement agencies to collect individual computer information. The law describes the requirements about the identification of users and the safeguarding of metadata that is transmitted across networks by operators of telecommunication networks. This law works in parallel with the Federal Law on Information and Information Technology, which is an obligation of network operators, to keep metadata about all connections, transmissions, and receipts of voice information, written texts, images, sounds, video, and other messages transferred through communications networks for three years. Transmitted messages, telephone communication records and other communication information must be saved by network operators for up to six months. The law also enforces providers of information to report all information required for the description of received, transferred, or delivered electronic communications to the Federal Security Service. Failing to provide this information results in a fine (New Electronic Surveillance, 2017). The Russian government are introducing these laws to protect themselves and other agencies from repercussions and from legal action being taken. However, people can bring their case to the European Court if they feel they have been severely and wrongly victimised. In 2012, Russian President Putin signed another bill into law regarding crimes by espionage and state treason. The Russian Federal Security Service (FSS) proposed the bill to highlight that espionage and revealing state secrets are a form of state treason. The FSS also wanted the new law to emphasise the need to prosecute people or organisations that are involved in helping international organisations engaged in antagonistic activities such as state treason. This new legislation covers the assistance given to an international organisation by a Russian national targeting the security of Russia, in addition to support given to a foreign country or organisation showing aggressive movements against Russia. The support given to foreign countries or organisations that define state treason is explained in Article 2, paragraph 4 of the Law as financial, material, technical, advisory or any other support given to a foreign country or to international or foreign organizations engaged in activities against the security of the Russian Federation (Federal Law No. 190-FZ). Another area of Federal Law No. 190-FZ has been amended to state that any person that gains knowledge of state secrets and discloses such information to a foreign or Russian organisation will be liable for such act, whereas before, it was only persons who had been entrusted with the information that would be liable and prosecuted. This law has also established a new crime for anyone convicted of breaking this law, which may provide a prison term of up to four years or a fine. This new law covers illegal access to state secrets due to theft, violence and other methods. This punishment for this crime may be a prison term of betw een three to eight years if the person or people are convicted of using more specialised techniques of espionage (Espionage and State Treason, 2017). Russia will continue to spy on other nations and hack confidential information as they will constantly be paranoid and in fear that other countries and organisations are planning terrorism or other attacks against the state. They are also aware that enemy countries are engaged in spying and intrusion as most of the super power nations of the East and West are involved in this activity. Russia recognises that information is a valued asset, which needs to be protected, whether at peace or at war. When using this information and data correctly, the enemy can be beaten militarily and politically, and without having to occupy the country. New laws will be introduced in the future and the Constitution will be amended as ambiguities will be exposed in Russian laws as an unhappy Russian society will continue to pursue their protection for civil and privacy rights. Also, large corporations, who can seek powerful legal advice will not be intimidated or afraid to stand against the Russian administration. In recent years, the ban on overseas companies and organisations from storing data about Russian people outside of Russia was introduced, however multi-national companies were causing no harm and only storing the data on databases for their own use. Russia just does not want this data in the hands of other groups and organisations out of fear of the knowledge gained from others from this data. Data is the new oil was phrased by Clive Humby in 2006, a UK Mathematician and architect of Tescos Clubcard scheme (Data is the new oil, 2013), to highlight the massive use of technology and storage of data. Data and information collected legally and illegally is a powerful resource for government bodies and organisations. The increase in the use of technology and the internet has led to a growth in data stored online. For example, data uncovered may have been used to plan and prepare for organised attacks against the state, or for criminal gangs and groups to plan their own attacks. Technology used to collect this data will divide opinions, and if the technology is used unlawfully such as secretly collecting data about Russian people, it will cause discontent among the Russian public. This technology will clearly be a benefit for uncovering and capturing criminals but should not be used widespread to collect information on everybody. The Russian government needs to be careful about crossing this dividing line. References ComputerWeekly. 2017. Russian personal data law set to come into force despite fears. [ONLINE] Available at: http://www.computerweekly.com/feature/Russian-personal-data-law-set-to-come-into-force-despite-fears. [Accessed 19 February 2017]. Early Cold War Spies: The Espionage Trials That Shaped American Politics Central Intelligence Agency. 2017. Early Cold War Spies: The Espionage Trials That Shaped American Politics Central Intelligence Agency. [ONLINE] Available at: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol51no2/intelligence-in-recent-public-literature.html. [Accessed 19 February 2017]. The Guardian. 2017. Spies, sleepers and hitmen: how the Soviet Unions KGB never went away | World news | The Guardian. [ONLINE] Available at: https://www.theguardian.com/world/2014/nov/19/spies-spooks-hitmen-kgb-never-went-away-russia-putin. [Accessed 19 February 2017]. International Business Times UK. 2017. Russia gets new Putin-approved cybersecurity doctrine following cyberespionage attack fears. [ONLINE] Available at: http://www.ibtimes.co.uk/russia-gets-new-putin-approved-information-security-doctrine-following-cyberespionage-attack-fears-1595050. [Accessed 19 February 2017]. Roland Heickerà ¶. 2010. Emerging Cyber Threats and Russian Views on Information Warfare and Information Operations . [ONLINE] Available at: http://www.highseclabs.com/data/foir2970.pdf. [Accessed 19 February 2017]. Chapter 1. The Fundamentals of the Constitutional System | The Constitution of the Russian Federation. 2017. Chapter 1. The Fundamentals of the Constitutional System | The Constitution of the Russian Federation. [ONLINE] Available at: http://www.constitution.ru/en/10003000-02.htm. [Accessed 19 February 2017]. Dentons Russias new anti-terrorist law . 2017. Dentons Russias new anti-terrorist law . [ONLINE] Available at: http://www.dentons.com/en/insights/alerts/2016/july/19/russias-new-anti-terrorist-law. [Accessed 19 February 2017]. Practical Law . 2017. Practical Law . [ONLINE] Available at: http://uk.practicallaw.com/2-502-2227#a594893. [Accessed 19 February 2017]. History Learning Site. 2017. Spies of the Cold War Era History Learning Site. [ONLINE] Available at: http://www.historylearningsite.co.uk/modern-world-history-1918-to-1980/the-cold-war/spies-of-the-cold-war-era/. [Accessed 19 February 2017]. Fox News. 2017. Russian facial recognition app sparks interest, controversy | Fox News. [ONLINE] Available at: http://www.foxnews.com/tech/2016/12/14/russian-facial-recognition-app-sparks-interest-controversy.html. [Accessed 19 February 2017]. Fusion.net. 2017. Hyper-accurate face recognition tech goes global | Fusion. [ONLINE] Available at: http://fusion.net/story/358817/findface-ntechlab-face-recognition-privacy/. [Accessed 19 February 2017]. Mail Online. 2017. Moscow blocks LinkedIn because it does not store data on citizens on Russian servers | Daily Mail Online. [ONLINE] Available at: http://www.dailymail.co.uk/news/article-3946982/Moscow-blocks-LinkedIn-latest-clampdown-Internet-freedoms-does-not-store-data-country-s-citizens-Russian-based-servers.html. [Accessed 19 February 2017]. International Justice Resource Center. 2017. European Court: Russian Interception of Mobile Phone Communications Violates Convention | International Justice Resource Center. [ONLINE] Available at: http://www.ijrcenter.org/2016/01/14/european-court-russian-interception-of-mobile-phone-communications-violates-convention/. [Accessed 19 February 2017]. WIRED: WIRED. 2017. 5 Russian-Made Surveillance Technologies Used in the West | WIRED. [ONLINE] Available at: https://www.wired.com/2013/05/russian-surveillance-technologies/. [Accessed 19 February 2017]. The Cipher Brief. 2017. Russia, China, and Cyber Espionage | The Cipher Brief. [ONLINE] Available at: https://www.thecipherbrief.com/article/tech/russia-china-and-cyber-espionage-1092. [Accessed 19 February 2017]. Interviews James Adams | Hackers | FRONTLINE | PBS. 2017. Interviews James Adams | Hackers | FRONTLINE | PBS. [ONLINE] Available at: http://www.pbs.org/wgbh/pages/frontline/shows/hackers/interviews/adams.html. [Accessed 19 February 2017]. Russia Data Protection 2016 ICLG International Comparative Legal Guides. 2017. Russia Data Protection 2016  · ICLG International Comparative Legal Guides. [ONLINE] Available at: https://www.iclg.co.uk/practice-areas/data-protection/data-protection-2016/russia#chaptercontent1. [Accessed 19 February 2017]. Russia: New Electronic Surveillance Rules | Global Legal Monitor. 2017. Russia: New Electronic Surveillance Rules | Global Legal Monitor. [ONLINE] Available at: http://www.loc.gov/law/foreign-news/article/russia-new-electronic-surveillance-rules/. [Accessed 19 February 2017]. Russia: Espionage and State Treason Concepts Revised | Global Legal Monitor. 2017. Russia: Espionage and State Treason Concepts Revised | Global Legal Monitor. [ONLINE] Available at: http://www.loc.gov/law/foreign-news/article/russia-espionage-and-state-treason-concepts-revised/. [Accessed 19 February 2017]. Inquiries Journal. 2017. Cyber Terrorism and IR Theory: Realism, Liberalism, and Constructivism in the New Security Threat Inquiries Journal. [ONLINE] Available at: https://www.inquiriesjournal.com/articles/627/cyber-terrorism-and-ir-theory-realism-liberalism-and-constructivism-in-the-new-security-threat. [Accessed 19 February 2017]. Timothy L. Thomas. 2008. Nation -State Cyber Strategies: Examples from China and Russia. [ONLINE] Available at: http://ctnsp.dodlive.mil/files/2014/03/Cyberpower-I-Chap-20.pdf. [Accessed 19 February 2017]. The Guardian. 2017. Russian data law fuels web surveillance fears | World news | The Guardian. [ONLINE] Available at: https://www.theguardian.com/world/2015/sep/01/russia-internet-privacy-laws-control-web. [Accessed 19 February 2017]. Russias Spying Craze. 2017. Russias Spying Craze. [ONLINE] Available at: https://themoscowtimes.com/articles/russias-spying-craze-29105. [Accessed 24 February 2017]. Data is the new oil: Tech giants may be huge, but nothing matches big data. 2017. Data is the new oi