Wednesday, November 27, 2019

Sildenafil Essays

Sildenafil Essays Sildenafil Essay Sildenafil Essay Introduction: Sildenafil, a drug which is used for intervention of erectile disfunction ( powerlessness ) in work forces, was discovered back in 1986. It s find can be called as an illustration of serendipity. A cardiovascular research programme was carried by the Pfizer to obtain a fresh drug for the pneumonic high blood pressure or angina. This hunt had resulted in find of Viagra, the first unwritten intervention for the erectile disfunction. It is a phosphodiestrase ( PDE ) inhibitor type 5, which increases blood flow to spongy tissues of phallus and maintains hard-on which is necessary for sexual intercourse. This find had brought solution to impotence which was suffered by 1000000s of work forces. It was patented in 1996 and was approved by the USFDA at March 27, 1998. Sildenafil was released in the market by the trade name name VIAGRA for erectile disfunction and besides available every bit REVATIO as intervention of pneumonic high blood pressure ( Hossein A.Ghofrani et Al. 2006 ) . Sildenaf il is the first unwritten intervention which is available in the market as unwritten intervention for erectile disfunction in work forces ( Jim Kling 1998 ) . Background: Sildenafil is used to handle erectile disfunction. Erectile disfunction is a disease in which hard-on of phallus is non attained or maintained which is required for sexual intercourse. Erectile disfunction can be caused by diseases such as diabetes, high blood pressure or psychological upsets such as emphasis, anxiousness etc. It is a common disease between work forces aged between 40 and 70 old ages. Before the find of Sildenafil, interventions such as vacuity therapy by penial pump or penial prosthetic device surgery are used to handle erectile disfunction. Vacuum pumps were available on physician s prescription but penial prosthetic device surgery was done as a last resort. It involves interpolation of unreal rods in phallus which was non much favourable ( Anon 2008a ; Chris Steidle 2009 ) Discovery: Sildenafil was discovered by a group of pharmaceutical scientists of Pfizer Company situated at sandwich, Kent. In 1984, a cardiovascular research programme was carried out by these scientists to happen a new drug which has important consequence in instance of angina or high blood pressure. Nitrates are the diffusible gases which starts transition of guanosine triphosphate ( GTP ) to cyclic guanosine monophosphate ( cGMP ) which is responsible for a cascade or reactions doing vascular musculus relaxation. Therefore, nitrate show anti-anginal consequence which is required but it s action is limited by drawn-out exposure to nitrates ( Parker and Parker 1998 ) . PDE enzymes move on cGMP and do it s debasement by change overing it once more to guanosine mono- or triphosphate. So, a biological hypothesis was put frontward by the scientists that to barricade the PDE enzyme and potentiate the action of azotic oxide ( NO ) . At that clip, 5 types of PDE enzymes were identified from which PDE 5 type of enzyme was moving merely on cGMP and non on any other cyclic nucleotide. This PDE5 enzyme is present in squashy tissues of phallus known as principal cavernosum. There were no compounds available at that clip demoing powerful PDE5 inhibitory activity. A hunt of certification of assorted compounds demoing vasodilative effects lead to a compound, Zaprinast which shows weak and non-selective inhibitor of PDE5 enzyme. It showed it s vasodilatory activity in anaesthetized Canis familiaris. Subsequently on, it was developed as an anti-allergy agent. But, zaprinast act as a lead compound for Sildenafil and farther alterations were carried out on construction of zaprinast to suppress PDE5 enzyme ( Simon F.Campbell 2000 ) . Zaprinast ( 1 ) and guanine ring parallels portions a structural similarity in their basic construction. The triazolopyrimidinone construction of zaprinast and the guanine ring of GTP have similar dipole minute in magnitude and way ( 9.5 and 7.4 severally ) . From the construction of zaprinast and cGMP, it was suggested that this heterocyclic rings are recognized by the active site of PDE enzyme. So, alterations were transporting out on triazolopyrimidinone ring to obtain a powerful drug with high enyme affinity. Furthermore, computational surveies showed that cGMP attains a syn conformation and zaprinast allows isosteric replacings which favours adhering with phosphate mediety. Last, it was supported by X-ray construction that heterocyclic ring is indispensable for the inhibitory activity so it was remained unchanged ( J.A.Beavo 1995 ) . After transporting out alterations on the parent ring, a pyrazolopyrimidinone construction ( UK-122764, 2 ) was found to hold 10 fold addition in authority against PDE5 and decreased affinity towards other PDE enzymes. But, still alterations were required to be done as to replace cyclic phosphate ring of original substrate in the spacial part. Therefore 3- methyl permutation was carried out on the parent ring and a tetrahedreal group of sulphonamide was attached to the ring to replace the cyclic phosphate ring ( Hossein A.Ghofrani, Ian H.Osterloh, A ; Friedrich Grimminger 2006 ) . A important discovery came in 1989, when a compound was synthesized named UK-92480 ( Sildenafil, 3 ) which was holding 100 fold addition in PDE5 enzyme selectivity and really less selectivity against the remainder of the enzymes of PDE household. The piperazinosulphonamide mediety imparts lipophilicity to the construction of Sildenafil and and makes it more soluble. Besides, it potentiates the action of azotic oxide efficaciously and increase cGMP degrees intracellularly with lesser side effects. It resembles the construction of cGMP which shows competitory suppression of PDE5 enzyme and it was confirmed as it gave a dosage related addition of 2-4 crease of cGMP in eyetooth coronary arterias ( Robert B.Moreland et al. 1998 ) . Sildenafil cGMP Clinical Development: In 1991, Healthy voluntaries were given a individual dosage of 200mg of Sildenafil as a portion of phase-1 clinical tests. These doses were good tolerated among the voluntaries but when dose exceed from 150mg, it shows perturbations in colour vision. When Sildenafil was given intravenously with glycerin trinitrate, it increases the vasodilatory consequence of nitrates among the topics. So, Sildenafil should be contraindicated or a safe manner demands to be developed to administrate both drugs at the same time. In 1992, surveies were carried out on healthy voluntaries who were given 75mg of Sildenafil three times a twenty-four hours for 10 yearss. Healthy voluntaries reported flushing, concerns, dyspepsia and some of them besides reported penial hard-ons as side effects. But this was non taken earnestly at that clip and farther tests were carried out as a cardiovascular survey boulder clay 1993 ( Hossein A.Ghofrani, Ian H.Osterloh, A ; Friedrich Grimminger 2006 ) . But, consequences show that Sildenafil was non a promising drug for the intervention of high blood pressure. So in late 1993, new clinical tests were carried out in healthy persons enduring from erectile disfunction were carried out. A Rigiscan device holding two cringles was fitted, one cringle at the base and another at the tip of phallus to find the girth and hardness during the sexual intercourse. After transporting out two different clinical surveies for about one twelvemonth, consequences showed that individual dosage of Sildenafil showed hard-on with a additive dose-response relationship ( M Bollel et Al. 1996 ) . Further, clinical tests were carried out in more than 3000 patients enduring from erectile disfunction of assorted type, with a average continuance of five old ages and they were given 25mg, 50mg or 100mg of Sildenafil as dose. These patients were aged between 18-87 old ages and 21 tests were carried out in randomised, placebo controlled, dual blind for 6 months with different survey designs such as analogues, cross over, fixed dosage and titration ( Pfizer Labs 2007 ) . Effectiveness of Sildenafil was assessed with instruments such as Rigiscan but chiefly it was assessed on the footing of International Index of Erectile Function ( IIEF ) which consist of 15 inquiries chiefly which serves two chief terminal points ( Rosen R.C. et Al. 1997 ) . They are: O Ability to accomplish hard-on required for sexual inter class O Maintainance of hard-on after incursion The replies were recorded as categorical responses after 4 hebdomads period of clip. They are: O ( 0 ) No attempted intercourse O ( 1 ) Never or about neer O ( 2 ) A few times O ( 3 ) Some times O ( 4 ) Most times O ( 5 ) Almost or ever Besides, a journal was kept by the patients and their sexual information was recorded by themselves daily and an optional questionnaire was besides administered for their spouses. Consequences of patients demoing betterment of hard-ons assessed by questionnaire in any of the four different survey designs for 12 to 24 hebdomads of clip is shown below which was obtained on the 1797 patients that were characterized by average tonss of 2 ( few times ) on IIEF inquiry ( Pfizer Labs 2007 ) . Treatment group Besides, clinical surveies were carried out in patients enduring from erectile disfunction caused by conditions such as diabetes or spinal cord hurt. In all instances, Viagra showed it s consequence and improved hard-on. On all tests, sildenafil improved conditions of erectile disfunction in 43 % of patients against 15 % of placebo ( Pfizer Labs 2007 ) . Target designation and Validation: During the clinical development of Viagra, 6 more households of PDE inhibitors were identified. So, there are entire 11 types of PDE enzymes from which Viagra showed high selectivity towards PDE5 than any other else except PDE6. It showed merely 10 fold selectivity towards PDE6. Visual defects associated with Viagras were explained by weak suppression of PDE6 enzyme which was situated in exposure receptors. It shows high selectivity towards PDE5 against PDE7-11 enzymes ( Hossein A.Ghofrani, Ian H.Osterloh, A ; Friedrich Grimminger 2006 ) . working model.bmpSildenafil portions a similar construction with cGMP. The 3 substituent of heterocyclic ring make full the infinite in the enzyme filled by ribose and the 5 terminal of sildenafil mimic the function of cyclic phosphate in substrate binding. Sildenafil blocks the PDE5 catalytic site which is acquired by cGMP. So cGMP binds to the allosteric site of the enzyme and cause enzyme suppression. This will ensue in addition degrees of cGMP as it is non catalyzed by the enzyme and will do vasodilation which will ensue in increased blood flow to the tissue. 5 illustrates the mechanism of action of Viagra. As Viagra has similar construction with cGMP and has high affinity towards PDE5 enzyme, inquiry arises that sildenafil interacts with the cGMP for adhering at allosteric site. A site directed mutagenesis survey was carried out to measure the amino acids involved in contact action of substrate. The chief aim is to understand the suppression of the enzyme at the molecular degr ee and measuring the repressive effects of drugs on the catalytic site. Analysis of binding of Viagra to allosteric site was carried out and consequences showed that there is no interaction between Viagra and cGMP for adhering at allosteric site ( Illarion V.Turko, Stephen A.Ballard, Sharron H.Francis, A ; Jackie D.Corbin 1999 ) . The first PDE5 enzyme was identified in research lab. It was recognized when a hunt was carried out for cyclic nucleotide-binding proteins other than cyclic nucleotide dependent protein kinases as a cGMP adhering protein in lung tissue. 6 shows working theoretical account of PDE5 enzyme in which there is phosphorylation site at the aminic terminal parts. There are two allosteric adhering sites for cGMP near it. At catalytic sites consists of two Zn ­+2 adhering motifs A and B near the carboxy terminal part. The phosphorylation site is at serine residue at 92 place. The binding motives are aspartic acid at places 714 and 754. They facilitate the contact action by moving as a catalytic base or as a co-ordinated ligand for required metal ( Jackie D.Corbin and Sharron H.Francis 1999 ) . Lead Regeneration: Reaction strategy for Viagra was foremost reported in 1996 in Bioorganic A ; Medicinal chemical science Letters. Below is the reaction strategy ( 7 ) which was explained in the diary. It is a additive reaction which involves reaction of diketo ester ( 1 ) to hydrazine. It will ensue in cyclization of the merchandise giving pyrazole ring ( 2 ) . This pealing upon hydrolysis with a base, gives a carboxylic acid derived function on which regioselcetive N-methylation has occurred ( 3 ) . This compound on nitration with azotic acid in presence of sulfuric acid, and on decrease with Se chloride and ammonium hydrated oxide, nitro group gets reduced to amino groups ( 4 ) . Now this compound, upon acylation under basic conditions, undergoes pealing closing and forms a pyrazolopyrimidinone derived function ( 6 ) .This upon chlorosulphonylation at 5 place of phenyl ring, consequence in Viagra ( David J.Dale et Al. 1999 ; Nicholas K.Terrett et Al. 1996 ) . Different paths are available for synthesis of Viagra but there are minor alterations in the stairss. Sildenafil is commercially produced by another path which was published subsequently on.

Saturday, November 23, 2019

The Ins and Outs of Fetal Homicide Laws

The Ins and Outs of Fetal Homicide Laws In 1969, Teresa Keeler, eight months pregnant, was beaten unconscious by her jealous ex-husband, Robert Keeler, who told her during the attack that he was going to stomp it out of her. Later, at the hospital, Keeler delivered her little girl, who was stillborn and suffered a fractured skull. Prosecutors attempted to charge Robert Keeler with the beating of his wife and for the murder of the fetus, Baby Girl Vogt, named with her fathers last name. The California Supreme Court dismissed the charges, saying that only someone born alive could be killed and that the fetus was not legally a human being. Due to public pressure, the murder statute was eventually amended to say that murder charges can only apply to fetuses older than seven weeks or beyond the embryonic stage. Laci Peterson This law was then used to prosecute Scott Peterson with two counts of murder for Laci Peterson, his wife, and their seven-month unborn son, Conner. If both the woman and the child were killed and we can prove the child was killed due to the actions of the perpetrator, then we charge both, said Stanislaus County Assistant District Attorney Carol Shipley as quoted by CourtTv.com. A multiple murder charge against Scott Peterson makes him eligible for the death penalty according to California law. Fetal Homicide:When Is a Fetus Considered Living? Although many states now have fetal homicide laws, there is a wide variety of differences about when a fetus is considered living.   Pro-Choice groups see the laws as a way to undermine Roe v. Wade, although currently statues to the laws clearly exclude legal abortions. Anti-abortionists view it as a way to teach the public about the value of a human life. Rae Carruth Former pro football player for the Carolina Panthers, Rae Carruth, was convicted of conspiracy to commit the murder of Cherica Adams, who was seven months pregnant with his child. He was also found guilty of shooting into an occupied vehicle and of using an instrument to kill a fetus. Adams died of a result of the gunshot wounds but her child, delivered by Caesarean section, survived. Rae Carruth received close to the maximum sentence of 19 to 24 years in prison. Unborn Victims of Violence Act On April 1, 2004, President Bush signed into law the Unborn Victims of Violence Act, also known as Laci and Conners Law. The new law states that any child in utero is considered to be a legal victim if injured or killed during the commission of a federal crime of violence. The bills definition of child in utero is a member of the species homo sapiens, at any stage of development, who is carried in the womb. Veronica Jane Thornsbury Since February 2004, Kentucky law recognizes a crime of fetal homicide in the first, second, third, and fourth degrees. The law defines an unborn child, as a member of the species homo sapiens in utero from conception onward, without regard to age, health, or condition of dependency. This determination came after the March 2001 tragedy involving 22-year-old Veronica Jane Thornsbury who was in labor and on her way to the hospital when a driver, under the influence of drugs, Charles Christopher Morris, 29, ran a red light and smashed into Thornsbury car and killed her. The fetus was stillborn. The drugged driver was prosecuted on for the murder of both the mother and the fetus. However, because her baby was not born, state Court of Appeals overturned a guilty plea in the death of the fetus. Currently, 37 states recognize the unlawful killing of an unborn child as homicide in at least some circumstances.

Thursday, November 21, 2019

Applying Leadership Styles Essay Example | Topics and Well Written Essays - 500 words - 1

Applying Leadership Styles - Essay Example This is because transformational leadership is one that powers to control affairs, while appreciating the inputs of their subordinates and the essence of the presence of their subordinates to achieve the common aim of the organization (Labor Laws and Clarifications, 2000). Moreover, transformational leadership tries to employ several different mechanisms to achieve organizational leadership goals. The reason why such a leadership style would best fit the organization in question is that because of the top-bottom approach, it would be important that the leaders use a leadership style that meets all varying characteristics, skills and knowledge of employees who will be expected to take up orders and instructions for execution (Johnson, 2012). It would be observed that given any organization, there are always and often different categories of people who go about their duties and responsibilities different. To maximize the differences that exist among all of these people, the best approa ch is to ensure that there is a generalized system that takes into consideration the differences that exists among the people. Meanwhile, the transformational leadership style equips itself with superseding personal interests of leaders with collective goal achievement, which is much like the servant leadership style (Gardener, 2008). On the other hand, a leadership style that employs the principles of lazier faire and delegate approaches may be least effective when applied in the selected organization. This point is made against the backdrop that with a top-bottom management style, it is always important that the leaders be presented with an avenue through which they would be able to supervise the activities of the subordinates to ensure that they are confirming to the instructions and orders that come from above (Mustapha, 2008). Meanwhile, in a typical lazier faire leadership style, leaders do not get enough medium to track the performance of employees and

Tuesday, November 19, 2019

Econ Essay Example | Topics and Well Written Essays - 250 words

Econ - Essay Example In this system, balance of payments is important for financial experts to analyze the currency’s supply and demand. The basic principle is that sales and purchases must be equal. When the supply of the currency exceeds the demand, then there is a balance of payments deficit. When it is the other way, then there is a balance of payments surplus (ibid. 759). In the heyday of government intervention adhering to strict communist principles, the value of the Chinese currency was determined in impractical values in comparison to its western counterparts. In 1978, the Chinese government put in place a dual track currency system where its currency can only be used locally and foreigners must deal through forex certificates. The rules set in currency exchange was also too stringent that there was seen a growth in the black market exchanges. For some time from the mid 90’s till 2005, the yuan was pegged to the value of USD in answer to the 1998 Asian financial crisis. Then in 200 3, the United States had the problem the Chinese exports became extremely competitive when the yuan and the dollar simultaneously dropped. As a consequence, EU and the g& called for a thorough exchange rate evaluation (Poleg n.p.). Bibliography Baumol, William J. and Alan S. Blinder.

Sunday, November 17, 2019

Plato Apology Essay Example for Free

Plato Apology Essay The Apology is Plato’s accurate depiction of the Socrates’ own defense at the trial provoked by Meletus. However, besides current accusers, Socrates has to speak out to defense against former accusers who have created prejudices of him for long time. Former accusers prosecute Socrates for â€Å"studying things in the sky and below the earth† and â€Å"[making] the worse into the stronger argument† (Plato 18b-c). Moreover, Meletus, who is one of recent accusers, charges Socrates of â€Å"[corrupting] the young and not believing in the gods in whom the city believes, but in new spiritual things† (Plato 24c). The dialogue between Socrates and the jury as well as Meletus describes the true personality of Socrates and answers the question if Socrates is guilty or innocent of those charges. First, Socrates is accused of studying â€Å"things in the sky and things below the earth† (Plato 23d). In this time period, Athenian people believe that gods are the ones who create and rule the world. Everyone must believe in and worship with no doubt. Therefore, if anyone tries to study and explain matters in terms of natural phenomenon instead of religious belief, he or she is immediately charged of not believing in gods and receives punishments from whole society. In this case, older accusers believe that what Socrates is doing is as same as other philosophers who trying to oppose religious belief and negatively impact the society. This is reflected by the comedy of Aristophanes depicting Socrates as a person who has ability to â€Å"walk on air† and present â€Å"a lot of other nonsense† matters (Plato 19c). However, Socrates proves that he is not that type of person and he does not have any knowledge of those matters by saying â€Å"I do not speak in contempt of such knowledge† and asking if anyone has ever heard him discussing about these subjects (Plato 19d). In fact, Socrates’ occupation is a wisdom searcher who dedicates his life to find wise men and to discuss about virtues (Poage). Therefore, the first accusation is not true, and Socrates is not guilty because Socrates does not â€Å"[study] things in the sky and things below earth† to oppose the trust of gods. Second, the earlier accusers prosecute Socrates for â€Å"[making] the worse into the stronger argument† as many Sophists do (Plato 18b-c). The accusers claim that Socrates is one of many Sophists who are â€Å"very good speakers. Indeed, they [have] reputations for being able to convince a crowd that up [is] down, that day [is] night, that the wrong answer could be the right answer, that good [is] bad and bad is good, even that injustice is justice and justice would be made to appear as injustice† (Pecorino). Furthermore, Sophists are paid for delivering speech and only care about winning debates and lawsuits more than anything else. Thus, most of them are feared and hated by Athenian people. Nevertheless, Socrates distinguish himself from Sophists by giving evidence that he â€Å"live[s]in great poverty because of [his] service to the god† (Plato 23b). While Sophists such as Gorgias of Leontini, Producs of Ceos, and Hippias of Elis charge fee for their services, Socrates never asks or receive money from anyone whom he approaches and asks questions regarding to wisdom and virtue. Unlike Sophists who are wealth and famous, Socrates is so poor because of his free service. In addition, Socrates’ intention is to help other people understand virtue and become wiser rather than teaching them how to become good speakers as Sophists do. Therefore, Socrates is not guilty of â€Å"[making] the worse into the stronger argument† (Plato 18b-c). Another charged brought by later accusers against Socrates is â€Å"corrupting the young† (Plato 23d). Socrates teaches his young men be wiser and think about themselves. This annoys the Athenian government and officials because they think those young could break the laws and create rumor among the society. Hence, Meletus prosecutes Socrates for teaching the young to go against the government and emphasizes that all the Athenians make the young become better except Socrates (Plato 25b). In order to reverse that accusation, Socrates uses example of horse breeders who are trained and have experience to take care of horses and make them better while the majority lacking of skills and knowledge cannot. As a result, it is impossible for all the Athenians to know what benefits the young. Only Socrates who has knowledge and skills is able to teach the best for the young. Moreover, Socrates indicates that no one wants to harm oneself; neither does Socrates. If he intentionally corrupts the young, he is putting himself at risk because â€Å"the wicked people do some harm to their closest neighbors while good people do them good† (Plato 25e). Therefore, it is impossible for Socrates to teach the young in the way to harm him. After Socrates disproves Metelus’ charge, he criticizes Metelus’ prosecuting procedure. If Socrates harms the young unintentionally, Metelus has to â€Å"get hold of [Socrates] privately, instruct and exhort [Socrates]† (Plato 26). In contrast, Meletus brings Socrates straight to the court â€Å"where the law requires one to bring those who are in need of punishment, not of instruction† (Plato 26). As a result, Socrates again shows that he is not guilty. The last accusation brought against Socrates is â€Å"not believing in the gods in whom the city believes, but in other new spiritual things† (Plato 24c). In order to prove that Socrates does not trust in gods, Meletus states that Socrates â€Å"says that the sun is stone, and the moon earth† (Plato 26d). If Socrates does say this statement, he denies the presence of Apollo the god of the sun and the presence of Selene the goddess of the moon. Nevertheless, Socrates claims that Anaxagoras of Clazomenae is actually the one who said those matters. Moreover, Socrates catches Meletus’s contradiction when he claims that Socrates does not trust in gods. To make Meletus admit his contradiction, Socrates asks Meletus â€Å"[d]oes any man believe in spiritual activities who does not believe in spirits? † and Meletus answers there is no one (Plato 27c). Socrates believes in the Oracle of Delphi which is related to spiritual activities, and everyone in Athens including Meletus knows that. This means that Meletus agrees that Socrates also believe in spirits which are â€Å"either gods or the children of gods† (Plato 27d). Now, Meletus contradicts himself by saying Socrates believe in gods. Consequently, Socrates successfully shows Meletus’s false and prove that he not guilty of the charge. In conclusion, Socrates is not guilty of the charges from the earlier accusers as well as the recent ones. Socrates provides many evidences and uses his excellent argument skill to prove that he is innocent, but the jury still is not convinced and sentences him to death. What Socrates does is not harmful to anyone in Athens; he only try to question about wisdom and discuss about ethics in order to find the answer for the Oracle. Socrates teaches his students to realize that they are not wise as they thought and show them the way to better themselves by seeking more wisdom. Unfortunately, jealous people and conservative culture does not understand his divine destiny and fallaciously accuse him like a criminal. Works Cited Pecorino, Philip A. An Introduction to Philosophy: An Online Textbook. Study Web. n. d. Web. 13 July 2013. Plato. Five Dialogues: Euthyphro, Apology, Crito, Meno, Phaedo. 2nd ed. Indianapolis: Hackett Publishing Company, Inc. , 2002. Print. Poage, Nathan. Apology Outline. Behavioral Social Sciences Department. Houston Community College. n. d. Web. 13 July 2013.

Thursday, November 14, 2019

Disasters in Space Flight :: Essays Papers

Disasters in Space Flight On January 27, 1967, the three astronauts of the Apollo 4, were doing a test countdown on the launch pad. Gus Grissom was in charge. His crew were Edward H. White, the first American to walk in space, and Roger B. Chaffee, a naval officer going up for the first time. 182 feet below, R.C.A technician Gary Propst was seated in front of a bank of television monitors, listening to the crew radio channel and watching various televisions for important activity. Inside the Apollo 4 there was a metal door with a sharp edge. Each time the door was open and shut, it scraped against an environmental control unit wire. The repeated abrasion had exposed two tiny sections of wire. A spark alone would not cause a fire, but just below the cuts in the cable was a length of aluminum tubing, which took a ninety-degree turn. There were hundreds of these turns in the whole capsule. The aluminum tubing carried a glycol cooling fluid, which is not flammable, but when exposed to air it turns to flammable fumes. The capsule was filled with pure oxygen in an effort to allow the astronauts to work more efficiently. It also turns normally not so flammable items to highly flammable items. Raschel netting that was highly flammable in the pure oxygen environment was near the exposed section of the wires. At 6:31:04 p.m. the Raschel netting burst into an open flame. A second after the netting burst into flames, the first message came over the crew's radio channel: "Fire," Grissom said. Two Seconds later, Chaffee said clearly, "We've got a fire in the cockpit." His tone was businesslike (Murray 191). There was no camera in the cabin, but a remote control camera, if zoomed in on the porthole could provide a partial, shadowy view of the interior of the space craft. There was a lot of motion, Propst explained, as White seemed to fumble with something and then quickly pull his arms back, then reach out again. Another pair of arms came into view from the left, Grissom's, as the flames spread from the far left-hand corner of the spacecraft toward the porthole (Murray 192). The crew struggled for about 30 seconds after their suits failed, and then died of asphyxiation, not the heat. To get out of the capsule astronauts had to remove three separate hatches, atleast 90 seconds was required to open all three hatches. Disasters in Space Flight :: Essays Papers Disasters in Space Flight On January 27, 1967, the three astronauts of the Apollo 4, were doing a test countdown on the launch pad. Gus Grissom was in charge. His crew were Edward H. White, the first American to walk in space, and Roger B. Chaffee, a naval officer going up for the first time. 182 feet below, R.C.A technician Gary Propst was seated in front of a bank of television monitors, listening to the crew radio channel and watching various televisions for important activity. Inside the Apollo 4 there was a metal door with a sharp edge. Each time the door was open and shut, it scraped against an environmental control unit wire. The repeated abrasion had exposed two tiny sections of wire. A spark alone would not cause a fire, but just below the cuts in the cable was a length of aluminum tubing, which took a ninety-degree turn. There were hundreds of these turns in the whole capsule. The aluminum tubing carried a glycol cooling fluid, which is not flammable, but when exposed to air it turns to flammable fumes. The capsule was filled with pure oxygen in an effort to allow the astronauts to work more efficiently. It also turns normally not so flammable items to highly flammable items. Raschel netting that was highly flammable in the pure oxygen environment was near the exposed section of the wires. At 6:31:04 p.m. the Raschel netting burst into an open flame. A second after the netting burst into flames, the first message came over the crew's radio channel: "Fire," Grissom said. Two Seconds later, Chaffee said clearly, "We've got a fire in the cockpit." His tone was businesslike (Murray 191). There was no camera in the cabin, but a remote control camera, if zoomed in on the porthole could provide a partial, shadowy view of the interior of the space craft. There was a lot of motion, Propst explained, as White seemed to fumble with something and then quickly pull his arms back, then reach out again. Another pair of arms came into view from the left, Grissom's, as the flames spread from the far left-hand corner of the spacecraft toward the porthole (Murray 192). The crew struggled for about 30 seconds after their suits failed, and then died of asphyxiation, not the heat. To get out of the capsule astronauts had to remove three separate hatches, atleast 90 seconds was required to open all three hatches.

Tuesday, November 12, 2019

ABC Healthcare Company Essay

Healthcare companies, like ABC Healthcare, that operate as for-profit entities, are facing a multitude of challenges. The regulatory environment is becoming more restrictive, viruses and worms are growing more pervasive and damaging, and ABC Heathcare’s stakeholders are demanding more flexible access to their systems. The healthcare industry is experiencing significant regulatory pressures that mandate prudent information security and systems management practices. Furthermore, the continued pressure to reduce cost requires that management focus on streamlining operations, reducing management overhead and minimizing human intervention. The regulatory focus at ABC Healthcare is on the Health Insurance Portability and Accountability Act (HIPAA) and Sarbanes-Oxley (SOX). Both pieces of legislation highlight the need for good systems administration and controls, but focus on different aspects of the business. The main focus of HIPAA is to protect personally identifiable health information while SOX is concerned with data that impacts financial reporting. Violations may be met with both civil and criminal penalties. Therefore, the company must be ever watchful of new threats to their systems, data, and business operations. The most prevalent security related threat to on-going business operations is the continued development and propagation of viruses and worms. Virus and worm prevention or containment is a vital component to the overall risk mitigation strategy. Virus and worm outbreaks have multiple cost aspects for the company including lost patient charges due to system unavailability, lost productivity because of recovery efforts due to infection, and potential regulatory impacts depending on the virus or worm payload. However, the company must balance risk with opportunities in order to serve the stakeholders and grow the business. ABC Healthcare’s stakeholders include multiple groups that depend on or need access to clinical and/or financial systems in order to help support and grow the company. The access requirements and associated risk model varies by user group. The main access groups are internal only users (i.e. nurses, hourly employee, etc.), internal/remote users (i.e. salaried employees, doctors, etc.), and business partners (i.e. collection agencies, banks, etc.). Risk mitigation solutions must be developed for each user group to help ensure that the company recognizes the benefit that each group brings and to minimize the risk to business operations. The high-level management goals of the network design implementation are as follows: †¢Support the business and balance security requirements without introducing significant overhead and complexity; †¢Maintain and enhance security without significantly increasing management overhead or complexity; †¢Implement systems that are industry supported (standards where appropriate), scalable, and fault-tolerant; †¢Ensure that the design is implemented to help ensure compliance with any and all applicable regulations; †¢Proper management of access control for legitimate users and malicious users is of the utmost importance for the security of the ABC Healthcare management system. The threat is not limited to outside malicious users but also legitimate users engaged in illegitimate activity. Based on the above description you are to provide a recommendation of how you would address each of the following ABC Healthcare’s computer network security requirements. Note, whereas cost is typically an important factor, this is not a consideration for this case analysis. Therefore, you do not need to include cost estimates. Your solution should have the â€Å"right feel†, despite the lack of depth or details necessary to be accepted by upper management. Be specific in your answers. Write them as if you were writing a proposal to your boss. You do not need to include citations. Since you are developing a solution to a specific circumstance, material that is copied from an outside source will not likely fit so everything should be in your own words. 1.Describe your vision for addressing the security requirements in the  overall technical design of the ABC Healthcare network. This should include both internal and external (untrusted and trusted) aspects. Untrusted would include user connectivity to the Internet. The â€Å"trusted† network has the main purpose of supporting the business functions of known entities (i.e. partners, suppliers, etc.) which have a business relationship with the company. Note that you are to concentrate on the high level, and you are not expected to provide low level details for your recommended design. (40 points) A threat is defined as â€Å"a potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm† (Stallings & Brown, 2008, p. 13). In essence a threat is a possible danger that may reveal vulnerabilities. There are many threats associated with online services especially when you add in personal information. The first threat to ABC Healthcare that should be identified is the â€Å"continued development and propagation of viruses and worms† In the development phase of the network design program managers has to ensure not only that there will be antivirus software which will be ran continuously (maybe a network scan done daily after hours) but also ensure there are intrusion prevention and intrusion detection systems (IPS/IDS) in place that would identify network intrusions. A simple antivirus software like McAfee is easy to use and will not drastically increase their budget which in my opinion would be the first balanced approach. Although they may have to pay a little more for other services to ensure a proper IPS or IDS many companies (including the Navy, uses SNORT which is an open source product). Another area that will have to be identified deals with both trusted users and untrusted users and that is unauthorized disclosure which in essence is the ability for someone to gain access to information which they shouldn’t be allowed to view. This does not always have to be malicious in nature as it could simply be a glitch in the system which allows a user the ability to view others information indirectly. We also can’t rule out the threat of deception, when dealing with medical information you want to ensure a patients privacy is kept as just that, private. To gain access hackers can pose as someone who should have access to a system. This could be accomplished by simply calling a help desk and providing them with  information and having them reset your password (which is one reason why I am glad we finally did away with the infamous â€Å"mothers maiden name† security question†¦well for the most part). The third threat would be disruption which would challenge system availability and in some cases the integrity of the system. This threat could be carried out in numerous ways; one would be a denial of service attack which would prevent users from accessing the website. Some more basic disruption techniques could be simply damaging network devices or even theft. Overall to prevent or reduce such threats ABC Healthcare will have to take the different defense-in-depth strategy (people, technology, operations) into consideration. Vulnerability is â€Å"a flaw or weakness in a system’s design, implementation, or operation and management that could be exploited to violate the system’s security policy† (Stallings & Brown, 2008, p. 13). One example of a vulnerability to this system would be system performance. A slow running network is just a useless as one that is unavailable and as such will usually result in users opting to find other means to conduct business. Although I can understand the importance of keeping the cost of network security low at times you will have to remind yourself that you get what you pay for. It is paramount that ABC ensures they have well trained and qualified IT personnel to run their networks (hence my further education into the cybersecurity field) Not only do you have to ensure you have qualified and well trained IT support personnel you have to ensure that each user (employee) that is operating the system is well trained. The biggest threat to a network system is the end user as such they should be trained as to what to look out for such as social engineering. Social engineering could be simple questions asked to a user that they feel are innocent in nature but really provide information to someone who they think would be using the information to help them but in essence be using the information to deceive the user to gain access to network resources or patient information. Additionally, I would first ensure there is some type of disclaimer provided that the user would have to acknowledge stating something to the effect of: the passing of medical records or privacy information is not recommended  unless you can for certain ensure the person you are passing it to will use the information as agreed. Though I am sure it could be written a tad bit better it’s important that users know even though they’re on a secure site their information could still be leaked and disseminated. By having this in place, if something were to happen IT personnel can refer back to this acknowledgment page as issues arise. To protect patients or other groups that utilize the network outside of the ABC Healthcare organization such as collection agencies and banks, along with the above disclaimer I would ensure that the website utilized port 443 for secure connectivity. Although it can still be breached and users can still become victimized, it adds an extra level of security and prevents sniffer attacks. 2.Discuss the way you will address requirements for system monitoring, logging, auditing, including complying with any legal regulations. (15 points) The first thing ABC Healthcare IT personnel should consider when conducting security checks is starting with a checklist. This will allow the administrator to ensure they are able to catch all necessities. This is where risk management should come into effect. According to Kathy Schwalbe, there are six major processes involved in risk management: †¢Planning risk management involves deciding how to approach and plan the risk management. †¢Identifying risks involves determining which risks are likely to affect a network and document the characteristics of each. †¢Performing qualitative risk analysis which involves prioritizing risks based on their probability and impact of occurrence. †¢Performing quantitative risk analysis which involves numerically estimating the effects of risks on objectives. †¢Planning risk responses involves taking steps to enhance opportunities and reduce threats. †¢Monitoring and controlling risk involves monitoring identified and residual risks, identifying new risks, carrying out risk response plans, and evaluating the effectiveness of risk strategies. (Schwalbe, 2010, p.427). With auditing it is a good practice if using Microsoft to utilize the â€Å"Event Viewer† which would allow you to track events that occur on your system. Eckert and Schitka states that â€Å"events that occur on a system are tracked and recorded in different log files, and you can use Event Viewer to view  the contents of these logs. For example, you can use Event Viewer to view the contents of the Systems log to determine when and possibly why, a specific service failed to start† (Eckert, J. & Schitka, M. 2006). It would also be a good idea to have a disclaimer on the login screen informing all users that they are subject to monitoring when using the IT asset that way the user (although it may not always help) will be aware that what they do on the network can be traced and the user has the potential to be brought up on disciplinary charges if the matter warrants. Another thing ABC Healthcare IT administrators should be doing is reviewing files and folders for accuracy. All common server operating systems provide the capability to specify access privileges individually for files, directories, devices, and other resources. By carefully setting access controls and denying personnel unauthorized access, ABC Healthcare IT personnel can reduce intentional and unintentional security breaches. For example, denying read access to files and directories helps to protect confidentiality of information, and denying unnecessary write (modify) access can help maintain the integrity of information. Limiting the execution privilege of most system-related tools to authorized system administrators can prevent users from making configuration changes that could reduce security. It also can restrict an attacker’s ability to use those tools to attack the server or other hosts on the Healthcare’s network. 3.Describe how the system will identify and authenticate all the users who attempt to access ABC Healthcare information resources. (15 points) ABC Healthcare administrators should consider Group Policies. According to Microsoft (2003) â€Å"Group Policy is an infrastructure that allows you to implement specific configurations for users and computers.† Additionally, Microsoft (2003) states that: Group Policy settings are contained in Group Policy Objects (GPOs), which are linked to the following Active Directory service containers: sites, domains, or organizational units (OUs). The settings within GPOs are then evaluated by the affected targets, using the hierarchical nature of Active Directory (Microsoft, 2003). Active Directory in this case would be an added benefit to ABC Healthcare as it allows for the deployment of the Group Policy feature which in turn will allow network  administrators the ability to manage each user and computer object. By creating security GPOs an administrator can apply settings to affect the whole network and not just a standalone computer. This saves time and allows an administrator to affect multiple computers. Another benefit to using GPOs is the ability to define settings for wireless network connectivity. GPOs allow you to configure which wireless networks’ workstations can connect to, and automatically configure Wireless Encryption Protocol (WEP) (Aubert & McCann, 2006). If ABC Healthcare ensures GPOs are set up and followed correctly, users will not be allowed to alter many functions without having advanced administrator privileges and with auditing in place if foul play is suspected it will be quickly noticed. The best form to ensure that a site is available to authorized users would be to enforce the use of a username and password. This would ensure that the right person is accessing their appropriate material. Some security concerns would be that a hacker may try to access a user’s account without the appropriate credentials. There would be steps in place that would prevent access from repeated incorrect password attempts; many times this is covered by having a lockout function. Additionally the ability for users to be able to utilize the â€Å"forgot username and password† function will be readily available. Another option that can be utilized (much like that in the military) would be the use of Common Access Cards (CAC) and Public Key Infrastructure (PKI) which will carry the â€Å"non-repudiation† clause that states that what is sent or uploaded is indeed authenticated by the user and as such cannot be disputed. 4.Discuss how the system shall recover from attacks, failures, and accidents. (15 points) In order to safely ensure that you will be able to maintain information that is stored on your network it is key to ensure IT personnel are conducting backups. Backing up the system is another quality assurance feature that should be viewed by the management personnel. It is paramount that IT management personnel ensure administrators are conducting daily, weekly, and monthly backups of their network. A full backup should be conducted at least once a week with daily differential backups and, with maybe an incremental backup being performed mid-week. This will ensure that in the  event of a data loss IT personnel can restore lost material with minimal downtime. Ensuring there is a baseline in place that has all the original configurations is another way to ensure data safety. When looking at attacks if the system has the IPS/IDS and antivirus software installed the risk could be minimized. Michael Goodrich and Roberto Tamassia also states that administrators should ensure to have checksums and data correcting codes in place. â€Å" Checksums are the computation of a function that maps the contents of a file to a numerical value. A checksum function depends on the entire contents of a file and is designed in a way that even a small change to the input file is highly likely to result in a different output value. Checksums are like trip-wires, they are used to detect when a breach to data integrity has occurred. Data correcting codes are methods for storing data in such a way that small changes can be easily detected and automatically corrected. These codes are typically applied to small units of storage, but there are also data –correcting codes that can be applied to entire files as well† (Goodrich & Tamassia, 2011). 5.Discuss how the system will address User Account Management and related security improvements. (15 points) ABC Healthcare would have to ensure they had proper polices, procedures, standards and guidelines in place to ensure user account management and the improvement of their network security. Although many times in conversation we tend to think that policies, procedures, standards, and guidelines are coupled together. Policies are set rules established by a company or organization. A policy usually is the stepping stone for the creation of standards, guidelines and procedures. A policy would not have to incorporate the other three whereas it would be virtually impossible to create standards, guidelines or procedures without the reference of a policy which is your governing documentation. Having a standard in a way would be a rule used to measure as to how something should be. In the military we have what is called ‘Standard Operating Procedures’ which are rules that provide step-by-step instructions as to how to accurately operate equipment. This  prevents users from using the â€Å"I didn’t know excuse†. ABC Healthcare would have to have policies in place if they want to create a governing document that should be followed. This would establish rules that are to be followed by the organization. In order for a policy to be changed it must first be approved by leadership personnel. Having something like the military’s standard operating procedures wouldn’t be a bad idea either. The procedures would be the instructions that a user would follow to ensure something is operating appropriately. Like stated in question 4 for base-lining they should also have standards. So it would be understood how something is to be completed. For security improvements ABC healthcare can for example create a policy stating that the use of USB drives on computer systems are no longer authorized (as evident by military policy). This is a governing documentation that if not followed could have punitive damages associated with it. References Aubert, M. and McCann, B. (2006). MCSE Guide to Microsoft Windows Server 2003 Active Directory, Enhanced. Boston, MA: Course Technology. Eckert, Jason W. and M. John Schitka. (2006). Linux+ guide to linux certification (second edition). Boston, MA.: Course Technology. Goodrich, M.T. & Tamassia, R. (2011). Introduction to Computer Security. Boston, MA: Pearson Education INC. Microsoft TechNet. (2003). Windows Server TechCenter. Retrieved Nov. 29, 2012. from: http://technet.microsoft.com/en-us/library/cc779838(WS.10).aspx Stallings, W. and Brown, L. (2008). Computer Security: Principles and Practices. Upper Saddle River, NJ: Pearson Educations, Inc. Schwalbe, K., (2010). Information Technology Project Management (sixth edition). Boston, MA: Course Technology.

Sunday, November 10, 2019

Of their version of Romeo and Juliet Essay

The opening scene in the version including Zeffereli is set in an old market place, which shows that Romeo and Juliet story took place a long time ago. When the two households salves meet in the market one of the monauge salves bites his thumb at the Capulet slaves. In this part the director is showing that biting your thumb at someone was as bad verbally swearing at some one to insult him or her. The director uses old colourful clothing on the slaves. The monauges have the same outfit and so do the Capulet’s this is the way that they show they are from the two different households. The two households have a fight because of the thumb biting. The fight is use of swords and some using fists. When the police arrive they are threatened that if this happens again your lives will pay the price. The Capulet households have a ball and invite the monauges. At the ball the director uses very old and classical music that gives the feeling that it was set a long time ago. In the ball Romeo meets Juliet for the first time and instantly fall in love. The director uses this to show that people can fall in love at first sight, but Romeo and Juliet cannot stay together for the whole ball as Juliet’s mother has planed for her to marry some other man. Just before the monauges leave Romeo finds out that Juliet is a Capulet and Juliet finds out that Romeo is a monauge. The director shows that the two households hate each other so much that two lovers have second thoughts about each other. The opening scene with Leonardo de caprio is set in a petrol station and is a bit more modern. The two households meet and a Capulet bites his thumb at the monauges. The director shows that biting your thumb at someone was a very insulting insult. When the two households start to shoot at each other the director is further explaining that the feud was serious. When the police arrive both households are threatened with their lives if it happens again. Now the director is telling us that the feud has been going on for a long time. The Capulet household holds a ball and invites the Montagues.

Thursday, November 7, 2019

Facts About the Element Fermium

Facts About the Element Fermium Fermium is a heavy, man-made radioactive element on the periodic table. Here is a collection of interesting facts about this metal: Fermium Element Facts Fermium is named for the physicist Enrico Fermi.Fermium is the heaviest element that may be made from neutron bombardment of lighter elements.The element is one of those discovered in the products from the  first hydrogen bomb test at Eniwetok Atoll, the Marshall Islands in 1952. For security reasons, the discovery was not announced until 1955. The discovery is credited to  Albert Ghiorsos group at the University of California.The discovered isotope was Fm-255. which has a  half-life 20.07 hours. The most stable isotope that has been produced is Fm-257, with a half-life of 100.5 days.Fermium is a synthetic transuranium element. It belongs to the actinide element group.Although samples of fermium metal have not been produced for study, it is possible to make a fermium and ytterbium alloy. The resulting metal is shiny and silver-colored.The usual oxidation state of fermium is Fm2, although the Fm3 oxidation state also occurs.The most common fermium compound is fermium chloride, F mCl2.Fermium does not exist naturally in the Earths crust. However, its natural production was once seen from the decay of a sample of einsteinium. At present, there are no practical uses of this element. Fermium or Fm Chemical and Physical Properties Element Name: FermiumSymbol: FmAtomic Number: 100Atomic Weight: 257.0951Element Classification: Radioactive Rare Earth (Actinide)Discovery: Argonne, Los Alamos, U. of California 1953 (United States)Name Origin: Named in honor of the scientist Enrico Fermi.Melting Point (K): 1800Appearance: radioactive, synthetic metalAtomic Radius (pm): 290Pauling Negativity Number: 1.3First Ionizing Energy (kJ/mol): (630)Oxidation States: 3Electronic Configuration: [Rn] 5f12 7s2 References Los Alamos National Laboratory (2001)Crescent Chemical Company (2001), Langes Handbook of Chemistry (1952) CRC Handbook of Chemistry Physics (18th Ed.)

Tuesday, November 5, 2019

Sexual Suicide by Honeybees

Sexual Suicide by Honeybees The male honeybee, called a drone, exists for one reason and one reason only: to mate with a  virgin queen. He is entirely expendable after he provides this service to the colony. The drone takes his mission seriously, however, and  gives his life for the cause.   How Honeybees Do the Deed Honeybee sex occurs in mid-air when the queen flies out in search of mates, her one and only nuptial flight. Drones compete for the chance to mate with their queen, swarming around her as she flies. Eventually, a brave drone will make his move. As the drone grasps the queen, he everts his endophallus  using a contraction of his abdominal muscles and hemostatic pressure  and inserts it tightly into the queens reproductive tract. He immediately ejaculates with such explosive force that the tip of his endophallus  is left behind inside the queen and his abdomen ruptures. The drone falls to the ground, where he dies soon after. The next drone removes the previous drones endophallus and inserts his, mates, and then dies as well.  Ã‚   Queen Bees Really Get Around During her one nuptial flight, the queen will mate with a dozen or more partners, leaving a trail of dead drones in her wake. Any drones that remain around the hive in the fall will be unceremoniously  driven from the colony  before cold weather sets in.  Honey  stores are simply too precious to waste on a sperm donor. The queen, on the other hand, will store the  sperm for use throughout her life. The queen can store 6 million  sperm and keep them viable for up to seven years, with the potential of producing 1.7 million offspring during her lifetime, as she uses a few at a time to fertilize her eggs. Bee Egg Development In late winter, the queen then lays eggs in the cells of the hive, up to 1,000 in one day at the height of the season. The hive needs mature bees to be ready to go when flowers with pollen are emerging, but she will continue to lay eggs until fall. Worker bee eggs mature in about 21 days, drones in about 24 days (from unfertilized eggs), and other queens in about 16 days. The hive needs backup queens in case the queen dies, becomes incapable of laying eggs or is lost because a hive doesnt survive without one.   What Workers Do In contrast to the drones, female worker bees take on many jobs. They clean cells for eggs to be laid; feed larvae; construct the comb; guard the hive; and forage. They can lay an egg to become a drone if needed, but their eggs cant become workers or queens.

Sunday, November 3, 2019

Death Penalty Essay Example | Topics and Well Written Essays - 2000 words

Death Penalty - Essay Example Many people argue that this type of punishment is unacceptable while others argue that it is not unusual punishment and if someone can kill another human being without remorse then that person should be put to death as well. Many states set a standard in which the Death Penalty is allowed for and which crime the person has committed to get the Death Penalty. During this paper we will learn about the history and the Pros and Cons of the Death Penalty. We will also see why it works or doesn’t work and why people are for and against it. It is my belief that the Death Penalty should be for people who commit harsh crimes and kill other people. History The death penalty is a form of punishment that has been there even before Christ and has been administered by many civilized societies on wrong doers for various offences; however the first ever documented capital punishment case was that of George Kendall, in Virginia. He was a Spanish spy who was convicted in 1608. From then till pr esent, around 20,000 people (documented figure only) have been given death penalties by various courts of laws. (Acker, 2003). When the concept of state prisons was absent, fines and capital punishment were used as a means to discourage crimes and offences. The punishment was normally meted out in public so as to make an example out of it. The European law was stricter and had some 200 offences punishable by death penalty as compared to the American law in the early periods of colonization. The American law had major crimes such as murder, rape, adultery, sodomy, etc. that could result in capital punishment. Another reason for the public show of the punishment in the early years was the simple method of hanging used for the punishment which in later years was replaced by more sophisticated techniques like electric chairs and gas chambers so as to reduce the suffering of the offender. Thus with new techniques and increasing public sensitivities towards such punishments the public dis play was halted in the mid-19th century. (Acker, 2003) The 18th century also saw some changes in people’s opinion regarding the punishment and they began opposing it. Thus with time the crimes for which death penalty could be ordered were reduced and included just serious offences. The European Enlightenment era saw further criticism and the western nations started abandoning the practice with United States as the only exception. Even US law had the punishment abolished for certain period (1973-1977) but it was again legalized for certain crimes and situations (Acker, 2003). Why such serious crimes are committed? There are various reasons for which people commit crimes which are punishable with death. Offenders usually choose to commit such a big crime mainly due to revenge, grudge and greed of property. Research also reveals that murders are usually done by family members, relatives, friends, or by some known person. This may be because that person wants to take revenge from his relative/friend or is interested in his wealth etc. Moreover, as friends and relatives are mostly aware of the schedule of the person so it is easy for them to target the person (Ehrlich, 1975). Other than revenge, unemployment and poverty also result in serious crimes such as murder. The murder rate is directly proportional to the rate of unemployment and inversely proportional to the labor force participation rate (Ehrlich, 1975). Moreover,

Friday, November 1, 2019

Macro Written Assignment Essay Example | Topics and Well Written Essays - 1500 words

Macro Written Assignment - Essay Example The latter on the other hand, augments the overall money supply in the economy more precipitously. Expansionary policies are conventionally utilized in the attempt of combating unemployment in an economic downturn. This is achieved by depressing the rates of interest with the intention of allowing easy credit to entice business expansion. Contractionary policies are expected to decelerate inflation so as to prevent the consequential distortions combined with the relapse of the values of assets (Weale, 2013). The United Kingdom public might expect a change in monetary policies because of the falling unemployment and economic recovery that the country is experiencing. The change anticipated to happen is the overhauling or revamping of the interest rate policy of the Bank of England. The interest rates are to be determined by unemployment, among other indicators. The introduction of the forward guidance policy kept the bank from increasing interest rates to beyond 0.5 per cent. The bank governor, Mark Carney, however, asserted that the policy needed revising because of the outstanding strong growth in employment. This adjustment involves rising rates of interest. This is to be done following the observation of such indicators as spare capacity within the economy, wages as well as productivity. The bank is to provide predictions on these range of indicators based on expectations of the market of 1.5 per cent increase by the year 2017. The Bank of England outlined its stratagems for alterations in rates of interest in the future. This could probably mean more suffering for the saving population but there would continue to be inexpensive mortgage rates. The Bank would only consider increasing the current low interest rate levels if either inflation or unemployment or both was no longer manageable. The stratagem or change in monetary policy known as the forward guidance would affect the main indicators in